Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.606276] ================================================================== [ 16.606358] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.606433] Write of size 1 at addr fff00000c595ee78 by task kunit_try_catch/142 [ 16.606488] [ 16.606541] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.606645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.606674] Hardware name: linux,dummy-virt (DT) [ 16.606705] Call trace: [ 16.606728] show_stack+0x20/0x38 (C) [ 16.606804] dump_stack_lvl+0x8c/0xd0 [ 16.606867] print_report+0x118/0x5d0 [ 16.606915] kasan_report+0xdc/0x128 [ 16.606960] __asan_report_store1_noabort+0x20/0x30 [ 16.607047] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.607382] kunit_try_run_case+0x170/0x3f0 [ 16.607495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.607589] kthread+0x328/0x630 [ 16.607642] ret_from_fork+0x10/0x20 [ 16.607690] [ 16.607709] Allocated by task 142: [ 16.607737] kasan_save_stack+0x3c/0x68 [ 16.607779] kasan_save_track+0x20/0x40 [ 16.607815] kasan_save_alloc_info+0x40/0x58 [ 16.607865] __kasan_kmalloc+0xd4/0xd8 [ 16.607900] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.607943] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.607982] kunit_try_run_case+0x170/0x3f0 [ 16.608018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.608058] kthread+0x328/0x630 [ 16.608239] ret_from_fork+0x10/0x20 [ 16.608328] [ 16.608386] The buggy address belongs to the object at fff00000c595ee00 [ 16.608386] which belongs to the cache kmalloc-128 of size 128 [ 16.608453] The buggy address is located 0 bytes to the right of [ 16.608453] allocated 120-byte region [fff00000c595ee00, fff00000c595ee78) [ 16.608554] [ 16.608622] The buggy address belongs to the physical page: [ 16.608654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 16.608752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.608829] page_type: f5(slab) [ 16.608881] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.608945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.608984] page dumped because: kasan: bad access detected [ 16.609013] [ 16.609030] Memory state around the buggy address: [ 16.609061] fff00000c595ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.609101] fff00000c595ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.609142] >fff00000c595ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.609177] ^ [ 16.609215] fff00000c595ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.609417] fff00000c595ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.609512] ================================================================== [ 16.601124] ================================================================== [ 16.601214] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.601298] Write of size 1 at addr fff00000c595ed78 by task kunit_try_catch/142 [ 16.601349] [ 16.601389] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.601623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.601655] Hardware name: linux,dummy-virt (DT) [ 16.601687] Call trace: [ 16.601710] show_stack+0x20/0x38 (C) [ 16.601764] dump_stack_lvl+0x8c/0xd0 [ 16.602056] print_report+0x118/0x5d0 [ 16.602121] kasan_report+0xdc/0x128 [ 16.602334] __asan_report_store1_noabort+0x20/0x30 [ 16.602392] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.602445] kunit_try_run_case+0x170/0x3f0 [ 16.602632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.602739] kthread+0x328/0x630 [ 16.602893] ret_from_fork+0x10/0x20 [ 16.602971] [ 16.602990] Allocated by task 142: [ 16.603019] kasan_save_stack+0x3c/0x68 [ 16.603062] kasan_save_track+0x20/0x40 [ 16.603099] kasan_save_alloc_info+0x40/0x58 [ 16.603137] __kasan_kmalloc+0xd4/0xd8 [ 16.603374] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.603468] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.603520] kunit_try_run_case+0x170/0x3f0 [ 16.603569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.603678] kthread+0x328/0x630 [ 16.603853] ret_from_fork+0x10/0x20 [ 16.603919] [ 16.603998] The buggy address belongs to the object at fff00000c595ed00 [ 16.603998] which belongs to the cache kmalloc-128 of size 128 [ 16.604058] The buggy address is located 0 bytes to the right of [ 16.604058] allocated 120-byte region [fff00000c595ed00, fff00000c595ed78) [ 16.604165] [ 16.604187] The buggy address belongs to the physical page: [ 16.604272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e [ 16.604328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.604380] page_type: f5(slab) [ 16.604423] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.604472] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.604511] page dumped because: kasan: bad access detected [ 16.604541] [ 16.604558] Memory state around the buggy address: [ 16.604815] fff00000c595ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.604933] fff00000c595ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605007] >fff00000c595ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.605044] ^ [ 16.605090] fff00000c595ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605158] fff00000c595ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.605200] ==================================================================
