Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.448607] ================================================================== [ 17.448681] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.448741] Read of size 1 at addr fff00000c78ee001 by task kunit_try_catch/224 [ 17.448791] [ 17.448825] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.449003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.449056] Hardware name: linux,dummy-virt (DT) [ 17.449115] Call trace: [ 17.449266] show_stack+0x20/0x38 (C) [ 17.449371] dump_stack_lvl+0x8c/0xd0 [ 17.449431] print_report+0x118/0x5d0 [ 17.449507] kasan_report+0xdc/0x128 [ 17.449554] __asan_report_load1_noabort+0x20/0x30 [ 17.449604] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.449651] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.449699] kunit_try_run_case+0x170/0x3f0 [ 17.450122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.450208] kthread+0x328/0x630 [ 17.450398] ret_from_fork+0x10/0x20 [ 17.450704] [ 17.450853] The buggy address belongs to the physical page: [ 17.450972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ec [ 17.451364] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.451657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.452084] page_type: f8(unknown) [ 17.452789] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.453286] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.453375] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.453572] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.453627] head: 0bfffe0000000002 ffffc1ffc31e3b01 00000000ffffffff 00000000ffffffff [ 17.453685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.453727] page dumped because: kasan: bad access detected [ 17.453979] [ 17.454030] Memory state around the buggy address: [ 17.454151] fff00000c78edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.454210] fff00000c78edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.454255] >fff00000c78ee000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.454419] ^ [ 17.454718] fff00000c78ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.454881] fff00000c78ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.454968] ================================================================== [ 17.431704] ================================================================== [ 17.431788] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.431865] Read of size 1 at addr fff00000c5962273 by task kunit_try_catch/222 [ 17.431917] [ 17.431960] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.432047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.432073] Hardware name: linux,dummy-virt (DT) [ 17.432105] Call trace: [ 17.432131] show_stack+0x20/0x38 (C) [ 17.432197] dump_stack_lvl+0x8c/0xd0 [ 17.432248] print_report+0x118/0x5d0 [ 17.432293] kasan_report+0xdc/0x128 [ 17.432338] __asan_report_load1_noabort+0x20/0x30 [ 17.432387] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.432434] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.432488] kunit_try_run_case+0x170/0x3f0 [ 17.432538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.432590] kthread+0x328/0x630 [ 17.432632] ret_from_fork+0x10/0x20 [ 17.432680] [ 17.432699] Allocated by task 222: [ 17.432728] kasan_save_stack+0x3c/0x68 [ 17.432769] kasan_save_track+0x20/0x40 [ 17.432808] kasan_save_alloc_info+0x40/0x58 [ 17.432847] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.432891] remove_element+0x130/0x1f8 [ 17.432929] mempool_alloc_preallocated+0x58/0xc0 [ 17.433082] mempool_oob_right_helper+0x98/0x2f0 [ 17.433133] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.433171] kunit_try_run_case+0x170/0x3f0 [ 17.433226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.433270] kthread+0x328/0x630 [ 17.433303] ret_from_fork+0x10/0x20 [ 17.433341] [ 17.433361] The buggy address belongs to the object at fff00000c5962200 [ 17.433361] which belongs to the cache kmalloc-128 of size 128 [ 17.433423] The buggy address is located 0 bytes to the right of [ 17.433423] allocated 115-byte region [fff00000c5962200, fff00000c5962273) [ 17.433487] [ 17.433509] The buggy address belongs to the physical page: [ 17.433549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105962 [ 17.433604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.433657] page_type: f5(slab) [ 17.433698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.433749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.433791] page dumped because: kasan: bad access detected [ 17.433824] [ 17.433841] Memory state around the buggy address: [ 17.433873] fff00000c5962100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.433918] fff00000c5962180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.433962] >fff00000c5962200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.434001] ^ [ 17.434042] fff00000c5962280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.434084] fff00000c5962300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.434124] ================================================================== [ 