Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 48.293796] ================================================================== [ 48.300682] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 48.308057] Read of size 1 at addr ffff00080244db7f by task kunit_try_catch/275 [ 48.315348] [ 48.316834] CPU: 3 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.316890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.316908] Hardware name: WinLink E850-96 board (DT) [ 48.316927] Call trace: [ 48.316939] show_stack+0x20/0x38 (C) [ 48.316974] dump_stack_lvl+0x8c/0xd0 [ 48.317008] print_report+0x118/0x5d0 [ 48.317035] kasan_report+0xdc/0x128 [ 48.317060] __asan_report_load1_noabort+0x20/0x30 [ 48.317090] ksize_unpoisons_memory+0x690/0x740 [ 48.317123] kunit_try_run_case+0x170/0x3f0 [ 48.317152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.317185] kthread+0x328/0x630 [ 48.317211] ret_from_fork+0x10/0x20 [ 48.317242] [ 48.381234] Allocated by task 275: [ 48.384620] kasan_save_stack+0x3c/0x68 [ 48.388437] kasan_save_track+0x20/0x40 [ 48.392257] kasan_save_alloc_info+0x40/0x58 [ 48.396510] __kasan_kmalloc+0xd4/0xd8 [ 48.400244] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.404757] ksize_unpoisons_memory+0xc0/0x740 [ 48.409183] kunit_try_run_case+0x170/0x3f0 [ 48.413350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.418819] kthread+0x328/0x630 [ 48.422031] ret_from_fork+0x10/0x20 [ 48.425591] [ 48.427066] The buggy address belongs to the object at ffff00080244db00 [ 48.427066] which belongs to the cache kmalloc-128 of size 128 [ 48.439568] The buggy address is located 12 bytes to the right of [ 48.439568] allocated 115-byte region [ffff00080244db00, ffff00080244db73) [ 48.452586] [ 48.454064] The buggy address belongs to the physical page: [ 48.459622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 48.467605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.475245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.482186] page_type: f5(slab) [ 48.485324] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.493043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.500770] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.508581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.516394] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 48.524206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.532013] page dumped because: kasan: bad access detected [ 48.537567] [ 48.539043] Memory state around the buggy address: [ 48.543824] ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.551026] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.558230] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.565431] ^ [ 48.572553] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.579758] ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.586959] ================================================================== [ 47.993134] ================================================================== [ 48.000083] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 48.007457] Read of size 1 at addr ffff00080244db78 by task kunit_try_catch/275 [ 48.014747] [ 48.016232] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.016285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.016304] Hardware name: WinLink E850-96 board (DT) [ 48.016325] Call trace: [ 48.016337] show_stack+0x20/0x38 (C) [ 48.016368] dump_stack_lvl+0x8c/0xd0 [ 48.016404] print_report+0x118/0x5d0 [ 48.016431] kasan_report+0xdc/0x128 [ 48.016458] __asan_report_load1_noabort+0x20/0x30 [ 48.016489] ksize_unpoisons_memory+0x618/0x740 [ 48.016521] kunit_try_run_case+0x170/0x3f0 [ 48.016553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.016585] kthread+0x328/0x630 [ 48.016615] ret_from_fork+0x10/0x20 [ 48.016649] [ 48.080631] Allocated by task 275: [ 48.084018] kasan_save_stack+0x3c/0x68 [ 48.087835] kasan_save_track+0x20/0x40 [ 48.091654] kasan_save_alloc_info+0x40/0x58 [ 48.095907] __kasan_kmalloc+0xd4/0xd8 [ 48.099640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.104154] ksize_unpoisons_memory+0xc0/0x740 [ 48.108581] kunit_try_run_case+0x170/0x3f0 [ 48.112747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.118216] kthread+0x328/0x630 [ 48.121428] ret_from_fork+0x10/0x20 [ 48.124986] [ 48.126465] The buggy address belongs to the object at ffff00080244db00 [ 48.126465] which belongs to the cache kmalloc-128 of size 128 [ 48.138965] The buggy address is located 5 bytes to the right of [ 48.138965] allocated 115-byte region [ffff00080244db00, ffff00080244db73) [ 48.151896] [ 48.153374] The buggy address