Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.563123] ================================================================== [ 20.563483] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.563565] Read of size 1 at addr fff00000c784a001 by task kunit_try_catch/224 [ 20.563623] [ 20.563670] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.563764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.564976] Hardware name: linux,dummy-virt (DT) [ 20.565044] Call trace: [ 20.565072] show_stack+0x20/0x38 (C) [ 20.565150] dump_stack_lvl+0x8c/0xd0 [ 20.565734] print_report+0x118/0x608 [ 20.565796] kasan_report+0xdc/0x128 [ 20.565848] __asan_report_load1_noabort+0x20/0x30 [ 20.565904] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.566827] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.567329] kunit_try_run_case+0x170/0x3f0 [ 20.567407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.567522] kthread+0x328/0x630 [ 20.567569] ret_from_fork+0x10/0x20 [ 20.567642] [ 20.567668] The buggy address belongs to the physical page: [ 20.568116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848 [ 20.568629] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.568784] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.569193] page_type: f8(unknown) [ 20.569272] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.569388] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.569674] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.570080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.570292] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff [ 20.570349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.570702] page dumped because: kasan: bad access detected [ 20.570984] [ 20.571013] Memory state around the buggy address: [ 20.571194] fff00000c7849f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.571249] fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.571621] >fff00000c784a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.571759] ^ [ 20.571855] fff00000c784a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.572038] fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.572142] ================================================================== [ 20.529752] ================================================================== [ 20.529880] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.529979] Read of size 1 at addr fff00000c6026973 by task kunit_try_catch/222 [ 20.530041] [ 20.530090] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.530203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.530235] Hardware name: linux,dummy-virt (DT) [ 20.530273] Call trace: [ 20.530300] show_stack+0x20/0x38 (C) [ 20.530359] dump_stack_lvl+0x8c/0xd0 [ 20.530415] print_report+0x118/0x608 [ 20.530467] kasan_report+0xdc/0x128 [ 20.530515] __asan_report_load1_noabort+0x20/0x30 [ 20.530570] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.530621] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.530673] kunit_try_run_case+0x170/0x3f0 [ 20.530729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530786] kthread+0x328/0x630 [ 20.530832] ret_from_fork+0x10/0x20 [ 20.530888] [ 20.530909] Allocated by task 222: [ 20.530941] kasan_save_stack+0x3c/0x68 [ 20.530989] kasan_save_track+0x20/0x40 [ 20.531029] kasan_save_alloc_info+0x40/0x58 [ 20.531075] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.531127] remove_element+0x130/0x1f8 [ 20.531330] mempool_alloc_preallocated+0x58/0xc0 [ 20.531389] mempool_oob_right_helper+0x98/0x2f0 [ 20.531432] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.531474] kunit_try_run_case+0x170/0x3f0 [ 20.531516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531563] kthread+0x328/0x630 [ 20.531600] ret_from_fork+0x10/0x20 [ 20.531639] [ 20.531662] The buggy address belongs to the object at fff00000c6026900 [ 20.531662] which belongs to the cache kmalloc-128 of size 128 [ 20.531732] The buggy address is located 0 bytes to the right of [ 20.531732] allocated 115-byte region [fff00000c6026900, fff00000c6026973) [ 20.531804] [ 20.531832] The buggy address belongs to the physical page: [ 20.531873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106026 [ 20.531937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.531999] page_type: f5(slab) [ 20.532047] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.532103] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.532170] page dumped because: kasan: bad access detected [ 20.532206] [ 20.532226] Memory state around the buggy address: [ 20.532267] fff00000c6026800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.532317] fff00000c6026880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.532367] >fff00000c6026900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.532411] ^ [ 20.532458] fff00000c6026980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.532507] fff00000c6026a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.532552] ================================================================== [ 