Date
May 12, 2025, 11:48 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.803203] ================================================================== [ 18.803274] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.803335] Read of size 1 at addr fff00000c78d32bb by task kunit_try_catch/225 [ 18.803385] [ 18.803417] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.803499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.803525] Hardware name: linux,dummy-virt (DT) [ 18.803555] Call trace: [ 18.803579] show_stack+0x20/0x38 (C) [ 18.803625] dump_stack_lvl+0x8c/0xd0 [ 18.803672] print_report+0x118/0x608 [ 18.803715] kasan_report+0xdc/0x128 [ 18.803757] __asan_report_load1_noabort+0x20/0x30 [ 18.803805] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.803851] mempool_slab_oob_right+0xc0/0x118 [ 18.803896] kunit_try_run_case+0x170/0x3f0 [ 18.803940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.803988] kthread+0x328/0x630 [ 18.804030] ret_from_fork+0x10/0x20 [ 18.804107] [ 18.804781] Allocated by task 225: [ 18.804902] kasan_save_stack+0x3c/0x68 [ 18.804952] kasan_save_track+0x20/0x40 [ 18.804994] kasan_save_alloc_info+0x40/0x58 [ 18.805084] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.805128] remove_element+0x16c/0x1f8 [ 18.805199] mempool_alloc_preallocated+0x58/0xc0 [ 18.805302] mempool_oob_right_helper+0x98/0x2f0 [ 18.805346] mempool_slab_oob_right+0xc0/0x118 [ 18.805383] kunit_try_run_case+0x170/0x3f0 [ 18.805418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.805458] kthread+0x328/0x630 [ 18.805491] ret_from_fork+0x10/0x20 [ 18.805532] [ 18.805563] The buggy address belongs to the object at fff00000c78d3240 [ 18.805563] which belongs to the cache test_cache of size 123 [ 18.805657] The buggy address is located 0 bytes to the right of [ 18.805657] allocated 123-byte region [fff00000c78d3240, fff00000c78d32bb) [ 18.805722] [ 18.805744] The buggy address belongs to the physical page: [ 18.805774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3 [ 18.805823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.805870] page_type: f5(slab) [ 18.805917] raw: 0bfffe0000000000 fff00000c5d1e280 dead000000000122 0000000000000000 [ 18.805965] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.806399] page dumped because: kasan: bad access detected [ 18.806437] [ 18.806535] Memory state around the buggy address: [ 18.806575] fff00000c78d3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.806643] fff00000c78d3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.806684] >fff00000c78d3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.806784] ^ [ 18.806826] fff00000c78d3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.806903] fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.806940] ================================================================== [ 18.788949] ================================================================== [ 18.789381] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.789472] Read of size 1 at addr fff00000c79e6001 by task kunit_try_catch/223 [ 18.789523] [ 18.789634] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.789730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.789758] Hardware name: linux,dummy-virt (DT) [ 18.789802] Call trace: [ 18.789834] show_stack+0x20/0x38 (C) [ 18.789993] dump_stack_lvl+0x8c/0xd0 [ 18.790159] print_report+0x118/0x608 [ 18.790222] kasan_report+0xdc/0x128 [ 18.790279] __asan_report_load1_noabort+0x20/0x30 [ 18.790329] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.790375] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.790623] kunit_try_run_case+0x170/0x3f0 [ 18.790823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.790958] kthread+0x328/0x630 [ 18.791164] ret_from_fork+0x10/0x20 [ 18.791268] [ 18.791307] The buggy address belongs to the physical page: [ 18.791343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 18.791398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.791442] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.791497] page_type: f8(unknown) [ 18.791540] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.791588] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.791634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.791681] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.791728] head: 0bfffe0000000002 ffffc1ffc31e7901 00000000ffffffff 00000000ffffffff [ 18.791773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.791955] page dumped because: kasan: bad access detected [ 18.791989] [ 18.792010] Memory state around the buggy address: [ 18.792050] fff00000c79e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.793439] fff00000c79e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.793686] >fff00000c79e6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.793849] ^ [ 18.794007] fff00000c79e6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.794096] fff00000c79e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.794134] ================================================================== [ 