Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.249751] ================================================================== [ 17.249808] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.249861] Read of size 1 at addr fff00000c78de001 by task kunit_try_catch/223 [ 17.250073] [ 17.250353] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.250914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.251000] Hardware name: linux,dummy-virt (DT) [ 17.251218] Call trace: [ 17.251252] show_stack+0x20/0x38 (C) [ 17.251304] dump_stack_lvl+0x8c/0xd0 [ 17.251352] print_report+0x118/0x5d0 [ 17.251808] kasan_report+0xdc/0x128 [ 17.251956] __asan_report_load1_noabort+0x20/0x30 [ 17.252016] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.252130] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.252247] kunit_try_run_case+0x170/0x3f0 [ 17.252505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.252569] kthread+0x328/0x630 [ 17.252637] ret_from_fork+0x10/0x20 [ 17.252890] [ 17.252964] The buggy address belongs to the physical page: [ 17.253217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc [ 17.253284] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.253644] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.254330] page_type: f8(unknown) [ 17.254392] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.254444] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.255066] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.255511] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.255567] head: 0bfffe0000000002 ffffc1ffc31e3701 00000000ffffffff 00000000ffffffff [ 17.255990] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.256062] page dumped because: kasan: bad access detected [ 17.256506] [ 17.256615] Memory state around the buggy address: [ 17.256802] fff00000c78ddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.256958] fff00000c78ddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.257410] >fff00000c78de000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.257761] ^ [ 17.257874] fff00000c78de080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.258029] fff00000c78de100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.258294] ================================================================== [ 17.293881] ================================================================== [ 17.293960] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.294024] Read of size 1 at addr fff00000c78c92bb by task kunit_try_catch/225 [ 17.294074] [ 17.294113] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.294200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.294227] Hardware name: linux,dummy-virt (DT) [ 17.294260] Call trace: [ 17.294294] show_stack+0x20/0x38 (C) [ 17.294353] dump_stack_lvl+0x8c/0xd0 [ 17.294542] print_report+0x118/0x5d0 [ 17.294771] kasan_report+0xdc/0x128 [ 17.294976] __asan_report_load1_noabort+0x20/0x30 [ 17.295057] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.295285] mempool_slab_oob_right+0xc0/0x118 [ 17.295338] kunit_try_run_case+0x170/0x3f0 [ 17.295588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.295727] kthread+0x328/0x630 [ 17.295768] ret_from_fork+0x10/0x20 [ 17.295816] [ 17.295836] Allocated by task 225: [ 17.295864] kasan_save_stack+0x3c/0x68 [ 17.295905] kasan_save_track+0x20/0x40 [ 17.295941] kasan_save_alloc_info+0x40/0x58 [ 17.295981] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.296023] remove_element+0x16c/0x1f8 [ 17.296069] mempool_alloc_preallocated+0x58/0xc0 [ 17.296110] mempool_oob_right_helper+0x98/0x2f0 [ 17.296151] mempool_slab_oob_right+0xc0/0x118 [ 17.296191] kunit_try_run_case+0x170/0x3f0 [ 17.296229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.296273] kthread+0x328/0x630 [ 17.296306] ret_from_fork+0x10/0x20 [ 17.296342] [ 17.296362] The buggy address belongs to the object at fff00000c78c9240 [ 17.296362] which belongs to the cache test_cache of size 123 [ 17.296420] The buggy address is located 0 bytes to the right of [ 17.296420] allocated 123-byte region [fff00000c78c9240, fff00000c78c92bb) [ 17.296483] [ 17.296577] The buggy address belongs to the physical page: [ 17.296666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c9 [ 17.296768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.296827] page_type: f5(slab) [ 17.296868] raw: 0bfffe0000000000 fff00000c3e3e500 dead000000000122 0000000000000000 [ 17.296918] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.297267] page dumped because: kasan: bad access detected [ 17.297305] [ 17.297322] Memory state around the buggy address: [ 17.297368] fff00000c78c9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.297411] fff00000c78c9200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.297454] >fff00000c78c9280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.297490] ^ [ 17.297627] fff00000c78c9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.297753] fff00000c78c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.297791] ================================================================== [ 