Date
July 18, 2025, 1:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper: Failure
Automatically assigned
[ 33.714818] ================================================================== [ 33.715014] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.715185] Free of addr fff00000c3fedd01 by task kunit_try_catch/272 [ 33.715235] [ 33.715266] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.715350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.715601] Hardware name: linux,dummy-virt (DT) [ 33.715656] Call trace: [ 33.715934] show_stack+0x20/0x38 (C) [ 33.716026] dump_stack_lvl+0x8c/0xd0 [ 33.716147] print_report+0x118/0x5e8 [ 33.716234] kasan_report_invalid_free+0xc0/0xe8 [ 33.716311] check_slab_allocation+0xfc/0x108 [ 33.716610] __kasan_mempool_poison_object+0x78/0x150 [ 33.716782] mempool_free+0x28c/0x328 [ 33.716890] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.717263] mempool_kmalloc_invalid_free+0xc0/0x118 [ 33.717375] kunit_try_run_case+0x170/0x3f0 [ 33.717481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.717607] kthread+0x328/0x630 [ 33.717795] ret_from_fork+0x10/0x20 [ 33.718025] [ 33.718114] Allocated by task 272: [ 33.718181] kasan_save_stack+0x3c/0x68 [ 33.718250] kasan_save_track+0x20/0x40 [ 33.718285] kasan_save_alloc_info+0x40/0x58 [ 33.718661] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.718754] remove_element+0x130/0x1f8 [ 33.718894] mempool_alloc_preallocated+0x58/0xc0 [ 33.718943] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 33.719269] mempool_kmalloc_invalid_free+0xc0/0x118 [ 33.719322] kunit_try_run_case+0x170/0x3f0 [ 33.719358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.719402] kthread+0x328/0x630 [ 33.719434] ret_from_fork+0x10/0x20 [ 33.719470] [ 33.719489] The buggy address belongs to the object at fff00000c3fedd00 [ 33.719489] which belongs to the cache kmalloc-128 of size 128 [ 33.719583] The buggy address is located 1 bytes inside of [ 33.719583] 128-byte region [fff00000c3fedd00, fff00000c3fedd80) [ 33.719643] [ 33.719662] The buggy address belongs to the physical page: [ 33.719704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed [ 33.720179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.720246] page_type: f5(slab) [ 33.720432] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.720531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.720884] page dumped because: kasan: bad access detected [ 33.721182] [ 33.721225] Memory state around the buggy address: [ 33.721261] fff00000c3fedc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.721507] fff00000c3fedc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.721656] >fff00000c3fedd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.721751] ^ [ 33.721864] fff00000c3fedd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.722247] fff00000c3fede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.722333] ================================================================== [ 33.727634] ================================================================== [ 33.728153] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.728387] Free of addr fff00000c9bb8001 by task kunit_try_catch/274 [ 33.728460] [ 33.728500] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.728583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.728609] Hardware name: linux,dummy-virt (DT) [ 33.728641] Call trace: [ 33.728662] show_stack+0x20/0x38 (C) [ 33.728713] dump_stack_lvl+0x8c/0xd0 [ 33.728759] print_report+0x118/0x5e8 [ 33.728801] kasan_report_invalid_free+0xc0/0xe8 [ 33.729164] __kasan_mempool_poison_object+0xfc/0x150 [ 33.729262] mempool_free+0x28c/0x328 [ 33.729397] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.729554] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 33.729726] kunit_try_run_case+0x170/0x3f0 [ 33.729778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.730126] kthread+0x328/0x630 [ 33.730292] ret_from_fork+0x10/0x20 [ 33.730476] [ 33.730525] The buggy address belongs to the physical page: [ 33.730577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb8 [ 33.730933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.731010] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.731420] page_type: f8(unknown) [ 33.731513] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.731583] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.731950] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.732035] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.732179] head: 0bfffe0000000002 ffffc1ffc326ee01 00000000ffffffff 00000000ffffffff [ 33.732275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.732388] page dumped because: kasan: bad access detected [ 33.732449] [ 33.732504] Memory state around the buggy address: [ 33.732535] fff00000c9bb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.732579] fff00000c9bb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.732622] >fff00000c9bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.732912] ^ [ 33.733076] fff00000c9bb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.733151] fff00000c9bb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.733266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf: Failure
Automatically assigned
[ 31.466056] ================================================================== [ 31.466137] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 31.466219] Read of size 1 at addr fff00000c8f61e00 by task kunit_try_catch/195 [ 31.466268] [ 31.466298] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.466379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.466421] Hardware name: linux,dummy-virt (DT) [ 31.466451] Call trace: [ 31.466478] show_stack+0x20/0x38 (C) [ 31.466526] dump_stack_lvl+0x8c/0xd0 [ 31.466571] print_report+0x118/0x5e8 [ 31.466613] kasan_report+0xdc/0x128 [ 31.466663] __kasan_check_byte+0x54/0x70 [ 31.466706] krealloc_noprof+0x44/0x360 [ 31.466752] krealloc_uaf+0x180/0x520 [ 31.466795] kunit_try_run_case+0x170/0x3f0 [ 31.466838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.466887] kthread+0x328/0x630 [ 31.466926] ret_from_fork+0x10/0x20 [ 31.466971] [ 31.466989] Allocated by task 195: [ 31.467025] kasan_save_stack+0x3c/0x68 [ 31.467063] kasan_save_track+0x20/0x40 [ 31.467107] kasan_save_alloc_info+0x40/0x58 [ 31.467143] __kasan_kmalloc+0xd4/0xd8 [ 31.467176] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.467216] krealloc_uaf+0xc8/0x520 [ 31.467261] kunit_try_run_case+0x170/0x3f0 [ 31.467306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.467347] kthread+0x328/0x630 [ 31.467378] ret_from_fork+0x10/0x20 [ 31.467413] [ 31.467451] Freed by task 195: [ 31.467497] kasan_save_stack+0x3c/0x68 [ 31.467534] kasan_save_track+0x20/0x40 [ 31.467569] kasan_save_free_info+0x4c/0x78 [ 31.467605] __kasan_slab_free+0x6c/0x98 [ 31.467640] kfree+0x214/0x3c8 [ 31.467674] krealloc_uaf+0x12c/0x520 [ 31.467710] kunit_try_run_case+0x170/0x3f0 [ 31.468629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.468701] kthread+0x328/0x630 [ 31.468757] ret_from_fork+0x10/0x20 [ 31.468821] [ 31.468905] The buggy address belongs to the object at fff00000c8f61e00 [ 31.468905] which belongs to the cache kmalloc-256 of size 256 [ 31.469051] The buggy address is located 0 bytes inside of [ 31.469051] freed 256-byte region [fff00000c8f61e00, fff00000c8f61f00) [ 31.469340] [ 31.469497] The buggy address belongs to the physical page: [ 31.469730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.469848] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.469926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.470175] page_type: f5(slab) [ 31.470310] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.470515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.470610] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.470982] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.471073] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.471200] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.471243] page dumped because: kasan: bad access detected [ 31.471273] [ 31.471438] Memory state around the buggy address: [ 31.471510] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.471566] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.471825] >fff00000c8f61e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.471897] ^ [ 31.471956] fff00000c8f61e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.472003] fff00000c8f61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.472039] ================================================================== [ 31.473884] ================================================================== [ 31.474348] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 31.474718] Read of size 1 at addr fff00000c8f61e00 by task kunit_try_catch/195 [ 31.474824] [ 31.474886] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.474977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.475003] Hardware name: linux,dummy-virt (DT) [ 31.475319] Call trace: [ 31.475389] show_stack+0x20/0x38 (C) [ 31.475602] dump_stack_lvl+0x8c/0xd0 [ 31.475665] print_report+0x118/0x5e8 [ 31.475709] kasan_report+0xdc/0x128 [ 31.475930] __asan_report_load1_noabort+0x20/0x30 [ 31.476040] krealloc_uaf+0x4c8/0x520 [ 31.476374] kunit_try_run_case+0x170/0x3f0 [ 31.476590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.476710] kthread+0x328/0x630 [ 31.476895] ret_from_fork+0x10/0x20 [ 31.477021] [ 31.477040] Allocated by task 195: [ 31.477088] kasan_save_stack+0x3c/0x68 [ 31.477144] kasan_save_track+0x20/0x40 [ 31.477354] kasan_save_alloc_info+0x40/0x58 [ 31.477520] __kasan_kmalloc+0xd4/0xd8 [ 31.477706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.477782] krealloc_uaf+0xc8/0x520 [ 31.477998] kunit_try_run_case+0x170/0x3f0 [ 31.478219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.478313] kthread+0x328/0x630 [ 31.478346] ret_from_fork+0x10/0x20 [ 31.478529] [ 31.478685] Freed by task 195: [ 31.478826] kasan_save_stack+0x3c/0x68 [ 31.478925] kasan_save_track+0x20/0x40 [ 31.479030] kasan_save_free_info+0x4c/0x78 [ 31.479228] __kasan_slab_free+0x6c/0x98 [ 31.479365] kfree+0x214/0x3c8 [ 31.479651] krealloc_uaf+0x12c/0x520 [ 31.479746] kunit_try_run_case+0x170/0x3f0 [ 31.479925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.480010] kthread+0x328/0x630 [ 31.480043] ret_from_fork+0x10/0x20 [ 31.480092] [ 31.480111] The buggy address belongs to the object at fff00000c8f61e00 [ 31.480111] which belongs to the cache kmalloc-256 of size 256 [ 31.480350] The buggy address is located 0 bytes inside of [ 31.480350] freed 256-byte region [fff00000c8f61e00, fff00000c8f61f00) [ 31.480530] [ 31.480787] The buggy address belongs to the physical page: [ 31.481151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.481222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.481501] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.481681] page_type: f5(slab) [ 31.481831] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.481917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.482040] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.482118] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.482332] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.482596] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.482748] page dumped because: kasan: bad access detected [ 31.482834] [ 31.483161] Memory state around the buggy address: [ 31.483279] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.483360] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.483449] >fff00000c8f61e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.483572] ^ [ 31.483640] fff00000c8f61e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.483687] fff00000c8f61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.483921] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 34.252988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 34.116780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 34.122380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 34.086385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
KNOWN ISSUE - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop: Failure
Automatically assigned
[ 33.993553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 33.958452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - log-parser-boot/internal-error-oops-oops-smp: Failure
Automatically assigned
[ 110.021932] Internal error: Oops: 0000000096000005 [#1] SMP [ 110.031028] Modules linked in: [ 110.031750] CPU: 0 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 110.033432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 110.033992] Hardware name: linux,dummy-virt (DT) [ 110.034813] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 110.035546] pc : kunit_test_null_dereference+0x70/0x170 [ 110.036214] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.036657] sp : ffff800081ff7d30 [ 110.037169] x29: ffff800081ff7d90 x28: 0000000000000000 x27: 0000000000000000 [ 110.037682] x26: 1ffe0000193a7cc1 x25: 0000000000000000 x24: 0000000000000004 [ 110.038033] x23: fff00000c9d3e60c x22: ffffa0dedf444410 x21: fff00000c0b1de88 [ 110.038841] x20: 1ffff000103fefa6 x19: ffff800080087990 x18: 00000000450bebd9 [ 110.039613] x17: 0000000000000001 x16: fff00000c612a83c x15: fff00000ff616b48 [ 110.040513] x14: 0000000000018fff x13: 1ffe00001b48dfdd x12: fffd80001916e62c [ 110.041402] x11: 1ffe00001916e62b x10: fffd80001916e62b x9 : ffffa0dedf43bb98 [ 110.042205] x8 : ffff800081ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 110.042663] x5 : ffff7000103fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 110.043003] x2 : dfff800000000000 x1 : fff00000c8b72880 x0 : ffff800080087990 [ 110.043780] Call trace: [ 110.044153] kunit_test_null_dereference+0x70/0x170 (P) [ 110.044860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.045459] kthread+0x328/0x630 [ 110.045876] ret_from_fork+0x10/0x20 [ 110.046519] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 110.047455] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc: Failure
Automatically assigned
[ 64.908807] ================================================================== [ 64.908880] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 64.908880] [ 64.908965] Use-after-free read at 0x00000000a4e5f289 (in kfence-#182): [ 64.909018] test_krealloc+0x51c/0x830 [ 64.909061] kunit_try_run_case+0x170/0x3f0 [ 64.909123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.909167] kthread+0x328/0x630 [ 64.909207] ret_from_fork+0x10/0x20 [ 64.909248] [ 64.909273] kfence-#182: 0x00000000a4e5f289-0x000000000a8f2520, size=32, cache=kmalloc-32 [ 64.909273] [ 64.909327] allocated by task 368 on cpu 0 at 64.908191s (0.001133s ago): [ 64.909398] test_alloc+0x29c/0x628 [ 64.909435] test_krealloc+0xc0/0x830 [ 64.909472] kunit_try_run_case+0x170/0x3f0 [ 64.909512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.909554] kthread+0x328/0x630 [ 64.909589] ret_from_fork+0x10/0x20 [ 64.909626] [ 64.909651] freed by task 368 on cpu 0 at 64.908419s (0.001228s ago): [ 64.909711] krealloc_noprof+0x148/0x360 [ 64.909751] test_krealloc+0x1dc/0x830 [ 64.909789] kunit_try_run_case+0x170/0x3f0 [ 64.909827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.909869] kthread+0x328/0x630 [ 64.909904] ret_from_fork+0x10/0x20 [ 64.909943] [ 64.909984] CPU: 0 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 64.910069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.910108] Hardware name: linux,dummy-virt (DT) [ 64.910142] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu: Failure
Automatically assigned
[ 64.824245] ================================================================== [ 64.824340] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.824340] [ 64.824435] Use-after-free read at 0x00000000f503c37f (in kfence-#181): [ 64.824489] test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.824535] kunit_try_run_case+0x170/0x3f0 [ 64.824580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.824626] kthread+0x328/0x630 [ 64.824665] ret_from_fork+0x10/0x20 [ 64.824706] [ 64.824730] kfence-#181: 0x00000000f503c37f-0x000000001f067b0c, size=32, cache=test [ 64.824730] [ 64.824781] allocated by task 366 on cpu 1 at 64.812125s (0.012652s ago): [ 64.824852] test_alloc+0x230/0x628 [ 64.824890] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 64.824930] kunit_try_run_case+0x170/0x3f0 [ 64.824968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.825010] kthread+0x328/0x630 [ 64.825045] ret_from_fork+0x10/0x20 [ 64.825098] [ 64.825121] freed by task 366 on cpu 1 at 64.812243s (0.012875s ago): [ 64.825179] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 64.825220] kunit_try_run_case+0x170/0x3f0 [ 64.825257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.825299] kthread+0x328/0x630 [ 64.825334] ret_from_fork+0x10/0x20 [ 64.825374] [ 64.825419] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 64.825497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.825527] Hardware name: linux,dummy-virt (DT) [ 64.825564] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access: Failure
Automatically assigned
[ 41.531625] ================================================================== [ 41.531768] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 41.531768] [ 41.531860] Invalid read at 0x00000000f669ee15: [ 41.532263] test_invalid_access+0xdc/0x1f0 [ 41.532389] kunit_try_run_case+0x170/0x3f0 [ 41.532441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.532510] kthread+0x328/0x630 [ 41.532556] ret_from_fork+0x10/0x20 [ 41.532609] [ 41.532656] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 41.532757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.532838] Hardware name: linux,dummy-virt (DT) [ 41.532878] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write: Failure
Automatically assigned
[ 35.580483] ================================================================== [ 35.580561] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.580561] [ 35.580641] Out-of-bounds write at 0x00000000baea91f5 (1B left of kfence-#122): [ 35.580853] test_out_of_bounds_write+0x100/0x240 [ 35.580916] kunit_try_run_case+0x170/0x3f0 [ 35.580962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.581011] kthread+0x328/0x630 [ 35.581068] ret_from_fork+0x10/0x20 [ 35.581142] [ 35.581168] kfence-#122: 0x000000003d53ce57-0x000000002cd07b53, size=32, cache=kmalloc-32 [ 35.581168] [ 35.581219] allocated by task 322 on cpu 0 at 35.580327s (0.000889s ago): [ 35.581450] test_alloc+0x29c/0x628 [ 35.581544] test_out_of_bounds_write+0xc8/0x240 [ 35.581624] kunit_try_run_case+0x170/0x3f0 [ 35.581678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.581738] kthread+0x328/0x630 [ 35.581795] ret_from_fork+0x10/0x20 [ 35.581851] [ 35.581901] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 35.582111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.582156] Hardware name: linux,dummy-virt (DT) [ 35.582191] ================================================================== [ 35.788652] ================================================================== [ 35.788768] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.788768] [ 35.788864] Out-of-bounds write at 0x00000000fa3750a1 (1B left of kfence-#124): [ 35.788939] test_out_of_bounds_write+0x100/0x240 [ 35.788991] kunit_try_run_case+0x170/0x3f0 [ 35.789053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.789116] kthread+0x328/0x630 [ 35.789157] ret_from_fork+0x10/0x20 [ 35.789203] [ 35.789228] kfence-#124: 0x000000004ad2eafa-0x00000000b9372008, size=32, cache=test [ 35.789228] [ 35.789551] allocated by task 324 on cpu 0 at 35.788568s (0.000957s ago): [ 35.789638] test_alloc+0x230/0x628 [ 35.789691] test_out_of_bounds_write+0xc8/0x240 [ 35.789771] kunit_try_run_case+0x170/0x3f0 [ 35.789860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.789903] kthread+0x328/0x630 [ 35.789964] ret_from_fork+0x10/0x20 [ 35.790003] [ 35.790052] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 35.790144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.790172] Hardware name: linux,dummy-virt (DT) [ 35.790331] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write: Failure
Automatically assigned
[ 41.300417] ================================================================== [ 41.300502] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.300502] [ 41.300561] Corrupted memory at 0x00000000ac1a6f84 [ ! . . . . . . . . . . . . . . . ] (in kfence-#177): [ 41.300868] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.300914] kunit_try_run_case+0x170/0x3f0 [ 41.300956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.300999] kthread+0x328/0x630 [ 41.301036] ret_from_fork+0x10/0x20 [ 41.301091] [ 41.301116] kfence-#177: 0x0000000082fb8f60-0x000000008012127b, size=73, cache=kmalloc-96 [ 41.301116] [ 41.301170] allocated by task 356 on cpu 0 at 41.300141s (0.001026s ago): [ 41.301233] test_alloc+0x29c/0x628 [ 41.301270] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 41.301312] kunit_try_run_case+0x170/0x3f0 [ 41.301350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.301393] kthread+0x328/0x630 [ 41.301429] ret_from_fork+0x10/0x20 [ 41.301468] [ 41.301492] freed by task 356 on cpu 0 at 41.300330s (0.001158s ago): [ 41.301556] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.301597] kunit_try_run_case+0x170/0x3f0 [ 41.301636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.301679] kthread+0x328/0x630 [ 41.301716] ret_from_fork+0x10/0x20 [ 41.301755] [ 41.301795] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 41.301878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.301907] Hardware name: linux,dummy-virt (DT) [ 41.301940] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read: Failure
Automatically assigned
[ 41.196406] ================================================================== [ 41.196502] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.196502] [ 41.196598] Out-of-bounds read at 0x000000007685b912 (105B right of kfence-#176): [ 41.196659] test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.196707] kunit_try_run_case+0x170/0x3f0 [ 41.196751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.196794] kthread+0x328/0x630 [ 41.196832] ret_from_fork+0x10/0x20 [ 41.196874] [ 41.196899] kfence-#176: 0x000000002d0fd72d-0x0000000069fbfcc2, size=73, cache=kmalloc-96 [ 41.196899] [ 41.196953] allocated by task 354 on cpu 0 at 41.196140s (0.000809s ago): [ 41.197023] test_alloc+0x29c/0x628 [ 41.197062] test_kmalloc_aligned_oob_read+0x100/0x468 [ 41.197116] kunit_try_run_case+0x170/0x3f0 [ 41.197156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.197199] kthread+0x328/0x630 [ 41.197236] ret_from_fork+0x10/0x20 [ 41.197274] [ 41.197319] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 41.197401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.197430] Hardware name: linux,dummy-virt (DT) [ 41.197465] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption: Failure
Automatically assigned
[ 37.452287] ================================================================== [ 37.452384] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 37.452384] [ 37.452446] Corrupted memory at 0x000000002eedd708 [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 37.452751] test_corruption+0x120/0x378 [ 37.452795] kunit_try_run_case+0x170/0x3f0 [ 37.452839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.452883] kthread+0x328/0x630 [ 37.452923] ret_from_fork+0x10/0x20 [ 37.452964] [ 37.452988] kfence-#140: 0x000000000a151139-0x00000000c2e079b5, size=32, cache=test [ 37.452988] [ 37.453044] allocated by task 344 on cpu 1 at 37.452140s (0.000900s ago): [ 37.453119] test_alloc+0x230/0x628 [ 37.453157] test_corruption+0xdc/0x378 [ 37.453196] kunit_try_run_case+0x170/0x3f0 [ 37.453235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.453276] kthread+0x328/0x630 [ 37.453313] ret_from_fork+0x10/0x20 [ 37.453351] [ 37.453376] freed by task 344 on cpu 1 at 37.452197s (0.001175s ago): [ 37.453439] test_corruption+0x120/0x378 [ 37.453475] kunit_try_run_case+0x170/0x3f0 [ 37.453514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.453556] kthread+0x328/0x630 [ 37.453591] ret_from_fork+0x10/0x20 [ 37.453631] [ 37.453674] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 37.453752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.453781] Hardware name: linux,dummy-virt (DT) [ 37.453814] ================================================================== [ 37.140486] ================================================================== [ 37.140584] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 37.140584] [ 37.140644] Corrupted memory at 0x0000000073e72840 [ ! ] (in kfence-#137): [ 37.140773] test_corruption+0x284/0x378 [ 37.140818] kunit_try_run_case+0x170/0x3f0 [ 37.140861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.140905] kthread+0x328/0x630 [ 37.140942] ret_from_fork+0x10/0x20 [ 37.140982] [ 37.141007] kfence-#137: 0x00000000df8bbe75-0x00000000f8a5531c, size=32, cache=kmalloc-32 [ 37.141007] [ 37.141061] allocated by task 342 on cpu 1 at 37.140208s (0.000849s ago): [ 37.141137] test_alloc+0x29c/0x628 [ 37.141174] test_corruption+0x198/0x378 [ 37.141212] kunit_try_run_case+0x170/0x3f0 [ 37.141250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.141293] kthread+0x328/0x630 [ 37.141329] ret_from_fork+0x10/0x20 [ 37.141369] [ 37.141392] freed by task 342 on cpu 1 at 37.140312s (0.001077s ago): [ 37.141453] test_corruption+0x284/0x378 [ 37.141491] kunit_try_run_case+0x170/0x3f0 [ 37.141530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.141572] kthread+0x328/0x630 [ 37.141609] ret_from_fork+0x10/0x20 [ 37.141647] [ 37.141690] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 37.141769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.141799] Hardware name: linux,dummy-virt (DT) [ 37.141831] ================================================================== [ 36.828478] ================================================================== [ 36.828588] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 36.828588] [ 36.828654] Corrupted memory at 0x0000000059eaede2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#134): [ 36.829111] test_corruption+0x278/0x378 [ 36.829162] kunit_try_run_case+0x170/0x3f0 [ 36.829207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.829251] kthread+0x328/0x630 [ 36.829292] ret_from_fork+0x10/0x20 [ 36.829332] [ 36.829356] kfence-#134: 0x0000000099b9a0d7-0x00000000ec63ed5e, size=32, cache=kmalloc-32 [ 36.829356] [ 36.829412] allocated by task 342 on cpu 1 at 36.828195s (0.001213s ago): [ 36.829475] test_alloc+0x29c/0x628 [ 36.829514] test_corruption+0xdc/0x378 [ 36.829551] kunit_try_run_case+0x170/0x3f0 [ 36.829590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.829632] kthread+0x328/0x630 [ 36.829669] ret_from_fork+0x10/0x20 [ 36.829707] [ 36.829730] freed by task 342 on cpu 1 at 36.828297s (0.001429s ago): [ 36.829791] test_corruption+0x278/0x378 [ 36.829827] kunit_try_run_case+0x170/0x3f0 [ 36.829864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.829907] kthread+0x328/0x630 [ 36.829941] ret_from_fork+0x10/0x20 [ 36.829981] [ 36.830031] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 36.830119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.830150] Hardware name: linux,dummy-virt (DT) [ 36.830183] ================================================================== [ 37.556305] ================================================================== [ 37.556393] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 37.556393] [ 37.556452] Corrupted memory at 0x00000000c2c25773 [ ! ] (in kfence-#141): [ 37.556563] test_corruption+0x1d8/0x378 [ 37.556606] kunit_try_run_case+0x170/0x3f0 [ 37.556646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.556690] kthread+0x328/0x630 [ 37.556728] ret_from_fork+0x10/0x20 [ 37.556769] [ 37.556792] kfence-#141: 0x00000000d76d3239-0x00000000c2b98ad6, size=32, cache=test [ 37.556792] [ 37.556845] allocated by task 344 on cpu 1 at 37.556165s (0.000676s ago): [ 37.556908] test_alloc+0x230/0x628 [ 37.556947] test_corruption+0x198/0x378 [ 37.556985] kunit_try_run_case+0x170/0x3f0 [ 37.557025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.557068] kthread+0x328/0x630 [ 37.557117] ret_from_fork+0x10/0x20 [ 37.557156] [ 37.557179] freed by task 344 on cpu 1 at 37.556223s (0.000953s ago): [ 37.557242] test_corruption+0x1d8/0x378 [ 37.557280] kunit_try_run_case+0x170/0x3f0 [ 37.557319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.557362] kthread+0x328/0x630 [ 37.557398] ret_from_fork+0x10/0x20 [ 37.557437] [ 37.557480] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 37.557558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.557587] Hardware name: linux,dummy-virt (DT) [ 37.557621] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free: Failure
Automatically assigned
[ 36.620306] ================================================================== [ 36.620397] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 36.620397] [ 36.620456] Invalid free of 0x00000000c2baa3a2 (in kfence-#132): [ 36.620509] test_invalid_addr_free+0xec/0x238 [ 36.620553] kunit_try_run_case+0x170/0x3f0 [ 36.620593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.620636] kthread+0x328/0x630 [ 36.620674] ret_from_fork+0x10/0x20 [ 36.620714] [ 36.620737] kfence-#132: 0x00000000957a8944-0x0000000001b3a575, size=32, cache=test [ 36.620737] [ 36.620788] allocated by task 340 on cpu 1 at 36.620188s (0.000597s ago): [ 36.620850] test_alloc+0x230/0x628 [ 36.620890] test_invalid_addr_free+0xd4/0x238 [ 36.620927] kunit_try_run_case+0x170/0x3f0 [ 36.620967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.621009] kthread+0x328/0x630 [ 36.621044] ret_from_fork+0x10/0x20 [ 36.621097] [ 36.621138] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 36.621216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.621245] Hardware name: linux,dummy-virt (DT) [ 36.621277] ================================================================== [ 36.516228] ================================================================== [ 36.516306] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 36.516306] [ 36.516367] Invalid free of 0x000000009d499f19 (in kfence-#131): [ 36.516421] test_invalid_addr_free+0x1ac/0x238 [ 36.516466] kunit_try_run_case+0x170/0x3f0 [ 36.516510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.516553] kthread+0x328/0x630 [ 36.516593] ret_from_fork+0x10/0x20 [ 36.516633] [ 36.516656] kfence-#131: 0x0000000035c139a3-0x00000000ffbecc92, size=32, cache=kmalloc-32 [ 36.516656] [ 36.516711] allocated by task 338 on cpu 1 at 36.516091s (0.000615s ago): [ 36.516774] test_alloc+0x29c/0x628 [ 36.516812] test_invalid_addr_free+0xd4/0x238 [ 36.516851] kunit_try_run_case+0x170/0x3f0 [ 36.516890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.516933] kthread+0x328/0x630 [ 36.516968] ret_from_fork+0x10/0x20 [ 36.517006] [ 36.517049] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 36.517143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.517173] Hardware name: linux,dummy-virt (DT) [ 36.517207] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free: Failure
Automatically assigned
[ 36.413895] ================================================================== [ 36.413969] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 36.413969] [ 36.414337] Invalid free of 0x000000003d0a2e56 (in kfence-#130): [ 36.414408] test_double_free+0x100/0x238 [ 36.414455] kunit_try_run_case+0x170/0x3f0 [ 36.414497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.414869] kthread+0x328/0x630 [ 36.414943] ret_from_fork+0x10/0x20 [ 36.415272] [ 36.415334] kfence-#130: 0x000000003d0a2e56-0x0000000096db33f3, size=32, cache=test [ 36.415334] [ 36.415656] allocated by task 336 on cpu 0 at 36.413355s (0.002291s ago): [ 36.415736] test_alloc+0x230/0x628 [ 36.415823] test_double_free+0xd4/0x238 [ 36.415921] kunit_try_run_case+0x170/0x3f0 [ 36.416095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.416182] kthread+0x328/0x630 [ 36.416336] ret_from_fork+0x10/0x20 [ 36.416424] [ 36.416884] freed by task 336 on cpu 0 at 36.413689s (0.003178s ago): [ 36.417009] test_double_free+0xf0/0x238 [ 36.417148] kunit_try_run_case+0x170/0x3f0 [ 36.417269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.417345] kthread+0x328/0x630 [ 36.417382] ret_from_fork+0x10/0x20 [ 36.417422] [ 36.417491] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 36.417596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.417635] Hardware name: linux,dummy-virt (DT) [ 36.417669] ================================================================== [ 36.310140] ================================================================== [ 36.310285] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 36.310285] [ 36.310687] Invalid free of 0x00000000581294d8 (in kfence-#129): [ 36.310779] test_double_free+0x1bc/0x238 [ 36.311135] kunit_try_run_case+0x170/0x3f0 [ 36.311227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.311343] kthread+0x328/0x630 [ 36.311388] ret_from_fork+0x10/0x20 [ 36.311435] [ 36.311462] kfence-#129: 0x00000000581294d8-0x00000000e27e5dc3, size=32, cache=kmalloc-32 [ 36.311462] [ 36.311681] allocated by task 334 on cpu 0 at 36.309434s (0.002087s ago): [ 36.311877] test_alloc+0x29c/0x628 [ 36.311964] test_double_free+0xd4/0x238 [ 36.312005] kunit_try_run_case+0x170/0x3f0 [ 36.312382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.312503] kthread+0x328/0x630 [ 36.312591] ret_from_fork+0x10/0x20 [ 36.312645] [ 36.312890] freed by task 334 on cpu 0 at 36.309515s (0.003161s ago): [ 36.313214] test_double_free+0x1ac/0x238 [ 36.313339] kunit_try_run_case+0x170/0x3f0 [ 36.313417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.313554] kthread+0x328/0x630 [ 36.313632] ret_from_fork+0x10/0x20 [ 36.313796] [ 36.313883] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 36.314061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.314304] Hardware name: linux,dummy-virt (DT) [ 36.314403] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read: Failure
Automatically assigned
[ 35.997205] ================================================================== [ 35.997318] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.997318] [ 35.997400] Use-after-free read at 0x0000000089c33237 (in kfence-#126): [ 35.997521] test_use_after_free_read+0x114/0x248 [ 35.997572] kunit_try_run_case+0x170/0x3f0 [ 35.997614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.997939] kthread+0x328/0x630 [ 35.998009] ret_from_fork+0x10/0x20 [ 35.998067] [ 35.998104] kfence-#126: 0x0000000089c33237-0x0000000003f57add, size=32, cache=test [ 35.998104] [ 35.998155] allocated by task 328 on cpu 0 at 35.996730s (0.001421s ago): [ 35.998692] test_alloc+0x230/0x628 [ 35.998783] test_use_after_free_read+0xd0/0x248 [ 35.998829] kunit_try_run_case+0x170/0x3f0 [ 35.998928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998973] kthread+0x328/0x630 [ 35.999009] ret_from_fork+0x10/0x20 [ 35.999218] [ 35.999356] freed by task 328 on cpu 0 at 35.997061s (0.002287s ago): [ 35.999537] test_use_after_free_read+0xf0/0x248 [ 35.999604] kunit_try_run_case+0x170/0x3f0 [ 35.999650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.999750] kthread+0x328/0x630 [ 35.999787] ret_from_fork+0x10/0x20 [ 35.999920] [ 36.000322] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 36.000475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.000600] Hardware name: linux,dummy-virt (DT) [ 36.000687] ================================================================== [ 35.893576] ================================================================== [ 35.893909] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.893909] [ 35.894308] Use-after-free read at 0x0000000017f7fd76 (in kfence-#125): [ 35.894431] test_use_after_free_read+0x114/0x248 [ 35.894485] kunit_try_run_case+0x170/0x3f0 [ 35.894543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.894722] kthread+0x328/0x630 [ 35.894766] ret_from_fork+0x10/0x20 [ 35.895040] [ 35.895093] kfence-#125: 0x0000000017f7fd76-0x0000000018bd24b1, size=32, cache=kmalloc-32 [ 35.895093] [ 35.895168] allocated by task 326 on cpu 0 at 35.892729s (0.002417s ago): [ 35.895248] test_alloc+0x29c/0x628 [ 35.895530] test_use_after_free_read+0xd0/0x248 [ 35.895592] kunit_try_run_case+0x170/0x3f0 [ 35.895649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.895815] kthread+0x328/0x630 [ 35.896041] ret_from_fork+0x10/0x20 [ 35.896134] [ 35.896759] freed by task 326 on cpu 0 at 35.892803s (0.003455s ago): [ 35.897367] test_use_after_free_read+0x1c0/0x248 [ 35.897528] kunit_try_run_case+0x170/0x3f0 [ 35.897599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.897785] kthread+0x328/0x630 [ 35.897991] ret_from_fork+0x10/0x20 [ 35.898374] [ 35.898649] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 35.898931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.899095] Hardware name: linux,dummy-virt (DT) [ 35.899205] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
KNOWN ISSUE - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read: Failure
Automatically assigned
[ 34.854669] ================================================================== [ 34.854787] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.854787] [ 34.854918] Out-of-bounds read at 0x0000000052747461 (1B left of kfence-#115): [ 34.855607] test_out_of_bounds_read+0x114/0x3e0 [ 34.856227] kunit_try_run_case+0x170/0x3f0 [ 34.856357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.856476] kthread+0x328/0x630 [ 34.856595] ret_from_fork+0x10/0x20 [ 34.856691] [ 34.857288] kfence-#115: 0x000000009c9607f9-0x0000000062149a67, size=32, cache=kmalloc-32 [ 34.857288] [ 34.858006] allocated by task 318 on cpu 0 at 34.853225s (0.004395s ago): [ 34.859124] test_alloc+0x29c/0x628 [ 34.859241] test_out_of_bounds_read+0xdc/0x3e0 [ 34.859290] kunit_try_run_case+0x170/0x3f0 [ 34.859338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.859400] kthread+0x328/0x630 [ 34.859439] ret_from_fork+0x10/0x20 [ 34.859556] [ 34.859649] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.859948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.859985] Hardware name: linux,dummy-virt (DT) [ 34.860032] ================================================================== [ 34.957302] ================================================================== [ 34.957388] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.957388] [ 34.957487] Out-of-bounds read at 0x000000000a7cb6b6 (32B right of kfence-#116): [ 34.957811] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.957896] kunit_try_run_case+0x170/0x3f0 [ 34.957939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.957983] kthread+0x328/0x630 [ 34.958037] ret_from_fork+0x10/0x20 [ 34.958090] [ 34.958123] kfence-#116: 0x000000004c4030a8-0x00000000c4e3a3cf, size=32, cache=kmalloc-32 [ 34.958123] [ 34.958190] allocated by task 318 on cpu 0 at 34.957018s (0.001157s ago): [ 34.958267] test_alloc+0x29c/0x628 [ 34.958317] test_out_of_bounds_read+0x198/0x3e0 [ 34.958365] kunit_try_run_case+0x170/0x3f0 [ 34.958426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.958469] kthread+0x328/0x630 [ 34.958719] ret_from_fork+0x10/0x20 [ 34.958984] [ 34.959061] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.959163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.959202] Hardware name: linux,dummy-virt (DT) [ 34.959236] ================================================================== [ 35.372542] ================================================================== [ 35.372838] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.372838] [ 35.372927] Out-of-bounds read at 0x00000000c1627424 (32B right of kfence-#120): [ 35.373057] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.373135] kunit_try_run_case+0x170/0x3f0 [ 35.373203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.373247] kthread+0x328/0x630 [ 35.373315] ret_from_fork+0x10/0x20 [ 35.373382] [ 35.373408] kfence-#120: 0x000000002a008e19-0x00000000c2f688b4, size=32, cache=test [ 35.373408] [ 35.373512] allocated by task 320 on cpu 0 at 35.372454s (0.001047s ago): [ 35.373597] test_alloc+0x230/0x628 [ 35.373680] test_out_of_bounds_read+0x198/0x3e0 [ 35.373757] kunit_try_run_case+0x170/0x3f0 [ 35.373814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.373857] kthread+0x328/0x630 [ 35.373908] ret_from_fork+0x10/0x20 [ 35.373965] [ 35.374050] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 35.374139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.374167] Hardware name: linux,dummy-virt (DT) [ 35.374446] ================================================================== [ 35.062040] ================================================================== [ 35.062144] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.062144] [ 35.062279] Out-of-bounds read at 0x000000009e72b143 (1B left of kfence-#117): [ 35.062493] test_out_of_bounds_read+0x114/0x3e0 [ 35.062610] kunit_try_run_case+0x170/0x3f0 [ 35.062676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.062720] kthread+0x328/0x630 [ 35.062942] ret_from_fork+0x10/0x20 [ 35.063026] [ 35.063052] kfence-#117: 0x00000000e69ca17a-0x00000000a01a161a, size=32, cache=test [ 35.063052] [ 35.063550] allocated by task 320 on cpu 0 at 35.061643s (0.001470s ago): [ 35.064037] test_alloc+0x230/0x628 [ 35.064267] test_out_of_bounds_read+0xdc/0x3e0 [ 35.064355] kunit_try_run_case+0x170/0x3f0 [ 35.064482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.064617] kthread+0x328/0x630 [ 35.064678] ret_from_fork+0x10/0x20 [ 35.064732] [ 35.064812] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 35.065276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.065532] Hardware name: linux,dummy-virt (DT) [ 35.065606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user: Failure
Automatically assigned
