Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.543025] ================================================================== [ 31.544086] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.544675] Read of size 1 at addr fff00000c9b022bb by task kunit_try_catch/256 [ 31.545169] [ 31.545208] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.545428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.545684] Hardware name: linux,dummy-virt (DT) [ 31.545724] Call trace: [ 31.545749] show_stack+0x20/0x38 (C) [ 31.545977] dump_stack_lvl+0x8c/0xd0 [ 31.546255] print_report+0x118/0x5d0 [ 31.546312] kasan_report+0xdc/0x128 [ 31.546592] __asan_report_load1_noabort+0x20/0x30 [ 31.546740] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.547025] mempool_slab_oob_right+0xc0/0x118 [ 31.547241] kunit_try_run_case+0x170/0x3f0 [ 31.547315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.548237] kthread+0x328/0x630 [ 31.548298] ret_from_fork+0x10/0x20 [ 31.548921] [ 31.549355] Allocated by task 256: [ 31.549396] kasan_save_stack+0x3c/0x68 [ 31.549474] kasan_save_track+0x20/0x40 [ 31.549892] kasan_save_alloc_info+0x40/0x58 [ 31.549992] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.550313] remove_element+0x16c/0x1f8 [ 31.550735] mempool_alloc_preallocated+0x58/0xc0 [ 31.550792] mempool_oob_right_helper+0x98/0x2f0 [ 31.550833] mempool_slab_oob_right+0xc0/0x118 [ 31.550874] kunit_try_run_case+0x170/0x3f0 [ 31.550912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.550959] kthread+0x328/0x630 [ 31.550991] ret_from_fork+0x10/0x20 [ 31.551027] [ 31.551050] The buggy address belongs to the object at fff00000c9b02240 [ 31.551050] which belongs to the cache test_cache of size 123 [ 31.551113] The buggy address is located 0 bytes to the right of [ 31.551113] allocated 123-byte region [fff00000c9b02240, fff00000c9b022bb) [ 31.551274] [ 31.551298] The buggy address belongs to the physical page: [ 31.551329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b02 [ 31.551384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.551435] page_type: f5(slab) [ 31.551476] raw: 0bfffe0000000000 fff00000c582fa00 dead000000000122 0000000000000000 [ 31.551533] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.551575] page dumped because: kasan: bad access detected [ 31.551607] [ 31.551626] Memory state around the buggy address: [ 31.551658] fff00000c9b02180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.551702] fff00000c9b02200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 31.551745] >fff00000c9b02280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 31.551784] ^ [ 31.551818] fff00000c9b02300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.551861] fff00000c9b02380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.551903] ================================================================== [ 31.508684] ================================================================== [ 31.508755] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.508828] Read of size 1 at addr fff00000c9af0873 by task kunit_try_catch/252 [ 31.508880] [ 31.508924] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.509016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.509046] Hardware name: linux,dummy-virt (DT) [ 31.509080] Call trace: [ 31.509106] show_stack+0x20/0x38 (C) [ 31.509173] dump_stack_lvl+0x8c/0xd0 [ 31.509222] print_report+0x118/0x5d0 [ 31.509266] kasan_report+0xdc/0x128 [ 31.509307] __asan_report_load1_noabort+0x20/0x30 [ 31.509356] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.509404] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.509453] kunit_try_run_case+0x170/0x3f0 [ 31.509505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.509558] kthread+0x328/0x630 [ 31.509602] ret_from_fork+0x10/0x20 [ 31.509651] [ 31.509671] Allocated by task 252: [ 31.509701] kasan_save_stack+0x3c/0x68 [ 31.509744] kasan_save_track+0x20/0x40 [ 31.509782] kasan_save_alloc_info+0x40/0x58 [ 31.509820] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.509865] remove_element+0x130/0x1f8 [ 31.509903] mempool_alloc_preallocated+0x58/0xc0 [ 31.509944] mempool_oob_right_helper+0x98/0x2f0 [ 31.509983] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.510025] kunit_try_run_case+0x170/0x3f0 [ 31.510063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.510108] kthread+0x328/0x630 [ 31.510151] ret_from_fork+0x10/0x20 [ 31.510186] [ 31.510206] The buggy address belongs to the object at fff00000c9af0800 [ 31.510206] which belongs to the cache kmalloc-128 of size 128 [ 31.510267] The buggy address is located 0 bytes to the right of [ 31.510267] allocated 115-byte region [fff00000c9af0800, fff00000c9af0873) [ 31.510336] [ 31.510358] The buggy address belongs to the physical page: [ 31.510394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 31.510449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.510502] page_type: f5(slab) [ 31.510545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.510599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.510642] page