Date
July 22, 2025, 5:13 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 30.753916] ================================================================== [ 30.753985] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 30.754053] Read of size 8 at addr fff00000c9257080 by task kunit_try_catch/231 [ 30.754192] [ 30.754237] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.754521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.754587] Hardware name: linux,dummy-virt (DT) [ 30.754682] Call trace: [ 30.754709] show_stack+0x20/0x38 (C) [ 30.754849] dump_stack_lvl+0x8c/0xd0 [ 30.754904] print_report+0x118/0x5e8 [ 30.754948] kasan_report+0xdc/0x128 [ 30.754992] __asan_report_load8_noabort+0x20/0x30 [ 30.755048] workqueue_uaf+0x480/0x4a8 [ 30.755368] kunit_try_run_case+0x170/0x3f0 [ 30.755489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.755549] kthread+0x328/0x630 [ 30.755594] ret_from_fork+0x10/0x20 [ 30.755643] [ 30.755662] Allocated by task 231: [ 30.756025] kasan_save_stack+0x3c/0x68 [ 30.756090] kasan_save_track+0x20/0x40 [ 30.756128] kasan_save_alloc_info+0x40/0x58 [ 30.756169] __kasan_kmalloc+0xd4/0xd8 [ 30.756348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.756392] workqueue_uaf+0x13c/0x4a8 [ 30.756536] kunit_try_run_case+0x170/0x3f0 [ 30.756849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.756917] kthread+0x328/0x630 [ 30.757021] ret_from_fork+0x10/0x20 [ 30.757152] [ 30.757252] Freed by task 24: [ 30.757331] kasan_save_stack+0x3c/0x68 [ 30.757375] kasan_save_track+0x20/0x40 [ 30.757412] kasan_save_free_info+0x4c/0x78 [ 30.757449] __kasan_slab_free+0x6c/0x98 [ 30.757741] kfree+0x214/0x3c8 [ 30.757905] workqueue_uaf_work+0x18/0x30 [ 30.757973] process_one_work+0x530/0xf88 [ 30.758076] worker_thread+0x618/0xf38 [ 30.758134] kthread+0x328/0x630 [ 30.758502] ret_from_fork+0x10/0x20 [ 30.758567] [ 30.758612] Last potentially related work creation: [ 30.758703] kasan_save_stack+0x3c/0x68 [ 30.758752] kasan_record_aux_stack+0xb4/0xc8 [ 30.758862] __queue_work+0x65c/0xfe0 [ 30.758922] queue_work_on+0xbc/0xf8 [ 30.758959] workqueue_uaf+0x210/0x4a8 [ 30.758996] kunit_try_run_case+0x170/0x3f0 [ 30.759035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.759076] kthread+0x328/0x630 [ 30.759118] ret_from_fork+0x10/0x20 [ 30.759156] [ 30.759177] The buggy address belongs to the object at fff00000c9257080 [ 30.759177] which belongs to the cache kmalloc-32 of size 32 [ 30.759250] The buggy address is located 0 bytes inside of [ 30.759250] freed 32-byte region [fff00000c9257080, fff00000c92570a0) [ 30.759311] [ 30.759331] The buggy address belongs to the physical page: [ 30.759381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109257 [ 30.759448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.759499] page_type: f5(slab) [ 30.759552] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.759611] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.759652] page dumped because: kasan: bad access detected [ 30.759682] [ 30.759714] Memory state around the buggy address: [ 30.759762] fff00000c9256f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.759830] fff00000c9257000: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 30.759873] >fff00000c9257080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 30.759919] ^ [ 30.759946] fff00000c9257100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.759996] fff00000c9257180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.760043] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 30.688312] ================================================================== [ 30.688837] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.688917] Read of size 4 at addr fff00000c923ae80 by task swapper/1/0 [ 30.688962] [ 30.689005] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.689096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.689124] Hardware name: linux,dummy-virt (DT) [ 30.689157] Call trace: [ 30.689180] show_stack+0x20/0x38 (C) [ 30.689231] dump_stack_lvl+0x8c/0xd0 [ 30.691642] print_report+0x118/0x5e8 [ 30.691791] kasan_report+0xdc/0x128 [ 30.691846] __asan_report_load4_noabort+0x20/0x30 [ 30.691896] rcu_uaf_reclaim+0x64/0x70 [ 30.692961] rcu_core+0x9f4/0x1e58 [ 30.693328] rcu_core_si+0x18/0x30 [ 30.694302] handle_softirqs+0x374/0xb28 [ 30.694628] __do_softirq+0x1c/0x28 [ 30.695676] ____do_softirq+0x18/0x30 [ 30.695785] call_on_irq_stack+0x24/0x30 [ 30.696318] do_softirq_own_stack+0x24/0x38 [ 30.696458] __irq_exit_rcu+0x1fc/0x318 [ 30.696961] irq_exit_rcu+0x1c/0x80 [ 30.697300] el1_interrupt+0x38/0x58 [ 30.697952] el1h_64_irq_handler+0x18/0x28 [ 30.699102] el1h_64_irq+0x6c/0x70 [ 30.699409] arch_local_irq_enable+0x4/0x8 (P) [ 30.699472] do_idle+0x384/0x4e8 [ 30.700354] cpu_startup_entry+0x68/0x80 [ 30.701145] secondary_start_kernel+0x28c/0x340 [ 30.701379] __secondary_switched+0xc0/0xc8 [ 30.701594] [ 30.701946] Allocated by task 229: [ 30.702173] kasan_save_stack+0x3c/0x68 [ 30.702857] kasan_save_track+0x20/0x40 [ 30.703735] kasan_save_alloc_info+0x40/0x58 [ 30.703886] __kasan_kmalloc+0xd4/0xd8 [ 30.704610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.704725] rcu_uaf+0xb0/0x2d8 [ 30.704970] kunit_try_run_case+0x170/0x3f0 [ 30.705012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.705059] kthread+0x328/0x630 [ 30.705093] ret_from_fork+0x10/0x20 [ 30.705910] [ 30.706053] Freed by task 0: [ 30.706088] kasan_save_stack+0x3c/0x68 [ 30.706732] kasan_save_track+0x20/0x40 [ 30.707390] kasan_save_free_info+0x4c/0x78 [ 30.707442] __kasan_slab_free+0x6c/0x98 [ 30.707480] kfree+0x214/0x3c8 [ 30.707517] rcu_uaf_reclaim+0x28/0x70 [ 30.707554] rcu_core+0x9f4/0x1e58 [ 30.708717] rcu_core_si+0x18/0x30 [ 30.708985] handle_softirqs+0x374/0xb28 [ 30.709102] __do_softirq+0x1c/0x28 [ 30.709454] [ 30.710007] Last potentially related work creation: [ 30.710612] kasan_save_stack+0x3c/0x68 [ 30.710670] kasan_record_aux_stack+0xb4/0xc8 [ 30.710710] __call_rcu_common.constprop.0+0x74/0x8c8 [ 30.710758] call_rcu+0x18/0x30 [ 30.711413] rcu_uaf+0x14c/0x2d8 [ 30.711742] kunit_try_run_case+0x170/0x3f0 [ 30.712001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.712045] kthread+0x328/0x630 [ 30.712080] ret_from_fork+0x10/0x20 [ 30.713164] [ 30.713204] The buggy address belongs to the object at fff00000c923ae80 [ 30.713204] which belongs to the cache kmalloc-32 of size 32 [ 30.713445] The buggy address is located 0 bytes inside of [ 30.713445] freed 32-byte region [fff00000c923ae80, fff00000c923aea0) [ 30.713510] [ 30.714122] The buggy address belongs to the physical page: [ 30.714591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923a [ 30.714741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.715937] page_type: f5(slab) [ 30.716221] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.716378] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.716631] page dumped because: kasan: bad access detected [ 30.716846] [ 30.716939] Memory state around the buggy address: [ 30.716973] fff00000c923ad80: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 30.718006] fff00000c923ae00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 30.718269] >fff00000c923ae80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.718457] ^ [ 30.718509] fff00000c923af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.719248] fff00000c923af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.719292] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.604242] ================================================================== [ 30.604804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.604887] Read of size 1 at addr fff00000c9a95078 by task kunit_try_catch/227 [ 30.605070] [ 30.605123] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.605571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.605661] Hardware name: linux,dummy-virt (DT) [ 30.605846] Call trace: [ 30.605928] show_stack+0x20/0x38 (C) [ 30.606221] dump_stack_lvl+0x8c/0xd0 [ 30.606522] print_report+0x118/0x5e8 [ 30.606696] kasan_report+0xdc/0x128 [ 30.606862] __asan_report_load1_noabort+0x20/0x30 [ 30.606952] ksize_uaf+0x544/0x5f8 [ 30.607041] kunit_try_run_case+0x170/0x3f0 [ 30.607471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.607704] kthread+0x328/0x630 [ 30.607801] ret_from_fork+0x10/0x20 [ 30.608096] [ 30.608201] Allocated by task 227: [ 30.608444] kasan_save_stack+0x3c/0x68 [ 30.608550] kasan_save_track+0x20/0x40 [ 30.608693] kasan_save_alloc_info+0x40/0x58 [ 30.608781] __kasan_kmalloc+0xd4/0xd8 [ 30.608892] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.608936] ksize_uaf+0xb8/0x5f8 [ 30.608970] kunit_try_run_case+0x170/0x3f0 [ 30.609007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.609230] kthread+0x328/0x630 [ 30.610147] ret_from_fork+0x10/0x20 [ 30.610217] [ 30.610260] Freed by task 227: [ 30.610357] kasan_save_stack+0x3c/0x68 [ 30.610421] kasan_save_track+0x20/0x40 [ 30.610459] kasan_save_free_info+0x4c/0x78 [ 30.610523] __kasan_slab_free+0x6c/0x98 [ 30.610609] kfree+0x214/0x3c8 [ 30.610674] ksize_uaf+0x11c/0x5f8 [ 30.610840] kunit_try_run_case+0x170/0x3f0 [ 30.611166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.611254] kthread+0x328/0x630 [ 30.611473] ret_from_fork+0x10/0x20 [ 30.611944] [ 30.612001] The buggy address belongs to the object at fff00000c9a95000 [ 30.612001] which belongs to the cache kmalloc-128 of size 128 [ 30.612158] The buggy address is located 120 bytes inside of [ 30.612158] freed 128-byte region [fff00000c9a95000, fff00000c9a95080) [ 30.612229] [ 30.612249] The buggy address belongs to the physical page: [ 30.612284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 30.612340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.612411] page_type: f5(slab) [ 30.612448] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.612511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.612553] page dumped because: kasan: bad access detected [ 30.612584] [ 30.612618] Memory state around the buggy address: [ 30.612659] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.612712] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.612755] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.612793] ^ [ 30.612848] fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.613157] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.613504] ================================================================== [ 30.593974] ================================================================== [ 30.594044] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.594290] Read of size 1 at addr fff00000c9a95000 by task kunit_try_catch/227 [ 30.594355] [ 30.594957] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.595069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.595116] Hardware name: linux,dummy-virt (DT) [ 30.595163] Call trace: [ 30.595188] show_stack+0x20/0x38 (C) [ 30.595255] dump_stack_lvl+0x8c/0xd0 [ 30.595703] print_report+0x118/0x5e8 [ 30.595770] kasan_report+0xdc/0x128 [ 30.595962] __asan_report_load1_noabort+0x20/0x30 [ 30.596054] ksize_uaf+0x598/0x5f8 [ 30.596145] kunit_try_run_case+0x170/0x3f0 [ 30.596234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.596317] kthread+0x328/0x630 [ 30.596528] ret_from_fork+0x10/0x20 [ 30.596748] [ 30.596846] Allocated by task 227: [ 30.596987] kasan_save_stack+0x3c/0x68 [ 30.597082] kasan_save_track+0x20/0x40 [ 30.597198] kasan_save_alloc_info+0x40/0x58 [ 30.597286] __kasan_kmalloc+0xd4/0xd8 [ 30.597559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.597844] ksize_uaf+0xb8/0x5f8 [ 30.598008] kunit_try_run_case+0x170/0x3f0 [ 30.598089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.598226] kthread+0x328/0x630 [ 30.598302] ret_from_fork+0x10/0x20 [ 30.598375] [ 30.598506] Freed by task 227: [ 30.598537] kasan_save_stack+0x3c/0x68 [ 30.598619] kasan_save_track+0x20/0x40 [ 30.599022] kasan_save_free_info+0x4c/0x78 [ 30.599083] __kasan_slab_free+0x6c/0x98 [ 30.599227] kfree+0x214/0x3c8 [ 30.599285] ksize_uaf+0x11c/0x5f8 [ 30.599366] kunit_try_run_case+0x170/0x3f0 [ 30.599508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.599552] kthread+0x328/0x630 [ 30.599753] ret_from_fork+0x10/0x20 [ 30.599893] [ 30.600146] The buggy address belongs to the object at fff00000c9a95000 [ 30.600146] which belongs to the cache kmalloc-128 of size 128 [ 30.600233] The buggy address is located 0 bytes inside of [ 30.600233] freed 128-byte region [fff00000c9a95000, fff00000c9a95080) [ 30.600414] [ 30.600485] The buggy address belongs to the physical page: [ 30.600520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 30.600774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.600864] page_type: f5(slab) [ 30.600960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.601347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.601586] page dumped because: kasan: bad access detected [ 30.601628] [ 30.601671] Memory state around the buggy address: [ 30.601955] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.602113] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.602225] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.602265] ^ [ 30.602501] fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.602893] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.603010] ================================================================== [ 30.587185] ================================================================== [ 30.587251] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.587515] Read of size 1 at addr fff00000c9a95000 by task kunit_try_catch/227 [ 30.587652] [ 30.587703] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.588110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.588161] Hardware name: linux,dummy-virt (DT) [ 30.588195] Call trace: [ 30.588420] show_stack+0x20/0x38 (C) [ 30.588694] dump_stack_lvl+0x8c/0xd0 [ 30.588764] print_report+0x118/0x5e8 [ 30.588809] kasan_report+0xdc/0x128 [ 30.589104] __kasan_check_byte+0x54/0x70 [ 30.589199] ksize+0x30/0x88 [ 30.589452] ksize_uaf+0x168/0x5f8 [ 30.589629] kunit_try_run_case+0x170/0x3f0 [ 30.589873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.589968] kthread+0x328/0x630 [ 30.590241] ret_from_fork+0x10/0x20 [ 30.590506] [ 30.590561] Allocated by task 227: [ 30.590696] kasan_save_stack+0x3c/0x68 [ 30.590761] kasan_save_track+0x20/0x40 [ 30.590796] kasan_save_alloc_info+0x40/0x58 [ 30.590846] __kasan_kmalloc+0xd4/0xd8 [ 30.590890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.590939] ksize_uaf+0xb8/0x5f8 [ 30.590984] kunit_try_run_case+0x170/0x3f0 [ 30.591022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.591064] kthread+0x328/0x630 [ 30.591097] ret_from_fork+0x10/0x20 [ 30.591142] [ 30.591162] Freed by task 227: [ 30.591196] kasan_save_stack+0x3c/0x68 [ 30.591233] kasan_save_track+0x20/0x40 [ 30.591277] kasan_save_free_info+0x4c/0x78 [ 30.591315] __kasan_slab_free+0x6c/0x98 [ 30.591361] kfree+0x214/0x3c8 [ 30.591405] ksize_uaf+0x11c/0x5f8 [ 30.591450] kunit_try_run_case+0x170/0x3f0 [ 30.591487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.591529] kthread+0x328/0x630 [ 30.591563] ret_from_fork+0x10/0x20 [ 30.591598] [ 30.591627] The buggy address belongs to the object at fff00000c9a95000 [ 30.591627] which belongs to the cache kmalloc-128 of size 128 [ 30.591696] The buggy address is located 0 bytes inside of [ 30.591696] freed 128-byte region [fff00000c9a95000, fff00000c9a95080) [ 30.591757] [ 30.591791] The buggy address belongs to the physical page: [ 30.591844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 30.591899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.591958] page_type: f5(slab) [ 30.592013] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.592071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.592120] page dumped because: kasan: bad access detected [ 30.592151] [ 30.592177] Memory state around the buggy address: [ 30.592224] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592273] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592322] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.592360] ^ [ 30.592394] fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592436] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592474] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.564510] ================================================================== [ 30.564558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.564610] Read of size 1 at addr fff00000c3f71f7f by task kunit_try_catch/225 [ 30.564848] [ 30.565280] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.565418] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.565450] Hardware name: linux,dummy-virt (DT) [ 30.565495] Call trace: [ 30.565671] show_stack+0x20/0x38 (C) [ 30.565924] dump_stack_lvl+0x8c/0xd0 [ 30.566053] print_report+0x118/0x5e8 [ 30.566188] kasan_report+0xdc/0x128 [ 30.566326] __asan_report_load1_noabort+0x20/0x30 [ 30.566485] ksize_unpoisons_memory+0x690/0x740 [ 30.566558] kunit_try_run_case+0x170/0x3f0 [ 30.566837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.567023] kthread+0x328/0x630 [ 30.567179] ret_from_fork+0x10/0x20 [ 30.567390] [ 30.567501] Allocated by task 225: [ 30.567546] kasan_save_stack+0x3c/0x68 [ 30.567788] kasan_save_track+0x20/0x40 [ 30.567925] kasan_save_alloc_info+0x40/0x58 [ 30.568096] __kasan_kmalloc+0xd4/0xd8 [ 30.568204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.568314] ksize_unpoisons_memory+0xc0/0x740 [ 30.568391] kunit_try_run_case+0x170/0x3f0 [ 30.568745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.568987] kthread+0x328/0x630 [ 30.569093] ret_from_fork+0x10/0x20 [ 30.569216] [ 30.569297] The buggy address belongs to the object at fff00000c3f71f00 [ 30.569297] which belongs to the cache kmalloc-128 of size 128 [ 30.569544] The buggy address is located 12 bytes to the right of [ 30.569544] allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73) [ 30.569620] [ 30.569639] The buggy address belongs to the physical page: [ 30.569675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.569841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.570615] page_type: f5(slab) [ 30.570679] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.570749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.570853] page dumped because: kasan: bad access detected [ 30.571007] [ 30.571071] Memory state around the buggy address: [ 30.571146] fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.571838] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572097] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.572181] ^ [ 30.572378] fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.572494] fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.572561] ================================================================== [ 30.551438] ================================================================== [ 30.551885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.551964] Read of size 1 at addr fff00000c3f71f73 by task kunit_try_catch/225 [ 30.552015] [ 30.552093] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.552197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.552226] Hardware name: linux,dummy-virt (DT) [ 30.552259] Call trace: [ 30.552290] show_stack+0x20/0x38 (C) [ 30.552358] dump_stack_lvl+0x8c/0xd0 [ 30.552404] print_report+0x118/0x5e8 [ 30.552449] kasan_report+0xdc/0x128 [ 30.552492] __asan_report_load1_noabort+0x20/0x30 [ 30.552539] ksize_unpoisons_memory+0x628/0x740 [ 30.552589] kunit_try_run_case+0x170/0x3f0 [ 30.552648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.552700] kthread+0x328/0x630 [ 30.552741] ret_from_fork+0x10/0x20 [ 30.552849] [ 30.553386] Allocated by task 225: [ 30.553446] kasan_save_stack+0x3c/0x68 [ 30.553501] kasan_save_track+0x20/0x40 [ 30.553905] kasan_save_alloc_info+0x40/0x58 [ 30.553976] __kasan_kmalloc+0xd4/0xd8 [ 30.554063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.554162] ksize_unpoisons_memory+0xc0/0x740 [ 30.554253] kunit_try_run_case+0x170/0x3f0 [ 30.554397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.554474] kthread+0x328/0x630 [ 30.554688] ret_from_fork+0x10/0x20 [ 30.554913] [ 30.554972] The buggy address belongs to the object at fff00000c3f71f00 [ 30.554972] which belongs to the cache kmalloc-128 of size 128 [ 30.555085] The buggy address is located 0 bytes to the right of [ 30.555085] allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73) [ 30.555205] [ 30.555322] The buggy address belongs to the physical page: [ 30.555380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.555461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.555861] page_type: f5(slab) [ 30.556161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.556370] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.556439] page dumped because: kasan: bad access detected [ 30.556542] [ 30.556613] Memory state around the buggy address: [ 30.556755] fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.556845] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.557026] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.557444] ^ [ 30.557554] fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.557684] fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.557773] ================================================================== [ 30.558969] ================================================================== [ 30.559027] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.559081] Read of size 1 at addr fff00000c3f71f78 by task kunit_try_catch/225 [ 30.559283] [ 30.559439] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.559539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.559762] Hardware name: linux,dummy-virt (DT) [ 30.559837] Call trace: [ 30.559863] show_stack+0x20/0x38 (C) [ 30.559991] dump_stack_lvl+0x8c/0xd0 [ 30.560339] print_report+0x118/0x5e8 [ 30.560433] kasan_report+0xdc/0x128 [ 30.560541] __asan_report_load1_noabort+0x20/0x30 [ 30.560629] ksize_unpoisons_memory+0x618/0x740 [ 30.560874] kunit_try_run_case+0x170/0x3f0 [ 30.561090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.561162] kthread+0x328/0x630 [ 30.561390] ret_from_fork+0x10/0x20 [ 30.561593] [ 30.561661] Allocated by task 225: [ 30.561849] kasan_save_stack+0x3c/0x68 [ 30.561988] kasan_save_track+0x20/0x40 [ 30.562080] kasan_save_alloc_info+0x40/0x58 [ 30.562165] __kasan_kmalloc+0xd4/0xd8 [ 30.562200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.562412] ksize_unpoisons_memory+0xc0/0x740 [ 30.562581] kunit_try_run_case+0x170/0x3f0 [ 30.562645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.562691] kthread+0x328/0x630 [ 30.562723] ret_from_fork+0x10/0x20 [ 30.562806] [ 30.562838] The buggy address belongs to the object at fff00000c3f71f00 [ 30.562838] which belongs to the cache kmalloc-128 of size 128 [ 30.562898] The buggy address is located 5 bytes to the right of [ 30.562898] allocated 115-byte region [fff00000c3f71f00, fff00000c3f71f73) [ 30.562964] [ 30.563005] The buggy address belongs to the physical page: [ 30.563040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.563093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.563140] page_type: f5(slab) [ 30.563178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.563248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.563288] page dumped because: kasan: bad access detected [ 30.563334] [ 30.563353] Memory state around the buggy address: [ 30.563393] fff00000c3f71e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.563438] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563480] >fff00000c3f71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.563519] ^ [ 30.563559] fff00000c3f71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563600] fff00000c3f72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.563636] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.061006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 32.876471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 32.780863] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 32.790556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 32.754940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 64.674568] Internal error: Oops: 0000000096000005 [#7] SMP [ 64.679607] Modules linked in: [ 64.680059] CPU: 0 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.681383] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.682005] Hardware name: linux,dummy-virt (DT) [ 64.682498] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.683242] pc : ext4_mb_release+0x394/0xaf8 [ 64.683762] lr : ext4_mb_release+0x37c/0xaf8 [ 64.684251] sp : ffff800080cf7c50 [ 64.684593] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.685427] x26: fff00000c1ae3000 x25: fff00000c5ad6740 x24: 1ffe000018b5ace8 [ 64.686384] x23: fffd800018b5ace8 x22: fff00000c5ad6618 x21: 1ffe000018b5acc3 [ 64.687118] x20: 0000000000000000 x19: fff00000c5ad6400 x18: 1ffff2ff0e0f2c32 [ 64.687845] x17: 0000000000000000 x16: fff00000da44cda8 x15: 0000000000000007 [ 64.688574] x14: 0000000000000000 x13: 1ffe0000192bfcc4 x12: fffd8000196090c1 [ 64.689565] x11: 1ffe0000196090c0 x10: fffd8000196090c0 x9 : ffff97f86e388bbc [ 64.690267] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10 [ 64.690619] x5 : 0000000000000001 x4 : 1ffe000018c8b511 x3 : dfff800000000000 [ 64.691209] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.691951] Call trace: [ 64.692223] ext4_mb_release+0x394/0xaf8 (P) [ 64.692669] mbt_kunit_exit+0x9c/0x2c8 [ 64.693076] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.693674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.694323] kthread+0x328/0x630 [ 64.694562] ret_from_fork+0x10/0x20 [ 64.694772] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.695026] ---[ end trace 0000000000000000 ]--- [ 64.523685] Internal error: Oops: 0000000096000005 [#2] SMP [ 64.528859] Modules linked in: [ 64.529314] CPU: 1 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.530391] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.530930] Hardware name: linux,dummy-virt (DT) [ 64.531499] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.531798] pc : ext4_mb_release+0x394/0xaf8 [ 64.532047] lr : ext4_mb_release+0x37c/0xaf8 [ 64.532270] sp : ffff800080b97c50 [ 64.532482] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.532962] x26: fff00000c99f1000 x25: fff00000c5aec740 x24: 1ffe000018b5d8e8 [ 64.533469] x23: fffd800018b5d8e8 x22: fff00000c5aec618 x21: 1ffe000018b5d8c3 [ 64.533928] x20: 0000000000000000 x19: fff00000c5aec400 x18: 000000002013ab6a [ 64.534435] x17: 0000000000000001 x16: fff00000da46eda8 x15: 000000005694f776 [ 64.534865] x14: 000000006566aed3 x13: 1ffe0000192bfcf4 x12: fffd800019034a01 [ 64.535309] x11: 1ffe000019034a00 x10: fffd800019034a00 x9 : ffff97f86e388bbc [ 64.535726] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10 [ 64.536157] x5 : 0000000000000001 x4 : 1ffe000018b8f511 x3 : dfff800000000000 [ 64.536623] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.537625] Call trace: [ 64.537974] ext4_mb_release+0x394/0xaf8 (P) [ 64.538428] mbt_kunit_exit+0x9c/0x2c8 [ 64.538840] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.539324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.539618] kthread+0x328/0x630 [ 64.539797] ret_from_fork+0x10/0x20 [ 64.540217] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.540793] ---[ end trace 0000000000000000 ]--- [ 107.841706] Internal error: Oops: 0000000096000005 [#21] SMP [ 107.844908] Modules linked in: [ 107.845384] CPU: 1 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 107.846530] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 107.847255] Hardware name: linux,dummy-virt (DT) [ 107.848874] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 107.849858] pc : ext4_mb_release+0x394/0xaf8 [ 107.850393] lr : ext4_mb_release+0x37c/0xaf8 [ 107.850910] sp : ffff800080cd7c50 [ 107.851250] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000 [ 107.851930] x26: fff00000c145c000 x25: fff00000c5d46740 x24: 1ffe000018ba8ce8 [ 107.852442] x23: fffd800018ba8ce8 x22: fff00000c5d46618 x21: 1ffe000018ba8cc3 [ 107.852792] x20: 0000000000000000 x19: fff00000c5d46400 x18: 1ffff2ff0e0f2c32 [ 107.853147] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000000000007 [ 107.853487] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcf4 x12: fffd80001925bf81 [ 107.853844] x11: 1ffe00001925bf80 x10: fffd80001925bf80 x9 : ffff97f86e388bbc [ 107.854596] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10 [ 107.855336] x5 : 0000000000000001 x4 : 1ffe000018baf799 x3 : dfff800000000000 [ 107.856088] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 107.856833] Call trace: [ 107.857140] ext4_mb_release+0x394/0xaf8 (P) [ 107.857613] mbt_kunit_exit+0x9c/0x2c8 [ 107.858048] kunit_try_run_case_cleanup+0x9c/0xe0 [ 107.858551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 107.859115] kthread+0x328/0x630 [ 107.859497] ret_from_fork+0x10/0x20 [ 107.859939] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 107.860533] ---[ end trace 0000000000000000 ]--- [ 64.581555] Internal error: Oops: 0000000096000005 [#4] SMP [ 64.587117] Modules linked in: [ 64.588667] CPU: 0 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.589806] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.590170] Hardware name: linux,dummy-virt (DT) [ 64.590441] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.590840] pc : ext4_mb_release+0x394/0xaf8 [ 64.591092] lr : ext4_mb_release+0x37c/0xaf8 [ 64.592123] sp : ffff800080cb7c50 [ 64.593138] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.594005] x26: fff00000c643e000 x25: fff00000c9a5e740 x24: 1ffe00001934bce8 [ 64.594382] x23: fffd80001934bce8 x22: fff00000c9a5e618 x21: 1ffe00001934bcc3 [ 64.594732] x20: 0000000000000000 x19: fff00000c9a5e400 x18: 00000000ccf4d8a9 [ 64.595480] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000695b76fc [ 64.596232] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcc4 x12: fffd800019609221 [ 64.597218] x11: 1ffe000019609220 x10: fffd800019609220 x9 : ffff97f86e388bbc [ 64.598193] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10 [ 64.598941] x5 : 0000000000000001 x4 : 1ffe00001944b799 x3 : dfff800000000000 [ 64.599387] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.599727] Call trace: [ 64.599920] ext4_mb_release+0x394/0xaf8 (P) [ 64.600361] mbt_kunit_exit+0x9c/0x2c8 [ 64.600764] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.601497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.602069] kthread+0x328/0x630 [ 64.602374] ret_from_fork+0x10/0x20 [ 64.602578] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.602832] ---[ end trace 0000000000000000 ]--- [ 108.202744] Internal error: Oops: 0000000096000005 [#22] SMP [ 108.209540] Modules linked in: [ 108.210042] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 108.211146] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 108.211837] Hardware name: linux,dummy-virt (DT) [ 108.212335] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.212909] pc : kunit_test_null_dereference+0x70/0x170 [ 108.213632] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.214091] sp : ffff8000820a7d30 [ 108.214268] x29: ffff8000820a7d90 x28: 0000000000000000 x27: 0000000000000000 [ 108.214631] x26: 1ffe0000192c1d01 x25: 0000000000000000 x24: 0000000000000004 [ 108.214995] x23: fff00000c960e80c x22: ffff97f86bc48328 x21: fff00000c1b0bc88 [ 108.215441] x20: 1ffff00010414fa6 x19: ffff800080087990 x18: 000000000f6d5eca [ 108.215879] x17: 0000000000000001 x16: fff00000da46eda8 x15: fff00000ff616b48 [ 108.216288] x14: 0000000000018fff x13: 1ffe0000192bfcf4 x12: fffd8000190eb8b4 [ 108.216774] x11: 1ffe0000190eb8b3 x10: fffd8000190eb8b3 x9 : ffff97f86bc3fab0 [ 108.217194] x8 : ffff8000820a7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 108.217587] x5 : ffff700010414fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 108.218016] x2 : dfff800000000000 x1 : fff00000c875bcc0 x0 : ffff800080087990 [ 108.218439] Call trace: [ 108.218602] kunit_test_null_dereference+0x70/0x170 (P) [ 108.218975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.219261] kthread+0x328/0x630 [ 108.219531] ret_from_fork+0x10/0x20 [ 108.219872] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 108.220207] ---[ end trace 0000000000000000 ]--- [ 64.899126] Internal error: Oops: 0000000096000005 [#14] SMP [ 64.903555] Modules linked in: [ 64.905983] CPU: 1 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.907358] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.908190] Hardware name: linux,dummy-virt (DT) [ 64.908758] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.909630] pc : ext4_mb_release+0x394/0xaf8 [ 64.910201] lr : ext4_mb_release+0x37c/0xaf8 [ 64.910778] sp : ffff800080cb7c50 [ 64.911175] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.911948] x26: fff00000c11d0000 x25: fff00000c5d1a740 x24: 1ffe000018ba34e8 [ 64.912707] x23: fffd800018ba34e8 x22: fff00000c5d1a618 x21: 1ffe000018ba34c3 [ 64.913684] x20: 0000000000000000 x19: fff00000c5d1a400 x18: 00000000fca6762f [ 64.914596] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000edf40d44 [ 64.915195] x14: 000000007b6e0d47 x13: 1ffe0000192bfcf4 x12: fffd800019034b01 [ 64.915540] x11: 1ffe000019034b00 x10: fffd800019034b00 x9 : ffff97f86e388bbc [ 64.915968] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10 [ 64.916611] x5 : 0000000000000001 x4 : 1ffe0000182cf799 x3 : dfff800000000000 [ 64.917184] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.917540] Call trace: [ 64.917675] ext4_mb_release+0x394/0xaf8 (P) [ 64.917927] mbt_kunit_exit+0x9c/0x2c8 [ 64.918138] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.918435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.918723] kthread+0x328/0x630 [ 64.919286] ret_from_fork+0x10/0x20 [ 64.919582] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.919908] ---[ end trace 0000000000000000 ]--- [ 64.802486] Internal error: Oops: 0000000096000005 [#11] SMP [ 64.806604] Modules linked in: [ 64.807601] CPU: 1 UID: 0 PID: 399 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.809073] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.809860] Hardware name: linux,dummy-virt (DT) [ 64.810531] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.811393] pc : ext4_mb_release+0x394/0xaf8 [ 64.812023] lr : ext4_mb_release+0x37c/0xaf8 [ 64.812658] sp : ffff800080cf7c50 [ 64.813264] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.814292] x26: fff00000c44ed000 x25: fff00000c5c98740 x24: 1ffe000018b930e8 [ 64.815259] x23: fffd800018b930e8 x22: fff00000c5c98618 x21: 1ffe000018b930c3 [ 64.816236] x20: 0000000000000000 x19: fff00000c5c98400 x18: 1ffff2ff0e0f2c32 [ 64.817306] x17: 0000000000000001 x16: fff00000da46eda8 x15: fff00000ff616b48 [ 64.818493] x14: 0000000000018fff x13: 1ffe0000192bfcf4 x12: fffd800019034a81 [ 64.819049] x11: 1ffe000019034a80 x10: fffd800019034a80 x9 : ffff97f86e388bbc [ 64.819400] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10 [ 64.819735] x5 : 0000000000000001 x4 : 1ffe00001826ca21 x3 : dfff800000000000 [ 64.820518] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.821398] Call trace: [ 64.821719] ext4_mb_release+0x394/0xaf8 (P) [ 64.822329] mbt_kunit_exit+0x9c/0x2c8 [ 64.822825] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.823358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.824031] kthread+0x328/0x630 [ 64.824411] ret_from_fork+0x10/0x20 [ 64.824884] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.825806] ---[ end trace 0000000000000000 ]--- [ 64.704758] Internal error: Oops: 0000000096000005 [#8] SMP [ 64.710419] Modules linked in: [ 64.712208] CPU: 1 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.713839] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.714973] Hardware name: linux,dummy-virt (DT) [ 64.716087] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.717051] pc : ext4_mb_release+0x394/0xaf8 [ 64.717914] lr : ext4_mb_release+0x37c/0xaf8 [ 64.718213] sp : ffff800080ce7c50 [ 64.718451] x29: ffff800080ce7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.719021] x26: fff00000c44ea000 x25: fff00000c5ad4740 x24: 1ffe000018b5a8e8 [ 64.719485] x23: fffd800018b5a8e8 x22: fff00000c5ad4618 x21: 1ffe000018b5a8c3 [ 64.719964] x20: 0000000000000000 x19: fff00000c5ad4400 x18: 00000000527c6e06 [ 64.720426] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000bc786473 [ 64.721026] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcf4 x12: fffd800019034841 [ 64.721462] x11: 1ffe000019034840 x10: fffd800019034840 x9 : ffff97f86e388bbc [ 64.721884] x8 : ffff800080ce79f8 x7 : 0000000000000001 x6 : ffff800080ce7b10 [ 64.722292] x5 : 0000000000000001 x4 : 1ffe000018c8b289 x3 : dfff800000000000 [ 64.722701] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.723137] Call trace: [ 64.723317] ext4_mb_release+0x394/0xaf8 (P) [ 64.723562] mbt_kunit_exit+0x9c/0x2c8 [ 64.723806] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.724106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.724370] kthread+0x328/0x630 [ 64.724590] ret_from_fork+0x10/0x20 [ 64.724844] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.725187] ---[ end trace 0000000000000000 ]--- [ 64.989865] Internal error: Oops: 0000000096000005 [#17] SMP [ 64.992209] Modules linked in: [ 64.992464] CPU: 0 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.993058] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.993370] Hardware name: linux,dummy-virt (DT) [ 64.993635] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.994023] pc : ext4_mb_release+0x394/0xaf8 [ 64.994405] lr : ext4_mb_release+0x37c/0xaf8 [ 64.994670] sp : ffff800080cf7c50 [ 64.994938] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.995389] x26: fff00000c5ecd000 x25: fff00000c16c0740 x24: 1ffe0000182d80e8 [ 64.995848] x23: fffd8000182d80e8 x22: fff00000c16c0618 x21: 1ffe0000182d80c3 [ 64.996298] x20: 0000000000000000 x19: fff00000c16c0400 x18: 000000007a2c4c6a [ 64.996748] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000c7cd14a0 [ 64.997147] x14: 00000000e32925f9 x13: 1ffe0000192bfcc4 x12: fffd8000195cf641 [ 64.999237] x11: 1ffe0000195cf640 x10: fffd8000195cf640 x9 : ffff97f86e388bbc [ 64.999636] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10 [ 65.000579] x5 : 0000000000000001 x4 : 1ffe00001829b001 x3 : dfff800000000000 [ 65.001614] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.002541] Call trace: [ 65.002992] ext4_mb_release+0x394/0xaf8 (P) [ 65.003596] mbt_kunit_exit+0x9c/0x2c8 [ 65.004178] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.004845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.005667] kthread+0x328/0x630 [ 65.006286] ret_from_fork+0x10/0x20 [ 65.006742] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.007466] ---[ end trace 0000000000000000 ]--- [ 64.773695] Internal error: Oops: 0000000096000005 [#10] SMP [ 64.777923] Modules linked in: [ 64.779002] CPU: 0 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.780417] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.781536] Hardware name: linux,dummy-virt (DT) [ 64.782357] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.783424] pc : ext4_mb_release+0x394/0xaf8 [ 64.784012] lr : ext4_mb_release+0x37c/0xaf8 [ 64.784387] sp : ffff800080ce7c50 [ 64.784599] x29: ffff800080ce7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.785228] x26: fff00000c1689000 x25: fff00000c9a58740 x24: 1ffe00001934b0e8 [ 64.785676] x23: fffd80001934b0e8 x22: fff00000c9a58618 x21: 1ffe00001934b0c3 [ 64.786242] x20: 0000000000000000 x19: fff00000c9a58400 x18: 0000000035a2f254 [ 64.786592] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000b255be80 [ 64.787219] x14: 000000009412bbfe x13: 1ffe0000192bfcc4 x12: fffd80001826eec1 [ 64.787724] x11: 1ffe00001826eec0 x10: fffd80001826eec0 x9 : ffff97f86e388bbc [ 64.788176] x8 : ffff800080ce79f8 x7 : 0000000000000001 x6 : ffff800080ce7b10 [ 64.788628] x5 : 0000000000000001 x4 : 1ffe000018e43ca9 x3 : dfff800000000000 [ 64.789359] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.789901] Call trace: [ 64.790171] ext4_mb_release+0x394/0xaf8 (P) [ 64.790426] mbt_kunit_exit+0x9c/0x2c8 [ 64.790671] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.791155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.791406] kthread+0x328/0x630 [ 64.791579] ret_from_fork+0x10/0x20 [ 64.791776] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.792592] ---[ end trace 0000000000000000 ]--- [ 64.961437] Internal error: Oops: 0000000096000005 [#16] SMP [ 64.966891] Modules linked in: [ 64.967112] CPU: 0 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.967536] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.967763] Hardware name: linux,dummy-virt (DT) [ 64.969075] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.970028] pc : ext4_mb_release+0x394/0xaf8 [ 64.970553] lr : ext4_mb_release+0x37c/0xaf8 [ 64.971131] sp : ffff800080d17c50 [ 64.971638] x29: ffff800080d17c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.972597] x26: fff00000c11d3000 x25: fff00000c5f60740 x24: 1ffe000018bec0e8 [ 64.973686] x23: fffd800018bec0e8 x22: fff00000c5f60618 x21: 1ffe000018bec0c3 [ 64.974667] x20: 0000000000000000 x19: fff00000c5f60400 x18: 0000000007dd5685 [ 64.975422] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000210dbe4b [ 64.976058] x14: 000000003c31b131 x13: 1ffe0000192bfcc4 x12: fffd800019608f01 [ 64.976420] x11: 1ffe000019608f00 x10: fffd800019608f00 x9 : ffff97f86e388bbc [ 64.976767] x8 : ffff800080d179f8 x7 : 0000000000000001 x6 : ffff800080d17b10 [ 64.977741] x5 : 0000000000000001 x4 : 1ffe000018e43289 x3 : dfff800000000000 [ 64.978393] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.978779] Call trace: [ 64.978964] ext4_mb_release+0x394/0xaf8 (P) [ 64.979213] mbt_kunit_exit+0x9c/0x2c8 [ 64.979436] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.979699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.980033] kthread+0x328/0x630 [ 64.980240] ret_from_fork+0x10/0x20 [ 64.980490] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.980820] ---[ end trace 0000000000000000 ]--- [ 64.931076] Internal error: Oops: 0000000096000005 [#15] SMP [ 64.932468] Modules linked in: [ 64.932713] CPU: 0 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.933867] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.934128] Hardware name: linux,dummy-virt (DT) [ 64.934399] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.934767] pc : ext4_mb_release+0x394/0xaf8 [ 64.935045] lr : ext4_mb_release+0x37c/0xaf8 [ 64.935296] sp : ffff800080cd7c50 [ 64.935464] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.936503] x26: fff00000c5eca000 x25: fff00000c16c2740 x24: 1ffe0000182d84e8 [ 64.938015] x23: fffd8000182d84e8 x22: fff00000c16c2618 x21: 1ffe0000182d84c3 [ 64.938963] x20: 0000000000000000 x19: fff00000c16c2400 x18: 1ffff2ff0e0f2c32 [ 64.940033] x17: 0000000000000000 x16: fff00000da46eda8 x15: 0000000000000007 [ 64.940399] x14: 0000000000000000 x13: 1ffe0000192bfcf4 x12: fffd800018c48a81 [ 64.940744] x11: 1ffe000018c48a80 x10: fffd800018c48a80 x9 : ffff97f86e388bbc [ 64.942496] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10 [ 64.943421] x5 : 0000000000000001 x4 : 1ffe0000182cfca9 x3 : dfff800000000000 [ 64.944545] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.945840] Call trace: [ 64.946369] ext4_mb_release+0x394/0xaf8 (P) [ 64.947022] mbt_kunit_exit+0x9c/0x2c8 [ 64.947451] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.947694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.948441] kthread+0x328/0x630 [ 64.949090] ret_from_fork+0x10/0x20 [ 64.949765] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.950528] ---[ end trace 0000000000000000 ]--- [ 64.833777] Internal error: Oops: 0000000096000005 [#12] SMP [ 64.839203] Modules linked in: [ 64.839411] CPU: 1 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.839833] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.840130] Hardware name: linux,dummy-virt (DT) [ 64.840400] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.840796] pc : ext4_mb_release+0x394/0xaf8 [ 64.841076] lr : ext4_mb_release+0x37c/0xaf8 [ 64.841307] sp : ffff800080d17c50 [ 64.841513] x29: ffff800080d17c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.841912] x26: fff00000c168c000 x25: fff00000c16c6740 x24: 1ffe0000182d8ce8 [ 64.842275] x23: fffd8000182d8ce8 x22: fff00000c16c6618 x21: 1ffe0000182d8cc3 [ 64.843177] x20: 0000000000000000 x19: fff00000c16c6400 x18: 00000000c264f5a1 [ 64.843641] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000edf972f7 [ 64.844021] x14: 00000000e2f716e3 x13: 1ffe0000192bfcf4 x12: fffd800018c48b81 [ 64.844426] x11: 1ffe000018c48b80 x10: fffd800018c48b80 x9 : ffff97f86e388bbc [ 64.844881] x8 : ffff800080d179f8 x7 : 0000000000000001 x6 : ffff800080d17b10 [ 64.845329] x5 : 0000000000000001 x4 : 1ffe0000182cf289 x3 : dfff800000000000 [ 64.846015] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.846781] Call trace: [ 64.847071] ext4_mb_release+0x394/0xaf8 (P) [ 64.847535] mbt_kunit_exit+0x9c/0x2c8 [ 64.847937] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.848426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.849126] kthread+0x328/0x630 [ 64.849515] ret_from_fork+0x10/0x20 [ 64.849944] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.850524] ---[ end trace 0000000000000000 ]--- [ 64.867673] Internal error: Oops: 0000000096000005 [#13] SMP [ 64.872340] Modules linked in: [ 64.872781] CPU: 0 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.875015] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.875890] Hardware name: linux,dummy-virt (DT) [ 64.876550] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.877482] pc : ext4_mb_release+0x394/0xaf8 [ 64.878223] lr : ext4_mb_release+0x37c/0xaf8 [ 64.878837] sp : ffff800080d07c50 [ 64.879345] x29: ffff800080d07c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.880243] x26: fff00000c168f000 x25: fff00000c16c4740 x24: 1ffe0000182d88e8 [ 64.881247] x23: fffd8000182d88e8 x22: fff00000c16c4618 x21: 1ffe0000182d88c3 [ 64.882308] x20: 0000000000000000 x19: fff00000c16c4400 x18: fff00000cb293800 [ 64.883212] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000000000000 [ 64.884110] x14: 0000000000000000 x13: 1ffe0000192bfcc4 x12: fffd80001837fb21 [ 64.885059] x11: 1ffe00001837fb20 x10: fffd80001837fb20 x9 : ffff97f86e388bbc [ 64.885988] x8 : ffff800080d079f8 x7 : 0000000000000001 x6 : ffff800080d07b10 [ 64.886793] x5 : 0000000000000001 x4 : 1ffe000018e43799 x3 : dfff800000000000 [ 64.887585] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.888383] Call trace: [ 64.888699] ext4_mb_release+0x394/0xaf8 (P) [ 64.889187] mbt_kunit_exit+0x9c/0x2c8 [ 64.889445] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.889987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.890486] kthread+0x328/0x630 [ 64.890844] ret_from_fork+0x10/0x20 [ 64.891148] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.891398] ---[ end trace 0000000000000000 ]--- [ 65.017512] Internal error: Oops: 0000000096000005 [#18] SMP [ 65.023593] Modules linked in: [ 65.024017] CPU: 0 UID: 0 PID: 413 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 65.025176] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 65.026049] Hardware name: linux,dummy-virt (DT) [ 65.026754] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.027468] pc : ext4_mb_release+0x394/0xaf8 [ 65.027952] lr : ext4_mb_release+0x37c/0xaf8 [ 65.028413] sp : ffff800080d37c50 [ 65.028779] x29: ffff800080d37c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.029788] x26: fff00000c5db8000 x25: fff00000c5ab6740 x24: 1ffe000018b56ce8 [ 65.030220] x23: fffd800018b56ce8 x22: fff00000c5ab6618 x21: 1ffe000018b56cc3 [ 65.030567] x20: 0000000000000000 x19: fff00000c5ab6400 x18: 000000003d345113 [ 65.030919] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000047062c45 [ 65.031259] x14: 00000000050d3c68 x13: 1ffe0000192bfcc4 x12: fffd800018259f81 [ 65.031604] x11: 1ffe000018259f80 x10: fffd800018259f80 x9 : ffff97f86e388bbc [ 65.032230] x8 : ffff800080d379f8 x7 : 0000000000000001 x6 : ffff800080d37b10 [ 65.033114] x5 : 0000000000000001 x4 : 1ffe00001829b511 x3 : dfff800000000000 [ 65.033960] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.034871] Call trace: [ 65.035169] ext4_mb_release+0x394/0xaf8 (P) [ 65.035635] mbt_kunit_exit+0x9c/0x2c8 [ 65.036063] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.036557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.037184] kthread+0x328/0x630 [ 65.037647] ret_from_fork+0x10/0x20 [ 65.038166] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.038947] ---[ end trace 0000000000000000 ]--- [ 64.495800] Internal error: Oops: 0000000096000005 [#1] SMP [ 64.500579] Modules linked in: [ 64.501387] CPU: 0 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.501968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.502194] Hardware name: linux,dummy-virt (DT) [ 64.502466] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.502834] pc : ext4_mb_release+0x394/0xaf8 [ 64.503096] lr : ext4_mb_release+0x37c/0xaf8 [ 64.503323] sp : ffff800080cd7c50 [ 64.503532] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.504000] x26: fff00000c643b000 x25: fff00000c9a5c740 x24: 1ffe00001934b8e8 [ 64.504373] x23: fffd80001934b8e8 x22: fff00000c9a5c618 x21: 1ffe00001934b8c3 [ 64.504834] x20: 0000000000000000 x19: fff00000c9a5c400 x18: 00000000655c25a4 [ 64.505257] x17: 0000000000000001 x16: fff00000da44cda8 x15: 000000009685f5d5 [ 64.505668] x14: 000000009733713a x13: 1ffe0000192bfcc4 x12: fffd8000196092c1 [ 64.506477] x11: 1ffe0000196092c0 x10: fffd8000196092c0 x9 : ffff97f86e388bbc [ 64.507262] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10 [ 64.508039] x5 : 0000000000000001 x4 : 1ffe00001944b511 x3 : dfff800000000000 [ 64.508784] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.509660] Call trace: [ 64.510045] ext4_mb_release+0x394/0xaf8 (P) [ 64.510747] mbt_kunit_exit+0x9c/0x2c8 [ 64.511404] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.512076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.512798] kthread+0x328/0x630 [ 64.513459] ret_from_fork+0x10/0x20 [ 64.514203] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.514725] ---[ end trace 0000000000000000 ]--- [ 64.610093] Internal error: Oops: 0000000096000005 [#5] SMP [ 64.614767] Modules linked in: [ 64.615556] CPU: 0 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.617242] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.617974] Hardware name: linux,dummy-virt (DT) [ 64.618495] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.619202] pc : ext4_mb_release+0x394/0xaf8 [ 64.619706] lr : ext4_mb_release+0x37c/0xaf8 [ 64.620205] sp : ffff800080cf7c50 [ 64.620565] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.621424] x26: fff00000c99f7000 x25: fff00000c5fbe740 x24: 1ffe000018bf7ce8 [ 64.622076] x23: fffd800018bf7ce8 x22: fff00000c5fbe618 x21: 1ffe000018bf7cc3 [ 64.622441] x20: 0000000000000000 x19: fff00000c5fbe400 x18: 000000006d9fc0e6 [ 64.622788] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000309135d2 [ 64.623348] x14: 00000000a911e4e5 x13: fff00000ca259448 x12: fffd800019034981 [ 64.623959] x11: 1ffe000019034980 x10: fffd800019034980 x9 : ffff97f86e388bbc [ 64.624304] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10 [ 64.624643] x5 : 0000000000000001 x4 : 1ffe00001944b289 x3 : dfff800000000000 [ 64.625097] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.625569] Call trace: [ 64.625752] ext4_mb_release+0x394/0xaf8 (P) [ 64.626043] mbt_kunit_exit+0x9c/0x2c8 [ 64.626256] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.626551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.626904] kthread+0x328/0x630 [ 64.627096] ret_from_fork+0x10/0x20 [ 64.627377] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.627676] ---[ end trace 0000000000000000 ]--- [ 64.638238] Internal error: Oops: 0000000096000005 [#6] SMP [ 64.645435] Modules linked in: [ 64.647220] CPU: 0 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.648798] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.649789] Hardware name: linux,dummy-virt (DT) [ 64.650452] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.650960] pc : ext4_mb_release+0x394/0xaf8 [ 64.651186] lr : ext4_mb_release+0x37c/0xaf8 [ 64.651386] sp : ffff800080ce7c50 [ 64.651543] x29: ffff800080ce7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.652039] x26: fff00000c0b08000 x25: fff00000c5d10740 x24: 1ffe000018ba20e8 [ 64.652768] x23: fffd800018ba20e8 x22: fff00000c5d10618 x21: 1ffe000018ba20c3 [ 64.653805] x20: 0000000000000000 x19: fff00000c5d10400 x18: 1ffff2ff0e0f2c32 [ 64.654727] x17: 0000000000000001 x16: fff00000c92dd03c x15: 0000000000000007 [ 64.655530] x14: 0000000000000000 x13: 1ffe00001b48dddd x12: fffd80001925bb81 [ 64.656269] x11: 1ffe00001925bb80 x10: fffd80001925bb80 x9 : ffff97f86e388bbc [ 64.657058] x8 : ffff800080ce79f8 x7 : 0000000000000001 x6 : ffff800080ce7b10 [ 64.657822] x5 : 0000000000000001 x4 : 1ffe000018c8ba21 x3 : dfff800000000000 [ 64.658509] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.658856] Call trace: [ 64.658991] ext4_mb_release+0x394/0xaf8 (P) [ 64.659198] mbt_kunit_exit+0x9c/0x2c8 [ 64.659383] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.659597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.659853] kthread+0x328/0x630 [ 64.660204] ret_from_fork+0x10/0x20 [ 64.660596] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.661282] ---[ end trace 0000000000000000 ]--- [ 86.412743] Internal error: Oops: 0000000096000005 [#19] SMP [ 86.418589] Modules linked in: [ 86.419347] CPU: 1 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 86.420320] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 86.420566] Hardware name: linux,dummy-virt (DT) [ 86.420770] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 86.421059] pc : ext4_mb_release+0x394/0xaf8 [ 86.421531] lr : ext4_mb_release+0x37c/0xaf8 [ 86.421834] sp : ffff800080d57c50 [ 86.422049] x29: ffff800080d57c60 x28: dfff800000000000 x27: 0000000000000000 [ 86.422511] x26: fff00000c11d6000 x25: fff00000c5ee0740 x24: 1ffe000018bdc0e8 [ 86.422977] x23: fffd800018bdc0e8 x22: fff00000c5ee0618 x21: 1ffe000018bdc0c3 [ 86.423433] x20: 0000000000000000 x19: fff00000c5ee0400 x18: fff00000c8671800 [ 86.423881] x17: 0000000000000000 x16: fff00000c92dcc3c x15: fff00000ff616b48 [ 86.424335] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: fffd800019608e21 [ 86.424782] x11: 1ffe000019608e20 x10: fffd800019608e20 x9 : ffff97f86e388bbc [ 86.425323] x8 : ffff800080d579f8 x7 : 0000000000000001 x6 : ffff800080d57b10 [ 86.425735] x5 : 0000000000000001 x4 : 1ffe00001829ba21 x3 : dfff800000000000 [ 86.426165] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 86.426570] Call trace: [ 86.426734] ext4_mb_release+0x394/0xaf8 (P) [ 86.426993] mbt_kunit_exit+0x9c/0x2c8 [ 86.427247] kunit_try_run_case_cleanup+0x9c/0xe0 [ 86.427520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.427848] kthread+0x328/0x630 [ 86.428042] ret_from_fork+0x10/0x20 [ 86.428312] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 86.428568] ---[ end trace 0000000000000000 ]--- [ 107.819159] Internal error: Oops: 0000000096000005 [#20] SMP [ 107.824661] Modules linked in: [ 107.825043] CPU: 1 UID: 0 PID: 417 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 107.825558] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 107.825859] Hardware name: linux,dummy-virt (DT) [ 107.826124] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 107.826472] pc : ext4_mb_release+0x394/0xaf8 [ 107.826742] lr : ext4_mb_release+0x37c/0xaf8 [ 107.826964] sp : ffff800080d47c50 [ 107.827123] x29: ffff800080d47c60 x28: dfff800000000000 x27: 0000000000000000 [ 107.827582] x26: fff00000c1459000 x25: fff00000c5d62740 x24: 1ffe000018bac4e8 [ 107.828039] x23: fffd800018bac4e8 x22: fff00000c5d62618 x21: 1ffe000018bac4c3 [ 107.828489] x20: 0000000000000000 x19: fff00000c5d62400 x18: 00000000097759ce [ 107.828899] x17: 0000000000000000 x16: fff00000da46eda8 x15: 00000000905da6ea [ 107.829320] x14: 0000000031840e1b x13: 1ffe0000192bfcf4 x12: fffd800019034b81 [ 107.829734] x11: 1ffe000019034b80 x10: fffd800019034b80 x9 : ffff97f86e388bbc [ 107.830137] x8 : ffff800080d479f8 x7 : 0000000000000001 x6 : ffff800080d47b10 [ 107.830547] x5 : 0000000000000001 x4 : 1ffe000018baf511 x3 : dfff800000000000 [ 107.831002] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 107.831407] Call trace: [ 107.831582] ext4_mb_release+0x394/0xaf8 (P) [ 107.831849] mbt_kunit_exit+0x9c/0x2c8 [ 107.832059] kunit_try_run_case_cleanup+0x9c/0xe0 [ 107.832348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 107.832613] kthread+0x328/0x630 [ 107.832847] ret_from_fork+0x10/0x20 [ 107.833113] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 107.833411] ---[ end trace 0000000000000000 ]--- [ 64.550443] Internal error: Oops: 0000000096000005 [#3] SMP [ 64.555374] Modules linked in: [ 64.555830] CPU: 1 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.557020] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.557676] Hardware name: linux,dummy-virt (DT) [ 64.558204] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.559010] pc : ext4_mb_release+0x394/0xaf8 [ 64.559511] lr : ext4_mb_release+0x37c/0xaf8 [ 64.559995] sp : ffff800080cd7c50 [ 64.560331] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.561088] x26: fff00000c99f4000 x25: fff00000c5fb8740 x24: 1ffe000018bf70e8 [ 64.561949] x23: fffd800018bf70e8 x22: fff00000c5fb8618 x21: 1ffe000018bf70c3 [ 64.562875] x20: 0000000000000000 x19: fff00000c5fb8400 x18: 1ffff2ff0e0f2c32 [ 64.563725] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000000000007 [ 64.564470] x14: 00000000f1f1f1f1 x13: 1ffe0000192bfcf4 x12: fffd80001925bd01 [ 64.565385] x11: 1ffe00001925bd00 x10: fffd80001925bd00 x9 : ffff97f86e388bbc [ 64.566078] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10 [ 64.566493] x5 : 0000000000000001 x4 : 1ffe000018c8b799 x3 : dfff800000000000 [ 64.566844] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.567245] Call trace: [ 64.567409] ext4_mb_release+0x394/0xaf8 (P) [ 64.567670] mbt_kunit_exit+0x9c/0x2c8 [ 64.567895] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.568146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.568467] kthread+0x328/0x630 [ 64.568669] ret_from_fork+0x10/0x20 [ 64.568968] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.569374] ---[ end trace 0000000000000000 ]--- [ 64.736678] Internal error: Oops: 0000000096000005 [#9] SMP [ 64.743242] Modules linked in: [ 64.743954] CPU: 0 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.745399] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.745760] Hardware name: linux,dummy-virt (DT) [ 64.746172] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.746464] pc : ext4_mb_release+0x394/0xaf8 [ 64.746702] lr : ext4_mb_release+0x37c/0xaf8 [ 64.747496] sp : ffff800080cc7c50 [ 64.747722] x29: ffff800080cc7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.748182] x26: fff00000c152b000 x25: fff00000c9a5a740 x24: 1ffe00001934b4e8 [ 64.748622] x23: fffd80001934b4e8 x22: fff00000c9a5a618 x21: 1ffe00001934b4c3 [ 64.749928] x20: 0000000000000000 x19: fff00000c9a5a400 x18: 000000006bfd1d5d [ 64.750697] x17: 0000000000000001 x16: fff00000da44cda8 x15: 00000000c51d42c1 [ 64.751437] x14: 00000000ed0b7d3c x13: 1ffe0000192bfcc4 x12: fffd800018c48c81 [ 64.752177] x11: 1ffe000018c48c80 x10: fffd800018c48c80 x9 : ffff97f86e388bbc [ 64.753081] x8 : ffff800080cc79f8 x7 : 0000000000000001 x6 : ffff800080cc7b10 [ 64.753834] x5 : 0000000000000001 x4 : 1ffe000018bd5289 x3 : dfff800000000000 [ 64.754567] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.755090] Call trace: [ 64.755231] ext4_mb_release+0x394/0xaf8 (P) [ 64.755447] mbt_kunit_exit+0x9c/0x2c8 [ 64.755645] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.755956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.756479] kthread+0x328/0x630 [ 64.756852] ret_from_fork+0x10/0x20 [ 64.757317] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.758312] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 64.317887] ================================================================== [ 64.317962] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 64.317962] [ 64.318052] Use-after-free read at 0x000000007a4a5714 (in kfence-#187): [ 64.318105] test_krealloc+0x51c/0x830 [ 64.318150] kunit_try_run_case+0x170/0x3f0 [ 64.318200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.318245] kthread+0x328/0x630 [ 64.318287] ret_from_fork+0x10/0x20 [ 64.318329] [ 64.318353] kfence-#187: 0x000000007a4a5714-0x000000005885938b, size=32, cache=kmalloc-32 [ 64.318353] [ 64.318408] allocated by task 368 on cpu 1 at 64.317238s (0.001166s ago): [ 64.318478] test_alloc+0x29c/0x628 [ 64.318516] test_krealloc+0xc0/0x830 [ 64.318554] kunit_try_run_case+0x170/0x3f0 [ 64.318592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.318633] kthread+0x328/0x630 [ 64.318670] ret_from_fork+0x10/0x20 [ 64.318710] [ 64.318733] freed by task 368 on cpu 1 at 64.317493s (0.001236s ago): [ 64.318791] krealloc_noprof+0x148/0x360 [ 64.318840] test_krealloc+0x1dc/0x830 [ 64.318877] kunit_try_run_case+0x170/0x3f0 [ 64.318916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.318960] kthread+0x328/0x630 [ 64.318997] ret_from_fork+0x10/0x20 [ 64.319037] [ 64.319083] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.319168] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.319200] Hardware name: linux,dummy-virt (DT) [ 64.319234] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 64.237398] ================================================================== [ 64.237493] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.237493] [ 64.237588] Use-after-free read at 0x00000000a0f62836 (in kfence-#186): [ 64.237642] test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.237691] kunit_try_run_case+0x170/0x3f0 [ 64.237736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.237779] kthread+0x328/0x630 [ 64.237836] ret_from_fork+0x10/0x20 [ 64.237878] [ 64.237903] kfence-#186: 0x00000000a0f62836-0x00000000f717499d, size=32, cache=test [ 64.237903] [ 64.237955] allocated by task 366 on cpu 1 at 64.214985s (0.022966s ago): [ 64.238025] test_alloc+0x230/0x628 [ 64.238063] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 64.238104] kunit_try_run_case+0x170/0x3f0 [ 64.238143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.238188] kthread+0x328/0x630 [ 64.238225] ret_from_fork+0x10/0x20 [ 64.238264] [ 64.238287] freed by task 366 on cpu 1 at 64.215106s (0.023177s ago): [ 64.238343] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 64.238385] kunit_try_run_case+0x170/0x3f0 [ 64.238423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.238465] kthread+0x328/0x630 [ 64.238500] ret_from_fork+0x10/0x20 [ 64.238538] [ 64.238584] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 64.238669] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.238700] Hardware name: linux,dummy-virt (DT) [ 64.238735] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 41.149434] ================================================================== [ 41.149598] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 41.149598] [ 41.149701] Invalid read at 0x00000000f55a8b06: [ 41.149845] test_invalid_access+0xdc/0x1f0 [ 41.149926] kunit_try_run_case+0x170/0x3f0 [ 41.149986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.150037] kthread+0x328/0x630 [ 41.150086] ret_from_fork+0x10/0x20 [ 41.150147] [ 41.150206] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 41.150300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 41.150337] Hardware name: linux,dummy-virt (DT) [ 41.150377] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 35.821417] ================================================================== [ 35.821523] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.821523] [ 35.821621] Out-of-bounds write at 0x0000000053cd69ea (1B left of kfence-#133): [ 35.821687] test_out_of_bounds_write+0x100/0x240 [ 35.821737] kunit_try_run_case+0x170/0x3f0 [ 35.821785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.821848] kthread+0x328/0x630 [ 35.821888] ret_from_fork+0x10/0x20 [ 35.821931] [ 35.821955] kfence-#133: 0x00000000b870e193-0x0000000022b06c48, size=32, cache=test [ 35.821955] [ 35.822013] allocated by task 324 on cpu 1 at 35.821327s (0.000682s ago): [ 35.822090] test_alloc+0x230/0x628 [ 35.822133] test_out_of_bounds_write+0xc8/0x240 [ 35.822180] kunit_try_run_case+0x170/0x3f0 [ 35.822222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.822270] kthread+0x328/0x630 [ 35.822308] ret_from_fork+0x10/0x20 [ 35.822348] [ 35.822392] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 35.822492] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.822528] Hardware name: linux,dummy-virt (DT) [ 35.822565] ================================================================== [ 35.613441] ================================================================== [ 35.613558] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.613558] [ 35.613663] Out-of-bounds write at 0x000000009bfd6f22 (1B left of kfence-#131): [ 35.613732] test_out_of_bounds_write+0x100/0x240 [ 35.613783] kunit_try_run_case+0x170/0x3f0 [ 35.613849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.613898] kthread+0x328/0x630 [ 35.613940] ret_from_fork+0x10/0x20 [ 35.613986] [ 35.614012] kfence-#131: 0x00000000083c2ac4-0x00000000dfe75337, size=32, cache=kmalloc-32 [ 35.614012] [ 35.614077] allocated by task 322 on cpu 1 at 35.613269s (0.000804s ago): [ 35.614155] test_alloc+0x29c/0x628 [ 35.614205] test_out_of_bounds_write+0xc8/0x240 [ 35.614248] kunit_try_run_case+0x170/0x3f0 [ 35.614291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.614340] kthread+0x328/0x630 [ 35.614378] ret_from_fork+0x10/0x20 [ 35.614421] [ 35.614468] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 35.614570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.614606] Hardware name: linux,dummy-virt (DT) [ 35.614645] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 40.917502] ================================================================== [ 40.917594] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.917594] [ 40.917658] Corrupted memory at 0x000000005057b64a [ ! . . . . . . . . . . . . . . . ] (in kfence-#182): [ 40.917980] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.918029] kunit_try_run_case+0x170/0x3f0 [ 40.918073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.918115] kthread+0x328/0x630 [ 40.918154] ret_from_fork+0x10/0x20 [ 40.918200] [ 40.918225] kfence-#182: 0x000000003fc5fb02-0x000000007dccb406, size=73, cache=kmalloc-96 [ 40.918225] [ 40.918281] allocated by task 356 on cpu 0 at 40.917258s (0.001018s ago): [ 40.918345] test_alloc+0x29c/0x628 [ 40.918384] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 40.918425] kunit_try_run_case+0x170/0x3f0 [ 40.918465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.918508] kthread+0x328/0x630 [ 40.918544] ret_from_fork+0x10/0x20 [ 40.918585] [ 40.918608] freed by task 356 on cpu 0 at 40.917404s (0.001200s ago): [ 40.918668] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.918710] kunit_try_run_case+0x170/0x3f0 [ 40.918750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.918793] kthread+0x328/0x630 [ 40.918839] ret_from_fork+0x10/0x20 [ 40.918879] [ 40.918927] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 40.919013] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 40.919044] Hardware name: linux,dummy-virt (DT) [ 40.919079] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 40.813540] ================================================================== [ 40.813630] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 40.813630] [ 40.813729] Out-of-bounds read at 0x00000000e74cd9b8 (105B right of kfence-#181): [ 40.813786] test_kmalloc_aligned_oob_read+0x238/0x468 [ 40.813855] kunit_try_run_case+0x170/0x3f0 [ 40.813903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.813950] kthread+0x328/0x630 [ 40.813993] ret_from_fork+0x10/0x20 [ 40.814036] [ 40.814060] kfence-#181: 0x00000000c423265b-0x0000000061530d2d, size=73, cache=kmalloc-96 [ 40.814060] [ 40.814114] allocated by task 354 on cpu 1 at 40.813280s (0.000830s ago): [ 40.814194] test_alloc+0x29c/0x628 [ 40.814237] test_kmalloc_aligned_oob_read+0x100/0x468 [ 40.814282] kunit_try_run_case+0x170/0x3f0 [ 40.814321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.814366] kthread+0x328/0x630 [ 40.814403] ret_from_fork+0x10/0x20 [ 40.814446] [ 40.814494] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 40.814579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 40.814610] Hardware name: linux,dummy-virt (DT) [ 40.814644] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 36.757430] ================================================================== [ 36.757524] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 36.757524] [ 36.757589] Corrupted memory at 0x000000001bd21cfc [ ! . . . . . . . . . . . . . . . ] (in kfence-#142): [ 36.757921] test_corruption+0x278/0x378 [ 36.757969] kunit_try_run_case+0x170/0x3f0 [ 36.758016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.758063] kthread+0x328/0x630 [ 36.758105] ret_from_fork+0x10/0x20 [ 36.758148] [ 36.758178] kfence-#142: 0x0000000090bfe3fa-0x000000006479973c, size=32, cache=kmalloc-32 [ 36.758178] [ 36.758239] allocated by task 342 on cpu 1 at 36.757238s (0.000997s ago): [ 36.758306] test_alloc+0x29c/0x628 [ 36.758345] test_corruption+0xdc/0x378 [ 36.758385] kunit_try_run_case+0x170/0x3f0 [ 36.758425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.758470] kthread+0x328/0x630 [ 36.758506] ret_from_fork+0x10/0x20 [ 36.758546] [ 36.758569] freed by task 342 on cpu 1 at 36.757339s (0.001226s ago): [ 36.758632] test_corruption+0x278/0x378 [ 36.758670] kunit_try_run_case+0x170/0x3f0 [ 36.758711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.758754] kthread+0x328/0x630 [ 36.758792] ret_from_fork+0x10/0x20 [ 36.758841] [ 36.758888] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.758979] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.759012] Hardware name: linux,dummy-virt (DT) [ 36.759048] ================================================================== [ 36.861564] ================================================================== [ 36.861660] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 36.861660] [ 36.861723] Corrupted memory at 0x00000000a4b50782 [ ! ] (in kfence-#143): [ 36.861871] test_corruption+0x284/0x378 [ 36.861918] kunit_try_run_case+0x170/0x3f0 [ 36.861962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.862007] kthread+0x328/0x630 [ 36.862045] ret_from_fork+0x10/0x20 [ 36.862086] [ 36.862112] kfence-#143: 0x000000009979f4de-0x000000003dfa6911, size=32, cache=kmalloc-32 [ 36.862112] [ 36.862175] allocated by task 342 on cpu 1 at 36.861299s (0.000872s ago): [ 36.862240] test_alloc+0x29c/0x628 [ 36.862280] test_corruption+0x198/0x378 [ 36.862320] kunit_try_run_case+0x170/0x3f0 [ 36.862362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.862407] kthread+0x328/0x630 [ 36.862444] ret_from_fork+0x10/0x20 [ 36.862484] [ 36.862507] freed by task 342 on cpu 1 at 36.861396s (0.001107s ago): [ 36.862570] test_corruption+0x284/0x378 [ 36.862608] kunit_try_run_case+0x170/0x3f0 [ 36.862650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.862694] kthread+0x328/0x630 [ 36.862730] ret_from_fork+0x10/0x20 [ 36.862770] [ 36.862822] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.862911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.862945] Hardware name: linux,dummy-virt (DT) [ 36.862981] ================================================================== [ 37.901453] ================================================================== [ 37.901556] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 37.901556] [ 37.901619] Corrupted memory at 0x0000000067e14ac7 [ ! ] (in kfence-#153): [ 37.901740] test_corruption+0x1d8/0x378 [ 37.901788] kunit_try_run_case+0x170/0x3f0 [ 37.901851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.901898] kthread+0x328/0x630 [ 37.901939] ret_from_fork+0x10/0x20 [ 37.901982] [ 37.902007] kfence-#153: 0x00000000bd377903-0x00000000205a1aa5, size=32, cache=test [ 37.902007] [ 37.902066] allocated by task 344 on cpu 1 at 37.901300s (0.000762s ago): [ 37.902132] test_alloc+0x230/0x628 [ 37.902177] test_corruption+0x198/0x378 [ 37.902216] kunit_try_run_case+0x170/0x3f0 [ 37.902258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.902304] kthread+0x328/0x630 [ 37.902342] ret_from_fork+0x10/0x20 [ 37.902382] [ 37.902405] freed by task 344 on cpu 1 at 37.901363s (0.001038s ago): [ 37.902468] test_corruption+0x1d8/0x378 [ 37.902508] kunit_try_run_case+0x170/0x3f0 [ 37.902550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.902595] kthread+0x328/0x630 [ 37.902632] ret_from_fork+0x10/0x20 [ 37.902674] [ 37.902718] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 37.902802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.902841] Hardware name: linux,dummy-virt (DT) [ 37.902876] ================================================================== [ 36.965410] ================================================================== [ 36.965507] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 36.965507] [ 36.965571] Corrupted memory at 0x00000000604ec11e [ ! . . . . . . . . . . . . . . . ] (in kfence-#144): [ 36.965899] test_corruption+0x120/0x378 [ 36.965948] kunit_try_run_case+0x170/0x3f0 [ 36.965995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.966040] kthread+0x328/0x630 [ 36.966081] ret_from_fork+0x10/0x20 [ 36.966121] [ 36.966145] kfence-#144: 0x00000000f953b82f-0x00000000bb61341a, size=32, cache=test [ 36.966145] [ 36.966215] allocated by task 344 on cpu 1 at 36.965268s (0.000943s ago): [ 36.966280] test_alloc+0x230/0x628 [ 36.966319] test_corruption+0xdc/0x378 [ 36.966358] kunit_try_run_case+0x170/0x3f0 [ 36.966400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.966446] kthread+0x328/0x630 [ 36.966483] ret_from_fork+0x10/0x20 [ 36.966522] [ 36.966545] freed by task 344 on cpu 1 at 36.965326s (0.001216s ago): [ 36.966609] test_corruption+0x120/0x378 [ 36.966648] kunit_try_run_case+0x170/0x3f0 [ 36.966688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.966734] kthread+0x328/0x630 [ 36.966773] ret_from_fork+0x10/0x20 [ 36.966821] [ 36.966867] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.966956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.966989] Hardware name: linux,dummy-virt (DT) [ 36.967024] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 36.549355] ================================================================== [ 36.549446] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 36.549446] [ 36.549506] Invalid free of 0x00000000f96d4fdc (in kfence-#140): [ 36.549560] test_invalid_addr_free+0x1ac/0x238 [ 36.549607] kunit_try_run_case+0x170/0x3f0 [ 36.549650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.549694] kthread+0x328/0x630 [ 36.549733] ret_from_fork+0x10/0x20 [ 36.549773] [ 36.549796] kfence-#140: 0x000000001ec91793-0x000000004221a667, size=32, cache=kmalloc-32 [ 36.549796] [ 36.549868] allocated by task 338 on cpu 0 at 36.549221s (0.000643s ago): [ 36.549929] test_alloc+0x29c/0x628 [ 36.549970] test_invalid_addr_free+0xd4/0x238 [ 36.550011] kunit_try_run_case+0x170/0x3f0 [ 36.550051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.550092] kthread+0x328/0x630 [ 36.550129] ret_from_fork+0x10/0x20 [ 36.550172] [ 36.550218] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.550303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.550332] Hardware name: linux,dummy-virt (DT) [ 36.550366] ================================================================== [ 36.653393] ================================================================== [ 36.653487] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 36.653487] [ 36.653548] Invalid free of 0x0000000065f44038 (in kfence-#141): [ 36.653600] test_invalid_addr_free+0xec/0x238 [ 36.653646] kunit_try_run_case+0x170/0x3f0 [ 36.653689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.653732] kthread+0x328/0x630 [ 36.653771] ret_from_fork+0x10/0x20 [ 36.653810] [ 36.653851] kfence-#141: 0x0000000076c447fe-0x00000000ee8eba07, size=32, cache=test [ 36.653851] [ 36.653906] allocated by task 340 on cpu 0 at 36.653275s (0.000628s ago): [ 36.653969] test_alloc+0x230/0x628 [ 36.654006] test_invalid_addr_free+0xd4/0x238 [ 36.654046] kunit_try_run_case+0x170/0x3f0 [ 36.654086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.654129] kthread+0x328/0x630 [ 36.654172] ret_from_fork+0x10/0x20 [ 36.654212] [ 36.654254] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.654340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.654370] Hardware name: linux,dummy-virt (DT) [ 36.654405] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 36.445585] ================================================================== [ 36.445685] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 36.445685] [ 36.445748] Invalid free of 0x00000000a4abf1a1 (in kfence-#139): [ 36.445807] test_double_free+0x100/0x238 [ 36.445870] kunit_try_run_case+0x170/0x3f0 [ 36.445915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.445962] kthread+0x328/0x630 [ 36.446001] ret_from_fork+0x10/0x20 [ 36.446043] [ 36.446067] kfence-#139: 0x00000000a4abf1a1-0x000000002b8c9777, size=32, cache=test [ 36.446067] [ 36.446127] allocated by task 336 on cpu 1 at 36.445384s (0.000740s ago): [ 36.446201] test_alloc+0x230/0x628 [ 36.446242] test_double_free+0xd4/0x238 [ 36.446283] kunit_try_run_case+0x170/0x3f0 [ 36.446325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.446371] kthread+0x328/0x630 [ 36.446407] ret_from_fork+0x10/0x20 [ 36.446447] [ 36.446473] freed by task 336 on cpu 1 at 36.445446s (0.001023s ago): [ 36.446539] test_double_free+0xf0/0x238 [ 36.446581] kunit_try_run_case+0x170/0x3f0 [ 36.446624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.446671] kthread+0x328/0x630 [ 36.446709] ret_from_fork+0x10/0x20 [ 36.446750] [ 36.446793] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.446896] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.446929] Hardware name: linux,dummy-virt (DT) [ 36.446966] ================================================================== [ 36.341614] ================================================================== [ 36.341746] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 36.341746] [ 36.341837] Invalid free of 0x000000002f0f3e04 (in kfence-#138): [ 36.341909] test_double_free+0x1bc/0x238 [ 36.341960] kunit_try_run_case+0x170/0x3f0 [ 36.342007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.342053] kthread+0x328/0x630 [ 36.342096] ret_from_fork+0x10/0x20 [ 36.342138] [ 36.342168] kfence-#138: 0x000000002f0f3e04-0x00000000fd09caa5, size=32, cache=kmalloc-32 [ 36.342168] [ 36.342231] allocated by task 334 on cpu 1 at 36.341385s (0.000842s ago): [ 36.342299] test_alloc+0x29c/0x628 [ 36.342341] test_double_free+0xd4/0x238 [ 36.342382] kunit_try_run_case+0x170/0x3f0 [ 36.342421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.342468] kthread+0x328/0x630 [ 36.342506] ret_from_fork+0x10/0x20 [ 36.342547] [ 36.342571] freed by task 334 on cpu 1 at 36.341457s (0.001110s ago): [ 36.342635] test_double_free+0x1ac/0x238 [ 36.342676] kunit_try_run_case+0x170/0x3f0 [ 36.342715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.342760] kthread+0x328/0x630 [ 36.342797] ret_from_fork+0x10/0x20 [ 36.342848] [ 36.342894] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.342986] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.343021] Hardware name: linux,dummy-virt (DT) [ 36.343055] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 35.925804] ================================================================== [ 35.925936] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.925936] [ 35.926039] Use-after-free read at 0x00000000fbe21db5 (in kfence-#134): [ 35.926094] test_use_after_free_read+0x114/0x248 [ 35.926139] kunit_try_run_case+0x170/0x3f0 [ 35.926189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.926233] kthread+0x328/0x630 [ 35.926271] ret_from_fork+0x10/0x20 [ 35.926310] [ 35.926336] kfence-#134: 0x00000000fbe21db5-0x00000000a6fc4aad, size=32, cache=kmalloc-32 [ 35.926336] [ 35.926390] allocated by task 326 on cpu 0 at 35.925565s (0.000821s ago): [ 35.926459] test_alloc+0x29c/0x628 [ 35.926497] test_use_after_free_read+0xd0/0x248 [ 35.926538] kunit_try_run_case+0x170/0x3f0 [ 35.926578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.926622] kthread+0x328/0x630 [ 35.926659] ret_from_fork+0x10/0x20 [ 35.926700] [ 35.926723] freed by task 326 on cpu 0 at 35.925611s (0.001109s ago): [ 35.926785] test_use_after_free_read+0x1c0/0x248 [ 35.926838] kunit_try_run_case+0x170/0x3f0 [ 35.926878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.926920] kthread+0x328/0x630 [ 35.926957] ret_from_fork+0x10/0x20 [ 35.926997] [ 35.927044] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 35.927131] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.927163] Hardware name: linux,dummy-virt (DT) [ 35.927197] ================================================================== [ 36.029472] ================================================================== [ 36.029573] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.029573] [ 36.029667] Use-after-free read at 0x0000000021596b64 (in kfence-#135): [ 36.029724] test_use_after_free_read+0x114/0x248 [ 36.029771] kunit_try_run_case+0x170/0x3f0 [ 36.029834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.029880] kthread+0x328/0x630 [ 36.029923] ret_from_fork+0x10/0x20 [ 36.029964] [ 36.029988] kfence-#135: 0x0000000021596b64-0x0000000068348a9d, size=32, cache=test [ 36.029988] [ 36.030046] allocated by task 328 on cpu 1 at 36.029274s (0.000767s ago): [ 36.030121] test_alloc+0x230/0x628 [ 36.030167] test_use_after_free_read+0xd0/0x248 [ 36.030209] kunit_try_run_case+0x170/0x3f0 [ 36.030251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.030295] kthread+0x328/0x630 [ 36.030334] ret_from_fork+0x10/0x20 [ 36.030373] [ 36.030398] freed by task 328 on cpu 1 at 36.029339s (0.001055s ago): [ 36.030499] test_use_after_free_read+0xf0/0x248 [ 36.030545] kunit_try_run_case+0x170/0x3f0 [ 36.030589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.030634] kthread+0x328/0x630 [ 36.030673] ret_from_fork+0x10/0x20 [ 36.030714] [ 36.030762] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 36.030870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.030904] Hardware name: linux,dummy-virt (DT) [ 36.030941] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 34.678703] ================================================================== [ 34.678800] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.678800] [ 34.678898] Out-of-bounds read at 0x00000000c93ede63 (32B right of kfence-#122): [ 34.679043] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.679139] kunit_try_run_case+0x170/0x3f0 [ 34.679525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.679597] kthread+0x328/0x630 [ 34.679640] ret_from_fork+0x10/0x20 [ 34.679727] [ 34.679753] kfence-#122: 0x00000000087804b4-0x000000009585f1a3, size=32, cache=test [ 34.679753] [ 34.679879] allocated by task 320 on cpu 1 at 34.678565s (0.001258s ago): [ 34.679979] test_alloc+0x230/0x628 [ 34.680069] test_out_of_bounds_read+0x198/0x3e0 [ 34.680113] kunit_try_run_case+0x170/0x3f0 [ 34.680440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.680551] kthread+0x328/0x630 [ 34.680595] ret_from_fork+0x10/0x20 [ 34.680689] [ 34.680754] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 34.680938] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.680987] Hardware name: linux,dummy-virt (DT) [ 34.681332] ================================================================== [ 34.367039] ================================================================== [ 34.367159] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.367159] [ 34.367669] Out-of-bounds read at 0x0000000029514a75 (32B right of kfence-#119): [ 34.367792] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.367910] kunit_try_run_case+0x170/0x3f0 [ 34.367973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.368040] kthread+0x328/0x630 [ 34.368083] ret_from_fork+0x10/0x20 [ 34.368315] [ 34.368547] kfence-#119: 0x00000000e2b0f1e2-0x00000000945bcb18, size=32, cache=kmalloc-32 [ 34.368547] [ 34.368798] allocated by task 318 on cpu 1 at 34.366307s (0.002418s ago): [ 34.368891] test_alloc+0x29c/0x628 [ 34.369417] test_out_of_bounds_read+0x198/0x3e0 [ 34.369632] kunit_try_run_case+0x170/0x3f0 [ 34.370143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.370260] kthread+0x328/0x630 [ 34.370334] ret_from_fork+0x10/0x20 [ 34.370708] [ 34.370762] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 34.370926] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.370968] Hardware name: linux,dummy-virt (DT) [ 34.371035] ================================================================== [ 33.744253] ================================================================== [ 33.744376] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.744376] [ 33.744509] Out-of-bounds read at 0x00000000c2b32c4b (1B left of kfence-#113): [ 33.745854] test_out_of_bounds_read+0x114/0x3e0 [ 33.746015] kunit_try_run_case+0x170/0x3f0 [ 33.746071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.746624] kthread+0x328/0x630 [ 33.746761] ret_from_fork+0x10/0x20 [ 33.746924] [ 33.747012] kfence-#113: 0x00000000249672b8-0x000000008095ed79, size=32, cache=kmalloc-32 [ 33.747012] [ 33.747153] allocated by task 318 on cpu 1 at 33.743024s (0.004106s ago): [ 33.747350] test_alloc+0x29c/0x628 [ 33.747456] test_out_of_bounds_read+0xdc/0x3e0 [ 33.747587] kunit_try_run_case+0x170/0x3f0 [ 33.747644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.747709] kthread+0x328/0x630 [ 33.748049] ret_from_fork+0x10/0x20 [ 33.748214] [ 33.748431] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.748669] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.748709] Hardware name: linux,dummy-virt (DT) [ 33.748747] ================================================================== [ 34.472441] ================================================================== [ 34.472522] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.472522] [ 34.472742] Out-of-bounds read at 0x00000000a6ddd57d (1B left of kfence-#120): [ 34.472805] test_out_of_bounds_read+0x114/0x3e0 [ 34.472869] kunit_try_run_case+0x170/0x3f0 [ 34.473333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.473513] kthread+0x328/0x630 [ 34.473580] ret_from_fork+0x10/0x20 [ 34.473713] [ 34.473739] kfence-#120: 0x00000000a64a5998-0x00000000df1515cb, size=32, cache=test [ 34.473739] [ 34.474161] allocated by task 320 on cpu 1 at 34.472327s (0.001799s ago): [ 34.474698] test_alloc+0x230/0x628 [ 34.475179] test_out_of_bounds_read+0xdc/0x3e0 [ 34.475400] kunit_try_run_case+0x170/0x3f0 [ 34.475643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.475755] kthread+0x328/0x630 [ 34.476138] ret_from_fork+0x10/0x20 [ 34.476458] [ 34.476789] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 34.477856] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.478407] Hardware name: linux,dummy-virt (DT) [ 34.478505] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_in_memset
[ 30.341393] ================================================================== [ 30.341623] BUG: KFENCE: memory corruption in kmalloc_oob_in_memset+0x160/0x2d0 [ 30.341623] [ 30.342013] Corrupted memory at 0x00000000de715e1e [ ! ! ! ! ! ! ! ! . . . . . . . . ] (in kfence-#90): [ 30.345298] kmalloc_oob_in_memset+0x160/0x2d0 [ 30.345505] kunit_try_run_case+0x170/0x3f0 [ 30.345762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.345909] kthread+0x328/0x630 [ 30.345996] ret_from_fork+0x10/0x20 [ 30.346077] [ 30.346991] kfence-#90: 0x0000000095db6084-0x00000000c9aaf235, size=120, cache=kmalloc-128 [ 30.346991] [ 30.347651] allocated by task 201 on cpu 1 at 30.339432s (0.007826s ago): [ 30.347991] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.348443] kunit_try_run_case+0x170/0x3f0 [ 30.348528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.348954] kthread+0x328/0x630 [ 30.349000] ret_from_fork+0x10/0x20 [ 30.349655] [ 30.350038] freed by task 201 on cpu 1 at 30.340122s (0.009709s ago): [ 30.350461] kmalloc_oob_in_memset+0x160/0x2d0 [ 30.350586] kunit_try_run_case+0x170/0x3f0 [ 30.350711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.350858] kthread+0x328/0x630 [ 30.350896] ret_from_fork+0x10/0x20 [ 30.351023] [ 30.351488] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.351834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.351990] Hardware name: linux,dummy-virt (DT) [ 30.352210] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 33.558895] ================================================================== [ 33.559400] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 33.559503] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.559725] [ 33.559920] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.560192] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.560267] Hardware name: linux,dummy-virt (DT) [ 33.560324] Call trace: [ 33.560412] show_stack+0x20/0x38 (C) [ 33.560469] dump_stack_lvl+0x8c/0xd0 [ 33.560904] print_report+0x118/0x5e8 [ 33.561407] kasan_report+0xdc/0x128 [ 33.561589] kasan_check_range+0x100/0x1a8 [ 33.561689] __kasan_check_write+0x20/0x30 [ 33.561745] strncpy_from_user+0x3c/0x2a0 [ 33.561997] copy_user_test_oob+0x5c0/0xec8 [ 33.562310] kunit_try_run_case+0x170/0x3f0 [ 33.562576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.562825] kthread+0x328/0x630 [ 33.562884] ret_from_fork+0x10/0x20 [ 33.563294] [ 33.563349] Allocated by task 316: [ 33.563397] kasan_save_stack+0x3c/0x68 [ 33.563748] kasan_save_track+0x20/0x40 [ 33.563979] kasan_save_alloc_info+0x40/0x58 [ 33.564050] __kasan_kmalloc+0xd4/0xd8 [ 33.564271] __kmalloc_noprof+0x198/0x4c8 [ 33.564332] kunit_kmalloc_array+0x34/0x88 [ 33.564553] copy_user_test_oob+0xac/0xec8 [ 33.564926] kunit_try_run_case+0x170/0x3f0 [ 33.565173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.565452] kthread+0x328/0x630 [ 33.565826] ret_from_fork+0x10/0x20 [ 33.565977] [ 33.566087] The buggy address belongs to the object at fff00000c922a400 [ 33.566087] which belongs to the cache kmalloc-128 of size 128 [ 33.566485] The buggy address is located 0 bytes inside of [ 33.566485] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.566842] [ 33.566961] The buggy address belongs to the physical page: [ 33.567238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.567563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.567775] page_type: f5(slab) [ 33.568177] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.568267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.568653] page dumped because: kasan: bad access detected [ 33.568799] [ 33.568845] Memory state around the buggy address: [ 33.568908] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.568974] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.569382] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.569482] ^ [ 33.569527] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.569573] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.569965] ================================================================== [ 33.571545] ================================================================== [ 33.571599] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 33.571658] Write of size 1 at addr fff00000c922a478 by task kunit_try_catch/316 [ 33.571719] [ 33.571752] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.571859] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.571897] Hardware name: linux,dummy-virt (DT) [ 33.571930] Call trace: [ 33.571954] show_stack+0x20/0x38 (C) [ 33.572006] dump_stack_lvl+0x8c/0xd0 [ 33.572053] print_report+0x118/0x5e8 [ 33.572101] kasan_report+0xdc/0x128 [ 33.572166] __asan_report_store1_noabort+0x20/0x30 [ 33.572219] strncpy_from_user+0x270/0x2a0 [ 33.572266] copy_user_test_oob+0x5c0/0xec8 [ 33.572323] kunit_try_run_case+0x170/0x3f0 [ 33.572372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572425] kthread+0x328/0x630 [ 33.572477] ret_from_fork+0x10/0x20 [ 33.572528] [ 33.572548] Allocated by task 316: [ 33.572579] kasan_save_stack+0x3c/0x68 [ 33.572623] kasan_save_track+0x20/0x40 [ 33.572661] kasan_save_alloc_info+0x40/0x58 [ 33.572701] __kasan_kmalloc+0xd4/0xd8 [ 33.572739] __kmalloc_noprof+0x198/0x4c8 [ 33.572780] kunit_kmalloc_array+0x34/0x88 [ 33.573278] copy_user_test_oob+0xac/0xec8 [ 33.573338] kunit_try_run_case+0x170/0x3f0 [ 33.573384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.573431] kthread+0x328/0x630 [ 33.573466] ret_from_fork+0x10/0x20 [ 33.573507] [ 33.573529] The buggy address belongs to the object at fff00000c922a400 [ 33.573529] which belongs to the cache kmalloc-128 of size 128 [ 33.573590] The buggy address is located 0 bytes to the right of [ 33.573590] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.573656] [ 33.573679] The buggy address belongs to the physical page: [ 33.573715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.573771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.573833] page_type: f5(slab) [ 33.573872] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.573924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.573963] page dumped because: kasan: bad access detected [ 33.573996] [ 33.574016] Memory state around the buggy address: [ 33.574049] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.574094] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.574138] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.574180] ^ [ 33.574221] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.574282] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.574322] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 33.545615] ================================================================== [ 33.545667] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 33.545721] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.545774] [ 33.546143] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.546379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.546415] Hardware name: linux,dummy-virt (DT) [ 33.546465] Call trace: [ 33.546492] show_stack+0x20/0x38 (C) [ 33.547050] dump_stack_lvl+0x8c/0xd0 [ 33.547135] print_report+0x118/0x5e8 [ 33.547182] kasan_report+0xdc/0x128 [ 33.547399] kasan_check_range+0x100/0x1a8 [ 33.547462] __kasan_check_read+0x20/0x30 [ 33.547539] copy_user_test_oob+0x4a0/0xec8 [ 33.547653] kunit_try_run_case+0x170/0x3f0 [ 33.547702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.547753] kthread+0x328/0x630 [ 33.547983] ret_from_fork+0x10/0x20 [ 33.548385] [ 33.548422] Allocated by task 316: [ 33.548459] kasan_save_stack+0x3c/0x68 [ 33.548615] kasan_save_track+0x20/0x40 [ 33.548667] kasan_save_alloc_info+0x40/0x58 [ 33.548848] __kasan_kmalloc+0xd4/0xd8 [ 33.549420] __kmalloc_noprof+0x198/0x4c8 [ 33.549472] kunit_kmalloc_array+0x34/0x88 [ 33.549698] copy_user_test_oob+0xac/0xec8 [ 33.549989] kunit_try_run_case+0x170/0x3f0 [ 33.550373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.550850] kthread+0x328/0x630 [ 33.551091] ret_from_fork+0x10/0x20 [ 33.551181] [ 33.551204] The buggy address belongs to the object at fff00000c922a400 [ 33.551204] which belongs to the cache kmalloc-128 of size 128 [ 33.551751] The buggy address is located 0 bytes inside of [ 33.551751] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.552093] [ 33.552138] The buggy address belongs to the physical page: [ 33.552451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.553048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.553242] page_type: f5(slab) [ 33.553724] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.553971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.554200] page dumped because: kasan: bad access detected [ 33.554261] [ 33.554592] Memory state around the buggy address: [ 33.554743] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.554871] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.555058] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.555143] ^ [ 33.555390] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.555501] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.555746] ================================================================== [ 33.534741] ================================================================== [ 33.535229] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 33.535312] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.535365] [ 33.535678] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.535792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.535893] Hardware name: linux,dummy-virt (DT) [ 33.535951] Call trace: [ 33.535976] show_stack+0x20/0x38 (C) [ 33.536030] dump_stack_lvl+0x8c/0xd0 [ 33.536382] print_report+0x118/0x5e8 [ 33.536487] kasan_report+0xdc/0x128 [ 33.536541] kasan_check_range+0x100/0x1a8 [ 33.536587] __kasan_check_write+0x20/0x30 [ 33.537049] copy_user_test_oob+0x434/0xec8 [ 33.537198] kunit_try_run_case+0x170/0x3f0 [ 33.537392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.537594] kthread+0x328/0x630 [ 33.537664] ret_from_fork+0x10/0x20 [ 33.537922] [ 33.538155] Allocated by task 316: [ 33.538251] kasan_save_stack+0x3c/0x68 [ 33.538406] kasan_save_track+0x20/0x40 [ 33.538449] kasan_save_alloc_info+0x40/0x58 [ 33.538673] __kasan_kmalloc+0xd4/0xd8 [ 33.538940] __kmalloc_noprof+0x198/0x4c8 [ 33.539009] kunit_kmalloc_array+0x34/0x88 [ 33.539245] copy_user_test_oob+0xac/0xec8 [ 33.539509] kunit_try_run_case+0x170/0x3f0 [ 33.539704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.539932] kthread+0x328/0x630 [ 33.540182] ret_from_fork+0x10/0x20 [ 33.540260] [ 33.540503] The buggy address belongs to the object at fff00000c922a400 [ 33.540503] which belongs to the cache kmalloc-128 of size 128 [ 33.540776] The buggy address is located 0 bytes inside of [ 33.540776] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.541275] [ 33.541341] The buggy address belongs to the physical page: [ 33.541400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.541698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.541868] page_type: f5(slab) [ 33.542081] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.542229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.542381] page dumped because: kasan: bad access detected [ 33.542585] [ 33.542771] Memory state around the buggy address: [ 33.542853] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.542903] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543471] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.543560] ^ [ 33.543846] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543983] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.544072] ================================================================== [ 33.524992] ================================================================== [ 33.525218] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 33.525417] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.525511] [ 33.525564] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.525782] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.525945] Hardware name: linux,dummy-virt (DT) [ 33.526008] Call trace: [ 33.526191] show_stack+0x20/0x38 (C) [ 33.526336] dump_stack_lvl+0x8c/0xd0 [ 33.526747] print_report+0x118/0x5e8 [ 33.526944] kasan_report+0xdc/0x128 [ 33.527022] kasan_check_range+0x100/0x1a8 [ 33.527153] __kasan_check_read+0x20/0x30 [ 33.527259] copy_user_test_oob+0x3c8/0xec8 [ 33.527309] kunit_try_run_case+0x170/0x3f0 [ 33.527853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.528159] kthread+0x328/0x630 [ 33.528267] ret_from_fork+0x10/0x20 [ 33.528439] [ 33.528501] Allocated by task 316: [ 33.528537] kasan_save_stack+0x3c/0x68 [ 33.528718] kasan_save_track+0x20/0x40 [ 33.529010] kasan_save_alloc_info+0x40/0x58 [ 33.529304] __kasan_kmalloc+0xd4/0xd8 [ 33.529363] __kmalloc_noprof+0x198/0x4c8 [ 33.529994] kunit_kmalloc_array+0x34/0x88 [ 33.530109] copy_user_test_oob+0xac/0xec8 [ 33.530161] kunit_try_run_case+0x170/0x3f0 [ 33.530201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.530467] kthread+0x328/0x630 [ 33.530883] ret_from_fork+0x10/0x20 [ 33.531029] [ 33.531252] The buggy address belongs to the object at fff00000c922a400 [ 33.531252] which belongs to the cache kmalloc-128 of size 128 [ 33.531567] The buggy address is located 0 bytes inside of [ 33.531567] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.531874] [ 33.531905] The buggy address belongs to the physical page: [ 33.531941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.531998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.532050] page_type: f5(slab) [ 33.532158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.532227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.532273] page dumped because: kasan: bad access detected [ 33.532304] [ 33.532324] Memory state around the buggy address: [ 33.532359] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.532412] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.532465] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.532525] ^ [ 33.532567] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.532627] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.532667] ================================================================== [ 33.474100] ================================================================== [ 33.474204] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 33.474707] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.474809] [ 33.474949] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.475647] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.475691] Hardware name: linux,dummy-virt (DT) [ 33.475747] Call trace: [ 33.475910] show_stack+0x20/0x38 (C) [ 33.475997] dump_stack_lvl+0x8c/0xd0 [ 33.476406] print_report+0x118/0x5e8 [ 