20.594750] ================================================================== [ 20.594887] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.594972] Read of size 1 at addr fff00000c63b72bb by task kunit_try_catch/226 [ 20.595032] [ 20.595077] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.595194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.595224] Hardware name: linux,dummy-virt (DT) [ 20.595262] Call trace: [ 20.595288] show_stack+0x20/0x38 (C) [ 20.595380] dump_stack_lvl+0x8c/0xd0 [ 20.595435] print_report+0x118/0x608 [ 20.595486] kasan_report+0xdc/0x128 [ 20.595534] __asan_report_load1_noabort+0x20/0x30 [ 20.595589] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.595642] mempool_slab_oob_right+0xc0/0x118 [ 20.595691] kunit_try_run_case+0x170/0x3f0 [ 20.595744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.595799] kthread+0x328/0x630 [ 20.595843] ret_from_fork+0x10/0x20 [ 20.595897] [ 20.595919] Allocated by task 226: [ 20.595949] kasan_save_stack+0x3c/0x68 [ 20.595995] kasan_save_track+0x20/0x40 [ 20.596034] kasan_save_alloc_info+0x40/0x58 [ 20.596078] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.596123] remove_element+0x16c/0x1f8 [ 20.596177] mempool_alloc_preallocated+0x58/0xc0 [ 20.596219] mempool_oob_right_helper+0x98/0x2f0 [ 20.596262] mempool_slab_oob_right+0xc0/0x118 [ 20.596303] kunit_try_run_case+0x170/0x3f0 [ 20.596343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.596389] kthread+0x328/0x630 [ 20.596424] ret_from_fork+0x10/0x20 [ 20.596462] [ 20.596485] The buggy address belongs to the object at fff00000c63b7240 [ 20.596485] which belongs to the cache test_cache of size 123 [ 20.596550] The buggy address is located 0 bytes to the right of [ 20.596550] allocated 123-byte region [fff00000c63b7240, fff00000c63b72bb) [ 20.596621] [ 20.596647] The buggy address belongs to the physical page: [ 20.596685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b7 [ 20.596749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.596807] page_type: f5(slab) [ 20.596854] raw: 0bfffe0000000000 fff00000c63f5140 dead000000000122 0000000000000000 [ 20.596909] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.596954] page dumped because: kasan: bad access detected [ 20.596989] [ 20.597009] Memory state around the buggy address: [ 20.597047] fff00000c63b7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.597096] fff00000c63b7200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.597155] >fff00000c63b7280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.597199] ^ [ 20.597236] fff00000c63b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.597292] fff00000c63b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.597334] ==================================================================
[ 12.969211] ================================================================== [ 12.970066] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.970436] Read of size 1 at addr ffff888102bfa001 by task kunit_try_catch/240 [ 12.971089] [ 12.971278] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.971327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.971365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.971399] Call Trace: [ 12.971412] <TASK> [ 12.971431] dump_stack_lvl+0x73/0xb0 [ 12.971463] print_report+0xd1/0x650 [ 12.971486] ? __virt_addr_valid+0x1db/0x2d0 [ 12.971512] ? mempool_oob_right_helper+0x318/0x380 [ 12.971534] ? kasan_addr_to_slab+0x11/0xa0 [ 12.971580] ? mempool_oob_right_helper+0x318/0x380 [ 12.971602] kasan_report+0x141/0x180 [ 12.971623] ? mempool_oob_right_helper+0x318/0x380 [ 12.971650] __asan_report_load1_noabort+0x18/0x20 [ 12.971673] mempool_oob_right_helper+0x318/0x380 [ 12.971696] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.971720] ? __kasan_check_write+0x18/0x20 [ 12.971739] ? __pfx_sched_clock_cpu+0x10/0x10 [ 12.971760] ? irqentry_exit+0x2a/0x60 [ 12.971783] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.971807] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 12.971831] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 12.971857] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.971880] ? __pfx_mempool_kfree+0x10/0x10 [ 12.971904] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 12.971929] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 12.971954] kunit_try_run_case+0x1a5/0x480 [ 12.971979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.972000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.972024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.972045] ? __kthread_parkme+0x82/0x180 [ 12.972066] ? preempt_count_sub+0x50/0x80 [ 12.972088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.972111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.972133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.972154] kthread+0x337/0x6f0 [ 12.972173] ? trace_preempt_on+0x20/0xc0 [ 12.972197] ? __pfx_kthread+0x10/0x10 [ 