17.483667] ================================================================== [ 17.483778] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.483887] Read of size 1 at addr fff00000c59662bb by task kunit_try_catch/226 [ 17.483941] [ 17.484004] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.484092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.484119] Hardware name: linux,dummy-virt (DT) [ 17.484151] Call trace: [ 17.484172] show_stack+0x20/0x38 (C) [ 17.484352] dump_stack_lvl+0x8c/0xd0 [ 17.484403] print_report+0x118/0x5d0 [ 17.484449] kasan_report+0xdc/0x128 [ 17.484530] __asan_report_load1_noabort+0x20/0x30 [ 17.484589] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.484646] mempool_slab_oob_right+0xc0/0x118 [ 17.484767] kunit_try_run_case+0x170/0x3f0 [ 17.484819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.484872] kthread+0x328/0x630 [ 17.484980] ret_from_fork+0x10/0x20 [ 17.485103] [ 17.485217] Allocated by task 226: [ 17.485322] kasan_save_stack+0x3c/0x68 [ 17.485365] kasan_save_track+0x20/0x40 [ 17.485402] kasan_save_alloc_info+0x40/0x58 [ 17.485442] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.485485] remove_element+0x16c/0x1f8 [ 17.485794] mempool_alloc_preallocated+0x58/0xc0 [ 17.485920] mempool_oob_right_helper+0x98/0x2f0 [ 17.485989] mempool_slab_oob_right+0xc0/0x118 [ 17.486039] kunit_try_run_case+0x170/0x3f0 [ 17.486128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.486192] kthread+0x328/0x630 [ 17.486272] ret_from_fork+0x10/0x20 [ 17.486397] [ 17.486456] The buggy address belongs to the object at fff00000c5966240 [ 17.486456] which belongs to the cache test_cache of size 123 [ 17.486612] The buggy address is located 0 bytes to the right of [ 17.486612] allocated 123-byte region [fff00000c5966240, fff00000c59662bb) [ 17.486736] [ 17.486756] The buggy address belongs to the physical page: [ 17.486806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 17.486918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.486986] page_type: f5(slab) [ 17.487144] raw: 0bfffe0000000000 fff00000c590fa00 dead000000000122 0000000000000000 [ 17.487260] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.487386] page dumped because: kasan: bad access detected [ 17.487420] [ 17.487449] Memory state around the buggy address: [ 17.487481] fff00000c5966180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.487524] fff00000c5966200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.487570] >fff00000c5966280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.487608] ^ [ 17.487640] fff00000c5966300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.487683] fff00000c5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.487721] ==================================================================
[ 13.961773] ================================================================== [ 13.962240] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.963170] Read of size 1 at addr ffff888102afc873 by task kunit_try_catch/238 [ 13.963636] [ 13.964001] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.964054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.964067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.964092] Call Trace: [ 13.964106] <TASK> [ 13.964126] dump_stack_lvl+0x73/0xb0 [ 13.964316] print_report+0xd1/0x610 [ 13.964388] ? __virt_addr_valid+0x1db/0x2d0 [ 13.964414] ? mempool_oob_right_helper+0x318/0x380 [ 13.964453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.964478] ? mempool_oob_right_helper+0x318/0x380 [ 13.964502] kasan_report+0x141/0x180 [ 13.964525] ? mempool_oob_right_helper+0x318/0x380 [ 13.964554] __asan_report_load1_noabort+0x18/0x20 [ 13.964580] mempool_oob_right_helper+0x318/0x380 [ 13.964606] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.964634] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.964658] ? finish_task_switch.isra.0+0x153/0x700 [ 13.964686] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.964710] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.964738] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.964779] ? __pfx_mempool_kfree+0x10/0x10 [ 13.964804] ? __pfx_read_tsc+0x10/0x10 [ 13.964827] ? ktime_get_ts64+0x86/0x230 [ 13.964852] kunit_try_run_case+0x1a5/0x480 [ 13.964879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.964903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.964929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.964954] ? __kthread_parkme+0x82/0x180 [ 13.964976] ? preempt_count_sub+0x50/0x80 [ 13.964999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.965023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.965049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.965075] kthread+0x337/0x6f0 [ 13.965095] ? trace_preempt_on+0x20/0xc0 [ 13.965119] ? __pfx_kthread+0x10/0x10 [ 