Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.090933] ================================================================== [ 16.091183] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.091252] Read of size 1 at addr fff00000c586667f by task kunit_try_catch/195 [ 16.091447] [ 16.091485] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.091800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.091852] Hardware name: linux,dummy-virt (DT) [ 16.091888] Call trace: [ 16.091983] show_stack+0x20/0x38 (C) [ 16.092056] dump_stack_lvl+0x8c/0xd0 [ 16.092115] print_report+0x118/0x5d0 [ 16.092351] kasan_report+0xdc/0x128 [ 16.092558] __asan_report_load1_noabort+0x20/0x30 [ 16.092652] ksize_unpoisons_memory+0x690/0x740 [ 16.092743] kunit_try_run_case+0x170/0x3f0 [ 16.092909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.093117] kthread+0x328/0x630 [ 16.093247] ret_from_fork+0x10/0x20 [ 16.093368] [ 16.093436] Allocated by task 195: [ 16.093466] kasan_save_stack+0x3c/0x68 [ 16.093534] kasan_save_track+0x20/0x40 [ 16.093797] kasan_save_alloc_info+0x40/0x58 [ 16.093927] __kasan_kmalloc+0xd4/0xd8 [ 16.093969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.094241] ksize_unpoisons_memory+0xc0/0x740 [ 16.094541] kunit_try_run_case+0x170/0x3f0 [ 16.094622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.094769] kthread+0x328/0x630 [ 16.094829] ret_from_fork+0x10/0x20 [ 16.094878] [ 16.094993] The buggy address belongs to the object at fff00000c5866600 [ 16.094993] which belongs to the cache kmalloc-128 of size 128 [ 16.095985] The buggy address is located 12 bytes to the right of [ 16.095985] allocated 115-byte region [fff00000c5866600, fff00000c5866673) [ 16.096151] [ 16.096181] The buggy address belongs to the physical page: [ 16.096259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866 [ 16.097363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.097448] page_type: f5(slab) [ 16.097548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.097626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.097882] page dumped because: kasan: bad access detected [ 16.098002] [ 16.098054] Memory state around the buggy address: [ 16.098121] fff00000c5866500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.098167] fff00000c5866580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098527] >fff00000c5866600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.098609] ^ [ 16.098712] fff00000c5866680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098783] fff00000c5866700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.098931] ================================================================== [ 16.078121] ================================================================== [ 16.078437] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.078535] Read of size 1 at addr fff00000c5866673 by task kunit_try_catch/195 [ 16.078589] [ 16.078623] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.078705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.078732] Hardware name: linux,dummy-virt (DT) [ 16.078822] Call trace: [ 16.078862] show_stack+0x20/0x38 (C) [ 16.078928] dump_stack_lvl+0x8c/0xd0 [ 16.079010] print_report+0x118/0x5d0 [ 16.079076] kasan_report+0xdc/0x128 [ 16.079121] __asan_report_load1_noabort+0x20/0x30 [ 16.079209] ksize_unpoisons_memory+0x628/0x740 [ 16.079283] kunit_try_run_case+0x170/0x3f0 [ 16.079510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.079726] kthread+0x328/0x630 [ 16.079802] ret_from_fork+0x10/0x20 [ 16.079870] [ 16.079896] Allocated by task 195: [ 16.079926] kasan_save_stack+0x3c/0x68 [ 16.080226] kasan_save_track+0x20/0x40 [ 16.080331] kasan_save_alloc_info+0x40/0x58 [ 16.080378] __kasan_kmalloc+0xd4/0xd8 [ 16.080415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.080484] ksize_unpoisons_memory+0xc0/0x740 [ 16.080662] kunit_try_run_case+0x170/0x3f0 [ 16.080867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.080973] kthread+0x328/0x630 [ 16.081007] ret_from_fork+0x10/0x20 [ 16.081261] [ 16.081380] The buggy address belongs to the object at fff00000c5866600 [ 16.081380] which belongs to the cache kmalloc-128 of size 128 [ 16.081522] The buggy address is located 0 bytes to the right of [ 16.081522] allocated 115-byte region [fff00000c5866600, fff00000c5866673) [ 16.081602] [ 16.081809] The buggy address belongs to the physical page: [ 16.081939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866 [ 16.082240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.082424] page_type: f5(slab) [ 16.082480] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.082564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.082608] page dumped because: kasan: bad access detected [ 16.082640] [ 16.082659] Memory state around the buggy address: [ 