Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 28.546978] ================================================================== [ 28.556558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 28.563938] Read of size 1 at addr ffff000802408573 by task kunit_try_catch/241 [ 28.571224] [ 28.572710] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 28.572763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.572779] Hardware name: WinLink E850-96 board (DT) [ 28.572803] Call trace: [ 28.572816] show_stack+0x20/0x38 (C) [ 28.572854] dump_stack_lvl+0x8c/0xd0 [ 28.572892] print_report+0x118/0x608 [ 28.572920] kasan_report+0xdc/0x128 [ 28.572951] __asan_report_load1_noabort+0x20/0x30 [ 28.572986] ksize_unpoisons_memory+0x628/0x740 [ 28.573020] kunit_try_run_case+0x170/0x3f0 [ 28.573057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.573096] kthread+0x328/0x630 [ 28.573133] ret_from_fork+0x10/0x20 [ 28.573168] [ 28.635895] Allocated by task 241: [ 28.639280] kasan_save_stack+0x3c/0x68 [ 28.643097] kasan_save_track+0x20/0x40 [ 28.646917] kasan_save_alloc_info+0x40/0x58 [ 28.651170] __kasan_kmalloc+0xd4/0xd8 [ 28.654903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.659417] ksize_unpoisons_memory+0xc0/0x740 [ 28.663844] kunit_try_run_case+0x170/0x3f0 [ 28.668010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.673480] kthread+0x328/0x630 [ 28.676691] ret_from_fork+0x10/0x20 [ 28.680250] [ 28.681727] The buggy address belongs to the object at ffff000802408500 [ 28.681727] which belongs to the cache kmalloc-128 of size 128 [ 28.694227] The buggy address is located 0 bytes to the right of [ 28.694227] allocated 115-byte region [ffff000802408500, ffff000802408573) [ 28.707159] [ 28.708638] The buggy address belongs to the physical page: [ 28.714195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 28.722180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.729817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.736762] page_type: f5(slab) [ 28.739899] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.747617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.755343] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 28.763154] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.770967] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 28.778779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.786585] page dumped because: kasan: bad access detected [ 28.792140] [ 28.793616] Memory state around the buggy address: [ 28.798396] ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.805601] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.812803] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.820005] ^ [ 28.826865] ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.834072] ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.841274] ================================================================== [ 29.148098] ================================================================== [ 29.155073] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.162448] Read of size 1 at addr ffff00080240857f by task kunit_try_catch/241 [ 29.169739] [ 29.171226] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 29.171276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.171291] Hardware name: WinLink E850-96 board (DT) [ 29.171312] Call trace: [ 29.171323] show_stack+0x20/0x38 (C) [ 29.171356] dump_stack_lvl+0x8c/0xd0 [ 29.171389] print_report+0x118/0x608 [ 29.171419] kasan_report+0xdc/0x128 [ 29.171447] __asan_report_load1_noabort+0x20/0x30 [ 29.171481] ksize_unpoisons_memory+0x690/0x740 [ 29.171514] kunit_try_run_case+0x170/0x3f0 [ 29.171549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.171586] kthread+0x328/0x630 [ 29.171620] ret_from_fork+0x10/0x20 [ 29.171652] [ 29.234408] Allocated by task 241: [ 29.237796] kasan_save_stack+0x3c/0x68 [ 29.241614] kasan_save_track+0x20/0x40 [ 29.245433] kasan_save_alloc_info+0x40/0x58 [ 29.249686] __kasan_kmalloc+0xd4/0xd8 [ 29.253418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.257932] ksize_unpoisons_memory+0xc0/0x740 [ 29.262359] kunit_try_run_case+0x170/0x3f0 [ 29.266526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.271994] kthread+0x328/0x630 [ 29.275206] ret_from_fork+0x10/0x20 [ 29.278765] [ 29.280242] The buggy address belongs to the object at ffff000802408500 [ 29.280242] which belongs to the cache kmalloc-128 of size 128 [ 29.292742] The buggy address is located 12 bytes to the right of [ 29.292742] allocated 115-byte region [ffff000802408500, ffff000802408573) [ 29.305761] [ 29.307239] The buggy address