13.965139] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.965162] ? calculate_sigpending+0x7b/0xa0 [ 13.965188] ? __pfx_kthread+0x10/0x10 [ 13.965210] ret_from_fork+0x116/0x1d0 [ 13.965229] ? __pfx_kthread+0x10/0x10 [ 13.965250] ret_from_fork_asm+0x1a/0x30 [ 13.965281] </TASK> [ 13.965292] [ 13.977550] Allocated by task 238: [ 13.977728] kasan_save_stack+0x45/0x70 [ 13.977979] kasan_save_track+0x18/0x40 [ 13.978453] kasan_save_alloc_info+0x3b/0x50 [ 13.978695] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.979116] remove_element+0x11e/0x190 [ 13.979313] mempool_alloc_preallocated+0x4d/0x90 [ 13.979658] mempool_oob_right_helper+0x8a/0x380 [ 13.979886] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.980101] kunit_try_run_case+0x1a5/0x480 [ 13.980296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.980847] kthread+0x337/0x6f0 [ 13.981082] ret_from_fork+0x116/0x1d0 [ 13.981292] ret_from_fork_asm+0x1a/0x30 [ 13.981696] [ 13.981818] The buggy address belongs to the object at ffff888102afc800 [ 13.981818] which belongs to the cache kmalloc-128 of size 128 [ 13.982269] The buggy address is located 0 bytes to the right of [ 13.982269] allocated 115-byte region [ffff888102afc800, ffff888102afc873) [ 13.982885] [ 13.982960] The buggy address belongs to the physical page: [ 13.983322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.983914] flags: 0x200000000000000(node=0|zone=2) [ 13.984194] page_type: f5(slab) [ 13.984413] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.984886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.985199] page dumped because: kasan: bad access detected [ 13.985466] [ 13.985655] Memory state around the buggy address: [ 13.985912] ffff888102afc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.986248] ffff888102afc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.986682] >ffff888102afc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.987136] ^ [ 13.987443] ffff888102afc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.987833] ffff888102afc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.988109] ================================================================== [ 13.991550] ================================================================== [ 13.992105] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.992624] Read of size 1 at addr ffff8881029d2001 by task kunit_try_catch/240 [ 13.992879] [ 13.993217] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.993264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.993276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.993299] Call Trace: [ 13.993312] <TASK> [ 13.993328] dump_stack_lvl+0x73/0xb0 [ 13.993435] print_report+0xd1/0x610 [ 13.993459] ? __virt_addr_valid+0x1db/0x2d0 [ 13.993483] ? mempool_oob_right_helper+0x318/0x380 [ 13.993532] ? kasan_addr_to_slab+0x11/0xa0 [ 13.993554] ? mempool_oob_right_helper+0x318/0x380 [ 13.993578] kasan_report+0x141/0x180 [ 13.993600] ? mempool_oob_right_helper+0x318/0x380 [ 13.993628] __asan_report_load1_noabort+0x18/0x20 [ 13.993654] mempool_oob_right_helper+0x318/0x380 [ 13.993680] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.993707] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.993731] ? finish_task_switch.isra.0+0x153/0x700 [ 13.993768] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.993795] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.993825] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.993850] ? __pfx_mempool_kfree+0x10/0x10 [ 13.993877] ? __pfx_read_tsc+0x10/0x10 [ 13.993899] ? ktime_get_ts64+0x86/0x230 [ 13.993924] kunit_try_run_case+0x1a5/0x480 [ 13.993949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.993973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.993998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.994023] ? __kthread_parkme+0x82/0x180 [ 13.994045] ? preempt_count_sub+0x50/0x80 [ 13.994068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.994092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.994118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.994144] kthread+0x337/0x6f0 [ 13.994164] ? trace_preempt_on+0x20/0xc0 [ 13.994187] ? __pfx_kthread+0x10/0x10 [ 13.994208] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.994231] ? calculate_sigpending+0x7b/0xa0 [ 13.994257] ? __pfx_kthread+0x10/0x10 [ 13.994278] ret_from_fork+0x116/0x1d0 [ 13.994298] ? __pfx_kthread+0x10/0x10 [ 13.994319] ret_from_fork_asm+0x1a/0x30 [ 13.994359] </TASK> [ 13.994369] [ 14.003085] The buggy address belongs to the physical page: [ 14.003325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d0 [ 14.003966] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.004283] flags: 0x200000000000040(head|node=0|zone=2) [ 14.004726] page_type: f8(unknown) [ 14.004929] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.005163] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.005516] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.006347] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.006592] head: 