Date
July 5, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.538758] ================================================================== [ 21.538925] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.539372] Read of size 1 at addr fff00000c79462bb by task kunit_try_catch/226 [ 21.539516] [ 21.539587] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.539767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.539866] Hardware name: linux,dummy-virt (DT) [ 21.539923] Call trace: [ 21.540206] show_stack+0x20/0x38 (C) [ 21.540711] dump_stack_lvl+0x8c/0xd0 [ 21.540898] print_report+0x118/0x608 [ 21.540997] kasan_report+0xdc/0x128 [ 21.541102] __asan_report_load1_noabort+0x20/0x30 [ 21.541216] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.541321] mempool_slab_oob_right+0xc0/0x118 [ 21.541446] kunit_try_run_case+0x170/0x3f0 [ 21.541546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.541663] kthread+0x328/0x630 [ 21.541758] ret_from_fork+0x10/0x20 [ 21.542371] [ 21.542456] Allocated by task 226: [ 21.543194] kasan_save_stack+0x3c/0x68 [ 21.543304] kasan_save_track+0x20/0x40 [ 21.543400] kasan_save_alloc_info+0x40/0x58 [ 21.543482] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.543580] remove_element+0x16c/0x1f8 [ 21.543690] mempool_alloc_preallocated+0x58/0xc0 [ 21.543799] mempool_oob_right_helper+0x98/0x2f0 [ 21.543965] mempool_slab_oob_right+0xc0/0x118 [ 21.544121] kunit_try_run_case+0x170/0x3f0 [ 21.544215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.544391] kthread+0x328/0x630 [ 21.544471] ret_from_fork+0x10/0x20 [ 21.544551] [ 21.544596] The buggy address belongs to the object at fff00000c7946240 [ 21.544596] which belongs to the cache test_cache of size 123 [ 21.545201] The buggy address is located 0 bytes to the right of [ 21.545201] allocated 123-byte region [fff00000c7946240, fff00000c79462bb) [ 21.545375] [ 21.545424] The buggy address belongs to the physical page: [ 21.545501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107946 [ 21.545612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.546346] page_type: f5(slab) [ 21.546467] raw: 0bfffe0000000000 fff00000c7936140 dead000000000122 0000000000000000 [ 21.546578] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.546665] page dumped because: kasan: bad access detected [ 21.546728] [ 21.546766] Memory state around the buggy address: [ 21.546832] fff00000c7946180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.547488] fff00000c7946200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.547692] >fff00000c7946280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.547992] ^ [ 21.548082] fff00000c7946300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.548184] fff00000c7946380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.548274] ================================================================== [ 21.510823] ================================================================== [ 21.511000] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.511251] Read of size 1 at addr fff00000c797a001 by task kunit_try_catch/224 [ 21.511443] [ 21.511527] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.511901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.512158] Hardware name: linux,dummy-virt (DT) [ 21.512244] Call trace: [ 21.512297] show_stack+0x20/0x38 (C) [ 21.512426] dump_stack_lvl+0x8c/0xd0 [ 21.513061] print_report+0x118/0x608 [ 21.513203] kasan_report+0xdc/0x128 [ 21.513528] __asan_report_load1_noabort+0x20/0x30 [ 21.513712] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.513828] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.514156] kunit_try_run_case+0x170/0x3f0 [ 21.514493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.515045] kthread+0x328/0x630 [ 21.515175] ret_from_fork+0x10/0x20 [ 21.515284] [ 21.515328] The buggy address belongs to the physical page: [ 21.515416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107978 [ 21.515529] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.515618] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.515967] page_type: f8(unknown) [ 21.516124] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.516251] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.516853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.516966] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.517554] head: 0bfffe0000000002 ffffc1ffc31e5e01 00000000ffffffff 00000000ffffffff [ 21.517847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.517989] page dumped because: kasan: bad access detected [ 21.518083] [ 21.518485] Memory state around the buggy address: [ 21.518568] fff00000c7979f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.518664] fff00000c7979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.518755] >fff00000c797a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.518830] ^ [ 