Date
July 24, 2025, 4:41 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 34.877406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 34.900335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 64.971434] Internal error: Oops: 0000000096000005 [#1] SMP [ 64.975412] Modules linked in: [ 64.976041] CPU: 1 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 64.976642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.977029] Hardware name: linux,dummy-virt (DT) [ 64.977557] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 64.978302] pc : ext4_mb_release+0x394/0xaf8 [ 64.978770] lr : ext4_mb_release+0x37c/0xaf8 [ 64.979100] sp : ffff800080c27c50 [ 64.979502] x29: ffff800080c27c60 x28: dfff800000000000 x27: 0000000000000000 [ 64.980400] x26: fff00000c6145000 x25: fff00000c7482740 x24: 1ffe000018e904e8 [ 64.980896] x23: fffd800018e904e8 x22: fff00000c7482618 x21: 1ffe000018e904c3 [ 64.981239] x20: 0000000000000000 x19: fff00000c7482400 x18: 0000000015c8c139 [ 64.981581] x17: 0000000000000001 x16: fff00000da46eda8 x15: 000000001512c01f [ 64.982243] x14: 00000000aea3e7ac x13: 1ffe000019233ef4 x12: fffd800019373a81 [ 64.983003] x11: 1ffe000019373a80 x10: fffd800019373a80 x9 : ffffa667eed8d3fc [ 64.984125] x8 : ffff800080c279f8 x7 : 0000000000000001 x6 : ffff800080c27b10 [ 64.984951] x5 : 0000000000000001 x4 : 1ffe0000196cb511 x3 : dfff800000000000 [ 64.985829] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 64.986625] Call trace: [ 64.987004] ext4_mb_release+0x394/0xaf8 (P) [ 64.987551] mbt_kunit_exit+0x9c/0x2c8 [ 64.988053] kunit_try_run_case_cleanup+0x9c/0xe0 [ 64.988463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.988702] kthread+0x328/0x630 [ 64.988895] ret_from_fork+0x10/0x20 [ 64.989316] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 64.989810] ---[ end trace 0000000000000000 ]--- [ 65.412256] Internal error: Oops: 0000000096000005 [#15] SMP [ 65.415576] Modules linked in: [ 65.415853] CPU: 0 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.416276] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.416551] Hardware name: linux,dummy-virt (DT) [ 65.416823] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.417194] pc : ext4_mb_release+0x394/0xaf8 [ 65.417473] lr : ext4_mb_release+0x37c/0xaf8 [ 65.417725] sp : ffff800080b97c50 [ 65.417895] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.418271] x26: fff00000cb286000 x25: fff00000c6a3c740 x24: 1ffe000018d478e8 [ 65.418711] x23: fffd800018d478e8 x22: fff00000c6a3c618 x21: 1ffe000018d478c3 [ 65.419118] x20: 0000000000000000 x19: fff00000c6a3c400 x18: 1ffff4ccfe232c2e [ 65.419505] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000000000007 [ 65.419931] x14: 0000000000000000 x13: 1ffe000019233ef4 x12: fffd800018c72701 [ 65.420341] x11: 1ffe000018c72700 x10: fffd800018c72700 x9 : ffffa667eed8d3fc [ 65.421427] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10 [ 65.421841] x5 : 0000000000000001 x4 : 1ffe000018f29ca9 x3 : dfff800000000000 [ 65.422291] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.422730] Call trace: [ 65.422914] ext4_mb_release+0x394/0xaf8 (P) [ 65.423374] mbt_kunit_exit+0x9c/0x2c8 [ 65.423622] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.423919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.424194] kthread+0x328/0x630 [ 65.424414] ret_from_fork+0x10/0x20 [ 65.424673] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.425085] ---[ end trace 0000000000000000 ]--- [ 108.561318] Internal error: Oops: 0000000096000005 [#22] SMP [ 108.566074] Modules linked in: [ 108.567506] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 108.568050] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 108.568341] Hardware name: linux,dummy-virt (DT) [ 108.568540] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.568897] pc : kunit_test_null_dereference+0x70/0x170 [ 108.569228] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.569542] sp : ffff800080f57d30 [ 108.569702] x29: ffff800080f57d90 x28: 0000000000000000 x27: 0000000000000000 [ 108.570174] x26: 1ffe000019372361 x25: 0000000000000000 x24: 0000000000000004 [ 108.570594] x23: fff00000c9b91b0c x22: ffffa667ec648250 x21: fff00000c130ae08 [ 108.571074] x20: 1ffff000101eafa6 x19: ffff800080087990 x18: 0000000075e895cb [ 108.571493] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000b81839f5 [ 108.571962] x14: 00000000bfc84c46 x13: 1ffe000019233ef4 x12: fffd80001966d11c [ 108.572414] x11: 1ffe00001966d11b x10: fffd80001966d11b x9 : ffffa667ec63f9d8 [ 108.572829] x8 : ffff800080f57c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 108.573238] x5 : ffff7000101eafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 108.573644] x2 : dfff800000000000 x1 : fff00000cb368000 x0 : ffff800080087990 [ 108.574076] Call trace: [ 108.574263] kunit_test_null_dereference+0x70/0x170 (P) [ 108.574549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.574864] kthread+0x328/0x630 [ 108.575227] ret_from_fork+0x10/0x20 [ 108.575477] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 108.575805] ---[ end trace 0000000000000000 ]--- [ 65.288198] Internal error: Oops: 0000000096000005 [#11] SMP [ 65.294658] Modules linked in: [ 65.295618] CPU: 1 UID: 0 PID: 399 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.296530] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.297164] Hardware name: linux,dummy-virt (DT) [ 65.297660] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.298175] pc : ext4_mb_release+0x394/0xaf8 [ 65.298612] lr : ext4_mb_release+0x37c/0xaf8 [ 65.299099] sp : ffff800080c67c50 [ 65.299279] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.299917] x26: fff00000c7461000 x25: fff00000c73dc740 x24: 1ffe000018e7b8e8 [ 65.300457] x23: fffd800018e7b8e8 x22: fff00000c73dc618 x21: 1ffe000018e7b8c3 [ 65.300901] x20: 0000000000000000 x19: fff00000c73dc400 x18: 000000009c22f5f4 [ 65.301327] x17: 0000000000000001 x16: fff00000da46eda8 x15: 000000000cb40f1f [ 65.301721] x14: 000000002ec958d2 x13: 1ffe000019233ef4 x12: fffd800019223941 [ 65.302232] x11: 1ffe000019223940 x10: fffd800019223940 x9 : ffffa667eed8d3fc [ 65.302724] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10 [ 65.303334] x5 : 0000000000000001 x4 : 1ffe000018f29001 x3 : dfff800000000000 [ 65.303911] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.304406] Call trace: [ 65.304620] ext4_mb_release+0x394/0xaf8 (P) [ 65.304921] mbt_kunit_exit+0x9c/0x2c8 [ 65.305229] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.305520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.305817] kthread+0x328/0x630 [ 65.306149] ret_from_fork+0x10/0x20 [ 65.306405] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.306775] ---[ end trace 0000000000000000 ]--- [ 65.001086] Internal error: Oops: 0000000096000005 [#2] SMP [ 65.011961] Modules linked in: [ 65.012238] CPU: 0 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.013701] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.013931] Hardware name: linux,dummy-virt (DT) [ 65.014209] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.014578] pc : ext4_mb_release+0x394/0xaf8 [ 65.015309] lr : ext4_mb_release+0x37c/0xaf8 [ 65.016006] sp : ffff800080b97c50 [ 65.016277] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.016985] x26: fff00000c481e000 x25: fff00000c6216740 x24: 1ffe000018c42ce8 [ 65.017639] x23: fffd800018c42ce8 x22: fff00000c6216618 x21: 1ffe000018c42cc3 [ 65.018325] x20: 0000000000000000 x19: fff00000c6216400 x18: 000000005ec3f01f [ 65.019198] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000039b35f7e [ 65.019815] x14: 00000000f1f1f1f1 x13: 1ffe000019233ec4 x12: fffd800019223bc1 [ 65.020244] x11: 1ffe000019223bc0 x10: fffd800019223bc0 x9 : ffffa667eed8d3fc [ 65.020756] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10 [ 65.021215] x5 : 0000000000000001 x4 : 1ffe000018be6289 x3 : dfff800000000000 [ 65.021696] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.022197] Call trace: [ 65.022394] ext4_mb_release+0x394/0xaf8 (P) [ 65.022657] mbt_kunit_exit+0x9c/0x2c8 [ 65.022909] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.023243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.023870] kthread+0x328/0x630 [ 65.024123] ret_from_fork+0x10/0x20 [ 65.024385] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.024738] ---[ end trace 0000000000000000 ]--- [ 65.377980] Internal error: Oops: 0000000096000005 [#14] SMP [ 65.384025] Modules linked in: [ 65.385623] CPU: 1 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.387095] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.387831] Hardware name: linux,dummy-virt (DT) [ 65.388525] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.389338] pc : ext4_mb_release+0x394/0xaf8 [ 65.389968] lr : ext4_mb_release+0x37c/0xaf8 [ 65.390571] sp : ffff800080c67c50 [ 65.391137] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.392030] x26: fff00000cb283000 x25: fff00000c69f0740 x24: 1ffe000018d3e0e8 [ 65.392381] x23: fffd800018d3e0e8 x22: fff00000c69f0618 x21: 1ffe000018d3e0c3 [ 65.392714] x20: 0000000000000000 x19: fff00000c69f0400 x18: 00000000361a65dd [ 65.393350] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000fc322507 [ 65.394173] x14: 00000000097965a4 x13: 1ffe000019233ef4 x12: fffd80001924c001 [ 65.395109] x11: 1ffe00001924c000 x10: fffd80001924c000 x9 : ffffa667eed8d3fc [ 65.395928] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10 [ 65.396696] x5 : 0000000000000001 x4 : 1ffe000018d4b511 x3 : dfff800000000000 [ 65.397473] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.398241] Call trace: [ 65.398542] ext4_mb_release+0x394/0xaf8 (P) [ 65.399800] mbt_kunit_exit+0x9c/0x2c8 [ 65.400226] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.400457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.400693] kthread+0x328/0x630 [ 65.400889] ret_from_fork+0x10/0x20 [ 65.401127] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.401467] ---[ end trace 0000000000000000 ]--- [ 65.190724] Internal error: Oops: 0000000096000005 [#8] SMP [ 65.194543] Modules linked in: [ 65.195839] CPU: 1 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.196799] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.197288] Hardware name: linux,dummy-virt (DT) [ 65.197849] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.198273] pc : ext4_mb_release+0x394/0xaf8 [ 65.198558] lr : ext4_mb_release+0x37c/0xaf8 [ 65.199046] sp : ffff800080c47c50 [ 65.199469] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.200292] x26: fff00000c6a83000 x25: fff00000c1c00740 x24: 1ffe0000183800e8 [ 65.200851] x23: fffd8000183800e8 x22: fff00000c1c00618 x21: 1ffe0000183800c3 [ 65.201413] x20: 0000000000000000 x19: fff00000c1c00400 x18: 00000000f7fb3aca [ 65.201795] x17: 0000000000000001 x16: fff00000da46eda8 x15: 0000000046f67f02 [ 65.202230] x14: 00000000edf387bb x13: 1ffe000019233ef4 x12: fffd8000192238c1 [ 65.202617] x11: 1ffe0000192238c0 x10: fffd8000192238c0 x9 : ffffa667eed8d3fc [ 65.203244] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10 [ 65.203672] x5 : 0000000000000001 x4 : 1ffe0000193b4511 x3 : dfff800000000000 [ 65.204120] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.204528] Call trace: [ 65.204683] ext4_mb_release+0x394/0xaf8 (P) [ 65.204999] mbt_kunit_exit+0x9c/0x2c8 [ 65.205214] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.205487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.205776] kthread+0x328/0x630 [ 65.206003] ret_from_fork+0x10/0x20 [ 65.206270] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.206556] ---[ end trace 0000000000000000 ]--- [ 65.096131] Internal error: Oops: 0000000096000005 [#5] SMP [ 65.101929] Modules linked in: [ 65.102733] CPU: 1 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.104538] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.105215] Hardware name: linux,dummy-virt (DT) [ 65.105740] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.106036] pc : ext4_mb_release+0x394/0xaf8 [ 65.106267] lr : ext4_mb_release+0x37c/0xaf8 [ 65.106461] sp : ffff800080c37c50 [ 65.106616] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.107557] x26: fff00000c6a80000 x25: fff00000c6254740 x24: 1ffe000018c4a8e8 [ 65.108531] x23: fffd800018c4a8e8 x22: fff00000c6254618 x21: 1ffe000018c4a8c3 [ 65.109296] x20: 0000000000000000 x19: fff00000c6254400 x18: 00000000b001a9fd [ 65.110038] x17: 0000000000000001 x16: fff00000da46eda8 x15: fff00000ff616b48 [ 65.110799] x14: 0000000000018fff x13: 1ffe000019233ef4 x12: fffd800019223841 [ 65.111681] x11: 1ffe000019223840 x10: fffd800019223840 x9 : ffffa667eed8d3fc [ 65.112523] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10 [ 65.113295] x5 : 0000000000000001 x4 : 1ffe0000193b4ca9 x3 : dfff800000000000 [ 65.113639] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.113984] Call trace: [ 65.114133] ext4_mb_release+0x394/0xaf8 (P) [ 65.114360] mbt_kunit_exit+0x9c/0x2c8 [ 65.114547] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.114780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.115412] kthread+0x328/0x630 [ 65.115780] ret_from_fork+0x10/0x20 [ 65.116247] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.117053] ---[ end trace 0000000000000000 ]--- [ 65.163742] Internal error: Oops: 0000000096000005 [#7] SMP [ 65.169525] Modules linked in: [ 65.169859] CPU: 0 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.170293] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.170499] Hardware name: linux,dummy-virt (DT) [ 65.170696] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.171078] pc : ext4_mb_release+0x394/0xaf8 [ 65.171347] lr : ext4_mb_release+0x37c/0xaf8 [ 65.171607] sp : ffff800080c37c50 [ 65.171786] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.172212] x26: fff00000c742a000 x25: fff00000c69f6740 x24: 1ffe000018d3ece8 [ 65.172624] x23: fffd800018d3ece8 x22: fff00000c69f6618 x21: 1ffe000018d3ecc3 [ 65.173619] x20: 0000000000000000 x19: fff00000c69f6400 x18: 00000000884044ce [ 65.174017] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000042c68eb0 [ 65.174468] x14: 000000006786708d x13: 1ffe000019233ec4 x12: fffd800019373bc1 [ 65.174911] x11: 1ffe000019373bc0 x10: fffd800019373bc0 x9 : ffffa667eed8d3fc [ 65.175600] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10 [ 65.175997] x5 : 0000000000000001 x4 : 1ffe000018cc4ca9 x3 : dfff800000000000 [ 65.176442] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.176857] Call trace: [ 65.177027] ext4_mb_release+0x394/0xaf8 (P) [ 65.177294] mbt_kunit_exit+0x9c/0x2c8 [ 65.177512] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.177775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.178098] kthread+0x328/0x630 [ 65.178312] ret_from_fork+0x10/0x20 [ 65.178567] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.178936] ---[ end trace 0000000000000000 ]--- [ 65.464712] Internal error: Oops: 0000000096000005 [#17] SMP [ 65.470504] Modules linked in: [ 65.470942] CPU: 1 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.472166] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.472653] Hardware name: linux,dummy-virt (DT) [ 65.473196] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.473992] pc : ext4_mb_release+0x394/0xaf8 [ 65.474564] lr : ext4_mb_release+0x37c/0xaf8 [ 65.475215] sp : ffff800080b97c50 [ 65.475689] x29: ffff800080b97c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.476588] x26: fff00000c7467000 x25: fff00000c7576740 x24: 1ffe000018eaece8 [ 65.477447] x23: fffd800018eaece8 x22: fff00000c7576618 x21: 1ffe000018eaecc3 [ 65.478211] x20: 0000000000000000 x19: fff00000c7576400 x18: 1ffff4ccfe232c2e [ 65.478811] x17: 0000000000000000 x16: fff00000da46eda8 x15: 0000000000000007 [ 65.479679] x14: 00000000f1f1f1f1 x13: 1ffe000019233ef4 x12: fffd8000192239c1 [ 65.480549] x11: 1ffe0000192239c0 x10: fffd8000192239c0 x9 : ffffa667eed8d3fc [ 65.481197] x8 : ffff800080b979f8 x7 : 0000000000000001 x6 : ffff800080b97b10 [ 65.481541] x5 : 0000000000000001 x4 : 1ffe000019614511 x3 : dfff800000000000 [ 65.481915] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.482357] Call trace: [ 65.482533] ext4_mb_release+0x394/0xaf8 (P) [ 65.482858] mbt_kunit_exit+0x9c/0x2c8 [ 65.483196] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.483499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.483978] kthread+0x328/0x630 [ 65.484212] ret_from_fork+0x10/0x20 [ 65.484482] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.484825] ---[ end trace 0000000000000000 ]--- [ 65.220302] Internal error: Oops: 0000000096000005 [#9] SMP [ 65.226742] Modules linked in: [ 65.227179] CPU: 0 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.228274] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.228499] Hardware name: linux,dummy-virt (DT) [ 65.228707] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.229474] pc : ext4_mb_release+0x394/0xaf8 [ 65.229986] lr : ext4_mb_release+0x37c/0xaf8 [ 65.230502] sp : ffff800080c67c50 [ 65.230886] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.231766] x26: fff00000c742d000 x25: fff00000c69f4740 x24: 1ffe000018d3e8e8 [ 65.232596] x23: fffd800018d3e8e8 x22: fff00000c69f4618 x21: 1ffe000018d3e8c3 [ 65.233473] x20: 0000000000000000 x19: fff00000c69f4400 x18: 1ffff4ccfe232c2e [ 65.234208] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000000000007 [ 65.234553] x14: 00000000f1f1f1f1 x13: 1ffe000019233ec4 x12: fffd800018c72481 [ 65.234938] x11: 1ffe000018c72480 x10: fffd800018c72480 x9 : ffffa667eed8d3fc [ 65.235369] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10 [ 65.235828] x5 : 0000000000000001 x4 : 1ffe000018cc4511 x3 : dfff800000000000 [ 65.236278] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.236718] Call trace: [ 65.236929] ext4_mb_release+0x394/0xaf8 (P) [ 65.237210] mbt_kunit_exit+0x9c/0x2c8 [ 65.237451] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.237736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.238076] kthread+0x328/0x630 [ 65.238327] ret_from_fork+0x10/0x20 [ 65.238579] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.238913] ---[ end trace 0000000000000000 ]--- [ 108.179709] Internal error: Oops: 0000000096000005 [#20] SMP [ 108.185702] Modules linked in: [ 108.186675] CPU: 1 UID: 0 PID: 417 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 108.187895] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 108.188420] Hardware name: linux,dummy-virt (DT) [ 108.188877] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.189324] pc : ext4_mb_release+0x394/0xaf8 [ 108.189775] lr : ext4_mb_release+0x37c/0xaf8 [ 108.190035] sp : ffff800080c87c50 [ 108.190203] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000 [ 108.190649] x26: fff00000c69ca000 x25: fff00000fff7e740 x24: 1ffe00001ffefce8 [ 108.191088] x23: fffd80001ffefce8 x22: fff00000fff7e618 x21: 1ffe00001ffefcc3 [ 108.191460] x20: 0000000000000000 x19: fff00000fff7e400 x18: 0000000005215f07 [ 108.191881] x17: 0000000000000001 x16: fff00000da46eda8 x15: 00000000bcfc7306 [ 108.192286] x14: 00000000e7b51125 x13: 1ffe000019233ef4 x12: fffd800019223a41 [ 108.192695] x11: 1ffe000019223a40 x10: fffd800019223a40 x9 : ffffa667eed8d3fc [ 108.193110] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10 [ 108.193495] x5 : 0000000000000001 x4 : 1ffe00001957d289 x3 : dfff800000000000 [ 108.193898] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 108.194284] Call trace: [ 108.194459] ext4_mb_release+0x394/0xaf8 (P) [ 108.194698] mbt_kunit_exit+0x9c/0x2c8 [ 108.194955] kunit_try_run_case_cleanup+0x9c/0xe0 [ 108.195176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.195491] kthread+0x328/0x630 [ 108.195675] ret_from_fork+0x10/0x20 [ 108.195937] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 108.196243] ---[ end trace 0000000000000000 ]--- [ 86.855082] Internal error: Oops: 0000000096000005 [#19] SMP [ 86.858156] Modules linked in: [ 86.858429] CPU: 0 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 86.859180] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 86.859569] Hardware name: linux,dummy-virt (DT) [ 86.859853] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 86.860195] pc : ext4_mb_release+0x394/0xaf8 [ 86.860412] lr : ext4_mb_release+0x37c/0xaf8 [ 86.860604] sp : ffff800080c87c50 [ 86.860822] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000 [ 86.861390] x26: fff00000c617f000 x25: fff00000cb0b2740 x24: 1ffe0000196164e8 [ 86.861882] x23: fffd8000196164e8 x22: fff00000cb0b2618 x21: 1ffe0000196164c3 [ 86.862310] x20: 0000000000000000 x19: fff00000cb0b2400 x18: fff00000cb344800 [ 86.862806] x17: 0000000054d4944d x16: fff00000c99d483c x15: 0000000000000000 [ 86.863257] x14: 00000000f1f1f1f1 x13: 1ffe00001b48dddd x12: fffd8000194a90c1 [ 86.863844] x11: 1ffe0000194a90c0 x10: fffd8000194a90c0 x9 : ffffa667eed8d3fc [ 86.864381] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10 [ 86.865226] x5 : 0000000000000001 x4 : 1ffe00001957d001 x3 : dfff800000000000 [ 86.866406] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 86.866856] Call trace: [ 86.867197] ext4_mb_release+0x394/0xaf8 (P) [ 86.867471] mbt_kunit_exit+0x9c/0x2c8 [ 86.867695] kunit_try_run_case_cleanup+0x9c/0xe0 [ 86.867962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.868238] kthread+0x328/0x630 [ 86.868439] ret_from_fork+0x10/0x20 [ 86.868692] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 86.869593] ---[ end trace 0000000000000000 ]--- [ 65.253039] Internal error: Oops: 0000000096000005 [#10] SMP [ 65.261734] Modules linked in: [ 65.262934] CPU: 0 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.264169] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.264766] Hardware name: linux,dummy-virt (DT) [ 65.265297] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.266040] pc : ext4_mb_release+0x394/0xaf8 [ 65.266400] lr : ext4_mb_release+0x37c/0xaf8 [ 65.266599] sp : ffff800080c37c50 [ 65.266775] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.267140] x26: fff00000c6a86000 x25: fff00000c73de740 x24: 1ffe000018e7bce8 [ 65.267775] x23: fffd800018e7bce8 x22: fff00000c73de618 x21: 1ffe000018e7bcc3 [ 65.268682] x20: 0000000000000000 x19: fff00000c73de400 x18: 00000000754074e2 [ 65.269571] x17: 0000000000000000 x16: fff00000da44cda8 x15: 00000000ba999284 [ 65.270320] x14: 000000000582ddc8 x13: 1ffe000019233ec4 x12: fffd80001883c801 [ 65.271112] x11: 1ffe00001883c800 x10: fffd80001883c800 x9 : ffffa667eed8d3fc [ 65.271989] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10 [ 65.272889] x5 : 0000000000000001 x4 : 1ffe0000193b4001 x3 : dfff800000000000 [ 65.273646] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.274401] Call trace: [ 65.274684] ext4_mb_release+0x394/0xaf8 (P) [ 65.275252] mbt_kunit_exit+0x9c/0x2c8 [ 65.275689] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.276248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.276690] kthread+0x328/0x630 [ 65.276881] ret_from_fork+0x10/0x20 [ 65.277093] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.277337] ---[ end trace 0000000000000000 ]--- [ 65.318338] Internal error: Oops: 0000000096000005 [#12] SMP [ 65.325330] Modules linked in: [ 65.326390] CPU: 0 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.327384] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.327604] Hardware name: linux,dummy-virt (DT) [ 65.328145] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.329118] pc : ext4_mb_release+0x394/0xaf8 [ 65.329783] lr : ext4_mb_release+0x37c/0xaf8 [ 65.330421] sp : ffff800080c47c50 [ 65.330935] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.332061] x26: fff00000cb280000 x25: fff00000c69f2740 x24: 1ffe000018d3e4e8 [ 65.332883] x23: fffd800018d3e4e8 x22: fff00000c69f2618 x21: 1ffe000018d3e4c3 [ 65.333243] x20: 0000000000000000 x19: fff00000c69f2400 x18: 000000000fc2155b [ 65.333587] x17: 0000000000000000 x16: fff00000da44cda8 x15: 0000000002b0de14 [ 65.334602] x14: 000000003550ba4d x13: 1ffe000019233ec4 x12: fffd800018c72581 [ 65.335791] x11: 1ffe000018c72580 x10: fffd800018c72580 x9 : ffffa667eed8d3fc [ 65.336648] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10 [ 65.337017] x5 : 0000000000000001 x4 : 1ffe000018d4b001 x3 : dfff800000000000 [ 65.337351] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.337687] Call trace: [ 65.338340] ext4_mb_release+0x394/0xaf8 (P) [ 65.339103] mbt_kunit_exit+0x9c/0x2c8 [ 65.339832] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.340605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.341365] kthread+0x328/0x630 [ 65.341906] ret_from_fork+0x10/0x20 [ 65.342509] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.343325] ---[ end trace 0000000000000000 ]--- [ 65.438818] Internal error: Oops: 0000000096000005 [#16] SMP [ 65.441237] Modules linked in: [ 65.441503] CPU: 0 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.442066] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.443900] Hardware name: linux,dummy-virt (DT) [ 65.444191] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.444536] pc : ext4_mb_release+0x394/0xaf8 [ 65.444826] lr : ext4_mb_release+0x37c/0xaf8 [ 65.445071] sp : ffff800080c67c50 [ 65.445274] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.445688] x26: fff00000c6179000 x25: fff00000c6a3e740 x24: 1ffe000018d47ce8 [ 65.446092] x23: fffd800018d47ce8 x22: fff00000c6a3e618 x21: 1ffe000018d47cc3 [ 65.447337] x20: 0000000000000000 x19: fff00000c6a3e400 x18: 00000000898c748e [ 65.448414] x17: 0000000000000000 x16: fff00000da44cda8 x15: 000000007b5762fa [ 65.448886] x14: 00000000cf5214d3 x13: 1ffe000019233ec4 x12: fffd8000194a91a1 [ 65.449305] x11: 1ffe0000194a91a0 x10: fffd8000194a91a0 x9 : ffffa667eed8d3fc [ 65.449716] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10 [ 65.450428] x5 : 0000000000000001 x4 : 1ffe000018d4b799 x3 : dfff800000000000 [ 65.451256] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.451698] Call trace: [ 65.452166] ext4_mb_release+0x394/0xaf8 (P) [ 65.452571] mbt_kunit_exit+0x9c/0x2c8 [ 65.453014] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.453603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.454022] kthread+0x328/0x630 [ 65.454216] ret_from_fork+0x10/0x20 [ 65.454429] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.454674] ---[ end trace 0000000000000000 ]--- [ 65.493576] Internal error: Oops: 0000000096000005 [#18] SMP [ 65.499428] Modules linked in: [ 65.500031] CPU: 0 UID: 0 PID: 413 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.500968] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.501180] Hardware name: linux,dummy-virt (DT) [ 65.501400] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.501812] pc : ext4_mb_release+0x394/0xaf8 [ 65.502099] lr : ext4_mb_release+0x37c/0xaf8 [ 65.502358] sp : ffff800080c87c50 [ 65.502588] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.503094] x26: fff00000c617c000 x25: fff00000cb0b0740 x24: 1ffe0000196160e8 [ 65.503560] x23: fffd8000196160e8 x22: fff00000cb0b0618 x21: 1ffe0000196160c3 [ 65.503993] x20: 0000000000000000 x19: fff00000cb0b0400 x18: 1ffff4ccfe232c2e [ 65.504430] x17: 0000000000000001 x16: fff00000c99d483c x15: fff00000ff616b48 [ 65.505114] x14: 0000000000018fff x13: 1ffe00001b48dddd x12: fffd800018194d81 [ 65.505692] x11: 1ffe000018194d80 x10: fffd800018194d80 x9 : ffffa667eed8d3fc [ 65.506150] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10 [ 65.506608] x5 : 0000000000000001 x4 : 1ffe000019614a21 x3 : dfff800000000000 [ 65.507256] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.507709] Call trace: [ 65.507900] ext4_mb_release+0x394/0xaf8 (P) [ 65.508225] mbt_kunit_exit+0x9c/0x2c8 [ 65.508465] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.508772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.509112] kthread+0x328/0x630 [ 65.509308] ret_from_fork+0x10/0x20 [ 65.509588] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.509961] ---[ end trace 0000000000000000 ]--- [ 65.036620] Internal error: Oops: 0000000096000005 [#3] SMP [ 65.040182] Modules linked in: [ 65.040431] CPU: 0 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.040930] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.041150] Hardware name: linux,dummy-virt (DT) [ 65.041819] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.042229] pc : ext4_mb_release+0x394/0xaf8 [ 65.042511] lr : ext4_mb_release+0x37c/0xaf8 [ 65.042779] sp : ffff800080aa7c50 [ 65.042983] x29: ffff800080aa7c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.043445] x26: fff00000c096e000 x25: fff00000c7484740 x24: 1ffe000018e908e8 [ 65.043912] x23: fffd800018e908e8 x22: fff00000c7484618 x21: 1ffe000018e908c3 [ 65.044374] x20: 0000000000000000 x19: fff00000c7484400 x18: 1ffff4ccfe232c2e [ 65.044849] x17: 0000000000000000 x16: fff00000da44cda8 x15: 0000000000000007 [ 65.045270] x14: 0000000000000000 x13: 1ffe000019233ec4 x12: fffd800018c72381 [ 65.045690] x11: 1ffe000018c72380 x10: fffd800018c72380 x9 : ffffa667eed8d3fc [ 65.046176] x8 : ffff800080aa79f8 x7 : 0000000000000001 x6 : ffff800080aa7b10 [ 65.046591] x5 : 0000000000000001 x4 : 1ffe000018be6ca9 x3 : dfff800000000000 [ 65.047231] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.047658] Call trace: [ 65.047883] ext4_mb_release+0x394/0xaf8 (P) [ 65.048110] mbt_kunit_exit+0x9c/0x2c8 [ 65.048302] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.048515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.048870] kthread+0x328/0x630 [ 65.049101] ret_from_fork+0x10/0x20 [ 65.049382] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.049742] ---[ end trace 0000000000000000 ]--- [ 108.206150] Internal error: Oops: 0000000096000005 [#21] SMP [ 108.210653] Modules linked in: [ 108.212187] CPU: 0 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 108.213647] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 108.214374] Hardware name: linux,dummy-virt (DT) [ 108.215455] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.216353] pc : ext4_mb_release+0x394/0xaf8 [ 108.216880] lr : ext4_mb_release+0x37c/0xaf8 [ 108.217137] sp : ffff800080c67c50 [ 108.217314] x29: ffff800080c67c60 x28: dfff800000000000 x27: 0000000000000000 [ 108.217775] x26: fff00000cbfea000 x25: fff00000cb0b4740 x24: 1ffe0000196168e8 [ 108.218193] x23: fffd8000196168e8 x22: fff00000cb0b4618 x21: 1ffe0000196168c3 [ 108.218593] x20: 0000000000000000 x19: fff00000cb0b4400 x18: 00000000daa94a48 [ 108.218978] x17: 0000000000000001 x16: fff00000da44cda8 x15: fff00000ff616b48 [ 108.219423] x14: 00000000f1f1f1f1 x13: 1ffe000019233ec4 x12: fffd800018124c81 [ 108.220027] x11: 1ffe000018124c80 x10: fffd800018124c80 x9 : ffffa667eed8d3fc [ 108.220446] x8 : ffff800080c679f8 x7 : 0000000000000001 x6 : ffff800080c67b10 [ 108.220867] x5 : 0000000000000001 x4 : 1ffe000018d4bca9 x3 : dfff800000000000 [ 108.221276] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 108.221675] Call trace: [ 108.221899] ext4_mb_release+0x394/0xaf8 (P) [ 108.222162] mbt_kunit_exit+0x9c/0x2c8 [ 108.222396] kunit_try_run_case_cleanup+0x9c/0xe0 [ 108.222679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.222977] kthread+0x328/0x630 [ 108.223602] ret_from_fork+0x10/0x20 [ 108.223862] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 108.224181] ---[ end trace 0000000000000000 ]--- [ 65.128096] Internal error: Oops: 0000000096000005 [#6] SMP [ 65.133828] Modules linked in: [ 65.134487] CPU: 0 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.136297] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.137010] Hardware name: linux,dummy-virt (DT) [ 65.137549] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.138135] pc : ext4_mb_release+0x394/0xaf8 [ 65.138765] lr : ext4_mb_release+0x37c/0xaf8 [ 65.139366] sp : ffff800080c57c50 [ 65.139842] x29: ffff800080c57c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.140488] x26: fff00000c0ccd000 x25: fff00000c7486740 x24: 1ffe000018e90ce8 [ 65.140854] x23: fffd800018e90ce8 x22: fff00000c7486618 x21: 1ffe000018e90cc3 [ 65.141200] x20: 0000000000000000 x19: fff00000c7486400 x18: 000000005789b7f3 [ 65.141541] x17: 0000000000000000 x16: fff00000c99d4c3c x15: 0000000068e9016b [ 65.142268] x14: 000000004ee7f9bc x13: 1ffe00001b4899dd x12: fffd800018c72001 [ 65.143150] x11: 1ffe000018c72000 x10: fffd800018c72000 x9 : ffffa667eed8d3fc [ 65.144108] x8 : ffff800080c579f8 x7 : 0000000000000001 x6 : ffff800080c57b10 [ 65.144925] x5 : 0000000000000001 x4 : 1ffe000018cc4a21 x3 : dfff800000000000 [ 65.145711] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.146499] Call trace: [ 65.146832] ext4_mb_release+0x394/0xaf8 (P) [ 65.147525] mbt_kunit_exit+0x9c/0x2c8 [ 65.148096] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.148633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.149225] kthread+0x328/0x630 [ 65.149594] ret_from_fork+0x10/0x20 [ 65.150037] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.150640] ---[ end trace 0000000000000000 ]--- [ 65.354780] Internal error: Oops: 0000000096000005 [#13] SMP [ 65.358466] Modules linked in: [ 65.358778] CPU: 1 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.359287] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.359495] Hardware name: linux,dummy-virt (DT) [ 65.359781] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.360156] pc : ext4_mb_release+0x394/0xaf8 [ 65.360437] lr : ext4_mb_release+0x37c/0xaf8 [ 65.360676] sp : ffff800080c37c50 [ 65.360874] x29: ffff800080c37c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.361266] x26: fff00000c7464000 x25: fff00000c7574740 x24: 1ffe000018eae8e8 [ 65.361755] x23: fffd800018eae8e8 x22: fff00000c7574618 x21: 1ffe000018eae8c3 [ 65.362213] x20: 0000000000000000 x19: fff00000c7574400 x18: fff00000c3ee9800 [ 65.362616] x17: 0000000000000001 x16: fff00000da46eda8 x15: 1ffe0000187dd30f [ 65.363061] x14: 0000000000000000 x13: 1ffe000019233ef4 x12: fffd80001881b001 [ 65.363430] x11: 1ffe00001881b000 x10: fffd80001881b000 x9 : ffffa667eed8d3fc [ 65.363927] x8 : ffff800080c379f8 x7 : 0000000000000001 x6 : ffff800080c37b10 [ 65.364332] x5 : 0000000000000001 x4 : 1ffe000018f29511 x3 : dfff800000000000 [ 65.364779] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.365233] Call trace: [ 65.365506] ext4_mb_release+0x394/0xaf8 (P) [ 65.365775] mbt_kunit_exit+0x9c/0x2c8 [ 65.365969] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.366190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.366424] kthread+0x328/0x630 [ 65.366652] ret_from_fork+0x10/0x20 [ 65.366916] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.367439] ---[ end trace 0000000000000000 ]--- [ 65.064943] Internal error: Oops: 0000000096000005 [#4] SMP [ 65.070979] Modules linked in: [ 65.072442] CPU: 0 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 65.072904] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 65.073204] Hardware name: linux,dummy-virt (DT) [ 65.073715] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 65.074440] pc : ext4_mb_release+0x394/0xaf8 [ 65.075252] lr : ext4_mb_release+0x37c/0xaf8 [ 65.075725] sp : ffff800080c47c50 [ 65.076106] x29: ffff800080c47c60 x28: dfff800000000000 x27: 0000000000000000 [ 65.076497] x26: fff00000c1b88000 x25: fff00000c6252740 x24: 1ffe000018c4a4e8 [ 65.076849] x23: fffd800018c4a4e8 x22: fff00000c6252618 x21: 1ffe000018c4a4c3 [ 65.077190] x20: 0000000000000000 x19: fff00000c6252400 x18: 1ffff4ccfe232c2e [ 65.077529] x17: 0000000000000001 x16: fff00000da44cda8 x15: 0000000000000007 [ 65.078089] x14: 0000000000000000 x13: 1ffe000019233ec4 x12: fffd800018390541 [ 65.078863] x11: 1ffe000018390540 x10: fffd800018390540 x9 : ffffa667eed8d3fc [ 65.080229] x8 : ffff800080c479f8 x7 : 0000000000000001 x6 : ffff800080c47b10 [ 65.080995] x5 : 0000000000000001 x4 : 1ffe000018368a21 x3 : dfff800000000000 [ 65.081731] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 65.082488] Call trace: [ 65.082777] ext4_mb_release+0x394/0xaf8 (P) [ 65.083415] mbt_kunit_exit+0x9c/0x2c8 [ 65.083975] kunit_try_run_case_cleanup+0x9c/0xe0 [ 65.084484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.085065] kthread+0x328/0x630 [ 65.085441] ret_from_fork+0x10/0x20 [ 65.085844] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 65.086095] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 64.804078] ================================================================== [ 64.804175] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 64.804175] [ 64.804268] Use-after-free read at 0x00000000741b1bf1 (in kfence-#182): [ 64.804321] test_krealloc+0x51c/0x830 [ 64.804364] kunit_try_run_case+0x170/0x3f0 [ 64.804407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.804451] kthread+0x328/0x630 [ 64.804491] ret_from_fork+0x10/0x20 [ 64.804530] [ 64.804557] kfence-#182: 0x00000000741b1bf1-0x000000008628295a, size=32, cache=kmalloc-32 [ 64.804557] [ 64.804612] allocated by task 368 on cpu 1 at 64.803406s (0.001203s ago): [ 64.804683] test_alloc+0x29c/0x628 [ 64.804721] test_krealloc+0xc0/0x830 [ 64.804771] kunit_try_run_case+0x170/0x3f0 [ 64.804812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.804855] kthread+0x328/0x630 [ 64.804891] ret_from_fork+0x10/0x20 [ 64.804928] [ 64.804953] freed by task 368 on cpu 1 at 64.803652s (0.001297s ago): [ 64.805015] krealloc_noprof+0x148/0x360 [ 64.805055] test_krealloc+0x1dc/0x830 [ 64.805093] kunit_try_run_case+0x170/0x3f0 [ 64.805130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.805171] kthread+0x328/0x630 [ 64.805208] ret_from_fork+0x10/0x20 [ 64.805245] [ 64.805292] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 64.805372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.805401] Hardware name: linux,dummy-virt (DT) [ 64.805436] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 64.715479] ================================================================== [ 64.715579] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.715579] [ 64.715679] Use-after-free read at 0x000000007933e713 (in kfence-#181): [ 64.715734] test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.715799] kunit_try_run_case+0x170/0x3f0 [ 64.715843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.715888] kthread+0x328/0x630 [ 64.715927] ret_from_fork+0x10/0x20 [ 64.715967] [ 64.715994] kfence-#181: 0x000000007933e713-0x00000000f8e367cb, size=32, cache=test [ 64.715994] [ 64.716046] allocated by task 366 on cpu 0 at 64.698125s (0.017917s ago): [ 64.716119] test_alloc+0x230/0x628 [ 64.716156] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 64.716196] kunit_try_run_case+0x170/0x3f0 [ 64.716235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.716279] kthread+0x328/0x630 [ 64.716322] ret_from_fork+0x10/0x20 [ 64.716360] [ 64.716384] freed by task 366 on cpu 0 at 64.698236s (0.018143s ago): [ 64.716440] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 64.716479] kunit_try_run_case+0x170/0x3f0 [ 64.716518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.716561] kthread+0x328/0x630 [ 64.716596] ret_from_fork+0x10/0x20 [ 64.716635] [ 64.716684] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 64.716772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.716802] Hardware name: linux,dummy-virt (DT) [ 64.716838] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 41.726948] ================================================================== [ 41.727106] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 41.727106] [ 41.727205] Invalid read at 0x00000000467f757d: [ 41.727312] test_invalid_access+0xdc/0x1f0 [ 41.727827] kunit_try_run_case+0x170/0x3f0 [ 41.727895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.727943] kthread+0x328/0x630 [ 41.727990] ret_from_fork+0x10/0x20 [ 41.728047] [ 41.728101] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 41.728223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.728260] Hardware name: linux,dummy-virt (DT) [ 41.728302] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 41.499659] ================================================================== [ 41.499771] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.499771] [ 41.499838] Corrupted memory at 0x00000000f3dccbe0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#177): [ 41.500157] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.500205] kunit_try_run_case+0x170/0x3f0 [ 41.500250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.500296] kthread+0x328/0x630 [ 41.500335] ret_from_fork+0x10/0x20 [ 41.500375] [ 41.500400] kfence-#177: 0x00000000325e471f-0x000000006c6eb615, size=73, cache=kmalloc-96 [ 41.500400] [ 41.500459] allocated by task 356 on cpu 1 at 41.499421s (0.001034s ago): [ 41.500527] test_alloc+0x29c/0x628 [ 41.500565] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 41.500609] kunit_try_run_case+0x170/0x3f0 [ 41.500650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.500693] kthread+0x328/0x630 [ 41.500728] ret_from_fork+0x10/0x20 [ 41.500782] [ 41.500807] freed by task 356 on cpu 1 at 41.499567s (0.001235s ago): [ 41.500870] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.500911] kunit_try_run_case+0x170/0x3f0 [ 41.500950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.500993] kthread+0x328/0x630 [ 41.501030] ret_from_fork+0x10/0x20 [ 41.501069] [ 41.501115] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 41.501196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.501225] Hardware name: linux,dummy-virt (DT) [ 41.501259] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 41.395596] ================================================================== [ 41.395691] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.395691] [ 41.395810] Out-of-bounds read at 0x0000000014788ace (105B right of kfence-#176): [ 41.395876] test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.395929] kunit_try_run_case+0x170/0x3f0 [ 41.395979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.396024] kthread+0x328/0x630 [ 41.396065] ret_from_fork+0x10/0x20 [ 41.396107] [ 41.396133] kfence-#176: 0x000000000cbe12dd-0x00000000f4aa4997, size=73, cache=kmalloc-96 [ 41.396133] [ 41.396192] allocated by task 354 on cpu 1 at 41.395349s (0.000838s ago): [ 41.396266] test_alloc+0x29c/0x628 [ 41.396307] test_kmalloc_aligned_oob_read+0x100/0x468 [ 41.396349] kunit_try_run_case+0x170/0x3f0 [ 41.396390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.396436] kthread+0x328/0x630 [ 41.396474] ret_from_fork+0x10/0x20 [ 41.396513] [ 41.396563] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 41.396652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.396683] Hardware name: linux,dummy-virt (DT) [ 41.396722] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 38.063519] ================================================================== [ 38.063611] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 38.063611] [ 38.063671] Corrupted memory at 0x0000000022a9c0af [ ! ] (in kfence-#144): [ 38.063801] test_corruption+0x1d8/0x378 [ 38.063845] kunit_try_run_case+0x170/0x3f0 [ 38.063886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.063929] kthread+0x328/0x630 [ 38.063970] ret_from_fork+0x10/0x20 [ 38.064012] [ 38.064038] kfence-#144: 0x00000000bb7dd624-0x000000005d83b3f4, size=32, cache=test [ 38.064038] [ 38.064092] allocated by task 344 on cpu 0 at 38.063375s (0.000713s ago): [ 38.064152] test_alloc+0x230/0x628 [ 38.064190] test_corruption+0x198/0x378 [ 38.064228] kunit_try_run_case+0x170/0x3f0 [ 38.064267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.064310] kthread+0x328/0x630 [ 38.064346] ret_from_fork+0x10/0x20 [ 38.064385] [ 38.064408] freed by task 344 on cpu 0 at 38.063436s (0.000969s ago): [ 38.064467] test_corruption+0x1d8/0x378 [ 38.064505] kunit_try_run_case+0x170/0x3f0 [ 38.064543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.064586] kthread+0x328/0x630 [ 38.064622] ret_from_fork+0x10/0x20 [ 38.064660] [ 38.064703] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 38.064793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.064823] Hardware name: linux,dummy-virt (DT) [ 38.064857] ================================================================== [ 37.959512] ================================================================== [ 37.959606] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 37.959606] [ 37.959666] Corrupted memory at 0x00000000ed84e9a0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143): [ 37.959990] test_corruption+0x120/0x378 [ 37.960035] kunit_try_run_case+0x170/0x3f0 [ 37.960077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.960120] kthread+0x328/0x630 [ 37.960160] ret_from_fork+0x10/0x20 [ 37.960198] [ 37.960221] kfence-#143: 0x000000005611c5ea-0x000000003ed12cd5, size=32, cache=test [ 37.960221] [ 37.960274] allocated by task 344 on cpu 0 at 37.959366s (0.000904s ago): [ 37.960333] test_alloc+0x230/0x628 [ 37.960371] test_corruption+0xdc/0x378 [ 37.960408] kunit_try_run_case+0x170/0x3f0 [ 37.960447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.960487] kthread+0x328/0x630 [ 37.960523] ret_from_fork+0x10/0x20 [ 37.960560] [ 37.960584] freed by task 344 on cpu 0 at 37.959428s (0.001153s ago): [ 37.960644] test_corruption+0x120/0x378 [ 37.960680] kunit_try_run_case+0x170/0x3f0 [ 37.960718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.960774] kthread+0x328/0x630 [ 37.960809] ret_from_fork+0x10/0x20 [ 37.960848] [ 37.960890] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.960968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.960996] Hardware name: linux,dummy-virt (DT) [ 37.961030] ================================================================== [ 37.855727] ================================================================== [ 37.855839] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 37.855839] [ 37.855899] Corrupted memory at 0x000000004117905b [ ! ] (in kfence-#142): [ 37.856028] test_corruption+0x284/0x378 [ 37.856072] kunit_try_run_case+0x170/0x3f0 [ 37.856114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.856158] kthread+0x328/0x630 [ 37.856196] ret_from_fork+0x10/0x20 [ 37.856236] [ 37.856261] kfence-#142: 0x000000005ec2f84c-0x000000000b84dc72, size=32, cache=kmalloc-32 [ 37.856261] [ 37.856316] allocated by task 342 on cpu 0 at 37.855453s (0.000860s ago): [ 37.856377] test_alloc+0x29c/0x628 [ 37.856413] test_corruption+0x198/0x378 [ 37.856451] kunit_try_run_case+0x170/0x3f0 [ 37.856489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.856531] kthread+0x328/0x630 [ 37.856566] ret_from_fork+0x10/0x20 [ 37.856607] [ 37.856630] freed by task 342 on cpu 0 at 37.855555s (0.001071s ago): [ 37.856690] test_corruption+0x284/0x378 [ 37.856728] kunit_try_run_case+0x170/0x3f0 [ 37.856780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.856823] kthread+0x328/0x630 [ 37.856860] ret_from_fork+0x10/0x20 [ 37.856899] [ 37.856945] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.857024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.857054] Hardware name: linux,dummy-virt (DT) [ 37.857088] ================================================================== [ 37.647644] ================================================================== [ 37.647771] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 37.647771] [ 37.647838] Corrupted memory at 0x00000000039a2db0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 37.648285] test_corruption+0x278/0x378 [ 37.648330] kunit_try_run_case+0x170/0x3f0 [ 37.648375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.648419] kthread+0x328/0x630 [ 