[ 16.296443] ================================================================== [ 16.296539] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.296592] Write of size 1 at addr fff00000c5b7d778 by task kunit_try_catch/142 [ 16.296947] [ 16.296988] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.297079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.297105] Hardware name: linux,dummy-virt (DT) [ 16.297135] Call trace: [ 16.297157] show_stack+0x20/0x38 (C) [ 16.297206] dump_stack_lvl+0x8c/0xd0 [ 16.297274] print_report+0x118/0x5d0 [ 16.297334] kasan_report+0xdc/0x128 [ 16.297381] __asan_report_store1_noabort+0x20/0x30 [ 16.297432] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.297499] kunit_try_run_case+0x170/0x3f0 [ 16.297549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.297620] kthread+0x328/0x630 [ 16.297834] ret_from_fork+0x10/0x20 [ 16.297974] [ 16.298042] Allocated by task 142: [ 16.298075] kasan_save_stack+0x3c/0x68 [ 16.298141] kasan_save_track+0x20/0x40 [ 16.298178] kasan_save_alloc_info+0x40/0x58 [ 16.298261] __kasan_kmalloc+0xd4/0xd8 [ 16.298463] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.298518] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.298558] kunit_try_run_case+0x170/0x3f0 [ 16.298625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.298667] kthread+0x328/0x630 [ 16.298698] ret_from_fork+0x10/0x20 [ 16.298777] [ 16.298882] The buggy address belongs to the object at fff00000c5b7d700 [ 16.298882] which belongs to the cache kmalloc-128 of size 128 [ 16.299089] The buggy address is located 0 bytes to the right of [ 16.299089] allocated 120-byte region [fff00000c5b7d700, fff00000c5b7d778) [ 16.299205] [ 16.299224] The buggy address belongs to the physical page: [ 16.299254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.299801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.299955] page_type: f5(slab) [ 16.300169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.300219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.300313] page dumped because: kasan: bad access detected [ 16.300354] [ 16.300371] Memory state around the buggy address: [ 16.300401] fff00000c5b7d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.300625] fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300735] >fff00000c5b7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.300794] ^ [ 16.300896] fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.300963] fff00000c5b7d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.301008] ================================================================== [ 16.290929] ================================================================== [ 16.290988] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.291275] Write of size 1 at addr fff00000c5b7d678 by task kunit_try_catch/142 [ 16.291515] [ 16.291785] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.292072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.292126] Hardware name: linux,dummy-virt (DT) [ 16.292196] Call trace: [ 16.292227] show_stack+0x20/0x38 (C) [ 16.292376] dump_stack_lvl+0x8c/0xd0 [ 16.292477] print_report+0x118/0x5d0 [ 16.292545] kasan_report+0xdc/0x128 [ 16.292591] __asan_report_store1_noabort+0x20/0x30 [ 16.292642] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.292691] kunit_try_run_case+0x170/0x3f0 [ 16.292738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.292790] kthread+0x328/0x630 [ 16.292831] ret_from_fork+0x10/0x20 [ 16.292879] [ 16.292897] Allocated by task 142: [ 16.292924] kasan_save_stack+0x3c/0x68 [ 16.292973] kasan_save_track+0x20/0x40 [ 16.293010] kasan_save_alloc_info+0x40/0x58 [ 16.293048] __kasan_kmalloc+0xd4/0xd8 [ 16.293083] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.293125] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.293233] kunit_try_run_case+0x170/0x3f0 [ 16.293483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.293664] kthread+0x328/0x630 [ 16.293803] ret_from_fork+0x10/0x20 [ 16.293965] [ 16.293985] The buggy address belongs to the object at fff00000c5b7d600 [ 16.293985] which belongs to the cache kmalloc-128 of size 128 [ 16.294306] The buggy address is located 0 bytes to the right of [ 16.294306] allocated 120-byte region [fff00000c5b7d600, fff00000c5b7d678) [ 16.294416] [ 16.294436] The buggy address belongs to the physical page: [ 16.294547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d [ 