Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.906478] ================================================================== [ 18.906571] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.906652] Read of size 1 at addr fff00000c3ea7c73 by task kunit_try_catch/221 [ 18.906702] [ 18.906747] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.906834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.906877] Hardware name: linux,dummy-virt (DT) [ 18.906911] Call trace: [ 18.906936] show_stack+0x20/0x38 (C) [ 18.906991] dump_stack_lvl+0x8c/0xd0 [ 18.907044] print_report+0x118/0x5d0 [ 18.907094] kasan_report+0xdc/0x128 [ 18.907140] __asan_report_load1_noabort+0x20/0x30 [ 18.907189] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.907237] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.907284] kunit_try_run_case+0x170/0x3f0 [ 18.907356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.907410] kthread+0x328/0x630 [ 18.907452] ret_from_fork+0x10/0x20 [ 18.907502] [ 18.907523] Allocated by task 221: [ 18.907552] kasan_save_stack+0x3c/0x68 [ 18.907596] kasan_save_track+0x20/0x40 [ 18.907634] kasan_save_alloc_info+0x40/0x58 [ 18.907674] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.907717] remove_element+0x130/0x1f8 [ 18.907756] mempool_alloc_preallocated+0x58/0xc0 [ 18.907795] mempool_oob_right_helper+0x98/0x2f0 [ 18.907835] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.907885] kunit_try_run_case+0x170/0x3f0 [ 18.907923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.907967] kthread+0x328/0x630 [ 18.907999] ret_from_fork+0x10/0x20 [ 18.908035] [ 18.908056] The buggy address belongs to the object at fff00000c3ea7c00 [ 18.908056] which belongs to the cache kmalloc-128 of size 128 [ 18.908116] The buggy address is located 0 bytes to the right of [ 18.908116] allocated 115-byte region [fff00000c3ea7c00, fff00000c3ea7c73) [ 18.908179] [ 18.908203] The buggy address belongs to the physical page: [ 18.908235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ea7 [ 18.908288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.908339] page_type: f5(slab) [ 18.908383] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.908434] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.908475] page dumped because: kasan: bad access detected [ 18.908505] [ 18.908525] Memory state around the buggy address: [ 18.908557] fff00000c3ea7b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.908601] fff00000c3ea7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.908643] >fff00000c3ea7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.908681] ^ [ 18.908720] fff00000c3ea7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.908759] fff00000c3ea7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.908797] ================================================================== [ 18.971204] ================================================================== [ 18.971348] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.971894] Read of size 1 at addr fff00000c78e92bb by task kunit_try_catch/225 [ 18.972074] [ 18.972120] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.972205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.972232] Hardware name: linux,dummy-virt (DT) [ 18.972551] Call trace: [ 18.972861] show_stack+0x20/0x38 (C) [ 18.973173] dump_stack_lvl+0x8c/0xd0 [ 18.973481] print_report+0x118/0x5d0 [ 18.973647] kasan_report+0xdc/0x128 [ 18.973700] __asan_report_load1_noabort+0x20/0x30 [ 18.974030] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.974281] mempool_slab_oob_right+0xc0/0x118 [ 18.974335] kunit_try_run_case+0x170/0x3f0 [ 18.974389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.975042] kthread+0x328/0x630 [ 18.975103] ret_from_fork+0x10/0x20 [ 18.975489] [ 18.975513] Allocated by task 225: [ 18.975572] kasan_save_stack+0x3c/0x68 [ 18.975680] kasan_save_track+0x20/0x40 [ 18.975823] kasan_save_alloc_info+0x40/0x58 [ 18.975916] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.975960] remove_element+0x16c/0x1f8 [ 18.975997] mempool_alloc_preallocated+0x58/0xc0 [ 18.976319] mempool_oob_right_helper+0x98/0x2f0 [ 18.976369] mempool_slab_oob_right+0xc0/0x118 [ 18.976438] kunit_try_run_case+0x170/0x3f0 [ 18.976489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.976675] kthread+0x328/0x630 [ 18.976892] ret_from_fork+0x10/0x20 [ 18.976933] [ 18.977320] The buggy address belongs to the object at fff00000c78e9240 [ 18.977320] which belongs to the cache test_cache of size 123 [ 18.977425] The buggy address is located 0 bytes to the right of [ 18.977425] allocated 123-byte region [fff00000c78e9240, fff00000c78e92bb) [ 18.977840] [ 18.977935] The buggy address belongs to the physical page: [ 18.977982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9 [ 18.978060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.978414] page_type: f5(slab) [ 18.978479] raw: 0bfffe0000000000 fff00000c78af280 dead000000000122 0000000000000000 [ 18.978553] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.978873] page dumped because: kasan: bad access detected [ 18.978935] [ 18.979032] Memory state around the buggy address: [ 18.979100] fff00000c78e9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.979465] fff00000c78e9200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.979549] >fff00000c78e9280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.979839] ^ [ 18.980031] fff00000c78e9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.980180] fff00000c78e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.980244] ================================================================== [ 18.937723] ================================================================== [ 18.937829] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.937940] Read of size 1 at addr fff00000c616e001 by task kunit_try_catch/223 [ 18.937991] [ 18.938033] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.938139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.938164] Hardware name: linux,dummy-virt (DT) [ 18.938197] Call trace: [ 18.938221] show_stack+0x20/0x38 (C) [ 18.938273] dump_stack_lvl+0x8c/0xd0 [ 18.938323] print_report+0x118/0x5d0 [ 18.938372] kasan_report+0xdc/0x128 [ 18.938416] __asan_report_load1_noabort+0x20/0x30 [ 18.938469] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.938515] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.938567] kunit_try_run_case+0x170/0x3f0 [ 18.938615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.938668] kthread+0x328/0x630 [ 18.938712] ret_from_fork+0x10/0x20 [ 18.938762] [ 18.938784] The buggy address belongs to the physical page: [ 18.938820] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 18.938888] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.938937] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.938996] page_type: f8(unknown) [ 18.939041] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.939092] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.939142] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.939191] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.939243] head: 0bfffe0000000002 ffffc1ffc3185b01 00000000ffffffff 00000000ffffffff [ 18.939301] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.939346] page dumped because: kasan: bad access detected [ 18.939379] [ 18.939397] Memory state around the buggy address: [ 18.939433] fff00000c616df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.939479] fff00000c616df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.939524] >fff00000c616e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.939563] ^ [ 18.939591] fff00000c616e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.939632] fff00000c616e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.939671] ==================================================================
