Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 36.086125] ================================================================== [ 36.087481] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.088355] Read of size 1 at addr fff00000c6a99073 by task kunit_try_catch/210 [ 36.089313] [ 36.089692] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.091603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.092193] Hardware name: linux,dummy-virt (DT) [ 36.093272] Call trace: [ 36.093713] show_stack+0x20/0x38 (C) [ 36.094333] dump_stack_lvl+0x8c/0xd0 [ 36.094883] print_report+0x118/0x5e0 [ 36.095577] kasan_report+0xc8/0x118 [ 36.096156] __asan_report_load1_noabort+0x20/0x30 [ 36.097410] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.098155] mempool_kmalloc_oob_right+0xbc/0x118 [ 36.098582] kunit_try_run_case+0x14c/0x3d0 [ 36.099269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.100150] kthread+0x24c/0x2d0 [ 36.100923] ret_from_fork+0x10/0x20 [ 36.101959] [ 36.102388] Allocated by task 210: [ 36.102983] kasan_save_stack+0x3c/0x68 [ 36.103648] kasan_save_track+0x20/0x40 [ 36.104341] kasan_save_alloc_info+0x40/0x58 [ 36.105391] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.106297] remove_element+0x130/0x1f8 [ 36.106860] mempool_alloc_preallocated+0x58/0xc0 [ 36.107552] mempool_oob_right_helper+0x98/0x2f0 [ 36.108331] mempool_kmalloc_oob_right+0xbc/0x118 [ 36.109666] kunit_try_run_case+0x14c/0x3d0 [ 36.110266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.111111] kthread+0x24c/0x2d0 [ 36.111609] ret_from_fork+0x10/0x20 [ 36.112154] [ 36.112899] The buggy address belongs to the object at fff00000c6a99000 [ 36.112899] which belongs to the cache kmalloc-128 of size 128 [ 36.114394] The buggy address is located 0 bytes to the right of [ 36.114394] allocated 115-byte region [fff00000c6a99000, fff00000c6a99073) [ 36.116169] [ 36.117023] The buggy address belongs to the physical page: [ 36.117872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a99 [ 36.118787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.119832] page_type: f5(slab) [ 36.120313] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.121744] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.122599] page dumped because: kasan: bad access detected [ 36.123279] [ 36.123587] Memory state around the buggy address: [ 36.124259] fff00000c6a98f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.125668] fff00000c6a98f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.126694] >fff00000c6a99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.127593] ^ [ 36.129026] fff00000c6a99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.129782] fff00000c6a99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.130621] ================================================================== [ 36.195325] ================================================================== [ 36.197702] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.198662] Read of size 1 at addr fff00000c63312bb by task kunit_try_catch/214 [ 36.199772] [ 36.200153] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.201911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.202849] Hardware name: linux,dummy-virt (DT) [ 36.203399] Call trace: [ 36.203825] show_stack+0x20/0x38 (C) [ 36.204391] dump_stack_lvl+0x8c/0xd0 [ 36.205187] print_report+0x118/0x5e0 [ 36.206256] kasan_report+0xc8/0x118 [ 36.207041] __asan_report_load1_noabort+0x20/0x30 [ 36.207717] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.208533] mempool_slab_oob_right+0xb8/0x110 [ 36.209355] kunit_try_run_case+0x14c/0x3d0 [ 36.210311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.211135] kthread+0x24c/0x2d0 [ 36.211751] ret_from_fork+0x10/0x20 [ 36.212514] [ 36.213026] Allocated by task 214: [ 36.213500] kasan_save_stack+0x3c/0x68 [ 36.214355] kasan_save_track+0x20/0x40 [ 36.215367] kasan_save_alloc_info+0x40/0x58 [ 36.216274] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.217381] remove_element+0x16c/0x1f8 [ 36.218371] mempool_alloc_preallocated+0x58/0xc0 [ 36.219048] mempool_oob_right_helper+0x98/0x2f0 [ 36.219889] mempool_slab_oob_right+0xb8/0x110 [ 36.220891] kunit_try_run_case+0x14c/0x3d0 [ 36.221482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.222849] kthread+0x24c/0x2d0 [ 36.223819] ret_from_fork+0x10/0x20 [ 36.224572] [ 36.224867] The buggy address belongs to the object at fff00000c6331240 [ 36.224867] which belongs to the cache test_cache of size 123 [ 36.226396] The buggy address is located 0 bytes to the right of [ 36.226396] allocated 123-byte region [fff00000c6331240, fff00000c63312bb) [ 36.228177] [ 36.228715] The buggy address belongs to the physical page: [ 36.229543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106331 [ 