16.082691] fff00000c5866500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.082735] fff00000c5866580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082790] >fff00000c5866600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.082840] ^ [ 16.082892] fff00000c5866680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082933] fff00000c5866700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082975] ================================================================== [ 16.083956] ================================================================== [ 16.084147] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.084333] Read of size 1 at addr fff00000c5866678 by task kunit_try_catch/195 [ 16.084499] [ 16.084551] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.084959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.085018] Hardware name: linux,dummy-virt (DT) [ 16.085086] Call trace: [ 16.085160] show_stack+0x20/0x38 (C) [ 16.085238] dump_stack_lvl+0x8c/0xd0 [ 16.085447] print_report+0x118/0x5d0 [ 16.085695] kasan_report+0xdc/0x128 [ 16.085773] __asan_report_load1_noabort+0x20/0x30 [ 16.085893] ksize_unpoisons_memory+0x618/0x740 [ 16.085966] kunit_try_run_case+0x170/0x3f0 [ 16.086014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.086353] kthread+0x328/0x630 [ 16.086462] ret_from_fork+0x10/0x20 [ 16.086526] [ 16.086578] Allocated by task 195: [ 16.086877] kasan_save_stack+0x3c/0x68 [ 16.086996] kasan_save_track+0x20/0x40 [ 16.087035] kasan_save_alloc_info+0x40/0x58 [ 16.087299] __kasan_kmalloc+0xd4/0xd8 [ 16.087602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.087709] ksize_unpoisons_memory+0xc0/0x740 [ 16.087825] kunit_try_run_case+0x170/0x3f0 [ 16.087874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.087949] kthread+0x328/0x630 [ 16.088250] ret_from_fork+0x10/0x20 [ 16.088369] [ 16.088418] The buggy address belongs to the object at fff00000c5866600 [ 16.088418] which belongs to the cache kmalloc-128 of size 128 [ 16.088503] The buggy address is located 5 bytes to the right of [ 16.088503] allocated 115-byte region [fff00000c5866600, fff00000c5866673) [ 16.088737] [ 16.088809] The buggy address belongs to the physical page: [ 16.088939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866 [ 16.089057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.089110] page_type: f5(slab) [ 16.089147] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.089251] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.089294] page dumped because: kasan: bad access detected [ 16.089326] [ 16.089352] Memory state around the buggy address: [ 16.089383] fff00000c5866500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.089426] fff00000c5866580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.089479] >fff00000c5866600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.089518] ^ [ 16.089559] fff00000c5866680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.089612] fff00000c5866700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.089651] ==================================================================
[ 16.835656] ================================================================== [ 16.835710] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 16.835763] Read of size 1 at addr fff00000c5aae678 by task kunit_try_catch/195 [ 16.835882] [ 16.836009] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.836202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.836302] Hardware name: linux,dummy-virt (DT) [ 16.836378] Call trace: [ 16.836401] show_stack+0x20/0x38 (C) [ 16.836618] dump_stack_lvl+0x8c/0xd0 [ 16.836669] print_report+0x118/0x5d0 [ 16.836714] kasan_report+0xdc/0x128 [ 16.836861] __asan_report_load1_noabort+0x20/0x30 [ 16.837030] ksize_unpoisons_memory+0x618/0x740 [ 16.837194] kunit_try_run_case+0x170/0x3f0 [ 16.837314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.837442] kthread+0x328/0x630 [ 16.837519] ret_from_fork+0x10/0x20 [ 16.837720] [ 16.837758] Allocated by task 195: [ 16.837787] kasan_save_stack+0x3c/0x68 [ 16.838174] kasan_save_track+0x20/0x40 [ 16.838272] kasan_save_alloc_info+0x40/0x58 [ 16.838402] __kasan_kmalloc+0xd4/0xd8 [ 16.838496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.838544] ksize_unpoisons_memory+0xc0/0x740 [ 16.838581] kunit_try_run_case+0x170/0x3f0 [ 16.838618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.838666] kthread+0x328/0x630 [ 16.838698] ret_from_fork+0x10/0x20 [ 16.838732] [ 16.838751] The buggy address belongs to the object at fff00000c5aae600 [ 16.838751] which belongs to the cache kmalloc-128 of size 128 [ 16.838812] The buggy address is located 5 bytes to the right of [ 16.838812] allocated 115-byte region [fff00000c5aae600, fff00000c5aae673) [ 16.838890] [ 16.838910] The buggy address belongs to the physical page: [ 16.838959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae [ 16.839011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.839061] page_type: f5(slab) [ 