[ 18.619380] ================================================================== [ 18.619488] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.619564] Read of size 1 at addr fff00000c7a4e2bb by task kunit_try_catch/225 [ 18.619615] [ 18.619662] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.619754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.619782] Hardware name: linux,dummy-virt (DT) [ 18.619817] Call trace: [ 18.619845] show_stack+0x20/0x38 (C) [ 18.619898] dump_stack_lvl+0x8c/0xd0 [ 18.619958] print_report+0x118/0x5d0 [ 18.620009] kasan_report+0xdc/0x128 [ 18.620055] __asan_report_load1_noabort+0x20/0x30 [ 18.620108] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.620162] mempool_slab_oob_right+0xc0/0x118 [ 18.620211] kunit_try_run_case+0x170/0x3f0 [ 18.620261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.620315] kthread+0x328/0x630 [ 18.620371] ret_from_fork+0x10/0x20 [ 18.620422] [ 18.620440] Allocated by task 225: [ 18.620472] kasan_save_stack+0x3c/0x68 [ 18.620882] kasan_save_track+0x20/0x40 [ 18.620930] kasan_save_alloc_info+0x40/0x58 [ 18.620971] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.621014] remove_element+0x16c/0x1f8 [ 18.621053] mempool_alloc_preallocated+0x58/0xc0 [ 18.621094] mempool_oob_right_helper+0x98/0x2f0 [ 18.621132] mempool_slab_oob_right+0xc0/0x118 [ 18.621169] kunit_try_run_case+0x170/0x3f0 [ 18.621208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.621250] kthread+0x328/0x630 [ 18.621282] ret_from_fork+0x10/0x20 [ 18.621335] [ 18.621356] The buggy address belongs to the object at fff00000c7a4e240 [ 18.621356] which belongs to the cache test_cache of size 123 [ 18.621415] The buggy address is located 0 bytes to the right of [ 18.621415] allocated 123-byte region [fff00000c7a4e240, fff00000c7a4e2bb) [ 18.621478] [ 18.621499] The buggy address belongs to the physical page: [ 18.621533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 18.621588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.621637] page_type: f5(slab) [ 18.621682] raw: 0bfffe0000000000 fff00000ffe8ef00 dead000000000122 0000000000000000 [ 18.621731] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.621772] page dumped because: kasan: bad access detected [ 18.621804] [ 18.621822] Memory state around the buggy address: [ 18.621854] fff00000c7a4e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.621898] fff00000c7a4e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.621941] >fff00000c7a4e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.621978] ^ [ 18.622010] fff00000c7a4e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.622051] fff00000c7a4e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.622090] ================================================================== [ 18.571979] ================================================================== [ 18.572059] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.572126] Read of size 1 at addr fff00000c65ce001 by task kunit_try_catch/223 [ 18.572183] [ 18.572223] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.572316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.572436] Hardware name: linux,dummy-virt (DT) [ 18.572605] Call trace: [ 18.572749] show_stack+0x20/0x38 (C) [ 18.572812] dump_stack_lvl+0x8c/0xd0 [ 18.572866] print_report+0x118/0x5d0 [ 18.572913] kasan_report+0xdc/0x128 [ 18.572957] __asan_report_load1_noabort+0x20/0x30 [ 18.575195] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.575284] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.575530] kunit_try_run_case+0x170/0x3f0 [ 18.576182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.576546] kthread+0x328/0x630 [ 18.577273] ret_from_fork+0x10/0x20 [ 18.577538] [ 18.577755] The buggy address belongs to the physical page: [ 18.578402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cc [ 18.578481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.578531] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.578588] page_type: f8(unknown) [ 18.578632] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.578682] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.578732] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.578780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.578829] head: 0bfffe0000000002 ffffc1ffc3197301 00000000ffffffff 00000000ffffffff [ 18.578878] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.578921] page dumped because: kasan: bad access detected [ 18.578954] [ 18.578973] Memory state around the buggy address: [ 18.579008] fff00000c65cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.579050] fff00000c65cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.579093] >fff00000c65ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.579129] ^ [ 18.581811] fff00000c65ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.581925] fff00000c65ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.582493] ================================================================== [ 18.555840] ================================================================== [ 18.555940] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.556022] Read of size 1 at addr fff00000c790a273 by task kunit_try_catch/221 [ 18.556074] [ 18.556125] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.556220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.556246] Hardware name: linux,dummy-virt (DT) [ 18.556281] Call trace: [ 18.556307] show_stack+0x20/0x38 (C) [ 18.556372] dump_stack_lvl+0x8c/0xd0 [ 18.556424] print_report+0x118/0x5d0 [ 18.556470] kasan_report+0xdc/0x128 [ 18.556630] __asan_report_load1_noabort+0x20/0x30 [ 18.556686] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.556735] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.556783] kunit_try_run_case+0x170/0x3f0 [ 18.556843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.556897] kthread+0x328/0x630 [ 18.556940] ret_from_fork+0x10/0x20 [ 18.556989] [ 18.557010] Allocated by task 221: [ 18.557039] kasan_save_stack+0x3c/0x68 [ 18.557083] kasan_save_track+0x20/0x40 [ 18.557120] kasan_save_alloc_info+0x40/0x58 [ 18.557160] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.557202] remove_element+0x130/0x1f8 [ 18.557247] mempool_alloc_preallocated+0x58/0xc0 [ 18.557285] mempool_oob_right_helper+0x98/0x2f0 [ 18.557336] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.557376] kunit_try_run_case+0x170/0x3f0 [ 18.557415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.557459] kthread+0x328/0x630 [ 18.557491] ret_from_fork+0x10/0x20 [ 18.557528] [ 18.557548] The buggy address belongs to the object at fff00000c790a200 [ 18.557548] which belongs to the cache kmalloc-128 of size 128 [ 18.557614] The buggy address is located 0 bytes to the right of [ 18.557614] allocated 115-byte region [fff00000c790a200, fff00000c790a273) [ 18.557678] [ 18.557700] The buggy address belongs to the physical page: [ 18.557733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790a [ 18.557788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.557842] page_type: f5(slab) [ 18.557886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.557935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.557975] page dumped because: kasan: bad access detected [ 18.558009] [ 18.558027] Memory state around the buggy address: [ 18.558060] fff00000c790a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.558103] fff00000c790a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.558146] >fff00000c790a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.558185] ^ [ 18.558225] fff00000c790a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.558266] fff00000c790a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.558305] ==================================================================
