Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.392945] ================================================================== [ 20.393025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.393119] Read of size 1 at addr fff00000c588b2bb by task kunit_try_catch/225 [ 20.393171] [ 20.393236] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.393363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.393400] Hardware name: linux,dummy-virt (DT) [ 20.393466] Call trace: [ 20.393491] show_stack+0x20/0x38 (C) [ 20.393540] dump_stack_lvl+0x8c/0xd0 [ 20.393592] print_report+0x118/0x608 [ 20.393639] kasan_report+0xdc/0x128 [ 20.393695] __asan_report_load1_noabort+0x20/0x30 [ 20.393744] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.393794] mempool_slab_oob_right+0xc0/0x118 [ 20.393850] kunit_try_run_case+0x170/0x3f0 [ 20.393899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.393953] kthread+0x328/0x630 [ 20.393995] ret_from_fork+0x10/0x20 [ 20.394043] [ 20.394061] Allocated by task 225: [ 20.394090] kasan_save_stack+0x3c/0x68 [ 20.394129] kasan_save_track+0x20/0x40 [ 20.394175] kasan_save_alloc_info+0x40/0x58 [ 20.394213] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.394264] remove_element+0x16c/0x1f8 [ 20.394302] mempool_alloc_preallocated+0x58/0xc0 [ 20.394341] mempool_oob_right_helper+0x98/0x2f0 [ 20.394384] mempool_slab_oob_right+0xc0/0x118 [ 20.394433] kunit_try_run_case+0x170/0x3f0 [ 20.394470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.394514] kthread+0x328/0x630 [ 20.394545] ret_from_fork+0x10/0x20 [ 20.394580] [ 20.394600] The buggy address belongs to the object at fff00000c588b240 [ 20.394600] which belongs to the cache test_cache of size 123 [ 20.394655] The buggy address is located 0 bytes to the right of [ 20.394655] allocated 123-byte region [fff00000c588b240, fff00000c588b2bb) [ 20.394715] [ 20.394737] The buggy address belongs to the physical page: [ 20.394767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10588b [ 20.394817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.394889] page_type: f5(slab) [ 20.394932] raw: 0bfffe0000000000 fff00000c65c9500 dead000000000122 0000000000000000 [ 20.394980] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.395020] page dumped because: kasan: bad access detected [ 20.395051] [ 20.395068] Memory state around the buggy address: [ 20.395102] fff00000c588b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.395146] fff00000c588b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.395188] >fff00000c588b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.395225] ^ [ 20.395257] fff00000c588b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.395299] fff00000c588b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.395374] ================================================================== [ 20.342369] ================================================================== [ 20.342475] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.342556] Read of size 1 at addr fff00000c657ca73 by task kunit_try_catch/221 [ 20.342608] [ 20.342653] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.342746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.342774] Hardware name: linux,dummy-virt (DT) [ 20.342809] Call trace: [ 20.342833] show_stack+0x20/0x38 (C) [ 20.342888] dump_stack_lvl+0x8c/0xd0 [ 20.342940] print_report+0x118/0x608 [ 20.342988] kasan_report+0xdc/0x128 [ 20.343033] __asan_report_load1_noabort+0x20/0x30 [ 20.343080] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.343127] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.343176] kunit_try_run_case+0x170/0x3f0 [ 20.343227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.343280] kthread+0x328/0x630 [ 20.343324] ret_from_fork+0x10/0x20 [ 20.343392] [ 20.343412] Allocated by task 221: [ 20.343454] kasan_save_stack+0x3c/0x68 [ 20.343498] kasan_save_track+0x20/0x40 [ 20.343535] kasan_save_alloc_info+0x40/0x58 [ 20.343572] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.343616] remove_element+0x130/0x1f8 [ 20.343653] mempool_alloc_preallocated+0x58/0xc0 [ 20.343692] mempool_oob_right_helper+0x98/0x2f0 [ 20.343730] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.343769] kunit_try_run_case+0x170/0x3f0 [ 20.343806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.343849] kthread+0x328/0x630 [ 20.343881] ret_from_fork+0x10/0x20 [ 20.343916] [ 20.343936] The buggy address belongs to the object at fff00000c657ca00 [ 20.343936] which belongs to the cache kmalloc-128 of size 128 [ 20.343994] The buggy address is located 0 bytes to the right of [ 20.343994] allocated 115-byte region [fff00000c657ca00, fff00000c657ca73) [ 20.344057] [ 20.344078] The buggy address belongs to the physical page: [ 20.344113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 20.344166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.344221] page_type: f5(slab) [ 20.344264] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.344316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.344357] page