Date
July 16, 2025, 12:11 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.269104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 33.381191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 33.288195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 33.170896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 108.957602] Internal error: Oops: 0000000096000005 [#1] SMP [ 108.964762] Modules linked in: [ 108.965184] CPU: 0 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 108.965749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 108.966005] Hardware name: linux,dummy-virt (DT) [ 108.966372] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.966764] pc : kunit_test_null_dereference+0x70/0x170 [ 108.967139] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.967465] sp : ffff800082077d30 [ 108.967726] x29: ffff800082077d90 x28: 0000000000000000 x27: 0000000000000000 [ 108.968550] x26: 1ffe000018b1e3a1 x25: 0000000000000000 x24: 0000000000000004 [ 108.969009] x23: fff00000c58f1d0c x22: ffff9420b20426b8 x21: fff00000c1b75b08 [ 108.969619] x20: 1ffff0001040efa6 x19: ffff800080087990 x18: 000000004b2eb4ba [ 108.970156] x17: 0000000000000001 x16: fff00000da44cda8 x15: fff00000ff616b48 [ 108.970693] x14: 0000000000018fff x13: fff00000c0988008 x12: fffd800018c7911c [ 108.971234] x11: 1ffe000018c7911b x10: fffd800018c7911b x9 : ffff9420b2039e48 [ 108.971734] x8 : ffff800082077c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 108.972240] x5 : ffff70001040efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 108.972739] x2 : dfff800000000000 x1 : fff00000c63c8000 x0 : ffff800080087990 [ 108.973218] Call trace: [ 108.973484] kunit_test_null_dereference+0x70/0x170 (P) [ 108.973825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.974156] kthread+0x328/0x630 [ 108.974415] ret_from_fork+0x10/0x20 [ 108.974944] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 108.975522] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 65.609563] ================================================================== [ 65.609617] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 65.609617] [ 65.609699] Use-after-free read at 0x0000000029f91e44 (in kfence-#201): [ 65.609751] test_krealloc+0x51c/0x830 [ 65.609799] kunit_try_run_case+0x170/0x3f0 [ 65.609843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.609888] kthread+0x328/0x630 [ 65.609930] ret_from_fork+0x10/0x20 [ 65.609976] [ 65.610001] kfence-#201: 0x0000000029f91e44-0x0000000050f11232, size=32, cache=kmalloc-32 [ 65.610001] [ 65.610058] allocated by task 368 on cpu 1 at 65.608965s (0.001089s ago): [ 65.610129] test_alloc+0x29c/0x628 [ 65.610171] test_krealloc+0xc0/0x830 [ 65.610212] kunit_try_run_case+0x170/0x3f0 [ 65.610251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.610295] kthread+0x328/0x630 [ 65.610332] ret_from_fork+0x10/0x20 [ 65.610375] [ 65.610399] freed by task 368 on cpu 1 at 65.609168s (0.001227s ago): [ 65.610464] krealloc_noprof+0x148/0x360 [ 65.610518] test_krealloc+0x1dc/0x830 [ 65.610559] kunit_try_run_case+0x170/0x3f0 [ 65.610597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.610641] kthread+0x328/0x630 [ 65.610676] ret_from_fork+0x10/0x20 [ 65.610714] [ 65.610756] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 65.610835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.610866] Hardware name: linux,dummy-virt (DT) [ 65.610899] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 65.524213] ================================================================== [ 65.524314] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.524314] [ 65.524411] Use-after-free read at 0x00000000139ae04a (in kfence-#200): [ 65.524466] test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.524534] kunit_try_run_case+0x170/0x3f0 [ 65.524581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.524625] kthread+0x328/0x630 [ 65.524666] ret_from_fork+0x10/0x20 [ 65.524706] [ 65.524730] kfence-#200: 0x00000000139ae04a-0x00000000bcf2d3c9, size=32, cache=test [ 65.524730] [ 65.524782] allocated by task 366 on cpu 0 at 65.508156s (0.016623s ago): [ 65.524855] test_alloc+0x230/0x628 [ 65.524897] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 65.524939] kunit_try_run_case+0x170/0x3f0 [ 65.524977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.525020] kthread+0x328/0x630 [ 65.525056] ret_from_fork+0x10/0x20 [ 65.525097] [ 65.525119] freed by task 366 on cpu 0 at 65.508260s (0.016855s ago): [ 65.525177] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 65.525220] kunit_try_run_case+0x170/0x3f0 [ 65.525258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.525299] kthread+0x328/0x630 [ 65.525336] ret_from_fork+0x10/0x20 [ 65.525373] [ 65.525418] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 65.525498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.525538] Hardware name: linux,dummy-virt (DT) [ 65.525576] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 42.531758] ================================================================== [ 42.532049] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 42.532049] [ 42.532177] Invalid read at 0x00000000a77893a2: [ 42.532244] test_invalid_access+0xdc/0x1f0 [ 42.532417] kunit_try_run_case+0x170/0x3f0 [ 42.532474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.532542] kthread+0x328/0x630 [ 42.532587] ret_from_fork+0x10/0x20 [ 42.532640] [ 42.532692] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 42.532779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.532817] Hardware name: linux,dummy-virt (DT) [ 42.533236] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 42.296439] ================================================================== [ 42.296551] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.296551] [ 42.296619] Corrupted memory at 0x00000000857bedcb [ ! . . . . . . . . . . . . . . . ] (in kfence-#195): [ 42.296935] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.296989] kunit_try_run_case+0x170/0x3f0 [ 42.297034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.297079] kthread+0x328/0x630 [ 42.297118] ret_from_fork+0x10/0x20 [ 42.297157] [ 42.297183] kfence-#195: 0x00000000360065ee-0x000000002c567863, size=73, cache=kmalloc-96 [ 42.297183] [ 42.297243] allocated by task 356 on cpu 1 at 42.296203s (0.001035s ago): [ 42.297310] test_alloc+0x29c/0x628 [ 42.297352] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 42.297400] kunit_try_run_case+0x170/0x3f0 [ 42.297462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.297519] kthread+0x328/0x630 [ 42.297557] ret_from_fork+0x10/0x20 [ 42.297598] [ 42.297622] freed by task 356 on cpu 1 at 42.296345s (0.001273s ago): [ 42.297690] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.297738] kunit_try_run_case+0x170/0x3f0 [ 42.297778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.297824] kthread+0x328/0x630 [ 42.297861] ret_from_fork+0x10/0x20 [ 42.297901] [ 42.297944] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 42.298032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.298063] Hardware name: linux,dummy-virt (DT) [ 42.298096] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 42.088339] ================================================================== [ 42.088422] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 42.088422] [ 42.088532] Out-of-bounds read at 0x000000001f729449 (105B right of kfence-#193): [ 42.088598] test_kmalloc_aligned_oob_read+0x238/0x468 [ 42.088650] kunit_try_run_case+0x170/0x3f0 [ 42.088697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.088745] kthread+0x328/0x630 [ 42.088785] ret_from_fork+0x10/0x20 [ 42.088826] [ 42.088850] kfence-#193: 0x0000000092d4af12-0x00000000970304fc, size=73, cache=kmalloc-96 [ 42.088850] [ 42.088909] allocated by task 354 on cpu 1 at 42.088113s (0.000792s ago): [ 42.088984] test_alloc+0x29c/0x628 [ 42.089027] test_kmalloc_aligned_oob_read+0x100/0x468 [ 42.089071] kunit_try_run_case+0x170/0x3f0 [ 42.089110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.089156] kthread+0x328/0x630 [ 42.089192] ret_from_fork+0x10/0x20 [ 42.089234] [ 42.089279] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 42.089366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.089397] Hardware name: linux,dummy-virt (DT) [ 42.089433] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 36.264525] ================================================================== [ 36.264648] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 36.264648] [ 36.264716] Corrupted memory at 0x0000000066e9e06d [ ! . . . . . . . . . . . . . . . ] (in kfence-#137): [ 36.265839] test_corruption+0x278/0x378 [ 36.265891] kunit_try_run_case+0x170/0x3f0 [ 36.265938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.265986] kthread+0x328/0x630 [ 36.266028] ret_from_fork+0x10/0x20 [ 36.266072] [ 36.266097] kfence-#137: 0x00000000b09094cb-0x0000000065cc9994, size=32, cache=kmalloc-32 [ 36.266097] [ 36.266160] allocated by task 342 on cpu 0 at 36.264221s (0.001935s ago): [ 36.266231] test_alloc+0x29c/0x628 [ 36.266275] test_corruption+0xdc/0x378 [ 36.266314] kunit_try_run_case+0x170/0x3f0 [ 36.266355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.266406] kthread+0x328/0x630 [ 36.266443] ret_from_fork+0x10/0x20 [ 36.266484] [ 36.266519] freed by task 342 on cpu 0 at 36.264323s (0.002192s ago): [ 36.266584] test_corruption+0x278/0x378 [ 36.266622] kunit_try_run_case+0x170/0x3f0 [ 36.266663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.266708] kthread+0x328/0x630 [ 36.266746] ret_from_fork+0x10/0x20 [ 36.266786] [ 36.266832] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 36.266920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.266951] Hardware name: linux,dummy-virt (DT) [ 36.266990] ================================================================== [ 36.368871] ================================================================== [ 36.368965] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 36.368965] [ 36.369027] Corrupted memory at 0x00000000c069d962 [ ! ] (in kfence-#138): [ 36.369158] test_corruption+0x284/0x378 [ 36.369202] kunit_try_run_case+0x170/0x3f0 [ 36.369247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.369294] kthread+0x328/0x630 [ 36.369333] ret_from_fork+0x10/0x20 [ 36.369374] [ 36.369397] kfence-#138: 0x00000000f982a3f9-0x00000000a5c3052e, size=32, cache=kmalloc-32 [ 36.369397] [ 36.369456] allocated by task 342 on cpu 0 at 36.368602s (0.000850s ago): [ 36.369542] test_alloc+0x29c/0x628 [ 36.369587] test_corruption+0x198/0x378 [ 36.369625] kunit_try_run_case+0x170/0x3f0 [ 36.369666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.369711] kthread+0x328/0x630 [ 36.369750] ret_from_fork+0x10/0x20 [ 36.369790] [ 36.369813] freed by task 342 on cpu 0 at 36.368702s (0.001107s ago): [ 36.369880] test_corruption+0x284/0x378 [ 36.369918] kunit_try_run_case+0x170/0x3f0 [ 36.369959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.370006] kthread+0x328/0x630 [ 36.370043] ret_from_fork+0x10/0x20 [ 36.370083] [ 36.370122] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 36.370209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.370241] Hardware name: linux,dummy-virt (DT) [ 36.370277] ================================================================== [ 36.576354] ================================================================== [ 36.576456] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 36.576456] [ 36.576535] Corrupted memory at 0x00000000c312d7ca [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 36.576853] test_corruption+0x120/0x378 [ 36.576901] kunit_try_run_case+0x170/0x3f0 [ 36.576949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.576996] kthread+0x328/0x630 [ 36.577037] ret_from_fork+0x10/0x20 [ 36.577080] [ 36.577104] kfence-#140: 0x000000006194bc67-0x00000000f6be2846, size=32, cache=test [ 36.577104] [ 36.577163] allocated by task 344 on cpu 0 at 36.576205s (0.000953s ago): [ 36.577231] test_alloc+0x230/0x628 [ 36.577273] test_corruption+0xdc/0x378 [ 36.577313] kunit_try_run_case+0x170/0x3f0 [ 36.577354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.577400] kthread+0x328/0x630 [ 36.577437] ret_from_fork+0x10/0x20 [ 36.577477] [ 36.577500] freed by task 344 on cpu 0 at 36.576261s (0.001235s ago): [ 36.577583] test_corruption+0x120/0x378 [ 36.577623] kunit_try_run_case+0x170/0x3f0 [ 36.577662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.577708] kthread+0x328/0x630 [ 36.577743] ret_from_fork+0x10/0x20 [ 36.577784] [ 36.577828] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 36.577915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.577947] Hardware name: linux,dummy-virt (DT) [ 36.577983] ================================================================== [ 36.888330] ================================================================== [ 36.888428] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 36.888428] [ 36.888490] Corrupted memory at 0x000000008f57fbc6 [ ! ] (in kfence-#143): [ 36.888626] test_corruption+0x1d8/0x378 [ 36.888671] kunit_try_run_case+0x170/0x3f0 [ 36.888716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.888763] kthread+0x328/0x630 [ 36.888802] ret_from_fork+0x10/0x20 [ 36.888842] [ 36.888867] kfence-#143: 0x0000000062fab046-0x0000000063e7a052, size=32, cache=test [ 36.888867] [ 36.888926] allocated by task 344 on cpu 0 at 36.888184s (0.000739s ago): [ 36.888996] test_alloc+0x230/0x628 [ 36.889040] test_corruption+0x198/0x378 [ 36.889080] kunit_try_run_case+0x170/0x3f0 [ 36.889122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.889169] kthread+0x328/0x630 [ 36.889206] ret_from_fork+0x10/0x20 [ 36.889246] [ 36.889270] freed by task 344 on cpu 0 at 36.888240s (0.001026s ago): [ 36.889337] test_corruption+0x1d8/0x378 [ 36.889377] kunit_try_run_case+0x170/0x3f0 [ 36.889418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.889465] kthread+0x328/0x630 [ 36.889502] ret_from_fork+0x10/0x20 [ 36.889552] [ 36.889594] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 36.889682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.889714] Hardware name: linux,dummy-virt (DT) [ 36.889751] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 35.952344] ================================================================== [ 35.952427] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 35.952427] [ 35.952493] Invalid free of 0x0000000084997000 (in kfence-#134): [ 35.952568] test_invalid_addr_free+0x1ac/0x238 [ 35.952615] kunit_try_run_case+0x170/0x3f0 [ 35.952660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.952706] kthread+0x328/0x630 [ 35.952746] ret_from_fork+0x10/0x20 [ 35.952787] [ 35.952811] kfence-#134: 0x0000000071e8c933-0x00000000d6da2f82, size=32, cache=kmalloc-32 [ 35.952811] [ 35.952866] allocated by task 338 on cpu 1 at 35.952204s (0.000658s ago): [ 35.952932] test_alloc+0x29c/0x628 [ 35.952974] test_invalid_addr_free+0xd4/0x238 [ 35.953014] kunit_try_run_case+0x170/0x3f0 [ 35.953054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.953098] kthread+0x328/0x630 [ 35.953136] ret_from_fork+0x10/0x20 [ 35.953174] [ 35.953220] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 35.953301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.953329] Hardware name: linux,dummy-virt (DT) [ 35.953366] ================================================================== [ 36.056215] ================================================================== [ 36.056300] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 36.056300] [ 36.056356] Invalid free of 0x00000000047fa866 (in kfence-#135): [ 36.056411] test_invalid_addr_free+0xec/0x238 [ 36.056455] kunit_try_run_case+0x170/0x3f0 [ 36.056498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.056558] kthread+0x328/0x630 [ 36.056597] ret_from_fork+0x10/0x20 [ 36.056637] [ 36.056661] kfence-#135: 0x00000000f547577a-0x0000000002a9082a, size=32, cache=test [ 36.056661] [ 36.056714] allocated by task 340 on cpu 1 at 36.056098s (0.000612s ago): [ 36.056778] test_alloc+0x230/0x628 [ 36.056819] test_invalid_addr_free+0xd4/0x238 [ 36.056859] kunit_try_run_case+0x170/0x3f0 [ 36.056897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.056940] kthread+0x328/0x630 [ 36.056976] ret_from_fork+0x10/0x20 [ 36.057015] [ 36.057056] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 36.057136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.057165] Hardware name: linux,dummy-virt (DT) [ 36.057197] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 35.848439] ================================================================== [ 35.848545] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 35.848545] [ 35.848604] Invalid free of 0x00000000ebf908ce (in kfence-#133): [ 35.848659] test_double_free+0x100/0x238 [ 35.848700] kunit_try_run_case+0x170/0x3f0 [ 35.848744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.848790] kthread+0x328/0x630 [ 35.848828] ret_from_fork+0x10/0x20 [ 35.848869] [ 35.848894] kfence-#133: 0x00000000ebf908ce-0x00000000ba2b8e1e, size=32, cache=test [ 35.848894] [ 35.848947] allocated by task 336 on cpu 0 at 35.848237s (0.000706s ago): [ 35.849012] test_alloc+0x230/0x628 [ 35.849054] test_double_free+0xd4/0x238 [ 35.849091] kunit_try_run_case+0x170/0x3f0 [ 35.849131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.849174] kthread+0x328/0x630 [ 35.849210] ret_from_fork+0x10/0x20 [ 35.849249] [ 35.849272] freed by task 336 on cpu 0 at 35.848291s (0.000978s ago): [ 35.849336] test_double_free+0xf0/0x238 [ 35.849373] kunit_try_run_case+0x170/0x3f0 [ 35.849412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.849454] kthread+0x328/0x630 [ 35.849490] ret_from_fork+0x10/0x20 [ 35.849540] [ 35.849583] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 35.849662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.849692] Hardware name: linux,dummy-virt (DT) [ 35.849726] ================================================================== [ 35.744435] ================================================================== [ 35.744568] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 35.744568] [ 35.744634] Invalid free of 0x000000008fbd2d51 (in kfence-#132): [ 35.744703] test_double_free+0x1bc/0x238 [ 35.744749] kunit_try_run_case+0x170/0x3f0 [ 35.744794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.744840] kthread+0x328/0x630 [ 35.744878] ret_from_fork+0x10/0x20 [ 35.744919] [ 35.744945] kfence-#132: 0x000000008fbd2d51-0x0000000045164ad8, size=32, cache=kmalloc-32 [ 35.744945] [ 35.744999] allocated by task 334 on cpu 0 at 35.744144s (0.000851s ago): [ 35.745065] test_alloc+0x29c/0x628 [ 35.745107] test_double_free+0xd4/0x238 [ 35.745145] kunit_try_run_case+0x170/0x3f0 [ 35.745187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.745232] kthread+0x328/0x630 [ 35.745269] ret_from_fork+0x10/0x20 [ 35.745308] [ 35.745331] freed by task 334 on cpu 0 at 35.744212s (0.001116s ago): [ 35.745398] test_double_free+0x1ac/0x238 [ 35.745438] kunit_try_run_case+0x170/0x3f0 [ 35.745478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.745533] kthread+0x328/0x630 [ 35.745571] ret_from_fork+0x10/0x20 [ 35.745608] [ 35.745656] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 35.745738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.745767] Hardware name: linux,dummy-virt (DT) [ 35.745802] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 35.329975] ================================================================== [ 35.330067] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.330067] [ 35.330412] Use-after-free read at 0x0000000081ca01b9 (in kfence-#128): [ 35.330773] test_use_after_free_read+0x114/0x248 [ 35.330858] kunit_try_run_case+0x170/0x3f0 [ 35.330912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.331009] kthread+0x328/0x630 [ 35.331294] ret_from_fork+0x10/0x20 [ 35.331366] [ 35.331391] kfence-#128: 0x0000000081ca01b9-0x000000004cbeddd2, size=32, cache=kmalloc-32 [ 35.331391] [ 35.331530] allocated by task 326 on cpu 0 at 35.329091s (0.002386s ago): [ 35.331609] test_alloc+0x29c/0x628 [ 35.331669] test_use_after_free_read+0xd0/0x248 [ 35.331718] kunit_try_run_case+0x170/0x3f0 [ 35.331802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.331886] kthread+0x328/0x630 [ 35.331979] ret_from_fork+0x10/0x20 [ 35.332076] [ 35.332304] freed by task 326 on cpu 0 at 35.329154s (0.003040s ago): [ 35.332999] test_use_after_free_read+0x1c0/0x248 [ 35.333067] kunit_try_run_case+0x170/0x3f0 [ 35.333357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.333497] kthread+0x328/0x630 [ 35.333573] ret_from_fork+0x10/0x20 [ 35.333770] [ 35.333962] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 35.334529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.334630] Hardware name: linux,dummy-virt (DT) [ 35.334722] ================================================================== [ 35.437923] ================================================================== [ 35.442033] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.442033] [ 35.443418] Use-after-free read at 0x0000000014966054 (in kfence-#129): [ 35.444567] test_use_after_free_read+0x114/0x248 [ 35.444624] kunit_try_run_case+0x170/0x3f0 [ 35.444671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.444716] kthread+0x328/0x630 [ 35.444755] ret_from_fork+0x10/0x20 [ 35.444795] [ 35.444819] kfence-#129: 0x0000000014966054-0x00000000b5e6891d, size=32, cache=test [ 35.444819] [ 35.444873] allocated by task 328 on cpu 0 at 35.435812s (0.009057s ago): [ 35.444943] test_alloc+0x230/0x628 [ 35.444984] test_use_after_free_read+0xd0/0x248 [ 35.445022] kunit_try_run_case+0x170/0x3f0 [ 35.445062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.445105] kthread+0x328/0x630 [ 35.445142] ret_from_fork+0x10/0x20 [ 35.445179] [ 35.445202] freed by task 328 on cpu 0 at 35.436309s (0.008889s ago): [ 35.445303] test_use_after_free_read+0xf0/0x248 [ 35.445347] kunit_try_run_case+0x170/0x3f0 [ 35.445385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.445430] kthread+0x328/0x630 [ 35.445466] ret_from_fork+0x10/0x20 [ 35.445520] [ 35.445563] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 35.445643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.445671] Hardware name: linux,dummy-virt (DT) [ 35.445705] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 34.912679] ================================================================== [ 34.912762] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.912762] [ 34.912857] Out-of-bounds write at 0x00000000d80bdc28 (1B left of kfence-#124): [ 34.912918] test_out_of_bounds_write+0x100/0x240 [ 34.912975] kunit_try_run_case+0x170/0x3f0 [ 34.913020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.913067] kthread+0x328/0x630 [ 34.913105] ret_from_fork+0x10/0x20 [ 34.913146] [ 34.913170] kfence-#124: 0x000000006d3862bd-0x00000000037badc0, size=32, cache=kmalloc-32 [ 34.913170] [ 34.913467] allocated by task 322 on cpu 0 at 34.912528s (0.000931s ago): [ 34.913622] test_alloc+0x29c/0x628 [ 34.913708] test_out_of_bounds_write+0xc8/0x240 [ 34.913778] kunit_try_run_case+0x170/0x3f0 [ 34.913824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.913906] kthread+0x328/0x630 [ 34.913943] ret_from_fork+0x10/0x20 [ 34.914158] [ 34.914305] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 34.914420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.914451] Hardware name: linux,dummy-virt (DT) [ 34.914496] ================================================================== [ 35.225415] ================================================================== [ 35.225517] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.225517] [ 35.225606] Out-of-bounds write at 0x0000000098a101c2 (1B left of kfence-#127): [ 35.225670] test_out_of_bounds_write+0x100/0x240 [ 35.226124] kunit_try_run_case+0x170/0x3f0 [ 35.226202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.226303] kthread+0x328/0x630 [ 35.226347] ret_from_fork+0x10/0x20 [ 35.226411] [ 35.226626] kfence-#127: 0x00000000b37fd51b-0x0000000096a64314, size=32, cache=test [ 35.226626] [ 35.226950] allocated by task 324 on cpu 0 at 35.225309s (0.001570s ago): [ 35.227059] test_alloc+0x230/0x628 [ 35.227146] test_out_of_bounds_write+0xc8/0x240 [ 35.227190] kunit_try_run_case+0x170/0x3f0 [ 35.227354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.227420] kthread+0x328/0x630 [ 35.227723] ret_from_fork+0x10/0x20 [ 35.227885] [ 35.227940] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 35.228167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.228351] Hardware name: linux,dummy-virt (DT) [ 35.228567] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 34.184756] ================================================================== [ 34.184884] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.184884] [ 34.184993] Out-of-bounds read at 0x0000000016e61c86 (1B left of kfence-#117): [ 34.185160] test_out_of_bounds_read+0x114/0x3e0 [ 34.185213] kunit_try_run_case+0x170/0x3f0 [ 34.185372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.185463] kthread+0x328/0x630 [ 34.185566] ret_from_fork+0x10/0x20 [ 34.185611] [ 34.185661] kfence-#117: 0x000000008a2cd43a-0x00000000239fc527, size=32, cache=test [ 34.185661] [ 34.185754] allocated by task 320 on cpu 0 at 34.184645s (0.001098s ago): [ 34.185914] test_alloc+0x230/0x628 [ 34.186019] test_out_of_bounds_read+0xdc/0x3e0 [ 34.186063] kunit_try_run_case+0x170/0x3f0 [ 34.186106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.186153] kthread+0x328/0x630 [ 34.186190] ret_from_fork+0x10/0x20 [ 34.186474] [ 34.186604] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 34.186842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.186889] Hardware name: linux,dummy-virt (DT) [ 34.186983] ================================================================== [ 33.976939] ================================================================== [ 33.977024] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 33.977024] [ 33.977124] Out-of-bounds read at 0x000000002ae1be92 (32B right of kfence-#115): [ 33.977241] test_out_of_bounds_read+0x1c8/0x3e0 [ 33.977314] kunit_try_run_case+0x170/0x3f0 [ 33.977361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.977727] kthread+0x328/0x630 [ 33.977792] ret_from_fork+0x10/0x20 [ 33.977834] [ 33.977859] kfence-#115: 0x00000000db71380c-0x00000000fb1f2b57, size=32, cache=kmalloc-32 [ 33.977859] [ 33.977920] allocated by task 318 on cpu 0 at 33.976643s (0.001273s ago): [ 33.977995] test_alloc+0x29c/0x628 [ 33.978037] test_out_of_bounds_read+0x198/0x3e0 [ 33.978078] kunit_try_run_case+0x170/0x3f0 [ 33.978119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.978164] kthread+0x328/0x630 [ 33.978199] ret_from_fork+0x10/0x20 [ 33.978241] [ 33.978280] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.978377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.978409] Hardware name: linux,dummy-virt (DT) [ 33.978444] ================================================================== [ 34.809632] ================================================================== [ 34.809774] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.809774] [ 34.809915] Out-of-bounds read at 0x000000005eb2fed1 (32B right of kfence-#123): [ 34.810306] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.810361] kunit_try_run_case+0x170/0x3f0 [ 34.810416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.810464] kthread+0x328/0x630 [ 34.810517] ret_from_fork+0x10/0x20 [ 34.810561] [ 34.810586] kfence-#123: 0x00000000ff8a08d0-0x00000000865f9bf7, size=32, cache=test [ 34.810586] [ 34.810644] allocated by task 320 on cpu 0 at 34.809133s (0.001507s ago): [ 34.810733] test_alloc+0x230/0x628 [ 34.810779] test_out_of_bounds_read+0x198/0x3e0 [ 34.810821] kunit_try_run_case+0x170/0x3f0 [ 34.810929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.810976] kthread+0x328/0x630 [ 34.811013] ret_from_fork+0x10/0x20 [ 34.811052] [ 34.811094] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 34.811180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.811211] Hardware name: linux,dummy-virt (DT) [ 34.811245] ================================================================== [ 33.874732] ================================================================== [ 33.874835] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.874835] [ 33.874957] Out-of-bounds read at 0x0000000034cff0f0 (1B left of kfence-#114): [ 33.875168] test_out_of_bounds_read+0x114/0x3e0 [ 33.875221] kunit_try_run_case+0x170/0x3f0 [ 33.875266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.875310] kthread+0x328/0x630 [ 33.875484] ret_from_fork+0x10/0x20 [ 33.876901] [ 33.877589] kfence-#114: 0x00000000f9258f6d-0x0000000015a8d339, size=32, cache=kmalloc-32 [ 33.877589] [ 33.877955] allocated by task 318 on cpu 0 at 33.873312s (0.004539s ago): [ 33.879662] test_alloc+0x29c/0x628 [ 33.880054] test_out_of_bounds_read+0xdc/0x3e0 [ 33.880262] kunit_try_run_case+0x170/0x3f0 [ 33.880418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.880843] kthread+0x328/0x630 [ 33.880984] ret_from_fork+0x10/0x20 [ 33.881523] [ 33.881767] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.882180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.882400] Hardware name: linux,dummy-virt (DT) [ 33.882578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 33.730477] ================================================================== [ 33.730544] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 33.730599] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.730653] [ 33.730685] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.730773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.730801] Hardware name: linux,dummy-virt (DT) [ 33.730835] Call trace: [ 33.730858] show_stack+0x20/0x38 (C) [ 33.730917] dump_stack_lvl+0x8c/0xd0 [ 33.730967] print_report+0x118/0x5d0 [ 33.731022] kasan_report+0xdc/0x128 [ 33.731072] kasan_check_range+0x100/0x1a8 [ 33.731123] __kasan_check_write+0x20/0x30 [ 33.731172] strncpy_from_user+0x3c/0x2a0 [ 33.731235] copy_user_test_oob+0x5c0/0xec8 [ 33.731297] kunit_try_run_case+0x170/0x3f0 [ 33.731346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.731399] kthread+0x328/0x630 [ 33.731444] ret_from_fork+0x10/0x20 [ 33.731492] [ 33.732575] Allocated by task 316: [ 33.732667] kasan_save_stack+0x3c/0x68 [ 33.732740] kasan_save_track+0x20/0x40 [ 33.732820] kasan_save_alloc_info+0x40/0x58 [ 33.732893] __kasan_kmalloc+0xd4/0xd8 [ 33.732960] __kmalloc_noprof+0x198/0x4c8 [ 33.733031] kunit_kmalloc_array+0x34/0x88 [ 33.733383] copy_user_test_oob+0xac/0xec8 [ 33.733773] kunit_try_run_case+0x170/0x3f0 [ 33.734108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.734213] kthread+0x328/0x630 [ 33.734271] ret_from_fork+0x10/0x20 [ 33.734346] [ 33.734633] The buggy address belongs to the object at fff00000c9bb7300 [ 33.734633] which belongs to the cache kmalloc-128 of size 128 [ 33.734944] The buggy address is located 0 bytes inside of [ 33.734944] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.735345] [ 33.735385] The buggy address belongs to the physical page: [ 33.735517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.735864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.736196] page_type: f5(slab) [ 33.736364] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.736691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.736803] page dumped because: kasan: bad access detected [ 33.736880] [ 33.737179] Memory state around the buggy address: [ 33.737277] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.737576] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.737801] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.738107] ^ [ 33.738254] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.738439] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.738551] ================================================================== [ 33.739615] ================================================================== [ 33.739670] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 33.740114] Write of size 1 at addr fff00000c9bb7378 by task kunit_try_catch/316 [ 33.740237] [ 33.740383] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.740612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.740644] Hardware name: linux,dummy-virt (DT) [ 33.740991] Call trace: [ 33.741099] show_stack+0x20/0x38 (C) [ 33.741444] dump_stack_lvl+0x8c/0xd0 [ 33.741533] print_report+0x118/0x5d0 [ 33.741651] kasan_report+0xdc/0x128 [ 33.741866] __asan_report_store1_noabort+0x20/0x30 [ 33.742037] strncpy_from_user+0x270/0x2a0 [ 33.742108] copy_user_test_oob+0x5c0/0xec8 [ 33.742422] kunit_try_run_case+0x170/0x3f0 [ 33.742528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.742861] kthread+0x328/0x630 [ 33.742996] ret_from_fork+0x10/0x20 [ 33.743205] [ 33.743325] Allocated by task 316: [ 33.743374] kasan_save_stack+0x3c/0x68 [ 33.743544] kasan_save_track+0x20/0x40 [ 33.743742] kasan_save_alloc_info+0x40/0x58 [ 33.743944] __kasan_kmalloc+0xd4/0xd8 [ 33.743994] __kmalloc_noprof+0x198/0x4c8 [ 33.744037] kunit_kmalloc_array+0x34/0x88 [ 33.744085] copy_user_test_oob+0xac/0xec8 [ 33.744127] kunit_try_run_case+0x170/0x3f0 [ 33.744550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.744836] kthread+0x328/0x630 [ 33.744886] ret_from_fork+0x10/0x20 [ 33.745161] [ 33.745233] The buggy address belongs to the object at fff00000c9bb7300 [ 33.745233] which belongs to the cache kmalloc-128 of size 128 [ 33.745608] The buggy address is located 0 bytes to the right of [ 33.745608] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.745718] [ 33.745741] The buggy address belongs to the physical page: [ 33.745776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.745995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.746200] page_type: f5(slab) [ 33.746659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.746734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.746944] page dumped because: kasan: bad access detected [ 33.747086] [ 33.747155] Memory state around the buggy address: [ 33.747204] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.747253] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.747466] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.747633] ^ [ 33.747993] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.748131] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.748246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 33.702927] ================================================================== [ 33.703053] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 33.703110] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.703417] [ 33.703465] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.703572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.703982] Hardware name: linux,dummy-virt (DT) [ 33.704062] Call trace: [ 33.704175] show_stack+0x20/0x38 (C) [ 33.704385] dump_stack_lvl+0x8c/0xd0 [ 33.704456] print_report+0x118/0x5d0 [ 33.704503] kasan_report+0xdc/0x128 [ 33.704711] kasan_check_range+0x100/0x1a8 [ 33.705131] __kasan_check_read+0x20/0x30 [ 33.705310] copy_user_test_oob+0x3c8/0xec8 [ 33.705482] kunit_try_run_case+0x170/0x3f0 [ 33.705714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.705953] kthread+0x328/0x630 [ 33.706159] ret_from_fork+0x10/0x20 [ 33.706346] [ 33.706427] Allocated by task 316: [ 33.706586] kasan_save_stack+0x3c/0x68 [ 33.706656] kasan_save_track+0x20/0x40 [ 33.706723] kasan_save_alloc_info+0x40/0x58 [ 33.706765] __kasan_kmalloc+0xd4/0xd8 [ 33.706804] __kmalloc_noprof+0x198/0x4c8 [ 33.706846] kunit_kmalloc_array+0x34/0x88 [ 33.706928] copy_user_test_oob+0xac/0xec8 [ 33.706983] kunit_try_run_case+0x170/0x3f0 [ 33.707024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.707068] kthread+0x328/0x630 [ 33.707105] ret_from_fork+0x10/0x20 [ 33.707142] [ 33.707166] The buggy address belongs to the object at fff00000c9bb7300 [ 33.707166] which belongs to the cache kmalloc-128 of size 128 [ 33.707237] The buggy address is located 0 bytes inside of [ 33.707237] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.707314] [ 33.707351] The buggy address belongs to the physical page: [ 33.707384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.707439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.707489] page_type: f5(slab) [ 33.707548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.707613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.707658] page dumped because: kasan: bad access detected [ 33.707702] [ 33.707737] Memory state around the buggy address: [ 33.707772] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.708449] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.708537] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.708600] ^ [ 33.708668] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.708848] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.709250] ================================================================== [ 33.657947] ================================================================== [ 33.658064] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 33.658298] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.658354] [ 33.658724] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.659147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.659678] Hardware name: linux,dummy-virt (DT) [ 33.659761] Call trace: [ 33.659842] show_stack+0x20/0x38 (C) [ 33.660006] dump_stack_lvl+0x8c/0xd0 [ 33.660110] print_report+0x118/0x5d0 [ 33.660223] kasan_report+0xdc/0x128 [ 33.660523] kasan_check_range+0x100/0x1a8 [ 33.660795] __kasan_check_write+0x20/0x30 [ 33.660988] copy_user_test_oob+0x234/0xec8 [ 33.661044] kunit_try_run_case+0x170/0x3f0 [ 33.661247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.661492] kthread+0x328/0x630 [ 33.661607] ret_from_fork+0x10/0x20 [ 33.661761] [ 33.661847] Allocated by task 316: [ 33.662107] kasan_save_stack+0x3c/0x68 [ 33.662324] kasan_save_track+0x20/0x40 [ 33.662396] kasan_save_alloc_info+0x40/0x58 [ 33.662437] __kasan_kmalloc+0xd4/0xd8 [ 33.662487] __kmalloc_noprof+0x198/0x4c8 [ 33.662542] kunit_kmalloc_array+0x34/0x88 [ 33.662584] copy_user_test_oob+0xac/0xec8 [ 33.662625] kunit_try_run_case+0x170/0x3f0 [ 33.662666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.662713] kthread+0x328/0x630 [ 33.662750] ret_from_fork+0x10/0x20 [ 33.662788] [ 33.662811] The buggy address belongs to the object at fff00000c9bb7300 [ 33.662811] which belongs to the cache kmalloc-128 of size 128 [ 33.662886] The buggy address is located 0 bytes inside of [ 33.662886] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.662956] [ 33.662990] The buggy address belongs to the physical page: [ 33.663032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.663099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.663163] page_type: f5(slab) [ 33.663219] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.663282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.663353] page dumped because: kasan: bad access detected [ 33.663389] [ 33.663418] Memory state around the buggy address: [ 33.663480] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.663538] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.664132] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.664204] ^ [ 33.664314] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.664536] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.664891] ================================================================== [ 33.721614] ================================================================== [ 33.721669] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 33.721721] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.721774] [ 33.722106] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.722357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.722822] Hardware name: linux,dummy-virt (DT) [ 33.723083] Call trace: [ 33.723338] show_stack+0x20/0x38 (C) [ 33.723413] dump_stack_lvl+0x8c/0xd0 [ 33.723471] print_report+0x118/0x5d0 [ 33.723701] kasan_report+0xdc/0x128 [ 33.723766] kasan_check_range+0x100/0x1a8 [ 33.724010] __kasan_check_read+0x20/0x30 [ 33.724167] copy_user_test_oob+0x4a0/0xec8 [ 33.724274] kunit_try_run_case+0x170/0x3f0 [ 33.724625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.724783] kthread+0x328/0x630 [ 33.724972] ret_from_fork+0x10/0x20 [ 33.725140] [ 33.725246] Allocated by task 316: [ 33.725335] kasan_save_stack+0x3c/0x68 [ 33.725739] kasan_save_track+0x20/0x40 [ 33.725799] kasan_save_alloc_info+0x40/0x58 [ 33.726015] __kasan_kmalloc+0xd4/0xd8 [ 33.726080] __kmalloc_noprof+0x198/0x4c8 [ 33.726263] kunit_kmalloc_array+0x34/0x88 [ 33.726394] copy_user_test_oob+0xac/0xec8 [ 33.726892] kunit_try_run_case+0x170/0x3f0 [ 33.726970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.727435] kthread+0x328/0x630 [ 33.727801] ret_from_fork+0x10/0x20 [ 33.727939] [ 33.728036] The buggy address belongs to the object at fff00000c9bb7300 [ 33.728036] which belongs to the cache kmalloc-128 of size 128 [ 33.728260] The buggy address is located 0 bytes inside of [ 33.728260] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.728341] [ 33.728364] The buggy address belongs to the physical page: [ 33.728858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.729190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.729248] page_type: f5(slab) [ 33.729291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.729373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.729418] page dumped because: kasan: bad access detected [ 33.729453] [ 33.729483] Memory state around the buggy address: [ 33.729531] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.729583] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.729641] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.729682] ^ [ 33.729727] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.729771] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.729814] ================================================================== [ 33.674145] ================================================================== [ 33.674454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 33.674599] Read of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.674684] [ 33.675584] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.675696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.675740] Hardware name: linux,dummy-virt (DT) [ 33.675775] Call trace: [ 33.676081] show_stack+0x20/0x38 (C) [ 33.676186] dump_stack_lvl+0x8c/0xd0 [ 33.676284] print_report+0x118/0x5d0 [ 33.676580] kasan_report+0xdc/0x128 [ 33.676635] kasan_check_range+0x100/0x1a8 [ 33.676961] __kasan_check_read+0x20/0x30 [ 33.677218] copy_user_test_oob+0x728/0xec8 [ 33.677343] kunit_try_run_case+0x170/0x3f0 [ 33.677474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.677546] kthread+0x328/0x630 [ 33.677694] ret_from_fork+0x10/0x20 [ 33.677750] [ 33.678090] Allocated by task 316: [ 33.678207] kasan_save_stack+0x3c/0x68 [ 33.678396] kasan_save_track+0x20/0x40 [ 33.678471] kasan_save_alloc_info+0x40/0x58 [ 33.678597] __kasan_kmalloc+0xd4/0xd8 [ 33.678673] __kmalloc_noprof+0x198/0x4c8 [ 33.678771] kunit_kmalloc_array+0x34/0x88 [ 33.678850] copy_user_test_oob+0xac/0xec8 [ 33.679004] kunit_try_run_case+0x170/0x3f0 [ 33.679202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.679348] kthread+0x328/0x630 [ 33.679489] ret_from_fork+0x10/0x20 [ 33.679539] [ 33.679561] The buggy address belongs to the object at fff00000c9bb7300 [ 33.679561] which belongs to the cache kmalloc-128 of size 128 [ 33.679691] The buggy address is located 0 bytes inside of [ 33.679691] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.679918] [ 33.680242] The buggy address belongs to the physical page: [ 33.680651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.680735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.681049] page_type: f5(slab) [ 33.681157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.681314] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.681529] page dumped because: kasan: bad access detected [ 33.681824] [ 33.681923] Memory state around the buggy address: [ 33.681964] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.682521] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.682686] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.682774] ^ [ 33.682823] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.682869] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.683194] ================================================================== [ 33.710766] ================================================================== [ 33.710839] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 33.710892] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.711240] [ 33.711448] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.711804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.711865] Hardware name: linux,dummy-virt (DT) [ 