[ 18.526292] ================================================================== [ 18.526365] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.526444] Read of size 1 at addr fff00000c472cb73 by task kunit_try_catch/221 [ 18.526495] [ 18.526539] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.526625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.526652] Hardware name: linux,dummy-virt (DT) [ 18.526689] Call trace: [ 18.526727] show_stack+0x20/0x38 (C) [ 18.526781] dump_stack_lvl+0x8c/0xd0 [ 18.526832] print_report+0x118/0x5d0 [ 18.526999] kasan_report+0xdc/0x128 [ 18.527044] __asan_report_load1_noabort+0x20/0x30 [ 18.527095] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.527143] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.527191] kunit_try_run_case+0x170/0x3f0 [ 18.527241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.527293] kthread+0x328/0x630 [ 18.527335] ret_from_fork+0x10/0x20 [ 18.527385] [ 18.527404] Allocated by task 221: [ 18.527436] kasan_save_stack+0x3c/0x68 [ 18.527477] kasan_save_track+0x20/0x40 [ 18.527514] kasan_save_alloc_info+0x40/0x58 [ 18.527554] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.527598] remove_element+0x130/0x1f8 [ 18.527635] mempool_alloc_preallocated+0x58/0xc0 [ 18.527674] mempool_oob_right_helper+0x98/0x2f0 [ 18.527727] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.527769] kunit_try_run_case+0x170/0x3f0 [ 18.527808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.527850] kthread+0x328/0x630 [ 18.527883] ret_from_fork+0x10/0x20 [ 18.527918] [ 18.527939] The buggy address belongs to the object at fff00000c472cb00 [ 18.527939] which belongs to the cache kmalloc-128 of size 128 [ 18.527998] The buggy address is located 0 bytes to the right of [ 18.527998] allocated 115-byte region [fff00000c472cb00, fff00000c472cb73) [ 18.528060] [ 18.528082] The buggy address belongs to the physical page: [ 18.528116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10472c [ 18.528171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.528224] page_type: f5(slab) [ 18.528268] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.528317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.528358] page dumped because: kasan: bad access detected [ 18.528388] [ 18.528406] Memory state around the buggy address: [ 18.528440] fff00000c472ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.528484] fff00000c472ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.528527] >fff00000c472cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.528566] ^ [ 18.528606] fff00000c472cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.528648] fff00000c472cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.528686] ================================================================== [ 18.542302] ================================================================== [ 18.542366] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.543007] Read of size 1 at addr fff00000c646e001 by task kunit_try_catch/223 [ 18.543090] [ 18.543130] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.543736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.543786] Hardware name: linux,dummy-virt (DT) [ 18.543821] Call trace: [ 18.544016] show_stack+0x20/0x38 (C) [ 18.544604] dump_stack_lvl+0x8c/0xd0 [ 18.544676] print_report+0x118/0x5d0 [ 18.544733] kasan_report+0xdc/0x128 [ 18.545191] __asan_report_load1_noabort+0x20/0x30 [ 18.545259] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.545371] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.545425] kunit_try_run_case+0x170/0x3f0 [ 18.545474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.546229] kthread+0x328/0x630 [ 18.546675] ret_from_fork+0x10/0x20 [ 18.546862] [ 18.546884] The buggy address belongs to the physical page: [ 18.546920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10646c [ 18.546978] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.547567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.547936] page_type: f8(unknown) [ 18.547981] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.548294] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.548415] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.548467] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.548517] head: 0bfffe0000000002 ffffc1ffc3191b01 00000000ffffffff 00000000ffffffff [ 18.548985] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.549047] page dumped because: kasan: bad access detected [ 18.549082] [ 18.549121] Memory state around the buggy address: [ 18.549200] fff00000c646df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.549245] fff00000c646df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.549288] >fff00000c646e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.549814] ^ [ 18.549850] fff00000c646e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.549894] fff00000c646e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.550189] ================================================================== [ 18.565469] ================================================================== [ 18.565763] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.566146] Read of size 1 at addr fff00000c64182bb by task kunit_try_catch/225 [ 18.566227] [ 18.566930] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.567106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.567457] Hardware name: linux,dummy-virt (DT) [ 18.567500] Call trace: [ 18.567524] show_stack+0x20/0x38 (C) [ 18.567844] dump_stack_lvl+0x8c/0xd0 [ 18.568014] print_report+0x118/0x5d0 [ 18.568210] kasan_report+0xdc/0x128 [ 18.568489] __asan_report_load1_noabort+0x20/0x30 [ 18.568962] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.569061] mempool_slab_oob_right+0xc0/0x118 [ 18.569110] kunit_try_run_case+0x170/0x3f0 [ 18.569159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.569682] kthread+0x328/0x630 [ 18.570487] ret_from_fork+0x10/0x20 [ 18.570806] [ 18.570949] Allocated by task 225: [ 18.570990] kasan_save_stack+0x3c/0x68 [ 18.571037] kasan_save_track+0x20/0x40 [ 18.571120] kasan_save_alloc_info+0x40/0x58 [ 18.571171] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.571216] remove_element+0x16c/0x1f8 [ 18.571258] mempool_alloc_preallocated+0x58/0xc0 [ 18.571296] mempool_oob_right_helper+0x98/0x2f0 [ 18.571598] mempool_slab_oob_right+0xc0/0x118 [ 18.571817] kunit_try_run_case+0x170/0x3f0 [ 18.571924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.572125] kthread+0x328/0x630 [ 18.572161] ret_from_fork+0x10/0x20 [ 18.572197] [ 18.572843] The buggy address belongs to the object at fff00000c6418240 [ 18.572843] which belongs to the cache test_cache of size 123 [ 18.573009] The buggy address is located 0 bytes to the right of [ 18.573009] allocated 123-byte region [fff00000c6418240, fff00000c64182bb) [ 18.573159] [ 18.573181] The buggy address belongs to the physical page: [ 18.573751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418 [ 18.574001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.574460] page_type: f5(slab) [ 18.574671] raw: 0bfffe0000000000 fff00000c1bfc500 dead000000000122 0000000000000000 [ 18.575006] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.575287] page dumped because: kasan: bad access detected [ 18.575367] [ 18.575589] Memory state around the buggy address: [ 18.575632] fff00000c6418180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.575679] fff00000c6418200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.575736] >fff00000c6418280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.575776] ^ [ 18.575813] fff00000c6418300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575855] fff00000c6418380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.575895] ==================================================================
