Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.511277] ================================================================== [ 15.511854] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 15.513293] Write of size 1 at addr fff00000c45b6f73 by task kunit_try_catch/137 [ 15.513510] [ 15.516069] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 15.516248] Tainted: [N]=TEST [ 15.516282] Hardware name: linux,dummy-virt (DT) [ 15.516734] Call trace: [ 15.516912] show_stack+0x20/0x38 (C) [ 15.517046] dump_stack_lvl+0x8c/0xd0 [ 15.517107] print_report+0x118/0x5d0 [ 15.517155] kasan_report+0xdc/0x128 [ 15.517215] __asan_report_store1_noabort+0x20/0x30 [ 15.517267] kmalloc_oob_right+0x5a4/0x660 [ 15.517312] kunit_try_run_case+0x170/0x3f0 [ 15.517363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.517414] kthread+0x328/0x630 [ 15.517457] ret_from_fork+0x10/0x20 [ 15.517611] [ 15.517647] Allocated by task 137: [ 15.517774] kasan_save_stack+0x3c/0x68 [ 15.517842] kasan_save_track+0x20/0x40 [ 15.517879] kasan_save_alloc_info+0x40/0x58 [ 15.517917] __kasan_kmalloc+0xd4/0xd8 [ 15.517952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.517992] kmalloc_oob_right+0xb0/0x660 [ 15.518027] kunit_try_run_case+0x170/0x3f0 [ 15.518064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.518106] kthread+0x328/0x630 [ 15.518138] ret_from_fork+0x10/0x20 [ 15.518190] [ 15.518266] The buggy address belongs to the object at fff00000c45b6f00 [ 15.518266] which belongs to the cache kmalloc-128 of size 128 [ 15.518359] The buggy address is located 0 bytes to the right of [ 15.518359] allocated 115-byte region [fff00000c45b6f00, fff00000c45b6f73) [ 15.518426] [ 15.518504] The buggy address belongs to the physical page: [ 15.518694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045b6 [ 15.518961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.519255] page_type: f5(slab) [ 15.519556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.519619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.519722] page dumped because: kasan: bad access detected [ 15.519762] [ 15.519787] Memory state around the buggy address: [ 15.519999] fff00000c45b6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.520062] fff00000c45b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.520115] >fff00000c45b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.520306] ^ [ 15.520401] fff00000c45b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.520444] fff00000c45b7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.520508] ================================================================== [ 15.522247] ================================================================== [ 15.522301] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 15.522350] Write of size 1 at addr fff00000c45b6f78 by task kunit_try_catch/137 [ 15.522399] [ 15.522430] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.522517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.522543] Hardware name: linux,dummy-virt (DT) [ 15.522573] Call trace: [ 15.522598] show_stack+0x20/0x38 (C) [ 15.522645] dump_stack_lvl+0x8c/0xd0 [ 15.522699] print_report+0x118/0x5d0 [ 15.522744] kasan_report+0xdc/0x128 [ 15.522787] __asan_report_store1_noabort+0x20/0x30 [ 15.522845] kmalloc_oob_right+0x538/0x660 [ 15.522890] kunit_try_run_case+0x170/0x3f0 [ 15.522937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.522988] kthread+0x328/0x630 [ 15.523037] ret_from_fork+0x10/0x20 [ 15.523083] [ 15.523109] Allocated by task 137: [ 15.523142] kasan_save_stack+0x3c/0x68 [ 15.523182] kasan_save_track+0x20/0x40 [ 15.523779] kasan_save_alloc_info+0x40/0x58 [ 15.523871] __kasan_kmalloc+0xd4/0xd8 [ 15.523916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.523973] kmalloc_oob_right+0xb0/0x660 [ 15.524009] kunit_try_run_case+0x170/0x3f0 [ 15.524045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.524087] kthread+0x328/0x630 [ 15.524117] ret_from_fork+0x10/0x20 [ 15.524162] [ 15.524183] The buggy address belongs to the object at fff00000c45b6f00 [ 15.524183] which belongs to the cache kmalloc-128 of size 128 [ 15.524365] The buggy address is located 5 bytes to the right of [ 15.524365] allocated 115-byte region [fff00000c45b6f00, fff00000c45b6f73) [ 15.524435] [ 15.524454] The buggy address belongs to the physical page: [ 15.524482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045b6 [ 15.524535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.524580] page_type: f5(slab) [ 15.524617] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.524665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.524705] page dumped because: kasan: bad access detected [ 15.524734] [ 15.524751] Memory state around the buggy address: [ 