Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.879456] ================================================================== [ 32.879537] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.880092] Read of size 1 at addr fff00000c9aca2bb by task kunit_try_catch/258 [ 32.880151] [ 32.880365] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.880725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.880967] Hardware name: linux,dummy-virt (DT) [ 32.881002] Call trace: [ 32.881237] show_stack+0x20/0x38 (C) [ 32.881458] dump_stack_lvl+0x8c/0xd0 [ 32.881510] print_report+0x118/0x608 [ 32.881828] kasan_report+0xdc/0x128 [ 32.882365] __asan_report_load1_noabort+0x20/0x30 [ 32.882428] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.882484] mempool_slab_oob_right+0xc0/0x118 [ 32.882540] kunit_try_run_case+0x170/0x3f0 [ 32.882589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.882645] kthread+0x328/0x630 [ 32.882688] ret_from_fork+0x10/0x20 [ 32.883401] [ 32.883425] Allocated by task 258: [ 32.883479] kasan_save_stack+0x3c/0x68 [ 32.883599] kasan_save_track+0x20/0x40 [ 32.883696] kasan_save_alloc_info+0x40/0x58 [ 32.883739] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.883782] remove_element+0x16c/0x1f8 [ 32.883981] mempool_alloc_preallocated+0x58/0xc0 [ 32.884391] mempool_oob_right_helper+0x98/0x2f0 [ 32.884502] mempool_slab_oob_right+0xc0/0x118 [ 32.884588] kunit_try_run_case+0x170/0x3f0 [ 32.884959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.885101] kthread+0x328/0x630 [ 32.885263] ret_from_fork+0x10/0x20 [ 32.885300] [ 32.885323] The buggy address belongs to the object at fff00000c9aca240 [ 32.885323] which belongs to the cache test_cache of size 123 [ 32.885380] The buggy address is located 0 bytes to the right of [ 32.885380] allocated 123-byte region [fff00000c9aca240, fff00000c9aca2bb) [ 32.885446] [ 32.885467] The buggy address belongs to the physical page: [ 32.886176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aca [ 32.886254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.886764] page_type: f5(slab) [ 32.887005] raw: 0bfffe0000000000 fff00000c3fa28c0 dead000000000122 0000000000000000 [ 32.887061] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.887102] page dumped because: kasan: bad access detected [ 32.887134] [ 32.887316] Memory state around the buggy address: [ 32.887398] fff00000c9aca180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.887619] fff00000c9aca200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.888037] >fff00000c9aca280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.888082] ^ [ 32.888315] fff00000c9aca300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.888399] fff00000c9aca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.888440] ================================================================== [ 32.859669] ================================================================== [ 32.859727] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.859781] Read of size 1 at addr fff00000c9aea001 by task kunit_try_catch/256 [ 32.859831] [ 32.859861] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.860238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.860289] Hardware name: linux,dummy-virt (DT) [ 32.860504] Call trace: [ 32.860530] show_stack+0x20/0x38 (C) [ 32.860606] dump_stack_lvl+0x8c/0xd0 [ 32.860653] print_report+0x118/0x608 [ 32.860701] kasan_report+0xdc/0x128 [ 32.860745] __asan_report_load1_noabort+0x20/0x30 [ 32.860795] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.860843] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.860894] kunit_try_run_case+0x170/0x3f0 [ 32.860955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.861007] kthread+0x328/0x630 [ 32.861246] ret_from_fork+0x10/0x20 [ 32.861416] [ 32.861479] The buggy address belongs to the physical page: [ 32.861527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae8 [ 32.861581] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.861640] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.861694] page_type: f8(unknown) [ 32.861753] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.862130] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.862195] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.862243] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.862320] head: 0bfffe0000000002 ffffc1ffc326ba01 00000000ffffffff 00000000ffffffff [ 32.862369] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.862409] page dumped because: kasan: bad access detected [ 32.862479] [ 32.862562] Memory state around the buggy address: [ 32.862635] fff00000c9ae9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.862737] fff00000c9ae9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.862782] >fff00000c9aea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.862841] ^ [ 32.862945] fff00000c9aea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.862988] fff00000c9aea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.863052] ================================================================== [ 