Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 37.063660] ================================================================== [ 37.063934] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 37.064205] Read of size 1 at addr fff00000c5da6073 by task kunit_try_catch/223 [ 37.064418] [ 37.064536] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.065076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.065212] Hardware name: linux,dummy-virt (DT) [ 37.065271] Call trace: [ 37.065314] show_stack+0x20/0x38 (C) [ 37.065407] dump_stack_lvl+0x8c/0xd0 [ 37.065491] print_report+0x118/0x5f0 [ 37.065565] kasan_report+0xc8/0x118 [ 37.065642] __asan_report_load1_noabort+0x20/0x30 [ 37.065726] mempool_oob_right_helper+0x2ac/0x2f0 [ 37.065807] mempool_kmalloc_oob_right+0xbc/0x118 [ 37.065892] kunit_try_run_case+0x14c/0x3d0 [ 37.065977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.066095] kthread+0x318/0x618 [ 37.066260] ret_from_fork+0x10/0x20 [ 37.066439] [ 37.066536] Allocated by task 223: [ 37.066632] kasan_save_stack+0x3c/0x68 [ 37.066762] kasan_save_track+0x20/0x40 [ 37.066878] kasan_save_alloc_info+0x40/0x58 [ 37.067015] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.067165] remove_element+0x130/0x1f8 [ 37.067319] mempool_alloc_preallocated+0x58/0xc0 [ 37.067543] mempool_oob_right_helper+0x98/0x2f0 [ 37.067765] mempool_kmalloc_oob_right+0xbc/0x118 [ 37.067975] kunit_try_run_case+0x14c/0x3d0 [ 37.068141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.068275] kthread+0x318/0x618 [ 37.068795] ret_from_fork+0x10/0x20 [ 37.068962] [ 37.069083] The buggy address belongs to the object at fff00000c5da6000 [ 37.069083] which belongs to the cache kmalloc-128 of size 128 [ 37.069278] The buggy address is located 0 bytes to the right of [ 37.069278] allocated 115-byte region [fff00000c5da6000, fff00000c5da6073) [ 37.069475] [ 37.069565] The buggy address belongs to the physical page: [ 37.069672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.069850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.070021] page_type: f5(slab) [ 37.070244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.070509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.070704] page dumped because: kasan: bad access detected [ 37.070806] [ 37.070898] Memory state around the buggy address: [ 37.071088] fff00000c5da5f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 37.071232] fff00000c5da5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.071366] >fff00000c5da6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.071491] ^ [ 37.071979] fff00000c5da6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.072379] fff00000c5da6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.072555] ================================================================== [ 37.141797] ================================================================== [ 37.142021] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 37.142249] Read of size 1 at addr fff00000c5daa2bb by task kunit_try_catch/227 [ 37.142450] [ 37.142592] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.142940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.143038] Hardware name: linux,dummy-virt (DT) [ 37.143176] Call trace: [ 37.143284] show_stack+0x20/0x38 (C) [ 37.143466] dump_stack_lvl+0x8c/0xd0 [ 37.143669] print_report+0x118/0x5f0 [ 37.143890] kasan_report+0xc8/0x118 [ 37.144109] __asan_report_load1_noabort+0x20/0x30 [ 37.144258] mempool_oob_right_helper+0x2ac/0x2f0 [ 37.144650] mempool_slab_oob_right+0xb8/0x110 [ 37.144845] kunit_try_run_case+0x14c/0x3d0 [ 37.145012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.145209] kthread+0x318/0x618 [ 37.145432] ret_from_fork+0x10/0x20 [ 37.145578] [ 37.145634] Allocated by task 227: [ 37.145930] kasan_save_stack+0x3c/0x68 [ 37.146080] kasan_save_track+0x20/0x40 [ 37.146206] kasan_save_alloc_info+0x40/0x58 [ 37.146352] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.146495] remove_element+0x16c/0x1f8 [ 37.146698] mempool_alloc_preallocated+0x58/0xc0 [ 37.146837] mempool_oob_right_helper+0x98/0x2f0 [ 37.146976] mempool_slab_oob_right+0xb8/0x110 [ 37.147126] kunit_try_run_case+0x14c/0x3d0 [ 37.147248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.147390] kthread+0x318/0x618 [ 37.147515] ret_from_fork+0x10/0x20 [ 37.147631] [ 37.147688] The buggy address belongs to the object at fff00000c5daa240 [ 37.147688] which belongs to the cache test_cache of size 123 [ 37.147901] The buggy address is located 0 bytes to the right of [ 37.147901] allocated 123-byte region [fff00000c5daa240, fff00000c5daa2bb) [ 37.148441] [ 37.148553] The buggy address belongs to the physical page: [ 37.148764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daa [ 37.149002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.149288] page_type: f5(slab) [ 37.149450] raw: 0bfffe0000000000 fff00000c5d9a640 dead000000000122 0000000000000000 [ 