15.524780] fff00000c45b6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.524822] fff00000c45b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.524863] >fff00000c45b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.524956] ^ [ 15.525030] fff00000c45b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.525122] fff00000c45b7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.525289] ================================================================== [ 15.526068] ================================================================== [ 15.526121] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 15.526166] Read of size 1 at addr fff00000c45b6f80 by task kunit_try_catch/137 [ 15.526253] [ 15.526301] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.526380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.526406] Hardware name: linux,dummy-virt (DT) [ 15.526435] Call trace: [ 15.526455] show_stack+0x20/0x38 (C) [ 15.526500] dump_stack_lvl+0x8c/0xd0 [ 15.526671] print_report+0x118/0x5d0 [ 15.526748] kasan_report+0xdc/0x128 [ 15.526814] __asan_report_load1_noabort+0x20/0x30 [ 15.526866] kmalloc_oob_right+0x5d0/0x660 [ 15.526910] kunit_try_run_case+0x170/0x3f0 [ 15.526955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.527020] kthread+0x328/0x630 [ 15.527099] ret_from_fork+0x10/0x20 [ 15.527148] [ 15.527165] Allocated by task 137: [ 15.527191] kasan_save_stack+0x3c/0x68 [ 15.527240] kasan_save_track+0x20/0x40 [ 15.527391] kasan_save_alloc_info+0x40/0x58 [ 15.527475] __kasan_kmalloc+0xd4/0xd8 [ 15.527511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.527577] kmalloc_oob_right+0xb0/0x660 [ 15.527620] kunit_try_run_case+0x170/0x3f0 [ 15.527681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.527723] kthread+0x328/0x630 [ 15.527782] ret_from_fork+0x10/0x20 [ 15.527847] [ 15.527877] The buggy address belongs to the object at fff00000c45b6f00 [ 15.527877] which belongs to the cache kmalloc-128 of size 128 [ 15.527962] The buggy address is located 13 bytes to the right of [ 15.527962] allocated 115-byte region [fff00000c45b6f00, fff00000c45b6f73) [ 15.528041] [ 15.528060] The buggy address belongs to the physical page: [ 15.528088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045b6 [ 15.528266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.528397] page_type: f5(slab) [ 15.528456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.528576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.528655] page dumped because: kasan: bad access detected [ 15.528742] [ 15.528769] Memory state around the buggy address: [ 15.528800] fff00000c45b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528848] fff00000c45b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.528890] >fff00000c45b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528926] ^ [ 15.528952] fff00000c45b7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.528992] fff00000c45b7080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 15.529030] ==================================================================
[ 16.335304] ================================================================== [ 16.335662] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.336487] Write of size 1 at addr fff00000c46ffd73 by task kunit_try_catch/137 [ 16.336593] [ 16.337377] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 16.337521] Tainted: [N]=TEST [ 16.337554] Hardware name: linux,dummy-virt (DT) [ 16.337771] Call trace: [ 16.337936] show_stack+0x20/0x38 (C) [ 16.338077] dump_stack_lvl+0x8c/0xd0 [ 16.338138] print_report+0x118/0x5d0 [ 16.338198] kasan_report+0xdc/0x128 [ 16.338243] __asan_report_store1_noabort+0x20/0x30 [ 16.338295] kmalloc_oob_right+0x5a4/0x660 [ 16.338340] kunit_try_run_case+0x170/0x3f0 [ 16.338390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.338443] kthread+0x328/0x630 [ 16.338486] ret_from_fork+0x10/0x20 [ 16.338639] [ 16.338676] Allocated by task 137: [ 16.338811] kasan_save_stack+0x3c/0x68 [ 16.338879] kasan_save_track+0x20/0x40 [ 16.338916] kasan_save_alloc_info+0x40/0x58 [ 16.338955] __kasan_kmalloc+0xd4/0xd8 [ 16.338991] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.339031] kmalloc_oob_right+0xb0/0x660 [ 16.339066] kunit_try_run_case+0x170/0x3f0 [ 16.339103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.339146] kthread+0x328/0x630 [ 16.339177] ret_from_fork+0x10/0x20 [ 16.339243] [ 16.339303] The buggy address belongs to the object at fff00000c46ffd00 [ 16.339303] which belongs to the cache kmalloc-128 of size 128 [ 16.339415] The buggy address is located 0 bytes to the right of [ 16.339415] allocated 115-byte region [fff00000c46ffd00, fff00000c46ffd73) [ 16.339484] [ 16.339579] The buggy address belongs to the physical page: [ 16.339781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046ff [ 