33.476469] kasan_report+0xdc/0x128 [ 33.476515] kasan_check_range+0x100/0x1a8 [ 33.476738] __kasan_check_write+0x20/0x30 [ 33.476930] copy_user_test_oob+0x234/0xec8 [ 33.477132] kunit_try_run_case+0x170/0x3f0 [ 33.477246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.477387] kthread+0x328/0x630 [ 33.477438] ret_from_fork+0x10/0x20 [ 33.477490] [ 33.477513] Allocated by task 316: [ 33.477548] kasan_save_stack+0x3c/0x68 [ 33.478036] kasan_save_track+0x20/0x40 [ 33.478122] kasan_save_alloc_info+0x40/0x58 [ 33.478271] __kasan_kmalloc+0xd4/0xd8 [ 33.478353] __kmalloc_noprof+0x198/0x4c8 [ 33.478584] kunit_kmalloc_array+0x34/0x88 [ 33.478737] copy_user_test_oob+0xac/0xec8 [ 33.478883] kunit_try_run_case+0x170/0x3f0 [ 33.479036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.479133] kthread+0x328/0x630 [ 33.479254] ret_from_fork+0x10/0x20 [ 33.479303] [ 33.479326] The buggy address belongs to the object at fff00000c922a400 [ 33.479326] which belongs to the cache kmalloc-128 of size 128 [ 33.479608] The buggy address is located 0 bytes inside of [ 33.479608] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.479770] [ 33.479868] The buggy address belongs to the physical page: [ 33.480457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.480651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.480952] page_type: f5(slab) [ 33.481041] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.481097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.481141] page dumped because: kasan: bad access detected [ 33.481196] [ 33.481541] Memory state around the buggy address: [ 33.482098] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.482337] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.482387] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.482528] ^ [ 33.482845] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.483064] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.483158] ================================================================== [ 33.512330] ================================================================== [ 33.512728] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 33.512806] Write of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.512911] [ 33.512981] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.513456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.513557] Hardware name: linux,dummy-virt (DT) [ 33.513899] Call trace: [ 33.513937] show_stack+0x20/0x38 (C) [ 33.514180] dump_stack_lvl+0x8c/0xd0 [ 33.514291] print_report+0x118/0x5e8 [ 33.514443] kasan_report+0xdc/0x128 [ 33.514869] kasan_check_range+0x100/0x1a8 [ 33.514934] __kasan_check_write+0x20/0x30 [ 33.515101] copy_user_test_oob+0x35c/0xec8 [ 33.515356] kunit_try_run_case+0x170/0x3f0 [ 33.515423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.515678] kthread+0x328/0x630 [ 33.516054] ret_from_fork+0x10/0x20 [ 33.516389] [ 33.516641] Allocated by task 316: [ 33.516689] kasan_save_stack+0x3c/0x68 [ 33.516905] kasan_save_track+0x20/0x40 [ 33.517116] kasan_save_alloc_info+0x40/0x58 [ 33.517168] __kasan_kmalloc+0xd4/0xd8 [ 33.517206] __kmalloc_noprof+0x198/0x4c8 [ 33.517249] kunit_kmalloc_array+0x34/0x88 [ 33.517551] copy_user_test_oob+0xac/0xec8 [ 33.517789] kunit_try_run_case+0x170/0x3f0 [ 33.517878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518104] kthread+0x328/0x630 [ 33.518431] ret_from_fork+0x10/0x20 [ 33.518515] [ 33.518538] The buggy address belongs to the object at fff00000c922a400 [ 33.518538] which belongs to the cache kmalloc-128 of size 128 [ 33.518787] The buggy address is located 0 bytes inside of [ 33.518787] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.519159] [ 33.519413] The buggy address belongs to the physical page: [ 33.519792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.520062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.520260] page_type: f5(slab) [ 33.520654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.520963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.521155] page dumped because: kasan: bad access detected [ 33.521391] [ 33.521623] Memory state around the buggy address: [ 33.521692] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.521748] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.522028] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.522262] ^ [ 33.522545] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.522632] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.522725] ================================================================== [ 33.490289] ================================================================== [ 33.490353] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 33.490876] Read of size 121 at addr fff00000c922a400 by task kunit_try_catch/316 [ 33.490982] [ 33.491385] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.491774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.491889] Hardware name: linux,dummy-virt (DT) [ 33.491955] Call trace: [ 33.491983] show_stack+0x20/0x38 (C) [ 33.492077] dump_stack_lvl+0x8c/0xd0 [ 33.492498] print_report+0x118/0x5e8 [ 33.492910] kasan_report+0xdc/0x128 [ 33.493007] kasan_check_range+0x100/0x1a8 [ 33.493075] __kasan_check_read+0x20/0x30 [ 33.493254] copy_user_test_oob+0x728/0xec8 [ 33.493435] kunit_try_run_case+0x170/0x3f0 [ 33.493779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.493919] kthread+0x328/0x630 [ 33.494114] ret_from_fork+0x10/0x20 [ 33.494610] [ 33.494880] Allocated by task 316: [ 33.494965] kasan_save_stack+0x3c/0x68 [ 33.495013] kasan_save_track+0x20/0x40 [ 33.495252] kasan_save_alloc_info+0x40/0x58 [ 33.495441] __kasan_kmalloc+0xd4/0xd8 [ 33.495606] __kmalloc_noprof+0x198/0x4c8 [ 33.495939] kunit_kmalloc_array+0x34/0x88 [ 33.496350] copy_user_test_oob+0xac/0xec8 [ 33.496567] kunit_try_run_case+0x170/0x3f0 [ 33.496826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.497030] kthread+0x328/0x630 [ 33.497138] ret_from_fork+0x10/0x20 [ 33.497327] [ 33.497575] The buggy address belongs to the object at fff00000c922a400 [ 33.497575] which belongs to the cache kmalloc-128 of size 128 [ 33.497784] The buggy address is located 0 bytes inside of [ 33.497784] allocated 120-byte region [fff00000c922a400, fff00000c922a478) [ 33.498061] [ 33.498128] The buggy address belongs to the physical page: [ 33.498201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.498296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.498403] page_type: f5(slab) [ 33.498491] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.498699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.499118] page dumped because: kasan: bad access detected [ 33.499217] [ 33.499288] Memory state around the buggy address: [ 33.499426] fff00000c922a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.499575] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.499649] >fff00000c922a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.499690] ^ [ 33.499769] fff00000c922a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.499970] fff00000c922a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.500176] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 33.427114] ================================================================== [ 33.427202] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.427343] Write of size 8 at addr fff00000c922a378 by task kunit_try_catch/312 [ 33.427417] [ 33.427454] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.427801] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.427862] Hardware name: linux,dummy-virt (DT) [ 33.427985] Call trace: [ 33.428043] show_stack+0x20/0x38 (C) [ 33.428127] dump_stack_lvl+0x8c/0xd0 [ 33.428239] print_report+0x118/0x5e8 [ 33.428315] kasan_report+0xdc/0x128 [ 33.428381] kasan_check_range+0x100/0x1a8 [ 33.428481] __kasan_check_write+0x20/0x30 [ 33.428546] copy_to_kernel_nofault+0x8c/0x250 [ 33.428627] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.428681] kunit_try_run_case+0x170/0x3f0 [ 33.428885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.429184] kthread+0x328/0x630 [ 33.429341] ret_from_fork+0x10/0x20 [ 33.429681] [ 33.429727] Allocated by task 312: [ 33.429763] kasan_save_stack+0x3c/0x68 [ 33.430027] kasan_save_track+0x20/0x40 [ 33.430292] kasan_save_alloc_info+0x40/0x58 [ 33.430484] __kasan_kmalloc+0xd4/0xd8 [ 33.430531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.431076] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.431236] kunit_try_run_case+0x170/0x3f0 [ 33.431459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.431553] kthread+0x328/0x630 [ 33.432006] ret_from_fork+0x10/0x20 [ 33.432089] [ 33.432375] The buggy address belongs to the object at fff00000c922a300 [ 33.432375] which belongs to the cache kmalloc-128 of size 128 [ 33.432625] The buggy address is located 0 bytes to the right of [ 33.432625] allocated 120-byte region [fff00000c922a300, fff00000c922a378) [ 33.432987] [ 33.433394] The buggy address belongs to the physical page: [ 33.433623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.434010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.434108] page_type: f5(slab) [ 33.434206] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.434289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.434543] page dumped because: kasan: bad access detected [ 33.434698] [ 33.434974] Memory state around the buggy address: [ 33.435136] fff00000c922a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.435506] fff00000c922a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.435751] >fff00000c922a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.435986] ^ [ 33.436267] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.436693] fff00000c922a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.437014] ================================================================== [ 33.420322] ================================================================== [ 33.420396] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.420555] Read of size 8 at addr fff00000c922a378 by task kunit_try_catch/312 [ 33.420615] [ 33.420680] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.420981] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.421248] Hardware name: linux,dummy-virt (DT) [ 33.421289] Call trace: [ 33.421376] show_stack+0x20/0x38 (C) [ 33.421435] dump_stack_lvl+0x8c/0xd0 [ 33.421487] print_report+0x118/0x5e8 [ 33.421533] kasan_report+0xdc/0x128 [ 33.421579] __asan_report_load8_noabort+0x20/0x30 [ 33.421631] copy_to_kernel_nofault+0x204/0x250 [ 33.421682] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.421734] kunit_try_run_case+0x170/0x3f0 [ 33.421794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.421859] kthread+0x328/0x630 [ 33.421903] ret_from_fork+0x10/0x20 [ 33.421952] [ 33.421984] Allocated by task 312: [ 33.422021] kasan_save_stack+0x3c/0x68 [ 33.422077] kasan_save_track+0x20/0x40 [ 33.422130] kasan_save_alloc_info+0x40/0x58 [ 33.422176] __kasan_kmalloc+0xd4/0xd8 [ 33.422214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.422257] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.422301] kunit_try_run_case+0x170/0x3f0 [ 33.422339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.422386] kthread+0x328/0x630 [ 33.422425] ret_from_fork+0x10/0x20 [ 33.422464] [ 33.422501] The buggy address belongs to the object at fff00000c922a300 [ 33.422501] which belongs to the cache kmalloc-128 of size 128 [ 33.422562] The buggy address is located 0 bytes to the right of [ 33.422562] allocated 120-byte region [fff00000c922a300, fff00000c922a378) [ 33.422628] [ 33.422660] The buggy address belongs to the physical page: [ 33.422708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922a [ 33.422766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.422854] page_type: f5(slab) [ 33.423654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.423765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.423853] page dumped because: kasan: bad access detected [ 33.423965] [ 33.424036] Memory state around the buggy address: [ 33.424132] fff00000c922a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.424313] fff00000c922a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.424485] >fff00000c922a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.424791] ^ [ 33.425098] fff00000c922a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425169] fff00000c922a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 33.372870] ================================================================== [ 33.372941] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 33.373149] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 33.373477] [ 33.373587] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.373730] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.373843] Hardware name: linux,dummy-virt (DT) [ 33.373914] Call trace: [ 33.373940] show_stack+0x20/0x38 (C) [ 33.374190] dump_stack_lvl+0x8c/0xd0 [ 33.374304] print_report+0x310/0x5e8 [ 33.374408] kasan_report+0xdc/0x128 [ 33.374494] __asan_report_load1_noabort+0x20/0x30 [ 33.374598] vmalloc_oob+0x578/0x5d0 [ 33.374689] kunit_try_run_case+0x170/0x3f0 [ 33.374740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.374995] kthread+0x328/0x630 [ 33.375120] ret_from_fork+0x10/0x20 [ 33.375205] [ 33.375249] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 33.375626] The buggy address belongs to the physical page: [ 33.375703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1095ea [ 33.375838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.375991] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.376054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.376098] page dumped because: kasan: bad access detected [ 33.376273] [ 33.376413] Memory state around the buggy address: [ 33.376503] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.376576] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.376966] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.377065] ^ [ 33.377157] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.377257] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.377347] ================================================================== [ 33.377985] ================================================================== [ 33.378035] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 33.378087] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 33.378138] [ 33.378175] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.378265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.378305] Hardware name: linux,dummy-virt (DT) [ 33.378338] Call trace: [ 33.378361] show_stack+0x20/0x38 (C) [ 33.378426] dump_stack_lvl+0x8c/0xd0 [ 33.378473] print_report+0x310/0x5e8 [ 33.378519] kasan_report+0xdc/0x128 [ 33.378562] __asan_report_load1_noabort+0x20/0x30 [ 33.378612] vmalloc_oob+0x51c/0x5d0 [ 33.378659] kunit_try_run_case+0x170/0x3f0 [ 33.378706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.378759] kthread+0x328/0x630 [ 33.378810] ret_from_fork+0x10/0x20 [ 33.378882] [ 33.378912] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 33.379000] The buggy address belongs to the physical page: [ 33.379043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1095ea [ 33.379100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.379161] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.379213] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.379255] page dumped because: kasan: bad access detected [ 33.379287] [ 33.379316] Memory state around the buggy address: [ 33.379350] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.379395] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.379440] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.379480] ^ [ 33.379522] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.379566] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.379606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.134047] ================================================================== [ 33.134436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.134524] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.134578] [ 33.134844] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.134955] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.134988] Hardware name: linux,dummy-virt (DT) [ 33.135176] Call trace: [ 33.135211] show_stack+0x20/0x38 (C) [ 33.135269] dump_stack_lvl+0x8c/0xd0 [ 33.135320] print_report+0x118/0x5e8 [ 33.135367] kasan_report+0xdc/0x128 [ 33.135413] __asan_report_store8_noabort+0x20/0x30 [ 33.135466] kasan_atomics_helper+0x3e5c/0x4858 [ 33.135518] kasan_atomics+0x198/0x2e0 [ 33.136371] kunit_try_run_case+0x170/0x3f0 [ 33.136694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.136774] kthread+0x328/0x630 [ 33.136836] ret_from_fork+0x10/0x20 [ 33.136887] [ 33.136994] Allocated by task 296: [ 33.137041] kasan_save_stack+0x3c/0x68 [ 33.137089] kasan_save_track+0x20/0x40 [ 33.137128] kasan_save_alloc_info+0x40/0x58 [ 33.137532] __kasan_kmalloc+0xd4/0xd8 [ 33.137890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.137963] kasan_atomics+0xb8/0x2e0 [ 33.138324] kunit_try_run_case+0x170/0x3f0 [ 33.138722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.138839] kthread+0x328/0x630 [ 33.138937] ret_from_fork+0x10/0x20 [ 33.139045] [ 33.139454] The buggy address belongs to the object at fff00000c9225780 [ 33.139454] which belongs to the cache kmalloc-64 of size 64 [ 33.139558] The buggy address is located 0 bytes to the right of [ 33.139558] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.139706] [ 33.139778] The buggy address belongs to the physical page: [ 33.139869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.140124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.140273] page_type: f5(slab) [ 33.140618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.141088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.141160] page dumped because: kasan: bad access detected [ 33.141372] [ 33.141491] Memory state around the buggy address: [ 33.141573] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.141652] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.141707] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.141746] ^ [ 33.142098] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.142262] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.142356] ================================================================== [ 33.014526] ================================================================== [ 33.014699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.014762] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.014879] [ 33.014916] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.015040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.015073] Hardware name: linux,dummy-virt (DT) [ 33.015383] Call trace: [ 33.015426] show_stack+0x20/0x38 (C) [ 33.015541] dump_stack_lvl+0x8c/0xd0 [ 33.015593] print_report+0x118/0x5e8 [ 33.015639] kasan_report+0xdc/0x128 [ 33.015753] __asan_report_load4_noabort+0x20/0x30 [ 33.016027] kasan_atomics_helper+0x3dcc/0x4858 [ 33.016102] kasan_atomics+0x198/0x2e0 [ 33.016155] kunit_try_run_case+0x170/0x3f0 [ 33.016207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.016260] kthread+0x328/0x630 [ 33.017017] kasan_save_track+0x20/0x40 [ 33.017575] kasan_atomics+0xb8/0x2e0 [ 33.017690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.018703] [ 33.020438] page_type: f5(slab) [ 33.021285] page dumped because: kasan: bad access detected [ 33.021358] [ 33.021479] Memory state around the buggy address: [ 33.021622] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.022454] ================================================================== [ 33.347547] ================================================================== [ 33.347593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.347664] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.347715] [ 33.347745] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.347846] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.347875] Hardware name: linux,dummy-virt (DT) [ 33.347906] Call trace: [ 33.347931] show_stack+0x20/0x38 (C) [ 33.347979] dump_stack_lvl+0x8c/0xd0 [ 33.348062] print_report+0x118/0x5e8 [ 33.348109] kasan_report+0xdc/0x128 [ 33.348155] __asan_report_load8_noabort+0x20/0x30 [ 33.348206] kasan_atomics_helper+0x3e20/0x4858 [ 33.348657] kasan_atomics+0x198/0x2e0 [ 33.348765] kunit_try_run_case+0x170/0x3f0 [ 33.348949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.349064] kthread+0x328/0x630 [ 33.349112] ret_from_fork+0x10/0x20 [ 33.349212] [ 33.349283] Allocated by task 296: [ 33.349431] kasan_save_stack+0x3c/0x68 [ 33.349882] kasan_save_track+0x20/0x40 [ 33.349954] kasan_save_alloc_info+0x40/0x58 [ 33.350070] __kasan_kmalloc+0xd4/0xd8 [ 33.350139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.350200] kasan_atomics+0xb8/0x2e0 [ 33.350240] kunit_try_run_case+0x170/0x3f0 [ 33.350280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.350324] kthread+0x328/0x630 [ 33.350473] ret_from_fork+0x10/0x20 [ 33.350518] [ 33.350539] The buggy address belongs to the object at fff00000c9225780 [ 33.350539] which belongs to the cache kmalloc-64 of size 64 [ 33.350701] The buggy address is located 0 bytes to the right of [ 33.350701] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.350886] [ 33.350969] The buggy address belongs to the physical page: [ 33.351016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.351113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.351472] page_type: f5(slab) [ 33.351538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.351642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.351846] page dumped because: kasan: bad access detected [ 33.351878] [ 33.351899] Memory state around the buggy address: [ 33.351931] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.351977] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.352021] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.352061] ^ [ 33.352246] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352403] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352505] ================================================================== [ 33.178914] ================================================================== [ 33.178970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.179033] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.179086] [ 33.179117] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.179209] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.179252] Hardware name: linux,dummy-virt (DT) [ 33.179286] Call trace: [ 33.179320] show_stack+0x20/0x38 (C) [ 33.179372] dump_stack_lvl+0x8c/0xd0 [ 33.179430] print_report+0x118/0x5e8 [ 33.179477] kasan_report+0xdc/0x128 [ 33.179529] kasan_check_range+0x100/0x1a8 [ 33.179577] __kasan_check_write+0x20/0x30 [ 33.179625] kasan_atomics_helper+0x1058/0x4858 [ 33.179676] kasan_atomics+0x198/0x2e0 [ 33.179725] kunit_try_run_case+0x170/0x3f0 [ 33.179772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.179859] kthread+0x328/0x630 [ 33.180357] ret_from_fork+0x10/0x20 [ 33.180825] [ 33.180875] Allocated by task 296: [ 33.180933] kasan_save_stack+0x3c/0x68 [ 33.181002] kasan_save_track+0x20/0x40 [ 33.181067] kasan_save_alloc_info+0x40/0x58 [ 33.181133] __kasan_kmalloc+0xd4/0xd8 [ 33.181448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.181505] kasan_atomics+0xb8/0x2e0 [ 33.181546] kunit_try_run_case+0x170/0x3f0 [ 33.181585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.181978] kthread+0x328/0x630 [ 33.182054] ret_from_fork+0x10/0x20 [ 33.182284] [ 33.182365] The buggy address belongs to the object at fff00000c9225780 [ 33.182365] which belongs to the cache kmalloc-64 of size 64 [ 33.182662] The buggy address is located 0 bytes to the right of [ 33.182662] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.182923] [ 33.182992] The buggy address belongs to the physical page: [ 33.183295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.183542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.183711] page_type: f5(slab) [ 33.183860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.183961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.184029] page dumped because: kasan: bad access detected [ 33.184138] [ 33.184160] Memory state around the buggy address: [ 33.184302] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.184543] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.184875] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.184964] ^ [ 33.185081] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.185213] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.185290] ================================================================== [ 33.236213] ================================================================== [ 33.236398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.236500] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.236826] [ 33.236878] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.236975] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.237044] Hardware name: linux,dummy-virt (DT) [ 33.237091] Call trace: [ 33.237124] show_stack+0x20/0x38 (C) [ 33.237188] dump_stack_lvl+0x8c/0xd0 [ 33.237237] print_report+0x118/0x5e8 [ 33.237289] kasan_report+0xdc/0x128 [ 33.237335] kasan_check_range+0x100/0x1a8 [ 33.237396] __kasan_check_write+0x20/0x30 [ 33.237454] kasan_atomics_helper+0x12d8/0x4858 [ 33.237514] kasan_atomics+0x198/0x2e0 [ 33.237562] kunit_try_run_case+0x170/0x3f0 [ 33.237611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.237672] kthread+0x328/0x630 [ 33.237723] ret_from_fork+0x10/0x20 [ 33.237772] [ 33.237794] Allocated by task 296: [ 33.237986] kasan_save_stack+0x3c/0x68 [ 33.238572] kasan_save_track+0x20/0x40 [ 33.238634] kasan_save_alloc_info+0x40/0x58 [ 33.238677] __kasan_kmalloc+0xd4/0xd8 [ 33.238715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.238840] kasan_atomics+0xb8/0x2e0 [ 33.238926] kunit_try_run_case+0x170/0x3f0 [ 33.239343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.239589] kthread+0x328/0x630 [ 33.239638] ret_from_fork+0x10/0x20 [ 33.239959] [ 33.240235] The buggy address belongs to the object at fff00000c9225780 [ 33.240235] which belongs to the cache kmalloc-64 of size 64 [ 33.240380] The buggy address is located 0 bytes to the right of [ 33.240380] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.240629] [ 33.240665] The buggy address belongs to the physical page: [ 33.240848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.240941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.241381] page_type: f5(slab) [ 33.241561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.241839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.241930] page dumped because: kasan: bad access detected [ 33.241964] [ 33.242435] Memory state around the buggy address: [ 33.242570] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.242757] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.242994] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.243186] ^ [ 33.243409] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.243526] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.243669] ================================================================== [ 33.283489] ================================================================== [ 33.283550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.283911] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.284161] [ 33.284225] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.284470] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.284514] Hardware name: linux,dummy-virt (DT) [ 33.284584] Call trace: [ 33.284611] show_stack+0x20/0x38 (C) [ 33.284757] dump_stack_lvl+0x8c/0xd0 [ 33.284811] print_report+0x118/0x5e8 [ 33.284997] kasan_report+0xdc/0x128 [ 33.285148] kasan_check_range+0x100/0x1a8 [ 33.285215] __kasan_check_write+0x20/0x30 [ 33.285714] kasan_atomics_helper+0x14e4/0x4858 [ 33.286167] kasan_atomics+0x198/0x2e0 [ 33.286232] kunit_try_run_case+0x170/0x3f0 [ 33.286378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.286768] kthread+0x328/0x630 [ 33.286998] ret_from_fork+0x10/0x20 [ 33.287057] [ 33.287080] Allocated by task 296: [ 33.287396] kasan_save_stack+0x3c/0x68 [ 33.287714] kasan_save_track+0x20/0x40 [ 33.288000] kasan_save_alloc_info+0x40/0x58 [ 33.288316] __kasan_kmalloc+0xd4/0xd8 [ 33.289168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.289433] kasan_atomics+0xb8/0x2e0 [ 33.289904] kunit_try_run_case+0x170/0x3f0 [ 33.290001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.290637] kthread+0x328/0x630 [ 33.291022] ret_from_fork+0x10/0x20 [ 33.291168] [ 33.291197] The buggy address belongs to the object at fff00000c9225780 [ 33.291197] which belongs to the cache kmalloc-64 of size 64 [ 33.291395] The buggy address is located 0 bytes to the right of [ 33.291395] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.291623] [ 33.291664] The buggy address belongs to the physical page: [ 33.292126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.292348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.292446] page_type: f5(slab) [ 33.292897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.293002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.293046] page dumped because: kasan: bad access detected [ 33.293505] [ 33.293708] Memory state around the buggy address: [ 33.293870] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.294106] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.294329] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.294647] ^ [ 33.295144] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.295225] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.295285] ================================================================== [ 32.855544] ================================================================== [ 32.855624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 32.855937] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.856827] kasan_report+0xdc/0x128 [ 32.857327] kunit_try_run_case+0x170/0x3f0 [ 32.857826] ret_from_fork+0x10/0x20 [ 32.858372] __kasan_kmalloc+0xd4/0xd8 [ 32.858572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.858794] The buggy address is located 0 bytes to the right of [ 32.858794] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 32.859981] ================================================================== [ 33.089974] ================================================================== [ 33.090026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.090093] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.090154] [ 33.090191] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.090281] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.090323] Hardware name: linux,dummy-virt (DT) [ 33.090365] Call trace: [ 33.090390] show_stack+0x20/0x38 (C) [ 33.090441] dump_stack_lvl+0x8c/0xd0 [ 33.090498] print_report+0x118/0x5e8 [ 33.090545] kasan_report+0xdc/0x128 [ 33.090591] __asan_report_load4_noabort+0x20/0x30 [ 33.090642] kasan_atomics_helper+0x3e04/0x4858 [ 33.090694] kasan_atomics+0x198/0x2e0 [ 33.090743] kunit_try_run_case+0x170/0x3f0 [ 33.090790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.091268] kthread+0x328/0x630 [ 33.091321] ret_from_fork+0x10/0x20 [ 33.091689] [ 33.091742] Allocated by task 296: [ 33.091787] kasan_save_stack+0x3c/0x68 [ 33.091846] kasan_save_track+0x20/0x40 [ 33.091883] kasan_save_alloc_info+0x40/0x58 [ 33.092282] __kasan_kmalloc+0xd4/0xd8 [ 33.092343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.092387] kasan_atomics+0xb8/0x2e0 [ 33.092670] kunit_try_run_case+0x170/0x3f0 [ 33.092722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.093091] kthread+0x328/0x630 [ 33.093262] ret_from_fork+0x10/0x20 [ 33.093337] [ 33.093476] The buggy address belongs to the object at fff00000c9225780 [ 33.093476] which belongs to the cache kmalloc-64 of size 64 [ 33.093593] The buggy address is located 0 bytes to the right of [ 33.093593] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.093711] [ 33.093733] The buggy address belongs to the physical page: [ 33.093769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.093835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.093884] page_type: f5(slab) [ 33.094484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.094736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.094808] page dumped because: kasan: bad access detected [ 33.095021] [ 33.095061] Memory state around the buggy address: [ 33.095097] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.095394] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.095588] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.095790] ^ [ 33.096055] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.096244] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.096344] ================================================================== [ 33.307550] ================================================================== [ 33.307602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.307655] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.307707] [ 33.307740] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.307846] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.307878] Hardware name: linux,dummy-virt (DT) [ 33.307910] Call trace: [ 33.307947] show_stack+0x20/0x38 (C) [ 33.308009] dump_stack_lvl+0x8c/0xd0 [ 33.308063] print_report+0x118/0x5e8 [ 33.308111] kasan_report+0xdc/0x128 [ 33.308161] kasan_check_range+0x100/0x1a8 [ 33.308209] __kasan_check_write+0x20/0x30 [ 33.308263] kasan_atomics_helper+0x15b4/0x4858 [ 33.308329] kasan_atomics+0x198/0x2e0 [ 33.308378] kunit_try_run_case+0x170/0x3f0 [ 33.308429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.308485] kthread+0x328/0x630 [ 33.308529] ret_from_fork+0x10/0x20 [ 33.308578] [ 33.308600] Allocated by task 296: [ 33.308640] kasan_save_stack+0x3c/0x68 [ 33.308693] kasan_save_track+0x20/0x40 [ 33.308732] kasan_save_alloc_info+0x40/0x58 [ 33.308773] __kasan_kmalloc+0xd4/0xd8 [ 33.308810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.308862] kasan_atomics+0xb8/0x2e0 [ 33.308902] kunit_try_run_case+0x170/0x3f0 [ 33.308941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.309035] kthread+0x328/0x630 [ 33.309322] ret_from_fork+0x10/0x20 [ 33.309367] [ 33.309390] The buggy address belongs to the object at fff00000c9225780 [ 33.309390] which belongs to the cache kmalloc-64 of size 64 [ 33.309448] The buggy address is located 0 bytes to the right of [ 33.309448] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.309510] [ 33.309533] The buggy address belongs to the physical page: [ 33.309567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.309622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.310105] page_type: f5(slab) [ 33.310165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.310447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.310575] page dumped because: kasan: bad access detected [ 33.310676] [ 33.310735] Memory state around the buggy address: [ 33.310891] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.311030] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.311119] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.311184] ^ [ 33.311237] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.311301] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.311340] ================================================================== [ 33.170737] ================================================================== [ 33.170789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.170861] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.170910] [ 33.170940] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.171033] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.171066] Hardware name: linux,dummy-virt (DT) [ 33.171098] Call trace: [ 33.171122] show_stack+0x20/0x38 (C) [ 33.171172] dump_stack_lvl+0x8c/0xd0 [ 33.171218] print_report+0x118/0x5e8 [ 33.171843] kasan_report+0xdc/0x128 [ 33.171916] kasan_check_range+0x100/0x1a8 [ 33.171967] __kasan_check_write+0x20/0x30 [ 33.172371] kasan_atomics_helper+0xff0/0x4858 [ 33.172770] kasan_atomics+0x198/0x2e0 [ 33.172846] kunit_try_run_case+0x170/0x3f0 [ 33.173182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.173275] kthread+0x328/0x630 [ 33.173489] ret_from_fork+0x10/0x20 [ 33.173981] [ 33.174049] Allocated by task 296: [ 33.174316] kasan_save_stack+0x3c/0x68 [ 33.174505] kasan_save_track+0x20/0x40 [ 33.174575] kasan_save_alloc_info+0x40/0x58 [ 33.174630] __kasan_kmalloc+0xd4/0xd8 [ 33.174666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.175027] kasan_atomics+0xb8/0x2e0 [ 33.175140] kunit_try_run_case+0x170/0x3f0 [ 33.175569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.175627] kthread+0x328/0x630 [ 33.175982] ret_from_fork+0x10/0x20 [ 33.176228] [ 33.176430] The buggy address belongs to the object at fff00000c9225780 [ 33.176430] which belongs to the cache kmalloc-64 of size 64 [ 33.176565] The buggy address is located 0 bytes to the right of [ 33.176565] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.176706] [ 33.176774] The buggy address belongs to the physical page: [ 33.177170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.177262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.177418] page_type: f5(slab) [ 33.177524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.177584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.177627] page dumped because: kasan: bad access detected [ 33.177661] [ 33.177682] Memory state around the buggy address: [ 33.177943] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.178176] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.178227] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.178278] ^ [ 33.178322] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.178375] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.178418] ================================================================== [ 33.152708] ================================================================== [ 33.152840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.152986] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.153131] [ 33.153209] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.153387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.153425] Hardware name: linux,dummy-virt (DT) [ 33.153458] Call trace: [ 33.153691] show_stack+0x20/0x38 (C) [ 33.154129] dump_stack_lvl+0x8c/0xd0 [ 33.154304] print_report+0x118/0x5e8 [ 33.154356] kasan_report+0xdc/0x128 [ 33.154590] kasan_check_range+0x100/0x1a8 [ 33.154845] __kasan_check_write+0x20/0x30 [ 33.155064] kasan_atomics_helper+0xf20/0x4858 [ 33.155265] kasan_atomics+0x198/0x2e0 [ 33.155349] kunit_try_run_case+0x170/0x3f0 [ 33.155551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.155784] kthread+0x328/0x630 [ 33.155851] ret_from_fork+0x10/0x20 [ 33.156153] [ 33.156474] Allocated by task 296: [ 33.156657] kasan_save_stack+0x3c/0x68 [ 33.156722] kasan_save_track+0x20/0x40 [ 33.157065] kasan_save_alloc_info+0x40/0x58 [ 33.157297] __kasan_kmalloc+0xd4/0xd8 [ 33.157430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.157605] kasan_atomics+0xb8/0x2e0 [ 33.157706] kunit_try_run_case+0x170/0x3f0 [ 33.157746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.157975] kthread+0x328/0x630 [ 33.158528] ret_from_fork+0x10/0x20 [ 33.158648] [ 33.158722] The buggy address belongs to the object at fff00000c9225780 [ 33.158722] which belongs to the cache kmalloc-64 of size 64 [ 33.158831] The buggy address is located 0 bytes to the right of [ 33.158831] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.158927] [ 33.158970] The buggy address belongs to the physical page: [ 33.159008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.159074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.159132] page_type: f5(slab) [ 33.159175] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.159227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.159269] page dumped because: kasan: bad access detected [ 33.159317] [ 33.159337] Memory state around the buggy address: [ 33.159371] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.159415] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.159474] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.159513] ^ [ 33.159557] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.159610] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.159649] ================================================================== [ 33.343396] ================================================================== [ 33.343557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.343660] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.343742] [ 33.343797] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.343938] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.343969] Hardware name: linux,dummy-virt (DT) [ 33.344065] Call trace: [ 33.344091] show_stack+0x20/0x38 (C) [ 33.344139] dump_stack_lvl+0x8c/0xd0 [ 33.344186] print_report+0x118/0x5e8 [ 33.344250] kasan_report+0xdc/0x128 [ 33.344528] kasan_check_range+0x100/0x1a8 [ 33.344674] __kasan_check_write+0x20/0x30 [ 33.344879] kasan_atomics_helper+0x175c/0x4858 [ 33.345079] kasan_atomics+0x198/0x2e0 [ 33.345149] kunit_try_run_case+0x170/0x3f0 [ 33.345199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.345408] kthread+0x328/0x630 [ 33.345455] ret_from_fork+0x10/0x20 [ 33.345771] [ 33.345844] Allocated by task 296: [ 33.345995] kasan_save_stack+0x3c/0x68 [ 33.346075] kasan_save_track+0x20/0x40 [ 33.346145] kasan_save_alloc_info+0x40/0x58 [ 33.346205] __kasan_kmalloc+0xd4/0xd8 [ 33.346246] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.346291] kasan_atomics+0xb8/0x2e0 [ 33.346331] kunit_try_run_case+0x170/0x3f0 [ 33.346381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.346427] kthread+0x328/0x630 [ 33.346466] ret_from_fork+0x10/0x20 [ 33.346505] [ 33.346536] The buggy address belongs to the object at fff00000c9225780 [ 33.346536] which belongs to the cache kmalloc-64 of size 64 [ 33.346596] The buggy address is located 0 bytes to the right of [ 33.346596] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.346658] [ 33.346679] The buggy address belongs to the physical page: [ 33.346718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.346774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.346843] page_type: f5(slab) [ 33.346882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.346935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.346983] page dumped because: kasan: bad access detected [ 33.347016] [ 33.347035] Memory state around the buggy address: [ 33.347069] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.347124] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.347174] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.347219] ^ [ 33.347261] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.347306] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.347345] ================================================================== [ 33.318256] ================================================================== [ 33.318372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.318439] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.318491] [ 33.318523] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.318613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.318807] Hardware name: linux,dummy-virt (DT) [ 33.318857] Call trace: [ 33.319032] show_stack+0x20/0x38 (C) [ 33.319093] dump_stack_lvl+0x8c/0xd0 [ 33.319164] print_report+0x118/0x5e8 [ 33.319513] kasan_report+0xdc/0x128 [ 33.319584] kasan_check_range+0x100/0x1a8 [ 33.319636] __kasan_check_write+0x20/0x30 [ 33.319703] kasan_atomics_helper+0x1644/0x4858 [ 33.319755] kasan_atomics+0x198/0x2e0 [ 33.319801] kunit_try_run_case+0x170/0x3f0 [ 33.319883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.319954] kthread+0x328/0x630 [ 33.320000] ret_from_fork+0x10/0x20 [ 33.320050] [ 33.320214] Allocated by task 296: [ 33.320249] kasan_save_stack+0x3c/0x68 [ 33.320480] kasan_save_track+0x20/0x40 [ 33.320533] kasan_save_alloc_info+0x40/0x58 [ 33.320623] __kasan_kmalloc+0xd4/0xd8 [ 33.320891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.321035] kasan_atomics+0xb8/0x2e0 [ 33.321144] kunit_try_run_case+0x170/0x3f0 [ 33.321205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.321282] kthread+0x328/0x630 [ 33.321319] ret_from_fork+0x10/0x20 [ 33.321522] [ 33.321685] The buggy address belongs to the object at fff00000c9225780 [ 33.321685] which belongs to the cache kmalloc-64 of size 64 [ 33.321783] The buggy address is located 0 bytes to the right of [ 33.321783] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.321909] [ 33.322100] The buggy address belongs to the physical page: [ 33.322338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.322463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.322513] page_type: f5(slab) [ 33.322596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.323029] page dumped because: kasan: bad access detected [ 33.323280] [ 33.323399] Memory state around the buggy address: [ 33.323535] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323600] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.323662] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.324015] ^ [ 33.324061] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.324230] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.324446] ================================================================== [ 33.324948] ================================================================== [ 33.325029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.325121] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.325208] [ 33.325251] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.325340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.325372] Hardware name: linux,dummy-virt (DT) [ 33.325406] Call trace: [ 33.325445] show_stack+0x20/0x38 (C) [ 33.325498] dump_stack_lvl+0x8c/0xd0 [ 33.325555] print_report+0x118/0x5e8 [ 33.325611] kasan_report+0xdc/0x128 [ 33.325657] __asan_report_load8_noabort+0x20/0x30 [ 33.325709] kasan_atomics_helper+0x3df4/0x4858 [ 33.325761] kasan_atomics+0x198/0x2e0 [ 33.325833] kunit_try_run_case+0x170/0x3f0 [ 33.325883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.325946] kthread+0x328/0x630 [ 33.326006] ret_from_fork+0x10/0x20 [ 33.326075] [ 33.326123] Allocated by task 296: [ 33.326165] kasan_save_stack+0x3c/0x68 [ 33.326224] kasan_save_track+0x20/0x40 [ 33.326261] kasan_save_alloc_info+0x40/0x58 [ 33.326302] __kasan_kmalloc+0xd4/0xd8 [ 33.326339] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.326382] kasan_atomics+0xb8/0x2e0 [ 33.326437] kunit_try_run_case+0x170/0x3f0 [ 33.326476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.326520] kthread+0x328/0x630 [ 33.326575] ret_from_fork+0x10/0x20 [ 33.326622] [ 33.326653] The buggy address belongs to the object at fff00000c9225780 [ 33.326653] which belongs to the cache kmalloc-64 of size 64 [ 33.326711] The buggy address is located 0 bytes to the right of [ 33.326711] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.326775] [ 33.326796] The buggy address belongs to the physical page: [ 33.326849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.326903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.326950] page_type: f5(slab) [ 33.326989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.327041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.327082] page dumped because: kasan: bad access detected [ 33.327113] [ 33.327132] Memory state around the buggy address: [ 33.327165] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.327351] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.327837] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.327929] ^ [ 33.327996] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328093] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328200] ================================================================== [ 32.970986] ================================================================== [ 32.971043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.971113] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 32.971183] [ 32.971215] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.971304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.971337] Hardware name: linux,dummy-virt (DT) [ 32.971369] Call trace: [ 32.971392] show_stack+0x20/0x38 (C) [ 32.971444] dump_stack_lvl+0x8c/0xd0 [ 32.971492] print_report+0x118/0x5e8 [ 32.971539] kasan_report+0xdc/0x128 [ 32.971594] __asan_report_load4_noabort+0x20/0x30 [ 32.971804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.972537] The buggy address is located 0 bytes to the right of [ 32.972537] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 32.973769] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.975189] [ 32.975750] print_report+0x118/0x5e8 [ 32.978399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.978727] [ 32.978751] The buggy address belongs to the object at fff00000c9225780 [ 32.978751] which belongs to the cache kmalloc-64 of size 64 [ 32.979021] The buggy address is located 0 bytes to the right of [ 32.979021] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 32.979166] [ 32.979245] The buggy address belongs to the physical page: [ 32.979445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 32.979556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.979696] page_type: f5(slab) [ 32.979763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.979970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.980181] page dumped because: kasan: bad access detected [ 32.980289] [ 32.980395] Memory state around the buggy address: [ 32.980465] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.980540] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.980597] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.980705] ^ [ 32.980741] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.981010] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.981084] ================================================================== [ 33.328878] ================================================================== [ 33.328935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.329015] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.329099] [ 33.329186] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.329294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.329325] Hardware name: linux,dummy-virt (DT) [ 33.329357] Call trace: [ 33.329381] show_stack+0x20/0x38 (C) [ 33.329431] dump_stack_lvl+0x8c/0xd0 [ 33.329479] print_report+0x118/0x5e8 [ 33.329654] kasan_report+0xdc/0x128 [ 33.329860] kasan_check_range+0x100/0x1a8 [ 33.329955] __kasan_check_write+0x20/0x30 [ 33.330057] kasan_atomics_helper+0x16d0/0x4858 [ 33.330332] kasan_atomics+0x198/0x2e0 [ 33.330499] kunit_try_run_case+0x170/0x3f0 [ 33.330635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.330690] kthread+0x328/0x630 [ 33.330944] ret_from_fork+0x10/0x20 [ 33.331186] [ 33.331344] Allocated by task 296: [ 33.331483] kasan_save_stack+0x3c/0x68 [ 33.331675] kasan_save_track+0x20/0x40 [ 33.331805] kasan_save_alloc_info+0x40/0x58 [ 33.331963] __kasan_kmalloc+0xd4/0xd8 [ 33.332040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.332087] kasan_atomics+0xb8/0x2e0 [ 33.332127] kunit_try_run_case+0x170/0x3f0 [ 33.332386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.332514] kthread+0x328/0x630 [ 33.332707] ret_from_fork+0x10/0x20 [ 33.332908] [ 33.333232] The buggy address belongs to the object at fff00000c9225780 [ 33.333232] which belongs to the cache kmalloc-64 of size 64 [ 33.333399] The buggy address is located 0 bytes to the right of [ 33.333399] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.333475] [ 33.333496] The buggy address belongs to the physical page: [ 33.333686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.333849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.334019] page_type: f5(slab) [ 33.334109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.334206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.334555] page dumped because: kasan: bad access detected [ 33.334694] [ 33.334764] Memory state around the buggy address: [ 33.334862] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.334939] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.335038] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.335174] ^ [ 33.335235] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.335279] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.335345] ================================================================== [ 33.186073] ================================================================== [ 33.186126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.186186] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.186239] [ 33.186688] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.186936] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.186968] Hardware name: linux,dummy-virt (DT) [ 33.187174] Call trace: [ 33.187202] show_stack+0x20/0x38 (C) [ 33.187696] dump_stack_lvl+0x8c/0xd0 [ 33.187793] print_report+0x118/0x5e8 [ 33.187867] kasan_report+0xdc/0x128 [ 33.188160] kasan_check_range+0x100/0x1a8 [ 33.188359] __kasan_check_write+0x20/0x30 [ 33.188417] kasan_atomics_helper+0x10c0/0x4858 [ 33.188804] kasan_atomics+0x198/0x2e0 [ 33.189084] kunit_try_run_case+0x170/0x3f0 [ 33.189292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.189502] kthread+0x328/0x630 [ 33.189689] ret_from_fork+0x10/0x20 [ 33.189794] [ 33.190057] Allocated by task 296: [ 33.190228] kasan_save_stack+0x3c/0x68 [ 33.190329] kasan_save_track+0x20/0x40 [ 33.190368] kasan_save_alloc_info+0x40/0x58 [ 33.190574] __kasan_kmalloc+0xd4/0xd8 [ 33.190795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.190888] kasan_atomics+0xb8/0x2e0 [ 33.191099] kunit_try_run_case+0x170/0x3f0 [ 33.191190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.191355] kthread+0x328/0x630 [ 33.191589] ret_from_fork+0x10/0x20 [ 33.191767] [ 33.191977] The buggy address belongs to the object at fff00000c9225780 [ 33.191977] which belongs to the cache kmalloc-64 of size 64 [ 33.192054] The buggy address is located 0 bytes to the right of [ 33.192054] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.192384] [ 33.192535] The buggy address belongs to the physical page: [ 33.192918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.193084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.193237] page_type: f5(slab) [ 33.193320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.193737] page dumped because: kasan: bad access detected [ 33.193830] [ 33.193951] Memory state around the buggy address: [ 33.194012] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.194100] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.194312] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.194569] ^ [ 33.194624] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.194669] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.195122] ================================================================== [ 32.870150] ================================================================== [ 32.870372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 32.870746] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.871297] print_report+0x118/0x5e8 [ 32.871671] kasan_atomics_helper+0x3f94/0x4858 [ 32.872433] kthread+0x328/0x630 [ 32.872592] kasan_save_stack+0x3c/0x68 [ 32.873409] __kasan_kmalloc+0xd4/0xd8 [ 32.873991] kthread+0x328/0x630 [ 32.874496] The buggy address is located 0 bytes to the right of [ 32.874496] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 32.875969] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.876422] ================================================================== [ 33.008880] ================================================================== [ 33.008970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.009337] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.009502] [ 33.009578] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.009734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.009860] Hardware name: linux,dummy-virt (DT) [ 33.009895] Call trace: [ 33.009919] show_stack+0x20/0x38 (C) [ 33.010353] dump_stack_lvl+0x8c/0xd0 [ 33.010575] print_report+0x118/0x5e8 [ 33.010787] kasan_report+0xdc/0x128 [ 33.010862] kasan_check_range+0x100/0x1a8 [ 33.010948] __kasan_check_write+0x20/0x30 [ 33.011020] kasan_atomics_helper+0xad4/0x4858 [ 33.011078] kasan_atomics+0x198/0x2e0 [ 33.011124] kunit_try_run_case+0x170/0x3f0 [ 33.011176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.011241] kthread+0x328/0x630 [ 33.011314] ret_from_fork+0x10/0x20 [ 33.011362] [ 33.011385] Allocated by task 296: [ 33.011423] kasan_save_stack+0x3c/0x68 [ 33.011488] kasan_save_track+0x20/0x40 [ 33.011539] kasan_save_alloc_info+0x40/0x58 [ 33.011587] __kasan_kmalloc+0xd4/0xd8 [ 33.011626] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.011669] kasan_atomics+0xb8/0x2e0 [ 33.011717] kunit_try_run_case+0x170/0x3f0 [ 33.011766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.011809] kthread+0x328/0x630 [ 33.011855] ret_from_fork+0x10/0x20 [ 33.011891] [ 33.011913] The buggy address belongs to the object at fff00000c9225780 [ 33.011913] which belongs to the cache kmalloc-64 of size 64 [ 33.011972] The buggy address is located 0 bytes to the right of [ 33.011972] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.012101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.012356] page dumped because: kasan: bad access detected [ 33.012389] [ 33.012411] Memory state around the buggy address: [ 33.012450] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.012509] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.012554] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.012605] ^ [ 33.012647] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.012691] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.012739] ================================================================== [ 33.144642] ================================================================== [ 33.144695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.144793] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.144875] [ 33.144930] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.145335] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.145389] Hardware name: linux,dummy-virt (DT) [ 33.145423] Call trace: [ 33.145447] show_stack+0x20/0x38 (C) [ 33.145862] dump_stack_lvl+0x8c/0xd0 [ 33.145949] print_report+0x118/0x5e8 [ 33.146034] kasan_report+0xdc/0x128 [ 33.146259] kasan_check_range+0x100/0x1a8 [ 33.146450] __kasan_check_write+0x20/0x30 [ 33.146531] kasan_atomics_helper+0xeb8/0x4858 [ 33.146771] kasan_atomics+0x198/0x2e0 [ 33.147274] kunit_try_run_case+0x170/0x3f0 [ 33.147369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.147586] kthread+0x328/0x630 [ 33.147972] ret_from_fork+0x10/0x20 [ 33.148152] [ 33.148219] Allocated by task 296: [ 33.148253] kasan_save_stack+0x3c/0x68 [ 33.148473] kasan_save_track+0x20/0x40 [ 33.148632] kasan_save_alloc_info+0x40/0x58 [ 33.148713] __kasan_kmalloc+0xd4/0xd8 [ 33.148762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.149124] kasan_atomics+0xb8/0x2e0 [ 33.149178] kunit_try_run_case+0x170/0x3f0 [ 33.149218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.149263] kthread+0x328/0x630 [ 33.149298] ret_from_fork+0x10/0x20 [ 33.149336] [ 33.149360] The buggy address belongs to the object at fff00000c9225780 [ 33.149360] which belongs to the cache kmalloc-64 of size 64 [ 33.149652] The buggy address is located 0 bytes to the right of [ 33.149652] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.150085] [ 33.150186] The buggy address belongs to the physical page: [ 33.150285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.150434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.150503] page_type: f5(slab) [ 33.150545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.150647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.150690] page dumped because: kasan: bad access detected [ 33.150722] [ 33.150748] Memory state around the buggy address: [ 33.150784] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.150839] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.150893] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.150939] ^ [ 33.150981] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.151035] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.151073] ================================================================== [ 33.071843] ================================================================== [ 33.071919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.071980] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.072241] [ 33.072311] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.072407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.072803] Hardware name: linux,dummy-virt (DT) [ 33.072870] Call trace: [ 33.073075] show_stack+0x20/0x38 (C) [ 33.073146] dump_stack_lvl+0x8c/0xd0 [ 33.073289] print_report+0x118/0x5e8 [ 33.073361] kasan_report+0xdc/0x128 [ 33.073776] __asan_report_load4_noabort+0x20/0x30 [ 33.073868] kasan_atomics_helper+0x3dd8/0x4858 [ 33.073924] kasan_atomics+0x198/0x2e0 [ 33.074242] kunit_try_run_case+0x170/0x3f0 [ 33.074511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.074786] kthread+0x328/0x630 [ 33.074977] ret_from_fork+0x10/0x20 [ 33.075039] [ 33.075079] Allocated by task 296: [ 33.075112] kasan_save_stack+0x3c/0x68 [ 33.075166] kasan_save_track+0x20/0x40 [ 33.075211] kasan_save_alloc_info+0x40/0x58 [ 33.075253] __kasan_kmalloc+0xd4/0xd8 [ 33.075309] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.075364] kasan_atomics+0xb8/0x2e0 [ 33.075413] kunit_try_run_case+0x170/0x3f0 [ 33.075462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.075511] kthread+0x328/0x630 [ 33.075546] ret_from_fork+0x10/0x20 [ 33.075582] [ 33.075603] The buggy address belongs to the object at fff00000c9225780 [ 33.075603] which belongs to the cache kmalloc-64 of size 64 [ 33.075671] The buggy address is located 0 bytes to the right of [ 33.075671] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.075737] [ 33.075763] The buggy address belongs to the physical page: [ 33.076016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.076498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.076562] page_type: f5(slab) [ 33.076966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.077343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.077511] page dumped because: kasan: bad access detected [ 33.077575] [ 33.077622] Memory state around the buggy address: [ 33.077759] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.077851] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.077897] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.077935] ^ [ 33.078614] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.078732] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.078909] ================================================================== [ 33.217960] ================================================================== [ 33.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.218144] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.218202] [ 33.218466] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.218966] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.219028] Hardware name: linux,dummy-virt (DT) [ 33.219113] Call trace: [ 33.219141] show_stack+0x20/0x38 (C) [ 33.219382] dump_stack_lvl+0x8c/0xd0 [ 33.219453] print_report+0x118/0x5e8 [ 33.219807] kasan_report+0xdc/0x128 [ 33.219891] kasan_check_range+0x100/0x1a8 [ 33.219942] __kasan_check_write+0x20/0x30 [ 33.219991] kasan_atomics_helper+0x11f8/0x4858 [ 33.220043] kasan_atomics+0x198/0x2e0 [ 33.220090] kunit_try_run_case+0x170/0x3f0 [ 33.220163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.220219] kthread+0x328/0x630 [ 33.220271] ret_from_fork+0x10/0x20 [ 33.220322] [ 33.220346] Allocated by task 296: [ 33.220387] kasan_save_stack+0x3c/0x68 [ 33.220432] kasan_save_track+0x20/0x40 [ 33.220471] kasan_save_alloc_info+0x40/0x58 [ 33.220512] __kasan_kmalloc+0xd4/0xd8 [ 33.220549] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.220602] kasan_atomics+0xb8/0x2e0 [ 33.220641] kunit_try_run_case+0x170/0x3f0 [ 33.220682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.220728] kthread+0x328/0x630 [ 33.220762] ret_from_fork+0x10/0x20 [ 33.220807] [ 33.220844] The buggy address belongs to the object at fff00000c9225780 [ 33.220844] which belongs to the cache kmalloc-64 of size 64 [ 33.221659] The buggy address is located 0 bytes to the right of [ 33.221659] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.221769] [ 33.221821] The buggy address belongs to the physical page: [ 33.221889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.222059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.222177] page_type: f5(slab) [ 33.222402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.222637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.222912] page dumped because: kasan: bad access detected [ 33.222990] [ 33.223290] Memory state around the buggy address: [ 33.223371] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.223464] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.223739] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.224245] ^ [ 33.224410] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.224555] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.224641] ================================================================== [ 33.226076] ================================================================== [ 33.226175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.226263] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.226317] [ 33.226347] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.227500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.227553] Hardware name: linux,dummy-virt (DT) [ 33.227588] Call trace: [ 33.227642] show_stack+0x20/0x38 (C) [ 33.227705] dump_stack_lvl+0x8c/0xd0 [ 33.227763] print_report+0x118/0x5e8 [ 33.227884] kasan_report+0xdc/0x128 [ 33.227941] kasan_check_range+0x100/0x1a8 [ 33.227990] __kasan_check_write+0x20/0x30 [ 33.228382] kasan_atomics_helper+0x126c/0x4858 [ 33.228474] kasan_atomics+0x198/0x2e0 [ 33.228525] kunit_try_run_case+0x170/0x3f0 [ 33.228579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.228632] kthread+0x328/0x630 [ 33.229058] ret_from_fork+0x10/0x20 [ 33.229347] [ 33.229581] Allocated by task 296: [ 33.229629] kasan_save_stack+0x3c/0x68 [ 33.229677] kasan_save_track+0x20/0x40 [ 33.229716] kasan_save_alloc_info+0x40/0x58 [ 33.229953] __kasan_kmalloc+0xd4/0xd8 [ 33.230100] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.230421] kasan_atomics+0xb8/0x2e0 [ 33.230559] kunit_try_run_case+0x170/0x3f0 [ 33.230605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.231028] kthread+0x328/0x630 [ 33.231240] ret_from_fork+0x10/0x20 [ 33.231440] [ 33.231521] The buggy address belongs to the object at fff00000c9225780 [ 33.231521] which belongs to the cache kmalloc-64 of size 64 [ 33.231642] The buggy address is located 0 bytes to the right of [ 33.231642] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.231880] [ 33.232049] The buggy address belongs to the physical page: [ 33.232139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.232606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.232969] page_type: f5(slab) [ 33.233127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.233263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.233310] page dumped because: kasan: bad access detected [ 33.233343] [ 33.233730] Memory state around the buggy address: [ 33.233827] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.234070] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.234121] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.234561] ^ [ 33.234761] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.235033] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.235113] ================================================================== [ 33.244863] ================================================================== [ 33.245005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.245345] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.245503] [ 33.245595] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.246150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.246228] Hardware name: linux,dummy-virt (DT) [ 33.246289] Call trace: [ 33.246333] show_stack+0x20/0x38 (C) [ 33.246826] dump_stack_lvl+0x8c/0xd0 [ 33.246976] print_report+0x118/0x5e8 [ 33.247097] kasan_report+0xdc/0x128 [ 33.247150] kasan_check_range+0x100/0x1a8 [ 33.247402] __kasan_check_write+0x20/0x30 [ 33.247565] kasan_atomics_helper+0x1384/0x4858 [ 33.247625] kasan_atomics+0x198/0x2e0 [ 33.248074] kunit_try_run_case+0x170/0x3f0 [ 33.248347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.248612] kthread+0x328/0x630 [ 33.248705] ret_from_fork+0x10/0x20 [ 33.248974] [ 33.249426] Allocated by task 296: [ 33.249546] kasan_save_stack+0x3c/0x68 [ 33.249599] kasan_save_track+0x20/0x40 [ 33.249639] kasan_save_alloc_info+0x40/0x58 [ 33.249679] __kasan_kmalloc+0xd4/0xd8 [ 33.250032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.250118] kasan_atomics+0xb8/0x2e0 [ 33.250540] kunit_try_run_case+0x170/0x3f0 [ 33.250589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.250904] kthread+0x328/0x630 [ 33.251285] ret_from_fork+0x10/0x20 [ 33.251379] [ 33.251419] The buggy address belongs to the object at fff00000c9225780 [ 33.251419] which belongs to the cache kmalloc-64 of size 64 [ 33.251478] The buggy address is located 0 bytes to the right of [ 33.251478] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.251543] [ 33.251566] The buggy address belongs to the physical page: [ 33.251611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.251675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.251734] page_type: f5(slab) [ 33.251776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.251845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.251894] page dumped because: kasan: bad access detected [ 33.251938] [ 33.251960] Memory state around the buggy address: [ 33.251994] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.252039] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.252092] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.252131] ^ [ 33.252174] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.252216] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.252261] ================================================================== [ 32.999928] ================================================================== [ 32.999984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.000040] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.000092] [ 33.000123] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.000216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.000247] Hardware name: linux,dummy-virt (DT) [ 33.000279] Call trace: [ 33.000302] show_stack+0x20/0x38 (C) [ 33.000655] dump_stack_lvl+0x8c/0xd0 [ 33.000961] print_report+0x118/0x5e8 [ 33.001248] kasan_report+0xdc/0x128 [ 33.001441] kasan_check_range+0x100/0x1a8 [ 33.001678] __kasan_check_write+0x20/0x30 [ 33.001803] kasan_atomics_helper+0xa6c/0x4858 [ 33.001990] kasan_atomics+0x198/0x2e0 [ 33.002359] kunit_try_run_case+0x170/0x3f0 [ 33.002473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.002594] kthread+0x328/0x630 [ 33.002679] ret_from_fork+0x10/0x20 [ 33.002807] [ 33.002840] Allocated by task 296: [ 33.003146] kasan_save_stack+0x3c/0x68 [ 33.003273] kasan_save_track+0x20/0x40 [ 33.003360] kasan_save_alloc_info+0x40/0x58 [ 33.003707] __kasan_kmalloc+0xd4/0xd8 [ 33.003757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.003821] kasan_atomics+0xb8/0x2e0 [ 33.004319] kunit_try_run_case+0x170/0x3f0 [ 33.004414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.004507] kthread+0x328/0x630 [ 33.004637] ret_from_fork+0x10/0x20 [ 33.004780] [ 33.004939] The buggy address belongs to the object at fff00000c9225780 [ 33.004939] which belongs to the cache kmalloc-64 of size 64 [ 33.005327] The buggy address is located 0 bytes to the right of [ 33.005327] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.005469] [ 33.005537] The buggy address belongs to the physical page: [ 33.005739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.005952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.006075] page_type: f5(slab) [ 33.006244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.006369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.006724] page dumped because: kasan: bad access detected [ 33.006785] [ 33.006927] Memory state around the buggy address: [ 33.007016] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.007151] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.007226] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.007440] ^ [ 33.007569] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.007642] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.007700] ================================================================== [ 33.275269] ================================================================== [ 33.275353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.275414] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.275881] [ 33.275931] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.276422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.276475] Hardware name: linux,dummy-virt (DT) [ 33.276510] Call trace: [ 33.276554] show_stack+0x20/0x38 (C) [ 33.276746] dump_stack_lvl+0x8c/0xd0 [ 33.276826] print_report+0x118/0x5e8 [ 33.276874] kasan_report+0xdc/0x128 [ 33.276920] kasan_check_range+0x100/0x1a8 [ 33.276967] __kasan_check_write+0x20/0x30 [ 33.277014] kasan_atomics_helper+0x147c/0x4858 [ 33.277065] kasan_atomics+0x198/0x2e0 [ 33.277113] kunit_try_run_case+0x170/0x3f0 [ 33.277162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.277214] kthread+0x328/0x630 [ 33.277383] ret_from_fork+0x10/0x20 [ 33.277450] [ 33.277474] Allocated by task 296: [ 33.277508] kasan_save_stack+0x3c/0x68 [ 33.277552] kasan_save_track+0x20/0x40 [ 33.277590] kasan_save_alloc_info+0x40/0x58 [ 33.277629] __kasan_kmalloc+0xd4/0xd8 [ 33.277666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.277710] kasan_atomics+0xb8/0x2e0 [ 33.277750] kunit_try_run_case+0x170/0x3f0 [ 33.277789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.277848] kthread+0x328/0x630 [ 33.277886] ret_from_fork+0x10/0x20 [ 33.277936] [ 33.277959] The buggy address belongs to the object at fff00000c9225780 [ 33.277959] which belongs to the cache kmalloc-64 of size 64 [ 33.278025] The buggy address is located 0 bytes to the right of [ 33.278025] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.278090] [ 33.278112] The buggy address belongs to the physical page: [ 33.278147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.278208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.278257] page_type: f5(slab) [ 33.278297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.278349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.278396] page dumped because: kasan: bad access detected [ 33.278429] [ 33.278450] Memory state around the buggy address: [ 33.278495] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.278539] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.278582] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.278621] ^ [ 33.278655] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.278698] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.278747] ================================================================== [ 32.831115] ================================================================== [ 32.831167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 32.832007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.832230] show_stack+0x20/0x38 (C) [ 32.833328] kasan_atomics+0x198/0x2e0 [ 32.834535] kasan_save_track+0x20/0x40 [ 32.836570] The buggy address is located 0 bytes to the right of [ 32.836570] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 32.837981] [ 32.838639] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.840081] ================================================================== [ 33.097957] ================================================================== [ 33.098221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.098425] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.098492] [ 33.098699] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.098804] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.099030] Hardware name: linux,dummy-virt (DT) [ 33.099080] Call trace: [ 33.099304] show_stack+0x20/0x38 (C) [ 33.099617] dump_stack_lvl+0x8c/0xd0 [ 33.099784] print_report+0x118/0x5e8 [ 33.099874] kasan_report+0xdc/0x128 [ 33.100134] kasan_check_range+0x100/0x1a8 [ 33.100292] __kasan_check_read+0x20/0x30 [ 33.100601] kasan_atomics_helper+0xdd4/0x4858 [ 33.100680] kasan_atomics+0x198/0x2e0 [ 33.100869] kunit_try_run_case+0x170/0x3f0 [ 33.101086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.101526] kthread+0x328/0x630 [ 33.101611] ret_from_fork+0x10/0x20 [ 33.102030] [ 33.102376] Allocated by task 296: [ 33.102488] kasan_save_stack+0x3c/0x68 [ 33.102772] kasan_save_track+0x20/0x40 [ 33.102963] kasan_save_alloc_info+0x40/0x58 [ 33.103034] __kasan_kmalloc+0xd4/0xd8 [ 33.103452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.103543] kasan_atomics+0xb8/0x2e0 [ 33.103705] kunit_try_run_case+0x170/0x3f0 [ 33.103846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.103918] kthread+0x328/0x630 [ 33.104297] ret_from_fork+0x10/0x20 [ 33.104379] [ 33.104713] The buggy address belongs to the object at fff00000c9225780 [ 33.104713] which belongs to the cache kmalloc-64 of size 64 [ 33.105213] The buggy address is located 0 bytes to the right of [ 33.105213] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.105610] [ 33.105677] The buggy address belongs to the physical page: [ 33.105963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.106218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.106277] page_type: f5(slab) [ 33.106318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.106466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.106522] page dumped because: kasan: bad access detected [ 33.106555] [ 33.106576] Memory state around the buggy address: [ 33.106609] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.106655] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.106699] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.106738] ^ [ 33.106774] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.106841] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.106893] ================================================================== [ 33.080393] ================================================================== [ 33.080669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.080882] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.081168] [ 33.081399] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.081521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.081875] Hardware name: linux,dummy-virt (DT) [ 33.081937] Call trace: [ 33.082052] show_stack+0x20/0x38 (C) [ 33.082185] dump_stack_lvl+0x8c/0xd0 [ 33.082252] print_report+0x118/0x5e8 [ 33.082305] kasan_report+0xdc/0x128 [ 33.082691] kasan_check_range+0x100/0x1a8 [ 33.083217] __kasan_check_write+0x20/0x30 [ 33.083310] kasan_atomics_helper+0xd3c/0x4858 [ 33.083721] kasan_atomics+0x198/0x2e0 [ 33.083809] kunit_try_run_case+0x170/0x3f0 [ 33.084075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.084285] kthread+0x328/0x630 [ 33.084522] ret_from_fork+0x10/0x20 [ 33.084786] [ 33.084851] Allocated by task 296: [ 33.084893] kasan_save_stack+0x3c/0x68 [ 33.085134] kasan_save_track+0x20/0x40 [ 33.085320] kasan_save_alloc_info+0x40/0x58 [ 33.085707] __kasan_kmalloc+0xd4/0xd8 [ 33.085872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.085960] kasan_atomics+0xb8/0x2e0 [ 33.086069] kunit_try_run_case+0x170/0x3f0 [ 33.086222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.086269] kthread+0x328/0x630 [ 33.086320] ret_from_fork+0x10/0x20 [ 33.086359] [ 33.086536] The buggy address belongs to the object at fff00000c9225780 [ 33.086536] which belongs to the cache kmalloc-64 of size 64 [ 33.086795] The buggy address is located 0 bytes to the right of [ 33.086795] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.087106] [ 33.087212] The buggy address belongs to the physical page: [ 33.087270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.088020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.088200] page_type: f5(slab) [ 33.088275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.088367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.088514] page dumped because: kasan: bad access detected [ 33.088549] [ 33.088569] Memory state around the buggy address: [ 33.088626] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.089252] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.089320] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.089363] ^ [ 33.089399] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.089445] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.089525] ================================================================== [ 33.122865] ================================================================== [ 33.122924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.122981] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.123246] [ 33.123419] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.123722] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.123967] Hardware name: linux,dummy-virt (DT) [ 33.124056] Call trace: [ 33.124086] show_stack+0x20/0x38 (C) [ 33.124234] dump_stack_lvl+0x8c/0xd0 [ 33.124293] print_report+0x118/0x5e8 [ 33.124341] kasan_report+0xdc/0x128 [ 33.124389] kasan_check_range+0x100/0x1a8 [ 33.124437] __kasan_check_write+0x20/0x30 [ 33.124597] kasan_atomics_helper+0xe44/0x4858 [ 33.124665] kasan_atomics+0x198/0x2e0 [ 33.124722] kunit_try_run_case+0x170/0x3f0 [ 33.124772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.124837] kthread+0x328/0x630 [ 33.125442] ret_from_fork+0x10/0x20 [ 33.126033] [ 33.126140] Allocated by task 296: [ 33.126192] kasan_save_stack+0x3c/0x68 [ 33.126365] kasan_save_track+0x20/0x40 [ 33.126427] kasan_save_alloc_info+0x40/0x58 [ 33.126775] __kasan_kmalloc+0xd4/0xd8 [ 33.126855] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.127281] kasan_atomics+0xb8/0x2e0 [ 33.127352] kunit_try_run_case+0x170/0x3f0 [ 33.127438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.127682] kthread+0x328/0x630 [ 33.127886] ret_from_fork+0x10/0x20 [ 33.127970] [ 33.128014] The buggy address belongs to the object at fff00000c9225780 [ 33.128014] which belongs to the cache kmalloc-64 of size 64 [ 33.128318] The buggy address is located 0 bytes to the right of [ 33.128318] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.128499] [ 33.128577] The buggy address belongs to the physical page: [ 33.128615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.129048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.129178] page_type: f5(slab) [ 33.129225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.129602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.130247] page dumped because: kasan: bad access detected [ 33.130310] [ 33.130365] Memory state around the buggy address: [ 33.130442] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.130581] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.130929] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.131324] ^ [ 33.131496] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.131730] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.131849] ================================================================== [ 33.253746] ================================================================== [ 33.253800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.253872] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.253923] [ 33.253956] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.254047] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.254350] Hardware name: linux,dummy-virt (DT) [ 33.254403] Call trace: [ 33.255291] show_stack+0x20/0x38 (C) [ 33.255368] dump_stack_lvl+0x8c/0xd0 [ 33.255421] print_report+0x118/0x5e8 [ 33.255504] kasan_report+0xdc/0x128 [ 33.255562] __asan_report_load8_noabort+0x20/0x30 [ 33.255616] kasan_atomics_helper+0x3f04/0x4858 [ 33.255936] kasan_atomics+0x198/0x2e0 [ 33.256051] kunit_try_run_case+0x170/0x3f0 [ 33.256111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.256498] kthread+0x328/0x630 [ 33.256568] ret_from_fork+0x10/0x20 [ 33.256621] [ 33.256643] Allocated by task 296: [ 33.257174] kasan_save_stack+0x3c/0x68 [ 33.257256] kasan_save_track+0x20/0x40 [ 33.257296] kasan_save_alloc_info+0x40/0x58 [ 33.257338] __kasan_kmalloc+0xd4/0xd8 [ 33.257373] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.257417] kasan_atomics+0xb8/0x2e0 [ 33.257456] kunit_try_run_case+0x170/0x3f0 [ 33.257877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.258210] kthread+0x328/0x630 [ 33.258304] ret_from_fork+0x10/0x20 [ 33.258346] [ 33.258640] The buggy address belongs to the object at fff00000c9225780 [ 33.258640] which belongs to the cache kmalloc-64 of size 64 [ 33.259083] The buggy address is located 0 bytes to the right of [ 33.259083] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.259451] [ 33.259598] The buggy address belongs to the physical page: [ 33.259692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.260021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.260463] page_type: f5(slab) [ 33.260638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.260855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.260934] page dumped because: kasan: bad access detected [ 33.261021] [ 33.261059] Memory state around the buggy address: [ 33.261095] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.261338] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.261403] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.261558] ^ [ 33.261886] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.261982] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.262134] ================================================================== [ 33.353653] ================================================================== [ 33.353722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.353777] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.353839] [ 33.353872] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.354164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.354202] Hardware name: linux,dummy-virt (DT) [ 33.354368] Call trace: [ 33.354394] show_stack+0x20/0x38 (C) [ 33.354448] dump_stack_lvl+0x8c/0xd0 [ 33.354507] print_report+0x118/0x5e8 [ 33.354727] kasan_report+0xdc/0x128 [ 33.354779] kasan_check_range+0x100/0x1a8 [ 33.354871] __kasan_check_write+0x20/0x30 [ 33.355164] kasan_atomics_helper+0x17ec/0x4858 [ 33.355322] kasan_atomics+0x198/0x2e0 [ 33.355374] kunit_try_run_case+0x170/0x3f0 [ 33.355440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.355666] kthread+0x328/0x630 [ 33.355726] ret_from_fork+0x10/0x20 [ 33.355858] [ 33.355943] Allocated by task 296: [ 33.355977] kasan_save_stack+0x3c/0x68 [ 33.356021] kasan_save_track+0x20/0x40 [ 33.356059] kasan_save_alloc_info+0x40/0x58 [ 33.356129] __kasan_kmalloc+0xd4/0xd8 [ 33.356444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.356554] kasan_atomics+0xb8/0x2e0 [ 33.356598] kunit_try_run_case+0x170/0x3f0 [ 33.356852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.356912] kthread+0x328/0x630 [ 33.356949] ret_from_fork+0x10/0x20 [ 33.357209] [ 33.357278] The buggy address belongs to the object at fff00000c9225780 [ 33.357278] which belongs to the cache kmalloc-64 of size 64 [ 33.357426] The buggy address is located 0 bytes to the right of [ 33.357426] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.357535] [ 33.357604] The buggy address belongs to the physical page: [ 33.357700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.357990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.358128] page_type: f5(slab) [ 33.358177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.358563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.358731] page dumped because: kasan: bad access detected [ 33.358820] [ 33.358888] Memory state around the buggy address: [ 33.359247] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.359357] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.359488] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.359527] ^ [ 33.359579] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.359945] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.360028] ================================================================== [ 33.207045] ================================================================== [ 33.207367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.207525] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.207610] [ 33.207645] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.207774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.207805] Hardware name: linux,dummy-virt (DT) [ 33.207848] Call trace: [ 33.208357] show_stack+0x20/0x38 (C) [ 33.208551] dump_stack_lvl+0x8c/0xd0 [ 33.208614] print_report+0x118/0x5e8 [ 33.208872] kasan_report+0xdc/0x128 [ 33.209066] kasan_check_range+0x100/0x1a8 [ 33.209480] __kasan_check_write+0x20/0x30 [ 33.209691] kasan_atomics_helper+0x1190/0x4858 [ 33.209907] kasan_atomics+0x198/0x2e0 [ 33.210078] kunit_try_run_case+0x170/0x3f0 [ 33.210177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.210544] kthread+0x328/0x630 [ 33.210648] ret_from_fork+0x10/0x20 [ 33.210702] [ 33.210748] Allocated by task 296: [ 33.211098] kasan_save_stack+0x3c/0x68 [ 33.211163] kasan_save_track+0x20/0x40 [ 33.211220] kasan_save_alloc_info+0x40/0x58 [ 33.211392] __kasan_kmalloc+0xd4/0xd8 [ 33.211439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.211486] kasan_atomics+0xb8/0x2e0 [ 33.211525] kunit_try_run_case+0x170/0x3f0 [ 33.211923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.211994] kthread+0x328/0x630 [ 33.212360] ret_from_fork+0x10/0x20 [ 33.212567] [ 33.212644] The buggy address belongs to the object at fff00000c9225780 [ 33.212644] which belongs to the cache kmalloc-64 of size 64 [ 33.213145] The buggy address is located 0 bytes to the right of [ 33.213145] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.213373] [ 33.213534] The buggy address belongs to the physical page: [ 33.213605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.213801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.213987] page_type: f5(slab) [ 33.214374] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.214501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.214558] page dumped because: kasan: bad access detected [ 33.214639] [ 33.214719] Memory state around the buggy address: [ 33.214786] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.214844] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.215059] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.215268] ^ [ 33.215362] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.215837] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.215920] ================================================================== [ 33.311704] ================================================================== [ 33.311764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.311832] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.311900] [ 33.311933] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.312235] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.312280] Hardware name: linux,dummy-virt (DT) [ 33.312350] Call trace: [ 33.312376] show_stack+0x20/0x38 (C) [ 33.312431] dump_stack_lvl+0x8c/0xd0 [ 33.312481] print_report+0x118/0x5e8 [ 33.312556] kasan_report+0xdc/0x128 [ 33.312617] __asan_report_load8_noabort+0x20/0x30 [ 33.312669] kasan_atomics_helper+0x3db0/0x4858 [ 33.312721] kasan_atomics+0x198/0x2e0 [ 33.312788] kunit_try_run_case+0x170/0x3f0 [ 33.312880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.313019] kthread+0x328/0x630 [ 33.313082] ret_from_fork+0x10/0x20 [ 33.313133] [ 33.313161] Allocated by task 296: [ 33.313192] kasan_save_stack+0x3c/0x68 [ 33.313234] kasan_save_track+0x20/0x40 [ 33.313272] kasan_save_alloc_info+0x40/0x58 [ 33.313313] __kasan_kmalloc+0xd4/0xd8 [ 33.313348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.313565] kasan_atomics+0xb8/0x2e0 [ 33.313635] kunit_try_run_case+0x170/0x3f0 [ 33.313709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.313805] kthread+0x328/0x630 [ 33.314167] ret_from_fork+0x10/0x20 [ 33.314256] [ 33.314324] The buggy address belongs to the object at fff00000c9225780 [ 33.314324] which belongs to the cache kmalloc-64 of size 64 [ 33.314431] The buggy address is located 0 bytes to the right of [ 33.314431] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.314515] [ 33.314537] The buggy address belongs to the physical page: [ 33.314735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.314961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.315041] page_type: f5(slab) [ 33.315096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.315322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.315367] page dumped because: kasan: bad access detected [ 33.315533] [ 33.315877] Memory state around the buggy address: [ 33.316157] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.316332] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.316450] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.316518] ^ [ 33.316606] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.316704] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.316745] ================================================================== [ 33.263635] ================================================================== [ 33.263838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.264046] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.264322] [ 33.264403] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.264503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.264535] Hardware name: linux,dummy-virt (DT) [ 33.264951] Call trace: [ 33.265199] show_stack+0x20/0x38 (C) [ 33.265281] dump_stack_lvl+0x8c/0xd0 [ 33.265350] print_report+0x118/0x5e8 [ 33.265793] kasan_report+0xdc/0x128 [ 33.266252] kasan_check_range+0x100/0x1a8 [ 33.266315] __kasan_check_write+0x20/0x30 [ 33.266363] kasan_atomics_helper+0x1414/0x4858 [ 33.266447] kasan_atomics+0x198/0x2e0 [ 33.266774] kunit_try_run_case+0x170/0x3f0 [ 33.266873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.267468] kthread+0x328/0x630 [ 33.267645] ret_from_fork+0x10/0x20 [ 33.268077] [ 33.268135] Allocated by task 296: [ 33.268172] kasan_save_stack+0x3c/0x68 [ 33.268464] kasan_save_track+0x20/0x40 [ 33.268837] kasan_save_alloc_info+0x40/0x58 [ 33.269076] __kasan_kmalloc+0xd4/0xd8 [ 33.269187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.269375] kasan_atomics+0xb8/0x2e0 [ 33.269634] kunit_try_run_case+0x170/0x3f0 [ 33.269791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.269885] kthread+0x328/0x630 [ 33.270099] ret_from_fork+0x10/0x20 [ 33.270304] [ 33.270479] The buggy address belongs to the object at fff00000c9225780 [ 33.270479] which belongs to the cache kmalloc-64 of size 64 [ 33.270550] The buggy address is located 0 bytes to the right of [ 33.270550] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.270615] [ 33.270909] The buggy address belongs to the physical page: [ 33.271310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.271409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.271517] page_type: f5(slab) [ 33.271850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.271937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.272044] page dumped because: kasan: bad access detected [ 33.272132] [ 33.272249] Memory state around the buggy address: [ 33.272305] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.272369] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.272413] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.272772] ^ [ 33.272891] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.273087] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.273304] ================================================================== [ 33.196646] ================================================================== [ 33.197104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.197190] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.197243] [ 33.197277] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.197610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.198010] Hardware name: linux,dummy-virt (DT) [ 33.198090] Call trace: [ 33.198282] show_stack+0x20/0x38 (C) [ 33.198380] dump_stack_lvl+0x8c/0xd0 [ 33.198555] print_report+0x118/0x5e8 [ 33.198612] kasan_report+0xdc/0x128 [ 33.198659] kasan_check_range+0x100/0x1a8 [ 33.198708] __kasan_check_write+0x20/0x30 [ 33.199119] kasan_atomics_helper+0x1128/0x4858 [ 33.199620] kasan_atomics+0x198/0x2e0 [ 33.199915] kunit_try_run_case+0x170/0x3f0 [ 33.200175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.200385] kthread+0x328/0x630 [ 33.200450] ret_from_fork+0x10/0x20 [ 33.200749] [ 33.200840] Allocated by task 296: [ 33.201236] kasan_save_stack+0x3c/0x68 [ 33.201297] kasan_save_track+0x20/0x40 [ 33.201623] kasan_save_alloc_info+0x40/0x58 [ 33.201712] __kasan_kmalloc+0xd4/0xd8 [ 33.202071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.202191] kasan_atomics+0xb8/0x2e0 [ 33.202264] kunit_try_run_case+0x170/0x3f0 [ 33.202304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.202647] kthread+0x328/0x630 [ 33.202955] ret_from_fork+0x10/0x20 [ 33.203300] [ 33.203355] The buggy address belongs to the object at fff00000c9225780 [ 33.203355] which belongs to the cache kmalloc-64 of size 64 [ 33.203689] The buggy address is located 0 bytes to the right of [ 33.203689] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.203772] [ 33.203984] The buggy address belongs to the physical page: [ 33.204042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.204239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.204565] page_type: f5(slab) [ 33.205145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.205230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.205303] page dumped because: kasan: bad access detected [ 33.205336] [ 33.205393] Memory state around the buggy address: [ 33.205429] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.205477] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.205530] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.205580] ^ [ 33.205618] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.205671] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.205712] ================================================================== [ 33.110430] ================================================================== [ 33.110802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.110986] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.111048] [ 33.111084] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.111580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.111637] Hardware name: linux,dummy-virt (DT) [ 33.111673] Call trace: [ 33.111698] show_stack+0x20/0x38 (C) [ 33.112060] dump_stack_lvl+0x8c/0xd0 [ 33.112138] print_report+0x118/0x5e8 [ 33.112527] kasan_report+0xdc/0x128 [ 33.112852] __asan_report_load8_noabort+0x20/0x30 [ 33.113085] kasan_atomics_helper+0x3f58/0x4858 [ 33.113908] kasan_atomics+0x198/0x2e0 [ 33.113990] kunit_try_run_case+0x170/0x3f0 [ 33.114305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.114443] kthread+0x328/0x630 [ 33.114524] ret_from_fork+0x10/0x20 [ 33.114900] [ 33.115340] Allocated by task 296: [ 33.115384] kasan_save_stack+0x3c/0x68 [ 33.115624] kasan_save_track+0x20/0x40 [ 33.115856] kasan_save_alloc_info+0x40/0x58 [ 33.116289] __kasan_kmalloc+0xd4/0xd8 [ 33.116525] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.116640] kasan_atomics+0xb8/0x2e0 [ 33.116954] kunit_try_run_case+0x170/0x3f0 [ 33.117009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.117758] kthread+0x328/0x630 [ 33.117963] ret_from_fork+0x10/0x20 [ 33.118079] [ 33.118221] The buggy address belongs to the object at fff00000c9225780 [ 33.118221] which belongs to the cache kmalloc-64 of size 64 [ 33.118283] The buggy address is located 0 bytes to the right of [ 33.118283] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.118380] [ 33.118427] The buggy address belongs to the physical page: [ 33.118684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.119328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.119562] page_type: f5(slab) [ 33.119607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.119659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.120254] page dumped because: kasan: bad access detected [ 33.120439] [ 33.120490] Memory state around the buggy address: [ 33.120544] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.120651] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.120712] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.120751] ^ [ 33.121042] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.121261] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.121340] ================================================================== [ 33.162187] ================================================================== [ 33.162254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.162348] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.162432] [ 33.162467] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.162634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.162668] Hardware name: linux,dummy-virt (DT) [ 