32.850156] ================================================================== [ 32.850228] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.850302] Read of size 1 at addr fff00000c91f0573 by task kunit_try_catch/254 [ 32.850354] [ 32.850398] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.850492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.850522] Hardware name: linux,dummy-virt (DT) [ 32.850556] Call trace: [ 32.850581] show_stack+0x20/0x38 (C) [ 32.850635] dump_stack_lvl+0x8c/0xd0 [ 32.850687] print_report+0x118/0x608 [ 32.850736] kasan_report+0xdc/0x128 [ 32.850782] __asan_report_load1_noabort+0x20/0x30 [ 32.850832] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.850882] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.850947] kunit_try_run_case+0x170/0x3f0 [ 32.850997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.851051] kthread+0x328/0x630 [ 32.851095] ret_from_fork+0x10/0x20 [ 32.851145] [ 32.851164] Allocated by task 254: [ 32.851195] kasan_save_stack+0x3c/0x68 [ 32.851236] kasan_save_track+0x20/0x40 [ 32.851276] kasan_save_alloc_info+0x40/0x58 [ 32.851312] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.851356] remove_element+0x130/0x1f8 [ 32.851394] mempool_alloc_preallocated+0x58/0xc0 [ 32.851435] mempool_oob_right_helper+0x98/0x2f0 [ 32.851474] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.851515] kunit_try_run_case+0x170/0x3f0 [ 32.851590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.851637] kthread+0x328/0x630 [ 32.851669] ret_from_fork+0x10/0x20 [ 32.851708] [ 32.851728] The buggy address belongs to the object at fff00000c91f0500 [ 32.851728] which belongs to the cache kmalloc-128 of size 128 [ 32.851787] The buggy address is located 0 bytes to the right of [ 32.851787] allocated 115-byte region [fff00000c91f0500, fff00000c91f0573) [ 32.851852] [ 32.851877] The buggy address belongs to the physical page: [ 32.851911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0 [ 32.851979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.852032] page_type: f5(slab) [ 32.852074] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.852125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.852167] page dumped because: kasan: bad access detected [ 32.852217] [ 32.852251] Memory state around the buggy address: [ 32.852285] fff00000c91f0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.852329] fff00000c91f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.852374] >fff00000c91f0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.852414] ^ [ 32.852455] fff00000c91f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.852498] fff00000c91f0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.852538] ==================================================================
[ 34.738571] ================================================================== [ 34.738661] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.738737] Read of size 1 at addr fff00000c90ba2bb by task kunit_try_catch/256 [ 34.738796] [ 34.738832] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.738922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.738950] Hardware name: linux,dummy-virt (DT) [ 34.738984] Call trace: [ 34.739008] show_stack+0x20/0x38 (C) [ 34.739069] dump_stack_lvl+0x8c/0xd0 [ 34.739123] print_report+0x118/0x608 [ 34.739500] kasan_report+0xdc/0x128 [ 34.739953] __asan_report_load1_noabort+0x20/0x30 [ 34.740034] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.740113] mempool_slab_oob_right+0xc0/0x118 [ 34.740211] kunit_try_run_case+0x170/0x3f0 [ 34.740286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.740340] kthread+0x328/0x630 [ 34.740382] ret_from_fork+0x10/0x20 [ 34.740450] [ 34.740634] Allocated by task 256: [ 34.740705] kasan_save_stack+0x3c/0x68 [ 34.740790] kasan_save_track+0x20/0x40 [ 34.740948] kasan_save_alloc_info+0x40/0x58 [ 34.741043] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.741109] remove_element+0x16c/0x1f8 [ 34.741225] mempool_alloc_preallocated+0x58/0xc0 [ 34.741292] mempool_oob_right_helper+0x98/0x2f0 [ 34.741370] mempool_slab_oob_right+0xc0/0x118 [ 34.741409] kunit_try_run_case+0x170/0x3f0 [ 34.741582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.741763] kthread+0x328/0x630 [ 34.741866] ret_from_fork+0x10/0x20 [ 34.741935] [ 34.741984] The buggy address belongs to the object at fff00000c90ba240 [ 34.741984] which belongs to the cache test_cache of size 123 [ 34.742084] The buggy address is located 0 bytes to the right of [ 34.742084] allocated 123-byte region [fff00000c90ba240, fff00000c90ba2bb) [ 34.742182] [ 34.742268] The buggy address belongs to the physical page: [ 34.742329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1090ba [ 34.742402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.742702] page_type: f5(slab) [ 34.742752] raw: 0bfffe0000000000 fff00000c5711c80 dead000000000122 0000000000000000 [ 