belongs to the physical page: [ 29.312795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 29.320779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.328419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.335363] page_type: f5(slab) [ 29.338495] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.346219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.353945] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.361756] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.369569] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 29.377381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.385187] page dumped because: kasan: bad access detected [ 29.390743] [ 29.392218] Memory state around the buggy address: [ 29.396999] ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.404201] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.411406] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.418607] ^ [ 29.425728] ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.432934] ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440135] ================================================================== [ 28.848597] ================================================================== [ 28.855688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 28.863061] Read of size 1 at addr ffff000802408578 by task kunit_try_catch/241 [ 28.870352] [ 28.871838] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 28.871889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.871905] Hardware name: WinLink E850-96 board (DT) [ 28.871924] Call trace: [ 28.871935] show_stack+0x20/0x38 (C) [ 28.871971] dump_stack_lvl+0x8c/0xd0 [ 28.872005] print_report+0x118/0x608 [ 28.872036] kasan_report+0xdc/0x128 [ 28.872063] __asan_report_load1_noabort+0x20/0x30 [ 28.872098] ksize_unpoisons_memory+0x618/0x740 [ 28.872134] kunit_try_run_case+0x170/0x3f0 [ 28.872168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.872203] kthread+0x328/0x630 [ 28.872239] ret_from_fork+0x10/0x20 [ 28.872272] [ 28.935020] Allocated by task 241: [ 28.938408] kasan_save_stack+0x3c/0x68 [ 28.942225] kasan_save_track+0x20/0x40 [ 28.946045] kasan_save_alloc_info+0x40/0x58 [ 28.950298] __kasan_kmalloc+0xd4/0xd8 [ 28.954030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.958544] ksize_unpoisons_memory+0xc0/0x740 [ 28.962971] kunit_try_run_case+0x170/0x3f0 [ 28.967138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.972607] kthread+0x328/0x630 [ 28.975818] ret_from_fork+0x10/0x20 [ 28.979377] [ 28.980854] The buggy address belongs to the object at ffff000802408500 [ 28.980854] which belongs to the cache kmalloc-128 of size 128 [ 28.993354] The buggy address is located 5 bytes to the right of [ 28.993354] allocated 115-byte region [ffff000802408500, ffff000802408573) [ 29.006287] [ 29.007766] The buggy address belongs to the physical page: [ 29.013322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408 [ 29.021307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.028944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.035888] page_type: f5(slab) [ 29.039022] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.046744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.054470] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 29.062282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.070095] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff [ 29.077907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.085712] page dumped because: kasan: bad access detected [ 29.091268] [ 29.092743] Memory state around the buggy address: [ 29.097525] ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.104726] ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.111931] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.119132] ^ [ 29.126254] ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.133460] ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.140660] ==================================================================
