Date
July 25, 2025, 3:13 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 35.617301] ================================================================== [ 35.617534] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 35.617622] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.617982] [ 35.618043] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.618382] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.618486] Hardware name: linux,dummy-virt (DT) [ 35.618566] Call trace: [ 35.618615] show_stack+0x20/0x38 (C) [ 35.618751] dump_stack_lvl+0x8c/0xd0 [ 35.618844] print_report+0x118/0x5e8 [ 35.618894] kasan_report+0xdc/0x128 [ 35.618997] kasan_check_range+0x100/0x1a8 [ 35.619098] __kasan_check_write+0x20/0x30 [ 35.619333] copy_user_test_oob+0x234/0xec8 [ 35.619576] kunit_try_run_case+0x170/0x3f0 [ 35.619761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.619860] kthread+0x328/0x630 [ 35.619945] ret_from_fork+0x10/0x20 [ 35.620042] [ 35.620087] Allocated by task 317: [ 35.620134] kasan_save_stack+0x3c/0x68 [ 35.620186] kasan_save_track+0x20/0x40 [ 35.620224] kasan_save_alloc_info+0x40/0x58 [ 35.620265] __kasan_kmalloc+0xd4/0xd8 [ 35.620301] __kmalloc_noprof+0x198/0x4c8 [ 35.620343] kunit_kmalloc_array+0x34/0x88 [ 35.620383] copy_user_test_oob+0xac/0xec8 [ 35.620424] kunit_try_run_case+0x170/0x3f0 [ 35.620472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.620517] kthread+0x328/0x630 [ 35.620553] ret_from_fork+0x10/0x20 [ 35.620601] [ 35.620624] The buggy address belongs to the object at fff00000c9a8b900 [ 35.620624] which belongs to the cache kmalloc-128 of size 128 [ 35.621206] The buggy address is located 0 bytes inside of [ 35.621206] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.621666] [ 35.621870] The buggy address belongs to the physical page: [ 35.621967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.622148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.622265] page_type: f5(slab) [ 35.622829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.622900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.623046] page dumped because: kasan: bad access detected [ 35.623114] [ 35.623233] Memory state around the buggy address: [ 35.623350] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.623397] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.623448] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.623878] ^ [ 35.623973] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.624145] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.624208] ================================================================== [ 35.677243] ================================================================== [ 35.677307] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 35.677368] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.677436] [ 35.677472] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.677564] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.677598] Hardware name: linux,dummy-virt (DT) [ 35.677802] Call trace: [ 35.677842] show_stack+0x20/0x38 (C) [ 35.677897] dump_stack_lvl+0x8c/0xd0 [ 35.677950] print_report+0x118/0x5e8 [ 35.678000] kasan_report+0xdc/0x128 [ 35.678046] kasan_check_range+0x100/0x1a8 [ 35.678102] __kasan_check_read+0x20/0x30 [ 35.678150] copy_user_test_oob+0x4a0/0xec8 [ 35.678210] kunit_try_run_case+0x170/0x3f0 [ 35.678260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.678323] kthread+0x328/0x630 [ 35.678369] ret_from_fork+0x10/0x20 [ 35.678418] [ 35.678440] Allocated by task 317: [ 35.678480] kasan_save_stack+0x3c/0x68 [ 35.678523] kasan_save_track+0x20/0x40 [ 35.678561] kasan_save_alloc_info+0x40/0x58 [ 35.678601] __kasan_kmalloc+0xd4/0xd8 [ 35.678926] __kmalloc_noprof+0x198/0x4c8 [ 35.679024] kunit_kmalloc_array+0x34/0x88 [ 35.679438] copy_user_test_oob+0xac/0xec8 [ 35.679918] kunit_try_run_case+0x170/0x3f0 [ 35.680003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.680086] kthread+0x328/0x630 [ 35.680164] ret_from_fork+0x10/0x20 [ 35.680612] [ 35.681030] The buggy address belongs to the object at fff00000c9a8b900 [ 35.681030] which belongs to the cache kmalloc-128 of size 128 [ 35.681323] The buggy address is located 0 bytes inside of [ 35.681323] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.681427] [ 35.681585] The buggy address belongs to the physical page: [ 35.681800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.682253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.682967] page_type: f5(slab) [ 35.683093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.683155] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.683327] page dumped because: kasan: bad access detected [ 35.683497] [ 35.683693] Memory state around the buggy address: [ 35.684147] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.684343] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.684408] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.684616] ^ [ 35.684826] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.684967] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.685082] ================================================================== [ 35.668193] ================================================================== [ 35.668397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 35.668458] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.668776] [ 35.668942] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.669308] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.669449] Hardware name: linux,dummy-virt (DT) [ 35.669517] Call trace: [ 35.669544] show_stack+0x20/0x38 (C) [ 35.669597] dump_stack_lvl+0x8c/0xd0 [ 35.669700] print_report+0x118/0x5e8 [ 35.669748] kasan_report+0xdc/0x128 [ 35.669822] kasan_check_range+0x100/0x1a8 [ 35.670061] __kasan_check_write+0x20/0x30 [ 35.670396] copy_user_test_oob+0x434/0xec8 [ 35.670489] kunit_try_run_case+0x170/0x3f0 [ 35.670541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.670597] kthread+0x328/0x630 [ 35.670748] ret_from_fork+0x10/0x20 [ 35.670802] [ 35.670842] Allocated by task 317: [ 35.670877] kasan_save_stack+0x3c/0x68 [ 35.670927] kasan_save_track+0x20/0x40 [ 35.671004] kasan_save_alloc_info+0x40/0x58 [ 35.671052] __kasan_kmalloc+0xd4/0xd8 [ 35.671091] __kmalloc_noprof+0x198/0x4c8 [ 35.671135] kunit_kmalloc_array+0x34/0x88 [ 35.671321] copy_user_test_oob+0xac/0xec8 [ 35.671635] kunit_try_run_case+0x170/0x3f0 [ 35.671729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.671916] kthread+0x328/0x630 [ 35.671967] ret_from_fork+0x10/0x20 [ 35.672170] [ 35.672215] The buggy address belongs to the object at fff00000c9a8b900 [ 35.672215] which belongs to the cache kmalloc-128 of size 128 [ 35.672719] The buggy address is located 0 bytes inside of [ 35.672719] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.673153] [ 35.673257] The buggy address belongs to the physical page: [ 35.673337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.673424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.674003] page_type: f5(slab) [ 35.674249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.674418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.674462] page dumped because: kasan: bad access detected [ 35.674814] [ 35.674950] Memory state around the buggy address: [ 35.675130] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.675366] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.675467] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.675614] ^ [ 35.675859] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.676151] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.676277] ================================================================== [ 35.630017] ================================================================== [ 35.630981] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 35.631114] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.631711] [ 35.631810] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.631951] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.632270] Hardware name: linux,dummy-virt (DT) [ 35.632338] Call trace: [ 35.632427] show_stack+0x20/0x38 (C) [ 35.632502] dump_stack_lvl+0x8c/0xd0 [ 35.632720] print_report+0x118/0x5e8 [ 35.632810] kasan_report+0xdc/0x128 [ 35.632857] kasan_check_range+0x100/0x1a8 [ 35.633278] __kasan_check_read+0x20/0x30 [ 35.633620] copy_user_test_oob+0x728/0xec8 [ 35.633712] kunit_try_run_case+0x170/0x3f0 [ 35.633849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.633918] kthread+0x328/0x630 [ 35.634246] ret_from_fork+0x10/0x20 [ 35.634360] [ 35.634418] Allocated by task 317: [ 35.634450] kasan_save_stack+0x3c/0x68 [ 35.634692] kasan_save_track+0x20/0x40 [ 35.634777] kasan_save_alloc_info+0x40/0x58 [ 35.634959] __kasan_kmalloc+0xd4/0xd8 [ 35.635221] __kmalloc_noprof+0x198/0x4c8 [ 35.635376] kunit_kmalloc_array+0x34/0x88 [ 35.635494] copy_user_test_oob+0xac/0xec8 [ 35.635595] kunit_try_run_case+0x170/0x3f0 [ 35.635917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.636080] kthread+0x328/0x630 [ 35.636167] ret_from_fork+0x10/0x20 [ 35.636626] [ 35.636796] The buggy address belongs to the object at fff00000c9a8b900 [ 35.636796] which belongs to the cache kmalloc-128 of size 128 [ 35.636901] The buggy address is located 0 bytes inside of [ 35.636901] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.637304] [ 35.637584] The buggy address belongs to the physical page: [ 35.638036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.638115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.638427] page_type: f5(slab) [ 35.638537] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.638841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.638986] page dumped because: kasan: bad access detected [ 35.639024] [ 35.639045] Memory state around the buggy address: [ 35.639095] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.639355] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.639674] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.639766] ^ [ 35.640176] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.640612] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.640742] ================================================================== [ 35.650656] ================================================================== [ 35.650987] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 35.651419] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.651490] [ 35.651843] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.652309] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.652426] Hardware name: linux,dummy-virt (DT) [ 35.652471] Call trace: [ 35.652533] show_stack+0x20/0x38 (C) [ 35.652656] dump_stack_lvl+0x8c/0xd0 [ 35.652723] print_report+0x118/0x5e8 [ 35.652769] kasan_report+0xdc/0x128 [ 35.652815] kasan_check_range+0x100/0x1a8 [ 35.652862] __kasan_check_write+0x20/0x30 [ 35.652911] copy_user_test_oob+0x35c/0xec8 [ 35.652961] kunit_try_run_case+0x170/0x3f0 [ 35.653025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.653085] kthread+0x328/0x630 [ 35.653138] ret_from_fork+0x10/0x20 [ 35.653214] [ 35.653251] Allocated by task 317: [ 35.653283] kasan_save_stack+0x3c/0x68 [ 35.653324] kasan_save_track+0x20/0x40 [ 35.653372] kasan_save_alloc_info+0x40/0x58 [ 35.653413] __kasan_kmalloc+0xd4/0xd8 [ 35.653451] __kmalloc_noprof+0x198/0x4c8 [ 35.653494] kunit_kmalloc_array+0x34/0x88 [ 35.653533] copy_user_test_oob+0xac/0xec8 [ 35.653574] kunit_try_run_case+0x170/0x3f0 [ 35.653613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.653668] kthread+0x328/0x630 [ 35.653713] ret_from_fork+0x10/0x20 [ 35.653761] [ 35.653783] The buggy address belongs to the object at fff00000c9a8b900 [ 35.653783] which belongs to the cache kmalloc-128 of size 128 [ 35.653861] The buggy address is located 0 bytes inside of [ 35.653861] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.653946] [ 35.653970] The buggy address belongs to the physical page: [ 35.654010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.654074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.654125] page_type: f5(slab) [ 35.654167] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.654231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.654282] page dumped because: kasan: bad access detected [ 35.654314] [ 35.654344] Memory state around the buggy address: [ 35.654385] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.654453] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.654507] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.654562] ^ [ 35.654605] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.654661] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.655006] ================================================================== [ 35.656292] ================================================================== [ 35.656724] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 35.657032] Read of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.657095] [ 35.657129] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.657220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.657254] Hardware name: linux,dummy-virt (DT) [ 35.657557] Call trace: [ 35.657666] show_stack+0x20/0x38 (C) [ 35.657752] dump_stack_lvl+0x8c/0xd0 [ 35.657968] print_report+0x118/0x5e8 [ 35.658236] kasan_report+0xdc/0x128 [ 35.658306] kasan_check_range+0x100/0x1a8 [ 35.658392] __kasan_check_read+0x20/0x30 [ 35.658564] copy_user_test_oob+0x3c8/0xec8 [ 35.658670] kunit_try_run_case+0x170/0x3f0 [ 35.658925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.659088] kthread+0x328/0x630 [ 35.659141] ret_from_fork+0x10/0x20 [ 35.659206] [ 35.659227] Allocated by task 317: [ 35.659267] kasan_save_stack+0x3c/0x68 [ 35.659878] kasan_save_track+0x20/0x40 [ 35.660180] kasan_save_alloc_info+0x40/0x58 [ 35.660442] __kasan_kmalloc+0xd4/0xd8 [ 35.660942] __kmalloc_noprof+0x198/0x4c8 [ 35.661027] kunit_kmalloc_array+0x34/0x88 [ 35.661350] copy_user_test_oob+0xac/0xec8 [ 35.661931] kunit_try_run_case+0x170/0x3f0 [ 35.662075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.662142] kthread+0x328/0x630 [ 35.662745] ret_from_fork+0x10/0x20 [ 35.662865] [ 35.662939] The buggy address belongs to the object at fff00000c9a8b900 [ 35.662939] which belongs to the cache kmalloc-128 of size 128 [ 35.663215] The buggy address is located 0 bytes inside of [ 35.663215] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.663377] [ 35.663472] The buggy address belongs to the physical page: [ 35.663769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.664051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.664473] page_type: f5(slab) [ 35.664624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.664851] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.665074] page dumped because: kasan: bad access detected [ 35.665151] [ 35.665516] Memory state around the buggy address: [ 35.665714] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.665859] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666027] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.666096] ^ [ 35.666521] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666596] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666688] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 34.857112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 35.136692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 34.792607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 67.725473] Internal error: Oops: 0000000096000005 [#1] SMP [ 67.732233] Modules linked in: [ 67.733312] CPU: 0 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.734199] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.734413] Hardware name: linux,dummy-virt (DT) [ 67.734608] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.734894] pc : ext4_mb_release+0x394/0xaf8 [ 67.735843] lr : ext4_mb_release+0x37c/0xaf8 [ 67.736433] sp : ffff800080c07c50 [ 67.736917] x29: ffff800080c07c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.737791] x26: fff00000c47cf000 x25: fff00000c993a740 x24: 1ffe0000193274e8 [ 67.738617] x23: fffd8000193274e8 x22: fff00000c993a618 x21: 1ffe0000193274c3 [ 67.739613] x20: 0000000000000000 x19: fff00000c993a400 x18: 00000000699a60d6 [ 67.740495] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000655482fd [ 67.741225] x14: 0000000052f8892b x13: 1ffe000019331a64 x12: fffd8000193a1781 [ 67.741577] x11: 1ffe0000193a1780 x10: fffd8000193a1780 x9 : ffff9501ecf989fc [ 67.742341] x8 : ffff800080c079f8 x7 : 0000000000000001 x6 : ffff800080c07b10 [ 67.743134] x5 : 0000000000000001 x4 : 1ffe0000193ad001 x3 : dfff800000000000 [ 67.744154] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.744636] Call trace: [ 67.744796] ext4_mb_release+0x394/0xaf8 (P) [ 67.745019] mbt_kunit_exit+0x9c/0x2c8 [ 67.745208] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.745425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.745692] kthread+0x328/0x630 [ 67.746130] ret_from_fork+0x10/0x20 [ 67.746851] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.747901] ---[ end trace 0000000000000000 ]--- [ 67.790752] Internal error: Oops: 0000000096000005 [#3] SMP [ 67.794229] Modules linked in: [ 67.794488] CPU: 1 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.795081] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.795396] Hardware name: linux,dummy-virt (DT) [ 67.795727] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.796177] pc : ext4_mb_release+0x394/0xaf8 [ 67.796465] lr : ext4_mb_release+0x37c/0xaf8 [ 67.796749] sp : ffff800080c87c50 [ 67.796991] x29: ffff800080c87c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.797437] x26: fff00000c622c000 x25: fff00000c1414740 x24: 1ffe0000182828e8 [ 67.797942] x23: fffd8000182828e8 x22: fff00000c1414618 x21: 1ffe0000182828c3 [ 67.798583] x20: 0000000000000000 x19: fff00000c1414400 x18: 1ffff2a03de74c2e [ 67.799030] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007 [ 67.799513] x14: 0000000000000000 x13: 1ffe000019331a44 x12: fffd800019336201 [ 67.799919] x11: 1ffe000019336200 x10: fffd800019336200 x9 : ffff9501ecf989fc [ 67.800366] x8 : ffff800080c879f8 x7 : 0000000000000001 x6 : ffff800080c87b10 [ 67.801438] x5 : 0000000000000001 x4 : 1ffe000018b8a799 x3 : dfff800000000000 [ 67.801938] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.802480] Call trace: [ 67.802728] ext4_mb_release+0x394/0xaf8 (P) [ 67.803163] mbt_kunit_exit+0x9c/0x2c8 [ 67.803563] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.803920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.804271] kthread+0x328/0x630 [ 67.804496] ret_from_fork+0x10/0x20 [ 67.804815] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.805172] ---[ end trace 0000000000000000 ]--- [ 68.245749] Internal error: Oops: 0000000096000005 [#18] SMP [ 68.254126] Modules linked in: [ 68.255310] CPU: 1 UID: 0 PID: 414 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.256695] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.257503] Hardware name: linux,dummy-virt (DT) [ 68.258146] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.259019] pc : ext4_mb_release+0x394/0xaf8 [ 68.259740] lr : ext4_mb_release+0x37c/0xaf8 [ 68.260339] sp : ffff800080ca7c50 [ 68.260843] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.261773] x26: fff00000c9cf0000 x25: fff00000c1280740 x24: 1ffe0000182500e8 [ 68.262712] x23: fffd8000182500e8 x22: fff00000c1280618 x21: 1ffe0000182500c3 [ 68.263801] x20: 0000000000000000 x19: fff00000c1280400 x18: 1ffff2a03de74c2e [ 68.264891] x17: 0000000000000000 x16: fff00000c5e02c3c x15: 0000000000000007 [ 68.265769] x14: 0000000000000000 x13: 1ffe00001b4895dd x12: fffd80001942b481 [ 68.266136] x11: 1ffe00001942b480 x10: fffd80001942b480 x9 : ffff9501ecf989fc [ 68.266483] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10 [ 68.267349] x5 : 0000000000000001 x4 : 1ffe000018374289 x3 : dfff800000000000 [ 68.268039] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.268698] Call trace: [ 68.269000] ext4_mb_release+0x394/0xaf8 (P) [ 68.269258] mbt_kunit_exit+0x9c/0x2c8 [ 68.269475] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.269725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.269983] kthread+0x328/0x630 [ 68.270206] ret_from_fork+0x10/0x20 [ 68.270482] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.270812] ---[ end trace 0000000000000000 ]--- [ 68.119812] Internal error: Oops: 0000000096000005 [#14] SMP [ 68.127867] Modules linked in: [ 68.128882] CPU: 0 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.130122] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.130696] Hardware name: linux,dummy-virt (DT) [ 68.131284] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.131939] pc : ext4_mb_release+0x394/0xaf8 [ 68.132163] lr : ext4_mb_release+0x37c/0xaf8 [ 68.132360] sp : ffff800080cd7c50 [ 68.132519] x29: ffff800080cd7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.132954] x26: fff00000c9d2a000 x25: fff00000c1404740 x24: 1ffe0000182808e8 [ 68.133357] x23: fffd8000182808e8 x22: fff00000c1404618 x21: 1ffe0000182808c3 [ 68.133760] x20: 0000000000000000 x19: fff00000c1404400 x18: 1ffff2a03de74c2e [ 68.134193] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000007 [ 68.134619] x14: 0000000000000000 x13: 1ffe000019331a64 x12: fffd8000190ea881 [ 68.135188] x11: 1ffe0000190ea880 x10: fffd8000190ea880 x9 : ffff9501ecf989fc [ 68.135616] x8 : ffff800080cd79f8 x7 : 0000000000000001 x6 : ffff800080cd7b10 [ 68.136040] x5 : 0000000000000001 x4 : 1ffe000018edf001 x3 : dfff800000000000 [ 68.136459] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.136905] Call trace: [ 68.137062] ext4_mb_release+0x394/0xaf8 (P) [ 68.137344] mbt_kunit_exit+0x9c/0x2c8 [ 68.137571] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.137875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.138172] kthread+0x328/0x630 [ 68.138391] ret_from_fork+0x10/0x20 [ 68.138661] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.138965] ---[ end trace 0000000000000000 ]--- [ 68.000289] Internal error: Oops: 0000000096000005 [#10] SMP [ 68.004106] Modules linked in: [ 68.004329] CPU: 0 UID: 0 PID: 398 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.004882] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.006875] Hardware name: linux,dummy-virt (DT) [ 68.007167] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.007542] pc : ext4_mb_release+0x394/0xaf8 [ 68.007844] lr : ext4_mb_release+0x37c/0xaf8 [ 68.008088] sp : ffff800080ca7c50 [ 68.008258] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.009699] x26: fff00000c9f97000 x25: fff00000cc696740 x24: 1ffe0000198d2ce8 [ 68.010696] x23: fffd8000198d2ce8 x22: fff00000cc696618 x21: 1ffe0000198d2cc3 [ 68.011685] x20: 0000000000000000 x19: fff00000cc696400 x18: 00000000959198f5 [ 68.013139] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000d31c17a0 [ 68.014046] x14: 0000000059369a95 x13: 1ffe000019331a64 x12: fffd800019344661 [ 68.014887] x11: 1ffe000019344660 x10: fffd800019344660 x9 : ffff9501ecf989fc [ 68.015414] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10 [ 68.015878] x5 : 0000000000000001 x4 : 1ffe0000193ec001 x3 : dfff800000000000 [ 68.016303] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.016725] Call trace: [ 68.016900] ext4_mb_release+0x394/0xaf8 (P) [ 68.017181] mbt_kunit_exit+0x9c/0x2c8 [ 68.017404] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.017697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.017993] kthread+0x328/0x630 [ 68.018216] ret_from_fork+0x10/0x20 [ 68.018457] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.018795] ---[ end trace 0000000000000000 ]--- [ 67.944106] Internal error: Oops: 0000000096000005 [#8] SMP [ 67.947340] Modules linked in: [ 67.947604] CPU: 0 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.948956] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.949217] Hardware name: linux,dummy-virt (DT) [ 67.949596] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.950251] pc : ext4_mb_release+0x394/0xaf8 [ 67.951126] lr : ext4_mb_release+0x37c/0xaf8 [ 67.951389] sp : ffff800080cb7c50 [ 67.951804] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.952370] x26: fff00000c9f94000 x25: fff00000c996e740 x24: 1ffe00001932dce8 [ 67.952923] x23: fffd80001932dce8 x22: fff00000c996e618 x21: 1ffe00001932dcc3 [ 67.953466] x20: 0000000000000000 x19: fff00000c996e400 x18: 00000000b0dc6342 [ 67.954030] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000023288729 [ 67.954712] x14: 00000000f1f1f1f1 x13: 1ffe000019331a64 x12: fffd8000191f0e01 [ 67.955509] x11: 1ffe0000191f0e00 x10: fffd8000191f0e00 x9 : ffff9501ecf989fc [ 67.956098] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10 [ 67.956453] x5 : 0000000000000001 x4 : 1ffe0000193ec799 x3 : dfff800000000000 [ 67.956825] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.957422] Call trace: [ 67.957604] ext4_mb_release+0x394/0xaf8 (P) [ 67.958097] mbt_kunit_exit+0x9c/0x2c8 [ 67.958419] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.958814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.959239] kthread+0x328/0x630 [ 67.959458] ret_from_fork+0x10/0x20 [ 67.959955] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.960401] ---[ end trace 0000000000000000 ]--- [ 68.085664] Internal error: Oops: 0000000096000005 [#13] SMP [ 68.095016] Modules linked in: [ 68.095759] CPU: 0 UID: 0 PID: 404 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.097315] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.097818] Hardware name: linux,dummy-virt (DT) [ 68.098040] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.098319] pc : ext4_mb_release+0x394/0xaf8 [ 68.098545] lr : ext4_mb_release+0x37c/0xaf8 [ 68.098926] sp : ffff800080cb7c50 [ 68.099323] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.100391] x26: fff00000c9d75000 x25: fff00000c1282740 x24: 1ffe0000182504e8 [ 68.101211] x23: fffd8000182504e8 x22: fff00000c1282618 x21: 1ffe0000182504c3 [ 68.101982] x20: 0000000000000000 x19: fff00000c1282400 x18: fff00000c9ad5800 [ 68.102756] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000000000000 [ 68.103657] x14: 0000000000000000 x13: 1ffe000019331a64 x12: fffd8000193533a1 [ 68.104552] x11: 1ffe0000193533a0 x10: fffd8000193533a0 x9 : ffff9501ecf989fc [ 68.105475] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10 [ 68.106214] x5 : 0000000000000001 x4 : 1ffe000018edf511 x3 : dfff800000000000 [ 68.106550] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.106893] Call trace: [ 68.107183] ext4_mb_release+0x394/0xaf8 (P) [ 68.107892] mbt_kunit_exit+0x9c/0x2c8 [ 68.108312] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.108802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.109347] kthread+0x328/0x630 [ 68.109709] ret_from_fork+0x10/0x20 [ 68.110114] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.110702] ---[ end trace 0000000000000000 ]--- [ 68.057965] Internal error: Oops: 0000000096000005 [#12] SMP [ 68.062174] Modules linked in: [ 68.062448] CPU: 0 UID: 0 PID: 402 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.064714] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.065192] Hardware name: linux,dummy-virt (DT) [ 68.065610] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.066158] pc : ext4_mb_release+0x394/0xaf8 [ 68.066567] lr : ext4_mb_release+0x37c/0xaf8 [ 68.067033] sp : ffff800080b77c50 [ 68.067289] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.068053] x26: fff00000c9d72000 x25: fff00000c1284740 x24: 1ffe0000182508e8 [ 68.068676] x23: fffd8000182508e8 x22: fff00000c1284618 x21: 1ffe0000182508c3 [ 68.069421] x20: 0000000000000000 x19: fff00000c1284400 x18: 00000000ed2360c8 [ 68.069806] x17: 0000000000000001 x16: fff00000da44ada8 x15: 000000008f62b9f5 [ 68.070247] x14: 00000000f1f1f1f1 x13: 1ffe000019331a64 x12: fffd80001942b381 [ 68.070652] x11: 1ffe00001942b380 x10: fffd80001942b380 x9 : ffff9501ecf989fc [ 68.071050] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10 [ 68.071675] x5 : 0000000000000001 x4 : 1ffe000018edf799 x3 : dfff800000000000 [ 68.072091] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.072519] Call trace: [ 68.072691] ext4_mb_release+0x394/0xaf8 (P) [ 68.072979] mbt_kunit_exit+0x9c/0x2c8 [ 68.073188] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.073486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.073776] kthread+0x328/0x630 [ 68.074005] ret_from_fork+0x10/0x20 [ 68.074263] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.074559] ---[ end trace 0000000000000000 ]--- [ 67.971005] Internal error: Oops: 0000000096000005 [#9] SMP [ 67.975432] Modules linked in: [ 67.976109] CPU: 1 UID: 0 PID: 396 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.976708] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.977194] Hardware name: linux,dummy-virt (DT) [ 67.977536] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.978721] pc : ext4_mb_release+0x394/0xaf8 [ 67.979131] lr : ext4_mb_release+0x37c/0xaf8 [ 67.979714] sp : ffff800080b77c50 [ 67.980053] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.980720] x26: fff00000c117c000 x25: fff00000c10c4740 x24: 1ffe0000182188e8 [ 67.981281] x23: fffd8000182188e8 x22: fff00000c10c4618 x21: 1ffe0000182188c3 [ 67.981704] x20: 0000000000000000 x19: fff00000c10c4400 x18: 1ffff2a03de74c2e [ 67.982131] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007 [ 67.982532] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd800019336381 [ 67.982962] x11: 1ffe000019336380 x10: fffd800019336380 x9 : ffff9501ecf989fc [ 67.983856] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10 [ 67.984279] x5 : 0000000000000001 x4 : 1ffe000018c92ca9 x3 : dfff800000000000 [ 67.984719] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.985138] Call trace: [ 67.985298] ext4_mb_release+0x394/0xaf8 (P) [ 67.985551] mbt_kunit_exit+0x9c/0x2c8 [ 67.985815] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.986069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.986366] kthread+0x328/0x630 [ 67.986559] ret_from_fork+0x10/0x20 [ 67.986805] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.987420] ---[ end trace 0000000000000000 ]--- [ 67.817212] Internal error: Oops: 0000000096000005 [#4] SMP [ 67.821604] Modules linked in: [ 67.822194] CPU: 0 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.822800] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.823111] Hardware name: linux,dummy-virt (DT) [ 67.823383] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.824923] pc : ext4_mb_release+0x394/0xaf8 [ 67.825172] lr : ext4_mb_release+0x37c/0xaf8 [ 67.825434] sp : ffff800080c97c50 [ 67.825631] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.826085] x26: fff00000c0ccd000 x25: fff00000c997a740 x24: 1ffe00001932f4e8 [ 67.826499] x23: fffd80001932f4e8 x22: fff00000c997a618 x21: 1ffe00001932f4c3 [ 67.826929] x20: 0000000000000000 x19: fff00000c997a400 x18: 00000000c97a9800 [ 67.827781] x17: 0000000000000000 x16: fff00000da44ada8 x15: fff00000ff616b48 [ 67.828212] x14: 0000000000018fff x13: 1ffe000019331a64 x12: fffd800019344761 [ 67.828622] x11: 1ffe000019344760 x10: fffd800019344760 x9 : ffff9501ecf989fc [ 67.829051] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10 [ 67.829457] x5 : 0000000000000001 x4 : 1ffe0000193ad289 x3 : dfff800000000000 [ 67.829877] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.830275] Call trace: [ 67.830444] ext4_mb_release+0x394/0xaf8 (P) [ 67.830708] mbt_kunit_exit+0x9c/0x2c8 [ 67.830938] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.831216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.831482] kthread+0x328/0x630 [ 67.831835] ret_from_fork+0x10/0x20 [ 67.832121] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.832399] ---[ end trace 0000000000000000 ]--- [ 111.517917] Internal error: Oops: 0000000096000005 [#21] SMP [ 111.523681] Modules linked in: [ 111.524203] CPU: 0 UID: 0 PID: 420 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 111.525444] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 111.526007] Hardware name: linux,dummy-virt (DT) [ 111.526234] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 111.526510] pc : ext4_mb_release+0x394/0xaf8 [ 111.527153] lr : ext4_mb_release+0x37c/0xaf8 [ 111.527783] sp : ffff800080c97c50 [ 111.528231] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000 [ 111.528994] x26: fff00000c9cf6000 x25: fff00000cd290740 x24: 1ffe000019a520e8 [ 111.529338] x23: fffd800019a520e8 x22: fff00000cd290618 x21: 1ffe000019a520c3 [ 111.529933] x20: 0000000000000000 x19: fff00000cd290400 x18: 000000007350aeae [ 111.530789] x17: 0000000000000001 x16: fff00000da44ada8 x15: 0000000042d56b35 [ 111.531758] x14: 00000000f1f1f1f1 x13: 1ffe000019331a64 x12: fffd80001942b601 [ 111.532765] x11: 1ffe00001942b600 x10: fffd80001942b600 x9 : ffff9501ecf989fc [ 111.533520] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10 [ 111.534263] x5 : 0000000000000001 x4 : 1ffe000018c8b799 x3 : dfff800000000000 [ 111.534750] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 111.535259] Call trace: [ 111.535411] ext4_mb_release+0x394/0xaf8 (P) [ 111.535631] mbt_kunit_exit+0x9c/0x2c8 [ 111.535835] kunit_try_run_case_cleanup+0x9c/0xe0 [ 111.536048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.536281] kthread+0x328/0x630 [ 111.536458] ret_from_fork+0x10/0x20 [ 111.536677] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 111.536962] ---[ end trace 0000000000000000 ]--- [ 111.882914] Internal error: Oops: 0000000096000005 [#22] SMP [ 111.888546] Modules linked in: [ 111.889462] CPU: 0 UID: 0 PID: 564 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 111.890543] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 111.890793] Hardware name: linux,dummy-virt (DT) [ 111.891002] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 111.891865] pc : kunit_test_null_dereference+0x70/0x170 [ 111.892698] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.893183] sp : ffff800082037d30 [ 111.893353] x29: ffff800082037d90 x28: 0000000000000000 x27: 0000000000000000 [ 111.893717] x26: 1ffe0000193249c1 x25: 0000000000000000 x24: 0000000000000004 [ 111.894055] x23: fff00000c9924e0c x22: ffff9501ea847698 x21: fff00000c1b36b88 [ 111.894388] x20: 1ffff00010406fa6 x19: ffff800080087990 x18: 0000000025fa58f7 [ 111.894886] x17: 0000000000000001 x16: fff00000c5e0303c x15: 00000000bddfc96b [ 111.896045] x14: 00000000f1f1f1f1 x13: 1ffe00001b48d9dd x12: fffd800018f6111c [ 111.896744] x11: 1ffe000018f6111b x10: fffd800018f6111b x9 : ffff9501ea83ee20 [ 111.897096] x8 : ffff800082037c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 111.897429] x5 : ffff700010406fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 111.897775] x2 : dfff800000000000 x1 : fff00000c7b08000 x0 : ffff800080087990 [ 111.898110] Call trace: [ 111.898250] kunit_test_null_dereference+0x70/0x170 (P) [ 111.898492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.898742] kthread+0x328/0x630 [ 111.899579] ret_from_fork+0x10/0x20 [ 111.899865] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 111.900369] ---[ end trace 0000000000000000 ]--- [ 68.179753] Internal error: Oops: 0000000096000005 [#16] SMP [ 68.188508] Modules linked in: [ 68.189890] CPU: 1 UID: 0 PID: 410 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.191715] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.192748] Hardware name: linux,dummy-virt (DT) [ 68.193585] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.194942] pc : ext4_mb_release+0x394/0xaf8 [ 68.195357] lr : ext4_mb_release+0x37c/0xaf8 [ 68.195568] sp : ffff800080ca7c50 [ 68.195741] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.196094] x26: fff00000c9c98000 x25: fff00000c11e0740 x24: 1ffe00001823c0e8 [ 68.196438] x23: fffd80001823c0e8 x22: fff00000c11e0618 x21: 1ffe00001823c0c3 [ 68.197150] x20: 0000000000000000 x19: fff00000c11e0400 x18: 1ffff2a03de74c2e [ 68.198219] x17: 0000000000000001 x16: fff00000c5e02c3c x15: 0000000000000007 [ 68.199397] x14: 00000000f1f1f1f1 x13: 1ffe00001b4895dd x12: fffd800018849ae1 [ 68.200269] x11: 1ffe000018849ae0 x10: fffd800018849ae0 x9 : ffff9501ecf989fc [ 68.201190] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10 [ 68.201966] x5 : 0000000000000001 x4 : 1ffe000018374511 x3 : dfff800000000000 [ 68.202835] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.203872] Call trace: [ 68.204213] ext4_mb_release+0x394/0xaf8 (P) [ 68.204564] mbt_kunit_exit+0x9c/0x2c8 [ 68.204986] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.205206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.205446] kthread+0x328/0x630 [ 68.205621] ret_from_fork+0x10/0x20 [ 68.205859] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.206220] ---[ end trace 0000000000000000 ]--- [ 67.868811] Internal error: Oops: 0000000096000005 [#6] SMP [ 67.876226] Modules linked in: [ 67.877170] CPU: 0 UID: 0 PID: 390 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.878414] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.879237] Hardware name: linux,dummy-virt (DT) [ 67.880106] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.880908] pc : ext4_mb_release+0x394/0xaf8 [ 67.881509] lr : ext4_mb_release+0x37c/0xaf8 [ 67.881733] sp : ffff800080b77c50 [ 67.881890] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.882233] x26: fff00000c9f91000 x25: fff00000c9978740 x24: 1ffe00001932f0e8 [ 67.882566] x23: fffd80001932f0e8 x22: fff00000c9978618 x21: 1ffe00001932f0c3 [ 67.883889] x20: 0000000000000000 x19: fff00000c9978400 x18: 00000000c96f8d84 [ 67.884939] x17: 0000000000000001 x16: fff00000da44ada8 x15: 00000000f2b866bd [ 67.885983] x14: 000000003cef1262 x13: 1ffe000019331a64 x12: fffd80001942b201 [ 67.887006] x11: 1ffe00001942b200 x10: fffd80001942b200 x9 : ffff9501ecf989fc [ 67.888059] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10 [ 67.889062] x5 : 0000000000000001 x4 : 1ffe0000193adca9 x3 : dfff800000000000 [ 67.890093] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.891104] Call trace: [ 67.891524] ext4_mb_release+0x394/0xaf8 (P) [ 67.892006] mbt_kunit_exit+0x9c/0x2c8 [ 67.892619] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.893067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.893321] kthread+0x328/0x630 [ 67.893497] ret_from_fork+0x10/0x20 [ 67.893719] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.893959] ---[ end trace 0000000000000000 ]--- [ 67.840132] Internal error: Oops: 0000000096000005 [#5] SMP [ 67.843505] Modules linked in: [ 67.843810] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.845835] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.846397] Hardware name: linux,dummy-virt (DT) [ 67.846769] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.847411] pc : ext4_mb_release+0x394/0xaf8 [ 67.847984] lr : ext4_mb_release+0x37c/0xaf8 [ 67.848468] sp : ffff800080b77c50 [ 67.848911] x29: ffff800080b77c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.849483] x26: fff00000c622f000 x25: fff00000c1416740 x24: 1ffe000018282ce8 [ 67.849842] x23: fffd800018282ce8 x22: fff00000c1416618 x21: 1ffe000018282cc3 [ 67.850184] x20: 0000000000000000 x19: fff00000c1416400 x18: 1ffff2a03de74c2e [ 67.850527] x17: 0000000000000000 x16: fff00000c5e02c3c x15: 0000000000000007 [ 67.851405] x14: 00000000f1f1f1f1 x13: 1ffe00001b4895dd x12: fffd8000190ea9c1 [ 67.852348] x11: 1ffe0000190ea9c0 x10: fffd8000190ea9c0 x9 : ffff9501ecf989fc [ 67.853170] x8 : ffff800080b779f8 x7 : 0000000000000001 x6 : ffff800080b77b10 [ 67.853919] x5 : 0000000000000001 x4 : 1ffe0000193ad799 x3 : dfff800000000000 [ 67.854657] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.855388] Call trace: [ 67.855716] ext4_mb_release+0x394/0xaf8 (P) [ 67.856289] mbt_kunit_exit+0x9c/0x2c8 [ 67.856791] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.857409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.857973] kthread+0x328/0x630 [ 67.858368] ret_from_fork+0x10/0x20 [ 67.858812] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.859451] ---[ end trace 0000000000000000 ]--- [ 68.029241] Internal error: Oops: 0000000096000005 [#11] SMP [ 68.033414] Modules linked in: [ 68.033689] CPU: 1 UID: 0 PID: 400 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.034199] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.034476] Hardware name: linux,dummy-virt (DT) [ 68.036776] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.037134] pc : ext4_mb_release+0x394/0xaf8 [ 68.037394] lr : ext4_mb_release+0x37c/0xaf8 [ 68.037633] sp : ffff800080cb7c50 [ 68.037818] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.038247] x26: fff00000c117f000 x25: fff00000cd22e740 x24: 1ffe000019a45ce8 [ 68.039766] x23: fffd800019a45ce8 x22: fff00000cd22e618 x21: 1ffe000019a45cc3 [ 68.040143] x20: 0000000000000000 x19: fff00000cd22e400 x18: 1ffff2a03de74c2e [ 68.040479] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000000000007 [ 68.040870] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd8000190ea801 [ 68.041877] x11: 1ffe0000190ea800 x10: fffd8000190ea800 x9 : ffff9501ecf989fc [ 68.042511] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10 [ 68.042877] x5 : 0000000000000001 x4 : 1ffe000018c92511 x3 : dfff800000000000 [ 68.044178] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.045050] Call trace: [ 68.045417] ext4_mb_release+0x394/0xaf8 (P) [ 68.046027] mbt_kunit_exit+0x9c/0x2c8 [ 68.046490] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.047079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.047453] kthread+0x328/0x630 [ 68.047865] ret_from_fork+0x10/0x20 [ 68.048296] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.048629] ---[ end trace 0000000000000000 ]--- [ 67.909782] Internal error: Oops: 0000000096000005 [#7] SMP [ 67.915738] Modules linked in: [ 67.917237] CPU: 1 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.918478] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.919356] Hardware name: linux,dummy-virt (DT) [ 67.920114] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.921018] pc : ext4_mb_release+0x394/0xaf8 [ 67.921461] lr : ext4_mb_release+0x37c/0xaf8 [ 67.921689] sp : ffff800080ca7c50 [ 67.921848] x29: ffff800080ca7c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.922200] x26: fff00000c1179000 x25: fff00000c10c6740 x24: 1ffe000018218ce8 [ 67.922542] x23: fffd800018218ce8 x22: fff00000c10c6618 x21: 1ffe000018218cc3 [ 67.923908] x20: 0000000000000000 x19: fff00000c10c6400 x18: 1ffff2a03de74c2e [ 67.925044] x17: 0000000000000001 x16: fff00000da46cda8 x15: fff00000ff616b48 [ 67.926041] x14: 0000000000018fff x13: 1ffe000019331a44 x12: fffd800019363a21 [ 67.927052] x11: 1ffe000019363a20 x10: fffd800019363a20 x9 : ffff9501ecf989fc [ 67.928217] x8 : ffff800080ca79f8 x7 : 0000000000000001 x6 : ffff800080ca7b10 [ 67.929341] x5 : 0000000000000001 x4 : 1ffe000018b93799 x3 : dfff800000000000 [ 67.930399] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.931536] Call trace: [ 67.932049] ext4_mb_release+0x394/0xaf8 (P) [ 67.932762] mbt_kunit_exit+0x9c/0x2c8 [ 67.933263] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.933494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.933738] kthread+0x328/0x630 [ 67.933914] ret_from_fork+0x10/0x20 [ 67.934113] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.934352] ---[ end trace 0000000000000000 ]--- [ 68.216387] Internal error: Oops: 0000000096000005 [#17] SMP [ 68.225098] Modules linked in: [ 68.225884] CPU: 1 UID: 0 PID: 412 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.227579] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.228383] Hardware name: linux,dummy-virt (DT) [ 68.228900] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.229252] pc : ext4_mb_release+0x394/0xaf8 [ 68.229478] lr : ext4_mb_release+0x37c/0xaf8 [ 68.229756] sp : ffff800080c97c50 [ 68.229971] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.230489] x26: fff00000c9c9b000 x25: fff00000cd264740 x24: 1ffe000019a4c8e8 [ 68.230946] x23: fffd800019a4c8e8 x22: fff00000cd264618 x21: 1ffe000019a4c8c3 [ 68.231499] x20: 0000000000000000 x19: fff00000cd264400 x18: 0000000085e88bda [ 68.232067] x17: 0000000000000001 x16: fff00000da46cda8 x15: 00000000cefbb19d [ 68.232501] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd8000190ea901 [ 68.232953] x11: 1ffe0000190ea900 x10: fffd8000190ea900 x9 : ffff9501ecf989fc [ 68.233414] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10 [ 68.233850] x5 : 0000000000000001 x4 : 1ffe0000193a2511 x3 : dfff800000000000 [ 68.234283] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.234751] Call trace: [ 68.234936] ext4_mb_release+0x394/0xaf8 (P) [ 68.235367] mbt_kunit_exit+0x9c/0x2c8 [ 68.235670] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.235965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.236284] kthread+0x328/0x630 [ 68.236509] ret_from_fork+0x10/0x20 [ 68.236769] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.237094] ---[ end trace 0000000000000000 ]--- [ 111.491486] Internal error: Oops: 0000000096000005 [#20] SMP [ 111.497170] Modules linked in: [ 111.498059] CPU: 1 UID: 0 PID: 418 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 111.499549] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 111.500329] Hardware name: linux,dummy-virt (DT) [ 111.500555] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 111.500851] pc : ext4_mb_release+0x394/0xaf8 [ 111.501079] lr : ext4_mb_release+0x37c/0xaf8 [ 111.501274] sp : ffff800080cf7c50 [ 111.501431] x29: ffff800080cf7c60 x28: dfff800000000000 x27: 0000000000000000 [ 111.501794] x26: fff00000c9cf3000 x25: fff00000c1394740 x24: 1ffe0000182728e8 [ 111.502213] x23: fffd8000182728e8 x22: fff00000c1394618 x21: 1ffe0000182728c3 [ 111.502562] x20: 0000000000000000 x19: fff00000c1394400 x18: 00000000e36e3a21 [ 111.504030] x17: 0000000000000001 x16: fff00000da46cda8 x15: 00000000c224dec4 [ 111.504590] x14: 0000000015e72202 x13: 1ffe000019331a44 x12: fffd8000191f0c41 [ 111.505015] x11: 1ffe0000191f0c40 x10: fffd8000191f0c40 x9 : ffff9501ecf989fc [ 111.505393] x8 : ffff800080cf79f8 x7 : 0000000000000001 x6 : ffff800080cf7b10 [ 111.505881] x5 : 0000000000000001 x4 : 1ffe0000193a2ca9 x3 : dfff800000000000 [ 111.506224] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 111.506562] Call trace: [ 111.506717] ext4_mb_release+0x394/0xaf8 (P) [ 111.507260] mbt_kunit_exit+0x9c/0x2c8 [ 111.507494] kunit_try_run_case_cleanup+0x9c/0xe0 [ 111.507756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.508513] kthread+0x328/0x630 [ 111.508932] ret_from_fork+0x10/0x20 [ 111.509353] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 111.509953] ---[ end trace 0000000000000000 ]--- [ 89.857835] Internal error: Oops: 0000000096000005 [#19] SMP [ 89.865267] Modules linked in: [ 89.865992] CPU: 1 UID: 0 PID: 416 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 89.866444] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 89.867089] Hardware name: linux,dummy-virt (DT) [ 89.867585] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 89.868279] pc : ext4_mb_release+0x394/0xaf8 [ 89.868825] lr : ext4_mb_release+0x37c/0xaf8 [ 89.869196] sp : ffff800080c97c50 [ 89.869477] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000 [ 89.870165] x26: fff00000c9c9e000 x25: fff00000c11dc740 x24: 1ffe00001823b8e8 [ 89.870574] x23: fffd80001823b8e8 x22: fff00000c11dc618 x21: 1ffe00001823b8c3 [ 89.871101] x20: 0000000000000000 x19: fff00000c11dc400 x18: 000000007cc65ab4 [ 89.871657] x17: 00000000e50b0055 x16: fff00000c5e02c3c x15: 0000000002a95e2d [ 89.872052] x14: 00000000d6983160 x13: 1ffe00001b4895dd x12: fffd80001884c7c1 [ 89.872468] x11: 1ffe00001884c7c0 x10: fffd80001884c7c0 x9 : ffff9501ecf989fc [ 89.872866] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10 [ 89.873276] x5 : 0000000000000001 x4 : 1ffe000018c8ba21 x3 : dfff800000000000 [ 89.873695] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 89.874213] Call trace: [ 89.874375] ext4_mb_release+0x394/0xaf8 (P) [ 89.874610] mbt_kunit_exit+0x9c/0x2c8 [ 89.874871] kunit_try_run_case_cleanup+0x9c/0xe0 [ 89.875131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 89.875451] kthread+0x328/0x630 [ 89.875700] ret_from_fork+0x10/0x20 [ 89.875953] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 89.876282] ---[ end trace 0000000000000000 ]--- [ 67.758519] Internal error: Oops: 0000000096000005 [#2] SMP [ 67.764682] Modules linked in: [ 67.765818] CPU: 1 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.767154] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 67.768509] Hardware name: linux,dummy-virt (DT) [ 67.769247] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 67.770176] pc : ext4_mb_release+0x394/0xaf8 [ 67.770936] lr : ext4_mb_release+0x37c/0xaf8 [ 67.771697] sp : ffff800080c97c50 [ 67.772306] x29: ffff800080c97c60 x28: dfff800000000000 x27: 0000000000000000 [ 67.773160] x26: fff00000c0b08000 x25: fff00000c9938740 x24: 1ffe0000193270e8 [ 67.773523] x23: fffd8000193270e8 x22: fff00000c9938618 x21: 1ffe0000193270c3 [ 67.773993] x20: 0000000000000000 x19: fff00000c9938400 x18: 000000001d7f2c1f [ 67.774501] x17: 0000000000000001 x16: fff00000da46cda8 x15: 00000000d3ba8880 [ 67.775009] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd8000191f0e41 [ 67.775539] x11: 1ffe0000191f0e40 x10: fffd8000191f0e40 x9 : ffff9501ecf989fc [ 67.775977] x8 : ffff800080c979f8 x7 : 0000000000000001 x6 : ffff800080c97b10 [ 67.776472] x5 : 0000000000000001 x4 : 1ffe000018b8aca9 x3 : dfff800000000000 [ 67.776967] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 67.777439] Call trace: [ 67.777659] ext4_mb_release+0x394/0xaf8 (P) [ 67.777923] mbt_kunit_exit+0x9c/0x2c8 [ 67.778154] kunit_try_run_case_cleanup+0x9c/0xe0 [ 67.778433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.778744] kthread+0x328/0x630 [ 67.779008] ret_from_fork+0x10/0x20 [ 67.779347] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 67.779688] ---[ end trace 0000000000000000 ]--- [ 68.152533] Internal error: Oops: 0000000096000005 [#15] SMP [ 68.157498] Modules linked in: [ 68.158420] CPU: 1 UID: 0 PID: 408 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 68.159343] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 68.159751] Hardware name: linux,dummy-virt (DT) [ 68.160186] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 68.160722] pc : ext4_mb_release+0x394/0xaf8 [ 68.160962] lr : ext4_mb_release+0x37c/0xaf8 [ 68.161224] sp : ffff800080cb7c50 [ 68.161413] x29: ffff800080cb7c60 x28: dfff800000000000 x27: 0000000000000000 [ 68.161878] x26: fff00000c9d2d000 x25: fff00000c11e6740 x24: 1ffe00001823cce8 [ 68.162292] x23: fffd80001823cce8 x22: fff00000c11e6618 x21: 1ffe00001823ccc3 [ 68.162722] x20: 0000000000000000 x19: fff00000c11e6400 x18: 000000005ba8505f [ 68.163304] x17: 0000000000000001 x16: fff00000da46cda8 x15: 0000000068ab6941 [ 68.163760] x14: 00000000f1f1f1f1 x13: 1ffe000019331a44 x12: fffd800019336581 [ 68.164206] x11: 1ffe000019336580 x10: fffd800019336580 x9 : ffff9501ecf989fc [ 68.164619] x8 : ffff800080cb79f8 x7 : 0000000000000001 x6 : ffff800080cb7b10 [ 68.165027] x5 : 0000000000000001 x4 : 1ffe0000193a2001 x3 : dfff800000000000 [ 68.165986] x2 : 0000000000000004 x1 : 0000000000000002 x0 : 0000000000000014 [ 68.166729] Call trace: [ 68.167498] ext4_mb_release+0x394/0xaf8 (P) [ 68.167993] mbt_kunit_exit+0x9c/0x2c8 [ 68.168400] kunit_try_run_case_cleanup+0x9c/0xe0 [ 68.168889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.169439] kthread+0x328/0x630 [ 68.169681] ret_from_fork+0x10/0x20 [ 68.169891] Code: f9410e7b 91005360 12000802 d343fc01 (38fc6821) [ 68.170137] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 67.552360] ================================================================== [ 67.552465] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 67.552465] [ 67.552561] Use-after-free read at 0x00000000808e9a85 (in kfence-#205): [ 67.552614] test_krealloc+0x51c/0x830 [ 67.552678] kunit_try_run_case+0x170/0x3f0 [ 67.552724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.552769] kthread+0x328/0x630 [ 67.552810] ret_from_fork+0x10/0x20 [ 67.552851] [ 67.552876] kfence-#205: 0x00000000808e9a85-0x0000000099274d74, size=32, cache=kmalloc-32 [ 67.552876] [ 67.552932] allocated by task 369 on cpu 0 at 67.551488s (0.001440s ago): [ 67.553004] test_alloc+0x29c/0x628 [ 67.553042] test_krealloc+0xc0/0x830 [ 67.553077] kunit_try_run_case+0x170/0x3f0 [ 67.553118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.553161] kthread+0x328/0x630 [ 67.553196] ret_from_fork+0x10/0x20 [ 67.553234] [ 67.553258] freed by task 369 on cpu 0 at 67.551777s (0.001477s ago): [ 67.553319] krealloc_noprof+0x148/0x360 [ 67.553360] test_krealloc+0x1dc/0x830 [ 67.553396] kunit_try_run_case+0x170/0x3f0 [ 67.553435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.553475] kthread+0x328/0x630 [ 67.553512] ret_from_fork+0x10/0x20 [ 67.553549] [ 67.553597] CPU: 0 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.553691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.553723] Hardware name: linux,dummy-virt (DT) [ 67.553759] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 67.454947] ================================================================== [ 67.455067] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.455067] [ 67.455173] Use-after-free read at 0x000000001451cd49 (in kfence-#204): [ 67.455231] test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.455278] kunit_try_run_case+0x170/0x3f0 [ 67.455328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.455373] kthread+0x328/0x630 [ 67.455412] ret_from_fork+0x10/0x20 [ 67.455453] [ 67.455477] kfence-#204: 0x000000001451cd49-0x0000000047bece6b, size=32, cache=test [ 67.455477] [ 67.455529] allocated by task 367 on cpu 1 at 67.443368s (0.012157s ago): [ 67.455603] test_alloc+0x230/0x628 [ 67.455657] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 67.455698] kunit_try_run_case+0x170/0x3f0 [ 67.455737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.455780] kthread+0x328/0x630 [ 67.455815] ret_from_fork+0x10/0x20 [ 67.455854] [ 67.455879] freed by task 367 on cpu 1 at 67.443492s (0.012383s ago): [ 67.455933] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 67.455974] kunit_try_run_case+0x170/0x3f0 [ 67.456011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.456054] kthread+0x328/0x630 [ 67.456091] ret_from_fork+0x10/0x20 [ 67.456130] [ 67.456178] CPU: 1 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 67.456264] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 67.456296] Hardware name: linux,dummy-virt (DT) [ 67.456333] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 35.566075] ================================================================== [ 35.566147] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 35.566219] Read of size 8 at addr fff00000c9a8b878 by task kunit_try_catch/313 [ 35.566273] [ 35.566565] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.566801] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.566837] Hardware name: linux,dummy-virt (DT) [ 35.567044] Call trace: [ 35.567105] show_stack+0x20/0x38 (C) [ 35.567579] dump_stack_lvl+0x8c/0xd0 [ 35.567700] print_report+0x118/0x5e8 [ 35.567777] kasan_report+0xdc/0x128 [ 35.568410] __asan_report_load8_noabort+0x20/0x30 [ 35.569308] copy_to_kernel_nofault+0x204/0x250 [ 35.569446] copy_to_kernel_nofault_oob+0x158/0x418 [ 35.569577] kunit_try_run_case+0x170/0x3f0 [ 35.569634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.569902] kthread+0x328/0x630 [ 35.570377] ret_from_fork+0x10/0x20 [ 35.570515] [ 35.570586] Allocated by task 313: [ 35.570757] kasan_save_stack+0x3c/0x68 [ 35.570879] kasan_save_track+0x20/0x40 [ 35.570957] kasan_save_alloc_info+0x40/0x58 [ 35.571022] __kasan_kmalloc+0xd4/0xd8 [ 35.571116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.571206] copy_to_kernel_nofault_oob+0xc8/0x418 [ 35.571319] kunit_try_run_case+0x170/0x3f0 [ 35.571360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.571412] kthread+0x328/0x630 [ 35.571449] ret_from_fork+0x10/0x20 [ 35.571802] [ 35.571929] The buggy address belongs to the object at fff00000c9a8b800 [ 35.571929] which belongs to the cache kmalloc-128 of size 128 [ 35.572044] The buggy address is located 0 bytes to the right of [ 35.572044] allocated 120-byte region [fff00000c9a8b800, fff00000c9a8b878) [ 35.572238] [ 35.572614] The buggy address belongs to the physical page: [ 35.572783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.572883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.573089] page_type: f5(slab) [ 35.573503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.573602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.573983] page dumped because: kasan: bad access detected [ 35.574032] [ 35.574055] Memory state around the buggy address: [ 35.574113] fff00000c9a8b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.574172] fff00000c9a8b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.574221] >fff00000c9a8b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.574261] ^ [ 35.574304] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.574358] fff00000c9a8b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.574419] ================================================================== [ 35.575830] ================================================================== [ 35.576051] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 35.576218] Write of size 8 at addr fff00000c9a8b878 by task kunit_try_catch/313 [ 35.576410] [ 35.576477] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.576581] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.576943] Hardware name: linux,dummy-virt (DT) [ 35.576997] Call trace: [ 35.577024] show_stack+0x20/0x38 (C) [ 35.577078] dump_stack_lvl+0x8c/0xd0 [ 35.577435] print_report+0x118/0x5e8 [ 35.577574] kasan_report+0xdc/0x128 [ 35.577627] kasan_check_range+0x100/0x1a8 [ 35.577691] __kasan_check_write+0x20/0x30 [ 35.577995] copy_to_kernel_nofault+0x8c/0x250 [ 35.578083] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 35.578137] kunit_try_run_case+0x170/0x3f0 [ 35.578221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.578307] kthread+0x328/0x630 [ 35.578353] ret_from_fork+0x10/0x20 [ 35.578562] [ 35.578588] Allocated by task 313: [ 35.578774] kasan_save_stack+0x3c/0x68 [ 35.578833] kasan_save_track+0x20/0x40 [ 35.579138] kasan_save_alloc_info+0x40/0x58 [ 35.579296] __kasan_kmalloc+0xd4/0xd8 [ 35.579380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.579424] copy_to_kernel_nofault_oob+0xc8/0x418 [ 35.579474] kunit_try_run_case+0x170/0x3f0 [ 35.579513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.579855] kthread+0x328/0x630 [ 35.580088] ret_from_fork+0x10/0x20 [ 35.580145] [ 35.580206] The buggy address belongs to the object at fff00000c9a8b800 [ 35.580206] which belongs to the cache kmalloc-128 of size 128 [ 35.580505] The buggy address is located 0 bytes to the right of [ 35.580505] allocated 120-byte region [fff00000c9a8b800, fff00000c9a8b878) [ 35.580721] [ 35.580770] The buggy address belongs to the physical page: [ 35.580916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.581207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.581259] page_type: f5(slab) [ 35.581573] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.581698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.581784] page dumped because: kasan: bad access detected [ 35.581840] [ 35.582170] Memory state around the buggy address: [ 35.582284] fff00000c9a8b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.582367] fff00000c9a8b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.582433] >fff00000c9a8b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.582482] ^ [ 35.582534] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.582591] fff00000c9a8b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.582676] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 44.473261] ================================================================== [ 44.473417] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 44.473417] [ 44.473523] Invalid read at 0x00000000b4cc2dc4: [ 44.473590] test_invalid_access+0xdc/0x1f0 [ 44.473657] kunit_try_run_case+0x170/0x3f0 [ 44.473710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.473783] kthread+0x328/0x630 [ 44.473936] ret_from_fork+0x10/0x20 [ 44.474003] [ 44.474066] CPU: 0 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 44.474502] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 44.474693] Hardware name: linux,dummy-virt (DT) [ 44.475029] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 44.247695] ================================================================== [ 44.247802] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 44.247802] [ 44.247865] Corrupted memory at 0x00000000707e18ca [ ! . . . . . . . . . . . . . . . ] (in kfence-#200): [ 44.248176] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 44.248224] kunit_try_run_case+0x170/0x3f0 [ 44.248267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.248310] kthread+0x328/0x630 [ 44.248350] ret_from_fork+0x10/0x20 [ 44.248391] [ 44.248417] kfence-#200: 0x00000000f659e042-0x0000000006d26912, size=73, cache=kmalloc-96 [ 44.248417] [ 44.248472] allocated by task 357 on cpu 1 at 44.247424s (0.001044s ago): [ 44.248536] test_alloc+0x29c/0x628 [ 44.248574] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 44.248615] kunit_try_run_case+0x170/0x3f0 [ 44.248672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.248715] kthread+0x328/0x630 [ 44.248752] ret_from_fork+0x10/0x20 [ 44.248792] [ 44.248816] freed by task 357 on cpu 1 at 44.247577s (0.001235s ago): [ 44.248878] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 44.248919] kunit_try_run_case+0x170/0x3f0 [ 44.248958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.249002] kthread+0x328/0x630 [ 44.249037] ret_from_fork+0x10/0x20 [ 44.249076] [ 44.249122] CPU: 1 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 44.249208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 44.249239] Hardware name: linux,dummy-virt (DT) [ 44.249271] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 44.143710] ================================================================== [ 44.143816] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 44.143816] [ 44.143917] Out-of-bounds read at 0x0000000067aeaa41 (105B right of kfence-#199): [ 44.143978] test_kmalloc_aligned_oob_read+0x238/0x468 [ 44.144025] kunit_try_run_case+0x170/0x3f0 [ 44.144068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.144113] kthread+0x328/0x630 [ 44.144153] ret_from_fork+0x10/0x20 [ 44.144195] [ 44.144219] kfence-#199: 0x0000000050a4bc7d-0x00000000cd3e3944, size=73, cache=kmalloc-96 [ 44.144219] [ 44.144272] allocated by task 355 on cpu 1 at 44.143435s (0.000833s ago): [ 44.144347] test_alloc+0x29c/0x628 [ 44.144384] test_kmalloc_aligned_oob_read+0x100/0x468 [ 44.144426] kunit_try_run_case+0x170/0x3f0 [ 44.144469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.144514] kthread+0x328/0x630 [ 44.144549] ret_from_fork+0x10/0x20 [ 44.144588] [ 44.144652] CPU: 1 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 44.144744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 44.144775] Hardware name: linux,dummy-virt (DT) [ 44.144811] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 37.903721] ================================================================== [ 37.903817] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 37.903817] [ 37.903876] Corrupted memory at 0x00000000343c3ed7 [ ! ] (in kfence-#139): [ 37.904006] test_corruption+0x284/0x378 [ 37.904050] kunit_try_run_case+0x170/0x3f0 [ 37.904091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.904136] kthread+0x328/0x630 [ 37.904174] ret_from_fork+0x10/0x20 [ 37.904215] [ 37.904238] kfence-#139: 0x0000000007aec171-0x00000000dddfc131, size=32, cache=kmalloc-32 [ 37.904238] [ 37.904291] allocated by task 343 on cpu 1 at 37.903422s (0.000865s ago): [ 37.904356] test_alloc+0x29c/0x628 [ 37.904394] test_corruption+0x198/0x378 [ 37.904433] kunit_try_run_case+0x170/0x3f0 [ 37.904472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.904514] kthread+0x328/0x630 [ 37.904550] ret_from_fork+0x10/0x20 [ 37.904589] [ 37.904612] freed by task 343 on cpu 1 at 37.903531s (0.001077s ago): [ 37.904688] test_corruption+0x284/0x378 [ 37.904727] kunit_try_run_case+0x170/0x3f0 [ 37.904765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.904809] kthread+0x328/0x630 [ 37.904843] ret_from_fork+0x10/0x20 [ 37.904882] [ 37.904925] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 37.905010] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.905042] Hardware name: linux,dummy-virt (DT) [ 37.905075] ================================================================== [ 38.111548] ================================================================== [ 38.111637] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 38.111637] [ 38.111714] Corrupted memory at 0x00000000f6055e62 [ ! ] (in kfence-#141): [ 38.111837] test_corruption+0x1d8/0x378 [ 38.111881] kunit_try_run_case+0x170/0x3f0 [ 38.111924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.111968] kthread+0x328/0x630 [ 38.112008] ret_from_fork+0x10/0x20 [ 38.112046] [ 38.112072] kfence-#141: 0x000000000ffde778-0x00000000506e5d33, size=32, cache=test [ 38.112072] [ 38.112126] allocated by task 345 on cpu 1 at 38.111396s (0.000726s ago): [ 38.112188] test_alloc+0x230/0x628 [ 38.112226] test_corruption+0x198/0x378 [ 38.112264] kunit_try_run_case+0x170/0x3f0 [ 38.112302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.112346] kthread+0x328/0x630 [ 38.112382] ret_from_fork+0x10/0x20 [ 38.112420] [ 38.112443] freed by task 345 on cpu 1 at 38.111458s (0.000981s ago): [ 38.112504] test_corruption+0x1d8/0x378 [ 38.112542] kunit_try_run_case+0x170/0x3f0 [ 38.112581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.112622] kthread+0x328/0x630 [ 38.112672] ret_from_fork+0x10/0x20 [ 38.112709] [ 38.112755] CPU: 1 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 38.112838] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 38.112868] Hardware name: linux,dummy-virt (DT) [ 38.112901] ================================================================== [ 37.799971] ================================================================== [ 37.800084] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 37.800084] [ 37.800149] Corrupted memory at 0x000000004c512947 [ ! . . . . . . . . . . . . . . . ] (in kfence-#138): [ 37.800569] test_corruption+0x278/0x378 [ 37.800614] kunit_try_run_case+0x170/0x3f0 [ 37.800680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.800726] kthread+0x328/0x630 [ 37.800766] ret_from_fork+0x10/0x20 [ 37.800807] [ 37.800831] kfence-#138: 0x000000008b114885-0x0000000078c09164, size=32, cache=kmalloc-32 [ 37.800831] [ 37.800886] allocated by task 343 on cpu 1 at 37.799688s (0.001195s ago): [ 37.800948] test_alloc+0x29c/0x628 [ 37.800985] test_corruption+0xdc/0x378 [ 37.801024] kunit_try_run_case+0x170/0x3f0 [ 37.801061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.801104] kthread+0x328/0x630 [ 37.801139] ret_from_fork+0x10/0x20 [ 37.801178] [ 37.801201] freed by task 343 on cpu 1 at 37.799795s (0.001402s ago): [ 37.801262] test_corruption+0x278/0x378 [ 37.801299] kunit_try_run_case+0x170/0x3f0 [ 37.801338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.801379] kthread+0x328/0x630 [ 37.801415] ret_from_fork+0x10/0x20 [ 37.801453] [ 37.801500] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 37.801584] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.801616] Hardware name: linux,dummy-virt (DT) [ 37.801660] ================================================================== [ 38.007532] ================================================================== [ 38.007631] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 38.007631] [ 38.007707] Corrupted memory at 0x0000000048178b9f [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 38.008025] test_corruption+0x120/0x378 [ 38.008069] kunit_try_run_case+0x170/0x3f0 [ 38.008112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.008154] kthread+0x328/0x630 [ 38.008193] ret_from_fork+0x10/0x20 [ 38.008232] [ 38.008255] kfence-#140: 0x00000000a6091d5a-0x00000000eeca93e1, size=32, cache=test [ 38.008255] [ 38.008310] allocated by task 345 on cpu 1 at 38.007384s (0.000922s ago): [ 38.008371] test_alloc+0x230/0x628 [ 38.008407] test_corruption+0xdc/0x378 [ 38.008445] kunit_try_run_case+0x170/0x3f0 [ 38.008484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.008528] kthread+0x328/0x630 [ 38.008565] ret_from_fork+0x10/0x20 [ 38.008603] [ 38.008627] freed by task 345 on cpu 1 at 38.007444s (0.001180s ago): [ 38.008708] test_corruption+0x120/0x378 [ 38.008746] kunit_try_run_case+0x170/0x3f0 [ 38.008786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.008828] kthread+0x328/0x630 [ 38.008863] ret_from_fork+0x10/0x20 [ 38.008900] [ 38.008945] CPU: 1 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 38.009026] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 38.009057] Hardware name: linux,dummy-virt (DT) [ 38.009090] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 37.591509] ================================================================== [ 37.591617] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 37.591617] [ 37.591697] Invalid free of 0x000000005ffed9fb (in kfence-#136): [ 37.591761] test_invalid_addr_free+0xec/0x238 [ 37.591815] kunit_try_run_case+0x170/0x3f0 [ 37.591862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.591908] kthread+0x328/0x630 [ 37.591950] ret_from_fork+0x10/0x20 [ 37.591992] [ 37.592017] kfence-#136: 0x000000002c6c6c07-0x00000000a5e1da47, size=32, cache=test [ 37.592017] [ 37.592076] allocated by task 341 on cpu 0 at 37.591367s (0.000705s ago): [ 37.592145] test_alloc+0x230/0x628 [ 37.592184] test_invalid_addr_free+0xd4/0x238 [ 37.592226] kunit_try_run_case+0x170/0x3f0 [ 37.592267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.592313] kthread+0x328/0x630 [ 37.592351] ret_from_fork+0x10/0x20 [ 37.592392] [ 37.592440] CPU: 0 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 37.592533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.592568] Hardware name: linux,dummy-virt (DT) [ 37.592606] ================================================================== [ 37.487536] ================================================================== [ 37.487636] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 37.487636] [ 37.487712] Invalid free of 0x000000008d765188 (in kfence-#135): [ 37.487767] test_invalid_addr_free+0x1ac/0x238 [ 37.487812] kunit_try_run_case+0x170/0x3f0 [ 37.487857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.487901] kthread+0x328/0x630 [ 37.487942] ret_from_fork+0x10/0x20 [ 37.487981] [ 37.488005] kfence-#135: 0x00000000a18a89e4-0x000000005d24ecdf, size=32, cache=kmalloc-32 [ 37.488005] [ 37.488060] allocated by task 339 on cpu 1 at 37.487392s (0.000663s ago): [ 37.488122] test_alloc+0x29c/0x628 [ 37.488162] test_invalid_addr_free+0xd4/0x238 [ 37.488200] kunit_try_run_case+0x170/0x3f0 [ 37.488239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.488281] kthread+0x328/0x630 [ 37.488316] ret_from_fork+0x10/0x20 [ 37.488356] [ 37.488403] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 37.488487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.488517] Hardware name: linux,dummy-virt (DT) [ 37.488552] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 37.386246] ================================================================== [ 37.386336] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 37.386336] [ 37.386464] Invalid free of 0x00000000bbdee733 (in kfence-#134): [ 37.386794] test_double_free+0x100/0x238 [ 37.387070] kunit_try_run_case+0x170/0x3f0 [ 37.387149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.387204] kthread+0x328/0x630 [ 37.387446] ret_from_fork+0x10/0x20 [ 37.387688] [ 37.387724] kfence-#134: 0x00000000bbdee733-0x00000000df632a77, size=32, cache=test [ 37.387724] [ 37.388214] allocated by task 337 on cpu 0 at 37.385888s (0.002316s ago): [ 37.388404] test_alloc+0x230/0x628 [ 37.388759] test_double_free+0xd4/0x238 [ 37.388988] kunit_try_run_case+0x170/0x3f0 [ 37.389053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.389384] kthread+0x328/0x630 [ 37.389534] ret_from_fork+0x10/0x20 [ 37.389590] [ 37.389802] freed by task 337 on cpu 0 at 37.385990s (0.003806s ago): [ 37.390138] test_double_free+0xf0/0x238 [ 37.390387] kunit_try_run_case+0x170/0x3f0 [ 37.390524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.390745] kthread+0x328/0x630 [ 37.390997] ret_from_fork+0x10/0x20 [ 37.391136] [ 37.391219] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 37.391725] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.391834] Hardware name: linux,dummy-virt (DT) [ 37.391985] ================================================================== [ 37.280000] ================================================================== [ 37.280464] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 37.280464] [ 37.280564] Invalid free of 0x000000006cbf34a7 (in kfence-#133): [ 37.280662] test_double_free+0x1bc/0x238 [ 37.281031] kunit_try_run_case+0x170/0x3f0 [ 37.281113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.281431] kthread+0x328/0x630 [ 37.281776] ret_from_fork+0x10/0x20 [ 37.281848] [ 37.281874] kfence-#133: 0x000000006cbf34a7-0x00000000ea42c04b, size=32, cache=kmalloc-32 [ 37.281874] [ 37.281986] allocated by task 335 on cpu 0 at 37.279749s (0.002187s ago): [ 37.282100] test_alloc+0x29c/0x628 [ 37.282274] test_double_free+0xd4/0x238 [ 37.282320] kunit_try_run_case+0x170/0x3f0 [ 37.282362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.282558] kthread+0x328/0x630 [ 37.282881] ret_from_fork+0x10/0x20 [ 37.283392] [ 37.283521] freed by task 335 on cpu 0 at 37.279822s (0.003692s ago): [ 37.283602] test_double_free+0x1ac/0x238 [ 37.283661] kunit_try_run_case+0x170/0x3f0 [ 37.284054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.284148] kthread+0x328/0x630 [ 37.284188] ret_from_fork+0x10/0x20 [ 37.284684] [ 37.284833] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 37.285270] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 37.285346] Hardware name: linux,dummy-virt (DT) [ 37.285618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 31.931011] ================================================================== [ 31.931129] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 31.931190] Read of size 1 at addr fff00000c85ecd7f by task kunit_try_catch/170 [ 31.931701] [ 31.931737] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 31.931991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.932090] Hardware name: linux,dummy-virt (DT) [ 31.932123] Call trace: [ 31.932145] show_stack+0x20/0x38 (C) [ 31.932199] dump_stack_lvl+0x8c/0xd0 [ 31.932244] print_report+0x118/0x5e8 [ 31.932288] kasan_report+0xdc/0x128 [ 31.932378] __asan_report_load1_noabort+0x20/0x30 [ 31.932428] kmalloc_oob_left+0x2ec/0x320 [ 31.932474] kunit_try_run_case+0x170/0x3f0 [ 31.932817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.932928] kthread+0x328/0x630 [ 31.933331] ret_from_fork+0x10/0x20 [ 31.933466] [ 31.933579] Allocated by task 104: [ 31.933611] kasan_save_stack+0x3c/0x68 [ 31.934009] kasan_save_track+0x20/0x40 [ 31.934198] kasan_save_alloc_info+0x40/0x58 [ 31.934245] __kasan_kmalloc+0xd4/0xd8 [ 31.934585] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 31.934873] kvasprintf+0xe0/0x180 [ 31.935031] kasprintf+0xd0/0x110 [ 31.935064] miscdev_test_can_open+0xac/0x2c8 [ 31.935493] miscdev_test_collision_reverse+0x3b8/0x650 [ 31.935548] kunit_try_run_case+0x170/0x3f0 [ 31.935587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.935800] kthread+0x328/0x630 [ 31.936273] ret_from_fork+0x10/0x20 [ 31.936359] [ 31.936595] Freed by task 3361656128: [ 31.937449] ------------[ cut here ]------------ [ 31.938139] pool index -1 out of bounds (219) for stack id fff00000 [ 31.942816] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#1: kunit_try_catch/170 [ 32.010018] Modules linked in: [ 32.011514] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.012929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.013611] Hardware name: linux,dummy-virt (DT) [ 32.014432] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 32.015580] pc : depot_fetch_stack+0x68/0x88 [ 32.016338] lr : depot_fetch_stack+0x68/0x88 [ 32.016573] sp : ffff800080b57a50 [ 32.016776] x29: ffff800080b57a50 x28: ffff800080087b08 x27: 1ffff00010010f61 [ 32.017325] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff9501e9f78254 [ 32.018026] x23: ffffc1ffc3217b00 x22: ffff9501eeab1208 x21: ffff9501eeab4568 [ 32.019282] x20: fff00000c85ecd7f x19: ffff800080b57b60 x18: 00000000511e29a0 [ 32.020368] x17: 000000005ff4b93d x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 32.021323] x14: 0000000000000000 x13: 0000000000000007 x12: ffff70001016aea7 [ 32.022346] x11: 1ffff0001016aea6 x10: ffff70001016aea6 x9 : ffff9501e98f123c [ 32.023493] x8 : ffff800080b57537 x7 : 0000000000000001 x6 : ffff70001016aea6 [ 32.024483] x5 : ffff800080b57530 x4 : 1ffe000019357a21 x3 : dfff800000000000 [ 32.025493] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9abd100 [ 32.026522] Call trace: [ 32.027024] depot_fetch_stack+0x68/0x88 (P) [ 32.027742] stack_depot_print+0x24/0x60 [ 32.028302] print_report+0x5e4/0x5e8 [ 32.028510] kasan_report+0xdc/0x128 [ 32.028716] __asan_report_load1_noabort+0x20/0x30 [ 32.028940] kmalloc_oob_left+0x2ec/0x320 [ 32.029136] kunit_try_run_case+0x170/0x3f0 [ 32.029336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.029577] kthread+0x328/0x630 [ 32.029940] ret_from_fork+0x10/0x20 [ 32.030395] ---[ end trace 0000000000000000 ]--- [ 32.031574] ------------[ cut here ]------------ [ 32.031627] corrupt handle or use after stack_depot_put() [ 32.031739] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#1: kunit_try_catch/170 [ 32.033520] Modules linked in: [ 32.033889] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.034911] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.035604] Hardware name: linux,dummy-virt (DT) [ 32.036104] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 32.036783] pc : stack_depot_print+0x54/0x60 [ 32.037227] lr : stack_depot_print+0x54/0x60 [ 32.037430] sp : ffff800080b57a60 [ 32.037589] x29: ffff800080b57a60 x28: ffff800080087b08 x27: 1ffff00010010f61 [ 32.037948] x26: 1ffff00010010f60 x25: ffff800080087b00 x24: ffff9501e9f78254 [ 32.038290] x23: ffffc1ffc3217b00 x22: ffff9501eeab1208 x21: ffff9501eeab4568 [ 32.038628] x20: fff00000c85ecd7f x19: ffff800080b57b60 x18: 00000000511e29a0 [ 32.039518] x17: 000000005ff4b93d x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 32.040063] x14: ffff70001016af2c x13: 1ffe000019357a21 x12: ffff72a03e117255 [ 32.040406] x11: 1ffff2a03e117254 x10: ffff72a03e117254 x9 : ffff9501e98f123c [ 32.040764] x8 : ffff9501f08b92a3 x7 : 0000000000000001 x6 : ffff72a03e117254 [ 32.041203] x5 : ffff9501f08b92a0 x4 : 1ffe000019357a21 x3 : dfff800000000000 [ 32.041603] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9abd100 [ 32.042011] Call trace: [ 32.042180] stack_depot_print+0x54/0x60 (P) [ 32.042420] print_report+0x5e4/0x5e8 [ 32.042666] kasan_report+0xdc/0x128 [ 32.042903] __asan_report_load1_noabort+0x20/0x30 [ 32.043157] kmalloc_oob_left+0x2ec/0x320 [ 32.043411] kunit_try_run_case+0x170/0x3f0 [ 32.043678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.043968] kthread+0x328/0x630 [ 32.044186] ret_from_fork+0x10/0x20 [ 32.044423] ---[ end trace 0000000000000000 ]--- [ 32.044693] [ 32.044723] The buggy address belongs to the object at fff00000c85ecd60 [ 32.044723] which belongs to the cache kmalloc-16 of size 16 [ 32.044780] The buggy address is located 15 bytes to the right of [ 32.044780] allocated 16-byte region [fff00000c85ecd60, fff00000c85ecd70) [ 32.044841] [ 32.044864] The buggy address belongs to the physical page: [ 32.044903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.044956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.045005] page_type: f5(slab) [ 32.045045] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.045093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.045131] page dumped because: kasan: bad access detected [ 32.045161] [ 32.045178] Memory state around the buggy address: [ 32.045212] fff00000c85ecc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.045255] fff00000c85ecc80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.045296] >fff00000c85ecd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.045332] ^ [ 32.045372] fff00000c85ecd80: 00 07 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.045411] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.045449] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 31.894545] ================================================================== [ 31.894898] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 31.895855] Write of size 1 at addr fff00000c9726173 by task kunit_try_catch/168 [ 31.895965] [ 31.896797] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 31.896948] Tainted: [N]=TEST [ 31.896980] Hardware name: linux,dummy-virt (DT) [ 31.897207] Call trace: [ 31.897398] show_stack+0x20/0x38 (C) [ 31.897532] dump_stack_lvl+0x8c/0xd0 [ 31.897584] print_report+0x118/0x5e8 [ 31.897628] kasan_report+0xdc/0x128 [ 31.897684] __asan_report_store1_noabort+0x20/0x30 [ 31.897732] kmalloc_oob_right+0x5a4/0x660 [ 31.897778] kunit_try_run_case+0x170/0x3f0 [ 31.897828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.897879] kthread+0x328/0x630 [ 31.897922] ret_from_fork+0x10/0x20 [ 31.898086] [ 31.898124] Allocated by task 168: [ 31.898240] kasan_save_stack+0x3c/0x68 [ 31.898305] kasan_save_track+0x20/0x40 [ 31.898341] kasan_save_alloc_info+0x40/0x58 [ 31.898377] __kasan_kmalloc+0xd4/0xd8 [ 31.898410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.898451] kmalloc_oob_right+0xb0/0x660 [ 31.898487] kunit_try_run_case+0x170/0x3f0 [ 31.898524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.898566] kthread+0x328/0x630 [ 31.898598] ret_from_fork+0x10/0x20 [ 31.898664] [ 31.898726] The buggy address belongs to the object at fff00000c9726100 [ 31.898726] which belongs to the cache kmalloc-128 of size 128 [ 31.898819] The buggy address is located 0 bytes to the right of [ 31.898819] allocated 115-byte region [fff00000c9726100, fff00000c9726173) [ 31.898885] [ 31.899093] The buggy address belongs to the physical page: [ 31.899478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 31.899752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.904175] page_type: f5(slab) [ 31.904511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.904571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.904690] page dumped because: kasan: bad access detected [ 31.904733] [ 31.904758] Memory state around the buggy address: [ 31.904986] fff00000c9726000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.905051] fff00000c9726080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.905105] >fff00000c9726100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.905157] ^ [ 31.905236] fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.905278] fff00000c9726200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.905338] ================================================================== [ 31.905906] ================================================================== [ 31.906006] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 31.906058] Write of size 1 at addr fff00000c9726178 by task kunit_try_catch/168 [ 31.906105] [ 31.906171] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 31.906253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.906320] Hardware name: linux,dummy-virt (DT) [ 31.906378] Call trace: [ 31.906475] show_stack+0x20/0x38 (C) [ 31.906613] dump_stack_lvl+0x8c/0xd0 [ 31.906674] print_report+0x118/0x5e8 [ 31.906718] kasan_report+0xdc/0x128 [ 31.906760] _ [ 31.906760] __asan_report_store1_noabort+0x20/0x30 [ 31.906808] kmalloc_oob_right+0x538/0x660 [ 31.906855] kunit_try_run_case+0x170/0x3f0 [ 31.906900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.906950] kthread+0x328/0x630 [ 31.906991] ret_from_fork+0x10/0x20 [ 31.907037] [ 31.907055] Allocated by task 168: [ 31.907083] kasan_save_stack+0x3c/0x68 [ 31.907120] kasan_save_track+0x20/0x40 [ 31.907153] kasan_save_alloc_info+0x40/0x58 [ 31.907190] __kasan_kmalloc+0xd4/0xd8 [ 31.907223] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.907262] kmalloc_oob_right+0xb0/0x660 [ 31.907298] kunit_try_run_case+0x170/0x3f0 [ 31.907392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.907812] kthread+0x328/0x630 [ 31.907846] ret_from_fork+0x10/0x20 [ 31.908206] [ 31.908245] The buggy address belongs to the object at fff00000c9726100 [ 31.908245] which belongs to the cache kmalloc-128 of size 128 [ 31.909015] The buggy address is located 5 bytes to the right of [ 31.909015] allocated 115-byte region [fff00000c9726100, fff00000c9726173) [ 31.909664] [ 31.909691] The buggy address belongs to the physical page: [ 31.909725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 31.909780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.909825] page_type: f5(slab) [ 31.909861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.910482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.910527] page dumped because: kasan: bad access detected [ 31.911238] [ 31.911273] Memory state around the buggy address: [ 31.911308] fff00000c9726000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.911352] fff00000c9726080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.911393] >fff00000c9726100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.911429] ^ [ 31.911949] fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.912092] fff00000c9726200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.912160] ================================================================== [ 31.912774] ================================================================== [ 31.912822] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 31.912873] Read of size 1 at addr fff00000c9726180 by task kunit_try_catch/168 [ 31.912920] [ 31.912964] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 31.913047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.913072] Hardware name: linux,dummy-virt (DT) [ 31.913240] Call trace: [ 31.913275] show_stack+0x20/0x38 (C) [ 31.913338] dump_stack_lvl+0x8c/0xd0 [ 31.913476] print_report+0x118/0x5e8 [ 31.913519] kasan_report+0xdc/0x128 [ 31.913561] __asan_report_load1_noabort+0x20/0x30 [ 31.913678] kmalloc_oob_right+0x5d0/0x660 [ 31.913725] kunit_try_run_case+0x170/0x3f0 [ 31.913770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.913928] kthread+0x328/0x630 [ 31.914016] ret_from_fork+0x10/0x20 [ 31.914154] [ 31.914207] Allocated by task 168: [ 31.914234] kasan_save_stack+0x3c/0x68 [ 31.914311] kasan_save_track+0x20/0x40 [ 31.914345] kasan_save_alloc_info+0x40/0x58 [ 31.914381] __kasan_kmalloc+0xd4/0xd8 [ 31.914414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.914545] kmalloc_oob_right+0xb0/0x660 [ 31.914588] kunit_try_run_case+0x170/0x3f0 [ 31.914673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.914764] kthread+0x328/0x630 [ 31.914795] ret_from_fork+0x10/0x20 [ 31.914830] [ 31.914849] The buggy address belongs to the object at fff00000c9726100 [ 31.914849] which belongs to the cache kmalloc-128 of size 128 [ 31.914903] The buggy address is located 13 bytes to the right of [ 31.914903] allocated 115-byte region [fff00000c9726100, fff00000c9726173) [ 31.914965] [ 31.914993] The buggy address belongs to the physical page: [ 31.915024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 31.915137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.915203] page_type: f5(slab) [ 31.915249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.915397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.915516] page dumped because: kasan: bad access detected [ 31.915606] [ 31.915660] Memory state around the buggy address: [ 31.915758] fff00000c9726080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.915801] fff00000c9726100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.915842] >fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.915930] ^ [ 31.915959] fff00000c9726200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.916011] fff00000c9726280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.916047] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 36.969861] ================================================================== [ 36.970020] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.970020] [ 36.970129] Use-after-free read at 0x000000002149d620 (in kfence-#130): [ 36.970420] test_use_after_free_read+0x114/0x248 [ 36.970487] kunit_try_run_case+0x170/0x3f0 [ 36.970724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.970818] kthread+0x328/0x630 [ 36.970865] ret_from_fork+0x10/0x20 [ 36.970997] [ 36.971055] kfence-#130: 0x000000002149d620-0x0000000020883beb, size=32, cache=test [ 36.971055] [ 36.971185] allocated by task 329 on cpu 0 at 36.969069s (0.002099s ago): [ 36.971381] test_alloc+0x230/0x628 [ 36.971538] test_use_after_free_read+0xd0/0x248 [ 36.971895] kunit_try_run_case+0x170/0x3f0 [ 36.971981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.972029] kthread+0x328/0x630 [ 36.972100] ret_from_fork+0x10/0x20 [ 36.972164] [ 36.972199] freed by task 329 on cpu 0 at 36.969663s (0.002532s ago): [ 36.972627] test_use_after_free_read+0xf0/0x248 [ 36.972729] kunit_try_run_case+0x170/0x3f0 [ 36.972775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.972950] kthread+0x328/0x630 [ 36.973163] ret_from_fork+0x10/0x20 [ 36.973455] [ 36.973636] CPU: 0 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 36.974130] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.974197] Hardware name: linux,dummy-virt (DT) [ 36.974258] ================================================================== [ 36.865249] ================================================================== [ 36.865376] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.865376] [ 36.865490] Use-after-free read at 0x0000000015bad9b4 (in kfence-#129): [ 36.865548] test_use_after_free_read+0x114/0x248 [ 36.865594] kunit_try_run_case+0x170/0x3f0 [ 36.865652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.865700] kthread+0x328/0x630 [ 36.865740] ret_from_fork+0x10/0x20 [ 36.865783] [ 36.865818] kfence-#129: 0x0000000015bad9b4-0x000000002ebecb11, size=32, cache=kmalloc-32 [ 36.865818] [ 36.865877] allocated by task 327 on cpu 0 at 36.864412s (0.001460s ago): [ 36.865952] test_alloc+0x29c/0x628 [ 36.865998] test_use_after_free_read+0xd0/0x248 [ 36.866040] kunit_try_run_case+0x170/0x3f0 [ 36.866087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.866134] kthread+0x328/0x630 [ 36.866172] ret_from_fork+0x10/0x20 [ 36.866212] [ 36.866245] freed by task 327 on cpu 0 at 36.864922s (0.001310s ago): [ 36.866313] test_use_after_free_read+0x1c0/0x248 [ 36.866355] kunit_try_run_case+0x170/0x3f0 [ 36.866395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.866439] kthread+0x328/0x630 [ 36.866476] ret_from_fork+0x10/0x20 [ 36.866517] [ 36.866575] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 36.866679] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.866712] Hardware name: linux,dummy-virt (DT) [ 36.866749] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 36.552781] ================================================================== [ 36.552882] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 36.552882] [ 36.552977] Out-of-bounds write at 0x00000000625a8668 (1B left of kfence-#126): [ 36.553039] test_out_of_bounds_write+0x100/0x240 [ 36.553097] kunit_try_run_case+0x170/0x3f0 [ 36.553142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.553188] kthread+0x328/0x630 [ 36.553226] ret_from_fork+0x10/0x20 [ 36.553268] [ 36.553292] kfence-#126: 0x00000000332878e5-0x00000000cd886ff5, size=32, cache=kmalloc-32 [ 36.553292] [ 36.553350] allocated by task 323 on cpu 0 at 36.552334s (0.001013s ago): [ 36.553426] test_alloc+0x29c/0x628 [ 36.553466] test_out_of_bounds_write+0xc8/0x240 [ 36.553507] kunit_try_run_case+0x170/0x3f0 [ 36.553556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.553602] kthread+0x328/0x630 [ 36.553658] ret_from_fork+0x10/0x20 [ 36.553701] [ 36.553757] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 36.553851] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.553895] Hardware name: linux,dummy-virt (DT) [ 36.553931] ================================================================== [ 36.759848] ================================================================== [ 36.760072] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 36.760072] [ 36.760242] Out-of-bounds write at 0x00000000bfaf1df0 (1B left of kfence-#128): [ 36.760308] test_out_of_bounds_write+0x100/0x240 [ 36.760356] kunit_try_run_case+0x170/0x3f0 [ 36.760586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.760680] kthread+0x328/0x630 [ 36.760798] ret_from_fork+0x10/0x20 [ 36.760842] [ 36.760868] kfence-#128: 0x000000008bc07da7-0x0000000013f1d3ad, size=32, cache=test [ 36.760868] [ 36.760971] allocated by task 325 on cpu 0 at 36.759758s (0.001164s ago): [ 36.761047] test_alloc+0x230/0x628 [ 36.761087] test_out_of_bounds_write+0xc8/0x240 [ 36.761145] kunit_try_run_case+0x170/0x3f0 [ 36.761389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.761452] kthread+0x328/0x630 [ 36.761491] ret_from_fork+0x10/0x20 [ 36.761531] [ 36.761578] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 36.761710] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.761759] Hardware name: linux,dummy-virt (DT) [ 36.761795] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 36.345543] ================================================================== [ 36.345651] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 36.345651] [ 36.346155] Out-of-bounds read at 0x00000000b6456cb5 (32B right of kfence-#124): [ 36.346397] test_out_of_bounds_read+0x1c8/0x3e0 [ 36.346470] kunit_try_run_case+0x170/0x3f0 [ 36.346669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.346838] kthread+0x328/0x630 [ 36.346895] ret_from_fork+0x10/0x20 [ 36.346946] [ 36.347209] kfence-#124: 0x0000000091f4eb72-0x000000006f5f8b51, size=32, cache=test [ 36.347209] [ 36.347393] allocated by task 321 on cpu 0 at 36.345332s (0.002056s ago): [ 36.347475] test_alloc+0x230/0x628 [ 36.347928] test_out_of_bounds_read+0x198/0x3e0 [ 36.348518] kunit_try_run_case+0x170/0x3f0 [ 36.348793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.348908] kthread+0x328/0x630 [ 36.349012] ret_from_fork+0x10/0x20 [ 36.349086] [ 36.349366] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 36.349687] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.349899] Hardware name: linux,dummy-virt (DT) [ 36.350061] ================================================================== [ 35.929341] ================================================================== [ 35.929429] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.929429] [ 35.929839] Out-of-bounds read at 0x0000000085d1644f (32B right of kfence-#120): [ 35.929931] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.929981] kunit_try_run_case+0x170/0x3f0 [ 35.930027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.930072] kthread+0x328/0x630 [ 35.930108] ret_from_fork+0x10/0x20 [ 35.930150] [ 35.930176] kfence-#120: 0x000000003616e1f3-0x000000002d90d518, size=32, cache=kmalloc-32 [ 35.930176] [ 35.930231] allocated by task 319 on cpu 0 at 35.929070s (0.001157s ago): [ 35.930330] test_alloc+0x29c/0x628 [ 35.930370] test_out_of_bounds_read+0x198/0x3e0 [ 35.930411] kunit_try_run_case+0x170/0x3f0 [ 35.930460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.930506] kthread+0x328/0x630 [ 35.930546] ret_from_fork+0x10/0x20 [ 35.930587] [ 35.930634] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.930741] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.930777] Hardware name: linux,dummy-virt (DT) [ 35.930820] ================================================================== [ 35.826142] ================================================================== [ 35.826271] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.826271] [ 35.830655] Out-of-bounds read at 0x000000007973d443 (1B left of kfence-#119): [ 35.830820] test_out_of_bounds_read+0x114/0x3e0 [ 35.830886] kunit_try_run_case+0x170/0x3f0 [ 35.830933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.830978] kthread+0x328/0x630 [ 35.831019] ret_from_fork+0x10/0x20 [ 35.831059] [ 35.831085] kfence-#119: 0x0000000085335c55-0x000000009bbf585f, size=32, cache=kmalloc-32 [ 35.831085] [ 35.831144] allocated by task 319 on cpu 0 at 35.825690s (0.005451s ago): [ 35.831223] test_alloc+0x29c/0x628 [ 35.831262] test_out_of_bounds_read+0xdc/0x3e0 [ 35.831303] kunit_try_run_case+0x170/0x3f0 [ 35.831344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.831388] kthread+0x328/0x630 [ 35.831425] ret_from_fork+0x10/0x20 [ 35.831482] [ 35.831532] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.831626] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.831695] Hardware name: linux,dummy-virt (DT) [ 35.831732] ================================================================== [ 36.241489] ================================================================== [ 36.241589] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 36.241589] [ 36.241689] Out-of-bounds read at 0x00000000969fc7fe (1B left of kfence-#123): [ 36.241753] test_out_of_bounds_read+0x114/0x3e0 [ 36.242381] kunit_try_run_case+0x170/0x3f0 [ 36.242521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.242582] kthread+0x328/0x630 [ 36.242806] ret_from_fork+0x10/0x20 [ 36.242867] [ 36.242894] kfence-#123: 0x0000000044e64a4c-0x00000000d8921c92, size=32, cache=test [ 36.242894] [ 36.243482] allocated by task 321 on cpu 0 at 36.241156s (0.002303s ago): [ 36.244061] test_alloc+0x230/0x628 [ 36.244374] test_out_of_bounds_read+0xdc/0x3e0 [ 36.244777] kunit_try_run_case+0x170/0x3f0 [ 36.245220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.245281] kthread+0x328/0x630 [ 36.245740] ret_from_fork+0x10/0x20 [ 36.245806] [ 36.245857] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 36.246354] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 36.246446] Hardware name: linux,dummy-virt (DT) [ 36.246485] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-krealloc_noprof
[ 32.349684] ================================================================== [ 32.350086] BUG: KFENCE: invalid free in krealloc_noprof+0x148/0x360 [ 32.350086] [ 32.350176] Invalid free of 0x00000000fc6b217a (in kfence-#96): [ 32.350220] krealloc_noprof+0x148/0x360 [ 32.350335] krealloc_uaf+0x180/0x520 [ 32.350378] kunit_try_run_case+0x170/0x3f0 [ 32.350416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351282] kthread+0x328/0x630 [ 32.351338] ret_from_fork+0x10/0x20 [ 32.351375] [ 32.351393] kfence-#96: 0x00000000fc6b217a-0x000000007ad0ddf6, size=201, cache=kmalloc-256 [ 32.351393] [ 32.351447] allocated by task 196 on cpu 1 at 32.337151s (0.014293s ago): [ 32.351507] krealloc_uaf+0xc8/0x520 [ 32.351544] kunit_try_run_case+0x170/0x3f0 [ 32.351579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351620] kthread+0x328/0x630 [ 32.351664] ret_from_fork+0x10/0x20 [ 32.351698] [ 32.351716] freed by task 196 on cpu 1 at 32.337250s (0.014463s ago): [ 32.351776] krealloc_uaf+0x12c/0x520 [ 32.351811] kunit_try_run_case+0x170/0x3f0 [ 32.351847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351887] kthread+0x328/0x630 [ 32.351917] ret_from_fork+0x10/0x20 [ 32.351951] [ 32.351981] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.352338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.352403] Hardware name: linux,dummy-virt (DT) [ 32.352467] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-__memcpy