belongs to the physical page: [ 48.158932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 48.166915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.174555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.181496] page_type: f5(slab) [ 48.184633] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.192353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.200080] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.207891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.215704] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 48.223516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.231323] page dumped because: kasan: bad access detected [ 48.236877] [ 48.238354] Memory state around the buggy address: [ 48.243132] ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.250336] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.257540] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.264741] ^ [ 48.271863] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.279068] ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.286270] ================================================================== [ 47.690046] ================================================================== [ 47.699739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 47.707112] Read of size 1 at addr ffff00080244db73 by task kunit_try_catch/275 [ 47.714404] [ 47.715890] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 47.715947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.715966] Hardware name: WinLink E850-96 board (DT) [ 47.715988] Call trace: [ 47.716001] show_stack+0x20/0x38 (C) [ 47.716036] dump_stack_lvl+0x8c/0xd0 [ 47.716074] print_report+0x118/0x5d0 [ 47.716100] kasan_report+0xdc/0x128 [ 47.716126] __asan_report_load1_noabort+0x20/0x30 [ 47.716160] ksize_unpoisons_memory+0x628/0x740 [ 47.716194] kunit_try_run_case+0x170/0x3f0 [ 47.716224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.716261] kthread+0x328/0x630 [ 47.716290] ret_from_fork+0x10/0x20 [ 47.716325] [ 47.780288] Allocated by task 275: [ 47.783676] kasan_save_stack+0x3c/0x68 [ 47.787492] kasan_save_track+0x20/0x40 [ 47.791311] kasan_save_alloc_info+0x40/0x58 [ 47.795564] __kasan_kmalloc+0xd4/0xd8 [ 47.799298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.803811] ksize_unpoisons_memory+0xc0/0x740 [ 47.808238] kunit_try_run_case+0x170/0x3f0 [ 47.812404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.817873] kthread+0x328/0x630 [ 47.821086] ret_from_fork+0x10/0x20 [ 47.824644] [ 47.826121] The buggy address belongs to the object at ffff00080244db00 [ 47.826121] which belongs to the cache kmalloc-128 of size 128 [ 47.838623] The buggy address is located 0 bytes to the right of [ 47.838623] allocated 115-byte region [ffff00080244db00, ffff00080244db73) [ 47.851553] [ 47.853033] The buggy address belongs to the physical page: [ 47.858590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 47.866572] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.874212] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.881155] page_type: f5(slab) [ 47.884291] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.892011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.899739] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.907548] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.915361] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 47.923173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.930981] page dumped because: kasan: bad access detected [ 47.936534] [ 47.938010] Memory state around the buggy address: [ 47.942792] ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.949995] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.957199] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 47.964399] ^ [ 47.971260] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.978466] ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.985667] ==================================================================