[ 34.646179] ================================================================== [ 34.646330] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 34.646384] Write of size 1 at addr fff00000c970b278 by task kunit_try_catch/316 [ 34.646436] [ 34.646467] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.646706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.646790] Hardware name: linux,dummy-virt (DT) [ 34.646836] Call trace: [ 34.646904] show_stack+0x20/0x38 (C) [ 34.646959] dump_stack_lvl+0x8c/0xd0 [ 34.647009] print_report+0x118/0x5e8 [ 34.647265] kasan_report+0xdc/0x128 [ 34.647353] __asan_report_store1_noabort+0x20/0x30 [ 34.647406] strncpy_from_user+0x270/0x2a0 [ 34.647466] copy_user_test_oob+0x5c0/0xec8 [ 34.647523] kunit_try_run_case+0x170/0x3f0 [ 34.647588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.647642] kthread+0x328/0x630 [ 34.647701] ret_from_fork+0x10/0x20 [ 34.647849] [ 34.647897] Allocated by task 316: [ 34.647946] kasan_save_stack+0x3c/0x68 [ 34.648143] kasan_save_track+0x20/0x40 [ 34.648183] kasan_save_alloc_info+0x40/0x58 [ 34.648228] __kasan_kmalloc+0xd4/0xd8 [ 34.648306] __kmalloc_noprof+0x198/0x4c8 [ 34.648450] kunit_kmalloc_array+0x34/0x88 [ 34.648530] copy_user_test_oob+0xac/0xec8 [ 34.648625] kunit_try_run_case+0x170/0x3f0 [ 34.648694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.648991] kthread+0x328/0x630 [ 34.649074] ret_from_fork+0x10/0x20 [ 34.649164] [ 34.649214] The buggy address belongs to the object at fff00000c970b200 [ 34.649214] which belongs to the cache kmalloc-128 of size 128 [ 34.649286] The buggy address is located 0 bytes to the right of [ 34.649286] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.649506] [ 34.649555] The buggy address belongs to the physical page: [ 34.649591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.649675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.649792] page_type: f5(slab) [ 34.649859] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.650048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.650220] page dumped because: kasan: bad access detected [ 34.650289] [ 34.650347] Memory state around the buggy address: [ 34.650521] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.650572] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.650647] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.650750] ^ [ 34.650828] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.650917] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.651139] ================================================================== [ 34.641030] ================================================================== [ 34.641096] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 34.641323] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.641387] [ 34.641421] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.641506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.641536] Hardware name: linux,dummy-virt (DT) [ 34.641606] Call trace: [ 34.641632] show_stack+0x20/0x38 (C) [ 34.641712] dump_stack_lvl+0x8c/0xd0 [ 34.641938] print_report+0x118/0x5e8 [ 34.642004] kasan_report+0xdc/0x128 [ 34.642167] kasan_check_range+0x100/0x1a8 [ 34.642218] __kasan_check_write+0x20/0x30 [ 34.642276] strncpy_from_user+0x3c/0x2a0 [ 34.642370] copy_user_test_oob+0x5c0/0xec8 [ 34.642427] kunit_try_run_case+0x170/0x3f0 [ 34.642474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.642527] kthread+0x328/0x630 [ 34.642579] ret_from_fork+0x10/0x20 [ 34.642637] [ 34.642657] Allocated by task 316: [ 34.642687] kasan_save_stack+0x3c/0x68 [ 34.642734] kasan_save_track+0x20/0x40 [ 34.642771] kasan_save_alloc_info+0x40/0x58 [ 34.642811] __kasan_kmalloc+0xd4/0xd8 [ 34.642845] __kmalloc_noprof+0x198/0x4c8 [ 34.642884] kunit_kmalloc_array+0x34/0x88 [ 34.642931] copy_user_test_oob+0xac/0xec8 [ 34.642972] kunit_try_run_case+0x170/0x3f0 [ 34.643011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.643055] kthread+0x328/0x630 [ 34.643099] ret_from_fork+0x10/0x20 [ 34.643136] [ 34.643156] The buggy address belongs to the object at fff00000c970b200 [ 34.643156] which belongs to the cache kmalloc-128 of size 128 [ 34.643216] The buggy address is located 0 bytes inside of [ 34.643216] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.643280] [ 34.643303] The buggy address belongs to the physical page: [ 34.643335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.643390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.643441] page_type: f5(slab) [ 34.643482] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.643537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.643580] page dumped because: kasan: bad access detected [ 34.643613] [ 34.643633] Memory state around the buggy address: [ 34.643666] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.643736] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.643938] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.643981] ^ [ 34.644142] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.644305] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.644539] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob: Failure
Automatically assigned
[ 34.609181] ================================================================== [ 34.609320] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 34.609445] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.609504] [ 34.609549] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.609638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.609666] Hardware name: linux,dummy-virt (DT) [ 34.609701] Call trace: [ 34.609729] show_stack+0x20/0x38 (C) [ 34.609783] dump_stack_lvl+0x8c/0xd0 [ 34.609835] print_report+0x118/0x5e8 [ 34.609881] kasan_report+0xdc/0x128 [ 34.609924] kasan_check_range+0x100/0x1a8 [ 34.609972] __kasan_check_write+0x20/0x30 [ 34.610038] copy_user_test_oob+0x234/0xec8 [ 34.610250] kunit_try_run_case+0x170/0x3f0 [ 34.610307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.610359] kthread+0x328/0x630 [ 34.610403] ret_from_fork+0x10/0x20 [ 34.610496] [ 34.610524] Allocated by task 316: [ 34.610574] kasan_save_stack+0x3c/0x68 [ 34.610616] kasan_save_track+0x20/0x40 [ 34.610659] kasan_save_alloc_info+0x40/0x58 [ 34.610714] __kasan_kmalloc+0xd4/0xd8 [ 34.610751] __kmalloc_noprof+0x198/0x4c8 [ 34.610793] kunit_kmalloc_array+0x34/0x88 [ 34.610832] copy_user_test_oob+0xac/0xec8 [ 34.610872] kunit_try_run_case+0x170/0x3f0 [ 34.610912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.611804] kthread+0x328/0x630 [ 34.611924] ret_from_fork+0x10/0x20 [ 34.611976] [ 34.612016] The buggy address belongs to the object at fff00000c970b200 [ 34.612016] which belongs to the cache kmalloc-128 of size 128 [ 34.612140] The buggy address is located 0 bytes inside of [ 34.612140] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.612232] [ 34.612288] The buggy address belongs to the physical page: [ 34.612427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.612494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.612577] page_type: f5(slab) [ 34.612665] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.612774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.612849] page dumped because: kasan: bad access detected [ 34.612934] [ 34.613003] Memory state around the buggy address: [ 34.613112] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.613187] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.613264] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.613340] ^ [ 34.613403] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.613445] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.613485] ================================================================== [ 34.624935] ================================================================== [ 34.625010] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 34.625065] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.625148] [ 34.625198] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.625284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.625330] Hardware name: linux,dummy-virt (DT) [ 34.625379] Call trace: [ 34.625405] show_stack+0x20/0x38 (C) [ 34.625471] dump_stack_lvl+0x8c/0xd0 [ 34.625519] print_report+0x118/0x5e8 [ 34.625564] kasan_report+0xdc/0x128 [ 34.625612] kasan_check_range+0x100/0x1a8 [ 34.625698] __kasan_check_write+0x20/0x30 [ 34.625764] copy_user_test_oob+0x35c/0xec8 [ 34.625819] kunit_try_run_case+0x170/0x3f0 [ 34.625867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.625920] kthread+0x328/0x630 [ 34.626088] ret_from_fork+0x10/0x20 [ 34.626142] [ 34.626164] Allocated by task 316: [ 34.626212] kasan_save_stack+0x3c/0x68 [ 34.626271] kasan_save_track+0x20/0x40 [ 34.626326] kasan_save_alloc_info+0x40/0x58 [ 34.626383] __kasan_kmalloc+0xd4/0xd8 [ 34.626419] __kmalloc_noprof+0x198/0x4c8 [ 34.626465] kunit_kmalloc_array+0x34/0x88 [ 34.626519] copy_user_test_oob+0xac/0xec8 [ 34.626562] kunit_try_run_case+0x170/0x3f0 [ 34.626618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.626661] kthread+0x328/0x630 [ 34.626696] ret_from_fork+0x10/0x20 [ 34.626857] [ 34.626880] The buggy address belongs to the object at fff00000c970b200 [ 34.626880] which belongs to the cache kmalloc-128 of size 128 [ 34.626940] The buggy address is located 0 bytes inside of [ 34.626940] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.627044] [ 34.627068] The buggy address belongs to the physical page: [ 34.627128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.627182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.627238] page_type: f5(slab) [ 34.627283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.627357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.627399] page dumped because: kasan: bad access detected [ 34.627449] [ 34.627478] Memory state around the buggy address: [ 34.627512] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.627557] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.627626] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.627685] ^ [ 34.627726] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.627804] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.627841] ================================================================== [ 34.634220] ================================================================== [ 34.634270] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 34.634318] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.634369] [ 34.634444] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.634541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.634577] Hardware name: linux,dummy-virt (DT) [ 34.634741] Call trace: [ 34.634783] show_stack+0x20/0x38 (C) [ 34.634848] dump_stack_lvl+0x8c/0xd0 [ 34.635016] print_report+0x118/0x5e8 [ 34.635270] kasan_report+0xdc/0x128 [ 34.635322] kasan_check_range+0x100/0x1a8 [ 34.635399] __kasan_check_read+0x20/0x30 [ 34.635474] copy_user_test_oob+0x4a0/0xec8 [ 34.635530] kunit_try_run_case+0x170/0x3f0 [ 34.635594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.635692] kthread+0x328/0x630 [ 34.635761] ret_from_fork+0x10/0x20 [ 34.635841] [ 34.635876] Allocated by task 316: [ 34.635905] kasan_save_stack+0x3c/0x68 [ 34.635943] kasan_save_track+0x20/0x40 [ 34.636221] kasan_save_alloc_info+0x40/0x58 [ 34.636274] __kasan_kmalloc+0xd4/0xd8 [ 34.636489] __kmalloc_noprof+0x198/0x4c8 [ 34.636562] kunit_kmalloc_array+0x34/0x88 [ 34.636661] copy_user_test_oob+0xac/0xec8 [ 34.636747] kunit_try_run_case+0x170/0x3f0 [ 34.636978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.637189] kthread+0x328/0x630 [ 34.637264] ret_from_fork+0x10/0x20 [ 34.637310] [ 34.637331] The buggy address belongs to the object at fff00000c970b200 [ 34.637331] which belongs to the cache kmalloc-128 of size 128 [ 34.637584] The buggy address is located 0 bytes inside of [ 34.637584] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.637770] [ 34.637839] The buggy address belongs to the physical page: [ 34.637917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.638138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.638295] page_type: f5(slab) [ 34.638355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.638414] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.638694] page dumped because: kasan: bad access detected [ 34.638754] [ 34.638798] Memory state around the buggy address: [ 34.638996] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.639076] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639205] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.639306] ^ [ 34.639380] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639575] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639795] ================================================================== [ 34.628618] ================================================================== [ 34.628770] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 34.628825] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.628877] [ 34.628906] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.628991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.629019] Hardware name: linux,dummy-virt (DT) [ 34.629051] Call trace: [ 34.629076] show_stack+0x20/0x38 (C) [ 34.629135] dump_stack_lvl+0x8c/0xd0 [ 34.629184] print_report+0x118/0x5e8 [ 34.629228] kasan_report+0xdc/0x128 [ 34.629274] kasan_check_range+0x100/0x1a8 [ 34.629319] __kasan_check_read+0x20/0x30 [ 34.629366] copy_user_test_oob+0x3c8/0xec8 [ 34.629415] kunit_try_run_case+0x170/0x3f0 [ 34.629460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.629512] kthread+0x328/0x630 [ 34.629553] ret_from_fork+0x10/0x20 [ 34.629601] [ 34.629621] Allocated by task 316: [ 34.629650] kasan_save_stack+0x3c/0x68 [ 34.629689] kasan_save_track+0x20/0x40 [ 34.629726] kasan_save_alloc_info+0x40/0x58 [ 34.629764] __kasan_kmalloc+0xd4/0xd8 [ 34.629800] __kmalloc_noprof+0x198/0x4c8 [ 34.629839] kunit_kmalloc_array+0x34/0x88 [ 34.629879] copy_user_test_oob+0xac/0xec8 [ 34.629918] kunit_try_run_case+0x170/0x3f0 [ 34.629955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.629999] kthread+0x328/0x630 [ 34.630040] ret_from_fork+0x10/0x20 [ 34.630076] [ 34.630106] The buggy address belongs to the object at fff00000c970b200 [ 34.630106] which belongs to the cache kmalloc-128 of size 128 [ 34.630165] The buggy address is located 0 bytes inside of [ 34.630165] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.630231] [ 34.630259] The buggy address belongs to the physical page: [ 34.630290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.630343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.630391] page_type: f5(slab) [ 34.630430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.630483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.630525] page dumped because: kasan: bad access detected [ 34.630559] [ 34.630579] Memory state around the buggy address: [ 34.630611] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.630656] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630701] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.630740] ^ [ 34.630779] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630823] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630863] ================================================================== [ 34.617789] ================================================================== [ 34.617843] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 34.617897] Read of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.617948] [ 34.618029] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.618146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.618193] Hardware name: linux,dummy-virt (DT) [ 34.618263] Call trace: [ 34.618289] show_stack+0x20/0x38 (C) [ 34.618356] dump_stack_lvl+0x8c/0xd0 [ 34.618419] print_report+0x118/0x5e8 [ 34.618487] kasan_report+0xdc/0x128 [ 34.618532] kasan_check_range+0x100/0x1a8 [ 34.618577] __kasan_check_read+0x20/0x30 [ 34.618635] copy_user_test_oob+0x728/0xec8 [ 34.618684] kunit_try_run_case+0x170/0x3f0 [ 34.618733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.618786] kthread+0x328/0x630 [ 34.618829] ret_from_fork+0x10/0x20 [ 34.618875] [ 34.618895] Allocated by task 316: [ 34.618925] kasan_save_stack+0x3c/0x68 [ 34.618973] kasan_save_track+0x20/0x40 [ 34.619012] kasan_save_alloc_info+0x40/0x58 [ 34.619059] __kasan_kmalloc+0xd4/0xd8 [ 34.619105] __kmalloc_noprof+0x198/0x4c8 [ 34.619145] kunit_kmalloc_array+0x34/0x88 [ 34.619183] copy_user_test_oob+0xac/0xec8 [ 34.619222] kunit_try_run_case+0x170/0x3f0 [ 34.619262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.619304] kthread+0x328/0x630 [ 34.619337] ret_from_fork+0x10/0x20 [ 34.619375] [ 34.619396] The buggy address belongs to the object at fff00000c970b200 [ 34.619396] which belongs to the cache kmalloc-128 of size 128 [ 34.619467] The buggy address is located 0 bytes inside of [ 34.619467] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.619546] [ 34.619571] The buggy address belongs to the physical page: [ 34.619605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.619660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.619709] page_type: f5(slab) [ 34.619746] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.619799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.619881] page dumped because: kasan: bad access detected [ 34.619941] [ 34.619961] Memory state around the buggy address: [ 34.619995] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.620040] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620122] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.620165] ^ [ 34.620208] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620252] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620289] ================================================================== [ 34.630968] ================================================================== [ 34.631007] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 34.631052] Write of size 121 at addr fff00000c970b200 by task kunit_try_catch/316 [ 34.631178] [ 34.631226] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.631342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.631380] Hardware name: linux,dummy-virt (DT) [ 34.631428] Call trace: [ 34.631468] show_stack+0x20/0x38 (C) [ 34.631557] dump_stack_lvl+0x8c/0xd0 [ 34.631623] print_report+0x118/0x5e8 [ 34.631667] kasan_report+0xdc/0x128 [ 34.631739] kasan_check_range+0x100/0x1a8 [ 34.631814] __kasan_check_write+0x20/0x30 [ 34.631902] copy_user_test_oob+0x434/0xec8 [ 34.631999] kunit_try_run_case+0x170/0x3f0 [ 34.632105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.632175] kthread+0x328/0x630 [ 34.632220] ret_from_fork+0x10/0x20 [ 34.632266] [ 34.632286] Allocated by task 316: [ 34.632315] kasan_save_stack+0x3c/0x68 [ 34.632353] kasan_save_track+0x20/0x40 [ 34.632391] kasan_save_alloc_info+0x40/0x58 [ 34.632431] __kasan_kmalloc+0xd4/0xd8 [ 34.632654] __kmalloc_noprof+0x198/0x4c8 [ 34.632697] kunit_kmalloc_array+0x34/0x88 [ 34.632736] copy_user_test_oob+0xac/0xec8 [ 34.632776] kunit_try_run_case+0x170/0x3f0 [ 34.632849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.632906] kthread+0x328/0x630 [ 34.632952] ret_from_fork+0x10/0x20 [ 34.633046] [ 34.633125] The buggy address belongs to the object at fff00000c970b200 [ 34.633125] which belongs to the cache kmalloc-128 of size 128 [ 34.633196] The buggy address is located 0 bytes inside of [ 34.633196] allocated 120-byte region [fff00000c970b200, fff00000c970b278) [ 34.633259] [ 34.633281] The buggy address belongs to the physical page: [ 34.633314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.633377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.633427] page_type: f5(slab) [ 34.633474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.633526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.633584] page dumped because: kasan: bad access detected [ 34.633617] [ 34.633645] Memory state around the buggy address: [ 34.633679] fff00000c970b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.633733] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633787] >fff00000c970b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.633833] ^ [ 34.633874] fff00000c970b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633918] fff00000c970b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633975] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault: Failure
Automatically assigned
[ 34.589620] ================================================================== [ 34.589668] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 34.589717] Write of size 8 at addr fff00000c970b178 by task kunit_try_catch/312 [ 34.589768] [ 34.589798] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.589880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.589909] Hardware name: linux,dummy-virt (DT) [ 34.589942] Call trace: [ 34.589964] show_stack+0x20/0x38 (C) [ 34.590013] dump_stack_lvl+0x8c/0xd0 [ 34.590068] print_report+0x118/0x5e8 [ 34.590127] kasan_report+0xdc/0x128 [ 34.590170] kasan_check_range+0x100/0x1a8 [ 34.590218] __kasan_check_write+0x20/0x30 [ 34.590266] copy_to_kernel_nofault+0x8c/0x250 [ 34.590315] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 34.590366] kunit_try_run_case+0x170/0x3f0 [ 34.590413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.590466] kthread+0x328/0x630 [ 34.590510] ret_from_fork+0x10/0x20 [ 34.590556] [ 34.590578] Allocated by task 312: [ 34.590606] kasan_save_stack+0x3c/0x68 [ 34.590645] kasan_save_track+0x20/0x40 [ 34.590681] kasan_save_alloc_info+0x40/0x58 [ 34.590720] __kasan_kmalloc+0xd4/0xd8 [ 34.590755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.590796] copy_to_kernel_nofault_oob+0xc8/0x418 [ 34.590837] kunit_try_run_case+0x170/0x3f0 [ 34.590875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.590919] kthread+0x328/0x630 [ 34.590952] ret_from_fork+0x10/0x20 [ 34.590989] [ 34.591011] The buggy address belongs to the object at fff00000c970b100 [ 34.591011] which belongs to the cache kmalloc-128 of size 128 [ 34.591071] The buggy address is located 0 bytes to the right of [ 34.591071] allocated 120-byte region [fff00000c970b100, fff00000c970b178) [ 34.591199] [ 34.591220] The buggy address belongs to the physical page: [ 34.591253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.591306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.591356] page_type: f5(slab) [ 34.591407] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.591462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.591506] page dumped because: kasan: bad access detected [ 34.591540] [ 34.591561] Memory state around the buggy address: [ 34.591602] fff00000c970b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.591648] fff00000c970b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.591692] >fff00000c970b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.591743] ^ [ 34.591785] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.591838] fff00000c970b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.591879] ================================================================== [ 34.584830] ================================================================== [ 34.584900] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 34.584956] Read of size 8 at addr fff00000c970b178 by task kunit_try_catch/312 [ 34.585007] [ 34.585039] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.585246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.585278] Hardware name: linux,dummy-virt (DT) [ 34.585312] Call trace: [ 34.585336] show_stack+0x20/0x38 (C) [ 34.585388] dump_stack_lvl+0x8c/0xd0 [ 34.585478] print_report+0x118/0x5e8 [ 34.585544] kasan_report+0xdc/0x128 [ 34.585590] __asan_report_load8_noabort+0x20/0x30 [ 34.585641] copy_to_kernel_nofault+0x204/0x250 [ 34.585697] copy_to_kernel_nofault_oob+0x158/0x418 [ 34.585763] kunit_try_run_case+0x170/0x3f0 [ 34.585850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.585903] kthread+0x328/0x630 [ 34.585961] ret_from_fork+0x10/0x20 [ 34.586011] [ 34.586039] Allocated by task 312: [ 34.586899] kasan_save_stack+0x3c/0x68 [ 34.586949] kasan_save_track+0x20/0x40 [ 34.586988] kasan_save_alloc_info+0x40/0x58 [ 34.587026] __kasan_kmalloc+0xd4/0xd8 [ 34.587063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.587117] copy_to_kernel_nofault_oob+0xc8/0x418 [ 34.587159] kunit_try_run_case+0x170/0x3f0 [ 34.587197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.587242] kthread+0x328/0x630 [ 34.587277] ret_from_fork+0x10/0x20 [ 34.587314] [ 34.587335] The buggy address belongs to the object at fff00000c970b100 [ 34.587335] which belongs to the cache kmalloc-128 of size 128 [ 34.587395] The buggy address is located 0 bytes to the right of [ 34.587395] allocated 120-byte region [fff00000c970b100, fff00000c970b178) [ 34.587460] [ 34.587482] The buggy address belongs to the physical page: [ 34.587516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10970b [ 34.587570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.587620] page_type: f5(slab) [ 34.587658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.587710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.587752] page dumped because: kasan: bad access detected [ 34.587785] [ 34.587806] Memory state around the buggy address: [ 34.587841] fff00000c970b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.588912] fff00000c970b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.588963] >fff00000c970b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.589003] ^ [ 34.589047] fff00000c970b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.589103] fff00000c970b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.589145] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob: Failure
Automatically assigned
[ 34.557032] ================================================================== [ 34.557116] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 34.557172] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 34.557273] [ 34.557307] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.557415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.557463] Hardware name: linux,dummy-virt (DT) [ 34.557513] Call trace: [ 34.557539] show_stack+0x20/0x38 (C) [ 34.557608] dump_stack_lvl+0x8c/0xd0 [ 34.557664] print_report+0x310/0x5e8 [ 34.557728] kasan_report+0xdc/0x128 [ 34.557773] __asan_report_load1_noabort+0x20/0x30 [ 34.557839] vmalloc_oob+0x578/0x5d0 [ 34.557886] kunit_try_run_case+0x170/0x3f0 [ 34.557934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.557988] kthread+0x328/0x630 [ 34.558076] ret_from_fork+0x10/0x20 [ 34.558134] [ 34.558157] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 34.558283] The buggy address belongs to the physical page: [ 34.558318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109710 [ 34.558371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.558436] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.558489] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.558549] page dumped because: kasan: bad access detected [ 34.558603] [ 34.558632] Memory state around the buggy address: [ 34.558667] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.558711] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.558756] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.558814] ^ [ 34.558855] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.558898] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.558937] ================================================================== [ 34.559111] ================================================================== [ 34.559156] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 34.559204] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 34.559253] [ 34.559282] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.559394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.559433] Hardware name: linux,dummy-virt (DT) [ 34.559482] Call trace: [ 34.559508] show_stack+0x20/0x38 (C) [ 34.559554] dump_stack_lvl+0x8c/0xd0 [ 34.559617] print_report+0x310/0x5e8 [ 34.559661] kasan_report+0xdc/0x128 [ 34.559706] __asan_report_load1_noabort+0x20/0x30 [ 34.559754] vmalloc_oob+0x51c/0x5d0 [ 34.559800] kunit_try_run_case+0x170/0x3f0 [ 34.559939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.560064] kthread+0x328/0x630 [ 34.560181] ret_from_fork+0x10/0x20 [ 34.560280] [ 34.560446] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 34.560535] The buggy address belongs to the physical page: [ 34.560580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109710 [ 34.560631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.560692] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.560740] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.560850] page dumped because: kasan: bad access detected [ 34.560940] [ 34.560981] Memory state around the buggy address: [ 34.561025] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.561106] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.561161] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.561228] ^ [ 34.561328] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.561374] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.561416] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper: Failure
Automatically assigned
[ 34.289131] ================================================================== [ 34.289184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 34.289237] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.289288] [ 34.289319] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.289403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.289582] Hardware name: linux,dummy-virt (DT) [ 34.289650] Call trace: [ 34.289677] show_stack+0x20/0x38 (C) [ 34.289963] dump_stack_lvl+0x8c/0xd0 [ 34.290017] print_report+0x118/0x5e8 [ 34.290230] kasan_report+0xdc/0x128 [ 34.290284] kasan_check_range+0x100/0x1a8 [ 34.290423] __kasan_check_read+0x20/0x30 [ 34.290475] kasan_atomics_helper+0xdd4/0x4858 [ 34.290526] kasan_atomics+0x198/0x2e0 [ 34.290580] kunit_try_run_case+0x170/0x3f0 [ 34.290627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.290681] kthread+0x328/0x630 [ 34.290725] ret_from_fork+0x10/0x20 [ 34.290987] [ 34.291174] Allocated by task 296: [ 34.291212] kasan_save_stack+0x3c/0x68 [ 34.291256] kasan_save_track+0x20/0x40 [ 34.291294] kasan_save_alloc_info+0x40/0x58 [ 34.291407] __kasan_kmalloc+0xd4/0xd8 [ 34.291447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.291489] kasan_atomics+0xb8/0x2e0 [ 34.291554] kunit_try_run_case+0x170/0x3f0 [ 34.291733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.291821] kthread+0x328/0x630 [ 34.292021] ret_from_fork+0x10/0x20 [ 34.292320] [ 34.292451] The buggy address belongs to the object at fff00000c9708480 [ 34.292451] which belongs to the cache kmalloc-64 of size 64 [ 34.292532] The buggy address is located 0 bytes to the right of [ 34.292532] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.292599] [ 34.292855] The buggy address belongs to the physical page: [ 34.292958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.293045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.293171] page_type: f5(slab) [ 34.293247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.293495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.293646] page dumped because: kasan: bad access detected [ 34.293713] [ 34.293764] Memory state around the buggy address: [ 34.293887] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.293954] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.294018] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.294093] ^ [ 34.294129] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.294173] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.294420] ================================================================== [ 34.388983] ================================================================== [ 34.389035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 34.389342] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.389507] [ 34.389614] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.389699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.389727] Hardware name: linux,dummy-virt (DT) [ 34.389760] Call trace: [ 34.389784] show_stack+0x20/0x38 (C) [ 34.389836] dump_stack_lvl+0x8c/0xd0 [ 34.389884] print_report+0x118/0x5e8 [ 34.389940] kasan_report+0xdc/0x128 [ 34.390107] __asan_report_load8_noabort+0x20/0x30 [ 34.390155] kasan_atomics_helper+0x3f04/0x4858 [ 34.390207] kasan_atomics+0x198/0x2e0 [ 34.390255] kunit_try_run_case+0x170/0x3f0 [ 34.390650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.391128] kthread+0x328/0x630 [ 34.391270] ret_from_fork+0x10/0x20 [ 34.391442] [ 34.391538] Allocated by task 296: [ 34.391678] kasan_save_stack+0x3c/0x68 [ 34.391799] kasan_save_track+0x20/0x40 [ 34.391836] kasan_save_alloc_info+0x40/0x58 [ 34.391876] __kasan_kmalloc+0xd4/0xd8 [ 34.391912] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.391954] kasan_atomics+0xb8/0x2e0 [ 34.392117] kunit_try_run_case+0x170/0x3f0 [ 34.392157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.392202] kthread+0x328/0x630 [ 34.392236] ret_from_fork+0x10/0x20 [ 34.392273] [ 34.392296] The buggy address belongs to the object at fff00000c9708480 [ 34.392296] which belongs to the cache kmalloc-64 of size 64 [ 34.392355] The buggy address is located 0 bytes to the right of [ 34.392355] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.392761] [ 34.393033] The buggy address belongs to the physical page: [ 34.393070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.393137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.393580] page_type: f5(slab) [ 34.393817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.393908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.393978] page dumped because: kasan: bad access detected [ 34.394159] [ 34.394296] Memory state around the buggy address: [ 34.394344] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.394739] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.394788] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.394828] ^ [ 34.394979] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.395112] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.395153] ================================================================== [ 34.416888] ================================================================== [ 34.417065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 34.417347] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.417404] [ 34.417436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.417929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417984] Hardware name: linux,dummy-virt (DT) [ 34.418121] Call trace: [ 34.418336] show_stack+0x20/0x38 (C) [ 34.418497] dump_stack_lvl+0x8c/0xd0 [ 34.418546] print_report+0x118/0x5e8 [ 34.418592] kasan_report+0xdc/0x128 [ 34.418636] kasan_check_range+0x100/0x1a8 [ 34.418681] __kasan_check_write+0x20/0x30 [ 34.418728] kasan_atomics_helper+0x154c/0x4858 [ 34.418778] kasan_atomics+0x198/0x2e0 [ 34.418826] kunit_try_run_case+0x170/0x3f0 [ 34.418873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.418935] kthread+0x328/0x630 [ 34.418979] ret_from_fork+0x10/0x20 [ 34.419143] [ 34.419323] Allocated by task 296: [ 34.419636] kasan_save_stack+0x3c/0x68 [ 34.419763] kasan_save_track+0x20/0x40 [ 34.419802] kasan_save_alloc_info+0x40/0x58 [ 34.419878] __kasan_kmalloc+0xd4/0xd8 [ 34.419952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.419994] kasan_atomics+0xb8/0x2e0 [ 34.420034] kunit_try_run_case+0x170/0x3f0 [ 34.420815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.420886] kthread+0x328/0x630 [ 34.420921] ret_from_fork+0x10/0x20 [ 34.421089] [ 34.421114] The buggy address belongs to the object at fff00000c9708480 [ 34.421114] which belongs to the cache kmalloc-64 of size 64 [ 34.421242] The buggy address is located 0 bytes to the right of [ 34.421242] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.421417] [ 34.421509] The buggy address belongs to the physical page: [ 34.421903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.422014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.422171] page_type: f5(slab) [ 34.422251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.422405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.422475] page dumped because: kasan: bad access detected [ 34.422592] [ 34.422614] Memory state around the buggy address: [ 34.422712] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.422818] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.422896] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.423063] ^ [ 34.423385] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.423559] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.423602] ================================================================== [ 34.295071] ================================================================== [ 34.295147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 34.295201] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.295253] [ 34.295282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.295475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.295535] Hardware name: linux,dummy-virt (DT) [ 34.295569] Call trace: [ 34.295600] show_stack+0x20/0x38 (C) [ 34.295893] dump_stack_lvl+0x8c/0xd0 [ 34.295975] print_report+0x118/0x5e8 [ 34.296150] kasan_report+0xdc/0x128 [ 34.296212] __asan_report_load8_noabort+0x20/0x30 [ 34.296274] kasan_atomics_helper+0x3f58/0x4858 [ 34.296326] kasan_atomics+0x198/0x2e0 [ 34.296437] kunit_try_run_case+0x170/0x3f0 [ 34.296487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.296541] kthread+0x328/0x630 [ 34.296585] ret_from_fork+0x10/0x20 [ 34.296827] [ 34.296865] Allocated by task 296: [ 34.297065] kasan_save_stack+0x3c/0x68 [ 34.297357] kasan_save_track+0x20/0x40 [ 34.297413] kasan_save_alloc_info+0x40/0x58 [ 34.297461] __kasan_kmalloc+0xd4/0xd8 [ 34.297498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.297564] kasan_atomics+0xb8/0x2e0 [ 34.297800] kunit_try_run_case+0x170/0x3f0 [ 34.297881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.298061] kthread+0x328/0x630 [ 34.298143] ret_from_fork+0x10/0x20 [ 34.298434] [ 34.298529] The buggy address belongs to the object at fff00000c9708480 [ 34.298529] which belongs to the cache kmalloc-64 of size 64 [ 34.298630] The buggy address is located 0 bytes to the right of [ 34.298630] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.298699] [ 34.298720] The buggy address belongs to the physical page: [ 34.298789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.299034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.299225] page_type: f5(slab) [ 34.299292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.299559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.299607] page dumped because: kasan: bad access detected [ 34.299649] [ 34.299695] Memory state around the buggy address: [ 34.299753] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.299915] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.299969] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.300088] ^ [ 34.300137] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.300182] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.300222] ================================================================== [ 34.507295] ================================================================== [ 34.507353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 34.507409] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.507461] [ 34.507496] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.507584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.507616] Hardware name: linux,dummy-virt (DT) [ 34.507650] Call trace: [ 34.507675] show_stack+0x20/0x38 (C) [ 34.507732] dump_stack_lvl+0x8c/0xd0 [ 34.510851] print_report+0x118/0x5e8 [ 34.511179] kasan_report+0xdc/0x128 [ 34.511230] kasan_check_range+0x100/0x1a8 [ 34.511277] __kasan_check_write+0x20/0x30 [ 34.511327] kasan_atomics_helper+0x175c/0x4858 [ 34.512254] kasan_atomics+0x198/0x2e0 [ 34.512595] kunit_try_run_case+0x170/0x3f0 [ 34.512671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.512726] kthread+0x328/0x630 [ 34.513387] ret_from_fork+0x10/0x20 [ 34.513822] [ 34.513848] Allocated by task 296: [ 34.514283] kasan_save_stack+0x3c/0x68 [ 34.514329] kasan_save_track+0x20/0x40 [ 34.514366] kasan_save_alloc_info+0x40/0x58 [ 34.514407] __kasan_kmalloc+0xd4/0xd8 [ 34.514445] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.514489] kasan_atomics+0xb8/0x2e0 [ 34.515650] kunit_try_run_case+0x170/0x3f0 [ 34.515711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.517700] kthread+0x328/0x630 [ 34.517802] ret_from_fork+0x10/0x20 [ 34.518005] [ 34.518053] The buggy address belongs to the object at fff00000c9708480 [ 34.518053] which belongs to the cache kmalloc-64 of size 64 [ 34.518196] The buggy address is located 0 bytes to the right of [ 34.518196] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.518314] [ 34.518466] The buggy address belongs to the physical page: [ 34.518575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.519141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.519621] page_type: f5(slab) [ 34.520619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.520700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.520770] page dumped because: kasan: bad access detected [ 34.520890] [ 34.520911] Memory state around the buggy address: [ 34.521051] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.521774] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.521980] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.522198] ^ [ 34.522473] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.522635] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.523030] ================================================================== [ 34.439434] ================================================================== [ 34.439679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 34.439801] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.439851] [ 34.440093] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.440220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.440416] Hardware name: linux,dummy-virt (DT) [ 34.440508] Call trace: [ 34.440533] show_stack+0x20/0x38 (C) [ 34.440672] dump_stack_lvl+0x8c/0xd0 [ 34.440782] print_report+0x118/0x5e8 [ 34.440826] kasan_report+0xdc/0x128 [ 34.440872] kasan_check_range+0x100/0x1a8 [ 34.441267] __kasan_check_write+0x20/0x30 [ 34.441415] kasan_atomics_helper+0x1644/0x4858 [ 34.441468] kasan_atomics+0x198/0x2e0 [ 34.441555] kunit_try_run_case+0x170/0x3f0 [ 34.441797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441886] kthread+0x328/0x630 [ 34.441950] ret_from_fork+0x10/0x20 [ 34.442106] [ 34.442127] Allocated by task 296: [ 34.442157] kasan_save_stack+0x3c/0x68 [ 34.442199] kasan_save_track+0x20/0x40 [ 34.442237] kasan_save_alloc_info+0x40/0x58 [ 34.442277] __kasan_kmalloc+0xd4/0xd8 [ 34.442593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.442696] kasan_atomics+0xb8/0x2e0 [ 34.442900] kunit_try_run_case+0x170/0x3f0 [ 34.442943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.443213] kthread+0x328/0x630 [ 34.443351] ret_from_fork+0x10/0x20 [ 34.443390] [ 34.443413] The buggy address belongs to the object at fff00000c9708480 [ 34.443413] which belongs to the cache kmalloc-64 of size 64 [ 34.443474] The buggy address is located 0 bytes to the right of [ 34.443474] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.443539] [ 34.443560] The buggy address belongs to the physical page: [ 34.443593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.443646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.443736] page_type: f5(slab) [ 34.443778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.443827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.443869] page dumped because: kasan: bad access detected [ 34.444177] [ 34.444200] Memory state around the buggy address: [ 34.444236] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.444280] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.444324] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.444363] ^ [ 34.444398] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.444443] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.444482] ================================================================== [ 34.541037] ================================================================== [ 34.541121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 34.541196] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.541247] [ 34.541302] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.541405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.541459] Hardware name: linux,dummy-virt (DT) [ 34.541522] Call trace: [ 34.541547] show_stack+0x20/0x38 (C) [ 34.541614] dump_stack_lvl+0x8c/0xd0 [ 34.541684] print_report+0x118/0x5e8 [ 34.541737] kasan_report+0xdc/0x128 [ 34.541781] kasan_check_range+0x100/0x1a8 [ 34.541828] __kasan_check_write+0x20/0x30 [ 34.541875] kasan_atomics_helper+0x17ec/0x4858 [ 34.541925] kasan_atomics+0x198/0x2e0 [ 34.541971] kunit_try_run_case+0x170/0x3f0 [ 34.542273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.542378] kthread+0x328/0x630 [ 34.542438] ret_from_fork+0x10/0x20 [ 34.542504] [ 34.542542] Allocated by task 296: [ 34.542608] kasan_save_stack+0x3c/0x68 [ 34.542654] kasan_save_track+0x20/0x40 [ 34.542700] kasan_save_alloc_info+0x40/0x58 [ 34.542746] __kasan_kmalloc+0xd4/0xd8 [ 34.542914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.542960] kasan_atomics+0xb8/0x2e0 [ 34.542999] kunit_try_run_case+0x170/0x3f0 [ 34.543051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.543122] kthread+0x328/0x630 [ 34.543159] ret_from_fork+0x10/0x20 [ 34.543242] [ 34.543281] The buggy address belongs to the object at fff00000c9708480 [ 34.543281] which belongs to the cache kmalloc-64 of size 64 [ 34.543342] The buggy address is located 0 bytes to the right of [ 34.543342] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.543425] [ 34.543472] The buggy address belongs to the physical page: [ 34.543506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.543558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.543608] page_type: f5(slab) [ 34.543647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.543720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.544006] page dumped because: kasan: bad access detected [ 34.544094] [ 34.544164] Memory state around the buggy address: [ 34.544221] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.544267] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.544311] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.544351] ^ [ 34.544398] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.544445] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.544498] ================================================================== [ 