Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 33.615574] ================================================================== [ 33.615752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.615887] Read of size 1 at addr ffff000802778473 by task kunit_try_catch/270 [ 33.622284] [ 33.623771] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 33.623825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.623843] Hardware name: WinLink E850-96 board (DT) [ 33.623863] Call trace: [ 33.623879] show_stack+0x20/0x38 (C) [ 33.623914] dump_stack_lvl+0x8c/0xd0 [ 33.623952] print_report+0x118/0x608 [ 33.623982] kasan_report+0xdc/0x128 [ 33.624010] __asan_report_load1_noabort+0x20/0x30 [ 33.624046] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.624081] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.624116] kunit_try_run_case+0x170/0x3f0 [ 33.624153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624191] kthread+0x328/0x630 [ 33.624226] ret_from_fork+0x10/0x20 [ 33.624262] [ 33.691815] Allocated by task 270: [ 33.695203] kasan_save_stack+0x3c/0x68 [ 33.699018] kasan_save_track+0x20/0x40 [ 33.702839] kasan_save_alloc_info+0x40/0x58 [ 33.707091] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.712386] remove_element+0x130/0x1f8 [ 33.716205] mempool_alloc_preallocated+0x58/0xc0 [ 33.720893] mempool_oob_right_helper+0x98/0x2f0 [ 33.725493] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.730180] kunit_try_run_case+0x170/0x3f0 [ 33.734347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.739817] kthread+0x328/0x630 [ 33.743028] ret_from_fork+0x10/0x20 [ 33.746587] [ 33.748065] The buggy address belongs to the object at ffff000802778400 [ 33.748065] which belongs to the cache kmalloc-128 of size 128 [ 33.760566] The buggy address is located 0 bytes to the right of [ 33.760566] allocated 115-byte region [ffff000802778400, ffff000802778473) [ 33.773496] [ 33.774975] The buggy address belongs to the physical page: [ 33.780532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882778 [ 33.788515] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.796155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.803098] page_type: f5(slab) [ 33.806235] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.813954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.821681] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 33.829491] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.837309] head: 0bfffe0000000001 fffffdffe009de01 00000000ffffffff 00000000ffffffff [ 33.845116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.852923] page dumped because: kasan: bad access detected [ 33.858477] [ 33.859953] Memory state around the buggy address: [ 33.864733] ffff000802778300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.871936] ffff000802778380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879142] >ffff000802778400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.886342] ^ [ 33.893203] ffff000802778480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.900407] ffff000802778500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.907611] ================================================================== [ 33.916578] ================================================================== [ 33.926537] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.934086] Read of size 1 at addr ffff000803262001 by task kunit_try_catch/272 [ 33.941376] [ 33.942862] CPU: 6 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 33.942921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.942939] Hardware name: WinLink E850-96 board (DT) [ 33.942962] Call trace: [ 33.942975] show_stack+0x20/0x38 (C) [ 33.943011] dump_stack_lvl+0x8c/0xd0 [ 33.943046] print_report+0x118/0x608 [ 33.943081] kasan_report+0xdc/0x128 [ 33.943110] __asan_report_load1_noabort+0x20/0x30 [ 33.943148] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.943184] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.943220] kunit_try_run_case+0x170/0x3f0 [ 33.943256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.943293] kthread+0x328/0x630 [ 33.943329] ret_from_fork+0x10/0x20 [ 33.943365] [ 34.011428] The buggy address belongs to the physical page: [ 34.016987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 34.024970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.032611] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.039551] page_type: f8(unknown) [ 34.042950] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.050668] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.058395] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.066206] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.074020] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff [ 34.081832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.089637] page dumped because: kasan: bad access detected [ 34.095192] [ 34.096667] Memory state around the buggy address: [ 34.101448] ffff000803261f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.108651] ffff000803261f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.115859] >ffff000803262000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.123057] ^ [ 34.126272] ffff000803262080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.133477] ffff000803262100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.140680] ================================================================== [ 34.150273] ================================================================== [ 34.160127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.167677] Read of size 1 at addr ffff00080675f2bb by task kunit_try_catch/274 [ 34.174967] [ 34.176454] CPU: 7 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 34.176508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.176525] Hardware name: WinLink E850-96 board (DT) [ 34.176546] Call trace: [ 34.176562] show_stack+0x20/0x38 (C) [ 34.176596] dump_stack_lvl+0x8c/0xd0 [ 34.176635] print_report+0x118/0x608 [ 34.176663] kasan_report+0xdc/0x128 [ 34.176692] __asan_report_load1_noabort+0x20/0x30 [ 34.176727] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.176763] mempool_slab_oob_right+0xc0/0x118 [ 34.176792] kunit_try_run_case+0x170/0x3f0 [ 34.176829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.176866] kthread+0x328/0x630 [ 34.176902] ret_from_fork+0x10/0x20 [ 34.176936] [ 34.244237] Allocated by task 274: [ 34.247625] kasan_save_stack+0x3c/0x68 [ 34.251440] kasan_save_track+0x20/0x40 [ 34.255260] kasan_save_alloc_info+0x40/0x58 [ 34.259513] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.264721] remove_element+0x16c/0x1f8 [ 34.268540] mempool_alloc_preallocated+0x58/0xc0 [ 34.273228] mempool_oob_right_helper+0x98/0x2f0 [ 34.277829] mempool_slab_oob_right+0xc0/0x118 [ 34.282256] kunit_try_run_case+0x170/0x3f0 [ 34.286422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.291891] kthread+0x328/0x630 [ 34.295103] ret_from_fork+0x10/0x20 [ 34.298662] [ 34.300139] The buggy address belongs to the object at ffff00080675f240 [ 34.300139] which belongs to the cache test_cache of size 123 [ 34.312553] The buggy address is located 0 bytes to the right of [ 34.312553] allocated 123-byte region [ffff00080675f240, ffff00080675f2bb) [ 34.325484] [ 34.326964] The buggy address belongs to the physical page: [ 34.332519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88675f [ 34.340504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.347013] page_type: f5(slab) [ 34.350151] raw: 0bfffe0000000000 ffff000801bca140 dead000000000122 0000000000000000 [ 34.357871] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.365591] page dumped because: kasan: bad access detected [ 34.371143] [ 34.372618] Memory state around the buggy address: [ 34.377401] ffff00080675f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.384602] ffff00080675f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.391810] >ffff00080675f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.399008] ^ [ 34.404046] ffff00080675f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.411251] ffff00080675f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.418453] ==================================================================
[ 17.505589] ================================================================== [ 17.505679] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.505751] Read of size 1 at addr fff00000c6eca473 by task kunit_try_catch/226 [ 17.505801] [ 17.505842] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.505928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.505955] Hardware name: linux,dummy-virt (DT) [ 17.505994] Call trace: [ 17.506018] show_stack+0x20/0x38 (C) [ 17.506069] dump_stack_lvl+0x8c/0xd0 [ 17.506120] print_report+0x118/0x608 [ 17.506163] kasan_report+0xdc/0x128 [ 17.506207] __asan_report_load1_noabort+0x20/0x30 [ 17.506256] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.506306] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.506356] kunit_try_run_case+0x170/0x3f0 [ 17.506406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.506458] kthread+0x328/0x630 [ 17.506504] ret_from_fork+0x10/0x20 [ 17.506553] [ 17.506571] Allocated by task 226: [ 17.506601] kasan_save_stack+0x3c/0x68 [ 17.506652] kasan_save_track+0x20/0x40 [ 