16.839103] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.839170] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.839232] page dumped because: kasan: bad access detected [ 16.839264] [ 16.839283] Memory state around the buggy address: [ 16.839316] fff00000c5aae500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.839369] fff00000c5aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.839414] >fff00000c5aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.839461] ^ [ 16.839514] fff00000c5aae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.839567] fff00000c5aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.839606] ================================================================== [ 16.841251] ================================================================== [ 16.841481] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 16.841589] Read of size 1 at addr fff00000c5aae67f by task kunit_try_catch/195 [ 16.841642] [ 16.841734] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.841874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.841904] Hardware name: linux,dummy-virt (DT) [ 16.841982] Call trace: [ 16.842027] show_stack+0x20/0x38 (C) [ 16.842317] dump_stack_lvl+0x8c/0xd0 [ 16.842423] print_report+0x118/0x5d0 [ 16.842477] kasan_report+0xdc/0x128 [ 16.842591] __asan_report_load1_noabort+0x20/0x30 [ 16.842644] ksize_unpoisons_memory+0x690/0x740 [ 16.842704] kunit_try_run_case+0x170/0x3f0 [ 16.842753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.842808] kthread+0x328/0x630 [ 16.842967] ret_from_fork+0x10/0x20 [ 16.843039] [ 16.843078] Allocated by task 195: [ 16.843135] kasan_save_stack+0x3c/0x68 [ 16.843204] kasan_save_track+0x20/0x40 [ 16.843279] kasan_save_alloc_info+0x40/0x58 [ 16.843335] __kasan_kmalloc+0xd4/0xd8 [ 16.843371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.843502] ksize_unpoisons_memory+0xc0/0x740 [ 16.843593] kunit_try_run_case+0x170/0x3f0 [ 16.843702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.843770] kthread+0x328/0x630 [ 16.843881] ret_from_fork+0x10/0x20 [ 16.843937] [ 16.843955] The buggy address belongs to the object at fff00000c5aae600 [ 16.843955] which belongs to the cache kmalloc-128 of size 128 [ 16.844014] The buggy address is located 12 bytes to the right of [ 16.844014] allocated 115-byte region [fff00000c5aae600, fff00000c5aae673) [ 16.844081] [ 16.844142] The buggy address belongs to the physical page: [ 16.844288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae [ 16.844360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.844426] page_type: f5(slab) [ 16.844465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.844551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.844675] page dumped because: kasan: bad access detected [ 16.844776] [ 16.844858] Memory state around the buggy address: [ 16.844996] fff00000c5aae500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.845114] fff00000c5aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845197] >fff00000c5aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.845285] ^ [ 16.845366] fff00000c5aae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845433] fff00000c5aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.845519] ================================================================== [ 16.828133] ================================================================== [ 16.828208] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 16.828258] Read of size 1 at addr fff00000c5aae673 by task kunit_try_catch/195 [ 16.828310] [ 16.828340] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.828755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.828829] Hardware name: linux,dummy-virt (DT) [ 16.828878] Call trace: [ 16.828965] show_stack+0x20/0x38 (C) [ 16.829046] dump_stack_lvl+0x8c/0xd0 [ 16.829191] print_report+0x118/0x5d0 [ 16.829304] kasan_report+0xdc/0x128 [ 16.829395] __asan_report_load1_noabort+0x20/0x30 [ 16.829485] ksize_unpoisons_memory+0x628/0x740 [ 16.829620] kunit_try_run_case+0x170/0x3f0 [ 16.829755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.829843] kthread+0x328/0x630 [ 16.829884] ret_from_fork+0x10/0x20 [ 16.830195] [ 16.830218] Allocated by task 195: [ 16.830441] kasan_save_stack+0x3c/0x68 [ 16.830656] kasan_save_track+0x20/0x40 [ 16.830743] kasan_save_alloc_info+0x40/0x58 [ 16.830794] __kasan_kmalloc+0xd4/0xd8 [ 16.830853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.830928] ksize_unpoisons_memory+0xc0/0x740 [ 16.830966] kunit_try_run_case+0x170/0x3f0 [ 16.831005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.831050] kthread+0x328/0x630 [ 16.831083] ret_from_fork+0x10/0x20 [ 16.831410] [ 16.831449] The buggy address belongs to the object at fff00000c5aae600 [ 16.831449] which belongs to the cache kmalloc-128 of size 128 [ 16.831664] The buggy address is located 0 bytes to the right of [ 16.831664] allocated 115-byte region [fff00000c5aae600, fff00000c5aae673) [ 