Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 47.618858] ================================================================== [ 47.630776] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 47.638455] Read of size 1 at addr ffff000095372001 by task kunit_try_catch/309 [ 47.645865] [ 47.647401] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 47.647433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.647442] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.647455] Call trace: [ 47.647462] show_stack+0x20/0x38 (C) [ 47.647484] dump_stack_lvl+0x8c/0xd0 [ 47.647507] print_report+0x118/0x608 [ 47.647530] kasan_report+0xdc/0x128 [ 47.647550] __asan_report_load1_noabort+0x20/0x30 [ 47.647568] mempool_oob_right_helper+0x2ac/0x2f0 [ 47.647588] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 47.647610] kunit_try_run_case+0x170/0x3f0 [ 47.647630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.647652] kthread+0x328/0x630 [ 47.647671] ret_from_fork+0x10/0x20 [ 47.647691] [ 47.719191] The buggy address belongs to the physical page: [ 47.724838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115370 [ 47.732943] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.740702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.747767] page_type: f8(unknown) [ 47.751234] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.759080] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 47.766925] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.774856] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 47.782789] head: 0bfffe0000000002 fffffdffc254dc01 00000000ffffffff 00000000ffffffff [ 47.790721] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 47.798647] page dumped because: kasan: bad access detected [ 47.804291] [ 47.805821] Memory state around the buggy address: [ 47.810685] ffff000095371f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.818000] ffff000095371f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.825324] >ffff000095372000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.832644] ^ [ 47.835935] ffff000095372080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.843250] ffff000095372100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.850562] ================================================================== [ 47.862534] ================================================================== [ 47.874986] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 47.882667] Read of size 1 at addr ffff000096c812bb by task kunit_try_catch/311 [ 47.890079] [ 47.891614] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 47.891649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.891658] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.891674] Call trace: [ 47.891682] show_stack+0x20/0x38 (C) [ 47.891703] dump_stack_lvl+0x8c/0xd0 [ 47.891724] print_report+0x118/0x608 [ 47.891744] kasan_report+0xdc/0x128 [ 47.891761] __asan_report_load1_noabort+0x20/0x30 [ 47.891778] mempool_oob_right_helper+0x2ac/0x2f0 [ 47.891797] mempool_slab_oob_right+0xc0/0x118 [ 47.891818] kunit_try_run_case+0x170/0x3f0 [ 47.891837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.891859] kthread+0x328/0x630 [ 47.891873] ret_from_fork+0x10/0x20 [ 47.891891] [ 47.962604] Allocated by task 311: [ 47.966064] kasan_save_stack+0x3c/0x68 [ 47.969976] kasan_save_track+0x20/0x40 [ 47.973885] kasan_save_alloc_info+0x40/0x58 [ 47.978224] __kasan_mempool_unpoison_object+0xbc/0x180 [ 47.983537] remove_element+0x16c/0x1f8 [ 47.987447] mempool_alloc_preallocated+0x58/0xc0 [ 47.992226] mempool_oob_right_helper+0x98/0x2f0 [ 47.996924] mempool_slab_oob_right+0xc0/0x118 [ 48.001441] kunit_try_run_case+0x170/0x3f0 [ 48.005694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.011267] kthread+0x328/0x630 [ 48.014559] ret_from_fork+0x10/0x20 [ 48.018197] [ 48.019725] The buggy address belongs to the object at ffff000096c81240 [ 48.019725] which belongs to the cache test_cache of size 123 [ 48.032302] The buggy address is located 0 bytes to the right of [ 48.032302] allocated 123-byte region [ffff000096c81240, ffff000096c812bb) [ 48.045400] [ 48.046931] The buggy address belongs to the physical page: [ 48.052577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116c81 [ 48.060684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.067304] page_type: f5(slab) [ 48.070512] raw: 0bfffe0000000000 ffff000096528140 dead000000000122 0000000000000000 [ 48.078359] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 48.086201] page dumped because: kasan: bad access detected [ 48.091849] [ 48.093376] Memory state around the buggy address: [ 