Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 35.759456] ================================================================== [ 35.759638] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.759771] Read of size 1 at addr ffff000801aa0573 by task kunit_try_catch/265 [ 35.766172] [ 35.767659] CPU: 7 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 35.767718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.767734] Hardware name: WinLink E850-96 board (DT) [ 35.767755] Call trace: [ 35.767768] show_stack+0x20/0x38 (C) [ 35.767808] dump_stack_lvl+0x8c/0xd0 [ 35.767849] print_report+0x118/0x608 [ 35.767884] kasan_report+0xdc/0x128 [ 35.767917] __asan_report_load1_noabort+0x20/0x30 [ 35.767947] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.767979] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.768010] kunit_try_run_case+0x170/0x3f0 [ 35.768048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.768086] kthread+0x328/0x630 [ 35.768117] ret_from_fork+0x10/0x20 [ 35.768151] [ 35.836571] Allocated by task 265: [ 35.839959] kasan_save_stack+0x3c/0x68 [ 35.843774] kasan_save_track+0x20/0x40 [ 35.847594] kasan_save_alloc_info+0x40/0x58 [ 35.851847] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.857142] remove_element+0x130/0x1f8 [ 35.860961] mempool_alloc_preallocated+0x58/0xc0 [ 35.865651] mempool_oob_right_helper+0x98/0x2f0 [ 35.870249] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.874937] kunit_try_run_case+0x170/0x3f0 [ 35.879104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.884572] kthread+0x328/0x630 [ 35.887784] ret_from_fork+0x10/0x20 [ 35.891343] [ 35.892820] The buggy address belongs to the object at ffff000801aa0500 [ 35.892820] which belongs to the cache kmalloc-128 of size 128 [ 35.905322] The buggy address is located 0 bytes to the right of [ 35.905322] allocated 115-byte region [ffff000801aa0500, ffff000801aa0573) [ 35.918252] [ 35.919730] The buggy address belongs to the physical page: [ 35.925289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881aa0 [ 35.933271] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.940911] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.947854] page_type: f5(slab) [ 35.950991] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.958710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.966439] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 35.974248] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.982060] head: 0bfffe0000000001 fffffdffe006a801 00000000ffffffff 00000000ffffffff [ 35.989872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.997678] page dumped because: kasan: bad access detected [ 36.003235] [ 36.004709] Memory state around the buggy address: [ 36.009492] ffff000801aa0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.016692] ffff000801aa0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.023898] >ffff000801aa0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.031098] ^ [ 36.037959] ffff000801aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.045165] ffff000801aa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.052365] ================================================================== [ 36.296020] ================================================================== [ 36.305752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.313300] Read of size 1 at addr ffff0008061512bb by task kunit_try_catch/269 [ 36.320592] [ 36.322078] CPU: 4 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 36.322139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.322158] Hardware name: WinLink E850-96 board (DT) [ 36.322180] Call trace: [ 36.322193] show_stack+0x20/0x38 (C) [ 36.322230] dump_stack_lvl+0x8c/0xd0 [ 36.322267] print_report+0x118/0x608 [ 36.322305] kasan_report+0xdc/0x128 [ 36.322338] __asan_report_load1_noabort+0x20/0x30 [ 36.322371] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.322402] mempool_slab_oob_right+0xc0/0x118 [ 36.322435] kunit_try_run_case+0x170/0x3f0 [ 36.322473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.322511] kthread+0x328/0x630 [ 36.322538] ret_from_fork+0x10/0x20 [ 36.322575] [ 36.390728] Allocated by task 269: [ 36.394117] kasan_save_stack+0x3c/0x68 [ 36.397933] kasan_save_track+0x20/0x40 [ 36.401752] kasan_save_alloc_info+0x40/0x58 [ 36.406005] __kasan_mempool_unpoison_object+0xbc/0x180 [ 36.411215] remove_element+0x16c/0x1f8 [ 36.415033] mempool_alloc_preallocated+0x58/0xc0 [ 36.419721] mempool_oob_right_helper+0x98/0x2f0 [ 36.424321] mempool_slab_oob_right+0xc0/0x118 [ 36.428748] kunit_try_run_case+0x170/0x3f0 [ 36.432915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.438384] kthread+0x328/0x630 [ 36.441595] ret_from_fork+0x10/0x20 [ 36.445154] [ 36.446633] The buggy address belongs to the object at ffff000806151240 [ 36.446633] which belongs to the cache test_cache of size 123 [ 36.459046] The buggy address is located 0 bytes to the right of [ 36.459046] allocated 123-byte region [ffff000806151240, ffff0008061512bb) [ 36.471977] [ 36.473455] The buggy address belongs to the physical page: [ 36.479012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886151 [ 36.486998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.493506] page_type: f5(slab) [ 36.496643] raw: 0bfffe0000000000 ffff000801de7900 dead000000000122 0000000000000000 [ 36.504362] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.512082] page dumped because: kasan: bad access detected [ 36.517637] [ 36.519111] Memory state around the buggy address: [ 36.523895] ffff000806151180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.531094] ffff000806151200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.538300] >ffff000806151280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.545500] ^ [ 36.550538] ffff000806151300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.557743] ffff000806151380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.564944] ================================================================== [ 36.061524] ================================================================== [ 36.071294] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 36.078842] Read of size 1 at addr ffff000804b16001 by task kunit_try_catch/267 [ 36.086132] [ 36.087619] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 36.087679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.087695] Hardware name: WinLink E850-96 board (DT) [ 36.087716] Call trace: [ 36.087728] show_stack+0x20/0x38 (C) [ 36.087764] dump_stack_lvl+0x8c/0xd0 [ 36.087801] print_report+0x118/0x608 [ 36.087839] kasan_report+0xdc/0x128 [ 36.087870] __asan_report_load1_noabort+0x20/0x30 [ 36.087902] mempool_oob_right_helper+0x2ac/0x2f0 [ 36.087936] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 36.087969] kunit_try_run_case+0x170/0x3f0 [ 36.088006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.088045] kthread+0x328/0x630 [ 36.088075] ret_from_fork+0x10/0x20 [ 36.088112] [ 36.157055] The buggy address belongs to the physical page: [ 36.162611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14 [ 36.170593] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.178235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.185176] page_type: f8(unknown) [ 36.188571] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.196293] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.204020] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.211831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.219643] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff [ 36.227455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.235261] page dumped because: kasan: bad access detected [ 36.240818] [ 36.242292] Memory state around the buggy address: [ 36.247074] ffff000804b15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.254275] ffff000804b15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.261482] >ffff000804b16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.268681] ^ [ 36.271896] ffff000804b16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.279101] ffff000804b16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.286303] ==================================================================
[ 27.731935] ================================================================== [ 27.732032] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 27.732129] Read of size 1 at addr fff00000c61c8f73 by task kunit_try_catch/222 [ 27.732192] [ 27.732243] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.732349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.732383] Hardware name: linux,dummy-virt (DT) [ 27.732424] Call trace: [ 27.732452] show_stack+0x20/0x38 (C) [ 27.732521] dump_stack_lvl+0x8c/0xd0 [ 27.732590] print_report+0x118/0x608 [ 27.732648] kasan_report+0xdc/0x128 [ 27.732729] __asan_report_load1_noabort+0x20/0x30 [ 27.732792] mempool_oob_right_helper+0x2ac/0x2f0 [ 27.732855] mempool_kmalloc_oob_right+0xc4/0x120 [ 27.732917] kunit_try_run_case+0x170/0x3f0 [ 27.732981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.733050] kthread+0x328/0x630 [ 27.733104] ret_from_fork+0x10/0x20 [ 27.733165] [ 27.733187] Allocated by task 222: [ 27.733227] kasan_save_stack+0x3c/0x68 [ 27.733297] kasan_save_track+0x20/0x40 [ 27.733349] kasan_save_alloc_info+0x40/0x58 [ 27.733395] __kasan_mempool_unpoison_object+0x11c/0x180 [ 27.733451] remove_element+0x130/0x1f8 [ 27.733502] mempool_alloc_preallocated+0x58/0xc0 [ 27.733551] mempool_oob_right_helper+0x98/0x2f0 [ 27.733600] mempool_kmalloc_oob_right+0xc4/0x120 [ 27.733647] kunit_try_run_case+0x170/0x3f0 [ 27.733711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.733770] kthread+0x328/0x630 [ 27.733814] ret_from_fork+0x10/0x20 [ 27.733864] [ 27.733889] The buggy address belongs to the object at fff00000c61c8f00 [ 27.733889] which belongs to the cache kmalloc-128 of size 128 [ 27.733961] The buggy address is located 0 bytes to the right of [ 27.733961] allocated 115-byte region [fff00000c61c8f00, fff00000c61c8f73) [ 27.734037] [ 27.734065] The buggy address belongs to the physical page: [ 27.734104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c8 [ 27.734172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.734236] page_type: f5(slab) [ 27.734286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 27.734349] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 27.734399] page dumped because: kasan: bad access detected [ 27.734438] [ 27.734459] Memory state around the buggy address: [ 27.734500] fff00000c61c8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.734554] fff00000c61c8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734606] >fff00000c61c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.734745] ^ [ 27.734857] fff00000c61c8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734966] fff00000c61c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.735061] ================================================================== [ 27.764705] ================================================================== [ 27.764846] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 27.765003] Read of size 1 at addr fff00000c78ce001 by task kunit_try_catch/224 [ 27.765262] [ 27.765430] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.765832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.765978] Hardware name: linux,dummy-virt (DT) [ 27.766067] Call trace: [ 27.766128] show_stack+0x20/0x38 (C) [ 27.766262] dump_stack_lvl+0x8c/0xd0 [ 27.766382] print_report+0x118/0x608 [ 27.766512] kasan_report+0xdc/0x128 [ 27.766805] __asan_report_load1_noabort+0x20/0x30 [ 27.766953] mempool_oob_right_helper+0x2ac/0x2f0 [ 27.767096] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 27.767287] kunit_try_run_case+0x170/0x3f0 [ 27.767432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.767590] kthread+0x328/0x630 [ 27.767732] ret_from_fork+0x10/0x20 [ 27.767907] [ 27.767964] The buggy address belongs to the physical page: [ 27.768051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cc [ 27.768229] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.768399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 27.768746] page_type: f8(unknown) [ 27.768847] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.768971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.769094] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.769326] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 27.769615] head: 0bfffe0000000002 ffffc1ffc31e3301 00000000ffffffff 00000000ffffffff [ 27.769761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.769872] page dumped because: kasan: bad access detected [ 27.769964] [ 27.770018] Memory state around the buggy address: [ 27.770111] fff00000c78cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.770221] fff00000c78cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.770338] >fff00000c78ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.770437] ^ [ 27.770508] fff00000c78ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.770723] fff00000c78ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.770811] ================================================================== [ 27.801156] ================================================================== [ 27.801331] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 27.801481] Read of size 1 at addr fff00000c78b42bb by task kunit_try_catch/226 [ 27.801597] [ 27.801708] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.801932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.802013] Hardware name: linux,dummy-virt (DT) [ 27.802106] Call trace: [ 27.802179] show_stack+0x20/0x38 (C) [ 27.802316] dump_stack_lvl+0x8c/0xd0 [ 27.802458] print_report+0x118/0x608 [ 27.802595] kasan_report+0xdc/0x128 [ 27.802948] __asan_report_load1_noabort+0x20/0x30 [ 27.803088] mempool_oob_right_helper+0x2ac/0x2f0 [ 27.803284] mempool_slab_oob_right+0xc0/0x118 [ 27.803460] kunit_try_run_case+0x170/0x3f0 [ 27.804674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.805008] kthread+0x328/0x630 [ 27.805155] ret_from_fork+0x10/0x20 [ 27.806023] [ 27.806564] Allocated by task 226: [ 27.807289] kasan_save_stack+0x3c/0x68 [ 27.807788] kasan_save_track+0x20/0x40 [ 27.808494] kasan_save_alloc_info+0x40/0x58 [ 27.808948] __kasan_mempool_unpoison_object+0xbc/0x180 [ 27.809437] remove_element+0x16c/0x1f8 [ 27.809630] mempool_alloc_preallocated+0x58/0xc0 [ 27.810945] mempool_oob_right_helper+0x98/0x2f0 [ 27.811105] mempool_slab_oob_right+0xc0/0x118 [ 27.811237] kunit_try_run_case+0x170/0x3f0 [ 27.811473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.811811] kthread+0x328/0x630 [ 27.812093] ret_from_fork+0x10/0x20 [ 27.812189] [ 27.813129] The buggy address belongs to the object at fff00000c78b4240 [ 27.813129] which belongs to the cache test_cache of size 123 [ 27.814186] The buggy address is located 0 bytes to the right of [ 27.814186] allocated 123-byte region [fff00000c78b4240, fff00000c78b42bb) [ 27.814338] [ 27.814391] The buggy address belongs to the physical page: [ 27.814467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4 [ 27.814592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.816128] page_type: f5(slab) [ 27.816284] raw: 0bfffe0000000000 fff00000c56eb140 dead000000000122 0000000000000000 [ 27.816417] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 27.817793] page dumped because: kasan: bad access detected [ 27.818335] [ 27.818461] Memory state around the buggy address: [ 27.818541] fff00000c78b4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.818653] fff00000c78b4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 27.818776] >fff00000c78b4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 27.820176] ^ [ 27.820257] fff00000c78b4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.820361] fff00000c78b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.820455] ==================================================================
[ 20.434859] ================================================================== [ 20.436023] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 20.437738] Read of size 1 at addr ffff8881022e02bb by task kunit_try_catch/242 [ 20.438575] [ 20.439375] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.439476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.439495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.439528] Call Trace: [ 20.439547] <TASK> [ 20.439571] dump_stack_lvl+0x73/0xb0 [ 20.439612] print_report+0xd1/0x650 [ 20.439646] ? __virt_addr_valid+0x1db/0x2d0 [ 20.439680] ? mempool_oob_right_helper+0x318/0x380 [ 20.439752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.439788] ? mempool_oob_right_helper+0x318/0x380 [ 20.439823] kasan_report+0x141/0x180 [ 20.439854] ? mempool_oob_right_helper+0x318/0x380 [ 20.439894] __asan_report_load1_noabort+0x18/0x20 [ 20.439922] mempool_oob_right_helper+0x318/0x380 [ 20.439958] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 20.440029] mempool_slab_oob_right+0xed/0x140 [ 20.440060] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 20.440094] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 20.440126] ? __pfx_mempool_free_slab+0x10/0x10 [ 20.440157] ? __pfx_read_tsc+0x10/0x10 [ 20.440228] ? ktime_get_ts64+0x86/0x230 [ 20.440303] kunit_try_run_case+0x1a5/0x480 [ 20.440342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.440371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.440407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.440444] ? __kthread_parkme+0x82/0x180 [ 20.440474] ? preempt_count_sub+0x50/0x80 [ 20.440507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.440536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.440571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.440607] kthread+0x337/0x6f0 [ 20.440634] ? trace_preempt_on+0x20/0xc0 [ 20.440667] ? __pfx_kthread+0x10/0x10 [ 20.440731] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.440768] ? calculate_sigpending+0x7b/0xa0 [ 20.440805] ? __pfx_kthread+0x10/0x10 [ 20.440835] ret_from_fork+0x116/0x1d0 [ 20.440863] ? __pfx_kthread+0x10/0x10 [ 20.440892] ret_from_fork_asm+0x1a/0x30 [ 20.440935] </TASK> [ 20.440950] [ 20.459041] Allocated by task 242: [ 20.459458] kasan_save_stack+0x45/0x70 [ 20.459796] kasan_save_track+0x18/0x40 [ 20.460514] kasan_save_alloc_info+0x3b/0x50 [ 20.460949] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 20.461664] remove_element+0x11e/0x190 [ 20.462339] mempool_alloc_preallocated+0x4d/0x90 [ 20.462901] mempool_oob_right_helper+0x8a/0x380 [ 20.463597] mempool_slab_oob_right+0xed/0x140 [ 20.464140] kunit_try_run_case+0x1a5/0x480 [ 20.464749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.465454] kthread+0x337/0x6f0 [ 20.465868] ret_from_fork+0x116/0x1d0 [ 20.466380] ret_from_fork_asm+0x1a/0x30 [ 20.466835] [ 20.467086] The buggy address belongs to the object at ffff8881022e0240 [ 20.467086] which belongs to the cache test_cache of size 123 [ 20.468140] The buggy address is located 0 bytes to the right of [ 20.468140] allocated 123-byte region [ffff8881022e0240, ffff8881022e02bb) [ 20.469593] [ 20.469864] The buggy address belongs to the physical page: [ 20.470467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0 [ 20.471519] flags: 0x200000000000000(node=0|zone=2) [ 20.472043] page_type: f5(slab) [ 20.472595] raw: 0200000000000000 ffff8881022d3500 dead000000000122 0000000000000000 [ 20.473515] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.474322] page dumped because: kasan: bad access detected [ 20.474838] [ 20.475121] Memory state around the buggy address: [ 20.475705] ffff8881022e0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.476510] ffff8881022e0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.477447] >ffff8881022e0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.477937] ^ [ 20.478283] ffff8881022e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.479288] ffff8881022e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.479815] ================================================================== [ 20.322552] ================================================================== [ 20.323525] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 20.325146] Read of size 1 at addr ffff8881022c3d73 by task kunit_try_catch/238 [ 20.326213] [ 20.326737] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.326926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.327000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.327069] Call Trace: [ 20.327159] <TASK> [ 20.327216] dump_stack_lvl+0x73/0xb0 [ 20.327310] print_report+0xd1/0x650 [ 20.327395] ? __virt_addr_valid+0x1db/0x2d0 [ 20.327479] ? mempool_oob_right_helper+0x318/0x380 [ 20.327524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.327559] ? mempool_oob_right_helper+0x318/0x380 [ 20.327595] kasan_report+0x141/0x180 [ 20.327629] ? mempool_oob_right_helper+0x318/0x380 [ 20.327672] __asan_report_load1_noabort+0x18/0x20 [ 20.327717] mempool_oob_right_helper+0x318/0x380 [ 20.327772] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 20.327811] ? __kasan_check_write+0x18/0x20 [ 20.327840] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.327876] ? finish_task_switch.isra.0+0x153/0x700 [ 20.327913] mempool_kmalloc_oob_right+0xf2/0x150 [ 20.327949] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 20.328032] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.328092] ? __pfx_mempool_kfree+0x10/0x10 [ 20.328145] ? __pfx_read_tsc+0x10/0x10 [ 20.328223] ? ktime_get_ts64+0x86/0x230 [ 20.328306] kunit_try_run_case+0x1a5/0x480 [ 20.328344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.328373] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.328413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.328449] ? __kthread_parkme+0x82/0x180 [ 20.328479] ? preempt_count_sub+0x50/0x80 [ 20.328513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.328543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.328578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.328613] kthread+0x337/0x6f0 [ 20.328641] ? trace_preempt_on+0x20/0xc0 [ 20.328674] ? __pfx_kthread+0x10/0x10 [ 20.328732] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.328770] ? calculate_sigpending+0x7b/0xa0 [ 20.328807] ? __pfx_kthread+0x10/0x10 [ 20.328838] ret_from_fork+0x116/0x1d0 [ 20.328864] ? __pfx_kthread+0x10/0x10 [ 20.328892] ret_from_fork_asm+0x1a/0x30 [ 20.328936] </TASK> [ 20.328952] [ 20.351470] Allocated by task 238: [ 20.351783] kasan_save_stack+0x45/0x70 [ 20.352141] kasan_save_track+0x18/0x40 [ 20.353300] kasan_save_alloc_info+0x3b/0x50 [ 