Date
July 23, 2025, 3:10 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.191974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 33.248208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 33.175798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 33.110026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 32.982800] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 33.006016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 32.995672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 64.381726] Internal error: Oops: 0000000096000005 [#8] SMP [ 64.388340] Modules linked in: [ 64.389632] CPU: 1 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.390665] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.391226] Hardware name: linux,dummy-virt (DT) [ 64.391670] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.392323] pc : ext4_mb_release+0x394/0xaf8 [ 64.393289] lr : ext4_mb_release+0x37c/0xaf8 [ 64.393515] sp : ffff800080c07c50 [ 64.393674] x29: ffff800080c07c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.394271] x26: fff00000c6542000 x25: fff00000cc5ac740 x24: 1ffe0000198b58e8 [ 64.395022] x23: fffd8000198b58e8 x22: fff00000cc5ac618 x21: 1ffe0000198b58c3 [ 64.395762] x20: 0000000000000000 x19: fff00000cc5ac400 x18: 000000002d3b49db [ 64.396495] x17: 0000000000000001 x16: fff00000da46cda8 x15: fff00000ff616b48 [ 64.397457] x14: 0000000000018fff x13: 1ffe00001919e514 x12: fffd800018171e01 [ 64.397815] x11: 1ffe000018171e00 x10: fffd800018171e00 x9 : ffff91bcf9f8d63c [ 64.398172] x8 : ffff800080c079f8 x7 : 0000000000000001 x6 : ffff800080c07b10 [ 64.398518] x5 : 0000000000000001 x4 : 1ffe00001904a799 x3 : dfff800000000000 [ 64.398859] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.399208] Call trace: [ 64.399349] ext4_mb_release+0x394/0xaf8 (P) [ 64.399566] mbt_kunit_exit+0x9c/0x2c8 [ 64.399757] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.400113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.400670] kthread+0x328/0x630 [ 64.401046] ret_from_fork+0x10/0x20 [ 64.401498] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.402148] ---[ end trace 0000000000000000 ]--- [ 64.166544] Internal error: Oops: 0000000096000005 [#1] SMP [ 64.170780] Modules linked in: [ 64.172287] CPU: 0 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.173559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.173922] Hardware name: linux,dummy-virt (DT) [ 64.174353] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.174876] pc : ext4_mb_release+0x394/0xaf8 [ 64.175448] lr : ext4_mb_release+0x37c/0xaf8 [ 64.175858] sp : ffff800080bb7c50 [ 64.176098] x29: ffff800080bb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.176521] x26: fff00000c59df000 x25: fff00000c9992740 x24: 1ffe0000193324e8 [ 64.177243] x23: fffd8000193324e8 x22: fff00000c9992618 x21: 1ffe0000193324c3 [ 64.178030] x20: 0000000000000000 x19: fff00000c9992400 x18: 0000000006a1a343 [ 64.178580] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000b158b6ac [ 64.179159] x14: 0000000021f7818d x13: 1ffe00001919e4e4 x12: fffd800019748a81 [ 64.179825] x11: 1ffe000019748a80 x10: fffd800019748a80 x9 : ffff91bcf9f8d63c [ 64.180438] x8 : ffff800080bb79f8 x7 : 0000000000000001 x6 : ffff800080bb7b10 [ 64.181139] x5 : 0000000000000001 x4 : 1ffe00001836d511 x3 : dfff800000000000 [ 64.181819] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.182484] Call trace: [ 64.182657] ext4_mb_release+0x394/0xaf8 (P) [ 64.182883] mbt_kunit_exit+0x9c/0x2c8 [ 64.183185] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.183469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.183804] kthread+0x328/0x630 [ 64.184012] ret_from_fork+0x10/0x20 [ 64.184569] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.185207] ---[ end trace 0000000000000000 ]--- [ 64.476066] Internal error: Oops: 0000000096000005 [#11] SMP [ 64.482546] Modules linked in: [ 64.483231] CPU: 1 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.484145] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.484388] Hardware name: linux,dummy-virt (DT) [ 64.484824] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.485785] pc : ext4_mb_release+0x394/0xaf8 [ 64.486488] lr : ext4_mb_release+0x37c/0xaf8 [ 64.487128] sp : ffff800080bc7c50 [ 64.487615] x29: ffff800080bc7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.488403] x26: fff00000c6545000 x25: fff00000c7a06740 x24: 1ffe000018f40ce8 [ 64.489558] x23: fffd800018f40ce8 x22: fff00000c7a06618 x21: 1ffe000018f40cc3 [ 64.490230] x20: 0000000000000000 x19: fff00000c7a06400 x18: 1ffff2379f872c2e [ 64.490602] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007 [ 64.490960] x14: 00000000f1f1f1f1 x13: 1ffe00001919e514 x12: fffd800018171d81 [ 64.491303] x11: 1ffe000018171d80 x10: fffd800018171d80 x9 : ffff91bcf9f8d63c [ 64.491647] x8 : ffff800080bc79f8 x7 : 0000000000000001 x6 : ffff800080bc7b10 [ 64.492146] x5 : 0000000000000001 x4 : 1ffe000018c8d001 x3 : dfff800000000000 [ 64.492939] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.493747] Call trace: [ 64.494056] ext4_mb_release+0x394/0xaf8 (P) [ 64.494523] mbt_kunit_exit+0x9c/0x2c8 [ 64.494942] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.495432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.495993] kthread+0x328/0x630 [ 64.496353] ret_from_fork+0x10/0x20 [ 64.496877] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.497612] ---[ end trace 0000000000000000 ]--- [ 64.442697] Internal error: Oops: 0000000096000005 [#10] SMP [ 64.450840] Modules linked in: [ 64.452755] CPU: 0 UID: 0 PID: 399 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.453916] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.454525] Hardware name: linux,dummy-virt (DT) [ 64.455038] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.455726] pc : ext4_mb_release+0x394/0xaf8 [ 64.456245] lr : ext4_mb_release+0x37c/0xaf8 [ 64.456714] sp : ffff800080bc7c50 [ 64.456919] x29: ffff800080bc7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.457756] x26: fff00000cc909000 x25: fff00000cc98e740 x24: 1ffe000019931ce8 [ 64.458258] x23: fffd800019931ce8 x22: fff00000cc98e618 x21: 1ffe000019931cc3 [ 64.458613] x20: 0000000000000000 x19: fff00000cc98e400 x18: 0000000066a1663e [ 64.459082] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000b906f994 [ 64.459842] x14: 0000000026e49a88 x13: 1ffe00001919e4e4 x12: fffd80001821c561 [ 64.460758] x11: 1ffe00001821c560 x10: fffd80001821c560 x9 : ffff91bcf9f8d63c [ 64.461597] x8 : ffff800080bc79f8 x7 : 0000000000000001 x6 : ffff800080bc7b10 [ 64.462373] x5 : 0000000000000001 x4 : 1ffe00001904a001 x3 : dfff800000000000 [ 64.463124] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.463854] Call trace: [ 64.464144] ext4_mb_release+0x394/0xaf8 (P) [ 64.464600] mbt_kunit_exit+0x9c/0x2c8 [ 64.465052] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.465616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.465875] kthread+0x328/0x630 [ 64.466073] ret_from_fork+0x10/0x20 [ 64.466278] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.466835] ---[ end trace 0000000000000000 ]--- [ 64.658994] Internal error: Oops: 0000000096000005 [#17] SMP [ 64.665656] Modules linked in: [ 64.666058] CPU: 1 UID: 0 PID: 413 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.667225] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.667935] Hardware name: linux,dummy-virt (DT) [ 64.668541] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.669324] pc : ext4_mb_release+0x394/0xaf8 [ 64.669879] lr : ext4_mb_release+0x37c/0xaf8 [ 64.670428] sp : ffff800080c27c50 [ 64.670805] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.671456] x26: fff00000c4509000 x25: fff00000cc928740 x24: 1ffe0000199250e8 [ 64.671804] x23: fffd8000199250e8 x22: fff00000cc928618 x21: 1ffe0000199250c3 [ 64.672259] x20: 0000000000000000 x19: fff00000cc928400 x18: 00000000ab3f8a0c [ 64.673160] x17: 00000000b5de12fa x16: 00000000d2f9f891 x15: 00000000265a1517 [ 64.673655] x14: 000000009e9f7af5 x13: 00000000e29de636 x12: fffd800018171cc1 [ 64.674317] x11: 1ffe000018171cc0 x10: fffd800018171cc0 x9 : ffff91bcf9f8d63c [ 64.675102] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10 [ 64.675599] x5 : 0000000000000001 x4 : 1ffe000018bb5511 x3 : dfff800000000000 [ 64.675953] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.676293] Call trace: [ 64.676431] ext4_mb_release+0x394/0xaf8 (P) [ 64.677371] mbt_kunit_exit+0x9c/0x2c8 [ 64.677838] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.678389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.678975] kthread+0x328/0x630 [ 64.679373] ret_from_fork+0x10/0x20 [ 64.679811] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.680434] ---[ end trace 0000000000000000 ]--- [ 64.416159] Internal error: Oops: 0000000096000005 [#9] SMP [ 64.418556] Modules linked in: [ 64.418980] CPU: 1 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.419999] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.421026] Hardware name: linux,dummy-virt (DT) [ 64.421495] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.422144] pc : ext4_mb_release+0x394/0xaf8 [ 64.422610] lr : ext4_mb_release+0x37c/0xaf8 [ 64.423048] sp : ffff800080c17c50 [ 64.423414] x29: ffff800080c17c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.424164] x26: fff00000c78fe000 x25: fff00000cc98c740 x24: 1ffe0000199318e8 [ 64.425053] x23: fffd8000199318e8 x22: fff00000cc98c618 x21: 1ffe0000199318c3 [ 64.425420] x20: 0000000000000000 x19: fff00000cc98c400 x18: 0000000022f900e8 [ 64.425767] x17: 0000000000000000 x16: fff00000da46cda8 x15: 000000005c4c9699 [ 64.426128] x14: 00000000f58b03fe x13: 1ffe00001919e514 x12: fffd800019734f01 [ 64.426591] x11: 1ffe000019734f00 x10: fffd800019734f00 x9 : ffff91bcf9f8d63c [ 64.427042] x8 : ffff800080c179f8 x7 : 0000000000000001 x6 : ffff800080c17b10 [ 64.427474] x5 : 0000000000000001 x4 : 1ffe0000193d9289 x3 : dfff800000000000 [ 64.427929] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.428358] Call trace: [ 64.429030] ext4_mb_release+0x394/0xaf8 (P) [ 64.429344] mbt_kunit_exit+0x9c/0x2c8 [ 64.429560] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.429864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.430149] kthread+0x328/0x630 [ 64.430385] ret_from_fork+0x10/0x20 [ 64.430646] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.430994] ---[ end trace 0000000000000000 ]--- [ 64.601443] Internal error: Oops: 0000000096000005 [#15] SMP [ 64.605291] Modules linked in: [ 64.605673] CPU: 1 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.606844] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.607400] Hardware name: linux,dummy-virt (DT) [ 64.607969] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.608702] pc : ext4_mb_release+0x394/0xaf8 [ 64.609265] lr : ext4_mb_release+0x37c/0xaf8 [ 64.609729] sp : ffff800080c27c50 [ 64.610111] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.610915] x26: fff00000c627e000 x25: fff00000c85ea740 x24: 1ffe0000190bd4e8 [ 64.611721] x23: fffd8000190bd4e8 x22: fff00000c85ea618 x21: 1ffe0000190bd4c3 [ 64.612463] x20: 0000000000000000 x19: fff00000c85ea400 x18: 00000000894b06cc [ 64.613356] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000060245e46 [ 64.614115] x14: 00000000f1f1f1f1 x13: 1ffe00001919e514 x12: fffd800019734781 [ 64.614865] x11: 1ffe000019734780 x10: fffd800019734780 x9 : ffff91bcf9f8d63c [ 64.615601] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10 [ 64.616336] x5 : 0000000000000001 x4 : 1ffe000018c8dca9 x3 : dfff800000000000 [ 64.617219] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.618136] Call trace: [ 64.618454] ext4_mb_release+0x394/0xaf8 (P) [ 64.618919] mbt_kunit_exit+0x9c/0x2c8 [ 64.619304] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.619527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.619770] kthread+0x328/0x630 [ 64.620022] ret_from_fork+0x10/0x20 [ 64.620421] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.621023] ---[ end trace 0000000000000000 ]--- [ 64.291136] Internal error: Oops: 0000000096000005 [#5] SMP [ 64.294545] Modules linked in: [ 64.294844] CPU: 0 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.295470] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.295761] Hardware name: linux,dummy-virt (DT) [ 64.296039] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.296485] pc : ext4_mb_release+0x394/0xaf8 [ 64.296779] lr : ext4_mb_release+0x37c/0xaf8 [ 64.297098] sp : ffff800080bc7c50 [ 64.297347] x29: ffff800080bc7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.297807] x26: fff00000c78f8000 x25: fff00000c9996740 x24: 1ffe000019332ce8 [ 64.298221] x23: fffd800019332ce8 x22: fff00000c9996618 x21: 1ffe000019332cc3 [ 64.298676] x20: 0000000000000000 x19: fff00000c9996400 x18: 000000007da7a042 [ 64.299133] x17: 0000000000000001 x16: fff00000da44ada8 x15: fff00000ff616b48 [ 64.299562] x14: 0000000000018fff x13: 1ffe00001919e4e4 x12: fffd80001923cd01 [ 64.300040] x11: 1ffe00001923cd00 x10: fffd80001923cd00 x9 : ffff91bcf9f8d63c [ 64.300480] x8 : ffff800080bc79f8 x7 : 0000000000000001 x6 : ffff800080bc7b10 [ 64.300963] x5 : 0000000000000001 x4 : 1ffe00001836d799 x3 : dfff800000000000 [ 64.301508] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.301914] Call trace: [ 64.302104] ext4_mb_release+0x394/0xaf8 (P) [ 64.302403] mbt_kunit_exit+0x9c/0x2c8 [ 64.302657] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.302961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.303290] kthread+0x328/0x630 [ 64.303519] ret_from_fork+0x10/0x20 [ 64.303729] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.304139] ---[ end trace 0000000000000000 ]--- [ 64.260760] Internal error: Oops: 0000000096000005 [#4] SMP [ 64.268893] Modules linked in: [ 64.270203] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.271419] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.272150] Hardware name: linux,dummy-virt (DT) [ 64.273013] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.273490] pc : ext4_mb_release+0x394/0xaf8 [ 64.273727] lr : ext4_mb_release+0x37c/0xaf8 [ 64.273944] sp : ffff800080bf7c50 [ 64.274105] x29: ffff800080bf7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.274561] x26: fff00000c1504000 x25: fff00000c9994740 x24: 1ffe0000193328e8 [ 64.275030] x23: fffd8000193328e8 x22: fff00000c9994618 x21: 1ffe0000193328c3 [ 64.275450] x20: 0000000000000000 x19: fff00000c9994400 x18: 1ffff2379f872c2e [ 64.275866] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007 [ 64.276328] x14: 0000000000000000 x13: 1ffe00001919e514 x12: fffd800018c6f9a1 [ 64.276733] x11: 1ffe000018c6f9a0 x10: fffd800018c6f9a0 x9 : ffff91bcf9f8d63c [ 64.277364] x8 : ffff800080bf79f8 x7 : 0000000000000001 x6 : ffff800080bf7b10 [ 64.277805] x5 : 0000000000000001 x4 : 1ffe000018c7a289 x3 : dfff800000000000 [ 64.278257] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.278673] Call trace: [ 64.278834] ext4_mb_release+0x394/0xaf8 (P) [ 64.279339] mbt_kunit_exit+0x9c/0x2c8 [ 64.279572] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.279843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.280172] kthread+0x328/0x630 [ 64.280406] ret_from_fork+0x10/0x20 [ 64.280637] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.281140] ---[ end trace 0000000000000000 ]--- [ 108.362544] Internal error: Oops: 0000000096000005 [#21] SMP [ 108.368673] Modules linked in: [ 108.369301] CPU: 0 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 108.370793] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 108.371048] Hardware name: linux,dummy-virt (DT) [ 108.371244] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.371513] pc : ext4_mb_release+0x394/0xaf8 [ 108.371727] lr : ext4_mb_release+0x37c/0xaf8 [ 108.371934] sp : ffff800080c27c50 [ 108.372165] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000 [ 108.373513] x26: fff00000c71a0000 x25: fff00000cb2b4740 x24: 1ffe0000196568e8 [ 108.374373] x23: fffd8000196568e8 x22: fff00000cb2b4618 x21: 1ffe0000196568c3 [ 108.375143] x20: 0000000000000000 x19: fff00000cb2b4400 x18: 0000000020abc2d8 [ 108.375917] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000cceedc1b [ 108.376701] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800019734b81 [ 108.377684] x11: 1ffe000019734b80 x10: fffd800019734b80 x9 : ffff91bcf9f8d63c [ 108.378571] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10 [ 108.379159] x5 : 0000000000000001 x4 : 1ffe000018bb5ca9 x3 : dfff800000000000 [ 108.379507] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 108.379845] Call trace: [ 108.380005] ext4_mb_release+0x394/0xaf8 (P) [ 108.380283] mbt_kunit_exit+0x9c/0x2c8 [ 108.380519] kunit_try_run_case_cleanup+0x9c/0xe0 [ 108.380968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.381461] kthread+0x328/0x630 [ 108.381655] ret_from_fork+0x10/0x20 [ 108.381857] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 108.382147] ---[ end trace 0000000000000000 ]--- [ 64.573370] Internal error: Oops: 0000000096000005 [#14] SMP [ 64.579334] Modules linked in: [ 64.579714] CPU: 1 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.580929] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.581631] Hardware name: linux,dummy-virt (DT) [ 64.582055] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.582844] pc : ext4_mb_release+0x394/0xaf8 [ 64.583107] lr : ext4_mb_release+0x37c/0xaf8 [ 64.583339] sp : ffff800080c37c50 [ 64.583498] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.583864] x26: fff00000c627b000 x25: fff00000c5914740 x24: 1ffe000018b228e8 [ 64.584327] x23: fffd800018b228e8 x22: fff00000c5914618 x21: 1ffe000018b228c3 [ 64.584741] x20: 0000000000000000 x19: fff00000c5914400 x18: 00000000a7ced754 [ 64.585199] x17: 000000009bbffb31 x16: fff00000c1ba9c3c x15: 00000000e8b9bfd5 [ 64.585639] x14: 000000006730a5c3 x13: 1ffe00001b4895dd x12: fffd800018171fc1 [ 64.586490] x11: 1ffe000018171fc0 x10: fffd800018171fc0 x9 : ffff91bcf9f8d63c [ 64.586926] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10 [ 64.587388] x5 : 0000000000000001 x4 : 1ffe000018c13ca9 x3 : dfff800000000000 [ 64.588122] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.589026] Call trace: [ 64.589319] ext4_mb_release+0x394/0xaf8 (P) [ 64.589549] mbt_kunit_exit+0x9c/0x2c8 [ 64.590250] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.590752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.591327] kthread+0x328/0x630 [ 64.591607] ret_from_fork+0x10/0x20 [ 64.591814] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.592342] ---[ end trace 0000000000000000 ]--- [ 64.689175] Internal error: Oops: 0000000096000005 [#18] SMP [ 64.693679] Modules linked in: [ 64.694101] CPU: 0 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.695419] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.696025] Hardware name: linux,dummy-virt (DT) [ 64.696526] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.697320] pc : ext4_mb_release+0x394/0xaf8 [ 64.697912] lr : ext4_mb_release+0x37c/0xaf8 [ 64.698453] sp : ffff800080c47c50 [ 64.698825] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.699603] x26: fff00000c63c2000 x25: fff00000c7fc0740 x24: 1ffe000018ff80e8 [ 64.700226] x23: fffd800018ff80e8 x22: fff00000c7fc0618 x21: 1ffe000018ff80c3 [ 64.700600] x20: 0000000000000000 x19: fff00000c7fc0400 x18: 1ffff2379f872c2e [ 64.701550] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007 [ 64.701953] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800019734d01 [ 64.702301] x11: 1ffe000019734d00 x10: fffd800019734d00 x9 : ffff91bcf9f8d63c [ 64.702650] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10 [ 64.703174] x5 : 0000000000000001 x4 : 1ffe000018bb5799 x3 : dfff800000000000 [ 64.703956] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.704748] Call trace: [ 64.705055] ext4_mb_release+0x394/0xaf8 (P) [ 64.705529] mbt_kunit_exit+0x9c/0x2c8 [ 64.705961] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.706487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.707059] kthread+0x328/0x630 [ 64.707432] ret_from_fork+0x10/0x20 [ 64.707867] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.708464] ---[ end trace 0000000000000000 ]--- [ 64.314677] Internal error: Oops: 0000000096000005 [#6] SMP [ 64.320805] Modules linked in: [ 64.321660] CPU: 0 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.323274] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.324165] Hardware name: linux,dummy-virt (DT) [ 64.324808] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.325188] pc : ext4_mb_release+0x394/0xaf8 [ 64.325421] lr : ext4_mb_release+0x37c/0xaf8 [ 64.325625] sp : ffff800080b87c50 [ 64.325781] x29: ffff800080b87c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.326330] x26: fff00000c1052000 x25: fff00000c78f6740 x24: 1ffe000018f1ece8 [ 64.327130] x23: fffd800018f1ece8 x22: fff00000c78f6618 x21: 1ffe000018f1ecc3 [ 64.327876] x20: 0000000000000000 x19: fff00000c78f6400 x18: 1ffff2379f872c2e [ 64.328668] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007 [ 64.329564] x14: 0000000000000000 x13: 1ffe00001919e4e4 x12: fffd800018375581 [ 64.330323] x11: 1ffe000018375580 x10: fffd800018375580 x9 : ffff91bcf9f8d63c [ 64.331096] x8 : ffff800080b879f8 x7 : 0000000000000001 x6 : ffff800080b87b10 [ 64.331845] x5 : 0000000000000001 x4 : 1ffe0000193d9799 x3 : dfff800000000000 [ 64.332670] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.333478] Call trace: [ 64.333781] ext4_mb_release+0x394/0xaf8 (P) [ 64.334280] mbt_kunit_exit+0x9c/0x2c8 [ 64.334616] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.334843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.335087] kthread+0x328/0x630 [ 64.335262] ret_from_fork+0x10/0x20 [ 64.335461] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.335701] ---[ end trace 0000000000000000 ]--- [ 86.418000] Internal error: Oops: 0000000096000005 [#19] SMP [ 86.422129] Modules linked in: [ 86.422548] CPU: 1 UID: 0 PID: 417 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 86.423601] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 86.424260] Hardware name: linux,dummy-virt (DT) [ 86.424774] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 86.425374] pc : ext4_mb_release+0x394/0xaf8 [ 86.425607] lr : ext4_mb_release+0x37c/0xaf8 [ 86.425891] sp : ffff800080c17c50 [ 86.426241] x29: ffff800080c17c60 x28: dfff800000000000 x27: 0000000000000000 [ 86.426989] x26: fff00000c450c000 x25: fff00000c10fc740 x24: 1ffe00001821f8e8 [ 86.427722] x23: fffd80001821f8e8 x22: fff00000c10fc618 x21: 1ffe00001821f8c3 [ 86.428091] x20: 0000000000000000 x19: fff00000c10fc400 x18: fff00000c99fc800 [ 86.428433] x17: 0000000000000001 x16: fff00000da46cda8 x15: 1ffe00001933f90f [ 86.428843] x14: 00000000f1f1f1f1 x13: 1ffe00001919e514 x12: fffd800019748781 [ 86.429291] x11: 1ffe000019748780 x10: fffd800019748780 x9 : ffff91bcf9f8d63c [ 86.429689] x8 : ffff800080c179f8 x7 : 0000000000000001 x6 : ffff800080c17b10 [ 86.430127] x5 : 0000000000000001 x4 : 1ffe000018e37289 x3 : dfff800000000000 [ 86.430520] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 86.431009] Call trace: [ 86.431296] ext4_mb_release+0x394/0xaf8 (P) [ 86.431739] mbt_kunit_exit+0x9c/0x2c8 [ 86.432153] kunit_try_run_case_cleanup+0x9c/0xe0 [ 86.432631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.433199] kthread+0x328/0x630 [ 86.433557] ret_from_fork+0x10/0x20 [ 86.433981] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 86.434559] ---[ end trace 0000000000000000 ]--- [ 64.199033] Internal error: Oops: 0000000096000005 [#2] SMP [ 64.202841] Modules linked in: [ 64.203342] CPU: 1 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.204646] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.205424] Hardware name: linux,dummy-virt (DT) [ 64.206083] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.206957] pc : ext4_mb_release+0x394/0xaf8 [ 64.207557] lr : ext4_mb_release+0x37c/0xaf8 [ 64.208070] sp : ffff800080bd7c50 [ 64.208462] x29: ffff800080bd7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.209284] x26: fff00000c1bc3000 x25: fff00000cb2ee740 x24: 1ffe00001965dce8 [ 64.210104] x23: fffd80001965dce8 x22: fff00000cb2ee618 x21: 1ffe00001965dcc3 [ 64.210934] x20: 0000000000000000 x19: fff00000cb2ee400 x18: 00000000a1898bd5 [ 64.211283] x17: 0000000000000001 x16: fff00000da46cda8 x15: 000000009cf0791d [ 64.211623] x14: 00000000715751ab x13: 1ffe00001919e514 x12: fffd800018171e81 [ 64.212084] x11: 1ffe000018171e80 x10: fffd800018171e80 x9 : ffff91bcf9f8d63c [ 64.213093] x8 : ffff800080bd79f8 x7 : 0000000000000001 x6 : ffff800080bd7b10 [ 64.213941] x5 : 0000000000000001 x4 : 1ffe000018c7a799 x3 : dfff800000000000 [ 64.214685] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.215176] Call trace: [ 64.215322] ext4_mb_release+0x394/0xaf8 (P) [ 64.215546] mbt_kunit_exit+0x9c/0x2c8 [ 64.215735] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.215975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.216279] kthread+0x328/0x630 [ 64.216541] ret_from_fork+0x10/0x20 [ 64.216812] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.217246] ---[ end trace 0000000000000000 ]--- [ 64.227566] Internal error: Oops: 0000000096000005 [#3] SMP [ 64.233177] Modules linked in: [ 64.233583] CPU: 1 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.234561] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.235027] Hardware name: linux,dummy-virt (DT) [ 64.235582] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.236652] pc : ext4_mb_release+0x394/0xaf8 [ 64.237168] lr : ext4_mb_release+0x37c/0xaf8 [ 64.237494] sp : ffff800080be7c50 [ 64.237894] x29: ffff800080be7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.238626] x26: fff00000c1bc7000 x25: fff00000c78f4740 x24: 1ffe000018f1e8e8 [ 64.239092] x23: fffd800018f1e8e8 x22: fff00000c78f4618 x21: 1ffe000018f1e8c3 [ 64.239455] x20: 0000000000000000 x19: fff00000c78f4400 x18: 1ffff2379f872c2e [ 64.239788] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007 [ 64.240737] x14: 0000000000000000 x13: 1ffe00001919e514 x12: fffd800018375681 [ 64.241655] x11: 1ffe000018375680 x10: fffd800018375680 x9 : ffff91bcf9f8d63c [ 64.242436] x8 : ffff800080be79f8 x7 : 0000000000000001 x6 : ffff800080be7b10 [ 64.243196] x5 : 0000000000000001 x4 : 1ffe000018c7aa21 x3 : dfff800000000000 [ 64.243955] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.244765] Call trace: [ 64.245119] ext4_mb_release+0x394/0xaf8 (P) [ 64.245654] mbt_kunit_exit+0x9c/0x2c8 [ 64.246187] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.246844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.247447] kthread+0x328/0x630 [ 64.247830] ret_from_fork+0x10/0x20 [ 64.248271] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.248754] ---[ end trace 0000000000000000 ]--- [ 64.507142] Internal error: Oops: 0000000096000005 [#12] SMP [ 64.513884] Modules linked in: [ 64.514326] CPU: 0 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.515363] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.515924] Hardware name: linux,dummy-virt (DT) [ 64.516351] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.517259] pc : ext4_mb_release+0x394/0xaf8 [ 64.517537] lr : ext4_mb_release+0x37c/0xaf8 [ 64.517917] sp : ffff800080c17c50 [ 64.518115] x29: ffff800080c17c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.518545] x26: fff00000cc90c000 x25: fff00000c7fb8740 x24: 1ffe000018ff70e8 [ 64.519055] x23: fffd800018ff70e8 x22: fff00000c7fb8618 x21: 1ffe000018ff70c3 [ 64.519494] x20: 0000000000000000 x19: fff00000c7fb8400 x18: 00000000f67cae9f [ 64.519919] x17: 0000000000000001 x16: fff00000da44ada8 x15: fff00000ff616b48 [ 64.520320] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800019734e01 [ 64.521411] x11: 1ffe000019734e00 x10: fffd800019734e00 x9 : ffff91bcf9f8d63c [ 64.521842] x8 : ffff800080c179f8 x7 : 0000000000000001 x6 : ffff800080c17b10 [ 64.522311] x5 : 0000000000000001 x4 : 1ffe000018c13289 x3 : dfff800000000000 [ 64.522762] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.523204] Call trace: [ 64.523383] ext4_mb_release+0x394/0xaf8 (P) [ 64.523668] mbt_kunit_exit+0x9c/0x2c8 [ 64.523929] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.524217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.524765] kthread+0x328/0x630 [ 64.525035] ret_from_fork+0x10/0x20 [ 64.525321] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.525652] ---[ end trace 0000000000000000 ]--- [ 108.334646] Internal error: Oops: 0000000096000005 [#20] SMP [ 108.340404] Modules linked in: [ 108.342835] CPU: 1 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 108.343516] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 108.343763] Hardware name: linux,dummy-virt (DT) [ 108.344074] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.344676] pc : ext4_mb_release+0x394/0xaf8 [ 108.345203] lr : ext4_mb_release+0x37c/0xaf8 [ 108.345422] sp : ffff800080c57c50 [ 108.345584] x29: ffff800080c57c60 x28: dfff800000000000 x27: 0000000000000000 [ 108.345955] x26: fff00000c63c5000 x25: fff00000c7fc2740 x24: 1ffe000018ff84e8 [ 108.346388] x23: fffd800018ff84e8 x22: fff00000c7fc2618 x21: 1ffe000018ff84c3 [ 108.346781] x20: 0000000000000000 x19: fff00000c7fc2400 x18: 0000000040717167 [ 108.347409] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000043a49260 [ 108.347829] x14: 00000000a33a4d49 x13: 1ffe00001919e514 x12: fffd80001923cd81 [ 108.348180] x11: 1ffe00001923cd80 x10: fffd80001923cd80 x9 : ffff91bcf9f8d63c [ 108.348614] x8 : ffff800080c579f8 x7 : 0000000000000001 x6 : ffff800080c57b10 [ 108.349599] x5 : 0000000000000001 x4 : 1ffe000018e37799 x3 : dfff800000000000 [ 108.350409] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 108.351149] Call trace: [ 108.351431] ext4_mb_release+0x394/0xaf8 (P) [ 108.351875] mbt_kunit_exit+0x9c/0x2c8 [ 108.352265] kunit_try_run_case_cleanup+0x9c/0xe0 [ 108.352489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.353094] kthread+0x328/0x630 [ 108.353761] ret_from_fork+0x10/0x20 [ 108.354193] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 108.354748] ---[ end trace 0000000000000000 ]--- [ 64.348625] Internal error: Oops: 0000000096000005 [#7] SMP [ 64.356040] Modules linked in: [ 64.356517] CPU: 0 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.357214] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.357878] Hardware name: linux,dummy-virt (DT) [ 64.358507] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.359324] pc : ext4_mb_release+0x394/0xaf8 [ 64.359846] lr : ext4_mb_release+0x37c/0xaf8 [ 64.360300] sp : ffff800080be7c50 [ 64.360641] x29: ffff800080be7c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.361510] x26: fff00000c78fb000 x25: fff00000cb2f6740 x24: 1ffe00001965ece8 [ 64.362024] x23: fffd80001965ece8 x22: fff00000cb2f6618 x21: 1ffe00001965ecc3 [ 64.362379] x20: 0000000000000000 x19: fff00000cb2f6400 x18: 1ffff2379f872c2e [ 64.362721] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007 [ 64.363352] x14: 00000000f1f1f1f1 x13: 1ffe00001919e4e4 x12: fffd800018c6f921 [ 64.364076] x11: 1ffe000018c6f920 x10: fffd800018c6f920 x9 : ffff91bcf9f8d63c [ 64.364917] x8 : ffff800080be79f8 x7 : 0000000000000001 x6 : ffff800080be7b10 [ 64.365663] x5 : 0000000000000001 x4 : 1ffe0000193d9001 x3 : dfff800000000000 [ 64.366398] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.367134] Call trace: [ 64.367409] ext4_mb_release+0x394/0xaf8 (P) [ 64.367863] mbt_kunit_exit+0x9c/0x2c8 [ 64.368270] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.368908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.369557] kthread+0x328/0x630 [ 64.370055] ret_from_fork+0x10/0x20 [ 64.370607] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.371236] ---[ end trace 0000000000000000 ]--- [ 64.633304] Internal error: Oops: 0000000096000005 [#16] SMP [ 64.637948] Modules linked in: [ 64.638217] CPU: 0 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.638799] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.639120] Hardware name: linux,dummy-virt (DT) [ 64.639369] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.639707] pc : ext4_mb_release+0x394/0xaf8 [ 64.639973] lr : ext4_mb_release+0x37c/0xaf8 [ 64.640187] sp : ffff800080c37c50 [ 64.640383] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.640728] x26: fff00000cc90f000 x25: fff00000c7fba740 x24: 1ffe000018ff74e8 [ 64.641072] x23: fffd800018ff74e8 x22: fff00000c7fba618 x21: 1ffe000018ff74c3 [ 64.641488] x20: 0000000000000000 x19: fff00000c7fba400 x18: 00000000ec96ac89 [ 64.641934] x17: 000000003535ad13 x16: fff00000c1baa03c x15: 0000000027eeea88 [ 64.642425] x14: 00000000f9c4cb08 x13: 1ffe00001b48d9dd x12: fffd8000187bb0a1 [ 64.644512] x11: 1ffe0000187bb0a0 x10: fffd8000187bb0a0 x9 : ffff91bcf9f8d63c [ 64.645807] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10 [ 64.646971] x5 : 0000000000000001 x4 : 1ffe000018c8d799 x3 : dfff800000000000 [ 64.647344] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.647688] Call trace: [ 64.647834] ext4_mb_release+0x394/0xaf8 (P) [ 64.648102] mbt_kunit_exit+0x9c/0x2c8 [ 64.648304] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.649394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.650132] kthread+0x328/0x630 [ 64.650686] ret_from_fork+0x10/0x20 [ 64.651153] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.651761] ---[ end trace 0000000000000000 ]--- [ 108.707246] Internal error: Oops: 0000000096000005 [#22] SMP [ 108.710824] Modules linked in: [ 108.711423] CPU: 0 UID: 0 PID: 565 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 108.712674] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 108.713401] Hardware name: linux,dummy-virt (DT) [ 108.714076] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.714931] pc : kunit_test_null_dereference+0x70/0x170 [ 108.715586] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.716223] sp : ffff800082027d30 [ 108.716817] x29: ffff800082027d90 x28: 0000000000000000 x27: 0000000000000000 [ 108.717844] x26: 1ffe000019747f01 x25: 0000000000000000 x24: 0000000000000004 [ 108.718612] x23: fff00000cba3f80c x22: ffff91bcf7848d30 x21: fff00000c3f05308 [ 108.719365] x20: 1ffff00010404fa6 x19: ffff800080087990 x18: 0000000032ef18e5 [ 108.719829] x17: 00000000eb8e1943 x16: 0000000056578d60 x15: 00000000c38541d9 [ 108.720177] x14: 000000009623875e x13: 00000000929d6e4f x12: fffd8000191ba11c [ 108.720516] x11: 1ffe0000191ba11b x10: fffd8000191ba11b x9 : ffff91bcf78404b8 [ 108.721399] x8 : ffff800082027c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 108.722418] x5 : ffff700010404fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 108.723153] x2 : dfff800000000000 x1 : fff00000c8dd0000 x0 : ffff800080087990 [ 108.723871] Call trace: [ 108.724177] kunit_test_null_dereference+0x70/0x170 (P) [ 108.724753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.725362] kthread+0x328/0x630 [ 108.725747] ret_from_fork+0x10/0x20 [ 108.726254] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 108.726867] ---[ end trace 0000000000000000 ]--- [ 64.539486] Internal error: Oops: 0000000096000005 [#13] SMP [ 64.547224] Modules linked in: [ 64.547462] CPU: 0 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 64.547890] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 64.549440] Hardware name: linux,dummy-virt (DT) [ 64.550244] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.551097] pc : ext4_mb_release+0x394/0xaf8 [ 64.551719] lr : ext4_mb_release+0x37c/0xaf8 [ 64.552307] sp : ffff800080c07c50 [ 64.552861] x29: ffff800080c07c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.553802] x26: fff00000c6278000 x25: fff00000c800c740 x24: 1ffe0000190018e8 [ 64.554184] x23: fffd8000190018e8 x22: fff00000c800c618 x21: 1ffe0000190018c3 [ 64.554538] x20: 0000000000000000 x19: fff00000c800c400 x18: 00000000929a660b [ 64.554877] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000b79efbfb [ 64.556022] x14: 00000000f9250858 x13: 1ffe00001919e4e4 x12: fffd800019748901 [ 64.557126] x11: 1ffe000019748900 x10: fffd800019748900 x9 : ffff91bcf9f8d63c [ 64.558163] x8 : ffff800080c079f8 x7 : 0000000000000001 x6 : ffff800080c07b10 [ 64.559165] x5 : 0000000000000001 x4 : 1ffe000018c13799 x3 : dfff800000000000 [ 64.560137] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.561281] Call trace: [ 64.562072] ext4_mb_release+0x394/0xaf8 (P) [ 64.562721] mbt_kunit_exit+0x9c/0x2c8 [ 64.563321] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.563590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.563835] kthread+0x328/0x630 [ 64.564025] ret_from_fork+0x10/0x20 [ 64.564235] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.564481] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 63.977784] ================================================================== [ 63.977882] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 63.977882] [ 63.977999] Use-after-free read at 0x00000000748a9655 (in kfence-#188): [ 63.978055] test_krealloc+0x51c/0x830 [ 63.978100] kunit_try_run_case+0x170/0x3f0 [ 63.978144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.978189] kthread+0x328/0x630 [ 63.978231] ret_from_fork+0x10/0x20 [ 63.978273] [ 63.978298] kfence-#188: 0x00000000748a9655-0x000000006ce6798a, size=32, cache=kmalloc-32 [ 63.978298] [ 63.978359] allocated by task 370 on cpu 0 at 63.976911s (0.001444s ago): [ 63.978428] test_alloc+0x29c/0x628 [ 63.978467] test_krealloc+0xc0/0x830 [ 63.978505] kunit_try_run_case+0x170/0x3f0 [ 63.978544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.978587] kthread+0x328/0x630 [ 63.978624] ret_from_fork+0x10/0x20 [ 63.978663] [ 63.978689] freed by task 370 on cpu 0 at 63.977195s (0.001490s ago): [ 63.978747] krealloc_noprof+0x148/0x360 [ 63.978784] test_krealloc+0x1dc/0x830 [ 63.978821] kunit_try_run_case+0x170/0x3f0 [ 63.978858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.978908] kthread+0x328/0x630 [ 63.978945] ret_from_fork+0x10/0x20 [ 63.978984] [ 63.979032] CPU: 0 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 63.979116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.979148] Hardware name: linux,dummy-virt (DT) [ 63.979185] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 63.889023] ================================================================== [ 63.889130] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.889130] [ 63.889229] Use-after-free read at 0x0000000027bff02d (in kfence-#187): [ 63.889286] test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.889336] kunit_try_run_case+0x170/0x3f0 [ 63.889381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.889426] kthread+0x328/0x630 [ 63.889466] ret_from_fork+0x10/0x20 [ 63.889508] [ 63.889533] kfence-#187: 0x0000000027bff02d-0x00000000857234c3, size=32, cache=test [ 63.889533] [ 63.889586] allocated by task 368 on cpu 1 at 63.872958s (0.016625s ago): [ 63.889655] test_alloc+0x230/0x628 [ 63.889695] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 63.889736] kunit_try_run_case+0x170/0x3f0 [ 63.889774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.889817] kthread+0x328/0x630 [ 63.889854] ret_from_fork+0x10/0x20 [ 63.889891] [ 63.889932] freed by task 368 on cpu 1 at 63.873086s (0.016843s ago): [ 63.889988] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 63.890029] kunit_try_run_case+0x170/0x3f0 [ 63.890067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.890109] kthread+0x328/0x630 [ 63.890146] ret_from_fork+0x10/0x20 [ 63.890184] [ 63.890231] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 63.890316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.890353] Hardware name: linux,dummy-virt (DT) [ 63.890387] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 41.216401] ================================================================== [ 41.216560] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 41.216560] [ 41.216664] Invalid read at 0x00000000ffb7c965: [ 41.216882] test_invalid_access+0xdc/0x1f0 [ 41.217889] kunit_try_run_case+0x170/0x3f0 [ 41.217978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.218030] kthread+0x328/0x630 [ 41.218078] ret_from_fork+0x10/0x20 [ 41.218297] [ 41.218364] CPU: 1 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 41.218720] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 41.218759] Hardware name: linux,dummy-virt (DT) [ 41.218801] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 40.985104] ================================================================== [ 40.985203] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.985203] [ 40.985268] Corrupted memory at 0x00000000039546ab [ ! . . . . . . . . . . . . . . . ] (in kfence-#181): [ 40.985580] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.985628] kunit_try_run_case+0x170/0x3f0 [ 40.985672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.985715] kthread+0x328/0x630 [ 40.985755] ret_from_fork+0x10/0x20 [ 40.985795] [ 40.985820] kfence-#181: 0x000000008efb0950-0x000000002df0f7f5, size=73, cache=kmalloc-96 [ 40.985820] [ 40.985876] allocated by task 358 on cpu 1 at 40.984844s (0.001028s ago): [ 40.985953] test_alloc+0x29c/0x628 [ 40.985992] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 40.986033] kunit_try_run_case+0x170/0x3f0 [ 40.986072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.986115] kthread+0x328/0x630 [ 40.986151] ret_from_fork+0x10/0x20 [ 40.986191] [ 40.986214] freed by task 358 on cpu 1 at 40.985008s (0.001202s ago): [ 40.986274] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.986315] kunit_try_run_case+0x170/0x3f0 [ 40.986359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.986404] kthread+0x328/0x630 [ 40.986439] ret_from_fork+0x10/0x20 [ 40.986477] [ 40.986523] CPU: 1 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 40.986607] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 40.986638] Hardware name: linux,dummy-virt (DT) [ 40.986671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 40.881247] ================================================================== [ 40.881354] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 40.881354] [ 40.881455] Out-of-bounds read at 0x00000000b14c1698 (105B right of kfence-#180): [ 40.881521] test_kmalloc_aligned_oob_read+0x238/0x468 [ 40.881572] kunit_try_run_case+0x170/0x3f0 [ 40.881618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.881665] kthread+0x328/0x630 [ 40.881707] ret_from_fork+0x10/0x20 [ 40.881750] [ 40.881776] kfence-#180: 0x00000000fc6b713b-0x00000000934bc69f, size=73, cache=kmalloc-96 [ 40.881776] [ 40.881832] allocated by task 356 on cpu 1 at 40.880985s (0.000843s ago): [ 40.881923] test_alloc+0x29c/0x628 [ 40.881966] test_kmalloc_aligned_oob_read+0x100/0x468 [ 40.882012] kunit_try_run_case+0x170/0x3f0 [ 40.882054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.882102] kthread+0x328/0x630 [ 40.882139] ret_from_fork+0x10/0x20 [ 40.882180] [ 40.882231] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 40.882320] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 40.882359] Hardware name: linux,dummy-virt (DT) [ 40.882397] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 36.617249] ================================================================== [ 36.617342] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 36.617342] [ 36.617403] Corrupted memory at 0x00000000b6c7afbb [ ! ] (in kfence-#139): [ 36.617520] test_corruption+0x1d8/0x378 [ 36.617565] kunit_try_run_case+0x170/0x3f0 [ 36.617611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.617655] kthread+0x328/0x630 [ 36.617693] ret_from_fork+0x10/0x20 [ 36.617734] [ 36.617759] kfence-#139: 0x00000000c3773b6d-0x00000000bdd64e83, size=32, cache=test [ 36.617759] [ 36.617815] allocated by task 346 on cpu 1 at 36.617114s (0.000697s ago): [ 36.617875] test_alloc+0x230/0x628 [ 36.617929] test_corruption+0x198/0x378 [ 36.617968] kunit_try_run_case+0x170/0x3f0 [ 36.618008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.618051] kthread+0x328/0x630 [ 36.618087] ret_from_fork+0x10/0x20 [ 36.618126] [ 36.618149] freed by task 346 on cpu 1 at 36.617161s (0.000984s ago): [ 36.618209] test_corruption+0x1d8/0x378 [ 36.618248] kunit_try_run_case+0x170/0x3f0 [ 36.618287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.618330] kthread+0x328/0x630 [ 36.618375] ret_from_fork+0x10/0x20 [ 36.618414] [ 36.618460] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 36.618540] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.618570] Hardware name: linux,dummy-virt (DT) [ 36.618603] ================================================================== [ 36.409302] ================================================================== [ 36.409400] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 36.409400] [ 36.409460] Corrupted memory at 0x00000000abf84d73 [ ! ] (in kfence-#137): [ 36.409592] test_corruption+0x284/0x378 [ 36.409639] kunit_try_run_case+0x170/0x3f0 [ 36.409681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.409726] kthread+0x328/0x630 [ 36.409765] ret_from_fork+0x10/0x20 [ 36.409804] [ 36.409828] kfence-#137: 0x00000000e58d51ae-0x00000000cd03b2f7, size=32, cache=kmalloc-32 [ 36.409828] [ 36.409886] allocated by task 344 on cpu 1 at 36.409013s (0.000869s ago): [ 36.409965] test_alloc+0x29c/0x628 [ 36.410004] test_corruption+0x198/0x378 [ 36.410043] kunit_try_run_case+0x170/0x3f0 [ 36.410082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.410125] kthread+0x328/0x630 [ 36.410161] ret_from_fork+0x10/0x20 [ 36.410200] [ 36.410223] freed by task 344 on cpu 1 at 36.409119s (0.001100s ago): [ 36.410283] test_corruption+0x284/0x378 [ 36.410321] kunit_try_run_case+0x170/0x3f0 [ 36.410365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.410409] kthread+0x328/0x630 [ 36.410446] ret_from_fork+0x10/0x20 [ 36.410485] [ 36.410533] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 36.410616] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.410648] Hardware name: linux,dummy-virt (DT) [ 36.410682] ================================================================== [ 36.513021] ================================================================== [ 36.513113] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 36.513113] [ 36.513174] Corrupted memory at 0x0000000011e10c81 [ ! . . . . . . . . . . . . . . . ] (in kfence-#138): [ 36.513486] test_corruption+0x120/0x378 [ 36.513530] kunit_try_run_case+0x170/0x3f0 [ 36.513575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.513617] kthread+0x328/0x630 [ 36.513657] ret_from_fork+0x10/0x20 [ 36.513699] [ 36.513722] kfence-#138: 0x0000000046850c56-0x00000000076387aa, size=32, cache=test [ 36.513722] [ 36.513776] allocated by task 346 on cpu 1 at 36.512862s (0.000911s ago): [ 36.513836] test_alloc+0x230/0x628 [ 36.513875] test_corruption+0xdc/0x378 [ 36.513929] kunit_try_run_case+0x170/0x3f0 [ 36.513968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.514011] kthread+0x328/0x630 [ 36.514046] ret_from_fork+0x10/0x20 [ 36.514083] [ 36.514108] freed by task 346 on cpu 1 at 36.512934s (0.001171s ago): [ 36.514168] test_corruption+0x120/0x378 [ 36.514204] kunit_try_run_case+0x170/0x3f0 [ 36.514243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.514286] kthread+0x328/0x630 [ 36.514321] ret_from_fork+0x10/0x20 [ 36.514365] [ 36.514410] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 36.514491] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.514523] Hardware name: linux,dummy-virt (DT) [ 36.514557] ================================================================== [ 36.097221] ================================================================== [ 36.097340] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 36.097340] [ 36.097408] Corrupted memory at 0x0000000035789ce5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#134): [ 36.097834] test_corruption+0x278/0x378 [ 36.097881] kunit_try_run_case+0x170/0x3f0 [ 36.097944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.097989] kthread+0x328/0x630 [ 36.098028] ret_from_fork+0x10/0x20 [ 36.098070] [ 36.098099] kfence-#134: 0x00000000a6b1368b-0x000000005cece796, size=32, cache=kmalloc-32 [ 36.098099] [ 36.098156] allocated by task 344 on cpu 1 at 36.096926s (0.001226s ago): [ 36.098220] test_alloc+0x29c/0x628 [ 36.098258] test_corruption+0xdc/0x378 [ 36.098296] kunit_try_run_case+0x170/0x3f0 [ 36.098336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.098385] kthread+0x328/0x630 [ 36.098421] ret_from_fork+0x10/0x20 [ 36.098460] [ 36.098483] freed by task 344 on cpu 1 at 36.097034s (0.001445s ago): [ 36.098541] test_corruption+0x278/0x378 [ 36.098577] kunit_try_run_case+0x170/0x3f0 [ 36.098616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.098658] kthread+0x328/0x630 [ 36.098695] ret_from_fork+0x10/0x20 [ 36.098734] [ 36.098779] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 36.098860] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.098892] Hardware name: linux,dummy-virt (DT) [ 36.098938] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 35.889008] ================================================================== [ 35.889100] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 35.889100] [ 35.889160] Invalid free of 0x00000000b0133952 (in kfence-#132): [ 35.889216] test_invalid_addr_free+0xec/0x238 [ 35.889260] kunit_try_run_case+0x170/0x3f0 [ 35.889305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.889347] kthread+0x328/0x630 [ 35.889385] ret_from_fork+0x10/0x20 [ 35.889425] [ 35.889450] kfence-#132: 0x00000000c4cd7fa6-0x000000007721b191, size=32, cache=test [ 35.889450] [ 35.889503] allocated by task 342 on cpu 1 at 35.888869s (0.000630s ago): [ 35.889563] test_alloc+0x230/0x628 [ 35.889604] test_invalid_addr_free+0xd4/0x238 [ 35.889644] kunit_try_run_case+0x170/0x3f0 [ 35.889684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.889728] kthread+0x328/0x630 [ 35.889764] ret_from_fork+0x10/0x20 [ 35.889803] [ 35.889848] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.889947] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.889979] Hardware name: linux,dummy-virt (DT) [ 35.890011] ================================================================== [ 35.785203] ================================================================== [ 35.785288] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 35.785288] [ 35.785347] Invalid free of 0x00000000fd00de05 (in kfence-#131): [ 35.785402] test_invalid_addr_free+0x1ac/0x238 [ 35.785449] kunit_try_run_case+0x170/0x3f0 [ 35.785494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.785536] kthread+0x328/0x630 [ 35.785574] ret_from_fork+0x10/0x20 [ 35.785616] [ 35.785639] kfence-#131: 0x00000000e880db90-0x00000000f999c545, size=32, cache=kmalloc-32 [ 35.785639] [ 35.785693] allocated by task 340 on cpu 1 at 35.785067s (0.000623s ago): [ 35.785755] test_alloc+0x29c/0x628 [ 35.785794] test_invalid_addr_free+0xd4/0x238 [ 35.785832] kunit_try_run_case+0x170/0x3f0 [ 35.785871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.785928] kthread+0x328/0x630 [ 35.785965] ret_from_fork+0x10/0x20 [ 35.786003] [ 35.786048] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.786133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.786166] Hardware name: linux,dummy-virt (DT) [ 35.786198] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 35.580348] ================================================================== [ 35.580472] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 35.580472] [ 35.581207] Invalid free of 0x00000000d08afd28 (in kfence-#129): [ 35.581422] test_double_free+0x1bc/0x238 [ 35.581615] kunit_try_run_case+0x170/0x3f0 [ 35.581871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.582021] kthread+0x328/0x630 [ 35.582070] ret_from_fork+0x10/0x20 [ 35.582114] [ 35.582364] kfence-#129: 0x00000000d08afd28-0x00000000667cc3dc, size=32, cache=kmalloc-32 [ 35.582364] [ 35.582467] allocated by task 336 on cpu 1 at 35.579535s (0.002927s ago): [ 35.582786] test_alloc+0x29c/0x628 [ 35.582907] test_double_free+0xd4/0x238 [ 35.582987] kunit_try_run_case+0x170/0x3f0 [ 35.583033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.583290] kthread+0x328/0x630 [ 35.583782] ret_from_fork+0x10/0x20 [ 35.583876] [ 35.584401] freed by task 336 on cpu 1 at 35.579918s (0.004461s ago): [ 35.584810] test_double_free+0x1ac/0x238 [ 35.584861] kunit_try_run_case+0x170/0x3f0 [ 35.584916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.584986] kthread+0x328/0x630 [ 35.585024] ret_from_fork+0x10/0x20 [ 35.585357] [ 35.585507] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.586199] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.586294] Hardware name: linux,dummy-virt (DT) [ 35.586613] ================================================================== [ 35.682522] ================================================================== [ 35.682922] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 35.682922] [ 35.683232] Invalid free of 0x00000000466e04fa (in kfence-#130): [ 35.683388] test_double_free+0x100/0x238 [ 35.683462] kunit_try_run_case+0x170/0x3f0 [ 35.683507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.683815] kthread+0x328/0x630 [ 35.684179] ret_from_fork+0x10/0x20 [ 35.684252] [ 35.684278] kfence-#130: 0x00000000466e04fa-0x00000000646e99dc, size=32, cache=test [ 35.684278] [ 35.684378] allocated by task 338 on cpu 1 at 35.682272s (0.002074s ago): [ 35.684463] test_alloc+0x230/0x628 [ 35.684796] test_double_free+0xd4/0x238 [ 35.684957] kunit_try_run_case+0x170/0x3f0 [ 35.685086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.685137] kthread+0x328/0x630 [ 35.685443] ret_from_fork+0x10/0x20 [ 35.685608] [ 35.685700] freed by task 338 on cpu 1 at 35.682345s (0.003334s ago): [ 35.685869] test_double_free+0xf0/0x238 [ 35.685927] kunit_try_run_case+0x170/0x3f0 [ 35.685997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.686386] kthread+0x328/0x630 [ 35.686744] ret_from_fork+0x10/0x20 [ 35.686851] [ 35.686914] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.687314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.687383] Hardware name: linux,dummy-virt (DT) [ 35.687602] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 35.261569] ================================================================== [ 35.261649] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.261649] [ 35.261741] Use-after-free read at 0x00000000404d1b9d (in kfence-#126): [ 35.261816] test_use_after_free_read+0x114/0x248 [ 35.261894] kunit_try_run_case+0x170/0x3f0 [ 35.262052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262098] kthread+0x328/0x630 [ 35.262138] ret_from_fork+0x10/0x20 [ 35.262307] [ 35.262509] kfence-#126: 0x00000000404d1b9d-0x00000000d618dd20, size=32, cache=test [ 35.262509] [ 35.262616] allocated by task 330 on cpu 1 at 35.261338s (0.001267s ago): [ 35.262698] test_alloc+0x230/0x628 [ 35.262741] test_use_after_free_read+0xd0/0x248 [ 35.262817] kunit_try_run_case+0x170/0x3f0 [ 35.262860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262917] kthread+0x328/0x630 [ 35.262977] ret_from_fork+0x10/0x20 [ 35.263108] [ 35.263239] freed by task 330 on cpu 1 at 35.261402s (0.001726s ago): [ 35.263387] test_use_after_free_read+0xf0/0x248 [ 35.263516] kunit_try_run_case+0x170/0x3f0 [ 35.263661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.263716] kthread+0x328/0x630 [ 35.263752] ret_from_fork+0x10/0x20 [ 35.263792] [ 35.264029] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.264150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.264184] Hardware name: linux,dummy-virt (DT) [ 35.264253] ================================================================== [ 35.154045] ================================================================== [ 35.154147] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.154147] [ 35.154442] Use-after-free read at 0x00000000efd0f0b6 (in kfence-#125): [ 35.154562] test_use_after_free_read+0x114/0x248 [ 35.154634] kunit_try_run_case+0x170/0x3f0 [ 35.154700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.154754] kthread+0x328/0x630 [ 35.154794] ret_from_fork+0x10/0x20 [ 35.155035] [ 35.155123] kfence-#125: 0x00000000efd0f0b6-0x0000000069a2a49e, size=32, cache=kmalloc-32 [ 35.155123] [ 35.155208] allocated by task 328 on cpu 1 at 35.153687s (0.001499s ago): [ 35.155311] test_alloc+0x29c/0x628 [ 35.155369] test_use_after_free_read+0xd0/0x248 [ 35.155443] kunit_try_run_case+0x170/0x3f0 [ 35.155491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.155537] kthread+0x328/0x630 [ 35.155574] ret_from_fork+0x10/0x20 [ 35.155906] [ 35.156131] freed by task 328 on cpu 1 at 35.153789s (0.002240s ago): [ 35.156292] test_use_after_free_read+0x1c0/0x248 [ 35.156350] kunit_try_run_case+0x170/0x3f0 [ 35.156393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.156673] kthread+0x328/0x630 [ 35.156732] ret_from_fork+0x10/0x20 [ 35.156797] [ 35.156926] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.157056] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.157108] Hardware name: linux,dummy-virt (DT) [ 35.157481] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 34.842949] ================================================================== [ 34.843054] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.843054] [ 34.843531] Out-of-bounds write at 0x00000000f5ecaf6b (1B left of kfence-#122): [ 34.843601] test_out_of_bounds_write+0x100/0x240 [ 34.843886] kunit_try_run_case+0x170/0x3f0 [ 34.844087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.844147] kthread+0x328/0x630 [ 34.844215] ret_from_fork+0x10/0x20 [ 34.844554] [ 34.844635] kfence-#122: 0x00000000912abb84-0x000000007c600b57, size=32, cache=kmalloc-32 [ 34.844635] [ 34.845001] allocated by task 324 on cpu 1 at 34.842707s (0.002289s ago): [ 34.845080] test_alloc+0x29c/0x628 [ 34.845120] test_out_of_bounds_write+0xc8/0x240 [ 34.845171] kunit_try_run_case+0x170/0x3f0 [ 34.845223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.845271] kthread+0x328/0x630 [ 34.845323] ret_from_fork+0x10/0x20 [ 34.845398] [ 34.845446] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 34.845559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.845594] Hardware name: linux,dummy-virt (DT) [ 34.845638] ================================================================== [ 35.049531] ================================================================== [ 35.049620] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.049620] [ 35.049720] Out-of-bounds write at 0x0000000032578aae (1B left of kfence-#124): [ 35.049805] test_out_of_bounds_write+0x100/0x240 [ 35.049874] kunit_try_run_case+0x170/0x3f0 [ 35.049937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.049984] kthread+0x328/0x630 [ 35.050033] ret_from_fork+0x10/0x20 [ 35.050300] [ 35.050377] kfence-#124: 0x00000000c4e843bb-0x0000000004268b7a, size=32, cache=test [ 35.050377] [ 35.050524] allocated by task 326 on cpu 1 at 35.049156s (0.001356s ago): [ 35.050617] test_alloc+0x230/0x628 [ 35.050681] test_out_of_bounds_write+0xc8/0x240 [ 35.050753] kunit_try_run_case+0x170/0x3f0 [ 35.050797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.050856] kthread+0x328/0x630 [ 35.050924] ret_from_fork+0x10/0x20 [ 35.050997] [ 35.051042] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 35.051154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.051188] Hardware name: linux,dummy-virt (DT) [ 35.051502] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 34.419186] ================================================================== [ 34.419275] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.419275] [ 34.419654] Out-of-bounds read at 0x000000009bb3491f (1B left of kfence-#118): [ 34.419807] test_out_of_bounds_read+0x114/0x3e0 [ 34.419865] kunit_try_run_case+0x170/0x3f0 [ 34.420186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.420556] kthread+0x328/0x630 [ 34.420661] ret_from_fork+0x10/0x20 [ 34.420715] [ 34.420740] kfence-#118: 0x000000001491221a-0x00000000d9032223, size=32, cache=test [ 34.420740] [ 34.421126] allocated by task 322 on cpu 1 at 34.418632s (0.002416s ago): [ 34.421508] test_alloc+0x230/0x628 [ 34.421683] test_out_of_bounds_read+0xdc/0x3e0 [ 34.422038] kunit_try_run_case+0x170/0x3f0 [ 34.422152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.422231] kthread+0x328/0x630 [ 34.422305] ret_from_fork+0x10/0x20 [ 34.422579] [ 34.422958] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 34.423149] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.423296] Hardware name: linux,dummy-virt (DT) [ 34.423341] ================================================================== [ 34.102228] ================================================================== [ 34.102318] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.102318] [ 34.102462] Out-of-bounds read at 0x00000000fc1ad20c (1B left of kfence-#115): [ 34.102592] test_out_of_bounds_read+0x114/0x3e0 [ 34.102674] kunit_try_run_case+0x170/0x3f0 [ 34.102724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.102782] kthread+0x328/0x630 [ 34.102822] ret_from_fork+0x10/0x20 [ 34.103003] [ 34.103032] kfence-#115: 0x000000004eecf4f5-0x00000000acfa2ca1, size=32, cache=kmalloc-32 [ 34.103032] [ 34.103097] allocated by task 320 on cpu 1 at 34.101627s (0.001467s ago): [ 34.103309] test_alloc+0x29c/0x628 [ 34.104831] test_out_of_bounds_read+0xdc/0x3e0 [ 34.104920] kunit_try_run_case+0x170/0x3f0 [ 34.104966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.105014] kthread+0x328/0x630 [ 34.105050] ret_from_fork+0x10/0x20 [ 34.105092] [ 34.105143] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 34.105245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.105281] Hardware name: linux,dummy-virt (DT) [ 34.105319] ================================================================== [ 34.209338] ================================================================== [ 34.209424] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.209424] [ 34.209505] Out-of-bounds read at 0x000000009ac86b1e (32B right of kfence-#116): [ 34.209770] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.209831] kunit_try_run_case+0x170/0x3f0 [ 34.209875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.209934] kthread+0x328/0x630 [ 34.209991] ret_from_fork+0x10/0x20 [ 34.210036] [ 34.210062] kfence-#116: 0x0000000076e21990-0x0000000025b1ee47, size=32, cache=kmalloc-32 [ 34.210062] [ 34.210146] allocated by task 320 on cpu 1 at 34.209101s (0.001034s ago): [ 34.210227] test_alloc+0x29c/0x628 [ 34.210268] test_out_of_bounds_read+0x198/0x3e0 [ 34.210560] kunit_try_run_case+0x170/0x3f0 [ 34.210621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.210717] kthread+0x328/0x630 [ 34.210754] ret_from_fork+0x10/0x20 [ 34.210811] [ 34.210881] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 34.211263] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.211317] Hardware name: linux,dummy-virt (DT) [ 34.211354] ================================================================== [ 34.526279] ================================================================== [ 34.526376] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.526376] [ 34.526617] Out-of-bounds read at 0x00000000c600cfc6 (32B right of kfence-#119): [ 34.526817] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.526881] kunit_try_run_case+0x170/0x3f0 [ 34.526946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.526993] kthread+0x328/0x630 [ 34.527030] ret_from_fork+0x10/0x20 [ 34.527069] [ 34.527120] kfence-#119: 0x0000000006ec61e2-0x00000000bb4a1c87, size=32, cache=test [ 34.527120] [ 34.527187] allocated by task 322 on cpu 1 at 34.525985s (0.001191s ago): [ 34.527259] test_alloc+0x230/0x628 [ 34.527298] test_out_of_bounds_read+0x198/0x3e0 [ 34.527339] kunit_try_run_case+0x170/0x3f0 [ 34.527380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.527434] kthread+0x328/0x630 [ 34.527472] ret_from_fork+0x10/0x20 [ 34.527510] [ 34.527554] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 34.527643] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.527676] Hardware name: linux,dummy-virt (DT) [ 34.527710] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-kmalloc_node_oob_right
[ 30.059240] ================================================================== [ 30.059342] BUG: KFENCE: out-of-bounds read in kmalloc_node_oob_right+0x160/0x330 [ 30.059342] [ 30.059440] Out-of-bounds read at 0x00000000d889b2dd (4096B right of kfence-#90): [ 30.059636] kmalloc_node_oob_right+0x160/0x330 [ 30.059682] kunit_try_run_case+0x170/0x3f0 [ 30.059721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.059762] kthread+0x328/0x630 [ 30.059796] ret_from_fork+0x10/0x20 [ 30.059833] [ 30.060022] kfence-#90: 0x00000000aa6bc611-0x0000000020538670, size=4096, cache=kmalloc-4k [ 30.060022] [ 30.060190] allocated by task 173 on cpu 0 at 30.058129s (0.002008s ago): [ 30.060513] kmalloc_node_oob_right+0xbc/0x330 [ 30.060756] kunit_try_run_case+0x170/0x3f0 [ 30.060837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.060913] kthread+0x328/0x630 [ 30.061011] ret_from_fork+0x10/0x20 [ 30.061128] [ 30.061220] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.061307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.061334] Hardware name: linux,dummy-virt (DT) [ 30.061396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 33.938806] ================================================================== [ 33.939004] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 33.939130] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.939186] [ 33.939218] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.939623] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.939949] Hardware name: linux,dummy-virt (DT) [ 33.940003] Call trace: [ 33.940087] show_stack+0x20/0x38 (C) [ 33.940173] dump_stack_lvl+0x8c/0xd0 [ 33.940230] print_report+0x118/0x5e8 [ 33.940373] kasan_report+0xdc/0x128 [ 33.940439] kasan_check_range+0x100/0x1a8 [ 33.940490] __kasan_check_write+0x20/0x30 [ 33.940877] strncpy_from_user+0x3c/0x2a0 [ 33.940963] copy_user_test_oob+0x5c0/0xec8 [ 33.941288] kunit_try_run_case+0x170/0x3f0 [ 33.941416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.941688] kthread+0x328/0x630 [ 33.941744] ret_from_fork+0x10/0x20 [ 33.941795] [ 33.941817] Allocated by task 318: [ 33.942313] kasan_save_stack+0x3c/0x68 [ 33.942812] kasan_save_track+0x20/0x40 [ 33.943278] kasan_save_alloc_info+0x40/0x58 [ 33.943365] __kasan_kmalloc+0xd4/0xd8 [ 33.943440] __kmalloc_noprof+0x198/0x4c8 [ 33.943659] kunit_kmalloc_array+0x34/0x88 [ 33.943700] copy_user_test_oob+0xac/0xec8 [ 33.944295] kunit_try_run_case+0x170/0x3f0 [ 33.944349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.944397] kthread+0x328/0x630 [ 33.944460] ret_from_fork+0x10/0x20 [ 33.944519] [ 33.944830] The buggy address belongs to the object at fff00000c9c2f300 [ 33.944830] which belongs to the cache kmalloc-128 of size 128 [ 33.945193] The buggy address is located 0 bytes inside of [ 33.945193] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.945270] [ 33.945425] The buggy address belongs to the physical page: [ 33.945466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.945647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.945811] page_type: f5(slab) [ 33.946073] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.946397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.946712] page dumped because: kasan: bad access detected [ 33.947169] [ 33.947233] Memory state around the buggy address: [ 33.947587] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.947650] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.947702] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.947773] ^ [ 33.947822] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.947869] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.947922] ================================================================== [ 33.949622] ================================================================== [ 33.949685] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 33.949738] Write of size 1 at addr fff00000c9c2f378 by task kunit_try_catch/318 [ 33.949798] [ 33.950137] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.950573] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.950625] Hardware name: linux,dummy-virt (DT) [ 33.950705] Call trace: [ 33.950732] show_stack+0x20/0x38 (C) [ 33.950786] dump_stack_lvl+0x8c/0xd0 [ 33.950831] print_report+0x118/0x5e8 [ 33.950970] kasan_report+0xdc/0x128 [ 33.951017] __asan_report_store1_noabort+0x20/0x30 [ 33.951201] strncpy_from_user+0x270/0x2a0 [ 33.951255] copy_user_test_oob+0x5c0/0xec8 [ 33.951559] kunit_try_run_case+0x170/0x3f0 [ 33.951859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.951948] kthread+0x328/0x630 [ 33.951993] ret_from_fork+0x10/0x20 [ 33.952042] [ 33.952333] Allocated by task 318: [ 33.952528] kasan_save_stack+0x3c/0x68 [ 33.952703] kasan_save_track+0x20/0x40 [ 33.952803] kasan_save_alloc_info+0x40/0x58 [ 33.952869] __kasan_kmalloc+0xd4/0xd8 [ 33.953089] __kmalloc_noprof+0x198/0x4c8 [ 33.953133] kunit_kmalloc_array+0x34/0x88 [ 33.953269] copy_user_test_oob+0xac/0xec8 [ 33.953341] kunit_try_run_case+0x170/0x3f0 [ 33.953481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.953646] kthread+0x328/0x630 [ 33.953826] ret_from_fork+0x10/0x20 [ 33.953872] [ 33.953906] The buggy address belongs to the object at fff00000c9c2f300 [ 33.953906] which belongs to the cache kmalloc-128 of size 128 [ 33.954480] The buggy address is located 0 bytes to the right of [ 33.954480] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.954635] [ 33.954707] The buggy address belongs to the physical page: [ 33.954940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.955161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.955536] page_type: f5(slab) [ 33.955607] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.955806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.955967] page dumped because: kasan: bad access detected [ 33.956033] [ 33.956056] Memory state around the buggy address: [ 33.956111] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.956176] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.956240] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.956289] ^ [ 33.956336] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.956389] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.956439] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 33.893372] ================================================================== [ 33.893441] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 33.893503] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.893689] [ 33.893730] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.893825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.893858] Hardware name: linux,dummy-virt (DT) [ 33.893890] Call trace: [ 33.893929] show_stack+0x20/0x38 (C) [ 33.893978] dump_stack_lvl+0x8c/0xd0 [ 33.894027] print_report+0x118/0x5e8 [ 33.894073] kasan_report+0xdc/0x128 [ 33.894125] kasan_check_range+0x100/0x1a8 [ 33.894345] __kasan_check_read+0x20/0x30 [ 33.894576] copy_user_test_oob+0x728/0xec8 [ 33.894665] kunit_try_run_case+0x170/0x3f0 [ 33.894874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894955] kthread+0x328/0x630 [ 33.894997] ret_from_fork+0x10/0x20 [ 33.895045] [ 33.895065] Allocated by task 318: [ 33.895096] kasan_save_stack+0x3c/0x68 [ 33.895135] kasan_save_track+0x20/0x40 [ 33.895173] kasan_save_alloc_info+0x40/0x58 [ 33.895244] __kasan_kmalloc+0xd4/0xd8 [ 33.895281] __kmalloc_noprof+0x198/0x4c8 [ 33.895324] kunit_kmalloc_array+0x34/0x88 [ 33.895363] copy_user_test_oob+0xac/0xec8 [ 33.895405] kunit_try_run_case+0x170/0x3f0 [ 33.895444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.895489] kthread+0x328/0x630 [ 33.895524] ret_from_fork+0x10/0x20 [ 33.895563] [ 33.895585] The buggy address belongs to the object at fff00000c9c2f300 [ 33.895585] which belongs to the cache kmalloc-128 of size 128 [ 33.895647] The buggy address is located 0 bytes inside of [ 33.895647] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.895712] [ 33.895735] The buggy address belongs to the physical page: [ 33.895800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.895909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.895963] page_type: f5(slab) [ 33.896004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.896057] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.896100] page dumped because: kasan: bad access detected [ 33.896132] [ 33.896152] Memory state around the buggy address: [ 33.896186] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.896230] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.896275] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.896314] ^ [ 33.896428] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.896474] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.896543] ================================================================== [ 33.919716] ================================================================== [ 33.919830] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 33.919887] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.919955] [ 33.919987] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.920076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.920108] Hardware name: linux,dummy-virt (DT) [ 33.920140] Call trace: [ 33.920164] show_stack+0x20/0x38 (C) [ 33.920213] dump_stack_lvl+0x8c/0xd0 [ 33.920260] print_report+0x118/0x5e8 [ 33.920325] kasan_report+0xdc/0x128 [ 33.920379] kasan_check_range+0x100/0x1a8 [ 33.920426] __kasan_check_write+0x20/0x30 [ 33.920486] copy_user_test_oob+0x434/0xec8 [ 33.921210] kunit_try_run_case+0x170/0x3f0 [ 33.921520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.922114] kthread+0x328/0x630 [ 33.922246] ret_from_fork+0x10/0x20 [ 33.922345] [ 33.922374] Allocated by task 318: [ 33.922600] kasan_save_stack+0x3c/0x68 [ 33.922756] kasan_save_track+0x20/0x40 [ 33.923192] kasan_save_alloc_info+0x40/0x58 [ 33.923280] __kasan_kmalloc+0xd4/0xd8 [ 33.923626] __kmalloc_noprof+0x198/0x4c8 [ 33.923970] kunit_kmalloc_array+0x34/0x88 [ 33.924357] copy_user_test_oob+0xac/0xec8 [ 33.924520] kunit_try_run_case+0x170/0x3f0 [ 33.924599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.924655] kthread+0x328/0x630 [ 33.925040] ret_from_fork+0x10/0x20 [ 33.925164] [ 33.925241] The buggy address belongs to the object at fff00000c9c2f300 [ 33.925241] which belongs to the cache kmalloc-128 of size 128 [ 33.925467] The buggy address is located 0 bytes inside of [ 33.925467] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.925953] [ 33.926002] The buggy address belongs to the physical page: [ 33.926051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.926325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.926468] page_type: f5(slab) [ 33.926513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.926727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.927236] page dumped because: kasan: bad access detected [ 33.927298] [ 33.927407] Memory state around the buggy address: [ 33.927474] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.927692] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.927963] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.928126] ^ [ 33.928183] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.928329] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.928404] ================================================================== [ 33.929665] ================================================================== [ 33.929741] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 33.930098] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.930420] [ 33.930627] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.930757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.930850] Hardware name: linux,dummy-virt (DT) [ 33.930884] Call trace: [ 33.930919] show_stack+0x20/0x38 (C) [ 33.931107] dump_stack_lvl+0x8c/0xd0 [ 33.931369] print_report+0x118/0x5e8 [ 33.931611] kasan_report+0xdc/0x128 [ 33.931674] kasan_check_range+0x100/0x1a8 [ 33.931884] __kasan_check_read+0x20/0x30 [ 33.931965] copy_user_test_oob+0x4a0/0xec8 [ 33.932021] kunit_try_run_case+0x170/0x3f0 [ 33.932238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.932310] kthread+0x328/0x630 [ 33.932353] ret_from_fork+0x10/0x20 [ 33.932406] [ 33.932427] Allocated by task 318: [ 33.932458] kasan_save_stack+0x3c/0x68 [ 33.932501] kasan_save_track+0x20/0x40 [ 33.932927] kasan_save_alloc_info+0x40/0x58 [ 33.933244] __kasan_kmalloc+0xd4/0xd8 [ 33.933334] __kmalloc_noprof+0x198/0x4c8 [ 33.933459] kunit_kmalloc_array+0x34/0x88 [ 33.933767] copy_user_test_oob+0xac/0xec8 [ 33.933933] kunit_try_run_case+0x170/0x3f0 [ 33.934253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.934671] kthread+0x328/0x630 [ 33.934788] ret_from_fork+0x10/0x20 [ 33.934947] [ 33.935001] The buggy address belongs to the object at fff00000c9c2f300 [ 33.935001] which belongs to the cache kmalloc-128 of size 128 [ 33.935326] The buggy address is located 0 bytes inside of [ 33.935326] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.935709] [ 33.935752] The buggy address belongs to the physical page: [ 33.935875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.935975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.936039] page_type: f5(slab) [ 33.936093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.936153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.936195] page dumped because: kasan: bad access detected [ 33.936229] [ 33.936258] Memory state around the buggy address: [ 33.936293] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.936352] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.936398] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.936438] ^ [ 33.936484] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937006] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937075] ================================================================== [ 33.910940] ================================================================== [ 33.910994] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 33.911047] Read of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.911175] [ 33.911221] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.911588] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.911640] Hardware name: linux,dummy-virt (DT) [ 33.911694] Call trace: [ 33.911723] show_stack+0x20/0x38 (C) [ 33.911776] dump_stack_lvl+0x8c/0xd0 [ 33.911951] print_report+0x118/0x5e8 [ 33.912120] kasan_report+0xdc/0x128 [ 33.912203] kasan_check_range+0x100/0x1a8 [ 33.912279] __kasan_check_read+0x20/0x30 [ 33.912345] copy_user_test_oob+0x3c8/0xec8 [ 33.912439] kunit_try_run_case+0x170/0x3f0 [ 33.912486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.912833] kthread+0x328/0x630 [ 33.912936] ret_from_fork+0x10/0x20 [ 33.913015] [ 33.913355] Allocated by task 318: [ 33.913421] kasan_save_stack+0x3c/0x68 [ 33.913628] kasan_save_track+0x20/0x40 [ 33.913888] kasan_save_alloc_info+0x40/0x58 [ 33.913998] __kasan_kmalloc+0xd4/0xd8 [ 33.914324] __kmalloc_noprof+0x198/0x4c8 [ 33.914472] kunit_kmalloc_array+0x34/0x88 [ 33.914516] copy_user_test_oob+0xac/0xec8 [ 33.914567] kunit_try_run_case+0x170/0x3f0 [ 33.914930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.915157] kthread+0x328/0x630 [ 33.915258] ret_from_fork+0x10/0x20 [ 33.915473] [ 33.915499] The buggy address belongs to the object at fff00000c9c2f300 [ 33.915499] which belongs to the cache kmalloc-128 of size 128 [ 33.915869] The buggy address is located 0 bytes inside of [ 33.915869] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.916178] [ 33.916554] The buggy address belongs to the physical page: [ 33.916790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.916864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.917125] page_type: f5(slab) [ 33.917213] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.917280] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.917323] page dumped because: kasan: bad access detected [ 33.917360] [ 33.917380] Memory state around the buggy address: [ 33.917721] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.917951] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.918290] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.918380] ^ [ 33.918877] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.919042] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.919106] ================================================================== [ 33.883229] ================================================================== [ 33.883398] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 33.883628] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.883720] [ 33.883825] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.884291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.884485] Hardware name: linux,dummy-virt (DT) [ 33.884784] Call trace: [ 33.884906] show_stack+0x20/0x38 (C) [ 33.884967] dump_stack_lvl+0x8c/0xd0 [ 33.885038] print_report+0x118/0x5e8 [ 33.885084] kasan_report+0xdc/0x128 [ 33.885127] kasan_check_range+0x100/0x1a8 [ 33.885333] __kasan_check_write+0x20/0x30 [ 33.885454] copy_user_test_oob+0x234/0xec8 [ 33.885508] kunit_try_run_case+0x170/0x3f0 [ 33.885560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.885638] kthread+0x328/0x630 [ 33.885695] ret_from_fork+0x10/0x20 [ 33.885810] [ 33.885956] Allocated by task 318: [ 33.885990] kasan_save_stack+0x3c/0x68 [ 33.886035] kasan_save_track+0x20/0x40 [ 33.886073] kasan_save_alloc_info+0x40/0x58 [ 33.886124] __kasan_kmalloc+0xd4/0xd8 [ 33.886161] __kmalloc_noprof+0x198/0x4c8 [ 33.886204] kunit_kmalloc_array+0x34/0x88 [ 33.886330] copy_user_test_oob+0xac/0xec8 [ 33.886469] kunit_try_run_case+0x170/0x3f0 [ 33.886549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.886685] kthread+0x328/0x630 [ 33.886755] ret_from_fork+0x10/0x20 [ 33.886801] [ 33.886822] The buggy address belongs to the object at fff00000c9c2f300 [ 33.886822] which belongs to the cache kmalloc-128 of size 128 [ 33.887033] The buggy address is located 0 bytes inside of [ 33.887033] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.887394] [ 33.887425] The buggy address belongs to the physical page: [ 33.887490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.887648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.887705] page_type: f5(slab) [ 33.887749] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.887802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.887848] page dumped because: kasan: bad access detected [ 33.887944] [ 33.888038] Memory state around the buggy address: [ 33.888215] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.888279] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.888497] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.888624] ^ [ 33.888672] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.888716] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.888756] ================================================================== [ 33.902160] ================================================================== [ 33.902248] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 33.902317] Write of size 121 at addr fff00000c9c2f300 by task kunit_try_catch/318 [ 33.902379] [ 33.902553] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.902797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.902831] Hardware name: linux,dummy-virt (DT) [ 33.902865] Call trace: [ 33.902890] show_stack+0x20/0x38 (C) [ 33.902959] dump_stack_lvl+0x8c/0xd0 [ 33.903287] print_report+0x118/0x5e8 [ 33.903368] kasan_report+0xdc/0x128 [ 33.903477] kasan_check_range+0x100/0x1a8 [ 33.903531] __kasan_check_write+0x20/0x30 [ 33.903578] copy_user_test_oob+0x35c/0xec8 [ 33.903915] kunit_try_run_case+0x170/0x3f0 [ 33.904007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.904104] kthread+0x328/0x630 [ 33.904146] ret_from_fork+0x10/0x20 [ 33.904462] [ 33.904499] Allocated by task 318: [ 33.904543] kasan_save_stack+0x3c/0x68 [ 33.904841] kasan_save_track+0x20/0x40 [ 33.904926] kasan_save_alloc_info+0x40/0x58 [ 33.905066] __kasan_kmalloc+0xd4/0xd8 [ 33.905167] __kmalloc_noprof+0x198/0x4c8 [ 33.905307] kunit_kmalloc_array+0x34/0x88 [ 33.905360] copy_user_test_oob+0xac/0xec8 [ 33.905716] kunit_try_run_case+0x170/0x3f0 [ 33.905814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.905949] kthread+0x328/0x630 [ 33.906026] ret_from_fork+0x10/0x20 [ 33.906082] [ 33.906104] The buggy address belongs to the object at fff00000c9c2f300 [ 33.906104] which belongs to the cache kmalloc-128 of size 128 [ 33.906464] The buggy address is located 0 bytes inside of [ 33.906464] allocated 120-byte region [fff00000c9c2f300, fff00000c9c2f378) [ 33.906540] [ 33.906574] The buggy address belongs to the physical page: [ 33.906871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.907262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.907395] page_type: f5(slab) [ 33.907442] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.907799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.907892] page dumped because: kasan: bad access detected [ 33.908200] [ 33.908476] Memory state around the buggy address: [ 33.908565] fff00000c9c2f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.908663] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.908995] >fff00000c9c2f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.909044] ^ [ 33.909337] fff00000c9c2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.909398] fff00000c9c2f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.909687] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 33.839894] ================================================================== [ 33.840015] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.840089] Read of size 8 at addr fff00000c9c2f278 by task kunit_try_catch/314 [ 33.840154] [ 33.840196] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.840294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.840354] Hardware name: linux,dummy-virt (DT) [ 33.840390] Call trace: [ 33.840417] show_stack+0x20/0x38 (C) [ 33.840469] dump_stack_lvl+0x8c/0xd0 [ 33.840676] print_report+0x118/0x5e8 [ 33.840861] kasan_report+0xdc/0x128 [ 33.840931] __asan_report_load8_noabort+0x20/0x30 [ 33.841031] copy_to_kernel_nofault+0x204/0x250 [ 33.841083] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.841153] kunit_try_run_case+0x170/0x3f0 [ 33.841205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.841274] kthread+0x328/0x630 [ 33.841318] ret_from_fork+0x10/0x20 [ 33.841369] [ 33.841390] Allocated by task 314: [ 33.841420] kasan_save_stack+0x3c/0x68 [ 33.841463] kasan_save_track+0x20/0x40 [ 33.841500] kasan_save_alloc_info+0x40/0x58 [ 33.841542] __kasan_kmalloc+0xd4/0xd8 [ 33.841654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.841915] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.841964] kunit_try_run_case+0x170/0x3f0 [ 33.842110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.842184] kthread+0x328/0x630 [ 33.842252] ret_from_fork+0x10/0x20 [ 33.842367] [ 33.842391] The buggy address belongs to the object at fff00000c9c2f200 [ 33.842391] which belongs to the cache kmalloc-128 of size 128 [ 33.842454] The buggy address is located 0 bytes to the right of [ 33.842454] allocated 120-byte region [fff00000c9c2f200, fff00000c9c2f278) [ 33.842519] [ 33.842584] The buggy address belongs to the physical page: [ 33.842694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.842756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.842859] page_type: f5(slab) [ 33.843493] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.843563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.843747] page dumped because: kasan: bad access detected [ 33.843927] [ 33.844100] Memory state around the buggy address: [ 33.844142] fff00000c9c2f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.844465] fff00000c9c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.844705] >fff00000c9c2f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.844907] ^ [ 33.844966] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.845014] fff00000c9c2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.845131] ================================================================== [ 33.846422] ================================================================== [ 33.846738] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.846990] Write of size 8 at addr fff00000c9c2f278 by task kunit_try_catch/314 [ 33.847095] [ 33.847131] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.847234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.847267] Hardware name: linux,dummy-virt (DT) [ 33.847302] Call trace: [ 33.847420] show_stack+0x20/0x38 (C) [ 33.847723] dump_stack_lvl+0x8c/0xd0 [ 33.848034] print_report+0x118/0x5e8 [ 33.848110] kasan_report+0xdc/0x128 [ 33.848156] kasan_check_range+0x100/0x1a8 [ 33.848212] __kasan_check_write+0x20/0x30 [ 33.848421] copy_to_kernel_nofault+0x8c/0x250 [ 33.848473] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.848571] kunit_try_run_case+0x170/0x3f0 [ 33.848621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.848675] kthread+0x328/0x630 [ 33.848720] ret_from_fork+0x10/0x20 [ 33.849159] [ 33.849185] Allocated by task 314: [ 33.849427] kasan_save_stack+0x3c/0x68 [ 33.849473] kasan_save_track+0x20/0x40 [ 33.849645] kasan_save_alloc_info+0x40/0x58 [ 33.849691] __kasan_kmalloc+0xd4/0xd8 [ 33.849728] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.850164] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.850214] kunit_try_run_case+0x170/0x3f0 [ 33.850256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.850303] kthread+0x328/0x630 [ 33.850339] ret_from_fork+0x10/0x20 [ 33.850395] [ 33.850417] The buggy address belongs to the object at fff00000c9c2f200 [ 33.850417] which belongs to the cache kmalloc-128 of size 128 [ 33.850479] The buggy address is located 0 bytes to the right of [ 33.850479] allocated 120-byte region [fff00000c9c2f200, fff00000c9c2f278) [ 33.851022] [ 33.851048] The buggy address belongs to the physical page: [ 33.851087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2f [ 33.851148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.851200] page_type: f5(slab) [ 33.851240] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.851304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.851347] page dumped because: kasan: bad access detected [ 33.851463] [ 33.851779] Memory state around the buggy address: [ 33.852002] fff00000c9c2f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.852162] fff00000c9c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.852392] >fff00000c9c2f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.852445] ^ [ 33.852493] fff00000c9c2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.852580] fff00000c9c2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.852621] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 33.741782] ================================================================== [ 33.742339] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 33.742442] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/302 [ 33.743356] [ 33.744097] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.744601] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.744638] Hardware name: linux,dummy-virt (DT) [ 33.744680] Call trace: [ 33.744709] show_stack+0x20/0x38 (C) [ 33.744765] dump_stack_lvl+0x8c/0xd0 [ 33.745352] print_report+0x310/0x5e8 [ 33.745530] kasan_report+0xdc/0x128 [ 33.745976] __asan_report_load1_noabort+0x20/0x30 [ 33.746095] vmalloc_oob+0x578/0x5d0 [ 33.746225] kunit_try_run_case+0x170/0x3f0 [ 33.746297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.746359] kthread+0x328/0x630 [ 33.746406] ret_from_fork+0x10/0x20 [ 33.746457] [ 33.746481] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 33.746590] The buggy address belongs to the physical page: [ 33.746631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c36 [ 33.746689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.747478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.747630] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.747711] page dumped because: kasan: bad access detected [ 33.747744] [ 33.747764] Memory state around the buggy address: [ 33.748046] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.748178] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.748225] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.748437] ^ [ 33.748506] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.748554] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.748601] ================================================================== [ 33.750595] ================================================================== [ 33.751083] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 33.751264] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/302 [ 33.751497] [ 33.751543] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.752028] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.752160] Hardware name: linux,dummy-virt (DT) [ 33.752368] Call trace: [ 33.752531] show_stack+0x20/0x38 (C) [ 33.752597] dump_stack_lvl+0x8c/0xd0 [ 33.752686] print_report+0x310/0x5e8 [ 33.752734] kasan_report+0xdc/0x128 [ 33.752780] __asan_report_load1_noabort+0x20/0x30 [ 33.752828] vmalloc_oob+0x51c/0x5d0 [ 33.752875] kunit_try_run_case+0x170/0x3f0 [ 33.753102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.753495] kthread+0x328/0x630 [ 33.753805] ret_from_fork+0x10/0x20 [ 33.754218] [ 33.754532] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 33.754841] The buggy address belongs to the physical page: [ 33.754884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c36 [ 33.755312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.755540] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.755650] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.755953] page dumped because: kasan: bad access detected [ 33.756174] [ 33.756198] Memory state around the buggy address: [ 33.756235] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.756281] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.756326] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.756647] ^ [ 33.756717] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.756765] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.757030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.473249] ================================================================== [ 33.473338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.473415] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.473480] [ 33.473519] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.473610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.473642] Hardware name: linux,dummy-virt (DT) [ 33.473746] Call trace: [ 33.473772] show_stack+0x20/0x38 (C) [ 33.473819] dump_stack_lvl+0x8c/0xd0 [ 33.473922] print_report+0x118/0x5e8 [ 33.473983] kasan_report+0xdc/0x128 [ 33.474030] __asan_report_load4_noabort+0x20/0x30 [ 33.474097] kasan_atomics_helper+0x3e04/0x4858 [ 33.474168] kasan_atomics+0x198/0x2e0 [ 33.474218] kunit_try_run_case+0x170/0x3f0 [ 33.474519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.474608] kthread+0x328/0x630 [ 33.474652] ret_from_fork+0x10/0x20 [ 33.474744] [ 33.474785] Allocated by task 298: [ 33.474844] kasan_save_stack+0x3c/0x68 [ 33.474917] kasan_save_track+0x20/0x40 [ 33.475150] kasan_save_alloc_info+0x40/0x58 [ 33.475213] __kasan_kmalloc+0xd4/0xd8 [ 33.475251] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.475430] kasan_atomics+0xb8/0x2e0 [ 33.475502] kunit_try_run_case+0x170/0x3f0 [ 33.475552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.475596] kthread+0x328/0x630 [ 33.475686] ret_from_fork+0x10/0x20 [ 33.475726] [ 33.475748] The buggy address belongs to the object at fff00000c9c2de00 [ 33.475748] which belongs to the cache kmalloc-64 of size 64 [ 33.475835] The buggy address is located 0 bytes to the right of [ 33.475835] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.476123] [ 33.476173] The buggy address belongs to the physical page: [ 33.476210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.476263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.476339] page_type: f5(slab) [ 33.476541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.477090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.477195] page dumped because: kasan: bad access detected [ 33.477348] [ 33.477392] Memory state around the buggy address: [ 33.477428] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.477672] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.477770] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.477959] ^ [ 33.477998] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.478053] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.478093] ================================================================== [ 33.664837] ================================================================== [ 33.664891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.665399] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.666569] [ 33.666686] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.666792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.667043] Hardware name: linux,dummy-virt (DT) [ 33.667382] Call trace: [ 33.667440] show_stack+0x20/0x38 (C) [ 33.667735] dump_stack_lvl+0x8c/0xd0 [ 33.667827] print_report+0x118/0x5e8 [ 33.667882] kasan_report+0xdc/0x128 [ 33.667970] kasan_check_range+0x100/0x1a8 [ 33.668022] __kasan_check_write+0x20/0x30 [ 33.668070] kasan_atomics_helper+0x16d0/0x4858 [ 33.668147] kasan_atomics+0x198/0x2e0 [ 33.668196] kunit_try_run_case+0x170/0x3f0 [ 33.668243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.668296] kthread+0x328/0x630 [ 33.668339] ret_from_fork+0x10/0x20 [ 33.668387] [ 33.668408] Allocated by task 298: [ 33.668458] kasan_save_stack+0x3c/0x68 [ 33.668503] kasan_save_track+0x20/0x40 [ 33.668777] kasan_save_alloc_info+0x40/0x58 [ 33.668917] __kasan_kmalloc+0xd4/0xd8 [ 33.668981] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.669033] kasan_atomics+0xb8/0x2e0 [ 33.669073] kunit_try_run_case+0x170/0x3f0 [ 33.669113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.669331] kthread+0x328/0x630 [ 33.669507] ret_from_fork+0x10/0x20 [ 33.669586] [ 33.669654] The buggy address belongs to the object at fff00000c9c2de00 [ 33.669654] which belongs to the cache kmalloc-64 of size 64 [ 33.670008] The buggy address is located 0 bytes to the right of [ 33.670008] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.670123] [ 33.670178] The buggy address belongs to the physical page: [ 33.670214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.670400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.670627] page_type: f5(slab) [ 33.670889] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.671044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.671131] page dumped because: kasan: bad access detected [ 33.671245] [ 33.671305] Memory state around the buggy address: [ 33.671417] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.671493] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.671808] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.671950] ^ [ 33.672043] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.672255] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.672427] ================================================================== [ 33.681605] ================================================================== [ 33.681660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.681715] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.681768] [ 33.681800] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.681891] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.681937] Hardware name: linux,dummy-virt (DT) [ 33.681968] Call trace: [ 33.681993] show_stack+0x20/0x38 (C) [ 33.683628] dump_stack_lvl+0x8c/0xd0 [ 33.683719] print_report+0x118/0x5e8 [ 33.684191] kasan_report+0xdc/0x128 [ 33.684340] kasan_check_range+0x100/0x1a8 [ 33.684390] __kasan_check_write+0x20/0x30 [ 33.684730] kasan_atomics_helper+0x175c/0x4858 [ 33.685245] kasan_atomics+0x198/0x2e0 [ 33.685307] kunit_try_run_case+0x170/0x3f0 [ 33.685356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.685579] kthread+0x328/0x630 [ 33.685758] ret_from_fork+0x10/0x20 [ 33.686191] [ 33.686441] Allocated by task 298: [ 33.686673] kasan_save_stack+0x3c/0x68 [ 33.686872] kasan_save_track+0x20/0x40 [ 33.687144] kasan_save_alloc_info+0x40/0x58 [ 33.687454] __kasan_kmalloc+0xd4/0xd8 [ 33.687504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.687876] kasan_atomics+0xb8/0x2e0 [ 33.688136] kunit_try_run_case+0x170/0x3f0 [ 33.688510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.688640] kthread+0x328/0x630 [ 33.688703] ret_from_fork+0x10/0x20 [ 33.688742] [ 33.688867] The buggy address belongs to the object at fff00000c9c2de00 [ 33.688867] which belongs to the cache kmalloc-64 of size 64 [ 33.689136] The buggy address is located 0 bytes to the right of [ 33.689136] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.689206] [ 33.689439] The buggy address belongs to the physical page: [ 33.689531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.689689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.690281] page_type: f5(slab) [ 33.690592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.691010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.691358] page dumped because: kasan: bad access detected [ 33.691558] [ 33.691597] Memory state around the buggy address: [ 33.691756] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.692125] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.692176] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.692217] ^ [ 33.692654] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.692719] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.692767] ================================================================== [ 33.524244] ================================================================== [ 33.524341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.524439] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.524494] [ 33.524533] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.524656] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.524748] Hardware name: linux,dummy-virt (DT) [ 33.524783] Call trace: [ 33.524809] show_stack+0x20/0x38 (C) [ 33.525040] dump_stack_lvl+0x8c/0xd0 [ 33.525265] print_report+0x118/0x5e8 [ 33.525510] kasan_report+0xdc/0x128 [ 33.525728] kasan_check_range+0x100/0x1a8 [ 33.525970] __kasan_check_write+0x20/0x30 [ 33.526177] kasan_atomics_helper+0x1058/0x4858 [ 33.526266] kasan_atomics+0x198/0x2e0 [ 33.526525] kunit_try_run_case+0x170/0x3f0 [ 33.526725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.527021] kthread+0x328/0x630 [ 33.527225] ret_from_fork+0x10/0x20 [ 33.527505] [ 33.527612] Allocated by task 298: [ 33.527652] kasan_save_stack+0x3c/0x68 [ 33.527698] kasan_save_track+0x20/0x40 [ 33.527945] kasan_save_alloc_info+0x40/0x58 [ 33.528330] __kasan_kmalloc+0xd4/0xd8 [ 33.528674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.528741] kasan_atomics+0xb8/0x2e0 [ 33.528953] kunit_try_run_case+0x170/0x3f0 [ 33.529077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.529486] kthread+0x328/0x630 [ 33.529601] ret_from_fork+0x10/0x20 [ 33.529645] [ 33.529667] The buggy address belongs to the object at fff00000c9c2de00 [ 33.529667] which belongs to the cache kmalloc-64 of size 64 [ 33.529891] The buggy address is located 0 bytes to the right of [ 33.529891] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.530201] [ 33.530285] The buggy address belongs to the physical page: [ 33.530480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.530549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.530601] page_type: f5(slab) [ 33.530641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.530693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.530735] page dumped because: kasan: bad access detected [ 33.530770] [ 33.530790] Memory state around the buggy address: [ 33.530823] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.530876] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.530934] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.530985] ^ [ 33.531040] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.531120] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.531170] ================================================================== [ 33.508210] ================================================================== [ 33.508266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.508319] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.508387] [ 33.508435] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.508528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.508612] Hardware name: linux,dummy-virt (DT) [ 33.508684] Call trace: [ 33.508708] show_stack+0x20/0x38 (C) [ 33.508757] dump_stack_lvl+0x8c/0xd0 [ 33.508970] print_report+0x118/0x5e8 [ 33.509019] kasan_report+0xdc/0x128 [ 33.509064] kasan_check_range+0x100/0x1a8 [ 33.509344] __kasan_check_write+0x20/0x30 [ 33.509432] kasan_atomics_helper+0xf88/0x4858 [ 33.509824] kasan_atomics+0x198/0x2e0 [ 33.509953] kunit_try_run_case+0x170/0x3f0 [ 33.510100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.510194] kthread+0x328/0x630 [ 33.510299] ret_from_fork+0x10/0x20 [ 33.510415] [ 33.510439] Allocated by task 298: [ 33.510469] kasan_save_stack+0x3c/0x68 [ 33.510822] kasan_save_track+0x20/0x40 [ 33.510912] kasan_save_alloc_info+0x40/0x58 [ 33.510980] __kasan_kmalloc+0xd4/0xd8 [ 33.511040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.511336] kasan_atomics+0xb8/0x2e0 [ 33.511429] kunit_try_run_case+0x170/0x3f0 [ 33.511487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.511534] kthread+0x328/0x630 [ 33.511574] ret_from_fork+0x10/0x20 [ 33.511621] [ 33.511652] The buggy address belongs to the object at fff00000c9c2de00 [ 33.511652] which belongs to the cache kmalloc-64 of size 64 [ 33.511803] The buggy address is located 0 bytes to the right of [ 33.511803] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.511872] [ 33.512128] The buggy address belongs to the physical page: [ 33.512391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.512466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.512942] page_type: f5(slab) [ 33.513067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.513144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.513189] page dumped because: kasan: bad access detected [ 33.513588] [ 33.513688] Memory state around the buggy address: [ 33.514058] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.514196] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.514281] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.514419] ^ [ 33.514477] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.514552] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.514594] ================================================================== [ 33.633371] ================================================================== [ 33.633448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.633501] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.633797] [ 33.633851] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.634031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.634068] Hardware name: linux,dummy-virt (DT) [ 33.634117] Call trace: [ 33.634143] show_stack+0x20/0x38 (C) [ 33.634225] dump_stack_lvl+0x8c/0xd0 [ 33.634302] print_report+0x118/0x5e8 [ 33.634360] kasan_report+0xdc/0x128 [ 33.634405] __asan_report_load8_noabort+0x20/0x30 [ 33.634480] kasan_atomics_helper+0x3db0/0x4858 [ 33.634534] kasan_atomics+0x198/0x2e0 [ 33.634600] kunit_try_run_case+0x170/0x3f0 [ 33.634839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.634914] kthread+0x328/0x630 [ 33.634959] ret_from_fork+0x10/0x20 [ 33.635042] [ 33.635083] Allocated by task 298: [ 33.635116] kasan_save_stack+0x3c/0x68 [ 33.635164] kasan_save_track+0x20/0x40 [ 33.635450] kasan_save_alloc_info+0x40/0x58 [ 33.635510] __kasan_kmalloc+0xd4/0xd8 [ 33.635556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.635599] kasan_atomics+0xb8/0x2e0 [ 33.635666] kunit_try_run_case+0x170/0x3f0 [ 33.635714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.635760] kthread+0x328/0x630 [ 33.635796] ret_from_fork+0x10/0x20 [ 33.636084] [ 33.636152] The buggy address belongs to the object at fff00000c9c2de00 [ 33.636152] which belongs to the cache kmalloc-64 of size 64 [ 33.636218] The buggy address is located 0 bytes to the right of [ 33.636218] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.636283] [ 33.636304] The