33.162719] Call trace: [ 33.162800] show_stack+0x20/0x38 (C) [ 33.162884] dump_stack_lvl+0x8c/0xd0 [ 33.162994] print_report+0x118/0x5e8 [ 33.163041] kasan_report+0xdc/0x128 [ 33.163089] kasan_check_range+0x100/0x1a8 [ 33.163151] __kasan_check_write+0x20/0x30 [ 33.163348] kasan_atomics_helper+0xf88/0x4858 [ 33.163652] kasan_atomics+0x198/0x2e0 [ 33.163870] kunit_try_run_case+0x170/0x3f0 [ 33.163943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.163997] kthread+0x328/0x630 [ 33.164041] ret_from_fork+0x10/0x20 [ 33.164128] [ 33.164166] Allocated by task 296: [ 33.164204] kasan_save_stack+0x3c/0x68 [ 33.164640] kasan_save_track+0x20/0x40 [ 33.164730] kasan_save_alloc_info+0x40/0x58 [ 33.164774] __kasan_kmalloc+0xd4/0xd8 [ 33.165370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.165531] kasan_atomics+0xb8/0x2e0 [ 33.165603] kunit_try_run_case+0x170/0x3f0 [ 33.165701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.165788] kthread+0x328/0x630 [ 33.165853] ret_from_fork+0x10/0x20 [ 33.165893] [ 33.166267] The buggy address belongs to the object at fff00000c9225780 [ 33.166267] which belongs to the cache kmalloc-64 of size 64 [ 33.166374] The buggy address is located 0 bytes to the right of [ 33.166374] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.166920] [ 33.166973] The buggy address belongs to the physical page: [ 33.167028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.167296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.167410] page_type: f5(slab) [ 33.167639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.168086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.168176] page dumped because: kasan: bad access detected [ 33.168406] [ 33.168453] Memory state around the buggy address: [ 33.168599] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.168681] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.169054] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.169130] ^ [ 33.169410] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.169565] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.169729] ================================================================== [ 33.336690] ================================================================== [ 33.336849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.336915] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.336990] [ 33.337050] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.337142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.337176] Hardware name: linux,dummy-virt (DT) [ 33.337209] Call trace: [ 33.337232] show_stack+0x20/0x38 (C) [ 33.337283] dump_stack_lvl+0x8c/0xd0 [ 33.337332] print_report+0x118/0x5e8 [ 33.337546] kasan_report+0xdc/0x128 [ 33.337694] __asan_report_load8_noabort+0x20/0x30 [ 33.337790] kasan_atomics_helper+0x3e10/0x4858 [ 33.337883] kasan_atomics+0x198/0x2e0 [ 33.337995] kunit_try_run_case+0x170/0x3f0 [ 33.338047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338100] kthread+0x328/0x630 [ 33.338384] ret_from_fork+0x10/0x20 [ 33.338499] [ 33.338538] Allocated by task 296: [ 33.338570] kasan_save_stack+0x3c/0x68 [ 33.338980] kasan_save_track+0x20/0x40 [ 33.339106] kasan_save_alloc_info+0x40/0x58 [ 33.339371] __kasan_kmalloc+0xd4/0xd8 [ 33.339545] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.339722] kasan_atomics+0xb8/0x2e0 [ 33.339774] kunit_try_run_case+0x170/0x3f0 [ 33.339824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.340165] kthread+0x328/0x630 [ 33.340345] ret_from_fork+0x10/0x20 [ 33.340441] [ 33.340519] The buggy address belongs to the object at fff00000c9225780 [ 33.340519] which belongs to the cache kmalloc-64 of size 64 [ 33.340885] The buggy address is located 0 bytes to the right of [ 33.340885] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.340984] [ 33.341006] The buggy address belongs to the physical page: [ 33.341038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.341226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.341276] page_type: f5(slab) [ 33.341550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.341683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.342016] page dumped because: kasan: bad access detected [ 33.342135] [ 33.342253] Memory state around the buggy address: [ 33.342334] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.342382] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.342435] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.342484] ^ [ 33.342519] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.342563] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.342612] ================================================================== [ 32.885450] ================================================================== [ 32.885508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 32.885562] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 32.885614] [ 32.885974] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.887319] kasan_atomics_helper+0x414/0x4858 [ 32.887798] kunit_try_run_case+0x170/0x3f0 [ 32.888132] [ 32.888537] kasan_save_track+0x20/0x40 [ 32.888884] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.889097] kunit_try_run_case+0x170/0x3f0 [ 32.889183] kthread+0x328/0x630 [ 32.889702] The buggy address belongs to the object at fff00000c9225780 [ 32.889702] which belongs to the cache kmalloc-64 of size 64 [ 32.891306] [ 32.891363] Memory state around the buggy address: [ 32.891968] ^ [ 32.892189] ================================================================== [ 32.981678] ================================================================== [ 32.981731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 32.981787] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 32.982109] [ 32.982310] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.982470] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.982506] Hardware name: linux,dummy-virt (DT) [ 32.982539] Call trace: [ 32.982564] show_stack+0x20/0x38 (C) [ 32.982823] dump_stack_lvl+0x8c/0xd0 [ 32.982884] print_report+0x118/0x5e8 [ 32.983019] kasan_report+0xdc/0x128 [ 32.983116] kasan_check_range+0x100/0x1a8 [ 32.983222] __kasan_check_write+0x20/0x30 [ 32.983288] kasan_atomics_helper+0x99c/0x4858 [ 32.983341] kasan_atomics+0x198/0x2e0 [ 32.983408] kunit_try_run_case+0x170/0x3f0 [ 32.983736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.983800] kthread+0x328/0x630 [ 32.983941] ret_from_fork+0x10/0x20 [ 32.983993] [ 32.984063] Allocated by task 296: [ 32.984151] kasan_save_stack+0x3c/0x68 [ 32.984268] kasan_save_track+0x20/0x40 [ 32.984367] kasan_save_alloc_info+0x40/0x58 [ 32.984423] __kasan_kmalloc+0xd4/0xd8 [ 32.984463] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.984506] kasan_atomics+0xb8/0x2e0 [ 32.984845] kunit_try_run_case+0x170/0x3f0 [ 32.985376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.985738] kthread+0x328/0x630 [ 32.985879] ret_from_fork+0x10/0x20 [ 32.986006] [ 32.986084] The buggy address belongs to the object at fff00000c9225780 [ 32.986084] which belongs to the cache kmalloc-64 of size 64 [ 32.986180] The buggy address is located 0 bytes to the right of [ 32.986180] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 32.986269] [ 32.986491] The buggy address belongs to the physical page: [ 32.986739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 32.986843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.987146] page_type: f5(slab) [ 32.987198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.987544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.987664] page dumped because: kasan: bad access detected [ 32.987946] [ 32.988006] Memory state around the buggy address: [ 32.988253] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.988585] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.988865] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.989121] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.990901] [ 32.991146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.991214] Call trace: [ 32.991564] kasan_report+0xdc/0x128 [ 32.992866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.994057] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.995060] ret_from_fork+0x10/0x20 [ 32.995508] [ 32.995744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 32.996268] page_type: f5(slab) [ 32.996349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.996703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.996845] page dumped because: kasan: bad access detected [ 32.996920] [ 32.997087] Memory state around the buggy address: [ 32.997180] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.997354] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.997522] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.997586] ^ [ 32.997874] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.997933] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.998093] ================================================================== [ 33.296983] ================================================================== [ 33.297105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.297479] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296 [ 33.297557] [ 33.297601] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 33.298142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.298573] Hardware name: linux,dummy-virt (DT) [ 33.298643] Call trace: [ 33.298688] show_stack+0x20/0x38 (C) [ 33.298791] dump_stack_lvl+0x8c/0xd0 [ 33.298903] print_report+0x118/0x5e8 [ 33.299068] kasan_report+0xdc/0x128 [ 33.299175] kasan_check_range+0x100/0x1a8 [ 33.299325] __kasan_check_write+0x20/0x30 [ 33.299837] kasan_atomics_helper+0x154c/0x4858 [ 33.300100] kasan_atomics+0x198/0x2e0 [ 33.300374] kunit_try_run_case+0x170/0x3f0 [ 33.301022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.301396] kthread+0x328/0x630 [ 33.301525] ret_from_fork+0x10/0x20 [ 33.301669] [ 33.301750] Allocated by task 296: [ 33.302167] kasan_save_stack+0x3c/0x68 [ 33.302248] kasan_save_track+0x20/0x40 [ 33.302521] kasan_save_alloc_info+0x40/0x58 [ 33.302604] __kasan_kmalloc+0xd4/0xd8 [ 33.302644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.302988] kasan_atomics+0xb8/0x2e0 [ 33.303312] kunit_try_run_case+0x170/0x3f0 [ 33.303580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.303940] kthread+0x328/0x630 [ 33.304677] ret_from_fork+0x10/0x20 [ 33.305400] [ 33.305441] The buggy address belongs to the object at fff00000c9225780 [ 33.305441] which belongs to the cache kmalloc-64 of size 64 [ 33.305503] The buggy address is located 0 bytes to the right of [ 33.305503] allocated 48-byte region [fff00000c9225780, fff00000c92257b0) [ 33.305568] [ 33.305592] The buggy address belongs to the physical page: [ 33.305628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225 [ 33.305686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.305736] page_type: f5(slab) [ 33.305777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.305840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.305992] page dumped because: kasan: bad access detected [ 33.306100] [ 33.306177] Memory state around the buggy address: [ 33.306310] fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.306427] fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.306537] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.306627] ^ [ 33.306712] fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.306768] fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.306807] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 32.667212] ================================================================== [ 32.667266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.667399] Read of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.668624] __asan_report_load8_noabort+0x20/0x30 [ 32.669379] ret_from_fork+0x10/0x20 [ 32.669429] [ 32.670268] kasan_save_track+0x20/0x40 [ 32.670908] kunit_try_run_case+0x170/0x3f0 [ 32.671890] The buggy address is located 8 bytes inside of [ 32.671890] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.673208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.675755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.677249] kthread+0x328/0x630 [ 32.677292] ret_from_fork+0x10/0x20 [ 32.677341] [ 32.677380] Allocated by task 292: [ 32.677412] kasan_save_stack+0x3c/0x68 [ 32.677705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.678359] The buggy address is located 8 bytes inside of [ 32.678359] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.679412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.680288] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.682531] [ 32.683100] Call trace: [ 32.683928] kasan_bitops_generic+0x110/0x1c8 [ 32.684162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.684439] kthread+0x328/0x630 [ 32.684527] ret_from_fork+0x10/0x20 [ 32.684580] [ 32.684636] Allocated by task 292: [ 32.684672] kasan_save_stack+0x3c/0x68 [ 32.684717] kasan_save_track+0x20/0x40 [ 32.684885] kasan_save_alloc_info+0x40/0x58 [ 32.685403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.686033] The buggy address belongs to the object at fff00000c7b7a960 [ 32.686033] which belongs to the cache kmalloc-16 of size 16 [ 32.686824] page_type: f5(slab) [ 32.687037] page dumped because: kasan: bad access detected [ 32.687192] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.688572] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.690426] kunit_try_run_case+0x170/0x3f0 [ 32.690770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.691178] kthread+0x328/0x630 [ 32.691546] kasan_save_stack+0x3c/0x68 [ 32.692450] kunit_try_run_case+0x170/0x3f0 [ 32.693396] The buggy address is located 8 bytes inside of [ 32.693396] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.694142] page_type: f5(slab) [ 32.694407] page dumped because: kasan: bad access detected [ 32.694696] ^ [ 32.698200] kasan_report+0xdc/0x128 [ 32.698723] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 32.699166] kunit_try_run_case+0x170/0x3f0 [ 32.699773] ret_from_fork+0x10/0x20 [ 32.700310] kasan_bitops_generic+0xa0/0x1c8 [ 32.700454] kthread+0x328/0x630 [ 32.700632] The buggy address is located 8 bytes inside of [ 32.700632] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.701723] page dumped because: kasan: bad access detected [ 32.702515] ^ [ 32.703883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.705262] kasan_report+0xdc/0x128 [ 32.705548] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.706315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.707962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.709050] [ 32.709212] The buggy address is located 8 bytes inside of [ 32.709212] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.709752] page dumped because: kasan: bad access detected [ 32.710120] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.711897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.712738] kasan_check_range+0x100/0x1a8 [ 32.712789] __kasan_check_write+0x20/0x30 [ 32.713166] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 32.713453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.715405] kasan_bitops_generic+0xa0/0x1c8 [ 32.715843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.716553] The buggy address is located 8 bytes inside of [ 32.716553] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.717441] page dumped because: kasan: bad access detected [ 32.718169] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.719799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 32.720543] kasan_report+0xdc/0x128 [ 32.720802] kunit_try_run_case+0x170/0x3f0 [ 32.721310] kasan_bitops_generic+0xa0/0x1c8 [ 32.721516] [ 32.721666] [ 32.721721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 32.723295] ^ [ 32.724697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 32.725470] dump_stack_lvl+0x8c/0xd0 [ 32.725520] print_report+0x118/0x5e8 [ 32.725774] kasan_report+0xdc/0x128 [ 32.726125] kasan_bitops_generic+0x110/0x1c8 [ 32.727128] kasan_save_stack+0x3c/0x68 [ 32.727896] kasan_bitops_generic+0xa0/0x1c8 [ 32.728345] kthread+0x328/0x630 [ 32.728766] The buggy address is located 8 bytes inside of [ 32.728766] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.729895] page_type: f5(slab) [ 32.730417] page dumped because: kasan: bad access detected [ 32.730802] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.734526] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.735072] show_stack+0x20/0x38 (C) [ 32.735136] dump_stack_lvl+0x8c/0xd0 [ 32.735294] print_report+0x118/0x5e8 [ 32.735354] kasan_report+0xdc/0x128 [ 32.735428] kasan_check_range+0x100/0x1a8 [ 32.735531] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 32.735921] kasan_save_stack+0x3c/0x68 [ 32.736056] __kasan_kmalloc+0xd4/0xd8 [ 32.736094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.736264] kthread+0x328/0x630 [ 32.736357] The buggy address belongs to the object at fff00000c7b7a960 [ 32.736357] which belongs to the cache kmalloc-16 of size 16 [ 32.736593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.736733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.737954] ^ [ 32.739548] Read of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.739861] Hardware name: linux,dummy-virt (DT) [ 32.739899] Call trace: [ 32.740444] __asan_report_load8_noabort+0x20/0x30 [ 32.741301] kthread+0x328/0x630 [ 32.742198] __kasan_kmalloc+0xd4/0xd8 [ 32.743164] kthread+0x328/0x630 [ 32.743391] [ 32.743590] The buggy address is located 8 bytes inside of [ 32.743590] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.744782] [ 32.745498] ^ [ 32.746806] ================================================================== [ 32.660058] ================================================================== [ 32.660119] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.660178] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.660229] [ 32.660265] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.660355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.660387] Hardware name: linux,dummy-virt (DT) [ 32.660420] Call trace: [ 32.660444] show_stack+0x20/0x38 (C) [ 32.660494] dump_stack_lvl+0x8c/0xd0 [ 32.660541] print_report+0x118/0x5e8 [ 32.660586] kasan_report+0xdc/0x128 [ 32.660630] kasan_check_range+0x100/0x1a8 [ 32.660678] __kasan_check_write+0x20/0x30 [ 32.660725] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.660779] kasan_bitops_generic+0x110/0x1c8 [ 32.661201] kunit_try_run_case+0x170/0x3f0 [ 32.661565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.661659] kthread+0x328/0x630 [ 32.661706] ret_from_fork+0x10/0x20 [ 32.662425] [ 32.662480] Allocated by task 292: [ 32.662589] kasan_save_stack+0x3c/0x68 [ 32.662676] kasan_save_track+0x20/0x40 [ 32.662822] kasan_save_alloc_info+0x40/0x58 [ 32.662879] __kasan_kmalloc+0xd4/0xd8 [ 32.663231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.663311] kasan_bitops_generic+0xa0/0x1c8 [ 32.663411] kunit_try_run_case+0x170/0x3f0 [ 32.663482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.663616] kthread+0x328/0x630 [ 32.663794] ret_from_fork+0x10/0x20 [ 32.663860] [ 32.663882] The buggy address belongs to the object at fff00000c7b7a960 [ 32.663882] which belongs to the cache kmalloc-16 of size 16 [ 32.663961] The buggy address is located 8 bytes inside of [ 32.663961] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.664313] [ 32.664372] The buggy address belongs to the physical page: [ 32.664465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 32.664580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.664713] page_type: f5(slab) [ 32.664787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.664990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.665176] page dumped because: kasan: bad access detected [ 32.665231] [ 32.665311] Memory state around the buggy address: [ 32.665389] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.665499] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.665632] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.665711] ^ [ 32.665820] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665893] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 32.645998] ================================================================== [ 32.646409] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 32.646485] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290 [ 32.646546] [ 32.646707] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.646935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.647002] Hardware name: linux,dummy-virt (DT) [ 32.647036] Call trace: [ 32.647106] show_stack+0x20/0x38 (C) [ 32.647422] dump_stack_lvl+0x8c/0xd0 [ 32.647502] print_report+0x118/0x5e8 [ 32.647616] kasan_report+0xdc/0x128 [ 32.647669] __asan_report_load1_noabort+0x20/0x30 [ 32.647747] strnlen+0x80/0x88 [ 32.648067] kasan_strings+0x478/0xb00 [ 32.648230] kunit_try_run_case+0x170/0x3f0 [ 32.648286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.648340] kthread+0x328/0x630 [ 32.648624] ret_from_fork+0x10/0x20 [ 32.648706] [ 32.648838] Allocated by task 290: [ 32.648910] kasan_save_stack+0x3c/0x68 [ 32.649022] kasan_save_track+0x20/0x40 [ 32.649240] kasan_save_alloc_info+0x40/0x58 [ 32.649443] __kasan_kmalloc+0xd4/0xd8 [ 32.649538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.649648] kasan_strings+0xc8/0xb00 [ 32.649737] kunit_try_run_case+0x170/0x3f0 [ 32.649872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.649972] kthread+0x328/0x630 [ 32.650025] ret_from_fork+0x10/0x20 [ 32.650330] [ 32.650379] Freed by task 290: [ 32.650525] kasan_save_stack+0x3c/0x68 [ 32.650640] kasan_save_track+0x20/0x40 [ 32.650685] kasan_save_free_info+0x4c/0x78 [ 32.650986] __kasan_slab_free+0x6c/0x98 [ 32.651165] kfree+0x214/0x3c8 [ 32.651273] kasan_strings+0x24c/0xb00 [ 32.651399] kunit_try_run_case+0x170/0x3f0 [ 32.651442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.651679] kthread+0x328/0x630 [ 32.651864] ret_from_fork+0x10/0x20 [ 32.651937] [ 32.651961] The buggy address belongs to the object at fff00000c9227a00 [ 32.651961] which belongs to the cache kmalloc-32 of size 32 [ 32.652144] The buggy address is located 16 bytes inside of [ 32.652144] freed 32-byte region [fff00000c9227a00, fff00000c9227a20) [ 32.652214] [ 32.652248] The buggy address belongs to the physical page: [ 32.652286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227 [ 32.652372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.652421] page_type: f5(slab) [ 32.652469] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.652523] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.652566] page dumped because: kasan: bad access detected [ 32.652599] [ 32.652633] Memory state around the buggy address: [ 32.652675] fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.652721] fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.652766] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.652828] ^ [ 32.652859] fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.653426] fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.653498] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 32.637694] ================================================================== [ 32.637750] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 32.637805] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290 [ 32.637889] [ 32.637921] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.638018] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.638051] Hardware name: linux,dummy-virt (DT) [ 32.638084] Call trace: [ 32.638107] show_stack+0x20/0x38 (C) [ 32.638163] dump_stack_lvl+0x8c/0xd0 [ 32.638210] print_report+0x118/0x5e8 [ 32.638258] kasan_report+0xdc/0x128 [ 32.638314] __asan_report_load1_noabort+0x20/0x30 [ 32.638367] strlen+0xa8/0xb0 [ 32.638412] kasan_strings+0x418/0xb00 [ 32.638460] kunit_try_run_case+0x170/0x3f0 [ 32.638508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.638570] kthread+0x328/0x630 [ 32.638616] ret_from_fork+0x10/0x20 [ 32.638663] [ 32.638683] Allocated by task 290: [ 32.638719] kasan_save_stack+0x3c/0x68 [ 32.638760] kasan_save_track+0x20/0x40 [ 32.638797] kasan_save_alloc_info+0x40/0x58 [ 32.639465] __kasan_kmalloc+0xd4/0xd8 [ 32.639529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.639610] kasan_strings+0xc8/0xb00 [ 32.639658] kunit_try_run_case+0x170/0x3f0 [ 32.639702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.640113] kthread+0x328/0x630 [ 32.640202] ret_from_fork+0x10/0x20 [ 32.640245] [ 32.640268] Freed by task 290: [ 32.640522] kasan_save_stack+0x3c/0x68 [ 32.640589] kasan_save_track+0x20/0x40 [ 32.640872] kasan_save_free_info+0x4c/0x78 [ 32.640967] __kasan_slab_free+0x6c/0x98 [ 32.641260] kfree+0x214/0x3c8 [ 32.641358] kasan_strings+0x24c/0xb00 [ 32.641607] kunit_try_run_case+0x170/0x3f0 [ 32.641683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.642016] kthread+0x328/0x630 [ 32.642130] ret_from_fork+0x10/0x20 [ 32.642214] [ 32.642297] The buggy address belongs to the object at fff00000c9227a00 [ 32.642297] which belongs to the cache kmalloc-32 of size 32 [ 32.642382] The buggy address is located 16 bytes inside of [ 32.642382] freed 32-byte region [fff00000c9227a00, fff00000c9227a20) [ 32.642538] [ 32.642608] The buggy address belongs to the physical page: [ 32.642703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227 [ 32.642863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.642932] page_type: f5(slab) [ 32.643314] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.643440] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.643518] page dumped because: kasan: bad access detected [ 32.643633] [ 32.643656] Memory state around the buggy address: [ 32.643689] fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.644009] fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.644105] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.644205] ^ [ 32.644291] fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.644572] fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.644690] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 32.627828] ================================================================== [ 32.627994] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 32.628073] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290 [ 32.628397] [ 32.628460] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.628850] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.628902] Hardware name: linux,dummy-virt (DT) [ 32.629014] Call trace: [ 32.629077] show_stack+0x20/0x38 (C) [ 32.629230] dump_stack_lvl+0x8c/0xd0 [ 32.629354] print_report+0x118/0x5e8 [ 32.629501] kasan_report+0xdc/0x128 [ 32.629552] __asan_report_load1_noabort+0x20/0x30 [ 32.629603] kasan_strings+0x95c/0xb00 [ 32.630023] kunit_try_run_case+0x170/0x3f0 [ 32.630146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.630308] kthread+0x328/0x630 [ 32.630406] ret_from_fork+0x10/0x20 [ 32.630589] [ 32.630648] Allocated by task 290: [ 32.630680] kasan_save_stack+0x3c/0x68 [ 32.631032] kasan_save_track+0x20/0x40 [ 32.631107] kasan_save_alloc_info+0x40/0x58 [ 32.631220] __kasan_kmalloc+0xd4/0xd8 [ 32.631297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.631383] kasan_strings+0xc8/0xb00 [ 32.631425] kunit_try_run_case+0x170/0x3f0 [ 32.631599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631676] kthread+0x328/0x630 [ 32.631712] ret_from_fork+0x10/0x20 [ 32.632185] [ 32.632249] Freed by task 290: [ 32.632339] kasan_save_stack+0x3c/0x68 [ 32.632389] kasan_save_track+0x20/0x40 [ 32.632474] kasan_save_free_info+0x4c/0x78 [ 32.632869] __kasan_slab_free+0x6c/0x98 [ 32.632940] kfree+0x214/0x3c8 [ 32.633077] kasan_strings+0x24c/0xb00 [ 32.633169] kunit_try_run_case+0x170/0x3f0 [ 32.633302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.633381] kthread+0x328/0x630 [ 32.633418] ret_from_fork+0x10/0x20 [ 32.633746] [ 32.633831] The buggy address belongs to the object at fff00000c9227a00 [ 32.633831] which belongs to the cache kmalloc-32 of size 32 [ 32.633963] The buggy address is located 16 bytes inside of [ 32.633963] freed 32-byte region [fff00000c9227a00, fff00000c9227a20) [ 32.634076] [ 32.634166] The buggy address belongs to the physical page: [ 32.634266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227 [ 32.634661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.634855] page_type: f5(slab) [ 32.634924] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.635123] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.635211] page dumped because: kasan: bad access detected [ 32.635344] [ 32.635365] Memory state around the buggy address: [ 32.635400] fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.635782] fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.636155] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.636224] ^ [ 32.636325] fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.636432] fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.636590] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 32.618527] ================================================================== [ 32.618576] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 32.618634] Read of size 1 at addr fff00000c9227a10 by task kunit_try_catch/290 [ 32.618685] [ 32.618720] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.618828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.618860] Hardware name: linux,dummy-virt (DT) [ 32.619029] Call trace: [ 32.619065] show_stack+0x20/0x38 (C) [ 32.619122] dump_stack_lvl+0x8c/0xd0 [ 32.619171] print_report+0x118/0x5e8 [ 32.619219] kasan_report+0xdc/0x128 [ 32.619264] __asan_report_load1_noabort+0x20/0x30 [ 32.619316] strcmp+0xc0/0xc8 [ 32.619361] kasan_strings+0x340/0xb00 [ 32.619435] kunit_try_run_case+0x170/0x3f0 [ 32.619486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.619538] kthread+0x328/0x630 [ 32.619583] ret_from_fork+0x10/0x20 [ 32.619641] [ 32.619663] Allocated by task 290: [ 32.619694] kasan_save_stack+0x3c/0x68 [ 32.619747] kasan_save_track+0x20/0x40 [ 32.619786] kasan_save_alloc_info+0x40/0x58 [ 32.620725] __kasan_kmalloc+0xd4/0xd8 [ 32.621106] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.621231] kasan_strings+0xc8/0xb00 [ 32.621326] kunit_try_run_case+0x170/0x3f0 [ 32.621643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.621738] kthread+0x328/0x630 [ 32.621781] ret_from_fork+0x10/0x20 [ 32.622057] [ 32.622135] Freed by task 290: [ 32.622271] kasan_save_stack+0x3c/0x68 [ 32.622357] kasan_save_track+0x20/0x40 [ 32.622513] kasan_save_free_info+0x4c/0x78 [ 32.622589] __kasan_slab_free+0x6c/0x98 [ 32.622941] kfree+0x214/0x3c8 [ 32.623012] kasan_strings+0x24c/0xb00 [ 32.623148] kunit_try_run_case+0x170/0x3f0 [ 32.623235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.623367] kthread+0x328/0x630 [ 32.623402] ret_from_fork+0x10/0x20 [ 32.623728] [ 32.623779] The buggy address belongs to the object at fff00000c9227a00 [ 32.623779] which belongs to the cache kmalloc-32 of size 32 [ 32.623928] The buggy address is located 16 bytes inside of [ 32.623928] freed 32-byte region [fff00000c9227a00, fff00000c9227a20) [ 32.624054] [ 32.624450] The buggy address belongs to the physical page: [ 32.624537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227 [ 32.624674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.624779] page_type: f5(slab) [ 32.624868] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.625160] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.625242] page dumped because: kasan: bad access detected [ 32.625557] [ 32.625602] Memory state around the buggy address: [ 32.625730] fff00000c9227900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.625906] fff00000c9227980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.626003] >fff00000c9227a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.626057] ^ [ 32.626092] fff00000c9227a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.626390] fff00000c9227b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.626576] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 32.597847] ================================================================== [ 32.597911] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 32.597972] Read of size 1 at addr fff00000c9227858 by task kunit_try_catch/288 [ 32.598025] [ 32.598059] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.598150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.598187] Hardware name: linux,dummy-virt (DT) [ 32.598220] Call trace: [ 32.598245] show_stack+0x20/0x38 (C) [ 32.598298] dump_stack_lvl+0x8c/0xd0 [ 32.598348] print_report+0x118/0x5e8 [ 32.598394] kasan_report+0xdc/0x128 [ 32.598440] __asan_report_load1_noabort+0x20/0x30 [ 32.598492] memcmp+0x198/0x1d8 [ 32.598538] kasan_memcmp+0x16c/0x300 [ 32.598585] kunit_try_run_case+0x170/0x3f0 [ 32.598636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.598691] kthread+0x328/0x630 [ 32.598735] ret_from_fork+0x10/0x20 [ 32.598786] [ 32.598808] Allocated by task 288: [ 32.598872] kasan_save_stack+0x3c/0x68 [ 32.598933] kasan_save_track+0x20/0x40 [ 32.598971] kasan_save_alloc_info+0x40/0x58 [ 32.599017] __kasan_kmalloc+0xd4/0xd8 [ 32.599056] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.599101] kasan_memcmp+0xbc/0x300 [ 32.599140] kunit_try_run_case+0x170/0x3f0 [ 32.599179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.599224] kthread+0x328/0x630 [ 32.599260] ret_from_fork+0x10/0x20 [ 32.599299] [ 32.599321] The buggy address belongs to the object at fff00000c9227840 [ 32.599321] which belongs to the cache kmalloc-32 of size 32 [ 32.599381] The buggy address is located 0 bytes to the right of [ 32.599381] allocated 24-byte region [fff00000c9227840, fff00000c9227858) [ 32.599447] [ 32.599469] The buggy address belongs to the physical page: [ 32.599506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109227 [ 32.599561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.599609] page_type: f5(slab) [ 32.599660] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.599720] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.599762] page dumped because: kasan: bad access detected [ 32.599795] [ 32.601043] Memory state around the buggy address: [ 32.601431] fff00000c9227700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.601602] fff00000c9227780: 00 00 00 04 fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.601798] >fff00000c9227800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.602103] ^ [ 32.602378] fff00000c9227880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.602461] fff00000c9227900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.602839] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 32.572889] ================================================================== [ 32.573124] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 32.573232] Read of size 1 at addr ffff800080a37b4a by task kunit_try_catch/284 [ 32.573356] [ 32.573413] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.573523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.573557] Hardware name: linux,dummy-virt (DT) [ 32.573589] Call trace: [ 32.573616] show_stack+0x20/0x38 (C) [ 32.573668] dump_stack_lvl+0x8c/0xd0 [ 32.573717] print_report+0x310/0x5e8 [ 32.573942] kasan_report+0xdc/0x128 [ 32.574022] __asan_report_load1_noabort+0x20/0x30 [ 32.574339] kasan_alloca_oob_right+0x2dc/0x340 [ 32.574438] kunit_try_run_case+0x170/0x3f0 [ 32.574594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.574704] kthread+0x328/0x630 [ 32.575105] ret_from_fork+0x10/0x20 [ 32.575313] [ 32.575387] The buggy address belongs to stack of task kunit_try_catch/284 [ 32.575473] [ 32.575576] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080a30000 allocated at kernel_clone+0x150/0x7b0 [ 32.575972] The buggy address belongs to the physical page: [ 32.576106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c95f10c8 pfn:0x1095f1 [ 32.576233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.576298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.576398] raw: fff00000c95f10c8 0000000000000000 00000001ffffffff 0000000000000000 [ 32.576452] page dumped because: kasan: bad access detected [ 32.576488] [ 32.576508] Memory state around the buggy address: [ 32.576551] ffff800080a37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.576598] ffff800080a37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.576640] >ffff800080a37b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 32.576679] ^ [ 32.576726] ffff800080a37b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.576779] ffff800080a37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.576840] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 32.560438] ================================================================== [ 32.560540] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 32.560728] Read of size 1 at addr ffff800080b37b5f by task kunit_try_catch/282 [ 32.560785] [ 32.561010] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.561246] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.561339] Hardware name: linux,dummy-virt (DT) [ 32.561431] Call trace: [ 32.561541] show_stack+0x20/0x38 (C) [ 32.561748] dump_stack_lvl+0x8c/0xd0 [ 32.561802] print_report+0x310/0x5e8 [ 32.562174] kasan_report+0xdc/0x128 [ 32.562329] __asan_report_load1_noabort+0x20/0x30 [ 32.562438] kasan_alloca_oob_left+0x2b8/0x310 [ 32.562604] kunit_try_run_case+0x170/0x3f0 [ 32.562730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.562890] kthread+0x328/0x630 [ 32.562945] ret_from_fork+0x10/0x20 [ 32.563363] [ 32.563423] The buggy address belongs to stack of task kunit_try_catch/282 [ 32.563570] [ 32.563661] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b30000 allocated at kernel_clone+0x150/0x7b0 [ 32.563882] The buggy address belongs to the physical page: [ 32.564228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109253 [ 32.564310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.564466] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.564603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.564698] page dumped because: kasan: bad access detected [ 32.564773] [ 32.564863] Memory state around the buggy address: [ 32.564958] ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.565011] ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.565389] >ffff800080b37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 32.565461] ^ [ 32.565573] ffff800080b37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.565689] ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.565825] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 32.542329] ================================================================== [ 32.542478] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.543009] Read of size 1 at addr ffff800080b37c2a by task kunit_try_catch/280 [ 32.543354] [ 32.543426] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.543524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.543564] Hardware name: linux,dummy-virt (DT) [ 32.543598] Call trace: [ 32.543623] show_stack+0x20/0x38 (C) [ 32.543676] dump_stack_lvl+0x8c/0xd0 [ 32.543863] print_report+0x310/0x5e8 [ 32.543953] kasan_report+0xdc/0x128 [ 32.544117] __asan_report_load1_noabort+0x20/0x30 [ 32.544181] kasan_stack_oob+0x238/0x270 [ 32.544358] kunit_try_run_case+0x170/0x3f0 [ 32.544615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.544901] kthread+0x328/0x630 [ 32.545185] ret_from_fork+0x10/0x20 [ 32.545479] [ 32.546330] The buggy address belongs to stack of task kunit_try_catch/280 [ 32.546623] and is located at offset 138 in frame: [ 32.546799] kasan_stack_oob+0x0/0x270 [ 32.547206] [ 32.547416] This frame has 4 objects: [ 32.547896] [48, 49) '__assertion' [ 32.548284] [64, 72) 'array' [ 32.548337] [96, 112) '__assertion' [ 32.548538] [128, 138) 'stack_array' [ 32.548596] [ 32.548900] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b30000 allocated at kernel_clone+0x150/0x7b0 [ 32.549081] The buggy address belongs to the physical page: [ 32.549257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109253 [ 32.549542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.549659] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.549736] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.550145] page dumped because: kasan: bad access detected [ 32.550204] [ 32.550356] Memory state around the buggy address: [ 32.550440] ffff800080b37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.550708] ffff800080b37b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.550760] >ffff800080b37c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.551148] ^ [ 32.551206] ffff800080b37c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.551378] ffff800080b37d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.551424] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 32.515552] ================================================================== [ 32.515616] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 32.515674] Read of size 1 at addr ffff97f87258f68d by task kunit_try_catch/276 [ 32.515727] [ 32.515765] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.516698] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.516778] Hardware name: linux,dummy-virt (DT) [ 32.516836] Call trace: [ 32.516884] show_stack+0x20/0x38 (C) [ 32.516976] dump_stack_lvl+0x8c/0xd0 [ 32.517052] print_report+0x310/0x5e8 [ 32.517139] kasan_report+0xdc/0x128 [ 32.517315] __asan_report_load1_noabort+0x20/0x30 [ 32.517379] kasan_global_oob_right+0x230/0x270 [ 32.517438] kunit_try_run_case+0x170/0x3f0 [ 32.517828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.518012] kthread+0x328/0x630 [ 32.518181] ret_from_fork+0x10/0x20 [ 32.518261] [ 32.518627] The buggy address belongs to the variable: [ 32.519035] global_array+0xd/0x40 [ 32.519184] [ 32.519300] The buggy address belongs to a 0-page vmalloc region starting at 0xffff97f8706f0000 allocated at paging_init+0x66c/0x7d0 [ 32.520798] The buggy address belongs to the physical page: [ 32.521000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d8f [ 32.521166] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 32.521417] raw: 03fffe0000002000 ffffc1ffc01f63c8 ffffc1ffc01f63c8 0000000000000000 [ 32.521650] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.521755] page dumped because: kasan: bad access detected [ 32.521787] [ 32.521852] Memory state around the buggy address: [ 32.522109] ffff97f87258f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.522294] ffff97f87258f600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 32.522387] >ffff97f87258f680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 32.522798] ^ [ 32.522954] ffff97f87258f700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 32.523057] ffff97f87258f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.523495] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 32.484869] ================================================================== [ 32.485140] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.485205] Free of addr fff00000c9a95f01 by task kunit_try_catch/272 [ 32.485276] [ 32.485315] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.485683] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.485767] Hardware name: linux,dummy-virt (DT) [ 32.485809] Call trace: [ 32.485978] show_stack+0x20/0x38 (C) [ 32.486041] dump_stack_lvl+0x8c/0xd0 [ 32.486232] print_report+0x118/0x5e8 [ 32.486432] kasan_report_invalid_free+0xc0/0xe8 [ 32.486621] check_slab_allocation+0xfc/0x108 [ 32.486697] __kasan_mempool_poison_object+0x78/0x150 [ 32.487058] mempool_free+0x3f4/0x5f0 [ 32.487138] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.487295] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.487440] kunit_try_run_case+0x170/0x3f0 [ 32.487550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.487627] kthread+0x328/0x630 [ 32.487763] ret_from_fork+0x10/0x20 [ 32.487832] [ 32.487852] Allocated by task 272: [ 32.488024] kasan_save_stack+0x3c/0x68 [ 32.488220] kasan_save_track+0x20/0x40 [ 32.488283] kasan_save_alloc_info+0x40/0x58 [ 32.488421] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.488560] remove_element+0x130/0x1f8 [ 32.488665] mempool_alloc_preallocated+0x58/0xc0 [ 32.488708] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.488776] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.489160] kunit_try_run_case+0x170/0x3f0 [ 32.489222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.489350] kthread+0x328/0x630 [ 32.489430] ret_from_fork+0x10/0x20 [ 32.489583] [ 32.489652] The buggy address belongs to the object at fff00000c9a95f00 [ 32.489652] which belongs to the cache kmalloc-128 of size 128 [ 32.489891] The buggy address is located 1 bytes inside of [ 32.489891] 128-byte region [fff00000c9a95f00, fff00000c9a95f80) [ 32.489958] [ 32.489978] The buggy address belongs to the physical page: [ 32.490023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 32.490223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.490310] page_type: f5(slab) [ 32.490433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.490538] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 32.490653] page dumped because: kasan: bad access detected [ 32.490735] [ 32.490802] Memory state around the buggy address: [ 32.490943] fff00000c9a95e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.490988] fff00000c9a95e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.491201] >fff00000c9a95f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.491372] ^ [ 32.491460] fff00000c9a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.491594] fff00000c9a96000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.491734] ================================================================== [ 32.499323] ================================================================== [ 32.499389] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.499444] Free of addr fff00000c9ba4001 by task kunit_try_catch/274 [ 32.499652] [ 32.500126] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.500241] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.500308] Hardware name: linux,dummy-virt (DT) [ 32.500345] Call trace: [ 32.500578] show_stack+0x20/0x38 (C) [ 32.500663] dump_stack_lvl+0x8c/0xd0 [ 32.500889] print_report+0x118/0x5e8 [ 32.500997] kasan_report_invalid_free+0xc0/0xe8 [ 32.501311] __kasan_mempool_poison_object+0xfc/0x150 [ 32.501636] mempool_free+0x3f4/0x5f0 [ 32.502125] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.502257] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.502351] kunit_try_run_case+0x170/0x3f0 [ 32.502501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.502635] kthread+0x328/0x630 [ 32.502704] ret_from_fork+0x10/0x20 [ 32.502839] [ 32.502895] The buggy address belongs to the physical page: [ 32.502999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba4 [ 32.503079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.503422] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.503520] page_type: f8(unknown) [ 32.503596] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.503706] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.503922] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.504119] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.504234] head: 0bfffe0000000002 ffffc1ffc326e901 00000000ffffffff 00000000ffffffff [ 32.504468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.504653] page dumped because: kasan: bad access detected [ 32.504729] [ 32.504752] Memory state around the buggy address: [ 32.504822] fff00000c9ba3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.505001] fff00000c9ba3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.505227] >fff00000c9ba4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.505293] ^ [ 32.505324] fff00000c9ba4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.505376] fff00000c9ba4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.505417] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 32.436447] ================================================================== [ 32.436511] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.436569] Free of addr fff00000c9a95b00 by task kunit_try_catch/266 [ 32.436611] [ 32.436644] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.436780] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.437673] Hardware name: linux,dummy-virt (DT) [ 32.437767] Call trace: [ 32.437833] show_stack+0x20/0x38 (C) [ 32.437932] dump_stack_lvl+0x8c/0xd0 [ 32.438012] print_report+0x118/0x5e8 [ 32.438347] kasan_report_invalid_free+0xc0/0xe8 [ 32.438486] check_slab_allocation+0xd4/0x108 [ 32.438569] __kasan_mempool_poison_object+0x78/0x150 [ 32.438639] mempool_free+0x3f4/0x5f0 [ 32.438725] mempool_double_free_helper+0x150/0x2e8 [ 32.439013] mempool_kmalloc_double_free+0xc0/0x118 [ 32.439449] kunit_try_run_case+0x170/0x3f0 [ 32.439891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.440031] kthread+0x328/0x630 [ 32.440127] ret_from_fork+0x10/0x20 [ 32.440488] [ 32.440540] Allocated by task 266: [ 32.440592] kasan_save_stack+0x3c/0x68 [ 32.440734] kasan_save_track+0x20/0x40 [ 32.440792] kasan_save_alloc_info+0x40/0x58 [ 32.440845] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.441235] remove_element+0x130/0x1f8 [ 32.441337] mempool_alloc_preallocated+0x58/0xc0 [ 32.441396] mempool_double_free_helper+0x94/0x2e8 [ 32.441437] mempool_kmalloc_double_free+0xc0/0x118 [ 32.441782] kunit_try_run_case+0x170/0x3f0 [ 32.441893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.441972] kthread+0x328/0x630 [ 32.442051] ret_from_fork+0x10/0x20 [ 32.442472] [ 32.442613] Freed by task 266: [ 32.442691] kasan_save_stack+0x3c/0x68 [ 32.442807] kasan_save_track+0x20/0x40 [ 32.442891] kasan_save_free_info+0x4c/0x78 [ 32.442936] __kasan_mempool_poison_object+0xc0/0x150 [ 32.443311] mempool_free+0x3f4/0x5f0 [ 32.443416] mempool_double_free_helper+0x100/0x2e8 [ 32.443489] mempool_kmalloc_double_free+0xc0/0x118 [ 32.443862] kunit_try_run_case+0x170/0x3f0 [ 32.443918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.444189] kthread+0x328/0x630 [ 32.444332] ret_from_fork+0x10/0x20 [ 32.444547] [ 32.444656] The buggy address belongs to the object at fff00000c9a95b00 [ 32.444656] which belongs to the cache kmalloc-128 of size 128 [ 32.445173] The buggy address is located 0 bytes inside of [ 32.445173] 128-byte region [fff00000c9a95b00, fff00000c9a95b80) [ 32.445272] [ 32.445310] The buggy address belongs to the physical page: [ 32.445351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 32.445406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.445786] page_type: f5(slab) [ 32.445866] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.445919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.445960] page dumped because: kasan: bad access detected [ 32.446008] [ 32.446026] Memory state around the buggy address: [ 32.446076] fff00000c9a95a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.446136] fff00000c9a95a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.446185] >fff00000c9a95b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.446223] ^ [ 32.446251] fff00000c9a95b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.446303] fff00000c9a95c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.446341] ================================================================== [ 32.471350] ================================================================== [ 32.471414] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.471827] Free of addr fff00000c9ba0000 by task kunit_try_catch/270 [ 32.471888] [ 32.471923] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.472023] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.472144] Hardware name: linux,dummy-virt (DT) [ 32.472193] Call trace: [ 32.472218] show_stack+0x20/0x38 (C) [ 32.472553] dump_stack_lvl+0x8c/0xd0 [ 32.472632] print_report+0x118/0x5e8 [ 32.472794] kasan_report_invalid_free+0xc0/0xe8 [ 32.472948] __kasan_mempool_poison_pages+0xe0/0xe8 [ 32.473036] mempool_free+0x3ac/0x5f0 [ 32.473165] mempool_double_free_helper+0x150/0x2e8 [ 32.473275] mempool_page_alloc_double_free+0xbc/0x118 [ 32.473328] kunit_try_run_case+0x170/0x3f0 [ 32.473375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.473434] kthread+0x328/0x630 [ 32.473778] ret_from_fork+0x10/0x20 [ 32.473877] [ 32.473972] The buggy address belongs to the physical page: [ 32.474060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0 [ 32.474146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.474358] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.474422] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.474803] page dumped because: kasan: bad access detected [ 32.474867] [ 32.475157] Memory state around the buggy address: [ 32.475337] fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.475438] fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.475486] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.475531] ^ [ 32.475559] fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.475602] fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.475640] ================================================================== [ 32.454600] ================================================================== [ 32.454658] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.454709] Free of addr fff00000c9ba0000 by task kunit_try_catch/268 [ 32.454752] [ 32.454782] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.454904] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.454942] Hardware name: linux,dummy-virt (DT) [ 32.454979] Call trace: [ 32.455002] show_stack+0x20/0x38 (C) [ 32.455049] dump_stack_lvl+0x8c/0xd0 [ 32.455095] print_report+0x118/0x5e8 [ 32.455137] kasan_report_invalid_free+0xc0/0xe8 [ 32.455184] __kasan_mempool_poison_object+0x14c/0x150 [ 32.455231] mempool_free+0x3f4/0x5f0 [ 32.455274] mempool_double_free_helper+0x150/0x2e8 [ 32.455323] mempool_kmalloc_large_double_free+0xc0/0x118 [ 32.455374] kunit_try_run_case+0x170/0x3f0 [ 32.455421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.455471] kthread+0x328/0x630 [ 32.455513] ret_from_fork+0x10/0x20 [ 32.455559] [ 32.455588] The buggy address belongs to the physical page: [ 32.455623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0 [ 32.455676] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.455725] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.455777] page_type: f8(unknown) [ 32.456301] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.456364] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.456880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.456961] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.457032] head: 0bfffe0000000002 ffffc1ffc326e801 00000000ffffffff 00000000ffffffff [ 32.457107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.457298] page dumped because: kasan: bad access detected [ 32.457440] [ 32.457508] Memory state around the buggy address: [ 32.458170] fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458269] fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458501] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458545] ^ [ 32.458576] fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458627] fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458665] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 30.788745] ================================================================== [ 30.788809] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 30.789002] Read of size 1 at addr fff00000c925e0c8 by task kunit_try_catch/238 [ 30.789058] [ 30.790011] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.790139] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.790198] Hardware name: linux,dummy-virt (DT) [ 30.790274] Call trace: [ 30.790298] show_stack+0x20/0x38 (C) [ 30.790538] dump_stack_lvl+0x8c/0xd0 [ 30.790598] print_report+0x118/0x5e8 [ 30.790717] kasan_report+0xdc/0x128 [ 30.791159] __asan_report_load1_noabort+0x20/0x30 [ 30.791259] kmem_cache_oob+0x344/0x430 [ 30.791570] kunit_try_run_case+0x170/0x3f0 [ 30.791774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.791984] kthread+0x328/0x630 [ 30.792064] ret_from_fork+0x10/0x20 [ 30.792242] [ 30.792281] Allocated by task 238: [ 30.792309] kasan_save_stack+0x3c/0x68 [ 30.792615] kasan_save_track+0x20/0x40 [ 30.792688] kasan_save_alloc_info+0x40/0x58 [ 30.792782] __kasan_slab_alloc+0xa8/0xb0 [ 30.792926] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.792968] kmem_cache_oob+0x12c/0x430 [ 30.793309] kunit_try_run_case+0x170/0x3f0 [ 30.793458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.793575] kthread+0x328/0x630 [ 30.793951] ret_from_fork+0x10/0x20 [ 30.794045] [ 30.794097] The buggy address belongs to the object at fff00000c925e000 [ 30.794097] which belongs to the cache test_cache of size 200 [ 30.794257] The buggy address is located 0 bytes to the right of [ 30.794257] allocated 200-byte region [fff00000c925e000, fff00000c925e0c8) [ 30.794352] [ 30.794673] The buggy address belongs to the physical page: [ 30.794740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10925e [ 30.795115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.795213] page_type: f5(slab) [ 30.795350] raw: 0bfffe0000000000 fff00000c3f36780 dead000000000122 0000000000000000 [ 30.795436] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.795763] page dumped because: kasan: bad access detected [ 30.795847] [ 30.795921] Memory state around the buggy address: [ 30.796012] fff00000c925df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.796166] fff00000c925e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.796240] >fff00000c925e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.796279] ^ [ 30.796490] fff00000c925e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.796670] fff00000c925e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.796723] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.420033] ================================================================== [ 32.420100] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.420170] Read of size 1 at addr fff00000c9ba0000 by task kunit_try_catch/264 [ 32.420220] [ 32.420260] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.420353] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.420383] Hardware name: linux,dummy-virt (DT) [ 32.420415] Call trace: [ 32.420439] show_stack+0x20/0x38 (C) [ 32.420500] dump_stack_lvl+0x8c/0xd0 [ 32.420556] print_report+0x118/0x5e8 [ 32.420617] kasan_report+0xdc/0x128 [ 32.420668] __asan_report_load1_noabort+0x20/0x30 [ 32.420717] mempool_uaf_helper+0x314/0x340 [ 32.420762] mempool_page_alloc_uaf+0xc0/0x118 [ 32.420823] kunit_try_run_case+0x170/0x3f0 [ 32.421538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.421615] kthread+0x328/0x630 [ 32.421740] ret_from_fork+0x10/0x20 [ 32.421877] [ 32.421978] The buggy address belongs to the physical page: [ 32.422066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0 [ 32.422271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.422369] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.422807] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.422903] page dumped because: kasan: bad access detected [ 32.422981] [ 32.423108] Memory state around the buggy address: [ 32.423241] fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.423299] fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.423540] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.423758] ^ [ 32.423900] fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.423998] fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.424384] ================================================================== [ 32.363906] ================================================================== [ 32.364151] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.364351] Read of size 1 at addr fff00000c9ba0000 by task kunit_try_catch/260 [ 32.364425] [ 32.364481] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.364572] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.364599] Hardware name: linux,dummy-virt (DT) [ 32.364841] Call trace: [ 32.364878] show_stack+0x20/0x38 (C) [ 32.364997] dump_stack_lvl+0x8c/0xd0 [ 32.365054] print_report+0x118/0x5e8 [ 32.365105] kasan_report+0xdc/0x128 [ 32.365147] __asan_report_load1_noabort+0x20/0x30 [ 32.365332] mempool_uaf_helper+0x314/0x340 [ 32.365583] mempool_kmalloc_large_uaf+0xc4/0x120 [ 32.366004] kunit_try_run_case+0x170/0x3f0 [ 32.366146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.366334] kthread+0x328/0x630 [ 32.366411] ret_from_fork+0x10/0x20 [ 32.366607] [ 32.366640] The buggy address belongs to the physical page: [ 32.366688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba0 [ 32.366776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.366860] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.366914] page_type: f8(unknown) [ 32.366978] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.367029] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.367086] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.367141] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.367191] head: 0bfffe0000000002 ffffc1ffc326e801 00000000ffffffff 00000000ffffffff [ 32.367245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.367291] page dumped because: kasan: bad access detected [ 32.367330] [ 32.367347] Memory state around the buggy address: [ 32.367388] fff00000c9b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.367430] fff00000c9b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.367494] >fff00000c9ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.367532] ^ [ 32.367559] fff00000c9ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.367602] fff00000c9ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.367655] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.377755] ================================================================== [ 32.377958] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.378023] Read of size 1 at addr fff00000c921c240 by task kunit_try_catch/262 [ 32.378079] [ 32.378267] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.378372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.378410] Hardware name: linux,dummy-virt (DT) [ 32.378440] Call trace: [ 32.378473] show_stack+0x20/0x38 (C) [ 32.378525] dump_stack_lvl+0x8c/0xd0 [ 32.378569] print_report+0x118/0x5e8 [ 32.378806] kasan_report+0xdc/0x128 [ 32.378935] __asan_report_load1_noabort+0x20/0x30 [ 32.379156] mempool_uaf_helper+0x314/0x340 [ 32.379225] mempool_slab_uaf+0xc0/0x118 [ 32.379306] kunit_try_run_case+0x170/0x3f0 [ 32.379359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.379433] kthread+0x328/0x630 [ 32.379500] ret_from_fork+0x10/0x20 [ 32.379547] [ 32.379702] Allocated by task 262: [ 32.379745] kasan_save_stack+0x3c/0x68 [ 32.379790] kasan_save_track+0x20/0x40 [ 32.379983] kasan_save_alloc_info+0x40/0x58 [ 32.380029] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.380077] remove_element+0x16c/0x1f8 [ 32.380116] mempool_alloc_preallocated+0x58/0xc0 [ 32.380336] mempool_uaf_helper+0xa4/0x340 [ 32.380502] mempool_slab_uaf+0xc0/0x118 [ 32.380548] kunit_try_run_case+0x170/0x3f0 [ 32.380595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.380653] kthread+0x328/0x630 [ 32.380691] ret_from_fork+0x10/0x20 [ 32.380728] [ 32.380747] Freed by task 262: [ 32.380775] kasan_save_stack+0x3c/0x68 [ 32.381012] kasan_save_track+0x20/0x40 [ 32.381121] kasan_save_free_info+0x4c/0x78 [ 32.381262] __kasan_mempool_poison_object+0xc0/0x150 [ 32.381351] mempool_free+0x3f4/0x5f0 [ 32.381396] mempool_uaf_helper+0x104/0x340 [ 32.381600] mempool_slab_uaf+0xc0/0x118 [ 32.381647] kunit_try_run_case+0x170/0x3f0 [ 32.381739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.381823] kthread+0x328/0x630 [ 32.381912] ret_from_fork+0x10/0x20 [ 32.382019] [ 32.382094] The buggy address belongs to the object at fff00000c921c240 [ 32.382094] which belongs to the cache test_cache of size 123 [ 32.382350] The buggy address is located 0 bytes inside of [ 32.382350] freed 123-byte region [fff00000c921c240, fff00000c921c2bb) [ 32.382525] [ 32.382585] The buggy address belongs to the physical page: [ 32.382732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10921c [ 32.382802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.383035] page_type: f5(slab) [ 32.383204] raw: 0bfffe0000000000 fff00000c9247280 dead000000000122 0000000000000000 [ 32.383317] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.383453] page dumped because: kasan: bad access detected [ 32.383495] [ 32.383514] Memory state around the buggy address: [ 32.383683] fff00000c921c100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.383931] fff00000c921c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.384060] >fff00000c921c200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.384101] ^ [ 32.384136] fff00000c921c280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.384178] fff00000c921c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.384215] ================================================================== [ 32.352021] ================================================================== [ 32.352096] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.352168] Read of size 1 at addr fff00000c9a95700 by task kunit_try_catch/258 [ 32.352217] [ 32.352257] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.352350] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.352380] Hardware name: linux,dummy-virt (DT) [ 32.352412] Call trace: [ 32.352439] show_stack+0x20/0x38 (C) [ 32.352490] dump_stack_lvl+0x8c/0xd0 [ 32.352540] print_report+0x118/0x5e8 [ 32.352584] kasan_report+0xdc/0x128 [ 32.352626] __asan_report_load1_noabort+0x20/0x30 [ 32.352672] mempool_uaf_helper+0x314/0x340 [ 32.352720] mempool_kmalloc_uaf+0xc4/0x120 [ 32.352767] kunit_try_run_case+0x170/0x3f0 [ 32.352830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.353075] kthread+0x328/0x630 [ 32.353128] ret_from_fork+0x10/0x20 [ 32.353178] [ 32.353199] Allocated by task 258: [ 32.353227] kasan_save_stack+0x3c/0x68 [ 32.353270] kasan_save_track+0x20/0x40 [ 32.353307] kasan_save_alloc_info+0x40/0x58 [ 32.353345] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.353387] remove_element+0x130/0x1f8 [ 32.353428] mempool_alloc_preallocated+0x58/0xc0 [ 32.353469] mempool_uaf_helper+0xa4/0x340 [ 32.353509] mempool_kmalloc_uaf+0xc4/0x120 [ 32.353549] kunit_try_run_case+0x170/0x3f0 [ 32.353587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.353630] kthread+0x328/0x630 [ 32.353664] ret_from_fork+0x10/0x20 [ 32.353702] [ 32.353720] Freed by task 258: [ 32.353748] kasan_save_stack+0x3c/0x68 [ 32.353784] kasan_save_track+0x20/0x40 [ 32.353835] kasan_save_free_info+0x4c/0x78 [ 32.353873] __kasan_mempool_poison_object+0xc0/0x150 [ 32.353914] mempool_free+0x3f4/0x5f0 [ 32.353950] mempool_uaf_helper+0x104/0x340 [ 32.353992] mempool_kmalloc_uaf+0xc4/0x120 [ 32.354032] kunit_try_run_case+0x170/0x3f0 [ 32.354068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.354112] kthread+0x328/0x630 [ 32.354144] ret_from_fork+0x10/0x20 [ 32.354185] [ 32.354205] The buggy address belongs to the object at fff00000c9a95700 [ 32.354205] which belongs to the cache kmalloc-128 of size 128 [ 32.354265] The buggy address is located 0 bytes inside of [ 32.354265] freed 128-byte region [fff00000c9a95700, fff00000c9a95780) [ 32.354323] [ 32.354345] The buggy address belongs to the physical page: [ 32.354385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 32.354441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.354493] page_type: f5(slab) [ 32.354534] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.354583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.354623] page dumped because: kasan: bad access detected [ 32.354654] [ 32.354672] Memory state around the buggy address: [ 32.354705] fff00000c9a95600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.354748] fff00000c9a95680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.354790] >fff00000c9a95700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.354837] ^ [ 32.354863] fff00000c9a95780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.354904] fff00000c9a95800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.354942] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.287688] ================================================================== [ 32.287748] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.287803] Read of size 1 at addr fff00000c926a2bb by task kunit_try_catch/256 [ 32.290482] [ 32.290537] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.290684] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.290714] Hardware name: linux,dummy-virt (DT) [ 32.290745] Call trace: [ 32.290770] show_stack+0x20/0x38 (C) [ 32.290833] dump_stack_lvl+0x8c/0xd0 [ 32.290880] print_report+0x118/0x5e8 [ 32.291026] kasan_report+0xdc/0x128 [ 32.291300] __asan_report_load1_noabort+0x20/0x30 [ 32.291352] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.291401] mempool_slab_oob_right+0xc0/0x118 [ 32.293123] kunit_try_run_case+0x170/0x3f0 [ 32.293219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.293441] kthread+0x328/0x630 [ 32.293887] ret_from_fork+0x10/0x20 [ 32.294238] [ 32.294425] Allocated by task 256: [ 32.294488] kasan_save_stack+0x3c/0x68 [ 32.294536] kasan_save_track+0x20/0x40 [ 32.294742] kasan_save_alloc_info+0x40/0x58 [ 32.294861] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.295171] remove_element+0x16c/0x1f8 [ 32.295399] mempool_alloc_preallocated+0x58/0xc0 [ 32.295443] mempool_oob_right_helper+0x98/0x2f0 [ 32.295873] mempool_slab_oob_right+0xc0/0x118 [ 32.295974] kunit_try_run_case+0x170/0x3f0 [ 32.296105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.296602] kthread+0x328/0x630 [ 32.296649] ret_from_fork+0x10/0x20 [ 32.296685] [ 32.296705] The buggy address belongs to the object at fff00000c926a240 [ 32.296705] which belongs to the cache test_cache of size 123 [ 32.297018] The buggy address is located 0 bytes to the right of [ 32.297018] allocated 123-byte region [fff00000c926a240, fff00000c926a2bb) [ 32.297550] [ 32.297585] The buggy address belongs to the physical page: [ 32.297650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10926a [ 32.298233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.298681] page_type: f5(slab) [ 32.298723] raw: 0bfffe0000000000 fff00000c9247140 dead000000000122 0000000000000000 [ 32.299220] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.299267] page dumped because: kasan: bad access detected [ 32.299298] [ 32.299714] Memory state around the buggy address: [ 32.299779] fff00000c926a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.299848] fff00000c926a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.300162] >fff00000c926a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.300319] ^ [ 32.300639] fff00000c926a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.300691] fff00000c926a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.300730] ================================================================== [ 32.272018] ================================================================== [ 32.272125] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.272185] Read of size 1 at addr fff00000c9b9e001 by task kunit_try_catch/254 [ 32.272402] [ 32.272505] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.272622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.272653] Hardware name: linux,dummy-virt (DT) [ 32.272685] Call trace: [ 32.272708] show_stack+0x20/0x38 (C) [ 32.272769] dump_stack_lvl+0x8c/0xd0 [ 32.272827] print_report+0x118/0x5e8 [ 32.272871] kasan_report+0xdc/0x128 [ 32.272958] __asan_report_load1_noabort+0x20/0x30 [ 32.273083] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.273134] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.273186] kunit_try_run_case+0x170/0x3f0 [ 32.273231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.273304] kthread+0x328/0x630 [ 32.273345] ret_from_fork+0x10/0x20 [ 32.273424] [ 32.273444] The buggy address belongs to the physical page: [ 32.273481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b9c [ 32.273554] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.273601] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.273794] page_type: f8(unknown) [ 32.273905] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.273955] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.274003] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.274050] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.274098] head: 0bfffe0000000002 ffffc1ffc326e701 00000000ffffffff 00000000ffffffff [ 32.274145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.274189] page dumped because: kasan: bad access detected [ 32.274219] [ 32.274236] Memory state around the buggy address: [ 32.274319] fff00000c9b9df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.274362] fff00000c9b9df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.274404] >fff00000c9b9e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.274476] ^ [ 32.274503] fff00000c9b9e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.274545] fff00000c9b9e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.274582] ================================================================== [ 32.263351] ================================================================== [ 32.263432] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.263511] Read of size 1 at addr fff00000c9a95373 by task kunit_try_catch/252 [ 32.263562] [ 32.263604] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.263701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.263731] Hardware name: linux,dummy-virt (DT) [ 32.263766] Call trace: [ 32.263792] show_stack+0x20/0x38 (C) [ 32.263858] dump_stack_lvl+0x8c/0xd0 [ 32.263908] print_report+0x118/0x5e8 [ 32.263950] kasan_report+0xdc/0x128 [ 32.263992] __asan_report_load1_noabort+0x20/0x30 [ 32.264041] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.264090] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.264139] kunit_try_run_case+0x170/0x3f0 [ 32.264188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.264237] kthread+0x328/0x630 [ 32.264282] ret_from_fork+0x10/0x20 [ 32.264329] [ 32.264348] Allocated by task 252: [ 32.264378] kasan_save_stack+0x3c/0x68 [ 32.264418] kasan_save_track+0x20/0x40 [ 32.264453] kasan_save_alloc_info+0x40/0x58 [ 32.264492] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.264533] remove_element+0x130/0x1f8 [ 32.264572] mempool_alloc_preallocated+0x58/0xc0 [ 32.264612] mempool_oob_right_helper+0x98/0x2f0 [ 32.264651] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.264692] kunit_try_run_case+0x170/0x3f0 [ 32.264729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.264772] kthread+0x328/0x630 [ 32.264804] ret_from_fork+0x10/0x20 [ 32.264852] [ 32.264901] The buggy address belongs to the object at fff00000c9a95300 [ 32.264901] which belongs to the cache kmalloc-128 of size 128 [ 32.264961] The buggy address is located 0 bytes to the right of [ 32.264961] allocated 115-byte region [fff00000c9a95300, fff00000c9a95373) [ 32.265022] [ 32.265044] The buggy address belongs to the physical page: [ 32.265083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 32.265139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.265191] page_type: f5(slab) [ 32.265235] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.265284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.265325] page dumped because: kasan: bad access detected [ 32.265356] [ 32.265374] Memory state around the buggy address: [ 32.265407] fff00000c9a95200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.265450] fff00000c9a95280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.265494] >fff00000c9a95300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.265530] ^ [ 32.265569] fff00000c9a95380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.265612] fff00000c9a95400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.265651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.666301] ================================================================== [ 31.666778] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 31.666881] Read of size 1 at addr fff00000c3f36c80 by task kunit_try_catch/246 [ 31.666932] [ 31.666973] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 31.667070] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.667099] Hardware name: linux,dummy-virt (DT) [ 31.667134] Call trace: [ 31.667163] show_stack+0x20/0x38 (C) [ 31.667215] dump_stack_lvl+0x8c/0xd0 [ 31.667276] print_report+0x118/0x5e8 [ 31.667321] kasan_report+0xdc/0x128 [ 31.667364] __kasan_check_byte+0x54/0x70 [ 31.667406] kmem_cache_destroy+0x34/0x218 [ 31.667763] kmem_cache_double_destroy+0x174/0x300 [ 31.668212] kunit_try_run_case+0x170/0x3f0 [ 31.668302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.668560] kthread+0x328/0x630 [ 31.668612] ret_from_fork+0x10/0x20 [ 31.668661] [ 31.668688] Allocated by task 246: [ 31.668748] kasan_save_stack+0x3c/0x68 [ 31.668911] kasan_save_track+0x20/0x40 [ 31.668947] kasan_save_alloc_info+0x40/0x58 [ 31.668986] __kasan_slab_alloc+0xa8/0xb0 [ 31.669023] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.669067] __kmem_cache_create_args+0x178/0x280 [ 31.669353] kmem_cache_double_destroy+0xc0/0x300 [ 31.669435] kunit_try_run_case+0x170/0x3f0 [ 31.669475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.669521] kthread+0x328/0x630 [ 31.669554] ret_from_fork+0x10/0x20 [ 31.669757] [ 31.669925] Freed by task 246: [ 31.669966] kasan_save_stack+0x3c/0x68 [ 31.670008] kasan_save_track+0x20/0x40 [ 31.670049] kasan_save_free_info+0x4c/0x78 [ 31.670087] __kasan_slab_free+0x6c/0x98 [ 31.670121] kmem_cache_free+0x260/0x468 [ 31.670165] slab_kmem_cache_release+0x38/0x50 [ 31.670204] kmem_cache_release+0x1c/0x30 [ 31.670438] kobject_put+0x17c/0x420 [ 31.670606] sysfs_slab_release+0x1c/0x30 [ 31.670684] kmem_cache_destroy+0x118/0x218 [ 31.670807] kmem_cache_double_destroy+0x128/0x300 [ 31.670907] kunit_try_run_case+0x170/0x3f0 [ 31.671087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.671129] kthread+0x328/0x630 [ 31.671203] ret_from_fork+0x10/0x20 [ 31.671414] [ 31.671976] The buggy address belongs to the object at fff00000c3f36c80 [ 31.671976] which belongs to the cache kmem_cache of size 208 [ 31.672241] The buggy address is located 0 bytes inside of [ 31.672241] freed 208-byte region [fff00000c3f36c80, fff00000c3f36d50) [ 31.672306] [ 31.672329] The buggy address belongs to the physical page: [ 31.672371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f36 [ 31.672429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.673326] page_type: f5(slab) [ 31.673379] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 31.673431] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.673474] page dumped because: kasan: bad access detected [ 31.673504] [ 31.673521] Memory state around the buggy address: [ 31.674675] fff00000c3f36b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.675287] fff00000c3f36c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.675486] >fff00000c3f36c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.675564] ^ [ 31.675885] fff00000c3f36d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.676330] fff00000c3f36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.676399] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.366773] ================================================================== [ 31.366887] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 31.366975] Read of size 1 at addr fff00000c9234000 by task kunit_try_catch/244 [ 31.367037] [ 31.367091] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 31.367185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.367214] Hardware name: linux,dummy-virt (DT) [ 31.367258] Call trace: [ 31.367285] show_stack+0x20/0x38 (C) [ 31.367339] dump_stack_lvl+0x8c/0xd0 [ 31.367390] print_report+0x118/0x5e8 [ 31.367434] kasan_report+0xdc/0x128 [ 31.367718] __asan_report_load1_noabort+0x20/0x30 [ 31.368158] kmem_cache_rcu_uaf+0x388/0x468 [ 31.368247] kunit_try_run_case+0x170/0x3f0 [ 31.369107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.369169] kthread+0x328/0x630 [ 31.369215] ret_from_fork+0x10/0x20 [ 31.371840] [ 31.371869] Allocated by task 244: [ 31.371903] kasan_save_stack+0x3c/0x68 [ 31.371952] kasan_save_track+0x20/0x40 [ 31.371987] kasan_save_alloc_info+0x40/0x58 [ 31.372026] __kasan_slab_alloc+0xa8/0xb0 [ 31.372060] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.372102] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.372141] kunit_try_run_case+0x170/0x3f0 [ 31.372178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.372221] kthread+0x328/0x630 [ 31.372254] ret_from_fork+0x10/0x20 [ 31.372291] [ 31.372309] Freed by task 0: [ 31.372337] kasan_save_stack+0x3c/0x68 [ 31.372373] kasan_save_track+0x20/0x40 [ 31.372407] kasan_save_free_info+0x4c/0x78 [ 31.372445] __kasan_slab_free+0x6c/0x98 [ 31.372478] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.372520] rcu_core+0x9f4/0x1e58 [ 31.372558] rcu_core_si+0x18/0x30 [ 31.372593] handle_softirqs+0x374/0xb28 [ 31.372633] __do_softirq+0x1c/0x28 [ 31.372667] [ 31.372686] Last potentially related work creation: [ 31.372712] kasan_save_stack+0x3c/0x68 [ 31.372748] kasan_record_aux_stack+0xb4/0xc8 [ 31.372786] kmem_cache_free+0x120/0x468 [ 31.372834] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.372883] kunit_try_run_case+0x170/0x3f0 [ 31.372996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.373040] kthread+0x328/0x630 [ 31.373072] ret_from_fork+0x10/0x20 [ 31.373301] [ 31.373322] The buggy address belongs to the object at fff00000c9234000 [ 31.373322] which belongs to the cache test_cache of size 200 [ 31.373384] The buggy address is located 0 bytes inside of [ 31.373384] freed 200-byte region [fff00000c9234000, fff00000c92340c8) [ 31.373444] [ 31.373466] The buggy address belongs to the physical page: [ 31.373595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109234 [ 31.373750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.373903] page_type: f5(slab) [ 31.374003] raw: 0bfffe0000000000 fff00000c3f36b40 dead000000000122 0000000000000000 [ 31.374055] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.374141] page dumped because: kasan: bad access detected [ 31.374295] [ 31.374319] Memory state around the buggy address: [ 31.374353] fff00000c9233f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.374690] fff00000c9233f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.374735] >fff00000c9234000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.374773] ^ [ 31.374801] fff00000c9234080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.374852] fff00000c9234100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.374931] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.071323] ================================================================== [ 31.071390] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.071459] Free of addr fff00000c9231001 by task kunit_try_catch/242 [ 31.071503] [ 31.071569] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 31.071662] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.071719] Hardware name: linux,dummy-virt (DT) [ 31.071872] Call trace: [ 31.072076] show_stack+0x20/0x38 (C) [ 31.072243] dump_stack_lvl+0x8c/0xd0 [ 31.072517] print_report+0x118/0x5e8 [ 31.072582] kasan_report_invalid_free+0xc0/0xe8 [ 31.072780] check_slab_allocation+0xfc/0x108 [ 31.072887] __kasan_slab_pre_free+0x2c/0x48 [ 31.072953] kmem_cache_free+0xf0/0x468 [ 31.073040] kmem_cache_invalid_free+0x184/0x3c8 [ 31.073092] kunit_try_run_case+0x170/0x3f0 [ 31.073152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.073204] kthread+0x328/0x630 [ 31.073267] ret_from_fork+0x10/0x20 [ 31.073315] [ 31.073335] Allocated by task 242: [ 31.073365] kasan_save_stack+0x3c/0x68 [ 31.073546] kasan_save_track+0x20/0x40 [ 31.073583] kasan_save_alloc_info+0x40/0x58 [ 31.073695] __kasan_slab_alloc+0xa8/0xb0 [ 31.073830] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.073897] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.074248] kunit_try_run_case+0x170/0x3f0 [ 31.074380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.074497] kthread+0x328/0x630 [ 31.074576] ret_from_fork+0x10/0x20 [ 31.074714] [ 31.074790] The buggy address belongs to the object at fff00000c9231000 [ 31.074790] which belongs to the cache test_cache of size 200 [ 31.074905] The buggy address is located 1 bytes inside of [ 31.074905] 200-byte region [fff00000c9231000, fff00000c92310c8) [ 31.075002] [ 31.075025] The buggy address belongs to the physical page: [ 31.075064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109231 [ 31.075119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.075303] page_type: f5(slab) [ 31.075495] raw: 0bfffe0000000000 fff00000c3f36a00 dead000000000122 0000000000000000 [ 31.075593] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.075649] page dumped because: kasan: bad access detected [ 31.075697] [ 31.075798] Memory state around the buggy address: [ 31.075940] fff00000c9230f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.076085] fff00000c9230f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.076172] >fff00000c9231000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.076268] ^ [ 31.076295] fff00000c9231080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.076609] fff00000c9231100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.076724] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.035329] ================================================================== [ 31.035401] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.035554] Free of addr fff00000c922c000 by task kunit_try_catch/240 [ 31.035597] [ 31.035642] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 31.035757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.035857] Hardware name: linux,dummy-virt (DT) [ 31.035906] Call trace: [ 31.035948] show_stack+0x20/0x38 (C) [ 31.036022] dump_stack_lvl+0x8c/0xd0 [ 31.036073] print_report+0x118/0x5e8 [ 31.036118] kasan_report_invalid_free+0xc0/0xe8 [ 31.036174] check_slab_allocation+0xd4/0x108 [ 31.036220] __kasan_slab_pre_free+0x2c/0x48 [ 31.036376] kmem_cache_free+0xf0/0x468 [ 31.036559] kmem_cache_double_free+0x190/0x3c8 [ 31.036676] kunit_try_run_case+0x170/0x3f0 [ 31.036728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.036832] kthread+0x328/0x630 [ 31.036889] ret_from_fork+0x10/0x20 [ 31.036999] [ 31.037097] Allocated by task 240: [ 31.037180] kasan_save_stack+0x3c/0x68 [ 31.037222] kasan_save_track+0x20/0x40 [ 31.037256] kasan_save_alloc_info+0x40/0x58 [ 31.037303] __kasan_slab_alloc+0xa8/0xb0 [ 31.037337] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.037378] kmem_cache_double_free+0x12c/0x3c8 [ 31.037416] kunit_try_run_case+0x170/0x3f0 [ 31.037452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.037493] kthread+0x328/0x630 [ 31.037660] ret_from_fork+0x10/0x20 [ 31.037762] [ 31.037800] Freed by task 240: [ 31.037841] kasan_save_stack+0x3c/0x68 [ 31.037877] kasan_save_track+0x20/0x40 [ 31.037935] kasan_save_free_info+0x4c/0x78 [ 31.037971] __kasan_slab_free+0x6c/0x98 [ 31.038083] kmem_cache_free+0x260/0x468 [ 31.038253] kmem_cache_double_free+0x140/0x3c8 [ 31.038315] kunit_try_run_case+0x170/0x3f0 [ 31.038425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.038610] kthread+0x328/0x630 [ 31.038720] ret_from_fork+0x10/0x20 [ 31.038776] [ 31.038795] The buggy address belongs to the object at fff00000c922c000 [ 31.038795] which belongs to the cache test_cache of size 200 [ 31.038972] The buggy address is located 0 bytes inside of [ 31.038972] 200-byte region [fff00000c922c000, fff00000c922c0c8) [ 31.039177] [ 31.039229] The buggy address belongs to the physical page: [ 31.039349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10922c [ 31.039433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.039585] page_type: f5(slab) [ 31.039663] raw: 0bfffe0000000000 fff00000c3f368c0 dead000000000122 0000000000000000 [ 31.039838] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.039891] page dumped because: kasan: bad access detected [ 31.039955] [ 31.039973] Memory state around the buggy address: [ 31.040007] fff00000c922bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.040324] fff00000c922bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.040489] >fff00000c922c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.040614] ^ [ 31.040705] fff00000c922c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.040774] fff00000c922c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.040920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.530328] ================================================================== [ 30.530441] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.530510] Free of addr fff00000c7b7a940 by task kunit_try_catch/223 [ 30.530553] [ 30.530782] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.531126] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.531312] Hardware name: linux,dummy-virt (DT) [ 30.531644] Call trace: [ 30.532066] show_stack+0x20/0x38 (C) [ 30.532137] dump_stack_lvl+0x8c/0xd0 [ 30.532208] print_report+0x118/0x5e8 [ 30.532290] kasan_report_invalid_free+0xc0/0xe8 [ 30.532349] check_slab_allocation+0xd4/0x108 [ 30.532395] __kasan_slab_pre_free+0x2c/0x48 [ 30.532440] kfree+0xe8/0x3c8 [ 30.532485] kfree_sensitive+0x3c/0xb0 [ 30.533056] kmalloc_double_kzfree+0x168/0x308 [ 30.533402] kunit_try_run_case+0x170/0x3f0 [ 30.533487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.533719] kthread+0x328/0x630 [ 30.533781] ret_from_fork+0x10/0x20 [ 30.534245] [ 30.534313] Allocated by task 223: [ 30.534345] kasan_save_stack+0x3c/0x68 [ 30.534403] kasan_save_track+0x20/0x40 [ 30.534468] kasan_save_alloc_info+0x40/0x58 [ 30.534509] __kasan_kmalloc+0xd4/0xd8 [ 30.534555] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.534595] kmalloc_double_kzfree+0xb8/0x308 [ 30.534651] kunit_try_run_case+0x170/0x3f0 [ 30.534690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.534740] kthread+0x328/0x630 [ 30.534773] ret_from_fork+0x10/0x20 [ 30.534830] [ 30.534848] Freed by task 223: [ 30.534875] kasan_save_stack+0x3c/0x68 [ 30.534919] kasan_save_track+0x20/0x40 [ 30.534969] kasan_save_free_info+0x4c/0x78 [ 30.535005] __kasan_slab_free+0x6c/0x98 [ 30.535040] kfree+0x214/0x3c8 [ 30.535075] kfree_sensitive+0x80/0xb0 [ 30.535111] kmalloc_double_kzfree+0x11c/0x308 [ 30.535160] kunit_try_run_case+0x170/0x3f0 [ 30.535203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.535250] kthread+0x328/0x630 [ 30.535293] ret_from_fork+0x10/0x20 [ 30.535330] [ 30.535348] The buggy address belongs to the object at fff00000c7b7a940 [ 30.535348] which belongs to the cache kmalloc-16 of size 16 [ 30.535404] The buggy address is located 0 bytes inside of [ 30.535404] 16-byte region [fff00000c7b7a940, fff00000c7b7a950) [ 30.535463] [ 30.535484] The buggy address belongs to the physical page: [ 30.535516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 30.535569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.535614] page_type: f5(slab) [ 30.535650] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.535702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.535739] page dumped because: kasan: bad access detected [ 30.535780] [ 30.535799] Memory state around the buggy address: [ 30.536199] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.536612] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 30.536706] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.536768] ^ [ 30.536837] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.536880] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.537425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.520078] ================================================================== [ 30.520274] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.520360] Read of size 1 at addr fff00000c7b7a940 by task kunit_try_catch/223 [ 30.520575] [ 30.520613] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.520705] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.520734] Hardware name: linux,dummy-virt (DT) [ 30.520766] Call trace: [ 30.520822] show_stack+0x20/0x38 (C) [ 30.521140] dump_stack_lvl+0x8c/0xd0 [ 30.521347] print_report+0x118/0x5e8 [ 30.521436] kasan_report+0xdc/0x128 [ 30.521609] __kasan_check_byte+0x54/0x70 [ 30.521688] kfree_sensitive+0x30/0xb0 [ 30.521982] kmalloc_double_kzfree+0x168/0x308 [ 30.522215] kunit_try_run_case+0x170/0x3f0 [ 30.522344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.522533] kthread+0x328/0x630 [ 30.522711] ret_from_fork+0x10/0x20 [ 30.522846] [ 30.522869] Allocated by task 223: [ 30.523125] kasan_save_stack+0x3c/0x68 [ 30.523230] kasan_save_track+0x20/0x40 [ 30.523298] kasan_save_alloc_info+0x40/0x58 [ 30.523436] __kasan_kmalloc+0xd4/0xd8 [ 30.523538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.523601] kmalloc_double_kzfree+0xb8/0x308 [ 30.523917] kunit_try_run_case+0x170/0x3f0 [ 30.524023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.524071] kthread+0x328/0x630 [ 30.524107] ret_from_fork+0x10/0x20 [ 30.524146] [ 30.524167] Freed by task 223: [ 30.524208] kasan_save_stack+0x3c/0x68 [ 30.524244] kasan_save_track+0x20/0x40 [ 30.524280] kasan_save_free_info+0x4c/0x78 [ 30.524318] __kasan_slab_free+0x6c/0x98 [ 30.524352] kfree+0x214/0x3c8 [ 30.524395] kfree_sensitive+0x80/0xb0 [ 30.524440] kmalloc_double_kzfree+0x11c/0x308 [ 30.524496] kunit_try_run_case+0x170/0x3f0 [ 30.524533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.524577] kthread+0x328/0x630 [ 30.524620] ret_from_fork+0x10/0x20 [ 30.524680] [ 30.524699] The buggy address belongs to the object at fff00000c7b7a940 [ 30.524699] which belongs to the cache kmalloc-16 of size 16 [ 30.524770] The buggy address is located 0 bytes inside of [ 30.524770] freed 16-byte region [fff00000c7b7a940, fff00000c7b7a950) [ 30.524907] [ 30.525254] The buggy address belongs to the physical page: [ 30.525500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 30.525575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.525624] page_type: f5(slab) [ 30.525988] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.526233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.526379] page dumped because: kasan: bad access detected [ 30.526463] [ 30.526523] Memory state around the buggy address: [ 30.526655] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.526873] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 30.527183] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.527269] ^ [ 30.527385] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.527474] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.527676] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 30.497035] ================================================================== [ 30.497329] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.497527] Read of size 1 at addr fff00000c923d6a8 by task kunit_try_catch/219 [ 30.497674] [ 30.497757] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.497957] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.497988] Hardware name: linux,dummy-virt (DT) [ 30.498034] Call trace: [ 30.498318] show_stack+0x20/0x38 (C) [ 30.498414] dump_stack_lvl+0x8c/0xd0 [ 30.498736] print_report+0x118/0x5e8 [ 30.498824] kasan_report+0xdc/0x128 [ 30.498872] __asan_report_load1_noabort+0x20/0x30 [ 30.498950] kmalloc_uaf2+0x3f4/0x468 [ 30.498999] kunit_try_run_case+0x170/0x3f0 [ 30.499050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.499103] kthread+0x328/0x630 [ 30.499165] ret_from_fork+0x10/0x20 [ 30.499213] [ 30.499231] Allocated by task 219: [ 30.499260] kasan_save_stack+0x3c/0x68 [ 30.499301] kasan_save_track+0x20/0x40 [ 30.499344] kasan_save_alloc_info+0x40/0x58 [ 30.499382] __kasan_kmalloc+0xd4/0xd8 [ 30.499415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.499464] kmalloc_uaf2+0xc4/0x468 [ 30.499506] kunit_try_run_case+0x170/0x3f0 [ 30.499544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.499594] kthread+0x328/0x630 [ 30.499626] ret_from_fork+0x10/0x20 [ 30.499661] [ 30.499679] Freed by task 219: [ 30.499703] kasan_save_stack+0x3c/0x68 [ 30.499754] kasan_save_track+0x20/0x40 [ 30.499787] kasan_save_free_info+0x4c/0x78 [ 30.499834] __kasan_slab_free+0x6c/0x98 [ 30.499868] kfree+0x214/0x3c8 [ 30.499904] kmalloc_uaf2+0x134/0x468 [ 30.499940] kunit_try_run_case+0x170/0x3f0 [ 30.499977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.500025] kthread+0x328/0x630 [ 30.500076] ret_from_fork+0x10/0x20 [ 30.500112] [ 30.500131] The buggy address belongs to the object at fff00000c923d680 [ 30.500131] which belongs to the cache kmalloc-64 of size 64 [ 30.500189] The buggy address is located 40 bytes inside of [ 30.500189] freed 64-byte region [fff00000c923d680, fff00000c923d6c0) [ 30.500259] [ 30.500278] The buggy address belongs to the physical page: [ 30.500312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d [ 30.500374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.500422] page_type: f5(slab) [ 30.500461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.500511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.500553] page dumped because: kasan: bad access detected [ 30.500589] [ 30.500622] Memory state around the buggy address: [ 30.500660] fff00000c923d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.500703] fff00000c923d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.500750] >fff00000c923d680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.500788] ^ [ 30.501058] fff00000c923d700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.501576] fff00000c923d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.501955] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.479408] ================================================================== [ 30.479470] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.479529] Write of size 33 at addr fff00000c923d500 by task kunit_try_catch/217 [ 30.479610] [ 30.479647] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.479735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.479772] Hardware name: linux,dummy-virt (DT) [ 30.479832] Call trace: [ 30.479856] show_stack+0x20/0x38 (C) [ 30.479906] dump_stack_lvl+0x8c/0xd0 [ 30.479956] print_report+0x118/0x5e8 [ 30.480001] kasan_report+0xdc/0x128 [ 30.480045] kasan_check_range+0x100/0x1a8 [ 30.480098] __asan_memset+0x34/0x78 [ 30.480143] kmalloc_uaf_memset+0x170/0x310 [ 30.480191] kunit_try_run_case+0x170/0x3f0 [ 30.480238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.480290] kthread+0x328/0x630 [ 30.480334] ret_from_fork+0x10/0x20 [ 30.480389] [ 30.480409] Allocated by task 217: [ 30.480436] kasan_save_stack+0x3c/0x68 [ 30.480474] kasan_save_track+0x20/0x40 [ 30.480515] kasan_save_alloc_info+0x40/0x58 [ 30.480558] __kasan_kmalloc+0xd4/0xd8 [ 30.480598] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.480637] kmalloc_uaf_memset+0xb8/0x310 [ 30.480675] kunit_try_run_case+0x170/0x3f0 [ 30.480712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.480754] kthread+0x328/0x630 [ 30.480787] ret_from_fork+0x10/0x20 [ 30.480880] [ 30.481145] Freed by task 217: [ 30.481405] kasan_save_stack+0x3c/0x68 [ 30.481692] kasan_save_track+0x20/0x40 [ 30.481736] kasan_save_free_info+0x4c/0x78 [ 30.481831] __kasan_slab_free+0x6c/0x98 [ 30.482192] kfree+0x214/0x3c8 [ 30.482257] kmalloc_uaf_memset+0x11c/0x310 [ 30.482335] kunit_try_run_case+0x170/0x3f0 [ 30.482514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.482572] kthread+0x328/0x630 [ 30.482866] ret_from_fork+0x10/0x20 [ 30.482956] [ 30.483005] The buggy address belongs to the object at fff00000c923d500 [ 30.483005] which belongs to the cache kmalloc-64 of size 64 [ 30.483243] The buggy address is located 0 bytes inside of [ 30.483243] freed 64-byte region [fff00000c923d500, fff00000c923d540) [ 30.483424] [ 30.483478] The buggy address belongs to the physical page: [ 30.483514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d [ 30.483921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.484090] page_type: f5(slab) [ 30.484241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.484326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.484408] page dumped because: kasan: bad access detected [ 30.484790] [ 30.484869] Memory state around the buggy address: [ 30.485027] fff00000c923d400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.485132] fff00000c923d480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.485261] >fff00000c923d500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.485359] ^ [ 30.485427] fff00000c923d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485761] fff00000c923d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.462642] ================================================================== [ 30.462952] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.463280] Read of size 1 at addr fff00000c7b7a928 by task kunit_try_catch/215 [ 30.463357] [ 30.463391] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.463484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.463734] Hardware name: linux,dummy-virt (DT) [ 30.463807] Call trace: [ 30.463843] show_stack+0x20/0x38 (C) [ 30.463896] dump_stack_lvl+0x8c/0xd0 [ 30.463943] print_report+0x118/0x5e8 [ 30.463987] kasan_report+0xdc/0x128 [ 30.464031] __asan_report_load1_noabort+0x20/0x30 [ 30.464077] kmalloc_uaf+0x300/0x338 [ 30.464121] kunit_try_run_case+0x170/0x3f0 [ 30.464397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.464753] kthread+0x328/0x630 [ 30.464865] ret_from_fork+0x10/0x20 [ 30.464962] [ 30.465000] Allocated by task 215: [ 30.465288] kasan_save_stack+0x3c/0x68 [ 30.465360] kasan_save_track+0x20/0x40 [ 30.465491] kasan_save_alloc_info+0x40/0x58 [ 30.465590] __kasan_kmalloc+0xd4/0xd8 [ 30.465705] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.465779] kmalloc_uaf+0xb8/0x338 [ 30.466139] kunit_try_run_case+0x170/0x3f0 [ 30.466251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.466332] kthread+0x328/0x630 [ 