17.242446] ================================================================== [ 17.242516] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.242590] Read of size 1 at addr fff00000c63eb573 by task kunit_try_catch/221 [ 17.242643] [ 17.242703] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.242792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.242821] Hardware name: linux,dummy-virt (DT) [ 17.242856] Call trace: [ 17.242882] show_stack+0x20/0x38 (C) [ 17.242936] dump_stack_lvl+0x8c/0xd0 [ 17.242986] print_report+0x118/0x5d0 [ 17.243034] kasan_report+0xdc/0x128 [ 17.243084] __asan_report_load1_noabort+0x20/0x30 [ 17.243140] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.243189] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.243239] kunit_try_run_case+0x170/0x3f0 [ 17.243291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.243343] kthread+0x328/0x630 [ 17.243387] ret_from_fork+0x10/0x20 [ 17.243436] [ 17.243455] Allocated by task 221: [ 17.243486] kasan_save_stack+0x3c/0x68 [ 17.243529] kasan_save_track+0x20/0x40 [ 17.243567] kasan_save_alloc_info+0x40/0x58 [ 17.243607] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.243651] remove_element+0x130/0x1f8 [ 17.243699] mempool_alloc_preallocated+0x58/0xc0 [ 17.243738] mempool_oob_right_helper+0x98/0x2f0 [ 17.243779] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.243817] kunit_try_run_case+0x170/0x3f0 [ 17.243967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.244019] kthread+0x328/0x630 [ 17.244051] ret_from_fork+0x10/0x20 [ 17.244086] [ 17.244109] The buggy address belongs to the object at fff00000c63eb500 [ 17.244109] which belongs to the cache kmalloc-128 of size 128 [ 17.244169] The buggy address is located 0 bytes to the right of [ 17.244169] allocated 115-byte region [fff00000c63eb500, fff00000c63eb573) [ 17.244236] [ 17.244259] The buggy address belongs to the physical page: [ 17.244294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 17.244349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.244403] page_type: f5(slab) [ 17.244444] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.244493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.244536] page dumped because: kasan: bad access detected [ 17.244569] [ 17.244587] Memory state around the buggy address: [ 17.244622] fff00000c63eb400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.244665] fff00000c63eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.244724] >fff00000c63eb500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.244763] ^ [ 17.244803] fff00000c63eb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.244845] fff00000c63eb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.244884] ==================================================================
[ 13.418336] ================================================================== [ 13.418851] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.419240] Read of size 1 at addr ffff888102fd1673 by task kunit_try_catch/238 [ 13.419971] [ 13.420271] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.420347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.420360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.420555] Call Trace: [ 13.420572] <TASK> [ 13.420591] dump_stack_lvl+0x73/0xb0 [ 13.420626] print_report+0xd1/0x610 [ 13.420649] ? __virt_addr_valid+0x1db/0x2d0 [ 13.420675] ? mempool_oob_right_helper+0x318/0x380 [ 13.420699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.420721] ? mempool_oob_right_helper+0x318/0x380 [ 13.420744] kasan_report+0x141/0x180 [ 13.420765] ? mempool_oob_right_helper+0x318/0x380 [ 13.420792] __asan_report_load1_noabort+0x18/0x20 [ 13.420815] mempool_oob_right_helper+0x318/0x380 [ 13.420838] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.420862] ? __kasan_check_write+0x18/0x20 [ 13.420881] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.420903] ? finish_task_switch.isra.0+0x153/0x700 [ 13.420929] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.420951] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.420985] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.421023] ? __pfx_mempool_kfree+0x10/0x10 [ 13.421047] ? __pfx_read_tsc+0x10/0x10 [ 13.421069] ? ktime_get_ts64+0x86/0x230 [ 13.421094] kunit_try_run_case+0x1a5/0x480 [ 13.421120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.421141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.421165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.421187] ? __kthread_parkme+0x82/0x180 [ 13.421208] ? preempt_count_sub+0x50/0x80 [ 13.421230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.421253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.421275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.421297] kthread+0x337/0x6f0 [ 13.421315] ? trace_preempt_on+0x20/0xc0 [ 13.421338] ? __pfx_kthread+0x10/0x10 [ 