34.153520] ================================================================== [ 34.153584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 34.153636] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.153688] [ 34.153718] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.153803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.153831] Hardware name: linux,dummy-virt (DT) [ 34.153862] Call trace: [ 34.153887] show_stack+0x20/0x38 (C) [ 34.153934] dump_stack_lvl+0x8c/0xd0 [ 34.153983] print_report+0x118/0x5e8 [ 34.154034] kasan_report+0xdc/0x128 [ 34.154091] kasan_check_range+0x100/0x1a8 [ 34.154276] __kasan_check_write+0x20/0x30 [ 34.154330] kasan_atomics_helper+0x760/0x4858 [ 34.154735] kasan_atomics+0x198/0x2e0 [ 34.154829] kunit_try_run_case+0x170/0x3f0 [ 34.155133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.155225] kthread+0x328/0x630 [ 34.155283] ret_from_fork+0x10/0x20 [ 34.155340] [ 34.155362] Allocated by task 296: [ 34.155393] kasan_save_stack+0x3c/0x68 [ 34.155440] kasan_save_track+0x20/0x40 [ 34.155479] kasan_save_alloc_info+0x40/0x58 [ 34.155525] __kasan_kmalloc+0xd4/0xd8 [ 34.155562] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.155603] kasan_atomics+0xb8/0x2e0 [ 34.155643] kunit_try_run_case+0x170/0x3f0 [ 34.155690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.155979] kthread+0x328/0x630 [ 34.156069] ret_from_fork+0x10/0x20 [ 34.156321] [ 34.156355] The buggy address belongs to the object at fff00000c9708480 [ 34.156355] which belongs to the cache kmalloc-64 of size 64 [ 34.156761] The buggy address is located 0 bytes to the right of [ 34.156761] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.156925] [ 34.157117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.157635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.158475] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158534] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158866] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.159027] ^ [ 34.159115] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.159244] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.159298] ================================================================== [ 34.348159] ================================================================== [ 34.348256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 34.348357] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.348432] [ 34.348743] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.348871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.349030] Hardware name: linux,dummy-virt (DT) [ 34.349093] Call trace: [ 34.349117] show_stack+0x20/0x38 (C) [ 34.349175] dump_stack_lvl+0x8c/0xd0 [ 34.349225] print_report+0x118/0x5e8 [ 34.349494] kasan_report+0xdc/0x128 [ 34.349617] kasan_check_range+0x100/0x1a8 [ 34.349710] __kasan_check_write+0x20/0x30 [ 34.349885] kasan_atomics_helper+0x1128/0x4858 [ 34.350105] kasan_atomics+0x198/0x2e0 [ 34.350185] kunit_try_run_case+0x170/0x3f0 [ 34.350349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.350444] kthread+0x328/0x630 [ 34.350579] ret_from_fork+0x10/0x20 [ 34.350855] [ 34.350987] Allocated by task 296: [ 34.351046] kasan_save_stack+0x3c/0x68 [ 34.351174] kasan_save_track+0x20/0x40 [ 34.351262] kasan_save_alloc_info+0x40/0x58 [ 34.351503] __kasan_kmalloc+0xd4/0xd8 [ 34.351643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.351721] kasan_atomics+0xb8/0x2e0 [ 34.351807] kunit_try_run_case+0x170/0x3f0 [ 34.352092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.352151] kthread+0x328/0x630 [ 34.352279] ret_from_fork+0x10/0x20 [ 34.352347] [ 34.352468] The buggy address belongs to the object at fff00000c9708480 [ 34.352468] which belongs to the cache kmalloc-64 of size 64 [ 34.352597] The buggy address is located 0 bytes to the right of [ 34.352597] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.352846] [ 34.352916] The buggy address belongs to the physical page: [ 34.352997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.353219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.353387] page_type: f5(slab) [ 34.353447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.353540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.353621] page dumped because: kasan: bad access detected [ 34.353833] [ 34.353924] Memory state around the buggy address: [ 34.354057] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.354242] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.354337] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.354445] ^ [ 34.354533] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.354598] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.354782] ================================================================== [ 34.282320] ================================================================== [ 34.282371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 34.282423] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.282473] [ 34.282532] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.282627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.282657] Hardware name: linux,dummy-virt (DT) [ 34.282689] Call trace: [ 34.282722] show_stack+0x20/0x38 (C) [ 34.282781] dump_stack_lvl+0x8c/0xd0 [ 34.282830] print_report+0x118/0x5e8 [ 34.282877] kasan_report+0xdc/0x128 [ 34.282923] __asan_report_load4_noabort+0x20/0x30 [ 34.282981] kasan_atomics_helper+0x3e04/0x4858 [ 34.283041] kasan_atomics+0x198/0x2e0 [ 34.283484] kunit_try_run_case+0x170/0x3f0 [ 34.283636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.283715] kthread+0x328/0x630 [ 34.283961] ret_from_fork+0x10/0x20 [ 34.284035] [ 34.284058] Allocated by task 296: [ 34.284295] kasan_save_stack+0x3c/0x68 [ 34.284491] kasan_save_track+0x20/0x40 [ 34.284572] kasan_save_alloc_info+0x40/0x58 [ 34.284667] __kasan_kmalloc+0xd4/0xd8 [ 34.284954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.285053] kasan_atomics+0xb8/0x2e0 [ 34.285221] kunit_try_run_case+0x170/0x3f0 [ 34.285265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.285317] kthread+0x328/0x630 [ 34.285548] ret_from_fork+0x10/0x20 [ 34.285633] [ 34.285743] The buggy address belongs to the object at fff00000c9708480 [ 34.285743] which belongs to the cache kmalloc-64 of size 64 [ 34.285833] The buggy address is located 0 bytes to the right of [ 34.285833] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.286066] [ 34.286104] The buggy address belongs to the physical page: [ 34.286138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.286330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.286420] page_type: f5(slab) [ 34.286572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.286670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.286953] page dumped because: kasan: bad access detected [ 34.287146] [ 34.287228] Memory state around the buggy address: [ 34.287304] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.287443] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.287517] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.287566] ^ [ 34.287602] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288007] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288102] ================================================================== [ 34.342465] ================================================================== [ 34.342544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 34.342596] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.342727] [ 34.342759] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.342850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.343055] Hardware name: linux,dummy-virt (DT) [ 34.343126] Call trace: [ 34.343201] show_stack+0x20/0x38 (C) [ 34.343254] dump_stack_lvl+0x8c/0xd0 [ 34.343321] print_report+0x118/0x5e8 [ 34.343375] kasan_report+0xdc/0x128 [ 34.343418] kasan_check_range+0x100/0x1a8 [ 34.343463] __kasan_check_write+0x20/0x30 [ 34.343510] kasan_atomics_helper+0x10c0/0x4858 [ 34.343677] kasan_atomics+0x198/0x2e0 [ 34.343857] kunit_try_run_case+0x170/0x3f0 [ 34.343943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.344091] kthread+0x328/0x630 [ 34.344160] ret_from_fork+0x10/0x20 [ 34.344255] [ 34.344277] Allocated by task 296: [ 34.344307] kasan_save_stack+0x3c/0x68 [ 34.344347] kasan_save_track+0x20/0x40 [ 34.344693] kasan_save_alloc_info+0x40/0x58 [ 34.344770] __kasan_kmalloc+0xd4/0xd8 [ 34.344860] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.345016] kasan_atomics+0xb8/0x2e0 [ 34.345242] kunit_try_run_case+0x170/0x3f0 [ 34.345336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.345468] kthread+0x328/0x630 [ 34.345554] ret_from_fork+0x10/0x20 [ 34.345600] [ 34.345623] The buggy address belongs to the object at fff00000c9708480 [ 34.345623] which belongs to the cache kmalloc-64 of size 64 [ 34.345859] The buggy address is located 0 bytes to the right of [ 34.345859] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.346025] [ 34.346077] The buggy address belongs to the physical page: [ 34.346502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.346596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.346720] page_type: f5(slab) [ 34.346760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.346814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.346865] page dumped because: kasan: bad access detected [ 34.346897] [ 34.346937] Memory state around the buggy address: [ 34.346991] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.347037] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.347091] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.347130] ^ [ 34.347166] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.347210] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.347250] ================================================================== [ 34.272413] ================================================================== [ 34.272464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 34.272518] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.272570] [ 34.272602] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.272687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.272717] Hardware name: linux,dummy-virt (DT) [ 34.272750] Call trace: [ 34.272774] show_stack+0x20/0x38 (C) [ 34.272823] dump_stack_lvl+0x8c/0xd0 [ 34.272872] print_report+0x118/0x5e8 [ 34.272919] kasan_report+0xdc/0x128 [ 34.272963] __asan_report_load4_noabort+0x20/0x30 [ 34.273015] kasan_atomics_helper+0x3dd8/0x4858 [ 34.273066] kasan_atomics+0x198/0x2e0 [ 34.273129] kunit_try_run_case+0x170/0x3f0 [ 34.273177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.273230] kthread+0x328/0x630 [ 34.273274] ret_from_fork+0x10/0x20 [ 34.273419] [ 34.273462] Allocated by task 296: [ 34.273499] kasan_save_stack+0x3c/0x68 [ 34.273546] kasan_save_track+0x20/0x40 [ 34.273903] kasan_save_alloc_info+0x40/0x58 [ 34.274065] __kasan_kmalloc+0xd4/0xd8 [ 34.274134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.274177] kasan_atomics+0xb8/0x2e0 [ 34.274381] kunit_try_run_case+0x170/0x3f0 [ 34.274420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.274472] kthread+0x328/0x630 [ 34.274682] ret_from_fork+0x10/0x20 [ 34.274753] [ 34.274776] The buggy address belongs to the object at fff00000c9708480 [ 34.274776] which belongs to the cache kmalloc-64 of size 64 [ 34.274907] The buggy address is located 0 bytes to the right of [ 34.274907] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.274990] [ 34.275175] The buggy address belongs to the physical page: [ 34.275221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.275388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.275444] page_type: f5(slab) [ 34.275501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.275571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.275615] page dumped because: kasan: bad access detected [ 34.275648] [ 34.275670] Memory state around the buggy address: [ 34.275702] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.275944] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.276101] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.276146] ^ [ 34.276206] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.276258] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.276308] ================================================================== [ 34.487095] ================================================================== [ 34.487147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 34.487989] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.488343] [ 34.488378] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.488522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.488582] Hardware name: linux,dummy-virt (DT) [ 34.488629] Call trace: [ 34.489371] show_stack+0x20/0x38 (C) [ 34.489705] dump_stack_lvl+0x8c/0xd0 [ 34.490280] print_report+0x118/0x5e8 [ 34.490955] kasan_report+0xdc/0x128 [ 34.491088] __asan_report_load8_noabort+0x20/0x30 [ 34.491143] kasan_atomics_helper+0x3e10/0x4858 [ 34.491195] kasan_atomics+0x198/0x2e0 [ 34.491242] kunit_try_run_case+0x170/0x3f0 [ 34.492382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.492614] kthread+0x328/0x630 [ 34.493609] ret_from_fork+0x10/0x20 [ 34.493817] [ 34.493877] Allocated by task 296: [ 34.494047] kasan_save_stack+0x3c/0x68 [ 34.494227] kasan_save_track+0x20/0x40 [ 34.494894] kasan_save_alloc_info+0x40/0x58 [ 34.495013] __kasan_kmalloc+0xd4/0xd8 [ 34.495254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.495692] kasan_atomics+0xb8/0x2e0 [ 34.496120] kunit_try_run_case+0x170/0x3f0 [ 34.496192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.496237] kthread+0x328/0x630 [ 34.496958] ret_from_fork+0x10/0x20 [ 34.497065] [ 34.497329] The buggy address belongs to the object at fff00000c9708480 [ 34.497329] which belongs to the cache kmalloc-64 of size 64 [ 34.497502] The buggy address is located 0 bytes to the right of [ 34.497502] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.497779] [ 34.497838] The buggy address belongs to the physical page: [ 34.498453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.498611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.498756] page_type: f5(slab) [ 34.498853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.499984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.500123] page dumped because: kasan: bad access detected [ 34.500187] [ 34.500207] Memory state around the buggy address: [ 34.500426] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.500475] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.500521] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.501462] ^ [ 34.501584] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.501769] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.501857] ================================================================== [ 34.305777] ================================================================== [ 34.305825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 34.305884] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.305943] [ 34.305983] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.306698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.306750] Hardware name: linux,dummy-virt (DT) [ 34.306785] Call trace: [ 34.307199] show_stack+0x20/0x38 (C) [ 34.307271] dump_stack_lvl+0x8c/0xd0 [ 34.307322] print_report+0x118/0x5e8 [ 34.307565] kasan_report+0xdc/0x128 [ 34.307633] __asan_report_store8_noabort+0x20/0x30 [ 34.307748] kasan_atomics_helper+0x3e5c/0x4858 [ 34.307817] kasan_atomics+0x198/0x2e0 [ 34.307949] kunit_try_run_case+0x170/0x3f0 [ 34.308040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.308149] kthread+0x328/0x630 [ 34.308194] ret_from_fork+0x10/0x20 [ 34.308257] [ 34.308517] Allocated by task 296: [ 34.308585] kasan_save_stack+0x3c/0x68 [ 34.308693] kasan_save_track+0x20/0x40 [ 34.308772] kasan_save_alloc_info+0x40/0x58 [ 34.309047] __kasan_kmalloc+0xd4/0xd8 [ 34.309130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.309218] kasan_atomics+0xb8/0x2e0 [ 34.309304] kunit_try_run_case+0x170/0x3f0 [ 34.309374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.309620] kthread+0x328/0x630 [ 34.309718] ret_from_fork+0x10/0x20 [ 34.309796] [ 34.310049] The buggy address belongs to the object at fff00000c9708480 [ 34.310049] which belongs to the cache kmalloc-64 of size 64 [ 34.310206] The buggy address is located 0 bytes to the right of [ 34.310206] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.310302] [ 34.310385] The buggy address belongs to the physical page: [ 34.310465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.310565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.310618] page_type: f5(slab) [ 34.310657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.310716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.310991] page dumped because: kasan: bad access detected [ 34.311312] [ 34.311384] Memory state around the buggy address: [ 34.311606] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.311704] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.311806] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.311873] ^ [ 34.311965] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.312012] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.312160] ================================================================== [ 34.318844] ================================================================== [ 34.318911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 34.319055] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.319121] [ 34.319160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.319252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.319310] Hardware name: linux,dummy-virt (DT) [ 34.319343] Call trace: [ 34.319367] show_stack+0x20/0x38 (C) [ 34.319415] dump_stack_lvl+0x8c/0xd0 [ 34.319464] print_report+0x118/0x5e8 [ 34.319509] kasan_report+0xdc/0x128 [ 34.319554] kasan_check_range+0x100/0x1a8 [ 34.319602] __kasan_check_write+0x20/0x30 [ 34.319649] kasan_atomics_helper+0xf20/0x4858 [ 34.319699] kasan_atomics+0x198/0x2e0 [ 34.320303] kunit_try_run_case+0x170/0x3f0 [ 34.320383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.320521] kthread+0x328/0x630 [ 34.320673] ret_from_fork+0x10/0x20 [ 34.320728] [ 34.320750] Allocated by task 296: [ 34.321055] kasan_save_stack+0x3c/0x68 [ 34.321222] kasan_save_track+0x20/0x40 [ 34.321323] kasan_save_alloc_info+0x40/0x58 [ 34.321401] __kasan_kmalloc+0xd4/0xd8 [ 34.321648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.321790] kasan_atomics+0xb8/0x2e0 [ 34.321851] kunit_try_run_case+0x170/0x3f0 [ 34.321930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.322074] kthread+0x328/0x630 [ 34.322182] ret_from_fork+0x10/0x20 [ 34.322221] [ 34.322266] The buggy address belongs to the object at fff00000c9708480 [ 34.322266] which belongs to the cache kmalloc-64 of size 64 [ 34.322548] The buggy address is located 0 bytes to the right of [ 34.322548] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.322700] [ 34.322750] The buggy address belongs to the physical page: [ 34.322988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.323148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.323236] page_type: f5(slab) [ 34.323348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.323402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.323488] page dumped because: kasan: bad access detected [ 34.323568] [ 34.323848] Memory state around the buggy address: [ 34.324059] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.324210] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.324287] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.324398] ^ [ 34.324443] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324558] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324624] ================================================================== [ 34.445667] ================================================================== [ 34.445820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 34.445876] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.445932] [ 34.446372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.446724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.446818] Hardware name: linux,dummy-virt (DT) [ 34.447123] Call trace: [ 34.447441] show_stack+0x20/0x38 (C) [ 34.448067] dump_stack_lvl+0x8c/0xd0 [ 34.448201] print_report+0x118/0x5e8 [ 34.448246] kasan_report+0xdc/0x128 [ 34.448293] __asan_report_load8_noabort+0x20/0x30 [ 34.449271] kasan_atomics_helper+0x3df4/0x4858 [ 34.449935] kasan_atomics+0x198/0x2e0 [ 34.450072] kunit_try_run_case+0x170/0x3f0 [ 34.450132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450188] kthread+0x328/0x630 [ 34.451582] ret_from_fork+0x10/0x20 [ 34.451942] [ 34.452001] Allocated by task 296: [ 34.452033] kasan_save_stack+0x3c/0x68 [ 34.452076] kasan_save_track+0x20/0x40 [ 34.452125] kasan_save_alloc_info+0x40/0x58 [ 34.452167] __kasan_kmalloc+0xd4/0xd8 [ 34.452922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.453618] kasan_atomics+0xb8/0x2e0 [ 34.453939] kunit_try_run_case+0x170/0x3f0 [ 34.454209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.454851] kthread+0x328/0x630 [ 34.454896] ret_from_fork+0x10/0x20 [ 34.455108] [ 34.455626] The buggy address belongs to the object at fff00000c9708480 [ 34.455626] which belongs to the cache kmalloc-64 of size 64 [ 34.455983] The buggy address is located 0 bytes to the right of [ 34.455983] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.456052] [ 34.456075] The buggy address belongs to the physical page: [ 34.456829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.457115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.457175] page_type: f5(slab) [ 34.458046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.459115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.459247] page dumped because: kasan: bad access detected [ 34.459320] [ 34.459353] Memory state around the buggy address: [ 34.459455] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.459757] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.460300] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.460511] ^ [ 34.460557] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.461116] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.463076] ================================================================== [ 34.355649] ================================================================== [ 34.355750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 34.355840] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.355972] [ 34.356029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.356284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.356410] Hardware name: linux,dummy-virt (DT) [ 34.356482] Call trace: [ 34.356541] show_stack+0x20/0x38 (C) [ 34.356710] dump_stack_lvl+0x8c/0xd0 [ 34.356805] print_report+0x118/0x5e8 [ 34.356931] kasan_report+0xdc/0x128 [ 34.356986] kasan_check_range+0x100/0x1a8 [ 34.357051] __kasan_check_write+0x20/0x30 [ 34.357107] kasan_atomics_helper+0x1190/0x4858 [ 34.357157] kasan_atomics+0x198/0x2e0 [ 34.357204] kunit_try_run_case+0x170/0x3f0 [ 34.357252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.357359] kthread+0x328/0x630 [ 34.357404] ret_from_fork+0x10/0x20 [ 34.357469] [ 34.357490] Allocated by task 296: [ 34.357530] kasan_save_stack+0x3c/0x68 [ 34.357590] kasan_save_track+0x20/0x40 [ 34.357628] kasan_save_alloc_info+0x40/0x58 [ 34.357668] __kasan_kmalloc+0xd4/0xd8 [ 34.357706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.357749] kasan_atomics+0xb8/0x2e0 [ 34.357788] kunit_try_run_case+0x170/0x3f0 [ 34.357833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.357888] kthread+0x328/0x630 [ 34.357922] ret_from_fork+0x10/0x20 [ 34.357960] [ 34.357990] The buggy address belongs to the object at fff00000c9708480 [ 34.357990] which belongs to the cache kmalloc-64 of size 64 [ 34.358053] The buggy address is located 0 bytes to the right of [ 34.358053] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.358654] [ 34.358695] The buggy address belongs to the physical page: [ 34.358818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.358916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.359213] page_type: f5(slab) [ 34.359280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.359419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.359490] page dumped because: kasan: bad access detected [ 34.359530] [ 34.359550] Memory state around the buggy address: [ 34.359900] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.360000] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.360269] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.360314] ^ [ 34.360380] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.360443] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.360550] ================================================================== [ 34.368787] ================================================================== [ 34.368838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 34.368891] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.368967] [ 34.368998] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.369550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.369610] Hardware name: linux,dummy-virt (DT) [ 34.369644] Call trace: [ 34.369868] show_stack+0x20/0x38 (C) [ 34.369943] dump_stack_lvl+0x8c/0xd0 [ 34.370002] print_report+0x118/0x5e8 [ 34.370165] kasan_report+0xdc/0x128 [ 34.370221] kasan_check_range+0x100/0x1a8 [ 34.370340] __kasan_check_write+0x20/0x30 [ 34.370395] kasan_atomics_helper+0x126c/0x4858 [ 34.370447] kasan_atomics+0x198/0x2e0 [ 34.370501] kunit_try_run_case+0x170/0x3f0 [ 34.370624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.370681] kthread+0x328/0x630 [ 34.370724] ret_from_fork+0x10/0x20 [ 34.370910] [ 34.371043] Allocated by task 296: [ 34.371094] kasan_save_stack+0x3c/0x68 [ 34.371138] kasan_save_track+0x20/0x40 [ 34.371378] kasan_save_alloc_info+0x40/0x58 [ 34.371583] __kasan_kmalloc+0xd4/0xd8 [ 34.371628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.371753] kasan_atomics+0xb8/0x2e0 [ 34.371815] kunit_try_run_case+0x170/0x3f0 [ 34.371878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.371932] kthread+0x328/0x630 [ 34.371966] ret_from_fork+0x10/0x20 [ 34.372219] [ 34.372353] The buggy address belongs to the object at fff00000c9708480 [ 34.372353] which belongs to the cache kmalloc-64 of size 64 [ 34.372438] The buggy address is located 0 bytes to the right of [ 34.372438] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.372701] [ 34.372771] The buggy address belongs to the physical page: [ 34.372867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.372940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.373048] page_type: f5(slab) [ 34.373102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.373337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.373524] page dumped because: kasan: bad access detected [ 34.373598] [ 34.373657] Memory state around the buggy address: [ 34.373907] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.374169] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.374235] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.374299] ^ [ 34.374408] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.374653] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.374735] ================================================================== [ 34.431891] ================================================================== [ 34.432025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 34.432110] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.432160] [ 34.432192] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.432552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.432675] Hardware name: linux,dummy-virt (DT) [ 34.432710] Call trace: [ 34.432733] show_stack+0x20/0x38 (C) [ 34.432786] dump_stack_lvl+0x8c/0xd0 [ 34.432835] print_report+0x118/0x5e8 [ 34.432882] kasan_report+0xdc/0x128 [ 34.433276] __asan_report_load8_noabort+0x20/0x30 [ 34.433402] kasan_atomics_helper+0x3db0/0x4858 [ 34.433591] kasan_atomics+0x198/0x2e0 [ 34.433641] kunit_try_run_case+0x170/0x3f0 [ 34.434074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.434144] kthread+0x328/0x630 [ 34.434190] ret_from_fork+0x10/0x20 [ 34.434240] [ 34.434508] Allocated by task 296: [ 34.434642] kasan_save_stack+0x3c/0x68 [ 34.434703] kasan_save_track+0x20/0x40 [ 34.434791] kasan_save_alloc_info+0x40/0x58 [ 34.434851] __kasan_kmalloc+0xd4/0xd8 [ 34.434995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.435090] kasan_atomics+0xb8/0x2e0 [ 34.435129] kunit_try_run_case+0x170/0x3f0 [ 34.435168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.435213] kthread+0x328/0x630 [ 34.435246] ret_from_fork+0x10/0x20 [ 34.435284] [ 34.435307] The buggy address belongs to the object at fff00000c9708480 [ 34.435307] which belongs to the cache kmalloc-64 of size 64 [ 34.435397] The buggy address is located 0 bytes to the right of [ 34.435397] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.435847] [ 34.436057] The buggy address belongs to the physical page: [ 34.436294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.436490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.436539] page_type: f5(slab) [ 34.436578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.436833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.436882] page dumped because: kasan: bad access detected [ 34.436915] [ 34.436935] Memory state around the buggy address: [ 34.437354] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.437418] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.437779] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.437902] ^ [ 34.437940] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.437985] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.438029] ================================================================== [ 34.424852] ================================================================== [ 34.424946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 34.425297] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.425355] [ 34.425385] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.425470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.425498] Hardware name: linux,dummy-virt (DT) [ 34.425530] Call trace: [ 34.425553] show_stack+0x20/0x38 (C) [ 34.425613] dump_stack_lvl+0x8c/0xd0 [ 34.425744] print_report+0x118/0x5e8 [ 34.425832] kasan_report+0xdc/0x128 [ 34.426028] kasan_check_range+0x100/0x1a8 [ 34.426179] __kasan_check_write+0x20/0x30 [ 34.426354] kasan_atomics_helper+0x15b4/0x4858 [ 34.426582] kasan_atomics+0x198/0x2e0 [ 34.426738] kunit_try_run_case+0x170/0x3f0 [ 34.426786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.426847] kthread+0x328/0x630 [ 34.427047] ret_from_fork+0x10/0x20 [ 34.427466] [ 34.427571] Allocated by task 296: [ 34.427671] kasan_save_stack+0x3c/0x68 [ 34.428511] kasan_save_track+0x20/0x40 [ 34.428741] kasan_save_alloc_info+0x40/0x58 [ 34.428785] __kasan_kmalloc+0xd4/0xd8 [ 34.428822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.428864] kasan_atomics+0xb8/0x2e0 [ 34.428905] kunit_try_run_case+0x170/0x3f0 [ 34.428946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.429137] kthread+0x328/0x630 [ 34.429187] ret_from_fork+0x10/0x20 [ 34.429226] [ 34.429250] The buggy address belongs to the object at fff00000c9708480 [ 34.429250] which belongs to the cache kmalloc-64 of size 64 [ 34.429311] The buggy address is located 0 bytes to the right of [ 34.429311] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.429385] [ 34.429408] The buggy address belongs to the physical page: [ 34.429441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.429753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.429869] page_type: f5(slab) [ 34.429908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.430056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.430204] page dumped because: kasan: bad access detected [ 34.430343] [ 34.430365] Memory state around the buggy address: [ 34.430420] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.430487] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.430531] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.430571] ^ [ 34.431021] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.431141] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.431209] ================================================================== [ 34.145697] ================================================================== [ 34.145757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 34.145823] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.145875] [ 34.145906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.145992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.146030] Hardware name: linux,dummy-virt (DT) [ 34.146061] Call trace: [ 34.146100] show_stack+0x20/0x38 (C) [ 34.146148] dump_stack_lvl+0x8c/0xd0 [ 34.146196] print_report+0x118/0x5e8 [ 34.146240] kasan_report+0xdc/0x128 [ 34.146296] kasan_check_range+0x100/0x1a8 [ 34.146342] __kasan_check_write+0x20/0x30 [ 34.146389] kasan_atomics_helper+0x6ec/0x4858 [ 34.146439] kasan_atomics+0x198/0x2e0 [ 34.146485] kunit_try_run_case+0x170/0x3f0 [ 34.146532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.146584] kthread+0x328/0x630 [ 34.146640] ret_from_fork+0x10/0x20 [ 34.146693] [ 34.146715] Allocated by task 296: [ 34.146743] kasan_save_stack+0x3c/0x68 [ 34.146782] kasan_save_track+0x20/0x40 [ 34.146829] kasan_save_alloc_info+0x40/0x58 [ 34.146867] __kasan_kmalloc+0xd4/0xd8 [ 34.146904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.146945] kasan_atomics+0xb8/0x2e0 [ 34.147071] kthread+0x328/0x630 [ 34.147115] ret_from_fork+0x10/0x20 [ 34.147151] [ 34.147428] The buggy address is located 0 bytes to the right of [ 34.147428] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.148019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.148874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.149460] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149510] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.149717] ^ [ 34.149784] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.149935] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.152029] ================================================================== [ 34.276645] ================================================================== [ 34.276717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 34.276858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.276945] [ 34.276993] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.277312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.277366] Hardware name: linux,dummy-virt (DT) [ 34.277550] Call trace: [ 34.277581] show_stack+0x20/0x38 (C) [ 34.277633] dump_stack_lvl+0x8c/0xd0 [ 34.277751] print_report+0x118/0x5e8 [ 34.277827] kasan_report+0xdc/0x128 [ 34.277882] kasan_check_range+0x100/0x1a8 [ 34.277937] __kasan_check_write+0x20/0x30 [ 34.278207] kasan_atomics_helper+0xd3c/0x4858 [ 34.278543] kasan_atomics+0x198/0x2e0 [ 34.278639] kunit_try_run_case+0x170/0x3f0 [ 34.278700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.278754] kthread+0x328/0x630 [ 34.278797] ret_from_fork+0x10/0x20 [ 34.278845] [ 34.279032] Allocated by task 296: [ 34.279118] kasan_save_stack+0x3c/0x68 [ 34.279346] kasan_save_track+0x20/0x40 [ 34.279397] kasan_save_alloc_info+0x40/0x58 [ 34.279474] __kasan_kmalloc+0xd4/0xd8 [ 34.279511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.279555] kasan_atomics+0xb8/0x2e0 [ 34.279595] kunit_try_run_case+0x170/0x3f0 [ 34.279695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.279909] kthread+0x328/0x630 [ 34.279948] ret_from_fork+0x10/0x20 [ 34.279992] [ 34.280041] The buggy address belongs to the object at fff00000c9708480 [ 34.280041] which belongs to the cache kmalloc-64 of size 64 [ 34.280208] The buggy address is located 0 bytes to the right of [ 34.280208] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.280279] [ 34.280301] The buggy address belongs to the physical page: [ 34.280343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.280587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.280742] page_type: f5(slab) [ 34.280831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.281108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.281183] page dumped because: kasan: bad access detected [ 34.281248] [ 34.281292] Memory state around the buggy address: [ 34.281390] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.281475] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.281535] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.281646] ^ [ 34.281689] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.281734] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.281780] ================================================================== [ 34.401950] ================================================================== [ 34.401996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 34.402053] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.402115] [ 34.402494] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.402948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.403520] Hardware name: linux,dummy-virt (DT) [ 34.403558] Call trace: [ 34.403581] show_stack+0x20/0x38 (C) [ 34.403632] dump_stack_lvl+0x8c/0xd0 [ 34.403679] print_report+0x118/0x5e8 [ 34.403779] kasan_report+0xdc/0x128 [ 34.403823] kasan_check_range+0x100/0x1a8 [ 34.403869] __kasan_check_write+0x20/0x30 [ 34.403916] kasan_atomics_helper+0x147c/0x4858 [ 34.404108] kasan_atomics+0x198/0x2e0 [ 34.404170] kunit_try_run_case+0x170/0x3f0 [ 34.404217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.404503] kthread+0x328/0x630 [ 34.404557] ret_from_fork+0x10/0x20 [ 34.405025] [ 34.405055] Allocated by task 296: [ 34.405098] kasan_save_stack+0x3c/0x68 [ 34.405141] kasan_save_track+0x20/0x40 [ 34.405195] kasan_save_alloc_info+0x40/0x58 [ 34.405235] __kasan_kmalloc+0xd4/0xd8 [ 34.405380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.405433] kasan_atomics+0xb8/0x2e0 [ 34.405473] kunit_try_run_case+0x170/0x3f0 [ 34.406043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.406357] kthread+0x328/0x630 [ 34.406396] ret_from_fork+0x10/0x20 [ 34.406653] [ 34.406722] The buggy address belongs to the object at fff00000c9708480 [ 34.406722] which belongs to the cache kmalloc-64 of size 64 [ 34.407140] The buggy address is located 0 bytes to the right of [ 34.407140] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.407405] [ 34.407456] The buggy address belongs to the physical page: [ 34.407548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.407602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.407685] page_type: f5(slab) [ 34.407768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.407820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.407879] page dumped because: kasan: bad access detected [ 34.407911] [ 34.408093] Memory state around the buggy address: [ 34.408134] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.408181] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.408227] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.408268] ^ [ 34.408819] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.408901] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.409131] ================================================================== [ 34.301270] ================================================================== [ 34.301322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 34.301436] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.301491] [ 34.301549] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.301953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.302003] Hardware name: linux,dummy-virt (DT) [ 34.302042] Call trace: [ 34.302068] show_stack+0x20/0x38 (C) [ 34.302131] dump_stack_lvl+0x8c/0xd0 [ 34.302181] print_report+0x118/0x5e8 [ 34.302226] kasan_report+0xdc/0x128 [ 34.302467] kasan_check_range+0x100/0x1a8 [ 34.302533] __kasan_check_write+0x20/0x30 [ 34.302641] kasan_atomics_helper+0xe44/0x4858 [ 34.302695] kasan_atomics+0x198/0x2e0 [ 34.302918] kunit_try_run_case+0x170/0x3f0 [ 34.302997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.303107] kthread+0x328/0x630 [ 34.303162] ret_from_fork+0x10/0x20 [ 34.303380] [ 34.303528] Allocated by task 296: [ 34.303563] kasan_save_stack+0x3c/0x68 [ 34.303608] kasan_save_track+0x20/0x40 [ 34.303711] kasan_save_alloc_info+0x40/0x58 [ 34.303796] __kasan_kmalloc+0xd4/0xd8 [ 34.304030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.304099] kasan_atomics+0xb8/0x2e0 [ 34.304146] kunit_try_run_case+0x170/0x3f0 [ 34.304270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.304322] kthread+0x328/0x630 [ 34.304576] ret_from_fork+0x10/0x20 [ 34.304637] [ 34.304662] The buggy address belongs to the object at fff00000c9708480 [ 34.304662] which belongs to the cache kmalloc-64 of size 64 [ 34.304727] The buggy address is located 0 bytes to the right of [ 34.304727] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.304811] [ 34.304836] The buggy address belongs to the physical page: [ 34.304873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.304927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.304977] page_type: f5(slab) [ 34.305029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.305097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.305149] page dumped because: kasan: bad access detected [ 34.305182] [ 34.305207] Memory state around the buggy address: [ 34.305252] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.305306] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.305355] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.305404] ^ [ 34.305455] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.305516] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.305556] ================================================================== [ 34.410641] ================================================================== [ 34.410692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 34.410744] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.410794] [ 34.410824] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.410909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.410938] Hardware name: linux,dummy-virt (DT) [ 34.410970] Call trace: [ 34.410993] show_stack+0x20/0x38 (C) [ 34.411203] dump_stack_lvl+0x8c/0xd0 [ 34.411408] print_report+0x118/0x5e8 [ 34.411607] kasan_report+0xdc/0x128 [ 34.411960] kasan_check_range+0x100/0x1a8 [ 34.412011] __kasan_check_write+0x20/0x30 [ 34.412059] kasan_atomics_helper+0x14e4/0x4858 [ 34.412120] kasan_atomics+0x198/0x2e0 [ 34.412168] kunit_try_run_case+0x170/0x3f0 [ 34.412215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.413033] kthread+0x328/0x630 [ 34.413150] ret_from_fork+0x10/0x20 [ 34.413235] [ 34.413334] Allocated by task 296: [ 34.413393] kasan_save_stack+0x3c/0x68 [ 34.413433] kasan_save_track+0x20/0x40 [ 34.413471] kasan_save_alloc_info+0x40/0x58 [ 34.413551] __kasan_kmalloc+0xd4/0xd8 [ 34.413589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.413642] kasan_atomics+0xb8/0x2e0 [ 34.413743] kunit_try_run_case+0x170/0x3f0 [ 34.413823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.413984] kthread+0x328/0x630 [ 34.414035] ret_from_fork+0x10/0x20 [ 34.414090] [ 34.414112] The buggy address belongs to the object at fff00000c9708480 [ 34.414112] which belongs to the cache kmalloc-64 of size 64 [ 34.414172] The buggy address is located 0 bytes to the right of [ 34.414172] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.414237] [ 34.414260] The buggy address belongs to the physical page: [ 34.414294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.414346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.414395] page_type: f5(slab) [ 34.414433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.414737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.415019] page dumped because: kasan: bad access detected [ 34.415057] [ 34.415089] Memory state around the buggy address: [ 34.415321] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.415439] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.415558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.415639] ^ [ 34.415769] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.415814] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.415873] ================================================================== [ 34.325553] ================================================================== [ 34.325614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 34.325664] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.325714] [ 34.325931] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.326105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.326139] Hardware name: linux,dummy-virt (DT) [ 34.326173] Call trace: [ 34.326199] show_stack+0x20/0x38 (C) [ 34.326415] dump_stack_lvl+0x8c/0xd0 [ 34.326547] print_report+0x118/0x5e8 [ 34.326614] kasan_report+0xdc/0x128 [ 34.326669] kasan_check_range+0x100/0x1a8 [ 34.326868] __kasan_check_write+0x20/0x30 [ 34.326941] kasan_atomics_helper+0xf88/0x4858 [ 34.327025] kasan_atomics+0x198/0x2e0 [ 34.327095] kunit_try_run_case+0x170/0x3f0 [ 34.327190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.327246] kthread+0x328/0x630 [ 34.327313] ret_from_fork+0x10/0x20 [ 34.327402] [ 34.327442] Allocated by task 296: [ 34.327490] kasan_save_stack+0x3c/0x68 [ 34.327644] kasan_save_track+0x20/0x40 [ 34.327688] kasan_save_alloc_info+0x40/0x58 [ 34.327749] __kasan_kmalloc+0xd4/0xd8 [ 34.327870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.327955] kasan_atomics+0xb8/0x2e0 [ 34.328066] kunit_try_run_case+0x170/0x3f0 [ 34.328119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.328164] kthread+0x328/0x630 [ 34.328201] ret_from_fork+0x10/0x20 [ 34.328237] [ 34.328260] The buggy address belongs to the object at fff00000c9708480 [ 34.328260] which belongs to the cache kmalloc-64 of size 64 [ 34.328318] The buggy address is located 0 bytes to the right of [ 34.328318] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.328395] [ 34.328441] The buggy address belongs to the physical page: [ 34.328481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.328533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.328592] page_type: f5(slab) [ 34.328647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.328699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.328740] page dumped because: kasan: bad access detected [ 34.328774] [ 34.328794] Memory state around the buggy address: [ 34.328834] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.328888] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.328932] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.328982] ^ [ 34.329015] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.329062] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.329510] ================================================================== [ 34.381857] ================================================================== [ 34.382590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 34.382661] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.382721] [ 34.382882] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.383063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.383182] Hardware name: linux,dummy-virt (DT) [ 34.383222] Call trace: [ 34.383342] show_stack+0x20/0x38 (C) [ 34.383408] dump_stack_lvl+0x8c/0xd0 [ 34.383464] print_report+0x118/0x5e8 [ 34.383685] kasan_report+0xdc/0x128 [ 34.383790] kasan_check_range+0x100/0x1a8 [ 34.383836] __kasan_check_write+0x20/0x30 [ 34.383882] kasan_atomics_helper+0x1384/0x4858 [ 34.383934] kasan_atomics+0x198/0x2e0 [ 34.384102] kunit_try_run_case+0x170/0x3f0 [ 34.384160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.384214] kthread+0x328/0x630 [ 34.384257] ret_from_fork+0x10/0x20 [ 34.384305] [ 34.384326] Allocated by task 296: [ 34.384693] kasan_save_stack+0x3c/0x68 [ 34.384792] kasan_save_track+0x20/0x40 [ 34.384831] kasan_save_alloc_info+0x40/0x58 [ 34.384871] __kasan_kmalloc+0xd4/0xd8 [ 34.384908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.384949] kasan_atomics+0xb8/0x2e0 [ 34.385247] kunit_try_run_case+0x170/0x3f0 [ 34.385337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.385384] kthread+0x328/0x630 [ 34.385417] ret_from_fork+0x10/0x20 [ 34.385455] [ 34.385488] The buggy address belongs to the object at fff00000c9708480 [ 34.385488] which belongs to the cache kmalloc-64 of size 64 [ 34.385549] The buggy address is located 0 bytes to the right of [ 34.385549] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.385794] [ 34.386218] The buggy address belongs to the physical page: [ 34.386275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.386332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.386405] page_type: f5(slab) [ 34.386503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.386555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.386597] page dumped because: kasan: bad access detected [ 34.386629] [ 34.386651] Memory state around the buggy address: [ 34.386733] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.386812] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.386892] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.387012] ^ [ 34.387373] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.387692] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.387750] ================================================================== [ 34.337419] ================================================================== [ 34.337483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 34.337569] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.337643] [ 34.337702] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.337925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.337954] Hardware name: linux,dummy-virt (DT) [ 34.338004] Call trace: [ 34.338034] show_stack+0x20/0x38 (C) [ 34.338096] dump_stack_lvl+0x8c/0xd0 [ 34.338179] print_report+0x118/0x5e8 [ 34.338238] kasan_report+0xdc/0x128 [ 34.338282] kasan_check_range+0x100/0x1a8 [ 34.338356] __kasan_check_write+0x20/0x30 [ 34.338415] kasan_atomics_helper+0x1058/0x4858 [ 34.338475] kasan_atomics+0x198/0x2e0 [ 34.338523] kunit_try_run_case+0x170/0x3f0 [ 34.338570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.338623] kthread+0x328/0x630 [ 34.338674] ret_from_fork+0x10/0x20 [ 34.338722] [ 34.338744] Allocated by task 296: [ 34.338772] kasan_save_stack+0x3c/0x68 [ 34.338812] kasan_save_track+0x20/0x40 [ 34.338850] kasan_save_alloc_info+0x40/0x58 [ 34.338889] __kasan_kmalloc+0xd4/0xd8 [ 34.338925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.338968] kasan_atomics+0xb8/0x2e0 [ 34.339016] kunit_try_run_case+0x170/0x3f0 [ 34.339055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.339523] kthread+0x328/0x630 [ 34.339575] ret_from_fork+0x10/0x20 [ 34.339613] [ 34.339637] The buggy address belongs to the object at fff00000c9708480 [ 34.339637] which belongs to the cache kmalloc-64 of size 64 [ 34.339846] The buggy address is located 0 bytes to the right of [ 34.339846] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.340069] [ 34.340152] The buggy address belongs to the physical page: [ 34.340239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.340324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.340538] page_type: f5(slab) [ 34.340667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.340757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.340845] page dumped because: kasan: bad access detected [ 34.340979] [ 34.341000] Memory state around the buggy address: [ 34.341034] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341233] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341397] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.341474] ^ [ 34.341601] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.341675] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.341897] ================================================================== [ 34.465498] ================================================================== [ 34.465551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 34.467477] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.467628] [ 34.467663] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.467760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.467789] Hardware name: linux,dummy-virt (DT) [ 34.467822] Call trace: [ 34.467846] show_stack+0x20/0x38 (C) [ 34.467900] dump_stack_lvl+0x8c/0xd0 [ 34.469558] print_report+0x118/0x5e8 [ 34.469824] kasan_report+0xdc/0x128 [ 34.470348] kasan_check_range+0x100/0x1a8 [ 34.471028] __kasan_check_write+0x20/0x30 [ 34.471225] kasan_atomics_helper+0x16d0/0x4858 [ 34.471277] kasan_atomics+0x198/0x2e0 [ 34.471327] kunit_try_run_case+0x170/0x3f0 [ 34.471375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.472323] kthread+0x328/0x630 [ 34.472846] ret_from_fork+0x10/0x20 [ 34.473473] [ 34.473734] Allocated by task 296: [ 34.473771] kasan_save_stack+0x3c/0x68 [ 34.474301] kasan_save_track+0x20/0x40 [ 34.474726] kasan_save_alloc_info+0x40/0x58 [ 34.474784] __kasan_kmalloc+0xd4/0xd8 [ 34.474821] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.474864] kasan_atomics+0xb8/0x2e0 [ 34.475763] kunit_try_run_case+0x170/0x3f0 [ 34.475831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.475879] kthread+0x328/0x630 [ 34.475915] ret_from_fork+0x10/0x20 [ 34.475954] [ 34.475977] The buggy address belongs to the object at fff00000c9708480 [ 34.475977] which belongs to the cache kmalloc-64 of size 64 [ 34.476038] The buggy address is located 0 bytes to the right of [ 34.476038] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.477239] [ 34.477619] The buggy address belongs to the physical page: [ 34.477991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.478523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.478584] page_type: f5(slab) [ 34.478625] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.479216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.479869] page dumped because: kasan: bad access detected [ 34.479914] [ 34.479936] Memory state around the buggy address: [ 34.481060] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.481368] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.481614] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.482409] ^ [ 34.482464] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.482611] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.482785] ================================================================== [ 34.136980] ================================================================== [ 34.137268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 34.137331] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.137386] [ 34.137491] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.137585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.137862] Hardware name: linux,dummy-virt (DT) [ 34.137923] Call trace: [ 34.137950] show_stack+0x20/0x38 (C) [ 34.138007] dump_stack_lvl+0x8c/0xd0 [ 34.138353] print_report+0x118/0x5e8 [ 34.138431] kasan_report+0xdc/0x128 [ 34.138700] kasan_check_range+0x100/0x1a8 [ 34.138844] __kasan_check_write+0x20/0x30 [ 34.138899] kasan_atomics_helper+0x684/0x4858 [ 34.138951] kasan_atomics+0x198/0x2e0 [ 34.139157] kunit_try_run_case+0x170/0x3f0 [ 34.139325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.139393] kthread+0x328/0x630 [ 34.139438] ret_from_fork+0x10/0x20 [ 34.139731] [ 34.139783] Allocated by task 296: [ 34.139924] kasan_save_stack+0x3c/0x68 [ 34.139992] kasan_save_track+0x20/0x40 [ 34.140031] kasan_save_alloc_info+0x40/0x58 [ 34.140076] __kasan_kmalloc+0xd4/0xd8 [ 34.140123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.140710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.140784] kthread+0x328/0x630 [ 34.140826] ret_from_fork+0x10/0x20 [ 34.141125] [ 34.141213] The buggy address belongs to the object at fff00000c9708480 [ 34.141213] which belongs to the cache kmalloc-64 of size 64 [ 34.141554] [ 34.141684] The buggy address belongs to the physical page: [ 34.141789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.142164] page_type: f5(slab) [ 34.142242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.142621] page dumped because: kasan: bad access detected [ 34.142765] [ 34.142849] Memory state around the buggy address: [ 34.143164] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.143216] ^ [ 34.143295] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.143570] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.143625] ================================================================== [ 34.361639] ================================================================== [ 34.361853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 34.362035] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.362117] [ 34.362178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.362350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.362409] Hardware name: linux,dummy-virt (DT) [ 34.362444] Call trace: [ 34.362546] show_stack+0x20/0x38 (C) [ 34.362599] dump_stack_lvl+0x8c/0xd0 [ 34.362648] print_report+0x118/0x5e8 [ 34.362692] kasan_report+0xdc/0x128 [ 34.362951] kasan_check_range+0x100/0x1a8 [ 34.363107] __kasan_check_write+0x20/0x30 [ 34.363176] kasan_atomics_helper+0x11f8/0x4858 [ 34.363396] kasan_atomics+0x198/0x2e0 [ 34.363593] kunit_try_run_case+0x170/0x3f0 [ 34.363675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.363800] kthread+0x328/0x630 [ 34.363877] ret_from_fork+0x10/0x20 [ 34.364072] [ 34.364150] Allocated by task 296: [ 34.364387] kasan_save_stack+0x3c/0x68 [ 34.364666] kasan_save_track+0x20/0x40 [ 34.364713] kasan_save_alloc_info+0x40/0x58 [ 34.364762] __kasan_kmalloc+0xd4/0xd8 [ 34.364800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.364843] kasan_atomics+0xb8/0x2e0 [ 34.364960] kunit_try_run_case+0x170/0x3f0 [ 34.365038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.365180] kthread+0x328/0x630 [ 34.365279] ret_from_fork+0x10/0x20 [ 34.365608] [ 34.365664] The buggy address belongs to the object at fff00000c9708480 [ 34.365664] which belongs to the cache kmalloc-64 of size 64 [ 34.365758] The buggy address is located 0 bytes to the right of [ 34.365758] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.365907] [ 34.365965] The buggy address belongs to the physical page: [ 34.366192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.366365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.366458] page_type: f5(slab) [ 34.366526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.366761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.366949] page dumped because: kasan: bad access detected [ 34.367020] [ 34.367119] Memory state around the buggy address: [ 34.367157] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.367420] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.367558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.367626] ^ [ 34.367873] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.368063] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.368151] ================================================================== [ 34.313160] ================================================================== [ 34.313216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 34.313276] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.313392] [ 34.313452] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.313569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.313600] Hardware name: linux,dummy-virt (DT) [ 34.313630] Call trace: [ 34.313654] show_stack+0x20/0x38 (C) [ 34.313877] dump_stack_lvl+0x8c/0xd0 [ 34.313942] print_report+0x118/0x5e8 [ 34.314050] kasan_report+0xdc/0x128 [ 34.314136] kasan_check_range+0x100/0x1a8 [ 34.314353] __kasan_check_write+0x20/0x30 [ 34.314456] kasan_atomics_helper+0xeb8/0x4858 [ 34.314512] kasan_atomics+0x198/0x2e0 [ 34.314558] kunit_try_run_case+0x170/0x3f0 [ 34.314612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.314664] kthread+0x328/0x630 [ 34.314826] ret_from_fork+0x10/0x20 [ 34.314890] [ 34.315026] Allocated by task 296: [ 34.315075] kasan_save_stack+0x3c/0x68 [ 34.315195] kasan_save_track+0x20/0x40 [ 34.315244] kasan_save_alloc_info+0x40/0x58 [ 34.315299] __kasan_kmalloc+0xd4/0xd8 [ 34.315337] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.315387] kasan_atomics+0xb8/0x2e0 [ 34.315425] kunit_try_run_case+0x170/0x3f0 [ 34.315465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.315609] kthread+0x328/0x630 [ 34.315657] ret_from_fork+0x10/0x20 [ 34.315696] [ 34.315992] The buggy address belongs to the object at fff00000c9708480 [ 34.315992] which belongs to the cache kmalloc-64 of size 64 [ 34.316127] The buggy address is located 0 bytes to the right of [ 34.316127] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.316432] [ 34.316583] The buggy address belongs to the physical page: [ 34.316642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.316769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.316909] page_type: f5(slab) [ 34.317030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.317093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.317136] page dumped because: kasan: bad access detected [ 34.317175] [ 34.317195] Memory state around the buggy address: [ 34.317227] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.317491] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.317597] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.317666] ^ [ 34.317861] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.318108] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.318197] ================================================================== [ 34.330553] ================================================================== [ 34.330607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 34.330659] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.330719] [ 34.330749] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.331071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.331192] Hardware name: linux,dummy-virt (DT) [ 34.331248] Call trace: [ 34.331275] show_stack+0x20/0x38 (C) [ 34.331331] dump_stack_lvl+0x8c/0xd0 [ 34.331524] print_report+0x118/0x5e8 [ 34.331810] kasan_report+0xdc/0x128 [ 34.331874] kasan_check_range+0x100/0x1a8 [ 34.331952] __kasan_check_write+0x20/0x30 [ 34.332040] kasan_atomics_helper+0xff0/0x4858 [ 34.332121] kasan_atomics+0x198/0x2e0 [ 34.332224] kunit_try_run_case+0x170/0x3f0 [ 34.332374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.332471] kthread+0x328/0x630 [ 34.332579] ret_from_fork+0x10/0x20 [ 34.332630] [ 34.332666] Allocated by task 296: [ 34.332701] kasan_save_stack+0x3c/0x68 [ 34.332977] kasan_save_track+0x20/0x40 [ 34.333050] kasan_save_alloc_info+0x40/0x58 [ 34.333530] __kasan_kmalloc+0xd4/0xd8 [ 34.333614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.333678] kasan_atomics+0xb8/0x2e0 [ 34.333751] kunit_try_run_case+0x170/0x3f0 [ 34.333979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.334075] kthread+0x328/0x630 [ 34.334205] ret_from_fork+0x10/0x20 [ 34.334246] [ 34.334275] The buggy address belongs to the object at fff00000c9708480 [ 34.334275] which belongs to the cache kmalloc-64 of size 64 [ 34.334552] The buggy address is located 0 bytes to the right of [ 34.334552] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.334675] [ 34.334724] The buggy address belongs to the physical page: [ 34.334787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.334950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.335138] page_type: f5(slab) [ 34.335213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.335280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.335393] page dumped because: kasan: bad access detected [ 34.335462] [ 34.335536] Memory state around the buggy address: [ 34.335575] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.335620] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.335908] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.336023] ^ [ 34.336102] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.336191] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.336444] ================================================================== [ 34.172580] ================================================================== [ 34.172633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 34.172765] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.172819] [ 34.172877] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.172969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.172997] Hardware name: linux,dummy-virt (DT) [ 34.173337] Call trace: [ 34.173387] show_stack+0x20/0x38 (C) [ 34.173453] dump_stack_lvl+0x8c/0xd0 [ 34.173574] print_report+0x118/0x5e8 [ 34.173638] kasan_report+0xdc/0x128 [ 34.173705] __asan_report_load4_noabort+0x20/0x30 [ 34.176866] page_type: f5(slab) [ 34.178033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.181623] kasan_save_alloc_info+0x40/0x58 [ 34.181689] __kasan_kmalloc+0xd4/0xd8 [ 34.182037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.182161] kasan_atomics+0xb8/0x2e0 [ 34.182218] kunit_try_run_case+0x170/0x3f0 [ 34.182297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.182675] kthread+0x328/0x630 [ 34.182749] ret_from_fork+0x10/0x20 [ 34.183033] [ 34.183071] The buggy address belongs to the object at fff00000c9708480 [ 34.183071] which belongs to the cache kmalloc-64 of size 64 [ 34.183169] The buggy address is located 0 bytes to the right of [ 34.183169] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.183302] [ 34.183381] The buggy address belongs to the physical page: [ 34.183738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.183816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.183933] page_type: f5(slab) [ 34.184017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.184328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.184541] page dumped because: kasan: bad access detected [ 34.184616] [ 34.184646] Memory state around the buggy address: [ 34.184932] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.185011] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.185815] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.190271] kasan_save_alloc_info+0x40/0x58 [ 34.194675] kasan_atomics+0x198/0x2e0 [ 34.196971] [ 34.197032] The buggy address belongs to the physical page: [ 34.197140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.197196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.197248] page_type: f5(slab) [ 34.197287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.197574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.198041] page dumped because: kasan: bad access detected [ 34.198157] [ 34.198216] Memory state around the buggy address: [ 34.198337] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.198386] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.198456] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.198757] ^ [ 34.198825] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.198908] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.198963] ================================================================== [ 34.396860] ================================================================== [ 34.396917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 34.396970] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.397022] [ 34.397059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.397461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.397601] Hardware name: linux,dummy-virt (DT) [ 34.397755] Call trace: [ 34.397801] show_stack+0x20/0x38 (C) [ 34.397850] dump_stack_lvl+0x8c/0xd0 [ 34.397899] print_report+0x118/0x5e8 [ 34.397942] kasan_report+0xdc/0x128 [ 34.397988] kasan_check_range+0x100/0x1a8 [ 34.398046] __kasan_check_write+0x20/0x30 [ 34.398123] kasan_atomics_helper+0x1414/0x4858 [ 34.398173] kasan_atomics+0x198/0x2e0 [ 34.398220] kunit_try_run_case+0x170/0x3f0 [ 34.398267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.398320] kthread+0x328/0x630 [ 34.398457] ret_from_fork+0x10/0x20 [ 34.398680] [ 34.398736] Allocated by task 296: [ 34.398768] kasan_save_stack+0x3c/0x68 [ 34.398810] kasan_save_track+0x20/0x40 [ 34.398848] kasan_save_alloc_info+0x40/0x58 [ 34.399378] __kasan_kmalloc+0xd4/0xd8 [ 34.399442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.399574] kasan_atomics+0xb8/0x2e0 [ 34.399673] kunit_try_run_case+0x170/0x3f0 [ 34.399815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.399904] kthread+0x328/0x630 [ 34.399940] ret_from_fork+0x10/0x20 [ 34.400090] [ 34.400115] The buggy address belongs to the object at fff00000c9708480 [ 34.400115] which belongs to the cache kmalloc-64 of size 64 [ 34.400265] The buggy address is located 0 bytes to the right of [ 34.400265] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.400399] [ 34.400469] The buggy address belongs to the physical page: [ 34.400519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.400572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.400659] page_type: f5(slab) [ 34.400741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.400792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.400933] page dumped because: kasan: bad access detected [ 34.400966] [ 34.401033] Memory state around the buggy address: [ 34.401138] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.401183] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.401296] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.401473] ^ [ 34.401508] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.401564] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.401622] ================================================================== [ 34.160591] ================================================================== [ 34.160645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 34.160858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.161031] [ 34.161102] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.161190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.161218] Hardware name: linux,dummy-virt (DT) [ 34.161338] Call trace: [ 34.161396] show_stack+0x20/0x38 (C) [ 34.161451] dump_stack_lvl+0x8c/0xd0 [ 34.161643] print_report+0x118/0x5e8 [ 34.161693] kasan_report+0xdc/0x128 [ 34.161753] kasan_check_range+0x100/0x1a8 [ 34.161801] __kasan_check_write+0x20/0x30 [ 34.161849] kasan_atomics_helper+0x7cc/0x4858 [ 34.161898] kasan_atomics+0x198/0x2e0 [ 34.161946] kunit_try_run_case+0x170/0x3f0 [ 34.161993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.162049] kthread+0x328/0x630 [ 34.162102] ret_from_fork+0x10/0x20 [ 34.162150] [ 34.162171] Allocated by task 296: [ 34.162200] kasan_save_stack+0x3c/0x68 [ 34.162241] kasan_save_track+0x20/0x40 [ 34.162278] kasan_save_alloc_info+0x40/0x58 [ 34.162318] __kasan_kmalloc+0xd4/0xd8 [ 34.162408] kasan_atomics+0xb8/0x2e0 [ 34.164060] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.165857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.168835] [ 34.170094] page dumped because: kasan: bad access detected [ 34.170658] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.170750] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.170860] ^ [ 34.170928] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.170981] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.171297] ================================================================== [ 34.526711] ================================================================== [ 34.526763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 34.526819] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.526871] [ 34.526904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.528334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.528479] Hardware name: linux,dummy-virt (DT) [ 34.528618] Call trace: [ 34.528877] show_stack+0x20/0x38 (C) [ 34.528974] dump_stack_lvl+0x8c/0xd0 [ 34.529026] print_report+0x118/0x5e8 [ 34.529071] kasan_report+0xdc/0x128 [ 34.530441] __asan_report_load8_noabort+0x20/0x30 [ 34.530710] kasan_atomics_helper+0x3e20/0x4858 [ 34.531460] kasan_atomics+0x198/0x2e0 [ 34.532444] kunit_try_run_case+0x170/0x3f0 [ 34.532617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.533088] kthread+0x328/0x630 [ 34.533341] ret_from_fork+0x10/0x20 [ 34.533762] [ 34.533882] Allocated by task 296: [ 34.533980] kasan_save_stack+0x3c/0x68 [ 34.534104] kasan_save_track+0x20/0x40 [ 34.534290] kasan_save_alloc_info+0x40/0x58 [ 34.534910] __kasan_kmalloc+0xd4/0xd8 [ 34.535525] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.535638] kasan_atomics+0xb8/0x2e0 [ 34.535917] kunit_try_run_case+0x170/0x3f0 [ 34.536212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.536568] kthread+0x328/0x630 [ 34.536623] ret_from_fork+0x10/0x20 [ 34.536661] [ 34.536850] The buggy address belongs to the object at fff00000c9708480 [ 34.536850] which belongs to the cache kmalloc-64 of size 64 [ 34.537333] The buggy address is located 0 bytes to the right of [ 34.537333] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.538210] [ 34.538236] The buggy address belongs to the physical page: [ 34.538272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.538328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.538381] page_type: f5(slab) [ 34.538423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.538473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.538515] page dumped because: kasan: bad access detected [ 34.538546] [ 34.538567] Memory state around the buggy address: [ 34.538601] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.538645] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.538690] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.538730] ^ [ 34.538765] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.538807] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.538848] ================================================================== [ 34.375257] ================================================================== [ 34.375777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 34.375901] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296 [ 34.375989] [ 34.376149] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 34.376273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.376408] Hardware name: linux,dummy-virt (DT) [ 34.376453] Call trace: [ 34.376478] show_stack+0x20/0x38 (C) [ 34.376551] dump_stack_lvl+0x8c/0xd0 [ 34.376606] print_report+0x118/0x5e8 [ 34.376833] kasan_report+0xdc/0x128 [ 34.376937] kasan_check_range+0x100/0x1a8 [ 34.377181] __kasan_check_write+0x20/0x30 [ 34.377290] kasan_atomics_helper+0x12d8/0x4858 [ 34.377347] kasan_atomics+0x198/0x2e0 [ 34.377643] kunit_try_run_case+0x170/0x3f0 [ 34.377742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.377927] kthread+0x328/0x630 [ 34.377997] ret_from_fork+0x10/0x20 [ 34.378107] [ 34.378137] Allocated by task 296: [ 34.378168] kasan_save_stack+0x3c/0x68 [ 34.378210] kasan_save_track+0x20/0x40 [ 34.378256] kasan_save_alloc_info+0x40/0x58 [ 34.378306] __kasan_kmalloc+0xd4/0xd8 [ 34.378343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.378388] kasan_atomics+0xb8/0x2e0 [ 34.378425] kunit_try_run_case+0x170/0x3f0 [ 34.378472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.378536] kthread+0x328/0x630 [ 34.378573] ret_from_fork+0x10/0x20 [ 34.378622] [ 34.378646] The buggy address belongs to the object at fff00000c9708480 [ 34.378646] which belongs to the cache kmalloc-64 of size 64 [ 34.378706] The buggy address is located 0 bytes to the right of [ 34.378706] allocated 48-byte region [fff00000c9708480, fff00000c97084b0) [ 34.378773] [ 34.378804] The buggy address belongs to the physical page: [ 34.378839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708 [ 34.378903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.378951] page_type: f5(slab) [ 34.379006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.379064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.379568] page dumped because: kasan: bad access detected [ 34.379609] [ 34.379630] Memory state around the buggy address: [ 34.379666] fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.379879] fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.379966] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.380373] ^ [ 34.380449] fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.380533] fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.380677] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings: Failure
Automatically assigned
[ 33.846917] ================================================================== [ 33.846973] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 33.847055] Read of size 1 at addr fff00000c907cb50 by task kunit_try_catch/290 [ 33.847675] [ 33.847723] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.847938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.847999] Hardware name: linux,dummy-virt (DT) [ 33.848127] Call trace: [ 33.848187] show_stack+0x20/0x38 (C) [ 33.848289] dump_stack_lvl+0x8c/0xd0 [ 33.848355] print_report+0x118/0x5e8 [ 33.848545] kasan_report+0xdc/0x128 [ 33.848603] __asan_report_load1_noabort+0x20/0x30 [ 33.848654] kasan_strings+0x95c/0xb00 [ 33.848885] kunit_try_run_case+0x170/0x3f0 [ 33.849045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.849260] kthread+0x328/0x630 [ 33.849356] ret_from_fork+0x10/0x20 [ 33.849511] [ 33.849599] Allocated by task 290: [ 33.849631] kasan_save_stack+0x3c/0x68 [ 33.850001] kasan_save_track+0x20/0x40 [ 33.850087] kasan_save_alloc_info+0x40/0x58 [ 33.850201] __kasan_kmalloc+0xd4/0xd8 [ 33.850280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.850358] kasan_strings+0xc8/0xb00 [ 33.850495] kunit_try_run_case+0x170/0x3f0 [ 33.850559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.850900] kthread+0x328/0x630 [ 33.850967] ret_from_fork+0x10/0x20 [ 33.851042] [ 33.851481] Freed by task 290: [ 33.851847] kasan_save_stack+0x3c/0x68 [ 33.851933] kasan_save_track+0x20/0x40 [ 33.852000] kasan_save_free_info+0x4c/0x78 [ 33.852133] __kasan_slab_free+0x6c/0x98 [ 33.856621] fff00000c907cb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.861180] __asan_report_load1_noabort+0x20/0x30 [ 33.861532] [ 33.861957] ret_from_fork+0x10/0x20 [ 33.863052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.863960] [ 33.864020] The buggy address belongs to the physical page: [ 33.864189] page_type: f5(slab) [ 33.865019] [ 33.866006] fff00000c907cb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.868453] strnlen+0x80/0x88 [ 33.869842] kasan_save_stack+0x3c/0x68 [ 33.869931] kasan_save_track+0x20/0x40 [ 33.870067] kasan_save_alloc_info+0x40/0x58 [ 33.870518] kasan_strings+0xc8/0xb00 [ 33.871401] kasan_save_track+0x20/0x40 [ 33.872039] kunit_try_run_case+0x170/0x3f0 [ 33.872277] [ 33.872584] The buggy address is located 16 bytes inside of [ 33.872584] freed 32-byte region [fff00000c907cb40, fff00000c907cb60) [ 33.873308] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.876984] not ok 62 kasan_strings [ 33.881621] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.881959] dump_stack_lvl+0x8c/0xd0 [ 33.882569] kasan_bitops_generic+0x110/0x1c8 [ 33.883341] kasan_save_stack+0x3c/0x68 [ 33.883835] kunit_try_run_case+0x170/0x3f0 [ 33.884562] ret_from_fork+0x10/0x20 [ 33.884693] The buggy address is located 8 bytes inside of [ 33.884693] allocated 9-byte region [fff00000c907e120, fff00000c907e129) [ 33.886853] fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.887447] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp: Failure
Automatically assigned
[ 33.835055] ================================================================== [ 33.835615] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 33.835695] Read of size 1 at addr fff00000c907cb50 by task kunit_try_catch/290 [ 33.836178] [ 33.836246] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.836349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.836397] Hardware name: linux,dummy-virt (DT) [ 33.836583] Call trace: [ 33.836650] show_stack+0x20/0x38 (C) [ 33.836708] dump_stack_lvl+0x8c/0xd0 [ 33.836758] print_report+0x118/0x5e8 [ 33.836804] kasan_report+0xdc/0x128 [ 33.836848] __asan_report_load1_noabort+0x20/0x30 [ 33.837396] strcmp+0xc0/0xc8 [ 33.837487] kasan_strings+0x340/0xb00 [ 33.837571] kunit_try_run_case+0x170/0x3f0 [ 33.837746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.837841] kthread+0x328/0x630 [ 33.837886] ret_from_fork+0x10/0x20 [ 33.838265] [ 33.838330] Allocated by task 290: [ 33.838421] kasan_save_stack+0x3c/0x68 [ 33.838566] kasan_save_track+0x20/0x40 [ 33.838651] kasan_save_alloc_info+0x40/0x58 [ 33.838718] __kasan_kmalloc+0xd4/0xd8 [ 33.838870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.838925] kasan_strings+0xc8/0xb00 [ 33.839286] kunit_try_run_case+0x170/0x3f0 [ 33.839373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.839490] kthread+0x328/0x630 [ 33.839600] ret_from_fork+0x10/0x20 [ 33.839736] [ 33.839779] Freed by task 290: [ 33.839808] kasan_save_stack+0x3c/0x68 [ 33.839860] kasan_save_track+0x20/0x40 [ 33.839904] kasan_save_free_info+0x4c/0x78 [ 33.839944] __kasan_slab_free+0x6c/0x98 [ 33.840303] kfree+0x214/0x3c8 [ 33.840412] kasan_strings+0x24c/0xb00 [ 33.840480] kunit_try_run_case+0x170/0x3f0 [ 33.840825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.840989] kthread+0x328/0x630 [ 33.841066] ret_from_fork+0x10/0x20 [ 33.841225] [ 33.841278] The buggy address belongs to the object at fff00000c907cb40 [ 33.841278] which belongs to the cache kmalloc-32 of size 32 [ 33.841670] The buggy address is located 16 bytes inside of [ 33.841670] freed 32-byte region [fff00000c907cb40, fff00000c907cb60) [ 33.841854] [ 33.841913] The buggy address belongs to the physical page: [ 33.841997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907c [ 33.842112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.842201] page_type: f5(slab) [ 33.842346] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.842398] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.842689] page dumped because: kasan: bad access detected [ 33.842807] [ 33.842881] Memory state around the buggy address: [ 33.842958] fff00000c907ca00: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.843110] fff00000c907ca80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.843167] >fff00000c907cb00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.843253] ^ [ 33.843508] fff00000c907cb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.843560] fff00000c907cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.843784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp: Failure
Automatically assigned
[ 33.817673] ================================================================== [ 33.817735] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 33.817790] Read of size 1 at addr fff00000c907ca18 by task kunit_try_catch/288 [ 33.817850] [ 33.817886] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.817973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.818002] Hardware name: linux,dummy-virt (DT) [ 33.818040] Call trace: [ 33.818076] show_stack+0x20/0x38 (C) [ 33.818427] dump_stack_lvl+0x8c/0xd0 [ 33.818477] print_report+0x118/0x5e8 [ 33.818869] kasan_report+0xdc/0x128 [ 33.819106] __asan_report_load1_noabort+0x20/0x30 [ 33.819177] memcmp+0x198/0x1d8 [ 33.819414] kasan_memcmp+0x16c/0x300 [ 33.819482] kunit_try_run_case+0x170/0x3f0 [ 33.819533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.819613] kthread+0x328/0x630 [ 33.819657] ret_from_fork+0x10/0x20 [ 33.819724] [ 33.819956] Allocated by task 288: [ 33.819989] kasan_save_stack+0x3c/0x68 [ 33.820050] kasan_save_track+0x20/0x40 [ 33.820105] kasan_save_alloc_info+0x40/0x58 [ 33.820403] __kasan_kmalloc+0xd4/0xd8 [ 33.820482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.820556] kasan_memcmp+0xbc/0x300 [ 33.820596] kunit_try_run_case+0x170/0x3f0 [ 33.820933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.821068] kthread+0x328/0x630 [ 33.821135] ret_from_fork+0x10/0x20 [ 33.821403] [ 33.821478] The buggy address belongs to the object at fff00000c907ca00 [ 33.821478] which belongs to the cache kmalloc-32 of size 32 [ 33.821643] The buggy address is located 0 bytes to the right of [ 33.821643] allocated 24-byte region [fff00000c907ca00, fff00000c907ca18) [ 33.821731] [ 33.822045] The buggy address belongs to the physical page: [ 33.822116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907c [ 33.822345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.822540] page_type: f5(slab) [ 33.822596] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.822747] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.822860] page dumped because: kasan: bad access detected [ 33.822939] [ 33.822977] Memory state around the buggy address: [ 33.823251] fff00000c907c900: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 33.823451] fff00000c907c980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.823539] >fff00000c907ca00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.823608] ^ [ 33.824012] fff00000c907ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.824157] fff00000c907cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.824215] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right: Failure
Automatically assigned
[ 33.797271] ================================================================== [ 33.797353] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 33.797439] Read of size 1 at addr ffff800080a17b4a by task kunit_try_catch/284 [ 33.797493] [ 33.797564] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.797670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.797741] Hardware name: linux,dummy-virt (DT) [ 33.797789] Call trace: [ 33.797816] show_stack+0x20/0x38 (C) [ 33.798004] dump_stack_lvl+0x8c/0xd0 [ 33.798212] print_report+0x310/0x5e8 [ 33.798259] kasan_report+0xdc/0x128 [ 33.798304] __asan_report_load1_noabort+0x20/0x30 [ 33.798356] kasan_alloca_oob_right+0x2dc/0x340 [ 33.798479] kunit_try_run_case+0x170/0x3f0 [ 33.798532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.798587] kthread+0x328/0x630 [ 33.798723] ret_from_fork+0x10/0x20 [ 33.798782] [ 33.798808] The buggy address belongs to stack of task kunit_try_catch/284 [ 33.798864] [ 33.799162] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080a10000 allocated at kernel_clone+0x150/0x7b0 [ 33.799351] The buggy address belongs to the physical page: [ 33.799388] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f94 [ 33.799442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.799542] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.799595] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.799656] page dumped because: kasan: bad access detected [ 33.799698] [ 33.799729] Memory state around the buggy address: [ 33.800020] ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.800248] ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.800305] >ffff800080a17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 33.800347] ^ [ 33.800387] ffff800080a17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 33.800730] ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.800848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left: Failure
Automatically assigned
[ 33.781427] ================================================================== [ 33.781528] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 33.781936] Read of size 1 at addr ffff800080af7b5f by task kunit_try_catch/282 [ 33.782007] [ 33.782398] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.782670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.782718] Hardware name: linux,dummy-virt (DT) [ 33.782767] Call trace: [ 33.782804] show_stack+0x20/0x38 (C) [ 33.782869] dump_stack_lvl+0x8c/0xd0 [ 33.783097] print_report+0x310/0x5e8 [ 33.783375] kasan_report+0xdc/0x128 [ 33.783617] __asan_report_load1_noabort+0x20/0x30 [ 33.783813] kasan_alloca_oob_left+0x2b8/0x310 [ 33.783880] kunit_try_run_case+0x170/0x3f0 [ 33.783928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.783981] kthread+0x328/0x630 [ 33.784266] ret_from_fork+0x10/0x20 [ 33.784603] [ 33.784667] The buggy address belongs to stack of task kunit_try_catch/282 [ 33.784833] [ 33.784917] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080af0000 allocated at kernel_clone+0x150/0x7b0 [ 33.785177] The buggy address belongs to the physical page: [ 33.785250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f92 [ 33.785388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.785483] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.785579] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.785650] page dumped because: kasan: bad access detected [ 33.785683] [ 33.786023] Memory state around the buggy address: [ 33.786129] ffff800080af7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.786206] ffff800080af7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.786280] >ffff800080af7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.786334] ^ [ 33.786663] ffff800080af7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 33.786810] ffff800080af7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.786873] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob: Failure