37.648460] ret_from_fork+0x10/0x20 [ 37.648502] [ 37.648526] kfence-#140: 0x0000000025758105-0x0000000025af0435, size=32, cache=kmalloc-32 [ 37.648526] [ 37.648582] allocated by task 342 on cpu 0 at 37.647346s (0.001232s ago): [ 37.648645] test_alloc+0x29c/0x628 [ 37.648683] test_corruption+0xdc/0x378 [ 37.648721] kunit_try_run_case+0x170/0x3f0 [ 37.648773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.648816] kthread+0x328/0x630 [ 37.648853] ret_from_fork+0x10/0x20 [ 37.648891] [ 37.648914] freed by task 342 on cpu 0 at 37.647460s (0.001450s ago): [ 37.648977] test_corruption+0x278/0x378 [ 37.649014] kunit_try_run_case+0x170/0x3f0 [ 37.649051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.649095] kthread+0x328/0x630 [ 37.649129] ret_from_fork+0x10/0x20 [ 37.649169] [ 37.649215] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.649293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.649324] Hardware name: linux,dummy-virt (DT) [ 37.649358] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 37.439485] ================================================================== [ 37.439580] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 37.439580] [ 37.439643] Invalid free of 0x0000000075884a6a (in kfence-#138): [ 37.439703] test_invalid_addr_free+0x1ac/0x238 [ 37.439766] kunit_try_run_case+0x170/0x3f0 [ 37.439814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.439860] kthread+0x328/0x630 [ 37.439901] ret_from_fork+0x10/0x20 [ 37.439943] [ 37.439969] kfence-#138: 0x000000004b006104-0x00000000e61c5721, size=32, cache=kmalloc-32 [ 37.439969] [ 37.440030] allocated by task 338 on cpu 1 at 37.439337s (0.000688s ago): [ 37.440099] test_alloc+0x29c/0x628 [ 37.440139] test_invalid_addr_free+0xd4/0x238 [ 37.440181] kunit_try_run_case+0x170/0x3f0 [ 37.440223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.440271] kthread+0x328/0x630 [ 37.440308] ret_from_fork+0x10/0x20 [ 37.440348] [ 37.440395] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.440488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.440522] Hardware name: linux,dummy-virt (DT) [ 37.440558] ================================================================== [ 37.543455] ================================================================== [ 37.543564] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 37.543564] [ 37.543628] Invalid free of 0x00000000e0604e65 (in kfence-#139): [ 37.543694] test_invalid_addr_free+0xec/0x238 [ 37.543741] kunit_try_run_case+0x170/0x3f0 [ 37.543803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.543851] kthread+0x328/0x630 [ 37.543891] ret_from_fork+0x10/0x20 [ 37.543933] [ 37.543958] kfence-#139: 0x00000000d56eae87-0x00000000d040da28, size=32, cache=test [ 37.543958] [ 37.544020] allocated by task 340 on cpu 1 at 37.543322s (0.000694s ago): [ 37.544092] test_alloc+0x230/0x628 [ 37.544132] test_invalid_addr_free+0xd4/0x238 [ 37.544173] kunit_try_run_case+0x170/0x3f0 [ 37.544215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.544263] kthread+0x328/0x630 [ 37.544299] ret_from_fork+0x10/0x20 [ 37.544341] [ 37.544387] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.544482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.544513] Hardware name: linux,dummy-virt (DT) [ 37.544551] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 37.335506] ================================================================== [ 37.335602] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 37.335602] [ 37.335661] Invalid free of 0x0000000064110552 (in kfence-#137): [ 37.335712] test_double_free+0x100/0x238 [ 37.335772] kunit_try_run_case+0x170/0x3f0 [ 37.335816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.335859] kthread+0x328/0x630 [ 37.335896] ret_from_fork+0x10/0x20 [ 37.335934] [ 37.335960] kfence-#137: 0x0000000064110552-0x00000000dc3aa18e, size=32, cache=test [ 37.335960] [ 37.336012] allocated by task 336 on cpu 0 at 37.335314s (0.000694s ago): [ 37.336073] test_alloc+0x230/0x628 [ 37.336110] test_double_free+0xd4/0x238 [ 37.336148] kunit_try_run_case+0x170/0x3f0 [ 37.336188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.336228] kthread+0x328/0x630 [ 37.336265] ret_from_fork+0x10/0x20 [ 37.336303] [ 37.336326] freed by task 336 on cpu 0 at 37.335376s (0.000947s ago): [ 37.336387] test_double_free+0xf0/0x238 [ 37.336425] kunit_try_run_case+0x170/0x3f0 [ 37.336462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.336505] kthread+0x328/0x630 [ 37.336539] ret_from_fork+0x10/0x20 [ 37.336579] [ 37.336622] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.336701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.336730] Hardware name: linux,dummy-virt (DT) [ 37.336774] ================================================================== [ 37.231623] ================================================================== [ 37.231736] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 37.231736] [ 37.231826] Invalid free of 0x000000004b691858 (in kfence-#136): [ 37.231895] test_double_free+0x1bc/0x238 [ 37.231939] kunit_try_run_case+0x170/0x3f0 [ 37.231982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.232027] kthread+0x328/0x630 [ 37.232066] ret_from_fork+0x10/0x20 [ 37.232105] [ 37.232132] kfence-#136: 0x000000004b691858-0x000000000042badf, size=32, cache=kmalloc-32 [ 37.232132] [ 37.232188] allocated by task 334 on cpu 0 at 37.231307s (0.000877s ago): [ 37.232252] test_alloc+0x29c/0x628 [ 37.232290] test_double_free+0xd4/0x238 [ 37.232328] kunit_try_run_case+0x170/0x3f0 [ 37.232371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.232415] kthread+0x328/0x630 [ 37.232451] ret_from_fork+0x10/0x20 [ 37.232491] [ 37.232515] freed by task 334 on cpu 0 at 37.231386s (0.001125s ago): [ 37.232577] test_double_free+0x1ac/0x238 [ 37.232616] kunit_try_run_case+0x170/0x3f0 [ 37.232655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.232698] kthread+0x328/0x630 [ 37.232735] ret_from_fork+0x10/0x20 [ 37.232788] [ 37.232838] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 37.232919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.232950] Hardware name: linux,dummy-virt (DT) [ 37.232984] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 36.911946] ================================================================== [ 36.912034] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.912034] [ 36.912172] Use-after-free read at 0x0000000082be0eff (in kfence-#133): [ 36.912232] test_use_after_free_read+0x114/0x248 [ 36.912278] kunit_try_run_case+0x170/0x3f0 [ 36.912595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.912696] kthread+0x328/0x630 [ 36.912741] ret_from_fork+0x10/0x20 [ 36.912811] [ 36.912837] kfence-#133: 0x0000000082be0eff-0x0000000041af37b7, size=32, cache=test [ 36.912837] [ 36.912926] allocated by task 328 on cpu 1 at 36.911600s (0.001315s ago): [ 36.913000] test_alloc+0x230/0x628 [ 36.913038] test_use_after_free_read+0xd0/0x248 [ 36.913079] kunit_try_run_case+0x170/0x3f0 [ 36.913301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.913363] kthread+0x328/0x630 [ 36.913400] ret_from_fork+0x10/0x20 [ 36.913527] [ 36.913610] freed by task 328 on cpu 1 at 36.911700s (0.001878s ago): [ 36.914048] test_use_after_free_read+0xf0/0x248 [ 36.914149] kunit_try_run_case+0x170/0x3f0 [ 36.914194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.914239] kthread+0x328/0x630 [ 36.914304] ret_from_fork+0x10/0x20 [ 36.914346] [ 36.914596] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 36.914777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.914835] Hardware name: linux,dummy-virt (DT) [ 36.914891] ================================================================== [ 36.804575] ================================================================== [ 36.804681] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.804681] [ 36.804834] Use-after-free read at 0x00000000555555e0 (in kfence-#132): [ 36.804912] test_use_after_free_read+0x114/0x248 [ 36.804966] kunit_try_run_case+0x170/0x3f0 [ 36.805015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.805059] kthread+0x328/0x630 [ 36.805099] ret_from_fork+0x10/0x20 [ 36.805140] [ 36.805166] kfence-#132: 0x00000000555555e0-0x0000000077d5c124, size=32, cache=kmalloc-32 [ 36.805166] [ 36.805402] allocated by task 326 on cpu 1 at 36.803917s (0.001473s ago): [ 36.805646] test_alloc+0x29c/0x628 [ 36.805728] test_use_after_free_read+0xd0/0x248 [ 36.805844] kunit_try_run_case+0x170/0x3f0 [ 36.805891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.805957] kthread+0x328/0x630 [ 36.806001] ret_from_fork+0x10/0x20 [ 36.806103] [ 36.806544] freed by task 326 on cpu 1 at 36.804274s (0.001909s ago): [ 36.806784] test_use_after_free_read+0x1c0/0x248 [ 36.806851] kunit_try_run_case+0x170/0x3f0 [ 36.806895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.806940] kthread+0x328/0x630 [ 36.806978] ret_from_fork+0x10/0x20 [ 36.807097] [ 36.807161] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 36.807263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.807294] Hardware name: linux,dummy-virt (DT) [ 36.807587] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 36.493191] ================================================================== [ 36.493339] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 36.493339] [ 36.493438] Out-of-bounds write at 0x000000001f5983cf (1B left of kfence-#129): [ 36.493501] test_out_of_bounds_write+0x100/0x240 [ 36.493547] kunit_try_run_case+0x170/0x3f0 [ 36.493609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.493675] kthread+0x328/0x630 [ 36.493722] ret_from_fork+0x10/0x20 [ 36.493778] [ 36.493808] kfence-#129: 0x000000003e2f7f0e-0x0000000045f19edc, size=32, cache=kmalloc-32 [ 36.493808] [ 36.493883] allocated by task 322 on cpu 1 at 36.492657s (0.001205s ago): [ 36.493981] test_alloc+0x29c/0x628 [ 36.494024] test_out_of_bounds_write+0xc8/0x240 [ 36.494063] kunit_try_run_case+0x170/0x3f0 [ 36.494103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.494151] kthread+0x328/0x630 [ 36.494412] ret_from_fork+0x10/0x20 [ 36.494468] [ 36.494520] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 36.494628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.494665] Hardware name: linux,dummy-virt (DT) [ 36.494735] ================================================================== [ 36.700576] ================================================================== [ 36.700681] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 36.700681] [ 36.700784] Out-of-bounds write at 0x000000007d5ab416 (1B left of kfence-#131): [ 36.700868] test_out_of_bounds_write+0x100/0x240 [ 36.700946] kunit_try_run_case+0x170/0x3f0 [ 36.701012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.701057] kthread+0x328/0x630 [ 36.701096] ret_from_fork+0x10/0x20 [ 36.701135] [ 36.701162] kfence-#131: 0x000000003a3e326f-0x000000006323d974, size=32, cache=test [ 36.701162] [ 36.701365] allocated by task 324 on cpu 1 at 36.700475s (0.000884s ago): [ 36.701487] test_alloc+0x230/0x628 [ 36.701531] test_out_of_bounds_write+0xc8/0x240 [ 36.701592] kunit_try_run_case+0x170/0x3f0 [ 36.701649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.701695] kthread+0x328/0x630 [ 36.701773] ret_from_fork+0x10/0x20 [ 36.701815] [ 36.701860] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 36.701949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.701977] Hardware name: linux,dummy-virt (DT) [ 36.702232] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 35.752288] ================================================================== [ 35.752388] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.752388] [ 35.752766] Out-of-bounds read at 0x0000000049e1fe5d (32B right of kfence-#122): [ 35.752862] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.753249] kunit_try_run_case+0x170/0x3f0 [ 35.753434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.753670] kthread+0x328/0x630 [ 35.753774] ret_from_fork+0x10/0x20 [ 35.753838] [ 35.753864] kfence-#122: 0x000000004833623a-0x00000000bf581e1d, size=32, cache=kmalloc-32 [ 35.753864] [ 35.754106] allocated by task 318 on cpu 1 at 35.751737s (0.002261s ago): [ 35.754306] test_alloc+0x29c/0x628 [ 35.754354] test_out_of_bounds_read+0x198/0x3e0 [ 35.754620] kunit_try_run_case+0x170/0x3f0 [ 35.754918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.755010] kthread+0x328/0x630 [ 35.755113] ret_from_fork+0x10/0x20 [ 35.755295] [ 35.755347] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.755437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.755469] Hardware name: linux,dummy-virt (DT) [ 35.756085] ================================================================== [ 35.964022] ================================================================== [ 35.964137] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.964137] [ 35.964283] Out-of-bounds read at 0x000000002ac74a1c (32B right of kfence-#124): [ 35.964358] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.964406] kunit_try_run_case+0x170/0x3f0 [ 35.964451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.964496] kthread+0x328/0x630 [ 35.964736] ret_from_fork+0x10/0x20 [ 35.964984] [ 35.965104] kfence-#124: 0x0000000063632c37-0x000000000dfcddda, size=32, cache=test [ 35.965104] [ 35.965188] allocated by task 320 on cpu 1 at 35.963652s (0.001514s ago): [ 35.965568] test_alloc+0x230/0x628 [ 35.965633] test_out_of_bounds_read+0x198/0x3e0 [ 35.965755] kunit_try_run_case+0x170/0x3f0 [ 35.965802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.965849] kthread+0x328/0x630 [ 35.965886] ret_from_fork+0x10/0x20 [ 35.966191] [ 35.966503] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.966639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.966776] Hardware name: linux,dummy-virt (DT) [ 35.966820] ================================================================== [ 35.861351] ================================================================== [ 35.861432] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.861432] [ 35.861513] Out-of-bounds read at 0x0000000098996d79 (1B left of kfence-#123): [ 35.861883] test_out_of_bounds_read+0x114/0x3e0 [ 35.861959] kunit_try_run_case+0x170/0x3f0 [ 35.862009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.862055] kthread+0x328/0x630 [ 35.862098] ret_from_fork+0x10/0x20 [ 35.862144] [ 35.862284] kfence-#123: 0x0000000083740b85-0x000000002da4efeb, size=32, cache=test [ 35.862284] [ 35.862373] allocated by task 320 on cpu 1 at 35.861261s (0.001107s ago): [ 35.862519] test_alloc+0x230/0x628 [ 35.862562] test_out_of_bounds_read+0xdc/0x3e0 [ 35.862603] kunit_try_run_case+0x170/0x3f0 [ 35.862643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.862688] kthread+0x328/0x630 [ 35.862724] ret_from_fork+0x10/0x20 [ 35.862779] [ 35.862825] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.862933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.863445] Hardware name: linux,dummy-virt (DT) [ 35.863765] ================================================================== [ 35.541589] ================================================================== [ 35.541824] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.541824] [ 35.541966] Out-of-bounds read at 0x00000000e78d26cc (1B left of kfence-#120): [ 35.542240] test_out_of_bounds_read+0x114/0x3e0 [ 35.542317] kunit_try_run_case+0x170/0x3f0 [ 35.542366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.542411] kthread+0x328/0x630 [ 35.542452] ret_from_fork+0x10/0x20 [ 35.542511] [ 35.542689] kfence-#120: 0x0000000038eb3b80-0x000000007d9fe70f, size=32, cache=kmalloc-32 [ 35.542689] [ 35.542895] allocated by task 318 on cpu 1 at 35.539789s (0.003037s ago): [ 35.545038] test_alloc+0x29c/0x628 [ 35.545134] test_out_of_bounds_read+0xdc/0x3e0 [ 35.545187] kunit_try_run_case+0x170/0x3f0 [ 35.545242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.545293] kthread+0x328/0x630 [ 35.545344] ret_from_fork+0x10/0x20 [ 35.545445] [ 35.545559] CPU: 1 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.545664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.545706] Hardware name: linux,dummy-virt (DT) [ 35.545769] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 35.423974] ================================================================== [ 35.424027] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 35.424082] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.424134] [ 35.424332] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.424549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.424581] Hardware name: linux,dummy-virt (DT) [ 35.424614] Call trace: [ 35.424732] show_stack+0x20/0x38 (C) [ 35.424804] dump_stack_lvl+0x8c/0xd0 [ 35.424880] print_report+0x118/0x5e8 [ 35.424928] kasan_report+0xdc/0x128 [ 35.424974] kasan_check_range+0x100/0x1a8 [ 35.425040] __kasan_check_write+0x20/0x30 [ 35.425088] strncpy_from_user+0x3c/0x2a0 [ 35.425142] copy_user_test_oob+0x5c0/0xec8 [ 35.425194] kunit_try_run_case+0x170/0x3f0 [ 35.425242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.425301] kthread+0x328/0x630 [ 35.425344] ret_from_fork+0x10/0x20 [ 35.425403] [ 35.425429] Allocated by task 316: [ 35.425461] kasan_save_stack+0x3c/0x68 [ 35.425500] kasan_save_track+0x20/0x40 [ 35.425541] kasan_save_alloc_info+0x40/0x58 [ 35.425582] __kasan_kmalloc+0xd4/0xd8 [ 35.425619] __kmalloc_noprof+0x198/0x4c8 [ 35.425674] kunit_kmalloc_array+0x34/0x88 [ 35.425713] copy_user_test_oob+0xac/0xec8 [ 35.426032] kunit_try_run_case+0x170/0x3f0 [ 35.426091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.426144] kthread+0x328/0x630 [ 35.426181] ret_from_fork+0x10/0x20 [ 35.426219] [ 35.426241] The buggy address belongs to the object at fff00000c9b92400 [ 35.426241] which belongs to the cache kmalloc-128 of size 128 [ 35.426509] The buggy address is located 0 bytes inside of [ 35.426509] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.426614] [ 35.426639] The buggy address belongs to the physical page: [ 35.426676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.426887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.427017] page_type: f5(slab) [ 35.427091] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.427192] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.427270] page dumped because: kasan: bad access detected [ 35.427433] [ 35.427456] Memory state around the buggy address: [ 35.427591] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.427647] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.427722] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.427813] ^ [ 35.427946] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.428036] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.428408] ================================================================== [ 35.428881] ================================================================== [ 35.428952] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 35.429019] Write of size 1 at addr fff00000c9b92478 by task kunit_try_catch/316 [ 35.429091] [ 35.429124] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.429418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.429460] Hardware name: linux,dummy-virt (DT) [ 35.429511] Call trace: [ 35.429537] show_stack+0x20/0x38 (C) [ 35.429590] dump_stack_lvl+0x8c/0xd0 [ 35.429637] print_report+0x118/0x5e8 [ 35.429682] kasan_report+0xdc/0x128 [ 35.429727] __asan_report_store1_noabort+0x20/0x30 [ 35.429820] strncpy_from_user+0x270/0x2a0 [ 35.429886] copy_user_test_oob+0x5c0/0xec8 [ 35.429947] kunit_try_run_case+0x170/0x3f0 [ 35.430014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.430068] kthread+0x328/0x630 [ 35.430133] ret_from_fork+0x10/0x20 [ 35.430183] [ 35.430206] Allocated by task 316: [ 35.430235] kasan_save_stack+0x3c/0x68 [ 35.430277] kasan_save_track+0x20/0x40 [ 35.430313] kasan_save_alloc_info+0x40/0x58 [ 35.430352] __kasan_kmalloc+0xd4/0xd8 [ 35.430411] __kmalloc_noprof+0x198/0x4c8 [ 35.430590] kunit_kmalloc_array+0x34/0x88 [ 35.430664] copy_user_test_oob+0xac/0xec8 [ 35.430724] kunit_try_run_case+0x170/0x3f0 [ 35.430787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.430851] kthread+0x328/0x630 [ 35.430886] ret_from_fork+0x10/0x20 [ 35.431066] [ 35.431188] The buggy address belongs to the object at fff00000c9b92400 [ 35.431188] which belongs to the cache kmalloc-128 of size 128 [ 35.431254] The buggy address is located 0 bytes to the right of [ 35.431254] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.431443] [ 35.431469] The buggy address belongs to the physical page: [ 35.431507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.431564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.431666] page_type: f5(slab) [ 35.431797] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.431882] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.431985] page dumped because: kasan: bad access detected [ 35.432064] [ 35.432257] Memory state around the buggy address: [ 35.432307] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.432490] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.432641] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.432723] ^ [ 35.432779] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.432822] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.433075] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 35.385789] ================================================================== [ 35.385941] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 35.386037] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.386103] [ 35.386158] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.386251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.386281] Hardware name: linux,dummy-virt (DT) [ 35.386318] Call trace: [ 35.386347] show_stack+0x20/0x38 (C) [ 35.386402] dump_stack_lvl+0x8c/0xd0 [ 35.386466] print_report+0x118/0x5e8 [ 35.386511] kasan_report+0xdc/0x128 [ 35.386558] kasan_check_range+0x100/0x1a8 [ 35.386606] __kasan_check_write+0x20/0x30 [ 35.386655] copy_user_test_oob+0x234/0xec8 [ 35.386704] kunit_try_run_case+0x170/0x3f0 [ 35.386767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.386821] kthread+0x328/0x630 [ 35.386870] ret_from_fork+0x10/0x20 [ 35.387527] [ 35.387574] Allocated by task 316: [ 35.387635] kasan_save_stack+0x3c/0x68 [ 35.387708] kasan_save_track+0x20/0x40 [ 35.387793] kasan_save_alloc_info+0x40/0x58 [ 35.387876] __kasan_kmalloc+0xd4/0xd8 [ 35.387955] __kmalloc_noprof+0x198/0x4c8 [ 35.388034] kunit_kmalloc_array+0x34/0x88 [ 35.388124] copy_user_test_oob+0xac/0xec8 [ 35.388234] kunit_try_run_case+0x170/0x3f0 [ 35.388323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.388419] kthread+0x328/0x630 [ 35.388460] ret_from_fork+0x10/0x20 [ 35.388499] [ 35.388522] The buggy address belongs to the object at fff00000c9b92400 [ 35.388522] which belongs to the cache kmalloc-128 of size 128 [ 35.388586] The buggy address is located 0 bytes inside of [ 35.388586] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.388703] [ 35.388730] The buggy address belongs to the physical page: [ 35.388788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.389025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.389157] page_type: f5(slab) [ 35.389240] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.389496] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.389548] page dumped because: kasan: bad access detected [ 35.389647] [ 35.389696] Memory state around the buggy address: [ 35.389815] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.389881] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.389927] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.389970] ^ [ 35.390015] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.390060] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.390099] ================================================================== [ 35.418911] ================================================================== [ 35.418995] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 35.419046] Read of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.419259] [ 35.419360] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.419499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.419556] Hardware name: linux,dummy-virt (DT) [ 35.419588] Call trace: [ 35.419615] show_stack+0x20/0x38 (C) [ 35.419838] dump_stack_lvl+0x8c/0xd0 [ 35.419972] print_report+0x118/0x5e8 [ 35.420040] kasan_report+0xdc/0x128 [ 35.420147] kasan_check_range+0x100/0x1a8 [ 35.420234] __kasan_check_read+0x20/0x30 [ 35.420301] copy_user_test_oob+0x4a0/0xec8 [ 35.420393] kunit_try_run_case+0x170/0x3f0 [ 35.420467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.420522] kthread+0x328/0x630 [ 35.420589] ret_from_fork+0x10/0x20 [ 35.420639] [ 35.420685] Allocated by task 316: [ 35.420717] kasan_save_stack+0x3c/0x68 [ 35.420769] kasan_save_track+0x20/0x40 [ 35.420807] kasan_save_alloc_info+0x40/0x58 [ 35.420846] __kasan_kmalloc+0xd4/0xd8 [ 35.421022] __kmalloc_noprof+0x198/0x4c8 [ 35.421137] kunit_kmalloc_array+0x34/0x88 [ 35.421205] copy_user_test_oob+0xac/0xec8 [ 35.421273] kunit_try_run_case+0x170/0x3f0 [ 35.421360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.421418] kthread+0x328/0x630 [ 35.421454] ret_from_fork+0x10/0x20 [ 35.421521] [ 35.421651] The buggy address belongs to the object at fff00000c9b92400 [ 35.421651] which belongs to the cache kmalloc-128 of size 128 [ 35.421719] The buggy address is located 0 bytes inside of [ 35.421719] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.421798] [ 35.421822] The buggy address belongs to the physical page: [ 35.421858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.422064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.422165] page_type: f5(slab) [ 35.422273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.422350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.422404] page dumped because: kasan: bad access detected [ 35.422439] [ 35.422460] Memory state around the buggy address: [ 35.422617] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.422712] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.422824] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.422923] ^ [ 35.423043] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.423091] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.423133] ================================================================== [ 35.414343] ================================================================== [ 35.414406] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 35.414460] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.414522] [ 35.414554] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.414642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.414682] Hardware name: linux,dummy-virt (DT) [ 35.414724] Call trace: [ 35.414762] show_stack+0x20/0x38 (C) [ 35.414810] dump_stack_lvl+0x8c/0xd0 [ 35.414858] print_report+0x118/0x5e8 [ 35.414903] kasan_report+0xdc/0x128 [ 35.414955] kasan_check_range+0x100/0x1a8 [ 35.415002] __kasan_check_write+0x20/0x30 [ 35.415050] copy_user_test_oob+0x434/0xec8 [ 35.415100] kunit_try_run_case+0x170/0x3f0 [ 35.415148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.415204] kthread+0x328/0x630 [ 35.415271] ret_from_fork+0x10/0x20 [ 35.415322] [ 35.415342] Allocated by task 316: [ 35.415373] kasan_save_stack+0x3c/0x68 [ 35.415568] kasan_save_track+0x20/0x40 [ 35.415894] kasan_save_alloc_info+0x40/0x58 [ 35.415944] __kasan_kmalloc+0xd4/0xd8 [ 35.416003] __kmalloc_noprof+0x198/0x4c8 [ 35.416047] kunit_kmalloc_array+0x34/0x88 [ 35.416086] copy_user_test_oob+0xac/0xec8 [ 35.416126] kunit_try_run_case+0x170/0x3f0 [ 35.416164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.416234] kthread+0x328/0x630 [ 35.416416] ret_from_fork+0x10/0x20 [ 35.416529] [ 35.416589] The buggy address belongs to the object at fff00000c9b92400 [ 35.416589] which belongs to the cache kmalloc-128 of size 128 [ 35.416699] The buggy address is located 0 bytes inside of [ 35.416699] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.416932] [ 35.416961] The buggy address belongs to the physical page: [ 35.417071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.417188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.417288] page_type: f5(slab) [ 35.417364] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.417438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.417482] page dumped because: kasan: bad access detected [ 35.417516] [ 35.417550] Memory state around the buggy address: [ 35.417692] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.417810] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.417992] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.418066] ^ [ 35.418154] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.418199] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.418241] ================================================================== [ 35.395987] ================================================================== [ 35.396081] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 35.396140] Read of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.396216] [ 35.396262] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.396354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.396389] Hardware name: linux,dummy-virt (DT) [ 35.396424] Call trace: [ 35.396452] show_stack+0x20/0x38 (C) [ 35.396503] dump_stack_lvl+0x8c/0xd0 [ 35.396549] print_report+0x118/0x5e8 [ 35.396607] kasan_report+0xdc/0x128 [ 35.396652] kasan_check_range+0x100/0x1a8 [ 35.396699] __kasan_check_read+0x20/0x30 [ 35.396766] copy_user_test_oob+0x728/0xec8 [ 35.396817] kunit_try_run_case+0x170/0x3f0 [ 35.396865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.396919] kthread+0x328/0x630 [ 35.396962] ret_from_fork+0x10/0x20 [ 35.397011] [ 35.397033] Allocated by task 316: [ 35.397062] kasan_save_stack+0x3c/0x68 [ 35.397104] kasan_save_track+0x20/0x40 [ 35.397141] kasan_save_alloc_info+0x40/0x58 [ 35.397181] __kasan_kmalloc+0xd4/0xd8 [ 35.397217] __kmalloc_noprof+0x198/0x4c8 [ 35.397259] kunit_kmalloc_array+0x34/0x88 [ 35.397297] copy_user_test_oob+0xac/0xec8 [ 35.397339] kunit_try_run_case+0x170/0x3f0 [ 35.397377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.397421] kthread+0x328/0x630 [ 35.397457] ret_from_fork+0x10/0x20 [ 35.397495] [ 35.397517] The buggy address belongs to the object at fff00000c9b92400 [ 35.397517] which belongs to the cache kmalloc-128 of size 128 [ 35.397578] The buggy address is located 0 bytes inside of [ 35.397578] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.397660] [ 35.397684] The buggy address belongs to the physical page: [ 35.397730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.397798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.397848] page_type: f5(slab) [ 35.398463] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.398536] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.398581] page dumped because: kasan: bad access detected [ 35.398618] [ 35.398666] Memory state around the buggy address: [ 35.398703] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.398765] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.398812] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.398853] ^ [ 35.398897] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.398971] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.399165] ================================================================== [ 35.410193] ================================================================== [ 35.410270] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 35.410349] Read of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.410415] [ 35.410463] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.410551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.410580] Hardware name: linux,dummy-virt (DT) [ 35.410786] Call trace: [ 35.410822] show_stack+0x20/0x38 (C) [ 35.410889] dump_stack_lvl+0x8c/0xd0 [ 35.410998] print_report+0x118/0x5e8 [ 35.411095] kasan_report+0xdc/0x128 [ 35.411153] kasan_check_range+0x100/0x1a8 [ 35.411239] __kasan_check_read+0x20/0x30 [ 35.411310] copy_user_test_oob+0x3c8/0xec8 [ 35.411401] kunit_try_run_case+0x170/0x3f0 [ 35.411535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.411601] kthread+0x328/0x630 [ 35.411643] ret_from_fork+0x10/0x20 [ 35.411719] [ 35.411740] Allocated by task 316: [ 35.411781] kasan_save_stack+0x3c/0x68 [ 35.411821] kasan_save_track+0x20/0x40 [ 35.411859] kasan_save_alloc_info+0x40/0x58 [ 35.411898] __kasan_kmalloc+0xd4/0xd8 [ 35.411935] __kmalloc_noprof+0x198/0x4c8 [ 35.412119] kunit_kmalloc_array+0x34/0x88 [ 35.412203] copy_user_test_oob+0xac/0xec8 [ 35.412274] kunit_try_run_case+0x170/0x3f0 [ 35.412354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.412440] kthread+0x328/0x630 [ 35.412487] ret_from_fork+0x10/0x20 [ 35.412524] [ 35.412547] The buggy address belongs to the object at fff00000c9b92400 [ 35.412547] which belongs to the cache kmalloc-128 of size 128 [ 35.412710] The buggy address is located 0 bytes inside of [ 35.412710] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.412839] [ 35.412919] The buggy address belongs to the physical page: [ 35.412980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.413066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.413182] page_type: f5(slab) [ 35.413283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.413355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.413399] page dumped because: kasan: bad access detected [ 35.413435] [ 35.413456] Memory state around the buggy address: [ 35.413490] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.413537] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.413583] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.413809] ^ [ 35.413907] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.413985] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.414053] ================================================================== [ 35.404877] ================================================================== [ 35.404939] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 35.405024] Write of size 121 at addr fff00000c9b92400 by task kunit_try_catch/316 [ 35.405081] [ 35.405116] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.405321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.405351] Hardware name: linux,dummy-virt (DT) [ 35.405530] Call trace: [ 35.405565] show_stack+0x20/0x38 (C) [ 35.405619] dump_stack_lvl+0x8c/0xd0 [ 35.405685] print_report+0x118/0x5e8 [ 35.405772] kasan_report+0xdc/0x128 [ 35.405838] kasan_check_range+0x100/0x1a8 [ 35.405888] __kasan_check_write+0x20/0x30 [ 35.405953] copy_user_test_oob+0x35c/0xec8 [ 35.406019] kunit_try_run_case+0x170/0x3f0 [ 35.406084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.406168] kthread+0x328/0x630 [ 35.406211] ret_from_fork+0x10/0x20 [ 35.406267] [ 35.406288] Allocated by task 316: [ 35.406318] kasan_save_stack+0x3c/0x68 [ 35.406359] kasan_save_track+0x20/0x40 [ 35.406493] kasan_save_alloc_info+0x40/0x58 [ 35.406594] __kasan_kmalloc+0xd4/0xd8 [ 35.406705] __kmalloc_noprof+0x198/0x4c8 [ 35.406825] kunit_kmalloc_array+0x34/0x88 [ 35.406884] copy_user_test_oob+0xac/0xec8 [ 35.406941] kunit_try_run_case+0x170/0x3f0 [ 35.407017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.407062] kthread+0x328/0x630 [ 35.407096] ret_from_fork+0x10/0x20 [ 35.407159] [ 35.407334] The buggy address belongs to the object at fff00000c9b92400 [ 35.407334] which belongs to the cache kmalloc-128 of size 128 [ 35.407438] The buggy address is located 0 bytes inside of [ 35.407438] allocated 120-byte region [fff00000c9b92400, fff00000c9b92478) [ 35.407548] [ 35.407616] The buggy address belongs to the physical page: [ 35.407678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.407780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.407848] page_type: f5(slab) [ 35.407940] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.408024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.408115] page dumped because: kasan: bad access detected [ 35.408149] [ 35.408170] Memory state around the buggy address: [ 35.408230] fff00000c9b92300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.408276] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.408322] >fff00000c9b92400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.408376] ^ [ 35.408417] fff00000c9b92480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.408462] fff00000c9b92500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.408501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 35.354700] ================================================================== [ 35.354879] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 35.354966] Read of size 8 at addr fff00000c9b92378 by task kunit_try_catch/312 [ 35.355224] [ 35.355334] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.355506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.355597] Hardware name: linux,dummy-virt (DT) [ 35.355666] Call trace: [ 35.355726] show_stack+0x20/0x38 (C) [ 35.355830] dump_stack_lvl+0x8c/0xd0 [ 35.355918] print_report+0x118/0x5e8 [ 35.356016] kasan_report+0xdc/0x128 [ 35.356094] __asan_report_load8_noabort+0x20/0x30 [ 35.356191] copy_to_kernel_nofault+0x204/0x250 [ 35.356275] copy_to_kernel_nofault_oob+0x158/0x418 [ 35.356416] kunit_try_run_case+0x170/0x3f0 [ 35.356501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.356556] kthread+0x328/0x630 [ 35.356600] ret_from_fork+0x10/0x20 [ 35.356654] [ 35.356675] Allocated by task 312: [ 35.356973] kasan_save_stack+0x3c/0x68 [ 35.357128] kasan_save_track+0x20/0x40 [ 35.357222] kasan_save_alloc_info+0x40/0x58 [ 35.357315] __kasan_kmalloc+0xd4/0xd8 [ 35.357386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.357454] copy_to_kernel_nofault_oob+0xc8/0x418 [ 35.357522] kunit_try_run_case+0x170/0x3f0 [ 35.357924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.357998] kthread+0x328/0x630 [ 35.358059] ret_from_fork+0x10/0x20 [ 35.358157] [ 35.358210] The buggy address belongs to the object at fff00000c9b92300 [ 35.358210] which belongs to the cache kmalloc-128 of size 128 [ 35.358301] The buggy address is located 0 bytes to the right of [ 35.358301] allocated 120-byte region [fff00000c9b92300, fff00000c9b92378) [ 35.358689] [ 35.358719] The buggy address belongs to the physical page: [ 35.358894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.359194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.359533] page_type: f5(slab) [ 35.359622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.359743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.359846] page dumped because: kasan: bad access detected [ 35.359881] [ 35.359902] Memory state around the buggy address: [ 35.359940] fff00000c9b92200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.359987] fff00000c9b92280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.360272] >fff00000c9b92300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.360423] ^ [ 35.360507] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.360782] fff00000c9b92400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.360913] ================================================================== [ 35.361818] ================================================================== [ 35.361873] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 35.361928] Write of size 8 at addr fff00000c9b92378 by task kunit_try_catch/312 [ 35.362005] [ 35.362040] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.362133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.362165] Hardware name: linux,dummy-virt (DT) [ 35.362198] Call trace: [ 35.362222] show_stack+0x20/0x38 (C) [ 35.362291] dump_stack_lvl+0x8c/0xd0 [ 35.362346] print_report+0x118/0x5e8 [ 35.362393] kasan_report+0xdc/0x128 [ 35.362438] kasan_check_range+0x100/0x1a8 [ 35.362486] __kasan_check_write+0x20/0x30 [ 35.362534] copy_to_kernel_nofault+0x8c/0x250 [ 35.362591] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 35.362643] kunit_try_run_case+0x170/0x3f0 [ 35.362764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.362824] kthread+0x328/0x630 [ 35.362868] ret_from_fork+0x10/0x20 [ 35.362919] [ 35.362939] Allocated by task 312: [ 35.362976] kasan_save_stack+0x3c/0x68 [ 35.363411] kasan_save_track+0x20/0x40 [ 35.363473] kasan_save_alloc_info+0x40/0x58 [ 35.363516] __kasan_kmalloc+0xd4/0xd8 [ 35.363603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.363717] copy_to_kernel_nofault_oob+0xc8/0x418 [ 35.363788] kunit_try_run_case+0x170/0x3f0 [ 35.363899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.363986] kthread+0x328/0x630 [ 35.364021] ret_from_fork+0x10/0x20 [ 35.364060] [ 35.364083] The buggy address belongs to the object at fff00000c9b92300 [ 35.364083] which belongs to the cache kmalloc-128 of size 128 [ 35.364146] The buggy address is located 0 bytes to the right of [ 35.364146] allocated 120-byte region [fff00000c9b92300, fff00000c9b92378) [ 35.364418] [ 35.364479] The buggy address belongs to the physical page: [ 35.364530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b92 [ 35.364606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.364669] page_type: f5(slab) [ 35.364710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.364775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.364973] page dumped because: kasan: bad access detected [ 35.365049] [ 35.365119] Memory state around the buggy address: [ 35.365212] fff00000c9b92200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.365261] fff00000c9b92280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365308] >fff00000c9b92300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.365624] ^ [ 35.365703] fff00000c9b92380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365801] fff00000c9b92400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 35.322244] ================================================================== [ 35.322297] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 35.322348] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 35.322414] [ 35.322474] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.322580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.322618] Hardware name: linux,dummy-virt (DT) [ 35.322653] Call trace: [ 35.322683] show_stack+0x20/0x38 (C) [ 35.322733] dump_stack_lvl+0x8c/0xd0 [ 35.322793] print_report+0x310/0x5e8 [ 35.322927] kasan_report+0xdc/0x128 [ 35.323189] __asan_report_load1_noabort+0x20/0x30 [ 35.323253] vmalloc_oob+0x51c/0x5d0 [ 35.323300] kunit_try_run_case+0x170/0x3f0 [ 35.323350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.323404] kthread+0x328/0x630 [ 35.323447] ret_from_fork+0x10/0x20 [ 35.323496] [ 35.323529] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 35.323631] The buggy address belongs to the physical page: [ 35.323681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6a [ 35.323736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.323811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.323864] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.323915] page dumped because: kasan: bad access detected [ 35.323962] [ 35.323993] Memory state around the buggy address: [ 35.324027] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.324084] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.324130] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 35.324172] ^ [ 35.324220] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.324266] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.324309] ================================================================== [ 35.317236] ================================================================== [ 35.317308] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 35.317520] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 35.317584] [ 35.317642] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.317777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.317815] Hardware name: linux,dummy-virt (DT) [ 35.317851] Call trace: [ 35.317879] show_stack+0x20/0x38 (C) [ 35.317967] dump_stack_lvl+0x8c/0xd0 [ 35.318019] print_report+0x310/0x5e8 [ 35.318100] kasan_report+0xdc/0x128 [ 35.318153] __asan_report_load1_noabort+0x20/0x30 [ 35.318213] vmalloc_oob+0x578/0x5d0 [ 35.318261] kunit_try_run_case+0x170/0x3f0 [ 35.318328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.318559] kthread+0x328/0x630 [ 35.318619] ret_from_fork+0x10/0x20 [ 35.318675] [ 35.318702] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 35.319167] The buggy address belongs to the physical page: [ 35.319212] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6a [ 35.319389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.319464] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.319720] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.319846] page dumped because: kasan: bad access detected [ 35.319941] [ 35.320177] Memory state around the buggy address: [ 35.320297] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.320412] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.320478] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 35.320524] ^ [ 35.320832] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.320951] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.321030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.140472] ================================================================== [ 35.140574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.140627] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.140680] [ 35.140712] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.140933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.140998] Hardware name: linux,dummy-virt (DT) [ 35.141033] Call trace: [ 35.141072] show_stack+0x20/0x38 (C) [ 35.141124] dump_stack_lvl+0x8c/0xd0 [ 35.141198] print_report+0x118/0x5e8 [ 35.141262] kasan_report+0xdc/0x128 [ 35.141307] __asan_report_load4_noabort+0x20/0x30 [ 35.141358] kasan_atomics_helper+0x3e04/0x4858 [ 35.141408] kasan_atomics+0x198/0x2e0 [ 35.141458] kunit_try_run_case+0x170/0x3f0 [ 35.141625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.141683] kthread+0x328/0x630 [ 35.141728] ret_from_fork+0x10/0x20 [ 35.141791] [ 35.141811] Allocated by task 296: [ 35.141842] kasan_save_stack+0x3c/0x68 [ 35.141883] kasan_save_track+0x20/0x40 [ 35.141920] kasan_save_alloc_info+0x40/0x58 [ 35.142116] __kasan_kmalloc+0xd4/0xd8 [ 35.142168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.142228] kasan_atomics+0xb8/0x2e0 [ 35.142304] kunit_try_run_case+0x170/0x3f0 [ 35.142361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142409] kthread+0x328/0x630 [ 35.142443] ret_from_fork+0x10/0x20 [ 35.142479] [ 35.142505] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.142505] which belongs to the cache kmalloc-64 of size 64 [ 35.142671] The buggy address is located 0 bytes to the right of [ 35.142671] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.142807] [ 35.142836] The buggy address belongs to the physical page: [ 35.142902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.143001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.143091] page_type: f5(slab) [ 35.143159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.143211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.143255] page dumped