16.340052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.340354] page_type: f5(slab) [ 16.340651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.340715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.340820] page dumped because: kasan: bad access detected [ 16.340860] [ 16.340885] Memory state around the buggy address: [ 16.341103] fff00000c46ffc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.341167] fff00000c46ffc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341236] >fff00000c46ffd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.341291] ^ [ 16.341376] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341418] fff00000c46ffe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341478] ================================================================== [ 16.345890] ================================================================== [ 16.345935] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.345979] Read of size 1 at addr fff00000c46ffd80 by task kunit_try_catch/137 [ 16.346036] [ 16.346064] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.346142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.346168] Hardware name: linux,dummy-virt (DT) [ 16.346211] Call trace: [ 16.346231] show_stack+0x20/0x38 (C) [ 16.346276] dump_stack_lvl+0x8c/0xd0 [ 16.346320] print_report+0x118/0x5d0 [ 16.346365] kasan_report+0xdc/0x128 [ 16.346409] __asan_report_load1_noabort+0x20/0x30 [ 16.346459] kmalloc_oob_right+0x5d0/0x660 [ 16.346503] kunit_try_run_case+0x170/0x3f0 [ 16.346549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.346739] kthread+0x328/0x630 [ 16.346956] ret_from_fork+0x10/0x20 [ 16.347003] [ 16.347026] Allocated by task 137: [ 16.347128] kasan_save_stack+0x3c/0x68 [ 16.347219] kasan_save_track+0x20/0x40 [ 16.348344] kasan_save_alloc_info+0x40/0x58 [ 16.348628] __kasan_kmalloc+0xd4/0xd8 [ 16.348685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.348724] kmalloc_oob_right+0xb0/0x660 [ 16.348766] kunit_try_run_case+0x170/0x3f0 [ 16.348803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.348846] kthread+0x328/0x630 [ 16.348876] ret_from_fork+0x10/0x20 [ 16.349007] [ 16.349027] The buggy address belongs to the object at fff00000c46ffd00 [ 16.349027] which belongs to the cache kmalloc-128 of size 128 [ 16.349125] The buggy address is located 13 bytes to the right of [ 16.349125] allocated 115-byte region [fff00000c46ffd00, fff00000c46ffd73) [ 16.349604] [ 16.349634] The buggy address belongs to the physical page: [ 16.349768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046ff [ 16.350266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.350534] page_type: f5(slab) [ 16.350644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.350695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.350736] page dumped because: kasan: bad access detected [ 16.350766] [ 16.350783] Memory state around the buggy address: [ 16.350813] fff00000c46ffc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.351464] fff00000c46ffd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.351507] >fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.351573] ^ [ 16.351601] fff00000c46ffe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.351646] fff00000c46ffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.351841] ================================================================== [ 16.342359] ================================================================== [ 16.342398] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.342442] Write of size 1 at addr fff00000c46ffd78 by task kunit_try_catch/137 [ 16.342492] [ 16.342521] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.342600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.343242] Hardware name: linux,dummy-virt (DT) [ 16.343275] Call trace: [ 16.343295] show_stack+0x20/0x38 (C) [ 16.343342] dump_stack_lvl+0x8c/0xd0 [ 16.343386] print_report+0x118/0x5d0 [ 16.343430] kasan_report+0xdc/0x128 [ 16.343474] __asan_report_store1_noabort+0x20/0x30 [ 16.343940] kmalloc_oob_right+0x538/0x660 [ 16.343987] kunit_try_run_case+0x170/0x3f0 [ 16.344034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.344086] kthread+0x328/0x630 [ 16.344126] ret_from_fork+0x10/0x20 [ 16.344172] [ 16.344202] Allocated by task 137: [ 16.344229] kasan_save_stack+0x3c/0x68 [ 16.344268] kasan_save_track+0x20/0x40 [ 16.344304] kasan_save_alloc_info+0x40/0x58 [ 16.344342] __kasan_kmalloc+0xd4/0xd8 [ 16.344377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.344415] kmalloc_oob_right+0xb0/0x660 [ 16.344449] kunit_try_run_case+0x170/0x3f0 [ 16.344485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.344528] kthread+0x328/0x630 [ 16.344559] ret_from_fork+0x10/0x20 [ 16.344593] [ 16.344611] The buggy address belongs to the object at