16.294705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.294759] page_type: f5(slab) [ 16.294800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.294849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.294888] page dumped because: kasan: bad access detected [ 16.294929] [ 16.294946] Memory state around the buggy address: [ 16.294977] fff00000c5b7d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.295070] fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295389] >fff00000c5b7d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.295481] ^ [ 16.295574] fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295621] fff00000c5b7d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.295657] ==================================================================
[ 16.316606] ================================================================== [ 16.316659] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 16.316710] Write of size 1 at addr fff00000c576ce78 by task kunit_try_catch/142 [ 16.316772] [ 16.317396] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.317495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.317593] Hardware name: linux,dummy-virt (DT) [ 16.317653] Call trace: [ 16.317677] show_stack+0x20/0x38 (C) [ 16.317741] dump_stack_lvl+0x8c/0xd0 [ 16.317790] print_report+0x118/0x5d0 [ 16.317836] kasan_report+0xdc/0x128 [ 16.317880] __asan_report_store1_noabort+0x20/0x30 [ 16.317941] kmalloc_track_caller_oob_right+0x418/0x488 [ 16.317999] kunit_try_run_case+0x170/0x3f0 [ 16.318046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.318097] kthread+0x328/0x630 [ 16.318138] ret_from_fork+0x10/0x20 [ 16.318184] [ 16.318203] Allocated by task 142: [ 16.318230] kasan_save_stack+0x3c/0x68 [ 16.318285] kasan_save_track+0x20/0x40 [ 16.318322] kasan_save_alloc_info+0x40/0x58 [ 16.318360] __kasan_kmalloc+0xd4/0xd8 [ 16.318395] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.318446] kmalloc_track_caller_oob_right+0x184/0x488 [ 16.318502] kunit_try_run_case+0x170/0x3f0 [ 16.318538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.318587] kthread+0x328/0x630 [ 16.318626] ret_from_fork+0x10/0x20 [ 16.318660] [ 16.318678] The buggy address belongs to the object at fff00000c576ce00 [ 16.318678] which belongs to the cache kmalloc-128 of size 128 [ 16.319252] The buggy address is located 0 bytes to the right of [ 16.319252] allocated 120-byte region [fff00000c576ce00, fff00000c576ce78) [ 16.319589] [ 16.319986] The buggy address belongs to the physical page: [ 16.320041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c [ 16.320112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.320409] page_type: f5(slab) [ 16.320793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.320964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.321087] page dumped because: kasan: bad access detected [ 16.321192] [ 16.321327] Memory state around the buggy address: [ 16.321427] fff00000c576cd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.321520] fff00000c576cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.321570] >fff00000c576ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.321833] ^ [ 16.322040] fff00000c576ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322154] fff00000c576cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322254] ================================================================== [ 16.306634] ================================================================== [ 16.307039] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.307275] Write of size 1 at addr fff00000c576cd78 by task kunit_try_catch/142 [ 16.307477] [ 16.307626] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.308006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.308100] Hardware name: linux,dummy-virt (DT) [ 16.308175] Call trace: [ 16.308200] show_stack+0x20/0x38 (C) [ 16.308283] dump_stack_lvl+0x8c/0xd0 [ 16.308484] print_report+0x118/0x5d0 [ 16.308819] kasan_report+0xdc/0x128 [ 16.309077] __asan_report_store1_noabort+0x20/0x30 [ 16.309147] kmalloc_track_caller_oob_right+0x40c/0x488 [ 16.309198] kunit_try_run_case+0x170/0x3f0 [ 16.309299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.309368] kthread+0x328/0x630 [ 16.309421] ret_from_fork+0x10/0x20 [ 16.309476] [ 16.309494] Allocated by task 142: [ 16.309531] kasan_save_stack+0x3c/0x68 [ 16.309578] kasan_save_track+0x20/0x40 [ 16.309615] kasan_save_alloc_info+0x40/0x58 [ 16.309659] __kasan_kmalloc+0xd4/0xd8 [ 16.309695] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 16.310310] kmalloc_track_caller_oob_right+0xa8/0x488 [ 16.310693] kunit_try_run_case+0x170/0x3f0 [ 16.311021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.311077] kthread+0x328/0x630 [ 16.311506] ret_from_fork+0x10/0x20 [ 16.311588] [ 16.311908] The buggy address belongs to the object at