[ 32.338692] ================================================================== [ 32.338780] BUG: KFENCE: use-after-free read in __memcpy+0xc/0x30 [ 32.338780] [ 32.339324] Use-after-free read at 0x00000000fc6b217a (in kfence-#96): [ 32.340463] __memcpy+0xc/0x30 [ 32.340545] krealloc_uaf+0x180/0x520 [ 32.340594] kunit_try_run_case+0x170/0x3f0 [ 32.340943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.341041] kthread+0x328/0x630 [ 32.341129] ret_from_fork+0x10/0x20 [ 32.341281] [ 32.341958] kfence-#96: 0x00000000fc6b217a-0x000000007ad0ddf6, size=201, cache=kmalloc-256 [ 32.341958] [ 32.342214] allocated by task 196 on cpu 1 at 32.337151s (0.004965s ago): [ 32.342699] krealloc_uaf+0xc8/0x520 [ 32.342761] kunit_try_run_case+0x170/0x3f0 [ 32.342798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.342861] kthread+0x328/0x630 [ 32.342893] ret_from_fork+0x10/0x20 [ 32.343780] [ 32.344734] freed by task 196 on cpu 1 at 32.337250s (0.006958s ago): [ 32.345130] krealloc_uaf+0x12c/0x520 [ 32.345411] kunit_try_run_case+0x170/0x3f0 [ 32.345624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.345779] kthread+0x328/0x630 [ 32.345829] ret_from_fork+0x10/0x20 [ 32.345978] [ 32.346450] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.346627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.346748] Hardware name: linux,dummy-virt (DT) [ 32.346949] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 35.688926] ================================================================== [ 35.688986] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 35.689493] Write of size 121 at addr fff00000c9a8b900 by task kunit_try_catch/317 [ 35.689699] [ 35.689745] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.690192] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.690246] Hardware name: linux,dummy-virt (DT) [ 35.690283] Call trace: [ 35.690309] show_stack+0x20/0x38 (C) [ 35.690575] dump_stack_lvl+0x8c/0xd0 [ 35.690675] print_report+0x118/0x5e8 [ 35.691004] kasan_report+0xdc/0x128 [ 35.691446] kasan_check_range+0x100/0x1a8 [ 35.691546] __kasan_check_write+0x20/0x30 [ 35.691682] strncpy_from_user+0x3c/0x2a0 [ 35.691787] copy_user_test_oob+0x5c0/0xec8 [ 35.691915] kunit_try_run_case+0x170/0x3f0 [ 35.691967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.692043] kthread+0x328/0x630 [ 35.692089] ret_from_fork+0x10/0x20 [ 35.692752] [ 35.692959] Allocated by task 317: [ 35.693186] kasan_save_stack+0x3c/0x68 [ 35.693256] kasan_save_track+0x20/0x40 [ 35.693437] kasan_save_alloc_info+0x40/0x58 [ 35.693652] __kasan_kmalloc+0xd4/0xd8 [ 35.693947] __kmalloc_noprof+0x198/0x4c8 [ 35.694060] kunit_kmalloc_array+0x34/0x88 [ 35.694105] copy_user_test_oob+0xac/0xec8 [ 35.694947] kunit_try_run_case+0x170/0x3f0 [ 35.695017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.695064] kthread+0x328/0x630 [ 35.695101] ret_from_fork+0x10/0x20 [ 35.695140] [ 35.695687] The buggy address belongs to the object at fff00000c9a8b900 [ 35.695687] which belongs to the cache kmalloc-128 of size 128 [ 35.695890] The buggy address is located 0 bytes inside of [ 35.695890] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.696191] [ 35.696454] The buggy address belongs to the physical page: [ 35.696784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.697177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.697245] page_type: f5(slab) [ 35.697738] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.698162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.698305] page dumped because: kasan: bad access detected [ 35.698393] [ 35.698598] Memory state around the buggy address: [ 35.698844] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.698915] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.698966] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.699594] ^ [ 35.699775] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.699904] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.700014] ================================================================== [ 35.701515] ================================================================== [ 35.701572] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 35.702042] Write of size 1 at addr fff00000c9a8b978 by task kunit_try_catch/317 [ 35.702173] [ 35.702218] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.702828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.702932] Hardware name: linux,dummy-virt (DT) [ 35.703028] Call trace: [ 35.703057] show_stack+0x20/0x38 (C) [ 35.703117] dump_stack_lvl+0x8c/0xd0 [ 35.703167] print_report+0x118/0x5e8 [ 35.703226] kasan_report+0xdc/0x128 [ 35.703719] __asan_report_store1_noabort+0x20/0x30 [ 35.704067] strncpy_from_user+0x270/0x2a0 [ 35.704192] copy_user_test_oob+0x5c0/0xec8 [ 35.704269] kunit_try_run_case+0x170/0x3f0 [ 35.704409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.704898] kthread+0x328/0x630 [ 35.705262] ret_from_fork+0x10/0x20 [ 35.705659] [ 35.705892] Allocated by task 317: [ 35.706135] kasan_save_stack+0x3c/0x68 [ 35.706249] kasan_save_track+0x20/0x40 [ 35.706298] kasan_save_alloc_info+0x40/0x58 [ 35.706478] __kasan_kmalloc+0xd4/0xd8 [ 35.706724] __kmalloc_noprof+0x198/0x4c8 [ 35.707130] kunit_kmalloc_array+0x34/0x88 [ 35.707535] copy_user_test_oob+0xac/0xec8 [ 35.707624] kunit_try_run_case+0x170/0x3f0 [ 35.707825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.707921] kthread+0x328/0x630 [ 35.708188] ret_from_fork+0x10/0x20 [ 35.708243] [ 35.708268] The buggy address belongs to the object at fff00000c9a8b900 [ 35.708268] which belongs to the cache kmalloc-128 of size 128 [ 35.708360] The buggy address is located 0 bytes to the right of [ 35.708360] allocated 120-byte region [fff00000c9a8b900, fff00000c9a8b978) [ 35.708434] [ 35.708463] The buggy address belongs to the physical page: [ 35.708518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 35.708574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.708627] page_type: f5(slab) [ 35.708690] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.708753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.708808] page dumped because: kasan: bad access detected [ 35.708841] [ 35.708863] Memory state around the buggy address: [ 35.708898] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.708952] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.708997] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.709054] ^ [ 35.709109] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709154] fff00000c9a8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709202] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 35.504984] ================================================================== [ 35.505111] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 35.505333] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/301 [ 35.505555] [ 35.505628] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.505784] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.505829] Hardware name: linux,dummy-virt (DT) [ 35.505868] Call trace: [ 35.505915] show_stack+0x20/0x38 (C) [ 35.506133] dump_stack_lvl+0x8c/0xd0 [ 35.506187] print_report+0x310/0x5e8 [ 35.506234] kasan_report+0xdc/0x128 [ 35.506280] __asan_report_load1_noabort+0x20/0x30 [ 35.506675] vmalloc_oob+0x578/0x5d0 [ 35.506756] kunit_try_run_case+0x170/0x3f0 [ 35.506962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.507151] kthread+0x328/0x630 [ 35.507495] ret_from_fork+0x10/0x20 [ 35.507704] [ 35.507745] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 35.508047] The buggy address belongs to the physical page: [ 35.508112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9d [ 35.508210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.508876] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.508964] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.509029] page dumped because: kasan: bad access detected [ 35.509225] [ 35.509316] Memory state around the buggy address: [ 35.509549] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.509636] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.510018] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 35.510119] ^ [ 35.510217] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.510350] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.510480] ================================================================== [ 35.512624] ================================================================== [ 35.512710] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 35.512776] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/301 [ 35.513147] [ 35.513281] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.513398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.513460] Hardware name: linux,dummy-virt (DT) [ 35.513495] Call trace: [ 35.513536] show_stack+0x20/0x38 (C) [ 35.513788] dump_stack_lvl+0x8c/0xd0 [ 35.514163] print_report+0x310/0x5e8 [ 35.514376] kasan_report+0xdc/0x128 [ 35.514523] __asan_report_load1_noabort+0x20/0x30 [ 35.514598] vmalloc_oob+0x51c/0x5d0 [ 35.514727] kunit_try_run_case+0x170/0x3f0 [ 35.514782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.514837] kthread+0x328/0x630 [ 35.515022] ret_from_fork+0x10/0x20 [ 35.515325] [ 35.515392] The buggy address belongs to a 1-page vmalloc region starting at 0xffff8000800fe000 allocated at vmalloc_oob+0x98/0x5d0 [ 35.515728] The buggy address belongs to the physical page: [ 35.515854] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9d [ 35.516310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.516418] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.516474] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.516518] page dumped because: kasan: bad access detected [ 35.516571] [ 35.516601] Memory state around the buggy address: [ 35.516651] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.516712] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.516759] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 35.516808] ^ [ 35.516868] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.516922] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 35.516962] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.161971] ================================================================== [ 35.162024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.162489] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.162786] [ 35.162823] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.162994] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.163085] Hardware name: linux,dummy-virt (DT) [ 35.163435] Call trace: [ 35.163497] show_stack+0x20/0x38 (C) [ 35.163625] dump_stack_lvl+0x8c/0xd0 [ 35.163743] print_report+0x118/0x5e8 [ 35.163849] kasan_report+0xdc/0x128 [ 35.164231] __asan_report_load4_noabort+0x20/0x30 [ 35.164318] kasan_atomics_helper+0x3dd8/0x4858 [ 35.164631] kasan_atomics+0x198/0x2e0 [ 35.164756] kunit_try_run_case+0x170/0x3f0 [ 35.164871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.165032] kthread+0x328/0x630 [ 35.165268] ret_from_fork+0x10/0x20 [ 35.165502] [ 35.165555] Allocated by task 297: [ 35.165605] kasan_save_stack+0x3c/0x68 [ 35.166010] kasan_save_track+0x20/0x40 [ 35.166250] kasan_save_alloc_info+0x40/0x58 [ 35.166406] __kasan_kmalloc+0xd4/0xd8 [ 35.166714] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.166842] kasan_atomics+0xb8/0x2e0 [ 35.167020] kunit_try_run_case+0x170/0x3f0 [ 35.167159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.167274] kthread+0x328/0x630 [ 35.167531] ret_from_fork+0x10/0x20 [ 35.167775] [ 35.167820] The buggy address belongs to the object at fff00000c9a5e780 [ 35.167820] which belongs to the cache kmalloc-64 of size 64 [ 35.167910] The buggy address is located 0 bytes to the right of [ 35.167910] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.167979] [ 35.168016] The buggy address belongs to the physical page: [ 35.168193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.168261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.168313] page_type: f5(slab) [ 35.168652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.168784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.169286] page dumped because: kasan: bad access detected [ 35.169403] [ 35.169424] Memory state around the buggy address: [ 35.169461] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.169515] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.169989] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.170282] ^ [ 35.170378] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.170540] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.170589] ================================================================== [ 35.052836] ================================================================== [ 35.052902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.052959] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.053137] [ 35.053298] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.053694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.053893] Hardware name: linux,dummy-virt (DT) [ 35.054061] Call trace: [ 35.054091] show_stack+0x20/0x38 (C) [ 35.054147] dump_stack_lvl+0x8c/0xd0 [ 35.054477] print_report+0x118/0x5e8 [ 35.054551] kasan_report+0xdc/0x128 [ 35.055004] __asan_report_load4_noabort+0x20/0x30 [ 35.055241] kasan_atomics_helper+0x42d8/0x4858 [ 35.055442] kasan_atomics+0x198/0x2e0 [ 35.055565] kunit_try_run_case+0x170/0x3f0 [ 35.055658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.055726] kthread+0x328/0x630 [ 35.055769] ret_from_fork+0x10/0x20 [ 35.055820] [ 35.055845] Allocated by task 297: [ 35.055888] kasan_save_stack+0x3c/0x68 [ 35.055931] kasan_save_track+0x20/0x40 [ 35.055967] kasan_save_alloc_info+0x40/0x58 [ 35.056008] __kasan_kmalloc+0xd4/0xd8 [ 35.056045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.056089] kasan_atomics+0xb8/0x2e0 [ 35.056126] kunit_try_run_case+0x170/0x3f0 [ 35.056177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.056222] kthread+0x328/0x630 [ 35.056255] ret_from_fork+0x10/0x20 [ 35.056300] [ 35.056324] The buggy address belongs to the object at fff00000c9a5e780 [ 35.056324] which belongs to the cache kmalloc-64 of size 64 [ 35.056383] The buggy address is located 0 bytes to the right of [ 35.056383] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.057505] page dumped because: kasan: bad access detected [ 35.057671] [ 35.057870] Memory state around the buggy address: [ 35.058090] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.059104] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.061600] [ 35.062438] Hardware name: linux,dummy-virt (DT) [ 35.063850] kasan_atomics+0x198/0x2e0 [ 35.066600] [ 35.066658] The buggy address belongs to the object at fff00000c9a5e780 [ 35.066658] which belongs to the cache kmalloc-64 of size 64 [ 35.067036] The buggy address is located 0 bytes to the right of [ 35.067036] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.067314] [ 35.067532] The buggy address belongs to the physical page: [ 35.067727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.067870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.068008] page_type: f5(slab) [ 35.068083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.068170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.068259] page dumped because: kasan: bad access detected [ 35.068406] [ 35.068442] Memory state around the buggy address: [ 35.068670] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.068735] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.068805] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.068846] ^ [ 35.068895] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.068942] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.068982] ================================================================== [ 35.381588] ================================================================== [ 35.381769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 35.381855] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.381908] [ 35.382227] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.382344] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.382379] Hardware name: linux,dummy-virt (DT) [ 35.382872] Call trace: [ 35.383219] show_stack+0x20/0x38 (C) [ 35.383288] dump_stack_lvl+0x8c/0xd0 [ 35.383374] print_report+0x118/0x5e8 [ 35.383458] kasan_report+0xdc/0x128 [ 35.383540] kasan_check_range+0x100/0x1a8 [ 35.383628] __kasan_check_write+0x20/0x30 [ 35.384013] kasan_atomics_helper+0x147c/0x4858 [ 35.384538] kasan_atomics+0x198/0x2e0 [ 35.384649] kunit_try_run_case+0x170/0x3f0 [ 35.384734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.384909] kthread+0x328/0x630 [ 35.384984] ret_from_fork+0x10/0x20 [ 35.385063] [ 35.385107] Allocated by task 297: [ 35.385164] kasan_save_stack+0x3c/0x68 [ 35.385208] kasan_save_track+0x20/0x40 [ 35.385254] kasan_save_alloc_info+0x40/0x58 [ 35.385295] __kasan_kmalloc+0xd4/0xd8 [ 35.385332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.385376] kasan_atomics+0xb8/0x2e0 [ 35.385437] kunit_try_run_case+0x170/0x3f0 [ 35.385478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.385523] kthread+0x328/0x630 [ 35.385559] ret_from_fork+0x10/0x20 [ 35.385597] [ 35.385628] The buggy address belongs to the object at fff00000c9a5e780 [ 35.385628] which belongs to the cache kmalloc-64 of size 64 [ 35.385702] The buggy address is located 0 bytes to the right of [ 35.385702] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.385777] [ 35.385800] The buggy address belongs to the physical page: [ 35.385845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.385903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.385952] page_type: f5(slab) [ 35.385993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.386043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.386085] page dumped because: kasan: bad access detected [ 35.386118] [ 35.386141] Memory state around the buggy address: [ 35.386175] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.386235] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.386281] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.386330] ^ [ 35.386387] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.386435] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.386475] ================================================================== [ 35.287024] ================================================================== [ 35.287142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.287229] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.287290] [ 35.287557] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.287997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.288433] Hardware name: linux,dummy-virt (DT) [ 35.288908] Call trace: [ 35.288965] show_stack+0x20/0x38 (C) [ 35.289144] dump_stack_lvl+0x8c/0xd0 [ 35.289742] print_report+0x118/0x5e8 [ 35.289950] kasan_report+0xdc/0x128 [ 35.290004] kasan_check_range+0x100/0x1a8 [ 35.290052] __kasan_check_write+0x20/0x30 [ 35.290692] kasan_atomics_helper+0x10c0/0x4858 [ 35.290784] kasan_atomics+0x198/0x2e0 [ 35.290925] kunit_try_run_case+0x170/0x3f0 [ 35.291031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291181] kthread+0x328/0x630 [ 35.291229] ret_from_fork+0x10/0x20 [ 35.291280] [ 35.291312] Allocated by task 297: [ 35.291668] kasan_save_stack+0x3c/0x68 [ 35.291938] kasan_save_track+0x20/0x40 [ 35.292189] kasan_save_alloc_info+0x40/0x58 [ 35.292281] __kasan_kmalloc+0xd4/0xd8 [ 35.292353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.292683] kasan_atomics+0xb8/0x2e0 [ 35.292770] kunit_try_run_case+0x170/0x3f0 [ 35.292813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.293175] kthread+0x328/0x630 [ 35.293605] ret_from_fork+0x10/0x20 [ 35.293744] [ 35.293791] The buggy address belongs to the object at fff00000c9a5e780 [ 35.293791] which belongs to the cache kmalloc-64 of size 64 [ 35.294055] The buggy address is located 0 bytes to the right of [ 35.294055] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.294254] [ 35.294292] The buggy address belongs to the physical page: [ 35.294560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.294801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.294932] page_type: f5(slab) [ 35.295446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.295573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.295704] page dumped because: kasan: bad access detected [ 35.295780] [ 35.295905] Memory state around the buggy address: [ 35.295942] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.295988] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.296033] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.296502] ^ [ 35.296572] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.297073] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.297217] ================================================================== [ 35.239848] ================================================================== [ 35.240290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.241249] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.241322] [ 35.241396] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.241499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.241533] Hardware name: linux,dummy-virt (DT) [ 35.241575] Call trace: [ 35.241614] show_stack+0x20/0x38 (C) [ 35.241789] dump_stack_lvl+0x8c/0xd0 [ 35.242038] print_report+0x118/0x5e8 [ 35.242111] kasan_report+0xdc/0x128 [ 35.242201] kasan_check_range+0x100/0x1a8 [ 35.242278] __kasan_check_write+0x20/0x30 [ 35.242328] kasan_atomics_helper+0xeb8/0x4858 [ 35.242695] kasan_atomics+0x198/0x2e0 [ 35.242926] kunit_try_run_case+0x170/0x3f0 [ 35.243307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.243443] kthread+0x328/0x630 [ 35.243493] ret_from_fork+0x10/0x20 [ 35.243565] [ 35.243589] Allocated by task 297: [ 35.243623] kasan_save_stack+0x3c/0x68 [ 35.243986] kasan_save_track+0x20/0x40 [ 35.244218] kasan_save_alloc_info+0x40/0x58 [ 35.244352] __kasan_kmalloc+0xd4/0xd8 [ 35.244922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.245129] kasan_atomics+0xb8/0x2e0 [ 35.245354] kunit_try_run_case+0x170/0x3f0 [ 35.245409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.245837] kthread+0x328/0x630 [ 35.246061] ret_from_fork+0x10/0x20 [ 35.246340] [ 35.246578] The buggy address belongs to the object at fff00000c9a5e780 [ 35.246578] which belongs to the cache kmalloc-64 of size 64 [ 35.246903] The buggy address is located 0 bytes to the right of [ 35.246903] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.247074] [ 35.247294] The buggy address belongs to the physical page: [ 35.247364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.247442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.247504] page_type: f5(slab) [ 35.247552] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.247603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.247658] page dumped because: kasan: bad access detected [ 35.247701] [ 35.247725] Memory state around the buggy address: [ 35.247768] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.247839] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.247886] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.247927] ^ [ 35.247962] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.248016] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.248065] ================================================================== [ 35.229295] ================================================================== [ 35.229378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.229437] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.229707] [ 35.229994] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.230099] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.230134] Hardware name: linux,dummy-virt (DT) [ 35.230353] Call trace: [ 35.230805] show_stack+0x20/0x38 (C) [ 35.230988] dump_stack_lvl+0x8c/0xd0 [ 35.231276] print_report+0x118/0x5e8 [ 35.231358] kasan_report+0xdc/0x128 [ 35.231599] __asan_report_store8_noabort+0x20/0x30 [ 35.231913] kasan_atomics_helper+0x3e5c/0x4858 [ 35.232329] kasan_atomics+0x198/0x2e0 [ 35.232605] kunit_try_run_case+0x170/0x3f0 [ 35.232809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.233190] kthread+0x328/0x630 [ 35.233305] ret_from_fork+0x10/0x20 [ 35.233715] [ 35.233748] Allocated by task 297: [ 35.233798] kasan_save_stack+0x3c/0x68 [ 35.234215] kasan_save_track+0x20/0x40 [ 35.234279] kasan_save_alloc_info+0x40/0x58 [ 35.234322] __kasan_kmalloc+0xd4/0xd8 [ 35.234360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.234407] kasan_atomics+0xb8/0x2e0 [ 35.234999] kunit_try_run_case+0x170/0x3f0 [ 35.235082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.235247] kthread+0x328/0x630 [ 35.235632] ret_from_fork+0x10/0x20 [ 35.235839] [ 35.235921] The buggy address belongs to the object at fff00000c9a5e780 [ 35.235921] which belongs to the cache kmalloc-64 of size 64 [ 35.236048] The buggy address is located 0 bytes to the right of [ 35.236048] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.236505] [ 35.236560] The buggy address belongs to the physical page: [ 35.236928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.237329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.237764] page_type: f5(slab) [ 35.237903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.237966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.238025] page dumped because: kasan: bad access detected [ 35.238069] [ 35.238092] Memory state around the buggy address: [ 35.238136] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.238200] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.238265] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.238307] ^ [ 35.238343] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.238387] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.238437] ================================================================== [ 35.361401] ================================================================== [ 35.361485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 35.361624] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.361694] [ 35.361737] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.362164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.362222] Hardware name: linux,dummy-virt (DT) [ 35.362269] Call trace: [ 35.362295] show_stack+0x20/0x38 (C) [ 35.363232] dump_stack_lvl+0x8c/0xd0 [ 35.363327] print_report+0x118/0x5e8 [ 35.363404] kasan_report+0xdc/0x128 [ 35.363480] __asan_report_load8_noabort+0x20/0x30 [ 35.363797] kasan_atomics_helper+0x3f04/0x4858 [ 35.364234] kasan_atomics+0x198/0x2e0 [ 35.364346] kunit_try_run_case+0x170/0x3f0 [ 35.365039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.365627] kthread+0x328/0x630 [ 35.366276] ret_from_fork+0x10/0x20 [ 35.366976] [ 35.367049] Allocated by task 297: [ 35.367123] kasan_save_stack+0x3c/0x68 [ 35.367172] kasan_save_track+0x20/0x40 [ 35.367211] kasan_save_alloc_info+0x40/0x58 [ 35.367251] __kasan_kmalloc+0xd4/0xd8 [ 35.367674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.368107] kasan_atomics+0xb8/0x2e0 [ 35.368172] kunit_try_run_case+0x170/0x3f0 [ 35.368215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.368569] kthread+0x328/0x630 [ 35.368799] ret_from_fork+0x10/0x20 [ 35.368946] [ 35.369066] The buggy address belongs to the object at fff00000c9a5e780 [ 35.369066] which belongs to the cache kmalloc-64 of size 64 [ 35.369134] The buggy address is located 0 bytes to the right of [ 35.369134] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.369199] [ 35.369251] The buggy address belongs to the physical page: [ 35.369290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.369358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.369426] page_type: f5(slab) [ 35.369480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.369539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.369580] page dumped because: kasan: bad access detected [ 35.369614] [ 35.369667] Memory state around the buggy address: [ 35.369710] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.369777] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.369831] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.369879] ^ [ 35.369930] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.369984] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.370033] ================================================================== [ 35.426281] ================================================================== [ 35.426806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 35.426887] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.426940] [ 35.427059] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.427278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.427333] Hardware name: linux,dummy-virt (DT) [ 35.427384] Call trace: [ 35.427440] show_stack+0x20/0x38 (C) [ 35.427753] dump_stack_lvl+0x8c/0xd0 [ 35.428360] print_report+0x118/0x5e8 [ 35.428446] kasan_report+0xdc/0x128 [ 35.428655] kasan_check_range+0x100/0x1a8 [ 35.428987] __kasan_check_write+0x20/0x30 [ 35.429219] kasan_atomics_helper+0x1644/0x4858 [ 35.429282] kasan_atomics+0x198/0x2e0 [ 35.429358] kunit_try_run_case+0x170/0x3f0 [ 35.429409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.429480] kthread+0x328/0x630 [ 35.429534] ret_from_fork+0x10/0x20 [ 35.429584] [ 35.429609] Allocated by task 297: [ 35.430077] kasan_save_stack+0x3c/0x68 [ 35.430150] kasan_save_track+0x20/0x40 [ 35.430672] kasan_save_alloc_info+0x40/0x58 [ 35.430979] __kasan_kmalloc+0xd4/0xd8 [ 35.431177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.431530] kasan_atomics+0xb8/0x2e0 [ 35.431693] kunit_try_run_case+0x170/0x3f0 [ 35.431822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.431872] kthread+0x328/0x630 [ 35.431909] ret_from_fork+0x10/0x20 [ 35.431955] [ 35.431979] The buggy address belongs to the object at fff00000c9a5e780 [ 35.431979] which belongs to the cache kmalloc-64 of size 64 [ 35.432625] The buggy address is located 0 bytes to the right of [ 35.432625] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.432745] [ 35.432799] The buggy address belongs to the physical page: [ 35.433097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.433495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.433720] page_type: f5(slab) [ 35.433845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.434078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.434415] page dumped because: kasan: bad access detected [ 35.434494] [ 35.434564] Memory state around the buggy address: [ 35.434912] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.435102] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.435150] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.435526] ^ [ 35.435619] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.435725] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.435785] ================================================================== [ 35.417405] ================================================================== [ 35.417691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 35.417824] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.417913] [ 35.417950] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.418037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.418071] Hardware name: linux,dummy-virt (DT) [ 35.418104] Call trace: [ 35.418130] show_stack+0x20/0x38 (C) [ 35.418182] dump_stack_lvl+0x8c/0xd0 [ 35.418231] print_report+0x118/0x5e8 [ 35.418279] kasan_report+0xdc/0x128 [ 35.418324] __asan_report_load8_noabort+0x20/0x30 [ 35.418374] kasan_atomics_helper+0x3db0/0x4858 [ 35.418535] kasan_atomics+0x198/0x2e0 [ 35.418595] kunit_try_run_case+0x170/0x3f0 [ 35.418659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.418714] kthread+0x328/0x630 [ 35.418779] ret_from_fork+0x10/0x20 [ 35.418842] [ 35.418876] Allocated by task 297: [ 35.418909] kasan_save_stack+0x3c/0x68 [ 35.419886] kasan_save_track+0x20/0x40 [ 35.419974] kasan_save_alloc_info+0x40/0x58 [ 35.420570] __kasan_kmalloc+0xd4/0xd8 [ 35.420792] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.421219] kasan_atomics+0xb8/0x2e0 [ 35.421327] kunit_try_run_case+0x170/0x3f0 [ 35.421431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.421523] kthread+0x328/0x630 [ 35.421869] ret_from_fork+0x10/0x20 [ 35.422200] [ 35.422400] The buggy address belongs to the object at fff00000c9a5e780 [ 35.422400] which belongs to the cache kmalloc-64 of size 64 [ 35.422469] The buggy address is located 0 bytes to the right of [ 35.422469] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.422786] [ 35.423119] The buggy address belongs to the physical page: [ 35.423204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.423324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.423470] page_type: f5(slab) [ 35.423605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.423735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.424090] page dumped because: kasan: bad access detected [ 35.424160] [ 35.424208] Memory state around the buggy address: [ 35.424339] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.424426] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.424479] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.424519] ^ [ 35.424715] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.424783] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.424942] ================================================================== [ 34.903792] ================================================================== [ 34.903861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.903917] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 34.904342] [ 34.904394] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.905922] kasan_atomics+0x198/0x2e0 [ 34.906925] kasan_save_track+0x20/0x40 [ 34.909004] The buggy address is located 0 bytes to the right of [ 34.909004] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 34.909634] [ 34.909759] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.912867] ================================================================== [ 35.248996] ================================================================== [ 35.249050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.249608] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.249705] [ 35.249888] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.250242] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.250333] Hardware name: linux,dummy-virt (DT) [ 35.250371] Call trace: [ 35.250397] show_stack+0x20/0x38 (C) [ 35.250470] dump_stack_lvl+0x8c/0xd0 [ 35.250631] print_report+0x118/0x5e8 [ 35.250799] kasan_report+0xdc/0x128 [ 35.250852] kasan_check_range+0x100/0x1a8 [ 35.251024] __kasan_check_write+0x20/0x30 [ 35.251323] kasan_atomics_helper+0xf20/0x4858 [ 35.251452] kasan_atomics+0x198/0x2e0 [ 35.251542] kunit_try_run_case+0x170/0x3f0 [ 35.251917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.252312] kthread+0x328/0x630 [ 35.252525] ret_from_fork+0x10/0x20 [ 35.252776] [ 35.252827] Allocated by task 297: [ 35.252864] kasan_save_stack+0x3c/0x68 [ 35.253332] kasan_save_track+0x20/0x40 [ 35.253537] kasan_save_alloc_info+0x40/0x58 [ 35.253979] __kasan_kmalloc+0xd4/0xd8 [ 35.254150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.254319] kasan_atomics+0xb8/0x2e0 [ 35.254517] kunit_try_run_case+0x170/0x3f0 [ 35.254665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.254925] kthread+0x328/0x630 [ 35.254991] ret_from_fork+0x10/0x20 [ 35.255170] [ 35.255487] The buggy address belongs to the object at fff00000c9a5e780 [ 35.255487] which belongs to the cache kmalloc-64 of size 64 [ 35.255589] The buggy address is located 0 bytes to the right of [ 35.255589] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.255666] [ 35.255689] The buggy address belongs to the physical page: [ 35.255887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.256376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.256471] page_type: f5(slab) [ 35.256527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.256622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.256705] page dumped because: kasan: bad access detected [ 35.256741] [ 35.256787] Memory state around the buggy address: [ 35.256824] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.256870] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.256914] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.256964] ^ [ 35.257000] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.257044] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.257085] ================================================================== [ 35.407891] ================================================================== [ 35.407958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 35.408092] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.408317] [ 35.408493] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.408775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.408986] Hardware name: linux,dummy-virt (DT) [ 35.409062] Call trace: [ 35.409119] show_stack+0x20/0x38 (C) [ 35.409494] dump_stack_lvl+0x8c/0xd0 [ 35.409570] print_report+0x118/0x5e8 [ 35.409700] kasan_report+0xdc/0x128 [ 35.409754] kasan_check_range+0x100/0x1a8 [ 35.409804] __kasan_check_write+0x20/0x30 [ 35.410377] kasan_atomics_helper+0x15b4/0x4858 [ 35.410466] kasan_atomics+0x198/0x2e0 [ 35.410517] kunit_try_run_case+0x170/0x3f0 [ 35.410603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.410683] kthread+0x328/0x630 [ 35.410741] ret_from_fork+0x10/0x20 [ 35.410793] [ 35.410822] Allocated by task 297: [ 35.410865] kasan_save_stack+0x3c/0x68 [ 35.410908] kasan_save_track+0x20/0x40 [ 35.411313] kasan_save_alloc_info+0x40/0x58 [ 35.411392] __kasan_kmalloc+0xd4/0xd8 [ 35.411455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.411653] kasan_atomics+0xb8/0x2e0 [ 35.411876] kunit_try_run_case+0x170/0x3f0 [ 35.412112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.412247] kthread+0x328/0x630 [ 35.412470] ret_from_fork+0x10/0x20 [ 35.412519] [ 35.412727] The buggy address belongs to the object at fff00000c9a5e780 [ 35.412727] which belongs to the cache kmalloc-64 of size 64 [ 35.412926] The buggy address is located 0 bytes to the right of [ 35.412926] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.413029] [ 35.413502] The buggy address belongs to the physical page: [ 35.413705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.414146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.414264] page_type: f5(slab) [ 35.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.414717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.414779] page dumped because: kasan: bad access detected [ 35.415155] [ 35.415265] Memory state around the buggy address: [ 35.415345] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.415490] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.415537] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.415600] ^ [ 35.415637] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.416031] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.416118] ================================================================== [ 35.108888] ================================================================== [ 35.109118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.109301] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.109404] [ 35.109446] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.109546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.109580] Hardware name: linux,dummy-virt (DT) [ 35.110256] kasan_report+0xdc/0x128 [ 35.112931] kasan_atomics+0xb8/0x2e0 [ 35.114541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.115307] [ 35.115375] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.119564] ================================================================== [ 35.258686] ================================================================== [ 35.258869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.258979] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.259414] [ 35.259623] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.259779] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.260232] Hardware name: linux,dummy-virt (DT) [ 35.260364] Call trace: [ 35.260514] show_stack+0x20/0x38 (C) [ 35.260572] dump_stack_lvl+0x8c/0xd0 [ 35.260915] print_report+0x118/0x5e8 [ 35.261280] kasan_report+0xdc/0x128 [ 35.261425] kasan_check_range+0x100/0x1a8 [ 35.261499] __kasan_check_write+0x20/0x30 [ 35.262237] kasan_atomics_helper+0xf88/0x4858 [ 35.262351] kasan_atomics+0x198/0x2e0 [ 35.262528] kunit_try_run_case+0x170/0x3f0 [ 35.263043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.263453] kthread+0x328/0x630 [ 35.263549] ret_from_fork+0x10/0x20 [ 35.263605] [ 35.263631] Allocated by task 297: [ 35.263679] kasan_save_stack+0x3c/0x68 [ 35.263960] kasan_save_track+0x20/0x40 [ 35.264274] kasan_save_alloc_info+0x40/0x58 [ 35.264422] __kasan_kmalloc+0xd4/0xd8 [ 35.264502] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.264551] kasan_atomics+0xb8/0x2e0 [ 35.264938] kunit_try_run_case+0x170/0x3f0 [ 35.265097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.265189] kthread+0x328/0x630 [ 35.265228] ret_from_fork+0x10/0x20 [ 35.265293] [ 35.265318] The buggy address belongs to the object at fff00000c9a5e780 [ 35.265318] which belongs to the cache kmalloc-64 of size 64 [ 35.265378] The buggy address is located 0 bytes to the right of [ 35.265378] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.265451] [ 35.265483] The buggy address belongs to the physical page: [ 35.265520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.265578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.265658] page_type: f5(slab) [ 35.265700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.265760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.265803] page dumped because: kasan: bad access detected [ 35.265847] [ 35.265876] Memory state around the buggy address: [ 35.265930] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.265989] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.266044] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.266085] ^ [ 35.266120] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.266164] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.266205] ================================================================== [ 35.477980] ================================================================== [ 35.478519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 35.478600] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.478664] [ 35.478929] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.479270] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.479352] Hardware name: linux,dummy-virt (DT) [ 35.479704] Call trace: [ 35.479912] show_stack+0x20/0x38 (C) [ 35.480052] dump_stack_lvl+0x8c/0xd0 [ 35.480281] print_report+0x118/0x5e8 [ 35.480557] kasan_report+0xdc/0x128 [ 35.480651] kasan_check_range+0x100/0x1a8 [ 35.481149] __kasan_check_write+0x20/0x30 [ 35.481253] kasan_atomics_helper+0x17ec/0x4858 [ 35.481309] kasan_atomics+0x198/0x2e0 [ 35.481358] kunit_try_run_case+0x170/0x3f0 [ 35.482069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.482159] kthread+0x328/0x630 [ 35.482371] ret_from_fork+0x10/0x20 [ 35.482616] [ 35.482687] Allocated by task 297: [ 35.482939] kasan_save_stack+0x3c/0x68 [ 35.483045] kasan_save_track+0x20/0x40 [ 35.483319] kasan_save_alloc_info+0x40/0x58 [ 35.483567] __kasan_kmalloc+0xd4/0xd8 [ 35.483749] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.483878] kasan_atomics+0xb8/0x2e0 [ 35.484481] kunit_try_run_case+0x170/0x3f0 [ 35.484736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.484827] kthread+0x328/0x630 [ 35.485168] ret_from_fork+0x10/0x20 [ 35.485352] [ 35.485492] The buggy address belongs to the object at fff00000c9a5e780 [ 35.485492] which belongs to the cache kmalloc-64 of size 64 [ 35.485735] The buggy address is located 0 bytes to the right of [ 35.485735] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.485810] [ 35.485833] The buggy address belongs to the physical page: [ 35.485869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.485926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.485977] page_type: f5(slab) [ 35.486017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.486068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.486111] page dumped because: kasan: bad access detected [ 35.486229] [ 35.486253] Memory state around the buggy address: [ 35.486290] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.486345] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.486396] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.486436] ^ [ 35.486480] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.486534] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.486583] ================================================================== [ 35.091907] ================================================================== [ 35.092143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.092275] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.092363] [ 35.092684] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.092795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.092831] Hardware name: linux,dummy-virt (DT) [ 35.092895] Call trace: [ 35.092927] show_stack+0x20/0x38 (C) [ 35.092985] dump_stack_lvl+0x8c/0xd0 [ 35.093037] print_report+0x118/0x5e8 [ 35.093099] kasan_report+0xdc/0x128 [ 35.093147] kasan_check_range+0x100/0x1a8 [ 35.093195] __kasan_check_write+0x20/0x30 [ 35.093242] kasan_atomics_helper+0xa6c/0x4858 [ 35.093291] kasan_atomics+0x198/0x2e0 [ 35.093340] kunit_try_run_case+0x170/0x3f0 [ 35.093388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.093439] kthread+0x328/0x630 [ 35.093485] ret_from_fork+0x10/0x20 [ 35.093542] [ 35.093566] Allocated by task 297: [ 35.093599] kasan_save_stack+0x3c/0x68 [ 35.093658] kasan_save_track+0x20/0x40 [ 35.093698] kasan_save_alloc_info+0x40/0x58 [ 35.093748] __kasan_kmalloc+0xd4/0xd8 [ 35.093785] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.093828] kasan_atomics+0xb8/0x2e0 [ 35.093869] kunit_try_run_case+0x170/0x3f0 [ 35.093908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.093953] kthread+0x328/0x630 [ 35.093997] ret_from_fork+0x10/0x20 [ 35.094046] [ 35.094068] The buggy address belongs to the object at fff00000c9a5e780 [ 35.094068] which belongs to the cache kmalloc-64 of size 64 [ 35.094136] The buggy address is located 0 bytes to the right of [ 35.094136] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.094210] [ 35.094233] The buggy address belongs to the physical page: [ 35.094281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.094348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.094409] page_type: f5(slab) [ 35.094451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.094505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.094556] page dumped because: kasan: bad access detected [ 35.094590] [ 35.094612] Memory state around the buggy address: [ 35.095164] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.096037] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.096134] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.096280] ^ [ 35.096606] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.096910] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.097310] ================================================================== [ 35.454438] ================================================================== [ 35.454491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 35.454545] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.454596] [ 35.454628] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.454742] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.454774] Hardware name: linux,dummy-virt (DT) [ 35.454807] Call trace: [ 35.454831] show_stack+0x20/0x38 (C) [ 35.454881] dump_stack_lvl+0x8c/0xd0 [ 35.454931] print_report+0x118/0x5e8 [ 35.454992] kasan_report+0xdc/0x128 [ 35.455039] __asan_report_load8_noabort+0x20/0x30 [ 35.455090] kasan_atomics_helper+0x3e10/0x4858 [ 35.455729] kasan_atomics+0x198/0x2e0 [ 35.455807] kunit_try_run_case+0x170/0x3f0 [ 35.455888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.456398] kthread+0x328/0x630 [ 35.456478] ret_from_fork+0x10/0x20 [ 35.457037] [ 35.457220] Allocated by task 297: [ 35.457278] kasan_save_stack+0x3c/0x68 [ 35.457357] kasan_save_track+0x20/0x40 [ 35.457689] kasan_save_alloc_info+0x40/0x58 [ 35.457754] __kasan_kmalloc+0xd4/0xd8 [ 35.458085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.458487] kasan_atomics+0xb8/0x2e0 [ 35.458560] kunit_try_run_case+0x170/0x3f0 [ 35.458635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.458692] kthread+0x328/0x630 [ 35.458902] ret_from_fork+0x10/0x20 [ 35.459087] [ 35.459278] The buggy address belongs to the object at fff00000c9a5e780 [ 35.459278] which belongs to the cache kmalloc-64 of size 64 [ 35.459714] The buggy address is located 0 bytes to the right of [ 35.459714] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.459965] [ 35.460003] The buggy address belongs to the physical page: [ 35.460056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.460413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.460660] page_type: f5(slab) [ 35.460729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.460880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.460970] page dumped because: kasan: bad access detected [ 35.461045] [ 35.461436] Memory state around the buggy address: [ 35.461614] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.461707] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.461761] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.462053] ^ [ 35.462197] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.462267] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.462563] ================================================================== [ 35.388330] ================================================================== [ 35.388700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 35.388770] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.388822] [ 35.389228] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.389352] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.389450] Hardware name: linux,dummy-virt (DT) [ 35.389517] Call trace: [ 35.389555] show_stack+0x20/0x38 (C) [ 35.389762] dump_stack_lvl+0x8c/0xd0 [ 35.389851] print_report+0x118/0x5e8 [ 35.389905] kasan_report+0xdc/0x128 [ 35.390299] kasan_check_range+0x100/0x1a8 [ 35.390436] __kasan_check_write+0x20/0x30 [ 35.390774] kasan_atomics_helper+0x14e4/0x4858 [ 35.390861] kasan_atomics+0x198/0x2e0 [ 35.390946] kunit_try_run_case+0x170/0x3f0 [ 35.391038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.391348] kthread+0x328/0x630 [ 35.391513] ret_from_fork+0x10/0x20 [ 35.391568] [ 35.391606] Allocated by task 297: [ 35.391655] kasan_save_stack+0x3c/0x68 [ 35.391947] kasan_save_track+0x20/0x40 [ 35.392385] kasan_save_alloc_info+0x40/0x58 [ 35.392460] __kasan_kmalloc+0xd4/0xd8 [ 35.392521] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.392586] kasan_atomics+0xb8/0x2e0 [ 35.392939] kunit_try_run_case+0x170/0x3f0 [ 35.393289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.393370] kthread+0x328/0x630 [ 35.393485] ret_from_fork+0x10/0x20 [ 35.393525] [ 35.394138] The buggy address belongs to the object at fff00000c9a5e780 [ 35.394138] which belongs to the cache kmalloc-64 of size 64 [ 35.394512] The buggy address is located 0 bytes to the right of [ 35.394512] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.394685] [ 35.394732] The buggy address belongs to the physical page: [ 35.394778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.394923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.395021] page_type: f5(slab) [ 35.395314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.395551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.395637] page dumped because: kasan: bad access detected [ 35.395745] [ 35.395768] Memory state around the buggy address: [ 35.395804] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.395872] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.395918] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.396076] ^ [ 35.396277] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.396732] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.396803] ================================================================== [ 35.436976] ================================================================== [ 35.437113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 35.437173] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.437231] [ 35.437266] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.437355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.437388] Hardware name: linux,dummy-virt (DT) [ 35.437420] Call trace: [ 35.437445] show_stack+0x20/0x38 (C) [ 35.437495] dump_stack_lvl+0x8c/0xd0 [ 35.437545] print_report+0x118/0x5e8 [ 35.437591] kasan_report+0xdc/0x128 [ 35.437637] __asan_report_load8_noabort+0x20/0x30 [ 35.437766] kasan_atomics_helper+0x3df4/0x4858 [ 35.437829] kasan_atomics+0x198/0x2e0 [ 35.437878] kunit_try_run_case+0x170/0x3f0 [ 35.437927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.437982] kthread+0x328/0x630 [ 35.438027] ret_from_fork+0x10/0x20 [ 35.438074] [ 35.438095] Allocated by task 297: [ 35.438126] kasan_save_stack+0x3c/0x68 [ 35.438166] kasan_save_track+0x20/0x40 [ 35.438203] kasan_save_alloc_info+0x40/0x58 [ 35.438242] __kasan_kmalloc+0xd4/0xd8 [ 35.438287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.438329] kasan_atomics+0xb8/0x2e0 [ 35.438368] kunit_try_run_case+0x170/0x3f0 [ 35.438416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.438462] kthread+0x328/0x630 [ 35.438495] ret_from_fork+0x10/0x20 [ 35.438533] [ 35.438553] The buggy address belongs to the object at fff00000c9a5e780 [ 35.438553] which belongs to the cache kmalloc-64 of size 64 [ 35.438619] The buggy address is located 0 bytes to the right of [ 35.438619] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.439814] [ 35.439944] The buggy address belongs to the physical page: [ 35.440050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.440350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.440715] page_type: f5(slab) [ 35.441155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.441292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.441451] page dumped because: kasan: bad access detected [ 35.441526] [ 35.441571] Memory state around the buggy address: [ 35.442041] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.442185] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.442662] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.443045] ^ [ 35.443117] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.443223] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.443305] ================================================================== [ 34.942887] ================================================================== [ 34.942952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.943264] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 34.944658] dump_stack_lvl+0x8c/0xd0 [ 34.945588] kasan_atomics_helper+0x414/0x4858 [ 34.947223] kasan_save_stack+0x3c/0x68 [ 34.947946] kasan_atomics+0xb8/0x2e0 [ 34.948486] [ 34.948765] The buggy address belongs to the object at fff00000c9a5e780 [ 34.948765] which belongs to the cache kmalloc-64 of size 64 [ 34.950818] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.954493] ================================================================== [ 35.463423] ================================================================== [ 35.463477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 35.463533] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.463584] [ 35.463617] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.463721] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.463753] Hardware name: linux,dummy-virt (DT) [ 35.463785] Call trace: [ 35.463809] show_stack+0x20/0x38 (C) [ 35.463859] dump_stack_lvl+0x8c/0xd0 [ 35.463909] print_report+0x118/0x5e8 [ 35.464137] kasan_report+0xdc/0x128 [ 35.464201] kasan_check_range+0x100/0x1a8 [ 35.464249] __kasan_check_write+0x20/0x30 [ 35.464298] kasan_atomics_helper+0x175c/0x4858 [ 35.464350] kasan_atomics+0x198/0x2e0 [ 35.464398] kunit_try_run_case+0x170/0x3f0 [ 35.464447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.464501] kthread+0x328/0x630 [ 35.464544] ret_from_fork+0x10/0x20 [ 35.464602] [ 35.464624] Allocated by task 297: [ 35.465412] kasan_save_stack+0x3c/0x68 [ 35.465634] kasan_save_track+0x20/0x40 [ 35.465704] kasan_save_alloc_info+0x40/0x58 [ 35.465943] __kasan_kmalloc+0xd4/0xd8 [ 35.466005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.466059] kasan_atomics+0xb8/0x2e0 [ 35.466437] kunit_try_run_case+0x170/0x3f0 [ 35.466881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.467157] kthread+0x328/0x630 [ 35.467200] ret_from_fork+0x10/0x20 [ 35.467262] [ 35.467460] The buggy address belongs to the object at fff00000c9a5e780 [ 35.467460] which belongs to the cache kmalloc-64 of size 64 [ 35.467610] The buggy address is located 0 bytes to the right of [ 35.467610] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.468422] [ 35.468472] The buggy address belongs to the physical page: [ 35.468549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.468934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.469151] page_type: f5(slab) [ 35.469489] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.469606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.469811] page dumped because: kasan: bad access detected [ 35.469913] [ 35.470010] Memory state around the buggy address: [ 35.470087] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.470146] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.470197] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.470587] ^ [ 35.470669] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.470881] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.470928] ================================================================== [ 35.098304] ================================================================== [ 35.098591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.098844] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.098904] [ 35.098980] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.099467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.099593] Hardware name: linux,dummy-virt (DT) [ 35.099722] Call trace: [ 35.099770] show_stack+0x20/0x38 (C) [ 35.099827] dump_stack_lvl+0x8c/0xd0 [ 35.099879] print_report+0x118/0x5e8 [ 35.100281] kasan_report+0xdc/0x128 [ 35.100429] kasan_check_range+0x100/0x1a8 [ 35.100533] __kasan_check_write+0x20/0x30 [ 35.100989] kasan_atomics_helper+0xad4/0x4858 [ 35.102073] [ 35.102170] Allocated by task 297: [ 35.102707] __kasan_kmalloc+0xd4/0xd8 [ 35.104585] [ 35.105261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.106050] page dumped because: kasan: bad access detected [ 35.106177] [ 35.106300] Memory state around the buggy address: [ 35.106485] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.106551] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.106663] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.106739] ^ [ 35.106815] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.107217] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.107328] ================================================================== [ 35.353823] ================================================================== [ 35.353886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 35.354253] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.354335] [ 35.354535] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.354701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.354758] Hardware name: linux,dummy-virt (DT) [ 35.354793] Call trace: [ 35.354820] show_stack+0x20/0x38 (C) [ 35.354932] dump_stack_lvl+0x8c/0xd0 [ 35.355172] print_report+0x118/0x5e8 [ 35.355248] kasan_report+0xdc/0x128 [ 35.355362] kasan_check_range+0x100/0x1a8 [ 35.355412] __kasan_check_write+0x20/0x30 [ 35.355460] kasan_atomics_helper+0x1384/0x4858 [ 35.355551] kasan_atomics+0x198/0x2e0 [ 35.355600] kunit_try_run_case+0x170/0x3f0 [ 35.355670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.355725] kthread+0x328/0x630 [ 35.355770] ret_from_fork+0x10/0x20 [ 35.355828] [ 35.355852] Allocated by task 297: [ 35.355894] kasan_save_stack+0x3c/0x68 [ 35.355938] kasan_save_track+0x20/0x40 [ 35.355976] kasan_save_alloc_info+0x40/0x58 [ 35.356026] __kasan_kmalloc+0xd4/0xd8 [ 35.356063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.356106] kasan_atomics+0xb8/0x2e0 [ 35.356146] kunit_try_run_case+0x170/0x3f0 [ 35.356205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.356250] kthread+0x328/0x630 [ 35.356291] ret_from_fork+0x10/0x20 [ 35.356329] [ 35.356357] The buggy address belongs to the object at fff00000c9a5e780 [ 35.356357] which belongs to the cache kmalloc-64 of size 64 [ 35.356415] The buggy address is located 0 bytes to the right of [ 35.356415] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.356487] [ 35.356511] The buggy address belongs to the physical page: [ 35.356563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.356627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.357237] page_type: f5(slab) [ 35.358031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.358102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.358218] page dumped because: kasan: bad access detected [ 35.358255] [ 35.358278] Memory state around the buggy address: [ 35.358861] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.359189] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.359364] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.359442] ^ [ 35.359774] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.359866] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.359963] ================================================================== [ 35.204950] ================================================================== [ 35.205098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.205182] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.205519] [ 35.205713] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.206338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.206449] Hardware name: linux,dummy-virt (DT) [ 35.206495] Call trace: [ 35.206522] show_stack+0x20/0x38 (C) [ 35.206770] dump_stack_lvl+0x8c/0xd0 [ 35.206827] print_report+0x118/0x5e8 [ 35.206874] kasan_report+0xdc/0x128 [ 35.206921] __asan_report_load8_noabort+0x20/0x30 [ 35.207387] kasan_atomics_helper+0x3f58/0x4858 [ 35.207720] kasan_atomics+0x198/0x2e0 [ 35.208023] kunit_try_run_case+0x170/0x3f0 [ 35.208226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.208506] kthread+0x328/0x630 [ 35.208843] ret_from_fork+0x10/0x20 [ 35.209239] [ 35.209308] Allocated by task 297: [ 35.209370] kasan_save_stack+0x3c/0x68 [ 35.209950] kasan_save_track+0x20/0x40 [ 35.210004] kasan_save_alloc_info+0x40/0x58 [ 35.210071] __kasan_kmalloc+0xd4/0xd8 [ 35.210192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.210583] kasan_atomics+0xb8/0x2e0 [ 35.210853] kunit_try_run_case+0x170/0x3f0 [ 35.211004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.211056] kthread+0x328/0x630 [ 35.211091] ret_from_fork+0x10/0x20 [ 35.211128] [ 35.211401] The buggy address belongs to the object at fff00000c9a5e780 [ 35.211401] which belongs to the cache kmalloc-64 of size 64 [ 35.211677] The buggy address is located 0 bytes to the right of [ 35.211677] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.211751] [ 35.211825] The buggy address belongs to the physical page: [ 35.211888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.211979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.212038] page_type: f5(slab) [ 35.212084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.212136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.212188] page dumped because: kasan: bad access detected [ 35.212219] [ 35.212251] Memory state around the buggy address: [ 35.212287] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.212333] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.212379] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.212428] ^ [ 35.212463] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.212508] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.212557] ================================================================== [ 35.443997] ================================================================== [ 35.444100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 35.444168] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.444540] [ 35.444608] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.444770] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.444804] Hardware name: linux,dummy-virt (DT) [ 35.444864] Call trace: [ 35.444990] show_stack+0x20/0x38 (C) [ 35.445048] dump_stack_lvl+0x8c/0xd0 [ 35.445683] print_report+0x118/0x5e8 [ 35.445761] kasan_report+0xdc/0x128 [ 35.445809] kasan_check_range+0x100/0x1a8 [ 35.446028] __kasan_check_write+0x20/0x30 [ 35.446169] kasan_atomics_helper+0x16d0/0x4858 [ 35.446476] kasan_atomics+0x198/0x2e0 [ 35.446653] kunit_try_run_case+0x170/0x3f0 [ 35.446740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.446977] kthread+0x328/0x630 [ 35.447456] ret_from_fork+0x10/0x20 [ 35.447547] [ 35.447573] Allocated by task 297: [ 35.447607] kasan_save_stack+0x3c/0x68 [ 35.447661] kasan_save_track+0x20/0x40 [ 35.447701] kasan_save_alloc_info+0x40/0x58 [ 35.447742] __kasan_kmalloc+0xd4/0xd8 [ 35.448092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.448434] kasan_atomics+0xb8/0x2e0 [ 35.448620] kunit_try_run_case+0x170/0x3f0 [ 35.448828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.449007] kthread+0x328/0x630 [ 35.449066] ret_from_fork+0x10/0x20 [ 35.449621] [ 35.449663] The buggy address belongs to the object at fff00000c9a5e780 [ 35.449663] which belongs to the cache kmalloc-64 of size 64 [ 35.449993] The buggy address is located 0 bytes to the right of [ 35.449993] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.450382] [ 35.450491] The buggy address belongs to the physical page: [ 35.450715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.450920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.451243] page_type: f5(slab) [ 35.451532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.451621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.451688] page dumped because: kasan: bad access detected [ 35.451950] [ 35.452185] Memory state around the buggy address: [ 35.452264] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.452361] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.452816] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.453298] ^ [ 35.453462] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.453634] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.453744] ================================================================== [ 35.268448] ================================================================== [ 35.269003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.269262] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.269887] [ 35.269941] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.270035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.270068] Hardware name: linux,dummy-virt (DT) [ 35.270409] Call trace: [ 35.270454] show_stack+0x20/0x38 (C) [ 35.270714] dump_stack_lvl+0x8c/0xd0 [ 35.270775] print_report+0x118/0x5e8 [ 35.270822] kasan_report+0xdc/0x128 [ 35.271238] kasan_check_range+0x100/0x1a8 [ 35.271449] __kasan_check_write+0x20/0x30 [ 35.271673] kasan_atomics_helper+0xff0/0x4858 [ 35.271734] kasan_atomics+0x198/0x2e0 [ 35.271813] kunit_try_run_case+0x170/0x3f0 [ 35.272129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.272614] kthread+0x328/0x630 [ 35.272756] ret_from_fork+0x10/0x20 [ 35.272809] [ 35.273476] Allocated by task 297: [ 35.273582] kasan_save_stack+0x3c/0x68 [ 35.273951] kasan_save_track+0x20/0x40 [ 35.274026] kasan_save_alloc_info+0x40/0x58 [ 35.274201] __kasan_kmalloc+0xd4/0xd8 [ 35.274377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.274777] kasan_atomics+0xb8/0x2e0 [ 35.275156] kunit_try_run_case+0x170/0x3f0 [ 35.275264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.275380] kthread+0x328/0x630 [ 35.275758] ret_from_fork+0x10/0x20 [ 35.275853] [ 35.275877] The buggy address belongs to the object at fff00000c9a5e780 [ 35.275877] which belongs to the cache kmalloc-64 of size 64 [ 35.275938] The buggy address is located 0 bytes to the right of [ 35.275938] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.276303] [ 35.276344] The buggy address belongs to the physical page: [ 35.276657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.277055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.277500] page_type: f5(slab) [ 35.277613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.277771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.277855] page dumped because: kasan: bad access detected [ 35.277928] [ 35.277996] Memory state around the buggy address: [ 35.278041] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.278418] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.278492] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.278813] ^ [ 35.278906] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.279102] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.279172] ================================================================== [ 35.194298] ================================================================== [ 35.194359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.194577] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.194635] [ 35.195008] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.195193] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.195594] Hardware name: linux,dummy-virt (DT) [ 35.195661] Call trace: [ 35.195688] show_stack+0x20/0x38 (C) [ 35.195744] dump_stack_lvl+0x8c/0xd0 [ 35.195795] print_report+0x118/0x5e8 [ 35.195989] kasan_report+0xdc/0x128 [ 35.196354] kasan_check_range+0x100/0x1a8 [ 35.196499] __kasan_check_read+0x20/0x30 [ 35.196770] kasan_atomics_helper+0xdd4/0x4858 [ 35.196837] kasan_atomics+0x198/0x2e0 [ 35.196889] kunit_try_run_case+0x170/0x3f0 [ 35.197069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.197138] kthread+0x328/0x630 [ 35.197181] ret_from_fork+0x10/0x20 [ 35.197231] [ 35.197283] Allocated by task 297: [ 35.197333] kasan_save_stack+0x3c/0x68 [ 35.197375] kasan_save_track+0x20/0x40 [ 35.197413] kasan_save_alloc_info+0x40/0x58 [ 35.197454] __kasan_kmalloc+0xd4/0xd8 [ 35.197497] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.197542] kasan_atomics+0xb8/0x2e0 [ 35.197582] kunit_try_run_case+0x170/0x3f0 [ 35.197626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.198552] kthread+0x328/0x630 [ 35.199088] ret_from_fork+0x10/0x20 [ 35.199162] [ 35.199285] The buggy address belongs to the object at fff00000c9a5e780 [ 35.199285] which belongs to the cache kmalloc-64 of size 64 [ 35.199357] The buggy address is located 0 bytes to the right of [ 35.199357] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.199429] [ 35.199452] The buggy address belongs to the physical page: [ 35.199489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.199548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.199940] page_type: f5(slab) [ 35.200283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.200418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.200564] page dumped because: kasan: bad access detected [ 35.200599] [ 35.200779] Memory state around the buggy address: [ 35.201285] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.201430] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.201562] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.201788] ^ [ 35.201830] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.201892] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.202160] ================================================================== [ 35.340727] ================================================================== [ 35.340783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 35.341008] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.341075] [ 35.341309] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.341633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.341696] Hardware name: linux,dummy-virt (DT) [ 35.341817] Call trace: [ 35.341879] show_stack+0x20/0x38 (C) [ 35.341963] dump_stack_lvl+0x8c/0xd0 [ 35.342014] print_report+0x118/0x5e8 [ 35.342342] kasan_report+0xdc/0x128 [ 35.342708] kasan_check_range+0x100/0x1a8 [ 35.342815] __kasan_check_write+0x20/0x30 [ 35.343184] kasan_atomics_helper+0x12d8/0x4858 [ 35.343265] kasan_atomics+0x198/0x2e0 [ 35.343810] kunit_try_run_case+0x170/0x3f0 [ 35.343890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.343947] kthread+0x328/0x630 [ 35.343991] ret_from_fork+0x10/0x20 [ 35.344046] [ 35.344505] Allocated by task 297: [ 35.344856] kasan_save_stack+0x3c/0x68 [ 35.344915] kasan_save_track+0x20/0x40 [ 35.345116] kasan_save_alloc_info+0x40/0x58 [ 35.345628] __kasan_kmalloc+0xd4/0xd8 [ 35.345705] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.346088] kasan_atomics+0xb8/0x2e0 [ 35.346480] kunit_try_run_case+0x170/0x3f0 [ 35.346547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.346622] kthread+0x328/0x630 [ 35.346765] ret_from_fork+0x10/0x20 [ 35.346809] [ 35.347008] The buggy address belongs to the object at fff00000c9a5e780 [ 35.347008] which belongs to the cache kmalloc-64 of size 64 [ 35.347265] The buggy address is located 0 bytes to the right of [ 35.347265] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.347513] [ 35.348021] The buggy address belongs to the physical page: [ 35.348179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.348328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.348612] page_type: f5(slab) [ 35.348863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.348937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.349119] page dumped because: kasan: bad access detected [ 35.349160] [ 35.349220] Memory state around the buggy address: [ 35.349268] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.349315] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.349371] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.349411] ^ [ 35.349447] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349490] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349540] ================================================================== [ 35.217020] ================================================================== [ 35.217100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.217177] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.217237] [ 35.217273] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.217699] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.217883] Hardware name: linux,dummy-virt (DT) [ 35.218169] Call trace: [ 35.218345] show_stack+0x20/0x38 (C) [ 35.218413] dump_stack_lvl+0x8c/0xd0 [ 35.218695] print_report+0x118/0x5e8 [ 35.219072] kasan_report+0xdc/0x128 [ 35.219144] kasan_check_range+0x100/0x1a8 [ 35.219390] __kasan_check_write+0x20/0x30 [ 35.219498] kasan_atomics_helper+0xe44/0x4858 [ 35.219786] kasan_atomics+0x198/0x2e0 [ 35.220279] kunit_try_run_case+0x170/0x3f0 [ 35.220377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.220436] kthread+0x328/0x630 [ 35.220957] ret_from_fork+0x10/0x20 [ 35.221173] [ 35.221225] Allocated by task 297: [ 35.221262] kasan_save_stack+0x3c/0x68 [ 35.221583] kasan_save_track+0x20/0x40 [ 35.221673] kasan_save_alloc_info+0x40/0x58 [ 35.222068] __kasan_kmalloc+0xd4/0xd8 [ 35.222182] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.222446] kasan_atomics+0xb8/0x2e0 [ 35.222612] kunit_try_run_case+0x170/0x3f0 [ 35.222860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.223658] kthread+0x328/0x630 [ 35.223867] ret_from_fork+0x10/0x20 [ 35.224030] [ 35.224492] The buggy address belongs to the object at fff00000c9a5e780 [ 35.224492] which belongs to the cache kmalloc-64 of size 64 [ 35.224569] The buggy address is located 0 bytes to the right of [ 35.224569] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.224635] [ 35.224676] The buggy address belongs to the physical page: [ 35.225204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.225895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226182] page_type: f5(slab) [ 35.226401] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.226536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.226774] page dumped because: kasan: bad access detected [ 35.227245] [ 35.227490] Memory state around the buggy address: [ 35.227691] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.227803] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.227949] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.227991] ^ [ 35.228028] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.228073] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.228131] ================================================================== [ 35.471515] ================================================================== [ 35.471568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 35.471622] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.471686] [ 35.471717] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.471805] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.472028] Hardware name: linux,dummy-virt (DT) [ 35.472109] Call trace: [ 35.472136] show_stack+0x20/0x38 (C) [ 35.472594] dump_stack_lvl+0x8c/0xd0 [ 35.472703] print_report+0x118/0x5e8 [ 35.472851] kasan_report+0xdc/0x128 [ 35.472949] __asan_report_load8_noabort+0x20/0x30 [ 35.473011] kasan_atomics_helper+0x3e20/0x4858 [ 35.473064] kasan_atomics+0x198/0x2e0 [ 35.473303] kunit_try_run_case+0x170/0x3f0 [ 35.473371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.473696] kthread+0x328/0x630 [ 35.473767] ret_from_fork+0x10/0x20 [ 35.473936] [ 35.473966] Allocated by task 297: [ 35.474000] kasan_save_stack+0x3c/0x68 [ 35.474042] kasan_save_track+0x20/0x40 [ 35.474288] kasan_save_alloc_info+0x40/0x58 [ 35.474598] __kasan_kmalloc+0xd4/0xd8 [ 35.474839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.474912] kasan_atomics+0xb8/0x2e0 [ 35.474972] kunit_try_run_case+0x170/0x3f0 [ 35.475338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.475419] kthread+0x328/0x630 [ 35.475717] ret_from_fork+0x10/0x20 [ 35.475768] [ 35.476046] The buggy address belongs to the object at fff00000c9a5e780 [ 35.476046] which belongs to the cache kmalloc-64 of size 64 [ 35.476375] The buggy address is located 0 bytes to the right of [ 35.476375] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.476558] [ 35.476615] The buggy address belongs to the physical page: [ 35.476751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.476846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.476910] page_type: f5(slab) [ 35.476951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.477068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.477110] page dumped because: kasan: bad access detected [ 35.477142] [ 35.477184] Memory state around the buggy address: [ 35.477228] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.477277] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.477323] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.477364] ^ [ 35.477400] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.477455] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.477506] ================================================================== [ 35.299539] ================================================================== [ 35.299634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.300016] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.300086] [ 35.300121] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.300361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.300637] Hardware name: linux,dummy-virt (DT) [ 35.300702] Call trace: [ 35.300728] show_stack+0x20/0x38 (C) [ 35.300821] dump_stack_lvl+0x8c/0xd0 [ 35.300875] print_report+0x118/0x5e8 [ 35.300922] kasan_report+0xdc/0x128 [ 35.300967] kasan_check_range+0x100/0x1a8 [ 35.301014] __kasan_check_write+0x20/0x30 [ 35.301063] kasan_atomics_helper+0x1128/0x4858 [ 35.301123] kasan_atomics+0x198/0x2e0 [ 35.301179] kunit_try_run_case+0x170/0x3f0 [ 35.301236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.301291] kthread+0x328/0x630 [ 35.301335] ret_from_fork+0x10/0x20 [ 35.301381] [ 35.301403] Allocated by task 297: [ 35.301436] kasan_save_stack+0x3c/0x68 [ 35.301478] kasan_save_track+0x20/0x40 [ 35.301515] kasan_save_alloc_info+0x40/0x58 [ 35.301555] __kasan_kmalloc+0xd4/0xd8 [ 35.301602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.301658] kasan_atomics+0xb8/0x2e0 [ 35.301745] kunit_try_run_case+0x170/0x3f0 [ 35.301790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.302055] kthread+0x328/0x630 [ 35.302651] ret_from_fork+0x10/0x20 [ 35.302922] [ 35.302993] The buggy address belongs to the object at fff00000c9a5e780 [ 35.302993] which belongs to the cache kmalloc-64 of size 64 [ 35.303496] The buggy address is located 0 bytes to the right of [ 35.303496] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.304124] [ 35.304226] The buggy address belongs to the physical page: [ 35.304983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.305115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.305182] page_type: f5(slab) [ 35.305224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.305956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.306058] page dumped because: kasan: bad access detected [ 35.306323] [ 35.306872] Memory state around the buggy address: [ 35.306932] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.307102] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.307206] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.307331] ^ [ 35.307408] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.307577] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.307816] ================================================================== [ 35.180627] ================================================================== [ 35.180717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.181143] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.181330] [ 35.181451] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.182004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.182195] Hardware name: linux,dummy-virt (DT) [ 35.182293] Call trace: [ 35.182319] show_stack+0x20/0x38 (C) [ 35.182901] dump_stack_lvl+0x8c/0xd0 [ 35.183307] print_report+0x118/0x5e8 [ 35.183436] kasan_report+0xdc/0x128 [ 35.183486] __asan_report_load4_noabort+0x20/0x30 [ 35.183536] kasan_atomics_helper+0x3e04/0x4858 [ 35.183589] kasan_atomics+0x198/0x2e0 [ 35.184175] kunit_try_run_case+0x170/0x3f0 [ 35.184383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184597] kthread+0x328/0x630 [ 35.184868] ret_from_fork+0x10/0x20 [ 35.185108] [ 35.185158] Allocated by task 297: [ 35.185434] kasan_save_stack+0x3c/0x68 [ 35.185730] kasan_save_track+0x20/0x40 [ 35.185967] kasan_save_alloc_info+0x40/0x58 [ 35.186404] __kasan_kmalloc+0xd4/0xd8 [ 35.186466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.186925] kasan_atomics+0xb8/0x2e0 [ 35.187291] kunit_try_run_case+0x170/0x3f0 [ 35.187368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.187415] kthread+0x328/0x630 [ 35.187726] ret_from_fork+0x10/0x20 [ 35.188128] [ 35.188179] The buggy address belongs to the object at fff00000c9a5e780 [ 35.188179] which belongs to the cache kmalloc-64 of size 64 [ 35.188382] The buggy address is located 0 bytes to the right of [ 35.188382] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.188502] [ 35.188714] The buggy address belongs to the physical page: [ 35.189032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.189152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.189344] page_type: f5(slab) [ 35.189388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.189771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.190357] page dumped because: kasan: bad access detected [ 35.190419] [ 35.190588] Memory state around the buggy address: [ 35.190961] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.191070] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.191205] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.191292] ^ [ 35.191330] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.191657] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.191742] ================================================================== [ 35.309091] ================================================================== [ 35.309406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 35.309636] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.309830] [ 35.310021] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.310138] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.310172] Hardware name: linux,dummy-virt (DT) [ 35.310207] Call trace: [ 35.310231] show_stack+0x20/0x38 (C) [ 35.310526] dump_stack_lvl+0x8c/0xd0 [ 35.311260] print_report+0x118/0x5e8 [ 35.311442] kasan_report+0xdc/0x128 [ 35.311523] kasan_check_range+0x100/0x1a8 [ 35.311973] __kasan_check_write+0x20/0x30 [ 35.312450] kasan_atomics_helper+0x1190/0x4858 [ 35.312677] kasan_atomics+0x198/0x2e0 [ 35.312786] kunit_try_run_case+0x170/0x3f0 [ 35.313207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.313421] kthread+0x328/0x630 [ 35.313715] ret_from_fork+0x10/0x20 [ 35.313871] [ 35.314180] Allocated by task 297: [ 35.314227] kasan_save_stack+0x3c/0x68 [ 35.314777] kasan_save_track+0x20/0x40 [ 35.315237] kasan_save_alloc_info+0x40/0x58 [ 35.315346] __kasan_kmalloc+0xd4/0xd8 [ 35.315849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.315919] kasan_atomics+0xb8/0x2e0 [ 35.315975] kunit_try_run_case+0x170/0x3f0 [ 35.316025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.316774] kthread+0x328/0x630 [ 35.316922] ret_from_fork+0x10/0x20 [ 35.316964] [ 35.317020] The buggy address belongs to the object at fff00000c9a5e780 [ 35.317020] which belongs to the cache kmalloc-64 of size 64 [ 35.317088] The buggy address is located 0 bytes to the right of [ 35.317088] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.317349] [ 35.317402] The buggy address belongs to the physical page: [ 35.317834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.317941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.317993] page_type: f5(slab) [ 35.318032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.318094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.318152] page dumped because: kasan: bad access detected [ 35.318196] [ 35.318224] Memory state around the buggy address: [ 35.318261] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.318316] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.318362] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.318403] ^ [ 35.318440] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.318484] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.318523] ================================================================== [ 35.330301] ================================================================== [ 35.330739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 35.330851] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.331229] [ 35.331273] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.331598] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.331884] Hardware name: linux,dummy-virt (DT) [ 35.332172] Call trace: [ 35.332674] show_stack+0x20/0x38 (C) [ 35.332749] dump_stack_lvl+0x8c/0xd0 [ 35.332800] print_report+0x118/0x5e8 [ 35.333174] kasan_report+0xdc/0x128 [ 35.333258] kasan_check_range+0x100/0x1a8 [ 35.333598] __kasan_check_write+0x20/0x30 [ 35.333683] kasan_atomics_helper+0x126c/0x4858 [ 35.334050] kasan_atomics+0x198/0x2e0 [ 35.334608] kunit_try_run_case+0x170/0x3f0 [ 35.334694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.334824] kthread+0x328/0x630 [ 35.334870] ret_from_fork+0x10/0x20 [ 35.334930] [ 35.334980] Allocated by task 297: [ 35.335382] kasan_save_stack+0x3c/0x68 [ 35.335470] kasan_save_track+0x20/0x40 [ 35.335673] kasan_save_alloc_info+0x40/0x58 [ 35.335891] __kasan_kmalloc+0xd4/0xd8 [ 35.335974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.336273] kasan_atomics+0xb8/0x2e0 [ 35.336327] kunit_try_run_case+0x170/0x3f0 [ 35.336783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.336860] kthread+0x328/0x630 [ 35.337216] ret_from_fork+0x10/0x20 [ 35.337949] [ 35.338087] The buggy address belongs to the object at fff00000c9a5e780 [ 35.338087] which belongs to the cache kmalloc-64 of size 64 [ 35.338298] The buggy address is located 0 bytes to the right of [ 35.338298] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.338487] [ 35.338561] The buggy address belongs to the physical page: [ 35.338601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.338689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.338752] page_type: f5(slab) [ 35.338814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.338877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.338919] page dumped because: kasan: bad access detected [ 35.338952] [ 35.338983] Memory state around the buggy address: [ 35.339030] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.339083] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.339151] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.339200] ^ [ 35.339241] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.339286] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.339349] ================================================================== [ 35.398250] ================================================================== [ 35.398392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 35.398453] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.398506] [ 35.398690] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.398790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.398824] Hardware name: linux,dummy-virt (DT) [ 35.399006] Call trace: [ 35.399353] show_stack+0x20/0x38 (C) [ 35.399835] dump_stack_lvl+0x8c/0xd0 [ 35.400125] print_report+0x118/0x5e8 [ 35.400241] kasan_report+0xdc/0x128 [ 35.400365] kasan_check_range+0x100/0x1a8 [ 35.400415] __kasan_check_write+0x20/0x30 [ 35.400464] kasan_atomics_helper+0x154c/0x4858 [ 35.400800] kasan_atomics+0x198/0x2e0 [ 35.401039] kunit_try_run_case+0x170/0x3f0 [ 35.401370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.401475] kthread+0x328/0x630 [ 35.401522] ret_from_fork+0x10/0x20 [ 35.402098] [ 35.402297] Allocated by task 297: [ 35.402356] kasan_save_stack+0x3c/0x68 [ 35.402411] kasan_save_track+0x20/0x40 [ 35.402459] kasan_save_alloc_info+0x40/0x58 [ 35.402800] __kasan_kmalloc+0xd4/0xd8 [ 35.403127] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.403213] kasan_atomics+0xb8/0x2e0 [ 35.403322] kunit_try_run_case+0x170/0x3f0 [ 35.403388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.403441] kthread+0x328/0x630 [ 35.403477] ret_from_fork+0x10/0x20 [ 35.403515] [ 35.403870] The buggy address belongs to the object at fff00000c9a5e780 [ 35.403870] which belongs to the cache kmalloc-64 of size 64 [ 35.404169] The buggy address is located 0 bytes to the right of [ 35.404169] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.404467] [ 35.404605] The buggy address belongs to the physical page: [ 35.404660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.405000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.405129] page_type: f5(slab) [ 35.405219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.405653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.405768] page dumped because: kasan: bad access detected [ 35.405857] [ 35.406028] Memory state around the buggy address: [ 35.406072] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.406126] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.406171] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.406210] ^ [ 35.406272] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.406316] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.406362] ================================================================== [ 35.280502] ================================================================== [ 35.280593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.280698] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.280922] [ 35.280987] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.281090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.281124] Hardware name: linux,dummy-virt (DT) [ 35.281443] Call trace: [ 35.281606] show_stack+0x20/0x38 (C) [ 35.281689] dump_stack_lvl+0x8c/0xd0 [ 35.281742] print_report+0x118/0x5e8 [ 35.281922] kasan_report+0xdc/0x128 [ 35.281986] kasan_check_range+0x100/0x1a8 [ 35.282034] __kasan_check_write+0x20/0x30 [ 35.282389] kasan_atomics_helper+0x1058/0x4858 [ 35.282468] kasan_atomics+0x198/0x2e0 [ 35.282658] kunit_try_run_case+0x170/0x3f0 [ 35.282799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.282861] kthread+0x328/0x630 [ 35.282906] ret_from_fork+0x10/0x20 [ 35.282962] [ 35.283337] Allocated by task 297: [ 35.283565] kasan_save_stack+0x3c/0x68 [ 35.283617] kasan_save_track+0x20/0x40 [ 35.283956] kasan_save_alloc_info+0x40/0x58 [ 35.284181] __kasan_kmalloc+0xd4/0xd8 [ 35.284239] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.284292] kasan_atomics+0xb8/0x2e0 [ 35.284333] kunit_try_run_case+0x170/0x3f0 [ 35.284386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.284432] kthread+0x328/0x630 [ 35.284469] ret_from_fork+0x10/0x20 [ 35.284509] [ 35.284540] The buggy address belongs to the object at fff00000c9a5e780 [ 35.284540] which belongs to the cache kmalloc-64 of size 64 [ 35.284601] The buggy address is located 0 bytes to the right of [ 35.284601] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.284679] [ 35.284702] The buggy address belongs to the physical page: [ 35.284740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.284795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.284854] page_type: f5(slab) [ 35.284894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.284955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.285003] page dumped because: kasan: bad access detected [ 35.285046] [ 35.285067] Memory state around the buggy address: [ 35.285112] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.285157] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.285202] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.285256] ^ [ 35.285293] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.285352] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.285401] ================================================================== [ 35.370984] ================================================================== [ 35.371326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 35.371801] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.371937] [ 35.372002] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.372754] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.373043] Hardware name: linux,dummy-virt (DT) [ 35.373118] Call trace: [ 35.373208] show_stack+0x20/0x38 (C) [ 35.373334] dump_stack_lvl+0x8c/0xd0 [ 35.373385] print_report+0x118/0x5e8 [ 35.373432] kasan_report+0xdc/0x128 [ 35.373782] kasan_check_range+0x100/0x1a8 [ 35.374005] __kasan_check_write+0x20/0x30 [ 35.374198] kasan_atomics_helper+0x1414/0x4858 [ 35.374290] kasan_atomics+0x198/0x2e0 [ 35.374698] kunit_try_run_case+0x170/0x3f0 [ 35.374799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.375151] kthread+0x328/0x630 [ 35.375233] ret_from_fork+0x10/0x20 [ 35.375434] [ 35.375474] Allocated by task 297: [ 35.375738] kasan_save_stack+0x3c/0x68 [ 35.376018] kasan_save_track+0x20/0x40 [ 35.376069] kasan_save_alloc_info+0x40/0x58 [ 35.376378] __kasan_kmalloc+0xd4/0xd8 [ 35.376734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.376901] kasan_atomics+0xb8/0x2e0 [ 35.377011] kunit_try_run_case+0x170/0x3f0 [ 35.377062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.377389] kthread+0x328/0x630 [ 35.377479] ret_from_fork+0x10/0x20 [ 35.377676] [ 35.377731] The buggy address belongs to the object at fff00000c9a5e780 [ 35.377731] which belongs to the cache kmalloc-64 of size 64 [ 35.377951] The buggy address is located 0 bytes to the right of [ 35.377951] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.378120] [ 35.378147] The buggy address belongs to the physical page: [ 35.378213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.378570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.378673] page_type: f5(slab) [ 35.379072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.379144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.379329] page dumped because: kasan: bad access detected [ 35.379377] [ 35.379544] Memory state around the buggy address: [ 35.379600] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.379737] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.379816] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.380063] ^ [ 35.380129] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.380199] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.380254] ================================================================== [ 35.080329] ================================================================== [ 35.080389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.081271] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.081357] [ 35.081406] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.081502] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.081625] Hardware name: linux,dummy-virt (DT) [ 35.081678] Call trace: [ 35.082012] show_stack+0x20/0x38 (C) [ 35.082161] dump_stack_lvl+0x8c/0xd0 [ 35.082442] print_report+0x118/0x5e8 [ 35.082619] kasan_report+0xdc/0x128 [ 35.082701] kasan_check_range+0x100/0x1a8 [ 35.083047] __kasan_check_write+0x20/0x30 [ 35.083379] kasan_atomics_helper+0xa04/0x4858 [ 35.083468] kasan_atomics+0x198/0x2e0 [ 35.083540] kunit_try_run_case+0x170/0x3f0 [ 35.083616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.083696] kthread+0x328/0x630 [ 35.083857] ret_from_fork+0x10/0x20 [ 35.083993] [ 35.084051] Allocated by task 297: [ 35.084181] kasan_save_stack+0x3c/0x68 [ 35.084314] kasan_save_track+0x20/0x40 [ 35.084411] kasan_save_alloc_info+0x40/0x58 [ 35.085111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.087091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.087282] page_type: f5(slab) [ 35.087328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.087394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.087797] page dumped because: kasan: bad access detected [ 35.087899] [ 35.087957] Memory state around the buggy address: [ 35.087997] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.088472] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.088559] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.089062] ^ [ 35.089120] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.089337] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.089612] ================================================================== [ 35.070637] ================================================================== [ 35.070715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.070779] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.071188] [ 35.071304] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.071407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.071616] Hardware name: linux,dummy-virt (DT) [ 35.071860] Call trace: [ 35.071913] show_stack+0x20/0x38 (C) [ 35.072017] dump_stack_lvl+0x8c/0xd0 [ 35.072214] print_report+0x118/0x5e8 [ 35.072348] kasan_report+0xdc/0x128 [ 35.072444] kasan_check_range+0x100/0x1a8 [ 35.072683] __kasan_check_write+0x20/0x30 [ 35.072927] kasan_atomics_helper+0x99c/0x4858 [ 35.073050] kasan_atomics+0x198/0x2e0 [ 35.073188] kunit_try_run_case+0x170/0x3f0 [ 35.073311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.073556] kthread+0x328/0x630 [ 35.073679] ret_from_fork+0x10/0x20 [ 35.073985] [ 35.074041] Allocated by task 297: [ 35.074418] kasan_save_stack+0x3c/0x68 [ 35.074498] kasan_save_track+0x20/0x40 [ 35.074871] kasan_save_alloc_info+0x40/0x58 [ 35.074944] __kasan_kmalloc+0xd4/0xd8 [ 35.075122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.075208] kasan_atomics+0xb8/0x2e0 [ 35.075351] kunit_try_run_case+0x170/0x3f0 [ 35.075397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.075575] kthread+0x328/0x630 [ 35.075634] ret_from_fork+0x10/0x20 [ 35.075688] [ 35.075711] The buggy address belongs to the object at fff00000c9a5e780 [ 35.075711] which belongs to the cache kmalloc-64 of size 64 [ 35.075788] The buggy address is located 0 bytes to the right of [ 35.075788] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.075868] [ 35.075896] The buggy address belongs to the physical page: [ 35.075942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.076000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.076050] page_type: f5(slab) [ 35.076106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.076159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.076211] page dumped because: kasan: bad access detected [ 35.076256] [ 35.076278] Memory state around the buggy address: [ 35.076314] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.076361] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.076407] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.076463] ^ [ 35.076507] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.076552] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.076603] ================================================================== [ 35.319860] ================================================================== [ 35.320083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 35.320309] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.320372] [ 35.320408] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.320717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.320958] Hardware name: linux,dummy-virt (DT) [ 35.321221] Call trace: [ 35.321265] show_stack+0x20/0x38 (C) [ 35.321424] dump_stack_lvl+0x8c/0xd0 [ 35.321649] print_report+0x118/0x5e8 [ 35.321730] kasan_report+0xdc/0x128 [ 35.321778] kasan_check_range+0x100/0x1a8 [ 35.322119] __kasan_check_write+0x20/0x30 [ 35.322206] kasan_atomics_helper+0x11f8/0x4858 [ 35.322260] kasan_atomics+0x198/0x2e0 [ 35.322561] kunit_try_run_case+0x170/0x3f0 [ 35.322944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.323032] kthread+0x328/0x630 [ 35.323400] ret_from_fork+0x10/0x20 [ 35.323517] [ 35.323606] Allocated by task 297: [ 35.323653] kasan_save_stack+0x3c/0x68 [ 35.324036] kasan_save_track+0x20/0x40 [ 35.324111] kasan_save_alloc_info+0x40/0x58 [ 35.324436] __kasan_kmalloc+0xd4/0xd8 [ 35.324576] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.324693] kasan_atomics+0xb8/0x2e0 [ 35.325502] kunit_try_run_case+0x170/0x3f0 [ 35.325677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.326049] kthread+0x328/0x630 [ 35.326405] ret_from_fork+0x10/0x20 [ 35.326482] [ 35.326551] The buggy address belongs to the object at fff00000c9a5e780 [ 35.326551] which belongs to the cache kmalloc-64 of size 64 [ 35.326806] The buggy address is located 0 bytes to the right of [ 35.326806] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.327039] [ 35.327141] The buggy address belongs to the physical page: [ 35.327491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.327612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.327679] page_type: f5(slab) [ 35.327731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.327794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.327846] page dumped because: kasan: bad access detected [ 35.327889] [ 35.327919] Memory state around the buggy address: [ 35.327967] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.328039] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.328093] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.328134] ^ [ 35.328170] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.328676] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.328849] ================================================================== [ 34.924968] ================================================================== [ 34.925287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.925958] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.926621] print_report+0x118/0x5e8 [ 34.927730] kasan_atomics+0x198/0x2e0 [ 34.928343] [ 34.928483] kasan_save_alloc_info+0x40/0x58 [ 34.928737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.929076] The buggy address belongs to the physical page: [ 34.929434] [ 34.929652] ^ [ 34.931802] ================================================================== [ 35.172434] ================================================================== [ 35.172704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.172914] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297 [ 35.172974] [ 35.173308] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 35.173559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 35.173605] Hardware name: linux,dummy-virt (DT) [ 35.173679] Call trace: [ 35.173838] show_stack+0x20/0x38 (C) [ 35.174128] dump_stack_lvl+0x8c/0xd0 [ 35.174280] print_report+0x118/0x5e8 [ 35.174339] kasan_report+0xdc/0x128 [ 35.174424] kasan_check_range+0x100/0x1a8 [ 35.174630] __kasan_check_write+0x20/0x30 [ 35.174985] kasan_atomics_helper+0xd3c/0x4858 [ 35.175171] kasan_atomics+0x198/0x2e0 [ 35.175309] kunit_try_run_case+0x170/0x3f0 [ 35.175370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.175428] kthread+0x328/0x630 [ 35.175479] ret_from_fork+0x10/0x20 [ 35.175529] [ 35.175550] Allocated by task 297: [ 35.175584] kasan_save_stack+0x3c/0x68 [ 35.175964] kasan_save_track+0x20/0x40 [ 35.176285] kasan_save_alloc_info+0x40/0x58 [ 35.176439] __kasan_kmalloc+0xd4/0xd8 [ 35.176484] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.176553] kasan_atomics+0xb8/0x2e0 [ 35.176592] kunit_try_run_case+0x170/0x3f0 [ 35.176631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.176696] kthread+0x328/0x630 [ 35.176741] ret_from_fork+0x10/0x20 [ 35.176778] [ 35.176809] The buggy address belongs to the object at fff00000c9a5e780 [ 35.176809] which belongs to the cache kmalloc-64 of size 64 [ 35.176871] The buggy address is located 0 bytes to the right of [ 35.176871] allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0) [ 35.176947] [ 35.176979] The buggy address belongs to the physical page: [ 35.177016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 35.177072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.177122] page_type: f5(slab) [ 35.177164] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.177216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.177268] page dumped because: kasan: bad access detected [ 35.177311] [ 35.177347] Memory state around the buggy address: [ 35.177391] fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.177438] fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.177491] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.177540] ^ [ 35.177576] fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.177619] fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.177678] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 34.798630] ================================================================== [ 34.800106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 34.800163] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.801033] Call trace: [ 34.801668] kasan_report+0xdc/0x128 [ 34.802522] kunit_try_run_case+0x170/0x3f0 [ 34.803164] [ 34.803395] Allocated by task 293: [ 34.803612] kasan_save_track+0x20/0x40 [ 34.804270] kunit_try_run_case+0x170/0x3f0 [ 34.805494] [ 34.805671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.806438] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.809063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 34.809188] [ 34.809904] Call trace: [ 34.810867] __asan_report_load8_noabort+0x20/0x30 [ 34.813228] [ 34.813843] kasan_save_alloc_info+0x40/0x58 [ 34.815900] ret_from_fork+0x10/0x20 [ 34.817116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.821294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 34.821427] [ 34.822159] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.822731] dump_stack_lvl+0x8c/0xd0 [ 34.823283] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 34.824656] [ 34.825185] kasan_save_track+0x20/0x40 [ 34.826286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.827239] The buggy address is located 8 bytes inside of [ 34.827239] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.829214] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.849545] ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 34.856982] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 34.668570] ================================================================== [ 