Date
June 24, 2025, 11:37 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 28.697928] ================================================================== [ 28.705250] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 28.712318] Write of size 1 at addr ffff0000822c2378 by task kunit_try_catch/234 [ 28.719812] [ 28.721350] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 28.721386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.721396] Hardware name: Thundercomm Dragonboard 845c (DT) [ 28.721409] Call trace: [ 28.721417] show_stack+0x20/0x38 (C) [ 28.721440] dump_stack_lvl+0x8c/0xd0 [ 28.721462] print_report+0x118/0x608 [ 28.721484] kasan_report+0xdc/0x128 [ 28.721504] __asan_report_store1_noabort+0x20/0x30 [ 28.721523] kmalloc_oob_right+0x538/0x660 [ 28.721541] kunit_try_run_case+0x170/0x3f0 [ 28.721563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.721585] kthread+0x328/0x630 [ 28.721602] ret_from_fork+0x10/0x20 [ 28.721622] [ 28.787320] Allocated by task 234: [ 28.790777] kasan_save_stack+0x3c/0x68 [ 28.794687] kasan_save_track+0x20/0x40 [ 28.798593] kasan_save_alloc_info+0x40/0x58 [ 28.802941] __kasan_kmalloc+0xd4/0xd8 [ 28.806760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.811370] kmalloc_oob_right+0xb0/0x660 [ 28.815445] kunit_try_run_case+0x170/0x3f0 [ 28.819705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.825280] kthread+0x328/0x630 [ 28.828567] ret_from_fork+0x10/0x20 [ 28.832213] [ 28.833744] The buggy address belongs to the object at ffff0000822c2300 [ 28.833744] which belongs to the cache kmalloc-128 of size 128 [ 28.846409] The buggy address is located 5 bytes to the right of [ 28.846409] allocated 115-byte region [ffff0000822c2300, ffff0000822c2373) [ 28.859507] [ 28.861042] The buggy address belongs to the physical page: [ 28.866691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 28.874802] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.882565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.889631] page_type: f5(slab) [ 28.892834] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.900685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.908533] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.916469] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.924403] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 28.932339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.940272] page dumped because: kasan: bad access detected [ 28.945920] [ 28.947457] Memory state around the buggy address: [ 28.952323] ffff0000822c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.959643] ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.966963] >ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.974279] ^ [ 28.981507] ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.988825] ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.996142] ================================================================== [ 29.003798] ================================================================== [ 29.011125] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.018178] Read of size 1 at addr ffff0000822c2380 by task kunit_try_catch/234 [ 29.025584] [ 29.027124] CPU: 5 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 29.027155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.027163] Hardware name: Thundercomm Dragonboard 845c (DT) [ 29.027174] Call trace: [ 29.027180] show_stack+0x20/0x38 (C) [ 29.027198] dump_stack_lvl+0x8c/0xd0 [ 29.027216] print_report+0x118/0x608 [ 29.027234] kasan_report+0xdc/0x128 [ 29.027251] __asan_report_load1_noabort+0x20/0x30 [ 29.027267] kmalloc_oob_right+0x5d0/0x660 [ 29.027282] kunit_try_run_case+0x170/0x3f0 [ 29.027300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.027319] kthread+0x328/0x630 [ 29.027332] ret_from_fork+0x10/0x20 [ 29.027349] [ 29.092922] Allocated by task 234: [ 29.096375] kasan_save_stack+0x3c/0x68 [ 29.100280] kasan_save_track+0x20/0x40 [ 29.104185] kasan_save_alloc_info+0x40/0x58 [ 29.108518] __kasan_kmalloc+0xd4/0xd8 [ 29.112333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.116931] kmalloc_oob_right+0xb0/0x660 [ 29.121005] kunit_try_run_case+0x170/0x3f0 [ 29.125252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.130817] kthread+0x328/0x630 [ 29.134097] ret_from_fork+0x10/0x20 [ 29.137739] [ 29.139269] The buggy address belongs to the object at ffff0000822c2300 [ 29.139269] which belongs to the cache kmalloc-128 of size 128 [ 29.151917] The buggy address is located 13 bytes to the right of [ 29.151917] allocated 115-byte region [ffff0000822c2300, ffff0000822c2373) [ 29.165101] [ 29.166624] The buggy