Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.847046] ================================================================== [ 17.847813] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.847884] Read of size 1 at addr fff00000c7996001 by task kunit_try_catch/224 [ 17.847936] [ 17.848426] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.848521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.848549] Hardware name: linux,dummy-virt (DT) [ 17.848579] Call trace: [ 17.848602] show_stack+0x20/0x38 (C) [ 17.848652] dump_stack_lvl+0x8c/0xd0 [ 17.848699] print_report+0x118/0x5d0 [ 17.848746] kasan_report+0xdc/0x128 [ 17.848790] __asan_report_load1_noabort+0x20/0x30 [ 17.848840] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.848888] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.848942] kunit_try_run_case+0x170/0x3f0 [ 17.848994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.849047] kthread+0x328/0x630 [ 17.849086] ret_from_fork+0x10/0x20 [ 17.849133] [ 17.849153] The buggy address belongs to the physical page: [ 17.849186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994 [ 17.849258] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.849305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.849358] page_type: f8(unknown) [ 17.849397] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.849448] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.849498] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.849549] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.849600] head: 0bfffe0000000002 ffffc1ffc31e6501 00000000ffffffff 00000000ffffffff [ 17.850295] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.850393] page dumped because: kasan: bad access detected [ 17.850427] [ 17.850494] Memory state around the buggy address: [ 17.850526] fff00000c7995f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.850946] fff00000c7995f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.851235] >fff00000c7996000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.851279] ^ [ 17.851308] fff00000c7996080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.851933] fff00000c7996100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.852243] ================================================================== [ 17.834174] ================================================================== [ 17.834271] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.834339] Read of size 1 at addr fff00000c5866a73 by task kunit_try_catch/222 [ 17.834391] [ 17.834433] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.834519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.834547] Hardware name: linux,dummy-virt (DT) [ 17.834578] Call trace: [ 17.834603] show_stack+0x20/0x38 (C) [ 17.834654] dump_stack_lvl+0x8c/0xd0 [ 17.834704] print_report+0x118/0x5d0 [ 17.834749] kasan_report+0xdc/0x128 [ 17.834794] __asan_report_load1_noabort+0x20/0x30 [ 17.834844] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.834894] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.834942] kunit_try_run_case+0x170/0x3f0 [ 17.834991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.835044] kthread+0x328/0x630 [ 17.835086] ret_from_fork+0x10/0x20 [ 17.835135] [ 17.835156] Allocated by task 222: [ 17.835183] kasan_save_stack+0x3c/0x68 [ 17.835236] kasan_save_track+0x20/0x40 [ 17.835274] kasan_save_alloc_info+0x40/0x58 [ 17.835315] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.835360] remove_element+0x130/0x1f8 [ 17.835399] mempool_alloc_preallocated+0x58/0xc0 [ 17.835438] mempool_oob_right_helper+0x98/0x2f0 [ 17.835476] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.835516] kunit_try_run_case+0x170/0x3f0 [ 17.835553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.835595] kthread+0x328/0x630 [ 17.835628] ret_from_fork+0x10/0x20 [ 17.835664] [ 17.835683] The buggy address belongs to the object at fff00000c5866a00 [ 17.835683] which belongs to the cache kmalloc-128 of size 128 [ 17.835744] The buggy address is located 0 bytes to the right of [ 17.835744] allocated 115-byte region [fff00000c5866a00, fff00000c5866a73) [ 17.835809] [ 17.835831] The buggy address belongs to the physical page: [ 17.835865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866 [ 17.835920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.835972] page_type: f5(slab) [ 17.836013] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.836064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.836106] page dumped because: kasan: bad access detected [ 17.836139] [ 17.836375] Memory state around the buggy address: [ 17.836422] fff00000c5866900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.836468] fff00000c5866980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.836512] >fff00000c5866a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.836551] ^ [ 