36.230947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.232133] page_type: f5(slab) [ 36.232725] raw: 0bfffe0000000000 fff00000c408ca00 dead000000000122 0000000000000000 [ 36.234236] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 36.235105] page dumped because: kasan: bad access detected [ 36.236395] [ 36.236830] Memory state around the buggy address: [ 36.237612] fff00000c6331180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.238911] fff00000c6331200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.239555] >fff00000c6331280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.241144] ^ [ 36.241969] fff00000c6331300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.243242] fff00000c6331380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.244146] ================================================================== [ 36.143749] ================================================================== [ 36.145051] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.145937] Read of size 1 at addr fff00000c6b82001 by task kunit_try_catch/212 [ 36.147026] [ 36.147360] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.149953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.150666] Hardware name: linux,dummy-virt (DT) [ 36.151304] Call trace: [ 36.151726] show_stack+0x20/0x38 (C) [ 36.152304] dump_stack_lvl+0x8c/0xd0 [ 36.153506] print_report+0x118/0x5e0 [ 36.154270] kasan_report+0xc8/0x118 [ 36.155068] __asan_report_load1_noabort+0x20/0x30 [ 36.155803] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.156459] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 36.157213] kunit_try_run_case+0x14c/0x3d0 [ 36.158320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.159059] kthread+0x24c/0x2d0 [ 36.159682] ret_from_fork+0x10/0x20 [ 36.160261] [ 36.160654] The buggy address belongs to the physical page: [ 36.161733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b80 [ 36.162657] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.163516] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.164380] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.166350] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.167778] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.169035] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.170400] head: 0bfffe0000000002 ffffc1ffc31ae001 ffffffffffffffff 0000000000000000 [ 36.171507] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.172409] page dumped because: kasan: bad access detected [ 36.173552] [ 36.173957] Memory state around the buggy address: [ 36.174782] fff00000c6b81f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.175802] fff00000c6b81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.177175] >fff00000c6b82000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.178225] ^ [ 36.178791] fff00000c6b82080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.179676] fff00000c6b82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.180910] ==================================================================
[ 27.182292] ================================================================== [ 27.183006] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 27.183918] Read of size 1 at addr ffff888102d22001 by task kunit_try_catch/231 [ 27.184383] [ 27.184698] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.185594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.186302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.186751] Call Trace: [ 27.186984] <TASK> [ 27.187382] dump_stack_lvl+0x73/0xb0 [ 27.187863] print_report+0xd1/0x640 [ 27.188486] ? __virt_addr_valid+0x1db/0x2d0 [ 27.188804] ? kasan_addr_to_slab+0x11/0xa0 [ 27.189342] kasan_report+0x102/0x140 [ 27.189884] ? mempool_oob_right_helper+0x31a/0x380 [ 27.190332] ? mempool_oob_right_helper+0x31a/0x380 [ 27.190744] __asan_report_load1_noabort+0x18/0x20 [ 27.191084] mempool_oob_right_helper+0x31a/0x380 [ 27.191848] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.192418] ? finish_task_switch.isra.0+0x153/0x700 [ 27.193483] mempool_kmalloc_large_oob_right+0xb6/0x100 [ 27.193928] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 27.194377] ? __switch_to+0x5d9/0xf60 [ 27.194893] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.195397] ? __pfx_mempool_kfree+0x10/0x10 [ 27.196264] ? __pfx_read_tsc+0x10/0x10 [ 27.196694] ? ktime_get_ts64+0x84/0x230 [ 27.197015] kunit_try_run_case+0x1b3/0x490 [ 27.197587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.198391] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.199128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.199476] ? __kthread_parkme+0x82/0x160 [ 27.199761] ? preempt_count_sub+0x50/0x80 [ 