18.764536] ================================================================== [ 18.764631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.764729] Read of size 1 at addr fff00000c6370b73 by task kunit_try_catch/221 [ 18.764781] [ 18.764826] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 18.764917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.764946] Hardware name: linux,dummy-virt (DT) [ 18.764981] Call trace: [ 18.765006] show_stack+0x20/0x38 (C) [ 18.765078] dump_stack_lvl+0x8c/0xd0 [ 18.765135] print_report+0x118/0x608 [ 18.765182] kasan_report+0xdc/0x128 [ 18.765225] __asan_report_load1_noabort+0x20/0x30 [ 18.765275] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.765319] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.765364] kunit_try_run_case+0x170/0x3f0 [ 18.765410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.765460] kthread+0x328/0x630 [ 18.765506] ret_from_fork+0x10/0x20 [ 18.765556] [ 18.765575] Allocated by task 221: [ 18.765603] kasan_save_stack+0x3c/0x68 [ 18.765646] kasan_save_track+0x20/0x40 [ 18.765681] kasan_save_alloc_info+0x40/0x58 [ 18.765720] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.765759] remove_element+0x130/0x1f8 [ 18.765799] mempool_alloc_preallocated+0x58/0xc0 [ 18.765837] mempool_oob_right_helper+0x98/0x2f0 [ 18.765873] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.765929] kunit_try_run_case+0x170/0x3f0 [ 18.765968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.766006] kthread+0x328/0x630 [ 18.766050] ret_from_fork+0x10/0x20 [ 18.766088] [ 18.766125] The buggy address belongs to the object at fff00000c6370b00 [ 18.766125] which belongs to the cache kmalloc-128 of size 128 [ 18.766183] The buggy address is located 0 bytes to the right of [ 18.766183] allocated 115-byte region [fff00000c6370b00, fff00000c6370b73) [ 18.766242] [ 18.766267] The buggy address belongs to the physical page: [ 18.766301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370 [ 18.766356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.766409] page_type: f5(slab) [ 18.766452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.766501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.766540] page dumped because: kasan: bad access detected [ 18.766581] [ 18.766600] Memory state around the buggy address: [ 18.766634] fff00000c6370a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.766676] fff00000c6370a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.766716] >fff00000c6370b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.766752] ^ [ 18.766790] fff00000c6370b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.766830] fff00000c6370c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.766866] ==================================================================
[ 18.306218] ================================================================== [ 18.306683] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 18.307407] Read of size 1 at addr ffff888102b42c73 by task kunit_try_catch/238 [ 18.307834] [ 18.307941] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 18.308004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.308018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.308046] Call Trace: [ 18.308063] <TASK> [ 18.308088] dump_stack_lvl+0x73/0xb0 [ 18.308128] print_report+0xd1/0x650 [ 18.308155] ? __virt_addr_valid+0x1db/0x2d0 [ 18.308181] ? mempool_oob_right_helper+0x318/0x380 [ 18.308206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.308230] ? mempool_oob_right_helper+0x318/0x380 [ 18.308255] kasan_report+0x141/0x180 [ 18.308295] ? mempool_oob_right_helper+0x318/0x380 [ 18.308324] __asan_report_load1_noabort+0x18/0x20 [ 18.308346] mempool_oob_right_helper+0x318/0x380 [ 18.308372] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 18.308396] ? update_load_avg+0x1be/0x21b0 [ 18.308422] ? dequeue_entities+0x27e/0x1740 [ 18.308449] ? finish_task_switch.isra.0+0x153/0x700 [ 18.308475] mempool_kmalloc_oob_right+0xf2/0x150 [ 18.308524] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 18.308553] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.308575] ? __pfx_mempool_kfree+0x10/0x10 [ 18.308597] ? __pfx_read_tsc+0x10/0x10 [ 18.308620] ? ktime_get_ts64+0x86/0x230 [ 18.308646] kunit_try_run_case+0x1a5/0x480 [ 18.308673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.308696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.308721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.308744] ? __kthread_parkme+0x82/0x180 [ 18.308766] ? preempt_count_sub+0x50/0x80 [ 18.308789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.308813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.308859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.308883] kthread+0x337/0x6f0 [ 18.308904] ? trace_preempt_on+0x20/0xc0 [ 18.308931] ? __pfx_kthread+0x10/0x10 [ 