Automatically assigned
[ 33.768356] ================================================================== [ 33.768492] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 33.768550] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/280 [ 33.768611] [ 33.768647] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.769024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.769138] Hardware name: linux,dummy-virt (DT) [ 33.769416] Call trace: [ 33.769464] show_stack+0x20/0x38 (C) [ 33.769537] dump_stack_lvl+0x8c/0xd0 [ 33.769598] print_report+0x310/0x5e8 [ 33.769998] kasan_report+0xdc/0x128 [ 33.770097] __asan_report_load1_noabort+0x20/0x30 [ 33.770152] kasan_stack_oob+0x238/0x270 [ 33.770200] kunit_try_run_case+0x170/0x3f0 [ 33.770359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.770425] kthread+0x328/0x630 [ 33.770529] ret_from_fork+0x10/0x20 [ 33.770836] [ 33.771008] The buggy address belongs to stack of task kunit_try_catch/280 [ 33.771192] and is located at offset 138 in frame: [ 33.771238] kasan_stack_oob+0x0/0x270 [ 33.771379] [ 33.771413] This frame has 4 objects: [ 33.771511] [48, 49) '__assertion' [ 33.771547] [64, 72) 'array' [ 33.771729] [96, 112) '__assertion' [ 33.772026] [128, 138) 'stack_array' [ 33.772100] [ 33.772128] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080a90000 allocated at kernel_clone+0x150/0x7b0 [ 33.772815] The buggy address belongs to the physical page: [ 33.772927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9a [ 33.773024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.773478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.773575] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.773655] page dumped because: kasan: bad access detected [ 33.773773] [ 33.773831] Memory state around the buggy address: [ 33.773892] ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.773988] ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 33.774061] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 33.774112] ^ [ 33.774158] ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 33.774204] ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.774253] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right: Failure
Automatically assigned
[ 33.742908] ================================================================== [ 33.743004] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 33.743067] Read of size 1 at addr ffffa0dee5d7b60d by task kunit_try_catch/276 [ 33.743172] [ 33.743212] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.743602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.743659] Hardware name: linux,dummy-virt (DT) [ 33.743720] Call trace: [ 33.743777] show_stack+0x20/0x38 (C) [ 33.743843] dump_stack_lvl+0x8c/0xd0 [ 33.744023] print_report+0x310/0x5e8 [ 33.744070] kasan_report+0xdc/0x128 [ 33.744214] __asan_report_load1_noabort+0x20/0x30 [ 33.744417] kasan_global_oob_right+0x230/0x270 [ 33.744539] kunit_try_run_case+0x170/0x3f0 [ 33.744704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.744772] kthread+0x328/0x630 [ 33.745095] ret_from_fork+0x10/0x20 [ 33.745190] [ 33.745649] The buggy address belongs to the variable: [ 33.745702] global_array+0xd/0x40 [ 33.746141] [ 33.746264] The buggy address belongs to a vmalloc virtual mapping [ 33.749876] The buggy address belongs to the physical page: [ 33.749949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d7b [ 33.750045] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 33.750138] raw: 03fffe0000002000 ffffc1ffc01f5ec8 ffffc1ffc01f5ec8 0000000000000000 [ 33.750206] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.750248] page dumped because: kasan: bad access detected [ 33.750287] [ 33.750322] Memory state around the buggy address: [ 33.750371] ffffa0dee5d7b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.750428] ffffa0dee5d7b580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 33.750473] >ffffa0dee5d7b600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 33.750527] ^ [ 33.750571] ffffa0dee5d7b680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 33.750616] ffffa0dee5d7b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.750675] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper: Failure
Automatically assigned
[ 33.675520] ================================================================== [ 33.675595] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.675661] Free of addr fff00000c3fed900 by task kunit_try_catch/266 [ 33.675834] [ 33.675878] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.675966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.675993] Hardware name: linux,dummy-virt (DT) [ 33.676025] Call trace: [ 33.676047] show_stack+0x20/0x38 (C) [ 33.676196] dump_stack_lvl+0x8c/0xd0 [ 33.676354] print_report+0x118/0x5e8 [ 33.676466] kasan_report_invalid_free+0xc0/0xe8 [ 33.676551] check_slab_allocation+0xd4/0x108 [ 33.676693] __kasan_mempool_poison_object+0x78/0x150 [ 33.676754] mempool_free+0x28c/0x328 [ 33.677042] mempool_double_free_helper+0x150/0x2e8 [ 33.677136] mempool_kmalloc_double_free+0xc0/0x118 [ 33.677277] kunit_try_run_case+0x170/0x3f0 [ 33.677327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.677510] kthread+0x328/0x630 [ 33.677571] ret_from_fork+0x10/0x20 [ 33.677685] [ 33.677729] Allocated by task 266: [ 33.677780] kasan_save_stack+0x3c/0x68 [ 33.677912] kasan_save_track+0x20/0x40 [ 33.677989] kasan_save_alloc_info+0x40/0x58 [ 33.678058] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.678354] remove_element+0x130/0x1f8 [ 33.678449] mempool_alloc_preallocated+0x58/0xc0 [ 33.678546] mempool_double_free_helper+0x94/0x2e8 [ 33.678660] mempool_kmalloc_double_free+0xc0/0x118 [ 33.678736] kunit_try_run_case+0x170/0x3f0 [ 33.678807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.678848] kthread+0x328/0x630 [ 33.679150] ret_from_fork+0x10/0x20 [ 33.679251] [ 33.679322] Freed by task 266: [ 33.679433] kasan_save_stack+0x3c/0x68 [ 33.679473] kasan_save_track+0x20/0x40 [ 33.679522] kasan_save_free_info+0x4c/0x78 [ 33.679722] __kasan_mempool_poison_object+0xc0/0x150 [ 33.679869] mempool_free+0x28c/0x328 [ 33.679956] mempool_double_free_helper+0x100/0x2e8 [ 33.680116] mempool_kmalloc_double_free+0xc0/0x118 [ 33.680305] kunit_try_run_case+0x170/0x3f0 [ 33.680355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.680409] kthread+0x328/0x630 [ 33.680450] ret_from_fork+0x10/0x20 [ 33.680586] [ 33.680655] The buggy address belongs to the object at fff00000c3fed900 [ 33.680655] which belongs to the cache kmalloc-128 of size 128 [ 33.680760] The buggy address is located 0 bytes inside of [ 33.680760] 128-byte region [fff00000c3fed900, fff00000c3fed980) [ 33.680834] [ 33.680853] The buggy address belongs to the physical page: [ 33.680884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed [ 33.680937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.680994] page_type: f5(slab) [ 33.681043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.681107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.681166] page dumped because: kasan: bad access detected [ 33.681196] [ 33.681230] Memory state around the buggy address: [ 33.681259] fff00000c3fed800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.681311] fff00000c3fed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.681353] >fff00000c3fed900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.681392] ^ [ 33.681418] fff00000c3fed980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.681460] fff00000c3feda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.681507] ================================================================== [ 33.702545] ================================================================== [ 33.702600] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.702654] Free of addr fff00000c9bb8000 by task kunit_try_catch/270 [ 33.702695] [ 33.702727] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.702809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.702836] Hardware name: linux,dummy-virt (DT) [ 33.702865] Call trace: [ 33.702888] show_stack+0x20/0x38 (C) [ 33.702934] dump_stack_lvl+0x8c/0xd0 [ 33.702981] print_report+0x118/0x5e8 [ 33.703023] kasan_report_invalid_free+0xc0/0xe8 [ 33.703070] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.703759] mempool_free+0x24c/0x328 [ 33.704124] mempool_double_free_helper+0x150/0x2e8 [ 33.704218] mempool_page_alloc_double_free+0xbc/0x118 [ 33.704396] kunit_try_run_case+0x170/0x3f0 [ 33.704481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.704550] kthread+0x328/0x630 [ 33.704907] ret_from_fork+0x10/0x20 [ 33.705114] [ 33.705159] The buggy address belongs to the physical page: [ 33.705192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb8 [ 33.705527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.705633] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.705704] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.705857] page dumped because: kasan: bad access detected [ 33.705936] [ 33.706055] Memory state around the buggy address: [ 33.706132] fff00000c9bb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.706192] fff00000c9bb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.706258] >fff00000c9bb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.706527] ^ [ 33.706640] fff00000c9bb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.706714] fff00000c9bb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.706881] ================================================================== [ 33.690421] ================================================================== [ 33.690532] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.690591] Free of addr fff00000c9bb8000 by task kunit_try_catch/268 [ 33.690633] [ 33.690690] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.690825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.690863] Hardware name: linux,dummy-virt (DT) [ 33.690909] Call trace: [ 33.690939] show_stack+0x20/0x38 (C) [ 33.690988] dump_stack_lvl+0x8c/0xd0 [ 33.691035] print_report+0x118/0x5e8 [ 33.691087] kasan_report_invalid_free+0xc0/0xe8 [ 33.691134] __kasan_mempool_poison_object+0x14c/0x150 [ 33.691191] mempool_free+0x28c/0x328 [ 33.691237] mempool_double_free_helper+0x150/0x2e8 [ 33.691287] mempool_kmalloc_large_double_free+0xc0/0x118 [ 33.691338] kunit_try_run_case+0x170/0x3f0 [ 33.691382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.691441] kthread+0x328/0x630 [ 33.691490] ret_from_fork+0x10/0x20 [ 33.691537] [ 33.691556] The buggy address belongs to the physical page: [ 33.691587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb8 [ 33.691640] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.691686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.692149] page_type: f8(unknown) [ 33.692223] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.692436] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.692586] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.692675] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.692835] head: 0bfffe0000000002 ffffc1ffc326ee01 00000000ffffffff 00000000ffffffff [ 33.692926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.693129] page dumped because: kasan: bad access detected [ 33.693178] [ 33.693196] Memory state around the buggy address: [ 33.693236] fff00000c9bb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.693285] fff00000c9bb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.693327] >fff00000c9bb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.693363] ^ [ 33.693392] fff00000c9bb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.693535] fff00000c9bb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.693616] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 33.622238] ================================================================== [ 33.622293] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.622711] Read of size 1 at addr fff00000c9bb4000 by task kunit_try_catch/260 [ 33.623093] [ 33.623182] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.623271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.623299] Hardware name: linux,dummy-virt (DT) [ 33.623376] Call trace: [ 33.623404] show_stack+0x20/0x38 (C) [ 33.623483] dump_stack_lvl+0x8c/0xd0 [ 33.623660] print_report+0x118/0x5e8 [ 33.623732] kasan_report+0xdc/0x128 [ 33.623841] __asan_report_load1_noabort+0x20/0x30 [ 33.623927] mempool_uaf_helper+0x314/0x340 [ 33.624016] mempool_kmalloc_large_uaf+0xc4/0x120 [ 33.624104] kunit_try_run_case+0x170/0x3f0 [ 33.624270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624331] kthread+0x328/0x630 [ 33.624373] ret_from_fork+0x10/0x20 [ 33.624429] [ 33.624451] The buggy address belongs to the physical page: [ 33.624486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 33.624538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.624583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.624745] page_type: f8(unknown) [ 33.624813] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.624915] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.624995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.625130] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.625181] head: 0bfffe0000000002 ffffc1ffc326ed01 00000000ffffffff 00000000ffffffff [ 33.625263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.625539] page dumped because: kasan: bad access detected [ 33.625614] [ 33.625700] Memory state around the buggy address: [ 33.625801] fff00000c9bb3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.626099] fff00000c9bb3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.626250] >fff00000c9bb4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.626338] ^ [ 33.626625] fff00000c9bb4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.626691] fff00000c9bb4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.626773] ================================================================== [ 33.664209] ================================================================== [ 33.664279] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.664422] Read of size 1 at addr fff00000c9bb4000 by task kunit_try_catch/264 [ 33.664500] [ 33.664535] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.664653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.664682] Hardware name: linux,dummy-virt (DT) [ 33.664715] Call trace: [ 33.664804] show_stack+0x20/0x38 (C) [ 33.664858] dump_stack_lvl+0x8c/0xd0 [ 33.664963] print_report+0x118/0x5e8 [ 33.665037] kasan_report+0xdc/0x128 [ 33.665224] __asan_report_load1_noabort+0x20/0x30 [ 33.665286] mempool_uaf_helper+0x314/0x340 [ 33.665334] mempool_page_alloc_uaf+0xc0/0x118 [ 33.665524] kunit_try_run_case+0x170/0x3f0 [ 33.665592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.665668] kthread+0x328/0x630 [ 33.665713] ret_from_fork+0x10/0x20 [ 33.665780] [ 33.665852] The buggy address belongs to the physical page: [ 33.665888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb4 [ 33.665942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.666004] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.666056] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.666107] page dumped because: kasan: bad access detected [ 33.666339] [ 33.666369] Memory state around the buggy address: [ 33.666531] fff00000c9bb3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.666597] fff00000c9bb3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.666700] >fff00000c9bb4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.666757] ^ [ 33.666788] fff00000c9bb4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.666831] fff00000c9bb4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.667044] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper: Failure
Automatically assigned
[ 33.609443] ================================================================== [ 33.609600] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.609689] Read of size 1 at addr fff00000c3fed500 by task kunit_try_catch/258 [ 33.610061] [ 33.610127] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.610272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.610320] Hardware name: linux,dummy-virt (DT) [ 33.610355] Call trace: [ 33.610534] show_stack+0x20/0x38 (C) [ 33.610648] dump_stack_lvl+0x8c/0xd0 [ 33.610710] print_report+0x118/0x5e8 [ 33.610904] kasan_report+0xdc/0x128 [ 33.610996] __asan_report_load1_noabort+0x20/0x30 [ 33.611063] mempool_uaf_helper+0x314/0x340 [ 33.611163] mempool_kmalloc_uaf+0xc4/0x120 [ 33.611243] kunit_try_run_case+0x170/0x3f0 [ 33.611297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.611385] kthread+0x328/0x630 [ 33.611502] ret_from_fork+0x10/0x20 [ 33.611551] [ 33.611736] Allocated by task 258: [ 33.611926] kasan_save_stack+0x3c/0x68 [ 33.612010] kasan_save_track+0x20/0x40 [ 33.612075] kasan_save_alloc_info+0x40/0x58 [ 33.612232] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.612308] remove_element+0x130/0x1f8 [ 33.612412] mempool_alloc_preallocated+0x58/0xc0 [ 33.612488] mempool_uaf_helper+0xa4/0x340 [ 33.612691] mempool_kmalloc_uaf+0xc4/0x120 [ 33.612741] kunit_try_run_case+0x170/0x3f0 [ 33.612794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.612840] kthread+0x328/0x630 [ 33.612938] ret_from_fork+0x10/0x20 [ 33.613018] [ 33.613127] Freed by task 258: [ 33.613185] kasan_save_stack+0x3c/0x68 [ 33.613265] kasan_save_track+0x20/0x40 [ 33.613399] kasan_save_free_info+0x4c/0x78 [ 33.613486] __kasan_mempool_poison_object+0xc0/0x150 [ 33.613643] mempool_free+0x28c/0x328 [ 33.613888] mempool_uaf_helper+0x104/0x340 [ 33.614060] mempool_kmalloc_uaf+0xc4/0x120 [ 33.614143] kunit_try_run_case+0x170/0x3f0 [ 33.614255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.614401] kthread+0x328/0x630 [ 33.614477] ret_from_fork+0x10/0x20 [ 33.614549] [ 33.614661] The buggy address belongs to the object at fff00000c3fed500 [ 33.614661] which belongs to the cache kmalloc-128 of size 128 [ 33.614759] The buggy address is located 0 bytes inside of [ 33.614759] freed 128-byte region [fff00000c3fed500, fff00000c3fed580) [ 33.615034] [ 33.615112] The buggy address belongs to the physical page: [ 33.615172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed [ 33.615264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.615332] page_type: f5(slab) [ 33.615372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.615665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.615760] page dumped because: kasan: bad access detected [ 33.615883] [ 33.615943] Memory state around the buggy address: [ 33.616016] fff00000c3fed400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.616144] fff00000c3fed480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.616217] >fff00000c3fed500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.616335] ^ [ 33.616376] fff00000c3fed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.616420] fff00000c3fed600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.616473] ================================================================== [ 33.635490] ================================================================== [ 33.635600] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.635653] Read of size 1 at addr fff00000c9b2e240 by task kunit_try_catch/262 [ 33.635767] [ 33.635828] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.635993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.636022] Hardware name: linux,dummy-virt (DT) [ 33.636068] Call trace: [ 33.636437] show_stack+0x20/0x38 (C) [ 33.636531] dump_stack_lvl+0x8c/0xd0 [ 33.636648] print_report+0x118/0x5e8 [ 33.636727] kasan_report+0xdc/0x128 [ 33.636990] __asan_report_load1_noabort+0x20/0x30 [ 33.637111] mempool_uaf_helper+0x314/0x340 [ 33.637191] mempool_slab_uaf+0xc0/0x118 [ 33.637356] kunit_try_run_case+0x170/0x3f0 [ 33.637443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.637697] kthread+0x328/0x630 [ 33.637770] ret_from_fork+0x10/0x20 [ 33.637918] [ 33.637988] Allocated by task 262: [ 33.638119] kasan_save_stack+0x3c/0x68 [ 33.638205] kasan_save_track+0x20/0x40 [ 33.638534] kasan_save_alloc_info+0x40/0x58 [ 33.638604] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.638729] remove_element+0x16c/0x1f8 [ 33.638797] mempool_alloc_preallocated+0x58/0xc0 [ 33.638891] mempool_uaf_helper+0xa4/0x340 [ 33.639049] mempool_slab_uaf+0xc0/0x118 [ 33.639108] kunit_try_run_case+0x170/0x3f0 [ 33.639307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.639394] kthread+0x328/0x630 [ 33.639493] ret_from_fork+0x10/0x20 [ 33.639565] [ 33.639621] Freed by task 262: [ 33.639654] kasan_save_stack+0x3c/0x68 [ 33.639939] kasan_save_track+0x20/0x40 [ 33.640016] kasan_save_free_info+0x4c/0x78 [ 33.640148] __kasan_mempool_poison_object+0xc0/0x150 [ 33.640309] mempool_free+0x28c/0x328 [ 33.640408] mempool_uaf_helper+0x104/0x340 [ 33.640621] mempool_slab_uaf+0xc0/0x118 [ 33.640674] kunit_try_run_case+0x170/0x3f0 [ 33.640920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.641000] kthread+0x328/0x630 [ 33.641126] ret_from_fork+0x10/0x20 [ 33.641197] [ 33.641251] The buggy address belongs to the object at fff00000c9b2e240 [ 33.641251] which belongs to the cache test_cache of size 123 [ 33.641482] The buggy address is located 0 bytes inside of [ 33.641482] freed 123-byte region [fff00000c9b2e240, fff00000c9b2e2bb) [ 33.641698] [ 33.641749] The buggy address belongs to the physical page: [ 33.641798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2e [ 33.641866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.642204] page_type: f5(slab) [ 33.642280] raw: 0bfffe0000000000 fff00000c4743dc0 dead000000000122 0000000000000000 [ 33.642346] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.642564] page dumped because: kasan: bad access detected [ 33.642688] [ 33.642748] Memory state around the buggy address: [ 33.642821] fff00000c9b2e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.642868] fff00000c9b2e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.642910] >fff00000c9b2e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.642948] ^ [ 33.642984] fff00000c9b2e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.643025] fff00000c9b2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.643063] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper: Failure
Automatically assigned
[ 33.572239] ================================================================== [ 33.572299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.572351] Read of size 1 at addr fff00000c907a2bb by task kunit_try_catch/256 [ 33.572452] [ 33.572550] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.572636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.572661] Hardware name: linux,dummy-virt (DT) [ 33.572807] Call trace: [ 33.572978] show_stack+0x20/0x38 (C) [ 33.573212] dump_stack_lvl+0x8c/0xd0 [ 33.573268] print_report+0x118/0x5e8 [ 33.573407] kasan_report+0xdc/0x128 [ 33.573451] __asan_report_load1_noabort+0x20/0x30 [ 33.573504] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.573666] mempool_slab_oob_right+0xc0/0x118 [ 33.573963] kunit_try_run_case+0x170/0x3f0 [ 33.574068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.574131] kthread+0x328/0x630 [ 33.574175] ret_from_fork+0x10/0x20 [ 33.574220] [ 33.574248] Allocated by task 256: [ 33.574278] kasan_save_stack+0x3c/0x68 [ 33.574315] kasan_save_track+0x20/0x40 [ 33.574425] kasan_save_alloc_info+0x40/0x58 [ 33.574528] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.574825] remove_element+0x16c/0x1f8 [ 33.574893] mempool_alloc_preallocated+0x58/0xc0 [ 33.574934] mempool_oob_right_helper+0x98/0x2f0 [ 33.574973] mempool_slab_oob_right+0xc0/0x118 [ 33.575013] kunit_try_run_case+0x170/0x3f0 [ 33.575049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.575102] kthread+0x328/0x630 [ 33.575144] ret_from_fork+0x10/0x20 [ 33.575180] [ 33.575199] The buggy address belongs to the object at fff00000c907a240 [ 33.575199] which belongs to the cache test_cache of size 123 [ 33.575531] The buggy address is located 0 bytes to the right of [ 33.575531] allocated 123-byte region [fff00000c907a240, fff00000c907a2bb) [ 33.575706] [ 33.575729] The buggy address belongs to the physical page: [ 33.575758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907a [ 33.575852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.576098] page_type: f5(slab) [ 33.576136] raw: 0bfffe0000000000 fff00000c4743c80 dead000000000122 0000000000000000 [ 33.576184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.576402] page dumped because: kasan: bad access detected [ 33.576439] [ 33.576457] Memory state around the buggy address: [ 33.576589] fff00000c907a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.576701] fff00000c907a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 33.576758] >fff00000c907a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 33.576829] ^ [ 33.576878] fff00000c907a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.576920] fff00000c907a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.576975] ================================================================== [ 33.558504] ================================================================== [ 33.558595] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.558647] Read of size 1 at addr fff00000c9bb2001 by task kunit_try_catch/254 [ 33.558696] [ 33.558726] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.558896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.559006] Hardware name: linux,dummy-virt (DT) [ 33.559044] Call trace: [ 33.559148] show_stack+0x20/0x38 (C) [ 33.559197] dump_stack_lvl+0x8c/0xd0 [ 33.559243] print_report+0x118/0x5e8 [ 33.559294] kasan_report+0xdc/0x128 [ 33.559338] __asan_report_load1_noabort+0x20/0x30 [ 33.559384] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.559551] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.559698] kunit_try_run_case+0x170/0x3f0 [ 33.559756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.559812] kthread+0x328/0x630 [ 33.559928] ret_from_fork+0x10/0x20 [ 33.559975] [ 33.559995] The buggy address belongs to the physical page: [ 33.560027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb0 [ 33.560089] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.560135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.560187] page_type: f8(unknown) [ 33.560225] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.560273] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.560321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.560368] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.560423] head: 0bfffe0000000002 ffffc1ffc326ec01 00000000ffffffff 00000000ffffffff [ 33.560634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.560686] page dumped because: kasan: bad access detected [ 33.560722] [ 33.560786] Memory state around the buggy address: [ 33.560824] fff00000c9bb1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.560921] fff00000c9bb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.560970] >fff00000c9bb2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.561029] ^ [ 33.561091] fff00000c9bb2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.561134] fff00000c9bb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.561173] ================================================================== [ 33.550149] ================================================================== [ 33.550226] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.550300] Read of size 1 at addr fff00000c3fed173 by task kunit_try_catch/252 [ 33.550350] [ 33.550391] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 33.550480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.550509] Hardware name: linux,dummy-virt (DT) [ 33.550542] Call trace: [ 33.550569] show_stack+0x20/0x38 (C) [ 33.550618] dump_stack_lvl+0x8c/0xd0 [ 33.550670] print_report+0x118/0x5e8 [ 33.550712] kasan_report+0xdc/0x128 [ 33.550756] __asan_report_load1_noabort+0x20/0x30 [ 33.550803] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.550851] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.550899] kunit_try_run_case+0x170/0x3f0 [ 33.550948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.550997] kthread+0x328/0x630 [ 33.551042] ret_from_fork+0x10/0x20 [ 33.551117] [ 33.551138] Allocated by task 252: [ 33.551167] kasan_save_stack+0x3c/0x68 [ 33.551208] kasan_save_track+0x20/0x40 [ 33.551242] kasan_save_alloc_info+0x40/0x58 [ 33.551280] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.551320] remove_element+0x130/0x1f8 [ 33.551360] mempool_alloc_preallocated+0x58/0xc0 [ 33.551400] mempool_oob_right_helper+0x98/0x2f0 [ 33.551441] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.551480] kunit_try_run_case+0x170/0x3f0 [ 33.551517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.551558] kthread+0x328/0x630 [ 33.551592] ret_from_fork+0x10/0x20 [ 33.551627] [ 33.551646] The buggy address belongs to the object at fff00000c3fed100 [ 33.551646] which belongs to the cache kmalloc-128 of size 128 [ 33.551704] The buggy address is located 0 bytes to the right of [ 33.551704] allocated 115-byte region [fff00000c3fed100, fff00000c3fed173) [ 33.551790] [ 33.551821] The buggy address belongs to the physical page: [ 33.551855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed [ 33.551911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.551964] page_type: f5(slab) [ 33.552006] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.552056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.552110] page dumped because: kasan: bad access detected [ 33.552142] [ 33.552171] Memory state around the buggy address: [ 33.552206] fff00000c3fed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.552249] fff00000c3fed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.552292] >fff00000c3fed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.552330] ^ [ 33.552370] fff00000c3fed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.552414] fff00000c3fed200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.552450] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy: Failure
Automatically assigned
[ 32.966498] ================================================================== [ 32.966580] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.966652] Read of size 1 at addr fff00000c47438c0 by task kunit_try_catch/246 [ 32.966705] [ 32.966745] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 32.966833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.966862] Hardware name: linux,dummy-virt (DT) [ 32.966895] Call trace: [ 32.966920] show_stack+0x20/0x38 (C) [ 32.966970] dump_stack_lvl+0x8c/0xd0 [ 32.967021] print_report+0x118/0x5e8 [ 32.967065] kasan_report+0xdc/0x128 [ 32.967120] __kasan_check_byte+0x54/0x70 [ 32.967165] kmem_cache_destroy+0x34/0x218 [ 32.967214] kmem_cache_double_destroy+0x174/0x300 [ 32.967263] kunit_try_run_case+0x170/0x3f0 [ 32.967311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.967360] kthread+0x328/0x630 [ 32.967404] ret_from_fork+0x10/0x20 [ 32.967451] [ 32.967472] Allocated by task 246: [ 32.967504] kasan_save_stack+0x3c/0x68 [ 32.967545] kasan_save_track+0x20/0x40 [ 32.967581] kasan_save_alloc_info+0x40/0x58 [ 32.967623] __kasan_slab_alloc+0xa8/0xb0 [ 32.967657] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.967700] __kmem_cache_create_args+0x178/0x280 [ 32.967743] kmem_cache_double_destroy+0xc0/0x300 [ 32.967784] kunit_try_run_case+0x170/0x3f0 [ 32.967821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.967862] kthread+0x328/0x630 [ 32.967897] ret_from_fork+0x10/0x20 [ 32.967932] [ 32.967953] Freed by task 246: [ 32.967979] kasan_save_stack+0x3c/0x68 [ 32.968013] kasan_save_track+0x20/0x40 [ 32.968048] kasan_save_free_info+0x4c/0x78 [ 32.968097] __kasan_slab_free+0x6c/0x98 [ 32.968131] kmem_cache_free+0x260/0x468 [ 32.968169] slab_kmem_cache_release+0x38/0x50 [ 32.968209] kmem_cache_release+0x1c/0x30 [ 32.968247] kobject_put+0x17c/0x420 [ 32.968286] sysfs_slab_release+0x1c/0x30 [ 32.968320] kmem_cache_destroy+0x118/0x218 [ 32.968358] kmem_cache_double_destroy+0x128/0x300 [ 32.968399] kunit_try_run_case+0x170/0x3f0 [ 32.968437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.968480] kthread+0x328/0x630 [ 32.968514] ret_from_fork+0x10/0x20 [ 32.968550] [ 32.968569] The buggy address belongs to the object at fff00000c47438c0 [ 32.968569] which belongs to the cache kmem_cache of size 208 [ 32.968627] The buggy address is located 0 bytes inside of [ 32.968627] freed 208-byte region [fff00000c47438c0, fff00000c4743990) [ 32.968688] [ 32.968712] The buggy address belongs to the physical page: [ 32.968746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104743 [ 32.968803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.968857] page_type: f5(slab) [ 32.968897] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.968947] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.968989] page dumped because: kasan: bad access detected [ 32.969021] [ 32.969039] Memory state around the buggy address: [ 32.969074] fff00000c4743780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.969129] fff00000c4743800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.969172] >fff00000c4743880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.969209] ^ [ 32.969242] fff00000c4743900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.969284] fff00000c4743980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.969321] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf: Failure
Automatically assigned
[ 32.734691] ================================================================== [ 32.734792] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 32.734874] Read of size 1 at addr fff00000c3ff1000 by task kunit_try_catch/244 [ 32.734924] [ 32.734968] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 32.735058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.737531] Hardware name: linux,dummy-virt (DT) [ 32.738102] Call trace: [ 32.738343] show_stack+0x20/0x38 (C) [ 32.738748] dump_stack_lvl+0x8c/0xd0 [ 32.739459] print_report+0x118/0x5e8 [ 32.739908] kasan_report+0xdc/0x128 [ 32.740089] __asan_report_load1_noabort+0x20/0x30 [ 32.740520] kmem_cache_rcu_uaf+0x388/0x468 [ 32.741131] kunit_try_run_case+0x170/0x3f0 [ 32.741683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.742092] kthread+0x328/0x630 [ 32.742686] ret_from_fork+0x10/0x20 [ 32.743125] [ 32.743150] Allocated by task 244: [ 32.744203] kasan_save_stack+0x3c/0x68 [ 32.744497] kasan_save_track+0x20/0x40 [ 32.744579] kasan_save_alloc_info+0x40/0x58 [ 32.744656] __kasan_slab_alloc+0xa8/0xb0 [ 32.744969] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.745335] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.745392] kunit_try_run_case+0x170/0x3f0 [ 32.745430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.745472] kthread+0x328/0x630 [ 32.745508] ret_from_fork+0x10/0x20 [ 32.745542] [ 32.745567] Freed by task 0: [ 32.746044] kasan_save_stack+0x3c/0x68 [ 32.746375] kasan_save_track+0x20/0x40 [ 32.746422] kasan_save_free_info+0x4c/0x78 [ 32.746691] __kasan_slab_free+0x6c/0x98 [ 32.746858] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.746925] rcu_core+0x9f4/0x1e58 [ 32.746967] rcu_core_si+0x18/0x30 [ 32.747009] handle_softirqs+0x374/0xb28 [ 32.747048] __do_softirq+0x1c/0x28 [ 32.747434] [ 32.747543] Last potentially related work creation: [ 32.747573] kasan_save_stack+0x3c/0x68 [ 32.747615] kasan_record_aux_stack+0xb4/0xc8 [ 32.747653] kmem_cache_free+0x120/0x468 [ 32.747690] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.747737] kunit_try_run_case+0x170/0x3f0 [ 32.748587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.748751] kthread+0x328/0x630 [ 32.748800] ret_from_fork+0x10/0x20 [ 32.748838] [ 32.748857] The buggy address belongs to the object at fff00000c3ff1000 [ 32.748857] which belongs to the cache test_cache of size 200 [ 32.749469] The buggy address is located 0 bytes inside of [ 32.749469] freed 200-byte region [fff00000c3ff1000, fff00000c3ff10c8) [ 32.749758] [ 32.749783] The buggy address belongs to the physical page: [ 32.749820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ff1 [ 32.749879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.749934] page_type: f5(slab) [ 32.749977] raw: 0bfffe0000000000 fff00000c4743780 dead000000000122 0000000000000000 [ 32.750032] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.750704] page dumped because: kasan: bad access detected [ 32.751000] [ 32.751020] Memory state around the buggy address: [ 32.751242] fff00000c3ff0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.751378] fff00000c3ff0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.751420] >fff00000c3ff1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.751887] ^ [ 32.751925] fff00000c3ff1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.751970] fff00000c3ff1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.752009] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free: Failure
Automatically assigned
[ 32.151172] ================================================================== [ 32.151233] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 32.151294] Free of addr fff00000c3ff2001 by task kunit_try_catch/242 [ 32.151336] [ 32.151404] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 32.151566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.151607] Hardware name: linux,dummy-virt (DT) [ 32.151640] Call trace: [ 32.151683] show_stack+0x20/0x38 (C) [ 32.151818] dump_stack_lvl+0x8c/0xd0 [ 32.151873] print_report+0x118/0x5e8 [ 32.151937] kasan_report_invalid_free+0xc0/0xe8 [ 32.151985] check_slab_allocation+0xfc/0x108 [ 32.152030] __kasan_slab_pre_free+0x2c/0x48 [ 32.152075] kmem_cache_free+0xf0/0x468 [ 32.152135] kmem_cache_invalid_free+0x184/0x3c8 [ 32.152184] kunit_try_run_case+0x170/0x3f0 [ 32.152440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.152499] kthread+0x328/0x630 [ 32.152545] ret_from_fork+0x10/0x20 [ 32.152603] [ 32.152621] Allocated by task 242: [ 32.152651] kasan_save_stack+0x3c/0x68 [ 32.152700] kasan_save_track+0x20/0x40 [ 32.152734] kasan_save_alloc_info+0x40/0x58 [ 32.152771] __kasan_slab_alloc+0xa8/0xb0 [ 32.152805] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.152856] kmem_cache_invalid_free+0x12c/0x3c8 [ 32.152895] kunit_try_run_case+0x170/0x3f0 [ 32.152931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.152978] kthread+0x328/0x630 [ 32.153021] ret_from_fork+0x10/0x20 [ 32.153055] [ 32.153073] The buggy address belongs to the object at fff00000c3ff2000 [ 32.153073] which belongs to the cache test_cache of size 200 [ 32.153158] The buggy address is located 1 bytes inside of [ 32.153158] 200-byte region [fff00000c3ff2000, fff00000c3ff20c8) [ 32.153226] [ 32.153266] The buggy address belongs to the physical page: [ 32.153299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ff2 [ 32.153361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.153411] page_type: f5(slab) [ 32.153450] raw: 0bfffe0000000000 fff00000c4743640 dead000000000122 0000000000000000 [ 32.153516] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.153566] page dumped because: kasan: bad access detected [ 32.153612] [ 32.153631] Memory state around the buggy address: [ 32.153667] fff00000c3ff1f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.153721] fff00000c3ff1f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.153764] >fff00000c3ff2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.153802] ^ [ 32.153828] fff00000c3ff2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.153870] fff00000c3ff2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.153908] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free: Failure
Automatically assigned
[ 32.125980] ================================================================== [ 32.126060] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 32.126144] Free of addr fff00000c3f1d000 by task kunit_try_catch/240 [ 32.126189] [ 32.126231] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 32.126703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.126736] Hardware name: linux,dummy-virt (DT) [ 32.126839] Call trace: [ 32.126866] show_stack+0x20/0x38 (C) [ 32.126918] dump_stack_lvl+0x8c/0xd0 [ 32.126997] print_report+0x118/0x5e8 [ 32.127041] kasan_report_invalid_free+0xc0/0xe8 [ 32.127109] check_slab_allocation+0xd4/0x108 [ 32.127154] __kasan_slab_pre_free+0x2c/0x48 [ 32.127198] kmem_cache_free+0xf0/0x468 [ 32.127245] kmem_cache_double_free+0x190/0x3c8 [ 32.127295] kunit_try_run_case+0x170/0x3f0 [ 32.127344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.127395] kthread+0x328/0x630 [ 32.127598] ret_from_fork+0x10/0x20 [ 32.127649] [ 32.127697] Allocated by task 240: [ 32.127727] kasan_save_stack+0x3c/0x68 [ 32.127804] kasan_save_track+0x20/0x40 [ 32.127872] kasan_save_alloc_info+0x40/0x58 [ 32.127993] __kasan_slab_alloc+0xa8/0xb0 [ 32.128057] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.128105] kmem_cache_double_free+0x12c/0x3c8 [ 32.128145] kunit_try_run_case+0x170/0x3f0 [ 32.128181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.128224] kthread+0x328/0x630 [ 32.128255] ret_from_fork+0x10/0x20 [ 32.128537] [ 32.128583] Freed by task 240: [ 32.128641] kasan_save_stack+0x3c/0x68 [ 32.128714] kasan_save_track+0x20/0x40 [ 32.128816] kasan_save_free_info+0x4c/0x78 [ 32.128902] __kasan_slab_free+0x6c/0x98 [ 32.128979] kmem_cache_free+0x260/0x468 [ 32.129040] kmem_cache_double_free+0x140/0x3c8 [ 32.129107] kunit_try_run_case+0x170/0x3f0 [ 32.129161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.129316] kthread+0x328/0x630 [ 32.129349] ret_from_fork+0x10/0x20 [ 32.129384] [ 32.129404] The buggy address belongs to the object at fff00000c3f1d000 [ 32.129404] which belongs to the cache test_cache of size 200 [ 32.129491] The buggy address is located 0 bytes inside of [ 32.129491] 200-byte region [fff00000c3f1d000, fff00000c3f1d0c8) [ 32.129578] [ 32.129599] The buggy address belongs to the physical page: [ 32.129863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f1d [ 32.129964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.130057] page_type: f5(slab) [ 32.130174] raw: 0bfffe0000000000 fff00000ffec6f00 dead000000000122 0000000000000000 [ 32.130251] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.130326] page dumped because: kasan: bad access detected [ 32.130357] [ 32.130373] Memory state around the buggy address: [ 32.130695] fff00000c3f1cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.130749] fff00000c3f1cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.130835] >fff00000c3f1d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.130911] ^ [ 32.130996] fff00000c3f1d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.131117] fff00000c3f1d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.131179] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob: Failure
Automatically assigned