34.742833] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.742945] page dumped because: kasan: bad access detected [ 34.743024] [ 34.743073] Memory state around the buggy address: [ 34.743127] fff00000c90ba180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.743197] fff00000c90ba200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.743276] >fff00000c90ba280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.743369] ^ [ 34.743403] fff00000c90ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.743490] fff00000c90ba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.743655] ================================================================== [ 34.714291] ================================================================== [ 34.714362] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.714425] Read of size 1 at addr fff00000c9aee001 by task kunit_try_catch/254 [ 34.714818] [ 34.714861] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.715082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.715272] Hardware name: linux,dummy-virt (DT) [ 34.715384] Call trace: [ 34.715411] show_stack+0x20/0x38 (C) [ 34.715819] dump_stack_lvl+0x8c/0xd0 [ 34.715917] print_report+0x118/0x608 [ 34.715964] kasan_report+0xdc/0x128 [ 34.716013] __asan_report_load1_noabort+0x20/0x30 [ 34.716062] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.716112] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 34.716174] kunit_try_run_case+0x170/0x3f0 [ 34.716223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.716277] kthread+0x328/0x630 [ 34.717933] ret_from_fork+0x10/0x20 [ 34.718422] [ 34.718492] The buggy address belongs to the physical page: [ 34.719040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aec [ 34.719685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.719765] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.720088] page_type: f8(unknown) [ 34.720232] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.720286] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.720699] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.721064] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.721242] head: 0bfffe0000000002 ffffc1ffc326bb01 00000000ffffffff 00000000ffffffff [ 34.721294] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.721334] page dumped because: kasan: bad access detected [ 34.721369] [ 34.721388] Memory state around the buggy address: [ 34.722420] fff00000c9aedf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.722775] fff00000c9aedf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.723231] >fff00000c9aee000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.723372] ^ [ 34.723457] fff00000c9aee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.723612] fff00000c9aee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.723654] ================================================================== [ 34.699197] ================================================================== [ 34.699277] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.699353] Read of size 1 at addr fff00000c8dbd073 by task kunit_try_catch/252 [ 34.699405] [ 34.699469] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.699571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.699598] Hardware name: linux,dummy-virt (DT) [ 34.699633] Call trace: [ 34.699660] show_stack+0x20/0x38 (C) [ 34.699716] dump_stack_lvl+0x8c/0xd0 [ 34.699770] print_report+0x118/0x608 [ 34.699818] kasan_report+0xdc/0x128 [ 34.699865] __asan_report_load1_noabort+0x20/0x30 [ 34.699915] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.699966] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.700016] kunit_try_run_case+0x170/0x3f0 [ 34.700069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.700123] kthread+0x328/0x630 [ 34.700181] ret_from_fork+0x10/0x20 [ 34.700232] [ 34.700251] Allocated by task 252: [ 34.700281] kasan_save_stack+0x3c/0x68 [ 34.700324] kasan_save_track+0x20/0x40 [ 34.700362] kasan_save_alloc_info+0x40/0x58 [ 34.700400] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.700445] remove_element+0x130/0x1f8 [ 34.700484] mempool_alloc_preallocated+0x58/0xc0 [ 34.700524] mempool_oob_right_helper+0x98/0x2f0 [ 34.700564] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.700603] kunit_try_run_case+0x170/0x3f0 [ 34.700642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.700687] kthread+0x328/0x630 [ 34.700719] ret_from_fork+0x10/0x20 [ 34.700756] [ 34.700778] The buggy address belongs to the object at fff00000c8dbd000 [ 34.700778] which belongs to the cache kmalloc-128 of size 128 [ 34.700837] The buggy address is located 0 bytes to the right of [ 34.700837] allocated 115-byte region [fff00000c8dbd000, fff00000c8dbd073) [ 34.700902] [ 34.700924] The buggy address belongs to the physical page: [ 34.700960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dbd [ 34.701017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.701070] page_type: f5(slab) [ 34.701114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.701176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.701219] page dumped because: kasan: bad access detected [ 34.701252] [ 34.701271] Memory state around the buggy address: [ 34.701307] fff00000c8dbcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701351] fff00000c8dbcf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701396] >fff00000c8dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.701436] ^ [ 34.701477] fff00000c8dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.701528] fff00000c8dbd100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.701569] ==================================================================