[ 19.204282] ================================================================== [ 19.204342] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.204752] Read of size 1 at addr fff00000c3f75873 by task kunit_try_catch/197 [ 19.204925] [ 19.204961] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.207434] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.207491] Hardware name: linux,dummy-virt (DT) [ 19.207524] Call trace: [ 19.207549] show_stack+0x20/0x38 (C) [ 19.207605] dump_stack_lvl+0x8c/0xd0 [ 19.207652] print_report+0x118/0x608 [ 19.207700] kasan_report+0xdc/0x128 [ 19.207746] __asan_report_load1_noabort+0x20/0x30 [ 19.207798] ksize_unpoisons_memory+0x628/0x740 [ 19.207849] kunit_try_run_case+0x170/0x3f0 [ 19.207900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.207959] kthread+0x328/0x630 [ 19.208005] ret_from_fork+0x10/0x20 [ 19.208058] [ 19.208075] Allocated by task 197: [ 19.208105] kasan_save_stack+0x3c/0x68 [ 19.208143] kasan_save_track+0x20/0x40 [ 19.208180] kasan_save_alloc_info+0x40/0x58 [ 19.208219] __kasan_kmalloc+0xd4/0xd8 [ 19.208258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.208300] ksize_unpoisons_memory+0xc0/0x740 [ 19.208342] kunit_try_run_case+0x170/0x3f0 [ 19.208393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.208439] kthread+0x328/0x630 [ 19.208474] ret_from_fork+0x10/0x20 [ 19.208511] [ 19.208531] The buggy address belongs to the object at fff00000c3f75800 [ 19.208531] which belongs to the cache kmalloc-128 of size 128 [ 19.208588] The buggy address is located 0 bytes to the right of [ 19.208588] allocated 115-byte region [fff00000c3f75800, fff00000c3f75873) [ 19.208652] [ 19.208671] The buggy address belongs to the physical page: [ 19.208702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.208755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.208803] page_type: f5(slab) [ 19.208843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.208894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.208936] page dumped because: kasan: bad access detected [ 19.208966] [ 19.208984] Memory state around the buggy address: [ 19.209016] fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.209059] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209104] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.209142] ^ [ 19.209182] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209225] fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209265] ================================================================== [ 19.214928] ================================================================== [ 19.214995] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.215085] Read of size 1 at addr fff00000c3f7587f by task kunit_try_catch/197 [ 19.215180] [ 19.215208] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.215291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.215320] Hardware name: linux,dummy-virt (DT) [ 19.215364] Call trace: [ 19.215415] show_stack+0x20/0x38 (C) [ 19.215469] dump_stack_lvl+0x8c/0xd0 [ 19.215518] print_report+0x118/0x608 [ 19.215563] kasan_report+0xdc/0x128 [ 19.215607] __asan_report_load1_noabort+0x20/0x30 [ 19.215681] ksize_unpoisons_memory+0x690/0x740 [ 19.215741] kunit_try_run_case+0x170/0x3f0 [ 19.215800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.215867] kthread+0x328/0x630 [ 19.215912] ret_from_fork+0x10/0x20 [ 19.215985] [ 19.216005] Allocated by task 197: [ 19.216031] kasan_save_stack+0x3c/0x68 [ 19.216089] kasan_save_track+0x20/0x40 [ 19.216126] kasan_save_alloc_info+0x40/0x58 [ 19.216171] __kasan_kmalloc+0xd4/0xd8 [ 19.216207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.216266] ksize_unpoisons_memory+0xc0/0x740 [ 19.216333] kunit_try_run_case+0x170/0x3f0 [ 19.216387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.216432] kthread+0x328/0x630 [ 19.216468] ret_from_fork+0x10/0x20 [ 19.216535] [ 19.216574] The buggy address belongs to the object at fff00000c3f75800 [ 19.216574] which belongs to the cache kmalloc-128 of size 128 [ 19.216670] The buggy address is located 12 bytes to the right of [ 19.216670] allocated 115-byte region [fff00000c3f75800, fff00000c3f75873) [ 19.216800] [ 19.216827] The buggy address belongs to the physical page: [ 19.216858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.216936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.217155] page_type: f5(slab) [ 19.217226] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.217296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.217471] page dumped because: kasan: bad access detected [ 19.217502] [ 19.217838] Memory state around the buggy address: [ 19.217903] fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.217960] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218003] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.218041] ^ [ 19.218083] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218133] fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218181] ================================================================== [ 19.210020] ================================================================== [ 19.210069] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.210122] Read