17.506689] kasan_save_alloc_info+0x40/0x58 [ 17.506727] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.506769] remove_element+0x130/0x1f8 [ 17.506809] mempool_alloc_preallocated+0x58/0xc0 [ 17.506851] mempool_oob_right_helper+0x98/0x2f0 [ 17.506891] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.506933] kunit_try_run_case+0x170/0x3f0 [ 17.506972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.507014] kthread+0x328/0x630 [ 17.507050] ret_from_fork+0x10/0x20 [ 17.507084] [ 17.507103] The buggy address belongs to the object at fff00000c6eca400 [ 17.507103] which belongs to the cache kmalloc-128 of size 128 [ 17.507159] The buggy address is located 0 bytes to the right of [ 17.507159] allocated 115-byte region [fff00000c6eca400, fff00000c6eca473) [ 17.507222] [ 17.507243] The buggy address belongs to the physical page: [ 17.507275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106eca [ 17.507328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.507378] page_type: f5(slab) [ 17.507421] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.507470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.507512] page dumped because: kasan: bad access detected [ 17.507544] [ 17.507561] Memory state around the buggy address: [ 17.507596] fff00000c6eca300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.507651] fff00000c6eca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.507695] >fff00000c6eca400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.507733] ^ [ 17.507772] fff00000c6eca480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.507815] fff00000c6eca500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.507852] ================================================================== [ 17.517281] ================================================================== [ 17.517345] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.517402] Read of size 1 at addr fff00000c784a001 by task kunit_try_catch/228 [ 17.517451] [ 17.517485] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.517566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.517594] Hardware name: linux,dummy-virt (DT) [ 17.517625] Call trace: [ 17.517664] show_stack+0x20/0x38 (C) [ 17.517713] dump_stack_lvl+0x8c/0xd0 [ 17.517760] print_report+0x118/0x608 [ 17.517802] kasan_report+0xdc/0x128 [ 17.517845] __asan_report_load1_noabort+0x20/0x30 [ 17.517895] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.517942] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.518067] kunit_try_run_case+0x170/0x3f0 [ 17.518136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.518189] kthread+0x328/0x630 [ 17.518665] ret_from_fork+0x10/0x20 [ 17.519011] [ 17.519134] The buggy address belongs to the physical page: [ 17.519266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 17.519363] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.519583] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.519760] page_type: f8(unknown) [ 17.519808] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.520007] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.520407] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.520586] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.520675] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 17.520733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.520883] page dumped because: kasan: bad access detected [ 17.520959] [ 17.521027] Memory state around the buggy address: [ 17.521059] fff00000c7849f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.521244] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.521435] >fff00000c784a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.521476] ^ [ 17.521503] fff00000c784a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.521544] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.521583] ================================================================== [ 17.539229] ================================================================== [ 17.539293] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.539347] Read of size 1 at addr fff00000c79332bb by task kunit_try_catch/230 [ 17.539396] [ 17.539429] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.539512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.539540] Hardware name: linux,dummy-virt (DT) [ 17.540009] Call trace: [ 17.540048] show_stack+0x20/0x38 (C) [ 17.540225] dump_stack_lvl+0x8c/0xd0 [ 17.540569] print_report+0x118/0x608 [ 17.540958] kasan_report+0xdc/0x128 [ 17.541429] __asan_report_load1_noabort+0x20/0x30 [ 17.542252] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.542469] mempool_slab_oob_right+0xc0/0x118 [ 