12.972215] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.972235] ? calculate_sigpending+0x7b/0xa0 [ 12.972259] ? __pfx_kthread+0x10/0x10 [ 12.972279] ret_from_fork+0x116/0x1d0 [ 12.972297] ? __pfx_kthread+0x10/0x10 [ 12.972317] ret_from_fork_asm+0x1a/0x30 [ 12.972346] </TASK> [ 12.972358] [ 12.984367] The buggy address belongs to the physical page: [ 12.984704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf8 [ 12.985021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.985444] flags: 0x200000000000040(head|node=0|zone=2) [ 12.985671] page_type: f8(unknown) [ 12.985849] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.986405] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.986776] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.987066] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.987528] head: 0200000000000002 ffffea00040afe01 00000000ffffffff 00000000ffffffff [ 12.987924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.988183] page dumped because: kasan: bad access detected [ 12.988487] [ 12.988608] Memory state around the buggy address: [ 12.988794] ffff888102bf9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.989201] ffff888102bf9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.989504] >ffff888102bfa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.989874] ^ [ 12.990137] ffff888102bfa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.990419] ffff888102bfa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.990914] ================================================================== [ 12.938439] ================================================================== [ 12.938936] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.939563] Read of size 1 at addr ffff888102ef5d73 by task kunit_try_catch/238 [ 12.939948] [ 12.940051] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.940465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.940483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.940509] Call Trace: [ 12.940524] <TASK> [ 12.940544] dump_stack_lvl+0x73/0xb0 [ 12.940579] print_report+0xd1/0x650 [ 12.940604] ? __virt_addr_valid+0x1db/0x2d0 [ 12.940629] ? mempool_oob_right_helper+0x318/0x380 [ 12.940651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.940672] ? mempool_oob_right_helper+0x318/0x380 [ 12.940694] kasan_report+0x141/0x180 [ 12.940715] ? mempool_oob_right_helper+0x318/0x380 [ 12.940741] __asan_report_load1_noabort+0x18/0x20 [ 12.940766] mempool_oob_right_helper+0x318/0x380 [ 12.940790] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.940813] ? __kasan_check_write+0x18/0x20 [ 12.940832] ? __pfx_sched_clock_cpu+0x10/0x10 [ 12.940855] ? finish_task_switch.isra.0+0x153/0x700 [ 12.940880] mempool_kmalloc_oob_right+0xf2/0x150 [ 12.940902] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 12.940929] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.940952] ? __pfx_mempool_kfree+0x10/0x10 [ 12.940976] ? __pfx_read_tsc+0x10/0x10 [ 12.940998] ? ktime_get_ts64+0x86/0x230 [ 12.941021] kunit_try_run_case+0x1a5/0x480 [ 12.941047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.941068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.941092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.941114] ? __kthread_parkme+0x82/0x180 [ 12.941134] ? preempt_count_sub+0x50/0x80 [ 12.941156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.941178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.941201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.941223] kthread+0x337/0x6f0 [ 12.941242] ? trace_preempt_on+0x20/0xc0 [ 12.941265] ? __pfx_kthread+0x10/0x10 [ 12.941284] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.941304] ? calculate_sigpending+0x7b/0xa0 [ 12.941328] ? __pfx_kthread+0x10/0x10 [ 12.941348] ret_from_fork+0x116/0x1d0 [ 12.941365] ? __pfx_kthread+0x10/0x10 [ 12.941396] ret_from_fork_asm+0x1a/0x30 [ 12.941428] </TASK> [ 12.941439] [ 12.954051] Allocated by task 238: [ 12.954252] kasan_save_stack+0x45/0x70 [ 12.954443] kasan_save_track+0x18/0x40 [ 12.954628] kasan_save_alloc_info+0x3b/0x50 [ 12.955153] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 12.955428] remove_element+0x11e/0x190 [ 12.955656] mempool_alloc_preallocated+0x4d/0x90 [ 12.956000] mempool_oob_right_helper+0x8a/0x380 [ 12.956366] mempool_kmalloc_oob_right+0xf2/0x150 [ 12.956624] kunit_try_run_case+0x1a5/0x480 [ 12.956812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.957240] kthread+0x337/0x6f0 [ 12.957396] ret_from_fork+0x116/0x1d0 [ 12.957596] ret_from_fork_asm+0x1a/0x30 [ 12.957966] [ 12.958143] The buggy address belongs to the object at ffff888102ef5d00 [ 12.958143] which belongs to the cache kmalloc-128 of size 128 [ 12.958734] The buggy address is located 0 bytes to the right of [ 12.958734] allocated 115-byte region [ffff888102ef5d00, ffff888102ef5d73) [ 12.959315] [ 12.959504] The buggy address belongs to the physical page: [ 12.959904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 12.960554] flags: 