Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 30.615747] ================================================================== [ 30.625431] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.632804] Read of size 1 at addr ffff000801e28473 by task kunit_try_catch/241 [ 30.640094] [ 30.641582] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.641636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.641654] Hardware name: WinLink E850-96 board (DT) [ 30.641677] Call trace: [ 30.641694] show_stack+0x20/0x38 (C) [ 30.641731] dump_stack_lvl+0x8c/0xd0 [ 30.641772] print_report+0x118/0x608 [ 30.641808] kasan_report+0xdc/0x128 [ 30.641845] __asan_report_load1_noabort+0x20/0x30 [ 30.641883] ksize_unpoisons_memory+0x628/0x740 [ 30.641916] kunit_try_run_case+0x170/0x3f0 [ 30.641953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641993] kthread+0x328/0x630 [ 30.642023] ret_from_fork+0x10/0x20 [ 30.642057] [ 30.704764] Allocated by task 241: [ 30.708151] kasan_save_stack+0x3c/0x68 [ 30.711969] kasan_save_track+0x20/0x40 [ 30.715788] kasan_save_alloc_info+0x40/0x58 [ 30.720040] __kasan_kmalloc+0xd4/0xd8 [ 30.723773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.728286] ksize_unpoisons_memory+0xc0/0x740 [ 30.732714] kunit_try_run_case+0x170/0x3f0 [ 30.736880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.742349] kthread+0x328/0x630 [ 30.745561] ret_from_fork+0x10/0x20 [ 30.749120] [ 30.750598] The buggy address belongs to the object at ffff000801e28400 [ 30.750598] which belongs to the cache kmalloc-128 of size 128 [ 30.763098] The buggy address is located 0 bytes to the right of [ 30.763098] allocated 115-byte region [ffff000801e28400, ffff000801e28473) [ 30.776029] [ 30.777508] The buggy address belongs to the physical page: [ 30.783064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 30.791049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.798687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.805632] page_type: f5(slab) [ 30.808769] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.816489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.824216] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 30.832025] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.839837] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 30.847650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.855455] page dumped because: kasan: bad access detected [ 30.861010] [ 30.862486] Memory state around the buggy address: [ 30.867268] ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.874469] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881675] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.888875] ^ [ 30.895736] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.902941] ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.910144] ================================================================== [ 30.917551] ================================================================== [ 30.924562] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.931930] Read of size 1 at addr ffff000801e28478 by task kunit_try_catch/241 [ 30.939221] [ 30.940709] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.940767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.940785] Hardware name: WinLink E850-96 board (DT) [ 30.940806] Call trace: [ 30.940820] show_stack+0x20/0x38 (C) [ 30.940859] dump_stack_lvl+0x8c/0xd0 [ 30.940897] print_report+0x118/0x608 [ 30.940933] kasan_report+0xdc/0x128 [ 30.940970] __asan_report_load1_noabort+0x20/0x30 [ 30.941009] ksize_unpoisons_memory+0x618/0x740 [ 30.941041] kunit_try_run_case+0x170/0x3f0 [ 30.941080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.941120] kthread+0x328/0x630 [ 30.941150] ret_from_fork+0x10/0x20 [ 30.941185] [ 31.003890] Allocated by task 241: [ 31.007278] kasan_save_stack+0x3c/0x68 [ 31.011095] kasan_save_track+0x20/0x40 [ 31.014916] kasan_save_alloc_info+0x40/0x58 [ 31.019168] __kasan_kmalloc+0xd4/0xd8 [ 31.022901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.027414] ksize_unpoisons_memory+0xc0/0x740 [ 31.031841] kunit_try_run_case+0x170/0x3f0 [ 31.036007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.041476] kthread+0x328/0x630 [ 31.044688] ret_from_fork+0x10/0x20 [ 31.048247] [ 31.049724] The buggy address belongs to the object at ffff000801e28400 [ 31.049724] which belongs to the cache kmalloc-128 of size 128 [ 31.062225] The buggy address is located 5 bytes to the right of [ 31.062225] allocated 115-byte region [ffff000801e28400, ffff000801e28473) [ 31.075157] [ 31.076636] The buggy address belongs to the physical page: [ 31.082192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 31.090176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.097816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.104758] page_type: f5(slab) [ 31.107895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.115614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.123341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.131152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.138965] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 31.146777] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.154582] page dumped because: kasan: bad access detected [ 31.160138] [ 31.161613] Memory state around the buggy address: [ 31.166395] ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.173596] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180803] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.188002] ^ [ 31.195124] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.202329] ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.209531] ================================================================== [ 31.216864] ================================================================== [ 31.223942] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.231318] Read of size 1 at addr ffff000801e2847f by task kunit_try_catch/241 [ 31.238609] [ 31.240094] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 31.240149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.240166] Hardware name: WinLink E850-96 board (DT) [ 31.240186] Call trace: [ 31.240200] show_stack+0x20/0x38 (C) [ 31.240232] dump_stack_lvl+0x8c/0xd0 [ 31.240271] print_report+0x118/0x608 [ 31.240303] kasan_report+0xdc/0x128 [ 31.240336] __asan_report_load1_noabort+0x20/0x30 [ 31.240374] ksize_unpoisons_memory+0x690/0x740 [ 31.240405] kunit_try_run_case+0x170/0x3f0 [ 31.240440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.240478] kthread+0x328/0x630 [ 31.240505] ret_from_fork+0x10/0x20 [ 31.240540] [ 31.303278] Allocated by task 241: [ 31.306666] kasan_save_stack+0x3c/0x68 [ 31.310484] kasan_save_track+0x20/0x40 [ 31.314302] kasan_save_alloc_info+0x40/0x58 [ 31.318556] __kasan_kmalloc+0xd4/0xd8 [ 31.322288] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.326802] ksize_unpoisons_memory+0xc0/0x740 [ 31.331230] kunit_try_run_case+0x170/0x3f0 [ 31.335396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.340864] kthread+0x328/0x630 [ 31.344076] ret_from_fork+0x10/0x20 [ 31.347635] [ 31.349113] The buggy address belongs to the object at ffff000801e28400 [ 31.349113] which belongs to the cache kmalloc-128 of size 128 [ 31.361612] The buggy address is located 12 bytes to the right of [ 31.361612] allocated 115-byte region [ffff000801e28400, ffff000801e28473) [ 31.374631] [ 31.376108] The buggy address belongs to the physical page: [ 31.381667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 31.389650] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.397289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.404231] page_type: f5(slab) [ 31.407369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.415089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.422815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 31.430627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.438440] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 31.446252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.454057] page dumped because: kasan: bad access detected [ 31.459613] [ 31.461088] Memory state around the buggy address: [ 31.465868] ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.473071] ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.480277] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.487477] ^ [ 31.494598] ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.501803] ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.509004] ==================================================================
[ 25.720616] ================================================================== [ 25.720738] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 25.720865] Read of size 1 at addr fff00000c6507973 by task kunit_try_catch/194 [ 25.721019] [ 25.721109] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.721499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.722257] Hardware name: linux,dummy-virt (DT) [ 25.722453] Call trace: [ 25.722617] show_stack+0x20/0x38 (C) [ 25.722916] dump_stack_lvl+0x8c/0xd0 [ 25.723081] print_report+0x118/0x608 [ 25.723697] kasan_report+0xdc/0x128 [ 25.724043] __asan_report_load1_noabort+0x20/0x30 [ 25.724185] ksize_unpoisons_memory+0x628/0x740 [ 25.724561] kunit_try_run_case+0x170/0x3f0 [ 25.724737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.724899] kthread+0x328/0x630 [ 25.725050] ret_from_fork+0x10/0x20 [ 25.725284] [ 25.725335] Allocated by task 194: [ 25.725409] kasan_save_stack+0x3c/0x68 [ 25.725518] kasan_save_track+0x20/0x40 [ 25.725611] kasan_save_alloc_info+0x40/0x58 [ 25.725775] __kasan_kmalloc+0xd4/0xd8 [ 25.726065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.726174] ksize_unpoisons_memory+0xc0/0x740 [ 25.726268] kunit_try_run_case+0x170/0x3f0 [ 25.726357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.726518] kthread+0x328/0x630 [ 25.726611] ret_from_fork+0x10/0x20 [ 25.726705] [ 25.726764] The buggy address belongs to the object at fff00000c6507900 [ 25.726764] which belongs to the cache kmalloc-128 of size 128 [ 25.727170] The buggy address is located 0 bytes to the right of [ 25.727170] allocated 115-byte region [fff00000c6507900, fff00000c6507973) [ 25.727608] [ 25.727672] The buggy address belongs to the physical page: [ 25.727880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 25.728052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.728868] page_type: f5(slab) [ 25.729290] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.729466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.729569] page dumped because: kasan: bad access detected [ 25.729648] [ 25.729696] Memory state around the buggy address: [ 25.730204] fff00000c6507800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.730547] fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.730671] >fff00000c6507900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.731116] ^ [ 25.731265] fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.731535] fff00000c6507a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.731960] ================================================================== [ 25.734798] ================================================================== [ 25.735164] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 25.735282] Read of size 1 at addr fff00000c6507978 by task kunit_try_catch/194 [ 25.735398] [ 25.735474] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.735955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.736179] Hardware name: linux,dummy-virt (DT) [ 25.736296] Call trace: [ 25.736363] show_stack+0x20/0x38 (C) [ 25.736509] dump_stack_lvl+0x8c/0xd0 [ 25.736715] print_report+0x118/0x608 [ 25.736915] kasan_report+0xdc/0x128 [ 25.737054] __asan_report_load1_noabort+0x20/0x30 [ 25.737195] ksize_unpoisons_memory+0x618/0x740 [ 25.737326] kunit_try_run_case+0x170/0x3f0 [ 25.737463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.737617] kthread+0x328/0x630 [ 25.737762] ret_from_fork+0x10/0x20 [ 25.738277] [ 25.738324] Allocated by task 194: [ 25.738413] kasan_save_stack+0x3c/0x68 [ 25.738573] kasan_save_track+0x20/0x40 [ 25.738676] kasan_save_alloc_info+0x40/0x58 [ 25.739011] __kasan_kmalloc+0xd4/0xd8 [ 25.739115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.739230] ksize_unpoisons_memory+0xc0/0x740 [ 25.739335] kunit_try_run_case+0x170/0x3f0 [ 25.739448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.739904] kthread+0x328/0x630 [ 25.740023] ret_from_fork+0x10/0x20 [ 25.740114] [ 25.740164] The buggy address belongs to the object at fff00000c6507900 [ 25.740164] which belongs to the cache kmalloc-128 of size 128 [ 25.740310] The buggy address is located 5 bytes to the right of [ 25.740310] allocated 115-byte region [fff00000c6507900, fff00000c6507973) [ 25.742046] [ 25.742256] The buggy address belongs to the physical page: [ 25.742346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 25.742481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.743305] page_type: f5(slab) [ 25.743434] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.743569] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.744430] page dumped because: kasan: bad access detected [ 25.744823] [ 25.744870] Memory state around the buggy address: [ 25.745580] fff00000c6507800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.745719] fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.746513] >fff00000c6507900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.746621] ^ [ 25.747158] fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.747290] fff00000c6507a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.747708] ================================================================== [ 25.749455] ================================================================== [ 