Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.524380] ================================================================== [ 16.524421] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.524475] Write of size 1 at addr fff00000c595ec78 by task kunit_try_catch/136 [ 16.524523] [ 16.524559] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.524638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.524707] Hardware name: linux,dummy-virt (DT) [ 16.524753] Call trace: [ 16.524794] show_stack+0x20/0x38 (C) [ 16.524878] dump_stack_lvl+0x8c/0xd0 [ 16.524955] print_report+0x118/0x5d0 [ 16.525011] kasan_report+0xdc/0x128 [ 16.525057] __asan_report_store1_noabort+0x20/0x30 [ 16.525133] kmalloc_oob_right+0x538/0x660 [ 16.525223] kunit_try_run_case+0x170/0x3f0 [ 16.525278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.525330] kthread+0x328/0x630 [ 16.525372] ret_from_fork+0x10/0x20 [ 16.525419] [ 16.525437] Allocated by task 136: [ 16.525464] kasan_save_stack+0x3c/0x68 [ 16.525692] kasan_save_track+0x20/0x40 [ 16.525753] kasan_save_alloc_info+0x40/0x58 [ 16.525820] __kasan_kmalloc+0xd4/0xd8 [ 16.525885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.525951] kmalloc_oob_right+0xb0/0x660 [ 16.525987] kunit_try_run_case+0x170/0x3f0 [ 16.526042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.526101] kthread+0x328/0x630 [ 16.526135] ret_from_fork+0x10/0x20 [ 16.526176] [ 16.526196] The buggy address belongs to the object at fff00000c595ec00 [ 16.526196] which belongs to the cache kmalloc-128 of size 128 [ 16.526252] The buggy address is located 5 bytes to the right of [ 16.526252] allocated 115-byte region [fff00000c595ec00, fff00000c595ec73) [ 16.526504] [ 16.526530] The buggy address belongs to the physical page: [ 16.526579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 16.526671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.526736] page_type: f5(slab) [ 16.527036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.527119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.527218] page dumped because: kasan: bad access detected [ 16.527333] [ 16.527413] Memory state around the buggy address: [ 16.527461] fff00000c595eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.527519] fff00000c595eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.527598] >fff00000c595ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.527683] ^ [ 16.527770] fff00000c595ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.527821] fff00000c595ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.527867] ================================================================== [ 16.528645] ================================================================== [ 16.528699] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.528746] Read of size 1 at addr fff00000c595ec80 by task kunit_try_catch/136 [ 16.528998] [ 16.529041] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.529152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.529241] Hardware name: linux,dummy-virt (DT) [ 16.529278] Call trace: [ 16.529335] show_stack+0x20/0x38 (C) [ 16.529387] dump_stack_lvl+0x8c/0xd0 [ 16.529533] print_report+0x118/0x5d0 [ 16.529583] kasan_report+0xdc/0x128 [ 16.529738] __asan_report_load1_noabort+0x20/0x30 [ 16.529947] kmalloc_oob_right+0x5d0/0x660 [ 16.529999] kunit_try_run_case+0x170/0x3f0 [ 16.530158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.530229] kthread+0x328/0x630 [ 16.530282] ret_from_fork+0x10/0x20 [ 16.530329] [ 16.530359] Allocated by task 136: [ 16.530386] kasan_save_stack+0x3c/0x68 [ 16.530676] kasan_save_track+0x20/0x40 [ 16.530753] kasan_save_alloc_info+0x40/0x58 [ 16.530807] __kasan_kmalloc+0xd4/0xd8 [ 16.530855] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.530950] kmalloc_oob_right+0xb0/0x660 [ 16.530986] kunit_try_run_case+0x170/0x3f0 [ 16.531022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.531197] kthread+0x328/0x630 [ 16.531254] ret_from_fork+0x10/0x20 [ 16.531290] [ 16.531422] The buggy address belongs to the object at fff00000c595ec00 [ 16.531422] which belongs to the cache kmalloc-128 of size 128 [ 16.531530] The buggy address is located 13 bytes to the right of [ 16.531530] allocated 115-byte region [fff00000c595ec00, fff00000c595ec73) [ 16.531734] [ 16.531756] The buggy address belongs to the physical page: [ 16.531785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 16.532024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.532158] page_type: f5(slab) [ 16.532198] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.532246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.532370] page dumped because: kasan: bad access detected [ 16.532451] [ 16.532468] Memory state around the buggy address: [ 16.532542] fff00000c595eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.532634] fff00000c595ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.532698] >fff00000c595ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.532756] ^ [ 16.532811] fff00000c595ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.532880] fff00000c595ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.532916] ================================================================== [ 16.509556] ================================================================== [ 16.509977] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.510810] Write of size 1 at addr fff00000c595ec73 by task kunit_try_catch/136 [ 16.510933] [ 16.512084] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 16.512265] Tainted: [N]=TEST [ 16.512297] Hardware name: linux,dummy-virt (DT) [ 16.512528] Call trace: [ 16.512708] show_stack+0x20/0x38 (C) [ 16.512922] dump_stack_lvl+0x8c/0xd0 [ 16.512989] print_report+0x118/0x5d0 [ 16.513038] kasan_report+0xdc/0x128 [ 16.513083] __asan_report_store1_noabort+0x20/0x30 [ 16.513275] kmalloc_oob_right+0x5a4/0x660 [ 16.513495] kunit_try_run_case+0x170/0x3f0 [ 16.513590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.513722] kthread+0x328/0x630 [ 16.513766] ret_from_fork+0x10/0x20 [ 16.514858] [ 16.515088] Allocated by task 136: [ 16.515588] kasan_save_stack+0x3c/0x68 [ 16.515666] kasan_save_track+0x20/0x40 [ 16.515981] kasan_save_alloc_info+0x40/0x58 [ 16.516034] __kasan_kmalloc+0xd4/0xd8 [ 16.516194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.516324] kmalloc_oob_right+0xb0/0x660 [ 16.516461] kunit_try_run_case+0x170/0x3f0 [ 16.516564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.516776] kthread+0x328/0x630 [ 16.516869] ret_from_fork+0x10/0x20 [ 16.517519] [ 16.517677] The buggy address belongs to the object at fff00000c595ec00 [ 16.517677] which belongs to the cache kmalloc-128 of size 128 [ 16.518130] The buggy address is located 0 bytes to the right of [ 16.518130] allocated 115-byte region [fff00000c595ec00, fff00000c595ec73) [ 16.518454] [ 16.518675] The buggy address belongs to the physical page: [ 16.519630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 16.520464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.521266] page_type: f5(slab) [ 16.521722] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.521825] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.521998] page dumped because: kasan: bad access detected [ 16.522053] [ 16.522088] Memory state around the buggy address: [ 16.522360] fff00000c595eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.522445] fff00000c595eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.522511] >fff00000c595ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.522580] ^ [ 16.522705] fff00000c595ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.522765] fff00000c595ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.522864] ==================================================================