18.308952] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.308972] ? calculate_sigpending+0x7b/0xa0 [ 18.308999] ? __pfx_kthread+0x10/0x10 [ 18.309021] ret_from_fork+0x116/0x1d0 [ 18.309041] ? __pfx_kthread+0x10/0x10 [ 18.309064] ret_from_fork_asm+0x1a/0x30 [ 18.309154] </TASK> [ 18.309169] [ 18.318110] Allocated by task 238: [ 18.318505] kasan_save_stack+0x45/0x70 [ 18.318707] kasan_save_track+0x18/0x40 [ 18.318947] kasan_save_alloc_info+0x3b/0x50 [ 18.319168] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 18.319370] remove_element+0x11e/0x190 [ 18.319724] mempool_alloc_preallocated+0x4d/0x90 [ 18.319896] mempool_oob_right_helper+0x8a/0x380 [ 18.320023] mempool_kmalloc_oob_right+0xf2/0x150 [ 18.320388] kunit_try_run_case+0x1a5/0x480 [ 18.320747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.321084] kthread+0x337/0x6f0 [ 18.321367] ret_from_fork+0x116/0x1d0 [ 18.321592] ret_from_fork_asm+0x1a/0x30 [ 18.321787] [ 18.321950] The buggy address belongs to the object at ffff888102b42c00 [ 18.321950] which belongs to the cache kmalloc-128 of size 128 [ 18.322723] The buggy address is located 0 bytes to the right of [ 18.322723] allocated 115-byte region [ffff888102b42c00, ffff888102b42c73) [ 18.323294] [ 18.323380] The buggy address belongs to the physical page: [ 18.323723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b42 [ 18.324193] flags: 0x200000000000000(node=0|zone=2) [ 18.324471] page_type: f5(slab) [ 18.324670] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.325026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.325536] page dumped because: kasan: bad access detected [ 18.325680] [ 18.325832] Memory state around the buggy address: [ 18.326226] ffff888102b42b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.326468] ffff888102b42b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.326837] >ffff888102b42c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.327494] ^ [ 18.327828] ffff888102b42c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.328073] ffff888102b42d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.328535] ================================================================== [ 18.334876] ================================================================== [ 18.335410] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 18.335615] Read of size 1 at addr ffff888102cd6001 by task kunit_try_catch/240 [ 18.336493] [ 18.336703] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 18.336776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.336790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.336819] Call Trace: [ 18.336836] <TASK> [ 18.336860] dump_stack_lvl+0x73/0xb0 [ 18.336912] print_report+0xd1/0x650 [ 18.336943] ? __virt_addr_valid+0x1db/0x2d0 [ 18.337066] ? mempool_oob_right_helper+0x318/0x380 [ 18.337105] ? kasan_addr_to_slab+0x11/0xa0 [ 18.337130] ? mempool_oob_right_helper+0x318/0x380 [ 18.337157] kasan_report+0x141/0x180 [ 18.337185] ? mempool_oob_right_helper+0x318/0x380 [ 18.337268] __asan_report_load1_noabort+0x18/0x20 [ 18.337297] mempool_oob_right_helper+0x318/0x380 [ 18.337325] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 18.337354] ? __pfx_sched_clock_cpu+0x10/0x10 [ 18.337381] ? finish_task_switch.isra.0+0x153/0x700 [ 18.337410] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 18.337437] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 18.337468] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.337492] ? __pfx_mempool_kfree+0x10/0x10 [ 18.337515] ? __pfx_read_tsc+0x10/0x10 [ 18.337539] ? ktime_get_ts64+0x86/0x230 [ 18.337566] kunit_try_run_case+0x1a5/0x480 [ 18.337595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.337619] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.337650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.337679] ? __kthread_parkme+0x82/0x180 [ 18.337734] ? preempt_count_sub+0x50/0x80 [ 18.337759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.337786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.337815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.337840] kthread+0x337/0x6f0 [ 18.337863] ? trace_preempt_on+0x20/0xc0 [ 18.337890] ? __pfx_kthread+0x10/0x10 [ 18.337914] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.337939] ? calculate_sigpending+0x7b/0xa0 [ 18.337968] ? __pfx_kthread+0x10/0x10 [ 18.337991] ret_from_fork+0x116/0x1d0 [ 18.338013] ? __pfx_kthread+0x10/0x10 [ 18.338036] ret_from_fork_asm+0x1a/0x30 [ 18.338339] </TASK> [ 18.338369] [ 18.348529] The buggy address belongs to the physical page: [ 18.348843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cd4 [ 18.349305] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.349748] flags: 0x200000000000040(head|node=0|zone=2) [ 18.349976] page_type: f8(unknown) [ 18.350202] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.350902] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.351358] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.351682] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.352153] head: 