30.466408] ret_from_fork+0x10/0x20 [ 30.466680] [ 30.466766] Freed by task 215: [ 30.466798] kasan_save_stack+0x3c/0x68 [ 30.466852] kasan_save_track+0x20/0x40 [ 30.466888] kasan_save_free_info+0x4c/0x78 [ 30.466984] __kasan_slab_free+0x6c/0x98 [ 30.467022] kfree+0x214/0x3c8 [ 30.467057] kmalloc_uaf+0x11c/0x338 [ 30.467101] kunit_try_run_case+0x170/0x3f0 [ 30.467139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.467182] kthread+0x328/0x630 [ 30.467216] ret_from_fork+0x10/0x20 [ 30.467268] [ 30.467296] The buggy address belongs to the object at fff00000c7b7a920 [ 30.467296] which belongs to the cache kmalloc-16 of size 16 [ 30.467353] The buggy address is located 8 bytes inside of [ 30.467353] freed 16-byte region [fff00000c7b7a920, fff00000c7b7a930) [ 30.467412] [ 30.467438] The buggy address belongs to the physical page: [ 30.467482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 30.467535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.467585] page_type: f5(slab) [ 30.467628] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.467684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.467724] page dumped because: kasan: bad access detected [ 30.467754] [ 30.467791] Memory state around the buggy address: [ 30.468385] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.468465] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 30.468527] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.468580] ^ [ 30.468627] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.469036] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.469092] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.443481] ================================================================== [ 30.443575] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.443637] Read of size 64 at addr fff00000c923d204 by task kunit_try_catch/213 [ 30.443687] [ 30.443719] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.443808] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.444217] Hardware name: linux,dummy-virt (DT) [ 30.444325] Call trace: [ 30.444351] show_stack+0x20/0x38 (C) [ 30.444404] dump_stack_lvl+0x8c/0xd0 [ 30.444450] print_report+0x118/0x5e8 [ 30.444497] kasan_report+0xdc/0x128 [ 30.444538] kasan_check_range+0x100/0x1a8 [ 30.444604] __asan_memmove+0x3c/0x98 [ 30.444647] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.444700] kunit_try_run_case+0x170/0x3f0 [ 30.444746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.444798] kthread+0x328/0x630 [ 30.445062] ret_from_fork+0x10/0x20 [ 30.445379] [ 30.445425] Allocated by task 213: [ 30.445547] kasan_save_stack+0x3c/0x68 [ 30.445656] kasan_save_track+0x20/0x40 [ 30.445725] kasan_save_alloc_info+0x40/0x58 [ 30.445877] __kasan_kmalloc+0xd4/0xd8 [ 30.445914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.445962] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 30.446011] kunit_try_run_case+0x170/0x3f0 [ 30.446051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.446573] kthread+0x328/0x630 [ 30.446669] ret_from_fork+0x10/0x20 [ 30.446756] [ 30.446854] The buggy address belongs to the object at fff00000c923d200 [ 30.446854] which belongs to the cache kmalloc-64 of size 64 [ 30.446969] The buggy address is located 4 bytes inside of [ 30.446969] allocated 64-byte region [fff00000c923d200, fff00000c923d240) [ 30.447059] [ 30.447078] The buggy address belongs to the physical page: [ 30.447562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d [ 30.447689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.447836] page_type: f5(slab) [ 30.447878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.447955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.448328] page dumped because: kasan: bad access detected [ 30.448381] [ 30.448466] Memory state around the buggy address: [ 30.448581] fff00000c923d100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 30.448635] fff00000c923d180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.448767] >fff00000c923d200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.448807] ^ [ 30.449110] fff00000c923d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.449234] fff00000c923d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.449332] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.428056] ================================================================== [ 30.428374] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.428686] Read of size 18446744073709551614 at addr fff00000c923d004 by task kunit_try_catch/211 [ 30.429083] [ 30.429138] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.429233] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.429263] Hardware name: linux,dummy-virt (DT) [ 30.429510] Call trace: [ 30.429562] show_stack+0x20/0x38 (C) [ 30.429711] dump_stack_lvl+0x8c/0xd0 [ 30.429799] print_report+0x118/0x5e8 [ 30.430014] kasan_report+0xdc/0x128 [ 30.430360] kasan_check_range+0x100/0x1a8 [ 30.430452] __asan_memmove+0x3c/0x98 [ 30.430527] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.430598] kunit_try_run_case+0x170/0x3f0 [ 30.430770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.431142] kthread+0x328/0x630 [ 30.431213] ret_from_fork+0x10/0x20 [ 30.431360] [ 30.431420] Allocated by task 211: [ 30.431555] kasan_save_stack+0x3c/0x68 [ 30.431652] kasan_save_track+0x20/0x40 [ 30.431994] kasan_save_alloc_info+0x40/0x58 [ 30.432064] __kasan_kmalloc+0xd4/0xd8 [ 30.432147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.432268] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.432398] kunit_try_run_case+0x170/0x3f0 [ 30.432477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.432532] kthread+0x328/0x630 [ 30.432773] ret_from_fork+0x10/0x20 [ 30.432852] [ 30.432873] The buggy address belongs to the object at fff00000c923d000 [ 30.432873] which belongs to the cache kmalloc-64 of size 64 [ 30.433331] The buggy address is located 4 bytes inside of [ 30.433331] 64-byte region [fff00000c923d000, fff00000c923d040) [ 30.433461] [ 30.433541] The buggy address belongs to the physical page: [ 30.433716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10923d [ 30.433905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.434060] page_type: f5(slab) [ 30.434133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.434249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.434338] page dumped because: kasan: bad access detected [ 30.434418] [ 30.434499] Memory state around the buggy address: [ 30.434565] fff00000c923cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.434642] fff00000c923cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.434733] >fff00000c923d000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.434778] ^ [ 30.435121] fff00000c923d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.435212] fff00000c923d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.435314] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 30.411150] ================================================================== [ 30.411426] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.411490] Write of size 16 at addr fff00000c3f71e69 by task kunit_try_catch/209 [ 30.411789] [ 30.411844] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.412317] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.412379] Hardware name: linux,dummy-virt (DT) [ 30.412639] Call trace: [ 30.412676] show_stack+0x20/0x38 (C) [ 30.412894] dump_stack_lvl+0x8c/0xd0 [ 30.413081] print_report+0x118/0x5e8 [ 30.413134] kasan_report+0xdc/0x128 [ 30.413423] kasan_check_range+0x100/0x1a8 [ 30.413659] __asan_memset+0x34/0x78 [ 30.414107] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.414192] kunit_try_run_case+0x170/0x3f0 [ 30.414339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.414428] kthread+0x328/0x630 [ 30.414580] ret_from_fork+0x10/0x20 [ 30.414723] [ 30.414793] Allocated by task 209: [ 30.415224] kasan_save_stack+0x3c/0x68 [ 30.415292] kasan_save_track+0x20/0x40 [ 30.415405] kasan_save_alloc_info+0x40/0x58 [ 30.415561] __kasan_kmalloc+0xd4/0xd8 [ 30.415620] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.415685] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.416053] kunit_try_run_case+0x170/0x3f0 [ 30.416121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.416245] kthread+0x328/0x630 [ 30.416285] ret_from_fork+0x10/0x20 [ 30.416344] [ 30.416640] The buggy address belongs to the object at fff00000c3f71e00 [ 30.416640] which belongs to the cache kmalloc-128 of size 128 [ 30.416868] The buggy address is located 105 bytes inside of [ 30.416868] allocated 120-byte region [fff00000c3f71e00, fff00000c3f71e78) [ 30.417057] [ 30.417162] The buggy address belongs to the physical page: [ 30.417210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.417282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.417595] page_type: f5(slab) [ 30.417672] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.417833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.417878] page dumped because: kasan: bad access detected [ 30.418219] [ 30.418265] Memory state around the buggy address: [ 30.418324] fff00000c3f71d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.418659] fff00000c3f71d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418732] >fff00000c3f71e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.418836] ^ [ 30.418915] fff00000c3f71e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418960] fff00000c3f71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.419291] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 30.398292] ================================================================== [ 30.398448] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.398507] Write of size 8 at addr fff00000c3f71d71 by task kunit_try_catch/207 [ 30.398582] [ 30.398895] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.398999] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.399081] Hardware name: linux,dummy-virt (DT) [ 30.399141] Call trace: [ 30.399181] show_stack+0x20/0x38 (C) [ 30.399248] dump_stack_lvl+0x8c/0xd0 [ 30.399337] print_report+0x118/0x5e8 [ 30.399383] kasan_report+0xdc/0x128 [ 30.399442] kasan_check_range+0x100/0x1a8 [ 30.399740] __asan_memset+0x34/0x78 [ 30.399820] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.399879] kunit_try_run_case+0x170/0x3f0 [ 30.399938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.400091] kthread+0x328/0x630 [ 30.400157] ret_from_fork+0x10/0x20 [ 30.400275] [ 30.400316] Allocated by task 207: [ 30.400351] kasan_save_stack+0x3c/0x68 [ 30.400409] kasan_save_track+0x20/0x40 [ 30.400451] kasan_save_alloc_info+0x40/0x58 [ 30.400717] __kasan_kmalloc+0xd4/0xd8 [ 30.400779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.400831] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.400954] kunit_try_run_case+0x170/0x3f0 [ 30.401055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.401113] kthread+0x328/0x630 [ 30.401156] ret_from_fork+0x10/0x20 [ 30.401194] [ 30.401259] The buggy address belongs to the object at fff00000c3f71d00 [ 30.401259] which belongs to the cache kmalloc-128 of size 128 [ 30.401326] The buggy address is located 113 bytes inside of [ 30.401326] allocated 120-byte region [fff00000c3f71d00, fff00000c3f71d78) [ 30.401386] [ 30.401406] The buggy address belongs to the physical page: [ 30.401443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.401496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.401545] page_type: f5(slab) [ 30.401596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.401646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.401685] page dumped because: kasan: bad access detected [ 30.401716] [ 30.401742] Memory state around the buggy address: [ 30.401789] fff00000c3f71c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.402230] fff00000c3f71c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.402314] >fff00000c3f71d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.402392] ^ [ 30.402468] fff00000c3f71d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.402596] fff00000c3f71e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.402662] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 30.383060] ================================================================== [ 30.383117] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.383169] Write of size 4 at addr fff00000c3f71c75 by task kunit_try_catch/205 [ 30.383222] [ 30.383253] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.383340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.383368] Hardware name: linux,dummy-virt (DT) [ 30.383407] Call trace: [ 30.383428] show_stack+0x20/0x38 (C) [ 30.383476] dump_stack_lvl+0x8c/0xd0 [ 30.383520] print_report+0x118/0x5e8 [ 30.383562] kasan_report+0xdc/0x128 [ 30.383604] kasan_check_range+0x100/0x1a8 [ 30.383656] __asan_memset+0x34/0x78 [ 30.383700] kmalloc_oob_memset_4+0x150/0x300 [ 30.383745] kunit_try_run_case+0x170/0x3f0 [ 30.383800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.384197] kthread+0x328/0x630 [ 30.384728] ret_from_fork+0x10/0x20 [ 30.384808] [ 30.385220] Allocated by task 205: [ 30.385259] kasan_save_stack+0x3c/0x68 [ 30.385306] kasan_save_track+0x20/0x40 [ 30.385340] kasan_save_alloc_info+0x40/0x58 [ 30.385377] __kasan_kmalloc+0xd4/0xd8 [ 30.385443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.385508] kmalloc_oob_memset_4+0xb0/0x300 [ 30.385573] kunit_try_run_case+0x170/0x3f0 [ 30.385844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.385971] kthread+0x328/0x630 [ 30.386049] ret_from_fork+0x10/0x20 [ 30.386381] [ 30.386438] The buggy address belongs to the object at fff00000c3f71c00 [ 30.386438] which belongs to the cache kmalloc-128 of size 128 [ 30.386506] The buggy address is located 117 bytes inside of [ 30.386506] allocated 120-byte region [fff00000c3f71c00, fff00000c3f71c78) [ 30.386567] [ 30.386744] The buggy address belongs to the physical page: [ 30.386893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.387007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.387097] page_type: f5(slab) [ 30.387233] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.387295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.387349] page dumped because: kasan: bad access detected [ 30.387726] [ 30.387769] Memory state around the buggy address: [ 30.387803] fff00000c3f71b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.388132] fff00000c3f71b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.388240] >fff00000c3f71c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.388280] ^ [ 30.388349] fff00000c3f71c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.388417] fff00000c3f71d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.388892] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 30.368072] ================================================================== [ 30.368365] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.368439] Write of size 2 at addr fff00000c3f71b77 by task kunit_try_catch/203 [ 30.368883] [ 30.368948] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.369123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.369230] Hardware name: linux,dummy-virt (DT) [ 30.369309] Call trace: [ 30.369642] show_stack+0x20/0x38 (C) [ 30.369733] dump_stack_lvl+0x8c/0xd0 [ 30.369867] print_report+0x118/0x5e8 [ 30.369986] kasan_report+0xdc/0x128 [ 30.370043] kasan_check_range+0x100/0x1a8 [ 30.370221] __asan_memset+0x34/0x78 [ 30.370607] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.370693] kunit_try_run_case+0x170/0x3f0 [ 30.371404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.371499] kthread+0x328/0x630 [ 30.371587] ret_from_fork+0x10/0x20 [ 30.371675] [ 30.371730] Allocated by task 203: [ 30.371795] kasan_save_stack+0x3c/0x68 [ 30.372041] kasan_save_track+0x20/0x40 [ 30.372113] kasan_save_alloc_info+0x40/0x58 [ 30.372434] __kasan_kmalloc+0xd4/0xd8 [ 30.372624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.372949] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.373097] kunit_try_run_case+0x170/0x3f0 [ 30.373233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.373313] kthread+0x328/0x630 [ 30.373694] ret_from_fork+0x10/0x20 [ 30.373806] [ 30.373844] The buggy address belongs to the object at fff00000c3f71b00 [ 30.373844] which belongs to the cache kmalloc-128 of size 128 [ 30.374209] The buggy address is located 119 bytes inside of [ 30.374209] allocated 120-byte region [fff00000c3f71b00, fff00000c3f71b78) [ 30.374281] [ 30.374310] The buggy address belongs to the physical page: [ 30.374364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.374460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.374512] page_type: f5(slab) [ 30.374571] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.374629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.374667] page dumped because: kasan: bad access detected [ 30.374696] [ 30.374715] Memory state around the buggy address: [ 30.374747] fff00000c3f71a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.374799] fff00000c3f71a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.375068] >fff00000c3f71b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.375253] ^ [ 30.375329] fff00000c3f71b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.375371] fff00000c3f71c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.375653] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 30.323418] ================================================================== [ 30.323658] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.323787] Read of size 16 at addr fff00000c7b7a900 by task kunit_try_catch/199 [ 30.323864] [ 30.324157] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.324356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.324392] Hardware name: linux,dummy-virt (DT) [ 30.324469] Call trace: [ 30.324494] show_stack+0x20/0x38 (C) [ 30.324582] dump_stack_lvl+0x8c/0xd0 [ 30.324728] print_report+0x118/0x5e8 [ 30.324796] kasan_report+0xdc/0x128 [ 30.325137] __asan_report_load16_noabort+0x20/0x30 [ 30.325212] kmalloc_uaf_16+0x3bc/0x438 [ 30.325338] kunit_try_run_case+0x170/0x3f0 [ 30.325498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.325598] kthread+0x328/0x630 [ 30.325680] ret_from_fork+0x10/0x20 [ 30.325729] [ 30.326031] Allocated by task 199: [ 30.326224] kasan_save_stack+0x3c/0x68 [ 30.326386] kasan_save_track+0x20/0x40 [ 30.326498] kasan_save_alloc_info+0x40/0x58 [ 30.326574] __kasan_kmalloc+0xd4/0xd8 [ 30.326730] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.327141] kmalloc_uaf_16+0x140/0x438 [ 30.327216] kunit_try_run_case+0x170/0x3f0 [ 30.327336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.327391] kthread+0x328/0x630 [ 30.327462] ret_from_fork+0x10/0x20 [ 30.327761] [ 30.327832] Freed by task 199: [ 30.327885] kasan_save_stack+0x3c/0x68 [ 30.327995] kasan_save_track+0x20/0x40 [ 30.328073] kasan_save_free_info+0x4c/0x78 [ 30.328176] __kasan_slab_free+0x6c/0x98 [ 30.328258] kfree+0x214/0x3c8 [ 30.328313] kmalloc_uaf_16+0x190/0x438 [ 30.328613] kunit_try_run_case+0x170/0x3f0 [ 30.328694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.328768] kthread+0x328/0x630 [ 30.328887] ret_from_fork+0x10/0x20 [ 30.328976] [ 30.329029] The buggy address belongs to the object at fff00000c7b7a900 [ 30.329029] which belongs to the cache kmalloc-16 of size 16 [ 30.329155] The buggy address is located 0 bytes inside of [ 30.329155] freed 16-byte region [fff00000c7b7a900, fff00000c7b7a910) [ 30.329239] [ 30.329258] The buggy address belongs to the physical page: [ 30.329642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 30.329757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.329904] page_type: f5(slab) [ 30.329961] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.330056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.330223] page dumped because: kasan: bad access detected [ 30.330313] [ 30.330331] Memory state around the buggy address: [ 30.330656] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.330725] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 30.330837] >fff00000c7b7a900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.330876] ^ [ 30.331032] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.331267] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.331354] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 30.304306] ================================================================== [ 30.304395] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.304476] Write of size 16 at addr fff00000c7b7a7c0 by task kunit_try_catch/197 [ 30.304598] [ 30.304634] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.304844] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.304909] Hardware name: linux,dummy-virt (DT) [ 30.304950] Call trace: [ 30.304972] show_stack+0x20/0x38 (C) [ 30.305041] dump_stack_lvl+0x8c/0xd0 [ 30.305087] print_report+0x118/0x5e8 [ 30.305133] kasan_report+0xdc/0x128 [ 30.305796] __asan_report_store16_noabort+0x20/0x30 [ 30.305875] kmalloc_oob_16+0x3a0/0x3f8 [ 30.306190] kunit_try_run_case+0x170/0x3f0 [ 30.306284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306393] kthread+0x328/0x630 [ 30.306778] ret_from_fork+0x10/0x20 [ 30.306873] [ 30.306894] Allocated by task 197: [ 30.307180] kasan_save_stack+0x3c/0x68 [ 30.307251] kasan_save_track+0x20/0x40 [ 30.307304] kasan_save_alloc_info+0x40/0x58 [ 30.307425] __kasan_kmalloc+0xd4/0xd8 [ 30.307561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.307681] kmalloc_oob_16+0xb4/0x3f8 [ 30.307795] kunit_try_run_case+0x170/0x3f0 [ 30.307846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.307923] kthread+0x328/0x630 [ 30.308170] ret_from_fork+0x10/0x20 [ 30.308305] [ 30.308349] The buggy address belongs to the object at fff00000c7b7a7c0 [ 30.308349] which belongs to the cache kmalloc-16 of size 16 [ 30.308785] The buggy address is located 0 bytes inside of [ 30.308785] allocated 13-byte region [fff00000c7b7a7c0, fff00000c7b7a7cd) [ 30.308984] [ 30.309031] The buggy address belongs to the physical page: [ 30.309074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 30.309144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.309192] page_type: f5(slab) [ 30.309230] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.309278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.309316] page dumped because: kasan: bad access detected [ 30.309346] [ 30.309363] Memory state around the buggy address: [ 30.309403] fff00000c7b7a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.309447] fff00000c7b7a700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.309487] >fff00000c7b7a780: fa fb fc fc 00 00 fc fc 00 05 fc fc fa fb fc fc [ 30.309533] ^ [ 30.309567] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.309613] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 30.309657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.280291] ================================================================== [ 30.280356] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.280691] Read of size 1 at addr fff00000c81a5000 by task kunit_try_catch/195 [ 30.280995] [ 30.281073] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.281215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.281244] Hardware name: linux,dummy-virt (DT) [ 30.281273] Call trace: [ 30.281295] show_stack+0x20/0x38 (C) [ 30.281611] dump_stack_lvl+0x8c/0xd0 [ 30.281665] print_report+0x118/0x5e8 [ 30.281708] kasan_report+0xdc/0x128 [ 30.281750] __kasan_check_byte+0x54/0x70 [ 30.281792] krealloc_noprof+0x44/0x360 [ 30.281848] krealloc_uaf+0x180/0x520 [ 30.282009] kunit_try_run_case+0x170/0x3f0 [ 30.282066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.282116] kthread+0x328/0x630 [ 30.282179] ret_from_fork+0x10/0x20 [ 30.282236] [ 30.282265] Allocated by task 195: [ 30.282295] kasan_save_stack+0x3c/0x68 [ 30.282336] kasan_save_track+0x20/0x40 [ 30.282372] kasan_save_alloc_info+0x40/0x58 [ 30.282410] __kasan_kmalloc+0xd4/0xd8 [ 30.282443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.282484] krealloc_uaf+0xc8/0x520 [ 30.282521] kunit_try_run_case+0x170/0x3f0 [ 30.282557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.282600] kthread+0x328/0x630 [ 30.282633] ret_from_fork+0x10/0x20 [ 30.282678] [ 30.282697] Freed by task 195: [ 30.282730] kasan_save_stack+0x3c/0x68 [ 30.282765] kasan_save_track+0x20/0x40 [ 30.282809] kasan_save_free_info+0x4c/0x78 [ 30.283444] __kasan_slab_free+0x6c/0x98 [ 30.283520] kfree+0x214/0x3c8 [ 30.283586] krealloc_uaf+0x12c/0x520 [ 30.283920] kunit_try_run_case+0x170/0x3f0 [ 30.283987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.284077] kthread+0x328/0x630 [ 30.284384] ret_from_fork+0x10/0x20 [ 30.284454] [ 30.284712] The buggy address belongs to the object at fff00000c81a5000 [ 30.284712] which belongs to the cache kmalloc-256 of size 256 [ 30.284904] The buggy address is located 0 bytes inside of [ 30.284904] freed 256-byte region [fff00000c81a5000, fff00000c81a5100) [ 30.285038] [ 30.285079] The buggy address belongs to the physical page: [ 30.285116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.285485] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.285638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.285746] page_type: f5(slab) [ 30.286237] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.286320] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.286445] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.286792] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.286877] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.286982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.287035] page dumped because: kasan: bad access detected [ 30.287064] [ 30.287137] Memory state around the buggy address: [ 30.287497] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.287547] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.287617] >fff00000c81a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.287805] ^ [ 30.287857] fff00000c81a5080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.288288] fff00000c81a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.288359] ================================================================== [ 30.290149] ================================================================== [ 30.290207] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.290285] Read of size 1 at addr fff00000c81a5000 by task kunit_try_catch/195 [ 30.290406] [ 30.290444] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.290590] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.290637] Hardware name: linux,dummy-virt (DT) [ 30.291005] Call trace: [ 30.291106] show_stack+0x20/0x38 (C) [ 30.291181] dump_stack_lvl+0x8c/0xd0 [ 30.291257] print_report+0x118/0x5e8 [ 30.291302] kasan_report+0xdc/0x128 [ 30.291384] __asan_report_load1_noabort+0x20/0x30 [ 30.291460] krealloc_uaf+0x4c8/0x520 [ 30.291603] kunit_try_run_case+0x170/0x3f0 [ 30.291687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.291740] kthread+0x328/0x630 [ 30.292077] ret_from_fork+0x10/0x20 [ 30.292168] [ 30.292314] Allocated by task 195: [ 30.292353] kasan_save_stack+0x3c/0x68 [ 30.292405] kasan_save_track+0x20/0x40 [ 30.292534] kasan_save_alloc_info+0x40/0x58 [ 30.292580] __kasan_kmalloc+0xd4/0xd8 [ 30.292719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.292764] krealloc_uaf+0xc8/0x520 [ 30.292800] kunit_try_run_case+0x170/0x3f0 [ 30.292913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.293010] kthread+0x328/0x630 [ 30.293345] ret_from_fork+0x10/0x20 [ 30.293409] [ 30.293438] Freed by task 195: [ 30.293466] kasan_save_stack+0x3c/0x68 [ 30.293503] kasan_save_track+0x20/0x40 [ 30.293587] kasan_save_free_info+0x4c/0x78 [ 30.293625] __kasan_slab_free+0x6c/0x98 [ 30.293668] kfree+0x214/0x3c8 [ 30.293705] krealloc_uaf+0x12c/0x520 [ 30.293742] kunit_try_run_case+0x170/0x3f0 [ 30.293788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.293843] kthread+0x328/0x630 [ 30.293875] ret_from_fork+0x10/0x20 [ 30.293912] [ 30.293931] The buggy address belongs to the object at fff00000c81a5000 [ 30.293931] which belongs to the cache kmalloc-256 of size 256 [ 30.293994] The buggy address is located 0 bytes inside of [ 30.293994] freed 256-byte region [fff00000c81a5000, fff00000c81a5100) [ 30.294052] [ 30.294085] The buggy address belongs to the physical page: [ 30.294117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.294203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.294256] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.294304] page_type: f5(slab) [ 30.294356] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.294404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.294450] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.294497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.294544] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.294600] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.294639] page dumped because: kasan: bad access detected [ 30.294677] [ 30.294696] Memory state around the buggy address: [ 30.294726] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.294767] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.294807] >fff00000c81a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.295168] ^ [ 30.295372] fff00000c81a5080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.295431] fff00000c81a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.295485] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.185015] ================================================================== [ 30.185370] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.185889] Write of size 1 at addr fff00000c81a4eda by task kunit_try_catch/189 [ 30.186266] [ 30.186920] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.187291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.187344] Hardware name: linux,dummy-virt (DT) [ 30.187456] Call trace: [ 30.187515] show_stack+0x20/0x38 (C) [ 30.187618] dump_stack_lvl+0x8c/0xd0 [ 30.187705] print_report+0x118/0x5e8 [ 30.188060] kasan_report+0xdc/0x128 [ 30.188495] __asan_report_store1_noabort+0x20/0x30 [ 30.188575] krealloc_less_oob_helper+0xa80/0xc50 [ 30.188748] krealloc_less_oob+0x20/0x38 [ 30.188878] kunit_try_run_case+0x170/0x3f0 [ 30.189230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.189611] kthread+0x328/0x630 [ 30.189850] ret_from_fork+0x10/0x20 [ 30.189907] [ 30.189925] Allocated by task 189: [ 30.190197] kasan_save_stack+0x3c/0x68 [ 30.190559] kasan_save_track+0x20/0x40 [ 30.190792] kasan_save_alloc_info+0x40/0x58 [ 30.190874] __kasan_krealloc+0x118/0x178 [ 30.190943] krealloc_noprof+0x128/0x360 [ 30.190978] krealloc_less_oob_helper+0x168/0xc50 [ 30.191177] krealloc_less_oob+0x20/0x38 [ 30.191261] kunit_try_run_case+0x170/0x3f0 [ 30.191393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.191455] kthread+0x328/0x630 [ 30.191488] ret_from_fork+0x10/0x20 [ 30.191739] [ 30.192160] The buggy address belongs to the object at fff00000c81a4e00 [ 30.192160] which belongs to the cache kmalloc-256 of size 256 [ 30.192375] The buggy address is located 17 bytes to the right of [ 30.192375] allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9) [ 30.192583] [ 30.192640] The buggy address belongs to the physical page: [ 30.192682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.193035] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.193199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.193279] page_type: f5(slab) [ 30.193316] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.193526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.193763] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.193877] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.194008] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.194282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.194449] page dumped because: kasan: bad access detected [ 30.194539] [ 30.194558] Memory state around the buggy address: [ 30.194708] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.194848] fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.195012] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.195053] ^ [ 30.195132] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.195398] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.195634] ================================================================== [ 30.161397] ================================================================== [ 30.161793] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.162341] Write of size 1 at addr fff00000c81a4ec9 by task kunit_try_catch/189 [ 30.162445] [ 30.162492] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.162827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.162923] Hardware name: linux,dummy-virt (DT) [ 30.163250] Call trace: [ 30.163322] show_stack+0x20/0x38 (C) [ 30.163447] dump_stack_lvl+0x8c/0xd0 [ 30.163694] print_report+0x118/0x5e8 [ 30.163872] kasan_report+0xdc/0x128 [ 30.163948] __asan_report_store1_noabort+0x20/0x30 [ 30.164103] krealloc_less_oob_helper+0xa48/0xc50 [ 30.164215] krealloc_less_oob+0x20/0x38 [ 30.164366] kunit_try_run_case+0x170/0x3f0 [ 30.164563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.165201] kthread+0x328/0x630 [ 30.165311] ret_from_fork+0x10/0x20 [ 30.165441] [ 30.165508] Allocated by task 189: [ 30.165633] kasan_save_stack+0x3c/0x68 [ 30.165955] kasan_save_track+0x20/0x40 [ 30.166126] kasan_save_alloc_info+0x40/0x58 [ 30.166206] __kasan_krealloc+0x118/0x178 [ 30.166250] krealloc_noprof+0x128/0x360 [ 30.166578] krealloc_less_oob_helper+0x168/0xc50 [ 30.166763] krealloc_less_oob+0x20/0x38 [ 30.166859] kunit_try_run_case+0x170/0x3f0 [ 30.167068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.167222] kthread+0x328/0x630 [ 30.167362] ret_from_fork+0x10/0x20 [ 30.167531] [ 30.167858] The buggy address belongs to the object at fff00000c81a4e00 [ 30.167858] which belongs to the cache kmalloc-256 of size 256 [ 30.168110] The buggy address is located 0 bytes to the right of [ 30.168110] allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9) [ 30.168410] [ 30.168447] The buggy address belongs to the physical page: [ 30.168484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.168552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.168596] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.168646] page_type: f5(slab) [ 30.168684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.168733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.168780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.168846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.169304] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.169568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.169714] page dumped because: kasan: bad access detected [ 30.169801] [ 30.170132] Memory state around the buggy address: [ 30.170400] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.170522] fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.170708] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.170754] ^ [ 30.170986] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.171195] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.171399] ================================================================== [ 30.178292] ================================================================== [ 30.178656] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.178739] Write of size 1 at addr fff00000c81a4ed0 by task kunit_try_catch/189 [ 30.178796] [ 30.178979] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.179088] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.179312] Hardware name: linux,dummy-virt (DT) [ 30.179356] Call trace: [ 30.179705] show_stack+0x20/0x38 (C) [ 30.179848] dump_stack_lvl+0x8c/0xd0 [ 30.179903] print_report+0x118/0x5e8 [ 30.179947] kasan_report+0xdc/0x128 [ 30.180034] __asan_report_store1_noabort+0x20/0x30 [ 30.180085] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.180160] krealloc_less_oob+0x20/0x38 [ 30.180522] kunit_try_run_case+0x170/0x3f0 [ 30.180662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.180793] kthread+0x328/0x630 [ 30.180880] ret_from_fork+0x10/0x20 [ 30.181153] [ 30.181270] Allocated by task 189: [ 30.181458] kasan_save_stack+0x3c/0x68 [ 30.181520] kasan_save_track+0x20/0x40 [ 30.181577] kasan_save_alloc_info+0x40/0x58 [ 30.181613] __kasan_krealloc+0x118/0x178 [ 30.181840] krealloc_noprof+0x128/0x360 [ 30.181933] krealloc_less_oob_helper+0x168/0xc50 [ 30.182169] krealloc_less_oob+0x20/0x38 [ 30.182281] kunit_try_run_case+0x170/0x3f0 [ 30.182378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.182541] kthread+0x328/0x630 [ 30.182579] ret_from_fork+0x10/0x20 [ 30.182792] [ 30.182984] The buggy address belongs to the object at fff00000c81a4e00 [ 30.182984] which belongs to the cache kmalloc-256 of size 256 [ 30.183194] The buggy address is located 7 bytes to the right of [ 30.183194] allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9) [ 30.183265] [ 30.183284] The buggy address belongs to the physical page: [ 30.183318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.183381] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.183434] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.183491] page_type: f5(slab) [ 30.183529] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.183576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.183623] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.183669] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.183716] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.183762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.183800] page dumped because: kasan: bad access detected [ 30.183841] [ 30.183867] Memory state around the buggy address: [ 30.183907] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.183949] fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.183990] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.184025] ^ [ 30.184070] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.184121] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.184156] ================================================================== [ 30.240306] ================================================================== [ 30.240369] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.240423] Write of size 1 at addr fff00000c9aea0c9 by task kunit_try_catch/193 [ 30.240471] [ 30.240502] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.240586] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.240616] Hardware name: linux,dummy-virt (DT) [ 30.240645] Call trace: [ 30.240667] show_stack+0x20/0x38 (C) [ 30.240714] dump_stack_lvl+0x8c/0xd0 [ 30.240758] print_report+0x118/0x5e8 [ 30.240801] kasan_report+0xdc/0x128 [ 30.241662] __asan_report_store1_noabort+0x20/0x30 [ 30.241786] krealloc_less_oob_helper+0xa48/0xc50 [ 30.241949] krealloc_large_less_oob+0x20/0x38 [ 30.242050] kunit_try_run_case+0x170/0x3f0 [ 30.242147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.242299] kthread+0x328/0x630 [ 30.242342] ret_from_fork+0x10/0x20 [ 30.242725] [ 30.242831] The buggy address belongs to the physical page: [ 30.242983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.243141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.243237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.243625] page_type: f8(unknown) [ 30.243732] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.243834] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.243976] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.244048] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.244351] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.244789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.244936] page dumped because: kasan: bad access detected [ 30.244988] [ 30.245007] Memory state around the buggy address: [ 30.245045] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.245099] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.245446] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.245615] ^ [ 30.245694] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.245900] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.246306] ================================================================== [ 30.247608] ================================================================== [ 30.247692] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.247747] Write of size 1 at addr fff00000c9aea0d0 by task kunit_try_catch/193 [ 30.247897] [ 30.247928] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.248157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.248313] Hardware name: linux,dummy-virt (DT) [ 30.248348] Call trace: [ 30.248369] show_stack+0x20/0x38 (C) [ 30.248648] dump_stack_lvl+0x8c/0xd0 [ 30.248792] print_report+0x118/0x5e8 [ 30.248944] kasan_report+0xdc/0x128 [ 30.249065] __asan_report_store1_noabort+0x20/0x30 [ 30.249251] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.249314] krealloc_large_less_oob+0x20/0x38 [ 30.249656] kunit_try_run_case+0x170/0x3f0 [ 30.249765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.250005] kthread+0x328/0x630 [ 30.250093] ret_from_fork+0x10/0x20 [ 30.250268] [ 30.250363] The buggy address belongs to the physical page: [ 30.250407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.250835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.250931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.251031] page_type: f8(unknown) [ 30.251237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.251331] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.251647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.251723] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.251867] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.252312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.252654] page dumped because: kasan: bad access detected [ 30.252715] [ 30.252763] Memory state around the buggy address: [ 30.252889] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.252951] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.252992] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.253038] ^ [ 30.253074] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.253479] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.253877] ================================================================== [ 30.262647] ================================================================== [ 30.262736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.263052] Write of size 1 at addr fff00000c9aea0ea by task kunit_try_catch/193 [ 30.263120] [ 30.263151] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.263236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.263264] Hardware name: linux,dummy-virt (DT) [ 30.263348] Call trace: [ 30.263374] show_stack+0x20/0x38 (C) [ 30.263425] dump_stack_lvl+0x8c/0xd0 [ 30.263471] print_report+0x118/0x5e8 [ 30.263515] kasan_report+0xdc/0x128 [ 30.263558] __asan_report_store1_noabort+0x20/0x30 [ 30.263611] krealloc_less_oob_helper+0xae4/0xc50 [ 30.263679] krealloc_large_less_oob+0x20/0x38 [ 30.263736] kunit_try_run_case+0x170/0x3f0 [ 30.263789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.263852] kthread+0x328/0x630 [ 30.263893] ret_from_fork+0x10/0x20 [ 30.263938] [ 30.263967] The buggy address belongs to the physical page: [ 30.263998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.264048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.264105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.264152] page_type: f8(unknown) [ 30.264196] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.264244] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.264290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.264344] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.264391] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.264436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.264472] page dumped because: kasan: bad access detected [ 30.264501] [ 30.264526] Memory state around the buggy address: [ 30.264555] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.264596] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.264645] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.264687] ^ [ 30.264723] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.264771] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.265215] ================================================================== [ 30.266094] ================================================================== [ 30.266138] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.266210] Write of size 1 at addr fff00000c9aea0eb by task kunit_try_catch/193 [ 30.266267] [ 30.266597] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.266832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.266870] Hardware name: linux,dummy-virt (DT) [ 30.266938] Call trace: [ 30.267000] show_stack+0x20/0x38 (C) [ 30.267054] dump_stack_lvl+0x8c/0xd0 [ 30.267100] print_report+0x118/0x5e8 [ 30.267423] kasan_report+0xdc/0x128 [ 30.267535] __asan_report_store1_noabort+0x20/0x30 [ 30.267588] krealloc_less_oob_helper+0xa58/0xc50 [ 30.267653] krealloc_large_less_oob+0x20/0x38 [ 30.267729] kunit_try_run_case+0x170/0x3f0 [ 30.267783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.268005] kthread+0x328/0x630 [ 30.268048] ret_from_fork+0x10/0x20 [ 30.268435] [ 30.268478] The buggy address belongs to the physical page: [ 30.268512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.268915] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.269034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.269211] page_type: f8(unknown) [ 30.269287] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.269382] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.269479] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.269548] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.269753] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.270030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.270141] page dumped because: kasan: bad access detected [ 30.270218] [ 30.270330] Memory state around the buggy address: [ 30.270408] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.270539] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.270595] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.270692] ^ [ 30.270731] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.271064] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.271146] ================================================================== [ 30.255904] ================================================================== [ 30.256075] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.256137] Write of size 1 at addr fff00000c9aea0da by task kunit_try_catch/193 [ 30.256203] [ 30.256317] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.256433] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.256464] Hardware name: linux,dummy-virt (DT) [ 30.256504] Call trace: [ 30.256533] show_stack+0x20/0x38 (C) [ 30.256585] dump_stack_lvl+0x8c/0xd0 [ 30.256635] print_report+0x118/0x5e8 [ 30.256688] kasan_report+0xdc/0x128 [ 30.256732] __asan_report_store1_noabort+0x20/0x30 [ 30.256779] krealloc_less_oob_helper+0xa80/0xc50 [ 30.257288] krealloc_large_less_oob+0x20/0x38 [ 30.257539] kunit_try_run_case+0x170/0x3f0 [ 30.257710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.257904] kthread+0x328/0x630 [ 30.257962] ret_from_fork+0x10/0x20 [ 30.258346] [ 30.258486] The buggy address belongs to the physical page: [ 30.258531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.258907] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.259049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.259401] page_type: f8(unknown) [ 30.259483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.259584] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.260027] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.260111] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.260280] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.260445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.260559] page dumped because: kasan: bad access detected [ 30.260690] [ 30.260754] Memory state around the buggy address: [ 30.260786] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.260847] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.261191] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.261343] ^ [ 30.261382] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.261423] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.261466] ================================================================== [ 30.196794] ================================================================== [ 30.197180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.197371] Write of size 1 at addr fff00000c81a4eea by task kunit_try_catch/189 [ 30.197552] [ 30.197636] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.197950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.197986] Hardware name: linux,dummy-virt (DT) [ 30.198056] Call trace: [ 30.198581] show_stack+0x20/0x38 (C) [ 30.198644] dump_stack_lvl+0x8c/0xd0 [ 30.198691] print_report+0x118/0x5e8 [ 30.198744] kasan_report+0xdc/0x128 [ 30.198786] __asan_report_store1_noabort+0x20/0x30 [ 30.198846] krealloc_less_oob_helper+0xae4/0xc50 [ 30.198919] krealloc_less_oob+0x20/0x38 [ 30.198965] kunit_try_run_case+0x170/0x3f0 [ 30.199011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.199062] kthread+0x328/0x630 [ 30.199121] ret_from_fork+0x10/0x20 [ 30.199199] [ 30.199217] Allocated by task 189: [ 30.199258] kasan_save_stack+0x3c/0x68 [ 30.199308] kasan_save_track+0x20/0x40 [ 30.199348] kasan_save_alloc_info+0x40/0x58 [ 30.199384] __kasan_krealloc+0x118/0x178 [ 30.199433] krealloc_noprof+0x128/0x360 [ 30.199476] krealloc_less_oob_helper+0x168/0xc50 [ 30.199524] krealloc_less_oob+0x20/0x38 [ 30.199561] kunit_try_run_case+0x170/0x3f0 [ 30.199596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.199636] kthread+0x328/0x630 [ 30.199673] ret_from_fork+0x10/0x20 [ 30.199713] [ 30.199746] The buggy address belongs to the object at fff00000c81a4e00 [ 30.199746] which belongs to the cache kmalloc-256 of size 256 [ 30.199800] The buggy address is located 33 bytes to the right of [ 30.199800] allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9) [ 30.199871] [ 30.199898] The buggy address belongs to the physical page: [ 30.199930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.199988] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.200041] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.200088] page_type: f5(slab) [ 30.200124] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.200186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.200234] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.200291] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.200338] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.200384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.200421] page dumped because: kasan: bad access detected [ 30.200450] [ 30.200475] Memory state around the buggy address: [ 