Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.211224] ================================================================== [ 16.211271] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.211318] Read of size 1 at addr fff00000c3ef4380 by task kunit_try_catch/136 [ 16.211864] [ 16.211894] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.211986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.212013] Hardware name: linux,dummy-virt (DT) [ 16.212043] Call trace: [ 16.212064] show_stack+0x20/0x38 (C) [ 16.212121] dump_stack_lvl+0x8c/0xd0 [ 16.212168] print_report+0x118/0x5d0 [ 16.212214] kasan_report+0xdc/0x128 [ 16.212260] __asan_report_load1_noabort+0x20/0x30 [ 16.212310] kmalloc_oob_right+0x5d0/0x660 [ 16.212355] kunit_try_run_case+0x170/0x3f0 [ 16.212414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.212583] kthread+0x328/0x630 [ 16.212721] ret_from_fork+0x10/0x20 [ 16.212787] [ 16.212804] Allocated by task 136: [ 16.212830] kasan_save_stack+0x3c/0x68 [ 16.212868] kasan_save_track+0x20/0x40 [ 16.212914] kasan_save_alloc_info+0x40/0x58 [ 16.212954] __kasan_kmalloc+0xd4/0xd8 [ 16.212990] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.213028] kmalloc_oob_right+0xb0/0x660 [ 16.213063] kunit_try_run_case+0x170/0x3f0 [ 16.213109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.213248] kthread+0x328/0x630 [ 16.213311] ret_from_fork+0x10/0x20 [ 16.213462] [ 16.213480] The buggy address belongs to the object at fff00000c3ef4300 [ 16.213480] which belongs to the cache kmalloc-128 of size 128 [ 16.213551] The buggy address is located 13 bytes to the right of [ 16.213551] allocated 115-byte region [fff00000c3ef4300, fff00000c3ef4373) [ 16.213614] [ 16.213632] The buggy address belongs to the physical page: [ 16.213670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef4 [ 16.213721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.213767] page_type: f5(slab) [ 16.213830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.213880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.213985] page dumped because: kasan: bad access detected [ 16.214041] [ 16.214059] Memory state around the buggy address: [ 16.214185] fff00000c3ef4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.214252] fff00000c3ef4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.214314] >fff00000c3ef4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.214352] ^ [ 16.214401] fff00000c3ef4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.214442] fff00000c3ef4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.214479] ================================================================== [ 16.207003] ================================================================== [ 16.207106] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.207427] Write of size 1 at addr fff00000c3ef4378 by task kunit_try_catch/136 [ 16.207500] [ 16.207535] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.207616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.207642] Hardware name: linux,dummy-virt (DT) [ 16.207673] Call trace: [ 16.207695] show_stack+0x20/0x38 (C) [ 16.207745] dump_stack_lvl+0x8c/0xd0 [ 16.207857] print_report+0x118/0x5d0 [ 16.207915] kasan_report+0xdc/0x128 [ 16.207960] __asan_report_store1_noabort+0x20/0x30 [ 16.208011] kmalloc_oob_right+0x538/0x660 [ 16.208056] kunit_try_run_case+0x170/0x3f0 [ 16.208107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.208159] kthread+0x328/0x630 [ 16.208208] ret_from_fork+0x10/0x20 [ 16.208451] [ 16.208469] Allocated by task 136: [ 16.208498] kasan_save_stack+0x3c/0x68 [ 16.208538] kasan_save_track+0x20/0x40 [ 16.208574] kasan_save_alloc_info+0x40/0x58 [ 16.208613] __kasan_kmalloc+0xd4/0xd8 [ 16.208654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.208865] kmalloc_oob_right+0xb0/0x660 [ 16.208911] kunit_try_run_case+0x170/0x3f0 [ 16.208948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.208993] kthread+0x328/0x630 [ 16.209024] ret_from_fork+0x10/0x20 [ 16.209059] [ 16.209078] The buggy address belongs to the object at fff00000c3ef4300 [ 16.209078] which belongs to the cache kmalloc-128 of size 128 [ 16.209134] The buggy address is located 5 bytes to the right of [ 16.209134] allocated 115-byte region [fff00000c3ef4300, fff00000c3ef4373) [ 16.209196] [ 16.209215] The buggy address belongs to the physical page: [ 16.209244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef4 [ 16.209296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.209344] page_type: f5(slab) [ 16.209382] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.209432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.209471] page dumped because: kasan: bad access detected [ 16.209501] [ 16.209517] Memory state around the buggy address: [ 