of size 1 at addr fff00000c3f75878 by task kunit_try_catch/197 [ 19.210172] [ 19.210201] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.210284] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.210313] Hardware name: linux,dummy-virt (DT) [ 19.210345] Call trace: [ 19.210386] show_stack+0x20/0x38 (C) [ 19.210434] dump_stack_lvl+0x8c/0xd0 [ 19.210483] print_report+0x118/0x608 [ 19.210714] kasan_report+0xdc/0x128 [ 19.210864] __asan_report_load1_noabort+0x20/0x30 [ 19.211145] ksize_unpoisons_memory+0x618/0x740 [ 19.211270] kunit_try_run_case+0x170/0x3f0 [ 19.211417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.211531] kthread+0x328/0x630 [ 19.211589] ret_from_fork+0x10/0x20 [ 19.211750] [ 19.211799] Allocated by task 197: [ 19.211828] kasan_save_stack+0x3c/0x68 [ 19.212050] kasan_save_track+0x20/0x40 [ 19.212208] kasan_save_alloc_info+0x40/0x58 [ 19.212308] __kasan_kmalloc+0xd4/0xd8 [ 19.212420] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.212532] ksize_unpoisons_memory+0xc0/0x740 [ 19.212620] kunit_try_run_case+0x170/0x3f0 [ 19.212787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.212895] kthread+0x328/0x630 [ 19.213058] ret_from_fork+0x10/0x20 [ 19.213165] [ 19.213186] The buggy address belongs to the object at fff00000c3f75800 [ 19.213186] which belongs to the cache kmalloc-128 of size 128 [ 19.213502] The buggy address is located 5 bytes to the right of [ 19.213502] allocated 115-byte region [fff00000c3f75800, fff00000c3f75873) [ 19.213580] [ 19.213600] The buggy address belongs to the physical page: [ 19.213630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.213682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.213729] page_type: f5(slab) [ 19.213767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.213818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.213861] page dumped because: kasan: bad access detected [ 19.213892] [ 19.213911] Memory state around the buggy address: [ 19.213943] fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.213987] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214031] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.214069] ^ [ 19.214110] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214153] fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214192] ==================================================================
[ 17.125145] ================================================================== [ 17.125773] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.126066] Read of size 1 at addr ffff888101de5678 by task kunit_try_catch/215 [ 17.126280] [ 17.126412] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 17.126498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.126518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.126551] Call Trace: [ 17.126586] <TASK> [ 17.126619] dump_stack_lvl+0x73/0xb0 [ 17.126673] print_report+0xd1/0x650 [ 17.126709] ? __virt_addr_valid+0x1db/0x2d0 [ 17.126746] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.126824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.126878] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.126924] kasan_report+0x141/0x180 [ 17.126970] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.127026] __asan_report_load1_noabort+0x18/0x20 [ 17.127070] ksize_unpoisons_memory+0x7e9/0x9b0 [ 17.127135] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.127185] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.127252] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.127307] kunit_try_run_case+0x1a5/0x480 [ 17.127354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.127407] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.127469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.127515] ? __kthread_parkme+0x82/0x180 [ 17.127564] ? preempt_count_sub+0x50/0x80 [ 17.127618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.127670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.127713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.127774] kthread+0x337/0x6f0 [ 17.127815] ? trace_preempt_on+0x20/0xc0 [ 17.127870] ? __pfx_kthread+0x10/0x10 [ 17.127914] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.127960] ? calculate_sigpending+0x7b/0xa0 [ 17.128000] ? __pfx_kthread+0x10/0x10 [ 17.128035] ret_from_fork+0x41/0x80 [ 17.128079] ? __pfx_kthread+0x10/0x10 [ 17.128116] ret_from_fork_asm+0x1a/0x30 [ 17.128179] </TASK> [ 17.128207] [ 17.140717] Allocated by task 215: [ 17.141499] kasan_save_stack+0x45/0x70 [ 17.141956] kasan_save_track+0x18/0x40 [ 17.142314] kasan_save_alloc_info+0x3b/0x50 [ 