37.149628] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.149755] page dumped because: kasan: bad access detected [ 37.150544] [ 37.150637] Memory state around the buggy address: [ 37.150913] fff00000c5daa180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.151127] fff00000c5daa200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 37.151285] >fff00000c5daa280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 37.151437] ^ [ 37.151630] fff00000c5daa300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.151857] fff00000c5daa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.152006] ================================================================== [ 37.099859] ================================================================== [ 37.100040] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 37.100225] Read of size 1 at addr fff00000c7802001 by task kunit_try_catch/225 [ 37.100473] [ 37.100577] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.101129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.101255] Hardware name: linux,dummy-virt (DT) [ 37.101352] Call trace: [ 37.101396] show_stack+0x20/0x38 (C) [ 37.101480] dump_stack_lvl+0x8c/0xd0 [ 37.101560] print_report+0x118/0x5f0 [ 37.101632] kasan_report+0xc8/0x118 [ 37.101705] __asan_report_load1_noabort+0x20/0x30 [ 37.101784] mempool_oob_right_helper+0x2ac/0x2f0 [ 37.101868] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 37.101951] kunit_try_run_case+0x14c/0x3d0 [ 37.102030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.102229] kthread+0x318/0x618 [ 37.103280] ret_from_fork+0x10/0x20 [ 37.103485] [ 37.103553] The buggy address belongs to the physical page: [ 37.103657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 37.104125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.104305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.104965] page_type: f8(unknown) [ 37.105141] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.105770] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.105949] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.106135] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.106303] head: 0bfffe0000000002 ffffc1ffc31e0001 00000000ffffffff 00000000ffffffff [ 37.106468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.106609] page dumped because: kasan: bad access detected [ 37.106706] [ 37.106771] Memory state around the buggy address: [ 37.106877] fff00000c7801f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.107035] fff00000c7801f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.109164] >fff00000c7802000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.109419] ^ [ 37.109644] fff00000c7802080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.110183] fff00000c7802100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.110549] ==================================================================
[ 23.954441] ================================================================== [ 23.955532] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.956627] Read of size 1 at addr ffff88810391a001 by task kunit_try_catch/244 [ 23.957637] [ 23.958007] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 23.958166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.958206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.958267] Call Trace: [ 23.958302] <TASK> [ 23.958329] dump_stack_lvl+0x73/0xb0 [ 23.958378] print_report+0xd1/0x660 [ 23.958433] ? __virt_addr_valid+0x1db/0x2d0 [ 23.958512] ? kasan_addr_to_slab+0x11/0xa0 [ 23.958547] kasan_report+0x104/0x140 [ 23.958577] ? mempool_oob_right_helper+0x318/0x380 [ 23.958615] ? mempool_oob_right_helper+0x318/0x380 [ 23.958658] __asan_report_load1_noabort+0x18/0x20 [ 23.958688] mempool_oob_right_helper+0x318/0x380 [ 23.958919] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.959051] ? finish_task_switch.isra.0+0x153/0x730 [ 23.959152] mempool_kmalloc_large_oob_right+0xb5/0x100 [ 23.959196] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 23.959233] ? __switch_to+0x5d9/0xf70 [ 23.959270] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.959302] ? __pfx_mempool_kfree+0x10/0x10 [ 23.959335] ? __pfx_read_tsc+0x10/0x10 [ 23.959366] ? ktime_get_ts64+0x86/0x240 [ 23.959404] kunit_try_run_case+0x1b2/0x490 [ 23.959442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.959475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.959508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.959541] ? __kthread_parkme+0x82/0x160 [ 23.959572] ? preempt_count_sub+0x50/0x80 [ 23.959635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.959670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.959764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.959840] kthread+0x323/0x710 [ 23.959891] ? trace_preempt_on+0x20/0xc0 [ 23.959929] ? __pfx_kthread+0x10/0x10 [ 23.959974] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.960004] ? calculate_sigpending+0x7b/0xa0 [ 23.960038] ? __pfx_kthread+0x10/0x10 [ 23.960070] ret_from_fork+0x41/0x80 [ 23.960102] ? __pfx_kthread+0x10/0x10 [ 23.960183] ret_from_fork_asm+0x1a/0x30 [ 23.960233] </TASK> [ 23.960249] [ 23.977978] The buggy address belongs to the physical page: [ 23.978962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103918 [ 23.980038] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.981081] flags: 0x200000000000040(head|node=0|zone=2) [ 23.981882] page_type: f8(unknown) [ 23.982174] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.983139] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.984246] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.985181] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.986171] head: 0200000000000002 ffffea00040e4601 00000000ffffffff 00000000ffffffff [ 23.986581] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.987505] page dumped because: kasan: bad access detected [ 23.988399] [ 23.988622] Memory state around the buggy address: [ 23.989364] ffff888103919f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.990195] ffff888103919f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.990840] >ffff88810391a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.991241] ^ [ 23.991635] ffff88810391a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.992881] ffff88810391a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.993549] ================================================================== [ 23.894229] ================================================================== [ 23.895450] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.896779] Read of size 1 at addr ffff888103210673 by task kunit_try_catch/242 [ 23.897554] [ 23.898539] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 23.898624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.898642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.898675] Call Trace: [ 23.898694] <TASK> [ 23.898751] dump_stack_lvl+0x73/0xb0 [ 23.898808] print_report+0xd1/0x660 [ 23.898843] ? __virt_addr_valid+0x1db/0x2d0 [ 23.898913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.898950] kasan_report+0x104/0x140 [ 23.898980] ? mempool_oob_right_helper+0x318/0x380 [ 23.899017] ? mempool_oob_right_helper+0x318/0x380 [ 23.899060] __asan_report_load1_noabort+0x18/0x20 [ 23.899090] mempool_oob_right_helper+0x318/0x380 [ 23.899150] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.899185] ? update_load_avg+0x1c3/0x2170 [ 23.899221] ? update_curr+0x80/0x810 [ 23.899257] ? finish_task_switch.isra.0+0x153/0x730 [ 23.899295] mempool_kmalloc_oob_right+0xb5/0x100 [ 23.899330] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 23.899363] ? __switch_to+0x5d9/0xf70 [ 23.899398] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.899429] ? __pfx_mempool_kfree+0x10/0x10 [ 23.899462] ? __pfx_read_tsc+0x10/0x10 [ 23.899492] ? ktime_get_ts64+0x86/0x240 [ 23.899529] kunit_try_run_case+0x1b2/0x490 [ 23.899567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.899624] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.899657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.899689] ? __kthread_parkme+0x82/0x160 [ 23.899754] ? preempt_count_sub+0x50/0x80 [ 23.899794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.899829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.899864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.899898] kthread+0x323/0x710 [ 23.899940] ? trace_preempt_on+0x20/0xc0 [ 23.899975] ? __pfx_kthread+0x10/0x10 [ 23.900006] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.900036] ? calculate_sigpending+0x7b/0xa0 [ 23.900068] ? __pfx_kthread+0x10/0x10 [ 23.900100] ret_from_fork+0x41/0x80 [ 23.900153] ? __pfx_kthread+0x10/0x10 [ 23.900184] ret_from_fork_asm+0x1a/0x30 [ 23.900234] </TASK> [ 23.900251] [ 23.921857] Allocated by task 242: [ 23.922134] kasan_save_stack+0x3d/0x60 [ 23.922575] kasan_save_track+0x18/0x40 [ 23.926159] kasan_save_alloc_info+0x3b/0x50 [ 23.926464] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 23.927068] remove_element+0x11e/0x190 [ 23.927421] mempool_alloc_preallocated+0x4d/0x90 [ 23.927884] mempool_oob_right_helper+0x8a/0x380 [ 23.928996] mempool_kmalloc_oob_right+0xb5/0x100 [ 23.929420] kunit_try_run_case+0x1b2/0x490 [ 23.929886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.930337] kthread+0x323/0x710 [ 23.930668] ret_from_fork+0x41/0x80 [ 23.932205] ret_from_fork_asm+0x1a/0x30 [ 23.932586] [ 23.932751] The buggy address belongs to the object at ffff888103210600 [ 23.932751] which belongs to the cache kmalloc-128 of size 128 [ 23.933715] The buggy address is located 0 bytes to the right of [ 23.933715] allocated 115-byte region [ffff888103210600, ffff888103210673) [ 23.935205] [ 23.935441] The buggy address belongs to the physical page: [ 23.936237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103210 [ 23.937289] flags: 0x200000000000000(node=0|zone=2) [ 