27.200513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.201197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.201811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.202359] kthread+0x257/0x310 [ 27.202836] ? __pfx_kthread+0x10/0x10 [ 27.203151] ret_from_fork+0x41/0x80 [ 27.203738] ? __pfx_kthread+0x10/0x10 [ 27.204287] ret_from_fork_asm+0x1a/0x30 [ 27.204673] </TASK> [ 27.204883] [ 27.205366] The buggy address belongs to the physical page: [ 27.205937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d20 [ 27.206901] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.207556] flags: 0x200000000000040(head|node=0|zone=2) [ 27.208225] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.209338] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.209737] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.210504] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.211371] head: 0200000000000002 ffffea00040b4801 ffffffffffffffff 0000000000000000 [ 27.211757] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.212722] page dumped because: kasan: bad access detected [ 27.213602] [ 27.213842] Memory state around the buggy address: [ 27.214200] ffff888102d21f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.214964] ffff888102d21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.215748] >ffff888102d22000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.216263] ^ [ 27.216488] ffff888102d22080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.216889] ffff888102d22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.217762] ================================================================== [ 27.122445] ================================================================== [ 27.123398] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 27.124316] Read of size 1 at addr ffff888102a17373 by task kunit_try_catch/229 [ 27.124810] [ 27.125287] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.126493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.127137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.127796] Call Trace: [ 27.128556] <TASK> [ 27.128778] dump_stack_lvl+0x73/0xb0 [ 27.129093] print_report+0xd1/0x640 [ 27.129514] ? __virt_addr_valid+0x1db/0x2d0 [ 27.130114] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.130530] kasan_report+0x102/0x140 [ 27.130806] ? mempool_oob_right_helper+0x31a/0x380 [ 27.131568] ? mempool_oob_right_helper+0x31a/0x380 [ 27.132283] __asan_report_load1_noabort+0x18/0x20 [ 27.132701] mempool_oob_right_helper+0x31a/0x380 [ 27.133391] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.134492] ? update_load_avg+0x1c3/0x2110 [ 27.135220] ? update_curr+0x7d/0x5a0 [ 27.135673] ? update_curr+0x7d/0x5a0 [ 27.136287] ? finish_task_switch.isra.0+0x153/0x700 [ 27.136802] mempool_kmalloc_oob_right+0xb6/0x100 [ 27.137481] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 27.138157] ? __switch_to+0x5d9/0xf60 [ 27.138657] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.139662] ? __pfx_mempool_kfree+0x10/0x10 [ 27.140151] ? __pfx_read_tsc+0x10/0x10 [ 27.140515] ? ktime_get_ts64+0x84/0x230 [ 27.141144] kunit_try_run_case+0x1b3/0x490 [ 27.141591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.142307] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.142757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.143505] ? __kthread_parkme+0x82/0x160 [ 27.144040] ? preempt_count_sub+0x50/0x80 [ 27.144559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.145662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.146293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.147090] kthread+0x257/0x310 [ 27.147358] ? __pfx_kthread+0x10/0x10 [ 27.147884] ret_from_fork+0x41/0x80 [ 27.148733] ? __pfx_kthread+0x10/0x10 [ 27.149636] ret_from_fork_asm+0x1a/0x30 [ 27.150160] </TASK> [ 27.150774] [ 27.151574] Allocated by task 229: [ 27.151915] kasan_save_stack+0x3d/0x60 [ 27.152305] kasan_save_track+0x18/0x40 [ 27.152723] kasan_save_alloc_info+0x3b/0x50 [ 27.153170] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.154186] remove_element+0x11e/0x190 [ 27.155278] mempool_alloc_preallocated+0x4d/0x90 [ 27.155615] mempool_oob_right_helper+0x8b/0x380 [ 27.155948] mempool_kmalloc_oob_right+0xb6/0x100 [ 27.156922] kunit_try_run_case+0x1b3/0x490 [ 27.157552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.158221] kthread+0x257/0x310 [ 27.158745] ret_from_fork+0x41/0x80 [ 27.159334] ret_from_fork_asm+0x1a/0x30 [ 27.159962] [ 27.160287] The buggy address belongs to the object at ffff888102a17300 [ 27.160287] which belongs to the cache kmalloc-128 of size 128 [ 27.161814] The buggy address is located 0 bytes to the right of [ 27.161814] allocated 115-byte region [ffff888102a17300, ffff888102a17373) [ 27.163038] [ 27.163412] The buggy address belongs to the physical page: [ 27.164049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a17 [ 