25.749559] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 25.749671] Read of size 1 at addr fff00000c650797f by task kunit_try_catch/194 [ 25.749787] [ 25.749856] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.750084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.750755] Hardware name: linux,dummy-virt (DT) [ 25.750848] Call trace: [ 25.750925] show_stack+0x20/0x38 (C) [ 25.751075] dump_stack_lvl+0x8c/0xd0 [ 25.751565] print_report+0x118/0x608 [ 25.752027] kasan_report+0xdc/0x128 [ 25.752525] __asan_report_load1_noabort+0x20/0x30 [ 25.752817] ksize_unpoisons_memory+0x690/0x740 [ 25.753431] kunit_try_run_case+0x170/0x3f0 [ 25.754503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.754653] kthread+0x328/0x630 [ 25.755246] ret_from_fork+0x10/0x20 [ 25.756220] [ 25.756353] Allocated by task 194: [ 25.756427] kasan_save_stack+0x3c/0x68 [ 25.757096] kasan_save_track+0x20/0x40 [ 25.757245] kasan_save_alloc_info+0x40/0x58 [ 25.757350] __kasan_kmalloc+0xd4/0xd8 [ 25.757459] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.757719] ksize_unpoisons_memory+0xc0/0x740 [ 25.757821] kunit_try_run_case+0x170/0x3f0 [ 25.757964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.758112] kthread+0x328/0x630 [ 25.758363] ret_from_fork+0x10/0x20 [ 25.758503] [ 25.758567] The buggy address belongs to the object at fff00000c6507900 [ 25.758567] which belongs to the cache kmalloc-128 of size 128 [ 25.758827] The buggy address is located 12 bytes to the right of [ 25.758827] allocated 115-byte region [fff00000c6507900, fff00000c6507973) [ 25.759017] [ 25.759074] The buggy address belongs to the physical page: [ 25.759158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 25.759311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.759471] page_type: f5(slab) [ 25.760141] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.760417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.760530] page dumped because: kasan: bad access detected [ 25.760917] [ 25.760979] Memory state around the buggy address: [ 25.761064] fff00000c6507800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.761408] fff00000c6507880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.761590] >fff00000c6507900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.761714] ^ [ 25.762005] fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.762340] fff00000c6507a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.762455] ==================================================================
[ 26.023420] ================================================================== [ 26.023529] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 26.023649] Read of size 1 at addr fff00000c7747778 by task kunit_try_catch/194 [ 26.023768] [ 26.023866] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.024794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.024889] Hardware name: linux,dummy-virt (DT) [ 26.024965] Call trace: [ 26.025020] show_stack+0x20/0x38 (C) [ 26.025234] dump_stack_lvl+0x8c/0xd0 [ 26.025491] print_report+0x118/0x608 [ 26.025692] kasan_report+0xdc/0x128 [ 26.025825] __asan_report_load1_noabort+0x20/0x30 [ 26.025987] ksize_unpoisons_memory+0x618/0x740 [ 26.026117] kunit_try_run_case+0x170/0x3f0 [ 26.026239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.026369] kthread+0x328/0x630 [ 26.026481] ret_from_fork+0x10/0x20 [ 26.028691] [ 26.028747] Allocated by task 194: [ 26.028827] kasan_save_stack+0x3c/0x68 [ 26.028957] kasan_save_track+0x20/0x40 [ 26.029522] kasan_save_alloc_info+0x40/0x58 [ 26.030386] __kasan_kmalloc+0xd4/0xd8 [ 26.031163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.031346] ksize_unpoisons_memory+0xc0/0x740 [ 26.032335] kunit_try_run_case+0x170/0x3f0 [ 26.033279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.033762] kthread+0x328/0x630 [ 26.034039] ret_from_fork+0x10/0x20 [ 26.034633] [ 26.034701] The buggy address belongs to the object at fff00000c7747700 [ 26.034701] which belongs to the cache kmalloc-128 of size 128 [ 26.034857] The buggy address is located 5 bytes to the right of [ 26.034857] allocated 115-byte region [fff00000c7747700, fff00000c7747773) [ 26.035017] [ 26.035064] The buggy address belongs to the physical page: [ 26.035133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747 [ 26.037623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.038495] page_type: f5(slab) [ 26.038594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.039879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.040234] page dumped because: kasan: bad access detected [ 26.040322] [ 26.041023] Memory state around the buggy address: [ 26.041246] fff00000c7747600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.042020] fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.042341] >fff00000c7747700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.043300] ^ [ 26.043579] fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.043797] fff00000c7747800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.043987] ================================================================== [ 26.012486] ================================================================== [ 26.012639] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 26.012780] Read of size 1 at addr fff00000c7747773 by task kunit_try_catch/194 [ 26.013048] [ 26.013167] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.013385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.013458] Hardware name: linux,dummy-virt (DT) [ 26.013533] Call trace: [ 26.013596] show_stack+0x20/0x38 (C) [ 26.013727] dump_stack_lvl+0x8c/0xd0 [ 26.013880] print_report+0x118/0x608 [ 26.014008] kasan_report+0xdc/0x128 [ 26.014124] __asan_report_load1_noabort+0x20/0x30 [ 26.014264] ksize_unpoisons_memory+0x628/0x740 [ 26.014937] kunit_try_run_case+0x170/0x3f0 [ 26.015283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.015455] kthread+0x328/0x630 [ 26.015579] ret_from_fork+0x10/0x20 [ 26.015968] [ 26.016107] Allocated by task 194: [ 26.016206] kasan_save_stack+0x3c/0x68 [ 26.016306] kasan_save_track+0x20/0x40 [ 26.016444] kasan_save_alloc_info+0x40/0x58 [ 26.016617] __kasan_kmalloc+0xd4/0xd8 [ 26.016826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.017034] ksize_unpoisons_memory+0xc0/0x740 [ 26.017727] kunit_try_run_case+0x170/0x3f0 [ 26.018161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.018418] kthread+0x328/0x630 [ 26.018554] ret_from_fork+0x10/0x20 [ 26.019013] [ 26.019071] The buggy address belongs to the object at fff00000c7747700 [ 26.019071] which belongs to the cache kmalloc-128 of size 128 [ 26.019234] The buggy address is located 0 bytes to the right of [ 26.019234] allocated 115-byte region [fff00000c7747700, fff00000c7747773) [ 26.019414] [ 26.019473] The buggy address belongs to the physical page: [ 26.019556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747 [ 