17.836592] fff00000c5866a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.836635] fff00000c5866b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.836673] ================================================================== [ 17.865312] ================================================================== [ 17.865791] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.866130] Read of size 1 at addr fff00000c58c02bb by task kunit_try_catch/226 [ 17.867229] [ 17.867268] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.867353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.867379] Hardware name: linux,dummy-virt (DT) [ 17.868357] Call trace: [ 17.868494] show_stack+0x20/0x38 (C) [ 17.868550] dump_stack_lvl+0x8c/0xd0 [ 17.868599] print_report+0x118/0x5d0 [ 17.868645] kasan_report+0xdc/0x128 [ 17.868690] __asan_report_load1_noabort+0x20/0x30 [ 17.869108] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.870160] mempool_slab_oob_right+0xc0/0x118 [ 17.870370] kunit_try_run_case+0x170/0x3f0 [ 17.870422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.870476] kthread+0x328/0x630 [ 17.870956] ret_from_fork+0x10/0x20 [ 17.871714] [ 17.872009] Allocated by task 226: [ 17.872105] kasan_save_stack+0x3c/0x68 [ 17.872429] kasan_save_track+0x20/0x40 [ 17.872552] kasan_save_alloc_info+0x40/0x58 [ 17.872591] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.872748] remove_element+0x16c/0x1f8 [ 17.872791] mempool_alloc_preallocated+0x58/0xc0 [ 17.872831] mempool_oob_right_helper+0x98/0x2f0 [ 17.873697] mempool_slab_oob_right+0xc0/0x118 [ 17.873872] kunit_try_run_case+0x170/0x3f0 [ 17.873962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.874256] kthread+0x328/0x630 [ 17.874673] ret_from_fork+0x10/0x20 [ 17.874718] [ 17.874787] The buggy address belongs to the object at fff00000c58c0240 [ 17.874787] which belongs to the cache test_cache of size 123 [ 17.875074] The buggy address is located 0 bytes to the right of [ 17.875074] allocated 123-byte region [fff00000c58c0240, fff00000c58c02bb) [ 17.875981] [ 17.876070] The buggy address belongs to the physical page: [ 17.876210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c0 [ 17.876427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.876480] page_type: f5(slab) [ 17.876891] raw: 0bfffe0000000000 fff00000c708c500 dead000000000122 0000000000000000 [ 17.877104] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.877482] page dumped because: kasan: bad access detected [ 17.877632] [ 17.877652] Memory state around the buggy address: [ 17.877869] fff00000c58c0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.878130] fff00000c58c0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.878243] >fff00000c58c0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.878478] ^ [ 17.878518] fff00000c58c0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.879013] fff00000c58c0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.879509] ==================================================================
[ 18.566525] ================================================================== [ 18.566598] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.566668] Read of size 1 at addr fff00000c5aaea73 by task kunit_try_catch/222 [ 18.566722] [ 18.566761] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.566847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.566873] Hardware name: linux,dummy-virt (DT) [ 18.566906] Call trace: [ 18.566931] show_stack+0x20/0x38 (C) [ 18.566982] dump_stack_lvl+0x8c/0xd0 [ 18.567032] print_report+0x118/0x5d0 [ 18.567077] kasan_report+0xdc/0x128 [ 18.567121] __asan_report_load1_noabort+0x20/0x30 [ 18.567172] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.567234] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.567281] kunit_try_run_case+0x170/0x3f0 [ 18.567332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.567383] kthread+0x328/0x630 [ 18.567942] ret_from_fork+0x10/0x20 [ 18.567992] [ 18.568011] Allocated by task 222: [ 18.568041] kasan_save_stack+0x3c/0x68 [ 18.568081] kasan_save_track+0x20/0x40 [ 18.568120] kasan_save_alloc_info+0x40/0x58 [ 18.568160] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.568221] remove_element+0x130/0x1f8 [ 18.568260] mempool_alloc_preallocated+0x58/0xc0 [ 18.568299] mempool_oob_right_helper+0x98/0x2f0 [ 18.568337] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.568377] kunit_try_run_case+0x170/0x3f0 [ 18.568417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.568461] kthread+0x328/0x630 [ 18.568493] ret_from_fork+0x10/0x20 [ 18.568530] [ 18.568549] The buggy address belongs to the object at fff00000c5aaea00 [ 18.568549] which belongs to the cache kmalloc-128 of size 128 [ 18.568608] The buggy address is located 0 bytes to the right of [ 18.568608] allocated 115-byte region [fff00000c5aaea00, fff00000c5aaea73) [ 18.568674] [ 18.568695] The buggy address belongs to the physical page: [ 18.568729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae [ 18.568783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.568835] page_type: f5(slab) [ 18.568878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.568929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.568971] page dumped because: kasan: bad access detected [ 18.569004] [ 18.569022] Memory state around the buggy address: [ 18.569054] fff00000c5aae900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.569099] fff00000c5aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.569144] >fff00000c5aaea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.569197] ^ [ 18.569238] fff00000c5aaea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.569281] fff00000c5aaeb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.569321] ================================================================== [ 18.622290] ================================================================== [ 18.622373] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.622431] Read of size 1 at addr fff00000c5ada2bb by task kunit_try_catch/226 [ 18.622483] [ 18.622519] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.622605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.622634] Hardware name: linux,dummy-virt (DT) [ 18.622666] Call trace: [ 18.622688] show_stack+0x20/0x38 (C) [ 18.622736] dump_stack_lvl+0x8c/0xd0 [ 18.622783] print_report+0x118/0x5d0 [ 18.622829] kasan_report+0xdc/0x128 [ 18.622872] __asan_report_load1_noabort+0x20/0x30 [ 18.622923] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.622972] mempool_slab_oob_right+0xc0/0x118 [ 18.623020] kunit_try_run_case+0x170/0x3f0 [ 18.623070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.623124] kthread+0x328/0x630 [ 18.623167] ret_from_fork+0x10/0x20 [ 18.623231] [ 18.623249] Allocated by task 226: [ 18.623278] kasan_save_stack+0x3c/0x68 [ 18.623319] kasan_save_track+0x20/0x40 [ 18.623357] kasan_save_alloc_info+0x40/0x58 [ 18.623612] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.623666] remove_element+0x16c/0x1f8 [ 18.623704] mempool_alloc_preallocated+0x58/0xc0 [ 18.623744] mempool_oob_right_helper+0x98/0x2f0 [ 18.623784] mempool_slab_oob_right+0xc0/0x118 [ 18.623821] kunit_try_run_case+0x170/0x3f0 [ 18.623859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.623902] kthread+0x328/0x630 [ 18.623933] ret_from_fork+0x10/0x20 [ 18.624261] [ 18.624283] The buggy address belongs to the object at fff00000c5ada240 [ 18.624283] which belongs to the cache test_cache of size 123 [ 18.624345] The buggy address is located 0 bytes to the right of [ 18.624345] allocated 123-byte region [fff00000c5ada240, fff00000c5ada2bb) [ 18.624410] [ 18.624431] The buggy address belongs to the physical page: [ 18.624464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ada [ 18.624520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.624570] page_type: f5(slab) [ 18.624610] raw: 0bfffe0000000000 fff00000ffe8cf00 dead000000000122 0000000000000000 [ 18.624661] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.624702] page dumped because: kasan: bad access detected [ 18.624733] [ 18.624750] Memory state around the buggy address: [ 18.624783] fff00000c5ada180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.624828] fff00000c5ada200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.624873] >fff00000c5ada280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.624913] ^ [ 18.624947] fff00000c5ada300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.624991] fff00000c5ada380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.625030] ================================================================== [ 18.582596] ================================================================== [ 18.582661] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.582714] Read of size 1 at addr fff00000c78e2001 by task kunit_try_catch/224 [ 18.582765] [ 18.582797] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.582881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.582908] Hardware name: linux,dummy-virt (DT) [ 18.582939] Call trace: [ 18.582960] show_stack+0x20/0x38 (C) [ 18.583008] dump_stack_lvl+0x8c/0xd0 [ 18.583053] print_report+0x118/0x5d0 [ 18.583099] kasan_report+0xdc/0x128 [ 18.583143] __asan_report_load1_noabort+0x20/0x30 [ 18.586005] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.586122] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.586441] kunit_try_run_case+0x170/0x3f0 [ 18.586500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.586553] kthread+0x328/0x630 [ 18.586593] ret_from_fork+0x10/0x20 [ 18.586642] [ 18.586664] The buggy address belongs to the physical page: [ 18.586697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0 [ 18.587068] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.587130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.587251] page_type: f8(unknown) [ 18.587377] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.587573] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.587669] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.587719] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.588006] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff [ 18.588109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.588227] page dumped because: kasan: bad access detected [ 18.588278] [ 18.588296] Memory state around the buggy address: [ 18.588329] fff00000c78e1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.588373] fff00000c78e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.588452] >fff00000c78e2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.588598] ^ [ 18.588624] fff00000c78e2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.588667] fff00000c78e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.588755] ==================================================================
[ 14.155571] ================================================================== [ 14.156346] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.156736] Read of size 1 at addr ffff8881034452bb by task kunit_try_catch/242 [ 14.157046] [ 14.157215] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.157281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.157293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.157316] Call Trace: [ 14.157330] <TASK> [ 14.157347] dump_stack_lvl+0x73/0xb0 [ 14.157380] print_report+0xd1/0x610 [ 14.157420] ? __virt_addr_valid+0x1db/0x2d0 [ 14.157444] ? mempool_oob_right_helper+0x318/0x380 [ 14.157487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.157530] ? mempool_oob_right_helper+0x318/0x380 [ 14.157555] kasan_report+0x141/0x180 [ 14.157593] ? mempool_oob_right_helper+0x318/0x380 [ 14.157629] __asan_report_load1_noabort+0x18/0x20 [ 14.157665] mempool_oob_right_helper+0x318/0x380 [ 14.157690] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.157718] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.157741] ? finish_task_switch.isra.0+0x153/0x700 [ 14.157768] mempool_slab_oob_right+0xed/0x140 [ 14.157793] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 14.157822] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 14.157867] ? __pfx_mempool_free_slab+0x10/0x10 [ 14.157903] ? __pfx_read_tsc+0x10/0x10 [ 14.157925] ? ktime_get_ts64+0x86/0x230 [ 14.157961] kunit_try_run_case+0x1a5/0x480 [ 14.157987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.158025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.158051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.158084] ? __kthread_parkme+0x82/0x180 [ 14.158106] ? preempt_count_sub+0x50/0x80 [ 14.158130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.158165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.158190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.158216] kthread+0x337/0x6f0 [ 14.158235] ? trace_preempt_on+0x20/0xc0 [ 14.158260] ? __pfx_kthread+0x10/0x10 [ 14.158280] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.158302] ? calculate_sigpending+0x7b/0xa0 [ 14.158327] ? __pfx_kthread+0x10/0x10 [ 14.158349] ret_from_fork+0x116/0x1d0 [ 14.158368] ? __pfx_kthread+0x10/0x10 [ 14.158388] ret_from_fork_asm+0x1a/0x30 [ 14.158428] </TASK> [ 14.158438] [ 14.168111] Allocated by task 242: [ 14.168286] kasan_save_stack+0x45/0x70 [ 14.168509] kasan_save_track+0x18/0x40 [ 14.168646] kasan_save_alloc_info+0x3b/0x50 [ 14.168797] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 14.169132] remove_element+0x11e/0x190 [ 14.169295] mempool_alloc_preallocated+0x4d/0x90 [ 14.169629] mempool_oob_right_helper+0x8a/0x380 [ 14.169836] mempool_slab_oob_right+0xed/0x140 [ 14.169989] kunit_try_run_case+0x1a5/0x480 [ 14.170137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.170340] kthread+0x337/0x6f0 [ 14.170654] ret_from_fork+0x116/0x1d0 [ 14.170854] ret_from_fork_asm+0x1a/0x30 [ 14.171054] [ 14.171152] The buggy address belongs to the object at ffff888103445240 [ 14.171152] which belongs to the cache test_cache of size 123 [ 14.171531] The buggy address is located 0 bytes to the right of [ 14.171531] allocated 123-byte region [ffff888103445240, ffff8881034452bb) [ 14.172176] [ 14.172277] The buggy address belongs to the physical page: [ 14.172593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103445 [ 14.172897] flags: 0x200000000000000(node=0|zone=2) [ 14.173104] page_type: f5(slab) [ 14.173265] raw: 0200000000000000 ffff888101a22780 dead000000000122 0000000000000000 [ 14.173569] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 14.173900] page dumped because: kasan: bad access detected [ 14.174079] [ 14.174149] Memory state around the buggy address: [ 14.174376] ffff888103445180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.174704] ffff888103445200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 14.174985] >ffff888103445280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 14.175197] ^ [ 14.175368] ffff888103445300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.175696] ffff888103445380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.175952] ================================================================== [ 