fff00000c576cd00 [ 16.311908] which belongs to the cache kmalloc-128 of size 128 [ 16.312275] The buggy address is located 0 bytes to the right of [ 16.312275] allocated 120-byte region [fff00000c576cd00, fff00000c576cd78) [ 16.312754] [ 16.312814] The buggy address belongs to the physical page: [ 16.313012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10576c [ 16.313083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.313317] page_type: f5(slab) [ 16.313679] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.313836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.313895] page dumped because: kasan: bad access detected [ 16.313926] [ 16.313978] Memory state around the buggy address: [ 16.314214] fff00000c576cc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.314400] fff00000c576cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314626] >fff00000c576cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.314693] ^ [ 16.314910] fff00000c576cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314980] fff00000c576ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.315018] ==================================================================
[ 11.439591] ================================================================== [ 11.439902] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.440246] Write of size 1 at addr ffff8881026ce778 by task kunit_try_catch/160 [ 11.440742] [ 11.440838] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.440880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.440890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.440910] Call Trace: [ 11.440921] <TASK> [ 11.440934] dump_stack_lvl+0x73/0xb0 [ 11.440962] print_report+0xd1/0x610 [ 11.440985] ? __virt_addr_valid+0x1db/0x2d0 [ 11.441006] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.441032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.441054] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.441080] kasan_report+0x141/0x180 [ 11.441102] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.441137] __asan_report_store1_noabort+0x1b/0x30 [ 11.441162] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.441187] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.441213] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.441237] ? trace_hardirqs_on+0x37/0xe0 [ 11.441260] ? __pfx_read_tsc+0x10/0x10 [ 11.441280] ? ktime_get_ts64+0x86/0x230 [ 11.441304] kunit_try_run_case+0x1a5/0x480 [ 11.441327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.441351] ? queued_spin_lock_slowpath+0x116/0xb40 [ 11.441376] ? __kthread_parkme+0x82/0x180 [ 11.441395] ? preempt_count_sub+0x50/0x80 [ 11.441672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.441697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.441722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.441745] kthread+0x337/0x6f0 [ 11.441765] ? trace_preempt_on+0x20/0xc0 [ 11.441787] ? __pfx_kthread+0x10/0x10 [ 11.441807] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.441829] ? calculate_sigpending+0x7b/0xa0 [ 11.441854] ? __pfx_kthread+0x10/0x10 [ 11.441875] ret_from_fork+0x116/0x1d0 [ 11.441893] ? __pfx_kthread+0x10/0x10 [ 11.441913] ret_from_fork_asm+0x1a/0x30 [ 11.441945] </TASK> [ 11.441955] [ 11.449297] Allocated by task 160: [ 11.449660] kasan_save_stack+0x45/0x70 [ 11.449814] kasan_save_track+0x18/0x40 [ 11.450011] kasan_save_alloc_info+0x3b/0x50 [ 11.450201] __kasan_kmalloc+0xb7/0xc0 [ 11.450380] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.450577] kmalloc_track_caller_oob_right+0x19a/0x520 [ 11.450753] kunit_try_run_case+0x1a5/0x480 [ 11.450898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.451074] kthread+0x337/0x6f0 [ 11.451194] ret_from_fork+0x116/0x1d0 [ 11.451327] ret_from_fork_asm+0x1a/0x30 [ 11.451662] [ 11.451761] The buggy address belongs to the object at ffff8881026ce700 [ 11.451761] which belongs to the cache kmalloc-128 of size 128 [ 11.452289] The buggy address is located 0 bytes to the right of [ 11.452289] allocated 120-byte region [ffff8881026ce700, ffff8881026ce778) [ 11.453231] [ 11.453307] The buggy address belongs to the physical page: [ 11.453671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 11.454014] flags: 0x200000000000000(node=0|zone=2) [ 11.454228] page_type: f5(slab) [ 11.454404] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.454921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.455167] page dumped because: kasan: bad access detected [ 11.455340] [ 11.455409] Memory state around the buggy address: [ 11.455734] ffff8881026ce600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.456052] ffff8881026ce680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.456582] >ffff8881026ce700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.456898] ^ [ 