Date
July 17, 2025, 10:12 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 32.007515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 32.073972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 31.961575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 31.956789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 111.223920] Internal error: Oops: 0000000096000005 [#1] SMP [ 111.228828] Modules linked in: [ 111.230313] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 111.231604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 111.232152] Hardware name: linux,dummy-virt (DT) [ 111.232982] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 111.233719] pc : kunit_test_null_dereference+0x70/0x170 [ 111.234507] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.235212] sp : ffff8000820c7d30 [ 111.235708] x29: ffff8000820c7d90 x28: 0000000000000000 x27: 0000000000000000 [ 111.236622] x26: 1ffe0000187e7b61 x25: 0000000000000000 x24: 0000000000000004 [ 111.237423] x23: fff00000c3f3db0c x22: ffffad48b3842488 x21: fff00000c3e19008 [ 111.238175] x20: 1ffff00010418fa6 x19: ffff800080087990 x18: 00000000f99d63e3 [ 111.238931] x17: 0000000000000001 x16: fff00000c642543c x15: fff00000ff616b48 [ 111.239659] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: fffd800018ed18b4 [ 111.240403] x11: 1ffe000018ed18b3 x10: fffd800018ed18b3 x9 : ffffad48b3839c18 [ 111.240946] x8 : ffff8000820c7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 111.241671] x5 : ffff700010418fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 111.242378] x2 : dfff800000000000 x1 : fff00000c768bcc0 x0 : ffff800080087990 [ 111.242901] Call trace: [ 111.243078] kunit_test_null_dereference+0x70/0x170 (P) [ 111.243324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.243557] kthread+0x328/0x630 [ 111.243733] ret_from_fork+0x10/0x20 [ 111.244161] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 111.245148] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 65.469382] ================================================================== [ 65.469469] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 65.469469] [ 65.469551] Use-after-free read at 0x00000000035ab68f (in kfence-#218): [ 65.469604] test_krealloc+0x51c/0x830 [ 65.469649] kunit_try_run_case+0x170/0x3f0 [ 65.469693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.469737] kthread+0x328/0x630 [ 65.469775] ret_from_fork+0x10/0x20 [ 65.469815] [ 65.469841] kfence-#218: 0x00000000035ab68f-0x000000003b642baa, size=32, cache=kmalloc-32 [ 65.469841] [ 65.469895] allocated by task 368 on cpu 1 at 65.468745s (0.001146s ago): [ 65.469966] test_alloc+0x29c/0x628 [ 65.470005] test_krealloc+0xc0/0x830 [ 65.470041] kunit_try_run_case+0x170/0x3f0 [ 65.470098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.470143] kthread+0x328/0x630 [ 65.470179] ret_from_fork+0x10/0x20 [ 65.470218] [ 65.470240] freed by task 368 on cpu 1 at 65.468967s (0.001270s ago): [ 65.470307] krealloc_noprof+0x148/0x360 [ 65.470349] test_krealloc+0x1dc/0x830 [ 65.470384] kunit_try_run_case+0x170/0x3f0 [ 65.470424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.470466] kthread+0x328/0x630 [ 65.470501] ret_from_fork+0x10/0x20 [ 65.470539] [ 65.470582] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 65.470660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.470690] Hardware name: linux,dummy-virt (DT) [ 65.470722] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 65.304848] ================================================================== [ 65.304938] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.304938] [ 65.305028] Use-after-free read at 0x00000000ca58501b (in kfence-#216): [ 65.305097] test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.305145] kunit_try_run_case+0x170/0x3f0 [ 65.305187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.305232] kthread+0x328/0x630 [ 65.305270] ret_from_fork+0x10/0x20 [ 65.305310] [ 65.305334] kfence-#216: 0x00000000ca58501b-0x000000000562a0ef, size=32, cache=test [ 65.305334] [ 65.305386] allocated by task 366 on cpu 1 at 65.264674s (0.040708s ago): [ 65.305463] test_alloc+0x230/0x628 [ 65.305500] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 65.305541] kunit_try_run_case+0x170/0x3f0 [ 65.305578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.305620] kthread+0x328/0x630 [ 65.305655] ret_from_fork+0x10/0x20 [ 65.305695] [ 65.305718] freed by task 366 on cpu 1 at 65.264782s (0.040932s ago): [ 65.305776] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 65.305816] kunit_try_run_case+0x170/0x3f0 [ 65.305853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.305895] kthread+0x328/0x630 [ 65.305932] ret_from_fork+0x10/0x20 [ 65.305970] [ 65.306013] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 65.306101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.306131] Hardware name: linux,dummy-virt (DT) [ 65.306164] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 42.712252] ================================================================== [ 42.712405] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 42.712405] [ 42.712507] Invalid read at 0x00000000a644a9b4: [ 42.713015] test_invalid_access+0xdc/0x1f0 [ 42.713092] kunit_try_run_case+0x170/0x3f0 [ 42.713145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.713216] kthread+0x328/0x630 [ 42.713262] ret_from_fork+0x10/0x20 [ 42.713473] [ 42.713700] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 42.713789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.713823] Hardware name: linux,dummy-virt (DT) [ 42.713863] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 42.485095] ================================================================== [ 42.485196] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.485196] [ 42.485262] Corrupted memory at 0x00000000df05bd2d [ ! . . . . . . . . . . . . . . . ] (in kfence-#212): [ 42.485577] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.485625] kunit_try_run_case+0x170/0x3f0 [ 42.485666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.485709] kthread+0x328/0x630 [ 42.485748] ret_from_fork+0x10/0x20 [ 42.485788] [ 42.485812] kfence-#212: 0x000000007dea4894-0x000000003c1a0da0, size=73, cache=kmalloc-96 [ 42.485812] [ 42.485866] allocated by task 356 on cpu 1 at 42.484836s (0.001026s ago): [ 42.485932] test_alloc+0x29c/0x628 [ 42.485970] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 42.486010] kunit_try_run_case+0x170/0x3f0 [ 42.486050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.486106] kthread+0x328/0x630 [ 42.486143] ret_from_fork+0x10/0x20 [ 42.486183] [ 42.486206] freed by task 356 on cpu 1 at 42.484985s (0.001218s ago): [ 42.486272] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.486313] kunit_try_run_case+0x170/0x3f0 [ 42.486353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.486395] kthread+0x328/0x630 [ 42.486432] ret_from_fork+0x10/0x20 [ 42.486472] [ 42.486514] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 42.486595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.486627] Hardware name: linux,dummy-virt (DT) [ 42.486660] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 41.964951] ================================================================== [ 41.965020] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.965020] [ 41.965128] Out-of-bounds read at 0x00000000be69f390 (105B right of kfence-#207): [ 41.965189] test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.965236] kunit_try_run_case+0x170/0x3f0 [ 41.965280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.965324] kthread+0x328/0x630 [ 41.965365] ret_from_fork+0x10/0x20 [ 41.965404] [ 41.965428] kfence-#207: 0x00000000717a17ae-0x000000007b3acd41, size=73, cache=kmalloc-96 [ 41.965428] [ 41.965481] allocated by task 354 on cpu 1 at 41.964725s (0.000752s ago): [ 41.965554] test_alloc+0x29c/0x628 [ 41.965593] test_kmalloc_aligned_oob_read+0x100/0x468 [ 41.965634] kunit_try_run_case+0x170/0x3f0 [ 41.965673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.965715] kthread+0x328/0x630 [ 41.965751] ret_from_fork+0x10/0x20 [ 41.965790] [ 41.965836] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 41.965919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.965947] Hardware name: linux,dummy-virt (DT) [ 41.965982] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 36.452944] ================================================================== [ 36.453069] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 36.453069] [ 36.453139] Corrupted memory at 0x00000000a2f53f86 [ ! . . . . . . . . . . . . . . . ] (in kfence-#154): [ 36.453458] test_corruption+0x120/0x378 [ 36.453504] kunit_try_run_case+0x170/0x3f0 [ 36.453551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.453597] kthread+0x328/0x630 [ 36.453637] ret_from_fork+0x10/0x20 [ 36.453678] [ 36.453701] kfence-#154: 0x00000000f4c408e3-0x00000000e3981f8f, size=32, cache=test [ 36.453701] [ 36.453761] allocated by task 344 on cpu 0 at 36.452781s (0.000977s ago): [ 36.453830] test_alloc+0x230/0x628 [ 36.453868] test_corruption+0xdc/0x378 [ 36.453906] kunit_try_run_case+0x170/0x3f0 [ 36.453947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.453991] kthread+0x328/0x630 [ 36.454028] ret_from_fork+0x10/0x20 [ 36.454076] [ 36.454099] freed by task 344 on cpu 0 at 36.452842s (0.001254s ago): [ 36.454168] test_corruption+0x120/0x378 [ 36.454208] kunit_try_run_case+0x170/0x3f0 [ 36.454248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.454292] kthread+0x328/0x630 [ 36.454328] ret_from_fork+0x10/0x20 [ 36.454367] [ 36.454410] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 36.454498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.454528] Hardware name: linux,dummy-virt (DT) [ 36.454564] ================================================================== [ 36.556981] ================================================================== [ 36.557092] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 36.557092] [ 36.557156] Corrupted memory at 0x00000000c0204352 [ ! ] (in kfence-#155): [ 36.557275] test_corruption+0x1d8/0x378 [ 36.557321] kunit_try_run_case+0x170/0x3f0 [ 36.557365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.557411] kthread+0x328/0x630 [ 36.557449] ret_from_fork+0x10/0x20 [ 36.557490] [ 36.557513] kfence-#155: 0x000000001ed096f6-0x0000000043487ab5, size=32, cache=test [ 36.557513] [ 36.557577] allocated by task 344 on cpu 0 at 36.556818s (0.000755s ago): [ 36.557647] test_alloc+0x230/0x628 [ 36.557687] test_corruption+0x198/0x378 [ 36.557728] kunit_try_run_case+0x170/0x3f0 [ 36.557769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.557816] kthread+0x328/0x630 [ 36.557854] ret_from_fork+0x10/0x20 [ 36.557895] [ 36.557918] freed by task 344 on cpu 0 at 36.556891s (0.001024s ago): [ 36.557989] test_corruption+0x1d8/0x378 [ 36.558028] kunit_try_run_case+0x170/0x3f0 [ 36.558080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.558128] kthread+0x328/0x630 [ 36.558164] ret_from_fork+0x10/0x20 [ 36.558205] [ 36.558243] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 36.558336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.558368] Hardware name: linux,dummy-virt (DT) [ 36.558405] ================================================================== [ 35.413069] ================================================================== [ 35.413186] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 35.413186] [ 35.413259] Corrupted memory at 0x00000000d0f082c4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#144): [ 35.414418] test_corruption+0x278/0x378 [ 35.414473] kunit_try_run_case+0x170/0x3f0 [ 35.414520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.414568] kthread+0x328/0x630 [ 35.414611] ret_from_fork+0x10/0x20 [ 35.414655] [ 35.414681] kfence-#144: 0x0000000089d0b6f1-0x0000000073aa3ecd, size=32, cache=kmalloc-32 [ 35.414681] [ 35.414744] allocated by task 342 on cpu 0 at 35.412768s (0.001973s ago): [ 35.414821] test_alloc+0x29c/0x628 [ 35.414864] test_corruption+0xdc/0x378 [ 35.414905] kunit_try_run_case+0x170/0x3f0 [ 35.414946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.414990] kthread+0x328/0x630 [ 35.415028] ret_from_fork+0x10/0x20 [ 35.415080] [ 35.415103] freed by task 342 on cpu 0 at 35.412872s (0.002227s ago): [ 35.415172] test_corruption+0x278/0x378 [ 35.415210] kunit_try_run_case+0x170/0x3f0 [ 35.415251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.415294] kthread+0x328/0x630 [ 35.415330] ret_from_fork+0x10/0x20 [ 35.415371] [ 35.415418] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 35.415505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.415537] Hardware name: linux,dummy-virt (DT) [ 35.415573] ================================================================== [ 35.517086] ================================================================== [ 35.517180] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 35.517180] [ 35.517244] Corrupted memory at 0x0000000004324241 [ ! ] (in kfence-#145): [ 35.517380] test_corruption+0x284/0x378 [ 35.517426] kunit_try_run_case+0x170/0x3f0 [ 35.517469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.517515] kthread+0x328/0x630 [ 35.517555] ret_from_fork+0x10/0x20 [ 35.517594] [ 35.517619] kfence-#145: 0x000000005a0f271f-0x00000000a5e6e6a8, size=32, cache=kmalloc-32 [ 35.517619] [ 35.517680] allocated by task 342 on cpu 0 at 35.516790s (0.000887s ago): [ 35.517749] test_alloc+0x29c/0x628 [ 35.517788] test_corruption+0x198/0x378 [ 35.517828] kunit_try_run_case+0x170/0x3f0 [ 35.517867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.517912] kthread+0x328/0x630 [ 35.517948] ret_from_fork+0x10/0x20 [ 35.517990] [ 35.518013] freed by task 342 on cpu 0 at 35.516903s (0.001106s ago): [ 35.518095] test_corruption+0x284/0x378 [ 35.518134] kunit_try_run_case+0x170/0x3f0 [ 35.518173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.518218] kthread+0x328/0x630 [ 35.518255] ret_from_fork+0x10/0x20 [ 35.518295] [ 35.518334] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 35.518422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.518453] Hardware name: linux,dummy-virt (DT) [ 35.518488] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 35.204874] ================================================================== [ 35.204954] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 35.204954] [ 35.205016] Invalid free of 0x0000000038fa978d (in kfence-#142): [ 35.205088] test_invalid_addr_free+0x1ac/0x238 [ 35.205134] kunit_try_run_case+0x170/0x3f0 [ 35.205178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.205224] kthread+0x328/0x630 [ 35.205266] ret_from_fork+0x10/0x20 [ 35.205307] [ 35.205331] kfence-#142: 0x0000000054b67fc4-0x0000000054eb5d6f, size=32, cache=kmalloc-32 [ 35.205331] [ 35.205385] allocated by task 338 on cpu 1 at 35.204733s (0.000648s ago): [ 35.205452] test_alloc+0x29c/0x628 [ 35.205491] test_invalid_addr_free+0xd4/0x238 [ 35.205531] kunit_try_run_case+0x170/0x3f0 [ 35.205571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.205614] kthread+0x328/0x630 [ 35.205651] ret_from_fork+0x10/0x20 [ 35.205692] [ 35.205736] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 35.205815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.205844] Hardware name: linux,dummy-virt (DT) [ 35.205877] ================================================================== [ 35.308858] ================================================================== [ 35.308946] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 35.308946] [ 35.309005] Invalid free of 0x000000005edac6bc (in kfence-#143): [ 35.309077] test_invalid_addr_free+0xec/0x238 [ 35.309121] kunit_try_run_case+0x170/0x3f0 [ 35.309165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.309209] kthread+0x328/0x630 [ 35.309247] ret_from_fork+0x10/0x20 [ 35.309287] [ 35.309311] kfence-#143: 0x0000000019d546bd-0x0000000026079be3, size=32, cache=test [ 35.309311] [ 35.309363] allocated by task 340 on cpu 1 at 35.308735s (0.000624s ago): [ 35.309428] test_alloc+0x230/0x628 [ 35.309467] test_invalid_addr_free+0xd4/0x238 [ 35.309504] kunit_try_run_case+0x170/0x3f0 [ 35.309544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.309587] kthread+0x328/0x630 [ 35.309622] ret_from_fork+0x10/0x20 [ 35.309661] [ 35.309701] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 35.309782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.309813] Hardware name: linux,dummy-virt (DT) [ 35.309844] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 34.997052] ================================================================== [ 34.997211] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 34.997211] [ 34.997283] Invalid free of 0x000000009583b782 (in kfence-#140): [ 34.997355] test_double_free+0x1bc/0x238 [ 34.997401] kunit_try_run_case+0x170/0x3f0 [ 34.997446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.997494] kthread+0x328/0x630 [ 34.997533] ret_from_fork+0x10/0x20 [ 34.997577] [ 34.997605] kfence-#140: 0x000000009583b782-0x0000000012423584, size=32, cache=kmalloc-32 [ 34.997605] [ 34.997668] allocated by task 334 on cpu 0 at 34.996749s (0.000915s ago): [ 34.997742] test_alloc+0x29c/0x628 [ 34.997782] test_double_free+0xd4/0x238 [ 34.997821] kunit_try_run_case+0x170/0x3f0 [ 34.997862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.997907] kthread+0x328/0x630 [ 34.997945] ret_from_fork+0x10/0x20 [ 34.997985] [ 34.998009] freed by task 334 on cpu 0 at 34.996829s (0.001177s ago): [ 34.998093] test_double_free+0x1ac/0x238 [ 34.998133] kunit_try_run_case+0x170/0x3f0 [ 34.998174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.998220] kthread+0x328/0x630 [ 34.998257] ret_from_fork+0x10/0x20 [ 34.998297] [ 34.998341] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 34.998430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.998459] Hardware name: linux,dummy-virt (DT) [ 34.998492] ================================================================== [ 35.100996] ================================================================== [ 35.101105] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 35.101105] [ 35.101172] Invalid free of 0x0000000062d1ec6e (in kfence-#141): [ 35.101231] test_double_free+0x100/0x238 [ 35.101278] kunit_try_run_case+0x170/0x3f0 [ 35.101321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.101367] kthread+0x328/0x630 [ 35.101409] ret_from_fork+0x10/0x20 [ 35.101448] [ 35.101473] kfence-#141: 0x0000000062d1ec6e-0x0000000036b72e47, size=32, cache=test [ 35.101473] [ 35.101530] allocated by task 336 on cpu 0 at 35.100773s (0.000752s ago): [ 35.101599] test_alloc+0x230/0x628 [ 35.101638] test_double_free+0xd4/0x238 [ 35.101678] kunit_try_run_case+0x170/0x3f0 [ 35.101717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.101762] kthread+0x328/0x630 [ 35.101800] ret_from_fork+0x10/0x20 [ 35.101839] [ 35.101862] freed by task 336 on cpu 0 at 35.100847s (0.001012s ago): [ 35.101931] test_double_free+0xf0/0x238 [ 35.101971] kunit_try_run_case+0x170/0x3f0 [ 35.102010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.102065] kthread+0x328/0x630 [ 35.102102] ret_from_fork+0x10/0x20 [ 35.102142] [ 35.102183] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 35.102270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.102299] Hardware name: linux,dummy-virt (DT) [ 35.102335] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 34.581107] ================================================================== [ 34.581216] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.581216] [ 34.581316] Use-after-free read at 0x00000000c3e386c6 (in kfence-#136): [ 34.581371] test_use_after_free_read+0x114/0x248 [ 34.581417] kunit_try_run_case+0x170/0x3f0 [ 34.581461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.581503] kthread+0x328/0x630 [ 34.581544] ret_from_fork+0x10/0x20 [ 34.581582] [ 34.581606] kfence-#136: 0x00000000c3e386c6-0x000000007eeb7709, size=32, cache=kmalloc-32 [ 34.581606] [ 34.581659] allocated by task 326 on cpu 1 at 34.580788s (0.000867s ago): [ 34.581733] test_alloc+0x29c/0x628 [ 34.581770] test_use_after_free_read+0xd0/0x248 [ 34.581811] kunit_try_run_case+0x170/0x3f0 [ 34.581848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.581891] kthread+0x328/0x630 [ 34.581926] ret_from_fork+0x10/0x20 [ 34.581970] [ 34.582115] freed by task 326 on cpu 1 at 34.580867s (0.001148s ago): [ 34.582232] test_use_after_free_read+0x1c0/0x248 [ 34.582275] kunit_try_run_case+0x170/0x3f0 [ 34.582317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.582358] kthread+0x328/0x630 [ 34.582394] ret_from_fork+0x10/0x20 [ 34.582446] [ 34.582495] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 34.582577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.582607] Hardware name: linux,dummy-virt (DT) [ 34.582643] ================================================================== [ 34.684995] ================================================================== [ 34.685106] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.685106] [ 34.685198] Use-after-free read at 0x00000000f5ed2f20 (in kfence-#137): [ 34.685253] test_use_after_free_read+0x114/0x248 [ 34.685299] kunit_try_run_case+0x170/0x3f0 [ 34.685343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.685386] kthread+0x328/0x630 [ 34.685426] ret_from_fork+0x10/0x20 [ 34.685466] [ 34.685491] kfence-#137: 0x00000000f5ed2f20-0x0000000041e8e864, size=32, cache=test [ 34.685491] [ 34.685542] allocated by task 328 on cpu 0 at 34.684782s (0.000757s ago): [ 34.685614] test_alloc+0x230/0x628 [ 34.685653] test_use_after_free_read+0xd0/0x248 [ 34.685691] kunit_try_run_case+0x170/0x3f0 [ 34.685728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.685772] kthread+0x328/0x630 [ 34.685807] ret_from_fork+0x10/0x20 [ 34.685846] [ 34.685869] freed by task 328 on cpu 0 at 34.684852s (0.001014s ago): [ 34.685971] test_use_after_free_read+0xf0/0x248 [ 34.686011] kunit_try_run_case+0x170/0x3f0 [ 34.686051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.686107] kthread+0x328/0x630 [ 34.686144] ret_from_fork+0x10/0x20 [ 34.686181] [ 34.686226] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 34.686307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.686337] Hardware name: linux,dummy-virt (DT) [ 34.686370] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 33.745625] ================================================================== [ 33.745799] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 33.745799] [ 33.745895] Out-of-bounds write at 0x0000000078fb2b03 (1B left of kfence-#128): [ 33.746098] test_out_of_bounds_write+0x100/0x240 [ 33.746161] kunit_try_run_case+0x170/0x3f0 [ 33.746208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.746409] kthread+0x328/0x630 [ 33.746482] ret_from_fork+0x10/0x20 [ 33.746524] [ 33.746550] kfence-#128: 0x00000000a89ff8d1-0x000000001e2194de, size=32, cache=kmalloc-32 [ 33.746550] [ 33.746659] allocated by task 322 on cpu 0 at 33.745114s (0.001540s ago): [ 33.746735] test_alloc+0x29c/0x628 [ 33.746779] test_out_of_bounds_write+0xc8/0x240 [ 33.746819] kunit_try_run_case+0x170/0x3f0 [ 33.746858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.746913] kthread+0x328/0x630 [ 33.746959] ret_from_fork+0x10/0x20 [ 33.746997] [ 33.747050] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 33.747155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.747183] Hardware name: linux,dummy-virt (DT) [ 33.747215] ================================================================== [ 34.476899] ================================================================== [ 34.477002] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.477002] [ 34.477110] Out-of-bounds write at 0x0000000080ee08af (1B left of kfence-#135): [ 34.477170] test_out_of_bounds_write+0x100/0x240 [ 34.477217] kunit_try_run_case+0x170/0x3f0 [ 34.477262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.477307] kthread+0x328/0x630 [ 34.477346] ret_from_fork+0x10/0x20 [ 34.477384] [ 34.477410] kfence-#135: 0x00000000ac9ead87-0x0000000086b81259, size=32, cache=test [ 34.477410] [ 34.477462] allocated by task 324 on cpu 0 at 34.476806s (0.000652s ago): [ 34.477536] test_alloc+0x230/0x628 [ 34.477575] test_out_of_bounds_write+0xc8/0x240 [ 34.477616] kunit_try_run_case+0x170/0x3f0 [ 34.477656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.477698] kthread+0x328/0x630 [ 34.477734] ret_from_fork+0x10/0x20 [ 34.477772] [ 34.477816] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 34.477895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.477924] Hardware name: linux,dummy-virt (DT) [ 34.477959] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 32.602305] ================================================================== [ 32.602427] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 32.602427] [ 32.602554] Out-of-bounds read at 0x0000000064bb840d (1B left of kfence-#117): [ 32.602999] test_out_of_bounds_read+0x114/0x3e0 [ 32.603104] kunit_try_run_case+0x170/0x3f0 [ 32.603177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.603228] kthread+0x328/0x630 [ 32.603299] ret_from_fork+0x10/0x20 [ 32.603372] [ 32.603564] kfence-#117: 0x00000000a8e2d72b-0x00000000a2593e13, size=32, cache=kmalloc-32 [ 32.603564] [ 32.603738] allocated by task 318 on cpu 0 at 32.601199s (0.002483s ago): [ 32.604097] test_alloc+0x29c/0x628 [ 32.604159] test_out_of_bounds_read+0xdc/0x3e0 [ 32.604345] kunit_try_run_case+0x170/0x3f0 [ 32.604413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.604456] kthread+0x328/0x630 [ 32.604639] ret_from_fork+0x10/0x20 [ 32.605084] [ 32.605215] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.605331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.605360] Hardware name: linux,dummy-virt (DT) [ 32.605399] ================================================================== [ 33.225185] ================================================================== [ 33.225302] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 33.225302] [ 33.225386] Out-of-bounds read at 0x000000000dba6bbf (32B right of kfence-#123): [ 33.225444] test_out_of_bounds_read+0x1c8/0x3e0 [ 33.225491] kunit_try_run_case+0x170/0x3f0 [ 33.225532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.225574] kthread+0x328/0x630 [ 33.225613] ret_from_fork+0x10/0x20 [ 33.225652] [ 33.225699] kfence-#123: 0x0000000054bcea64-0x0000000092510b3a, size=32, cache=test [ 33.225699] [ 33.225870] allocated by task 320 on cpu 0 at 33.225043s (0.000705s ago): [ 33.225970] test_alloc+0x230/0x628 [ 33.226010] test_out_of_bounds_read+0x198/0x3e0 [ 33.228090] kunit_try_run_case+0x170/0x3f0 [ 33.228143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.228184] kthread+0x328/0x630 [ 33.228219] ret_from_fork+0x10/0x20 [ 33.228259] [ 33.228298] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 33.228377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.228403] Hardware name: linux,dummy-virt (DT) [ 33.228436] ================================================================== [ 33.121197] ================================================================== [ 33.121275] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.121275] [ 33.121455] Out-of-bounds read at 0x000000004bd28133 (1B left of kfence-#122): [ 33.121629] test_out_of_bounds_read+0x114/0x3e0 [ 33.121702] kunit_try_run_case+0x170/0x3f0 [ 33.121780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.121823] kthread+0x328/0x630 [ 33.121891] ret_from_fork+0x10/0x20 [ 33.121959] [ 33.121984] kfence-#122: 0x0000000026db3f89-0x0000000009c30ab1, size=32, cache=test [ 33.121984] [ 33.122036] allocated by task 320 on cpu 0 at 33.120982s (0.001050s ago): [ 33.122163] test_alloc+0x230/0x628 [ 33.122229] test_out_of_bounds_read+0xdc/0x3e0 [ 33.122356] kunit_try_run_case+0x170/0x3f0 [ 33.122437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.122481] kthread+0x328/0x630 [ 33.122545] ret_from_fork+0x10/0x20 [ 33.122585] [ 33.122659] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 33.122741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.122779] Hardware name: linux,dummy-virt (DT) [ 33.122812] ================================================================== [ 32.811218] ================================================================== [ 32.811315] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 32.811315] [ 32.811494] Out-of-bounds read at 0x000000009c637b7b (32B right of kfence-#119): [ 32.811558] test_out_of_bounds_read+0x1c8/0x3e0 [ 32.811615] kunit_try_run_case+0x170/0x3f0 [ 32.811659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.811702] kthread+0x328/0x630 [ 32.811739] ret_from_fork+0x10/0x20 [ 32.811778] [ 32.811809] kfence-#119: 0x000000006d72e308-0x00000000c2dd7477, size=32, cache=kmalloc-32 [ 32.811809] [ 32.811877] allocated by task 318 on cpu 0 at 32.810952s (0.000920s ago): [ 32.811950] test_alloc+0x29c/0x628 [ 32.811997] test_out_of_bounds_read+0x198/0x3e0 [ 32.812041] kunit_try_run_case+0x170/0x3f0 [ 32.812100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.812143] kthread+0x328/0x630 [ 32.812178] ret_from_fork+0x10/0x20 [ 32.812215] [ 32.812259] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.812341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.812370] Hardware name: linux,dummy-virt (DT) [ 32.812401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 32.460230] ================================================================== [ 32.460281] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 32.460338] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.460391] [ 32.460423] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.460506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.460536] Hardware name: linux,dummy-virt (DT) [ 32.460569] Call trace: [ 32.460591] show_stack+0x20/0x38 (C) [ 32.460639] dump_stack_lvl+0x8c/0xd0 [ 32.460689] print_report+0x118/0x5d0 [ 32.460733] kasan_report+0xdc/0x128 [ 32.460779] kasan_check_range+0x100/0x1a8 [ 32.460826] __kasan_check_write+0x20/0x30 [ 32.460874] strncpy_from_user+0x3c/0x2a0 [ 32.460923] copy_user_test_oob+0x5c0/0xec8 [ 32.460973] kunit_try_run_case+0x170/0x3f0 [ 32.461019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.461714] kthread+0x328/0x630 [ 32.461834] ret_from_fork+0x10/0x20 [ 32.461941] [ 32.462077] Allocated by task 316: [ 32.462126] kasan_save_stack+0x3c/0x68 [ 32.462318] kasan_save_track+0x20/0x40 [ 32.462390] kasan_save_alloc_info+0x40/0x58 [ 32.462455] __kasan_kmalloc+0xd4/0xd8 [ 32.462531] __kmalloc_noprof+0x198/0x4c8 [ 32.462645] kunit_kmalloc_array+0x34/0x88 [ 32.462789] copy_user_test_oob+0xac/0xec8 [ 32.462968] kunit_try_run_case+0x170/0x3f0 [ 32.463015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.463318] kthread+0x328/0x630 [ 32.463418] ret_from_fork+0x10/0x20 [ 32.463478] [ 32.463713] The buggy address belongs to the object at fff00000c98f2e00 [ 32.463713] which belongs to the cache kmalloc-128 of size 128 [ 32.463825] The buggy address is located 0 bytes inside of [ 32.463825] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.464005] [ 32.464083] The buggy address belongs to the physical page: [ 32.464239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.464297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.464538] page_type: f5(slab) [ 32.464702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.464814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.465097] page dumped because: kasan: bad access detected [ 32.465238] [ 32.465274] Memory state around the buggy address: [ 32.465310] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.465466] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.465632] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.465736] ^ [ 32.465826] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.466086] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.466145] ================================================================== [ 32.467393] ================================================================== [ 32.467664] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 32.467729] Write of size 1 at addr fff00000c98f2e78 by task kunit_try_catch/316 [ 32.467836] [ 32.467870] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.467958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.467985] Hardware name: linux,dummy-virt (DT) [ 32.468018] Call trace: [ 32.468201] show_stack+0x20/0x38 (C) [ 32.468279] dump_stack_lvl+0x8c/0xd0 [ 32.468400] print_report+0x118/0x5d0 [ 32.468466] kasan_report+0xdc/0x128 [ 32.468635] __asan_report_store1_noabort+0x20/0x30 [ 32.468728] strncpy_from_user+0x270/0x2a0 [ 32.468814] copy_user_test_oob+0x5c0/0xec8 [ 32.468997] kunit_try_run_case+0x170/0x3f0 [ 32.469085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.469147] kthread+0x328/0x630 [ 32.469190] ret_from_fork+0x10/0x20 [ 32.469239] [ 32.469259] Allocated by task 316: [ 32.469495] kasan_save_stack+0x3c/0x68 [ 32.469681] kasan_save_track+0x20/0x40 [ 32.469776] kasan_save_alloc_info+0x40/0x58 [ 32.470076] __kasan_kmalloc+0xd4/0xd8 [ 32.470114] __kmalloc_noprof+0x198/0x4c8 [ 32.470246] kunit_kmalloc_array+0x34/0x88 [ 32.470343] copy_user_test_oob+0xac/0xec8 [ 32.470486] kunit_try_run_case+0x170/0x3f0 [ 32.470526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.470571] kthread+0x328/0x630 [ 32.470613] ret_from_fork+0x10/0x20 [ 32.470708] [ 32.470731] The buggy address belongs to the object at fff00000c98f2e00 [ 32.470731] which belongs to the cache kmalloc-128 of size 128 [ 32.470811] The buggy address is located 0 bytes to the right of [ 32.470811] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.470886] [ 32.470909] The buggy address belongs to the physical page: [ 32.470954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.471009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.471068] page_type: f5(slab) [ 32.471109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.471613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.471682] page dumped because: kasan: bad access detected [ 32.471914] [ 32.471987] Memory state around the buggy address: [ 32.472154] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.472228] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472294] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.472334] ^ [ 32.472662] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472826] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.473011] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 32.455734] ================================================================== [ 32.455784] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 32.456507] Read of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.456578] [ 32.456610] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.457283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.457316] Hardware name: linux,dummy-virt (DT) [ 32.457349] Call trace: [ 32.457384] show_stack+0x20/0x38 (C) [ 32.457434] dump_stack_lvl+0x8c/0xd0 [ 32.457485] print_report+0x118/0x5d0 [ 32.457531] kasan_report+0xdc/0x128 [ 32.457576] kasan_check_range+0x100/0x1a8 [ 32.457624] __kasan_check_read+0x20/0x30 [ 32.457671] copy_user_test_oob+0x4a0/0xec8 [ 32.457721] kunit_try_run_case+0x170/0x3f0 [ 32.457767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.457820] kthread+0x328/0x630 [ 32.457861] ret_from_fork+0x10/0x20 [ 32.457910] [ 32.457931] Allocated by task 316: [ 32.457961] kasan_save_stack+0x3c/0x68 [ 32.458001] kasan_save_track+0x20/0x40 [ 32.458040] kasan_save_alloc_info+0x40/0x58 [ 32.458091] __kasan_kmalloc+0xd4/0xd8 [ 32.458128] __kmalloc_noprof+0x198/0x4c8 [ 32.458168] kunit_kmalloc_array+0x34/0x88 [ 32.458208] copy_user_test_oob+0xac/0xec8 [ 32.458247] kunit_try_run_case+0x170/0x3f0 [ 32.458285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.458329] kthread+0x328/0x630 [ 32.458365] ret_from_fork+0x10/0x20 [ 32.458401] [ 32.458423] The buggy address belongs to the object at fff00000c98f2e00 [ 32.458423] which belongs to the cache kmalloc-128 of size 128 [ 32.458482] The buggy address is located 0 bytes inside of [ 32.458482] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.458546] [ 32.458568] The buggy address belongs to the physical page: [ 32.458601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.458652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.458702] page_type: f5(slab) [ 32.458742] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.458801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.458843] page dumped because: kasan: bad access detected [ 32.458878] [ 32.458898] Memory state around the buggy address: [ 32.458931] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.458976] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.459020] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.459131] ^ [ 32.459174] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.459218] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.459258] ================================================================== [ 32.450456] ================================================================== [ 32.450650] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 32.450723] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.450788] [ 32.450889] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.450998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.451033] Hardware name: linux,dummy-virt (DT) [ 32.451076] Call trace: [ 32.451101] show_stack+0x20/0x38 (C) [ 32.451286] dump_stack_lvl+0x8c/0xd0 [ 32.451344] print_report+0x118/0x5d0 [ 32.451390] kasan_report+0xdc/0x128 [ 32.451482] kasan_check_range+0x100/0x1a8 [ 32.451554] __kasan_check_write+0x20/0x30 [ 32.451639] copy_user_test_oob+0x434/0xec8 [ 32.451849] kunit_try_run_case+0x170/0x3f0 [ 32.451917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.451994] kthread+0x328/0x630 [ 32.452050] ret_from_fork+0x10/0x20 [ 32.452149] [ 32.452197] Allocated by task 316: [ 32.452244] kasan_save_stack+0x3c/0x68 [ 32.452287] kasan_save_track+0x20/0x40 [ 32.452333] kasan_save_alloc_info+0x40/0x58 [ 32.452435] __kasan_kmalloc+0xd4/0xd8 [ 32.452515] __kmalloc_noprof+0x198/0x4c8 [ 32.452633] kunit_kmalloc_array+0x34/0x88 [ 32.452674] copy_user_test_oob+0xac/0xec8 [ 32.452724] kunit_try_run_case+0x170/0x3f0 [ 32.452764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.453128] kthread+0x328/0x630 [ 32.453222] ret_from_fork+0x10/0x20 [ 32.453301] [ 32.453512] The buggy address belongs to the object at fff00000c98f2e00 [ 32.453512] which belongs to the cache kmalloc-128 of size 128 [ 32.453587] The buggy address is located 0 bytes inside of [ 32.453587] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.453653] [ 32.453735] The buggy address belongs to the physical page: [ 32.453769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.453822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.453871] page_type: f5(slab) [ 32.453919] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.453984] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.454033] page dumped because: kasan: bad access detected [ 32.454101] [ 32.454336] Memory state around the buggy address: [ 32.454486] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.454579] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.454720] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.454793] ^ [ 32.454841] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.455043] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.455227] ================================================================== [ 32.430365] ================================================================== [ 32.430438] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 32.430512] Read of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.430567] [ 32.430613] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.430701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.430728] Hardware name: linux,dummy-virt (DT) [ 32.430761] Call trace: [ 32.430792] show_stack+0x20/0x38 (C) [ 32.430841] dump_stack_lvl+0x8c/0xd0 [ 32.430890] print_report+0x118/0x5d0 [ 32.430935] kasan_report+0xdc/0x128 [ 32.430980] kasan_check_range+0x100/0x1a8 [ 32.431043] __kasan_check_read+0x20/0x30 [ 32.431109] copy_user_test_oob+0x728/0xec8 [ 32.431194] kunit_try_run_case+0x170/0x3f0 [ 32.431259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.431332] kthread+0x328/0x630 [ 32.431396] ret_from_fork+0x10/0x20 [ 32.431479] [ 32.431793] Allocated by task 316: [ 32.431825] kasan_save_stack+0x3c/0x68 [ 32.431883] kasan_save_track+0x20/0x40 [ 32.431938] kasan_save_alloc_info+0x40/0x58 [ 32.432007] __kasan_kmalloc+0xd4/0xd8 [ 32.432090] __kmalloc_noprof+0x198/0x4c8 [ 32.432135] kunit_kmalloc_array+0x34/0x88 [ 32.432175] copy_user_test_oob+0xac/0xec8 [ 32.432215] kunit_try_run_case+0x170/0x3f0 [ 32.432272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.432317] kthread+0x328/0x630 [ 32.432363] ret_from_fork+0x10/0x20 [ 32.432402] [ 32.432423] The buggy address belongs to the object at fff00000c98f2e00 [ 32.432423] which belongs to the cache kmalloc-128 of size 128 [ 32.432484] The buggy address is located 0 bytes inside of [ 32.432484] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.432547] [ 32.432568] The buggy address belongs to the physical page: [ 32.432601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.432654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.432703] page_type: f5(slab) [ 32.432741] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.432807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.432888] page dumped because: kasan: bad access detected [ 32.432981] [ 32.433062] Memory state around the buggy address: [ 32.433118] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.433270] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.433330] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.433371] ^ [ 32.433414] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.433456] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.433495] ================================================================== [ 32.438283] ================================================================== [ 32.438357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 32.438429] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.438499] [ 32.438562] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.438648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.438677] Hardware name: linux,dummy-virt (DT) [ 32.438710] Call trace: [ 32.438909] show_stack+0x20/0x38 (C) [ 32.438959] dump_stack_lvl+0x8c/0xd0 [ 32.439162] print_report+0x118/0x5d0 [ 32.439253] kasan_report+0xdc/0x128 [ 32.439306] kasan_check_range+0x100/0x1a8 [ 32.439370] __kasan_check_write+0x20/0x30 [ 32.439607] copy_user_test_oob+0x35c/0xec8 [ 32.439694] kunit_try_run_case+0x170/0x3f0 [ 32.439746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.439798] kthread+0x328/0x630 [ 32.439842] ret_from_fork+0x10/0x20 [ 32.439982] [ 32.440007] Allocated by task 316: [ 32.440036] kasan_save_stack+0x3c/0x68 [ 32.440281] kasan_save_track+0x20/0x40 [ 32.440389] kasan_save_alloc_info+0x40/0x58 [ 32.440434] __kasan_kmalloc+0xd4/0xd8 [ 32.440489] __kmalloc_noprof+0x198/0x4c8 [ 32.440606] kunit_kmalloc_array+0x34/0x88 [ 32.440863] copy_user_test_oob+0xac/0xec8 [ 32.440927] kunit_try_run_case+0x170/0x3f0 [ 32.440968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.441040] kthread+0x328/0x630 [ 32.441146] ret_from_fork+0x10/0x20 [ 32.441235] [ 32.441259] The buggy address belongs to the object at fff00000c98f2e00 [ 32.441259] which belongs to the cache kmalloc-128 of size 128 [ 32.441319] The buggy address is located 0 bytes inside of [ 32.441319] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.441426] [ 32.441448] The buggy address belongs to the physical page: [ 32.441482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.441534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.441591] page_type: f5(slab) [ 32.441645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.441702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.441755] page dumped because: kasan: bad access detected [ 32.441804] [ 32.441829] Memory state around the buggy address: [ 32.441878] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.441923] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.441967] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.442007] ^ [ 32.442076] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.442117] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.442166] ================================================================== [ 32.419725] ================================================================== [ 32.419946] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 32.420066] Write of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.420153] [ 32.420220] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.420312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.420339] Hardware name: linux,dummy-virt (DT) [ 32.420384] Call trace: [ 32.420485] show_stack+0x20/0x38 (C) [ 32.420563] dump_stack_lvl+0x8c/0xd0 [ 32.420651] print_report+0x118/0x5d0 [ 32.420698] kasan_report+0xdc/0x128 [ 32.420874] kasan_check_range+0x100/0x1a8 [ 32.420924] __kasan_check_write+0x20/0x30 [ 32.420972] copy_user_test_oob+0x234/0xec8 [ 32.421211] kunit_try_run_case+0x170/0x3f0 [ 32.421373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.421428] kthread+0x328/0x630 [ 32.421481] ret_from_fork+0x10/0x20 [ 32.421577] [ 32.421608] Allocated by task 316: [ 32.421656] kasan_save_stack+0x3c/0x68 [ 32.421702] kasan_save_track+0x20/0x40 [ 32.421745] kasan_save_alloc_info+0x40/0x58 [ 32.421792] __kasan_kmalloc+0xd4/0xd8 [ 32.421830] __kmalloc_noprof+0x198/0x4c8 [ 32.421880] kunit_kmalloc_array+0x34/0x88 [ 32.421929] copy_user_test_oob+0xac/0xec8 [ 32.421969] kunit_try_run_case+0x170/0x3f0 [ 32.422008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.422068] kthread+0x328/0x630 [ 32.422102] ret_from_fork+0x10/0x20 [ 32.422139] [ 32.422161] The buggy address belongs to the object at fff00000c98f2e00 [ 32.422161] which belongs to the cache kmalloc-128 of size 128 [ 32.422223] The buggy address is located 0 bytes inside of [ 32.422223] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.422487] [ 32.422783] The buggy address belongs to the physical page: [ 32.422914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.426093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.426154] page_type: f5(slab) [ 32.426200] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.426252] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.426297] page dumped because: kasan: bad access detected [ 32.426330] [ 32.426352] Memory state around the buggy address: [ 32.426386] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.426430] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.426476] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.426515] ^ [ 32.426559] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.426601] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.426642] ================================================================== [ 32.443375] ================================================================== [ 32.443460] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 32.443514] Read of size 121 at addr fff00000c98f2e00 by task kunit_try_catch/316 [ 32.443573] [ 32.443675] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.443770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.443798] Hardware name: linux,dummy-virt (DT) [ 32.443831] Call trace: [ 32.443958] show_stack+0x20/0x38 (C) [ 32.444255] dump_stack_lvl+0x8c/0xd0 [ 32.444348] print_report+0x118/0x5d0 [ 32.444450] kasan_report+0xdc/0x128 [ 32.444553] kasan_check_range+0x100/0x1a8 [ 32.444621] __kasan_check_read+0x20/0x30 [ 32.444808] copy_user_test_oob+0x3c8/0xec8 [ 32.444858] kunit_try_run_case+0x170/0x3f0 [ 32.445017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.445202] kthread+0x328/0x630 [ 32.445306] ret_from_fork+0x10/0x20 [ 32.445542] [ 32.445563] Allocated by task 316: [ 32.445602] kasan_save_stack+0x3c/0x68 [ 32.445683] kasan_save_track+0x20/0x40 [ 32.445778] kasan_save_alloc_info+0x40/0x58 [ 32.445864] __kasan_kmalloc+0xd4/0xd8 [ 32.445992] __kmalloc_noprof+0x198/0x4c8 [ 32.446037] kunit_kmalloc_array+0x34/0x88 [ 32.446130] copy_user_test_oob+0xac/0xec8 [ 32.446469] kunit_try_run_case+0x170/0x3f0 [ 32.446542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.446725] kthread+0x328/0x630 [ 32.446946] ret_from_fork+0x10/0x20 [ 32.447029] [ 32.447126] The buggy address belongs to the object at fff00000c98f2e00 [ 32.447126] which belongs to the cache kmalloc-128 of size 128 [ 32.447267] The buggy address is located 0 bytes inside of [ 32.447267] allocated 120-byte region [fff00000c98f2e00, fff00000c98f2e78) [ 32.447389] [ 32.447488] The buggy address belongs to the physical page: [ 32.447521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.447575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.447805] page_type: f5(slab) [ 32.447947] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.448051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.448288] page dumped because: kasan: bad access detected [ 32.448427] [ 32.448477] Memory state around the buggy address: [ 32.448663] fff00000c98f2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.448731] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.448778] >fff00000c98f2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.448825] ^ [ 32.448868] fff00000c98f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.449079] fff00000c98f2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.449239] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 32.394638] ================================================================== [ 32.394745] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 32.394832] Read of size 8 at addr fff00000c98f2d78 by task kunit_try_catch/312 [ 32.394901] [ 32.394977] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.395078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.395107] Hardware name: linux,dummy-virt (DT) [ 32.395140] Call trace: [ 32.395322] show_stack+0x20/0x38 (C) [ 32.395375] dump_stack_lvl+0x8c/0xd0 [ 32.395427] print_report+0x118/0x5d0 [ 32.395510] kasan_report+0xdc/0x128 [ 32.395569] __asan_report_load8_noabort+0x20/0x30 [ 32.395621] copy_to_kernel_nofault+0x204/0x250 [ 32.395693] copy_to_kernel_nofault_oob+0x158/0x418 [ 32.395746] kunit_try_run_case+0x170/0x3f0 [ 32.395820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.395901] kthread+0x328/0x630 [ 32.395961] ret_from_fork+0x10/0x20 [ 32.396010] [ 32.396032] Allocated by task 312: [ 32.396072] kasan_save_stack+0x3c/0x68 [ 32.396235] kasan_save_track+0x20/0x40 [ 32.396284] kasan_save_alloc_info+0x40/0x58 [ 32.396335] __kasan_kmalloc+0xd4/0xd8 [ 32.396392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.396444] copy_to_kernel_nofault_oob+0xc8/0x418 [ 32.396587] kunit_try_run_case+0x170/0x3f0 [ 32.396671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.396782] kthread+0x328/0x630 [ 32.396893] ret_from_fork+0x10/0x20 [ 32.397028] [ 32.397122] The buggy address belongs to the object at fff00000c98f2d00 [ 32.397122] which belongs to the cache kmalloc-128 of size 128 [ 32.397224] The buggy address is located 0 bytes to the right of [ 32.397224] allocated 120-byte region [fff00000c98f2d00, fff00000c98f2d78) [ 32.397321] [ 32.397344] The buggy address belongs to the physical page: [ 32.397378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.397662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.397712] page_type: f5(slab) [ 32.397755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.397884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.397979] page dumped because: kasan: bad access detected [ 32.398061] [ 32.398089] Memory state around the buggy address: [ 32.398135] fff00000c98f2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.398181] fff00000c98f2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.398233] >fff00000c98f2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.398282] ^ [ 32.398335] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.398379] fff00000c98f2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.398420] ================================================================== [ 32.398657] ================================================================== [ 32.398856] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 32.399082] Write of size 8 at addr fff00000c98f2d78 by task kunit_try_catch/312 [ 32.399136] [ 32.399184] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.399287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.399420] Hardware name: linux,dummy-virt (DT) [ 32.399463] Call trace: [ 32.399597] show_stack+0x20/0x38 (C) [ 32.399649] dump_stack_lvl+0x8c/0xd0 [ 32.399714] print_report+0x118/0x5d0 [ 32.399813] kasan_report+0xdc/0x128 [ 32.399885] kasan_check_range+0x100/0x1a8 [ 32.399936] __kasan_check_write+0x20/0x30 [ 32.399989] copy_to_kernel_nofault+0x8c/0x250 [ 32.400090] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 32.400163] kunit_try_run_case+0x170/0x3f0 [ 32.400227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.400297] kthread+0x328/0x630 [ 32.400379] ret_from_fork+0x10/0x20 [ 32.400586] [ 32.400715] Allocated by task 312: [ 32.400775] kasan_save_stack+0x3c/0x68 [ 32.400851] kasan_save_track+0x20/0x40 [ 32.400994] kasan_save_alloc_info+0x40/0x58 [ 32.401429] __kasan_kmalloc+0xd4/0xd8 [ 32.401476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.401520] copy_to_kernel_nofault_oob+0xc8/0x418 [ 32.401561] kunit_try_run_case+0x170/0x3f0 [ 32.401600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.401645] kthread+0x328/0x630 [ 32.401678] ret_from_fork+0x10/0x20 [ 32.401716] [ 32.401739] The buggy address belongs to the object at fff00000c98f2d00 [ 32.401739] which belongs to the cache kmalloc-128 of size 128 [ 32.401799] The buggy address is located 0 bytes to the right of [ 32.401799] allocated 120-byte region [fff00000c98f2d00, fff00000c98f2d78) [ 32.401867] [ 32.401888] The buggy address belongs to the physical page: [ 32.401920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 32.401974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.402022] page_type: f5(slab) [ 32.402076] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.402129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.402171] page dumped because: kasan: bad access detected [ 32.402204] [ 32.402269] Memory state around the buggy address: [ 32.402318] fff00000c98f2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.402365] fff00000c98f2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.402422] >fff00000c98f2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.402471] ^ [ 32.402514] fff00000c98f2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.402573] fff00000c98f2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.402630] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 32.368231] ================================================================== [ 32.368279] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.368330] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 32.368380] [ 32.368421] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.368507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.368537] Hardware name: linux,dummy-virt (DT) [ 32.368569] Call trace: [ 32.368593] show_stack+0x20/0x38 (C) [ 32.368643] dump_stack_lvl+0x8c/0xd0 [ 32.368691] print_report+0x310/0x5d0 [ 32.368737] kasan_report+0xdc/0x128 [ 32.368781] __asan_report_load1_noabort+0x20/0x30 [ 32.368831] vmalloc_oob+0x51c/0x5d0 [ 32.368878] kunit_try_run_case+0x170/0x3f0 [ 32.368924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.368978] kthread+0x328/0x630 [ 32.369020] ret_from_fork+0x10/0x20 [ 32.369081] [ 32.369145] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.369188] The buggy address belongs to the physical page: [ 32.369220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30 [ 32.369289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.369360] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.369419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.369462] page dumped because: kasan: bad access detected [ 32.369496] [ 32.369516] Memory state around the buggy address: [ 32.369556] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.369601] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.369644] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.369685] ^ [ 32.369727] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.369795] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.369850] ================================================================== [ 32.362438] ================================================================== [ 32.362516] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.362873] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 32.362967] [ 32.363138] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.363232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.363380] Hardware name: linux,dummy-virt (DT) [ 32.363424] Call trace: [ 32.363451] show_stack+0x20/0x38 (C) [ 32.363508] dump_stack_lvl+0x8c/0xd0 [ 32.363617] print_report+0x310/0x5d0 [ 32.363700] kasan_report+0xdc/0x128 [ 32.363965] __asan_report_load1_noabort+0x20/0x30 [ 32.364049] vmalloc_oob+0x578/0x5d0 [ 32.364113] kunit_try_run_case+0x170/0x3f0 [ 32.364227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364322] kthread+0x328/0x630 [ 32.364482] ret_from_fork+0x10/0x20 [ 32.364690] [ 32.364857] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.364960] The buggy address belongs to the physical page: [ 32.365038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30 [ 32.365224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.365295] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.365349] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.365391] page dumped because: kasan: bad access detected [ 32.365654] [ 32.365765] Memory state around the buggy address: [ 32.365855] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.366139] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.366193] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.366234] ^ [ 32.366276] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.366319] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.366361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 32.184694] ================================================================== [ 32.184988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.185103] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.185203] [ 32.185260] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.185347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.185377] Hardware name: linux,dummy-virt (DT) [ 32.185410] Call trace: [ 32.185432] show_stack+0x20/0x38 (C) [ 32.185497] dump_stack_lvl+0x8c/0xd0 [ 32.185703] print_report+0x118/0x5d0 [ 32.185790] kasan_report+0xdc/0x128 [ 32.185839] __asan_report_load4_noabort+0x20/0x30 [ 32.186052] kasan_atomics_helper+0x3e04/0x4858 [ 32.186127] kasan_atomics+0x198/0x2e0 [ 32.186177] kunit_try_run_case+0x170/0x3f0 [ 32.186225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186279] kthread+0x328/0x630 [ 32.186324] ret_from_fork+0x10/0x20 [ 32.186387] [ 32.186407] Allocated by task 296: [ 32.186455] kasan_save_stack+0x3c/0x68 [ 32.186502] kasan_save_track+0x20/0x40 [ 32.186541] kasan_save_alloc_info+0x40/0x58 [ 32.186581] __kasan_kmalloc+0xd4/0xd8 [ 32.186634] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.186677] kasan_atomics+0xb8/0x2e0 [ 32.186715] kunit_try_run_case+0x170/0x3f0 [ 32.186827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186892] kthread+0x328/0x630 [ 32.186926] ret_from_fork+0x10/0x20 [ 32.186964] [ 32.187240] The buggy address belongs to the object at fff00000c9abb900 [ 32.187240] which belongs to the cache kmalloc-64 of size 64 [ 32.187308] The buggy address is located 0 bytes to the right of [ 32.187308] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.187374] [ 32.187414] The buggy address belongs to the physical page: [ 32.187533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.187627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.187751] page_type: f5(slab) [ 32.187798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.187850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.187892] page dumped because: kasan: bad access detected [ 32.187926] [ 32.187947] Memory state around the buggy address: [ 32.187979] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.188024] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.188079] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.188119] ^ [ 32.188154] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.188199] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.188239] ================================================================== [ 32.325877] ================================================================== [ 32.325927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.325997] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.326210] [ 32.326243] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.326408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.326609] Hardware name: linux,dummy-virt (DT) [ 32.326666] Call trace: [ 32.326799] show_stack+0x20/0x38 (C) [ 32.326873] dump_stack_lvl+0x8c/0xd0 [ 32.326925] print_report+0x118/0x5d0 [ 32.326988] kasan_report+0xdc/0x128 [ 32.327083] __asan_report_load8_noabort+0x20/0x30 [ 32.327139] kasan_atomics_helper+0x3e10/0x4858 [ 32.327192] kasan_atomics+0x198/0x2e0 [ 32.327250] kunit_try_run_case+0x170/0x3f0 [ 32.327300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.327354] kthread+0x328/0x630 [ 32.327408] ret_from_fork+0x10/0x20 [ 32.327458] [ 32.327478] Allocated by task 296: [ 32.327516] kasan_save_stack+0x3c/0x68 [ 32.327557] kasan_save_track+0x20/0x40 [ 32.327595] kasan_save_alloc_info+0x40/0x58 [ 32.327644] __kasan_kmalloc+0xd4/0xd8 [ 32.327681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.327724] kasan_atomics+0xb8/0x2e0 [ 32.327780] kunit_try_run_case+0x170/0x3f0 [ 32.327828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.327879] kthread+0x328/0x630 [ 32.327914] ret_from_fork+0x10/0x20 [ 32.327952] [ 32.327972] The buggy address belongs to the object at fff00000c9abb900 [ 32.327972] which belongs to the cache kmalloc-64 of size 64 [ 32.328030] The buggy address is located 0 bytes to the right of [ 32.328030] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.328344] [ 32.328396] The buggy address belongs to the physical page: [ 32.328446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.328515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.328562] page_type: f5(slab) [ 32.328603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.328653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.328826] page dumped because: kasan: bad access detected [ 32.329013] [ 32.329112] Memory state around the buggy address: [ 32.329247] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329311] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329355] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.329538] ^ [ 32.329586] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.329748] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.329931] ================================================================== [ 32.188375] ================================================================== [ 32.188638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.188692] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.188743] [ 32.188811] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.189203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.189233] Hardware name: linux,dummy-virt (DT) [ 32.189266] Call trace: [ 32.189291] show_stack+0x20/0x38 (C) [ 32.189343] dump_stack_lvl+0x8c/0xd0 [ 32.189391] print_report+0x118/0x5d0 [ 32.189437] kasan_report+0xdc/0x128 [ 32.189482] kasan_check_range+0x100/0x1a8 [ 32.189530] __kasan_check_read+0x20/0x30 [ 32.189578] kasan_atomics_helper+0xdd4/0x4858 [ 32.189630] kasan_atomics+0x198/0x2e0 [ 32.189676] kunit_try_run_case+0x170/0x3f0 [ 32.189725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.189778] kthread+0x328/0x630 [ 32.189823] ret_from_fork+0x10/0x20 [ 32.189872] [ 32.189893] Allocated by task 296: [ 32.189922] kasan_save_stack+0x3c/0x68 [ 32.189963] kasan_save_track+0x20/0x40 [ 32.190001] kasan_save_alloc_info+0x40/0x58 [ 32.190042] __kasan_kmalloc+0xd4/0xd8 [ 32.190146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.190212] kasan_atomics+0xb8/0x2e0 [ 32.190411] kunit_try_run_case+0x170/0x3f0 [ 32.190495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.190562] kthread+0x328/0x630 [ 32.190598] ret_from_fork+0x10/0x20 [ 32.190636] [ 32.190667] The buggy address belongs to the object at fff00000c9abb900 [ 32.190667] which belongs to the cache kmalloc-64 of size 64 [ 32.190724] The buggy address is located 0 bytes to the right of [ 32.190724] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.191089] [ 32.191211] The buggy address belongs to the physical page: [ 32.191270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.191368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.191694] page_type: f5(slab) [ 32.191765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.191843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.191997] page dumped because: kasan: bad access detected [ 32.192098] [ 32.192158] Memory state around the buggy address: [ 32.192286] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.192471] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.192544] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.192706] ^ [ 32.192791] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192847] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192887] ================================================================== [ 32.247860] ================================================================== [ 32.247929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.248010] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.248072] [ 32.248130] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.248243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.248301] Hardware name: linux,dummy-virt (DT) [ 32.248383] Call trace: [ 32.248593] show_stack+0x20/0x38 (C) [ 32.248721] dump_stack_lvl+0x8c/0xd0 [ 32.248830] print_report+0x118/0x5d0 [ 32.248976] kasan_report+0xdc/0x128 [ 32.249121] kasan_check_range+0x100/0x1a8 [ 32.249189] __kasan_check_write+0x20/0x30 [ 32.249250] kasan_atomics_helper+0x12d8/0x4858 [ 32.249302] kasan_atomics+0x198/0x2e0 [ 32.249350] kunit_try_run_case+0x170/0x3f0 [ 32.249399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.249452] kthread+0x328/0x630 [ 32.249496] ret_from_fork+0x10/0x20 [ 32.249554] [ 32.249574] Allocated by task 296: [ 32.249604] kasan_save_stack+0x3c/0x68 [ 32.249645] kasan_save_track+0x20/0x40 [ 32.249723] kasan_save_alloc_info+0x40/0x58 [ 32.249801] __kasan_kmalloc+0xd4/0xd8 [ 32.249890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.249968] kasan_atomics+0xb8/0x2e0 [ 32.250040] kunit_try_run_case+0x170/0x3f0 [ 32.250145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.250203] kthread+0x328/0x630 [ 32.250238] ret_from_fork+0x10/0x20 [ 32.250274] [ 32.250296] The buggy address belongs to the object at fff00000c9abb900 [ 32.250296] which belongs to the cache kmalloc-64 of size 64 [ 32.250355] The buggy address is located 0 bytes to the right of [ 32.250355] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.250420] [ 32.250478] The buggy address belongs to the physical page: [ 32.250556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.250615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.250719] page_type: f5(slab) [ 32.250784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.250864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.250907] page dumped because: kasan: bad access detected [ 32.250941] [ 32.250961] Memory state around the buggy address: [ 32.250995] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.251037] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.251091] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.251131] ^ [ 32.251166] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251210] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251250] ================================================================== [ 32.173498] ================================================================== [ 32.173551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.173603] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.173656] [ 32.173685] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.173769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.173798] Hardware name: linux,dummy-virt (DT) [ 32.173832] Call trace: [ 32.173855] show_stack+0x20/0x38 (C) [ 32.173904] dump_stack_lvl+0x8c/0xd0 [ 32.173954] print_report+0x118/0x5d0 [ 32.174001] kasan_report+0xdc/0x128 [ 32.174046] __asan_report_load4_noabort+0x20/0x30 [ 32.174113] kasan_atomics_helper+0x3dd8/0x4858 [ 32.174165] kasan_atomics+0x198/0x2e0 [ 32.174214] kunit_try_run_case+0x170/0x3f0 [ 32.174262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.174317] kthread+0x328/0x630 [ 32.174360] ret_from_fork+0x10/0x20 [ 32.174411] [ 32.174430] Allocated by task 296: [ 32.174459] kasan_save_stack+0x3c/0x68 [ 32.174498] kasan_save_track+0x20/0x40 [ 32.174536] kasan_save_alloc_info+0x40/0x58 [ 32.174574] __kasan_kmalloc+0xd4/0xd8 [ 32.174609] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.174652] kasan_atomics+0xb8/0x2e0 [ 32.174691] kunit_try_run_case+0x170/0x3f0 [ 32.174729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.174777] kthread+0x328/0x630 [ 32.174810] ret_from_fork+0x10/0x20 [ 32.174848] [ 32.174868] The buggy address belongs to the object at fff00000c9abb900 [ 32.174868] which belongs to the cache kmalloc-64 of size 64 [ 32.174925] The buggy address is located 0 bytes to the right of [ 32.174925] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.174992] [ 32.175014] The buggy address belongs to the physical page: [ 32.175046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.175174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.175252] page_type: f5(slab) [ 32.175292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.175344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.175386] page dumped because: kasan: bad access detected [ 32.175420] [ 32.175440] Memory state around the buggy address: [ 32.175473] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.176022] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.176436] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.176491] ^ [ 32.176530] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.176736] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.177217] ================================================================== [ 32.238239] ================================================================== [ 32.238277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.238323] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.238371] [ 32.238399] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.238491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.238521] Hardware name: linux,dummy-virt (DT) [ 32.238551] Call trace: [ 32.238574] show_stack+0x20/0x38 (C) [ 32.238622] dump_stack_lvl+0x8c/0xd0 [ 32.238669] print_report+0x118/0x5d0 [ 32.238716] kasan_report+0xdc/0x128 [ 32.238760] kasan_check_range+0x100/0x1a8 [ 32.238813] __kasan_check_write+0x20/0x30 [ 32.238861] kasan_atomics_helper+0x1190/0x4858 [ 32.238912] kasan_atomics+0x198/0x2e0 [ 32.238961] kunit_try_run_case+0x170/0x3f0 [ 32.239009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.239132] kthread+0x328/0x630 [ 32.239239] ret_from_fork+0x10/0x20 [ 32.239325] [ 32.239394] Allocated by task 296: [ 32.239435] kasan_save_stack+0x3c/0x68 [ 32.239475] kasan_save_track+0x20/0x40 [ 32.239513] kasan_save_alloc_info+0x40/0x58 [ 32.239553] __kasan_kmalloc+0xd4/0xd8 [ 32.239588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.239631] kasan_atomics+0xb8/0x2e0 [ 32.239671] kunit_try_run_case+0x170/0x3f0 [ 32.239710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.239755] kthread+0x328/0x630 [ 32.239791] ret_from_fork+0x10/0x20 [ 32.239847] [ 32.239880] The buggy address belongs to the object at fff00000c9abb900 [ 32.239880] which belongs to the cache kmalloc-64 of size 64 [ 32.239939] The buggy address is located 0 bytes to the right of [ 32.239939] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.240004] [ 32.240084] The buggy address belongs to the physical page: [ 32.240162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.240261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.240405] page_type: f5(slab) [ 32.240480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.240866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.240935] page dumped because: kasan: bad access detected [ 32.240990] [ 32.241021] Memory state around the buggy address: [ 32.241064] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.241106] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.241149] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.241189] ^ [ 32.241223] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.241266] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.241305] ================================================================== [ 32.215953] ================================================================== [ 32.215992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.216038] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.216099] [ 32.216128] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.216211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.216238] Hardware name: linux,dummy-virt (DT) [ 32.216270] Call trace: [ 32.216292] show_stack+0x20/0x38 (C) [ 32.216339] dump_stack_lvl+0x8c/0xd0 [ 32.216403] print_report+0x118/0x5d0 [ 32.216449] kasan_report+0xdc/0x128 [ 32.216495] kasan_check_range+0x100/0x1a8 [ 32.216614] __kasan_check_write+0x20/0x30 [ 32.216731] kasan_atomics_helper+0xf88/0x4858 [ 32.216884] kasan_atomics+0x198/0x2e0 [ 32.216954] kunit_try_run_case+0x170/0x3f0 [ 32.217003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.217066] kthread+0x328/0x630 [ 32.217111] ret_from_fork+0x10/0x20 [ 32.217172] [ 32.217241] Allocated by task 296: [ 32.217347] kasan_save_stack+0x3c/0x68 [ 32.217446] kasan_save_track+0x20/0x40 [ 32.217545] kasan_save_alloc_info+0x40/0x58 [ 32.217875] __kasan_kmalloc+0xd4/0xd8 [ 32.217915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.217991] kasan_atomics+0xb8/0x2e0 [ 32.218037] kunit_try_run_case+0x170/0x3f0 [ 32.218086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.218193] kthread+0x328/0x630 [ 32.218280] ret_from_fork+0x10/0x20 [ 32.218402] [ 32.218462] The buggy address belongs to the object at fff00000c9abb900 [ 32.218462] which belongs to the cache kmalloc-64 of size 64 [ 32.218555] The buggy address is located 0 bytes to the right of [ 32.218555] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.218669] [ 32.218956] The buggy address belongs to the physical page: [ 32.219024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.219152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.219256] page_type: f5(slab) [ 32.219371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.219423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.219464] page dumped because: kasan: bad access detected [ 32.219724] [ 32.219768] Memory state around the buggy address: [ 32.219892] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.219973] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.220039] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.220135] ^ [ 32.220215] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.220415] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.220613] ================================================================== [ 32.244908] ================================================================== [ 32.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.245003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.245067] [ 32.245096] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.245179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.245207] Hardware name: linux,dummy-virt (DT) [ 32.245261] Call trace: [ 32.245291] show_stack+0x20/0x38 (C) [ 32.245366] dump_stack_lvl+0x8c/0xd0 [ 32.245436] print_report+0x118/0x5d0 [ 32.245481] kasan_report+0xdc/0x128 [ 32.245525] kasan_check_range+0x100/0x1a8 [ 32.245573] __kasan_check_write+0x20/0x30 [ 32.245656] kasan_atomics_helper+0x126c/0x4858 [ 32.245710] kasan_atomics+0x198/0x2e0 [ 32.246074] kunit_try_run_case+0x170/0x3f0 [ 32.246124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.246178] kthread+0x328/0x630 [ 32.246238] ret_from_fork+0x10/0x20 [ 32.246295] [ 32.246344] Allocated by task 296: [ 32.246392] kasan_save_stack+0x3c/0x68 [ 32.246439] kasan_save_track+0x20/0x40 [ 32.246477] kasan_save_alloc_info+0x40/0x58 [ 32.246519] __kasan_kmalloc+0xd4/0xd8 [ 32.246554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.246598] kasan_atomics+0xb8/0x2e0 [ 32.246637] kunit_try_run_case+0x170/0x3f0 [ 32.246676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.246721] kthread+0x328/0x630 [ 32.246756] ret_from_fork+0x10/0x20 [ 32.246803] [ 32.246825] The buggy address belongs to the object at fff00000c9abb900 [ 32.246825] which belongs to the cache kmalloc-64 of size 64 [ 32.246883] The buggy address is located 0 bytes to the right of [ 32.246883] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.246982] [ 32.247032] The buggy address belongs to the physical page: [ 32.247075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.247154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.247220] page_type: f5(slab) [ 32.247297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.247366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.247408] page dumped because: kasan: bad access detected [ 32.247441] [ 32.247461] Memory state around the buggy address: [ 32.247495] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.247537] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.247581] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.247621] ^ [ 32.247655] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.247698] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.247737] ================================================================== [ 32.318384] ================================================================== [ 32.318436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.318664] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.318822] [ 32.318857] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.318945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.319210] Hardware name: linux,dummy-virt (DT) [ 32.319256] Call trace: [ 32.319383] show_stack+0x20/0x38 (C) [ 32.319458] dump_stack_lvl+0x8c/0xd0 [ 32.319526] print_report+0x118/0x5d0 [ 32.319827] kasan_report+0xdc/0x128 [ 32.319904] kasan_check_range+0x100/0x1a8 [ 32.320185] __kasan_check_write+0x20/0x30 [ 32.320251] kasan_atomics_helper+0x16d0/0x4858 [ 32.320304] kasan_atomics+0x198/0x2e0 [ 32.320385] kunit_try_run_case+0x170/0x3f0 [ 32.320557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.320677] kthread+0x328/0x630 [ 32.320836] ret_from_fork+0x10/0x20 [ 32.321041] [ 32.321155] Allocated by task 296: [ 32.321286] kasan_save_stack+0x3c/0x68 [ 32.321335] kasan_save_track+0x20/0x40 [ 32.321396] kasan_save_alloc_info+0x40/0x58 [ 32.321443] __kasan_kmalloc+0xd4/0xd8 [ 32.321757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.321918] kasan_atomics+0xb8/0x2e0 [ 32.322171] kunit_try_run_case+0x170/0x3f0 [ 32.322268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.322415] kthread+0x328/0x630 [ 32.322593] ret_from_fork+0x10/0x20 [ 32.322672] [ 32.322700] The buggy address belongs to the object at fff00000c9abb900 [ 32.322700] which belongs to the cache kmalloc-64 of size 64 [ 32.323000] The buggy address is located 0 bytes to the right of [ 32.323000] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.323181] [ 32.323278] The buggy address belongs to the physical page: [ 32.323571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.323689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.323740] page_type: f5(slab) [ 32.323790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.324022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.324213] page dumped because: kasan: bad access detected [ 32.324405] [ 32.324439] Memory state around the buggy address: [ 32.324474] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.324520] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.324805] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.324939] ^ [ 32.324986] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.325187] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.325399] ================================================================== [ 32.101897] ================================================================== [ 32.101955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.102044] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.102110] [ 32.102142] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.102226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.102256] Hardware name: linux,dummy-virt (DT) [ 32.102288] Call trace: [ 32.102312] show_stack+0x20/0x38 (C) [ 32.102369] dump_stack_lvl+0x8c/0xd0 [ 32.102421] print_report+0x118/0x5d0 [ 32.102467] kasan_report+0xdc/0x128 [ 32.102513] __asan_report_load4_noabort+0x20/0x30 [ 32.102574] kasan_atomics_helper+0x42d8/0x4858 [ 32.102637] kasan_atomics+0x198/0x2e0 [ 32.102702] kunit_try_run_case+0x170/0x3f0 [ 32.102751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.103135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.103640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.103689] page_type: f5(slab) [ 32.103729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.106267] kasan_atomics_helper+0x934/0x4858 [ 32.107144] kasan_save_alloc_info+0x40/0x58 [ 32.107230] __kasan_kmalloc+0xd4/0xd8 [ 32.107561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.107700] kasan_atomics+0xb8/0x2e0 [ 32.107744] kunit_try_run_case+0x170/0x3f0 [ 32.107818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.107921] kthread+0x328/0x630 [ 32.107958] ret_from_fork+0x10/0x20 [ 32.107996] [ 32.108019] The buggy address belongs to the object at fff00000c9abb900 [ 32.108019] which belongs to the cache kmalloc-64 of size 64 [ 32.108093] The buggy address is located 0 bytes to the right of [ 32.108093] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.108264] [ 32.108326] The buggy address belongs to the physical page: [ 32.108485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.108569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.108756] page_type: f5(slab) [ 32.109095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.109207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.109281] page dumped because: kasan: bad access detected [ 32.109316] [ 32.109383] Memory state around the buggy address: [ 