33.712086] Call trace: [ 33.712169] show_stack+0x20/0x38 (C) [ 33.712545] dump_stack_lvl+0x8c/0xd0 [ 33.712638] print_report+0x118/0x5d0 [ 33.712825] kasan_report+0xdc/0x128 [ 33.713030] kasan_check_range+0x100/0x1a8 [ 33.713215] __kasan_check_write+0x20/0x30 [ 33.713300] copy_user_test_oob+0x434/0xec8 [ 33.713546] kunit_try_run_case+0x170/0x3f0 [ 33.713798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.713938] kthread+0x328/0x630 [ 33.714057] ret_from_fork+0x10/0x20 [ 33.714130] [ 33.714351] Allocated by task 316: [ 33.714427] kasan_save_stack+0x3c/0x68 [ 33.714634] kasan_save_track+0x20/0x40 [ 33.714845] kasan_save_alloc_info+0x40/0x58 [ 33.715033] __kasan_kmalloc+0xd4/0xd8 [ 33.715209] __kmalloc_noprof+0x198/0x4c8 [ 33.715393] kunit_kmalloc_array+0x34/0x88 [ 33.715437] copy_user_test_oob+0xac/0xec8 [ 33.715666] kunit_try_run_case+0x170/0x3f0 [ 33.716034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.716198] kthread+0x328/0x630 [ 33.716367] ret_from_fork+0x10/0x20 [ 33.716593] [ 33.716638] The buggy address belongs to the object at fff00000c9bb7300 [ 33.716638] which belongs to the cache kmalloc-128 of size 128 [ 33.716975] The buggy address is located 0 bytes inside of [ 33.716975] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.717059] [ 33.717081] The buggy address belongs to the physical page: [ 33.717326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.717497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.717892] page_type: f5(slab) [ 33.717939] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.718247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.718358] page dumped because: kasan: bad access detected [ 33.718847] [ 33.718876] Memory state around the buggy address: [ 33.719220] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.719317] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.719578] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.719764] ^ [ 33.720035] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.720306] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.720359] ================================================================== [ 33.693207] ================================================================== [ 33.693349] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 33.693414] Write of size 121 at addr fff00000c9bb7300 by task kunit_try_catch/316 [ 33.693744] [ 33.693829] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.693926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.693976] Hardware name: linux,dummy-virt (DT) [ 33.694073] Call trace: [ 33.694099] show_stack+0x20/0x38 (C) [ 33.694300] dump_stack_lvl+0x8c/0xd0 [ 33.694391] print_report+0x118/0x5d0 [ 33.694720] kasan_report+0xdc/0x128 [ 33.694802] kasan_check_range+0x100/0x1a8 [ 33.694855] __kasan_check_write+0x20/0x30 [ 33.694947] copy_user_test_oob+0x35c/0xec8 [ 33.695001] kunit_try_run_case+0x170/0x3f0 [ 33.695054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.695153] kthread+0x328/0x630 [ 33.695197] ret_from_fork+0x10/0x20 [ 33.695264] [ 33.695566] Allocated by task 316: [ 33.695647] kasan_save_stack+0x3c/0x68 [ 33.695734] kasan_save_track+0x20/0x40 [ 33.695789] kasan_save_alloc_info+0x40/0x58 [ 33.695941] __kasan_kmalloc+0xd4/0xd8 [ 33.696027] __kmalloc_noprof+0x198/0x4c8 [ 33.696123] kunit_kmalloc_array+0x34/0x88 [ 33.696370] copy_user_test_oob+0xac/0xec8 [ 33.696571] kunit_try_run_case+0x170/0x3f0 [ 33.696718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.696947] kthread+0x328/0x630 [ 33.697127] ret_from_fork+0x10/0x20 [ 33.697319] [ 33.697351] The buggy address belongs to the object at fff00000c9bb7300 [ 33.697351] which belongs to the cache kmalloc-128 of size 128 [ 33.698024] The buggy address is located 0 bytes inside of [ 33.698024] allocated 120-byte region [fff00000c9bb7300, fff00000c9bb7378) [ 33.698128] [ 33.698183] The buggy address belongs to the physical page: [ 33.698237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.698874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.699096] page_type: f5(slab) [ 33.699312] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.699463] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.699649] page dumped because: kasan: bad access detected [ 33.699906] [ 33.700066] Memory state around the buggy address: [ 33.700253] fff00000c9bb7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.700319] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.700504] >fff00000c9bb7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.700893] ^ [ 33.700998] fff00000c9bb7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.701131] fff00000c9bb7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.701502] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 33.614170] ================================================================== [ 33.614591] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.614673] Read of size 8 at addr fff00000c9bb7278 by task kunit_try_catch/312 [ 33.614815] [ 33.614894] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.615030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.615174] Hardware name: linux,dummy-virt (DT) [ 33.615392] Call trace: [ 33.615435] show_stack+0x20/0x38 (C) [ 33.615574] dump_stack_lvl+0x8c/0xd0 [ 33.615670] print_report+0x118/0x5d0 [ 33.615725] kasan_report+0xdc/0x128 [ 33.615769] __asan_report_load8_noabort+0x20/0x30 [ 33.616232] copy_to_kernel_nofault+0x204/0x250 [ 33.616326] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.616392] kunit_try_run_case+0x170/0x3f0 [ 33.616604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.616866] kthread+0x328/0x630 [ 33.617128] ret_from_fork+0x10/0x20 [ 33.617342] [ 33.617400] Allocated by task 312: [ 33.617471] kasan_save_stack+0x3c/0x68 [ 33.617527] kasan_save_track+0x20/0x40 [ 33.617818] kasan_save_alloc_info+0x40/0x58 [ 33.618005] __kasan_kmalloc+0xd4/0xd8 [ 33.618224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.618325] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.618700] kunit_try_run_case+0x170/0x3f0 [ 33.618811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.618909] kthread+0x328/0x630 [ 33.618992] ret_from_fork+0x10/0x20 [ 33.619137] [ 33.619197] The buggy address belongs to the object at fff00000c9bb7200 [ 33.619197] which belongs to the cache kmalloc-128 of size 128 [ 33.619319] The buggy address is located 0 bytes to the right of [ 33.619319] allocated 120-byte region [fff00000c9bb7200, fff00000c9bb7278) [ 33.619396] [ 33.619427] The buggy address belongs to the physical page: [ 33.619463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.619540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.619596] page_type: f5(slab) [ 33.619650] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.619714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.619760] page dumped because: kasan: bad access detected [ 33.619795] [ 33.619816] Memory state around the buggy address: [ 33.620204] fff00000c9bb7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.620270] fff00000c9bb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.620318] >fff00000c9bb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.620764] ^ [ 33.620861] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.620986] fff00000c9bb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.621074] ================================================================== [ 33.622080] ================================================================== [ 33.622258] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.622312] Write of size 8 at addr fff00000c9bb7278 by task kunit_try_catch/312 [ 33.622650] [ 33.622760] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.622867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.622946] Hardware name: linux,dummy-virt (DT) [ 33.622982] Call trace: [ 33.623006] show_stack+0x20/0x38 (C) [ 33.623198] dump_stack_lvl+0x8c/0xd0 [ 33.623247] print_report+0x118/0x5d0 [ 33.623690] kasan_report+0xdc/0x128 [ 33.623799] kasan_check_range+0x100/0x1a8 [ 33.623857] __kasan_check_write+0x20/0x30 [ 33.623932] copy_to_kernel_nofault+0x8c/0x250 [ 33.623987] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.624040] kunit_try_run_case+0x170/0x3f0 [ 33.624352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624485] kthread+0x328/0x630 [ 33.624545] ret_from_fork+0x10/0x20 [ 33.624605] [ 33.624629] Allocated by task 312: [ 33.624663] kasan_save_stack+0x3c/0x68 [ 33.624726] kasan_save_track+0x20/0x40 [ 33.624763] kasan_save_alloc_info+0x40/0x58 [ 33.624803] __kasan_kmalloc+0xd4/0xd8 [ 33.624852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.624905] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.624958] kunit_try_run_case+0x170/0x3f0 [ 33.624996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.625043] kthread+0x328/0x630 [ 33.625086] ret_from_fork+0x10/0x20 [ 33.625134] [ 33.625164] The buggy address belongs to the object at fff00000c9bb7200 [ 33.625164] which belongs to the cache kmalloc-128 of size 128 [ 33.625236] The buggy address is located 0 bytes to the right of [ 33.625236] allocated 120-byte region [fff00000c9bb7200, fff00000c9bb7278) [ 33.625304] [ 33.625335] The buggy address belongs to the physical page: [ 33.625378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb7 [ 33.625435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.625485] page_type: f5(slab) [ 33.626042] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.626121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.626185] page dumped because: kasan: bad access detected [ 33.626443] [ 33.627384] Memory state around the buggy address: [ 33.627444] fff00000c9bb7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.627557] fff00000c9bb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.627628] >fff00000c9bb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.627703] ^ [ 33.627975] fff00000c9bb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.628024] fff00000c9bb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.628068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 33.569838] ================================================================== [ 33.569921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 33.569979] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 33.570032] [ 33.570105] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.570290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.570328] Hardware name: linux,dummy-virt (DT) [ 33.570373] Call trace: [ 33.570632] show_stack+0x20/0x38 (C) [ 33.570718] dump_stack_lvl+0x8c/0xd0 [ 33.570771] print_report+0x310/0x5d0 [ 33.570816] kasan_report+0xdc/0x128 [ 33.570880] __asan_report_load1_noabort+0x20/0x30 [ 33.570933] vmalloc_oob+0x578/0x5d0 [ 33.571009] kunit_try_run_case+0x170/0x3f0 [ 33.571106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.571163] kthread+0x328/0x630 [ 33.571208] ret_from_fork+0x10/0x20 [ 33.571257] [ 33.571280] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 33.571339] The buggy address belongs to the physical page: [ 33.571374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c51 [ 33.571429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.571494] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.571560] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.571607] page dumped because: kasan: bad access detected [ 33.571643] [ 33.571663] Memory state around the buggy address: [ 33.571700] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.571747] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.571793] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.571836] ^ [ 33.571878] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.572119] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.572203] ================================================================== [ 33.572967] ================================================================== [ 33.573053] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 33.573105] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 33.573170] [ 33.573396] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.573524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.573592] Hardware name: linux,dummy-virt (DT) [ 33.573648] Call trace: [ 33.573678] show_stack+0x20/0x38 (C) [ 33.573730] dump_stack_lvl+0x8c/0xd0 [ 33.573795] print_report+0x310/0x5d0 [ 33.573861] kasan_report+0xdc/0x128 [ 33.573905] __asan_report_load1_noabort+0x20/0x30 [ 33.573968] vmalloc_oob+0x51c/0x5d0 [ 33.574035] kunit_try_run_case+0x170/0x3f0 [ 33.574100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.574183] kthread+0x328/0x630 [ 33.574227] ret_from_fork+0x10/0x20 [ 33.574283] [ 33.574305] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 33.574348] The buggy address belongs to the physical page: [ 33.574387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c51 [ 33.574440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.574583] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.574642] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.574815] page dumped because: kasan: bad access detected [ 33.574859] [ 33.574899] Memory state around the buggy address: [ 33.574960] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.575089] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.575211] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.575265] ^ [ 33.575353] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.575428] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.575471] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.546725] ================================================================== [ 33.546777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.546829] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.546881] [ 33.546911] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.546999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.547027] Hardware name: linux,dummy-virt (DT) [ 33.547061] Call trace: [ 33.547151] show_stack+0x20/0x38 (C) [ 33.547206] dump_stack_lvl+0x8c/0xd0 [ 33.547290] print_report+0x118/0x5d0 [ 33.547367] kasan_report+0xdc/0x128 [ 33.547424] __asan_report_load8_noabort+0x20/0x30 [ 33.547528] kasan_atomics_helper+0x3e20/0x4858 [ 33.547617] kasan_atomics+0x198/0x2e0 [ 33.547666] kunit_try_run_case+0x170/0x3f0 [ 33.547715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.547770] kthread+0x328/0x630 [ 33.547818] ret_from_fork+0x10/0x20 [ 33.547868] [ 33.547888] Allocated by task 296: [ 33.547919] kasan_save_stack+0x3c/0x68 [ 33.547959] kasan_save_track+0x20/0x40 [ 33.547999] kasan_save_alloc_info+0x40/0x58 [ 33.548040] __kasan_kmalloc+0xd4/0xd8 [ 33.548081] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.548125] kasan_atomics+0xb8/0x2e0 [ 33.548181] kunit_try_run_case+0x170/0x3f0 [ 33.548220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.548266] kthread+0x328/0x630 [ 33.549277] ret_from_fork+0x10/0x20 [ 33.549410] [ 33.549491] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.549491] which belongs to the cache kmalloc-64 of size 64 [ 33.549581] The buggy address is located 0 bytes to the right of [ 33.549581] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.549658] [ 33.549679] The buggy address belongs to the physical page: [ 33.549714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.549770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.549822] page_type: f5(slab) [ 33.549860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.549914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.549956] page dumped because: kasan: bad access detected [ 33.549991] [ 33.550011] Memory state around the buggy address: [ 33.550046] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.550094] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.550178] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.550266] ^ [ 33.550411] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.550555] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.550632] ================================================================== [ 33.503600] ================================================================== [ 33.503666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.503845] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.503918] [ 33.503977] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.504194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.504274] Hardware name: linux,dummy-virt (DT) [ 33.504364] Call trace: [ 33.504389] show_stack+0x20/0x38 (C) [ 33.504463] dump_stack_lvl+0x8c/0xd0 [ 33.504527] print_report+0x118/0x5d0 [ 33.504573] kasan_report+0xdc/0x128 [ 33.504617] kasan_check_range+0x100/0x1a8 [ 33.504781] __kasan_check_write+0x20/0x30 [ 33.504944] kasan_atomics_helper+0x14e4/0x4858 [ 33.505067] kasan_atomics+0x198/0x2e0 [ 33.505146] kunit_try_run_case+0x170/0x3f0 [ 33.505204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505261] kthread+0x328/0x630 [ 33.505451] ret_from_fork+0x10/0x20 [ 33.505587] [ 33.505631] Allocated by task 296: [ 33.505757] kasan_save_stack+0x3c/0x68 [ 33.505797] kasan_save_track+0x20/0x40 [ 33.505860] kasan_save_alloc_info+0x40/0x58 [ 33.505902] __kasan_kmalloc+0xd4/0xd8 [ 33.506088] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.506167] kasan_atomics+0xb8/0x2e0 [ 33.506273] kunit_try_run_case+0x170/0x3f0 [ 33.506349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.506617] kthread+0x328/0x630 [ 33.506717] ret_from_fork+0x10/0x20 [ 33.506788] [ 33.506810] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.506810] which belongs to the cache kmalloc-64 of size 64 [ 33.506883] The buggy address is located 0 bytes to the right of [ 33.506883] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.506951] [ 33.506974] The buggy address belongs to the physical page: [ 33.507009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.507070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.507121] page_type: f5(slab) [ 33.507176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.507230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.507284] page dumped because: kasan: bad access detected [ 33.507327] [ 33.507357] Memory state around the buggy address: [ 33.507412] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.507459] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.507514] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.507556] ^ [ 33.507592] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.507638] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.507695] ================================================================== [ 33.489915] ================================================================== [ 33.489966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.490037] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.490091] [ 33.490123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.490323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.490523] Hardware name: linux,dummy-virt (DT) [ 33.490631] Call trace: [ 33.490717] show_stack+0x20/0x38 (C) [ 33.490769] dump_stack_lvl+0x8c/0xd0 [ 33.490820] print_report+0x118/0x5d0 [ 33.490994] kasan_report+0xdc/0x128 [ 33.491174] __asan_report_load8_noabort+0x20/0x30 [ 33.491273] kasan_atomics_helper+0x3f04/0x4858 [ 33.491377] kasan_atomics+0x198/0x2e0 [ 33.491453] kunit_try_run_case+0x170/0x3f0 [ 33.491574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.491669] kthread+0x328/0x630 [ 33.491783] ret_from_fork+0x10/0x20 [ 33.491836] [ 33.491856] Allocated by task 296: [ 33.491901] kasan_save_stack+0x3c/0x68 [ 33.492021] kasan_save_track+0x20/0x40 [ 33.492116] kasan_save_alloc_info+0x40/0x58 [ 33.492276] __kasan_kmalloc+0xd4/0xd8 [ 33.492317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.492378] kasan_atomics+0xb8/0x2e0 [ 33.492418] kunit_try_run_case+0x170/0x3f0 [ 33.492628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.492695] kthread+0x328/0x630 [ 33.492815] ret_from_fork+0x10/0x20 [ 33.492922] [ 33.493000] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.493000] which belongs to the cache kmalloc-64 of size 64 [ 33.493284] The buggy address is located 0 bytes to the right of [ 33.493284] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.493410] [ 33.493462] The buggy address belongs to the physical page: [ 33.493496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.493585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.493678] page_type: f5(slab) [ 33.493717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.493768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.493814] page dumped because: kasan: bad access detected [ 33.493847] [ 33.493867] Memory state around the buggy address: [ 33.494135] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.494249] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.494303] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.494380] ^ [ 33.494437] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.494593] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.494738] ================================================================== [ 33.350590] ================================================================== [ 33.350645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.350698] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.350780] [ 33.350818] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.350906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.350970] Hardware name: linux,dummy-virt (DT) [ 33.351019] Call trace: [ 33.351044] show_stack+0x20/0x38 (C) [ 33.351111] dump_stack_lvl+0x8c/0xd0 [ 33.351172] print_report+0x118/0x5d0 [ 33.351217] kasan_report+0xdc/0x128 [ 33.351270] kasan_check_range+0x100/0x1a8 [ 33.351319] __kasan_check_write+0x20/0x30 [ 33.351365] kasan_atomics_helper+0x99c/0x4858 [ 33.351416] kasan_atomics+0x198/0x2e0 [ 33.351462] kunit_try_run_case+0x170/0x3f0 [ 33.351665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.351759] kthread+0x328/0x630 [ 33.351868] ret_from_fork+0x10/0x20 [ 33.352029] [ 33.352139] Allocated by task 296: [ 33.352226] kasan_save_stack+0x3c/0x68 [ 33.352320] kasan_save_track+0x20/0x40 [ 33.352447] kasan_save_alloc_info+0x40/0x58 [ 33.352603] __kasan_kmalloc+0xd4/0xd8 [ 33.352667] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.352711] kasan_atomics+0xb8/0x2e0 [ 33.352773] kunit_try_run_case+0x170/0x3f0 [ 33.352814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.353009] kthread+0x328/0x630 [ 33.353212] ret_from_fork+0x10/0x20 [ 33.353309] [ 33.353332] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.353332] which belongs to the cache kmalloc-64 of size 64 [ 33.353427] The buggy address is located 0 bytes to the right of [ 33.353427] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.353591] [ 33.353661] The buggy address belongs to the physical page: [ 33.353723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.353846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.354030] page_type: f5(slab) [ 33.354171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.354235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.354316] page dumped because: kasan: bad access detected [ 33.354350] [ 33.354377] Memory state around the buggy address: [ 33.354480] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.355239] ================================================================== [ 33.495313] ================================================================== [ 33.495366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.495433] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.495494] [ 33.495538] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.495789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.495845] Hardware name: linux,dummy-virt (DT) [ 33.495880] Call trace: [ 33.495903] show_stack+0x20/0x38 (C) [ 33.496063] dump_stack_lvl+0x8c/0xd0 [ 33.496117] print_report+0x118/0x5d0 [ 33.496232] kasan_report+0xdc/0x128 [ 33.496559] kasan_check_range+0x100/0x1a8 [ 33.496680] __kasan_check_write+0x20/0x30 [ 33.496786] kasan_atomics_helper+0x1414/0x4858 [ 33.496867] kasan_atomics+0x198/0x2e0 [ 33.497009] kunit_try_run_case+0x170/0x3f0 [ 33.497123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.497201] kthread+0x328/0x630 [ 33.497253] ret_from_fork+0x10/0x20 [ 33.497303] [ 33.497324] Allocated by task 296: [ 33.497379] kasan_save_stack+0x3c/0x68 [ 33.497420] kasan_save_track+0x20/0x40 [ 33.497459] kasan_save_alloc_info+0x40/0x58 [ 33.497500] __kasan_kmalloc+0xd4/0xd8 [ 33.497552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.497596] kasan_atomics+0xb8/0x2e0 [ 33.497636] kunit_try_run_case+0x170/0x3f0 [ 33.497677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.497722] kthread+0x328/0x630 [ 33.497847] ret_from_fork+0x10/0x20 [ 33.498119] [ 33.498196] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.498196] which belongs to the cache kmalloc-64 of size 64 [ 33.498376] The buggy address is located 0 bytes to the right of [ 33.498376] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.498686] [ 33.498772] The buggy address belongs to the physical page: [ 33.498816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.498870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.498920] page_type: f5(slab) [ 33.498987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.499245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.499310] page dumped because: kasan: bad access detected [ 33.499378] [ 33.499428] Memory state around the buggy address: [ 33.499474] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.499724] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.499784] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.499826] ^ [ 33.500016] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.500104] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.500231] ================================================================== [ 33.531523] ================================================================== [ 33.531571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.531620] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.531736] [ 33.531831] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.531980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.532054] Hardware name: linux,dummy-virt (DT) [ 33.532141] Call trace: [ 33.532209] show_stack+0x20/0x38 (C) [ 33.532257] dump_stack_lvl+0x8c/0xd0 [ 33.532306] print_report+0x118/0x5d0 [ 33.532351] kasan_report+0xdc/0x128 [ 33.532667] __asan_report_load8_noabort+0x20/0x30 [ 33.532812] kasan_atomics_helper+0x3e10/0x4858 [ 33.532930] kasan_atomics+0x198/0x2e0 [ 33.532999] kunit_try_run_case+0x170/0x3f0 [ 33.533049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.533289] kthread+0x328/0x630 [ 33.533384] ret_from_fork+0x10/0x20 [ 33.533434] [ 33.533455] Allocated by task 296: [ 33.533527] kasan_save_stack+0x3c/0x68 [ 33.533569] kasan_save_track+0x20/0x40 [ 33.533608] kasan_save_alloc_info+0x40/0x58 [ 33.533649] __kasan_kmalloc+0xd4/0xd8 [ 33.533806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.533963] kasan_atomics+0xb8/0x2e0 [ 33.534028] kunit_try_run_case+0x170/0x3f0 [ 33.534319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.534440] kthread+0x328/0x630 [ 33.534545] ret_from_fork+0x10/0x20 [ 33.534624] [ 33.534664] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.534664] which belongs to the cache kmalloc-64 of size 64 [ 33.534726] The buggy address is located 0 bytes to the right of [ 33.534726] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.534991] [ 33.535015] The buggy address belongs to the physical page: [ 33.535066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.535156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.535288] page_type: f5(slab) [ 33.535354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.535407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.535451] page dumped because: kasan: bad access detected [ 33.535589] [ 33.535650] Memory state around the buggy address: [ 33.535801] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.535897] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.536005] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.536074] ^ [ 33.536133] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.536356] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.536409] ================================================================== [ 33.501226] ================================================================== [ 33.501284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.501334] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.501386] [ 33.501418] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.501518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.501548] Hardware name: linux,dummy-virt (DT) [ 33.501580] Call trace: [ 33.501605] show_stack+0x20/0x38 (C) [ 33.501652] dump_stack_lvl+0x8c/0xd0 [ 33.501702] print_report+0x118/0x5d0 [ 33.501746] kasan_report+0xdc/0x128 [ 33.501790] kasan_check_range+0x100/0x1a8 [ 33.501838] __kasan_check_write+0x20/0x30 [ 33.501886] kasan_atomics_helper+0x147c/0x4858 [ 33.501938] kasan_atomics+0x198/0x2e0 [ 33.501987] kunit_try_run_case+0x170/0x3f0 [ 33.502035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.502090] kthread+0x328/0x630 [ 33.502133] ret_from_fork+0x10/0x20 [ 33.502180] [ 33.502202] Allocated by task 296: [ 33.502232] kasan_save_stack+0x3c/0x68 [ 33.502271] kasan_save_track+0x20/0x40 [ 33.502309] kasan_save_alloc_info+0x40/0x58 [ 33.502350] __kasan_kmalloc+0xd4/0xd8 [ 33.502395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.502438] kasan_atomics+0xb8/0x2e0 [ 33.502477] kunit_try_run_case+0x170/0x3f0 [ 33.502529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.502575] kthread+0x328/0x630 [ 33.502610] ret_from_fork+0x10/0x20 [ 33.502648] [ 33.502669] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.502669] which belongs to the cache kmalloc-64 of size 64 [ 33.502730] The buggy address is located 0 bytes to the right of [ 33.502730] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.502797] [ 33.502820] The buggy address belongs to the physical page: [ 33.502854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.502904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.502954] page_type: f5(slab) [ 33.502991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.503045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.503088] page dumped because: kasan: bad access detected [ 33.503122] [ 33.503142] Memory state around the buggy address: [ 33.503176] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.503221] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.503266] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.503307] ^ [ 33.503342] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.503387] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.503428] ================================================================== [ 33.401627] ================================================================== [ 33.401678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.401884] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.401958] [ 33.402008] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.402154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.402212] Hardware name: linux,dummy-virt (DT) [ 33.402246] Call trace: [ 33.402298] show_stack+0x20/0x38 (C) [ 33.402372] dump_stack_lvl+0x8c/0xd0 [ 33.402422] print_report+0x118/0x5d0 [ 33.402469] kasan_report+0xdc/0x128 [ 33.402552] kasan_check_range+0x100/0x1a8 [ 33.402778] __kasan_check_write+0x20/0x30 [ 33.402851] kasan_atomics_helper+0xd3c/0x4858 [ 33.402910] kasan_atomics+0x198/0x2e0 [ 33.402960] kunit_try_run_case+0x170/0x3f0 [ 33.403009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.403064] kthread+0x328/0x630 [ 33.403105] ret_from_fork+0x10/0x20 [ 33.403155] [ 33.403175] Allocated by task 296: [ 33.403205] kasan_save_stack+0x3c/0x68 [ 33.403246] kasan_save_track+0x20/0x40 [ 33.403286] kasan_save_alloc_info+0x40/0x58 [ 33.403328] __kasan_kmalloc+0xd4/0xd8 [ 33.403368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.403422] kasan_atomics+0xb8/0x2e0 [ 33.403462] kunit_try_run_case+0x170/0x3f0 [ 33.403522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.403570] kthread+0x328/0x630 [ 33.403605] ret_from_fork+0x10/0x20 [ 33.403644] [ 33.403665] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.403665] which belongs to the cache kmalloc-64 of size 64 [ 33.403910] The buggy address is located 0 bytes to the right of [ 33.403910] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.404161] [ 33.404196] The buggy address belongs to the physical page: [ 33.404229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.404403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.406008] page_type: f5(slab) [ 33.406063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.406117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.406161] page dumped because: kasan: bad access detected [ 33.406197] [ 33.406217] Memory state around the buggy address: [ 33.406253] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.406300] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.406346] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.406393] ^ [ 33.406429] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.406474] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.406527] ================================================================== [ 33.406935] ================================================================== [ 33.406985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.407037] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.407091] [ 33.407122] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.407208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.407237] Hardware name: linux,dummy-virt (DT) [ 33.407272] Call trace: [ 33.407295] show_stack+0x20/0x38 (C) [ 33.407345] dump_stack_lvl+0x8c/0xd0 [ 33.407395] print_report+0x118/0x5d0 [ 33.407441] kasan_report+0xdc/0x128 [ 33.407487] __asan_report_load4_noabort+0x20/0x30 [ 33.407556] kasan_atomics_helper+0x3e04/0x4858 [ 33.407608] kasan_atomics+0x198/0x2e0 [ 33.407658] kunit_try_run_case+0x170/0x3f0 [ 33.407708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.407763] kthread+0x328/0x630 [ 33.407807] ret_from_fork+0x10/0x20 [ 33.407855] [ 33.407893] Allocated by task 296: [ 33.407925] kasan_save_stack+0x3c/0x68 [ 33.407965] kasan_save_track+0x20/0x40 [ 33.408014] kasan_save_alloc_info+0x40/0x58 [ 33.408062] __kasan_kmalloc+0xd4/0xd8 [ 33.408103] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.408149] kasan_atomics+0xb8/0x2e0 [ 33.408188] kunit_try_run_case+0x170/0x3f0 [ 33.408228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.408280] kthread+0x328/0x630 [ 33.408320] ret_from_fork+0x10/0x20 [ 33.408359] [ 33.408380] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.408380] which belongs to the cache kmalloc-64 of size 64 [ 33.408441] The buggy address is located 0 bytes to the right of [ 33.408441] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.408526] [ 33.408553] The buggy address belongs to the physical page: [ 33.408595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.408701] page_type: f5(slab) [ 33.408741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.408802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.408846] page dumped because: kasan: bad access detected [ 33.408880] [ 33.408908] Memory state around the buggy address: [ 33.408951] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.408997] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.409043] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.409083] ^ [ 33.409118] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.409164] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.409205] ================================================================== [ 33.364777] ================================================================== [ 33.364879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.364931] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.364983] [ 33.365012] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.365101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.365277] Hardware name: linux,dummy-virt (DT) [ 33.365529] kasan_report+0xdc/0x128 [ 33.365933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.366585] __kasan_kmalloc+0xd4/0xd8 [ 33.366966] The buggy address is located 0 bytes to the right of [ 33.366966] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.367033] [ 33.367069] The buggy address belongs to the physical page: [ 33.367103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.367157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.367209] page_type: f5(slab) [ 33.367248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.367311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.367369] page dumped because: kasan: bad access detected [ 33.367402] [ 33.367424] Memory state around the buggy address: [ 33.367468] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.367525] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.367576] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.367617] ^ [ 33.367652] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.367697] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.367740] ================================================================== [ 33.421087] ================================================================== [ 33.421170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.421221] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.421311] [ 33.421370] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.421487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.421529] Hardware name: linux,dummy-virt (DT) [ 33.421561] Call trace: [ 33.421586] show_stack+0x20/0x38 (C) [ 33.421675] dump_stack_lvl+0x8c/0xd0 [ 33.421724] print_report+0x118/0x5d0 [ 33.421771] kasan_report+0xdc/0x128 [ 33.421816] kasan_check_range+0x100/0x1a8 [ 33.421864] __kasan_check_write+0x20/0x30 [ 33.422018] kasan_atomics_helper+0xe44/0x4858 [ 33.422150] kasan_atomics+0x198/0x2e0 [ 33.422203] kunit_try_run_case+0x170/0x3f0 [ 33.422269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.422337] kthread+0x328/0x630 [ 33.422411] ret_from_fork+0x10/0x20 [ 33.422691] [ 33.422753] Allocated by task 296: [ 33.422787] kasan_save_stack+0x3c/0x68 [ 33.422832] kasan_save_track+0x20/0x40 [ 33.422891] kasan_save_alloc_info+0x40/0x58 [ 33.423012] __kasan_kmalloc+0xd4/0xd8 [ 33.423055] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.423098] kasan_atomics+0xb8/0x2e0 [ 33.423151] kunit_try_run_case+0x170/0x3f0 [ 33.423192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.423238] kthread+0x328/0x630 [ 33.423445] ret_from_fork+0x10/0x20 [ 33.423498] [ 33.423607] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.423607] which belongs to the cache kmalloc-64 of size 64 [ 33.423727] The buggy address is located 0 bytes to the right of [ 33.423727] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.423943] [ 33.424071] The buggy address belongs to the physical page: [ 33.424106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.424201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.424324] page_type: f5(slab) [ 33.424383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.424437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.424481] page dumped because: kasan: bad access detected [ 33.424699] [ 33.424842] Memory state around the buggy address: [ 33.424946] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.425012] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.425103] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.425402] ^ [ 33.425481] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.425663] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425759] ================================================================== [ 33.551760] ================================================================== [ 33.551844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.551949] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.552049] [ 33.552436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.552600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.552659] Hardware name: linux,dummy-virt (DT) [ 33.552816] Call trace: [ 33.552904] show_stack+0x20/0x38 (C) [ 33.553083] dump_stack_lvl+0x8c/0xd0 [ 33.553189] print_report+0x118/0x5d0 [ 33.553344] kasan_report+0xdc/0x128 [ 33.553442] kasan_check_range+0x100/0x1a8 [ 33.553488] __kasan_check_write+0x20/0x30 [ 33.553559] kasan_atomics_helper+0x17ec/0x4858 [ 33.553609] kasan_atomics+0x198/0x2e0 [ 33.553656] kunit_try_run_case+0x170/0x3f0 [ 33.553704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.554112] kthread+0x328/0x630 [ 33.554220] ret_from_fork+0x10/0x20 [ 33.554297] [ 33.554382] Allocated by task 296: [ 33.554554] kasan_save_stack+0x3c/0x68 [ 33.554639] kasan_save_track+0x20/0x40 [ 33.554974] kasan_save_alloc_info+0x40/0x58 [ 33.555058] __kasan_kmalloc+0xd4/0xd8 [ 33.555188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.555256] kasan_atomics+0xb8/0x2e0 [ 33.555328] kunit_try_run_case+0x170/0x3f0 [ 33.555368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.555415] kthread+0x328/0x630 [ 33.555595] ret_from_fork+0x10/0x20 [ 33.555751] [ 33.555879] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.555879] which belongs to the cache kmalloc-64 of size 64 [ 33.556021] The buggy address is located 0 bytes to the right of [ 33.556021] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.556170] [ 33.556385] The buggy address belongs to the physical page: [ 33.556478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.556685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.556803] page_type: f5(slab) [ 33.556865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.556919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.557109] page dumped because: kasan: bad access detected [ 33.557145] [ 33.557166] Memory state around the buggy address: [ 33.557201] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.557404] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.557559] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.557629] ^ [ 33.557666] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.557748] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.557854] ================================================================== [ 33.512665] ================================================================== [ 33.512754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.512810] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.512863] [ 33.512923] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.513035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.513073] Hardware name: linux,dummy-virt (DT) [ 33.513122] Call trace: [ 33.513148] show_stack+0x20/0x38 (C) [ 33.513196] dump_stack_lvl+0x8c/0xd0 [ 33.513245] print_report+0x118/0x5d0 [ 33.513289] kasan_report+0xdc/0x128 [ 33.513333] kasan_check_range+0x100/0x1a8 [ 33.513381] __kasan_check_write+0x20/0x30 [ 33.513429] kasan_atomics_helper+0x15b4/0x4858 [ 33.513651] kasan_atomics+0x198/0x2e0 [ 33.513738] kunit_try_run_case+0x170/0x3f0 [ 33.513791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.513863] kthread+0x328/0x630 [ 33.513935] ret_from_fork+0x10/0x20 [ 33.514067] [ 33.514220] Allocated by task 296: [ 33.514277] kasan_save_stack+0x3c/0x68 [ 33.514320] kasan_save_track+0x20/0x40 [ 33.514382] kasan_save_alloc_info+0x40/0x58 [ 33.514425] __kasan_kmalloc+0xd4/0xd8 [ 33.514467] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.514522] kasan_atomics+0xb8/0x2e0 [ 33.514563] kunit_try_run_case+0x170/0x3f0 [ 33.514604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.514755] kthread+0x328/0x630 [ 33.514802] ret_from_fork+0x10/0x20 [ 33.514840] [ 33.514880] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.514880] which belongs to the cache kmalloc-64 of size 64 [ 33.514974] The buggy address is located 0 bytes to the right of [ 33.514974] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.515044] [ 33.515072] The buggy address belongs to the physical page: [ 33.515106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.515158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.515305] page_type: f5(slab) [ 33.515350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.515404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.515448] page dumped because: kasan: bad access detected [ 33.515494] [ 33.515527] Memory state around the buggy address: [ 33.515562] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.515607] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.515662] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.515704] ^ [ 33.515741] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.515814] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.515857] ================================================================== [ 