Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 35.950272] ================================================================== [ 35.960126] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.967670] Read of size 1 at addr ffff000800e16001 by task kunit_try_catch/270 [ 35.974962] [ 35.976450] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 35.976503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.976519] Hardware name: WinLink E850-96 board (DT) [ 35.976540] Call trace: [ 35.976556] show_stack+0x20/0x38 (C) [ 35.976594] dump_stack_lvl+0x8c/0xd0 [ 35.976635] print_report+0x118/0x608 [ 35.976672] kasan_report+0xdc/0x128 [ 35.976706] __asan_report_load1_noabort+0x20/0x30 [ 35.976747] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.976780] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 35.976814] kunit_try_run_case+0x170/0x3f0 [ 35.976853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.976892] kthread+0x328/0x630 [ 35.976923] ret_from_fork+0x10/0x20 [ 35.976961] [ 36.045015] The buggy address belongs to the physical page: [ 36.050573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14 [ 36.058558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.066196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.073139] page_type: f8(unknown) [ 36.076538] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.084256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.091983] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.099793] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.107607] head: 0bfffe0000000002 fffffdffe0038501 00000000ffffffff 00000000ffffffff [ 36.115418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.123223] page dumped because: kasan: bad access detected [ 36.128779] [ 36.130255] Memory state around the buggy address: [ 36.135036] ffff000800e15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.142237] ffff000800e15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.149442] >ffff000800e16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.156644] ^ [ 36.159859] ffff000800e16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.167063] ffff000800e16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.174266] ================================================================== [ 35.649105] ================================================================== [ 35.649284] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.649421] Read of size 1 at addr ffff000801e28873 by task kunit_try_catch/268 [ 35.655870] [ 35.657357] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 35.657421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.657437] Hardware name: WinLink E850-96 board (DT) [ 35.657458] Call trace: [ 35.657471] show_stack+0x20/0x38 (C) [ 35.657508] dump_stack_lvl+0x8c/0xd0 [ 35.657547] print_report+0x118/0x608 [ 35.657581] kasan_report+0xdc/0x128 [ 35.657617] __asan_report_load1_noabort+0x20/0x30 [ 35.657659] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.657693] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.657724] kunit_try_run_case+0x170/0x3f0 [ 35.657764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.657800] kthread+0x328/0x630 [ 35.657831] ret_from_fork+0x10/0x20 [ 35.657867] [ 35.725402] Allocated by task 268: [ 35.728788] kasan_save_stack+0x3c/0x68 [ 35.732605] kasan_save_track+0x20/0x40 [ 35.736424] kasan_save_alloc_info+0x40/0x58 [ 35.740677] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.745974] remove_element+0x130/0x1f8 [ 35.749792] mempool_alloc_preallocated+0x58/0xc0 [ 35.754479] mempool_oob_right_helper+0x98/0x2f0 [ 35.759080] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.763767] kunit_try_run_case+0x170/0x3f0 [ 35.767934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.773403] kthread+0x328/0x630 [ 35.776614] ret_from_fork+0x10/0x20 [ 35.780174] [ 35.781650] The buggy address belongs to the object at ffff000801e28800 [ 35.781650] which belongs to the cache kmalloc-128 of size 128 [ 35.794151] The buggy address is located 0 bytes to the right of [ 35.794151] allocated 115-byte region [ffff000801e28800, ffff000801e28873) [ 35.807082] [ 35.808562] The buggy address belongs to the physical page: [ 35.814119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28 [ 35.822102] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.829742] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.836684] page_type: f5(slab) [ 35.839822] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.847541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.855268] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.863079] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.870892] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff [ 35.878703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.886510] page dumped because: kasan: bad access detected [ 35.892064] [ 35.893539] Memory state around the buggy address: [ 35.898322] ffff000801e28700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.905522] ffff000801e28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.912729] >ffff000801e28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.919928] ^ [ 35.926789] ffff000801e28880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.933994] ffff000801e28900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.941197] ================================================================== [ 36.183778] ================================================================== [ 36.193713] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.201263] Read of size 1 at addr ffff00080631c2bb by task kunit_try_catch/272 [ 36.208554] [ 36.210040] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 36.210100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.210116] Hardware name: WinLink E850-96 board (DT) [ 36.210140] Call trace: [ 36.210157] show_stack+0x20/0x38 (C) [ 36.210197] dump_stack_lvl+0x8c/0xd0 [ 36.210234] print_report+0x118/0x608 [ 36.210270] kasan_report+0xdc/0x128 [ 36.210303] __asan_report_load1_noabort+0x20/0x30 [ 36.210343] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.210377] mempool_slab_oob_right+0xc0/0x118 [ 36.210413] kunit_try_run_case+0x170/0x3f0 [ 36.210450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.210488] kthread+0x328/0x630 [ 36.210517] ret_from_fork+0x10/0x20 [ 36.210553] [ 36.277824] Allocated by task 272: [ 36.281211] kasan_save_stack+0x3c/0x68 [ 36.285027] kasan_save_track+0x20/0x40 [ 36.288847] kasan_save_alloc_info+0x40/0x58 [ 36.293099] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.298308] remove_element+0x16c/0x1f8 [ 36.302127] mempool_alloc_preallocated+0x58/0xc0 [ 36.306815] mempool_oob_right_helper+0x98/0x2f0 [ 36.311415] mempool_slab_oob_right+0xc0/0x118 [ 36.315842] kunit_try_run_case+0x170/0x3f0 [ 36.320009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.325479] kthread+0x328/0x630 [ 36.328689] ret_from_fork+0x10/0x20 [ 36.332248] [ 36.333725] The buggy address belongs to the object