16.209628] fff00000c3ef4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.209672] fff00000c3ef4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.209720] >fff00000c3ef4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.209827] ^ [ 16.209945] fff00000c3ef4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.210001] fff00000c3ef4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.210038] ================================================================== [ 16.197801] ================================================================== [ 16.198433] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.199269] Write of size 1 at addr fff00000c3ef4373 by task kunit_try_catch/136 [ 16.199378] [ 16.200149] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7 #1 PREEMPT [ 16.200298] Tainted: [N]=TEST [ 16.200333] Hardware name: linux,dummy-virt (DT) [ 16.200549] Call trace: [ 16.200715] show_stack+0x20/0x38 (C) [ 16.200848] dump_stack_lvl+0x8c/0xd0 [ 16.200924] print_report+0x118/0x5d0 [ 16.200973] kasan_report+0xdc/0x128 [ 16.201018] __asan_report_store1_noabort+0x20/0x30 [ 16.201072] kmalloc_oob_right+0x5a4/0x660 [ 16.201118] kunit_try_run_case+0x170/0x3f0 [ 16.201170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.201223] kthread+0x328/0x630 [ 16.201268] ret_from_fork+0x10/0x20 [ 16.201420] [ 16.201461] Allocated by task 136: [ 16.201579] kasan_save_stack+0x3c/0x68 [ 16.201644] kasan_save_track+0x20/0x40 [ 16.201682] kasan_save_alloc_info+0x40/0x58 [ 16.201721] __kasan_kmalloc+0xd4/0xd8 [ 16.201757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.201809] kmalloc_oob_right+0xb0/0x660 [ 16.201845] kunit_try_run_case+0x170/0x3f0 [ 16.201913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.201956] kthread+0x328/0x630 [ 16.201989] ret_from_fork+0x10/0x20 [ 16.202047] [ 16.202107] The buggy address belongs to the object at fff00000c3ef4300 [ 16.202107] which belongs to the cache kmalloc-128 of size 128 [ 16.202201] The buggy address is located 0 bytes to the right of [ 16.202201] allocated 115-byte region [fff00000c3ef4300, fff00000c3ef4373) [ 16.202269] [ 16.202348] The buggy address belongs to the physical page: [ 16.202548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef4 [ 16.202824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.203125] page_type: f5(slab) [ 16.203419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.203483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.203588] page dumped because: kasan: bad access detected [ 16.203628] [ 16.203653] Memory state around the buggy address: [ 16.203865] fff00000c3ef4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.203943] fff00000c3ef4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.203998] >fff00000c3ef4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.204052] ^ [ 16.204133] fff00000c3ef4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.204176] fff00000c3ef4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.204237] ==================================================================
[ 16.283408] ================================================================== [ 16.283742] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.284538] Write of size 1 at addr fff00000c58dc573 by task kunit_try_catch/136 [ 16.284659] [ 16.285550] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7 #1 PREEMPT [ 16.285804] Tainted: [N]=TEST [ 16.285873] Hardware name: linux,dummy-virt (DT) [ 16.286173] Call trace: [ 16.286341] show_stack+0x20/0x38 (C) [ 16.286474] dump_stack_lvl+0x8c/0xd0 [ 16.286535] print_report+0x118/0x5d0 [ 16.286638] kasan_report+0xdc/0x128 [ 16.286734] __asan_report_store1_noabort+0x20/0x30 [ 16.286858] kmalloc_oob_right+0x5a4/0x660 [ 16.286961] kunit_try_run_case+0x170/0x3f0 [ 16.287043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.287096] kthread+0x328/0x630 [ 16.287152] ret_from_fork+0x10/0x20 [ 16.287312] [ 16.287349] Allocated by task 136: [ 16.287472] kasan_save_stack+0x3c/0x68 [ 16.287672] kasan_save_track+0x20/0x40 [ 16.287759] kasan_save_alloc_info+0x40/0x58 [ 16.287856] __kasan_kmalloc+0xd4/0xd8 [ 16.287946] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.288070] kmalloc_oob_right+0xb0/0x660 [ 16.288174] kunit_try_run_case+0x170/0x3f0 [ 16.288241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.288337] kthread+0x328/0x630 [ 16.288443] ret_from_fork+0x10/0x20 [ 16.288552] [ 16.288910] The buggy address belongs to the object at fff00000c58dc500 [ 16.288910] which belongs to the cache kmalloc-128 of size 128 [ 16.289175] The buggy address is located 0 bytes to the right of [ 16.289175] allocated 115-byte region [fff00000c58dc500, fff00000c58dc573) [ 16.289257] [ 16.289545] The buggy address belongs to the physical page: [ 16.290156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc [ 16.290850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.292051] page_type: f5(slab) [ 16.293078] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.293212] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.293338] page dumped because: kasan: bad access detected [ 16.293381] [ 16.293407] Memory state around the buggy address: [ 16.294234] fff00000c58dc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.294422] fff00000c58dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.294517] >fff00000c58dc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.294578] ^ [ 16.294712] fff00000c58dc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.294782] fff00000c58dc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.294862] ================================================================== [ 16.302751] ================================================================== [ 16.302802] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.302865] Read of size 1 at addr fff00000c58dc580 by task kunit_try_catch/136 [ 16.302916] [ 16.302945] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.303023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.303059] Hardware name: linux,dummy-virt (DT) [ 16.303095] Call trace: [ 16.303117] show_stack+0x20/0x38 (C) [ 16.303165] dump_stack_lvl+0x8c/0xd0 [ 16.303211] print_report+0x118/0x5d0 [ 16.303258] kasan_report+0xdc/0x128 [ 16.303308] __asan_report_load1_noabort+0x20/0x30 [ 16.303359] kmalloc_oob_right+0x5d0/0x660 [ 16.303413] kunit_try_run_case+0x170/0x3f0 [ 16.303460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.303517] kthread+0x328/0x630 [ 16.303558] ret_from_fork+0x10/0x20 [ 16.303604] [ 16.303633] Allocated by task 136: [ 16.303660] kasan_save_stack+0x3c/0x68 [ 16.303701] kasan_save_track+0x20/0x40 [ 16.303738] kasan_save_alloc_info+0x40/0x58 [ 16.303777] __kasan_kmalloc+0xd4/0xd8 [ 16.303813] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.303852] kmalloc_oob_right+0xb0/0x660 [ 16.303887] kunit_try_run_case+0x170/0x3f0 [ 16.303924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.303965] kthread+0x328/0x630 [ 16.304002] ret_from_fork+0x10/0x20 [ 16.304037] [ 16.304055] The buggy address belongs to the object at fff00000c58dc500 [ 16.304055] which belongs to the cache kmalloc-128 of size 128 [ 16.304110] The buggy address is located 13 bytes to the right of [ 16.304110] allocated 115-byte region [fff00000c58dc500, fff00000c58dc573) [ 16.304173] [ 16.304192] The buggy address belongs to the physical page: [ 16.304220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc [ 16.304271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.304318] page_type: f5(slab) [ 16.304355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.304405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.304462] page dumped because: kasan: bad access detected [ 16.304501] [ 16.304519] Memory state around the buggy address: [ 16.304548] fff00000c58dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304590] fff00000c58dc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.305272] >fff00000c58dc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305340] ^ [ 16.305477] fff00000c58dc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305524] fff00000c58dc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.305562] ================================================================== [ 16.296130] ================================================================== [ 16.296177] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.296451] Write of size 1 at addr fff00000c58dc578 by task kunit_try_catch/136 [ 16.296597] [ 16.296669] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.296759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.296786] Hardware name: linux,dummy-virt (DT) [ 16.296819] Call trace: [ 16.296841] show_stack+0x20/0x38 (C) [ 16.297068] dump_stack_lvl+0x8c/0xd0 [ 16.297224] print_report+0x118/0x5d0 [ 16.297320] kasan_report+0xdc/0x128 [ 16.297430] __asan_report_store1_noabort+0x20/0x30 [ 16.297527] kmalloc_oob_right+0x538/0x660 [ 16.297708] kunit_try_run_case+0x170/0x3f0 [ 16.297762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.297960] kthread+0x328/0x630 [ 16.298125] ret_from_fork+0x10/0x20 [ 16.298284] [ 16.298372] Allocated by task 136: [ 16.298498] kasan_save_stack+0x3c/0x68 [ 16.298567] kasan_save_track+0x20/0x40 [ 16.298764] kasan_save_alloc_info+0x40/0x58 [ 16.298812] __kasan_kmalloc+0xd4/0xd8 [ 16.298860] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.298980] kmalloc_oob_right+0xb0/0x660 [ 16.299124] kunit_try_run_case+0x170/0x3f0 [ 16.299212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.299290] kthread+0x328/0x630 [ 16.299552] ret_from_fork+0x10/0x20 [ 16.299632] [ 