Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 42.286641] ================================================================== [ 42.293956] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 42.301459] Read of size 1 at addr ffff000080e00378 by task kunit_try_catch/280 [ 42.308870] [ 42.310404] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 42.310433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.310442] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.310454] Call trace: [ 42.310460] show_stack+0x20/0x38 (C) [ 42.310478] dump_stack_lvl+0x8c/0xd0 [ 42.310498] print_report+0x118/0x608 [ 42.310517] kasan_report+0xdc/0x128 [ 42.310536] __asan_report_load1_noabort+0x20/0x30 [ 42.310554] ksize_unpoisons_memory+0x618/0x740 [ 42.310572] kunit_try_run_case+0x170/0x3f0 [ 42.310591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.310613] kthread+0x328/0x630 [ 42.310628] ret_from_fork+0x10/0x20 [ 42.310647] [ 42.376715] Allocated by task 280: [ 42.380173] kasan_save_stack+0x3c/0x68 [ 42.384083] kasan_save_track+0x20/0x40 [ 42.387993] kasan_save_alloc_info+0x40/0x58 [ 42.392329] __kasan_kmalloc+0xd4/0xd8 [ 42.396151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.400761] ksize_unpoisons_memory+0xc0/0x740 [ 42.405277] kunit_try_run_case+0x170/0x3f0 [ 42.409531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.415103] kthread+0x328/0x630 [ 42.418394] ret_from_fork+0x10/0x20 [ 42.422031] [ 42.423557] The buggy address belongs to the object at ffff000080e00300 [ 42.423557] which belongs to the cache kmalloc-128 of size 128 [ 42.436218] The buggy address is located 5 bytes to the right of [ 42.436218] allocated 115-byte region [ffff000080e00300, ffff000080e00373) [ 42.449318] [ 42.450848] The buggy address belongs to the physical page: [ 42.456492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e00 [ 42.464596] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.472353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.479410] page_type: f5(slab) [ 42.482616] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.490462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.498308] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.506241] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.514172] head: 0bfffe0000000001 fffffdffc2038001 00000000ffffffff 00000000ffffffff [ 42.522103] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 42.530029] page dumped because: kasan: bad access detected [ 42.535676] [ 42.537203] Memory state around the buggy address: [ 42.542066] ffff000080e00200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.549379] ffff000080e00280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.556695] >ffff000080e00300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 42.564007] ^ [ 42.571236] ffff000080e00380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.578551] ffff000080e00400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.585862] ================================================================== [ 41.976054] ================================================================== [ 41.987617] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 41.995113] Read of size 1 at addr ffff000080e00373 by task kunit_try_catch/280 [ 42.002525] [ 42.004065] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 42.004094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.004103] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.004113] Call trace: [ 42.004119] show_stack+0x20/0x38 (C) [ 42.004138] dump_stack_lvl+0x8c/0xd0 [ 42.004158] print_report+0x118/0x608 [ 42.004176] kasan_report+0xdc/0x128 [ 42.004195] __asan_report_load1_noabort+0x20/0x30 [ 42.004212] ksize_unpoisons_memory+0x628/0x740 [ 42.004231] kunit_try_run_case+0x170/0x3f0 [ 42.004249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.004272] kthread+0x328/0x630 [ 42.004287] ret_from_fork+0x10/0x20 [ 42.004305] [ 42.070332] Allocated by task 280: [ 42.073791] kasan_save_stack+0x3c/0x68 [ 42.077703] kasan_save_track+0x20/0x40 [ 42.081613] kasan_save_alloc_info+0x40/0x58 [ 42.085952] __kasan_kmalloc+0xd4/0xd8 [ 42.089773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.094388] ksize_unpoisons_memory+0xc0/0x740 [ 42.098901] kunit_try_run_case+0x170/0x3f0 [ 42.103155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.108722] kthread+0x328/0x630 [ 42.112015] ret_from_fork+0x10/0x20 [ 42.115655] [ 42.117183] The buggy address belongs to the object at ffff000080e00300 [ 42.117183] which belongs to the cache kmalloc-128 of size 128 [ 42.129849] The buggy address is located 0 bytes to the right of [ 42.129849] allocated 115-byte region [ffff000080e00300, ffff000080e00373) [ 42.142949] [ 42.144484] The