32.109442] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.109490] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.109535] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.109573] ^ [ 32.109608] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.112617] kasan_atomics_helper+0x99c/0x4858 [ 32.114952] The buggy address is located 0 bytes to the right of [ 32.114952] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.124347] ret_from_fork+0x10/0x20 [ 32.125255] The buggy address is located 0 bytes to the right of [ 32.125255] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.125341] [ 32.125364] The buggy address belongs to the physical page: [ 32.125397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.125450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.125536] page_type: f5(slab) [ 32.125959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.126025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.126127] page dumped because: kasan: bad access detected [ 32.126192] [ 32.126339] Memory state around the buggy address: [ 32.126483] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.126591] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.126637] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.126677] ^ [ 32.126712] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.127619] ================================================================== [ 32.274455] ================================================================== [ 32.274506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.274557] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.274608] [ 32.274648] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.274735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.274764] Hardware name: linux,dummy-virt (DT) [ 32.274809] Call trace: [ 32.274833] show_stack+0x20/0x38 (C) [ 32.274885] dump_stack_lvl+0x8c/0xd0 [ 32.274934] print_report+0x118/0x5d0 [ 32.274985] kasan_report+0xdc/0x128 [ 32.275033] kasan_check_range+0x100/0x1a8 [ 32.275102] __kasan_check_write+0x20/0x30 [ 32.275157] kasan_atomics_helper+0x14e4/0x4858 [ 32.275218] kasan_atomics+0x198/0x2e0 [ 32.275275] kunit_try_run_case+0x170/0x3f0 [ 32.275324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275377] kthread+0x328/0x630 [ 32.275421] ret_from_fork+0x10/0x20 [ 32.275469] [ 32.275489] Allocated by task 296: [ 32.275519] kasan_save_stack+0x3c/0x68 [ 32.275559] kasan_save_track+0x20/0x40 [ 32.275597] kasan_save_alloc_info+0x40/0x58 [ 32.275644] __kasan_kmalloc+0xd4/0xd8 [ 32.275682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.275733] kasan_atomics+0xb8/0x2e0 [ 32.275773] kunit_try_run_case+0x170/0x3f0 [ 32.275812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275858] kthread+0x328/0x630 [ 32.275894] ret_from_fork+0x10/0x20 [ 32.275932] [ 32.275953] The buggy address belongs to the object at fff00000c9abb900 [ 32.275953] which belongs to the cache kmalloc-64 of size 64 [ 32.276012] The buggy address is located 0 bytes to the right of [ 32.276012] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.276538] [ 32.276634] The buggy address belongs to the physical page: [ 32.276672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.276727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.276775] page_type: f5(slab) [ 32.277196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.277290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.277488] page dumped because: kasan: bad access detected [ 32.277604] [ 32.277674] Memory state around the buggy address: [ 32.277882] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.277928] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.277972] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.278047] ^ [ 32.278130] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.278189] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.278301] ================================================================== [ 32.208766] ================================================================== [ 32.208817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.208869] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.208921] [ 32.208951] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.209035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.209078] Hardware name: linux,dummy-virt (DT) [ 32.209111] Call trace: [ 32.209136] show_stack+0x20/0x38 (C) [ 32.209187] dump_stack_lvl+0x8c/0xd0 [ 32.209252] print_report+0x118/0x5d0 [ 32.209299] kasan_report+0xdc/0x128 [ 32.209343] kasan_check_range+0x100/0x1a8 [ 32.209408] __kasan_check_write+0x20/0x30 [ 32.209473] kasan_atomics_helper+0xeb8/0x4858 [ 32.209526] kasan_atomics+0x198/0x2e0 [ 32.209585] kunit_try_run_case+0x170/0x3f0 [ 32.209633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.209687] kthread+0x328/0x630 [ 32.209731] ret_from_fork+0x10/0x20 [ 32.209779] [ 32.209801] Allocated by task 296: [ 32.209831] kasan_save_stack+0x3c/0x68 [ 32.212070] kasan_save_track+0x20/0x40 [ 32.212124] kasan_save_alloc_info+0x40/0x58 [ 32.212165] __kasan_kmalloc+0xd4/0xd8 [ 32.212202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.212245] kasan_atomics+0xb8/0x2e0 [ 32.212283] kunit_try_run_case+0x170/0x3f0 [ 32.212323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.212369] kthread+0x328/0x630 [ 32.212416] ret_from_fork+0x10/0x20 [ 32.212455] [ 32.212476] The buggy address belongs to the object at fff00000c9abb900 [ 32.212476] which belongs to the cache kmalloc-64 of size 64 [ 32.212533] The buggy address is located 0 bytes to the right of [ 32.212533] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.212598] [ 32.212619] The buggy address belongs to the physical page: [ 32.212651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.212704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.212753] page_type: f5(slab) [ 32.212791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.212841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.212882] page dumped because: kasan: bad access detected [ 32.212916] [ 32.212936] Memory state around the buggy address: [ 32.212968] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.213014] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.213067] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.213184] ^ [ 32.213271] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.213329] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.213369] ================================================================== [ 32.330550] ================================================================== [ 32.330664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.330750] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.330810] [ 32.331123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.331221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.331258] Hardware name: linux,dummy-virt (DT) [ 32.331323] Call trace: [ 32.331349] show_stack+0x20/0x38 (C) [ 32.331437] dump_stack_lvl+0x8c/0xd0 [ 32.331504] print_report+0x118/0x5d0 [ 32.331659] kasan_report+0xdc/0x128 [ 32.331721] kasan_check_range+0x100/0x1a8 [ 32.331863] __kasan_check_write+0x20/0x30 [ 32.331926] kasan_atomics_helper+0x175c/0x4858 [ 32.331985] kasan_atomics+0x198/0x2e0 [ 32.332119] kunit_try_run_case+0x170/0x3f0 [ 32.332193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.332452] kthread+0x328/0x630 [ 32.332763] ret_from_fork+0x10/0x20 [ 32.333221] [ 32.333288] Allocated by task 296: [ 32.333428] kasan_save_stack+0x3c/0x68 [ 32.333515] kasan_save_track+0x20/0x40 [ 32.333656] kasan_save_alloc_info+0x40/0x58 [ 32.333777] __kasan_kmalloc+0xd4/0xd8 [ 32.333930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.334081] kasan_atomics+0xb8/0x2e0 [ 32.334185] kunit_try_run_case+0x170/0x3f0 [ 32.334397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.334559] kthread+0x328/0x630 [ 32.334639] ret_from_fork+0x10/0x20 [ 32.334696] [ 32.334719] The buggy address belongs to the object at fff00000c9abb900 [ 32.334719] which belongs to the cache kmalloc-64 of size 64 [ 32.334988] The buggy address is located 0 bytes to the right of [ 32.334988] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.335174] [ 32.335245] The buggy address belongs to the physical page: [ 32.335544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.335688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.335774] page_type: f5(slab) [ 32.335920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.336142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.336284] page dumped because: kasan: bad access detected [ 32.336351] [ 32.336559] Memory state around the buggy address: [ 32.336607] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.336653] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.336890] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.337027] ^ [ 32.337106] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.337382] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.337490] ================================================================== [ 32.231434] ================================================================== [ 32.231487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.231538] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.231589] [ 32.231618] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.231703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.231731] Hardware name: linux,dummy-virt (DT) [ 32.231764] Call trace: [ 32.231789] show_stack+0x20/0x38 (C) [ 32.231836] dump_stack_lvl+0x8c/0xd0 [ 32.231883] print_report+0x118/0x5d0 [ 32.231929] kasan_report+0xdc/0x128 [ 32.231973] kasan_check_range+0x100/0x1a8 [ 32.232022] __kasan_check_write+0x20/0x30 [ 32.232086] kasan_atomics_helper+0x10c0/0x4858 [ 32.232138] kasan_atomics+0x198/0x2e0 [ 32.232186] kunit_try_run_case+0x170/0x3f0 [ 32.232233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.232287] kthread+0x328/0x630 [ 32.232330] ret_from_fork+0x10/0x20 [ 32.232637] [ 32.232734] Allocated by task 296: [ 32.232914] kasan_save_stack+0x3c/0x68 [ 32.232982] kasan_save_track+0x20/0x40 [ 32.233030] kasan_save_alloc_info+0x40/0x58 [ 32.233079] __kasan_kmalloc+0xd4/0xd8 [ 32.233116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.233160] kasan_atomics+0xb8/0x2e0 [ 32.233298] kunit_try_run_case+0x170/0x3f0 [ 32.233418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.233498] kthread+0x328/0x630 [ 32.233556] ret_from_fork+0x10/0x20 [ 32.233684] [ 32.233754] The buggy address belongs to the object at fff00000c9abb900 [ 32.233754] which belongs to the cache kmalloc-64 of size 64 [ 32.233855] The buggy address is located 0 bytes to the right of [ 32.233855] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.233921] [ 32.233942] The buggy address belongs to the physical page: [ 32.233973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.234024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.234082] page_type: f5(slab) [ 32.234121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.234295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.234444] page dumped because: kasan: bad access detected [ 32.234534] [ 32.234594] Memory state around the buggy address: [ 32.234692] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.234791] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.235006] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.235077] ^ [ 32.235255] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235334] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235406] ================================================================== [ 32.251994] ================================================================== [ 32.252044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.252128] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.252186] [ 32.252233] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.252344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.252403] Hardware name: linux,dummy-virt (DT) [ 32.252507] Call trace: [ 32.252633] show_stack+0x20/0x38 (C) [ 32.252741] dump_stack_lvl+0x8c/0xd0 [ 32.252849] print_report+0x118/0x5d0 [ 32.252929] kasan_report+0xdc/0x128 [ 32.252999] kasan_check_range+0x100/0x1a8 [ 32.253048] __kasan_check_write+0x20/0x30 [ 32.253106] kasan_atomics_helper+0x1384/0x4858 [ 32.253157] kasan_atomics+0x198/0x2e0 [ 32.253205] kunit_try_run_case+0x170/0x3f0 [ 32.253254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.253307] kthread+0x328/0x630 [ 32.253352] ret_from_fork+0x10/0x20 [ 32.253408] [ 32.253428] Allocated by task 296: [ 32.253458] kasan_save_stack+0x3c/0x68 [ 32.253499] kasan_save_track+0x20/0x40 [ 32.253561] kasan_save_alloc_info+0x40/0x58 [ 32.253652] __kasan_kmalloc+0xd4/0xd8 [ 32.253710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.253786] kasan_atomics+0xb8/0x2e0 [ 32.253914] kunit_try_run_case+0x170/0x3f0 [ 32.254001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.254069] kthread+0x328/0x630 [ 32.254103] ret_from_fork+0x10/0x20 [ 32.254141] [ 32.254164] The buggy address belongs to the object at fff00000c9abb900 [ 32.254164] which belongs to the cache kmalloc-64 of size 64 [ 32.254223] The buggy address is located 0 bytes to the right of [ 32.254223] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.254306] [ 32.254385] The buggy address belongs to the physical page: [ 32.254484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.254564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.254657] page_type: f5(slab) [ 32.254746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.254805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.254847] page dumped because: kasan: bad access detected [ 32.254879] [ 32.254899] Memory state around the buggy address: [ 32.254932] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.254975] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.255019] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.255068] ^ [ 32.255102] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255201] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255298] ================================================================== [ 32.203914] ================================================================== [ 32.203966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.204019] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.204088] [ 32.204121] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.204208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.204248] Hardware name: linux,dummy-virt (DT) [ 32.204292] Call trace: [ 32.204323] show_stack+0x20/0x38 (C) [ 32.204373] dump_stack_lvl+0x8c/0xd0 [ 32.204429] print_report+0x118/0x5d0 [ 32.204476] kasan_report+0xdc/0x128 [ 32.204521] __asan_report_store8_noabort+0x20/0x30 [ 32.204574] kasan_atomics_helper+0x3e5c/0x4858 [ 32.204625] kasan_atomics+0x198/0x2e0 [ 32.204673] kunit_try_run_case+0x170/0x3f0 [ 32.204730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.204799] kthread+0x328/0x630 [ 32.204849] ret_from_fork+0x10/0x20 [ 32.204898] [ 32.204928] Allocated by task 296: [ 32.204974] kasan_save_stack+0x3c/0x68 [ 32.205024] kasan_save_track+0x20/0x40 [ 32.205075] kasan_save_alloc_info+0x40/0x58 [ 32.205115] __kasan_kmalloc+0xd4/0xd8 [ 32.205151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.205193] kasan_atomics+0xb8/0x2e0 [ 32.205234] kunit_try_run_case+0x170/0x3f0 [ 32.205274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.205319] kthread+0x328/0x630 [ 32.205355] ret_from_fork+0x10/0x20 [ 32.205405] [ 32.205450] The buggy address belongs to the object at fff00000c9abb900 [ 32.205450] which belongs to the cache kmalloc-64 of size 64 [ 32.205509] The buggy address is located 0 bytes to the right of [ 32.205509] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.205575] [ 32.205595] The buggy address belongs to the physical page: [ 32.205625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.205679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.206035] page_type: f5(slab) [ 32.206094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.206183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.206272] page dumped because: kasan: bad access detected [ 32.206366] [ 32.206613] Memory state around the buggy address: [ 32.206671] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.206759] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.206841] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.206977] ^ [ 32.207042] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207127] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207291] ================================================================== [ 32.268373] ================================================================== [ 32.268441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.268493] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.268544] [ 32.268573] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.268659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.268687] Hardware name: linux,dummy-virt (DT) [ 32.268719] Call trace: [ 32.268741] show_stack+0x20/0x38 (C) [ 32.268790] dump_stack_lvl+0x8c/0xd0 [ 32.268838] print_report+0x118/0x5d0 [ 32.268882] kasan_report+0xdc/0x128 [ 32.268927] kasan_check_range+0x100/0x1a8 [ 32.268975] __kasan_check_write+0x20/0x30 [ 32.269076] kasan_atomics_helper+0x147c/0x4858 [ 32.269184] kasan_atomics+0x198/0x2e0 [ 32.269280] kunit_try_run_case+0x170/0x3f0 [ 32.269329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.269382] kthread+0x328/0x630 [ 32.269427] ret_from_fork+0x10/0x20 [ 32.269638] [ 32.270047] Allocated by task 296: [ 32.270391] kasan_save_stack+0x3c/0x68 [ 32.270454] kasan_save_track+0x20/0x40 [ 32.270541] kasan_save_alloc_info+0x40/0x58 [ 32.270645] __kasan_kmalloc+0xd4/0xd8 [ 32.270754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.271018] kasan_atomics+0xb8/0x2e0 [ 32.271133] kunit_try_run_case+0x170/0x3f0 [ 32.271222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.271271] kthread+0x328/0x630 [ 32.271313] ret_from_fork+0x10/0x20 [ 32.271559] [ 32.271654] The buggy address belongs to the object at fff00000c9abb900 [ 32.271654] which belongs to the cache kmalloc-64 of size 64 [ 32.271762] The buggy address is located 0 bytes to the right of [ 32.271762] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.271964] [ 32.272135] The buggy address belongs to the physical page: [ 32.272201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.272289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.272385] page_type: f5(slab) [ 32.272449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.272503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.272552] page dumped because: kasan: bad access detected [ 32.272585] [ 32.272605] Memory state around the buggy address: [ 32.272639] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.272933] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273073] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.273170] ^ [ 32.273480] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273557] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273644] ================================================================== [ 32.255729] ================================================================== [ 32.255774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.255823] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.255874] [ 32.255903] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.256005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.256035] Hardware name: linux,dummy-virt (DT) [ 32.256096] Call trace: [ 32.256121] show_stack+0x20/0x38 (C) [ 32.256177] dump_stack_lvl+0x8c/0xd0 [ 32.256249] print_report+0x118/0x5d0 [ 32.256335] kasan_report+0xdc/0x128 [ 32.256415] __asan_report_load8_noabort+0x20/0x30 [ 32.256518] kasan_atomics_helper+0x3f04/0x4858 [ 32.256627] kasan_atomics+0x198/0x2e0 [ 32.256750] kunit_try_run_case+0x170/0x3f0 [ 32.256813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.256888] kthread+0x328/0x630 [ 32.256933] ret_from_fork+0x10/0x20 [ 32.256983] [ 32.257003] Allocated by task 296: [ 32.257032] kasan_save_stack+0x3c/0x68 [ 32.257081] kasan_save_track+0x20/0x40 [ 32.257119] kasan_save_alloc_info+0x40/0x58 [ 32.257159] __kasan_kmalloc+0xd4/0xd8 [ 32.257194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.257238] kasan_atomics+0xb8/0x2e0 [ 32.257277] kunit_try_run_case+0x170/0x3f0 [ 32.257351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.257421] kthread+0x328/0x630 [ 32.257477] ret_from_fork+0x10/0x20 [ 32.257572] [ 32.257650] The buggy address belongs to the object at fff00000c9abb900 [ 32.257650] which belongs to the cache kmalloc-64 of size 64 [ 32.257750] The buggy address is located 0 bytes to the right of [ 32.257750] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.258099] [ 32.258168] The buggy address belongs to the physical page: [ 32.258263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.258400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.258468] page_type: f5(slab) [ 32.258507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.258559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.258755] page dumped because: kasan: bad access detected [ 32.258900] [ 32.258976] Memory state around the buggy address: [ 32.259078] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.259177] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.259276] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.259518] ^ [ 32.259661] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.259730] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.259813] ================================================================== [ 32.289650] ================================================================== [ 32.289702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.290003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.291213] [ 32.291300] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.291411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.291508] Hardware name: linux,dummy-virt (DT) [ 32.291543] Call trace: [ 32.291567] show_stack+0x20/0x38 (C) [ 32.291624] dump_stack_lvl+0x8c/0xd0 [ 32.291680] print_report+0x118/0x5d0 [ 32.291726] kasan_report+0xdc/0x128 [ 32.291772] kasan_check_range+0x100/0x1a8 [ 32.292086] __kasan_check_write+0x20/0x30 [ 32.292289] kasan_atomics_helper+0x15b4/0x4858 [ 32.292390] kasan_atomics+0x198/0x2e0 [ 32.292521] kunit_try_run_case+0x170/0x3f0 [ 32.292702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.292763] kthread+0x328/0x630 [ 32.292940] ret_from_fork+0x10/0x20 [ 32.293000] [ 32.293021] Allocated by task 296: [ 32.293052] kasan_save_stack+0x3c/0x68 [ 32.293200] kasan_save_track+0x20/0x40 [ 32.293395] kasan_save_alloc_info+0x40/0x58 [ 32.293480] __kasan_kmalloc+0xd4/0xd8 [ 32.293872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.293989] kasan_atomics+0xb8/0x2e0 [ 32.294291] kunit_try_run_case+0x170/0x3f0 [ 32.294404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.294504] kthread+0x328/0x630 [ 32.294590] ret_from_fork+0x10/0x20 [ 32.294881] [ 32.294927] The buggy address belongs to the object at fff00000c9abb900 [ 32.294927] which belongs to the cache kmalloc-64 of size 64 [ 32.295081] The buggy address is located 0 bytes to the right of [ 32.295081] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.295152] [ 32.295176] The buggy address belongs to the physical page: [ 32.295370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.295448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.295610] page_type: f5(slab) [ 32.295672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.295739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.295910] page dumped because: kasan: bad access detected [ 32.296085] [ 32.296146] Memory state around the buggy address: [ 32.296253] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.296402] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.296474] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.296809] ^ [ 32.296924] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.297040] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.297241] ================================================================== [ 32.235827] ================================================================== [ 32.235876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.235924] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.235974] [ 32.236005] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.236104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.236132] Hardware name: linux,dummy-virt (DT) [ 32.236164] Call trace: [ 32.236186] show_stack+0x20/0x38 (C) [ 32.236250] dump_stack_lvl+0x8c/0xd0 [ 32.236301] print_report+0x118/0x5d0 [ 32.236345] kasan_report+0xdc/0x128 [ 32.236399] kasan_check_range+0x100/0x1a8 [ 32.236446] __kasan_check_write+0x20/0x30 [ 32.236493] kasan_atomics_helper+0x1128/0x4858 [ 32.236553] kasan_atomics+0x198/0x2e0 [ 32.236603] kunit_try_run_case+0x170/0x3f0 [ 32.236652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.236705] kthread+0x328/0x630 [ 32.236757] ret_from_fork+0x10/0x20 [ 32.236814] [ 32.236834] Allocated by task 296: [ 32.236863] kasan_save_stack+0x3c/0x68 [ 32.236904] kasan_save_track+0x20/0x40 [ 32.236941] kasan_save_alloc_info+0x40/0x58 [ 32.236981] __kasan_kmalloc+0xd4/0xd8 [ 32.237018] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.237069] kasan_atomics+0xb8/0x2e0 [ 32.237110] kunit_try_run_case+0x170/0x3f0 [ 32.237150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.237211] kthread+0x328/0x630 [ 32.237247] ret_from_fork+0x10/0x20 [ 32.237285] [ 32.237305] The buggy address belongs to the object at fff00000c9abb900 [ 32.237305] which belongs to the cache kmalloc-64 of size 64 [ 32.237371] The buggy address is located 0 bytes to the right of [ 32.237371] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.237436] [ 32.237459] The buggy address belongs to the physical page: [ 32.237491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.237541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.237588] page_type: f5(slab) [ 32.237655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.237706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.237759] page dumped because: kasan: bad access detected [ 32.237791] [ 32.237811] Memory state around the buggy address: [ 32.237842] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.237886] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.237952] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.238013] ^ [ 32.238048] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.238100] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.238139] ================================================================== [ 32.342665] ================================================================== [ 32.342876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.342950] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.343077] [ 32.343136] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.343300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.343544] Hardware name: linux,dummy-virt (DT) [ 32.343620] Call trace: [ 32.343645] show_stack+0x20/0x38 (C) [ 32.343783] dump_stack_lvl+0x8c/0xd0 [ 32.343837] print_report+0x118/0x5d0 [ 32.343884] kasan_report+0xdc/0x128 [ 32.343927] kasan_check_range+0x100/0x1a8 [ 32.344101] __kasan_check_write+0x20/0x30 [ 32.344320] kasan_atomics_helper+0x17ec/0x4858 [ 32.344543] kasan_atomics+0x198/0x2e0 [ 32.344621] kunit_try_run_case+0x170/0x3f0 [ 32.344801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.344880] kthread+0x328/0x630 [ 32.345032] ret_from_fork+0x10/0x20 [ 32.345151] [ 32.345267] Allocated by task 296: [ 32.345365] kasan_save_stack+0x3c/0x68 [ 32.345567] kasan_save_track+0x20/0x40 [ 32.345628] kasan_save_alloc_info+0x40/0x58 [ 32.345715] __kasan_kmalloc+0xd4/0xd8 [ 32.345835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.345906] kasan_atomics+0xb8/0x2e0 [ 32.346205] kunit_try_run_case+0x170/0x3f0 [ 32.346320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.346416] kthread+0x328/0x630 [ 32.346671] ret_from_fork+0x10/0x20 [ 32.346802] [ 32.346873] The buggy address belongs to the object at fff00000c9abb900 [ 32.346873] which belongs to the cache kmalloc-64 of size 64 [ 32.347008] The buggy address is located 0 bytes to the right of [ 32.347008] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.347088] [ 32.347110] The buggy address belongs to the physical page: [ 32.347143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.347317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.347406] page_type: f5(slab) [ 32.347454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.347523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.347762] page dumped because: kasan: bad access detected [ 32.347929] [ 32.347998] Memory state around the buggy address: [ 32.348081] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.348219] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.348273] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.348312] ^ [ 32.348459] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.348666] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.348787] ================================================================== [ 32.193695] ================================================================== [ 32.193880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.193944] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.194000] [ 32.194120] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.194251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.194318] Hardware name: linux,dummy-virt (DT) [ 32.194352] Call trace: [ 32.194447] show_stack+0x20/0x38 (C) [ 32.194515] dump_stack_lvl+0x8c/0xd0 [ 32.194567] print_report+0x118/0x5d0 [ 32.194614] kasan_report+0xdc/0x128 [ 32.194659] __asan_report_load8_noabort+0x20/0x30 [ 32.194818] kasan_atomics_helper+0x3f58/0x4858 [ 32.194894] kasan_atomics+0x198/0x2e0 [ 32.194945] kunit_try_run_case+0x170/0x3f0 [ 32.194994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.195047] kthread+0x328/0x630 [ 32.195104] ret_from_fork+0x10/0x20 [ 32.195338] [ 32.195440] Allocated by task 296: [ 32.195482] kasan_save_stack+0x3c/0x68 [ 32.195525] kasan_save_track+0x20/0x40 [ 32.195563] kasan_save_alloc_info+0x40/0x58 [ 32.195603] __kasan_kmalloc+0xd4/0xd8 [ 32.195639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.195682] kasan_atomics+0xb8/0x2e0 [ 32.195856] kunit_try_run_case+0x170/0x3f0 [ 32.196004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.196099] kthread+0x328/0x630 [ 32.196219] ret_from_fork+0x10/0x20 [ 32.196256] [ 32.196294] The buggy address belongs to the object at fff00000c9abb900 [ 32.196294] which belongs to the cache kmalloc-64 of size 64 [ 32.196355] The buggy address is located 0 bytes to the right of [ 32.196355] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.196456] [ 32.196738] The buggy address belongs to the physical page: [ 32.196822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.196878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.196927] page_type: f5(slab) [ 32.196979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.197073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.197116] page dumped because: kasan: bad access detected [ 32.197148] [ 32.197177] Memory state around the buggy address: [ 32.197216] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.197261] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.197314] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.197355] ^ [ 32.197388] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197431] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197808] ================================================================== [ 32.213576] ================================================================== [ 32.213622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.213695] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.213752] [ 32.213785] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.213869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.213897] Hardware name: linux,dummy-virt (DT) [ 32.213929] Call trace: [ 32.213954] show_stack+0x20/0x38 (C) [ 32.214011] dump_stack_lvl+0x8c/0xd0 [ 32.214075] print_report+0x118/0x5d0 [ 32.214121] kasan_report+0xdc/0x128 [ 32.214175] kasan_check_range+0x100/0x1a8 [ 32.214223] __kasan_check_write+0x20/0x30 [ 32.214271] kasan_atomics_helper+0xf20/0x4858 [ 32.214326] kasan_atomics+0x198/0x2e0 [ 32.214375] kunit_try_run_case+0x170/0x3f0 [ 32.214423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.214476] kthread+0x328/0x630 [ 32.214530] ret_from_fork+0x10/0x20 [ 32.214588] [ 32.214617] Allocated by task 296: [ 32.214656] kasan_save_stack+0x3c/0x68 [ 32.214706] kasan_save_track+0x20/0x40 [ 32.214744] kasan_save_alloc_info+0x40/0x58 [ 32.214791] __kasan_kmalloc+0xd4/0xd8 [ 32.214829] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.214871] kasan_atomics+0xb8/0x2e0 [ 32.214911] kunit_try_run_case+0x170/0x3f0 [ 32.214951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.214996] kthread+0x328/0x630 [ 32.215062] ret_from_fork+0x10/0x20 [ 32.215102] [ 32.215122] The buggy address belongs to the object at fff00000c9abb900 [ 32.215122] which belongs to the cache kmalloc-64 of size 64 [ 32.215179] The buggy address is located 0 bytes to the right of [ 32.215179] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.215242] [ 32.215263] The buggy address belongs to the physical page: [ 32.215296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.215347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.215394] page_type: f5(slab) [ 32.215431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.215485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.215526] page dumped because: kasan: bad access detected [ 32.215559] [ 32.215578] Memory state around the buggy address: [ 32.215612] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215655] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215698] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.215737] ^ [ 32.215771] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.215813] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.215853] ================================================================== [ 32.337953] ================================================================== [ 32.338028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.338095] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.338146] [ 32.338177] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.338526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.338570] Hardware name: linux,dummy-virt (DT) [ 32.338605] Call trace: [ 32.338654] show_stack+0x20/0x38 (C) [ 32.338834] dump_stack_lvl+0x8c/0xd0 [ 32.338885] print_report+0x118/0x5d0 [ 32.338930] kasan_report+0xdc/0x128 [ 32.338977] __asan_report_load8_noabort+0x20/0x30 [ 32.339027] kasan_atomics_helper+0x3e20/0x4858 [ 32.339091] kasan_atomics+0x198/0x2e0 [ 32.339140] kunit_try_run_case+0x170/0x3f0 [ 32.339189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.339243] kthread+0x328/0x630 [ 32.339288] ret_from_fork+0x10/0x20 [ 32.339367] [ 32.339390] Allocated by task 296: [ 32.339434] kasan_save_stack+0x3c/0x68 [ 32.339476] kasan_save_track+0x20/0x40 [ 32.339513] kasan_save_alloc_info+0x40/0x58 [ 32.339553] __kasan_kmalloc+0xd4/0xd8 [ 32.339589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.339632] kasan_atomics+0xb8/0x2e0 [ 32.339671] kunit_try_run_case+0x170/0x3f0 [ 32.339710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.339754] kthread+0x328/0x630 [ 32.339790] ret_from_fork+0x10/0x20 [ 32.339828] [ 32.339847] The buggy address belongs to the object at fff00000c9abb900 [ 32.339847] which belongs to the cache kmalloc-64 of size 64 [ 32.339906] The buggy address is located 0 bytes to the right of [ 32.339906] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.339972] [ 32.340009] The buggy address belongs to the physical page: [ 32.340046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.340589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.340714] page_type: f5(slab) [ 32.340954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.341140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.341318] page dumped because: kasan: bad access detected [ 32.341357] [ 32.341377] Memory state around the buggy address: [ 32.341442] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.341502] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.341557] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.341676] ^ [ 32.341818] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342096] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342195] ================================================================== [ 32.198169] ================================================================== [ 32.198245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.198294] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.198346] [ 32.198401] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.198489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.198534] Hardware name: linux,dummy-virt (DT) [ 32.198686] Call trace: [ 32.198729] show_stack+0x20/0x38 (C) [ 32.198801] dump_stack_lvl+0x8c/0xd0 [ 32.198850] print_report+0x118/0x5d0 [ 32.198896] kasan_report+0xdc/0x128 [ 32.199139] kasan_check_range+0x100/0x1a8 [ 32.199243] __kasan_check_write+0x20/0x30 [ 32.199354] kasan_atomics_helper+0xe44/0x4858 [ 32.199407] kasan_atomics+0x198/0x2e0 [ 32.199473] kunit_try_run_case+0x170/0x3f0 [ 32.199557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.199821] kthread+0x328/0x630 [ 32.199889] ret_from_fork+0x10/0x20 [ 32.199986] [ 32.200015] Allocated by task 296: [ 32.200083] kasan_save_stack+0x3c/0x68 [ 32.200127] kasan_save_track+0x20/0x40 [ 32.200182] kasan_save_alloc_info+0x40/0x58 [ 32.200384] __kasan_kmalloc+0xd4/0xd8 [ 32.200438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.200482] kasan_atomics+0xb8/0x2e0 [ 32.200600] kunit_try_run_case+0x170/0x3f0 [ 32.200642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.200687] kthread+0x328/0x630 [ 32.200723] ret_from_fork+0x10/0x20 [ 32.200817] [ 32.200920] The buggy address belongs to the object at fff00000c9abb900 [ 32.200920] which belongs to the cache kmalloc-64 of size 64 [ 32.201100] The buggy address is located 0 bytes to the right of [ 32.201100] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.201239] [ 32.201433] The buggy address belongs to the physical page: [ 32.201486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.201537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.201586] page_type: f5(slab) [ 32.201771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.202038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.202151] page dumped because: kasan: bad access detected [ 32.202255] [ 32.202438] Memory state around the buggy address: [ 32.202617] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.202734] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.202863] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.202941] ^ [ 32.203016] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203166] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203254] ================================================================== [ 32.241750] ================================================================== [ 32.241828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.241914] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.241968] [ 32.242015] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.242351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.242398] Hardware name: linux,dummy-virt (DT) [ 32.242435] Call trace: [ 32.242464] show_stack+0x20/0x38 (C) [ 32.242513] dump_stack_lvl+0x8c/0xd0 [ 32.242603] print_report+0x118/0x5d0 [ 32.242669] kasan_report+0xdc/0x128 [ 32.242760] kasan_check_range+0x100/0x1a8 [ 32.242820] __kasan_check_write+0x20/0x30 [ 32.242870] kasan_atomics_helper+0x11f8/0x4858 [ 32.242922] kasan_atomics+0x198/0x2e0 [ 32.242970] kunit_try_run_case+0x170/0x3f0 [ 32.243019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.243082] kthread+0x328/0x630 [ 32.243126] ret_from_fork+0x10/0x20 [ 32.243174] [ 32.243195] Allocated by task 296: [ 32.243224] kasan_save_stack+0x3c/0x68 [ 32.243283] kasan_save_track+0x20/0x40 [ 32.243340] kasan_save_alloc_info+0x40/0x58 [ 32.243386] __kasan_kmalloc+0xd4/0xd8 [ 32.243422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.243483] kasan_atomics+0xb8/0x2e0 [ 32.243550] kunit_try_run_case+0x170/0x3f0 [ 32.243629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.243702] kthread+0x328/0x630 [ 32.243771] ret_from_fork+0x10/0x20 [ 32.243809] [ 32.243831] The buggy address belongs to the object at fff00000c9abb900 [ 32.243831] which belongs to the cache kmalloc-64 of size 64 [ 32.243889] The buggy address is located 0 bytes to the right of [ 32.243889] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.243954] [ 32.243974] The buggy address belongs to the physical page: [ 32.244007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.244065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.244130] page_type: f5(slab) [ 32.244187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.244240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.244293] page dumped because: kasan: bad access detected [ 32.244327] [ 32.244346] Memory state around the buggy address: [ 32.244396] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.244483] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.244563] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.244603] ^ [ 32.244637] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.244681] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.244721] ================================================================== [ 