Date
July 24, 2025, 4:41 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.454730] ================================================================== [ 34.454942] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.455026] Read of size 1 at addr fff00000c9b6d2bb by task kunit_try_catch/256 [ 34.455077] [ 34.455117] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.455209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.455236] Hardware name: linux,dummy-virt (DT) [ 34.455270] Call trace: [ 34.455296] show_stack+0x20/0x38 (C) [ 34.455346] dump_stack_lvl+0x8c/0xd0 [ 34.455394] print_report+0x118/0x5e8 [ 34.455437] kasan_report+0xdc/0x128 [ 34.455480] __asan_report_load1_noabort+0x20/0x30 [ 34.455527] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.455631] mempool_slab_oob_right+0xc0/0x118 [ 34.455825] kunit_try_run_case+0x170/0x3f0 [ 34.455975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.456162] kthread+0x328/0x630 [ 34.456220] ret_from_fork+0x10/0x20 [ 34.456321] [ 34.456354] Allocated by task 256: [ 34.456448] kasan_save_stack+0x3c/0x68 [ 34.456534] kasan_save_track+0x20/0x40 [ 34.456569] kasan_save_alloc_info+0x40/0x58 [ 34.457031] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.457206] remove_element+0x16c/0x1f8 [ 34.457493] mempool_alloc_preallocated+0x58/0xc0 [ 34.457725] mempool_oob_right_helper+0x98/0x2f0 [ 34.458105] mempool_slab_oob_right+0xc0/0x118 [ 34.458324] kunit_try_run_case+0x170/0x3f0 [ 34.458626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.458899] kthread+0x328/0x630 [ 34.459051] ret_from_fork+0x10/0x20 [ 34.459093] [ 34.459116] The buggy address belongs to the object at fff00000c9b6d240 [ 34.459116] which belongs to the cache test_cache of size 123 [ 34.459178] The buggy address is located 0 bytes to the right of [ 34.459178] allocated 123-byte region [fff00000c9b6d240, fff00000c9b6d2bb) [ 34.459243] [ 34.459266] The buggy address belongs to the physical page: [ 34.459826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b6d [ 34.459912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.459976] page_type: f5(slab) [ 34.460044] raw: 0bfffe0000000000 fff00000c58d7a00 dead000000000122 0000000000000000 [ 34.460098] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.460180] page dumped because: kasan: bad access detected [ 34.460243] [ 34.460262] Memory state around the buggy address: [ 34.460385] fff00000c9b6d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.460443] fff00000c9b6d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.460557] >fff00000c9b6d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.460601] ^ [ 34.460637] fff00000c9b6d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.460679] fff00000c9b6d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.460719] ================================================================== [ 34.417562] ================================================================== [ 34.417641] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.417716] Read of size 1 at addr fff00000c9a8b973 by task kunit_try_catch/252 [ 34.417780] [ 34.417824] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.417913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417942] Hardware name: linux,dummy-virt (DT) [ 34.417974] Call trace: [ 34.418002] show_stack+0x20/0x38 (C) [ 34.418055] dump_stack_lvl+0x8c/0xd0 [ 34.418103] print_report+0x118/0x5e8 [ 34.418152] kasan_report+0xdc/0x128 [ 34.418193] __asan_report_load1_noabort+0x20/0x30 [ 34.418242] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.418291] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.418340] kunit_try_run_case+0x170/0x3f0 [ 34.418388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.418441] kthread+0x328/0x630 [ 34.418484] ret_from_fork+0x10/0x20 [ 34.418535] [ 34.418553] Allocated by task 252: [ 34.418583] kasan_save_stack+0x3c/0x68 [ 34.418620] kasan_save_track+0x20/0x40 [ 34.418656] kasan_save_alloc_info+0x40/0x58 [ 34.418692] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.418733] remove_element+0x130/0x1f8 [ 34.418782] mempool_alloc_preallocated+0x58/0xc0 [ 34.418822] mempool_oob_right_helper+0x98/0x2f0 [ 34.418863] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.418907] kunit_try_run_case+0x170/0x3f0 [ 34.418943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.419001] kthread+0x328/0x630 [ 34.419033] ret_from_fork+0x10/0x20 [ 34.419085] [ 34.419112] The buggy address belongs to the object at fff00000c9a8b900 [ 34.419112] which belongs to the cache kmalloc-128 of size 128 [ 34.419173] The buggy address is located 0 bytes to the right of [ 34.419173] allocated 115-byte region [fff00000c9a8b900, fff00000c9a8b973) [ 34.419238] [ 34.419258] The buggy address belongs to the physical page: [ 34.419300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 34.419358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.419411] page_type: f5(slab) [ 34.419455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.419506] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.419548] page dumped because: kasan: bad access detected [ 34.419580] [ 34.419598] Memory state around the buggy address: [ 34.419632] fff00000c9a8b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.419678] fff00000c9a8b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.419721] >fff00000c9a8b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.419773] ^ [ 34.419814] fff00000c9a8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.419856] fff00000c9a8ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.419895] ================================================================== [ 34.431697] ================================================================== [ 