address belongs to the physical page: [ 29.172274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 29.180375] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.188126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.195177] page_type: f5(slab) [ 29.198375] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 29.206214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.214052] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 29.221975] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.229898] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 29.237820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.245741] page dumped because: kasan: bad access detected [ 29.251378] [ 29.252909] Memory state around the buggy address: [ 29.257760] ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.265073] ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.272386] >ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.279697] ^ [ 29.282980] ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.290292] ffff0000822c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.297603] ================================================================== [ 28.388246] ================================================================== [ 28.395592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 28.402664] Write of size 1 at addr ffff0000822c2373 by task kunit_try_catch/234 [ 28.410164] [ 28.411709] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 28.411746] Tainted: [N]=TEST [ 28.411753] Hardware name: Thundercomm Dragonboard 845c (DT) [ 28.411770] Call trace: [ 28.411779] show_stack+0x20/0x38 (C) [ 28.411804] dump_stack_lvl+0x8c/0xd0 [ 28.411828] print_report+0x118/0x608 [ 28.411851] kasan_report+0xdc/0x128 [ 28.411870] __asan_report_store1_noabort+0x20/0x30 [ 28.411890] kmalloc_oob_right+0x5a4/0x660 [ 28.411907] kunit_try_run_case+0x170/0x3f0 [ 28.411931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.411956] kthread+0x328/0x630 [ 28.411976] ret_from_fork+0x10/0x20 [ 28.411999] [ 28.476483] Allocated by task 234: [ 28.479952] kasan_save_stack+0x3c/0x68 [ 28.483859] kasan_save_track+0x20/0x40 [ 28.487763] kasan_save_alloc_info+0x40/0x58 [ 28.492107] __kasan_kmalloc+0xd4/0xd8 [ 28.495925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.500536] kmalloc_oob_right+0xb0/0x660 [ 28.504612] kunit_try_run_case+0x170/0x3f0 [ 28.508871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.514439] kthread+0x328/0x630 [ 28.517726] ret_from_fork+0x10/0x20 [ 28.521370] [ 28.522901] The buggy address belongs to the object at ffff0000822c2300 [ 28.522901] which belongs to the cache kmalloc-128 of size 128 [ 28.535564] The buggy address is located 0 bytes to the right of [ 28.535564] allocated 115-byte region [ffff0000822c2300, ffff0000822c2373) [ 28.548670] [ 28.550202] The buggy address belongs to the physical page: [ 28.555850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 28.563957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.571718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.578783] page_type: f5(slab) [ 28.581987] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.589834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.597681] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.605614] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.613546] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 28.621479] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.629408] page dumped because: kasan: bad access detected [ 28.635054] [ 28.636583] Memory state around the buggy address: [ 28.641445] ffff0000822c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.648759] ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.656073] >ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.663385] ^ [ 28.670351] ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.677667] ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.684979] ==================================================================