at ffff00080631c240 [ 36.333725] which belongs to the cache test_cache of size 123 [ 36.346139] The buggy address is located 0 bytes to the right of [ 36.346139] allocated 123-byte region [ffff00080631c240, ffff00080631c2bb) [ 36.359071] [ 36.360550] The buggy address belongs to the physical page: [ 36.366107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88631c [ 36.374091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.380600] page_type: f5(slab) [ 36.383736] raw: 0bfffe0000000000 ffff00080179fcc0 dead000000000122 0000000000000000 [ 36.391456] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.399176] page dumped because: kasan: bad access detected [ 36.404729] [ 36.406205] Memory state around the buggy address: [ 36.410986] ffff00080631c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.418190] ffff00080631c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.425394] >ffff00080631c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.432594] ^ [ 36.437633] ffff00080631c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.444837] ffff00080631c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.452040] ==================================================================
[ 28.323633] ================================================================== [ 28.323790] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.323970] Read of size 1 at addr fff00000c6507d73 by task kunit_try_catch/221 [ 28.324123] [ 28.324179] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.324290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.324322] Hardware name: linux,dummy-virt (DT) [ 28.324365] Call trace: [ 28.324396] show_stack+0x20/0x38 (C) [ 28.324466] dump_stack_lvl+0x8c/0xd0 [ 28.324536] print_report+0x118/0x608 [ 28.324606] kasan_report+0xdc/0x128 [ 28.324665] __asan_report_load1_noabort+0x20/0x30 [ 28.324733] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.324795] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.324862] kunit_try_run_case+0x170/0x3f0 [ 28.324928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.325032] kthread+0x328/0x630 [ 28.325089] ret_from_fork+0x10/0x20 [ 28.325155] [ 28.325178] Allocated by task 221: [ 28.325215] kasan_save_stack+0x3c/0x68 [ 28.325273] kasan_save_track+0x20/0x40 [ 28.325322] kasan_save_alloc_info+0x40/0x58 [ 28.325376] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.325435] remove_element+0x130/0x1f8 [ 28.325482] mempool_alloc_preallocated+0x58/0xc0 [ 28.325535] mempool_oob_right_helper+0x98/0x2f0 [ 28.325586] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.325639] kunit_try_run_case+0x170/0x3f0 [ 28.325690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.325745] kthread+0x328/0x630 [ 28.325791] ret_from_fork+0x10/0x20 [ 28.325838] [ 28.325863] The buggy address belongs to the object at fff00000c6507d00 [ 28.325863] which belongs to the cache kmalloc-128 of size 128 [ 28.325960] The buggy address is located 0 bytes to the right of [ 28.325960] allocated 115-byte region [fff00000c6507d00, fff00000c6507d73) [ 28.326045] [ 28.326071] The buggy address belongs to the physical page: [ 28.326113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507 [ 28.326185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.326252] page_type: f5(slab) [ 28.326304] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.326367] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.326418] page dumped because: kasan: bad access detected [ 28.326456] [ 28.326479] Memory state around the buggy address: [ 28.326519] fff00000c6507c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.326578] fff00000c6507c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.326633] >fff00000c6507d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.326682] ^ [ 28.326732] fff00000c6507d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.326784] fff00000c6507e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.326834] ================================================================== [ 28.341202] ================================================================== [ 28.341321] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.341434] Read of size 1 at addr fff00000c786a001 by task kunit_try_catch/223 [ 28.341552] [ 28.341622] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.341818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.341884] Hardware name: linux,dummy-virt (DT) [ 28.342002] Call trace: [ 28.342074] show_stack+0x20/0x38 (C) [ 28.342334] dump_stack_lvl+0x8c/0xd0 [ 28.342476] print_report+0x118/0x608 [ 28.342617] kasan_report+0xdc/0x128 [ 28.342739] __asan_report_load1_noabort+0x20/0x30 [ 28.343081] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.343338] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.343490] kunit_try_run_case+0x170/0x3f0 [ 28.343745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.343914] kthread+0x328/0x630 [ 28.344070] ret_from_fork+0x10/0x20 [ 28.344274] [ 28.344332] The buggy address belongs to the physical page: [ 28.344450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 28.344638] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.344852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.344960] page_type: f8(unknown) [ 28.345163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.345293] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.345414] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.345536] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.345667] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 28.346008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.346126] page dumped because: kasan: bad access detected [ 28.346365] [ 28.346447] Memory state around the buggy address: [ 28.346614] fff00000c7869f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.346798] fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.346973] >fff00000c786a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.347084] ^ [ 28.347278] fff00000c786a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.347453] fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.347565] ================================================================== [ 28.384127] ================================================================== [ 28.384267] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.385378] Read of size 1 at addr fff00000c64302bb by task kunit_try_catch/225 [ 28.385529] [ 28.385620] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.386284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.386402] Hardware name: linux,dummy-virt (DT) [ 28.386503] Call trace: [ 28.386684] show_stack+0x20/0x38 (C) [ 28.386815] dump_stack_lvl+0x8c/0xd0 [ 28.386987] print_report+0x118/0x608 [ 28.387266] kasan_report+0xdc/0x128 [ 28.387441] __asan_report_load1_noabort+0x20/0x30 [ 28.387593] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.387974] mempool_slab_oob_right+0xc0/0x118 [ 28.388219] kunit_try_run_case+0x170/0x3f0 [ 