buggy address belongs to the physical page: [ 42.150136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e00 [ 42.158242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.166000] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.173059] page_type: f5(slab) [ 42.176263] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.184110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.191957] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.199887] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.207818] head: 0bfffe0000000001 fffffdffc2038001 00000000ffffffff 00000000ffffffff [ 42.215752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 42.223679] page dumped because: kasan: bad access detected [ 42.229327] [ 42.230857] Memory state around the buggy address: [ 42.235718] ffff000080e00200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.243034] ffff000080e00280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.250349] >ffff000080e00300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 42.257659] ^ [ 42.264626] ffff000080e00380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.271943] ffff000080e00400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.279257] ================================================================== [ 42.594035] ================================================================== [ 42.601365] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 42.608865] Read of size 1 at addr ffff000080e0037f by task kunit_try_catch/280 [ 42.616275] [ 42.617804] CPU: 4 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 42.617834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.617843] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.617854] Call trace: [ 42.617861] show_stack+0x20/0x38 (C) [ 42.617879] dump_stack_lvl+0x8c/0xd0 [ 42.617898] print_report+0x118/0x608 [ 42.617917] kasan_report+0xdc/0x128 [ 42.617935] __asan_report_load1_noabort+0x20/0x30 [ 42.617951] ksize_unpoisons_memory+0x690/0x740 [ 42.617969] kunit_try_run_case+0x170/0x3f0 [ 42.617985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.618004] kthread+0x328/0x630 [ 42.618017] ret_from_fork+0x10/0x20 [ 42.618034] [ 42.684038] Allocated by task 280: [ 42.687493] kasan_save_stack+0x3c/0x68 [ 42.691398] kasan_save_track+0x20/0x40 [ 42.695292] kasan_save_alloc_info+0x40/0x58 [ 42.699623] __kasan_kmalloc+0xd4/0xd8 [ 42.703440] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.708036] ksize_unpoisons_memory+0xc0/0x740 [ 42.712548] kunit_try_run_case+0x170/0x3f0 [ 42.716797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.722363] kthread+0x328/0x630 [ 42.725644] ret_from_fork+0x10/0x20 [ 42.729275] [ 42.730797] The buggy address belongs to the object at ffff000080e00300 [ 42.730797] which belongs to the cache kmalloc-128 of size 128 [ 42.743447] The buggy address is located 12 bytes to the right of [ 42.743447] allocated 115-byte region [ffff000080e00300, ffff000080e00373) [ 42.756625] [ 42.758148] The buggy address belongs to the physical page: [ 42.763789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e00 [ 42.771889] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.779641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.786692] page_type: f5(slab) [ 42.789888] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.797729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.805568] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.813492] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.821421] head: 0bfffe0000000001 fffffdffc2038001 00000000ffffffff 00000000ffffffff [ 42.829346] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 42.837268] page dumped because: kasan: bad access detected [ 42.842909] [ 42.844437] Memory state around the buggy address: [ 42.849289] ffff000080e00200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.856594] ffff000080e00280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.863909] >ffff000080e00300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 42.871216] ^ [ 42.878432] ffff000080e00380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.885747] ffff000080e00400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.893051] ==================================================================