16.299697] The buggy address belongs to the object at fff00000c58dc500 [ 16.299697] which belongs to the cache kmalloc-128 of size 128 [ 16.299822] The buggy address is located 5 bytes to the right of [ 16.299822] allocated 115-byte region [fff00000c58dc500, fff00000c58dc573) [ 16.299903] [ 16.300142] The buggy address belongs to the physical page: [ 16.300261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc [ 16.300529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.300603] page_type: f5(slab) [ 16.300713] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.300797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.300837] page dumped because: kasan: bad access detected [ 16.300873] [ 16.300891] Memory state around the buggy address: [ 16.301154] fff00000c58dc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.301266] fff00000c58dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.301344] >fff00000c58dc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.301481] ^ [ 16.301521] fff00000c58dc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.301564] fff00000c58dc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.301600] ==================================================================
[ 11.987832] ================================================================== [ 11.988243] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.988546] Write of size 1 at addr ffff88810313a378 by task kunit_try_catch/154 [ 11.988876] [ 11.988986] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 11.989028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.989040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.989063] Call Trace: [ 11.989078] <TASK> [ 11.989094] dump_stack_lvl+0x73/0xb0 [ 11.989121] print_report+0xd1/0x610 [ 11.989143] ? __virt_addr_valid+0x1db/0x2d0 [ 11.989166] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.989187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.989209] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.989231] kasan_report+0x141/0x180 [ 11.989320] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.989371] __asan_report_store1_noabort+0x1b/0x30 [ 11.989408] kmalloc_oob_right+0x6bd/0x7f0 [ 11.989434] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.989458] ? __schedule+0x10c6/0x2b60 [ 11.989499] ? __pfx_read_tsc+0x10/0x10 [ 11.989520] ? ktime_get_ts64+0x86/0x230 [ 11.989544] kunit_try_run_case+0x1a5/0x480 [ 11.989569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.989602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.989624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.989648] ? __kthread_parkme+0x82/0x180 [ 11.989669] ? preempt_count_sub+0x50/0x80 [ 11.989692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.989716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.989739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.989762] kthread+0x337/0x6f0 [ 11.989780] ? trace_preempt_on+0x20/0xc0 [ 11.989803] ? __pfx_kthread+0x10/0x10 [ 11.989842] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.989863] ? calculate_sigpending+0x7b/0xa0 [ 11.989887] ? __pfx_kthread+0x10/0x10 [ 11.989909] ret_from_fork+0x116/0x1d0 [ 11.989943] ? __pfx_kthread+0x10/0x10 [ 11.989963] ret_from_fork_asm+0x1a/0x30 [ 11.989996] </TASK> [ 11.990006] [ 11.998852] Allocated by task 154: [ 11.999193] kasan_save_stack+0x45/0x70 [ 11.999393] kasan_save_track+0x18/0x40 [ 11.999604] kasan_save_alloc_info+0x3b/0x50 [ 11.999811] __kasan_kmalloc+0xb7/0xc0 [ 11.999995] __kmalloc_cache_noprof+0x189/0x420 [ 12.000287] kmalloc_oob_right+0xa9/0x7f0 [ 12.000504] kunit_try_run_case+0x1a5/0x480 [ 12.000719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.000984] kthread+0x337/0x6f0 [ 12.001233] ret_from_fork+0x116/0x1d0 [ 12.001448] ret_from_fork_asm+0x1a/0x30 [ 12.001641] [ 12.001746] The buggy address belongs to the object at ffff88810313a300 [ 12.001746] which belongs to the cache kmalloc-128 of size 128 [ 12.002344] The buggy address is located 5 bytes to the right of [ 12.002344] allocated 115-byte region [ffff88810313a300, ffff88810313a373) [ 12.002981] [ 12.003091] The buggy address belongs to the physical page: [ 12.003357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a [ 12.003733] flags: 0x200000000000000(node=0|zone=2) [ 12.003971] page_type: f5(slab) [ 12.004135] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.004474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.004918] page dumped because: kasan: bad access detected [ 12.005085] [ 12.005152] Memory state around the buggy address: [ 12.005526] ffff88810313a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.006213] ffff88810313a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.006521] >ffff88810313a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.006728] ^ [ 12.007189] ffff88810313a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.007521] ffff88810313a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.007823] ================================================================== [ 12.008569] ================================================================== [ 12.008917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.009282] Read of size 1 at addr ffff88810313a380 by task kunit_try_catch/154 [ 12.009700] [ 12.009790] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.009831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.009842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.009888] Call Trace: [ 12.009902] <TASK> [ 12.009916] dump_stack_lvl+0x73/0xb0 [ 12.009942] print_report+0xd1/0x610 [ 12.009982] ? __virt_addr_valid+0x1db/0x2d0 [ 12.010006] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.010027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.010096] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.010123] kasan_report+0x141/0x180 [ 12.010145] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.010172] __asan_report_load1_noabort+0x18/0x20 [ 12.010196] kmalloc_oob_right+0x68a/0x7f0 [ 12.010219] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.010241] ? __schedule+0x10c6/0x2b60 [ 12.010263] ? __pfx_read_tsc+0x10/0x10 [ 12.010284] ? ktime_get_ts64+0x86/0x230 [ 12.010331] kunit_try_run_case+0x1a5/0x480 [ 12.010369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.010417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.010453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.010477] ? __kthread_parkme+0x82/0x180 [ 12.010511] ? preempt_count_sub+0x50/0x80 [ 12.010535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.010559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.010582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.010612] kthread+0x337/0x6f0 [ 12.010632] ? trace_preempt_on+0x20/0xc0 [ 12.010654] ? __pfx_kthread+0x10/0x10 [ 12.010675] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.010696] ? calculate_sigpending+0x7b/0xa0 [ 12.010719] ? __pfx_kthread+0x10/0x10 [ 12.010741] ret_from_fork+0x116/0x1d0 [ 12.010759] ? __pfx_kthread+0x10/0x10 [ 12.010779] ret_from_fork_asm+0x1a/0x30 [ 12.010812] </TASK> [ 12.010823] [ 12.018970] Allocated by task 154: [ 12.019185] kasan_save_stack+0x45/0x70 [ 12.019535] kasan_save_track+0x18/0x40 [ 12.019806] kasan_save_alloc_info+0x3b/0x50 [ 12.020034] __kasan_kmalloc+0xb7/0xc0 [ 12.020244] __kmalloc_cache_noprof+0x189/0x420 [ 12.020610] kmalloc_oob_right+0xa9/0x7f0 [ 12.020835] kunit_try_run_case+0x1a5/0x480 [ 12.021027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.021304] kthread+0x337/0x6f0 [ 12.021436] ret_from_fork+0x116/0x1d0 [ 12.021568] ret_from_fork_asm+0x1a/0x30 [ 12.021769] [ 12.021866] The buggy address belongs to the object at ffff88810313a300 [ 12.021866] which belongs to the cache kmalloc-128 of size 128 [ 12.022666] The buggy address is located 13 bytes to the right of [ 12.022666] allocated 115-byte region [ffff88810313a300, ffff88810313a373) [ 12.023310] [ 12.023417] The buggy address belongs to the physical page: [ 12.023695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a [ 12.023932] flags: 0x200000000000000(node=0|zone=2) [ 12.024428] page_type: f5(slab) [ 12.024675] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.024963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.025505] page dumped because: kasan: bad access detected [ 12.025767] [ 12.025866] Memory state around the buggy address: [ 12.026101] ffff88810313a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.026436] ffff88810313a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.026741] >ffff88810313a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.027056] ^ [ 12.027272] ffff88810313a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.027605] ffff88810313a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.027897] ================================================================== [ 11.961447] ================================================================== [ 11.962143] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.962897] Write of size 1 at addr ffff88810313a373 by task kunit_try_catch/154 [ 11.963321] [ 11.964422] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 11.964798] Tainted: [N]=TEST [ 11.964831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.965052] Call Trace: [ 11.965119] <TASK> [ 11.965268] dump_stack_lvl+0x73/0xb0 [ 11.965357] print_report+0xd1/0x610 [ 11.965388] ? __virt_addr_valid+0x1db/0x2d0 [ 11.965427] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.965448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.965470] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.965492] kasan_report+0x141/0x180 [ 11.965514] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.965541] __asan_report_store1_noabort+0x1b/0x30 [ 11.965564] kmalloc_oob_right+0x6f0/0x7f0 [ 11.965586] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.965609] ? __schedule+0x10c6/0x2b60 [ 11.965633] ? __pfx_read_tsc+0x10/0x10 [ 11.965654] ? ktime_get_ts64+0x86/0x230 [ 11.965681] kunit_try_run_case+0x1a5/0x480 [ 11.965708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.965730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.965754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.965778] ? __kthread_parkme+0x82/0x180 [ 11.965799] ? preempt_count_sub+0x50/0x80 [ 11.965824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.965848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.965871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.965894] kthread+0x337/0x6f0 [ 11.965914] ? trace_preempt_on+0x20/0xc0 [ 11.965938] ? __pfx_kthread+0x10/0x10 [ 11.965959] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.965980] ? calculate_sigpending+0x7b/0xa0 [ 11.966005] ? __pfx_kthread+0x10/0x10 [ 11.966044] ret_from_fork+0x116/0x1d0 [ 11.966063] ? __pfx_kthread+0x10/0x10 [ 11.966084] ret_from_fork_asm+0x1a/0x30 [ 11.966147] </TASK> [ 11.966216] [ 11.973972] Allocated by task 154: [ 11.974476] kasan_save_stack+0x45/0x70 [ 11.974797] kasan_save_track+0x18/0x40 [ 11.974982] kasan_save_alloc_info+0x3b/0x50 [ 11.975264] __kasan_kmalloc+0xb7/0xc0 [ 11.975448] __kmalloc_cache_noprof+0x189/0x420 [ 11.975819] kmalloc_oob_right+0xa9/0x7f0 [ 11.976026] kunit_try_run_case+0x1a5/0x480 [ 11.976248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.976610] kthread+0x337/0x6f0 [ 11.976918] ret_from_fork+0x116/0x1d0 [ 11.977116] ret_from_fork_asm+0x1a/0x30 [ 11.977387] [ 11.977634] The buggy address belongs to the object at ffff88810313a300 [ 11.977634] which belongs to the cache kmalloc-128 of size 128 [ 11.978618] The buggy address is located 0 bytes to the right of [ 11.978618] allocated 115-byte region [ffff88810313a300, ffff88810313a373) [ 11.979053] [ 11.979208] The buggy address belongs to the physical page: [ 11.979742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a [ 11.980804] flags: 0x200000000000000(node=0|zone=2) [ 11.981563] page_type: f5(slab) [ 11.982239] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.982607] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.982997] page dumped because: kasan: bad access detected [ 11.983364] [ 11.983482] Memory state around the buggy address: [ 11.984112] ffff88810313a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.984549] ffff88810313a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.984928] >ffff88810313a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.985363] ^ [ 11.985808] ffff88810313a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.986268] ffff88810313a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.986598] ==================================================================
[ 12.109037] ================================================================== [ 12.109399] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 12.109663] Read of size 1 at addr ffff8881027a1880 by task kunit_try_catch/153 [ 12.110172] [ 12.110273] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.110316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.110327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.110349] Call Trace: [ 12.110366] <TASK> [ 12.110381] dump_stack_lvl+0x73/0xb0 [ 12.110408] print_report+0xd1/0x610 [ 12.110429] ? __virt_addr_valid+0x1db/0x2d0 [ 12.110450] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.110470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.110491] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.110512] kasan_report+0x141/0x180 [ 12.110533] ? kmalloc_oob_right+0x68a/0x7f0 [ 12.110558] __asan_report_load1_noabort+0x18/0x20 [ 12.110581] kmalloc_oob_right+0x68a/0x7f0 [ 12.110602] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.110624] ? __schedule+0x10c6/0x2b60 [ 12.110646] ? __pfx_read_tsc+0x10/0x10 [ 12.110666] ? ktime_get_ts64+0x86/0x230 [ 12.110689] kunit_try_run_case+0x1a5/0x480 [ 12.110713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.110735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.110757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.110780] ? __kthread_parkme+0x82/0x180 [ 12.110799] ? preempt_count_sub+0x50/0x80 [ 12.110821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.110844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.110932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.110955] kthread+0x337/0x6f0 [ 12.110973] ? trace_preempt_on+0x20/0xc0 [ 12.110996] ? __pfx_kthread+0x10/0x10 [ 