33.457597] ================================================================== [ 33.457651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.457701] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.457753] [ 33.457821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.457922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.457951] Hardware name: linux,dummy-virt (DT) [ 33.457983] Call trace: [ 33.458014] show_stack+0x20/0x38 (C) [ 33.458181] dump_stack_lvl+0x8c/0xd0 [ 33.458234] print_report+0x118/0x5d0 [ 33.458344] kasan_report+0xdc/0x128 [ 33.458455] kasan_check_range+0x100/0x1a8 [ 33.458545] __kasan_check_write+0x20/0x30 [ 33.458632] kasan_atomics_helper+0x10c0/0x4858 [ 33.458686] kasan_atomics+0x198/0x2e0 [ 33.458752] kunit_try_run_case+0x170/0x3f0 [ 33.458827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.458981] kthread+0x328/0x630 [ 33.459027] ret_from_fork+0x10/0x20 [ 33.459074] [ 33.459200] Allocated by task 296: [ 33.459286] kasan_save_stack+0x3c/0x68 [ 33.459361] kasan_save_track+0x20/0x40 [ 33.459419] kasan_save_alloc_info+0x40/0x58 [ 33.459477] __kasan_kmalloc+0xd4/0xd8 [ 33.459527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.459570] kasan_atomics+0xb8/0x2e0 [ 33.459675] kunit_try_run_case+0x170/0x3f0 [ 33.459804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.459947] kthread+0x328/0x630 [ 33.460001] ret_from_fork+0x10/0x20 [ 33.460136] [ 33.460186] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.460186] which belongs to the cache kmalloc-64 of size 64 [ 33.460318] The buggy address is located 0 bytes to the right of [ 33.460318] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.460434] [ 33.460535] The buggy address belongs to the physical page: [ 33.460619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.460713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.460799] page_type: f5(slab) [ 33.460900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.460953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.461022] page dumped because: kasan: bad access detected [ 33.461057] [ 33.461077] Memory state around the buggy address: [ 33.461111] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.461157] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.461202] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.461477] ^ [ 33.461525] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.461608] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.461736] ================================================================== [ 33.453395] ================================================================== [ 33.453446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.453496] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.453562] [ 33.453592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.453679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.453708] Hardware name: linux,dummy-virt (DT) [ 33.453782] Call trace: [ 33.453936] show_stack+0x20/0x38 (C) [ 33.454011] dump_stack_lvl+0x8c/0xd0 [ 33.454064] print_report+0x118/0x5d0 [ 33.454116] kasan_report+0xdc/0x128 [ 33.454161] kasan_check_range+0x100/0x1a8 [ 33.454225] __kasan_check_write+0x20/0x30 [ 33.454274] kasan_atomics_helper+0x1058/0x4858 [ 33.454326] kasan_atomics+0x198/0x2e0 [ 33.454543] kunit_try_run_case+0x170/0x3f0 [ 33.454609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.454687] kthread+0x328/0x630 [ 33.454732] ret_from_fork+0x10/0x20 [ 33.454807] [ 33.454866] Allocated by task 296: [ 33.454923] kasan_save_stack+0x3c/0x68 [ 33.454965] kasan_save_track+0x20/0x40 [ 33.455004] kasan_save_alloc_info+0x40/0x58 [ 33.455063] __kasan_kmalloc+0xd4/0xd8 [ 33.455119] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.455165] kasan_atomics+0xb8/0x2e0 [ 33.455223] kunit_try_run_case+0x170/0x3f0 [ 33.455270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.455317] kthread+0x328/0x630 [ 33.455352] ret_from_fork+0x10/0x20 [ 33.455389] [ 33.455411] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.455411] which belongs to the cache kmalloc-64 of size 64 [ 33.455495] The buggy address is located 0 bytes to the right of [ 33.455495] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.455690] [ 33.455739] The buggy address belongs to the physical page: [ 33.455855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.456038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.456149] page_type: f5(slab) [ 33.456292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.456486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.456584] page dumped because: kasan: bad access detected [ 33.456668] [ 33.456762] Memory state around the buggy address: [ 33.456839] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.456888] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.456964] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.457006] ^ [ 33.457066] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.457114] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.457155] ================================================================== [ 33.341828] ================================================================== [ 33.341899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.341952] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.342005] [ 33.342035] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.342883] kasan_save_stack+0x3c/0x68 [ 33.343530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.345440] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.346744] kasan_save_track+0x20/0x40 [ 33.346811] kasan_save_alloc_info+0x40/0x58 [ 33.346858] __kasan_kmalloc+0xd4/0xd8 [ 33.346945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.346989] kasan_atomics+0xb8/0x2e0 [ 33.347045] kunit_try_run_case+0x170/0x3f0 [ 33.347141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.347186] kthread+0x328/0x630 [ 33.347220] ret_from_fork+0x10/0x20 [ 33.347336] [ 33.347384] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.347384] which belongs to the cache kmalloc-64 of size 64 [ 33.347447] The buggy address is located 0 bytes to the right of [ 33.347447] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.347758] [ 33.347798] The buggy address belongs to the physical page: [ 33.347889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.347978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.348167] page_type: f5(slab) [ 33.348244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.348441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.348487] page dumped because: kasan: bad access detected [ 33.348561] [ 33.348582] Memory state around the buggy address: [ 33.348861] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.348990] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.349057] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.349355] ^ [ 33.349440] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.349566] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.349676] ================================================================== [ 33.397061] ================================================================== [ 33.397314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.397386] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.397455] [ 33.397542] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.397707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.397814] Hardware name: linux,dummy-virt (DT) [ 33.397854] Call trace: [ 33.397877] show_stack+0x20/0x38 (C) [ 33.397931] dump_stack_lvl+0x8c/0xd0 [ 33.398007] print_report+0x118/0x5d0 [ 33.398092] kasan_report+0xdc/0x128 [ 33.398157] __asan_report_load4_noabort+0x20/0x30 [ 33.398236] kasan_atomics_helper+0x3dd8/0x4858 [ 33.398289] kasan_atomics+0x198/0x2e0 [ 33.398376] kunit_try_run_case+0x170/0x3f0 [ 33.398433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.398517] kthread+0x328/0x630 [ 33.398589] ret_from_fork+0x10/0x20 [ 33.398639] [ 33.398659] Allocated by task 296: [ 33.398690] kasan_save_stack+0x3c/0x68 [ 33.398731] kasan_save_track+0x20/0x40 [ 33.398798] kasan_save_alloc_info+0x40/0x58 [ 33.398938] __kasan_kmalloc+0xd4/0xd8 [ 33.398983] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.399110] kasan_atomics+0xb8/0x2e0 [ 33.399206] kunit_try_run_case+0x170/0x3f0 [ 33.399254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.399349] kthread+0x328/0x630 [ 33.399422] ret_from_fork+0x10/0x20 [ 33.399628] [ 33.399659] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.399659] which belongs to the cache kmalloc-64 of size 64 [ 33.399723] The buggy address is located 0 bytes to the right of [ 33.399723] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.399804] [ 33.399845] The buggy address belongs to the physical page: [ 33.399879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.399960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.400013] page_type: f5(slab) [ 33.400051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.400105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.400148] page dumped because: kasan: bad access detected [ 33.400305] [ 33.400405] Memory state around the buggy address: [ 33.400522] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.400588] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.400653] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.400840] ^ [ 33.400892] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.400941] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.401162] ================================================================== [ 33.426719] ================================================================== [ 33.426771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.426937] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.427002] [ 33.427061] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.427197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.427426] Hardware name: linux,dummy-virt (DT) [ 33.427484] Call trace: [ 33.427575] show_stack+0x20/0x38 (C) [ 33.427628] dump_stack_lvl+0x8c/0xd0 [ 33.427695] print_report+0x118/0x5d0 [ 33.427792] kasan_report+0xdc/0x128 [ 33.427887] __asan_report_store8_noabort+0x20/0x30 [ 33.428040] kasan_atomics_helper+0x3e5c/0x4858 [ 33.428137] kasan_atomics+0x198/0x2e0 [ 33.428187] kunit_try_run_case+0x170/0x3f0 [ 33.428270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.428325] kthread+0x328/0x630 [ 33.428592] ret_from_fork+0x10/0x20 [ 33.428648] [ 33.428671] Allocated by task 296: [ 33.428701] kasan_save_stack+0x3c/0x68 [ 33.428741] kasan_save_track+0x20/0x40 [ 33.428780] kasan_save_alloc_info+0x40/0x58 [ 33.428821] __kasan_kmalloc+0xd4/0xd8 [ 33.428946] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.429032] kasan_atomics+0xb8/0x2e0 [ 33.429140] kunit_try_run_case+0x170/0x3f0 [ 33.429248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.429460] kthread+0x328/0x630 [ 33.429600] ret_from_fork+0x10/0x20 [ 33.429647] [ 33.429688] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.429688] which belongs to the cache kmalloc-64 of size 64 [ 33.429774] The buggy address is located 0 bytes to the right of [ 33.429774] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.429843] [ 33.429864] The buggy address belongs to the physical page: [ 33.429897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.429949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.430000] page_type: f5(slab) [ 33.430102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.430291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.430349] page dumped because: kasan: bad access detected [ 33.430417] [ 33.430488] Memory state around the buggy address: [ 33.430540] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.430587] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.430833] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.430923] ^ [ 33.431075] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.431172] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.431214] ================================================================== [ 33.416421] ================================================================== [ 33.416619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.416685] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.416762] [ 33.416810] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.416898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.416927] Hardware name: linux,dummy-virt (DT) [ 33.416961] Call trace: [ 33.416984] show_stack+0x20/0x38 (C) [ 33.417216] dump_stack_lvl+0x8c/0xd0 [ 33.417321] print_report+0x118/0x5d0 [ 33.417370] kasan_report+0xdc/0x128 [ 33.417416] __asan_report_load8_noabort+0x20/0x30 [ 33.417470] kasan_atomics_helper+0x3f58/0x4858 [ 33.417566] kasan_atomics+0x198/0x2e0 [ 33.417643] kunit_try_run_case+0x170/0x3f0 [ 33.417710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.417767] kthread+0x328/0x630 [ 33.417812] ret_from_fork+0x10/0x20 [ 33.417878] [ 33.417907] Allocated by task 296: [ 33.417939] kasan_save_stack+0x3c/0x68 [ 33.417980] kasan_save_track+0x20/0x40 [ 33.418018] kasan_save_alloc_info+0x40/0x58 [ 33.418059] __kasan_kmalloc+0xd4/0xd8 [ 33.418108] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.418152] kasan_atomics+0xb8/0x2e0 [ 33.418192] kunit_try_run_case+0x170/0x3f0 [ 33.418441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.418545] kthread+0x328/0x630 [ 33.418644] ret_from_fork+0x10/0x20 [ 33.418720] [ 33.418749] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.418749] which belongs to the cache kmalloc-64 of size 64 [ 33.418919] The buggy address is located 0 bytes to the right of [ 33.418919] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.418989] [ 33.419010] The buggy address belongs to the physical page: [ 33.419122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.419184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.419304] page_type: f5(slab) [ 33.419369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.419424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.419467] page dumped because: kasan: bad access detected [ 33.419691] [ 33.419721] Memory state around the buggy address: [ 33.419759] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.419997] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.420094] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.420154] ^ [ 33.420190] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.420454] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.420598] ================================================================== [ 33.516742] ================================================================== [ 33.516924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.516983] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.517036] [ 33.517073] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.517159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.517189] Hardware name: linux,dummy-virt (DT) [ 33.517221] Call trace: [ 33.517245] show_stack+0x20/0x38 (C) [ 33.517321] dump_stack_lvl+0x8c/0xd0 [ 33.517395] print_report+0x118/0x5d0 [ 33.517441] kasan_report+0xdc/0x128 [ 33.517485] __asan_report_load8_noabort+0x20/0x30 [ 33.517550] kasan_atomics_helper+0x3db0/0x4858 [ 33.517602] kasan_atomics+0x198/0x2e0 [ 33.517760] kunit_try_run_case+0x170/0x3f0 [ 33.517826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518099] kthread+0x328/0x630 [ 33.518190] ret_from_fork+0x10/0x20 [ 33.518242] [ 33.518262] Allocated by task 296: [ 33.518334] kasan_save_stack+0x3c/0x68 [ 33.518389] kasan_save_track+0x20/0x40 [ 33.518446] kasan_save_alloc_info+0x40/0x58 [ 33.518555] __kasan_kmalloc+0xd4/0xd8 [ 33.518614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.518659] kasan_atomics+0xb8/0x2e0 [ 33.518699] kunit_try_run_case+0x170/0x3f0 [ 33.518849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518936] kthread+0x328/0x630 [ 33.519042] ret_from_fork+0x10/0x20 [ 33.519086] [ 33.519126] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.519126] which belongs to the cache kmalloc-64 of size 64 [ 33.519222] The buggy address is located 0 bytes to the right of [ 33.519222] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.519292] [ 33.519320] The buggy address belongs to the physical page: [ 33.519354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.519571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.519629] page_type: f5(slab) [ 33.519668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.519722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.519778] page dumped because: kasan: bad access detected [ 33.519812] [ 33.519832] Memory state around the buggy address: [ 33.520248] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.520300] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.520347] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.520389] ^ [ 33.520426] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.520472] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.520531] ================================================================== [ 33.523633] ================================================================== [ 33.523673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.523718] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.523769] [ 33.523797] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.523882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.523910] Hardware name: linux,dummy-virt (DT) [ 33.523943] Call trace: [ 33.523965] show_stack+0x20/0x38 (C) [ 33.524013] dump_stack_lvl+0x8c/0xd0 [ 33.524060] print_report+0x118/0x5d0 [ 33.524125] kasan_report+0xdc/0x128 [ 33.524171] __asan_report_load8_noabort+0x20/0x30 [ 33.524221] kasan_atomics_helper+0x3df4/0x4858 [ 33.524284] kasan_atomics+0x198/0x2e0 [ 33.524341] kunit_try_run_case+0x170/0x3f0 [ 33.524390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.524446] kthread+0x328/0x630 [ 33.524489] ret_from_fork+0x10/0x20 [ 33.524550] [ 33.524569] Allocated by task 296: [ 33.524599] kasan_save_stack+0x3c/0x68 [ 33.524638] kasan_save_track+0x20/0x40 [ 33.524676] kasan_save_alloc_info+0x40/0x58 [ 33.524717] __kasan_kmalloc+0xd4/0xd8 [ 33.524757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.524800] kasan_atomics+0xb8/0x2e0 [ 33.524838] kunit_try_run_case+0x170/0x3f0 [ 33.524890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.524937] kthread+0x328/0x630 [ 33.524973] ret_from_fork+0x10/0x20 [ 33.525011] [ 33.525032] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.525032] which belongs to the cache kmalloc-64 of size 64 [ 33.525093] The buggy address is located 0 bytes to the right of [ 33.525093] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.525161] [ 33.525183] The buggy address belongs to the physical page: [ 33.525215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.525270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.525317] page_type: f5(slab) [ 33.525354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.525407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.525452] page dumped because: kasan: bad access detected [ 33.525485] [ 33.525516] Memory state around the buggy address: [ 33.525550] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.525596] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.525642] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.525683] ^ [ 33.525718] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.525764] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.525865] ================================================================== [ 33.467598] ================================================================== [ 33.467693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.467748] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.467832] [ 33.467868] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.467965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.467995] Hardware name: linux,dummy-virt (DT) [ 33.468027] Call trace: [ 33.468052] show_stack+0x20/0x38 (C) [ 33.468101] dump_stack_lvl+0x8c/0xd0 [ 33.468177] print_report+0x118/0x5d0 [ 33.468222] kasan_report+0xdc/0x128 [ 33.468268] kasan_check_range+0x100/0x1a8 [ 33.468315] __kasan_check_write+0x20/0x30 [ 33.468503] kasan_atomics_helper+0x1190/0x4858 [ 33.468629] kasan_atomics+0x198/0x2e0 [ 33.468808] kunit_try_run_case+0x170/0x3f0 [ 33.469012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.469170] kthread+0x328/0x630 [ 33.469251] ret_from_fork+0x10/0x20 [ 33.469312] [ 33.469340] Allocated by task 296: [ 33.469439] kasan_save_stack+0x3c/0x68 [ 33.469492] kasan_save_track+0x20/0x40 [ 33.469581] kasan_save_alloc_info+0x40/0x58 [ 33.469643] __kasan_kmalloc+0xd4/0xd8 [ 33.469683] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.469726] kasan_atomics+0xb8/0x2e0 [ 33.469766] kunit_try_run_case+0x170/0x3f0 [ 33.469806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.469973] kthread+0x328/0x630 [ 33.470066] ret_from_fork+0x10/0x20 [ 33.470209] [ 33.470268] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.470268] which belongs to the cache kmalloc-64 of size 64 [ 33.470564] The buggy address is located 0 bytes to the right of [ 33.470564] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.470730] [ 33.470763] The buggy address belongs to the physical page: [ 33.470844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.470959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.471071] page_type: f5(slab) [ 33.471125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.471177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.471222] page dumped because: kasan: bad access detected [ 33.471255] [ 33.471286] Memory state around the buggy address: [ 33.471329] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.471377] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.471431] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.471473] ^ [ 33.471528] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.471574] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.471616] ================================================================== [ 33.442417] ================================================================== [ 33.442490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.442591] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.442644] [ 33.442675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.442790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.443073] Hardware name: linux,dummy-virt (DT) [ 33.443116] Call trace: [ 33.443142] show_stack+0x20/0x38 (C) [ 33.443272] dump_stack_lvl+0x8c/0xd0 [ 33.443564] print_report+0x118/0x5d0 [ 33.443625] kasan_report+0xdc/0x128 [ 33.443673] kasan_check_range+0x100/0x1a8 [ 33.443747] __kasan_check_write+0x20/0x30 [ 33.444294] kasan_atomics_helper+0xf88/0x4858 [ 33.444386] kasan_atomics+0x198/0x2e0 [ 33.444537] kunit_try_run_case+0x170/0x3f0 [ 33.444661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.444809] kthread+0x328/0x630 [ 33.444921] ret_from_fork+0x10/0x20 [ 33.445008] [ 33.445029] Allocated by task 296: [ 33.445081] kasan_save_stack+0x3c/0x68 [ 33.445125] kasan_save_track+0x20/0x40 [ 33.445163] kasan_save_alloc_info+0x40/0x58 [ 33.445204] __kasan_kmalloc+0xd4/0xd8 [ 33.445245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.445290] kasan_atomics+0xb8/0x2e0 [ 33.445332] kunit_try_run_case+0x170/0x3f0 [ 33.445540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.445925] kthread+0x328/0x630 [ 33.446120] ret_from_fork+0x10/0x20 [ 33.446169] [ 33.446191] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.446191] which belongs to the cache kmalloc-64 of size 64 [ 33.446384] The buggy address is located 0 bytes to the right of [ 33.446384] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.446595] [ 33.446668] The buggy address belongs to the physical page: [ 33.446706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.446768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.446817] page_type: f5(slab) [ 33.446999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.447094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.447188] page dumped because: kasan: bad access detected [ 33.447252] [ 33.447275] Memory state around the buggy address: [ 33.447309] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.447534] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.447717] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.447818] ^ [ 33.447886] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.448170] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.448232] ================================================================== [ 33.537427] ================================================================== [ 33.537480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.537577] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.537631] [ 33.537733] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.537849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.537923] Hardware name: linux,dummy-virt (DT) [ 33.537974] Call trace: [ 33.537998] show_stack+0x20/0x38 (C) [ 33.538047] dump_stack_lvl+0x8c/0xd0 [ 33.538130] print_report+0x118/0x5d0 [ 33.538262] kasan_report+0xdc/0x128 [ 33.538463] kasan_check_range+0x100/0x1a8 [ 33.540730] __kasan_check_write+0x20/0x30 [ 33.541084] kasan_atomics_helper+0x175c/0x4858 [ 33.541151] kasan_atomics+0x198/0x2e0 [ 33.542786] kunit_try_run_case+0x170/0x3f0 [ 33.542851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.543305] kthread+0x328/0x630 [ 33.543385] ret_from_fork+0x10/0x20 [ 33.543447] [ 33.543471] Allocated by task 296: [ 33.543544] kasan_save_stack+0x3c/0x68 [ 33.543602] kasan_save_track+0x20/0x40 [ 33.543650] kasan_save_alloc_info+0x40/0x58 [ 33.543692] __kasan_kmalloc+0xd4/0xd8 [ 33.543743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.543792] kasan_atomics+0xb8/0x2e0 [ 33.543833] kunit_try_run_case+0x170/0x3f0 [ 33.543890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.543938] kthread+0x328/0x630 [ 33.543973] ret_from_fork+0x10/0x20 [ 33.544021] [ 33.544044] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.544044] which belongs to the cache kmalloc-64 of size 64 [ 33.544106] The buggy address is located 0 bytes to the right of [ 33.544106] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.544182] [ 33.544213] The buggy address belongs to the physical page: [ 33.544247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.544313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.544364] page_type: f5(slab) [ 33.544411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.544473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.544541] page dumped because: kasan: bad access detected [ 33.544576] [ 33.544597] Memory state around the buggy address: [ 33.544631] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.544676] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.544723] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.544764] ^ [ 33.544798] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.544844] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.544886] ================================================================== [ 33.476817] ================================================================== [ 33.476876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.476926] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.476979] [ 33.477019] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.477116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.477144] Hardware name: linux,dummy-virt (DT) [ 33.477190] Call trace: [ 33.477214] show_stack+0x20/0x38 (C) [ 33.477263] dump_stack_lvl+0x8c/0xd0 [ 33.477311] print_report+0x118/0x5d0 [ 33.477358] kasan_report+0xdc/0x128 [ 33.477410] kasan_check_range+0x100/0x1a8 [ 33.477465] __kasan_check_write+0x20/0x30 [ 33.477527] kasan_atomics_helper+0x126c/0x4858 [ 33.477579] kasan_atomics+0x198/0x2e0 [ 33.477628] kunit_try_run_case+0x170/0x3f0 [ 33.477681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.477737] kthread+0x328/0x630 [ 33.477781] ret_from_fork+0x10/0x20 [ 33.477830] [ 33.477850] Allocated by task 296: [ 33.477888] kasan_save_stack+0x3c/0x68 [ 33.477929] kasan_save_track+0x20/0x40 [ 33.477966] kasan_save_alloc_info+0x40/0x58 [ 33.478020] __kasan_kmalloc+0xd4/0xd8 [ 33.478060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.478109] kasan_atomics+0xb8/0x2e0 [ 33.478157] kunit_try_run_case+0x170/0x3f0 [ 33.478206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.478254] kthread+0x328/0x630 [ 33.478289] ret_from_fork+0x10/0x20 [ 33.478327] [ 33.478349] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.478349] which belongs to the cache kmalloc-64 of size 64 [ 33.478420] The buggy address is located 0 bytes to the right of [ 33.478420] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.478489] [ 33.478520] The buggy address belongs to the physical page: [ 33.478554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.478608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.478699] page_type: f5(slab) [ 33.478750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.478800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.478845] page dumped because: kasan: bad access detected [ 33.478877] [ 33.478897] Memory state around the buggy address: [ 33.478931] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.479356] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.479444] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.479490] ^ [ 33.479538] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.479794] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.479931] ================================================================== [ 33.431502] ================================================================== [ 33.431576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.431627] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.431679] [ 33.431736] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.431825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.431913] Hardware name: linux,dummy-virt (DT) [ 33.431951] Call trace: [ 33.431974] show_stack+0x20/0x38 (C) [ 33.432023] dump_stack_lvl+0x8c/0xd0 [ 33.432070] print_report+0x118/0x5d0 [ 33.432176] kasan_report+0xdc/0x128 [ 33.432226] kasan_check_range+0x100/0x1a8 [ 33.432276] __kasan_check_write+0x20/0x30 [ 33.432325] kasan_atomics_helper+0xeb8/0x4858 [ 33.432377] kasan_atomics+0x198/0x2e0 [ 33.432425] kunit_try_run_case+0x170/0x3f0 [ 33.432621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.432705] kthread+0x328/0x630 [ 33.432777] ret_from_fork+0x10/0x20 [ 33.432847] [ 33.432869] Allocated by task 296: [ 33.432898] kasan_save_stack+0x3c/0x68 [ 33.432940] kasan_save_track+0x20/0x40 [ 33.433115] kasan_save_alloc_info+0x40/0x58 [ 33.433269] __kasan_kmalloc+0xd4/0xd8 [ 33.433365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.433431] kasan_atomics+0xb8/0x2e0 [ 33.433472] kunit_try_run_case+0x170/0x3f0 [ 33.433525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.433572] kthread+0x328/0x630 [ 33.433614] ret_from_fork+0x10/0x20 [ 33.433674] [ 33.433703] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.433703] which belongs to the cache kmalloc-64 of size 64 [ 33.433789] The buggy address is located 0 bytes to the right of [ 33.433789] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.433871] [ 33.433897] The buggy address belongs to the physical page: [ 33.433952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.434003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.434054] page_type: f5(slab) [ 33.434092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.434155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.434206] page dumped because: kasan: bad access detected [ 33.434251] [ 33.434287] Memory state around the buggy address: [ 33.434337] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434395] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434448] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.434901] ^ [ 33.434954] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.435030] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.435119] ================================================================== [ 33.521284] ================================================================== [ 33.521333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.521383] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.521436] [ 33.521465] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.521566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.521594] Hardware name: linux,dummy-virt (DT) [ 33.521628] Call trace: [ 33.521651] show_stack+0x20/0x38 (C) [ 33.521699] dump_stack_lvl+0x8c/0xd0 [ 33.521746] print_report+0x118/0x5d0 [ 33.521793] kasan_report+0xdc/0x128 [ 33.521836] kasan_check_range+0x100/0x1a8 [ 33.521883] __kasan_check_write+0x20/0x30 [ 33.521931] kasan_atomics_helper+0x1644/0x4858 [ 33.521982] kasan_atomics+0x198/0x2e0 [ 33.522031] kunit_try_run_case+0x170/0x3f0 [ 33.522079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.522134] kthread+0x328/0x630 [ 33.522177] ret_from_fork+0x10/0x20 [ 33.522225] [ 33.522245] Allocated by task 296: [ 33.522274] kasan_save_stack+0x3c/0x68 [ 33.522314] kasan_save_track+0x20/0x40 [ 33.522350] kasan_save_alloc_info+0x40/0x58 [ 33.522397] __kasan_kmalloc+0xd4/0xd8 [ 33.522436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.522479] kasan_atomics+0xb8/0x2e0 [ 33.522530] kunit_try_run_case+0x170/0x3f0 [ 33.522583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.522630] kthread+0x328/0x630 [ 33.522665] ret_from_fork+0x10/0x20 [ 33.522703] [ 33.522725] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.522725] which belongs to the cache kmalloc-64 of size 64 [ 33.522785] The buggy address is located 0 bytes to the right of [ 33.522785] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.522874] [ 33.522897] The buggy address belongs to the physical page: [ 33.522931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.522985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.523043] page_type: f5(slab) [ 33.523080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.523130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.523175] page dumped because: kasan: bad access detected [ 33.523208] [ 33.523237] Memory state around the buggy address: [ 33.523280] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.523327] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.523382] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.523423] ^ [ 33.523467] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.523523] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.523564] ================================================================== [ 33.508549] ================================================================== [ 33.508604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.508655] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.508708] [ 33.508740] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.509009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.509076] Hardware name: linux,dummy-virt (DT) [ 33.509114] Call trace: [ 33.509141] show_stack+0x20/0x38 (C) [ 33.509196] dump_stack_lvl+0x8c/0xd0 [ 33.509246] print_report+0x118/0x5d0 [ 33.509290] kasan_report+0xdc/0x128 [ 33.509430] kasan_check_range+0x100/0x1a8 [ 33.509567] __kasan_check_write+0x20/0x30 [ 33.509625] kasan_atomics_helper+0x154c/0x4858 [ 33.509678] kasan_atomics+0x198/0x2e0 [ 33.509743] kunit_try_run_case+0x170/0x3f0 [ 33.509843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.509955] kthread+0x328/0x630 [ 33.510000] ret_from_fork+0x10/0x20 [ 33.510075] [ 33.510098] Allocated by task 296: [ 33.510129] kasan_save_stack+0x3c/0x68 [ 33.510195] kasan_save_track+0x20/0x40 [ 33.510261] kasan_save_alloc_info+0x40/0x58 [ 33.510304] __kasan_kmalloc+0xd4/0xd8 [ 33.510345] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.510396] kasan_atomics+0xb8/0x2e0 [ 33.510451] kunit_try_run_case+0x170/0x3f0 [ 33.510494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.510706] kthread+0x328/0x630 [ 33.510783] ret_from_fork+0x10/0x20 [ 33.510829] [ 33.510876] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.510876] which belongs to the cache kmalloc-64 of size 64 [ 33.510966] The buggy address is located 0 bytes to the right of [ 33.510966] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.511038] [ 33.511062] The buggy address belongs to the physical page: [ 33.511120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.511173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.511223] page_type: f5(slab) [ 33.511344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.511416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.511460] page dumped because: kasan: bad access detected [ 33.511495] [ 33.511533] Memory state around the buggy address: [ 33.511596] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511642] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511688] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.511838] ^ [ 33.511996] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.512090] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.512169] ================================================================== [ 33.360308] ================================================================== [ 33.360377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.360610] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.360673] [ 33.360705] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.360882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.361012] Hardware name: linux,dummy-virt (DT) [ 33.361068] Call trace: [ 33.361094] show_stack+0x20/0x38 (C) [ 33.361144] dump_stack_lvl+0x8c/0xd0 [ 33.361220] print_report+0x118/0x5d0 [ 33.361285] kasan_report+0xdc/0x128 [ 33.361694] kasan_check_range+0x100/0x1a8 [ 33.361792] __kasan_check_write+0x20/0x30 [ 33.361843] kasan_atomics_helper+0xa6c/0x4858 [ 33.361903] kasan_atomics+0x198/0x2e0 [ 33.361969] kunit_try_run_case+0x170/0x3f0 [ 33.362022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.362097] kthread+0x328/0x630 [ 33.362140] ret_from_fork+0x10/0x20 [ 33.362196] [ 33.362250] Allocated by task 296: [ 33.362374] kasan_save_stack+0x3c/0x68 [ 33.362420] kasan_save_track+0x20/0x40 [ 33.362459] kasan_save_alloc_info+0x40/0x58 [ 33.362500] __kasan_kmalloc+0xd4/0xd8 [ 33.362628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.362715] kasan_atomics+0xb8/0x2e0 [ 33.362761] kunit_try_run_case+0x170/0x3f0 [ 33.362829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.362875] kthread+0x328/0x630 [ 33.362910] ret_from_fork+0x10/0x20 [ 33.362971] [ 33.363005] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.363005] which belongs to the cache kmalloc-64 of size 64 [ 33.363068] The buggy address is located 0 bytes to the right of [ 33.363068] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.363201] [ 33.363223] The buggy address belongs to the physical page: [ 33.363257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.363345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.363396] page_type: f5(slab) [ 33.363435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.363497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.363712] page dumped because: kasan: bad access detected [ 33.363757] [ 33.363777] Memory state around the buggy address: [ 33.363896] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.363952] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.364048] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.364106] ^ [ 33.364143] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.364277] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.364376] ================================================================== [ 33.472675] ================================================================== [ 33.472755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.472808] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.472953] [ 33.473059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.473170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.473218] Hardware name: linux,dummy-virt (DT) [ 33.473252] Call trace: [ 33.473309] show_stack+0x20/0x38 (C) [ 33.473362] dump_stack_lvl+0x8c/0xd0 [ 33.473437] print_report+0x118/0x5d0 [ 33.473487] kasan_report+0xdc/0x128 [ 33.473632] kasan_check_range+0x100/0x1a8 [ 33.473780] __kasan_check_write+0x20/0x30 [ 33.473848] kasan_atomics_helper+0x11f8/0x4858 [ 33.473901] kasan_atomics+0x198/0x2e0 [ 33.473966] kunit_try_run_case+0x170/0x3f0 [ 33.474021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.474095] kthread+0x328/0x630 [ 33.474159] ret_from_fork+0x10/0x20 [ 33.474245] [ 33.474293] Allocated by task 296: [ 33.474325] kasan_save_stack+0x3c/0x68 [ 33.474400] kasan_save_track+0x20/0x40 [ 33.474457] kasan_save_alloc_info+0x40/0x58 [ 33.474500] __kasan_kmalloc+0xd4/0xd8 [ 33.474550] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.474593] kasan_atomics+0xb8/0x2e0 [ 33.474633] kunit_try_run_case+0x170/0x3f0 [ 33.474762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.474911] kthread+0x328/0x630 [ 33.474956] ret_from_fork+0x10/0x20 [ 33.475023] [ 33.475048] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.475048] which belongs to the cache kmalloc-64 of size 64 [ 33.475137] The buggy address is located 0 bytes to the right of [ 33.475137] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.475227] [ 33.475361] The buggy address belongs to the physical page: [ 33.475457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.475528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.475643] page_type: f5(slab) [ 33.475718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.475804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.475869] page dumped because: kasan: bad access detected [ 33.475902] [ 33.475922] Memory state around the buggy address: [ 33.475958] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.476004] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.476081] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.476123] ^ [ 33.476272] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.476364] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.476504] ================================================================== [ 33.483852] ================================================================== [ 33.483969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.484066] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.484223] [ 33.484406] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.484599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.484701] Hardware name: linux,dummy-virt (DT) [ 33.484807] Call trace: [ 33.484867] show_stack+0x20/0x38 (C) [ 33.484921] dump_stack_lvl+0x8c/0xd0 [ 33.484968] print_report+0x118/0x5d0 [ 33.485016] kasan_report+0xdc/0x128 [ 33.485059] kasan_check_range+0x100/0x1a8 [ 33.485148] __kasan_check_write+0x20/0x30 [ 33.485200] kasan_atomics_helper+0x1384/0x4858 [ 33.485413] kasan_atomics+0x198/0x2e0 [ 33.485504] kunit_try_run_case+0x170/0x3f0 [ 33.485605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.485700] kthread+0x328/0x630 [ 33.485795] ret_from_fork+0x10/0x20 [ 33.486056] [ 33.486078] Allocated by task 296: [ 33.486173] kasan_save_stack+0x3c/0x68 [ 33.486245] kasan_save_track+0x20/0x40 [ 33.486284] kasan_save_alloc_info+0x40/0x58 [ 33.486395] __kasan_kmalloc+0xd4/0xd8 [ 33.486448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.486536] kasan_atomics+0xb8/0x2e0 [ 33.486593] kunit_try_run_case+0x170/0x3f0 [ 33.486634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.486680] kthread+0x328/0x630 [ 33.486716] ret_from_fork+0x10/0x20 [ 33.486754] [ 33.486775] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.486775] which belongs to the cache kmalloc-64 of size 64 [ 33.486991] The buggy address is located 0 bytes to the right of [ 33.486991] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.487174] [ 33.487271] The buggy address belongs to the physical page: [ 33.487471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.487694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.487834] page_type: f5(slab) [ 33.487923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.487979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.488023] page dumped because: kasan: bad access detected [ 33.488190] [ 33.488211] Memory state around the buggy address: [ 33.488367] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.488554] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.488689] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.488741] ^ [ 33.488778] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.488943] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.488988] ================================================================== [ 33.409369] ================================================================== [ 