26.020231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.020363] page_type: f5(slab) [ 26.020488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.020613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.020710] page dumped because: kasan: bad access detected [ 26.020787] [ 26.020827] Memory state around the buggy address: [ 26.021232] fff00000c7747600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.021471] fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.021632] >fff00000c7747700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.021745] ^ [ 26.021882] fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.022005] fff00000c7747800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.022168] ================================================================== [ 26.045978] ================================================================== [ 26.046083] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 26.046320] Read of size 1 at addr fff00000c774777f by task kunit_try_catch/194 [ 26.046451] [ 26.046522] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.046790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.046883] Hardware name: linux,dummy-virt (DT) [ 26.046957] Call trace: [ 26.047010] show_stack+0x20/0x38 (C) [ 26.047137] dump_stack_lvl+0x8c/0xd0 [ 26.047292] print_report+0x118/0x608 [ 26.047592] kasan_report+0xdc/0x128 [ 26.047939] __asan_report_load1_noabort+0x20/0x30 [ 26.048098] ksize_unpoisons_memory+0x690/0x740 [ 26.048242] kunit_try_run_case+0x170/0x3f0 [ 26.048390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.048553] kthread+0x328/0x630 [ 26.048713] ret_from_fork+0x10/0x20 [ 26.049103] [ 26.049185] Allocated by task 194: [ 26.049320] kasan_save_stack+0x3c/0x68 [ 26.049568] kasan_save_track+0x20/0x40 [ 26.049636] kasan_save_alloc_info+0x40/0x58 [ 26.049690] __kasan_kmalloc+0xd4/0xd8 [ 26.049763] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.049909] ksize_unpoisons_memory+0xc0/0x740 [ 26.050056] kunit_try_run_case+0x170/0x3f0 [ 26.050176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.050300] kthread+0x328/0x630 [ 26.050396] ret_from_fork+0x10/0x20 [ 26.050504] [ 26.050555] The buggy address belongs to the object at fff00000c7747700 [ 26.050555] which belongs to the cache kmalloc-128 of size 128 [ 26.050813] The buggy address is located 12 bytes to the right of [ 26.050813] allocated 115-byte region [fff00000c7747700, fff00000c7747773) [ 26.051274] [ 26.051350] The buggy address belongs to the physical page: [ 26.051464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747 [ 26.051795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.051927] page_type: f5(slab) [ 26.052020] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.052217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.052487] page dumped because: kasan: bad access detected [ 26.052597] [ 26.052638] Memory state around the buggy address: [ 26.052711] fff00000c7747600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.052816] fff00000c7747680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.053669] >fff00000c7747700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.053779] ^ [ 26.054036] fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.054211] fff00000c7747800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.054371] ==================================================================
[ 19.629377] ================================================================== [ 19.630309] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.631219] Read of size 1 at addr ffff888101b20c78 by task kunit_try_catch/212 [ 19.631807] [ 19.632090] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.632215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.632810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.632851] Call Trace: [ 19.632872] <TASK> [ 19.632896] dump_stack_lvl+0x73/0xb0 [ 19.632947] print_report+0xd1/0x650 [ 19.632983] ? __virt_addr_valid+0x1db/0x2d0 [ 19.633017] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.633050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.633081] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.633114] kasan_report+0x141/0x180 [ 19.633146] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.633185] __asan_report_load1_noabort+0x18/0x20 [ 19.633225] ksize_unpoisons_memory+0x7e9/0x9b0 [ 19.633290] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 19.633327] ? finish_task_switch.isra.0+0x153/0x700 [ 19.633359] ? __switch_to+0x47/0xf50 [ 19.633394] ? __schedule+0x10cc/0x2b60 [ 19.633427] ? __pfx_read_tsc+0x10/0x10 [ 19.633456] ? ktime_get_ts64+0x86/0x230 [ 19.633490] kunit_try_run_case+0x1a5/0x480 [ 19.633553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.633588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.633639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.633674] ? __kthread_parkme+0x82/0x180 [ 19.633702] ? preempt_count_sub+0x50/0x80 [ 19.633732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.633768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.633801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.633834] kthread+0x337/0x6f0 [ 19.633862] ? trace_preempt_on+0x20/0xc0 [ 19.633897] ? __pfx_kthread+0x10/0x10 [ 19.633927] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.633959] ? calculate_sigpending+0x7b/0xa0 [ 19.633994] ? __pfx_kthread+0x10/0x10 [ 19.634024] ret_from_fork+0x116/0x1d0 [ 19.634049] ? __pfx_kthread+0x10/0x10 [ 19.634076] ret_from_fork_asm+0x1a/0x30 [ 19.634117] </TASK> [ 19.634132] [ 19.650909] Allocated by task 212: [ 19.651472] kasan_save_stack+0x45/0x70 [ 19.652059] kasan_save_track+0x18/0x40 [ 19.652629] kasan_save_alloc_info+0x3b/0x50 [ 19.653195] __kasan_kmalloc+0xb7/0xc0 [ 19.653728] __kmalloc_cache_noprof+0x189/0x420 [ 19.654363] ksize_unpoisons_memory+0xc7/0x9b0 [ 19.654911] kunit_try_run_case+0x1a5/0x480 [ 19.655456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.656136] kthread+0x337/0x6f0 [ 19.656535] ret_from_fork+0x116/0x1d0 [ 19.656916] ret_from_fork_asm+0x1a/0x30 [ 19.657546] [ 19.657903] The buggy address belongs to the object at ffff888101b20c00 [ 19.657903] which belongs to the cache kmalloc-128 of size 128 [ 19.658954] The buggy address is located 5 bytes to the right of [ 19.658954] allocated 115-byte region [ffff888101b20c00, ffff888101b20c73) [ 19.660133] [ 19.660477] The buggy address belongs to the physical page: [ 19.661134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20 [ 19.661972] flags: 0x200000000000000(node=0|zone=2) [ 19.662495] page_type: f5(slab) [ 19.662902] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.663678] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.664180] page dumped because: kasan: bad access detected [ 19.664879] [ 19.665164] Memory state around the buggy address: [ 19.665804] ffff888101b20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.666533] ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.667186] >ffff888101b20c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.667897] ^ [ 19.668671] ffff888101b20c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.669344] ffff888101b20d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670082] ================================================================== [ 19.673386] ================================================================== [ 19.674150] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 19.674944] Read of size 1 at addr ffff888101b20c7f by task kunit_try_catch/212 [ 19.675736] [ 19.676079] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.676318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.676359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.676457] Call Trace: [ 19.676555] <TASK> [ 19.676608] dump_stack_lvl+0x73/0xb0 [ 19.676729] print_report+0xd1/0x650 [ 19.676836] ? __virt_addr_valid+0x1db/0x2d0 [ 19.676910] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 19.676983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.677041] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 19.677077] kasan_report+0x141/0x180 [ 19.677108] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 19.677148] __asan_report_load1_noabort+0x18/0x20 [ 19.677183] ksize_unpoisons_memory+0x7b6/0x9b0 [ 19.677216] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 19.677295] ? finish_task_switch.isra.0+0x153/0x700 [ 19.677329] ? __switch_to+0x47/0xf50 [ 19.677365] ? __schedule+0x10cc/0x2b60 [ 19.677396] ? __pfx_read_tsc+0x10/0x10 [ 19.677424] ? ktime_get_ts64+0x86/0x230 [ 19.677458] kunit_try_run_case+0x1a5/0x480 [ 19.677494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.677555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.677590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.677636] ? __kthread_parkme+0x82/0x180 [ 19.677665] ? preempt_count_sub+0x50/0x80 [ 19.677695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.677729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.677761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.677794] kthread+0x337/0x6f0 [ 19.677820] ? trace_preempt_on+0x20/0xc0 [ 19.677853] ? __pfx_kthread+0x10/0x10 [ 19.677881] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.677910] ? calculate_sigpending+0x7b/0xa0 [ 19.677943] ? __pfx_kthread+0x10/0x10 [ 19.677971] ret_from_fork+0x116/0x1d0 [ 19.677995] ? __pfx_kthread+0x10/0x10 [ 19.678022] ret_from_fork_asm+0x1a/0x30 [ 19.678063] </TASK> [ 19.678078] [ 19.697200] Allocated by task 212: [ 19.697815] kasan_save_stack+0x45/0x70 [ 19.698350] kasan_save_track+0x18/0x40 [ 19.698800] kasan_save_alloc_info+0x3b/0x50 [ 19.699337] __kasan_kmalloc+0xb7/0xc0 [ 19.699792] __kmalloc_cache_noprof+0x189/0x420 [ 19.700424] ksize_unpoisons_memory+0xc7/0x9b0 [ 19.700962] kunit_try_run_case+0x1a5/0x480 [ 19.701559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.702108] kthread+0x337/0x6f0 [ 19.702595] ret_from_fork+0x116/0x1d0 [ 19.703029] ret_from_fork_asm+0x1a/0x30 [ 19.703399] [ 19.703647] The buggy address belongs to the object at ffff888101b20c00 [ 19.703647] which belongs to the cache kmalloc-128 of size 128 [ 19.704882] The buggy address is located 12 bytes to the right of [ 19.704882] allocated 115-byte region [ffff888101b20c00, ffff888101b20c73) [ 19.705962] [ 19.706261] The buggy address belongs to the physical page: [ 19.706878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20 [ 19.707725] flags: 0x200000000000000(node=0|zone=2) [ 19.708259] page_type: f5(slab) [ 19.708618] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.709400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.710275] page dumped because: kasan: bad access detected [ 19.710828] [ 19.711062] Memory state around the buggy address: [ 19.711610] ffff888101b20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.712263] ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712932] >ffff888101b20c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.713591] ^ [ 19.714170] ffff888101b20c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.714845] ffff888101b20d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.715550] ================================================================== [ 19.578280] ================================================================== [ 19.579240] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 19.579931] Read of size 1 at addr ffff888101b20c73 by task kunit_try_catch/212 [ 19.580409] [ 19.581451] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.581595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.581649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.581711] Call Trace: [ 19.581760] <TASK> [ 19.581813] dump_stack_lvl+0x73/0xb0 [ 19.581913] print_report+0xd1/0x650 [ 19.581992] ? __virt_addr_valid+0x1db/0x2d0 [ 19.582071] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 19.582151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.582227] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 19.582303] kasan_report+0x141/0x180 [ 19.582375] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 19.582462] __asan_report_load1_noabort+0x18/0x20 [ 19.582564] ksize_unpoisons_memory+0x81c/0x9b0 [ 19.582643] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 19.582717] ? finish_task_switch.isra.0+0x153/0x700 [ 19.582789] ? __switch_to+0x47/0xf50 [ 19.582873] ? __schedule+0x10cc/0x2b60 [ 19.582934] ? __pfx_read_tsc+0x10/0x10 [ 19.582987] ? ktime_get_ts64+0x86/0x230 [ 19.583050] kunit_try_run_case+0x1a5/0x480 [ 19.583125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.583188] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.583281] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.583354] ? __kthread_parkme+0x82/0x180 [ 19.583411] ? preempt_count_sub+0x50/0x80 [ 19.583481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.583573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.583655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.583728] kthread+0x337/0x6f0 [ 19.583762] ? trace_preempt_on+0x20/0xc0 [ 19.583798] ? __pfx_kthread+0x10/0x10 [ 19.583826] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.583857] ? calculate_sigpending+0x7b/0xa0 [ 19.583892] ? __pfx_kthread+0x10/0x10 [ 19.583922] ret_from_fork+0x116/0x1d0 [ 19.583947] ? __pfx_kthread+0x10/0x10 [ 19.583974] ret_from_fork_asm+0x1a/0x30 [ 19.584015] </TASK> [ 19.584031] [ 19.603305] Allocated by task 212: [ 19.603731] kasan_save_stack+0x45/0x70 [ 19.604190] kasan_save_track+0x18/0x40 [ 19.605464] kasan_save_alloc_info+0x3b/0x50 [ 19.605839] __kasan_kmalloc+0xb7/0xc0 [ 19.606152] __kmalloc_cache_noprof+0x189/0x420 [ 19.607053] ksize_unpoisons_memory+0xc7/0x9b0 [ 19.608199] kunit_try_run_case+0x1a5/0x480 [ 19.608678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.609162] kthread+0x337/0x6f0 [ 19.609466] ret_from_fork+0x116/0x1d0 [ 