12.111016] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.111036] ? calculate_sigpending+0x7b/0xa0 [ 12.111059] ? __pfx_kthread+0x10/0x10 [ 12.111080] ret_from_fork+0x116/0x1d0 [ 12.111098] ? __pfx_kthread+0x10/0x10 [ 12.111117] ret_from_fork_asm+0x1a/0x30 [ 12.111159] </TASK> [ 12.111169] [ 12.118588] Allocated by task 153: [ 12.118727] kasan_save_stack+0x45/0x70 [ 12.119008] kasan_save_track+0x18/0x40 [ 12.119224] kasan_save_alloc_info+0x3b/0x50 [ 12.119463] __kasan_kmalloc+0xb7/0xc0 [ 12.119654] __kmalloc_cache_noprof+0x189/0x420 [ 12.119868] kmalloc_oob_right+0xa9/0x7f0 [ 12.120011] kunit_try_run_case+0x1a5/0x480 [ 12.120167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.120356] kthread+0x337/0x6f0 [ 12.120480] ret_from_fork+0x116/0x1d0 [ 12.120614] ret_from_fork_asm+0x1a/0x30 [ 12.120754] [ 12.120833] The buggy address belongs to the object at ffff8881027a1800 [ 12.120833] which belongs to the cache kmalloc-128 of size 128 [ 12.121508] The buggy address is located 13 bytes to the right of [ 12.121508] allocated 115-byte region [ffff8881027a1800, ffff8881027a1873) [ 12.122277] [ 12.122404] The buggy address belongs to the physical page: [ 12.122658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 12.123094] flags: 0x200000000000000(node=0|zone=2) [ 12.123368] page_type: f5(slab) [ 12.123517] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.123808] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.124109] page dumped because: kasan: bad access detected [ 12.124412] [ 12.124509] Memory state around the buggy address: [ 12.124735] ffff8881027a1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.125133] ffff8881027a1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.125488] >ffff8881027a1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.125752] ^ [ 12.126093] ffff8881027a1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.126410] ffff8881027a1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.126711] ================================================================== [ 12.089404] ================================================================== [ 12.089732] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 12.090055] Write of size 1 at addr ffff8881027a1878 by task kunit_try_catch/153 [ 12.090344] [ 12.090458] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.090502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.090516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.090536] Call Trace: [ 12.090549] <TASK> [ 12.090565] dump_stack_lvl+0x73/0xb0 [ 12.090592] print_report+0xd1/0x610 [ 12.090614] ? __virt_addr_valid+0x1db/0x2d0 [ 12.090637] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.090657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.090678] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.090699] kasan_report+0x141/0x180 [ 12.090720] ? kmalloc_oob_right+0x6bd/0x7f0 [ 12.090745] __asan_report_store1_noabort+0x1b/0x30 [ 12.090769] kmalloc_oob_right+0x6bd/0x7f0 [ 12.090790] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.090811] ? __schedule+0x10c6/0x2b60 [ 12.090832] ? __pfx_read_tsc+0x10/0x10 [ 12.090852] ? ktime_get_ts64+0x86/0x230 [ 12.090927] kunit_try_run_case+0x1a5/0x480 [ 12.090951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.090972] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.090996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.091018] ? __kthread_parkme+0x82/0x180 [ 12.091037] ? preempt_count_sub+0x50/0x80 [ 12.091061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.091084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.091107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.091129] kthread+0x337/0x6f0 [ 12.091161] ? trace_preempt_on+0x20/0xc0 [ 12.091184] ? __pfx_kthread+0x10/0x10 [ 12.091204] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.091224] ? calculate_sigpending+0x7b/0xa0 [ 12.091247] ? __pfx_kthread+0x10/0x10 [ 12.091268] ret_from_fork+0x116/0x1d0 [ 12.091286] ? __pfx_kthread+0x10/0x10 [ 12.091305] ret_from_fork_asm+0x1a/0x30 [ 12.091335] </TASK> [ 12.091345] [ 12.099307] Allocated by task 153: [ 12.099467] kasan_save_stack+0x45/0x70 [ 12.099674] kasan_save_track+0x18/0x40 [ 12.099831] kasan_save_alloc_info+0x3b/0x50 [ 12.100239] __kasan_kmalloc+0xb7/0xc0 [ 12.100436] __kmalloc_cache_noprof+0x189/0x420 [ 12.100661] kmalloc_oob_right+0xa9/0x7f0 [ 12.100841] kunit_try_run_case+0x1a5/0x480 [ 12.101031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.101262] kthread+0x337/0x6f0 [ 12.101384] ret_from_fork+0x116/0x1d0 [ 12.101518] ret_from_fork_asm+0x1a/0x30 [ 12.101661] [ 12.101758] The buggy address belongs to the object at ffff8881027a1800 [ 12.101758] which belongs to the cache kmalloc-128 of size 128 [ 12.102746] The buggy address is located 5 bytes to the