34.668769] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 34.668849] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.668902] [ 34.669038] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.669128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.669226] Hardware name: linux,dummy-virt (DT) [ 34.669260] Call trace: [ 34.669301] show_stack+0x20/0x38 (C) [ 34.669577] dump_stack_lvl+0x8c/0xd0 [ 34.669664] print_report+0x118/0x5e8 [ 34.669731] kasan_report+0xdc/0x128 [ 34.669806] kasan_check_range+0x100/0x1a8 [ 34.669894] __kasan_check_write+0x20/0x30 [ 34.669959] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 34.670012] kasan_bitops_generic+0x110/0x1c8 [ 34.670081] kunit_try_run_case+0x170/0x3f0 [ 34.670131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.670424] kthread+0x328/0x630 [ 34.670522] ret_from_fork+0x10/0x20 [ 34.670600] [ 34.670673] Allocated by task 293: [ 34.670707] kasan_save_stack+0x3c/0x68 [ 34.670786] kasan_save_track+0x20/0x40 [ 34.670898] kasan_save_alloc_info+0x40/0x58 [ 34.670950] __kasan_kmalloc+0xd4/0xd8 [ 34.671014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.671070] kasan_bitops_generic+0xa0/0x1c8 [ 34.671178] kunit_try_run_case+0x170/0x3f0 [ 34.671320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.671370] kthread+0x328/0x630 [ 34.671404] ret_from_fork+0x10/0x20 [ 34.671442] [ 34.671465] The buggy address belongs to the object at fff00000c91b2880 [ 34.671465] which belongs to the cache kmalloc-16 of size 16 [ 34.671576] The buggy address is located 8 bytes inside of [ 34.671576] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.671805] [ 34.671859] The buggy address belongs to the physical page: [ 34.671920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.672137] page_type: f5(slab) [ 34.672193] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.672274] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.672365] page dumped because: kasan: bad access detected [ 34.672428] [ 34.672489] Memory state around the buggy address: [ 34.672631] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.672708] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.673073] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.673239] ^ [ 34.673320] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.673430] fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.673570] ================================================================== [ 34.674568] ================================================================== [ 34.674742] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 34.674827] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.675020] [ 34.675250] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.675360] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.675486] Hardware name: linux,dummy-virt (DT) [ 34.675566] Call trace: [ 34.675626] show_stack+0x20/0x38 (C) [ 34.675753] dump_stack_lvl+0x8c/0xd0 [ 34.675804] print_report+0x118/0x5e8 [ 34.675851] kasan_report+0xdc/0x128 [ 34.675895] __asan_report_load8_noabort+0x20/0x30 [ 34.676285] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 34.676409] kasan_bitops_generic+0x110/0x1c8 [ 34.676516] kunit_try_run_case+0x170/0x3f0 [ 34.676685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.676845] kthread+0x328/0x630 [ 34.676941] ret_from_fork+0x10/0x20 [ 34.677076] [ 34.677120] Allocated by task 293: [ 34.677154] kasan_save_stack+0x3c/0x68 [ 34.677262] kasan_save_track+0x20/0x40 [ 34.677715] kasan_save_alloc_info+0x40/0x58 [ 34.677804] __kasan_kmalloc+0xd4/0xd8 [ 34.677974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.678031] kasan_bitops_generic+0xa0/0x1c8 [ 34.678119] kunit_try_run_case+0x170/0x3f0 [ 34.678216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.678277] kthread+0x328/0x630 [ 34.678311] ret_from_fork+0x10/0x20 [ 34.678380] [ 34.678592] The buggy address belongs to the object at fff00000c91b2880 [ 34.678592] which belongs to the cache kmalloc-16 of size 16 [ 34.679252] The buggy address is located 8 bytes inside of [ 34.679252] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.679372] [ 34.679398] The buggy address belongs to the physical page: [ 34.679446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.679513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.679826] page_type: f5(slab) [ 34.680054] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.680192] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.680334] page dumped because: kasan: bad access detected [ 34.680419] [ 34.680459] Memory state around the buggy address: [ 34.680502] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.680777] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.680956] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.681070] ^ [ 34.681168] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.681313] fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.681376] ================================================================== [ 34.665015] ================================================================== [ 34.665246] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 34.665311] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.665364] [ 34.665398] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.665589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.665664] Hardware name: linux,dummy-virt (DT) [ 34.665700] Call trace: [ 34.665745] show_stack+0x20/0x38 (C) [ 34.665798] dump_stack_lvl+0x8c/0xd0 [ 34.665864] print_report+0x118/0x5e8 [ 34.665990] kasan_report+0xdc/0x128 [ 34.666036] __asan_report_load8_noabort+0x20/0x30 [ 34.666088] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 34.666141] kasan_bitops_generic+0x110/0x1c8 [ 34.666202] kunit_try_run_case+0x170/0x3f0 [ 34.666251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.666312] kthread+0x328/0x630 [ 34.666358] ret_from_fork+0x10/0x20 [ 34.666409] [ 34.666437] Allocated by task 293: [ 34.666480] kasan_save_stack+0x3c/0x68 [ 34.666523] kasan_save_track+0x20/0x40 [ 34.666560] kasan_save_alloc_info+0x40/0x58 [ 34.666600] __kasan_kmalloc+0xd4/0xd8 [ 34.666654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.666713] kasan_bitops_generic+0xa0/0x1c8 [ 34.666756] kunit_try_run_case+0x170/0x3f0 [ 34.666796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.666849] kthread+0x328/0x630 [ 34.666886] ret_from_fork+0x10/0x20 [ 34.666938] [ 34.666961] The buggy address belongs to the object at fff00000c91b2880 [ 34.666961] which belongs to the cache kmalloc-16 of size 16 [ 34.667020] The buggy address is located 8 bytes inside of [ 34.667020] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.667084] [ 34.667105] The buggy address belongs to the physical page: [ 34.667142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.667198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.667253] page_type: f5(slab) [ 34.667301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.667352] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.667393] page dumped because: kasan: bad access detected [ 34.667436] [ 34.667456] Memory state around the buggy address: [ 34.667489] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.667536] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.667581] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.667628] ^ [ 34.667668] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.667714] fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.667755] ================================================================== [ 34.656715] ================================================================== [ 34.656817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 34.657038] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.657103] [ 34.657157] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.657294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.657335] Hardware name: linux,dummy-virt (DT) [ 34.657370] Call trace: [ 34.657412] show_stack+0x20/0x38 (C) [ 34.657591] dump_stack_lvl+0x8c/0xd0 [ 34.657811] print_report+0x118/0x5e8 [ 34.657895] kasan_report+0xdc/0x128 [ 34.657970] kasan_check_range+0x100/0x1a8 [ 34.658033] __kasan_check_write+0x20/0x30 [ 34.658099] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 34.658172] kasan_bitops_generic+0x110/0x1c8 [ 34.658224] kunit_try_run_case+0x170/0x3f0 [ 34.658274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.658328] kthread+0x328/0x630 [ 34.658555] ret_from_fork+0x10/0x20 [ 34.658622] [ 34.658688] Allocated by task 293: [ 34.658765] kasan_save_stack+0x3c/0x68 [ 34.658830] kasan_save_track+0x20/0x40 [ 34.658869] kasan_save_alloc_info+0x40/0x58 [ 34.658909] __kasan_kmalloc+0xd4/0xd8 [ 34.659050] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.659210] kasan_bitops_generic+0xa0/0x1c8 [ 34.659380] kunit_try_run_case+0x170/0x3f0 [ 34.659613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.659771] kthread+0x328/0x630 [ 34.659811] ret_from_fork+0x10/0x20 [ 34.659850] [ 34.659933] The buggy address belongs to the object at fff00000c91b2880 [ 34.659933] which belongs to the cache kmalloc-16 of size 16 [ 34.660041] The buggy address is located 8 bytes inside of [ 34.660041] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.660130] [ 34.660153] The buggy address belongs to the physical page: [ 34.660239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.660620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.660791] page_type: f5(slab) [ 34.660866] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.660963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.661016] page dumped because: kasan: bad access detected [ 34.661049] [ 34.661107] Memory state around the buggy address: [ 34.661404] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.661514] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.661619] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.661673] ^ [ 34.661733] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.661890] fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.662029] ================================================================== [ 34.690803] ================================================================== [ 34.690864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 34.691176] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.691470] [ 34.691510] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.691762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.691939] Hardware name: linux,dummy-virt (DT) [ 34.692026] Call trace: [ 34.692116] show_stack+0x20/0x38 (C) [ 34.692728] dump_stack_lvl+0x8c/0xd0 [ 34.692940] print_report+0x118/0x5e8 [ 34.693115] kasan_report+0xdc/0x128 [ 34.693602] kasan_check_range+0x100/0x1a8 [ 34.693949] __kasan_check_write+0x20/0x30 [ 34.694062] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 34.694231] kasan_bitops_generic+0x110/0x1c8 [ 34.694808] kunit_try_run_case+0x170/0x3f0 [ 34.695140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.695205] kthread+0x328/0x630 [ 34.695417] ret_from_fork+0x10/0x20 [ 34.695677] [ 34.695885] Allocated by task 293: [ 34.696112] kasan_save_stack+0x3c/0x68 [ 34.696206] kasan_save_track+0x20/0x40 [ 34.696286] kasan_save_alloc_info+0x40/0x58 [ 34.696465] __kasan_kmalloc+0xd4/0xd8 [ 34.696576] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.696692] kasan_bitops_generic+0xa0/0x1c8 [ 34.696780] kunit_try_run_case+0x170/0x3f0 [ 34.696915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.697006] kthread+0x328/0x630 [ 34.697041] ret_from_fork+0x10/0x20 [ 34.697300] [ 34.697469] The buggy address belongs to the object at fff00000c91b2880 [ 34.697469] which belongs to the cache kmalloc-16 of size 16 [ 34.697600] The buggy address is located 8 bytes inside of [ 34.697600] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.697724] [ 34.698141] The buggy address belongs to the physical page: [ 34.698448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.698573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.699013] page_type: f5(slab) [ 34.699144] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.699249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.699388] page dumped because: kasan: bad access detected [ 34.699510] [ 34.699662] Memory state around the buggy address: [ 34.699916] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.700104] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.700195] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700286] ^ [ 34.700365] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700519] fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700615] ================================================================== [ 34.702323] ================================================================== [ 34.702486] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 34.702562] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.702615] [ 34.702661] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.702762] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.702804] Hardware name: linux,dummy-virt (DT) [ 34.702837] Call trace: [ 34.702860] show_stack+0x20/0x38 (C) [ 34.702911] dump_stack_lvl+0x8c/0xd0 [ 34.703549] print_report+0x118/0x5e8 [ 34.703628] kasan_report+0xdc/0x128 [ 34.703862] __asan_report_load8_noabort+0x20/0x30 [ 34.704190] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 34.704327] kasan_bitops_generic+0x110/0x1c8 [ 34.704717] kunit_try_run_case+0x170/0x3f0 [ 34.704860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.704951] kthread+0x328/0x630 [ 34.705333] ret_from_fork+0x10/0x20 [ 34.705516] [ 34.705542] Allocated by task 293: [ 34.705602] kasan_save_stack+0x3c/0x68 [ 34.705981] kasan_save_track+0x20/0x40 [ 34.706182] kasan_save_alloc_info+0x40/0x58 [ 34.706300] __kasan_kmalloc+0xd4/0xd8 [ 34.706405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.706456] kasan_bitops_generic+0xa0/0x1c8 [ 34.706737] kunit_try_run_case+0x170/0x3f0 [ 34.706991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.707242] kthread+0x328/0x630 [ 34.707348] ret_from_fork+0x10/0x20 [ 34.707390] [ 34.707411] The buggy address belongs to the object at fff00000c91b2880 [ 34.707411] which belongs to the cache kmalloc-16 of size 16 [ 34.709769] page dumped because: kasan: bad access detected [ 34.711164] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.713305] [ 34.713814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.714106] Hardware name: linux,dummy-virt (DT) [ 34.714352] Call trace: [ 34.714388] show_stack+0x20/0x38 (C) [ 34.714870] kasan_check_range+0x100/0x1a8 [ 34.715881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.718689] kunit_try_run_case+0x170/0x3f0 [ 34.718910] [ 34.719538] [ 34.720706] page dumped because: kasan: bad access detected [ 34.724421] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.724767] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.724941] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.725063] show_stack+0x20/0x38 (C) [ 34.725825] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 34.726661] [ 34.726858] Allocated by task 293: [ 34.727314] kasan_save_alloc_info+0x40/0x58 [ 34.727991] kunit_try_run_case+0x170/0x3f0 [ 34.728529] kthread+0x328/0x630 [ 34.728955] The buggy address is located 8 bytes inside of [ 34.728955] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.730331] [ 34.730444] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.731050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 34.731157] [ 34.731198] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.731338] Hardware name: linux,dummy-virt (DT) [ 34.732490] kunit_try_run_case+0x170/0x3f0 [ 34.733432] ret_from_fork+0x10/0x20 [ 34.734856] __kasan_kmalloc+0xd4/0xd8 [ 34.736898] The buggy address is located 8 bytes inside of [ 34.736898] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.738144] page dumped because: kasan: bad access detected [ 34.738807] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.741614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 34.742027] [ 34.742062] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.742785] Call trace: [ 34.743425] kasan_report+0xdc/0x128 [ 34.743859] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 34.745699] [ 34.746202] kasan_save_track+0x20/0x40 [ 34.746899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.747391] kthread+0x328/0x630 [ 34.747891] The buggy address is located 8 bytes inside of [ 34.747891] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.749914] ^ [ 34.752401] Read of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.752630] [ 34.752706] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.753225] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.753284] Hardware name: linux,dummy-virt (DT) [ 34.753320] Call trace: [ 34.753408] dump_stack_lvl+0x8c/0xd0 [ 34.753601] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 34.753825] kthread+0x328/0x630 [ 34.754375] kasan_save_track+0x20/0x40 [ 34.754492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.754689] kthread+0x328/0x630 [ 34.754785] The buggy address belongs to the object at fff00000c91b2880 [ 34.754785] which belongs to the cache kmalloc-16 of size 16 [ 34.756105] page_type: f5(slab) [ 34.756324] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.757179] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.760652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 34.761306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.762149] kasan_check_range+0x100/0x1a8 [ 34.762577] kasan_bitops_generic+0x11c/0x1c8 [ 34.764061] kthread+0x328/0x630 [ 34.764464] [ 34.764802] kasan_save_track+0x20/0x40 [ 34.765883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.766750] The buggy address is located 8 bytes inside of [ 34.766750] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.768062] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.770293] ================================================================== [ 34.684028] ================================================================== [ 34.684092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 34.684150] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.684232] [ 34.684269] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.684368] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.684401] Hardware name: linux,dummy-virt (DT) [ 34.684446] Call trace: [ 34.684471] show_stack+0x20/0x38 (C) [ 34.684528] dump_stack_lvl+0x8c/0xd0 [ 34.684577] print_report+0x118/0x5e8 [ 34.684624] kasan_report+0xdc/0x128 [ 34.684685] kasan_check_range+0x100/0x1a8 [ 34.684733] __kasan_check_write+0x20/0x30 [ 34.684782] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 34.684845] kasan_bitops_generic+0x110/0x1c8 [ 34.684897] kunit_try_run_case+0x170/0x3f0 [ 34.684953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.685029] kthread+0x328/0x630 [ 34.685073] ret_from_fork+0x10/0x20 [ 34.685120] [ 34.685143] Allocated by task 293: [ 34.685183] kasan_save_stack+0x3c/0x68 [ 34.685225] kasan_save_track+0x20/0x40 [ 34.685263] kasan_save_alloc_info+0x40/0x58 [ 34.685302] __kasan_kmalloc+0xd4/0xd8 [ 34.685337] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.685380] kasan_bitops_generic+0xa0/0x1c8 [ 34.685422] kunit_try_run_case+0x170/0x3f0 [ 34.685462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.685506] kthread+0x328/0x630 [ 34.685550] ret_from_fork+0x10/0x20 [ 34.685589] [ 34.685610] The buggy address belongs to the object at fff00000c91b2880 [ 34.685610] which belongs to the cache kmalloc-16 of size 16 [ 34.686460] The buggy address is located 8 bytes inside of [ 34.686460] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.686541] [ 34.686567] The buggy address belongs to the physical page: [ 34.686631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.686884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.687152] page_type: f5(slab) [ 34.687261] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.687532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.687765] page dumped because: kasan: bad access detected [ 34.687868] [ 34.687960] Memory state around the buggy address: [ 34.688033] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.688401] fff00000c91b2800: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.688586] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.688832] ^ [ 34.689147] fff00000c91b2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.689427] fff00000c91b2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.689511] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 34.644884] ================================================================== [ 34.644942] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 34.645044] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291 [ 34.645230] [ 34.645703] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.645807] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.645842] Hardware name: linux,dummy-virt (DT) [ 34.645875] Call trace: [ 34.645899] show_stack+0x20/0x38 (C) [ 34.646037] dump_stack_lvl+0x8c/0xd0 [ 34.646091] print_report+0x118/0x5e8 [ 34.646403] kasan_report+0xdc/0x128 [ 34.646534] __asan_report_load1_noabort+0x20/0x30 [ 34.646589] strnlen+0x80/0x88 [ 34.646634] kasan_strings+0x478/0xb00 [ 34.646739] kunit_try_run_case+0x170/0x3f0 [ 34.646815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.646882] kthread+0x328/0x630 [ 34.646939] ret_from_fork+0x10/0x20 [ 34.647002] [ 34.647024] Allocated by task 291: [ 34.647069] kasan_save_stack+0x3c/0x68 [ 34.647109] kasan_save_track+0x20/0x40 [ 34.647145] kasan_save_alloc_info+0x40/0x58 [ 34.647186] __kasan_kmalloc+0xd4/0xd8 [ 34.647469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.647571] kasan_strings+0xc8/0xb00 [ 34.647650] kunit_try_run_case+0x170/0x3f0 [ 34.647775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.648250] kthread+0x328/0x630 [ 34.648321] ret_from_fork+0x10/0x20 [ 34.648361] [ 34.648383] Freed by task 291: [ 34.648414] kasan_save_stack+0x3c/0x68 [ 34.648452] kasan_save_track+0x20/0x40 [ 34.648489] kasan_save_free_info+0x4c/0x78 [ 34.648530] __kasan_slab_free+0x7c/0xa8 [ 34.648576] kfree+0x214/0x3c8 [ 34.648614] kasan_strings+0x24c/0xb00 [ 34.648669] kunit_try_run_case+0x170/0x3f0 [ 34.648709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.648974] kthread+0x328/0x630 [ 34.649044] ret_from_fork+0x10/0x20 [ 34.649093] [ 34.649161] The buggy address belongs to the object at fff00000c9a94380 [ 34.649161] which belongs to the cache kmalloc-32 of size 32 [ 34.649242] The buggy address is located 16 bytes inside of [ 34.649242] freed 32-byte region [fff00000c9a94380, fff00000c9a943a0) [ 34.649305] [ 34.649327] The buggy address belongs to the physical page: [ 34.649365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 34.649561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.649616] page_type: f5(slab) [ 34.649667] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.649720] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.649967] page dumped because: kasan: bad access detected [ 34.650055] [ 34.650167] Memory state around the buggy address: [ 34.650244] fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.650381] fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.650495] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.650605] ^ [ 34.650705] fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.650784] fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.650902] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 34.637505] ================================================================== [ 34.637554] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 34.637900] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291 [ 34.637997] [ 34.638032] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.638147] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.638180] Hardware name: linux,dummy-virt (DT) [ 34.638213] Call trace: [ 34.638274] show_stack+0x20/0x38 (C) [ 34.638325] dump_stack_lvl+0x8c/0xd0 [ 34.638374] print_report+0x118/0x5e8 [ 34.638631] kasan_report+0xdc/0x128 [ 34.638694] __asan_report_load1_noabort+0x20/0x30 [ 34.638789] strlen+0xa8/0xb0 [ 34.638876] kasan_strings+0x418/0xb00 [ 34.638977] kunit_try_run_case+0x170/0x3f0 [ 34.639099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.639218] kthread+0x328/0x630 [ 34.639310] ret_from_fork+0x10/0x20 [ 34.639422] [ 34.639443] Allocated by task 291: [ 34.639474] kasan_save_stack+0x3c/0x68 [ 34.639836] kasan_save_track+0x20/0x40 [ 34.639964] kasan_save_alloc_info+0x40/0x58 [ 34.640080] __kasan_kmalloc+0xd4/0xd8 [ 34.640207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.640305] kasan_strings+0xc8/0xb00 [ 34.640412] kunit_try_run_case+0x170/0x3f0 [ 34.640509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.640688] kthread+0x328/0x630 [ 34.640800] ret_from_fork+0x10/0x20 [ 34.640839] [ 34.641149] Freed by task 291: [ 34.641286] kasan_save_stack+0x3c/0x68 [ 34.641365] kasan_save_track+0x20/0x40 [ 34.641431] kasan_save_free_info+0x4c/0x78 [ 34.641471] __kasan_slab_free+0x7c/0xa8 [ 34.641728] kfree+0x214/0x3c8 [ 34.641814] kasan_strings+0x24c/0xb00 [ 34.641921] kunit_try_run_case+0x170/0x3f0 [ 34.642078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.642225] kthread+0x328/0x630 [ 34.642319] ret_from_fork+0x10/0x20 [ 34.642453] [ 34.642558] The buggy address belongs to the object at fff00000c9a94380 [ 34.642558] which belongs to the cache kmalloc-32 of size 32 [ 34.642786] The buggy address is located 16 bytes inside of [ 34.642786] freed 32-byte region [fff00000c9a94380, fff00000c9a943a0) [ 34.642954] [ 34.643080] The buggy address belongs to the physical page: [ 34.643187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 34.643316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.643443] page_type: f5(slab) [ 34.643569] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.643651] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.643738] page dumped because: kasan: bad access detected [ 34.643782] [ 34.643802] Memory state around the buggy address: [ 34.643836] fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.643880] fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.643932] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.643974] ^ [ 34.644007] fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.644054] fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.644105] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 34.632765] ================================================================== [ 34.632834] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 34.632889] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291 [ 34.632970] [ 34.633027] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.633117] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.633149] Hardware name: linux,dummy-virt (DT) [ 34.633182] Call trace: [ 34.633357] show_stack+0x20/0x38 (C) [ 34.633431] dump_stack_lvl+0x8c/0xd0 [ 34.633487] print_report+0x118/0x5e8 [ 34.633545] kasan_report+0xdc/0x128 [ 34.633597] __asan_report_load1_noabort+0x20/0x30 [ 34.633657] kasan_strings+0x95c/0xb00 [ 34.633714] kunit_try_run_case+0x170/0x3f0 [ 34.633782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.633866] kthread+0x328/0x630 [ 34.633948] ret_from_fork+0x10/0x20 [ 34.633999] [ 34.634040] Allocated by task 291: [ 34.634087] kasan_save_stack+0x3c/0x68 [ 34.634130] kasan_save_track+0x20/0x40 [ 34.634166] kasan_save_alloc_info+0x40/0x58 [ 34.634243] __kasan_kmalloc+0xd4/0xd8 [ 34.634279] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.634323] kasan_strings+0xc8/0xb00 [ 34.634360] kunit_try_run_case+0x170/0x3f0 [ 34.634618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.634692] kthread+0x328/0x630 [ 34.634727] ret_from_fork+0x10/0x20 [ 34.634794] [ 34.634822] Freed by task 291: [ 34.634853] kasan_save_stack+0x3c/0x68 [ 34.634940] kasan_save_track+0x20/0x40 [ 34.635020] kasan_save_free_info+0x4c/0x78 [ 34.635117] __kasan_slab_free+0x7c/0xa8 [ 34.635259] kfree+0x214/0x3c8 [ 34.635424] kasan_strings+0x24c/0xb00 [ 34.635531] kunit_try_run_case+0x170/0x3f0 [ 34.635589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.635905] kthread+0x328/0x630 [ 34.635986] ret_from_fork+0x10/0x20 [ 34.636163] [ 34.636234] The buggy address belongs to the object at fff00000c9a94380 [ 34.636234] which belongs to the cache kmalloc-32 of size 32 [ 34.636356] The buggy address is located 16 bytes inside of [ 34.636356] freed 32-byte region [fff00000c9a94380, fff00000c9a943a0) [ 34.636454] [ 34.636526] The buggy address belongs to the physical page: [ 34.636593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 34.636658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.636712] page_type: f5(slab) [ 34.636763] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.636816] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.636868] page dumped because: kasan: bad access detected [ 34.636911] [ 34.636940] Memory state around the buggy address: [ 34.636975] fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.637036] fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.637084] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.637124] ^ [ 34.637157] fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.637213] fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.637254] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 34.626393] ================================================================== [ 34.626464] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 34.626622] Read of size 1 at addr fff00000c9a94390 by task kunit_try_catch/291 [ 34.626872] [ 34.627010] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.627252] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.627283] Hardware name: linux,dummy-virt (DT) [ 34.627317] Call trace: [ 34.627401] show_stack+0x20/0x38 (C) [ 34.627505] dump_stack_lvl+0x8c/0xd0 [ 34.627552] print_report+0x118/0x5e8 [ 34.627692] kasan_report+0xdc/0x128 [ 34.627744] __asan_report_load1_noabort+0x20/0x30 [ 34.627796] strcmp+0xc0/0xc8 [ 34.627857] kasan_strings+0x340/0xb00 [ 34.628063] kunit_try_run_case+0x170/0x3f0 [ 34.628114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.628202] kthread+0x328/0x630 [ 34.628265] ret_from_fork+0x10/0x20 [ 34.628420] [ 34.628472] Allocated by task 291: [ 34.628508] kasan_save_stack+0x3c/0x68 [ 34.628662] kasan_save_track+0x20/0x40 [ 34.628758] kasan_save_alloc_info+0x40/0x58 [ 34.628816] __kasan_kmalloc+0xd4/0xd8 [ 34.628853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.628916] kasan_strings+0xc8/0xb00 [ 34.629101] kunit_try_run_case+0x170/0x3f0 [ 34.629142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.629205] kthread+0x328/0x630 [ 34.629347] ret_from_fork+0x10/0x20 [ 34.629394] [ 34.629501] Freed by task 291: [ 34.629530] kasan_save_stack+0x3c/0x68 [ 34.629606] kasan_save_track+0x20/0x40 [ 34.629884] kasan_save_free_info+0x4c/0x78 [ 34.630118] __kasan_slab_free+0x7c/0xa8 [ 34.630172] kfree+0x214/0x3c8 [ 34.630425] kasan_strings+0x24c/0xb00 [ 34.630467] kunit_try_run_case+0x170/0x3f0 [ 34.630506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.630551] kthread+0x328/0x630 [ 34.630586] ret_from_fork+0x10/0x20 [ 34.630625] [ 34.630676] The buggy address belongs to the object at fff00000c9a94380 [ 34.630676] which belongs to the cache kmalloc-32 of size 32 [ 34.630763] The buggy address is located 16 bytes inside of [ 34.630763] freed 32-byte region [fff00000c9a94380, fff00000c9a943a0) [ 34.630846] [ 34.630871] The buggy address belongs to the physical page: [ 34.630942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 34.631061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.631114] page_type: f5(slab) [ 34.631438] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.631552] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.631605] page dumped because: kasan: bad access detected [ 34.631667] [ 34.631698] Memory state around the buggy address: [ 34.631750] fff00000c9a94280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.631806] fff00000c9a94300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.631852] >fff00000c9a94380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.631892] ^ [ 34.631923] fff00000c9a94400: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.631969] fff00000c9a94480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.632025] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 34.603234] ================================================================== [ 34.603400] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 34.603465] Read of size 1 at addr fff00000c9a941d8 by task kunit_try_catch/289 [ 34.603722] [ 34.603804] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.603976] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.604103] Hardware name: linux,dummy-virt (DT) [ 34.604137] Call trace: [ 34.604263] show_stack+0x20/0x38 (C) [ 34.604328] dump_stack_lvl+0x8c/0xd0 [ 34.604423] print_report+0x118/0x5e8 [ 34.604617] kasan_report+0xdc/0x128 [ 34.604678] __asan_report_load1_noabort+0x20/0x30 [ 34.604737] memcmp+0x198/0x1d8 [ 34.604825] kasan_memcmp+0x16c/0x300 [ 34.605075] kunit_try_run_case+0x170/0x3f0 [ 34.605189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.605244] kthread+0x328/0x630 [ 34.605288] ret_from_fork+0x10/0x20 [ 34.605339] [ 34.605359] Allocated by task 289: [ 34.605390] kasan_save_stack+0x3c/0x68 [ 34.605483] kasan_save_track+0x20/0x40 [ 34.605633] kasan_save_alloc_info+0x40/0x58 [ 34.605682] __kasan_kmalloc+0xd4/0xd8 [ 34.605717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.605762] kasan_memcmp+0xbc/0x300 [ 34.605800] kunit_try_run_case+0x170/0x3f0 [ 34.605837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.605881] kthread+0x328/0x630 [ 34.605914] ret_from_fork+0x10/0x20 [ 34.606409] [ 34.606741] The buggy address belongs to the object at fff00000c9a941c0 [ 34.606741] which belongs to the cache kmalloc-32 of size 32 [ 34.606891] The buggy address is located 0 bytes to the right of [ 34.606891] allocated 24-byte region [fff00000c9a941c0, fff00000c9a941d8) [ 34.607122] [ 34.607147] The buggy address belongs to the physical page: [ 34.607184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a94 [ 34.607241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.607425] page_type: f5(slab) [ 34.607470] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.607588] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.607730] page dumped because: kasan: bad access detected [ 34.607898] [ 34.607959] Memory state around the buggy address: [ 34.608012] fff00000c9a94080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.608059] fff00000c9a94100: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 34.608114] >fff00000c9a94180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.608243] ^ [ 34.608283] fff00000c9a94200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.608327] fff00000c9a94280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.608367] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 34.584220] ================================================================== [ 34.584289] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 34.584390] Read of size 1 at addr ffff800080bc7b4a by task kunit_try_catch/285 [ 34.584444] [ 34.584477] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.584569] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.584602] Hardware name: linux,dummy-virt (DT) [ 34.584635] Call trace: [ 34.584680] show_stack+0x20/0x38 (C) [ 34.584730] dump_stack_lvl+0x8c/0xd0 [ 34.584790] print_report+0x310/0x5e8 [ 34.584837] kasan_report+0xdc/0x128 [ 34.584892] __asan_report_load1_noabort+0x20/0x30 [ 34.584943] kasan_alloca_oob_right+0x2dc/0x340 [ 34.584993] kunit_try_run_case+0x170/0x3f0 [ 34.585045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.585097] kthread+0x328/0x630 [ 34.585140] ret_from_fork+0x10/0x20 [ 34.585196] [ 34.585220] The buggy address belongs to stack of task kunit_try_catch/285 [ 34.585275] [ 34.585297] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080bc0000 allocated at kernel_clone+0x150/0x7b0 [ 34.585408] The buggy address belongs to the physical page: [ 34.585445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a7e [ 34.585507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.585570] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.585622] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.586444] page dumped because: kasan: bad access detected [ 34.586499] [ 34.586565] Memory state around the buggy address: [ 34.586603] ffff800080bc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.586699] ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.586845] >ffff800080bc7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 34.586951] ^ [ 34.587179] ffff800080bc7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 34.587258] ffff800080bc7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.587400] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 34.572720] ================================================================== [ 34.572814] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 34.572914] Read of size 1 at addr ffff800080bc7b5f by task kunit_try_catch/283 [ 34.572968] [ 34.573003] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.573093] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.573132] Hardware name: linux,dummy-virt (DT) [ 34.573176] Call trace: [ 34.573202] show_stack+0x20/0x38 (C) [ 34.573382] dump_stack_lvl+0x8c/0xd0 [ 34.573436] print_report+0x310/0x5e8 [ 34.573736] kasan_report+0xdc/0x128 [ 34.573790] __asan_report_load1_noabort+0x20/0x30 [ 34.573985] kasan_alloca_oob_left+0x2b8/0x310 [ 34.574102] kunit_try_run_case+0x170/0x3f0 [ 34.574155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.574244] kthread+0x328/0x630 [ 34.574310] ret_from_fork+0x10/0x20 [ 34.574363] [ 34.574398] The buggy address belongs to stack of task kunit_try_catch/283 [ 34.574476] [ 34.574546] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080bc0000 allocated at kernel_clone+0x150/0x7b0 [ 34.574662] The buggy address belongs to the physical page: [ 34.574764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a7e [ 34.574822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.574916] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.575101] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.575145] page dumped because: kasan: bad access detected [ 34.575179] [ 34.575222] Memory state around the buggy address: [ 34.575256] ffff800080bc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.575302] ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.575554] >ffff800080bc7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 34.575664] ^ [ 34.575758] ffff800080bc7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 34.575842] ffff800080bc7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.575952] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 34.560074] ================================================================== [ 34.560684] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 34.561121] Read of size 1 at addr ffff800080bc7c2a by task kunit_try_catch/281 [ 34.561516] [ 34.561561] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.561822] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.561859] Hardware name: linux,dummy-virt (DT) [ 34.561892] Call trace: [ 34.561921] show_stack+0x20/0x38 (C) [ 34.561974] dump_stack_lvl+0x8c/0xd0 [ 34.562025] print_report+0x310/0x5e8 [ 34.562070] kasan_report+0xdc/0x128 [ 34.562115] __asan_report_load1_noabort+0x20/0x30 [ 34.562166] kasan_stack_oob+0x238/0x270 [ 34.562789] kunit_try_run_case+0x170/0x3f0 [ 34.563067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.563124] kthread+0x328/0x630 [ 34.563168] ret_from_fork+0x10/0x20 [ 34.563221] [ 34.563295] The buggy address belongs to stack of task kunit_try_catch/281 [ 34.563414] and is located at offset 138 in frame: [ 34.563452] kasan_stack_oob+0x0/0x270 [ 34.563581] [ 34.563615] This frame has 4 objects: [ 34.564273] [48, 49) '__assertion' [ 34.564426] [64, 72) 'array' [ 34.564462] [96, 112) '__assertion' [ 34.564637] [128, 138) 'stack_array' [ 34.564734] [ 34.564761] The buggy address belongs to a 8-page vmalloc region starting at 0xffff800080bc0000 allocated at kernel_clone+0x150/0x7b0 [ 34.564919] The buggy address belongs to the physical page: [ 34.564982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a7e [ 34.565277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.565380] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.565480] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.565543] page dumped because: kasan: bad access detected [ 34.565577] [ 34.565604] Memory state around the buggy address: [ 34.565816] ffff800080bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.566095] ffff800080bc7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 34.566263] >ffff800080bc7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 34.566343] ^ [ 34.566443] ffff800080bc7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 34.566527] ffff800080bc7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.566578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 34.540957] ================================================================== [ 34.541022] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.541079] Read of size 1 at addr ffff9501f119f68d by task kunit_try_catch/277 [ 34.541129] [ 34.541165] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.541251] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.541281] Hardware name: linux,dummy-virt (DT) [ 34.541312] Call trace: [ 34.541336] show_stack+0x20/0x38 (C) [ 34.541382] dump_stack_lvl+0x8c/0xd0 [ 34.541429] print_report+0x310/0x5e8 [ 34.541473] kasan_report+0xdc/0x128 [ 34.541516] __asan_report_load1_noabort+0x20/0x30 [ 34.541570] kasan_global_oob_right+0x230/0x270 [ 34.541621] kunit_try_run_case+0x170/0x3f0 [ 34.542271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.542332] kthread+0x328/0x630 [ 34.542386] ret_from_fork+0x10/0x20 [ 34.542603] [ 34.542685] The buggy address belongs to the variable: [ 34.542720] global_array+0xd/0x40 [ 34.542773] [ 34.542824] The buggy address belongs to a 0-page vmalloc region starting at 0xffff9501ef300000 allocated at paging_init+0x66c/0x7d0 [ 34.543170] The buggy address belongs to the physical page: [ 34.543211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d9f [ 34.543301] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.543372] raw: 03fffe0000002000 ffffc1ffc01f67c8 ffffc1ffc01f67c8 0000000000000000 [ 34.543443] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.543486] page dumped because: kasan: bad access detected [ 34.543523] [ 34.543543] Memory state around the buggy address: [ 34.543578] ffff9501f119f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.543624] ffff9501f119f600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 34.543682] >ffff9501f119f680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 34.543722] ^ [ 34.543753] ffff9501f119f700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 34.543796] ffff9501f119f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.543847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 34.522055] ================================================================== [ 34.522125] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.522285] Free of addr fff00000c9a8b401 by task kunit_try_catch/273 [ 34.522335] [ 34.522597] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.522924] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.523068] Hardware name: linux,dummy-virt (DT) [ 34.523129] Call trace: [ 34.523241] show_stack+0x20/0x38 (C) [ 34.523312] dump_stack_lvl+0x8c/0xd0 [ 34.523369] print_report+0x118/0x5e8 [ 34.523777] kasan_report_invalid_free+0xc0/0xe8 [ 34.524006] check_slab_allocation+0xfc/0x108 [ 34.524156] __kasan_mempool_poison_object+0x78/0x150 [ 34.524244] mempool_free+0x3f4/0x5f0 [ 34.524412] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.524523] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.524788] kunit_try_run_case+0x170/0x3f0 [ 34.524908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.524985] kthread+0x328/0x630 [ 34.525029] ret_from_fork+0x10/0x20 [ 34.525078] [ 34.525100] Allocated by task 273: [ 34.525129] kasan_save_stack+0x3c/0x68 [ 34.525169] kasan_save_track+0x20/0x40 [ 34.525205] kasan_save_alloc_info+0x40/0x58 [ 34.525243] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.525287] remove_element+0x130/0x1f8 [ 34.525324] mempool_alloc_preallocated+0x58/0xc0 [ 34.525364] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 34.525409] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.525452] kunit_try_run_case+0x170/0x3f0 [ 34.525491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.525534] kthread+0x328/0x630 [ 34.525567] ret_from_fork+0x10/0x20 [ 34.525603] [ 34.525624] The buggy address belongs to the object at fff00000c9a8b400 [ 34.525624] which belongs to the cache kmalloc-128 of size 128 [ 34.525818] The buggy address is located 1 bytes inside of [ 34.525818] 128-byte region [fff00000c9a8b400, fff00000c9a8b480) [ 34.526170] [ 34.526192] The buggy address belongs to the physical page: [ 34.526232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 34.526287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.526338] page_type: f5(slab) [ 34.526381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.526469] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.526552] page dumped because: kasan: bad access detected [ 34.526582] [ 34.526602] Memory state around the buggy address: [ 34.526684] fff00000c9a8b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.526769] fff00000c9a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.526813] >fff00000c9a8b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.526895] ^ [ 34.526982] fff00000c9a8b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.527166] fff00000c9a8b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.527224] ================================================================== [ 34.532179] ================================================================== [ 34.532551] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.532657] Free of addr fff00000c9bf0001 by task kunit_try_catch/275 [ 34.532739] [ 34.532773] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.532861] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.532929] Hardware name: linux,dummy-virt (DT) [ 34.532988] Call trace: [ 34.533057] show_stack+0x20/0x38 (C) [ 34.533113] dump_stack_lvl+0x8c/0xd0 [ 34.533162] print_report+0x118/0x5e8 [ 34.533233] kasan_report_invalid_free+0xc0/0xe8 [ 34.533511] __kasan_mempool_poison_object+0xfc/0x150 [ 34.533598] mempool_free+0x3f4/0x5f0 [ 34.533676] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.533753] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 34.533806] kunit_try_run_case+0x170/0x3f0 [ 34.533852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.533989] kthread+0x328/0x630 [ 34.534067] ret_from_fork+0x10/0x20 [ 34.534123] [ 34.534144] The buggy address belongs to the physical page: [ 34.534180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf0 [ 34.534247] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.534296] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.534352] page_type: f8(unknown) [ 34.534426] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.534748] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.535262] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.535313] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.535449] head: 0bfffe0000000002 ffffc1ffc326fc01 00000000ffffffff 00000000ffffffff [ 34.535499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.535539] page dumped because: kasan: bad access detected [ 34.535570] [ 34.535590] Memory state around the buggy address: [ 34.535623] fff00000c9beff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.535680] fff00000c9beff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.535724] >fff00000c9bf0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.535762] ^ [ 34.535791] fff00000c9bf0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.535833] fff00000c9bf0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.535871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 34.478774] ================================================================== [ 34.479304] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.479783] Free of addr fff00000c9b8c000 by task kunit_try_catch/271 [ 34.480326] [ 34.480609] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.481836] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.482281] Hardware name: linux,dummy-virt (DT) [ 34.482500] Call trace: [ 34.482611] show_stack+0x20/0x38 (C) [ 34.483013] dump_stack_lvl+0x8c/0xd0 [ 34.483212] print_report+0x118/0x5e8 [ 34.483562] kasan_report_invalid_free+0xc0/0xe8 [ 34.483855] __kasan_mempool_poison_pages+0xe0/0xe8 [ 34.484235] mempool_free+0x3ac/0x5f0 [ 34.484590] mempool_double_free_helper+0x150/0x2e8 [ 34.484653] mempool_page_alloc_double_free+0xbc/0x118 [ 34.484712] kunit_try_run_case+0x170/0x3f0 [ 34.484761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.486259] kthread+0x328/0x630 [ 34.486863] ret_from_fork+0x10/0x20 [ 34.487284] [ 34.487313] The buggy address belongs to the physical page: [ 34.487351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 34.488130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.488422] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.488517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.488705] page dumped because: kasan: bad access detected [ 34.489205] [ 34.489315] Memory state around the buggy address: [ 34.489355] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.489402] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.489960] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.490341] ^ [ 34.490779] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.491285] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.491558] ================================================================== [ 34.454098] ================================================================== [ 34.454164] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.454224] Free of addr fff00000c9b8c000 by task kunit_try_catch/269 [ 34.454784] [ 34.454984] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.455178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.455234] Hardware name: linux,dummy-virt (DT) [ 34.455345] Call trace: [ 34.455410] show_stack+0x20/0x38 (C) [ 34.455519] dump_stack_lvl+0x8c/0xd0 [ 34.455590] print_report+0x118/0x5e8 [ 34.455635] kasan_report_invalid_free+0xc0/0xe8 [ 34.455691] __kasan_mempool_poison_object+0x14c/0x150 [ 34.455741] mempool_free+0x3f4/0x5f0 [ 34.455956] mempool_double_free_helper+0x150/0x2e8 [ 34.456108] mempool_kmalloc_large_double_free+0xc0/0x118 [ 34.456210] kunit_try_run_case+0x170/0x3f0 [ 34.456277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.456428] kthread+0x328/0x630 [ 34.456471] ret_from_fork+0x10/0x20 [ 34.456841] [ 34.456950] The buggy address belongs to the physical page: [ 34.457023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 34.457081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.457129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.457232] page_type: f8(unknown) [ 34.457273] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.457401] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.457548] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.457596] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.457654] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff [ 34.457704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.457770] page dumped because: kasan: bad access detected [ 34.457903] [ 34.457921] Memory state around the buggy address: [ 34.458008] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.458173] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.458217] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.458255] ^ [ 34.458284] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.458370] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.458409] ================================================================== [ 