dumped because: kasan: bad access detected [ 20.344389] [ 20.344408] Memory state around the buggy address: [ 20.344450] fff00000c657c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.344493] fff00000c657c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.344536] >fff00000c657ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.344576] ^ [ 20.344615] fff00000c657ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.344656] fff00000c657cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.344695] ================================================================== [ 20.373838] ================================================================== [ 20.373922] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.373999] Read of size 1 at addr fff00000c795e001 by task kunit_try_catch/223 [ 20.374049] [ 20.374089] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 20.374178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.374206] Hardware name: linux,dummy-virt (DT) [ 20.374239] Call trace: [ 20.374264] show_stack+0x20/0x38 (C) [ 20.374314] dump_stack_lvl+0x8c/0xd0 [ 20.374366] print_report+0x118/0x608 [ 20.374413] kasan_report+0xdc/0x128 [ 20.374476] __asan_report_load1_noabort+0x20/0x30 [ 20.374524] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.374572] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.374622] kunit_try_run_case+0x170/0x3f0 [ 20.374674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.374726] kthread+0x328/0x630 [ 20.374772] ret_from_fork+0x10/0x20 [ 20.374819] [ 20.374842] The buggy address belongs to the physical page: [ 20.374877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c [ 20.374931] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.374977] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.375036] page_type: f8(unknown) [ 20.375081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.375130] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.375180] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.375228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.375276] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff [ 20.375325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.375408] page dumped because: kasan: bad access detected [ 20.375447] [ 20.375487] Memory state around the buggy address: [ 20.375521] fff00000c795df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.375564] fff00000c795df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.375607] >fff00000c795e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.375646] ^ [ 20.375673] fff00000c795e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.375715] fff00000c795e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.375753] ==================================================================
[ 16.228328] ================================================================== [ 16.229002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.229669] Read of size 1 at addr ffff888103962001 by task kunit_try_catch/240 [ 16.230351] [ 16.230545] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.230651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.230683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.230730] Call Trace: [ 16.230760] <TASK> [ 16.230798] dump_stack_lvl+0x73/0xb0 [ 16.230864] print_report+0xd1/0x650 [ 16.230913] ? __virt_addr_valid+0x1db/0x2d0 [ 16.230956] ? mempool_oob_right_helper+0x318/0x380 [ 16.230986] ? kasan_addr_to_slab+0x11/0xa0 [ 16.231017] ? mempool_oob_right_helper+0x318/0x380 [ 16.231044] kasan_report+0x141/0x180 [ 16.231071] ? mempool_oob_right_helper+0x318/0x380 [ 16.231116] __asan_report_load1_noabort+0x18/0x20 [ 16.231148] mempool_oob_right_helper+0x318/0x380 [ 16.231175] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.231212] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.231598] ? finish_task_switch.isra.0+0x153/0x700 [ 16.231716] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 16.231811] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 16.231900] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.231953] ? __pfx_mempool_kfree+0x10/0x10 [ 16.232007] ? __pfx_read_tsc+0x10/0x10 [ 16.232055] ? ktime_get_ts64+0x86/0x230 [ 16.232105] kunit_try_run_case+0x1a5/0x480 [ 16.232132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.232154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.232182] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.232232] ? __kthread_parkme+0x82/0x180 [ 16.232266] ? preempt_count_sub+0x50/0x80 [ 16.232291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.232315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.232341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.232368] kthread+0x337/0x6f0 [ 16.232389] ? trace_preempt_on+0x20/0xc0 [ 16.232415] ? __pfx_kthread+0x10/0x10 [ 16.232438] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.232479] ? calculate_sigpending+0x7b/0xa0 [ 16.232509] ? __pfx_kthread+0x10/0x10 [ 16.232532] ret_from_fork+0x116/0x1d0 [ 16.232553] ? __pfx_kthread+0x10/0x10 [ 16.232575] ret_from_fork_asm+0x1a/0x30 [ 16.232607] </TASK> [ 16.232621] [ 16.247112] The buggy address belongs to the physical page: [ 16.248346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103960 [ 16.248859] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.249176] flags: 0x200000000000040(head|node=0|zone=2) [ 16.249531] page_type: f8(unknown) [ 16.249759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.250196] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.251100] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.251373] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.252210] head: 0200000000000002 ffffea00040e5801 00000000ffffffff 00000000ffffffff [ 16.252659] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.253017] page dumped because: kasan: bad access detected [ 16.253725] [ 16.253843] Memory state around the buggy address: [ 16.254062] ffff888103961f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.254847] ffff888103961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.255191] >ffff888103962000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.256012] ^ [ 16.256300] ffff888103962080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.256839] ffff888103962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.257366] ================================================================== [ 16.183500] ================================================================== [ 16.184178] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.184778] Read of size 1 at addr ffff888103341073 by task kunit_try_catch/238 [ 16.185522] [ 16.186072] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.186194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.186697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.186764] Call Trace: [ 16.186797] <TASK> [ 16.186839] dump_stack_lvl+0x73/0xb0 [ 16.186915] print_report+0xd1/0x650 [ 16.186964] ? __virt_addr_valid+0x1db/0x2d0 [ 16.187014] ? mempool_oob_right_helper+0x318/0x380 [ 16.187060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.187110] ? mempool_oob_right_helper+0x318/0x380 [ 16.187161] kasan_report+0x141/0x180 [ 16.187202] ? mempool_oob_right_helper+0x318/0x380 [ 16.187292] __asan_report_load1_noabort+0x18/0x20 [ 16.187382] mempool_oob_right_helper+0x318/0x380 [ 16.187426] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.187482] ? update_load_avg+0x1be/0x21b0 [ 16.187516] ? dequeue_entities+0x27e/0x1740 [ 16.187547] ? finish_task_switch.isra.0+0x153/0x700 [ 16.187575] mempool_kmalloc_oob_right+0xf2/0x150 [ 16.187601] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 16.187628] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.187651] ? __pfx_mempool_kfree+0x10/0x10 [ 16.187675] ? __pfx_read_tsc+0x10/0x10 [ 16.187750] ? ktime_get_ts64+0x86/0x230 [ 16.187801] kunit_try_run_case+0x1a5/0x480 [ 16.187836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.187858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.187884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.187910] ? __kthread_parkme+0x82/0x180 [ 16.187933] ? preempt_count_sub+0x50/0x80 [ 16.187957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.187979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.188004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.188029] kthread+0x337/0x6f0 [ 16.188050] ? trace_preempt_on+0x20/0xc0 [ 16.188075] ? __pfx_kthread+0x10/0x10 [ 16.188097] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.188119] ? calculate_sigpending+0x7b/0xa0 [ 16.188144] ? __pfx_kthread+0x10/0x10 [ 16.188169] ret_from_fork+0x116/0x1d0 [ 16.188190] ? __pfx_kthread+0x10/0x10 [ 16.188243] ret_from_fork_asm+0x1a/0x30 [ 16.188279] </TASK> [ 16.188293] [ 16.202417] Allocated by task 238: [ 16.202908] kasan_save_stack+0x45/0x70 [ 16.203384] kasan_save_track+0x18/0x40 [ 16.203789] kasan_save_alloc_info+0x3b/0x50 [ 16.204247] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.204589] remove_element+0x11e/0x190 [ 16.204798] mempool_alloc_preallocated+0x4d/0x90 [ 16.205010] mempool_oob_right_helper+0x8a/0x380 [ 16.205265] mempool_kmalloc_oob_right+0xf2/0x150 [ 16.205670] kunit_try_run_case+0x1a5/0x480 [ 16.206066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.206671] kthread+0x337/0x6f0 [ 16.207104] ret_from_fork+0x116/0x1d0 [ 16.207516] ret_from_fork_asm+0x1a/0x30 [ 16.207875] [ 16.208004] The buggy address belongs to the object at ffff888103341000 [ 16.208004] which belongs to the cache kmalloc-128 of size 128 [ 16.209641] The buggy address is located 0 bytes to the right of [ 16.209641] allocated 115-byte region [ffff888103341000, ffff888103341073) [ 16.210407] [ 16.210672] The buggy address belongs to the physical page: [ 16.211312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341 [ 16.212727] flags: 0x200000000000000(node=0|zone=2) [ 16.213419] page_type: f5(slab) [ 