11.457218] ffff8881026ce780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.457557] ffff8881026ce800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.457866] ================================================================== [ 11.419847] ================================================================== [ 11.420305] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.420707] Write of size 1 at addr ffff8881026ce678 by task kunit_try_catch/160 [ 11.421186] [ 11.421303] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.421345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.421357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.421377] Call Trace: [ 11.421388] <TASK> [ 11.421402] dump_stack_lvl+0x73/0xb0 [ 11.421431] print_report+0xd1/0x610 [ 11.421479] ? __virt_addr_valid+0x1db/0x2d0 [ 11.421502] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.421527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.421549] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.421575] kasan_report+0x141/0x180 [ 11.421656] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.421692] __asan_report_store1_noabort+0x1b/0x30 [ 11.421717] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.421742] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.421768] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.421793] ? trace_hardirqs_on+0x37/0xe0 [ 11.421816] ? __pfx_read_tsc+0x10/0x10 [ 11.421837] ? ktime_get_ts64+0x86/0x230 [ 11.421861] kunit_try_run_case+0x1a5/0x480 [ 11.421885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.421909] ? queued_spin_lock_slowpath+0x116/0xb40 [ 11.421934] ? __kthread_parkme+0x82/0x180 [ 11.421955] ? preempt_count_sub+0x50/0x80 [ 11.421979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.422003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.422026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.422050] kthread+0x337/0x6f0 [ 11.422068] ? trace_preempt_on+0x20/0xc0 [ 11.422090] ? __pfx_kthread+0x10/0x10 [ 11.422110] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.422131] ? calculate_sigpending+0x7b/0xa0 [ 11.422154] ? __pfx_kthread+0x10/0x10 [ 11.422176] ret_from_fork+0x116/0x1d0 [ 11.422194] ? __pfx_kthread+0x10/0x10 [ 11.422215] ret_from_fork_asm+0x1a/0x30 [ 11.422248] </TASK> [ 11.422257] [ 11.429806] Allocated by task 160: [ 11.429949] kasan_save_stack+0x45/0x70 [ 11.430193] kasan_save_track+0x18/0x40 [ 11.430393] kasan_save_alloc_info+0x3b/0x50 [ 11.430747] __kasan_kmalloc+0xb7/0xc0 [ 11.431011] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.431192] kmalloc_track_caller_oob_right+0x99/0x520 [ 11.431364] kunit_try_run_case+0x1a5/0x480 [ 11.431675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.431944] kthread+0x337/0x6f0 [ 11.432114] ret_from_fork+0x116/0x1d0 [ 11.432307] ret_from_fork_asm+0x1a/0x30 [ 11.432709] [ 11.432810] The buggy address belongs to the object at ffff8881026ce600 [ 11.432810] which belongs to the cache kmalloc-128 of size 128 [ 11.433359] The buggy address is located 0 bytes to the right of [ 11.433359] allocated 120-byte region [ffff8881026ce600, ffff8881026ce678) [ 11.433983] [ 11.434084] The buggy address belongs to the physical page: [ 11.434325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 11.434723] flags: 0x200000000000000(node=0|zone=2) [ 11.434897] page_type: f5(slab) [ 11.435025] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.435265] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.435593] page dumped because: kasan: bad access detected [ 11.436202] [ 11.436392] Memory state around the buggy address: [ 11.436704] ffff8881026ce500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.437010] ffff8881026ce580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.437242] >ffff8881026ce600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.437724] ^ [ 11.438051] ffff8881026ce680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.438371] ffff8881026ce700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.438976] ==================================================================
[ 11.544220] ================================================================== [ 11.544763] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.545047] Write of size 1 at addr ffff8881029a6578 by task kunit_try_catch/159 [ 11.545760] [ 11.545886] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.545929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.545940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.545961] Call Trace: [ 11.545971] <TASK> [ 11.545988] dump_stack_lvl+0x73/0xb0 [ 11.546077] print_report+0xd1/0x610 [ 11.546100] ? __virt_addr_valid+0x1db/0x2d0 [ 11.546123] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.546149] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.546172] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.546197] kasan_report+0x141/0x180 [ 