[ 24.780092] ================================================================== [ 24.780727] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.781127] Read of size 1 at addr ffff8881060c6001 by task kunit_try_catch/272 [ 24.781460] [ 24.781556] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.781614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.781626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.781651] Call Trace: [ 24.781666] <TASK> [ 24.781686] dump_stack_lvl+0x73/0xb0 [ 24.781719] print_report+0xd1/0x650 [ 24.781743] ? __virt_addr_valid+0x1db/0x2d0 [ 24.781768] ? mempool_oob_right_helper+0x318/0x380 [ 24.781792] ? kasan_addr_to_slab+0x11/0xa0 [ 24.781812] ? mempool_oob_right_helper+0x318/0x380 [ 24.781847] kasan_report+0x141/0x180 [ 24.781870] ? mempool_oob_right_helper+0x318/0x380 [ 24.781898] __asan_report_load1_noabort+0x18/0x20 [ 24.781923] mempool_oob_right_helper+0x318/0x380 [ 24.781957] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.781980] ? update_load_avg+0x1be/0x21b0 [ 24.782009] ? finish_task_switch.isra.0+0x153/0x700 [ 24.782035] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 24.782072] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 24.782099] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.782124] ? __pfx_mempool_kfree+0x10/0x10 [ 24.782149] ? __pfx_read_tsc+0x10/0x10 [ 24.782171] ? ktime_get_ts64+0x86/0x230 [ 24.782396] kunit_try_run_case+0x1a5/0x480 [ 24.782428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.782453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.782476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.782499] ? __kthread_parkme+0x82/0x180 [ 24.782520] ? preempt_count_sub+0x50/0x80 [ 24.782544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.782570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.782594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.782619] kthread+0x337/0x6f0 [ 24.782639] ? trace_preempt_on+0x20/0xc0 [ 24.782663] ? __pfx_kthread+0x10/0x10 [ 24.782684] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.782709] ? calculate_sigpending+0x7b/0xa0 [ 24.782732] ? __pfx_kthread+0x10/0x10 [ 24.782755] ret_from_fork+0x116/0x1d0 [ 24.782775] ? __pfx_kthread+0x10/0x10 [ 24.782795] ret_from_fork_asm+0x1a/0x30 [ 24.782827] </TASK> [ 24.782841] [ 24.791390] The buggy address belongs to the physical page: [ 24.791831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c4 [ 24.792163] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.792476] flags: 0x200000000000040(head|node=0|zone=2) [ 24.792656] page_type: f8(unknown) [ 24.792834] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.793421] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.793719] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.794084] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.794395] head: 0200000000000002 ffffea0004183101 00000000ffffffff 00000000ffffffff [ 24.794691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.794978] page dumped because: kasan: bad access detected [ 24.795304] [ 24.795866] Memory state around the buggy address: [ 24.796095] ffff8881060c5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.796496] ffff8881060c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.796778] >ffff8881060c6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.797004] ^ [ 24.797263] ffff8881060c6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.797565] ffff8881060c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.797764] ================================================================== [ 24.749484] ================================================================== [ 24.749936] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.750557] Read of size 1 at addr ffff888103b7e073 by task kunit_try_catch/270 [ 24.750853] [ 24.750951] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.751008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.751026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.751088] Call Trace: [ 24.751104] <TASK> [ 24.751125] dump_stack_lvl+0x73/0xb0 [ 24.751161] print_report+0xd1/0x650 [ 24.751186] ? __virt_addr_valid+0x1db/0x2d0 [ 24.751213] ? mempool_oob_right_helper+0x318/0x380 [ 24.751236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.751262] ? mempool_oob_right_helper+0x318/0x380 [ 24.751286] kasan_report+0x141/0x180 [ 24.751307] ? mempool_oob_right_helper+0x318/0x380 [ 24.751334] __asan_report_load1_noabort+0x18/0x20 [ 24.751359] mempool_oob_right_helper+0x318/0x380 [ 24.751685] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.751712] ? __kasan_check_write+0x18/0x20 [ 24.751737] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.751762] ? finish_task_switch.isra.0+0x153/0x700 [ 24.751792] mempool_kmalloc_oob_right+0xf2/0x150 [ 24.751817] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 24.751842] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.751868] ? __pfx_mempool_kfree+0x10/0x10 [ 24.751893] ? __pfx_read_tsc+0x10/0x10 [ 24.751916] ? ktime_get_ts64+0x86/0x230 [ 24.752073] kunit_try_run_case+0x1a5/0x480 [ 24.752104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.752127] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.752150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.752172] ? __kthread_parkme+0x82/0x180 [ 24.752204] ? preempt_count_sub+0x50/0x80 [ 24.752227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.752252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.752277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.752301] kthread+0x337/0x6f0 [ 24.752321] ? trace_preempt_on+0x20/0xc0 [ 24.752346] ? __pfx_kthread+0x10/0x10 [ 24.752367] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.752391] ? calculate_sigpending+0x7b/0xa0 [ 24.752417] ? __pfx_kthread+0x10/0x10 [ 24.752438] ret_from_fork+0x116/0x1d0 [ 24.752458] ? __pfx_kthread+0x10/0x10 [ 24.752479] ret_from_fork_asm+0x1a/0x30 [ 24.752511] </TASK> [ 24.752525] [ 24.764650] Allocated by task 270: [ 24.765162] kasan_save_stack+0x45/0x70 [ 24.765454] kasan_save_track+0x18/0x40 [ 24.765651] kasan_save_alloc_info+0x3b/0x50 [ 24.765890] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 24.766407] remove_element+0x11e/0x190 [ 24.766600] mempool_alloc_preallocated+0x4d/0x90 [ 24.766792] mempool_oob_right_helper+0x8a/0x380 [ 24.767165] mempool_kmalloc_oob_right+0xf2/0x150 [ 24.767516] kunit_try_run_case+0x1a5/0x480 [ 24.767786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.768115] kthread+0x337/0x6f0 [ 24.768267] ret_from_fork+0x116/0x1d0 [ 24.768698] ret_from_fork_asm+0x1a/0x30 [ 24.768901] [ 24.769119] The buggy address belongs to the object at ffff888103b7e000 [ 24.769119] which belongs to the cache kmalloc-128 of size 128 [ 24.769777] The buggy address is located 0 bytes to the right of [ 24.769777] allocated 115-byte region [ffff888103b7e000, ffff888103b7e073) [ 24.770784] [ 24.770878] The buggy address belongs to the physical page: [ 24.771251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b7e [ 24.771695] flags: 0x200000000000000(node=0|zone=2) [ 24.771958] page_type: f5(slab) [ 24.772298] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.772833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.773243] page dumped because: kasan: bad access detected [ 24.773616] [ 24.773836] Memory state around the buggy address: [ 24.773989] ffff888103b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.774426] ffff888103b7df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.775084] >ffff888103b7e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.775368] ^ [ 24.775878] ffff888103b7e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.776300] ffff888103b7e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.776742] ================================================================== [ 24.802549] ================================================================== [ 24.803956] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.804261] Read of size 1 at addr ffff888105a1e2bb by task kunit_try_catch/274 [ 24.805440] [ 24.805663] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.805737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.805778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.805813] Call Trace: [ 24.805836] <TASK> [ 24.805858] dump_stack_lvl+0x73/0xb0 [ 24.805907] print_report+0xd1/0x650 [ 24.805931] ? __virt_addr_valid+0x1db/0x2d0 [ 24.805970] ? mempool_oob_right_helper+0x318/0x380 [ 24.805993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.806019] ? mempool_oob_right_helper+0x318/0x380 [ 24.806043] kasan_report+0x141/0x180 [ 24.806075] ? mempool_oob_right_helper+0x318/0x380 [ 24.806101] __asan_report_load1_noabort+0x18/0x20 [ 24.806126] mempool_oob_right_helper+0x318/0x380 [ 24.806150] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.806175] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.806217] ? irqentry_exit+0x2a/0x60 [ 24.806239] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.806265] mempool_slab_oob_right+0xed/0x140 [ 24.806289] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 24.806314] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 24.806340] ? __pfx_mempool_free_slab+0x10/0x10 [ 24.806364] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 24.806390] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 24.806415] kunit_try_run_case+0x1a5/0x480 [ 24.806443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.806467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.806489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.806511] ? __kthread_parkme+0x82/0x180 [ 24.806532] ? preempt_count_sub+0x50/0x80 [ 24.806556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.806582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.806606] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.806631] kthread+0x337/0x6f0 [ 24.806651] ? trace_preempt_on+0x20/0xc0 [ 24.806675] ? __pfx_kthread+0x10/0x10 [ 24.806696] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.806721] ? calculate_sigpending+0x7b/0xa0 [ 24.806746] ? __pfx_kthread+0x10/0x10 [ 24.806767] ret_from_fork+0x116/0x1d0 [ 24.806788] ? __pfx_kthread+0x10/0x10 [ 24.806809] ret_from_fork_asm+0x1a/0x30 [ 24.806841] </TASK> [ 24.806855] [ 24.820964] Allocated by task 274: [ 24.821433] kasan_save_stack+0x45/0x70 [ 24.821746] kasan_save_track+0x18/0x40 [ 24.821884] kasan_save_alloc_info+0x3b/0x50 [ 24.822164] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 24.822732] remove_element+0x11e/0x190 [ 24.823175] mempool_alloc_preallocated+0x4d/0x90 [ 24.823544] mempool_oob_right_helper+0x8a/0x380 [ 24.823695] mempool_slab_oob_right+0xed/0x140 [ 24.823837] kunit_try_run_case+0x1a5/0x480 [ 24.824005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.824469] kthread+0x337/0x6f0 [ 24.824994] ret_from_fork+0x116/0x1d0 [ 24.825441] ret_from_fork_asm+0x1a/0x30 [ 24.825812] [ 24.825973] The buggy address belongs to the object at ffff888105a1e240 [ 24.825973] which belongs to the cache test_cache of size 123 [ 24.827104] The buggy address is located 0 bytes to the right of [ 24.827104] allocated 123-byte region [ffff888105a1e240, ffff888105a1e2bb) [ 24.827722] [ 24.827795] The buggy address belongs to the physical page: [ 24.828011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e [ 24.828772] flags: 0x200000000000000(node=0|zone=2) [ 24.829322] page_type: f5(slab) [ 24.829874] raw: 0200000000000000 ffff888101095a00 dead000000000122 0000000000000000 [ 24.830661] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 24.831115] page dumped because: kasan: bad access detected [ 24.831538] [ 24.831694] Memory state around the buggy address: [ 24.832076] ffff888105a1e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.832557] ffff888105a1e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 24.833268] >ffff888105a1e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 24.833552] ^ [ 24.833711] ffff888105a1e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.833926] ffff888105a1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.834792] ==================================================================
[ 24.483883] ================================================================== [ 24.484358] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.484700] Read of size 1 at addr ffff888104950973 by task kunit_try_catch/269 [ 24.485008] [ 24.485138] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.485195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.485209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.485233] Call Trace: [ 24.485248] <TASK> [ 24.485270] dump_stack_lvl+0x73/0xb0 [ 24.485316] print_report+0xd1/0x650 [ 24.485341] ? __virt_addr_valid+0x1db/0x2d0 [ 24.485367] ? mempool_oob_right_helper+0x318/0x380 [ 24.485391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.485417] ? mempool_oob_right_helper+0x318/0x380 [ 24.485441] kasan_report+0x141/0x180 [ 24.485463] ? mempool_oob_right_helper+0x318/0x380 [ 24.485491] __asan_report_load1_noabort+0x18/0x20 [ 24.485515] mempool_oob_right_helper+0x318/0x380 [ 24.485539] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.485563] ? ret_from_fork+0x116/0x1d0 [ 24.485584] ? kthread+0x337/0x6f0 [ 24.485607] ? ret_from_fork_asm+0x1a/0x30 [ 24.485631] ? mempool_alloc_preallocated+0x5b/0x90 [ 24.485702] mempool_kmalloc_oob_right+0xf2/0x150 [ 24.485727] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 24.485759] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.485783] ? __pfx_mempool_kfree+0x10/0x10 [ 24.485808] ? __pfx_read_tsc+0x10/0x10 [ 24.485830] ? ktime_get_ts64+0x86/0x230 [ 24.485857] kunit_try_run_case+0x1a5/0x480 [ 24.485887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.485912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.485936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.485958] ? __kthread_parkme+0x82/0x180 [ 24.485979] ? preempt_count_sub+0x50/0x80 [ 24.486004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.486029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.486053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.486078] kthread+0x337/0x6f0 [ 24.486098] ? trace_preempt_on+0x20/0xc0 [ 24.486123] ? __pfx_kthread+0x10/0x10 [ 24.486143] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.486168] ? calculate_sigpending+0x7b/0xa0 [ 24.486193] ? __pfx_kthread+0x10/0x10 [ 