17.542532] kunit_try_run_case+0x170/0x3f0 [ 17.542898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.543276] kthread+0x328/0x630 [ 17.543526] ret_from_fork+0x10/0x20 [ 17.543893] [ 17.543918] Allocated by task 230: [ 17.544098] kasan_save_stack+0x3c/0x68 [ 17.544312] kasan_save_track+0x20/0x40 [ 17.544376] kasan_save_alloc_info+0x40/0x58 [ 17.544416] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.544464] remove_element+0x16c/0x1f8 [ 17.544504] mempool_alloc_preallocated+0x58/0xc0 [ 17.544546] mempool_oob_right_helper+0x98/0x2f0 [ 17.544585] mempool_slab_oob_right+0xc0/0x118 [ 17.544622] kunit_try_run_case+0x170/0x3f0 [ 17.544668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.545757] kthread+0x328/0x630 [ 17.545808] ret_from_fork+0x10/0x20 [ 17.545844] [ 17.545867] The buggy address belongs to the object at fff00000c7933240 [ 17.545867] which belongs to the cache test_cache of size 123 [ 17.546195] The buggy address is located 0 bytes to the right of [ 17.546195] allocated 123-byte region [fff00000c7933240, fff00000c79332bb) [ 17.546651] [ 17.546681] The buggy address belongs to the physical page: [ 17.547053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107933 [ 17.547334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.547577] page_type: f5(slab) [ 17.547693] raw: 0bfffe0000000000 fff00000c3eadb40 dead000000000122 0000000000000000 [ 17.548168] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.548254] page dumped because: kasan: bad access detected [ 17.548288] [ 17.548306] Memory state around the buggy address: [ 17.548349] fff00000c7933180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.548393] fff00000c7933200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.548435] >fff00000c7933280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.548490] ^ [ 17.548524] fff00000c7933300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.549019] fff00000c7933380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.549184] ==================================================================
[ 16.029084] ================================================================== [ 16.029659] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.029998] Read of size 1 at addr ffff8881029e5d73 by task kunit_try_catch/242 [ 16.030973] [ 16.031242] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.031373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.031404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.031457] Call Trace: [ 16.031489] <TASK> [ 16.031675] dump_stack_lvl+0x73/0xb0 [ 16.031763] print_report+0xd1/0x650 [ 16.031815] ? __virt_addr_valid+0x1db/0x2d0 [ 16.031865] ? mempool_oob_right_helper+0x318/0x380 [ 16.031911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.031960] ? mempool_oob_right_helper+0x318/0x380 [ 16.032002] kasan_report+0x141/0x180 [ 16.032080] ? mempool_oob_right_helper+0x318/0x380 [ 16.032150] __asan_report_load1_noabort+0x18/0x20 [ 16.032197] mempool_oob_right_helper+0x318/0x380 [ 16.032250] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.032303] ? dequeue_entities+0x852/0x1740 [ 16.032379] ? finish_task_switch.isra.0+0x153/0x700 [ 16.032493] mempool_kmalloc_oob_right+0xf2/0x150 [ 16.032540] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 16.032573] ? dequeue_task_fair+0x166/0x4e0 [ 16.032598] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.032622] ? __pfx_mempool_kfree+0x10/0x10 [ 16.032646] ? __pfx_read_tsc+0x10/0x10 [ 16.032668] ? ktime_get_ts64+0x86/0x230 [ 16.032696] kunit_try_run_case+0x1a5/0x480 [ 16.032725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.032747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.032773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.032799] ? __kthread_parkme+0x82/0x180 [ 16.032824] ? preempt_count_sub+0x50/0x80 [ 16.032850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.032874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.032898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.032922] kthread+0x337/0x6f0 [ 16.032941] ? trace_preempt_on+0x20/0xc0 [ 16.032966] ? __pfx_kthread+0x10/0x10 [ 16.032986] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.033009] ? calculate_sigpending+0x7b/0xa0 [ 16.033048] ? __pfx_kthread+0x10/0x10 [ 16.033073] ret_from_fork+0x41/0x80 [ 16.033104] ? __pfx_kthread+0x10/0x10 [ 16.033125] ret_from_fork_asm+0x1a/0x30 [ 16.033160] </TASK> [ 16.033175] [ 16.046798] Allocated by task 242: [ 16.047009] kasan_save_stack+0x45/0x70 [ 16.047219] kasan_save_track+0x18/0x40 [ 16.047402] kasan_save_alloc_info+0x3b/0x50 [ 16.047575] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.047761] remove_element+0x11e/0x190 [ 16.047911] mempool_alloc_preallocated+0x4d/0x90 [ 16.048093] mempool_oob_right_helper+0x8a/0x380 [ 16.048462] mempool_kmalloc_oob_right+0xf2/0x150 [ 16.048678] kunit_try_run_case+0x1a5/0x480 [ 16.048867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.049093] kthread+0x337/0x6f0 [ 16.049249] ret_from_fork+0x41/0x80 [ 16.049440] ret_from_fork_asm+0x1a/0x30 [ 16.049621] [ 16.051294] The buggy address belongs to the object at ffff8881029e5d00 [ 16.051294] which belongs to the cache kmalloc-128 of size 128 [ 16.051759] The buggy address is located 0 bytes to the right of [ 16.051759] allocated 115-byte region [ffff8881029e5d00, ffff8881029e5d73) [ 16.052283] [ 16.052880] The buggy address belongs to the physical page: [ 16.055485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 16.055817] flags: 0x200000000000000(node=0|zone=2) [ 16.056056] page_type: f5(slab) [ 16.057757] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.058849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.059892] page dumped because: kasan: bad access detected [ 16.060119] [ 16.060231] Memory state around the buggy address: [ 16.060477] ffff8881029e5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.060735] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.061705] >ffff8881029e5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.061998] ^ [ 16.062438] ffff8881029e5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.062907] ffff8881029e5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.063287] ================================================================== [ 16.111085] ================================================================== [ 16.111630] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.112453] Read of size 1 at addr ffff8881026102bb by task kunit_try_catch/246 [ 16.113175] [ 16.113482] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.113765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.113785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.113815] Call Trace: [ 16.113833] <TASK> [ 16.113862] dump_stack_lvl+0x73/0xb0 [ 16.113906] print_report+0xd1/0x650 [ 16.113938] ? __virt_addr_valid+0x1db/0x2d0 [ 16.113968] ? mempool_oob_right_helper+0x318/0x380 [ 16.113996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.114023] ? mempool_oob_right_helper+0x318/0x380 [ 16.114050] kasan_report+0x141/0x180 [ 16.114104] ? mempool_oob_right_helper+0x318/0x380 [ 16.114138] __asan_report_load1_noabort+0x18/0x20 [ 16.114163] mempool_oob_right_helper+0x318/0x380 [ 16.114192] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.114228] mempool_slab_oob_right+0xed/0x140 [ 16.114253] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 16.114276] ? dequeue_task_fair+0x166/0x4e0 [ 16.114306] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 16.114349] ? __pfx_mempool_free_slab+0x10/0x10 [ 16.114382] ? __pfx_read_tsc+0x10/0x10 [ 16.114406] ? ktime_get_ts64+0x86/0x230 [ 16.114437] kunit_try_run_case+0x1a5/0x480 [ 16.114468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.114494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.114524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.114552] ? __kthread_parkme+0x82/0x180 [ 16.114581] ? preempt_count_sub+0x50/0x80 [ 16.114612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.114638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.114665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.114691] kthread+0x337/0x6f0 [ 16.114714] ? trace_preempt_on+0x20/0xc0 [ 16.114742] ? __pfx_kthread+0x10/0x10 [ 16.114765] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.114791] ? calculate_sigpending+0x7b/0xa0 [ 16.114818] ? __pfx_kthread+0x10/0x10 [ 16.114841] ret_from_fork+0x41/0x80 [ 16.114865] ? __pfx_kthread+0x10/0x10 [ 16.114886] ret_from_fork_asm+0x1a/0x30 [ 16.114923] </TASK> [ 16.114936] [ 16.126266] Allocated by task 246: [ 16.126531] kasan_save_stack+0x45/0x70 [ 16.126869] kasan_save_track+0x18/0x40 [ 16.127126] kasan_save_alloc_info+0x3b/0x50 [ 16.127328] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 16.127850] remove_element+0x11e/0x190 [ 16.128247] mempool_alloc_preallocated+0x4d/0x90 [ 16.128551] mempool_oob_right_helper+0x8a/0x380 [ 16.128827] mempool_slab_oob_right+0xed/0x140 [ 16.129033] kunit_try_run_case+0x1a5/0x480 [ 16.129419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.129869] kthread+0x337/0x6f0 [ 16.130186] ret_from_fork+0x41/0x80 [ 16.130418] ret_from_fork_asm+0x1a/0x30 [ 16.130700] [ 16.130868] The buggy address belongs to the object at ffff888102610240 [ 16.130868] which belongs to the cache test_cache of size 123 [ 16.131442] The buggy address