buggy address belongs to the physical page: [ 33.636340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.636395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.636458] page_type: f5(slab) [ 33.636532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.637007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.637051] page dumped because: kasan: bad access detected [ 33.637260] [ 33.637283] Memory state around the buggy address: [ 33.637499] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.637572] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.637619] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.638219] ^ [ 33.638310] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.638366] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.638839] ================================================================== [ 33.565839] ================================================================== [ 33.565930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.566165] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.566342] [ 33.566411] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.566510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.566631] Hardware name: linux,dummy-virt (DT) [ 33.566687] Call trace: [ 33.566713] show_stack+0x20/0x38 (C) [ 33.566766] dump_stack_lvl+0x8c/0xd0 [ 33.567023] print_report+0x118/0x5e8 [ 33.567103] kasan_report+0xdc/0x128 [ 33.567257] kasan_check_range+0x100/0x1a8 [ 33.567318] __kasan_check_write+0x20/0x30 [ 33.567612] kasan_atomics_helper+0x126c/0x4858 [ 33.567833] kasan_atomics+0x198/0x2e0 [ 33.568079] kunit_try_run_case+0x170/0x3f0 [ 33.568147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.568201] kthread+0x328/0x630 [ 33.568511] ret_from_fork+0x10/0x20 [ 33.568805] [ 33.568995] Allocated by task 298: [ 33.569171] kasan_save_stack+0x3c/0x68 [ 33.569223] kasan_save_track+0x20/0x40 [ 33.569615] kasan_save_alloc_info+0x40/0x58 [ 33.569778] __kasan_kmalloc+0xd4/0xd8 [ 33.570123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.570197] kasan_atomics+0xb8/0x2e0 [ 33.570240] kunit_try_run_case+0x170/0x3f0 [ 33.570299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.570345] kthread+0x328/0x630 [ 33.570402] ret_from_fork+0x10/0x20 [ 33.570453] [ 33.570485] The buggy address belongs to the object at fff00000c9c2de00 [ 33.570485] which belongs to the cache kmalloc-64 of size 64 [ 33.570546] The buggy address is located 0 bytes to the right of [ 33.570546] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.570623] [ 33.570645] The buggy address belongs to the physical page: [ 33.570682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.570746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.570797] page_type: f5(slab) [ 33.570836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.571507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.571571] page dumped because: kasan: bad access detected [ 33.571630] [ 33.571678] Memory state around the buggy address: [ 33.571778] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.571825] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.571916] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.572320] ^ [ 33.572637] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.572891] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.572986] ================================================================== [ 33.693352] ================================================================== [ 33.693402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.693454] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.693506] [ 33.694367] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.694484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.694516] Hardware name: linux,dummy-virt (DT) [ 33.694547] Call trace: [ 33.695194] show_stack+0x20/0x38 (C) [ 33.695264] dump_stack_lvl+0x8c/0xd0 [ 33.695314] print_report+0x118/0x5e8 [ 33.695362] kasan_report+0xdc/0x128 [ 33.695802] __asan_report_load8_noabort+0x20/0x30 [ 33.696042] kasan_atomics_helper+0x3e20/0x4858 [ 33.696094] kasan_atomics+0x198/0x2e0 [ 33.696143] kunit_try_run_case+0x170/0x3f0 [ 33.696191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.696246] kthread+0x328/0x630 [ 33.696289] ret_from_fork+0x10/0x20 [ 33.697088] [ 33.697139] Allocated by task 298: [ 33.697171] kasan_save_stack+0x3c/0x68 [ 33.697226] kasan_save_track+0x20/0x40 [ 33.697628] kasan_save_alloc_info+0x40/0x58 [ 33.697674] __kasan_kmalloc+0xd4/0xd8 [ 33.697711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.697925] kasan_atomics+0xb8/0x2e0 [ 33.698190] kunit_try_run_case+0x170/0x3f0 [ 33.698239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.698515] kthread+0x328/0x630 [ 33.698750] ret_from_fork+0x10/0x20 [ 33.698877] [ 33.698950] The buggy address belongs to the object at fff00000c9c2de00 [ 33.698950] which belongs to the cache kmalloc-64 of size 64 [ 33.699041] The buggy address is located 0 bytes to the right of [ 33.699041] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.699107] [ 33.699428] The buggy address belongs to the physical page: [ 33.699554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.700199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.700557] page_type: f5(slab) [ 33.700783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.701009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.701058] page dumped because: kasan: bad access detected [ 33.701092] [ 33.701119] Memory state around the buggy address: [ 33.701153] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.701200] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.701673] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.701807] ^ [ 33.702298] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.702814] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.703156] ================================================================== [ 33.389693] ================================================================== [ 33.389750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.389806] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.389858] [ 33.389983] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.391021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.391172] Hardware name: linux,dummy-virt (DT) [ 33.391208] Call trace: [ 33.391646] show_stack+0x20/0x38 (C) [ 33.391703] dump_stack_lvl+0x8c/0xd0 [ 33.391753] print_report+0x118/0x5e8 [ 33.391800] kasan_report+0xdc/0x128 [ 33.392092] kasan_check_range+0x100/0x1a8 [ 33.392142] __kasan_check_write+0x20/0x30 [ 33.392192] kasan_atomics_helper+0xa6c/0x4858 [ 33.392805] kasan_atomics+0x198/0x2e0 [ 33.393090] kunit_try_run_case+0x170/0x3f0 [ 33.393440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.393538] kthread+0x328/0x630 [ 33.393585] ret_from_fork+0x10/0x20 [ 33.394153] [ 33.394191] Allocated by task 298: [ 33.394226] kasan_save_stack+0x3c/0x68 [ 33.394274] kasan_save_track+0x20/0x40 [ 33.394312] kasan_save_alloc_info+0x40/0x58 [ 33.394358] __kasan_kmalloc+0xd4/0xd8 [ 33.395146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.395214] kasan_atomics+0xb8/0x2e0 [ 33.395258] kunit_try_run_case+0x170/0x3f0 [ 33.395297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.395343] kthread+0x328/0x630 [ 33.395376] ret_from_fork+0x10/0x20 [ 33.395415] [ 33.395437] The buggy address belongs to the object at fff00000c9c2de00 [ 33.395437] which belongs to the cache kmalloc-64 of size 64 [ 33.396691] The buggy address is located 0 bytes to the right of [ 33.396691] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.396801] [ 33.396826] The buggy address belongs to the physical page: [ 33.396863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.396977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.397053] page_type: f5(slab) [ 33.397112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.397189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.397231] page dumped because: kasan: bad access detected [ 33.397265] [ 33.397329] Memory state around the buggy address: [ 33.397420] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.397936] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.398270] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.398661] ^ [ 33.398731] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.399218] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.399322] ================================================================== [ 33.478559] ================================================================== [ 33.478626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.478706] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.478758] [ 33.478808] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.478913] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.478951] Hardware name: linux,dummy-virt (DT) [ 33.479001] Call trace: [ 33.479041] show_stack+0x20/0x38 (C) [ 33.479091] dump_stack_lvl+0x8c/0xd0 [ 33.479157] print_report+0x118/0x5e8 [ 33.479201] kasan_report+0xdc/0x128 [ 33.479246] kasan_check_range+0x100/0x1a8 [ 33.479309] __kasan_check_read+0x20/0x30 [ 33.479374] kasan_atomics_helper+0xdd4/0x4858 [ 33.479428] kasan_atomics+0x198/0x2e0 [ 33.479481] kunit_try_run_case+0x170/0x3f0 [ 33.479537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.479591] kthread+0x328/0x630 [ 33.479634] ret_from_fork+0x10/0x20 [ 33.479682] [ 33.479702] Allocated by task 298: [ 33.479732] kasan_save_stack+0x3c/0x68 [ 33.479771] kasan_save_track+0x20/0x40 [ 33.479809] kasan_save_alloc_info+0x40/0x58 [ 33.479849] __kasan_kmalloc+0xd4/0xd8 [ 33.479885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.479937] kasan_atomics+0xb8/0x2e0 [ 33.480229] kunit_try_run_case+0x170/0x3f0 [ 33.480335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.480392] kthread+0x328/0x630 [ 33.480430] ret_from_fork+0x10/0x20 [ 33.480468] [ 33.480498] The buggy address belongs to the object at fff00000c9c2de00 [ 33.480498] which belongs to the cache kmalloc-64 of size 64 [ 33.480576] The buggy address is located 0 bytes to the right of [ 33.480576] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.480653] [ 33.480865] The buggy address belongs to the physical page: [ 33.480941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.481046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.481134] page_type: f5(slab) [ 33.481193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.481245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.481486] page dumped because: kasan: bad access detected [ 33.481524] [ 33.481544] Memory state around the buggy address: [ 33.481578] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.481681] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.481750] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.481801] ^ [ 33.481891] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.481964] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.482042] ================================================================== [ 33.531766] ================================================================== [ 33.532135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.532208] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.532268] [ 33.532303] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.532394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.532632] Hardware name: linux,dummy-virt (DT) [ 33.532727] Call trace: [ 33.532800] show_stack+0x20/0x38 (C) [ 33.532989] dump_stack_lvl+0x8c/0xd0 [ 33.533249] print_report+0x118/0x5e8 [ 33.533655] kasan_report+0xdc/0x128 [ 33.533742] kasan_check_range+0x100/0x1a8 [ 33.533885] __kasan_check_write+0x20/0x30 [ 33.533988] kasan_atomics_helper+0x10c0/0x4858 [ 33.534222] kasan_atomics+0x198/0x2e0 [ 33.534666] kunit_try_run_case+0x170/0x3f0 [ 33.535024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.535219] kthread+0x328/0x630 [ 33.535455] ret_from_fork+0x10/0x20 [ 33.535827] [ 33.535976] Allocated by task 298: [ 33.536231] kasan_save_stack+0x3c/0x68 [ 33.536462] kasan_save_track+0x20/0x40 [ 33.536982] kasan_save_alloc_info+0x40/0x58 [ 33.537196] __kasan_kmalloc+0xd4/0xd8 [ 33.537261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.537375] kasan_atomics+0xb8/0x2e0 [ 33.537418] kunit_try_run_case+0x170/0x3f0 [ 33.537459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.537529] kthread+0x328/0x630 [ 33.537568] ret_from_fork+0x10/0x20 [ 33.537747] [ 33.537935] The buggy address belongs to the object at fff00000c9c2de00 [ 33.537935] which belongs to the cache kmalloc-64 of size 64 [ 33.538163] The buggy address is located 0 bytes to the right of [ 33.538163] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.538523] [ 33.538709] The buggy address belongs to the physical page: [ 33.539330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.539568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.539675] page_type: f5(slab) [ 33.539743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.539883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.540172] page dumped because: kasan: bad access detected [ 33.540369] [ 33.540465] Memory state around the buggy address: [ 33.540662] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.540714] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.540758] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.540797] ^ [ 33.540835] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.541270] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.541329] ================================================================== [ 33.487153] ================================================================== [ 33.487202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.487252] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.487314] [ 33.487344] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.487437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.487479] Hardware name: linux,dummy-virt (DT) [ 33.487514] Call trace: [ 33.487539] show_stack+0x20/0x38 (C) [ 33.487586] dump_stack_lvl+0x8c/0xd0 [ 33.487643] print_report+0x118/0x5e8 [ 33.487689] kasan_report+0xdc/0x128 [ 33.487742] kasan_check_range+0x100/0x1a8 [ 33.487788] __kasan_check_write+0x20/0x30 [ 33.487845] kasan_atomics_helper+0xe44/0x4858 [ 33.488414] kasan_atomics+0x198/0x2e0 [ 33.488485] kunit_try_run_case+0x170/0x3f0 [ 33.488537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.488591] kthread+0x328/0x630 [ 33.488768] ret_from_fork+0x10/0x20 [ 33.488892] [ 33.488982] Allocated by task 298: [ 33.489059] kasan_save_stack+0x3c/0x68 [ 33.489155] kasan_save_track+0x20/0x40 [ 33.489242] kasan_save_alloc_info+0x40/0x58 [ 33.489570] __kasan_kmalloc+0xd4/0xd8 [ 33.489660] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.489715] kasan_atomics+0xb8/0x2e0 [ 33.489785] kunit_try_run_case+0x170/0x3f0 [ 33.489869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.489927] kthread+0x328/0x630 [ 33.489963] ret_from_fork+0x10/0x20 [ 33.490124] [ 33.490150] The buggy address belongs to the object at fff00000c9c2de00 [ 33.490150] which belongs to the cache kmalloc-64 of size 64 [ 33.490213] The buggy address is located 0 bytes to the right of [ 33.490213] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.490322] [ 33.490398] The buggy address belongs to the physical page: [ 33.490494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.490594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.490719] page_type: f5(slab) [ 33.490925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.491054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.491223] page dumped because: kasan: bad access detected [ 33.491294] [ 33.491353] Memory state around the buggy address: [ 33.491431] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.491497] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.491583] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.491635] ^ [ 33.491714] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.491759] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.491797] ================================================================== [ 33.651509] ================================================================== [ 33.651705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.652450] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.652507] [ 33.652540] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.652631] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.652782] Hardware name: linux,dummy-virt (DT) [ 33.652820] Call trace: [ 33.652845] show_stack+0x20/0x38 (C) [ 33.653471] dump_stack_lvl+0x8c/0xd0 [ 33.653758] print_report+0x118/0x5e8 [ 33.653934] kasan_report+0xdc/0x128 [ 33.654041] __asan_report_load8_noabort+0x20/0x30 [ 33.654165] kasan_atomics_helper+0x3df4/0x4858 [ 33.654217] kasan_atomics+0x198/0x2e0 [ 33.654265] kunit_try_run_case+0x170/0x3f0 [ 33.654314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.655701] kthread+0x328/0x630 [ 33.655840] ret_from_fork+0x10/0x20 [ 33.656607] [ 33.656684] Allocated by task 298: [ 33.656764] kasan_save_stack+0x3c/0x68 [ 33.657004] kasan_save_track+0x20/0x40 [ 33.657158] kasan_save_alloc_info+0x40/0x58 [ 33.657489] __kasan_kmalloc+0xd4/0xd8 [ 33.657711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.657832] kasan_atomics+0xb8/0x2e0 [ 33.658237] kunit_try_run_case+0x170/0x3f0 [ 33.658578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.658634] kthread+0x328/0x630 [ 33.658672] ret_from_fork+0x10/0x20 [ 33.659621] [ 33.659798] The buggy address belongs to the object at fff00000c9c2de00 [ 33.659798] which belongs to the cache kmalloc-64 of size 64 [ 33.660226] The buggy address is located 0 bytes to the right of [ 33.660226] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.660657] [ 33.660686] The buggy address belongs to the physical page: [ 33.660967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.661411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.661588] page_type: f5(slab) [ 33.661631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.661826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.661882] page dumped because: kasan: bad access detected [ 33.661923] [ 33.661945] Memory state around the buggy address: [ 33.662371] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.662668] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.662725] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.662767] ^ [ 33.663118] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.663261] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.663584] ================================================================== [ 33.704136] ================================================================== [ 33.704192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.704245] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.704297] [ 33.704787] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.705128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.705429] Hardware name: linux,dummy-virt (DT) [ 33.705464] Call trace: [ 33.705502] show_stack+0x20/0x38 (C) [ 33.705782] dump_stack_lvl+0x8c/0xd0 [ 33.705921] print_report+0x118/0x5e8 [ 33.705967] kasan_report+0xdc/0x128 [ 33.706013] kasan_check_range+0x100/0x1a8 [ 33.706060] __kasan_check_write+0x20/0x30 [ 33.706107] kasan_atomics_helper+0x17ec/0x4858 [ 33.706159] kasan_atomics+0x198/0x2e0 [ 33.706206] kunit_try_run_case+0x170/0x3f0 [ 33.706255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.707222] kthread+0x328/0x630 [ 33.707714] ret_from_fork+0x10/0x20 [ 33.707965] [ 33.707991] Allocated by task 298: [ 33.708133] kasan_save_stack+0x3c/0x68 [ 33.708194] kasan_save_track+0x20/0x40 [ 33.708366] kasan_save_alloc_info+0x40/0x58 [ 33.708432] __kasan_kmalloc+0xd4/0xd8 [ 33.708619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.709016] kasan_atomics+0xb8/0x2e0 [ 33.709134] kunit_try_run_case+0x170/0x3f0 [ 33.709237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.709393] kthread+0x328/0x630 [ 33.709573] ret_from_fork+0x10/0x20 [ 33.709665] [ 33.709689] The buggy address belongs to the object at fff00000c9c2de00 [ 33.709689] which belongs to the cache kmalloc-64 of size 64 [ 33.709954] The buggy address is located 0 bytes to the right of [ 33.709954] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.710281] [ 33.710306] The buggy address belongs to the physical page: [ 33.710343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.710923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.711281] page_type: f5(slab) [ 33.711462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.711517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.711561] page dumped because: kasan: bad access detected [ 33.711595] [ 33.711615] Memory state around the buggy address: [ 33.711649] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.711696] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.712219] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.712691] ^ [ 33.712735] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.712820] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.712863] ================================================================== [ 33.361707] ================================================================== [ 33.361764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.361818] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.361869] [ 33.361917] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.363542] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.363591] Hardware name: linux,dummy-virt (DT) [ 33.363639] Call trace: [ 33.363663] show_stack+0x20/0x38 (C) [ 33.363765] dump_stack_lvl+0x8c/0xd0 [ 33.363860] print_report+0x118/0x5e8 [ 33.363916] kasan_report+0xdc/0x128 [ 33.363961] kasan_check_range+0x100/0x1a8 [ 33.364382] __kasan_check_write+0x20/0x30 [ 33.364785] kasan_atomics_helper+0x99c/0x4858 [ 33.364917] kasan_atomics+0x198/0x2e0 [ 33.365309] kunit_try_run_case+0x170/0x3f0 [ 33.365613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.365925] kthread+0x328/0x630 [ 33.366236] ret_from_fork+0x10/0x20 [ 33.366651] [ 33.366679] Allocated by task 298: [ 33.367110] kasan_save_stack+0x3c/0x68 [ 33.367211] kasan_save_track+0x20/0x40 [ 33.367593] kasan_save_alloc_info+0x40/0x58 [ 33.367646] __kasan_kmalloc+0xd4/0xd8 [ 33.368075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.368286] kasan_atomics+0xb8/0x2e0 [ 33.368613] kunit_try_run_case+0x170/0x3f0 [ 33.368670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.368715] kthread+0x328/0x630 [ 33.368750] ret_from_fork+0x10/0x20 [ 33.368788] [ 33.369231] The buggy address belongs to the object at fff00000c9c2de00 [ 33.369231] which belongs to the cache kmalloc-64 of size 64 [ 33.369646] The buggy address is located 0 bytes to the right of [ 33.369646] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.369931] [ 33.370250] The buggy address belongs to the physical page: [ 33.370388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.370824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.370984] page_type: f5(slab) [ 33.371332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.371441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.371801] page dumped because: kasan: bad access detected [ 33.372048] [ 33.372255] Memory state around the buggy address: [ 33.372509] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.372721] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.372821] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.372866] ^ [ 33.373199] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.373503] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.373626] ================================================================== [ 33.515659] ================================================================== [ 33.515978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.516043] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.516153] [ 33.516378] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.516481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.516514] Hardware name: linux,dummy-virt (DT) [ 33.516547] Call trace: [ 33.516571] show_stack+0x20/0x38 (C) [ 33.517385] dump_stack_lvl+0x8c/0xd0 [ 33.517449] print_report+0x118/0x5e8 [ 33.517496] kasan_report+0xdc/0x128 [ 33.517962] kasan_check_range+0x100/0x1a8 [ 33.518123] __kasan_check_write+0x20/0x30 [ 33.518272] kasan_atomics_helper+0xff0/0x4858 [ 33.518330] kasan_atomics+0x198/0x2e0 [ 33.518410] kunit_try_run_case+0x170/0x3f0 [ 33.518461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518530] kthread+0x328/0x630 [ 33.518572] ret_from_fork+0x10/0x20 [ 33.518630] [ 33.518658] Allocated by task 298: [ 33.518692] kasan_save_stack+0x3c/0x68 [ 33.518735] kasan_save_track+0x20/0x40 [ 33.518772] kasan_save_alloc_info+0x40/0x58 [ 33.518820] __kasan_kmalloc+0xd4/0xd8 [ 33.518866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.518920] kasan_atomics+0xb8/0x2e0 [ 33.519003] kunit_try_run_case+0x170/0x3f0 [ 33.519829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.519940] kthread+0x328/0x630 [ 33.520019] ret_from_fork+0x10/0x20 [ 33.520098] [ 33.520339] The buggy address belongs to the object at fff00000c9c2de00 [ 33.520339] which belongs to the cache kmalloc-64 of size 64 [ 33.520455] The buggy address is located 0 bytes to the right of [ 33.520455] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.520531] [ 33.520595] The buggy address belongs to the physical page: [ 33.520632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.520687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.520738] page_type: f5(slab) [ 33.521329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.521570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.521692] page dumped because: kasan: bad access detected [ 33.521776] [ 33.521859] Memory state around the buggy address: [ 33.521998] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.522049] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.522111] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.522332] ^ [ 33.522730] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.522972] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.523087] ================================================================== [ 33.503702] ================================================================== [ 33.503974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.504058] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.504109] [ 33.504181] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.504293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.504338] Hardware name: linux,dummy-virt (DT) [ 33.504373] Call trace: [ 33.504416] show_stack+0x20/0x38 (C) [ 33.504472] dump_stack_lvl+0x8c/0xd0 [ 33.504563] print_report+0x118/0x5e8 [ 33.504661] kasan_report+0xdc/0x128 [ 33.504718] kasan_check_range+0x100/0x1a8 [ 33.504765] __kasan_check_write+0x20/0x30 [ 33.504813] kasan_atomics_helper+0xf20/0x4858 [ 33.504910] kasan_atomics+0x198/0x2e0 [ 33.504957] kunit_try_run_case+0x170/0x3f0 [ 33.505004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505197] kthread+0x328/0x630 [ 33.505311] ret_from_fork+0x10/0x20 [ 33.505380] [ 33.505403] Allocated by task 298: [ 33.505442] kasan_save_stack+0x3c/0x68 [ 33.505507] kasan_save_track+0x20/0x40 [ 33.505555] kasan_save_alloc_info+0x40/0x58 [ 33.505605] __kasan_kmalloc+0xd4/0xd8 [ 33.505641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.505685] kasan_atomics+0xb8/0x2e0 [ 33.505737] kunit_try_run_case+0x170/0x3f0 [ 33.505778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505835] kthread+0x328/0x630 [ 33.505872] ret_from_fork+0x10/0x20 [ 33.505919] [ 33.505939] The buggy address belongs to the object at fff00000c9c2de00 [ 33.505939] which belongs to the cache kmalloc-64 of size 64 [ 33.505997] The buggy address is located 0 bytes to the right of [ 33.505997] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.506063] [ 33.506087] The buggy address belongs to the physical page: [ 33.506122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.506390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.506478] page_type: f5(slab) [ 33.506519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.506586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.506702] page dumped because: kasan: bad access detected [ 33.506782] [ 33.506830] Memory state around the buggy address: [ 33.506863] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.506918] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.507007] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.507050] ^ [ 33.507241] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.507327] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.507460] ================================================================== [ 33.542164] ================================================================== [ 33.542218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.542271] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.542751] [ 33.542803] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.543065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.543145] Hardware name: linux,dummy-virt (DT) [ 33.543193] Call trace: [ 33.543353] show_stack+0x20/0x38 (C) [ 33.543417] dump_stack_lvl+0x8c/0xd0 [ 33.543468] print_report+0x118/0x5e8 [ 33.543827] kasan_report+0xdc/0x128 [ 33.543911] kasan_check_range+0x100/0x1a8 [ 33.543964] __kasan_check_write+0x20/0x30 [ 33.544239] kasan_atomics_helper+0x1128/0x4858 [ 33.544354] kasan_atomics+0x198/0x2e0 [ 33.544408] kunit_try_run_case+0x170/0x3f0 [ 33.545002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.545122] kthread+0x328/0x630 [ 33.545179] ret_from_fork+0x10/0x20 [ 33.545229] [ 33.545250] Allocated by task 298: [ 33.545526] kasan_save_stack+0x3c/0x68 [ 33.545612] kasan_save_track+0x20/0x40 [ 33.545677] kasan_save_alloc_info+0x40/0x58 [ 33.545894] __kasan_kmalloc+0xd4/0xd8 [ 33.545962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.546006] kasan_atomics+0xb8/0x2e0 [ 33.546488] kunit_try_run_case+0x170/0x3f0 [ 33.546877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.547184] kthread+0x328/0x630 [ 33.547397] ret_from_fork+0x10/0x20 [ 33.547650] [ 33.547700] The buggy address belongs to the object at fff00000c9c2de00 [ 33.547700] which belongs to the cache kmalloc-64 of size 64 [ 33.548021] The buggy address is located 0 bytes to the right of [ 33.548021] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.548232] [ 33.548452] The buggy address belongs to the physical page: [ 33.548546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.548634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.548731] page_type: f5(slab) [ 33.548785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.548860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.548939] page dumped because: kasan: bad access detected [ 33.549234] [ 33.549461] Memory state around the buggy address: [ 33.549779] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.549847] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.549984] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.550076] ^ [ 33.550459] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.550537] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.550637] ================================================================== [ 33.375221] ================================================================== [ 33.376159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.376250] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.376704] [ 33.377033] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.377956] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.378243] Hardware name: linux,dummy-virt (DT) [ 33.378399] Call trace: [ 33.378564] show_stack+0x20/0x38 (C) [ 33.378626] dump_stack_lvl+0x8c/0xd0 [ 33.378857] print_report+0x118/0x5e8 [ 33.379251] kasan_report+0xdc/0x128 [ 33.379365] kasan_check_range+0x100/0x1a8 [ 33.379971] __kasan_check_write+0x20/0x30 [ 33.380036] kasan_atomics_helper+0xa04/0x4858 [ 33.380098] kasan_atomics+0x198/0x2e0 [ 33.380144] kunit_try_run_case+0x170/0x3f0 [ 33.380610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.380675] kthread+0x328/0x630 [ 33.380719] ret_from_fork+0x10/0x20 [ 33.381162] [ 33.381201] Allocated by task 298: [ 33.381236] kasan_save_stack+0x3c/0x68 [ 33.381504] kasan_save_track+0x20/0x40 [ 33.381545] kasan_save_alloc_info+0x40/0x58 [ 33.381917] __kasan_kmalloc+0xd4/0xd8 [ 33.382173] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.382220] kasan_atomics+0xb8/0x2e0 [ 33.382597] kunit_try_run_case+0x170/0x3f0 [ 33.382649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.382696] kthread+0x328/0x630 [ 33.382733] ret_from_fork+0x10/0x20 [ 33.382770] [ 33.383352] The buggy address belongs to the object at fff00000c9c2de00 [ 33.383352] which belongs to the cache kmalloc-64 of size 64 [ 33.383694] The buggy address is located 0 bytes to the right of [ 33.383694] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.384174] [ 33.385142] The buggy address belongs to the physical page: [ 33.385422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.385558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.385702] page_type: f5(slab) [ 33.385754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.386066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.386257] page dumped because: kasan: bad access detected [ 33.386330] [ 33.386374] Memory state around the buggy address: [ 33.386658] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.386796] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.386842] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.387163] ^ [ 33.387516] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.387568] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.387884] ================================================================== [ 33.338358] ================================================================== [ 33.338409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.338465] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.338517] [ 33.338550] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.338640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.338673] Hardware name: linux,dummy-virt (DT) [ 33.338704] Call trace: [ 33.338727] show_stack+0x20/0x38 (C) [ 33.338775] dump_stack_lvl+0x8c/0xd0 [ 33.338825] print_report+0x118/0x5e8 [ 33.338870] kasan_report+0xdc/0x128 [ 33.339325] __asan_report_load4_noabort+0x20/0x30 [ 33.339400] kasan_atomics_helper+0x42d8/0x4858 [ 33.339540] kasan_atomics+0x198/0x2e0 [ 33.340014] kunit_try_run_case+0x170/0x3f0 [ 33.340509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.340585] kthread+0x328/0x630 [ 33.340944] ret_from_fork+0x10/0x20 [ 33.340998] [ 33.341019] Allocated by task 298: [ 33.341051] kasan_save_stack+0x3c/0x68 [ 33.341651] kasan_save_track+0x20/0x40 [ 33.341711] kasan_save_alloc_info+0x40/0x58 [ 33.341755] __kasan_kmalloc+0xd4/0xd8 [ 33.342380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.342793] kasan_atomics+0xb8/0x2e0 [ 33.343037] kunit_try_run_case+0x170/0x3f0 [ 33.343082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.343129] kthread+0x328/0x630 [ 33.343165] ret_from_fork+0x10/0x20 [ 33.343204] [ 33.343226] The buggy address belongs to the object at fff00000c9c2de00 [ 33.343226] which belongs to the cache kmalloc-64 of size 64 [ 33.343288] The buggy address is located 0 bytes to the right of [ 33.343288] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.343355] [ 33.344463] The buggy address belongs to the physical page: [ 33.344506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.344843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.344895] page_type: f5(slab) [ 33.344946] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.345000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.345043] page dumped because: kasan: bad access detected [ 33.345074] [ 33.345624] Memory state around the buggy address: [ 33.345667] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.345717] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.346036] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.346080] ^ [ 33.346119] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.346701] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.346751] ================================================================== [ 33.600776] ================================================================== [ 33.601053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.601125] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.602057] [ 33.602144] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.602303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.602388] Hardware name: linux,dummy-virt (DT) [ 33.602424] Call trace: [ 33.602449] show_stack+0x20/0x38 (C) [ 33.602693] dump_stack_lvl+0x8c/0xd0 [ 33.602811] print_report+0x118/0x5e8 [ 33.603190] kasan_report+0xdc/0x128 [ 33.603373] kasan_check_range+0x100/0x1a8 [ 33.603589] __kasan_check_write+0x20/0x30 [ 33.604005] kasan_atomics_helper+0x1414/0x4858 [ 33.604561] kasan_atomics+0x198/0x2e0 [ 33.604766] kunit_try_run_case+0x170/0x3f0 [ 33.604876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.604945] kthread+0x328/0x630 [ 33.605126] ret_from_fork+0x10/0x20 [ 33.605344] [ 33.605537] Allocated by task 298: [ 33.605628] kasan_save_stack+0x3c/0x68 [ 33.605915] kasan_save_track+0x20/0x40 [ 33.606074] kasan_save_alloc_info+0x40/0x58 [ 33.606410] __kasan_kmalloc+0xd4/0xd8 [ 33.606643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.606838] kasan_atomics+0xb8/0x2e0 [ 33.607224] kunit_try_run_case+0x170/0x3f0 [ 33.607333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.607382] kthread+0x328/0x630 [ 33.607548] ret_from_fork+0x10/0x20 [ 33.608023] [ 33.608076] The buggy address belongs to the object at fff00000c9c2de00 [ 33.608076] which belongs to the cache kmalloc-64 of size 64 [ 33.608421] The buggy address is located 0 bytes to the right of [ 33.608421] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.608540] [ 33.608609] The buggy address belongs to the physical page: [ 33.608867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.608950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.609060] page_type: f5(slab) [ 33.609469] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.609572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.610101] page dumped because: kasan: bad access detected [ 33.610187] [ 33.610365] Memory state around the buggy address: [ 33.610490] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.610729] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.611107] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.611321] ^ [ 33.611435] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.611530] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.611667] ================================================================== [ 33.090069] ================================================================== [ 33.090127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 33.091032] Call trace: [ 33.091849] __kasan_check_read+0x20/0x30 [ 33.093200] kthread+0x328/0x630 [ 33.093736] [ 33.094631] kasan_save_alloc_info+0x40/0x58 [ 33.095325] kunit_try_run_case+0x170/0x3f0 [ 33.096337] [ 33.096876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.098128] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.099982] ================================================================== [ 33.412262] ================================================================== [ 33.412314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.412366] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.412418] [ 33.412449] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.413936] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.413990] Hardware name: linux,dummy-virt (DT) [ 33.414026] Call trace: [ 33.414638] show_stack+0x20/0x38 (C) [ 33.414865] dump_stack_lvl+0x8c/0xd0 [ 33.415218] print_report+0x118/0x5e8 [ 33.415563] kasan_report+0xdc/0x128 [ 33.416056] __asan_report_load4_noabort+0x20/0x30 [ 33.416439] kasan_atomics_helper+0x3dcc/0x4858 [ 33.416498] kasan_atomics+0x198/0x2e0 [ 33.416885] kunit_try_run_case+0x170/0x3f0 [ 33.417252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.417357] kthread+0x328/0x630 [ 33.418861] __kasan_kmalloc+0xd4/0xd8 [ 33.420660] ret_from_fork+0x10/0x20 [ 33.421243] [ 33.422042] page_type: f5(slab) [ 33.423659] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.424985] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.427161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.427302] dump_stack_lvl+0x8c/0xd0 [ 33.429061] kasan_atomics_helper+0xb70/0x4858 [ 33.429367] kthread+0x328/0x630 [ 33.431029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.432719] [ 33.433135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.434449] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434925] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.438817] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.439130] Hardware name: linux,dummy-virt (DT) [ 33.439328] Call trace: [ 33.439490] dump_stack_lvl+0x8c/0xd0 [ 33.439681] kasan_atomics_helper+0x3dbc/0x4858 [ 33.439939] ret_from_fork+0x10/0x20 [ 33.442674] kasan_atomics+0xb8/0x2e0 [ 33.444919] The buggy address is located 0 bytes to the right of [ 33.444919] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.447230] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.447695] ^ [ 33.451609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 33.452066] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.452396] __kasan_check_write+0x20/0x30 [ 33.455984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.456307] __kasan_kmalloc+0xd4/0xd8 [ 33.456463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.457129] page dumped because: kasan: bad access detected [ 33.457292] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.458058] ================================================================== [ 33.557093] ================================================================== [ 33.557147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.557501] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.557707] [ 33.557753] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.557847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.557879] Hardware name: linux,dummy-virt (DT) [ 33.557923] Call trace: [ 33.557947] show_stack+0x20/0x38 (C) [ 33.558166] dump_stack_lvl+0x8c/0xd0 [ 33.558476] print_report+0x118/0x5e8 [ 33.558527] kasan_report+0xdc/0x128 [ 33.558571] kasan_check_range+0x100/0x1a8 [ 33.558618] __kasan_check_write+0x20/0x30 [ 33.559009] kasan_atomics_helper+0x11f8/0x4858 [ 33.559338] kasan_atomics+0x198/0x2e0 [ 33.559469] kunit_try_run_case+0x170/0x3f0 [ 33.559524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.559607] kthread+0x328/0x630 [ 33.560026] ret_from_fork+0x10/0x20 [ 33.560257] [ 33.560298] Allocated by task 298: [ 33.560332] kasan_save_stack+0x3c/0x68 [ 33.560377] kasan_save_track+0x20/0x40 [ 33.560461] kasan_save_alloc_info+0x40/0x58 [ 33.560508] __kasan_kmalloc+0xd4/0xd8 [ 33.560546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.560592] kasan_atomics+0xb8/0x2e0 [ 33.560963] kunit_try_run_case+0x170/0x3f0 [ 33.561046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.561284] kthread+0x328/0x630 [ 33.561475] ret_from_fork+0x10/0x20 [ 33.561537] [ 33.561561] The buggy address belongs to the object at fff00000c9c2de00 [ 33.561561] which belongs to the cache kmalloc-64 of size 64 [ 33.561871] The buggy address is located 0 bytes to the right of [ 33.561871] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.562259] [ 33.562469] The buggy address belongs to the physical page: [ 33.562699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.562789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.563181] page_type: f5(slab) [ 33.563446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.563649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.563745] page dumped because: kasan: bad access detected [ 33.563880] [ 33.563960] Memory state around the buggy address: [ 33.564187] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.564395] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.564722] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.564794] ^ [ 33.564920] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.564987] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.565144] ================================================================== [ 33.616892] ================================================================== [ 33.616962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.617016] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.617068] [ 33.617101] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.617190] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.617222] Hardware name: linux,dummy-virt (DT) [ 33.617255] Call trace: [ 33.617279] show_stack+0x20/0x38 (C) [ 33.617327] dump_stack_lvl+0x8c/0xd0 [ 33.617375] print_report+0x118/0x5e8 [ 33.617419] kasan_report+0xdc/0x128 [ 33.617463] kasan_check_range+0x100/0x1a8 [ 33.617510] __kasan_check_write+0x20/0x30 [ 33.617557] kasan_atomics_helper+0x14e4/0x4858 [ 33.617607] kasan_atomics+0x198/0x2e0 [ 33.617655] kunit_try_run_case+0x170/0x3f0 [ 33.617702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.617754] kthread+0x328/0x630 [ 33.617797] ret_from_fork+0x10/0x20 [ 33.617845] [ 33.617867] Allocated by task 298: [ 33.617905] kasan_save_stack+0x3c/0x68 [ 33.617946] kasan_save_track+0x20/0x40 [ 33.617984] kasan_save_alloc_info+0x40/0x58 [ 33.618086] __kasan_kmalloc+0xd4/0xd8 [ 33.618142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.618186] kasan_atomics+0xb8/0x2e0 [ 33.618277] kunit_try_run_case+0x170/0x3f0 [ 33.618323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.618373] kthread+0x328/0x630 [ 33.618489] ret_from_fork+0x10/0x20 [ 33.618532] [ 33.618555] The buggy address belongs to the object at fff00000c9c2de00 [ 33.618555] which belongs to the cache kmalloc-64 of size 64 [ 33.618613] The buggy address is located 0 bytes to the right of [ 33.618613] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.618677] [ 33.618700] The buggy address belongs to the physical page: [ 33.618735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.618789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.619157] page_type: f5(slab) [ 33.619224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.619474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.619560] page dumped because: kasan: bad access detected [ 33.619671] [ 33.619697] Memory state around the buggy address: [ 33.619733] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.619778] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.620067] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.620123] ^ [ 33.620217] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.620439] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.620503] ================================================================== [ 33.469381] ================================================================== [ 33.469451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.469506] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.469574] [ 33.469623] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.469735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.469785] Hardware name: linux,dummy-virt (DT) [ 33.469834] Call trace: [ 33.469858] show_stack+0x20/0x38 (C) [ 33.469917] dump_stack_lvl+0x8c/0xd0 [ 33.469963] print_report+0x118/0x5e8 [ 33.470008] kasan_report+0xdc/0x128 [ 33.470052] kasan_check_range+0x100/0x1a8 [ 33.470119] __kasan_check_write+0x20/0x30 [ 33.470168] kasan_atomics_helper+0xd3c/0x4858 [ 33.470218] kasan_atomics+0x198/0x2e0 [ 33.470497] kunit_try_run_case+0x170/0x3f0 [ 33.470604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.470679] kthread+0x328/0x630 [ 33.470723] ret_from_fork+0x10/0x20 [ 33.470782] [ 33.470821] Allocated by task 298: [ 33.470870] kasan_save_stack+0x3c/0x68 [ 33.470922] kasan_save_track+0x20/0x40 [ 33.470977] kasan_save_alloc_info+0x40/0x58 [ 33.471037] __kasan_kmalloc+0xd4/0xd8 [ 33.471072] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.471115] kasan_atomics+0xb8/0x2e0 [ 33.471184] kunit_try_run_case+0x170/0x3f0 [ 33.471241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.471308] kthread+0x328/0x630 [ 33.471363] ret_from_fork+0x10/0x20 [ 33.471431] [ 33.471459] The buggy address belongs to the object at fff00000c9c2de00 [ 33.471459] which belongs to the cache kmalloc-64 of size 64 [ 33.471519] The buggy address is located 0 bytes to the right of [ 33.471519] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.471585] [ 33.471625] The buggy address belongs to the physical page: [ 33.471862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.471942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.471993] page_type: f5(slab) [ 33.472030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.472098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.472140] page dumped because: kasan: bad access detected [ 33.472213] [ 33.472253] Memory state around the buggy address: [ 33.472288] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.472365] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.472409] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.472462] ^ [ 33.472498] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.472571] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.472657] ================================================================== [ 33.400626] ================================================================== [ 33.400681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.400734] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.400787] [ 33.400818] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.402424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.402769] Hardware name: linux,dummy-virt (DT) [ 33.402810] Call trace: [ 33.403104] show_stack+0x20/0x38 (C) [ 33.403163] dump_stack_lvl+0x8c/0xd0 [ 33.403216] print_report+0x118/0x5e8 [ 33.403263] kasan_report+0xdc/0x128 [ 33.403309] kasan_check_range+0x100/0x1a8 [ 33.403357] __kasan_check_write+0x20/0x30 [ 33.404089] kasan_atomics_helper+0xad4/0x4858 [ 33.404577] kasan_atomics+0x198/0x2e0 [ 33.404703] kunit_try_run_case+0x170/0x3f0 [ 33.404753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.405202] kthread+0x328/0x630 [ 33.405478] ret_from_fork+0x10/0x20 [ 33.405580] [ 33.405601] Allocated by task 298: [ 33.406084] kasan_save_stack+0x3c/0x68 [ 33.406135] kasan_save_track+0x20/0x40 [ 33.406182] kasan_save_alloc_info+0x40/0x58 [ 33.406223] __kasan_kmalloc+0xd4/0xd8 [ 33.406259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.406303] kasan_atomics+0xb8/0x2e0 [ 33.407105] kunit_try_run_case+0x170/0x3f0 [ 33.407388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.407773] kthread+0x328/0x630 [ 33.407985] ret_from_fork+0x10/0x20 [ 33.408110] [ 33.408133] The buggy address belongs to the object at fff00000c9c2de00 [ 33.408133] which belongs to the cache kmalloc-64 of size 64 [ 33.408724] The buggy address is located 0 bytes to the right of [ 33.408724] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.408930] [ 33.409042] The buggy address belongs to the physical page: [ 33.409081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.409415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.409470] page_type: f5(slab) [ 33.409612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.409828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.409873] page dumped because: kasan: bad access detected [ 33.410545] [ 33.410936] Memory state around the buggy address: [ 33.411060] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.411330] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.411552] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.411719] ^ [ 33.411789] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.411835] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.411877] ================================================================== [ 33.466263] ================================================================== [ 33.466314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.466373] Read of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.466425] [ 33.466456] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.466545] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.466577] Hardware name: linux,dummy-virt (DT) [ 33.466610] Call trace: [ 33.466633] show_stack+0x20/0x38 (C) [ 33.466684] dump_stack_lvl+0x8c/0xd0 [ 33.466732] print_report+0x118/0x5e8 [ 33.466778] kasan_report+0xdc/0x128 [ 33.466823] __asan_report_load4_noabort+0x20/0x30 [ 33.466873] kasan_atomics_helper+0x3dd8/0x4858 [ 33.466955] kasan_atomics+0x198/0x2e0 [ 33.467016] kunit_try_run_case+0x170/0x3f0 [ 33.467073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.467129] kthread+0x328/0x630 [ 33.467171] ret_from_fork+0x10/0x20 [ 33.467220] [ 33.467239] Allocated by task 298: [ 33.467269] kasan_save_stack+0x3c/0x68 [ 33.467315] kasan_save_track+0x20/0x40 [ 33.467365] kasan_save_alloc_info+0x40/0x58 [ 33.467413] __kasan_kmalloc+0xd4/0xd8 [ 33.467449] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.467492] kasan_atomics+0xb8/0x2e0 [ 33.467529] kunit_try_run_case+0x170/0x3f0 [ 33.467567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.467622] kthread+0x328/0x630 [ 33.467658] ret_from_fork+0x10/0x20 [ 33.467693] [ 33.467713] The buggy address belongs to the object at fff00000c9c2de00 [ 33.467713] which belongs to the cache kmalloc-64 of size 64 [ 33.467780] The buggy address is located 0 bytes to the right of [ 33.467780] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.467845] [ 33.467875] The buggy address belongs to the physical page: [ 33.467920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.467974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.468022] page_type: f5(slab) [ 33.468060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.468111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.468153] page dumped because: kasan: bad access detected [ 33.468185] [ 33.468204] Memory state around the buggy address: [ 33.468237] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.468282] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.468662] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.468711] ^ [ 33.468749] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468822] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468888] ================================================================== [ 33.492596] ================================================================== [ 33.492797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.492886] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.493012] [ 33.493080] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.493213] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.493282] Hardware name: linux,dummy-virt (DT) [ 33.493354] Call trace: [ 33.493419] show_stack+0x20/0x38 (C) [ 33.493505] dump_stack_lvl+0x8c/0xd0 [ 33.493552] print_report+0x118/0x5e8 [ 33.493842] kasan_report+0xdc/0x128 [ 33.493934] __asan_report_store8_noabort+0x20/0x30 [ 33.494089] kasan_atomics_helper+0x3e5c/0x4858 [ 33.494189] kasan_atomics+0x198/0x2e0 [ 33.494285] kunit_try_run_case+0x170/0x3f0 [ 33.494414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.494720] kthread+0x328/0x630 [ 33.494884] ret_from_fork+0x10/0x20 [ 33.495013] [ 33.495053] Allocated by task 298: [ 33.495084] kasan_save_stack+0x3c/0x68 [ 33.495136] kasan_save_track+0x20/0x40 [ 33.495353] kasan_save_alloc_info+0x40/0x58 [ 33.495509] __kasan_kmalloc+0xd4/0xd8 [ 33.495619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.495706] kasan_atomics+0xb8/0x2e0 [ 33.496016] kunit_try_run_case+0x170/0x3f0 [ 33.496111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496200] kthread+0x328/0x630 [ 33.496269] ret_from_fork+0x10/0x20 [ 33.496307] [ 33.496330] The buggy address belongs to the object at fff00000c9c2de00 [ 33.496330] which belongs to the cache kmalloc-64 of size 64 [ 33.496538] The buggy address is located 0 bytes to the right of [ 33.496538] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.496783] [ 33.496823] The buggy address belongs to the physical page: [ 33.496905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.497161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.497368] page_type: f5(slab) [ 33.497459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.497591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.497678] page dumped because: kasan: bad access detected [ 33.497722] [ 33.497768] Memory state around the buggy address: [ 33.497809] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.497873] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.497932] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.497972] ^ [ 33.498368] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.498452] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.498493] ================================================================== [ 33.551623] ================================================================== [ 33.551731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.551792] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.551933] [ 33.551990] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.552221] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.552255] Hardware name: linux,dummy-virt (DT) [ 33.552289] Call trace: [ 33.552349] show_stack+0x20/0x38 (C) [ 33.552404] dump_stack_lvl+0x8c/0xd0 [ 33.552477] print_report+0x118/0x5e8 [ 33.552526] kasan_report+0xdc/0x128 [ 33.552570] kasan_check_range+0x100/0x1a8 [ 33.552617] __kasan_check_write+0x20/0x30 [ 33.552665] kasan_atomics_helper+0x1190/0x4858 [ 33.552719] kasan_atomics+0x198/0x2e0 [ 33.552778] kunit_try_run_case+0x170/0x3f0 [ 33.552828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.552887] kthread+0x328/0x630 [ 33.552950] ret_from_fork+0x10/0x20 [ 33.553000] [ 33.553021] Allocated by task 298: [ 33.553052] kasan_save_stack+0x3c/0x68 [ 33.553102] kasan_save_track+0x20/0x40 [ 33.553141] kasan_save_alloc_info+0x40/0x58 [ 33.553181] __kasan_kmalloc+0xd4/0xd8 [ 33.553217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.553260] kasan_atomics+0xb8/0x2e0 [ 33.553300] kunit_try_run_case+0x170/0x3f0 [ 33.553339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.553383] kthread+0x328/0x630 [ 33.553419] ret_from_fork+0x10/0x20 [ 33.553457] [ 33.553478] The buggy address belongs to the object at fff00000c9c2de00 [ 33.553478] which belongs to the cache kmalloc-64 of size 64 [ 33.553547] The buggy address is located 0 bytes to the right of [ 33.553547] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.553611] [ 33.553634] The buggy address belongs to the physical page: [ 33.553686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.553750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.553809] page_type: f5(slab) [ 33.553850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.554434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.554923] page dumped because: kasan: bad access detected [ 33.554998] [ 33.555060] Memory state around the buggy address: [ 33.555122] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.555210] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.555297] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.555517] ^ [ 33.555641] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556204] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556311] ================================================================== [ 33.612431] ================================================================== [ 33.612639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.612724] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.612849] [ 33.612952] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.613046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.613274] Hardware name: linux,dummy-virt (DT) [ 33.613330] Call trace: [ 33.613365] show_stack+0x20/0x38 (C) [ 33.613417] dump_stack_lvl+0x8c/0xd0 [ 33.613510] print_report+0x118/0x5e8 [ 33.613598] kasan_report+0xdc/0x128 [ 33.613844] kasan_check_range+0x100/0x1a8 [ 33.613938] __kasan_check_write+0x20/0x30 [ 33.613997] kasan_atomics_helper+0x147c/0x4858 [ 33.614049] kasan_atomics+0x198/0x2e0 [ 33.614097] kunit_try_run_case+0x170/0x3f0 [ 33.614145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.614244] kthread+0x328/0x630 [ 33.614303] ret_from_fork+0x10/0x20 [ 33.614364] [ 33.614406] Allocated by task 298: [ 33.614458] kasan_save_stack+0x3c/0x68 [ 33.614501] kasan_save_track+0x20/0x40 [ 33.614548] kasan_save_alloc_info+0x40/0x58 [ 33.614590] __kasan_kmalloc+0xd4/0xd8 [ 33.614627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.614670] kasan_atomics+0xb8/0x2e0 [ 33.614710] kunit_try_run_case+0x170/0x3f0 [ 33.614758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.614812] kthread+0x328/0x630 [ 33.614848] ret_from_fork+0x10/0x20 [ 33.614906] [ 33.614929] The buggy address belongs to the object at fff00000c9c2de00 [ 33.614929] which belongs to the cache kmalloc-64 of size 64 [ 33.614997] The buggy address is located 0 bytes to the right of [ 33.614997] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.615062] [ 33.615097] The buggy address belongs to the physical page: [ 33.615134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.615189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.615239] page_type: f5(slab) [ 33.615277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.615330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.615384] page dumped because: kasan: bad access detected [ 33.615426] [ 33.615457] Memory state around the buggy address: [ 33.615490] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.615540] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.615590] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.615640] ^ [ 33.615676] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.615719] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.615761] ================================================================== [ 33.639803] ================================================================== [ 33.640411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.640485] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.641128] [ 33.641651] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.641857] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.642173] Hardware name: linux,dummy-virt (DT) [ 33.642639] Call trace: [ 33.642854] show_stack+0x20/0x38 (C) [ 33.642972] dump_stack_lvl+0x8c/0xd0 [ 33.643295] print_report+0x118/0x5e8 [ 33.643355] kasan_report+0xdc/0x128 [ 33.643401] kasan_check_range+0x100/0x1a8 [ 33.643449] __kasan_check_write+0x20/0x30 [ 33.644094] kasan_atomics_helper+0x1644/0x4858 [ 33.644426] kasan_atomics+0x198/0x2e0 [ 33.644490] kunit_try_run_case+0x170/0x3f0 [ 33.644540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.645248] kthread+0x328/0x630 [ 33.645582] ret_from_fork+0x10/0x20 [ 33.645777] [ 33.645927] Allocated by task 298: [ 33.645963] kasan_save_stack+0x3c/0x68 [ 33.646125] kasan_save_track+0x20/0x40 [ 33.646173] kasan_save_alloc_info+0x40/0x58 [ 33.646214] __kasan_kmalloc+0xd4/0xd8 [ 33.646250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.646294] kasan_atomics+0xb8/0x2e0 [ 33.646335] kunit_try_run_case+0x170/0x3f0 [ 33.646577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.646780] kthread+0x328/0x630 [ 33.646828] ret_from_fork+0x10/0x20 [ 33.646929] [ 33.646952] The buggy address belongs to the object at fff00000c9c2de00 [ 33.646952] which belongs to the cache kmalloc-64 of size 64 [ 33.647105] The buggy address is located 0 bytes to the right of [ 33.647105] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.647427] [ 33.647600] The buggy address belongs to the physical page: [ 33.647641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.648040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.648346] page_type: f5(slab) [ 33.648714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.648806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.648857] page dumped because: kasan: bad access detected [ 33.648890] [ 33.649093] Memory state around the buggy address: [ 33.649136] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.649196] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.649308] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.649722] ^ [ 33.649781] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.649926] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.650240] ================================================================== [ 33.672845] ================================================================== [ 33.672948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.673002] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.673081] [ 33.673112] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.673333] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.673400] Hardware name: linux,dummy-virt (DT) [ 33.673445] Call trace: [ 33.673470] show_stack+0x20/0x38 (C) [ 33.673565] dump_stack_lvl+0x8c/0xd0 [ 33.673646] print_report+0x118/0x5e8 [ 33.673954] kasan_report+0xdc/0x128 [ 33.674027] __asan_report_load8_noabort+0x20/0x30 [ 33.674080] kasan_atomics_helper+0x3e10/0x4858 [ 33.674170] kasan_atomics+0x198/0x2e0 [ 33.674223] kunit_try_run_case+0x170/0x3f0 [ 33.674272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.674326] kthread+0x328/0x630 [ 33.674378] ret_from_fork+0x10/0x20 [ 33.674428] [ 33.674448] Allocated by task 298: [ 33.674478] kasan_save_stack+0x3c/0x68 [ 33.674704] kasan_save_track+0x20/0x40 [ 33.674993] kasan_save_alloc_info+0x40/0x58 [ 33.675364] __kasan_kmalloc+0xd4/0xd8 [ 33.675410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.675455] kasan_atomics+0xb8/0x2e0 [ 33.675494] kunit_try_run_case+0x170/0x3f0 [ 33.675937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.676081] kthread+0x328/0x630 [ 33.676119] ret_from_fork+0x10/0x20 [ 33.676158] [ 33.676923] The buggy address belongs to the object at fff00000c9c2de00 [ 33.676923] which belongs to the cache kmalloc-64 of size 64 [ 33.677055] The buggy address is located 0 bytes to the right of [ 33.677055] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.677360] [ 33.677387] The buggy address belongs to the physical page: [ 33.677422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.677478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.677528] page_type: f5(slab) [ 33.677766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.678194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.678272] page dumped because: kasan: bad access detected [ 33.678306] [ 33.678334] Memory state around the buggy address: [ 33.678373] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.678420] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.679178] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.679230] ^ [ 33.679682] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.680047] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.680286] ================================================================== [ 33.498978] ================================================================== [ 33.499121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.499216] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.499270] [ 33.499325] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.499436] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.499469] Hardware name: linux,dummy-virt (DT) [ 33.499549] Call trace: [ 33.499575] show_stack+0x20/0x38 (C) [ 33.499643] dump_stack_lvl+0x8c/0xd0 [ 33.499716] print_report+0x118/0x5e8 [ 33.499771] kasan_report+0xdc/0x128 [ 33.499819] kasan_check_range+0x100/0x1a8 [ 33.499868] __kasan_check_write+0x20/0x30 [ 33.499928] kasan_atomics_helper+0xeb8/0x4858 [ 33.500218] kasan_atomics+0x198/0x2e0 [ 33.500309] kunit_try_run_case+0x170/0x3f0 [ 33.500363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.500418] kthread+0x328/0x630 [ 33.500490] ret_from_fork+0x10/0x20 [ 33.500540] [ 33.500563] Allocated by task 298: [ 33.500593] kasan_save_stack+0x3c/0x68 [ 33.500634] kasan_save_track+0x20/0x40 [ 33.500705] kasan_save_alloc_info+0x40/0x58 [ 33.500747] __kasan_kmalloc+0xd4/0xd8 [ 33.500943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.501066] kasan_atomics+0xb8/0x2e0 [ 33.501154] kunit_try_run_case+0x170/0x3f0 [ 33.501216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.501261] kthread+0x328/0x630 [ 33.501447] ret_from_fork+0x10/0x20 [ 33.501487] [ 33.501516] The buggy address belongs to the object at fff00000c9c2de00 [ 33.501516] which belongs to the cache kmalloc-64 of size 64 [ 33.501720] The buggy address is located 0 bytes to the right of [ 33.501720] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.501833] [ 33.501935] The buggy address belongs to the physical page: [ 33.501999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.502204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.502257] page_type: f5(slab) [ 33.502295] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.502445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.502535] page dumped because: kasan: bad access detected [ 33.502568] [ 33.502599] Memory state around the buggy address: [ 33.502632] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.502677] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.502738] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.502778] ^ [ 33.502813] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.502857] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.503067] ================================================================== [ 33.594122] ================================================================== [ 33.594371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.594457] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.594512] [ 33.595067] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.595310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.595548] Hardware name: linux,dummy-virt (DT) [ 33.595594] Call trace: [ 33.595635] show_stack+0x20/0x38 (C) [ 33.595719] dump_stack_lvl+0x8c/0xd0 [ 33.595804] print_report+0x118/0x5e8 [ 33.595861] kasan_report+0xdc/0x128 [ 33.595949] __asan_report_load8_noabort+0x20/0x30 [ 33.596027] kasan_atomics_helper+0x3f04/0x4858 [ 33.596129] kasan_atomics+0x198/0x2e0 [ 33.596179] kunit_try_run_case+0x170/0x3f0 [ 33.596233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.596286] kthread+0x328/0x630 [ 33.596330] ret_from_fork+0x10/0x20 [ 33.596534] [ 33.596933] Allocated by task 298: [ 33.597005] kasan_save_stack+0x3c/0x68 [ 33.597106] kasan_save_track+0x20/0x40 [ 33.597198] kasan_save_alloc_info+0x40/0x58 [ 33.597287] __kasan_kmalloc+0xd4/0xd8 [ 33.597325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.597394] kasan_atomics+0xb8/0x2e0 [ 33.597729] kunit_try_run_case+0x170/0x3f0 [ 33.597809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.598132] kthread+0x328/0x630 [ 33.598305] ret_from_fork+0x10/0x20 [ 33.598360] [ 33.598392] The buggy address belongs to the object at fff00000c9c2de00 [ 33.598392] which belongs to the cache kmalloc-64 of size 64 [ 33.598454] The buggy address is located 0 bytes to the right of [ 33.598454] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.598532] [ 33.598569] The buggy address belongs to the physical page: [ 33.598607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.598676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.598745] page_type: f5(slab) [ 33.598785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.598844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.598913] page dumped because: kasan: bad access detected [ 33.598946] [ 33.598966] Memory state around the buggy address: [ 33.599011] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.599057] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.599101] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.599143] ^ [ 33.599204] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.599254] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.599303] ================================================================== [ 33.208017] ================================================================== [ 33.208271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 33.209064] [ 33.209646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.210142] Call trace: [ 33.211566] __kasan_check_write+0x20/0x30 [ 33.212117] kasan_atomics_helper+0x5b4/0x4858 [ 33.212523] kasan_atomics+0x198/0x2e0 [ 33.212751] kthread+0x328/0x630 [ 33.213562] ret_from_fork+0x10/0x20 [ 33.214188] [ 33.214269] Allocated by task 298: [ 33.216564] [ 33.217121] [ 33.218353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.220650] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.221426] ================================================================== [ 33.583795] ================================================================== [ 33.583867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.584230] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.584369] [ 33.584405] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.584499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.584678] Hardware name: linux,dummy-virt (DT) [ 33.584718] Call trace: [ 33.585110] show_stack+0x20/0x38 (C) [ 33.585651] dump_stack_lvl+0x8c/0xd0 [ 33.585733] print_report+0x118/0x5e8 [ 33.585951] kasan_report+0xdc/0x128 [ 33.586472] kasan_check_range+0x100/0x1a8 [ 33.586563] __kasan_check_write+0x20/0x30 [ 33.587355] kasan_atomics_helper+0x1384/0x4858 [ 33.587554] kasan_atomics+0x198/0x2e0 [ 33.587638] kunit_try_run_case+0x170/0x3f0 [ 33.588005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.588348] kthread+0x328/0x630 [ 33.588506] ret_from_fork+0x10/0x20 [ 33.588666] [ 33.588715] Allocated by task 298: [ 33.588767] kasan_save_stack+0x3c/0x68 [ 33.588819] kasan_save_track+0x20/0x40 [ 33.588858] kasan_save_alloc_info+0x40/0x58 [ 33.588908] __kasan_kmalloc+0xd4/0xd8 [ 33.589219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.589366] kasan_atomics+0xb8/0x2e0 [ 33.589534] kunit_try_run_case+0x170/0x3f0 [ 33.589576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.589623] kthread+0x328/0x630 [ 33.589807] ret_from_fork+0x10/0x20 [ 33.590117] [ 33.590379] The buggy address belongs to the object at fff00000c9c2de00 [ 33.590379] which belongs to the cache kmalloc-64 of size 64 [ 33.590713] The buggy address is located 0 bytes to the right of [ 33.590713] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.590890] [ 33.590965] The buggy address belongs to the physical page: [ 33.591414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.591574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.591750] page_type: f5(slab) [ 33.591832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.592065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.592163] page dumped because: kasan: bad access detected [ 33.592236] [ 33.592416] Memory state around the buggy address: [ 33.592617] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.592677] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.592722] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.592807] ^ [ 33.592855] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.592918] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.592969] ================================================================== [ 33.574476] ================================================================== [ 33.574669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.574872] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.574946] [ 33.574981] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.575180] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.575217] Hardware name: linux,dummy-virt (DT) [ 33.575251] Call trace: [ 33.575313] show_stack+0x20/0x38 (C) [ 33.575941] dump_stack_lvl+0x8c/0xd0 [ 33.576016] print_report+0x118/0x5e8 [ 33.576086] kasan_report+0xdc/0x128 [ 33.576134] kasan_check_range+0x100/0x1a8 [ 33.576181] __kasan_check_write+0x20/0x30 [ 33.576518] kasan_atomics_helper+0x12d8/0x4858 [ 33.576960] kasan_atomics+0x198/0x2e0 [ 33.577075] kunit_try_run_case+0x170/0x3f0 [ 33.577126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.577481] kthread+0x328/0x630 [ 33.577650] ret_from_fork+0x10/0x20 [ 33.577925] [ 33.578004] Allocated by task 298: [ 33.578237] kasan_save_stack+0x3c/0x68 [ 33.578558] kasan_save_track+0x20/0x40 [ 33.578866] kasan_save_alloc_info+0x40/0x58 [ 33.579093] __kasan_kmalloc+0xd4/0xd8 [ 33.579166] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.579322] kasan_atomics+0xb8/0x2e0 [ 33.579508] kunit_try_run_case+0x170/0x3f0 [ 33.579864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.580058] kthread+0x328/0x630 [ 33.580267] ret_from_fork+0x10/0x20 [ 33.580441] [ 33.580557] The buggy address belongs to the object at fff00000c9c2de00 [ 33.580557] which belongs to the cache kmalloc-64 of size 64 [ 33.580919] The buggy address is located 0 bytes to the right of [ 33.580919] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.581008] [ 33.581031] The buggy address belongs to the physical page: [ 33.581370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.581779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.581887] page_type: f5(slab) [ 33.582012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.582135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.582182] page dumped because: kasan: bad access detected [ 33.582231] [ 33.582257] Memory state around the buggy address: [ 33.582292] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.582343] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.582396] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.582442] ^ [ 33.582485] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.582529] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.582575] ================================================================== [ 33.627119] ================================================================== [ 33.627262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.627490] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.627573] [ 33.627617] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.627708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.627818] Hardware name: linux,dummy-virt (DT) [ 33.627875] Call trace: [ 33.628186] show_stack+0x20/0x38 (C) [ 33.628256] dump_stack_lvl+0x8c/0xd0 [ 33.628307] print_report+0x118/0x5e8 [ 33.628361] kasan_report+0xdc/0x128 [ 33.628406] kasan_check_range+0x100/0x1a8 [ 33.628625] __kasan_check_write+0x20/0x30 [ 33.628819] kasan_atomics_helper+0x15b4/0x4858 [ 33.628918] kasan_atomics+0x198/0x2e0 [ 33.629201] kunit_try_run_case+0x170/0x3f0 [ 33.629306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.629519] kthread+0x328/0x630 [ 33.629635] ret_from_fork+0x10/0x20 [ 33.629693] [ 33.629716] Allocated by task 298: [ 33.629807] kasan_save_stack+0x3c/0x68 [ 33.629976] kasan_save_track+0x20/0x40 [ 33.630073] kasan_save_alloc_info+0x40/0x58 [ 33.630297] __kasan_kmalloc+0xd4/0xd8 [ 33.630435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.630511] kasan_atomics+0xb8/0x2e0 [ 33.630614] kunit_try_run_case+0x170/0x3f0 [ 33.630654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.630851] kthread+0x328/0x630 [ 33.631003] ret_from_fork+0x10/0x20 [ 33.631082] [ 33.631286] The buggy address belongs to the object at fff00000c9c2de00 [ 33.631286] which belongs to the cache kmalloc-64 of size 64 [ 33.631414] The buggy address is located 0 bytes to the right of [ 33.631414] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.631520] [ 33.631584] The buggy address belongs to the physical page: [ 33.631622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.631711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.631883] page_type: f5(slab) [ 33.632037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.632212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.632415] page dumped because: kasan: bad access detected [ 33.632482] [ 33.632569] Memory state around the buggy address: [ 33.632626] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.632706] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.632791] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.632860] ^ [ 33.633062] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633121] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633161] ================================================================== [ 33.347955] ================================================================== [ 33.348868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 33.348969] Write of size 4 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.349319] [ 33.349354] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.350038] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.350074] Hardware name: linux,dummy-virt (DT) [ 33.350383] Call trace: [ 33.350496] show_stack+0x20/0x38 (C) [ 33.350686] dump_stack_lvl+0x8c/0xd0 [ 33.350990] print_report+0x118/0x5e8 [ 33.351348] kasan_report+0xdc/0x128 [ 33.351690] kasan_check_range+0x100/0x1a8 [ 33.351812] __kasan_check_write+0x20/0x30 [ 33.352245] kasan_atomics_helper+0x934/0x4858 [ 33.352616] kasan_atomics+0x198/0x2e0 [ 33.352671] kunit_try_run_case+0x170/0x3f0 [ 33.353017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.353148] kthread+0x328/0x630 [ 33.353400] ret_from_fork+0x10/0x20 [ 33.353594] [ 33.353981] Allocated by task 298: [ 33.354141] kasan_save_stack+0x3c/0x68 [ 33.354263] kasan_save_track+0x20/0x40 [ 33.356500] The buggy address belongs to the object at fff00000c9c2de00 [ 33.356500] which belongs to the cache kmalloc-64 of size 64 [ 33.356593] The buggy address is located 0 bytes to the right of [ 33.356593] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.356833] [ 33.357342] The buggy address belongs to the physical page: [ 33.357564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.357628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.357843] page_type: f5(slab) [ 33.358201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.358270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.358315] page dumped because: kasan: bad access detected [ 33.358352] [ 33.358873] Memory state around the buggy address: [ 33.359564] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.359808] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.360159] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.360248] ^ [ 33.360289] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.360333] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.360777] ================================================================== [ 33.227432] ================================================================== [ 33.227488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 33.230122] Call trace: [ 33.231799] print_report+0x118/0x5e8 [ 33.232477] kasan_atomics+0x198/0x2e0 [ 33.233415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.233471] kthread+0x328/0x630 [ 33.234340] ret_from_fork+0x10/0x20 [ 33.235442] kasan_save_stack+0x3c/0x68 [ 33.236349] kasan_save_alloc_info+0x40/0x58 [ 33.237190] kasan_atomics+0xb8/0x2e0 [ 33.237832] kthread+0x328/0x630 [ 33.237994] ret_from_fork+0x10/0x20 [ 33.238770] The buggy address is located 0 bytes to the right of [ 33.238770] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.241289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.242745] ^ [ 33.248041] ================================================================== [ 33.621195] ================================================================== [ 33.621389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.621452] Write of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.621505] [ 33.621537] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.621627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.621750] Hardware name: linux,dummy-virt (DT) [ 33.621817] Call trace: [ 33.621844] show_stack+0x20/0x38 (C) [ 33.622074] dump_stack_lvl+0x8c/0xd0 [ 33.622259] print_report+0x118/0x5e8 [ 33.622312] kasan_report+0xdc/0x128 [ 33.622362] kasan_check_range+0x100/0x1a8 [ 33.622417] __kasan_check_write+0x20/0x30 [ 33.622533] kasan_atomics_helper+0x154c/0x4858 [ 33.622589] kasan_atomics+0x198/0x2e0 [ 33.622713] kunit_try_run_case+0x170/0x3f0 [ 33.622766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.622889] kthread+0x328/0x630 [ 33.622966] ret_from_fork+0x10/0x20 [ 33.623096] [ 33.623121] Allocated by task 298: [ 33.623187] kasan_save_stack+0x3c/0x68 [ 33.623233] kasan_save_track+0x20/0x40 [ 33.623270] kasan_save_alloc_info+0x40/0x58 [ 33.623311] __kasan_kmalloc+0xd4/0xd8 [ 33.623655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.623716] kasan_atomics+0xb8/0x2e0 [ 33.623774] kunit_try_run_case+0x170/0x3f0 [ 33.624062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624213] kthread+0x328/0x630 [ 33.624283] ret_from_fork+0x10/0x20 [ 33.624323] [ 33.624346] The buggy address belongs to the object at fff00000c9c2de00 [ 33.624346] which belongs to the cache kmalloc-64 of size 64 [ 33.624552] The buggy address is located 0 bytes to the right of [ 33.624552] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.624630] [ 33.624747] The buggy address belongs to the physical page: [ 33.624803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.625139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.625212] page_type: f5(slab) [ 33.625353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.625490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.625589] page dumped because: kasan: bad access detected [ 33.625677] [ 33.625893] Memory state around the buggy address: [ 33.625947] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.626107] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.626192] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.626368] ^ [ 33.626457] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.626605] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.626646] ================================================================== [ 33.482256] ================================================================== [ 33.482414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.482466] Read of size 8 at addr fff00000c9c2de30 by task kunit_try_catch/298 [ 33.482555] [ 33.482593] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 33.482702] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.482740] Hardware name: linux,dummy-virt (DT) [ 33.482788] Call trace: [ 33.482829] show_stack+0x20/0x38 (C) [ 33.482889] dump_stack_lvl+0x8c/0xd0 [ 33.482967] print_report+0x118/0x5e8 [ 33.483035] kasan_report+0xdc/0x128 [ 33.483079] __asan_report_load8_noabort+0x20/0x30 [ 33.483151] kasan_atomics_helper+0x3f58/0x4858 [ 33.483204] kasan_atomics+0x198/0x2e0 [ 33.483253] kunit_try_run_case+0x170/0x3f0 [ 33.483308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.483607] kthread+0x328/0x630 [ 33.483669] ret_from_fork+0x10/0x20 [ 33.483738] [ 33.483764] Allocated by task 298: [ 33.483802] kasan_save_stack+0x3c/0x68 [ 33.483920] kasan_save_track+0x20/0x40 [ 33.483981] kasan_save_alloc_info+0x40/0x58 [ 33.484022] __kasan_kmalloc+0xd4/0xd8 [ 33.484148] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.484263] kasan_atomics+0xb8/0x2e0 [ 33.484331] kunit_try_run_case+0x170/0x3f0 [ 33.484386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.484433] kthread+0x328/0x630 [ 33.484466] ret_from_fork+0x10/0x20 [ 33.484620] [ 33.484852] The buggy address belongs to the object at fff00000c9c2de00 [ 33.484852] which belongs to the cache kmalloc-64 of size 64 [ 33.484954] The buggy address is located 0 bytes to the right of [ 33.484954] allocated 48-byte region [fff00000c9c2de00, fff00000c9c2de30) [ 33.485065] [ 33.485263] The buggy address belongs to the physical page: [ 33.485436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2d [ 33.485693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.485836] page_type: f5(slab) [ 33.485923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.486010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.486107] page dumped because: kasan: bad access detected [ 33.486195] [ 33.486253] Memory state around the buggy address: [ 33.486317] fff00000c9c2dd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.486386] fff00000c9c2dd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.486562] >fff00000c9c2de00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.486739] ^ [ 33.486822] fff00000c9c2de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.486868] fff00000c9c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.486917] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 32.899465] ================================================================== [ 32.899519] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 32.899571] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.899895] [ 32.899941] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.905139] kthread+0x328/0x630 [ 32.909157] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.913593] kasan_save_track+0x20/0x40 [ 32.917157] [ 32.920333] page dumped because: kasan: bad access detected [ 32.928407] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.931552] kasan_bitops_generic+0x11c/0x1c8 [ 32.932389] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.935181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.937252] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.938956] kunit_try_run_case+0x170/0x3f0 [ 32.940243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.941571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.942885] ================================================================== [ 32.855081] ================================================================== [ 32.855426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.855510] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.855572] [ 32.855667] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.855790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.855882] Hardware name: linux,dummy-virt (DT) [ 32.855925] Call trace: [ 32.855979] show_stack+0x20/0x38 (C) [ 32.856239] dump_stack_lvl+0x8c/0xd0 [ 32.856389] print_report+0x118/0x5e8 [ 32.856456] kasan_report+0xdc/0x128 [ 32.856500] kasan_check_range+0x100/0x1a8 [ 32.856678] __kasan_check_write+0x20/0x30 [ 32.856964] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.857049] kasan_bitops_generic+0x110/0x1c8 [ 32.857161] kunit_try_run_case+0x170/0x3f0 [ 32.857260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.857397] kthread+0x328/0x630 [ 32.857460] ret_from_fork+0x10/0x20 [ 32.857551] [ 32.857573] Allocated by task 294: [ 32.857749] kasan_save_stack+0x3c/0x68 [ 32.857809] kasan_save_track+0x20/0x40 [ 32.857933] kasan_save_alloc_info+0x40/0x58 [ 32.858057] __kasan_kmalloc+0xd4/0xd8 [ 32.858144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.858198] kasan_bitops_generic+0xa0/0x1c8 [ 32.858401] kunit_try_run_case+0x170/0x3f0 [ 32.858454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.858529] kthread+0x328/0x630 [ 32.858643] ret_from_fork+0x10/0x20 [ 32.858685] [ 32.858709] The buggy address belongs to the object at fff00000c60439a0 [ 32.858709] which belongs to the cache kmalloc-16 of size 16 [ 32.858769] The buggy address is located 8 bytes inside of [ 32.858769] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.858867] [ 32.858889] The buggy address belongs to the physical page: [ 32.858937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.858992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.859052] page_type: f5(slab) [ 32.859099] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.859166] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.859233] page dumped because: kasan: bad access detected [ 32.859266] [ 32.859294] Memory state around the buggy address: [ 32.859329] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.859373] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.859422] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.859463] ^ [ 32.859507] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.859560] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.859605] ================================================================== [ 32.847706] ================================================================== [ 32.847822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.847919] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.848022] [ 32.848056] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.848376] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.848440] Hardware name: linux,dummy-virt (DT) [ 32.848542] Call trace: [ 32.848591] show_stack+0x20/0x38 (C) [ 32.848663] dump_stack_lvl+0x8c/0xd0 [ 32.848778] print_report+0x118/0x5e8 [ 32.848854] kasan_report+0xdc/0x128 [ 32.849048] __asan_report_load8_noabort+0x20/0x30 [ 32.849110] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.849277] kasan_bitops_generic+0x110/0x1c8 [ 32.849381] kunit_try_run_case+0x170/0x3f0 [ 32.849503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.849639] kthread+0x328/0x630 [ 32.849706] ret_from_fork+0x10/0x20 [ 32.850012] [ 32.850106] Allocated by task 294: [ 32.850164] kasan_save_stack+0x3c/0x68 [ 32.850209] kasan_save_track+0x20/0x40 [ 32.850284] kasan_save_alloc_info+0x40/0x58 [ 32.850550] __kasan_kmalloc+0xd4/0xd8 [ 32.850703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.850782] kasan_bitops_generic+0xa0/0x1c8 [ 32.850835] kunit_try_run_case+0x170/0x3f0 [ 32.851018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.851113] kthread+0x328/0x630 [ 32.851164] ret_from_fork+0x10/0x20 [ 32.851221] [ 32.851295] The buggy address belongs to the object at fff00000c60439a0 [ 32.851295] which belongs to the cache kmalloc-16 of size 16 [ 32.851372] The buggy address is located 8 bytes inside of [ 32.851372] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.851617] [ 32.851647] The buggy address belongs to the physical page: [ 32.851700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.851864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.851960] page_type: f5(slab) [ 32.852169] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.852285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.852373] page dumped because: kasan: bad access detected [ 32.852480] [ 32.852614] Memory state around the buggy address: [ 32.852683] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.852730] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.852772] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.852978] ^ [ 32.853178] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.853245] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.853363] ================================================================== [ 32.871679] ================================================================== [ 32.871818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 32.871925] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.871980] [ 32.872029] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.872396] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.872462] Hardware name: linux,dummy-virt (DT) [ 32.872512] Call trace: [ 32.872547] show_stack+0x20/0x38 (C) [ 32.872600] dump_stack_lvl+0x8c/0xd0 [ 32.872733] print_report+0x118/0x5e8 [ 32.872801] kasan_report+0xdc/0x128 [ 32.872867] kasan_check_range+0x100/0x1a8 [ 32.873001] __kasan_check_write+0x20/0x30 [ 32.873068] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 32.873307] kasan_bitops_generic+0x110/0x1c8 [ 32.873524] kunit_try_run_case+0x170/0x3f0 [ 32.873611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.873722] kthread+0x328/0x630 [ 32.873867] ret_from_fork+0x10/0x20 [ 32.874086] [ 32.874146] Allocated by task 294: [ 32.874205] kasan_save_stack+0x3c/0x68 [ 32.874255] kasan_save_track+0x20/0x40 [ 32.874299] kasan_save_alloc_info+0x40/0x58 [ 32.874338] __kasan_kmalloc+0xd4/0xd8 [ 32.874382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.874649] kasan_bitops_generic+0xa0/0x1c8 [ 32.874804] kunit_try_run_case+0x170/0x3f0 [ 32.874884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.875026] kthread+0x328/0x630 [ 32.875099] ret_from_fork+0x10/0x20 [ 32.875237] [ 32.875298] The buggy address belongs to the object at fff00000c60439a0 [ 32.875298] which belongs to the cache kmalloc-16 of size 16 [ 32.875564] The buggy address is located 8 bytes inside of [ 32.875564] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.875747] [ 32.875810] The buggy address belongs to the physical page: [ 32.875991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.876064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.876296] page_type: f5(slab) [ 32.876358] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.876430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.876504] page dumped because: kasan: bad access detected [ 32.876606] [ 32.876665] Memory state around the buggy address: [ 32.876794] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.876922] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.876989] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.877075] ^ [ 32.877112] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.877158] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.877199] ================================================================== [ 32.883957] ================================================================== [ 32.884010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 32.884133] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.884188] [ 32.884248] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.884387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.884423] Hardware name: linux,dummy-virt (DT) [ 32.884473] Call trace: [ 32.884499] show_stack+0x20/0x38 (C) [ 32.884594] dump_stack_lvl+0x8c/0xd0 [ 32.884673] print_report+0x118/0x5e8 [ 32.884781] kasan_report+0xdc/0x128 [ 32.884828] kasan_check_range+0x100/0x1a8 [ 32.884875] __kasan_check_write+0x20/0x30 [ 32.885126] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 32.885285] kasan_bitops_generic+0x110/0x1c8 [ 32.885408] kunit_try_run_case+0x170/0x3f0 [ 32.885506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.885594] kthread+0x328/0x630 [ 32.885729] ret_from_fork+0x10/0x20 [ 32.885971] [ 32.886041] Allocated by task 294: [ 32.886188] kasan_save_stack+0x3c/0x68 [ 32.886291] kasan_save_track+0x20/0x40 [ 32.886387] kasan_save_alloc_info+0x40/0x58 [ 32.886468] __kasan_kmalloc+0xd4/0xd8 [ 32.886568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.886631] kasan_bitops_generic+0xa0/0x1c8 [ 32.886876] kunit_try_run_case+0x170/0x3f0 [ 32.887049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.887098] kthread+0x328/0x630 [ 32.887133] ret_from_fork+0x10/0x20 [ 32.887347] [ 32.887469] The buggy address belongs to the object at fff00000c60439a0 [ 32.887469] which belongs to the cache kmalloc-16 of size 16 [ 32.887579] The buggy address is located 8 bytes inside of [ 32.887579] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.887734] [ 32.887758] The buggy address belongs to the physical page: [ 32.887812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.888079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.888202] page_type: f5(slab) [ 32.888301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.888389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.888432] page dumped because: kasan: bad access detected [ 32.888570] [ 32.888594] Memory state around the buggy address: [ 32.888631] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.888736] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.888804] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.888895] ^ [ 32.888985] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.889057] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.889098] ================================================================== [ 32.841187] ================================================================== [ 32.841254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.841383] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.841556] [ 32.841613] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.841752] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.841884] Hardware name: linux,dummy-virt (DT) [ 32.841961] Call trace: [ 32.842076] show_stack+0x20/0x38 (C) [ 32.842184] dump_stack_lvl+0x8c/0xd0 [ 32.842255] print_report+0x118/0x5e8 [ 32.842521] kasan_report+0xdc/0x128 [ 32.842574] kasan_check_range+0x100/0x1a8 [ 32.842721] __kasan_check_write+0x20/0x30 [ 32.842807] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.843041] kasan_bitops_generic+0x110/0x1c8 [ 32.843199] kunit_try_run_case+0x170/0x3f0 [ 32.843264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.843354] kthread+0x328/0x630 [ 32.843606] ret_from_fork+0x10/0x20 [ 32.843683] [ 32.843737] Allocated by task 294: [ 32.843788] kasan_save_stack+0x3c/0x68 [ 32.843856] kasan_save_track+0x20/0x40 [ 32.844628] kasan_save_alloc_info+0x40/0x58 [ 32.844760] __kasan_kmalloc+0xd4/0xd8 [ 32.844841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.845040] kasan_bitops_generic+0xa0/0x1c8 [ 32.845107] kunit_try_run_case+0x170/0x3f0 [ 32.845147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.845236] kthread+0x328/0x630 [ 32.845282] ret_from_fork+0x10/0x20 [ 32.845331] [ 32.845370] The buggy address belongs to the object at fff00000c60439a0 [ 32.845370] which belongs to the cache kmalloc-16 of size 16 [ 32.845437] The buggy address is located 8 bytes inside of [ 32.845437] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.845506] [ 32.845538] The buggy address belongs to the physical page: [ 32.845585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.845651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.845701] page_type: f5(slab) [ 32.845759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.845828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.845872] page dumped because: kasan: bad access detected [ 32.845916] [ 32.845936] Memory state around the buggy address: [ 32.845981] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.846027] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.846081] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.846122] ^ [ 32.846157] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.846210] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.846261] ================================================================== [ 32.867579] ================================================================== [ 32.867783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 32.867895] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.867977] [ 32.868018] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.868177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.868212] Hardware name: linux,dummy-virt (DT) [ 32.868262] Call trace: [ 32.868288] show_stack+0x20/0x38 (C) [ 32.868418] dump_stack_lvl+0x8c/0xd0 [ 32.868472] print_report+0x118/0x5e8 [ 32.868640] kasan_report+0xdc/0x128 [ 32.868693] kasan_check_range+0x100/0x1a8 [ 32.868746] __kasan_check_write+0x20/0x30 [ 32.868988] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 32.869064] kasan_bitops_generic+0x110/0x1c8 [ 32.869125] kunit_try_run_case+0x170/0x3f0 [ 32.869173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.869228] kthread+0x328/0x630 [ 32.869271] ret_from_fork+0x10/0x20 [ 32.869320] [ 32.869341] Allocated by task 294: [ 32.869371] kasan_save_stack+0x3c/0x68 [ 32.869411] kasan_save_track+0x20/0x40 [ 32.869449] kasan_save_alloc_info+0x40/0x58 [ 32.869489] __kasan_kmalloc+0xd4/0xd8 [ 32.869526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.869569] kasan_bitops_generic+0xa0/0x1c8 [ 32.869612] kunit_try_run_case+0x170/0x3f0 [ 32.869651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.869696] kthread+0x328/0x630 [ 32.869731] ret_from_fork+0x10/0x20 [ 32.869769] [ 32.869789] The buggy address belongs to the object at fff00000c60439a0 [ 32.869789] which belongs to the cache kmalloc-16 of size 16 [ 32.869848] The buggy address is located 8 bytes inside of [ 32.869848] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.869922] [ 32.869944] The buggy address belongs to the physical page: [ 32.870038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.870105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.870156] page_type: f5(slab) [ 32.870204] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.870273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.870328] page dumped because: kasan: bad access detected [ 32.870375] [ 32.870395] Memory state around the buggy address: [ 32.870430] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.870485] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.870538] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.870583] ^ [ 32.870619] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.870664] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.870702] ================================================================== [ 32.878163] ================================================================== [ 32.878373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.878441] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.878588] [ 32.878646] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.878745] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.878779] Hardware name: linux,dummy-virt (DT) [ 32.878813] Call trace: [ 32.878836] show_stack+0x20/0x38 (C) [ 32.878886] dump_stack_lvl+0x8c/0xd0 [ 32.878988] print_report+0x118/0x5e8 [ 32.879036] kasan_report+0xdc/0x128 [ 32.879088] __asan_report_load8_noabort+0x20/0x30 [ 32.879139] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.879193] kasan_bitops_generic+0x110/0x1c8 [ 32.879252] kunit_try_run_case+0x170/0x3f0 [ 32.879301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.879369] kthread+0x328/0x630 [ 32.879412] ret_from_fork+0x10/0x20 [ 32.879461] [ 32.879490] Allocated by task 294: [ 32.879521] kasan_save_stack+0x3c/0x68 [ 32.879561] kasan_save_track+0x20/0x40 [ 32.879598] kasan_save_alloc_info+0x40/0x58 [ 32.879645] __kasan_kmalloc+0xd4/0xd8 [ 32.879682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.879724] kasan_bitops_generic+0xa0/0x1c8 [ 32.879773] kunit_try_run_case+0x170/0x3f0 [ 32.879820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.879867] kthread+0x328/0x630 [ 32.880696] ret_from_fork+0x10/0x20 [ 32.881084] [ 32.881179] The buggy address belongs to the object at fff00000c60439a0 [ 32.881179] which belongs to the cache kmalloc-16 of size 16 [ 32.881343] The buggy address is located 8 bytes inside of [ 32.881343] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.881421] [ 32.881442] The buggy address belongs to the physical page: [ 32.881605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.881670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.882086] page_type: f5(slab) [ 32.882278] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.882460] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.882547] page dumped because: kasan: bad access detected [ 32.882679] [ 32.882737] Memory state around the buggy address: [ 32.882855] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.882926] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.883145] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.883221] ^ [ 32.883360] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883419] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883459] ================================================================== [ 32.890388] ================================================================== [ 32.890513] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 32.890578] Write of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.890665] [ 32.890699] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.890794] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.890826] Hardware name: linux,dummy-virt (DT) [ 32.890859] Call trace: [ 32.890883] show_stack+0x20/0x38 (C) [ 32.890945] dump_stack_lvl+0x8c/0xd0 [ 32.890993] print_report+0x118/0x5e8 [ 32.891038] kasan_report+0xdc/0x128 [ 32.891095] kasan_check_range+0x100/0x1a8 [ 32.891317] __kasan_check_write+0x20/0x30 [ 32.891390] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 32.891789] kasan_bitops_generic+0x110/0x1c8 [ 32.891871] kunit_try_run_case+0x170/0x3f0 [ 32.891935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.891990] kthread+0x328/0x630 [ 32.892036] ret_from_fork+0x10/0x20 [ 32.892977] [ 32.893066] Allocated by task 294: [ 32.893306] kasan_save_stack+0x3c/0x68 [ 32.893445] kasan_save_track+0x20/0x40 [ 32.893483] kasan_save_alloc_info+0x40/0x58 [ 32.893524] __kasan_kmalloc+0xd4/0xd8 [ 32.893561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.893605] kasan_bitops_generic+0xa0/0x1c8 [ 32.893730] kunit_try_run_case+0x170/0x3f0 [ 32.894024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.894085] kthread+0x328/0x630 [ 32.894121] ret_from_fork+0x10/0x20 [ 32.894208] [ 32.894231] The buggy address belongs to the object at fff00000c60439a0 [ 32.894231] which belongs to the cache kmalloc-16 of size 16 [ 32.894375] The buggy address is located 8 bytes inside of [ 32.894375] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.894476] [ 32.894702] The buggy address belongs to the physical page: [ 32.894742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.894998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.895343] page_type: f5(slab) [ 32.895498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.896060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.896485] page dumped because: kasan: bad access detected [ 32.896585] [ 32.896826] Memory state around the buggy address: [ 32.896872] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.896932] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.897414] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.897460] ^ [ 32.897678] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.897738] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.897779] ================================================================== [ 32.860682] ================================================================== [ 32.860738] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 32.860875] Read of size 8 at addr fff00000c60439a8 by task kunit_try_catch/294 [ 32.860991] [ 32.861183] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.861342] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.861430] Hardware name: linux,dummy-virt (DT) [ 32.861491] Call trace: [ 32.861646] show_stack+0x20/0x38 (C) [ 32.861780] dump_stack_lvl+0x8c/0xd0 [ 32.861871] print_report+0x118/0x5e8 [ 32.861998] kasan_report+0xdc/0x128 [ 32.862096] __asan_report_load8_noabort+0x20/0x30 [ 32.862197] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 32.862293] kasan_bitops_generic+0x110/0x1c8 [ 32.862590] kunit_try_run_case+0x170/0x3f0 [ 32.862689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862809] kthread+0x328/0x630 [ 32.862858] ret_from_fork+0x10/0x20 [ 32.863085] [ 32.863117] Allocated by task 294: [ 32.863150] kasan_save_stack+0x3c/0x68 [ 32.863227] kasan_save_track+0x20/0x40 [ 32.863292] kasan_save_alloc_info+0x40/0x58 [ 32.863367] __kasan_kmalloc+0xd4/0xd8 [ 32.863467] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.863552] kasan_bitops_generic+0xa0/0x1c8 [ 32.863651] kunit_try_run_case+0x170/0x3f0 [ 32.863729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.863864] kthread+0x328/0x630 [ 32.864283] ret_from_fork+0x10/0x20 [ 32.864349] [ 32.864407] The buggy address belongs to the object at fff00000c60439a0 [ 32.864407] which belongs to the cache kmalloc-16 of size 16 [ 32.864582] The buggy address is located 8 bytes inside of [ 32.864582] allocated 9-byte region [fff00000c60439a0, fff00000c60439a9) [ 32.864702] [ 32.864813] The buggy address belongs to the physical page: [ 32.864915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106043 [ 32.865030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.865113] page_type: f5(slab) [ 32.865363] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.865478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.865639] page dumped because: kasan: bad access detected [ 32.865739] [ 32.865799] Memory state around the buggy address: [ 32.865935] fff00000c6043880: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.866036] fff00000c6043900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.866123] >fff00000c6043980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.866270] ^ [ 32.866355] fff00000c6043a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866401] fff00000c6043a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866699] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 32.830011] ================================================================== [ 32.830062] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 32.830114] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292 [ 32.830182] [ 32.830219] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.830351] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.830401] Hardware name: linux,dummy-virt (DT) [ 32.830435] Call trace: [ 32.830476] show_stack+0x20/0x38 (C) [ 32.830539] dump_stack_lvl+0x8c/0xd0 [ 32.830586] print_report+0x118/0x5e8 [ 32.830637] kasan_report+0xdc/0x128 [ 32.830680] __asan_report_load1_noabort+0x20/0x30 [ 32.830738] strnlen+0x80/0x88 [ 32.830783] kasan_strings+0x478/0xb00 [ 32.830830] kunit_try_run_case+0x170/0x3f0 [ 32.830877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.830940] kthread+0x328/0x630 [ 32.830983] ret_from_fork+0x10/0x20 [ 32.831029] [ 32.831254] Allocated by task 292: [ 32.831308] kasan_save_stack+0x3c/0x68 [ 32.831367] kasan_save_track+0x20/0x40 [ 32.831407] kasan_save_alloc_info+0x40/0x58 [ 32.831454] __kasan_kmalloc+0xd4/0xd8 [ 32.831491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.831534] kasan_strings+0xc8/0xb00 [ 32.831572] kunit_try_run_case+0x170/0x3f0 [ 32.831612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.831675] kthread+0x328/0x630 [ 32.831743] ret_from_fork+0x10/0x20 [ 32.831783] [ 32.831805] Freed by task 292: [ 32.831840] kasan_save_stack+0x3c/0x68 [ 32.831879] kasan_save_track+0x20/0x40 [ 32.831928] kasan_save_free_info+0x4c/0x78 [ 32.831967] __kasan_slab_free+0x6c/0x98 [ 32.832005] kfree+0x214/0x3c8 [ 32.832041] kasan_strings+0x24c/0xb00 [ 32.832081] kunit_try_run_case+0x170/0x3f0 [ 32.832146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.832192] kthread+0x328/0x630 [ 32.832228] ret_from_fork+0x10/0x20 [ 32.832426] [ 32.832449] The buggy address belongs to the object at fff00000c9c2cc40 [ 32.832449] which belongs to the cache kmalloc-32 of size 32 [ 32.832519] The buggy address is located 16 bytes inside of [ 32.832519] freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60) [ 32.832662] [ 32.832732] The buggy address belongs to the physical page: [ 32.832787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.832844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.832893] page_type: f5(slab) [ 32.832942] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.833012] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.833053] page dumped because: kasan: bad access detected [ 32.833085] [ 32.833105] Memory state around the buggy address: [ 32.833158] fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.833382] fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.833467] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.833582] ^ [ 32.833655] fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.833700] fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.833739] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 32.824172] ================================================================== [ 32.824224] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 32.824274] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292 [ 32.824352] [ 32.824401] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.824531] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.824598] Hardware name: linux,dummy-virt (DT) [ 32.824723] Call trace: [ 32.824783] show_stack+0x20/0x38 (C) [ 32.824931] dump_stack_lvl+0x8c/0xd0 [ 32.825012] print_report+0x118/0x5e8 [ 32.825077] kasan_report+0xdc/0x128 [ 32.825123] __asan_report_load1_noabort+0x20/0x30 [ 32.825175] strlen+0xa8/0xb0 [ 32.825219] kasan_strings+0x418/0xb00 [ 32.825325] kunit_try_run_case+0x170/0x3f0 [ 32.825376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.825431] kthread+0x328/0x630 [ 32.825473] ret_from_fork+0x10/0x20 [ 32.825587] [ 32.825655] Allocated by task 292: [ 32.825695] kasan_save_stack+0x3c/0x68 [ 32.825745] kasan_save_track+0x20/0x40 [ 32.825832] kasan_save_alloc_info+0x40/0x58 [ 32.825890] __kasan_kmalloc+0xd4/0xd8 [ 32.825944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.826011] kasan_strings+0xc8/0xb00 [ 32.826085] kunit_try_run_case+0x170/0x3f0 [ 32.826122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.826202] kthread+0x328/0x630 [ 32.826322] ret_from_fork+0x10/0x20 [ 32.826402] [ 32.826461] Freed by task 292: [ 32.826653] kasan_save_stack+0x3c/0x68 [ 32.826693] kasan_save_track+0x20/0x40 [ 32.826856] kasan_save_free_info+0x4c/0x78 [ 32.827008] __kasan_slab_free+0x6c/0x98 [ 32.827088] kfree+0x214/0x3c8 [ 32.827222] kasan_strings+0x24c/0xb00 [ 32.827310] kunit_try_run_case+0x170/0x3f0 [ 32.827395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.827520] kthread+0x328/0x630 [ 32.827565] ret_from_fork+0x10/0x20 [ 32.827603] [ 32.827779] The buggy address belongs to the object at fff00000c9c2cc40 [ 32.827779] which belongs to the cache kmalloc-32 of size 32 [ 32.827842] The buggy address is located 16 bytes inside of [ 32.827842] freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60) [ 32.827991] [ 32.828041] The buggy address belongs to the physical page: [ 32.828229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.828284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.828332] page_type: f5(slab) [ 32.828369] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.828491] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.828613] page dumped because: kasan: bad access detected [ 32.828684] [ 32.828770] Memory state around the buggy address: [ 32.828921] fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.829014] fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.829121] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.829189] ^ [ 32.829259] fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.829304] fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.829344] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 32.818393] ================================================================== [ 32.818466] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 32.818520] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292 [ 32.818572] [ 32.818605] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.818929] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.818978] Hardware name: linux,dummy-virt (DT) [ 32.819051] Call trace: [ 32.819106] show_stack+0x20/0x38 (C) [ 32.819183] dump_stack_lvl+0x8c/0xd0 [ 32.819252] print_report+0x118/0x5e8 [ 32.819350] kasan_report+0xdc/0x128 [ 32.819394] __asan_report_load1_noabort+0x20/0x30 [ 32.819463] kasan_strings+0x95c/0xb00 [ 32.819528] kunit_try_run_case+0x170/0x3f0 [ 32.819595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.819651] kthread+0x328/0x630 [ 32.819709] ret_from_fork+0x10/0x20 [ 32.819758] [ 32.819778] Allocated by task 292: [ 32.819956] kasan_save_stack+0x3c/0x68 [ 32.820178] kasan_save_track+0x20/0x40 [ 32.820257] kasan_save_alloc_info+0x40/0x58 [ 32.820319] __kasan_kmalloc+0xd4/0xd8 [ 32.820355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.820428] kasan_strings+0xc8/0xb00 [ 32.820486] kunit_try_run_case+0x170/0x3f0 [ 32.820600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.820676] kthread+0x328/0x630 [ 32.820711] ret_from_fork+0x10/0x20 [ 32.820750] [ 32.820770] Freed by task 292: [ 32.820990] kasan_save_stack+0x3c/0x68 [ 32.821030] kasan_save_track+0x20/0x40 [ 32.821068] kasan_save_free_info+0x4c/0x78 [ 32.821107] __kasan_slab_free+0x6c/0x98 [ 32.821143] kfree+0x214/0x3c8 [ 32.821181] kasan_strings+0x24c/0xb00 [ 32.821221] kunit_try_run_case+0x170/0x3f0 [ 32.821261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.821352] kthread+0x328/0x630 [ 32.821498] ret_from_fork+0x10/0x20 [ 32.821580] [ 32.821693] The buggy address belongs to the object at fff00000c9c2cc40 [ 32.821693] which belongs to the cache kmalloc-32 of size 32 [ 32.821799] The buggy address is located 16 bytes inside of [ 32.821799] freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60) [ 32.821874] [ 32.822447] The buggy address belongs to the physical page: [ 32.822490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.822561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.822611] page_type: f5(slab) [ 32.822649] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.822915] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.823002] page dumped because: kasan: bad access detected [ 32.823122] [ 32.823190] Memory state around the buggy address: [ 32.823306] fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.823397] fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.823469] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.823560] ^ [ 32.823660] fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.823750] fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.823848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 32.813094] ================================================================== [ 32.813151] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 32.813206] Read of size 1 at addr fff00000c9c2cc50 by task kunit_try_catch/292 [ 32.813258] [ 32.813293] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.813401] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.813434] Hardware name: linux,dummy-virt (DT) [ 32.813478] Call trace: [ 32.813514] show_stack+0x20/0x38 (C) [ 32.813580] dump_stack_lvl+0x8c/0xd0 [ 32.813637] print_report+0x118/0x5e8 [ 32.813683] kasan_report+0xdc/0x128 [ 32.813733] __asan_report_load1_noabort+0x20/0x30 [ 32.813791] strcmp+0xc0/0xc8 [ 32.813837] kasan_strings+0x340/0xb00 [ 32.813891] kunit_try_run_case+0x170/0x3f0 [ 32.813955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.814008] kthread+0x328/0x630 [ 32.814050] ret_from_fork+0x10/0x20 [ 32.814099] [ 32.814119] Allocated by task 292: [ 32.814149] kasan_save_stack+0x3c/0x68 [ 32.814190] kasan_save_track+0x20/0x40 [ 32.814227] kasan_save_alloc_info+0x40/0x58 [ 32.814267] __kasan_kmalloc+0xd4/0xd8 [ 32.814318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.814365] kasan_strings+0xc8/0xb00 [ 32.814404] kunit_try_run_case+0x170/0x3f0 [ 32.814442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.814515] kthread+0x328/0x630 [ 32.814550] ret_from_fork+0x10/0x20 [ 32.814588] [ 32.814914] Freed by task 292: [ 32.814943] kasan_save_stack+0x3c/0x68 [ 32.814980] kasan_save_track+0x20/0x40 [ 32.815017] kasan_save_free_info+0x4c/0x78 [ 32.815056] __kasan_slab_free+0x6c/0x98 [ 32.815093] kfree+0x214/0x3c8 [ 32.815129] kasan_strings+0x24c/0xb00 [ 32.815169] kunit_try_run_case+0x170/0x3f0 [ 32.815207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.815250] kthread+0x328/0x630 [ 32.815285] ret_from_fork+0x10/0x20 [ 32.815323] [ 32.815344] The buggy address belongs to the object at fff00000c9c2cc40 [ 32.815344] which belongs to the cache kmalloc-32 of size 32 [ 32.815427] The buggy address is located 16 bytes inside of [ 32.815427] freed 32-byte region [fff00000c9c2cc40, fff00000c9c2cc60) [ 32.815520] [ 32.815567] The buggy address belongs to the physical page: [ 32.815614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.815702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.815765] page_type: f5(slab) [ 32.815841] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.815972] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.816062] page dumped because: kasan: bad access detected [ 32.816148] [ 32.816168] Memory state around the buggy address: [ 32.816219] fff00000c9c2cb00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.816550] fff00000c9c2cb80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.816631] >fff00000c9c2cc00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.816754] ^ [ 32.816823] fff00000c9c2cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.816946] fff00000c9c2cd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.817045] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 32.800524] ================================================================== [ 32.800694] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 32.800758] Read of size 1 at addr fff00000c9c2ca98 by task kunit_try_catch/290 [ 32.800810] [ 32.800849] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.800958] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.800991] Hardware name: linux,dummy-virt (DT) [ 32.801025] Call trace: [ 32.801051] show_stack+0x20/0x38 (C) [ 32.801104] dump_stack_lvl+0x8c/0xd0 [ 32.801152] print_report+0x118/0x5e8 [ 32.801197] kasan_report+0xdc/0x128 [ 32.801243] __asan_report_load1_noabort+0x20/0x30 [ 32.801292] memcmp+0x198/0x1d8 [ 32.801340] kasan_memcmp+0x16c/0x300 [ 32.801388] kunit_try_run_case+0x170/0x3f0 [ 32.801437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.801491] kthread+0x328/0x630 [ 32.801534] ret_from_fork+0x10/0x20 [ 32.801584] [ 32.801604] Allocated by task 290: [ 32.801636] kasan_save_stack+0x3c/0x68 [ 32.801678] kasan_save_track+0x20/0x40 [ 32.801714] kasan_save_alloc_info+0x40/0x58 [ 32.801754] __kasan_kmalloc+0xd4/0xd8 [ 32.801789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.801834] kasan_memcmp+0xbc/0x300 [ 32.801872] kunit_try_run_case+0x170/0x3f0 [ 32.801921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.801967] kthread+0x328/0x630 [ 32.802000] ret_from_fork+0x10/0x20 [ 32.802038] [ 32.802059] The buggy address belongs to the object at fff00000c9c2ca80 [ 32.802059] which belongs to the cache kmalloc-32 of size 32 [ 32.802119] The buggy address is located 0 bytes to the right of [ 32.802119] allocated 24-byte region [fff00000c9c2ca80, fff00000c9c2ca98) [ 32.802184] [ 32.802205] The buggy address belongs to the physical page: [ 32.802243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c [ 32.802299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.802356] page_type: f5(slab) [ 32.802396] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.802447] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.802489] page dumped because: kasan: bad access detected [ 32.802522] [ 32.802541] Memory state around the buggy address: [ 32.802574] fff00000c9c2c980: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 32.802620] fff00000c9c2ca00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.802665] >fff00000c9c2ca80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802706] ^ [ 32.802740] fff00000c9c2cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802784] fff00000c9c2cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802825] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 32.770753] ================================================================== [ 32.771140] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 32.771301] Read of size 1 at addr ffff800080b77b4a by task kunit_try_catch/286 [ 32.771352] [ 32.771387] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.772124] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.772303] Hardware name: linux,dummy-virt (DT) [ 32.772343] Call trace: [ 32.772691] show_stack+0x20/0x38 (C) [ 32.772766] dump_stack_lvl+0x8c/0xd0 [ 32.772815] print_report+0x310/0x5e8 [ 32.772862] kasan_report+0xdc/0x128 [ 32.772916] __asan_report_load1_noabort+0x20/0x30 [ 32.772965] kasan_alloca_oob_right+0x2dc/0x340 [ 32.773015] kunit_try_run_case+0x170/0x3f0 [ 32.773279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.773519] kthread+0x328/0x630 [ 32.773569] ret_from_fork+0x10/0x20 [ 32.773762] [ 32.773829] The buggy address belongs to stack of task kunit_try_catch/286 [ 32.774150] [ 32.774173] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b70000 allocated at kernel_clone+0x150/0x7b0 [ 32.774572] The buggy address belongs to the physical page: [ 32.774610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c18 [ 32.774878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.775058] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.775284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.775333] page dumped because: kasan: bad access detected [ 32.775367] [ 32.775635] Memory state around the buggy address: [ 32.775684] ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.775731] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.776216] >ffff800080b77b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 32.776416] ^ [ 32.776585] ffff800080b77b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.776677] ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.776815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 32.760399] ================================================================== [ 32.760516] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 32.760715] Read of size 1 at addr ffff800080b77b5f by task kunit_try_catch/284 [ 32.760772] [ 32.760810] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.760921] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.760953] Hardware name: linux,dummy-virt (DT) [ 32.760988] Call trace: [ 32.761013] show_stack+0x20/0x38 (C) [ 32.761066] dump_stack_lvl+0x8c/0xd0 [ 32.761115] print_report+0x310/0x5e8 [ 32.761161] kasan_report+0xdc/0x128 [ 32.761228] __asan_report_load1_noabort+0x20/0x30 [ 32.761283] kasan_alloca_oob_left+0x2b8/0x310 [ 32.761334] kunit_try_run_case+0x170/0x3f0 [ 32.761383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.761437] kthread+0x328/0x630 [ 32.761480] ret_from_fork+0x10/0x20 [ 32.761532] [ 32.761591] The buggy address belongs to stack of task kunit_try_catch/284 [ 32.761781] [ 32.761806] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b70000 allocated at kernel_clone+0x150/0x7b0 [ 32.761959] The buggy address belongs to the physical page: [ 32.761998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c18 [ 32.762083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.762151] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.762203] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.762246] page dumped because: kasan: bad access detected [ 32.762279] [ 32.762298] Memory state around the buggy address: [ 32.762334] ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.762384] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.762429] >ffff800080b77b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 32.763205] ^ [ 32.763405] ffff800080b77b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.763544] ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.763634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 32.742283] ================================================================== [ 32.742379] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.742448] Read of size 1 at addr ffff800080b77c2a by task kunit_try_catch/282 [ 32.742500] [ 32.742541] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.742640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.742716] Hardware name: linux,dummy-virt (DT) [ 32.742755] Call trace: [ 32.742782] show_stack+0x20/0x38 (C) [ 32.742838] dump_stack_lvl+0x8c/0xd0 [ 32.742887] print_report+0x310/0x5e8 [ 32.743731] kasan_report+0xdc/0x128 [ 32.743810] __asan_report_load1_noabort+0x20/0x30 [ 32.743885] kasan_stack_oob+0x238/0x270 [ 32.744004] kunit_try_run_case+0x170/0x3f0 [ 32.744093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.744148] kthread+0x328/0x630 [ 32.744201] ret_from_fork+0x10/0x20 [ 32.744475] [ 32.744779] The buggy address belongs to stack of task kunit_try_catch/282 [ 32.745232] and is located at offset 138 in frame: [ 32.745285] kasan_stack_oob+0x0/0x270 [ 32.745802] [ 32.745887] This frame has 4 objects: [ 32.746526] [48, 49) '__assertion' [ 32.746720] [64, 72) 'array' [ 32.746807] [96, 112) '__assertion' [ 32.746972] [128, 138) 'stack_array' [ 32.747039] [ 32.747263] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080b70000 allocated at kernel_clone+0x150/0x7b0 [ 32.747784] The buggy address belongs to the physical page: [ 32.747869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c18 [ 32.748007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.748113] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.748324] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.748397] page dumped because: kasan: bad access detected [ 32.748621] [ 32.748746] Memory state around the buggy address: [ 32.748921] ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.748996] ffff800080b77b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.749078] >ffff800080b77c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.749209] ^ [ 32.749267] ffff800080b77c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.749505] ffff800080b77d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.749667] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 32.726320] ================================================================== [ 32.726410] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 32.726478] Read of size 1 at addr ffff91bcfe19068d by task kunit_try_catch/278 [ 32.726532] [ 32.726573] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.726665] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.726698] Hardware name: linux,dummy-virt (DT) [ 32.726732] Call trace: [ 32.726757] show_stack+0x20/0x38 (C) [ 32.726854] dump_stack_lvl+0x8c/0xd0 [ 32.727048] print_report+0x310/0x5e8 [ 32.727110] kasan_report+0xdc/0x128 [ 32.727173] __asan_report_load1_noabort+0x20/0x30 [ 32.727226] kasan_global_oob_right+0x230/0x270 [ 32.727293] kunit_try_run_case+0x170/0x3f0 [ 32.727346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.727418] kthread+0x328/0x630 [ 32.727465] ret_from_fork+0x10/0x20 [ 32.727535] [ 32.727683] The buggy address belongs to the variable: [ 32.727726] global_array+0xd/0x40 [ 32.727778] [ 32.727835] The buggy address belongs to a 0-page vmalloc region starting at 0xffff91bcfc2f0000 allocated at paging_init+0x66c/0x7d0 [ 32.728498] The buggy address belongs to the physical page: [ 32.728654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d90 [ 32.728761] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 32.728872] raw: 03fffe0000002000 ffffc1ffc01f6408 ffffc1ffc01f6408 0000000000000000 [ 32.728977] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.729041] page dumped because: kasan: bad access detected [ 32.729075] [ 32.729095] Memory state around the buggy address: [ 32.729148] ffff91bcfe190580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.729194] ffff91bcfe190600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 32.729403] >ffff91bcfe190680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 32.729490] ^ [ 32.729597] ffff91bcfe190700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 32.729676] ffff91bcfe190780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.729762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 32.714577] ================================================================== [ 32.714647] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.714927] Free of addr fff00000c9bfc001 by task kunit_try_catch/276 [ 32.715179] [ 32.715228] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.715546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.715693] Hardware name: linux,dummy-virt (DT) [ 32.715743] Call trace: [ 32.715772] show_stack+0x20/0x38 (C) [ 32.715827] dump_stack_lvl+0x8c/0xd0 [ 32.715885] print_report+0x118/0x5e8 [ 32.715944] kasan_report_invalid_free+0xc0/0xe8 [ 32.715993] __kasan_mempool_poison_object+0xfc/0x150 [ 32.716053] mempool_free+0x3f4/0x5f0 [ 32.716100] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.716163] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.716501] kunit_try_run_case+0x170/0x3f0 [ 32.716630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.716724] kthread+0x328/0x630 [ 32.716770] ret_from_fork+0x10/0x20 [ 32.716819] [ 32.716841] The buggy address belongs to the physical page: [ 32.716990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc [ 32.717081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.717216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.717323] page_type: f8(unknown) [ 32.717467] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.717596] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.717652] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.717861] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.718195] head: 0bfffe0000000002 ffffc1ffc326ff01 00000000ffffffff 00000000ffffffff [ 32.718303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.718422] page dumped because: kasan: bad access detected [ 32.718456] [ 32.718762] Memory state around the buggy address: [ 32.719009] fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.719071] fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.719254] >fff00000c9bfc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.719399] ^ [ 32.719538] fff00000c9bfc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.719787] fff00000c9bfc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.720400] ================================================================== [ 32.701357] ================================================================== [ 32.701452] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.701546] Free of addr fff00000c9bd9e01 by task kunit_try_catch/274 [ 32.701611] [ 32.701661] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.701754] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.701787] Hardware name: linux,dummy-virt (DT) [ 32.701819] Call trace: [ 32.701845] show_stack+0x20/0x38 (C) [ 32.701910] dump_stack_lvl+0x8c/0xd0 [ 32.701958] print_report+0x118/0x5e8 [ 32.702309] kasan_report_invalid_free+0xc0/0xe8 [ 32.702461] check_slab_allocation+0xfc/0x108 [ 32.702581] __kasan_mempool_poison_object+0x78/0x150 [ 32.702707] mempool_free+0x3f4/0x5f0 [ 32.702795] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.702878] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.702999] kunit_try_run_case+0x170/0x3f0 [ 32.703047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.703315] kthread+0x328/0x630 [ 32.703497] ret_from_fork+0x10/0x20 [ 32.703748] [ 32.703857] Allocated by task 274: [ 32.703895] kasan_save_stack+0x3c/0x68 [ 32.703954] kasan_save_track+0x20/0x40 [ 32.704004] kasan_save_alloc_info+0x40/0x58 [ 32.704045] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.704087] remove_element+0x130/0x1f8 [ 32.704432] mempool_alloc_preallocated+0x58/0xc0 [ 32.704556] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.704708] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.704825] kunit_try_run_case+0x170/0x3f0 [ 32.704947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.705016] kthread+0x328/0x630 [ 32.705103] ret_from_fork+0x10/0x20 [ 32.705234] [ 32.705261] The buggy address belongs to the object at fff00000c9bd9e00 [ 32.705261] which belongs to the cache kmalloc-128 of size 128 [ 32.705323] The buggy address is located 1 bytes inside of [ 32.705323] 128-byte region [fff00000c9bd9e00, fff00000c9bd9e80) [ 32.705384] [ 32.705406] The buggy address belongs to the physical page: [ 32.705837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 32.705963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.706058] page_type: f5(slab) [ 32.706150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.706227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.706364] page dumped because: kasan: bad access detected [ 32.706432] [ 32.706491] Memory state around the buggy address: [ 32.706565] fff00000c9bd9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.706665] fff00000c9bd9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.706762] >fff00000c9bd9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.707060] ^ [ 32.707189] fff00000c9bd9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.707253] fff00000c9bd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.707305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 32.657998] ================================================================== [ 32.658071] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.658212] Free of addr fff00000c9bd9a00 by task kunit_try_catch/268 [ 32.658372] [ 32.658517] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.658791] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.658852] Hardware name: linux,dummy-virt (DT) [ 32.658886] Call trace: [ 32.658918] show_stack+0x20/0x38 (C) [ 32.658968] dump_stack_lvl+0x8c/0xd0 [ 32.659405] print_report+0x118/0x5e8 [ 32.659692] kasan_report_invalid_free+0xc0/0xe8 [ 32.659871] check_slab_allocation+0xd4/0x108 [ 32.659975] __kasan_mempool_poison_object+0x78/0x150 [ 32.660062] mempool_free+0x3f4/0x5f0 [ 32.660118] mempool_double_free_helper+0x150/0x2e8 [ 32.660483] mempool_kmalloc_double_free+0xc0/0x118 [ 32.660656] kunit_try_run_case+0x170/0x3f0 [ 32.660706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.660787] kthread+0x328/0x630 [ 32.660893] ret_from_fork+0x10/0x20 [ 32.660954] [ 32.660975] Allocated by task 268: [ 32.661033] kasan_save_stack+0x3c/0x68 [ 32.661076] kasan_save_track+0x20/0x40 [ 32.661112] kasan_save_alloc_info+0x40/0x58 [ 32.661151] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.661194] remove_element+0x130/0x1f8 [ 32.661233] mempool_alloc_preallocated+0x58/0xc0 [ 32.661578] mempool_double_free_helper+0x94/0x2e8 [ 32.661660] mempool_kmalloc_double_free+0xc0/0x118 [ 32.661703] kunit_try_run_case+0x170/0x3f0 [ 32.661751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.662055] kthread+0x328/0x630 [ 32.662308] ret_from_fork+0x10/0x20 [ 32.662373] [ 32.662394] Freed by task 268: [ 32.662474] kasan_save_stack+0x3c/0x68 [ 32.662591] kasan_save_track+0x20/0x40 [ 32.662627] kasan_save_free_info+0x4c/0x78 [ 32.662665] __kasan_mempool_poison_object+0xc0/0x150 [ 32.662833] mempool_free+0x3f4/0x5f0 [ 32.662999] mempool_double_free_helper+0x100/0x2e8 [ 32.663066] mempool_kmalloc_double_free+0xc0/0x118 [ 32.663108] kunit_try_run_case+0x170/0x3f0 [ 32.663306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.663358] kthread+0x328/0x630 [ 32.663392] ret_from_fork+0x10/0x20 [ 32.663646] [ 32.663679] The buggy address belongs to the object at fff00000c9bd9a00 [ 32.663679] which belongs to the cache kmalloc-128 of size 128 [ 32.663742] The buggy address is located 0 bytes inside of [ 32.663742] 128-byte region [fff00000c9bd9a00, fff00000c9bd9a80) [ 32.663801] [ 32.663822] The buggy address belongs to the physical page: [ 32.663867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 32.663933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.664342] page_type: f5(slab) [ 32.664503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.664554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.664659] page dumped because: kasan: bad access detected [ 32.664690] [ 32.664711] Memory state around the buggy address: [ 32.664742] fff00000c9bd9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.664789] fff00000c9bd9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.664855] >fff00000c9bd9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.664893] ^ [ 32.664935] fff00000c9bd9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665007] fff00000c9bd9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.665447] ================================================================== [ 32.673272] ================================================================== [ 32.673332] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.673389] Free of addr fff00000c9bf8000 by task kunit_try_catch/270 [ 32.673431] [ 32.673486] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.673578] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.673606] Hardware name: linux,dummy-virt (DT) [ 32.673642] Call trace: [ 32.673753] show_stack+0x20/0x38 (C) [ 32.673917] dump_stack_lvl+0x8c/0xd0 [ 32.674032] print_report+0x118/0x5e8 [ 32.674076] kasan_report_invalid_free+0xc0/0xe8 [ 32.674123] __kasan_mempool_poison_object+0x14c/0x150 [ 32.674178] mempool_free+0x3f4/0x5f0 [ 32.674384] mempool_double_free_helper+0x150/0x2e8 [ 32.674435] mempool_kmalloc_large_double_free+0xc0/0x118 [ 32.674486] kunit_try_run_case+0x170/0x3f0 [ 32.674534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.674596] kthread+0x328/0x630 [ 32.674797] ret_from_fork+0x10/0x20 [ 32.674931] [ 32.674956] The buggy address belongs to the physical page: [ 32.674995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8 [ 32.675389] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.675741] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.675870] page_type: f8(unknown) [ 32.675921] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.675974] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.676026] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.676077] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.676129] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff [ 32.676182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.676224] page dumped because: kasan: bad access detected [ 32.676258] [ 32.676280] Memory state around the buggy address: [ 32.676313] fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676359] fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676401] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.676442] ^ [ 32.676473] fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.677333] fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.677700] ================================================================== [ 32.691721] ================================================================== [ 32.691783] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.691838] Free of addr fff00000c9bfc000 by task kunit_try_catch/272 [ 32.691883] [ 32.691939] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.692055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.692123] Hardware name: linux,dummy-virt (DT) [ 32.692165] Call trace: [ 32.692190] show_stack+0x20/0x38 (C) [ 32.692242] dump_stack_lvl+0x8c/0xd0 [ 32.692290] print_report+0x118/0x5e8 [ 32.692344] kasan_report_invalid_free+0xc0/0xe8 [ 32.692393] __kasan_mempool_poison_pages+0xe0/0xe8 [ 32.692441] mempool_free+0x3ac/0x5f0 [ 32.692488] mempool_double_free_helper+0x150/0x2e8 [ 32.692573] mempool_page_alloc_double_free+0xbc/0x118 [ 32.692626] kunit_try_run_case+0x170/0x3f0 [ 32.692676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.692727] kthread+0x328/0x630 [ 32.692771] ret_from_fork+0x10/0x20 [ 32.692818] [ 32.692920] The buggy address belongs to the physical page: [ 32.692980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc [ 32.693082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.693202] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.693292] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.693390] page dumped because: kasan: bad access detected [ 32.693472] [ 32.693571] Memory state around the buggy address: [ 32.693616] fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.693661] fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.693729] >fff00000c9bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.693772] ^ [ 32.693805] fff00000c9bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.694244] fff00000c9bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.694326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.601654] ================================================================== [ 32.601883] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.601963] Read of size 1 at addr fff00000c9bf8000 by task kunit_try_catch/262 [ 32.602033] [ 32.602115] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.602229] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.602323] Hardware name: linux,dummy-virt (DT) [ 32.602379] Call trace: [ 32.602420] show_stack+0x20/0x38 (C) [ 32.602487] dump_stack_lvl+0x8c/0xd0 [ 32.602589] print_report+0x118/0x5e8 [ 32.602634] kasan_report+0xdc/0x128 [ 32.602703] __asan_report_load1_noabort+0x20/0x30 [ 32.602914] mempool_uaf_helper+0x314/0x340 [ 32.602975] mempool_kmalloc_large_uaf+0xc4/0x120 [ 32.603041] kunit_try_run_case+0x170/0x3f0 [ 32.603100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.603281] kthread+0x328/0x630 [ 32.603372] ret_from_fork+0x10/0x20 [ 32.603434] [ 32.603466] The buggy address belongs to the physical page: [ 32.603505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8 [ 32.603625] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.603682] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.603743] page_type: f8(unknown) [ 32.603807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.603865] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.603936] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.603994] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.604058] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff [ 32.604107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.604148] page dumped because: kasan: bad access detected [ 32.604178] [ 32.604198] Memory state around the buggy address: [ 32.604230] fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.604275] fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.604319] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.604371] ^ [ 32.604403] fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.604453] fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.604492] ================================================================== [ 32.644385] ================================================================== [ 32.644455] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.644598] Read of size 1 at addr fff00000c9bf8000 by task kunit_try_catch/266 [ 32.644649] [ 32.644688] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.644797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.644829] Hardware name: linux,dummy-virt (DT) [ 32.644860] Call trace: [ 32.644917] show_stack+0x20/0x38 (C) [ 32.645063] dump_stack_lvl+0x8c/0xd0 [ 32.645113] print_report+0x118/0x5e8 [ 32.645192] kasan_report+0xdc/0x128 [ 32.645237] __asan_report_load1_noabort+0x20/0x30 [ 32.645283] mempool_uaf_helper+0x314/0x340 [ 32.645330] mempool_page_alloc_uaf+0xc0/0x118 [ 32.645378] kunit_try_run_case+0x170/0x3f0 [ 32.645438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.645490] kthread+0x328/0x630 [ 32.645530] ret_from_fork+0x10/0x20 [ 32.645577] [ 32.645613] The buggy address belongs to the physical page: [ 32.645741] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8 [ 32.645883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.646046] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.646099] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.646139] page dumped because: kasan: bad access detected [ 32.646191] [ 32.646268] Memory state around the buggy address: [ 32.646308] fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.646454] fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.646523] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.646615] ^ [ 32.646644] fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.646686] fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.646724] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.586762] ================================================================== [ 32.586830] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.586913] Read of size 1 at addr fff00000c9bd9600 by task kunit_try_catch/260 [ 32.587135] [ 32.587187] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.587388] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.587450] Hardware name: linux,dummy-virt (DT) [ 32.587485] Call trace: [ 32.587602] show_stack+0x20/0x38 (C) [ 32.587670] dump_stack_lvl+0x8c/0xd0 [ 32.587934] print_report+0x118/0x5e8 [ 32.588000] kasan_report+0xdc/0x128 [ 32.588052] __asan_report_load1_noabort+0x20/0x30 [ 32.588103] mempool_uaf_helper+0x314/0x340 [ 32.588164] mempool_kmalloc_uaf+0xc4/0x120 [ 32.588286] kunit_try_run_case+0x170/0x3f0 [ 32.588362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.588415] kthread+0x328/0x630 [ 32.588517] ret_from_fork+0x10/0x20 [ 32.588629] [ 32.588677] Allocated by task 260: [ 32.588886] kasan_save_stack+0x3c/0x68 [ 32.588951] kasan_save_track+0x20/0x40 [ 32.589036] kasan_save_alloc_info+0x40/0x58 [ 32.589117] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.589574] remove_element+0x130/0x1f8 [ 32.589761] mempool_alloc_preallocated+0x58/0xc0 [ 32.589817] mempool_uaf_helper+0xa4/0x340 [ 32.589864] mempool_kmalloc_uaf+0xc4/0x120 [ 32.590201] kunit_try_run_case+0x170/0x3f0 [ 32.590309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.590444] kthread+0x328/0x630 [ 32.590503] ret_from_fork+0x10/0x20 [ 32.590583] [ 32.590664] Freed by task 260: [ 32.590803] kasan_save_stack+0x3c/0x68 [ 32.590872] kasan_save_track+0x20/0x40 [ 32.590922] kasan_save_free_info+0x4c/0x78 [ 32.591088] __kasan_mempool_poison_object+0xc0/0x150 [ 32.591147] mempool_free+0x3f4/0x5f0 [ 32.591196] mempool_uaf_helper+0x104/0x340 [ 32.591242] mempool_kmalloc_uaf+0xc4/0x120 [ 32.591300] kunit_try_run_case+0x170/0x3f0 [ 32.591366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.591407] kthread+0x328/0x630 [ 32.591441] ret_from_fork+0x10/0x20 [ 32.591476] [ 32.591506] The buggy address belongs to the object at fff00000c9bd9600 [ 32.591506] which belongs to the cache kmalloc-128 of size 128 [ 32.591576] The buggy address is located 0 bytes inside of [ 32.591576] freed 128-byte region [fff00000c9bd9600, fff00000c9bd9680) [ 32.591637] [ 32.591667] The buggy address belongs to the physical page: [ 32.591705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 32.591762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.591813] page_type: f5(slab) [ 32.591851] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.591914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.591957] page dumped because: kasan: bad access detected [ 32.591985] [ 32.592015] Memory state around the buggy address: [ 32.592056] fff00000c9bd9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.592101] fff00000c9bd9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.592153] >fff00000c9bd9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.592192] ^ [ 32.592230] fff00000c9bd9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.592278] fff00000c9bd9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.592326] ================================================================== [ 32.614681] ================================================================== [ 32.614748] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.614800] Read of size 1 at addr fff00000c9c29240 by task kunit_try_catch/264 [ 32.614894] [ 32.616209] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.616328] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.616365] Hardware name: linux,dummy-virt (DT) [ 32.616407] Call trace: [ 32.616497] show_stack+0x20/0x38 (C) [ 32.616627] dump_stack_lvl+0x8c/0xd0 [ 32.616724] print_report+0x118/0x5e8 [ 32.616802] kasan_report+0xdc/0x128 [ 32.617194] __asan_report_load1_noabort+0x20/0x30 [ 32.617279] mempool_uaf_helper+0x314/0x340 [ 32.617394] mempool_slab_uaf+0xc0/0x118 [ 32.617504] kunit_try_run_case+0x170/0x3f0 [ 32.617592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.617719] kthread+0x328/0x630 [ 32.617795] ret_from_fork+0x10/0x20 [ 32.617931] [ 32.617953] Allocated by task 264: [ 32.617991] kasan_save_stack+0x3c/0x68 [ 32.618331] kasan_save_track+0x20/0x40 [ 32.618396] kasan_save_alloc_info+0x40/0x58 [ 32.618436] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.618477] remove_element+0x16c/0x1f8 [ 32.618519] mempool_alloc_preallocated+0x58/0xc0 [ 32.618598] mempool_uaf_helper+0xa4/0x340 [ 32.618645] mempool_slab_uaf+0xc0/0x118 [ 32.618689] kunit_try_run_case+0x170/0x3f0 [ 32.618727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.618770] kthread+0x328/0x630 [ 32.618802] ret_from_fork+0x10/0x20 [ 32.618849] [ 32.618868] Freed by task 264: [ 32.618911] kasan_save_stack+0x3c/0x68 [ 32.618948] kasan_save_track+0x20/0x40 [ 32.618992] kasan_save_free_info+0x4c/0x78 [ 32.619029] __kasan_mempool_poison_object+0xc0/0x150 [ 32.619077] mempool_free+0x3f4/0x5f0 [ 32.619115] mempool_uaf_helper+0x104/0x340 [ 32.619163] mempool_slab_uaf+0xc0/0x118 [ 32.619200] kunit_try_run_case+0x170/0x3f0 [ 32.619237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.619281] kthread+0x328/0x630 [ 32.619329] ret_from_fork+0x10/0x20 [ 32.619371] [ 32.619392] The buggy address belongs to the object at fff00000c9c29240 [ 32.619392] which belongs to the cache test_cache of size 123 [ 32.619470] The buggy address is located 0 bytes inside of [ 32.619470] freed 123-byte region [fff00000c9c29240, fff00000c9c292bb) [ 32.619542] [ 32.619562] The buggy address belongs to the physical page: [ 32.619611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c29 [ 32.619676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.619728] page_type: f5(slab) [ 32.619773] raw: 0bfffe0000000000 fff00000c1b0d8c0 dead000000000122 0000000000000000 [ 32.619831] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.619872] page dumped because: kasan: bad access detected [ 32.620375] [ 32.620427] Memory state around the buggy address: [ 32.620719] fff00000c9c29100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.621314] fff00000c9c29180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.621385] >fff00000c9c29200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.621481] ^ [ 32.621521] fff00000c9c29280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.621563] fff00000c9c29300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.621601] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.519126] ================================================================== [ 32.519206] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.519286] Read of size 1 at addr fff00000c9bd9273 by task kunit_try_catch/254 [ 32.519339] [ 32.519383] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.519481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.519511] Hardware name: linux,dummy-virt (DT) [ 32.519548] Call trace: [ 32.519573] show_stack+0x20/0x38 (C) [ 32.519625] dump_stack_lvl+0x8c/0xd0 [ 32.519676] print_report+0x118/0x5e8 [ 32.519719] kasan_report+0xdc/0x128 [ 32.519760] __asan_report_load1_noabort+0x20/0x30 [ 32.519808] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.519858] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.519924] kunit_try_run_case+0x170/0x3f0 [ 32.519973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.520025] kthread+0x328/0x630 [ 32.520067] ret_from_fork+0x10/0x20 [ 32.520116] [ 32.520137] Allocated by task 254: [ 32.520168] kasan_save_stack+0x3c/0x68 [ 32.520209] kasan_save_track+0x20/0x40 [ 32.520243] kasan_save_alloc_info+0x40/0x58 [ 32.520282] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.520323] remove_element+0x130/0x1f8 [ 32.520364] mempool_alloc_preallocated+0x58/0xc0 [ 32.520403] mempool_oob_right_helper+0x98/0x2f0 [ 32.520445] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.520484] kunit_try_run_case+0x170/0x3f0 [ 32.520522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.520677] kthread+0x328/0x630 [ 32.520713] ret_from_fork+0x10/0x20 [ 32.520748] [ 32.520768] The buggy address belongs to the object at fff00000c9bd9200 [ 32.520768] which belongs to the cache kmalloc-128 of size 128 [ 32.520828] The buggy address is located 0 bytes to the right of [ 32.520828] allocated 115-byte region [fff00000c9bd9200, fff00000c9bd9273) [ 32.520891] [ 32.520925] The buggy address belongs to the physical page: [ 32.520968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 32.521029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.521084] page_type: f5(slab) [ 32.521127] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.521177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.521217] page dumped because: kasan: bad access detected [ 32.521248] [ 32.521266] Memory state around the buggy address: [ 32.521300] fff00000c9bd9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.521343] fff00000c9bd9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.521385] >fff00000c9bd9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.521424] ^ [ 32.521466] fff00000c9bd9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.521509] fff00000c9bd9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.521545] ================================================================== [ 32.554136] ================================================================== [ 32.554207] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.554270] Read of size 1 at addr fff00000c9c1d2bb by task kunit_try_catch/258 [ 32.554427] [ 32.554473] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.554662] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.554719] Hardware name: linux,dummy-virt (DT) [ 32.554769] Call trace: [ 32.554857] show_stack+0x20/0x38 (C) [ 32.554938] dump_stack_lvl+0x8c/0xd0 [ 32.555249] print_report+0x118/0x5e8 [ 32.555323] kasan_report+0xdc/0x128 [ 32.555375] __asan_report_load1_noabort+0x20/0x30 [ 32.555433] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.555492] mempool_slab_oob_right+0xc0/0x118 [ 32.555566] kunit_try_run_case+0x170/0x3f0 [ 32.555627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.555680] kthread+0x328/0x630 [ 32.555728] ret_from_fork+0x10/0x20 [ 32.555847] [ 32.555884] Allocated by task 258: [ 32.556082] kasan_save_stack+0x3c/0x68 [ 32.556130] kasan_save_track+0x20/0x40 [ 32.556166] kasan_save_alloc_info+0x40/0x58 [ 32.556224] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.556268] remove_element+0x16c/0x1f8 [ 32.556350] mempool_alloc_preallocated+0x58/0xc0 [ 32.556489] mempool_oob_right_helper+0x98/0x2f0 [ 32.556545] mempool_slab_oob_right+0xc0/0x118 [ 32.556639] kunit_try_run_case+0x170/0x3f0 [ 32.556982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.557170] kthread+0x328/0x630 [ 32.557227] ret_from_fork+0x10/0x20 [ 32.557265] [ 32.557285] The buggy address belongs to the object at fff00000c9c1d240 [ 32.557285] which belongs to the cache test_cache of size 123 [ 32.557346] The buggy address is located 0 bytes to the right of [ 32.557346] allocated 123-byte region [fff00000c9c1d240, fff00000c9c1d2bb) [ 32.557592] [ 32.557617] The buggy address belongs to the physical