Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 42.805526] ================================================================== [ 42.817089] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 42.824589] Read of size 1 at addr ffff000082240173 by task kunit_try_catch/303 [ 42.831998] [ 42.833534] CPU: 3 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 42.833566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.833574] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.833587] Call trace: [ 42.833594] show_stack+0x20/0x38 (C) [ 42.833613] dump_stack_lvl+0x8c/0xd0 [ 42.833635] print_report+0x118/0x608 [ 42.833655] kasan_report+0xdc/0x128 [ 42.833675] __asan_report_load1_noabort+0x20/0x30 [ 42.833694] ksize_unpoisons_memory+0x628/0x740 [ 42.833713] kunit_try_run_case+0x170/0x3f0 [ 42.833733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.833754] kthread+0x328/0x630 [ 42.833769] ret_from_fork+0x10/0x20 [ 42.833788] [ 42.899872] Allocated by task 303: [ 42.903336] kasan_save_stack+0x3c/0x68 [ 42.907246] kasan_save_track+0x20/0x40 [ 42.911156] kasan_save_alloc_info+0x40/0x58 [ 42.915493] __kasan_kmalloc+0xd4/0xd8 [ 42.919315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.923920] ksize_unpoisons_memory+0xc0/0x740 [ 42.928443] kunit_try_run_case+0x170/0x3f0 [ 42.932697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.938272] kthread+0x328/0x630 [ 42.941564] ret_from_fork+0x10/0x20 [ 42.945211] [ 42.946741] The buggy address belongs to the object at ffff000082240100 [ 42.946741] which belongs to the cache kmalloc-128 of size 128 [ 42.959400] The buggy address is located 0 bytes to the right of [ 42.959400] allocated 115-byte region [ffff000082240100, ffff000082240173) [ 42.972503] [ 42.974035] The buggy address belongs to the physical page: [ 42.979681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 42.987794] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.995552] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.002609] page_type: f5(slab) [ 43.005814] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.013659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.021502] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.029434] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.037365] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 43.045296] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.053222] page dumped because: kasan: bad access detected [ 43.058871] [ 43.060407] Memory state around the buggy address: [ 43.065269] ffff000082240000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.072595] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.079918] >ffff000082240100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 43.087233] ^ [ 43.094200] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.101524] ffff000082240200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.108844] ================================================================== [ 43.116234] ================================================================== [ 43.123557] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 43.131058] Read of size 1 at addr ffff000082240178 by task kunit_try_catch/303 [ 43.138470] [ 43.140009] CPU: 3 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 43.140038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.140046] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.140057] Call trace: [ 43.140065] show_stack+0x20/0x38 (C) [ 43.140083] dump_stack_lvl+0x8c/0xd0 [ 43.140106] print_report+0x118/0x608 [ 43.140124] kasan_report+0xdc/0x128 [ 43.140143] __asan_report_load1_noabort+0x20/0x30 [ 43.140162] ksize_unpoisons_memory+0x618/0x740 [ 43.140182] kunit_try_run_case+0x170/0x3f0 [ 43.140200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.140223] kthread+0x328/0x630 [ 43.140237] ret_from_fork+0x10/0x20 [ 43.140254] [ 43.206302] Allocated by task 303: [ 43.209762] kasan_save_stack+0x3c/0x68 [ 43.213672] kasan_save_track+0x20/0x40 [ 43.217582] kasan_save_alloc_info+0x40/0x58 [ 43.221920] __kasan_kmalloc+0xd4/0xd8 [ 43.225742] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.230352] ksize_unpoisons_memory+0xc0/0x740 [ 43.234873] kunit_try_run_case+0x170/0x3f0 [ 43.239124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.244702] kthread+0x328/0x630 [ 43.247993] ret_from_fork+0x10/0x20 [ 43.251634] [ 43.253171] The buggy address belongs to the object at ffff000082240100 [ 43.253171] which belongs to the cache kmalloc-128 of size 128 [ 43.265835] The buggy address is located 5 bytes to the right of [ 43.265835] allocated 115-byte region [ffff000082240100, ffff000082240173) [ 43.278941] [ 43.280477] The buggy address belongs to the physical page: [ 