13.421358] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.421391] ? calculate_sigpending+0x7b/0xa0 [ 13.421415] ? __pfx_kthread+0x10/0x10 [ 13.421435] ret_from_fork+0x116/0x1d0 [ 13.421453] ? __pfx_kthread+0x10/0x10 [ 13.421472] ret_from_fork_asm+0x1a/0x30 [ 13.421505] </TASK> [ 13.421517] [ 13.433515] Allocated by task 238: [ 13.433786] kasan_save_stack+0x45/0x70 [ 13.433981] kasan_save_track+0x18/0x40 [ 13.434193] kasan_save_alloc_info+0x3b/0x50 [ 13.434401] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.434987] remove_element+0x11e/0x190 [ 13.435280] mempool_alloc_preallocated+0x4d/0x90 [ 13.435704] mempool_oob_right_helper+0x8a/0x380 [ 13.436039] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.436281] kunit_try_run_case+0x1a5/0x480 [ 13.436771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.437042] kthread+0x337/0x6f0 [ 13.437564] ret_from_fork+0x116/0x1d0 [ 13.437737] ret_from_fork_asm+0x1a/0x30 [ 13.438115] [ 13.438220] The buggy address belongs to the object at ffff888102fd1600 [ 13.438220] which belongs to the cache kmalloc-128 of size 128 [ 13.438972] The buggy address is located 0 bytes to the right of [ 13.438972] allocated 115-byte region [ffff888102fd1600, ffff888102fd1673) [ 13.439740] [ 13.439851] The buggy address belongs to the physical page: [ 13.440325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1 [ 13.440693] flags: 0x200000000000000(node=0|zone=2) [ 13.441084] page_type: f5(slab) [ 13.441265] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.441863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.442290] page dumped because: kasan: bad access detected [ 13.442778] [ 13.442892] Memory state around the buggy address: [ 13.443195] ffff888102fd1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.443802] ffff888102fd1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.444147] >ffff888102fd1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.444840] ^ [ 13.445137] ffff888102fd1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.445653] ffff888102fd1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.446119] ================================================================== [ 13.449802] ================================================================== [ 13.450345] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.450877] Read of size 1 at addr ffff8881039f6001 by task kunit_try_catch/240 [ 13.451185] [ 13.451280] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.451324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.451336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.451357] Call Trace: [ 13.451369] <TASK> [ 13.451386] dump_stack_lvl+0x73/0xb0 [ 13.451415] print_report+0xd1/0x610 [ 13.451722] ? __virt_addr_valid+0x1db/0x2d0 [ 13.451747] ? mempool_oob_right_helper+0x318/0x380 [ 13.451769] ? kasan_addr_to_slab+0x11/0xa0 [ 13.451789] ? mempool_oob_right_helper+0x318/0x380 [ 13.451812] kasan_report+0x141/0x180 [ 13.451833] ? mempool_oob_right_helper+0x318/0x380 [ 13.451860] __asan_report_load1_noabort+0x18/0x20 [ 13.451884] mempool_oob_right_helper+0x318/0x380 [ 13.451908] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.451930] ? update_curr+0x5c1/0x810 [ 13.451959] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.451983] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.452020] ? schedule+0x7c/0x2e0 [ 13.452043] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.452067] ? __pfx_mempool_kfree+0x10/0x10 [ 13.452091] ? __pfx_read_tsc+0x10/0x10 [ 13.452110] ? ktime_get_ts64+0x86/0x230 [ 13.452133] kunit_try_run_case+0x1a5/0x480 [ 13.452159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.452180] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.452204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.452226] ? __kthread_parkme+0x82/0x180 [ 13.452247] ? preempt_count_sub+0x50/0x80 [ 13.452270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.452292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.452315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.452338] kthread+0x337/0x6f0 [ 13.452356] ? trace_preempt_on+0x20/0xc0 [ 13.452378] ? __pfx_kthread+0x10/0x10 [ 13.452409] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.452448] ? calculate_sigpending+0x7b/0xa0 [ 13.452471] ? __pfx_kthread+0x10/0x10 [ 13.452492] ret_from_fork+0x116/0x1d0 [ 13.452509] ? __pfx_kthread+0x10/0x10 [ 13.452529] ret_from_fork_asm+0x1a/0x30 [ 13.452559] </TASK> [ 13.452569] [ 13.462712] The buggy address belongs to the physical page: [ 13.463045] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4 [ 13.463407] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.463932] flags: 0x200000000000040(head|node=0|zone=2) [ 13.464209] page_type: f8(unknown) [ 13.464362] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.464653] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.465087] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.465530] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.465905] head: 0200000000000002 