[ 13.674734] ================================================================== [ 13.675180] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.675429] Read of size 1 at addr ffff888103a1e001 by task kunit_try_catch/240 [ 13.676185] [ 13.676695] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.676745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.676757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.676781] Call Trace: [ 13.676793] <TASK> [ 13.676809] dump_stack_lvl+0x73/0xb0 [ 13.676840] print_report+0xd1/0x610 [ 13.676862] ? __virt_addr_valid+0x1db/0x2d0 [ 13.676884] ? mempool_oob_right_helper+0x318/0x380 [ 13.676922] ? kasan_addr_to_slab+0x11/0xa0 [ 13.676942] ? mempool_oob_right_helper+0x318/0x380 [ 13.676966] kasan_report+0x141/0x180 [ 13.676988] ? mempool_oob_right_helper+0x318/0x380 [ 13.677017] __asan_report_load1_noabort+0x18/0x20 [ 13.677041] mempool_oob_right_helper+0x318/0x380 [ 13.677066] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.677092] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.677114] ? finish_task_switch.isra.0+0x153/0x700 [ 13.677141] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.677166] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.677194] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.677218] ? __pfx_mempool_kfree+0x10/0x10 [ 13.677242] ? __pfx_read_tsc+0x10/0x10 [ 13.677262] ? ktime_get_ts64+0x86/0x230 [ 13.677288] kunit_try_run_case+0x1a5/0x480 [ 13.677313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.677335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.677359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.677383] ? __kthread_parkme+0x82/0x180 [ 13.677403] ? preempt_count_sub+0x50/0x80 [ 13.677452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.677476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.677500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.677524] kthread+0x337/0x6f0 [ 13.677543] ? trace_preempt_on+0x20/0xc0 [ 13.677579] ? __pfx_kthread+0x10/0x10 [ 13.677599] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.677622] ? calculate_sigpending+0x7b/0xa0 [ 13.677646] ? __pfx_kthread+0x10/0x10 [ 13.677667] ret_from_fork+0x116/0x1d0 [ 13.677685] ? __pfx_kthread+0x10/0x10 [ 13.677705] ret_from_fork_asm+0x1a/0x30 [ 13.677738] </TASK> [ 13.677749] [ 13.688677] The buggy address belongs to the physical page: [ 13.688970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a1c [ 13.689314] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.689711] flags: 0x200000000000040(head|node=0|zone=2) [ 13.689975] page_type: f8(unknown) [ 13.690177] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.690493] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.691085] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.691401] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.691698] head: 0200000000000002 ffffea00040e8701 00000000ffffffff 00000000ffffffff [ 13.692073] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.692467] page dumped because: kasan: bad access detected [ 13.692723] [ 13.692816] Memory state around the buggy address: [ 13.693131] ffff888103a1df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.693422] ffff888103a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.693788] >ffff888103a1e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.694134] ^ [ 13.694299] ffff888103a1e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.694694] ffff888103a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.695142] ================================================================== [ 13.649927] ================================================================== [ 13.650387] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.650826] Read of size 1 at addr ffff888102e24973 by task kunit_try_catch/238 [ 13.651175] [ 13.651328] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.651378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.651389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.651413] Call Trace: [ 13.651426] <TASK> [ 13.651444] dump_stack_lvl+0x73/0xb0 [ 13.651478] print_report+0xd1/0x610 [ 13.651501] ? __virt_addr_valid+0x1db/0x2d0 [ 13.651526] ? mempool_oob_right_helper+0x318/0x380 [ 13.651550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.651572] ? mempool_oob_right_helper+0x318/0x380 [ 13.651596] kasan_report+0x141/0x180 [ 13.651617] ? mempool_oob_right_helper+0x318/0x380 [ 13.651646] __asan_report_load1_noabort+0x18/0x20 [ 13.651670] mempool_oob_right_helper+0x318/0x380 [ 13.651695] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.651721] ? __kasan_check_write+0x18/0x20 [ 13.651740] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.651763] ? finish_task_switch.isra.0+0x153/0x700 [ 13.651790] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.651813] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.651841] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.651865] ? __pfx_mempool_kfree+0x10/0x10 [ 13.651890] ? __pfx_read_tsc+0x10/0x10 [ 13.651923] ? ktime_get_ts64+0x86/0x230 [ 13.651949] kunit_try_run_case+0x1a5/0x480 [ 13.651975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.651997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.652050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.652075] ? __kthread_parkme+0x82/0x180 [ 13.652096] ? preempt_count_sub+0x50/0x80 [ 13.652163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.652186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.652211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.652246] kthread+0x337/0x6f0 [ 13.652265] ? trace_preempt_on+0x20/0xc0 [ 13.652288] ? __pfx_kthread+0x10/0x10 [ 13.652308] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.652330] ? calculate_sigpending+0x7b/0xa0 [ 13.652355] ? __pfx_kthread+0x10/0x10 [ 13.652376] ret_from_fork+0x116/0x1d0 [ 13.652395] ? __pfx_kthread+0x10/0x10 [ 13.652415] ret_from_fork_asm+0x1a/0x30 [ 13.652448] </TASK> [ 13.652458] [ 13.660928] Allocated by task 238: [ 13.661092] kasan_save_stack+0x45/0x70 [ 13.661617] kasan_save_track+0x18/0x40 [ 13.661830] kasan_save_alloc_info+0x3b/0x50 [ 13.662123] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.662303] remove_element+0x11e/0x190 [ 13.662443] mempool_alloc_preallocated+0x4d/0x90 [ 13.662848] mempool_oob_right_helper+0x8a/0x380 [ 13.663182] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.663463] kunit_try_run_case+0x1a5/0x480 [ 13.663796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.664105] kthread+0x337/0x6f0 [ 13.664237] ret_from_fork+0x116/0x1d0 [ 13.664372] ret_from_fork_asm+0x1a/0x30 [ 13.664832] [ 13.664981] The buggy address belongs to the object at ffff888102e24900 [ 13.664981] which belongs to the cache kmalloc-128 of size 128 [ 13.665499] The buggy address is located 0 bytes to the right of [ 13.665499] allocated 115-byte region [ffff888102e24900, ffff888102e24973) [ 13.666248] [ 13.666356] The buggy address belongs to the physical page: [ 13.666687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24 [ 13.667166] flags: 0x200000000000000(node=0|zone=2) [ 13.667442] page_type: f5(slab) [ 13.667747] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.668179] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.668423] page dumped because: kasan: bad access detected [ 13.668873] [ 13.669004] Memory state around the buggy address: [ 13.669234] ffff888102e24800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.669662] ffff888102e24880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.669924] >ffff888102e24900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.670251] ^ [ 13.670623] ffff888102e24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.670933] ffff888102e24a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.671260] ================================================================== [ 13.699566] ================================================================== [ 13.701102] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.701987] Read of size 1 at addr ffff8881029ac2bb by task kunit_try_catch/242 [ 13.702214] [ 13.702313] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.702665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.702680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.702705] Call Trace: [ 13.702719] <TASK> [ 13.702750] dump_stack_lvl+0x73/0xb0 [ 13.702795] print_report+0xd1/0x610 [ 13.702818] ? __virt_addr_valid+0x1db/0x2d0 [ 13.702845] ? mempool_oob_right_helper+0x318/0x380 [ 13.702869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.703120] ? mempool_oob_right_helper+0x318/0x380 [ 13.703160] kasan_report+0x141/0x180 [ 13.703184] ? mempool_oob_right_helper+0x318/0x380 [ 13.703215] __asan_report_load1_noabort+0x18/0x20 [ 13.703241] mempool_oob_right_helper+0x318/0x380 [ 13.703266] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.703296] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.703322] ? finish_task_switch.isra.0+0x153/0x700 [ 13.703349] mempool_slab_oob_right+0xed/0x140 [ 13.703374] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.703402] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.703428] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.703453] ? __pfx_read_tsc+0x10/0x10 [ 13.703475] ? ktime_get_ts64+0x86/0x230 [ 13.703500] kunit_try_run_case+0x1a5/0x480 [ 13.703537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.703561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.703588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.703612] ? __kthread_parkme+0x82/0x180 [ 13.703633] ? preempt_count_sub+0x50/0x80 [ 13.703657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.703681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.703705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.703730] kthread+0x337/0x6f0 [ 13.703749] ? trace_preempt_on+0x20/0xc0 [ 13.703773] ? __pfx_kthread+0x10/0x10 [ 13.703793] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.703814] ? calculate_sigpending+0x7b/0xa0 [ 13.703839] ? __pfx_kthread+0x10/0x10 [ 13.703860] ret_from_fork+0x116/0x1d0 [ 13.703880] ? __pfx_kthread+0x10/0x10 [ 13.703908] ret_from_fork_asm+0x1a/0x30 [ 13.703942] </TASK> [ 13.703954] [ 13.718563] Allocated by task 242: [ 13.718988] kasan_save_stack+0x45/0x70 [ 13.719527] kasan_save_track+0x18/0x40 [ 13.720164] kasan_save_alloc_info+0x3b/0x50 [ 13.720630] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.721285] remove_element+0x11e/0x190 [ 13.721703] mempool_alloc_preallocated+0x4d/0x90 [ 13.722237] mempool_oob_right_helper+0x8a/0x380 [ 13.722670] mempool_slab_oob_right+0xed/0x140 [ 13.722849] kunit_try_run_case+0x1a5/0x480 [ 13.723078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.723704] kthread+0x337/0x6f0 [ 13.724124] ret_from_fork+0x116/0x1d0 [ 13.724562] ret_from_fork_asm+0x1a/0x30 [ 13.725005] [ 13.725183] The buggy address belongs to the object at ffff8881029ac240 [ 13.725183] which belongs to the cache test_cache of size 123 [ 13.725861] The buggy address is located 0 bytes to the right of [ 13.725861] allocated 123-byte region [ffff8881029ac240, ffff8881029ac2bb) [ 13.726541] [ 13.726617] The buggy address belongs to the physical page: [ 13.727371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ac [ 13.727874] flags: 0x200000000000000(node=0|zone=2) [ 13.728135] page_type: f5(slab) [ 13.728293] raw: 0200000000000000 ffff888100fb8dc0 dead000000000122 0000000000000000 [ 13.728580] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.728876] page dumped because: kasan: bad access detected [ 13.729112] [ 13.729199] Memory state around the buggy address: [ 13.729404] ffff8881029ac180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.729688] ffff8881029ac200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.730061] >ffff8881029ac280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.730385] ^ [ 13.730609] ffff8881029ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.730887] ffff8881029ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.731266] ==================================================================
[ 13.509795] ================================================================== [ 13.510300] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.510966] Read of size 1 at addr ffff888102bf6001 by task kunit_try_catch/241 [ 13.511322] [ 13.511428] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.511490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.511501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.511524] Call Trace: [ 13.511536] <TASK> [ 13.511554] dump_stack_lvl+0x73/0xb0 [ 13.511586] print_report+0xd1/0x610 [ 13.511610] ? __virt_addr_valid+0x1db/0x2d0 [ 13.511633] ? mempool_oob_right_helper+0x318/0x380 [ 13.511657] ? kasan_addr_to_slab+0x11/0xa0 [ 13.511677] ? mempool_oob_right_helper+0x318/0x380 [ 13.511701] kasan_report+0x141/0x180 [ 13.511723] ? mempool_oob_right_helper+0x318/0x380 [ 13.511753] __asan_report_load1_noabort+0x18/0x20 [ 13.511777] mempool_oob_right_helper+0x318/0x380 [ 13.511802] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.511827] ? __kasan_check_write+0x18/0x20 [ 13.511847] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.511869] ? finish_task_switch.isra.0+0x153/0x700 [ 13.511897] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.511923] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.511951] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.511975] ? __pfx_mempool_kfree+0x10/0x10 [ 13.512000] ? __pfx_read_tsc+0x10/0x10 [ 13.512021] ? ktime_get_ts64+0x86/0x230 [ 13.512060] kunit_try_run_case+0x1a5/0x480 [ 13.512097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.512121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.512146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.512169] ? __kthread_parkme+0x82/0x180 [ 13.512191] ? preempt_count_sub+0x50/0x80 [ 