43.286124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 43.294238] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.301995] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.309049] page_type: f5(slab) [ 43.312252] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.320096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.327940] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.335872] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.343802] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 43.351731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.359656] page dumped because: kasan: bad access detected [ 43.365303] [ 43.366833] Memory state around the buggy address: [ 43.371692] ffff000082240000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.379007] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.386332] >ffff000082240100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 43.393652] ^ [ 43.400888] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.408212] ffff000082240200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.415527] ================================================================== [ 43.423704] ================================================================== [ 43.431032] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 43.438530] Read of size 1 at addr ffff00008224017f by task kunit_try_catch/303 [ 43.445936] [ 43.447472] CPU: 5 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 43.447503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.447512] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.447523] Call trace: [ 43.447530] show_stack+0x20/0x38 (C) [ 43.447547] dump_stack_lvl+0x8c/0xd0 [ 43.447566] print_report+0x118/0x608 [ 43.447584] kasan_report+0xdc/0x128 [ 43.447603] __asan_report_load1_noabort+0x20/0x30 [ 43.447619] ksize_unpoisons_memory+0x690/0x740 [ 43.447637] kunit_try_run_case+0x170/0x3f0 [ 43.447654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.447676] kthread+0x328/0x630 [ 43.447690] ret_from_fork+0x10/0x20 [ 43.447706] [ 43.513723] Allocated by task 303: [ 43.517175] kasan_save_stack+0x3c/0x68 [ 43.521083] kasan_save_track+0x20/0x40 [ 43.524987] kasan_save_alloc_info+0x40/0x58 [ 43.529323] __kasan_kmalloc+0xd4/0xd8 [ 43.533137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.537738] ksize_unpoisons_memory+0xc0/0x740 [ 43.542249] kunit_try_run_case+0x170/0x3f0 [ 43.546499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.552069] kthread+0x328/0x630 [ 43.555351] ret_from_fork+0x10/0x20 [ 43.558985] [ 43.560515] The buggy address belongs to the object at ffff000082240100 [ 43.560515] which belongs to the cache kmalloc-128 of size 128 [ 43.573168] The buggy address is located 12 bytes to the right of [ 43.573168] allocated 115-byte region [ffff000082240100, ffff000082240173) [ 43.586355] [ 43.587883] The buggy address belongs to the physical page: [ 43.593527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 43.601629] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.609381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.616437] page_type: f5(slab) [ 43.619631] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.627471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.635313] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.643238] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.651163] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 43.659090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.667013] page dumped because: kasan: bad access detected [ 43.672663] [ 43.674185] Memory state around the buggy address: [ 43.679045] ffff000082240000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.686360] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.693673] >ffff000082240100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 43.700984] ^ [ 43.708210] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.715526] ffff000082240200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.722833] ==================================================================