because: kasan: bad access detected [ 35.143287] [ 35.143309] Memory state around the buggy address: [ 35.143340] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.143691] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.143842] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.143923] ^ [ 35.143992] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.144310] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.144418] ================================================================== [ 35.278182] ================================================================== [ 35.278257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 35.278349] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.278401] [ 35.278459] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.278547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.278578] Hardware name: linux,dummy-virt (DT) [ 35.278610] Call trace: [ 35.278674] show_stack+0x20/0x38 (C) [ 35.278833] dump_stack_lvl+0x8c/0xd0 [ 35.278896] print_report+0x118/0x5e8 [ 35.278941] kasan_report+0xdc/0x128 [ 35.279000] kasan_check_range+0x100/0x1a8 [ 35.279094] __kasan_check_write+0x20/0x30 [ 35.279268] kasan_atomics_helper+0x16d0/0x4858 [ 35.279344] kasan_atomics+0x198/0x2e0 [ 35.279698] kunit_try_run_case+0x170/0x3f0 [ 35.279824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.279919] kthread+0x328/0x630 [ 35.280008] ret_from_fork+0x10/0x20 [ 35.280156] [ 35.280216] Allocated by task 296: [ 35.280352] kasan_save_stack+0x3c/0x68 [ 35.280413] kasan_save_track+0x20/0x40 [ 35.280450] kasan_save_alloc_info+0x40/0x58 [ 35.280491] __kasan_kmalloc+0xd4/0xd8 [ 35.280706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.280769] kasan_atomics+0xb8/0x2e0 [ 35.280810] kunit_try_run_case+0x170/0x3f0 [ 35.281041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.281164] kthread+0x328/0x630 [ 35.281473] ret_from_fork+0x10/0x20 [ 35.281568] [ 35.281639] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.281639] which belongs to the cache kmalloc-64 of size 64 [ 35.281828] The buggy address is located 0 bytes to the right of [ 35.281828] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.281908] [ 35.281932] The buggy address belongs to the physical page: [ 35.282213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.282277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.282391] page_type: f5(slab) [ 35.282432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.282486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.282530] page dumped because: kasan: bad access detected [ 35.282764] [ 35.282845] Memory state around the buggy address: [ 35.282893] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.282956] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.283058] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.283101] ^ [ 35.283137] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.283182] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.283261] ================================================================== [ 35.283513] ================================================================== [ 35.283562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 35.283627] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.283712] [ 35.283793] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.283883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.283918] Hardware name: linux,dummy-virt (DT) [ 35.283955] Call trace: [ 35.283982] show_stack+0x20/0x38 (C) [ 35.284041] dump_stack_lvl+0x8c/0xd0 [ 35.284091] print_report+0x118/0x5e8 [ 35.284137] kasan_report+0xdc/0x128 [ 35.284182] __asan_report_load8_noabort+0x20/0x30 [ 35.284247] kasan_atomics_helper+0x3e10/0x4858 [ 35.284307] kasan_atomics+0x198/0x2e0 [ 35.284357] kunit_try_run_case+0x170/0x3f0 [ 35.284406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.284461] kthread+0x328/0x630 [ 35.284525] ret_from_fork+0x10/0x20 [ 35.284584] [ 35.284607] Allocated by task 296: [ 35.284637] kasan_save_stack+0x3c/0x68 [ 35.284687] kasan_save_track+0x20/0x40 [ 35.284725] kasan_save_alloc_info+0x40/0x58 [ 35.284776] __kasan_kmalloc+0xd4/0xd8 [ 35.284811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.284855] kasan_atomics+0xb8/0x2e0 [ 35.284893] kunit_try_run_case+0x170/0x3f0 [ 35.284932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.284977] kthread+0x328/0x630 [ 35.285011] ret_from_fork+0x10/0x20 [ 35.285050] [ 35.285070] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.285070] which belongs to the cache kmalloc-64 of size 64 [ 35.285401] The buggy address is located 0 bytes to the right of [ 35.285401] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.285510] [ 35.285535] The buggy address belongs to the physical page: [ 35.285592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.285929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.286003] page_type: f5(slab) [ 35.286054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.286113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.286172] page dumped because: kasan: bad access detected [ 35.286208] [ 35.286247] Memory state around the buggy address: [ 35.286282] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.286355] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.286403] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.286444] ^ [ 35.286477] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.286522] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.286565] ================================================================== [ 35.160647] ================================================================== [ 35.160695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.160772] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.160823] [ 35.160855] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.160940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.160970] Hardware name: linux,dummy-virt (DT) [ 35.161056] Call trace: [ 35.161082] show_stack+0x20/0x38 (C) [ 35.161133] dump_stack_lvl+0x8c/0xd0 [ 35.161300] print_report+0x118/0x5e8 [ 35.161390] kasan_report+0xdc/0x128 [ 35.161480] __asan_report_store8_noabort+0x20/0x30 [ 35.161534] kasan_atomics_helper+0x3e5c/0x4858 [ 35.161587] kasan_atomics+0x198/0x2e0 [ 35.161655] kunit_try_run_case+0x170/0x3f0 [ 35.161811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.161872] kthread+0x328/0x630 [ 35.161918] ret_from_fork+0x10/0x20 [ 35.162040] [ 35.162068] Allocated by task 296: [ 35.162101] kasan_save_stack+0x3c/0x68 [ 35.162150] kasan_save_track+0x20/0x40 [ 35.162187] kasan_save_alloc_info+0x40/0x58 [ 35.162227] __kasan_kmalloc+0xd4/0xd8 [ 35.162264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.162443] kasan_atomics+0xb8/0x2e0 [ 35.162501] kunit_try_run_case+0x170/0x3f0 [ 35.162577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.162644] kthread+0x328/0x630 [ 35.162679] ret_from_fork+0x10/0x20 [ 35.162918] [ 35.162989] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.162989] which belongs to the cache kmalloc-64 of size 64 [ 35.163095] The buggy address is located 0 bytes to the right of [ 35.163095] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.163175] [ 35.163215] The buggy address belongs to the physical page: [ 35.163271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.163328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.163594] page_type: f5(slab) [ 35.163644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.163697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.163740] page dumped because: kasan: bad access detected [ 35.163784] [ 35.163899] Memory state around the buggy address: [ 35.163965] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.164013] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.164068] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.164152] ^ [ 35.164259] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.164342] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.164384] ================================================================== [ 35.206807] ================================================================== [ 35.207100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 35.207166] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.207490] [ 35.207561] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.207714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.207742] Hardware name: linux,dummy-virt (DT) [ 35.207789] Call trace: [ 35.207822] show_stack+0x20/0x38 (C) [ 35.207875] dump_stack_lvl+0x8c/0xd0 [ 35.207947] print_report+0x118/0x5e8 [ 35.207994] kasan_report+0xdc/0x128 [ 35.208039] kasan_check_range+0x100/0x1a8 [ 35.208085] __kasan_check_write+0x20/0x30 [ 35.208133] kasan_atomics_helper+0x11f8/0x4858 [ 35.208348] kasan_atomics+0x198/0x2e0 [ 35.208445] kunit_try_run_case+0x170/0x3f0 [ 35.208597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.208701] kthread+0x328/0x630 [ 35.209039] ret_from_fork+0x10/0x20 [ 35.209140] [ 35.209201] Allocated by task 296: [ 35.209279] kasan_save_stack+0x3c/0x68 [ 35.209396] kasan_save_track+0x20/0x40 [ 35.209452] kasan_save_alloc_info+0x40/0x58 [ 35.209493] __kasan_kmalloc+0xd4/0xd8 [ 35.209531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.209584] kasan_atomics+0xb8/0x2e0 [ 35.209624] kunit_try_run_case+0x170/0x3f0 [ 35.209675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.209721] kthread+0x328/0x630 [ 35.209767] ret_from_fork+0x10/0x20 [ 35.209806] [ 35.209828] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.209828] which belongs to the cache kmalloc-64 of size 64 [ 35.209915] The buggy address is located 0 bytes to the right of [ 35.209915] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.209981] [ 35.210011] The buggy address belongs to the physical page: [ 35.210065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.210148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.210205] page_type: f5(slab) [ 35.210246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.210297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.210342] page dumped because: kasan: bad access detected [ 35.210375] [ 35.210396] Memory state around the buggy address: [ 35.210444] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.210491] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.210535] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.210576] ^ [ 35.210619] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.210682] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.210725] ================================================================== [ 35.150464] ================================================================== [ 35.150518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.150573] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.150623] [ 35.150928] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.151103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.151388] Hardware name: linux,dummy-virt (DT) [ 35.151458] Call trace: [ 35.151530] show_stack+0x20/0x38 (C) [ 35.151595] dump_stack_lvl+0x8c/0xd0 [ 35.151646] print_report+0x118/0x5e8 [ 35.151694] kasan_report+0xdc/0x128 [ 35.151741] __asan_report_load8_noabort+0x20/0x30 [ 35.151840] kasan_atomics_helper+0x3f58/0x4858 [ 35.151894] kasan_atomics+0x198/0x2e0 [ 35.152054] kunit_try_run_case+0x170/0x3f0 [ 35.152140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.152217] kthread+0x328/0x630 [ 35.152352] ret_from_fork+0x10/0x20 [ 35.152469] [ 35.152492] Allocated by task 296: [ 35.152523] kasan_save_stack+0x3c/0x68 [ 35.152565] kasan_save_track+0x20/0x40 [ 35.152741] kasan_save_alloc_info+0x40/0x58 [ 35.152840] __kasan_kmalloc+0xd4/0xd8 [ 35.152890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.152947] kasan_atomics+0xb8/0x2e0 [ 35.153026] kunit_try_run_case+0x170/0x3f0 [ 35.153119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.153176] kthread+0x328/0x630 [ 35.153210] ret_from_fork+0x10/0x20 [ 35.153249] [ 35.153271] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.153271] which belongs to the cache kmalloc-64 of size 64 [ 35.153370] The buggy address is located 0 bytes to the right of [ 35.153370] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.153534] [ 35.153585] The buggy address belongs to the physical page: [ 35.153642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.153722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.153850] page_type: f5(slab) [ 35.153908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.153960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.154002] page dumped because: kasan: bad access detected [ 35.154162] [ 35.154186] Memory state around the buggy address: [ 35.154222] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.154271] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.154483] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.154542] ^ [ 35.154609] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.154689] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.154997] ================================================================== [ 35.259976] ================================================================== [ 35.260095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 35.260149] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.260201] [ 35.260238] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.260450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.260485] Hardware name: linux,dummy-virt (DT) [ 35.260614] Call trace: [ 35.260649] show_stack+0x20/0x38 (C) [ 35.260771] dump_stack_lvl+0x8c/0xd0 [ 35.260849] print_report+0x118/0x5e8 [ 35.260915] kasan_report+0xdc/0x128 [ 35.261265] kasan_check_range+0x100/0x1a8 [ 35.261329] __kasan_check_write+0x20/0x30 [ 35.261379] kasan_atomics_helper+0x15b4/0x4858 [ 35.261494] kasan_atomics+0x198/0x2e0 [ 35.261546] kunit_try_run_case+0x170/0x3f0 [ 35.261601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.261720] kthread+0x328/0x630 [ 35.261802] ret_from_fork+0x10/0x20 [ 35.261861] [ 35.261901] Allocated by task 296: [ 35.261960] kasan_save_stack+0x3c/0x68 [ 35.262003] kasan_save_track+0x20/0x40 [ 35.262041] kasan_save_alloc_info+0x40/0x58 [ 35.262081] __kasan_kmalloc+0xd4/0xd8 [ 35.262123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.262166] kasan_atomics+0xb8/0x2e0 [ 35.262315] kunit_try_run_case+0x170/0x3f0 [ 35.262453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262528] kthread+0x328/0x630 [ 35.262565] ret_from_fork+0x10/0x20 [ 35.262604] [ 35.262626] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.262626] which belongs to the cache kmalloc-64 of size 64 [ 35.262705] The buggy address is located 0 bytes to the right of [ 35.262705] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.262792] [ 35.262815] The buggy address belongs to the physical page: [ 35.262861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.262916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.262967] page_type: f5(slab) [ 35.263005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.263059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.263101] page dumped because: kasan: bad access detected [ 35.263140] [ 35.263161] Memory state around the buggy address: [ 35.263196] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.263242] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.263289] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.263329] ^ [ 35.263366] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.263418] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.263459] ================================================================== [ 35.243449] ================================================================== [ 35.243502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 35.243559] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.243611] [ 35.243665] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.243766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.243819] Hardware name: linux,dummy-virt (DT) [ 35.243893] Call trace: [ 35.243952] show_stack+0x20/0x38 (C) [ 35.244003] dump_stack_lvl+0x8c/0xd0 [ 35.244081] print_report+0x118/0x5e8 [ 35.244148] kasan_report+0xdc/0x128 [ 35.244193] kasan_check_range+0x100/0x1a8 [ 35.244259] __kasan_check_write+0x20/0x30 [ 35.244317] kasan_atomics_helper+0x147c/0x4858 [ 35.244369] kasan_atomics+0x198/0x2e0 [ 35.244438] kunit_try_run_case+0x170/0x3f0 [ 35.244487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.244542] kthread+0x328/0x630 [ 35.244601] ret_from_fork+0x10/0x20 [ 35.244678] [ 35.244702] Allocated by task 296: [ 35.244732] kasan_save_stack+0x3c/0x68 [ 35.244782] kasan_save_track+0x20/0x40 [ 35.244843] kasan_save_alloc_info+0x40/0x58 [ 35.244884] __kasan_kmalloc+0xd4/0xd8 [ 35.244921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.244965] kasan_atomics+0xb8/0x2e0 [ 35.245004] kunit_try_run_case+0x170/0x3f0 [ 35.245266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.245331] kthread+0x328/0x630 [ 35.245725] ret_from_fork+0x10/0x20 [ 35.245803] [ 35.245881] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.245881] which belongs to the cache kmalloc-64 of size 64 [ 35.245962] The buggy address is located 0 bytes to the right of [ 35.245962] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.246032] [ 35.246332] The buggy address belongs to the physical page: [ 35.246394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.246452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.246506] page_type: f5(slab) [ 35.247004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.247246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.247324] page dumped because: kasan: bad access detected [ 35.247362] [ 35.247413] Memory state around the buggy address: [ 35.247459] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.247517] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.247563] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.247605] ^ [ 35.247821] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.248781] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.248832] ================================================================== [ 35.286899] ================================================================== [ 35.287014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 35.287121] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.287268] [ 35.287650] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.287862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.287941] Hardware name: linux,dummy-virt (DT) [ 35.288015] Call trace: [ 35.288116] show_stack+0x20/0x38 (C) [ 35.288224] dump_stack_lvl+0x8c/0xd0 [ 35.288329] print_report+0x118/0x5e8 [ 35.289690] kasan_report+0xdc/0x128 [ 35.290794] kasan_check_range+0x100/0x1a8 [ 35.290864] __kasan_check_write+0x20/0x30 [ 35.291007] kasan_atomics_helper+0x175c/0x4858 [ 35.291175] kasan_atomics+0x198/0x2e0 [ 35.291229] kunit_try_run_case+0x170/0x3f0 [ 35.291329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291445] kthread+0x328/0x630 [ 35.291589] ret_from_fork+0x10/0x20 [ 35.291713] [ 35.291937] Allocated by task 296: [ 35.291972] kasan_save_stack+0x3c/0x68 [ 35.292017] kasan_save_track+0x20/0x40 [ 35.292104] kasan_save_alloc_info+0x40/0x58 [ 35.292207] __kasan_kmalloc+0xd4/0xd8 [ 35.292371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.292470] kasan_atomics+0xb8/0x2e0 [ 35.292520] kunit_try_run_case+0x170/0x3f0 [ 35.292560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.292801] kthread+0x328/0x630 [ 35.292839] ret_from_fork+0x10/0x20 [ 35.292892] [ 35.292914] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.292914] which belongs to the cache kmalloc-64 of size 64 [ 35.292977] The buggy address is located 0 bytes to the right of [ 35.292977] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.293135] [ 35.293216] The buggy address belongs to the physical page: [ 35.293271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.293342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.293401] page_type: f5(slab) [ 35.293442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.293501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.293543] page dumped because: kasan: bad access detected [ 35.293583] [ 35.293603] Memory state around the buggy address: [ 35.293639] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.293684] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.293732] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.293783] ^ [ 35.293817] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.293861] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.293905] ================================================================== [ 35.294455] ================================================================== [ 35.294507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 35.294724] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.294792] [ 35.294828] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.294958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.295046] Hardware name: linux,dummy-virt (DT) [ 35.295170] Call trace: [ 35.295232] show_stack+0x20/0x38 (C) [ 35.295373] dump_stack_lvl+0x8c/0xd0 [ 35.295451] print_report+0x118/0x5e8 [ 35.295578] kasan_report+0xdc/0x128 [ 35.295739] __asan_report_load8_noabort+0x20/0x30 [ 35.295836] kasan_atomics_helper+0x3e20/0x4858 [ 35.296073] kasan_atomics+0x198/0x2e0 [ 35.296123] kunit_try_run_case+0x170/0x3f0 [ 35.296171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.296281] kthread+0x328/0x630 [ 35.296326] ret_from_fork+0x10/0x20 [ 35.296400] [ 35.296507] Allocated by task 296: [ 35.296575] kasan_save_stack+0x3c/0x68 [ 35.296720] kasan_save_track+0x20/0x40 [ 35.296803] kasan_save_alloc_info+0x40/0x58 [ 35.297049] __kasan_kmalloc+0xd4/0xd8 [ 35.297090] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.297133] kasan_atomics+0xb8/0x2e0 [ 35.297204] kunit_try_run_case+0x170/0x3f0 [ 35.298139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.298217] kthread+0x328/0x630 [ 35.298255] ret_from_fork+0x10/0x20 [ 35.298318] [ 35.298391] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.298391] which belongs to the cache kmalloc-64 of size 64 [ 35.298821] The buggy address is located 0 bytes to the right of [ 35.298821] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.298974] [ 35.299074] The buggy address belongs to the physical page: [ 35.299165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.299268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.299322] page_type: f5(slab) [ 35.299522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.299575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.299618] page dumped because: kasan: bad access detected [ 35.299652] [ 35.299673] Memory state around the buggy address: [ 35.299708] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.299775] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.299820] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.299905] ^ [ 35.299973] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.300113] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.300155] ================================================================== [ 35.181761] ================================================================== [ 35.182052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.182148] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.182203] [ 35.182235] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.182322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.182351] Hardware name: linux,dummy-virt (DT) [ 35.182384] Call trace: [ 35.182429] show_stack+0x20/0x38 (C) [ 35.182478] dump_stack_lvl+0x8c/0xd0 [ 35.182525] print_report+0x118/0x5e8 [ 35.182570] kasan_report+0xdc/0x128 [ 35.182634] kasan_check_range+0x100/0x1a8 [ 35.182682] __kasan_check_write+0x20/0x30 [ 35.182730] kasan_atomics_helper+0xff0/0x4858 [ 35.182792] kasan_atomics+0x198/0x2e0 [ 35.182850] kunit_try_run_case+0x170/0x3f0 [ 35.182909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.182972] kthread+0x328/0x630 [ 35.183018] ret_from_fork+0x10/0x20 [ 35.183064] [ 35.183094] Allocated by task 296: [ 35.183124] kasan_save_stack+0x3c/0x68 [ 35.183164] kasan_save_track+0x20/0x40 [ 35.183202] kasan_save_alloc_info+0x40/0x58 [ 35.183249] __kasan_kmalloc+0xd4/0xd8 [ 35.183303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.183347] kasan_atomics+0xb8/0x2e0 [ 35.183401] kunit_try_run_case+0x170/0x3f0 [ 35.183442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.183488] kthread+0x328/0x630 [ 35.183531] ret_from_fork+0x10/0x20 [ 35.183570] [ 35.183591] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.183591] which belongs to the cache kmalloc-64 of size 64 [ 35.183651] The buggy address is located 0 bytes to the right of [ 35.183651] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.183723] [ 35.183756] The buggy address belongs to the physical page: [ 35.183792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.183846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.183894] page_type: f5(slab) [ 35.183933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.183987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.184029] page dumped because: kasan: bad access detected [ 35.184062] [ 35.184082] Memory state around the buggy address: [ 35.184665] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.184777] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.184873] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.185041] ^ [ 35.185080] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.185125] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.185166] ================================================================== [ 35.176596] ================================================================== [ 35.176671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.176741] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.176806] [ 35.177054] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.177267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.177297] Hardware name: linux,dummy-virt (DT) [ 35.177437] Call trace: [ 35.177466] show_stack+0x20/0x38 (C) [ 35.177520] dump_stack_lvl+0x8c/0xd0 [ 35.177649] print_report+0x118/0x5e8 [ 35.177773] kasan_report+0xdc/0x128 [ 35.177839] kasan_check_range+0x100/0x1a8 [ 35.177890] __kasan_check_write+0x20/0x30 [ 35.178096] kasan_atomics_helper+0xf88/0x4858 [ 35.178358] kasan_atomics+0x198/0x2e0 [ 35.178423] kunit_try_run_case+0x170/0x3f0 [ 35.178473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.178539] kthread+0x328/0x630 [ 35.178583] ret_from_fork+0x10/0x20 [ 35.178641] [ 35.178664] Allocated by task 296: [ 35.178700] kasan_save_stack+0x3c/0x68 [ 35.178741] kasan_save_track+0x20/0x40 [ 35.178790] kasan_save_alloc_info+0x40/0x58 [ 35.178831] __kasan_kmalloc+0xd4/0xd8 [ 35.178910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.179159] kasan_atomics+0xb8/0x2e0 [ 35.179290] kunit_try_run_case+0x170/0x3f0 [ 35.179391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.179479] kthread+0x328/0x630 [ 35.179558] ret_from_fork+0x10/0x20 [ 35.179650] [ 35.179710] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.179710] which belongs to the cache kmalloc-64 of size 64 [ 35.179786] The buggy address is located 0 bytes to the right of [ 35.179786] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.179891] [ 35.179914] The buggy address belongs to the physical page: [ 35.179954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.180008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.180061] page_type: f5(slab) [ 35.180099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.180255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.180369] page dumped because: kasan: bad access detected [ 35.180427] [ 35.180491] Memory state around the buggy address: [ 35.180739] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.180848] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.180925] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.180994] ^ [ 35.181068] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.181131] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.181199] ================================================================== [ 35.145071] ================================================================== [ 35.145144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.145206] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.145256] [ 35.145296] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.145393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.145433] Hardware name: linux,dummy-virt (DT) [ 35.145467] Call trace: [ 35.145492] show_stack+0x20/0x38 (C) [ 35.145541] dump_stack_lvl+0x8c/0xd0 [ 35.145588] print_report+0x118/0x5e8 [ 35.145633] kasan_report+0xdc/0x128 [ 35.145678] kasan_check_range+0x100/0x1a8 [ 35.145735] __kasan_check_read+0x20/0x30 [ 35.145796] kasan_atomics_helper+0xdd4/0x4858 [ 35.145845] kasan_atomics+0x198/0x2e0 [ 35.145893] kunit_try_run_case+0x170/0x3f0 [ 35.145942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.146005] kthread+0x328/0x630 [ 35.146057] ret_from_fork+0x10/0x20 [ 35.146112] [ 35.146140] Allocated by task 296: [ 35.146178] kasan_save_stack+0x3c/0x68 [ 35.146220] kasan_save_track+0x20/0x40 [ 35.146258] kasan_save_alloc_info+0x40/0x58 [ 35.146298] __kasan_kmalloc+0xd4/0xd8 [ 35.146333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.146387] kasan_atomics+0xb8/0x2e0 [ 35.146436] kunit_try_run_case+0x170/0x3f0 [ 35.146477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.146522] kthread+0x328/0x630 [ 35.146564] ret_from_fork+0x10/0x20 [ 35.146601] [ 35.146624] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.146624] which belongs to the cache kmalloc-64 of size 64 [ 35.146682] The buggy address is located 0 bytes to the right of [ 35.146682] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.147442] [ 35.147493] The buggy address belongs to the physical page: [ 35.147543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.147602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.147652] page_type: f5(slab) [ 35.147691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.147994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.148287] page dumped because: kasan: bad access detected [ 35.148391] [ 35.148451] Memory state around the buggy address: [ 35.148766] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.148887] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.149048] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.149143] ^ [ 35.149272] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.149318] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.149359] ================================================================== [ 35.223744] ================================================================== [ 35.224072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 35.224303] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.224385] [ 35.224420] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.224776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.224834] Hardware name: linux,dummy-virt (DT) [ 35.225052] Call trace: [ 35.225147] show_stack+0x20/0x38 (C) [ 35.225206] dump_stack_lvl+0x8c/0xd0 [ 35.225403] print_report+0x118/0x5e8 [ 35.225451] kasan_report+0xdc/0x128 [ 35.225496] kasan_check_range+0x100/0x1a8 [ 35.225543] __kasan_check_write+0x20/0x30 [ 35.225593] kasan_atomics_helper+0x1384/0x4858 [ 35.225645] kasan_atomics+0x198/0x2e0 [ 35.225692] kunit_try_run_case+0x170/0x3f0 [ 35.225741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.225829] kthread+0x328/0x630 [ 35.225875] ret_from_fork+0x10/0x20 [ 35.225925] [ 35.225948] Allocated by task 296: [ 35.225978] kasan_save_stack+0x3c/0x68 [ 35.226019] kasan_save_track+0x20/0x40 [ 35.226056] kasan_save_alloc_info+0x40/0x58 [ 35.226097] __kasan_kmalloc+0xd4/0xd8 [ 35.226139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.226191] kasan_atomics+0xb8/0x2e0 [ 35.226231] kunit_try_run_case+0x170/0x3f0 [ 35.226272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.226317] kthread+0x328/0x630 [ 35.226362] ret_from_fork+0x10/0x20 [ 35.226409] [ 35.226452] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.226452] which belongs to the cache kmalloc-64 of size 64 [ 35.226514] The buggy address is located 0 bytes to the right of [ 35.226514] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.226580] [ 35.226602] The buggy address belongs to the physical page: [ 35.226643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.226695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226754] page_type: f5(slab) [ 35.227177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.227248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.227292] page dumped because: kasan: bad access detected [ 35.227335] [ 35.227378] Memory state around the buggy address: [ 35.227416] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.227858] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.227955] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.228596] ^ [ 35.228646] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.228694] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.228735] ================================================================== [ 35.196738] ================================================================== [ 35.196802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.196879] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.196950] [ 35.196981] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.197070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.197097] Hardware name: linux,dummy-virt (DT) [ 35.197130] Call trace: [ 35.197155] show_stack+0x20/0x38 (C) [ 35.197366] dump_stack_lvl+0x8c/0xd0 [ 35.197425] print_report+0x118/0x5e8 [ 35.197499] kasan_report+0xdc/0x128 [ 35.197544] kasan_check_range+0x100/0x1a8 [ 35.197610] __kasan_check_write+0x20/0x30 [ 35.197676] kasan_atomics_helper+0x1128/0x4858 [ 35.197731] kasan_atomics+0x198/0x2e0 [ 35.197794] kunit_try_run_case+0x170/0x3f0 [ 35.197842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.197896] kthread+0x328/0x630 [ 35.197958] ret_from_fork+0x10/0x20 [ 35.198010] [ 35.198168] Allocated by task 296: [ 35.198227] kasan_save_stack+0x3c/0x68 [ 35.198272] kasan_save_track+0x20/0x40 [ 35.198308] kasan_save_alloc_info+0x40/0x58 [ 35.198349] __kasan_kmalloc+0xd4/0xd8 [ 35.198387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.198429] kasan_atomics+0xb8/0x2e0 [ 35.198586] kunit_try_run_case+0x170/0x3f0 [ 35.198782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.198853] kthread+0x328/0x630 [ 35.198892] ret_from_fork+0x10/0x20 [ 35.198930] [ 35.198953] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.198953] which belongs to the cache kmalloc-64 of size 64 [ 35.199026] The buggy address is located 0 bytes to the right of [ 35.199026] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.199093] [ 35.199116] The buggy address belongs to the physical page: [ 35.199306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.199405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.199473] page_type: f5(slab) [ 35.199549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.199809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.199941] page dumped because: kasan: bad access detected [ 35.200030] [ 35.200066] Memory state around the buggy address: [ 35.200103] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.200149] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.200337] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.200384] ^ [ 35.200420] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.200589] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.200674] ================================================================== [ 35.253637] ================================================================== [ 35.253686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 35.253736] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.253908] [ 35.254166] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.254371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.254429] Hardware name: linux,dummy-virt (DT) [ 35.254464] Call trace: [ 35.254533] show_stack+0x20/0x38 (C) [ 35.254601] dump_stack_lvl+0x8c/0xd0 [ 35.254654] print_report+0x118/0x5e8 [ 35.254713] kasan_report+0xdc/0x128 [ 35.254779] kasan_check_range+0x100/0x1a8 [ 35.254826] __kasan_check_write+0x20/0x30 [ 35.254874] kasan_atomics_helper+0x154c/0x4858 [ 35.254925] kasan_atomics+0x198/0x2e0 [ 35.254987] kunit_try_run_case+0x170/0x3f0 [ 35.255035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.255228] kthread+0x328/0x630 [ 35.255326] ret_from_fork+0x10/0x20 [ 35.255463] [ 35.255519] Allocated by task 296: [ 35.255587] kasan_save_stack+0x3c/0x68 [ 35.255859] kasan_save_track+0x20/0x40 [ 35.255977] kasan_save_alloc_info+0x40/0x58 [ 35.256060] __kasan_kmalloc+0xd4/0xd8 [ 35.256172] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.256218] kasan_atomics+0xb8/0x2e0 [ 35.256274] kunit_try_run_case+0x170/0x3f0 [ 35.256321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.256366] kthread+0x328/0x630 [ 35.256709] ret_from_fork+0x10/0x20 [ 35.256842] [ 35.256894] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.256894] which belongs to the cache kmalloc-64 of size 64 [ 35.257125] The buggy address is located 0 bytes to the right of [ 35.257125] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.257296] [ 35.257391] The buggy address belongs to the physical page: [ 35.257495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.257606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.257678] page_type: f5(slab) [ 35.257868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.258022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.258178] page dumped because: kasan: bad access detected [ 35.258270] [ 35.258446] Memory state around the buggy address: [ 35.258597] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.258649] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.258695] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.258738] ^ [ 35.258807] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.258863] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.258904] ================================================================== [ 35.136198] ================================================================== [ 35.136281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.136372] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.136424] [ 35.136485] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.136594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.136639] Hardware name: linux,dummy-virt (DT) [ 35.136674] Call trace: [ 35.136698] show_stack+0x20/0x38 (C) [ 35.136759] dump_stack_lvl+0x8c/0xd0 [ 35.136810] print_report+0x118/0x5e8 [ 35.136854] kasan_report+0xdc/0x128 [ 35.137031] kasan_check_range+0x100/0x1a8 [ 35.137082] __kasan_check_write+0x20/0x30 [ 35.137133] kasan_atomics_helper+0xd3c/0x4858 [ 35.137207] kasan_atomics+0x198/0x2e0 [ 35.137264] kunit_try_run_case+0x170/0x3f0 [ 35.137327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.137382] kthread+0x328/0x630 [ 35.137440] ret_from_fork+0x10/0x20 [ 35.137521] [ 35.137544] Allocated by task 296: [ 35.137594] kasan_save_stack+0x3c/0x68 [ 35.137650] kasan_save_track+0x20/0x40 [ 35.137847] kasan_save_alloc_info+0x40/0x58 [ 35.138069] __kasan_kmalloc+0xd4/0xd8 [ 35.138159] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.138251] kasan_atomics+0xb8/0x2e0 [ 35.138320] kunit_try_run_case+0x170/0x3f0 [ 35.138361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.138405] kthread+0x328/0x630 [ 35.138441] ret_from_fork+0x10/0x20 [ 35.138478] [ 35.138499] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.138499] which belongs to the cache kmalloc-64 of size 64 [ 35.138561] The buggy address is located 0 bytes to the right of [ 35.138561] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.138626] [ 35.138785] The buggy address belongs to the physical page: [ 35.138861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.138941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.139011] page_type: f5(slab) [ 35.139239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.139382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.139440] page dumped because: kasan: bad access detected [ 35.139513] [ 35.139659] Memory state around the buggy address: [ 35.139730] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.139851] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.140012] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.140092] ^ [ 35.140167] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.140218] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.140281] ================================================================== [ 35.170998] ================================================================== [ 35.171341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.171448] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.171744] [ 35.171823] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.171941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.172018] Hardware name: linux,dummy-virt (DT) [ 35.172070] Call trace: [ 35.172132] show_stack+0x20/0x38 (C) [ 35.172192] dump_stack_lvl+0x8c/0xd0 [ 35.172263] print_report+0x118/0x5e8 [ 35.172319] kasan_report+0xdc/0x128 [ 35.172365] kasan_check_range+0x100/0x1a8 [ 35.172413] __kasan_check_write+0x20/0x30 [ 35.172461] kasan_atomics_helper+0xf20/0x4858 [ 35.172515] kasan_atomics+0x198/0x2e0 [ 35.172561] kunit_try_run_case+0x170/0x3f0 [ 35.172620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.172684] kthread+0x328/0x630 [ 35.172735] ret_from_fork+0x10/0x20 [ 35.172797] [ 35.172817] Allocated by task 296: [ 35.172848] kasan_save_stack+0x3c/0x68 [ 35.172887] kasan_save_track+0x20/0x40 [ 35.172926] kasan_save_alloc_info+0x40/0x58 [ 35.173002] __kasan_kmalloc+0xd4/0xd8 [ 35.173212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.173329] kasan_atomics+0xb8/0x2e0 [ 35.173405] kunit_try_run_case+0x170/0x3f0 [ 35.173490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.173547] kthread+0x328/0x630 [ 35.173583] ret_from_fork+0x10/0x20 [ 35.173620] [ 35.173644] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.173644] which belongs to the cache kmalloc-64 of size 64 [ 35.173756] The buggy address is located 0 bytes to the right of [ 35.173756] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.173964] [ 35.174072] The buggy address belongs to the physical page: [ 35.174145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.174459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.174557] page_type: f5(slab) [ 35.174682] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.174765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.174840] page dumped because: kasan: bad access detected [ 35.174988] [ 35.175009] Memory state around the buggy address: [ 35.175042] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.175148] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.175195] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.175236] ^ [ 35.175360] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.175474] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.175543] ================================================================== [ 35.300482] ================================================================== [ 35.300534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 35.300689] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.300780] [ 35.300816] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.300911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.300970] Hardware name: linux,dummy-virt (DT) [ 35.301019] Call trace: [ 35.301047] show_stack+0x20/0x38 (C) [ 35.301122] dump_stack_lvl+0x8c/0xd0 [ 35.301172] print_report+0x118/0x5e8 [ 35.301222] kasan_report+0xdc/0x128 [ 35.301267] kasan_check_range+0x100/0x1a8 [ 35.301313] __kasan_check_write+0x20/0x30 [ 35.301362] kasan_atomics_helper+0x17ec/0x4858 [ 35.301418] kasan_atomics+0x198/0x2e0 [ 35.301466] kunit_try_run_case+0x170/0x3f0 [ 35.301515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.301573] kthread+0x328/0x630 [ 35.301617] ret_from_fork+0x10/0x20 [ 35.301666] [ 35.301689] Allocated by task 296: [ 35.301725] kasan_save_stack+0x3c/0x68 [ 35.302025] kasan_save_track+0x20/0x40 [ 35.302079] kasan_save_alloc_info+0x40/0x58 [ 35.302316] __kasan_kmalloc+0xd4/0xd8 [ 35.302371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.302582] kasan_atomics+0xb8/0x2e0 [ 35.302636] kunit_try_run_case+0x170/0x3f0 [ 35.302677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.302721] kthread+0x328/0x630 [ 35.302768] ret_from_fork+0x10/0x20 [ 35.302832] [ 35.302858] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.302858] which belongs to the cache kmalloc-64 of size 64 [ 35.302923] The buggy address is located 0 bytes to the right of [ 35.302923] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.303043] [ 35.303068] The buggy address belongs to the physical page: [ 35.303129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.303299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.303424] page_type: f5(slab) [ 35.303545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.303628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.303720] page dumped because: kasan: bad access detected [ 35.304125] [ 35.304185] Memory state around the buggy address: [ 35.304221] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.304451] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.304642] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.304773] ^ [ 35.304851] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.304944] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.305314] ================================================================== [ 35.190922] ================================================================== [ 35.190983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.191078] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.191183] [ 35.191254] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.191361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.191389] Hardware name: linux,dummy-virt (DT) [ 35.191462] Call trace: [ 35.191595] show_stack+0x20/0x38 (C) [ 35.191649] dump_stack_lvl+0x8c/0xd0 [ 35.191730] print_report+0x118/0x5e8 [ 35.191873] kasan_report+0xdc/0x128 [ 35.191940] kasan_check_range+0x100/0x1a8 [ 35.192055] __kasan_check_write+0x20/0x30 [ 35.192137] kasan_atomics_helper+0x10c0/0x4858 [ 35.192328] kasan_atomics+0x198/0x2e0 [ 35.192466] kunit_try_run_case+0x170/0x3f0 [ 35.192728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.193221] kthread+0x328/0x630 [ 35.193311] ret_from_fork+0x10/0x20 [ 35.193429] [ 35.193502] Allocated by task 296: [ 35.193576] kasan_save_stack+0x3c/0x68 [ 35.193765] kasan_save_track+0x20/0x40 [ 35.193945] kasan_save_alloc_info+0x40/0x58 [ 35.194077] __kasan_kmalloc+0xd4/0xd8 [ 35.194408] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.194511] kasan_atomics+0xb8/0x2e0 [ 35.194607] kunit_try_run_case+0x170/0x3f0 [ 35.194697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.194794] kthread+0x328/0x630 [ 35.194882] ret_from_fork+0x10/0x20 [ 