fff00000c46ffd00 [ 16.344611] which belongs to the cache kmalloc-128 of size 128 [ 16.344667] The buggy address is located 5 bytes to the right of [ 16.344667] allocated 115-byte region [fff00000c46ffd00, fff00000c46ffd73) [ 16.344730] [ 16.344748] The buggy address belongs to the physical page: [ 16.344777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046ff [ 16.344828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.344874] page_type: f5(slab) [ 16.344910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.344959] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.344998] page dumped because: kasan: bad access detected [ 16.345028] [ 16.345045] Memory state around the buggy address: [ 16.345075] fff00000c46ffc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.345117] fff00000c46ffc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.345157] >fff00000c46ffd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.345203] ^ [ 16.345243] fff00000c46ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.345286] fff00000c46ffe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.345323] ==================================================================
[ 11.784926] ================================================================== [ 11.785721] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.786628] Write of size 1 at addr ffff888103427c73 by task kunit_try_catch/153 [ 11.787274] [ 11.788350] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.788707] Tainted: [N]=TEST [ 11.788738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.788948] Call Trace: [ 11.789014] <TASK> [ 11.789158] dump_stack_lvl+0x73/0xb0 [ 11.789248] print_report+0xd1/0x610 [ 11.789278] ? __virt_addr_valid+0x1db/0x2d0 [ 11.789303] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.789325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.789348] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.789370] kasan_report+0x141/0x180 [ 11.789392] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.789431] __asan_report_store1_noabort+0x1b/0x30 [ 11.789469] kmalloc_oob_right+0x6f0/0x7f0 [ 11.789492] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.789515] ? __schedule+0x10cc/0x2b60 [ 11.789538] ? __pfx_read_tsc+0x10/0x10 [ 11.789561] ? ktime_get_ts64+0x86/0x230 [ 11.789587] kunit_try_run_case+0x1a5/0x480 [ 11.789615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.789638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.789663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.789687] ? __kthread_parkme+0x82/0x180 [ 11.789709] ? preempt_count_sub+0x50/0x80 [ 11.789734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.789758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.789783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.789808] kthread+0x337/0x6f0 [ 11.789827] ? trace_preempt_on+0x20/0xc0 [ 11.789851] ? __pfx_kthread+0x10/0x10 [ 11.789872] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.789893] ? calculate_sigpending+0x7b/0xa0 [ 11.789919] ? __pfx_kthread+0x10/0x10 [ 11.789940] ret_from_fork+0x116/0x1d0 [ 11.789959] ? __pfx_kthread+0x10/0x10 [ 11.789980] ret_from_fork_asm+0x1a/0x30 [ 11.790035] </TASK> [ 11.790099] [ 11.804047] Allocated by task 153: [ 11.804328] kasan_save_stack+0x45/0x70 [ 11.804987] kasan_save_track+0x18/0x40 [ 11.805496] kasan_save_alloc_info+0x3b/0x50 [ 11.805978] __kasan_kmalloc+0xb7/0xc0 [ 11.806403] __kmalloc_cache_noprof+0x189/0x420 [ 11.806977] kmalloc_oob_right+0xa9/0x7f0 [ 11.807462] kunit_try_run_case+0x1a5/0x480 [ 11.807939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.808186] kthread+0x337/0x6f0 [ 11.808314] ret_from_fork+0x116/0x1d0 [ 11.808549] ret_from_fork_asm+0x1a/0x30 [ 11.809201] [ 11.809463] The buggy address belongs to the object at ffff888103427c00 [ 11.809463] which belongs to the cache kmalloc-128 of size 128 [ 11.810796] The buggy address is located 0 bytes to the right of [ 11.810796] allocated 115-byte region [ffff888103427c00, ffff888103427c73) [ 11.811405] [ 11.811573] The buggy address belongs to the physical page: [ 11.811924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103427 [ 11.812410] flags: 0x200000000000000(node=0|zone=2) [ 11.812981] page_type: f5(slab) [ 11.813491] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.813949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.814706] page dumped because: kasan: bad access detected [ 11.815189] [ 11.815353] Memory state around the buggy address: [ 11.816052] ffff888103427b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.816735] ffff888103427b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.817442] >ffff888103427c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.818115] ^ [ 