Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 33.864859] ================================================================== [ 33.874886] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.882431] Read of size 1 at addr ffff00080320a001 by task kunit_try_catch/270 [ 33.889722] [ 33.891209] CPU: 5 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 33.891260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.891276] Hardware name: WinLink E850-96 board (DT) [ 33.891296] Call trace: [ 33.891309] show_stack+0x20/0x38 (C) [ 33.891342] dump_stack_lvl+0x8c/0xd0 [ 33.891376] print_report+0x118/0x608 [ 33.891406] kasan_report+0xdc/0x128 [ 33.891435] __asan_report_load1_noabort+0x20/0x30 [ 33.891467] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.891504] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.891542] kunit_try_run_case+0x170/0x3f0 [ 33.891577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.891617] kthread+0x328/0x630 [ 33.891651] ret_from_fork+0x10/0x20 [ 33.891685] [ 33.959778] The buggy address belongs to the physical page: [ 33.965334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208 [ 33.973319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.980958] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.987898] page_type: f8(unknown) [ 33.991296] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.999015] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.006742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.014553] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.022366] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff [ 34.030178] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.037984] page dumped because: kasan: bad access detected [ 34.043539] [ 34.045015] Memory state around the buggy address: [ 34.049796] ffff000803209f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.056998] ffff000803209f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.064202] >ffff00080320a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.071404] ^ [ 34.074619] ffff00080320a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.081824] ffff00080320a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.089025] ================================================================== [ 33.563921] ================================================================== [ 33.564101] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.564242] Read of size 1 at addr ffff000801dd0473 by task kunit_try_catch/268 [ 33.570630] [ 33.572118] CPU: 6 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 33.572173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.572188] Hardware name: WinLink E850-96 board (DT) [ 33.572211] Call trace: [ 33.572226] show_stack+0x20/0x38 (C) [ 33.572266] dump_stack_lvl+0x8c/0xd0 [ 33.572301] print_report+0x118/0x608 [ 33.572333] kasan_report+0xdc/0x128 [ 33.572364] __asan_report_load1_noabort+0x20/0x30 [ 33.572399] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.572434] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.572468] kunit_try_run_case+0x170/0x3f0 [ 33.572505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572544] kthread+0x328/0x630 [ 33.572579] ret_from_fork+0x10/0x20 [ 33.572617] [ 33.640162] Allocated by task 268: [ 33.643548] kasan_save_stack+0x3c/0x68 [ 33.647365] kasan_save_track+0x20/0x40 [ 33.651184] kasan_save_alloc_info+0x40/0x58 [ 33.655438] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.660733] remove_element+0x130/0x1f8 [ 33.664552] mempool_alloc_preallocated+0x58/0xc0 [ 33.669240] mempool_oob_right_helper+0x98/0x2f0 [ 33.673840] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.678528] kunit_try_run_case+0x170/0x3f0 [ 33.682693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.688165] kthread+0x328/0x630 [ 33.691375] ret_from_fork+0x10/0x20 [ 33.694934] [ 33.696411] The buggy address belongs to the object at ffff000801dd0400 [ 33.696411] which belongs to the cache kmalloc-128 of size 128 [ 33.708911] The buggy address is located 0 bytes to the right of [ 33.708911] allocated 115-byte region [ffff000801dd0400, ffff000801dd0473) [ 33.721843] [ 33.723323] The buggy address belongs to the physical page: [ 33.728880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0 [ 33.736864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.744504] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.751445] page_type: f5(slab) [ 33.754581] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.762301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.770027] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.777838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.785651] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff [ 33.793463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.801269] page dumped because: kasan: bad access detected [ 33.806824] [ 33.808300] Memory state around the buggy address: [ 33.813080] ffff000801dd0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.820282] ffff000801dd0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.827488] >ffff000801dd0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.834688] ^ [ 33.841549] ffff000801dd0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.848754] ffff000801dd0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.855957] ================================================================== [ 34.098396] ================================================================== [ 34.108476] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.116022] Read of size 1 at addr ffff00080682f2bb by task kunit_try_catch/272 [ 34.123312] [ 34.124800] CPU: 6 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 34.124848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.124864] Hardware name: WinLink E850-96 board (DT) [ 34.124885] Call trace: [ 34.124900] show_stack+0x20/0x38 (C) [ 34.124934] dump_stack_lvl+0x8c/0xd0 [ 34.124968] print_report+0x118/0x608 [ 34.124999] kasan_report+0xdc/0x128 [ 34.125030] __asan_report_load1_noabort+0x20/0x30 [ 34.125065] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.125101] mempool_slab_oob_right+0xc0/0x118 [ 34.125133] kunit_try_run_case+0x170/0x3f0 [ 34.125169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.125207] kthread+0x328/0x630 [ 34.125240] ret_from_fork+0x10/0x20 [ 34.125277] [ 34.192584] Allocated by task 272: [ 34.195970] kasan_save_stack+0x3c/0x68 [ 34.199787] kasan_save_track+0x20/0x40 [ 34.203607] kasan_save_alloc_info+0x40/0x58 [ 34.207860] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.213070] remove_element+0x16c/0x1f8 [ 34.216888] mempool_alloc_preallocated+0x58/0xc0 [ 34.221575] mempool_oob_right_helper+0x98/0x2f0 [ 34.226176] mempool_slab_oob_right+0xc0/0x118 [ 34.230602] kunit_try_run_case+0x170/0x3f0 [ 34.234769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.240238] kthread+0x328/0x630 [ 34.243450] ret_from_fork+0x10/0x20 [ 34.247008] [ 34.248487] The buggy address belongs to the object at ffff00080682f240 [ 34.248487] which belongs to the cache test_cache of size 123 [ 34.260900] The buggy address is located 0 bytes to the right of [ 34.260900] allocated 123-byte region [ffff00080682f240, ffff00080682f2bb) [ 34.273831] [ 34.275310] The buggy address belongs to the physical page: [ 34.280867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88682f [ 34.288852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.295360] page_type: f5(slab) [ 34.298496] raw: 0bfffe0000000000 ffff000801dd23c0 dead000000000122 0000000000000000 [ 34.306216] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.313935] page dumped because: kasan: bad access detected [ 34.319490] [ 34.320966] Memory state around the buggy address: [ 34.325746] ffff00080682f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.332950] ffff00080682f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.340155] >ffff00080682f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.347354] ^ [ 34.352392] ffff00080682f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.359597] ffff00080682f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.366799] ==================================================================
[ 20.456783] ================================================================== [ 20.456863] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.457213] Read of size 1 at addr fff00000c3fa42bb by task kunit_try_catch/228 [ 20.457363] [ 20.457455] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.457557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.457611] Hardware name: linux,dummy-virt (DT) [ 20.457819] Call trace: [ 20.457893] show_stack+0x20/0x38 (C) [ 20.457950] dump_stack_lvl+0x8c/0xd0 [ 20.458000] print_report+0x118/0x608 [ 20.458058] kasan_report+0xdc/0x128 [ 20.458109] __asan_report_load1_noabort+0x20/0x30 [ 20.458182] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.458236] mempool_slab_oob_right+0xc0/0x118 [ 20.458286] kunit_try_run_case+0x170/0x3f0 [ 20.458372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.458720] kthread+0x328/0x630 [ 20.458866] ret_from_fork+0x10/0x20 [ 20.458947] [ 20.459051] Allocated by task 228: [ 20.459097] kasan_save_stack+0x3c/0x68 [ 20.459167] kasan_save_track+0x20/0x40 [ 20.459207] kasan_save_alloc_info+0x40/0x58 [ 20.459247] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.459325] remove_element+0x16c/0x1f8 [ 20.459424] mempool_alloc_preallocated+0x58/0xc0 [ 20.459469] mempool_oob_right_helper+0x98/0x2f0 [ 20.459531] mempool_slab_oob_right+0xc0/0x118 [ 20.459721] kunit_try_run_case+0x170/0x3f0 [ 20.459760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.459847] kthread+0x328/0x630 [ 20.460042] ret_from_fork+0x10/0x20 [ 20.460080] [ 20.460104] The buggy address belongs to the object at fff00000c3fa4240 [ 20.460104] which belongs to the cache test_cache of size 123 [ 20.460169] The buggy address is located 0 bytes to the right of [ 20.460169] allocated 123-byte region [fff00000c3fa4240, fff00000c3fa42bb) [ 20.460333] [ 20.460376] The buggy address belongs to the physical page: [ 20.460409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa4 [ 20.460484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.460564] page_type: f5(slab) [ 20.461004] raw: 0bfffe0000000000 fff00000c3ef3640 dead000000000122 0000000000000000 [ 20.461208] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.461272] page dumped because: kasan: bad access detected [ 20.461373] [ 20.461408] Memory state around the buggy address: [ 20.461714] fff00000c3fa4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.461795] fff00000c3fa4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.461841] >fff00000c3fa4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.461880] ^ [ 20.462112] fff00000c3fa4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462192] fff00000c3fa4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462231] ================================================================== [ 20.435057] ================================================================== [ 20.435133] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.435212] Read of size 1 at addr fff00000c3e64773 by task kunit_try_catch/224 [ 20.435263] [ 20.435305] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.435457] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.435503] Hardware name: linux,dummy-virt (DT) [ 20.435537] Call trace: [ 20.435564] show_stack+0x20/0x38 (C) [ 20.435622] dump_stack_lvl+0x8c/0xd0 [ 20.435676] print_report+0x118/0x608 [ 20.435724] kasan_report+0xdc/0x128 [ 20.435770] __asan_report_load1_noabort+0x20/0x30 [ 20.435823] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.435877] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.435930] kunit_try_run_case+0x170/0x3f0 [ 20.435984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.436042] kthread+0x328/0x630 [ 20.436090] ret_from_fork+0x10/0x20 [ 20.436143] [ 20.436162] Allocated by task 224: [ 20.436194] kasan_save_stack+0x3c/0x68 [ 20.436238] kasan_save_track+0x20/0x40 [ 20.436277] kasan_save_alloc_info+0x40/0x58 [ 20.436319] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.436375] remove_element+0x130/0x1f8 [ 20.436449] mempool_alloc_preallocated+0x58/0xc0 [ 20.436493] mempool_oob_right_helper+0x98/0x2f0 [ 20.436538] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.436582] kunit_try_run_case+0x170/0x3f0 [ 20.436623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.436671] kthread+0x328/0x630 [ 20.436707] ret_from_fork+0x10/0x20 [ 20.436746] [ 20.436767] The buggy address belongs to the object at fff00000c3e64700 [ 20.436767] which belongs to the cache kmalloc-128 of size 128 [ 20.436826] The buggy address is located 0 bytes to the right of [ 20.436826] allocated 115-byte region [fff00000c3e64700, fff00000c3e64773) [ 20.436890] [ 20.436911] The buggy address belongs to the physical page: [ 20.436947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64 [ 20.437002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.437056] page_type: f5(slab) [ 20.437100] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.437151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.437193] page dumped because: kasan: bad access detected [ 20.437225] [ 20.437243] Memory state around the buggy address: [ 20.437277] fff00000c3e64600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.437321] fff00000c3e64680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437373] >fff00000c3e64700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.437412] ^ [ 20.437452] fff00000c3e64780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437529] fff00000c3e64800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.437594] ================================================================== [ 20.445849] ================================================================== [ 20.445985] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.446181] Read of size 1 at addr fff00000c65c2001 by task kunit_try_catch/226 [ 20.446232] [ 