page: [ 32.557653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c1d [ 32.557736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.557884] page_type: f5(slab) [ 32.557952] raw: 0bfffe0000000000 fff00000c1b0d780 dead000000000122 0000000000000000 [ 32.558081] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.558160] page dumped because: kasan: bad access detected [ 32.558271] [ 32.558330] Memory state around the buggy address: [ 32.558436] fff00000c9c1d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.558492] fff00000c9c1d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.558850] >fff00000c9c1d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.559007] ^ [ 32.559080] fff00000c9c1d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.559200] fff00000c9c1d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.559277] ================================================================== [ 32.528281] ================================================================== [ 32.529047] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.530175] Read of size 1 at addr fff00000c99a6001 by task kunit_try_catch/256 [ 32.531025] [ 32.531293] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 32.531708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.531871] Hardware name: linux,dummy-virt (DT) [ 32.532294] Call trace: [ 32.532325] show_stack+0x20/0x38 (C) [ 32.532623] dump_stack_lvl+0x8c/0xd0 [ 32.532694] print_report+0x118/0x5e8 [ 32.533313] kasan_report+0xdc/0x128 [ 32.533370] __asan_report_load1_noabort+0x20/0x30 [ 32.533420] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.533470] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.533522] kunit_try_run_case+0x170/0x3f0 [ 32.533573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.533624] kthread+0x328/0x630 [ 32.533666] ret_from_fork+0x10/0x20 [ 32.533714] [ 32.533735] The buggy address belongs to the physical page: [ 32.533771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a4 [ 32.533825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.533872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.533938] page_type: f8(unknown) [ 32.533974] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.534023] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.535320] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.535382] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.535914] head: 0bfffe0000000002 ffffc1ffc3266901 00000000ffffffff 00000000ffffffff [ 32.536558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.536936] page dumped because: kasan: bad access detected [ 32.536977] [ 32.536996] Memory state around the buggy address: [ 32.537520] fff00000c99a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.537697] fff00000c99a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.537742] >fff00000c99a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.537781] ^ [ 32.538238] fff00000c99a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.538858] fff00000c99a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.539134] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.955874] ================================================================== [ 31.955971] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 31.956049] Read of size 1 at addr fff00000c5c24a00 by task kunit_try_catch/248 [ 31.956102] [ 31.956142] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.956236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.956268] Hardware name: linux,dummy-virt (DT) [ 31.956301] Call trace: [ 31.956327] show_stack+0x20/0x38 (C) [ 31.956379] dump_stack_lvl+0x8c/0xd0 [ 31.956430] print_report+0x118/0x5e8 [ 31.956474] kasan_report+0xdc/0x128 [ 31.956516] __kasan_check_byte+0x54/0x70 [ 31.956573] kmem_cache_destroy+0x34/0x218 [ 31.956622] kmem_cache_double_destroy+0x174/0x300 [ 31.956672] kunit_try_run_case+0x170/0x3f0 [ 31.956721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.956773] kthread+0x328/0x630 [ 31.956815] ret_from_fork+0x10/0x20 [ 31.956865] [ 31.956884] Allocated by task 248: [ 31.956929] kasan_save_stack+0x3c/0x68 [ 31.956971] kasan_save_track+0x20/0x40 [ 31.957007] kasan_save_alloc_info+0x40/0x58 [ 31.957044] __kasan_slab_alloc+0xa8/0xb0 [ 31.957078] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.957122] __kmem_cache_create_args+0x178/0x280 [ 31.957162] kmem_cache_double_destroy+0xc0/0x300 [ 31.957201] kunit_try_run_case+0x170/0x3f0 [ 31.957240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.957283] kthread+0x328/0x630 [ 31.957315] ret_from_fork+0x10/0x20 [ 31.957351] [ 31.957369] Freed by task 248: [ 31.957394] kasan_save_stack+0x3c/0x68 [ 31.957429] kasan_save_track+0x20/0x40 [ 31.957463] kasan_save_free_info+0x4c/0x78 [ 31.957501] __kasan_slab_free+0x6c/0x98 [ 31.957537] kmem_cache_free+0x260/0x468 [ 31.957574] slab_kmem_cache_release+0x38/0x50 [ 31.957615] kmem_cache_release+0x1c/0x30 [ 31.957652] kobject_put+0x17c/0x420 [ 31.957690] sysfs_slab_release+0x1c/0x30 [ 31.957725] kmem_cache_destroy+0x118/0x218 [ 31.957764] kmem_cache_double_destroy+0x128/0x300 [ 31.957804] kunit_try_run_case+0x170/0x3f0 [ 31.957841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.957882] kthread+0x328/0x630 [ 31.957929] ret_from_fork+0x10/0x20 [ 31.957964] [ 31.957983] The buggy address belongs to the object at fff00000c5c24a00 [ 31.957983] which belongs to the cache kmem_cache of size 208 [ 31.958042] The buggy address is located 0 bytes inside of [ 31.958042] freed 208-byte region [fff00000c5c24a00, fff00000c5c24ad0) [ 31.958103] [ 31.958124] The buggy address belongs to the physical page: [ 31.958164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c24 [ 31.958221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.958274] page_type: f5(slab) [ 31.958314] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 31.958376] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.958417] page dumped because: kasan: bad access detected [ 31.958449] [ 31.958467] Memory state around the buggy address: [ 31.958500] fff00000c5c24900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.958543] fff00000c5c24980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.958587] >fff00000c5c24a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.958624] ^ [ 31.958654] fff00000c5c24a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.958696] fff00000c5c24b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.958736] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.885314] ================================================================== [ 31.885419] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 31.885506] Read of size 1 at addr fff00000c9a5a000 by task kunit_try_catch/246 [ 31.885557] [ 31.885602] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.885697] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.885730] Hardware name: linux,dummy-virt (DT) [ 31.885765] Call trace: [ 31.885791] show_stack+0x20/0x38 (C) [ 31.885844] dump_stack_lvl+0x8c/0xd0 [ 31.885893] print_report+0x118/0x5e8 [ 31.885955] kasan_report+0xdc/0x128 [ 31.885998] __asan_report_load1_noabort+0x20/0x30 [ 31.886047] kmem_cache_rcu_uaf+0x388/0x468 [ 31.886095] kunit_try_run_case+0x170/0x3f0 [ 31.886146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.886199] kthread+0x328/0x630 [ 31.886243] ret_from_fork+0x10/0x20 [ 31.886293] [ 31.886311] Allocated by task 246: [ 31.886342] kasan_save_stack+0x3c/0x68 [ 31.886400] kasan_save_track+0x20/0x40 [ 31.886436] kasan_save_alloc_info+0x40/0x58 [ 31.886473] __kasan_slab_alloc+0xa8/0xb0 [ 31.886509] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.886555] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.886594] kunit_try_run_case+0x170/0x3f0 [ 31.886631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.886676] kthread+0x328/0x630 [ 31.886709] ret_from_fork+0x10/0x20 [ 31.886747] [ 31.886764] Freed by task 0: [ 31.886789] kasan_save_stack+0x3c/0x68 [ 31.886823] kasan_save_track+0x20/0x40 [ 31.886858] kasan_save_free_info+0x4c/0x78 [ 31.886894] __kasan_slab_free+0x6c/0x98 [ 31.886939] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.886981] rcu_core+0x9f4/0x1e58 [ 31.887019] rcu_core_si+0x18/0x30 [ 31.887054] handle_softirqs+0x374/0xb28 [ 31.887091] __do_softirq+0x1c/0x28 [ 31.887125] [ 31.887144] Last potentially related work creation: [ 31.887169] kasan_save_stack+0x3c/0x68 [ 31.887205] kasan_record_aux_stack+0xb4/0xc8 [ 31.887243] kmem_cache_free+0x120/0x468 [ 31.887282] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.887320] kunit_try_run_case+0x170/0x3f0 [ 31.887359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.887402] kthread+0x328/0x630 [ 31.887435] ret_from_fork+0x10/0x20 [ 31.887469] [ 31.887487] The buggy address belongs to the object at fff00000c9a5a000 [ 31.887487] which belongs to the cache test_cache of size 200 [ 31.887546] The buggy address is located 0 bytes inside of [ 31.887546] freed 200-byte region [fff00000c9a5a000, fff00000c9a5a0c8) [ 31.887607] [ 31.887629] The buggy address belongs to the physical page: [ 31.887669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5a [ 31.887727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.887777] page_type: f5(slab) [ 31.887819] raw: 0bfffe0000000000 fff00000c5c248c0 dead000000000122 0000000000000000 [ 31.887868] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.887917] page dumped because: kasan: bad access detected [ 31.887948] [ 31.887965] Memory state around the buggy address: [ 31.887998] fff00000c9a59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.888042] fff00000c9a59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.888085] >fff00000c9a5a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.888123] ^ [ 31.888151] fff00000c9a5a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.888193] fff00000c9a5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.888233] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.746672] ================================================================== [ 31.746744] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.746816] Free of addr fff00000c9a5b001 by task kunit_try_catch/244 [ 31.746858] [ 31.747283] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.747394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.747426] Hardware name: linux,dummy-virt (DT) [ 31.747460] Call trace: [ 31.747485] show_stack+0x20/0x38 (C) [ 31.747687] dump_stack_lvl+0x8c/0xd0 [ 31.747754] print_report+0x118/0x5e8 [ 31.747930] kasan_report_invalid_free+0xc0/0xe8 [ 31.747985] check_slab_allocation+0xfc/0x108 [ 31.748032] __kasan_slab_pre_free+0x2c/0x48 [ 31.748156] kmem_cache_free+0xf0/0x468 [ 31.748257] kmem_cache_invalid_free+0x184/0x3c8 [ 31.748336] kunit_try_run_case+0x170/0x3f0 [ 31.748423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.748479] kthread+0x328/0x630 [ 31.748646] ret_from_fork+0x10/0x20 [ 31.748804] [ 31.748887] Allocated by task 244: [ 31.748939] kasan_save_stack+0x3c/0x68 [ 31.749008] kasan_save_track+0x20/0x40 [ 31.749077] kasan_save_alloc_info+0x40/0x58 [ 31.749125] __kasan_slab_alloc+0xa8/0xb0 [ 31.749161] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.749395] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.749505] kunit_try_run_case+0x170/0x3f0 [ 31.749602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.749681] kthread+0x328/0x630 [ 31.749799] ret_from_fork+0x10/0x20 [ 31.750100] [ 31.750155] The buggy address belongs to the object at fff00000c9a5b000 [ 31.750155] which belongs to the cache test_cache of size 200 [ 31.750219] The buggy address is located 1 bytes inside of [ 31.750219] 200-byte region [fff00000c9a5b000, fff00000c9a5b0c8) [ 31.750339] [ 31.750384] The buggy address belongs to the physical page: [ 31.750440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5b [ 31.750530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.750624] page_type: f5(slab) [ 31.750665] raw: 0bfffe0000000000 fff00000c5c24780 dead000000000122 0000000000000000 [ 31.750754] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.750812] page dumped because: kasan: bad access detected [ 31.750851] [ 31.750890] Memory state around the buggy address: [ 31.750981] fff00000c9a5af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.751054] fff00000c9a5af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.751130] >fff00000c9a5b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.751227] ^ [ 31.751550] fff00000c9a5b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.751700] fff00000c9a5b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.751770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.710725] ================================================================== [ 31.710807] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.710883] Free of addr fff00000c9a91000 by task kunit_try_catch/242 [ 31.710942] [ 31.710986] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.711080] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.711114] Hardware name: linux,dummy-virt (DT) [ 31.711148] Call trace: [ 31.711174] show_stack+0x20/0x38 (C) [ 31.711227] dump_stack_lvl+0x8c/0xd0 [ 31.711276] print_report+0x118/0x5e8 [ 31.711321] kasan_report_invalid_free+0xc0/0xe8 [ 31.711368] check_slab_allocation+0xd4/0x108 [ 31.711414] __kasan_slab_pre_free+0x2c/0x48 [ 31.711463] kmem_cache_free+0xf0/0x468 [ 31.711510] kmem_cache_double_free+0x190/0x3c8 [ 31.711559] kunit_try_run_case+0x170/0x3f0 [ 31.711609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.711663] kthread+0x328/0x630 [ 31.711704] ret_from_fork+0x10/0x20 [ 31.711752] [ 31.711770] Allocated by task 242: [ 31.711800] kasan_save_stack+0x3c/0x68 [ 31.711839] kasan_save_track+0x20/0x40 [ 31.711872] kasan_save_alloc_info+0x40/0x58 [ 31.711922] __kasan_slab_alloc+0xa8/0xb0 [ 31.711958] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.711999] kmem_cache_double_free+0x12c/0x3c8 [ 31.712038] kunit_try_run_case+0x170/0x3f0 [ 31.712075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.712116] kthread+0x328/0x630 [ 31.712149] ret_from_fork+0x10/0x20 [ 31.712183] [ 31.712202] Freed by task 242: [ 31.712229] kasan_save_stack+0x3c/0x68 [ 31.712262] kasan_save_track+0x20/0x40 [ 31.712295] kasan_save_free_info+0x4c/0x78 [ 31.712333] __kasan_slab_free+0x6c/0x98 [ 31.712366] kmem_cache_free+0x260/0x468 [ 31.712405] kmem_cache_double_free+0x140/0x3c8 [ 31.712443] kunit_try_run_case+0x170/0x3f0 [ 31.712480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.712557] kthread+0x328/0x630 [ 31.712591] ret_from_fork+0x10/0x20 [ 31.712643] [ 31.712663] The buggy address belongs to the object at fff00000c9a91000 [ 31.712663] which belongs to the cache test_cache of size 200 [ 31.712720] The buggy address is located 0 bytes inside of [ 31.712720] 200-byte region [fff00000c9a91000, fff00000c9a910c8) [ 31.712781] [ 31.712801] The buggy address belongs to the physical page: [ 31.712841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a91 [ 31.712905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.712959] page_type: f5(slab) [ 31.713000] raw: 0bfffe0000000000 fff00000c5c24640 dead000000000122 0000000000000000 [ 31.713050] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.713091] page dumped because: kasan: bad access detected [ 31.713122] [ 31.713139] Memory state around the buggy address: [ 31.713174] fff00000c9a90f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.713217] fff00000c9a90f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.713260] >fff00000c9a91000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.713298] ^ [ 31.713328] fff00000c9a91080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.713368] fff00000c9a91100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.713408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.547355] ================================================================== [ 31.547487] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.547615] Read of size 1 at addr fff00000c99c30c8 by task kunit_try_catch/240 [ 31.547705] [ 31.547751] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.548088] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.548145] Hardware name: linux,dummy-virt (DT) [ 31.548181] Call trace: [ 31.548252] show_stack+0x20/0x38 (C) [ 31.548316] dump_stack_lvl+0x8c/0xd0 [ 31.548369] print_report+0x118/0x5e8 [ 31.548430] kasan_report+0xdc/0x128 [ 31.548502] __asan_report_load1_noabort+0x20/0x30 [ 31.548664] kmem_cache_oob+0x344/0x430 [ 31.548713] kunit_try_run_case+0x170/0x3f0 [ 31.548886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.548966] kthread+0x328/0x630 [ 31.549111] ret_from_fork+0x10/0x20 [ 31.549300] [ 31.549349] Allocated by task 240: [ 31.549418] kasan_save_stack+0x3c/0x68 [ 31.549469] kasan_save_track+0x20/0x40 [ 31.549731] kasan_save_alloc_info+0x40/0x58 [ 31.549837] __kasan_slab_alloc+0xa8/0xb0 [ 31.550033] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.550406] kmem_cache_oob+0x12c/0x430 [ 31.550485] kunit_try_run_case+0x170/0x3f0 [ 31.550550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.550833] kthread+0x328/0x630 [ 31.550933] ret_from_fork+0x10/0x20 [ 31.551054] [ 31.551084] The buggy address belongs to the object at fff00000c99c3000 [ 31.551084] which belongs to the cache test_cache of size 200 [ 31.551157] The buggy address is located 0 bytes to the right of [ 31.551157] allocated 200-byte region [fff00000c99c3000, fff00000c99c30c8) [ 31.551400] [ 31.551656] The buggy address belongs to the physical page: [ 31.551704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099c3 [ 31.551789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.551866] page_type: f5(slab) [ 31.551937] raw: 0bfffe0000000000 fff00000c5c24500 dead000000000122 0000000000000000 [ 31.552003] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.552043] page dumped because: kasan: bad access detected [ 31.552082] [ 31.552108] Memory state around the buggy address: [ 31.552142] fff00000c99c2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.552185] fff00000c99c3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.552228] >fff00000c99c3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.552266] ^ [ 31.552305] fff00000c99c3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.552359] fff00000c99c3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.552397] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.510717] ================================================================== [ 31.510809] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.510880] Read of size 8 at addr fff00000c9a6bf80 by task kunit_try_catch/233 [ 31.510945] [ 31.510989] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.511082] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.511111] Hardware name: linux,dummy-virt (DT) [ 31.511143] Call trace: [ 31.511170] show_stack+0x20/0x38 (C) [ 31.511222] dump_stack_lvl+0x8c/0xd0 [ 31.511269] print_report+0x118/0x5e8 [ 31.511415] kasan_report+0xdc/0x128 [ 31.511563] __asan_report_load8_noabort+0x20/0x30 [ 31.512030] workqueue_uaf+0x480/0x4a8 [ 31.512090] kunit_try_run_case+0x170/0x3f0 [ 31.512247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.512411] kthread+0x328/0x630 [ 31.512504] ret_from_fork+0x10/0x20 [ 31.512558] [ 31.512577] Allocated by task 233: [ 31.512607] kasan_save_stack+0x3c/0x68 [ 31.512648] kasan_save_track+0x20/0x40 [ 31.512683] kasan_save_alloc_info+0x40/0x58 [ 31.512722] __kasan_kmalloc+0xd4/0xd8 [ 31.513085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.513131] workqueue_uaf+0x13c/0x4a8 [ 31.513202] kunit_try_run_case+0x170/0x3f0 [ 31.513249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.513292] kthread+0x328/0x630 [ 31.513326] ret_from_fork+0x10/0x20 [ 31.513438] [ 31.513459] Freed by task 9: [ 31.513535] kasan_save_stack+0x3c/0x68 [ 31.513574] kasan_save_track+0x20/0x40 [ 31.513609] kasan_save_free_info+0x4c/0x78 [ 31.513646] __kasan_slab_free+0x6c/0x98 [ 31.513682] kfree+0x214/0x3c8 [ 31.513716] workqueue_uaf_work+0x18/0x30 [ 31.513752] process_one_work+0x530/0xf88 [ 31.513792] worker_thread+0x618/0xf38 [ 31.513862] kthread+0x328/0x630 [ 31.513906] ret_from_fork+0x10/0x20 [ 31.513948] [ 31.513966] Last potentially related work creation: [ 31.513993] kasan_save_stack+0x3c/0x68 [ 31.514029] kasan_record_aux_stack+0xb4/0xc8 [ 31.514068] __queue_work+0x65c/0xfe0 [ 31.514105] queue_work_on+0xbc/0xf8 [ 31.514406] workqueue_uaf+0x210/0x4a8 [ 31.514501] kunit_try_run_case+0x170/0x3f0 [ 31.514555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.514648] kthread+0x328/0x630 [ 31.514681] ret_from_fork+0x10/0x20 [ 31.514717] [ 31.514735] The buggy address belongs to the object at fff00000c9a6bf80 [ 31.514735] which belongs to the cache kmalloc-32 of size 32 [ 31.514967] The buggy address is located 0 bytes inside of [ 31.514967] freed 32-byte region [fff00000c9a6bf80, fff00000c9a6bfa0) [ 31.515176] [ 31.515199] The buggy address belongs to the physical page: [ 31.515238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6b [ 31.515296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.515574] page_type: f5(slab) [ 31.515691] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.515808] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.515894] page dumped because: kasan: bad access detected [ 31.516007] [ 31.516064] Memory state around the buggy address: [ 31.516126] fff00000c9a6be80: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.516177] fff00000c9a6bf00: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 31.516277] >fff00000c9a6bf80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.516449] ^ [ 31.516490] fff00000c9a6c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.516583] fff00000c9a6c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.516622] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.481456] ================================================================== [ 31.481597] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.481672] Read of size 4 at addr fff00000c9a6bd80 by task swapper/0/0 [ 31.481720] [ 31.481761] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.481854] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.481884] Hardware name: linux,dummy-virt (DT) [ 31.481930] Call trace: [ 31.481954] show_stack+0x20/0x38 (C) [ 31.482006] dump_stack_lvl+0x8c/0xd0 [ 31.482066] print_report+0x118/0x5e8 [ 31.482122] kasan_report+0xdc/0x128 [ 31.482174] __asan_report_load4_noabort+0x20/0x30 [ 31.482233] rcu_uaf_reclaim+0x64/0x70 [ 31.482283] rcu_core+0x9f4/0x1e58 [ 31.482340] rcu_core_si+0x18/0x30 [ 31.482388] handle_softirqs+0x374/0xb28 [ 31.482546] __do_softirq+0x1c/0x28 [ 31.482588] ____do_softirq+0x18/0x30 [ 31.482632] call_on_irq_stack+0x30/0x48 [ 31.484953] do_softirq_own_stack+0x24/0x38 [ 31.485025] __irq_exit_rcu+0x1fc/0x318 [ 31.485071] irq_exit_rcu+0x1c/0x80 [ 31.485114] el1_interrupt+0x38/0x58 [ 31.485162] el1h_64_irq_handler+0x18/0x28 [ 31.485206] el1h_64_irq+0x6c/0x70 [ 31.485303] arch_local_irq_enable+0x4/0x8 (P) [ 31.485352] do_idle+0x384/0x4e8 [ 31.485396] cpu_startup_entry+0x64/0x80 [ 31.485440] rest_init+0x160/0x188 [ 31.485485] start_kernel+0x30c/0x3d0 [ 31.485535] __primary_switched+0x8c/0xa0 [ 31.485587] [ 31.485606] Allocated by task 231: [ 31.485637] kasan_save_stack+0x3c/0x68 [ 31.485681] kasan_save_track+0x20/0x40 [ 31.485718] kasan_save_alloc_info+0x40/0x58 [ 31.485754] __kasan_kmalloc+0xd4/0xd8 [ 31.485789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.485830] rcu_uaf+0xb0/0x2d8 [ 31.485865] kunit_try_run_case+0x170/0x3f0 [ 31.485926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.485972] kthread+0x328/0x630 [ 31.486088] ret_from_fork+0x10/0x20 [ 31.486179] [ 31.486266] Freed by task 0: [ 31.486323] kasan_save_stack+0x3c/0x68 [ 31.486384] kasan_save_track+0x20/0x40 [ 31.486425] kasan_save_free_info+0x4c/0x78 [ 31.486464] __kasan_slab_free+0x6c/0x98 [ 31.486500] kfree+0x214/0x3c8 [ 31.486537] rcu_uaf_reclaim+0x28/0x70 [ 31.486577] rcu_core+0x9f4/0x1e58 [ 31.486613] rcu_core_si+0x18/0x30 [ 31.486648] handle_softirqs+0x374/0xb28 [ 31.486686] __do_softirq+0x1c/0x28 [ 31.486723] [ 31.486744] Last potentially related work creation: [ 31.486770] kasan_save_stack+0x3c/0x68 [ 31.486807] kasan_record_aux_stack+0xb4/0xc8 [ 31.486846] __call_rcu_common.constprop.0+0x74/0x8c8 [ 31.486888] call_rcu+0x18/0x30 [ 31.486934] rcu_uaf+0x14c/0x2d8 [ 31.486968] kunit_try_run_case+0x170/0x3f0 [ 31.487007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.487050] kthread+0x328/0x630 [ 31.487083] ret_from_fork+0x10/0x20 [ 31.487117] [ 31.487138] The buggy address belongs to the object at fff00000c9a6bd80 [ 31.487138] which belongs to the cache kmalloc-32 of size 32 [ 31.487198] The buggy address is located 0 bytes inside of [ 31.487198] freed 32-byte region [fff00000c9a6bd80, fff00000c9a6bda0) [ 31.487259] [ 31.487280] The buggy address belongs to the physical page: [ 31.487322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6b [ 31.487380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.487433] page_type: f5(slab) [ 31.487474] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.487524] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.487566] page dumped because: kasan: bad access detected [ 31.487595] [ 31.487613] Memory state around the buggy address: [ 31.487645] fff00000c9a6bc80: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 31.487688] fff00000c9a6bd00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.487731] >fff00000c9a6bd80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 31.487770] ^ [ 31.487797] fff00000c9a6be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.487839] fff00000c9a6be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.487876] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 31.299890] ================================================================== [ 31.299972] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 31.300111] Read of size 1 at addr fff00000c99bcf78 by task kunit_try_catch/229 [ 31.300189] [ 31.300249] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.300427] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.300460] Hardware name: linux,dummy-virt (DT) [ 31.300492] Call trace: [ 31.300515] show_stack+0x20/0x38 (C) [ 31.300850] dump_stack_lvl+0x8c/0xd0 [ 31.300967] print_report+0x118/0x5e8 [ 31.301087] kasan_report+0xdc/0x128 [ 31.301191] __asan_report_load1_noabort+0x20/0x30 [ 31.301281] ksize_uaf+0x544/0x5f8 [ 31.301407] kunit_try_run_case+0x170/0x3f0 [ 31.301451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.301503] kthread+0x328/0x630 [ 31.301789] ret_from_fork+0x10/0x20 [ 31.301941] [ 31.302012] Allocated by task 229: [ 31.302081] kasan_save_stack+0x3c/0x68 [ 31.302247] kasan_save_track+0x20/0x40 [ 31.302352] kasan_save_alloc_info+0x40/0x58 [ 31.302722] __kasan_kmalloc+0xd4/0xd8 [ 31.302797] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.302916] ksize_uaf+0xb8/0x5f8 [ 31.302974] kunit_try_run_case+0x170/0x3f0 [ 31.303496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.303882] kthread+0x328/0x630 [ 31.303977] ret_from_fork+0x10/0x20 [ 31.304044] [ 31.304088] Freed by task 229: [ 31.304153] kasan_save_stack+0x3c/0x68 [ 31.304227] kasan_save_track+0x20/0x40 [ 31.304281] kasan_save_free_info+0x4c/0x78 [ 31.304421] __kasan_slab_free+0x6c/0x98 [ 31.304621] kfree+0x214/0x3c8 [ 31.304768] ksize_uaf+0x11c/0x5f8 [ 31.304807] kunit_try_run_case+0x170/0x3f0 [ 31.304843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.305138] kthread+0x328/0x630 [ 31.305318] ret_from_fork+0x10/0x20 [ 31.305402] [ 31.305805] The buggy address belongs to the object at fff00000c99bcf00 [ 31.305805] which belongs to the cache kmalloc-128 of size 128 [ 31.305879] The buggy address is located 120 bytes inside of [ 31.305879] freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80) [ 31.306124] [ 31.306333] The buggy address belongs to the physical page: [ 31.306458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.306594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.306692] page_type: f5(slab) [ 31.306795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.306846] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.307053] page dumped because: kasan: bad access detected [ 31.307240] [ 31.307284] Memory state around the buggy address: [ 31.307349] fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.307679] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.307771] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.307921] ^ [ 31.307996] fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.308099] fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.308138] ================================================================== [ 31.279873] ================================================================== [ 31.280164] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.280444] Read of size 1 at addr fff00000c99bcf00 by task kunit_try_catch/229 [ 31.280514] [ 31.281403] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.281524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.281591] Hardware name: linux,dummy-virt (DT) [ 31.281644] Call trace: [ 31.281676] show_stack+0x20/0x38 (C) [ 31.281755] dump_stack_lvl+0x8c/0xd0 [ 31.281940] print_report+0x118/0x5e8 [ 31.281997] kasan_report+0xdc/0x128 [ 31.282040] __kasan_check_byte+0x54/0x70 [ 31.282084] ksize+0x30/0x88 [ 31.282129] ksize_uaf+0x168/0x5f8 [ 31.282173] kunit_try_run_case+0x170/0x3f0 [ 31.282219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.282270] kthread+0x328/0x630 [ 31.282310] ret_from_fork+0x10/0x20 [ 31.282362] [ 31.282381] Allocated by task 229: [ 31.282410] kasan_save_stack+0x3c/0x68 [ 31.282450] kasan_save_track+0x20/0x40 [ 31.282486] kasan_save_alloc_info+0x40/0x58 [ 31.282523] __kasan_kmalloc+0xd4/0xd8 [ 31.282558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.282609] ksize_uaf+0xb8/0x5f8 [ 31.282682] kunit_try_run_case+0x170/0x3f0 [ 31.282764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.282870] kthread+0x328/0x630 [ 31.282911] ret_from_fork+0x10/0x20 [ 31.282946] [ 31.282964] Freed by task 229: [ 31.282991] kasan_save_stack+0x3c/0x68 [ 31.283067] kasan_save_track+0x20/0x40 [ 31.283198] kasan_save_free_info+0x4c/0x78 [ 31.283237] __kasan_slab_free+0x6c/0x98 [ 31.283281] kfree+0x214/0x3c8 [ 31.283326] ksize_uaf+0x11c/0x5f8 [ 31.283363] kunit_try_run_case+0x170/0x3f0 [ 31.283401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.283444] kthread+0x328/0x630 [ 31.283477] ret_from_fork+0x10/0x20 [ 31.283514] [ 31.283532] The buggy address belongs to the object at fff00000c99bcf00 [ 31.283532] which belongs to the cache kmalloc-128 of size 128 [ 31.283591] The buggy address is located 0 bytes inside of [ 31.283591] freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80) [ 31.283674] [ 31.283777] The buggy address belongs to the physical page: [ 31.283846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.284677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.284740] page_type: f5(slab) [ 31.284787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.284839] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.285525] page dumped because: kasan: bad access detected [ 31.286126] [ 31.286175] Memory state around the buggy address: [ 31.286212] fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.286256] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.286826] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.287240] ^ [ 31.287293] fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.287337] fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.287875] ================================================================== [ 31.289784] ================================================================== [ 31.289867] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.290225] Read of size 1 at addr fff00000c99bcf00 by task kunit_try_catch/229 [ 31.290368] [ 31.290411] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.290503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.290586] Hardware name: linux,dummy-virt (DT) [ 31.290681] Call trace: [ 31.290729] show_stack+0x20/0x38 (C) [ 31.290853] dump_stack_lvl+0x8c/0xd0 [ 31.290916] print_report+0x118/0x5e8 [ 31.290960] kasan_report+0xdc/0x128 [ 31.291009] __asan_report_load1_noabort+0x20/0x30 [ 31.291054] ksize_uaf+0x598/0x5f8 [ 31.291098] kunit_try_run_case+0x170/0x3f0 [ 31.291144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.291505] kthread+0x328/0x630 [ 31.291589] ret_from_fork+0x10/0x20 [ 31.291710] [ 31.291734] Allocated by task 229: [ 31.291762] kasan_save_stack+0x3c/0x68 [ 31.291812] kasan_save_track+0x20/0x40 [ 31.291856] kasan_save_alloc_info+0x40/0x58 [ 31.291892] __kasan_kmalloc+0xd4/0xd8 [ 31.292185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.292251] ksize_uaf+0xb8/0x5f8 [ 31.292554] kunit_try_run_case+0x170/0x3f0 [ 31.292771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.292870] kthread+0x328/0x630 [ 31.293013] ret_from_fork+0x10/0x20 [ 31.293090] [ 31.293184] Freed by task 229: [ 31.293215] kasan_save_stack+0x3c/0x68 [ 31.293254] kasan_save_track+0x20/0x40 [ 31.293297] kasan_save_free_info+0x4c/0x78 [ 31.293344] __kasan_slab_free+0x6c/0x98 [ 31.293754] kfree+0x214/0x3c8 [ 31.293856] ksize_uaf+0x11c/0x5f8 [ 31.293954] kunit_try_run_case+0x170/0x3f0 [ 31.294097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.294196] kthread+0x328/0x630 [ 31.294305] ret_from_fork+0x10/0x20 [ 31.294363] [ 31.294383] The buggy address belongs to the object at fff00000c99bcf00 [ 31.294383] which belongs to the cache kmalloc-128 of size 128 [ 31.294816] The buggy address is located 0 bytes inside of [ 31.294816] freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80) [ 31.294917] [ 31.294992] The buggy address belongs to the physical page: [ 31.295084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.295339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.295568] page_type: f5(slab) [ 31.295631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.296007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.296061] page dumped because: kasan: bad access detected [ 31.296373] [ 31.296437] Memory state around the buggy address: [ 31.296525] fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.296592] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.296727] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.296837] ^ [ 31.296880] fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.297000] fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.297039] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.257589] ================================================================== [ 31.257924] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.258068] Read of size 1 at addr fff00000c99bce78 by task kunit_try_catch/227 [ 31.258123] [ 31.258157] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.258543] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.258587] Hardware name: linux,dummy-virt (DT) [ 31.258689] Call trace: [ 31.258716] show_stack+0x20/0x38 (C) [ 31.258888] dump_stack_lvl+0x8c/0xd0 [ 31.258983] print_report+0x118/0x5e8 [ 31.259208] kasan_report+0xdc/0x128 [ 31.259271] __asan_report_load1_noabort+0x20/0x30 [ 31.259479] ksize_unpoisons_memory+0x618/0x740 [ 31.259641] kunit_try_run_case+0x170/0x3f0 [ 31.259696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.259749] kthread+0x328/0x630 [ 31.259798] ret_from_fork+0x10/0x20 [ 31.259847] [ 31.259865] Allocated by task 227: [ 31.259893] kasan_save_stack+0x3c/0x68 [ 31.259942] kasan_save_track+0x20/0x40 [ 31.259979] kasan_save_alloc_info+0x40/0x58 [ 31.260017] __kasan_kmalloc+0xd4/0xd8 [ 31.260051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.260089] ksize_unpoisons_memory+0xc0/0x740 [ 31.260128] kunit_try_run_case+0x170/0x3f0 [ 31.260163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.260204] kthread+0x328/0x630 [ 31.260282] ret_from_fork+0x10/0x20 [ 31.260321] [ 31.260339] The buggy address belongs to the object at fff00000c99bce00 [ 31.260339] which belongs to the cache kmalloc-128 of size 128 [ 31.260397] The buggy address is located 5 bytes to the right of [ 31.260397] allocated 115-byte region [fff00000c99bce00, fff00000c99bce73) [ 31.260471] [ 31.260491] The buggy address belongs to the physical page: [ 31.261176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.261436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.261523] page_type: f5(slab) [ 31.261660] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.261739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.262098] page dumped because: kasan: bad access detected [ 31.262153] [ 31.262214] Memory state around the buggy address: [ 31.262316] fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.262488] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.262598] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.262673] ^ [ 31.263039] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263092] fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263183] ================================================================== [ 31.264094] ================================================================== [ 31.264146] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.264199] Read of size 1 at addr fff00000c99bce7f by task kunit_try_catch/227 [ 31.265071] [ 31.265122] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.265476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.265618] Hardware name: linux,dummy-virt (DT) [ 31.265673] Call trace: [ 31.265715] show_stack+0x20/0x38 (C) [ 31.266343] dump_stack_lvl+0x8c/0xd0 [ 31.266551] print_report+0x118/0x5e8 [ 31.266641] kasan_report+0xdc/0x128 [ 31.266751] __asan_report_load1_noabort+0x20/0x30 [ 31.266879] ksize_unpoisons_memory+0x690/0x740 [ 31.266974] kunit_try_run_case+0x170/0x3f0 [ 31.267367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.267578] kthread+0x328/0x630 [ 31.267770] ret_from_fork+0x10/0x20 [ 31.267888] [ 31.268003] Allocated by task 227: [ 31.268061] kasan_save_stack+0x3c/0x68 [ 31.268169] kasan_save_track+0x20/0x40 [ 31.268236] kasan_save_alloc_info+0x40/0x58 [ 31.268385] __kasan_kmalloc+0xd4/0xd8 [ 31.268462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.268602] ksize_unpoisons_memory+0xc0/0x740 [ 31.268653] kunit_try_run_case+0x170/0x3f0 [ 31.268691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.268741] kthread+0x328/0x630 [ 31.268773] ret_from_fork+0x10/0x20 [ 31.269150] [ 31.269227] The buggy address belongs to the object at fff00000c99bce00 [ 31.269227] which belongs to the cache kmalloc-128 of size 128 [ 31.269290] The buggy address is located 12 bytes to the right of [ 31.269290] allocated 115-byte region [fff00000c99bce00, fff00000c99bce73) [ 31.269363] [ 31.269398] The buggy address belongs to the physical page: [ 31.269434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.269509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.269556] page_type: f5(slab) [ 31.269591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.269649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.269700] page dumped because: kasan: bad access detected [ 31.269740] [ 31.269766] Memory state around the buggy address: [ 31.269807] fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.269851] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.270129] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.270730] ^ [ 31.270875] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.271230] fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.271297] ================================================================== [ 31.249693] ================================================================== [ 31.249796] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.250019] Read of size 1 at addr fff00000c99bce73 by task kunit_try_catch/227 [ 31.250074] [ 31.250110] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.250201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.250401] Hardware name: linux,dummy-virt (DT) [ 31.250480] Call trace: [ 31.250506] show_stack+0x20/0x38 (C) [ 31.250858] dump_stack_lvl+0x8c/0xd0 [ 31.251019] print_report+0x118/0x5e8 [ 31.251085] kasan_report+0xdc/0x128 [ 31.251131] __asan_report_load1_noabort+0x20/0x30 [ 31.251207] ksize_unpoisons_memory+0x628/0x740 [ 31.251305] kunit_try_run_case+0x170/0x3f0 [ 31.251354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.251429] kthread+0x328/0x630 [ 31.251627] ret_from_fork+0x10/0x20 [ 31.251697] [ 31.251996] Allocated by task 227: [ 31.252048] kasan_save_stack+0x3c/0x68 [ 31.252094] kasan_save_track+0x20/0x40 [ 31.252130] kasan_save_alloc_info+0x40/0x58 [ 31.252304] __kasan_kmalloc+0xd4/0xd8 [ 31.252351] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.252420] ksize_unpoisons_memory+0xc0/0x740 [ 31.252836] kunit_try_run_case+0x170/0x3f0 [ 31.252950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.253088] kthread+0x328/0x630 [ 31.253137] ret_from_fork+0x10/0x20 [ 31.253186] [ 31.253212] The buggy address belongs to the object at fff00000c99bce00 [ 31.253212] which belongs to the cache kmalloc-128 of size 128 [ 31.253343] The buggy address is located 0 bytes to the right of [ 31.253343] allocated 115-byte region [fff00000c99bce00, fff00000c99bce73) [ 31.253548] [ 31.253765] The buggy address belongs to the physical page: [ 31.253853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 31.254007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.254096] page_type: f5(slab) [ 31.254223] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.254462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.254627] page dumped because: kasan: bad access detected [ 31.254928] [ 31.255064] Memory state around the buggy address: [ 31.255143] fff00000c99bcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.255281] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255348] >fff00000c99bce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.255397] ^ [ 31.255472] fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255515] fff00000c99bcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255590] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 31.229832] ================================================================== [ 31.229964] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.230051] Free of addr fff00000c8603ee0 by task kunit_try_catch/225 [ 31.230240] [ 31.230324] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.230427] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.230456] Hardware name: linux,dummy-virt (DT) [ 31.230993] Call trace: [ 31.231168] show_stack+0x20/0x38 (C) [ 31.231268] dump_stack_lvl+0x8c/0xd0 [ 31.231467] print_report+0x118/0x5e8 [ 31.231530] kasan_report_invalid_free+0xc0/0xe8 [ 31.231577] check_slab_allocation+0xd4/0x108 [ 31.231758] __kasan_slab_pre_free+0x2c/0x48 [ 31.231843] kfree+0xe8/0x3c8 [ 31.232048] kfree_sensitive+0x3c/0xb0 [ 31.232115] kmalloc_double_kzfree+0x168/0x308 [ 31.232164] kunit_try_run_case+0x170/0x3f0 [ 31.232536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.232615] kthread+0x328/0x630 [ 31.232660] ret_from_fork+0x10/0x20 [ 31.232723] [ 31.232926] Allocated by task 225: [ 31.233139] kasan_save_stack+0x3c/0x68 [ 31.233297] kasan_save_track+0x20/0x40 [ 31.233359] kasan_save_alloc_info+0x40/0x58 [ 31.233658] __kasan_kmalloc+0xd4/0xd8 [ 31.233846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.234138] kmalloc_double_kzfree+0xb8/0x308 [ 31.234314] kunit_try_run_case+0x170/0x3f0 [ 31.234382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.234428] kthread+0x328/0x630 [ 31.234468] ret_from_fork+0x10/0x20 [ 31.234505] [ 31.234526] Freed by task 225: [ 31.234591] kasan_save_stack+0x3c/0x68 [ 31.234639] kasan_save_track+0x20/0x40 [ 31.234685] kasan_save_free_info+0x4c/0x78 [ 31.234723] __kasan_slab_free+0x6c/0x98 [ 31.234758] kfree+0x214/0x3c8 [ 31.234803] kfree_sensitive+0x80/0xb0 [ 31.234842] kmalloc_double_kzfree+0x11c/0x308 [ 31.234884] kunit_try_run_case+0x170/0x3f0 [ 31.234944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.234994] kthread+0x328/0x630 [ 31.235028] ret_from_fork+0x10/0x20 [ 31.235065] [ 31.235089] The buggy address belongs to the object at fff00000c8603ee0 [ 31.235089] which belongs to the cache kmalloc-16 of size 16 [ 31.235151] The buggy address is located 0 bytes inside of [ 31.235151] 16-byte region [fff00000c8603ee0, fff00000c8603ef0) [ 31.235217] [ 31.235247] The buggy address belongs to the physical page: [ 31.235292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603 [ 31.235351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.235410] page_type: f5(slab) [ 31.235466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.235527] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000 [ 31.235585] page dumped because: kasan: bad access detected [ 31.235616] [ 31.235646] Memory state around the buggy address: [ 31.235687] fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.235739] fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.235797] >fff00000c8603e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.235836] ^ [ 31.235887] fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.236396] fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.236518] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 31.219395] ================================================================== [ 31.219482] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 31.219562] Read of size 1 at addr fff00000c8603ee0 by task kunit_try_catch/225 [ 31.219888] [ 31.219965] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.220065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.220140] Hardware name: linux,dummy-virt (DT) [ 31.220175] Call trace: [ 31.220202] show_stack+0x20/0x38 (C) [ 31.220258] dump_stack_lvl+0x8c/0xd0 [ 31.220628] print_report+0x118/0x5e8 [ 31.220710] kasan_report+0xdc/0x128 [ 31.220871] __kasan_check_byte+0x54/0x70 [ 31.221019] kfree_sensitive+0x30/0xb0 [ 31.221082] kmalloc_double_kzfree+0x168/0x308 [ 31.221313] kunit_try_run_case+0x170/0x3f0 [ 31.221568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.221678] kthread+0x328/0x630 [ 31.221811] ret_from_fork+0x10/0x20 [ 31.221957] [ 31.222101] Allocated by task 225: [ 31.222152] kasan_save_stack+0x3c/0x68 [ 31.222387] kasan_save_track+0x20/0x40 [ 31.222592] kasan_save_alloc_info+0x40/0x58 [ 31.222668] __kasan_kmalloc+0xd4/0xd8 [ 31.222719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.222877] kmalloc_double_kzfree+0xb8/0x308 [ 31.222972] kunit_try_run_case+0x170/0x3f0 [ 31.223190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.223408] kthread+0x328/0x630 [ 31.223476] ret_from_fork+0x10/0x20 [ 31.223620] [ 31.223671] Freed by task 225: [ 31.223803] kasan_save_stack+0x3c/0x68 [ 31.223915] kasan_save_track+0x20/0x40 [ 31.223975] kasan_save_free_info+0x4c/0x78 [ 31.224360] __kasan_slab_free+0x6c/0x98 [ 31.224429] kfree+0x214/0x3c8 [ 31.224469] kfree_sensitive+0x80/0xb0 [ 31.224519] kmalloc_double_kzfree+0x11c/0x308 [ 31.225385] kunit_try_run_case+0x170/0x3f0 [ 31.225442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.225487] kthread+0x328/0x630 [ 31.225554] ret_from_fork+0x10/0x20 [ 31.225606] [ 31.225651] The buggy address belongs to the object at fff00000c8603ee0 [ 31.225651] which belongs to the cache kmalloc-16 of size 16 [ 31.225733] The buggy address is located 0 bytes inside of [ 31.225733] freed 16-byte region [fff00000c8603ee0, fff00000c8603ef0) [ 31.226120] [ 31.226166] The buggy address belongs to the physical page: [ 31.226474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603 [ 31.226750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.226830] page_type: f5(slab) [ 31.227038] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.227266] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000 [ 31.227351] page dumped because: kasan: bad access detected [ 31.227452] [ 31.227474] Memory state around the buggy address: [ 31.227696] fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.227884] fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.228106] >fff00000c8603e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.228294] ^ [ 31.228393] fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.228504] fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.228583] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 31.190127] ================================================================== [ 31.190214] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 31.190273] Read of size 1 at addr fff00000c9a6faa8 by task kunit_try_catch/221 [ 31.190326] [ 31.190375] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.190467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.190507] Hardware name: linux,dummy-virt (DT) [ 31.190539] Call trace: [ 31.190561] show_stack+0x20/0x38 (C) [ 31.190611] dump_stack_lvl+0x8c/0xd0 [ 31.190659] print_report+0x118/0x5e8 [ 31.190704] kasan_report+0xdc/0x128 [ 31.190747] __asan_report_load1_noabort+0x20/0x30 [ 31.190796] kmalloc_uaf2+0x3f4/0x468 [ 31.190841] kunit_try_run_case+0x170/0x3f0 [ 31.190894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.191764] kthread+0x328/0x630 [ 31.191830] ret_from_fork+0x10/0x20 [ 31.192181] [ 31.192218] Allocated by task 221: [ 31.192250] kasan_save_stack+0x3c/0x68 [ 31.192299] kasan_save_track+0x20/0x40 [ 31.192335] kasan_save_alloc_info+0x40/0x58 [ 31.192373] __kasan_kmalloc+0xd4/0xd8 [ 31.192569] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.192812] kmalloc_uaf2+0xc4/0x468 [ 31.193050] kunit_try_run_case+0x170/0x3f0 [ 31.193250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.193321] kthread+0x328/0x630 [ 31.193464] ret_from_fork+0x10/0x20 [ 31.193540] [ 31.193559] Freed by task 221: [ 31.193801] kasan_save_stack+0x3c/0x68 [ 31.193978] kasan_save_track+0x20/0x40 [ 31.194088] kasan_save_free_info+0x4c/0x78 [ 31.194145] __kasan_slab_free+0x6c/0x98 [ 31.194340] kfree+0x214/0x3c8 [ 31.194577] kmalloc_uaf2+0x134/0x468 [ 31.194730] kunit_try_run_case+0x170/0x3f0 [ 31.194821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.194882] kthread+0x328/0x630 [ 31.195080] ret_from_fork+0x10/0x20 [ 31.195336] [ 31.195362] The buggy address belongs to the object at fff00000c9a6fa80 [ 31.195362] which belongs to the cache kmalloc-64 of size 64 [ 31.195635] The buggy address is located 40 bytes inside of [ 31.195635] freed 64-byte region [fff00000c9a6fa80, fff00000c9a6fac0) [ 31.195858] [ 31.195882] The buggy address belongs to the physical page: [ 31.195952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6f [ 31.196468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.196577] page_type: f5(slab) [ 31.196747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.196987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.197127] page dumped because: kasan: bad access detected [ 31.197191] [ 31.197255] Memory state around the buggy address: [ 31.197327] fff00000c9a6f980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.197538] fff00000c9a6fa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.197705] >fff00000c9a6fa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.197936] ^ [ 31.198154] fff00000c9a6fb00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.198284] fff00000c9a6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.198367] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 31.174354] ================================================================== [ 31.174419] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 31.174472] Write of size 33 at addr fff00000c9a6f900 by task kunit_try_catch/219 [ 31.174672] [ 31.174718] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.174809] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.175202] Hardware name: linux,dummy-virt (DT) [ 31.175258] Call trace: [ 31.175303] show_stack+0x20/0x38 (C) [ 31.175357] dump_stack_lvl+0x8c/0xd0 [ 31.175403] print_report+0x118/0x5e8 [ 31.175448] kasan_report+0xdc/0x128 [ 31.175564] kasan_check_range+0x100/0x1a8 [ 31.175641] __asan_memset+0x34/0x78 [ 31.175687] kmalloc_uaf_memset+0x170/0x310 [ 31.175826] kunit_try_run_case+0x170/0x3f0 [ 31.175894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.175965] kthread+0x328/0x630 [ 31.176157] ret_from_fork+0x10/0x20 [ 31.176346] [ 31.176373] Allocated by task 219: [ 31.176479] kasan_save_stack+0x3c/0x68 [ 31.176541] kasan_save_track+0x20/0x40 [ 31.176617] kasan_save_alloc_info+0x40/0x58 [ 31.176735] __kasan_kmalloc+0xd4/0xd8 [ 31.176768] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.177089] kmalloc_uaf_memset+0xb8/0x310 [ 31.177320] kunit_try_run_case+0x170/0x3f0 [ 31.177539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.177616] kthread+0x328/0x630 [ 31.177766] ret_from_fork+0x10/0x20 [ 31.177850] [ 31.177875] Freed by task 219: [ 31.178212] kasan_save_stack+0x3c/0x68 [ 31.178283] kasan_save_track+0x20/0x40 [ 31.178397] kasan_save_free_info+0x4c/0x78 [ 31.178478] __kasan_slab_free+0x6c/0x98 [ 31.178565] kfree+0x214/0x3c8 [ 31.178678] kmalloc_uaf_memset+0x11c/0x310 [ 31.178767] kunit_try_run_case+0x170/0x3f0 [ 31.178824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.179187] kthread+0x328/0x630 [ 31.179252] ret_from_fork+0x10/0x20 [ 31.179360] [ 31.179420] The buggy address belongs to the object at fff00000c9a6f900 [ 31.179420] which belongs to the cache kmalloc-64 of size 64 [ 31.179529] The buggy address is located 0 bytes inside of [ 31.179529] freed 64-byte region [fff00000c9a6f900, fff00000c9a6f940) [ 31.179698] [ 31.179756] The buggy address belongs to the physical page: [ 31.179792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6f [ 31.180010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.180193] page_type: f5(slab) [ 31.180277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.180379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.180478] page dumped because: kasan: bad access detected [ 31.180533] [ 31.180644] Memory state around the buggy address: [ 31.180704] fff00000c9a6f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.180768] fff00000c9a6f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.180816] >fff00000c9a6f900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.180854] ^ [ 31.181070] fff00000c9a6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.181259] fff00000c9a6fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.181332] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 