14.099987] ================================================================== [ 14.100437] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.101097] Read of size 1 at addr ffff8881026ce173 by task kunit_try_catch/238 [ 14.101403] [ 14.101537] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.101586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.101598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.101621] Call Trace: [ 14.101634] <TASK> [ 14.101654] dump_stack_lvl+0x73/0xb0 [ 14.101687] print_report+0xd1/0x610 [ 14.101711] ? __virt_addr_valid+0x1db/0x2d0 [ 14.101737] ? mempool_oob_right_helper+0x318/0x380 [ 14.101762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.101786] ? mempool_oob_right_helper+0x318/0x380 [ 14.101811] kasan_report+0x141/0x180 [ 14.101832] ? mempool_oob_right_helper+0x318/0x380 [ 14.102343] __asan_report_load1_noabort+0x18/0x20 [ 14.102372] mempool_oob_right_helper+0x318/0x380 [ 14.102398] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.102440] ? __kasan_check_write+0x18/0x20 [ 14.102472] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.102497] ? finish_task_switch.isra.0+0x153/0x700 [ 14.102525] mempool_kmalloc_oob_right+0xf2/0x150 [ 14.102549] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 14.102587] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.102614] ? __pfx_mempool_kfree+0x10/0x10 [ 14.102639] ? __pfx_read_tsc+0x10/0x10 [ 14.102662] ? ktime_get_ts64+0x86/0x230 [ 14.102687] kunit_try_run_case+0x1a5/0x480 [ 14.102715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.102740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.102767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.102791] ? __kthread_parkme+0x82/0x180 [ 14.102813] ? preempt_count_sub+0x50/0x80 [ 14.102836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.102861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.102886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.102911] kthread+0x337/0x6f0 [ 14.102931] ? trace_preempt_on+0x20/0xc0 [ 14.102954] ? __pfx_kthread+0x10/0x10 [ 14.102975] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.102997] ? calculate_sigpending+0x7b/0xa0 [ 14.103023] ? __pfx_kthread+0x10/0x10 [ 14.103044] ret_from_fork+0x116/0x1d0 [ 14.103064] ? __pfx_kthread+0x10/0x10 [ 14.103084] ret_from_fork_asm+0x1a/0x30 [ 14.103116] </TASK> [ 14.103127] [ 14.115127] Allocated by task 238: [ 14.115310] kasan_save_stack+0x45/0x70 [ 14.115565] kasan_save_track+0x18/0x40 [ 14.115950] kasan_save_alloc_info+0x3b/0x50 [ 14.116306] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.116568] remove_element+0x11e/0x190 [ 14.116916] mempool_alloc_preallocated+0x4d/0x90 [ 14.117223] mempool_oob_right_helper+0x8a/0x380 [ 14.117430] mempool_kmalloc_oob_right+0xf2/0x150 [ 14.117770] kunit_try_run_case+0x1a5/0x480 [ 14.117978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.118217] kthread+0x337/0x6f0 [ 14.118389] ret_from_fork+0x116/0x1d0 [ 14.118712] ret_from_fork_asm+0x1a/0x30 [ 14.118920] [ 14.119018] The buggy address belongs to the object at ffff8881026ce100 [ 14.119018] which belongs to the cache kmalloc-128 of size 128 [ 14.119444] The buggy address is located 0 bytes to the right of [ 14.119444] allocated 115-byte region [ffff8881026ce100, ffff8881026ce173) [ 14.120336] [ 14.120461] The buggy address belongs to the physical page: [ 14.120915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.121369] flags: 0x200000000000000(node=0|zone=2) [ 14.121825] page_type: f5(slab) [ 14.121993] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.122317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.122661] page dumped because: kasan: bad access detected [ 14.123049] [ 14.123280] Memory state around the buggy address: [ 14.123558] ffff8881026ce000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.124117] ffff8881026ce080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124507] >ffff8881026ce100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.124909] ^ [ 14.125272] ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.125673] ffff8881026ce200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.126019] ================================================================== [ 14.131182] ================================================================== [ 14.132009] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.132398] Read of size 1 at addr ffff888103a5e001 by task kunit_try_catch/240 [ 14.132883] [ 14.133011] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.133093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.133129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.133153] Call Trace: [ 14.133166] <TASK> [ 14.133184] dump_stack_lvl+0x73/0xb0 [ 14.133230] print_report+0xd1/0x610 [ 14.133254] ? __virt_addr_valid+0x1db/0x2d0 [ 14.133281] ? mempool_oob_right_helper+0x318/0x380 [ 14.133306] ? kasan_addr_to_slab+0x11/0xa0 [ 14.133328] ? mempool_oob_right_helper+0x318/0x380 [ 14.133380] kasan_report+0x141/0x180 [ 14.133402] ? mempool_oob_right_helper+0x318/0x380 [ 14.133431] __asan_report_load1_noabort+0x18/0x20 [ 14.133479] mempool_oob_right_helper+0x318/0x380 [ 14.133505] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.133548] ? __kasan_check_write+0x18/0x20 [ 14.133600] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.133624] ? finish_task_switch.isra.0+0x153/0x700 [ 14.133652] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 14.133684] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 14.133714] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.133740] ? __pfx_mempool_kfree+0x10/0x10 [ 14.133766] ? __pfx_read_tsc+0x10/0x10 [ 14.133787] ? ktime_get_ts64+0x86/0x230 [ 14.133813] kunit_try_run_case+0x1a5/0x480 [ 14.133840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.133863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.133889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.133913] ? __kthread_parkme+0x82/0x180 [ 14.133935] ? preempt_count_sub+0x50/0x80 [ 14.133958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.133983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.134008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.134034] kthread+0x337/0x6f0 [ 14.134053] ? trace_preempt_on+0x20/0xc0 [ 14.134078] ? __pfx_kthread+0x10/0x10 [ 14.134098] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.134120] ? calculate_sigpending+0x7b/0xa0 [ 14.134146] ? __pfx_kthread+0x10/0x10 [ 14.134167] ret_from_fork+0x116/0x1d0 [ 14.134186] ? __pfx_kthread+0x10/0x10 [ 14.134207] ret_from_fork_asm+0x1a/0x30 [ 14.134238] </TASK> [ 14.134248] [ 14.144105] The buggy address belongs to the physical page: [ 14.144416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a5c [ 14.144871] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.145198] flags: 0x200000000000040(head|node=0|zone=2) [ 14.145508] page_type: f8(unknown) [ 14.145789] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.146154] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.146544] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.147004] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.147353] head: 0200000000000002 ffffea00040e9701 00000000ffffffff 00000000ffffffff [ 14.147835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.148159] page dumped because: kasan: bad access detected [ 14.148431] [ 14.148647] Memory state around the buggy address: [ 14.148832] ffff888103a5df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.149088] ffff888103a5df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.149300] >ffff888103a5e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.149520] ^ [ 14.149636] ffff888103a5e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.149843] ffff888103a5e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.150050] ==================================================================
[ 14.296533] ================================================================== [ 14.297424] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.298258] Read of size 1 at addr ffff888102b2ea73 by task kunit_try_catch/239 [ 14.298880] [ 14.299015] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.299078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.299091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.299114] Call Trace: [ 14.299127] <TASK> [ 14.299145] dump_stack_lvl+0x73/0xb0 [ 14.299280] print_report+0xd1/0x610 [ 14.299304] ? __virt_addr_valid+0x1db/0x2d0 [ 14.299330] ? mempool_oob_right_helper+0x318/0x380 [ 14.299353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.299378] ? mempool_oob_right_helper+0x318/0x380 [ 14.299403] kasan_report+0x141/0x180 [ 14.299425] ? mempool_oob_right_helper+0x318/0x380 [ 14.299454] __asan_report_load1_noabort+0x18/0x20 [ 14.299479] mempool_oob_right_helper+0x318/0x380 [ 14.299505] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.299532] ? __kasan_check_write+0x18/0x20 [ 14.299552] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.299576] ? finish_task_switch.isra.0+0x153/0x700 [ 14.299603] mempool_kmalloc_oob_right+0xf2/0x150 [ 14.299628] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 14.299723] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.299749] ? __pfx_mempool_kfree+0x10/0x10 [ 14.299775] ? __pfx_read_tsc+0x10/0x10 [ 14.299801] ? ktime_get_ts64+0x86/0x230 [ 14.299826] kunit_try_run_case+0x1a5/0x480 [ 14.299853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.299877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.299902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.299926] ? __kthread_parkme+0x82/0x180 [ 14.299948] ? preempt_count_sub+0x50/0x80 [ 14.299971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.299996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.300022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.300048] kthread+0x337/0x6f0 [ 