11.818808] ffff888103427c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.819080] ffff888103427d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.819324] ================================================================== [ 11.821119] ================================================================== [ 11.821847] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.822463] Write of size 1 at addr ffff888103427c78 by task kunit_try_catch/153 [ 11.823108] [ 11.823295] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.823338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.823349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.823371] Call Trace: [ 11.823387] <TASK> [ 11.823403] dump_stack_lvl+0x73/0xb0 [ 11.823432] print_report+0xd1/0x610 [ 11.823465] ? __virt_addr_valid+0x1db/0x2d0 [ 11.823488] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.823509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.823533] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.823555] kasan_report+0x141/0x180 [ 11.823576] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.823602] __asan_report_store1_noabort+0x1b/0x30 [ 11.823627] kmalloc_oob_right+0x6bd/0x7f0 [ 11.823650] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.823673] ? __schedule+0x10cc/0x2b60 [ 11.823696] ? __pfx_read_tsc+0x10/0x10 [ 11.823717] ? ktime_get_ts64+0x86/0x230 [ 11.823741] kunit_try_run_case+0x1a5/0x480 [ 11.823766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.823789] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.823813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.823837] ? __kthread_parkme+0x82/0x180 [ 11.823858] ? preempt_count_sub+0x50/0x80 [ 11.823884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.823908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.823933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.823959] kthread+0x337/0x6f0 [ 11.823977] ? trace_preempt_on+0x20/0xc0 [ 11.824000] ? __pfx_kthread+0x10/0x10 [ 11.824020] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.824042] ? calculate_sigpending+0x7b/0xa0 [ 11.824067] ? __pfx_kthread+0x10/0x10 [ 11.824088] ret_from_fork+0x116/0x1d0 [ 11.824106] ? __pfx_kthread+0x10/0x10 [ 11.824126] ret_from_fork_asm+0x1a/0x30 [ 11.824157] </TASK> [ 11.824167] [ 11.830754] Allocated by task 153: [ 11.830881] kasan_save_stack+0x45/0x70 [ 11.831054] kasan_save_track+0x18/0x40 [ 11.831241] kasan_save_alloc_info+0x3b/0x50 [ 11.831457] __kasan_kmalloc+0xb7/0xc0 [ 11.831641] __kmalloc_cache_noprof+0x189/0x420 [ 11.832017] kmalloc_oob_right+0xa9/0x7f0 [ 11.832156] kunit_try_run_case+0x1a5/0x480 [ 11.832307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.832494] kthread+0x337/0x6f0 [ 11.832785] ret_from_fork+0x116/0x1d0 [ 11.832958] ret_from_fork_asm+0x1a/0x30 [ 11.833108] [ 11.833202] The buggy address belongs to the object at ffff888103427c00 [ 11.833202] which belongs to the cache kmalloc-128 of size 128 [ 11.833721] The buggy address is located 5 bytes to the right of [ 11.833721] allocated 115-byte region [ffff888103427c00, ffff888103427c73) [ 11.834213] [ 11.834305] The buggy address belongs to the physical page: [ 11.834601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103427 [ 11.834870] flags: 0x200000000000000(node=0|zone=2) [ 11.836910] page_type: f5(slab) [ 11.837094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.838506] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.839027] page dumped because: kasan: bad access detected [ 11.839203] [ 11.839275] Memory state around the buggy address: [ 11.839440] ffff888103427b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.839665] ffff888103427b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.839879] >ffff888103427c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.840089] ^ [ 11.840309] ffff888103427c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.841731] ffff888103427d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.842920] ================================================================== [ 11.844841] ================================================================== [ 11.845611] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.845960] Read of size 1 at addr ffff888103427c80 by task kunit_try_catch/153 [ 11.846282] [ 11.846395] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.846463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.846509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.846533] Call Trace: [ 11.846546] <TASK> [ 11.846587] dump_stack_lvl+0x73/0xb0 [ 11.846618] print_report+0xd1/0x610 [ 11.846641] ? __virt_addr_valid+0x1db/0x2d0 [ 11.846665] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.846686] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.846709] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.846731] kasan_report+0x141/0x180 [ 