dumped because: kasan: bad access detected [ 31.510674] [ 31.510692] Memory state around the buggy address: [ 31.510743] fff00000c9af0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.510789] fff00000c9af0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.510834] >fff00000c9af0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.510876] ^ [ 31.510918] fff00000c9af0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.510962] fff00000c9af0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.511003] ================================================================== [ 31.525774] ================================================================== [ 31.525836] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.526816] Read of size 1 at addr fff00000c9b56001 by task kunit_try_catch/254 [ 31.526940] [ 31.526974] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.527063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.527244] Hardware name: linux,dummy-virt (DT) [ 31.527765] Call trace: [ 31.527831] show_stack+0x20/0x38 (C) [ 31.527900] dump_stack_lvl+0x8c/0xd0 [ 31.528109] print_report+0x118/0x5d0 [ 31.528200] kasan_report+0xdc/0x128 [ 31.528263] __asan_report_load1_noabort+0x20/0x30 [ 31.528421] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.528754] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 31.529053] kunit_try_run_case+0x170/0x3f0 [ 31.529259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.529394] kthread+0x328/0x630 [ 31.529767] ret_from_fork+0x10/0x20 [ 31.529967] [ 31.530474] The buggy address belongs to the physical page: [ 31.530742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b54 [ 31.530815] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.530871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.530928] page_type: f8(unknown) [ 31.530969] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.531666] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.531892] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.532183] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.532240] head: 0bfffe0000000002 ffffc1ffc326d501 00000000ffffffff 00000000ffffffff [ 31.532337] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.532658] page dumped because: kasan: bad access detected [ 31.532924] [ 31.533601] Memory state around the buggy address: [ 31.533640] fff00000c9b55f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.533687] fff00000c9b55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.533731] >fff00000c9b56000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.533772] ^ [ 31.533800] fff00000c9b56080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.533844] fff00000c9b56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.533885] ==================================================================
[ 26.564278] ================================================================== [ 26.564929] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 26.565258] Read of size 1 at addr ffff8881060f6001 by task kunit_try_catch/271 [ 26.565616] [ 26.565988] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 26.566077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.566093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.566140] Call Trace: [ 26.566154] <TASK> [ 26.566181] dump_stack_lvl+0x73/0xb0 [ 26.566219] print_report+0xd1/0x610 [ 26.566243] ? __virt_addr_valid+0x1db/0x2d0 [ 26.566269] ? mempool_oob_right_helper+0x318/0x380 [ 26.566295] ? kasan_addr_to_slab+0x11/0xa0 [ 26.566315] ? mempool_oob_right_helper+0x318/0x380 [ 26.566339] kasan_report+0x141/0x180 [ 26.566361] ? mempool_oob_right_helper+0x318/0x380 [ 26.566388] __asan_report_load1_noabort+0x18/0x20 [ 26.566412] mempool_oob_right_helper+0x318/0x380 [ 26.566436] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 26.566461] ? __kasan_check_write+0x18/0x20 [ 26.566592] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.566621] ? finish_task_switch.isra.0+0x153/0x700 [ 26.566650] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 26.566677] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 26.566722] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.566747] ? __pfx_mempool_kfree+0x10/0x10 [ 26.566771] ? __pfx_read_tsc+0x10/0x10 [ 26.566797] ? ktime_get_ts64+0x86/0x230 [ 26.566823] kunit_try_run_case+0x1a5/0x480 [ 26.566847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.566868] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.566892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.566917] ? __kthread_parkme+0x82/0x180 [ 26.566939] ? preempt_count_sub+0x50/0x80 [ 26.566962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.566984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.567010] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.567035] kthread+0x337/0x6f0 [ 26.567055] ? trace_preempt_on+0x20/0xc0 [ 26.567079] ? __pfx_kthread+0x10/0x10 [ 26.567100] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.567120] ? calculate_sigpending+0x7b/0xa0 [ 26.567145] ? __pfx_kthread+0x10/0x10 [ 26.567170] ret_from_fork+0x116/0x1d0 [ 26.567190] ? __pfx_kthread+0x10/0x10 [ 26.567211] ret_from_fork_asm+0x1a/0x30 [ 26.567245] </TASK> [ 26.567257] [ 26.579208] The buggy address belongs to the physical page: [ 26.579474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4 [ 26.580043] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.580469] flags: 0x200000000000040(head|node=0|zone=2) [ 26.580865] page_type: f8(unknown) [ 26.581033] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.581347] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.581927] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.582250] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.582713] head: 0200000000000002 ffffea0004183d01 00000000ffffffff 00000000ffffffff [ 26.583248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.583670] page dumped because: kasan: bad access detected [ 26.584054] [ 26.584152] Memory state around the buggy address: [ 26.584518] ffff8881060f5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.585016] ffff8881060f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.585392] >ffff8881060f6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.585867] ^ [ 26.586003] ffff8881060f6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.586319] ffff8881060f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.587003] ================================================================== [ 26.532407] ================================================================== [ 26.532840] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 26.533116] Read of size 1 at addr ffff8881060c3073 by task kunit_try_catch/269 [ 26.533386] [ 26.533489] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 26.533546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.533559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.533583] Call Trace: [ 26.533597] <TASK> [ 26.533618] dump_stack_lvl+0x73/0xb0 [ 26.533651] print_report+0xd1/0x610 [ 26.533676] ? __virt_addr_valid+0x1db/0x2d0 [ 26.534153] ? mempool_oob_right_helper+0x318/0x380 [ 26.534179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.534207] ? mempool_oob_right_helper+0x318/0x380 [ 26.534231] kasan_report+0x141/0x180 [ 26.534254] ? mempool_oob_right_helper+0x318/0x380 [ 26.534281] __asan_report_load1_noabort+0x18/0x20 [ 26.534306] mempool_oob_right_helper+0x318/0x380 [ 26.534329] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 26.534354] ? __kasan_check_write+0x18/0x20 [ 26.534379] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.534403] ? finish_task_switch.isra.0+0x153/0x700 [ 26.534431] mempool_kmalloc_oob_right+0xf2/0x150 [ 26.534454] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 26.534480] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.535004] ? __pfx_mempool_kfree+0x10/0x10 [ 26.535047] ? __pfx_read_tsc+0x10/0x10 [ 26.535074] ? ktime_get_ts64+0x86/0x230 [ 26.535101] kunit_try_run_case+0x1a5/0x480 [ 26.535128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.535150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.535175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.535199] ? __kthread_parkme+0x82/0x180 [ 26.535221] ? preempt_count_sub+0x50/0x80 [ 26.535243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.535265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.535291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.535316] kthread+0x337/0x6f0 [ 26.535336] ? trace_preempt_on+0x20/0xc0 [ 26.535361] ? __pfx_kthread+0x10/0x10 [ 26.535382] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.535403] ? calculate_sigpending+0x7b/0xa0 [ 26.535429] ? __pfx_kthread+0x10/0x10 [ 26.535450] ret_from_fork+0x116/0x1d0 [ 26.535471] ? __pfx_kthread+0x10/0x10 [ 26.535491] ret_from_fork_asm+0x1a/0x30 [ 26.535879] </TASK> [ 26.535894] [ 26.547378] Allocated by task 269: [ 26.547542] kasan_save_stack+0x45/0x70 [ 26.547694] kasan_save_track+0x18/0x40 [ 26.547838] kasan_save_alloc_info+0x3b/0x50 [ 26.548362] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 26.548955] remove_element+0x11e/0x190 [ 26.549123] mempool_alloc_preallocated+0x4d/0x90 [ 26.549340] mempool_oob_right_helper+0x8a/0x380 [ 26.549762] mempool_kmalloc_oob_right+0xf2/0x150 [ 26.549970] kunit_try_run_case+0x1a5/0x480 [ 26.550182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.550550] kthread+0x337/0x6f0 [ 26.550719] ret_from_fork+0x116/0x1d0 [ 26.550890] ret_from_fork_asm+0x1a/0x30 [ 26.551333] [ 26.551412] The buggy address belongs to the object at ffff8881060c3000 [ 26.551412] which belongs to the cache kmalloc-128 of size 128 [ 26.552188] The buggy address is located 0 bytes to the right of [ 26.552188] allocated 115-byte region [ffff8881060c3000, ffff8881060c3073) [ 26.552667] [ 26.552777] The buggy address belongs to the physical page: [ 26.553055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c3 [ 26.553405] flags: 0x200000000000000(node=0|zone=2) [ 