34.438055] ================================================================== [ 34.438126] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.438191] Free of addr fff00000c9a8b000 by task kunit_try_catch/267 [ 34.438234] [ 34.438273] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.438365] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.438393] Hardware name: linux,dummy-virt (DT) [ 34.438425] Call trace: [ 34.438449] show_stack+0x20/0x38 (C) [ 34.438677] dump_stack_lvl+0x8c/0xd0 [ 34.438756] print_report+0x118/0x5e8 [ 34.439033] kasan_report_invalid_free+0xc0/0xe8 [ 34.439500] check_slab_allocation+0xd4/0x108 [ 34.439552] __kasan_mempool_poison_object+0x78/0x150 [ 34.439651] mempool_free+0x3f4/0x5f0 [ 34.439703] mempool_double_free_helper+0x150/0x2e8 [ 34.439914] mempool_kmalloc_double_free+0xc0/0x118 [ 34.440027] kunit_try_run_case+0x170/0x3f0 [ 34.440226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.440317] kthread+0x328/0x630 [ 34.440359] ret_from_fork+0x10/0x20 [ 34.440419] [ 34.440439] Allocated by task 267: [ 34.440558] kasan_save_stack+0x3c/0x68 [ 34.440610] kasan_save_track+0x20/0x40 [ 34.440658] kasan_save_alloc_info+0x40/0x58 [ 34.440699] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.440848] remove_element+0x130/0x1f8 [ 34.440986] mempool_alloc_preallocated+0x58/0xc0 [ 34.441110] mempool_double_free_helper+0x94/0x2e8 [ 34.441169] mempool_kmalloc_double_free+0xc0/0x118 [ 34.441490] kunit_try_run_case+0x170/0x3f0 [ 34.441756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441809] kthread+0x328/0x630 [ 34.441892] ret_from_fork+0x10/0x20 [ 34.441930] [ 34.442002] Freed by task 267: [ 34.442084] kasan_save_stack+0x3c/0x68 [ 34.442121] kasan_save_track+0x20/0x40 [ 34.442183] kasan_save_free_info+0x4c/0x78 [ 34.442219] __kasan_mempool_poison_object+0xc0/0x150 [ 34.442305] mempool_free+0x3f4/0x5f0 [ 34.442488] mempool_double_free_helper+0x100/0x2e8 [ 34.442532] mempool_kmalloc_double_free+0xc0/0x118 [ 34.442573] kunit_try_run_case+0x170/0x3f0 [ 34.442610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.442691] kthread+0x328/0x630 [ 34.442724] ret_from_fork+0x10/0x20 [ 34.442839] [ 34.442859] The buggy address belongs to the object at fff00000c9a8b000 [ 34.442859] which belongs to the cache kmalloc-128 of size 128 [ 34.443027] The buggy address is located 0 bytes inside of [ 34.443027] 128-byte region [fff00000c9a8b000, fff00000c9a8b080) [ 34.443087] [ 34.443110] The buggy address belongs to the physical page: [ 34.443147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 34.443474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.443549] page_type: f5(slab) [ 34.443593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.443654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.443733] page dumped because: kasan: bad access detected [ 34.443769] [ 34.443943] Memory state around the buggy address: [ 34.444036] fff00000c9a8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.444080] fff00000c9a8af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.444123] >fff00000c9a8b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.444163] ^ [ 34.444409] fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.444456] fff00000c9a8b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.444542] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 34.421176] ================================================================== [ 34.421633] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.421946] Read of size 1 at addr fff00000c9b8c000 by task kunit_try_catch/265 [ 34.422048] [ 34.422097] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.422274] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.422312] Hardware name: linux,dummy-virt (DT) [ 34.422363] Call trace: [ 34.422459] show_stack+0x20/0x38 (C) [ 34.422652] dump_stack_lvl+0x8c/0xd0 [ 34.422710] print_report+0x118/0x5e8 [ 34.422829] kasan_report+0xdc/0x128 [ 34.422999] __asan_report_load1_noabort+0x20/0x30 [ 34.423050] mempool_uaf_helper+0x314/0x340 [ 34.423510] mempool_page_alloc_uaf+0xc0/0x118 [ 34.423718] kunit_try_run_case+0x170/0x3f0 [ 34.423810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.423884] kthread+0x328/0x630 [ 34.423985] ret_from_fork+0x10/0x20 [ 34.424229] [ 34.424291] The buggy address belongs to the physical page: [ 34.424332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 34.424570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.424656] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.424950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.425104] page dumped because: kasan: bad access detected [ 34.425145] [ 34.425163] Memory state around the buggy address: [ 34.425201] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.425276] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.425373] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.425438] ^ [ 34.425545] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.425630] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.425884] ================================================================== [ 34.355922] ================================================================== [ 34.355989] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.356052] Read of size 1 at addr fff00000c9b8c000 by task kunit_try_catch/261 [ 34.356103] [ 34.356139] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.356229] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.356259] Hardware name: linux,dummy-virt (DT) [ 34.356291] Call trace: [ 34.356576] show_stack+0x20/0x38 (C) [ 34.356922] dump_stack_lvl+0x8c/0xd0 [ 34.357492] print_report+0x118/0x5e8 [ 34.357662] kasan_report+0xdc/0x128 [ 34.357968] __asan_report_load1_noabort+0x20/0x30 [ 34.358022] mempool_uaf_helper+0x314/0x340 [ 34.358069] mempool_kmalloc_large_uaf+0xc4/0x120 [ 34.358562] kunit_try_run_case+0x170/0x3f0 [ 34.358842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.358970] kthread+0x328/0x630 [ 34.359013] ret_from_fork+0x10/0x20 [ 34.359062] [ 34.359086] The buggy address belongs to the physical page: [ 34.359271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 34.359516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.359565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.360114] page_type: f8(unknown) [ 34.360239] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.360290] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.360341] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.360399] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.360448] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff [ 34.360863] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.360910] page dumped because: kasan: bad access detected [ 34.360943] [ 34.360961] Memory state around the buggy address: [ 34.361348] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.361436] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.361486] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.361628] ^ [ 34.361873] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.361918] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.361956] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 34.337692] ================================================================== [ 34.338000] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.338171] Read of size 1 at addr fff00000c8636c00 by task kunit_try_catch/259 [ 34.338306] [ 34.338385] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.338486] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.338632] Hardware name: linux,dummy-virt (DT) [ 34.338684] Call trace: [ 34.338710] show_stack+0x20/0x38 (C) [ 34.338762] dump_stack_lvl+0x8c/0xd0 [ 34.338810] print_report+0x118/0x5e8 [ 34.338854] kasan_report+0xdc/0x128 [ 34.338897] __asan_report_load1_noabort+0x20/0x30 [ 34.338954] mempool_uaf_helper+0x314/0x340 [ 34.339310] mempool_kmalloc_uaf+0xc4/0x120 [ 34.339557] kunit_try_run_case+0x170/0x3f0 [ 34.339609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.339679] kthread+0x328/0x630 [ 34.339723] ret_from_fork+0x10/0x20 [ 34.339771] [ 34.339791] Allocated by task 259: [ 34.339821] kasan_save_stack+0x3c/0x68 [ 34.339924] kasan_save_track+0x20/0x40 [ 34.339973] kasan_save_alloc_info+0x40/0x58 [ 34.340011] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.340053] remove_element+0x130/0x1f8 [ 34.340091] mempool_alloc_preallocated+0x58/0xc0 [ 34.340130] mempool_uaf_helper+0xa4/0x340 [ 34.340168] mempool_kmalloc_uaf+0xc4/0x120 [ 34.340205] kunit_try_run_case+0x170/0x3f0 [ 34.340240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.340284] kthread+0x328/0x630 [ 34.340341] ret_from_fork+0x10/0x20 [ 34.340377] [ 34.340397] Freed by task 259: [ 34.340429] kasan_save_stack+0x3c/0x68 [ 34.340500] kasan_save_track+0x20/0x40 [ 34.340590] kasan_save_free_info+0x4c/0x78 [ 34.340628] __kasan_mempool_poison_object+0xc0/0x150 [ 34.340684] mempool_free+0x3f4/0x5f0 [ 34.340720] mempool_uaf_helper+0x104/0x340 [ 34.340766] mempool_kmalloc_uaf+0xc4/0x120 [ 34.340805] kunit_try_run_case+0x170/0x3f0 [ 34.340840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.340934] kthread+0x328/0x630 [ 34.340980] ret_from_fork+0x10/0x20 [ 34.341017] [ 34.341036] The buggy address belongs to the object at fff00000c8636c00 [ 34.341036] which belongs to the cache kmalloc-128 of size 128 [ 34.341097] The buggy address is located 0 bytes inside of [ 34.341097] freed 128-byte region [fff00000c8636c00, fff00000c8636c80) [ 34.341342] [ 34.341364] The buggy address belongs to the physical page: [ 34.341475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108636 [ 34.341549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.341630] page_type: f5(slab) [ 34.341682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.341731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.341781] page dumped because: kasan: bad access detected [ 34.341836] [ 34.341854] Memory state around the buggy address: [ 34.342089] fff00000c8636b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.342137] fff00000c8636b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342301] >fff00000c8636c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.342375] ^ [ 34.342403] fff00000c8636c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342447] fff00000c8636d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.342536] ================================================================== [ 34.374378] ================================================================== [ 34.374893] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.375058] Read of size 1 at addr fff00000c9a8d240 by task kunit_try_catch/263 [ 34.375108] [ 34.375144] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.375232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.375263] Hardware name: linux,dummy-virt (DT) [ 34.375938] Call trace: [ 34.375973] show_stack+0x20/0x38 (C) [ 34.376025] dump_stack_lvl+0x8c/0xd0 [ 34.376075] print_report+0x118/0x5e8 [ 34.376118] kasan_report+0xdc/0x128 [ 34.376172] __asan_report_load1_noabort+0x20/0x30 [ 34.376220] mempool_uaf_helper+0x314/0x340 [ 34.376614] mempool_slab_uaf+0xc0/0x118 [ 34.376706] kunit_try_run_case+0x170/0x3f0 [ 34.376756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.376825] kthread+0x328/0x630 [ 34.376868] ret_from_fork+0x10/0x20 [ 34.376917] [ 34.376936] Allocated by task 263: [ 34.376965] kasan_save_stack+0x3c/0x68 [ 34.377198] kasan_save_track+0x20/0x40 [ 34.377299] kasan_save_alloc_info+0x40/0x58 [ 34.377343] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.377384] remove_element+0x16c/0x1f8 [ 34.377603] mempool_alloc_preallocated+0x58/0xc0 [ 34.377831] mempool_uaf_helper+0xa4/0x340 [ 34.377877] mempool_slab_uaf+0xc0/0x118 [ 34.378272] kunit_try_run_case+0x170/0x3f0 [ 34.378506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.378563] kthread+0x328/0x630 [ 34.378599] ret_from_fork+0x10/0x20 [ 34.378635] [ 34.378667] Freed by task 263: [ 34.378705] kasan_save_stack+0x3c/0x68 [ 34.378748] kasan_save_track+0x20/0x40 [ 34.378797] kasan_save_free_info+0x4c/0x78 [ 34.378967] __kasan_mempool_poison_object+0xc0/0x150 [ 34.379009] mempool_free+0x3f4/0x5f0 [ 34.379046] mempool_uaf_helper+0x104/0x340 [ 34.379388] mempool_slab_uaf+0xc0/0x118 [ 34.379568] kunit_try_run_case+0x170/0x3f0 [ 34.379629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.379684] kthread+0x328/0x630 [ 34.379716] ret_from_fork+0x10/0x20 [ 34.379751] [ 34.379775] The buggy address belongs to the object at fff00000c9a8d240 [ 34.379775] which belongs to the cache test_cache of size 123 [ 34.379939] The buggy address is located 0 bytes inside of [ 34.379939] freed 123-byte region [fff00000c9a8d240, fff00000c9a8d2bb) [ 34.380248] [ 34.380311] The buggy address belongs to the physical page: [ 34.380345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8d [ 34.380418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.380489] page_type: f5(slab) [ 34.380530] raw: 0bfffe0000000000 fff00000c45178c0 dead000000000122 0000000000000000 [ 34.380580] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.380662] page dumped because: kasan: bad access detected [ 34.381002] [ 34.381025] Memory state around the buggy address: [ 34.381149] fff00000c9a8d100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.381261] fff00000c9a8d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.381385] >fff00000c9a8d200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.381423] ^ [ 34.381519] fff00000c9a8d280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.381621] fff00000c9a8d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.381950] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 34.252320] ================================================================== [ 34.252397] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.252476] Read of size 1 at addr fff00000c8636873 by task kunit_try_catch/253 [ 34.252527] [ 34.252569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.252681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.252713] Hardware name: linux,dummy-virt (DT) [ 34.252746] Call trace: [ 34.252774] show_stack+0x20/0x38 (C) [ 34.252826] dump_stack_lvl+0x8c/0xd0 [ 34.252876] print_report+0x118/0x5e8 [ 34.252921] kasan_report+0xdc/0x128 [ 34.252964] __asan_report_load1_noabort+0x20/0x30 [ 34.253013] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.253065] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.253113] kunit_try_run_case+0x170/0x3f0 [ 34.253162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.253215] kthread+0x328/0x630 [ 34.253258] ret_from_fork+0x10/0x20 [ 34.253309] [ 34.253329] Allocated by task 253: [ 34.253359] kasan_save_stack+0x3c/0x68 [ 34.253398] kasan_save_track+0x20/0x40 [ 34.253434] kasan_save_alloc_info+0x40/0x58 [ 34.253470] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.253515] remove_element+0x130/0x1f8 [ 34.253553] mempool_alloc_preallocated+0x58/0xc0 [ 34.253594] mempool_oob_right_helper+0x98/0x2f0 [ 34.253634] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.253684] kunit_try_run_case+0x170/0x3f0 [ 34.253721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.253764] kthread+0x328/0x630 [ 34.253795] ret_from_fork+0x10/0x20 [ 34.253831] [ 34.253851] The buggy address belongs to the object at fff00000c8636800 [ 34.253851] which belongs to the cache kmalloc-128 of size 128 [ 34.253909] The buggy address is located 0 bytes to the right of [ 34.253909] allocated 115-byte region [fff00000c8636800, fff00000c8636873) [ 34.253973] [ 34.253996] The buggy address belongs to the physical page: [ 34.254034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108636 [ 34.254093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.254146] page_type: f5(slab) [ 34.254189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.254239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.254280] page dumped because: kasan: bad access detected [ 34.254311] [ 34.254331] Memory state around the buggy address: [ 34.254366] fff00000c8636700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.254410] fff00000c8636780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254456] >fff00000c8636800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.254495] ^ [ 34.254536] fff00000c8636880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254578] fff00000c8636900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.254618] ================================================================== [ 34.269082] ================================================================== [ 34.269147] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.269208] Read of size 1 at addr fff00000c99fe001 by task kunit_try_catch/255 [ 34.269257] [ 34.269291] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.269383] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.269413] Hardware name: linux,dummy-virt (DT) [ 34.269443] Call trace: [ 34.269468] show_stack+0x20/0x38 (C) [ 34.269514] dump_stack_lvl+0x8c/0xd0 [ 34.269987] print_report+0x118/0x5e8 [ 34.270058] kasan_report+0xdc/0x128 [ 34.270101] __asan_report_load1_noabort+0x20/0x30 [ 34.270659] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.270791] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 34.270849] kunit_try_run_case+0x170/0x3f0 [ 34.270899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.271341] kthread+0x328/0x630 [ 34.271401] ret_from_fork+0x10/0x20 [ 34.272073] [ 34.272127] The buggy address belongs to the physical page: [ 34.272560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099fc [ 34.273070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.273525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.274084] page_type: f8(unknown) [ 34.274193] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.274244] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.274787] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.274911] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.274960] head: 0bfffe0000000002 ffffc1ffc3267f01 00000000ffffffff 00000000ffffffff [ 34.275531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.275580] page dumped because: kasan: bad access detected [ 34.275613] [ 34.275632] Memory state around the buggy address: [ 34.276010] fff00000c99fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.276828] fff00000c99fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.277185] >fff00000c99fe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.277467] ^ [ 34.277503] fff00000c99fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.277950] fff00000c99fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.278006] ================================================================== [ 34.297527] ================================================================== [ 34.297938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.298022] Read of size 1 at addr fff00000c9a902bb by task kunit_try_catch/257 [ 34.298073] [ 34.298108] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 34.298202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.298232] Hardware name: linux,dummy-virt (DT) [ 34.298265] Call trace: [ 34.298289] show_stack+0x20/0x38 (C) [ 34.299693] dump_stack_lvl+0x8c/0xd0 [ 34.299771] print_report+0x118/0x5e8 [ 34.300055] kasan_report+0xdc/0x128 [ 34.300116] __asan_report_load1_noabort+0x20/0x30 [ 34.300223] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.300274] mempool_slab_oob_right+0xc0/0x118 [ 34.300323] kunit_try_run_case+0x170/0x3f0 [ 34.300373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.300608] kthread+0x328/0x630 [ 34.300677] ret_from_fork+0x10/0x20 [ 34.300724] [ 34.300746] Allocated by task 257: [ 34.300831] kasan_save_stack+0x3c/0x68 [ 34.300938] kasan_save_track+0x20/0x40 [ 34.301017] kasan_save_alloc_info+0x40/0x58 [ 34.301095] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.301175] remove_element+0x16c/0x1f8 [ 34.301229] mempool_alloc_preallocated+0x58/0xc0 [ 34.301317] mempool_oob_right_helper+0x98/0x2f0 [ 34.301357] mempool_slab_oob_right+0xc0/0x118 [ 34.301397] kunit_try_run_case+0x170/0x3f0 [ 34.301434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.301696] kthread+0x328/0x630 [ 34.301736] ret_from_fork+0x10/0x20 [ 34.301921] [ 34.301946] The buggy address belongs to the object at fff00000c9a90240 [ 34.301946] which belongs to the cache test_cache of size 123 [ 34.302226] The buggy address is located 0 bytes to the right of [ 34.302226] allocated 123-byte region [fff00000c9a90240, fff00000c9a902bb) [ 34.302356] [ 34.302375] The buggy address belongs to the physical page: [ 34.302409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90 [ 34.302465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.302515] page_type: f5(slab) [ 34.302565] raw: 0bfffe0000000000 fff00000c4517780 dead000000000122 0000000000000000 [ 34.302614] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.303055] page dumped because: kasan: bad access detected [ 34.303131] [ 34.303169] Memory state around the buggy address: [ 34.303295] fff00000c9a90180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.303349] fff00000c9a90200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.303397] >fff00000c9a90280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.303459] ^ [ 34.303495] fff00000c9a90300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.303536] fff00000c9a90380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.303574] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 33.690148] ================================================================== [ 33.690226] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 33.690301] Read of size 1 at addr fff00000c45173c0 by task kunit_try_catch/247 [ 33.690351] [ 33.690392] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 33.690484] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.690516] Hardware name: linux,dummy-virt (DT) [ 33.690551] Call trace: [ 33.690578] show_stack+0x20/0x38 (C) [ 33.690630] dump_stack_lvl+0x8c/0xd0 [ 33.690696] print_report+0x118/0x5e8 [ 33.690740] kasan_report+0xdc/0x128 [ 33.690784] __kasan_check_byte+0x54/0x70 [ 33.690828] kmem_cache_destroy+0x34/0x218 [ 33.690878] kmem_cache_double_destroy+0x174/0x300 [ 33.690928] kunit_try_run_case+0x170/0x3f0 [ 33.690993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.691045] kthread+0x328/0x630 [ 33.691088] ret_from_fork+0x10/0x20 [ 33.691150] [ 33.691170] Allocated by task 247: [ 33.691200] kasan_save_stack+0x3c/0x68 [ 33.691241] kasan_save_track+0x20/0x40 [ 33.691277] kasan_save_alloc_info+0x40/0x58 [ 33.691314] __kasan_slab_alloc+0xa8/0xb0 [ 33.691350] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.691391] __kmem_cache_create_args+0x178/0x280 [ 33.691432] kmem_cache_double_destroy+0xc0/0x300 [ 33.691473] kunit_try_run_case+0x170/0x3f0 [ 33.691510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.691553] kthread+0x328/0x630 [ 33.691585] ret_from_fork+0x10/0x20 [ 33.691621] [ 33.691653] Freed by task 247: [ 33.691680] kasan_save_stack+0x3c/0x68 [ 33.691716] kasan_save_track+0x20/0x40 [ 33.691749] kasan_save_free_info+0x4c/0x78 [ 33.691791] __kasan_slab_free+0x7c/0xa8 [ 33.691825] kmem_cache_free+0x260/0x468 [ 33.691864] slab_kmem_cache_release+0x38/0x50 [ 33.691902] kmem_cache_release+0x1c/0x30 [ 33.691940] kobject_put+0x17c/0x420 [ 33.691978] sysfs_slab_release+0x1c/0x30 [ 33.692014] kmem_cache_destroy+0x118/0x218 [ 33.692053] kmem_cache_double_destroy+0x128/0x300 [ 33.692092] kunit_try_run_case+0x170/0x3f0 [ 33.692129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.692172] kthread+0x328/0x630 [ 33.692203] ret_from_fork+0x10/0x20 [ 33.692239] [ 33.692261] The buggy address belongs to the object at fff00000c45173c0 [ 33.692261] which belongs to the cache kmem_cache of size 208 [ 33.692317] The buggy address is located 0 bytes inside of [ 33.692317] freed 208-byte region [fff00000c45173c0, fff00000c4517490) [ 33.692377] [ 33.692400] The buggy address belongs to the physical page: [ 33.692443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104517 [ 33.692502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.692553] page_type: f5(slab) [ 33.692595] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 33.692659] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 33.692705] page dumped because: kasan: bad access detected [ 33.692737] [ 33.692757] Memory state around the buggy address: [ 33.692793] fff00000c4517280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.692837] fff00000c4517300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 33.692881] >fff00000c4517380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.692921] ^ [ 33.692955] fff00000c4517400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.692998] fff00000c4517480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.693037] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 33.631318] ================================================================== [ 33.631411] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 33.631493] Read of size 1 at addr fff00000c9adc000 by task kunit_try_catch/245 [ 33.631546] [ 33.631588] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 33.631704] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.631736] Hardware name: linux,dummy-virt (DT) [ 33.631769] Call trace: [ 33.631797] show_stack+0x20/0x38 (C) [ 33.631849] dump_stack_lvl+0x8c/0xd0 [ 33.631901] print_report+0x118/0x5e8 [ 33.631947] kasan_report+0xdc/0x128 [ 33.631992] __asan_report_load1_noabort+0x20/0x30 [ 33.632041] kmem_cache_rcu_uaf+0x388/0x468 [ 33.632088] kunit_try_run_case+0x170/0x3f0 [ 33.632138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.632191] kthread+0x328/0x630 [ 33.632236] ret_from_fork+0x10/0x20 [ 33.632284] [ 33.632303] Allocated by task 245: [ 33.632334] kasan_save_stack+0x3c/0x68 [ 33.632375] kasan_save_track+0x20/0x40 [ 33.632409] kasan_save_alloc_info+0x40/0x58 [ 33.632447] __kasan_slab_alloc+0xa8/0xb0 [ 33.632481] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.632523] kmem_cache_rcu_uaf+0x12c/0x468 [ 33.632562] kunit_try_run_case+0x170/0x3f0 [ 33.632599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.632652] kthread+0x328/0x630 [ 33.632689] ret_from_fork+0x10/0x20 [ 33.632725] [ 33.632745] Freed by task 0: [ 33.632772] kasan_save_stack+0x3c/0x68 [ 33.632807] kasan_save_track+0x20/0x40 [ 33.632842] kasan_save_free_info+0x4c/0x78 [ 33.632879] __kasan_slab_free+0x7c/0xa8 [ 33.632914] slab_free_after_rcu_debug+0xd4/0x2f8 [ 33.632954] rcu_core+0x9f4/0x1e58 [ 33.632993] rcu_core_si+0x18/0x30 [ 33.633027] handle_softirqs+0x374/0xb28 [ 33.633065] __do_softirq+0x1c/0x28 [ 33.633100] [ 33.633118] Last potentially related work creation: [ 33.633146] kasan_save_stack+0x3c/0x68 [ 33.633182] kasan_record_aux_stack+0xb4/0xc8 [ 33.633221] kmem_cache_free+0x120/0x468 [ 33.633259] kmem_cache_rcu_uaf+0x16c/0x468 [ 33.633301] kunit_try_run_case+0x170/0x3f0 [ 33.633339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.633381] kthread+0x328/0x630 [ 33.633412] ret_from_fork+0x10/0x20 [ 33.633448] [ 33.633469] The buggy address belongs to the object at fff00000c9adc000 [ 33.633469] which belongs to the cache test_cache of size 200 [ 33.633525] The buggy address is located 0 bytes inside of [ 33.633525] freed 200-byte region [fff00000c9adc000, fff00000c9adc0c8) [ 33.633584] [ 33.633607] The buggy address belongs to the physical page: [ 33.633657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adc [ 33.633713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.633765] page_type: f5(slab) [ 33.633805] raw: 0bfffe0000000000 fff00000c56bcb40 dead000000000122 0000000000000000 [ 33.633856] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.633896] page dumped because: kasan: bad access detected [ 33.633928] [ 33.633945] Memory state around the buggy address: [ 33.633980] fff00000c9adbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.634024] fff00000c9adbf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.634068] >fff00000c9adc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.634107] ^ [ 33.634135] fff00000c9adc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.634177] fff00000c9adc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.634216] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.382448] ================================================================== [ 33.382522] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 33.382597] Free of addr fff00000c9ade001 by task kunit_try_catch/243 [ 33.386688] [ 33.386755] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 33.386851] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.386882] Hardware name: linux,dummy-virt (DT) [ 33.386915] Call trace: [ 33.387071] show_stack+0x20/0x38 (C) [ 33.387251] dump_stack_lvl+0x8c/0xd0 [ 33.387338] print_report+0x118/0x5e8 [ 33.387394] kasan_report_invalid_free+0xc0/0xe8 [ 33.387470] check_slab_allocation+0xfc/0x108 [ 33.387525] __kasan_slab_pre_free+0x2c/0x48 [ 33.387571] kmem_cache_free+0xf0/0x468 [ 33.387741] kmem_cache_invalid_free+0x184/0x3c8 [ 33.387827] kunit_try_run_case+0x170/0x3f0 [ 33.389702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.389759] kthread+0x328/0x630 [ 33.389804] ret_from_fork+0x10/0x20 [ 33.389854] [ 33.389873] Allocated by task 243: [ 33.389906] kasan_save_stack+0x3c/0x68 [ 33.389946] kasan_save_track+0x20/0x40 [ 33.389983] kasan_save_alloc_info+0x40/0x58 [ 33.390022] __kasan_slab_alloc+0xa8/0xb0 [ 33.390055] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.390096] kmem_cache_invalid_free+0x12c/0x3c8 [ 33.390134] kunit_try_run_case+0x170/0x3f0 [ 33.390171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.390212] kthread+0x328/0x630 [ 33.390245] ret_from_fork+0x10/0x20 [ 33.390278] [ 33.390298] The buggy address belongs to the object at fff00000c9ade000 [ 33.390298] which belongs to the cache test_cache of size 200 [ 33.390355] The buggy address is located 1 bytes inside of [ 33.390355] 200-byte region [fff00000c9ade000, fff00000c9ade0c8) [ 33.390414] [ 33.390435] The buggy address belongs to the physical page: [ 33.390474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ade [ 33.390529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.390580] page_type: f5(slab) [ 33.390621] raw: 0bfffe0000000000 fff00000c56bca00 dead000000000122 0000000000000000 [ 33.390680] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.390741] page dumped because: kasan: bad access detected [ 33.390773] [ 33.390813] Memory state around the buggy address: [ 33.390849] fff00000c9addf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.390923] fff00000c9addf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.391233] >fff00000c9ade000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.391347] ^ [ 33.391385] fff00000c9ade080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.391430] fff00000c9ade100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.391499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.266105] ================================================================== [ 33.266182] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.266604] Free of addr fff00000c9adf000 by task kunit_try_catch/241 [ 33.266660] [ 33.266986] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 33.267529] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.267719] Hardware name: linux,dummy-virt (DT) [ 33.268094] Call trace: [ 33.268212] show_stack+0x20/0x38 (C) [ 33.268274] dump_stack_lvl+0x8c/0xd0 [ 33.268434] print_report+0x118/0x5e8 [ 33.268635] kasan_report_invalid_free+0xc0/0xe8 [ 33.268747] check_slab_allocation+0xd4/0x108 [ 33.268993] __kasan_slab_pre_free+0x2c/0x48 [ 33.269202] kmem_cache_free+0xf0/0x468 [ 33.269331] kmem_cache_double_free+0x190/0x3c8 [ 33.269695] kunit_try_run_case+0x170/0x3f0 [ 33.270052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.270355] kthread+0x328/0x630 [ 33.270653] ret_from_fork+0x10/0x20 [ 33.270717] [ 33.270738] Allocated by task 241: [ 33.270768] kasan_save_stack+0x3c/0x68 [ 33.270809] kasan_save_track+0x20/0x40 [ 33.270843] kasan_save_alloc_info+0x40/0x58 [ 33.270881] __kasan_slab_alloc+0xa8/0xb0 [ 33.271056] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.271116] kmem_cache_double_free+0x12c/0x3c8 [ 33.271420] kunit_try_run_case+0x170/0x3f0 [ 33.271460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.271575] kthread+0x328/0x630 [ 33.271717] ret_from_fork+0x10/0x20 [ 33.271756] [ 33.271866] Freed by task 241: [ 33.272047] kasan_save_stack+0x3c/0x68 [ 33.272390] kasan_save_track+0x20/0x40 [ 33.272696] kasan_save_free_info+0x4c/0x78 [ 33.272737] __kasan_slab_free+0x7c/0xa8 [ 33.272773] kmem_cache_free+0x260/0x468 [ 33.272809] kmem_cache_double_free+0x140/0x3c8 [ 33.272849] kunit_try_run_case+0x170/0x3f0 [ 33.272886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.273388] kthread+0x328/0x630 [ 33.273433] ret_from_fork+0x10/0x20 [ 33.273471] [ 33.273491] The buggy address belongs to the object at fff00000c9adf000 [ 33.273491] which belongs to the cache test_cache of size 200 [ 33.273945] The buggy address is located 0 bytes inside of [ 33.273945] 200-byte region [fff00000c9adf000, fff00000c9adf0c8) [ 33.274259] [ 33.274287] The buggy address belongs to the physical page: [ 33.274330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 33.274811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.274874] page_type: f5(slab) [ 33.275287] raw: 0bfffe0000000000 fff00000c56bc8c0 dead000000000122 0000000000000000 [ 33.275373] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.275945] page dumped because: kasan: bad access detected [ 33.276016] [ 33.276112] Memory state around the buggy address: [ 33.276172] fff00000c9adef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.276383] fff00000c9adef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.276432] >fff00000c9adf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.276470] ^ [ 33.276500] fff00000c9adf080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.276552] fff00000c9adf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.276846] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 32.961666] ================================================================== [ 32.961729] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 32.961793] Read of size 1 at addr fff00000c9ae10c8 by task kunit_try_catch/239 [ 32.962909] [ 32.962985] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.963198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.963231] Hardware name: linux,dummy-virt (DT) [ 32.963663] Call trace: [ 32.963698] show_stack+0x20/0x38 (C) [ 32.963906] dump_stack_lvl+0x8c/0xd0 [ 32.964037] print_report+0x118/0x5e8 [ 32.964162] kasan_report+0xdc/0x128 [ 32.964293] __asan_report_load1_noabort+0x20/0x30 [ 32.964357] kmem_cache_oob+0x344/0x430 [ 32.964427] kunit_try_run_case+0x170/0x3f0 [ 32.964819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.964952] kthread+0x328/0x630 [ 32.965136] ret_from_fork+0x10/0x20 [ 32.965244] [ 32.965599] Allocated by task 239: [ 32.965708] kasan_save_stack+0x3c/0x68 [ 32.966068] kasan_save_track+0x20/0x40 [ 32.966227] kasan_save_alloc_info+0x40/0x58 [ 32.966334] __kasan_slab_alloc+0xa8/0xb0 [ 32.966514] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.966788] kmem_cache_oob+0x12c/0x430 [ 32.967010] kunit_try_run_case+0x170/0x3f0 [ 32.967171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.967290] kthread+0x328/0x630 [ 32.967542] ret_from_fork+0x10/0x20 [ 32.967826] [ 32.967895] The buggy address belongs to the object at fff00000c9ae1000 [ 32.967895] which belongs to the cache test_cache of size 200 [ 32.968021] The buggy address is located 0 bytes to the right of [ 32.968021] allocated 200-byte region [fff00000c9ae1000, fff00000c9ae10c8) [ 32.968148] [ 32.968303] The buggy address belongs to the physical page: [ 32.968559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae1 [ 32.968743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.969106] page_type: f5(slab) [ 32.969260] raw: 0bfffe0000000000 fff00000c56bc780 dead000000000122 0000000000000000 [ 32.969584] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.969778] page dumped because: kasan: bad access detected [ 32.970056] [ 32.970135] Memory state around the buggy address: [ 32.970455] fff00000c9ae0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.970716] fff00000c9ae1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.970796] >fff00000c9ae1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.970930] ^ [ 32.971126] fff00000c9ae1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.971343] fff00000c9ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.971427] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.915256] ================================================================== [ 32.915328] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 32.916242] Read of size 8 at addr fff00000c9b21780 by task kunit_try_catch/232 [ 32.916410] [ 32.916445] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.916536] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.916564] Hardware name: linux,dummy-virt (DT) [ 32.916594] Call trace: [ 32.916618] show_stack+0x20/0x38 (C) [ 32.916681] dump_stack_lvl+0x8c/0xd0 [ 32.916726] print_report+0x118/0x5e8 [ 32.916771] kasan_report+0xdc/0x128 [ 32.916813] __asan_report_load8_noabort+0x20/0x30 [ 32.916861] workqueue_uaf+0x480/0x4a8 [ 32.916907] kunit_try_run_case+0x170/0x3f0 [ 32.916954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.917005] kthread+0x328/0x630 [ 32.917047] ret_from_fork+0x10/0x20 [ 32.917094] [ 32.917113] Allocated by task 232: [ 32.917142] kasan_save_stack+0x3c/0x68 [ 32.917192] kasan_save_track+0x20/0x40 [ 32.917229] kasan_save_alloc_info+0x40/0x58 [ 32.917268] __kasan_kmalloc+0xd4/0xd8 [ 32.917624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.917874] workqueue_uaf+0x13c/0x4a8 [ 32.917921] kunit_try_run_case+0x170/0x3f0 [ 32.918052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.918103] kthread+0x328/0x630 [ 32.918259] ret_from_fork+0x10/0x20 [ 32.918318] [ 32.918344] Freed by task 47: [ 32.918471] kasan_save_stack+0x3c/0x68 [ 32.918508] kasan_save_track+0x20/0x40 [ 32.918583] kasan_save_free_info+0x4c/0x78 [ 32.918622] __kasan_slab_free+0x7c/0xa8 [ 32.918665] kfree+0x214/0x3c8 [ 32.918705] workqueue_uaf_work+0x18/0x30 [ 32.918879] process_one_work+0x530/0xf88 [ 32.918932] worker_thread+0x618/0xf38 [ 32.919451] kthread+0x328/0x630 [ 32.919687] ret_from_fork+0x10/0x20 [ 32.919728] [ 32.920309] Last potentially related work creation: [ 32.920345] kasan_save_stack+0x3c/0x68 [ 32.920996] kasan_record_aux_stack+0xb4/0xc8 [ 32.921227] __queue_work+0x65c/0xfe0 [ 32.921270] queue_work_on+0xbc/0xf8 [ 32.921513] workqueue_uaf+0x210/0x4a8 [ 32.921625] kunit_try_run_case+0x170/0x3f0 [ 32.922252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.922438] kthread+0x328/0x630 [ 32.922712] ret_from_fork+0x10/0x20 [ 32.923019] [ 32.923158] The buggy address belongs to the object at fff00000c9b21780 [ 32.923158] which belongs to the cache kmalloc-32 of size 32 [ 32.923658] The buggy address is located 0 bytes inside of [ 32.923658] freed 32-byte region [fff00000c9b21780, fff00000c9b217a0) [ 32.923761] [ 32.924147] The buggy address belongs to the physical page: [ 32.924684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b21 [ 32.925248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.925464] page_type: f5(slab) [ 32.926059] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.926461] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.926507] page dumped because: kasan: bad access detected [ 32.926540] [ 32.926558] Memory state around the buggy address: [ 32.927669] fff00000c9b21680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.928654] fff00000c9b21700: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 32.928825] >fff00000c9b21780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.928986] ^ [ 32.929135] fff00000c9b21800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.929348] fff00000c9b21880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.929438] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.887476] ================================================================== [ 32.887612] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.887703] Read of size 4 at addr fff00000c9b21540 by task swapper/1/0 [ 32.887766] [ 32.887808] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.887901] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.887940] Hardware name: linux,dummy-virt (DT) [ 32.887971] Call trace: [ 32.887996] show_stack+0x20/0x38 (C) [ 32.888046] dump_stack_lvl+0x8c/0xd0 [ 32.888094] print_report+0x118/0x5e8 [ 32.888137] kasan_report+0xdc/0x128 [ 32.888180] __asan_report_load4_noabort+0x20/0x30 [ 32.888227] rcu_uaf_reclaim+0x64/0x70 [ 32.888272] rcu_core+0x9f4/0x1e58 [ 32.888317] rcu_core_si+0x18/0x30 [ 32.888361] handle_softirqs+0x374/0xb28 [ 32.888407] __do_softirq+0x1c/0x28 [ 32.888449] ____do_softirq+0x18/0x30 [ 32.888502] call_on_irq_stack+0x30/0x48 [ 32.888547] do_softirq_own_stack+0x24/0x38 [ 32.888593] __irq_exit_rcu+0x1fc/0x318 [ 32.888678] irq_exit_rcu+0x1c/0x80 [ 32.888918] el1_interrupt+0x38/0x58 [ 32.889424] el1h_64_irq_handler+0x18/0x28 [ 32.889690] el1h_64_irq+0x6c/0x70 [ 32.889860] arch_local_irq_enable+0x4/0x8 (P) [ 32.889920] do_idle+0x384/0x4e8 [ 32.890110] cpu_startup_entry+0x64/0x80 [ 32.890222] secondary_start_kernel+0x28c/0x340 [ 32.890277] __secondary_switched+0xc0/0xc8 [ 32.890331] [ 32.890466] Allocated by task 230: [ 32.890507] kasan_save_stack+0x3c/0x68 [ 32.890551] kasan_save_track+0x20/0x40 [ 32.890587] kasan_save_alloc_info+0x40/0x58 [ 32.890624] __kasan_kmalloc+0xd4/0xd8 [ 32.890681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.890724] rcu_uaf+0xb0/0x2d8 [ 32.890758] kunit_try_run_case+0x170/0x3f0 [ 32.891209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.891269] kthread+0x328/0x630 [ 32.891305] ret_from_fork+0x10/0x20 [ 32.891341] [ 32.891361] Freed by task 0: [ 32.891591] kasan_save_stack+0x3c/0x68 [ 32.891766] kasan_save_track+0x20/0x40 [ 32.891807] kasan_save_free_info+0x4c/0x78 [ 32.891892] __kasan_slab_free+0x7c/0xa8 [ 32.891932] kfree+0x214/0x3c8 [ 32.891968] rcu_uaf_reclaim+0x28/0x70 [ 32.892012] rcu_core+0x9f4/0x1e58 [ 32.892049] rcu_core_si+0x18/0x30 [ 32.892085] handle_softirqs+0x374/0xb28 [ 32.892271] __do_softirq+0x1c/0x28 [ 32.892446] [ 32.892479] Last potentially related work creation: [ 32.892515] kasan_save_stack+0x3c/0x68 [ 32.892555] kasan_record_aux_stack+0xb4/0xc8 [ 32.892965] __call_rcu_common.constprop.0+0x74/0x8c8 [ 32.893070] call_rcu+0x18/0x30 [ 32.893114] rcu_uaf+0x14c/0x2d8 [ 32.893149] kunit_try_run_case+0x170/0x3f0 [ 32.893312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.893456] kthread+0x328/0x630 [ 32.893491] ret_from_fork+0x10/0x20 [ 32.893633] [ 32.893718] The buggy address belongs to the object at fff00000c9b21540 [ 32.893718] which belongs to the cache kmalloc-32 of size 32 [ 32.893838] The buggy address is located 0 bytes inside of [ 32.893838] freed 32-byte region [fff00000c9b21540, fff00000c9b21560) [ 32.893901] [ 32.893923] The buggy address belongs to the physical page: [ 32.893962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b21 [ 32.894068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.894191] page_type: f5(slab) [ 32.894297] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.894382] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.894454] page dumped because: kasan: bad access detected [ 32.894485] [ 32.894503] Memory state around the buggy address: [ 32.894634] fff00000c9b21400: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.895319] fff00000c9b21480: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 32.895370] >fff00000c9b21500: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.895470] ^ [ 32.895509] fff00000c9b21580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.895861] fff00000c9b21600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.895929] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.655909] ================================================================== [ 32.656189] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.656261] Read of size 1 at addr fff00000c9726a00 by task kunit_try_catch/228 [ 32.656312] [ 32.656626] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.657009] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.657061] Hardware name: linux,dummy-virt (DT) [ 32.657204] Call trace: [ 32.657236] show_stack+0x20/0x38 (C) [ 32.657289] dump_stack_lvl+0x8c/0xd0 [ 32.657334] print_report+0x118/0x5e8 [ 32.657627] kasan_report+0xdc/0x128 [ 32.657690] __asan_report_load1_noabort+0x20/0x30 [ 32.657935] ksize_uaf+0x598/0x5f8 [ 32.658041] kunit_try_run_case+0x170/0x3f0 [ 32.658115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.658166] kthread+0x328/0x630 [ 32.658420] ret_from_fork+0x10/0x20 [ 32.658505] [ 32.658692] Allocated by task 228: [ 32.658742] kasan_save_stack+0x3c/0x68 [ 32.658787] kasan_save_track+0x20/0x40 [ 32.658834] kasan_save_alloc_info+0x40/0x58 [ 32.658912] __kasan_kmalloc+0xd4/0xd8 [ 32.658959] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.659143] ksize_uaf+0xb8/0x5f8 [ 32.659364] kunit_try_run_case+0x170/0x3f0 [ 32.659460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.659600] kthread+0x328/0x630 [ 32.659679] ret_from_fork+0x10/0x20 [ 32.659826] [ 32.659877] Freed by task 228: [ 32.659905] kasan_save_stack+0x3c/0x68 [ 32.659949] kasan_save_track+0x20/0x40 [ 32.659985] kasan_save_free_info+0x4c/0x78 [ 32.660384] __kasan_slab_free+0x7c/0xa8 [ 32.660500] kfree+0x214/0x3c8 [ 32.660571] ksize_uaf+0x11c/0x5f8 [ 32.660724] kunit_try_run_case+0x170/0x3f0 [ 32.660819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.661189] kthread+0x328/0x630 [ 32.661277] ret_from_fork+0x10/0x20 [ 32.661466] [ 32.661569] The buggy address belongs to the object at fff00000c9726a00 [ 32.661569] which belongs to the cache kmalloc-128 of size 128 [ 32.661742] The buggy address is located 0 bytes inside of [ 32.661742] freed 128-byte region [fff00000c9726a00, fff00000c9726a80) [ 32.661812] [ 32.661844] The buggy address belongs to the physical page: [ 32.661909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.661968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.662024] page_type: f5(slab) [ 32.662072] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.662130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.662169] page dumped because: kasan: bad access detected [ 32.662200] [ 32.662222] Memory state around the buggy address: [ 32.662265] fff00000c9726900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.662309] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.662353] >fff00000c9726a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.662402] ^ [ 32.662429] fff00000c9726a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.662471] fff00000c9726b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.662509] ================================================================== [ 32.664140] ================================================================== [ 32.664243] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.664372] Read of size 1 at addr fff00000c9726a78 by task kunit_try_catch/228 [ 32.664424] [ 32.664455] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.664976] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.665021] Hardware name: linux,dummy-virt (DT) [ 32.665070] Call trace: [ 32.665095] show_stack+0x20/0x38 (C) [ 32.665232] dump_stack_lvl+0x8c/0xd0 [ 32.665284] print_report+0x118/0x5e8 [ 32.665328] kasan_report+0xdc/0x128 [ 32.665371] __asan_report_load1_noabort+0x20/0x30 [ 32.665567] ksize_uaf+0x544/0x5f8 [ 32.665612] kunit_try_run_case+0x170/0x3f0 [ 32.665673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.665726] kthread+0x328/0x630 [ 32.665965] ret_from_fork+0x10/0x20 [ 32.666112] [ 32.666150] Allocated by task 228: [ 32.666253] kasan_save_stack+0x3c/0x68 [ 32.666297] kasan_save_track+0x20/0x40 [ 32.666331] kasan_save_alloc_info+0x40/0x58 [ 32.666368] __kasan_kmalloc+0xd4/0xd8 [ 32.666403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.666735] ksize_uaf+0xb8/0x5f8 [ 32.666817] kunit_try_run_case+0x170/0x3f0 [ 32.667012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.667059] kthread+0x328/0x630 [ 32.667105] ret_from_fork+0x10/0x20 [ 32.667152] [ 32.667172] Freed by task 228: [ 32.667201] kasan_save_stack+0x3c/0x68 [ 32.667236] kasan_save_track+0x20/0x40 [ 32.667272] kasan_save_free_info+0x4c/0x78 [ 32.667884] __kasan_slab_free+0x7c/0xa8 [ 32.667958] kfree+0x214/0x3c8 [ 32.668131] ksize_uaf+0x11c/0x5f8 [ 32.668215] kunit_try_run_case+0x170/0x3f0 [ 32.668709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.668856] kthread+0x328/0x630 [ 32.668934] ret_from_fork+0x10/0x20 [ 32.669171] [ 32.669319] The buggy address belongs to the object at fff00000c9726a00 [ 32.669319] which belongs to the cache kmalloc-128 of size 128 [ 32.669534] The buggy address is located 120 bytes inside of [ 32.669534] freed 128-byte region [fff00000c9726a00, fff00000c9726a80) [ 32.669722] [ 32.669801] The buggy address belongs to the physical page: [ 32.669956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.670050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.670324] page_type: f5(slab) [ 32.670521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.670654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.670748] page dumped because: kasan: bad access detected [ 32.670946] [ 32.671040] Memory state around the buggy address: [ 32.671192] fff00000c9726900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.671264] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671400] >fff00000c9726a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.671496] ^ [ 32.671567] fff00000c9726a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671608] fff00000c9726b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671845] ================================================================== [ 32.643149] ================================================================== [ 32.643271] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 32.643444] Read of size 1 at addr fff00000c9726a00 by task kunit_try_catch/228 [ 32.643707] [ 32.643877] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.644094] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.644311] Hardware name: linux,dummy-virt (DT) [ 32.644468] Call trace: [ 32.644536] show_stack+0x20/0x38 (C) [ 32.644618] dump_stack_lvl+0x8c/0xd0 [ 32.645062] print_report+0x118/0x5e8 [ 32.645195] kasan_report+0xdc/0x128 [ 32.645294] __kasan_check_byte+0x54/0x70 [ 32.645425] ksize+0x30/0x88 [ 32.645502] ksize_uaf+0x168/0x5f8 [ 32.645587] kunit_try_run_case+0x170/0x3f0 [ 32.646111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.646456] kthread+0x328/0x630 [ 32.646532] ret_from_fork+0x10/0x20 [ 32.646581] [ 32.646601] Allocated by task 228: [ 32.646650] kasan_save_stack+0x3c/0x68 [ 32.646698] kasan_save_track+0x20/0x40 [ 32.646735] kasan_save_alloc_info+0x40/0x58 [ 32.646772] __kasan_kmalloc+0xd4/0xd8 [ 32.646808] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.646857] ksize_uaf+0xb8/0x5f8 [ 32.646891] kunit_try_run_case+0x170/0x3f0 [ 32.646937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.647016] kthread+0x328/0x630 [ 32.647100] ret_from_fork+0x10/0x20 [ 32.647169] [ 32.647230] Freed by task 228: [ 32.647282] kasan_save_stack+0x3c/0x68 [ 32.647338] kasan_save_track+0x20/0x40 [ 32.647405] kasan_save_free_info+0x4c/0x78 [ 32.647471] __kasan_slab_free+0x7c/0xa8 [ 32.647678] kfree+0x214/0x3c8 [ 32.647940] ksize_uaf+0x11c/0x5f8 [ 32.648265] kunit_try_run_case+0x170/0x3f0 [ 32.648330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.648628] kthread+0x328/0x630 [ 32.648939] ret_from_fork+0x10/0x20 [ 32.649017] [ 32.649061] The buggy address belongs to the object at fff00000c9726a00 [ 32.649061] which belongs to the cache kmalloc-128 of size 128 [ 32.649147] The buggy address is located 0 bytes inside of [ 32.649147] freed 128-byte region [fff00000c9726a00, fff00000c9726a80) [ 32.649284] [ 32.649364] The buggy address belongs to the physical page: [ 32.649514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.649588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.649925] page_type: f5(slab) [ 