34.431787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.431855] Read of size 1 at addr fff00000c9b72001 by task kunit_try_catch/254 [ 34.431905] [ 34.431944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.432035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.432063] Hardware name: linux,dummy-virt (DT) [ 34.432096] Call trace: [ 34.432121] show_stack+0x20/0x38 (C) [ 34.432171] dump_stack_lvl+0x8c/0xd0 [ 34.432217] print_report+0x118/0x5e8 [ 34.432260] kasan_report+0xdc/0x128 [ 34.432301] __asan_report_load1_noabort+0x20/0x30 [ 34.432348] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.432398] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 34.432448] kunit_try_run_case+0x170/0x3f0 [ 34.432495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.432546] kthread+0x328/0x630 [ 34.432589] ret_from_fork+0x10/0x20 [ 34.432637] [ 34.432659] The buggy address belongs to the physical page: [ 34.432699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b70 [ 34.432767] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.432815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.432874] page_type: f8(unknown) [ 34.432916] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.433406] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.434034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.434372] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.434433] head: 0bfffe0000000002 ffffc1ffc326dc01 00000000ffffffff 00000000ffffffff [ 34.434483] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.434525] page dumped because: kasan: bad access detected [ 34.435191] [ 34.435247] Memory state around the buggy address: [ 34.435474] fff00000c9b71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.435527] fff00000c9b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.435582] >fff00000c9b72000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.435717] ^ [ 34.436062] fff00000c9b72080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.436305] fff00000c9b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.436606] ==================================================================
[ 28.306480] ================================================================== [ 28.306956] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 28.307316] Read of size 1 at addr ffff888104c4ac73 by task kunit_try_catch/269 [ 28.308007] [ 28.308143] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 28.308279] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.308380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.308427] Call Trace: [ 28.308441] <TASK> [ 28.308463] dump_stack_lvl+0x73/0xb0 [ 28.308518] print_report+0xd1/0x640 [ 28.308542] ? __virt_addr_valid+0x1db/0x2d0 [ 28.308569] ? mempool_oob_right_helper+0x318/0x380 [ 28.308602] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.308628] ? mempool_oob_right_helper+0x318/0x380 [ 28.308652] kasan_report+0x141/0x180 [ 28.308674] ? mempool_oob_right_helper+0x318/0x380 [ 28.308703] __asan_report_load1_noabort+0x18/0x20 [ 28.308727] mempool_oob_right_helper+0x318/0x380 [ 28.308752] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.308776] ? dequeue_entities+0x23f/0x1630 [ 28.308928] ? __kasan_check_write+0x18/0x20 [ 28.308953] ? __pfx_sched_clock_cpu+0x10/0x10 [ 28.308975] ? finish_task_switch.isra.0+0x153/0x700 [ 28.309002] mempool_kmalloc_oob_right+0xf2/0x150 [ 28.309026] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 28.309053] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.309078] ? __pfx_mempool_kfree+0x10/0x10 [ 28.309105] ? __pfx_read_tsc+0x10/0x10 [ 28.309127] ? ktime_get_ts64+0x86/0x230 [ 28.309153] kunit_try_run_case+0x1a5/0x480 [ 28.309180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.309202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.309229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.309254] ? __kthread_parkme+0x82/0x180 [ 28.309275] ? preempt_count_sub+0x50/0x80 [ 28.309298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.309322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.309345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.309369] kthread+0x337/0x6f0 [ 28.309391] ? trace_preempt_on+0x20/0xc0 [ 28.309416] ? __pfx_kthread+0x10/0x10 [ 28.309437] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.309460] ? calculate_sigpending+0x7b/0xa0 [ 28.309485] ? __pfx_kthread+0x10/0x10 [ 28.309508] ret_from_fork+0x116/0x1d0 [ 28.309528] ? __pfx_kthread+0x10/0x10 [ 28.309549] ret_from_fork_asm+0x1a/0x30 [ 28.309594] </TASK> [ 28.309604] [ 28.321718] Allocated by task 269: [ 28.321962] kasan_save_stack+0x45/0x70 [ 28.322638] kasan_save_track+0x18/0x40 [ 28.322785] kasan_save_alloc_info+0x3b/0x50 [ 28.323187] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 28.323506] remove_element+0x11e/0x190 [ 28.323859] mempool_alloc_preallocated+0x4d/0x90 [ 28.324093] mempool_oob_right_helper+0x8a/0x380 [ 28.324448] mempool_kmalloc_oob_right+0xf2/0x150 [ 28.324836] kunit_try_run_case+0x1a5/0x480 [ 28.325093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.325463] kthread+0x337/0x6f0 [ 28.325726] ret_from_fork+0x116/0x1d0 [ 28.325869] ret_from_fork_asm+0x1a/0x30 [ 28.326398] [ 28.326481] The buggy address belongs to the object at ffff888104c4ac00 [ 28.326481] which belongs to the cache kmalloc-128 of size 128 [ 28.327235] The buggy address is located 0 bytes to the right of [ 28.327235] allocated 115-byte region [ffff888104c4ac00, ffff888104c4ac73) [ 28.328101] [ 28.328270] The buggy address belongs to the physical page: [ 28.328545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c4a [ 28.329089] flags: 