[ 32.307070] ================================================================== [ 32.307188] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 32.307308] Write of size 1 at addr fff00000c56d3e78 by task kunit_try_catch/147 [ 32.307428] [ 32.307536] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 32.307725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.307789] Hardware name: linux,dummy-virt (DT) [ 32.307861] Call trace: [ 32.307933] show_stack+0x20/0x38 (C) [ 32.308048] dump_stack_lvl+0x8c/0xd0 [ 32.308164] print_report+0x118/0x608 [ 32.308471] kasan_report+0xdc/0x128 [ 32.308767] __asan_report_store1_noabort+0x20/0x30 [ 32.308962] kmalloc_oob_right+0x538/0x660 [ 32.309172] kunit_try_run_case+0x170/0x3f0 [ 32.309321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.309453] kthread+0x328/0x630 [ 32.309562] ret_from_fork+0x10/0x20 [ 32.309675] [ 32.309718] Allocated by task 147: [ 32.309782] kasan_save_stack+0x3c/0x68 [ 32.309874] kasan_save_track+0x20/0x40 [ 32.310001] kasan_save_alloc_info+0x40/0x58 [ 32.310109] __kasan_kmalloc+0xd4/0xd8 [ 32.310215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.310328] kmalloc_oob_right+0xb0/0x660 [ 32.310447] kunit_try_run_case+0x170/0x3f0 [ 32.310552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.310757] kthread+0x328/0x630 [ 32.310882] ret_from_fork+0x10/0x20 [ 32.310992] [ 32.311037] The buggy address belongs to the object at fff00000c56d3e00 [ 32.311037] which belongs to the cache kmalloc-128 of size 128 [ 32.311162] The buggy address is located 5 bytes to the right of [ 32.311162] allocated 115-byte region [fff00000c56d3e00, fff00000c56d3e73) [ 32.311309] [ 32.311357] The buggy address belongs to the physical page: [ 32.311447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c56d3800 pfn:0x1056d3 [ 32.311710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.311954] page_type: f5(slab) [ 32.312191] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.312465] raw: fff00000c56d3800 000000008010000f 00000000f5000000 0000000000000000 [ 32.312567] page dumped because: kasan: bad access detected [ 32.312648] [ 32.312735] Memory state around the buggy address: [ 32.312823] fff00000c56d3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.312955] fff00000c56d3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.313065] >fff00000c56d3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.313166] ^ [ 32.313273] fff00000c56d3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.313368] fff00000c56d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.313453] ================================================================== [ 32.314407] ================================================================== [ 32.314512] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 32.314627] Read of size 1 at addr fff00000c56d3e80 by task kunit_try_catch/147 [ 32.314853] [ 32.314945] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 32.315175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.315376] Hardware name: linux,dummy-virt (DT) [ 32.315514] Call trace: [ 32.315629] show_stack+0x20/0x38 (C) [ 32.315758] dump_stack_lvl+0x8c/0xd0 [ 32.315903] print_report+0x118/0x608 [ 32.316025] kasan_report+0xdc/0x128 [ 32.316143] __asan_report_load1_noabort+0x20/0x30 [ 32.316284] kmalloc_oob_right+0x5d0/0x660 [ 32.316423] kunit_try_run_case+0x170/0x3f0 [ 32.316558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.316705] kthread+0x328/0x630 [ 32.317007] ret_from_fork+0x10/0x20 [ 32.317213] [ 32.317260] Allocated by task 147: [ 32.317332] kasan_save_stack+0x3c/0x68 [ 32.317433] kasan_save_track+0x20/0x40 [ 32.317522] kasan_save_alloc_info+0x40/0x58 [ 32.317607] __kasan_kmalloc+0xd4/0xd8 [ 32.317710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.317826] kmalloc_oob_right+0xb0/0x660 [ 32.317951] kunit_try_run_case+0x170/0x3f0 [ 32.318062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.318256] kthread+0x328/0x630 [ 32.318347] ret_from_fork+0x10/0x20 [ 32.318510] [ 32.318563] The buggy address belongs to the object at fff00000c56d3e00 [ 32.318563] which belongs to the cache kmalloc-128 of size 128 [ 32.318690] The buggy address is located 13 bytes to the right of [ 32.318690] allocated 115-byte region [fff00000c56d3e00, fff00000c56d3e73) [ 32.319012] [ 32.319061] The buggy address belongs to the physical page: [ 32.319744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c56d3800 pfn:0x1056d3 [ 32.319819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.319881] page_type: f5(slab) [ 32.319977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.320038] raw: fff00000c56d3800 000000008010000f 00000000f5000000 0000000000000000 [ 32.320086] page dumped because: kasan: bad access detected [ 32.320161] [ 32.320187] Memory state around the buggy address: [ 32.320224] fff00000c56d3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.320277] fff00000c56d3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.320327] >fff00000c56d3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.320372] ^ [ 32.320407] fff00000c56d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.320457] fff00000c56d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.320500] ================================================================== [ 