[ 30.808702] ================================================================== [ 30.808773] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.808854] Read of size 1 at addr fff00000c64f4c73 by task kunit_try_catch/226 [ 30.808905] [ 30.810507] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.810765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.810794] Hardware name: linux,dummy-virt (DT) [ 30.811161] Call trace: [ 30.811195] show_stack+0x20/0x38 (C) [ 30.811267] dump_stack_lvl+0x8c/0xd0 [ 30.811368] print_report+0x118/0x5d0 [ 30.811419] kasan_report+0xdc/0x128 [ 30.811476] __asan_report_load1_noabort+0x20/0x30 [ 30.811578] ksize_unpoisons_memory+0x628/0x740 [ 30.811633] kunit_try_run_case+0x170/0x3f0 [ 30.811680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.812190] kthread+0x328/0x630 [ 30.812548] ret_from_fork+0x10/0x20 [ 30.812794] [ 30.812862] Allocated by task 226: [ 30.812902] kasan_save_stack+0x3c/0x68 [ 30.813141] kasan_save_track+0x20/0x40 [ 30.813181] kasan_save_alloc_info+0x40/0x58 [ 30.813636] __kasan_kmalloc+0xd4/0xd8 [ 30.813695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.813898] ksize_unpoisons_memory+0xc0/0x740 [ 30.813999] kunit_try_run_case+0x170/0x3f0 [ 30.814040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.814085] kthread+0x328/0x630 [ 30.814347] ret_from_fork+0x10/0x20 [ 30.814406] [ 30.814449] The buggy address belongs to the object at fff00000c64f4c00 [ 30.814449] which belongs to the cache kmalloc-128 of size 128 [ 30.814930] The buggy address is located 0 bytes to the right of [ 30.814930] allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73) [ 30.815122] [ 30.815155] The buggy address belongs to the physical page: [ 30.815212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.815547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.815620] page_type: f5(slab) [ 30.815757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.816073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.816333] page dumped because: kasan: bad access detected [ 30.816377] [ 30.816602] Memory state around the buggy address: [ 30.816647] fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.816698] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.816741] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.817235] ^ [ 30.817622] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.818180] fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.818221] ================================================================== [ 30.830421] ================================================================== [ 30.830729] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.830781] Read of size 1 at addr fff00000c64f4c7f by task kunit_try_catch/226 [ 30.830830] [ 30.830862] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.830945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.830971] Hardware name: linux,dummy-virt (DT) [ 30.831002] Call trace: [ 30.831787] show_stack+0x20/0x38 (C) [ 30.832058] dump_stack_lvl+0x8c/0xd0 [ 30.832396] print_report+0x118/0x5d0 [ 30.832455] kasan_report+0xdc/0x128 [ 30.832500] __asan_report_load1_noabort+0x20/0x30 [ 30.832548] ksize_unpoisons_memory+0x690/0x740 [ 30.832598] kunit_try_run_case+0x170/0x3f0 [ 30.832645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.832695] kthread+0x328/0x630 [ 30.832738] ret_from_fork+0x10/0x20 [ 30.832786] [ 30.832803] Allocated by task 226: [ 30.832829] kasan_save_stack+0x3c/0x68 [ 30.832872] kasan_save_track+0x20/0x40 [ 30.832912] kasan_save_alloc_info+0x40/0x58 [ 30.832950] __kasan_kmalloc+0xd4/0xd8 [ 30.832988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.833029] ksize_unpoisons_memory+0xc0/0x740 [ 30.833069] kunit_try_run_case+0x170/0x3f0 [ 30.833781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.834377] kthread+0x328/0x630 [ 30.834491] ret_from_fork+0x10/0x20 [ 30.835001] [ 30.835027] The buggy address belongs to the object at fff00000c64f4c00 [ 30.835027] which belongs to the cache kmalloc-128 of size 128 [ 30.835456] The buggy address is located 12 bytes to the right of [ 30.835456] allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73) [ 30.835529] [ 30.835880] The buggy address belongs to the physical page: [ 30.836284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.836385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.836449] page_type: f5(slab) [ 30.836877] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.836966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.837135] page dumped because: kasan: bad access detected [ 30.837167] [ 30.837184] Memory state around the buggy address: [ 30.837215] fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.837259] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.837302] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.837340] ^ [ 30.837953] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.838163] fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.838214] ================================================================== [ 30.820622] ================================================================== [ 30.820677] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.820729] Read of