0x200000000000000(node=0|zone=2) [ 12.960890] page_type: f5(slab) [ 12.961107] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.961428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.962021] page dumped because: kasan: bad access detected [ 12.962259] [ 12.962335] Memory state around the buggy address: [ 12.962578] ffff888102ef5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.963139] ffff888102ef5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.963521] >ffff888102ef5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.963947] ^ [ 12.964197] ffff888102ef5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.964535] ffff888102ef5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.965015] ================================================================== [ 12.994869] ================================================================== [ 12.995431] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.995761] Read of size 1 at addr ffff888102f112bb by task kunit_try_catch/242 [ 12.996058] [ 12.996193] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.996241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.996253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.996298] Call Trace: [ 12.996311] <TASK> [ 12.996329] dump_stack_lvl+0x73/0xb0 [ 12.996389] print_report+0xd1/0x650 [ 12.996416] ? __virt_addr_valid+0x1db/0x2d0 [ 12.996440] ? mempool_oob_right_helper+0x318/0x380 [ 12.996461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.996482] ? mempool_oob_right_helper+0x318/0x380 [ 12.996505] kasan_report+0x141/0x180 [ 12.996526] ? mempool_oob_right_helper+0x318/0x380 [ 12.996554] __asan_report_load1_noabort+0x18/0x20 [ 12.996577] mempool_oob_right_helper+0x318/0x380 [ 12.996601] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.996622] ? update_load_avg+0x1be/0x21b0 [ 12.996649] ? finish_task_switch.isra.0+0x153/0x700 [ 12.996674] mempool_slab_oob_right+0xed/0x140 [ 12.996720] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 12.996745] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 12.996764] ? __pfx_mempool_free_slab+0x10/0x10 [ 12.996785] ? __pfx_read_tsc+0x10/0x10 [ 12.996805] ? ktime_get_ts64+0x86/0x230 [ 12.996829] kunit_try_run_case+0x1a5/0x480 [ 12.996853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.996874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.996916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.996939] ? __kthread_parkme+0x82/0x180 [ 12.996959] ? preempt_count_sub+0x50/0x80 [ 12.996981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.997003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.997026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.997049] kthread+0x337/0x6f0 [ 12.997068] ? trace_preempt_on+0x20/0xc0 [ 12.997091] ? __pfx_kthread+0x10/0x10 [ 12.997111] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.997132] ? calculate_sigpending+0x7b/0xa0 [ 12.997156] ? __pfx_kthread+0x10/0x10 [ 12.997176] ret_from_fork+0x116/0x1d0 [ 12.997193] ? __pfx_kthread+0x10/0x10 [ 12.997212] ret_from_fork_asm+0x1a/0x30 [ 12.997242] </TASK> [ 12.997253] [ 13.006541] Allocated by task 242: [ 13.006738] kasan_save_stack+0x45/0x70 [ 13.006915] kasan_save_track+0x18/0x40 [ 13.007049] kasan_save_alloc_info+0x3b/0x50 [ 13.007194] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.007552] remove_element+0x11e/0x190 [ 13.007812] mempool_alloc_preallocated+0x4d/0x90 [ 13.008144] mempool_oob_right_helper+0x8a/0x380 [ 13.008339] mempool_slab_oob_right+0xed/0x140 [ 13.008554] kunit_try_run_case+0x1a5/0x480 [ 13.008700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.008995] kthread+0x337/0x6f0 [ 13.009195] ret_from_fork+0x116/0x1d0 [ 13.009407] ret_from_fork_asm+0x1a/0x30 [ 13.009622] [ 13.009741] The buggy address belongs to the object at ffff888102f11240 [ 13.009741] which belongs to the cache test_cache of size 123 [ 13.010296] The buggy address is located 0 bytes to the right of [ 13.010296] allocated 123-byte region [ffff888102f11240, ffff888102f112bb) [ 13.010935] [ 13.011232] The buggy address belongs to the physical page: [ 13.011464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f11 [ 13.011800] flags: 0x200000000000000(node=0|zone=2) [ 13.012005] page_type: f5(slab) [ 13.012125] raw: 0200000000000000 ffff888101a2cc80 dead000000000122 0000000000000000 [ 13.012843] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.013250] page dumped because: kasan: bad access detected [ 13.013443] [ 13.013518] Memory state around the buggy address: [ 13.013692] ffff888102f11180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.014152] ffff888102f11200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.014691] >ffff888102f11280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.014939] ^ [ 13.015447] ffff888102f11300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.015791] ffff888102f11380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.016309] ==================================================================