35.194920] [ 35.194944] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.194944] which belongs to the cache kmalloc-64 of size 64 [ 35.195007] The buggy address is located 0 bytes to the right of [ 35.195007] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.195074] [ 35.195133] The buggy address belongs to the physical page: [ 35.195293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.195418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.195502] page_type: f5(slab) [ 35.195557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.195820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.195892] page dumped because: kasan: bad access detected [ 35.195951] [ 35.196004] Memory state around the buggy address: [ 35.196051] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.196116] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.196166] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.196207] ^ [ 35.196242] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.196320] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.196442] ================================================================== [ 35.076505] ================================================================== [ 35.076553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.076602] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.076653] [ 35.076684] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.076839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.076898] Hardware name: linux,dummy-virt (DT) [ 35.076957] Call trace: [ 35.077058] dump_stack_lvl+0x8c/0xd0 [ 35.078317] kasan_save_alloc_info+0x40/0x58 [ 35.079109] The buggy address is located 0 bytes to the right of [ 35.079109] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.080032] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.082368] print_report+0x118/0x5e8 [ 35.084262] kasan_atomics+0xb8/0x2e0 [ 35.084981] [ 35.085053] The buggy address belongs to the physical page: [ 35.085245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.085445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.085570] page_type: f5(slab) [ 35.085649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.085766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.085862] page dumped because: kasan: bad access detected [ 35.085936] [ 35.086008] Memory state around the buggy address: [ 35.086074] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.086150] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.086196] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.086239] ^ [ 35.086403] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.086548] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.086593] ================================================================== [ 35.263538] ================================================================== [ 35.263580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 35.263625] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.263676] [ 35.263708] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.263806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.263836] Hardware name: linux,dummy-virt (DT) [ 35.263868] Call trace: [ 35.263932] show_stack+0x20/0x38 (C) [ 35.263984] dump_stack_lvl+0x8c/0xd0 [ 35.264295] print_report+0x118/0x5e8 [ 35.264378] kasan_report+0xdc/0x128 [ 35.264466] __asan_report_load8_noabort+0x20/0x30 [ 35.264522] kasan_atomics_helper+0x3db0/0x4858 [ 35.264575] kasan_atomics+0x198/0x2e0 [ 35.264701] kunit_try_run_case+0x170/0x3f0 [ 35.264857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.264943] kthread+0x328/0x630 [ 35.264993] ret_from_fork+0x10/0x20 [ 35.265109] [ 35.265213] Allocated by task 296: [ 35.265282] kasan_save_stack+0x3c/0x68 [ 35.265601] kasan_save_track+0x20/0x40 [ 35.265651] kasan_save_alloc_info+0x40/0x58 [ 35.265728] __kasan_kmalloc+0xd4/0xd8 [ 35.265778] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.265821] kasan_atomics+0xb8/0x2e0 [ 35.265862] kunit_try_run_case+0x170/0x3f0 [ 35.265902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.265948] kthread+0x328/0x630 [ 35.266136] ret_from_fork+0x10/0x20 [ 35.266300] [ 35.266370] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.266370] which belongs to the cache kmalloc-64 of size 64 [ 35.266624] The buggy address is located 0 bytes to the right of [ 35.266624] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.266788] [ 35.266849] The buggy address belongs to the physical page: [ 35.266975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.267079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.267210] page_type: f5(slab) [ 35.267270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.267321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.267364] page dumped because: kasan: bad access detected [ 35.267397] [ 35.267418] Memory state around the buggy address: [ 35.267452] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.267500] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.267547] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.267707] ^ [ 35.267784] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.267844] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.267912] ================================================================== [ 35.086833] ================================================================== [ 35.087158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.087273] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.087573] [ 35.087652] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.088348] __kasan_check_write+0x20/0x30 [ 35.090467] The buggy address is located 0 bytes to the right of [ 35.090467] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.090630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.090687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.090737] page_type: f5(slab) [ 35.090806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.091093] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.092929] [ 35.093535] print_report+0x118/0x5e8 [ 35.096068] [ 35.096301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.096394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.096447] page_type: f5(slab) [ 35.096612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.096841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.098585] ================================================================== [ 35.066538] ================================================================== [ 35.066584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.066632] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.066683] [ 35.066715] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.067137] Call trace: [ 35.068255] Allocated by task 296: [ 35.069537] [ 35.070094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.070819] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.072307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.073611] kasan_save_track+0x20/0x40 [ 35.073711] __kasan_kmalloc+0xd4/0xd8 [ 35.073762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.074018] kasan_atomics+0xb8/0x2e0 [ 35.074091] kunit_try_run_case+0x170/0x3f0 [ 35.074146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.074204] kthread+0x328/0x630 [ 35.074254] ret_from_fork+0x10/0x20 [ 35.074293] [ 35.074354] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.074354] which belongs to the cache kmalloc-64 of size 64 [ 35.074438] The buggy address is located 0 bytes to the right of [ 35.074438] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.074730] [ 35.074809] The buggy address belongs to the physical page: [ 35.074868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.074996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.075053] page_type: f5(slab) [ 35.075093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.075351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.075445] page dumped because: kasan: bad access detected [ 35.075526] [ 35.075587] Memory state around the buggy address: [ 35.075677] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.075770] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.075815] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.075866] ^ [ 35.075902] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.076235] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.076282] ================================================================== [ 35.155713] ================================================================== [ 35.155808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.155861] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.156035] [ 35.156072] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.156160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.156189] Hardware name: linux,dummy-virt (DT) [ 35.156223] Call trace: [ 35.156249] show_stack+0x20/0x38 (C) [ 35.156298] dump_stack_lvl+0x8c/0xd0 [ 35.156346] print_report+0x118/0x5e8 [ 35.156392] kasan_report+0xdc/0x128 [ 35.156438] kasan_check_range+0x100/0x1a8 [ 35.156623] __kasan_check_write+0x20/0x30 [ 35.156714] kasan_atomics_helper+0xe44/0x4858 [ 35.156806] kasan_atomics+0x198/0x2e0 [ 35.156861] kunit_try_run_case+0x170/0x3f0 [ 35.157076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.157189] kthread+0x328/0x630 [ 35.157255] ret_from_fork+0x10/0x20 [ 35.157317] [ 35.157357] Allocated by task 296: [ 35.157389] kasan_save_stack+0x3c/0x68 [ 35.157430] kasan_save_track+0x20/0x40 [ 35.157708] kasan_save_alloc_info+0x40/0x58 [ 35.157776] __kasan_kmalloc+0xd4/0xd8 [ 35.157816] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.157859] kasan_atomics+0xb8/0x2e0 [ 35.157952] kunit_try_run_case+0x170/0x3f0 [ 35.157994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.158040] kthread+0x328/0x630 [ 35.158082] ret_from_fork+0x10/0x20 [ 35.158206] [ 35.158245] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.158245] which belongs to the cache kmalloc-64 of size 64 [ 35.158434] The buggy address is located 0 bytes to the right of [ 35.158434] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.158558] [ 35.158599] The buggy address belongs to the physical page: [ 35.158656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.158712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.158774] page_type: f5(slab) [ 35.159009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.159105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.159189] page dumped because: kasan: bad access detected [ 35.159257] [ 35.159324] Memory state around the buggy address: [ 35.159414] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.159500] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.159901] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.159997] ^ [ 35.160070] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.160173] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.160243] ================================================================== [ 35.249062] ================================================================== [ 35.249115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 35.249166] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.249216] [ 35.249251] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.249338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.249367] Hardware name: linux,dummy-virt (DT) [ 35.249400] Call trace: [ 35.249426] show_stack+0x20/0x38 (C) [ 35.249473] dump_stack_lvl+0x8c/0xd0 [ 35.249522] print_report+0x118/0x5e8 [ 35.249568] kasan_report+0xdc/0x128 [ 35.249611] kasan_check_range+0x100/0x1a8 [ 35.249657] __kasan_check_write+0x20/0x30 [ 35.249705] kasan_atomics_helper+0x14e4/0x4858 [ 35.249789] kasan_atomics+0x198/0x2e0 [ 35.249873] kunit_try_run_case+0x170/0x3f0 [ 35.249941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.250025] kthread+0x328/0x630 [ 35.250069] ret_from_fork+0x10/0x20 [ 35.250159] [ 35.250240] Allocated by task 296: [ 35.250300] kasan_save_stack+0x3c/0x68 [ 35.250369] kasan_save_track+0x20/0x40 [ 35.250425] kasan_save_alloc_info+0x40/0x58 [ 35.250485] __kasan_kmalloc+0xd4/0xd8 [ 35.250543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.250588] kasan_atomics+0xb8/0x2e0 [ 35.250628] kunit_try_run_case+0x170/0x3f0 [ 35.250668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.250879] kthread+0x328/0x630 [ 35.250967] ret_from_fork+0x10/0x20 [ 35.251029] [ 35.251196] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.251196] which belongs to the cache kmalloc-64 of size 64 [ 35.251332] The buggy address is located 0 bytes to the right of [ 35.251332] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.251454] [ 35.251622] The buggy address belongs to the physical page: [ 35.251675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.251951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.252190] page_type: f5(slab) [ 35.252232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.252286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.252487] page dumped because: kasan: bad access detected [ 35.252629] [ 35.252707] Memory state around the buggy address: [ 35.252826] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.253032] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.253159] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.253235] ^ [ 35.253285] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.253331] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.253372] ================================================================== [ 35.185393] ================================================================== [ 35.185542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.185599] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.185665] [ 35.185724] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.185842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.185890] Hardware name: linux,dummy-virt (DT) [ 35.185924] Call trace: [ 35.186172] show_stack+0x20/0x38 (C) [ 35.186255] dump_stack_lvl+0x8c/0xd0 [ 35.186308] print_report+0x118/0x5e8 [ 35.186353] kasan_report+0xdc/0x128 [ 35.186418] kasan_check_range+0x100/0x1a8 [ 35.186483] __kasan_check_write+0x20/0x30 [ 35.186574] kasan_atomics_helper+0x1058/0x4858 [ 35.186627] kasan_atomics+0x198/0x2e0 [ 35.186694] kunit_try_run_case+0x170/0x3f0 [ 35.186787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.186862] kthread+0x328/0x630 [ 35.187100] ret_from_fork+0x10/0x20 [ 35.187266] [ 35.187324] Allocated by task 296: [ 35.187422] kasan_save_stack+0x3c/0x68 [ 35.187500] kasan_save_track+0x20/0x40 [ 35.187829] kasan_save_alloc_info+0x40/0x58 [ 35.187919] __kasan_kmalloc+0xd4/0xd8 [ 35.187994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.188061] kasan_atomics+0xb8/0x2e0 [ 35.188139] kunit_try_run_case+0x170/0x3f0 [ 35.188219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.188318] kthread+0x328/0x630 [ 35.188412] ret_from_fork+0x10/0x20 [ 35.188499] [ 35.188532] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.188532] which belongs to the cache kmalloc-64 of size 64 [ 35.188594] The buggy address is located 0 bytes to the right of [ 35.188594] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.188773] [ 35.188798] The buggy address belongs to the physical page: [ 35.188838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.189003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.189107] page_type: f5(slab) [ 35.189194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.189262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.189342] page dumped because: kasan: bad access detected [ 35.189594] [ 35.189660] Memory state around the buggy address: [ 35.189727] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.189832] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.189917] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.190003] ^ [ 35.190093] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.190179] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.190478] ================================================================== [ 35.234768] ================================================================== [ 35.234821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 35.234891] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.234953] [ 35.234985] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.235157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.235315] Hardware name: linux,dummy-virt (DT) [ 35.235409] Call trace: [ 35.235480] show_stack+0x20/0x38 (C) [ 35.235569] dump_stack_lvl+0x8c/0xd0 [ 35.235806] print_report+0x118/0x5e8 [ 35.236057] kasan_report+0xdc/0x128 [ 35.236159] kasan_check_range+0x100/0x1a8 [ 35.236278] __kasan_check_write+0x20/0x30 [ 35.236365] kasan_atomics_helper+0x1414/0x4858 [ 35.236472] kasan_atomics+0x198/0x2e0 [ 35.236548] kunit_try_run_case+0x170/0x3f0 [ 35.236615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.236673] kthread+0x328/0x630 [ 35.236715] ret_from_fork+0x10/0x20 [ 35.236774] [ 35.236798] Allocated by task 296: [ 35.236827] kasan_save_stack+0x3c/0x68 [ 35.237144] kasan_save_track+0x20/0x40 [ 35.237252] kasan_save_alloc_info+0x40/0x58 [ 35.237320] __kasan_kmalloc+0xd4/0xd8 [ 35.237380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.237457] kasan_atomics+0xb8/0x2e0 [ 35.237508] kunit_try_run_case+0x170/0x3f0 [ 35.237549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.237769] kthread+0x328/0x630 [ 35.237866] ret_from_fork+0x10/0x20 [ 35.237943] [ 35.238000] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.238000] which belongs to the cache kmalloc-64 of size 64 [ 35.238113] The buggy address is located 0 bytes to the right of [ 35.238113] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.238180] [ 35.238434] The buggy address belongs to the physical page: [ 35.238591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.238692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.238779] page_type: f5(slab) [ 35.238963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.239253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.239314] page dumped because: kasan: bad access detected [ 35.239349] [ 35.239369] Memory state around the buggy address: [ 35.239404] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.239450] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.241116] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.242978] ^ [ 35.243044] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.243092] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.243135] ================================================================== [ 35.165483] ================================================================== [ 35.165539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.165590] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.165679] [ 35.165938] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.166069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.166122] Hardware name: linux,dummy-virt (DT) [ 35.166157] Call trace: [ 35.166184] show_stack+0x20/0x38 (C) [ 35.166241] dump_stack_lvl+0x8c/0xd0 [ 35.166317] print_report+0x118/0x5e8 [ 35.166383] kasan_report+0xdc/0x128 [ 35.166430] kasan_check_range+0x100/0x1a8 [ 35.166477] __kasan_check_write+0x20/0x30 [ 35.166535] kasan_atomics_helper+0xeb8/0x4858 [ 35.166586] kasan_atomics+0x198/0x2e0 [ 35.166635] kunit_try_run_case+0x170/0x3f0 [ 35.166681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.166735] kthread+0x328/0x630 [ 35.166790] ret_from_fork+0x10/0x20 [ 35.166839] [ 35.166859] Allocated by task 296: [ 35.167516] kasan_save_stack+0x3c/0x68 [ 35.167823] kasan_save_track+0x20/0x40 [ 35.167931] kasan_save_alloc_info+0x40/0x58 [ 35.168042] __kasan_kmalloc+0xd4/0xd8 [ 35.168141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.168241] kasan_atomics+0xb8/0x2e0 [ 35.168312] kunit_try_run_case+0x170/0x3f0 [ 35.168352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.168549] kthread+0x328/0x630 [ 35.168589] ret_from_fork+0x10/0x20 [ 35.168628] [ 35.168651] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.168651] which belongs to the cache kmalloc-64 of size 64 [ 35.168716] The buggy address is located 0 bytes to the right of [ 35.168716] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.168929] [ 35.168992] The buggy address belongs to the physical page: [ 35.169051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.169141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.169389] page_type: f5(slab) [ 35.169484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.169602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.169680] page dumped because: kasan: bad access detected [ 35.169732] [ 35.169818] Memory state around the buggy address: [ 35.169883] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.169973] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.170055] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.170323] ^ [ 35.170403] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.170461] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.170503] ================================================================== [ 35.129649] ================================================================== [ 35.129700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.129770] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.129849] [ 35.129885] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.129991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.130023] Hardware name: linux,dummy-virt (DT) [ 35.130058] Call trace: [ 35.130084] show_stack+0x20/0x38 (C) [ 35.130141] dump_stack_lvl+0x8c/0xd0 [ 35.130191] print_report+0x118/0x5e8 [ 35.130237] kasan_report+0xdc/0x128 [ 35.130406] __asan_report_load4_noabort+0x20/0x30 [ 35.130539] kasan_atomics_helper+0x3dd8/0x4858 [ 35.130594] kasan_atomics+0x198/0x2e0 [ 35.130670] kunit_try_run_case+0x170/0x3f0 [ 35.130721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.130992] kthread+0x328/0x630 [ 35.131138] ret_from_fork+0x10/0x20 [ 35.131308] [ 35.131369] Allocated by task 296: [ 35.131427] kasan_save_stack+0x3c/0x68 [ 35.131469] kasan_save_track+0x20/0x40 [ 35.131716] kasan_save_alloc_info+0x40/0x58 [ 35.131780] __kasan_kmalloc+0xd4/0xd8 [ 35.131910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.132007] kasan_atomics+0xb8/0x2e0 [ 35.132097] kunit_try_run_case+0x170/0x3f0 [ 35.132203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.132278] kthread+0x328/0x630 [ 35.132357] ret_from_fork+0x10/0x20 [ 35.132588] [ 35.132717] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.132717] which belongs to the cache kmalloc-64 of size 64 [ 35.132881] The buggy address is located 0 bytes to the right of [ 35.132881] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.132960] [ 35.132983] The buggy address belongs to the physical page: [ 35.133035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.133363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.133519] page_type: f5(slab) [ 35.133724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.133933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.134067] page dumped because: kasan: bad access detected [ 35.134160] [ 35.134217] Memory state around the buggy address: [ 35.134333] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.134409] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.134492] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.134613] ^ [ 35.134700] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.134767] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.134806] ================================================================== [ 35.217383] ================================================================== [ 35.217437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 35.217490] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.217638] [ 35.217704] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.217808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.217837] Hardware name: linux,dummy-virt (DT) [ 35.217871] Call trace: [ 35.217895] show_stack+0x20/0x38 (C) [ 35.217945] dump_stack_lvl+0x8c/0xd0 [ 35.218327] print_report+0x118/0x5e8 [ 35.218389] kasan_report+0xdc/0x128 [ 35.218435] kasan_check_range+0x100/0x1a8 [ 35.218524] __kasan_check_write+0x20/0x30 [ 35.218575] kasan_atomics_helper+0x12d8/0x4858 [ 35.218665] kasan_atomics+0x198/0x2e0 [ 35.218715] kunit_try_run_case+0x170/0x3f0 [ 35.218877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.218932] kthread+0x328/0x630 [ 35.219206] ret_from_fork+0x10/0x20 [ 35.219566] [ 35.219638] Allocated by task 296: [ 35.219852] kasan_save_stack+0x3c/0x68 [ 35.220004] kasan_save_track+0x20/0x40 [ 35.220125] kasan_save_alloc_info+0x40/0x58 [ 35.220243] __kasan_kmalloc+0xd4/0xd8 [ 35.220282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.220348] kasan_atomics+0xb8/0x2e0 [ 35.220389] kunit_try_run_case+0x170/0x3f0 [ 35.220625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.220817] kthread+0x328/0x630 [ 35.220957] ret_from_fork+0x10/0x20 [ 35.221044] [ 35.221088] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.221088] which belongs to the cache kmalloc-64 of size 64 [ 35.221246] The buggy address is located 0 bytes to the right of [ 35.221246] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.221428] [ 35.221470] The buggy address belongs to the physical page: [ 35.221583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.221642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.221692] page_type: f5(slab) [ 35.221774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.222099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.222193] page dumped because: kasan: bad access detected [ 35.222381] [ 35.222516] Memory state around the buggy address: [ 35.222589] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.222659] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.222706] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.222774] ^ [ 35.222809] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.222856] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.222976] ================================================================== [ 35.210977] ================================================================== [ 35.211029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 35.211079] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.211135] [ 35.211167] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.211618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.211663] Hardware name: linux,dummy-virt (DT) [ 35.211699] Call trace: [ 35.211724] show_stack+0x20/0x38 (C) [ 35.211789] dump_stack_lvl+0x8c/0xd0 [ 35.211838] print_report+0x118/0x5e8 [ 35.211897] kasan_report+0xdc/0x128 [ 35.211975] kasan_check_range+0x100/0x1a8 [ 35.212022] __kasan_check_write+0x20/0x30 [ 35.212069] kasan_atomics_helper+0x126c/0x4858 [ 35.212250] kasan_atomics+0x198/0x2e0 [ 35.212349] kunit_try_run_case+0x170/0x3f0 [ 35.212462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.212599] kthread+0x328/0x630 [ 35.212949] ret_from_fork+0x10/0x20 [ 35.213098] [ 35.213161] Allocated by task 296: [ 35.213204] kasan_save_stack+0x3c/0x68 [ 35.213275] kasan_save_track+0x20/0x40 [ 35.213345] kasan_save_alloc_info+0x40/0x58 [ 35.213437] __kasan_kmalloc+0xd4/0xd8 [ 35.213474] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.213529] kasan_atomics+0xb8/0x2e0 [ 35.213870] kunit_try_run_case+0x170/0x3f0 [ 35.213982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.214096] kthread+0x328/0x630 [ 35.214353] ret_from_fork+0x10/0x20 [ 35.214460] [ 35.214529] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.214529] which belongs to the cache kmalloc-64 of size 64 [ 35.214653] The buggy address is located 0 bytes to the right of [ 35.214653] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.214784] [ 35.214884] The buggy address belongs to the physical page: [ 35.214981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.215043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.215397] page_type: f5(slab) [ 35.215465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.215616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.215691] page dumped because: kasan: bad access detected [ 35.216027] [ 35.216072] Memory state around the buggy address: [ 35.216162] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.216258] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.216382] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.216450] ^ [ 35.216535] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.216627] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.216734] ================================================================== [ 35.273842] ================================================================== [ 35.273895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 35.273989] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.274043] [ 35.274099] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.274192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.274221] Hardware name: linux,dummy-virt (DT) [ 35.274275] Call trace: [ 35.274300] show_stack+0x20/0x38 (C) [ 35.274374] dump_stack_lvl+0x8c/0xd0 [ 35.274423] print_report+0x118/0x5e8 [ 35.274470] kasan_report+0xdc/0x128 [ 35.274521] __asan_report_load8_noabort+0x20/0x30 [ 35.274982] kasan_atomics_helper+0x3df4/0x4858 [ 35.275086] kasan_atomics+0x198/0x2e0 [ 35.275151] kunit_try_run_case+0x170/0x3f0 [ 35.275520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.275629] kthread+0x328/0x630 [ 35.275734] ret_from_fork+0x10/0x20 [ 35.275857] [ 35.275880] Allocated by task 296: [ 35.275937] kasan_save_stack+0x3c/0x68 [ 35.275980] kasan_save_track+0x20/0x40 [ 35.276018] kasan_save_alloc_info+0x40/0x58 [ 35.276058] __kasan_kmalloc+0xd4/0xd8 [ 35.276095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.276177] kasan_atomics+0xb8/0x2e0 [ 35.276256] kunit_try_run_case+0x170/0x3f0 [ 35.276296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.276364] kthread+0x328/0x630 [ 35.276422] ret_from_fork+0x10/0x20 [ 35.276547] [ 35.276605] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.276605] which belongs to the cache kmalloc-64 of size 64 [ 35.276733] The buggy address is located 0 bytes to the right of [ 35.276733] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.276825] [ 35.276849] The buggy address belongs to the physical page: [ 35.276888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.276944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.276994] page_type: f5(slab) [ 35.277032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.277125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.277170] page dumped because: kasan: bad access detected [ 35.277203] [ 35.277224] Memory state around the buggy address: [ 35.277404] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.277487] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.277561] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.277611] ^ [ 35.277647] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.277693] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.277742] ================================================================== [ 35.229083] ================================================================== [ 35.229159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 35.229213] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.229264] [ 35.229297] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.229384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.229413] Hardware name: linux,dummy-virt (DT) [ 35.229446] Call trace: [ 35.229471] show_stack+0x20/0x38 (C) [ 35.229561] dump_stack_lvl+0x8c/0xd0 [ 35.229721] print_report+0x118/0x5e8 [ 35.229853] kasan_report+0xdc/0x128 [ 35.229910] __asan_report_load8_noabort+0x20/0x30 [ 35.229970] kasan_atomics_helper+0x3f04/0x4858 [ 35.230023] kasan_atomics+0x198/0x2e0 [ 35.230145] kunit_try_run_case+0x170/0x3f0 [ 35.230406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.230494] kthread+0x328/0x630 [ 35.230538] ret_from_fork+0x10/0x20 [ 35.230606] [ 35.230667] Allocated by task 296: [ 35.230705] kasan_save_stack+0x3c/0x68 [ 35.230783] kasan_save_track+0x20/0x40 [ 35.230822] kasan_save_alloc_info+0x40/0x58 [ 35.230862] __kasan_kmalloc+0xd4/0xd8 [ 35.230898] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.231176] kasan_atomics+0xb8/0x2e0 [ 35.231299] kunit_try_run_case+0x170/0x3f0 [ 35.231425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.231512] kthread+0x328/0x630 [ 35.231822] ret_from_fork+0x10/0x20 [ 35.231944] [ 35.232006] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.232006] which belongs to the cache kmalloc-64 of size 64 [ 35.232154] The buggy address is located 0 bytes to the right of [ 35.232154] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.232250] [ 35.232353] The buggy address belongs to the physical page: [ 35.232405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.232461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.232530] page_type: f5(slab) [ 35.232570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.232870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.232993] page dumped because: kasan: bad access detected [ 35.233065] [ 35.233209] Memory state around the buggy address: [ 35.233419] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.233473] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.233518] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.233775] ^ [ 35.233895] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.233984] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.234171] ================================================================== [ 35.268707] ================================================================== [ 35.268812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 35.268886] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.268956] [ 35.268990] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.269080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.269140] Hardware name: linux,dummy-virt (DT) [ 35.269174] Call trace: [ 35.269199] show_stack+0x20/0x38 (C) [ 35.269248] dump_stack_lvl+0x8c/0xd0 [ 35.269294] print_report+0x118/0x5e8 [ 35.269340] kasan_report+0xdc/0x128 [ 35.269385] kasan_check_range+0x100/0x1a8 [ 35.269483] __kasan_check_write+0x20/0x30 [ 35.269536] kasan_atomics_helper+0x1644/0x4858 [ 35.269699] kasan_atomics+0x198/0x2e0 [ 35.269770] kunit_try_run_case+0x170/0x3f0 [ 35.269826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.269900] kthread+0x328/0x630 [ 35.269943] ret_from_fork+0x10/0x20 [ 35.269993] [ 35.270015] Allocated by task 296: [ 35.270046] kasan_save_stack+0x3c/0x68 [ 35.270085] kasan_save_track+0x20/0x40 [ 35.270127] kasan_save_alloc_info+0x40/0x58 [ 35.270168] __kasan_kmalloc+0xd4/0xd8 [ 35.270205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.270248] kasan_atomics+0xb8/0x2e0 [ 35.270418] kunit_try_run_case+0x170/0x3f0 [ 35.270556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.270680] kthread+0x328/0x630 [ 35.270760] ret_from_fork+0x10/0x20 [ 35.270808] [ 35.270995] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.270995] which belongs to the cache kmalloc-64 of size 64 [ 35.271193] The buggy address is located 0 bytes to the right of [ 35.271193] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.271318] [ 35.271386] The buggy address belongs to the physical page: [ 35.271426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.271483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.271738] page_type: f5(slab) [ 35.271831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.271981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.272067] page dumped because: kasan: bad access detected [ 35.272200] [ 35.272258] Memory state around the buggy address: [ 35.272354] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.272666] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.272780] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.272900] ^ [ 35.272965] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.273033] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.273170] ================================================================== [ 35.201347] ================================================================== [ 35.201400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 35.201676] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.201765] [ 35.201809] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.201898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.201937] Hardware name: linux,dummy-virt (DT) [ 35.201969] Call trace: [ 35.201995] show_stack+0x20/0x38 (C) [ 35.202121] dump_stack_lvl+0x8c/0xd0 [ 35.202178] print_report+0x118/0x5e8 [ 35.202222] kasan_report+0xdc/0x128 [ 35.202309] kasan_check_range+0x100/0x1a8 [ 35.202614] __kasan_check_write+0x20/0x30 [ 35.202679] kasan_atomics_helper+0x1190/0x4858 [ 35.202734] kasan_atomics+0x198/0x2e0 [ 35.203025] kunit_try_run_case+0x170/0x3f0 [ 35.203171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.203360] kthread+0x328/0x630 [ 35.203989] ret_from_fork+0x10/0x20 [ 35.204248] [ 35.204289] Allocated by task 296: [ 35.204322] kasan_save_stack+0x3c/0x68 [ 35.204393] kasan_save_track+0x20/0x40 [ 35.205079] kasan_save_alloc_info+0x40/0x58 [ 35.205211] __kasan_kmalloc+0xd4/0xd8 [ 35.205456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.205528] kasan_atomics+0xb8/0x2e0 [ 35.205571] kunit_try_run_case+0x170/0x3f0 [ 35.205611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.205658] kthread+0x328/0x630 [ 35.205694] ret_from_fork+0x10/0x20 [ 35.205733] [ 35.205765] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.205765] which belongs to the cache kmalloc-64 of size 64 [ 35.205830] The buggy address is located 0 bytes to the right of [ 35.205830] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.205896] [ 35.205918] The buggy address belongs to the physical page: [ 35.205958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.206015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.206064] page_type: f5(slab) [ 35.206105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.206160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.206204] page dumped because: kasan: bad access detected [ 35.206238] [ 35.206260] Memory state around the buggy address: [ 35.206295] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.206342] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.206388] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.206428] ^ [ 35.206462] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.206508] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.206549] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 34.777853] ================================================================== [ 34.777963] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 34.778051] Read of size 1 at addr fff00000c9b90d10 by task kunit_try_catch/290 [ 34.778106] [ 34.778170] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.778289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.778320] Hardware name: linux,dummy-virt (DT) [ 34.778357] Call trace: [ 34.778504] show_stack+0x20/0x38 (C) [ 34.778572] dump_stack_lvl+0x8c/0xd0 [ 34.778733] print_report+0x118/0x5e8 [ 34.778819] kasan_report+0xdc/0x128 [ 34.778865] __asan_report_load1_noabort+0x20/0x30 [ 34.779114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.781246] kasan_strings+0x24c/0xb00 [ 34.782317] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.783921] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 34.770724] ================================================================== [ 34.771205] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 34.771526] Read of size 1 at addr fff00000c9b90d10 by task kunit_try_catch/290 [ 34.771642] [ 34.771718] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.771874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.771916] Hardware name: linux,dummy-virt (DT) [ 34.771952] Call trace: [ 34.771981] show_stack+0x20/0x38 (C) [ 34.772141] dump_stack_lvl+0x8c/0xd0 [ 34.772271] print_report+0x118/0x5e8 [ 34.772326] kasan_report+0xdc/0x128 [ 34.772425] __asan_report_load1_noabort+0x20/0x30 [ 34.772521] strcmp+0xc0/0xc8 [ 34.772595] kasan_strings+0x340/0xb00 [ 34.772679] kunit_try_run_case+0x170/0x3f0 [ 34.772796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.772880] kthread+0x328/0x630 [ 34.772924] ret_from_fork+0x10/0x20 [ 34.772976] [ 34.772997] Allocated by task 290: [ 34.773055] kasan_save_stack+0x3c/0x68 [ 34.773196] kasan_save_track+0x20/0x40 [ 34.773309] kasan_save_alloc_info+0x40/0x58 [ 34.773360] __kasan_kmalloc+0xd4/0xd8 [ 34.773398] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.773684] kasan_strings+0xc8/0xb00 [ 34.773805] kunit_try_run_case+0x170/0x3f0 [ 34.773861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.773963] kthread+0x328/0x630 [ 34.774033] ret_from_fork+0x10/0x20 [ 34.774133] [ 34.774207] Freed by task 290: [ 34.774266] kasan_save_stack+0x3c/0x68 [ 34.774318] kasan_save_track+0x20/0x40 [ 34.774355] kasan_save_free_info+0x4c/0x78 [ 34.774586] __kasan_slab_free+0x6c/0x98 [ 34.774718] kfree+0x214/0x3c8 [ 34.774834] kasan_strings+0x24c/0xb00 [ 34.774937] kunit_try_run_case+0x170/0x3f0 [ 34.775083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.775140] kthread+0x328/0x630 [ 34.775213] ret_from_fork+0x10/0x20 [ 34.775300] [ 34.775336] The buggy address belongs to the object at fff00000c9b90d00 [ 34.775336] which belongs to the cache kmalloc-32 of size 32 [ 34.775434] The buggy address is located 16 bytes inside of [ 34.775434] freed 32-byte region [fff00000c9b90d00, fff00000c9b90d20) [ 34.775554] [ 34.775624] The buggy address belongs to the physical page: [ 34.775690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90 [ 34.775760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.775830] page_type: f5(slab) [ 34.775875] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.775929] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.775971] page dumped because: kasan: bad access detected [ 34.776032] [ 34.776053] Memory state around the buggy address: [ 34.776208] fff00000c9b90c00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.776259] fff00000c9b90c80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.776313] >fff00000c9b90d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.776405] ^ [ 34.776452] fff00000c9b90d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.776534] fff00000c9b90e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.776663] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 34.759882] ================================================================== [ 34.760117] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 34.760213] Read of size 1 at addr fff00000c9b90b58 by task kunit_try_catch/288 [ 34.760269] [ 34.760314] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.760422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.760489] Hardware name: linux,dummy-virt (DT) [ 34.760527] Call trace: [ 34.760555] show_stack+0x20/0x38 (C) [ 34.760611] dump_stack_lvl+0x8c/0xd0 [ 34.760808] print_report+0x118/0x5e8 [ 34.760861] kasan_report+0xdc/0x128 [ 34.760907] __asan_report_load1_noabort+0x20/0x30 [ 34.760959] memcmp+0x198/0x1d8 [ 34.761006] kasan_memcmp+0x16c/0x300 [ 34.761171] kunit_try_run_case+0x170/0x3f0 [ 34.761237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.761310] kthread+0x328/0x630 [ 34.761359] ret_from_fork+0x10/0x20 [ 34.761416] [ 34.761445] Allocated by task 288: [ 34.761482] kasan_save_stack+0x3c/0x68 [ 34.761542] kasan_save_track+0x20/0x40 [ 34.761599] kasan_save_alloc_info+0x40/0x58 [ 34.761683] __kasan_kmalloc+0xd4/0xd8 [ 34.761740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.761800] kasan_memcmp+0xbc/0x300 [ 34.761841] kunit_try_run_case+0x170/0x3f0 [ 34.761879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.761925] kthread+0x328/0x630 [ 34.761960] ret_from_fork+0x10/0x20 [ 34.762000] [ 34.762022] The buggy address belongs to the object at fff00000c9b90b40 [ 34.762022] which belongs to the cache kmalloc-32 of size 32 [ 34.762116] The buggy address is located 0 bytes to the right of [ 34.762116] allocated 24-byte region [fff00000c9b90b40, fff00000c9b90b58) [ 34.762204] [ 34.762244] The buggy address belongs to the physical page: [ 34.762289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90 [ 34.762359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.762414] page_type: f5(slab) [ 34.762459] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.762725] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.762832] page dumped because: kasan: bad access detected [ 34.762870] [ 34.762899] Memory state around the buggy address: [ 34.762935] fff00000c9b90a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.763012] fff00000c9b90a80: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 34.763077] >fff00000c9b90b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.763193] ^ [ 34.763236] fff00000c9b90b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.763279] fff00000c9b90c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.763487] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 34.744457] ================================================================== [ 34.744539] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 34.744610] Read of size 1 at addr ffff800080aa7b4a by task kunit_try_catch/284 [ 34.744663] [ 34.744702] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.744807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.744836] Hardware name: linux,dummy-virt (DT) [ 34.744881] Call trace: [ 34.744908] show_stack+0x20/0x38 (C) [ 34.744962] dump_stack_lvl+0x8c/0xd0 [ 34.745010] print_report+0x310/0x5e8 [ 34.745057] kasan_report+0xdc/0x128 [ 34.745111] __asan_report_load1_noabort+0x20/0x30 [ 34.745162] kasan_alloca_oob_right+0x2dc/0x340 [ 34.745211] kunit_try_run_case+0x170/0x3f0 [ 34.745262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.745314] kthread+0x328/0x630 [ 34.745359] ret_from_fork+0x10/0x20 [ 34.745409] [ 34.745441] The buggy address belongs to stack of task kunit_try_catch/284 [ 34.745497] [ 34.745519] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080aa0000 allocated at kernel_clone+0x150/0x7b0 [ 34.745633] The buggy address belongs to the physical page: [ 34.745671] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a09 [ 34.745729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.745814] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.745867] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.745910] page dumped because: kasan: bad access detected [ 34.746427] [ 34.746487] Memory state around the buggy address: [ 34.746545] ffff800080aa7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.746611] ffff800080aa7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.746676] >ffff800080aa7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 34.746723] ^ [ 34.746777] ffff800080aa7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 34.746871] ffff800080aa7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.746918] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 34.736778] ================================================================== [ 34.736906] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 