11.846752] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.846778] __asan_report_load1_noabort+0x18/0x20 [ 11.846835] kmalloc_oob_right+0x68a/0x7f0 [ 11.846858] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.846881] ? __schedule+0x10cc/0x2b60 [ 11.846903] ? __pfx_read_tsc+0x10/0x10 [ 11.846924] ? ktime_get_ts64+0x86/0x230 [ 11.846950] kunit_try_run_case+0x1a5/0x480 [ 11.847007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.847030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.847054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.847077] ? __kthread_parkme+0x82/0x180 [ 11.847099] ? preempt_count_sub+0x50/0x80 [ 11.847123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.847147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.847172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.847197] kthread+0x337/0x6f0 [ 11.847215] ? trace_preempt_on+0x20/0xc0 [ 11.847239] ? __pfx_kthread+0x10/0x10 [ 11.847259] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.847280] ? calculate_sigpending+0x7b/0xa0 [ 11.847305] ? __pfx_kthread+0x10/0x10 [ 11.847326] ret_from_fork+0x116/0x1d0 [ 11.847344] ? __pfx_kthread+0x10/0x10 [ 11.847364] ret_from_fork_asm+0x1a/0x30 [ 11.847395] </TASK> [ 11.847420] [ 11.855048] Allocated by task 153: [ 11.855182] kasan_save_stack+0x45/0x70 [ 11.855381] kasan_save_track+0x18/0x40 [ 11.855636] kasan_save_alloc_info+0x3b/0x50 [ 11.855851] __kasan_kmalloc+0xb7/0xc0 [ 11.856067] __kmalloc_cache_noprof+0x189/0x420 [ 11.856305] kmalloc_oob_right+0xa9/0x7f0 [ 11.856533] kunit_try_run_case+0x1a5/0x480 [ 11.856762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.857031] kthread+0x337/0x6f0 [ 11.857164] ret_from_fork+0x116/0x1d0 [ 11.857375] ret_from_fork_asm+0x1a/0x30 [ 11.857589] [ 11.857723] The buggy address belongs to the object at ffff888103427c00 [ 11.857723] which belongs to the cache kmalloc-128 of size 128 [ 11.858254] The buggy address is located 13 bytes to the right of [ 11.858254] allocated 115-byte region [ffff888103427c00, ffff888103427c73) [ 11.858832] [ 11.858913] The buggy address belongs to the physical page: [ 11.859085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103427 [ 11.859325] flags: 0x200000000000000(node=0|zone=2) [ 11.859793] page_type: f5(slab) [ 11.859959] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.860298] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.860885] page dumped because: kasan: bad access detected [ 11.861135] [ 11.861203] Memory state around the buggy address: [ 11.861356] ffff888103427b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.861580] ffff888103427c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.861931] >ffff888103427c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.862304] ^ [ 11.862592] ffff888103427d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.862997] ffff888103427d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.863277] ==================================================================
[ 12.066958] ================================================================== [ 12.067327] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.067623] Read of size 1 at addr ffff888102b2e480 by task kunit_try_catch/154 [ 12.068329] [ 12.068450] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.068492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.068503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.068521] Call Trace: [ 12.068537] <TASK> [ 12.068551] dump_stack_lvl+0x73/0xb0 [ 12.068580] print_report+0xd1/0x610 [ 12.068602] ? __virt_addr_valid+0x1db/0x2d0 [ 12.068625] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.068789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.068816] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.068856] kasan_report+0x141/0x180 [ 12.068878] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.068904] __asan_report_load1_noabort+0x18/0x20 [ 12.068930] kmalloc_oob_right+0x68a/0x7f0 [ 12.068952] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.068975] ? __schedule+0x10cc/0x2b60 [ 12.068997] ? __pfx_read_tsc+0x10/0x10 [ 12.069020] ? ktime_get_ts64+0x86/0x230 [ 12.069045] kunit_try_run_case+0x1a5/0x480 [ 12.069082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.069105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.069138] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.069162] ? __kthread_parkme+0x82/0x180 [ 12.069182] ? preempt_count_sub+0x50/0x80 [ 12.069205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.069230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.069254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.069280] kthread+0x337/0x6f0 [ 12.069299] ? trace_preempt_on+0x20/0xc0 [ 12.069322] ? __pfx_kthread+0x10/0x10 [ 