32.178869] ================================================================== [ 32.178922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.178977] Write of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.179932] [ 32.179987] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.180294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.180324] Hardware name: linux,dummy-virt (DT) [ 32.180355] Call trace: [ 32.180713] show_stack+0x20/0x38 (C) [ 32.180791] dump_stack_lvl+0x8c/0xd0 [ 32.180921] print_report+0x118/0x5d0 [ 32.181286] kasan_report+0xdc/0x128 [ 32.181509] kasan_check_range+0x100/0x1a8 [ 32.181561] __kasan_check_write+0x20/0x30 [ 32.181614] kasan_atomics_helper+0xd3c/0x4858 [ 32.181665] kasan_atomics+0x198/0x2e0 [ 32.181715] kunit_try_run_case+0x170/0x3f0 [ 32.181763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.181816] kthread+0x328/0x630 [ 32.181860] ret_from_fork+0x10/0x20 [ 32.181909] [ 32.181929] Allocated by task 296: [ 32.181961] kasan_save_stack+0x3c/0x68 [ 32.182000] kasan_save_track+0x20/0x40 [ 32.182038] kasan_save_alloc_info+0x40/0x58 [ 32.182143] __kasan_kmalloc+0xd4/0xd8 [ 32.182232] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.182378] kasan_atomics+0xb8/0x2e0 [ 32.182475] kunit_try_run_case+0x170/0x3f0 [ 32.182565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.182785] kthread+0x328/0x630 [ 32.182970] ret_from_fork+0x10/0x20 [ 32.183031] [ 32.183074] The buggy address belongs to the object at fff00000c9abb900 [ 32.183074] which belongs to the cache kmalloc-64 of size 64 [ 32.183134] The buggy address is located 0 bytes to the right of [ 32.183134] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.183199] [ 32.183241] The buggy address belongs to the physical page: [ 32.183280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.183348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.183406] page_type: f5(slab) [ 32.183455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.183506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.183548] page dumped because: kasan: bad access detected [ 32.183581] [ 32.183607] Memory state around the buggy address: [ 32.183638] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.183683] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.183727] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.183767] ^ [ 32.183809] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183855] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183894] ================================================================== [ 32.221423] ================================================================== [ 32.221472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.221522] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.221573] [ 32.221601] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.221688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221715] Hardware name: linux,dummy-virt (DT) [ 32.221746] Call trace: [ 32.221770] show_stack+0x20/0x38 (C) [ 32.221817] dump_stack_lvl+0x8c/0xd0 [ 32.221866] print_report+0x118/0x5d0 [ 32.221913] kasan_report+0xdc/0x128 [ 32.221958] kasan_check_range+0x100/0x1a8 [ 32.222005] __kasan_check_write+0x20/0x30 [ 32.222068] kasan_atomics_helper+0xff0/0x4858 [ 32.222120] kasan_atomics+0x198/0x2e0 [ 32.222169] kunit_try_run_case+0x170/0x3f0 [ 32.222250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.222304] kthread+0x328/0x630 [ 32.222348] ret_from_fork+0x10/0x20 [ 32.222431] [ 32.222469] Allocated by task 296: [ 32.222528] kasan_save_stack+0x3c/0x68 [ 32.222569] kasan_save_track+0x20/0x40 [ 32.222905] kasan_save_alloc_info+0x40/0x58 [ 32.222957] __kasan_kmalloc+0xd4/0xd8 [ 32.223014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.223100] kasan_atomics+0xb8/0x2e0 [ 32.223188] kunit_try_run_case+0x170/0x3f0 [ 32.223276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.223372] kthread+0x328/0x630 [ 32.223419] ret_from_fork+0x10/0x20 [ 32.223478] [ 32.223517] The buggy address belongs to the object at fff00000c9abb900 [ 32.223517] which belongs to the cache kmalloc-64 of size 64 [ 32.223610] The buggy address is located 0 bytes to the right of [ 32.223610] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.223691] [ 32.223713] The buggy address belongs to the physical page: [ 32.223745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.223798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.224070] page_type: f5(slab) [ 32.224146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.224300] page dumped because: kasan: bad access detected [ 32.224359] [ 32.224419] Memory state around the buggy address: [ 32.224483] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.224818] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.224933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.225047] ^ [ 32.225132] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.225195] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.225273] ================================================================== [ 32.260336] ================================================================== [ 32.263086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.263144] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.263195] [ 32.263225] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.263310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.263339] Hardware name: linux,dummy-virt (DT) [ 32.263371] Call trace: [ 32.263394] show_stack+0x20/0x38 (C) [ 32.263441] dump_stack_lvl+0x8c/0xd0 [ 32.263491] print_report+0x118/0x5d0 [ 32.263536] kasan_report+0xdc/0x128 [ 32.263580] kasan_check_range+0x100/0x1a8 [ 32.263627] __kasan_check_write+0x20/0x30 [ 32.263675] kasan_atomics_helper+0x1414/0x4858 [ 32.263727] kasan_atomics+0x198/0x2e0 [ 32.263775] kunit_try_run_case+0x170/0x3f0 [ 32.263824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.263877] kthread+0x328/0x630 [ 32.263921] ret_from_fork+0x10/0x20 [ 32.263970] [ 32.263990] Allocated by task 296: [ 32.264019] kasan_save_stack+0x3c/0x68 [ 32.264070] kasan_save_track+0x20/0x40 [ 32.264166] kasan_save_alloc_info+0x40/0x58 [ 32.264206] __kasan_kmalloc+0xd4/0xd8 [ 32.264243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.264288] kasan_atomics+0xb8/0x2e0 [ 32.264328] kunit_try_run_case+0x170/0x3f0 [ 32.264368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.264429] kthread+0x328/0x630 [ 32.264480] ret_from_fork+0x10/0x20 [ 32.264526] [ 32.264558] The buggy address belongs to the object at fff00000c9abb900 [ 32.264558] which belongs to the cache kmalloc-64 of size 64 [ 32.264616] The buggy address is located 0 bytes to the right of [ 32.264616] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.264692] [ 32.264733] The buggy address belongs to the physical page: [ 32.264764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.264822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.264868] page_type: f5(slab) [ 32.264918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.264970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.265013] page dumped because: kasan: bad access detected [ 32.265064] [ 32.265100] Memory state around the buggy address: [ 32.265134] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.265178] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.265222] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.265273] ^ [ 32.265316] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.265361] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.265401] ================================================================== [ 32.306021] ================================================================== [ 32.306099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.306212] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.306265] [ 32.306306] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.306401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.306439] Hardware name: linux,dummy-virt (DT) [ 32.306472] Call trace: [ 32.306495] show_stack+0x20/0x38 (C) [ 32.306544] dump_stack_lvl+0x8c/0xd0 [ 32.306595] print_report+0x118/0x5d0 [ 32.306640] kasan_report+0xdc/0x128 [ 32.306693] kasan_check_range+0x100/0x1a8 [ 32.306749] __kasan_check_write+0x20/0x30 [ 32.306805] kasan_atomics_helper+0x1644/0x4858 [ 32.306857] kasan_atomics+0x198/0x2e0 [ 32.306906] kunit_try_run_case+0x170/0x3f0 [ 32.306955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.307017] kthread+0x328/0x630 [ 32.307074] ret_from_fork+0x10/0x20 [ 32.307123] [ 32.307143] Allocated by task 296: [ 32.307173] kasan_save_stack+0x3c/0x68 [ 32.307222] kasan_save_track+0x20/0x40 [ 32.307270] kasan_save_alloc_info+0x40/0x58 [ 32.307311] __kasan_kmalloc+0xd4/0xd8 [ 32.307355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.307401] kasan_atomics+0xb8/0x2e0 [ 32.307442] kunit_try_run_case+0x170/0x3f0 [ 32.307482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.307528] kthread+0x328/0x630 [ 32.307564] ret_from_fork+0x10/0x20 [ 32.307601] [ 32.307623] The buggy address belongs to the object at fff00000c9abb900 [ 32.307623] which belongs to the cache kmalloc-64 of size 64 [ 32.307682] The buggy address is located 0 bytes to the right of [ 32.307682] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.307747] [ 32.307776] The buggy address belongs to the physical page: [ 32.307810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.307860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.307916] page_type: f5(slab) [ 32.307954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.308006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.308047] page dumped because: kasan: bad access detected [ 32.308100] [ 32.308553] Memory state around the buggy address: [ 32.309079] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309135] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309298] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.309396] ^ [ 32.309526] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309633] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309789] ================================================================== [ 32.278979] ================================================================== [ 32.279052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.279117] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.279168] [ 32.279398] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.279587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.279622] Hardware name: linux,dummy-virt (DT) [ 32.279672] Call trace: [ 32.279768] show_stack+0x20/0x38 (C) [ 32.279841] dump_stack_lvl+0x8c/0xd0 [ 32.279909] print_report+0x118/0x5d0 [ 32.279955] kasan_report+0xdc/0x128 [ 32.280036] kasan_check_range+0x100/0x1a8 [ 32.280097] __kasan_check_write+0x20/0x30 [ 32.280145] kasan_atomics_helper+0x154c/0x4858 [ 32.280286] kasan_atomics+0x198/0x2e0 [ 32.280499] kunit_try_run_case+0x170/0x3f0 [ 32.280639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.280747] kthread+0x328/0x630 [ 32.281646] ret_from_fork+0x10/0x20 [ 32.281716] [ 32.281738] Allocated by task 296: [ 32.281770] kasan_save_stack+0x3c/0x68 [ 32.281812] kasan_save_track+0x20/0x40 [ 32.281851] kasan_save_alloc_info+0x40/0x58 [ 32.284190] __kasan_kmalloc+0xd4/0xd8 [ 32.284902] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.285043] kasan_atomics+0xb8/0x2e0 [ 32.286182] kunit_try_run_case+0x170/0x3f0 [ 32.286325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.286377] kthread+0x328/0x630 [ 32.286412] ret_from_fork+0x10/0x20 [ 32.286451] [ 32.286482] The buggy address belongs to the object at fff00000c9abb900 [ 32.286482] which belongs to the cache kmalloc-64 of size 64 [ 32.286543] The buggy address is located 0 bytes to the right of [ 32.286543] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.286608] [ 32.286631] The buggy address belongs to the physical page: [ 32.286663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.286715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.286762] page_type: f5(slab) [ 32.286812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.286866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.286909] page dumped because: kasan: bad access detected [ 32.286942] [ 32.286962] Memory state around the buggy address: [ 32.286995] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287039] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287173] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.287214] ^ [ 32.287249] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287292] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287331] ================================================================== [ 32.309982] ================================================================== [ 32.310028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.310093] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.310329] [ 32.310414] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.310660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.311025] Hardware name: linux,dummy-virt (DT) [ 32.311078] Call trace: [ 32.311138] show_stack+0x20/0x38 (C) [ 32.311199] dump_stack_lvl+0x8c/0xd0 [ 32.311320] print_report+0x118/0x5d0 [ 32.311396] kasan_report+0xdc/0x128 [ 32.311442] __asan_report_load8_noabort+0x20/0x30 [ 32.311702] kasan_atomics_helper+0x3df4/0x4858 [ 32.311797] kasan_atomics+0x198/0x2e0 [ 32.312051] kunit_try_run_case+0x170/0x3f0 [ 32.312261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.312354] kthread+0x328/0x630 [ 32.312419] ret_from_fork+0x10/0x20 [ 32.312472] [ 32.312492] Allocated by task 296: [ 32.312523] kasan_save_stack+0x3c/0x68 [ 32.312563] kasan_save_track+0x20/0x40 [ 32.312601] kasan_save_alloc_info+0x40/0x58 [ 32.313010] __kasan_kmalloc+0xd4/0xd8 [ 32.313360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.313529] kasan_atomics+0xb8/0x2e0 [ 32.313785] kunit_try_run_case+0x170/0x3f0 [ 32.314020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.314131] kthread+0x328/0x630 [ 32.314415] ret_from_fork+0x10/0x20 [ 32.314641] [ 32.314691] The buggy address belongs to the object at fff00000c9abb900 [ 32.314691] which belongs to the cache kmalloc-64 of size 64 [ 32.314816] The buggy address is located 0 bytes to the right of [ 32.314816] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.315167] [ 32.315318] The buggy address belongs to the physical page: [ 32.315407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.315716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.315819] page_type: f5(slab) [ 32.315983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.316338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.316391] page dumped because: kasan: bad access detected [ 32.316531] [ 32.316611] Memory state around the buggy address: [ 32.316743] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316848] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.317131] ^ [ 32.317383] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317581] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317648] ================================================================== [ 32.225684] ================================================================== [ 32.225753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.225810] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.225897] [ 32.225976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.226094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.226122] Hardware name: linux,dummy-virt (DT) [ 32.226169] Call trace: [ 32.226192] show_stack+0x20/0x38 (C) [ 32.226240] dump_stack_lvl+0x8c/0xd0 [ 32.226289] print_report+0x118/0x5d0 [ 32.226333] kasan_report+0xdc/0x128 [ 32.226378] kasan_check_range+0x100/0x1a8 [ 32.226428] __kasan_check_write+0x20/0x30 [ 32.226476] kasan_atomics_helper+0x1058/0x4858 [ 32.226527] kasan_atomics+0x198/0x2e0 [ 32.226575] kunit_try_run_case+0x170/0x3f0 [ 32.226622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.226675] kthread+0x328/0x630 [ 32.226735] ret_from_fork+0x10/0x20 [ 32.226818] [ 32.226857] Allocated by task 296: [ 32.226913] kasan_save_stack+0x3c/0x68 [ 32.226992] kasan_save_track+0x20/0x40 [ 32.227095] kasan_save_alloc_info+0x40/0x58 [ 32.227139] __kasan_kmalloc+0xd4/0xd8 [ 32.227205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.227535] kasan_atomics+0xb8/0x2e0 [ 32.227575] kunit_try_run_case+0x170/0x3f0 [ 32.227635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.227701] kthread+0x328/0x630 [ 32.227755] ret_from_fork+0x10/0x20 [ 32.227832] [ 32.227870] The buggy address belongs to the object at fff00000c9abb900 [ 32.227870] which belongs to the cache kmalloc-64 of size 64 [ 32.227949] The buggy address is located 0 bytes to the right of [ 32.227949] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.228041] [ 32.228072] The buggy address belongs to the physical page: [ 32.228103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.228153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.228201] page_type: f5(slab) [ 32.228240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.228289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.228331] page dumped because: kasan: bad access detected [ 32.228364] [ 32.228392] Memory state around the buggy address: [ 32.228425] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.228468] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.228541] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.228641] ^ [ 32.228748] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.228836] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.228948] ================================================================== [ 32.298584] ================================================================== [ 32.298636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.298690] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296 [ 32.298893] [ 32.298928] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.299152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.299234] Hardware name: linux,dummy-virt (DT) [ 32.299270] Call trace: [ 32.299311] show_stack+0x20/0x38 (C) [ 32.299374] dump_stack_lvl+0x8c/0xd0 [ 32.299472] print_report+0x118/0x5d0 [ 32.299520] kasan_report+0xdc/0x128 [ 32.299566] __asan_report_load8_noabort+0x20/0x30 [ 32.299617] kasan_atomics_helper+0x3db0/0x4858 [ 32.299668] kasan_atomics+0x198/0x2e0 [ 32.299717] kunit_try_run_case+0x170/0x3f0 [ 32.299767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299836] kthread+0x328/0x630 [ 32.299882] ret_from_fork+0x10/0x20 [ 32.299931] [ 32.299964] Allocated by task 296: [ 32.299996] kasan_save_stack+0x3c/0x68 [ 32.300044] kasan_save_track+0x20/0x40 [ 32.300346] kasan_save_alloc_info+0x40/0x58 [ 32.300407] __kasan_kmalloc+0xd4/0xd8 [ 32.300850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.300973] kasan_atomics+0xb8/0x2e0 [ 32.301036] kunit_try_run_case+0x170/0x3f0 [ 32.301195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.301525] kthread+0x328/0x630 [ 32.301849] ret_from_fork+0x10/0x20 [ 32.301920] [ 32.302048] The buggy address belongs to the object at fff00000c9abb900 [ 32.302048] which belongs to the cache kmalloc-64 of size 64 [ 32.302296] The buggy address is located 0 bytes to the right of [ 32.302296] allocated 48-byte region [fff00000c9abb900, fff00000c9abb930) [ 32.302452] [ 32.302584] The buggy address belongs to the physical page: [ 32.302682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb [ 32.302744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.303031] page_type: f5(slab) [ 32.303257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.303616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.303827] page dumped because: kasan: bad access detected [ 32.303965] [ 32.304044] Memory state around the buggy address: [ 32.304125] fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.304385] fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.304561] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.304733] ^ [ 32.304801] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.304882] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.304924] ================================================================== [ 32.035785] ================================================================== [ 32.035871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 32.038380] kasan_save_track+0x20/0x40 [ 32.038981] [ 32.040012] page dumped because: kasan: bad access detected [ 32.041252] fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.041318] fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.041462] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 31.814917] ================================================================== [ 31.814994] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 31.815091] Read of size 1 at addr ffff800080bf7c2a by task kunit_try_catch/280 [ 31.815172] [ 31.815205] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.815303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.815360] Hardware name: linux,dummy-virt (DT) [ 31.815394] Call trace: [ 31.815420] show_stack+0x20/0x38 (C) [ 31.815473] dump_stack_lvl+0x8c/0xd0 [ 31.815615] print_report+0x310/0x5d0 [ 31.815666] kasan_report+0xdc/0x128 [ 31.815712] __asan_report_load1_noabort+0x20/0x30 [ 31.815790] kasan_stack_oob+0x238/0x270 [ 31.815865] kunit_try_run_case+0x170/0x3f0 [ 31.815930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.816002] kthread+0x328/0x630 [ 31.816045] ret_from_fork+0x10/0x20 [ 31.816153] [ 31.816244] The buggy address belongs to stack of task kunit_try_catch/280 [ 31.816401] and is located at offset 138 in frame: [ 31.816450] kasan_stack_oob+0x0/0x270 [ 31.816733] [ 31.816766] This frame has 4 objects: [ 31.816853] [48, 49) '__assertion' [ 31.817181] [64, 72) 'array' [ 31.817223] [96, 112) '__assertion' [ 31.817375] [128, 138) 'stack_array' [ 31.817527] [ 31.817579] The buggy address ffff800080bf7c2a belongs to a vmalloc virtual mapping [ 31.817627] The buggy address belongs to the physical page: [ 31.817684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b35 [ 31.817856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.817920] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.818038] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.818189] page dumped because: kasan: bad access detected [ 31.818671] ^ [ 31.823526] [ 31.823701] Call trace: [ 31.825223] The buggy address belongs to the physical page: [ 31.826131] ^ [ 31.832461] Read of size 1 at addr ffff800080c17b4a by task kunit_try_catch/284 [ 31.833812] kthread+0x328/0x630 [ 31.835301] [ 31.835559] ^ [ 31.851660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 31.800222] ================================================================== [ 31.800284] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 31.800338] Read of size 1 at addr ffffad48ba17b70d by task kunit_try_catch/276 [ 31.800609] [ 31.800696] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.800826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.800911] Hardware name: linux,dummy-virt (DT) [ 31.801001] Call trace: [ 31.801050] show_stack+0x20/0x38 (C) [ 31.801179] dump_stack_lvl+0x8c/0xd0 [ 31.801228] print_report+0x310/0x5d0 [ 31.801385] kasan_report+0xdc/0x128 [ 31.801433] __asan_report_load1_noabort+0x20/0x30 [ 31.801483] kasan_global_oob_right+0x230/0x270 [ 31.801535] kunit_try_run_case+0x170/0x3f0 [ 31.801584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.801740] kthread+0x328/0x630 [ 31.801825] ret_from_fork+0x10/0x20 [ 31.801966] [ 31.802076] The buggy address belongs to the variable: [ 31.802153] global_array+0xd/0x40 [ 31.802217] [ 31.802296] The buggy address ffffad48ba17b70d belongs to a vmalloc virtual mapping [ 31.802419] The buggy address belongs to the physical page: [ 31.802453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d7b [ 31.802508] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 31.802577] raw: 03fffe0000002000 ffffc1ffc01f5ec8 ffffc1ffc01f5ec8 0000000000000000 [ 31.802772] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.802884] page dumped because: kasan: bad access detected [ 31.802934] [ 31.802954] Memory state around the buggy address: [ 31.802988] ffffad48ba17b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.803044] ffffad48ba17b680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 31.803194] >ffffad48ba17b700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 31.803234] ^ [ 31.803265] ffffad48ba17b780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 31.803361] ffffad48ba17b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.803499] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 31.791818] ================================================================== [ 31.791878] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.791932] Free of addr fff00000c9bd4001 by task kunit_try_catch/274 [ 31.791974] [ 31.792002] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.792386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.792454] Hardware name: linux,dummy-virt (DT) [ 31.792484] Call trace: [ 31.792505] show_stack+0x20/0x38 (C) [ 31.792557] dump_stack_lvl+0x8c/0xd0 [ 31.792604] print_report+0x118/0x5d0 [ 31.792702] kasan_report_invalid_free+0xc0/0xe8 [ 31.792922] __kasan_mempool_poison_object+0xfc/0x150 [ 31.793065] mempool_free+0x28c/0x328 [ 31.793150] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.793453] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 31.793507] kunit_try_run_case+0x170/0x3f0 [ 31.793554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.793605] kthread+0x328/0x630 [ 31.793709] ret_from_fork+0x10/0x20 [ 31.793759] [ 31.793827] The buggy address belongs to the physical page: [ 31.793897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4 [ 31.793958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.794101] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.794181] page_type: f8(unknown) [ 31.794255] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.794369] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.794441] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.794491] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.794542] head: 0bfffe0000000002 ffffc1ffc326f501 00000000ffffffff 00000000ffffffff [ 31.794631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.794675] page dumped because: kasan: bad access detected [ 31.794708] [ 31.794728] Memory state around the buggy address: [ 31.794787] fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.794851] fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.794913] >fff00000c9bd4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.795011] ^ [ 31.795063] fff00000c9bd4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.795131] fff00000c9bd4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.795230] ================================================================== [ 31.781556] ================================================================== [ 31.781612] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.781666] Free of addr fff00000c98f2901 by task kunit_try_catch/272 [ 31.781705] [ 31.781755] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.781861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.781889] Hardware name: linux,dummy-virt (DT) [ 31.781925] Call trace: [ 31.781948] show_stack+0x20/0x38 (C) [ 31.782005] dump_stack_lvl+0x8c/0xd0 [ 31.782067] print_report+0x118/0x5d0 [ 31.782113] kasan_report_invalid_free+0xc0/0xe8 [ 31.782171] check_slab_allocation+0xfc/0x108 [ 31.782218] __kasan_mempool_poison_object+0x78/0x150 [ 31.782276] mempool_free+0x28c/0x328 [ 31.782329] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.782390] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.782451] kunit_try_run_case+0x170/0x3f0 [ 31.782499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.782549] kthread+0x328/0x630 [ 31.782591] ret_from_fork+0x10/0x20 [ 31.782637] [ 31.782664] Allocated by task 272: [ 31.782703] kasan_save_stack+0x3c/0x68 [ 31.782740] kasan_save_track+0x20/0x40 [ 31.782797] kasan_save_alloc_info+0x40/0x58 [ 31.782835] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.782875] remove_element+0x130/0x1f8 [ 31.782910] mempool_alloc_preallocated+0x58/0xc0 [ 31.782950] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 31.782992] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.783033] kunit_try_run_case+0x170/0x3f0 [ 31.783078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.783121] kthread+0x328/0x630 [ 31.783152] ret_from_fork+0x10/0x20 [ 31.783187] [ 31.783206] The buggy address belongs to the object at fff00000c98f2900 [ 31.783206] which belongs to the cache kmalloc-128 of size 128 [ 31.783264] The buggy address is located 1 bytes inside of [ 31.783264] 128-byte region [fff00000c98f2900, fff00000c98f2980) [ 31.783322] [ 31.783342] The buggy address belongs to the physical page: [ 31.783370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 31.783420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.783466] page_type: f5(slab) [ 31.783957] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.784018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.784121] page dumped because: kasan: bad access detected [ 31.784169] [ 31.784187] Memory state around the buggy address: [ 31.784225] fff00000c98f2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.784326] fff00000c98f2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.784368] >fff00000c98f2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.784440] ^ [ 31.784468] fff00000c98f2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.784512] fff00000c98f2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.784552] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 31.755593] ================================================================== [ 31.755653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.756010] Free of addr fff00000c9bd4000 by task kunit_try_catch/268 [ 31.756306] [ 31.756347] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.756673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.756836] Hardware name: linux,dummy-virt (DT) [ 31.756868] Call trace: [ 31.756969] show_stack+0x20/0x38 (C) [ 31.757229] dump_stack_lvl+0x8c/0xd0 [ 31.757322] print_report+0x118/0x5d0 [ 31.757687] kasan_report_invalid_free+0xc0/0xe8 [ 31.757884] __kasan_mempool_poison_object+0x14c/0x150 [ 31.757972] mempool_free+0x28c/0x328 [ 31.758343] mempool_double_free_helper+0x150/0x2e8 [ 31.758455] mempool_kmalloc_large_double_free+0xc0/0x118 [ 31.758549] kunit_try_run_case+0x170/0x3f0 [ 31.758937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.759049] kthread+0x328/0x630 [ 31.759177] ret_from_fork+0x10/0x20 [ 31.759268] [ 31.759581] The buggy address belongs to the physical page: [ 31.759648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4 [ 31.759706] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.760045] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.760246] page_type: f8(unknown) [ 31.760307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.760784] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.760844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.762123] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.762183] head: 0bfffe0000000002 ffffc1ffc326f501 00000000ffffffff 00000000ffffffff [ 31.762233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.762275] page dumped because: kasan: bad access detected [ 31.762305] [ 31.762325] Memory state around the buggy address: [ 31.762357] fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.762401] fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.762443] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.762481] ^ [ 31.762509] fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.762550] fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.762588] ================================================================== [ 31.736412] ================================================================== [ 31.736641] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.737382] Free of addr fff00000c98f2500 by task kunit_try_catch/266 [ 31.737484] [ 31.737786] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.737887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.737938] Hardware name: linux,dummy-virt (DT) [ 31.738114] Call trace: [ 31.738203] show_stack+0x20/0x38 (C) [ 31.738376] dump_stack_lvl+0x8c/0xd0 [ 31.738432] print_report+0x118/0x5d0 [ 31.738502] kasan_report_invalid_free+0xc0/0xe8 [ 31.738597] check_slab_allocation+0xd4/0x108 [ 31.738661] __kasan_mempool_poison_object+0x78/0x150 [ 31.738711] mempool_free+0x28c/0x328 [ 31.738763] mempool_double_free_helper+0x150/0x2e8 [ 31.738818] mempool_kmalloc_double_free+0xc0/0x118 [ 31.738868] kunit_try_run_case+0x170/0x3f0 [ 31.738916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.738970] kthread+0x328/0x630 [ 31.739013] ret_from_fork+0x10/0x20 [ 31.739088] [ 31.739117] Allocated by task 266: [ 31.739164] kasan_save_stack+0x3c/0x68 [ 31.739215] kasan_save_track+0x20/0x40 [ 31.739251] kasan_save_alloc_info+0x40/0x58 [ 31.739289] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.739329] remove_element+0x130/0x1f8 [ 31.739366] mempool_alloc_preallocated+0x58/0xc0 [ 31.739409] mempool_double_free_helper+0x94/0x2e8 [ 31.739450] mempool_kmalloc_double_free+0xc0/0x118 [ 31.739491] kunit_try_run_case+0x170/0x3f0 [ 31.739529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.739582] kthread+0x328/0x630 [ 31.739613] ret_from_fork+0x10/0x20 [ 31.739659] [ 31.739693] Freed by task 266: [ 31.739727] kasan_save_stack+0x3c/0x68 [ 31.739770] kasan_save_track+0x20/0x40 [ 31.739820] kasan_save_free_info+0x4c/0x78 [ 31.739857] __kasan_mempool_poison_object+0xc0/0x150 [ 31.739906] mempool_free+0x28c/0x328 [ 31.739942] mempool_double_free_helper+0x100/0x2e8 [ 31.739984] mempool_kmalloc_double_free+0xc0/0x118 [ 31.740024] kunit_try_run_case+0x170/0x3f0 [ 31.740793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.740872] kthread+0x328/0x630 [ 31.740925] ret_from_fork+0x10/0x20 [ 31.741345] [ 31.741396] The buggy address belongs to the object at fff00000c98f2500 [ 31.741396] which belongs to the cache kmalloc-128 of size 128 [ 31.741462] The buggy address is located 0 bytes inside of [ 31.741462] 128-byte region [fff00000c98f2500, fff00000c98f2580) [ 31.741592] [ 31.742014] The buggy address belongs to the physical page: [ 31.742548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 31.742811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.743070] page_type: f5(slab) [ 31.743211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.743787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.743862] page dumped because: kasan: bad access detected [ 31.744205] [ 31.744262] Memory state around the buggy address: [ 31.744316] fff00000c98f2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.744515] fff00000c98f2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.744579] >fff00000c98f2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.744695] ^ [ 31.744727] fff00000c98f2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.744790] fff00000c98f2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.745128] ================================================================== [ 31.773403] ================================================================== [ 31.773464] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.773520] Free of addr fff00000c9bd4000 by task kunit_try_catch/270 [ 31.773561] [ 31.773593] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.773676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.773703] Hardware name: linux,dummy-virt (DT) [ 31.773786] Call trace: [ 31.773810] show_stack+0x20/0x38 (C) [ 31.773860] dump_stack_lvl+0x8c/0xd0 [ 31.773916] print_report+0x118/0x5d0 [ 31.773972] kasan_report_invalid_free+0xc0/0xe8 [ 31.774032] __kasan_mempool_poison_pages+0xe0/0xe8 [ 31.774104] mempool_free+0x24c/0x328 [ 31.774226] mempool_double_free_helper+0x150/0x2e8 [ 31.774278] mempool_page_alloc_double_free+0xbc/0x118 [ 31.774367] kunit_try_run_case+0x170/0x3f0 [ 31.774422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.774475] kthread+0x328/0x630 [ 31.774523] ret_from_fork+0x10/0x20 [ 31.774573] [ 31.774593] The buggy address belongs to the physical page: [ 31.774764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4 [ 31.774827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.774902] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.774969] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.775012] page dumped because: kasan: bad access detected [ 31.775113] [ 31.775131] Memory state around the buggy address: [ 31.775189] fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.775233] fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.775275] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.775312] ^ [ 31.775339] fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.775505] fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.775548] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 31.722641] ================================================================== [ 31.722978] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.723179] Read of size 1 at addr fff00000c9bd4000 by task kunit_try_catch/264 [ 31.723324] [ 31.723408] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.723499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.723783] Hardware name: linux,dummy-virt (DT) [ 31.723912] Call trace: [ 31.723942] show_stack+0x20/0x38 (C) [ 31.723999] dump_stack_lvl+0x8c/0xd0 [ 31.724192] print_report+0x118/0x5d0 [ 31.724254] kasan_report+0xdc/0x128 [ 31.724298] __asan_report_load1_noabort+0x20/0x30 [ 31.724534] mempool_uaf_helper+0x314/0x340 [ 31.724660] mempool_page_alloc_uaf+0xc0/0x118 [ 31.724813] kunit_try_run_case+0x170/0x3f0 [ 31.724929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.724985] kthread+0x328/0x630 [ 31.725362] ret_from_fork+0x10/0x20 [ 31.725638] [ 31.725696] The buggy address belongs to the physical page: [ 31.725830] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4 [ 31.725916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.726040] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.726435] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.726555] page dumped because: kasan: bad access detected [ 31.726658] [ 31.726694] Memory state around the buggy address: [ 31.726741] fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.726817] fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.726860] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.726897] ^ [ 31.726925] fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.726976] fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.727014] ================================================================== [ 31.662738] ================================================================== [ 31.662804] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.662857] Read of size 1 at addr fff00000c9bd0000 by task kunit_try_catch/260 [ 31.662905] [ 31.662934] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.663020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.663048] Hardware name: linux,dummy-virt (DT) [ 31.663096] Call trace: [ 31.663117] show_stack+0x20/0x38 (C) [ 31.663167] dump_stack_lvl+0x8c/0xd0 [ 31.663217] print_report+0x118/0x5d0 [ 31.663261] kasan_report+0xdc/0x128 [ 31.663304] __asan_report_load1_noabort+0x20/0x30 [ 31.663351] mempool_uaf_helper+0x314/0x340 [ 31.663398] mempool_kmalloc_large_uaf+0xc4/0x120 [ 31.663465] kunit_try_run_case+0x170/0x3f0 [ 31.663527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.663579] kthread+0x328/0x630 [ 31.663620] ret_from_fork+0x10/0x20 [ 31.663665] [ 31.663702] The buggy address belongs to the physical page: [ 31.663739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd0 [ 31.663791] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.663845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.663898] page_type: f8(unknown) [ 31.663950] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.663999] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.664050] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.664869] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.664950] head: 0bfffe0000000002 ffffc1ffc326f401 00000000ffffffff 00000000ffffffff [ 31.665033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.665085] page dumped because: kasan: bad access detected [ 31.665117] [ 31.665136] Memory state around the buggy address: [ 31.665464] fff00000c9bcff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.665725] fff00000c9bcff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.665884] >fff00000c9bd0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.666334] ^ [ 31.666403] fff00000c9bd0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.666869] fff00000c9bd0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.667226] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 31.642683] ================================================================== [ 31.642779] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.642855] Read of size 1 at addr fff00000c98f2100 by task kunit_try_catch/258 [ 31.642916] [ 31.642989] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.643100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.643140] Hardware name: linux,dummy-virt (DT) [ 31.643173] Call trace: [ 31.643208] show_stack+0x20/0x38 (C) [ 31.643258] dump_stack_lvl+0x8c/0xd0 [ 31.643319] print_report+0x118/0x5d0 [ 31.643375] kasan_report+0xdc/0x128 [ 31.643419] __asan_report_load1_noabort+0x20/0x30 [ 31.643480] mempool_uaf_helper+0x314/0x340 [ 