17.142773] __kasan_kmalloc+0xb7/0xc0 [ 17.142984] __kmalloc_cache_noprof+0x189/0x420 [ 17.143364] ksize_unpoisons_memory+0xc7/0x9b0 [ 17.143669] kunit_try_run_case+0x1a5/0x480 [ 17.144054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.144446] kthread+0x337/0x6f0 [ 17.144822] ret_from_fork+0x41/0x80 [ 17.145239] ret_from_fork_asm+0x1a/0x30 [ 17.145571] [ 17.145729] The buggy address belongs to the object at ffff888101de5600 [ 17.145729] which belongs to the cache kmalloc-128 of size 128 [ 17.146375] The buggy address is located 5 bytes to the right of [ 17.146375] allocated 115-byte region [ffff888101de5600, ffff888101de5673) [ 17.147208] [ 17.147411] The buggy address belongs to the physical page: [ 17.147779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5 [ 17.148397] flags: 0x200000000000000(node=0|zone=2) [ 17.148824] page_type: f5(slab) [ 17.149201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.149696] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.150130] page dumped because: kasan: bad access detected [ 17.150547] [ 17.150735] Memory state around the buggy address: [ 17.151046] ffff888101de5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.151602] ffff888101de5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.152192] >ffff888101de5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.152597] ^ [ 17.153075] ffff888101de5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.153558] ffff888101de5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154055] ================================================================== [ 17.155672] ================================================================== [ 17.156557] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.157181] Read of size 1 at addr ffff888101de567f by task kunit_try_catch/215 [ 17.158026] [ 17.158320] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 17.158621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.158683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.158743] Call Trace: [ 17.158801] <TASK> [ 17.158848] dump_stack_lvl+0x73/0xb0 [ 17.158928] print_report+0xd1/0x650 [ 17.158963] ? __virt_addr_valid+0x1db/0x2d0 [ 17.158991] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.159016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.159039] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.159064] kasan_report+0x141/0x180 [ 17.159088] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.159129] __asan_report_load1_noabort+0x18/0x20 [ 17.159184] ksize_unpoisons_memory+0x7b6/0x9b0 [ 17.159211] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.159236] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.159268] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.159297] kunit_try_run_case+0x1a5/0x480 [ 17.159326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.159348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.159375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.159399] ? __kthread_parkme+0x82/0x180 [ 17.159423] ? preempt_count_sub+0x50/0x80 [ 17.159450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.159474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.159498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.159522] kthread+0x337/0x6f0 [ 17.159541] ? trace_preempt_on+0x20/0xc0 [ 17.159566] ? __pfx_kthread+0x10/0x10 [ 17.159586] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.159608] ? calculate_sigpending+0x7b/0xa0 [ 17.159644] ? __pfx_kthread+0x10/0x10 [ 17.159666] ret_from_fork+0x41/0x80 [ 17.159691] ? __pfx_kthread+0x10/0x10 [ 17.159710] ret_from_fork_asm+0x1a/0x30 [ 17.159745] </TASK> [ 17.159782] [ 17.170468] Allocated by task 215: [ 17.170760] kasan_save_stack+0x45/0x70 [ 17.171007] kasan_save_track+0x18/0x40 [ 17.171234] kasan_save_alloc_info+0x3b/0x50 [ 17.171778] __kasan_kmalloc+0xb7/0xc0 [ 17.172133] __kmalloc_cache_noprof+0x189/0x420 [ 17.172531] ksize_unpoisons_memory+0xc7/0x9b0 [ 17.172987] kunit_try_run_case+0x1a5/0x480 [ 17.173525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.173817] kthread+0x337/0x6f0 [ 17.174015] ret_from_fork+0x41/0x80 [ 17.174205] ret_from_fork_asm+0x1a/0x30 [ 17.174564] [ 17.174726] The buggy address belongs to the object at ffff888101de5600 [ 17.174726] which belongs to the cache kmalloc-128 of size 128 [ 17.175190] The buggy address is located 12 bytes to the right of [ 17.175190] allocated 115-byte region [ffff888101de5600, ffff888101de5673) [ 17.176154] [ 17.176352] The buggy address belongs to the physical page: [ 17.176643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5 [ 17.177154] flags: 