0200000000000002 ffffea00040a7401 00000000ffffffff 00000000ffffffff [ 14.007011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.007462] page dumped because: kasan: bad access detected [ 14.007724] [ 14.007817] Memory state around the buggy address: [ 14.008038] ffff8881029d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.008325] ffff8881029d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.008776] >ffff8881029d2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.009031] ^ [ 14.009149] ffff8881029d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.009691] ffff8881029d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.010008] ================================================================== [ 14.014311] ================================================================== [ 14.015038] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.015369] Read of size 1 at addr ffff8881038e02bb by task kunit_try_catch/242 [ 14.015745] [ 14.015948] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.015997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.016009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.016029] Call Trace: [ 14.016042] <TASK> [ 14.016059] dump_stack_lvl+0x73/0xb0 [ 14.016089] print_report+0xd1/0x610 [ 14.016111] ? __virt_addr_valid+0x1db/0x2d0 [ 14.016135] ? mempool_oob_right_helper+0x318/0x380 [ 14.016159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.016183] ? mempool_oob_right_helper+0x318/0x380 [ 14.016208] kasan_report+0x141/0x180 [ 14.016230] ? mempool_oob_right_helper+0x318/0x380 [ 14.016259] __asan_report_load1_noabort+0x18/0x20 [ 14.016284] mempool_oob_right_helper+0x318/0x380 [ 14.016310] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.016382] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.016407] ? finish_task_switch.isra.0+0x153/0x700 [ 14.016434] mempool_slab_oob_right+0xed/0x140 [ 14.016467] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 14.016495] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 14.016521] ? __pfx_mempool_free_slab+0x10/0x10 [ 14.016547] ? __pfx_read_tsc+0x10/0x10 [ 14.016568] ? ktime_get_ts64+0x86/0x230 [ 14.016592] kunit_try_run_case+0x1a5/0x480 [ 14.016618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.016641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.016666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.016691] ? __kthread_parkme+0x82/0x180 [ 14.016712] ? preempt_count_sub+0x50/0x80 [ 14.016735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.016773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.016798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.016825] kthread+0x337/0x6f0 [ 14.016844] ? trace_preempt_on+0x20/0xc0 [ 14.016867] ? __pfx_kthread+0x10/0x10 [ 14.016888] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.016911] ? calculate_sigpending+0x7b/0xa0 [ 14.016935] ? __pfx_kthread+0x10/0x10 [ 14.016956] ret_from_fork+0x116/0x1d0 [ 14.016975] ? __pfx_kthread+0x10/0x10 [ 14.016996] ret_from_fork_asm+0x1a/0x30 [ 14.017026] </TASK> [ 14.017037] [ 14.025720] Allocated by task 242: [ 14.025926] kasan_save_stack+0x45/0x70 [ 14.026086] kasan_save_track+0x18/0x40 [ 14.026282] kasan_save_alloc_info+0x3b/0x50 [ 14.026542] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 14.026801] remove_element+0x11e/0x190 [ 14.027000] mempool_alloc_preallocated+0x4d/0x90 [ 14.027199] mempool_oob_right_helper+0x8a/0x380 [ 14.027455] mempool_slab_oob_right+0xed/0x140 [ 14.027614] kunit_try_run_case+0x1a5/0x480 [ 14.027775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.027958] kthread+0x337/0x6f0 [ 14.028126] ret_from_fork+0x116/0x1d0 [ 14.028337] ret_from_fork_asm+0x1a/0x30 [ 14.028700] [ 14.028818] The buggy address belongs to the object at ffff8881038e0240 [ 14.028818] which belongs to the cache test_cache of size 123 [ 14.029209] The buggy address is located 0 bytes to the right of [ 14.029209] allocated 123-byte region [ffff8881038e0240, ffff8881038e02bb) [ 14.030169] [ 14.030272] The buggy address belongs to the physical page: [ 14.030646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e0 [ 14.030978] flags: 0x200000000000000(node=0|zone=2) [ 14.031184] page_type: f5(slab) [ 14.031342] raw: 0200000000000000 ffff8881038d9140 dead000000000122 0000000000000000 [ 14.031895] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 14.032197] page dumped because: kasan: bad access detected [ 14.032577] [ 14.032654] Memory state around the buggy address: [ 14.032832] ffff8881038e0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.033073] ffff8881038e0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 14.033394] >ffff8881038e0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 14.033829] ^ [ 14.034000] ffff8881038e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.034222] ffff8881038e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.034892] ==================================================================