[ 31.316445] ================================================================== [ 31.316959] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.317046] Read of size 1 at addr fff00000c9ae347f by task kunit_try_catch/226 [ 31.317173] [ 31.317203] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.317492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.317634] Hardware name: linux,dummy-virt (DT) [ 31.317696] Call trace: [ 31.317797] show_stack+0x20/0x38 (C) [ 31.318056] dump_stack_lvl+0x8c/0xd0 [ 31.318314] print_report+0x118/0x608 [ 31.318416] kasan_report+0xdc/0x128 [ 31.318510] __asan_report_load1_noabort+0x20/0x30 [ 31.318751] ksize_unpoisons_memory+0x690/0x740 [ 31.318956] kunit_try_run_case+0x170/0x3f0 [ 31.319016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.319420] kthread+0x328/0x630 [ 31.319526] ret_from_fork+0x10/0x20 [ 31.319807] [ 31.319931] Allocated by task 226: [ 31.320050] kasan_save_stack+0x3c/0x68 [ 31.320363] kasan_save_track+0x20/0x40 [ 31.320793] kasan_save_alloc_info+0x40/0x58 [ 31.321030] __kasan_kmalloc+0xd4/0xd8 [ 31.321181] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.321296] ksize_unpoisons_memory+0xc0/0x740 [ 31.321338] kunit_try_run_case+0x170/0x3f0 [ 31.321670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.322000] kthread+0x328/0x630 [ 31.322143] ret_from_fork+0x10/0x20 [ 31.322277] [ 31.322299] The buggy address belongs to the object at fff00000c9ae3400 [ 31.322299] which belongs to the cache kmalloc-128 of size 128 [ 31.322535] The buggy address is located 12 bytes to the right of [ 31.322535] allocated 115-byte region [fff00000c9ae3400, fff00000c9ae3473) [ 31.322771] [ 31.322826] The buggy address belongs to the physical page: [ 31.322947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3 [ 31.323095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.323213] page_type: f5(slab) [ 31.323420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.323531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.324039] page dumped because: kasan: bad access detected [ 31.324142] [ 31.324203] Memory state around the buggy address: [ 31.324296] fff00000c9ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.324556] fff00000c9ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.324880] >fff00000c9ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.325058] ^ [ 31.325136] fff00000c9ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.325353] fff00000c9ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.325517] ================================================================== [ 31.309542] ================================================================== [ 31.309597] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.309668] Read of size 1 at addr fff00000c9ae3478 by task kunit_try_catch/226 [ 31.309721] [ 31.309750] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.309848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.309876] Hardware name: linux,dummy-virt (DT) [ 31.309909] Call trace: [ 31.309930] show_stack+0x20/0x38 (C) [ 31.309989] dump_stack_lvl+0x8c/0xd0 [ 31.310046] print_report+0x118/0x608 [ 31.310105] kasan_report+0xdc/0x128 [ 31.310151] __asan_report_load1_noabort+0x20/0x30 [ 31.310202] ksize_unpoisons_memory+0x618/0x740 [ 31.310252] kunit_try_run_case+0x170/0x3f0 [ 31.310310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.310365] kthread+0x328/0x630 [ 31.310408] ret_from_fork+0x10/0x20 [ 31.310454] [ 31.310474] Allocated by task 226: [ 31.310501] kasan_save_stack+0x3c/0x68 [ 31.310544] kasan_save_track+0x20/0x40 [ 31.310582] kasan_save_alloc_info+0x40/0x58 [ 31.310629] __kasan_kmalloc+0xd4/0xd8 [ 31.310667] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.310709] ksize_unpoisons_memory+0xc0/0x740 [ 31.310749] kunit_try_run_case+0x170/0x3f0 [ 31.310798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.311152] kthread+0x328/0x630 [ 31.311201] ret_from_fork+0x10/0x20 [ 31.311673] [ 31.311916] The buggy address belongs to the object at fff00000c9ae3400 [ 31.311916] which belongs to the cache kmalloc-128 of size 128 [ 31.312019] The buggy address is located 5 bytes to the right of [ 31.312019] allocated 115-byte region [fff00000c9ae3400, fff00000c9ae3473) [ 31.313015] [ 31.313073] The buggy address belongs to the physical page: [ 31.313405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3 [ 31.313465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.313558] page_type: f5(slab) [ 31.313640] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.313717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.313936] page dumped because: kasan: bad access detected [ 31.314055] [ 31.314076] Memory state around the buggy address: [ 31.314342] fff00000c9ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.314580] fff00000c9ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.314933] >fff00000c9ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.315031] ^ [ 31.315233] fff00000c9ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315317] fff00000c9ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315513] ================================================================== [ 31.299595] ================================================================== [ 31.299666] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.300064] Read of size 1 at addr