0x200000000000000(node=0|zone=2) [ 17.177527] page_type: f5(slab) [ 17.177862] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.178206] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.178632] page dumped because: kasan: bad access detected [ 17.179072] [ 17.179298] Memory state around the buggy address: [ 17.179600] ffff888101de5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.180055] ffff888101de5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.180573] >ffff888101de5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.181013] ^ [ 17.181391] ffff888101de5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.181941] ffff888101de5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.182355] ================================================================== [ 17.092927] ================================================================== [ 17.093584] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 17.094155] Read of size 1 at addr ffff888101de5673 by task kunit_try_catch/215 [ 17.094657] [ 17.095227] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 17.095351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.095372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.095398] Call Trace: [ 17.095415] <TASK> [ 17.095439] dump_stack_lvl+0x73/0xb0 [ 17.095482] print_report+0xd1/0x650 [ 17.095508] ? __virt_addr_valid+0x1db/0x2d0 [ 17.095535] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 17.095561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.095584] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 17.095609] kasan_report+0x141/0x180 [ 17.095652] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 17.095684] __asan_report_load1_noabort+0x18/0x20 [ 17.095707] ksize_unpoisons_memory+0x81c/0x9b0 [ 17.095732] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.095781] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.095834] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 17.095887] kunit_try_run_case+0x1a5/0x480 [ 17.095938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.095978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.096019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.096058] ? __kthread_parkme+0x82/0x180 [ 17.096102] ? preempt_count_sub+0x50/0x80 [ 17.096146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.096193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.096240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.096285] kthread+0x337/0x6f0 [ 17.096322] ? trace_preempt_on+0x20/0xc0 [ 17.096372] ? __pfx_kthread+0x10/0x10 [ 17.096408] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.096448] ? calculate_sigpending+0x7b/0xa0 [ 17.096489] ? __pfx_kthread+0x10/0x10 [ 17.096524] ret_from_fork+0x41/0x80 [ 17.096570] ? __pfx_kthread+0x10/0x10 [ 17.096612] ret_from_fork_asm+0x1a/0x30 [ 17.096674] </TASK> [ 17.096702] [ 17.109108] Allocated by task 215: [ 17.109697] kasan_save_stack+0x45/0x70 [ 17.110157] kasan_save_track+0x18/0x40 [ 17.110490] kasan_save_alloc_info+0x3b/0x50 [ 17.110867] __kasan_kmalloc+0xb7/0xc0 [ 17.111405] __kmalloc_cache_noprof+0x189/0x420 [ 17.111729] ksize_unpoisons_memory+0xc7/0x9b0 [ 17.112282] kunit_try_run_case+0x1a5/0x480 [ 17.112624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.112867] kthread+0x337/0x6f0 [ 17.113174] ret_from_fork+0x41/0x80 [ 17.113508] ret_from_fork_asm+0x1a/0x30 [ 17.113727] [ 17.113923] The buggy address belongs to the object at ffff888101de5600 [ 17.113923] which belongs to the cache kmalloc-128 of size 128 [ 17.114829] The buggy address is located 0 bytes to the right of [ 17.114829] allocated 115-byte region [ffff888101de5600, ffff888101de5673) [ 17.115501] [ 17.115635] The buggy address belongs to the physical page: [ 17.116086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5 [ 17.117082] flags: 0x200000000000000(node=0|zone=2) [ 17.117593] page_type: f5(slab) [ 17.117809] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.118310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.119019] page dumped because: kasan: bad access detected [ 17.119257] [ 17.119439] Memory state around the buggy address: [ 17.120009] ffff888101de5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.120947] ffff888101de5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121389] >ffff888101de5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.121706] ^ [ 17.122259] ffff888101de5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.122884] ffff888101de5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.123618] ==================================================================