[ 16.248134] ================================================================== [ 16.248185] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.248672] Write of size 1 at addr fff00000c5b7d578 by task kunit_try_catch/136 [ 16.248723] [ 16.248765] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.248850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.248876] Hardware name: linux,dummy-virt (DT) [ 16.248906] Call trace: [ 16.248928] show_stack+0x20/0x38 (C) [ 16.249054] dump_stack_lvl+0x8c/0xd0 [ 16.249102] print_report+0x118/0x5d0 [ 16.249148] kasan_report+0xdc/0x128 [ 16.249193] __asan_report_store1_noabort+0x20/0x30 [ 16.249243] kmalloc_oob_right+0x538/0x660 [ 16.249288] kunit_try_run_case+0x170/0x3f0 [ 16.249351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.249403] kthread+0x328/0x630 [ 16.249445] ret_from_fork+0x10/0x20 [ 16.249491] [ 16.249509] Allocated by task 136: [ 16.249537] kasan_save_stack+0x3c/0x68 [ 16.249576] kasan_save_track+0x20/0x40 [ 16.249611] kasan_save_alloc_info+0x40/0x58 [ 16.249662] __kasan_kmalloc+0xd4/0xd8 [ 16.249698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.249736] kmalloc_oob_right+0xb0/0x660 [ 16.249818] kunit_try_run_case+0x170/0x3f0 [ 16.249855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.250003] kthread+0x328/0x630 [ 16.250035] ret_from_fork+0x10/0x20 [ 16.250069] [ 16.250087] The buggy address belongs to the object at fff00000c5b7d500 [ 16.250087] which belongs to the cache kmalloc-128 of size 128 [ 16.250142] The buggy address is located 5 bytes to the right of [ 16.250142] allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573) [ 16.250203] [ 16.250465] The buggy address belongs to the physical page: [ 16.250501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.250599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.250727] page_type: f5(slab) [ 16.250766] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.250816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.250855] page dumped because: kasan: bad access detected [ 16.250885] [ 16.250903] Memory state around the buggy address: [ 16.250933] fff00000c5b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.251126] fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251169] >fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.251205] ^ [ 16.251244] fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251284] fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251330] ================================================================== [ 16.252911] ================================================================== [ 16.252958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.253006] Read of size 1 at addr fff00000c5b7d580 by task kunit_try_catch/136 [ 16.253061] [ 16.253090] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.253167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.253194] Hardware name: linux,dummy-virt (DT) [ 16.253223] Call trace: [ 16.253244] show_stack+0x20/0x38 (C) [ 16.253297] dump_stack_lvl+0x8c/0xd0 [ 16.253560] print_report+0x118/0x5d0 [ 16.253635] kasan_report+0xdc/0x128 [ 16.253787] __asan_report_load1_noabort+0x20/0x30 [ 16.253928] kmalloc_oob_right+0x5d0/0x660 [ 16.253974] kunit_try_run_case+0x170/0x3f0 [ 16.254020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.254071] kthread+0x328/0x630 [ 16.254112] ret_from_fork+0x10/0x20 [ 16.254158] [ 16.254176] Allocated by task 136: [ 16.254209] kasan_save_stack+0x3c/0x68 [ 16.254720] kasan_save_track+0x20/0x40 [ 16.254784] kasan_save_alloc_info+0x40/0x58 [ 16.255219] __kasan_kmalloc+0xd4/0xd8 [ 16.255259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.255478] kmalloc_oob_right+0xb0/0x660 [ 16.255548] kunit_try_run_case+0x170/0x3f0 [ 16.255795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.255847] kthread+0x328/0x630 [ 16.255889] ret_from_fork+0x10/0x20 [ 16.256034] [ 16.256065] The buggy address belongs to the object at fff00000c5b7d500 [ 16.256065] which belongs to the cache kmalloc-128 of size 128 [ 16.256121] The buggy address is located 13 bytes to the right of [ 16.256121] allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573) [ 16.256189] [ 16.256375] The buggy address belongs to the physical page: [ 16.256422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.256475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.256550] page_type: f5(slab) [ 16.256634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.256700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.256831] page dumped because: kasan: bad access detected [ 16.256875] [ 16.256892] Memory state around the buggy address: [ 16.256922] fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.256963] fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.257003] >fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257039] ^ [ 16.257066] fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257176] fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257213] ================================================================== [ 16.233656] ================================================================== [ 16.234205] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.235636] Write of size 1 at addr fff00000c5b7d573 by task kunit_try_catch/136 [ 16.235743] [ 16.237851] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 16.238009] Tainted: [N]=TEST [ 16.238042] Hardware name: linux,dummy-virt (DT) [ 16.238392] Call trace: [ 16.238618] show_stack+0x20/0x38 (C) [ 16.239267] dump_stack_lvl+0x8c/0xd0 [ 16.239417] print_report+0x118/0x5d0 [ 16.239470] kasan_report+0xdc/0x128 [ 16.239650] __asan_report_store1_noabort+0x20/0x30 [ 16.239716] kmalloc_oob_right+0x5a4/0x660 [ 16.239769] kunit_try_run_case+0x170/0x3f0 [ 16.239866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.240016] kthread+0x328/0x630 [ 16.240061] ret_from_fork+0x10/0x20 [ 16.240335] [ 16.240379] Allocated by task 136: [ 16.240523] kasan_save_stack+0x3c/0x68 [ 16.240611] kasan_save_track+0x20/0x40 [ 16.240651] kasan_save_alloc_info+0x40/0x58 [ 16.240690] __kasan_kmalloc+0xd4/0xd8 [ 16.240727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.240767] kmalloc_oob_right+0xb0/0x660 [ 16.241059] kunit_try_run_case+0x170/0x3f0 [ 16.241209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.241347] kthread+0x328/0x630 [ 16.241435] ret_from_fork+0x10/0x20 [ 16.241729] [ 16.242030] The buggy address belongs to the object at fff00000c5b7d500 [ 16.242030] which belongs to the cache kmalloc-128 of size 128 [ 16.242135] The buggy address is located 0 bytes to the right of [ 16.242135] allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573) [ 16.242201] [ 16.242611] The buggy address belongs to the physical page: [ 16.242840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.243399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.244252] page_type: f5(slab) [ 16.244888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.244954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.245178] page dumped because: kasan: bad access detected [ 16.245257] [ 16.245297] Memory state around the buggy address: [ 16.245533] fff00000c5b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.245600] fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.245971] >fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.246044] ^ [ 16.246136] fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.246178] fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.246499] ==================================================================