34.736983] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/282 [ 34.737037] [ 34.737078] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.737314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.737376] Hardware name: linux,dummy-virt (DT) [ 34.737433] Call trace: [ 34.737461] show_stack+0x20/0x38 (C) [ 34.737518] dump_stack_lvl+0x8c/0xd0 [ 34.737585] print_report+0x310/0x5e8 [ 34.737651] kasan_report+0xdc/0x128 [ 34.737698] __asan_report_load1_noabort+0x20/0x30 [ 34.737783] kasan_alloca_oob_left+0x2b8/0x310 [ 34.737882] kunit_try_run_case+0x170/0x3f0 [ 34.737934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.737989] kthread+0x328/0x630 [ 34.738033] ret_from_fork+0x10/0x20 [ 34.738085] [ 34.738141] The buggy address belongs to stack of task kunit_try_catch/282 [ 34.738246] [ 34.738269] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080ac0000 allocated at kernel_clone+0x150/0x7b0 [ 34.738378] The buggy address belongs to the physical page: [ 34.738417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a37 [ 34.738476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.738682] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.738737] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.738815] page dumped because: kasan: bad access detected [ 34.738850] [ 34.738890] Memory state around the buggy address: [ 34.738926] ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.739060] ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.739152] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 34.739263] ^ [ 34.739366] ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 34.739438] ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.739557] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 34.726316] ================================================================== [ 34.726398] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 34.726660] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/280 [ 34.726761] [ 34.726853] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.727012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.727093] Hardware name: linux,dummy-virt (DT) [ 34.727152] Call trace: [ 34.727182] show_stack+0x20/0x38 (C) [ 34.727239] dump_stack_lvl+0x8c/0xd0 [ 34.727290] print_report+0x310/0x5e8 [ 34.727394] kasan_report+0xdc/0x128 [ 34.727441] __asan_report_load1_noabort+0x20/0x30 [ 34.727606] kasan_stack_oob+0x238/0x270 [ 34.727660] kunit_try_run_case+0x170/0x3f0 [ 34.727738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.727830] kthread+0x328/0x630 [ 34.727876] ret_from_fork+0x10/0x20 [ 34.727928] [ 34.728000] The buggy address belongs to stack of task kunit_try_catch/280 [ 34.728155] and is located at offset 138 in frame: [ 34.728210] kasan_stack_oob+0x0/0x270 [ 34.728379] [ 34.728431] This frame has 4 objects: [ 34.728570] [48, 49) '__assertion' [ 34.728620] [64, 72) 'array' [ 34.728676] [96, 112) '__assertion' [ 34.728729] [128, 138) 'stack_array' [ 34.728785] [ 34.728826] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080ac0000 allocated at kernel_clone+0x150/0x7b0 [ 34.729075] The buggy address belongs to the physical page: [ 34.729116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a37 [ 34.729176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.729248] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.729301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.729354] page dumped because: kasan: bad access detected [ 34.729403] [ 34.729433] Memory state around the buggy address: [ 34.729483] ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.729535] ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 34.729580] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 34.729629] ^ [ 34.729662] ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 34.729707] ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.730292] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 34.708789] ================================================================== [ 34.708868] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.708938] Read of size 1 at addr ffffa667f2f8e68d by task kunit_try_catch/276 [ 34.708994] [ 34.709057] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.709156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.709194] Hardware name: linux,dummy-virt (DT) [ 34.709231] Call trace: [ 34.709267] show_stack+0x20/0x38 (C) [ 34.709322] dump_stack_lvl+0x8c/0xd0 [ 34.709373] print_report+0x310/0x5e8 [ 34.709420] kasan_report+0xdc/0x128 [ 34.709474] __asan_report_load1_noabort+0x20/0x30 [ 34.709525] kasan_global_oob_right+0x230/0x270 [ 34.709574] kunit_try_run_case+0x170/0x3f0 [ 34.709625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.709687] kthread+0x328/0x630 [ 34.709738] ret_from_fork+0x10/0x20 [ 34.710068] [ 34.710364] The buggy address belongs to the variable: [ 34.710414] global_array+0xd/0x40 [ 34.710474] [ 34.710534] The buggy address belongs to a vmalloc virtual mapping [ 34.712563] The buggy address belongs to the physical page: [ 34.712613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d8e [ 34.712700] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.712806] raw: 03fffe0000002000 ffffc1ffc01f6388 ffffc1ffc01f6388 0000000000000000 [ 34.712859] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.713083] page dumped because: kasan: bad access detected [ 34.713167] [ 34.713207] Memory state around the buggy address: [ 34.713249] ffffa667f2f8e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.713317] ffffa667f2f8e600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 34.713396] >ffffa667f2f8e680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 34.713528] ^ [ 34.713592] ffffa667f2f8e700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 34.713687] ffffa667f2f8e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.713779] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 34.697603] ================================================================== [ 34.697681] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.697770] Free of addr fff00000c9bc8001 by task kunit_try_catch/274 [ 34.697814] [ 34.697958] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.698140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.698175] Hardware name: linux,dummy-virt (DT) [ 34.698226] Call trace: [ 34.698271] show_stack+0x20/0x38 (C) [ 34.698354] dump_stack_lvl+0x8c/0xd0 [ 34.698421] print_report+0x118/0x5e8 [ 34.698467] kasan_report_invalid_free+0xc0/0xe8 [ 34.698531] __kasan_mempool_poison_object+0xfc/0x150 [ 34.698786] mempool_free+0x3f4/0x5f0 [ 34.698902] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.698959] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 34.699080] kunit_try_run_case+0x170/0x3f0 [ 34.699128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.699195] kthread+0x328/0x630 [ 34.699238] ret_from_fork+0x10/0x20 [ 34.699287] [ 34.699309] The buggy address belongs to the physical page: [ 34.699390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc8 [ 34.699448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.699612] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.699715] page_type: f8(unknown) [ 34.699854] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.699981] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.700082] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.700215] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.700294] head: 0bfffe0000000002 ffffc1ffc326f201 00000000ffffffff 00000000ffffffff [ 34.700343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.700664] page dumped because: kasan: bad access detected [ 34.700801] [ 34.700905] Memory state around the buggy address: [ 34.700984] fff00000c9bc7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.701057] fff00000c9bc7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.701204] >fff00000c9bc8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701291] ^ [ 34.701356] fff00000c9bc8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701445] fff00000c9bc8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701534] ================================================================== [ 34.684942] ================================================================== [ 34.685028] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.685115] Free of addr fff00000c4564f01 by task kunit_try_catch/272 [ 34.685167] [ 34.685208] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.685298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.685327] Hardware name: linux,dummy-virt (DT) [ 34.685366] Call trace: [ 34.685391] show_stack+0x20/0x38 (C) [ 34.685454] dump_stack_lvl+0x8c/0xd0 [ 34.685503] print_report+0x118/0x5e8 [ 34.685547] kasan_report_invalid_free+0xc0/0xe8 [ 34.685604] check_slab_allocation+0xfc/0x108 [ 34.685654] __kasan_mempool_poison_object+0x78/0x150 [ 34.685701] mempool_free+0x3f4/0x5f0 [ 34.686593] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.686679] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.686989] kunit_try_run_case+0x170/0x3f0 [ 34.687063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.687118] kthread+0x328/0x630 [ 34.687160] ret_from_fork+0x10/0x20 [ 34.687211] [ 34.687230] Allocated by task 272: [ 34.687258] kasan_save_stack+0x3c/0x68 [ 34.687298] kasan_save_track+0x20/0x40 [ 34.687334] kasan_save_alloc_info+0x40/0x58 [ 34.687371] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.687412] remove_element+0x130/0x1f8 [ 34.687449] mempool_alloc_preallocated+0x58/0xc0 [ 34.687489] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 34.687533] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.687576] kunit_try_run_case+0x170/0x3f0 [ 34.687614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.687656] kthread+0x328/0x630 [ 34.687688] ret_from_fork+0x10/0x20 [ 34.687723] [ 34.687744] The buggy address belongs to the object at fff00000c4564f00 [ 34.687744] which belongs to the cache kmalloc-128 of size 128 [ 34.687823] The buggy address is located 1 bytes inside of [ 34.687823] 128-byte region [fff00000c4564f00, fff00000c4564f80) [ 34.687883] [ 34.687905] The buggy address belongs to the physical page: [ 34.687946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104564 [ 34.688001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.688054] page_type: f5(slab) [ 34.688095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 34.688511] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 34.688617] page dumped because: kasan: bad access detected [ 34.688677] [ 34.688699] Memory state around the buggy address: [ 34.688733] fff00000c4564e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.688793] fff00000c4564e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.688838] >fff00000c4564f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.688875] ^ [ 34.688905] fff00000c4564f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.689344] fff00000c4565000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.689499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 34.671081] ================================================================== [ 34.671190] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.671408] Free of addr fff00000c9bac000 by task kunit_try_catch/270 [ 34.671458] [ 34.671556] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.671779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.671885] Hardware name: linux,dummy-virt (DT) [ 34.671985] Call trace: [ 34.672055] show_stack+0x20/0x38 (C) [ 34.672155] dump_stack_lvl+0x8c/0xd0 [ 34.672241] print_report+0x118/0x5e8 [ 34.672457] kasan_report_invalid_free+0xc0/0xe8 [ 34.672515] __kasan_mempool_poison_pages+0xe0/0xe8 [ 34.672620] mempool_free+0x3ac/0x5f0 [ 34.672800] mempool_double_free_helper+0x150/0x2e8 [ 34.672858] mempool_page_alloc_double_free+0xbc/0x118 [ 34.672928] kunit_try_run_case+0x170/0x3f0 [ 34.672988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.673055] kthread+0x328/0x630 [ 34.673097] ret_from_fork+0x10/0x20 [ 34.673153] [ 34.673177] The buggy address belongs to the physical page: [ 34.673215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac [ 34.673273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.673352] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.673402] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.673457] page dumped because: kasan: bad access detected [ 34.673488] [ 34.673509] Memory state around the buggy address: [ 34.673544] fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.673597] fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.673656] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.673695] ^ [ 34.673739] fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.673792] fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.674140] ================================================================== [ 34.633059] ================================================================== [ 34.633202] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.633273] Free of addr fff00000c4564b00 by task kunit_try_catch/266 [ 34.633379] [ 34.633421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.633692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.633741] Hardware name: linux,dummy-virt (DT) [ 34.633901] Call trace: [ 34.633938] show_stack+0x20/0x38 (C) [ 34.633992] dump_stack_lvl+0x8c/0xd0 [ 34.634061] print_report+0x118/0x5e8 [ 34.634106] kasan_report_invalid_free+0xc0/0xe8 [ 34.634249] check_slab_allocation+0xd4/0x108 [ 34.634326] __kasan_mempool_poison_object+0x78/0x150 [ 34.634378] mempool_free+0x3f4/0x5f0 [ 34.634588] mempool_double_free_helper+0x150/0x2e8 [ 34.634689] mempool_kmalloc_double_free+0xc0/0x118 [ 34.634832] kunit_try_run_case+0x170/0x3f0 [ 34.634887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.635134] kthread+0x328/0x630 [ 34.635188] ret_from_fork+0x10/0x20 [ 34.635363] [ 34.635464] Allocated by task 266: [ 34.635525] kasan_save_stack+0x3c/0x68 [ 34.635592] kasan_save_track+0x20/0x40 [ 34.635840] kasan_save_alloc_info+0x40/0x58 [ 34.635888] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.635939] remove_element+0x130/0x1f8 [ 34.635979] mempool_alloc_preallocated+0x58/0xc0 [ 34.636047] mempool_double_free_helper+0x94/0x2e8 [ 34.636110] mempool_kmalloc_double_free+0xc0/0x118 [ 34.636283] kunit_try_run_case+0x170/0x3f0 [ 34.636467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.636559] kthread+0x328/0x630 [ 34.636601] ret_from_fork+0x10/0x20 [ 34.636639] [ 34.636708] Freed by task 266: [ 34.636738] kasan_save_stack+0x3c/0x68 [ 34.636806] kasan_save_track+0x20/0x40 [ 34.636848] kasan_save_free_info+0x4c/0x78 [ 34.636897] __kasan_mempool_poison_object+0xc0/0x150 [ 34.636944] mempool_free+0x3f4/0x5f0 [ 34.636982] mempool_double_free_helper+0x100/0x2e8 [ 34.637038] mempool_kmalloc_double_free+0xc0/0x118 [ 34.637090] kunit_try_run_case+0x170/0x3f0 [ 34.637127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.637172] kthread+0x328/0x630 [ 34.637204] ret_from_fork+0x10/0x20 [ 34.637241] [ 34.637260] The buggy address belongs to the object at fff00000c4564b00 [ 34.637260] which belongs to the cache kmalloc-128 of size 128 [ 34.637329] The buggy address is located 0 bytes inside of [ 34.637329] 128-byte region [fff00000c4564b00, fff00000c4564b80) [ 34.637390] [ 34.637412] The buggy address belongs to the physical page: [ 34.637452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104564 [ 34.637519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.637581] page_type: f5(slab) [ 34.637626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 34.637677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.637727] page dumped because: kasan: bad access detected [ 34.637805] [ 34.638225] Memory state around the buggy address: [ 34.638875] fff00000c4564a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.639240] fff00000c4564a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639419] >fff00000c4564b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.639503] ^ [ 34.639538] fff00000c4564b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.639582] fff00000c4564c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.639620] ================================================================== [ 34.652875] ================================================================== [ 34.652959] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.653030] Free of addr fff00000c9bac000 by task kunit_try_catch/268 [ 34.653075] [ 34.653117] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.653208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.653234] Hardware name: linux,dummy-virt (DT) [ 34.653338] Call trace: [ 34.653367] show_stack+0x20/0x38 (C) [ 34.653443] dump_stack_lvl+0x8c/0xd0 [ 34.653492] print_report+0x118/0x5e8 [ 34.653537] kasan_report_invalid_free+0xc0/0xe8 [ 34.653583] __kasan_mempool_poison_object+0x14c/0x150 [ 34.653643] mempool_free+0x3f4/0x5f0 [ 34.653699] mempool_double_free_helper+0x150/0x2e8 [ 34.654441] mempool_kmalloc_large_double_free+0xc0/0x118 [ 34.654761] kunit_try_run_case+0x170/0x3f0 [ 34.654981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.655360] kthread+0x328/0x630 [ 34.655426] ret_from_fork+0x10/0x20 [ 34.655524] [ 34.655610] The buggy address belongs to the physical page: [ 34.655666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac [ 34.655804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.655876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.655937] page_type: f8(unknown) [ 34.656005] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.656380] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.656506] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.656624] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.656771] head: 0bfffe0000000002 ffffc1ffc326eb01 00000000ffffffff 00000000ffffffff [ 34.656870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.656980] page dumped because: kasan: bad access detected [ 34.657026] [ 34.657045] Memory state around the buggy address: [ 34.657389] fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.657610] fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.657677] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.657836] ^ [ 34.657902] fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.657980] fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.658340] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 34.546913] ================================================================== [ 34.548328] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.548723] Read of size 1 at addr fff00000c9b74000 by task kunit_try_catch/260 [ 34.549171] [ 34.549641] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.550465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.550588] Hardware name: linux,dummy-virt (DT) [ 34.551013] Call trace: [ 34.551056] show_stack+0x20/0x38 (C) [ 34.551117] dump_stack_lvl+0x8c/0xd0 [ 34.551727] print_report+0x118/0x5e8 [ 34.551876] kasan_report+0xdc/0x128 [ 34.551923] __asan_report_load1_noabort+0x20/0x30 [ 34.553068] mempool_uaf_helper+0x314/0x340 [ 34.553139] mempool_kmalloc_large_uaf+0xc4/0x120 [ 34.553192] kunit_try_run_case+0x170/0x3f0 [ 34.554022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.554451] kthread+0x328/0x630 [ 34.554965] ret_from_fork+0x10/0x20 [ 34.555415] [ 34.555440] The buggy address belongs to the physical page: [ 34.555667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b74 [ 34.556310] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.556671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.557254] page_type: f8(unknown) [ 34.557303] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.557943] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.558466] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.558826] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.558881] head: 0bfffe0000000002 ffffc1ffc326dd01 00000000ffffffff 00000000ffffffff [ 34.558931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.559689] page dumped because: kasan: bad access detected [ 34.559765] [ 34.559785] Memory state around the buggy address: [ 34.560154] fff00000c9b73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.560206] fff00000c9b73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.560250] >fff00000c9b74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.560945] ^ [ 34.561315] fff00000c9b74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.561361] fff00000c9b74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.561401] ================================================================== [ 34.620299] ================================================================== [ 34.620380] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.620598] Read of size 1 at addr fff00000c9bac000 by task kunit_try_catch/264 [ 34.620688] [ 34.620736] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.620844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.620874] Hardware name: linux,dummy-virt (DT) [ 34.621065] Call trace: [ 34.621225] show_stack+0x20/0x38 (C) [ 34.621283] dump_stack_lvl+0x8c/0xd0 [ 34.621393] print_report+0x118/0x5e8 [ 34.621443] kasan_report+0xdc/0x128 [ 34.621503] __asan_report_load1_noabort+0x20/0x30 [ 34.621552] mempool_uaf_helper+0x314/0x340 [ 34.621600] mempool_page_alloc_uaf+0xc0/0x118 [ 34.621648] kunit_try_run_case+0x170/0x3f0 [ 34.621699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.621760] kthread+0x328/0x630 [ 34.621806] ret_from_fork+0x10/0x20 [ 34.621878] [ 34.621908] The buggy address belongs to the physical page: [ 34.621966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac [ 34.622025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.622105] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.622161] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.622203] page dumped because: kasan: bad access detected [ 34.622235] [ 34.622260] Memory state around the buggy address: [ 34.622293] fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.622347] fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.622399] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.622447] ^ [ 34.622475] fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.622525] fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.622575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 34.520484] ================================================================== [ 34.520565] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.520639] Read of size 1 at addr fff00000c9a8bd00 by task kunit_try_catch/258 [ 34.520692] [ 34.520735] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.520846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.520876] Hardware name: linux,dummy-virt (DT) [ 34.520910] Call trace: [ 34.520937] show_stack+0x20/0x38 (C) [ 34.520989] dump_stack_lvl+0x8c/0xd0 [ 34.521039] print_report+0x118/0x5e8 [ 34.521083] kasan_report+0xdc/0x128 [ 34.521125] __asan_report_load1_noabort+0x20/0x30 [ 34.521174] mempool_uaf_helper+0x314/0x340 [ 34.521221] mempool_kmalloc_uaf+0xc4/0x120 [ 34.521268] kunit_try_run_case+0x170/0x3f0 [ 34.521318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.521370] kthread+0x328/0x630 [ 34.521413] ret_from_fork+0x10/0x20 [ 34.521463] [ 34.521482] Allocated by task 258: [ 34.521510] kasan_save_stack+0x3c/0x68 [ 34.521548] kasan_save_track+0x20/0x40 [ 34.521583] kasan_save_alloc_info+0x40/0x58 [ 34.521620] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.521662] remove_element+0x130/0x1f8 [ 34.521702] mempool_alloc_preallocated+0x58/0xc0 [ 34.521742] mempool_uaf_helper+0xa4/0x340 [ 34.521790] mempool_kmalloc_uaf+0xc4/0x120 [ 34.521829] kunit_try_run_case+0x170/0x3f0 [ 34.521865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.521908] kthread+0x328/0x630 [ 34.521940] ret_from_fork+0x10/0x20 [ 34.521976] [ 34.521996] Freed by task 258: [ 34.522021] kasan_save_stack+0x3c/0x68 [ 34.522055] kasan_save_track+0x20/0x40 [ 34.522090] kasan_save_free_info+0x4c/0x78 [ 34.522133] __kasan_mempool_poison_object+0xc0/0x150 [ 34.522174] mempool_free+0x3f4/0x5f0 [ 34.522209] mempool_uaf_helper+0x104/0x340 [ 34.522247] mempool_kmalloc_uaf+0xc4/0x120 [ 34.522286] kunit_try_run_case+0x170/0x3f0 [ 34.522322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.522365] kthread+0x328/0x630 [ 34.522397] ret_from_fork+0x10/0x20 [ 34.522433] [ 34.522452] The buggy address belongs to the object at fff00000c9a8bd00 [ 34.522452] which belongs to the cache kmalloc-128 of size 128 [ 34.522512] The buggy address is located 0 bytes inside of [ 34.522512] freed 128-byte region [fff00000c9a8bd00, fff00000c9a8bd80) [ 34.522572] [ 34.522594] The buggy address belongs to the physical page: [ 34.522634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 34.522691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.522743] page_type: f5(slab) [ 34.522795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.522847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.522887] page dumped because: kasan: bad access detected [ 34.522919] [ 34.522937] Memory state around the buggy address: [ 34.523087] fff00000c9a8bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.523135] fff00000c9a8bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.523179] >fff00000c9a8bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.523218] ^ [ 34.523245] fff00000c9a8bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.523290] fff00000c9a8be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.523330] ================================================================== [ 34.585005] ================================================================== [ 34.585107] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.585186] Read of size 1 at addr fff00000c9b5e240 by task kunit_try_catch/262 [ 34.585239] [ 34.585283] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.585375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.585402] Hardware name: linux,dummy-virt (DT) [ 34.585438] Call trace: [ 34.585464] show_stack+0x20/0x38 (C) [ 34.585516] dump_stack_lvl+0x8c/0xd0 [ 34.585568] print_report+0x118/0x5e8 [ 34.585612] kasan_report+0xdc/0x128 [ 34.585655] __asan_report_load1_noabort+0x20/0x30 [ 34.585704] mempool_uaf_helper+0x314/0x340 [ 34.585766] mempool_slab_uaf+0xc0/0x118 [ 34.585812] kunit_try_run_case+0x170/0x3f0 [ 34.585862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.585914] kthread+0x328/0x630 [ 34.585957] ret_from_fork+0x10/0x20 [ 34.586007] [ 34.586026] Allocated by task 262: [ 34.586056] kasan_save_stack+0x3c/0x68 [ 34.586096] kasan_save_track+0x20/0x40 [ 34.586138] kasan_save_alloc_info+0x40/0x58 [ 34.586177] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.586220] remove_element+0x16c/0x1f8 [ 34.586259] mempool_alloc_preallocated+0x58/0xc0 [ 34.586301] mempool_uaf_helper+0xa4/0x340 [ 34.586341] mempool_slab_uaf+0xc0/0x118 [ 34.586379] kunit_try_run_case+0x170/0x3f0 [ 34.586417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.586461] kthread+0x328/0x630 [ 34.586493] ret_from_fork+0x10/0x20 [ 34.586530] [ 34.586550] Freed by task 262: [ 34.586577] kasan_save_stack+0x3c/0x68 [ 34.586613] kasan_save_track+0x20/0x40 [ 34.586647] kasan_save_free_info+0x4c/0x78 [ 34.586688] __kasan_mempool_poison_object+0xc0/0x150 [ 34.586729] mempool_free+0x3f4/0x5f0 [ 34.586773] mempool_uaf_helper+0x104/0x340 [ 34.586811] mempool_slab_uaf+0xc0/0x118 [ 34.586850] kunit_try_run_case+0x170/0x3f0 [ 34.586888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.586929] kthread+0x328/0x630 [ 34.586982] ret_from_fork+0x10/0x20 [ 34.587017] [ 34.587037] The buggy address belongs to the object at fff00000c9b5e240 [ 34.587037] which belongs to the cache test_cache of size 123 [ 34.587096] The buggy address is located 0 bytes inside of [ 34.587096] freed 123-byte region [fff00000c9b5e240, fff00000c9b5e2bb) [ 34.587157] [ 34.587180] The buggy address belongs to the physical page: [ 34.587236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b5e [ 34.587294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.587347] page_type: f5(slab) [ 34.587391] raw: 0bfffe0000000000 fff00000ffee4f00 dead000000000122 0000000000000000 [ 34.587441] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.587483] page dumped because: kasan: bad access detected [ 34.587516] [ 34.587534] Memory state around the buggy address: [ 34.587568] fff00000c9b5e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.587613] fff00000c9b5e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.587656] >fff00000c9b5e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.587694] ^ [ 34.587730] fff00000c9b5e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.587788] fff00000c9b5e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.587827] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 34.454730] ================================================================== [ 34.454942] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.455026] Read of size 1 at addr fff00000c9b6d2bb by task kunit_try_catch/256 [ 34.455077] [ 34.455117] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.455209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.455236] Hardware name: linux,dummy-virt (DT) [ 34.455270] Call trace: [ 34.455296] show_stack+0x20/0x38 (C) [ 34.455346] dump_stack_lvl+0x8c/0xd0 [ 34.455394] print_report+0x118/0x5e8 [ 34.455437] kasan_report+0xdc/0x128 [ 34.455480] __asan_report_load1_noabort+0x20/0x30 [ 34.455527] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.455631] mempool_slab_oob_right+0xc0/0x118 [ 34.455825] kunit_try_run_case+0x170/0x3f0 [ 34.455975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.456162] kthread+0x328/0x630 [ 34.456220] ret_from_fork+0x10/0x20 [ 34.456321] [ 34.456354] Allocated by task 256: [ 34.456448] kasan_save_stack+0x3c/0x68 [ 34.456534] kasan_save_track+0x20/0x40 [ 34.456569] kasan_save_alloc_info+0x40/0x58 [ 34.457031] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.457206] remove_element+0x16c/0x1f8 [ 34.457493] mempool_alloc_preallocated+0x58/0xc0 [ 34.457725] mempool_oob_right_helper+0x98/0x2f0 [ 34.458105] mempool_slab_oob_right+0xc0/0x118 [ 34.458324] kunit_try_run_case+0x170/0x3f0 [ 34.458626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.458899] kthread+0x328/0x630 [ 34.459051] ret_from_fork+0x10/0x20 [ 34.459093] [ 34.459116] The buggy address belongs to the object at fff00000c9b6d240 [ 34.459116] which belongs to the cache test_cache of size 123 [ 34.459178] The buggy address is located 0 bytes to the right of [ 34.459178] allocated 123-byte region [fff00000c9b6d240, fff00000c9b6d2bb) [ 34.459243] [ 34.459266] The buggy address belongs to the physical page: [ 34.459826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6d [ 34.459912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.459976] page_type: f5(slab) [ 34.460044] raw: 0bfffe0000000000 fff00000c58d7a00 dead000000000122 0000000000000000 [ 34.460098] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.460180] page dumped because: kasan: bad access detected [ 34.460243] [ 34.460262] Memory state around the buggy address: [ 34.460385] fff00000c9b6d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.460443] fff00000c9b6d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.460557] >fff00000c9b6d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.460601] ^ [ 34.460637] fff00000c9b6d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.460679] fff00000c9b6d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.460719] ================================================================== [ 34.417562] ================================================================== [ 34.417641] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.417716] Read of size 1 at addr fff00000c9a8b973 by task kunit_try_catch/252 [ 34.417780] [ 34.417824] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.417913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417942] Hardware name: linux,dummy-virt (DT) [ 34.417974] Call trace: [ 34.418002] show_stack+0x20/0x38 (C) [ 34.418055] dump_stack_lvl+0x8c/0xd0 [ 34.418103] print_report+0x118/0x5e8 [ 34.418152] kasan_report+0xdc/0x128 [ 34.418193] __asan_report_load1_noabort+0x20/0x30 [ 34.418242] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.418291] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.418340] kunit_try_run_case+0x170/0x3f0 [ 34.418388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.418441] kthread+0x328/0x630 [ 34.418484] ret_from_fork+0x10/0x20 [ 34.418535] [ 34.418553] Allocated by task 252: [ 34.418583] kasan_save_stack+0x3c/0x68 [ 34.418620] kasan_save_track+0x20/0x40 [ 34.418656] kasan_save_alloc_info+0x40/0x58 [ 34.418692] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.418733] remove_element+0x130/0x1f8 [ 34.418782] mempool_alloc_preallocated+0x58/0xc0 [ 34.418822] mempool_oob_right_helper+0x98/0x2f0 [ 34.418863] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.418907] kunit_try_run_case+0x170/0x3f0 [ 34.418943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.419001] kthread+0x328/0x630 [ 34.419033] ret_from_fork+0x10/0x20 [ 34.419085] [ 34.419112] The buggy address belongs to the object at fff00000c9a8b900 [ 34.419112] which belongs to the cache kmalloc-128 of size 128 [ 34.419173] The buggy address is located 0 bytes to the right of [ 34.419173] allocated 115-byte region [fff00000c9a8b900, fff00000c9a8b973) [ 34.419238] [ 34.419258] The buggy address belongs to the physical page: [ 34.419300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 34.419358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.419411] page_type: f5(slab) [ 34.419455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.419506] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.419548] page dumped because: kasan: bad access detected [ 34.419580] [ 34.419598] Memory state around the buggy address: [ 34.419632] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.419678] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.419721] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.419773] ^ [ 34.419814] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.419856] fff00000c9a8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.419895] ================================================================== [ 34.431697] ================================================================== [ 34.431787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.431855] Read of size 1 at addr fff00000c9b72001 by task kunit_try_catch/254 [ 34.431905] [ 34.431944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.432035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.432063] Hardware name: linux,dummy-virt (DT) [ 34.432096] Call trace: [ 34.432121] show_stack+0x20/0x38 (C) [ 34.432171] dump_stack_lvl+0x8c/0xd0 [ 34.432217] print_report+0x118/0x5e8 [ 34.432260] kasan_report+0xdc/0x128 [ 34.432301] __asan_report_load1_noabort+0x20/0x30 [ 34.432348] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.432398] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 34.432448] kunit_try_run_case+0x170/0x3f0 [ 34.432495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.432546] kthread+0x328/0x630 [ 34.432589] ret_from_fork+0x10/0x20 [ 34.432637] [ 34.432659] The buggy address belongs to the physical page: [ 34.432699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b70 [ 34.432767] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.432815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.432874] page_type: f8(unknown) [ 34.432916] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.433406] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.434034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.434372] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.434433] head: 0bfffe0000000002 ffffc1ffc326dc01 00000000ffffffff 00000000ffffffff [ 34.434483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.434525] page dumped because: kasan: bad access detected [ 34.435191] [ 34.435247] Memory state around the buggy address: [ 34.435474] fff00000c9b71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.435527] fff00000c9b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.435582] >fff00000c9b72000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.435717] ^ [ 34.436062] fff00000c9b72080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.436305] fff00000c9b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.436606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 33.850118] ================================================================== [ 33.850211] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 33.850291] Read of size 1 at addr fff00000c4565640 by task kunit_try_catch/246 [ 33.850344] [ 33.850390] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 33.850481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.850510] Hardware name: linux,dummy-virt (DT) [ 33.850543] Call trace: [ 33.850571] show_stack+0x20/0x38 (C) [ 33.850624] dump_stack_lvl+0x8c/0xd0 [ 33.850674] print_report+0x118/0x5e8 [ 33.850719] kasan_report+0xdc/0x128 [ 33.850774] __kasan_check_byte+0x54/0x70 [ 33.850820] kmem_cache_destroy+0x34/0x218 [ 33.850868] kmem_cache_double_destroy+0x174/0x300 [ 33.850920] kunit_try_run_case+0x170/0x3f0 [ 33.850998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.851052] kthread+0x328/0x630 [ 33.851095] ret_from_fork+0x10/0x20 [ 33.851146] [ 33.851165] Allocated by task 246: [ 33.851196] kasan_save_stack+0x3c/0x68 [ 33.851237] kasan_save_track+0x20/0x40 [ 33.851273] kasan_save_alloc_info+0x40/0x58 [ 33.851313] __kasan_slab_alloc+0xa8/0xb0 [ 33.851349] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.851392] __kmem_cache_create_args+0x178/0x280 [ 33.851433] kmem_cache_double_destroy+0xc0/0x300 [ 33.851475] kunit_try_run_case+0x170/0x3f0 [ 33.851511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.851556] kthread+0x328/0x630 [ 33.851588] ret_from_fork+0x10/0x20 [ 33.851625] [ 33.851644] Freed by task 246: [ 33.851672] kasan_save_stack+0x3c/0x68 [ 33.851706] kasan_save_track+0x20/0x40 [ 33.851742] kasan_save_free_info+0x4c/0x78 [ 33.851789] __kasan_slab_free+0x6c/0x98 [ 33.851825] kmem_cache_free+0x260/0x468 [ 33.851863] slab_kmem_cache_release+0x38/0x50 [ 33.851904] kmem_cache_release+0x1c/0x30 [ 33.851942] kobject_put+0x17c/0x420 [ 33.851983] sysfs_slab_release+0x1c/0x30 [ 33.852018] kmem_cache_destroy+0x118/0x218 [ 33.852059] kmem_cache_double_destroy+0x128/0x300 [ 33.852099] kunit_try_run_case+0x170/0x3f0 [ 33.852135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.852179] kthread+0x328/0x630 [ 33.852213] ret_from_fork+0x10/0x20 [ 33.852250] [ 33.852270] The buggy address belongs to the object at fff00000c4565640 [ 33.852270] which belongs to the cache kmem_cache of size 208 [ 33.852330] The buggy address is located 0 bytes inside of [ 33.852330] freed 208-byte region [fff00000c4565640, fff00000c4565710) [ 33.852392] [ 33.852414] The buggy address belongs to the physical page: [ 33.852457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104565 [ 33.852516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.852571] page_type: f5(slab) [ 33.852618] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 33.852670] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 33.852713] page dumped because: kasan: bad access detected [ 33.852755] [ 33.852775] Memory state around the buggy address: [ 33.852811] fff00000c4565500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.852857] fff00000c4565580: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 33.852901] >fff00000c4565600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.852941] ^ [ 33.852975] fff00000c4565680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.853018] fff00000c4565700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.853055] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 33.779417] ================================================================== [ 33.779553] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 33.779642] Read of size 1 at addr fff00000c9a96000 by task kunit_try_catch/244 [ 33.779697] [ 33.779742] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 33.779852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.779881] Hardware name: linux,dummy-virt (DT) [ 33.779917] Call trace: [ 33.779942] show_stack+0x20/0x38 (C) [ 33.779995] dump_stack_lvl+0x8c/0xd0 [ 33.780046] print_report+0x118/0x5e8 [ 33.780091] kasan_report+0xdc/0x128 [ 33.780135] __asan_report_load1_noabort+0x20/0x30 [ 33.780184] kmem_cache_rcu_uaf+0x388/0x468 [ 33.780233] kunit_try_run_case+0x170/0x3f0 [ 33.780283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.780337] kthread+0x328/0x630 [ 33.780382] ret_from_fork+0x10/0x20 [ 33.780435] [ 33.780453] Allocated by task 244: [ 33.780484] kasan_save_stack+0x3c/0x68 [ 33.780523] kasan_save_track+0x20/0x40 [ 33.780559] kasan_save_alloc_info+0x40/0x58 [ 33.780595] __kasan_slab_alloc+0xa8/0xb0 [ 33.780632] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.780675] kmem_cache_rcu_uaf+0x12c/0x468 [ 33.780715] kunit_try_run_case+0x170/0x3f0 [ 33.780760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.780803] kthread+0x328/0x630 [ 33.780835] ret_from_fork+0x10/0x20 [ 33.780872] [ 33.780890] Freed by task 0: [ 33.780919] kasan_save_stack+0x3c/0x68 [ 33.780954] kasan_save_track+0x20/0x40 [ 33.780989] kasan_save_free_info+0x4c/0x78 [ 33.781025] __kasan_slab_free+0x6c/0x98 [ 33.781062] slab_free_after_rcu_debug+0xd4/0x2f8 [ 33.781102] rcu_core+0x9f4/0x1e58 [ 33.781141] rcu_core_si+0x18/0x30 [ 33.781176] handle_softirqs+0x374/0xb28 [ 33.781214] __do_softirq+0x1c/0x28 [ 33.781248] [ 33.781267] Last potentially related work creation: [ 33.781295] kasan_save_stack+0x3c/0x68 [ 33.781330] kasan_record_aux_stack+0xb4/0xc8 [ 33.781369] kmem_cache_free+0x120/0x468 [ 33.781407] kmem_cache_rcu_uaf+0x16c/0x468 [ 33.781445] kunit_try_run_case+0x170/0x3f0 [ 33.781482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.781523] kthread+0x328/0x630 [ 33.781556] ret_from_fork+0x10/0x20 [ 33.781591] [ 33.781611] The buggy address belongs to the object at fff00000c9a96000 [ 33.781611] which belongs to the cache test_cache of size 200 [ 33.781669] The buggy address is located 0 bytes inside of [ 33.781669] freed 200-byte region [fff00000c9a96000, fff00000c9a960c8) [ 33.781732] [ 33.781764] The buggy address belongs to the physical page: [ 33.781806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a96 [ 33.781863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.781918] page_type: f5(slab) [ 33.781961] raw: 0bfffe0000000000 fff00000c58d78c0 dead000000000122 0000000000000000 [ 33.782012] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.782054] page dumped because: kasan: bad access detected [ 33.782086] [ 33.782106] Memory state around the buggy address: [ 33.782146] fff00000c9a95f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.782192] fff00000c9a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.782238] >fff00000c9a96000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.782278] ^ [ 33.782307] fff00000c9a96080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.782352] fff00000c9a96100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.782393] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.262196] ================================================================== [ 33.262281] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 33.263225] Free of addr fff00000c9a95001 by task kunit_try_catch/242 [ 33.263907] [ 33.263957] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 33.264221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.264295] Hardware name: linux,dummy-virt (DT) [ 33.264692] Call trace: [ 33.265096] show_stack+0x20/0x38 (C) [ 33.265504] dump_stack_lvl+0x8c/0xd0 [ 33.265967] print_report+0x118/0x5e8 [ 33.266733] kasan_report_invalid_free+0xc0/0xe8 [ 33.266808] check_slab_allocation+0xfc/0x108 [ 33.266855] __kasan_slab_pre_free+0x2c/0x48 [ 33.266910] kmem_cache_free+0xf0/0x468 [ 33.267120] kmem_cache_invalid_free+0x184/0x3c8 [ 33.267174] kunit_try_run_case+0x170/0x3f0 [ 33.267234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.267626] kthread+0x328/0x630 [ 33.267803] ret_from_fork+0x10/0x20 [ 33.267866] [ 33.267889] Allocated by task 242: [ 33.268087] kasan_save_stack+0x3c/0x68 [ 33.268135] kasan_save_track+0x20/0x40 [ 33.268171] kasan_save_alloc_info+0x40/0x58 [ 33.268244] __kasan_slab_alloc+0xa8/0xb0 [ 33.268514] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.268736] kmem_cache_invalid_free+0x12c/0x3c8 [ 33.268796] kunit_try_run_case+0x170/0x3f0 [ 33.269084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.269398] kthread+0x328/0x630 [ 33.269546] ret_from_fork+0x10/0x20 [ 33.269731] [ 33.269766] The buggy address belongs to the object at fff00000c9a95000 [ 33.269766] which belongs to the cache test_cache of size 200 [ 33.269828] The buggy address is located 1 bytes inside of [ 33.269828] 200-byte region [fff00000c9a95000, fff00000c9a950c8) [ 33.269890] [ 33.269913] The buggy address belongs to the physical page: [ 33.269957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 33.270248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.270524] page_type: f5(slab) [ 33.270759] raw: 0bfffe0000000000 fff00000c58d7780 dead000000000122 0000000000000000 [ 33.270867] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.271229] page dumped because: kasan: bad access detected [ 33.271366] [ 33.271386] Memory state around the buggy address: [ 33.271423] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.271898] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.272018] >fff00000c9a95000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.272059] ^ [ 33.272352] fff00000c9a95080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.272672] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.272790] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.200413] ================================================================== [ 33.200889] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.200964] Free of addr fff00000c9a94000 by task kunit_try_catch/240 [ 33.201026] [ 33.201148] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 33.201595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.201669] Hardware name: linux,dummy-virt (DT) [ 33.201734] Call trace: [ 33.201884] show_stack+0x20/0x38 (C) [ 33.202081] dump_stack_lvl+0x8c/0xd0 [ 33.202247] print_report+0x118/0x5e8 [ 33.202803] kasan_report_invalid_free+0xc0/0xe8 [ 33.203646] check_slab_allocation+0xd4/0x108 [ 33.203710] __kasan_slab_pre_free+0x2c/0x48 [ 33.203772] kmem_cache_free+0xf0/0x468 [ 33.203825] kmem_cache_double_free+0x190/0x3c8 [ 33.203896] kunit_try_run_case+0x170/0x3f0 [ 33.203948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.204001] kthread+0x328/0x630 [ 33.204047] ret_from_fork+0x10/0x20 [ 33.204921] [ 33.205255] Allocated by task 240: [ 33.205292] kasan_save_stack+0x3c/0x68 [ 33.205685] kasan_save_track+0x20/0x40 [ 33.206037] kasan_save_alloc_info+0x40/0x58 [ 33.206223] __kasan_slab_alloc+0xa8/0xb0 [ 33.206549] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.206763] kmem_cache_double_free+0x12c/0x3c8 [ 33.206812] kunit_try_run_case+0x170/0x3f0 [ 33.206848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.206891] kthread+0x328/0x630 [ 33.206923] ret_from_fork+0x10/0x20 [ 33.207004] [ 33.207024] Freed by task 240: [ 33.207054] kasan_save_stack+0x3c/0x68 [ 33.207089] kasan_save_track+0x20/0x40 [ 33.207124] kasan_save_free_info+0x4c/0x78 [ 33.207286] __kasan_slab_free+0x6c/0x98 [ 33.207505] kmem_cache_free+0x260/0x468 [ 33.207550] kmem_cache_double_free+0x140/0x3c8 [ 33.207592] kunit_try_run_case+0x170/0x3f0 [ 33.207627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.207715] kthread+0x328/0x630 [ 33.207780] ret_from_fork+0x10/0x20 [ 33.207823] [ 33.207926] The buggy address belongs to the object at fff00000c9a94000 [ 33.207926] which belongs to the cache test_cache of size 200 [ 33.208154] The buggy address is located 0 bytes inside of [ 33.208154] 200-byte region [fff00000c9a94000, fff00000c9a940c8) [ 33.208231] [ 33.208257] The buggy address belongs to the physical page: [ 33.208579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 33.208831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.209372] page_type: f5(slab) [ 33.209534] raw: 0bfffe0000000000 fff00000c58d7640 dead000000000122 0000000000000000 [ 33.209597] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.209638] page dumped because: kasan: bad access detected [ 33.209998] [ 33.210020] Memory state around the buggy address: [ 33.210059] fff00000c9a93f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.210106] fff00000c9a93f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.210493] >fff00000c9a94000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.210539] ^ [ 33.210568] fff00000c9a94080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.210819] fff00000c9a94100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.210861] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 33.012513] ================================================================== [ 33.012594] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 33.012664] Read of size 1 at addr fff00000c9a940c8 by task kunit_try_catch/238 [ 33.012713] [ 33.013289] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 33.013398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.013425] Hardware name: linux,dummy-virt (DT) [ 33.014035] Call trace: [ 33.014089] show_stack+0x20/0x38 (C) [ 33.014209] dump_stack_lvl+0x8c/0xd0 [ 33.014261] print_report+0x118/0x5e8 [ 33.014308] kasan_report+0xdc/0x128 [ 33.014352] __asan_report_load1_noabort+0x20/0x30 [ 33.014466] kmem_cache_oob+0x344/0x430 [ 33.014513] kunit_try_run_case+0x170/0x3f0 [ 33.014612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.014677] kthread+0x328/0x630 [ 33.014959] ret_from_fork+0x10/0x20 [ 33.015291] [ 33.015358] Allocated by task 238: [ 33.015494] kasan_save_stack+0x3c/0x68 [ 33.015596] kasan_save_track+0x20/0x40 [ 33.015666] kasan_save_alloc_info+0x40/0x58 [ 33.015845] __kasan_slab_alloc+0xa8/0xb0 [ 33.015889] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.015931] kmem_cache_oob+0x12c/0x430 [ 33.015983] kunit_try_run_case+0x170/0x3f0 [ 33.016023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.016448] kthread+0x328/0x630 [ 33.016583] ret_from_fork+0x10/0x20 [ 33.016671] [ 33.016836] The buggy address belongs to the object at fff00000c9a94000 [ 33.016836] which belongs to the cache test_cache of size 200 [ 33.017006] The buggy address is located 0 bytes to the right of [ 33.017006] allocated 200-byte region [fff00000c9a94000, fff00000c9a940c8) [ 33.017115] [ 33.017380] The buggy address belongs to the physical page: [ 33.017559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 33.017755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.017905] page_type: f5(slab) [ 33.018004] raw: 0bfffe0000000000 fff00000c58d7500 dead000000000122 0000000000000000 [ 33.018316] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.018485] page dumped because: kasan: bad access detected [ 33.018586] [ 33.018662] Memory state around the buggy address: [ 33.018742] fff00000c9a93f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.018896] fff00000c9a94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.019070] >fff00000c9a94080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.019136] ^ [ 33.019181] fff00000c9a94100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.019224] fff00000c9a94180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.019265] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.973089] ================================================================== [ 32.973170] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 32.973236] Read of size 8 at addr fff00000c9a90600 by task kunit_try_catch/231 [ 32.973319] [ 32.973359] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.973995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.974068] Hardware name: linux,dummy-virt (DT) [ 32.974116] Call trace: [ 32.974144] show_stack+0x20/0x38 (C) [ 32.974198] dump_stack_lvl+0x8c/0xd0 [ 32.974245] print_report+0x118/0x5e8 [ 32.974386] kasan_report+0xdc/0x128 [ 32.974454] __asan_report_load8_noabort+0x20/0x30 [ 32.974505] workqueue_uaf+0x480/0x4a8 [ 32.974636] kunit_try_run_case+0x170/0x3f0 [ 32.974714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.974836] kthread+0x328/0x630 [ 32.974898] ret_from_fork+0x10/0x20 [ 32.975304] [ 32.975343] Allocated by task 231: [ 32.975383] kasan_save_stack+0x3c/0x68 [ 32.975510] kasan_save_track+0x20/0x40 [ 32.975597] kasan_save_alloc_info+0x40/0x58 [ 32.975720] __kasan_kmalloc+0xd4/0xd8 [ 32.975828] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.975907] workqueue_uaf+0x13c/0x4a8 [ 32.975946] kunit_try_run_case+0x170/0x3f0 [ 32.975985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.976327] kthread+0x328/0x630 [ 32.976468] ret_from_fork+0x10/0x20 [ 32.976567] [ 32.976679] Freed by task 75: [ 32.976803] kasan_save_stack+0x3c/0x68 [ 32.976855] kasan_save_track+0x20/0x40 [ 32.976941] kasan_save_free_info+0x4c/0x78 [ 32.976981] __kasan_slab_free+0x6c/0x98 [ 32.977016] kfree+0x214/0x3c8 [ 32.977053] workqueue_uaf_work+0x18/0x30 [ 32.977090] process_one_work+0x530/0xf88 [ 32.977156] worker_thread+0x618/0xf38 [ 32.977192] kthread+0x328/0x630 [ 32.977227] ret_from_fork+0x10/0x20 [ 32.977271] [ 32.977292] Last potentially related work creation: [ 32.977318] kasan_save_stack+0x3c/0x68 [ 32.977365] kasan_record_aux_stack+0xb4/0xc8 [ 32.977411] __queue_work+0x65c/0xfe0 [ 32.977448] queue_work_on+0xbc/0xf8 [ 32.977482] workqueue_uaf+0x210/0x4a8 [ 32.977520] kunit_try_run_case+0x170/0x3f0 [ 32.977567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.977612] kthread+0x328/0x630 [ 32.977654] ret_from_fork+0x10/0x20 [ 32.977691] [ 32.977713] The buggy address belongs to the object at fff00000c9a90600 [ 32.977713] which belongs to the cache kmalloc-32 of size 32 [ 32.977784] The buggy address is located 0 bytes inside of [ 32.977784] freed 32-byte region [fff00000c9a90600, fff00000c9a90620) [ 32.977856] [ 32.977890] The buggy address belongs to the physical page: [ 32.977937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90 [ 32.978003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.978058] page_type: f5(slab) [ 32.978115] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.978167] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.978210] page dumped because: kasan: bad access detected [ 32.978243] [ 32.978275] Memory state around the buggy address: [ 32.978309] fff00000c9a90500: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.978369] fff00000c9a90580: 00 00 00 07 fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.978422] >fff00000c9a90600: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.978462] ^ [ 32.978491] fff00000c9a90680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.978534] fff00000c9a90700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.978584] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.957394] ================================================================== [ 32.957535] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.957606] Read of size 4 at addr fff00000c9a90400 by task swapper/0/0 [ 32.957655] [ 32.957701] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.957859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.957899] Hardware name: linux,dummy-virt (DT) [ 32.957935] Call trace: [ 32.957959] show_stack+0x20/0x38 (C) [ 32.958010] dump_stack_lvl+0x8c/0xd0 [ 32.958055] print_report+0x118/0x5e8 [ 32.958098] kasan_report+0xdc/0x128 [ 32.958153] __asan_report_load4_noabort+0x20/0x30 [ 32.958202] rcu_uaf_reclaim+0x64/0x70 [ 32.958255] rcu_core+0x9f4/0x1e58 [ 32.958307] rcu_core_si+0x18/0x30 [ 32.958351] handle_softirqs+0x374/0xb28 [ 32.958398] __do_softirq+0x1c/0x28 [ 32.958444] ____do_softirq+0x18/0x30 [ 32.958496] call_on_irq_stack+0x30/0x48 [ 32.958542] do_softirq_own_stack+0x24/0x38 [ 32.958587] __irq_exit_rcu+0x1fc/0x318 [ 32.958639] irq_exit_rcu+0x1c/0x80 [ 32.958695] el1_interrupt+0x38/0x58 [ 32.958742] el1h_64_irq_handler+0x18/0x28 [ 32.958800] el1h_64_irq+0x6c/0x70 [ 32.958897] arch_local_irq_enable+0x4/0x8 (P) [ 32.958951] do_idle+0x384/0x4e8 [ 32.958995] cpu_startup_entry+0x68/0x80 [ 32.959041] rest_init+0x160/0x188 [ 32.959086] start_kernel+0x30c/0x3d0 [ 32.959136] __primary_switched+0x8c/0xa0 [ 32.959199] [ 32.959220] Allocated by task 229: [ 32.959249] kasan_save_stack+0x3c/0x68 [ 32.959289] kasan_save_track+0x20/0x40 [ 32.959334] kasan_save_alloc_info+0x40/0x58 [ 32.959374] __kasan_kmalloc+0xd4/0xd8 [ 32.959410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.959451] rcu_uaf+0xb0/0x2d8 [ 32.959486] kunit_try_run_case+0x170/0x3f0 [ 32.959535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.959587] kthread+0x328/0x630 [ 32.959623] ret_from_fork+0x10/0x20 [ 32.959658] [ 32.959687] Freed by task 0: [ 32.959720] kasan_save_stack+0x3c/0x68 [ 32.960666] kasan_save_track+0x20/0x40 [ 32.960818] kasan_save_free_info+0x4c/0x78 [ 32.960882] __kasan_slab_free+0x6c/0x98 [ 32.960919] kfree+0x214/0x3c8 [ 32.961027] rcu_uaf_reclaim+0x28/0x70 [ 32.961151] rcu_core+0x9f4/0x1e58 [ 32.961251] rcu_core_si+0x18/0x30 [ 32.961297] handle_softirqs+0x374/0xb28 [ 32.961360] __do_softirq+0x1c/0x28 [ 32.961439] [ 32.961481] Last potentially related work creation: [ 32.961569] kasan_save_stack+0x3c/0x68 [ 32.961708] kasan_record_aux_stack+0xb4/0xc8 [ 32.961778] __call_rcu_common.constprop.0+0x74/0x8c8 [ 32.961820] call_rcu+0x18/0x30 [ 32.961854] rcu_uaf+0x14c/0x2d8 [ 32.961888] kunit_try_run_case+0x170/0x3f0 [ 32.961925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.961968] kthread+0x328/0x630 [ 32.962000] ret_from_fork+0x10/0x20 [ 32.962041] [ 32.962068] The buggy address belongs to the object at fff00000c9a90400 [ 32.962068] which belongs to the cache kmalloc-32 of size 32 [ 32.962133] The buggy address is located 0 bytes inside of [ 32.962133] freed 32-byte region [fff00000c9a90400, fff00000c9a90420) [ 32.962194] [ 32.962215] The buggy address belongs to the physical page: [ 32.962279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90 [ 32.962336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.962389] page_type: f5(slab) [ 32.962432] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.962559] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.962708] page dumped because: kasan: bad access detected [ 32.962761] [ 32.962779] Memory state around the buggy address: [ 32.963140] fff00000c9a90300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.963195] fff00000c9a90380: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.963363] >fff00000c9a90400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.963476] ^ [ 32.963526] fff00000c9a90480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.963626] fff00000c9a90500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.963715] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.793125] ================================================================== [ 32.793184] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.793238] Read of size 1 at addr fff00000c9a8b600 by task kunit_try_catch/227 [ 32.793680] [ 32.793726] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.793831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.793860] Hardware name: linux,dummy-virt (DT) [ 32.794242] Call trace: [ 32.794292] show_stack+0x20/0x38 (C) [ 32.794391] dump_stack_lvl+0x8c/0xd0 [ 32.794439] print_report+0x118/0x5e8 [ 32.794494] kasan_report+0xdc/0x128 [ 32.794537] __asan_report_load1_noabort+0x20/0x30 [ 32.794586] ksize_uaf+0x598/0x5f8 [ 32.794629] kunit_try_run_case+0x170/0x3f0 [ 32.794683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.794737] kthread+0x328/0x630 [ 32.794788] ret_from_fork+0x10/0x20 [ 32.794836] [ 32.794855] Allocated by task 227: [ 32.794892] kasan_save_stack+0x3c/0x68 [ 32.794931] kasan_save_track+0x20/0x40 [ 32.795392] kasan_save_alloc_info+0x40/0x58 [ 32.795567] __kasan_kmalloc+0xd4/0xd8 [ 32.795638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.795819] ksize_uaf+0xb8/0x5f8 [ 32.795898] kunit_try_run_case+0x170/0x3f0 [ 32.796054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.796129] kthread+0x328/0x630 [ 32.796349] ret_from_fork+0x10/0x20 [ 32.796972] [ 32.797271] Freed by task 227: [ 32.797350] kasan_save_stack+0x3c/0x68 [ 32.797421] kasan_save_track+0x20/0x40 [ 32.797488] kasan_save_free_info+0x4c/0x78 [ 32.797849] __kasan_slab_free+0x6c/0x98 [ 32.798314] kfree+0x214/0x3c8 [ 32.798398] ksize_uaf+0x11c/0x5f8 [ 32.798666] kunit_try_run_case+0x170/0x3f0 [ 32.798730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.799138] kthread+0x328/0x630 [ 32.799191] ret_from_fork+0x10/0x20 [ 32.799229] [ 32.799250] The buggy address belongs to the object at fff00000c9a8b600 [ 32.799250] which belongs to the cache kmalloc-128 of size 128 [ 32.799860] The buggy address is located 0 bytes inside of [ 32.799860] freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680) [ 32.799998] [ 32.800093] The buggy address belongs to the physical page: [ 32.800179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.800305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.800382] page_type: f5(slab) [ 32.800473] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.800563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.800865] page dumped because: kasan: bad access detected [ 32.801050] [ 32.801123] Memory state around the buggy address: [ 32.801535] fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.801694] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.801829] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.801871] ^ [ 32.801919] fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802135] fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802181] ================================================================== [ 32.805233] ================================================================== [ 32.805638] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.805765] Read of size 1 at addr fff00000c9a8b678 by task kunit_try_catch/227 [ 32.805839] [ 32.805896] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.805993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.806021] Hardware name: linux,dummy-virt (DT) [ 32.806340] Call trace: [ 32.806384] show_stack+0x20/0x38 (C) [ 32.806435] dump_stack_lvl+0x8c/0xd0 [ 32.806482] print_report+0x118/0x5e8 [ 32.806776] kasan_report+0xdc/0x128 [ 32.807143] __asan_report_load1_noabort+0x20/0x30 [ 32.807275] ksize_uaf+0x544/0x5f8 [ 32.807380] kunit_try_run_case+0x170/0x3f0 [ 32.808040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.808142] kthread+0x328/0x630 [ 32.808283] ret_from_fork+0x10/0x20 [ 32.808400] [ 32.808458] Allocated by task 227: [ 32.808488] kasan_save_stack+0x3c/0x68 [ 32.808566] kasan_save_track+0x20/0x40 [ 32.808894] kasan_save_alloc_info+0x40/0x58 [ 32.809039] __kasan_kmalloc+0xd4/0xd8 [ 32.809128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.809279] ksize_uaf+0xb8/0x5f8 [ 32.809377] kunit_try_run_case+0x170/0x3f0 [ 32.809635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.809793] kthread+0x328/0x630 [ 32.810053] ret_from_fork+0x10/0x20 [ 32.810154] [ 32.810209] Freed by task 227: [ 32.810294] kasan_save_stack+0x3c/0x68 [ 32.810344] kasan_save_track+0x20/0x40 [ 32.810418] kasan_save_free_info+0x4c/0x78 [ 32.810457] __kasan_slab_free+0x6c/0x98 [ 32.810869] kfree+0x214/0x3c8 [ 32.810992] ksize_uaf+0x11c/0x5f8 [ 32.811126] kunit_try_run_case+0x170/0x3f0 [ 32.811261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.811360] kthread+0x328/0x630 [ 32.811602] ret_from_fork+0x10/0x20 [ 32.811795] [ 32.811882] The buggy address belongs to the object at fff00000c9a8b600 [ 32.811882] which belongs to the cache kmalloc-128 of size 128 [ 32.811957] The buggy address is located 120 bytes inside of [ 32.811957] freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680) [ 32.812190] [ 32.812786] The buggy address belongs to the physical page: [ 32.812830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.812887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.812935] page_type: f5(slab) [ 32.812973] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.813026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.813067] page dumped because: kasan: bad access detected [ 32.813099] [ 32.813118] Memory state around the buggy address: [ 32.813150] fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.813196] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.813237] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.813275] ^ [ 32.813316] fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.813357] fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.813396] ================================================================== [ 32.781213] ================================================================== [ 32.781338] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 32.781446] Read of size 1 at addr fff00000c9a8b600 by task kunit_try_catch/227 [ 32.781767] [ 32.781814] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.781912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.781940] Hardware name: linux,dummy-virt (DT) [ 32.782096] Call trace: [ 32.782136] show_stack+0x20/0x38 (C) [ 32.782190] dump_stack_lvl+0x8c/0xd0 [ 32.782235] print_report+0x118/0x5e8 [ 32.782413] kasan_report+0xdc/0x128 [ 32.782759] __kasan_check_byte+0x54/0x70 [ 32.782831] ksize+0x30/0x88 [ 32.782875] ksize_uaf+0x168/0x5f8 [ 32.783228] kunit_try_run_case+0x170/0x3f0 [ 32.783317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.783450] kthread+0x328/0x630 [ 32.783546] ret_from_fork+0x10/0x20 [ 32.783663] [ 32.783714] Allocated by task 227: [ 32.783815] kasan_save_stack+0x3c/0x68 [ 32.783856] kasan_save_track+0x20/0x40 [ 32.783919] kasan_save_alloc_info+0x40/0x58 [ 32.783963] __kasan_kmalloc+0xd4/0xd8 [ 32.784386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.784528] ksize_uaf+0xb8/0x5f8 [ 32.784645] kunit_try_run_case+0x170/0x3f0 [ 32.784803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.784901] kthread+0x328/0x630 [ 32.784951] ret_from_fork+0x10/0x20 [ 32.784989] [ 32.785264] Freed by task 227: [ 32.785420] kasan_save_stack+0x3c/0x68 [ 32.785561] kasan_save_track+0x20/0x40 [ 32.785626] kasan_save_free_info+0x4c/0x78 [ 32.785781] __kasan_slab_free+0x6c/0x98 [ 32.785881] kfree+0x214/0x3c8 [ 32.786155] ksize_uaf+0x11c/0x5f8 [ 32.786328] kunit_try_run_case+0x170/0x3f0 [ 32.786390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.786565] kthread+0x328/0x630 [ 32.786642] ret_from_fork+0x10/0x20 [ 32.786793] [ 32.786873] The buggy address belongs to the object at fff00000c9a8b600 [ 32.786873] which belongs to the cache kmalloc-128 of size 128 [ 32.787084] The buggy address is located 0 bytes inside of [ 32.787084] freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680) [ 32.787155] [ 32.787178] The buggy address belongs to the physical page: [ 32.787459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.787531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.787659] page_type: f5(slab) [ 32.787725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.787849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.787938] page dumped because: kasan: bad access detected [ 32.788061] [ 32.788094] Memory state around the buggy address: [ 32.788154] fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.788370] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788621] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.788720] ^ [ 32.788820] fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788908] fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 32.745403] ================================================================== [ 32.745501] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 32.745575] Read of size 1 at addr fff00000c9a8b573 by task kunit_try_catch/225 [ 32.745628] [ 32.745666] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.745768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.745805] Hardware name: linux,dummy-virt (DT) [ 32.745840] Call trace: [ 32.745866] show_stack+0x20/0x38 (C) [ 32.745918] dump_stack_lvl+0x8c/0xd0 [ 32.745965] print_report+0x118/0x5e8 [ 32.746008] kasan_report+0xdc/0x128 [ 32.746049] __asan_report_load1_noabort+0x20/0x30 [ 32.746097] ksize_unpoisons_memory+0x628/0x740 [ 32.746157] kunit_try_run_case+0x170/0x3f0 [ 32.746205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.746266] kthread+0x328/0x630 [ 32.746308] ret_from_fork+0x10/0x20 [ 32.746364] [ 32.746383] Allocated by task 225: [ 32.746420] kasan_save_stack+0x3c/0x68 [ 32.746457] kasan_save_track+0x20/0x40 [ 32.746491] kasan_save_alloc_info+0x40/0x58 [ 32.746527] __kasan_kmalloc+0xd4/0xd8 [ 32.746570] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.746614] ksize_unpoisons_memory+0xc0/0x740 [ 32.746651] kunit_try_run_case+0x170/0x3f0 [ 32.746696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.746744] kthread+0x328/0x630 [ 32.746787] ret_from_fork+0x10/0x20 [ 32.746822] [ 32.746840] The buggy address belongs to the object at fff00000c9a8b500 [ 32.746840] which belongs to the cache kmalloc-128 of size 128 [ 32.747873] The buggy address is located 0 bytes to the right of [ 32.747873] allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573) [ 32.747972] [ 32.748003] The buggy address belongs to the physical page: [ 32.748069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.748647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.748763] page_type: f5(slab) [ 32.748933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.749014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.749234] page dumped because: kasan: bad access detected [ 32.749646] [ 32.749885] Memory state around the buggy address: [ 32.749974] fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.750298] fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.750455] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.750547] ^ [ 32.750709] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.750814] fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.750937] ================================================================== [ 32.764089] ================================================================== [ 32.764143] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 32.764421] Read of size 1 at addr fff00000c9a8b57f by task kunit_try_catch/225 [ 32.764696] [ 32.764760] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.764851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.764879] Hardware name: linux,dummy-virt (DT) [ 32.764916] Call trace: [ 32.765114] show_stack+0x20/0x38 (C) [ 32.765405] dump_stack_lvl+0x8c/0xd0 [ 32.765479] print_report+0x118/0x5e8 [ 32.765555] kasan_report+0xdc/0x128 [ 32.765599] __asan_report_load1_noabort+0x20/0x30 [ 32.765823] ksize_unpoisons_memory+0x690/0x740 [ 32.765878] kunit_try_run_case+0x170/0x3f0 [ 32.766021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.766257] kthread+0x328/0x630 [ 32.766333] ret_from_fork+0x10/0x20 [ 32.766399] [ 32.766480] Allocated by task 225: [ 32.766509] kasan_save_stack+0x3c/0x68 [ 32.766549] kasan_save_track+0x20/0x40 [ 32.766583] kasan_save_alloc_info+0x40/0x58 [ 32.766636] __kasan_kmalloc+0xd4/0xd8 [ 32.766672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.766940] ksize_unpoisons_memory+0xc0/0x740 [ 32.767280] kunit_try_run_case+0x170/0x3f0 [ 32.767338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.767421] kthread+0x328/0x630 [ 32.767457] ret_from_fork+0x10/0x20 [ 32.767494] [ 32.767514] The buggy address belongs to the object at fff00000c9a8b500 [ 32.767514] which belongs to the cache kmalloc-128 of size 128 [ 32.767575] The buggy address is located 12 bytes to the right of [ 32.767575] allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573) [ 32.767916] [ 32.768052] The buggy address belongs to the physical page: [ 32.768094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.768426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.768487] page_type: f5(slab) [ 32.768528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.768579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.768621] page dumped because: kasan: bad access detected [ 32.769219] [ 32.769247] Memory state around the buggy address: [ 32.769282] fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.769329] fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.769382] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.769419] ^ [ 32.769462] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.769505] fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.769553] ================================================================== [ 32.754701] ================================================================== [ 32.754981] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 32.755132] Read of size 1 at addr fff00000c9a8b578 by task kunit_try_catch/225 [ 32.755368] [ 32.755429] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.755843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.755918] Hardware name: linux,dummy-virt (DT) [ 32.756037] Call trace: [ 32.756134] show_stack+0x20/0x38 (C) [ 32.756227] dump_stack_lvl+0x8c/0xd0 [ 32.756383] print_report+0x118/0x5e8 [ 32.756480] kasan_report+0xdc/0x128 [ 32.756822] __asan_report_load1_noabort+0x20/0x30 [ 32.757010] ksize_unpoisons_memory+0x618/0x740 [ 32.757149] kunit_try_run_case+0x170/0x3f0 [ 32.757289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.757524] kthread+0x328/0x630 [ 32.757735] ret_from_fork+0x10/0x20 [ 32.757946] [ 32.758003] Allocated by task 225: [ 32.758134] kasan_save_stack+0x3c/0x68 [ 32.758224] kasan_save_track+0x20/0x40 [ 32.758784] kasan_save_alloc_info+0x40/0x58 [ 32.758868] __kasan_kmalloc+0xd4/0xd8 [ 32.759021] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.759132] ksize_unpoisons_memory+0xc0/0x740 [ 32.759265] kunit_try_run_case+0x170/0x3f0 [ 32.759364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.759567] kthread+0x328/0x630 [ 32.759838] ret_from_fork+0x10/0x20 [ 32.759900] [ 32.759976] The buggy address belongs to the object at fff00000c9a8b500 [ 32.759976] which belongs to the cache kmalloc-128 of size 128 [ 32.760111] The buggy address is located 5 bytes to the right of [ 32.760111] allocated 115-byte region [fff00000c9a8b500, fff00000c9a8b573) [ 32.760290] [ 32.760315] The buggy address belongs to the physical page: [ 32.760519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.760938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.761109] page_type: f5(slab) [ 32.761192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.761451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.761699] page dumped because: kasan: bad access detected [ 32.761798] [ 32.761934] Memory state around the buggy address: [ 32.762023] fff00000c9a8b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.762074] fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.762312] >fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.762560] ^ [ 32.762714] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.762861] fff00000c9a8b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.762928] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 32.722788] ================================================================== [ 32.722883] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 32.723115] Free of addr fff00000c8683500 by task kunit_try_catch/223 [ 32.723236] [ 32.723399] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.723569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.723659] Hardware name: linux,dummy-virt (DT) [ 32.723716] Call trace: [ 32.723828] show_stack+0x20/0x38 (C) [ 32.723882] dump_stack_lvl+0x8c/0xd0 [ 32.723929] print_report+0x118/0x5e8 [ 32.723981] kasan_report_invalid_free+0xc0/0xe8 [ 32.724513] check_slab_allocation+0xd4/0x108 [ 32.724610] __kasan_slab_pre_free+0x2c/0x48 [ 32.724783] kfree+0xe8/0x3c8 [ 32.724898] kfree_sensitive+0x3c/0xb0 [ 32.725112] kmalloc_double_kzfree+0x168/0x308 [ 32.725439] kunit_try_run_case+0x170/0x3f0 [ 32.725537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.725679] kthread+0x328/0x630 [ 32.725797] ret_from_fork+0x10/0x20 [ 32.726239] [ 32.726284] Allocated by task 223: [ 32.726394] kasan_save_stack+0x3c/0x68 [ 32.726485] kasan_save_track+0x20/0x40 [ 32.726785] kasan_save_alloc_info+0x40/0x58 [ 32.727017] __kasan_kmalloc+0xd4/0xd8 [ 32.727196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.727266] kmalloc_double_kzfree+0xb8/0x308 [ 32.727419] kunit_try_run_case+0x170/0x3f0 [ 32.727495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.727687] kthread+0x328/0x630 [ 32.727736] ret_from_fork+0x10/0x20 [ 32.727787] [ 32.727807] Freed by task 223: [ 32.728192] kasan_save_stack+0x3c/0x68 [ 32.728319] kasan_save_track+0x20/0x40 [ 32.728397] kasan_save_free_info+0x4c/0x78 [ 32.728532] __kasan_slab_free+0x6c/0x98 [ 32.728567] kfree+0x214/0x3c8 [ 32.728603] kfree_sensitive+0x80/0xb0 [ 32.728648] kmalloc_double_kzfree+0x11c/0x308 [ 32.728688] kunit_try_run_case+0x170/0x3f0 [ 32.728726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.728779] kthread+0x328/0x630 [ 32.728811] ret_from_fork+0x10/0x20 [ 32.728847] [ 32.728918] The buggy address belongs to the object at fff00000c8683500 [ 32.728918] which belongs to the cache kmalloc-16 of size 16 [ 32.729015] The buggy address is located 0 bytes inside of [ 32.729015] 16-byte region [fff00000c8683500, fff00000c8683510) [ 32.729077] [ 32.729098] The buggy address belongs to the physical page: [ 32.729143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683 [ 32.729208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.729259] page_type: f5(slab) [ 32.729298] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.729360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.729402] page dumped because: kasan: bad access detected [ 32.729433] [ 32.729463] Memory state around the buggy address: [ 32.729496] fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.729541] fff00000c8683480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.729585] >fff00000c8683500: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.729634] ^ [ 32.729668] fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.729711] fff00000c8683600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.729762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 32.713735] ================================================================== [ 32.713849] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 32.714081] Read of size 1 at addr fff00000c8683500 by task kunit_try_catch/223 [ 32.714272] [ 32.714432] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.714614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.714651] Hardware name: linux,dummy-virt (DT) [ 32.714685] Call trace: [ 32.714712] show_stack+0x20/0x38 (C) [ 32.714774] dump_stack_lvl+0x8c/0xd0 [ 32.715069] print_report+0x118/0x5e8 [ 32.715265] kasan_report+0xdc/0x128 [ 32.715346] __kasan_check_byte+0x54/0x70 [ 32.715516] kfree_sensitive+0x30/0xb0 [ 32.715586] kmalloc_double_kzfree+0x168/0x308 [ 32.715784] kunit_try_run_case+0x170/0x3f0 [ 32.716016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.716135] kthread+0x328/0x630 [ 32.716194] ret_from_fork+0x10/0x20 [ 32.716307] [ 32.716532] Allocated by task 223: [ 32.716696] kasan_save_stack+0x3c/0x68 [ 32.716848] kasan_save_track+0x20/0x40 [ 32.716890] kasan_save_alloc_info+0x40/0x58 [ 32.716938] __kasan_kmalloc+0xd4/0xd8 [ 32.716979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.717032] kmalloc_double_kzfree+0xb8/0x308 [ 32.717072] kunit_try_run_case+0x170/0x3f0 [ 32.717121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.717165] kthread+0x328/0x630 [ 32.717205] ret_from_fork+0x10/0x20 [ 32.717253] [ 32.717281] Freed by task 223: [ 32.717317] kasan_save_stack+0x3c/0x68 [ 32.717353] kasan_save_track+0x20/0x40 [ 32.717395] kasan_save_free_info+0x4c/0x78 [ 32.717433] __kasan_slab_free+0x6c/0x98 [ 32.717471] kfree+0x214/0x3c8 [ 32.717509] kfree_sensitive+0x80/0xb0 [ 32.717547] kmalloc_double_kzfree+0x11c/0x308 [ 32.717588] kunit_try_run_case+0x170/0x3f0 [ 32.717625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.717668] kthread+0x328/0x630 [ 32.717700] ret_from_fork+0x10/0x20 [ 32.717736] [ 32.718220] The buggy address belongs to the object at fff00000c8683500 [ 32.718220] which belongs to the cache kmalloc-16 of size 16 [ 32.718690] The buggy address is located 0 bytes inside of [ 32.718690] freed 16-byte region [fff00000c8683500, fff00000c8683510) [ 32.719010] [ 32.719070] The buggy address belongs to the physical page: [ 32.719197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683 [ 32.719257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.719464] page_type: f5(slab) [ 32.719684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.719793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.719938] page dumped because: kasan: bad access detected [ 32.720009] [ 32.720125] Memory state around the buggy address: [ 32.720202] fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.720307] fff00000c8683480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.720352] >fff00000c8683500: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.720794] ^ [ 32.720908] fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.721027] fff00000c8683600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.721107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 32.678365] ================================================================== [ 32.678837] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 32.678919] Read of size 1 at addr fff00000c9a87e28 by task kunit_try_catch/219 [ 32.679077] [ 32.679164] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.679323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.679356] Hardware name: linux,dummy-virt (DT) [ 32.679410] Call trace: [ 32.679439] show_stack+0x20/0x38 (C) [ 32.679790] dump_stack_lvl+0x8c/0xd0 [ 32.679975] print_report+0x118/0x5e8 [ 32.680065] kasan_report+0xdc/0x128 [ 32.680213] __asan_report_load1_noabort+0x20/0x30 [ 32.680293] kmalloc_uaf2+0x3f4/0x468 [ 32.680409] kunit_try_run_case+0x170/0x3f0 [ 32.680607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.680942] kthread+0x328/0x630 [ 32.681100] ret_from_fork+0x10/0x20 [ 32.681254] [ 32.681314] Allocated by task 219: [ 32.681386] kasan_save_stack+0x3c/0x68 [ 32.681638] kasan_save_track+0x20/0x40 [ 32.681830] kasan_save_alloc_info+0x40/0x58 [ 32.681993] __kasan_kmalloc+0xd4/0xd8 [ 32.682071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.682218] kmalloc_uaf2+0xc4/0x468 [ 32.682374] kunit_try_run_case+0x170/0x3f0 [ 32.682416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.682495] kthread+0x328/0x630 [ 32.683021] ret_from_fork+0x10/0x20 [ 32.683104] [ 32.683164] Freed by task 219: [ 32.683211] kasan_save_stack+0x3c/0x68 [ 32.683363] kasan_save_track+0x20/0x40 [ 32.683408] kasan_save_free_info+0x4c/0x78 [ 32.683446] __kasan_slab_free+0x6c/0x98 [ 32.683491] kfree+0x214/0x3c8 [ 32.683526] kmalloc_uaf2+0x134/0x468 [ 32.683693] kunit_try_run_case+0x170/0x3f0 [ 32.683760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.683973] kthread+0x328/0x630 [ 32.684031] ret_from_fork+0x10/0x20 [ 32.684067] [ 32.684088] The buggy address belongs to the object at fff00000c9a87e00 [ 32.684088] which belongs to the cache kmalloc-64 of size 64 [ 32.684150] The buggy address is located 40 bytes inside of [ 32.684150] freed 64-byte region [fff00000c9a87e00, fff00000c9a87e40) [ 32.684213] [ 32.684235] The buggy address belongs to the physical page: [ 32.684273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87 [ 32.684336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.684394] page_type: f5(slab) [ 32.684449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.684511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.684553] page dumped because: kasan: bad access detected [ 32.684585] [ 32.684603] Memory state around the buggy address: [ 32.684649] fff00000c9a87d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.684695] fff00000c9a87d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.684796] >fff00000c9a87e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.685447] ^ [ 32.685517] fff00000c9a87e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 32.685573] fff00000c9a87f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.685629] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 32.659098] ================================================================== [ 32.659377] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 32.659513] Write of size 33 at addr fff00000c9a87c80 by task kunit_try_catch/217 [ 32.659595] [ 32.659822] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.660069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.660107] Hardware name: linux,dummy-virt (DT) [ 32.660472] Call trace: [ 32.660629] show_stack+0x20/0x38 (C) [ 32.660727] dump_stack_lvl+0x8c/0xd0 [ 32.661137] print_report+0x118/0x5e8 [ 32.661242] kasan_report+0xdc/0x128 [ 32.661328] kasan_check_range+0x100/0x1a8 [ 32.661521] __asan_memset+0x34/0x78 [ 32.661801] kmalloc_uaf_memset+0x170/0x310 [ 32.661859] kunit_try_run_case+0x170/0x3f0 [ 32.662260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.662392] kthread+0x328/0x630 [ 32.662450] ret_from_fork+0x10/0x20 [ 32.662742] [ 32.662927] Allocated by task 217: [ 32.663006] kasan_save_stack+0x3c/0x68 [ 32.663124] kasan_save_track+0x20/0x40 [ 32.663166] kasan_save_alloc_info+0x40/0x58 [ 32.663203] __kasan_kmalloc+0xd4/0xd8 [ 32.663409] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.663744] kmalloc_uaf_memset+0xb8/0x310 [ 32.663985] kunit_try_run_case+0x170/0x3f0 [ 32.664226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.664297] kthread+0x328/0x630 [ 32.664336] ret_from_fork+0x10/0x20 [ 32.664373] [ 32.664392] Freed by task 217: [ 32.664419] kasan_save_stack+0x3c/0x68 [ 32.664455] kasan_save_track+0x20/0x40 [ 32.664511] kasan_save_free_info+0x4c/0x78 [ 32.664563] __kasan_slab_free+0x6c/0x98 [ 32.664599] kfree+0x214/0x3c8 [ 32.664642] kmalloc_uaf_memset+0x11c/0x310 [ 32.664683] kunit_try_run_case+0x170/0x3f0 [ 32.664727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.664788] kthread+0x328/0x630 [ 32.664821] ret_from_fork+0x10/0x20 [ 32.664855] [ 32.664876] The buggy address belongs to the object at fff00000c9a87c80 [ 32.664876] which belongs to the cache kmalloc-64 of size 64 [ 32.664948] The buggy address is located 0 bytes inside of [ 32.664948] freed 64-byte region [fff00000c9a87c80, fff00000c9a87cc0) [ 32.665015] [ 32.665039] The buggy address belongs to the physical page: [ 32.665077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87 [ 32.665133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.665205] page_type: f5(slab) [ 32.665249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.665298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.665347] page dumped because: kasan: bad access detected [ 32.665387] [ 32.665405] Memory state around the buggy address: [ 32.665448] fff00000c9a87b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.665509] fff00000c9a87c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.665561] >fff00000c9a87c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.665601] ^ [ 32.665627] fff00000c9a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665670] fff00000c9a87d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665724] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 32.633761] ================================================================== [ 32.633845] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 32.634341] Read of size 1 at addr fff00000c86834e8 by task kunit_try_catch/215 [ 32.634460] [ 32.634503] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.634773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.634856] Hardware name: linux,dummy-virt (DT) [ 32.634891] Call trace: [ 32.635072] show_stack+0x20/0x38 (C) [ 32.635159] dump_stack_lvl+0x8c/0xd0 [ 32.635324] print_report+0x118/0x5e8 [ 32.635424] kasan_report+0xdc/0x128 [ 32.635487] __asan_report_load1_noabort+0x20/0x30 [ 32.635703] kmalloc_uaf+0x300/0x338 [ 32.635965] kunit_try_run_case+0x170/0x3f0 [ 32.636475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.636569] kthread+0x328/0x630 [ 32.636786] ret_from_fork+0x10/0x20 [ 32.637043] [ 32.637112] Allocated by task 215: [ 32.637241] kasan_save_stack+0x3c/0x68 [ 32.637334] kasan_save_track+0x20/0x40 [ 32.637404] kasan_save_alloc_info+0x40/0x58 [ 32.637538] __kasan_kmalloc+0xd4/0xd8 [ 32.637576] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.637805] kmalloc_uaf+0xb8/0x338 [ 32.638050] kunit_try_run_case+0x170/0x3f0 [ 32.638097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.638144] kthread+0x328/0x630 [ 32.638240] ret_from_fork+0x10/0x20 [ 32.638287] [ 32.638315] Freed by task 215: [ 32.638344] kasan_save_stack+0x3c/0x68 [ 32.638381] kasan_save_track+0x20/0x40 [ 32.638424] kasan_save_free_info+0x4c/0x78 [ 32.638467] __kasan_slab_free+0x6c/0x98 [ 32.638504] kfree+0x214/0x3c8 [ 32.638544] kmalloc_uaf+0x11c/0x338 [ 32.638579] kunit_try_run_case+0x170/0x3f0 [ 32.638623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.638666] kthread+0x328/0x630 [ 32.638699] ret_from_fork+0x10/0x20 [ 32.638742] [ 32.638961] The buggy address belongs to the object at fff00000c86834e0 [ 32.638961] which belongs to the cache kmalloc-16 of size 16 [ 32.639233] The buggy address is located 8 bytes inside of [ 32.639233] freed 16-byte region [fff00000c86834e0, fff00000c86834f0) [ 32.639343] [ 32.639387] The buggy address belongs to the physical page: [ 32.639619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683 [ 32.639839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.639946] page_type: f5(slab) [ 32.640087] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.640196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.640240] page dumped because: kasan: bad access detected [ 32.640443] [ 32.640684] Memory state around the buggy address: [ 32.640821] fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.640936] fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.641012] >fff00000c8683480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.641173] ^ [ 32.641237] fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.641506] fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.641810] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 32.608528] ================================================================== [ 32.608998] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 32.609080] Read of size 64 at addr fff00000c9a87984 by task kunit_try_catch/213 [ 32.609132] [ 32.609205] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.609342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.609400] Hardware name: linux,dummy-virt (DT) [ 32.609438] Call trace: [ 32.609462] show_stack+0x20/0x38 (C) [ 32.609845] dump_stack_lvl+0x8c/0xd0 [ 32.609977] print_report+0x118/0x5e8 [ 32.610063] kasan_report+0xdc/0x128 [ 32.610129] kasan_check_range+0x100/0x1a8 [ 32.610174] __asan_memmove+0x3c/0x98 [ 32.610321] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 32.610375] kunit_try_run_case+0x170/0x3f0 [ 32.610429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.610690] kthread+0x328/0x630 [ 32.610905] ret_from_fork+0x10/0x20 [ 32.611007] [ 32.611201] Allocated by task 213: [ 32.611242] kasan_save_stack+0x3c/0x68 [ 32.611286] kasan_save_track+0x20/0x40 [ 32.611555] kasan_save_alloc_info+0x40/0x58 [ 32.611629] __kasan_kmalloc+0xd4/0xd8 [ 32.611702] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.611839] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 32.611935] kunit_try_run_case+0x170/0x3f0 [ 32.612090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612362] kthread+0x328/0x630 [ 32.612517] ret_from_fork+0x10/0x20 [ 32.612647] [ 32.612714] The buggy address belongs to the object at fff00000c9a87980 [ 32.612714] which belongs to the cache kmalloc-64 of size 64 [ 32.612906] The buggy address is located 4 bytes inside of [ 32.612906] allocated 64-byte region [fff00000c9a87980, fff00000c9a879c0) [ 32.613011] [ 32.613130] The buggy address belongs to the physical page: [ 32.613300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87 [ 32.613586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.613814] page_type: f5(slab) [ 32.613933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.614094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.614186] page dumped because: kasan: bad access detected [ 32.614564] [ 32.614609] Memory state around the buggy address: [ 32.614667] fff00000c9a87880: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.614738] fff00000c9a87900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.615609] >fff00000c9a87980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.615688] ^ [ 32.615737] fff00000c9a87a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.615886] fff00000c9a87a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.615985] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 32.589493] ================================================================== [ 32.589635] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.589722] Read of size 18446744073709551614 at addr fff00000c9a87784 by task kunit_try_catch/211 [ 32.589978] [ 32.590035] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.590494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.590540] Hardware name: linux,dummy-virt (DT) [ 32.590573] Call trace: [ 32.590616] show_stack+0x20/0x38 (C) [ 32.590679] dump_stack_lvl+0x8c/0xd0 [ 32.590777] print_report+0x118/0x5e8 [ 32.590842] kasan_report+0xdc/0x128 [ 32.590886] kasan_check_range+0x100/0x1a8 [ 32.591113] __asan_memmove+0x3c/0x98 [ 32.591167] kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.591501] kunit_try_run_case+0x170/0x3f0 [ 32.591571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.591802] kthread+0x328/0x630 [ 32.591881] ret_from_fork+0x10/0x20 [ 32.592026] [ 32.592103] Allocated by task 211: [ 32.592137] kasan_save_stack+0x3c/0x68 [ 32.592445] kasan_save_track+0x20/0x40 [ 32.592530] kasan_save_alloc_info+0x40/0x58 [ 32.592690] __kasan_kmalloc+0xd4/0xd8 [ 32.592811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.593115] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 32.593238] kunit_try_run_case+0x170/0x3f0 [ 