16.831734] [ 16.831753] The buggy address belongs to the physical page: [ 16.831865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae [ 16.832017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.832087] page_type: f5(slab) [ 16.832145] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.832256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.832370] page dumped because: kasan: bad access detected [ 16.832501] [ 16.832519] Memory state around the buggy address: [ 16.832550] fff00000c5aae500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.832613] fff00000c5aae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.832818] >fff00000c5aae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.833013] ^ [ 16.833216] fff00000c5aae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.833323] fff00000c5aae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.833495] ==================================================================
[ 13.102520] ================================================================== [ 13.103213] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.104013] Read of size 1 at addr ffff8881026b2d7f by task kunit_try_catch/211 [ 13.104639] [ 13.104814] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.104855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.104866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.104885] Call Trace: [ 13.104901] <TASK> [ 13.104915] dump_stack_lvl+0x73/0xb0 [ 13.104943] print_report+0xd1/0x610 [ 13.104966] ? __virt_addr_valid+0x1db/0x2d0 [ 13.104989] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.105013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.105036] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.105060] kasan_report+0x141/0x180 [ 13.105082] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.105110] __asan_report_load1_noabort+0x18/0x20 [ 13.105135] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.105159] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.105183] ? __schedule+0x207f/0x2b60 [ 13.105202] ? schedule+0x7c/0x2e0 [ 13.105222] ? trace_hardirqs_on+0x37/0xe0 [ 13.105245] ? __schedule+0x207f/0x2b60 [ 13.105266] ? __pfx_read_tsc+0x10/0x10 [ 13.105287] ? ktime_get_ts64+0x86/0x230 [ 13.105310] kunit_try_run_case+0x1a5/0x480 [ 13.105335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.105358] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.105382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.105405] ? __kthread_parkme+0x82/0x180 [ 13.105426] ? preempt_count_sub+0x50/0x80 [ 13.105463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.105487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.105512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.105547] kthread+0x337/0x6f0 [ 13.105576] ? trace_preempt_on+0x20/0xc0 [ 13.105598] ? __pfx_kthread+0x10/0x10 [ 13.105619] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.105640] ? calculate_sigpending+0x7b/0xa0 [ 13.105664] ? __pfx_kthread+0x10/0x10 [ 13.105685] ret_from_fork+0x116/0x1d0 [ 13.105704] ? __pfx_kthread+0x10/0x10 [ 13.105724] ret_from_fork_asm+0x1a/0x30 [ 13.105755] </TASK> [ 13.105764] [ 13.117902] Allocated by task 211: [ 13.118037] kasan_save_stack+0x45/0x70 [ 13.118182] kasan_save_track+0x18/0x40 [ 13.118316] kasan_save_alloc_info+0x3b/0x50 [ 13.118499] __kasan_kmalloc+0xb7/0xc0 [ 13.118632] __kmalloc_cache_noprof+0x189/0x420 [ 13.118856] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.119337] kunit_try_run_case+0x1a5/0x480 [ 13.119828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.120110] kthread+0x337/0x6f0 [ 13.120229] ret_from_fork+0x116/0x1d0 [ 13.120366] ret_from_fork_asm+0x1a/0x30 [ 13.120660] [ 13.120818] The buggy address belongs to the object at ffff8881026b2d00 [ 13.120818] which belongs to the cache kmalloc-128 of size 128 [ 13.122043] The buggy address is located 12 bytes to the right of [ 13.122043] allocated 115-byte region [ffff8881026b2d00, ffff8881026b2d73) [ 13.123351] [ 13.123546] The buggy address belongs to the physical page: [ 13.123808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b2 [ 13.124055] flags: 0x200000000000000(node=0|zone=2) [ 13.124220] page_type: f5(slab) [ 13.124346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.124733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.125127] page dumped because: kasan: bad access detected [ 13.125304] [ 13.125373] Memory state around the buggy address: [ 13.125596] ffff8881026b2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.125950] ffff8881026b2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.126225] >ffff8881026b2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.126503] ^ [ 13.126858] ffff8881026b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.127148] ffff8881026b2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.127444] ================================================================== [ 