[ 16.263865] ================================================================== [ 16.263958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 16.264005] Read of size 1 at addr fff00000c576cc80 by task kunit_try_catch/136 [ 16.264051] [ 16.264079] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.264155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.264191] Hardware name: linux,dummy-virt (DT) [ 16.264219] Call trace: [ 16.264240] show_stack+0x20/0x38 (C) [ 16.264298] dump_stack_lvl+0x8c/0xd0 [ 16.264343] print_report+0x118/0x5d0 [ 16.264388] kasan_report+0xdc/0x128 [ 16.264432] __asan_report_load1_noabort+0x20/0x30 [ 16.264482] kmalloc_oob_right+0x5d0/0x660 [ 16.264526] kunit_try_run_case+0x170/0x3f0 [ 16.264572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.264622] kthread+0x328/0x630 [ 16.264662] ret_from_fork+0x10/0x20 [ 16.264707] [ 16.264735] Allocated by task 136: [ 16.264761] kasan_save_stack+0x3c/0x68 [ 16.264799] kasan_save_track+0x20/0x40 [ 16.264835] kasan_save_alloc_info+0x40/0x58 [ 16.264873] __kasan_kmalloc+0xd4/0xd8 [ 16.264907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.264944] kmalloc_oob_right+0xb0/0x660 [ 16.264994] kunit_try_run_case+0x170/0x3f0 [ 16.265048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.265089] kthread+0x328/0x630 [ 16.265119] ret_from_fork+0x10/0x20 [ 16.265153] [ 16.265170] The buggy address belongs to the object at fff00000c576cc00 [ 16.265170] which belongs to the cache kmalloc-128 of size 128 [ 16.265224] The buggy address is located 13 bytes to the right of [ 16.265224] allocated 115-byte region [fff00000c576cc00, fff00000c576cc73) [ 16.265284] [ 16.265302] The buggy address belongs to the physical page: [ 16.265344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c [ 16.265576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.265790] page_type: f5(slab) [ 16.265937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.266020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.266196] page dumped because: kasan: bad access detected [ 16.266253] [ 16.266270] Memory state around the buggy address: [ 16.266390] fff00000c576cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.266486] fff00000c576cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.266532] >fff00000c576cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.266644] ^ [ 16.266670] fff00000c576cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.267335] fff00000c576cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.267419] ================================================================== [ 16.260709] ================================================================== [ 16.260764] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 16.260812] Write of size 1 at addr fff00000c576cc78 by task kunit_try_catch/136 [ 16.260859] [ 16.260890] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.260979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.261005] Hardware name: linux,dummy-virt (DT) [ 16.261048] Call trace: [ 16.261069] show_stack+0x20/0x38 (C) [ 16.261127] dump_stack_lvl+0x8c/0xd0 [ 16.261173] print_report+0x118/0x5d0 [ 16.261270] kasan_report+0xdc/0x128 [ 16.261338] __asan_report_store1_noabort+0x20/0x30 [ 16.261454] kmalloc_oob_right+0x538/0x660 [ 16.261583] kunit_try_run_case+0x170/0x3f0 [ 16.261631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.261681] kthread+0x328/0x630 [ 16.261731] ret_from_fork+0x10/0x20 [ 16.261777] [ 16.261794] Allocated by task 136: [ 16.261834] kasan_save_stack+0x3c/0x68 [ 16.261874] kasan_save_track+0x20/0x40 [ 16.261922] kasan_save_alloc_info+0x40/0x58 [ 16.261960] __kasan_kmalloc+0xd4/0xd8 [ 16.262005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.262051] kmalloc_oob_right+0xb0/0x660 [ 16.262085] kunit_try_run_case+0x170/0x3f0 [ 16.262146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.262358] kthread+0x328/0x630 [ 16.262390] ret_from_fork+0x10/0x20 [ 16.262424] [ 16.262442] The buggy address belongs to the object at fff00000c576cc00 [ 16.262442] which belongs to the cache kmalloc-128 of size 128 [ 16.262496] The buggy address is located 5 bytes to the right of [ 16.262496] allocated 115-byte region [fff00000c576cc00, fff00000c576cc73) [ 16.262557] [ 16.262575] The buggy address belongs to the physical page: [ 16.262605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c [ 16.262654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.262699] page_type: f5(slab) [ 16.262745] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.262792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.263195] page dumped because: kasan: bad access detected [ 16.263236] [ 16.263254] Memory state around the buggy address: [ 16.263284] fff00000c576cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.263325] fff00000c576cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.263366] >fff00000c576cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.263402] ^ [ 16.263440] fff00000c576cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.263479] fff00000c576cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.263515] ================================================================== [ 16.253551] ================================================================== [ 16.253896] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 16.254751] Write of size 1 at addr fff00000c576cc73 by task kunit_try_catch/136 [ 16.254903] [ 16.255740] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT [ 16.255885] Tainted: [N]=TEST [ 16.255917] Hardware name: linux,dummy-virt (DT) [ 16.256140] Call trace: [ 16.256309] show_stack+0x20/0x38 (C) [ 16.256439] dump_stack_lvl+0x8c/0xd0 [ 16.256499] print_report+0x118/0x5d0 [ 16.256546] kasan_report+0xdc/0x128 [ 16.256591] __asan_report_store1_noabort+0x20/0x30 [ 16.256642] kmalloc_oob_right+0x5a4/0x660 [ 16.256686] kunit_try_run_case+0x170/0x3f0 [ 16.256753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.256805] kthread+0x328/0x630 [ 16.256848] ret_from_fork+0x10/0x20 [ 16.257011] [ 16.257047] Allocated by task 136: [ 16.257178] kasan_save_stack+0x3c/0x68 [ 