33.409413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.409470] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.410090] [ 33.410191] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.410328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.410482] Hardware name: linux,dummy-virt (DT) [ 33.410567] Call trace: [ 33.410700] show_stack+0x20/0x38 (C) [ 33.410843] dump_stack_lvl+0x8c/0xd0 [ 33.410912] print_report+0x118/0x5d0 [ 33.410968] kasan_report+0xdc/0x128 [ 33.411014] kasan_check_range+0x100/0x1a8 [ 33.411062] __kasan_check_read+0x20/0x30 [ 33.411110] kasan_atomics_helper+0xdd4/0x4858 [ 33.411160] kasan_atomics+0x198/0x2e0 [ 33.411404] kunit_try_run_case+0x170/0x3f0 [ 33.411476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.411592] kthread+0x328/0x630 [ 33.411768] ret_from_fork+0x10/0x20 [ 33.412057] [ 33.412176] Allocated by task 296: [ 33.412265] kasan_save_stack+0x3c/0x68 [ 33.412382] kasan_save_track+0x20/0x40 [ 33.412479] kasan_save_alloc_info+0x40/0x58 [ 33.412553] __kasan_kmalloc+0xd4/0xd8 [ 33.412809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.412900] kasan_atomics+0xb8/0x2e0 [ 33.413040] kunit_try_run_case+0x170/0x3f0 [ 33.413154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.413313] kthread+0x328/0x630 [ 33.413428] ret_from_fork+0x10/0x20 [ 33.413693] [ 33.413786] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.413786] which belongs to the cache kmalloc-64 of size 64 [ 33.413936] The buggy address is located 0 bytes to the right of [ 33.413936] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.414025] [ 33.414048] The buggy address belongs to the physical page: [ 33.414081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.414334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.414485] page_type: f5(slab) [ 33.414612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.414710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.415014] page dumped because: kasan: bad access detected [ 33.415115] [ 33.415175] Memory state around the buggy address: [ 33.415288] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.415404] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.415554] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.415668] ^ [ 33.415750] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.415804] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.415880] ================================================================== [ 33.462269] ================================================================== [ 33.462320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.462421] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.462475] [ 33.462516] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.462633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.462711] Hardware name: linux,dummy-virt (DT) [ 33.462765] Call trace: [ 33.462835] show_stack+0x20/0x38 (C) [ 33.462911] dump_stack_lvl+0x8c/0xd0 [ 33.462962] print_report+0x118/0x5d0 [ 33.463008] kasan_report+0xdc/0x128 [ 33.463167] kasan_check_range+0x100/0x1a8 [ 33.463236] __kasan_check_write+0x20/0x30 [ 33.463305] kasan_atomics_helper+0x1128/0x4858 [ 33.463412] kasan_atomics+0x198/0x2e0 [ 33.463496] kunit_try_run_case+0x170/0x3f0 [ 33.463594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.463651] kthread+0x328/0x630 [ 33.463695] ret_from_fork+0x10/0x20 [ 33.463777] [ 33.463818] Allocated by task 296: [ 33.463954] kasan_save_stack+0x3c/0x68 [ 33.464038] kasan_save_track+0x20/0x40 [ 33.464078] kasan_save_alloc_info+0x40/0x58 [ 33.464213] __kasan_kmalloc+0xd4/0xd8 [ 33.464255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.464299] kasan_atomics+0xb8/0x2e0 [ 33.464338] kunit_try_run_case+0x170/0x3f0 [ 33.464398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.464445] kthread+0x328/0x630 [ 33.464481] ret_from_fork+0x10/0x20 [ 33.464529] [ 33.464552] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.464552] which belongs to the cache kmalloc-64 of size 64 [ 33.464614] The buggy address is located 0 bytes to the right of [ 33.464614] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.464764] [ 33.464988] The buggy address belongs to the physical page: [ 33.465069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.465172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.465266] page_type: f5(slab) [ 33.465439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.465630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.465713] page dumped because: kasan: bad access detected [ 33.465839] [ 33.465940] Memory state around the buggy address: [ 33.466000] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.466046] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.466358] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.466456] ^ [ 33.466595] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.466682] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.466723] ================================================================== [ 33.436992] ================================================================== [ 33.437077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.437186] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.437240] [ 33.437277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.437366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.437414] Hardware name: linux,dummy-virt (DT) [ 33.437449] Call trace: [ 33.437489] show_stack+0x20/0x38 (C) [ 33.437577] dump_stack_lvl+0x8c/0xd0 [ 33.437626] print_report+0x118/0x5d0 [ 33.437672] kasan_report+0xdc/0x128 [ 33.437717] kasan_check_range+0x100/0x1a8 [ 33.437765] __kasan_check_write+0x20/0x30 [ 33.437814] kasan_atomics_helper+0xf20/0x4858 [ 33.438089] kasan_atomics+0x198/0x2e0 [ 33.438174] kunit_try_run_case+0x170/0x3f0 [ 33.438226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.438301] kthread+0x328/0x630 [ 33.438383] ret_from_fork+0x10/0x20 [ 33.438446] [ 33.438469] Allocated by task 296: [ 33.438499] kasan_save_stack+0x3c/0x68 [ 33.438552] kasan_save_track+0x20/0x40 [ 33.438736] kasan_save_alloc_info+0x40/0x58 [ 33.438785] __kasan_kmalloc+0xd4/0xd8 [ 33.438908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.438954] kasan_atomics+0xb8/0x2e0 [ 33.439030] kunit_try_run_case+0x170/0x3f0 [ 33.439071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.439117] kthread+0x328/0x630 [ 33.439153] ret_from_fork+0x10/0x20 [ 33.439192] [ 33.439348] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.439348] which belongs to the cache kmalloc-64 of size 64 [ 33.439547] The buggy address is located 0 bytes to the right of [ 33.439547] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.439651] [ 33.439679] The buggy address belongs to the physical page: [ 33.439748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.439804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.439986] page_type: f5(slab) [ 33.440109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.440205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.440283] page dumped because: kasan: bad access detected [ 33.440413] [ 33.440474] Memory state around the buggy address: [ 33.440599] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.440647] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.440692] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.440734] ^ [ 33.441029] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.441126] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.441286] ================================================================== [ 33.449473] ================================================================== [ 33.449574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.449627] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.449680] [ 33.449711] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.449798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.449837] Hardware name: linux,dummy-virt (DT) [ 33.449869] Call trace: [ 33.449893] show_stack+0x20/0x38 (C) [ 33.449943] dump_stack_lvl+0x8c/0xd0 [ 33.449991] print_report+0x118/0x5d0 [ 33.450036] kasan_report+0xdc/0x128 [ 33.450082] kasan_check_range+0x100/0x1a8 [ 33.450141] __kasan_check_write+0x20/0x30 [ 33.450190] kasan_atomics_helper+0xff0/0x4858 [ 33.450250] kasan_atomics+0x198/0x2e0 [ 33.450299] kunit_try_run_case+0x170/0x3f0 [ 33.450352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.450415] kthread+0x328/0x630 [ 33.450468] ret_from_fork+0x10/0x20 [ 33.450528] [ 33.450549] Allocated by task 296: [ 33.450587] kasan_save_stack+0x3c/0x68 [ 33.450629] kasan_save_track+0x20/0x40 [ 33.450676] kasan_save_alloc_info+0x40/0x58 [ 33.450727] __kasan_kmalloc+0xd4/0xd8 [ 33.450772] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.450817] kasan_atomics+0xb8/0x2e0 [ 33.450865] kunit_try_run_case+0x170/0x3f0 [ 33.450907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.450953] kthread+0x328/0x630 [ 33.450988] ret_from_fork+0x10/0x20 [ 33.451026] [ 33.451055] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.451055] which belongs to the cache kmalloc-64 of size 64 [ 33.451116] The buggy address is located 0 bytes to the right of [ 33.451116] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.451193] [ 33.451220] The buggy address belongs to the physical page: [ 33.451256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.451308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.451357] page_type: f5(slab) [ 33.451395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.451449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.451498] page dumped because: kasan: bad access detected [ 33.452073] [ 33.452109] Memory state around the buggy address: [ 33.452247] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.452464] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.452586] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.452685] ^ [ 33.452780] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.452876] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.452957] ================================================================== [ 33.480486] ================================================================== [ 33.480556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.480607] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.480673] [ 33.480714] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.480808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.480855] Hardware name: linux,dummy-virt (DT) [ 33.480890] Call trace: [ 33.480913] show_stack+0x20/0x38 (C) [ 33.480962] dump_stack_lvl+0x8c/0xd0 [ 33.481009] print_report+0x118/0x5d0 [ 33.481084] kasan_report+0xdc/0x128 [ 33.481205] kasan_check_range+0x100/0x1a8 [ 33.481299] __kasan_check_write+0x20/0x30 [ 33.481349] kasan_atomics_helper+0x12d8/0x4858 [ 33.481402] kasan_atomics+0x198/0x2e0 [ 33.481455] kunit_try_run_case+0x170/0x3f0 [ 33.481568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.481645] kthread+0x328/0x630 [ 33.481689] ret_from_fork+0x10/0x20 [ 33.481738] [ 33.481758] Allocated by task 296: [ 33.481789] kasan_save_stack+0x3c/0x68 [ 33.481856] kasan_save_track+0x20/0x40 [ 33.481970] kasan_save_alloc_info+0x40/0x58 [ 33.482035] __kasan_kmalloc+0xd4/0xd8 [ 33.482112] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.482158] kasan_atomics+0xb8/0x2e0 [ 33.482198] kunit_try_run_case+0x170/0x3f0 [ 33.482255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.482331] kthread+0x328/0x630 [ 33.482372] ret_from_fork+0x10/0x20 [ 33.482410] [ 33.482434] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.482434] which belongs to the cache kmalloc-64 of size 64 [ 33.482495] The buggy address is located 0 bytes to the right of [ 33.482495] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.482574] [ 33.482705] The buggy address belongs to the physical page: [ 33.482741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.482884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.482958] page_type: f5(slab) [ 33.483005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.483056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.483102] page dumped because: kasan: bad access detected [ 33.483151] [ 33.483172] Memory state around the buggy address: [ 33.483206] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.483253] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.483298] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.483339] ^ [ 33.483375] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.483535] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.483616] ================================================================== [ 33.526401] ================================================================== [ 33.526453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.526518] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296 [ 33.526571] [ 33.526621] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.526710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.526758] Hardware name: linux,dummy-virt (DT) [ 33.526831] Call trace: [ 33.526857] show_stack+0x20/0x38 (C) [ 33.526905] dump_stack_lvl+0x8c/0xd0 [ 33.526954] print_report+0x118/0x5d0 [ 33.526998] kasan_report+0xdc/0x128 [ 33.527044] kasan_check_range+0x100/0x1a8 [ 33.527091] __kasan_check_write+0x20/0x30 [ 33.527137] kasan_atomics_helper+0x16d0/0x4858 [ 33.527189] kasan_atomics+0x198/0x2e0 [ 33.527238] kunit_try_run_case+0x170/0x3f0 [ 33.527286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.527341] kthread+0x328/0x630 [ 33.527384] ret_from_fork+0x10/0x20 [ 33.527440] [ 33.527531] Allocated by task 296: [ 33.527579] kasan_save_stack+0x3c/0x68 [ 33.527621] kasan_save_track+0x20/0x40 [ 33.527660] kasan_save_alloc_info+0x40/0x58 [ 33.527727] __kasan_kmalloc+0xd4/0xd8 [ 33.527769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.527821] kasan_atomics+0xb8/0x2e0 [ 33.527906] kunit_try_run_case+0x170/0x3f0 [ 33.528216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.528422] kthread+0x328/0x630 [ 33.528536] ret_from_fork+0x10/0x20 [ 33.528594] [ 33.528617] The buggy address belongs to the object at fff00000c9bb2f80 [ 33.528617] which belongs to the cache kmalloc-64 of size 64 [ 33.528680] The buggy address is located 0 bytes to the right of [ 33.528680] allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0) [ 33.528746] [ 33.529015] The buggy address belongs to the physical page: [ 33.529118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2 [ 33.529285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.529371] page_type: f5(slab) [ 33.529572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.529767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.529963] page dumped because: kasan: bad access detected [ 33.530038] [ 33.530136] Memory state around the buggy address: [ 33.530239] fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.530407] fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.530455] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.530497] ^ [ 33.530814] fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.530875] fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.530999] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 33.031502] ================================================================== [ 33.031578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 33.031636] Read of size 8 at addr fff00000c6360328 by task kunit_try_catch/292 [ 33.031707] [ 33.031748] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.031866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.031894] Hardware name: linux,dummy-virt (DT) [ 33.031928] Call trace: [ 33.031951] show_stack+0x20/0x38 (C) [ 33.032002] dump_stack_lvl+0x8c/0xd0 [ 33.032051] print_report+0x118/0x5d0 [ 33.032098] kasan_report+0xdc/0x128 [ 33.032142] __asan_report_load8_noabort+0x20/0x30 [ 33.032194] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 33.032249] kasan_bitops_generic+0x110/0x1c8 [ 33.032318] kunit_try_run_case+0x170/0x3f0 [ 33.032368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.032423] kthread+0x328/0x630 [ 33.032571] ret_from_fork+0x10/0x20 [ 33.032704] [ 33.032765] Allocated by task 292: [ 33.033425] kasan_bitops_generic+0xa0/0x1c8 [ 33.035580] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.038031] ret_from_fork+0x10/0x20 [ 33.039043] The buggy address is located 8 bytes inside of [ 33.039043] allocated 9-byte region [fff00000c6360320, fff00000c6360329) [ 33.040473] Hardware name: linux,dummy-virt (DT) [ 33.041680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.042693] ================================================================== [ 33.023416] ================================================================== [ 33.023477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 33.023560] Write of size 8 at addr fff00000c6360328 by task kunit_try_catch/292 [ 33.023613] [ 33.023645] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.023734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.023763] Hardware name: linux,dummy-virt (DT) [ 33.023796] Call trace: [ 33.023821] show_stack+0x20/0x38 (C) [ 33.023869] dump_stack_lvl+0x8c/0xd0 [ 33.023917] print_report+0x118/0x5d0 [ 33.023963] kasan_report+0xdc/0x128 [ 33.024008] kasan_check_range+0x100/0x1a8 [ 33.024056] __kasan_check_write+0x20/0x30 [ 33.024105] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 33.024159] kasan_bitops_generic+0x110/0x1c8 [ 33.024209] kunit_try_run_case+0x170/0x3f0 [ 33.024258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.024312] kthread+0x328/0x630 [ 33.024354] ret_from_fork+0x10/0x20 [ 33.024403] [ 33.024423] Allocated by task 292: [ 33.024451] kasan_save_stack+0x3c/0x68 [ 33.024491] kasan_save_track+0x20/0x40 [ 33.028618] kasan_save_alloc_info+0x40/0x58 [ 33.028666] __kasan_kmalloc+0xd4/0xd8 [ 33.028706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.028751] kasan_bitops_generic+0xa0/0x1c8 [ 33.028793] kunit_try_run_case+0x170/0x3f0 [ 33.028834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.028880] kthread+0x328/0x630 [ 33.028919] ret_from_fork+0x10/0x20 [ 33.028957] [ 33.028981] The buggy address belongs to the object at fff00000c6360320 [ 33.028981] which belongs to the cache kmalloc-16 of size 16 [ 33.029045] The buggy address is located 8 bytes inside of [ 33.029045] allocated 9-byte region [fff00000c6360320, fff00000c6360329) [ 33.029110] [ 33.029245] The buggy address belongs to the physical page: [ 33.029294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 33.029456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.029532] page_type: f5(slab) [ 33.029609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.029689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.029763] page dumped because: kasan: bad access detected [ 33.029799] [ 33.029848] Memory state around the buggy address: [ 33.029897] fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.029944] fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.029990] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.030031] ^ [ 33.030066] fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030111] fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030203] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 33.006333] ================================================================== [ 33.006422] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 33.006749] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290 [ 33.006918] [ 33.007067] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.007183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.007218] Hardware name: linux,dummy-virt (DT) [ 33.007287] Call trace: [ 33.007313] show_stack+0x20/0x38 (C) [ 33.007535] dump_stack_lvl+0x8c/0xd0 [ 33.007589] print_report+0x118/0x5d0 [ 33.007910] kasan_report+0xdc/0x128 [ 33.008023] __asan_report_load1_noabort+0x20/0x30 [ 33.008173] strnlen+0x80/0x88 [ 33.008298] kasan_strings+0x478/0xb00 [ 33.008350] kunit_try_run_case+0x170/0x3f0 [ 33.008734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.008882] kthread+0x328/0x630 [ 33.008999] ret_from_fork+0x10/0x20 [ 33.009169] [ 33.009290] Allocated by task 290: [ 33.009365] kasan_save_stack+0x3c/0x68 [ 33.009449] kasan_save_track+0x20/0x40 [ 33.009680] kasan_save_alloc_info+0x40/0x58 [ 33.009935] __kasan_kmalloc+0xd4/0xd8 [ 33.010074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.010204] kasan_strings+0xc8/0xb00 [ 33.010334] kunit_try_run_case+0x170/0x3f0 [ 33.010582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.010753] kthread+0x328/0x630 [ 33.010975] ret_from_fork+0x10/0x20 [ 33.011080] [ 33.011169] Freed by task 290: [ 33.011311] kasan_save_stack+0x3c/0x68 [ 33.011382] kasan_save_track+0x20/0x40 [ 33.011648] kasan_save_free_info+0x4c/0x78 [ 33.011817] __kasan_slab_free+0x6c/0x98 [ 33.011936] kfree+0x214/0x3c8 [ 33.012016] kasan_strings+0x24c/0xb00 [ 33.012058] kunit_try_run_case+0x170/0x3f0 [ 33.012097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.012337] kthread+0x328/0x630 [ 33.012686] ret_from_fork+0x10/0x20 [ 33.012829] [ 33.013114] The buggy address belongs to the object at fff00000c9bb4880 [ 33.013114] which belongs to the cache kmalloc-32 of size 32 [ 33.013251] The buggy address is located 16 bytes inside of [ 33.013251] freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0) [ 33.013632] [ 33.013762] The buggy address belongs to the physical page: [ 33.013889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 33.014236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.014438] page_type: f5(slab) [ 33.014516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.014695] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.014768] page dumped because: kasan: bad access detected [ 33.014999] [ 33.015184] Memory state around the buggy address: [ 33.015344] fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.015418] fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.015564] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.015639] ^ [ 33.015674] fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.016140] fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.016201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 32.995693] ================================================================== [ 32.996124] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 32.996189] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290 [ 32.996422] [ 32.996649] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.996860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.997015] Hardware name: linux,dummy-virt (DT) [ 32.997094] Call trace: [ 32.997365] show_stack+0x20/0x38 (C) [ 32.997690] dump_stack_lvl+0x8c/0xd0 [ 32.997865] print_report+0x118/0x5d0 [ 32.997995] kasan_report+0xdc/0x128 [ 32.998296] __asan_report_load1_noabort+0x20/0x30 [ 32.998540] strlen+0xa8/0xb0 [ 32.998631] kasan_strings+0x418/0xb00 [ 32.998821] kunit_try_run_case+0x170/0x3f0 [ 32.999051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.999151] kthread+0x328/0x630 [ 32.999277] ret_from_fork+0x10/0x20 [ 32.999586] [ 32.999663] Allocated by task 290: [ 32.999960] kasan_save_stack+0x3c/0x68 [ 33.000063] kasan_save_track+0x20/0x40 [ 33.000108] kasan_save_alloc_info+0x40/0x58 [ 33.000151] __kasan_kmalloc+0xd4/0xd8 [ 33.000190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.000693] kasan_strings+0xc8/0xb00 [ 33.000755] kunit_try_run_case+0x170/0x3f0 [ 33.000926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.001148] kthread+0x328/0x630 [ 33.001230] ret_from_fork+0x10/0x20 [ 33.001403] [ 33.001429] Freed by task 290: [ 33.001680] kasan_save_stack+0x3c/0x68 [ 33.001840] kasan_save_track+0x20/0x40 [ 33.002062] kasan_save_free_info+0x4c/0x78 [ 33.002306] __kasan_slab_free+0x6c/0x98 [ 33.002419] kfree+0x214/0x3c8 [ 33.002719] kasan_strings+0x24c/0xb00 [ 33.002876] kunit_try_run_case+0x170/0x3f0 [ 33.003104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.003366] kthread+0x328/0x630 [ 33.003451] ret_from_fork+0x10/0x20 [ 33.003702] [ 33.003882] The buggy address belongs to the object at fff00000c9bb4880 [ 33.003882] which belongs to the cache kmalloc-32 of size 32 [ 33.004081] The buggy address is located 16 bytes inside of [ 33.004081] freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0) [ 33.004162] [ 33.004236] The buggy address belongs to the physical page: [ 33.004272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 33.004330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.004643] page_type: f5(slab) [ 33.004706] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.004761] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.004807] page dumped because: kasan: bad access detected [ 33.004843] [ 33.004863] Memory state around the buggy address: [ 33.004916] fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.004979] fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.005027] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.005068] ^ [ 33.005100] fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.005175] fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.005218] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 32.985287] ================================================================== [ 32.985563] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 32.985735] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290 [ 32.985828] [ 32.985863] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.986152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.986196] Hardware name: linux,dummy-virt (DT) [ 32.986425] Call trace: [ 32.986461] show_stack+0x20/0x38 (C) [ 32.986574] dump_stack_lvl+0x8c/0xd0 [ 32.986628] print_report+0x118/0x5d0 [ 32.986691] kasan_report+0xdc/0x128 [ 32.987049] __asan_report_load1_noabort+0x20/0x30 [ 32.987124] kasan_strings+0x95c/0xb00 [ 32.987308] kunit_try_run_case+0x170/0x3f0 [ 32.987520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.987636] kthread+0x328/0x630 [ 32.987796] ret_from_fork+0x10/0x20 [ 32.987874] [ 32.988022] Allocated by task 290: [ 32.988054] kasan_save_stack+0x3c/0x68 [ 32.988096] kasan_save_track+0x20/0x40 [ 32.988154] kasan_save_alloc_info+0x40/0x58 [ 32.988316] __kasan_kmalloc+0xd4/0xd8 [ 32.988398] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.988596] kasan_strings+0xc8/0xb00 [ 32.988645] kunit_try_run_case+0x170/0x3f0 [ 32.988698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.988749] kthread+0x328/0x630 [ 32.988799] ret_from_fork+0x10/0x20 [ 32.988839] [ 32.988869] Freed by task 290: [ 32.988909] kasan_save_stack+0x3c/0x68 [ 32.988948] kasan_save_track+0x20/0x40 [ 32.988992] kasan_save_free_info+0x4c/0x78 [ 32.989032] __kasan_slab_free+0x6c/0x98 [ 32.989071] kfree+0x214/0x3c8 [ 32.989116] kasan_strings+0x24c/0xb00 [ 32.989157] kunit_try_run_case+0x170/0x3f0 [ 32.989201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.989258] kthread+0x328/0x630 [ 32.989294] ret_from_fork+0x10/0x20 [ 32.989339] [ 32.989361] The buggy address belongs to the object at fff00000c9bb4880 [ 32.989361] which belongs to the cache kmalloc-32 of size 32 [ 32.989432] The buggy address is located 16 bytes inside of [ 32.989432] freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0) [ 32.989496] [ 32.989565] The buggy address belongs to the physical page: [ 32.989618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 32.990040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.990493] page_type: f5(slab) [ 32.991530] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.991621] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.991694] page dumped because: kasan: bad access detected [ 32.991755] [ 32.991811] Memory state around the buggy address: [ 32.992065] fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.992252] fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.992872] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.993099] ^ [ 32.993359] fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.993584] fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.993681] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 32.970879] ================================================================== [ 32.971251] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 32.971344] Read of size 1 at addr fff00000c9bb4890 by task kunit_try_catch/290 [ 32.971520] [ 32.971554] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.972038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.972132] Hardware name: linux,dummy-virt (DT) [ 32.972178] Call trace: [ 32.972464] show_stack+0x20/0x38 (C) [ 32.972637] dump_stack_lvl+0x8c/0xd0 [ 32.973015] print_report+0x118/0x5d0 [ 32.973168] kasan_report+0xdc/0x128 [ 32.973358] __asan_report_load1_noabort+0x20/0x30 [ 32.973466] strcmp+0xc0/0xc8 [ 32.973817] kasan_strings+0x340/0xb00 [ 32.973893] kunit_try_run_case+0x170/0x3f0 [ 32.974201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.974431] kthread+0x328/0x630 [ 32.974887] ret_from_fork+0x10/0x20 [ 32.975177] [ 32.975261] Allocated by task 290: [ 32.975366] kasan_save_stack+0x3c/0x68 [ 32.975660] kasan_save_track+0x20/0x40 [ 32.975843] kasan_save_alloc_info+0x40/0x58 [ 32.975968] __kasan_kmalloc+0xd4/0xd8 [ 32.976112] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.976159] kasan_strings+0xc8/0xb00 [ 32.976199] kunit_try_run_case+0x170/0x3f0 [ 32.976240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.976724] kthread+0x328/0x630 [ 32.976795] ret_from_fork+0x10/0x20 [ 32.976974] [ 32.977233] Freed by task 290: [ 32.977419] kasan_save_stack+0x3c/0x68 [ 32.977557] kasan_save_track+0x20/0x40 [ 32.977773] kasan_save_free_info+0x4c/0x78 [ 32.977917] __kasan_slab_free+0x6c/0x98 [ 32.978060] kfree+0x214/0x3c8 [ 32.978564] kasan_strings+0x24c/0xb00 [ 32.978627] kunit_try_run_case+0x170/0x3f0 [ 32.978964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.979141] kthread+0x328/0x630 [ 32.979319] ret_from_fork+0x10/0x20 [ 32.979534] [ 32.979600] The buggy address belongs to the object at fff00000c9bb4880 [ 32.979600] which belongs to the cache kmalloc-32 of size 32 [ 32.979808] The buggy address is located 16 bytes inside of [ 32.979808] freed 32-byte region [fff00000c9bb4880, fff00000c9bb48a0) [ 32.980079] [ 32.980215] The buggy address belongs to the physical page: [ 32.980297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 32.980392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.980446] page_type: f5(slab) [ 32.980487] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.980902] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.981131] page dumped because: kasan: bad access detected [ 32.981383] [ 32.981459] Memory state around the buggy address: [ 32.981875] fff00000c9bb4780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.982004] fff00000c9bb4800: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.982243] >fff00000c9bb4880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.982361] ^ [ 32.982520] fff00000c9bb4900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.982616] fff00000c9bb4980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.982886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 32.945636] ================================================================== [ 32.945741] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 32.945897] Read of size 1 at addr fff00000c9bb46d8 by task kunit_try_catch/288 [ 32.945955] [ 32.946251] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.946482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.946536] Hardware name: linux,dummy-virt (DT) [ 32.946636] Call trace: [ 32.946685] show_stack+0x20/0x38 (C) [ 32.946779] dump_stack_lvl+0x8c/0xd0 [ 32.946839] print_report+0x118/0x5d0 [ 32.947144] kasan_report+0xdc/0x128 [ 32.947216] __asan_report_load1_noabort+0x20/0x30 [ 32.947334] memcmp+0x198/0x1d8 [ 32.947409] kasan_memcmp+0x16c/0x300 [ 32.947460] kunit_try_run_case+0x170/0x3f0 [ 32.947575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.947634] kthread+0x328/0x630 [ 32.947679] ret_from_fork+0x10/0x20 [ 32.947729] [ 32.947759] Allocated by task 288: [ 32.948048] kasan_save_stack+0x3c/0x68 [ 32.948168] kasan_save_track+0x20/0x40 [ 32.948211] kasan_save_alloc_info+0x40/0x58 [ 32.948254] __kasan_kmalloc+0xd4/0xd8 [ 32.948295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.948672] kasan_memcmp+0xbc/0x300 [ 32.948743] kunit_try_run_case+0x170/0x3f0 [ 32.948944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.949124] kthread+0x328/0x630 [ 32.949359] ret_from_fork+0x10/0x20 [ 32.949687] [ 32.949837] The buggy address belongs to the object at fff00000c9bb46c0 [ 32.949837] which belongs to the cache kmalloc-32 of size 32 [ 32.950003] The buggy address is located 0 bytes to the right of [ 32.950003] allocated 24-byte region [fff00000c9bb46c0, fff00000c9bb46d8) [ 32.950078] [ 32.950129] The buggy address belongs to the physical page: [ 32.950339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 32.950691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.950835] page_type: f5(slab) [ 32.950926] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.951025] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.951313] page dumped because: kasan: bad access detected [ 32.951352] [ 32.951519] Memory state around the buggy address: [ 32.951562] fff00000c9bb4580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.951666] fff00000c9bb4600: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 32.951725] >fff00000c9bb4680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.951768] ^ [ 32.952223] fff00000c9bb4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.952281] fff00000c9bb4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.952430] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 32.918393] ================================================================== [ 32.918454] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 32.918869] Read of size 1 at addr ffff800080b47b4a by task kunit_try_catch/284 [ 32.918940] [ 32.919132] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.919308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.919341] Hardware name: linux,dummy-virt (DT) [ 32.919430] Call trace: [ 32.919596] show_stack+0x20/0x38 (C) [ 32.919769] dump_stack_lvl+0x8c/0xd0 [ 32.920071] print_report+0x310/0x5d0 [ 32.920166] kasan_report+0xdc/0x128 [ 32.920345] __asan_report_load1_noabort+0x20/0x30 [ 32.920437] kasan_alloca_oob_right+0x2dc/0x340 [ 32.920780] kunit_try_run_case+0x170/0x3f0 [ 32.920901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.921024] kthread+0x328/0x630 [ 32.921213] ret_from_fork+0x10/0x20 [ 32.921367] [ 32.921436] The buggy address belongs to stack of task kunit_try_catch/284 [ 32.921598] [ 32.921622] The buggy address ffff800080b47b4a belongs to a vmalloc virtual mapping [ 32.921710] The buggy address belongs to the physical page: [ 32.921888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb1 [ 32.922160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.922265] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.922439] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.922578] page dumped because: kasan: bad access detected [ 32.922958] [ 32.923080] Memory state around the buggy address: [ 32.923222] ffff800080b47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.923406] ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.923629] >ffff800080b47b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 32.923893] ^ [ 32.924044] ffff800080b47b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.924225] ffff800080b47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.924288] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 32.902837] ================================================================== [ 32.902936] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 32.903242] Read of size 1 at addr ffff800080b27b5f by task kunit_try_catch/282 [ 32.903304] [ 32.903337] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.903427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.903856] Hardware name: linux,dummy-virt (DT) [ 32.904010] Call trace: [ 32.904108] show_stack+0x20/0x38 (C) [ 32.904281] dump_stack_lvl+0x8c/0xd0 [ 32.904720] print_report+0x310/0x5d0 [ 32.904930] kasan_report+0xdc/0x128 [ 32.905093] __asan_report_load1_noabort+0x20/0x30 [ 32.905207] kasan_alloca_oob_left+0x2b8/0x310 [ 32.905333] kunit_try_run_case+0x170/0x3f0 [ 32.905541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.905633] kthread+0x328/0x630 [ 32.905795] ret_from_fork+0x10/0x20 [ 32.905881] [ 32.906156] The buggy address belongs to stack of task kunit_try_catch/282 [ 32.906338] [ 32.906390] The buggy address ffff800080b27b5f belongs to a vmalloc virtual mapping [ 32.906680] The buggy address belongs to the physical page: [ 32.906899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1a [ 32.906975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.907339] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.907635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.907839] page dumped because: kasan: bad access detected [ 32.908048] [ 32.908205] Memory state around the buggy address: [ 32.908413] ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.908482] ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.908782] >ffff800080b27b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 32.908932] ^ [ 32.909159] ffff800080b27b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.909369] ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.909515] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 32.884962] ================================================================== [ 32.885037] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.885092] Read of size 1 at addr ffff800080b27c2a by task kunit_try_catch/280 [ 32.885144] [ 32.885174] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.885267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.885297] Hardware name: linux,dummy-virt (DT) [ 32.885330] Call trace: [ 32.885356] show_stack+0x20/0x38 (C) [ 32.885405] dump_stack_lvl+0x8c/0xd0 [ 32.885455] print_report+0x310/0x5d0 [ 32.885501] kasan_report+0xdc/0x128 [ 32.885683] __asan_report_load1_noabort+0x20/0x30 [ 32.885925] kasan_stack_oob+0x238/0x270 [ 32.886203] kunit_try_run_case+0x170/0x3f0 [ 32.886336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.886417] kthread+0x328/0x630 [ 32.886543] ret_from_fork+0x10/0x20 [ 32.886882] [ 32.886971] The buggy address belongs to stack of task kunit_try_catch/280 [ 32.887801] and is located at offset 138 in frame: [ 32.888001] kasan_stack_oob+0x0/0x270 [ 32.888814] [ 32.889195] This frame has 4 objects: [ 32.889740] [48, 49) '__assertion' [ 32.889883] [64, 72) 'array' [ 32.889930] [96, 112) '__assertion' [ 32.889978] [128, 138) 'stack_array' [ 32.890110] [ 32.890142] The buggy address ffff800080b27c2a belongs to a vmalloc virtual mapping [ 32.890213] The buggy address belongs to the physical page: [ 32.890265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1a [ 32.890322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.890400] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.890455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.890499] page dumped because: kasan: bad access detected [ 32.891205] [ 32.891286] Memory state around the buggy address: [ 32.891482] ffff800080b27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.891725] ffff800080b27b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.891779] >ffff800080b27c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.891934] ^ [ 32.892119] ffff800080b27c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.892230] ffff800080b27d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.892301] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 32.869684] ================================================================== [ 32.870008] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 32.870078] Read of size 1 at addr ffff9420b897a70d by task kunit_try_catch/276 [ 32.870134] [ 32.870218] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.870327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.870371] Hardware name: linux,dummy-virt (DT) [ 32.870406] Call trace: [ 32.870436] show_stack+0x20/0x38 (C) [ 32.870489] dump_stack_lvl+0x8c/0xd0 [ 32.870769] print_report+0x310/0x5d0 [ 32.870831] kasan_report+0xdc/0x128 [ 32.870886] __asan_report_load1_noabort+0x20/0x30 [ 32.870996] kasan_global_oob_right+0x230/0x270 [ 32.871050] kunit_try_run_case+0x170/0x3f0 [ 32.871142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.871199] kthread+0x328/0x630 [ 32.871275] ret_from_fork+0x10/0x20 [ 32.871336] [ 32.871521] The buggy address belongs to the variable: [ 32.871565] global_array+0xd/0x40 [ 32.871802] [ 32.872032] The buggy address ffff9420b897a70d belongs to a vmalloc virtual mapping [ 32.872133] The buggy address belongs to the physical page: [ 32.872170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d7a [ 32.872589] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 32.872755] raw: 03fffe0000002000 ffffc1ffc01f5e88 ffffc1ffc01f5e88 0000000000000000 [ 32.872876] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.872993] page dumped because: kasan: bad access detected [ 32.873029] [ 32.873049] Memory state around the buggy address: [ 32.873303] ffff9420b897a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.873470] ffff9420b897a680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 32.873608] >ffff9420b897a700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 32.873717] ^ [ 32.873749] ffff9420b897a780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 32.873795] ffff9420b897a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.873838] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 32.857013] ================================================================== [ 32.857071] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.857128] Free of addr fff00000c9bfc001 by task kunit_try_catch/274 [ 32.857705] [ 32.857739] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.857826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.857855] Hardware name: linux,dummy-virt (DT) [ 32.857889] Call trace: [ 32.857911] show_stack+0x20/0x38 (C) [ 32.857961] dump_stack_lvl+0x8c/0xd0 [ 32.858009] print_report+0x118/0x5d0 [ 32.858061] kasan_report_invalid_free+0xc0/0xe8 [ 32.858246] __kasan_mempool_poison_object+0xfc/0x150 [ 32.858394] mempool_free+0x28c/0x328 [ 32.858537] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.858592] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.858985] kunit_try_run_case+0x170/0x3f0 [ 32.859040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.859650] kthread+0x328/0x630 [ 32.859807] ret_from_fork+0x10/0x20 [ 32.859858] [ 32.859879] The buggy address belongs to the physical page: [ 32.859913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc [ 32.860298] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.860397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.860513] page_type: f8(unknown) [ 32.860733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.860821] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.861104] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.861182] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.861233] head: 0bfffe0000000002 ffffc1ffc326ff01 00000000ffffffff 00000000ffffffff [ 32.861285] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.861328] page dumped because: kasan: bad access detected [ 32.861360] [ 32.861388] Memory state around the buggy address: [ 32.861426] fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.861878] fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.861976] >fff00000c9bfc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.862016] ^ [ 32.862043] fff00000c9bfc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.862438] fff00000c9bfc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.862582] ================================================================== [ 32.839229] ================================================================== [ 32.839288] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.839341] Free of addr fff00000c9ba2e01 by task kunit_try_catch/272 [ 32.839738] [ 32.839802] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.840119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.840336] Hardware name: linux,dummy-virt (DT) [ 32.840500] Call trace: [ 32.840532] show_stack+0x20/0x38 (C) [ 32.840582] dump_stack_lvl+0x8c/0xd0 [ 32.840649] print_report+0x118/0x5d0 [ 32.840864] kasan_report_invalid_free+0xc0/0xe8 [ 32.841035] check_slab_allocation+0xfc/0x108 [ 32.841161] __kasan_mempool_poison_object+0x78/0x150 [ 32.841261] mempool_free+0x28c/0x328 [ 32.841385] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.841440] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.841492] kunit_try_run_case+0x170/0x3f0 [ 32.841548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.841647] kthread+0x328/0x630 [ 32.841767] ret_from_fork+0x10/0x20 [ 32.841922] [ 32.841943] Allocated by task 272: [ 