12.069342] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.069364] ? calculate_sigpending+0x7b/0xa0 [ 12.069388] ? __pfx_kthread+0x10/0x10 [ 12.069409] ret_from_fork+0x116/0x1d0 [ 12.069427] ? __pfx_kthread+0x10/0x10 [ 12.069447] ret_from_fork_asm+0x1a/0x30 [ 12.069477] </TASK> [ 12.069487] [ 12.079178] Allocated by task 154: [ 12.079454] kasan_save_stack+0x45/0x70 [ 12.079811] kasan_save_track+0x18/0x40 [ 12.080015] kasan_save_alloc_info+0x3b/0x50 [ 12.080276] __kasan_kmalloc+0xb7/0xc0 [ 12.080631] __kmalloc_cache_noprof+0x189/0x420 [ 12.080826] kmalloc_oob_right+0xa9/0x7f0 [ 12.081028] kunit_try_run_case+0x1a5/0x480 [ 12.081341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.081566] kthread+0x337/0x6f0 [ 12.081735] ret_from_fork+0x116/0x1d0 [ 12.082211] ret_from_fork_asm+0x1a/0x30 [ 12.082407] [ 12.082597] The buggy address belongs to the object at ffff888102b2e400 [ 12.082597] which belongs to the cache kmalloc-128 of size 128 [ 12.083272] The buggy address is located 13 bytes to the right of [ 12.083272] allocated 115-byte region [ffff888102b2e400, ffff888102b2e473) [ 12.083925] [ 12.084008] The buggy address belongs to the physical page: [ 12.084303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2e [ 12.084875] flags: 0x200000000000000(node=0|zone=2) [ 12.085167] page_type: f5(slab) [ 12.085353] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.085844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.086241] page dumped because: kasan: bad access detected [ 12.086464] [ 12.086559] Memory state around the buggy address: [ 12.086743] ffff888102b2e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.087348] ffff888102b2e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.087629] >ffff888102b2e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.088176] ^ [ 12.088372] ffff888102b2e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.088888] ffff888102b2e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.089171] ================================================================== [ 12.038484] ================================================================== [ 12.039445] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.040093] Write of size 1 at addr ffff888102b2e478 by task kunit_try_catch/154 [ 12.040422] [ 12.040508] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.040550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.040562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.040583] Call Trace: [ 12.040594] <TASK> [ 12.040608] dump_stack_lvl+0x73/0xb0 [ 12.040635] print_report+0xd1/0x610 [ 12.040657] ? __virt_addr_valid+0x1db/0x2d0 [ 12.040680] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.040703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.040728] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.040751] kasan_report+0x141/0x180 [ 12.040772] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.040798] __asan_report_store1_noabort+0x1b/0x30 [ 12.040961] kmalloc_oob_right+0x6bd/0x7f0 [ 12.040985] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.041008] ? __schedule+0x10cc/0x2b60 [ 12.041029] ? __pfx_read_tsc+0x10/0x10 [ 12.041062] ? ktime_get_ts64+0x86/0x230 [ 12.041106] kunit_try_run_case+0x1a5/0x480 [ 12.041140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.041163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.041186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.041210] ? __kthread_parkme+0x82/0x180 [ 12.041231] ? preempt_count_sub+0x50/0x80 [ 12.041255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.041279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.041330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.041356] kthread+0x337/0x6f0 [ 12.041374] ? trace_preempt_on+0x20/0xc0 [ 12.041397] ? __pfx_kthread+0x10/0x10 [ 12.041417] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.041439] ? calculate_sigpending+0x7b/0xa0 [ 12.041463] ? __pfx_kthread+0x10/0x10 [ 12.041484] ret_from_fork+0x116/0x1d0 [ 12.041502] ? __pfx_kthread+0x10/0x10 [ 12.041522] ret_from_fork_asm+0x1a/0x30 [ 12.041552] </TASK> [ 12.041562] [ 12.056814] Allocated by task 154: [ 12.056955] kasan_save_stack+0x45/0x70 [ 12.057142] kasan_save_track+0x18/0x40 [ 12.057309] kasan_save_alloc_info+0x3b/0x50 [ 12.057475] __kasan_kmalloc+0xb7/0xc0 [ 12.057662] __kmalloc_cache_noprof+0x189/0x420 [ 12.057947] kmalloc_oob_right+0xa9/0x7f0 [ 12.058207] kunit_try_run_case+0x1a5/0x480 [ 12.058356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.058592] kthread+0x337/0x6f0 [ 12.058762] ret_from_fork+0x116/0x1d0 [ 12.058995] ret_from_fork_asm+0x1a/0x30 [ 12.059183] [ 12.059256] The buggy address belongs to the object at ffff888102b2e400 [ 12.059256] which belongs to the cache kmalloc-128 of size 128 [ 12.059878] The buggy address is located 5 bytes to the right of [ 