24.486215] ret_from_fork+0x116/0x1d0 [ 24.486234] ? __pfx_kthread+0x10/0x10 [ 24.486255] ret_from_fork_asm+0x1a/0x30 [ 24.486287] </TASK> [ 24.486300] [ 24.497060] Allocated by task 269: [ 24.497407] kasan_save_stack+0x45/0x70 [ 24.497736] kasan_save_track+0x18/0x40 [ 24.498136] kasan_save_alloc_info+0x3b/0x50 [ 24.498350] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 24.498818] remove_element+0x11e/0x190 [ 24.499135] mempool_alloc_preallocated+0x4d/0x90 [ 24.499561] mempool_oob_right_helper+0x8a/0x380 [ 24.499951] mempool_kmalloc_oob_right+0xf2/0x150 [ 24.500182] kunit_try_run_case+0x1a5/0x480 [ 24.500380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.500817] kthread+0x337/0x6f0 [ 24.501130] ret_from_fork+0x116/0x1d0 [ 24.501480] ret_from_fork_asm+0x1a/0x30 [ 24.501797] [ 24.501942] The buggy address belongs to the object at ffff888104950900 [ 24.501942] which belongs to the cache kmalloc-128 of size 128 [ 24.502432] The buggy address is located 0 bytes to the right of [ 24.502432] allocated 115-byte region [ffff888104950900, ffff888104950973) [ 24.503690] [ 24.503780] The buggy address belongs to the physical page: [ 24.503978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950 [ 24.504375] flags: 0x200000000000000(node=0|zone=2) [ 24.504544] page_type: f5(slab) [ 24.504817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.505084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.505419] page dumped because: kasan: bad access detected [ 24.505651] [ 24.505719] Memory state around the buggy address: [ 24.505971] ffff888104950800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.506266] ffff888104950880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.506680] >ffff888104950900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.506897] ^ [ 24.507183] ffff888104950980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.507413] ffff888104950a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.507922] ================================================================== [ 24.511987] ================================================================== [ 24.512466] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.512996] Read of size 1 at addr ffff888106156001 by task kunit_try_catch/271 [ 24.513225] [ 24.513350] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.513408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.513423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.513448] Call Trace: [ 24.513462] <TASK> [ 24.513483] dump_stack_lvl+0x73/0xb0 [ 24.513797] print_report+0xd1/0x650 [ 24.513824] ? __virt_addr_valid+0x1db/0x2d0 [ 24.513848] ? mempool_oob_right_helper+0x318/0x380 [ 24.513873] ? kasan_addr_to_slab+0x11/0xa0 [ 24.513894] ? mempool_oob_right_helper+0x318/0x380 [ 24.513918] kasan_report+0x141/0x180 [ 24.513941] ? mempool_oob_right_helper+0x318/0x380 [ 24.513970] __asan_report_load1_noabort+0x18/0x20 [ 24.513994] mempool_oob_right_helper+0x318/0x380 [ 24.514019] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.514043] ? __kasan_check_write+0x18/0x20 [ 24.514067] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.514090] ? irqentry_exit+0x2a/0x60 [ 24.514112] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.514137] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 24.514161] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 24.514188] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.514213] ? __pfx_mempool_kfree+0x10/0x10 [ 24.514236] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 24.514263] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 24.514289] kunit_try_run_case+0x1a5/0x480 [ 24.514329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.514353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.514375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.514398] ? __kthread_parkme+0x82/0x180 [ 24.514419] ? preempt_count_sub+0x50/0x80 [ 24.514443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.514469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.514507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.514531] kthread+0x337/0x6f0 [ 24.514552] ? trace_preempt_on+0x20/0xc0 [ 24.514577] ? __pfx_kthread+0x10/0x10 [ 24.514598] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.514622] ? calculate_sigpending+0x7b/0xa0 [ 24.514647] ? __pfx_kthread+0x10/0x10 [ 24.514668] ret_from_fork+0x116/0x1d0 [ 24.514700] ? __pfx_kthread+0x10/0x10 [ 24.514720] ret_from_fork_asm+0x1a/0x30 [ 24.514752] </TASK> [ 24.514766] [ 24.526606] The buggy address belongs to the physical page: [ 24.527136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106154 [ 24.527497] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.527805] flags: 0x200000000000040(head|node=0|zone=2) [ 24.528042] page_type: f8(unknown) [ 24.528197] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.528519] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.528838] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.529147] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.529959] head: 