32.650118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.650176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.650432] page dumped because: kasan: bad access detected [ 32.650582] [ 32.650648] Memory state around the buggy address: [ 32.650791] fff00000c9726900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.651019] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.651405] >fff00000c9726a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.651632] ^ [ 32.651856] fff00000c9726a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.651971] fff00000c9726b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.652117] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 32.606008] ================================================================== [ 32.606096] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 32.606192] Read of size 1 at addr fff00000c9726973 by task kunit_try_catch/226 [ 32.606265] [ 32.606297] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.606445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.606489] Hardware name: linux,dummy-virt (DT) [ 32.606520] Call trace: [ 32.606543] show_stack+0x20/0x38 (C) [ 32.606593] dump_stack_lvl+0x8c/0xd0 [ 32.606659] print_report+0x118/0x5e8 [ 32.606705] kasan_report+0xdc/0x128 [ 32.606755] __asan_report_load1_noabort+0x20/0x30 [ 32.606804] ksize_unpoisons_memory+0x628/0x740 [ 32.606860] kunit_try_run_case+0x170/0x3f0 [ 32.606906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.607494] kthread+0x328/0x630 [ 32.607559] ret_from_fork+0x10/0x20 [ 32.607609] [ 32.607831] Allocated by task 226: [ 32.607987] kasan_save_stack+0x3c/0x68 [ 32.608208] kasan_save_track+0x20/0x40 [ 32.608295] kasan_save_alloc_info+0x40/0x58 [ 32.608469] __kasan_kmalloc+0xd4/0xd8 [ 32.608621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.608718] ksize_unpoisons_memory+0xc0/0x740 [ 32.608766] kunit_try_run_case+0x170/0x3f0 [ 32.609107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.609367] kthread+0x328/0x630 [ 32.609617] ret_from_fork+0x10/0x20 [ 32.609770] [ 32.610082] The buggy address belongs to the object at fff00000c9726900 [ 32.610082] which belongs to the cache kmalloc-128 of size 128 [ 32.610183] The buggy address is located 0 bytes to the right of [ 32.610183] allocated 115-byte region [fff00000c9726900, fff00000c9726973) [ 32.610486] [ 32.610633] The buggy address belongs to the physical page: [ 32.610896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.611019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.611161] page_type: f5(slab) [ 32.611230] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.611279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.611663] page dumped because: kasan: bad access detected [ 32.611796] [ 32.611857] Memory state around the buggy address: [ 32.611957] fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.612090] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.612168] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.612302] ^ [ 32.612345] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.612439] fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.612527] ================================================================== [ 32.618122] ================================================================== [ 32.618457] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 32.618527] Read of size 1 at addr fff00000c9726978 by task kunit_try_catch/226 [ 32.618585] [ 32.618891] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.619216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.619511] Hardware name: linux,dummy-virt (DT) [ 32.619847] Call trace: [ 32.620114] show_stack+0x20/0x38 (C) [ 32.620343] dump_stack_lvl+0x8c/0xd0 [ 32.620465] print_report+0x118/0x5e8 [ 32.620592] kasan_report+0xdc/0x128 [ 32.620770] __asan_report_load1_noabort+0x20/0x30 [ 32.620908] ksize_unpoisons_memory+0x618/0x740 [ 32.621047] kunit_try_run_case+0x170/0x3f0 [ 32.621123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.621196] kthread+0x328/0x630 [ 32.621479] ret_from_fork+0x10/0x20 [ 32.621850] [ 32.621876] Allocated by task 226: [ 32.621915] kasan_save_stack+0x3c/0x68 [ 32.622161] kasan_save_track+0x20/0x40 [ 32.622324] kasan_save_alloc_info+0x40/0x58 [ 32.622417] __kasan_kmalloc+0xd4/0xd8 [ 32.622453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.622497] ksize_unpoisons_memory+0xc0/0x740 [ 32.622539] kunit_try_run_case+0x170/0x3f0 [ 32.622583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.622633] kthread+0x328/0x630 [ 32.622678] ret_from_fork+0x10/0x20 [ 32.622715] [ 32.622742] The buggy address belongs to the object at fff00000c9726900 [ 32.622742] which belongs to the cache kmalloc-128 of size 128 [ 32.622812] The buggy address is located 5 bytes to the right of [ 32.622812] allocated 115-byte region [fff00000c9726900, fff00000c9726973) [ 32.622875] [ 32.622905] The buggy address belongs to the physical page: [ 32.623568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.623631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.623691] page_type: f5(slab) [ 32.623731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.623971] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.624195] page dumped because: kasan: bad access detected [ 32.624632] [ 32.624719] Memory state around the buggy address: [ 32.624806] fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.624871] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625358] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.625484] ^ [ 32.625634] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625881] fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625986] ================================================================== [ 32.628291] ================================================================== [ 32.628544] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 32.628652] Read of size 1 at addr fff00000c972697f by task kunit_try_catch/226 [ 32.629060] [ 32.629112] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.629202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.629289] Hardware name: linux,dummy-virt (DT) [ 32.629324] Call trace: [ 32.629345] show_stack+0x20/0x38 (C) [ 32.629424] dump_stack_lvl+0x8c/0xd0 [ 32.629651] print_report+0x118/0x5e8 [ 32.629704] kasan_report+0xdc/0x128 [ 32.629869] __asan_report_load1_noabort+0x20/0x30 [ 32.629930] ksize_unpoisons_memory+0x690/0x740 [ 32.630110] kunit_try_run_case+0x170/0x3f0 [ 32.630174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.630237] kthread+0x328/0x630 [ 32.630414] ret_from_fork+0x10/0x20 [ 32.630659] [ 32.630775] Allocated by task 226: [ 32.630841] kasan_save_stack+0x3c/0x68 [ 32.630904] kasan_save_track+0x20/0x40 [ 32.631023] kasan_save_alloc_info+0x40/0x58 [ 32.631175] __kasan_kmalloc+0xd4/0xd8 [ 32.631215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.631278] ksize_unpoisons_memory+0xc0/0x740 [ 32.631553] kunit_try_run_case+0x170/0x3f0 [ 32.631615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631757] kthread+0x328/0x630 [ 32.631854] ret_from_fork+0x10/0x20 [ 32.631976] [ 32.632040] The buggy address belongs to the object at fff00000c9726900 [ 32.632040] which belongs to the cache kmalloc-128 of size 128 [ 32.632247] The buggy address is located 12 bytes to the right of [ 32.632247] allocated 115-byte region [fff00000c9726900, fff00000c9726973) [ 32.632528] [ 32.632555] The buggy address belongs to the physical page: [ 32.632589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.632675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.632724] page_type: f5(slab) [ 32.632768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.632819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.632880] page dumped because: kasan: bad access detected [ 32.632923] [ 32.632950] Memory state around the buggy address: [ 32.632984] fff00000c9726800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.633037] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.633101] >fff00000c9726900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.633137] ^ [ 32.633185] fff00000c9726980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.633227] fff00000c9726a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.633275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 32.585786] ================================================================== [ 32.585858] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 32.585920] Free of addr fff00000c85ecee0 by task kunit_try_catch/224 [ 32.585964] [ 32.585997] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.586084] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.586133] Hardware name: linux,dummy-virt (DT) [ 32.586165] Call trace: [ 32.586188] show_stack+0x20/0x38 (C) [ 32.586237] dump_stack_lvl+0x8c/0xd0 [ 32.586281] print_report+0x118/0x5e8 [ 32.586326] kasan_report_invalid_free+0xc0/0xe8 [ 32.586373] check_slab_allocation+0xd4/0x108 [ 32.586419] __kasan_slab_pre_free+0x2c/0x48 [ 32.586470] kfree+0xe8/0x3c8 [ 32.586513] kfree_sensitive+0x3c/0xb0 [ 32.586559] kmalloc_double_kzfree+0x168/0x308 [ 32.586607] kunit_try_run_case+0x170/0x3f0 [ 32.586665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.586717] kthread+0x328/0x630 [ 32.586758] ret_from_fork+0x10/0x20 [ 32.586806] [ 32.586824] Allocated by task 224: [ 32.586851] kasan_save_stack+0x3c/0x68 [ 32.586889] kasan_save_track+0x20/0x40 [ 32.586923] kasan_save_alloc_info+0x40/0x58 [ 32.588311] __kasan_kmalloc+0xd4/0xd8 [ 32.588504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.589001] kmalloc_double_kzfree+0xb8/0x308 [ 32.589100] kunit_try_run_case+0x170/0x3f0 [ 32.589276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.589671] kthread+0x328/0x630 [ 32.590176] ret_from_fork+0x10/0x20 [ 32.590295] [ 32.590368] Freed by task 224: [ 32.590398] kasan_save_stack+0x3c/0x68 [ 32.590601] kasan_save_track+0x20/0x40 [ 32.590946] kasan_save_free_info+0x4c/0x78 [ 32.591068] __kasan_slab_free+0x7c/0xa8 [ 32.591305] kfree+0x214/0x3c8 [ 32.591449] kfree_sensitive+0x80/0xb0 [ 32.591567] kmalloc_double_kzfree+0x11c/0x308 [ 32.591711] kunit_try_run_case+0x170/0x3f0 [ 32.591870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.591955] kthread+0x328/0x630 [ 32.591996] ret_from_fork+0x10/0x20 [ 32.592159] [ 32.592371] The buggy address belongs to the object at fff00000c85ecee0 [ 32.592371] which belongs to the cache kmalloc-16 of size 16 [ 32.592590] The buggy address is located 0 bytes inside of [ 32.592590] 16-byte region [fff00000c85ecee0, fff00000c85ecef0) [ 32.592724] [ 32.592746] The buggy address belongs to the physical page: [ 32.593118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.593236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.593303] page_type: f5(slab) [ 32.593339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.594072] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.594491] page dumped because: kasan: bad access detected [ 32.594650] [ 32.594674] Memory state around the buggy address: [ 32.594760] fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.595255] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.595528] >fff00000c85ece80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.595615] ^ [ 32.595724] fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.595987] fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.596151] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 32.574443] ================================================================== [ 32.574960] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 32.575125] Read of size 1 at addr fff00000c85ecee0 by task kunit_try_catch/224 [ 32.575238] [ 32.575372] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.575474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.575820] Hardware name: linux,dummy-virt (DT) [ 32.575889] Call trace: [ 32.576006] show_stack+0x20/0x38 (C) [ 32.576111] dump_stack_lvl+0x8c/0xd0 [ 32.576215] print_report+0x118/0x5e8 [ 32.576311] kasan_report+0xdc/0x128 [ 32.576404] __kasan_check_byte+0x54/0x70 [ 32.576724] kfree_sensitive+0x30/0xb0 [ 32.576802] kmalloc_double_kzfree+0x168/0x308 [ 32.577116] kunit_try_run_case+0x170/0x3f0 [ 32.577242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.577366] kthread+0x328/0x630 [ 32.577429] ret_from_fork+0x10/0x20 [ 32.577660] [ 32.577736] Allocated by task 224: [ 32.577937] kasan_save_stack+0x3c/0x68 [ 32.578051] kasan_save_track+0x20/0x40 [ 32.578147] kasan_save_alloc_info+0x40/0x58 [ 32.578246] __kasan_kmalloc+0xd4/0xd8 [ 32.578358] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.578438] kmalloc_double_kzfree+0xb8/0x308 [ 32.578736] kunit_try_run_case+0x170/0x3f0 [ 32.578908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.578985] kthread+0x328/0x630 [ 32.579155] ret_from_fork+0x10/0x20 [ 32.579234] [ 32.579429] Freed by task 224: [ 32.579723] kasan_save_stack+0x3c/0x68 [ 32.579844] kasan_save_track+0x20/0x40 [ 32.579924] kasan_save_free_info+0x4c/0x78 [ 32.580014] __kasan_slab_free+0x7c/0xa8 [ 32.580223] kfree+0x214/0x3c8 [ 32.580367] kfree_sensitive+0x80/0xb0 [ 32.580424] kmalloc_double_kzfree+0x11c/0x308 [ 32.580464] kunit_try_run_case+0x170/0x3f0 [ 32.580918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.581023] kthread+0x328/0x630 [ 32.581121] ret_from_fork+0x10/0x20 [ 32.581389] [ 32.581662] The buggy address belongs to the object at fff00000c85ecee0 [ 32.581662] which belongs to the cache kmalloc-16 of size 16 [ 32.581778] The buggy address is located 0 bytes inside of [ 32.581778] freed 16-byte region [fff00000c85ecee0, fff00000c85ecef0) [ 32.581960] [ 32.581986] The buggy address belongs to the physical page: [ 32.582349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.582701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.582798] page_type: f5(slab) [ 32.583334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.583482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.583662] page dumped because: kasan: bad access detected [ 32.583720] [ 32.583794] Memory state around the buggy address: [ 32.583866] fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.584104] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.584318] >fff00000c85ece80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.584487] ^ [ 32.584573] fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.584722] fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.584874] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 32.541122] ================================================================== [ 32.541513] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 32.541710] Read of size 1 at addr fff00000c9b220a8 by task kunit_try_catch/220 [ 32.541769] [ 32.541922] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.542192] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.542237] Hardware name: linux,dummy-virt (DT) [ 32.542306] Call trace: [ 32.542500] show_stack+0x20/0x38 (C) [ 32.542663] dump_stack_lvl+0x8c/0xd0 [ 32.542725] print_report+0x118/0x5e8 [ 32.542997] kasan_report+0xdc/0x128 [ 32.543162] __asan_report_load1_noabort+0x20/0x30 [ 32.543218] kmalloc_uaf2+0x3f4/0x468 [ 32.543539] kunit_try_run_case+0x170/0x3f0 [ 32.543744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.543948] kthread+0x328/0x630 [ 32.544044] ret_from_fork+0x10/0x20 [ 32.544180] [ 32.544200] Allocated by task 220: [ 32.544248] kasan_save_stack+0x3c/0x68 [ 32.544333] kasan_save_track+0x20/0x40 [ 32.544573] kasan_save_alloc_info+0x40/0x58 [ 32.544763] __kasan_kmalloc+0xd4/0xd8 [ 32.544905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.545049] kmalloc_uaf2+0xc4/0x468 [ 32.545091] kunit_try_run_case+0x170/0x3f0 [ 32.545431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.545588] kthread+0x328/0x630 [ 32.545726] ret_from_fork+0x10/0x20 [ 32.545834] [ 32.545963] Freed by task 220: [ 32.546101] kasan_save_stack+0x3c/0x68 [ 32.546452] kasan_save_track+0x20/0x40 [ 32.546552] kasan_save_free_info+0x4c/0x78 [ 32.546727] __kasan_slab_free+0x7c/0xa8 [ 32.546805] kfree+0x214/0x3c8 [ 32.546859] kmalloc_uaf2+0x134/0x468 [ 32.547253] kunit_try_run_case+0x170/0x3f0 [ 32.547406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.547556] kthread+0x328/0x630 [ 32.547761] ret_from_fork+0x10/0x20 [ 32.547806] [ 32.547826] The buggy address belongs to the object at fff00000c9b22080 [ 32.547826] which belongs to the cache kmalloc-64 of size 64 [ 32.548042] The buggy address is located 40 bytes inside of [ 32.548042] freed 64-byte region [fff00000c9b22080, fff00000c9b220c0) [ 32.548304] [ 32.548398] The buggy address belongs to the physical page: [ 32.548518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b22 [ 32.548677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.548743] page_type: f5(slab) [ 32.549094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.549310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.549404] page dumped because: kasan: bad access detected [ 32.549586] [ 32.549632] Memory state around the buggy address: [ 32.549951] fff00000c9b21f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.550114] fff00000c9b22000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.550549] >fff00000c9b22080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.550877] ^ [ 32.551546] fff00000c9b22100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 32.552130] fff00000c9b22180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.552201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 32.521626] ================================================================== [ 32.521703] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 32.521765] Write of size 33 at addr fff00000c9b0bf00 by task kunit_try_catch/218 [ 32.521816] [ 32.521848] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.521935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.521965] Hardware name: linux,dummy-virt (DT) [ 32.522287] Call trace: [ 32.522329] show_stack+0x20/0x38 (C) [ 32.522384] dump_stack_lvl+0x8c/0xd0 [ 32.522462] print_report+0x118/0x5e8 [ 32.522507] kasan_report+0xdc/0x128 [ 32.522561] kasan_check_range+0x100/0x1a8 [ 32.522613] __asan_memset+0x34/0x78 [ 32.523742] kmalloc_uaf_memset+0x170/0x310 [ 32.524068] kunit_try_run_case+0x170/0x3f0 [ 32.524214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.524336] kthread+0x328/0x630 [ 32.524739] ret_from_fork+0x10/0x20 [ 32.525090] [ 32.525170] Allocated by task 218: [ 32.525233] kasan_save_stack+0x3c/0x68 [ 32.525342] kasan_save_track+0x20/0x40 [ 32.525711] kasan_save_alloc_info+0x40/0x58 [ 32.526049] __kasan_kmalloc+0xd4/0xd8 [ 32.526208] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.526434] kmalloc_uaf_memset+0xb8/0x310 [ 32.526725] kunit_try_run_case+0x170/0x3f0 [ 32.526957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.527197] kthread+0x328/0x630 [ 32.527373] ret_from_fork+0x10/0x20 [ 32.527467] [ 32.527494] Freed by task 218: [ 32.527521] kasan_save_stack+0x3c/0x68 [ 32.527558] kasan_save_track+0x20/0x40 [ 32.528132] kasan_save_free_info+0x4c/0x78 [ 32.528382] __kasan_slab_free+0x7c/0xa8 [ 32.528535] kfree+0x214/0x3c8 [ 32.528669] kmalloc_uaf_memset+0x11c/0x310 [ 32.528712] kunit_try_run_case+0x170/0x3f0 [ 32.528806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.529010] kthread+0x328/0x630 [ 32.529241] ret_from_fork+0x10/0x20 [ 32.529356] [ 32.529378] The buggy address belongs to the object at fff00000c9b0bf00 [ 32.529378] which belongs to the cache kmalloc-64 of size 64 [ 32.530140] The buggy address is located 0 bytes inside of [ 32.530140] freed 64-byte region [fff00000c9b0bf00, fff00000c9b0bf40) [ 32.530224] [ 32.530306] The buggy address belongs to the physical page: [ 32.530457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0b [ 32.530959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.531090] page_type: f5(slab) [ 32.531310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.531541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.531909] page dumped because: kasan: bad access detected [ 32.532018] [ 32.532094] Memory state around the buggy address: [ 32.532396] fff00000c9b0be00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.532501] fff00000c9b0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.532549] >fff00000c9b0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.532659] ^ [ 32.532722] fff00000c9b0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.532774] fff00000c9b0c000: 00 00 00 fc fc fc fc fc 00 00 00 02 fc fc fc fc [ 32.532816] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 32.500466] ================================================================== [ 32.500527] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 32.500582] Read of size 1 at addr fff00000c85ecec8 by task kunit_try_catch/216 [ 32.500632] [ 32.500685] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.500774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.500806] Hardware name: linux,dummy-virt (DT) [ 32.500847] Call trace: [ 32.500870] show_stack+0x20/0x38 (C) [ 32.500916] dump_stack_lvl+0x8c/0xd0 [ 32.500962] print_report+0x118/0x5e8 [ 32.501023] kasan_report+0xdc/0x128 [ 32.501067] __asan_report_load1_noabort+0x20/0x30 [ 32.501124] kmalloc_uaf+0x300/0x338 [ 32.501169] kunit_try_run_case+0x170/0x3f0 [ 32.501216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.501275] kthread+0x328/0x630 [ 32.501316] ret_from_fork+0x10/0x20 [ 32.501363] [ 32.501382] Allocated by task 216: [ 32.501409] kasan_save_stack+0x3c/0x68 [ 32.501457] kasan_save_track+0x20/0x40 [ 32.501500] kasan_save_alloc_info+0x40/0x58 [ 32.501544] __kasan_kmalloc+0xd4/0xd8 [ 32.501579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.501620] kmalloc_uaf+0xb8/0x338 [ 32.501690] kunit_try_run_case+0x170/0x3f0 [ 32.501730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.501773] kthread+0x328/0x630 [ 32.502073] ret_from_fork+0x10/0x20 [ 32.502133] [ 32.502801] Freed by task 216: [ 32.502853] kasan_save_stack+0x3c/0x68 [ 32.502905] kasan_save_track+0x20/0x40 [ 32.502961] kasan_save_free_info+0x4c/0x78 [ 32.503204] __kasan_slab_free+0x7c/0xa8 [ 32.503535] kfree+0x214/0x3c8 [ 32.503661] kmalloc_uaf+0x11c/0x338 [ 32.503700] kunit_try_run_case+0x170/0x3f0 [ 32.503738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.504081] kthread+0x328/0x630 [ 32.504214] ret_from_fork+0x10/0x20 [ 32.504296] [ 32.504347] The buggy address belongs to the object at fff00000c85ecec0 [ 32.504347] which belongs to the cache kmalloc-16 of size 16 [ 32.504504] The buggy address is located 8 bytes inside of [ 32.504504] freed 16-byte region [fff00000c85ecec0, fff00000c85eced0) [ 32.504743] [ 32.504767] The buggy address belongs to the physical page: [ 32.504802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.504882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.505302] page_type: f5(slab) [ 32.505359] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.505492] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.505725] page dumped because: kasan: bad access detected [ 32.505944] [ 32.506263] Memory state around the buggy address: [ 32.506725] fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.506866] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.507091] >fff00000c85ece80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 32.507184] ^ [ 32.507372] fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.507422] fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.507523] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 32.481307] ================================================================== [ 32.481370] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 32.481426] Read of size 64 at addr fff00000c9b0bc04 by task kunit_try_catch/214 [ 32.481509] [ 32.481554] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.481652] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.482709] Hardware name: linux,dummy-virt (DT) [ 32.482760] Call trace: [ 32.482909] show_stack+0x20/0x38 (C) [ 32.482965] dump_stack_lvl+0x8c/0xd0 [ 32.483272] print_report+0x118/0x5e8 [ 32.483328] kasan_report+0xdc/0x128 [ 32.483632] kasan_check_range+0x100/0x1a8 [ 32.483852] __asan_memmove+0x3c/0x98 [ 32.484208] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 32.484309] kunit_try_run_case+0x170/0x3f0 [ 32.484461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.484519] kthread+0x328/0x630 [ 32.484740] ret_from_fork+0x10/0x20 [ 32.485011] [ 32.485056] Allocated by task 214: [ 32.485109] kasan_save_stack+0x3c/0x68 [ 32.485212] kasan_save_track+0x20/0x40 [ 32.485431] kasan_save_alloc_info+0x40/0x58 [ 32.485936] __kasan_kmalloc+0xd4/0xd8 [ 32.486037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.486390] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 32.486727] kunit_try_run_case+0x170/0x3f0 [ 32.486792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.487219] kthread+0x328/0x630 [ 32.487317] ret_from_fork+0x10/0x20 [ 32.487367] [ 32.487520] The buggy address belongs to the object at fff00000c9b0bc00 [ 32.487520] which belongs to the cache kmalloc-64 of size 64 [ 32.487752] The buggy address is located 4 bytes inside of [ 32.487752] allocated 64-byte region [fff00000c9b0bc00, fff00000c9b0bc40) [ 32.487927] [ 32.487952] The buggy address belongs to the physical page: [ 32.488191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0b [ 32.488774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.488892] page_type: f5(slab) [ 32.489042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.489303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.489504] page dumped because: kasan: bad access detected [ 32.489550] [ 32.489569] Memory state around the buggy address: [ 32.489830] fff00000c9b0bb00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.490071] fff00000c9b0bb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.490167] >fff00000c9b0bc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.490242] ^ [ 32.490449] fff00000c9b0bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.490714] fff00000c9b0bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.490961] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 32.464400] ================================================================== [ 32.464476] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.464537] Read of size 18446744073709551614 at addr fff00000c9b0ba04 by task kunit_try_catch/212 [ 32.464619] [ 32.464690] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.464782] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.464824] Hardware name: linux,dummy-virt (DT) [ 32.464855] Call trace: [ 32.464878] show_stack+0x20/0x38 (C) [ 32.464936] dump_stack_lvl+0x8c/0xd0 [ 32.464982] print_report+0x118/0x5e8 [ 32.465036] kasan_report+0xdc/0x128 [ 32.465079] kasan_check_range+0x100/0x1a8 [ 32.465124] __asan_memmove+0x3c/0x98 [ 32.465172] kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.465232] kunit_try_run_case+0x170/0x3f0 [ 32.465279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.465339] kthread+0x328/0x630 [ 32.465383] ret_from_fork+0x10/0x20 [ 32.465437] [ 32.465457] Allocated by task 212: [ 32.465494] kasan_save_stack+0x3c/0x68 [ 32.465544] kasan_save_track+0x20/0x40 [ 32.465584] kasan_save_alloc_info+0x40/0x58 [ 32.465623] __kasan_kmalloc+0xd4/0xd8 [ 32.466046] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.466581] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 32.466674] kunit_try_run_case+0x170/0x3f0 [ 32.466763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.466809] kthread+0x328/0x630 [ 32.466899] ret_from_fork+0x10/0x20 [ 32.466988] [ 32.467020] The buggy address belongs to the object at fff00000c9b0ba00 [ 32.467020] which belongs to the cache kmalloc-64 of size 64 [ 32.467266] The buggy address is located 4 bytes inside of [ 32.467266] 64-byte region [fff00000c9b0ba00, fff00000c9b0ba40) [ 32.467546] [ 32.467602] The buggy address belongs to the physical page: [ 32.467767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b0b [ 32.467874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.468074] page_type: f5(slab) [ 32.468149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.468671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.468753] page dumped because: kasan: bad access detected [ 32.468816] [ 32.469079] Memory state around the buggy address: [ 32.469131] fff00000c9b0b900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 32.469383] fff00000c9b0b980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.469590] >fff00000c9b0ba00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.470127] ^ [ 32.470224] fff00000c9b0ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470409] fff00000c9b0bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470483] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 32.441684] ================================================================== [ 32.441752] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 32.441891] Write of size 16 at addr fff00000c9726869 by task kunit_try_catch/210 [ 32.441939] [ 32.442213] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.442446] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.442490] Hardware name: linux,dummy-virt (DT) [ 32.442520] Call trace: [ 32.442542] show_stack+0x20/0x38 (C) [ 32.442786] dump_stack_lvl+0x8c/0xd0 [ 32.442972] print_report+0x118/0x5e8 [ 32.443069] kasan_report+0xdc/0x128 [ 32.443146] kasan_check_range+0x100/0x1a8 [ 32.443193] __asan_memset+0x34/0x78 [ 32.443236] kmalloc_oob_memset_16+0x150/0x2f8 [ 32.443282] kunit_try_run_case+0x170/0x3f0 [ 32.443327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.443383] kthread+0x328/0x630 [ 32.443686] ret_from_fork+0x10/0x20 [ 32.444087] [ 32.444153] Allocated by task 210: [ 32.444223] kasan_save_stack+0x3c/0x68 [ 32.444314] kasan_save_track+0x20/0x40 [ 32.444545] kasan_save_alloc_info+0x40/0x58 [ 32.444704] __kasan_kmalloc+0xd4/0xd8 [ 32.444896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.445060] kmalloc_oob_memset_16+0xb0/0x2f8 [ 32.445194] kunit_try_run_case+0x170/0x3f0 [ 32.445619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.445860] kthread+0x328/0x630 [ 32.445975] ret_from_fork+0x10/0x20 [ 32.446215] [ 32.446281] The buggy address belongs to the object at fff00000c9726800 [ 32.446281] which belongs to the cache kmalloc-128 of size 128 [ 32.446573] The buggy address is located 105 bytes inside of [ 32.446573] allocated 120-byte region [fff00000c9726800, fff00000c9726878) [ 32.446776] [ 32.446846] The buggy address belongs to the physical page: [ 32.447074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.447399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.447456] page_type: f5(slab) [ 32.447497] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.447555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.447595] page dumped because: kasan: bad access detected [ 32.447627] [ 32.447656] Memory state around the buggy address: [ 32.447689] fff00000c9726700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.448100] fff00000c9726780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.448226] >fff00000c9726800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.448268] ^ [ 32.448458] fff00000c9726880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.448655] fff00000c9726900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.448765] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 32.422465] ================================================================== [ 32.422989] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 32.423197] Write of size 8 at addr fff00000c9726771 by task kunit_try_catch/208 [ 32.423428] [ 32.423553] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.423729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.423864] Hardware name: linux,dummy-virt (DT) [ 32.423923] Call trace: [ 32.424153] show_stack+0x20/0x38 (C) [ 32.424334] dump_stack_lvl+0x8c/0xd0 [ 32.424523] print_report+0x118/0x5e8 [ 32.424798] kasan_report+0xdc/0x128 [ 32.424878] kasan_check_range+0x100/0x1a8 [ 32.425086] __asan_memset+0x34/0x78 [ 32.425221] kmalloc_oob_memset_8+0x150/0x2f8 [ 32.425460] kunit_try_run_case+0x170/0x3f0 [ 32.425716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.425804] kthread+0x328/0x630 [ 32.426016] ret_from_fork+0x10/0x20 [ 32.426177] [ 32.426257] Allocated by task 208: [ 32.426294] kasan_save_stack+0x3c/0x68 [ 32.426352] kasan_save_track+0x20/0x40 [ 32.426660] kasan_save_alloc_info+0x40/0x58 [ 32.426881] __kasan_kmalloc+0xd4/0xd8 [ 32.426951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.427066] kmalloc_oob_memset_8+0xb0/0x2f8 [ 32.427209] kunit_try_run_case+0x170/0x3f0 [ 32.427358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.427403] kthread+0x328/0x630 [ 32.427445] ret_from_fork+0x10/0x20 [ 32.427481] [ 32.427552] The buggy address belongs to the object at fff00000c9726700 [ 32.427552] which belongs to the cache kmalloc-128 of size 128 [ 32.427796] The buggy address is located 113 bytes inside of [ 32.427796] allocated 120-byte region [fff00000c9726700, fff00000c9726778) [ 32.428057] [ 32.428200] The buggy address belongs to the physical page: [ 32.428311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.428474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.428578] page_type: f5(slab) [ 32.428960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.429092] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.429250] page dumped because: kasan: bad access detected [ 32.429362] [ 32.429432] Memory state around the buggy address: [ 32.429772] fff00000c9726600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.429992] fff00000c9726680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430079] >fff00000c9726700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.430160] ^ [ 32.430569] fff00000c9726780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430742] fff00000c9726800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430946] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 32.404292] ================================================================== [ 32.404399] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 32.404486] Write of size 4 at addr fff00000c9726675 by task kunit_try_catch/206 [ 32.404538] [ 32.404607] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.404774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.404844] Hardware name: linux,dummy-virt (DT) [ 32.404876] Call trace: [ 32.404898] show_stack+0x20/0x38 (C) [ 32.405122] dump_stack_lvl+0x8c/0xd0 [ 32.405344] print_report+0x118/0x5e8 [ 32.405459] kasan_report+0xdc/0x128 [ 32.405520] kasan_check_range+0x100/0x1a8 [ 32.405671] __asan_memset+0x34/0x78 [ 32.405920] kmalloc_oob_memset_4+0x150/0x300 [ 32.406081] kunit_try_run_case+0x170/0x3f0 [ 32.406372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.406450] kthread+0x328/0x630 [ 32.406492] ret_from_fork+0x10/0x20 [ 32.406538] [ 32.406938] Allocated by task 206: [ 32.407178] kasan_save_stack+0x3c/0x68 [ 32.407334] kasan_save_track+0x20/0x40 [ 32.407370] kasan_save_alloc_info+0x40/0x58 [ 32.407408] __kasan_kmalloc+0xd4/0xd8 [ 32.407698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.407909] kmalloc_oob_memset_4+0xb0/0x300 [ 32.407994] kunit_try_run_case+0x170/0x3f0 [ 32.408243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.408599] kthread+0x328/0x630 [ 32.408784] ret_from_fork+0x10/0x20 [ 32.408891] [ 32.408995] The buggy address belongs to the object at fff00000c9726600 [ 32.408995] which belongs to the cache kmalloc-128 of size 128 [ 32.409053] The buggy address is located 117 bytes inside of [ 32.409053] allocated 120-byte region [fff00000c9726600, fff00000c9726678) [ 32.409177] [ 32.409245] The buggy address belongs to the physical page: [ 32.409472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.409532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.409725] page_type: f5(slab) [ 32.409776] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.409824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.409862] page dumped because: kasan: bad access detected [ 32.409894] [ 32.409923] Memory state around the buggy address: [ 32.409979] fff00000c9726500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.410022] fff00000c9726580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.410063] >fff00000c9726600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.410099] ^ [ 32.410154] fff00000c9726680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.410195] fff00000c9726700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.410241] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 32.392500] ================================================================== [ 32.392726] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 32.392788] Write of size 2 at addr fff00000c9726577 by task kunit_try_catch/204 [ 32.392861] [ 32.392908] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.392994] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.393023] Hardware name: linux,dummy-virt (DT) [ 32.393080] Call trace: [ 32.393126] show_stack+0x20/0x38 (C) [ 32.393213] dump_stack_lvl+0x8c/0xd0 [ 32.393278] print_report+0x118/0x5e8 [ 32.393321] kasan_report+0xdc/0x128 [ 32.393362] kasan_check_range+0x100/0x1a8 [ 32.393411] __asan_memset+0x34/0x78 [ 32.393471] kmalloc_oob_memset_2+0x150/0x2f8 [ 32.393518] kunit_try_run_case+0x170/0x3f0 [ 32.393581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.393632] kthread+0x328/0x630 [ 32.393831] ret_from_fork+0x10/0x20 [ 32.393950] [ 32.394127] Allocated by task 204: [ 32.394182] kasan_save_stack+0x3c/0x68 [ 32.394260] kasan_save_track+0x20/0x40 [ 32.394297] kasan_save_alloc_info+0x40/0x58 [ 32.394360] __kasan_kmalloc+0xd4/0xd8 [ 32.394431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.394488] kmalloc_oob_memset_2+0xb0/0x2f8 [ 32.394544] kunit_try_run_case+0x170/0x3f0 [ 32.394596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.394649] kthread+0x328/0x630 [ 32.394842] ret_from_fork+0x10/0x20 [ 32.395003] [ 32.395047] The buggy address belongs to the object at fff00000c9726500 [ 32.395047] which belongs to the cache kmalloc-128 of size 128 [ 32.395185] The buggy address is located 119 bytes inside of [ 32.395185] allocated 120-byte region [fff00000c9726500, fff00000c9726578) [ 32.395338] [ 32.395359] The buggy address belongs to the physical page: [ 32.395430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.395607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.395771] page_type: f5(slab) [ 32.395873] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.395941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.395979] page dumped because: kasan: bad access detected [ 32.396008] [ 32.396026] Memory state around the buggy address: [ 32.396093] fff00000c9726400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.396234] fff00000c9726480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.396279] >fff00000c9726500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.396419] ^ [ 32.396526] fff00000c9726580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.396742] fff00000c9726600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.396845] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 32.382463] ================================================================== [ 32.382520] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 32.382571] Write of size 128 at addr fff00000c9726400 by task kunit_try_catch/202 [ 32.382633] [ 32.382679] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.382765] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.382794] Hardware name: linux,dummy-virt (DT) [ 32.382833] Call trace: [ 32.382856] show_stack+0x20/0x38 (C) [ 32.382901] dump_stack_lvl+0x8c/0xd0 [ 32.382946] print_report+0x118/0x5e8 [ 32.382988] kasan_report+0xdc/0x128 [ 32.383030] kasan_check_range+0x100/0x1a8 [ 32.383109] __asan_memset+0x34/0x78 [ 32.383153] kmalloc_oob_in_memset+0x144/0x2d0 [ 32.383535] kunit_try_run_case+0x170/0x3f0 [ 32.383718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.383813] kthread+0x328/0x630 [ 32.383910] ret_from_fork+0x10/0x20 [ 32.384051] [ 32.384089] Allocated by task 202: [ 32.384117] kasan_save_stack+0x3c/0x68 [ 32.384155] kasan_save_track+0x20/0x40 [ 32.384190] kasan_save_alloc_info+0x40/0x58 [ 32.384364] __kasan_kmalloc+0xd4/0xd8 [ 32.384470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.384579] kmalloc_oob_in_memset+0xb0/0x2d0 [ 32.384733] kunit_try_run_case+0x170/0x3f0 [ 32.384800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.384864] kthread+0x328/0x630 [ 32.384941] ret_from_fork+0x10/0x20 [ 32.384977] [ 32.384997] The buggy address belongs to the object at fff00000c9726400 [ 32.384997] which belongs to the cache kmalloc-128 of size 128 [ 32.385108] The buggy address is located 0 bytes inside of [ 32.385108] allocated 120-byte region [fff00000c9726400, fff00000c9726478) [ 32.385240] [ 32.385298] The buggy address belongs to the physical page: [ 32.385446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.385588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.385634] page_type: f5(slab) [ 32.385711] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.385771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.385808] page dumped because: kasan: bad access detected [ 32.385837] [ 32.385890] Memory state around the buggy address: [ 32.386087] fff00000c9726300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.386194] fff00000c9726380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.386309] >fff00000c9726400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.386406] ^ [ 32.386446] fff00000c9726480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.386506] fff00000c9726500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.386637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 32.372375] ================================================================== [ 32.372438] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 32.372656] Read of size 16 at addr fff00000c85ecea0 by task kunit_try_catch/200 [ 32.372779] [ 32.372837] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.372945] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.372981] Hardware name: linux,dummy-virt (DT) [ 32.373010] Call trace: [ 32.373031] show_stack+0x20/0x38 (C) [ 32.373338] dump_stack_lvl+0x8c/0xd0 [ 32.373412] print_report+0x118/0x5e8 [ 32.373457] kasan_report+0xdc/0x128 [ 32.373499] __asan_report_load16_noabort+0x20/0x30 [ 32.373697] kmalloc_uaf_16+0x3bc/0x438 [ 32.373812] kunit_try_run_case+0x170/0x3f0 [ 32.373908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.373996] kthread+0x328/0x630 [ 32.374080] ret_from_fork+0x10/0x20 [ 32.374129] [ 32.374179] Allocated by task 200: [ 32.374227] kasan_save_stack+0x3c/0x68 [ 32.374283] kasan_save_track+0x20/0x40 [ 32.374318] kasan_save_alloc_info+0x40/0x58 [ 32.374370] __kasan_kmalloc+0xd4/0xd8 [ 32.374404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.374472] kmalloc_uaf_16+0x140/0x438 [ 32.374790] kunit_try_run_case+0x170/0x3f0 [ 32.374864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.374915] kthread+0x328/0x630 [ 32.374960] ret_from_fork+0x10/0x20 [ 32.375030] [ 32.375062] Freed by task 200: [ 32.375090] kasan_save_stack+0x3c/0x68 [ 32.375125] kasan_save_track+0x20/0x40 [ 32.375160] kasan_save_free_info+0x4c/0x78 [ 32.375195] __kasan_slab_free+0x7c/0xa8 [ 32.375229] kfree+0x214/0x3c8 [ 32.375321] kmalloc_uaf_16+0x190/0x438 [ 32.375469] kunit_try_run_case+0x170/0x3f0 [ 32.375572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.375713] kthread+0x328/0x630 [ 32.375817] ret_from_fork+0x10/0x20 [ 32.375887] [ 32.375962] The buggy address belongs to the object at fff00000c85ecea0 [ 32.375962] which belongs to the cache kmalloc-16 of size 16 [ 32.376138] The buggy address is located 0 bytes inside of [ 32.376138] freed 16-byte region [fff00000c85ecea0, fff00000c85eceb0) [ 32.376689] [ 32.376750] The buggy address belongs to the physical page: [ 32.376835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.376952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.377049] page_type: f5(slab) [ 32.377141] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.377203] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.377241] page dumped because: kasan: bad access detected [ 32.377270] [ 32.377288] Memory state around the buggy address: [ 32.377319] fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.377363] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.377403] >fff00000c85ece80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 32.377456] ^ [ 32.377488] fff00000c85ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.377530] fff00000c85ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.377566] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 32.360141] ================================================================== [ 32.360423] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 32.360486] Write of size 16 at addr fff00000c85ecd60 by task kunit_try_catch/198 [ 32.360565] [ 32.360614] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.360744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.360774] Hardware name: linux,dummy-virt (DT) [ 32.360804] Call trace: [ 32.360852] show_stack+0x20/0x38 (C) [ 32.360902] dump_stack_lvl+0x8c/0xd0 [ 32.360948] print_report+0x118/0x5e8 [ 32.361147] kasan_report+0xdc/0x128 [ 32.361201] __asan_report_store16_noabort+0x20/0x30 [ 32.361268] kmalloc_oob_16+0x3a0/0x3f8 [ 32.361323] kunit_try_run_case+0x170/0x3f0 [ 32.361397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.361449] kthread+0x328/0x630 [ 32.361490] ret_from_fork+0x10/0x20 [ 32.361537] [ 32.361555] Allocated by task 198: [ 32.361742] kasan_save_stack+0x3c/0x68 [ 32.361803] kasan_save_track+0x20/0x40 [ 32.361874] kasan_save_alloc_info+0x40/0x58 [ 32.361952] __kasan_kmalloc+0xd4/0xd8 [ 32.361985] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.362043] kmalloc_oob_16+0xb4/0x3f8 [ 32.362079] kunit_try_run_case+0x170/0x3f0 [ 32.362124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.362181] kthread+0x328/0x630 [ 32.362229] ret_from_fork+0x10/0x20 [ 32.362264] [ 32.362301] The buggy address belongs to the object at fff00000c85ecd60 [ 32.362301] which belongs to the cache kmalloc-16 of size 16 [ 32.362372] The buggy address is located 0 bytes inside of [ 32.362372] allocated 13-byte region [fff00000c85ecd60, fff00000c85ecd6d) [ 32.362657] [ 32.362817] The buggy address belongs to the physical page: [ 32.362874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085ec [ 32.362928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.363030] page_type: f5(slab) [ 32.363071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.363120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.363258] page dumped because: kasan: bad access detected [ 32.363362] [ 32.363468] Memory state around the buggy address: [ 32.363565] fff00000c85ecc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.363681] fff00000c85ecc80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.363778] >fff00000c85ecd00: fa fb fc fc fa fb fc fc 00 00 fc fc 00 05 fc fc [ 32.363826] ^ [ 32.363863] fff00000c85ecd80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.364047] fff00000c85ece00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 32.364179] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 32.255845] ================================================================== [ 32.255898] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 32.256043] Write of size 1 at addr fff00000c8754eeb by task kunit_try_catch/190 [ 32.256112] [ 32.256170] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.256298] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.256327] Hardware name: linux,dummy-virt (DT) [ 32.256357] Call trace: [ 32.256685] show_stack+0x20/0x38 (C) [ 32.256807] dump_stack_lvl+0x8c/0xd0 [ 32.256860] print_report+0x118/0x5e8 [ 32.256948] kasan_report+0xdc/0x128 [ 32.256993] __asan_report_store1_noabort+0x20/0x30 [ 32.257070] krealloc_less_oob_helper+0xa58/0xc50 [ 32.257167] krealloc_less_oob+0x20/0x38 [ 32.257214] kunit_try_run_case+0x170/0x3f0 [ 32.257260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.257616] kthread+0x328/0x630 [ 32.257688] ret_from_fork+0x10/0x20 [ 32.257734] [ 32.257826] Allocated by task 190: [ 32.257886] kasan_save_stack+0x3c/0x68 [ 32.257932] kasan_save_track+0x20/0x40 [ 32.257967] kasan_save_alloc_info+0x40/0x58 [ 32.258011] __kasan_krealloc+0x118/0x178 [ 32.258205] krealloc_noprof+0x128/0x360 [ 32.258388] krealloc_less_oob_helper+0x168/0xc50 [ 32.258443] krealloc_less_oob+0x20/0x38 [ 32.258973] kunit_try_run_case+0x170/0x3f0 [ 32.259046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.259460] kthread+0x328/0x630 [ 32.259533] ret_from_fork+0x10/0x20 [ 32.259570] [ 32.259614] The buggy address belongs to the object at fff00000c8754e00 [ 32.259614] which belongs to the cache kmalloc-256 of size 256 [ 32.259900] The buggy address is located 34 bytes to the right of [ 32.259900] allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9) [ 32.260243] [ 32.260295] The buggy address belongs to the physical page: [ 32.260614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.260868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.260967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.261033] page_type: f5(slab) [ 32.261069] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.261126] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.261172] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.261227] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.261274] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.261320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.261358] page dumped because: kasan: bad access detected [ 32.261397] [ 32.261415] Memory state around the buggy address: [ 32.261454] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.261498] fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.261540] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.261590] ^ [ 32.261628] fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.261690] fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.261726] ================================================================== [ 32.244783] ================================================================== [ 32.245169] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 32.245236] Write of size 1 at addr fff00000c8754eea by task kunit_try_catch/190 [ 32.245649] [ 32.245721] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.245811] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.245974] Hardware name: linux,dummy-virt (DT) [ 32.246108] Call trace: [ 32.246155] show_stack+0x20/0x38 (C) [ 32.246208] dump_stack_lvl+0x8c/0xd0 [ 32.246398] print_report+0x118/0x5e8 [ 32.246612] kasan_report+0xdc/0x128 [ 32.246683] __asan_report_store1_noabort+0x20/0x30 [ 32.246795] krealloc_less_oob_helper+0xae4/0xc50 [ 32.246849] krealloc_less_oob+0x20/0x38 [ 32.246895] kunit_try_run_case+0x170/0x3f0 [ 32.247002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.247102] kthread+0x328/0x630 [ 32.247302] ret_from_fork+0x10/0x20 [ 32.247361] [ 32.247380] Allocated by task 190: [ 32.247633] kasan_save_stack+0x3c/0x68 [ 32.247849] kasan_save_track+0x20/0x40 [ 32.247969] kasan_save_alloc_info+0x40/0x58 [ 32.248137] __kasan_krealloc+0x118/0x178 [ 32.248483] krealloc_noprof+0x128/0x360 [ 32.248560] krealloc_less_oob_helper+0x168/0xc50 [ 32.248702] krealloc_less_oob+0x20/0x38 [ 32.248845] kunit_try_run_case+0x170/0x3f0 [ 32.248976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.249137] kthread+0x328/0x630 [ 32.249205] ret_from_fork+0x10/0x20 [ 32.249371] [ 32.249435] The buggy address belongs to the object at fff00000c8754e00 [ 32.249435] which belongs to the cache kmalloc-256 of size 256 [ 32.249761] The buggy address is located 33 bytes to the right of [ 32.249761] allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9) [ 32.249948] [ 32.250024] The buggy address belongs to the physical page: [ 32.250131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.250194] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.250406] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.250509] page_type: f5(slab) [ 