13.512214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.512237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.512261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.512285] kthread+0x337/0x6f0 [ 13.512303] ? trace_preempt_on+0x20/0xc0 [ 13.512326] ? __pfx_kthread+0x10/0x10 [ 13.512346] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.512368] ? calculate_sigpending+0x7b/0xa0 [ 13.512393] ? __pfx_kthread+0x10/0x10 [ 13.512424] ret_from_fork+0x116/0x1d0 [ 13.512452] ? __pfx_kthread+0x10/0x10 [ 13.512472] ret_from_fork_asm+0x1a/0x30 [ 13.512507] </TASK> [ 13.512518] [ 13.521235] The buggy address belongs to the physical page: [ 13.521547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf4 [ 13.521882] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.522199] flags: 0x200000000000040(head|node=0|zone=2) [ 13.522516] page_type: f8(unknown) [ 13.522721] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.522991] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.523220] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.523460] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.523820] head: 0200000000000002 ffffea00040afd01 00000000ffffffff 00000000ffffffff [ 13.524156] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.524498] page dumped because: kasan: bad access detected [ 13.525207] [ 13.525288] Memory state around the buggy address: [ 13.525588] ffff888102bf5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.526359] ffff888102bf5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.527086] >ffff888102bf6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.527481] ^ [ 13.527670] ffff888102bf6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.527958] ffff888102bf6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.528293] ================================================================== [ 13.533169] ================================================================== [ 13.533856] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.534241] Read of size 1 at addr ffff8881026ef2bb by task kunit_try_catch/243 [ 13.535209] [ 13.535309] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.535357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.535369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.535391] Call Trace: [ 13.535403] <TASK> [ 13.535420] dump_stack_lvl+0x73/0xb0 [ 13.535466] print_report+0xd1/0x610 [ 13.535490] ? __virt_addr_valid+0x1db/0x2d0 [ 13.535513] ? mempool_oob_right_helper+0x318/0x380 [ 13.535589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.535613] ? mempool_oob_right_helper+0x318/0x380 [ 13.535851] kasan_report+0x141/0x180 [ 13.535883] ? mempool_oob_right_helper+0x318/0x380 [ 13.535915] __asan_report_load1_noabort+0x18/0x20 [ 13.535941] mempool_oob_right_helper+0x318/0x380 [ 13.535966] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.535993] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.536018] ? finish_task_switch.isra.0+0x153/0x700 [ 13.536045] mempool_slab_oob_right+0xed/0x140 [ 13.536070] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.536099] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.536123] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.536150] ? __pfx_read_tsc+0x10/0x10 [ 13.536171] ? ktime_get_ts64+0x86/0x230 [ 13.536197] kunit_try_run_case+0x1a5/0x480 [ 13.536222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.536244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.536269] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.536293] ? __kthread_parkme+0x82/0x180 [ 13.536313] ? preempt_count_sub+0x50/0x80 [ 13.536337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.536361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.536384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.536473] kthread+0x337/0x6f0 [ 13.536496] ? trace_preempt_on+0x20/0xc0 [ 13.536519] ? __pfx_kthread+0x10/0x10 [ 13.536540] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.536561] ? calculate_sigpending+0x7b/0xa0 [ 13.536587] ? __pfx_kthread+0x10/0x10 [ 13.536608] ret_from_fork+0x116/0x1d0 [ 13.536627] ? __pfx_kthread+0x10/0x10 [ 13.536646] ret_from_fork_asm+0x1a/0x30 [ 13.536680] </TASK> [ 13.536689] [ 13.550905] Allocated by task 243: [ 13.551060] kasan_save_stack+0x45/0x70 [ 13.551281] kasan_save_track+0x18/0x40 [ 13.551515] kasan_save_alloc_info+0x3b/0x50 [ 13.551883] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.552104] remove_element+0x11e/0x190 [ 13.552418] mempool_alloc_preallocated+0x4d/0x90 [ 13.552656] mempool_oob_right_helper+0x8a/0x380 [ 13.552844] mempool_slab_oob_right+0xed/0x140 [ 13.553057] kunit_try_run_case+0x1a5/0x480 [ 13.553211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.553388] kthread+0x337/0x6f0 [ 13.553665] ret_from_fork+0x116/0x1d0 [ 13.553862] ret_from_fork_asm+0x1a/0x30 [ 13.554060] [ 13.554156] The buggy address belongs to the object at ffff8881026ef240 [ 13.554156] which belongs to the cache test_cache of size 123 [ 13.554758] The buggy address is located 0 bytes to the right of [ 13.554758] allocated 123-byte region [ffff8881026ef240, ffff8881026ef2bb) [ 13.555255] [ 13.555330] The buggy address belongs to the physical page: [ 13.556228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ef [ 13.556875] flags: 0x200000000000000(node=0|zone=2) [ 13.557121] page_type: f5(slab) [ 13.557292] raw: 0200000000000000 ffff8881015eaa00 dead000000000122 0000000000000000 [ 13.557689] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.557918] page dumped because: kasan: bad access detected [ 13.558448] [ 13.558556] Memory state around the buggy address: [ 13.558778] ffff8881026ef180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.559004] ffff8881026ef200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.559310] >ffff8881026ef280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.559633] ^ [ 13.559857] ffff8881026ef300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.560326] ffff8881026ef380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.560705] ================================================================== [ 13.481240] ================================================================== [ 13.482114] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.482531] Read of size 1 at addr ffff8881026ced73 by task kunit_try_catch/239 [ 13.482887] [ 13.482987] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.483038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.483050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.483072] Call Trace: [ 13.483084] <TASK> [ 13.483103] dump_stack_lvl+0x73/0xb0 [ 13.483136] print_report+0xd1/0x610 [ 13.483161] ? __virt_addr_valid+0x1db/0x2d0 [ 13.483187] ? mempool_oob_right_helper+0x318/0x380 [ 13.483211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.483234] ? mempool_oob_right_helper+0x318/0x380 [ 13.483258] kasan_report+0x141/0x180 [ 13.483280] ? mempool_oob_right_helper+0x318/0x380 [ 13.483309] __asan_report_load1_noabort+0x18/0x20 [ 13.483334] mempool_oob_right_helper+0x318/0x380 [ 13.483359] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.483382] ? update_load_avg+0x1be/0x21b0 [ 13.483473] ? dequeue_entities+0x27e/0x1740 [ 13.483501] ? finish_task_switch.isra.0+0x153/0x700 [ 13.483530] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.483555] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.483583] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.483608] ? __pfx_mempool_kfree+0x10/0x10 [ 