13.040089] ================================================================== [ 13.040549] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.041159] Read of size 1 at addr ffff8881026b2d73 by task kunit_try_catch/211 [ 13.041482] [ 13.041649] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.041692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.041703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.041722] Call Trace: [ 13.041733] <TASK> [ 13.041747] dump_stack_lvl+0x73/0xb0 [ 13.041776] print_report+0xd1/0x610 [ 13.041797] ? __virt_addr_valid+0x1db/0x2d0 [ 13.041820] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.041843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.041867] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.041890] kasan_report+0x141/0x180 [ 13.041912] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.041940] __asan_report_load1_noabort+0x18/0x20 [ 13.041965] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.041989] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.042013] ? __schedule+0x207f/0x2b60 [ 13.042033] ? schedule+0x7c/0x2e0 [ 13.042052] ? trace_hardirqs_on+0x37/0xe0 [ 13.042075] ? __schedule+0x207f/0x2b60 [ 13.042096] ? __pfx_read_tsc+0x10/0x10 [ 13.042116] ? ktime_get_ts64+0x86/0x230 [ 13.042140] kunit_try_run_case+0x1a5/0x480 [ 13.042164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.042187] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.042211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.042235] ? __kthread_parkme+0x82/0x180 [ 13.042255] ? preempt_count_sub+0x50/0x80 [ 13.042279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.042303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.042327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.042353] kthread+0x337/0x6f0 [ 13.042372] ? trace_preempt_on+0x20/0xc0 [ 13.042393] ? __pfx_kthread+0x10/0x10 [ 13.042423] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.042444] ? calculate_sigpending+0x7b/0xa0 [ 13.042480] ? __pfx_kthread+0x10/0x10 [ 13.042502] ret_from_fork+0x116/0x1d0 [ 13.042520] ? __pfx_kthread+0x10/0x10 [ 13.042541] ret_from_fork_asm+0x1a/0x30 [ 13.042581] </TASK> [ 13.042591] [ 13.053923] Allocated by task 211: [ 13.054058] kasan_save_stack+0x45/0x70 [ 13.054202] kasan_save_track+0x18/0x40 [ 13.054337] kasan_save_alloc_info+0x3b/0x50 [ 13.054613] __kasan_kmalloc+0xb7/0xc0 [ 13.055285] __kmalloc_cache_noprof+0x189/0x420 [ 13.055910] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.056335] kunit_try_run_case+0x1a5/0x480 [ 13.056919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.057673] kthread+0x337/0x6f0 [ 13.058118] ret_from_fork+0x116/0x1d0 [ 13.058717] ret_from_fork_asm+0x1a/0x30 [ 13.059216] [ 13.059523] The buggy address belongs to the object at ffff8881026b2d00 [ 13.059523] which belongs to the cache kmalloc-128 of size 128 [ 13.061011] The buggy address is located 0 bytes to the right of [ 13.061011] allocated 115-byte region [ffff8881026b2d00, ffff8881026b2d73) [ 13.062297] [ 13.062385] The buggy address belongs to the physical page: [ 13.063177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b2 [ 13.063873] flags: 0x200000000000000(node=0|zone=2) [ 13.064056] page_type: f5(slab) [ 13.064182] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.064673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.065557] page dumped because: kasan: bad access detected [ 13.066369] [ 13.066852] Memory state around the buggy address: [ 13.067337] ffff8881026b2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.068226] ffff8881026b2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.069206] >ffff8881026b2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.069880] ^ [ 13.070294] ffff8881026b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.071142] ffff8881026b2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.072139] ================================================================== [ 13.072922] ================================================================== [ 13.073157] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.073391] Read of size 1 at addr ffff8881026b2d78 by task kunit_try_catch/211 [ 13.074288] [ 13.074671] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.074719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.074730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.074750] Call Trace: [ 13.074762] <TASK> [ 13.074777] dump_stack_lvl+0x73/0xb0 [ 13.074807] print_report+0xd1/0x610 [ 13.074830] ? __virt_addr_valid+0x1db/0x2d0 [ 13.074852] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.074876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.074899] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.074923] kasan_report+0x141/0x180 [ 13.074945] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.074973] __asan_report_load1_noabort+0x18/0x20 [ 