48.098240] ffff000096c81180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.105554] ffff000096c81200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 48.112869] >ffff000096c81280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 48.120180] ^ [ 48.125304] ffff000096c81300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.132619] ffff000096c81380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.139933] ================================================================== [ 47.289918] ================================================================== [ 47.300978] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 47.308674] Read of size 1 at addr ffff000080dbc573 by task kunit_try_catch/307 [ 47.316087] [ 47.317630] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 47.317668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.317680] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.317695] Call trace: [ 47.317703] show_stack+0x20/0x38 (C) [ 47.317728] dump_stack_lvl+0x8c/0xd0 [ 47.317751] print_report+0x118/0x608 [ 47.317773] kasan_report+0xdc/0x128 [ 47.317793] __asan_report_load1_noabort+0x20/0x30 [ 47.317812] mempool_oob_right_helper+0x2ac/0x2f0 [ 47.317833] mempool_kmalloc_oob_right+0xc4/0x120 [ 47.317852] kunit_try_run_case+0x170/0x3f0 [ 47.317876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.317899] kthread+0x328/0x630 [ 47.317917] ret_from_fork+0x10/0x20 [ 47.317939] [ 47.388930] Allocated by task 307: [ 47.392392] kasan_save_stack+0x3c/0x68 [ 47.396303] kasan_save_track+0x20/0x40 [ 47.400215] kasan_save_alloc_info+0x40/0x58 [ 47.404555] __kasan_mempool_unpoison_object+0x11c/0x180 [ 47.409950] remove_element+0x130/0x1f8 [ 47.413863] mempool_alloc_preallocated+0x58/0xc0 [ 47.418648] mempool_oob_right_helper+0x98/0x2f0 [ 47.423345] mempool_kmalloc_oob_right+0xc4/0x120 [ 47.428126] kunit_try_run_case+0x170/0x3f0 [ 47.432382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.437957] kthread+0x328/0x630 [ 47.441249] ret_from_fork+0x10/0x20 [ 47.444888] [ 47.446419] The buggy address belongs to the object at ffff000080dbc500 [ 47.446419] which belongs to the cache kmalloc-128 of size 128 [ 47.459077] The buggy address is located 0 bytes to the right of [ 47.459077] allocated 115-byte region [ffff000080dbc500, ffff000080dbc573) [ 47.472176] [ 47.473709] The buggy address belongs to the physical page: [ 47.479361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dbc [ 47.487470] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.495233] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.502300] page_type: f5(slab) [ 47.505512] raw: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 47.513360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.521210] head: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 47.529143] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.537078] head: 0bfffe0000000001 fffffdffc2036f01 00000000ffffffff 00000000ffffffff [ 47.545010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.552940] page dumped because: kasan: bad access detected [ 47.558591] [ 47.560125] Memory state around the buggy address: [ 47.564989] ffff000080dbc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.572304] ffff000080dbc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.579623] >ffff000080dbc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 47.586941] ^ [ 47.593907] ffff000080dbc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.601224] ffff000080dbc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 47.608537] ==================================================================
[ 28.793208] ================================================================== [ 28.793310] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.793398] Read of size 1 at addr fff00000c654a001 by task kunit_try_catch/235 [ 28.793448] [ 28.793522] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.793612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.793640] Hardware name: linux,dummy-virt (DT) [ 28.793672] Call trace: [ 28.793693] show_stack+0x20/0x38 (C) [ 28.793759] dump_stack_lvl+0x8c/0xd0 [ 28.793809] print_report+0x118/0x608 [ 28.793857] kasan_report+0xdc/0x128 [ 28.793903] __asan_report_load1_noabort+0x20/0x30 [ 28.793960] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.794010] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.794071] kunit_try_run_case+0x170/0x3f0 [ 28.794120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.794179] kthread+0x328/0x630 [ 28.794228] ret_from_fork+0x10/0x20 [ 28.794276] [ 28.794297] The buggy address belongs to the physical page: [ 28.794331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106548 [ 