28.388357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.388509] kthread+0x328/0x630 [ 28.388718] ret_from_fork+0x10/0x20 [ 28.388999] [ 28.389054] Allocated by task 225: [ 28.389154] kasan_save_stack+0x3c/0x68 [ 28.389407] kasan_save_track+0x20/0x40 [ 28.389537] kasan_save_alloc_info+0x40/0x58 [ 28.389705] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.389851] remove_element+0x16c/0x1f8 [ 28.390023] mempool_alloc_preallocated+0x58/0xc0 [ 28.390141] mempool_oob_right_helper+0x98/0x2f0 [ 28.390627] mempool_slab_oob_right+0xc0/0x118 [ 28.390881] kunit_try_run_case+0x170/0x3f0 [ 28.391011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.391208] kthread+0x328/0x630 [ 28.391322] ret_from_fork+0x10/0x20 [ 28.391666] [ 28.391813] The buggy address belongs to the object at fff00000c6430240 [ 28.391813] which belongs to the cache test_cache of size 123 [ 28.391974] The buggy address is located 0 bytes to the right of [ 28.391974] allocated 123-byte region [fff00000c6430240, fff00000c64302bb) [ 28.392125] [ 28.392178] The buggy address belongs to the physical page: [ 28.392250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106430 [ 28.392380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.392500] page_type: f5(slab) [ 28.392607] raw: 0bfffe0000000000 fff00000c569fdc0 dead000000000122 0000000000000000 [ 28.392736] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.392870] page dumped because: kasan: bad access detected [ 28.392986] [ 28.393041] Memory state around the buggy address: [ 28.393452] fff00000c6430180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.393626] fff00000c6430200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.393909] >fff00000c6430280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.394052] ^ [ 28.394252] fff00000c6430300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.394358] fff00000c6430380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.394484] ==================================================================
[ 28.404095] ================================================================== [ 28.404276] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.404432] Read of size 1 at addr fff00000c77642bb by task kunit_try_catch/225 [ 28.404572] [ 28.404966] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.405354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.405481] Hardware name: linux,dummy-virt (DT) [ 28.405567] Call trace: [ 28.405633] show_stack+0x20/0x38 (C) [ 28.405763] dump_stack_lvl+0x8c/0xd0 [ 28.405914] print_report+0x118/0x608 [ 28.406042] kasan_report+0xdc/0x128 [ 28.406165] __asan_report_load1_noabort+0x20/0x30 [ 28.406386] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.406548] mempool_slab_oob_right+0xc0/0x118 [ 28.406918] kunit_try_run_case+0x170/0x3f0 [ 28.407066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.407198] kthread+0x328/0x630 [ 28.407341] ret_from_fork+0x10/0x20 [ 28.407651] [ 28.407805] Allocated by task 225: [ 28.407908] kasan_save_stack+0x3c/0x68 [ 28.408023] kasan_save_track+0x20/0x40 [ 28.408136] kasan_save_alloc_info+0x40/0x58 [ 28.408240] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.408346] remove_element+0x16c/0x1f8 [ 28.408505] mempool_alloc_preallocated+0x58/0xc0 [ 28.408649] mempool_oob_right_helper+0x98/0x2f0 [ 28.408757] mempool_slab_oob_right+0xc0/0x118 [ 28.408886] kunit_try_run_case+0x170/0x3f0 [ 28.409099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.409233] kthread+0x328/0x630 [ 28.409331] ret_from_fork+0x10/0x20 [ 28.409597] [ 28.409648] The buggy address belongs to the object at fff00000c7764240 [ 28.409648] which belongs to the cache test_cache of size 123 [ 28.409975] The buggy address is located 0 bytes to the right of [ 28.409975] allocated 123-byte region [fff00000c7764240, fff00000c77642bb) [ 28.410475] [ 28.410606] The buggy address belongs to the physical page: [ 28.410727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107764 [ 28.410912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.411094] page_type: f5(slab) [ 28.411219] raw: 0bfffe0000000000 fff00000c59addc0 dead000000000122 0000000000000000 [ 28.411463] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.411569] page dumped because: kasan: bad access detected [ 28.411695] [ 28.411860] Memory state around the buggy address: [ 28.411976] fff00000c7764180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.412088] fff00000c7764200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.412195] >fff00000c7764280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.412288] ^ [ 28.412366] fff00000c7764300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.412477] fff00000c7764380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.412736] ================================================================== [ 28.365782] ================================================================== [ 28.366663] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.366820] Read of size 1 at addr fff00000c772a001 by task kunit_try_catch/223 [ 28.366958] [ 28.367042] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.367243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.367915] Hardware name: linux,dummy-virt (DT) [ 28.368022] Call trace: [ 28.368176] show_stack+0x20/0x38 (C) [ 28.368321] dump_stack_lvl+0x8c/0xd0 [ 28.368875] print_report+0x118/0x608 [ 28.369410] kasan_report+0xdc/0x128 [ 28.369597] __asan_report_load1_noabort+0x20/0x30 [ 28.369733] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.369889] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.370052] kunit_try_run_case+0x170/0x3f0 [ 28.370185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.370317] kthread+0x328/0x630 [ 28.370473] ret_from_fork+0x10/0x20 [ 28.370636] [ 28.370689] The buggy address belongs to the physical page: [ 28.370779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107728 [ 28.371031] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.371322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.371459] page_type: f8(unknown) [ 28.371565] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.372710] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.372874] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.372999] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.373976] head: 0bfffe0000000002 ffffc1ffc31dca01 00000000ffffffff 00000000ffffffff [ 28.374120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.374334] page dumped because: kasan: bad access detected [ 28.374419] [ 28.374464] Memory state around the buggy address: [ 28.374633] fff00000c7729f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.374998] fff00000c7729f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.375231] >fff00000c772a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.375452] ^ [ 28.375523] fff00000c772a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.376109] fff00000c772a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.376314] ================================================================== [ 