26.553601] page_type: f5(slab) [ 26.553736] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.554141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.554641] page dumped because: kasan: bad access detected [ 26.555422] [ 26.555524] Memory state around the buggy address: [ 26.556012] ffff8881060c2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.556315] ffff8881060c2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.556929] >ffff8881060c3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.557307] ^ [ 26.557859] ffff8881060c3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.558193] ffff8881060c3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.558683] ================================================================== [ 26.592321] ================================================================== [ 26.593145] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 26.593392] Read of size 1 at addr ffff8881058572bb by task kunit_try_catch/273 [ 26.593633] [ 26.593733] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 26.593784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.593796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.593820] Call Trace: [ 26.593834] <TASK> [ 26.593853] dump_stack_lvl+0x73/0xb0 [ 26.593881] print_report+0xd1/0x610 [ 26.593904] ? __virt_addr_valid+0x1db/0x2d0 [ 26.593928] ? mempool_oob_right_helper+0x318/0x380 [ 26.593952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.593980] ? mempool_oob_right_helper+0x318/0x380 [ 26.594003] kasan_report+0x141/0x180 [ 26.594024] ? mempool_oob_right_helper+0x318/0x380 [ 26.594051] __asan_report_load1_noabort+0x18/0x20 [ 26.594075] mempool_oob_right_helper+0x318/0x380 [ 26.594099] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 26.594125] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.594147] ? finish_task_switch.isra.0+0x153/0x700 [ 26.594174] mempool_slab_oob_right+0xed/0x140 [ 26.594198] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 26.594223] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 26.594248] ? __pfx_mempool_free_slab+0x10/0x10 [ 26.594272] ? __pfx_read_tsc+0x10/0x10 [ 26.594294] ? ktime_get_ts64+0x86/0x230 [ 26.594318] kunit_try_run_case+0x1a5/0x480 [ 26.594341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.594360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.594383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.594406] ? __kthread_parkme+0x82/0x180 [ 26.594427] ? preempt_count_sub+0x50/0x80 [ 26.594449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.594470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.594560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.594590] kthread+0x337/0x6f0 [ 26.594610] ? trace_preempt_on+0x20/0xc0 [ 26.594647] ? __pfx_kthread+0x10/0x10 [ 26.594668] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.594689] ? calculate_sigpending+0x7b/0xa0 [ 26.594722] ? __pfx_kthread+0x10/0x10 [ 26.594744] ret_from_fork+0x116/0x1d0 [ 26.594763] ? __pfx_kthread+0x10/0x10 [ 26.594826] ret_from_fork_asm+0x1a/0x30 [ 26.594858] </TASK> [ 26.594870] [ 26.607374] Allocated by task 273: [ 26.607593] kasan_save_stack+0x45/0x70 [ 26.608231] kasan_save_track+0x18/0x40 [ 26.608685] kasan_save_alloc_info+0x3b/0x50 [ 26.609094] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 26.609327] remove_element+0x11e/0x190 [ 26.609526] mempool_alloc_preallocated+0x4d/0x90 [ 26.609762] mempool_oob_right_helper+0x8a/0x380 [ 26.610056] mempool_slab_oob_right+0xed/0x140 [ 26.610390] kunit_try_run_case+0x1a5/0x480 [ 26.610678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.610883] kthread+0x337/0x6f0 [ 26.611321] ret_from_fork+0x116/0x1d0 [ 26.611465] ret_from_fork_asm+0x1a/0x30 [ 26.612187] [ 26.612287] The buggy address belongs to the object at ffff888105857240 [ 26.612287] which belongs to the cache test_cache of size 123 [ 26.612976] The buggy address is located 0 bytes to the right of [ 26.612976] allocated 123-byte region [ffff888105857240, ffff8881058572bb) [ 26.613734] [ 26.613903] The buggy address belongs to the physical page: [ 26.614097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105857 [ 26.614557] flags: 0x200000000000000(node=0|zone=2) [ 26.614957] page_type: f5(slab) [ 26.615276] raw: 0200000000000000 ffff888101ab3640 dead000000000122 0000000000000000 [ 26.615718] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 26.616057] page dumped because: kasan: bad access detected [ 26.616293] [ 26.616378] Memory state around the buggy address: [ 26.617105] ffff888105857180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.617397] ffff888105857200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 26.617990] >ffff888105857280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 26.618234] ^ [ 26.618479] ffff888105857300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.619058] ffff888105857380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.619319] ==================================================================