Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   35.722626] ==================================================================
[   35.722794] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.722921] Read of size 1 at addr ffff000801adc773 by task kunit_try_catch/266
[   35.729360] 
[   35.730844] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   35.730902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.730918] Hardware name: WinLink E850-96 board (DT)
[   35.730940] Call trace:
[   35.730960]  show_stack+0x20/0x38 (C)
[   35.730996]  dump_stack_lvl+0x8c/0xd0
[   35.731029]  print_report+0x118/0x608
[   35.731062]  kasan_report+0xdc/0x128
[   35.731093]  __asan_report_load1_noabort+0x20/0x30
[   35.731131]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.731161]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.731192]  kunit_try_run_case+0x170/0x3f0
[   35.731226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.731261]  kthread+0x328/0x630
[   35.731296]  ret_from_fork+0x10/0x20
[   35.731330] 
[   35.800103] Allocated by task 266:
[   35.803490]  kasan_save_stack+0x3c/0x68
[   35.807306]  kasan_save_track+0x20/0x40
[   35.811126]  kasan_save_alloc_info+0x40/0x58
[   35.815379]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.820674]  remove_element+0x130/0x1f8
[   35.824493]  mempool_alloc_preallocated+0x58/0xc0
[   35.829182]  mempool_oob_right_helper+0x98/0x2f0
[   35.833781]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.838469]  kunit_try_run_case+0x170/0x3f0
[   35.842635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.848103]  kthread+0x328/0x630
[   35.851316]  ret_from_fork+0x10/0x20
[   35.854875] 
[   35.856352] The buggy address belongs to the object at ffff000801adc700
[   35.856352]  which belongs to the cache kmalloc-128 of size 128
[   35.868853] The buggy address is located 0 bytes to the right of
[   35.868853]  allocated 115-byte region [ffff000801adc700, ffff000801adc773)
[   35.881784] 
[   35.883263] The buggy address belongs to the physical page:
[   35.888819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   35.896804] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.904443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.911386] page_type: f5(slab)
[   35.914524] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.922241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.929968] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.937779] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.945592] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   35.953404] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.961212] page dumped because: kasan: bad access detected
[   35.966765] 
[   35.968241] Memory state around the buggy address:
[   35.973023]  ffff000801adc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.980223]  ffff000801adc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.987430] >ffff000801adc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.994630]                                                              ^
[   36.001491]  ffff000801adc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.008697]  ffff000801adc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.015900] ==================================================================
[   36.024956] ==================================================================
[   36.034827] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.042375] Read of size 1 at addr ffff0008067b2001 by task kunit_try_catch/268
[   36.049665] 
[   36.051152] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   36.051209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.051225] Hardware name: WinLink E850-96 board (DT)
[   36.051246] Call trace:
[   36.051258]  show_stack+0x20/0x38 (C)
[   36.051294]  dump_stack_lvl+0x8c/0xd0
[   36.051324]  print_report+0x118/0x608
[   36.051361]  kasan_report+0xdc/0x128
[   36.051391]  __asan_report_load1_noabort+0x20/0x30
[   36.051430]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.051463]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   36.051498]  kunit_try_run_case+0x170/0x3f0
[   36.051531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.051564]  kthread+0x328/0x630
[   36.051599]  ret_from_fork+0x10/0x20
[   36.051634] 
[   36.120932] The buggy address belongs to the physical page:
[   36.126490] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b0
[   36.134474] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.142114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.149056] page_type: f8(unknown)
[   36.152453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.160172] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.167898] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.175710] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.183523] head: 0bfffe0000000002 fffffdffe019ec01 00000000ffffffff 00000000ffffffff
[   36.191335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.199140] page dumped because: kasan: bad access detected
[   36.204696] 
[   36.206172] Memory state around the buggy address:
[   36.210952]  ffff0008067b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.218154]  ffff0008067b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.225361] >ffff0008067b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.232560]                    ^
[   36.235776]  ffff0008067b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.242981]  ffff0008067b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.250183] ==================================================================
[   36.259805] ==================================================================
[   36.269633] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.277180] Read of size 1 at addr ffff0008068622bb by task kunit_try_catch/270
[   36.284471] 
[   36.285957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   36.286016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.286032] Hardware name: WinLink E850-96 board (DT)
[   36.286053] Call trace:
[   36.286067]  show_stack+0x20/0x38 (C)
[   36.286105]  dump_stack_lvl+0x8c/0xd0
[   36.286136]  print_report+0x118/0x608
[   36.286170]  kasan_report+0xdc/0x128
[   36.286200]  __asan_report_load1_noabort+0x20/0x30
[   36.286237]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.286271]  mempool_slab_oob_right+0xc0/0x118
[   36.286305]  kunit_try_run_case+0x170/0x3f0
[   36.286340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.286374]  kthread+0x328/0x630
[   36.286407]  ret_from_fork+0x10/0x20
[   36.286444] 
[   36.354957] Allocated by task 270:
[   36.358342]  kasan_save_stack+0x3c/0x68
[   36.362160]  kasan_save_track+0x20/0x40
[   36.365978]  kasan_save_alloc_info+0x40/0x58
[   36.370232]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.375440]  remove_element+0x16c/0x1f8
[   36.379259]  mempool_alloc_preallocated+0x58/0xc0
[   36.383948]  mempool_oob_right_helper+0x98/0x2f0
[   36.388548]  mempool_slab_oob_right+0xc0/0x118
[   36.392975]  kunit_try_run_case+0x170/0x3f0
[   36.397141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.402610]  kthread+0x328/0x630
[   36.405822]  ret_from_fork+0x10/0x20
[   36.409380] 
[   36.410858] The buggy address belongs to the object at ffff000806862240
[   36.410858]  which belongs to the cache test_cache of size 123
[   36.423273] The buggy address is located 0 bytes to the right of
[   36.423273]  allocated 123-byte region [ffff000806862240, ffff0008068622bb)
[   36.436203] 
[   36.437683] The buggy address belongs to the physical page:
[   36.443237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862
[   36.451223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.457731] page_type: f5(slab)
[   36.460870] raw: 0bfffe0000000000 ffff000802403400 dead000000000122 0000000000000000
[   36.468588] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.476306] page dumped because: kasan: bad access detected
[   36.481862] 
[   36.483338] Memory state around the buggy address:
[   36.488118]  ffff000806862180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.495322]  ffff000806862200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.502527] >ffff000806862280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.509726]                                         ^
[   36.514765]  ffff000806862300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.521969]  ffff000806862380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.529172] ==================================================================