30.200505] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.200545] fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.200595] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.200630] ^ [ 30.200666] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.200721] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.200766] ================================================================== [ 30.202449] ================================================================== [ 30.202941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.203026] Write of size 1 at addr fff00000c81a4eeb by task kunit_try_catch/189 [ 30.203103] [ 30.203145] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.203231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.203516] Hardware name: linux,dummy-virt (DT) [ 30.203563] Call trace: [ 30.203760] show_stack+0x20/0x38 (C) [ 30.203856] dump_stack_lvl+0x8c/0xd0 [ 30.203911] print_report+0x118/0x5e8 [ 30.203954] kasan_report+0xdc/0x128 [ 30.203998] __asan_report_store1_noabort+0x20/0x30 [ 30.204233] krealloc_less_oob_helper+0xa58/0xc50 [ 30.204339] krealloc_less_oob+0x20/0x38 [ 30.204541] kunit_try_run_case+0x170/0x3f0 [ 30.204605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.204659] kthread+0x328/0x630 [ 30.204880] ret_from_fork+0x10/0x20 [ 30.204942] [ 30.205369] Allocated by task 189: [ 30.205537] kasan_save_stack+0x3c/0x68 [ 30.205628] kasan_save_track+0x20/0x40 [ 30.205748] kasan_save_alloc_info+0x40/0x58 [ 30.205846] __kasan_krealloc+0x118/0x178 [ 30.205964] krealloc_noprof+0x128/0x360 [ 30.206004] krealloc_less_oob_helper+0x168/0xc50 [ 30.206092] krealloc_less_oob+0x20/0x38 [ 30.206440] kunit_try_run_case+0x170/0x3f0 [ 30.206639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.206759] kthread+0x328/0x630 [ 30.206889] ret_from_fork+0x10/0x20 [ 30.207087] [ 30.207337] The buggy address belongs to the object at fff00000c81a4e00 [ 30.207337] which belongs to the cache kmalloc-256 of size 256 [ 30.207591] The buggy address is located 34 bytes to the right of [ 30.207591] allocated 201-byte region [fff00000c81a4e00, fff00000c81a4ec9) [ 30.207719] [ 30.207919] The buggy address belongs to the physical page: [ 30.207987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.208061] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.208197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.208304] page_type: f5(slab) [ 30.208490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.208624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.208861] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.208989] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.209142] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.209238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.209331] page dumped because: kasan: bad access detected [ 30.209363] [ 30.209396] Memory state around the buggy address: [ 30.209606] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.209703] fff00000c81a4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.209759] >fff00000c81a4e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.210019] ^ [ 30.210086] fff00000c81a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210182] fff00000c81a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210263] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.220659] ================================================================== [ 30.220946] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.221018] Write of size 1 at addr fff00000c9aea0eb by task kunit_try_catch/191 [ 30.221067] [ 30.221102] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.221188] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.221216] Hardware name: linux,dummy-virt (DT) [ 30.221246] Call trace: [ 30.221268] show_stack+0x20/0x38 (C) [ 30.221315] dump_stack_lvl+0x8c/0xd0 [ 30.221361] print_report+0x118/0x5e8 [ 30.221404] kasan_report+0xdc/0x128 [ 30.221445] __asan_report_store1_noabort+0x20/0x30 [ 30.221493] krealloc_more_oob_helper+0x60c/0x678 [ 30.221541] krealloc_large_more_oob+0x20/0x38 [ 30.221588] kunit_try_run_case+0x170/0x3f0 [ 30.221634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221684] kthread+0x328/0x630 [ 30.221725] ret_from_fork+0x10/0x20 [ 30.221770] [ 30.221789] The buggy address belongs to the physical page: [ 30.221838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.221889] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.221932] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.221981] page_type: f8(unknown) [ 30.222018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.222064] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.222175] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.222291] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.222461] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.222516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.222562] page dumped because: kasan: bad access detected [ 30.222591] [ 30.222608] Memory state around the buggy address: [ 30.222837] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.223107] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.223989] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.224052] ^ [ 30.224139] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.224183] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.224269] ================================================================== [ 30.144348] ================================================================== [ 30.144842] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.144994] Write of size 1 at addr fff00000c81a4cf0 by task kunit_try_catch/187 [ 30.145106] [ 30.145157] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.145522] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.145659] Hardware name: linux,dummy-virt (DT) [ 30.145727] Call trace: [ 30.145796] show_stack+0x20/0x38 (C) [ 30.145959] dump_stack_lvl+0x8c/0xd0 [ 30.146060] print_report+0x118/0x5e8 [ 30.146167] kasan_report+0xdc/0x128 [ 30.146220] __asan_report_store1_noabort+0x20/0x30 [ 30.146277] krealloc_more_oob_helper+0x5c0/0x678 [ 30.146326] krealloc_more_oob+0x20/0x38 [ 30.146371] kunit_try_run_case+0x170/0x3f0 [ 30.146425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.146484] kthread+0x328/0x630 [ 30.146533] ret_from_fork+0x10/0x20 [ 30.146579] [ 30.146597] Allocated by task 187: [ 30.146626] kasan_save_stack+0x3c/0x68 [ 30.146671] kasan_save_track+0x20/0x40 [ 30.146706] kasan_save_alloc_info+0x40/0x58 [ 30.146752] __kasan_krealloc+0x118/0x178 [ 30.146786] krealloc_noprof+0x128/0x360 [ 30.147140] krealloc_more_oob_helper+0x168/0x678 [ 30.147408] krealloc_more_oob+0x20/0x38 [ 30.147670] kunit_try_run_case+0x170/0x3f0 [ 30.147848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.148021] kthread+0x328/0x630 [ 30.148107] ret_from_fork+0x10/0x20 [ 30.148214] [ 30.148482] The buggy address belongs to the object at fff00000c81a4c00 [ 30.148482] which belongs to the cache kmalloc-256 of size 256 [ 30.148749] The buggy address is located 5 bytes to the right of [ 30.148749] allocated 235-byte region [fff00000c81a4c00, fff00000c81a4ceb) [ 30.148954] [ 30.149032] The buggy address belongs to the physical page: [ 30.149135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.149190] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.149252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.149677] page_type: f5(slab) [ 30.150161] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.150230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.150658] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.150743] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.150847] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.151493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.151604] page dumped because: kasan: bad access detected [ 30.151781] [ 30.151880] Memory state around the buggy address: [ 30.152050] fff00000c81a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.152137] fff00000c81a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.152213] >fff00000c81a4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.152416] ^ [ 30.152496] fff00000c81a4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.152601] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.152656] ================================================================== [ 30.227205] ================================================================== [ 30.227253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.227304] Write of size 1 at addr fff00000c9aea0f0 by task kunit_try_catch/191 [ 30.227352] [ 30.227380] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.227465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.227492] Hardware name: linux,dummy-virt (DT) [ 30.227521] Call trace: [ 30.227542] show_stack+0x20/0x38 (C) [ 30.227587] dump_stack_lvl+0x8c/0xd0 [ 30.227641] print_report+0x118/0x5e8 [ 30.227685] kasan_report+0xdc/0x128 [ 30.227727] __asan_report_store1_noabort+0x20/0x30 [ 30.227776] krealloc_more_oob_helper+0x5c0/0x678 [ 30.228083] krealloc_large_more_oob+0x20/0x38 [ 30.228162] kunit_try_run_case+0x170/0x3f0 [ 30.228209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.228261] kthread+0x328/0x630 [ 30.228494] ret_from_fork+0x10/0x20 [ 30.228799] [ 30.228846] The buggy address belongs to the physical page: [ 30.228993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 30.229062] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.229105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.229503] page_type: f8(unknown) [ 30.229625] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.229676] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.229783] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.230014] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.230502] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 30.230728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.230969] page dumped because: kasan: bad access detected [ 30.231241] [ 30.231268] Memory state around the buggy address: [ 30.231300] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231636] fff00000c9aea000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231851] >fff00000c9aea080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.231961] ^ [ 30.232222] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.232457] fff00000c9aea180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.232604] ================================================================== [ 30.136043] ================================================================== [ 30.136100] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.136156] Write of size 1 at addr fff00000c81a4ceb by task kunit_try_catch/187 [ 30.136204] [ 30.136236] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.136320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.136348] Hardware name: linux,dummy-virt (DT) [ 30.136378] Call trace: [ 30.136400] show_stack+0x20/0x38 (C) [ 30.136447] dump_stack_lvl+0x8c/0xd0 [ 30.136491] print_report+0x118/0x5e8 [ 30.136534] kasan_report+0xdc/0x128 [ 30.136577] __asan_report_store1_noabort+0x20/0x30 [ 30.136627] krealloc_more_oob_helper+0x60c/0x678 [ 30.136676] krealloc_more_oob+0x20/0x38 [ 30.136721] kunit_try_run_case+0x170/0x3f0 [ 30.136768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.137727] kthread+0x328/0x630 [ 30.137925] ret_from_fork+0x10/0x20 [ 30.138032] [ 30.138135] Allocated by task 187: [ 30.138170] kasan_save_stack+0x3c/0x68 [ 30.138256] kasan_save_track+0x20/0x40 [ 30.138451] kasan_save_alloc_info+0x40/0x58 [ 30.138497] __kasan_krealloc+0x118/0x178 [ 30.138737] krealloc_noprof+0x128/0x360 [ 30.138841] krealloc_more_oob_helper+0x168/0x678 [ 30.138888] krealloc_more_oob+0x20/0x38 [ 30.138926] kunit_try_run_case+0x170/0x3f0 [ 30.139016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.139235] kthread+0x328/0x630 [ 30.139392] ret_from_fork+0x10/0x20 [ 30.139525] [ 30.139685] The buggy address belongs to the object at fff00000c81a4c00 [ 30.139685] which belongs to the cache kmalloc-256 of size 256 [ 30.140069] The buggy address is located 0 bytes to the right of [ 30.140069] allocated 235-byte region [fff00000c81a4c00, fff00000c81a4ceb) [ 30.140161] [ 30.140489] The buggy address belongs to the physical page: [ 30.140660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081a4 [ 30.140737] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.140791] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.141018] page_type: f5(slab) [ 30.141261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.141432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.141527] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.141666] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.141753] head: 0bfffe0000000001 ffffc1ffc3206901 00000000ffffffff 00000000ffffffff [ 30.141829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.142020] page dumped because: kasan: bad access detected [ 30.142294] [ 30.142405] Memory state around the buggy address: [ 30.142496] fff00000c81a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.142587] fff00000c81a4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.142846] >fff00000c81a4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.142940] ^ [ 30.143222] fff00000c81a4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.143360] fff00000c81a4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.143505] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.120260] ================================================================== [ 30.120365] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.120625] Read of size 1 at addr fff00000c9b30000 by task kunit_try_catch/185 [ 30.120684] [ 30.120718] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.120824] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.121293] Hardware name: linux,dummy-virt (DT) [ 30.121332] Call trace: [ 30.121355] show_stack+0x20/0x38 (C) [ 30.121661] dump_stack_lvl+0x8c/0xd0 [ 30.121880] print_report+0x118/0x5e8 [ 30.122028] kasan_report+0xdc/0x128 [ 30.122138] __asan_report_load1_noabort+0x20/0x30 [ 30.122306] page_alloc_uaf+0x328/0x350 [ 30.122357] kunit_try_run_case+0x170/0x3f0 [ 30.122731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.123093] kthread+0x328/0x630 [ 30.123204] ret_from_fork+0x10/0x20 [ 30.123330] [ 30.123358] The buggy address belongs to the physical page: [ 30.123793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30 [ 30.124023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.124086] page_type: f0(buddy) [ 30.124127] raw: 0bfffe0000000000 fff00000ff6160e0 fff00000ff6160e0 0000000000000000 [ 30.124453] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 30.124612] page dumped because: kasan: bad access detected [ 30.124654] [ 30.124673] Memory state around the buggy address: [ 30.124750] fff00000c9b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.124914] fff00000c9b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.125218] >fff00000c9b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.125261] ^ [ 30.125623] fff00000c9b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.125712] fff00000c9b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.125784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 30.104316] ================================================================== [ 30.104396] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.104458] Free of addr fff00000c9ae4001 by task kunit_try_catch/181 [ 30.104502] [ 30.104532] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.104617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.104646] Hardware name: linux,dummy-virt (DT) [ 30.104676] Call trace: [ 30.104696] show_stack+0x20/0x38 (C) [ 30.104743] dump_stack_lvl+0x8c/0xd0 [ 30.104787] print_report+0x118/0x5e8 [ 30.104875] kasan_report_invalid_free+0xc0/0xe8 [ 30.105026] __kasan_kfree_large+0x5c/0xa8 [ 30.105150] free_large_kmalloc+0x68/0x150 [ 30.105337] kfree+0x270/0x3c8 [ 30.105446] kmalloc_large_invalid_free+0x108/0x270 [ 30.105515] kunit_try_run_case+0x170/0x3f0 [ 30.105561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.105631] kthread+0x328/0x630 [ 30.105672] ret_from_fork+0x10/0x20 [ 30.105717] [ 30.105736] The buggy address belongs to the physical page: [ 30.105769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.105829] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.105873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.106141] page_type: f8(unknown) [ 30.106192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.106240] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.106293] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.106350] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.106396] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.106443] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.106481] page dumped because: kasan: bad access detected [ 30.106517] [ 30.106596] Memory state around the buggy address: [ 30.106638] fff00000c9ae3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.106680] fff00000c9ae3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.106722] >fff00000c9ae4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.106757] ^ [ 30.106792] fff00000c9ae4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.106843] fff00000c9ae4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.107193] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.092858] ================================================================== [ 30.092991] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.093045] Read of size 1 at addr fff00000c9ae4000 by task kunit_try_catch/179 [ 30.093092] [ 30.093171] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.093286] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.093502] Hardware name: linux,dummy-virt (DT) [ 30.093535] Call trace: [ 30.093602] show_stack+0x20/0x38 (C) [ 30.093727] dump_stack_lvl+0x8c/0xd0 [ 30.093856] print_report+0x118/0x5e8 [ 30.093954] kasan_report+0xdc/0x128 [ 30.094099] __asan_report_load1_noabort+0x20/0x30 [ 30.094211] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.094320] kunit_try_run_case+0x170/0x3f0 [ 30.094431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.094500] kthread+0x328/0x630 [ 30.094541] ret_from_fork+0x10/0x20 [ 30.094955] [ 30.095032] The buggy address belongs to the physical page: [ 30.095131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.095270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.095455] raw: 0bfffe0000000000 ffffc1ffc326ba08 fff00000da472d00 0000000000000000 [ 30.095568] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.095647] page dumped because: kasan: bad access detected [ 30.095727] [ 30.095745] Memory state around the buggy address: [ 30.095775] fff00000c9ae3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.096169] fff00000c9ae3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.096268] >fff00000c9ae4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.096369] ^ [ 30.096397] fff00000c9ae4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.096437] fff00000c9ae4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.096882] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.084141] ================================================================== [ 30.084634] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.084695] Write of size 1 at addr fff00000c9ae600a by task kunit_try_catch/177 [ 30.084742] [ 30.084772] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.084878] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.084906] Hardware name: linux,dummy-virt (DT) [ 30.084934] Call trace: [ 30.084956] show_stack+0x20/0x38 (C) [ 30.085002] dump_stack_lvl+0x8c/0xd0 [ 30.086897] print_report+0x118/0x5e8 [ 30.086941] kasan_report+0xdc/0x128 [ 30.086982] __asan_report_store1_noabort+0x20/0x30 [ 30.087029] kmalloc_large_oob_right+0x278/0x2b8 [ 30.087075] kunit_try_run_case+0x170/0x3f0 [ 30.087122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.087171] kthread+0x328/0x630 [ 30.087212] ret_from_fork+0x10/0x20 [ 30.087257] [ 30.087292] The buggy address belongs to the physical page: [ 30.087328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.087380] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.087424] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.087480] page_type: f8(unknown) [ 30.087519] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.087567] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.087613] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.087659] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.087705] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.087751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.087790] page dumped because: kasan: bad access detected [ 30.087831] [ 30.087878] Memory state around the buggy address: [ 30.087910] fff00000c9ae5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.087973] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.088020] >fff00000c9ae6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.088195] ^ [ 30.088287] fff00000c9ae6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.088338] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.088426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.074731] ================================================================== [ 30.074795] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.074881] Write of size 1 at addr fff00000c9b09f00 by task kunit_try_catch/175 [ 30.074965] [ 30.075013] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.075100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.075127] Hardware name: linux,dummy-virt (DT) [ 30.075156] Call trace: [ 30.075177] show_stack+0x20/0x38 (C) [ 30.075365] dump_stack_lvl+0x8c/0xd0 [ 30.075437] print_report+0x118/0x5e8 [ 30.075483] kasan_report+0xdc/0x128 [ 30.075532] __asan_report_store1_noabort+0x20/0x30 [ 30.075579] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.075645] kunit_try_run_case+0x170/0x3f0 [ 30.075710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.075766] kthread+0x328/0x630 [ 30.075873] ret_from_fork+0x10/0x20 [ 30.075923] [ 30.075959] Allocated by task 175: [ 30.075986] kasan_save_stack+0x3c/0x68 [ 30.076040] kasan_save_track+0x20/0x40 [ 30.076075] kasan_save_alloc_info+0x40/0x58 [ 30.076225] __kasan_kmalloc+0xd4/0xd8 [ 30.076396] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.076475] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.076523] kunit_try_run_case+0x170/0x3f0 [ 30.076569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.076611] kthread+0x328/0x630 [ 30.076645] ret_from_fork+0x10/0x20 [ 30.076680] [ 30.076699] The buggy address belongs to the object at fff00000c9b08000 [ 30.076699] which belongs to the cache kmalloc-8k of size 8192 [ 30.076841] The buggy address is located 0 bytes to the right of [ 30.076841] allocated 7936-byte region [fff00000c9b08000, fff00000c9b09f00) [ 30.077134] [ 30.077162] The buggy address belongs to the physical page: [ 30.077212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b08 [ 30.077337] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.077397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.077466] page_type: f5(slab) [ 30.077504] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.077780] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.077914] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.078081] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.078296] head: 0bfffe0000000003 ffffc1ffc326c201 00000000ffffffff 00000000ffffffff [ 30.078424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.078546] page dumped because: kasan: bad access detected [ 30.078618] [ 30.078636] Memory state around the buggy address: [ 30.078679] fff00000c9b09e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.078883] fff00000c9b09e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.079140] >fff00000c9b09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.079252] ^ [ 30.079322] fff00000c9b09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.079361] fff00000c9b0a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.079596] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.058762] ================================================================== [ 30.058847] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.058907] Write of size 1 at addr fff00000c3f71978 by task kunit_try_catch/173 [ 30.058955] [ 30.058988] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.059078] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.059107] Hardware name: linux,dummy-virt (DT) [ 30.059147] Call trace: [ 30.059170] show_stack+0x20/0x38 (C) [ 30.059217] dump_stack_lvl+0x8c/0xd0 [ 30.059271] print_report+0x118/0x5e8 [ 30.059315] kasan_report+0xdc/0x128 [ 30.059357] __asan_report_store1_noabort+0x20/0x30 [ 30.059405] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.059455] kunit_try_run_case+0x170/0x3f0 [ 30.059501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.059552] kthread+0x328/0x630 [ 30.059595] ret_from_fork+0x10/0x20 [ 30.059641] [ 30.059664] Allocated by task 173: [ 30.059691] kasan_save_stack+0x3c/0x68 [ 30.059729] kasan_save_track+0x20/0x40 [ 30.059762] kasan_save_alloc_info+0x40/0x58 [ 30.059798] __kasan_kmalloc+0xd4/0xd8 [ 30.059841] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.059881] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.059921] kunit_try_run_case+0x170/0x3f0 [ 30.059956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.060022] kthread+0x328/0x630 [ 30.060069] ret_from_fork+0x10/0x20 [ 30.060362] [ 30.060401] The buggy address belongs to the object at fff00000c3f71900 [ 30.060401] which belongs to the cache kmalloc-128 of size 128 [ 30.060466] The buggy address is located 0 bytes to the right of [ 30.060466] allocated 120-byte region [fff00000c3f71900, fff00000c3f71978) [ 30.060527] [ 30.060545] The buggy address belongs to the physical page: [ 30.060599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.060654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.060801] page_type: f5(slab) [ 30.060864] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.060945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.060985] page dumped because: kasan: bad access detected [ 30.061014] [ 30.061031] Memory state around the buggy address: [ 30.061136] fff00000c3f71800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.061244] fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061390] >fff00000c3f71900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.061428] ^ [ 30.061466] fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061506] fff00000c3f71a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061543] ================================================================== [ 30.063688] ================================================================== [ 30.063751] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.063803] Write of size 1 at addr fff00000c3f71a78 by task kunit_try_catch/173 [ 30.063960] [ 30.063991] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.064216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.064306] Hardware name: linux,dummy-virt (DT) [ 30.064365] Call trace: [ 30.064409] show_stack+0x20/0x38 (C) [ 30.064615] dump_stack_lvl+0x8c/0xd0 [ 30.064741] print_report+0x118/0x5e8 [ 30.064789] kasan_report+0xdc/0x128 [ 30.065116] __asan_report_store1_noabort+0x20/0x30 [ 30.065172] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.065223] kunit_try_run_case+0x170/0x3f0 [ 30.065269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.065399] kthread+0x328/0x630 [ 30.066217] ret_from_fork+0x10/0x20 [ 30.066464] [ 30.066528] Allocated by task 173: [ 30.066629] kasan_save_stack+0x3c/0x68 [ 30.066791] kasan_save_track+0x20/0x40 [ 30.066958] kasan_save_alloc_info+0x40/0x58 [ 30.067125] __kasan_kmalloc+0xd4/0xd8 [ 30.067160] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.067241] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.067500] kunit_try_run_case+0x170/0x3f0 [ 30.067620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.067711] kthread+0x328/0x630 [ 30.067790] ret_from_fork+0x10/0x20 [ 30.067896] [ 30.067957] The buggy address belongs to the object at fff00000c3f71a00 [ 30.067957] which belongs to the cache kmalloc-128 of size 128 [ 30.068088] The buggy address is located 0 bytes to the right of [ 30.068088] allocated 120-byte region [fff00000c3f71a00, fff00000c3f71a78) [ 30.068184] [ 30.068278] The buggy address belongs to the physical page: [ 30.068357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 30.068466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.068576] page_type: f5(slab) [ 30.068655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.068750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.068788] page dumped because: kasan: bad access detected [ 30.068826] [ 30.068970] Memory state around the buggy address: [ 30.069221] fff00000c3f71900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.069364] fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.069424] >fff00000c3f71a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.069495] ^ [ 30.069588] fff00000c3f71a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.069665] fff00000c3f71b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.069700] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 30.046285] ================================================================== [ 30.046350] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 30.046406] Read of size 1 at addr fff00000c996f000 by task kunit_try_catch/171 [ 30.046454] [ 30.046486] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.046571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.046599] Hardware name: linux,dummy-virt (DT) [ 30.046628] Call trace: [ 30.046649] show_stack+0x20/0x38 (C) [ 30.046697] dump_stack_lvl+0x8c/0xd0 [ 30.046744] print_report+0x118/0x5e8 [ 30.046787] kasan_report+0xdc/0x128 [ 30.046845] __asan_report_load1_noabort+0x20/0x30 [ 30.046927] kmalloc_node_oob_right+0x2f4/0x330 [ 30.046993] kunit_try_run_case+0x170/0x3f0 [ 30.047060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047137] kthread+0x328/0x630 [ 30.047180] ret_from_fork+0x10/0x20 [ 30.047285] [ 30.047343] Allocated by task 171: [ 30.047390] kasan_save_stack+0x3c/0x68 [ 30.047464] kasan_save_track+0x20/0x40 [ 30.047499] kasan_save_alloc_info+0x40/0x58 [ 30.047534] __kasan_kmalloc+0xd4/0xd8 [ 30.047638] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.047681] kmalloc_node_oob_right+0xbc/0x330 [ 30.047719] kunit_try_run_case+0x170/0x3f0 [ 30.047755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047795] kthread+0x328/0x630 [ 30.047836] ret_from_fork+0x10/0x20 [ 30.047870] [ 30.048274] The buggy address belongs to the object at fff00000c996e000 [ 30.048274] which belongs to the cache kmalloc-4k of size 4096 [ 30.048379] The buggy address is located 0 bytes to the right of [ 30.048379] allocated 4096-byte region [fff00000c996e000, fff00000c996f000) [ 30.048525] [ 30.048562] The buggy address belongs to the physical page: [ 30.048712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109968 [ 30.049071] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.049276] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.049421] page_type: f5(slab) [ 30.049578] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 30.049666] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.049806] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 30.049972] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.050020] head: 0bfffe0000000003 ffffc1ffc3265a01 00000000ffffffff 00000000ffffffff [ 30.050066] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.050107] page dumped because: kasan: bad access detected [ 30.050136] [ 30.050154] Memory state around the buggy address: [ 30.050191] fff00000c996ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.050650] fff00000c996ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.050809] >fff00000c996f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050926] ^ [ 30.051014] fff00000c996f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.051171] fff00000c996f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.051244] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.942643] ================================================================== [ 29.942750] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.943130] Read of size 1 at addr fff00000c7b7a7df by task kunit_try_catch/169 [ 29.943184] [ 29.943221] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 29.943422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.943456] Hardware name: linux,dummy-virt (DT) [ 29.943487] Call trace: [ 29.943509] show_stack+0x20/0x38 (C) [ 29.944029] dump_stack_lvl+0x8c/0xd0 [ 29.944162] print_report+0x118/0x5e8 [ 29.944226] kasan_report+0xdc/0x128 [ 29.944286] __asan_report_load1_noabort+0x20/0x30 [ 29.944508] kmalloc_oob_left+0x2ec/0x320 [ 29.944810] kunit_try_run_case+0x170/0x3f0 [ 29.945002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.945101] kthread+0x328/0x630 [ 29.945147] ret_from_fork+0x10/0x20 [ 29.945195] [ 29.945366] Allocated by task 104: [ 29.945404] kasan_save_stack+0x3c/0x68 [ 29.945447] kasan_save_track+0x20/0x40 [ 29.945482] kasan_save_alloc_info+0x40/0x58 [ 29.945526] __kasan_kmalloc+0xd4/0xd8 [ 29.945560] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.945900] kvasprintf+0xe0/0x180 [ 29.946008] kasprintf+0xd0/0x110 [ 29.946075] miscdev_test_can_open+0xac/0x2c8 [ 29.946412] miscdev_test_collision_reverse+0x3b8/0x650 [ 29.946660] kunit_try_run_case+0x170/0x3f0 [ 29.947042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.947098] kthread+0x328/0x630 [ 29.947308] ret_from_fork+0x10/0x20 [ 29.947365] [ 29.947410] Freed by task 3350701984: [ 29.947594] ------------[ cut here ]------------ [ 29.947647] pool index -1 out of bounds (219) for stack id fff00000 [ 29.951614] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#1: kunit_try_catch/169 [ 30.008495] Modules linked in: [ 30.010083] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.011122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.011446] Hardware name: linux,dummy-virt (DT) [ 30.012356] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 30.013213] pc : depot_fetch_stack+0x68/0x88 [ 30.013575] lr : depot_fetch_stack+0x68/0x88 [ 30.013846] sp : ffff800080b37a50 [ 30.014038] x29: ffff800080b37a50 x28: ffff800080087b08 x27: 1ffff00010010f61 [ 30.015029] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff97f86b378044 [ 30.015620] x23: ffffc1ffc31ede80 x22: ffff97f86fea4788 x21: ffff97f86fea7ae8 [ 30.016213] x20: fff00000c7b7a7df x19: ffff800080b37b60 x18: 000000004344aacd [ 30.016830] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 30.017763] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010166ea7 [ 30.018677] x11: 1ffff00010166ea6 x10: ffff700010166ea6 x9 : ffff97f86acf118c [ 30.019637] x8 : ffff800080b37537 x7 : 0000000000000001 x6 : ffff700010166ea6 [ 30.020546] x5 : ffff800080b37530 x4 : 1ffe00001934d511 x3 : dfff800000000000 [ 30.020933] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9a6a880 [ 30.021832] Call trace: [ 30.022000] depot_fetch_stack+0x68/0x88 (P) [ 30.022221] stack_depot_print+0x24/0x60 [ 30.022421] print_report+0x5e4/0x5e8 [ 30.022613] kasan_report+0xdc/0x128 [ 30.022797] __asan_report_load1_noabort+0x20/0x30 [ 30.023339] kmalloc_oob_left+0x2ec/0x320 [ 30.023599] kunit_try_run_case+0x170/0x3f0 [ 30.023865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.024148] kthread+0x328/0x630 [ 30.024356] ret_from_fork+0x10/0x20 [ 30.024653] ---[ end trace 0000000000000000 ]--- [ 30.025172] ------------[ cut here ]------------ [ 30.025222] corrupt handle or use after stack_depot_put() [ 30.025314] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#1: kunit_try_catch/169 [ 30.026565] Modules linked in: [ 30.026838] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.027498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.027798] Hardware name: linux,dummy-virt (DT) [ 30.028092] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 30.028457] pc : stack_depot_print+0x54/0x60 [ 30.028765] lr : stack_depot_print+0x54/0x60 [ 30.029351] sp : ffff800080b37a60 [ 30.029631] x29: ffff800080b37a60 x28: ffff800080087b08 x27: 1ffff00010010f61 [ 30.030129] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff97f86b378044 [ 30.030596] x23: ffffc1ffc31ede80 x22: ffff97f86fea4788 x21: ffff97f86fea7ae8 [ 30.031061] x20: fff00000c7b7a7df x19: ffff800080b37b60 x18: 000000004344aacd [ 30.031521] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 30.031981] x14: ffff700010166f2c x13: 1ffe00001934d511 x12: ffff72ff0e3954f1 [ 30.032443] x11: 1ffff2ff0e3954f0 x10: ffff72ff0e3954f0 x9 : ffff97f86acf118c [ 30.033059] x8 : ffff97f871caa783 x7 : 0000000000000001 x6 : ffff72ff0e3954f0 [ 30.033541] x5 : ffff97f871caa780 x4 : 1ffe00001934d511 x3 : dfff800000000000 [ 30.033988] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9a6a880 [ 30.034432] Call trace: [ 30.034597] stack_depot_print+0x54/0x60 (P) [ 30.034893] print_report+0x5e4/0x5e8 [ 30.035172] kasan_report+0xdc/0x128 [ 30.035397] __asan_report_load1_noabort+0x20/0x30 [ 30.035691] kmalloc_oob_left+0x2ec/0x320 [ 30.035955] kunit_try_run_case+0x170/0x3f0 [ 30.036235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.036562] kthread+0x328/0x630 [ 30.036822] ret_from_fork+0x10/0x20 [ 30.037057] ---[ end trace 0000000000000000 ]--- [ 30.037405] [ 30.037434] The buggy address belongs to the object at fff00000c7b7a7c0 [ 30.037434] which belongs to the cache kmalloc-16 of size 16 [ 30.037493] The buggy address is located 15 bytes to the right of [ 30.037493] allocated 16-byte region [fff00000c7b7a7c0, fff00000c7b7a7d0) [ 30.037669] [ 30.037691] The buggy address belongs to the physical page: [ 30.037744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 30.037799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.037868] page_type: f5(slab) [ 30.037910] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.037959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.037998] page dumped because: kasan: bad access detected [ 30.038027] [ 30.038045] Memory state around the buggy address: [ 30.038076] fff00000c7b7a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.038118] fff00000c7b7a700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.038164] >fff00000c7b7a780: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 30.038199] ^ [ 30.038236] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.038276] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 30.038313] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.903927] ================================================================== [ 29.904258] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.905110] Write of size 1 at addr fff00000c3f71873 by task kunit_try_catch/167 [ 29.905224] [ 29.906013] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 29.906167] Tainted: [N]=TEST [ 29.906200] Hardware name: linux,dummy-virt (DT) [ 29.906417] Call trace: [ 29.906589] show_stack+0x20/0x38 (C) [ 29.906723] dump_stack_lvl+0x8c/0xd0 [ 29.906775] print_report+0x118/0x5e8 [ 29.906846] kasan_report+0xdc/0x128 [ 29.906894] __asan_report_store1_noabort+0x20/0x30 [ 29.906944] kmalloc_oob_right+0x5a4/0x660 [ 29.906992] kunit_try_run_case+0x170/0x3f0 [ 29.907042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.907094] kthread+0x328/0x630 [ 29.907140] ret_from_fork+0x10/0x20 [ 29.907295] [ 29.907336] Allocated by task 167: [ 29.907449] kasan_save_stack+0x3c/0x68 [ 29.907513] kasan_save_track+0x20/0x40 [ 29.907548] kasan_save_alloc_info+0x40/0x58 [ 29.907585] __kasan_kmalloc+0xd4/0xd8 [ 29.907622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.907669] kmalloc_oob_right+0xb0/0x660 [ 29.907707] kunit_try_run_case+0x170/0x3f0 [ 29.907743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.907784] kthread+0x328/0x630 [ 29.907828] ret_from_fork+0x10/0x20 [ 29.907882] [ 29.907942] The buggy address belongs to the object at fff00000c3f71800 [ 29.907942] which belongs to the cache kmalloc-128 of size 128 [ 29.908033] The buggy address is located 0 bytes to the right of [ 29.908033] allocated 115-byte region [fff00000c3f71800, fff00000c3f71873) [ 29.908097] [ 29.908175] The buggy address belongs to the physical page: [ 29.908577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 29.908837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.909161] page_type: f5(slab) [ 29.909451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.909510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.909608] page dumped because: kasan: bad access detected [ 29.909646] [ 29.909671] Memory state around the buggy address: [ 29.909908] fff00000c3f71700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.909975] fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.910027] >fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.910079] ^ [ 29.910164] fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.910205] fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.910266] ================================================================== [ 29.915660] ================================================================== [ 29.915707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.915755] Read of size 1 at addr fff00000c3f71880 by task kunit_try_catch/167 [ 29.915801] [ 29.915846] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 29.916340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.916423] Hardware name: linux,dummy-virt (DT) [ 29.916720] Call trace: [ 29.916754] show_stack+0x20/0x38 (C) [ 29.917080] dump_stack_lvl+0x8c/0xd0 [ 29.917627] print_report+0x118/0x5e8 [ 29.917887] kasan_report+0xdc/0x128 [ 29.918333] __asan_report_load1_noabort+0x20/0x30 [ 29.918409] kmalloc_oob_right+0x5d0/0x660 [ 29.918777] kunit_try_run_case+0x170/0x3f0 [ 29.919159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.919369] kthread+0x328/0x630 [ 29.919484] ret_from_fork+0x10/0x20 [ 29.919894] [ 29.919998] Allocated by task 167: [ 29.920057] kasan_save_stack+0x3c/0x68 [ 29.920244] kasan_save_track+0x20/0x40 [ 29.920445] kasan_save_alloc_info+0x40/0x58 [ 29.920516] __kasan_kmalloc+0xd4/0xd8 [ 29.920709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.920947] kmalloc_oob_right+0xb0/0x660 [ 29.921067] kunit_try_run_case+0x170/0x3f0 [ 29.921156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.921282] kthread+0x328/0x630 [ 29.921338] ret_from_fork+0x10/0x20 [ 29.921373] [ 29.921393] The buggy address belongs to the object at fff00000c3f71800 [ 29.921393] which belongs to the cache kmalloc-128 of size 128 [ 29.921458] The buggy address is located 13 bytes to the right of [ 29.921458] allocated 115-byte region [fff00000c3f71800, fff00000c3f71873) [ 29.921864] [ 29.921889] The buggy address belongs to the physical page: [ 29.921925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 29.922203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.922391] page_type: f5(slab) [ 29.922602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.923016] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.923408] page dumped because: kasan: bad access detected [ 29.923536] [ 29.923828] Memory state around the buggy address: [ 29.923899] fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.924062] fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.924362] >fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.924409] ^ [ 29.924438] fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.924479] fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.924591] ================================================================== [ 29.911029] ================================================================== [ 29.911067] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.911216] Write of size 1 at addr fff00000c3f71878 by task kunit_try_catch/167 [ 29.911265] [ 29.911331] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 29.911413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.911504] Hardware name: linux,dummy-virt (DT) [ 29.911533] Call trace: [ 29.911555] show_stack+0x20/0x38 (C) [ 29.911603] dump_stack_lvl+0x8c/0xd0 [ 29.911649] print_report+0x118/0x5e8 [ 29.911693] kasan_report+0xdc/0x128 [ 29.911736] __asan_report_store1_noabort+0x20/0x30 [ 29.911784] kmalloc_oob_right+0x538/0x660 [ 29.912059] kunit_try_run_case+0x170/0x3f0 [ 29.912127] kunit_gen [ 29.912127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.912272] kthread+0x328/0x630 [ 29.912316] ret_from_fork+0x10/0x20 [ 29.912801] [ 29.912905] Allocated by task 167: [ 29.912984] kasan_save_stack+0x3c/0x68 [ 29.913056] kasan_save_track+0x20/0x40 [ 29.913175] kasan_save_alloc_info+0x40/0x58 [ 29.913259] __kasan_kmalloc+0xd4/0xd8 [ 29.913292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.913331] kmalloc_oob_right+0xb0/0x660 [ 29.913369] kunit_try_run_case+0x170/0x3f0 [ 29.913405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.913446] kthread+0x328/0x630 [ 29.913478] ret_from_fork+0x10/0x20 [ 29.913513] [ 29.913531] The buggy address belongs to the object at fff00000c3f71800 [ 29.913531] which belongs to the cache kmalloc-128 of size 128 [ 29.913586] The buggy address is located 5 bytes to the right of [ 29.913586] allocated 115-byte region [fff00000c3f71800, fff00000c3f71873) [ 29.913646] [ 29.913917] The buggy address belongs to the physical page: [ 29.914302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71 [ 29.914500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.914610] page_type: f5(slab) [ 29.914658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.914706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.914744] page dumped because: kasan: bad access detected [ 29.914773] [ 29.914790] Memory state around the buggy address: [ 29.914831] fff00000c3f71700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.914873] fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.914923] >fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.914960] ^ [ 29.915068] fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.915110] fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.915145] ==================================================================
Failure - log-parser-boot/exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------ [ 194.148799] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#0: test_ratelimit_/1741 [ 194.150128] Modules linked in: [ 194.150410] CPU: 0 UID: 0 PID: 1741 Comm: test_ratelimit_ Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 194.152530] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 194.152803] Hardware name: linux,dummy-virt (DT) [ 194.153283] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 194.153977] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 194.154606] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 194.155294] sp : ffff8000899e7d90 [ 194.155661] x29: ffff8000899e7d90 x28: 0000000000000000 x27: 0000000000000000 [ 194.156390] x26: 1ffe0000198f7261 x25: 0000000000000000 x24: 0000000000000004 [ 194.156886] x23: fff00000cc7b930c x22: fff00000cc9677a8 x21: ffff97f86bd775b0 [ 194.157706] x20: fff00000cc7b9300 x19: fff00000cc9677a8 x18: 000000005373b7e0 [ 194.158741] x17: 0000000000000000 x16: fff00000c92dd03c x15: fff00000ff616b48 [ 194.159125] x14: 0000000000018fff x13: 1ffe00001b48dddd x12: fffd80001b489859 [ 194.159475] x11: 1ffe00001b489858 x10: fffd80001b489858 x9 : ffff97f86e388bbc [ 194.160484] x8 : ffff8000899e7ae8 x7 : 0000000000000001 x6 : ffff8000899e7c00 [ 194.161364] x5 : 0000000000000001 x4 : ffff97f8707043e0 x3 : 0000000000000000 [ 194.162592] x2 : 1ffe00001992cef9 x1 : 0000000000000000 x0 : 0000000000000000 [ 194.163539] Call trace: [ 194.163831] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 194.164365] kthread+0x328/0x630 [ 194.164723] ret_from_fork+0x10/0x20 [ 194.165532] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 109.124609] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/689 [ 109.126629] Modules linked in: [ 109.127102] CPU: 1 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 109.128296] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.128684] Hardware name: linux,dummy-virt (DT) [ 109.129070] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.129369] pc : intlog10+0x38/0x48 [ 109.129555] lr : intlog10_test+0xe4/0x200 [ 109.129745] sp : ffff8000821f7c10 [ 109.129915] x29: ffff8000821f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.130280] x26: 1ffe000018b44101 x25: 0000000000000000 x24: ffff8000821f7ce0 [ 109.130627] x23: ffff8000821f7d00 x22: 0000000000000000 x21: 1ffff0001043ef82 [ 109.131067] x20: ffff97f86e651c20 x19: ffff800080087990 x18: 00000000a5df9932 [ 109.131587] x17: 00000000e92747d2 x16: fff00000c92dcc3c x15: 000000006420f870 [ 109.132465] x14: 0000000039e98be6 x13: 1ffe00001b4899dd x12: ffff72ff0e4ab389 [ 109.133268] x11: 1ffff2ff0e4ab388 x10: ffff72ff0e4ab388 x9 : ffff97f86bc5b89c [ 109.133800] x8 : ffff97f872559c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.134171] x5 : ffff70001043ef82 x4 : 1ffff00010010f3b x3 : 1ffff2ff0dcca384 [ 109.134515] x2 : 1ffff2ff0dcca384 x1 : 0000000000000003 x0 : 0000000000000000 [ 109.134871] Call trace: [ 109.135012] intlog10+0x38/0x48 (P) [ 109.135254] kunit_try_run_case+0x170/0x3f0 [ 109.135556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.135870] kthread+0x328/0x630 [ 109.136112] ret_from_fork+0x10/0x20 [ 109.136344] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 109.076721] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/671 [ 109.081487] Modules linked in: [ 109.082081] CPU: 0 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 109.083192] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.083909] Hardware name: linux,dummy-virt (DT) [ 109.084414] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.084705] pc : intlog2+0xd8/0xf8 [ 109.084897] lr : intlog2_test+0xe4/0x200 [ 109.085594] sp : ffff8000822a7c10 [ 109.086115] x29: ffff8000822a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.087106] x26: 1ffe000018b462c1 x25: 0000000000000000 x24: ffff8000822a7ce0 [ 109.087956] x23: ffff8000822a7d00 x22: 0000000000000000 x21: 1ffff00010454f82 [ 109.088804] x20: ffff97f86e651b20 x19: ffff800080087990 x18: 00000000843def44 [ 109.089710] x17: 00000000f9c0eb98 x16: fff00000c92dd03c x15: 00000000e6b64a1b [ 109.090281] x14: 00000000f1f1f1f1 x13: 1ffe00001b48dddd x12: ffff72ff0e4ab389 [ 109.090638] x11: 1ffff2ff0e4ab388 x10: ffff72ff0e4ab388 x9 : ffff97f86bc5ba9c [ 109.091051] x8 : ffff97f872559c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.091491] x5 : ffff700010454f82 x4 : 1ffff00010010f3b x3 : 1ffff2ff0dcca364 [ 109.091854] x2 : 1ffff2ff0dcca364 x1 : 0000000000000003 x0 : 0000000000000000 [ 109.092341] Call trace: [ 109.092515] intlog2+0xd8/0xf8 (P) [ 109.092767] kunit_try_run_case+0x170/0x3f0 [ 109.093141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.093538] kthread+0x328/0x630 [ 109.093795] ret_from_fork+0x10/0x20 [ 109.094031] ---[ end trace 0000000000000000 ]---