32.593322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.593580] kthread+0x328/0x630 [ 32.593829] ret_from_fork+0x10/0x20 [ 32.593894] [ 32.593943] The buggy address belongs to the object at fff00000c9a87780 [ 32.593943] which belongs to the cache kmalloc-64 of size 64 [ 32.594494] The buggy address is located 4 bytes inside of [ 32.594494] 64-byte region [fff00000c9a87780, fff00000c9a877c0) [ 32.594587] [ 32.594638] The buggy address belongs to the physical page: [ 32.594725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a87 [ 32.594821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.595088] page_type: f5(slab) [ 32.595269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.595408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.595610] page dumped because: kasan: bad access detected [ 32.595685] [ 32.595704] Memory state around the buggy address: [ 32.595755] fff00000c9a87680: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 32.595960] fff00000c9a87700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.596191] >fff00000c9a87780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.596347] ^ [ 32.596391] fff00000c9a87800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.596454] fff00000c9a87880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.596572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 32.572307] ================================================================== [ 32.572385] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 32.572448] Write of size 16 at addr fff00000c9a8b469 by task kunit_try_catch/209 [ 32.572501] [ 32.572682] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.572909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.572948] Hardware name: linux,dummy-virt (DT) [ 32.572982] Call trace: [ 32.573007] show_stack+0x20/0x38 (C) [ 32.573058] dump_stack_lvl+0x8c/0xd0 [ 32.573104] print_report+0x118/0x5e8 [ 32.573406] kasan_report+0xdc/0x128 [ 32.573554] kasan_check_range+0x100/0x1a8 [ 32.573630] __asan_memset+0x34/0x78 [ 32.573674] kmalloc_oob_memset_16+0x150/0x2f8 [ 32.573728] kunit_try_run_case+0x170/0x3f0 [ 32.574071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.574231] kthread+0x328/0x630 [ 32.574307] ret_from_fork+0x10/0x20 [ 32.574359] [ 32.574471] Allocated by task 209: [ 32.574508] kasan_save_stack+0x3c/0x68 [ 32.574551] kasan_save_track+0x20/0x40 [ 32.574602] kasan_save_alloc_info+0x40/0x58 [ 32.574643] __kasan_kmalloc+0xd4/0xd8 [ 32.574679] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.574720] kmalloc_oob_memset_16+0xb0/0x2f8 [ 32.575095] kunit_try_run_case+0x170/0x3f0 [ 32.576036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.576116] kthread+0x328/0x630 [ 32.576182] ret_from_fork+0x10/0x20 [ 32.576323] [ 32.576347] The buggy address belongs to the object at fff00000c9a8b400 [ 32.576347] which belongs to the cache kmalloc-128 of size 128 [ 32.576452] The buggy address is located 105 bytes inside of [ 32.576452] allocated 120-byte region [fff00000c9a8b400, fff00000c9a8b478) [ 32.576565] [ 32.576819] The buggy address belongs to the physical page: [ 32.577030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.577112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.577670] page_type: f5(slab) [ 32.577901] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.577999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.578097] page dumped because: kasan: bad access detected [ 32.578240] [ 32.578289] Memory state around the buggy address: [ 32.578343] fff00000c9a8b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.578581] fff00000c9a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.578962] >fff00000c9a8b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.579150] ^ [ 32.579312] fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.579395] fff00000c9a8b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.579478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 32.554957] ================================================================== [ 32.555237] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 32.555375] Write of size 8 at addr fff00000c9a8b371 by task kunit_try_catch/207 [ 32.555825] [ 32.555898] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.556042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.556114] Hardware name: linux,dummy-virt (DT) [ 32.556195] Call trace: [ 32.556354] show_stack+0x20/0x38 (C) [ 32.556545] dump_stack_lvl+0x8c/0xd0 [ 32.556668] print_report+0x118/0x5e8 [ 32.556739] kasan_report+0xdc/0x128 [ 32.556867] kasan_check_range+0x100/0x1a8 [ 32.556954] __asan_memset+0x34/0x78 [ 32.557074] kmalloc_oob_memset_8+0x150/0x2f8 [ 32.557161] kunit_try_run_case+0x170/0x3f0 [ 32.557595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.557673] kthread+0x328/0x630 [ 32.557836] ret_from_fork+0x10/0x20 [ 32.557919] [ 32.557946] Allocated by task 207: [ 32.558027] kasan_save_stack+0x3c/0x68 [ 32.558084] kasan_save_track+0x20/0x40 [ 32.558125] kasan_save_alloc_info+0x40/0x58 [ 32.558173] __kasan_kmalloc+0xd4/0xd8 [ 32.558216] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.558262] kmalloc_oob_memset_8+0xb0/0x2f8 [ 32.558326] kunit_try_run_case+0x170/0x3f0 [ 32.558363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.558404] kthread+0x328/0x630 [ 32.558436] ret_from_fork+0x10/0x20 [ 32.558472] [ 32.558497] The buggy address belongs to the object at fff00000c9a8b300 [ 32.558497] which belongs to the cache kmalloc-128 of size 128 [ 32.558576] The buggy address is located 113 bytes inside of [ 32.558576] allocated 120-byte region [fff00000c9a8b300, fff00000c9a8b378) [ 32.558637] [ 32.558660] The buggy address belongs to the physical page: [ 32.558697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.558762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.558812] page_type: f5(slab) [ 32.558868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.558926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.558975] page dumped because: kasan: bad access detected [ 32.559665] [ 32.559721] Memory state around the buggy address: [ 32.559811] fff00000c9a8b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.559934] fff00000c9a8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.560021] >fff00000c9a8b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.560082] ^ [ 32.560191] fff00000c9a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.560413] fff00000c9a8b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.560476] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 32.538694] ================================================================== [ 32.538843] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 32.538908] Write of size 4 at addr fff00000c9a8b275 by task kunit_try_catch/205 [ 32.538968] [ 32.539055] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.539160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.539195] Hardware name: linux,dummy-virt (DT) [ 32.539227] Call trace: [ 32.539422] show_stack+0x20/0x38 (C) [ 32.539482] dump_stack_lvl+0x8c/0xd0 [ 32.539614] print_report+0x118/0x5e8 [ 32.539736] kasan_report+0xdc/0x128 [ 32.540050] kasan_check_range+0x100/0x1a8 [ 32.540166] __asan_memset+0x34/0x78 [ 32.540257] kmalloc_oob_memset_4+0x150/0x300 [ 32.540353] kunit_try_run_case+0x170/0x3f0 [ 32.540454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.540711] kthread+0x328/0x630 [ 32.540805] ret_from_fork+0x10/0x20 [ 32.540943] [ 32.540963] Allocated by task 205: [ 32.541178] kasan_save_stack+0x3c/0x68 [ 32.541245] kasan_save_track+0x20/0x40 [ 32.541369] kasan_save_alloc_info+0x40/0x58 [ 32.541458] __kasan_kmalloc+0xd4/0xd8 [ 32.541512] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.541701] kmalloc_oob_memset_4+0xb0/0x300 [ 32.541802] kunit_try_run_case+0x170/0x3f0 [ 32.541891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.542003] kthread+0x328/0x630 [ 32.542056] ret_from_fork+0x10/0x20 [ 32.542092] [ 32.542151] The buggy address belongs to the object at fff00000c9a8b200 [ 32.542151] which belongs to the cache kmalloc-128 of size 128 [ 32.542431] The buggy address is located 117 bytes inside of [ 32.542431] allocated 120-byte region [fff00000c9a8b200, fff00000c9a8b278) [ 32.542555] [ 32.542618] The buggy address belongs to the physical page: [ 32.542697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.542858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.543158] page_type: f5(slab) [ 32.543366] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.543443] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.543528] page dumped because: kasan: bad access detected [ 32.543568] [ 32.543587] Memory state around the buggy address: [ 32.543630] fff00000c9a8b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.543683] fff00000c9a8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.543860] >fff00000c9a8b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.544001] ^ [ 32.544186] fff00000c9a8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.544294] fff00000c9a8b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.544333] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 32.284776] ================================================================== [ 32.284847] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 32.284911] Read of size 1 at addr fff00000c9a80000 by task kunit_try_catch/185 [ 32.284963] [ 32.285005] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.285105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.285132] Hardware name: linux,dummy-virt (DT) [ 32.285165] Call trace: [ 32.285189] show_stack+0x20/0x38 (C) [ 32.285239] dump_stack_lvl+0x8c/0xd0 [ 32.285285] print_report+0x118/0x5e8 [ 32.285327] kasan_report+0xdc/0x128 [ 32.285369] __asan_report_load1_noabort+0x20/0x30 [ 32.285430] page_alloc_uaf+0x328/0x350 [ 32.285476] kunit_try_run_case+0x170/0x3f0 [ 32.285522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.285573] kthread+0x328/0x630 [ 32.285616] ret_from_fork+0x10/0x20 [ 32.285664] [ 32.285685] The buggy address belongs to the physical page: [ 32.286155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a80 [ 32.286249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.286304] page_type: f0(buddy) [ 32.286346] raw: 0bfffe0000000000 fff00000ff616218 fff00000ff616218 0000000000000000 [ 32.286429] raw: 0000000000000000 0000000000000007 00000000f0000000 0000000000000000 [ 32.286604] page dumped because: kasan: bad access detected [ 32.286649] [ 32.286667] Memory state around the buggy address: [ 32.286704] fff00000c9a7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.287352] fff00000c9a7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.287499] >fff00000c9a80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.287539] ^ [ 32.288080] fff00000c9a80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.288725] fff00000c9a80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.288800] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 32.525440] ================================================================== [ 32.525861] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 32.526016] Write of size 2 at addr fff00000c9a8b177 by task kunit_try_catch/203 [ 32.526126] [ 32.526185] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.526427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.526462] Hardware name: linux,dummy-virt (DT) [ 32.526558] Call trace: [ 32.526718] show_stack+0x20/0x38 (C) [ 32.526805] dump_stack_lvl+0x8c/0xd0 [ 32.526854] print_report+0x118/0x5e8 [ 32.526897] kasan_report+0xdc/0x128 [ 32.527338] kasan_check_range+0x100/0x1a8 [ 32.527461] __asan_memset+0x34/0x78 [ 32.527618] kmalloc_oob_memset_2+0x150/0x2f8 [ 32.527673] kunit_try_run_case+0x170/0x3f0 [ 32.527721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.527791] kthread+0x328/0x630 [ 32.528068] ret_from_fork+0x10/0x20 [ 32.528276] [ 32.528363] Allocated by task 203: [ 32.528412] kasan_save_stack+0x3c/0x68 [ 32.528473] kasan_save_track+0x20/0x40 [ 32.528660] kasan_save_alloc_info+0x40/0x58 [ 32.528806] __kasan_kmalloc+0xd4/0xd8 [ 32.528855] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.528895] kmalloc_oob_memset_2+0xb0/0x2f8 [ 32.528987] kunit_try_run_case+0x170/0x3f0 [ 32.529203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.529435] kthread+0x328/0x630 [ 32.529618] ret_from_fork+0x10/0x20 [ 32.529788] [ 32.529858] The buggy address belongs to the object at fff00000c9a8b100 [ 32.529858] which belongs to the cache kmalloc-128 of size 128 [ 32.529937] The buggy address is located 119 bytes inside of [ 32.529937] allocated 120-byte region [fff00000c9a8b100, fff00000c9a8b178) [ 32.530202] [ 32.530230] The buggy address belongs to the physical page: [ 32.530270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.530347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.530449] page_type: f5(slab) [ 32.530667] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.530767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.530859] page dumped because: kasan: bad access detected [ 32.530890] [ 32.530912] Memory state around the buggy address: [ 32.530952] fff00000c9a8b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.531308] fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.531420] >fff00000c9a8b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.531576] ^ [ 32.531651] fff00000c9a8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.531718] fff00000c9a8b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.531765] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 32.505164] ================================================================== [ 32.505251] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 32.505320] Write of size 128 at addr fff00000c9a8b000 by task kunit_try_catch/201 [ 32.505371] [ 32.505412] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.505499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.506666] Hardware name: linux,dummy-virt (DT) [ 32.506729] Call trace: [ 32.506763] show_stack+0x20/0x38 (C) [ 32.506886] dump_stack_lvl+0x8c/0xd0 [ 32.507079] print_report+0x118/0x5e8 [ 32.507127] kasan_report+0xdc/0x128 [ 32.507238] kasan_check_range+0x100/0x1a8 [ 32.508003] __asan_memset+0x34/0x78 [ 32.508066] kmalloc_oob_in_memset+0x144/0x2d0 [ 32.508465] kunit_try_run_case+0x170/0x3f0 [ 32.508735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.508803] kthread+0x328/0x630 [ 32.508846] ret_from_fork+0x10/0x20 [ 32.508896] [ 32.508915] Allocated by task 201: [ 32.508943] kasan_save_stack+0x3c/0x68 [ 32.509417] kasan_save_track+0x20/0x40 [ 32.509454] kasan_save_alloc_info+0x40/0x58 [ 32.509766] __kasan_kmalloc+0xd4/0xd8 [ 32.509957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.510298] kmalloc_oob_in_memset+0xb0/0x2d0 [ 32.510666] kunit_try_run_case+0x170/0x3f0 [ 32.510717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.511123] kthread+0x328/0x630 [ 32.511175] ret_from_fork+0x10/0x20 [ 32.511420] [ 32.511620] The buggy address belongs to the object at fff00000c9a8b000 [ 32.511620] which belongs to the cache kmalloc-128 of size 128 [ 32.511744] The buggy address is located 0 bytes inside of [ 32.511744] allocated 120-byte region [fff00000c9a8b000, fff00000c9a8b078) [ 32.512364] [ 32.512395] The buggy address belongs to the physical page: [ 32.512650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.512893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.513192] page_type: f5(slab) [ 32.513476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.513971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.514123] page dumped because: kasan: bad access detected [ 32.514414] [ 32.514651] Memory state around the buggy address: [ 32.515156] fff00000c9a8af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.515203] fff00000c9a8af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.515251] >fff00000c9a8b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.515289] ^ [ 32.515921] fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.516250] fff00000c9a8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.516540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 32.471140] ================================================================== [ 32.471242] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 32.471333] Read of size 16 at addr fff00000c86834c0 by task kunit_try_catch/199 [ 32.471704] [ 32.471856] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.471945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.471972] Hardware name: linux,dummy-virt (DT) [ 32.472004] Call trace: [ 32.472693] show_stack+0x20/0x38 (C) [ 32.473260] dump_stack_lvl+0x8c/0xd0 [ 32.473429] print_report+0x118/0x5e8 [ 32.473476] kasan_report+0xdc/0x128 [ 32.473806] __asan_report_load16_noabort+0x20/0x30 [ 32.474007] kmalloc_uaf_16+0x3bc/0x438 [ 32.474662] kunit_try_run_case+0x170/0x3f0 [ 32.475041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.475176] kthread+0x328/0x630 [ 32.475463] ret_from_fork+0x10/0x20 [ 32.475604] [ 32.475664] Allocated by task 199: [ 32.475843] kasan_save_stack+0x3c/0x68 [ 32.476106] kasan_save_track+0x20/0x40 [ 32.476346] kasan_save_alloc_info+0x40/0x58 [ 32.476582] __kasan_kmalloc+0xd4/0xd8 [ 32.476840] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.476888] kmalloc_uaf_16+0x140/0x438 [ 32.476924] kunit_try_run_case+0x170/0x3f0 [ 32.476960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.477001] kthread+0x328/0x630 [ 32.477033] ret_from_fork+0x10/0x20 [ 32.477067] [ 32.478003] Freed by task 199: [ 32.478406] kasan_save_stack+0x3c/0x68 [ 32.478471] kasan_save_track+0x20/0x40 [ 32.478505] kasan_save_free_info+0x4c/0x78 [ 32.478541] __kasan_slab_free+0x6c/0x98 [ 32.478575] kfree+0x214/0x3c8 [ 32.479229] kmalloc_uaf_16+0x190/0x438 [ 32.479440] kunit_try_run_case+0x170/0x3f0 [ 32.479549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.479743] kthread+0x328/0x630 [ 32.479798] ret_from_fork+0x10/0x20 [ 32.480370] [ 32.480494] The buggy address belongs to the object at fff00000c86834c0 [ 32.480494] which belongs to the cache kmalloc-16 of size 16 [ 32.480555] The buggy address is located 0 bytes inside of [ 32.480555] freed 16-byte region [fff00000c86834c0, fff00000c86834d0) [ 32.480617] [ 32.481095] The buggy address belongs to the physical page: [ 32.481336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683 [ 32.481482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.481595] page_type: f5(slab) [ 32.482303] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.482475] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.482627] page dumped because: kasan: bad access detected [ 32.483261] [ 32.483484] Memory state around the buggy address: [ 32.483650] fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.484051] fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.484177] >fff00000c8683480: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 32.484250] ^ [ 32.484506] fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.484831] fff00000c8683580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.484995] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 32.446791] ================================================================== [ 32.446862] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 32.446922] Write of size 16 at addr fff00000c8683460 by task kunit_try_catch/197 [ 32.447387] [ 32.447447] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.447696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.447744] Hardware name: linux,dummy-virt (DT) [ 32.447788] Call trace: [ 32.447812] show_stack+0x20/0x38 (C) [ 32.447892] dump_stack_lvl+0x8c/0xd0 [ 32.447939] print_report+0x118/0x5e8 [ 32.447983] kasan_report+0xdc/0x128 [ 32.448648] __asan_report_store16_noabort+0x20/0x30 [ 32.448768] kmalloc_oob_16+0x3a0/0x3f8 [ 32.448896] kunit_try_run_case+0x170/0x3f0 [ 32.449182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.449264] kthread+0x328/0x630 [ 32.449415] ret_from_fork+0x10/0x20 [ 32.449480] [ 32.449499] Allocated by task 197: [ 32.449675] kasan_save_stack+0x3c/0x68 [ 32.449789] kasan_save_track+0x20/0x40 [ 32.449837] kasan_save_alloc_info+0x40/0x58 [ 32.449878] __kasan_kmalloc+0xd4/0xd8 [ 32.449919] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.449959] kmalloc_oob_16+0xb4/0x3f8 [ 32.450033] kunit_try_run_case+0x170/0x3f0 [ 32.450091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.450137] kthread+0x328/0x630 [ 32.450180] ret_from_fork+0x10/0x20 [ 32.450236] [ 32.450261] The buggy address belongs to the object at fff00000c8683460 [ 32.450261] which belongs to the cache kmalloc-16 of size 16 [ 32.450342] The buggy address is located 0 bytes inside of [ 32.450342] allocated 13-byte region [fff00000c8683460, fff00000c868346d) [ 32.450403] [ 32.450432] The buggy address belongs to the physical page: [ 32.450471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683 [ 32.450525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.450583] page_type: f5(slab) [ 32.450631] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.450688] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.450736] page dumped because: kasan: bad access detected [ 32.450785] [ 32.450803] Memory state around the buggy address: [ 32.450855] fff00000c8683300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.450909] fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.451189] >fff00000c8683400: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 32.451237] ^ [ 32.451695] fff00000c8683480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.451754] fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.451977] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 32.425886] ================================================================== [ 32.425948] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 32.426080] Read of size 1 at addr fff00000c9260000 by task kunit_try_catch/195 [ 32.426143] [ 32.426180] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.426271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.426297] Hardware name: linux,dummy-virt (DT) [ 32.426370] Call trace: [ 32.426396] show_stack+0x20/0x38 (C) [ 32.426483] dump_stack_lvl+0x8c/0xd0 [ 32.426869] print_report+0x118/0x5e8 [ 32.426931] kasan_report+0xdc/0x128 [ 32.427107] __asan_report_load1_noabort+0x20/0x30 [ 32.427307] krealloc_uaf+0x4c8/0x520 [ 32.427355] kunit_try_run_case+0x170/0x3f0 [ 32.427420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.427814] kthread+0x328/0x630 [ 32.427887] ret_from_fork+0x10/0x20 [ 32.428042] [ 32.428102] Allocated by task 195: [ 32.428221] kasan_save_stack+0x3c/0x68 [ 32.428332] kasan_save_track+0x20/0x40 [ 32.428409] kasan_save_alloc_info+0x40/0x58 [ 32.428812] __kasan_kmalloc+0xd4/0xd8 [ 32.428905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.428980] krealloc_uaf+0xc8/0x520 [ 32.429476] kunit_try_run_case+0x170/0x3f0 [ 32.429845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.429960] kthread+0x328/0x630 [ 32.430024] ret_from_fork+0x10/0x20 [ 32.430098] [ 32.430158] Freed by task 195: [ 32.430324] kasan_save_stack+0x3c/0x68 [ 32.430609] kasan_save_track+0x20/0x40 [ 32.430697] kasan_save_free_info+0x4c/0x78 [ 32.431085] __kasan_slab_free+0x6c/0x98 [ 32.431385] kfree+0x214/0x3c8 [ 32.431674] krealloc_uaf+0x12c/0x520 [ 32.431877] kunit_try_run_case+0x170/0x3f0 [ 32.431955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.432255] kthread+0x328/0x630 [ 32.432327] ret_from_fork+0x10/0x20 [ 32.432492] [ 32.432597] The buggy address belongs to the object at fff00000c9260000 [ 32.432597] which belongs to the cache kmalloc-256 of size 256 [ 32.432782] The buggy address is located 0 bytes inside of [ 32.432782] freed 256-byte region [fff00000c9260000, fff00000c9260100) [ 32.432888] [ 32.432943] The buggy address belongs to the physical page: [ 32.433066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109260 [ 32.433163] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.433228] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.433480] page_type: f5(slab) [ 32.433725] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.433876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.433946] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.434167] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.434384] head: 0bfffe0000000001 ffffc1ffc3249801 00000000ffffffff 00000000ffffffff [ 32.434842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.435167] page dumped because: kasan: bad access detected [ 32.435306] [ 32.435335] Memory state around the buggy address: [ 32.435370] fff00000c925ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.435414] fff00000c925ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.435812] >fff00000c9260000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.436098] ^ [ 32.436428] fff00000c9260080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.436481] fff00000c9260100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.436862] ================================================================== [ 32.412980] ================================================================== [ 32.413357] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 32.413437] Read of size 1 at addr fff00000c9260000 by task kunit_try_catch/195 [ 32.413488] [ 32.413526] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.413613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.413639] Hardware name: linux,dummy-virt (DT) [ 32.413671] Call trace: [ 32.413706] show_stack+0x20/0x38 (C) [ 32.413775] dump_stack_lvl+0x8c/0xd0 [ 32.413820] print_report+0x118/0x5e8 [ 32.413862] kasan_report+0xdc/0x128 [ 32.413903] __kasan_check_byte+0x54/0x70 [ 32.413947] krealloc_noprof+0x44/0x360 [ 32.413990] krealloc_uaf+0x180/0x520 [ 32.414038] kunit_try_run_case+0x170/0x3f0 [ 32.414084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.414139] kthread+0x328/0x630 [ 32.414181] ret_from_fork+0x10/0x20 [ 32.414244] [ 32.414263] Allocated by task 195: [ 32.414351] kasan_save_stack+0x3c/0x68 [ 32.414392] kasan_save_track+0x20/0x40 [ 32.414435] kasan_save_alloc_info+0x40/0x58 [ 32.414473] __kasan_kmalloc+0xd4/0xd8 [ 32.414516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.414557] krealloc_uaf+0xc8/0x520 [ 32.414601] kunit_try_run_case+0x170/0x3f0 [ 32.414637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.414688] kthread+0x328/0x630 [ 32.414721] ret_from_fork+0x10/0x20 [ 32.415326] [ 32.415628] Freed by task 195: [ 32.415905] kasan_save_stack+0x3c/0x68 [ 32.416067] kasan_save_track+0x20/0x40 [ 32.416371] kasan_save_free_info+0x4c/0x78 [ 32.416471] __kasan_slab_free+0x6c/0x98 [ 32.416573] kfree+0x214/0x3c8 [ 32.416610] krealloc_uaf+0x12c/0x520 [ 32.416688] kunit_try_run_case+0x170/0x3f0 [ 32.416783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.417184] kthread+0x328/0x630 [ 32.417293] ret_from_fork+0x10/0x20 [ 32.417487] [ 32.417556] The buggy address belongs to the object at fff00000c9260000 [ 32.417556] which belongs to the cache kmalloc-256 of size 256 [ 32.418170] The buggy address is located 0 bytes inside of [ 32.418170] freed 256-byte region [fff00000c9260000, fff00000c9260100) [ 32.418284] [ 32.418332] The buggy address belongs to the physical page: [ 32.418437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109260 [ 32.418543] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.418807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.419110] page_type: f5(slab) [ 32.419293] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.419390] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.419525] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.419584] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.419838] head: 0bfffe0000000001 ffffc1ffc3249801 00000000ffffffff 00000000ffffffff [ 32.420249] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.420330] page dumped because: kasan: bad access detected [ 32.420406] [ 32.420476] Memory state around the buggy address: [ 32.420554] fff00000c925ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.421008] fff00000c925ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.421139] >fff00000c9260000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.421282] ^ [ 32.421557] fff00000c9260080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.421739] fff00000c9260100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.422243] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 32.376631] ================================================================== [ 32.377078] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.377284] Write of size 1 at addr fff00000c99620d0 by task kunit_try_catch/193 [ 32.377345] [ 32.377381] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.377986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.378074] Hardware name: linux,dummy-virt (DT) [ 32.378115] Call trace: [ 32.378148] show_stack+0x20/0x38 (C) [ 32.378218] dump_stack_lvl+0x8c/0xd0 [ 32.378552] print_report+0x118/0x5e8 [ 32.378623] kasan_report+0xdc/0x128 [ 32.378667] __asan_report_store1_noabort+0x20/0x30 [ 32.378716] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.378775] krealloc_large_less_oob+0x20/0x38 [ 32.378823] kunit_try_run_case+0x170/0x3f0 [ 32.378869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.379198] kthread+0x328/0x630 [ 32.379856] ret_from_fork+0x10/0x20 [ 32.380001] [ 32.380125] The buggy address belongs to the physical page: [ 32.380197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.380607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.380664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.380941] page_type: f8(unknown) [ 32.381027] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.381216] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.381495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.381650] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.381871] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.381923] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.381971] page dumped because: kasan: bad access detected [ 32.382002] [ 32.382021] Memory state around the buggy address: [ 32.382064] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.382113] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.382154] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.382191] ^ [ 32.382227] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.382270] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.382324] ================================================================== [ 32.316959] ================================================================== [ 32.317191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.317466] Write of size 1 at addr fff00000c8575ec9 by task kunit_try_catch/189 [ 32.317559] [ 32.317681] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.317778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.317805] Hardware name: linux,dummy-virt (DT) [ 32.317838] Call trace: [ 32.317924] show_stack+0x20/0x38 (C) [ 32.318001] dump_stack_lvl+0x8c/0xd0 [ 32.318047] print_report+0x118/0x5e8 [ 32.318151] kasan_report+0xdc/0x128 [ 32.318194] __asan_report_store1_noabort+0x20/0x30 [ 32.318262] krealloc_less_oob_helper+0xa48/0xc50 [ 32.318338] krealloc_less_oob+0x20/0x38 [ 32.318595] kunit_try_run_case+0x170/0x3f0 [ 32.318657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.318788] kthread+0x328/0x630 [ 32.318856] ret_from_fork+0x10/0x20 [ 32.318911] [ 32.318940] Allocated by task 189: [ 32.318968] kasan_save_stack+0x3c/0x68 [ 32.319013] kasan_save_track+0x20/0x40 [ 32.319070] kasan_save_alloc_info+0x40/0x58 [ 32.319156] __kasan_krealloc+0x118/0x178 [ 32.319202] krealloc_noprof+0x128/0x360 [ 32.319259] krealloc_less_oob_helper+0x168/0xc50 [ 32.319349] krealloc_less_oob+0x20/0x38 [ 32.319440] kunit_try_run_case+0x170/0x3f0 [ 32.319476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.319517] kthread+0x328/0x630 [ 32.319548] ret_from_fork+0x10/0x20 [ 32.319582] [ 32.319601] The buggy address belongs to the object at fff00000c8575e00 [ 32.319601] which belongs to the cache kmalloc-256 of size 256 [ 32.319657] The buggy address is located 0 bytes to the right of [ 32.319657] allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9) [ 32.319975] [ 32.320146] The buggy address belongs to the physical page: [ 32.320239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.320380] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.320455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.320530] page_type: f5(slab) [ 32.320657] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.320786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.320918] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.320965] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.321338] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.321440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.321573] page dumped because: kasan: bad access detected [ 32.321640] [ 32.321667] Memory state around the buggy address: [ 32.321776] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.321853] fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.321946] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.322083] ^ [ 32.322142] fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.322190] fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.322398] ================================================================== [ 32.396741] ================================================================== [ 32.396971] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 32.397041] Write of size 1 at addr fff00000c99620eb by task kunit_try_catch/193 [ 32.397142] [ 32.397178] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.397281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.397315] Hardware name: linux,dummy-virt (DT) [ 32.397499] Call trace: [ 32.397533] show_stack+0x20/0x38 (C) [ 32.397760] dump_stack_lvl+0x8c/0xd0 [ 32.397823] print_report+0x118/0x5e8 [ 32.398075] kasan_report+0xdc/0x128 [ 32.398280] __asan_report_store1_noabort+0x20/0x30 [ 32.398343] krealloc_less_oob_helper+0xa58/0xc50 [ 32.398510] krealloc_large_less_oob+0x20/0x38 [ 32.398607] kunit_try_run_case+0x170/0x3f0 [ 32.398663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.398714] kthread+0x328/0x630 [ 32.399041] ret_from_fork+0x10/0x20 [ 32.399236] [ 32.399332] The buggy address belongs to the physical page: [ 32.399412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.399523] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.399706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.399991] page_type: f8(unknown) [ 32.400059] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.400203] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.400309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.400445] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.400559] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.400608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.400819] page dumped because: kasan: bad access detected [ 32.401060] [ 32.401103] Memory state around the buggy address: [ 32.401149] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.401986] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.402058] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.402149] ^ [ 32.402211] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.402278] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.402453] ================================================================== [ 32.368095] ================================================================== [ 32.368474] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.368537] Write of size 1 at addr fff00000c99620c9 by task kunit_try_catch/193 [ 32.368690] [ 32.368776] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.369210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.369290] Hardware name: linux,dummy-virt (DT) [ 32.369325] Call trace: [ 32.369393] show_stack+0x20/0x38 (C) [ 32.369446] dump_stack_lvl+0x8c/0xd0 [ 32.369503] print_report+0x118/0x5e8 [ 32.369736] kasan_report+0xdc/0x128 [ 32.369818] __asan_report_store1_noabort+0x20/0x30 [ 32.369868] krealloc_less_oob_helper+0xa48/0xc50 [ 32.369917] krealloc_large_less_oob+0x20/0x38 [ 32.370302] kunit_try_run_case+0x170/0x3f0 [ 32.370697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.370786] kthread+0x328/0x630 [ 32.370830] ret_from_fork+0x10/0x20 [ 32.371019] [ 32.371070] The buggy address belongs to the physical page: [ 32.371379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.371699] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.372242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.372364] page_type: f8(unknown) [ 32.372440] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.372762] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.373003] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.373260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.373356] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.373598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.373675] page dumped because: kasan: bad access detected [ 32.374044] [ 32.374169] Memory state around the buggy address: [ 32.374226] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.374375] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.374421] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.374507] ^ [ 32.374723] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.374852] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.375048] ================================================================== [ 32.328497] ================================================================== [ 32.328700] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 32.328782] Write of size 1 at addr fff00000c8575eda by task kunit_try_catch/189 [ 32.328832] [ 32.328971] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.329056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.329083] Hardware name: linux,dummy-virt (DT) [ 32.329114] Call trace: [ 32.329137] show_stack+0x20/0x38 (C) [ 32.329333] dump_stack_lvl+0x8c/0xd0 [ 32.329398] print_report+0x118/0x5e8 [ 32.329442] kasan_report+0xdc/0x128 [ 32.329502] __asan_report_store1_noabort+0x20/0x30 [ 32.329557] krealloc_less_oob_helper+0xa80/0xc50 [ 32.329622] krealloc_less_oob+0x20/0x38 [ 32.329679] kunit_try_run_case+0x170/0x3f0 [ 32.329733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.329824] kthread+0x328/0x630 [ 32.329882] ret_from_fork+0x10/0x20 [ 32.329949] [ 32.329988] Allocated by task 189: [ 32.330035] kasan_save_stack+0x3c/0x68 [ 32.330137] kasan_save_track+0x20/0x40 [ 32.330174] kasan_save_alloc_info+0x40/0x58 [ 32.330241] __kasan_krealloc+0x118/0x178 [ 32.330293] krealloc_noprof+0x128/0x360 [ 32.330327] krealloc_less_oob_helper+0x168/0xc50 [ 32.330366] krealloc_less_oob+0x20/0x38 [ 32.330402] kunit_try_run_case+0x170/0x3f0 [ 32.330546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.330685] kthread+0x328/0x630 [ 32.330730] ret_from_fork+0x10/0x20 [ 32.330776] [ 32.330795] The buggy address belongs to the object at fff00000c8575e00 [ 32.330795] which belongs to the cache kmalloc-256 of size 256 [ 32.330937] The buggy address is located 17 bytes to the right of [ 32.330937] allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9) [ 32.331131] [ 32.331152] The buggy address belongs to the physical page: [ 32.331186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.331252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.331307] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.331357] page_type: f5(slab) [ 32.331579] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.331665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.331784] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.331903] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.332001] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.332106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.332158] page dumped because: kasan: bad access detected [ 32.332226] [ 32.332244] Memory state around the buggy address: [ 32.332274] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.332369] fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.332414] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.332572] ^ [ 32.332610] fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.332651] fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.332688] ================================================================== [ 32.389870] ================================================================== [ 32.390119] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 32.390361] Write of size 1 at addr fff00000c99620ea by task kunit_try_catch/193 [ 32.390423] [ 32.390459] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.390543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.390570] Hardware name: linux,dummy-virt (DT) [ 32.390691] Call trace: [ 32.390718] show_stack+0x20/0x38 (C) [ 32.390900] dump_stack_lvl+0x8c/0xd0 [ 32.391024] print_report+0x118/0x5e8 [ 32.391306] kasan_report+0xdc/0x128 [ 32.391577] __asan_report_store1_noabort+0x20/0x30 [ 32.391685] krealloc_less_oob_helper+0xae4/0xc50 [ 32.391832] krealloc_large_less_oob+0x20/0x38 [ 32.391895] kunit_try_run_case+0x170/0x3f0 [ 32.391941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.392442] kthread+0x328/0x630 [ 32.392520] ret_from_fork+0x10/0x20 [ 32.392718] [ 32.392815] The buggy address belongs to the physical page: [ 32.392873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.393006] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.393237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.393407] page_type: f8(unknown) [ 32.393468] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.393533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.393592] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.393648] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.393705] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.393781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.393827] page dumped because: kasan: bad access detected [ 32.393862] [ 32.393880] Memory state around the buggy address: [ 32.393925] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.393968] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.394022] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.394061] ^ [ 32.394098] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.394146] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.394183] ================================================================== [ 32.339155] ================================================================== [ 32.339203] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 32.339249] Write of size 1 at addr fff00000c8575eeb by task kunit_try_catch/189 [ 32.339324] [ 32.339352] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.339434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.339459] Hardware name: linux,dummy-virt (DT) [ 32.339625] Call trace: [ 32.339658] show_stack+0x20/0x38 (C) [ 32.339706] dump_stack_lvl+0x8c/0xd0 [ 32.339762] print_report+0x118/0x5e8 [ 32.340036] kasan_report+0xdc/0x128 [ 32.340093] __asan_report_store1_noabort+0x20/0x30 [ 32.340141] krealloc_less_oob_helper+0xa58/0xc50 [ 32.340208] krealloc_less_oob+0x20/0x38 [ 32.340271] kunit_try_run_case+0x170/0x3f0 [ 32.340351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.340403] kthread+0x328/0x630 [ 32.340647] ret_from_fork+0x10/0x20 [ 32.340777] [ 32.340816] Allocated by task 189: [ 32.340863] kasan_save_stack+0x3c/0x68 [ 32.340902] kasan_save_track+0x20/0x40 [ 32.340937] kasan_save_alloc_info+0x40/0x58 [ 32.340973] __kasan_krealloc+0x118/0x178 [ 32.341032] krealloc_noprof+0x128/0x360 [ 32.341067] krealloc_less_oob_helper+0x168/0xc50 [ 32.341107] krealloc_less_oob+0x20/0x38 [ 32.341143] kunit_try_run_case+0x170/0x3f0 [ 32.341178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.341385] kthread+0x328/0x630 [ 32.341439] ret_from_fork+0x10/0x20 [ 32.341474] [ 32.341520] The buggy address belongs to the object at fff00000c8575e00 [ 32.341520] which belongs to the cache kmalloc-256 of size 256 [ 32.341590] The buggy address is located 34 bytes to the right of [ 32.341590] allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9) [ 32.341654] [ 32.341692] The buggy address belongs to the physical page: [ 32.341726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.341904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.342043] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.342103] page_type: f5(slab) [ 32.342150] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.342198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.342247] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.342296] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.342344] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.342391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.342430] page dumped because: kasan: bad access detected [ 32.342460] [ 32.342478] Memory state around the buggy address: [ 32.342507] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342549] fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.342659] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.342705] ^ [ 32.342883] fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342924] fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.342967] ================================================================== [ 32.333682] ================================================================== [ 32.333767] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 32.333831] Write of size 1 at addr fff00000c8575eea by task kunit_try_catch/189 [ 32.333880] [ 32.333915] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.334148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.334186] Hardware name: linux,dummy-virt (DT) [ 32.334229] Call trace: [ 32.334251] show_stack+0x20/0x38 (C) [ 32.334299] dump_stack_lvl+0x8c/0xd0 [ 32.334343] print_report+0x118/0x5e8 [ 32.334386] kasan_report+0xdc/0x128 [ 32.334428] __asan_report_store1_noabort+0x20/0x30 [ 32.334475] krealloc_less_oob_helper+0xae4/0xc50 [ 32.334524] krealloc_less_oob+0x20/0x38 [ 32.334569] kunit_try_run_case+0x170/0x3f0 [ 32.334620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.334671] kthread+0x328/0x630 [ 32.334711] ret_from_fork+0x10/0x20 [ 32.334767] [ 32.334785] Allocated by task 189: [ 32.334813] kasan_save_stack+0x3c/0x68 [ 32.334850] kasan_save_track+0x20/0x40 [ 32.335061] kasan_save_alloc_info+0x40/0x58 [ 32.335113] __kasan_krealloc+0x118/0x178 [ 32.335273] krealloc_noprof+0x128/0x360 [ 32.335429] krealloc_less_oob_helper+0x168/0xc50 [ 32.335500] krealloc_less_oob+0x20/0x38 [ 32.335596] kunit_try_run_case+0x170/0x3f0 [ 32.335682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.335735] kthread+0x328/0x630 [ 32.335806] ret_from_fork+0x10/0x20 [ 32.335884] [ 32.335981] The buggy address belongs to the object at fff00000c8575e00 [ 32.335981] which belongs to the cache kmalloc-256 of size 256 [ 32.336112] The buggy address is located 33 bytes to the right of [ 32.336112] allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9) [ 32.336177] [ 32.336233] The buggy address belongs to the physical page: [ 