20.353788] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 20.354592] remove_element+0x11e/0x190 [ 20.355046] mempool_alloc_preallocated+0x4d/0x90 [ 20.355601] mempool_oob_right_helper+0x8a/0x380 [ 20.356686] mempool_kmalloc_oob_right+0xf2/0x150 [ 20.357131] kunit_try_run_case+0x1a5/0x480 [ 20.357648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.358629] kthread+0x337/0x6f0 [ 20.359041] ret_from_fork+0x116/0x1d0 [ 20.359458] ret_from_fork_asm+0x1a/0x30 [ 20.359850] [ 20.360111] The buggy address belongs to the object at ffff8881022c3d00 [ 20.360111] which belongs to the cache kmalloc-128 of size 128 [ 20.361703] The buggy address is located 0 bytes to the right of [ 20.361703] allocated 115-byte region [ffff8881022c3d00, ffff8881022c3d73) [ 20.363127] [ 20.363434] The buggy address belongs to the physical page: [ 20.364178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c3 [ 20.364815] flags: 0x200000000000000(node=0|zone=2) [ 20.365991] page_type: f5(slab) [ 20.366751] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.367442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.367990] page dumped because: kasan: bad access detected [ 20.368410] [ 20.368954] Memory state around the buggy address: [ 20.369438] ffff8881022c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.370503] ffff8881022c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.371601] >ffff8881022c3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.372405] ^ [ 20.373466] ffff8881022c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.374583] ffff8881022c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.375163] ================================================================== [ 20.381771] ================================================================== [ 20.382753] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 20.383381] Read of size 1 at addr ffff888102cd6001 by task kunit_try_catch/240 [ 20.383947] [ 20.384992] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.385128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.385288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.385359] Call Trace: [ 20.385403] <TASK> [ 20.385452] dump_stack_lvl+0x73/0xb0 [ 20.385536] print_report+0xd1/0x650 [ 20.385616] ? __virt_addr_valid+0x1db/0x2d0 [ 20.385678] ? mempool_oob_right_helper+0x318/0x380 [ 20.385776] ? kasan_addr_to_slab+0x11/0xa0 [ 20.385811] ? mempool_oob_right_helper+0x318/0x380 [ 20.385848] kasan_report+0x141/0x180 [ 20.385880] ? mempool_oob_right_helper+0x318/0x380 [ 20.385921] __asan_report_load1_noabort+0x18/0x20 [ 20.385951] mempool_oob_right_helper+0x318/0x380 [ 20.386016] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 20.386054] ? update_load_avg+0x1be/0x21b0 [ 20.386090] ? dequeue_entities+0x27e/0x1740 [ 20.386127] ? finish_task_switch.isra.0+0x153/0x700 [ 20.386167] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 20.386298] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 20.386347] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.386378] ? __pfx_mempool_kfree+0x10/0x10 [ 20.386409] ? __pfx_read_tsc+0x10/0x10 [ 20.386440] ? ktime_get_ts64+0x86/0x230 [ 20.386474] kunit_try_run_case+0x1a5/0x480 [ 20.386507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.386533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.386570] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.386606] ? __kthread_parkme+0x82/0x180 [ 20.386635] ? preempt_count_sub+0x50/0x80 [ 20.386667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.386731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.386774] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.386811] kthread+0x337/0x6f0 [ 20.386838] ? trace_preempt_on+0x20/0xc0 [ 20.386872] ? __pfx_kthread+0x10/0x10 [ 20.386902] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.386934] ? calculate_sigpending+0x7b/0xa0 [ 20.386993] ? __pfx_kthread+0x10/0x10 [ 20.387030] ret_from_fork+0x116/0x1d0 [ 20.387056] ? __pfx_kthread+0x10/0x10 [ 20.387086] ret_from_fork_asm+0x1a/0x30 [ 20.387130] </TASK> [ 20.387146] [ 20.410838] The buggy address belongs to the physical page: [ 20.411929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cd4 [ 20.412848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.413954] flags: 0x200000000000040(head|node=0|zone=2) [ 20.414727] page_type: f8(unknown) [ 20.415745] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.416733] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.417642] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.418442] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.419628] head: 