right of [ 12.102746] allocated 115-byte region [ffff8881027a1800, ffff8881027a1873) [ 12.103154] [ 12.103228] The buggy address belongs to the physical page: [ 12.103765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 12.104258] flags: 0x200000000000000(node=0|zone=2) [ 12.104439] page_type: f5(slab) [ 12.104563] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.104796] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.105357] page dumped because: kasan: bad access detected [ 12.105828] [ 12.106049] Memory state around the buggy address: [ 12.106294] ffff8881027a1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.106563] ffff8881027a1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.106780] >ffff8881027a1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.106997] ^ [ 12.107520] ffff8881027a1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.107846] ffff8881027a1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.108537] ================================================================== [ 12.063659] ================================================================== [ 12.064567] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 12.065629] Write of size 1 at addr ffff8881027a1873 by task kunit_try_catch/153 [ 12.066004] [ 12.066957] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.067308] Tainted: [N]=TEST [ 12.067339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.067559] Call Trace: [ 12.067625] <TASK> [ 12.067766] dump_stack_lvl+0x73/0xb0 [ 12.067865] print_report+0xd1/0x610 [ 12.067895] ? __virt_addr_valid+0x1db/0x2d0 [ 12.067919] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.067940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.067961] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.067982] kasan_report+0x141/0x180 [ 12.068003] ? kmalloc_oob_right+0x6f0/0x7f0 [ 12.068028] __asan_report_store1_noabort+0x1b/0x30 [ 12.068052] kmalloc_oob_right+0x6f0/0x7f0 [ 12.068073] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 12.068095] ? __schedule+0x10c6/0x2b60 [ 12.068117] ? __pfx_read_tsc+0x10/0x10 [ 12.068138] ? ktime_get_ts64+0x86/0x230 [ 12.068176] kunit_try_run_case+0x1a5/0x480 [ 12.068202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.068224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.068248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.068270] ? __kthread_parkme+0x82/0x180 [ 12.068292] ? preempt_count_sub+0x50/0x80 [ 12.068315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.068343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.068365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.068388] kthread+0x337/0x6f0 [ 12.068407] ? trace_preempt_on+0x20/0xc0 [ 12.068430] ? __pfx_kthread+0x10/0x10 [ 12.068450] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.068471] ? calculate_sigpending+0x7b/0xa0 [ 12.068495] ? __pfx_kthread+0x10/0x10 [ 12.068516] ret_from_fork+0x116/0x1d0 [ 12.068534] ? __pfx_kthread+0x10/0x10 [ 12.068554] ret_from_fork_asm+0x1a/0x30 [ 12.068607] </TASK> [ 12.068671] [ 12.076540] Allocated by task 153: [ 12.076828] kasan_save_stack+0x45/0x70 [ 12.077068] kasan_save_track+0x18/0x40 [ 12.077275] kasan_save_alloc_info+0x3b/0x50 [ 12.077709] __kasan_kmalloc+0xb7/0xc0 [ 12.078169] __kmalloc_cache_noprof+0x189/0x420 [ 12.078415] kmalloc_oob_right+0xa9/0x7f0 [ 12.078578] kunit_try_run_case+0x1a5/0x480 [ 12.078726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.079157] kthread+0x337/0x6f0 [ 12.079341] ret_from_fork+0x116/0x1d0 [ 12.079532] ret_from_fork_asm+0x1a/0x30 [ 12.079772] [ 12.080095] The buggy address belongs to the object at ffff8881027a1800 [ 12.080095] which belongs to the cache kmalloc-128 of size 128 [ 12.080746] The buggy address is located 0 bytes to the right of [ 12.080746] allocated 115-byte region [ffff8881027a1800, ffff8881027a1873) [ 12.081367] [ 12.081545] The buggy address belongs to the physical page: [ 12.081963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 12.082515] flags: 0x200000000000000(node=0|zone=2) [ 12.083130] page_type: f5(slab) [ 12.083611] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.083940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.084602] page dumped because: kasan: bad access detected [ 12.084844] [ 12.085013] Memory state around the buggy address: [ 12.085450] ffff8881027a1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.085839] ffff8881027a1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.086226] >ffff8881027a1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.086698] ^ [ 12.087090] ffff8881027a1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.087410] ffff8881027a1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.087752] ==================================================================