20.446276] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.446380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.446409] Hardware name: linux,dummy-virt (DT) [ 20.446442] Call trace: [ 20.446466] show_stack+0x20/0x38 (C) [ 20.446519] dump_stack_lvl+0x8c/0xd0 [ 20.446568] print_report+0x118/0x608 [ 20.446616] kasan_report+0xdc/0x128 [ 20.446660] __asan_report_load1_noabort+0x20/0x30 [ 20.446715] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.446767] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.446823] kunit_try_run_case+0x170/0x3f0 [ 20.446876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.446933] kthread+0x328/0x630 [ 20.446980] ret_from_fork+0x10/0x20 [ 20.447038] [ 20.447058] The buggy address belongs to the physical page: [ 20.447095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 20.447150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.447198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.447254] page_type: f8(unknown) [ 20.447297] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.447359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.448423] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.448724] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.448823] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 20.449180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.449342] page dumped because: kasan: bad access detected [ 20.449389] [ 20.449544] Memory state around the buggy address: [ 20.449958] fff00000c65c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.450018] fff00000c65c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.450063] >fff00000c65c2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.450104] ^ [ 20.450136] fff00000c65c2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.450180] fff00000c65c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.450217] ==================================================================
[ 18.254206] ================================================================== [ 18.254778] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 18.255238] Read of size 1 at addr ffff888101de5973 by task kunit_try_catch/242 [ 18.255610] [ 18.255922] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.255992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.256008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.256035] Call Trace: [ 18.256054] <TASK> [ 18.256082] dump_stack_lvl+0x73/0xb0 [ 18.256119] print_report+0xd1/0x650 [ 18.256146] ? __virt_addr_valid+0x1db/0x2d0 [ 18.256174] ? mempool_oob_right_helper+0x318/0x380 [ 18.256199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.256223] ? mempool_oob_right_helper+0x318/0x380 [ 18.256249] kasan_report+0x141/0x180 [ 18.256274] ? mempool_oob_right_helper+0x318/0x380 [ 18.256305] __asan_report_load1_noabort+0x18/0x20 [ 18.256328] mempool_oob_right_helper+0x318/0x380 [ 18.256356] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 18.256382] ? dequeue_entities+0x852/0x1740 [ 18.256412] ? finish_task_switch.isra.0+0x153/0x700 [ 18.256442] mempool_kmalloc_oob_right+0xf2/0x150 [ 18.256468] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 18.256494] ? dequeue_task_fair+0x166/0x4e0 [ 18.256518] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.256570] ? __pfx_mempool_kfree+0x10/0x10 [ 18.256596] ? __pfx_read_tsc+0x10/0x10 [ 18.256620] ? ktime_get_ts64+0x86/0x230 [ 18.256650] kunit_try_run_case+0x1a5/0x480 [ 18.256679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.256702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.256729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.256774] ? __kthread_parkme+0x82/0x180 [ 18.256803] ? preempt_count_sub+0x50/0x80 [ 18.256830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.256855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.256880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.256913] kthread+0x337/0x6f0 [ 18.256937] ? trace_preempt_on+0x20/0xc0 [ 18.256964] ? __pfx_kthread+0x10/0x10 [ 18.256985] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.257009] ? calculate_sigpending+0x7b/0xa0 [ 18.257034] ? __pfx_kthread+0x10/0x10 [ 18.257055] ret_from_fork+0x41/0x80 [ 18.257078] ? __pfx_kthread+0x10/0x10 [ 18.257098] ret_from_fork_asm+0x1a/0x30 [ 18.257135] </TASK> [ 18.257150] [ 18.266046] Allocated by task 242: [ 18.266400] kasan_save_stack+0x45/0x70 [ 18.266663] kasan_save_track+0x18/0x40 [ 18.266816] kasan_save_alloc_info+0x3b/0x50 [ 18.266992] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 18.267287] remove_element+0x11e/0x190 [ 18.267536] mempool_alloc_preallocated+0x4d/0x90 [ 18.267801] mempool_oob_right_helper+0x8a/0x380 [ 