28.335414] ================================================================== [ 28.335503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.335596] Read of size 1 at addr fff00000c60a5973 by task kunit_try_catch/221 [ 28.335657] [ 28.335706] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.335827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.335891] Hardware name: linux,dummy-virt (DT) [ 28.335935] Call trace: [ 28.335967] show_stack+0x20/0x38 (C) [ 28.336035] dump_stack_lvl+0x8c/0xd0 [ 28.336101] print_report+0x118/0x608 [ 28.336160] kasan_report+0xdc/0x128 [ 28.336217] __asan_report_load1_noabort+0x20/0x30 [ 28.336279] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.336340] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.336400] kunit_try_run_case+0x170/0x3f0 [ 28.336464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.336527] kthread+0x328/0x630 [ 28.336583] ret_from_fork+0x10/0x20 [ 28.336644] [ 28.336667] Allocated by task 221: [ 28.336704] kasan_save_stack+0x3c/0x68 [ 28.336758] kasan_save_track+0x20/0x40 [ 28.336806] kasan_save_alloc_info+0x40/0x58 [ 28.336880] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.336939] remove_element+0x130/0x1f8 [ 28.336987] mempool_alloc_preallocated+0x58/0xc0 [ 28.337037] mempool_oob_right_helper+0x98/0x2f0 [ 28.337172] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.337278] kunit_try_run_case+0x170/0x3f0 [ 28.337380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.337497] kthread+0x328/0x630 [ 28.337585] ret_from_fork+0x10/0x20 [ 28.337677] [ 28.337728] The buggy address belongs to the object at fff00000c60a5900 [ 28.337728] which belongs to the cache kmalloc-128 of size 128 [ 28.337886] The buggy address is located 0 bytes to the right of [ 28.337886] allocated 115-byte region [fff00000c60a5900, fff00000c60a5973) [ 28.337975] [ 28.338001] The buggy address belongs to the physical page: [ 28.338041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a5 [ 28.338111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.338179] page_type: f5(slab) [ 28.338231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.338293] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.338344] page dumped because: kasan: bad access detected [ 28.338380] [ 28.338403] Memory state around the buggy address: [ 28.338444] fff00000c60a5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.338500] fff00000c60a5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.338555] >fff00000c60a5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.338605] ^ [ 28.338655] fff00000c60a5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.338709] fff00000c60a5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.338757] ==================================================================
[ 21.154065] ================================================================== [ 21.155316] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 21.156568] Read of size 1 at addr ffff888103a06001 by task kunit_try_catch/241 [ 21.157346] [ 21.157921] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.158061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.158103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.158168] Call Trace: [ 21.158216] <TASK> [ 21.158312] dump_stack_lvl+0x73/0xb0 [ 21.158421] print_report+0xd1/0x650 [ 21.158517] ? __virt_addr_valid+0x1db/0x2d0 [ 21.158855] ? mempool_oob_right_helper+0x318/0x380 [ 21.158934] ? kasan_addr_to_slab+0x11/0xa0 [ 21.159004] ? mempool_oob_right_helper+0x318/0x380 [ 21.159084] kasan_report+0x141/0x180 [ 21.159162] ? mempool_oob_right_helper+0x318/0x380 [ 21.159295] __asan_report_load1_noabort+0x18/0x20 [ 21.159381] mempool_oob_right_helper+0x318/0x380 [ 21.159458] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 21.159573] ? __kasan_check_write+0x18/0x20 [ 21.159643] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.159723] ? finish_task_switch.isra.0+0x153/0x700 [ 21.159768] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 21.159808] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 21.159850] ? __pfx_mempool_kmalloc+0x10/0x10 [ 21.159887] ? __pfx_mempool_kfree+0x10/0x10 [ 21.159924] ? __pfx_read_tsc+0x10/0x10 [ 21.159957] ? ktime_get_ts64+0x86/0x230 [ 21.159991] kunit_try_run_case+0x1a5/0x480 [ 21.160030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.160066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.160102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.160136] ? __kthread_parkme+0x82/0x180 [ 21.160164] ? preempt_count_sub+0x50/0x80 [ 21.160196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.160247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.160299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.160335] kthread+0x337/0x6f0 [ 21.160363] ? trace_preempt_on+0x20/0xc0 [ 21.160397] ? __pfx_kthread+0x10/0x10 [ 21.160427] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.160458] ? calculate_sigpending+0x7b/0xa0 [ 21.160493] ? __pfx_kthread+0x10/0x10 [ 21.160591] ret_from_fork+0x116/0x1d0 [ 21.160671] ? __pfx_kthread+0x10/0x10 [ 21.160705] ret_from_fork_asm+0x1a/0x30 [ 21.160750] </TASK> [ 21.160766] [ 21.184123] The buggy address belongs to the physical page: [ 21.184647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a04 [ 21.185172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.186092] flags: 0x200000000000040(head|node=0|zone=2) [ 21.187450] page_type: f8(unknown) [ 21.187909] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.188718] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.189210] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.190141] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.190871] head: 0200000000000002 ffffea00040e8101 00000000ffffffff 00000000ffffffff [ 21.191867] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.192549] page dumped because: kasan: bad access detected [ 21.193055] [ 21.193514] Memory state around the buggy address: [ 21.194187] ffff888103a05f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.194776] ffff888103a05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.195451] >ffff888103a06000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.195907] ^ [ 21.196466] ffff888103a06080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.197713] ffff888103a06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.198192] ================================================================== [ 21.208017] ================================================================== [ 21.209934] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 21.211397] Read of size 1 at addr ffff8881039d72bb by task kunit_try_catch/243 [ 21.212391] [ 21.212673] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.212813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.212858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.212918] Call Trace: [ 21.212962] <TASK> [ 21.213014] dump_stack_lvl+0x73/0xb0 [ 21.213109] print_report+0xd1/0x650 [ 21.213173] ? __virt_addr_valid+0x1db/0x2d0 [ 21.213236] ? mempool_oob_right_helper+0x318/0x380 [ 21.213313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.213376] ? mempool_oob_right_helper+0x318/0x380 [ 21.213439] kasan_report+0x141/0x180 [ 21.213518] ? mempool_oob_right_helper+0x318/0x380 [ 21.213597] __asan_report_load1_noabort+0x18/0x20 [ 21.213680] mempool_oob_right_helper+0x318/0x380 [ 21.213761] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 21.213887] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.213972] ? irqentry_exit+0x2a/0x60 [ 21.214048] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.214133] mempool_slab_oob_right+0xed/0x140 [ 21.214210] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 21.214324] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 21.214361] ? __pfx_mempool_free_slab+0x10/0x10 [ 21.214392] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 21.214433] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 21.214471] kunit_try_run_case+0x1a5/0x480 [ 21.214547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.214666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.214711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.214746] ? __kthread_parkme+0x82/0x180 [ 21.214777] ? preempt_count_sub+0x50/0x80 [ 21.214810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.214846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.214881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.214916] kthread+0x337/0x6f0 [ 21.214944] ? trace_preempt_on+0x20/0xc0 [ 21.214978] ? __pfx_kthread+0x10/0x10 [ 21.215006] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.215037] ? calculate_sigpending+0x7b/0xa0 [ 21.215073] ? __pfx_kthread+0x10/0x10 [ 21.215103] ret_from_fork+0x116/0x1d0 [ 21.215129] ? __pfx_kthread+0x10/0x10 [ 21.215157] ret_from_fork_asm+0x1a/0x30 [ 21.215199] </TASK> [ 21.215214] [ 21.242527] Allocated by task 243: [ 21.242908] kasan_save_stack+0x45/0x70 [ 21.243907] kasan_save_track+0x18/0x40 [ 21.244195] kasan_save_alloc_info+0x3b/0x50 [ 21.245145] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 21.245816] remove_element+0x11e/0x190 [ 21.246407] mempool_alloc_preallocated+0x4d/0x90 [ 21.247417] mempool_oob_right_helper+0x8a/0x380 [ 21.248295] mempool_slab_oob_right+0xed/0x140 [ 21.248849] kunit_try_run_case+0x1a5/0x480 [ 21.249355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.250593] kthread+0x337/0x6f0 [ 21.250974] ret_from_fork+0x116/0x1d0 [ 21.251384] ret_from_fork_asm+0x1a/0x30 [ 21.251750] [ 21.251985] The buggy address belongs to the object at ffff8881039d7240 [ 21.251985] which belongs to the cache test_cache of size 123 [ 21.253102] The buggy address is located 0 bytes to the right of [ 21.253102] allocated 123-byte region [ffff8881039d7240, ffff8881039d72bb) [ 21.254304] [ 21.254713] The buggy address belongs to the physical page: [ 21.255190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d7 [ 21.256027] flags: 0x200000000000000(node=0|zone=2) [ 21.257352] page_type: f5(slab) [ 21.257732] raw: 0200000000000000 ffff888101678a00 dead000000000122 0000000000000000 [ 21.258523] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.259189] page dumped because: kasan: bad access detected [ 21.259883] [ 21.260087] Memory state around the buggy address: [ 21.260735] ffff8881039d7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.261290] ffff8881039d7200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.262662] >ffff8881039d7280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.263289] ^ [ 21.263788] ffff8881039d7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264719] ffff8881039d7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.265358] ================================================================== [ 21.078523] ================================================================== [ 21.079447] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 21.080089] Read of size 1 at addr ffff888101b20f73 by task kunit_try_catch/239 [ 21.081444] [ 21.082156] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.082476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.082533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.082923] Call Trace: [ 21.082972] <TASK> [ 21.083031] dump_stack_lvl+0x73/0xb0 [ 21.083096] print_report+0xd1/0x650 [ 21.083131] ? __virt_addr_valid+0x1db/0x2d0 [ 21.083167] ? mempool_oob_right_helper+0x318/0x380 [ 21.083202] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.083248] ? mempool_oob_right_helper+0x318/0x380 [ 21.083303] kasan_report+0x141/0x180 [ 21.083340] ? mempool_oob_right_helper+0x318/0x380 [ 21.083381] __asan_report_load1_noabort+0x18/0x20 [ 21.083416] mempool_oob_right_helper+0x318/0x380 [ 21.083452] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 21.083486] ? update_load_avg+0x1be/0x21b0 [ 21.083601] ? pick_eevdf+0x3c9/0x590 [ 21.083683] ? irqentry_exit+0x2a/0x60 [ 21.083727] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 21.083768] mempool_kmalloc_oob_right+0xf2/0x150 [ 21.083804] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 21.083843] ? __pfx_mempool_kmalloc+0x10/0x10 [ 21.083881] ? __pfx_mempool_kfree+0x10/0x10 [ 21.083916] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 21.083954] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 21.083990] kunit_try_run_case+0x1a5/0x480 [ 21.084029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.084064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.084099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.084133] ? __kthread_parkme+0x82/0x180 [ 21.084162] ? preempt_count_sub+0x50/0x80 [ 21.084194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.084238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.084303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.084341] kthread+0x337/0x6f0 [ 21.084370] ? trace_preempt_on+0x20/0xc0 [ 21.084405] ? __pfx_kthread+0x10/0x10 [ 21.084435] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.084468] ? calculate_sigpending+0x7b/0xa0 [ 21.084527] ? __pfx_kthread+0x10/0x10 [ 21.084610] ret_from_fork+0x116/0x1d0 [ 21.084679] ? __pfx_kthread+0x10/0x10 [ 21.084714] ret_from_fork_asm+0x1a/0x30 [ 21.084759] </TASK> [ 21.084776] [ 21.120379] Allocated by task 239: [ 21.120830] kasan_save_stack+0x45/0x70 [ 21.121529] kasan_save_track+0x18/0x40 [ 21.122819] kasan_save_alloc_info+0x3b/0x50 [ 21.123158] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 21.124018] remove_element+0x11e/0x190 [ 21.125019] mempool_alloc_preallocated+0x4d/0x90 [ 21.126044] mempool_oob_right_helper+0x8a/0x380 [ 21.127099] mempool_kmalloc_oob_right+0xf2/0x150 [ 21.128092] kunit_try_run_case+0x1a5/0x480 [ 21.128895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.129864] kthread+0x337/0x6f0 [ 21.130037] ret_from_fork+0x116/0x1d0 [ 21.130196] ret_from_fork_asm+0x1a/0x30 [ 21.131686] [ 21.132054] The buggy address belongs to the object at ffff888101b20f00 [ 21.132054] which belongs to the