is located 0 bytes to the right of [ 16.131442] allocated 123-byte region [ffff888102610240, ffff8881026102bb) [ 16.131881] [ 16.132015] The buggy address belongs to the physical page: [ 16.132468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102610 [ 16.133251] flags: 0x200000000000000(node=0|zone=2) [ 16.133689] page_type: f5(slab) [ 16.134033] raw: 0200000000000000 ffff8881016a0dc0 dead000000000122 0000000000000000 [ 16.134538] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 16.134819] page dumped because: kasan: bad access detected [ 16.135038] [ 16.135252] Memory state around the buggy address: [ 16.135663] ffff888102610180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.136467] ffff888102610200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 16.136917] >ffff888102610280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 16.137451] ^ [ 16.137854] ffff888102610300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.138154] ffff888102610380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.138938] ================================================================== [ 16.071032] ================================================================== [ 16.072259] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.072959] Read of size 1 at addr ffff888102b1e001 by task kunit_try_catch/244 [ 16.073602] [ 16.074025] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.074487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.074521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.074569] Call Trace: [ 16.074596] <TASK> [ 16.074634] dump_stack_lvl+0x73/0xb0 [ 16.074685] print_report+0xd1/0x650 [ 16.074716] ? __virt_addr_valid+0x1db/0x2d0 [ 16.074745] ? mempool_oob_right_helper+0x318/0x380 [ 16.074773] ? kasan_addr_to_slab+0x11/0xa0 [ 16.074798] ? mempool_oob_right_helper+0x318/0x380 [ 16.074825] kasan_report+0x141/0x180 [ 16.074851] ? mempool_oob_right_helper+0x318/0x380 [ 16.074884] __asan_report_load1_noabort+0x18/0x20 [ 16.074908] mempool_oob_right_helper+0x318/0x380 [ 16.074935] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.074961] ? update_load_avg+0x1be/0x21b0 [ 16.074986] ? dequeue_entities+0x27e/0x1740 [ 16.075013] ? finish_task_switch.isra.0+0x153/0x700 [ 16.075044] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 16.075080] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 16.075121] ? dequeue_task_fair+0x166/0x4e0 [ 16.075151] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.075177] ? __pfx_mempool_kfree+0x10/0x10 [ 16.075205] ? __pfx_read_tsc+0x10/0x10 [ 16.075243] ? ktime_get_ts64+0x86/0x230 [ 16.075289] kunit_try_run_case+0x1a5/0x480 [ 16.075349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.075437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.075466] ? __kthread_parkme+0x82/0x180 [ 16.075494] ? preempt_count_sub+0x50/0x80 [ 16.075523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.075576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.075602] kthread+0x337/0x6f0 [ 16.075623] ? trace_preempt_on+0x20/0xc0 [ 16.075652] ? __pfx_kthread+0x10/0x10 [ 16.075673] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.075699] ? calculate_sigpending+0x7b/0xa0 [ 16.075726] ? __pfx_kthread+0x10/0x10 [ 16.075748] ret_from_fork+0x41/0x80 [ 16.075772] ? __pfx_kthread+0x10/0x10 [ 16.075792] ret_from_fork_asm+0x1a/0x30 [ 16.075831] </TASK> [ 16.075844] [ 16.092156] The buggy address belongs to the physical page: [ 16.092789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b1c [ 16.093351] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.093966] flags: 0x200000000000040(head|node=0|zone=2) [ 16.094241] page_type: f8(unknown) [ 16.095372] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.095790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.096447] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.096848] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.097632] head: 0200000000000002 ffffea00040ac701 00000000ffffffff 00000000ffffffff [ 16.098008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.098930] page dumped because: kasan: bad access detected [ 16.099415] [ 16.099761] Memory state around the buggy address: [ 16.100093] ffff888102b1df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.100817] ffff888102b1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.101530] >ffff888102b1e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.101855] ^ [ 16.102172] ffff888102b1e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.102489] ffff888102b1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.102801] ==================================================================