18.268076] mempool_kmalloc_oob_right+0xf2/0x150 [ 18.268356] kunit_try_run_case+0x1a5/0x480 [ 18.268618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.268901] kthread+0x337/0x6f0 [ 18.269176] ret_from_fork+0x41/0x80 [ 18.269403] ret_from_fork_asm+0x1a/0x30 [ 18.269631] [ 18.269779] The buggy address belongs to the object at ffff888101de5900 [ 18.269779] which belongs to the cache kmalloc-128 of size 128 [ 18.270351] The buggy address is located 0 bytes to the right of [ 18.270351] allocated 115-byte region [ffff888101de5900, ffff888101de5973) [ 18.270885] [ 18.271052] The buggy address belongs to the physical page: [ 18.271337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5 [ 18.271558] flags: 0x200000000000000(node=0|zone=2) [ 18.271806] page_type: f5(slab) [ 18.272084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.272418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.272789] page dumped because: kasan: bad access detected [ 18.273055] [ 18.273230] Memory state around the buggy address: [ 18.273416] ffff888101de5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.273725] ffff888101de5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.274068] >ffff888101de5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.274397] ^ [ 18.274689] ffff888101de5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.274989] ffff888101de5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.275370] ================================================================== [ 18.282041] ================================================================== [ 18.282730] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 18.283155] Read of size 1 at addr ffff888102a9a001 by task kunit_try_catch/244 [ 18.283586] [ 18.283807] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.283890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.283908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.283939] Call Trace: [ 18.283958] <TASK> [ 18.283986] dump_stack_lvl+0x73/0xb0 [ 18.284028] print_report+0xd1/0x650 [ 18.284056] ? __virt_addr_valid+0x1db/0x2d0 [ 18.284087] ? mempool_oob_right_helper+0x318/0x380 [ 18.284115] ? kasan_addr_to_slab+0x11/0xa0 [ 18.284141] ? mempool_oob_right_helper+0x318/0x380 [ 18.284169] kasan_report+0x141/0x180 [ 18.284198] ? mempool_oob_right_helper+0x318/0x380 [ 18.284233] __asan_report_load1_noabort+0x18/0x20 [ 18.284259] mempool_oob_right_helper+0x318/0x380 [ 18.284291] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 18.284320] ? dequeue_entities+0x852/0x1740 [ 18.284352] ? finish_task_switch.isra.0+0x153/0x700 [ 18.284387] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 18.284416] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 18.284445] ? dequeue_task_fair+0x166/0x4e0 [ 18.284473] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.284500] ? __pfx_mempool_kfree+0x10/0x10 [ 18.284527] ? __pfx_read_tsc+0x10/0x10 [ 18.284551] ? ktime_get_ts64+0x86/0x230 [ 18.284584] kunit_try_run_case+0x1a5/0x480 [ 18.284615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.284641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.284672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.284700] ? __kthread_parkme+0x82/0x180 [ 18.284727] ? preempt_count_sub+0x50/0x80 [ 18.284960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.285065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.285098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.285134] kthread+0x337/0x6f0 [ 18.285155] ? trace_preempt_on+0x20/0xc0 [ 18.285187] ? __pfx_kthread+0x10/0x10 [ 18.285412] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.285445] ? calculate_sigpending+0x7b/0xa0 [ 18.285475] ? __pfx_kthread+0x10/0x10 [ 18.285498] ret_from_fork+0x41/0x80 [ 18.285524] ? __pfx_kthread+0x10/0x10 [ 18.285547] ret_from_fork_asm+0x1a/0x30 [ 18.285587] </TASK> [ 18.285605] [ 18.294523] The buggy address belongs to the physical page: [ 18.294930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a98 [ 18.295568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.295772] flags: 0x200000000000040(head|node=0|zone=2) [ 18.296096] page_type: f8(unknown) [ 18.296470] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.296990] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.297266] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.297705] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.297950] head: 0200000000000002 ffffea00040aa601 00000000ffffffff 00000000ffffffff [ 18.298147] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.298688] page dumped because: kasan: bad access detected [ 18.299068] [ 18.299134] Memory state around the buggy address: [ 