13.074997] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.075021] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.075045] ? __schedule+0x207f/0x2b60 [ 13.075065] ? schedule+0x7c/0x2e0 [ 13.075084] ? trace_hardirqs_on+0x37/0xe0 [ 13.075107] ? __schedule+0x207f/0x2b60 [ 13.075128] ? __pfx_read_tsc+0x10/0x10 [ 13.075148] ? ktime_get_ts64+0x86/0x230 [ 13.075171] kunit_try_run_case+0x1a5/0x480 [ 13.075195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.075218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.075242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.075265] ? __kthread_parkme+0x82/0x180 [ 13.075286] ? preempt_count_sub+0x50/0x80 [ 13.075310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.075334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.075359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.075384] kthread+0x337/0x6f0 [ 13.075403] ? trace_preempt_on+0x20/0xc0 [ 13.075593] ? __pfx_kthread+0x10/0x10 [ 13.075618] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.075640] ? calculate_sigpending+0x7b/0xa0 [ 13.075664] ? __pfx_kthread+0x10/0x10 [ 13.075686] ret_from_fork+0x116/0x1d0 [ 13.075705] ? __pfx_kthread+0x10/0x10 [ 13.075725] ret_from_fork_asm+0x1a/0x30 [ 13.075756] </TASK> [ 13.075766] [ 13.088672] Allocated by task 211: [ 13.089071] kasan_save_stack+0x45/0x70 [ 13.089459] kasan_save_track+0x18/0x40 [ 13.089790] kasan_save_alloc_info+0x3b/0x50 [ 13.089943] __kasan_kmalloc+0xb7/0xc0 [ 13.090075] __kmalloc_cache_noprof+0x189/0x420 [ 13.090230] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.090382] kunit_try_run_case+0x1a5/0x480 [ 13.090769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.091290] kthread+0x337/0x6f0 [ 13.091711] ret_from_fork+0x116/0x1d0 [ 13.092053] ret_from_fork_asm+0x1a/0x30 [ 13.092402] [ 13.092721] The buggy address belongs to the object at ffff8881026b2d00 [ 13.092721] which belongs to the cache kmalloc-128 of size 128 [ 13.093847] The buggy address is located 5 bytes to the right of [ 13.093847] allocated 115-byte region [ffff8881026b2d00, ffff8881026b2d73) [ 13.094820] [ 13.094896] The buggy address belongs to the physical page: [ 13.095070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b2 [ 13.095315] flags: 0x200000000000000(node=0|zone=2) [ 13.095637] page_type: f5(slab) [ 13.095995] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.096808] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.097465] page dumped because: kasan: bad access detected [ 13.098025] [ 13.098182] Memory state around the buggy address: [ 13.098625] ffff8881026b2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.099375] ffff8881026b2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.099892] >ffff8881026b2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.100107] ^ [ 13.100325] ffff8881026b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.100861] ffff8881026b2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.101480] ==================================================================
[ 13.255487] ================================================================== [ 13.256093] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 13.256588] Read of size 1 at addr ffff888102594573 by task kunit_try_catch/212 [ 13.257462] [ 13.257588] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.257633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.257921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.257947] Call Trace: [ 13.257962] <TASK> [ 13.257979] dump_stack_lvl+0x73/0xb0 [ 13.258014] print_report+0xd1/0x610 [ 13.258037] ? __virt_addr_valid+0x1db/0x2d0 [ 13.258073] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.258097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.258134] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.258158] kasan_report+0x141/0x180 [ 13.258180] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 13.258208] __asan_report_load1_noabort+0x18/0x20 [ 13.258233] ksize_unpoisons_memory+0x81c/0x9b0 [ 13.258257] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.258282] ? finish_task_switch.isra.0+0x153/0x700 [ 13.258306] ? __switch_to+0x47/0xf50 [ 13.258333] ? __schedule+0x10cc/0x2b60 [ 13.258356] ? __pfx_read_tsc+0x10/0x10 [ 13.258377] ? ktime_get_ts64+0x86/0x230 [ 13.258403] kunit_try_run_case+0x1a5/0x480 [ 13.258428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.258451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.258476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.258500] ? __kthread_parkme+0x82/0x180 [ 13.258521] ? preempt_count_sub+0x50/0x80 [ 13.258545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.258569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.258594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.258619] kthread+0x337/0x6f0 [ 13.258692] ? trace_preempt_on+0x20/0xc0 [ 13.258726] ? __pfx_kthread+0x10/0x10 [ 13.258747] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.258769] ? calculate_sigpending+0x7b/0xa0 [ 13.258794] ? __pfx_kthread+0x10/0x10 [ 13.258816] ret_from_fork+0x116/0x1d0 [ 13.258835] ? __pfx_kthread+0x10/0x10 [ 13.258856] ret_from_fork_asm+0x1a/0x30 [ 13.258888] </TASK> [ 13.258898] [ 13.270610] Allocated by task 212: [ 13.271253] kasan_save_stack+0x45/0x70 [ 13.271426] kasan_save_track+0x18/0x40 [ 13.271883] kasan_save_alloc_info+0x3b/0x50 [ 13.272431] __kasan_kmalloc+0xb7/0xc0 [ 13.272621] __kmalloc_cache_noprof+0x189/0x420 [ 13.272988] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.273225] kunit_try_run_case+0x1a5/0x480 [ 13.273419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.274001] kthread+0x337/0x6f0 [ 13.274257] ret_from_fork+0x116/0x1d0 [ 13.274557] ret_from_fork_asm+0x1a/0x30 [ 13.274941] [ 13.275066] The buggy address belongs to the object at ffff888102594500 [ 13.275066] which belongs to the cache kmalloc-128 of size 128 [ 13.276089] The buggy address is located 0 bytes to the right of [ 13.276089] allocated 115-byte region [ffff888102594500, ffff888102594573) [ 13.276947] [ 13.277064] The buggy address belongs to the physical page: [ 13.277536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594 [ 13.278185] flags: 0x200000000000000(node=0|zone=2) [ 13.278526] page_type: f5(slab) [ 13.278701] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.279325] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.279969] page dumped because: kasan: bad access detected [ 13.280263] [ 13.280343] Memory state around the buggy address: [ 13.280564] ffff888102594400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.281150] ffff888102594480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.281551] >ffff888102594500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.282117] ^ [ 13.282496] ffff888102594580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.283043] ffff888102594600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.283408] ================================================================== [ 13.283914] ================================================================== [ 13.284166] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.284514] Read of size 1 at addr ffff888102594578 by task kunit_try_catch/212 [ 13.286062] [ 13.286263] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.286307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.286319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.286338] Call Trace: [ 13.286479] <TASK> [ 13.286500] dump_stack_lvl+0x73/0xb0 [ 13.286532] print_report+0xd1/0x610 [ 13.286555] ? __virt_addr_valid+0x1db/0x2d0 [ 13.286579] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.286603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.286626] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.286902] kasan_report+0x141/0x180 [ 13.286928] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.286957] __asan_report_load1_noabort+0x18/0x20 [ 13.286982] ksize_unpoisons_memory+0x7e9/0x9b0 [ 13.287007] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.287031] ? finish_task_switch.isra.0+0x153/0x700 [ 13.287067] ? __switch_to+0x47/0xf50 [ 13.287092] ? __schedule+0x10cc/0x2b60 [ 13.287115] ? __pfx_read_tsc+0x10/0x10 [ 13.287137] ? ktime_get_ts64+0x86/0x230 [ 13.287161] kunit_try_run_case+0x1a5/0x480 [ 13.287186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.287209] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.287234] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.287258] ? __kthread_parkme+0x82/0x180 [ 13.287279] ? preempt_count_sub+0x50/0x80 [ 13.287302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.287327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.287351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.287377] kthread+0x337/0x6f0 [ 13.287396] ? trace_preempt_on+0x20/0xc0 [ 13.287420] ? __pfx_kthread+0x10/0x10 [ 13.287441] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.287463] ? calculate_sigpending+0x7b/0xa0 [ 13.287488] ? __pfx_kthread+0x10/0x10 [ 13.287509] ret_from_fork+0x116/0x1d0 [ 13.287529] ? __pfx_kthread+0x10/0x10 [ 13.287550] ret_from_fork_asm+0x1a/0x30 [ 13.287580] </TASK> [ 13.287590] [ 13.299913] Allocated by task 212: [ 13.300115] kasan_save_stack+0x45/0x70 [ 13.300672] kasan_save_track+0x18/0x40 [ 13.300835] kasan_save_alloc_info+0x3b/0x50 [ 13.301277] __kasan_kmalloc+0xb7/0xc0 [ 13.301455] __kmalloc_cache_noprof+0x189/0x420 [ 13.301809] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.302223] kunit_try_run_case+0x1a5/0x480 [ 13.302505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.302920] kthread+0x337/0x6f0 [ 13.303105] ret_from_fork+0x116/0x1d0 [ 13.303369] ret_from_fork_asm+0x1a/0x30 [ 13.303565] [ 13.303728] The buggy address belongs to the object at ffff888102594500 [ 13.303728] which belongs to the cache kmalloc-128 of size 128 [ 13.304234] The buggy address is located 5 bytes to the right of [ 13.304234] allocated 115-byte region [ffff888102594500, ffff888102594573) [ 13.304809] [ 13.304977] The buggy address belongs to the physical page: [ 13.305345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594 [ 13.305761] flags: 0x200000000000000(node=0|zone=2) [ 13.305959] page_type: f5(slab) [ 13.306245] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.306563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.307061] page dumped because: kasan: bad access detected [ 13.307486] [ 13.307585] Memory state around the buggy address: [ 13.307752] ffff888102594400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.308142] ffff888102594480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.308422] >ffff888102594500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.308772] ^ [ 13.309240] ffff888102594580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.309529] ffff888102594600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.309888] ================================================================== [ 13.310575] ================================================================== [ 13.310969] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.311364] Read of size 1 at addr ffff88810259457f by task kunit_try_catch/212 [ 13.311862] [ 13.312012] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.312064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.312076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.312096] Call Trace: [ 13.312110] <TASK> [ 13.312124] dump_stack_lvl+0x73/0xb0 [ 13.312154] print_report+0xd1/0x610 [ 13.312176] ? __virt_addr_valid+0x1db/0x2d0 [ 13.312199] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.312223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.312247] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.312271] kasan_report+0x141/0x180 [ 13.312293] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.312321] __asan_report_load1_noabort+0x18/0x20 [ 13.312380] ksize_unpoisons_memory+0x7b6/0x9b0 [ 13.312405] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 13.312440] ? finish_task_switch.isra.0+0x153/0x700 [ 13.312464] ? __switch_to+0x47/0xf50 [ 13.312489] ? __schedule+0x10cc/0x2b60 [ 13.312512] ? __pfx_read_tsc+0x10/0x10 [ 13.312534] ? ktime_get_ts64+0x86/0x230 [ 13.312558] kunit_try_run_case+0x1a5/0x480 [ 13.312582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.312606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.312630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.312654] ? __kthread_parkme+0x82/0x180 [ 13.312676] ? preempt_count_sub+0x50/0x80 [ 13.312755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.312783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.312808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.312833] kthread+0x337/0x6f0 [ 13.312854] ? trace_preempt_on+0x20/0xc0 [ 13.312877] ? __pfx_kthread+0x10/0x10 [ 13.312899] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.312921] ? calculate_sigpending+0x7b/0xa0 [ 13.312946] ? __pfx_kthread+0x10/0x10 [ 13.312968] ret_from_fork+0x116/0x1d0 [ 13.312987] ? __pfx_kthread+0x10/0x10 [ 13.313008] ret_from_fork_asm+0x1a/0x30 [ 13.313039] </TASK> [ 13.313048] [ 13.322558] Allocated by task 212: [ 13.322806] kasan_save_stack+0x45/0x70 [ 13.322959] kasan_save_track+0x18/0x40 [ 13.323163] kasan_save_alloc_info+0x3b/0x50 [ 13.323397] __kasan_kmalloc+0xb7/0xc0 [ 13.323589] __kmalloc_cache_noprof+0x189/0x420 [ 13.323982] ksize_unpoisons_memory+0xc7/0x9b0 [ 13.324267] kunit_try_run_case+0x1a5/0x480 [ 13.324426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.324701] kthread+0x337/0x6f0 [ 13.324934] ret_from_fork+0x116/0x1d0 [ 13.325143] ret_from_fork_asm+0x1a/0x30 [ 13.325396] [ 13.325527] The buggy address belongs to the object at ffff888102594500 [ 13.325527] which belongs to the cache kmalloc-128 of size 128 [ 13.326276] The buggy address is located 12 bytes to the right of [ 13.326276] allocated 115-byte region [ffff888102594500, ffff888102594573) [ 13.326823] [ 13.326910] The buggy address belongs to the physical page: [ 13.327424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594 [ 13.327900] flags: 0x200000000000000(node=0|zone=2) [ 13.328166] page_type: f5(slab) [ 13.328353] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.328659] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.329121] page dumped because: kasan: bad access detected [ 13.329489] [ 13.329621] Memory state around the buggy address: [ 13.329836] ffff888102594400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.330160] ffff888102594480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.330749] >ffff888102594500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.331029] ^ [ 13.331552] ffff888102594580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.331909] ffff888102594600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.332282] ==================================================================