28.794384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.794433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.794487] page_type: f8(unknown) [ 28.794528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.794575] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.794625] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.794682] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.794732] head: 0bfffe0000000002 ffffc1ffc3195201 00000000ffffffff 00000000ffffffff [ 28.794780] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.794819] page dumped because: kasan: bad access detected [ 28.794850] [ 28.794910] Memory state around the buggy address: [ 28.794951] fff00000c6549f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.795049] fff00000c6549f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.795101] >fff00000c654a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.795138] ^ [ 28.795164] fff00000c654a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.795205] fff00000c654a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.795242] ================================================================== [ 28.806368] ================================================================== [ 28.806433] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.807864] Read of size 1 at addr fff00000c57732bb by task kunit_try_catch/237 [ 28.810076] [ 28.810126] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.810258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.810288] Hardware name: linux,dummy-virt (DT) [ 28.810321] Call trace: [ 28.810343] show_stack+0x20/0x38 (C) [ 28.810396] dump_stack_lvl+0x8c/0xd0 [ 28.810443] print_report+0x118/0x608 [ 28.810535] kasan_report+0xdc/0x128 [ 28.810631] __asan_report_load1_noabort+0x20/0x30 [ 28.811029] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.811619] mempool_slab_oob_right+0xc0/0x118 [ 28.811806] kunit_try_run_case+0x170/0x3f0 [ 28.811961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.812229] kthread+0x328/0x630 [ 28.812330] ret_from_fork+0x10/0x20 [ 28.812697] [ 28.812716] Allocated by task 237: [ 28.812745] kasan_save_stack+0x3c/0x68 [ 28.813170] kasan_save_track+0x20/0x40 [ 28.813210] kasan_save_alloc_info+0x40/0x58 [ 28.813485] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.813679] remove_element+0x16c/0x1f8 [ 28.813915] mempool_alloc_preallocated+0x58/0xc0 [ 28.814367] mempool_oob_right_helper+0x98/0x2f0 [ 28.814446] mempool_slab_oob_right+0xc0/0x118 [ 28.814487] kunit_try_run_case+0x170/0x3f0 [ 28.815064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.815122] kthread+0x328/0x630 [ 28.815158] ret_from_fork+0x10/0x20 [ 28.815195] [ 28.815216] The buggy address belongs to the object at fff00000c5773240 [ 28.815216] which belongs to the cache test_cache of size 123 [ 28.815613] The buggy address is located 0 bytes to the right of [ 28.815613] allocated 123-byte region [fff00000c5773240, fff00000c57732bb) [ 28.815918] [ 28.816117] The buggy address belongs to the physical page: [ 28.816243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 28.816303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.816356] page_type: f5(slab) [ 28.817111] raw: 0bfffe0000000000 fff00000c56d4640 dead000000000122 0000000000000000 [ 28.817162] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.817697] page dumped because: kasan: bad access detected [ 28.817796] [ 28.818013] Memory state around the buggy address: [ 28.818243] fff00000c5773180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.818292] fff00000c5773200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.818335] >fff00000c5773280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.818769] ^ [ 28.818846] fff00000c5773300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.818966] fff00000c5773380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.819170] ================================================================== [ 28.774450] ================================================================== [ 28.774522] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.774595] Read of size 1 at addr fff00000c643fd73 by task kunit_try_catch/233 [ 28.774646] [ 28.774686] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.774780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.774808] Hardware name: linux,dummy-virt (DT) [ 28.774841] Call trace: [ 28.774866] show_stack+0x20/0x38 (C) [ 28.774918] dump_stack_lvl+0x8c/0xd0 [ 28.774969] print_report+0x118/0x608 [ 28.775017] kasan_report+0xdc/0x128 [ 28.775079] __asan_report_load1_noabort+0x20/0x30 [ 28.775128] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.775177] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.775226] kunit_try_run_case+0x170/0x3f0 [ 