21.518891] fff00000c797a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.519267] fff00000c797a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.519854] ================================================================== [ 21.495952] ================================================================== [ 21.496048] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.496134] Read of size 1 at addr fff00000c7938273 by task kunit_try_catch/222 [ 21.496187] [ 21.496232] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.496320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.496349] Hardware name: linux,dummy-virt (DT) [ 21.496410] Call trace: [ 21.496437] show_stack+0x20/0x38 (C) [ 21.496491] dump_stack_lvl+0x8c/0xd0 [ 21.496543] print_report+0x118/0x608 [ 21.496591] kasan_report+0xdc/0x128 [ 21.496637] __asan_report_load1_noabort+0x20/0x30 [ 21.496688] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.496736] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.496785] kunit_try_run_case+0x170/0x3f0 [ 21.496833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.496885] kthread+0x328/0x630 [ 21.496929] ret_from_fork+0x10/0x20 [ 21.496980] [ 21.497001] Allocated by task 222: [ 21.497033] kasan_save_stack+0x3c/0x68 [ 21.497079] kasan_save_track+0x20/0x40 [ 21.497119] kasan_save_alloc_info+0x40/0x58 [ 21.497160] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.497204] remove_element+0x130/0x1f8 [ 21.497244] mempool_alloc_preallocated+0x58/0xc0 [ 21.497283] mempool_oob_right_helper+0x98/0x2f0 [ 21.497323] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.497378] kunit_try_run_case+0x170/0x3f0 [ 21.497421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.497465] kthread+0x328/0x630 [ 21.497501] ret_from_fork+0x10/0x20 [ 21.497538] [ 21.497560] The buggy address belongs to the object at fff00000c7938200 [ 21.497560] which belongs to the cache kmalloc-128 of size 128 [ 21.497619] The buggy address is located 0 bytes to the right of [ 21.497619] allocated 115-byte region [fff00000c7938200, fff00000c7938273) [ 21.497681] [ 21.497706] The buggy address belongs to the physical page: [ 21.497741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938 [ 21.497797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.497853] page_type: f5(slab) [ 21.497897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.497947] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.497986] page dumped because: kasan: bad access detected [ 21.498069] [ 21.498104] Memory state around the buggy address: [ 21.498168] fff00000c7938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.498258] fff00000c7938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.498338] >fff00000c7938200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.498432] ^ [ 21.498524] fff00000c7938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.498625] fff00000c7938300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.498711] ==================================================================
[ 15.200952] ================================================================== [ 15.201522] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.202283] Read of size 1 at addr ffff888102aba001 by task kunit_try_catch/241 [ 15.202564] [ 15.203069] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.203140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.203156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.203184] Call Trace: [ 15.203202] <TASK> [ 15.203226] dump_stack_lvl+0x73/0xb0 [ 15.203267] print_report+0xd1/0x650 [ 15.203295] ? __virt_addr_valid+0x1db/0x2d0 [ 15.203324] ? mempool_oob_right_helper+0x318/0x380 [ 15.203352] ? kasan_addr_to_slab+0x11/0xa0 [ 15.203376] ? mempool_oob_right_helper+0x318/0x380 [ 15.203403] kasan_report+0x141/0x180 [ 15.203429] ? mempool_oob_right_helper+0x318/0x380 [ 15.203464] __asan_report_load1_noabort+0x18/0x20 [ 15.203493] mempool_oob_right_helper+0x318/0x380 [ 15.203522] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.203552] ? __kasan_check_write+0x18/0x20 [ 15.203575] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.203603] ? finish_task_switch.isra.0+0x153/0x700 [ 15.203633] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 15.203681] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 15.203714] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.203743] ? __pfx_mempool_kfree+0x10/0x10 [ 15.203785] ? __pfx_read_tsc+0x10/0x10 [ 15.203890] ? ktime_get_ts64+0x86/0x230 [ 15.203923] kunit_try_run_case+0x1a5/0x480 [ 15.203955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.204012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.204040] ? __kthread_parkme+0x82/0x180 [ 15.204066] ? preempt_count_sub+0x50/0x80 [ 15.204092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.204120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.204148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.204175] kthread+0x337/0x6f0 [ 15.204198] ? trace_preempt_on+0x20/0xc0 [ 15.204226] ? __pfx_kthread+0x10/0x10 [ 