[ 31.982920] ================================================================== [ 31.982978] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.983066] Read of size 1 at addr fff00000c3f1c0c8 by task kunit_try_catch/238 [ 31.983443] [ 31.983478] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.983562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.983589] Hardware name: linux,dummy-virt (DT) [ 31.984000] Call trace: [ 31.984099] show_stack+0x20/0x38 (C) [ 31.984470] dump_stack_lvl+0x8c/0xd0 [ 31.984800] print_report+0x118/0x5e8 [ 31.985507] kasan_report+0xdc/0x128 [ 31.985594] __asan_report_load1_noabort+0x20/0x30 [ 31.985678] kmem_cache_oob+0x344/0x430 [ 31.985760] kunit_try_run_case+0x170/0x3f0 [ 31.986009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.986145] kthread+0x328/0x630 [ 31.986258] ret_from_fork+0x10/0x20 [ 31.986337] [ 31.986367] Allocated by task 238: [ 31.986927] kasan_save_stack+0x3c/0x68 [ 31.987045] kasan_save_track+0x20/0x40 [ 31.987144] kasan_save_alloc_info+0x40/0x58 [ 31.987317] __kasan_slab_alloc+0xa8/0xb0 [ 31.987578] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.987889] kmem_cache_oob+0x12c/0x430 [ 31.988037] kunit_try_run_case+0x170/0x3f0 [ 31.988177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.988272] kthread+0x328/0x630 [ 31.988411] ret_from_fork+0x10/0x20 [ 31.988498] [ 31.988598] The buggy address belongs to the object at fff00000c3f1c000 [ 31.988598] which belongs to the cache test_cache of size 200 [ 31.988694] The buggy address is located 0 bytes to the right of [ 31.988694] allocated 200-byte region [fff00000c3f1c000, fff00000c3f1c0c8) [ 31.988832] [ 31.988854] The buggy address belongs to the physical page: [ 31.988903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f1c [ 31.989109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.989332] page_type: f5(slab) [ 31.989412] raw: 0bfffe0000000000 fff00000c4743500 dead000000000122 0000000000000000 [ 31.989779] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.989883] page dumped because: kasan: bad access detected [ 31.989962] [ 31.989998] Memory state around the buggy address: [ 31.990047] fff00000c3f1bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.990237] fff00000c3f1c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.990709] >fff00000c3f1c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.991059] ^ [ 31.991299] fff00000c3f1c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.991364] fff00000c3f1c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.991653] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf: Failure
Automatically assigned
[ 31.946579] ================================================================== [ 31.946649] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.946727] Read of size 8 at addr fff00000c401e280 by task kunit_try_catch/231 [ 31.946784] [ 31.946824] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.946911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.946938] Hardware name: linux,dummy-virt (DT) [ 31.946975] Call trace: [ 31.946998] show_stack+0x20/0x38 (C) [ 31.947046] dump_stack_lvl+0x8c/0xd0 [ 31.947107] print_report+0x118/0x5e8 [ 31.947148] kasan_report+0xdc/0x128 [ 31.947191] __asan_report_load8_noabort+0x20/0x30 [ 31.947239] workqueue_uaf+0x480/0x4a8 [ 31.947284] kunit_try_run_case+0x170/0x3f0 [ 31.947340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.947392] kthread+0x328/0x630 [ 31.947444] ret_from_fork+0x10/0x20 [ 31.947489] [ 31.947507] Allocated by task 231: [ 31.947542] kasan_save_stack+0x3c/0x68 [ 31.947581] kasan_save_track+0x20/0x40 [ 31.947618] kasan_save_alloc_info+0x40/0x58 [ 31.947655] __kasan_kmalloc+0xd4/0xd8 [ 31.947688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.948096] workqueue_uaf+0x13c/0x4a8 [ 31.948432] kunit_try_run_case+0x170/0x3f0 [ 31.948904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.949259] kthread+0x328/0x630 [ 31.949444] ret_from_fork+0x10/0x20 [ 31.949505] [ 31.949590] Freed by task 75: [ 31.949669] kasan_save_stack+0x3c/0x68 [ 31.949744] kasan_save_track+0x20/0x40 [ 31.949857] kasan_save_free_info+0x4c/0x78 [ 31.949926] __kasan_slab_free+0x6c/0x98 [ 31.950149] kfree+0x214/0x3c8 [ 31.950389] workqueue_uaf_work+0x18/0x30 [ 31.950459] process_one_work+0x530/0xf88 [ 31.950525] worker_thread+0x618/0xf38 [ 31.950644] kthread+0x328/0x630 [ 31.950722] ret_from_fork+0x10/0x20 [ 31.950800] [ 31.950830] Last potentially related work creation: [ 31.950858] kasan_save_stack+0x3c/0x68 [ 31.950895] kasan_record_aux_stack+0xb4/0xc8 [ 31.950933] __queue_work+0x65c/0xfe0 [ 31.950978] queue_work_on+0xbc/0xf8 [ 31.951023] workqueue_uaf+0x210/0x4a8 [ 31.951060] kunit_try_run_case+0x170/0x3f0 [ 31.951117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.951160] kthread+0x328/0x630 [ 31.951206] ret_from_fork+0x10/0x20 [ 31.951245] [ 31.951271] The buggy address belongs to the object at fff00000c401e280 [ 31.951271] which belongs to the cache kmalloc-32 of size 32 [ 31.951343] The buggy address is located 0 bytes inside of [ 31.951343] freed 32-byte region [fff00000c401e280, fff00000c401e2a0) [ 31.951411] [ 31.951446] The buggy address belongs to the physical page: [ 31.951502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10401e [ 31.951556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.951638] page_type: f5(slab) [ 31.951677] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.951973] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.952197] page dumped because: kasan: bad access detected [ 31.952422] [ 31.952694] Memory state around the buggy address: [ 31.952768] fff00000c401e180: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.952990] fff00000c401e200: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 31.953278] >fff00000c401e280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.953405] ^ [ 31.953501] fff00000c401e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.953548] fff00000c401e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.953766] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim: Failure
Automatically assigned
[ 31.920876] ================================================================== [ 31.921009] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.921093] Read of size 4 at addr fff00000c401e0c0 by task swapper/0/0 [ 31.921141] [ 31.921181] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.921266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.921292] Hardware name: linux,dummy-virt (DT) [ 31.921326] Call trace: [ 31.921350] show_stack+0x20/0x38 (C) [ 31.921401] dump_stack_lvl+0x8c/0xd0 [ 31.921449] print_report+0x118/0x5e8 [ 31.921493] kasan_report+0xdc/0x128 [ 31.921535] __asan_report_load4_noabort+0x20/0x30 [ 31.921581] rcu_uaf_reclaim+0x64/0x70 [ 31.921625] rcu_core+0x9f4/0x1e58 [ 31.921670] rcu_core_si+0x18/0x30 [ 31.921713] handle_softirqs+0x374/0xb28 [ 31.921758] __do_softirq+0x1c/0x28 [ 31.921801] ____do_softirq+0x18/0x30 [ 31.921842] call_on_irq_stack+0x24/0x30 [ 31.921885] do_softirq_own_stack+0x24/0x38 [ 31.921931] __irq_exit_rcu+0x1fc/0x318 [ 31.921975] irq_exit_rcu+0x1c/0x80 [ 31.922016] el1_interrupt+0x38/0x58 [ 31.922067] el1h_64_irq_handler+0x18/0x28 [ 31.922198] el1h_64_irq+0x6c/0x70 [ 31.922316] arch_local_irq_enable+0x4/0x8 (P) [ 31.922683] do_idle+0x384/0x4e8 [ 31.922773] cpu_startup_entry+0x68/0x80 [ 31.922831] rest_init+0x160/0x188 [ 31.922874] start_kernel+0x30c/0x3d0 [ 31.922930] __primary_switched+0x8c/0xa0 [ 31.922982] [ 31.923002] Allocated by task 229: [ 31.923032] kasan_save_stack+0x3c/0x68 [ 31.923072] kasan_save_track+0x20/0x40 [ 31.923122] kasan_save_alloc_info+0x40/0x58 [ 31.923161] __kasan_kmalloc+0xd4/0xd8 [ 31.923195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.923237] rcu_uaf+0xb0/0x2d8 [ 31.923282] kunit_try_run_case+0x170/0x3f0 [ 31.923321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.923364] kthread+0x328/0x630 [ 31.923396] ret_from_fork+0x10/0x20 [ 31.923432] [ 31.923451] Freed by task 0: [ 31.923477] kasan_save_stack+0x3c/0x68 [ 31.923511] kasan_save_track+0x20/0x40 [ 31.923546] kasan_save_free_info+0x4c/0x78 [ 31.923584] __kasan_slab_free+0x6c/0x98 [ 31.923821] kfree+0x214/0x3c8 [ 31.923872] rcu_uaf_reclaim+0x28/0x70 [ 31.923910] rcu_core+0x9f4/0x1e58 [ 31.923947] rcu_core_si+0x18/0x30 [ 31.923981] handle_softirqs+0x374/0xb28 [ 31.924215] __do_softirq+0x1c/0x28 [ 31.924307] [ 31.924535] Last potentially related work creation: [ 31.924596] kasan_save_stack+0x3c/0x68 [ 31.924637] kasan_record_aux_stack+0xb4/0xc8 [ 31.924677] __call_rcu_common.constprop.0+0x74/0x8c8 [ 31.924718] call_rcu+0x18/0x30 [ 31.924754] rcu_uaf+0x14c/0x2d8 [ 31.924793] kunit_try_run_case+0x170/0x3f0 [ 31.924830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.924873] kthread+0x328/0x630 [ 31.924919] ret_from_fork+0x10/0x20 [ 31.924994] [ 31.925184] The buggy address belongs to the object at fff00000c401e0c0 [ 31.925184] which belongs to the cache kmalloc-32 of size 32 [ 31.925405] The buggy address is located 0 bytes inside of [ 31.925405] freed 32-byte region [fff00000c401e0c0, fff00000c401e0e0) [ 31.925720] [ 31.925793] The buggy address belongs to the physical page: [ 31.926065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10401e [ 31.926374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.926705] page_type: f5(slab) [ 31.926808] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.927288] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.927360] page dumped because: kasan: bad access detected [ 31.927463] [ 31.927549] Memory state around the buggy address: [ 31.927603] fff00000c401df80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.927663] fff00000c401e000: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.927740] >fff00000c401e080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.927779] ^ [ 31.927949] fff00000c401e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.927996] fff00000c401e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.928159] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf: Failure
Automatically assigned
[ 31.746860] ================================================================== [ 31.746982] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.747131] Read of size 1 at addr fff00000c3efde00 by task kunit_try_catch/227 [ 31.747186] [ 31.747217] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.747558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.747589] Hardware name: linux,dummy-virt (DT) [ 31.747622] Call trace: [ 31.747772] show_stack+0x20/0x38 (C) [ 31.747983] dump_stack_lvl+0x8c/0xd0 [ 31.748183] print_report+0x118/0x5e8 [ 31.748253] kasan_report+0xdc/0x128 [ 31.748423] __kasan_check_byte+0x54/0x70 [ 31.748579] ksize+0x30/0x88 [ 31.748648] ksize_uaf+0x168/0x5f8 [ 31.748792] kunit_try_run_case+0x170/0x3f0 [ 31.748877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.749018] kthread+0x328/0x630 [ 31.749098] ret_from_fork+0x10/0x20 [ 31.749220] [ 31.749239] Allocated by task 227: [ 31.749291] kasan_save_stack+0x3c/0x68 [ 31.749577] kasan_save_track+0x20/0x40 [ 31.749647] kasan_save_alloc_info+0x40/0x58 [ 31.749685] __kasan_kmalloc+0xd4/0xd8 [ 31.749722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.749821] ksize_uaf+0xb8/0x5f8 [ 31.749860] kunit_try_run_case+0x170/0x3f0 [ 31.749902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.749961] kthread+0x328/0x630 [ 31.749994] ret_from_fork+0x10/0x20 [ 31.750045] [ 31.750070] Freed by task 227: [ 31.750353] kasan_save_stack+0x3c/0x68 [ 31.750469] kasan_save_track+0x20/0x40 [ 31.750619] kasan_save_free_info+0x4c/0x78 [ 31.750685] __kasan_slab_free+0x6c/0x98 [ 31.751017] kfree+0x214/0x3c8 [ 31.751075] ksize_uaf+0x11c/0x5f8 [ 31.751144] kunit_try_run_case+0x170/0x3f0 [ 31.751486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.751567] kthread+0x328/0x630 [ 31.751652] ret_from_fork+0x10/0x20 [ 31.751755] [ 31.751799] The buggy address belongs to the object at fff00000c3efde00 [ 31.751799] which belongs to the cache kmalloc-128 of size 128 [ 31.751976] The buggy address is located 0 bytes inside of [ 31.751976] freed 128-byte region [fff00000c3efde00, fff00000c3efde80) [ 31.752092] [ 31.752329] The buggy address belongs to the physical page: [ 31.752428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.752584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.752670] page_type: f5(slab) [ 31.752727] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.752859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.752983] page dumped because: kasan: bad access detected [ 31.753043] [ 31.753106] Memory state around the buggy address: [ 31.753194] fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.753265] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.753307] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.753584] ^ [ 31.753670] fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.753757] fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.753846] ================================================================== [ 31.754478] ================================================================== [ 31.754742] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.754951] Read of size 1 at addr fff00000c3efde00 by task kunit_try_catch/227 [ 31.755027] [ 31.755086] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.755215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.755253] Hardware name: linux,dummy-virt (DT) [ 31.755284] Call trace: [ 31.755313] show_stack+0x20/0x38 (C) [ 31.755525] dump_stack_lvl+0x8c/0xd0 [ 31.755686] print_report+0x118/0x5e8 [ 31.755817] kasan_report+0xdc/0x128 [ 31.755926] __asan_report_load1_noabort+0x20/0x30 [ 31.756012] ksize_uaf+0x598/0x5f8 [ 31.756198] kunit_try_run_case+0x170/0x3f0 [ 31.756245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.756294] kthread+0x328/0x630 [ 31.756631] ret_from_fork+0x10/0x20 [ 31.756697] [ 31.756717] Allocated by task 227: [ 31.756783] kasan_save_stack+0x3c/0x68 [ 31.756825] kasan_save_track+0x20/0x40 [ 31.756859] kasan_save_alloc_info+0x40/0x58 [ 31.756897] __kasan_kmalloc+0xd4/0xd8 [ 31.756941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.756982] ksize_uaf+0xb8/0x5f8 [ 31.757016] kunit_try_run_case+0x170/0x3f0 [ 31.757051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.757320] kthread+0x328/0x630 [ 31.757441] ret_from_fork+0x10/0x20 [ 31.757522] [ 31.757604] Freed by task 227: [ 31.757685] kasan_save_stack+0x3c/0x68 [ 31.757735] kasan_save_track+0x20/0x40 [ 31.758061] kasan_save_free_info+0x4c/0x78 [ 31.758152] __kasan_slab_free+0x6c/0x98 [ 31.758205] kfree+0x214/0x3c8 [ 31.758258] ksize_uaf+0x11c/0x5f8 [ 31.758512] kunit_try_run_case+0x170/0x3f0 [ 31.758682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.758732] kthread+0x328/0x630 [ 31.758982] ret_from_fork+0x10/0x20 [ 31.759181] [ 31.759234] The buggy address belongs to the object at fff00000c3efde00 [ 31.759234] which belongs to the cache kmalloc-128 of size 128 [ 31.759357] The buggy address is located 0 bytes inside of [ 31.759357] freed 128-byte region [fff00000c3efde00, fff00000c3efde80) [ 31.759514] [ 31.759565] The buggy address belongs to the physical page: [ 31.759846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.759990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.760183] page_type: f5(slab) [ 31.760256] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.760392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.760469] page dumped because: kasan: bad access detected [ 31.760615] [ 31.760653] Memory state around the buggy address: [ 31.760688] fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.760733] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.760775] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.761095] ^ [ 31.761149] fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.761214] fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.761316] ================================================================== [ 31.761905] ================================================================== [ 31.761954] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 31.762003] Read of size 1 at addr fff00000c3efde78 by task kunit_try_catch/227 [ 31.762087] [ 31.762118] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.762202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.762237] Hardware name: linux,dummy-virt (DT) [ 31.762266] Call trace: [ 31.762289] show_stack+0x20/0x38 (C) [ 31.762342] dump_stack_lvl+0x8c/0xd0 [ 31.762390] print_report+0x118/0x5e8 [ 31.762433] kasan_report+0xdc/0x128 [ 31.762473] __asan_report_load1_noabort+0x20/0x30 [ 31.762521] ksize_uaf+0x544/0x5f8 [ 31.762563] kunit_try_run_case+0x170/0x3f0 [ 31.762614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.762665] kthread+0x328/0x630 [ 31.762710] ret_from_fork+0x10/0x20 [ 31.762754] [ 31.762773] Allocated by task 227: [ 31.762810] kasan_save_stack+0x3c/0x68 [ 31.762847] kasan_save_track+0x20/0x40 [ 31.762890] kasan_save_alloc_info+0x40/0x58 [ 31.762930] __kasan_kmalloc+0xd4/0xd8 [ 31.762964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.763004] ksize_uaf+0xb8/0x5f8 [ 31.763039] kunit_try_run_case+0x170/0x3f0 [ 31.763076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.763128] kthread+0x328/0x630 [ 31.763431] ret_from_fork+0x10/0x20 [ 31.763584] [ 31.763622] Freed by task 227: [ 31.763799] kasan_save_stack+0x3c/0x68 [ 31.763954] kasan_save_track+0x20/0x40 [ 31.764131] kasan_save_free_info+0x4c/0x78 [ 31.764218] __kasan_slab_free+0x6c/0x98 [ 31.764580] kfree+0x214/0x3c8 [ 31.764651] ksize_uaf+0x11c/0x5f8 [ 31.765189] kunit_try_run_case+0x170/0x3f0 [ 31.765496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.765573] kthread+0x328/0x630 [ 31.765637] ret_from_fork+0x10/0x20 [ 31.765727] [ 31.765819] The buggy address belongs to the object at fff00000c3efde00 [ 31.765819] which belongs to the cache kmalloc-128 of size 128 [ 31.765939] The buggy address is located 120 bytes inside of [ 31.765939] freed 128-byte region [fff00000c3efde00, fff00000c3efde80) [ 31.766003] [ 31.766026] The buggy address belongs to the physical page: [ 31.766208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.766330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.766653] page_type: f5(slab) [ 31.766964] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.767030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.767385] page dumped because: kasan: bad access detected [ 31.767448] [ 31.767498] Memory state around the buggy address: [ 31.767767] fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.767833] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.767884] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.767993] ^ [ 31.768068] fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.768189] fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.768257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory: Failure
Automatically assigned
[ 31.732425] ================================================================== [ 31.732501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.732553] Read of size 1 at addr fff00000c3efdd7f by task kunit_try_catch/225 [ 31.732622] [ 31.732971] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.733129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.733178] Hardware name: linux,dummy-virt (DT) [ 31.733226] Call trace: [ 31.733253] show_stack+0x20/0x38 (C) [ 31.733544] dump_stack_lvl+0x8c/0xd0 [ 31.733644] print_report+0x118/0x5e8 [ 31.733727] kasan_report+0xdc/0x128 [ 31.733794] __asan_report_load1_noabort+0x20/0x30 [ 31.733845] ksize_unpoisons_memory+0x690/0x740 [ 31.734150] kunit_try_run_case+0x170/0x3f0 [ 31.734236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.734290] kthread+0x328/0x630 [ 31.734365] ret_from_fork+0x10/0x20 [ 31.734417] [ 31.734435] Allocated by task 225: [ 31.734492] kasan_save_stack+0x3c/0x68 [ 31.734537] kasan_save_track+0x20/0x40 [ 31.734572] kasan_save_alloc_info+0x40/0x58 [ 31.734867] __kasan_kmalloc+0xd4/0xd8 [ 31.734943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.735072] ksize_unpoisons_memory+0xc0/0x740 [ 31.735128] kunit_try_run_case+0x170/0x3f0 [ 31.735163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.735210] kthread+0x328/0x630 [ 31.735408] ret_from_fork+0x10/0x20 [ 31.735469] [ 31.735615] The buggy address belongs to the object at fff00000c3efdd00 [ 31.735615] which belongs to the cache kmalloc-128 of size 128 [ 31.735681] The buggy address is located 12 bytes to the right of [ 31.735681] allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73) [ 31.736057] [ 31.736156] The buggy address belongs to the physical page: [ 31.736190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.736246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.736304] page_type: f5(slab) [ 31.736342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.736634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.736813] page dumped because: kasan: bad access detected [ 31.737016] [ 31.737074] Memory state around the buggy address: [ 31.737346] fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.737509] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.737643] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.737683] ^ [ 31.738005] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.738102] fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.738223] ================================================================== [ 31.727015] ================================================================== [ 31.727065] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.727128] Read of size 1 at addr fff00000c3efdd78 by task kunit_try_catch/225 [ 31.727384] [ 31.727426] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.727531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.727567] Hardware name: linux,dummy-virt (DT) [ 31.727598] Call trace: [ 31.727621] show_stack+0x20/0x38 (C) [ 31.727668] dump_stack_lvl+0x8c/0xd0 [ 31.727717] print_report+0x118/0x5e8 [ 31.727760] kasan_report+0xdc/0x128 [ 31.727803] __asan_report_load1_noabort+0x20/0x30 [ 31.727863] ksize_unpoisons_memory+0x618/0x740 [ 31.727911] kunit_try_run_case+0x170/0x3f0 [ 31.727967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.728020] kthread+0x328/0x630 [ 31.728066] ret_from_fork+0x10/0x20 [ 31.728125] [ 31.728157] Allocated by task 225: [ 31.728185] kasan_save_stack+0x3c/0x68 [ 31.728231] kasan_save_track+0x20/0x40 [ 31.728275] kasan_save_alloc_info+0x40/0x58 [ 31.728313] __kasan_kmalloc+0xd4/0xd8 [ 31.728353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.728394] ksize_unpoisons_memory+0xc0/0x740 [ 31.728434] kunit_try_run_case+0x170/0x3f0 [ 31.728471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.728513] kthread+0x328/0x630 [ 31.728559] ret_from_fork+0x10/0x20 [ 31.728597] [ 31.728624] The buggy address belongs to the object at fff00000c3efdd00 [ 31.728624] which belongs to the cache kmalloc-128 of size 128 [ 31.728689] The buggy address is located 5 bytes to the right of [ 31.728689] allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73) [ 31.728751] [ 31.728771] The buggy address belongs to the physical page: [ 31.728800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.728852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.728909] page_type: f5(slab) [ 31.728953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.729003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.729048] page dumped because: kasan: bad access detected [ 31.729089] [ 31.729435] Memory state around the buggy address: [ 31.729524] fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.729834] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.730070] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.730338] ^ [ 31.730594] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.730647] fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.731195] ================================================================== [ 31.720413] ================================================================== [ 31.720500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.720641] Read of size 1 at addr fff00000c3efdd73 by task kunit_try_catch/225 [ 31.720697] [ 31.720728] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.720818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.720845] Hardware name: linux,dummy-virt (DT) [ 31.721177] Call trace: [ 31.721214] show_stack+0x20/0x38 (C) [ 31.721356] dump_stack_lvl+0x8c/0xd0 [ 31.721410] print_report+0x118/0x5e8 [ 31.721480] kasan_report+0xdc/0x128 [ 31.721602] __asan_report_load1_noabort+0x20/0x30 [ 31.721654] ksize_unpoisons_memory+0x628/0x740 [ 31.721945] kunit_try_run_case+0x170/0x3f0 [ 31.722026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.722309] kthread+0x328/0x630 [ 31.722385] ret_from_fork+0x10/0x20 [ 31.722452] [ 31.722543] Allocated by task 225: [ 31.722574] kasan_save_stack+0x3c/0x68 [ 31.722614] kasan_save_track+0x20/0x40 [ 31.722649] kasan_save_alloc_info+0x40/0x58 [ 31.722702] __kasan_kmalloc+0xd4/0xd8 [ 31.723002] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.723094] ksize_unpoisons_memory+0xc0/0x740 [ 31.723143] kunit_try_run_case+0x170/0x3f0 [ 31.723192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.723292] kthread+0x328/0x630 [ 31.723327] ret_from_fork+0x10/0x20 [ 31.723384] [ 31.723425] The buggy address belongs to the object at fff00000c3efdd00 [ 31.723425] which belongs to the cache kmalloc-128 of size 128 [ 31.723485] The buggy address is located 0 bytes to the right of [ 31.723485] allocated 115-byte region [fff00000c3efdd00, fff00000c3efdd73) [ 31.723698] [ 31.723814] The buggy address belongs to the physical page: [ 31.723991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.724143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.724244] page_type: f5(slab) [ 31.724302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.724425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.724470] page dumped because: kasan: bad access detected [ 31.724512] [ 31.724535] Memory state around the buggy address: [ 31.724575] fff00000c3efdc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.724936] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.724992] >fff00000c3efdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.725759] ^ [ 31.725836] fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.725905] fff00000c3efde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.726010] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive: Failure
Automatically assigned
[ 31.705970] ================================================================== [ 31.706104] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.706179] Free of addr fff00000c907e100 by task kunit_try_catch/223 [ 31.706222] [ 31.706281] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.706510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.706542] Hardware name: linux,dummy-virt (DT) [ 31.706584] Call trace: [ 31.706609] show_stack+0x20/0x38 (C) [ 31.706661] dump_stack_lvl+0x8c/0xd0 [ 31.706708] print_report+0x118/0x5e8 [ 31.706750] kasan_report_invalid_free+0xc0/0xe8 [ 31.706802] check_slab_allocation+0xd4/0x108 [ 31.706847] __kasan_slab_pre_free+0x2c/0x48 [ 31.706891] kfree+0xe8/0x3c8 [ 31.706934] kfree_sensitive+0x3c/0xb0 [ 31.706999] kmalloc_double_kzfree+0x168/0x308 [ 31.707047] kunit_try_run_case+0x170/0x3f0 [ 31.707132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.707186] kthread+0x328/0x630 [ 31.707769] ret_from_fork+0x10/0x20 [ 31.707845] [ 31.707893] Allocated by task 223: [ 31.707937] kasan_save_stack+0x3c/0x68 [ 31.708060] kasan_save_track+0x20/0x40 [ 31.708147] kasan_save_alloc_info+0x40/0x58 [ 31.708282] __kasan_kmalloc+0xd4/0xd8 [ 31.708480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.708550] kmalloc_double_kzfree+0xb8/0x308 [ 31.708711] kunit_try_run_case+0x170/0x3f0 [ 31.708776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.708882] kthread+0x328/0x630 [ 31.708943] ret_from_fork+0x10/0x20 [ 31.709104] [ 31.709164] Freed by task 223: [ 31.709210] kasan_save_stack+0x3c/0x68 [ 31.709350] kasan_save_track+0x20/0x40 [ 31.709438] kasan_save_free_info+0x4c/0x78 [ 31.709749] __kasan_slab_free+0x6c/0x98 [ 31.709819] kfree+0x214/0x3c8 [ 31.709884] kfree_sensitive+0x80/0xb0 [ 31.710004] kmalloc_double_kzfree+0x11c/0x308 [ 31.710155] kunit_try_run_case+0x170/0x3f0 [ 31.710222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.710300] kthread+0x328/0x630 [ 31.710398] ret_from_fork+0x10/0x20 [ 31.710446] [ 31.710466] The buggy address belongs to the object at fff00000c907e100 [ 31.710466] which belongs to the cache kmalloc-16 of size 16 [ 31.710838] The buggy address is located 0 bytes inside of [ 31.710838] 16-byte region [fff00000c907e100, fff00000c907e110) [ 31.710921] [ 31.711282] The buggy address belongs to the physical page: [ 31.711346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e [ 31.711513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.711612] page_type: f5(slab) [ 31.711667] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.711791] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000 [ 31.711872] page dumped because: kasan: bad access detected [ 31.711922] [ 31.711940] Memory state around the buggy address: [ 31.711973] fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.712019] fff00000c907e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.712067] >fff00000c907e100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.712114] ^ [ 31.712541] fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.712619] fff00000c907e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.712747] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree: Failure
Automatically assigned
[ 31.694141] ================================================================== [ 31.694214] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 31.694284] Read of size 1 at addr fff00000c907e100 by task kunit_try_catch/223 [ 31.694576] [ 31.694644] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.694733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.694761] Hardware name: linux,dummy-virt (DT) [ 31.694844] Call trace: [ 31.694871] show_stack+0x20/0x38 (C) [ 31.694924] dump_stack_lvl+0x8c/0xd0 [ 31.695225] print_report+0x118/0x5e8 [ 31.695310] kasan_report+0xdc/0x128 [ 31.695354] __kasan_check_byte+0x54/0x70 [ 31.695564] kfree_sensitive+0x30/0xb0 [ 31.695643] kmalloc_double_kzfree+0x168/0x308 [ 31.695696] kunit_try_run_case+0x170/0x3f0 [ 31.696122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.696301] kthread+0x328/0x630 [ 31.696359] ret_from_fork+0x10/0x20 [ 31.696646] [ 31.696755] Allocated by task 223: [ 31.696900] kasan_save_stack+0x3c/0x68 [ 31.697221] kasan_save_track+0x20/0x40 [ 31.697346] kasan_save_alloc_info+0x40/0x58 [ 31.697424] __kasan_kmalloc+0xd4/0xd8 [ 31.697478] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.697674] kmalloc_double_kzfree+0xb8/0x308 [ 31.697936] kunit_try_run_case+0x170/0x3f0 [ 31.697986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.698034] kthread+0x328/0x630 [ 31.698414] ret_from_fork+0x10/0x20 [ 31.698534] [ 31.698577] Freed by task 223: [ 31.698606] kasan_save_stack+0x3c/0x68 [ 31.698785] kasan_save_track+0x20/0x40 [ 31.699007] kasan_save_free_info+0x4c/0x78 [ 31.699134] __kasan_slab_free+0x6c/0x98 [ 31.699171] kfree+0x214/0x3c8 [ 31.699462] kfree_sensitive+0x80/0xb0 [ 31.699601] kmalloc_double_kzfree+0x11c/0x308 [ 31.699690] kunit_try_run_case+0x170/0x3f0 [ 31.699756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.699799] kthread+0x328/0x630 [ 31.699833] ret_from_fork+0x10/0x20 [ 31.699867] [ 31.700239] The buggy address belongs to the object at fff00000c907e100 [ 31.700239] which belongs to the cache kmalloc-16 of size 16 [ 31.700354] The buggy address is located 0 bytes inside of [ 31.700354] freed 16-byte region [fff00000c907e100, fff00000c907e110) [ 31.700477] [ 31.700518] The buggy address belongs to the physical page: [ 31.700558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e [ 31.700942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.701070] page_type: f5(slab) [ 31.701143] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.701474] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000 [ 31.701542] page dumped because: kasan: bad access detected [ 31.701634] [ 31.701666] Memory state around the buggy address: [ 31.701699] fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.701772] fff00000c907e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.702100] >fff00000c907e100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.702197] ^ [ 31.702279] fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.702358] fff00000c907e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.702670] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2: Failure
Automatically assigned
[ 31.670424] ================================================================== [ 31.670501] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 31.670555] Read of size 1 at addr fff00000c9a42428 by task kunit_try_catch/219 [ 31.670671] [ 31.670705] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.670790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.670832] Hardware name: linux,dummy-virt (DT) [ 31.671168] Call trace: [ 31.671209] show_stack+0x20/0x38 (C) [ 31.671497] dump_stack_lvl+0x8c/0xd0 [ 31.671596] print_report+0x118/0x5e8 [ 31.671702] kasan_report+0xdc/0x128 [ 31.671804] __asan_report_load1_noabort+0x20/0x30 [ 31.671884] kmalloc_uaf2+0x3f4/0x468 [ 31.672000] kunit_try_run_case+0x170/0x3f0 [ 31.672063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.672284] kthread+0x328/0x630 [ 31.672430] ret_from_fork+0x10/0x20 [ 31.672642] [ 31.672702] Allocated by task 219: [ 31.672841] kasan_save_stack+0x3c/0x68 [ 31.672930] kasan_save_track+0x20/0x40 [ 31.673108] kasan_save_alloc_info+0x40/0x58 [ 31.673197] __kasan_kmalloc+0xd4/0xd8 [ 31.673596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.673659] kmalloc_uaf2+0xc4/0x468 [ 31.673791] kunit_try_run_case+0x170/0x3f0 [ 31.673869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.674043] kthread+0x328/0x630 [ 31.674123] ret_from_fork+0x10/0x20 [ 31.674247] [ 31.674284] Freed by task 219: [ 31.674311] kasan_save_stack+0x3c/0x68 [ 31.674363] kasan_save_track+0x20/0x40 [ 31.674400] kasan_save_free_info+0x4c/0x78 [ 31.674725] __kasan_slab_free+0x6c/0x98 [ 31.674796] kfree+0x214/0x3c8 [ 31.674960] kmalloc_uaf2+0x134/0x468 [ 31.675048] kunit_try_run_case+0x170/0x3f0 [ 31.675124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.675537] kthread+0x328/0x630 [ 31.675626] ret_from_fork+0x10/0x20 [ 31.675690] [ 31.675781] The buggy address belongs to the object at fff00000c9a42400 [ 31.675781] which belongs to the cache kmalloc-64 of size 64 [ 31.675868] The buggy address is located 40 bytes inside of [ 31.675868] freed 64-byte region [fff00000c9a42400, fff00000c9a42440) [ 31.676013] [ 31.676071] The buggy address belongs to the physical page: [ 31.676124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a42 [ 31.676180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.676228] page_type: f5(slab) [ 31.676265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.676636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.676736] page dumped because: kasan: bad access detected [ 31.676800] [ 31.676819] Memory state around the buggy address: [ 31.676853] fff00000c9a42300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.676942] fff00000c9a42380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.676993] >fff00000c9a42400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.677032] ^ [ 31.677074] fff00000c9a42480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.677127] fff00000c9a42500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.677164] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset: Failure
Automatically assigned
[ 31.653119] ================================================================== [ 31.653192] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 31.653390] Write of size 33 at addr fff00000c9a42280 by task kunit_try_catch/217 [ 31.653452] [ 31.653520] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.653613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.653939] Hardware name: linux,dummy-virt (DT) [ 31.653989] Call trace: [ 31.654112] show_stack+0x20/0x38 (C) [ 31.654198] dump_stack_lvl+0x8c/0xd0 [ 31.654249] print_report+0x118/0x5e8 [ 31.654553] kasan_report+0xdc/0x128 [ 31.654607] kasan_check_range+0x100/0x1a8 [ 31.654654] __asan_memset+0x34/0x78 [ 31.654697] kmalloc_uaf_memset+0x170/0x310 [ 31.655060] kunit_try_run_case+0x170/0x3f0 [ 31.655167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.655264] kthread+0x328/0x630 [ 31.655307] ret_from_fork+0x10/0x20 [ 31.655498] [ 31.655517] Allocated by task 217: [ 31.655546] kasan_save_stack+0x3c/0x68 [ 31.655753] kasan_save_track+0x20/0x40 [ 31.655813] kasan_save_alloc_info+0x40/0x58 [ 31.655852] __kasan_kmalloc+0xd4/0xd8 [ 31.655892] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.655932] kmalloc_uaf_memset+0xb8/0x310 [ 31.655968] kunit_try_run_case+0x170/0x3f0 [ 31.656005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.656389] kthread+0x328/0x630 [ 31.656475] ret_from_fork+0x10/0x20 [ 31.656513] [ 31.656569] Freed by task 217: [ 31.656882] kasan_save_stack+0x3c/0x68 [ 31.657113] kasan_save_track+0x20/0x40 [ 31.657332] kasan_save_free_info+0x4c/0x78 [ 31.657663] __kasan_slab_free+0x6c/0x98 [ 31.657736] kfree+0x214/0x3c8 [ 31.657786] kmalloc_uaf_memset+0x11c/0x310 [ 31.657943] kunit_try_run_case+0x170/0x3f0 [ 31.658103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.658198] kthread+0x328/0x630 [ 31.658335] ret_from_fork+0x10/0x20 [ 31.658375] [ 31.658411] The buggy address belongs to the object at fff00000c9a42280 [ 31.658411] which belongs to the cache kmalloc-64 of size 64 [ 31.658478] The buggy address is located 0 bytes inside of [ 31.658478] freed 64-byte region [fff00000c9a42280, fff00000c9a422c0) [ 31.658539] [ 31.658671] The buggy address belongs to the physical page: [ 31.658725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a42 [ 31.658779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.658829] page_type: f5(slab) [ 31.658879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.658927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.658978] page dumped because: kasan: bad access detected [ 31.659016] [ 31.659042] Memory state around the buggy address: [ 31.659088] fff00000c9a42180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.659132] fff00000c9a42200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.659174] >fff00000c9a42280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.659210] ^ [ 31.659237] fff00000c9a42300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.659279] fff00000c9a42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.659318] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf: Failure
Automatically assigned
[ 31.635337] ================================================================== [ 31.635394] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 31.635444] Read of size 1 at addr fff00000c907e0e8 by task kunit_try_catch/215 [ 31.635493] [ 31.635522] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.635605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.635630] Hardware name: linux,dummy-virt (DT) [ 31.635661] Call trace: [ 31.635685] show_stack+0x20/0x38 (C) [ 31.635732] dump_stack_lvl+0x8c/0xd0 [ 31.635779] print_report+0x118/0x5e8 [ 31.635820] kasan_report+0xdc/0x128 [ 31.635862] __asan_report_load1_noabort+0x20/0x30 [ 31.635910] kmalloc_uaf+0x300/0x338 [ 31.635952] kunit_try_run_case+0x170/0x3f0 [ 31.635998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.636528] kthread+0x328/0x630 [ 31.636835] ret_from_fork+0x10/0x20 [ 31.637096] [ 31.637226] Allocated by task 215: [ 31.637279] kasan_save_stack+0x3c/0x68 [ 31.637643] kasan_save_track+0x20/0x40 [ 31.637711] kasan_save_alloc_info+0x40/0x58 [ 31.637772] __kasan_kmalloc+0xd4/0xd8 [ 31.637856] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.637958] kmalloc_uaf+0xb8/0x338 [ 31.638126] kunit_try_run_case+0x170/0x3f0 [ 31.638224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.638536] kthread+0x328/0x630 [ 31.638699] ret_from_fork+0x10/0x20 [ 31.638857] [ 31.638926] Freed by task 215: [ 31.639055] kasan_save_stack+0x3c/0x68 [ 31.639132] kasan_save_track+0x20/0x40 [ 31.639236] kasan_save_free_info+0x4c/0x78 [ 31.639305] __kasan_slab_free+0x6c/0x98 [ 31.639370] kfree+0x214/0x3c8 [ 31.639678] kmalloc_uaf+0x11c/0x338 [ 31.639768] kunit_try_run_case+0x170/0x3f0 [ 31.639842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.639990] kthread+0x328/0x630 [ 31.640156] ret_from_fork+0x10/0x20 [ 31.640242] [ 31.640568] The buggy address belongs to the object at fff00000c907e0e0 [ 31.640568] which belongs to the cache kmalloc-16 of size 16 [ 31.640657] The buggy address is located 8 bytes inside of [ 31.640657] freed 16-byte region [fff00000c907e0e0, fff00000c907e0f0) [ 31.640820] [ 31.640869] The buggy address belongs to the physical page: [ 31.640928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e [ 31.641251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.641379] page_type: f5(slab) [ 31.641434] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.641532] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000 [ 31.641641] page dumped because: kasan: bad access detected [ 31.641724] [ 31.641792] Memory state around the buggy address: [ 31.642106] fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.642211] fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.642285] >fff00000c907e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.642354] ^ [ 31.642495] fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.642569] fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.642725] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size: Failure
Automatically assigned
[ 31.618201] ================================================================== [ 31.618590] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 31.618654] Read of size 64 at addr fff00000c9aa9f84 by task kunit_try_catch/213 [ 31.619003] [ 31.619038] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.619675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.619978] Hardware name: linux,dummy-virt (DT) [ 31.620026] Call trace: [ 31.620070] show_stack+0x20/0x38 (C) [ 31.620160] dump_stack_lvl+0x8c/0xd0 [ 31.620269] print_report+0x118/0x5e8 [ 31.620373] kasan_report+0xdc/0x128 [ 31.620424] kasan_check_range+0x100/0x1a8 [ 31.620469] __asan_memmove+0x3c/0x98 [ 31.620511] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 31.620850] kunit_try_run_case+0x170/0x3f0 [ 31.621150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.621340] kthread+0x328/0x630 [ 31.621390] ret_from_fork+0x10/0x20 [ 31.621816] [ 31.621874] Allocated by task 213: [ 31.622336] kasan_save_stack+0x3c/0x68 [ 31.622657] kasan_save_track+0x20/0x40 [ 31.622697] kasan_save_alloc_info+0x40/0x58 [ 31.622754] __kasan_kmalloc+0xd4/0xd8 [ 31.622819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.622998] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 31.623424] kunit_try_run_case+0x170/0x3f0 [ 31.623602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.623690] kthread+0x328/0x630 [ 31.623799] ret_from_fork+0x10/0x20 [ 31.623929] [ 31.624011] The buggy address belongs to the object at fff00000c9aa9f80 [ 31.624011] which belongs to the cache kmalloc-64 of size 64 [ 31.624126] The buggy address is located 4 bytes inside of [ 31.624126] allocated 64-byte region [fff00000c9aa9f80, fff00000c9aa9fc0) [ 31.624190] [ 31.624219] The buggy address belongs to the physical page: [ 31.624250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa9 [ 31.624605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.624759] page_type: f5(slab) [ 31.624819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.625165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.625293] page dumped because: kasan: bad access detected [ 31.625352] [ 31.625475] Memory state around the buggy address: [ 31.625513] fff00000c9aa9e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.625594] fff00000c9aa9f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.626199] >fff00000c9aa9f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.626287] ^ [ 31.626383] fff00000c9aaa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.626426] fff00000c9aaa080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 31.626743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size: Failure
Automatically assigned