32.293703] ================================================================== [ 32.295751] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 32.297666] Write of size 1 at addr fff00000c56d3e73 by task kunit_try_catch/147 [ 32.297840] [ 32.298843] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 32.299064] Tainted: [N]=TEST [ 32.299167] Hardware name: linux,dummy-virt (DT) [ 32.299599] Call trace: [ 32.299815] show_stack+0x20/0x38 (C) [ 32.300023] dump_stack_lvl+0x8c/0xd0 [ 32.300098] print_report+0x118/0x608 [ 32.300159] kasan_report+0xdc/0x128 [ 32.300214] __asan_report_store1_noabort+0x20/0x30 [ 32.300270] kmalloc_oob_right+0x5a4/0x660 [ 32.300325] kunit_try_run_case+0x170/0x3f0 [ 32.300385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.300447] kthread+0x328/0x630 [ 32.300500] ret_from_fork+0x10/0x20 [ 32.300688] [ 32.300736] Allocated by task 147: [ 32.300876] kasan_save_stack+0x3c/0x68 [ 32.300975] kasan_save_track+0x20/0x40 [ 32.301028] kasan_save_alloc_info+0x40/0x58 [ 32.301073] __kasan_kmalloc+0xd4/0xd8 [ 32.301117] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.301166] kmalloc_oob_right+0xb0/0x660 [ 32.301208] kunit_try_run_case+0x170/0x3f0 [ 32.301252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.301303] kthread+0x328/0x630 [ 32.301340] ret_from_fork+0x10/0x20 [ 32.301408] [ 32.301481] The buggy address belongs to the object at fff00000c56d3e00 [ 32.301481] which belongs to the cache kmalloc-128 of size 128 [ 32.301596] The buggy address is located 0 bytes to the right of [ 32.301596] allocated 115-byte region [fff00000c56d3e00, fff00000c56d3e73) [ 32.301679] [ 32.301778] The buggy address belongs to the physical page: [ 32.302012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c56d3800 pfn:0x1056d3 [ 32.302336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.302691] page_type: f5(slab) [ 32.303075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.303221] raw: fff00000c56d3800 000000008010000f 00000000f5000000 0000000000000000 [ 32.303426] page dumped because: kasan: bad access detected [ 32.303486] [ 32.303520] Memory state around the buggy address: [ 32.303781] fff00000c56d3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.303869] fff00000c56d3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.303965] >fff00000c56d3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.304037] ^ [ 32.304149] fff00000c56d3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.304202] fff00000c56d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.304279] ==================================================================
[ 27.832407] ================================================================== [ 27.832978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 27.833917] Read of size 1 at addr ffff888102dcf680 by task kunit_try_catch/166 [ 27.834380] [ 27.834577] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 27.834683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.834715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.834760] Call Trace: [ 27.834799] <TASK> [ 27.834839] dump_stack_lvl+0x73/0xb0 [ 27.834910] print_report+0xd1/0x650 [ 27.834963] ? __virt_addr_valid+0x1db/0x2d0 [ 27.835023] ? kmalloc_oob_right+0x68a/0x7f0 [ 27.835079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.835146] ? kmalloc_oob_right+0x68a/0x7f0 [ 27.835202] kasan_report+0x141/0x180 [ 27.835261] ? kmalloc_oob_right+0x68a/0x7f0 [ 27.835331] __asan_report_load1_noabort+0x18/0x20 [ 27.835395] kmalloc_oob_right+0x68a/0x7f0 [ 27.835453] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 27.835571] ? __schedule+0x10cc/0x2b60 [ 27.835641] ? __pfx_read_tsc+0x10/0x10 [ 27.835698] ? ktime_get_ts64+0x86/0x230 [ 27.835763] kunit_try_run_case+0x1a5/0x480 [ 27.835839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.835898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.835962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.836029] ? __kthread_parkme+0x82/0x180 [ 27.836086] ? preempt_count_sub+0x50/0x80 [ 27.836149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.836215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.836281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.836346] kthread+0x337/0x6f0 [ 27.836400] ? trace_preempt_on+0x20/0xc0 [ 27.836462] ? __pfx_kthread+0x10/0x10 [ 27.836520] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.836599] ? calculate_sigpending+0x7b/0xa0 [ 27.836664] ? __pfx_kthread+0x10/0x10 [ 27.836723] ret_from_fork+0x116/0x1d0 [ 27.836777] ? __pfx_kthread+0x10/0x10 [ 27.836850] ret_from_fork_asm+0x1a/0x30 [ 27.836916] </TASK> [ 