cache kmalloc-128 of size 128 [ 21.133643] The buggy address is located 0 bytes to the right of [ 21.133643] allocated 115-byte region [ffff888101b20f00, ffff888101b20f73) [ 21.134533] [ 21.135474] The buggy address belongs to the physical page: [ 21.136060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b20 [ 21.136928] flags: 0x200000000000000(node=0|zone=2) [ 21.137422] page_type: f5(slab) [ 21.137939] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.138555] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 21.139331] page dumped because: kasan: bad access detected [ 21.140132] [ 21.140349] Memory state around the buggy address: [ 21.140928] ffff888101b20e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.142612] ffff888101b20e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.143316] >ffff888101b20f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.143903] ^ [ 21.144785] ffff888101b20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.145359] ffff888101b21000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.146748] ==================================================================
[ 20.039856] ================================================================== [ 20.040837] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 20.041721] Read of size 1 at addr ffff8881038eb2bb by task kunit_try_catch/243 [ 20.042802] [ 20.043018] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.043084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.043109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.043583] Call Trace: [ 20.043626] <TASK> [ 20.043670] dump_stack_lvl+0x73/0xb0 [ 20.043733] print_report+0xd1/0x650 [ 20.043770] ? __virt_addr_valid+0x1db/0x2d0 [ 20.043804] ? mempool_oob_right_helper+0x318/0x380 [ 20.043838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.043870] ? mempool_oob_right_helper+0x318/0x380 [ 20.043963] kasan_report+0x141/0x180 [ 20.044268] ? mempool_oob_right_helper+0x318/0x380 [ 20.044316] __asan_report_load1_noabort+0x18/0x20 [ 20.044353] mempool_oob_right_helper+0x318/0x380 [ 20.044388] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 20.044426] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.044459] ? finish_task_switch.isra.0+0x153/0x700 [ 20.044497] mempool_slab_oob_right+0xed/0x140 [ 20.044592] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 20.044669] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 20.044704] ? __pfx_mempool_free_slab+0x10/0x10 [ 20.044735] ? __pfx_read_tsc+0x10/0x10 [ 20.044765] ? ktime_get_ts64+0x86/0x230 [ 20.044799] kunit_try_run_case+0x1a5/0x480 [ 20.044839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.044874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.044941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.044977] ? __kthread_parkme+0x82/0x180 [ 20.045006] ? preempt_count_sub+0x50/0x80 [ 20.045037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.045073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.045130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.045181] kthread+0x337/0x6f0 [ 20.045213] ? trace_preempt_on+0x20/0xc0 [ 20.045247] ? __pfx_kthread+0x10/0x10 [ 20.045277] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.045309] ? calculate_sigpending+0x7b/0xa0 [ 20.045343] ? __pfx_kthread+0x10/0x10 [ 20.045373] ret_from_fork+0x116/0x1d0 [ 20.045399] ? __pfx_kthread+0x10/0x10 [ 20.045428] ret_from_fork_asm+0x1a/0x30 [ 20.045470] </TASK> [ 20.045486] [ 20.068032] Allocated by task 243: [ 20.068467] kasan_save_stack+0x45/0x70 [ 20.069440] kasan_save_track+0x18/0x40 [ 20.070038] kasan_save_alloc_info+0x3b/0x50 [ 20.070768] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 20.071321] remove_element+0x11e/0x190 [ 20.072037] mempool_alloc_preallocated+0x4d/0x90 [ 20.072889] mempool_oob_right_helper+0x8a/0x380 [ 20.073486] mempool_slab_oob_right+0xed/0x140 [ 20.074084] kunit_try_run_case+0x1a5/0x480 [ 20.074864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.075670] kthread+0x337/0x6f0 [ 20.076118] ret_from_fork+0x116/0x1d0 [ 20.076488] ret_from_fork_asm+0x1a/0x30 [ 20.076934] [ 20.077171] The buggy address belongs to the object at ffff8881038eb240 [ 20.077171] which belongs to the cache test_cache of size 123 [ 20.078456] The buggy address is located 0 bytes to the right of [ 20.078456] allocated 123-byte region [ffff8881038eb240, ffff8881038eb2bb) [ 20.079676] [ 20.080156] The buggy address belongs to the physical page: [ 20.080855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 20.081836] flags: 0x200000000000000(node=0|zone=2) [ 20.082451] page_type: f5(slab) [ 20.083050] raw: 0200000000000000 ffff88810111b500 dead000000000122 0000000000000000 [ 20.083969] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.084638] page dumped because: kasan: bad access detected [ 20.085377] [ 20.085855] Memory state around the buggy address: [ 20.086336] ffff8881038eb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.087425] ffff8881038eb200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.088192] >ffff8881038eb280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.088794] ^ [ 20.089383] ffff8881038eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.090343] ffff8881038eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.091152] ================================================================== [ 19.930039] ================================================================== [ 19.931271] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 19.931931] Read of size 1 at addr ffff8881038d5673 by task kunit_try_catch/239 [ 19.932774] [ 19.933110] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.933245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.933282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.933346] Call Trace: [ 19.933384] <TASK> [ 19.933437] dump_stack_lvl+0x73/0xb0 [ 19.933530] print_report+0xd1/0x650 [ 19.933686] ? __virt_addr_valid+0x1db/0x2d0 [ 19.933733] ? mempool_oob_right_helper+0x318/0x380 [ 19.933810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.933933] ? mempool_oob_right_helper+0x318/0x380 [ 19.934012] kasan_report+0x141/0x180 [ 19.934082] ? mempool_oob_right_helper+0x318/0x380 [ 19.934173] __asan_report_load1_noabort+0x18/0x20 [ 19.934251] mempool_oob_right_helper+0x318/0x380 [ 19.934334] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 19.934376] ? __kasan_check_write+0x18/0x20 [ 19.934406] ? __pfx_sched_clock_cpu+0x10/0x10 [ 19.934439] ? finish_task_switch.isra.0+0x153/0x700 [ 19.934476] mempool_kmalloc_oob_right+0xf2/0x150 [ 19.934518] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 19.934643] ? __pfx_mempool_kmalloc+0x10/0x10 [ 19.934688] ? __pfx_mempool_kfree+0x10/0x10 [ 19.934724] ? __pfx_read_tsc+0x10/0x10 [ 19.934754] ? ktime_get_ts64+0x86/0x230 [ 19.934790] kunit_try_run_case+0x1a5/0x480 [ 19.934830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.934865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.934932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.934969] ? __kthread_parkme+0x82/0x180 [ 19.935000] ? preempt_count_sub+0x50/0x80 [ 19.935034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.935070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.935123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.935179] kthread+0x337/0x6f0 [ 19.935211] ? trace_preempt_on+0x20/0xc0 [ 19.935246] ? __pfx_kthread+0x10/0x10 [ 19.935276] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.935307] ? calculate_sigpending+0x7b/0xa0 [ 19.935343] ? __pfx_kthread+0x10/0x10 [ 19.935373] ret_from_fork+0x116/0x1d0 [ 19.935398] ? __pfx_kthread+0x10/0x10 [ 19.935427] ret_from_fork_asm+0x1a/0x30 [ 19.935470] </TASK> [ 19.935486] [ 19.957416] Allocated by task 239: [ 19.958052] kasan_save_stack+0x45/0x70 [ 19.958906] kasan_save_track+0x18/0x40 [ 19.959319] kasan_save_alloc_info+0x3b/0x50 [ 19.959814] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 19.960436] remove_element+0x11e/0x190 [ 19.961058] mempool_alloc_preallocated+0x4d/0x90 [ 19.961526] mempool_oob_right_helper+0x8a/0x380 [ 19.961998] mempool_kmalloc_oob_right+0xf2/0x150 [ 19.962750] kunit_try_run_case+0x1a5/0x480 [ 19.963183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.963901] kthread+0x337/0x6f0 [ 19.964446] ret_from_fork+0x116/0x1d0 [ 19.965200] ret_from_fork_asm+0x1a/0x30 [ 19.966397] [ 19.966863] The buggy address belongs to the object at ffff8881038d5600 [ 19.966863] which belongs to the cache kmalloc-128 of size 128 [ 19.968297] The buggy address is located 0 bytes to the right of [ 19.968297] allocated 115-byte region [ffff8881038d5600, ffff8881038d5673) [ 19.969902] [ 19.970108] The buggy address belongs to the physical page: [ 19.970802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 19.971916] flags: 0x200000000000000(node=0|zone=2) [ 19.972339] page_type: f5(slab) [ 19.972496] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.972752] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.973196] page dumped because: kasan: bad access detected [ 19.974335] [ 19.974973] Memory state around the buggy address: [ 19.975575] ffff8881038d5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.976370] ffff8881038d5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.976942] >ffff8881038d5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.977601] ^ [ 19.978496] ffff8881038d5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.979291] ffff8881038d5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.979893] ================================================================== [ 19.986444] ================================================================== [ 19.988171] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 19.989437] Read of size 1 at addr ffff88810398e001 by task kunit_try_catch/241 [ 19.990226] [ 19.990559] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.990834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.990941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.991035] Call Trace: [ 19.991075] <TASK> [ 19.991123] dump_stack_lvl+0x73/0xb0 [ 19.991189] print_report+0xd1/0x650 [ 19.991226] ? __virt_addr_valid+0x1db/0x2d0 [ 19.991260] ? mempool_oob_right_helper+0x318/0x380 [ 19.991293] ? kasan_addr_to_slab+0x11/0xa0 [ 19.991322] ? mempool_oob_right_helper+0x318/0x380 [ 19.991358] kasan_report+0x141/0x180 [ 19.991390] ? mempool_oob_right_helper+0x318/0x380 [ 19.991429] __asan_report_load1_noabort+0x18/0x20 [ 19.991464] mempool_oob_right_helper+0x318/0x380 [ 19.991499] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 19.991619] ? __pfx_sched_clock_cpu+0x10/0x10 [ 19.991680] ? finish_task_switch.isra.0+0x153/0x700 [ 19.991719] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 19.991756] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 19.991796] ? __pfx_mempool_kmalloc+0x10/0x10 [ 19.991830] ? __pfx_mempool_kfree+0x10/0x10 [ 19.991866] ? __pfx_read_tsc+0x10/0x10 [ 19.991925] ? ktime_get_ts64+0x86/0x230 [ 19.991961] kunit_try_run_case+0x1a5/0x480 [ 19.991998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.992033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.992069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.992121] ? __kthread_parkme+0x82/0x180 [ 19.992172] ? preempt_count_sub+0x50/0x80 [ 19.992205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.992241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.992276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.992311] kthread+0x337/0x6f0 [ 19.992339] ? trace_preempt_on+0x20/0xc0 [ 19.992372] ? __pfx_kthread+0x10/0x10 [ 19.992400] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.992431] ? calculate_sigpending+0x7b/0xa0 [ 19.992466] ? __pfx_kthread+0x10/0x10 [ 19.992496] ret_from_fork+0x116/0x1d0 [ 19.992571] ? __pfx_kthread+0x10/0x10 [ 19.992652] ret_from_fork_asm+0x1a/0x30 [ 19.992753] </TASK> [ 19.992792] [ 20.015533] The buggy address belongs to the physical page: [ 20.017564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398c [ 20.018297] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.018691] flags: 0x200000000000040(head|node=0|zone=2) [ 20.019038] page_type: f8(unknown) [ 20.019276] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.020452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.022275] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.023150] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.023721] head: 0200000000000002 ffffea00040e6301 00000000ffffffff 00000000ffffffff [ 20.024668] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.025282] page dumped because: kasan: bad access detected [ 20.026031] [ 20.026328] Memory state around the buggy address: [ 20.027259] ffff88810398df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.028341] ffff88810398df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.029471] >ffff88810398e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.030402] ^ [ 20.030811] ffff88810398e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.031681] ffff88810398e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.032379] ==================================================================