31.643539] mempool_kmalloc_uaf+0xc4/0x120 [ 31.643605] kunit_try_run_case+0x170/0x3f0 [ 31.643667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.643731] kthread+0x328/0x630 [ 31.643786] ret_from_fork+0x10/0x20 [ 31.643845] [ 31.643874] Allocated by task 258: [ 31.643923] kasan_save_stack+0x3c/0x68 [ 31.643961] kasan_save_track+0x20/0x40 [ 31.644008] kasan_save_alloc_info+0x40/0x58 [ 31.644046] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.644199] remove_element+0x130/0x1f8 [ 31.644242] mempool_alloc_preallocated+0x58/0xc0 [ 31.645020] mempool_uaf_helper+0xa4/0x340 [ 31.645108] mempool_kmalloc_uaf+0xc4/0x120 [ 31.645189] kunit_try_run_case+0x170/0x3f0 [ 31.645230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.645561] kthread+0x328/0x630 [ 31.645762] ret_from_fork+0x10/0x20 [ 31.646032] [ 31.646472] Freed by task 258: [ 31.646533] kasan_save_stack+0x3c/0x68 [ 31.646745] kasan_save_track+0x20/0x40 [ 31.646825] kasan_save_free_info+0x4c/0x78 [ 31.646990] __kasan_mempool_poison_object+0xc0/0x150 [ 31.647160] mempool_free+0x28c/0x328 [ 31.647202] mempool_uaf_helper+0x104/0x340 [ 31.647403] mempool_kmalloc_uaf+0xc4/0x120 [ 31.647566] kunit_try_run_case+0x170/0x3f0 [ 31.647749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.647838] kthread+0x328/0x630 [ 31.648081] ret_from_fork+0x10/0x20 [ 31.648222] [ 31.648426] The buggy address belongs to the object at fff00000c98f2100 [ 31.648426] which belongs to the cache kmalloc-128 of size 128 [ 31.648503] The buggy address is located 0 bytes inside of [ 31.648503] freed 128-byte region [fff00000c98f2100, fff00000c98f2180) [ 31.648731] [ 31.649220] The buggy address belongs to the physical page: [ 31.649272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2 [ 31.649463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.649652] page_type: f5(slab) [ 31.649758] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.649838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.650073] page dumped because: kasan: bad access detected [ 31.650191] [ 31.650289] Memory state around the buggy address: [ 31.650325] fff00000c98f2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.650749] fff00000c98f2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.650810] >fff00000c98f2100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.650974] ^ [ 31.651404] fff00000c98f2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.651510] fff00000c98f2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.651611] ================================================================== [ 31.683025] ================================================================== [ 31.683535] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.683638] Read of size 1 at addr fff00000c98df240 by task kunit_try_catch/262 [ 31.684031] [ 31.684084] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.684291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.684329] Hardware name: linux,dummy-virt (DT) [ 31.684712] Call trace: [ 31.685165] show_stack+0x20/0x38 (C) [ 31.685240] dump_stack_lvl+0x8c/0xd0 [ 31.685331] print_report+0x118/0x5d0 [ 31.685533] kasan_report+0xdc/0x128 [ 31.685833] __asan_report_load1_noabort+0x20/0x30 [ 31.686092] mempool_uaf_helper+0x314/0x340 [ 31.686255] mempool_slab_uaf+0xc0/0x118 [ 31.686343] kunit_try_run_case+0x170/0x3f0 [ 31.686403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.686463] kthread+0x328/0x630 [ 31.686509] ret_from_fork+0x10/0x20 [ 31.686556] [ 31.686577] Allocated by task 262: [ 31.686605] kasan_save_stack+0x3c/0x68 [ 31.686645] kasan_save_track+0x20/0x40 [ 31.686693] kasan_save_alloc_info+0x40/0x58 [ 31.686740] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.686790] remove_element+0x16c/0x1f8 [ 31.686828] mempool_alloc_preallocated+0x58/0xc0 [ 31.686879] mempool_uaf_helper+0xa4/0x340 [ 31.686925] mempool_slab_uaf+0xc0/0x118 [ 31.686971] kunit_try_run_case+0x170/0x3f0 [ 31.687028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.687091] kthread+0x328/0x630 [ 31.687134] ret_from_fork+0x10/0x20 [ 31.687168] [ 31.687189] Freed by task 262: [ 31.687225] kasan_save_stack+0x3c/0x68 [ 31.687261] kasan_save_track+0x20/0x40 [ 31.687302] kasan_save_free_info+0x4c/0x78 [ 31.687354] __kasan_mempool_poison_object+0xc0/0x150 [ 31.687395] mempool_free+0x28c/0x328 [ 31.687438] mempool_uaf_helper+0x104/0x340 [ 31.687482] mempool_slab_uaf+0xc0/0x118 [ 31.687527] kunit_try_run_case+0x170/0x3f0 [ 31.687565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.687614] kthread+0x328/0x630 [ 31.687661] ret_from_fork+0x10/0x20 [ 31.687698] [ 31.687719] The buggy address belongs to the object at fff00000c98df240 [ 31.687719] which belongs to the cache test_cache of size 123 [ 31.687784] The buggy address is located 0 bytes inside of [ 31.687784] freed 123-byte region [fff00000c98df240, fff00000c98df2bb) [ 31.687855] [ 31.687876] The buggy address belongs to the physical page: [ 31.687915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098df [ 31.687969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.688018] page_type: f5(slab) [ 31.688066] raw: 0bfffe0000000000 fff00000c3f2ddc0 dead000000000122 0000000000000000 [ 31.688322] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.688682] page dumped because: kasan: bad access detected [ 31.688724] [ 31.688766] Memory state around the buggy address: [ 31.689381] fff00000c98df100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.689754] fff00000c98df180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.690094] >fff00000c98df200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 31.690337] ^ [ 31.690542] fff00000c98df280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.690702] fff00000c98df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.690743] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 31.607403] ================================================================== [ 31.607465] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.607521] Read of size 1 at addr fff00000c99f02bb by task kunit_try_catch/256 [ 31.607571] [ 31.607604] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.607693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.607721] Hardware name: linux,dummy-virt (DT) [ 31.607752] Call trace: [ 31.607776] show_stack+0x20/0x38 (C) [ 31.607844] dump_stack_lvl+0x8c/0xd0 [ 31.607897] print_report+0x118/0x5d0 [ 31.607942] kasan_report+0xdc/0x128 [ 31.607985] __asan_report_load1_noabort+0x20/0x30 [ 31.608065] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.608828] mempool_slab_oob_right+0xc0/0x118 [ 31.609037] kunit_try_run_case+0x170/0x3f0 [ 31.609299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.609477] kthread+0x328/0x630 [ 31.609557] ret_from_fork+0x10/0x20 [ 31.609706] [ 31.609855] Allocated by task 256: [ 31.609885] kasan_save_stack+0x3c/0x68 [ 31.610077] kasan_save_track+0x20/0x40 [ 31.610217] kasan_save_alloc_info+0x40/0x58 [ 31.610322] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.610448] remove_element+0x16c/0x1f8 [ 31.610533] mempool_alloc_preallocated+0x58/0xc0 [ 31.610719] mempool_oob_right_helper+0x98/0x2f0 [ 31.610838] mempool_slab_oob_right+0xc0/0x118 [ 31.610974] kunit_try_run_case+0x170/0x3f0 [ 31.611268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.611420] kthread+0x328/0x630 [ 31.611575] ret_from_fork+0x10/0x20 [ 31.611716] [ 31.611766] The buggy address belongs to the object at fff00000c99f0240 [ 31.611766] which belongs to the cache test_cache of size 123 [ 31.611982] The buggy address is located 0 bytes to the right of [ 31.611982] allocated 123-byte region [fff00000c99f0240, fff00000c99f02bb) [ 31.612186] [ 31.612430] The buggy address belongs to the physical page: [ 31.612558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0 [ 31.612693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.612836] page_type: f5(slab) [ 31.612897] raw: 0bfffe0000000000 fff00000c3f2dc80 dead000000000122 0000000000000000 [ 31.612969] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.613173] page dumped because: kasan: bad access detected [ 31.613294] [ 31.613349] Memory state around the buggy address: [ 31.613529] fff00000c99f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.613652] fff00000c99f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 31.613723] >fff00000c99f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 31.613815] ^ [ 31.613878] fff00000c99f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.613953] fff00000c99f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.614119] ================================================================== [ 31.587938] ================================================================== [ 31.589379] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.589510] Read of size 1 at addr fff00000c9b86001 by task kunit_try_catch/254 [ 31.589566] [ 31.589597] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.589969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.590001] Hardware name: linux,dummy-virt (DT) [ 31.590163] Call trace: [ 31.590243] show_stack+0x20/0x38 (C) [ 31.590661] dump_stack_lvl+0x8c/0xd0 [ 31.591045] print_report+0x118/0x5d0 [ 31.591100] kasan_report+0xdc/0x128 [ 31.591635] __asan_report_load1_noabort+0x20/0x30 [ 31.591758] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.592005] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 31.592259] kunit_try_run_case+0x170/0x3f0 [ 31.592309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.592361] kthread+0x328/0x630 [ 31.592760] ret_from_fork+0x10/0x20 [ 31.593015] [ 31.593038] The buggy address belongs to the physical page: [ 31.593083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b84 [ 31.593483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.593752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.593865] page_type: f8(unknown) [ 31.594291] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.594563] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.594617] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.595008] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.595319] head: 0bfffe0000000002 ffffc1ffc326e101 00000000ffffffff 00000000ffffffff [ 31.595400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.595487] page dumped because: kasan: bad access detected [ 31.595539] [ 31.595612] Memory state around the buggy address: [ 31.595752] fff00000c9b85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.595880] fff00000c9b85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.595972] >fff00000c9b86000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.596097] ^ [ 31.596150] fff00000c9b86080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.596193] fff00000c9b86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.596461] ================================================================== [ 31.567014] ================================================================== [ 31.567100] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.567172] Read of size 1 at addr fff00000c3f63d73 by task kunit_try_catch/252 [ 31.567224] [ 31.567265] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.567355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.567381] Hardware name: linux,dummy-virt (DT) [ 31.567415] Call trace: [ 31.567439] show_stack+0x20/0x38 (C) [ 31.567492] dump_stack_lvl+0x8c/0xd0 [ 31.567544] print_report+0x118/0x5d0 [ 31.567587] kasan_report+0xdc/0x128 [ 31.567631] __asan_report_load1_noabort+0x20/0x30 [ 31.567679] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.567728] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.567779] kunit_try_run_case+0x170/0x3f0 [ 31.567830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.567882] kthread+0x328/0x630 [ 31.567924] ret_from_fork+0x10/0x20 [ 31.567971] [ 31.567991] Allocated by task 252: [ 31.568021] kasan_save_stack+0x3c/0x68 [ 31.568072] kasan_save_track+0x20/0x40 [ 31.568106] kasan_save_alloc_info+0x40/0x58 [ 31.568145] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.568186] remove_element+0x130/0x1f8 [ 31.568230] mempool_alloc_preallocated+0x58/0xc0 [ 31.568272] mempool_oob_right_helper+0x98/0x2f0 [ 31.568313] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.568354] kunit_try_run_case+0x170/0x3f0 [ 31.568417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.568460] kthread+0x328/0x630 [ 31.568492] ret_from_fork+0x10/0x20 [ 31.568528] [ 31.568550] The buggy address belongs to the object at fff00000c3f63d00 [ 31.568550] which belongs to the cache kmalloc-128 of size 128 [ 31.568609] The buggy address is located 0 bytes to the right of [ 31.568609] allocated 115-byte region [fff00000c3f63d00, fff00000c3f63d73) [ 31.568671] [ 31.568694] The buggy address belongs to the physical page: [ 31.568726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f63 [ 31.568784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.568836] page_type: f5(slab) [ 31.568879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.568930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.568971] page dumped because: kasan: bad access detected [ 31.569003] [ 31.569021] Memory state around the buggy address: [ 31.569069] fff00000c3f63c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.569113] fff00000c3f63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.569157] >fff00000c3f63d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.569196] ^ [ 31.569236] fff00000c3f63d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.569278] fff00000c3f63e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.569316] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.007415] ================================================================== [ 31.007489] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 31.007564] Read of size 1 at addr fff00000c3f2da00 by task kunit_try_catch/246 [ 31.007616] [ 31.007658] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.007749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.007774] Hardware name: linux,dummy-virt (DT) [ 31.007809] Call trace: [ 31.007835] show_stack+0x20/0x38 (C) [ 31.007888] dump_stack_lvl+0x8c/0xd0 [ 31.007943] print_report+0x118/0x5d0 [ 31.007990] kasan_report+0xdc/0x128 [ 31.008035] __kasan_check_byte+0x54/0x70 [ 31.008095] kmem_cache_destroy+0x34/0x218 [ 31.008146] kmem_cache_double_destroy+0x174/0x300 [ 31.008195] kunit_try_run_case+0x170/0x3f0 [ 31.008243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.008295] kthread+0x328/0x630 [ 31.008338] ret_from_fork+0x10/0x20 [ 31.008404] [ 31.008423] Allocated by task 246: [ 31.008453] kasan_save_stack+0x3c/0x68 [ 31.008493] kasan_save_track+0x20/0x40 [ 31.008528] kasan_save_alloc_info+0x40/0x58 [ 31.008567] __kasan_slab_alloc+0xa8/0xb0 [ 31.008603] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.008645] __kmem_cache_create_args+0x178/0x280 [ 31.008686] kmem_cache_double_destroy+0xc0/0x300 [ 31.008726] kunit_try_run_case+0x170/0x3f0 [ 31.008763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.008806] kthread+0x328/0x630 [ 31.008838] ret_from_fork+0x10/0x20 [ 31.008875] [ 31.008893] Freed by task 246: [ 31.008918] kasan_save_stack+0x3c/0x68 [ 31.008955] kasan_save_track+0x20/0x40 [ 31.008990] kasan_save_free_info+0x4c/0x78 [ 31.009027] __kasan_slab_free+0x6c/0x98 [ 31.009073] kmem_cache_free+0x260/0x468 [ 31.009113] slab_kmem_cache_release+0x38/0x50 [ 31.009154] kmem_cache_release+0x1c/0x30 [ 31.009190] kobject_put+0x17c/0x420 [ 31.009226] sysfs_slab_release+0x1c/0x30 [ 31.009262] kmem_cache_destroy+0x118/0x218 [ 31.009301] kmem_cache_double_destroy+0x128/0x300 [ 31.009341] kunit_try_run_case+0x170/0x3f0 [ 31.009377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.009419] kthread+0x328/0x630 [ 31.009451] ret_from_fork+0x10/0x20 [ 31.009487] [ 31.009507] The buggy address belongs to the object at fff00000c3f2da00 [ 31.009507] which belongs to the cache kmem_cache of size 208 [ 31.009567] The buggy address is located 0 bytes inside of [ 31.009567] freed 208-byte region [fff00000c3f2da00, fff00000c3f2dad0) [ 31.009627] [ 31.009649] The buggy address belongs to the physical page: [ 31.009685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f2d [ 31.009742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.009795] page_type: f5(slab) [ 31.009838] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 31.009888] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.009929] page dumped because: kasan: bad access detected [ 31.009961] [ 31.009978] Memory state around the buggy address: [ 31.010013] fff00000c3f2d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.010063] fff00000c3f2d980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.010107] >fff00000c3f2da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.010147] ^ [ 31.010173] fff00000c3f2da80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.010212] fff00000c3f2db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.010250] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 30.920918] ================================================================== [ 30.921024] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 30.921122] Read of size 1 at addr fff00000c9b29000 by task kunit_try_catch/244 [ 30.921174] [ 30.921217] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 30.921305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.921332] Hardware name: linux,dummy-virt (DT) [ 30.921367] Call trace: [ 30.921394] show_stack+0x20/0x38 (C) [ 30.921448] dump_stack_lvl+0x8c/0xd0 [ 30.921502] print_report+0x118/0x5d0 [ 30.921548] kasan_report+0xdc/0x128 [ 30.921592] __asan_report_load1_noabort+0x20/0x30 [ 30.921642] kmem_cache_rcu_uaf+0x388/0x468 [ 30.921690] kunit_try_run_case+0x170/0x3f0 [ 30.921740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.921793] kthread+0x328/0x630 [ 30.921838] ret_from_fork+0x10/0x20 [ 30.921889] [ 30.921907] Allocated by task 244: [ 30.921939] kasan_save_stack+0x3c/0x68 [ 30.921979] kasan_save_track+0x20/0x40 [ 30.922013] kasan_save_alloc_info+0x40/0x58 [ 30.922051] __kasan_slab_alloc+0xa8/0xb0 [ 30.922152] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.922197] kmem_cache_rcu_uaf+0x12c/0x468 [ 30.922235] kunit_try_run_case+0x170/0x3f0 [ 30.922272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.922315] kthread+0x328/0x630 [ 30.922348] ret_from_fork+0x10/0x20 [ 30.922385] [ 30.922405] Freed by task 0: [ 30.922431] kasan_save_stack+0x3c/0x68 [ 30.922468] kasan_save_track+0x20/0x40 [ 30.922501] kasan_save_free_info+0x4c/0x78 [ 30.922538] __kasan_slab_free+0x6c/0x98 [ 30.922572] slab_free_after_rcu_debug+0xd4/0x2f8 [ 30.922613] rcu_core+0x9f4/0x1e58 [ 30.922650] rcu_core_si+0x18/0x30 [ 30.922686] handle_softirqs+0x374/0xb28 [ 30.922725] __do_softirq+0x1c/0x28 [ 30.922757] [ 30.922790] Last potentially related work creation: [ 30.922815] kasan_save_stack+0x3c/0x68 [ 30.922852] kasan_record_aux_stack+0xb4/0xc8 [ 30.922889] kmem_cache_free+0x120/0x468 [ 30.922928] kmem_cache_rcu_uaf+0x16c/0x468 [ 30.922967] kunit_try_run_case+0x170/0x3f0 [ 30.923004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.923046] kthread+0x328/0x630 [ 30.923091] ret_from_fork+0x10/0x20 [ 30.923125] [ 30.923143] The buggy address belongs to the object at fff00000c9b29000 [ 30.923143] which belongs to the cache test_cache of size 200 [ 30.923203] The buggy address is located 0 bytes inside of [ 30.923203] freed 200-byte region [fff00000c9b29000, fff00000c9b290c8) [ 30.923265] [ 30.923294] The buggy address belongs to the physical page: [ 30.923329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b29 [ 30.923388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.923441] page_type: f5(slab) [ 30.923485] raw: 0bfffe0000000000 fff00000c5817500 dead000000000122 0000000000000000 [ 30.923536] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.923577] page dumped because: kasan: bad access detected [ 30.923609] [ 30.923628] Memory state around the buggy address: [ 30.923662] fff00000c9b28f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.923706] fff00000c9b28f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.923749] >fff00000c9b29000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.923788] ^ [ 30.923816] fff00000c9b29080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.923858] fff00000c9b29100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.923897] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 30.423644] ================================================================== [ 30.423938] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 30.424413] Free of addr fff00000c9b27001 by task kunit_try_catch/242 [ 30.424478] [ 30.424658] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 30.424754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.424780] Hardware name: linux,dummy-virt (DT) [ 30.424814] Call trace: [ 30.424838] show_stack+0x20/0x38 (C) [ 30.424892] dump_stack_lvl+0x8c/0xd0 [ 30.424945] print_report+0x118/0x5d0 [ 30.424988] kasan_report_invalid_free+0xc0/0xe8 [ 30.425036] check_slab_allocation+0xfc/0x108 [ 30.426437] __kasan_slab_pre_free+0x2c/0x48 [ 30.426557] kmem_cache_free+0xf0/0x468 [ 30.426610] kmem_cache_invalid_free+0x184/0x3c8 [ 30.426660] kunit_try_run_case+0x170/0x3f0 [ 30.426746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.426852] kthread+0x328/0x630 [ 30.426997] ret_from_fork+0x10/0x20 [ 30.427078] [ 30.427099] Allocated by task 242: [ 30.427129] kasan_save_stack+0x3c/0x68 [ 30.427553] kasan_save_track+0x20/0x40 [ 30.428076] kasan_save_alloc_info+0x40/0x58 [ 30.428125] __kasan_slab_alloc+0xa8/0xb0 [ 30.428162] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.428203] kmem_cache_invalid_free+0x12c/0x3c8 [ 30.428244] kunit_try_run_case+0x170/0x3f0 [ 30.428282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.428332] kthread+0x328/0x630 [ 30.428492] ret_from_fork+0x10/0x20 [ 30.428559] [ 30.428579] The buggy address belongs to the object at fff00000c9b27000 [ 30.428579] which belongs to the cache test_cache of size 200 [ 30.428655] The buggy address is located 1 bytes inside of [ 30.428655] 200-byte region [fff00000c9b27000, fff00000c9b270c8) [ 30.428717] [ 30.428739] The buggy address belongs to the physical page: [ 30.428824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b27 [ 30.429239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.429330] page_type: f5(slab) [ 30.429714] raw: 0bfffe0000000000 fff00000c58173c0 dead000000000122 0000000000000000 [ 30.429869] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.429913] page dumped because: kasan: bad access detected [ 30.429944] [ 30.429963] Memory state around the buggy address: [ 30.430284] fff00000c9b26f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.430342] fff00000c9b26f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.430658] >fff00000c9b27000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.430719] ^ [ 30.430748] fff00000c9b27080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.430847] fff00000c9b27100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.430886] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 30.372910] ================================================================== [ 30.373093] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 30.373370] Free of addr fff00000c9b25000 by task kunit_try_catch/240 [ 30.373478] [ 30.373669] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 30.373764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.373789] Hardware name: linux,dummy-virt (DT) [ 30.373823] Call trace: [ 30.373847] show_stack+0x20/0x38 (C) [ 30.373907] dump_stack_lvl+0x8c/0xd0 [ 30.374105] print_report+0x118/0x5d0 [ 30.374209] kasan_report_invalid_free+0xc0/0xe8 [ 30.374434] check_slab_allocation+0xd4/0x108 [ 30.374607] __kasan_slab_pre_free+0x2c/0x48 [ 30.374704] kmem_cache_free+0xf0/0x468 [ 30.374928] kmem_cache_double_free+0x190/0x3c8 [ 30.375029] kunit_try_run_case+0x170/0x3f0 [ 30.375383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.375499] kthread+0x328/0x630 [ 30.375562] ret_from_fork+0x10/0x20 [ 30.375938] [ 30.375978] Allocated by task 240: [ 30.376013] kasan_save_stack+0x3c/0x68 [ 30.376262] kasan_save_track+0x20/0x40 [ 30.376462] kasan_save_alloc_info+0x40/0x58 [ 30.376685] __kasan_slab_alloc+0xa8/0xb0 [ 30.376722] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.376765] kmem_cache_double_free+0x12c/0x3c8 [ 30.376805] kunit_try_run_case+0x170/0x3f0 [ 30.376842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.376884] kthread+0x328/0x630 [ 30.376916] ret_from_fork+0x10/0x20 [ 30.377580] [ 30.377701] Freed by task 240: [ 30.377777] kasan_save_stack+0x3c/0x68 [ 30.377834] kasan_save_track+0x20/0x40 [ 30.377886] kasan_save_free_info+0x4c/0x78 [ 30.377928] __kasan_slab_free+0x6c/0x98 [ 30.378069] kmem_cache_free+0x260/0x468 [ 30.378148] kmem_cache_double_free+0x140/0x3c8 [ 30.378201] kunit_try_run_case+0x170/0x3f0 [ 30.378238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.378590] kthread+0x328/0x630 [ 30.378714] ret_from_fork+0x10/0x20 [ 30.378751] [ 30.378775] The buggy address belongs to the object at fff00000c9b25000 [ 30.378775] which belongs to the cache test_cache of size 200 [ 30.378848] The buggy address is located 0 bytes inside of [ 30.378848] 200-byte region [fff00000c9b25000, fff00000c9b250c8) [ 30.378983] [ 30.379005] The buggy address belongs to the physical page: [ 30.379040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b25 [ 30.379197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.379477] page_type: f5(slab) [ 30.379530] raw: 0bfffe0000000000 fff00000c5817280 dead000000000122 0000000000000000 [ 30.379816] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.379951] page dumped because: kasan: bad access detected [ 30.379997] [ 30.380014] Memory state around the buggy address: [ 30.380067] fff00000c9b24f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.380110] fff00000c9b24f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.380194] >fff00000c9b25000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.380298] ^ [ 30.380529] fff00000c9b25080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.380687] fff00000c9b25100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.380725] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 30.084027] ================================================================== [ 30.085027] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 30.085160] Read of size 1 at addr fff00000c9ace0c8 by task kunit_try_catch/238 [ 30.085213] [ 30.085250] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 30.085337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.085364] Hardware name: linux,dummy-virt (DT) [ 30.085398] Call trace: [ 30.085517] show_stack+0x20/0x38 (C) [ 30.085608] dump_stack_lvl+0x8c/0xd0 [ 30.086235] print_report+0x118/0x5d0 [ 30.086312] kasan_report+0xdc/0x128 [ 30.087006] __asan_report_load1_noabort+0x20/0x30 [ 30.087625] kmem_cache_oob+0x344/0x430 [ 30.087730] kunit_try_run_case+0x170/0x3f0 [ 30.088414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.088638] kthread+0x328/0x630 [ 30.088685] ret_from_fork+0x10/0x20 [ 30.088735] [ 30.088754] Allocated by task 238: [ 30.088783] kasan_save_stack+0x3c/0x68 [ 30.089049] kasan_save_track+0x20/0x40 [ 30.089193] kasan_save_alloc_info+0x40/0x58 [ 30.089545] __kasan_slab_alloc+0xa8/0xb0 [ 30.089624] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.089670] kmem_cache_oob+0x12c/0x430 [ 30.090243] kunit_try_run_case+0x170/0x3f0 [ 30.090622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.090695] kthread+0x328/0x630 [ 30.091110] ret_from_fork+0x10/0x20 [ 30.091152] [ 30.091427] The buggy address belongs to the object at fff00000c9ace000 [ 30.091427] which belongs to the cache test_cache of size 200 [ 30.091823] The buggy address is located 0 bytes to the right of [ 30.091823] allocated 200-byte region [fff00000c9ace000, fff00000c9ace0c8) [ 30.092024] [ 30.092048] The buggy address belongs to the physical page: [ 30.092401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ace [ 30.092504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.092563] page_type: f5(slab) [ 30.092842] raw: 0bfffe0000000000 fff00000c5817140 dead000000000122 0000000000000000 [ 30.093049] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.093389] page dumped because: kasan: bad access detected [ 30.093426] [ 30.093691] Memory state around the buggy address: [ 30.094228] fff00000c9acdf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.094468] fff00000c9ace000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.094731] >fff00000c9ace080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.094778] ^ [ 30.095320] fff00000c9ace100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.095631] fff00000c9ace180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.095679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 30.022691] ================================================================== [ 30.022765] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 30.022837] Read of size 8 at addr fff00000c9ab5b00 by task kunit_try_catch/231 [ 30.022889] [ 30.022925] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 30.023015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.023370] Hardware name: linux,dummy-virt (DT) [ 30.023750] Call trace: [ 30.024220] show_stack+0x20/0x38 (C) [ 30.024446] dump_stack_lvl+0x8c/0xd0 [ 30.024498] print_report+0x118/0x5d0 [ 30.024550] kasan_report+0xdc/0x128 [ 30.024947] __asan_report_load8_noabort+0x20/0x30 [ 30.025305] workqueue_uaf+0x480/0x4a8 [ 30.025368] kunit_try_run_case+0x170/0x3f0 [ 30.025419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.025888] kthread+0x328/0x630 [ 30.026159] ret_from_fork+0x10/0x20 [ 30.026212] [ 30.026588] Allocated by task 231: [ 30.026635] kasan_save_stack+0x3c/0x68 [ 30.026680] kasan_save_track+0x20/0x40 [ 30.026715] kasan_save_alloc_info+0x40/0x58 [ 30.026752] __kasan_kmalloc+0xd4/0xd8 [ 30.026794] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.026836] workqueue_uaf+0x13c/0x4a8 [ 30.027550] kunit_try_run_case+0x170/0x3f0 [ 30.027809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.028171] kthread+0x328/0x630 [ 30.028351] ret_from_fork+0x10/0x20 [ 30.028462] [ 30.028494] Freed by task 75: [ 30.028521] kasan_save_stack+0x3c/0x68 [ 30.028665] kasan_save_track+0x20/0x40 [ 30.028706] kasan_save_free_info+0x4c/0x78 [ 30.028745] __kasan_slab_free+0x6c/0x98 [ 30.028890] kfree+0x214/0x3c8 [ 30.028927] workqueue_uaf_work+0x18/0x30 [ 30.028965] process_one_work+0x530/0xf88 [ 30.029005] worker_thread+0x618/0xf38 [ 30.029041] kthread+0x328/0x630 [ 30.029086] ret_from_fork+0x10/0x20 [ 30.029120] [ 30.029140] Last potentially related work creation: [ 30.029167] kasan_save_stack+0x3c/0x68 [ 30.030017] kasan_record_aux_stack+0xb4/0xc8 [ 30.030084] __queue_work+0x65c/0xfe0 [ 30.030123] queue_work_on+0xbc/0xf8 [ 30.030164] workqueue_uaf+0x210/0x4a8 [ 30.030202] kunit_try_run_case+0x170/0x3f0 [ 30.030511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.030766] kthread+0x328/0x630 [ 30.030984] ret_from_fork+0x10/0x20 [ 30.031023] [ 30.031043] The buggy address belongs to the object at fff00000c9ab5b00 [ 30.031043] which belongs to the cache kmalloc-32 of size 32 [ 30.031508] The buggy address is located 0 bytes inside of [ 30.031508] freed 32-byte region [fff00000c9ab5b00, fff00000c9ab5b20) [ 30.031576] [ 30.031599] The buggy address belongs to the physical page: [ 30.031854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ab5 [ 30.032072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.032220] page_type: f5(slab) [ 30.032290] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.032658] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.032718] page dumped because: kasan: bad access detected [ 30.032775] [ 30.032803] Memory state around the buggy address: [ 30.032839] fff00000c9ab5a00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 30.033136] fff00000c9ab5a80: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 30.033184] >fff00000c9ab5b00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.033530] ^ [ 30.033632] fff00000c9ab5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.033675] fff00000c9ab5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.033714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 29.954379] ================================================================== [ 29.954515] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 29.954587] Read of size 4 at addr fff00000c9ab5900 by task swapper/1/0 [ 29.954634] [ 29.954672] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.954757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.955049] Hardware name: linux,dummy-virt (DT) [ 29.955474] Call trace: [ 29.955557] show_stack+0x20/0x38 (C) [ 29.956643] dump_stack_lvl+0x8c/0xd0 [ 29.956796] print_report+0x118/0x5d0 [ 29.956846] kasan_report+0xdc/0x128 [ 29.956898] __asan_report_load4_noabort+0x20/0x30 [ 29.956950] rcu_uaf_reclaim+0x64/0x70 [ 29.956995] rcu_core+0x9f4/0x1e58 [ 29.957043] rcu_core_si+0x18/0x30 [ 29.957100] handle_softirqs+0x374/0xb28 [ 29.957148] __do_softirq+0x1c/0x28 [ 29.957190] ____do_softirq+0x18/0x30 [ 29.957233] call_on_irq_stack+0x24/0x30 [ 29.957281] do_softirq_own_stack+0x24/0x38 [ 29.957326] __irq_exit_rcu+0x1fc/0x318 [ 29.957371] irq_exit_rcu+0x1c/0x80 [ 29.957415] el1_interrupt+0x38/0x58 [ 29.957460] el1h_64_irq_handler+0x18/0x28 [ 29.957506] el1h_64_irq+0x6c/0x70 [ 29.957606] arch_local_irq_enable+0x4/0x8 (P) [ 29.957658] do_idle+0x384/0x4e8 [ 29.957703] cpu_startup_entry+0x64/0x80 [ 29.957749] secondary_start_kernel+0x28c/0x340 [ 29.957796] __secondary_switched+0xc0/0xc8 [ 29.957849] [ 29.957868] Allocated by task 229: [ 29.961012] kasan_save_stack+0x3c/0x68 [ 29.961097] kasan_save_track+0x20/0x40 [ 29.961134] kasan_save_alloc_info+0x40/0x58 [ 29.961181] __kasan_kmalloc+0xd4/0xd8 [ 29.961216] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.961262] rcu_uaf+0xb0/0x2d8 [ 29.961300] kunit_try_run_case+0x170/0x3f0 [ 29.961343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.961386] kthread+0x328/0x630 [ 29.961421] ret_from_fork+0x10/0x20 [ 29.961456] [ 29.961476] Freed by task 0: [ 29.961503] kasan_save_stack+0x3c/0x68 [ 29.961540] kasan_save_track+0x20/0x40 [ 29.961575] kasan_save_free_info+0x4c/0x78 [ 29.961611] __kasan_slab_free+0x6c/0x98 [ 29.961648] kfree+0x214/0x3c8 [ 29.961681] rcu_uaf_reclaim+0x28/0x70 [ 29.961719] rcu_core+0x9f4/0x1e58 [ 29.961753] rcu_core_si+0x18/0x30 [ 29.961788] handle_softirqs+0x374/0xb28 [ 29.961823] __do_softirq+0x1c/0x28 [ 29.961857] [ 29.961891] Last potentially related work creation: [ 29.961924] kasan_save_stack+0x3c/0x68 [ 29.961963] kasan_record_aux_stack+0xb4/0xc8 [ 29.962000] __call_rcu_common.constprop.0+0x74/0x8c8 [ 29.962042] call_rcu+0x18/0x30 [ 29.963200] rcu_uaf+0x14c/0x2d8 [ 29.963447] kunit_try_run_case+0x170/0x3f0 [ 29.963604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.964125] kthread+0x328/0x630 [ 29.964168] ret_from_fork+0x10/0x20 [ 29.965016] [ 29.965072] The buggy address belongs to the object at fff00000c9ab5900 [ 29.965072] which belongs to the cache kmalloc-32 of size 32 [ 29.966014] The buggy address is located 0 bytes inside of [ 29.966014] freed 32-byte region [fff00000c9ab5900, fff00000c9ab5920) [ 29.966439] [ 29.966472] The buggy address belongs to the physical page: [ 29.966711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ab5 [ 29.967653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.967860] page_type: f5(slab) [ 29.968089] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.968700] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.968787] page dumped because: kasan: bad access detected [ 29.968819] [ 29.969431] Memory state around the buggy address: [ 29.969632] fff00000c9ab5800: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 29.969680] fff00000c9ab5880: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 29.970417] >fff00000c9ab5900: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 29.970691] ^ [ 29.971228] fff00000c9ab5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.971334] fff00000c9ab5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.971404] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 29.812090] ================================================================== [ 29.812143] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.812426] Read of size 1 at addr fff00000c9b1e478 by task kunit_try_catch/227 [ 29.812600] [ 29.812715] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.812835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.812864] Hardware name: linux,dummy-virt (DT) [ 29.812893] Call trace: [ 29.812930] show_stack+0x20/0x38 (C) [ 29.813176] dump_stack_lvl+0x8c/0xd0 [ 29.813338] print_report+0x118/0x5d0 [ 29.813491] kasan_report+0xdc/0x128 [ 29.813603] __asan_report_load1_noabort+0x20/0x30 [ 29.813689] ksize_uaf+0x544/0x5f8 [ 29.813837] kunit_try_run_case+0x170/0x3f0 [ 29.813888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.814119] kthread+0x328/0x630 [ 29.814169] ret_from_fork+0x10/0x20 [ 29.814241] [ 29.814297] Allocated by task 227: [ 29.814327] kasan_save_stack+0x3c/0x68 [ 29.814373] kasan_save_track+0x20/0x40 [ 29.814409] kasan_save_alloc_info+0x40/0x58 [ 29.814462] __kasan_kmalloc+0xd4/0xd8 [ 29.814505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.814547] ksize_uaf+0xb8/0x5f8 [ 29.814598] kunit_try_run_case+0x170/0x3f0 [ 29.814635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.814685] kthread+0x328/0x630 [ 29.814718] ret_from_fork+0x10/0x20 [ 29.814754] [ 29.814779] Freed by task 227: [ 29.814806] kasan_save_stack+0x3c/0x68 [ 29.814841] kasan_save_track+0x20/0x40 [ 29.814874] kasan_save_free_info+0x4c/0x78 [ 29.814922] __kasan_slab_free+0x6c/0x98 [ 29.814958] kfree+0x214/0x3c8 [ 29.815001] ksize_uaf+0x11c/0x5f8 [ 29.815037] kunit_try_run_case+0x170/0x3f0 [ 29.815087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.815138] kthread+0x328/0x630 [ 29.815181] ret_from_fork+0x10/0x20 [ 29.815216] [ 29.815235] The buggy address belongs to the object at fff00000c9b1e400 [ 29.815235] which belongs to the cache kmalloc-128 of size 128 [ 29.815301] The buggy address is located 120 bytes inside of [ 29.815301] freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480) [ 29.815365] [ 29.815394] The buggy address belongs to the physical page: [ 29.815423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.815474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.815529] page_type: f5(slab) [ 29.815575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.815626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.815675] page dumped because: kasan: bad access detected [ 29.815713] [ 29.815731] Memory state around the buggy address: [ 29.815772] fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.815830] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.815871] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.815908] ^ [ 29.815954] fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.815996] fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.816034] ================================================================== [ 29.795545] ================================================================== [ 29.795791] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.796142] Read of size 1 at addr fff00000c9b1e400 by task kunit_try_catch/227 [ 29.796284] [ 29.796317] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.796456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.796512] Hardware name: linux,dummy-virt (DT) [ 29.796550] Call trace: [ 29.796574] show_stack+0x20/0x38 (C) [ 29.796633] dump_stack_lvl+0x8c/0xd0 [ 29.796683] print_report+0x118/0x5d0 [ 29.796967] kasan_report+0xdc/0x128 [ 29.797332] __kasan_check_byte+0x54/0x70 [ 29.797521] ksize+0x30/0x88 [ 29.797576] ksize_uaf+0x168/0x5f8 [ 29.797631] kunit_try_run_case+0x170/0x3f0 [ 29.797680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.797801] kthread+0x328/0x630 [ 29.797864] ret_from_fork+0x10/0x20 [ 29.797917] [ 29.797944] Allocated by task 227: [ 29.797974] kasan_save_stack+0x3c/0x68 [ 29.798014] kasan_save_track+0x20/0x40 [ 29.798081] kasan_save_alloc_info+0x40/0x58 [ 29.798131] __kasan_kmalloc+0xd4/0xd8 [ 29.798164] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.798205] ksize_uaf+0xb8/0x5f8 [ 29.798242] kunit_try_run_case+0x170/0x3f0 [ 29.798279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.798331] kthread+0x328/0x630 [ 29.798364] ret_from_fork+0x10/0x20 [ 29.798407] [ 29.798427] Freed by task 227: [ 29.798453] kasan_save_stack+0x3c/0x68 [ 29.798487] kasan_save_track+0x20/0x40 [ 29.798529] kasan_save_free_info+0x4c/0x78 [ 29.798575] __kasan_slab_free+0x6c/0x98 [ 29.798627] kfree+0x214/0x3c8 [ 29.798667] ksize_uaf+0x11c/0x5f8 [ 29.798704] kunit_try_run_case+0x170/0x3f0 [ 29.798750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.798798] kthread+0x328/0x630 [ 29.798831] ret_from_fork+0x10/0x20 [ 29.798868] [ 29.798895] The buggy address belongs to the object at fff00000c9b1e400 [ 29.798895] which belongs to the cache kmalloc-128 of size 128 [ 29.798953] The buggy address is located 0 bytes inside of [ 29.798953] freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480) [ 29.799024] [ 29.799044] The buggy address belongs to the physical page: [ 29.799433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.800008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.800124] page_type: f5(slab) [ 29.800200] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.800326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.800418] page dumped because: kasan: bad access detected [ 29.800529] [ 29.800572] Memory state around the buggy address: [ 