size 1 at addr fff00000c64f4c78 by task kunit_try_catch/226 [ 30.820777] [ 30.821660] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.821774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.821803] Hardware name: linux,dummy-virt (DT) [ 30.821955] Call trace: [ 30.821979] show_stack+0x20/0x38 (C) [ 30.822032] dump_stack_lvl+0x8c/0xd0 [ 30.822083] print_report+0x118/0x5d0 [ 30.822130] kasan_report+0xdc/0x128 [ 30.822172] __asan_report_load1_noabort+0x20/0x30 [ 30.822222] ksize_unpoisons_memory+0x618/0x740 [ 30.822325] kunit_try_run_case+0x170/0x3f0 [ 30.822374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.822428] kthread+0x328/0x630 [ 30.823456] ret_from_fork+0x10/0x20 [ 30.823663] [ 30.823681] Allocated by task 226: [ 30.823710] kasan_save_stack+0x3c/0x68 [ 30.824246] kasan_save_track+0x20/0x40 [ 30.824462] kasan_save_alloc_info+0x40/0x58 [ 30.824507] __kasan_kmalloc+0xd4/0xd8 [ 30.824546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.824744] ksize_unpoisons_memory+0xc0/0x740 [ 30.825174] kunit_try_run_case+0x170/0x3f0 [ 30.825219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.825379] kthread+0x328/0x630 [ 30.825466] ret_from_fork+0x10/0x20 [ 30.825979] [ 30.826065] The buggy address belongs to the object at fff00000c64f4c00 [ 30.826065] which belongs to the cache kmalloc-128 of size 128 [ 30.826127] The buggy address is located 5 bytes to the right of [ 30.826127] allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73) [ 30.826191] [ 30.826210] The buggy address belongs to the physical page: [ 30.826266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.826784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.826915] page_type: f5(slab) [ 30.827188] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.827637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.827686] page dumped because: kasan: bad access detected [ 30.827718] [ 30.827737] Memory state around the buggy address: [ 30.827768] fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.827813] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.827855] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.827893] ^ [ 30.827935] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.827977] fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.828014] ==================================================================
[ 24.467246] ================================================================== [ 24.467494] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.467888] Read of size 1 at addr ffff8881041b9978 by task kunit_try_catch/242 [ 24.468263] [ 24.468358] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 24.468576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.468735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.468759] Call Trace: [ 24.468775] <TASK> [ 24.468792] dump_stack_lvl+0x73/0xb0 [ 24.468829] print_report+0xd1/0x610 [ 24.468857] ? __virt_addr_valid+0x1db/0x2d0 [ 24.468886] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.468914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.468945] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.468973] kasan_report+0x141/0x180 [ 24.469000] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.469035] __asan_report_load1_noabort+0x18/0x20 [ 24.469063] ksize_unpoisons_memory+0x7e9/0x9b0 [ 24.469092] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.469119] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.469154] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.469188] kunit_try_run_case+0x1a5/0x480 [ 24.469217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.469243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.469270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.469298] ? __kthread_parkme+0x82/0x180 [ 24.469323] ? preempt_count_sub+0x50/0x80 [ 24.469352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.469380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.469411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.469442] kthread+0x337/0x6f0 [ 24.469466] ? trace_preempt_on+0x20/0xc0 [ 24.469496] ? __pfx_kthread+0x10/0x10 [ 24.469735] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.470037] ? calculate_sigpending+0x7b/0xa0 [ 24.470067] ? __pfx_kthread+0x10/0x10 [ 24.470095] ret_from_fork+0x116/0x1d0 [ 24.470120] ? __pfx_kthread+0x10/0x10 [ 24.470146] ret_from_fork_asm+0x1a/0x30 [ 24.470186] </TASK> [ 24.470198] [ 24.477164] Allocated by task 242: [ 24.477326] kasan_save_stack+0x45/0x70 [ 24.477477] kasan_save_track+0x18/0x40 [ 24.477764] kasan_save_alloc_info+0x3b/0x50 [ 24.478172] __kasan_kmalloc+0xb7/0xc0 [ 24.478339] __kmalloc_cache_noprof+0x189/0x420 [ 24.478503] ksize_unpoisons_memory+0xc7/0x9b0 [ 24.478943] kunit_try_run_case+0x1a5/0x480 [ 24.479213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.479453] kthread+0x337/0x6f0 [ 24.479603] ret_from_fork+0x116/0x1d0 [ 24.479844] ret_from_fork_asm+0x1a/0x30 [ 24.479988] [ 24.480064] The buggy address belongs to the object at ffff8881041b9900 [ 24.480064] which belongs to the cache kmalloc-128 of size 128 [ 24.480545] The buggy address is located 5 bytes to the right of [ 24.480545] allocated 115-byte region [ffff8881041b9900, ffff8881041b9973) [ 24.481200] [ 24.481394] The buggy address belongs to the physical page: [ 24.481629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9 [ 24.482069] flags: 0x200000000000000(node=0|zone=2) [ 24.482240] page_type: f5(slab) [ 24.482360] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.482801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.483341] page dumped because: kasan: bad access detected [ 24.483509] [ 24.483589] Memory state around the buggy address: [ 24.483743] ffff8881041b9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.483955] ffff8881041b9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.484577] >ffff8881041b9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.484902] ^ [ 24.485219] ffff8881041b9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.485536] ffff8881041b9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.486039] ================================================================== [ 24.443229] ================================================================== [ 24.443731] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 24.444267] Read of size 1 at addr ffff8881041b9973 by task kunit_try_catch/242 [ 24.444538] [ 24.444629] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 24.444686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.444701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.444740] Call Trace: [ 24.444819] <TASK> [ 24.444842] dump_stack_lvl+0x73/0xb0 [ 24.444879] print_report+0xd1/0x610 [ 24.444920] ? __virt_addr_valid+0x1db/0x2d0 [ 24.444950] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 24.444997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.445044] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 24.445072] kasan_report+0x141/0x180 [ 24.445100] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 24.445134] __asan_report_load1_noabort+0x18/0x20 [ 24.445163] ksize_unpoisons_memory+0x81c/0x9b0 [ 24.445191] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.445218] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.445255] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.445305] kunit_try_run_case+0x1a5/0x480 [ 24.445348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.445374] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.445402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.445430] ? __kthread_parkme+0x82/0x180 [ 24.445456] ? preempt_count_sub+0x50/0x80 [ 24.445486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.445514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.445560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.445699] kthread+0x337/0x6f0 [ 24.445726] ? trace_preempt_on+0x20/0xc0 [ 24.445755] ? __pfx_kthread+0x10/0x10 [ 24.445781] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.445810] ? calculate_sigpending+0x7b/0xa0 [ 24.445839] ? __pfx_kthread+0x10/0x10 [ 24.445866] ret_from_fork+0x116/0x1d0 [ 24.445890] ? __pfx_kthread+0x10/0x10 [ 24.445916] ret_from_fork_asm+0x1a/0x30 [ 24.445956] </TASK> [ 24.445970] [ 24.454698] Allocated by task 242: [ 24.455281] kasan_save_stack+0x45/0x70 [ 24.455825] kasan_save_track+0x18/0x40 [ 24.456339] kasan_save_alloc_info+0x3b/0x50 [ 24.456940] __kasan_kmalloc+0xb7/0xc0 [ 24.457334] __kmalloc_cache_noprof+0x189/0x420 [ 24.457503] ksize_unpoisons_memory+0xc7/0x9b0 [ 24.457783] kunit_try_run_case+0x1a5/0x480 [ 24.458155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.458546] kthread+0x337/0x6f0 [ 24.458993] ret_from_fork+0x116/0x1d0 [ 24.459331] ret_from_fork_asm+0x1a/0x30 [ 24.459478] [ 24.459561] The buggy address belongs to the object at ffff8881041b9900 [ 24.459561] which belongs to the cache kmalloc-128 of size 128 [ 24.460778] The buggy address is located 0 bytes to the right of [ 24.460778] allocated 115-byte region [ffff8881041b9900, ffff8881041b9973) [ 24.462144] [ 24.462267] The buggy address belongs to the physical page: [ 24.462812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9 [ 24.463102] flags: 