31.158157] ================================================================== [ 31.158494] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 31.158584] Read of size 1 at addr fff00000c8603ec8 by task kunit_try_catch/217 [ 31.158701] [ 31.158739] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.159122] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.159183] Hardware name: linux,dummy-virt (DT) [ 31.159226] Call trace: [ 31.159252] show_stack+0x20/0x38 (C) [ 31.159306] dump_stack_lvl+0x8c/0xd0 [ 31.159354] print_report+0x118/0x5e8 [ 31.159398] kasan_report+0xdc/0x128 [ 31.159736] __asan_report_load1_noabort+0x20/0x30 [ 31.159808] kmalloc_uaf+0x300/0x338 [ 31.159853] kunit_try_run_case+0x170/0x3f0 [ 31.160196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.160386] kthread+0x328/0x630 [ 31.160439] ret_from_fork+0x10/0x20 [ 31.160508] [ 31.160614] Allocated by task 217: [ 31.160682] kasan_save_stack+0x3c/0x68 [ 31.160783] kasan_save_track+0x20/0x40 [ 31.160817] kasan_save_alloc_info+0x40/0x58 [ 31.160856] __kasan_kmalloc+0xd4/0xd8 [ 31.161062] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.161265] kmalloc_uaf+0xb8/0x338 [ 31.161359] kunit_try_run_case+0x170/0x3f0 [ 31.161399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.161630] kthread+0x328/0x630 [ 31.161849] ret_from_fork+0x10/0x20 [ 31.161912] [ 31.161931] Freed by task 217: [ 31.162172] kasan_save_stack+0x3c/0x68 [ 31.162301] kasan_save_track+0x20/0x40 [ 31.162625] kasan_save_free_info+0x4c/0x78 [ 31.162699] __kasan_slab_free+0x6c/0x98 [ 31.162895] kfree+0x214/0x3c8 [ 31.162987] kmalloc_uaf+0x11c/0x338 [ 31.163193] kunit_try_run_case+0x170/0x3f0 [ 31.163534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.163657] kthread+0x328/0x630 [ 31.163740] ret_from_fork+0x10/0x20 [ 31.163979] [ 31.164030] The buggy address belongs to the object at fff00000c8603ec0 [ 31.164030] which belongs to the cache kmalloc-16 of size 16 [ 31.164191] The buggy address is located 8 bytes inside of [ 31.164191] freed 16-byte region [fff00000c8603ec0, fff00000c8603ed0) [ 31.164293] [ 31.164339] The buggy address belongs to the physical page: [ 31.164395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603 [ 31.164458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.164516] page_type: f5(slab) [ 31.164953] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.165042] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000 [ 31.165107] page dumped because: kasan: bad access detected [ 31.165264] [ 31.165323] Memory state around the buggy address: [ 31.165481] fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.165598] fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.165707] >fff00000c8603e80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 31.165835] ^ [ 31.165893] fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.165949] fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.166201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 31.138266] ================================================================== [ 31.138339] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 31.138585] Read of size 64 at addr fff00000c9a6f604 by task kunit_try_catch/215 [ 31.138681] [ 31.138725] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.138852] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.138885] Hardware name: linux,dummy-virt (DT) [ 31.138928] Call trace: [ 31.139252] show_stack+0x20/0x38 (C) [ 31.139653] dump_stack_lvl+0x8c/0xd0 [ 31.139956] print_report+0x118/0x5e8 [ 31.140011] kasan_report+0xdc/0x128 [ 31.140067] kasan_check_range+0x100/0x1a8 [ 31.140134] __asan_memmove+0x3c/0x98 [ 31.140186] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 31.140391] kunit_try_run_case+0x170/0x3f0 [ 31.140442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.140494] kthread+0x328/0x630 [ 31.140548] ret_from_fork+0x10/0x20 [ 31.140946] [ 31.140991] Allocated by task 215: [ 31.141220] kasan_save_stack+0x3c/0x68 [ 31.141748] kasan_save_track+0x20/0x40 [ 31.141818] kasan_save_alloc_info+0x40/0x58 [ 31.141883] __kasan_kmalloc+0xd4/0xd8 [ 31.141947] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.142148] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 31.142213] kunit_try_run_case+0x170/0x3f0 [ 31.142252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.142537] kthread+0x328/0x630 [ 31.142625] ret_from_fork+0x10/0x20 [ 31.142702] [ 31.143131] The buggy address belongs to the object at fff00000c9a6f600 [ 31.143131] which belongs to the cache kmalloc-64 of size 64 [ 31.143201] The buggy address is located 4 bytes inside of [ 31.143201] allocated 64-byte region [fff00000c9a6f600, fff00000c9a6f640) [ 31.143290] [ 31.143320] The buggy address belongs to the physical page: [ 31.143368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a6f [ 31.143811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.143888] page_type: f5(slab) [ 31.143960] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.144677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.144741] page dumped because: kasan: bad access detected [ 31.144774] [ 31.144798] Memory state around the buggy address: [ 31.144859] fff00000c9a6f500: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.144914] fff00000c9a6f580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.144957] >fff00000c9a6f600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.145289] ^ [ 31.145371] fff00000c9a6f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.145537] fff00000c9a6f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.145755] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.483423] ================================================================== [ 30.483823] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.483919] Read of size 18446744073709551614 at addr fff00000ffebe004 by task kunit_try_catch/213 [ 30.484268] [ 30.484352] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.484682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.484841] Hardware name: linux,dummy-virt (DT) [ 30.484986] Call trace: [ 30.485014] show_stack+0x20/0x38 (C) [ 30.485068] dump_stack_lvl+0x8c/0xd0 [ 30.485262] print_report+0x118/0x5e8 [ 30.485414] kasan_report+0xdc/0x128 [ 30.485569] kasan_check_range+0x100/0x1a8 [ 30.485640] __asan_memmove+0x3c/0x98 [ 30.486045] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.486166] kunit_try_run_case+0x170/0x3f0 [ 30.486293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.486538] kthread+0x328/0x630 [ 30.486798] ret_from_fork+0x10/0x20 [ 30.487151] [ 30.487197] Allocated by task 2846403498: [ 30.487723] ------------[ cut here ]------------ [ 30.487945] pool index 44973 out of bounds (219) for stack id adacafae [ 30.491715] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213 [ 31.038074] Modules linked in: [ 31.039604] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.040876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.041532] Hardware name: linux,dummy-virt (DT) [ 31.042293] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.043298] pc : depot_fetch_stack+0x68/0x88 [ 31.043998] lr : depot_fetch_stack+0x68/0x88 [ 31.044662] sp : ffff8000809c7a20 [ 31.045263] x29: ffff8000809c7a20 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.046414] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.047408] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.048298] x20: fff00000ffebe004 x19: ffff8000809c7b30 x18: 00000000f558d2a4 [ 31.048663] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 31.049017] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010138ea1 [ 31.049358] x11: 1ffff00010138ea0 x10: ffff700010138ea0 x9 : ffff91bcf68f11ec [ 31.049748] x8 : ffff8000809c7507 x7 : 0000000000000001 x6 : ffff700010138ea0 [ 31.050936] x5 : ffff8000809c7500 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.052016] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.052948] Call trace: [ 31.053121] depot_fetch_stack+0x68/0x88 (P) [ 31.053343] stack_depot_print+0x24/0x60 [ 31.053535] print_report+0x5dc/0x5e8 [ 31.053720] kasan_report+0xdc/0x128 [ 31.054304] kasan_check_range+0x100/0x1a8 [ 31.054867] __asan_memmove+0x3c/0x98 [ 31.055465] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.056305] kunit_try_run_case+0x170/0x3f0 [ 31.056840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.057663] kthread+0x328/0x630 [ 31.058210] ret_from_fork+0x10/0x20 [ 31.058841] ---[ end trace 0000000000000000 ]--- [ 31.059815] ------------[ cut here ]------------ [ 31.059875] corrupt handle or use after stack_depot_put() [ 31.060163] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213 [ 31.062284] Modules linked in: [ 31.062505] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.063232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.063976] Hardware name: linux,dummy-virt (DT) [ 31.064668] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.065618] pc : stack_depot_print+0x54/0x60 [ 31.066265] lr : stack_depot_print+0x54/0x60 [ 31.066913] sp : ffff8000809c7a30 [ 31.067507] x29: ffff8000809c7a30 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.068344] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.068714] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.069803] x20: fff00000ffebe004 x19: ffff8000809c7b30 x18: 00000000f558d2a4 [ 31.070936] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 31.071974] x14: ffff700010138f26 x13: 1ffe000019367289 x12: ffff72379fb15509 [ 31.073015] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.073771] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.074152] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.074509] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.074857] Call trace: [ 31.075526] stack_depot_print+0x54/0x60 (P) [ 31.076478] print_report+0x5dc/0x5e8 [ 31.077040] kasan_report+0xdc/0x128 [ 31.077631] kasan_check_range+0x100/0x1a8 [ 31.078338] __asan_memmove+0x3c/0x98 [ 31.078949] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.079728] kunit_try_run_case+0x170/0x3f0 [ 31.080373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.081185] kthread+0x328/0x630 [ 31.081717] ret_from_fork+0x10/0x20 [ 31.082170] ---[ end trace 0000000000000000 ]--- [ 31.082494] [ 31.082528] Last potentially related work creation: [ 31.082567] ------------[ cut here ]------------ [ 31.082591] pool index 43945 out of bounds (219) for stack id a9a8abaa [ 31.082694] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213 [ 31.083950] Modules linked in: [ 31.084192] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.084727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.084985] Hardware name: linux,dummy-virt (DT) [ 31.085246] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.085612] pc : depot_fetch_stack+0x68/0x88 [ 31.085871] lr : depot_fetch_stack+0x68/0x88 [ 31.086092] sp : ffff8000809c7a00 [ 31.086285] x29: ffff8000809c7a00 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.086748] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.087160] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.087574] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.088012] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 31.088416] x14: 0000000000000000 x13: 0000000000000007 x12: ffff72379fb15509 [ 31.088828] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.089235] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.089664] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.090081] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.090538] Call trace: [ 31.090684] depot_fetch_stack+0x68/0x88 (P) [ 31.090971] stack_depot_print+0x24/0x60 [ 31.091228] kasan_print_aux_stacks+0x50/0x98 [ 31.091480] print_report+0x348/0x5e8 [ 31.091737] kasan_report+0xdc/0x128 [ 31.091974] kasan_check_range+0x100/0x1a8 [ 31.092195] __asan_memmove+0x3c/0x98 [ 31.092436] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.092721] kunit_try_run_case+0x170/0x3f0 [ 31.092966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.093278] kthread+0x328/0x630 [ 31.093490] ret_from_fork+0x10/0x20 [ 31.093692] ---[ end trace 0000000000000000 ]--- [ 31.093946] ------------[ cut here ]------------ [ 31.093974] corrupt handle or use after stack_depot_put() [ 31.094060] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213 [ 31.095024] Modules linked in: [ 31.095269] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.095817] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.096059] Hardware name: linux,dummy-virt (DT) [ 31.096330] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.096688] pc : stack_depot_print+0x54/0x60 [ 31.096973] lr : stack_depot_print+0x54/0x60 [ 31.097211] sp : ffff8000809c7a10 [ 31.097421] x29: ffff8000809c7a10 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.097848] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.098277] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.098691] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.099106] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 31.099568] x14: ffff700010138f22 x13: 1ffe000019367289 x12: ffff72379fb15509 [ 31.100027] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.100451] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.100865] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.101288] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.101697] Call trace: [ 31.101870] stack_depot_print+0x54/0x60 (P) [ 31.102138] kasan_print_aux_stacks+0x50/0x98 [ 31.102403] print_report+0x348/0x5e8 [ 31.102650] kasan_report+0xdc/0x128 [ 31.102863] kasan_check_range+0x100/0x1a8 [ 31.103133] __asan_memmove+0x3c/0x98 [ 31.103363] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.103670] kunit_try_run_case+0x170/0x3f0 [ 31.103944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.104251] kthread+0x328/0x630 [ 31.104447] ret_from_fork+0x10/0x20 [ 31.104695] ---[ end trace 0000000000000000 ]--- [ 31.104988] [ 31.105030] Second to last potentially related work creation: [ 31.105069] ------------[ cut here ]------------ [ 31.105094] pool index 44973 out of bounds (219) for stack id adacafae [ 31.105200] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213 [ 31.106545] Modules linked in: [ 31.106796] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.107355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.107600] Hardware name: linux,dummy-virt (DT) [ 31.107873] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.108204] pc : depot_fetch_stack+0x68/0x88 [ 31.108472] lr : depot_fetch_stack+0x68/0x88 [ 31.108735] sp : ffff8000809c7a00 [ 31.108942] x29: ffff8000809c7a00 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.109369] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.109756] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.110151] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.110607] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 31.111046] x14: 0000000000000000 x13: 0000000000000007 x12: ffff72379fb15509 [ 31.111473] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.111889] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.112318] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.112709] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.113158] Call trace: [ 31.113323] depot_fetch_stack+0x68/0x88 (P) [ 31.113598] stack_depot_print+0x24/0x60 [ 31.113802] kasan_print_aux_stacks+0x78/0x98 [ 31.114090] print_report+0x348/0x5e8 [ 31.114282] kasan_report+0xdc/0x128 [ 31.114530] kasan_check_range+0x100/0x1a8 [ 31.114767] __asan_memmove+0x3c/0x98 [ 31.115022] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.115299] kunit_try_run_case+0x170/0x3f0 [ 31.115544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.115856] kthread+0x328/0x630 [ 31.116091] ret_from_fork+0x10/0x20 [ 31.116294] ---[ end trace 0000000000000000 ]--- [ 31.116576] ------------[ cut here ]------------ [ 31.116607] corrupt handle or use after stack_depot_put() [ 31.116697] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213 [ 31.117618] Modules linked in: [ 31.117859] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.118426] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.118675] Hardware name: linux,dummy-virt (DT) [ 31.118954] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.119309] pc : stack_depot_print+0x54/0x60 [ 31.119565] lr : stack_depot_print+0x54/0x60 [ 31.119811] sp : ffff8000809c7a10 [ 31.120007] x29: ffff8000809c7a10 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.120417] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.120869] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.121254] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.121715] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 31.122178] x14: ffff700010138f22 x13: 1ffe000019367289 x12: ffff72379fb15509 [ 31.122609] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.123035] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.123444] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.123853] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.124268] Call trace: [ 31.124439] stack_depot_print+0x54/0x60 (P) [ 31.124694] kasan_print_aux_stacks+0x78/0x98 [ 31.124957] print_report+0x348/0x5e8 [ 31.125189] kasan_report+0xdc/0x128 [ 31.125407] kasan_check_range+0x100/0x1a8 [ 31.125690] __asan_memmove+0x3c/0x98 [ 31.125928] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.126221] kunit_try_run_case+0x170/0x3f0 [ 31.126470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.126794] kthread+0x328/0x630 [ 31.127006] ret_from_fork+0x10/0x20 [ 31.127254] ---[ end trace 0000000000000000 ]--- [ 31.127569] [ 31.127612] The buggy address belongs to the object at fff00000ffebe000 [ 31.127612] which belongs to the cache kmalloc-64 of size 64 [ 31.127676] The buggy address is located 4 bytes inside of [ 31.127676] 64-byte region [fff00000ffebe000, fff00000ffebe040) [ 31.127735] [ 31.127760] The buggy address belongs to the physical page: [ 31.127799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13febe [ 31.127863] memcg:fff00000d9d43e71 [ 31.127892] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff) [ 31.127968] page_type: f5(slab) [ 31.128009] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ffaf88 0000000000000000 [ 31.128061] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d43e71 [ 31.128102] page dumped because: kasan: bad access detected [ 31.128131] [ 31.128151] Memory state around the buggy address: [ 31.128185] fff00000ffebdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128229] fff00000ffebdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128272] >fff00000ffebe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128310] ^ [ 31.128343] fff00000ffebe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128385] fff00000ffebe100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128427] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 30.466204] ================================================================== [ 30.466274] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.466413] Write of size 16 at addr fff00000c99bcd69 by task kunit_try_catch/211 [ 30.466465] [ 30.466786] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.467006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.467067] Hardware name: linux,dummy-virt (DT) [ 30.467105] Call trace: [ 30.467143] show_stack+0x20/0x38 (C) [ 30.467251] dump_stack_lvl+0x8c/0xd0 [ 30.467297] print_report+0x118/0x5e8 [ 30.467339] kasan_report+0xdc/0x128 [ 30.467386] kasan_check_range+0x100/0x1a8 [ 30.467429] __asan_memset+0x34/0x78 [ 30.467615] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.467678] kunit_try_run_case+0x170/0x3f0 [ 30.467725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.467911] kthread+0x328/0x630 [ 30.467968] ret_from_fork+0x10/0x20 [ 30.468017] [ 30.468035] Allocated by task 211: [ 30.468062] kasan_save_stack+0x3c/0x68 [ 30.468101] kasan_save_track+0x20/0x40 [ 30.468135] kasan_save_alloc_info+0x40/0x58 [ 30.468171] __kasan_kmalloc+0xd4/0xd8 [ 30.468204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.468244] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.468281] kunit_try_run_case+0x170/0x3f0 [ 30.468317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.468358] kthread+0x328/0x630 [ 30.468389] ret_from_fork+0x10/0x20 [ 30.468423] [ 30.468515] The buggy address belongs to the object at fff00000c99bcd00 [ 30.468515] which belongs to the cache kmalloc-128 of size 128 [ 30.468826] The buggy address is located 105 bytes inside of [ 30.468826] allocated 120-byte region [fff00000c99bcd00, fff00000c99bcd78) [ 30.469479] [ 30.469523] The buggy address belongs to the physical page: [ 30.469663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.469778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.469959] page_type: f5(slab) [ 30.470014] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.470168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.470278] page dumped because: kasan: bad access detected [ 30.470334] [ 30.470361] Memory state around the buggy address: [ 30.470585] fff00000c99bcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.470822] fff00000c99bcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.470873] >fff00000c99bcd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.471088] ^ [ 30.471691] fff00000c99bcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.471762] fff00000c99bce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.472060] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 30.448381] ================================================================== [ 30.448606] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.448958] Write of size 8 at addr fff00000c99bcc71 by task kunit_try_catch/209 [ 30.449019] [ 30.449056] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.449143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.449168] Hardware name: linux,dummy-virt (DT) [ 30.449599] Call trace: [ 30.449681] show_stack+0x20/0x38 (C) [ 30.449944] dump_stack_lvl+0x8c/0xd0 [ 30.450110] print_report+0x118/0x5e8 [ 30.450217] kasan_report+0xdc/0x128 [ 30.450273] kasan_check_range+0x100/0x1a8 [ 30.450492] __asan_memset+0x34/0x78 [ 30.450546] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.450592] kunit_try_run_case+0x170/0x3f0 [ 30.450762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.450851] kthread+0x328/0x630 [ 30.450893] ret_from_fork+0x10/0x20 [ 30.450961] [ 30.450979] Allocated by task 209: [ 30.451022] kasan_save_stack+0x3c/0x68 [ 30.451064] kasan_save_track+0x20/0x40 [ 30.451098] kasan_save_alloc_info+0x40/0x58 [ 30.451142] __kasan_kmalloc+0xd4/0xd8 [ 30.451192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.451243] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.451281] kunit_try_run_case+0x170/0x3f0 [ 30.451324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.451375] kthread+0x328/0x630 [ 30.451409] ret_from_fork+0x10/0x20 [ 30.451454] [ 30.451494] The buggy address belongs to the object at fff00000c99bcc00 [ 30.451494] which belongs to the cache kmalloc-128 of size 128 [ 30.451550] The buggy address is located 113 bytes inside of [ 30.451550] allocated 120-byte region [fff00000c99bcc00, fff00000c99bcc78) [ 30.451612] [ 30.451641] The buggy address belongs to the physical page: [ 30.451676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.451728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.451776] page_type: f5(slab) [ 30.451813] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.451860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.451908] page dumped because: kasan: bad access detected [ 30.451978] [ 30.452026] Memory state around the buggy address: [ 30.452080] fff00000c99bcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.452617] fff00000c99bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.452777] >fff00000c99bcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.452819] ^ [ 30.453134] fff00000c99bcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.453181] fff00000c99bcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.453454] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 30.427375] ================================================================== [ 30.427432] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.427494] Write of size 4 at addr fff00000c99bcb75 by task kunit_try_catch/207 [ 30.427541] [ 30.427575] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.427678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.427705] Hardware name: linux,dummy-virt (DT) [ 30.427745] Call trace: [ 30.427768] show_stack+0x20/0x38 (C) [ 30.427816] dump_stack_lvl+0x8c/0xd0 [ 30.427871] print_report+0x118/0x5e8 [ 30.428784] kasan_report+0xdc/0x128 [ 30.428841] kasan_check_range+0x100/0x1a8 [ 30.428889] __asan_memset+0x34/0x78 [ 30.428942] kmalloc_oob_memset_4+0x150/0x300 [ 30.428988] kunit_try_run_case+0x170/0x3f0 [ 30.429659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.429755] kthread+0x328/0x630 [ 30.429888] ret_from_fork+0x10/0x20 [ 30.429975] [ 30.430032] Allocated by task 207: [ 30.430213] kasan_save_stack+0x3c/0x68 [ 30.430426] kasan_save_track+0x20/0x40 [ 30.430508] kasan_save_alloc_info+0x40/0x58 [ 30.430682] __kasan_kmalloc+0xd4/0xd8 [ 30.430758] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.430820] kmalloc_oob_memset_4+0xb0/0x300 [ 30.431052] kunit_try_run_case+0x170/0x3f0 [ 30.431171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.431329] kthread+0x328/0x630 [ 30.431493] ret_from_fork+0x10/0x20 [ 30.431574] [ 30.431692] The buggy address belongs to the object at fff00000c99bcb00 [ 30.431692] which belongs to the cache kmalloc-128 of size 128 [ 30.431770] The buggy address is located 117 bytes inside of [ 30.431770] allocated 120-byte region [fff00000c99bcb00, fff00000c99bcb78) [ 30.431871] [ 30.432111] The buggy address belongs to the physical page: [ 30.432725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.433170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.433245] page_type: f5(slab) [ 30.433319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.433395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.433529] page dumped because: kasan: bad access detected [ 30.433833] [ 30.433995] Memory state around the buggy address: [ 30.434055] fff00000c99bca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.434606] fff00000c99bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.434666] >fff00000c99bcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.434750] ^ [ 30.435038] fff00000c99bcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.435256] fff00000c99bcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.435490] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 30.411571] ================================================================== [ 30.411653] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.411909] Write of size 2 at addr fff00000c99bca77 by task kunit_try_catch/205 [ 30.411975] [ 30.412035] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.412276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.412302] Hardware name: linux,dummy-virt (DT) [ 30.412648] Call trace: [ 30.412694] show_stack+0x20/0x38 (C) [ 30.412785] dump_stack_lvl+0x8c/0xd0 [ 30.412893] print_report+0x118/0x5e8 [ 30.412987] kasan_report+0xdc/0x128 [ 30.413333] kasan_check_range+0x100/0x1a8 [ 30.413472] __asan_memset+0x34/0x78 [ 30.413541] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.413784] kunit_try_run_case+0x170/0x3f0 [ 30.414026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.414139] kthread+0x328/0x630 [ 30.414294] ret_from_fork+0x10/0x20 [ 30.414433] [ 30.414483] Allocated by task 205: [ 30.414565] kasan_save_stack+0x3c/0x68 [ 30.415042] kasan_save_track+0x20/0x40 [ 30.415182] kasan_save_alloc_info+0x40/0x58 [ 30.415261] __kasan_kmalloc+0xd4/0xd8 [ 30.415430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.415487] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.415557] kunit_try_run_case+0x170/0x3f0 [ 30.415805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.416106] kthread+0x328/0x630 [ 30.416308] ret_from_fork+0x10/0x20 [ 30.416383] [ 30.416660] The buggy address belongs to the object at fff00000c99bca00 [ 30.416660] which belongs to the cache kmalloc-128 of size 128 [ 30.416842] The buggy address is located 119 bytes inside of [ 30.416842] allocated 120-byte region [fff00000c99bca00, fff00000c99bca78) [ 30.417009] [ 30.417068] The buggy address belongs to the physical page: [ 30.417224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.417329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.417431] page_type: f5(slab) [ 30.417473] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.417542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.417939] page dumped because: kasan: bad access detected [ 30.418095] [ 30.418154] Memory state around the buggy address: [ 30.418223] fff00000c99bc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.418407] fff00000c99bc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418467] >fff00000c99bca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.418664] ^ [ 30.418976] fff00000c99bca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.419079] fff00000c99bcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.419180] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.390481] ================================================================== [ 30.390928] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.391228] Write of size 128 at addr fff00000c99bc900 by task kunit_try_catch/203 [ 30.391500] [ 30.391600] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.391762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.391846] Hardware name: linux,dummy-virt (DT) [ 30.391880] Call trace: [ 30.391914] show_stack+0x20/0x38 (C) [ 30.391967] dump_stack_lvl+0x8c/0xd0 [ 30.392193] print_report+0x118/0x5e8 [ 30.392240] kasan_report+0xdc/0x128 [ 30.392283] kasan_check_range+0x100/0x1a8 [ 30.392564] __asan_memset+0x34/0x78 [ 30.392651] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.392745] kunit_try_run_case+0x170/0x3f0 [ 30.392974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.393231] kthread+0x328/0x630 [ 30.393318] ret_from_fork+0x10/0x20 [ 30.393450] [ 30.393499] Allocated by task 203: [ 30.393545] kasan_save_stack+0x3c/0x68 [ 30.393681] kasan_save_track+0x20/0x40 [ 30.393758] kasan_save_alloc_info+0x40/0x58 [ 30.393913] __kasan_kmalloc+0xd4/0xd8 [ 30.393965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.394219] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.394428] kunit_try_run_case+0x170/0x3f0 [ 30.394503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.394713] kthread+0x328/0x630 [ 30.394965] ret_from_fork+0x10/0x20 [ 30.395110] [ 30.395213] The buggy address belongs to the object at fff00000c99bc900 [ 30.395213] which belongs to the cache kmalloc-128 of size 128 [ 30.395343] The buggy address is located 0 bytes inside of [ 30.395343] allocated 120-byte region [fff00000c99bc900, fff00000c99bc978) [ 30.395831] [ 30.395875] The buggy address belongs to the physical page: [ 30.395935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.396294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.396515] page_type: f5(slab) [ 30.396732] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.397068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.397145] page dumped because: kasan: bad access detected [ 30.397200] [ 30.397338] Memory state around the buggy address: [ 30.397447] fff00000c99bc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.397604] fff00000c99bc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.397776] >fff00000c99bc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.397956] ^ [ 30.398117] fff00000c99bc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.398199] fff00000c99bca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.398289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 30.368340] ================================================================== [ 30.368587] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.368690] Read of size 16 at addr fff00000c8603ea0 by task kunit_try_catch/201 [ 30.368743] [ 30.368799] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.369058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.369087] Hardware name: linux,dummy-virt (DT) [ 30.369120] Call trace: [ 30.369276] show_stack+0x20/0x38 (C) [ 30.369433] dump_stack_lvl+0x8c/0xd0 [ 30.369562] print_report+0x118/0x5e8 [ 30.369664] kasan_report+0xdc/0x128 [ 30.369829] __asan_report_load16_noabort+0x20/0x30 [ 30.369932] kmalloc_uaf_16+0x3bc/0x438 [ 30.369991] kunit_try_run_case+0x170/0x3f0 [ 30.370435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.371309] kthread+0x328/0x630 [ 30.371388] ret_from_fork+0x10/0x20 [ 30.371520] [ 30.371540] Allocated by task 201: [ 30.371588] kasan_save_stack+0x3c/0x68 [ 30.371925] kasan_save_track+0x20/0x40 [ 30.372070] kasan_save_alloc_info+0x40/0x58 [ 30.372166] __kasan_kmalloc+0xd4/0xd8 [ 30.372340] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.372469] kmalloc_uaf_16+0x140/0x438 [ 30.372509] kunit_try_run_case+0x170/0x3f0 [ 30.372565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.372750] kthread+0x328/0x630 [ 30.372983] ret_from_fork+0x10/0x20 [ 30.373286] [ 30.373312] Freed by task 201: [ 30.373491] kasan_save_stack+0x3c/0x68 [ 30.374319] kasan_save_track+0x20/0x40 [ 30.374420] kasan_save_free_info+0x4c/0x78 [ 30.374611] __kasan_slab_free+0x6c/0x98 [ 30.374685] kfree+0x214/0x3c8 [ 30.375149] kmalloc_uaf_16+0x190/0x438 [ 30.375404] kunit_try_run_case+0x170/0x3f0 [ 30.375481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.375641] kthread+0x328/0x630 [ 30.375708] ret_from_fork+0x10/0x20 [ 30.375816] [ 30.375866] The buggy address belongs to the object at fff00000c8603ea0 [ 30.375866] which belongs to the cache kmalloc-16 of size 16 [ 30.375985] The buggy address is located 0 bytes inside of [ 30.375985] freed 16-byte region [fff00000c8603ea0, fff00000c8603eb0) [ 30.376241] [ 30.376516] The buggy address belongs to the physical page: [ 30.376570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603 [ 30.376632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.376682] page_type: f5(slab) [ 30.376953] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.377132] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000 [ 30.377254] page dumped because: kasan: bad access detected [ 30.377285] [ 30.377349] Memory state around the buggy address: [ 30.377522] fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.377569] fff00000c8603e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.377734] >fff00000c8603e80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.377819] ^ [ 30.377880] fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.377950] fff00000c8603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.377996] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 30.351937] ================================================================== [ 30.352008] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.352061] Write of size 16 at addr fff00000c8603e40 by task kunit_try_catch/199 [ 30.352110] [ 30.352208] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.352316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.352352] Hardware name: linux,dummy-virt (DT) [ 30.352382] Call trace: [ 30.352411] show_stack+0x20/0x38 (C) [ 30.352467] dump_stack_lvl+0x8c/0xd0 [ 30.352514] print_report+0x118/0x5e8 [ 30.353360] kasan_report+0xdc/0x128 [ 30.353472] __asan_report_store16_noabort+0x20/0x30 [ 30.353551] kmalloc_oob_16+0x3a0/0x3f8 [ 30.353797] kunit_try_run_case+0x170/0x3f0 [ 30.354059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.354195] kthread+0x328/0x630 [ 30.354294] ret_from_fork+0x10/0x20 [ 30.354423] [ 30.354472] Allocated by task 199: [ 30.354539] kasan_save_stack+0x3c/0x68 [ 30.354870] kasan_save_track+0x20/0x40 [ 30.355044] kasan_save_alloc_info+0x40/0x58 [ 30.355135] __kasan_kmalloc+0xd4/0xd8 [ 30.355242] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.355320] kmalloc_oob_16+0xb4/0x3f8 [ 30.355425] kunit_try_run_case+0x170/0x3f0 [ 30.355495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.355537] kthread+0x328/0x630 [ 30.355728] ret_from_fork+0x10/0x20 [ 30.355922] [ 30.356084] The buggy address belongs to the object at fff00000c8603e40 [ 30.356084] which belongs to the cache kmalloc-16 of size 16 [ 30.356177] The buggy address is located 0 bytes inside of [ 30.356177] allocated 13-byte region [fff00000c8603e40, fff00000c8603e4d) [ 30.356303] [ 30.356351] The buggy address belongs to the physical page: [ 30.356389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603 [ 30.356798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.356857] page_type: f5(slab) [ 30.356907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.357263] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000 [ 30.357518] page dumped because: kasan: bad access detected [ 30.357608] [ 30.357700] Memory state around the buggy address: [ 30.357804] fff00000c8603d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.357875] fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.357974] >fff00000c8603e00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 30.358140] ^ [ 30.358336] fff00000c8603e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.358518] fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.358662] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.318864] ================================================================== [ 30.318982] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.319281] Read of size 1 at addr fff00000c91e6600 by task kunit_try_catch/197 [ 30.319463] [ 30.319512] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.319760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.319831] Hardware name: linux,dummy-virt (DT) [ 30.320123] Call trace: [ 30.320180] show_stack+0x20/0x38 (C) [ 30.320645] dump_stack_lvl+0x8c/0xd0 [ 30.320828] print_report+0x118/0x5e8 [ 30.321164] kasan_report+0xdc/0x128 [ 30.321246] __kasan_check_byte+0x54/0x70 [ 30.321354] krealloc_noprof+0x44/0x360 [ 30.321421] krealloc_uaf+0x180/0x520 [ 30.321529] kunit_try_run_case+0x170/0x3f0 [ 30.321631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.321729] kthread+0x328/0x630 [ 30.321837] ret_from_fork+0x10/0x20 [ 30.321954] [ 30.322013] Allocated by task 197: [ 30.322071] kasan_save_stack+0x3c/0x68 [ 30.322143] kasan_save_track+0x20/0x40 [ 30.322614] kasan_save_alloc_info+0x40/0x58 [ 30.322680] __kasan_kmalloc+0xd4/0xd8 [ 30.322865] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.323052] krealloc_uaf+0xc8/0x520 [ 30.323260] kunit_try_run_case+0x170/0x3f0 [ 30.323316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.323497] kthread+0x328/0x630 [ 30.323628] ret_from_fork+0x10/0x20 [ 30.323793] [ 30.323983] Freed by task 197: [ 30.324159] kasan_save_stack+0x3c/0x68 [ 30.324516] kasan_save_track+0x20/0x40 [ 30.324768] kasan_save_free_info+0x4c/0x78 [ 30.324816] __kasan_slab_free+0x6c/0x98 [ 30.324954] kfree+0x214/0x3c8 [ 30.325040] krealloc_uaf+0x12c/0x520 [ 30.325223] kunit_try_run_case+0x170/0x3f0 [ 30.325310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.325704] kthread+0x328/0x630 [ 30.325933] ret_from_fork+0x10/0x20 [ 30.326218] [ 30.326365] The buggy address belongs to the object at fff00000c91e6600 [ 30.326365] which belongs to the cache kmalloc-256 of size 256 [ 30.326504] The buggy address is located 0 bytes inside of [ 30.326504] freed 256-byte region [fff00000c91e6600, fff00000c91e6700) [ 30.326950] [ 30.327005] The buggy address belongs to the physical page: [ 30.327050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.327293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.327548] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.327771] page_type: f5(slab) [ 30.327968] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.328137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.328234] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.328487] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.328745] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.328799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.329076] page dumped because: kasan: bad access detected [ 30.329204] [ 30.329275] Memory state around the buggy address: [ 30.329363] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.329416] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.329607] >fff00000c91e6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.329856] ^ [ 30.330048] fff00000c91e6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.330415] fff00000c91e6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.330575] ================================================================== [ 30.334027] ================================================================== [ 30.334081] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.334132] Read of size 1 at addr fff00000c91e6600 by task kunit_try_catch/197 [ 30.334512] [ 30.334725] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.334818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.334844] Hardware name: linux,dummy-virt (DT) [ 30.335058] Call trace: [ 30.335081] show_stack+0x20/0x38 (C) [ 30.335133] dump_stack_lvl+0x8c/0xd0 [ 30.335574] print_report+0x118/0x5e8 [ 30.335644] kasan_report+0xdc/0x128 [ 30.335948] __asan_report_load1_noabort+0x20/0x30 [ 30.336076] krealloc_uaf+0x4c8/0x520 [ 30.336187] kunit_try_run_case+0x170/0x3f0 [ 30.336245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.336312] kthread+0x328/0x630 [ 30.336408] ret_from_fork+0x10/0x20 [ 30.336475] [ 30.336513] Allocated by task 197: [ 30.336547] kasan_save_stack+0x3c/0x68 [ 30.336587] kasan_save_track+0x20/0x40 [ 30.336944] kasan_save_alloc_info+0x40/0x58 [ 30.337077] __kasan_kmalloc+0xd4/0xd8 [ 30.337144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.337306] krealloc_uaf+0xc8/0x520 [ 30.337383] kunit_try_run_case+0x170/0x3f0 [ 30.337488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.337554] kthread+0x328/0x630 [ 30.337607] ret_from_fork+0x10/0x20 [ 30.337980] [ 30.338059] Freed by task 197: [ 30.338088] kasan_save_stack+0x3c/0x68 [ 30.338150] kasan_save_track+0x20/0x40 [ 30.338194] kasan_save_free_info+0x4c/0x78 [ 30.338239] __kasan_slab_free+0x6c/0x98 [ 30.338273] kfree+0x214/0x3c8 [ 30.338306] krealloc_uaf+0x12c/0x520 [ 30.338358] kunit_try_run_case+0x170/0x3f0 [ 30.338403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.338453] kthread+0x328/0x630 [ 30.338503] ret_from_fork+0x10/0x20 [ 30.338538] [ 30.338556] The buggy address belongs to the object at fff00000c91e6600 [ 30.338556] which belongs to the cache kmalloc-256 of size 256 [ 30.338628] The buggy address is located 0 bytes inside of [ 30.338628] freed 256-byte region [fff00000c91e6600, fff00000c91e6700) [ 30.338700] [ 30.338738] The buggy address belongs to the physical page: [ 30.338773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.338833] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.338877] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.339213] page_type: f5(slab) [ 30.339517] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.339600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.339757] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.339847] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.339960] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.340019] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.340113] page dumped because: kasan: bad access detected [ 30.340372] [ 30.340515] Memory state around the buggy address: [ 30.340613] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340721] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340859] >fff00000c91e6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.340919] ^ [ 30.340949] fff00000c91e6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.340995] fff00000c91e6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.341031] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.292031] ================================================================== [ 30.292087] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.292140] Write of size 1 at addr fff00000c9ae60da by task kunit_try_catch/195 [ 30.292188] [ 30.292414] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.292564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.292700] Hardware name: linux,dummy-virt (DT) [ 30.292736] Call trace: [ 30.293452] show_stack+0x20/0x38 (C) [ 30.293540] dump_stack_lvl+0x8c/0xd0 [ 30.293618] print_report+0x118/0x5e8 [ 30.293664] kasan_report+0xdc/0x128 [ 30.293876] __asan_report_store1_noabort+0x20/0x30 [ 30.294178] krealloc_less_oob_helper+0xa80/0xc50 [ 30.294425] krealloc_large_less_oob+0x20/0x38 [ 30.294513] kunit_try_run_case+0x170/0x3f0 [ 30.294598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.294650] kthread+0x328/0x630 [ 30.294699] ret_from_fork+0x10/0x20 [ 30.294748] [ 30.294769] The buggy address belongs to the physical page: [ 30.294805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.294856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.294920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.294972] page_type: f8(unknown) [ 30.295018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.295072] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.295118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.295173] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.295236] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.295298] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.295336] page dumped because: kasan: bad access detected [ 30.295365] [ 30.295388] Memory state around the buggy address: [ 30.295433] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.295474] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.295514] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.295560] ^ [ 30.295598] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.295648] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.295684] ================================================================== [ 30.284304] ================================================================== [ 30.284350] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.284509] Write of size 1 at addr fff00000c9ae60d0 by task kunit_try_catch/195 [ 30.285045] [ 30.285153] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.285239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.285265] Hardware name: linux,dummy-virt (DT) [ 30.285294] Call trace: [ 30.285315] show_stack+0x20/0x38 (C) [ 30.285891] dump_stack_lvl+0x8c/0xd0 [ 30.286011] print_report+0x118/0x5e8 [ 30.286157] kasan_report+0xdc/0x128 [ 30.286233] __asan_report_store1_noabort+0x20/0x30 [ 30.286304] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.286687] krealloc_large_less_oob+0x20/0x38 [ 30.286834] kunit_try_run_case+0x170/0x3f0 [ 30.287001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.287248] kthread+0x328/0x630 [ 30.287487] ret_from_fork+0x10/0x20 [ 30.287570] [ 30.287591] The buggy address belongs to the physical page: [ 30.287786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.288049] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.288194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.288300] page_type: f8(unknown) [ 30.288377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.288662] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.288845] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.289012] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.289100] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.289253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.289343] page dumped because: kasan: bad access detected [ 30.289399] [ 30.289422] Memory state around the buggy address: [ 30.289453] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.289496] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.289745] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.289987] ^ [ 30.290126] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.290201] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.290250] ================================================================== [ 30.218815] ================================================================== [ 30.218883] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.218969] Write of size 1 at addr fff00000c91e64c9 by task kunit_try_catch/191 [ 30.219072] [ 30.219163] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.219269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.219306] Hardware name: linux,dummy-virt (DT) [ 30.219339] Call trace: [ 30.219362] show_stack+0x20/0x38 (C) [ 30.219652] dump_stack_lvl+0x8c/0xd0 [ 30.219699] print_report+0x118/0x5e8 [ 30.219760] kasan_report+0xdc/0x128 [ 30.219834] __asan_report_store1_noabort+0x20/0x30 [ 30.219923] krealloc_less_oob_helper+0xa48/0xc50 [ 30.219996] krealloc_less_oob+0x20/0x38 [ 30.220043] kunit_try_run_case+0x170/0x3f0 [ 30.220111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.220195] kthread+0x328/0x630 [ 30.220498] ret_from_fork+0x10/0x20 [ 30.220563] [ 30.220581] Allocated by task 191: [ 30.220609] kasan_save_stack+0x3c/0x68 [ 30.220670] kasan_save_track+0x20/0x40 [ 30.220704] kasan_save_alloc_info+0x40/0x58 [ 30.220800] __kasan_krealloc+0x118/0x178 [ 30.220860] krealloc_noprof+0x128/0x360 [ 30.221002] krealloc_less_oob_helper+0x168/0xc50 [ 30.221070] krealloc_less_oob+0x20/0x38 [ 30.221188] kunit_try_run_case+0x170/0x3f0 [ 30.221276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221368] kthread+0x328/0x630 [ 30.221402] ret_from_fork+0x10/0x20 [ 30.221436] [ 30.221472] The buggy address belongs to the object at fff00000c91e6400 [ 30.221472] which belongs to the cache kmalloc-256 of size 256 [ 30.221709] The buggy address is located 0 bytes to the right of [ 30.221709] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.221774] [ 30.221794] The buggy address belongs to the physical page: [ 30.221834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.221944] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.222025] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.222103] page_type: f5(slab) [ 30.222143] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.222190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.222237] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.222355] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.222402] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.222448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.222523] page dumped because: kasan: bad access detected [ 30.222619] [ 30.222688] Memory state around the buggy address: [ 30.222744] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222812] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.222870] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.222917] ^ [ 30.222953] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222995] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.223068] ================================================================== [ 30.239088] ================================================================== [ 30.239136] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.239186] Write of size 1 at addr fff00000c91e64eb by task kunit_try_catch/191 [ 30.239234] [ 30.239262] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.239343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.239368] Hardware name: linux,dummy-virt (DT) [ 30.239419] Call trace: [ 30.239442] show_stack+0x20/0x38 (C) [ 30.239490] dump_stack_lvl+0x8c/0xd0 [ 30.239534] print_report+0x118/0x5e8 [ 30.239576] kasan_report+0xdc/0x128 [ 30.239617] __asan_report_store1_noabort+0x20/0x30 [ 30.239665] krealloc_less_oob_helper+0xa58/0xc50 [ 30.239714] krealloc_less_oob+0x20/0x38 [ 30.239759] kunit_try_run_case+0x170/0x3f0 [ 30.239803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.239852] kthread+0x328/0x630 [ 30.240072] ret_from_fork+0x10/0x20 [ 30.240138] [ 30.240157] Allocated by task 191: [ 30.240247] kasan_save_stack+0x3c/0x68 [ 30.240298] kasan_save_track+0x20/0x40 [ 30.240492] kasan_save_alloc_info+0x40/0x58 [ 30.240560] __kasan_krealloc+0x118/0x178 [ 30.240639] krealloc_noprof+0x128/0x360 [ 30.240673] krealloc_less_oob_helper+0x168/0xc50 [ 30.240712] krealloc_less_oob+0x20/0x38 [ 30.241229] kunit_try_run_case+0x170/0x3f0 [ 30.241632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.241712] kthread+0x328/0x630 [ 30.241764] ret_from_fork+0x10/0x20 [ 30.241817] [ 30.242258] The buggy address belongs to the object at fff00000c91e6400 [ 30.242258] which belongs to the cache kmalloc-256 of size 256 [ 30.242364] The buggy address is located 34 bytes to the right of [ 30.242364] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.242570] [ 30.242654] The buggy address belongs to the physical page: [ 30.242745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.242850] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.242960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.243285] page_type: f5(slab) [ 30.243344] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.243483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.243595] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.243660] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.243761] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.243814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.243852] page dumped because: kasan: bad access detected [ 30.243881] [ 30.243915] Memory state around the buggy address: [ 30.243946] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244010] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.244059] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.244104] ^ [ 30.244152] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244202] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244238] ================================================================== [ 30.228032] ================================================================== [ 30.228079] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.228154] Write of size 1 at addr fff00000c91e64da by task kunit_try_catch/191 [ 30.228202] [ 