11.546218] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.546247] __asan_report_store1_noabort+0x1b/0x30 [ 11.546272] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.546297] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.546324] ? __schedule+0x10cc/0x2b60 [ 11.546346] ? __pfx_read_tsc+0x10/0x10 [ 11.546366] ? ktime_get_ts64+0x86/0x230 [ 11.546390] kunit_try_run_case+0x1a5/0x480 [ 11.546414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.546452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.546476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.546498] ? __kthread_parkme+0x82/0x180 [ 11.546517] ? preempt_count_sub+0x50/0x80 [ 11.546541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.546564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.546587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.546610] kthread+0x337/0x6f0 [ 11.546628] ? trace_preempt_on+0x20/0xc0 [ 11.546650] ? __pfx_kthread+0x10/0x10 [ 11.546670] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.546690] ? calculate_sigpending+0x7b/0xa0 [ 11.546714] ? __pfx_kthread+0x10/0x10 [ 11.546735] ret_from_fork+0x116/0x1d0 [ 11.546754] ? __pfx_kthread+0x10/0x10 [ 11.546774] ret_from_fork_asm+0x1a/0x30 [ 11.546803] </TASK> [ 11.546812] [ 11.554748] Allocated by task 159: [ 11.554926] kasan_save_stack+0x45/0x70 [ 11.555335] kasan_save_track+0x18/0x40 [ 11.555483] kasan_save_alloc_info+0x3b/0x50 [ 11.555636] __kasan_kmalloc+0xb7/0xc0 [ 11.555769] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.556043] kmalloc_track_caller_oob_right+0x19a/0x520 [ 11.556285] kunit_try_run_case+0x1a5/0x480 [ 11.556492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.556957] kthread+0x337/0x6f0 [ 11.557335] ret_from_fork+0x116/0x1d0 [ 11.557567] ret_from_fork_asm+0x1a/0x30 [ 11.557716] [ 11.557788] The buggy address belongs to the object at ffff8881029a6500 [ 11.557788] which belongs to the cache kmalloc-128 of size 128 [ 11.558421] The buggy address is located 0 bytes to the right of [ 11.558421] allocated 120-byte region [ffff8881029a6500, ffff8881029a6578) [ 11.558918] [ 11.559020] The buggy address belongs to the physical page: [ 11.559238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 11.559508] flags: 0x200000000000000(node=0|zone=2) [ 11.559671] page_type: f5(slab) [ 11.559793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.560084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.560419] page dumped because: kasan: bad access detected [ 11.560964] [ 11.561052] Memory state around the buggy address: [ 11.561208] ffff8881029a6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.561423] ffff8881029a6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.561946] >ffff8881029a6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.562396] ^ [ 11.562717] ffff8881029a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.563210] ffff8881029a6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.563557] ================================================================== [ 11.522903] ================================================================== [ 11.523487] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.523903] Write of size 1 at addr ffff8881029a6478 by task kunit_try_catch/159 [ 11.524306] [ 11.524440] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.524497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.524509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.524530] Call Trace: [ 11.524543] <TASK> [ 11.524560] dump_stack_lvl+0x73/0xb0 [ 11.524591] print_report+0xd1/0x610 [ 11.524613] ? __virt_addr_valid+0x1db/0x2d0 [ 11.524636] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.524660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.524682] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.524717] kasan_report+0x141/0x180 [ 11.524738] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.524767] __asan_report_store1_noabort+0x1b/0x30 [ 11.524802] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.524826] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.524858] ? __schedule+0x10cc/0x2b60 [ 11.524881] ? __pfx_read_tsc+0x10/0x10 [ 11.524901] ? ktime_get_ts64+0x86/0x230 [ 11.524926] kunit_try_run_case+0x1a5/0x480 [ 11.524951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.524981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.525004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.525045] ? __kthread_parkme+0x82/0x180 [ 11.525065] ? preempt_count_sub+0x50/0x80 [ 11.525089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.525123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.525146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.525170] kthread+0x337/0x6f0 [ 11.525232] ? trace_preempt_on+0x20/0xc0 [ 11.525258] ? __pfx_kthread+0x10/0x10 [ 11.525291] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.525312] ? calculate_sigpending+0x7b/0xa0 [ 11.525336] ? __pfx_kthread+0x10/0x10 [ 11.525356] ret_from_fork+0x116/0x1d0 [ 11.525374] ? __pfx_kthread+0x10/0x10 [ 11.525394] ret_from_fork_asm+0x1a/0x30 [ 11.525424] </TASK> [ 11.525434] [ 11.533492] Allocated by task 159: [ 11.533635] kasan_save_stack+0x45/0x70 [ 11.533785] kasan_save_track+0x18/0x40 [ 11.533921] kasan_save_alloc_info+0x3b/0x50 [ 11.534156] __kasan_kmalloc+0xb7/0xc0 [ 11.534341] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.534628] kmalloc_track_caller_oob_right+0x99/0x520 [ 11.534798] kunit_try_run_case+0x1a5/0x480 [ 11.535114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.535367] kthread+0x337/0x6f0 [ 11.535708] ret_from_fork+0x116/0x1d0 [ 11.535911] ret_from_fork_asm+0x1a/0x30 [ 11.536215] [ 11.536325] The buggy address belongs to the object at ffff8881029a6400 [ 11.536325] which belongs to the cache kmalloc-128 of size 128 [ 11.537648] The buggy address is located 0 bytes to the right of [ 11.537648] allocated 120-byte region [ffff8881029a6400, ffff8881029a6478) [ 11.538880] [ 11.538980] The buggy address belongs to the physical page: [ 11.539172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 11.539876] flags: 0x200000000000000(node=0|zone=2) [ 11.540176] page_type: f5(slab) [ 11.540322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.540650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.540969] page dumped because: kasan: bad access detected [ 11.541247] [ 11.541349] Memory state around the buggy address: [ 11.541572] ffff8881029a6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.541790] ffff8881029a6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.542263] >ffff8881029a6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.542552] ^ [ 11.542853] ffff8881029a6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.543188] ffff8881029a6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.543533] ==================================================================
[ 11.630753] ================================================================== [ 11.631483] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.631912] Write of size 1 at addr ffff888102e24278 by task kunit_try_catch/159 [ 11.632371] [ 11.632460] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.632520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.632531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.632585] Call Trace: [ 11.632597] <TASK> [ 11.632614] dump_stack_lvl+0x73/0xb0 [ 11.632654] print_report+0xd1/0x610 [ 11.632676] ? __virt_addr_valid+0x1db/0x2d0 [ 11.632727] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.632752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.632774] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.632811] kasan_report+0x141/0x180 [ 11.632832] ? kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.632863] __asan_report_store1_noabort+0x1b/0x30 [ 11.632887] kmalloc_track_caller_oob_right+0x4b1/0x520 [ 11.632921] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.632947] ? __schedule+0x10cc/0x2b60 [ 11.632969] ? __pfx_read_tsc+0x10/0x10 [ 11.633001] ? ktime_get_ts64+0x86/0x230 [ 11.633026] kunit_try_run_case+0x1a5/0x480 [ 11.633050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.633072] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.633096] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.633119] ? __kthread_parkme+0x82/0x180 [ 11.633139] ? preempt_count_sub+0x50/0x80 [ 11.633163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.633186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.633209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.633233] kthread+0x337/0x6f0 [ 11.633251] ? trace_preempt_on+0x20/0xc0 [ 11.633275] ? __pfx_kthread+0x10/0x10 [ 11.633295] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.633316] ? calculate_sigpending+0x7b/0xa0 [ 11.633340] ? __pfx_kthread+0x10/0x10 [ 11.633361] ret_from_fork+0x116/0x1d0 [ 11.633379] ? __pfx_kthread+0x10/0x10 [ 11.633399] ret_from_fork_asm+0x1a/0x30 [ 11.633431] </TASK> [ 11.633440] [ 11.642867] Allocated by task 159: [ 11.643604] kasan_save_stack+0x45/0x70 [ 11.643803] kasan_save_track+0x18/0x40 [ 11.644146] kasan_save_alloc_info+0x3b/0x50 [ 11.644390] __kasan_kmalloc+0xb7/0xc0 [ 11.644688] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.645130] kmalloc_track_caller_oob_right+0x19a/0x520 [ 11.645497] kunit_try_run_case+0x1a5/0x480 [ 11.645695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.646172] kthread+0x337/0x6f0 [ 11.646356] ret_from_fork+0x116/0x1d0 [ 11.646511] ret_from_fork_asm+0x1a/0x30 [ 11.646723] [ 11.646823] The buggy address belongs to the object at ffff888102e24200 [ 11.646823] which belongs to the cache kmalloc-128 of size 128 [ 11.647440] The buggy address is located 0 bytes to the right of [ 11.647440] allocated 120-byte region [ffff888102e24200, ffff888102e24278) [ 11.648007] [ 11.648558] The buggy address belongs to the physical page: [ 11.648763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24 [ 11.649566] flags: 0x200000000000000(node=0|zone=2) [ 11.649747] page_type: f5(slab) [ 11.649872] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.650124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.650354] page dumped because: kasan: bad access detected [ 11.650526] [ 11.650597] Memory state around the buggy address: [ 11.650755] ffff888102e24100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.651246] ffff888102e24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.651882] >ffff888102e24200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.652539] ^ [ 11.653179] ffff888102e24280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.653788] ffff888102e24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.654417] ================================================================== [ 11.607635] ================================================================== [ 11.608736] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.609558] Write of size 1 at addr ffff888102e24178 by task kunit_try_catch/159 [ 11.610441] [ 11.610647] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.610697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.610708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.610730] Call Trace: [ 11.610741] <TASK> [ 11.610759] dump_stack_lvl+0x73/0xb0 [ 11.610799] print_report+0xd1/0x610 [ 11.610820] ? __virt_addr_valid+0x1db/0x2d0 [ 11.610843] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.610868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.610901] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.610926] kasan_report+0x141/0x180 [ 11.610948] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.610979] __asan_report_store1_noabort+0x1b/0x30 [ 11.611032] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 11.611057] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 11.611094] ? __schedule+0x10cc/0x2b60 [ 11.611117] ? __pfx_read_tsc+0x10/0x10 [ 11.611137] ? ktime_get_ts64+0x86/0x230 [ 11.611162] kunit_try_run_case+0x1a5/0x480 [ 11.611186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.611208] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.611231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.611254] ? __kthread_parkme+0x82/0x180 [ 11.611275] ? preempt_count_sub+0x50/0x80 [ 11.611299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.611323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.611346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.611369] kthread+0x337/0x6f0 [ 11.611387] ? trace_preempt_on+0x20/0xc0 [ 11.611410] ? __pfx_kthread+0x10/0x10 [ 11.611430] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.611451] ? calculate_sigpending+0x7b/0xa0 [ 11.611475] ? __pfx_kthread+0x10/0x10 [ 11.611496] ret_from_fork+0x116/0x1d0 [ 11.611515] ? __pfx_kthread+0x10/0x10 [ 11.611534] ret_from_fork_asm+0x1a/0x30 [ 11.611567] </TASK> [ 11.611577] [ 11.620564] Allocated by task 159: [ 11.620726] kasan_save_stack+0x45/0x70 [ 11.620880] kasan_save_track+0x18/0x40 [ 11.621064] kasan_save_alloc_info+0x3b/0x50 [ 11.621296] __kasan_kmalloc+0xb7/0xc0 [ 11.621487] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 11.621754] kmalloc_track_caller_oob_right+0x99/0x520 [ 11.622062] kunit_try_run_case+0x1a5/0x480 [ 11.622295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.622474] kthread+0x337/0x6f0 [ 11.622597] ret_from_fork+0x116/0x1d0 [ 11.622793] ret_from_fork_asm+0x1a/0x30 [ 11.623034] [ 11.623142] The buggy address belongs to the object at ffff888102e24100 [ 11.623142] which belongs to the cache kmalloc-128 of size 128 [ 11.623655] The buggy address is located 0 bytes to the right of [ 11.623655] allocated 120-byte region [ffff888102e24100, ffff888102e24178) [ 11.624223] [ 11.624298] The buggy address belongs to the physical page: [ 11.624503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24 [ 11.624860] flags: 0x200000000000000(node=0|zone=2) [ 11.625498] page_type: f5(slab) [ 11.626063] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.626807] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.627265] page dumped because: kasan: bad access detected [ 11.627476] [ 11.627607] Memory state around the buggy address: [ 11.627831] ffff888102e24000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.628221] ffff888102e24080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.628520] >ffff888102e24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 11.628871] ^ [ 11.629261] ffff888102e24180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.629592] ffff888102e24200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.629854] ==================================================================