0x200000000000000(node=0|zone=2) [ 24.463266] page_type: f5(slab) [ 24.463386] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.463639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.464143] page dumped because: kasan: bad access detected [ 24.464362] [ 24.464455] Memory state around the buggy address: [ 24.464759] ffff8881041b9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.464985] ffff8881041b9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.465395] >ffff8881041b9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.465734] ^ [ 24.466031] ffff8881041b9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.466312] ffff8881041b9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.466686] ================================================================== [ 24.487415] ================================================================== [ 24.487871] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.488227] Read of size 1 at addr ffff8881041b997f by task kunit_try_catch/242 [ 24.488937] [ 24.489037] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 24.489089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.489102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.489125] Call Trace: [ 24.489142] <TASK> [ 24.489159] dump_stack_lvl+0x73/0xb0 [ 24.489194] print_report+0xd1/0x610 [ 24.489222] ? __virt_addr_valid+0x1db/0x2d0 [ 24.489252] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.489279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.489310] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.489338] kasan_report+0x141/0x180 [ 24.489366] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.489400] __asan_report_load1_noabort+0x18/0x20 [ 24.489429] ksize_unpoisons_memory+0x7b6/0x9b0 [ 24.489457] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.489484] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.489532] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 24.489566] kunit_try_run_case+0x1a5/0x480 [ 24.489818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.489846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.489874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.489903] ? __kthread_parkme+0x82/0x180 [ 24.489929] ? preempt_count_sub+0x50/0x80 [ 24.489959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.489988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.490021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.490054] kthread+0x337/0x6f0 [ 24.490078] ? trace_preempt_on+0x20/0xc0 [ 24.490107] ? __pfx_kthread+0x10/0x10 [ 24.490133] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.490163] ? calculate_sigpending+0x7b/0xa0 [ 24.490192] ? __pfx_kthread+0x10/0x10 [ 24.490219] ret_from_fork+0x116/0x1d0 [ 24.490244] ? __pfx_kthread+0x10/0x10 [ 24.490269] ret_from_fork_asm+0x1a/0x30 [ 24.490311] </TASK> [ 24.490323] [ 24.497684] Allocated by task 242: [ 24.497814] kasan_save_stack+0x45/0x70 [ 24.497962] kasan_save_track+0x18/0x40 [ 24.498128] kasan_save_alloc_info+0x3b/0x50 [ 24.498578] __kasan_kmalloc+0xb7/0xc0 [ 24.498808] __kmalloc_cache_noprof+0x189/0x420 [ 24.499056] ksize_unpoisons_memory+0xc7/0x9b0 [ 24.499211] kunit_try_run_case+0x1a5/0x480 [ 24.499404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.499768] kthread+0x337/0x6f0 [ 24.499994] ret_from_fork+0x116/0x1d0 [ 24.500186] ret_from_fork_asm+0x1a/0x30 [ 24.500354] [ 24.500449] The buggy address belongs to the object at ffff8881041b9900 [ 24.500449] which belongs to the cache kmalloc-128 of size 128 [ 24.501006] The buggy address is located 12 bytes to the right of [ 24.501006] allocated 115-byte region [ffff8881041b9900, ffff8881041b9973) [ 24.501401] [ 24.501495] The buggy address belongs to the physical page: [ 24.501752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9 [ 24.502126] flags: 0x200000000000000(node=0|zone=2) [ 24.502358] page_type: f5(slab) [ 24.502541] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.503001] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.503298] page dumped because: kasan: bad access detected [ 24.503473] [ 24.503554] Memory state around the buggy address: [ 24.503771] ffff8881041b9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.504095] ffff8881041b9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.504411] >ffff8881041b9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.504829] ^ [ 24.505097] ffff8881041b9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.505377] ffff8881041b9a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.505736] ==================================================================