18.299491] ffff888102a99f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.299856] ffff888102a99f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.300432] >ffff888102a9a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.300665] ^ [ 18.300905] ffff888102a9a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.301363] ffff888102a9a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.301718] ================================================================== [ 18.309228] ================================================================== [ 18.309928] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 18.310212] Read of size 1 at addr ffff888102b402bb by task kunit_try_catch/246 [ 18.310673] [ 18.310856] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.310924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.310939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.310967] Call Trace: [ 18.310982] <TASK> [ 18.311006] dump_stack_lvl+0x73/0xb0 [ 18.311043] print_report+0xd1/0x650 [ 18.311069] ? __virt_addr_valid+0x1db/0x2d0 [ 18.311096] ? mempool_oob_right_helper+0x318/0x380 [ 18.311122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.311148] ? mempool_oob_right_helper+0x318/0x380 [ 18.311176] kasan_report+0x141/0x180 [ 18.311201] ? mempool_oob_right_helper+0x318/0x380 [ 18.311235] __asan_report_load1_noabort+0x18/0x20 [ 18.311259] mempool_oob_right_helper+0x318/0x380 [ 18.311287] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 18.311319] ? finish_task_switch.isra.0+0x153/0x700 [ 18.311352] mempool_slab_oob_right+0xed/0x140 [ 18.311377] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 18.311398] ? dequeue_task_fair+0x166/0x4e0 [ 18.311425] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 18.311450] ? __pfx_mempool_free_slab+0x10/0x10 [ 18.311476] ? __pfx_read_tsc+0x10/0x10 [ 18.311499] ? ktime_get_ts64+0x86/0x230 [ 18.311530] kunit_try_run_case+0x1a5/0x480 [ 18.311560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.311583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.311611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.311679] ? __kthread_parkme+0x82/0x180 [ 18.311706] ? preempt_count_sub+0x50/0x80 [ 18.311736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.311904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.311934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.311961] kthread+0x337/0x6f0 [ 18.311981] ? trace_preempt_on+0x20/0xc0 [ 18.312011] ? __pfx_kthread+0x10/0x10 [ 18.312032] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.312058] ? calculate_sigpending+0x7b/0xa0 [ 18.312085] ? __pfx_kthread+0x10/0x10 [ 18.312128] ret_from_fork+0x41/0x80 [ 18.312157] ? __pfx_kthread+0x10/0x10 [ 18.312193] ret_from_fork_asm+0x1a/0x30 [ 18.312580] </TASK> [ 18.312609] [ 18.322725] Allocated by task 246: [ 18.323053] kasan_save_stack+0x45/0x70 [ 18.323503] kasan_save_track+0x18/0x40 [ 18.323723] kasan_save_alloc_info+0x3b/0x50 [ 18.323906] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 18.324052] remove_element+0x11e/0x190 [ 18.324171] mempool_alloc_preallocated+0x4d/0x90 [ 18.324346] mempool_oob_right_helper+0x8a/0x380 [ 18.324711] mempool_slab_oob_right+0xed/0x140 [ 18.325933] kunit_try_run_case+0x1a5/0x480 [ 18.326399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.326844] kthread+0x337/0x6f0 [ 18.327257] ret_from_fork+0x41/0x80 [ 18.327495] ret_from_fork_asm+0x1a/0x30 [ 18.327848] [ 18.327995] The buggy address belongs to the object at ffff888102b40240 [ 18.327995] which belongs to the cache test_cache of size 123 [ 18.328668] The buggy address is located 0 bytes to the right of [ 18.328668] allocated 123-byte region [ffff888102b40240, ffff888102b402bb) [ 18.329701] [ 18.329995] The buggy address belongs to the physical page: [ 18.330263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40 [ 18.330800] flags: 0x200000000000000(node=0|zone=2) [ 18.331241] page_type: f5(slab) [ 18.331470] raw: 0200000000000000 ffff888102b3b140 dead000000000122 0000000000000000 [ 18.332041] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.332581] page dumped because: kasan: bad access detected [ 18.332861] [ 18.333022] Memory state around the buggy address: [ 18.333921] ffff888102b40180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.334266] ffff888102b40200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.334513] >ffff888102b40280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.334742] ^ [ 18.334935] ffff888102b40300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.335147] ffff888102b40380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.335364] ==================================================================