29.800606] fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.801074] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801200] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.801305] ^ [ 29.801382] fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801492] fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801606] ================================================================== [ 29.803086] ================================================================== [ 29.803289] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.803362] Read of size 1 at addr fff00000c9b1e400 by task kunit_try_catch/227 [ 29.803413] [ 29.803499] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.803587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.803776] Hardware name: linux,dummy-virt (DT) [ 29.803819] Call trace: [ 29.803865] show_stack+0x20/0x38 (C) [ 29.803918] dump_stack_lvl+0x8c/0xd0 [ 29.804104] print_report+0x118/0x5d0 [ 29.804217] kasan_report+0xdc/0x128 [ 29.804311] __asan_report_load1_noabort+0x20/0x30 [ 29.804362] ksize_uaf+0x598/0x5f8 [ 29.804514] kunit_try_run_case+0x170/0x3f0 [ 29.804607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804661] kthread+0x328/0x630 [ 29.804721] ret_from_fork+0x10/0x20 [ 29.805123] [ 29.805165] Allocated by task 227: [ 29.805248] kasan_save_stack+0x3c/0x68 [ 29.805375] kasan_save_track+0x20/0x40 [ 29.805450] kasan_save_alloc_info+0x40/0x58 [ 29.805596] __kasan_kmalloc+0xd4/0xd8 [ 29.805687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.805730] ksize_uaf+0xb8/0x5f8 [ 29.806016] kunit_try_run_case+0x170/0x3f0 [ 29.806250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.806352] kthread+0x328/0x630 [ 29.806467] ret_from_fork+0x10/0x20 [ 29.806505] [ 29.806651] Freed by task 227: [ 29.806725] kasan_save_stack+0x3c/0x68 [ 29.807015] kasan_save_track+0x20/0x40 [ 29.807193] kasan_save_free_info+0x4c/0x78 [ 29.807273] __kasan_slab_free+0x6c/0x98 [ 29.807385] kfree+0x214/0x3c8 [ 29.807423] ksize_uaf+0x11c/0x5f8 [ 29.807578] kunit_try_run_case+0x170/0x3f0 [ 29.807860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.807945] kthread+0x328/0x630 [ 29.808112] ret_from_fork+0x10/0x20 [ 29.808198] [ 29.808272] The buggy address belongs to the object at fff00000c9b1e400 [ 29.808272] which belongs to the cache kmalloc-128 of size 128 [ 29.808623] The buggy address is located 0 bytes inside of [ 29.808623] freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480) [ 29.808778] [ 29.808853] The buggy address belongs to the physical page: [ 29.808939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.809104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.809322] page_type: f5(slab) [ 29.809541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.809613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.809773] page dumped because: kasan: bad access detected [ 29.809841] [ 29.809988] Memory state around the buggy address: [ 29.810069] fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.810198] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810287] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.810347] ^ [ 29.810731] fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810790] fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 29.766705] ================================================================== [ 29.766900] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 29.766983] Read of size 1 at addr fff00000c9b1e373 by task kunit_try_catch/225 [ 29.767034] [ 29.767305] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.767414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.767787] Hardware name: linux,dummy-virt (DT) [ 29.767868] Call trace: [ 29.767894] show_stack+0x20/0x38 (C) [ 29.767946] dump_stack_lvl+0x8c/0xd0 [ 29.768281] print_report+0x118/0x5d0 [ 29.768359] kasan_report+0xdc/0x128 [ 29.768539] __asan_report_load1_noabort+0x20/0x30 [ 29.768626] ksize_unpoisons_memory+0x628/0x740 [ 29.768760] kunit_try_run_case+0x170/0x3f0 [ 29.768842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.768898] kthread+0x328/0x630 [ 29.768939] ret_from_fork+0x10/0x20 [ 29.768987] [ 29.769005] Allocated by task 225: [ 29.769033] kasan_save_stack+0x3c/0x68 [ 29.769434] kasan_save_track+0x20/0x40 [ 29.769508] kasan_save_alloc_info+0x40/0x58 [ 29.769546] __kasan_kmalloc+0xd4/0xd8 [ 29.769579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.769627] ksize_unpoisons_memory+0xc0/0x740 [ 29.769686] kunit_try_run_case+0x170/0x3f0 [ 29.769724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769765] kthread+0x328/0x630 [ 29.769796] ret_from_fork+0x10/0x20 [ 29.769832] [ 29.769862] The buggy address belongs to the object at fff00000c9b1e300 [ 29.769862] which belongs to the cache kmalloc-128 of size 128 [ 29.769930] The buggy address is located 0 bytes to the right of [ 29.769930] allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373) [ 29.769994] [ 29.770021] The buggy address belongs to the physical page: [ 29.770064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.770134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.770182] page_type: f5(slab) [ 29.770221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.770282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.770323] page dumped because: kasan: bad access detected [ 29.770356] [ 29.770381] Memory state around the buggy address: [ 29.770421] fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.770465] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.770519] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.770568] ^ [ 29.770617] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.770662] fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.770710] ================================================================== [ 29.773355] ================================================================== [ 29.773418] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 29.773792] Read of size 1 at addr fff00000c9b1e378 by task kunit_try_catch/225 [ 29.774450] [ 29.774507] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.774607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.774646] Hardware name: linux,dummy-virt (DT) [ 29.774685] Call trace: [ 29.774708] show_stack+0x20/0x38 (C) [ 29.774760] dump_stack_lvl+0x8c/0xd0 [ 29.774937] print_report+0x118/0x5d0 [ 29.774999] kasan_report+0xdc/0x128 [ 29.775197] __asan_report_load1_noabort+0x20/0x30 [ 29.775261] ksize_unpoisons_memory+0x618/0x740 [ 29.775313] kunit_try_run_case+0x170/0x3f0 [ 29.775639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.775736] kthread+0x328/0x630 [ 29.775979] ret_from_fork+0x10/0x20 [ 29.776046] [ 29.776117] Allocated by task 225: [ 29.776303] kasan_save_stack+0x3c/0x68 [ 29.776632] kasan_save_track+0x20/0x40 [ 29.776685] kasan_save_alloc_info+0x40/0x58 [ 29.776790] __kasan_kmalloc+0xd4/0xd8 [ 29.776867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.777008] ksize_unpoisons_memory+0xc0/0x740 [ 29.777115] kunit_try_run_case+0x170/0x3f0 [ 29.777195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.777239] kthread+0x328/0x630 [ 29.777421] ret_from_fork+0x10/0x20 [ 29.777601] [ 29.777629] The buggy address belongs to the object at fff00000c9b1e300 [ 29.777629] which belongs to the cache kmalloc-128 of size 128 [ 29.778082] The buggy address is located 5 bytes to the right of [ 29.778082] allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373) [ 29.778226] [ 29.778285] The buggy address belongs to the physical page: [ 29.778350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.778480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.778559] page_type: f5(slab) [ 29.778613] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.778738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.778885] page dumped because: kasan: bad access detected [ 29.778943] [ 29.778989] Memory state around the buggy address: [ 29.779027] fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.779228] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.779446] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.779540] ^ [ 29.779613] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780097] fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780236] ================================================================== [ 29.781719] ================================================================== [ 29.781843] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.781928] Read of size 1 at addr fff00000c9b1e37f by task kunit_try_catch/225 [ 29.781978] [ 29.782139] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.782225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.782251] Hardware name: linux,dummy-virt (DT) [ 29.782575] Call trace: [ 29.782635] show_stack+0x20/0x38 (C) [ 29.782748] dump_stack_lvl+0x8c/0xd0 [ 29.782804] print_report+0x118/0x5d0 [ 29.782850] kasan_report+0xdc/0x128 [ 29.783089] __asan_report_load1_noabort+0x20/0x30 [ 29.783220] ksize_unpoisons_memory+0x690/0x740 [ 29.783280] kunit_try_run_case+0x170/0x3f0 [ 29.783477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.783561] kthread+0x328/0x630 [ 29.783605] ret_from_fork+0x10/0x20 [ 29.783891] [ 29.783922] Allocated by task 225: [ 29.783961] kasan_save_stack+0x3c/0x68 [ 29.784100] kasan_save_track+0x20/0x40 [ 29.784141] kasan_save_alloc_info+0x40/0x58 [ 29.784205] __kasan_kmalloc+0xd4/0xd8 [ 29.784363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.784571] ksize_unpoisons_memory+0xc0/0x740 [ 29.784652] kunit_try_run_case+0x170/0x3f0 [ 29.784715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.784761] kthread+0x328/0x630 [ 29.784795] ret_from_fork+0x10/0x20 [ 29.785274] [ 29.785379] The buggy address belongs to the object at fff00000c9b1e300 [ 29.785379] which belongs to the cache kmalloc-128 of size 128 [ 29.785452] The buggy address is located 12 bytes to the right of [ 29.785452] allocated 115-byte region [fff00000c9b1e300, fff00000c9b1e373) [ 29.785531] [ 29.785586] The buggy address belongs to the physical page: [ 29.785624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.785680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.785727] page_type: f5(slab) [ 29.785767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.785817] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.785859] page dumped because: kasan: bad access detected [ 29.785898] [ 29.785917] Memory state around the buggy address: [ 29.785946] fff00000c9b1e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.785990] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.786042] >fff00000c9b1e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.786106] ^ [ 29.786148] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.786190] fff00000c9b1e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.786228] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 29.750680] ================================================================== [ 29.750765] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 29.750828] Free of addr fff00000c7ac9380 by task kunit_try_catch/223 [ 29.751155] [ 29.751260] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.751365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.751391] Hardware name: linux,dummy-virt (DT) [ 29.751541] Call trace: [ 29.751576] show_stack+0x20/0x38 (C) [ 29.751656] dump_stack_lvl+0x8c/0xd0 [ 29.751709] print_report+0x118/0x5d0 [ 29.751754] kasan_report_invalid_free+0xc0/0xe8 [ 29.751961] check_slab_allocation+0xd4/0x108 [ 29.752038] __kasan_slab_pre_free+0x2c/0x48 [ 29.752357] kfree+0xe8/0x3c8 [ 29.752443] kfree_sensitive+0x3c/0xb0 [ 29.752527] kmalloc_double_kzfree+0x168/0x308 [ 29.752855] kunit_try_run_case+0x170/0x3f0 [ 29.752981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.753113] kthread+0x328/0x630 [ 29.753183] ret_from_fork+0x10/0x20 [ 29.753494] [ 29.753556] Allocated by task 223: [ 29.753998] kasan_save_stack+0x3c/0x68 [ 29.754089] kasan_save_track+0x20/0x40 [ 29.754241] kasan_save_alloc_info+0x40/0x58 [ 29.754311] __kasan_kmalloc+0xd4/0xd8 [ 29.754604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.754739] kmalloc_double_kzfree+0xb8/0x308 [ 29.754887] kunit_try_run_case+0x170/0x3f0 [ 29.754971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.755074] kthread+0x328/0x630 [ 29.755107] ret_from_fork+0x10/0x20 [ 29.755517] [ 29.755580] Freed by task 223: [ 29.755646] kasan_save_stack+0x3c/0x68 [ 29.755786] kasan_save_track+0x20/0x40 [ 29.755873] kasan_save_free_info+0x4c/0x78 [ 29.756046] __kasan_slab_free+0x6c/0x98 [ 29.756130] kfree+0x214/0x3c8 [ 29.756185] kfree_sensitive+0x80/0xb0 [ 29.756231] kmalloc_double_kzfree+0x11c/0x308 [ 29.756272] kunit_try_run_case+0x170/0x3f0 [ 29.756315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.756375] kthread+0x328/0x630 [ 29.756415] ret_from_fork+0x10/0x20 [ 29.756451] [ 29.756471] The buggy address belongs to the object at fff00000c7ac9380 [ 29.756471] which belongs to the cache kmalloc-16 of size 16 [ 29.756528] The buggy address is located 0 bytes inside of [ 29.756528] 16-byte region [fff00000c7ac9380, fff00000c7ac9390) [ 29.756587] [ 29.756627] The buggy address belongs to the physical page: [ 29.756665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9 [ 29.756718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.756773] page_type: f5(slab) [ 29.756813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.756872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.756920] page dumped because: kasan: bad access detected [ 29.756959] [ 29.756976] Memory state around the buggy address: [ 29.757016] fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.757070] fff00000c7ac9300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.757124] >fff00000c7ac9380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.757171] ^ [ 29.757199] fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.757239] fff00000c7ac9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.757277] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 29.738944] ================================================================== [ 29.739003] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 29.739340] Read of size 1 at addr fff00000c7ac9380 by task kunit_try_catch/223 [ 29.739513] [ 29.739547] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.739638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.739665] Hardware name: linux,dummy-virt (DT) [ 29.739911] Call trace: [ 29.740088] show_stack+0x20/0x38 (C) [ 29.740150] dump_stack_lvl+0x8c/0xd0 [ 29.740344] print_report+0x118/0x5d0 [ 29.740582] kasan_report+0xdc/0x128 [ 29.740638] __kasan_check_byte+0x54/0x70 [ 29.740681] kfree_sensitive+0x30/0xb0 [ 29.740989] kmalloc_double_kzfree+0x168/0x308 [ 29.741188] kunit_try_run_case+0x170/0x3f0 [ 29.741244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.741513] kthread+0x328/0x630 [ 29.741733] ret_from_fork+0x10/0x20 [ 29.741791] [ 29.741976] Allocated by task 223: [ 29.742604] kasan_save_stack+0x3c/0x68 [ 29.742693] kasan_save_track+0x20/0x40 [ 29.742810] kasan_save_alloc_info+0x40/0x58 [ 29.742881] __kasan_kmalloc+0xd4/0xd8 [ 29.743098] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.743269] kmalloc_double_kzfree+0xb8/0x308 [ 29.743333] kunit_try_run_case+0x170/0x3f0 [ 29.743371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.743450] kthread+0x328/0x630 [ 29.743483] ret_from_fork+0x10/0x20 [ 29.743519] [ 29.743540] Freed by task 223: [ 29.743577] kasan_save_stack+0x3c/0x68 [ 29.743620] kasan_save_track+0x20/0x40 [ 29.743656] kasan_save_free_info+0x4c/0x78 [ 29.743693] __kasan_slab_free+0x6c/0x98 [ 29.743729] kfree+0x214/0x3c8 [ 29.743764] kfree_sensitive+0x80/0xb0 [ 29.743801] kmalloc_double_kzfree+0x11c/0x308 [ 29.743848] kunit_try_run_case+0x170/0x3f0 [ 29.743896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.743938] kthread+0x328/0x630 [ 29.743979] ret_from_fork+0x10/0x20 [ 29.744016] [ 29.744035] The buggy address belongs to the object at fff00000c7ac9380 [ 29.744035] which belongs to the cache kmalloc-16 of size 16 [ 29.744104] The buggy address is located 0 bytes inside of [ 29.744104] freed 16-byte region [fff00000c7ac9380, fff00000c7ac9390) [ 29.744166] [ 29.744197] The buggy address belongs to the physical page: [ 29.744229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9 [ 29.744283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.744341] page_type: f5(slab) [ 29.744381] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.744748] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.745173] page dumped because: kasan: bad access detected [ 29.745348] [ 29.745520] Memory state around the buggy address: [ 29.745969] fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.746022] fff00000c7ac9300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.746277] >fff00000c7ac9380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746419] ^ [ 29.746570] fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746753] fff00000c7ac9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746825] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 29.713657] ================================================================== [ 29.713720] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.713779] Read of size 1 at addr fff00000c9b1cb28 by task kunit_try_catch/219 [ 29.713850] [ 29.713886] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.713980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.714008] Hardware name: linux,dummy-virt (DT) [ 29.714040] Call trace: [ 29.714434] show_stack+0x20/0x38 (C) [ 29.714531] dump_stack_lvl+0x8c/0xd0 [ 29.714938] print_report+0x118/0x5d0 [ 29.715332] kasan_report+0xdc/0x128 [ 29.715651] __asan_report_load1_noabort+0x20/0x30 [ 29.715732] kmalloc_uaf2+0x3f4/0x468 [ 29.715833] kunit_try_run_case+0x170/0x3f0 [ 29.715889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.715942] kthread+0x328/0x630 [ 29.716091] ret_from_fork+0x10/0x20 [ 29.716163] [ 29.716188] Allocated by task 219: [ 29.716367] kasan_save_stack+0x3c/0x68 [ 29.716586] kasan_save_track+0x20/0x40 [ 29.716708] kasan_save_alloc_info+0x40/0x58 [ 29.716798] __kasan_kmalloc+0xd4/0xd8 [ 29.716971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.717026] kmalloc_uaf2+0xc4/0x468 [ 29.717226] kunit_try_run_case+0x170/0x3f0 [ 29.717400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717452] kthread+0x328/0x630 [ 29.717484] ret_from_fork+0x10/0x20 [ 29.717697] [ 29.717905] Freed by task 219: [ 29.718026] kasan_save_stack+0x3c/0x68 [ 29.718158] kasan_save_track+0x20/0x40 [ 29.718220] kasan_save_free_info+0x4c/0x78 [ 29.718258] __kasan_slab_free+0x6c/0x98 [ 29.718318] kfree+0x214/0x3c8 [ 29.718774] kmalloc_uaf2+0x134/0x468 [ 29.718874] kunit_try_run_case+0x170/0x3f0 [ 29.718953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.719105] kthread+0x328/0x630 [ 29.719177] ret_from_fork+0x10/0x20 [ 29.719358] [ 29.719557] The buggy address belongs to the object at fff00000c9b1cb00 [ 29.719557] which belongs to the cache kmalloc-64 of size 64 [ 29.719655] The buggy address is located 40 bytes inside of [ 29.719655] freed 64-byte region [fff00000c9b1cb00, fff00000c9b1cb40) [ 29.719803] [ 29.719879] The buggy address belongs to the physical page: [ 29.719957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c [ 29.720050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.720191] page_type: f5(slab) [ 29.720385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.720645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.720700] page dumped because: kasan: bad access detected [ 29.720838] [ 29.720915] Memory state around the buggy address: [ 29.721034] fff00000c9b1ca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.721101] fff00000c9b1ca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.721151] >fff00000c9b1cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.721189] ^ [ 29.721219] fff00000c9b1cb80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 29.721397] fff00000c9b1cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.721620] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 29.683382] ================================================================== [ 29.683446] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.683503] Write of size 33 at addr fff00000c9b1c980 by task kunit_try_catch/217 [ 29.683554] [ 29.683586] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.683671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.683716] Hardware name: linux,dummy-virt (DT) [ 29.683764] Call trace: [ 29.683788] show_stack+0x20/0x38 (C) [ 29.683838] dump_stack_lvl+0x8c/0xd0 [ 29.683918] print_report+0x118/0x5d0 [ 29.683964] kasan_report+0xdc/0x128 [ 29.684008] kasan_check_range+0x100/0x1a8 [ 29.684065] __asan_memset+0x34/0x78 [ 29.684119] kmalloc_uaf_memset+0x170/0x310 [ 29.684168] kunit_try_run_case+0x170/0x3f0 [ 29.684217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.684269] kthread+0x328/0x630 [ 29.684311] ret_from_fork+0x10/0x20 [ 29.684363] [ 29.685219] Allocated by task 217: [ 29.685286] kasan_save_stack+0x3c/0x68 [ 29.685428] kasan_save_track+0x20/0x40 [ 29.685526] kasan_save_alloc_info+0x40/0x58 [ 29.685691] __kasan_kmalloc+0xd4/0xd8 [ 29.685778] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.685920] kmalloc_uaf_memset+0xb8/0x310 [ 29.685959] kunit_try_run_case+0x170/0x3f0 [ 29.686202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.686529] kthread+0x328/0x630 [ 29.686597] ret_from_fork+0x10/0x20 [ 29.686722] [ 29.686784] Freed by task 217: [ 29.686843] kasan_save_stack+0x3c/0x68 [ 29.687318] kasan_save_track+0x20/0x40 [ 29.687403] kasan_save_free_info+0x4c/0x78 [ 29.687537] __kasan_slab_free+0x6c/0x98 [ 29.687597] kfree+0x214/0x3c8 [ 29.687645] kmalloc_uaf_memset+0x11c/0x310 [ 29.687750] kunit_try_run_case+0x170/0x3f0 [ 29.687789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.690709] kthread+0x328/0x630 [ 29.691118] ret_from_fork+0x10/0x20 [ 29.691268] [ 29.691368] The buggy address belongs to the object at fff00000c9b1c980 [ 29.691368] which belongs to the cache kmalloc-64 of size 64 [ 29.692857] The buggy address is located 0 bytes inside of [ 29.692857] freed 64-byte region [fff00000c9b1c980, fff00000c9b1c9c0) [ 29.694575] [ 29.694615] The buggy address belongs to the physical page: [ 29.694651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c [ 29.696629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.697095] page_type: f5(slab) [ 29.697365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.699508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.699769] page dumped because: kasan: bad access detected [ 29.700728] [ 29.700770] Memory state around the buggy address: [ 29.700809] fff00000c9b1c880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.700855] fff00000c9b1c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.701183] >fff00000c9b1c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.701428] ^ [ 29.701464] fff00000c9b1ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.701904] fff00000c9b1ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.701952] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 29.666530] ================================================================== [ 29.666595] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.666653] Read of size 1 at addr fff00000c7ac9368 by task kunit_try_catch/215 [ 29.666704] [ 29.666736] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.666832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.666888] Hardware name: linux,dummy-virt (DT) [ 29.666923] Call trace: [ 29.666948] show_stack+0x20/0x38 (C) [ 29.666997] dump_stack_lvl+0x8c/0xd0 [ 29.667046] print_report+0x118/0x5d0 [ 29.667112] kasan_report+0xdc/0x128 [ 29.667156] __asan_report_load1_noabort+0x20/0x30 [ 29.667205] kmalloc_uaf+0x300/0x338 [ 29.667249] kunit_try_run_case+0x170/0x3f0 [ 29.667304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.667355] kthread+0x328/0x630 [ 29.667396] ret_from_fork+0x10/0x20 [ 29.667442] [ 29.667460] Allocated by task 215: [ 29.667489] kasan_save_stack+0x3c/0x68 [ 29.667527] kasan_save_track+0x20/0x40 [ 29.667562] kasan_save_alloc_info+0x40/0x58 [ 29.667600] __kasan_kmalloc+0xd4/0xd8 [ 29.667633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.667673] kmalloc_uaf+0xb8/0x338 [ 29.667707] kunit_try_run_case+0x170/0x3f0 [ 29.667762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.667815] kthread+0x328/0x630 [ 29.667848] ret_from_fork+0x10/0x20 [ 29.667883] [ 29.667903] Freed by task 215: [ 29.667934] kasan_save_stack+0x3c/0x68 [ 29.667970] kasan_save_track+0x20/0x40 [ 29.668004] kasan_save_free_info+0x4c/0x78 [ 29.668040] __kasan_slab_free+0x6c/0x98 [ 29.668411] kfree+0x214/0x3c8 [ 29.668628] kmalloc_uaf+0x11c/0x338 [ 29.668683] kunit_try_run_case+0x170/0x3f0 [ 29.668723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.669301] kthread+0x328/0x630 [ 29.669590] ret_from_fork+0x10/0x20 [ 29.669935] [ 29.670304] The buggy address belongs to the object at fff00000c7ac9360 [ 29.670304] which belongs to the cache kmalloc-16 of size 16 [ 29.670681] The buggy address is located 8 bytes inside of [ 29.670681] freed 16-byte region [fff00000c7ac9360, fff00000c7ac9370) [ 29.670943] [ 29.671063] The buggy address belongs to the physical page: [ 29.671104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9 [ 29.671200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.671314] page_type: f5(slab) [ 29.671403] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.671803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.671886] page dumped because: kasan: bad access detected [ 29.672314] [ 29.672408] Memory state around the buggy address: [ 29.672468] fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 29.672536] fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.672593] >fff00000c7ac9300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.672849] ^ [ 29.673316] fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.673373] fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.673414] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 29.648523] ================================================================== [ 29.648730] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 29.648980] Read of size 64 at addr fff00000c9b1c684 by task kunit_try_catch/213 [ 29.649125] [ 29.649221] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.649366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.649779] Hardware name: linux,dummy-virt (DT) [ 29.649850] Call trace: [ 29.649941] show_stack+0x20/0x38 (C) [ 29.650005] dump_stack_lvl+0x8c/0xd0 [ 29.650190] print_report+0x118/0x5d0 [ 29.650395] kasan_report+0xdc/0x128 [ 29.650471] kasan_check_range+0x100/0x1a8 [ 29.650603] __asan_memmove+0x3c/0x98 [ 29.650698] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 29.651068] kunit_try_run_case+0x170/0x3f0 [ 29.651179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.651269] kthread+0x328/0x630 [ 29.651457] ret_from_fork+0x10/0x20 [ 29.651685] [ 29.651709] Allocated by task 213: [ 29.651761] kasan_save_stack+0x3c/0x68 [ 29.651946] kasan_save_track+0x20/0x40 [ 29.652104] kasan_save_alloc_info+0x40/0x58 [ 29.652316] __kasan_kmalloc+0xd4/0xd8 [ 29.652461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.652507] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 29.652550] kunit_try_run_case+0x170/0x3f0 [ 29.652588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.652630] kthread+0x328/0x630 [ 29.652664] ret_from_fork+0x10/0x20 [ 29.652699] [ 29.652848] The buggy address belongs to the object at fff00000c9b1c680 [ 29.652848] which belongs to the cache kmalloc-64 of size 64 [ 29.653085] The buggy address is located 4 bytes inside of [ 29.653085] allocated 64-byte region [fff00000c9b1c680, fff00000c9b1c6c0) [ 29.653157] [ 29.653179] The buggy address belongs to the physical page: [ 29.653396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c [ 29.653607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.653770] page_type: f5(slab) [ 29.653901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.654047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.654232] page dumped because: kasan: bad access detected [ 29.654302] [ 29.654320] Memory state around the buggy address: [ 29.654354] fff00000c9b1c580: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 29.654603] fff00000c9b1c600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.654887] >fff00000c9b1c680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.655081] ^ [ 29.655172] fff00000c9b1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.655291] fff00000c9b1c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.655333] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 29.630304] ================================================================== [ 29.630406] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 29.630631] Read of size 18446744073709551614 at addr fff00000c9b1c484 by task kunit_try_catch/211 [ 29.630730] [ 29.630925] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.631029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.631128] Hardware name: linux,dummy-virt (DT) [ 29.631163] Call trace: [ 29.631193] show_stack+0x20/0x38 (C) [ 29.631246] dump_stack_lvl+0x8c/0xd0 [ 29.631390] print_report+0x118/0x5d0 [ 29.631441] kasan_report+0xdc/0x128 [ 29.631484] kasan_check_range+0x100/0x1a8 [ 29.631538] __asan_memmove+0x3c/0x98 [ 29.631581] kmalloc_memmove_negative_size+0x154/0x2e0 [ 29.631634] kunit_try_run_case+0x170/0x3f0 [ 29.631941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.632073] kthread+0x328/0x630 [ 29.632118] ret_from_fork+0x10/0x20 [ 29.632312] [ 29.632405] Allocated by task 211: [ 29.632696] kasan_save_stack+0x3c/0x68 [ 29.632860] kasan_save_track+0x20/0x40 [ 29.632941] kasan_save_alloc_info+0x40/0x58 [ 29.633131] __kasan_kmalloc+0xd4/0xd8 [ 29.633242] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.633355] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 29.633402] kunit_try_run_case+0x170/0x3f0 [ 29.633450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.633783] kthread+0x328/0x630 [ 29.633963] ret_from_fork+0x10/0x20 [ 29.634048] [ 29.634179] The buggy address belongs to the object at fff00000c9b1c480 [ 29.634179] which belongs to the cache kmalloc-64 of size 64 [ 29.634415] The buggy address is located 4 bytes inside of [ 29.634415] 64-byte region [fff00000c9b1c480, fff00000c9b1c4c0) [ 29.634637] [ 29.634716] The buggy address belongs to the physical page: [ 29.634857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1c [ 29.634952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.635094] page_type: f5(slab) [ 29.635211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.635289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.635716] page dumped because: kasan: bad access detected [ 29.635788] [ 29.635882] Memory state around the buggy address: [ 29.635973] fff00000c9b1c380: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 29.636046] fff00000c9b1c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.636202] >fff00000c9b1c480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.636268] ^ [ 29.636410] fff00000c9b1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.636595] fff00000c9b1c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.636675] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 29.611786] ================================================================== [ 29.611850] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 29.612137] Write of size 16 at addr fff00000c9b1e269 by task kunit_try_catch/209 [ 29.612403] [ 29.612478] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.612681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.612882] Hardware name: linux,dummy-virt (DT) [ 29.613293] Call trace: [ 29.613357] show_stack+0x20/0x38 (C) [ 29.613516] dump_stack_lvl+0x8c/0xd0 [ 29.613608] print_report+0x118/0x5d0 [ 29.613764] kasan_report+0xdc/0x128 [ 29.613835] kasan_check_range+0x100/0x1a8 [ 29.614089] __asan_memset+0x34/0x78 [ 29.614155] kmalloc_oob_memset_16+0x150/0x2f8 [ 29.614399] kunit_try_run_case+0x170/0x3f0 [ 29.614501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.614663] kthread+0x328/0x630 [ 29.614746] ret_from_fork+0x10/0x20 [ 29.615775] [ 29.615827] Allocated by task 209: [ 29.615892] kasan_save_stack+0x3c/0x68 [ 29.615974] kasan_save_track+0x20/0x40 [ 29.616103] kasan_save_alloc_info+0x40/0x58 [ 29.616204] __kasan_kmalloc+0xd4/0xd8 [ 29.616287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.616502] kmalloc_oob_memset_16+0xb0/0x2f8 [ 29.616667] kunit_try_run_case+0x170/0x3f0 [ 29.616823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.616907] kthread+0x328/0x630 [ 29.617216] ret_from_fork+0x10/0x20 [ 29.617264] [ 29.617970] The buggy address belongs to the object at fff00000c9b1e200 [ 29.617970] which belongs to the cache kmalloc-128 of size 128 [ 29.618353] The buggy address is located 105 bytes inside of [ 29.618353] allocated 120-byte region [fff00000c9b1e200, fff00000c9b1e278) [ 29.618581] [ 29.618602] The buggy address belongs to the physical page: [ 29.618896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.619002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.619174] page_type: f5(slab) [ 29.619276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.619379] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.619476] page dumped because: kasan: bad access detected [ 29.619544] [ 29.619652] Memory state around the buggy address: [ 29.619722] fff00000c9b1e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.619851] fff00000c9b1e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.619925] >fff00000c9b1e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.619972] ^ [ 29.620383] fff00000c9b1e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.620494] fff00000c9b1e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.620580] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 29.596039] ================================================================== [ 29.596120] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 29.596229] Write of size 8 at addr fff00000c9b1e171 by task kunit_try_catch/207 [ 29.596283] [ 29.596317] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.596878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.596909] Hardware name: linux,dummy-virt (DT) [ 29.597343] Call trace: [ 29.597499] show_stack+0x20/0x38 (C) [ 29.597602] dump_stack_lvl+0x8c/0xd0 [ 29.597909] print_report+0x118/0x5d0 [ 29.597985] kasan_report+0xdc/0x128 [ 29.598399] kasan_check_range+0x100/0x1a8 [ 29.598714] __asan_memset+0x34/0x78 [ 29.598917] kmalloc_oob_memset_8+0x150/0x2f8 [ 29.599010] kunit_try_run_case+0x170/0x3f0 [ 29.599148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.599223] kthread+0x328/0x630 [ 29.599603] ret_from_fork+0x10/0x20 [ 29.599762] [ 29.599839] Allocated by task 207: [ 29.600008] kasan_save_stack+0x3c/0x68 [ 29.600169] kasan_save_track+0x20/0x40 [ 29.600209] kasan_save_alloc_info+0x40/0x58 [ 29.600271] __kasan_kmalloc+0xd4/0xd8 [ 29.600637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.600763] kmalloc_oob_memset_8+0xb0/0x2f8 [ 29.600868] kunit_try_run_case+0x170/0x3f0 [ 29.601018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.601183] kthread+0x328/0x630 [ 29.601221] ret_from_fork+0x10/0x20 [ 29.601256] [ 29.601305] The buggy address belongs to the object at fff00000c9b1e100 [ 29.601305] which belongs to the cache kmalloc-128 of size 128 [ 29.601664] The buggy address is located 113 bytes inside of [ 29.601664] allocated 120-byte region [fff00000c9b1e100, fff00000c9b1e178) [ 29.601814] [ 29.601901] The buggy address belongs to the physical page: [ 29.602017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.602116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.602208] page_type: f5(slab) [ 29.602372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.602630] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.602939] page dumped because: kasan: bad access detected [ 29.602995] [ 29.603097] Memory state around the buggy address: [ 29.603181] fff00000c9b1e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.603304] fff00000c9b1e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.603408] >fff00000c9b1e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.603525] ^ [ 29.603606] fff00000c9b1e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.603682] fff00000c9b1e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.603991] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 29.578794] ================================================================== [ 29.578851] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 29.578903] Write of size 4 at addr fff00000c9b1e075 by task kunit_try_catch/205 [ 29.578950] [ 29.578981] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.579079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.579104] Hardware name: linux,dummy-virt (DT) [ 29.579711] Call trace: [ 29.579753] show_stack+0x20/0x38 (C) [ 29.579806] dump_stack_lvl+0x8c/0xd0 [ 29.579854] print_report+0x118/0x5d0 [ 29.579933] kasan_report+0xdc/0x128 [ 29.580100] kasan_check_range+0x100/0x1a8 [ 29.580162] __asan_memset+0x34/0x78 [ 29.580207] kmalloc_oob_memset_4+0x150/0x300 [ 29.580372] kunit_try_run_case+0x170/0x3f0 [ 29.580577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.580884] kthread+0x328/0x630 [ 29.581088] ret_from_fork+0x10/0x20 [ 29.581312] [ 29.581379] Allocated by task 205: [ 29.581495] kasan_save_stack+0x3c/0x68 [ 29.581590] kasan_save_track+0x20/0x40 [ 29.581660] kasan_save_alloc_info+0x40/0x58 [ 29.581791] __kasan_kmalloc+0xd4/0xd8 [ 29.581827] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.581876] kmalloc_oob_memset_4+0xb0/0x300 [ 29.582154] kunit_try_run_case+0x170/0x3f0 [ 29.582314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.582484] kthread+0x328/0x630 [ 29.582648] ret_from_fork+0x10/0x20 [ 29.582742] [ 29.582763] The buggy address belongs to the object at fff00000c9b1e000 [ 29.582763] which belongs to the cache kmalloc-128 of size 128 [ 29.583162] The buggy address is located 117 bytes inside of [ 29.583162] allocated 120-byte region [fff00000c9b1e000, fff00000c9b1e078) [ 29.583327] [ 29.583624] The buggy address belongs to the physical page: [ 29.583914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.584084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.584166] page_type: f5(slab) [ 29.584423] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.584694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.584778] page dumped because: kasan: bad access detected [ 29.584926] [ 29.585004] Memory state around the buggy address: [ 29.585214] fff00000c9b1df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585261] fff00000c9b1df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585442] >fff00000c9b1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.585536] ^ [ 29.585731] fff00000c9b1e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585812] fff00000c9b1e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585893] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 29.566166] ================================================================== [ 29.566538] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 29.566622] Write of size 2 at addr fff00000c59f9f77 by task kunit_try_catch/203 [ 29.566671] [ 29.566706] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.567045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.567165] Hardware name: linux,dummy-virt (DT) [ 29.567223] Call trace: [ 29.567249] show_stack+0x20/0x38 (C) [ 29.567386] dump_stack_lvl+0x8c/0xd0 [ 29.567456] print_report+0x118/0x5d0 [ 29.567506] kasan_report+0xdc/0x128 [ 29.567771] kasan_check_range+0x100/0x1a8 [ 29.567848] __asan_memset+0x34/0x78 [ 29.567967] kmalloc_oob_memset_2+0x150/0x2f8 [ 29.568039] kunit_try_run_case+0x170/0x3f0 [ 29.568165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.568219] kthread+0x328/0x630 [ 29.568475] ret_from_fork+0x10/0x20 [ 29.568721] [ 29.568779] Allocated by task 203: [ 29.568902] kasan_save_stack+0x3c/0x68 [ 29.569023] kasan_save_track+0x20/0x40 [ 29.569350] kasan_save_alloc_info+0x40/0x58 [ 29.569452] __kasan_kmalloc+0xd4/0xd8 [ 29.569579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.569705] kmalloc_oob_memset_2+0xb0/0x2f8 [ 29.569825] kunit_try_run_case+0x170/0x3f0 [ 29.570013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.570079] kthread+0x328/0x630 [ 29.570118] ret_from_fork+0x10/0x20 [ 29.570260] [ 29.570335] The buggy address belongs to the object at fff00000c59f9f00 [ 29.570335] which belongs to the cache kmalloc-128 of size 128 [ 29.570668] The buggy address is located 119 bytes inside of [ 29.570668] allocated 120-byte region [fff00000c59f9f00, fff00000c59f9f78) [ 29.570835] [ 29.570903] The buggy address belongs to the physical page: [ 29.570995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.571083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.571304] page_type: f5(slab) [ 29.571484] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.571679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.571790] page dumped because: kasan: bad access detected [ 29.571849] [ 29.571868] Memory state around the buggy address: [ 29.571910] fff00000c59f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.571951] fff00000c59f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.572013] >fff00000c59f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.572049] ^ [ 29.572107] fff00000c59f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.572148] fff00000c59fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.572184] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 29.548230] ================================================================== [ 