32.841997] kasan_save_stack+0x3c/0x68 [ 32.842105] kasan_save_track+0x20/0x40 [ 32.842186] kasan_save_alloc_info+0x40/0x58 [ 32.842297] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.842394] remove_element+0x130/0x1f8 [ 32.842432] mempool_alloc_preallocated+0x58/0xc0 [ 32.842473] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.843073] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.843128] kunit_try_run_case+0x170/0x3f0 [ 32.843403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.843540] kthread+0x328/0x630 [ 32.843879] ret_from_fork+0x10/0x20 [ 32.843965] [ 32.843990] The buggy address belongs to the object at fff00000c9ba2e00 [ 32.843990] which belongs to the cache kmalloc-128 of size 128 [ 32.844050] The buggy address is located 1 bytes inside of [ 32.844050] 128-byte region [fff00000c9ba2e00, fff00000c9ba2e80) [ 32.844270] [ 32.844318] The buggy address belongs to the physical page: [ 32.844371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2 [ 32.844516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.844567] page_type: f5(slab) [ 32.844604] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.844656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.844698] page dumped because: kasan: bad access detected [ 32.844730] [ 32.844748] Memory state around the buggy address: [ 32.844810] fff00000c9ba2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.844856] fff00000c9ba2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.844936] >fff00000c9ba2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.844979] ^ [ 32.845007] fff00000c9ba2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.845251] fff00000c9ba2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.845459] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 32.826022] ================================================================== [ 32.826080] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.826377] Free of addr fff00000c9bfc000 by task kunit_try_catch/270 [ 32.826580] [ 32.826885] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.827060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.827176] Hardware name: linux,dummy-virt (DT) [ 32.827211] Call trace: [ 32.827235] show_stack+0x20/0x38 (C) [ 32.827285] dump_stack_lvl+0x8c/0xd0 [ 32.827340] print_report+0x118/0x5d0 [ 32.827564] kasan_report_invalid_free+0xc0/0xe8 [ 32.827640] __kasan_mempool_poison_pages+0xe0/0xe8 [ 32.827852] mempool_free+0x24c/0x328 [ 32.827900] mempool_double_free_helper+0x150/0x2e8 [ 32.827952] mempool_page_alloc_double_free+0xbc/0x118 [ 32.828151] kunit_try_run_case+0x170/0x3f0 [ 32.828406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.828463] kthread+0x328/0x630 [ 32.828791] ret_from_fork+0x10/0x20 [ 32.828878] [ 32.828949] The buggy address belongs to the physical page: [ 32.829049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc [ 32.829148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.829266] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.829377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.829420] page dumped because: kasan: bad access detected [ 32.829451] [ 32.829469] Memory state around the buggy address: [ 32.829581] fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.829765] fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.829810] >fff00000c9bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.829850] ^ [ 32.829878] fff00000c9bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.829922] fff00000c9bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.829989] ================================================================== [ 32.809853] ================================================================== [ 32.809926] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.809984] Free of addr fff00000c9bf8000 by task kunit_try_catch/268 [ 32.810238] [ 32.810397] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.810758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.810937] Hardware name: linux,dummy-virt (DT) [ 32.811003] Call trace: [ 32.811026] show_stack+0x20/0x38 (C) [ 32.811079] dump_stack_lvl+0x8c/0xd0 [ 32.811129] print_report+0x118/0x5d0 [ 32.811173] kasan_report_invalid_free+0xc0/0xe8 [ 32.811228] __kasan_mempool_poison_object+0x14c/0x150 [ 32.811468] mempool_free+0x28c/0x328 [ 32.811562] mempool_double_free_helper+0x150/0x2e8 [ 32.811815] mempool_kmalloc_large_double_free+0xc0/0x118 [ 32.811871] kunit_try_run_case+0x170/0x3f0 [ 32.812157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.812347] kthread+0x328/0x630 [ 32.812395] ret_from_fork+0x10/0x20 [ 32.812778] [ 32.812817] The buggy address belongs to the physical page: [ 32.812858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8 [ 32.812958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.813190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.813252] page_type: f8(unknown) [ 32.813526] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.813587] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.813645] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.813696] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.814050] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff [ 32.814105] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.814148] page dumped because: kasan: bad access detected [ 32.814179] [ 32.814546] Memory state around the buggy address: [ 32.814622] fff00000c9bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.814668] fff00000c9bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.815039] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.815087] ^ [ 32.815117] fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.815224] fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.815308] ================================================================== [ 32.787875] ================================================================== [ 32.787944] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.787997] Free of addr fff00000c9ba2a00 by task kunit_try_catch/266 [ 32.788320] [ 32.788394] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.788494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.788601] Hardware name: linux,dummy-virt (DT) [ 32.788638] Call trace: [ 32.788660] show_stack+0x20/0x38 (C) [ 32.788713] dump_stack_lvl+0x8c/0xd0 [ 32.788760] print_report+0x118/0x5d0 [ 32.789132] kasan_report_invalid_free+0xc0/0xe8 [ 32.789185] check_slab_allocation+0xd4/0x108 [ 32.789254] __kasan_mempool_poison_object+0x78/0x150 [ 32.789320] mempool_free+0x28c/0x328 [ 32.789365] mempool_double_free_helper+0x150/0x2e8 [ 32.789417] mempool_kmalloc_double_free+0xc0/0x118 [ 32.789469] kunit_try_run_case+0x170/0x3f0 [ 32.789526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.789580] kthread+0x328/0x630 [ 32.790008] ret_from_fork+0x10/0x20 [ 32.790223] [ 32.790267] Allocated by task 266: [ 32.790370] kasan_save_stack+0x3c/0x68 [ 32.790411] kasan_save_track+0x20/0x40 [ 32.790469] kasan_save_alloc_info+0x40/0x58 [ 32.790794] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.790846] remove_element+0x130/0x1f8 [ 32.791138] mempool_alloc_preallocated+0x58/0xc0 [ 32.791250] mempool_double_free_helper+0x94/0x2e8 [ 32.791319] mempool_kmalloc_double_free+0xc0/0x118 [ 32.791492] kunit_try_run_case+0x170/0x3f0 [ 32.791548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.791605] kthread+0x328/0x630 [ 32.791639] ret_from_fork+0x10/0x20 [ 32.791674] [ 32.791695] Freed by task 266: [ 32.791749] kasan_save_stack+0x3c/0x68 [ 32.791828] kasan_save_track+0x20/0x40 [ 32.791864] kasan_save_free_info+0x4c/0x78 [ 32.792581] __kasan_mempool_poison_object+0xc0/0x150 [ 32.792641] mempool_free+0x28c/0x328 [ 32.792678] mempool_double_free_helper+0x100/0x2e8 [ 32.792722] mempool_kmalloc_double_free+0xc0/0x118 [ 32.793056] kunit_try_run_case+0x170/0x3f0 [ 32.793101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.793146] kthread+0x328/0x630 [ 32.793378] ret_from_fork+0x10/0x20 [ 32.793428] [ 32.793532] The buggy address belongs to the object at fff00000c9ba2a00 [ 32.793532] which belongs to the cache kmalloc-128 of size 128 [ 32.793600] The buggy address is located 0 bytes inside of [ 32.793600] 128-byte region [fff00000c9ba2a00, fff00000c9ba2a80) [ 32.793838] [ 32.793858] The buggy address belongs to the physical page: [ 32.793947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2 [ 32.794028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.794127] page_type: f5(slab) [ 32.794249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.794399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.794513] page dumped because: kasan: bad access detected [ 32.794544] [ 32.794563] Memory state around the buggy address: [ 32.794595] fff00000c9ba2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.794802] fff00000c9ba2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.795206] >fff00000c9ba2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.795495] ^ [ 32.795803] fff00000c9ba2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.795879] fff00000c9ba2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.795920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.706355] ================================================================== [ 32.706421] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.706481] Read of size 1 at addr fff00000c9bf4000 by task kunit_try_catch/260 [ 32.706592] [ 32.706739] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.706970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.706998] Hardware name: linux,dummy-virt (DT) [ 32.707030] Call trace: [ 32.707058] show_stack+0x20/0x38 (C) [ 32.707293] dump_stack_lvl+0x8c/0xd0 [ 32.707360] print_report+0x118/0x5d0 [ 32.707487] kasan_report+0xdc/0x128 [ 32.707612] __asan_report_load1_noabort+0x20/0x30 [ 32.707661] mempool_uaf_helper+0x314/0x340 [ 32.707709] mempool_kmalloc_large_uaf+0xc4/0x120 [ 32.707761] kunit_try_run_case+0x170/0x3f0 [ 32.707843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.707920] kthread+0x328/0x630 [ 32.707963] ret_from_fork+0x10/0x20 [ 32.708011] [ 32.708031] The buggy address belongs to the physical page: [ 32.708064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf4 [ 32.708427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.708965] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.709353] page_type: f8(unknown) [ 32.709445] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.709497] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.709559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.709608] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.709658] head: 0bfffe0000000002 ffffc1ffc326fd01 00000000ffffffff 00000000ffffffff [ 32.709708] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.709750] page dumped because: kasan: bad access detected [ 32.709781] [ 32.709799] Memory state around the buggy address: [ 32.709833] fff00000c9bf3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.710128] fff00000c9bf3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.710186] >fff00000c9bf4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.710271] ^ [ 32.710397] fff00000c9bf4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.710464] fff00000c9bf4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.710515] ================================================================== [ 32.769991] ================================================================== [ 32.770050] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.770114] Read of size 1 at addr fff00000c9bf8000 by task kunit_try_catch/264 [ 32.770165] [ 32.770200] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.770288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.770316] Hardware name: linux,dummy-virt (DT) [ 32.770348] Call trace: [ 32.770381] show_stack+0x20/0x38 (C) [ 32.770430] dump_stack_lvl+0x8c/0xd0 [ 32.770479] print_report+0x118/0x5d0 [ 32.770688] kasan_report+0xdc/0x128 [ 32.770735] __asan_report_load1_noabort+0x20/0x30 [ 32.770790] mempool_uaf_helper+0x314/0x340 [ 32.772534] mempool_page_alloc_uaf+0xc0/0x118 [ 32.773134] kunit_try_run_case+0x170/0x3f0 [ 32.773469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.774227] kthread+0x328/0x630 [ 32.774358] ret_from_fork+0x10/0x20 [ 32.775046] [ 32.775763] The buggy address belongs to the physical page: [ 32.775878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8 [ 32.775937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.776269] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.776936] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.777062] page dumped because: kasan: bad access detected [ 32.777108] [ 32.777127] Memory state around the buggy address: [ 32.777163] fff00000c9bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.777210] fff00000c9bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.777265] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.777304] ^ [ 32.777838] fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.777914] fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.777996] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.723451] ================================================================== [ 32.723522] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.723577] Read of size 1 at addr fff00000c9ba6240 by task kunit_try_catch/262 [ 32.723627] [ 32.723658] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.723757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.723792] Hardware name: linux,dummy-virt (DT) [ 32.723822] Call trace: [ 32.724543] show_stack+0x20/0x38 (C) [ 32.724685] dump_stack_lvl+0x8c/0xd0 [ 32.724736] print_report+0x118/0x5d0 [ 32.724781] kasan_report+0xdc/0x128 [ 32.724823] __asan_report_load1_noabort+0x20/0x30 [ 32.724874] mempool_uaf_helper+0x314/0x340 [ 32.724923] mempool_slab_uaf+0xc0/0x118 [ 32.724970] kunit_try_run_case+0x170/0x3f0 [ 32.726031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.726172] kthread+0x328/0x630 [ 32.726256] ret_from_fork+0x10/0x20 [ 32.726322] [ 32.726341] Allocated by task 262: [ 32.726382] kasan_save_stack+0x3c/0x68 [ 32.726471] kasan_save_track+0x20/0x40 [ 32.726839] kasan_save_alloc_info+0x40/0x58 [ 32.726892] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.726937] remove_element+0x16c/0x1f8 [ 32.726977] mempool_alloc_preallocated+0x58/0xc0 [ 32.727301] mempool_uaf_helper+0xa4/0x340 [ 32.727427] mempool_slab_uaf+0xc0/0x118 [ 32.727468] kunit_try_run_case+0x170/0x3f0 [ 32.727517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.727564] kthread+0x328/0x630 [ 32.727597] ret_from_fork+0x10/0x20 [ 32.728046] [ 32.728161] Freed by task 262: [ 32.728239] kasan_save_stack+0x3c/0x68 [ 32.728282] kasan_save_track+0x20/0x40 [ 32.728347] kasan_save_free_info+0x4c/0x78 [ 32.728388] __kasan_mempool_poison_object+0xc0/0x150 [ 32.728430] mempool_free+0x28c/0x328 [ 32.728738] mempool_uaf_helper+0x104/0x340 [ 32.728830] mempool_slab_uaf+0xc0/0x118 [ 32.728871] kunit_try_run_case+0x170/0x3f0 [ 32.728911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.728954] kthread+0x328/0x630 [ 32.728989] ret_from_fork+0x10/0x20 [ 32.729026] [ 32.729056] The buggy address belongs to the object at fff00000c9ba6240 [ 32.729056] which belongs to the cache test_cache of size 123 [ 32.729316] The buggy address is located 0 bytes inside of [ 32.729316] freed 123-byte region [fff00000c9ba6240, fff00000c9ba62bb) [ 32.729785] [ 32.729807] The buggy address belongs to the physical page: [ 32.729866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba6 [ 32.729919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.730237] page_type: f5(slab) [ 32.730280] raw: 0bfffe0000000000 fff00000c56a1dc0 dead000000000122 0000000000000000 [ 32.730332] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.730691] page dumped because: kasan: bad access detected [ 32.730733] [ 32.730751] Memory state around the buggy address: [ 32.730784] fff00000c9ba6100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.730828] fff00000c9ba6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.730881] >fff00000c9ba6200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.730920] ^ [ 32.731200] fff00000c9ba6280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.731248] fff00000c9ba6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.731754] ================================================================== [ 32.689993] ================================================================== [ 32.690339] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.690409] Read of size 1 at addr fff00000c9ba2600 by task kunit_try_catch/258 [ 32.690460] [ 32.690497] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.690597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.690625] Hardware name: linux,dummy-virt (DT) [ 32.690659] Call trace: [ 32.690694] show_stack+0x20/0x38 (C) [ 32.690742] dump_stack_lvl+0x8c/0xd0 [ 32.691113] print_report+0x118/0x5d0 [ 32.691463] kasan_report+0xdc/0x128 [ 32.691520] __asan_report_load1_noabort+0x20/0x30 [ 32.691837] mempool_uaf_helper+0x314/0x340 [ 32.692243] mempool_kmalloc_uaf+0xc4/0x120 [ 32.692297] kunit_try_run_case+0x170/0x3f0 [ 32.692347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.692426] kthread+0x328/0x630 [ 32.692672] ret_from_fork+0x10/0x20 [ 32.692725] [ 32.692743] Allocated by task 258: [ 32.692877] kasan_save_stack+0x3c/0x68 [ 32.693239] kasan_save_track+0x20/0x40 [ 32.693291] kasan_save_alloc_info+0x40/0x58 [ 32.693433] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.693478] remove_element+0x130/0x1f8 [ 32.693527] mempool_alloc_preallocated+0x58/0xc0 [ 32.693579] mempool_uaf_helper+0xa4/0x340 [ 32.693787] mempool_kmalloc_uaf+0xc4/0x120 [ 32.693827] kunit_try_run_case+0x170/0x3f0 [ 32.693866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.693909] kthread+0x328/0x630 [ 32.693941] ret_from_fork+0x10/0x20 [ 32.693978] [ 32.694008] Freed by task 258: [ 32.694034] kasan_save_stack+0x3c/0x68 [ 32.694070] kasan_save_track+0x20/0x40 [ 32.694403] kasan_save_free_info+0x4c/0x78 [ 32.694487] __kasan_mempool_poison_object+0xc0/0x150 [ 32.694538] mempool_free+0x28c/0x328 [ 32.694579] mempool_uaf_helper+0x104/0x340 [ 32.694617] mempool_kmalloc_uaf+0xc4/0x120 [ 32.694657] kunit_try_run_case+0x170/0x3f0 [ 32.694693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.694742] kthread+0x328/0x630 [ 32.694933] ret_from_fork+0x10/0x20 [ 32.694970] [ 32.695016] The buggy address belongs to the object at fff00000c9ba2600 [ 32.695016] which belongs to the cache kmalloc-128 of size 128 [ 32.695115] The buggy address is located 0 bytes inside of [ 32.695115] freed 128-byte region [fff00000c9ba2600, fff00000c9ba2680) [ 32.695178] [ 32.695236] The buggy address belongs to the physical page: [ 32.695269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2 [ 32.695483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.695561] page_type: f5(slab) [ 32.695599] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.695649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.695691] page dumped because: kasan: bad access detected [ 32.695847] [ 32.695868] Memory state around the buggy address: [ 32.695901] fff00000c9ba2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.696324] fff00000c9ba2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.696497] >fff00000c9ba2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.696552] ^ [ 32.696633] fff00000c9ba2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.696785] fff00000c9ba2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.697062] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.638202] ================================================================== [ 32.638270] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.638526] Read of size 1 at addr fff00000c9bf2001 by task kunit_try_catch/254 [ 32.638578] [ 32.639161] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.639370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.639436] Hardware name: linux,dummy-virt (DT) [ 32.639468] Call trace: [ 32.639493] show_stack+0x20/0x38 (C) [ 32.639925] dump_stack_lvl+0x8c/0xd0 [ 32.639978] print_report+0x118/0x5d0 [ 32.640023] kasan_report+0xdc/0x128 [ 32.640067] __asan_report_load1_noabort+0x20/0x30 [ 32.640114] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.640388] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.640862] kunit_try_run_case+0x170/0x3f0 [ 32.640923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.640976] kthread+0x328/0x630 [ 32.641392] ret_from_fork+0x10/0x20 [ 32.641488] [ 32.641529] The buggy address belongs to the physical page: [ 32.641562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf0 [ 32.641920] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.641974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.642175] page_type: f8(unknown) [ 32.642379] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.642435] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.642486] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.642612] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.642879] head: 0bfffe0000000002 ffffc1ffc326fc01 00000000ffffffff 00000000ffffffff [ 32.642967] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.643016] page dumped because: kasan: bad access detected [ 32.643202] [ 32.643222] Memory state around the buggy address: [ 32.643298] fff00000c9bf1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.643373] fff00000c9bf1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.643431] >fff00000c9bf2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.643816] ^ [ 32.643951] fff00000c9bf2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.643998] fff00000c9bf2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.644038] ================================================================== [ 32.626891] ================================================================== [ 32.626961] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.627035] Read of size 1 at addr fff00000c9ba2273 by task kunit_try_catch/252 [ 32.627087] [ 32.627128] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.627219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.627247] Hardware name: linux,dummy-virt (DT) [ 32.627282] Call trace: [ 32.627308] show_stack+0x20/0x38 (C) [ 32.627359] dump_stack_lvl+0x8c/0xd0 [ 32.627409] print_report+0x118/0x5d0 [ 32.627453] kasan_report+0xdc/0x128 [ 32.627495] __asan_report_load1_noabort+0x20/0x30 [ 32.627560] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.627610] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.627660] kunit_try_run_case+0x170/0x3f0 [ 32.627712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.627775] kthread+0x328/0x630 [ 32.628026] ret_from_fork+0x10/0x20 [ 32.628076] [ 32.628096] Allocated by task 252: [ 32.628126] kasan_save_stack+0x3c/0x68 [ 32.628168] kasan_save_track+0x20/0x40 [ 32.628204] kasan_save_alloc_info+0x40/0x58 [ 32.628244] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.628291] remove_element+0x130/0x1f8 [ 32.628333] mempool_alloc_preallocated+0x58/0xc0 [ 32.628375] mempool_oob_right_helper+0x98/0x2f0 [ 32.628416] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.628459] kunit_try_run_case+0x170/0x3f0 [ 32.628496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.628555] kthread+0x328/0x630 [ 32.628588] ret_from_fork+0x10/0x20 [ 32.628623] [ 32.628644] The buggy address belongs to the object at fff00000c9ba2200 [ 32.628644] which belongs to the cache kmalloc-128 of size 128 [ 32.628705] The buggy address is located 0 bytes to the right of [ 32.628705] allocated 115-byte region [fff00000c9ba2200, fff00000c9ba2273) [ 32.628771] [ 32.628794] The buggy address belongs to the physical page: [ 32.628828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2 [ 32.628887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.628940] page_type: f5(slab) [ 32.628987] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.629039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.629084] page dumped because: kasan: bad access detected [ 32.629118] [ 32.629136] Memory state around the buggy address: [ 32.629172] fff00000c9ba2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.629217] fff00000c9ba2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.629260] >fff00000c9ba2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.629301] ^ [ 32.629344] fff00000c9ba2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.629388] fff00000c9ba2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.629427] ================================================================== [ 32.654890] ================================================================== [ 32.655153] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.655393] Read of size 1 at addr fff00000c9b0a2bb by task kunit_try_catch/256 [ 32.655640] [ 32.655922] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.656198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.656395] Hardware name: linux,dummy-virt (DT) [ 32.656535] Call trace: [ 32.656569] show_stack+0x20/0x38 (C) [ 32.656649] dump_stack_lvl+0x8c/0xd0 [ 32.656955] print_report+0x118/0x5d0 [ 32.657245] kasan_report+0xdc/0x128 [ 32.657483] __asan_report_load1_noabort+0x20/0x30 [ 32.657548] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.657599] mempool_slab_oob_right+0xc0/0x118 [ 32.657690] kunit_try_run_case+0x170/0x3f0 [ 32.657917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.657972] kthread+0x328/0x630 [ 32.658014] ret_from_fork+0x10/0x20 [ 32.658114] [ 32.658133] Allocated by task 256: [ 32.658184] kasan_save_stack+0x3c/0x68 [ 32.658234] kasan_save_track+0x20/0x40 [ 32.658270] kasan_save_alloc_info+0x40/0x58 [ 32.658308] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.658350] remove_element+0x16c/0x1f8 [ 32.658438] mempool_alloc_preallocated+0x58/0xc0 [ 32.658652] mempool_oob_right_helper+0x98/0x2f0 [ 32.658693] mempool_slab_oob_right+0xc0/0x118 [ 32.658734] kunit_try_run_case+0x170/0x3f0 [ 32.658810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.659014] kthread+0x328/0x630 [ 32.659143] ret_from_fork+0x10/0x20 [ 32.659181] [ 32.659200] The buggy address belongs to the object at fff00000c9b0a240 [ 32.659200] which belongs to the cache test_cache of size 123 [ 32.659303] The buggy address is located 0 bytes to the right of [ 32.659303] allocated 123-byte region [fff00000c9b0a240, fff00000c9b0a2bb) [ 32.659461] [ 32.659481] The buggy address belongs to the physical page: [ 32.659527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0a [ 32.659580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.659627] page_type: f5(slab) [ 32.659665] raw: 0bfffe0000000000 fff00000c56a1c80 dead000000000122 0000000000000000 [ 32.659717] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.660016] page dumped because: kasan: bad access detected [ 32.660189] [ 32.660383] Memory state around the buggy address: [ 32.660423] fff00000c9b0a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.660490] fff00000c9b0a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.660545] >fff00000c9b0a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.660584] ^ [ 32.660618] fff00000c9b0a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.660875] fff00000c9b0a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.660973] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.062524] ================================================================== [ 32.062614] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.062691] Read of size 1 at addr fff00000c459e3c0 by task kunit_try_catch/246 [ 32.062746] [ 32.062790] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.062882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.062908] Hardware name: linux,dummy-virt (DT) [ 32.062943] Call trace: [ 32.062969] show_stack+0x20/0x38 (C) [ 32.063024] dump_stack_lvl+0x8c/0xd0 [ 32.063076] print_report+0x118/0x5d0 [ 32.063121] kasan_report+0xdc/0x128 [ 32.063164] __kasan_check_byte+0x54/0x70 [ 32.063210] kmem_cache_destroy+0x34/0x218 [ 32.063260] kmem_cache_double_destroy+0x174/0x300 [ 32.063311] kunit_try_run_case+0x170/0x3f0 [ 32.063361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.063414] kthread+0x328/0x630 [ 32.063458] ret_from_fork+0x10/0x20 [ 32.063519] [ 32.063538] Allocated by task 246: [ 32.063569] kasan_save_stack+0x3c/0x68 [ 32.063608] kasan_save_track+0x20/0x40 [ 32.063644] kasan_save_alloc_info+0x40/0x58 [ 32.063683] __kasan_slab_alloc+0xa8/0xb0 [ 32.063718] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.063763] __kmem_cache_create_args+0x178/0x280 [ 32.063808] kmem_cache_double_destroy+0xc0/0x300 [ 32.063849] kunit_try_run_case+0x170/0x3f0 [ 32.063889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.063933] kthread+0x328/0x630 [ 32.063968] ret_from_fork+0x10/0x20 [ 32.064005] [ 32.064024] Freed by task 246: [ 32.064050] kasan_save_stack+0x3c/0x68 [ 32.064086] kasan_save_track+0x20/0x40 [ 32.064120] kasan_save_free_info+0x4c/0x78 [ 32.064159] __kasan_slab_free+0x6c/0x98 [ 32.064194] kmem_cache_free+0x260/0x468 [ 32.064233] slab_kmem_cache_release+0x38/0x50 [ 32.064273] kmem_cache_release+0x1c/0x30 [ 32.064312] kobject_put+0x17c/0x420 [ 32.064348] sysfs_slab_release+0x1c/0x30 [ 32.064388] kmem_cache_destroy+0x118/0x218 [ 32.064429] kmem_cache_double_destroy+0x128/0x300 [ 32.064470] kunit_try_run_case+0x170/0x3f0 [ 32.064516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.064561] kthread+0x328/0x630 [ 32.064597] ret_from_fork+0x10/0x20 [ 32.064632] [ 32.064652] The buggy address belongs to the object at fff00000c459e3c0 [ 32.064652] which belongs to the cache kmem_cache of size 208 [ 32.064731] The buggy address is located 0 bytes inside of [ 32.064731] freed 208-byte region [fff00000c459e3c0, fff00000c459e490) [ 32.064794] [ 32.064817] The buggy address belongs to the physical page: [ 32.064853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10459e [ 32.064911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.064965] page_type: f5(slab) [ 32.065010] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 32.065061] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.065106] page dumped because: kasan: bad access detected [ 32.065139] [ 32.065159] Memory state around the buggy address: [ 32.065194] fff00000c459e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.065241] fff00000c459e300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 32.065286] >fff00000c459e380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.065327] ^ [ 32.065362] fff00000c459e400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.065407] fff00000c459e480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.065447] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.928334] ================================================================== [ 31.929013] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 31.929245] Read of size 1 at addr fff00000c9b0e000 by task kunit_try_catch/244 [ 31.930286] [ 31.930585] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 31.931570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.931619] Hardware name: linux,dummy-virt (DT) [ 31.931664] Call trace: [ 31.931690] show_stack+0x20/0x38 (C) [ 31.931746] dump_stack_lvl+0x8c/0xd0 [ 31.931800] print_report+0x118/0x5d0 [ 31.931843] kasan_report+0xdc/0x128 [ 31.931885] __asan_report_load1_noabort+0x20/0x30 [ 31.931935] kmem_cache_rcu_uaf+0x388/0x468 [ 31.931984] kunit_try_run_case+0x170/0x3f0 [ 31.932036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.932090] kthread+0x328/0x630 [ 31.934603] ret_from_fork+0x10/0x20 [ 31.934970] [ 31.934992] Allocated by task 244: [ 31.935716] kasan_save_stack+0x3c/0x68 [ 31.936198] kasan_save_track+0x20/0x40 [ 31.937011] kasan_save_alloc_info+0x40/0x58 [ 31.937061] __kasan_slab_alloc+0xa8/0xb0 [ 31.937097] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.937722] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.937775] kunit_try_run_case+0x170/0x3f0 [ 31.938391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.938914] kthread+0x328/0x630 [ 31.939393] ret_from_fork+0x10/0x20 [ 31.939663] [ 31.939683] Freed by task 0: [ 31.939714] kasan_save_stack+0x3c/0x68 [ 31.939954] kasan_save_track+0x20/0x40 [ 31.939996] kasan_save_free_info+0x4c/0x78 [ 31.940800] __kasan_slab_free+0x6c/0x98 [ 31.940923] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.941988] rcu_core+0x9f4/0x1e20 [ 31.942399] rcu_core_si+0x18/0x30 [ 31.942792] handle_softirqs+0x374/0xb28 [ 31.943520] __do_softirq+0x1c/0x28 [ 31.943832] [ 31.943858] Last potentially related work creation: [ 31.943898] kasan_save_stack+0x3c/0x68 [ 31.943939] kasan_record_aux_stack+0xb4/0xc8 [ 31.944759] kmem_cache_free+0x120/0x468 [ 31.945050] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.945584] kunit_try_run_case+0x170/0x3f0 [ 31.946059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.946460] kthread+0x328/0x630 [ 31.946819] ret_from_fork+0x10/0x20 [ 31.946925] [ 31.946945] The buggy address belongs to the object at fff00000c9b0e000 [ 31.946945] which belongs to the cache test_cache of size 200 [ 31.947307] The buggy address is located 0 bytes inside of [ 31.947307] freed 200-byte region [fff00000c9b0e000, fff00000c9b0e0c8) [ 31.947405] [ 31.947434] The buggy address belongs to the physical page: [ 31.947480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0e [ 31.948534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.948599] page_type: f5(slab) [ 31.948772] raw: 0bfffe0000000000 fff00000c56a1b40 dead000000000122 0000000000000000 [ 31.949129] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.949339] page dumped because: kasan: bad access detected [ 31.949758] [ 31.949785] Memory state around the buggy address: [ 31.949848] fff00000c9b0df00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.950196] fff00000c9b0df80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.950453] >fff00000c9b0e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.950738] ^ [ 31.950810] fff00000c9b0e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.950855] fff00000c9b0e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.951349] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.198799] ================================================================== [ 31.199079] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.199152] Free of addr fff00000c9a59001 by task kunit_try_catch/242 [ 31.199197] [ 31.199412] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 31.199588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.199625] Hardware name: linux,dummy-virt (DT) [ 31.199684] Call trace: [ 31.199709] show_stack+0x20/0x38 (C) [ 31.199836] dump_stack_lvl+0x8c/0xd0 [ 31.199893] print_report+0x118/0x5d0 [ 31.199936] kasan_report_invalid_free+0xc0/0xe8 [ 31.199984] check_slab_allocation+0xfc/0x108 [ 31.200035] __kasan_slab_pre_free+0x2c/0x48 [ 31.200373] kmem_cache_free+0xf0/0x468 [ 31.200521] kmem_cache_invalid_free+0x184/0x3c8 [ 31.200606] kunit_try_run_case+0x170/0x3f0 [ 31.200722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.200811] kthread+0x328/0x630 [ 31.200909] ret_from_fork+0x10/0x20 [ 31.200990] [ 31.201008] Allocated by task 242: [ 31.201037] kasan_save_stack+0x3c/0x68 [ 31.201118] kasan_save_track+0x20/0x40 [ 31.201673] kasan_save_alloc_info+0x40/0x58 [ 31.201714] __kasan_slab_alloc+0xa8/0xb0 [ 31.201751] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.203954] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.204025] kunit_try_run_case+0x170/0x3f0 [ 31.205428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.207790] kthread+0x328/0x630 [ 31.207853] ret_from_fork+0x10/0x20 [ 31.207892] [ 31.207912] The buggy address belongs to the object at fff00000c9a59000 [ 31.207912] which belongs to the cache test_cache of size 200 [ 31.207974] The buggy address is located 1 bytes inside of [ 31.207974] 200-byte region [fff00000c9a59000, fff00000c9a590c8) [ 31.208035] [ 31.208058] The buggy address belongs to the physical page: [ 31.208092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a59 [ 31.208150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.208201] page_type: f5(slab) [ 31.208240] raw: 0bfffe0000000000 fff00000c56a1a00 dead000000000122 0000000000000000 [ 31.208291] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.208333] page dumped because: kasan: bad access detected [ 31.208366] [ 31.208383] Memory state around the buggy address: [ 31.208415] fff00000c9a58f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.208461] fff00000c9a58f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.208522] >fff00000c9a59000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.208563] ^ [ 31.208589] fff00000c9a59080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.208632] fff00000c9a59100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.209405] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.175738] ================================================================== [ 31.176052] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.176203] Free of addr fff00000c9a5a000 by task kunit_try_catch/240 [ 31.176282] [ 31.176400] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 31.176521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.176705] Hardware name: linux,dummy-virt (DT) [ 31.176751] Call trace: [ 31.176775] show_stack+0x20/0x38 (C) [ 31.176848] dump_stack_lvl+0x8c/0xd0 [ 31.176902] print_report+0x118/0x5d0 [ 31.176946] kasan_report_invalid_free+0xc0/0xe8 [ 31.176995] check_slab_allocation+0xd4/0x108 [ 31.177102] __kasan_slab_pre_free+0x2c/0x48 [ 31.177321] kmem_cache_free+0xf0/0x468 [ 31.177433] kmem_cache_double_free+0x190/0x3c8 [ 31.177577] kunit_try_run_case+0x170/0x3f0 [ 31.177698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.177844] kthread+0x328/0x630 [ 31.177921] ret_from_fork+0x10/0x20 [ 31.177990] [ 31.178014] Allocated by task 240: [ 31.178043] kasan_save_stack+0x3c/0x68 [ 31.178083] kasan_save_track+0x20/0x40 [ 31.178129] kasan_save_alloc_info+0x40/0x58 [ 31.178178] __kasan_slab_alloc+0xa8/0xb0 [ 31.178227] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.178271] kmem_cache_double_free+0x12c/0x3c8 [ 31.178312] kunit_try_run_case+0x170/0x3f0 [ 31.178363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.178424] kthread+0x328/0x630 [ 31.178463] ret_from_fork+0x10/0x20 [ 31.178500] [ 31.178538] Freed by task 240: [ 31.178565] kasan_save_stack+0x3c/0x68 [ 31.178610] kasan_save_track+0x20/0x40 [ 31.178644] kasan_save_free_info+0x4c/0x78 [ 31.178691] __kasan_slab_free+0x6c/0x98 [ 31.178735] kmem_cache_free+0x260/0x468 [ 31.178783] kmem_cache_double_free+0x140/0x3c8 [ 31.178831] kunit_try_run_case+0x170/0x3f0 [ 31.178868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.178920] kthread+0x328/0x630 [ 31.178953] ret_from_fork+0x10/0x20 [ 31.178997] [ 31.179016] The buggy address belongs to the object at fff00000c9a5a000 [ 31.179016] which belongs to the cache test_cache of size 200 [ 31.179075] The buggy address is located 0 bytes inside of [ 31.179075] 200-byte region [fff00000c9a5a000, fff00000c9a5a0c8) [ 31.179135] [ 31.179157] The buggy address belongs to the physical page: [ 31.179190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5a [ 31.179248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.179303] page_type: f5(slab) [ 31.179356] raw: 0bfffe0000000000 fff00000c56a18c0 dead000000000122 0000000000000000 [ 31.179408] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.179459] page dumped because: kasan: bad access detected [ 31.179491] [ 31.179519] Memory state around the buggy address: [ 31.179554] fff00000c9a59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.179599] fff00000c9a59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.179845] >fff00000c9a5a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.180172] ^ [ 31.180207] fff00000c9a5a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.180254] fff00000c9a5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.034130] ================================================================== [ 31.034343] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.034562] Read of size 1 at addr fff00000c9a5d0c8 by task kunit_try_catch/238 [ 31.034627] [ 31.034658] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 31.034784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.034811] Hardware name: linux,dummy-virt (DT) [ 31.034844] Call trace: [ 31.034885] show_stack+0x20/0x38 (C) [ 31.034950] dump_stack_lvl+0x8c/0xd0 [ 31.035058] print_report+0x118/0x5d0 [ 31.035123] kasan_report+0xdc/0x128 [ 31.035200] __asan_report_load1_noabort+0x20/0x30 [ 31.035251] kmem_cache_oob+0x344/0x430 [ 31.035296] kunit_try_run_case+0x170/0x3f0 [ 31.035374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.035525] kthread+0x328/0x630 [ 31.035570] ret_from_fork+0x10/0x20 [ 31.035978] [ 31.036011] Allocated by task 238: [ 31.036291] kasan_save_stack+0x3c/0x68 [ 31.036378] kasan_save_track+0x20/0x40 [ 31.036488] kasan_save_alloc_info+0x40/0x58 [ 31.036589] __kasan_slab_alloc+0xa8/0xb0 [ 31.036681] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.036782] kmem_cache_oob+0x12c/0x430 [ 31.036923] kunit_try_run_case+0x170/0x3f0 [ 31.036979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.037022] kthread+0x328/0x630 [ 31.037076] ret_from_fork+0x10/0x20 [ 31.037114] [ 31.037133] The buggy address belongs to the object at fff00000c9a5d000 [ 31.037133] which belongs to the cache test_cache of size 200 [ 31.037193] The buggy address is located 0 bytes to the right of [ 31.037193] allocated 200-byte region [fff00000c9a5d000, fff00000c9a5d0c8) [ 31.037479] [ 31.037566] The buggy address belongs to the physical page: [ 31.037665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5d [ 31.037796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.037861] page_type: f5(slab) [ 31.037898] raw: 0bfffe0000000000 fff00000c56a1780 dead000000000122 0000000000000000 [ 31.037972] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.038028] page dumped because: kasan: bad access detected [ 31.038263] [ 31.038306] Memory state around the buggy address: [ 31.038422] fff00000c9a5cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.038529] fff00000c9a5d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.038573] >fff00000c9a5d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.038612] ^ [ 31.038758] fff00000c9a5d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.038892] fff00000c9a5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.038971] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.013428] ================================================================== [ 31.013489] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.013601] Read of size 8 at addr fff00000c9a5f000 by task kunit_try_catch/231 [ 31.013654] [ 31.013748] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 31.013837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.013864] Hardware name: linux,dummy-virt (DT) [ 31.013897] Call trace: [ 31.013972] show_stack+0x20/0x38 (C) [ 31.014048] dump_stack_lvl+0x8c/0xd0 [ 31.014129] print_report+0x118/0x5d0 [ 31.014181] kasan_report+0xdc/0x128 [ 31.014224] __asan_report_load8_noabort+0x20/0x30 [ 31.014274] workqueue_uaf+0x480/0x4a8 [ 31.014325] kunit_try_run_case+0x170/0x3f0 [ 31.014477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.014543] kthread+0x328/0x630 [ 31.014585] ret_from_fork+0x10/0x20 [ 31.014642] [ 31.014704] Allocated by task 231: [ 31.014763] kasan_save_stack+0x3c/0x68 [ 31.014803] kasan_save_track+0x20/0x40 [ 31.014866] kasan_save_alloc_info+0x40/0x58 [ 31.014912] __kasan_kmalloc+0xd4/0xd8 [ 31.014958] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.015033] workqueue_uaf+0x13c/0x4a8 [ 31.015109] kunit_try_run_case+0x170/0x3f0 [ 31.015164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.015250] kthread+0x328/0x630 [ 31.015308] ret_from_fork+0x10/0x20 [ 31.015344] [ 31.015362] Freed by task 75: [ 31.015459] kasan_save_stack+0x3c/0x68 [ 31.015531] kasan_save_track+0x20/0x40 [ 31.015566] kasan_save_free_info+0x4c/0x78 [ 31.015604] __kasan_slab_free+0x6c/0x98 [ 31.015653] kfree+0x214/0x3c8 [ 31.015697] workqueue_uaf_work+0x18/0x30 [ 31.015734] process_one_work+0x530/0xf98 [ 31.015782] worker_thread+0x618/0xf38 [ 31.015837] kthread+0x328/0x630 [ 31.015872] ret_from_fork+0x10/0x20 [ 31.015908] [ 31.015926] Last potentially related work creation: [ 31.016127] kasan_save_stack+0x3c/0x68 [ 31.016267] kasan_record_aux_stack+0xb4/0xc8 [ 31.016331] __queue_work+0x65c/0xfe0 [ 31.016492] queue_work_on+0xbc/0xf8 [ 31.016626] workqueue_uaf+0x210/0x4a8 [ 31.016712] kunit_try_run_case+0x170/0x3f0 [ 31.016770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.016950] kthread+0x328/0x630 [ 31.016983] ret_from_fork+0x10/0x20 [ 31.017019] [ 31.017037] The buggy address belongs to the object at fff00000c9a5f000 [ 31.017037] which belongs to the cache kmalloc-32 of size 32 [ 31.017098] The buggy address is located 0 bytes inside of [ 