fff00000c9ae3473 by task kunit_try_catch/226 [ 31.300134] [ 31.300170] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.300500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.300625] Hardware name: linux,dummy-virt (DT) [ 31.300662] Call trace: [ 31.300697] show_stack+0x20/0x38 (C) [ 31.301044] dump_stack_lvl+0x8c/0xd0 [ 31.301197] print_report+0x118/0x608 [ 31.301387] kasan_report+0xdc/0x128 [ 31.301513] __asan_report_load1_noabort+0x20/0x30 [ 31.301648] ksize_unpoisons_memory+0x628/0x740 [ 31.301746] kunit_try_run_case+0x170/0x3f0 [ 31.302117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.302252] kthread+0x328/0x630 [ 31.302421] ret_from_fork+0x10/0x20 [ 31.302548] [ 31.302614] Allocated by task 226: [ 31.303095] kasan_save_stack+0x3c/0x68 [ 31.303276] kasan_save_track+0x20/0x40 [ 31.303347] kasan_save_alloc_info+0x40/0x58 [ 31.303410] __kasan_kmalloc+0xd4/0xd8 [ 31.303472] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.303964] ksize_unpoisons_memory+0xc0/0x740 [ 31.304118] kunit_try_run_case+0x170/0x3f0 [ 31.304190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.304591] kthread+0x328/0x630 [ 31.304823] ret_from_fork+0x10/0x20 [ 31.305110] [ 31.305155] The buggy address belongs to the object at fff00000c9ae3400 [ 31.305155] which belongs to the cache kmalloc-128 of size 128 [ 31.305235] The buggy address is located 0 bytes to the right of [ 31.305235] allocated 115-byte region [fff00000c9ae3400, fff00000c9ae3473) [ 31.305580] [ 31.305656] The buggy address belongs to the physical page: [ 31.305892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3 [ 31.306034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.306143] page_type: f5(slab) [ 31.306186] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.306455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.306545] page dumped because: kasan: bad access detected [ 31.306784] [ 31.306985] Memory state around the buggy address: [ 31.307077] fff00000c9ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.307150] fff00000c9ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.307559] >fff00000c9ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.307626] ^ [ 31.307721] fff00000c9ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.308065] fff00000c9ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.308231] ==================================================================
[ 23.592534] ================================================================== [ 23.593005] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.594015] Read of size 1 at addr ffff88810554007f by task kunit_try_catch/243 [ 23.594545] [ 23.594648] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.594695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.594707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.594727] Call Trace: [ 23.594738] <TASK> [ 23.594752] dump_stack_lvl+0x73/0xb0 [ 23.594780] print_report+0xd1/0x650 [ 23.594801] ? __virt_addr_valid+0x1db/0x2d0 [ 23.594823] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.594845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.594870] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.594892] kasan_report+0x141/0x180 [ 23.594913] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.594939] __asan_report_load1_noabort+0x18/0x20 [ 23.594961] ksize_unpoisons_memory+0x7b6/0x9b0 [ 23.594984] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.595005] ? finish_task_switch.isra.0+0x153/0x700 [ 23.595026] ? __switch_to+0x47/0xf50 [ 23.595050] ? __schedule+0x10cc/0x2b60 [ 23.595076] ? __pfx_read_tsc+0x10/0x10 [ 23.595096] ? ktime_get_ts64+0x86/0x230 [ 23.595137] kunit_try_run_case+0x1a5/0x480 [ 23.595173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.595196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.595216] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.595241] ? __kthread_parkme+0x82/0x180 [ 23.595260] ? preempt_count_sub+0x50/0x80 [ 23.595282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.595313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.595335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.595359] kthread+0x337/0x6f0 [ 23.595378] ? trace_preempt_on+0x20/0xc0 [ 23.595400] ? __pfx_kthread+0x10/0x10 [ 23.595420] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.595443] ? calculate_sigpending+0x7b/0xa0 [ 23.595478] ? __pfx_kthread+0x10/0x10 [ 23.595500] ret_from_fork+0x116/0x1d0 [ 23.595519] ? __pfx_kthread+0x10/0x10 [ 23.595540] ret_from_fork_asm+0x1a/0x30 [ 23.595570] </TASK> [ 23.595581] [ 23.604074] Allocated by task 243: [ 23.604537] kasan_save_stack+0x45/0x70 [ 23.604702] kasan_save_track+0x18/0x40 [ 23.605024] kasan_save_alloc_info+0x3b/0x50 [ 