28.775275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.775328] kthread+0x328/0x630 [ 28.775372] ret_from_fork+0x10/0x20 [ 28.775421] [ 28.775440] Allocated by task 233: [ 28.775469] kasan_save_stack+0x3c/0x68 [ 28.775510] kasan_save_track+0x20/0x40 [ 28.775546] kasan_save_alloc_info+0x40/0x58 [ 28.775583] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.775626] remove_element+0x130/0x1f8 [ 28.775667] mempool_alloc_preallocated+0x58/0xc0 [ 28.775706] mempool_oob_right_helper+0x98/0x2f0 [ 28.775746] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.775920] kunit_try_run_case+0x170/0x3f0 [ 28.775970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.776013] kthread+0x328/0x630 [ 28.776046] ret_from_fork+0x10/0x20 [ 28.776095] [ 28.776116] The buggy address belongs to the object at fff00000c643fd00 [ 28.776116] which belongs to the cache kmalloc-128 of size 128 [ 28.776177] The buggy address is located 0 bytes to the right of [ 28.776177] allocated 115-byte region [fff00000c643fd00, fff00000c643fd73) [ 28.776239] [ 28.776259] The buggy address belongs to the physical page: [ 28.776292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 28.776346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.776398] page_type: f5(slab) [ 28.776438] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 28.776488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.776530] page dumped because: kasan: bad access detected [ 28.776559] [ 28.776578] Memory state around the buggy address: [ 28.776610] fff00000c643fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.776652] fff00000c643fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776693] >fff00000c643fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.776731] ^ [ 28.776769] fff00000c643fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776810] fff00000c643fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.776850] ==================================================================
[ 23.576116] ================================================================== [ 23.577081] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.577931] Read of size 1 at addr ffff888102ca2001 by task kunit_try_catch/252 [ 23.578466] [ 23.578618] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 23.578676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.578689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.578716] Call Trace: [ 23.578752] <TASK> [ 23.578775] dump_stack_lvl+0x73/0xb0 [ 23.578825] print_report+0xd1/0x650 [ 23.578864] ? __virt_addr_valid+0x1db/0x2d0 [ 23.578889] ? mempool_oob_right_helper+0x318/0x380 [ 23.578912] ? kasan_addr_to_slab+0x11/0xa0 [ 23.578947] ? mempool_oob_right_helper+0x318/0x380 [ 23.578969] kasan_report+0x141/0x180 [ 23.579004] ? mempool_oob_right_helper+0x318/0x380 [ 23.579037] __asan_report_load1_noabort+0x18/0x20 [ 23.579061] mempool_oob_right_helper+0x318/0x380 [ 23.579085] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.579108] ? __kasan_check_write+0x18/0x20 [ 23.579131] ? __pfx_sched_clock_cpu+0x10/0x10 [ 23.579156] ? finish_task_switch.isra.0+0x153/0x700 [ 23.579182] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 23.579205] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 23.579241] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.579265] ? __pfx_mempool_kfree+0x10/0x10 [ 23.579288] ? __pfx_read_tsc+0x10/0x10 [ 23.579311] ? ktime_get_ts64+0x86/0x230 [ 23.579336] kunit_try_run_case+0x1a5/0x480 [ 23.579364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.579386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.579412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.579437] ? __kthread_parkme+0x82/0x180 [ 23.579458] ? preempt_count_sub+0x50/0x80 [ 23.579479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.579503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.579526] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.579550] kthread+0x337/0x6f0 [ 23.579569] ? trace_preempt_on+0x20/0xc0 [ 23.579593] ? __pfx_kthread+0x10/0x10 [ 23.579614] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.579637] ? calculate_sigpending+0x7b/0xa0 [ 23.579662] ? __pfx_kthread+0x10/0x10 [ 23.579684] ret_from_fork+0x116/0x1d0 [ 23.579703] ? __pfx_kthread+0x10/0x10 [ 23.579722] ret_from_fork_asm+0x1a/0x30 [ 23.579755] </TASK> [ 23.579767] [ 23.588862] The buggy address belongs to the physical page: [ 23.589228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ca0 [ 23.589659] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.590179] flags: 0x200000000000040(head|node=0|zone=2) [ 23.590414] page_type: f8(unknown) [ 