32.336269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.336319] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.336588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.336729] page_type: f5(slab) [ 32.336806] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.336873] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.336921] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.337002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.337242] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.337351] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.337459] page dumped because: kasan: bad access detected [ 32.337537] [ 32.337588] Memory state around the buggy address: [ 32.337691] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.337786] fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.337828] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.338138] ^ [ 32.338285] fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.338359] fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.338408] ================================================================== [ 32.382458] ================================================================== [ 32.382508] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 32.382564] Write of size 1 at addr fff00000c99620da by task kunit_try_catch/193 [ 32.382612] [ 32.382653] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.382735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.383219] Hardware name: linux,dummy-virt (DT) [ 32.383270] Call trace: [ 32.383315] show_stack+0x20/0x38 (C) [ 32.383571] dump_stack_lvl+0x8c/0xd0 [ 32.383624] print_report+0x118/0x5e8 [ 32.383856] kasan_report+0xdc/0x128 [ 32.383916] __asan_report_store1_noabort+0x20/0x30 [ 32.384285] krealloc_less_oob_helper+0xa80/0xc50 [ 32.384501] krealloc_large_less_oob+0x20/0x38 [ 32.384741] kunit_try_run_case+0x170/0x3f0 [ 32.384950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.385146] kthread+0x328/0x630 [ 32.385277] ret_from_fork+0x10/0x20 [ 32.385495] [ 32.385564] The buggy address belongs to the physical page: [ 32.385616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.385987] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.386242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.386413] page_type: f8(unknown) [ 32.386488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.386575] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.386775] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.386875] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.387155] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.387240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.387405] page dumped because: kasan: bad access detected [ 32.387457] [ 32.387475] Memory state around the buggy address: [ 32.387512] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.387555] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.388017] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.388206] ^ [ 32.388536] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.388611] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.388739] ================================================================== [ 32.323622] ================================================================== [ 32.323681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.323733] Write of size 1 at addr fff00000c8575ed0 by task kunit_try_catch/189 [ 32.323799] [ 32.323832] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.323923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.323950] Hardware name: linux,dummy-virt (DT) [ 32.323981] Call trace: [ 32.324012] show_stack+0x20/0x38 (C) [ 32.324060] dump_stack_lvl+0x8c/0xd0 [ 32.324111] print_report+0x118/0x5e8 [ 32.324155] kasan_report+0xdc/0x128 [ 32.324206] __asan_report_store1_noabort+0x20/0x30 [ 32.324255] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.324303] krealloc_less_oob+0x20/0x38 [ 32.324349] kunit_try_run_case+0x170/0x3f0 [ 32.324394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.324444] kthread+0x328/0x630 [ 32.324485] ret_from_fork+0x10/0x20 [ 32.324532] [ 32.324550] Allocated by task 189: [ 32.324583] kasan_save_stack+0x3c/0x68 [ 32.324620] kasan_save_track+0x20/0x40 [ 32.324659] kasan_save_alloc_info+0x40/0x58 [ 32.324695] __kasan_krealloc+0x118/0x178 [ 32.324731] krealloc_noprof+0x128/0x360 [ 32.324775] krealloc_less_oob_helper+0x168/0xc50 [ 32.324815] krealloc_less_oob+0x20/0x38 [ 32.324851] kunit_try_run_case+0x170/0x3f0 [ 32.324886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.324993] kthread+0x328/0x630 [ 32.325034] ret_from_fork+0x10/0x20 [ 32.325566] [ 32.325600] The buggy address belongs to the object at fff00000c8575e00 [ 32.325600] which belongs to the cache kmalloc-256 of size 256 [ 32.325659] The buggy address is located 7 bytes to the right of [ 32.325659] allocated 201-byte region [fff00000c8575e00, fff00000c8575ec9) [ 32.325928] [ 32.325976] The buggy address belongs to the physical page: [ 32.326042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.326096] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.326165] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.326218] page_type: f5(slab) [ 32.326275] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.326482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.326662] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.326737] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.326841] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.326908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.326948] page dumped because: kasan: bad access detected [ 32.326978] [ 32.327041] Memory state around the buggy address: [ 32.327072] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.327114] fff00000c8575e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.327155] >fff00000c8575e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.327193] ^ [ 32.327227] fff00000c8575f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.327308] fff00000c8575f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.327472] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 32.297301] ================================================================== [ 32.297437] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.297553] Write of size 1 at addr fff00000c8575ceb by task kunit_try_catch/187 [ 32.297605] [ 32.297682] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.297783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.297828] Hardware name: linux,dummy-virt (DT) [ 32.297861] Call trace: [ 32.297981] show_stack+0x20/0x38 (C) [ 32.298035] dump_stack_lvl+0x8c/0xd0 [ 32.298081] print_report+0x118/0x5e8 [ 32.298249] kasan_report+0xdc/0x128 [ 32.298367] __asan_report_store1_noabort+0x20/0x30 [ 32.298419] krealloc_more_oob_helper+0x60c/0x678 [ 32.298467] krealloc_more_oob+0x20/0x38 [ 32.298701] kunit_try_run_case+0x170/0x3f0 [ 32.298775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.298909] kthread+0x328/0x630 [ 32.298971] ret_from_fork+0x10/0x20 [ 32.299108] [ 32.299147] Allocated by task 187: [ 32.299177] kasan_save_stack+0x3c/0x68 [ 32.299216] kasan_save_track+0x20/0x40 [ 32.299276] kasan_save_alloc_info+0x40/0x58 [ 32.299314] __kasan_krealloc+0x118/0x178 [ 32.299348] krealloc_noprof+0x128/0x360 [ 32.299412] krealloc_more_oob_helper+0x168/0x678 [ 32.299453] krealloc_more_oob+0x20/0x38 [ 32.299490] kunit_try_run_case+0x170/0x3f0 [ 32.299526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299707] kthread+0x328/0x630 [ 32.299841] ret_from_fork+0x10/0x20 [ 32.299932] [ 32.300030] The buggy address belongs to the object at fff00000c8575c00 [ 32.300030] which belongs to the cache kmalloc-256 of size 256 [ 32.300135] The buggy address is located 0 bytes to the right of [ 32.300135] allocated 235-byte region [fff00000c8575c00, fff00000c8575ceb) [ 32.300254] [ 32.300333] The buggy address belongs to the physical page: [ 32.300372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.300657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.300807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.300909] page_type: f5(slab) [ 32.301004] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.301109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.301223] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.301272] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.301724] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.301836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.301971] page dumped because: kasan: bad access detected [ 32.302012] [ 32.302031] Memory state around the buggy address: [ 32.302184] fff00000c8575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302398] fff00000c8575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.302532] >fff00000c8575c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.302683] ^ [ 32.302768] fff00000c8575d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302850] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302934] ================================================================== [ 32.304001] ================================================================== [ 32.304056] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.304254] Write of size 1 at addr fff00000c8575cf0 by task kunit_try_catch/187 [ 32.304339] [ 32.304373] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.304490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.304713] Hardware name: linux,dummy-virt (DT) [ 32.304802] Call trace: [ 32.304853] show_stack+0x20/0x38 (C) [ 32.305216] dump_stack_lvl+0x8c/0xd0 [ 32.305286] print_report+0x118/0x5e8 [ 32.305371] kasan_report+0xdc/0x128 [ 32.305416] __asan_report_store1_noabort+0x20/0x30 [ 32.305488] krealloc_more_oob_helper+0x5c0/0x678 [ 32.305552] krealloc_more_oob+0x20/0x38 [ 32.305618] kunit_try_run_case+0x170/0x3f0 [ 32.305693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.305976] kthread+0x328/0x630 [ 32.306046] ret_from_fork+0x10/0x20 [ 32.306119] [ 32.306189] Allocated by task 187: [ 32.306237] kasan_save_stack+0x3c/0x68 [ 32.306294] kasan_save_track+0x20/0x40 [ 32.306329] kasan_save_alloc_info+0x40/0x58 [ 32.306412] __kasan_krealloc+0x118/0x178 [ 32.306447] krealloc_noprof+0x128/0x360 [ 32.306481] krealloc_more_oob_helper+0x168/0x678 [ 32.306566] krealloc_more_oob+0x20/0x38 [ 32.306603] kunit_try_run_case+0x170/0x3f0 [ 32.306638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.306945] kthread+0x328/0x630 [ 32.307093] ret_from_fork+0x10/0x20 [ 32.307184] [ 32.307292] The buggy address belongs to the object at fff00000c8575c00 [ 32.307292] which belongs to the cache kmalloc-256 of size 256 [ 32.307406] The buggy address is located 5 bytes to the right of [ 32.307406] allocated 235-byte region [fff00000c8575c00, fff00000c8575ceb) [ 32.307520] [ 32.307569] The buggy address belongs to the physical page: [ 32.307664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108574 [ 32.308066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.308173] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.308282] page_type: f5(slab) [ 32.308366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.308465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.308588] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 32.308685] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.308762] head: 0bfffe0000000001 ffffc1ffc3215d01 00000000ffffffff 00000000ffffffff [ 32.308810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.308990] page dumped because: kasan: bad access detected [ 32.309021] [ 32.309039] Memory state around the buggy address: [ 32.309070] fff00000c8575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309112] fff00000c8575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.309334] >fff00000c8575c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.309391] ^ [ 32.309661] fff00000c8575d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309822] fff00000c8575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.309947] ================================================================== [ 32.354702] ================================================================== [ 32.354779] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.354846] Write of size 1 at addr fff00000c99620f0 by task kunit_try_catch/191 [ 32.354930] [ 32.355038] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.355203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.355280] Hardware name: linux,dummy-virt (DT) [ 32.355331] Call trace: [ 32.355353] show_stack+0x20/0x38 (C) [ 32.355401] dump_stack_lvl+0x8c/0xd0 [ 32.355462] print_report+0x118/0x5e8 [ 32.355722] kasan_report+0xdc/0x128 [ 32.355937] __asan_report_store1_noabort+0x20/0x30 [ 32.356065] krealloc_more_oob_helper+0x5c0/0x678 [ 32.356265] krealloc_large_more_oob+0x20/0x38 [ 32.356385] kunit_try_run_case+0x170/0x3f0 [ 32.356498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.356605] kthread+0x328/0x630 [ 32.356688] ret_from_fork+0x10/0x20 [ 32.356795] [ 32.356827] The buggy address belongs to the physical page: [ 32.356882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.357254] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.357316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.357369] page_type: f8(unknown) [ 32.357416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.357465] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.357512] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.357558] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.357605] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.358221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.358306] page dumped because: kasan: bad access detected [ 32.358363] [ 32.358410] Memory state around the buggy address: [ 32.358613] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.358878] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.359052] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.359123] ^ [ 32.359165] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.359478] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.359692] ================================================================== [ 32.350317] ================================================================== [ 32.350403] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.350465] Write of size 1 at addr fff00000c99620eb by task kunit_try_catch/191 [ 32.350515] [ 32.350552] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.350636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.350663] Hardware name: linux,dummy-virt (DT) [ 32.350694] Call trace: [ 32.350717] show_stack+0x20/0x38 (C) [ 32.350779] dump_stack_lvl+0x8c/0xd0 [ 32.350830] print_report+0x118/0x5e8 [ 32.350873] kasan_report+0xdc/0x128 [ 32.350914] __asan_report_store1_noabort+0x20/0x30 [ 32.351326] krealloc_more_oob_helper+0x60c/0x678 [ 32.351427] krealloc_large_more_oob+0x20/0x38 [ 32.351498] kunit_try_run_case+0x170/0x3f0 [ 32.351580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351678] kthread+0x328/0x630 [ 32.351742] ret_from_fork+0x10/0x20 [ 32.351859] [ 32.351882] The buggy address belongs to the physical page: [ 32.351957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109960 [ 32.352020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.352066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.352119] page_type: f8(unknown) [ 32.352192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.352242] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.352290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.352336] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.352537] head: 0bfffe0000000002 ffffc1ffc3265801 00000000ffffffff 00000000ffffffff [ 32.352598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.352689] page dumped because: kasan: bad access detected [ 32.352757] [ 32.352776] Memory state around the buggy address: [ 32.352835] fff00000c9961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.352898] fff00000c9962000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.352984] >fff00000c9962080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.353043] ^ [ 32.353110] fff00000c9962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.353196] fff00000c9962180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.353266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 32.259409] ================================================================== [ 32.259873] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 32.260289] Free of addr fff00000c99a0001 by task kunit_try_catch/181 [ 32.260386] [ 32.260431] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.260525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.260553] Hardware name: linux,dummy-virt (DT) [ 32.260822] Call trace: [ 32.260966] show_stack+0x20/0x38 (C) [ 32.261031] dump_stack_lvl+0x8c/0xd0 [ 32.261079] print_report+0x118/0x5e8 [ 32.261293] kasan_report_invalid_free+0xc0/0xe8 [ 32.261563] __kasan_kfree_large+0x5c/0xa8 [ 32.261818] free_large_kmalloc+0x68/0x150 [ 32.262081] kfree+0x270/0x3c8 [ 32.262150] kmalloc_large_invalid_free+0x108/0x270 [ 32.262200] kunit_try_run_case+0x170/0x3f0 [ 32.262588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.262732] kthread+0x328/0x630 [ 32.262795] ret_from_fork+0x10/0x20 [ 32.262922] [ 32.263013] The buggy address belongs to the physical page: [ 32.263453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0 [ 32.263542] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.263812] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.264040] page_type: f8(unknown) [ 32.264104] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.264286] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.264362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.264489] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.264584] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff [ 32.264853] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.265216] page dumped because: kasan: bad access detected [ 32.265282] [ 32.265397] Memory state around the buggy address: [ 32.265434] fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.265788] fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.266050] >fff00000c99a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.266226] ^ [ 32.266333] fff00000c99a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.266388] fff00000c99a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.266772] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 32.238218] ================================================================== [ 32.238401] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 32.238761] Read of size 1 at addr fff00000c99a0000 by task kunit_try_catch/179 [ 32.238832] [ 32.238990] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.239118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.239211] Hardware name: linux,dummy-virt (DT) [ 32.239247] Call trace: [ 32.239272] show_stack+0x20/0x38 (C) [ 32.239324] dump_stack_lvl+0x8c/0xd0 [ 32.239725] print_report+0x118/0x5e8 [ 32.239819] kasan_report+0xdc/0x128 [ 32.240133] __asan_report_load1_noabort+0x20/0x30 [ 32.240403] kmalloc_large_uaf+0x2cc/0x2f8 [ 32.240608] kunit_try_run_case+0x170/0x3f0 [ 32.240724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.240817] kthread+0x328/0x630 [ 32.240942] ret_from_fork+0x10/0x20 [ 32.241100] [ 32.241125] The buggy address belongs to the physical page: [ 32.241178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0 [ 32.241521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.241699] raw: 0bfffe0000000000 ffffc1ffc3166108 fff00000da450d00 0000000000000000 [ 32.241833] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 32.241877] page dumped because: kasan: bad access detected [ 32.241907] [ 32.241926] Memory state around the buggy address: [ 32.241991] fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.242045] fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.242087] >fff00000c99a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.242129] ^ [ 32.242165] fff00000c99a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.242207] fff00000c99a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.242246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 32.220845] ================================================================== [ 32.221548] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 32.221785] Write of size 1 at addr fff00000c99a200a by task kunit_try_catch/177 [ 32.221838] [ 32.222053] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.222169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.222435] Hardware name: linux,dummy-virt (DT) [ 32.222486] Call trace: [ 32.222560] show_stack+0x20/0x38 (C) [ 32.222619] dump_stack_lvl+0x8c/0xd0 [ 32.222687] print_report+0x118/0x5e8 [ 32.222739] kasan_report+0xdc/0x128 [ 32.222795] __asan_report_store1_noabort+0x20/0x30 [ 32.222843] kmalloc_large_oob_right+0x278/0x2b8 [ 32.222896] kunit_try_run_case+0x170/0x3f0 [ 32.223128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.223531] kthread+0x328/0x630 [ 32.223587] ret_from_fork+0x10/0x20 [ 32.223902] [ 32.223951] The buggy address belongs to the physical page: [ 32.223994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0 [ 32.224050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.224119] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.224192] page_type: f8(unknown) [ 32.224241] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.224297] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.224362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.224420] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.224471] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff [ 32.224519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.224568] page dumped because: kasan: bad access detected [ 32.224613] [ 32.224632] Memory state around the buggy address: [ 32.224685] fff00000c99a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.224741] fff00000c99a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.224805] >fff00000c99a2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.225233] ^ [ 32.225653] fff00000c99a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.225712] fff00000c99a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.225773] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 32.194126] ================================================================== [ 32.194658] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.194728] Write of size 1 at addr fff00000c6605f00 by task kunit_try_catch/175 [ 32.194793] [ 32.195089] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.195671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.195739] Hardware name: linux,dummy-virt (DT) [ 32.196129] Call trace: [ 32.196210] show_stack+0x20/0x38 (C) [ 32.196284] dump_stack_lvl+0x8c/0xd0 [ 32.196411] print_report+0x118/0x5e8 [ 32.196508] kasan_report+0xdc/0x128 [ 32.196585] __asan_report_store1_noabort+0x20/0x30 [ 32.196736] kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.197036] kunit_try_run_case+0x170/0x3f0 [ 32.197314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.197418] kthread+0x328/0x630 [ 32.197565] ret_from_fork+0x10/0x20 [ 32.197660] [ 32.197679] Allocated by task 175: [ 32.197937] kasan_save_stack+0x3c/0x68 [ 32.198215] kasan_save_track+0x20/0x40 [ 32.198595] kasan_save_alloc_info+0x40/0x58 [ 32.198740] __kasan_kmalloc+0xd4/0xd8 [ 32.198894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.199084] kmalloc_big_oob_right+0xb8/0x2f0 [ 32.199128] kunit_try_run_case+0x170/0x3f0 [ 32.199187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.199582] kthread+0x328/0x630 [ 32.199740] ret_from_fork+0x10/0x20 [ 32.199809] [ 32.199903] The buggy address belongs to the object at fff00000c6604000 [ 32.199903] which belongs to the cache kmalloc-8k of size 8192 [ 32.200000] The buggy address is located 0 bytes to the right of [ 32.200000] allocated 7936-byte region [fff00000c6604000, fff00000c6605f00) [ 32.200098] [ 32.200326] The buggy address belongs to the physical page: [ 32.200643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106600 [ 32.200826] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.200905] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.201236] page_type: f5(slab) [ 32.201503] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 32.201635] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.201698] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 32.201927] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.202261] head: 0bfffe0000000003 ffffc1ffc3198001 00000000ffffffff 00000000ffffffff [ 32.202355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.202433] page dumped because: kasan: bad access detected [ 32.202534] [ 32.202589] Memory state around the buggy address: [ 32.202625] fff00000c6605e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.202771] fff00000c6605e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.203017] >fff00000c6605f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203275] ^ [ 32.203389] fff00000c6605f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203512] fff00000c6606000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.203552] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 32.176905] ================================================================== [ 32.176966] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 32.177021] Write of size 1 at addr fff00000c3f77f78 by task kunit_try_catch/173 [ 32.177564] [ 32.177626] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.178002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.178044] Hardware name: linux,dummy-virt (DT) [ 32.178250] Call trace: [ 32.178293] show_stack+0x20/0x38 (C) [ 32.178384] dump_stack_lvl+0x8c/0xd0 [ 32.178616] print_report+0x118/0x5e8 [ 32.178773] kasan_report+0xdc/0x128 [ 32.178907] __asan_report_store1_noabort+0x20/0x30 [ 32.179226] kmalloc_track_caller_oob_right+0x418/0x488 [ 32.179280] kunit_try_run_case+0x170/0x3f0 [ 32.179620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.179914] kthread+0x328/0x630 [ 32.180034] ret_from_fork+0x10/0x20 [ 32.180152] [ 32.180239] Allocated by task 173: [ 32.180297] kasan_save_stack+0x3c/0x68 [ 32.180356] kasan_save_track+0x20/0x40 [ 32.180464] kasan_save_alloc_info+0x40/0x58 [ 32.180561] __kasan_kmalloc+0xd4/0xd8 [ 32.180791] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.180875] kmalloc_track_caller_oob_right+0x184/0x488 [ 32.181080] kunit_try_run_case+0x170/0x3f0 [ 32.181133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.181177] kthread+0x328/0x630 [ 32.181209] ret_from_fork+0x10/0x20 [ 32.181253] [ 32.181273] The buggy address belongs to the object at fff00000c3f77f00 [ 32.181273] which belongs to the cache kmalloc-128 of size 128 [ 32.181355] The buggy address is located 0 bytes to the right of [ 32.181355] allocated 120-byte region [fff00000c3f77f00, fff00000c3f77f78) [ 32.181428] [ 32.181456] The buggy address belongs to the physical page: [ 32.181490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.181540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.181597] page_type: f5(slab) [ 32.181651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.181702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.181740] page dumped because: kasan: bad access detected [ 32.182470] [ 32.182526] Memory state around the buggy address: [ 32.182579] fff00000c3f77e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.182866] fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183078] >fff00000c3f77f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.183248] ^ [ 32.183587] fff00000c3f77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.183798] fff00000c3f78000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.183867] ================================================================== [ 32.165422] ================================================================== [ 32.165714] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.165821] Write of size 1 at addr fff00000c3f77e78 by task kunit_try_catch/173 [ 32.166050] [ 32.166102] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.166552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.166704] Hardware name: linux,dummy-virt (DT) [ 32.166775] Call trace: [ 32.166801] show_stack+0x20/0x38 (C) [ 32.166935] dump_stack_lvl+0x8c/0xd0 [ 32.167042] print_report+0x118/0x5e8 [ 32.167117] kasan_report+0xdc/0x128 [ 32.167193] __asan_report_store1_noabort+0x20/0x30 [ 32.167582] kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.167782] kunit_try_run_case+0x170/0x3f0 [ 32.167879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.168013] kthread+0x328/0x630 [ 32.168108] ret_from_fork+0x10/0x20 [ 32.168626] [ 32.168765] Allocated by task 173: [ 32.168869] kasan_save_stack+0x3c/0x68 [ 32.168912] kasan_save_track+0x20/0x40 [ 32.169249] kasan_save_alloc_info+0x40/0x58 [ 32.169479] __kasan_kmalloc+0xd4/0xd8 [ 32.169541] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.169683] kmalloc_track_caller_oob_right+0xa8/0x488 [ 32.169971] kunit_try_run_case+0x170/0x3f0 [ 32.170273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.170360] kthread+0x328/0x630 [ 32.170429] ret_from_fork+0x10/0x20 [ 32.170528] [ 32.170597] The buggy address belongs to the object at fff00000c3f77e00 [ 32.170597] which belongs to the cache kmalloc-128 of size 128 [ 32.170675] The buggy address is located 0 bytes to the right of [ 32.170675] allocated 120-byte region [fff00000c3f77e00, fff00000c3f77e78) [ 32.171030] [ 32.171282] The buggy address belongs to the physical page: [ 32.171349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.171467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.171574] page_type: f5(slab) [ 32.171710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.171927] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.172083] page dumped because: kasan: bad access detected [ 32.172230] [ 32.172290] Memory state around the buggy address: [ 32.172477] fff00000c3f77d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.172562] fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.172619] >fff00000c3f77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.172824] ^ [ 32.173106] fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.173164] fff00000c3f77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.173254] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 32.144722] ================================================================== [ 32.144853] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 32.144918] Read of size 1 at addr fff00000c9879000 by task kunit_try_catch/171 [ 32.145186] [ 32.145290] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.145400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.145435] Hardware name: linux,dummy-virt (DT) [ 32.145619] Call trace: [ 32.145662] show_stack+0x20/0x38 (C) [ 32.145866] dump_stack_lvl+0x8c/0xd0 [ 32.146183] print_report+0x118/0x5e8 [ 32.146357] kasan_report+0xdc/0x128 [ 32.146853] __asan_report_load1_noabort+0x20/0x30 [ 32.146955] kmalloc_node_oob_right+0x2f4/0x330 [ 32.147218] kunit_try_run_case+0x170/0x3f0 [ 32.147306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.147527] kthread+0x328/0x630 [ 32.147853] ret_from_fork+0x10/0x20 [ 32.148016] [ 32.148075] Allocated by task 171: [ 32.148198] kasan_save_stack+0x3c/0x68 [ 32.148275] kasan_save_track+0x20/0x40 [ 32.148385] kasan_save_alloc_info+0x40/0x58 [ 32.148460] __kasan_kmalloc+0xd4/0xd8 [ 32.148500] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 32.148578] kmalloc_node_oob_right+0xbc/0x330 [ 32.148624] kunit_try_run_case+0x170/0x3f0 [ 32.148660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.148700] kthread+0x328/0x630 [ 32.148742] ret_from_fork+0x10/0x20 [ 32.148799] [ 32.148829] The buggy address belongs to the object at fff00000c9878000 [ 32.148829] which belongs to the cache kmalloc-4k of size 4096 [ 32.148896] The buggy address is located 0 bytes to the right of [ 32.148896] allocated 4096-byte region [fff00000c9878000, fff00000c9879000) [ 32.148968] [ 32.148989] The buggy address belongs to the physical page: [ 32.149175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109878 [ 32.149296] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.149378] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.149460] page_type: f5(slab) [ 32.149502] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 32.149563] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.149633] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 32.149697] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.149765] head: 0bfffe0000000003 ffffc1ffc3261e01 00000000ffffffff 00000000ffffffff [ 32.149813] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.150153] page dumped because: kasan: bad access detected [ 32.150563] [ 32.150616] Memory state around the buggy address: [ 32.150934] fff00000c9878f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.151292] fff00000c9878f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.151366] >fff00000c9879000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.151405] ^ [ 32.152028] fff00000c9879080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.152119] fff00000c9879100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.152187] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 32.130324] ================================================================== [ 32.130417] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 32.130477] Read of size 1 at addr fff00000c868343f by task kunit_try_catch/169 [ 32.131372] [ 32.131424] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.131512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.131539] Hardware name: linux,dummy-virt (DT) [ 32.131572] Call trace: [ 32.131596] show_stack+0x20/0x38 (C) [ 32.131646] dump_stack_lvl+0x8c/0xd0 [ 32.131693] print_report+0x118/0x5e8 [ 32.131736] kasan_report+0xdc/0x128 [ 32.131789] __asan_report_load1_noabort+0x20/0x30 [ 32.131837] kmalloc_oob_left+0x2ec/0x320 [ 32.131884] kunit_try_run_case+0x170/0x3f0 [ 32.131930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.131981] kthread+0x328/0x630 [ 32.132023] ret_from_fork+0x10/0x20 [ 32.132071] [ 32.132090] Allocated by task 110: [ 32.132121] kasan_save_stack+0x3c/0x68 [ 32.132158] kasan_save_track+0x20/0x40 [ 32.132191] kasan_save_alloc_info+0x40/0x58 [ 32.132227] __kasan_kmalloc+0xd4/0xd8 [ 32.132260] __kmalloc_noprof+0x198/0x4c8 [ 32.132298] kunit_kmalloc_array+0x34/0x88 [ 32.132333] test_readerwriter+0x3b0/0x948 [ 32.132373] kunit_try_run_case+0x170/0x3f0 [ 32.132409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.132450] kthread+0x328/0x630 [ 32.132481] ret_from_fork+0x10/0x20 [ 32.132515] [ 32.132551] Freed by task 112: [ 32.132591] kasan_save_stack+0x3c/0x68 [ 32.132626] kasan_save_track+0x20/0x40 [ 32.132660] kasan_save_free_info+0x4c/0x78 [ 32.132696] __kasan_slab_free+0x6c/0x98 [ 32.132729] kfree+0x214/0x3c8 [ 32.132773] kfree_action_wrapper+0x18/0x30 [ 32.132810] __kunit_action_free+0x58/0x80 [ 32.132845] kunit_remove_resource+0x14c/0x1f8 [ 32.132882] kunit_cleanup+0x6c/0x108 [ 32.132915] kunit_try_run_case_cleanup+0xa4/0xe0 [ 32.132952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.132992] kthread+0x328/0x630 [ 32.133024] ret_from_fork+0x10/0x20 [ 32.133065] [ 32.133087] The buggy address belongs to the object at fff00000c8683420 [ 32.133087] which belongs to the cache kmalloc-16 of size 16 [ 32.133142] The buggy address is located 15 bytes to the right of [ 32.133142] allocated 16-byte region [fff00000c8683420, fff00000c8683430) [ 32.133204] [ 32.133225] The buggy address belongs to the physical page: [ 32.133265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108683 [ 32.133317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.133366] page_type: f5(slab) [ 32.133406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.133454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.133493] page dumped because: kasan: bad access detected [ 32.133523] [ 32.133541] Memory state around the buggy address: [ 32.133572] fff00000c8683300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.133614] fff00000c8683380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.133657] >fff00000c8683400: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 32.133694] ^ [ 32.133727] fff00000c8683480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.134492] fff00000c8683500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.134570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 32.094826] ================================================================== [ 32.095144] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 32.096066] Write of size 1 at addr fff00000c3f77d73 by task kunit_try_catch/167 [ 32.096384] [ 32.098270] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.098475] Tainted: [N]=TEST [ 32.098522] Hardware name: linux,dummy-virt (DT) [ 32.098835] Call trace: [ 32.099460] show_stack+0x20/0x38 (C) [ 32.099720] dump_stack_lvl+0x8c/0xd0 [ 32.099937] print_report+0x118/0x5e8 [ 32.099985] kasan_report+0xdc/0x128 [ 32.100029] __asan_report_store1_noabort+0x20/0x30 [ 32.100080] kmalloc_oob_right+0x5a4/0x660 [ 32.100126] kunit_try_run_case+0x170/0x3f0 [ 32.100368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.100534] kthread+0x328/0x630 [ 32.100648] ret_from_fork+0x10/0x20 [ 32.101662] [ 32.101712] Allocated by task 167: [ 32.102164] kasan_save_stack+0x3c/0x68 [ 32.102570] kasan_save_track+0x20/0x40 [ 32.102669] kasan_save_alloc_info+0x40/0x58 [ 32.102790] __kasan_kmalloc+0xd4/0xd8 [ 32.102845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.103198] kmalloc_oob_right+0xb0/0x660 [ 32.103443] kunit_try_run_case+0x170/0x3f0 [ 32.103670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.103814] kthread+0x328/0x630 [ 32.103904] ret_from_fork+0x10/0x20 [ 32.104017] [ 32.104113] The buggy address belongs to the object at fff00000c3f77d00 [ 32.104113] which belongs to the cache kmalloc-128 of size 128 [ 32.104246] The buggy address is located 0 bytes to the right of [ 32.104246] allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73) [ 32.104333] [ 32.104447] The buggy address belongs to the physical page: [ 32.105742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.106173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.107320] page_type: f5(slab) [ 32.108529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.108704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.109296] page dumped because: kasan: bad access detected [ 32.109463] [ 32.109493] Memory state around the buggy address: [ 32.109784] fff00000c3f77c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.109865] fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.109945] >fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.110024] ^ [ 32.110127] fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.110187] fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.110267] ================================================================== [ 32.112431] ================================================================== [ 32.112474] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 32.112532] Write of size 1 at addr fff00000c3f77d78 by task kunit_try_catch/167 [ 32.112581] [ 32.112618] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.112795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.112886] Hardware name: linux,dummy-virt (DT) [ 32.112958] Call trace: [ 32.113028] show_stack+0x20/0x38 (C) [ 32.113112] dump_stack_lvl+0x8c/0xd0 [ 32.113189] print_report+0x118/0x5e8 [ 32.113235] kasan_report+0xdc/0x128 [ 32.113278] __asan_report_store1_noabort+0x20/0x30 [ 32.113326] kmalloc_oob_right+0x538/0x660 [ 32.113593] kunit_try_run_case+0x170/0x3f0 [ 32.113719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.113821] kthread+0x328/0x630 [ 32.113898] ret_from_fork+0x10/0x20 [ 32.113946] [ 32.114215] Allocated by task 167: [ 32.114292] kasan_save_stack+0x3c/0x68 [ 32.114547] kasan_save_track+0x20/0x40 [ 32.114607] kasan_save_alloc_info+0x40/0x58 [ 32.114725] __kasan_kmalloc+0xd4/0xd8 [ 32.114820] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.114908] kmalloc_oob_right+0xb0/0x660 [ 32.114974] kunit_try_run_case+0x170/0x3f0 [ 32.115013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.115222] kthread+0x328/0x630 [ 32.115328] ret_from_fork+0x10/0x20 [ 32.115415] [ 32.115498] The buggy address belongs to the object at fff00000c3f77d00 [ 32.115498] which belongs to the cache kmalloc-128 of size 128 [ 32.115618] The buggy address is located 5 bytes to the right of [ 32.115618] allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73) [ 32.115683] [ 32.115703] The buggy address belongs to the physical page: [ 32.115767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.115823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.116087] page_type: f5(slab) [ 32.116225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.116324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.116464] page dumped because: kasan: bad access detected [ 32.116515] [ 32.116533] Memory state around the buggy address: [ 32.116588] fff00000c3f77c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.116900] fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.117012] >fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.117136] ^ [ 32.117228] fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.117274] fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.117459] ================================================================== [ 32.118536] ================================================================== [ 32.118586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 32.118636] Read of size 1 at addr fff00000c3f77d80 by task kunit_try_catch/167 [ 32.118683] [ 32.118715] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.118932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.119008] Hardware name: linux,dummy-virt (DT) [ 32.119040] Call trace: [ 32.119063] show_stack+0x20/0x38 (C) [ 32.119152] dump_stack_lvl+0x8c/0xd0 [ 32.119288] print_report+0x118/0x5e8 [ 32.119376] kasan_report+0xdc/0x128 [ 32.119517] __asan_report_load1_noabort+0x20/0x30 [ 32.119581] kmalloc_oob_right+0x5d0/0x660 [ 32.119628] kunit_try_run_case+0x170/0x3f0 [ 32.119673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.119744] kthread+0x328/0x630 [ 32.119797] ret_from_fork+0x10/0x20 [ 32.119844] [ 32.119862] Allocated by task 167: [ 32.119890] kasan_save_stack+0x3c/0x68 [ 32.119926] kasan_save_track+0x20/0x40 [ 32.119960] kasan_save_alloc_info+0x40/0x58 [ 32.119996] __kasan_kmalloc+0xd4/0xd8 [ 32.120028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.120068] kmalloc_oob_right+0xb0/0x660 [ 32.120104] kunit_try_run_case+0x170/0x3f0 [ 32.120139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.120180] kthread+0x328/0x630 [ 32.120211] ret_from_fork+0x10/0x20 [ 32.120245] [ 32.120264] The buggy address belongs to the object at fff00000c3f77d00 [ 32.120264] which belongs to the cache kmalloc-128 of size 128 [ 32.120319] The buggy address is located 13 bytes to the right of [ 32.120319] allocated 115-byte region [fff00000c3f77d00, fff00000c3f77d73) [ 32.120385] [ 32.120405] The buggy address belongs to the physical page: [ 32.120437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f77 [ 32.120487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.120534] page_type: f5(slab) [ 32.120570] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.120884] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.120954] page dumped because: kasan: bad access detected [ 32.121027] [ 32.121095] Memory state around the buggy address: [ 32.121206] fff00000c3f77c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121270] fff00000c3f77d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.121311] >fff00000c3f77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121348] ^ [ 32.121374] fff00000c3f77e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121538] fff00000c3f77e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121604] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 109.493246] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/689 [ 109.496018] Modules linked in: [ 109.496719] CPU: 1 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 109.497910] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.498637] Hardware name: linux,dummy-virt (DT) [ 109.499335] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.500375] pc : intlog10+0x38/0x48 [ 109.500571] lr : intlog10_test+0xe4/0x200 [ 109.500781] sp : ffff800082207c10 [ 109.500942] x29: ffff800082207c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.501295] x26: 1ffe0000195d2aa1 x25: 0000000000000000 x24: ffff800082207ce0 [ 109.501633] x23: ffff800082207d00 x22: 0000000000000000 x21: 1ffff00010440f82 [ 109.502370] x20: ffffa667ef051e60 x19: ffff800080087990 x18: 000000009d7fc3b2 [ 109.503284] x17: 00000000fda7d2e1 x16: fff00000c99d4c3c x15: fff00000ff616b48 [ 109.505399] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: ffff74ccfe5eb189 [ 109.506166] x11: 1ffff4ccfe5eb188 x10: ffff74ccfe5eb188 x9 : ffffa667ec65b7c4 [ 109.506903] x8 : ffffa667f2f58c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.507685] x5 : ffff700010440f82 x4 : 1ffff00010010f3b x3 : 1ffff4ccfde0a3cc [ 109.508529] x2 : 1ffff4ccfde0a3cc x1 : 0000000000000003 x0 : 0000000000000000 [ 109.509429] Call trace: [ 109.509708] intlog10+0x38/0x48 (P) [ 109.510119] kunit_try_run_case+0x170/0x3f0 [ 109.510551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.511113] kthread+0x328/0x630 [ 109.511375] ret_from_fork+0x10/0x20 [ 109.511570] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 109.444984] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671 [ 109.446636] Modules linked in: [ 109.447101] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 109.448306] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 109.448967] Hardware name: linux,dummy-virt (DT) [ 109.449461] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.449922] pc : intlog2+0xd8/0xf8 [ 109.450104] lr : intlog2_test+0xe4/0x200 [ 109.450299] sp : ffff800082197c10 [ 109.450458] x29: ffff800082197c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.450942] x26: 1ffe000018d55d61 x25: 0000000000000000 x24: ffff800082197ce0 [ 109.451872] x23: ffff800082197d00 x22: 0000000000000000 x21: 1ffff00010432f82 [ 109.452606] x20: ffffa667ef051d60 x19: ffff800080087990 x18: 000000000a57c5dc [ 109.453334] x17: 00000000ea82a36e x16: fff00000c99d4c3c x15: fff00000ff616b48 [ 109.454093] x14: 0000000000018fff x13: 1ffe00001b4899dd x12: ffff74ccfe5eb189 [ 109.454842] x11: 1ffff4ccfe5eb188 x10: ffff74ccfe5eb188 x9 : ffffa667ec65b9c4 [ 109.455672] x8 : ffffa667f2f58c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.456338] x5 : ffff700010432f82 x4 : 1ffff00010010f3b x3 : 1ffff4ccfde0a3ac [ 109.456678] x2 : 1ffff4ccfde0a3ac x1 : 0000000000000003 x0 : 0000000000000000 [ 109.457417] Call trace: [ 109.457690] intlog2+0xd8/0xf8 (P) [ 109.458081] kunit_try_run_case+0x170/0x3f0 [ 109.458542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.458884] kthread+0x328/0x630 [ 109.459588] ret_from_fork+0x10/0x20 [ 109.460023] ---[ end trace 0000000000000000 ]---