0200000000000002 ffffea00040b3501 00000000ffffffff 00000000ffffffff [ 20.420728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.421457] page dumped because: kasan: bad access detected [ 20.421928] [ 20.422137] Memory state around the buggy address: [ 20.422664] ffff888102cd5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.423271] ffff888102cd5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.423851] >ffff888102cd6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.424400] ^ [ 20.424766] ffff888102cd6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.425385] ffff888102cd6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.426324] ==================================================================
[ 62.754791] ================================================================== [ 62.766632] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 62.774261] Read of size 1 at addr cc8a6001 by task kunit_try_catch/275 [ 62.780914] [ 62.782409] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 62.782440] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 62.782440] Hardware name: Generic DRA74X (Flattened Device Tree) [ 62.782470] Call trace: [ 62.782470] unwind_backtrace from show_stack+0x18/0x1c [ 62.782501] show_stack from dump_stack_lvl+0x70/0x90 [ 62.782531] dump_stack_lvl from print_report+0x158/0x528 [ 62.782562] print_report from kasan_report+0xdc/0x118 [ 62.782562] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 62.782592] mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108 [ 62.782623] mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 62.782653] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.782684] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 62.782714] kthread from ret_from_fork+0x14/0x20 [ 62.782714] Exception stack(0xf23f3fb0 to 0xf23f3ff8) [ 62.782745] 3fa0: 00000000 00000000 00000000 00000000 [ 62.782745] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 62.782775] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 62.782775] [ 62.898223] The buggy address belongs to the physical page: [ 62.903839] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4 [ 62.911102] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 62.918823] flags: 0x40(head|zone=0) [ 62.922424] page_type: f8(unknown) [ 62.925842] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 62.933990] raw: 00000000 [ 62.936645] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 62.944854] head: 00000000 00000002 eebc2711 ffffffff 00000000 ffffffff 00000000 ffffffff [ 62.953094] head: 00000000 00000004 [ 62.956604] page dumped because: kasan: bad access detected [ 62.962219] [ 62.963714] Memory state around the buggy address: [ 62.968536] cc8a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.975097] cc8a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.981689] >cc8a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 62.988250] ^ [ 62.990814] cc8a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 62.997375] cc8a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.003936] ================================================================== [ 62.455444] ================================================================== [ 62.466430] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 62.474060] Read of size 1 at addr cc854573 by task kunit_try_catch/273 [ 62.480743] [ 62.482269] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 62.482299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 62.482299] Hardware name: Generic DRA74X (Flattened Device Tree) [ 62.482330] Call trace: [ 62.482330] unwind_backtrace from show_stack+0x18/0x1c [ 62.482360] show_stack from dump_stack_lvl+0x70/0x90 [ 62.482391] dump_stack_lvl from print_report+0x158/0x528 [ 62.482421] print_report from kasan_report+0xdc/0x118 [ 62.482452] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 62.482482] mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108 [ 62.482543] mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 62.482574] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.482604] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 62.482635] kthread from ret_from_fork+0x14/0x20 [ 62.482666] Exception stack(0xf23e3fb0 to 0xf23e3ff8) [ 62.482696] 3fa0: 00000000 00000000 00000000 00000000 [ 62.482696] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 62.482727] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 62.482727] [ 