23.590632] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.591120] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.591489] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.591964] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.592354] head: 0200000000000002 ffffea00040b2801 00000000ffffffff 00000000ffffffff [ 23.592716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.593148] page dumped because: kasan: bad access detected [ 23.593404] [ 23.593497] Memory state around the buggy address: [ 23.593735] ffff888102ca1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.594170] ffff888102ca1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.594500] >ffff888102ca2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.594880] ^ [ 23.595056] ffff888102ca2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.595305] ffff888102ca2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.595594] ================================================================== [ 23.549461] ================================================================== [ 23.549904] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.550675] Read of size 1 at addr ffff8881024c9f73 by task kunit_try_catch/250 [ 23.551177] [ 23.551291] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 23.551346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.551358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.551383] Call Trace: [ 23.551397] <TASK> [ 23.551419] dump_stack_lvl+0x73/0xb0 [ 23.551450] print_report+0xd1/0x650 [ 23.551473] ? __virt_addr_valid+0x1db/0x2d0 [ 23.551499] ? mempool_oob_right_helper+0x318/0x380 [ 23.551522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.551547] ? mempool_oob_right_helper+0x318/0x380 [ 23.551570] kasan_report+0x141/0x180 [ 23.551591] ? mempool_oob_right_helper+0x318/0x380 [ 23.551618] __asan_report_load1_noabort+0x18/0x20 [ 23.551641] mempool_oob_right_helper+0x318/0x380 [ 23.551664] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.551689] ? __pfx_sched_clock_cpu+0x10/0x10 [ 23.551711] ? finish_task_switch.isra.0+0x153/0x700 [ 23.551738] mempool_kmalloc_oob_right+0xf2/0x150 [ 23.551761] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 23.551786] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.551812] ? __pfx_mempool_kfree+0x10/0x10 [ 23.551835] ? __pfx_read_tsc+0x10/0x10 [ 23.551857] ? ktime_get_ts64+0x86/0x230 [ 23.551882] kunit_try_run_case+0x1a5/0x480 [ 23.551910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.551931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.551958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.551981] ? __kthread_parkme+0x82/0x180 [ 23.552002] ? preempt_count_sub+0x50/0x80 [ 23.552024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.552048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.552072] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.552094] kthread+0x337/0x6f0 [ 23.552114] ? trace_preempt_on+0x20/0xc0 [ 23.552138] ? __pfx_kthread+0x10/0x10 [ 23.552158] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.552181] ? calculate_sigpending+0x7b/0xa0 [ 23.552205] ? __pfx_kthread+0x10/0x10 [ 23.552236] ret_from_fork+0x116/0x1d0 [ 23.552255] ? __pfx_kthread+0x10/0x10 [ 23.552274] ret_from_fork_asm+0x1a/0x30 [ 23.552307] </TASK> [ 23.552318] [ 23.561669] Allocated by task 250: [ 23.561850] kasan_save_stack+0x45/0x70 [ 23.562031] kasan_save_track+0x18/0x40 [ 23.562625] kasan_save_alloc_info+0x3b/0x50 [ 23.562831] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 23.563048] remove_element+0x11e/0x190 [ 23.563375] mempool_alloc_preallocated+0x4d/0x90 [ 23.563587] mempool_oob_right_helper+0x8a/0x380 [ 23.563914] mempool_kmalloc_oob_right+0xf2/0x150 [ 23.564245] kunit_try_run_case+0x1a5/0x480 [ 23.564463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.564809] kthread+0x337/0x6f0 [ 23.565043] ret_from_fork+0x116/0x1d0 [ 23.565192] ret_from_fork_asm+0x1a/0x30 [ 23.565477] [ 23.565577] The buggy address belongs to the object at ffff8881024c9f00 [ 23.565577] which belongs to the cache kmalloc-128 of size 128 [ 23.566248] The buggy address is located 0 bytes to the right of [ 23.566248] allocated 115-byte region [ffff8881024c9f00, ffff8881024c9f73) [ 23.566744] [ 23.566827] The buggy address belongs to the physical page: [ 23.567068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024c9 [ 23.567709] flags: 0x200000000000000(node=0|zone=2) [ 23.567936] page_type: f5(slab) [ 23.568170] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.568574] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 23.568940] page dumped because: kasan: bad access detected [ 23.569233] [ 23.569445] Memory state around the buggy address: [ 