23.605354] __kasan_kmalloc+0xb7/0xc0 [ 23.605627] __kmalloc_cache_noprof+0x189/0x420 [ 23.605794] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.606134] kunit_try_run_case+0x1a5/0x480 [ 23.606363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.606604] kthread+0x337/0x6f0 [ 23.606756] ret_from_fork+0x116/0x1d0 [ 23.606923] ret_from_fork_asm+0x1a/0x30 [ 23.607096] [ 23.607172] The buggy address belongs to the object at ffff888105540000 [ 23.607172] which belongs to the cache kmalloc-128 of size 128 [ 23.608035] The buggy address is located 12 bytes to the right of [ 23.608035] allocated 115-byte region [ffff888105540000, ffff888105540073) [ 23.608812] [ 23.608913] The buggy address belongs to the physical page: [ 23.609269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540 [ 23.609805] flags: 0x200000000000000(node=0|zone=2) [ 23.610345] page_type: f5(slab) [ 23.610817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.611670] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.612078] page dumped because: kasan: bad access detected [ 23.612388] [ 23.612642] Memory state around the buggy address: [ 23.613173] ffff88810553ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.613765] ffff88810553ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.613985] >ffff888105540000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.614184] ^ [ 23.614798] ffff888105540080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.615566] ffff888105540100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.616185] ================================================================== [ 23.533120] ================================================================== [ 23.533713] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 23.534743] Read of size 1 at addr ffff888105540073 by task kunit_try_catch/243 [ 23.535298] [ 23.535585] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.535638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.535651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.535674] Call Trace: [ 23.535687] <TASK> [ 23.535705] dump_stack_lvl+0x73/0xb0 [ 23.535735] print_report+0xd1/0x650 [ 23.535757] ? __virt_addr_valid+0x1db/0x2d0 [ 23.535781] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.535803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.535827] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.535849] kasan_report+0x141/0x180 [ 23.535870] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 23.535897] __asan_report_load1_noabort+0x18/0x20 [ 23.535919] ksize_unpoisons_memory+0x81c/0x9b0 [ 23.535942] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.535963] ? finish_task_switch.isra.0+0x153/0x700 [ 23.535984] ? __switch_to+0x47/0xf50 [ 23.536010] ? __schedule+0x10cc/0x2b60 [ 23.536035] ? __pfx_read_tsc+0x10/0x10 [ 23.536057] ? ktime_get_ts64+0x86/0x230 [ 23.536081] kunit_try_run_case+0x1a5/0x480 [ 23.536107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.536129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.536149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.536175] ? __kthread_parkme+0x82/0x180 [ 23.536195] ? preempt_count_sub+0x50/0x80 [ 23.536217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.536241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.536263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.536287] kthread+0x337/0x6f0 [ 23.536305] ? trace_preempt_on+0x20/0xc0 [ 23.536328] ? __pfx_kthread+0x10/0x10 [ 23.536359] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.536382] ? calculate_sigpending+0x7b/0xa0 [ 23.536406] ? __pfx_kthread+0x10/0x10 [ 23.536433] ret_from_fork+0x116/0x1d0 [ 23.536451] ? __pfx_kthread+0x10/0x10 [ 23.536479] ret_from_fork_asm+0x1a/0x30 [ 23.536510] </TASK> [ 23.536521] [ 23.548582] Allocated by task 243: [ 23.548706] kasan_save_stack+0x45/0x70 [ 23.548843] kasan_save_track+0x18/0x40 [ 23.548967] kasan_save_alloc_info+0x3b/0x50 [ 23.549103] __kasan_kmalloc+0xb7/0xc0 [ 23.549485] __kmalloc_cache_noprof+0x189/0x420 [ 23.549883] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.550381] kunit_try_run_case+0x1a5/0x480 [ 23.550776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.551266] kthread+0x337/0x6f0 [ 23.551633] ret_from_fork+0x116/0x1d0 [ 23.551979] ret_from_fork_asm+0x1a/0x30 [ 23.552352] [ 23.552542] The buggy address belongs to the object at ffff888105540000 [ 23.552542] which belongs to the cache kmalloc-128 of size 128 [ 23.553030] The buggy address is located 0 bytes to the right of [ 23.553030] allocated 115-byte region [ffff888105540000, ffff888105540073) [ 23.554055] [ 23.554221] The buggy address belongs to the physical page: [ 23.554797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540 [ 23.555512] flags: 0x200000000000000(node=0|zone=2) [ 23.556049] page_type: f5(slab) [ 23.556346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.556626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.556837] page dumped because: kasan: bad access detected [ 23.556994] [ 23.557056] Memory state around the buggy address: [ 23.557518] ffff88810553ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.557795] ffff88810553ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.558084] >ffff888105540000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.558950] ^ [ 23.559390] ffff888105540080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.559910] ffff888105540100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.560589] ================================================================== [ 23.561227] ================================================================== [ 23.561995] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.562739] Read of size 1 at addr ffff888105540078 by task kunit_try_catch/243 [ 23.563287] [ 23.563580] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.563634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.563649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.563669] Call Trace: [ 23.563682] <TASK> [ 23.563697] dump_stack_lvl+0x73/0xb0 [ 23.563736] print_report+0xd1/0x650 [ 23.563757] ? __virt_addr_valid+0x1db/0x2d0 [ 23.563779] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.563801] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.563825] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.563847] kasan_report+0x141/0x180 [ 23.563868] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.563894] __asan_report_load1_noabort+0x18/0x20 [ 23.563917] ksize_unpoisons_memory+0x7e9/0x9b0 [ 23.563939] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.563960] ? finish_task_switch.isra.0+0x153/0x700 [ 23.563981] ? __switch_to+0x47/0xf50 [ 23.564006] ? __schedule+0x10cc/0x2b60 [ 23.564031] ? __pfx_read_tsc+0x10/0x10 [ 23.564052] ? ktime_get_ts64+0x86/0x230 [ 23.564076] kunit_try_run_case+0x1a5/0x480 [ 23.564101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.564123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.564143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.564170] ? __kthread_parkme+0x82/0x180 [ 23.564190] ? preempt_count_sub+0x50/0x80 [ 23.564245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.564269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.564292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.564315] kthread+0x337/0x6f0 [ 23.564334] ? trace_preempt_on+0x20/0xc0 [ 23.564356] ? __pfx_kthread+0x10/0x10 [ 23.564375] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.564398] ? calculate_sigpending+0x7b/0xa0 [ 23.564422] ? __pfx_kthread+0x10/0x10 [ 23.564444] ret_from_fork+0x116/0x1d0 [ 23.564472] ? __pfx_kthread+0x10/0x10 [ 23.564493] ret_from_fork_asm+0x1a/0x30 [ 23.564523] </TASK> [ 23.564533] [ 23.578227] Allocated by task 243: [ 23.578405] kasan_save_stack+0x45/0x70 [ 23.578606] kasan_save_track+0x18/0x40 [ 23.578778] kasan_save_alloc_info+0x3b/0x50 [ 23.578961] __kasan_kmalloc+0xb7/0xc0 [ 23.579130] __kmalloc_cache_noprof+0x189/0x420 [ 23.580180] ksize_unpoisons_memory+0xc7/0x9b0 [ 23.580674] kunit_try_run_case+0x1a5/0x480 [ 23.581361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.581618] kthread+0x337/0x6f0 [ 23.581772] ret_from_fork+0x116/0x1d0 [ 23.581954] ret_from_fork_asm+0x1a/0x30 [ 23.582125] [ 23.582523] The buggy address belongs to the object at ffff888105540000 [ 23.582523] which belongs to the cache kmalloc-128 of size 128 [ 23.583531] The buggy address is located 5 bytes to the right of [ 23.583531] allocated 115-byte region [ffff888105540000, ffff888105540073) [ 23.584388] [ 23.584495] The buggy address belongs to the physical page: [ 23.584726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540 [ 23.585045] flags: 0x200000000000000(node=0|zone=2) [ 23.585658] page_type: f5(slab) [ 23.585968] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.586803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.587115] page dumped because: kasan: bad access detected [ 23.587590] [ 23.587818] Memory state around the buggy address: [ 23.588023] ffff88810553ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.588607] ffff88810553ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.588907] >ffff888105540000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.589510] ^ [ 23.589882] ffff888105540080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.590413] ffff888105540100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.590706] ==================================================================