32.250712] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.250867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.250947] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.251002] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.251049] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.251219] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.251271] page dumped because: kasan: bad access detected [ 32.251301] [ 32.251585] Memory state around the buggy address: [ 32.251809] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251905] fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.251950] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.252145] ^ [ 32.252291] fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.252531] fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.252600] ================================================================== [ 32.300865] ================================================================== [ 32.301019] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.301135] Write of size 1 at addr fff00000c9b260d0 by task kunit_try_catch/194 [ 32.301187] [ 32.301216] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.301381] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.301427] Hardware name: linux,dummy-virt (DT) [ 32.301457] Call trace: [ 32.301495] show_stack+0x20/0x38 (C) [ 32.301724] dump_stack_lvl+0x8c/0xd0 [ 32.301838] print_report+0x118/0x5e8 [ 32.302183] kasan_report+0xdc/0x128 [ 32.302455] __asan_report_store1_noabort+0x20/0x30 [ 32.302557] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.302673] krealloc_large_less_oob+0x20/0x38 [ 32.302727] kunit_try_run_case+0x170/0x3f0 [ 32.302772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.302861] kthread+0x328/0x630 [ 32.303115] ret_from_fork+0x10/0x20 [ 32.303186] [ 32.303349] The buggy address belongs to the physical page: [ 32.303407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.303459] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.303570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.303735] page_type: f8(unknown) [ 32.303828] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.304255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.304358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.304438] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.304611] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.305006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.305234] page dumped because: kasan: bad access detected [ 32.305594] [ 32.305985] Memory state around the buggy address: [ 32.306042] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.306152] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.306226] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.306323] ^ [ 32.306389] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.306454] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.306545] ================================================================== [ 32.308119] ================================================================== [ 32.308186] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 32.308239] Write of size 1 at addr fff00000c9b260da by task kunit_try_catch/194 [ 32.308375] [ 32.308446] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.308581] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.308611] Hardware name: linux,dummy-virt (DT) [ 32.308702] Call trace: [ 32.309027] show_stack+0x20/0x38 (C) [ 32.309105] dump_stack_lvl+0x8c/0xd0 [ 32.309310] print_report+0x118/0x5e8 [ 32.309508] kasan_report+0xdc/0x128 [ 32.309607] __asan_report_store1_noabort+0x20/0x30 [ 32.309712] krealloc_less_oob_helper+0xa80/0xc50 [ 32.309850] krealloc_large_less_oob+0x20/0x38 [ 32.309905] kunit_try_run_case+0x170/0x3f0 [ 32.309958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.310266] kthread+0x328/0x630 [ 32.310403] ret_from_fork+0x10/0x20 [ 32.310497] [ 32.310696] The buggy address belongs to the physical page: [ 32.310759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.311095] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.311171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.311284] page_type: f8(unknown) [ 32.311394] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.311524] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.311630] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.311751] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.311800] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.311873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.312098] page dumped because: kasan: bad access detected [ 32.312273] [ 32.312626] Memory state around the buggy address: [ 32.312725] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.313072] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.313130] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.313184] ^ [ 32.313484] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.314357] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.314431] ================================================================== [ 32.218940] ================================================================== [ 32.219000] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.219056] Write of size 1 at addr fff00000c8754ec9 by task kunit_try_catch/190 [ 32.219104] [ 32.219136] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.219231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.219261] Hardware name: linux,dummy-virt (DT) [ 32.219301] Call trace: [ 32.219323] show_stack+0x20/0x38 (C) [ 32.219371] dump_stack_lvl+0x8c/0xd0 [ 32.219416] print_report+0x118/0x5e8 [ 32.219459] kasan_report+0xdc/0x128 [ 32.219506] __asan_report_store1_noabort+0x20/0x30 [ 32.219562] krealloc_less_oob_helper+0xa48/0xc50 [ 32.219616] krealloc_less_oob+0x20/0x38 [ 32.220487] kunit_try_run_case+0x170/0x3f0 [ 32.220626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.220774] kthread+0x328/0x630 [ 32.220831] ret_from_fork+0x10/0x20 [ 32.221140] [ 32.221202] Allocated by task 190: [ 32.221306] kasan_save_stack+0x3c/0x68 [ 32.221490] kasan_save_track+0x20/0x40 [ 32.221675] kasan_save_alloc_info+0x40/0x58 [ 32.221774] __kasan_krealloc+0x118/0x178 [ 32.222235] krealloc_noprof+0x128/0x360 [ 32.222349] krealloc_less_oob_helper+0x168/0xc50 [ 32.222417] krealloc_less_oob+0x20/0x38 [ 32.222590] kunit_try_run_case+0x170/0x3f0 [ 32.222793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.223159] kthread+0x328/0x630 [ 32.223302] ret_from_fork+0x10/0x20 [ 32.223411] [ 32.223514] The buggy address belongs to the object at fff00000c8754e00 [ 32.223514] which belongs to the cache kmalloc-256 of size 256 [ 32.223676] The buggy address is located 0 bytes to the right of [ 32.223676] allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9) [ 32.223821] [ 32.223909] The buggy address belongs to the physical page: [ 32.223943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.223999] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.224044] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.224401] page_type: f5(slab) [ 32.224568] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.224762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.224968] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.225048] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.225100] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.225494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.225625] page dumped because: kasan: bad access detected [ 32.225724] [ 32.225869] Memory state around the buggy address: [ 32.225977] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.226046] fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.226298] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.226469] ^ [ 32.226535] fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.226730] fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.226979] ================================================================== [ 32.293375] ================================================================== [ 32.293564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.293657] Write of size 1 at addr fff00000c9b260c9 by task kunit_try_catch/194 [ 32.293820] [ 32.293859] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.293945] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.294247] Hardware name: linux,dummy-virt (DT) [ 32.294423] Call trace: [ 32.294602] show_stack+0x20/0x38 (C) [ 32.294763] dump_stack_lvl+0x8c/0xd0 [ 32.294816] print_report+0x118/0x5e8 [ 32.294860] kasan_report+0xdc/0x128 [ 32.295218] __asan_report_store1_noabort+0x20/0x30 [ 32.295351] krealloc_less_oob_helper+0xa48/0xc50 [ 32.295574] krealloc_large_less_oob+0x20/0x38 [ 32.295651] kunit_try_run_case+0x170/0x3f0 [ 32.295874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.295987] kthread+0x328/0x630 [ 32.296102] ret_from_fork+0x10/0x20 [ 32.296205] [ 32.296226] The buggy address belongs to the physical page: [ 32.296538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.296621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.296766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.296873] page_type: f8(unknown) [ 32.297162] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.297316] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.297441] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.297506] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.297725] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.297983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.298204] page dumped because: kasan: bad access detected [ 32.298417] [ 32.298462] Memory state around the buggy address: [ 32.298654] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.298724] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.299189] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.299360] ^ [ 32.299446] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.299490] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.299923] ================================================================== [ 32.228611] ================================================================== [ 32.228725] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.228777] Write of size 1 at addr fff00000c8754ed0 by task kunit_try_catch/190 [ 32.229065] [ 32.229112] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.229342] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.229439] Hardware name: linux,dummy-virt (DT) [ 32.229555] Call trace: [ 32.229603] show_stack+0x20/0x38 (C) [ 32.229667] dump_stack_lvl+0x8c/0xd0 [ 32.229945] print_report+0x118/0x5e8 [ 32.230014] kasan_report+0xdc/0x128 [ 32.230061] __asan_report_store1_noabort+0x20/0x30 [ 32.230222] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.230306] krealloc_less_oob+0x20/0x38 [ 32.230354] kunit_try_run_case+0x170/0x3f0 [ 32.230475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.230527] kthread+0x328/0x630 [ 32.230921] ret_from_fork+0x10/0x20 [ 32.231011] [ 32.231174] Allocated by task 190: [ 32.231210] kasan_save_stack+0x3c/0x68 [ 32.231393] kasan_save_track+0x20/0x40 [ 32.231469] kasan_save_alloc_info+0x40/0x58 [ 32.231608] __kasan_krealloc+0x118/0x178 [ 32.231718] krealloc_noprof+0x128/0x360 [ 32.231867] krealloc_less_oob_helper+0x168/0xc50 [ 32.232101] krealloc_less_oob+0x20/0x38 [ 32.232165] kunit_try_run_case+0x170/0x3f0 [ 32.232235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.232468] kthread+0x328/0x630 [ 32.232806] ret_from_fork+0x10/0x20 [ 32.232897] [ 32.232972] The buggy address belongs to the object at fff00000c8754e00 [ 32.232972] which belongs to the cache kmalloc-256 of size 256 [ 32.233086] The buggy address is located 7 bytes to the right of [ 32.233086] allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9) [ 32.233448] [ 32.233579] The buggy address belongs to the physical page: [ 32.233728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.233814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.234022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.234098] page_type: f5(slab) [ 32.234368] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.234667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.235158] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.235516] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.235572] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.235619] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.235668] page dumped because: kasan: bad access detected [ 32.235698] [ 32.235716] Memory state around the buggy address: [ 32.235748] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235791] fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.235833] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.236088] ^ [ 32.236939] fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.237131] fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.237314] ================================================================== [ 32.238732] ================================================================== [ 32.238827] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 32.238938] Write of size 1 at addr fff00000c8754eda by task kunit_try_catch/190 [ 32.239033] [ 32.239130] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.239326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.239356] Hardware name: linux,dummy-virt (DT) [ 32.239387] Call trace: [ 32.239408] show_stack+0x20/0x38 (C) [ 32.239456] dump_stack_lvl+0x8c/0xd0 [ 32.239502] print_report+0x118/0x5e8 [ 32.239545] kasan_report+0xdc/0x128 [ 32.239896] __asan_report_store1_noabort+0x20/0x30 [ 32.239968] krealloc_less_oob_helper+0xa80/0xc50 [ 32.240018] krealloc_less_oob+0x20/0x38 [ 32.240091] kunit_try_run_case+0x170/0x3f0 [ 32.240160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.240221] kthread+0x328/0x630 [ 32.240273] ret_from_fork+0x10/0x20 [ 32.240333] [ 32.240359] Allocated by task 190: [ 32.240395] kasan_save_stack+0x3c/0x68 [ 32.240433] kasan_save_track+0x20/0x40 [ 32.240483] kasan_save_alloc_info+0x40/0x58 [ 32.240519] __kasan_krealloc+0x118/0x178 [ 32.240553] krealloc_noprof+0x128/0x360 [ 32.240591] krealloc_less_oob_helper+0x168/0xc50 [ 32.240630] krealloc_less_oob+0x20/0x38 [ 32.240679] kunit_try_run_case+0x170/0x3f0 [ 32.240721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.240768] kthread+0x328/0x630 [ 32.240799] ret_from_fork+0x10/0x20 [ 32.240833] [ 32.240852] The buggy address belongs to the object at fff00000c8754e00 [ 32.240852] which belongs to the cache kmalloc-256 of size 256 [ 32.240906] The buggy address is located 17 bytes to the right of [ 32.240906] allocated 201-byte region [fff00000c8754e00, fff00000c8754ec9) [ 32.240968] [ 32.240987] The buggy address belongs to the physical page: [ 32.241019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.241088] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.241133] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.241183] page_type: f5(slab) [ 32.241231] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.241287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.241334] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.241380] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.241426] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.241471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.241509] page dumped because: kasan: bad access detected [ 32.241537] [ 32.241554] Memory state around the buggy address: [ 32.241585] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.241626] fff00000c8754e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.242426] >fff00000c8754e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.242538] ^ [ 32.242968] fff00000c8754f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.243408] fff00000c8754f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.243454] ================================================================== [ 32.315908] ================================================================== [ 32.316032] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 32.316086] Write of size 1 at addr fff00000c9b260ea by task kunit_try_catch/194 [ 32.316171] [ 32.316277] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.316398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.316478] Hardware name: linux,dummy-virt (DT) [ 32.316516] Call trace: [ 32.316537] show_stack+0x20/0x38 (C) [ 32.316584] dump_stack_lvl+0x8c/0xd0 [ 32.316669] print_report+0x118/0x5e8 [ 32.316727] kasan_report+0xdc/0x128 [ 32.316777] __asan_report_store1_noabort+0x20/0x30 [ 32.316834] krealloc_less_oob_helper+0xae4/0xc50 [ 32.316882] krealloc_large_less_oob+0x20/0x38 [ 32.316938] kunit_try_run_case+0x170/0x3f0 [ 32.316983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.317032] kthread+0x328/0x630 [ 32.317073] ret_from_fork+0x10/0x20 [ 32.317117] [ 32.317137] The buggy address belongs to the physical page: [ 32.317168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.317217] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.317260] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.317309] page_type: f8(unknown) [ 32.317345] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.317401] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.317449] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.317494] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.317540] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.317586] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.317625] page dumped because: kasan: bad access detected [ 32.317979] [ 32.318311] Memory state around the buggy address: [ 32.318695] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.318776] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.318820] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.318856] ^ [ 32.319347] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.319594] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.319727] ================================================================== [ 32.320426] ================================================================== [ 32.320483] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 32.320678] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/194 [ 32.320741] [ 32.320811] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.321232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.321424] Hardware name: linux,dummy-virt (DT) [ 32.321477] Call trace: [ 32.321516] show_stack+0x20/0x38 (C) [ 32.321574] dump_stack_lvl+0x8c/0xd0 [ 32.321620] print_report+0x118/0x5e8 [ 32.322081] kasan_report+0xdc/0x128 [ 32.322161] __asan_report_store1_noabort+0x20/0x30 [ 32.322437] krealloc_less_oob_helper+0xa58/0xc50 [ 32.322717] krealloc_large_less_oob+0x20/0x38 [ 32.322791] kunit_try_run_case+0x170/0x3f0 [ 32.322967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.323090] kthread+0x328/0x630 [ 32.323285] ret_from_fork+0x10/0x20 [ 32.323496] [ 32.323551] The buggy address belongs to the physical page: [ 32.323914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.324135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.324349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.324526] page_type: f8(unknown) [ 32.324673] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.324884] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.325016] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.325169] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.325295] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.325491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.325697] page dumped because: kasan: bad access detected [ 32.325737] [ 32.325755] Memory state around the buggy address: [ 32.326096] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.326318] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.326392] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.326666] ^ [ 32.326815] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.327121] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.327240] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 32.273726] ================================================================== [ 32.273878] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.273940] Write of size 1 at addr fff00000c9b260eb by task kunit_try_catch/192 [ 32.274129] [ 32.274164] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.274381] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.274576] Hardware name: linux,dummy-virt (DT) [ 32.274620] Call trace: [ 32.274701] show_stack+0x20/0x38 (C) [ 32.274752] dump_stack_lvl+0x8c/0xd0 [ 32.274799] print_report+0x118/0x5e8 [ 32.274881] kasan_report+0xdc/0x128 [ 32.275039] __asan_report_store1_noabort+0x20/0x30 [ 32.275361] krealloc_more_oob_helper+0x60c/0x678 [ 32.275512] krealloc_large_more_oob+0x20/0x38 [ 32.275703] kunit_try_run_case+0x170/0x3f0 [ 32.275785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275889] kthread+0x328/0x630 [ 32.275934] ret_from_fork+0x10/0x20 [ 32.276422] [ 32.276552] The buggy address belongs to the physical page: [ 32.276717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.276855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.276930] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.277170] page_type: f8(unknown) [ 32.277345] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.277463] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.277673] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.277780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.277937] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.278023] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.278338] page dumped because: kasan: bad access detected [ 32.278537] [ 32.278629] Memory state around the buggy address: [ 32.278766] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.278875] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.279039] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.279079] ^ [ 32.279140] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.279196] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.279370] ================================================================== [ 32.201519] ================================================================== [ 32.201604] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.201734] Write of size 1 at addr fff00000c8754cf0 by task kunit_try_catch/188 [ 32.201784] [ 32.201815] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.201899] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.201935] Hardware name: linux,dummy-virt (DT) [ 32.201965] Call trace: [ 32.201986] show_stack+0x20/0x38 (C) [ 32.202032] dump_stack_lvl+0x8c/0xd0 [ 32.202078] print_report+0x118/0x5e8 [ 32.202121] kasan_report+0xdc/0x128 [ 32.202171] __asan_report_store1_noabort+0x20/0x30 [ 32.202224] krealloc_more_oob_helper+0x5c0/0x678 [ 32.202273] krealloc_more_oob+0x20/0x38 [ 32.202318] kunit_try_run_case+0x170/0x3f0 [ 32.202362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.202412] kthread+0x328/0x630 [ 32.202461] ret_from_fork+0x10/0x20 [ 32.202506] [ 32.202525] Allocated by task 188: [ 32.202558] kasan_save_stack+0x3c/0x68 [ 32.202605] kasan_save_track+0x20/0x40 [ 32.202649] kasan_save_alloc_info+0x40/0x58 [ 32.202685] __kasan_krealloc+0x118/0x178 [ 32.202719] krealloc_noprof+0x128/0x360 [ 32.202757] krealloc_more_oob_helper+0x168/0x678 [ 32.202796] krealloc_more_oob+0x20/0x38 [ 32.202832] kunit_try_run_case+0x170/0x3f0 [ 32.202878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.202919] kthread+0x328/0x630 [ 32.203525] ret_from_fork+0x10/0x20 [ 32.203586] [ 32.203607] The buggy address belongs to the object at fff00000c8754c00 [ 32.203607] which belongs to the cache kmalloc-256 of size 256 [ 32.204098] The buggy address is located 5 bytes to the right of [ 32.204098] allocated 235-byte region [fff00000c8754c00, fff00000c8754ceb) [ 32.204271] [ 32.204357] The buggy address belongs to the physical page: [ 32.204447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.204548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.204778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.205083] page_type: f5(slab) [ 32.205153] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.205246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.206010] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.206463] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.206740] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.207127] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.207174] page dumped because: kasan: bad access detected [ 32.207429] [ 32.207637] Memory state around the buggy address: [ 32.207738] fff00000c8754b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207785] fff00000c8754c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.207879] >fff00000c8754c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.208019] ^ [ 32.208390] fff00000c8754d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.208492] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.208721] ================================================================== [ 32.280671] ================================================================== [ 32.280769] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.280825] Write of size 1 at addr fff00000c9b260f0 by task kunit_try_catch/192 [ 32.280882] [ 32.280911] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.281315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.281359] Hardware name: linux,dummy-virt (DT) [ 32.281705] Call trace: [ 32.281933] show_stack+0x20/0x38 (C) [ 32.282151] dump_stack_lvl+0x8c/0xd0 [ 32.282212] print_report+0x118/0x5e8 [ 32.282257] kasan_report+0xdc/0x128 [ 32.282334] __asan_report_store1_noabort+0x20/0x30 [ 32.282387] krealloc_more_oob_helper+0x5c0/0x678 [ 32.282436] krealloc_large_more_oob+0x20/0x38 [ 32.282527] kunit_try_run_case+0x170/0x3f0 [ 32.282583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.282634] kthread+0x328/0x630 [ 32.282685] ret_from_fork+0x10/0x20 [ 32.282730] [ 32.282749] The buggy address belongs to the physical page: [ 32.282780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b24 [ 32.282838] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.282881] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.282929] page_type: f8(unknown) [ 32.283109] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.283156] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.283593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.283767] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.283853] head: 0bfffe0000000002 ffffc1ffc326c901 00000000ffffffff 00000000ffffffff [ 32.284035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.284085] page dumped because: kasan: bad access detected [ 32.284114] [ 32.284379] Memory state around the buggy address: [ 32.284534] fff00000c9b25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.284587] fff00000c9b26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.284840] >fff00000c9b26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.284931] ^ [ 32.285099] fff00000c9b26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.285166] fff00000c9b26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.285252] ================================================================== [ 32.189566] ================================================================== [ 32.189626] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.189697] Write of size 1 at addr fff00000c8754ceb by task kunit_try_catch/188 [ 32.190165] [ 32.190297] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.190439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.190786] Hardware name: linux,dummy-virt (DT) [ 32.190945] Call trace: [ 32.191027] show_stack+0x20/0x38 (C) [ 32.191138] dump_stack_lvl+0x8c/0xd0 [ 32.191246] print_report+0x118/0x5e8 [ 32.191397] kasan_report+0xdc/0x128 [ 32.191461] __asan_report_store1_noabort+0x20/0x30 [ 32.191542] krealloc_more_oob_helper+0x60c/0x678 [ 32.191593] krealloc_more_oob+0x20/0x38 [ 32.191649] kunit_try_run_case+0x170/0x3f0 [ 32.192052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.192320] kthread+0x328/0x630 [ 32.192456] ret_from_fork+0x10/0x20 [ 32.192741] [ 32.192893] Allocated by task 188: [ 32.192965] kasan_save_stack+0x3c/0x68 [ 32.193297] kasan_save_track+0x20/0x40 [ 32.193408] kasan_save_alloc_info+0x40/0x58 [ 32.193527] __kasan_krealloc+0x118/0x178 [ 32.193736] krealloc_noprof+0x128/0x360 [ 32.194014] krealloc_more_oob_helper+0x168/0x678 [ 32.194264] krealloc_more_oob+0x20/0x38 [ 32.194340] kunit_try_run_case+0x170/0x3f0 [ 32.194473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.194534] kthread+0x328/0x630 [ 32.194574] ret_from_fork+0x10/0x20 [ 32.194609] [ 32.194629] The buggy address belongs to the object at fff00000c8754c00 [ 32.194629] which belongs to the cache kmalloc-256 of size 256 [ 32.194698] The buggy address is located 0 bytes to the right of [ 32.194698] allocated 235-byte region [fff00000c8754c00, fff00000c8754ceb) [ 32.194769] [ 32.194798] The buggy address belongs to the physical page: [ 32.194835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108754 [ 32.194886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.194936] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.195160] page_type: f5(slab) [ 32.195498] raw: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.195781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.195960] head: 0bfffe0000000040 fff00000c0001b40 ffffc1ffc311d680 dead000000000002 [ 32.196064] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.196224] head: 0bfffe0000000001 ffffc1ffc321d501 00000000ffffffff 00000000ffffffff [ 32.196334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.196606] page dumped because: kasan: bad access detected [ 32.196746] [ 32.196908] Memory state around the buggy address: [ 32.197032] fff00000c8754b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197194] fff00000c8754c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.197461] >fff00000c8754c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.197555] ^ [ 32.197744] fff00000c8754d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197930] fff00000c8754d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.198089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 32.169325] ================================================================== [ 32.169390] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 32.169452] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/186 [ 32.169501] [ 32.169536] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.169657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.169723] Hardware name: linux,dummy-virt (DT) [ 32.169756] Call trace: [ 32.169788] show_stack+0x20/0x38 (C) [ 32.170117] dump_stack_lvl+0x8c/0xd0 [ 32.170412] print_report+0x118/0x5e8 [ 32.170705] kasan_report+0xdc/0x128 [ 32.171012] __asan_report_load1_noabort+0x20/0x30 [ 32.171091] page_alloc_uaf+0x328/0x350 [ 32.171395] kunit_try_run_case+0x170/0x3f0 [ 32.171969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.172430] kthread+0x328/0x630 [ 32.172499] ret_from_fork+0x10/0x20 [ 32.173635] [ 32.173743] The buggy address belongs to the physical page: [ 32.173863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40 [ 32.173942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.174025] page_type: f0(buddy) [ 32.174386] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000 [ 32.174543] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 32.174851] page dumped because: kasan: bad access detected [ 32.175274] [ 32.175402] Memory state around the buggy address: [ 32.175449] fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.175772] fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.175926] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.176041] ^ [ 32.176285] fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.176695] fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.176740] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 32.144264] ================================================================== [ 32.144353] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 32.144628] Free of addr fff00000c99a0001 by task kunit_try_catch/182 [ 32.145114] [ 32.145451] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.145637] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.145702] Hardware name: linux,dummy-virt (DT) [ 32.145794] Call trace: [ 32.145843] show_stack+0x20/0x38 (C) [ 32.145895] dump_stack_lvl+0x8c/0xd0 [ 32.146070] print_report+0x118/0x5e8 [ 32.146161] kasan_report_invalid_free+0xc0/0xe8 [ 32.146226] __kasan_kfree_large+0x5c/0xa8 [ 32.146272] free_large_kmalloc+0x68/0x150 [ 32.146473] kfree+0x270/0x3c8 [ 32.146695] kmalloc_large_invalid_free+0x108/0x270 [ 32.146761] kunit_try_run_case+0x170/0x3f0 [ 32.146868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.147158] kthread+0x328/0x630 [ 32.147371] ret_from_fork+0x10/0x20 [ 32.147753] [ 32.147961] The buggy address belongs to the physical page: [ 32.148098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0 [ 32.148803] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.149001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.149319] page_type: f8(unknown) [ 32.149611] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.149712] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.149819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.150025] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.150132] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff [ 32.150300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.150348] page dumped because: kasan: bad access detected [ 32.150394] [ 32.150412] Memory state around the buggy address: [ 32.150445] fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.150497] fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.150552] >fff00000c99a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.150588] ^ [ 32.150626] fff00000c99a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.150694] fff00000c99a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.150745] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 32.126462] ================================================================== [ 32.126589] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 32.126660] Read of size 1 at addr fff00000c99a0000 by task kunit_try_catch/180 [ 32.126903] [ 32.126951] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.127039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.127097] Hardware name: linux,dummy-virt (DT) [ 32.127376] Call trace: [ 32.127577] show_stack+0x20/0x38 (C) [ 32.127801] dump_stack_lvl+0x8c/0xd0 [ 32.128044] print_report+0x118/0x5e8 [ 32.128118] kasan_report+0xdc/0x128 [ 32.128275] __asan_report_load1_noabort+0x20/0x30 [ 32.128357] kmalloc_large_uaf+0x2cc/0x2f8 [ 32.128505] kunit_try_run_case+0x170/0x3f0 [ 32.128565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.128793] kthread+0x328/0x630 [ 32.129032] ret_from_fork+0x10/0x20 [ 32.129115] [ 32.129274] The buggy address belongs to the physical page: [ 32.129416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0 [ 32.129855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.130126] raw: 0bfffe0000000000 fff00000da470d00 fff00000da470d00 0000000000000000 [ 32.130322] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 32.130363] page dumped because: kasan: bad access detected [ 32.130772] [ 32.131007] Memory state around the buggy address: [ 32.131116] fff00000c999ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.131300] fff00000c999ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.131344] >fff00000c99a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.131402] ^ [ 32.131650] fff00000c99a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.131876] fff00000c99a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.132030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 32.110106] ================================================================== [ 32.110174] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 32.110228] Write of size 1 at addr fff00000c99a200a by task kunit_try_catch/178 [ 32.110276] [ 32.110308] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.110394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.110423] Hardware name: linux,dummy-virt (DT) [ 32.110452] Call trace: [ 32.110474] show_stack+0x20/0x38 (C) [ 32.110520] dump_stack_lvl+0x8c/0xd0 [ 32.110864] print_report+0x118/0x5e8 [ 32.111706] kasan_report+0xdc/0x128 [ 32.111803] __asan_report_store1_noabort+0x20/0x30 [ 32.112368] kmalloc_large_oob_right+0x278/0x2b8 [ 32.112456] kunit_try_run_case+0x170/0x3f0 [ 32.112868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.112974] kthread+0x328/0x630 [ 32.113128] ret_from_fork+0x10/0x20 [ 32.113249] [ 32.113592] The buggy address belongs to the physical page: [ 32.113882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a0 [ 32.114056] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.114126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.114590] page_type: f8(unknown) [ 32.114688] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.114748] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.115014] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.115191] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.115280] head: 0bfffe0000000002 ffffc1ffc3266801 00000000ffffffff 00000000ffffffff [ 32.115328] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.115374] page dumped because: kasan: bad access detected [ 32.115404] [ 32.115580] Memory state around the buggy address: [ 32.115775] fff00000c99a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.115964] fff00000c99a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.116202] >fff00000c99a2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.116624] ^ [ 32.116721] fff00000c99a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.116974] fff00000c99a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.117020] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 32.093346] ================================================================== [ 32.093409] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.093466] Write of size 1 at addr fff00000c6465f00 by task kunit_try_catch/176 [ 32.093515] [ 32.093546] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.093631] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.094153] Hardware name: linux,dummy-virt (DT) [ 32.094196] Call trace: [ 32.094219] show_stack+0x20/0x38 (C) [ 32.094290] dump_stack_lvl+0x8c/0xd0 [ 32.094787] print_report+0x118/0x5e8 [ 32.094831] kasan_report+0xdc/0x128 [ 32.094873] __asan_report_store1_noabort+0x20/0x30 [ 32.094920] kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.095168] kunit_try_run_case+0x170/0x3f0 [ 32.095216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.095275] kthread+0x328/0x630 [ 32.095387] ret_from_fork+0x10/0x20 [ 32.095495] [ 32.095668] Allocated by task 176: [ 32.095830] kasan_save_stack+0x3c/0x68 [ 32.096072] kasan_save_track+0x20/0x40 [ 32.096213] kasan_save_alloc_info+0x40/0x58 [ 32.096250] __kasan_kmalloc+0xd4/0xd8 [ 32.096283] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.096692] kmalloc_big_oob_right+0xb8/0x2f0 [ 32.096734] kunit_try_run_case+0x170/0x3f0 [ 32.097098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.097713] kthread+0x328/0x630 [ 32.097996] ret_from_fork+0x10/0x20 [ 32.098039] [ 32.098271] The buggy address belongs to the object at fff00000c6464000 [ 32.098271] which belongs to the cache kmalloc-8k of size 8192 [ 32.098584] The buggy address is located 0 bytes to the right of [ 32.098584] allocated 7936-byte region [fff00000c6464000, fff00000c6465f00) [ 32.098911] [ 32.099027] The buggy address belongs to the physical page: [ 32.099165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 32.099239] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.099449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.099606] page_type: f5(slab) [ 32.099699] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 32.099774] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.099830] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 32.099877] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.099923] head: 0bfffe0000000003 ffffc1ffc3191801 00000000ffffffff 00000000ffffffff [ 32.100301] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.100357] page dumped because: kasan: bad access detected [ 32.100389] [ 32.100407] Memory state around the buggy address: [ 32.100440] fff00000c6465e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.100483] fff00000c6465e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.100523] >fff00000c6465f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.100559] ^ [ 32.100586] fff00000c6465f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.100626] fff00000c6466000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.100678] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 32.064271] ================================================================== [ 32.064330] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.064384] Write of size 1 at addr fff00000c9726278 by task kunit_try_catch/174 [ 32.064433] [ 32.064465] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.064550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.064579] Hardware name: linux,dummy-virt (DT) [ 32.064608] Call trace: [ 32.064630] show_stack+0x20/0x38 (C) [ 32.064695] dump_stack_lvl+0x8c/0xd0 [ 32.065213] print_report+0x118/0x5e8 [ 32.067514] kasan_report+0xdc/0x128 [ 32.067673] __asan_report_store1_noabort+0x20/0x30 [ 32.067751] kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.067805] kunit_try_run_case+0x170/0x3f0 [ 32.068334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.068691] kthread+0x328/0x630 [ 32.068738] ret_from_fork+0x10/0x20 [ 32.069170] [ 32.069531] Allocated by task 174: [ 32.069748] kasan_save_stack+0x3c/0x68 [ 32.069793] kasan_save_track+0x20/0x40 [ 32.070223] kasan_save_alloc_info+0x40/0x58 [ 32.070265] __kasan_kmalloc+0xd4/0xd8 [ 32.070732] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.070792] kmalloc_track_caller_oob_right+0xa8/0x488 [ 32.071117] kunit_try_run_case+0x170/0x3f0 [ 32.071162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.071203] kthread+0x328/0x630 [ 32.071508] ret_from_fork+0x10/0x20 [ 32.071550] [ 32.071569] The buggy address belongs to the object at fff00000c9726200 [ 32.071569] which belongs to the cache kmalloc-128 of size 128 [ 32.071689] The buggy address is located 0 bytes to the right of [ 32.071689] allocated 120-byte region [fff00000c9726200, fff00000c9726278) [ 32.071754] [ 32.071774] The buggy address belongs to the physical page: [ 32.071992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.072328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.072507] page_type: f5(slab) [ 32.072605] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.072845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.073065] page dumped because: kasan: bad access detected [ 32.073123] [ 32.073141] Memory state around the buggy address: [ 32.073174] fff00000c9726100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.073217] fff00000c9726180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.073258] >fff00000c9726200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.073294] ^ [ 32.073334] fff00000c9726280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.074042] fff00000c9726300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.074084] ================================================================== [ 32.076334] ================================================================== [ 32.076858] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 32.076928] Write of size 1 at addr fff00000c9726378 by task kunit_try_catch/174 [ 32.076985] [ 32.077359] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.077463] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.077685] Hardware name: linux,dummy-virt (DT) [ 32.077848] Call trace: [ 32.078050] show_stack+0x20/0x38 (C) [ 32.078125] dump_stack_lvl+0x8c/0xd0 [ 32.078171] print_report+0x118/0x5e8 [ 32.078215] kasan_report+0xdc/0x128 [ 32.078257] __asan_report_store1_noabort+0x20/0x30 [ 32.078305] kmalloc_track_caller_oob_right+0x418/0x488 [ 32.078355] kunit_try_run_case+0x170/0x3f0 [ 32.078401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.078452] kthread+0x328/0x630 [ 32.078492] ret_from_fork+0x10/0x20 [ 32.078540] [ 32.078558] Allocated by task 174: [ 32.078585] kasan_save_stack+0x3c/0x68 [ 32.078622] kasan_save_track+0x20/0x40 [ 32.078668] kasan_save_alloc_info+0x40/0x58 [ 32.078704] __kasan_kmalloc+0xd4/0xd8 [ 32.078736] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.078781] kmalloc_track_caller_oob_right+0x184/0x488 [ 32.078823] kunit_try_run_case+0x170/0x3f0 [ 32.078859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.078899] kthread+0x328/0x630 [ 32.078937] ret_from_fork+0x10/0x20 [ 32.078972] [ 32.078991] The buggy address belongs to the object at fff00000c9726300 [ 32.078991] which belongs to the cache kmalloc-128 of size 128 [ 32.079045] The buggy address is located 0 bytes to the right of [ 32.079045] allocated 120-byte region [fff00000c9726300, fff00000c9726378) [ 32.079105] [ 32.079124] The buggy address belongs to the physical page: [ 32.079156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109726 [ 32.079203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.079247] page_type: f5(slab) [ 32.079283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.079331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.079369] page dumped because: kasan: bad access detected [ 32.079400] [ 32.079420] Memory state around the buggy address: [ 32.079451] fff00000c9726200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.079493] fff00000c9726280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.079534] >fff00000c9726300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.079569] ^ [ 32.079607] fff00000c9726380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.079812] fff00000c9726400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.079863] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 32.051663] ================================================================== [ 32.052063] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 32.052135] Read of size 1 at addr fff00000c9af1000 by task kunit_try_catch/172 [ 32.052293] [ 32.052329] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 32.052421] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.052539] Hardware name: linux,dummy-virt (DT) [ 32.052609] Call trace: [ 32.052690] show_stack+0x20/0x38 (C) [ 32.052817] dump_stack_lvl+0x8c/0xd0 [ 32.052867] print_report+0x118/0x5e8 [ 32.052920] kasan_report+0xdc/0x128 [ 32.053023] __asan_report_load1_noabort+0x20/0x30 [ 32.053337] kmalloc_node_oob_right+0x2f4/0x330 [ 32.053397] kunit_try_run_case+0x170/0x3f0 [ 32.053444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.053495] kthread+0x328/0x630 [ 32.053535] ret_from_fork+0x10/0x20 [ 32.053582] [ 32.053601] Allocated by task 172: [ 32.053661] kasan_save_stack+0x3c/0x68 [ 32.053702] kasan_save_track+0x20/0x40 [ 32.053780] kasan_save_alloc_info+0x40/0x58 [ 32.053818] __kasan_kmalloc+0xd4/0xd8 [ 32.053851] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 32.053892] kmalloc_node_oob_right+0xbc/0x330 [ 32.053936] kunit_try_run_case+0x170/0x3f0 [ 32.054112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.054217] kthread+0x328/0x630 [ 32.054279] ret_from_fork+0x10/0x20 [ 32.054422] [ 32.054440] The buggy address belongs to the object at fff00000c9af0000 [ 32.054440] which belongs to the cache kmalloc-4k of size 4096 [ 32.054495] The buggy address is located 0 bytes to the right of [ 32.054495] allocated 4096-byte region [fff00000c9af0000, fff00000c9af1000) [ 32.054555] [ 32.054574] The buggy address belongs to the physical page: [ 32.055166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 32.055288] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.055345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.055407] page_type: f5(slab) [ 32.055445] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 32.055492] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.055544] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 32.055590] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.055636] head: 0bfffe0000000003 ffffc1ffc326bc01 00000000ffffffff 00000000ffffffff [ 32.055989] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.056034] page dumped because: kasan: bad access detected [ 32.056063] [ 32.056082] Memory state around the buggy address: [ 32.056114] fff00000c9af0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.056156] fff00000c9af0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.056197] >fff00000c9af1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.056233] ^ [ 32.056260] fff00000c9af1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.056300] fff00000c9af1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.056335] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 112.872657] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/690 [ 112.876079] Modules linked in: [ 112.878854] CPU: 0 UID: 0 PID: 690 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 112.880568] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 112.881090] Hardware name: linux,dummy-virt (DT) [ 112.881292] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.881560] pc : intlog10+0x38/0x48 [ 112.882004] lr : intlog10_test+0xe4/0x200 [ 112.882433] sp : ffff8000823f7c10 [ 112.882808] x29: ffff8000823f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 112.883696] x26: 1ffe000018398081 x25: 0000000000000000 x24: ffff8000823f7ce0 [ 112.884576] x23: ffff8000823f7d00 x22: 0000000000000000 x21: 1ffff0001047ef82 [ 112.885097] x20: ffff9501ed262020 x19: ffff800080087990 x18: 0000000095a87931 [ 112.885600] x17: 00000000f852d050 x16: fff00000c5e0303c x15: fff00000ff616b48 [ 112.886402] x14: 0000000000018fff x13: 1ffe00001b48d9dd x12: ffff72a03e22d389 [ 112.887151] x11: 1ffff2a03e22d388 x10: ffff72a03e22d388 x9 : ffff9501ea85ac0c [ 112.887940] x8 : ffff9501f1169c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 112.888764] x5 : ffff70001047ef82 x4 : 1ffff00010010f3b x3 : 1ffff2a03da4c404 [ 112.889481] x2 : 1ffff2a03da4c404 x1 : 0000000000000003 x0 : 0000000000000000 [ 112.889841] Call trace: [ 112.890405] intlog10+0x38/0x48 (P) [ 112.890831] kunit_try_run_case+0x170/0x3f0 [ 112.891366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.892007] kthread+0x328/0x630 [ 112.892392] ret_from_fork+0x10/0x20 [ 112.892790] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 112.821254] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/672 [ 112.823366] Modules linked in: [ 112.823729] CPU: 0 UID: 0 PID: 672 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc7-next-20250725 #1 PREEMPT [ 112.825185] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 112.825881] Hardware name: linux,dummy-virt (DT) [ 112.826467] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.827287] pc : intlog2+0xd8/0xf8 [ 112.827877] lr : intlog2_test+0xe4/0x200 [ 112.828378] sp : ffff800082307c10 [ 112.828742] x29: ffff800082307c90 x28: 0000000000000000 x27: 0000000000000000 [ 112.829629] x26: 1ffe000018f37461 x25: 0000000000000000 x24: ffff800082307ce0 [ 112.830571] x23: ffff800082307d00 x22: 0000000000000000 x21: 1ffff00010460f82 [ 112.831473] x20: ffff9501ed261f20 x19: ffff800080087990 x18: 00000000a79f54b9 [ 112.832361] x17: 0000000012bb99d2 x16: fff00000c5e0303c x15: 00000000c5b604d8 [ 112.833242] x14: 00000000f1f1f1f1 x13: 1ffe00001b48d9dd x12: ffff72a03e22d389 [ 112.833597] x11: 1ffff2a03e22d388 x10: ffff72a03e22d388 x9 : ffff9501ea85ae0c [ 112.833955] x8 : ffff9501f1169c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 112.834296] x5 : ffff700010460f82 x4 : 1ffff00010010f3b x3 : 1ffff2a03da4c3e4 [ 112.834635] x2 : 1ffff2a03da4c3e4 x1 : 0000000000000003 x0 : 0000000000000000 [ 112.835458] Call trace: [ 112.835780] intlog2+0xd8/0xf8 (P) [ 112.836268] kunit_try_run_case+0x170/0x3f0 [ 112.836856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.837506] kthread+0x328/0x630 [ 112.837975] ret_from_fork+0x10/0x20 [ 112.838486] ---[ end trace 0000000000000000 ]---