23.569617] ffff8881024c9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.570045] ffff8881024c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.570350] >ffff8881024c9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.570643] ^ [ 23.570908] ffff8881024c9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.571404] ffff8881024ca000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.571766] ================================================================== [ 23.600543] ================================================================== [ 23.601345] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.601726] Read of size 1 at addr ffff8881024e42bb by task kunit_try_catch/254 [ 23.602031] [ 23.602121] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 23.602176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.602189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.602214] Call Trace: [ 23.602239] <TASK> [ 23.602259] dump_stack_lvl+0x73/0xb0 [ 23.602290] print_report+0xd1/0x650 [ 23.602360] ? __virt_addr_valid+0x1db/0x2d0 [ 23.602388] ? mempool_oob_right_helper+0x318/0x380 [ 23.602411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.602437] ? mempool_oob_right_helper+0x318/0x380 [ 23.602460] kasan_report+0x141/0x180 [ 23.602482] ? mempool_oob_right_helper+0x318/0x380 [ 23.602508] __asan_report_load1_noabort+0x18/0x20 [ 23.602533] mempool_oob_right_helper+0x318/0x380 [ 23.602556] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.602580] ? __pfx_sched_clock_cpu+0x10/0x10 [ 23.602602] ? irqentry_exit+0x2a/0x60 [ 23.602622] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.602645] mempool_slab_oob_right+0xed/0x140 [ 23.602667] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 23.602693] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 23.602718] ? __pfx_mempool_free_slab+0x10/0x10 [ 23.602741] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 23.602766] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 23.602790] kunit_try_run_case+0x1a5/0x480 [ 23.602815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.602837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.602862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.602886] ? __kthread_parkme+0x82/0x180 [ 23.602907] ? preempt_count_sub+0x50/0x80 [ 23.602930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.602954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.602978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.603001] kthread+0x337/0x6f0 [ 23.603046] ? trace_preempt_on+0x20/0xc0 [ 23.603070] ? __pfx_kthread+0x10/0x10 [ 23.603090] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.603131] ? calculate_sigpending+0x7b/0xa0 [ 23.603155] ? __pfx_kthread+0x10/0x10 [ 23.603177] ret_from_fork+0x116/0x1d0 [ 23.603197] ? __pfx_kthread+0x10/0x10 [ 23.603217] ret_from_fork_asm+0x1a/0x30 [ 23.603259] </TASK> [ 23.603271] [ 23.614771] Allocated by task 254: [ 23.615230] kasan_save_stack+0x45/0x70 [ 23.615536] kasan_save_track+0x18/0x40 [ 23.616062] kasan_save_alloc_info+0x3b/0x50 [ 23.616443] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 23.616881] remove_element+0x11e/0x190 [ 23.617197] mempool_alloc_preallocated+0x4d/0x90 [ 23.617530] mempool_oob_right_helper+0x8a/0x380 [ 23.617869] mempool_slab_oob_right+0xed/0x140 [ 23.618210] kunit_try_run_case+0x1a5/0x480 [ 23.618520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.619014] kthread+0x337/0x6f0 [ 23.619303] ret_from_fork+0x116/0x1d0 [ 23.619600] ret_from_fork_asm+0x1a/0x30 [ 23.619985] [ 23.620066] The buggy address belongs to the object at ffff8881024e4240 [ 23.620066] which belongs to the cache test_cache of size 123 [ 23.620904] The buggy address is located 0 bytes to the right of [ 23.620904] allocated 123-byte region [ffff8881024e4240, ffff8881024e42bb) [ 23.621908] [ 23.622050] The buggy address belongs to the physical page: [ 23.622472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 23.622936] flags: 0x200000000000000(node=0|zone=2) [ 23.623271] page_type: f5(slab) [ 23.623728] raw: 0200000000000000 ffff888101106780 dead000000000122 0000000000000000 [ 23.624285] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 23.624739] page dumped because: kasan: bad access detected [ 23.625160] [ 23.625277] Memory state around the buggy address: [ 23.625596] ffff8881024e4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.626118] ffff8881024e4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 23.626770] >ffff8881024e4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 23.627330] ^ [ 23.627664] ffff8881024e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.628145] ffff8881024e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.628551] ==================================================================