62.597167] Allocated by task 273: [ 62.600585] kasan_save_track+0x30/0x5c [ 62.604461] remove_element+0x180/0x264 [ 62.608337] mempool_alloc_preallocated+0x60/0x9c [ 62.613067] mempool_oob_right_helper+0x94/0x334 [ 62.617736] mempool_kmalloc_oob_right+0xbc/0x108 [ 62.622467] kunit_try_run_case+0x22c/0x5a8 [ 62.626678] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.632202] kthread+0x464/0x810 [ 62.635467] ret_from_fork+0x14/0x20 [ 62.639068] [ 62.640563] The buggy address belongs to the object at cc854500 [ 62.640563] which belongs to the cache kmalloc-128 of size 128 [ 62.652465] The buggy address is located 0 bytes to the right of [ 62.652465] allocated 115-byte region [cc854500, cc854573) [ 62.664123] [ 62.665618] The buggy address belongs to the physical page: [ 62.671234] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854 [ 62.678497] flags: 0x0(zone=0) [ 62.681579] page_type: f5(slab) [ 62.684753] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 62.692901] raw: 00000000 [ 62.695526] page dumped because: kasan: bad access detected [ 62.701141] [ 62.702636] Memory state around the buggy address: [ 62.707458] cc854400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.714050] cc854480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.720611] >cc854500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 62.727172] ^ [ 62.733398] cc854580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.739959] cc854600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 62.746551] ================================================================== [ 63.013275] ================================================================== [ 63.025604] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 63.033233] Read of size 1 at addr cc8b62bb by task kunit_try_catch/277 [ 63.039886] [ 63.041412] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 63.041442] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.041442] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.041442] Call trace: [ 63.041473] unwind_backtrace from show_stack+0x18/0x1c [ 63.041473] show_stack from dump_stack_lvl+0x70/0x90 [ 63.041503] dump_stack_lvl from print_report+0x158/0x528 [ 63.041534] print_report from kasan_report+0xdc/0x118 [ 63.041564] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 63.041595] mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100 [ 63.041625] mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 63.041625] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.041656] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.041687] kthread from ret_from_fork+0x14/0x20 [ 63.041717] Exception stack(0xf2403fb0 to 0xf2403ff8) [ 63.041717] 3fa0: 00000000 00000000 00000000 00000000 [ 63.041748] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.041748] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.041778] [ 63.155639] Allocated by task 277: [ 63.159057] kasan_save_track+0x30/0x5c [ 63.162933] __kasan_mempool_unpoison_object+0xec/0x14c [ 63.168182] remove_element+0x1d4/0x264 [ 63.172058] mempool_alloc_preallocated+0x60/0x9c [ 63.176788] mempool_oob_right_helper+0x94/0x334 [ 63.181457] mempool_slab_oob_right+0xb8/0x100 [ 63.185943] kunit_try_run_case+0x22c/0x5a8 [ 63.190155] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.195678] kthread+0x464/0x810 [ 63.198944] ret_from_fork+0x14/0x20 [ 63.202545] [ 63.204040] The buggy address belongs to the object at cc8b6240 [ 63.204040] which belongs to the cache test_cache of size 123 [ 63.215850] The buggy address is located 0 bytes to the right of [ 63.215850] allocated 123-byte region [cc8b6240, cc8b62bb) [ 63.227508] [ 63.229003] The buggy address belongs to the physical page: [ 63.234619] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8b6 [ 63.241882] flags: 0x0(zone=0) [ 63.244964] page_type: f5(slab) [ 63.248138] raw: 00000000 cc85a700 00000122 00000000 00000000 80150015 f5000000 00000000 [ 63.256256] raw: 00000000 [ 63.258911] page dumped because: kasan: bad access detected [ 63.264526] [ 63.266021] Memory state around the buggy address: [ 63.270843] cc8b6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.277404] cc8b6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 63.283996] >cc8b6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 63.290557] ^ [ 63.294921] cc8b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.301513] cc8b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.308074] ==================================================================