ffffea00040e7d01 00000000ffffffff 00000000ffffffff [ 13.466257] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.466686] page dumped because: kasan: bad access detected [ 13.466880] [ 13.466970] Memory state around the buggy address: [ 13.467220] ffff8881039f5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.467789] ffff8881039f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.468034] >ffff8881039f6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.468320] ^ [ 13.468659] ffff8881039f6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.469089] ffff8881039f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.469420] ================================================================== [ 13.475904] ================================================================== [ 13.476478] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.477034] Read of size 1 at addr ffff8881039792bb by task kunit_try_catch/242 [ 13.477362] [ 13.477477] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.477520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.477531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.477552] Call Trace: [ 13.477563] <TASK> [ 13.477577] dump_stack_lvl+0x73/0xb0 [ 13.477729] print_report+0xd1/0x610 [ 13.477752] ? __virt_addr_valid+0x1db/0x2d0 [ 13.477775] ? mempool_oob_right_helper+0x318/0x380 [ 13.477797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.477818] ? mempool_oob_right_helper+0x318/0x380 [ 13.477841] kasan_report+0x141/0x180 [ 13.477862] ? mempool_oob_right_helper+0x318/0x380 [ 13.477889] __asan_report_load1_noabort+0x18/0x20 [ 13.477947] mempool_oob_right_helper+0x318/0x380 [ 13.477995] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.478028] ? update_load_avg+0x1be/0x21b0 [ 13.478055] ? finish_task_switch.isra.0+0x153/0x700 [ 13.478080] mempool_slab_oob_right+0xed/0x140 [ 13.478103] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.478126] ? __kasan_check_write+0x18/0x20 [ 13.478146] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.478170] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.478195] ? __pfx_read_tsc+0x10/0x10 [ 13.478215] ? ktime_get_ts64+0x86/0x230 [ 13.478236] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.478261] kunit_try_run_case+0x1a5/0x480 [ 13.478285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.478309] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.478334] ? __kthread_parkme+0x82/0x180 [ 13.478353] ? preempt_count_sub+0x50/0x80 [ 13.478430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.478455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.478477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.478499] kthread+0x337/0x6f0 [ 13.478522] ? trace_preempt_on+0x20/0xc0 [ 13.478544] ? __pfx_kthread+0x10/0x10 [ 13.478564] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.478584] ? calculate_sigpending+0x7b/0xa0 [ 13.478607] ? __pfx_kthread+0x10/0x10 [ 13.478628] ret_from_fork+0x116/0x1d0 [ 13.478646] ? __pfx_kthread+0x10/0x10 [ 13.478666] ret_from_fork_asm+0x1a/0x30 [ 13.478697] </TASK> [ 13.478707] [ 13.490698] Allocated by task 242: [ 13.490912] kasan_save_stack+0x45/0x70 [ 13.491211] kasan_save_track+0x18/0x40 [ 13.491459] kasan_save_alloc_info+0x3b/0x50 [ 13.492043] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.492366] remove_element+0x11e/0x190 [ 13.492794] mempool_alloc_preallocated+0x4d/0x90 [ 13.492987] mempool_oob_right_helper+0x8a/0x380 [ 13.493339] mempool_slab_oob_right+0xed/0x140 [ 13.493800] kunit_try_run_case+0x1a5/0x480 [ 13.494120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.494491] kthread+0x337/0x6f0 [ 13.494666] ret_from_fork+0x116/0x1d0 [ 13.494846] ret_from_fork_asm+0x1a/0x30 [ 13.495048] [ 13.495134] The buggy address belongs to the object at ffff888103979240 [ 13.495134] which belongs to the cache test_cache of size 123 [ 13.496154] The buggy address is located 0 bytes to the right of [ 13.496154] allocated 123-byte region [ffff888103979240, ffff8881039792bb) [ 13.497088] [ 13.497306] The buggy address belongs to the physical page: [ 13.497773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103979 [ 13.498327] flags: 0x200000000000000(node=0|zone=2) [ 13.498697] page_type: f5(slab) [ 13.499058] raw: 0200000000000000 ffff888102fd9280 dead000000000122 0000000000000000 [ 13.499624] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.500217] page dumped because: kasan: bad access detected [ 13.500714] [ 13.500817] Memory state around the buggy address: [ 13.501243] ffff888103979180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.501725] ffff888103979200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.502161] >ffff888103979280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.502720] ^ [ 13.503036] ffff888103979300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.503509] ffff888103979380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.503808] ==================================================================