31.017098] freed 32-byte region [fff00000c9a5f000, fff00000c9a5f020) [ 31.017176] [ 31.017196] The buggy address belongs to the physical page: [ 31.017228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5f [ 31.017280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.017330] page_type: f5(slab) [ 31.017368] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.017476] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.017655] page dumped because: kasan: bad access detected [ 31.017732] [ 31.017920] Memory state around the buggy address: [ 31.018031] fff00000c9a5ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.018140] fff00000c9a5ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.018258] >fff00000c9a5f000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.018370] ^ [ 31.018397] fff00000c9a5f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.018450] fff00000c9a5f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.018498] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 30.982008] ================================================================== [ 30.982662] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.982757] Read of size 4 at addr fff00000c9b16e80 by task ksoftirqd/0/15 [ 30.982807] [ 30.982846] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.982934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.983322] Hardware name: linux,dummy-virt (DT) [ 30.983371] Call trace: [ 30.983409] show_stack+0x20/0x38 (C) [ 30.983831] dump_stack_lvl+0x8c/0xd0 [ 30.984038] print_report+0x118/0x5d0 [ 30.984095] kasan_report+0xdc/0x128 [ 30.984171] __asan_report_load4_noabort+0x20/0x30 [ 30.984300] rcu_uaf_reclaim+0x64/0x70 [ 30.984346] rcu_core+0x9f4/0x1e20 [ 30.984871] rcu_core_si+0x18/0x30 [ 30.984980] handle_softirqs+0x374/0xb28 [ 30.985029] run_ksoftirqd+0x80/0xb0 [ 30.985074] smpboot_thread_fn+0x2e8/0x760 [ 30.985550] kthread+0x328/0x630 [ 30.985615] ret_from_fork+0x10/0x20 [ 30.985663] [ 30.985855] Allocated by task 229: [ 30.986138] kasan_save_stack+0x3c/0x68 [ 30.986200] kasan_save_track+0x20/0x40 [ 30.986469] kasan_save_alloc_info+0x40/0x58 [ 30.986714] __kasan_kmalloc+0xd4/0xd8 [ 30.986756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.986799] rcu_uaf+0xb0/0x2d8 [ 30.986835] kunit_try_run_case+0x170/0x3f0 [ 30.986875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.986919] kthread+0x328/0x630 [ 30.987134] ret_from_fork+0x10/0x20 [ 30.987181] [ 30.987214] Freed by task 15: [ 30.987242] kasan_save_stack+0x3c/0x68 [ 30.987802] kasan_save_track+0x20/0x40 [ 30.988054] kasan_save_free_info+0x4c/0x78 [ 30.988097] __kasan_slab_free+0x6c/0x98 [ 30.988611] kfree+0x214/0x3c8 [ 30.988650] rcu_uaf_reclaim+0x28/0x70 [ 30.988953] rcu_core+0x9f4/0x1e20 [ 30.989007] rcu_core_si+0x18/0x30 [ 30.989043] handle_softirqs+0x374/0xb28 [ 30.989083] run_ksoftirqd+0x80/0xb0 [ 30.989120] smpboot_thread_fn+0x2e8/0x760 [ 30.989161] kthread+0x328/0x630 [ 30.989196] ret_from_fork+0x10/0x20 [ 30.989244] [ 30.989291] Last potentially related work creation: [ 30.989328] kasan_save_stack+0x3c/0x68 [ 30.989367] kasan_record_aux_stack+0xb4/0xc8 [ 30.989407] __call_rcu_common.constprop.0+0x74/0x8c8 [ 30.989450] call_rcu+0x18/0x30 [ 30.989486] rcu_uaf+0x14c/0x2d8 [ 30.989535] kunit_try_run_case+0x170/0x3f0 [ 30.989626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.989736] kthread+0x328/0x630 [ 30.989784] ret_from_fork+0x10/0x20 [ 30.990195] [ 30.990730] The buggy address belongs to the object at fff00000c9b16e80 [ 30.990730] which belongs to the cache kmalloc-32 of size 32 [ 30.991294] The buggy address is located 0 bytes inside of [ 30.991294] freed 32-byte region [fff00000c9b16e80, fff00000c9b16ea0) [ 30.991959] [ 30.992132] The buggy address belongs to the physical page: [ 30.992168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b16 [ 30.992226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.992711] page_type: f5(slab) [ 30.992782] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.993539] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.993901] page dumped because: kasan: bad access detected [ 30.994189] [ 30.994213] Memory state around the buggy address: [ 30.994686] fff00000c9b16d80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 30.995022] fff00000c9b16e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.995410] >fff00000c9b16e80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.995896] ^ [ 30.996054] fff00000c9b16f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.996194] fff00000c9b16f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.996946] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.827164] ================================================================== [ 30.827222] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.827274] Read of size 1 at addr fff00000c6361f00 by task kunit_try_catch/227 [ 30.827325] [ 30.827364] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.827464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.827493] Hardware name: linux,dummy-virt (DT) [ 30.827910] Call trace: [ 30.828251] show_stack+0x20/0x38 (C) [ 30.828308] dump_stack_lvl+0x8c/0xd0 [ 30.828376] print_report+0x118/0x5d0 [ 30.828579] kasan_report+0xdc/0x128 [ 30.828686] __kasan_check_byte+0x54/0x70 [ 30.828791] ksize+0x30/0x88 [ 30.828875] ksize_uaf+0x168/0x5f8 [ 30.829098] kunit_try_run_case+0x170/0x3f0 [ 30.829236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.829360] kthread+0x328/0x630 [ 30.829500] ret_from_fork+0x10/0x20 [ 30.829696] [ 30.829787] Allocated by task 227: [ 30.829911] kasan_save_stack+0x3c/0x68 [ 30.830000] kasan_save_track+0x20/0x40 [ 30.830146] kasan_save_alloc_info+0x40/0x58 [ 30.830212] __kasan_kmalloc+0xd4/0xd8 [ 30.830360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.830607] ksize_uaf+0xb8/0x5f8 [ 30.830687] kunit_try_run_case+0x170/0x3f0 [ 30.830823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.830901] kthread+0x328/0x630 [ 30.830933] ret_from_fork+0x10/0x20 [ 30.831119] [ 30.831204] Freed by task 227: [ 30.831466] kasan_save_stack+0x3c/0x68 [ 30.831523] kasan_save_track+0x20/0x40 [ 30.831721] kasan_save_free_info+0x4c/0x78 [ 30.831925] __kasan_slab_free+0x6c/0x98 [ 30.832063] kfree+0x214/0x3c8 [ 30.832252] ksize_uaf+0x11c/0x5f8 [ 30.832387] kunit_try_run_case+0x170/0x3f0 [ 30.832548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.832689] kthread+0x328/0x630 [ 30.832786] ret_from_fork+0x10/0x20 [ 30.832888] [ 30.832940] The buggy address belongs to the object at fff00000c6361f00 [ 30.832940] which belongs to the cache kmalloc-128 of size 128 [ 30.833050] The buggy address is located 0 bytes inside of [ 30.833050] freed 128-byte region [fff00000c6361f00, fff00000c6361f80) [ 30.833501] [ 30.833588] The buggy address belongs to the physical page: [ 30.833629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.833876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.833985] page_type: f5(slab) [ 30.834043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.834169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.834417] page dumped because: kasan: bad access detected [ 30.834622] [ 30.834835] Memory state around the buggy address: [ 30.834942] fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.835035] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.835269] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.835409] ^ [ 30.835540] fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.835621] fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.835806] ================================================================== [ 30.836982] ================================================================== [ 30.837034] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.837083] Read of size 1 at addr fff00000c6361f00 by task kunit_try_catch/227 [ 30.837334] [ 30.837448] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.837718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.837883] Hardware name: linux,dummy-virt (DT) [ 30.837949] Call trace: [ 30.838016] show_stack+0x20/0x38 (C) [ 30.838068] dump_stack_lvl+0x8c/0xd0 [ 30.838143] print_report+0x118/0x5d0 [ 30.838193] kasan_report+0xdc/0x128 [ 30.838237] __asan_report_load1_noabort+0x20/0x30 [ 30.838568] ksize_uaf+0x598/0x5f8 [ 30.838677] kunit_try_run_case+0x170/0x3f0 [ 30.838732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.838815] kthread+0x328/0x630 [ 30.838861] ret_from_fork+0x10/0x20 [ 30.838945] [ 30.839124] Allocated by task 227: [ 30.839220] kasan_save_stack+0x3c/0x68 [ 30.839384] kasan_save_track+0x20/0x40 [ 30.839426] kasan_save_alloc_info+0x40/0x58 [ 30.839698] __kasan_kmalloc+0xd4/0xd8 [ 30.839813] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.839904] ksize_uaf+0xb8/0x5f8 [ 30.840027] kunit_try_run_case+0x170/0x3f0 [ 30.840085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.840131] kthread+0x328/0x630 [ 30.840184] ret_from_fork+0x10/0x20 [ 30.840222] [ 30.840383] Freed by task 227: [ 30.840530] kasan_save_stack+0x3c/0x68 [ 30.840679] kasan_save_track+0x20/0x40 [ 30.840793] kasan_save_free_info+0x4c/0x78 [ 30.840863] __kasan_slab_free+0x6c/0x98 [ 30.840901] kfree+0x214/0x3c8 [ 30.840936] ksize_uaf+0x11c/0x5f8 [ 30.840984] kunit_try_run_case+0x170/0x3f0 [ 30.841032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.841077] kthread+0x328/0x630 [ 30.841110] ret_from_fork+0x10/0x20 [ 30.841147] [ 30.841166] The buggy address belongs to the object at fff00000c6361f00 [ 30.841166] which belongs to the cache kmalloc-128 of size 128 [ 30.841250] The buggy address is located 0 bytes inside of [ 30.841250] freed 128-byte region [fff00000c6361f00, fff00000c6361f80) [ 30.841325] [ 30.841356] The buggy address belongs to the physical page: [ 30.841388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.841448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.841497] page_type: f5(slab) [ 30.841554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.841615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.841662] page dumped because: kasan: bad access detected [ 30.841694] [ 30.841711] Memory state around the buggy address: [ 30.841755] fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.841818] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.841872] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.841919] ^ [ 30.841953] fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.842012] fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.842051] ================================================================== [ 30.842923] ================================================================== [ 30.842984] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.843041] Read of size 1 at addr fff00000c6361f78 by task kunit_try_catch/227 [ 30.843215] [ 30.843336] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.843467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.843525] Hardware name: linux,dummy-virt (DT) [ 30.843719] Call trace: [ 30.843767] show_stack+0x20/0x38 (C) [ 30.843920] dump_stack_lvl+0x8c/0xd0 [ 30.844097] print_report+0x118/0x5d0 [ 30.844215] kasan_report+0xdc/0x128 [ 30.844345] __asan_report_load1_noabort+0x20/0x30 [ 30.844455] ksize_uaf+0x544/0x5f8 [ 30.844536] kunit_try_run_case+0x170/0x3f0 [ 30.844714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.844897] kthread+0x328/0x630 [ 30.844959] ret_from_fork+0x10/0x20 [ 30.845185] [ 30.845272] Allocated by task 227: [ 30.845438] kasan_save_stack+0x3c/0x68 [ 30.845530] kasan_save_track+0x20/0x40 [ 30.845603] kasan_save_alloc_info+0x40/0x58 [ 30.845741] __kasan_kmalloc+0xd4/0xd8 [ 30.845787] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.845961] ksize_uaf+0xb8/0x5f8 [ 30.846111] kunit_try_run_case+0x170/0x3f0 [ 30.846244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.846324] kthread+0x328/0x630 [ 30.846490] ret_from_fork+0x10/0x20 [ 30.846660] [ 30.846739] Freed by task 227: [ 30.846976] kasan_save_stack+0x3c/0x68 [ 30.847060] kasan_save_track+0x20/0x40 [ 30.847217] kasan_save_free_info+0x4c/0x78 [ 30.847372] __kasan_slab_free+0x6c/0x98 [ 30.847462] kfree+0x214/0x3c8 [ 30.847619] ksize_uaf+0x11c/0x5f8 [ 30.847720] kunit_try_run_case+0x170/0x3f0 [ 30.847862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.847909] kthread+0x328/0x630 [ 30.848134] ret_from_fork+0x10/0x20 [ 30.848307] [ 30.848340] The buggy address belongs to the object at fff00000c6361f00 [ 30.848340] which belongs to the cache kmalloc-128 of size 128 [ 30.848501] The buggy address is located 120 bytes inside of [ 30.848501] freed 128-byte region [fff00000c6361f00, fff00000c6361f80) [ 30.848726] [ 30.848859] The buggy address belongs to the physical page: [ 30.848950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.849015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.849188] page_type: f5(slab) [ 30.849262] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.849373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.849440] page dumped because: kasan: bad access detected [ 30.849609] [ 30.849834] Memory state around the buggy address: [ 30.849922] fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.850102] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.850185] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.850297] ^ [ 30.850400] fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.850502] fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.850553] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.801420] ================================================================== [ 30.801484] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.801733] Read of size 1 at addr fff00000c6361e73 by task kunit_try_catch/225 [ 30.801827] [ 30.801940] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.802030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.802058] Hardware name: linux,dummy-virt (DT) [ 30.802160] Call trace: [ 30.802185] show_stack+0x20/0x38 (C) [ 30.802252] dump_stack_lvl+0x8c/0xd0 [ 30.802360] print_report+0x118/0x5d0 [ 30.802409] kasan_report+0xdc/0x128 [ 30.802590] __asan_report_load1_noabort+0x20/0x30 [ 30.802826] ksize_unpoisons_memory+0x628/0x740 [ 30.802895] kunit_try_run_case+0x170/0x3f0 [ 30.802963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.803083] kthread+0x328/0x630 [ 30.803130] ret_from_fork+0x10/0x20 [ 30.803187] [ 30.803206] Allocated by task 225: [ 30.803386] kasan_save_stack+0x3c/0x68 [ 30.803438] kasan_save_track+0x20/0x40 [ 30.803595] kasan_save_alloc_info+0x40/0x58 [ 30.803704] __kasan_kmalloc+0xd4/0xd8 [ 30.803769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.803851] ksize_unpoisons_memory+0xc0/0x740 [ 30.803894] kunit_try_run_case+0x170/0x3f0 [ 30.804040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.804137] kthread+0x328/0x630 [ 30.804301] ret_from_fork+0x10/0x20 [ 30.804339] [ 30.804359] The buggy address belongs to the object at fff00000c6361e00 [ 30.804359] which belongs to the cache kmalloc-128 of size 128 [ 30.804438] The buggy address is located 0 bytes to the right of [ 30.804438] allocated 115-byte region [fff00000c6361e00, fff00000c6361e73) [ 30.804668] [ 30.804864] The buggy address belongs to the physical page: [ 30.804920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.805083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.805264] page_type: f5(slab) [ 30.805382] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.805447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.805553] page dumped because: kasan: bad access detected [ 30.805587] [ 30.805629] Memory state around the buggy address: [ 30.805874] fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.805968] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.806105] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.806288] ^ [ 30.806389] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.806619] fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.806690] ================================================================== [ 30.807758] ================================================================== [ 30.808054] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.808279] Read of size 1 at addr fff00000c6361e78 by task kunit_try_catch/225 [ 30.808436] [ 30.808514] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.808688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.808767] Hardware name: linux,dummy-virt (DT) [ 30.808887] Call trace: [ 30.808988] show_stack+0x20/0x38 (C) [ 30.809067] dump_stack_lvl+0x8c/0xd0 [ 30.809245] print_report+0x118/0x5d0 [ 30.809395] kasan_report+0xdc/0x128 [ 30.809593] __asan_report_load1_noabort+0x20/0x30 [ 30.809757] ksize_unpoisons_memory+0x618/0x740 [ 30.809947] kunit_try_run_case+0x170/0x3f0 [ 30.810020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.810073] kthread+0x328/0x630 [ 30.810277] ret_from_fork+0x10/0x20 [ 30.810420] [ 30.810565] Allocated by task 225: [ 30.810635] kasan_save_stack+0x3c/0x68 [ 30.810806] kasan_save_track+0x20/0x40 [ 30.810848] kasan_save_alloc_info+0x40/0x58 [ 30.810952] __kasan_kmalloc+0xd4/0xd8 [ 30.810994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.811035] ksize_unpoisons_memory+0xc0/0x740 [ 30.811076] kunit_try_run_case+0x170/0x3f0 [ 30.811124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.811178] kthread+0x328/0x630 [ 30.811224] ret_from_fork+0x10/0x20 [ 30.811261] [ 30.811296] The buggy address belongs to the object at fff00000c6361e00 [ 30.811296] which belongs to the cache kmalloc-128 of size 128 [ 30.811356] The buggy address is located 5 bytes to the right of [ 30.811356] allocated 115-byte region [fff00000c6361e00, fff00000c6361e73) [ 30.811438] [ 30.811457] The buggy address belongs to the physical page: [ 30.811489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.811768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.811859] page_type: f5(slab) [ 30.812058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.812240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.812331] page dumped because: kasan: bad access detected [ 30.812528] [ 30.812601] Memory state around the buggy address: [ 30.812635] fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.812796] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.813108] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.813229] ^ [ 30.813318] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.813481] fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.813611] ================================================================== [ 30.815074] ================================================================== [ 30.815172] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.815346] Read of size 1 at addr fff00000c6361e7f by task kunit_try_catch/225 [ 30.815440] [ 30.815551] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.815641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.815895] Hardware name: linux,dummy-virt (DT) [ 30.816067] Call trace: [ 30.816137] show_stack+0x20/0x38 (C) [ 30.816297] dump_stack_lvl+0x8c/0xd0 [ 30.816388] print_report+0x118/0x5d0 [ 30.816465] kasan_report+0xdc/0x128 [ 30.816639] __asan_report_load1_noabort+0x20/0x30 [ 30.816693] ksize_unpoisons_memory+0x690/0x740 [ 30.816924] kunit_try_run_case+0x170/0x3f0 [ 30.817123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.817265] kthread+0x328/0x630 [ 30.817364] ret_from_fork+0x10/0x20 [ 30.817589] [ 30.817649] Allocated by task 225: [ 30.817739] kasan_save_stack+0x3c/0x68 [ 30.817796] kasan_save_track+0x20/0x40 [ 30.817850] kasan_save_alloc_info+0x40/0x58 [ 30.817895] __kasan_kmalloc+0xd4/0xd8 [ 30.817942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.817991] ksize_unpoisons_memory+0xc0/0x740 [ 30.818032] kunit_try_run_case+0x170/0x3f0 [ 30.818069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.818115] kthread+0x328/0x630 [ 30.818148] ret_from_fork+0x10/0x20 [ 30.818184] [ 30.818203] The buggy address belongs to the object at fff00000c6361e00 [ 30.818203] which belongs to the cache kmalloc-128 of size 128 [ 30.818276] The buggy address is located 12 bytes to the right of [ 30.818276] allocated 115-byte region [fff00000c6361e00, fff00000c6361e73) [ 30.818345] [ 30.818371] The buggy address belongs to the physical page: [ 30.818422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.818478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.818747] page_type: f5(slab) [ 30.818844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.819062] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.819203] page dumped because: kasan: bad access detected [ 30.819285] [ 30.819366] Memory state around the buggy address: [ 30.819561] fff00000c6361d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.819632] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.819964] >fff00000c6361e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.820157] ^ [ 30.820310] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.820379] fff00000c6361f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.820468] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.789364] ================================================================== [ 30.789440] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.789632] Free of addr fff00000c6360300 by task kunit_try_catch/223 [ 30.789740] [ 30.789801] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.789953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.790011] Hardware name: linux,dummy-virt (DT) [ 30.790057] Call trace: [ 30.790081] show_stack+0x20/0x38 (C) [ 30.790271] dump_stack_lvl+0x8c/0xd0 [ 30.790560] print_report+0x118/0x5d0 [ 30.790634] kasan_report_invalid_free+0xc0/0xe8 [ 30.790685] check_slab_allocation+0xd4/0x108 [ 30.790875] __kasan_slab_pre_free+0x2c/0x48 [ 30.791012] kfree+0xe8/0x3c8 [ 30.791090] kfree_sensitive+0x3c/0xb0 [ 30.791142] kmalloc_double_kzfree+0x168/0x308 [ 30.791248] kunit_try_run_case+0x170/0x3f0 [ 30.791328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.791539] kthread+0x328/0x630 [ 30.791592] ret_from_fork+0x10/0x20 [ 30.791646] [ 30.791665] Allocated by task 223: [ 30.791770] kasan_save_stack+0x3c/0x68 [ 30.791907] kasan_save_track+0x20/0x40 [ 30.792031] kasan_save_alloc_info+0x40/0x58 [ 30.792071] __kasan_kmalloc+0xd4/0xd8 [ 30.792290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.792419] kmalloc_double_kzfree+0xb8/0x308 [ 30.792491] kunit_try_run_case+0x170/0x3f0 [ 30.792662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.792722] kthread+0x328/0x630 [ 30.792860] ret_from_fork+0x10/0x20 [ 30.792986] [ 30.793018] Freed by task 223: [ 30.793047] kasan_save_stack+0x3c/0x68 [ 30.793090] kasan_save_track+0x20/0x40 [ 30.793130] kasan_save_free_info+0x4c/0x78 [ 30.793169] __kasan_slab_free+0x6c/0x98 [ 30.793206] kfree+0x214/0x3c8 [ 30.793241] kfree_sensitive+0x80/0xb0 [ 30.793283] kmalloc_double_kzfree+0x11c/0x308 [ 30.793338] kunit_try_run_case+0x170/0x3f0 [ 30.793383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.793427] kthread+0x328/0x630 [ 30.793469] ret_from_fork+0x10/0x20 [ 30.793517] [ 30.793538] The buggy address belongs to the object at fff00000c6360300 [ 30.793538] which belongs to the cache kmalloc-16 of size 16 [ 30.793598] The buggy address is located 0 bytes inside of [ 30.793598] 16-byte region [fff00000c6360300, fff00000c6360310) [ 30.793659] [ 30.793679] The buggy address belongs to the physical page: [ 30.793719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 30.793771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.793821] page_type: f5(slab) [ 30.793869] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.793920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.793962] page dumped because: kasan: bad access detected [ 30.794004] [ 30.794024] Memory state around the buggy address: [ 30.794066] fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.794113] fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.794164] >fff00000c6360300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.794204] ^ [ 30.794232] fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.794281] fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.794326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.781860] ================================================================== [ 30.782016] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.782080] Read of size 1 at addr fff00000c6360300 by task kunit_try_catch/223 [ 30.782140] [ 30.782394] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.782534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.782601] Hardware name: linux,dummy-virt (DT) [ 30.782636] Call trace: [ 30.782712] show_stack+0x20/0x38 (C) [ 30.782870] dump_stack_lvl+0x8c/0xd0 [ 30.782938] print_report+0x118/0x5d0 [ 30.782984] kasan_report+0xdc/0x128 [ 30.783027] __kasan_check_byte+0x54/0x70 [ 30.783109] kfree_sensitive+0x30/0xb0 [ 30.783162] kmalloc_double_kzfree+0x168/0x308 [ 30.783308] kunit_try_run_case+0x170/0x3f0 [ 30.783363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.783417] kthread+0x328/0x630 [ 30.783470] ret_from_fork+0x10/0x20 [ 30.783529] [ 30.783761] Allocated by task 223: [ 30.784002] kasan_save_stack+0x3c/0x68 [ 30.784139] kasan_save_track+0x20/0x40 [ 30.784274] kasan_save_alloc_info+0x40/0x58 [ 30.784437] __kasan_kmalloc+0xd4/0xd8 [ 30.784529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.784663] kmalloc_double_kzfree+0xb8/0x308 [ 30.784703] kunit_try_run_case+0x170/0x3f0 [ 30.784749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.784813] kthread+0x328/0x630 [ 30.784848] ret_from_fork+0x10/0x20 [ 30.784883] [ 30.785033] Freed by task 223: [ 30.785156] kasan_save_stack+0x3c/0x68 [ 30.785297] kasan_save_track+0x20/0x40 [ 30.785409] kasan_save_free_info+0x4c/0x78 [ 30.785498] __kasan_slab_free+0x6c/0x98 [ 30.785616] kfree+0x214/0x3c8 [ 30.785650] kfree_sensitive+0x80/0xb0 [ 30.785814] kmalloc_double_kzfree+0x11c/0x308 [ 30.785998] kunit_try_run_case+0x170/0x3f0 [ 30.786167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.786263] kthread+0x328/0x630 [ 30.786300] ret_from_fork+0x10/0x20 [ 30.786552] [ 30.786734] The buggy address belongs to the object at fff00000c6360300 [ 30.786734] which belongs to the cache kmalloc-16 of size 16 [ 30.786998] The buggy address is located 0 bytes inside of [ 30.786998] freed 16-byte region [fff00000c6360300, fff00000c6360310) [ 30.787180] [ 30.787260] The buggy address belongs to the physical page: [ 30.787293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 30.787378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.787428] page_type: f5(slab) [ 30.787475] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.787537] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.787580] page dumped because: kasan: bad access detected [ 30.787624] [ 30.787641] Memory state around the buggy address: [ 30.787674] fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.787723] fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.787767] >fff00000c6360300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.787992] ^ [ 30.788025] fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.788145] fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.788421] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 30.760670] ================================================================== [ 30.760884] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.761051] Read of size 1 at addr fff00000c637afa8 by task kunit_try_catch/219 [ 30.761127] [ 30.761230] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.761331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.761358] Hardware name: linux,dummy-virt (DT) [ 30.761392] Call trace: [ 30.761450] show_stack+0x20/0x38 (C) [ 30.761660] dump_stack_lvl+0x8c/0xd0 [ 30.761780] print_report+0x118/0x5d0 [ 30.761865] kasan_report+0xdc/0x128 [ 30.761956] __asan_report_load1_noabort+0x20/0x30 [ 30.762010] kmalloc_uaf2+0x3f4/0x468 [ 30.762056] kunit_try_run_case+0x170/0x3f0 [ 30.762110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.762244] kthread+0x328/0x630 [ 30.762319] ret_from_fork+0x10/0x20 [ 30.762462] [ 30.762482] Allocated by task 219: [ 30.762523] kasan_save_stack+0x3c/0x68 [ 30.762726] kasan_save_track+0x20/0x40 [ 30.762885] kasan_save_alloc_info+0x40/0x58 [ 30.762951] __kasan_kmalloc+0xd4/0xd8 [ 30.763091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.763185] kmalloc_uaf2+0xc4/0x468 [ 30.763229] kunit_try_run_case+0x170/0x3f0 [ 30.763310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.763356] kthread+0x328/0x630 [ 30.763390] ret_from_fork+0x10/0x20 [ 30.763426] [ 30.763455] Freed by task 219: [ 30.763625] kasan_save_stack+0x3c/0x68 [ 30.763733] kasan_save_track+0x20/0x40 [ 30.763795] kasan_save_free_info+0x4c/0x78 [ 30.763926] __kasan_slab_free+0x6c/0x98 [ 30.764144] kfree+0x214/0x3c8 [ 30.764231] kmalloc_uaf2+0x134/0x468 [ 30.764362] kunit_try_run_case+0x170/0x3f0 [ 30.764436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.764487] kthread+0x328/0x630 [ 30.764649] ret_from_fork+0x10/0x20 [ 30.764761] [ 30.764936] The buggy address belongs to the object at fff00000c637af80 [ 30.764936] which belongs to the cache kmalloc-64 of size 64 [ 30.765082] The buggy address is located 40 bytes inside of [ 30.765082] freed 64-byte region [fff00000c637af80, fff00000c637afc0) [ 30.765348] [ 30.765560] The buggy address belongs to the physical page: [ 30.765672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a [ 30.765818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.765976] page_type: f5(slab) [ 30.766073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.766285] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 30.766429] page dumped because: kasan: bad access detected [ 30.766592] [ 30.766634] Memory state around the buggy address: [ 30.766780] fff00000c637ae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.766876] fff00000c637af00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.767011] >fff00000c637af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.767108] ^ [ 30.767231] fff00000c637b000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.767276] fff00000c637b080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.767349] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.746117] ================================================================== [ 30.746540] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.746613] Write of size 33 at addr fff00000c637ad80 by task kunit_try_catch/217 [ 30.746668] [ 30.746803] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.746897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.746930] Hardware name: linux,dummy-virt (DT) [ 30.746996] Call trace: [ 30.747029] show_stack+0x20/0x38 (C) [ 30.747081] dump_stack_lvl+0x8c/0xd0 [ 30.747127] print_report+0x118/0x5d0 [ 30.747171] kasan_report+0xdc/0x128 [ 30.747213] kasan_check_range+0x100/0x1a8 [ 30.747260] __asan_memset+0x34/0x78 [ 30.747304] kmalloc_uaf_memset+0x170/0x310 [ 30.747351] kunit_try_run_case+0x170/0x3f0 [ 30.747399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.747453] kthread+0x328/0x630 [ 30.747495] ret_from_fork+0x10/0x20 [ 30.747554] [ 30.747574] Allocated by task 217: [ 30.747601] kasan_save_stack+0x3c/0x68 [ 30.747650] kasan_save_track+0x20/0x40 [ 30.747686] kasan_save_alloc_info+0x40/0x58 [ 30.747725] __kasan_kmalloc+0xd4/0xd8 [ 30.747764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.748146] kmalloc_uaf_memset+0xb8/0x310 [ 30.748480] kunit_try_run_case+0x170/0x3f0 [ 30.748659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.748727] kthread+0x328/0x630 [ 30.748863] ret_from_fork+0x10/0x20 [ 30.749063] [ 30.749153] Freed by task 217: [ 30.749321] kasan_save_stack+0x3c/0x68 [ 30.749475] kasan_save_track+0x20/0x40 [ 30.749614] kasan_save_free_info+0x4c/0x78 [ 30.749768] __kasan_slab_free+0x6c/0x98 [ 30.749864] kfree+0x214/0x3c8 [ 30.750186] kmalloc_uaf_memset+0x11c/0x310 [ 30.750239] kunit_try_run_case+0x170/0x3f0 [ 30.750417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.750530] kthread+0x328/0x630 [ 30.750689] ret_from_fork+0x10/0x20 [ 30.750771] [ 30.750793] The buggy address belongs to the object at fff00000c637ad80 [ 30.750793] which belongs to the cache kmalloc-64 of size 64 [ 30.751051] The buggy address is located 0 bytes inside of [ 30.751051] freed 64-byte region [fff00000c637ad80, fff00000c637adc0) [ 30.751278] [ 30.751329] The buggy address belongs to the physical page: [ 30.751361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a [ 30.751587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.751782] page_type: f5(slab) [ 30.751933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.752007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.752187] page dumped because: kasan: bad access detected [ 30.752363] [ 30.752424] Memory state around the buggy address: [ 30.752563] fff00000c637ac80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.752629] fff00000c637ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.752838] >fff00000c637ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.753004] ^ [ 30.753064] fff00000c637ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.753186] fff00000c637ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.753256] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.731026] ================================================================== [ 30.731088] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.731140] Read of size 1 at addr fff00000c63602e8 by task kunit_try_catch/215 [ 30.731191] [ 30.731236] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.731325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.731353] Hardware name: linux,dummy-virt (DT) [ 30.731386] Call trace: [ 30.731407] show_stack+0x20/0x38 (C) [ 30.731455] dump_stack_lvl+0x8c/0xd0 [ 30.731501] print_report+0x118/0x5d0 [ 30.731557] kasan_report+0xdc/0x128 [ 30.731609] __asan_report_load1_noabort+0x20/0x30 [ 30.731672] kmalloc_uaf+0x300/0x338 [ 30.731717] kunit_try_run_case+0x170/0x3f0 [ 30.731982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.732127] kthread+0x328/0x630 [ 30.732184] ret_from_fork+0x10/0x20 [ 30.732447] [ 30.732471] Allocated by task 215: [ 30.732518] kasan_save_stack+0x3c/0x68 [ 30.732727] kasan_save_track+0x20/0x40 [ 30.732890] kasan_save_alloc_info+0x40/0x58 [ 30.733043] __kasan_kmalloc+0xd4/0xd8 [ 30.733169] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.733372] kmalloc_uaf+0xb8/0x338 [ 30.733434] kunit_try_run_case+0x170/0x3f0 [ 30.733733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.733824] kthread+0x328/0x630 [ 30.733983] ret_from_fork+0x10/0x20 [ 30.734193] [ 30.734267] Freed by task 215: [ 30.734566] kasan_save_stack+0x3c/0x68 [ 30.734736] kasan_save_track+0x20/0x40 [ 30.734884] kasan_save_free_info+0x4c/0x78 [ 30.734995] __kasan_slab_free+0x6c/0x98 [ 30.735190] kfree+0x214/0x3c8 [ 30.735448] kmalloc_uaf+0x11c/0x338 [ 30.735640] kunit_try_run_case+0x170/0x3f0 [ 30.735783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.735866] kthread+0x328/0x630 [ 30.735942] ret_from_fork+0x10/0x20 [ 30.735996] [ 30.736133] The buggy address belongs to the object at fff00000c63602e0 [ 30.736133] which belongs to the cache kmalloc-16 of size 16 [ 30.736232] The buggy address is located 8 bytes inside of [ 30.736232] freed 16-byte region [fff00000c63602e0, fff00000c63602f0) [ 30.736447] [ 30.736470] The buggy address belongs to the physical page: [ 30.736725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 30.736878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.736983] page_type: f5(slab) [ 30.737051] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.737172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.737258] page dumped because: kasan: bad access detected [ 30.737348] [ 30.737446] Memory state around the buggy address: [ 30.737481] fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.737761] fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.737824] >fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.738207] ^ [ 30.738465] fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.738571] fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.738615] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.716672] ================================================================== [ 30.716732] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.716787] Read of size 64 at addr fff00000c637aa84 by task kunit_try_catch/213 [ 30.716839] [ 30.716870] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.716992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.717020] Hardware name: linux,dummy-virt (DT) [ 30.717051] Call trace: [ 30.717081] show_stack+0x20/0x38 (C) [ 30.717139] dump_stack_lvl+0x8c/0xd0 [ 30.717195] print_report+0x118/0x5d0 [ 30.717239] kasan_report+0xdc/0x128 [ 30.717283] kasan_check_range+0x100/0x1a8 [ 30.717334] __asan_memmove+0x3c/0x98 [ 30.717380] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.717442] kunit_try_run_case+0x170/0x3f0 [ 30.717494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.717740] kthread+0x328/0x630 [ 30.717808] ret_from_fork+0x10/0x20 [ 30.717999] [ 30.718128] Allocated by task 213: [ 30.718321] kasan_save_stack+0x3c/0x68 [ 30.718580] kasan_save_track+0x20/0x40 [ 30.718634] kasan_save_alloc_info+0x40/0x58 [ 30.718751] __kasan_kmalloc+0xd4/0xd8 [ 30.718858] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.718996] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 30.719068] kunit_try_run_case+0x170/0x3f0 [ 30.719106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.719444] kthread+0x328/0x630 [ 30.719610] ret_from_fork+0x10/0x20 [ 30.719753] [ 30.719806] The buggy address belongs to the object at fff00000c637aa80 [ 30.719806] which belongs to the cache kmalloc-64 of size 64 [ 30.719913] The buggy address is located 4 bytes inside of [ 30.719913] allocated 64-byte region [fff00000c637aa80, fff00000c637aac0) [ 30.720126] [ 30.720162] The buggy address belongs to the physical page: [ 30.720194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a [ 30.720409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.720566] page_type: f5(slab) [ 30.720741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.720844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.720932] page dumped because: kasan: bad access detected [ 30.721022] [ 30.721085] Memory state around the buggy address: [ 30.721217] fff00000c637a980: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 30.721313] fff00000c637aa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.721364] >fff00000c637aa80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.721631] ^ [ 30.721773] fff00000c637ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.721852] fff00000c637ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.722015] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.702449] ================================================================== [ 30.702841] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.702978] Read of size 18446744073709551614 at addr fff00000c637a904 by task kunit_try_catch/211 [ 30.703096] [ 30.703137] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.703225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.703251] Hardware name: linux,dummy-virt (DT) [ 30.703449] Call trace: [ 30.703484] show_stack+0x20/0x38 (C) [ 30.703567] dump_stack_lvl+0x8c/0xd0 [ 30.703733] print_report+0x118/0x5d0 [ 30.703821] kasan_report+0xdc/0x128 [ 30.703894] kasan_check_range+0x100/0x1a8 [ 30.704050] __asan_memmove+0x3c/0x98 [ 30.704197] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.704294] kunit_try_run_case+0x170/0x3f0 [ 30.704402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.704633] kthread+0x328/0x630 [ 30.704796] ret_from_fork+0x10/0x20 [ 30.704930] [ 30.704991] Allocated by task 211: [ 30.705133] kasan_save_stack+0x3c/0x68 [ 30.705209] kasan_save_track+0x20/0x40 [ 30.705246] kasan_save_alloc_info+0x40/0x58 [ 30.705597] __kasan_kmalloc+0xd4/0xd8 [ 30.705747] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.706060] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.706137] kunit_try_run_case+0x170/0x3f0 [ 30.706193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.706239] kthread+0x328/0x630 [ 30.706273] ret_from_fork+0x10/0x20 [ 30.706310] [ 30.706330] The buggy address belongs to the object at fff00000c637a900 [ 30.706330] which belongs to the cache kmalloc-64 of size 64 [ 30.706441] The buggy address is located 4 bytes inside of [ 30.706441] 64-byte region [fff00000c637a900, fff00000c637a940) [ 30.706784] [ 30.707068] The buggy address belongs to the physical page: [ 30.707200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637a [ 30.707279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.707352] page_type: f5(slab) [ 30.707543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.707736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.707840] page dumped because: kasan: bad access detected [ 30.707888] [ 30.707918] Memory state around the buggy address: [ 30.707960] fff00000c637a800: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 30.708006] fff00000c637a880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.708316] >fff00000c637a900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.708453] ^ [ 30.708680] fff00000c637a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.708812] fff00000c637aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709023] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 30.676810] ================================================================== [ 30.676874] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.676928] Write of size 16 at addr fff00000c6361d69 by task kunit_try_catch/209 [ 30.677448] [ 30.677619] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.677717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.677743] Hardware name: linux,dummy-virt (DT) [ 30.678214] Call trace: [ 30.678256] show_stack+0x20/0x38 (C) [ 30.678390] dump_stack_lvl+0x8c/0xd0 [ 30.678575] print_report+0x118/0x5d0 [ 30.678638] kasan_report+0xdc/0x128 [ 30.678890] kasan_check_range+0x100/0x1a8 [ 30.678956] __asan_memset+0x34/0x78 [ 30.679000] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.679204] kunit_try_run_case+0x170/0x3f0 [ 30.679257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.679311] kthread+0x328/0x630 [ 30.679355] ret_from_fork+0x10/0x20 [ 30.679403] [ 30.679421] Allocated by task 209: [ 30.679800] kasan_save_stack+0x3c/0x68 [ 30.679928] kasan_save_track+0x20/0x40 [ 30.680101] kasan_save_alloc_info+0x40/0x58 [ 30.680143] __kasan_kmalloc+0xd4/0xd8 [ 30.680187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.680606] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.680659] kunit_try_run_case+0x170/0x3f0 [ 30.680947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.681055] kthread+0x328/0x630 [ 30.681094] ret_from_fork+0x10/0x20 [ 30.681130] [ 30.681171] The buggy address belongs to the object at fff00000c6361d00 [ 30.681171] which belongs to the cache kmalloc-128 of size 128 [ 30.681255] The buggy address is located 105 bytes inside of [ 30.681255] allocated 120-byte region [fff00000c6361d00, fff00000c6361d78) [ 30.681337] [ 30.681366] The buggy address belongs to the physical page: [ 30.681413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.681493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.681936] page_type: f5(slab) [ 30.681977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.682045] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.683048] page dumped because: kasan: bad access detected [ 30.684271] [ 30.684618] Memory state around the buggy address: [ 30.684715] fff00000c6361c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.686007] fff00000c6361c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.686114] >fff00000c6361d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.686208] ^ [ 30.686279] fff00000c6361d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.687563] fff00000c6361e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.687613] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 30.658645] ================================================================== [ 30.658706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.658792] Write of size 8 at addr fff00000c6361c71 by task kunit_try_catch/207 [ 30.658845] [ 30.658922] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.659342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.659477] Hardware name: linux,dummy-virt (DT) [ 30.659624] Call trace: [ 30.659650] show_stack+0x20/0x38 (C) [ 30.659716] dump_stack_lvl+0x8c/0xd0 [ 30.659809] print_report+0x118/0x5d0 [ 30.659905] kasan_report+0xdc/0x128 [ 30.659947] kasan_check_range+0x100/0x1a8 [ 30.660127] __asan_memset+0x34/0x78 [ 30.660329] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.660549] kunit_try_run_case+0x170/0x3f0 [ 30.660675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.660808] kthread+0x328/0x630 [ 