27.836933] [ 27.851073] Allocated by task 166: [ 27.851453] kasan_save_stack+0x45/0x70 [ 27.851765] kasan_save_track+0x18/0x40 [ 27.852161] kasan_save_alloc_info+0x3b/0x50 [ 27.852589] __kasan_kmalloc+0xb7/0xc0 [ 27.852981] __kmalloc_cache_noprof+0x189/0x420 [ 27.853360] kmalloc_oob_right+0xa9/0x7f0 [ 27.853761] kunit_try_run_case+0x1a5/0x480 [ 27.854128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.854493] kthread+0x337/0x6f0 [ 27.854800] ret_from_fork+0x116/0x1d0 [ 27.855194] ret_from_fork_asm+0x1a/0x30 [ 27.855604] [ 27.855849] The buggy address belongs to the object at ffff888102dcf600 [ 27.855849] which belongs to the cache kmalloc-128 of size 128 [ 27.856667] The buggy address is located 13 bytes to the right of [ 27.856667] allocated 115-byte region [ffff888102dcf600, ffff888102dcf673) [ 27.857476] [ 27.857704] The buggy address belongs to the physical page: [ 27.858141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dcf [ 27.858712] flags: 0x200000000000000(node=0|zone=2) [ 27.859164] page_type: f5(slab) [ 27.859396] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.860002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.860354] page dumped because: kasan: bad access detected [ 27.860891] [ 27.861079] Memory state around the buggy address: [ 27.861525] ffff888102dcf580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.862139] ffff888102dcf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.862657] >ffff888102dcf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.863148] ^ [ 27.863404] ffff888102dcf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.863962] ffff888102dcf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.864348] ================================================================== [ 27.752697] ================================================================== [ 27.753972] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 27.755068] Write of size 1 at addr ffff888102dcf673 by task kunit_try_catch/166 [ 27.755914] [ 27.757956] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 27.758512] Tainted: [N]=TEST [ 27.758584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.758880] Call Trace: [ 27.758971] <TASK> [ 27.759218] dump_stack_lvl+0x73/0xb0 [ 27.759352] print_report+0xd1/0x650 [ 27.759396] ? __virt_addr_valid+0x1db/0x2d0 [ 27.759433] ? kmalloc_oob_right+0x6f0/0x7f0 [ 27.759461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.759495] ? kmalloc_oob_right+0x6f0/0x7f0 [ 27.759523] kasan_report+0x141/0x180 [ 27.759573] ? kmalloc_oob_right+0x6f0/0x7f0 [ 27.759609] __asan_report_store1_noabort+0x1b/0x30 [ 27.759662] kmalloc_oob_right+0x6f0/0x7f0 [ 27.759695] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 27.759725] ? __schedule+0x10cc/0x2b60 [ 27.759758] ? __pfx_read_tsc+0x10/0x10 [ 27.759789] ? ktime_get_ts64+0x86/0x230 [ 27.759834] kunit_try_run_case+0x1a5/0x480 [ 27.759871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.759900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.759932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.759964] ? __kthread_parkme+0x82/0x180 [ 27.759992] ? preempt_count_sub+0x50/0x80 [ 27.760023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.760058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.760179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.760212] kthread+0x337/0x6f0 [ 27.760239] ? trace_preempt_on+0x20/0xc0 [ 27.760272] ? __pfx_kthread+0x10/0x10 [ 27.760299] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.760330] ? calculate_sigpending+0x7b/0xa0 [ 27.760362] ? __pfx_kthread+0x10/0x10 [ 27.760389] ret_from_fork+0x116/0x1d0 [ 27.760415] ? __pfx_kthread+0x10/0x10 [ 27.760441] ret_from_fork_asm+0x1a/0x30 [ 27.760520] </TASK> [ 27.760633] [ 27.773526] Allocated by task 166: [ 27.774797] kasan_save_stack+0x45/0x70 [ 27.775447] kasan_save_track+0x18/0x40 [ 27.775903] kasan_save_alloc_info+0x3b/0x50 [ 27.776338] __kasan_kmalloc+0xb7/0xc0 [ 27.776633] __kmalloc_cache_noprof+0x189/0x420 [ 27.777140] kmalloc_oob_right+0xa9/0x7f0 [ 27.777672] kunit_try_run_case+0x1a5/0x480 [ 27.778627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.779196] kthread+0x337/0x6f0 [ 27.779508] ret_from_fork+0x116/0x1d0 [ 27.779943] ret_from_fork_asm+0x1a/0x30 [ 27.780498] [ 27.780854] The buggy address belongs to the object at ffff888102dcf600 [ 27.780854] which belongs to the cache kmalloc-128 of size 128 [ 27.781977] The buggy address is located 0 bytes to the right of [ 27.781977] allocated 115-byte region [ffff888102dcf600, ffff888102dcf673) [ 27.783691] [ 27.784217] The buggy address belongs to the physical page: [ 