23.938091] page_type: f5(slab) [ 23.938357] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.939553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.940515] page dumped because: kasan: bad access detected [ 23.941069] [ 23.941268] Memory state around the buggy address: [ 23.941675] ffff888103210500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.943004] ffff888103210580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.943673] >ffff888103210600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.944523] ^ [ 23.945579] ffff888103210680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.946464] ffff888103210700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.947130] ================================================================== [ 24.004249] ================================================================== [ 24.005565] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.006486] Read of size 1 at addr ffff88810322d2bb by task kunit_try_catch/246 [ 24.007685] [ 24.007972] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.008103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.008165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.008229] Call Trace: [ 24.008263] <TASK> [ 24.008288] dump_stack_lvl+0x73/0xb0 [ 24.008336] print_report+0xd1/0x660 [ 24.008371] ? __virt_addr_valid+0x1db/0x2d0 [ 24.008465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.008504] kasan_report+0x104/0x140 [ 24.008535] ? mempool_oob_right_helper+0x318/0x380 [ 24.008574] ? mempool_oob_right_helper+0x318/0x380 [ 24.008616] __asan_report_load1_noabort+0x18/0x20 [ 24.008647] mempool_oob_right_helper+0x318/0x380 [ 24.008873] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.009036] ? finish_task_switch.isra.0+0x153/0x730 [ 24.009171] mempool_slab_oob_right+0xb0/0x100 [ 24.009252] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 24.009319] ? __switch_to+0x5d9/0xf70 [ 24.009376] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 24.009410] ? __pfx_mempool_free_slab+0x10/0x10 [ 24.009445] ? __pfx_read_tsc+0x10/0x10 [ 24.009476] ? ktime_get_ts64+0x86/0x240 [ 24.009514] kunit_try_run_case+0x1b2/0x490 [ 24.009553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.009585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.009617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.009649] ? __kthread_parkme+0x82/0x160 [ 24.009725] ? preempt_count_sub+0x50/0x80 [ 24.009796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.009858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.009918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.009977] kthread+0x323/0x710 [ 24.010028] ? trace_preempt_on+0x20/0xc0 [ 24.010089] ? __pfx_kthread+0x10/0x10 [ 24.010170] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.010201] ? calculate_sigpending+0x7b/0xa0 [ 24.010235] ? __pfx_kthread+0x10/0x10 [ 24.010268] ret_from_fork+0x41/0x80 [ 24.010301] ? __pfx_kthread+0x10/0x10 [ 24.010332] ret_from_fork_asm+0x1a/0x30 [ 24.010380] </TASK> [ 24.010395] [ 24.028626] Allocated by task 246: [ 24.029056] kasan_save_stack+0x3d/0x60 [ 24.029363] kasan_save_track+0x18/0x40 [ 24.030019] kasan_save_alloc_info+0x3b/0x50 [ 24.030580] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 24.031382] remove_element+0x11e/0x190 [ 24.032062] mempool_alloc_preallocated+0x4d/0x90 [ 24.032574] mempool_oob_right_helper+0x8a/0x380 [ 24.033585] mempool_slab_oob_right+0xb0/0x100 [ 24.034134] kunit_try_run_case+0x1b2/0x490 [ 24.034983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.035423] kthread+0x323/0x710 [ 24.036023] ret_from_fork+0x41/0x80 [ 24.036478] ret_from_fork_asm+0x1a/0x30 [ 24.036942] [ 24.037130] The buggy address belongs to the object at ffff88810322d240 [ 24.037130] which belongs to the cache test_cache of size 123 [ 24.038502] The buggy address is located 0 bytes to the right of [ 24.038502] allocated 123-byte region [ffff88810322d240, ffff88810322d2bb) [ 24.040018] [ 24.040258] The buggy address belongs to the physical page: [ 24.040918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10322d [ 24.042415] flags: 0x200000000000000(node=0|zone=2) [ 24.042954] page_type: f5(slab) [ 24.043385] raw: 0200000000000000 ffff8881020e8dc0 dead000000000122 0000000000000000 [ 24.044614] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 24.045560] page dumped because: kasan: bad access detected [ 24.046079] [ 24.046284] Memory state around the buggy address: [ 24.047408] ffff88810322d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.048389] ffff88810322d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 24.048840] >ffff88810322d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 24.050093] ^ [ 24.051045] ffff88810322d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.051689] ffff88810322d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.053015] ==================================================================