30.660937] ret_from_fork+0x10/0x20 [ 30.661066] [ 30.661086] Allocated by task 207: [ 30.661376] kasan_save_stack+0x3c/0x68 [ 30.661653] kasan_save_track+0x20/0x40 [ 30.661898] kasan_save_alloc_info+0x40/0x58 [ 30.661998] __kasan_kmalloc+0xd4/0xd8 [ 30.662213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.662432] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.662675] kunit_try_run_case+0x170/0x3f0 [ 30.662744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.663000] kthread+0x328/0x630 [ 30.663185] ret_from_fork+0x10/0x20 [ 30.663297] [ 30.663418] The buggy address belongs to the object at fff00000c6361c00 [ 30.663418] which belongs to the cache kmalloc-128 of size 128 [ 30.663538] The buggy address is located 113 bytes inside of [ 30.663538] allocated 120-byte region [fff00000c6361c00, fff00000c6361c78) [ 30.663811] [ 30.663907] The buggy address belongs to the physical page: [ 30.663986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.664390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.664459] page_type: f5(slab) [ 30.664496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.664693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.664812] page dumped because: kasan: bad access detected [ 30.664988] [ 30.665031] Memory state around the buggy address: [ 30.665179] fff00000c6361b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.665457] fff00000c6361b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.665667] >fff00000c6361c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.665758] ^ [ 30.665916] fff00000c6361c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.665989] fff00000c6361d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666204] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 30.641874] ================================================================== [ 30.641939] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.642202] Write of size 4 at addr fff00000c6361b75 by task kunit_try_catch/205 [ 30.642441] [ 30.642523] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.642967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.643364] Hardware name: linux,dummy-virt (DT) [ 30.643411] Call trace: [ 30.643637] show_stack+0x20/0x38 (C) [ 30.644016] dump_stack_lvl+0x8c/0xd0 [ 30.644567] print_report+0x118/0x5d0 [ 30.644893] kasan_report+0xdc/0x128 [ 30.644969] kasan_check_range+0x100/0x1a8 [ 30.645146] __asan_memset+0x34/0x78 [ 30.645485] kmalloc_oob_memset_4+0x150/0x300 [ 30.645611] kunit_try_run_case+0x170/0x3f0 [ 30.645830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.646064] kthread+0x328/0x630 [ 30.646111] ret_from_fork+0x10/0x20 [ 30.646159] [ 30.646220] Allocated by task 205: [ 30.646270] kasan_save_stack+0x3c/0x68 [ 30.646310] kasan_save_track+0x20/0x40 [ 30.646345] kasan_save_alloc_info+0x40/0x58 [ 30.646397] __kasan_kmalloc+0xd4/0xd8 [ 30.646446] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.646485] kmalloc_oob_memset_4+0xb0/0x300 [ 30.646982] kunit_try_run_case+0x170/0x3f0 [ 30.647330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.647560] kthread+0x328/0x630 [ 30.647834] ret_from_fork+0x10/0x20 [ 30.648033] [ 30.648100] The buggy address belongs to the object at fff00000c6361b00 [ 30.648100] which belongs to the cache kmalloc-128 of size 128 [ 30.648228] The buggy address is located 117 bytes inside of [ 30.648228] allocated 120-byte region [fff00000c6361b00, fff00000c6361b78) [ 30.648319] [ 30.648707] The buggy address belongs to the physical page: [ 30.648761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.648864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.649085] page_type: f5(slab) [ 30.649359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.649763] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.650029] page dumped because: kasan: bad access detected [ 30.650202] [ 30.650351] Memory state around the buggy address: [ 30.650546] fff00000c6361a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.650925] fff00000c6361a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.651045] >fff00000c6361b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.651083] ^ [ 30.651400] fff00000c6361b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.651585] fff00000c6361c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.651739] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.400329] ================================================================== [ 30.400383] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.400432] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/185 [ 30.400481] [ 30.400526] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.400609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.400636] Hardware name: linux,dummy-virt (DT) [ 30.400690] Call trace: [ 30.400713] show_stack+0x20/0x38 (C) [ 30.400760] dump_stack_lvl+0x8c/0xd0 [ 30.400814] print_report+0x118/0x5d0 [ 30.400866] kasan_report+0xdc/0x128 [ 30.400910] __asan_report_load1_noabort+0x20/0x30 [ 30.400958] page_alloc_uaf+0x328/0x350 [ 30.401003] kunit_try_run_case+0x170/0x3f0 [ 30.401055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.401107] kthread+0x328/0x630 [ 30.401148] ret_from_fork+0x10/0x20 [ 30.401194] [ 30.401212] The buggy address belongs to the physical page: [ 30.401242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40 [ 30.401293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.401340] page_type: f0(buddy) [ 30.401376] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000 [ 30.401430] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 30.401471] page dumped because: kasan: bad access detected [ 30.401501] [ 30.401528] Memory state around the buggy address: [ 30.401560] fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.401604] fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.401646] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.401684] ^ [ 30.401719] fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.401762] fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.401799] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 30.625012] ================================================================== [ 30.625544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.625616] Write of size 2 at addr fff00000c6361a77 by task kunit_try_catch/203 [ 30.625930] [ 30.625981] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.626070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.626097] Hardware name: linux,dummy-virt (DT) [ 30.626464] Call trace: [ 30.626599] show_stack+0x20/0x38 (C) [ 30.626673] dump_stack_lvl+0x8c/0xd0 [ 30.626727] print_report+0x118/0x5d0 [ 30.626986] kasan_report+0xdc/0x128 [ 30.627051] kasan_check_range+0x100/0x1a8 [ 30.627541] __asan_memset+0x34/0x78 [ 30.627649] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.627725] kunit_try_run_case+0x170/0x3f0 [ 30.627953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.628164] kthread+0x328/0x630 [ 30.628367] ret_from_fork+0x10/0x20 [ 30.628497] [ 30.628705] Allocated by task 203: [ 30.628851] kasan_save_stack+0x3c/0x68 [ 30.629007] kasan_save_track+0x20/0x40 [ 30.629066] kasan_save_alloc_info+0x40/0x58 [ 30.629268] __kasan_kmalloc+0xd4/0xd8 [ 30.629488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.629564] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.629727] kunit_try_run_case+0x170/0x3f0 [ 30.629892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.630038] kthread+0x328/0x630 [ 30.630076] ret_from_fork+0x10/0x20 [ 30.630112] [ 30.630148] The buggy address belongs to the object at fff00000c6361a00 [ 30.630148] which belongs to the cache kmalloc-128 of size 128 [ 30.630208] The buggy address is located 119 bytes inside of [ 30.630208] allocated 120-byte region [fff00000c6361a00, fff00000c6361a78) [ 30.630281] [ 30.630317] The buggy address belongs to the physical page: [ 30.630362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.630419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.630485] page_type: f5(slab) [ 30.630547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.630606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.630652] page dumped because: kasan: bad access detected [ 30.630689] [ 30.630707] Memory state around the buggy address: [ 30.630756] fff00000c6361900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.630799] fff00000c6361980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.630857] >fff00000c6361a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.630895] ^ [ 30.630935] fff00000c6361a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.630995] fff00000c6361b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.631033] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.606915] ================================================================== [ 30.606972] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.607033] Write of size 128 at addr fff00000c6361900 by task kunit_try_catch/201 [ 30.607084] [ 30.607114] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.607198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.607224] Hardware name: linux,dummy-virt (DT) [ 30.607265] Call trace: [ 30.607288] show_stack+0x20/0x38 (C) [ 30.607335] dump_stack_lvl+0x8c/0xd0 [ 30.607380] print_report+0x118/0x5d0 [ 30.607423] kasan_report+0xdc/0x128 [ 30.607464] kasan_check_range+0x100/0x1a8 [ 30.607522] __asan_memset+0x34/0x78 [ 30.607567] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.607614] kunit_try_run_case+0x170/0x3f0 [ 30.607660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.607710] kthread+0x328/0x630 [ 30.607750] ret_from_fork+0x10/0x20 [ 30.608608] [ 30.608765] Allocated by task 201: [ 30.608797] kasan_save_stack+0x3c/0x68 [ 30.608859] kasan_save_track+0x20/0x40 [ 30.608894] kasan_save_alloc_info+0x40/0x58 [ 30.608931] __kasan_kmalloc+0xd4/0xd8 [ 30.609516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.609601] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.609757] kunit_try_run_case+0x170/0x3f0 [ 30.609863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.610133] kthread+0x328/0x630 [ 30.610310] ret_from_fork+0x10/0x20 [ 30.610579] [ 30.610693] The buggy address belongs to the object at fff00000c6361900 [ 30.610693] which belongs to the cache kmalloc-128 of size 128 [ 30.611146] The buggy address is located 0 bytes inside of [ 30.611146] allocated 120-byte region [fff00000c6361900, fff00000c6361978) [ 30.611441] [ 30.611523] The buggy address belongs to the physical page: [ 30.611588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.611869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.612308] page_type: f5(slab) [ 30.612395] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.612599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.612670] page dumped because: kasan: bad access detected [ 30.612882] [ 30.613047] Memory state around the buggy address: [ 30.613190] fff00000c6361800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.613313] fff00000c6361880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.613485] >fff00000c6361900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.613535] ^ [ 30.613714] fff00000c6361980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.613940] fff00000c6361a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.614056] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 30.585639] ================================================================== [ 30.586091] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.586210] Read of size 16 at addr fff00000c63602c0 by task kunit_try_catch/199 [ 30.586282] [ 30.586315] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.586711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.586784] Hardware name: linux,dummy-virt (DT) [ 30.586818] Call trace: [ 30.586850] show_stack+0x20/0x38 (C) [ 30.586902] dump_stack_lvl+0x8c/0xd0 [ 30.587039] print_report+0x118/0x5d0 [ 30.587151] kasan_report+0xdc/0x128 [ 30.587344] __asan_report_load16_noabort+0x20/0x30 [ 30.587479] kmalloc_uaf_16+0x3bc/0x438 [ 30.587549] kunit_try_run_case+0x170/0x3f0 [ 30.587597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.587984] kthread+0x328/0x630 [ 30.588186] ret_from_fork+0x10/0x20 [ 30.588303] [ 30.588454] Allocated by task 199: [ 30.588495] kasan_save_stack+0x3c/0x68 [ 30.588713] kasan_save_track+0x20/0x40 [ 30.588919] kasan_save_alloc_info+0x40/0x58 [ 30.589074] __kasan_kmalloc+0xd4/0xd8 [ 30.589181] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.589315] kmalloc_uaf_16+0x140/0x438 [ 30.589430] kunit_try_run_case+0x170/0x3f0 [ 30.589476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.589676] kthread+0x328/0x630 [ 30.589826] ret_from_fork+0x10/0x20 [ 30.589955] [ 30.590012] Freed by task 199: [ 30.590115] kasan_save_stack+0x3c/0x68 [ 30.590211] kasan_save_track+0x20/0x40 [ 30.590589] kasan_save_free_info+0x4c/0x78 [ 30.590674] __kasan_slab_free+0x6c/0x98 [ 30.590820] kfree+0x214/0x3c8 [ 30.590888] kmalloc_uaf_16+0x190/0x438 [ 30.591334] kunit_try_run_case+0x170/0x3f0 [ 30.591729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.591831] kthread+0x328/0x630 [ 30.591898] ret_from_fork+0x10/0x20 [ 30.591953] [ 30.592007] The buggy address belongs to the object at fff00000c63602c0 [ 30.592007] which belongs to the cache kmalloc-16 of size 16 [ 30.592607] The buggy address is located 0 bytes inside of [ 30.592607] freed 16-byte region [fff00000c63602c0, fff00000c63602d0) [ 30.592799] [ 30.593153] The buggy address belongs to the physical page: [ 30.593367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 30.593605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.593734] page_type: f5(slab) [ 30.593774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.594005] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.594109] page dumped because: kasan: bad access detected [ 30.594429] [ 30.594613] Memory state around the buggy address: [ 30.594767] fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.594986] fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.595111] >fff00000c6360280: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 30.595198] ^ [ 30.595303] fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.595347] fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.595848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 30.566490] ================================================================== [ 30.566603] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.566791] Write of size 16 at addr fff00000c6360260 by task kunit_try_catch/197 [ 30.566843] [ 30.567082] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.567243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.567281] Hardware name: linux,dummy-virt (DT) [ 30.567472] Call trace: [ 30.567499] show_stack+0x20/0x38 (C) [ 30.567756] dump_stack_lvl+0x8c/0xd0 [ 30.568048] print_report+0x118/0x5d0 [ 30.568176] kasan_report+0xdc/0x128 [ 30.568247] __asan_report_store16_noabort+0x20/0x30 [ 30.568299] kmalloc_oob_16+0x3a0/0x3f8 [ 30.568648] kunit_try_run_case+0x170/0x3f0 [ 30.568728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.568854] kthread+0x328/0x630 [ 30.568927] ret_from_fork+0x10/0x20 [ 30.569322] [ 30.569367] Allocated by task 197: [ 30.569527] kasan_save_stack+0x3c/0x68 [ 30.569573] kasan_save_track+0x20/0x40 [ 30.569731] kasan_save_alloc_info+0x40/0x58 [ 30.570079] __kasan_kmalloc+0xd4/0xd8 [ 30.570348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.570673] kmalloc_oob_16+0xb4/0x3f8 [ 30.570877] kunit_try_run_case+0x170/0x3f0 [ 30.571114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.571472] kthread+0x328/0x630 [ 30.571709] ret_from_fork+0x10/0x20 [ 30.571979] [ 30.572189] The buggy address belongs to the object at fff00000c6360260 [ 30.572189] which belongs to the cache kmalloc-16 of size 16 [ 30.572375] The buggy address is located 0 bytes inside of [ 30.572375] allocated 13-byte region [fff00000c6360260, fff00000c636026d) [ 30.572604] [ 30.572660] The buggy address belongs to the physical page: [ 30.572842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 30.573059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.573208] page_type: f5(slab) [ 30.573413] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.573576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.573727] page dumped because: kasan: bad access detected [ 30.573935] [ 30.574160] Memory state around the buggy address: [ 30.574258] fff00000c6360100: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 30.574497] fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.574682] >fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 30.574878] ^ [ 30.574935] fff00000c6360280: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.575093] fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.575408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.542345] ================================================================== [ 30.542796] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.543324] Read of size 1 at addr fff00000c1d5d400 by task kunit_try_catch/195 [ 30.543545] [ 30.543660] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.543825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.543896] Hardware name: linux,dummy-virt (DT) [ 30.544045] Call trace: [ 30.544124] show_stack+0x20/0x38 (C) [ 30.544200] dump_stack_lvl+0x8c/0xd0 [ 30.544248] print_report+0x118/0x5d0 [ 30.544291] kasan_report+0xdc/0x128 [ 30.544534] __asan_report_load1_noabort+0x20/0x30 [ 30.544759] krealloc_uaf+0x4c8/0x520 [ 30.544872] kunit_try_run_case+0x170/0x3f0 [ 30.545045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.545330] kthread+0x328/0x630 [ 30.545737] ret_from_fork+0x10/0x20 [ 30.545968] [ 30.546040] Allocated by task 195: [ 30.546150] kasan_save_stack+0x3c/0x68 [ 30.546318] kasan_save_track+0x20/0x40 [ 30.546383] kasan_save_alloc_info+0x40/0x58 [ 30.546480] __kasan_kmalloc+0xd4/0xd8 [ 30.546589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.546762] krealloc_uaf+0xc8/0x520 [ 30.547000] kunit_try_run_case+0x170/0x3f0 [ 30.547062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.547178] kthread+0x328/0x630 [ 30.547319] ret_from_fork+0x10/0x20 [ 30.547544] [ 30.547798] Freed by task 195: [ 30.547921] kasan_save_stack+0x3c/0x68 [ 30.548085] kasan_save_track+0x20/0x40 [ 30.548179] kasan_save_free_info+0x4c/0x78 [ 30.548224] __kasan_slab_free+0x6c/0x98 [ 30.548259] kfree+0x214/0x3c8 [ 30.548293] krealloc_uaf+0x12c/0x520 [ 30.548328] kunit_try_run_case+0x170/0x3f0 [ 30.548575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.548628] kthread+0x328/0x630 [ 30.549158] ret_from_fork+0x10/0x20 [ 30.549528] [ 30.549623] The buggy address belongs to the object at fff00000c1d5d400 [ 30.549623] which belongs to the cache kmalloc-256 of size 256 [ 30.549720] The buggy address is located 0 bytes inside of [ 30.549720] freed 256-byte region [fff00000c1d5d400, fff00000c1d5d500) [ 30.549931] [ 30.550033] The buggy address belongs to the physical page: [ 30.550096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.550155] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.550202] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.550316] page_type: f5(slab) [ 30.550377] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.550435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.550494] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.550552] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.550606] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.550655] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.550700] page dumped because: kasan: bad access detected [ 30.550731] [ 30.550763] Memory state around the buggy address: [ 30.550813] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.550857] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.550909] >fff00000c1d5d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.550953] ^ [ 30.550980] fff00000c1d5d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.551029] fff00000c1d5d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.551066] ================================================================== [ 30.527957] ================================================================== [ 30.528068] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.528398] Read of size 1 at addr fff00000c1d5d400 by task kunit_try_catch/195 [ 30.528459] [ 30.528499] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.528910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.529074] Hardware name: linux,dummy-virt (DT) [ 30.529125] Call trace: [ 30.529148] show_stack+0x20/0x38 (C) [ 30.529694] dump_stack_lvl+0x8c/0xd0 [ 30.529833] print_report+0x118/0x5d0 [ 30.530017] kasan_report+0xdc/0x128 [ 30.530226] __kasan_check_byte+0x54/0x70 [ 30.530316] krealloc_noprof+0x44/0x360 [ 30.530370] krealloc_uaf+0x180/0x520 [ 30.530540] kunit_try_run_case+0x170/0x3f0 [ 30.530888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.530966] kthread+0x328/0x630 [ 30.531310] ret_from_fork+0x10/0x20 [ 30.531528] [ 30.531550] Allocated by task 195: [ 30.531758] kasan_save_stack+0x3c/0x68 [ 30.531951] kasan_save_track+0x20/0x40 [ 30.532062] kasan_save_alloc_info+0x40/0x58 [ 30.532374] __kasan_kmalloc+0xd4/0xd8 [ 30.532476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.532835] krealloc_uaf+0xc8/0x520 [ 30.532891] kunit_try_run_case+0x170/0x3f0 [ 30.533183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.533372] kthread+0x328/0x630 [ 30.533616] ret_from_fork+0x10/0x20 [ 30.533774] [ 30.533870] Freed by task 195: [ 30.533901] kasan_save_stack+0x3c/0x68 [ 30.534137] kasan_save_track+0x20/0x40 [ 30.534334] kasan_save_free_info+0x4c/0x78 [ 30.534408] __kasan_slab_free+0x6c/0x98 [ 30.534614] kfree+0x214/0x3c8 [ 30.534922] krealloc_uaf+0x12c/0x520 [ 30.535346] kunit_try_run_case+0x170/0x3f0 [ 30.535503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.535652] kthread+0x328/0x630 [ 30.535688] ret_from_fork+0x10/0x20 [ 30.535893] [ 30.536127] The buggy address belongs to the object at fff00000c1d5d400 [ 30.536127] which belongs to the cache kmalloc-256 of size 256 [ 30.536395] The buggy address is located 0 bytes inside of [ 30.536395] freed 256-byte region [fff00000c1d5d400, fff00000c1d5d500) [ 30.536470] [ 30.536652] The buggy address belongs to the physical page: [ 30.536968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.537030] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.537299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.537469] page_type: f5(slab) [ 30.537667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.538119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.538182] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.538638] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.538721] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.538907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.539133] page dumped because: kasan: bad access detected [ 30.539330] [ 30.539433] Memory state around the buggy address: [ 30.539574] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.539810] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.540134] >fff00000c1d5d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.540260] ^ [ 30.540425] fff00000c1d5d480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.540470] fff00000c1d5d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.540524] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.499758] ================================================================== [ 30.500186] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.500256] Write of size 1 at addr fff00000c9b260da by task kunit_try_catch/193 [ 30.500314] [ 30.500345] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.500427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.500454] Hardware name: linux,dummy-virt (DT) [ 30.500486] Call trace: [ 30.500819] show_stack+0x20/0x38 (C) [ 30.500920] dump_stack_lvl+0x8c/0xd0 [ 30.500982] print_report+0x118/0x5d0 [ 30.501027] kasan_report+0xdc/0x128 [ 30.501079] __asan_report_store1_noabort+0x20/0x30 [ 30.501130] krealloc_less_oob_helper+0xa80/0xc50 [ 30.501180] krealloc_large_less_oob+0x20/0x38 [ 30.501230] kunit_try_run_case+0x170/0x3f0 [ 30.501287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.501339] kthread+0x328/0x630 [ 30.501380] ret_from_fork+0x10/0x20 [ 30.501440] [ 30.501480] The buggy address belongs to the physical page: [ 30.501522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 30.501576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.501622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.501672] page_type: f8(unknown) [ 30.501720] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.501786] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.501844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.501921] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.501980] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 30.502037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.502077] page dumped because: kasan: bad access detected [ 30.502115] [ 30.502138] Memory state around the buggy address: [ 30.502175] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.502232] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.502273] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.502310] ^ [ 30.502346] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.502393] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.502432] ================================================================== [ 30.455469] ================================================================== [ 30.455632] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.455694] Write of size 1 at addr fff00000c1d5d2ea by task kunit_try_catch/189 [ 30.455743] [ 30.455821] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.455945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.455972] Hardware name: linux,dummy-virt (DT) [ 30.456002] Call trace: [ 30.456023] show_stack+0x20/0x38 (C) [ 30.456214] dump_stack_lvl+0x8c/0xd0 [ 30.456401] print_report+0x118/0x5d0 [ 30.456591] kasan_report+0xdc/0x128 [ 30.456799] __asan_report_store1_noabort+0x20/0x30 [ 30.456880] krealloc_less_oob_helper+0xae4/0xc50 [ 30.456930] krealloc_less_oob+0x20/0x38 [ 30.456998] kunit_try_run_case+0x170/0x3f0 [ 30.457051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.457103] kthread+0x328/0x630 [ 30.457143] ret_from_fork+0x10/0x20 [ 30.457203] [ 30.457222] Allocated by task 189: [ 30.457249] kasan_save_stack+0x3c/0x68 [ 30.457314] kasan_save_track+0x20/0x40 [ 30.457361] kasan_save_alloc_info+0x40/0x58 [ 30.457398] __kasan_krealloc+0x118/0x178 [ 30.457460] krealloc_noprof+0x128/0x360 [ 30.458008] krealloc_less_oob_helper+0x168/0xc50 [ 30.458128] krealloc_less_oob+0x20/0x38 [ 30.458168] kunit_try_run_case+0x170/0x3f0 [ 30.458205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.458247] kthread+0x328/0x630 [ 30.458421] ret_from_fork+0x10/0x20 [ 30.458550] [ 30.458607] The buggy address belongs to the object at fff00000c1d5d200 [ 30.458607] which belongs to the cache kmalloc-256 of size 256 [ 30.458707] The buggy address is located 33 bytes to the right of [ 30.458707] allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9) [ 30.458834] [ 30.458854] The buggy address belongs to the physical page: [ 30.458885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.458955] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.459001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.459052] page_type: f5(slab) [ 30.459134] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.459362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.459468] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.459617] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.459695] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.459744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.459783] page dumped because: kasan: bad access detected [ 30.459814] [ 30.459867] Memory state around the buggy address: [ 30.460032] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.460107] fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.460206] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.460323] ^ [ 30.460445] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.460527] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.460565] ================================================================== [ 30.483738] ================================================================== [ 30.483834] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.483906] Write of size 1 at addr fff00000c9b260c9 by task kunit_try_catch/193 [ 30.484021] [ 30.484132] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.484254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.484281] Hardware name: linux,dummy-virt (DT) [ 30.484311] Call trace: [ 30.484332] show_stack+0x20/0x38 (C) [ 30.484378] dump_stack_lvl+0x8c/0xd0 [ 30.484646] print_report+0x118/0x5d0 [ 30.484752] kasan_report+0xdc/0x128 [ 30.484923] __asan_report_store1_noabort+0x20/0x30 [ 30.484994] krealloc_less_oob_helper+0xa48/0xc50 [ 30.485080] krealloc_large_less_oob+0x20/0x38 [ 30.485147] kunit_try_run_case+0x170/0x3f0 [ 30.485376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485533] kthread+0x328/0x630 [ 30.485680] ret_from_fork+0x10/0x20 [ 30.485795] [ 30.485943] The buggy address belongs to the physical page: [ 30.486068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 30.486209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.486291] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.486343] page_type: f8(unknown) [ 30.486664] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.486817] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.486904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.486977] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.487153] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 30.487256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.487416] page dumped because: kasan: bad access detected [ 30.487469] [ 30.487487] Memory state around the buggy address: [ 30.487531] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.487696] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.487947] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.488048] ^ [ 30.488168] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.488262] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.488315] ================================================================== [ 30.503544] ================================================================== [ 30.503846] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.503934] Write of size 1 at addr fff00000c9b260ea by task kunit_try_catch/193 [ 30.504005] [ 30.504054] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.504173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.504356] Hardware name: linux,dummy-virt (DT) [ 30.504391] Call trace: [ 30.504414] show_stack+0x20/0x38 (C) [ 30.504629] dump_stack_lvl+0x8c/0xd0 [ 30.504847] print_report+0x118/0x5d0 [ 30.505229] kasan_report+0xdc/0x128 [ 30.505599] __asan_report_store1_noabort+0x20/0x30 [ 30.505802] krealloc_less_oob_helper+0xae4/0xc50 [ 30.506247] krealloc_large_less_oob+0x20/0x38 [ 30.507052] kunit_try_run_case+0x170/0x3f0 [ 30.507608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.507911] kthread+0x328/0x630 [ 30.508021] ret_from_fork+0x10/0x20 [ 30.508107] [ 30.508288] The buggy address belongs to the physical page: [ 30.508561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 30.508752] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.508824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.509181] page_type: f8(unknown) [ 30.509382] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.509448] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.509799] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.509893] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.510343] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 30.510497] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.510613] page dumped because: kasan: bad access detected [ 30.510746] [ 30.510825] Memory state around the buggy address: [ 30.511069] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.511405] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.511518] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.511653] ^ [ 30.511739] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.511912] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.512178] ================================================================== [ 30.513020] ================================================================== [ 30.513104] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.513393] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/193 [ 30.513501] [ 30.513545] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.513800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.513885] Hardware name: linux,dummy-virt (DT) [ 30.513922] Call trace: [ 30.514028] show_stack+0x20/0x38 (C) [ 30.514081] dump_stack_lvl+0x8c/0xd0 [ 30.514313] print_report+0x118/0x5d0 [ 30.514496] kasan_report+0xdc/0x128 [ 30.514565] __asan_report_store1_noabort+0x20/0x30 [ 30.514713] krealloc_less_oob_helper+0xa58/0xc50 [ 30.514818] krealloc_large_less_oob+0x20/0x38 [ 30.515043] kunit_try_run_case+0x170/0x3f0 [ 30.515098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.515446] kthread+0x328/0x630 [ 30.515526] ret_from_fork+0x10/0x20 [ 30.515875] [ 30.515986] The buggy address belongs to the physical page: [ 30.516142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 30.516356] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.516540] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.516624] page_type: f8(unknown) [ 30.516663] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.516714] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.516764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.517204] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.517357] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 30.517504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.517615] page dumped because: kasan: bad access detected [ 30.517647] [ 30.517792] Memory state around the buggy address: [ 30.518006] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.518296] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.518435] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.518517] ^ [ 30.518557] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.518772] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.519033] ================================================================== [ 30.461400] ================================================================== [ 30.461447] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.461496] Write of size 1 at addr fff00000c1d5d2eb by task kunit_try_catch/189 [ 30.461689] [ 30.461751] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.461839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.461865] Hardware name: linux,dummy-virt (DT) [ 30.461979] Call trace: [ 30.462008] show_stack+0x20/0x38 (C) [ 30.462072] dump_stack_lvl+0x8c/0xd0 [ 30.462136] print_report+0x118/0x5d0 [ 30.462179] kasan_report+0xdc/0x128 [ 30.462238] __asan_report_store1_noabort+0x20/0x30 [ 30.462287] krealloc_less_oob_helper+0xa58/0xc50 [ 30.462336] krealloc_less_oob+0x20/0x38 [ 30.462594] kunit_try_run_case+0x170/0x3f0 [ 30.462694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.462779] kthread+0x328/0x630 [ 30.462845] ret_from_fork+0x10/0x20 [ 30.462893] [ 30.462937] Allocated by task 189: [ 30.463074] kasan_save_stack+0x3c/0x68 [ 30.463116] kasan_save_track+0x20/0x40 [ 30.463234] kasan_save_alloc_info+0x40/0x58 [ 30.463278] __kasan_krealloc+0x118/0x178 [ 30.463313] krealloc_noprof+0x128/0x360 [ 30.463351] krealloc_less_oob_helper+0x168/0xc50 [ 30.463420] krealloc_less_oob+0x20/0x38 [ 30.463458] kunit_try_run_case+0x170/0x3f0 [ 30.463494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.463659] kthread+0x328/0x630 [ 30.463694] ret_from_fork+0x10/0x20 [ 30.463729] [ 30.463747] The buggy address belongs to the object at fff00000c1d5d200 [ 30.463747] which belongs to the cache kmalloc-256 of size 256 [ 30.463914] The buggy address is located 34 bytes to the right of [ 30.463914] allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9) [ 30.463985] [ 30.464004] The buggy address belongs to the physical page: [ 30.464035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.464284] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.464475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.464619] page_type: f5(slab) [ 30.464739] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.464836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.464960] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.465024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.465347] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.465417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.465521] page dumped because: kasan: bad access detected [ 30.465589] [ 30.465652] Memory state around the buggy address: [ 30.465783] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.465839] fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.465881] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.465919] ^ [ 30.465957] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.466010] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.466047] ================================================================== [ 30.445578] ================================================================== [ 30.445681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.445833] Write of size 1 at addr fff00000c1d5d2da by task kunit_try_catch/189 [ 30.445890] [ 30.445919] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.446209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.446256] Hardware name: linux,dummy-virt (DT) [ 30.446294] Call trace: [ 30.446332] show_stack+0x20/0x38 (C) [ 30.446414] dump_stack_lvl+0x8c/0xd0 [ 30.446479] print_report+0x118/0x5d0 [ 30.446539] kasan_report+0xdc/0x128 [ 30.446582] __asan_report_store1_noabort+0x20/0x30 [ 30.446660] krealloc_less_oob_helper+0xa80/0xc50 [ 30.446712] krealloc_less_oob+0x20/0x38 [ 30.446775] kunit_try_run_case+0x170/0x3f0 [ 30.446840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.446902] kthread+0x328/0x630 [ 30.446964] ret_from_fork+0x10/0x20 [ 30.447030] [ 30.447049] Allocated by task 189: [ 30.447119] kasan_save_stack+0x3c/0x68 [ 30.447185] kasan_save_track+0x20/0x40 [ 30.447242] kasan_save_alloc_info+0x40/0x58 [ 30.447282] __kasan_krealloc+0x118/0x178 [ 30.447337] krealloc_noprof+0x128/0x360 [ 30.447381] krealloc_less_oob_helper+0x168/0xc50 [ 30.447423] krealloc_less_oob+0x20/0x38 [ 30.447459] kunit_try_run_case+0x170/0x3f0 [ 30.447495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.447547] kthread+0x328/0x630 [ 30.447579] ret_from_fork+0x10/0x20 [ 30.447658] [ 30.447676] The buggy address belongs to the object at fff00000c1d5d200 [ 30.447676] which belongs to the cache kmalloc-256 of size 256 [ 30.447885] The buggy address is located 17 bytes to the right of [ 30.447885] allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9) [ 30.448012] [ 30.448092] The buggy address belongs to the physical page: [ 30.448132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.448184] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.448375] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.449632] page_type: f5(slab) [ 30.449681] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.449847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.449905] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.450404] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.450548] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.450618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.451720] page dumped because: kasan: bad access detected [ 30.452050] [ 30.452361] Memory state around the buggy address: [ 30.452401] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.453472] fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.453859] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.454179] ^ [ 30.454231] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.454363] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.454498] ================================================================== [ 30.489813] ================================================================== [ 30.489865] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.489995] Write of size 1 at addr fff00000c9b260d0 by task kunit_try_catch/193 [ 30.490255] [ 30.490300] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.490610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.490718] Hardware name: linux,dummy-virt (DT) [ 30.490753] Call trace: [ 30.490808] show_stack+0x20/0x38 (C) [ 30.490859] dump_stack_lvl+0x8c/0xd0 [ 30.491109] print_report+0x118/0x5d0 [ 30.491177] kasan_report+0xdc/0x128 [ 30.491221] __asan_report_store1_noabort+0x20/0x30 [ 30.491270] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.491320] krealloc_large_less_oob+0x20/0x38 [ 30.491368] kunit_try_run_case+0x170/0x3f0 [ 30.491415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.491467] kthread+0x328/0x630 [ 30.491606] ret_from_fork+0x10/0x20 [ 30.491661] [ 30.491692] The buggy address belongs to the physical page: [ 30.491723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 30.491907] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.492082] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.492413] page_type: f8(unknown) [ 30.492496] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.493049] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.493342] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.493499] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.493622] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 30.493692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.493752] page dumped because: kasan: bad access detected [ 30.493928] [ 30.494233] Memory state around the buggy address: [ 30.494600] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.494669] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.494792] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.494866] ^ [ 30.495087] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.495425] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.495484] ================================================================== [ 30.431756] ================================================================== [ 30.431935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.431991] Write of size 1 at addr fff00000c1d5d2c9 by task kunit_try_catch/189 [ 30.432113] [ 30.432163] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.432248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.432421] Hardware name: linux,dummy-virt (DT) [ 30.432453] Call trace: [ 30.432474] show_stack+0x20/0x38 (C) [ 30.432606] dump_stack_lvl+0x8c/0xd0 [ 30.432784] print_report+0x118/0x5d0 [ 30.432829] kasan_report+0xdc/0x128 [ 30.433170] __asan_report_store1_noabort+0x20/0x30 [ 30.433312] krealloc_less_oob_helper+0xa48/0xc50 [ 30.433467] krealloc_less_oob+0x20/0x38 [ 30.433578] kunit_try_run_case+0x170/0x3f0 [ 30.433637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.433822] kthread+0x328/0x630 [ 30.434067] ret_from_fork+0x10/0x20 [ 30.434192] [ 30.434262] Allocated by task 189: [ 30.434357] kasan_save_stack+0x3c/0x68 [ 30.434456] kasan_save_track+0x20/0x40 [ 30.434542] kasan_save_alloc_info+0x40/0x58 [ 30.434616] __kasan_krealloc+0x118/0x178 [ 30.434717] krealloc_noprof+0x128/0x360 [ 30.434814] krealloc_less_oob_helper+0x168/0xc50 [ 30.434875] krealloc_less_oob+0x20/0x38 [ 30.434912] kunit_try_run_case+0x170/0x3f0 [ 30.435243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.435395] kthread+0x328/0x630 [ 30.435465] ret_from_fork+0x10/0x20 [ 30.435576] [ 30.435721] The buggy address belongs to the object at fff00000c1d5d200 [ 30.435721] which belongs to the cache kmalloc-256 of size 256 [ 30.435875] The buggy address is located 0 bytes to the right of [ 30.435875] allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9) [ 30.436007] [ 30.436098] The buggy address belongs to the physical page: [ 30.436146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.436210] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.436257] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.436311] page_type: f5(slab) [ 30.436523] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.436620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.436840] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.436957] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.437114] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.437230] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.437405] page dumped because: kasan: bad access detected [ 30.437484] [ 30.437540] Memory state around the buggy address: [ 30.437573] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.437956] fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.438011] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.438144] ^ [ 30.438250] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.438399] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.438481] ================================================================== [ 30.439466] ================================================================== [ 30.439527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.439575] Write of size 1 at addr fff00000c1d5d2d0 by task kunit_try_catch/189 [ 30.439627] [ 30.439783] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.440077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.440135] Hardware name: linux,dummy-virt (DT) [ 30.440237] Call trace: [ 30.440350] show_stack+0x20/0x38 (C) [ 30.440470] dump_stack_lvl+0x8c/0xd0 [ 30.440654] print_report+0x118/0x5d0 [ 30.440717] kasan_report+0xdc/0x128 [ 30.440784] __asan_report_store1_noabort+0x20/0x30 [ 30.440833] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.441179] krealloc_less_oob+0x20/0x38 [ 30.441294] kunit_try_run_case+0x170/0x3f0 [ 30.441436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.441625] kthread+0x328/0x630 [ 30.441758] ret_from_fork+0x10/0x20 [ 30.441892] [ 30.442033] Allocated by task 189: [ 30.442071] kasan_save_stack+0x3c/0x68 [ 30.442108] kasan_save_track+0x20/0x40 [ 30.442187] kasan_save_alloc_info+0x40/0x58 [ 30.442420] __kasan_krealloc+0x118/0x178 [ 30.442684] krealloc_noprof+0x128/0x360 [ 30.442796] krealloc_less_oob_helper+0x168/0xc50 [ 30.442857] krealloc_less_oob+0x20/0x38 [ 30.442935] kunit_try_run_case+0x170/0x3f0 [ 30.442972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.443014] kthread+0x328/0x630 [ 30.443058] ret_from_fork+0x10/0x20 [ 30.443093] [ 30.443112] The buggy address belongs to the object at fff00000c1d5d200 [ 30.443112] which belongs to the cache kmalloc-256 of size 256 [ 30.443180] The buggy address is located 7 bytes to the right of [ 30.443180] allocated 201-byte region [fff00000c1d5d200, fff00000c1d5d2c9) [ 30.443244] [ 30.443263] The buggy address belongs to the physical page: [ 30.443294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.443346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.443393] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.443443] page_type: f5(slab) [ 30.443478] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.443540] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.443591] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.443656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.443715] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.443772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.443811] page dumped because: kasan: bad access detected [ 30.443841] [ 30.443858] Memory state around the buggy address: [ 30.443889] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.443931] fff00000c1d5d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.444400] >fff00000c1d5d280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.444456] ^ [ 30.444668] fff00000c1d5d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444791] fff00000c1d5d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444889] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.405655] ================================================================== [ 30.405767] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.405817] Write of size 1 at addr fff00000c1d5d0eb by task kunit_try_catch/187 [ 30.405867] [ 30.406099] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.406198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.406225] Hardware name: linux,dummy-virt (DT) [ 30.406292] Call trace: [ 30.406331] show_stack+0x20/0x38 (C) [ 30.406392] dump_stack_lvl+0x8c/0xd0 [ 30.406457] print_report+0x118/0x5d0 [ 30.406500] kasan_report+0xdc/0x128 [ 30.406571] __asan_report_store1_noabort+0x20/0x30 [ 30.406621] krealloc_more_oob_helper+0x60c/0x678 [ 30.406688] krealloc_more_oob+0x20/0x38 [ 30.406738] kunit_try_run_case+0x170/0x3f0 [ 30.406785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.407004] kthread+0x328/0x630 [ 30.407050] ret_from_fork+0x10/0x20 [ 30.407097] [ 30.407114] Allocated by task 187: [ 30.407190] kasan_save_stack+0x3c/0x68 [ 30.407258] kasan_save_track+0x20/0x40 [ 30.407315] kasan_save_alloc_info+0x40/0x58 [ 30.407377] __kasan_krealloc+0x118/0x178 [ 30.407412] krealloc_noprof+0x128/0x360 [ 30.407450] krealloc_more_oob_helper+0x168/0x678 [ 30.407727] krealloc_more_oob+0x20/0x38 [ 30.407820] kunit_try_run_case+0x170/0x3f0 [ 30.407918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.408035] kthread+0x328/0x630 [ 30.408145] ret_from_fork+0x10/0x20 [ 30.408279] [ 30.408338] The buggy address belongs to the object at fff00000c1d5d000 [ 30.408338] which belongs to the cache kmalloc-256 of size 256 [ 30.408396] The buggy address is located 0 bytes to the right of [ 30.408396] allocated 235-byte region [fff00000c1d5d000, fff00000c1d5d0eb) [ 30.408459] [ 30.408478] The buggy address belongs to the physical page: [ 30.408519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.408571] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.408617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.408666] page_type: f5(slab) [ 30.408743] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.408834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.408963] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.409065] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.409218] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.409311] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.409400] page dumped because: kasan: bad access detected [ 30.409531] [ 30.409549] Memory state around the buggy address: [ 30.409580] fff00000c1d5cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.409757] fff00000c1d5d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.409872] >fff00000c1d5d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.410003] ^ [ 30.410109] fff00000c1d5d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.410171] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.410289] ================================================================== [ 30.474348] ================================================================== [ 30.474468] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.474531] Write of size 1 at addr fff00000c9b220f0 by task kunit_try_catch/191 [ 30.474595] [ 30.474624] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.474806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.474835] Hardware name: linux,dummy-virt (DT) [ 30.475006] Call trace: [ 30.475064] show_stack+0x20/0x38 (C) [ 30.475155] dump_stack_lvl+0x8c/0xd0 [ 30.475231] print_report+0x118/0x5d0 [ 30.475294] kasan_report+0xdc/0x128 [ 30.475359] __asan_report_store1_noabort+0x20/0x30 [ 30.475425] krealloc_more_oob_helper+0x5c0/0x678 [ 30.475501] krealloc_large_more_oob+0x20/0x38 [ 30.475594] kunit_try_run_case+0x170/0x3f0 [ 30.475649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.475701] kthread+0x328/0x630 [ 30.475742] ret_from_fork+0x10/0x20 [ 30.475787] [ 30.475930] The buggy address belongs to the physical page: [ 30.475963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b20 [ 30.476155] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.476267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.476354] page_type: f8(unknown) [ 30.476456] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.476581] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.476675] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.476781] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.476897] head: 0bfffe0000000002 ffffc1ffc326c801 00000000ffffffff 00000000ffffffff [ 30.477017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.477094] page dumped because: kasan: bad access detected [ 30.477124] [ 30.477142] Memory state around the buggy address: [ 30.477173] fff00000c9b21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.477226] fff00000c9b22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.477268] >fff00000c9b22080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.477620] ^ [ 30.477754] fff00000c9b22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.477857] fff00000c9b22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.477975] ================================================================== [ 30.470230] ================================================================== [ 30.470283] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.470334] Write of size 1 at addr fff00000c9b220eb by task kunit_try_catch/191 [ 30.470389] [ 30.470418] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.470501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.470541] Hardware name: linux,dummy-virt (DT) [ 30.470571] Call trace: [ 30.470591] show_stack+0x20/0x38 (C) [ 30.470886] dump_stack_lvl+0x8c/0xd0 [ 30.470980] print_report+0x118/0x5d0 [ 30.471026] kasan_report+0xdc/0x128 [ 30.471068] __asan_report_store1_noabort+0x20/0x30 [ 30.471311] krealloc_more_oob_helper+0x60c/0x678 [ 30.471396] krealloc_large_more_oob+0x20/0x38 [ 30.471454] kunit_try_run_case+0x170/0x3f0 [ 30.471541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.471594] kthread+0x328/0x630 [ 30.471636] ret_from_fork+0x10/0x20 [ 30.471682] [ 30.471702] The buggy address belongs to the physical page: [ 30.471733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b20 [ 30.471983] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.472081] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.472196] page_type: f8(unknown) [ 30.472252] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.472351] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.472448] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.472538] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.472633] head: 0bfffe0000000002 ffffc1ffc326c801 00000000ffffffff 00000000ffffffff [ 30.472694] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.472794] page dumped because: kasan: bad access detected [ 30.472846] [ 30.472864] Memory state around the buggy address: [ 30.472945] fff00000c9b21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.473018] fff00000c9b22000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.473062] >fff00000c9b22080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.473099] ^ [ 30.473175] fff00000c9b22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.473217] fff00000c9b22180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.473254] ================================================================== [ 30.411156] ================================================================== [ 30.411220] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.411282] Write of size 1 at addr fff00000c1d5d0f0 by task kunit_try_catch/187 [ 30.411348] [ 30.411395] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.411478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.411640] Hardware name: linux,dummy-virt (DT) [ 30.411676] Call trace: [ 30.411713] show_stack+0x20/0x38 (C) [ 30.411838] dump_stack_lvl+0x8c/0xd0 [ 30.411955] print_report+0x118/0x5d0 [ 30.412078] kasan_report+0xdc/0x128 [ 30.412159] __asan_report_store1_noabort+0x20/0x30 [ 30.412209] krealloc_more_oob_helper+0x5c0/0x678 [ 30.412402] krealloc_more_oob+0x20/0x38 [ 30.412622] kunit_try_run_case+0x170/0x3f0 [ 30.412742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.412850] kthread+0x328/0x630 [ 30.412976] ret_from_fork+0x10/0x20 [ 30.413041] [ 30.413069] Allocated by task 187: [ 30.413415] kasan_save_stack+0x3c/0x68 [ 30.413776] kasan_save_track+0x20/0x40 [ 30.413856] kasan_save_alloc_info+0x40/0x58 [ 30.413973] __kasan_krealloc+0x118/0x178 [ 30.414019] krealloc_noprof+0x128/0x360 [ 30.414066] krealloc_more_oob_helper+0x168/0x678 [ 30.414231] krealloc_more_oob+0x20/0x38 [ 30.414430] kunit_try_run_case+0x170/0x3f0 [ 30.414508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.414639] kthread+0x328/0x630 [ 30.414697] ret_from_fork+0x10/0x20 [ 30.414733] [ 30.414863] The buggy address belongs to the object at fff00000c1d5d000 [ 30.414863] which belongs to the cache kmalloc-256 of size 256 [ 30.415036] The buggy address is located 5 bytes to the right of [ 30.415036] allocated 235-byte region [fff00000c1d5d000, fff00000c1d5d0eb) [ 30.415194] [ 30.415272] The buggy address belongs to the physical page: [ 30.415338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d5c [ 30.415390] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.415669] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.415786] page_type: f5(slab) [ 30.415881] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.415977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.416138] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.416188] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.416375] head: 0bfffe0000000001 ffffc1ffc3075701 00000000ffffffff 00000000ffffffff [ 30.416429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.416676] page dumped because: kasan: bad access detected [ 30.416839] [ 30.417242] Memory state around the buggy address: [ 30.417423] fff00000c1d5cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.417642] fff00000c1d5d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.417865] >fff00000c1d5d080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.417930] ^ [ 30.417986] fff00000c1d5d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418465] fff00000c1d5d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418614] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 30.386323] ================================================================== [ 30.386526] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.386620] Free of addr fff00000c9b20001 by task kunit_try_catch/181 [ 30.386676] [ 30.386725] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.386819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.386846] Hardware name: linux,dummy-virt (DT) [ 30.386894] Call trace: [ 30.386933] show_stack+0x20/0x38 (C) [ 30.386982] dump_stack_lvl+0x8c/0xd0 [ 30.387029] print_report+0x118/0x5d0 [ 30.387072] kasan_report_invalid_free+0xc0/0xe8 [ 30.387119] __kasan_kfree_large+0x5c/0xa8 [ 30.387163] free_large_kmalloc+0x68/0x150 [ 30.387209] kfree+0x270/0x3c8 [ 30.387278] kmalloc_large_invalid_free+0x108/0x270 [ 30.387346] kunit_try_run_case+0x170/0x3f0 [ 30.387402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.387479] kthread+0x328/0x630 [ 30.387563] ret_from_fork+0x10/0x20 [ 30.387610] [ 30.387637] The buggy address belongs to the physical page: [ 30.387703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b20 [ 30.387821] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.388038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.388126] page_type: f8(unknown) [ 30.388236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.388344] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.388593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.388836] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.388988] head: 0bfffe0000000002 ffffc1ffc326c801 00000000ffffffff 00000000ffffffff [ 30.389071] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.389112] page dumped because: kasan: bad access detected [ 30.389164] [ 30.389183] Memory state around the buggy address: [ 30.389215] fff00000c9b1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.389258] fff00000c9b1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.389337] >fff00000c9b20000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.389564] ^ [ 30.389873] fff00000c9b20080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.389959] fff00000c9b20100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.390257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.380930] ================================================================== [ 30.380995] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.381124] Read of size 1 at addr fff00000c9a08000 by task kunit_try_catch/179 [ 30.381190] [ 30.381220] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.381303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.381349] Hardware name: linux,dummy-virt (DT) [ 30.381385] Call trace: [ 30.381407] show_stack+0x20/0x38 (C) [ 30.381452] dump_stack_lvl+0x8c/0xd0 [ 30.381498] print_report+0x118/0x5d0 [ 30.381553] kasan_report+0xdc/0x128 [ 30.381594] __asan_report_load1_noabort+0x20/0x30 [ 30.381641] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.381686] kunit_try_run_case+0x170/0x3f0 [ 30.381732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.381787] kthread+0x328/0x630 [ 30.381829] ret_from_fork+0x10/0x20 [ 30.381880] [ 30.381905] The buggy address belongs to the physical page: [ 30.381935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a08 [ 30.381986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.382054] raw: 0bfffe0000000000 fff00000da450d00 fff00000da450d00 0000000000000000 [ 30.382103] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.382142] page dumped because: kasan: bad access detected [ 30.382173] [ 30.382190] Memory state around the buggy address: [ 30.382220] fff00000c9a07f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.382262] fff00000c9a07f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.382304] >fff00000c9a08000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.382341] ^ [ 30.382374] fff00000c9a08080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.382427] fff00000c9a08100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.382465] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.372813] ================================================================== [ 30.372878] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.372953] Write of size 1 at addr fff00000c9a0a00a by task kunit_try_catch/177 [ 30.373002] [ 30.373032] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.373121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.373147] Hardware name: linux,dummy-virt (DT) [ 30.373177] Call trace: [ 30.373198] show_stack+0x20/0x38 (C) [ 30.373243] dump_stack_lvl+0x8c/0xd0 [ 30.373289] print_report+0x118/0x5d0 [ 30.373361] kasan_report+0xdc/0x128 [ 30.373402] __asan_report_store1_noabort+0x20/0x30 [ 30.373449] kmalloc_large_oob_right+0x278/0x2b8 [ 30.373497] kunit_try_run_case+0x170/0x3f0 [ 30.373554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.373621] kthread+0x328/0x630 [ 30.373679] ret_from_fork+0x10/0x20 [ 30.373725] [ 30.373790] The buggy address belongs to the physical page: [ 30.373857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a08 [ 30.373909] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.373981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.374075] page_type: f8(unknown) [ 30.374171] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.374226] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.374280] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.374328] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.374419] head: 0bfffe0000000002 ffffc1ffc3268201 00000000ffffffff 00000000ffffffff [ 30.374484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.374595] page dumped because: kasan: bad access detected [ 30.374645] [ 30.374671] Memory state around the buggy address: [ 30.374704] fff00000c9a09f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.374747] fff00000c9a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.374887] >fff00000c9a0a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.374947] ^ [ 30.375030] fff00000c9a0a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.375126] fff00000c9a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.375163] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.365391] ================================================================== [ 30.365478] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.365544] Write of size 1 at addr fff00000c6465f00 by task kunit_try_catch/175 [ 30.365592] [ 30.365620] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.365704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.365730] Hardware name: linux,dummy-virt (DT) [ 30.365760] Call trace: [ 30.365781] show_stack+0x20/0x38 (C) [ 30.365987] dump_stack_lvl+0x8c/0xd0 [ 30.366036] print_report+0x118/0x5d0 [ 30.366112] kasan_report+0xdc/0x128 [ 30.366176] __asan_report_store1_noabort+0x20/0x30 [ 30.366243] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.366309] kunit_try_run_case+0x170/0x3f0 [ 30.366354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.366436] kthread+0x328/0x630 [ 30.366502] ret_from_fork+0x10/0x20 [ 30.366559] [ 30.366576] Allocated by task 175: [ 30.366603] kasan_save_stack+0x3c/0x68 [ 30.366641] kasan_save_track+0x20/0x40 [ 30.366676] kasan_save_alloc_info+0x40/0x58 [ 30.366811] __kasan_kmalloc+0xd4/0xd8 [ 30.366917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.366977] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.367073] kunit_try_run_case+0x170/0x3f0 [ 30.367109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.367171] kthread+0x328/0x630 [ 30.367229] ret_from_fork+0x10/0x20 [ 30.367265] [ 30.367283] The buggy address belongs to the object at fff00000c6464000 [ 30.367283] which belongs to the cache kmalloc-8k of size 8192 [ 30.367387] The buggy address is located 0 bytes to the right of [ 30.367387] allocated 7936-byte region [fff00000c6464000, fff00000c6465f00) [ 30.367490] [ 30.367540] The buggy address belongs to the physical page: [ 30.367590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 30.367647] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.367693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.367743] page_type: f5(slab) [ 30.367810] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.367907] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.367968] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.368015] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.368082] head: 0bfffe0000000003 ffffc1ffc3191801 00000000ffffffff 00000000ffffffff [ 30.368130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.368169] page dumped because: kasan: bad access detected [ 30.368200] [ 30.368217] Memory state around the buggy address: [ 30.368248] fff00000c6465e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.368311] fff00000c6465e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.368353] >fff00000c6465f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.368524] ^ [ 30.368552] fff00000c6465f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.368634] fff00000c6466000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.368735] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.346145] ================================================================== [ 30.346195] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.346247] Write of size 1 at addr fff00000c6361878 by task kunit_try_catch/173 [ 30.346297] [ 30.346328] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.346419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.349366] Hardware name: linux,dummy-virt (DT) [ 30.349811] Call trace: [ 30.349836] show_stack+0x20/0x38 (C) [ 30.350355] dump_stack_lvl+0x8c/0xd0 [ 30.350780] print_report+0x118/0x5d0 [ 30.350833] kasan_report+0xdc/0x128 [ 30.351543] __asan_report_store1_noabort+0x20/0x30 [ 30.352059] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.352567] kunit_try_run_case+0x170/0x3f0 [ 30.352839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.352986] kthread+0x328/0x630 [ 30.353030] ret_from_fork+0x10/0x20 [ 30.353621] [ 30.353933] Allocated by task 173: [ 30.354300] kasan_save_stack+0x3c/0x68 [ 30.354591] kasan_save_track+0x20/0x40 [ 30.355056] kasan_save_alloc_info+0x40/0x58 [ 30.355385] __kasan_kmalloc+0xd4/0xd8 [ 30.355876] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.356230] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.356274] kunit_try_run_case+0x170/0x3f0 [ 30.357071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.357127] kthread+0x328/0x630 [ 30.358027] ret_from_fork+0x10/0x20 [ 30.358223] [ 30.358242] The buggy address belongs to the object at fff00000c6361800 [ 30.358242] which belongs to the cache kmalloc-128 of size 128 [ 30.358641] The buggy address is located 0 bytes to the right of [ 30.358641] allocated 120-byte region [fff00000c6361800, fff00000c6361878) [ 30.358859] [ 30.359328] The buggy address belongs to the physical page: [ 30.359383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.359438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.360482] page_type: f5(slab) [ 30.360568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.360624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.360665] page dumped because: kasan: bad access detected [ 30.360697] [ 30.360714] Memory state around the buggy address: [ 30.360746] fff00000c6361700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.360789] fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.361359] >fff00000c6361800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.361398] ^ [ 30.361440] fff00000c6361880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.361484] fff00000c6361900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.361531] ================================================================== [ 30.331476] ================================================================== [ 30.332076] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.332143] Write of size 1 at addr fff00000c6361778 by task kunit_try_catch/173 [ 30.332270] [ 30.332302] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.332388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.332414] Hardware name: linux,dummy-virt (DT) [ 30.332446] Call trace: [ 30.332468] show_stack+0x20/0x38 (C) [ 30.332528] dump_stack_lvl+0x8c/0xd0 [ 30.332574] print_report+0x118/0x5d0 [ 30.332629] kasan_report+0xdc/0x128 [ 30.332671] __asan_report_store1_noabort+0x20/0x30 [ 30.332970] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.333481] kunit_try_run_case+0x170/0x3f0 [ 30.333544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.333596] kthread+0x328/0x630 [ 30.333636] ret_from_fork+0x10/0x20 [ 30.334007] [ 30.334046] Allocated by task 173: [ 30.334075] kasan_save_stack+0x3c/0x68 [ 30.334146] kasan_save_track+0x20/0x40 [ 30.334181] kasan_save_alloc_info+0x40/0x58 [ 30.334217] __kasan_kmalloc+0xd4/0xd8 [ 30.334296] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.334456] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.334596] kunit_try_run_case+0x170/0x3f0 [ 30.334632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.334674] kthread+0x328/0x630 [ 30.334706] ret_from_fork+0x10/0x20 [ 30.335065] [ 30.335127] The buggy address belongs to the object at fff00000c6361700 [ 30.335127] which belongs to the cache kmalloc-128 of size 128 [ 30.335192] The buggy address is located 0 bytes to the right of [ 30.335192] allocated 120-byte region [fff00000c6361700, fff00000c6361778) [ 30.335256] [ 30.335275] The buggy address belongs to the physical page: [ 30.335306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.335357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.335404] page_type: f5(slab) [ 30.336093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.336852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.337361] page dumped because: kasan: bad access detected [ 30.337774] [ 30.337797] Memory state around the buggy address: [ 30.338607] fff00000c6361600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.338918] fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.339010] >fff00000c6361700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.339296] ^ [ 30.339346] fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.339831] fff00000c6361800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340420] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 30.317998] ================================================================== [ 30.318120] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 30.318225] Read of size 1 at addr fff00000c99ed000 by task kunit_try_catch/171 [ 30.318274] [ 30.318359] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.318783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.318916] Hardware name: linux,dummy-virt (DT) [ 30.318949] Call trace: [ 30.318970] show_stack+0x20/0x38 (C) [ 30.319026] dump_stack_lvl+0x8c/0xd0 [ 30.319090] print_report+0x118/0x5d0 [ 30.319144] kasan_report+0xdc/0x128 [ 30.319247] __asan_report_load1_noabort+0x20/0x30 [ 30.319295] kmalloc_node_oob_right+0x2f4/0x330 [ 30.319345] kunit_try_run_case+0x170/0x3f0 [ 30.319649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.319805] kthread+0x328/0x630 [ 30.319848] ret_from_fork+0x10/0x20 [ 30.319895] [ 30.319913] Allocated by task 171: [ 30.319993] kasan_save_stack+0x3c/0x68 [ 30.320048] kasan_save_track+0x20/0x40 [ 30.320090] kasan_save_alloc_info+0x40/0x58 [ 30.320128] __kasan_kmalloc+0xd4/0xd8 [ 30.320165] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.320206] kmalloc_node_oob_right+0xbc/0x330 [ 30.320245] kunit_try_run_case+0x170/0x3f0 [ 30.320318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.320362] kthread+0x328/0x630 [ 30.320607] ret_from_fork+0x10/0x20 [ 30.320644] [ 30.320663] The buggy address belongs to the object at fff00000c99ec000 [ 30.320663] which belongs to the cache kmalloc-4k of size 4096 [ 30.320721] The buggy address is located 0 bytes to the right of [ 30.320721] allocated 4096-byte region [fff00000c99ec000, fff00000c99ed000) [ 30.320785] [ 30.320805] The buggy address belongs to the physical page: [ 30.320878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099e8 [ 30.321140] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.321189] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.321607] page_type: f5(slab) [ 30.321682] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.321803] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.321912] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.321967] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.322198] head: 0bfffe0000000003 ffffc1ffc3267a01 00000000ffffffff 00000000ffffffff [ 30.322340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.322390] page dumped because: kasan: bad access detected [ 30.322441] [ 30.322551] Memory state around the buggy address: [ 30.322638] fff00000c99ecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.322753] fff00000c99ecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.322856] >fff00000c99ed000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.322987] ^ [ 30.323031] fff00000c99ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.323110] fff00000c99ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.323290] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 30.301890] ================================================================== [ 30.301983] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.302120] Read of size 1 at addr fff00000c636023f by task kunit_try_catch/169 [ 30.302322] [ 30.302354] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.302442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.302468] Hardware name: linux,dummy-virt (DT) [ 30.302517] Call trace: [ 30.302539] show_stack+0x20/0x38 (C) [ 30.302586] dump_stack_lvl+0x8c/0xd0 [ 30.303018] print_report+0x118/0x5d0 [ 30.303369] kasan_report+0xdc/0x128 [ 30.303419] __asan_report_load1_noabort+0x20/0x30 [ 30.303736] kmalloc_oob_left+0x2ec/0x320 [ 30.304122] kunit_try_run_case+0x170/0x3f0 [ 30.304211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.304289] kthread+0x328/0x630 [ 30.304379] ret_from_fork+0x10/0x20 [ 30.304536] [ 30.304757] Allocated by task 108: [ 30.304941] kasan_save_stack+0x3c/0x68 [ 30.305011] kasan_save_track+0x20/0x40 [ 30.305077] kasan_save_alloc_info+0x40/0x58 [ 30.305114] __kasan_kmalloc+0xd4/0xd8 [ 30.305151] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.305400] kvasprintf+0xe0/0x180 [ 30.305471] kasprintf+0xd0/0x110 [ 30.305768] miscdev_test_can_open+0xac/0x2c8 [ 30.305921] miscdev_test_conflict_reverse+0x330/0x620 [ 30.305973] kunit_try_run_case+0x170/0x3f0 [ 30.306009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306052] kthread+0x328/0x630 [ 30.306263] ret_from_fork+0x10/0x20 [ 30.306298] [ 30.306334] Freed by task 108: [ 30.306379] kasan_save_stack+0x3c/0x68 [ 30.306416] kasan_save_track+0x20/0x40 [ 30.306875] kasan_save_free_info+0x4c/0x78 [ 30.306923] __kasan_slab_free+0x6c/0x98 [ 30.306988] kfree+0x214/0x3c8 [ 30.307043] miscdev_test_can_open+0x138/0x2c8 [ 30.307148] miscdev_test_conflict_reverse+0x330/0x620 [ 30.307188] kunit_try_run_case+0x170/0x3f0 [ 30.307225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.307267] kthread+0x328/0x630 [ 30.307299] ret_from_fork+0x10/0x20 [ 30.307347] [ 30.307371] The buggy address belongs to the object at fff00000c6360220 [ 30.307371] which belongs to the cache kmalloc-16 of size 16 [ 30.307476] The buggy address is located 15 bytes to the right of [ 30.307476] allocated 16-byte region [fff00000c6360220, fff00000c6360230) [ 30.307852] [ 30.308221] The buggy address belongs to the physical page: [ 30.308256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 30.308309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.308675] page_type: f5(slab) [ 30.308921] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.309030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.309071] page dumped because: kasan: bad access detected [ 30.309102] [ 30.309120] Memory state around the buggy address: [ 30.309170] fff00000c6360100: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 30.309214] fff00000c6360180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.309256] >fff00000c6360200: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 30.309294] ^ [ 30.309327] fff00000c6360280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.309369] fff00000c6360300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.309407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 30.287059] ================================================================== [ 30.287097] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.287138] Read of size 1 at addr fff00000c6361680 by task kunit_try_catch/167 [ 30.287185] [ 30.287214] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.287294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.287320] Hardware name: linux,dummy-virt (DT) [ 30.287349] Call trace: [ 30.287369] show_stack+0x20/0x38 (C) [ 30.287414] dump_stack_lvl+0x8c/0xd0 [ 30.287460] print_report+0x118/0x5d0 [ 30.287503] kasan_report+0xdc/0x128 [ 30.287557] __asan_report_load1_noabort+0x20/0x30 [ 30.287605] kmalloc_oob_right+0x5d0/0x660 [ 30.287651] kunit_try_run_case+0x170/0x3f0 [ 30.287757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.287949] kthread+0x328/0x630 [ 30.288020] ret_from_fork+0x10/0x20 [ 30.288066] [ 30.288084] Allocated by task 167: [ 30.288111] kasan_save_stack+0x3c/0x68 [ 30.288222] kasan_save_track+0x20/0x40 [ 30.288291] kasan_save_alloc_info+0x40/0x58 [ 30.288483] __kasan_kmalloc+0xd4/0xd8 [ 30.288670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.288728] kmalloc_oob_right+0xb0/0x660 [ 30.288765] kunit_try_run_case+0x170/0x3f0 [ 30.288801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.288843] kthread+0x328/0x630 [ 30.288874] ret_from_fork+0x10/0x20 [ 30.288909] [ 30.288981] The buggy address belongs to the object at fff00000c6361600 [ 30.288981] which belongs to the cache kmalloc-128 of size 128 [ 30.289294] The buggy address is located 13 bytes to the right of [ 30.289294] allocated 115-byte region [fff00000c6361600, fff00000c6361673) [ 30.289414] [ 30.289469] The buggy address belongs to the physical page: [ 30.289572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.289622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.290466] page_type: f5(slab) [ 30.290614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.290760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.290863] page dumped because: kasan: bad access detected [ 30.290943] [ 30.290961] Memory state around the buggy address: [ 30.290993] fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.291317] fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.291374] >fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.291668] ^ [ 30.291794] fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.291901] fff00000c6361780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.292027] ================================================================== [ 30.277349] ================================================================== [ 30.277699] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.278536] Write of size 1 at addr fff00000c6361673 by task kunit_try_catch/167 [ 30.278646] [ 30.279436] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.279615] Tainted: [N]=TEST [ 30.279648] Hardware name: linux,dummy-virt (DT) [ 30.279933] Call trace: [ 30.280115] show_stack+0x20/0x38 (C) [ 30.280256] dump_stack_lvl+0x8c/0xd0 [ 30.280310] print_report+0x118/0x5d0 [ 30.280354] kasan_report+0xdc/0x128 [ 30.280397] __asan_report_store1_noabort+0x20/0x30 [ 30.280446] kmalloc_oob_right+0x5a4/0x660 [ 30.280493] kunit_try_run_case+0x170/0x3f0 [ 30.280556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.280608] kthread+0x328/0x630 [ 30.280652] ret_from_fork+0x10/0x20 [ 30.280811] [ 30.280849] Allocated by task 167: [ 30.280962] kasan_save_stack+0x3c/0x68 [ 30.281025] kasan_save_track+0x20/0x40 [ 30.281061] kasan_save_alloc_info+0x40/0x58 [ 30.281099] __kasan_kmalloc+0xd4/0xd8 [ 30.281137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.281179] kmalloc_oob_right+0xb0/0x660 [ 30.281217] kunit_try_run_case+0x170/0x3f0 [ 30.281252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.281295] kthread+0x328/0x630 [ 30.281326] ret_from_fork+0x10/0x20 [ 30.281378] [ 30.281435] The buggy address belongs to the object at fff00000c6361600 [ 30.281435] which belongs to the cache kmalloc-128 of size 128 [ 30.281538] The buggy address is located 0 bytes to the right of [ 30.281538] allocated 115-byte region [fff00000c6361600, fff00000c6361673) [ 30.281608] [ 30.281690] The buggy address belongs to the physical page: [ 30.281858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.282122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.282410] page_type: f5(slab) [ 30.282714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.282791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.282898] page dumped because: kasan: bad access detected [ 30.282937] [ 30.282962] Memory state around the buggy address: [ 30.283178] fff00000c6361500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.283242] fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.283296] >fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.283350] ^ [ 30.283435] fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.283478] fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.283555] ================================================================== [ 30.284638] ================================================================== [ 30.284677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.284725] Write of size 1 at addr fff00000c6361678 by task kunit_try_catch/167 [ 30.284773] [ 30.284802] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.284884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.284910] Hardware name: linux,dummy-virt (DT) [ 30.284939] Call trace: [ 30.284959] show_stack+0x20/0x38 (C) [ 30.285005] dump_stack_lvl+0x8c/0xd0 [ 30.285050] print_report+0x118/0x5d0 [ 30.285093] kasan_report+0xdc/0x128 [ 30.285136] __asan_report_store1_noabort+0x20/0x30 [ 30.285185] kmalloc_oob_right+0x538/0x660 [ 30.285231] kunit_try_run_case+0x170/0x3f0 [ 30.285277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.285329] kthread+0x328/0x630 [ 30.285370] ret_from_fork+0x10/0x20 [ 30.285415] [ 30.285432] Allocated by task 167: [ 30.285458] kasan_save_stack+0x3c/0x68 [ 30.285496] kasan_save_track+0x20/0x40 [ 30.285561] kasan_save_alloc_info+0x40/0x58 [ 30.285600] __kasan_kmalloc+0xd4/0xd8 [ 30.285636] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.285704] kmalloc_oob_right+0xb0/0x660 [ 30.285816] kunit_try_run_case+0x170/0x3f0 [ 30.285852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.285895] kthread+0x328/0x630 [ 30.285946] ret_from_fork+0x10/0x20 [ 30.286041] [ 30.286125] The buggy address belongs to the object at fff00000c6361600 [ 30.286125] which belongs to the cache kmalloc-128 of size 128 [ 30.286249] The buggy address is located 5 bytes to the right of [ 30.286249] allocated 115-byte region [fff00000c6361600, fff00000c6361673) [ 30.286339] [ 30.286359] The buggy address belongs to the physical page: [ 30.286393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.286444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.286489] page_type: f5(slab) [ 30.286535] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.286584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.286623] page dumped because: kasan: bad access detected [ 30.286653] [ 30.286671] Memory state around the buggy address: [ 30.286702] fff00000c6361500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.286744] fff00000c6361580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.286786] >fff00000c6361600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.286823] ^ [ 30.286861] fff00000c6361680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.286902] fff00000c6361700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.286939] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 109.867184] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689 [ 109.869091] Modules linked in: [ 109.869536] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 109.870867] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.871443] Hardware name: linux,dummy-virt (DT) [ 109.871907] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.872199] pc : intlog10+0x38/0x48 [ 109.872379] lr : intlog10_test+0xe4/0x200 [ 109.872662] sp : ffff800082357c10 [ 109.872997] x29: ffff800082357c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.873747] x26: 1ffe0000191edb21 x25: 0000000000000000 x24: ffff800082357ce0 [ 109.874493] x23: ffff800082357d00 x22: 0000000000000000 x21: 1ffff0001046af82 [ 109.875237] x20: ffff9420b4a416a0 x19: ffff800080087990 x18: 0000000054f6d338 [ 109.876097] x17: 000000008c675fcd x16: fff00000c9a0cc3c x15: 00000000b029b3a1 [ 109.876858] x14: 000000004e4d7479 x13: 1ffe00001b48dddd x12: ffff728417128989 [ 109.877232] x11: 1ffff28417128988 x10: ffff728417128988 x9 : ffff9420b2055c2c [ 109.877579] x8 : ffff9420b8944c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.877913] x5 : ffff70001046af82 x4 : 1ffff00010010f3b x3 : 1ffff284169482d4 [ 109.878246] x2 : 1ffff284169482d4 x1 : 0000000000000003 x0 : 0000000000000000 [ 109.878719] Call trace: [ 109.878990] intlog10+0x38/0x48 (P) [ 109.879365] kunit_try_run_case+0x170/0x3f0 [ 109.879807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.880430] kthread+0x328/0x630 [ 109.880807] ret_from_fork+0x10/0x20 [ 109.881208] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 109.818604] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671 [ 109.820463] Modules linked in: [ 109.820943] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 109.821695] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 109.821901] Hardware name: linux,dummy-virt (DT) [ 109.822096] pstate: 11400009 (nzcV daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 109.822368] pc : intlog2+0xd8/0xf8 [ 109.822566] lr : intlog2_test+0xe4/0x200 [ 109.822750] sp : ffff800082287c10 [ 109.822902] x29: ffff800082287c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.823247] x26: 1ffe0000193481e1 x25: 0000000000000000 x24: ffff800082287ce0 [ 109.823760] x23: ffff800082287d00 x22: 0000000000000000 x21: 1ffff00010450f82 [ 109.824963] x20: ffff9420b4a415a0 x19: ffff800080087990 x18: 00000000e2ffed71 [ 109.825731] x17: 000000004a25e5c9 x16: 0000000055e4976c x15: 0000000012b2e2ff [ 109.826475] x14: 00000000c9d885e5 x13: 000000004e97caf9 x12: ffff728417128989 [ 109.827235] x11: 1ffff28417128988 x10: ffff728417128988 x9 : ffff9420b2055e2c [ 109.828149] x8 : ffff9420b8944c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.829017] x5 : ffff700010450f82 x4 : 1ffff00010010f3b x3 : 1ffff284169482b4 [ 109.829777] x2 : 1ffff284169482b4 x1 : 0000000000000003 x0 : 0000000000000000 [ 109.830542] Call trace: [ 109.830843] intlog2+0xd8/0xf8 (P) [ 109.831247] kunit_try_run_case+0x170/0x3f0 [ 109.831714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.832677] kthread+0x328/0x630 [ 109.833095] ret_from_fork+0x10/0x20 [ 109.833538] ---[ end trace 0000000000000000 ]---