16.257245] kasan_save_track+0x20/0x40 [ 16.257282] kasan_save_alloc_info+0x40/0x58 [ 16.257327] __kasan_kmalloc+0xd4/0xd8 [ 16.257362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.257401] kmalloc_oob_right+0xb0/0x660 [ 16.257436] kunit_try_run_case+0x170/0x3f0 [ 16.257472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.257514] kthread+0x328/0x630 [ 16.257545] ret_from_fork+0x10/0x20 [ 16.257598] [ 16.257656] The buggy address belongs to the object at fff00000c576cc00 [ 16.257656] which belongs to the cache kmalloc-128 of size 128 [ 16.257759] The buggy address is located 0 bytes to the right of [ 16.257759] allocated 115-byte region [fff00000c576cc00, fff00000c576cc73) [ 16.257824] [ 16.257901] The buggy address belongs to the physical page: [ 16.258088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c [ 16.258349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.258633] page_type: f5(slab) [ 16.258951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.259015] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.259119] page dumped because: kasan: bad access detected [ 16.259157] [ 16.259186] Memory state around the buggy address: [ 16.259411] fff00000c576cb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.259475] fff00000c576cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.259529] >fff00000c576cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.259581] ^ [ 16.259664] fff00000c576cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.259705] fff00000c576cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.259780] ==================================================================
[ 11.334605] ================================================================== [ 11.334945] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.335275] Read of size 1 at addr ffff888102ae1080 by task kunit_try_catch/154 [ 11.336007] [ 11.336124] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.336204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.336215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.336361] Call Trace: [ 11.336374] <TASK> [ 11.336388] dump_stack_lvl+0x73/0xb0 [ 11.336415] print_report+0xd1/0x610 [ 11.336446] ? __virt_addr_valid+0x1db/0x2d0 [ 11.336468] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.336489] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.336511] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.336532] kasan_report+0x141/0x180 [ 11.336553] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.336579] __asan_report_load1_noabort+0x18/0x20 [ 11.336603] kmalloc_oob_right+0x68a/0x7f0 [ 11.336625] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.336646] ? __schedule+0x10cc/0x2b60 [ 11.336669] ? __pfx_read_tsc+0x10/0x10 [ 11.336688] ? ktime_get_ts64+0x86/0x230 [ 11.336712] kunit_try_run_case+0x1a5/0x480 [ 11.336735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.336756] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.336779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.336802] ? __kthread_parkme+0x82/0x180 [ 11.336821] ? preempt_count_sub+0x50/0x80 [ 11.336844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.336867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.336890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.336913] kthread+0x337/0x6f0 [ 11.336930] ? trace_preempt_on+0x20/0xc0 [ 11.336952] ? __pfx_kthread+0x10/0x10 [ 11.336972] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.336992] ? calculate_sigpending+0x7b/0xa0 [ 11.337015] ? __pfx_kthread+0x10/0x10 [ 11.337035] ret_from_fork+0x116/0x1d0 [ 11.337052] ? __pfx_kthread+0x10/0x10 [ 11.337071] ret_from_fork_asm+0x1a/0x30 [ 11.337103] </TASK> [ 11.337112] [ 11.343870] Allocated by task 154: [ 11.344048] kasan_save_stack+0x45/0x70 [ 11.344198] kasan_save_track+0x18/0x40 [ 11.344329] kasan_save_alloc_info+0x3b/0x50 [ 11.344484] __kasan_kmalloc+0xb7/0xc0 [ 11.344613] __kmalloc_cache_noprof+0x189/0x420 [ 11.344761] kmalloc_oob_right+0xa9/0x7f0 [ 11.344950] kunit_try_run_case+0x1a5/0x480 [ 11.345154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.345397] kthread+0x337/0x6f0 [ 11.345588] ret_from_fork+0x116/0x1d0 [ 11.345768] ret_from_fork_asm+0x1a/0x30 [ 11.345927] [ 11.345993] The buggy address belongs to the object at ffff888102ae1000 [ 11.345993] which belongs to the cache kmalloc-128 of size 128 [ 11.346578] The buggy address is located 13 bytes to the right of [ 11.346578] allocated 115-byte region [ffff888102ae1000, ffff888102ae1073) [ 11.347138] [ 11.347221] The buggy address belongs to the physical page: [ 11.347386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1 [ 11.347868] flags: 0x200000000000000(node=0|zone=2) [ 11.348116] page_type: f5(slab) [ 11.348279] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.348638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.348866] page dumped because: kasan: bad access detected [ 11.349030] [ 11.349122] Memory state around the buggy address: [ 11.349377] ffff888102ae0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.349911] ffff888102ae1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.350256] >ffff888102ae1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.350547] ^ [ 11.350715] ffff888102ae1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.350953] ffff888102ae1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.351157] ================================================================== [ 11.306342] ================================================================== [ 11.306932] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.307387] Write of size 1 at addr ffff888102ae1078 by task kunit_try_catch/154 [ 11.308161] [ 11.308389] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.308479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.308491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.308512] Call Trace: [ 11.308526] <TASK> [ 11.308544] dump_stack_lvl+0x73/0xb0 [ 11.308574] print_report+0xd1/0x610 [ 11.308595] ? __virt_addr_valid+0x1db/0x2d0 [ 11.308618] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.308638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.308660] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.308681] kasan_report+0x141/0x180 [ 11.308703] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.308729] __asan_report_store1_noabort+0x1b/0x30 [ 11.308753] kmalloc_oob_right+0x6bd/0x7f0 [ 11.308775] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.308796] ? __schedule+0x10cc/0x2b60 [ 11.308819] ? __pfx_read_tsc+0x10/0x10 [ 11.308839] ? ktime_get_ts64+0x86/0x230 [ 11.308864] kunit_try_run_case+0x1a5/0x480 [ 11.308888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.308909] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.308932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.308955] ? __kthread_parkme+0x82/0x180 [ 11.308974] ? preempt_count_sub+0x50/0x80 [ 11.308998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.309021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.309044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.309067] kthread+0x337/0x6f0 [ 11.309085] ? trace_preempt_on+0x20/0xc0 [ 11.309108] ? __pfx_kthread+0x10/0x10 [ 11.310302] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.310332] ? calculate_sigpending+0x7b/0xa0 [ 11.310357] ? __pfx_kthread+0x10/0x10 [ 11.310379] ret_from_fork+0x116/0x1d0 [ 11.310398] ? __pfx_kthread+0x10/0x10 [ 11.310459] ret_from_fork_asm+0x1a/0x30 [ 11.310492] </TASK> [ 11.310502] [ 11.323089] Allocated by task 154: [ 11.323802] kasan_save_stack+0x45/0x70 [ 11.324015] kasan_save_track+0x18/0x40 [ 11.324197] kasan_save_alloc_info+0x3b/0x50 [ 11.324406] __kasan_kmalloc+0xb7/0xc0 [ 11.324642] __kmalloc_cache_noprof+0x189/0x420 [ 11.324841] kmalloc_oob_right+0xa9/0x7f0 [ 11.325140] kunit_try_run_case+0x1a5/0x480 [ 11.325318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.325721] kthread+0x337/0x6f0 [ 11.325862] ret_from_fork+0x116/0x1d0 [ 11.326054] ret_from_fork_asm+0x1a/0x30 [ 11.326254] [ 11.326327] The buggy address belongs to the object at ffff888102ae1000 [ 11.326327] which belongs to the cache kmalloc-128 of size 128 [ 11.326971] The buggy address is located 5 bytes to the right of [ 11.326971] allocated 115-byte region [ffff888102ae1000, ffff888102ae1073) [ 11.327837] [ 11.327970] The buggy address belongs to the physical page: [ 11.328218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1 [ 11.328717] flags: 0x200000000000000(node=0|zone=2) [ 11.328932] page_type: f5(slab) [ 11.329103] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.329349] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.329849] page dumped because: kasan: bad access detected [ 11.330065] [ 11.330158] Memory state around the buggy address: [ 11.330366] ffff888102ae0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.331378] ffff888102ae0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.331834] >ffff888102ae1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.332261] ^ [ 11.332881] ffff888102ae1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.333310] ffff888102ae1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.333848] ================================================================== [ 11.272604] ================================================================== [ 11.273163] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.275197] Write of size 1 at addr ffff888102ae1073 by task kunit_try_catch/154 [ 11.276178] [ 11.277384] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.277928] Tainted: [N]=TEST [ 11.277961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.278180] Call Trace: [ 11.278246] <TASK> [ 11.278386] dump_stack_lvl+0x73/0xb0 [ 11.278585] print_report+0xd1/0x610 [ 11.278614] ? __virt_addr_valid+0x1db/0x2d0 [ 11.278639] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.278659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.278681] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.278703] kasan_report+0x141/0x180 [ 11.278724] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.278750] __asan_report_store1_noabort+0x1b/0x30 [ 11.278774] kmalloc_oob_right+0x6f0/0x7f0 [ 11.278795] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.278817] ? __schedule+0x10cc/0x2b60 [ 11.278840] ? __pfx_read_tsc+0x10/0x10 [ 11.278861] ? ktime_get_ts64+0x86/0x230 [ 11.278887] kunit_try_run_case+0x1a5/0x480 [ 11.278913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.278934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.278958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.278980] ? __kthread_parkme+0x82/0x180 [ 11.279001] ? preempt_count_sub+0x50/0x80 [ 11.279025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.279048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.279071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.279094] kthread+0x337/0x6f0 [ 11.279113] ? trace_preempt_on+0x20/0xc0 [ 11.279136] ? __pfx_kthread+0x10/0x10 [ 11.279155] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.279176] ? calculate_sigpending+0x7b/0xa0 [ 11.279201] ? __pfx_kthread+0x10/0x10 [ 11.279221] ret_from_fork+0x116/0x1d0 [ 11.279239] ? __pfx_kthread+0x10/0x10 [ 11.279258] ret_from_fork_asm+0x1a/0x30 [ 11.279315] </TASK> [ 11.279378] [ 11.288976] Allocated by task 154: [ 11.289613] kasan_save_stack+0x45/0x70 [ 11.289848] kasan_save_track+0x18/0x40 [ 11.290029] kasan_save_alloc_info+0x3b/0x50 [ 11.290223] __kasan_kmalloc+0xb7/0xc0 [ 11.290398] __kmalloc_cache_noprof+0x189/0x420 [ 11.290964] kmalloc_oob_right+0xa9/0x7f0 [ 11.291284] kunit_try_run_case+0x1a5/0x480 [ 11.291694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.292091] kthread+0x337/0x6f0 [ 11.292260] ret_from_fork+0x116/0x1d0 [ 11.292643] ret_from_fork_asm+0x1a/0x30 [ 11.293146] [ 11.293331] The buggy address belongs to the object at ffff888102ae1000 [ 11.293331] which belongs to the cache kmalloc-128 of size 128 [ 11.294060] The buggy address is located 0 bytes to the right of [ 11.294060] allocated 115-byte region [ffff888102ae1000, ffff888102ae1073) [ 11.294906] [ 11.295224] The buggy address belongs to the physical page: [ 11.295626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae1 [ 11.296106] flags: 0x200000000000000(node=0|zone=2) [ 11.297329] page_type: f5(slab) [ 11.298315] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.298939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.299344] page dumped because: kasan: bad access detected [ 11.299891] [ 11.300163] Memory state around the buggy address: [ 11.300878] ffff888102ae0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.301164] ffff888102ae0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.301670] >ffff888102ae1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.302134] ^ [ 11.302883] ffff888102ae1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.303319] ffff888102ae1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.304175] ==================================================================
[ 11.396149] ================================================================== [ 11.397239] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.398089] Write of size 1 at addr ffff8881029a6373 by task kunit_try_catch/153 [ 11.398394] [ 11.399445] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.399963] Tainted: [N]=TEST [ 11.399998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.400229] Call Trace: [ 11.400298] <TASK> [ 11.400451] dump_stack_lvl+0x73/0xb0 [ 11.400542] print_report+0xd1/0x610 [ 11.400571] ? __virt_addr_valid+0x1db/0x2d0 [ 11.400596] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.400616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.400638] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.400659] kasan_report+0x141/0x180 [ 11.400681] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.400706] __asan_report_store1_noabort+0x1b/0x30 [ 11.400731] kmalloc_oob_right+0x6f0/0x7f0 [ 11.400752] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.400774] ? __schedule+0x10cc/0x2b60 [ 11.400797] ? __pfx_read_tsc+0x10/0x10 [ 11.400819] ? ktime_get_ts64+0x86/0x230 [ 11.400845] kunit_try_run_case+0x1a5/0x480 [ 11.400878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.400900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.400924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.400947] ? __kthread_parkme+0x82/0x180 [ 11.400968] ? preempt_count_sub+0x50/0x80 [ 11.400992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.401027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.401050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.401074] kthread+0x337/0x6f0 [ 11.401092] ? trace_preempt_on+0x20/0xc0 [ 11.401116] ? __pfx_kthread+0x10/0x10 [ 11.401135] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.401156] ? calculate_sigpending+0x7b/0xa0 [ 11.401181] ? __pfx_kthread+0x10/0x10 [ 11.401201] ret_from_fork+0x116/0x1d0 [ 11.401220] ? __pfx_kthread+0x10/0x10 [ 11.401239] ret_from_fork_asm+0x1a/0x30 [ 11.401293] </TASK> [ 11.401356] [ 11.410427] Allocated by task 153: [ 11.410765] kasan_save_stack+0x45/0x70 [ 11.411031] kasan_save_track+0x18/0x40 [ 11.411251] kasan_save_alloc_info+0x3b/0x50 [ 11.411409] __kasan_kmalloc+0xb7/0xc0 [ 11.411629] __kmalloc_cache_noprof+0x189/0x420 [ 11.411859] kmalloc_oob_right+0xa9/0x7f0 [ 11.412046] kunit_try_run_case+0x1a5/0x480 [ 11.412253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.412547] kthread+0x337/0x6f0 [ 11.412719] ret_from_fork+0x116/0x1d0 [ 11.412885] ret_from_fork_asm+0x1a/0x30 [ 11.413073] [ 11.413209] The buggy address belongs to the object at ffff8881029a6300 [ 11.413209] which belongs to the cache kmalloc-128 of size 128 [ 11.413894] The buggy address is located 0 bytes to the right of [ 11.413894] allocated 115-byte region [ffff8881029a6300, ffff8881029a6373) [ 11.414481] [ 11.414657] The buggy address belongs to the physical page: [ 11.415087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 11.415714] flags: 0x200000000000000(node=0|zone=2) [ 11.416357] page_type: f5(slab) [ 11.416963] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.417236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.417821] page dumped because: kasan: bad access detected [ 11.418058] [ 11.418180] Memory state around the buggy address: [ 11.418581] ffff8881029a6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.419051] ffff8881029a6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.419392] >ffff8881029a6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.419747] ^ [ 11.420101] ffff8881029a6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.420404] ffff8881029a6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.420734] ================================================================== [ 11.421977] ================================================================== [ 11.422481] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.422816] Write of size 1 at addr ffff8881029a6378 by task kunit_try_catch/153 [ 11.423119] [ 11.423279] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.423324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.423335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.423359] Call Trace: [ 11.423378] <TASK> [ 11.423397] dump_stack_lvl+0x73/0xb0 [ 11.423427] print_report+0xd1/0x610 [ 11.423449] ? __virt_addr_valid+0x1db/0x2d0 [ 11.423472] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.423493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.423516] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.423537] kasan_report+0x141/0x180 [ 11.423558] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.423584] __asan_report_store1_noabort+0x1b/0x30 [ 11.423608] kmalloc_oob_right+0x6bd/0x7f0 [ 11.423630] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.423651] ? __schedule+0x10cc/0x2b60 [ 11.423695] ? __pfx_read_tsc+0x10/0x10 [ 11.423716] ? ktime_get_ts64+0x86/0x230 [ 11.423740] kunit_try_run_case+0x1a5/0x480 [ 11.423775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.423797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.423820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.423843] ? __kthread_parkme+0x82/0x180 [ 11.423863] ? preempt_count_sub+0x50/0x80 [ 11.423886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.423909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.423932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.423955] kthread+0x337/0x6f0 [ 11.423973] ? trace_preempt_on+0x20/0xc0 [ 11.423996] ? __pfx_kthread+0x10/0x10 [ 11.424023] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.424044] ? calculate_sigpending+0x7b/0xa0 [ 11.424067] ? __pfx_kthread+0x10/0x10 [ 11.424087] ret_from_fork+0x116/0x1d0 [ 11.424105] ? __pfx_kthread+0x10/0x10 [ 11.424124] ret_from_fork_asm+0x1a/0x30 [ 11.424163] </TASK> [ 11.424173] [ 11.431071] Allocated by task 153: [ 11.431210] kasan_save_stack+0x45/0x70 [ 11.431419] kasan_save_track+0x18/0x40 [ 11.431620] kasan_save_alloc_info+0x3b/0x50 [ 11.431859] __kasan_kmalloc+0xb7/0xc0 [ 11.432051] __kmalloc_cache_noprof+0x189/0x420 [ 11.432266] kmalloc_oob_right+0xa9/0x7f0 [ 11.432466] kunit_try_run_case+0x1a5/0x480 [ 11.432657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.432908] kthread+0x337/0x6f0 [ 11.433083] ret_from_fork+0x116/0x1d0 [ 11.433274] ret_from_fork_asm+0x1a/0x30 [ 11.433489] [ 11.433589] The buggy address belongs to the object at ffff8881029a6300 [ 11.433589] which belongs to the cache kmalloc-128 of size 128 [ 11.434096] The buggy address is located 5 bytes to the right of [ 11.434096] allocated 115-byte region [ffff8881029a6300, ffff8881029a6373) [ 11.434619] [ 11.434725] The buggy address belongs to the physical page: [ 11.434953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 11.435293] flags: 0x200000000000000(node=0|zone=2) [ 11.435591] page_type: f5(slab) [ 11.435735] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.435970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.436208] page dumped because: kasan: bad access detected [ 11.436378] [ 11.436446] Memory state around the buggy address: [ 11.436636] ffff8881029a6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.437021] ffff8881029a6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.437353] >ffff8881029a6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.437657] ^ [ 11.437882] ffff8881029a6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.438105] ffff8881029a6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.438318] ================================================================== [ 11.438924] ================================================================== [ 11.439515] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.439939] Read of size 1 at addr ffff8881029a6380 by task kunit_try_catch/153 [ 11.440282] [ 11.440394] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.440448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.440458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.440482] Call Trace: [ 11.440500] <TASK> [ 11.440530] dump_stack_lvl+0x73/0xb0 [ 11.440567] print_report+0xd1/0x610 [ 11.440589] ? __virt_addr_valid+0x1db/0x2d0 [ 11.440611] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.440642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.440664] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.440685] kasan_report+0x141/0x180 [ 11.440706] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.440731] __asan_report_load1_noabort+0x18/0x20 [ 11.440754] kmalloc_oob_right+0x68a/0x7f0 [ 11.440776] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.440797] ? __schedule+0x10cc/0x2b60 [ 11.440819] ? __pfx_read_tsc+0x10/0x10 [ 11.440839] ? ktime_get_ts64+0x86/0x230 [ 11.440867] kunit_try_run_case+0x1a5/0x480 [ 11.440891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.440912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.440935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.440958] ? __kthread_parkme+0x82/0x180 [ 11.440978] ? preempt_count_sub+0x50/0x80 [ 11.441002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.441033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.441056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.441079] kthread+0x337/0x6f0 [ 11.441097] ? trace_preempt_on+0x20/0xc0 [ 11.441119] ? __pfx_kthread+0x10/0x10 [ 11.441138] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.441159] ? calculate_sigpending+0x7b/0xa0 [ 11.441182] ? __pfx_kthread+0x10/0x10 [ 11.441202] ret_from_fork+0x116/0x1d0 [ 11.441220] ? __pfx_kthread+0x10/0x10 [ 11.441239] ret_from_fork_asm+0x1a/0x30 [ 11.441269] </TASK> [ 11.441278] [ 11.448183] Allocated by task 153: [ 11.448311] kasan_save_stack+0x45/0x70 [ 11.448507] kasan_save_track+0x18/0x40 [ 11.448696] kasan_save_alloc_info+0x3b/0x50 [ 11.448929] __kasan_kmalloc+0xb7/0xc0 [ 11.449119] __kmalloc_cache_noprof+0x189/0x420 [ 11.449336] kmalloc_oob_right+0xa9/0x7f0 [ 11.449556] kunit_try_run_case+0x1a5/0x480 [ 11.449758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.449976] kthread+0x337/0x6f0 [ 11.450167] ret_from_fork+0x116/0x1d0 [ 11.450316] ret_from_fork_asm+0x1a/0x30 [ 11.450570] [ 11.450667] The buggy address belongs to the object at ffff8881029a6300 [ 11.450667] which belongs to the cache kmalloc-128 of size 128 [ 11.451132] The buggy address is located 13 bytes to the right of [ 11.451132] allocated 115-byte region [ffff8881029a6300, ffff8881029a6373) [ 11.451715] [ 11.451830] The buggy address belongs to the physical page: [ 11.452072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 11.452403] flags: 0x200000000000000(node=0|zone=2) [ 11.452585] page_type: f5(slab) [ 11.452778] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.453055] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.453281] page dumped because: kasan: bad access detected [ 11.453450] [ 11.453518] Memory state around the buggy address: [ 11.453671] ffff8881029a6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.453885] ffff8881029a6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.454108] >ffff8881029a6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.454319] ^ [ 11.454433] ffff8881029a6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.454726] ffff8881029a6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.455379] ==================================================================
[ 11.441672] ================================================================== [ 11.442689] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 11.443803] Write of size 1 at addr ffff888102988573 by task kunit_try_catch/153 [ 11.444640] [ 11.445795] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.446176] Tainted: [N]=TEST [ 11.446208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.446424] Call Trace: [ 11.446489] <TASK> [ 11.446653] dump_stack_lvl+0x73/0xb0 [ 11.446744] print_report+0xd1/0x610 [ 11.446781] ? __virt_addr_valid+0x1db/0x2d0 [ 11.446806] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.446827] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.446849] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.446871] kasan_report+0x141/0x180 [ 11.446903] ? kmalloc_oob_right+0x6f0/0x7f0 [ 11.446930] __asan_report_store1_noabort+0x1b/0x30 [ 11.446954] kmalloc_oob_right+0x6f0/0x7f0 [ 11.446995] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.447018] ? __schedule+0x10cc/0x2b60 [ 11.447041] ? __pfx_read_tsc+0x10/0x10 [ 11.447062] ? ktime_get_ts64+0x86/0x230 [ 11.447088] kunit_try_run_case+0x1a5/0x480 [ 11.447115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.447136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.447161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.447184] ? __kthread_parkme+0x82/0x180 [ 11.447205] ? preempt_count_sub+0x50/0x80 [ 11.447231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.447255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.447280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.447306] kthread+0x337/0x6f0 [ 11.447325] ? trace_preempt_on+0x20/0xc0 [ 11.447349] ? __pfx_kthread+0x10/0x10 [ 11.447368] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.447390] ? calculate_sigpending+0x7b/0xa0 [ 11.447415] ? __pfx_kthread+0x10/0x10 [ 11.447436] ret_from_fork+0x116/0x1d0 [ 11.447456] ? __pfx_kthread+0x10/0x10 [ 11.447476] ret_from_fork_asm+0x1a/0x30 [ 11.447555] </TASK> [ 11.447623] [ 11.456284] Allocated by task 153: [ 11.456543] kasan_save_stack+0x45/0x70 [ 11.456820] kasan_save_track+0x18/0x40 [ 11.457062] kasan_save_alloc_info+0x3b/0x50 [ 11.457275] __kasan_kmalloc+0xb7/0xc0 [ 11.457460] __kmalloc_cache_noprof+0x189/0x420 [ 11.457743] kmalloc_oob_right+0xa9/0x7f0 [ 11.457964] kunit_try_run_case+0x1a5/0x480 [ 11.458184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.458510] kthread+0x337/0x6f0 [ 11.458749] ret_from_fork+0x116/0x1d0 [ 11.458951] ret_from_fork_asm+0x1a/0x30 [ 11.459204] [ 11.459350] The buggy address belongs to the object at ffff888102988500 [ 11.459350] which belongs to the cache kmalloc-128 of size 128 [ 11.460293] The buggy address is located 0 bytes to the right of [ 11.460293] allocated 115-byte region [ffff888102988500, ffff888102988573) [ 11.460823] [ 11.461570] The buggy address belongs to the physical page: [ 11.462611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988 [ 11.463358] flags: 0x200000000000000(node=0|zone=2) [ 11.464187] page_type: f5(slab) [ 11.464681] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.465064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.465457] page dumped because: kasan: bad access detected [ 11.465688] [ 11.465829] Memory state around the buggy address: [ 11.466363] ffff888102988400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.466709] ffff888102988480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.467020] >ffff888102988500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.467307] ^ [ 11.467644] ffff888102988580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.467990] ffff888102988600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.468286] ================================================================== [ 11.489330] ================================================================== [ 11.490003] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 11.490664] Read of size 1 at addr ffff888102988580 by task kunit_try_catch/153 [ 11.491342] [ 11.491513] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.491554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.491564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.491585] Call Trace: [ 