19.609932] ret_from_fork_asm+0x1a/0x30 [ 19.610724] [ 19.610949] The buggy address belongs to the object at ffff888101b20c00 [ 19.610949] which belongs to the cache kmalloc-128 of size 128 [ 19.612028] The buggy address is located 0 bytes to the right of [ 19.612028] allocated 115-byte region [ffff888101b20c00, ffff888101b20c73) [ 19.614364] [ 19.614710] The buggy address belongs to the physical page: [ 19.615430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20 [ 19.616719] flags: 0x200000000000000(node=0|zone=2) [ 19.617533] page_type: f5(slab) [ 19.618071] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.619302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.620515] page dumped because: kasan: bad access detected [ 19.620976] [ 19.621205] Memory state around the buggy address: [ 19.622045] ffff888101b20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.622986] ffff888101b20b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.623744] >ffff888101b20c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.624840] ^ [ 19.625237] ffff888101b20c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.626261] ffff888101b20d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.627103] ==================================================================
[ 18.615924] ================================================================== [ 18.616504] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.617226] Read of size 1 at addr ffff8881032f7878 by task kunit_try_catch/212 [ 18.617828] [ 18.618146] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.618286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.618348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.618409] Call Trace: [ 18.618442] <TASK> [ 18.618480] dump_stack_lvl+0x73/0xb0 [ 18.618586] print_report+0xd1/0x650 [ 18.618666] ? __virt_addr_valid+0x1db/0x2d0 [ 18.618761] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.618867] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.618981] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.619088] kasan_report+0x141/0x180 [ 18.619171] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.619257] __asan_report_load1_noabort+0x18/0x20 [ 18.619300] ksize_unpoisons_memory+0x7e9/0x9b0 [ 18.619335] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.619367] ? finish_task_switch.isra.0+0x153/0x700 [ 18.619399] ? __switch_to+0x47/0xf50 [ 18.619433] ? __schedule+0x10cc/0x2b60 [ 18.619464] ? __pfx_read_tsc+0x10/0x10 [ 18.619492] ? ktime_get_ts64+0x86/0x230 [ 18.619525] kunit_try_run_case+0x1a5/0x480 [ 18.619559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.619591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.619623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.619655] ? __kthread_parkme+0x82/0x180 [ 18.619681] ? preempt_count_sub+0x50/0x80 [ 18.619711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.619745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.619777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.619811] kthread+0x337/0x6f0 [ 18.619837] ? trace_preempt_on+0x20/0xc0 [ 18.619868] ? __pfx_kthread+0x10/0x10 [ 18.619924] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.619957] ? calculate_sigpending+0x7b/0xa0 [ 18.619992] ? __pfx_kthread+0x10/0x10 [ 18.620021] ret_from_fork+0x116/0x1d0 [ 18.620046] ? __pfx_kthread+0x10/0x10 [ 18.620074] ret_from_fork_asm+0x1a/0x30 [ 18.620132] </TASK> [ 18.620154] [ 18.635074] Allocated by task 212: [ 18.635358] kasan_save_stack+0x45/0x70 [ 18.635679] kasan_save_track+0x18/0x40 [ 18.636121] kasan_save_alloc_info+0x3b/0x50 [ 18.636652] __kasan_kmalloc+0xb7/0xc0 [ 18.637094] __kmalloc_cache_noprof+0x189/0x420 [ 18.637709] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.638228] kunit_try_run_case+0x1a5/0x480 [ 18.638584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.638992] kthread+0x337/0x6f0 [ 18.639288] ret_from_fork+0x116/0x1d0 [ 18.639600] ret_from_fork_asm+0x1a/0x30 [ 18.640051] [ 18.640285] The buggy address belongs to the object at ffff8881032f7800 [ 18.640285] which belongs to the cache kmalloc-128 of size 128 [ 18.641651] The buggy address is located 5 bytes to the right of [ 18.641651] allocated 115-byte region [ffff8881032f7800, ffff8881032f7873) [ 18.643060] [ 18.643313] The buggy address belongs to the physical page: [ 18.643782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7 [ 18.645753] flags: 0x200000000000000(node=0|zone=2) [ 18.646124] page_type: f5(slab) [ 18.646518] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.647263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.647974] page dumped because: kasan: bad access detected [ 18.649649] [ 18.650039] Memory state around the buggy address: [ 18.650447] ffff8881032f7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.651122] ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.651746] >ffff8881032f7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.652425] ^ [ 18.653055] ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.653667] ffff8881032f7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.654377] ================================================================== [ 18.571437] ================================================================== [ 18.572388] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 18.572989] Read of size 1 at addr ffff8881032f7873 by task kunit_try_catch/212 [ 18.574463] [ 18.574728] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.574843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.574900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.574963] Call Trace: [ 18.574999] <TASK> [ 18.575041] dump_stack_lvl+0x73/0xb0 [ 18.575129] print_report+0xd1/0x650 [ 18.575211] ? __virt_addr_valid+0x1db/0x2d0 [ 18.575249] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.575282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.575313] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.575345] kasan_report+0x141/0x180 [ 18.575376] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 18.575415] __asan_report_load1_noabort+0x18/0x20 [ 18.575451] ksize_unpoisons_memory+0x81c/0x9b0 [ 18.575484] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.575517] ? finish_task_switch.isra.0+0x153/0x700 [ 18.575547] ? __switch_to+0x47/0xf50 [ 18.575581] ? __schedule+0x10cc/0x2b60 [ 18.575612] ? __pfx_read_tsc+0x10/0x10 [ 18.575641] ? ktime_get_ts64+0x86/0x230 [ 18.575672] kunit_try_run_case+0x1a5/0x480 [ 18.575706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.575738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.575770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.575802] ? __kthread_parkme+0x82/0x180 [ 18.575828] ? preempt_count_sub+0x50/0x80 [ 18.575857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.575919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.575955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.575988] kthread+0x337/0x6f0 [ 18.576015] ? trace_preempt_on+0x20/0xc0 [ 18.576048] ? __pfx_kthread+0x10/0x10 [ 18.576076] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.576114] ? calculate_sigpending+0x7b/0xa0 [ 18.576171] ? __pfx_kthread+0x10/0x10 [ 18.576204] ret_from_fork+0x116/0x1d0 [ 18.576229] ? __pfx_kthread+0x10/0x10 [ 18.576258] ret_from_fork_asm+0x1a/0x30 [ 18.576298] </TASK> [ 18.576313] [ 18.595283] Allocated by task 212: [ 18.595569] kasan_save_stack+0x45/0x70 [ 18.595937] kasan_save_track+0x18/0x40 [ 18.596421] kasan_save_alloc_info+0x3b/0x50 [ 18.596767] __kasan_kmalloc+0xb7/0xc0 [ 18.597250] __kmalloc_cache_noprof+0x189/0x420 [ 18.597719] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.598525] kunit_try_run_case+0x1a5/0x480 [ 18.599300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.600289] kthread+0x337/0x6f0 [ 18.600908] ret_from_fork+0x116/0x1d0 [ 18.601545] ret_from_fork_asm+0x1a/0x30 [ 18.601870] [ 18.602060] The buggy address belongs to the object at ffff8881032f7800 [ 18.602060] which belongs to the cache kmalloc-128 of size 128 [ 18.602953] The buggy address is located 0 bytes to the right of [ 18.602953] allocated 115-byte region [ffff8881032f7800, ffff8881032f7873) [ 18.604497] [ 18.604596] The buggy address belongs to the physical page: [ 18.604794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7 [ 18.605244] flags: 0x200000000000000(node=0|zone=2) [ 18.606457] page_type: f5(slab) [ 18.606831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.607485] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.608309] page dumped because: kasan: bad access detected [ 18.608975] [ 18.609449] Memory state around the buggy address: [ 18.609847] ffff8881032f7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.610359] ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.611055] >ffff8881032f7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.611659] ^ [ 18.612309] ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.612955] ffff8881032f7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.613586] ================================================================== [ 18.656460] ================================================================== [ 18.657514] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.658210] Read of size 1 at addr ffff8881032f787f by task kunit_try_catch/212 [ 18.658839] [ 18.659115] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.659225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.659265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.659319] Call Trace: [ 18.659341] <TASK> [ 18.659360] dump_stack_lvl+0x73/0xb0 [ 18.659402] print_report+0xd1/0x650 [ 18.659434] ? __virt_addr_valid+0x1db/0x2d0 [ 18.659480] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.659540] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.659573] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.659606] kasan_report+0x141/0x180 [ 18.659636] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.659674] __asan_report_load1_noabort+0x18/0x20 [ 18.659708] ksize_unpoisons_memory+0x7b6/0x9b0 [ 18.659741] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 18.659773] ? finish_task_switch.isra.0+0x153/0x700 [ 18.659803] ? __switch_to+0x47/0xf50 [ 18.659837] ? __schedule+0x10cc/0x2b60 [ 18.659868] ? __pfx_read_tsc+0x10/0x10 [ 18.660051] ? ktime_get_ts64+0x86/0x230 [ 18.660208] kunit_try_run_case+0x1a5/0x480 [ 18.660322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.660447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.660551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.660654] ? __kthread_parkme+0x82/0x180 [ 18.660720] ? preempt_count_sub+0x50/0x80 [ 18.660757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.660796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.660830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.660863] kthread+0x337/0x6f0 [ 18.660916] ? trace_preempt_on+0x20/0xc0 [ 18.660952] ? __pfx_kthread+0x10/0x10 [ 18.660982] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.661011] ? calculate_sigpending+0x7b/0xa0 [ 18.661043] ? __pfx_kthread+0x10/0x10 [ 18.661073] ret_from_fork+0x116/0x1d0 [ 18.661118] ? __pfx_kthread+0x10/0x10 [ 18.661167] ret_from_fork_asm+0x1a/0x30 [ 18.661227] </TASK> [ 18.661245] [ 18.678531] Allocated by task 212: [ 18.678850] kasan_save_stack+0x45/0x70 [ 18.679852] kasan_save_track+0x18/0x40 [ 18.680362] kasan_save_alloc_info+0x3b/0x50 [ 18.680790] __kasan_kmalloc+0xb7/0xc0 [ 18.681190] __kmalloc_cache_noprof+0x189/0x420 [ 18.681686] ksize_unpoisons_memory+0xc7/0x9b0 [ 18.682229] kunit_try_run_case+0x1a5/0x480 [ 18.682646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.683110] kthread+0x337/0x6f0 [ 18.683515] ret_from_fork+0x116/0x1d0 [ 18.683965] ret_from_fork_asm+0x1a/0x30 [ 18.684491] [ 18.684769] The buggy address belongs to the object at ffff8881032f7800 [ 18.684769] which belongs to the cache kmalloc-128 of size 128 [ 18.685824] The buggy address is located 12 bytes to the right of [ 18.685824] allocated 115-byte region [ffff8881032f7800, ffff8881032f7873) [ 18.687089] [ 18.687335] The buggy address belongs to the physical page: [ 18.687845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7 [ 18.688476] flags: 0x200000000000000(node=0|zone=2) [ 18.689169] page_type: f5(slab) [ 18.689463] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.691773] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.693307] page dumped because: kasan: bad access detected [ 18.695305] [ 18.695920] Memory state around the buggy address: [ 18.696789] ffff8881032f7700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.697221] ffff8881032f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.697589] >ffff8881032f7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.699385] ^ [ 18.700683] ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.701505] ffff8881032f7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.702153] ==================================================================