0200000000000002 ffffea0004185501 00000000ffffffff 00000000ffffffff [ 24.530607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.531098] page dumped because: kasan: bad access detected [ 24.531443] [ 24.531577] Memory state around the buggy address: [ 24.531943] ffff888106155f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.532230] ffff888106155f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.532647] >ffff888106156000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.533021] ^ [ 24.533164] ffff888106156080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.533591] ffff888106156100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.534061] ================================================================== [ 24.538651] ================================================================== [ 24.539154] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.539719] Read of size 1 at addr ffff8881049092bb by task kunit_try_catch/273 [ 24.540067] [ 24.540337] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.540455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.540470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.540495] Call Trace: [ 24.540510] <TASK> [ 24.540531] dump_stack_lvl+0x73/0xb0 [ 24.540566] print_report+0xd1/0x650 [ 24.540589] ? __virt_addr_valid+0x1db/0x2d0 [ 24.540614] ? mempool_oob_right_helper+0x318/0x380 [ 24.540637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.540664] ? mempool_oob_right_helper+0x318/0x380 [ 24.540689] kasan_report+0x141/0x180 [ 24.540773] ? mempool_oob_right_helper+0x318/0x380 [ 24.540802] __asan_report_load1_noabort+0x18/0x20 [ 24.540827] mempool_oob_right_helper+0x318/0x380 [ 24.540851] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.540877] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.540900] ? finish_task_switch.isra.0+0x153/0x700 [ 24.540927] mempool_slab_oob_right+0xed/0x140 [ 24.540952] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 24.540980] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 24.541005] ? __pfx_mempool_free_slab+0x10/0x10 [ 24.541031] ? __pfx_read_tsc+0x10/0x10 [ 24.541053] ? ktime_get_ts64+0x86/0x230 [ 24.541079] kunit_try_run_case+0x1a5/0x480 [ 24.541106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.541130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.541152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.541175] ? __kthread_parkme+0x82/0x180 [ 24.541196] ? preempt_count_sub+0x50/0x80 [ 24.541218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.541243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.541267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.541292] kthread+0x337/0x6f0 [ 24.541322] ? trace_preempt_on+0x20/0xc0 [ 24.541348] ? __pfx_kthread+0x10/0x10 [ 24.541369] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.541393] ? calculate_sigpending+0x7b/0xa0 [ 24.541417] ? __pfx_kthread+0x10/0x10 [ 24.541439] ret_from_fork+0x116/0x1d0 [ 24.541459] ? __pfx_kthread+0x10/0x10 [ 24.541479] ret_from_fork_asm+0x1a/0x30 [ 24.541521] </TASK> [ 24.541533] [ 24.552998] Allocated by task 273: [ 24.553169] kasan_save_stack+0x45/0x70 [ 24.553826] kasan_save_track+0x18/0x40 [ 24.554051] kasan_save_alloc_info+0x3b/0x50 [ 24.554276] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 24.554560] remove_element+0x11e/0x190 [ 24.554877] mempool_alloc_preallocated+0x4d/0x90 [ 24.555113] mempool_oob_right_helper+0x8a/0x380 [ 24.555299] mempool_slab_oob_right+0xed/0x140 [ 24.555512] kunit_try_run_case+0x1a5/0x480 [ 24.555836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.556009] kthread+0x337/0x6f0 [ 24.556155] ret_from_fork+0x116/0x1d0 [ 24.556349] ret_from_fork_asm+0x1a/0x30 [ 24.556579] [ 24.556702] The buggy address belongs to the object at ffff888104909240 [ 24.556702] which belongs to the cache test_cache of size 123 [ 24.557242] The buggy address is located 0 bytes to the right of [ 24.557242] allocated 123-byte region [ffff888104909240, ffff8881049092bb) [ 24.557842] [ 24.558029] The buggy address belongs to the physical page: [ 24.558284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104909 [ 24.558819] flags: 0x200000000000000(node=0|zone=2) [ 24.559162] page_type: f5(slab) [ 24.559304] raw: 0200000000000000 ffff8881057ff000 dead000000000122 0000000000000000 [ 24.559636] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 24.560159] page dumped because: kasan: bad access detected [ 24.560384] [ 24.560475] Memory state around the buggy address: [ 24.560882] ffff888104909180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.561295] ffff888104909200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 24.561585] >ffff888104909280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 24.562024] ^ [ 24.562382] ffff888104909300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.562671] ffff888104909380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563128] ==================================================================