12.059878] allocated 115-byte region [ffff888102b2e400, ffff888102b2e473) [ 12.060458] [ 12.060535] The buggy address belongs to the physical page: [ 12.060751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2e [ 12.061364] flags: 0x200000000000000(node=0|zone=2) [ 12.061531] page_type: f5(slab) [ 12.061652] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.062040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.062559] page dumped because: kasan: bad access detected [ 12.062806] [ 12.062904] Memory state around the buggy address: [ 12.063303] ffff888102b2e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.063764] ffff888102b2e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.064181] >ffff888102b2e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.064453] ^ [ 12.065030] ffff888102b2e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.065626] ffff888102b2e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.066266] ================================================================== [ 12.003144] ================================================================== [ 12.003732] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.004975] Write of size 1 at addr ffff888102b2e473 by task kunit_try_catch/154 [ 12.005803] [ 12.006915] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.007293] Tainted: [N]=TEST [ 12.007327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.007540] Call Trace: [ 12.007605] <TASK> [ 12.007769] dump_stack_lvl+0x73/0xb0 [ 12.007858] print_report+0xd1/0x610 [ 12.007887] ? __virt_addr_valid+0x1db/0x2d0 [ 12.007913] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.007934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.007958] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.007980] kasan_report+0x141/0x180 [ 12.008001] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.008028] __asan_report_store1_noabort+0x1b/0x30 [ 12.008066] kmalloc_oob_right+0x6f0/0x7f0 [ 12.008089] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.008131] ? __schedule+0x10cc/0x2b60 [ 12.008154] ? __pfx_read_tsc+0x10/0x10 [ 12.008179] ? ktime_get_ts64+0x86/0x230 [ 12.008206] kunit_try_run_case+0x1a5/0x480 [ 12.008233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.008257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.008282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.008306] ? __kthread_parkme+0x82/0x180 [ 12.008328] ? preempt_count_sub+0x50/0x80 [ 12.008353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.008378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.008403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.008428] kthread+0x337/0x6f0 [ 12.008447] ? trace_preempt_on+0x20/0xc0 [ 12.008472] ? __pfx_kthread+0x10/0x10 [ 12.008492] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.008514] ? calculate_sigpending+0x7b/0xa0 [ 12.008539] ? __pfx_kthread+0x10/0x10 [ 12.008561] ret_from_fork+0x116/0x1d0 [ 12.008580] ? __pfx_kthread+0x10/0x10 [ 12.008600] ret_from_fork_asm+0x1a/0x30 [ 12.008689] </TASK> [ 12.008754] [ 12.021130] Allocated by task 154: [ 12.021574] kasan_save_stack+0x45/0x70 [ 12.022041] kasan_save_track+0x18/0x40 [ 12.022224] kasan_save_alloc_info+0x3b/0x50 [ 12.022650] __kasan_kmalloc+0xb7/0xc0 [ 12.023000] __kmalloc_cache_noprof+0x189/0x420 [ 12.023199] kmalloc_oob_right+0xa9/0x7f0 [ 12.023590] kunit_try_run_case+0x1a5/0x480 [ 12.024041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.024554] kthread+0x337/0x6f0 [ 12.024888] ret_from_fork+0x116/0x1d0 [ 12.025135] ret_from_fork_asm+0x1a/0x30 [ 12.025422] [ 12.025656] The buggy address belongs to the object at ffff888102b2e400 [ 12.025656] which belongs to the cache kmalloc-128 of size 128 [ 12.026523] The buggy address is located 0 bytes to the right of [ 12.026523] allocated 115-byte region [ffff888102b2e400, ffff888102b2e473) [ 12.027868] [ 12.028017] The buggy address belongs to the physical page: [ 12.028446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2e [ 12.029644] flags: 0x200000000000000(node=0|zone=2) [ 12.030513] page_type: f5(slab) [ 12.031213] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.031898] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.032453] page dumped because: kasan: bad access detected [ 12.032660] [ 12.032738] Memory state around the buggy address: [ 12.033169] ffff888102b2e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.033421] ffff888102b2e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.033668] >ffff888102b2e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.034389] ^ [ 12.035074] ffff888102b2e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.035797] ffff888102b2e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.036540] ==================================================================