0200000000000002 ffffea00040b3501 00000000ffffffff 00000000ffffffff [ 18.352342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.352776] page dumped because: kasan: bad access detected [ 18.352986] [ 18.353175] Memory state around the buggy address: [ 18.353368] ffff888102cd5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.353732] ffff888102cd5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.353948] >ffff888102cd6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.354600] ^ [ 18.354827] ffff888102cd6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.355302] ffff888102cd6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.355509] ================================================================== [ 18.362193] ================================================================== [ 18.362736] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 18.362940] Read of size 1 at addr ffff8881023232bb by task kunit_try_catch/242 [ 18.363509] [ 18.363602] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 18.363666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.363681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.363710] Call Trace: [ 18.363725] <TASK> [ 18.363748] dump_stack_lvl+0x73/0xb0 [ 18.363788] print_report+0xd1/0x650 [ 18.363817] ? __virt_addr_valid+0x1db/0x2d0 [ 18.363846] ? mempool_oob_right_helper+0x318/0x380 [ 18.363871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.363894] ? mempool_oob_right_helper+0x318/0x380 [ 18.363919] kasan_report+0x141/0x180 [ 18.363943] ? mempool_oob_right_helper+0x318/0x380 [ 18.363995] __asan_report_load1_noabort+0x18/0x20 [ 18.364136] mempool_oob_right_helper+0x318/0x380 [ 18.364172] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 18.364203] ? __pfx_sched_clock_cpu+0x10/0x10 [ 18.364231] ? finish_task_switch.isra.0+0x153/0x700 [ 18.364270] mempool_slab_oob_right+0xed/0x140 [ 18.364301] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 18.364331] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 18.364354] ? __pfx_mempool_free_slab+0x10/0x10 [ 18.364378] ? __pfx_read_tsc+0x10/0x10 [ 18.364402] ? ktime_get_ts64+0x86/0x230 [ 18.364430] kunit_try_run_case+0x1a5/0x480 [ 18.364459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.364483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.364513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.364538] ? __kthread_parkme+0x82/0x180 [ 18.364562] ? preempt_count_sub+0x50/0x80 [ 18.364588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.364644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.364681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.364709] kthread+0x337/0x6f0 [ 18.364731] ? trace_preempt_on+0x20/0xc0 [ 18.364760] ? __pfx_kthread+0x10/0x10 [ 18.364783] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.364809] ? calculate_sigpending+0x7b/0xa0 [ 18.364837] ? __pfx_kthread+0x10/0x10 [ 18.364860] ret_from_fork+0x116/0x1d0 [ 18.364882] ? __pfx_kthread+0x10/0x10 [ 18.364996] ret_from_fork_asm+0x1a/0x30 [ 18.365040] </TASK> [ 18.365057] [ 18.371031] Allocated by task 242: [ 18.371327] kasan_save_stack+0x45/0x70 [ 18.371649] kasan_save_track+0x18/0x40 [ 18.371972] kasan_save_alloc_info+0x3b/0x50 [ 18.372305] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 18.372440] remove_element+0x11e/0x190 [ 18.372545] mempool_alloc_preallocated+0x4d/0x90 [ 18.372682] mempool_oob_right_helper+0x8a/0x380 [ 18.372806] mempool_slab_oob_right+0xed/0x140 [ 18.372922] kunit_try_run_case+0x1a5/0x480 [ 18.373197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.373541] kthread+0x337/0x6f0 [ 18.373797] ret_from_fork+0x116/0x1d0 [ 18.374079] ret_from_fork_asm+0x1a/0x30 [ 18.374374] [ 18.374494] The buggy address belongs to the object at ffff888102323240 [ 18.374494] which belongs to the cache test_cache of size 123 [ 18.374950] The buggy address is located 0 bytes to the right of [ 18.374950] allocated 123-byte region [ffff888102323240, ffff8881023232bb) [ 18.375480] [ 18.375625] The buggy address belongs to the physical page: [ 18.375777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102323 [ 18.375948] flags: 0x200000000000000(node=0|zone=2) [ 18.376073] page_type: f5(slab) [ 18.376174] raw: 0200000000000000 ffff888102321000 dead000000000122 0000000000000000 [ 18.376347] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.376499] page dumped because: kasan: bad access detected [ 18.376616] [ 18.376700] Memory state around the buggy address: [ 18.376989] ffff888102323180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.377432] ffff888102323200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.377958] >ffff888102323280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.378285] ^ [ 18.378401] ffff888102323300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378541] ffff888102323380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.378707] ==================================================================