[ 22.075038] ================================================================== [ 22.076147] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.076863] Read of size 1 at addr ffff00000dbe2001 by task kunit_try_catch/276 [ 22.077541] [ 22.077705] CPU: 2 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.077756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.077771] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.077788] Call trace: [ 22.077799] show_stack+0x20/0x38 (C) [ 22.077834] dump_stack_lvl+0x8c/0xd0 [ 22.077870] print_report+0x118/0x608 [ 22.077903] kasan_report+0xdc/0x128 [ 22.077935] __asan_report_load1_noabort+0x20/0x30 [ 22.077973] mempool_oob_right_helper+0x2ac/0x2f0 [ 22.078005] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 22.078039] kunit_try_run_case+0x170/0x3f0 [ 22.078073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.078111] kthread+0x328/0x630 [ 22.078138] ret_from_fork+0x10/0x20 [ 22.078170] [ 22.084256] The buggy address belongs to the physical page: [ 22.084771] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdbe0 [ 22.085497] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.086202] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.086855] page_type: f8(unknown) [ 22.087190] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.087905] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.088621] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.089344] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.090067] head: 03fffe0000000002 fffffdffc036f801 00000000ffffffff 00000000ffffffff [ 22.090790] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.091504] page dumped because: kasan: bad access detected [ 22.092018] [ 22.092170] Memory state around the buggy address: [ 22.092617] ffff00000dbe1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.093283] ffff00000dbe1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.093948] >ffff00000dbe2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.094609] ^ [ 22.094920] ffff00000dbe2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.095585] ffff00000dbe2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.096246] ================================================================== [ 22.100996] ================================================================== [ 22.102160] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.102876] Read of size 1 at addr ffff00000f5c82bb by task kunit_try_catch/278 [ 22.103553] [ 22.103717] CPU: 2 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.103768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.103782] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.103800] Call trace: [ 22.103811] show_stack+0x20/0x38 (C) [ 22.103845] dump_stack_lvl+0x8c/0xd0 [ 22.103880] print_report+0x118/0x608 [ 22.103915] kasan_report+0xdc/0x128 [ 22.103947] __asan_report_load1_noabort+0x20/0x30 [ 22.103983] mempool_oob_right_helper+0x2ac/0x2f0 [ 22.104015] mempool_slab_oob_right+0xc0/0x118 [ 22.104048] kunit_try_run_case+0x170/0x3f0 [ 22.104082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.104120] kthread+0x328/0x630 [ 22.104146] ret_from_fork+0x10/0x20 [ 22.104179] [ 22.110198] Allocated by task 278: [ 22.110522] kasan_save_stack+0x3c/0x68 [ 22.110899] kasan_save_track+0x20/0x40 [ 22.111274] kasan_save_alloc_info+0x40/0x58 [ 22.111692] __kasan_mempool_unpoison_object+0xbc/0x180 [ 22.112191] remove_element+0x16c/0x1f8 [ 22.112564] mempool_alloc_preallocated+0x58/0xc0 [ 22.113013] mempool_oob_right_helper+0x98/0x2f0 [ 22.113456] mempool_slab_oob_right+0xc0/0x118 [ 22.113885] kunit_try_run_case+0x170/0x3f0 [ 22.114291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.114814] kthread+0x328/0x630 [ 22.115130] ret_from_fork+0x10/0x20 [ 22.115479] [ 22.115633] The buggy address belongs to the object at ffff00000f5c8240 [ 22.115633] which belongs to the cache test_cache of size 123 [ 22.116756] The buggy address is located 0 bytes to the right of [ 22.116756] allocated 123-byte region [ffff00000f5c8240, ffff00000f5c82bb) [ 22.117930] [ 22.118084] The buggy address belongs to the physical page: [ 22.118600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf5c8 [ 22.119324] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.119935] page_type: f5(slab) [ 22.120249] raw: 03fffe0000000000 ffff00000e042280 dead000000000122 0000000000000000 [ 22.120964] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 22.121673] page dumped because: kasan: bad access detected [ 22.122187] [ 22.122339] Memory state around the buggy address: [ 22.122788] ffff00000f5c8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.123452] ffff00000f5c8200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 22.124117] >ffff00000f5c8280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 22.124778] ^ [ 22.125251] ffff00000f5c8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.125917] ffff00000f5c8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.126579] ================================================================== [ 22.045244] ================================================================== [ 22.046274] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.046990] Read of size 1 at addr ffff00000e2f8673 by task kunit_try_catch/274 [ 22.047668] [ 22.047831] CPU: 2 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.047882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.047897] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.047915] Call trace: [ 22.047926] show_stack+0x20/0x38 (C) [ 22.047960] dump_stack_lvl+0x8c/0xd0 [ 22.047996] print_report+0x118/0x608 [ 22.048031] kasan_report+0xdc/0x128 [ 22.048063] __asan_report_load1_noabort+0x20/0x30 [ 22.048101] mempool_oob_right_helper+0x2ac/0x2f0 [ 22.048133] mempool_kmalloc_oob_right+0xc4/0x120 [ 22.048165] kunit_try_run_case+0x170/0x3f0 [ 22.048200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.048238] kthread+0x328/0x630 [ 22.048265] ret_from_fork+0x10/0x20 [ 22.048298] [ 22.054344] Allocated by task 274: [ 22.054676] kasan_save_stack+0x3c/0x68 [ 22.055058] kasan_save_track+0x20/0x40 [ 22.055432] kasan_save_alloc_info+0x40/0x58 [ 22.055850] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.056359] remove_element+0x130/0x1f8 [ 22.056731] mempool_alloc_preallocated+0x58/0xc0 [ 22.057181] mempool_oob_right_helper+0x98/0x2f0 [ 22.057625] mempool_kmalloc_oob_right+0xc4/0x120 [ 22.058075] kunit_try_run_case+0x170/0x3f0 [ 22.058481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.059005] kthread+0x328/0x630 [ 22.059321] ret_from_fork+0x10/0x20 [ 22.059670] [ 22.059823] The buggy address belongs to the object at ffff00000e2f8600 [ 22.059823] which belongs to the cache kmalloc-128 of size 128 [ 22.060957] The buggy address is located 0 bytes to the right of [ 22.060957] allocated 115-byte region [ffff00000e2f8600, ffff00000e2f8673) [ 22.062130] [ 22.062285] The buggy address belongs to the physical page: [ 22.062799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe2f8 [ 22.063523] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.064134] page_type: f5(slab) [ 22.064449] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 22.065167] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.065875] page dumped because: kasan: bad access detected [ 22.066391] [ 22.066543] Memory state around the buggy address: [ 22.066992] ffff00000e2f8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.067658] ffff00000e2f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.068324] >ffff00000e2f8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.068985] ^ [ 22.069618] ffff00000e2f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.070283] ffff00000e2f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.070945] ==================================================================