11.491598] <TASK> [ 11.491614] dump_stack_lvl+0x73/0xb0 [ 11.491641] print_report+0xd1/0x610 [ 11.491662] ? __virt_addr_valid+0x1db/0x2d0 [ 11.491685] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.491706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.491728] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.491750] kasan_report+0x141/0x180 [ 11.491771] ? kmalloc_oob_right+0x68a/0x7f0 [ 11.491799] __asan_report_load1_noabort+0x18/0x20 [ 11.491822] kmalloc_oob_right+0x68a/0x7f0 [ 11.491844] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.491866] ? __schedule+0x10cc/0x2b60 [ 11.491889] ? __pfx_read_tsc+0x10/0x10 [ 11.491922] ? ktime_get_ts64+0x86/0x230 [ 11.491948] kunit_try_run_case+0x1a5/0x480 [ 11.491971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.491992] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.492016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.492039] ? __kthread_parkme+0x82/0x180 [ 11.492059] ? preempt_count_sub+0x50/0x80 [ 11.492083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.492106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.492129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.492153] kthread+0x337/0x6f0 [ 11.492171] ? trace_preempt_on+0x20/0xc0 [ 11.492194] ? __pfx_kthread+0x10/0x10 [ 11.492213] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.492234] ? calculate_sigpending+0x7b/0xa0 [ 11.492258] ? __pfx_kthread+0x10/0x10 [ 11.492279] ret_from_fork+0x116/0x1d0 [ 11.492296] ? __pfx_kthread+0x10/0x10 [ 11.492316] ret_from_fork_asm+0x1a/0x30 [ 11.492347] </TASK> [ 11.492357] [ 11.509719] Allocated by task 153: [ 11.510170] kasan_save_stack+0x45/0x70 [ 11.510333] kasan_save_track+0x18/0x40 [ 11.510919] kasan_save_alloc_info+0x3b/0x50 [ 11.511488] __kasan_kmalloc+0xb7/0xc0 [ 11.512002] __kmalloc_cache_noprof+0x189/0x420 [ 11.512439] kmalloc_oob_right+0xa9/0x7f0 [ 11.512931] kunit_try_run_case+0x1a5/0x480 [ 11.513289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.514007] kthread+0x337/0x6f0 [ 11.514167] ret_from_fork+0x116/0x1d0 [ 11.514755] ret_from_fork_asm+0x1a/0x30 [ 11.515204] [ 11.515290] The buggy address belongs to the object at ffff888102988500 [ 11.515290] which belongs to the cache kmalloc-128 of size 128 [ 11.516199] The buggy address is located 13 bytes to the right of [ 11.516199] allocated 115-byte region [ffff888102988500, ffff888102988573) [ 11.517382] [ 11.517462] The buggy address belongs to the physical page: [ 11.517996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988 [ 11.518446] flags: 0x200000000000000(node=0|zone=2) [ 11.518963] page_type: f5(slab) [ 11.519403] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.520273] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.520875] page dumped because: kasan: bad access detected [ 11.521377] [ 11.521559] Memory state around the buggy address: [ 11.522173] ffff888102988480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.522802] ffff888102988500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.523518] >ffff888102988580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.523796] ^ [ 11.524343] ffff888102988600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.525180] ffff888102988680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.525994] ================================================================== [ 11.469432] ================================================================== [ 11.469791] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 11.470110] Write of size 1 at addr ffff888102988578 by task kunit_try_catch/153 [ 11.470456] [ 11.470587] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.470632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.470644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.470664] Call Trace: [ 11.470675] <TASK> [ 11.470691] dump_stack_lvl+0x73/0xb0 [ 11.470719] print_report+0xd1/0x610 [ 11.470741] ? __virt_addr_valid+0x1db/0x2d0 [ 11.470768] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.470789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.470811] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.470832] kasan_report+0x141/0x180 [ 11.470854] ? kmalloc_oob_right+0x6bd/0x7f0 [ 11.470881] __asan_report_store1_noabort+0x1b/0x30 [ 11.470916] kmalloc_oob_right+0x6bd/0x7f0 [ 11.470938] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 11.470961] ? __schedule+0x10cc/0x2b60 [ 11.470983] ? __pfx_read_tsc+0x10/0x10 [ 11.471003] ? ktime_get_ts64+0x86/0x230 [ 11.471029] kunit_try_run_case+0x1a5/0x480 [ 11.471053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.471075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.471099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.471122] ? __kthread_parkme+0x82/0x180 [ 11.471142] ? preempt_count_sub+0x50/0x80 [ 11.471167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.471190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.471213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.471236] kthread+0x337/0x6f0 [ 11.471255] ? trace_preempt_on+0x20/0xc0 [ 11.471279] ? __pfx_kthread+0x10/0x10 [ 11.471298] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.471319] ? calculate_sigpending+0x7b/0xa0 [ 11.471343] ? __pfx_kthread+0x10/0x10 [ 11.471363] ret_from_fork+0x116/0x1d0 [ 11.471381] ? __pfx_kthread+0x10/0x10 [ 11.471401] ret_from_fork_asm+0x1a/0x30 [ 11.471432] </TASK> [ 11.471442] [ 11.477922] Allocated by task 153: [ 11.478128] kasan_save_stack+0x45/0x70 [ 11.478343] kasan_save_track+0x18/0x40 [ 11.478685] kasan_save_alloc_info+0x3b/0x50 [ 11.479131] __kasan_kmalloc+0xb7/0xc0 [ 11.479267] __kmalloc_cache_noprof+0x189/0x420 [ 11.479422] kmalloc_oob_right+0xa9/0x7f0 [ 11.479851] kunit_try_run_case+0x1a5/0x480 [ 11.480279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.481007] kthread+0x337/0x6f0 [ 11.481343] ret_from_fork+0x116/0x1d0 [ 11.481726] ret_from_fork_asm+0x1a/0x30 [ 11.481877] [ 11.481957] The buggy address belongs to the object at ffff888102988500 [ 11.481957] which belongs to the cache kmalloc-128 of size 128 [ 11.482314] The buggy address is located 5 bytes to the right of [ 11.482314] allocated 115-byte region [ffff888102988500, ffff888102988573) [ 11.482681] [ 11.482751] The buggy address belongs to the physical page: [ 11.482942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988 [ 11.483183] flags: 0x200000000000000(node=0|zone=2) [ 11.483345] page_type: f5(slab) [ 11.483464] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.483695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.484159] page dumped because: kasan: bad access detected [ 11.484612] [ 11.484765] Memory state around the buggy address: [ 11.485099] ffff888102988400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.485317] ffff888102988480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.485532] >ffff888102988500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.485929] ^ [ 11.486796] ffff888102988580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.487451] ffff888102988600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.488279] ==================================================================