27.785184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dcf [ 27.786173] flags: 0x200000000000000(node=0|zone=2) [ 27.787382] page_type: f5(slab) [ 27.788497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.789417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.790115] page dumped because: kasan: bad access detected [ 27.790743] [ 27.790905] Memory state around the buggy address: [ 27.792357] ffff888102dcf500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.793239] ffff888102dcf580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.793822] >ffff888102dcf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.794715] ^ [ 27.795844] ffff888102dcf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.796379] ffff888102dcf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.797317] ================================================================== [ 27.799472] ================================================================== [ 27.800097] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 27.801442] Write of size 1 at addr ffff888102dcf678 by task kunit_try_catch/166 [ 27.802090] [ 27.802293] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 27.802447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.802498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.802573] Call Trace: [ 27.802610] <TASK> [ 27.802703] dump_stack_lvl+0x73/0xb0 [ 27.802804] print_report+0xd1/0x650 [ 27.802858] ? __virt_addr_valid+0x1db/0x2d0 [ 27.802894] ? kmalloc_oob_right+0x6bd/0x7f0 [ 27.802923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.802957] ? kmalloc_oob_right+0x6bd/0x7f0 [ 27.802985] kasan_report+0x141/0x180 [ 27.803013] ? kmalloc_oob_right+0x6bd/0x7f0 [ 27.803046] __asan_report_store1_noabort+0x1b/0x30 [ 27.803077] kmalloc_oob_right+0x6bd/0x7f0 [ 27.803105] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 27.803133] ? __schedule+0x10cc/0x2b60 [ 27.803165] ? __pfx_read_tsc+0x10/0x10 [ 27.803193] ? ktime_get_ts64+0x86/0x230 [ 27.803224] kunit_try_run_case+0x1a5/0x480 [ 27.803256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.803284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.803315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.803345] ? __kthread_parkme+0x82/0x180 [ 27.803372] ? preempt_count_sub+0x50/0x80 [ 27.803401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.803432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.803461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.803491] kthread+0x337/0x6f0 [ 27.803516] ? trace_preempt_on+0x20/0xc0 [ 27.803567] ? __pfx_kthread+0x10/0x10 [ 27.803599] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.803643] ? calculate_sigpending+0x7b/0xa0 [ 27.803699] ? __pfx_kthread+0x10/0x10 [ 27.803728] ret_from_fork+0x116/0x1d0 [ 27.803754] ? __pfx_kthread+0x10/0x10 [ 27.803781] ret_from_fork_asm+0x1a/0x30 [ 27.803820] </TASK> [ 27.803845] [ 27.816082] Allocated by task 166: [ 27.816327] kasan_save_stack+0x45/0x70 [ 27.816627] kasan_save_track+0x18/0x40 [ 27.816864] kasan_save_alloc_info+0x3b/0x50 [ 27.817273] __kasan_kmalloc+0xb7/0xc0 [ 27.817685] __kmalloc_cache_noprof+0x189/0x420 [ 27.818172] kmalloc_oob_right+0xa9/0x7f0 [ 27.818673] kunit_try_run_case+0x1a5/0x480 [ 27.819124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.819767] kthread+0x337/0x6f0 [ 27.820161] ret_from_fork+0x116/0x1d0 [ 27.820572] ret_from_fork_asm+0x1a/0x30 [ 27.821033] [ 27.821239] The buggy address belongs to the object at ffff888102dcf600 [ 27.821239] which belongs to the cache kmalloc-128 of size 128 [ 27.822075] The buggy address is located 5 bytes to the right of [ 27.822075] allocated 115-byte region [ffff888102dcf600, ffff888102dcf673) [ 27.822744] [ 27.822953] The buggy address belongs to the physical page: [ 27.823489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dcf [ 27.824315] flags: 0x200000000000000(node=0|zone=2) [ 27.824873] page_type: f5(slab) [ 27.825275] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.825870] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.826402] page dumped because: kasan: bad access detected [ 27.826910] [ 27.827158] Memory state around the buggy address: [ 27.827534] ffff888102dcf500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.828205] ffff888102dcf580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.828663] >ffff888102dcf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.829255] ^ [ 27.829710] ffff888102dcf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.830431] ffff888102dcf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.831138] ==================================================================