[ 31.603338] ================================================================== [ 31.603484] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.603544] Read of size 18446744073709551614 at addr fff00000c9aa9d84 by task kunit_try_catch/211 [ 31.603675] [ 31.603741] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.604089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.604129] Hardware name: linux,dummy-virt (DT) [ 31.604289] Call trace: [ 31.604347] show_stack+0x20/0x38 (C) [ 31.604468] dump_stack_lvl+0x8c/0xd0 [ 31.604547] print_report+0x118/0x5e8 [ 31.604724] kasan_report+0xdc/0x128 [ 31.604818] kasan_check_range+0x100/0x1a8 [ 31.604963] __asan_memmove+0x3c/0x98 [ 31.605041] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.605465] kunit_try_run_case+0x170/0x3f0 [ 31.605536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.605930] kthread+0x328/0x630 [ 31.606055] ret_from_fork+0x10/0x20 [ 31.606213] [ 31.606277] Allocated by task 211: [ 31.606348] kasan_save_stack+0x3c/0x68 [ 31.606475] kasan_save_track+0x20/0x40 [ 31.606561] kasan_save_alloc_info+0x40/0x58 [ 31.606921] __kasan_kmalloc+0xd4/0xd8 [ 31.607033] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.607121] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 31.607288] kunit_try_run_case+0x170/0x3f0 [ 31.607377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.607514] kthread+0x328/0x630 [ 31.607579] ret_from_fork+0x10/0x20 [ 31.607869] [ 31.607933] The buggy address belongs to the object at fff00000c9aa9d80 [ 31.607933] which belongs to the cache kmalloc-64 of size 64 [ 31.608098] The buggy address is located 4 bytes inside of [ 31.608098] 64-byte region [fff00000c9aa9d80, fff00000c9aa9dc0) [ 31.608214] [ 31.608305] The buggy address belongs to the physical page: [ 31.608374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa9 [ 31.608533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.608610] page_type: f5(slab) [ 31.608647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.609117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.609194] page dumped because: kasan: bad access detected [ 31.609329] [ 31.609388] Memory state around the buggy address: [ 31.609501] fff00000c9aa9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.609567] fff00000c9aa9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.609615] >fff00000c9aa9d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.609728] ^ [ 31.609787] fff00000c9aa9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.609848] fff00000c9aa9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.610096] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16: Failure
Automatically assigned
[ 31.586430] ================================================================== [ 31.586679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 31.586814] Write of size 16 at addr fff00000c3efdc69 by task kunit_try_catch/209 [ 31.586879] [ 31.586938] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.587200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.587437] Hardware name: linux,dummy-virt (DT) [ 31.587483] Call trace: [ 31.587532] show_stack+0x20/0x38 (C) [ 31.587644] dump_stack_lvl+0x8c/0xd0 [ 31.587692] print_report+0x118/0x5e8 [ 31.587780] kasan_report+0xdc/0x128 [ 31.587924] kasan_check_range+0x100/0x1a8 [ 31.587969] __asan_memset+0x34/0x78 [ 31.588301] kmalloc_oob_memset_16+0x150/0x2f8 [ 31.588405] kunit_try_run_case+0x170/0x3f0 [ 31.588513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.588699] kthread+0x328/0x630 [ 31.588809] ret_from_fork+0x10/0x20 [ 31.588966] [ 31.589016] Allocated by task 209: [ 31.589045] kasan_save_stack+0x3c/0x68 [ 31.589416] kasan_save_track+0x20/0x40 [ 31.589487] kasan_save_alloc_info+0x40/0x58 [ 31.589966] __kasan_kmalloc+0xd4/0xd8 [ 31.590347] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.590476] kmalloc_oob_memset_16+0xb0/0x2f8 [ 31.590557] kunit_try_run_case+0x170/0x3f0 [ 31.590625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.590717] kthread+0x328/0x630 [ 31.590784] ret_from_fork+0x10/0x20 [ 31.590865] [ 31.591150] The buggy address belongs to the object at fff00000c3efdc00 [ 31.591150] which belongs to the cache kmalloc-128 of size 128 [ 31.591665] The buggy address is located 105 bytes inside of [ 31.591665] allocated 120-byte region [fff00000c3efdc00, fff00000c3efdc78) [ 31.591760] [ 31.591828] The buggy address belongs to the physical page: [ 31.591932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.592049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.592132] page_type: f5(slab) [ 31.592173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.592337] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.592521] page dumped because: kasan: bad access detected [ 31.592584] [ 31.592604] Memory state around the buggy address: [ 31.592935] fff00000c3efdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.593116] fff00000c3efdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.593181] >fff00000c3efdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.593296] ^ [ 31.593365] fff00000c3efdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.593485] fff00000c3efdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.593573] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8: Failure
Automatically assigned
[ 31.570801] ================================================================== [ 31.570860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 31.570911] Write of size 8 at addr fff00000c3efdb71 by task kunit_try_catch/207 [ 31.571463] [ 31.571525] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.571670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.571738] Hardware name: linux,dummy-virt (DT) [ 31.571770] Call trace: [ 31.572065] show_stack+0x20/0x38 (C) [ 31.572175] dump_stack_lvl+0x8c/0xd0 [ 31.572332] print_report+0x118/0x5e8 [ 31.572403] kasan_report+0xdc/0x128 [ 31.572445] kasan_check_range+0x100/0x1a8 [ 31.572746] __asan_memset+0x34/0x78 [ 31.572866] kmalloc_oob_memset_8+0x150/0x2f8 [ 31.572926] kunit_try_run_case+0x170/0x3f0 [ 31.573250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.573374] kthread+0x328/0x630 [ 31.573429] ret_from_fork+0x10/0x20 [ 31.573769] [ 31.573897] Allocated by task 207: [ 31.573965] kasan_save_stack+0x3c/0x68 [ 31.574089] kasan_save_track+0x20/0x40 [ 31.574146] kasan_save_alloc_info+0x40/0x58 [ 31.574229] __kasan_kmalloc+0xd4/0xd8 [ 31.574579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.574664] kmalloc_oob_memset_8+0xb0/0x2f8 [ 31.574704] kunit_try_run_case+0x170/0x3f0 [ 31.574780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.575154] kthread+0x328/0x630 [ 31.575264] ret_from_fork+0x10/0x20 [ 31.575302] [ 31.575352] The buggy address belongs to the object at fff00000c3efdb00 [ 31.575352] which belongs to the cache kmalloc-128 of size 128 [ 31.575692] The buggy address is located 113 bytes inside of [ 31.575692] allocated 120-byte region [fff00000c3efdb00, fff00000c3efdb78) [ 31.575844] [ 31.575904] The buggy address belongs to the physical page: [ 31.576003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.576171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.576236] page_type: f5(slab) [ 31.576339] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.576494] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.576583] page dumped because: kasan: bad access detected [ 31.576898] [ 31.576966] Memory state around the buggy address: [ 31.577092] fff00000c3efda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.577149] fff00000c3efda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.577196] >fff00000c3efdb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.577455] ^ [ 31.577552] fff00000c3efdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.577608] fff00000c3efdc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.577895] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4: Failure
Automatically assigned
[ 31.556622] ================================================================== [ 31.556676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.557086] Write of size 4 at addr fff00000c3efda75 by task kunit_try_catch/205 [ 31.557174] [ 31.557223] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.557369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.557397] Hardware name: linux,dummy-virt (DT) [ 31.557445] Call trace: [ 31.557484] show_stack+0x20/0x38 (C) [ 31.557586] dump_stack_lvl+0x8c/0xd0 [ 31.557653] print_report+0x118/0x5e8 [ 31.557696] kasan_report+0xdc/0x128 [ 31.558038] kasan_check_range+0x100/0x1a8 [ 31.558125] __asan_memset+0x34/0x78 [ 31.558170] kmalloc_oob_memset_4+0x150/0x300 [ 31.558227] kunit_try_run_case+0x170/0x3f0 [ 31.558272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.558331] kthread+0x328/0x630 [ 31.558386] ret_from_fork+0x10/0x20 [ 31.558433] [ 31.558451] Allocated by task 205: [ 31.558478] kasan_save_stack+0x3c/0x68 [ 31.558515] kasan_save_track+0x20/0x40 [ 31.558854] kasan_save_alloc_info+0x40/0x58 [ 31.558934] __kasan_kmalloc+0xd4/0xd8 [ 31.558970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.559157] kmalloc_oob_memset_4+0xb0/0x300 [ 31.559212] kunit_try_run_case+0x170/0x3f0 [ 31.559288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.559339] kthread+0x328/0x630 [ 31.559371] ret_from_fork+0x10/0x20 [ 31.559641] [ 31.559695] The buggy address belongs to the object at fff00000c3efda00 [ 31.559695] which belongs to the cache kmalloc-128 of size 128 [ 31.559864] The buggy address is located 117 bytes inside of [ 31.559864] allocated 120-byte region [fff00000c3efda00, fff00000c3efda78) [ 31.559973] [ 31.560056] The buggy address belongs to the physical page: [ 31.560116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.560201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.560379] page_type: f5(slab) [ 31.560555] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.560649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.560760] page dumped because: kasan: bad access detected [ 31.560840] [ 31.560895] Memory state around the buggy address: [ 31.560993] fff00000c3efd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.561071] fff00000c3efd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.561198] >fff00000c3efda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.561416] ^ [ 31.561628] fff00000c3efda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.561698] fff00000c3efdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.561835] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2: Failure
Automatically assigned
[ 31.542790] ================================================================== [ 31.542851] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 31.543132] Write of size 2 at addr fff00000c3efd977 by task kunit_try_catch/203 [ 31.543326] [ 31.543367] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.543706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.543765] Hardware name: linux,dummy-virt (DT) [ 31.543852] Call trace: [ 31.543902] show_stack+0x20/0x38 (C) [ 31.543956] dump_stack_lvl+0x8c/0xd0 [ 31.544151] print_report+0x118/0x5e8 [ 31.544281] kasan_report+0xdc/0x128 [ 31.544506] kasan_check_range+0x100/0x1a8 [ 31.544680] __asan_memset+0x34/0x78 [ 31.544846] kmalloc_oob_memset_2+0x150/0x2f8 [ 31.544987] kunit_try_run_case+0x170/0x3f0 [ 31.545126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.545194] kthread+0x328/0x630 [ 31.545465] ret_from_fork+0x10/0x20 [ 31.545637] [ 31.545681] Allocated by task 203: [ 31.545772] kasan_save_stack+0x3c/0x68 [ 31.545947] kasan_save_track+0x20/0x40 [ 31.546004] kasan_save_alloc_info+0x40/0x58 [ 31.546115] __kasan_kmalloc+0xd4/0xd8 [ 31.546417] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.546490] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.546586] kunit_try_run_case+0x170/0x3f0 [ 31.546624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.546975] kthread+0x328/0x630 [ 31.547027] ret_from_fork+0x10/0x20 [ 31.547064] [ 31.547094] The buggy address belongs to the object at fff00000c3efd900 [ 31.547094] which belongs to the cache kmalloc-128 of size 128 [ 31.547151] The buggy address is located 119 bytes inside of [ 31.547151] allocated 120-byte region [fff00000c3efd900, fff00000c3efd978) [ 31.547221] [ 31.547242] The buggy address belongs to the physical page: [ 31.547285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.547339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.547386] page_type: f5(slab) [ 31.547433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.547491] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.547529] page dumped because: kasan: bad access detected [ 31.547558] [ 31.547576] Memory state around the buggy address: [ 31.547606] fff00000c3efd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.547647] fff00000c3efd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.547699] >fff00000c3efd900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.548011] ^ [ 31.548058] fff00000c3efd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.548345] fff00000c3efda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.548419] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset: Failure
Automatically assigned
[ 31.524241] ================================================================== [ 31.524298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.524347] Write of size 128 at addr fff00000c3efd800 by task kunit_try_catch/201 [ 31.524396] [ 31.524428] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.524845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.524972] Hardware name: linux,dummy-virt (DT) [ 31.525145] Call trace: [ 31.525215] show_stack+0x20/0x38 (C) [ 31.525363] dump_stack_lvl+0x8c/0xd0 [ 31.525424] print_report+0x118/0x5e8 [ 31.525752] kasan_report+0xdc/0x128 [ 31.525896] kasan_check_range+0x100/0x1a8 [ 31.526009] __asan_memset+0x34/0x78 [ 31.526188] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.526287] kunit_try_run_case+0x170/0x3f0 [ 31.526409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.526488] kthread+0x328/0x630 [ 31.526755] ret_from_fork+0x10/0x20 [ 31.526860] [ 31.527103] Allocated by task 201: [ 31.527305] kasan_save_stack+0x3c/0x68 [ 31.527477] kasan_save_track+0x20/0x40 [ 31.527673] kasan_save_alloc_info+0x40/0x58 [ 31.527894] __kasan_kmalloc+0xd4/0xd8 [ 31.527970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.528036] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.529242] kunit_try_run_case+0x170/0x3f0 [ 31.529290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.529332] kthread+0x328/0x630 [ 31.529365] ret_from_fork+0x10/0x20 [ 31.529400] [ 31.529419] The buggy address belongs to the object at fff00000c3efd800 [ 31.529419] which belongs to the cache kmalloc-128 of size 128 [ 31.529475] The buggy address is located 0 bytes inside of [ 31.529475] allocated 120-byte region [fff00000c3efd800, fff00000c3efd878) [ 31.529533] [ 31.529552] The buggy address belongs to the physical page: [ 31.529581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.529629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.529675] page_type: f5(slab) [ 31.529712] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.529759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.529796] page dumped because: kasan: bad access detected [ 31.529825] [ 31.529844] Memory state around the buggy address: [ 31.529875] fff00000c3efd700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.529915] fff00000c3efd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.529954] >fff00000c3efd800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.529989] ^ [ 31.530032] fff00000c3efd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.530071] fff00000c3efd900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.530118] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16: Failure
Automatically assigned
[ 31.508182] ================================================================== [ 31.508373] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.508572] Read of size 16 at addr fff00000c907e0c0 by task kunit_try_catch/199 [ 31.508681] [ 31.508744] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.508998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.509175] Hardware name: linux,dummy-virt (DT) [ 31.509280] Call trace: [ 31.509303] show_stack+0x20/0x38 (C) [ 31.509409] dump_stack_lvl+0x8c/0xd0 [ 31.509678] print_report+0x118/0x5e8 [ 31.509849] kasan_report+0xdc/0x128 [ 31.510044] __asan_report_load16_noabort+0x20/0x30 [ 31.510303] kmalloc_uaf_16+0x3bc/0x438 [ 31.510363] kunit_try_run_case+0x170/0x3f0 [ 31.510587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.510789] kthread+0x328/0x630 [ 31.510997] ret_from_fork+0x10/0x20 [ 31.511266] [ 31.511414] Allocated by task 199: [ 31.511591] kasan_save_stack+0x3c/0x68 [ 31.511952] kasan_save_track+0x20/0x40 [ 31.512022] kasan_save_alloc_info+0x40/0x58 [ 31.512076] __kasan_kmalloc+0xd4/0xd8 [ 31.512220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.512260] kmalloc_uaf_16+0x140/0x438 [ 31.512312] kunit_try_run_case+0x170/0x3f0 [ 31.512347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.512586] kthread+0x328/0x630 [ 31.512825] ret_from_fork+0x10/0x20 [ 31.512926] [ 31.513017] Freed by task 199: [ 31.513061] kasan_save_stack+0x3c/0x68 [ 31.513107] kasan_save_track+0x20/0x40 [ 31.513457] kasan_save_free_info+0x4c/0x78 [ 31.513513] __kasan_slab_free+0x6c/0x98 [ 31.513844] kfree+0x214/0x3c8 [ 31.513960] kmalloc_uaf_16+0x190/0x438 [ 31.513999] kunit_try_run_case+0x170/0x3f0 [ 31.514051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.514105] kthread+0x328/0x630 [ 31.514137] ret_from_fork+0x10/0x20 [ 31.514172] [ 31.514191] The buggy address belongs to the object at fff00000c907e0c0 [ 31.514191] which belongs to the cache kmalloc-16 of size 16 [ 31.514374] The buggy address is located 0 bytes inside of [ 31.514374] freed 16-byte region [fff00000c907e0c0, fff00000c907e0d0) [ 31.514453] [ 31.514482] The buggy address belongs to the physical page: [ 31.514526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e [ 31.514591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.514646] page_type: f5(slab) [ 31.514700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.514749] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000 [ 31.514787] page dumped because: kasan: bad access detected [ 31.514816] [ 31.514833] Memory state around the buggy address: [ 31.514863] fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.514905] fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.514945] >fff00000c907e080: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 31.514981] ^ [ 31.515013] fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.515062] fff00000c907e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.515108] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16: Failure
Automatically assigned
[ 31.494013] ================================================================== [ 31.494096] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 31.494147] Write of size 16 at addr fff00000c907e060 by task kunit_try_catch/197 [ 31.494196] [ 31.494229] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.494308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.494336] Hardware name: linux,dummy-virt (DT) [ 31.494378] Call trace: [ 31.494400] show_stack+0x20/0x38 (C) [ 31.494447] dump_stack_lvl+0x8c/0xd0 [ 31.494494] print_report+0x118/0x5e8 [ 31.494536] kasan_report+0xdc/0x128 [ 31.494578] __asan_report_store16_noabort+0x20/0x30 [ 31.494626] kmalloc_oob_16+0x3a0/0x3f8 [ 31.494681] kunit_try_run_case+0x170/0x3f0 [ 31.494726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.494775] kthread+0x328/0x630 [ 31.494816] ret_from_fork+0x10/0x20 [ 31.494861] [ 31.494879] Allocated by task 197: [ 31.494906] kasan_save_stack+0x3c/0x68 [ 31.494942] kasan_save_track+0x20/0x40 [ 31.494976] kasan_save_alloc_info+0x40/0x58 [ 31.495020] __kasan_kmalloc+0xd4/0xd8 [ 31.495053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.495375] kmalloc_oob_16+0xb4/0x3f8 [ 31.495621] kunit_try_run_case+0x170/0x3f0 [ 31.495994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.496227] kthread+0x328/0x630 [ 31.496294] ret_from_fork+0x10/0x20 [ 31.496347] [ 31.496389] The buggy address belongs to the object at fff00000c907e060 [ 31.496389] which belongs to the cache kmalloc-16 of size 16 [ 31.496445] The buggy address is located 0 bytes inside of [ 31.496445] allocated 13-byte region [fff00000c907e060, fff00000c907e06d) [ 31.496505] [ 31.496524] The buggy address belongs to the physical page: [ 31.497312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e [ 31.497438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.497487] page_type: f5(slab) [ 31.497542] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.497613] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000 [ 31.498094] page dumped because: kasan: bad access detected [ 31.498220] [ 31.498425] Memory state around the buggy address: [ 31.498473] fff00000c907df00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 31.498527] fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.498763] >fff00000c907e000: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 31.498978] ^ [ 31.499161] fff00000c907e080: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.499238] fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.499309] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper: Failure
Automatically assigned
[ 31.381440] ================================================================== [ 31.381557] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.381633] Write of size 1 at addr fff00000c8f61cda by task kunit_try_catch/189 [ 31.381796] [ 31.381827] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.381933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.382133] Hardware name: linux,dummy-virt (DT) [ 31.382190] Call trace: [ 31.382220] show_stack+0x20/0x38 (C) [ 31.382384] dump_stack_lvl+0x8c/0xd0 [ 31.382439] print_report+0x118/0x5e8 [ 31.382531] kasan_report+0xdc/0x128 [ 31.382576] __asan_report_store1_noabort+0x20/0x30 [ 31.382624] krealloc_less_oob_helper+0xa80/0xc50 [ 31.382773] krealloc_less_oob+0x20/0x38 [ 31.382842] kunit_try_run_case+0x170/0x3f0 [ 31.382887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.383195] kthread+0x328/0x630 [ 31.383274] ret_from_fork+0x10/0x20 [ 31.383332] [ 31.383403] Allocated by task 189: [ 31.383450] kasan_save_stack+0x3c/0x68 [ 31.383507] kasan_save_track+0x20/0x40 [ 31.383541] kasan_save_alloc_info+0x40/0x58 [ 31.383577] __kasan_krealloc+0x118/0x178 [ 31.383697] krealloc_noprof+0x128/0x360 [ 31.383737] krealloc_less_oob_helper+0x168/0xc50 [ 31.383778] krealloc_less_oob+0x20/0x38 [ 31.383814] kunit_try_run_case+0x170/0x3f0 [ 31.384127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.384210] kthread+0x328/0x630 [ 31.384332] ret_from_fork+0x10/0x20 [ 31.384421] [ 31.384481] The buggy address belongs to the object at fff00000c8f61c00 [ 31.384481] which belongs to the cache kmalloc-256 of size 256 [ 31.384860] The buggy address is located 17 bytes to the right of [ 31.384860] allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9) [ 31.384955] [ 31.385026] The buggy address belongs to the physical page: [ 31.385122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.385185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.385300] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.385387] page_type: f5(slab) [ 31.385498] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.385548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.385631] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.385917] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.386097] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.386241] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.386329] page dumped because: kasan: bad access detected [ 31.386457] [ 31.386477] Memory state around the buggy address: [ 31.386524] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.386617] fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.386944] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.387008] ^ [ 31.387179] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.387253] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.387375] ================================================================== [ 31.433749] ================================================================== [ 31.433795] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.434120] Write of size 1 at addr fff00000c9b120d0 by task kunit_try_catch/193 [ 31.434188] [ 31.434218] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.434415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.434652] Hardware name: linux,dummy-virt (DT) [ 31.434697] Call trace: [ 31.434719] show_stack+0x20/0x38 (C) [ 31.434780] dump_stack_lvl+0x8c/0xd0 [ 31.434987] print_report+0x118/0x5e8 [ 31.435045] kasan_report+0xdc/0x128 [ 31.435311] __asan_report_store1_noabort+0x20/0x30 [ 31.435384] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.435438] krealloc_large_less_oob+0x20/0x38 [ 31.435621] kunit_try_run_case+0x170/0x3f0 [ 31.435755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.435824] kthread+0x328/0x630 [ 31.436141] ret_from_fork+0x10/0x20 [ 31.436302] [ 31.436343] The buggy address belongs to the physical page: [ 31.436464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.436518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.436563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.436613] page_type: f8(unknown) [ 31.436852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.437091] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.437200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.437314] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.437362] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.437571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.437751] page dumped because: kasan: bad access detected [ 31.437841] [ 31.437905] Memory state around the buggy address: [ 31.437957] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.438323] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.438418] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.438475] ^ [ 31.438533] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.438660] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.438718] ================================================================== [ 31.363450] ================================================================== [ 31.363648] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.363839] Write of size 1 at addr fff00000c8f61cc9 by task kunit_try_catch/189 [ 31.364069] [ 31.364123] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.364456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.364495] Hardware name: linux,dummy-virt (DT) [ 31.364526] Call trace: [ 31.364548] show_stack+0x20/0x38 (C) [ 31.364610] dump_stack_lvl+0x8c/0xd0 [ 31.364788] print_report+0x118/0x5e8 [ 31.364877] kasan_report+0xdc/0x128 [ 31.365002] __asan_report_store1_noabort+0x20/0x30 [ 31.365377] krealloc_less_oob_helper+0xa48/0xc50 [ 31.365466] krealloc_less_oob+0x20/0x38 [ 31.365597] kunit_try_run_case+0x170/0x3f0 [ 31.365672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.365974] kthread+0x328/0x630 [ 31.366062] ret_from_fork+0x10/0x20 [ 31.366208] [ 31.366267] Allocated by task 189: [ 31.366548] kasan_save_stack+0x3c/0x68 [ 31.366650] kasan_save_track+0x20/0x40 [ 31.366703] kasan_save_alloc_info+0x40/0x58 [ 31.366804] __kasan_krealloc+0x118/0x178 [ 31.366873] krealloc_noprof+0x128/0x360 [ 31.366910] krealloc_less_oob_helper+0x168/0xc50 [ 31.367350] krealloc_less_oob+0x20/0x38 [ 31.367438] kunit_try_run_case+0x170/0x3f0 [ 31.367823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.367906] kthread+0x328/0x630 [ 31.368014] ret_from_fork+0x10/0x20 [ 31.368110] [ 31.368145] The buggy address belongs to the object at fff00000c8f61c00 [ 31.368145] which belongs to the cache kmalloc-256 of size 256 [ 31.368377] The buggy address is located 0 bytes to the right of [ 31.368377] allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9) [ 31.368538] [ 31.368624] The buggy address belongs to the physical page: [ 31.368671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.368771] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.369076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.369173] page_type: f5(slab) [ 31.369255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.369374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.369699] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.369783] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.369911] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.369999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.370161] page dumped because: kasan: bad access detected [ 31.370250] [ 31.370269] Memory state around the buggy address: [ 31.370300] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.370631] fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.370689] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.370988] ^ [ 31.371061] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.371115] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.371261] ================================================================== [ 31.372764] ================================================================== [ 31.372933] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.372986] Write of size 1 at addr fff00000c8f61cd0 by task kunit_try_catch/189 [ 31.373092] [ 31.373139] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.373221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.373246] Hardware name: linux,dummy-virt (DT) [ 31.373276] Call trace: [ 31.373595] show_stack+0x20/0x38 (C) [ 31.373660] dump_stack_lvl+0x8c/0xd0 [ 31.373745] print_report+0x118/0x5e8 [ 31.373809] kasan_report+0xdc/0x128 [ 31.373879] __asan_report_store1_noabort+0x20/0x30 [ 31.373945] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.374051] krealloc_less_oob+0x20/0x38 [ 31.374106] kunit_try_run_case+0x170/0x3f0 [ 31.374194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.374248] kthread+0x328/0x630 [ 31.374574] ret_from_fork+0x10/0x20 [ 31.374734] [ 31.374774] Allocated by task 189: [ 31.374821] kasan_save_stack+0x3c/0x68 [ 31.374878] kasan_save_track+0x20/0x40 [ 31.374981] kasan_save_alloc_info+0x40/0x58 [ 31.375038] __kasan_krealloc+0x118/0x178 [ 31.375088] krealloc_noprof+0x128/0x360 [ 31.375365] krealloc_less_oob_helper+0x168/0xc50 [ 31.375444] krealloc_less_oob+0x20/0x38 [ 31.375493] kunit_try_run_case+0x170/0x3f0 [ 31.375661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.375720] kthread+0x328/0x630 [ 31.375752] ret_from_fork+0x10/0x20 [ 31.375905] [ 31.375925] The buggy address belongs to the object at fff00000c8f61c00 [ 31.375925] which belongs to the cache kmalloc-256 of size 256 [ 31.375981] The buggy address is located 7 bytes to the right of [ 31.375981] allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9) [ 31.376042] [ 31.376061] The buggy address belongs to the physical page: [ 31.376494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.376612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.376757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.376851] page_type: f5(slab) [ 31.376937] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.377025] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.377157] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.377247] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.377341] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.377685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.377792] page dumped because: kasan: bad access detected [ 31.377873] [ 31.377943] Memory state around the buggy address: [ 31.378053] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.378124] fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.378166] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.378212] ^ [ 31.378247] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.378302] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.378361] ================================================================== [ 31.439254] ================================================================== [ 31.439298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.439345] Write of size 1 at addr fff00000c9b120da by task kunit_try_catch/193 [ 31.439523] [ 31.439679] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.439826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.440145] Hardware name: linux,dummy-virt (DT) [ 31.440212] Call trace: [ 31.440233] show_stack+0x20/0x38 (C) [ 31.440339] dump_stack_lvl+0x8c/0xd0 [ 31.440697] print_report+0x118/0x5e8 [ 31.440989] kasan_report+0xdc/0x128 [ 31.441116] __asan_report_store1_noabort+0x20/0x30 [ 31.441241] krealloc_less_oob_helper+0xa80/0xc50 [ 31.441313] krealloc_large_less_oob+0x20/0x38 [ 31.441587] kunit_try_run_case+0x170/0x3f0 [ 31.441751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.441847] kthread+0x328/0x630 [ 31.442196] ret_from_fork+0x10/0x20 [ 31.442308] [ 31.442336] The buggy address belongs to the physical page: [ 31.442383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.442434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.442481] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.442532] page_type: f8(unknown) [ 31.442602] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.442663] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.442722] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.442778] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.442826] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.442891] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.442930] page dumped because: kasan: bad access detected [ 31.442968] [ 31.442986] Memory state around the buggy address: [ 31.443022] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.443063] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.443572] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.443678] ^ [ 31.443766] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.443816] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.443852] ================================================================== [ 31.428614] ================================================================== [ 31.428667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.429134] Write of size 1 at addr fff00000c9b120c9 by task kunit_try_catch/193 [ 31.429203] [ 31.429237] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.429543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.429597] Hardware name: linux,dummy-virt (DT) [ 31.429639] Call trace: [ 31.429664] show_stack+0x20/0x38 (C) [ 31.429784] dump_stack_lvl+0x8c/0xd0 [ 31.429862] print_report+0x118/0x5e8 [ 31.429906] kasan_report+0xdc/0x128 [ 31.429977] __asan_report_store1_noabort+0x20/0x30 [ 31.430050] krealloc_less_oob_helper+0xa48/0xc50 [ 31.430149] krealloc_large_less_oob+0x20/0x38 [ 31.430199] kunit_try_run_case+0x170/0x3f0 [ 31.430243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.430309] kthread+0x328/0x630 [ 31.430580] ret_from_fork+0x10/0x20 [ 31.430794] [ 31.430822] The buggy address belongs to the physical page: [ 31.430875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.430927] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.430972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.431095] page_type: f8(unknown) [ 31.431163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.431255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.431323] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.431388] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.431492] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.431559] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.431606] page dumped because: kasan: bad access detected [ 31.431676] [ 31.431704] Memory state around the buggy address: [ 31.431754] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.431824] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.431872] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.432197] ^ [ 31.432373] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.432448] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.432563] ================================================================== [ 31.445117] ================================================================== [ 31.445211] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.445287] Write of size 1 at addr fff00000c9b120ea by task kunit_try_catch/193 [ 31.445346] [ 31.445382] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.445759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.445802] Hardware name: linux,dummy-virt (DT) [ 31.445976] Call trace: [ 31.446010] show_stack+0x20/0x38 (C) [ 31.446382] dump_stack_lvl+0x8c/0xd0 [ 31.446578] print_report+0x118/0x5e8 [ 31.446801] kasan_report+0xdc/0x128 [ 31.447052] __asan_report_store1_noabort+0x20/0x30 [ 31.447131] krealloc_less_oob_helper+0xae4/0xc50 [ 31.447227] krealloc_large_less_oob+0x20/0x38 [ 31.447313] kunit_try_run_case+0x170/0x3f0 [ 31.447544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.447619] kthread+0x328/0x630 [ 31.447726] ret_from_fork+0x10/0x20 [ 31.447933] [ 31.448008] The buggy address belongs to the physical page: [ 31.448103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.448158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.448204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.448655] page_type: f8(unknown) [ 31.448769] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.448855] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.448988] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.449241] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.449305] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.449644] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.449717] page dumped because: kasan: bad access detected [ 31.449814] [ 31.449874] Memory state around the buggy address: [ 31.449907] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.449962] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.450290] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.450342] ^ [ 31.450503] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.450566] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.450603] ================================================================== [ 31.451340] ================================================================== [ 31.451441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.451524] Write of size 1 at addr fff00000c9b120eb by task kunit_try_catch/193 [ 31.451576] [ 31.451621] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.451879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.451931] Hardware name: linux,dummy-virt (DT) [ 31.452073] Call trace: [ 31.452131] show_stack+0x20/0x38 (C) [ 31.452310] dump_stack_lvl+0x8c/0xd0 [ 31.452528] print_report+0x118/0x5e8 [ 31.452757] kasan_report+0xdc/0x128 [ 31.452828] __asan_report_store1_noabort+0x20/0x30 [ 31.452987] krealloc_less_oob_helper+0xa58/0xc50 [ 31.453043] krealloc_large_less_oob+0x20/0x38 [ 31.453267] kunit_try_run_case+0x170/0x3f0 [ 31.453490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.453585] kthread+0x328/0x630 [ 31.453726] ret_from_fork+0x10/0x20 [ 31.453836] [ 31.453995] The buggy address belongs to the physical page: [ 31.454063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.454454] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.454630] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.454747] page_type: f8(unknown) [ 31.454826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.454938] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.455041] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.455099] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.455459] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.455539] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.455581] page dumped because: kasan: bad access detected [ 31.455612] [ 31.455631] Memory state around the buggy address: [ 31.455672] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.455714] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.456119] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.456288] ^ [ 31.456373] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.456580] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.456661] ================================================================== [ 31.389248] ================================================================== [ 31.389295] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.389583] Write of size 1 at addr fff00000c8f61cea by task kunit_try_catch/189 [ 31.390123] [ 31.390166] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.390249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.390275] Hardware name: linux,dummy-virt (DT) [ 31.390559] Call trace: [ 31.390618] show_stack+0x20/0x38 (C) [ 31.390670] dump_stack_lvl+0x8c/0xd0 [ 31.390716] print_report+0x118/0x5e8 [ 31.390759] kasan_report+0xdc/0x128 [ 31.391095] __asan_report_store1_noabort+0x20/0x30 [ 31.391185] krealloc_less_oob_helper+0xae4/0xc50 [ 31.391464] krealloc_less_oob+0x20/0x38 [ 31.391702] kunit_try_run_case+0x170/0x3f0 [ 31.391963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.392048] kthread+0x328/0x630 [ 31.392225] ret_from_fork+0x10/0x20 [ 31.392381] [ 31.392451] Allocated by task 189: [ 31.392609] kasan_save_stack+0x3c/0x68 [ 31.392676] kasan_save_track+0x20/0x40 [ 31.392786] kasan_save_alloc_info+0x40/0x58 [ 31.392872] __kasan_krealloc+0x118/0x178 [ 31.393005] krealloc_noprof+0x128/0x360 [ 31.393206] krealloc_less_oob_helper+0x168/0xc50 [ 31.393262] krealloc_less_oob+0x20/0x38 [ 31.393429] kunit_try_run_case+0x170/0x3f0 [ 31.393511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.393633] kthread+0x328/0x630 [ 31.393747] ret_from_fork+0x10/0x20 [ 31.393823] [ 31.393842] The buggy address belongs to the object at fff00000c8f61c00 [ 31.393842] which belongs to the cache kmalloc-256 of size 256 [ 31.394113] The buggy address is located 33 bytes to the right of [ 31.394113] allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9) [ 31.394355] [ 31.394423] The buggy address belongs to the physical page: [ 31.394725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.394813] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.394876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.395226] page_type: f5(slab) [ 31.395338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.395401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.395450] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.395496] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.395558] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.395613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.395652] page dumped because: kasan: bad access detected [ 31.395681] [ 31.395698] Memory state around the buggy address: [ 31.395963] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.396161] fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.396250] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.396318] ^ [ 31.396371] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.396415] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.396636] ================================================================== [ 31.397571] ================================================================== [ 31.397756] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.397810] Write of size 1 at addr fff00000c8f61ceb by task kunit_try_catch/189 [ 31.397983] [ 31.398032] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.398159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.398186] Hardware name: linux,dummy-virt (DT) [ 31.398232] Call trace: [ 31.398254] show_stack+0x20/0x38 (C) [ 31.398551] dump_stack_lvl+0x8c/0xd0 [ 31.398654] print_report+0x118/0x5e8 [ 31.398745] kasan_report+0xdc/0x128 [ 31.398828] __asan_report_store1_noabort+0x20/0x30 [ 31.398886] krealloc_less_oob_helper+0xa58/0xc50 [ 31.399072] krealloc_less_oob+0x20/0x38 [ 31.399224] kunit_try_run_case+0x170/0x3f0 [ 31.399279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.399329] kthread+0x328/0x630 [ 31.399369] ret_from_fork+0x10/0x20 [ 31.399453] [ 31.399473] Allocated by task 189: [ 31.399500] kasan_save_stack+0x3c/0x68 [ 31.399538] kasan_save_track+0x20/0x40 [ 31.399572] kasan_save_alloc_info+0x40/0x58 [ 31.399607] __kasan_krealloc+0x118/0x178 [ 31.399641] krealloc_noprof+0x128/0x360 [ 31.399678] krealloc_less_oob_helper+0x168/0xc50 [ 31.400128] krealloc_less_oob+0x20/0x38 [ 31.400196] kunit_try_run_case+0x170/0x3f0 [ 31.400238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.400538] kthread+0x328/0x630 [ 31.400864] ret_from_fork+0x10/0x20 [ 31.400940] [ 31.400977] The buggy address belongs to the object at fff00000c8f61c00 [ 31.400977] which belongs to the cache kmalloc-256 of size 256 [ 31.401033] The buggy address is located 34 bytes to the right of [ 31.401033] allocated 201-byte region [fff00000c8f61c00, fff00000c8f61cc9) [ 31.401399] [ 31.401516] The buggy address belongs to the physical page: [ 31.401585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.402108] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.402209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.402492] page_type: f5(slab) [ 31.402694] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.402792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.402879] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.403106] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.403254] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.403385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.403430] page dumped because: kasan: bad access detected [ 31.403628] [ 31.403780] Memory state around the buggy address: [ 31.403897] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.403971] fff00000c8f61c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.404103] >fff00000c8f61c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.404142] ^ [ 31.404194] fff00000c8f61d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.404237] fff00000c8f61d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.404275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper: Failure