13.483634] ? __pfx_read_tsc+0x10/0x10 [ 13.483655] ? ktime_get_ts64+0x86/0x230 [ 13.483681] kunit_try_run_case+0x1a5/0x480 [ 13.483708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.483730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.483772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.483796] ? __kthread_parkme+0x82/0x180 [ 13.483819] ? preempt_count_sub+0x50/0x80 [ 13.483843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.483866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.483890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.483915] kthread+0x337/0x6f0 [ 13.483935] ? trace_preempt_on+0x20/0xc0 [ 13.483959] ? __pfx_kthread+0x10/0x10 [ 13.483980] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.484001] ? calculate_sigpending+0x7b/0xa0 [ 13.484027] ? __pfx_kthread+0x10/0x10 [ 13.484048] ret_from_fork+0x116/0x1d0 [ 13.484066] ? __pfx_kthread+0x10/0x10 [ 13.484087] ret_from_fork_asm+0x1a/0x30 [ 13.484121] </TASK> [ 13.484131] [ 13.494944] Allocated by task 239: [ 13.495202] kasan_save_stack+0x45/0x70 [ 13.495369] kasan_save_track+0x18/0x40 [ 13.495612] kasan_save_alloc_info+0x3b/0x50 [ 13.496098] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.496413] remove_element+0x11e/0x190 [ 13.496747] mempool_alloc_preallocated+0x4d/0x90 [ 13.496973] mempool_oob_right_helper+0x8a/0x380 [ 13.497192] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.497404] kunit_try_run_case+0x1a5/0x480 [ 13.498030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.498241] kthread+0x337/0x6f0 [ 13.498637] ret_from_fork+0x116/0x1d0 [ 13.498936] ret_from_fork_asm+0x1a/0x30 [ 13.499101] [ 13.499305] The buggy address belongs to the object at ffff8881026ced00 [ 13.499305] which belongs to the cache kmalloc-128 of size 128 [ 13.499851] The buggy address is located 0 bytes to the right of [ 13.499851] allocated 115-byte region [ffff8881026ced00, ffff8881026ced73) [ 13.500355] [ 13.500468] The buggy address belongs to the physical page: [ 13.500772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 13.501094] flags: 0x200000000000000(node=0|zone=2) [ 13.501333] page_type: f5(slab) [ 13.501515] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.501816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.502190] page dumped because: kasan: bad access detected [ 13.502482] [ 13.502611] Memory state around the buggy address: [ 13.503183] ffff8881026cec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.503668] ffff8881026cec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.503978] >ffff8881026ced00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.504522] ^ [ 13.504992] ffff8881026ced80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.505458] ffff8881026cee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.505950] ==================================================================
[ 13.738197] ================================================================== [ 13.738755] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.739545] Read of size 1 at addr ffff8881029c52bb by task kunit_try_catch/242 [ 13.740249] [ 13.740442] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.740498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.740511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.740536] Call Trace: [ 13.740550] <TASK> [ 13.740759] dump_stack_lvl+0x73/0xb0 [ 13.740805] print_report+0xd1/0x610 [ 13.740830] ? __virt_addr_valid+0x1db/0x2d0 [ 13.740864] ? mempool_oob_right_helper+0x318/0x380 [ 13.740889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.740913] ? mempool_oob_right_helper+0x318/0x380 [ 13.740937] kasan_report+0x141/0x180 [ 13.740959] ? mempool_oob_right_helper+0x318/0x380 [ 13.740987] __asan_report_load1_noabort+0x18/0x20 [ 13.741074] mempool_oob_right_helper+0x318/0x380 [ 13.741102] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.741135] mempool_slab_oob_right+0xed/0x140 [ 13.741159] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.741187] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.741212] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.741238] ? __pfx_read_tsc+0x10/0x10 [ 13.741261] ? ktime_get_ts64+0x86/0x230 [ 13.741287] kunit_try_run_case+0x1a5/0x480 [ 13.741314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.741337] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.741362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.741385] ? __kthread_parkme+0x82/0x180 [ 13.741407] ? preempt_count_sub+0x50/0x80 [ 13.741445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.741469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.741492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.741516] kthread+0x337/0x6f0 [ 13.741536] ? trace_preempt_on+0x20/0xc0 [ 13.741560] ? __pfx_kthread+0x10/0x10 [ 13.741580] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.741604] ? calculate_sigpending+0x7b/0xa0 [ 13.741631] ? __pfx_kthread+0x10/0x10 [ 13.741652] ret_from_fork+0x116/0x1d0 [ 13.741672] ? __pfx_kthread+0x10/0x10 [ 13.741691] ret_from_fork_asm+0x1a/0x30 [ 13.741724] </TASK> [ 13.741735] [ 13.760512] Allocated by task 242: [ 13.760974] kasan_save_stack+0x45/0x70 [ 13.761168] kasan_save_track+0x18/0x40 [ 13.761306] kasan_save_alloc_info+0x3b/0x50 [ 13.761670] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.762435] remove_element+0x11e/0x190 [ 13.763359] mempool_alloc_preallocated+0x4d/0x90 [ 13.763965] mempool_oob_right_helper+0x8a/0x380 [ 13.764591] mempool_slab_oob_right+0xed/0x140 [ 13.765057] kunit_try_run_case+0x1a5/0x480 [ 13.765683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.765869] kthread+0x337/0x6f0 [ 13.765994] ret_from_fork+0x116/0x1d0 [ 13.766305] ret_from_fork_asm+0x1a/0x30 [ 13.766960] [ 13.767284] The buggy address belongs to the object at ffff8881029c5240 [ 13.767284] which belongs to the cache test_cache of size 123 [ 13.769188] The buggy address is located 0 bytes to the right of [ 13.769188] allocated 123-byte region [ffff8881029c5240, ffff8881029c52bb) [ 13.769921] [ 13.770005] The buggy address belongs to the physical page: [ 13.771034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5 [ 13.771713] flags: 0x200000000000000(node=0|zone=2) [ 13.771887] page_type: f5(slab) [ 13.772037] raw: 0200000000000000 ffff888103419280 dead000000000122 0000000000000000 [ 13.773134] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.773965] page dumped because: kasan: bad access detected [ 13.774597] [ 13.774748] Memory state around the buggy address: [ 13.775362] ffff8881029c5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.776120] ffff8881029c5200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.776526] >ffff8881029c5280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.776747] ^ [ 13.776920] ffff8881029c5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.777894] ffff8881029c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.778689] ================================================================== [ 13.706297] ================================================================== [ 13.706868] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.707717] Read of size 1 at addr ffff8881039c2001 by task kunit_try_catch/240 [ 13.708480] [ 13.708766] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.708823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.708835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.708865] Call Trace: [ 13.708880] <TASK> [ 13.708900] dump_stack_lvl+0x73/0xb0 [ 13.708937] print_report+0xd1/0x610 [ 13.708962] ? __virt_addr_valid+0x1db/0x2d0 [ 13.708987] ? mempool_oob_right_helper+0x318/0x380 [ 13.709024] ? kasan_addr_to_slab+0x11/0xa0 [ 13.709045] ? mempool_oob_right_helper+0x318/0x380 [ 13.709069] kasan_report+0x141/0x180 [ 13.709090] ? mempool_oob_right_helper+0x318/0x380 [ 13.709118] __asan_report_load1_noabort+0x18/0x20 [ 13.709143] mempool_oob_right_helper+0x318/0x380 [ 13.709167] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.709192] ? __kasan_check_write+0x18/0x20 [ 13.709211] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.709235] ? finish_task_switch.isra.0+0x153/0x700 [ 13.709261] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.709287] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.709315] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.709340] ? __pfx_mempool_kfree+0x10/0x10 [ 13.709365] ? __pfx_read_tsc+0x10/0x10 [ 13.709386] ? ktime_get_ts64+0x86/0x230 [ 13.709412] kunit_try_run_case+0x1a5/0x480 [ 13.709559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.709585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.709612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.709636] ? __kthread_parkme+0x82/0x180 [ 13.709658] ? preempt_count_sub+0x50/0x80 [ 13.709682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.709706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.709730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.709754] kthread+0x337/0x6f0 [ 13.709774] ? trace_preempt_on+0x20/0xc0 [ 13.709797] ? __pfx_kthread+0x10/0x10 [ 13.709818] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.709839] ? calculate_sigpending+0x7b/0xa0 [ 13.709864] ? __pfx_kthread+0x10/0x10 [ 13.709885] ret_from_fork+0x116/0x1d0 [ 13.709904] ? __pfx_kthread+0x10/0x10 [ 13.709924] ret_from_fork_asm+0x1a/0x30 [ 13.709957] </TASK> [ 13.709967] [ 13.722694] The buggy address belongs to the physical page: [ 13.723372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c0 [ 13.723888] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.724361] flags: 0x200000000000040(head|node=0|zone=2) [ 13.724787] page_type: f8(unknown) [ 13.725026] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.725641] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.726108] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.726856] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.727467] head: 0200000000000002 ffffea00040e7001 00000000ffffffff 00000000ffffffff [ 13.727908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.728490] page dumped because: kasan: bad access detected [ 13.728743] [ 13.728842] Memory state around the buggy address: [ 13.729337] ffff8881039c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.729739] ffff8881039c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.730585] >ffff8881039c2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.730869] ^ [ 13.731004] ffff8881039c2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.731697] ffff8881039c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.732046] ================================================================== [ 13.676877] ================================================================== [ 13.677580] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.677948] Read of size 1 at addr ffff8881029a6c73 by task kunit_try_catch/238 [ 13.678322] [ 13.678475] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.678543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.678556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.678580] Call Trace: [ 13.678595] <TASK> [ 13.678652] dump_stack_lvl+0x73/0xb0 [ 13.678726] print_report+0xd1/0x610 [ 13.678752] ? __virt_addr_valid+0x1db/0x2d0 [ 13.678776] ? mempool_oob_right_helper+0x318/0x380 [ 13.678801] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.678824] ? mempool_oob_right_helper+0x318/0x380 [ 13.678849] kasan_report+0x141/0x180 [ 13.678871] ? mempool_oob_right_helper+0x318/0x380 [ 13.678899] __asan_report_load1_noabort+0x18/0x20 [ 13.678923] mempool_oob_right_helper+0x318/0x380 [ 13.678980] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.679005] ? update_load_avg+0x1be/0x21b0 [ 13.679046] ? dequeue_entities+0x27e/0x1740 [ 13.679071] ? irqentry_exit+0x2a/0x60 [ 13.679094] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.679135] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.679160] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.679223] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.679251] ? __pfx_mempool_kfree+0x10/0x10 [ 13.679275] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.679313] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.679339] kunit_try_run_case+0x1a5/0x480 [ 13.679367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.679390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.679415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.679452] ? __kthread_parkme+0x82/0x180 [ 13.679476] ? preempt_count_sub+0x50/0x80 [ 13.679500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.679523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.679547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.679570] kthread+0x337/0x6f0 [ 13.679589] ? trace_preempt_on+0x20/0xc0 [ 13.679613] ? __pfx_kthread+0x10/0x10 [ 13.679633] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.679655] ? calculate_sigpending+0x7b/0xa0 [ 13.679681] ? __pfx_kthread+0x10/0x10 [ 13.679702] ret_from_fork+0x116/0x1d0 [ 13.679723] ? __pfx_kthread+0x10/0x10 [ 13.679743] ret_from_fork_asm+0x1a/0x30 [ 13.679775] </TASK> [ 13.679785] [ 13.690994] Allocated by task 238: [ 13.691206] kasan_save_stack+0x45/0x70 [ 13.691374] kasan_save_track+0x18/0x40 [ 13.691741] kasan_save_alloc_info+0x3b/0x50 [ 13.692024] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.692372] remove_element+0x11e/0x190 [ 13.692520] mempool_alloc_preallocated+0x4d/0x90 [ 13.692677] mempool_oob_right_helper+0x8a/0x380 [ 13.692912] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.693586] kunit_try_run_case+0x1a5/0x480 [ 13.693868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.694193] kthread+0x337/0x6f0 [ 13.694406] ret_from_fork+0x116/0x1d0 [ 13.694596] ret_from_fork_asm+0x1a/0x30 [ 13.694830] [ 13.694931] The buggy address belongs to the object at ffff8881029a6c00 [ 13.694931] which belongs to the cache kmalloc-128 of size 128 [ 13.695597] The buggy address is located 0 bytes to the right of [ 13.695597] allocated 115-byte region [ffff8881029a6c00, ffff8881029a6c73) [ 13.696361] [ 13.696505] The buggy address belongs to the physical page: [ 13.696731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a6 [ 13.697314] flags: 0x200000000000000(node=0|zone=2) [ 13.698025] page_type: f5(slab) [ 13.698206] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.698613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.698954] page dumped because: kasan: bad access detected [ 13.699382] [ 13.699509] Memory state around the buggy address: [ 13.699767] ffff8881029a6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.700277] ffff8881029a6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.700648] >ffff8881029a6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.700992] ^ [ 13.701365] ffff8881029a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.701746] ffff8881029a6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.702069] ==================================================================