14.300081] ? trace_preempt_on+0x20/0xc0 [ 14.300105] ? __pfx_kthread+0x10/0x10 [ 14.300126] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.300148] ? calculate_sigpending+0x7b/0xa0 [ 14.300174] ? __pfx_kthread+0x10/0x10 [ 14.300196] ret_from_fork+0x116/0x1d0 [ 14.300216] ? __pfx_kthread+0x10/0x10 [ 14.300237] ret_from_fork_asm+0x1a/0x30 [ 14.300268] </TASK> [ 14.300278] [ 14.310367] Allocated by task 239: [ 14.310533] kasan_save_stack+0x45/0x70 [ 14.310683] kasan_save_track+0x18/0x40 [ 14.310848] kasan_save_alloc_info+0x3b/0x50 [ 14.311073] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.311390] remove_element+0x11e/0x190 [ 14.311788] mempool_alloc_preallocated+0x4d/0x90 [ 14.312048] mempool_oob_right_helper+0x8a/0x380 [ 14.312336] mempool_kmalloc_oob_right+0xf2/0x150 [ 14.312698] kunit_try_run_case+0x1a5/0x480 [ 14.312972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.313311] kthread+0x337/0x6f0 [ 14.313475] ret_from_fork+0x116/0x1d0 [ 14.313743] ret_from_fork_asm+0x1a/0x30 [ 14.313901] [ 14.313976] The buggy address belongs to the object at ffff888102b2ea00 [ 14.313976] which belongs to the cache kmalloc-128 of size 128 [ 14.314468] The buggy address is located 0 bytes to the right of [ 14.314468] allocated 115-byte region [ffff888102b2ea00, ffff888102b2ea73) [ 14.315075] [ 14.315156] The buggy address belongs to the physical page: [ 14.315420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2e [ 14.315837] flags: 0x200000000000000(node=0|zone=2) [ 14.316073] page_type: f5(slab) [ 14.316383] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.316766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.317181] page dumped because: kasan: bad access detected [ 14.317357] [ 14.317427] Memory state around the buggy address: [ 14.317614] ffff888102b2e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.318045] ffff888102b2e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.318396] >ffff888102b2ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.318805] ^ [ 14.319141] ffff888102b2ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.319457] ffff888102b2eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.319757] ================================================================== [ 14.322643] ================================================================== [ 14.323948] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.324587] Read of size 1 at addr ffff888103bba001 by task kunit_try_catch/241 [ 14.325067] [ 14.325187] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.325233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.325246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.325267] Call Trace: [ 14.325279] <TASK> [ 14.325293] dump_stack_lvl+0x73/0xb0 [ 14.325323] print_report+0xd1/0x610 [ 14.325346] ? __virt_addr_valid+0x1db/0x2d0 [ 14.325370] ? mempool_oob_right_helper+0x318/0x380 [ 14.325395] ? kasan_addr_to_slab+0x11/0xa0 [ 14.325417] ? mempool_oob_right_helper+0x318/0x380 [ 14.325444] kasan_report+0x141/0x180 [ 14.325465] ? mempool_oob_right_helper+0x318/0x380 [ 14.325495] __asan_report_load1_noabort+0x18/0x20 [ 14.325521] mempool_oob_right_helper+0x318/0x380 [ 14.325548] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.325575] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.325598] ? finish_task_switch.isra.0+0x153/0x700 [ 14.325625] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 14.325652] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 14.325682] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.325707] ? __pfx_mempool_kfree+0x10/0x10 [ 14.325732] ? __pfx_read_tsc+0x10/0x10 [ 14.325757] ? ktime_get_ts64+0x86/0x230 [ 14.325782] kunit_try_run_case+0x1a5/0x480 [ 14.325807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.325854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.325880] ? __kthread_parkme+0x82/0x180 [ 14.325900] ? preempt_count_sub+0x50/0x80 [ 14.325924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.325975] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.326001] kthread+0x337/0x6f0 [ 14.326020] ? trace_preempt_on+0x20/0xc0 [ 14.326045] ? __pfx_kthread+0x10/0x10 [ 14.326077] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.326099] ? calculate_sigpending+0x7b/0xa0 [ 14.326150] ? __pfx_kthread+0x10/0x10 [ 14.326172] ret_from_fork+0x116/0x1d0 [ 14.326322] ? __pfx_kthread+0x10/0x10 [ 14.326344] ret_from_fork_asm+0x1a/0x30 [ 14.326375] </TASK> [ 14.326385] [ 14.339071] The buggy address belongs to the physical page: [ 14.339570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bb8 [ 14.340112] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.340481] flags: 0x200000000000040(head|node=0|zone=2) [ 14.341116] page_type: f8(unknown) [ 14.341392] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.341953] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.342369] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.342933] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.343407] head: 