Automatically assigned
[ 31.345100] ================================================================== [ 31.345157] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 31.345211] Write of size 1 at addr fff00000c8f61aeb by task kunit_try_catch/187 [ 31.345258] [ 31.345289] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.345369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.345394] Hardware name: linux,dummy-virt (DT) [ 31.345424] Call trace: [ 31.345445] show_stack+0x20/0x38 (C) [ 31.345491] dump_stack_lvl+0x8c/0xd0 [ 31.345537] print_report+0x118/0x5e8 [ 31.345579] kasan_report+0xdc/0x128 [ 31.345620] __asan_report_store1_noabort+0x20/0x30 [ 31.345667] krealloc_more_oob_helper+0x60c/0x678 [ 31.345715] krealloc_more_oob+0x20/0x38 [ 31.345759] kunit_try_run_case+0x170/0x3f0 [ 31.345803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.345852] kthread+0x328/0x630 [ 31.345892] ret_from_fork+0x10/0x20 [ 31.345937] [ 31.345955] Allocated by task 187: [ 31.345982] kasan_save_stack+0x3c/0x68 [ 31.346017] kasan_save_track+0x20/0x40 [ 31.346056] kasan_save_alloc_info+0x40/0x58 [ 31.346101] __kasan_krealloc+0x118/0x178 [ 31.346376] krealloc_noprof+0x128/0x360 [ 31.346424] krealloc_more_oob_helper+0x168/0x678 [ 31.346466] krealloc_more_oob+0x20/0x38 [ 31.346550] kunit_try_run_case+0x170/0x3f0 [ 31.346585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.346625] kthread+0x328/0x630 [ 31.346656] ret_from_fork+0x10/0x20 [ 31.346692] [ 31.346710] The buggy address belongs to the object at fff00000c8f61a00 [ 31.346710] which belongs to the cache kmalloc-256 of size 256 [ 31.346779] The buggy address is located 0 bytes to the right of [ 31.346779] allocated 235-byte region [fff00000c8f61a00, fff00000c8f61aeb) [ 31.346841] [ 31.346860] The buggy address belongs to the physical page: [ 31.346892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.346942] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.346994] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.347043] page_type: f5(slab) [ 31.347089] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.347146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.347193] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.347239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.347286] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.347340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.347379] page dumped because: kasan: bad access detected [ 31.347407] [ 31.347432] Memory state around the buggy address: [ 31.347462] fff00000c8f61980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.347504] fff00000c8f61a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.347554] >fff00000c8f61a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 31.347590] ^ [ 31.347628] fff00000c8f61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.347669] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.347704] ================================================================== [ 31.412486] ================================================================== [ 31.412554] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 31.412636] Write of size 1 at addr fff00000c9b120eb by task kunit_try_catch/191 [ 31.412877] [ 31.412927] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.413189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.413244] Hardware name: linux,dummy-virt (DT) [ 31.413303] Call trace: [ 31.413332] show_stack+0x20/0x38 (C) [ 31.413385] dump_stack_lvl+0x8c/0xd0 [ 31.413607] print_report+0x118/0x5e8 [ 31.413806] kasan_report+0xdc/0x128 [ 31.413922] __asan_report_store1_noabort+0x20/0x30 [ 31.413971] krealloc_more_oob_helper+0x60c/0x678 [ 31.414180] krealloc_large_more_oob+0x20/0x38 [ 31.414249] kunit_try_run_case+0x170/0x3f0 [ 31.414454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.414529] kthread+0x328/0x630 [ 31.414572] ret_from_fork+0x10/0x20 [ 31.414619] [ 31.414668] The buggy address belongs to the physical page: [ 31.414798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.414853] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.414899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.415108] page_type: f8(unknown) [ 31.415188] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.415339] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.415532] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.415608] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.415739] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.415805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.415888] page dumped because: kasan: bad access detected [ 31.416055] [ 31.416089] Memory state around the buggy address: [ 31.416278] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.416336] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.416453] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.416545] ^ [ 31.416719] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.416793] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.416910] ================================================================== [ 31.349143] ================================================================== [ 31.349212] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 31.349277] Write of size 1 at addr fff00000c8f61af0 by task kunit_try_catch/187 [ 31.349397] [ 31.349445] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.349532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.349607] Hardware name: linux,dummy-virt (DT) [ 31.349645] Call trace: [ 31.349666] show_stack+0x20/0x38 (C) [ 31.349713] dump_stack_lvl+0x8c/0xd0 [ 31.349916] print_report+0x118/0x5e8 [ 31.350063] kasan_report+0xdc/0x128 [ 31.350202] __asan_report_store1_noabort+0x20/0x30 [ 31.350277] krealloc_more_oob_helper+0x5c0/0x678 [ 31.350354] krealloc_more_oob+0x20/0x38 [ 31.350446] kunit_try_run_case+0x170/0x3f0 [ 31.350512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.350563] kthread+0x328/0x630 [ 31.350664] ret_from_fork+0x10/0x20 [ 31.350711] [ 31.350730] Allocated by task 187: [ 31.350773] kasan_save_stack+0x3c/0x68 [ 31.350818] kasan_save_track+0x20/0x40 [ 31.351057] kasan_save_alloc_info+0x40/0x58 [ 31.351208] __kasan_krealloc+0x118/0x178 [ 31.351266] krealloc_noprof+0x128/0x360 [ 31.351323] krealloc_more_oob_helper+0x168/0x678 [ 31.351382] krealloc_more_oob+0x20/0x38 [ 31.351463] kunit_try_run_case+0x170/0x3f0 [ 31.351501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.351557] kthread+0x328/0x630 [ 31.351606] ret_from_fork+0x10/0x20 [ 31.351693] [ 31.351711] The buggy address belongs to the object at fff00000c8f61a00 [ 31.351711] which belongs to the cache kmalloc-256 of size 256 [ 31.351797] The buggy address is located 5 bytes to the right of [ 31.351797] allocated 235-byte region [fff00000c8f61a00, fff00000c8f61aeb) [ 31.352616] [ 31.352654] The buggy address belongs to the physical page: [ 31.352686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f60 [ 31.352738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.353064] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.353144] page_type: f5(slab) [ 31.353206] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.353365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.353452] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.353566] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.353641] head: 0bfffe0000000001 ffffc1ffc323d801 00000000ffffffff 00000000ffffffff [ 31.353973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.354036] page dumped because: kasan: bad access detected [ 31.354121] [ 31.354182] Memory state around the buggy address: [ 31.354251] fff00000c8f61980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.354305] fff00000c8f61a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.354633] >fff00000c8f61a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 31.354675] ^ [ 31.355062] fff00000c8f61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.355130] fff00000c8f61b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.355251] ================================================================== [ 31.417815] ================================================================== [ 31.417891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 31.417957] Write of size 1 at addr fff00000c9b120f0 by task kunit_try_catch/191 [ 31.418093] [ 31.418127] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.418215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.418241] Hardware name: linux,dummy-virt (DT) [ 31.418270] Call trace: [ 31.418546] show_stack+0x20/0x38 (C) [ 31.418624] dump_stack_lvl+0x8c/0xd0 [ 31.418671] print_report+0x118/0x5e8 [ 31.418715] kasan_report+0xdc/0x128 [ 31.418852] __asan_report_store1_noabort+0x20/0x30 [ 31.418930] krealloc_more_oob_helper+0x5c0/0x678 [ 31.418996] krealloc_large_more_oob+0x20/0x38 [ 31.419103] kunit_try_run_case+0x170/0x3f0 [ 31.419147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.419211] kthread+0x328/0x630 [ 31.419505] ret_from_fork+0x10/0x20 [ 31.419586] [ 31.419618] The buggy address belongs to the physical page: [ 31.419726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 31.419818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.420001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.420139] page_type: f8(unknown) [ 31.420180] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.420427] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.420616] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.420691] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.420758] head: 0bfffe0000000002 ffffc1ffc326c401 00000000ffffffff 00000000ffffffff [ 31.420902] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.421005] page dumped because: kasan: bad access detected [ 31.421037] [ 31.421054] Memory state around the buggy address: [ 31.421389] fff00000c9b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.421716] fff00000c9b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.421853] >fff00000c9b12080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.421935] ^ [ 31.421994] fff00000c9b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.422265] fff00000c9b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.422512] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf: Failure
Automatically assigned
[ 31.332612] ================================================================== [ 31.332713] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 31.332764] Read of size 1 at addr fff00000c9b00000 by task kunit_try_catch/185 [ 31.332813] [ 31.332851] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.332932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.332957] Hardware name: linux,dummy-virt (DT) [ 31.333172] Call trace: [ 31.333311] show_stack+0x20/0x38 (C) [ 31.333368] dump_stack_lvl+0x8c/0xd0 [ 31.333436] print_report+0x118/0x5e8 [ 31.333495] kasan_report+0xdc/0x128 [ 31.333538] __asan_report_load1_noabort+0x20/0x30 [ 31.333754] page_alloc_uaf+0x328/0x350 [ 31.333966] kunit_try_run_case+0x170/0x3f0 [ 31.334023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.334090] kthread+0x328/0x630 [ 31.334220] ret_from_fork+0x10/0x20 [ 31.334287] [ 31.334315] The buggy address belongs to the physical page: [ 31.334407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00 [ 31.334492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.334558] page_type: f0(buddy) [ 31.334612] raw: 0bfffe0000000000 fff00000ff616280 fff00000ff616280 0000000000000000 [ 31.334947] raw: 0000000000000000 0000000000000008 00000000f0000000 0000000000000000 [ 31.334992] page dumped because: kasan: bad access detected [ 31.335040] [ 31.335058] Memory state around the buggy address: [ 31.335102] fff00000c9afff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.335206] fff00000c9afff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.335251] >fff00000c9b00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.335287] ^ [ 31.335314] fff00000c9b00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.335360] fff00000c9b00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.335396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree: Failure
Automatically assigned
[ 31.315069] ================================================================== [ 31.315259] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 31.315357] Free of addr fff00000c3fe8001 by task kunit_try_catch/181 [ 31.315692] [ 31.315737] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.315847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.315891] Hardware name: linux,dummy-virt (DT) [ 31.315956] Call trace: [ 31.316000] show_stack+0x20/0x38 (C) [ 31.316052] dump_stack_lvl+0x8c/0xd0 [ 31.316218] print_report+0x118/0x5e8 [ 31.316428] kasan_report_invalid_free+0xc0/0xe8 [ 31.316517] __kasan_kfree_large+0x5c/0xa8 [ 31.316677] free_large_kmalloc+0x68/0x150 [ 31.316775] kfree+0x270/0x3c8 [ 31.316912] kmalloc_large_invalid_free+0x108/0x270 [ 31.317060] kunit_try_run_case+0x170/0x3f0 [ 31.317174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.317275] kthread+0x328/0x630 [ 31.317318] ret_from_fork+0x10/0x20 [ 31.317529] [ 31.317557] The buggy address belongs to the physical page: [ 31.317588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fe8 [ 31.317653] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.317724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.318000] page_type: f8(unknown) [ 31.318146] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.318280] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.318393] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.318480] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.318580] head: 0bfffe0000000002 ffffc1ffc30ffa01 00000000ffffffff 00000000ffffffff [ 31.318633] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.318682] page dumped because: kasan: bad access detected [ 31.318721] [ 31.318746] Memory state around the buggy address: [ 31.318783] fff00000c3fe7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.318830] fff00000c3fe7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.318871] >fff00000c3fe8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.318916] ^ [ 31.318953] fff00000c3fe8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.319003] fff00000c3fe8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.319266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf: Failure
Automatically assigned
[ 31.305176] ================================================================== [ 31.305243] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 31.305521] Read of size 1 at addr fff00000c3fe8000 by task kunit_try_catch/179 [ 31.305592] [ 31.305664] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.305777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.305803] Hardware name: linux,dummy-virt (DT) [ 31.305839] Call trace: [ 31.305904] show_stack+0x20/0x38 (C) [ 31.305956] dump_stack_lvl+0x8c/0xd0 [ 31.306008] print_report+0x118/0x5e8 [ 31.306071] kasan_report+0xdc/0x128 [ 31.306353] __asan_report_load1_noabort+0x20/0x30 [ 31.306424] kmalloc_large_uaf+0x2cc/0x2f8 [ 31.306470] kunit_try_run_case+0x170/0x3f0 [ 31.306514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.306606] kthread+0x328/0x630 [ 31.306675] ret_from_fork+0x10/0x20 [ 31.306721] [ 31.306803] The buggy address belongs to the physical page: [ 31.306852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fe8 [ 31.306908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.306973] raw: 0bfffe0000000000 fff00000da451d00 fff00000da451d00 0000000000000000 [ 31.307276] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 31.307346] page dumped because: kasan: bad access detected [ 31.307386] [ 31.307404] Memory state around the buggy address: [ 31.307498] fff00000c3fe7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.307545] fff00000c3fe7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.307623] >fff00000c3fe8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.307667] ^ [ 31.307695] fff00000c3fe8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.307847] fff00000c3fe8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.307934] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right: Failure
Automatically assigned
[ 31.294988] ================================================================== [ 31.295293] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 31.295452] Write of size 1 at addr fff00000c3fe600a by task kunit_try_catch/177 [ 31.295504] [ 31.295560] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.295825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.295857] Hardware name: linux,dummy-virt (DT) [ 31.295887] Call trace: [ 31.295910] show_stack+0x20/0x38 (C) [ 31.296063] dump_stack_lvl+0x8c/0xd0 [ 31.296121] print_report+0x118/0x5e8 [ 31.296197] kasan_report+0xdc/0x128 [ 31.296286] __asan_report_store1_noabort+0x20/0x30 [ 31.296417] kmalloc_large_oob_right+0x278/0x2b8 [ 31.296495] kunit_try_run_case+0x170/0x3f0 [ 31.296650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.296748] kthread+0x328/0x630 [ 31.296880] ret_from_fork+0x10/0x20 [ 31.296992] [ 31.297298] The buggy address belongs to the physical page: [ 31.297347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fe4 [ 31.297464] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.297558] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.297713] page_type: f8(unknown) [ 31.297766] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.298061] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.298145] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.298241] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.298328] head: 0bfffe0000000002 ffffc1ffc30ff901 00000000ffffffff 00000000ffffffff [ 31.298402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.298513] page dumped because: kasan: bad access detected [ 31.298563] [ 31.298612] Memory state around the buggy address: [ 31.298944] fff00000c3fe5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.299001] fff00000c3fe5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.299108] >fff00000c3fe6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.299179] ^ [ 31.299316] fff00000c3fe6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.299388] fff00000c3fe6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.299456] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right: Failure
Automatically assigned
[ 31.283578] ================================================================== [ 31.283648] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 31.283710] Write of size 1 at addr fff00000c65ddf00 by task kunit_try_catch/175 [ 31.283868] [ 31.283900] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.284127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.284159] Hardware name: linux,dummy-virt (DT) [ 31.284341] Call trace: [ 31.284385] show_stack+0x20/0x38 (C) [ 31.284478] dump_stack_lvl+0x8c/0xd0 [ 31.284571] print_report+0x118/0x5e8 [ 31.284707] kasan_report+0xdc/0x128 [ 31.284771] __asan_report_store1_noabort+0x20/0x30 [ 31.285040] kmalloc_big_oob_right+0x2a4/0x2f0 [ 31.285128] kunit_try_run_case+0x170/0x3f0 [ 31.285213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.285333] kthread+0x328/0x630 [ 31.285470] ret_from_fork+0x10/0x20 [ 31.285544] [ 31.285562] Allocated by task 175: [ 31.285840] kasan_save_stack+0x3c/0x68 [ 31.285914] kasan_save_track+0x20/0x40 [ 31.285993] kasan_save_alloc_info+0x40/0x58 [ 31.286110] __kasan_kmalloc+0xd4/0xd8 [ 31.286165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.286233] kmalloc_big_oob_right+0xb8/0x2f0 [ 31.286274] kunit_try_run_case+0x170/0x3f0 [ 31.286311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.286354] kthread+0x328/0x630 [ 31.286396] ret_from_fork+0x10/0x20 [ 31.286439] [ 31.286459] The buggy address belongs to the object at fff00000c65dc000 [ 31.286459] which belongs to the cache kmalloc-8k of size 8192 [ 31.286514] The buggy address is located 0 bytes to the right of [ 31.286514] allocated 7936-byte region [fff00000c65dc000, fff00000c65ddf00) [ 31.286574] [ 31.286605] The buggy address belongs to the physical page: [ 31.286638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d8 [ 31.286690] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.286743] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.286794] page_type: f5(slab) [ 31.286840] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 31.286887] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 31.286950] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 31.286998] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 31.287045] head: 0bfffe0000000003 ffffc1ffc3197601 00000000ffffffff 00000000ffffffff [ 31.287101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 31.287139] page dumped because: kasan: bad access detected [ 31.287177] [ 31.287195] Memory state around the buggy address: [ 31.287233] fff00000c65dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.287276] fff00000c65dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.287324] >fff00000c65ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.287360] ^ [ 31.287395] fff00000c65ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.287443] fff00000c65de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.287478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right: Failure
Automatically assigned
[ 31.268227] ================================================================== [ 31.268281] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 31.268331] Write of size 1 at addr fff00000c3efd678 by task kunit_try_catch/173 [ 31.268379] [ 31.268407] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.268485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.268510] Hardware name: linux,dummy-virt (DT) [ 31.268540] Call trace: [ 31.268560] show_stack+0x20/0x38 (C) [ 31.268607] dump_stack_lvl+0x8c/0xd0 [ 31.268663] print_report+0x118/0x5e8 [ 31.268706] kasan_report+0xdc/0x128 [ 31.268747] __asan_report_store1_noabort+0x20/0x30 [ 31.268795] kmalloc_track_caller_oob_right+0x40c/0x488 [ 31.268866] kunit_try_run_case+0x170/0x3f0 [ 31.268920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.268970] kthread+0x328/0x630 [ 31.269010] ret_from_fork+0x10/0x20 [ 31.269062] [ 31.269091] Allocated by task 173: [ 31.269117] kasan_save_stack+0x3c/0x68 [ 31.269153] kasan_save_track+0x20/0x40 [ 31.269186] kasan_save_alloc_info+0x40/0x58 [ 31.269221] __kasan_kmalloc+0xd4/0xd8 [ 31.269253] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 31.269296] kmalloc_track_caller_oob_right+0xa8/0x488 [ 31.269336] kunit_try_run_case+0x170/0x3f0 [ 31.269370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.269410] kthread+0x328/0x630 [ 31.269454] ret_from_fork+0x10/0x20 [ 31.269487] [ 31.269505] The buggy address belongs to the object at fff00000c3efd600 [ 31.269505] which belongs to the cache kmalloc-128 of size 128 [ 31.269558] The buggy address is located 0 bytes to the right of [ 31.269558] allocated 120-byte region [fff00000c3efd600, fff00000c3efd678) [ 31.269618] [ 31.269636] The buggy address belongs to the physical page: [ 31.269665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.269713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.269760] page_type: f5(slab) [ 31.269796] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.269880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.269970] page dumped because: kasan: bad access detected [ 31.270103] [ 31.270165] Memory state around the buggy address: [ 31.270282] fff00000c3efd500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.270351] fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.270390] >fff00000c3efd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.270478] ^ [ 31.270535] fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.270658] fff00000c3efd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.270712] ================================================================== [ 31.272142] ================================================================== [ 31.272208] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 31.272274] Write of size 1 at addr fff00000c3efd778 by task kunit_try_catch/173 [ 31.272337] [ 31.272365] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.272448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.272474] Hardware name: linux,dummy-virt (DT) [ 31.272502] Call trace: [ 31.272522] show_stack+0x20/0x38 (C) [ 31.272567] dump_stack_lvl+0x8c/0xd0 [ 31.272612] print_report+0x118/0x5e8 [ 31.272657] kasan_report+0xdc/0x128 [ 31.272716] __asan_report_store1_noabort+0x20/0x30 [ 31.272987] kmalloc_track_caller_oob_right+0x418/0x488 [ 31.273053] kunit_try_run_case+0x170/0x3f0 [ 31.273124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.273202] kthread+0x328/0x630 [ 31.273249] ret_from_fork+0x10/0x20 [ 31.273314] [ 31.273352] Allocated by task 173: [ 31.273624] kasan_save_stack+0x3c/0x68 [ 31.273670] kasan_save_track+0x20/0x40 [ 31.273704] kasan_save_alloc_info+0x40/0x58 [ 31.273749] __kasan_kmalloc+0xd4/0xd8 [ 31.273982] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 31.274032] kmalloc_track_caller_oob_right+0x184/0x488 [ 31.274096] kunit_try_run_case+0x170/0x3f0 [ 31.274311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.274352] kthread+0x328/0x630 [ 31.274769] ret_from_fork+0x10/0x20 [ 31.274826] [ 31.274898] The buggy address belongs to the object at fff00000c3efd700 [ 31.274898] which belongs to the cache kmalloc-128 of size 128 [ 31.274952] The buggy address is located 0 bytes to the right of [ 31.274952] allocated 120-byte region [fff00000c3efd700, fff00000c3efd778) [ 31.275072] [ 31.275105] The buggy address belongs to the physical page: [ 31.275143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.275209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.275273] page_type: f5(slab) [ 31.275343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.275400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.275465] page dumped because: kasan: bad access detected [ 31.275494] [ 31.275511] Memory state around the buggy address: [ 31.275540] fff00000c3efd600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.275797] fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.275914] >fff00000c3efd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.276024] ^ [ 31.276197] fff00000c3efd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.276270] fff00000c3efd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.276341] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right: Failure
Automatically assigned
[ 31.260412] ================================================================== [ 31.260473] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 31.260526] Read of size 1 at addr fff00000c9ad9000 by task kunit_try_catch/171 [ 31.260575] [ 31.260605] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.260729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.260786] Hardware name: linux,dummy-virt (DT) [ 31.260913] Call trace: [ 31.260952] show_stack+0x20/0x38 (C) [ 31.261000] dump_stack_lvl+0x8c/0xd0 [ 31.261102] print_report+0x118/0x5e8 [ 31.261172] kasan_report+0xdc/0x128 [ 31.261235] __asan_report_load1_noabort+0x20/0x30 [ 31.261283] kmalloc_node_oob_right+0x2f4/0x330 [ 31.261331] kunit_try_run_case+0x170/0x3f0 [ 31.261375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.261469] kthread+0x328/0x630 [ 31.261548] ret_from_fork+0x10/0x20 [ 31.261593] [ 31.261611] Allocated by task 171: [ 31.261637] kasan_save_stack+0x3c/0x68 [ 31.261672] kasan_save_track+0x20/0x40 [ 31.261716] kasan_save_alloc_info+0x40/0x58 [ 31.261753] __kasan_kmalloc+0xd4/0xd8 [ 31.261797] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 31.261837] kmalloc_node_oob_right+0xbc/0x330 [ 31.261875] kunit_try_run_case+0x170/0x3f0 [ 31.261950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.261991] kthread+0x328/0x630 [ 31.262088] ret_from_fork+0x10/0x20 [ 31.262150] [ 31.262168] The buggy address belongs to the object at fff00000c9ad8000 [ 31.262168] which belongs to the cache kmalloc-4k of size 4096 [ 31.262290] The buggy address is located 0 bytes to the right of [ 31.262290] allocated 4096-byte region [fff00000c9ad8000, fff00000c9ad9000) [ 31.262431] [ 31.262483] The buggy address belongs to the physical page: [ 31.262685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad8 [ 31.263014] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.263072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.263147] page_type: f5(slab) [ 31.263184] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 31.263231] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.263296] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 31.263355] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.263414] head: 0bfffe0000000003 ffffc1ffc326b601 00000000ffffffff 00000000ffffffff [ 31.263551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 31.263697] page dumped because: kasan: bad access detected [ 31.263727] [ 31.263753] Memory state around the buggy address: [ 31.263830] fff00000c9ad8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.263902] fff00000c9ad8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.263955] >fff00000c9ad9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264015] ^ [ 31.264129] fff00000c9ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264194] fff00000c9ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264229] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left: Failure
Automatically assigned
[ 31.246536] ================================================================== [ 31.246615] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 31.246667] Read of size 1 at addr fff00000c907e03f by task kunit_try_catch/169 [ 31.246714] [ 31.246867] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.246985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.247025] Hardware name: linux,dummy-virt (DT) [ 31.247174] Call trace: [ 31.247249] show_stack+0x20/0x38 (C) [ 31.247316] dump_stack_lvl+0x8c/0xd0 [ 31.247362] print_report+0x118/0x5e8 [ 31.247404] kasan_report+0xdc/0x128 [ 31.247477] __asan_report_load1_noabort+0x20/0x30 [ 31.247525] kmalloc_oob_left+0x2ec/0x320 [ 31.247569] kunit_try_run_case+0x170/0x3f0 [ 31.247625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.247783] kthread+0x328/0x630 [ 31.247850] ret_from_fork+0x10/0x20 [ 31.247898] [ 31.247916] Allocated by task 110: [ 31.248004] kasan_save_stack+0x3c/0x68 [ 31.248105] kasan_save_track+0x20/0x40 [ 31.248198] kasan_save_alloc_info+0x40/0x58 [ 31.248256] __kasan_kmalloc+0xd4/0xd8 [ 31.248336] __kmalloc_noprof+0x198/0x4c8 [ 31.248457] kunit_kmalloc_array+0x34/0x88 [ 31.248528] test_readerwriter+0x3b0/0x948 [ 31.248568] kunit_try_run_case+0x170/0x3f0 [ 31.248609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.248670] kthread+0x328/0x630 [ 31.248701] ret_from_fork+0x10/0x20 [ 31.248735] [ 31.248753] The buggy address belongs to the object at fff00000c907e020 [ 31.248753] which belongs to the cache kmalloc-16 of size 16 [ 31.248806] The buggy address is located 15 bytes to the right of [ 31.248806] allocated 16-byte region [fff00000c907e020, fff00000c907e030) [ 31.248866] [ 31.248884] The buggy address belongs to the physical page: [ 31.248913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c907e020 pfn:0x10907e [ 31.248968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.249016] page_type: f5(slab) [ 31.249053] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.249133] raw: fff00000c907e020 000000008080007f 00000000f5000000 0000000000000000 [ 31.249172] page dumped because: kasan: bad access detected [ 31.249228] [ 31.249269] Memory state around the buggy address: [ 31.249362] fff00000c907df00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 31.249489] fff00000c907df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.249563] >fff00000c907e000: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 31.249657] ^ [ 31.249746] fff00000c907e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.249798] fff00000c907e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.249833] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
KNOWN ISSUE - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right: Failure
Automatically assigned
[ 31.238794] ================================================================== [ 31.238829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 31.238870] Read of size 1 at addr fff00000c3efd580 by task kunit_try_catch/167 [ 31.238937] [ 31.238963] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.239058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.239095] Hardware name: linux,dummy-virt (DT) [ 31.239142] Call trace: [ 31.239181] show_stack+0x20/0x38 (C) [ 31.239226] dump_stack_lvl+0x8c/0xd0 [ 31.239285] print_report+0x118/0x5e8 [ 31.239344] kasan_report+0xdc/0x128 [ 31.239402] __asan_report_load1_noabort+0x20/0x30 [ 31.239458] kmalloc_oob_right+0x5d0/0x660 [ 31.239503] kunit_try_run_case+0x170/0x3f0 [ 31.239547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.239911] kthread+0x328/0x630 [ 31.239955] ret_from_fork+0x10/0x20 [ 31.239999] [ 31.240034] Allocated by task 167: [ 31.240190] kasan_save_stack+0x3c/0x68 [ 31.240244] kasan_save_track+0x20/0x40 [ 31.240309] kasan_save_alloc_info+0x40/0x58 [ 31.240378] __kasan_kmalloc+0xd4/0xd8 [ 31.240475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.240544] kmalloc_oob_right+0xb0/0x660 [ 31.240633] kunit_try_run_case+0x170/0x3f0 [ 31.240688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.240728] kthread+0x328/0x630 [ 31.240776] ret_from_fork+0x10/0x20 [ 31.240810] [ 31.240827] The buggy address belongs to the object at fff00000c3efd500 [ 31.240827] which belongs to the cache kmalloc-128 of size 128 [ 31.240881] The buggy address is located 13 bytes to the right of [ 31.240881] allocated 115-byte region [fff00000c3efd500, fff00000c3efd573) [ 31.240944] [ 31.240962] The buggy address belongs to the physical page: [ 31.240989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.241037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.241091] page_type: f5(slab) [ 31.241126] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.241214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.241306] page dumped because: kasan: bad access detected [ 31.241335] [ 31.241387] Memory state around the buggy address: [ 31.241465] fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241548] fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.241613] >fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241649] ^ [ 31.241675] fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241713] fff00000c3efd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241749] ================================================================== [ 31.236686] ================================================================== [ 31.236724] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 31.236771] Write of size 1 at addr fff00000c3efd578 by task kunit_try_catch/167 [ 31.236846] [ 31.236876] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.236955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.236980] Hardware name: linux,dummy-virt (DT) [ 31.237009] Call trace: [ 31.237036] show_stack+0x20/0x38 (C) [ 31.237103] dump_stack_lvl+0x8c/0xd0 [ 31.237150] print_report+0x118/0x5e8 [ 31.237192] kasan_report+0xdc/0x128 [ 31.237235] __asan_report_store1_noabort+0x20/0x30 [ 31.237282] kmalloc_oob_right+0x538/0x660 [ 31.237336] kunit_try_run_case+0x170/0x3f0 [ 31.237389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.237448] kthread+0x328/0x630 [ 31.237490] ret_from_fork+0x10/0x20 [ 31.237539] [ 31.237557] Allocated by task 167: [ 31.237583] kasan_save_stack+0x3c/0x68 [ 31.237619] kasan_save_track+0x20/0x40 [ 31.237652] kasan_save_alloc_info+0x40/0x58 [ 31.237696] __kasan_kmalloc+0xd4/0xd8 [ 31.237729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.237772] kmalloc_oob_right+0xb0/0x660 [ 31.237809] kunit_try_run_case+0x170/0x3f0 [ 31.237843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.237891] kthread+0x328/0x630 [ 31.237931] ret_from_fork+0x10/0x20 [ 31.237965] [ 31.237982] The buggy address belongs to the object at fff00000c3efd500 [ 31.237982] which belongs to the cache kmalloc-128 of size 128 [ 31.238041] The buggy address is located 5 bytes to the right of [ 31.238041] allocated 115-byte region [fff00000c3efd500, fff00000c3efd573) [ 31.238111] [ 31.238129] The buggy address belongs to the physical page: [ 31.238157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.238206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.238252] page_type: f5(slab) [ 31.238287] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.238334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.238372] page dumped because: kasan: bad access detected [ 31.238400] [ 31.238417] Memory state around the buggy address: [ 31.238446] fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.238486] fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.238526] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.238562] ^ [ 31.238600] fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.238638] fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.238673] ================================================================== [ 31.225227] ================================================================== [ 31.225541] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 31.226363] Write of size 1 at addr fff00000c3efd573 by task kunit_try_catch/167 [ 31.226516] [ 31.227298] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 31.227666] Tainted: [N]=TEST [ 31.227700] Hardware name: linux,dummy-virt (DT) [ 31.228966] Call trace: [ 31.229336] show_stack+0x20/0x38 (C) [ 31.229510] dump_stack_lvl+0x8c/0xd0 [ 31.229566] print_report+0x118/0x5e8 [ 31.229611] kasan_report+0xdc/0x128 [ 31.229653] __asan_report_store1_noabort+0x20/0x30 [ 31.229701] kmalloc_oob_right+0x5a4/0x660 [ 31.229747] kunit_try_run_case+0x170/0x3f0 [ 31.229795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.229844] kthread+0x328/0x630 [ 31.229951] ret_from_fork+0x10/0x20 [ 31.230393] [ 31.230483] Allocated by task 167: [ 31.230784] kasan_save_stack+0x3c/0x68 [ 31.230940] kasan_save_track+0x20/0x40 [ 31.230975] kasan_save_alloc_info+0x40/0x58 [ 31.231011] __kasan_kmalloc+0xd4/0xd8 [ 31.231043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.231094] kmalloc_oob_right+0xb0/0x660 [ 31.231129] kunit_try_run_case+0x170/0x3f0 [ 31.231164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.231204] kthread+0x328/0x630 [ 31.231236] ret_from_fork+0x10/0x20 [ 31.231432] [ 31.231553] The buggy address belongs to the object at fff00000c3efd500 [ 31.231553] which belongs to the cache kmalloc-128 of size 128 [ 31.231644] The buggy address is located 0 bytes to the right of [ 31.231644] allocated 115-byte region [fff00000c3efd500, fff00000c3efd573) [ 31.231739] [ 31.232128] The buggy address belongs to the physical page: [ 31.232627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd [ 31.233026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.233367] page_type: f5(slab) [ 31.233844] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 31.233976] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.234156] page dumped because: kasan: bad access detected [ 31.234201] [ 31.234226] Memory state around the buggy address: [ 31.234476] fff00000c3efd400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.234649] fff00000c3efd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.234738] >fff00000c3efd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.234860] ^ [ 31.235063] fff00000c3efd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235140] fff00000c3efd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235215] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 110.949229] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689 [ 110.949887] Modules linked in: [ 110.950115] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 110.951129] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 110.951660] Hardware name: linux,dummy-virt (DT) [ 110.952189] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 110.953225] pc : intlog10+0x38/0x48 [ 110.953672] lr : intlog10_test+0xe4/0x200 [ 110.954111] sp : ffff800082367c10 [ 110.954493] x29: ffff800082367c90 x28: 0000000000000000 x27: 0000000000000000 [ 110.955244] x26: 1ffe000018c27ca1 x25: 0000000000000000 x24: ffff800082367ce0 [ 110.956098] x23: ffff800082367d00 x22: 0000000000000000 x21: 1ffff0001046cf82 [ 110.956933] x20: ffffa0dee1e41de0 x19: ffff800080087990 x18: 0000000090f076e5 [ 110.957685] x17: 0000000080bac4f3 x16: 00000000e263a8be x15: 0000000095b67a2c [ 110.958420] x14: 000000008a0b2563 x13: 000000008a4e4175 x12: ffff741bdcba8b89 [ 110.959151] x11: 1ffff41bdcba8b88 x10: ffff741bdcba8b88 x9 : ffffa0dedf457984 [ 110.959772] x8 : ffffa0dee5d45c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 110.960125] x5 : ffff70001046cf82 x4 : 1ffff00010010f3b x3 : 1ffff41bdc3c83bc [ 110.960465] x2 : 1ffff41bdc3c83bc x1 : 0000000000000003 x0 : 0000000000000000 [ 110.960807] Call trace: [ 110.960946] intlog10+0x38/0x48 (P) [ 110.961153] kunit_try_run_case+0x170/0x3f0 [ 110.961357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.961673] kthread+0x328/0x630 [ 110.961902] ret_from_fork+0x10/0x20 [ 110.962153] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 110.907055] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671 [ 110.907965] Modules linked in: [ 110.908278] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250718 #1 PREEMPT [ 110.908862] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 110.909408] Hardware name: linux,dummy-virt (DT) [ 110.909644] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 110.909994] pc : intlog2+0xd8/0xf8 [ 110.910238] lr : intlog2_test+0xe4/0x200 [ 110.910487] sp : ffff800082297c10 [ 110.910682] x29: ffff800082297c90 x28: 0000000000000000 x27: 0000000000000000 [ 110.911101] x26: 1ffe0000193634e1 x25: 0000000000000000 x24: ffff800082297ce0 [ 110.911510] x23: ffff800082297d00 x22: 0000000000000000 x21: 1ffff00010452f82 [ 110.911970] x20: ffffa0dee1e41ce0 x19: ffff800080087990 x18: 00000000066d908d [ 110.912585] x17: 0000000074a81e9f x16: 00000000b2f6124c x15: 0000000095987ca1 [ 110.913000] x14: 000000005c4a72db x13: 0000000000000005 x12: ffff741bdcba8b89 [ 110.913473] x11: 1ffff41bdcba8b88 x10: ffff741bdcba8b88 x9 : ffffa0dedf457b84 [ 110.913849] x8 : ffffa0dee5d45c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 110.914316] x5 : ffff700010452f82 x4 : 1ffff00010010f3b x3 : 1ffff41bdc3c839c [ 110.914677] x2 : 1ffff41bdc3c839c x1 : 0000000000000003 x0 : 0000000000000000 [ 110.915133] Call trace: [ 110.915305] intlog2+0xd8/0xf8 (P) [ 110.915532] kunit_try_run_case+0x170/0x3f0 [ 110.915994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.916271] kthread+0x328/0x630 [ 110.916500] ret_from_fork+0x10/0x20 [ 110.916747] ---[ end trace 0000000000000000 ]---