15.204251] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.204275] ? calculate_sigpending+0x7b/0xa0 [ 15.204306] ? __pfx_kthread+0x10/0x10 [ 15.204331] ret_from_fork+0x116/0x1d0 [ 15.204352] ? __pfx_kthread+0x10/0x10 [ 15.204376] ret_from_fork_asm+0x1a/0x30 [ 15.204415] </TASK> [ 15.204430] [ 15.220548] The buggy address belongs to the physical page: [ 15.221436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8 [ 15.222108] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.222519] flags: 0x200000000000040(head|node=0|zone=2) [ 15.222949] page_type: f8(unknown) [ 15.223109] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.223519] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.224455] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.224757] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.225030] head: 0200000000000002 ffffea00040aae01 00000000ffffffff 00000000ffffffff [ 15.225302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.225565] page dumped because: kasan: bad access detected [ 15.225782] [ 15.225870] Memory state around the buggy address: [ 15.226057] ffff888102ab9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.226319] ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.226581] >ffff888102aba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.226838] ^ [ 15.226975] ffff888102aba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.227222] ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.229229] ================================================================== [ 15.166313] ================================================================== [ 15.166903] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.167468] Read of size 1 at addr ffff888103332673 by task kunit_try_catch/239 [ 15.167915] [ 15.168085] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.168148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.168164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.168192] Call Trace: [ 15.168237] <TASK> [ 15.168263] dump_stack_lvl+0x73/0xb0 [ 15.168305] print_report+0xd1/0x650 [ 15.168334] ? __virt_addr_valid+0x1db/0x2d0 [ 15.168824] ? mempool_oob_right_helper+0x318/0x380 [ 15.168858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.168887] ? mempool_oob_right_helper+0x318/0x380 [ 15.168915] kasan_report+0x141/0x180 [ 15.168943] ? mempool_oob_right_helper+0x318/0x380 [ 15.168976] __asan_report_load1_noabort+0x18/0x20 [ 15.169004] mempool_oob_right_helper+0x318/0x380 [ 15.169034] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.169065] ? __kasan_check_write+0x18/0x20 [ 15.169089] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.169120] ? finish_task_switch.isra.0+0x153/0x700 [ 15.169154] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.169184] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.169215] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.169248] ? __pfx_mempool_kfree+0x10/0x10 [ 15.169279] ? __pfx_read_tsc+0x10/0x10 [ 15.169306] ? ktime_get_ts64+0x86/0x230 [ 15.169337] kunit_try_run_case+0x1a5/0x480 [ 15.169370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.169397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.169428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.169456] ? __kthread_parkme+0x82/0x180 [ 15.169482] ? preempt_count_sub+0x50/0x80 [ 15.169511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.169540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.169567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.169595] kthread+0x337/0x6f0 [ 15.169617] ? trace_preempt_on+0x20/0xc0 [ 15.169662] ? __pfx_kthread+0x10/0x10 [ 15.169687] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.169711] ? calculate_sigpending+0x7b/0xa0 [ 15.169741] ? __pfx_kthread+0x10/0x10 [ 15.169768] ret_from_fork+0x116/0x1d0 [ 15.169790] ? __pfx_kthread+0x10/0x10 [ 15.169816] ret_from_fork_asm+0x1a/0x30 [ 15.169854] </TASK> [ 15.169869] [ 15.182508] Allocated by task 239: [ 15.182772] kasan_save_stack+0x45/0x70 [ 15.183897] kasan_save_track+0x18/0x40 [ 15.184138] kasan_save_alloc_info+0x3b/0x50 [ 15.184366] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.184641] remove_element+0x11e/0x190 [ 15.184908] mempool_alloc_preallocated+0x4d/0x90 [ 15.185477] mempool_oob_right_helper+0x8a/0x380 [ 15.185733] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.186227] kunit_try_run_case+0x1a5/0x480 [ 15.186587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.187015] kthread+0x337/0x6f0 [ 15.187322] ret_from_fork+0x116/0x1d0 [ 15.187547] ret_from_fork_asm+0x1a/0x30 [ 15.187782] [ 15.188094] The buggy address belongs to the object at ffff888103332600 [ 15.188094] which belongs to the cache kmalloc-128 of size 128 [ 15.188906] The buggy address is located 0 bytes to the right of [ 15.188906] allocated 115-byte region [ffff888103332600, ffff888103332673) [ 15.189694] [ 15.190053] The buggy address belongs to the physical page: [ 15.190361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332 [ 15.190775] flags: 0x200000000000000(node=0|zone=2) [ 15.191343] page_type: f5(slab) [ 15.191628] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.192163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.192702] page dumped because: kasan: bad access detected [ 15.193134] [ 15.193259] Memory state around the buggy address: [ 15.193503] ffff888103332500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.194024] ffff888103332580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.194323] >ffff888103332600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.194607] ^ [ 15.195019] ffff888103332680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.195472] ffff888103332700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.196179] ================================================================== [ 15.238293] ================================================================== [ 15.239501] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.240813] Read of size 1 at addr ffff8881033442bb by task kunit_try_catch/243 [ 15.241162] [ 15.241281] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.241342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.241357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.241385] Call Trace: [ 15.241403] <TASK> [ 15.241426] dump_stack_lvl+0x73/0xb0 [ 15.241467] print_report+0xd1/0x650 [ 15.241495] ? __virt_addr_valid+0x1db/0x2d0 [ 15.241527] ? mempool_oob_right_helper+0x318/0x380 [ 15.241556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.241582] ? mempool_oob_right_helper+0x318/0x380 [ 15.241610] kasan_report+0x141/0x180 [ 15.241637] ? mempool_oob_right_helper+0x318/0x380 [ 15.241690] __asan_report_load1_noabort+0x18/0x20 [ 15.241721] mempool_oob_right_helper+0x318/0x380 [ 15.241750] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.241782] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.241812] ? finish_task_switch.isra.0+0x153/0x700 [ 15.241844] mempool_slab_oob_right+0xed/0x140 [ 15.241874] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 15.241905] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 15.241931] ? __pfx_mempool_free_slab+0x10/0x10 [ 15.241958] ? __pfx_read_tsc+0x10/0x10 [ 15.241983] ? ktime_get_ts64+0x86/0x230 [ 15.242014] kunit_try_run_case+0x1a5/0x480 [ 15.242046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.242104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.242132] ? __kthread_parkme+0x82/0x180 [ 15.242159] ? preempt_count_sub+0x50/0x80 [ 15.242186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.242245] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.242274] kthread+0x337/0x6f0 [ 15.242297] ? trace_preempt_on+0x20/0xc0 [ 15.242327] ? __pfx_kthread+0x10/0x10 [ 15.242351] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.242377] ? calculate_sigpending+0x7b/0xa0 [ 15.242407] ? __pfx_kthread+0x10/0x10 [ 15.242438] ret_from_fork+0x116/0x1d0 [ 15.242461] ? __pfx_kthread+0x10/0x10 [ 15.242486] ret_from_fork_asm+0x1a/0x30 [ 15.242524] </TASK> [ 15.242540] [ 15.253485] Allocated by task 243: [ 15.254117] kasan_save_stack+0x45/0x70 [ 15.254676] kasan_save_track+0x18/0x40 [ 15.255231] kasan_save_alloc_info+0x3b/0x50 [ 15.255751] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 15.256439] remove_element+0x11e/0x190 [ 15.256973] mempool_alloc_preallocated+0x4d/0x90 [ 15.257492] mempool_oob_right_helper+0x8a/0x380 [ 15.258060] mempool_slab_oob_right+0xed/0x140 [ 15.258581] kunit_try_run_case+0x1a5/0x480 [ 15.259227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.259945] kthread+0x337/0x6f0 [ 15.260358] ret_from_fork+0x116/0x1d0 [ 15.260801] ret_from_fork_asm+0x1a/0x30 [ 15.261352] [ 15.261550] The buggy address belongs to the object at ffff888103344240 [ 15.261550] which belongs to the cache test_cache of size 123 [ 15.263115] The buggy address is located 0 bytes to the right of [ 15.263115] allocated 123-byte region [ffff888103344240, ffff8881033442bb) [ 15.264826] [ 15.265053] The buggy address belongs to the physical page: [ 15.265784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103344 [ 15.266500] flags: 0x200000000000000(node=0|zone=2) [ 15.267100] page_type: f5(slab) [ 15.267594] raw: 0200000000000000 ffff88810333c280 dead000000000122 0000000000000000 [ 15.268148] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 15.268957] page dumped because: kasan: bad access detected [ 15.269642] [ 15.269815] Memory state around the buggy address: [ 15.270255] ffff888103344180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.270929] ffff888103344200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 15.271733] >ffff888103344280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 15.272191] ^ [ 15.272828] ffff888103344300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273557] ffff888103344380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.274294] ==================================================================