[ 27.077219] ================================================================== [ 27.077714] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 27.077815] Read of size 1 at addr fff00000c643f97f by task kunit_try_catch/206 [ 27.077865] [ 27.077896] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.078447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.078495] Hardware name: linux,dummy-virt (DT) [ 27.078700] Call trace: [ 27.078791] show_stack+0x20/0x38 (C) [ 27.078844] dump_stack_lvl+0x8c/0xd0 [ 27.078893] print_report+0x118/0x608 [ 27.078941] kasan_report+0xdc/0x128 [ 27.078987] __asan_report_load1_noabort+0x20/0x30 [ 27.079036] ksize_unpoisons_memory+0x690/0x740 [ 27.079095] kunit_try_run_case+0x170/0x3f0 [ 27.079989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.080189] kthread+0x328/0x630 [ 27.080435] ret_from_fork+0x10/0x20 [ 27.080488] [ 27.080698] Allocated by task 206: [ 27.080771] kasan_save_stack+0x3c/0x68 [ 27.080976] kasan_save_track+0x20/0x40 [ 27.081226] kasan_save_alloc_info+0x40/0x58 [ 27.081512] __kasan_kmalloc+0xd4/0xd8 [ 27.081563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.081985] ksize_unpoisons_memory+0xc0/0x740 [ 27.082027] kunit_try_run_case+0x170/0x3f0 [ 27.082546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.082712] kthread+0x328/0x630 [ 27.082787] ret_from_fork+0x10/0x20 [ 27.083076] [ 27.083099] The buggy address belongs to the object at fff00000c643f900 [ 27.083099] which belongs to the cache kmalloc-128 of size 128 [ 27.083344] The buggy address is located 12 bytes to the right of [ 27.083344] allocated 115-byte region [fff00000c643f900, fff00000c643f973) [ 27.083410] [ 27.083429] The buggy address belongs to the physical page: [ 27.083847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.084119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.084468] page_type: f5(slab) [ 27.084781] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.085122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.085415] page dumped because: kasan: bad access detected [ 27.085919] [ 27.085995] Memory state around the buggy address: [ 27.086126] fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.086184] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.086226] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.086494] ^ [ 27.086601] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.086747] fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.087065] ================================================================== [ 27.051509] ================================================================== [ 27.051753] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 27.051981] Read of size 1 at addr fff00000c643f973 by task kunit_try_catch/206 [ 27.052031] [ 27.052078] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.052833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.053110] Hardware name: linux,dummy-virt (DT) [ 27.053321] Call trace: [ 27.053385] show_stack+0x20/0x38 (C) [ 27.053443] dump_stack_lvl+0x8c/0xd0 [ 27.053492] print_report+0x118/0x608 [ 27.054105] kasan_report+0xdc/0x128 [ 27.054549] __asan_report_load1_noabort+0x20/0x30 [ 27.054697] ksize_unpoisons_memory+0x628/0x740 [ 27.054746] kunit_try_run_case+0x170/0x3f0 [ 27.055246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.055313] kthread+0x328/0x630 [ 27.055483] ret_from_fork+0x10/0x20 [ 27.055953] [ 27.055973] Allocated by task 206: [ 27.056067] kasan_save_stack+0x3c/0x68 [ 27.056112] kasan_save_track+0x20/0x40 [ 27.056371] kasan_save_alloc_info+0x40/0x58 [ 27.056455] __kasan_kmalloc+0xd4/0xd8 [ 27.056493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.056606] ksize_unpoisons_memory+0xc0/0x740 [ 27.056645] kunit_try_run_case+0x170/0x3f0 [ 27.057092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.057387] kthread+0x328/0x630 [ 27.057425] ret_from_fork+0x10/0x20 [ 27.057461] [ 27.057481] The buggy address belongs to the object at fff00000c643f900 [ 27.057481] which belongs to the cache kmalloc-128 of size 128 [ 27.057542] The buggy address is located 0 bytes to the right of [ 27.057542] allocated 115-byte region [fff00000c643f900, fff00000c643f973) [ 27.058380] [ 27.058729] The buggy address belongs to the physical page: [ 27.058816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.058926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.058979] page_type: f5(slab) [ 27.059617] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.059676] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.059718] page dumped because: kasan: bad access detected [ 27.059750] [ 27.059768] Memory state around the buggy address: [ 27.059802] fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.060202] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.060444] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.060776] ^ [ 27.060853] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.060895] fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.060933] ================================================================== [ 27.065783] ================================================================== [ 