29.548320] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 29.548685] Write of size 128 at addr fff00000c59f9e00 by task kunit_try_catch/201 [ 29.549154] [ 29.549197] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.549281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.549306] Hardware name: linux,dummy-virt (DT) [ 29.549336] Call trace: [ 29.549360] show_stack+0x20/0x38 (C) [ 29.549411] dump_stack_lvl+0x8c/0xd0 [ 29.549795] print_report+0x118/0x5d0 [ 29.549862] kasan_report+0xdc/0x128 [ 29.549906] kasan_check_range+0x100/0x1a8 [ 29.549950] __asan_memset+0x34/0x78 [ 29.549993] kmalloc_oob_in_memset+0x144/0x2d0 [ 29.550040] kunit_try_run_case+0x170/0x3f0 [ 29.550099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.550539] kthread+0x328/0x630 [ 29.550856] ret_from_fork+0x10/0x20 [ 29.550927] [ 29.550947] Allocated by task 201: [ 29.551161] kasan_save_stack+0x3c/0x68 [ 29.551440] kasan_save_track+0x20/0x40 [ 29.551519] kasan_save_alloc_info+0x40/0x58 [ 29.551671] __kasan_kmalloc+0xd4/0xd8 [ 29.551751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.552123] kmalloc_oob_in_memset+0xb0/0x2d0 [ 29.552177] kunit_try_run_case+0x170/0x3f0 [ 29.552437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.552566] kthread+0x328/0x630 [ 29.552669] ret_from_fork+0x10/0x20 [ 29.552752] [ 29.552809] The buggy address belongs to the object at fff00000c59f9e00 [ 29.552809] which belongs to the cache kmalloc-128 of size 128 [ 29.552948] The buggy address is located 0 bytes inside of [ 29.552948] allocated 120-byte region [fff00000c59f9e00, fff00000c59f9e78) [ 29.553072] [ 29.553194] The buggy address belongs to the physical page: [ 29.553251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.553363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.553489] page_type: f5(slab) [ 29.553534] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.553583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.553621] page dumped because: kasan: bad access detected [ 29.553914] [ 29.553958] Memory state around the buggy address: [ 29.554010] fff00000c59f9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.554161] fff00000c59f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.554246] >fff00000c59f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.554396] ^ [ 29.554573] fff00000c59f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.554716] fff00000c59f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.554807] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 29.534637] ================================================================== [ 29.534699] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 29.535129] Read of size 16 at addr fff00000c7ac9340 by task kunit_try_catch/199 [ 29.535223] [ 29.535332] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.535556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.535593] Hardware name: linux,dummy-virt (DT) [ 29.535719] Call trace: [ 29.535771] show_stack+0x20/0x38 (C) [ 29.535826] dump_stack_lvl+0x8c/0xd0 [ 29.536155] print_report+0x118/0x5d0 [ 29.536221] kasan_report+0xdc/0x128 [ 29.536265] __asan_report_load16_noabort+0x20/0x30 [ 29.536423] kmalloc_uaf_16+0x3bc/0x438 [ 29.536479] kunit_try_run_case+0x170/0x3f0 [ 29.536886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.536962] kthread+0x328/0x630 [ 29.537045] ret_from_fork+0x10/0x20 [ 29.537229] [ 29.537288] Allocated by task 199: [ 29.537400] kasan_save_stack+0x3c/0x68 [ 29.537482] kasan_save_track+0x20/0x40 [ 29.537550] kasan_save_alloc_info+0x40/0x58 [ 29.537918] __kasan_kmalloc+0xd4/0xd8 [ 29.537974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.538080] kmalloc_uaf_16+0x140/0x438 [ 29.538120] kunit_try_run_case+0x170/0x3f0 [ 29.538157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538211] kthread+0x328/0x630 [ 29.538243] ret_from_fork+0x10/0x20 [ 29.538278] [ 29.538297] Freed by task 199: [ 29.538340] kasan_save_stack+0x3c/0x68 [ 29.538375] kasan_save_track+0x20/0x40 [ 29.538408] kasan_save_free_info+0x4c/0x78 [ 29.538444] __kasan_slab_free+0x6c/0x98 [ 29.538477] kfree+0x214/0x3c8 [ 29.538520] kmalloc_uaf_16+0x190/0x438 [ 29.538556] kunit_try_run_case+0x170/0x3f0 [ 29.538601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538641] kthread+0x328/0x630 [ 29.538674] ret_from_fork+0x10/0x20 [ 29.538709] [ 29.538729] The buggy address belongs to the object at fff00000c7ac9340 [ 29.538729] which belongs to the cache kmalloc-16 of size 16 [ 29.538798] The buggy address is located 0 bytes inside of [ 29.538798] freed 16-byte region [fff00000c7ac9340, fff00000c7ac9350) [ 29.538873] [ 29.538906] The buggy address belongs to the physical page: [ 29.538941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9 [ 29.538994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.539040] page_type: f5(slab) [ 29.539479] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.539599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.539695] page dumped because: kasan: bad access detected [ 29.539821] [ 29.539863] Memory state around the buggy address: [ 29.539896] fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 29.539946] fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.540003] >fff00000c7ac9300: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 29.540340] ^ [ 29.540425] fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540470] fff00000c7ac9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540572] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 29.518731] ================================================================== [ 29.518826] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 29.518882] Write of size 16 at addr fff00000c7ac92e0 by task kunit_try_catch/197 [ 29.518930] [ 29.518981] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.519077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.519103] Hardware name: linux,dummy-virt (DT) [ 29.519133] Call trace: [ 29.519155] show_stack+0x20/0x38 (C) [ 29.519218] dump_stack_lvl+0x8c/0xd0 [ 29.519274] print_report+0x118/0x5d0 [ 29.519319] kasan_report+0xdc/0x128 [ 29.519362] __asan_report_store16_noabort+0x20/0x30 [ 29.519410] kmalloc_oob_16+0x3a0/0x3f8 [ 29.519455] kunit_try_run_case+0x170/0x3f0 [ 29.519511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.519576] kthread+0x328/0x630 [ 29.519618] ret_from_fork+0x10/0x20 [ 29.519664] [ 29.519681] Allocated by task 197: [ 29.519709] kasan_save_stack+0x3c/0x68 [ 29.519746] kasan_save_track+0x20/0x40 [ 29.519780] kasan_save_alloc_info+0x40/0x58 [ 29.519817] __kasan_kmalloc+0xd4/0xd8 [ 29.519850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.519898] kmalloc_oob_16+0xb4/0x3f8 [ 29.519934] kunit_try_run_case+0x170/0x3f0 [ 29.519978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.520019] kthread+0x328/0x630 [ 29.520050] ret_from_fork+0x10/0x20 [ 29.520753] [ 29.520929] The buggy address belongs to the object at fff00000c7ac92e0 [ 29.520929] which belongs to the cache kmalloc-16 of size 16 [ 29.521178] The buggy address is located 0 bytes inside of [ 29.521178] allocated 13-byte region [fff00000c7ac92e0, fff00000c7ac92ed) [ 29.521301] [ 29.521322] The buggy address belongs to the physical page: [ 29.521369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9 [ 29.521739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.521823] page_type: f5(slab) [ 29.521910] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.521974] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.522345] page dumped because: kasan: bad access detected [ 29.522430] [ 29.522507] Memory state around the buggy address: [ 29.522604] fff00000c7ac9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.522656] fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 29.522721] >fff00000c7ac9280: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 29.523083] ^ [ 29.523179] fff00000c7ac9300: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.523253] fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.523527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 29.505720] ================================================================== [ 29.505861] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 29.505916] Read of size 1 at addr fff00000c7809800 by task kunit_try_catch/195 [ 29.505964] [ 29.506194] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.506350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.506389] Hardware name: linux,dummy-virt (DT) [ 29.506427] Call trace: [ 29.506469] show_stack+0x20/0x38 (C) [ 29.506573] dump_stack_lvl+0x8c/0xd0 [ 29.506624] print_report+0x118/0x5d0 [ 29.506667] kasan_report+0xdc/0x128 [ 29.506881] __asan_report_load1_noabort+0x20/0x30 [ 29.506939] krealloc_uaf+0x4c8/0x520 [ 29.507034] kunit_try_run_case+0x170/0x3f0 [ 29.507100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.507151] kthread+0x328/0x630 [ 29.507194] ret_from_fork+0x10/0x20 [ 29.507286] [ 29.507325] Allocated by task 195: [ 29.507371] kasan_save_stack+0x3c/0x68 [ 29.507416] kasan_save_track+0x20/0x40 [ 29.507541] kasan_save_alloc_info+0x40/0x58 [ 29.507596] __kasan_kmalloc+0xd4/0xd8 [ 29.507629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.507813] krealloc_uaf+0xc8/0x520 [ 29.507850] kunit_try_run_case+0x170/0x3f0 [ 29.507989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.508034] kthread+0x328/0x630 [ 29.508077] ret_from_fork+0x10/0x20 [ 29.508111] [ 29.508144] Freed by task 195: [ 29.508222] kasan_save_stack+0x3c/0x68 [ 29.508259] kasan_save_track+0x20/0x40 [ 29.508292] kasan_save_free_info+0x4c/0x78 [ 29.508328] __kasan_slab_free+0x6c/0x98 [ 29.508362] kfree+0x214/0x3c8 [ 29.508473] krealloc_uaf+0x12c/0x520 [ 29.508552] kunit_try_run_case+0x170/0x3f0 [ 29.508616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.508817] kthread+0x328/0x630 [ 29.508965] ret_from_fork+0x10/0x20 [ 29.509188] [ 29.509244] The buggy address belongs to the object at fff00000c7809800 [ 29.509244] which belongs to the cache kmalloc-256 of size 256 [ 29.509397] The buggy address is located 0 bytes inside of [ 29.509397] freed 256-byte region [fff00000c7809800, fff00000c7809900) [ 29.509500] [ 29.509557] The buggy address belongs to the physical page: [ 29.509597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.509724] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.509788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.510099] page_type: f5(slab) [ 29.510201] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.510294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.510399] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.510473] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.510604] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.510688] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.510827] page dumped because: kasan: bad access detected [ 29.510857] [ 29.510875] Memory state around the buggy address: [ 29.510921] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.511125] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.511221] >fff00000c7809800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.511377] ^ [ 29.511433] fff00000c7809880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.511587] fff00000c7809900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.511664] ================================================================== [ 29.498331] ================================================================== [ 29.498397] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 29.498452] Read of size 1 at addr fff00000c7809800 by task kunit_try_catch/195 [ 29.498500] [ 29.498529] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.498610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.498635] Hardware name: linux,dummy-virt (DT) [ 29.498673] Call trace: [ 29.498697] show_stack+0x20/0x38 (C) [ 29.498744] dump_stack_lvl+0x8c/0xd0 [ 29.498799] print_report+0x118/0x5d0 [ 29.498853] kasan_report+0xdc/0x128 [ 29.498905] __kasan_check_byte+0x54/0x70 [ 29.498948] krealloc_noprof+0x44/0x360 [ 29.498996] krealloc_uaf+0x180/0x520 [ 29.499049] kunit_try_run_case+0x170/0x3f0 [ 29.499109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.499160] kthread+0x328/0x630 [ 29.499200] ret_from_fork+0x10/0x20 [ 29.499246] [ 29.499265] Allocated by task 195: [ 29.499293] kasan_save_stack+0x3c/0x68 [ 29.499331] kasan_save_track+0x20/0x40 [ 29.499374] kasan_save_alloc_info+0x40/0x58 [ 29.499412] __kasan_kmalloc+0xd4/0xd8 [ 29.499454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.499508] krealloc_uaf+0xc8/0x520 [ 29.499544] kunit_try_run_case+0x170/0x3f0 [ 29.499588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.499629] kthread+0x328/0x630 [ 29.499661] ret_from_fork+0x10/0x20 [ 29.499696] [ 29.499715] Freed by task 195: [ 29.499739] kasan_save_stack+0x3c/0x68 [ 29.499779] kasan_save_track+0x20/0x40 [ 29.499817] kasan_save_free_info+0x4c/0x78 [ 29.499854] __kasan_slab_free+0x6c/0x98 [ 29.499896] kfree+0x214/0x3c8 [ 29.499930] krealloc_uaf+0x12c/0x520 [ 29.499965] kunit_try_run_case+0x170/0x3f0 [ 29.500008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.500063] kthread+0x328/0x630 [ 29.500947] ret_from_fork+0x10/0x20 [ 29.501013] [ 29.501149] The buggy address belongs to the object at fff00000c7809800 [ 29.501149] which belongs to the cache kmalloc-256 of size 256 [ 29.501387] The buggy address is located 0 bytes inside of [ 29.501387] freed 256-byte region [fff00000c7809800, fff00000c7809900) [ 29.501489] [ 29.501537] The buggy address belongs to the physical page: [ 29.501569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.501752] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.501804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.501917] page_type: f5(slab) [ 29.502040] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.502121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.502253] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.502333] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.502387] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.502677] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.502742] page dumped because: kasan: bad access detected [ 29.502900] [ 29.502959] Memory state around the buggy address: [ 29.503021] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.503146] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.503198] >fff00000c7809800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.503327] ^ [ 29.503441] fff00000c7809880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.503481] fff00000c7809900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.503672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 29.412251] ================================================================== [ 29.412312] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.412632] Write of size 1 at addr fff00000c78096c9 by task kunit_try_catch/189 [ 29.412744] [ 29.412902] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.413032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.413181] Hardware name: linux,dummy-virt (DT) [ 29.413250] Call trace: [ 29.413382] show_stack+0x20/0x38 (C) [ 29.413439] dump_stack_lvl+0x8c/0xd0 [ 29.413507] print_report+0x118/0x5d0 [ 29.413551] kasan_report+0xdc/0x128 [ 29.413595] __asan_report_store1_noabort+0x20/0x30 [ 29.413797] krealloc_less_oob_helper+0xa48/0xc50 [ 29.414069] krealloc_less_oob+0x20/0x38 [ 29.414211] kunit_try_run_case+0x170/0x3f0 [ 29.414275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.414558] kthread+0x328/0x630 [ 29.414658] ret_from_fork+0x10/0x20 [ 29.414858] [ 29.414925] Allocated by task 189: [ 29.415039] kasan_save_stack+0x3c/0x68 [ 29.415137] kasan_save_track+0x20/0x40 [ 29.415275] kasan_save_alloc_info+0x40/0x58 [ 29.415382] __kasan_krealloc+0x118/0x178 [ 29.415522] krealloc_noprof+0x128/0x360 [ 29.415582] krealloc_less_oob_helper+0x168/0xc50 [ 29.415622] krealloc_less_oob+0x20/0x38 [ 29.415694] kunit_try_run_case+0x170/0x3f0 [ 29.416138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.416294] kthread+0x328/0x630 [ 29.416403] ret_from_fork+0x10/0x20 [ 29.416524] [ 29.416602] The buggy address belongs to the object at fff00000c7809600 [ 29.416602] which belongs to the cache kmalloc-256 of size 256 [ 29.416753] The buggy address is located 0 bytes to the right of [ 29.416753] allocated 201-byte region [fff00000c7809600, fff00000c78096c9) [ 29.416840] [ 29.416879] The buggy address belongs to the physical page: [ 29.416910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.416984] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.417030] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.417090] page_type: f5(slab) [ 29.417129] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.417177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.417279] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.417526] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.417598] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.417656] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.417709] page dumped because: kasan: bad access detected [ 29.417745] [ 29.417764] Memory state around the buggy address: [ 29.417798] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.417850] fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.417891] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.417938] ^ [ 29.417986] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.418029] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.418085] ================================================================== [ 29.436268] ================================================================== [ 29.436317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.436396] Write of size 1 at addr fff00000c78096ea by task kunit_try_catch/189 [ 29.436445] [ 29.436478] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.436559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.436584] Hardware name: linux,dummy-virt (DT) [ 29.436785] Call trace: [ 29.436813] show_stack+0x20/0x38 (C) [ 29.436865] dump_stack_lvl+0x8c/0xd0 [ 29.436913] print_report+0x118/0x5d0 [ 29.436957] kasan_report+0xdc/0x128 [ 29.436999] __asan_report_store1_noabort+0x20/0x30 [ 29.437047] krealloc_less_oob_helper+0xae4/0xc50 [ 29.437111] krealloc_less_oob+0x20/0x38 [ 29.437159] kunit_try_run_case+0x170/0x3f0 [ 29.437203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.437254] kthread+0x328/0x630 [ 29.437295] ret_from_fork+0x10/0x20 [ 29.437341] [ 29.437359] Allocated by task 189: [ 29.437386] kasan_save_stack+0x3c/0x68 [ 29.437423] kasan_save_track+0x20/0x40 [ 29.437457] kasan_save_alloc_info+0x40/0x58 [ 29.437494] __kasan_krealloc+0x118/0x178 [ 29.437528] krealloc_noprof+0x128/0x360 [ 29.437566] krealloc_less_oob_helper+0x168/0xc50 [ 29.437605] krealloc_less_oob+0x20/0x38 [ 29.437642] kunit_try_run_case+0x170/0x3f0 [ 29.437678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.437719] kthread+0x328/0x630 [ 29.437750] ret_from_fork+0x10/0x20 [ 29.437783] [ 29.437801] The buggy address belongs to the object at fff00000c7809600 [ 29.437801] which belongs to the cache kmalloc-256 of size 256 [ 29.437855] The buggy address is located 33 bytes to the right of [ 29.437855] allocated 201-byte region [fff00000c7809600, fff00000c78096c9) [ 29.437916] [ 29.437935] The buggy address belongs to the physical page: [ 29.437964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.438015] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.439564] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.439730] page_type: f5(slab) [ 29.439783] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.439866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.440193] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.440290] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.440408] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.440484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.440630] page dumped because: kasan: bad access detected [ 29.440667] [ 29.440684] Memory state around the buggy address: [ 29.440716] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440757] fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.440827] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.440863] ^ [ 29.440900] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440966] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.441003] ================================================================== [ 29.487464] ================================================================== [ 29.487661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.487740] Write of size 1 at addr fff00000c646a0eb by task kunit_try_catch/193 [ 29.487808] [ 29.487838] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.487925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.487952] Hardware name: linux,dummy-virt (DT) [ 29.488170] Call trace: [ 29.488238] show_stack+0x20/0x38 (C) [ 29.488357] dump_stack_lvl+0x8c/0xd0 [ 29.488410] print_report+0x118/0x5d0 [ 29.488453] kasan_report+0xdc/0x128 [ 29.488501] __asan_report_store1_noabort+0x20/0x30 [ 29.488645] krealloc_less_oob_helper+0xa58/0xc50 [ 29.488758] krealloc_large_less_oob+0x20/0x38 [ 29.488919] kunit_try_run_case+0x170/0x3f0 [ 29.488995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.489156] kthread+0x328/0x630 [ 29.489227] ret_from_fork+0x10/0x20 [ 29.489274] [ 29.489490] The buggy address belongs to the physical page: [ 29.489581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468 [ 29.489673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.489830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.489881] page_type: f8(unknown) [ 29.489936] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.490146] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.490304] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.490370] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.490498] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff [ 29.490546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.490603] page dumped because: kasan: bad access detected [ 29.490804] [ 29.490974] Memory state around the buggy address: [ 29.491065] fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.491212] fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.491273] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.491493] ^ [ 29.491642] fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.491706] fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.491807] ================================================================== [ 29.479317] ================================================================== [ 29.479391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.479441] Write of size 1 at addr fff00000c646a0da by task kunit_try_catch/193 [ 29.479542] [ 29.479579] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.479697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.479723] Hardware name: linux,dummy-virt (DT) [ 29.479773] Call trace: [ 29.479821] show_stack+0x20/0x38 (C) [ 29.479872] dump_stack_lvl+0x8c/0xd0 [ 29.479973] print_report+0x118/0x5d0 [ 29.480036] kasan_report+0xdc/0x128 [ 29.480186] __asan_report_store1_noabort+0x20/0x30 [ 29.480238] krealloc_less_oob_helper+0xa80/0xc50 [ 29.480295] krealloc_large_less_oob+0x20/0x38 [ 29.480436] kunit_try_run_case+0x170/0x3f0 [ 29.480483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.480541] kthread+0x328/0x630 [ 29.480586] ret_from_fork+0x10/0x20 [ 29.480977] [ 29.481017] The buggy address belongs to the physical page: [ 29.481130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468 [ 29.481203] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.481412] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.481569] page_type: f8(unknown) [ 29.481645] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.481709] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.481790] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.481855] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.481940] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff [ 29.482026] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.482084] page dumped because: kasan: bad access detected [ 29.482272] [ 29.482350] Memory state around the buggy address: [ 29.482471] fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.482525] fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.482571] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.482837] ^ [ 29.482930] fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.482993] fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.483109] ================================================================== [ 29.473391] ================================================================== [ 29.473434] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.473482] Write of size 1 at addr fff00000c646a0d0 by task kunit_try_catch/193 [ 29.473529] [ 29.473557] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.473641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.473850] Hardware name: linux,dummy-virt (DT) [ 29.474338] Call trace: [ 29.474560] show_stack+0x20/0x38 (C) [ 29.474661] dump_stack_lvl+0x8c/0xd0 [ 29.474711] print_report+0x118/0x5d0 [ 29.474762] kasan_report+0xdc/0x128 [ 29.474929] __asan_report_store1_noabort+0x20/0x30 [ 29.475004] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.475165] krealloc_large_less_oob+0x20/0x38 [ 29.475244] kunit_try_run_case+0x170/0x3f0 [ 29.475371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.475458] kthread+0x328/0x630 [ 29.475587] ret_from_fork+0x10/0x20 [ 29.475680] [ 29.475864] The buggy address belongs to the physical page: [ 29.475898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468 [ 29.476014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.476112] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.476244] page_type: f8(unknown) [ 29.476320] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.476607] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.476760] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.476841] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.476968] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff [ 29.477040] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.477146] page dumped because: kasan: bad access detected [ 29.477177] [ 29.477194] Memory state around the buggy address: [ 29.477245] fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.477286] fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.477487] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.477542] ^ [ 29.478013] fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.478077] fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.478179] ================================================================== [ 29.483652] ================================================================== [ 29.483715] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.483771] Write of size 1 at addr fff00000c646a0ea by task kunit_try_catch/193 [ 29.483827] [ 29.483958] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.484162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.484201] Hardware name: linux,dummy-virt (DT) [ 29.484238] Call trace: [ 29.484277] show_stack+0x20/0x38 (C) [ 29.484330] dump_stack_lvl+0x8c/0xd0 [ 29.484376] print_report+0x118/0x5d0 [ 29.484728] kasan_report+0xdc/0x128 [ 29.484814] __asan_report_store1_noabort+0x20/0x30 [ 29.484946] krealloc_less_oob_helper+0xae4/0xc50 [ 29.485021] krealloc_large_less_oob+0x20/0x38 [ 29.485117] kunit_try_run_case+0x170/0x3f0 [ 29.485163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.485213] kthread+0x328/0x630 [ 29.485256] ret_from_fork+0x10/0x20 [ 29.485307] [ 29.485342] The buggy address belongs to the physical page: [ 29.485381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468 [ 29.485439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.485484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.485538] page_type: f8(unknown) [ 29.485586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.485653] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.485701] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.485747] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.485804] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff [ 29.485860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.485898] page dumped because: kasan: bad access detected [ 29.485941] [ 29.485959] Memory state around the buggy address: [ 29.485988] fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.486030] fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.486082] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.486117] ^ [ 29.486153] fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.486200] fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.486251] ================================================================== [ 29.442130] ================================================================== [ 29.442206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.442269] Write of size 1 at addr fff00000c78096eb by task kunit_try_catch/189 [ 29.442349] [ 29.442410] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.442493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.442713] Hardware name: linux,dummy-virt (DT) [ 29.442817] Call trace: [ 29.442842] show_stack+0x20/0x38 (C) [ 29.442895] dump_stack_lvl+0x8c/0xd0 [ 29.442984] print_report+0x118/0x5d0 [ 29.443037] kasan_report+0xdc/0x128 [ 29.443325] __asan_report_store1_noabort+0x20/0x30 [ 29.443446] krealloc_less_oob_helper+0xa58/0xc50 [ 29.443501] krealloc_less_oob+0x20/0x38 [ 29.443547] kunit_try_run_case+0x170/0x3f0 [ 29.443630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.443707] kthread+0x328/0x630 [ 29.443749] ret_from_fork+0x10/0x20 [ 29.444018] [ 29.444101] Allocated by task 189: [ 29.444134] kasan_save_stack+0x3c/0x68 [ 29.444177] kasan_save_track+0x20/0x40 [ 29.444211] kasan_save_alloc_info+0x40/0x58 [ 29.444262] __kasan_krealloc+0x118/0x178 [ 29.444300] krealloc_noprof+0x128/0x360 [ 29.444439] krealloc_less_oob_helper+0x168/0xc50 [ 29.444494] krealloc_less_oob+0x20/0x38 [ 29.444532] kunit_try_run_case+0x170/0x3f0 [ 29.444642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.444707] kthread+0x328/0x630 [ 29.444874] ret_from_fork+0x10/0x20 [ 29.444920] [ 29.444940] The buggy address belongs to the object at fff00000c7809600 [ 29.444940] which belongs to the cache kmalloc-256 of size 256 [ 29.444996] The buggy address is located 34 bytes to the right of [ 29.444996] allocated 201-byte region [fff00000c7809600, fff00000c78096c9) [ 29.445076] [ 29.445095] The buggy address belongs to the physical page: [ 29.445126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.445222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.445270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.445320] page_type: f5(slab) [ 29.445357] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.445424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.445472] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.445519] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.445566] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.445612] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.445651] page dumped because: kasan: bad access detected [ 29.445680] [ 29.445697] Memory state around the buggy address: [ 29.445736] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.445777] fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.445826] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.445862] ^ [ 29.445898] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.445947] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.445982] ================================================================== [ 29.419696] ================================================================== [ 29.419746] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.419796] Write of size 1 at addr fff00000c78096d0 by task kunit_try_catch/189 [ 29.419992] [ 29.420033] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.420350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.420438] Hardware name: linux,dummy-virt (DT) [ 29.420520] Call trace: [ 29.420628] show_stack+0x20/0x38 (C) [ 29.420726] dump_stack_lvl+0x8c/0xd0 [ 29.420819] print_report+0x118/0x5d0 [ 29.420908] kasan_report+0xdc/0x128 [ 29.420951] __asan_report_store1_noabort+0x20/0x30 [ 29.420999] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.421047] krealloc_less_oob+0x20/0x38 [ 29.421495] kunit_try_run_case+0x170/0x3f0 [ 29.421655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.421770] kthread+0x328/0x630 [ 29.421919] ret_from_fork+0x10/0x20 [ 29.422026] [ 29.422142] Allocated by task 189: [ 29.422233] kasan_save_stack+0x3c/0x68 [ 29.422283] kasan_save_track+0x20/0x40 [ 29.422317] kasan_save_alloc_info+0x40/0x58 [ 29.422567] __kasan_krealloc+0x118/0x178 [ 29.422720] krealloc_noprof+0x128/0x360 [ 29.422878] krealloc_less_oob_helper+0x168/0xc50 [ 29.423002] krealloc_less_oob+0x20/0x38 [ 29.423187] kunit_try_run_case+0x170/0x3f0 [ 29.423243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.423342] kthread+0x328/0x630 [ 29.423724] ret_from_fork+0x10/0x20 [ 29.423889] [ 29.423981] The buggy address belongs to the object at fff00000c7809600 [ 29.423981] which belongs to the cache kmalloc-256 of size 256 [ 29.424189] The buggy address is located 7 bytes to the right of [ 29.424189] allocated 201-byte region [fff00000c7809600, fff00000c78096c9) [ 29.424290] [ 29.424336] The buggy address belongs to the physical page: [ 29.424433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.424488] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.424533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.424597] page_type: f5(slab) [ 29.424635] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.424842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.425012] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.425105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.425164] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.425212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.425249] page dumped because: kasan: bad access detected [ 29.425288] [ 29.425306] Memory state around the buggy address: [ 29.425336] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.425376] fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.425415] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.425451] ^ [ 29.425485] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.425535] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.425572] ================================================================== [ 29.427256] ================================================================== [ 29.427305] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.427354] Write of size 1 at addr fff00000c78096da by task kunit_try_catch/189 [ 29.427402] [ 29.427648] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.428127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.428427] Hardware name: linux,dummy-virt (DT) [ 29.428459] Call trace: [ 29.428481] show_stack+0x20/0x38 (C) [ 29.428531] dump_stack_lvl+0x8c/0xd0 [ 29.429201] print_report+0x118/0x5d0 [ 29.429536] kasan_report+0xdc/0x128 [ 29.430321] __asan_report_store1_noabort+0x20/0x30 [ 29.432740] krealloc_less_oob_helper+0xa80/0xc50 [ 29.432804] krealloc_less_oob+0x20/0x38 [ 29.432851] kunit_try_run_case+0x170/0x3f0 [ 29.432899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.432949] kthread+0x328/0x630 [ 29.432991] ret_from_fork+0x10/0x20 [ 29.433038] [ 29.433067] Allocated by task 189: [ 29.433096] kasan_save_stack+0x3c/0x68 [ 29.433135] kasan_save_track+0x20/0x40 [ 29.433169] kasan_save_alloc_info+0x40/0x58 [ 29.433205] __kasan_krealloc+0x118/0x178 [ 29.433267] krealloc_noprof+0x128/0x360 [ 29.433305] krealloc_less_oob_helper+0x168/0xc50 [ 29.433344] krealloc_less_oob+0x20/0x38 [ 29.433380] kunit_try_run_case+0x170/0x3f0 [ 29.433870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.433926] kthread+0x328/0x630 [ 29.433959] ret_from_fork+0x10/0x20 [ 29.433994] [ 29.434014] The buggy address belongs to the object at fff00000c7809600 [ 29.434014] which belongs to the cache kmalloc-256 of size 256 [ 29.434085] The buggy address is located 17 bytes to the right of [ 29.434085] allocated 201-byte region [fff00000c7809600, fff00000c78096c9) [ 29.434147] [ 29.434167] The buggy address belongs to the physical page: [ 29.434198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.434252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.434298] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.434349] page_type: f5(slab) [ 29.434389] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.434437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.434486] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.434533] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.434579] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.434626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.434664] page dumped because: kasan: bad access detected [ 29.434693] [ 29.434711] Memory state around the buggy address: [ 29.434741] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.434788] fff00000c7809600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.434828] >fff00000c7809680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.434864] ^ [ 29.434899] fff00000c7809700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.434938] fff00000c7809780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.434973] ================================================================== [ 29.469897] ================================================================== [ 29.469966] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.470025] Write of size 1 at addr fff00000c646a0c9 by task kunit_try_catch/193 [ 29.470087] [ 29.470120] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.470201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.470236] Hardware name: linux,dummy-virt (DT) [ 29.470267] Call trace: [ 29.470290] show_stack+0x20/0x38 (C) [ 29.470338] dump_stack_lvl+0x8c/0xd0 [ 29.470386] print_report+0x118/0x5d0 [ 29.470430] kasan_report+0xdc/0x128 [ 29.470473] __asan_report_store1_noabort+0x20/0x30 [ 29.470530] krealloc_less_oob_helper+0xa48/0xc50 [ 29.470587] krealloc_large_less_oob+0x20/0x38 [ 29.470635] kunit_try_run_case+0x170/0x3f0 [ 29.470691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470744] kthread+0x328/0x630 [ 29.470799] ret_from_fork+0x10/0x20 [ 29.470847] [ 29.470875] The buggy address belongs to the physical page: [ 29.470906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468 [ 29.470958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.471005] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.471394] page_type: f8(unknown) [ 29.471623] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.471753] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.471805] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.471868] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.471934] head: 0bfffe0000000002 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff [ 29.471988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.472122] page dumped because: kasan: bad access detected [ 29.472191] [ 29.472219] Memory state around the buggy address: [ 29.472274] fff00000c6469f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.472544] fff00000c646a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.472632] >fff00000c646a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.472762] ^ [ 29.472819] fff00000c646a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.472873] fff00000c646a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.473023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 29.458881] ================================================================== [ 29.458933] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.458983] Write of size 1 at addr fff00000c91920f0 by task kunit_try_catch/191 [ 29.459200] [ 29.459240] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.459338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.459364] Hardware name: linux,dummy-virt (DT) [ 29.459463] Call trace: [ 29.459489] show_stack+0x20/0x38 (C) [ 29.459565] dump_stack_lvl+0x8c/0xd0 [ 29.459785] print_report+0x118/0x5d0 [ 29.459940] kasan_report+0xdc/0x128 [ 29.459988] __asan_report_store1_noabort+0x20/0x30 [ 29.460041] krealloc_more_oob_helper+0x5c0/0x678 [ 29.460104] krealloc_large_more_oob+0x20/0x38 [ 29.460191] kunit_try_run_case+0x170/0x3f0 [ 29.460257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.460308] kthread+0x328/0x630 [ 29.460410] ret_from_fork+0x10/0x20 [ 29.460527] [ 29.460621] The buggy address belongs to the physical page: [ 29.460696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190 [ 29.460804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.460850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.460901] page_type: f8(unknown) [ 29.460939] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.461123] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.461203] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.461328] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.461480] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff [ 29.461564] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.461640] page dumped because: kasan: bad access detected [ 29.461760] [ 29.461819] Memory state around the buggy address: [ 29.461903] fff00000c9191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.462017] fff00000c9192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.462068] >fff00000c9192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.462386] ^ [ 29.462473] fff00000c9192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.462606] fff00000c9192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.462696] ================================================================== [ 29.452369] ================================================================== [ 29.452564] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.452750] Write of size 1 at addr fff00000c91920eb by task kunit_try_catch/191 [ 29.452806] [ 29.452842] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.452987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.453047] Hardware name: linux,dummy-virt (DT) [ 29.453165] Call trace: [ 29.453225] show_stack+0x20/0x38 (C) [ 29.453351] dump_stack_lvl+0x8c/0xd0 [ 29.453437] print_report+0x118/0x5d0 [ 29.453527] kasan_report+0xdc/0x128 [ 29.453649] __asan_report_store1_noabort+0x20/0x30 [ 29.453722] krealloc_more_oob_helper+0x60c/0x678 [ 29.454022] krealloc_large_more_oob+0x20/0x38 [ 29.454175] kunit_try_run_case+0x170/0x3f0 [ 29.454317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.454442] kthread+0x328/0x630 [ 29.454560] ret_from_fork+0x10/0x20 [ 29.454609] [ 29.454657] The buggy address belongs to the physical page: [ 29.454897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190 [ 29.455143] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.455227] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.455353] page_type: f8(unknown) [ 29.455448] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.455584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.455678] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.455894] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.455952] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff [ 29.456006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.456083] page dumped because: kasan: bad access detected [ 29.456173] [ 29.456240] Memory state around the buggy address: [ 29.456317] fff00000c9191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.456439] fff00000c9192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.456502] >fff00000c9192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.456606] ^ [ 29.456661] fff00000c9192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.456718] fff00000c9192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.456797] ================================================================== [ 29.397881] ================================================================== [ 29.398279] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.398356] Write of size 1 at addr fff00000c78094f0 by task kunit_try_catch/187 [ 29.398566] [ 29.398609] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.398859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.398887] Hardware name: linux,dummy-virt (DT) [ 29.398925] Call trace: [ 29.399093] show_stack+0x20/0x38 (C) [ 29.399149] dump_stack_lvl+0x8c/0xd0 [ 29.399337] print_report+0x118/0x5d0 [ 29.399397] kasan_report+0xdc/0x128 [ 29.399729] __asan_report_store1_noabort+0x20/0x30 [ 29.399877] krealloc_more_oob_helper+0x5c0/0x678 [ 29.399950] krealloc_more_oob+0x20/0x38 [ 29.400152] kunit_try_run_case+0x170/0x3f0 [ 29.400381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.400447] kthread+0x328/0x630 [ 29.400637] ret_from_fork+0x10/0x20 [ 29.400996] [ 29.401017] Allocated by task 187: [ 29.401046] kasan_save_stack+0x3c/0x68 [ 29.401346] kasan_save_track+0x20/0x40 [ 29.401493] kasan_save_alloc_info+0x40/0x58 [ 29.401629] __kasan_krealloc+0x118/0x178 [ 29.401685] krealloc_noprof+0x128/0x360 [ 29.401743] krealloc_more_oob_helper+0x168/0x678 [ 29.401978] krealloc_more_oob+0x20/0x38 [ 29.402190] kunit_try_run_case+0x170/0x3f0 [ 29.402253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.402507] kthread+0x328/0x630 [ 29.402654] ret_from_fork+0x10/0x20 [ 29.402763] [ 29.402798] The buggy address belongs to the object at fff00000c7809400 [ 29.402798] which belongs to the cache kmalloc-256 of size 256 [ 29.402855] The buggy address is located 5 bytes to the right of [ 29.402855] allocated 235-byte region [fff00000c7809400, fff00000c78094eb) [ 29.402972] [ 29.403002] The buggy address belongs to the physical page: [ 29.403040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.403110] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.403167] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.403223] page_type: f5(slab) [ 29.403282] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.403340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.403389] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.403436] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.403484] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.403540] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.403578] page dumped because: kasan: bad access detected [ 29.403613] [ 29.403631] Memory state around the buggy address: [ 29.403660] fff00000c7809380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.403702] fff00000c7809400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.403751] >fff00000c7809480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.403786] ^ [ 29.403824] fff00000c7809500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.403864] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.403908] ================================================================== [ 29.388157] ================================================================== [ 29.388441] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.388509] Write of size 1 at addr fff00000c78094eb by task kunit_try_catch/187 [ 29.388997] [ 29.389217] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.389315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.389498] Hardware name: linux,dummy-virt (DT) [ 29.389534] Call trace: [ 29.389575] show_stack+0x20/0x38 (C) [ 29.389651] dump_stack_lvl+0x8c/0xd0 [ 29.389708] print_report+0x118/0x5d0 [ 29.389753] kasan_report+0xdc/0x128 [ 29.389800] __asan_report_store1_noabort+0x20/0x30 [ 29.389848] krealloc_more_oob_helper+0x60c/0x678 [ 29.389913] krealloc_more_oob+0x20/0x38 [ 29.389960] kunit_try_run_case+0x170/0x3f0 [ 29.390015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.390087] kthread+0x328/0x630 [ 29.390129] ret_from_fork+0x10/0x20 [ 29.390188] [ 29.390212] Allocated by task 187: [ 29.390241] kasan_save_stack+0x3c/0x68 [ 29.390279] kasan_save_track+0x20/0x40 [ 29.390323] kasan_save_alloc_info+0x40/0x58 [ 29.390359] __kasan_krealloc+0x118/0x178 [ 29.390394] krealloc_noprof+0x128/0x360 [ 29.390432] krealloc_more_oob_helper+0x168/0x678 [ 29.390471] krealloc_more_oob+0x20/0x38 [ 29.390516] kunit_try_run_case+0x170/0x3f0 [ 29.390557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.390598] kthread+0x328/0x630 [ 29.390636] ret_from_fork+0x10/0x20 [ 29.390680] [ 29.390699] The buggy address belongs to the object at fff00000c7809400 [ 29.390699] which belongs to the cache kmalloc-256 of size 256 [ 29.390754] The buggy address is located 0 bytes to the right of [ 29.390754] allocated 235-byte region [fff00000c7809400, fff00000c78094eb) [ 29.390826] [ 29.390845] The buggy address belongs to the physical page: [ 29.390883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107808 [ 29.390943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.390997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.391047] page_type: f5(slab) [ 29.391788] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.391893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.392170] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 29.392232] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.392691] head: 0bfffe0000000001 ffffc1ffc31e0201 00000000ffffffff 00000000ffffffff [ 29.392802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.392979] page dumped because: kasan: bad access detected [ 29.393009] [ 29.393359] Memory state around the buggy address: [ 29.393442] fff00000c7809380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.393531] fff00000c7809400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.393732] >fff00000c7809480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.393940] ^ [ 29.394003] fff00000c7809500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.394121] fff00000c7809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.394203] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 29.371015] ================================================================== [ 29.371104] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 29.371297] Read of size 1 at addr fff00000c9af0000 by task kunit_try_catch/185 [ 29.371394] [ 29.371429] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.371573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.371599] Hardware name: linux,dummy-virt (DT) [ 29.371646] Call trace: [ 29.371962] show_stack+0x20/0x38 (C) [ 29.372097] dump_stack_lvl+0x8c/0xd0 [ 29.372172] print_report+0x118/0x5d0 [ 29.372272] kasan_report+0xdc/0x128 [ 29.372317] __asan_report_load1_noabort+0x20/0x30 [ 29.372499] page_alloc_uaf+0x328/0x350 [ 29.372567] kunit_try_run_case+0x170/0x3f0 [ 29.372643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.372920] kthread+0x328/0x630 [ 29.373078] ret_from_fork+0x10/0x20 [ 29.373282] [ 29.373391] The buggy address belongs to the physical page: [ 29.373494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.373570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.373761] page_type: f0(buddy) [ 29.374030] raw: 0bfffe0000000000 fff00000ff6160e0 fff00000ff6160e0 0000000000000000 [ 29.374231] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 29.374402] page dumped because: kasan: bad access detected [ 29.374530] [ 29.374626] Memory state around the buggy address: [ 29.374703] fff00000c9aeff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.374797] fff00000c9aeff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.374905] >fff00000c9af0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.374976] ^ [ 29.375048] fff00000c9af0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.375386] fff00000c9af0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.375510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 29.344508] ================================================================== [ 29.344823] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.344891] Free of addr fff00000c9190001 by task kunit_try_catch/181 [ 29.345305] [ 29.345354] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.345512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.345602] Hardware name: linux,dummy-virt (DT) [ 29.345757] Call trace: [ 29.345838] show_stack+0x20/0x38 (C) [ 29.346298] dump_stack_lvl+0x8c/0xd0 [ 29.346392] print_report+0x118/0x5d0 [ 29.346464] kasan_report_invalid_free+0xc0/0xe8 [ 29.346818] __kasan_kfree_large+0x5c/0xa8 [ 29.346874] free_large_kmalloc+0x68/0x150 [ 29.347085] kfree+0x270/0x3c8 [ 29.347267] kmalloc_large_invalid_free+0x108/0x270 [ 29.347400] kunit_try_run_case+0x170/0x3f0 [ 29.347672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.347775] kthread+0x328/0x630 [ 29.347996] ret_from_fork+0x10/0x20 [ 29.348445] [ 29.348652] The buggy address belongs to the physical page: [ 29.348770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109190 [ 29.348856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.348979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.349138] page_type: f8(unknown) [ 29.349233] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.349350] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.349401] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.349448] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.349952] head: 0bfffe0000000002 ffffc1ffc3246401 00000000ffffffff 00000000ffffffff [ 29.350097] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.350180] page dumped because: kasan: bad access detected [ 29.350388] [ 29.350555] Memory state around the buggy address: [ 29.350604] fff00000c918ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.350873] fff00000c918ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.351145] >fff00000c9190000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.351360] ^ [ 29.351449] fff00000c9190080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.351540] fff00000c9190100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.351636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.329275] ================================================================== [ 29.329458] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.329745] Read of size 1 at addr fff00000c91b8000 by task kunit_try_catch/179 [ 29.330042] [ 29.330126] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.330275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.330366] Hardware name: linux,dummy-virt (DT) [ 29.330499] Call trace: [ 29.330569] show_stack+0x20/0x38 (C) [ 29.330935] dump_stack_lvl+0x8c/0xd0 [ 29.331109] print_report+0x118/0x5d0 [ 29.331250] kasan_report+0xdc/0x128 [ 29.331333] __asan_report_load1_noabort+0x20/0x30 [ 29.331383] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.331785] kunit_try_run_case+0x170/0x3f0 [ 29.331890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.331989] kthread+0x328/0x630 [ 29.332168] ret_from_fork+0x10/0x20 [ 29.332250] [ 29.332469] The buggy address belongs to the physical page: [ 29.332557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b8 [ 29.332821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.332966] raw: 0bfffe0000000000 ffffc1ffc3246408 fff00000da472d00 0000000000000000 [ 29.333016] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.333063] page dumped because: kasan: bad access detected [ 29.333363] [ 29.333395] Memory state around the buggy address: [ 29.333514] fff00000c91b7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.333568] fff00000c91b7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.333610] >fff00000c91b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.333647] ^ [ 29.333675] fff00000c91b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.333714] fff00000c91b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.333751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.318164] ================================================================== [ 29.318231] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.318281] Write of size 1 at addr fff00000c91ba00a by task kunit_try_catch/177 [ 29.318328] [ 29.318355] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.318436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.318461] Hardware name: linux,dummy-virt (DT) [ 29.318489] Call trace: [ 29.318511] show_stack+0x20/0x38 (C) [ 29.318556] dump_stack_lvl+0x8c/0xd0 [ 29.318603] print_report+0x118/0x5d0 [ 29.318645] kasan_report+0xdc/0x128 [ 29.318686] __asan_report_store1_noabort+0x20/0x30 [ 29.318734] kmalloc_large_oob_right+0x278/0x2b8 [ 29.318787] kunit_try_run_case+0x170/0x3f0 [ 29.318832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.318881] kthread+0x328/0x630 [ 29.318922] ret_from_fork+0x10/0x20 [ 29.318967] [ 29.318996] The buggy address belongs to the physical page: [ 29.319025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b8 [ 29.319177] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.319231] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.319300] page_type: f8(unknown) [ 29.319342] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.319390] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.319439] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.319486] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.319533] head: 0bfffe0000000002 ffffc1ffc3246e01 00000000ffffffff 00000000ffffffff [ 29.319580] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.319617] page dumped because: kasan: bad access detected [ 29.319898] [ 29.319995] Memory state around the buggy address: [ 29.320069] fff00000c91b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.320421] fff00000c91b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.320498] >fff00000c91ba000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.320566] ^ [ 29.320692] fff00000c91ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.320733] fff00000c91ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.320786] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.310080] ================================================================== [ 29.310152] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.310227] Write of size 1 at addr fff00000c9ad1f00 by task kunit_try_catch/175 [ 29.310299] [ 29.310345] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.310433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.310476] Hardware name: linux,dummy-virt (DT) [ 29.310522] Call trace: [ 29.310570] show_stack+0x20/0x38 (C) [ 29.310644] dump_stack_lvl+0x8c/0xd0 [ 29.310722] print_report+0x118/0x5d0 [ 29.310791] kasan_report+0xdc/0x128 [ 29.310835] __asan_report_store1_noabort+0x20/0x30 [ 29.311128] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.311188] kunit_try_run_case+0x170/0x3f0 [ 29.311251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.311301] kthread+0x328/0x630 [ 29.311342] ret_from_fork+0x10/0x20 [ 29.311394] [ 29.311431] Allocated by task 175: [ 29.311460] kasan_save_stack+0x3c/0x68 [ 29.311497] kasan_save_track+0x20/0x40 [ 29.311532] kasan_save_alloc_info+0x40/0x58 [ 29.311723] __kasan_kmalloc+0xd4/0xd8 [ 29.311760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.311818] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.311897] kunit_try_run_case+0x170/0x3f0 [ 29.311933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.311974] kthread+0x328/0x630 [ 29.312022] ret_from_fork+0x10/0x20 [ 29.312067] [ 29.312085] The buggy address belongs to the object at fff00000c9ad0000 [ 29.312085] which belongs to the cache kmalloc-8k of size 8192 [ 29.312139] The buggy address is located 0 bytes to the right of [ 29.312139] allocated 7936-byte region [fff00000c9ad0000, fff00000c9ad1f00) [ 29.312198] [ 29.312219] The buggy address belongs to the physical page: [ 29.312266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad0 [ 29.312315] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.312359] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.312421] page_type: f5(slab) [ 29.312476] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.312607] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.312689] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.312804] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.312909] head: 0bfffe0000000003 ffffc1ffc326b401 00000000ffffffff 00000000ffffffff [ 29.312993] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.313043] page dumped because: kasan: bad access detected [ 29.313081] [ 29.313099] Memory state around the buggy address: [ 29.313128] fff00000c9ad1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.313295] fff00000c9ad1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.313336] >fff00000c9ad1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.313371] ^ [ 29.313405] fff00000c9ad1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.313444] fff00000c9ad2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.313518] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.301859] ================================================================== [ 29.301927] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 29.301978] Write of size 1 at addr fff00000c59f9d78 by task kunit_try_catch/173 [ 29.302077] [ 29.302124] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.302228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.302284] Hardware name: linux,dummy-virt (DT) [ 29.302354] Call trace: [ 29.302381] show_stack+0x20/0x38 (C) [ 29.302462] dump_stack_lvl+0x8c/0xd0 [ 29.302510] print_report+0x118/0x5d0 [ 29.302553] kasan_report+0xdc/0x128 [ 29.302606] __asan_report_store1_noabort+0x20/0x30 [ 29.302671] kmalloc_track_caller_oob_right+0x418/0x488 [ 29.302723] kunit_try_run_case+0x170/0x3f0 [ 29.302781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.302832] kthread+0x328/0x630 [ 29.302875] ret_from_fork+0x10/0x20 [ 29.303133] [ 29.303172] Allocated by task 173: [ 29.303228] kasan_save_stack+0x3c/0x68 [ 29.303289] kasan_save_track+0x20/0x40 [ 29.303353] kasan_save_alloc_info+0x40/0x58 [ 29.303408] __kasan_kmalloc+0xd4/0xd8 [ 29.303461] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.303559] kmalloc_track_caller_oob_right+0x184/0x488 [ 29.303601] kunit_try_run_case+0x170/0x3f0 [ 29.303636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.303693] kthread+0x328/0x630 [ 29.303744] ret_from_fork+0x10/0x20 [ 29.303805] [ 29.303843] The buggy address belongs to the object at fff00000c59f9d00 [ 29.303843] which belongs to the cache kmalloc-128 of size 128 [ 29.303925] The buggy address is located 0 bytes to the right of [ 29.303925] allocated 120-byte region [fff00000c59f9d00, fff00000c59f9d78) [ 29.304064] [ 29.304102] The buggy address belongs to the physical page: [ 29.304130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.304179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.304242] page_type: f5(slab) [ 29.304993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.305048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.305442] page dumped because: kasan: bad access detected [ 29.305472] [ 29.305489] Memory state around the buggy address: [ 29.305518] fff00000c59f9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.305559] fff00000c59f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305599] >fff00000c59f9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.305634] ^ [ 29.305671] fff00000c59f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305710] fff00000c59f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.305745] ================================================================== [ 29.296600] ================================================================== [ 29.296727] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.296809] Write of size 1 at addr fff00000c59f9c78 by task kunit_try_catch/173 [ 29.296899] [ 29.296941] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.297023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.297202] Hardware name: linux,dummy-virt (DT) [ 29.297300] Call trace: [ 29.297449] show_stack+0x20/0x38 (C) [ 29.297578] dump_stack_lvl+0x8c/0xd0 [ 29.297719] print_report+0x118/0x5d0 [ 29.297788] kasan_report+0xdc/0x128 [ 29.297874] __asan_report_store1_noabort+0x20/0x30 [ 29.297935] kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.298010] kunit_try_run_case+0x170/0x3f0 [ 29.298171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.298332] kthread+0x328/0x630 [ 29.298412] ret_from_fork+0x10/0x20 [ 29.298459] [ 29.298477] Allocated by task 173: [ 29.298505] kasan_save_stack+0x3c/0x68 [ 29.298542] kasan_save_track+0x20/0x40 [ 29.298576] kasan_save_alloc_info+0x40/0x58 [ 29.298612] __kasan_kmalloc+0xd4/0xd8 [ 29.298644] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.298723] kmalloc_track_caller_oob_right+0xa8/0x488 [ 29.298778] kunit_try_run_case+0x170/0x3f0 [ 29.298812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.298853] kthread+0x328/0x630 [ 29.298896] ret_from_fork+0x10/0x20 [ 29.299020] [ 29.299108] The buggy address belongs to the object at fff00000c59f9c00 [ 29.299108] which belongs to the cache kmalloc-128 of size 128 [ 29.299205] The buggy address is located 0 bytes to the right of [ 29.299205] allocated 120-byte region [fff00000c59f9c00, fff00000c59f9c78) [ 29.299310] [ 29.299346] The buggy address belongs to the physical page: [ 29.299394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.299497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.299616] page_type: f5(slab) [ 29.299700] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.299840] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.299980] page dumped because: kasan: bad access detected [ 29.300010] [ 29.300028] Memory state around the buggy address: [ 29.300077] fff00000c59f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.300118] fff00000c59f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300158] >fff00000c59f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.300442] ^ [ 29.300546] fff00000c59f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300651] fff00000c59f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300736] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.287372] ================================================================== [ 29.287432] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.287484] Read of size 1 at addr fff00000c992f000 by task kunit_try_catch/171 [ 29.287532] [ 29.287560] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.287656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.287692] Hardware name: linux,dummy-virt (DT) [ 29.287736] Call trace: [ 29.287765] show_stack+0x20/0x38 (C) [ 29.287813] dump_stack_lvl+0x8c/0xd0 [ 29.287860] print_report+0x118/0x5d0 [ 29.287903] kasan_report+0xdc/0x128 [ 29.287946] __asan_report_load1_noabort+0x20/0x30 [ 29.287993] kmalloc_node_oob_right+0x2f4/0x330 [ 29.288047] kunit_try_run_case+0x170/0x3f0 [ 29.288420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.288518] kthread+0x328/0x630 [ 29.288646] ret_from_fork+0x10/0x20 [ 29.288755] [ 29.288774] Allocated by task 171: [ 29.288819] kasan_save_stack+0x3c/0x68 [ 29.288909] kasan_save_track+0x20/0x40 [ 29.289001] kasan_save_alloc_info+0x40/0x58 [ 29.289050] __kasan_kmalloc+0xd4/0xd8 [ 29.289096] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.289137] kmalloc_node_oob_right+0xbc/0x330 [ 29.289175] kunit_try_run_case+0x170/0x3f0 [ 29.289210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.289404] kthread+0x328/0x630 [ 29.289441] ret_from_fork+0x10/0x20 [ 29.289508] [ 29.289565] The buggy address belongs to the object at fff00000c992e000 [ 29.289565] which belongs to the cache kmalloc-4k of size 4096 [ 29.289650] The buggy address is located 0 bytes to the right of [ 29.289650] allocated 4096-byte region [fff00000c992e000, fff00000c992f000) [ 29.289724] [ 29.289787] The buggy address belongs to the physical page: [ 29.290001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109928 [ 29.290389] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.290497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.290800] page_type: f5(slab) [ 29.290951] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.291046] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.291175] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.291259] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.291371] head: 0bfffe0000000003 ffffc1ffc3264a01 00000000ffffffff 00000000ffffffff [ 29.291465] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.291543] page dumped because: kasan: bad access detected [ 29.291614] [ 29.291632] Memory state around the buggy address: [ 29.291662] fff00000c992ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.291721] fff00000c992ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.292065] >fff00000c992f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.292143] ^ [ 29.292253] fff00000c992f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.292296] fff00000c992f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.292377] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.275465] ================================================================== [ 29.275550] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.275605] Read of size 1 at addr fff00000c7ac92bf by task kunit_try_catch/169 [ 29.275653] [ 29.275719] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.275803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.275829] Hardware name: linux,dummy-virt (DT) [ 29.275858] Call trace: [ 29.275880] show_stack+0x20/0x38 (C) [ 29.275929] dump_stack_lvl+0x8c/0xd0 [ 29.275976] print_report+0x118/0x5d0 [ 29.276019] kasan_report+0xdc/0x128 [ 29.276074] __asan_report_load1_noabort+0x20/0x30 [ 29.276127] kmalloc_oob_left+0x2ec/0x320 [ 29.276174] kunit_try_run_case+0x170/0x3f0 [ 29.276234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.276286] kthread+0x328/0x630 [ 29.276327] ret_from_fork+0x10/0x20 [ 29.276767] [ 29.276814] Allocated by task 21: [ 29.276847] kasan_save_stack+0x3c/0x68 [ 29.276887] kasan_save_track+0x20/0x40 [ 29.276921] kasan_save_alloc_info+0x40/0x58 [ 29.276958] __kasan_kmalloc+0xd4/0xd8 [ 29.276992] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.277034] build_sched_domains+0x32c/0x36c0 [ 29.277088] partition_sched_domains+0x79c/0x1098 [ 29.277125] rebuild_sched_domains_locked+0x494/0xde0 [ 29.277362] cpuset_handle_hotplug+0xab0/0x1480 [ 29.277489] cpuset_update_active_cpus+0x18/0x30 [ 29.277567] sched_cpu_activate+0x2d0/0x388 [ 29.277730] cpuhp_invoke_callback+0x5b8/0x1630 [ 29.277770] cpuhp_thread_fun+0x230/0x5d8 [ 29.278048] smpboot_thread_fn+0x2e8/0x760 [ 29.278165] kthread+0x328/0x630 [ 29.278277] ret_from_fork+0x10/0x20 [ 29.278346] [ 29.278457] Freed by task 21: [ 29.278551] kasan_save_stack+0x3c/0x68 [ 29.278587] kasan_save_track+0x20/0x40 [ 29.278872] kasan_save_free_info+0x4c/0x78 [ 29.278949] __kasan_slab_free+0x6c/0x98 [ 29.279076] kfree+0x214/0x3c8 [ 29.279176] destroy_sched_domain+0xdc/0x120 [ 29.279294] cpu_attach_domain+0xff8/0x15c0 [ 29.279334] build_sched_domains+0x299c/0x36c0 [ 29.279596] partition_sched_domains+0x79c/0x1098 [ 29.279732] rebuild_sched_domains_locked+0x494/0xde0 [ 29.279813] cpuset_handle_hotplug+0xab0/0x1480 [ 29.279895] cpuset_update_active_cpus+0x18/0x30 [ 29.279983] sched_cpu_activate+0x2d0/0x388 [ 29.280079] cpuhp_invoke_callback+0x5b8/0x1630 [ 29.280134] cpuhp_thread_fun+0x230/0x5d8 [ 29.280169] smpboot_thread_fn+0x2e8/0x760 [ 29.280448] kthread+0x328/0x630 [ 29.280510] ret_from_fork+0x10/0x20 [ 29.280616] [ 29.280651] The buggy address belongs to the object at fff00000c7ac92a0 [ 29.280651] which belongs to the cache kmalloc-16 of size 16 [ 29.280744] The buggy address is located 15 bytes to the right of [ 29.280744] allocated 16-byte region [fff00000c7ac92a0, fff00000c7ac92b0) [ 29.280821] [ 29.280840] The buggy address belongs to the physical page: [ 29.280912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ac9 [ 29.280964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.281010] page_type: f5(slab) [ 29.281049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.281112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.281151] page dumped because: kasan: bad access detected [ 29.281183] [ 29.281200] Memory state around the buggy address: [ 29.281376] fff00000c7ac9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.281465] fff00000c7ac9200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 29.281562] >fff00000c7ac9280: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 29.281633] ^ [ 29.281703] fff00000c7ac9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.281766] fff00000c7ac9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.281845] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.252367] ================================================================== [ 29.253022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.255305] Write of size 1 at addr fff00000c59f9773 by task kunit_try_catch/167 [ 29.255414] [ 29.256183] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.256330] Tainted: [N]=TEST [ 29.256362] Hardware name: linux,dummy-virt (DT) [ 29.256621] Call trace: [ 29.256804] show_stack+0x20/0x38 (C) [ 29.256937] dump_stack_lvl+0x8c/0xd0 [ 29.256992] print_report+0x118/0x5d0 [ 29.257036] kasan_report+0xdc/0x128 [ 29.257093] __asan_report_store1_noabort+0x20/0x30 [ 29.257142] kmalloc_oob_right+0x5a4/0x660 [ 29.257189] kunit_try_run_case+0x170/0x3f0 [ 29.257239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.257291] kthread+0x328/0x630 [ 29.257337] ret_from_fork+0x10/0x20 [ 29.257495] [ 29.257532] Allocated by task 167: [ 29.257647] kasan_save_stack+0x3c/0x68 [ 29.257710] kasan_save_track+0x20/0x40 [ 29.257746] kasan_save_alloc_info+0x40/0x58 [ 29.257783] __kasan_kmalloc+0xd4/0xd8 [ 29.257818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.257859] kmalloc_oob_right+0xb0/0x660 [ 29.257896] kunit_try_run_case+0x170/0x3f0 [ 29.257932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.257973] kthread+0x328/0x630 [ 29.258004] ret_from_fork+0x10/0x20 [ 29.258072] [ 29.258133] The buggy address belongs to the object at fff00000c59f9700 [ 29.258133] which belongs to the cache kmalloc-128 of size 128 [ 29.258226] The buggy address is located 0 bytes to the right of [ 29.258226] allocated 115-byte region [fff00000c59f9700, fff00000c59f9773) [ 29.258291] [ 29.258374] The buggy address belongs to the physical page: [ 29.258571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.258847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.259144] page_type: f5(slab) [ 29.259437] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.259497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.259599] page dumped because: kasan: bad access detected [ 29.259637] [ 29.259663] Memory state around the buggy address: [ 29.259884] fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.259948] fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.260000] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.260052] ^ [ 29.260147] fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.260187] fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.260247] ================================================================== [ 29.261022] ================================================================== [ 29.261076] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.261125] Write of size 1 at addr fff00000c59f9778 by task kunit_try_catch/167 [ 29.261183] [ 29.261212] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.261292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.261322] Hardware name: linux,dummy-virt (DT) [ 29.261351] Call trace: [ 29.261372] show_stack+0x20/0x38 (C) [ 29.261434] dump_stack_lvl+0x8c/0xd0 [ 29.261482] print_report+0x118/0x5d0 [ 29.261525] kasan_report+0xdc/0x128 [ 29.261579] __asan_report_store1_noabort+0x20/0x30 [ 29.261637] kmalloc_oob_right+0x538/0x660 [ 29.261683] kunit_try_run_case+0x170/0x3f0 [ 29.261728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.261778] kthread+0x328/0x630 [ 29.261819] ret_from_fork+0x10/0x20 [ 29.261865] [ 29.261882] Allocated by task 167: [ 29.261908] kasan_save_stack+0x3c/0x68 [ 29.261954] kasan_save_track+0x20/0x40 [ 29.261989] kasan_save_alloc_info+0x40/0x58 [ 29.262025] __kasan_kmalloc+0xd4/0xd8 [ 29.262071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.262110] kmalloc_oob_right+0xb0/0x660 [ 29.262145] kunit_try_run_case+0x170/0x3f0 [ 29.262180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.262220] kthread+0x328/0x630 [ 29.262251] ret_from_fork+0x10/0x20 [ 29.262285] [ 29.262303] The buggy address belongs to the object at fff00000c59f9700 [ 29.262303] which belongs to the cache kmalloc-128 of size 128 [ 29.262356] The buggy address is located 5 bytes to the right of [ 29.262356] allocated 115-byte region [fff00000c59f9700, fff00000c59f9773) [ 29.262417] [ 29.262435] The buggy address belongs to the physical page: [ 29.262462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.262510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.262554] page_type: f5(slab) [ 29.262591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.262638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.262676] page dumped because: kasan: bad access detected [ 29.262704] [ 29.262721] Memory state around the buggy address: [ 29.262749] fff00000c59f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.262794] fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262834] >fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.262870] ^ [ 29.262907] fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262946] fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.262982] ================================================================== [ 29.263114] ================================================================== [ 29.263165] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.263234] Read of size 1 at addr fff00000c59f9780 by task kunit_try_catch/167 [ 29.263342] [ 29.263369] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.263449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.263475] Hardware name: linux,dummy-virt (DT) [ 29.263503] Call trace: [ 29.263539] show_stack+0x20/0x38 (C) [ 29.263615] dump_stack_lvl+0x8c/0xd0 [ 29.263684] print_report+0x118/0x5d0 [ 29.263728] kasan_report+0xdc/0x128 [ 29.263807] __asan_report_load1_noabort+0x20/0x30 [ 29.263878] kmalloc_oob_right+0x5d0/0x660 [ 29.263944] kunit_try_run_case+0x170/0x3f0 [ 29.263999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.264089] kthread+0x328/0x630 [ 29.264132] ret_from_fork+0x10/0x20 [ 29.264436] [ 29.264467] Allocated by task 167: [ 29.264503] kasan_save_stack+0x3c/0x68 [ 29.264540] kasan_save_track+0x20/0x40 [ 29.264580] kasan_save_alloc_info+0x40/0x58 [ 29.264617] __kasan_kmalloc+0xd4/0xd8 [ 29.264650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.264688] kmalloc_oob_right+0xb0/0x660 [ 29.264725] kunit_try_run_case+0x170/0x3f0 [ 29.264760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.264859] kthread+0x328/0x630 [ 29.264931] ret_from_fork+0x10/0x20 [ 29.264982] [ 29.265000] The buggy address belongs to the object at fff00000c59f9700 [ 29.265000] which belongs to the cache kmalloc-128 of size 128 [ 29.265110] The buggy address is located 13 bytes to the right of [ 29.265110] allocated 115-byte region [fff00000c59f9700, fff00000c59f9773) [ 29.265212] [ 29.265258] The buggy address belongs to the physical page: [ 29.265286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f9 [ 29.265596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.265707] page_type: f5(slab) [ 29.265756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.265826] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.265901] page dumped because: kasan: bad access detected [ 29.265968] [ 29.266018] Memory state around the buggy address: [ 29.266124] fff00000c59f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266198] fff00000c59f9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.266239] >fff00000c59f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266542] ^ [ 29.266596] fff00000c59f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.266653] fff00000c59f9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266717] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 112.176339] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689 [ 112.177347] Modules linked in: [ 112.177617] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 112.178376] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 112.178748] Hardware name: linux,dummy-virt (DT) [ 112.179087] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.179414] pc : intlog10+0x38/0x48 [ 112.179591] lr : intlog10_test+0xe4/0x200 [ 112.179817] sp : ffff8000824a7c10 [ 112.180025] x29: ffff8000824a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 112.180523] x26: 1ffe00001902be81 x25: 0000000000000000 x24: ffff8000824a7ce0 [ 112.180974] x23: ffff8000824a7d00 x22: 0000000000000000 x21: 1ffff00010494f82 [ 112.181416] x20: ffffad48b6241d20 x19: ffff800080087990 x18: 00000000a5feda8c [ 112.181881] x17: 000000004dbfd588 x16: fff00000c642583c x15: 00000000ba16e7d6 [ 112.182351] x14: 000000007497e445 x13: 1ffe00001b48dddd x12: ffff75a917428b89 [ 112.182755] x11: 1ffff5a917428b88 x10: ffff75a917428b88 x9 : ffffad48b38559fc [ 112.183134] x8 : ffffad48ba145c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 112.183570] x5 : ffff700010494f82 x4 : 1ffff00010010f3b x3 : 1ffff5a916c483a4 [ 112.183944] x2 : 1ffff5a916c483a4 x1 : 0000000000000003 x0 : 0000000000000000 [ 112.184351] Call trace: [ 112.184552] intlog10+0x38/0x48 (P) [ 112.184791] kunit_try_run_case+0x170/0x3f0 [ 112.185051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.185382] kthread+0x328/0x630 [ 112.185558] ret_from_fork+0x10/0x20 [ 112.185788] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 112.128789] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/671 [ 112.132709] Modules linked in: [ 112.133349] CPU: 0 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 112.134743] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 112.135518] Hardware name: linux,dummy-virt (DT) [ 112.136195] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.136880] pc : intlog2+0xd8/0xf8 [ 112.137285] lr : intlog2_test+0xe4/0x200 [ 112.137841] sp : ffff8000823d7c10 [ 112.138157] x29: ffff8000823d7c90 x28: 0000000000000000 x27: 0000000000000000 [ 112.138516] x26: 1ffe0000190c8241 x25: 0000000000000000 x24: ffff8000823d7ce0 [ 112.138873] x23: ffff8000823d7d00 x22: 0000000000000000 x21: 1ffff0001047af82 [ 112.139264] x20: ffffad48b6241c20 x19: ffff800080087990 x18: 000000004004657d [ 112.139682] x17: 0000000030df212a x16: fff00000c642583c x15: fff00000ff616b48 [ 112.140132] x14: 0000000000018fff x13: 1ffe00001b48dddd x12: ffff75a917428b89 [ 112.140556] x11: 1ffff5a917428b88 x10: ffff75a917428b88 x9 : ffffad48b3855bfc [ 112.140943] x8 : ffffad48ba145c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 112.141402] x5 : ffff70001047af82 x4 : 1ffff00010010f3b x3 : 1ffff5a916c48384 [ 112.141828] x2 : 1ffff5a916c48384 x1 : 0000000000000003 x0 : 0000000000000000 [ 112.142250] Call trace: [ 112.142419] intlog2+0xd8/0xf8 (P) [ 112.142637] kunit_try_run_case+0x170/0x3f0 [ 112.142887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.143217] kthread+0x328/0x630 [ 112.143405] ret_from_fork+0x10/0x20 [ 112.143667] ---[ end trace 0000000000000000 ]---