30.228255] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.228342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.228368] Hardware name: linux,dummy-virt (DT) [ 30.228398] Call trace: [ 30.228453] show_stack+0x20/0x38 (C) [ 30.228506] dump_stack_lvl+0x8c/0xd0 [ 30.228566] print_report+0x118/0x5e8 [ 30.228666] kasan_report+0xdc/0x128 [ 30.228792] __asan_report_store1_noabort+0x20/0x30 [ 30.228880] krealloc_less_oob_helper+0xa80/0xc50 [ 30.228991] krealloc_less_oob+0x20/0x38 [ 30.229068] kunit_try_run_case+0x170/0x3f0 [ 30.229145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.229195] kthread+0x328/0x630 [ 30.229401] ret_from_fork+0x10/0x20 [ 30.229451] [ 30.229469] Allocated by task 191: [ 30.229495] kasan_save_stack+0x3c/0x68 [ 30.229534] kasan_save_track+0x20/0x40 [ 30.229567] kasan_save_alloc_info+0x40/0x58 [ 30.229603] __kasan_krealloc+0x118/0x178 [ 30.229660] krealloc_noprof+0x128/0x360 [ 30.229730] krealloc_less_oob_helper+0x168/0xc50 [ 30.229776] krealloc_less_oob+0x20/0x38 [ 30.229847] kunit_try_run_case+0x170/0x3f0 [ 30.229954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.230046] kthread+0x328/0x630 [ 30.230084] ret_from_fork+0x10/0x20 [ 30.230131] [ 30.230148] The buggy address belongs to the object at fff00000c91e6400 [ 30.230148] which belongs to the cache kmalloc-256 of size 256 [ 30.230203] The buggy address is located 17 bytes to the right of [ 30.230203] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.230265] [ 30.230304] The buggy address belongs to the physical page: [ 30.230355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.230414] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.230468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.230517] page_type: f5(slab) [ 30.230552] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.230599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.230646] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.230702] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.230749] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.230794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.230832] page dumped because: kasan: bad access detected [ 30.230861] [ 30.230887] Memory state around the buggy address: [ 30.231257] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.231520] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231565] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.231748] ^ [ 30.231852] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.231976] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.232048] ================================================================== [ 30.303961] ================================================================== [ 30.304109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.304183] Write of size 1 at addr fff00000c9ae60eb by task kunit_try_catch/195 [ 30.304386] [ 30.304431] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.304517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.304804] Hardware name: linux,dummy-virt (DT) [ 30.304877] Call trace: [ 30.304976] show_stack+0x20/0x38 (C) [ 30.305211] dump_stack_lvl+0x8c/0xd0 [ 30.305430] print_report+0x118/0x5e8 [ 30.305554] kasan_report+0xdc/0x128 [ 30.305601] __asan_report_store1_noabort+0x20/0x30 [ 30.305678] krealloc_less_oob_helper+0xa58/0xc50 [ 30.306029] krealloc_large_less_oob+0x20/0x38 [ 30.306122] kunit_try_run_case+0x170/0x3f0 [ 30.306255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306343] kthread+0x328/0x630 [ 30.306475] ret_from_fork+0x10/0x20 [ 30.306535] [ 30.306562] The buggy address belongs to the physical page: [ 30.306882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.307065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.307147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.307294] page_type: f8(unknown) [ 30.307351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.307430] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.307514] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.307942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.308067] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.308196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.308273] page dumped because: kasan: bad access detected [ 30.308388] [ 30.308440] Memory state around the buggy address: [ 30.308517] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.308562] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.309007] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.309137] ^ [ 30.309206] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.309348] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.309434] ================================================================== [ 30.232519] ================================================================== [ 30.232596] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.232674] Write of size 1 at addr fff00000c91e64ea by task kunit_try_catch/191 [ 30.232765] [ 30.232801] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.232958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.233011] Hardware name: linux,dummy-virt (DT) [ 30.233041] Call trace: [ 30.233062] show_stack+0x20/0x38 (C) [ 30.233108] dump_stack_lvl+0x8c/0xd0 [ 30.233153] print_report+0x118/0x5e8 [ 30.233253] kasan_report+0xdc/0x128 [ 30.233388] __asan_report_store1_noabort+0x20/0x30 [ 30.233475] krealloc_less_oob_helper+0xae4/0xc50 [ 30.233563] krealloc_less_oob+0x20/0x38 [ 30.233685] kunit_try_run_case+0x170/0x3f0 [ 30.233773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.233848] kthread+0x328/0x630 [ 30.233889] ret_from_fork+0x10/0x20 [ 30.234224] [ 30.234294] Allocated by task 191: [ 30.234378] kasan_save_stack+0x3c/0x68 [ 30.234477] kasan_save_track+0x20/0x40 [ 30.234558] kasan_save_alloc_info+0x40/0x58 [ 30.234651] __kasan_krealloc+0x118/0x178 [ 30.234726] krealloc_noprof+0x128/0x360 [ 30.234783] krealloc_less_oob_helper+0x168/0xc50 [ 30.234824] krealloc_less_oob+0x20/0x38 [ 30.234860] kunit_try_run_case+0x170/0x3f0 [ 30.235158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.235284] kthread+0x328/0x630 [ 30.235362] ret_from_fork+0x10/0x20 [ 30.235428] [ 30.235496] The buggy address belongs to the object at fff00000c91e6400 [ 30.235496] which belongs to the cache kmalloc-256 of size 256 [ 30.235581] The buggy address is located 33 bytes to the right of [ 30.235581] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.235685] [ 30.235712] The buggy address belongs to the physical page: [ 30.235753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.235803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.236066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.236214] page_type: f5(slab) [ 30.236309] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.236396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.236508] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.236554] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.236750] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.236804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.237045] page dumped because: kasan: bad access detected [ 30.237129] [ 30.237194] Memory state around the buggy address: [ 30.237291] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.237369] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.237492] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.237563] ^ [ 30.237614] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.237931] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.238031] ================================================================== [ 30.223482] ================================================================== [ 30.223547] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.223616] Write of size 1 at addr fff00000c91e64d0 by task kunit_try_catch/191 [ 30.223664] [ 30.223693] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.223860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.223889] Hardware name: linux,dummy-virt (DT) [ 30.223931] Call trace: [ 30.223952] show_stack+0x20/0x38 (C) [ 30.224040] dump_stack_lvl+0x8c/0xd0 [ 30.224097] print_report+0x118/0x5e8 [ 30.224165] kasan_report+0xdc/0x128 [ 30.224223] __asan_report_store1_noabort+0x20/0x30 [ 30.224318] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.224383] krealloc_less_oob+0x20/0x38 [ 30.224428] kunit_try_run_case+0x170/0x3f0 [ 30.224473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.224637] kthread+0x328/0x630 [ 30.224683] ret_from_fork+0x10/0x20 [ 30.224741] [ 30.224759] Allocated by task 191: [ 30.224837] kasan_save_stack+0x3c/0x68 [ 30.224975] kasan_save_track+0x20/0x40 [ 30.225037] kasan_save_alloc_info+0x40/0x58 [ 30.225083] __kasan_krealloc+0x118/0x178 [ 30.225134] krealloc_noprof+0x128/0x360 [ 30.225168] krealloc_less_oob_helper+0x168/0xc50 [ 30.225209] krealloc_less_oob+0x20/0x38 [ 30.225246] kunit_try_run_case+0x170/0x3f0 [ 30.225410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.225453] kthread+0x328/0x630 [ 30.225484] ret_from_fork+0x10/0x20 [ 30.225518] [ 30.225536] The buggy address belongs to the object at fff00000c91e6400 [ 30.225536] which belongs to the cache kmalloc-256 of size 256 [ 30.225591] The buggy address is located 7 bytes to the right of [ 30.225591] allocated 201-byte region [fff00000c91e6400, fff00000c91e64c9) [ 30.225718] [ 30.225797] The buggy address belongs to the physical page: [ 30.225880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.225993] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.226087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.226192] page_type: f5(slab) [ 30.226270] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.226332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.226387] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.226561] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.226609] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.226669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.226776] page dumped because: kasan: bad access detected [ 30.226926] [ 30.226996] Memory state around the buggy address: [ 30.227084] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227173] fff00000c91e6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.227226] >fff00000c91e6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.227278] ^ [ 30.227315] fff00000c91e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227372] fff00000c91e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227410] ================================================================== [ 30.279215] ================================================================== [ 30.279292] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.279352] Write of size 1 at addr fff00000c9ae60c9 by task kunit_try_catch/195 [ 30.279598] [ 30.279663] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.279946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.280025] Hardware name: linux,dummy-virt (DT) [ 30.280059] Call trace: [ 30.280100] show_stack+0x20/0x38 (C) [ 30.280224] dump_stack_lvl+0x8c/0xd0 [ 30.280300] print_report+0x118/0x5e8 [ 30.280344] kasan_report+0xdc/0x128 [ 30.280530] __asan_report_store1_noabort+0x20/0x30 [ 30.280765] krealloc_less_oob_helper+0xa48/0xc50 [ 30.280852] krealloc_large_less_oob+0x20/0x38 [ 30.280999] kunit_try_run_case+0x170/0x3f0 [ 30.281081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.281219] kthread+0x328/0x630 [ 30.281285] ret_from_fork+0x10/0x20 [ 30.281341] [ 30.281361] The buggy address belongs to the physical page: [ 30.281396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.281867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.281981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.282070] page_type: f8(unknown) [ 30.282198] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.282292] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.282542] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.282749] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.282964] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.283041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.283172] page dumped because: kasan: bad access detected [ 30.283215] [ 30.283234] Memory state around the buggy address: [ 30.283265] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.283347] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.283388] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.283433] ^ [ 30.283470] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.283520] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.283562] ================================================================== [ 30.296738] ================================================================== [ 30.297050] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.297220] Write of size 1 at addr fff00000c9ae60ea by task kunit_try_catch/195 [ 30.297277] [ 30.297688] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.298110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.298165] Hardware name: linux,dummy-virt (DT) [ 30.298295] Call trace: [ 30.298321] show_stack+0x20/0x38 (C) [ 30.298378] dump_stack_lvl+0x8c/0xd0 [ 30.298425] print_report+0x118/0x5e8 [ 30.298478] kasan_report+0xdc/0x128 [ 30.298645] __asan_report_store1_noabort+0x20/0x30 [ 30.298708] krealloc_less_oob_helper+0xae4/0xc50 [ 30.298818] krealloc_large_less_oob+0x20/0x38 [ 30.299166] kunit_try_run_case+0x170/0x3f0 [ 30.299442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.299511] kthread+0x328/0x630 [ 30.299570] ret_from_fork+0x10/0x20 [ 30.299825] [ 30.299980] The buggy address belongs to the physical page: [ 30.300026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.300079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.300123] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.300306] page_type: f8(unknown) [ 30.300437] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.300578] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.300633] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.300681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.301039] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.301187] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.301228] page dumped because: kasan: bad access detected [ 30.301435] [ 30.301464] Memory state around the buggy address: [ 30.301622] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.301947] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.302147] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.302191] ^ [ 30.302543] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.302678] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.302764] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.254124] ================================================================== [ 30.254473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.254561] Write of size 1 at addr fff00000c9ae60eb by task kunit_try_catch/193 [ 30.254614] [ 30.254827] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.255101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.255167] Hardware name: linux,dummy-virt (DT) [ 30.255217] Call trace: [ 30.255245] show_stack+0x20/0x38 (C) [ 30.255816] dump_stack_lvl+0x8c/0xd0 [ 30.256069] print_report+0x118/0x5e8 [ 30.256127] kasan_report+0xdc/0x128 [ 30.256171] __asan_report_store1_noabort+0x20/0x30 [ 30.256218] krealloc_more_oob_helper+0x60c/0x678 [ 30.256418] krealloc_large_more_oob+0x20/0x38 [ 30.256886] kunit_try_run_case+0x170/0x3f0 [ 30.257072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.257230] kthread+0x328/0x630 [ 30.257319] ret_from_fork+0x10/0x20 [ 30.257461] [ 30.257501] The buggy address belongs to the physical page: [ 30.257556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.257675] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.257745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.257957] page_type: f8(unknown) [ 30.258164] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.258275] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.258367] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.258585] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.258698] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.258884] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.259016] page dumped because: kasan: bad access detected [ 30.259057] [ 30.259085] Memory state around the buggy address: [ 30.259249] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.259640] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.259869] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.259923] ^ [ 30.260276] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.260410] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.260474] ================================================================== [ 30.169020] ================================================================== [ 30.169078] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.169132] Write of size 1 at addr fff00000c91e62eb by task kunit_try_catch/189 [ 30.169195] [ 30.169225] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.169565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.169604] Hardware name: linux,dummy-virt (DT) [ 30.169725] Call trace: [ 30.169809] show_stack+0x20/0x38 (C) [ 30.169884] dump_stack_lvl+0x8c/0xd0 [ 30.169941] print_report+0x118/0x5e8 [ 30.169984] kasan_report+0xdc/0x128 [ 30.170032] __asan_report_store1_noabort+0x20/0x30 [ 30.170258] krealloc_more_oob_helper+0x60c/0x678 [ 30.170353] krealloc_more_oob+0x20/0x38 [ 30.170469] kunit_try_run_case+0x170/0x3f0 [ 30.170521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.170577] kthread+0x328/0x630 [ 30.170631] ret_from_fork+0x10/0x20 [ 30.170678] [ 30.170697] Allocated by task 189: [ 30.170756] kasan_save_stack+0x3c/0x68 [ 30.170917] kasan_save_track+0x20/0x40 [ 30.170951] kasan_save_alloc_info+0x40/0x58 [ 30.170987] __kasan_krealloc+0x118/0x178 [ 30.171021] krealloc_noprof+0x128/0x360 [ 30.171055] krealloc_more_oob_helper+0x168/0x678 [ 30.171395] krealloc_more_oob+0x20/0x38 [ 30.171457] kunit_try_run_case+0x170/0x3f0 [ 30.171493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.171535] kthread+0x328/0x630 [ 30.171914] ret_from_fork+0x10/0x20 [ 30.171966] [ 30.171988] The buggy address belongs to the object at fff00000c91e6200 [ 30.171988] which belongs to the cache kmalloc-256 of size 256 [ 30.172046] The buggy address is located 0 bytes to the right of [ 30.172046] allocated 235-byte region [fff00000c91e6200, fff00000c91e62eb) [ 30.172108] [ 30.172129] The buggy address belongs to the physical page: [ 30.172166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.172237] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.172327] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.172444] page_type: f5(slab) [ 30.172480] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.172779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.173379] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.173446] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.174007] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.174058] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.174096] page dumped because: kasan: bad access detected [ 30.174125] [ 30.174142] Memory state around the buggy address: [ 30.174957] fff00000c91e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.175297] fff00000c91e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.175812] >fff00000c91e6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.175878] ^ [ 30.176483] fff00000c91e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.176766] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177180] ================================================================== [ 30.179035] ================================================================== [ 30.180670] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.181075] Write of size 1 at addr fff00000c91e62f0 by task kunit_try_catch/189 [ 30.181520] [ 30.182073] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.182878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.182920] Hardware name: linux,dummy-virt (DT) [ 30.183789] Call trace: [ 30.183832] show_stack+0x20/0x38 (C) [ 30.184194] dump_stack_lvl+0x8c/0xd0 [ 30.184248] print_report+0x118/0x5e8 [ 30.184292] kasan_report+0xdc/0x128 [ 30.184333] __asan_report_store1_noabort+0x20/0x30 [ 30.184380] krealloc_more_oob_helper+0x5c0/0x678 [ 30.185395] krealloc_more_oob+0x20/0x38 [ 30.185849] kunit_try_run_case+0x170/0x3f0 [ 30.186081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186709] kthread+0x328/0x630 [ 30.187195] ret_from_fork+0x10/0x20 [ 30.187339] [ 30.187406] Allocated by task 189: [ 30.187434] kasan_save_stack+0x3c/0x68 [ 30.187476] kasan_save_track+0x20/0x40 [ 30.188499] kasan_save_alloc_info+0x40/0x58 [ 30.188554] __kasan_krealloc+0x118/0x178 [ 30.189350] krealloc_noprof+0x128/0x360 [ 30.189509] krealloc_more_oob_helper+0x168/0x678 [ 30.189657] krealloc_more_oob+0x20/0x38 [ 30.190054] kunit_try_run_case+0x170/0x3f0 [ 30.190548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.190743] kthread+0x328/0x630 [ 30.191050] ret_from_fork+0x10/0x20 [ 30.191463] [ 30.191502] The buggy address belongs to the object at fff00000c91e6200 [ 30.191502] which belongs to the cache kmalloc-256 of size 256 [ 30.192129] The buggy address is located 5 bytes to the right of [ 30.192129] allocated 235-byte region [fff00000c91e6200, fff00000c91e62eb) [ 30.192252] [ 30.192858] The buggy address belongs to the physical page: [ 30.192929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091e6 [ 30.193728] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.193786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.194531] page_type: f5(slab) [ 30.194615] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.194850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.195233] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.195752] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.195859] head: 0bfffe0000000001 ffffc1ffc3247981 00000000ffffffff 00000000ffffffff [ 30.195940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.196685] page dumped because: kasan: bad access detected [ 30.196724] [ 30.196745] Memory state around the buggy address: [ 30.197299] fff00000c91e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.197490] fff00000c91e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.197581] >fff00000c91e6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.197734] ^ [ 30.198467] fff00000c91e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.198762] fff00000c91e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.199129] ================================================================== [ 30.263613] ================================================================== [ 30.263668] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.263996] Write of size 1 at addr fff00000c9ae60f0 by task kunit_try_catch/193 [ 30.264127] [ 30.264165] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.264249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.264402] Hardware name: linux,dummy-virt (DT) [ 30.264464] Call trace: [ 30.264488] show_stack+0x20/0x38 (C) [ 30.264772] dump_stack_lvl+0x8c/0xd0 [ 30.265019] print_report+0x118/0x5e8 [ 30.265073] kasan_report+0xdc/0x128 [ 30.265116] __asan_report_store1_noabort+0x20/0x30 [ 30.265163] krealloc_more_oob_helper+0x5c0/0x678 [ 30.265635] krealloc_large_more_oob+0x20/0x38 [ 30.265735] kunit_try_run_case+0x170/0x3f0 [ 30.265931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.266155] kthread+0x328/0x630 [ 30.266227] ret_from_fork+0x10/0x20 [ 30.266541] [ 30.266670] The buggy address belongs to the physical page: [ 30.266838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae4 [ 30.267068] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.267195] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.267421] page_type: f8(unknown) [ 30.267659] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.267775] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.267832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.268158] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.268310] head: 0bfffe0000000002 ffffc1ffc326b901 00000000ffffffff 00000000ffffffff [ 30.268385] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.268667] page dumped because: kasan: bad access detected [ 30.268883] [ 30.268984] Memory state around the buggy address: [ 30.269018] fff00000c9ae5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.269309] fff00000c9ae6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.269473] >fff00000c9ae6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.269566] ^ [ 30.269634] fff00000c9ae6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.269681] fff00000c9ae6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.269743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.158508] ================================================================== [ 30.158567] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.158884] Read of size 1 at addr fff00000c9b10000 by task kunit_try_catch/187 [ 30.158949] [ 30.158982] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.159064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.159101] Hardware name: linux,dummy-virt (DT) [ 30.159206] Call trace: [ 30.159309] show_stack+0x20/0x38 (C) [ 30.159367] dump_stack_lvl+0x8c/0xd0 [ 30.159700] print_report+0x118/0x5e8 [ 30.159791] kasan_report+0xdc/0x128 [ 30.159834] __asan_report_load1_noabort+0x20/0x30 [ 30.159881] page_alloc_uaf+0x328/0x350 [ 30.159937] kunit_try_run_case+0x170/0x3f0 [ 30.159994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.160078] kthread+0x328/0x630 [ 30.160119] ret_from_fork+0x10/0x20 [ 30.160166] [ 30.160185] The buggy address belongs to the physical page: [ 30.160249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b10 [ 30.160357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.160434] page_type: f0(buddy) [ 30.160670] raw: 0bfffe0000000000 fff00000ff6160e0 fff00000ff6160e0 0000000000000000 [ 30.160838] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 30.160917] page dumped because: kasan: bad access detected [ 30.160946] [ 30.160964] Memory state around the buggy address: [ 30.161005] fff00000c9b0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161048] fff00000c9b0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161088] >fff00000c9b10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161376] ^ [ 30.161415] fff00000c9b10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161543] fff00000c9b10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161580] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 30.139037] ================================================================== [ 30.139231] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.139511] Free of addr fff00000c9ae0001 by task kunit_try_catch/183 [ 30.139716] [ 30.139782] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.139870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.140003] Hardware name: linux,dummy-virt (DT) [ 30.140146] Call trace: [ 30.140228] show_stack+0x20/0x38 (C) [ 30.140282] dump_stack_lvl+0x8c/0xd0 [ 30.140437] print_report+0x118/0x5e8 [ 30.140491] kasan_report_invalid_free+0xc0/0xe8 [ 30.140586] __kasan_kfree_large+0x5c/0xa8 [ 30.140630] free_large_kmalloc+0x68/0x150 [ 30.140675] kfree+0x270/0x3c8 [ 30.140717] kmalloc_large_invalid_free+0x108/0x270 [ 30.140766] kunit_try_run_case+0x170/0x3f0 [ 30.140886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.141170] kthread+0x328/0x630 [ 30.141233] ret_from_fork+0x10/0x20 [ 30.141320] [ 30.141427] The buggy address belongs to the physical page: [ 30.141806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0 [ 30.142057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.142128] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.142254] page_type: f8(unknown) [ 30.142324] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.142425] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.142561] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.142609] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.142664] head: 0bfffe0000000002 ffffc1ffc326b801 00000000ffffffff 00000000ffffffff [ 30.142886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.143137] page dumped because: kasan: bad access detected [ 30.143246] [ 30.143266] Memory state around the buggy address: [ 30.143303] fff00000c9adff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.143347] fff00000c9adff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.143390] >fff00000c9ae0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.143428] ^ [ 30.143457] fff00000c9ae0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.143499] fff00000c9ae0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.144040] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.126773] ================================================================== [ 30.127244] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.127474] Read of size 1 at addr fff00000c9ae0000 by task kunit_try_catch/181 [ 30.127524] [ 30.127565] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.127652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.127679] Hardware name: linux,dummy-virt (DT) [ 30.128199] Call trace: [ 30.128262] show_stack+0x20/0x38 (C) [ 30.128324] dump_stack_lvl+0x8c/0xd0 [ 30.128378] print_report+0x118/0x5e8 [ 30.128421] kasan_report+0xdc/0x128 [ 30.128767] __asan_report_load1_noabort+0x20/0x30 [ 30.128818] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.128864] kunit_try_run_case+0x170/0x3f0 [ 30.128920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.129041] kthread+0x328/0x630 [ 30.129125] ret_from_fork+0x10/0x20 [ 30.129412] [ 30.129437] The buggy address belongs to the physical page: [ 30.129501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0 [ 30.129668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.129737] raw: 0bfffe0000000000 ffffc1ffc326b908 fff00000da44ed00 0000000000000000 [ 30.129810] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.129852] page dumped because: kasan: bad access detected [ 30.129887] [ 30.129923] Memory state around the buggy address: [ 30.129955] fff00000c9adff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.129996] fff00000c9adff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.130193] >fff00000c9ae0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.130357] ^ [ 30.130460] fff00000c9ae0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.130512] fff00000c9ae0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.130595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.107555] ================================================================== [ 30.107907] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.107972] Write of size 1 at addr fff00000c9ae200a by task kunit_try_catch/179 [ 30.108021] [ 30.108085] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.108174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.108200] Hardware name: linux,dummy-virt (DT) [ 30.108230] Call trace: [ 30.108253] show_stack+0x20/0x38 (C) [ 30.108301] dump_stack_lvl+0x8c/0xd0 [ 30.108347] print_report+0x118/0x5e8 [ 30.108388] kasan_report+0xdc/0x128 [ 30.108428] __asan_report_store1_noabort+0x20/0x30 [ 30.108474] kmalloc_large_oob_right+0x278/0x2b8 [ 30.109674] kunit_try_run_case+0x170/0x3f0 [ 30.109740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.109792] kthread+0x328/0x630 [ 30.110022] ret_from_fork+0x10/0x20 [ 30.110295] [ 30.110338] The buggy address belongs to the physical page: [ 30.110500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0 [ 30.110867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.110933] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.111375] page_type: f8(unknown) [ 30.111586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.111782] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.111834] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.112171] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.112242] head: 0bfffe0000000002 ffffc1ffc326b801 00000000ffffffff 00000000ffffffff [ 30.112348] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.112436] page dumped because: kasan: bad access detected [ 30.112501] [ 30.112549] Memory state around the buggy address: [ 30.112582] fff00000c9ae1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.112624] fff00000c9ae1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.113081] >fff00000c9ae2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.113125] ^ [ 30.113158] fff00000c9ae2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.113247] fff00000c9ae2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.113402] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.092029] ================================================================== [ 30.092226] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.092288] Write of size 1 at addr fff00000c1addf00 by task kunit_try_catch/177 [ 30.092336] [ 30.092569] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.092962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.092989] Hardware name: linux,dummy-virt (DT) [ 30.093019] Call trace: [ 30.093042] show_stack+0x20/0x38 (C) [ 30.093237] dump_stack_lvl+0x8c/0xd0 [ 30.093287] print_report+0x118/0x5e8 [ 30.093339] kasan_report+0xdc/0x128 [ 30.093582] __asan_report_store1_noabort+0x20/0x30 [ 30.093639] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.093686] kunit_try_run_case+0x170/0x3f0 [ 30.093734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.093906] kthread+0x328/0x630 [ 30.094101] ret_from_fork+0x10/0x20 [ 30.094157] [ 30.094245] Allocated by task 177: [ 30.094336] kasan_save_stack+0x3c/0x68 [ 30.094386] kasan_save_track+0x20/0x40 [ 30.094420] kasan_save_alloc_info+0x40/0x58 [ 30.094463] __kasan_kmalloc+0xd4/0xd8 [ 30.094562] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.094624] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.094663] kunit_try_run_case+0x170/0x3f0 [ 30.094738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.094893] kthread+0x328/0x630 [ 30.095246] ret_from_fork+0x10/0x20 [ 30.095528] [ 30.095552] The buggy address belongs to the object at fff00000c1adc000 [ 30.095552] which belongs to the cache kmalloc-8k of size 8192 [ 30.095736] The buggy address is located 0 bytes to the right of [ 30.095736] allocated 7936-byte region [fff00000c1adc000, fff00000c1addf00) [ 30.095889] [ 30.095924] The buggy address belongs to the physical page: [ 30.096042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ad8 [ 30.096734] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.096858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.097202] page_type: f5(slab) [ 30.097301] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 30.097356] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.097512] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 30.097751] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.097800] head: 0bfffe0000000003 ffffc1ffc306b601 00000000ffffffff 00000000ffffffff [ 30.097870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.098021] page dumped because: kasan: bad access detected [ 30.098082] [ 30.098101] Memory state around the buggy address: [ 30.098133] fff00000c1adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.098465] fff00000c1adde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.098711] >fff00000c1addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.098762] ^ [ 30.098839] fff00000c1addf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.098879] fff00000c1ade000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.098925] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.074599] ================================================================== [ 30.074647] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.075257] Write of size 1 at addr fff00000c99bc878 by task kunit_try_catch/175 [ 30.075428] [ 30.075502] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.075667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.075693] Hardware name: linux,dummy-virt (DT) [ 30.075729] Call trace: [ 30.075830] show_stack+0x20/0x38 (C) [ 30.075886] dump_stack_lvl+0x8c/0xd0 [ 30.076251] print_report+0x118/0x5e8 [ 30.076538] kasan_report+0xdc/0x128 [ 30.076621] __asan_report_store1_noabort+0x20/0x30 [ 30.076716] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.076923] kunit_try_run_case+0x170/0x3f0 [ 30.077250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.077314] kthread+0x328/0x630 [ 30.077361] ret_from_fork+0x10/0x20 [ 30.077407] [ 30.077640] Allocated by task 175: [ 30.077818] kasan_save_stack+0x3c/0x68 [ 30.077864] kasan_save_track+0x20/0x40 [ 30.077910] kasan_save_alloc_info+0x40/0x58 [ 30.077946] __kasan_kmalloc+0xd4/0xd8 [ 30.077988] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.078029] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.078324] kunit_try_run_case+0x170/0x3f0 [ 30.078748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.078851] kthread+0x328/0x630 [ 30.078883] ret_from_fork+0x10/0x20 [ 30.078927] [ 30.078946] The buggy address belongs to the object at fff00000c99bc800 [ 30.078946] which belongs to the cache kmalloc-128 of size 128 [ 30.079400] The buggy address is located 0 bytes to the right of [ 30.079400] allocated 120-byte region [fff00000c99bc800, fff00000c99bc878) [ 30.079828] [ 30.079875] The buggy address belongs to the physical page: [ 30.079918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.079971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.080183] page_type: f5(slab) [ 30.080393] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.080445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.080483] page dumped because: kasan: bad access detected [ 30.080512] [ 30.080557] Memory state around the buggy address: [ 30.080587] fff00000c99bc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.080779] fff00000c99bc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.080970] >fff00000c99bc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.081007] ^ [ 30.081048] fff00000c99bc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.081265] fff00000c99bc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.081306] ================================================================== [ 30.067980] ================================================================== [ 30.068041] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.068108] Write of size 1 at addr fff00000c99bc778 by task kunit_try_catch/175 [ 30.068415] [ 30.068461] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.068644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.068727] Hardware name: linux,dummy-virt (DT) [ 30.068802] Call trace: [ 30.068911] show_stack+0x20/0x38 (C) [ 30.069009] dump_stack_lvl+0x8c/0xd0 [ 30.069129] print_report+0x118/0x5e8 [ 30.069195] kasan_report+0xdc/0x128 [ 30.069238] __asan_report_store1_noabort+0x20/0x30 [ 30.069286] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.069363] kunit_try_run_case+0x170/0x3f0 [ 30.069409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.069737] kthread+0x328/0x630 [ 30.069791] ret_from_fork+0x10/0x20 [ 30.069861] [ 30.069879] Allocated by task 175: [ 30.069917] kasan_save_stack+0x3c/0x68 [ 30.069966] kasan_save_track+0x20/0x40 [ 30.070010] kasan_save_alloc_info+0x40/0x58 [ 30.070056] __kasan_kmalloc+0xd4/0xd8 [ 30.070089] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.070130] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.070180] kunit_try_run_case+0x170/0x3f0 [ 30.070218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.070299] kthread+0x328/0x630 [ 30.070422] ret_from_fork+0x10/0x20 [ 30.070456] [ 30.070474] The buggy address belongs to the object at fff00000c99bc700 [ 30.070474] which belongs to the cache kmalloc-128 of size 128 [ 30.070616] The buggy address is located 0 bytes to the right of [ 30.070616] allocated 120-byte region [fff00000c99bc700, fff00000c99bc778) [ 30.070678] [ 30.070697] The buggy address belongs to the physical page: [ 30.070738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.071361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.071419] page_type: f5(slab) [ 30.071458] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.071640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.072392] page dumped because: kasan: bad access detected [ 30.072654] [ 30.072683] Memory state around the buggy address: [ 30.072716] fff00000c99bc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.072758] fff00000c99bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.072799] >fff00000c99bc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.072838] ^ [ 30.072933] fff00000c99bc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.073104] fff00000c99bc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.073341] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 30.046623] ================================================================== [ 30.046743] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.046812] Read of size 1 at addr fff00000c8603e1f by task kunit_try_catch/171 [ 30.046861] [ 30.046925] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.047013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.047039] Hardware name: linux,dummy-virt (DT) [ 30.047070] Call trace: [ 30.047094] show_stack+0x20/0x38 (C) [ 30.047145] dump_stack_lvl+0x8c/0xd0 [ 30.047192] print_report+0x118/0x5e8 [ 30.047235] kasan_report+0xdc/0x128 [ 30.047286] __asan_report_load1_noabort+0x20/0x30 [ 30.047335] kmalloc_oob_left+0x2ec/0x320 [ 30.047380] kunit_try_run_case+0x170/0x3f0 [ 30.047427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047477] kthread+0x328/0x630 [ 30.047526] ret_from_fork+0x10/0x20 [ 30.047574] [ 30.047598] Allocated by task 111: [ 30.047627] kasan_save_stack+0x3c/0x68 [ 30.047666] kasan_save_track+0x20/0x40 [ 30.047704] kasan_save_alloc_info+0x40/0x58 [ 30.047741] __kasan_kmalloc+0xd4/0xd8 [ 30.047773] __kmalloc_noprof+0x198/0x4c8 [ 30.047813] kunit_kmalloc_array+0x34/0x88 [ 30.047857] test_readerwriter+0x3b0/0x948 [ 30.047908] kunit_try_run_case+0x170/0x3f0 [ 30.047943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047984] kthread+0x328/0x630 [ 30.048415] ret_from_fork+0x10/0x20 [ 30.048494] [ 30.048515] The buggy address belongs to the object at fff00000c8603e00 [ 30.048515] which belongs to the cache kmalloc-16 of size 16 [ 30.048706] The buggy address is located 15 bytes to the right of [ 30.048706] allocated 16-byte region [fff00000c8603e00, fff00000c8603e10) [ 30.048808] [ 30.048858] The buggy address belongs to the physical page: [ 30.048951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8603e00 pfn:0x108603 [ 30.049031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.049183] page_type: f5(slab) [ 30.049243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.049291] raw: fff00000c8603e00 000000008080007f 00000000f5000000 0000000000000000 [ 30.049331] page dumped because: kasan: bad access detected [ 30.049360] [ 30.049444] Memory state around the buggy address: [ 30.049570] fff00000c8603d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.049618] fff00000c8603d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.049660] >fff00000c8603e00: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 30.049720] ^ [ 30.049779] fff00000c8603e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.049891] fff00000c8603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.049983] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 30.018758] ================================================================== [ 30.019125] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.019944] Write of size 1 at addr fff00000c99bc573 by task kunit_try_catch/169 [ 30.020052] [ 30.020888] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.021063] Tainted: [N]=TEST [ 30.021096] Hardware name: linux,dummy-virt (DT) [ 30.021312] Call trace: [ 30.021482] show_stack+0x20/0x38 (C) [ 30.021617] dump_stack_lvl+0x8c/0xd0 [ 30.021668] print_report+0x118/0x5e8 [ 30.021712] kasan_report+0xdc/0x128 [ 30.021753] __asan_report_store1_noabort+0x20/0x30 [ 30.021801] kmalloc_oob_right+0x5a4/0x660 [ 30.021847] kunit_try_run_case+0x170/0x3f0 [ 30.021908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.021959] kthread+0x328/0x630 [ 30.022002] ret_from_fork+0x10/0x20 [ 30.022166] [ 30.022228] Allocated by task 169: [ 30.022344] kasan_save_stack+0x3c/0x68 [ 30.022418] kasan_save_track+0x20/0x40 [ 30.022464] kasan_save_alloc_info+0x40/0x58 [ 30.022501] __kasan_kmalloc+0xd4/0xd8 [ 30.022534] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.022576] kmalloc_oob_right+0xb0/0x660 [ 30.022613] kunit_try_run_case+0x170/0x3f0 [ 30.022649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.022690] kthread+0x328/0x630 [ 30.022722] ret_from_fork+0x10/0x20 [ 30.022775] [ 30.022832] The buggy address belongs to the object at fff00000c99bc500 [ 30.022832] which belongs to the cache kmalloc-128 of size 128 [ 30.022939] The buggy address is located 0 bytes to the right of [ 30.022939] allocated 115-byte region [fff00000c99bc500, fff00000c99bc573) [ 30.023006] [ 30.023085] The buggy address belongs to the physical page: [ 30.023430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.023669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.023958] page_type: f5(slab) [ 30.024248] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.024308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.024406] page dumped because: kasan: bad access detected [ 30.024446] [ 30.024472] Memory state around the buggy address: [ 30.024748] fff00000c99bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.024821] fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.024873] >fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.024937] ^ [ 30.025024] fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.025066] fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.025128] ================================================================== [ 30.027468] ================================================================== [ 30.027509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.027561] Write of size 1 at addr fff00000c99bc578 by task kunit_try_catch/169 [ 30.027609] [ 30.027642] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.027727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.027753] Hardware name: linux,dummy-virt (DT) [ 30.027784] Call trace: [ 30.027807] show_stack+0x20/0x38 (C) [ 30.027854] dump_stack_lvl+0x8c/0xd0 [ 30.027915] print_report+0x118/0x5e8 [ 30.027959] kasan_report+0xdc/0x128 [ 30.028000] __asan_report_store1_noabort+0x20/0x30 [ 30.028048] kmalloc_oob_right+0x538/0x660 [ 30.028093] kunit_try_run_case+0x170/0x3f0 [ 30.028140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.028190] kthread+0x328/0x630 [ 30.028231] ret_from_fork+0x10/0x20 [ 30.028277] [ 30.029375] Allocated by task 169: [ 30.029420] kasan_save_stack+0x3c/0x68 [ 30.029469] kasan_save_track+0x20/0x40 [ 30.029507] kasan_save_alloc_info+0x40/0x58 [ 30.029544] __kasan_kmalloc+0xd4/0xd8 [ 30.029577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.029618] kmalloc_oob_right+0xb0/0x660 [ 30.029654] kunit_try_run_case+0x170/0x3f0 [ 30.029690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.029731] kthread+0x328/0x630 [ 30.029763] ret_from_fork+0x10/0x20 [ 30.029797] [ 30.029816] The buggy address belongs to the object at fff00000c99bc500 [ 30.029816] which belongs to the cache kmalloc-128 of size 128 [ 30.029872] The buggy address is located 5 bytes to the right of [ 30.029872] allocated 115-byte region [fff00000c99bc500, fff00000c99bc573) [ 30.029947] [ 30.029967] The buggy address belongs to the physical page: [ 30.030000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.030051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.030098] page_type: f5(slab) [ 30.030135] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.030182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.030220] page dumped because: kasan: bad access detected [ 30.030251] [ 30.030269] Memory state around the buggy address: [ 30.030300] fff00000c99bc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.030342] fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030390] >fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.030426] ^ [ 30.030467] fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030507] fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030543] ================================================================== [ 30.031135] ================================================================== [ 30.031184] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.031231] Read of size 1 at addr fff00000c99bc580 by task kunit_try_catch/169 [ 30.031279] [ 30.031308] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.031458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.031576] Hardware name: linux,dummy-virt (DT) [ 30.031612] Call trace: [ 30.031734] show_stack+0x20/0x38 (C) [ 30.031803] dump_stack_lvl+0x8c/0xd0 [ 30.031851] print_report+0x118/0x5e8 [ 30.032132] kasan_report+0xdc/0x128 [ 30.032289] __asan_report_load1_noabort+0x20/0x30 [ 30.032354] kmalloc_oob_right+0x5d0/0x660 [ 30.032401] kunit_try_run_case+0x170/0x3f0 [ 30.032448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.032509] kthread+0x328/0x630 [ 30.032551] ret_from_fork+0x10/0x20 [ 30.032597] [ 30.032615] Allocated by task 169: [ 30.032778] kasan_save_stack+0x3c/0x68 [ 30.032822] kasan_save_track+0x20/0x40 [ 30.032960] kasan_save_alloc_info+0x40/0x58 [ 30.033090] __kasan_kmalloc+0xd4/0xd8 [ 30.033160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.033292] kmalloc_oob_right+0xb0/0x660 [ 30.033393] kunit_try_run_case+0x170/0x3f0 [ 30.033440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.033481] kthread+0x328/0x630 [ 30.033824] ret_from_fork+0x10/0x20 [ 30.033924] [ 30.033985] The buggy address belongs to the object at fff00000c99bc500 [ 30.033985] which belongs to the cache kmalloc-128 of size 128 [ 30.034097] The buggy address is located 13 bytes to the right of [ 30.034097] allocated 115-byte region [fff00000c99bc500, fff00000c99bc573) [ 30.034163] [ 30.034183] The buggy address belongs to the physical page: [ 30.034218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc [ 30.034281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.034329] page_type: f5(slab) [ 30.034377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.034426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.034464] page dumped because: kasan: bad access detected [ 30.034493] [ 30.034520] Memory state around the buggy address: [ 30.034550] fff00000c99bc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034591] fff00000c99bc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.034631] >fff00000c99bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034676] ^ [ 30.034712] fff00000c99bc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034767] fff00000c99bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034819] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 109.624320] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/691 [ 109.626250] Modules linked in: [ 109.626766] CPU: 0 UID: 0 PID: 691 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 109.627223] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.627453] Hardware name: linux,dummy-virt (DT) [ 109.627651] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.628265] pc : intlog10+0x38/0x48 [ 109.628836] lr : intlog10_test+0xe4/0x200 [ 109.629635] sp : ffff800082257c10 [ 109.630060] x29: ffff800082257c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.631058] x26: 1ffe00001917b2a1 x25: 0000000000000000 x24: ffff800082257ce0 [ 109.632019] x23: ffff800082257d00 x22: 0000000000000000 x21: 1ffff0001044af82 [ 109.633180] x20: ffff91bcfa251e60 x19: ffff800080087990 x18: 00000000c2bfebc6 [ 109.634153] x17: 0000000076da895b x16: 00000000bda69549 x15: 00000000d8cba519 [ 109.635174] x14: 0000000045dff68e x13: 000000004e992115 x12: ffff72379fc2b589 [ 109.636143] x11: 1ffff2379fc2b588 x10: ffff72379fc2b588 x9 : ffff91bcf785c2a4 [ 109.637230] x8 : ffff91bcfe15ac43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.637817] x5 : ffff70001044af82 x4 : 1ffff00010010f3b x3 : 1ffff2379f44a3cc [ 109.638184] x2 : 1ffff2379f44a3cc x1 : 0000000000000003 x0 : 0000000000000000 [ 109.638543] Call trace: [ 109.638684] intlog10+0x38/0x48 (P) [ 109.638879] kunit_try_run_case+0x170/0x3f0 [ 109.639856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.640668] kthread+0x328/0x630 [ 109.641212] ret_from_fork+0x10/0x20 [ 109.641880] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 109.578485] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/673 [ 109.580175] Modules linked in: [ 109.580399] CPU: 0 UID: 0 PID: 673 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 109.581669] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.582547] Hardware name: linux,dummy-virt (DT) [ 109.583194] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.583953] pc : intlog2+0xd8/0xf8 [ 109.584162] lr : intlog2_test+0xe4/0x200 [ 109.584723] sp : ffff8000822f7c10 [ 109.585282] x29: ffff8000822f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.585678] x26: 1ffe000019563fa1 x25: 0000000000000000 x24: ffff8000822f7ce0 [ 109.586279] x23: ffff8000822f7d00 x22: 0000000000000000 x21: 1ffff0001045ef82 [ 109.587050] x20: ffff91bcfa251d60 x19: ffff800080087990 x18: 000000005d3b5737 [ 109.587794] x17: 0000000066def55e x16: fff00000c1baa03c x15: 000000002ec036d0 [ 109.588584] x14: 00000000870d5c2c x13: 1ffe00001b48d9dd x12: ffff72379fc2b589 [ 109.589114] x11: 1ffff2379fc2b588 x10: ffff72379fc2b588 x9 : ffff91bcf785c4a4 [ 109.589995] x8 : ffff91bcfe15ac43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.590972] x5 : ffff70001045ef82 x4 : 1ffff00010010f3b x3 : 1ffff2379f44a3ac [ 109.591655] x2 : 1ffff2379f44a3ac x1 : 0000000000000003 x0 : 0000000000000000 [ 109.592027] Call trace: [ 109.592168] intlog2+0xd8/0xf8 (P) [ 109.592358] kunit_try_run_case+0x170/0x3f0 [ 109.592657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.593364] kthread+0x328/0x630 [ 109.593804] ret_from_fork+0x10/0x20 [ 109.594324] ---[ end trace 0000000000000000 ]---