27.065832] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 27.065889] Read of size 1 at addr fff00000c643f978 by task kunit_try_catch/206 [ 27.065936] [ 27.065965] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.066049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.066086] Hardware name: linux,dummy-virt (DT) [ 27.067359] Call trace: [ 27.067439] show_stack+0x20/0x38 (C) [ 27.067494] dump_stack_lvl+0x8c/0xd0 [ 27.067551] print_report+0x118/0x608 [ 27.067597] kasan_report+0xdc/0x128 [ 27.067642] __asan_report_load1_noabort+0x20/0x30 [ 27.068130] ksize_unpoisons_memory+0x618/0x740 [ 27.068341] kunit_try_run_case+0x170/0x3f0 [ 27.068395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.068923] kthread+0x328/0x630 [ 27.069104] ret_from_fork+0x10/0x20 [ 27.069695] [ 27.069892] Allocated by task 206: [ 27.070111] kasan_save_stack+0x3c/0x68 [ 27.070165] kasan_save_track+0x20/0x40 [ 27.070318] kasan_save_alloc_info+0x40/0x58 [ 27.070483] __kasan_kmalloc+0xd4/0xd8 [ 27.070679] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.070726] ksize_unpoisons_memory+0xc0/0x740 [ 27.071106] kunit_try_run_case+0x170/0x3f0 [ 27.071163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.071382] kthread+0x328/0x630 [ 27.071443] ret_from_fork+0x10/0x20 [ 27.071669] [ 27.071853] The buggy address belongs to the object at fff00000c643f900 [ 27.071853] which belongs to the cache kmalloc-128 of size 128 [ 27.071968] The buggy address is located 5 bytes to the right of [ 27.071968] allocated 115-byte region [fff00000c643f900, fff00000c643f973) [ 27.072218] [ 27.072404] The buggy address belongs to the physical page: [ 27.072441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.072886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.072942] page_type: f5(slab) [ 27.073163] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.073388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.073432] page dumped because: kasan: bad access detected [ 27.073462] [ 27.073481] Memory state around the buggy address: [ 27.073511] fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.074297] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.074625] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.074825] ^ [ 27.074992] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.075118] fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.075157] ==================================================================
[ 22.565119] ================================================================== [ 22.565664] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.565948] Read of size 1 at addr ffff8881024c9c7f by task kunit_try_catch/223 [ 22.566361] [ 22.566447] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.566492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.566504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.566525] Call Trace: [ 22.566543] <TASK> [ 22.566559] dump_stack_lvl+0x73/0xb0 [ 22.566585] print_report+0xd1/0x650 [ 22.566606] ? __virt_addr_valid+0x1db/0x2d0 [ 22.566628] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.566649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.566673] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.566695] kasan_report+0x141/0x180 [ 22.566715] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.566741] __asan_report_load1_noabort+0x18/0x20 [ 22.566763] ksize_unpoisons_memory+0x7b6/0x9b0 [ 22.566785] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.566807] ? finish_task_switch.isra.0+0x153/0x700 [ 22.566829] ? __switch_to+0x47/0xf50 [ 22.566853] ? __schedule+0x10cc/0x2b60 [ 22.566877] ? __pfx_read_tsc+0x10/0x10 [ 22.566899] ? ktime_get_ts64+0x86/0x230 [ 22.566922] kunit_try_run_case+0x1a5/0x480 [ 22.566945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.566967] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.566990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.567014] ? __kthread_parkme+0x82/0x180 [ 22.567108] ? preempt_count_sub+0x50/0x80 [ 22.567131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.567154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.567178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.567201] kthread+0x337/0x6f0 [ 22.567232] ? trace_preempt_on+0x20/0xc0 [ 22.567254] ? __pfx_kthread+0x10/0x10 [ 22.567273] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.567295] ? calculate_sigpending+0x7b/0xa0 [ 22.567318] ? __pfx_kthread+0x10/0x10 [ 22.567338] ret_from_fork+0x116/0x1d0 [ 22.567357] ? __pfx_kthread+0x10/0x10 [ 22.567376] ret_from_fork_asm+0x1a/0x30 [ 22.567406] </TASK> [ 22.567417] [ 22.575293] Allocated by task 223: [ 22.575445] kasan_save_stack+0x45/0x70 [ 22.575645] kasan_save_track+0x18/0x40 [ 22.575793] kasan_save_alloc_info+0x3b/0x50 [ 22.575988] __kasan_kmalloc+0xb7/0xc0 [ 22.576214] __kmalloc_cache_noprof+0x189/0x420 [ 22.576423] ksize_unpoisons_memory+0xc7/0x9b0 [ 22.576590] kunit_try_run_case+0x1a5/0x480 [ 22.576730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.576895] kthread+0x337/0x6f0 [ 22.577009] ret_from_fork+0x116/0x1d0 [ 22.577189] ret_from_fork_asm+0x1a/0x30 [ 22.577394] [ 22.577484] The buggy address belongs to the object at ffff8881024c9c00 [ 22.577484] which belongs to the cache kmalloc-128 of size 128 [ 22.578038] The buggy address is located 12 bytes to the right of [ 22.578038] allocated 115-byte region [ffff8881024c9c00, ffff8881024c9c73) [ 22.578705] [ 22.578807] The buggy address belongs to the physical page: [ 22.579096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024c9 [ 22.579510] flags: 0x200000000000000(node=0|zone=2) [ 22.579667] page_type: f5(slab) [ 22.579783] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.580002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.580889] page dumped because: kasan: bad access detected [ 22.581548] [ 22.581715] Memory state around the buggy address: [ 22.582579] ffff8881024c9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.583519] ffff8881024c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.584455] >ffff8881024c9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.585278] ^ [ 22.585502] ffff8881024c9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.585712] ffff8881024c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.587149] ================================================================== [ 22.546201] ================================================================== [ 22.546502] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.546794] Read of size 1 at addr ffff8881024c9c78 by task kunit_try_catch/223 [ 22.547347] [ 22.547470] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.547520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.547532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.547555] Call Trace: [ 22.547569] <TASK> [ 22.547588] dump_stack_lvl+0x73/0xb0 [ 22.547617] print_report+0xd1/0x650 [ 22.547639] ? __virt_addr_valid+0x1db/0x2d0 [ 22.547663] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.547684] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.547710] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.547734] kasan_report+0x141/0x180 [ 22.547756] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.547782] __asan_report_load1_noabort+0x18/0x20 [ 22.547818] ksize_unpoisons_memory+0x7e9/0x9b0 [ 22.547840] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.547862] ? finish_task_switch.isra.0+0x153/0x700 [ 22.547883] ? __switch_to+0x47/0xf50 [ 22.547908] ? __schedule+0x10cc/0x2b60 [ 22.547932] ? __pfx_read_tsc+0x10/0x10 [ 22.547954] ? ktime_get_ts64+0x86/0x230 [ 22.547978] kunit_try_run_case+0x1a5/0x480 [ 22.548003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.548024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.548047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.548071] ? __kthread_parkme+0x82/0x180 [ 22.548090] ? preempt_count_sub+0x50/0x80 [ 22.548112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.548134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.548156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.548179] kthread+0x337/0x6f0 [ 22.548200] ? trace_preempt_on+0x20/0xc0 [ 22.548235] ? __pfx_kthread+0x10/0x10 [ 22.548256] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.548279] ? calculate_sigpending+0x7b/0xa0 [ 22.548304] ? __pfx_kthread+0x10/0x10 [ 22.548325] ret_from_fork+0x116/0x1d0 [ 22.548344] ? __pfx_kthread+0x10/0x10 [ 22.548364] ret_from_fork_asm+0x1a/0x30 [ 22.548395] </TASK> [ 22.548406] [ 22.556185] Allocated by task 223: [ 22.556379] kasan_save_stack+0x45/0x70 [ 22.556763] kasan_save_track+0x18/0x40 [ 22.556898] kasan_save_alloc_info+0x3b/0x50 [ 22.557152] __kasan_kmalloc+0xb7/0xc0 [ 22.557291] __kmalloc_cache_noprof+0x189/0x420 [ 22.557440] ksize_unpoisons_memory+0xc7/0x9b0 [ 22.557829] kunit_try_run_case+0x1a5/0x480 [ 22.558008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.558179] kthread+0x337/0x6f0 [ 22.558302] ret_from_fork+0x116/0x1d0 [ 22.558430] ret_from_fork_asm+0x1a/0x30 [ 22.558650] [ 22.558915] The buggy address belongs to the object at ffff8881024c9c00 [ 22.558915] which belongs to the cache kmalloc-128 of size 128 [ 22.559704] The buggy address is located 5 bytes to the right of [ 22.559704] allocated 115-byte region [ffff8881024c9c00, ffff8881024c9c73) [ 22.560213] [ 22.560299] The buggy address belongs to the physical page: [ 22.560470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024c9 [ 