[ 20.891107] ================================================================== [ 20.891802] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 20.892493] Read of size 1 at addr ffff00000e1a3178 by task kunit_try_catch/247 [ 20.893158] [ 20.893316] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.893353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.893364] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.893378] Call trace: [ 20.893386] show_stack+0x20/0x38 (C) [ 20.893411] dump_stack_lvl+0x8c/0xd0 [ 20.893437] print_report+0x118/0x608 [ 20.893463] kasan_report+0xdc/0x128 [ 20.893485] __asan_report_load1_noabort+0x20/0x30 [ 20.893513] ksize_unpoisons_memory+0x618/0x740 [ 20.893534] kunit_try_run_case+0x170/0x3f0 [ 20.893560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.893587] kthread+0x328/0x630 [ 20.893606] ret_from_fork+0x10/0x20 [ 20.893630] [ 20.899197] Allocated by task 247: [ 20.899514] kasan_save_stack+0x3c/0x68 [ 20.899878] kasan_save_track+0x20/0x40 [ 20.900242] kasan_save_alloc_info+0x40/0x58 [ 20.900645] __kasan_kmalloc+0xd4/0xd8 [ 20.900998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.901424] ksize_unpoisons_memory+0xc0/0x740 [ 20.901840] kunit_try_run_case+0x170/0x3f0 [ 20.902233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902744] kthread+0x328/0x630 [ 20.903050] ret_from_fork+0x10/0x20 [ 20.903389] [ 20.903536] The buggy address belongs to the object at ffff00000e1a3100 [ 20.903536] which belongs to the cache kmalloc-128 of size 128 [ 20.904655] The buggy address is located 5 bytes to the right of [ 20.904655] allocated 115-byte region [ffff00000e1a3100, ffff00000e1a3173) [ 20.905814] [ 20.905962] The buggy address belongs to the physical page: [ 20.906468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3 [ 20.907180] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.907778] page_type: f5(slab) [ 20.908079] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.908781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.909478] page dumped because: kasan: bad access detected [ 20.909983] [ 20.910130] Memory state around the buggy address: [ 20.910569] ffff00000e1a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.911224] ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.911877] >ffff00000e1a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.912529] ^ [ 20.913174] ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.913829] ffff00000e1a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.914479] ================================================================== [ 20.865672] ================================================================== [ 20.866761] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 20.867466] Read of size 1 at addr ffff00000e1a3173 by task kunit_try_catch/247 [ 20.868142] [ 20.868307] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.868358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.868372] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.868389] Call trace: [ 20.868400] show_stack+0x20/0x38 (C) [ 20.868436] dump_stack_lvl+0x8c/0xd0 [ 20.868472] print_report+0x118/0x608 [ 20.868506] kasan_report+0xdc/0x128 [ 20.868538] __asan_report_load1_noabort+0x20/0x30 [ 20.868577] ksize_unpoisons_memory+0x628/0x740 [ 20.868609] kunit_try_run_case+0x170/0x3f0 [ 20.868643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.868681] kthread+0x328/0x630 [ 20.868707] ret_from_fork+0x10/0x20 [ 20.868739] [ 20.874352] Allocated by task 247: [ 20.874677] kasan_save_stack+0x3c/0x68 [ 20.875053] kasan_save_track+0x20/0x40 [ 20.875428] kasan_save_alloc_info+0x40/0x58 [ 20.875845] __kasan_kmalloc+0xd4/0xd8 [ 20.876212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.876648] ksize_unpoisons_memory+0xc0/0x740 [ 20.877075] kunit_try_run_case+0x170/0x3f0 [ 20.877479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.878003] kthread+0x328/0x630 [ 20.878319] ret_from_fork+0x10/0x20 [ 20.878669] [ 20.878822] The buggy address belongs to the object at ffff00000e1a3100 [ 20.878822] which belongs to the cache kmalloc-128 of size 128 [ 20.879955] The buggy address is located 0 bytes to the right of [ 20.879955] allocated 115-byte region [ffff00000e1a3100, ffff00000e1a3173) [ 20.881129] [ 20.881283] The buggy address belongs to the physical page: [ 20.881798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3 [ 20.882522] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.883133] page_type: f5(slab) [ 20.883447] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.884163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.884870] page dumped because: kasan: bad access detected [ 20.885386] [ 20.885537] Memory state around the buggy address: [ 20.885986] ffff00000e1a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.886652] ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.887317] >ffff00000e1a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.887978] ^ [ 20.888611] ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.889276] ffff00000e1a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.889937] ================================================================== [ 20.915256] ================================================================== [ 20.915914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 20.916590] Read of size 1 at addr ffff00000e1a317f by task kunit_try_catch/247 [ 20.917253] [ 20.917407] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.917442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.917452] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.917465] Call trace: [ 20.917472] show_stack+0x20/0x38 (C) [ 20.917495] dump_stack_lvl+0x8c/0xd0 [ 20.917521] print_report+0x118/0x608 [ 20.917544] kasan_report+0xdc/0x128 [ 20.917566] __asan_report_load1_noabort+0x20/0x30 [ 20.917593] ksize_unpoisons_memory+0x690/0x740 [ 20.917615] kunit_try_run_case+0x170/0x3f0 [ 20.917638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.917665] kthread+0x328/0x630 [ 20.917684] ret_from_fork+0x10/0x20 [ 20.917706] [ 20.923274] Allocated by task 247: [ 20.923592] kasan_save_stack+0x3c/0x68 [ 20.923955] kasan_save_track+0x20/0x40 [ 20.924318] kasan_save_alloc_info+0x40/0x58 [ 20.924722] __kasan_kmalloc+0xd4/0xd8 [ 20.925076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.925501] ksize_unpoisons_memory+0xc0/0x740 [ 20.925917] kunit_try_run_case+0x170/0x3f0 [ 20.926310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.926820] kthread+0x328/0x630 [ 20.927125] ret_from_fork+0x10/0x20 [ 20.927464] [ 20.927611] The buggy address belongs to the object at ffff00000e1a3100 [ 20.927611] which belongs to the cache kmalloc-128 of size 128 [ 20.928729] The buggy address is located 12 bytes to the right of [ 20.928729] allocated 115-byte region [ffff00000e1a3100, ffff00000e1a3173) [ 20.929896] [ 20.930043] The buggy address belongs to the physical page: [ 20.930547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1a3 [ 20.931258] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.931856] page_type: f5(slab) [ 20.932156] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 20.932857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.933554] page dumped because: kasan: bad access detected [ 20.934059] [ 20.934206] Memory state around the buggy address: [ 20.934644] ffff00000e1a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.935297] ffff00000e1a3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.935952] >ffff00000e1a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.936602] ^ [ 20.937247] ffff00000e1a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.937902] ffff00000e1a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.938552] ==================================================================