0200000000000002 ffffea00040eee01 00000000ffffffff 00000000ffffffff [ 14.343961] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.344437] page dumped because: kasan: bad access detected [ 14.344859] [ 14.344959] Memory state around the buggy address: [ 14.345389] ffff888103bb9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.345688] ffff888103bb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.346141] >ffff888103bba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.346470] ^ [ 14.346809] ffff888103bba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.347276] ffff888103bba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.347712] ================================================================== [ 14.354006] ================================================================== [ 14.354643] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.355178] Read of size 1 at addr ffff888102b4d2bb by task kunit_try_catch/243 [ 14.355769] [ 14.355956] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.356004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.356017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.356037] Call Trace: [ 14.356049] <TASK> [ 14.356077] dump_stack_lvl+0x73/0xb0 [ 14.356143] print_report+0xd1/0x610 [ 14.356168] ? __virt_addr_valid+0x1db/0x2d0 [ 14.356191] ? mempool_oob_right_helper+0x318/0x380 [ 14.356217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.356240] ? mempool_oob_right_helper+0x318/0x380 [ 14.356265] kasan_report+0x141/0x180 [ 14.356288] ? mempool_oob_right_helper+0x318/0x380 [ 14.356318] __asan_report_load1_noabort+0x18/0x20 [ 14.356344] mempool_oob_right_helper+0x318/0x380 [ 14.356369] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.356393] ? update_load_avg+0x1be/0x21b0 [ 14.356422] ? finish_task_switch.isra.0+0x153/0x700 [ 14.356449] mempool_slab_oob_right+0xed/0x140 [ 14.356474] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 14.356502] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 14.356529] ? __pfx_mempool_free_slab+0x10/0x10 [ 14.356556] ? __pfx_read_tsc+0x10/0x10 [ 14.356579] ? ktime_get_ts64+0x86/0x230 [ 14.356604] kunit_try_run_case+0x1a5/0x480 [ 14.356631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.356719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.356747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.356771] ? __kthread_parkme+0x82/0x180 [ 14.356793] ? preempt_count_sub+0x50/0x80 [ 14.356817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.356842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.356868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.356896] kthread+0x337/0x6f0 [ 14.356914] ? trace_preempt_on+0x20/0xc0 [ 14.356938] ? __pfx_kthread+0x10/0x10 [ 14.356960] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.356982] ? calculate_sigpending+0x7b/0xa0 [ 14.357007] ? __pfx_kthread+0x10/0x10 [ 14.357029] ret_from_fork+0x116/0x1d0 [ 14.357049] ? __pfx_kthread+0x10/0x10 [ 14.357083] ret_from_fork_asm+0x1a/0x30 [ 14.357114] </TASK> [ 14.357124] [ 14.371149] Allocated by task 243: [ 14.371483] kasan_save_stack+0x45/0x70 [ 14.371890] kasan_save_track+0x18/0x40 [ 14.372369] kasan_save_alloc_info+0x3b/0x50 [ 14.372825] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 14.373007] remove_element+0x11e/0x190 [ 14.373195] mempool_alloc_preallocated+0x4d/0x90 [ 14.373600] mempool_oob_right_helper+0x8a/0x380 [ 14.374200] mempool_slab_oob_right+0xed/0x140 [ 14.374622] kunit_try_run_case+0x1a5/0x480 [ 14.375094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.375526] kthread+0x337/0x6f0 [ 14.375703] ret_from_fork+0x116/0x1d0 [ 14.376071] ret_from_fork_asm+0x1a/0x30 [ 14.376349] [ 14.376424] The buggy address belongs to the object at ffff888102b4d240 [ 14.376424] which belongs to the cache test_cache of size 123 [ 14.377110] The buggy address is located 0 bytes to the right of [ 14.377110] allocated 123-byte region [ffff888102b4d240, ffff888102b4d2bb) [ 14.378463] [ 14.378636] The buggy address belongs to the physical page: [ 14.379027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4d [ 14.379688] flags: 0x200000000000000(node=0|zone=2) [ 14.380136] page_type: f5(slab) [ 14.380261] raw: 0200000000000000 ffff888101b19c80 dead000000000122 0000000000000000 [ 14.380494] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 14.381003] page dumped because: kasan: bad access detected [ 14.381534] [ 14.381851] Memory state around the buggy address: [ 14.382328] ffff888102b4d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.382982] ffff888102b4d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 14.383676] >ffff888102b4d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 14.384262] ^ [ 14.384432] ffff888102b4d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.384651] ffff888102b4d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.385397] ==================================================================