16.213945] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.214291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.214872] page dumped because: kasan: bad access detected [ 16.215426] [ 16.215625] Memory state around the buggy address: [ 16.216623] ffff888103340f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.217615] ffff888103340f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.218152] >ffff888103341000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.218737] ^ [ 16.219338] ffff888103341080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.220330] ffff888103341100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 16.221351] ================================================================== [ 16.264999] ================================================================== [ 16.265701] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 16.266681] Read of size 1 at addr ffff8881033452bb by task kunit_try_catch/242 [ 16.267164] [ 16.267796] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 16.267913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.267942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.267980] Call Trace: [ 16.267999] <TASK> [ 16.268028] dump_stack_lvl+0x73/0xb0 [ 16.268089] print_report+0xd1/0x650 [ 16.268117] ? __virt_addr_valid+0x1db/0x2d0 [ 16.268143] ? mempool_oob_right_helper+0x318/0x380 [ 16.268168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.268195] ? mempool_oob_right_helper+0x318/0x380 [ 16.268415] kasan_report+0x141/0x180 [ 16.268443] ? mempool_oob_right_helper+0x318/0x380 [ 16.268498] __asan_report_load1_noabort+0x18/0x20 [ 16.268522] mempool_oob_right_helper+0x318/0x380 [ 16.268547] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 16.268575] ? __pfx_sched_clock_cpu+0x10/0x10 [ 16.268601] ? finish_task_switch.isra.0+0x153/0x700 [ 16.268629] mempool_slab_oob_right+0xed/0x140 [ 16.268652] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 16.268679] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 16.268702] ? __pfx_mempool_free_slab+0x10/0x10 [ 16.268726] ? __pfx_read_tsc+0x10/0x10 [ 16.268750] ? ktime_get_ts64+0x86/0x230 [ 16.268776] kunit_try_run_case+0x1a5/0x480 [ 16.268800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.268821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.268848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.268873] ? __kthread_parkme+0x82/0x180 [ 16.268896] ? preempt_count_sub+0x50/0x80 [ 16.268920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.268943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.268970] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.268996] kthread+0x337/0x6f0 [ 16.269016] ? trace_preempt_on+0x20/0xc0 [ 16.269042] ? __pfx_kthread+0x10/0x10 [ 16.269065] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.269089] ? calculate_sigpending+0x7b/0xa0 [ 16.269115] ? __pfx_kthread+0x10/0x10 [ 16.269138] ret_from_fork+0x116/0x1d0 [ 16.269158] ? __pfx_kthread+0x10/0x10 [ 16.269181] ret_from_fork_asm+0x1a/0x30 [ 16.269246] </TASK> [ 16.269263] [ 16.280444] Allocated by task 242: [ 16.280715] kasan_save_stack+0x45/0x70 [ 16.280967] kasan_save_track+0x18/0x40 [ 16.281316] kasan_save_alloc_info+0x3b/0x50 [ 16.281662] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 16.282021] remove_element+0x11e/0x190 [ 16.282281] mempool_alloc_preallocated+0x4d/0x90 [ 16.282536] mempool_oob_right_helper+0x8a/0x380 [ 16.282899] mempool_slab_oob_right+0xed/0x140 [ 16.283277] kunit_try_run_case+0x1a5/0x480 [ 16.283593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.283848] kthread+0x337/0x6f0 [ 16.284077] ret_from_fork+0x116/0x1d0 [ 16.284292] ret_from_fork_asm+0x1a/0x30 [ 16.284512] [ 16.284701] The buggy address belongs to the object at ffff888103345240 [ 16.284701] which belongs to the cache test_cache of size 123 [ 16.285600] The buggy address is located 0 bytes to the right of [ 16.285600] allocated 123-byte region [ffff888103345240, ffff8881033452bb) [ 16.286326] [ 16.286452] The buggy address belongs to the physical page: [ 16.286679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103345 [ 16.286974] flags: 0x200000000000000(node=0|zone=2) [ 16.287330] page_type: f5(slab) [ 16.287658] raw: 0200000000000000 ffff888103342000 dead000000000122 0000000000000000 [ 16.288259] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 16.288810] page dumped because: kasan: bad access detected [ 16.289186] [ 16.289355] Memory state around the buggy address: [ 16.289622] ffff888103345180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.289889] ffff888103345200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 16.291715] >ffff888103345280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 16.292297] ^ [ 16.292624] ffff888103345300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.293005] ffff888103345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.294632] ==================================================================