22.560801] flags: 0x200000000000000(node=0|zone=2) [ 22.561099] page_type: f5(slab) [ 22.561276] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.561622] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.561958] page dumped because: kasan: bad access detected [ 22.562336] [ 22.562405] Memory state around the buggy address: [ 22.562620] ffff8881024c9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.562830] ffff8881024c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.563377] >ffff8881024c9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.563678] ^ [ 22.563959] ffff8881024c9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.564166] ffff8881024c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.564413] ================================================================== [ 22.514197] ================================================================== [ 22.514724] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 22.515903] Read of size 1 at addr ffff8881024c9c73 by task kunit_try_catch/223 [ 22.516741] [ 22.516945] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.516999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.517011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.517035] Call Trace: [ 22.517050] <TASK> [ 22.517071] dump_stack_lvl+0x73/0xb0 [ 22.517105] print_report+0xd1/0x650 [ 22.517127] ? __virt_addr_valid+0x1db/0x2d0 [ 22.517152] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 22.517173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.517198] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 22.517417] kasan_report+0x141/0x180 [ 22.517471] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 22.517499] __asan_report_load1_noabort+0x18/0x20 [ 22.517522] ksize_unpoisons_memory+0x81c/0x9b0 [ 22.517544] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 22.517572] ? finish_task_switch.isra.0+0x153/0x700 [ 22.517596] ? __switch_to+0x47/0xf50 [ 22.517623] ? __schedule+0x10cc/0x2b60 [ 22.517648] ? __pfx_read_tsc+0x10/0x10 [ 22.517669] ? ktime_get_ts64+0x86/0x230 [ 22.517694] kunit_try_run_case+0x1a5/0x480 [ 22.517720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.517741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.517765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.517789] ? __kthread_parkme+0x82/0x180 [ 22.517809] ? preempt_count_sub+0x50/0x80 [ 22.517830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.517853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.517875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.517898] kthread+0x337/0x6f0 [ 22.517917] ? trace_preempt_on+0x20/0xc0 [ 22.517942] ? __pfx_kthread+0x10/0x10 [ 22.517961] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.517984] ? calculate_sigpending+0x7b/0xa0 [ 22.518007] ? __pfx_kthread+0x10/0x10 [ 22.518028] ret_from_fork+0x116/0x1d0 [ 22.518045] ? __pfx_kthread+0x10/0x10 [ 22.518064] ret_from_fork_asm+0x1a/0x30 [ 22.518095] </TASK> [ 22.518107] [ 22.531561] Allocated by task 223: [ 22.531695] kasan_save_stack+0x45/0x70 [ 22.531838] kasan_save_track+0x18/0x40 [ 22.531967] kasan_save_alloc_info+0x3b/0x50 [ 22.532272] __kasan_kmalloc+0xb7/0xc0 [ 22.532524] __kmalloc_cache_noprof+0x189/0x420 [ 22.532944] ksize_unpoisons_memory+0xc7/0x9b0 [ 22.533392] kunit_try_run_case+0x1a5/0x480 [ 22.533543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.533714] kthread+0x337/0x6f0 [ 22.533857] ret_from_fork+0x116/0x1d0 [ 22.534414] ret_from_fork_asm+0x1a/0x30 [ 22.535083] [ 22.535301] The buggy address belongs to the object at ffff8881024c9c00 [ 22.535301] which belongs to the cache kmalloc-128 of size 128 [ 22.536541] The buggy address is located 0 bytes to the right of [ 22.536541] allocated 115-byte region [ffff8881024c9c00, ffff8881024c9c73) [ 22.537466] [ 22.537663] The buggy address belongs to the physical page: [ 22.538268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024c9 [ 22.538559] flags: 0x200000000000000(node=0|zone=2) [ 22.539078] page_type: f5(slab) [ 22.539615] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.540235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.540716] page dumped because: kasan: bad access detected [ 22.541034] [ 22.541310] Memory state around the buggy address: [ 22.541887] ffff8881024c9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.542449] ffff8881024c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.542716] >ffff8881024c9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.543398] ^ [ 22.544048] ffff8881024c9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.544817] ffff8881024c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.545533] ==================================================================