27.164473] flags: 0x200000000000000(node=0|zone=2) [ 27.165101] page_type: f5(slab) [ 27.165579] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.166939] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.167496] page dumped because: kasan: bad access detected [ 27.167923] [ 27.168192] Memory state around the buggy address: [ 27.168613] ffff888102a17200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.169411] ffff888102a17280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.169886] >ffff888102a17300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.170387] ^ [ 27.171104] ffff888102a17380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.171936] ffff888102a17400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.172433] ================================================================== [ 27.229055] ================================================================== [ 27.230043] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 27.230863] Read of size 1 at addr ffff888101abb2bb by task kunit_try_catch/233 [ 27.231555] [ 27.231756] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.232213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.232801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.234264] Call Trace: [ 27.234610] <TASK> [ 27.234922] dump_stack_lvl+0x73/0xb0 [ 27.235382] print_report+0xd1/0x640 [ 27.236303] ? __virt_addr_valid+0x1db/0x2d0 [ 27.236711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.237246] kasan_report+0x102/0x140 [ 27.239200] ? mempool_oob_right_helper+0x31a/0x380 [ 27.239783] ? mempool_oob_right_helper+0x31a/0x380 [ 27.240519] __asan_report_load1_noabort+0x18/0x20 [ 27.241189] mempool_oob_right_helper+0x31a/0x380 [ 27.241943] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.242591] ? finish_task_switch.isra.0+0x153/0x700 [ 27.243330] mempool_slab_oob_right+0xb1/0x100 [ 27.243936] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 27.244403] ? __switch_to+0x5d9/0xf60 [ 27.244948] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 27.245649] ? __pfx_mempool_free_slab+0x10/0x10 [ 27.246292] ? __pfx_read_tsc+0x10/0x10 [ 27.246611] ? ktime_get_ts64+0x84/0x230 [ 27.247077] kunit_try_run_case+0x1b3/0x490 [ 27.247782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.248519] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.249055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.249673] ? __kthread_parkme+0x82/0x160 [ 27.250225] ? preempt_count_sub+0x50/0x80 [ 27.250855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.251240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.252335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.252816] kthread+0x257/0x310 [ 27.253223] ? __pfx_kthread+0x10/0x10 [ 27.254118] ret_from_fork+0x41/0x80 [ 27.254476] ? __pfx_kthread+0x10/0x10 [ 27.254764] ret_from_fork_asm+0x1a/0x30 [ 27.255253] </TASK> [ 27.256052] [ 27.256234] Allocated by task 233: [ 27.256430] kasan_save_stack+0x3d/0x60 [ 27.256680] kasan_save_track+0x18/0x40 [ 27.257376] kasan_save_alloc_info+0x3b/0x50 [ 27.257813] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 27.258154] remove_element+0x11e/0x190 [ 27.258668] mempool_alloc_preallocated+0x4d/0x90 [ 27.259421] mempool_oob_right_helper+0x8b/0x380 [ 27.260633] mempool_slab_oob_right+0xb1/0x100 [ 27.261264] kunit_try_run_case+0x1b3/0x490 [ 27.261705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.262174] kthread+0x257/0x310 [ 27.262786] ret_from_fork+0x41/0x80 [ 27.263204] ret_from_fork_asm+0x1a/0x30 [ 27.263597] [ 27.263748] The buggy address belongs to the object at ffff888101abb240 [ 27.263748] which belongs to the cache test_cache of size 123 [ 27.265698] The buggy address is located 0 bytes to the right of [ 27.265698] allocated 123-byte region [ffff888101abb240, ffff888101abb2bb) [ 27.267787] [ 27.268054] The buggy address belongs to the physical page: [ 27.268452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abb [ 27.270102] flags: 0x200000000000000(node=0|zone=2) [ 27.270768] page_type: f5(slab) [ 27.271359] raw: 0200000000000000 ffff888101a67780 dead000000000122 0000000000000000 [ 27.272356] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 27.272837] page dumped because: kasan: bad access detected [ 27.273438] [ 27.273924] Memory state around the buggy address: [ 27.274533] ffff888101abb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.275305] ffff888101abb200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 27.276360] >ffff888101abb280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 27.276944] ^ [ 27.277422] ffff888101abb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.278169] ffff888101abb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.279094] ==================================================================