0x200000000000000(node=0|zone=2) [ 28.329408] page_type: f5(slab) [ 28.329614] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.330166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.330456] page dumped because: kasan: bad access detected [ 28.330720] [ 28.330794] Memory state around the buggy address: [ 28.331658] ffff888104c4ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.332152] ffff888104c4ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.332524] >ffff888104c4ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.332966] ^ [ 28.333379] ffff888104c4ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.333697] ffff888104c4ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.334174] ================================================================== [ 28.338483] ================================================================== [ 28.339278] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 28.339665] Read of size 1 at addr ffff88810614a001 by task kunit_try_catch/271 [ 28.340236] [ 28.340352] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 28.340411] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.340426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.340448] Call Trace: [ 28.340462] <TASK> [ 28.340485] dump_stack_lvl+0x73/0xb0 [ 28.340518] print_report+0xd1/0x640 [ 28.340543] ? __virt_addr_valid+0x1db/0x2d0 [ 28.340570] ? mempool_oob_right_helper+0x318/0x380 [ 28.340604] ? kasan_addr_to_slab+0x11/0xa0 [ 28.340625] ? mempool_oob_right_helper+0x318/0x380 [ 28.340647] kasan_report+0x141/0x180 [ 28.340669] ? mempool_oob_right_helper+0x318/0x380 [ 28.340698] __asan_report_load1_noabort+0x18/0x20 [ 28.340721] mempool_oob_right_helper+0x318/0x380 [ 28.340746] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.340770] ? dequeue_entities+0x23f/0x1630 [ 28.340809] ? __kasan_check_write+0x18/0x20 [ 28.340832] ? __pfx_sched_clock_cpu+0x10/0x10 [ 28.340856] ? finish_task_switch.isra.0+0x153/0x700 [ 28.340884] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 28.340907] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 28.340934] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.340960] ? __pfx_mempool_kfree+0x10/0x10 [ 28.340985] ? __pfx_read_tsc+0x10/0x10 [ 28.341008] ? ktime_get_ts64+0x86/0x230 [ 28.341033] kunit_try_run_case+0x1a5/0x480 [ 28.341061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.341083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.341109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.341133] ? __kthread_parkme+0x82/0x180 [ 28.341154] ? preempt_count_sub+0x50/0x80 [ 28.341177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.341200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.341223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.341247] kthread+0x337/0x6f0 [ 28.341266] ? trace_preempt_on+0x20/0xc0 [ 28.341291] ? __pfx_kthread+0x10/0x10 [ 28.341311] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.341334] ? calculate_sigpending+0x7b/0xa0 [ 28.341358] ? __pfx_kthread+0x10/0x10 [ 28.341379] ret_from_fork+0x116/0x1d0 [ 28.341399] ? __pfx_kthread+0x10/0x10 [ 28.341420] ret_from_fork_asm+0x1a/0x30 [ 28.341452] </TASK> [ 28.341462] [ 28.351412] The buggy address belongs to the physical page: [ 28.351646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106148 [ 28.352065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.352370] flags: 0x200000000000040(head|node=0|zone=2) [ 28.352551] page_type: f8(unknown) [ 28.352831] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.353294] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.353596] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.353823] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.354383] head: 0200000000000002 ffffea0004185201 00000000ffffffff 00000000ffffffff [ 28.354833] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.355495] page dumped because: kasan: bad access detected [ 28.355752] [ 28.355818] Memory state around the buggy address: [ 28.356476] ffff888106149f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.356746] ffff888106149f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.357364] >ffff88810614a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.357674] ^ [ 28.357824] ffff88810614a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.358380] ffff88810614a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.358773] ================================================================== [ 28.363414] ================================================================== [ 28.364054] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 28.364353] Read of size 1 at addr ffff88810546d2bb by task kunit_try_catch/273 [ 28.364662] [ 28.364770] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 28.364825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.364839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.364861] Call Trace: [ 28.364874] <TASK> [ 28.364893] dump_stack_lvl+0x73/0xb0 [ 28.365326] print_report+0xd1/0x640 [ 28.365363] ? __virt_addr_valid+0x1db/0x2d0 [ 28.365390] ? mempool_oob_right_helper+0x318/0x380 [ 28.365530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.365556] ? mempool_oob_right_helper+0x318/0x380 [ 28.365591] kasan_report+0x141/0x180 [ 28.365614] ? mempool_oob_right_helper+0x318/0x380 [ 28.365642] __asan_report_load1_noabort+0x18/0x20 [ 28.365666] mempool_oob_right_helper+0x318/0x380 [ 28.365691] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.365967] ? finish_task_switch.isra.0+0x153/0x700 [ 28.366002] mempool_slab_oob_right+0xed/0x140 [ 28.366027] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 28.366054] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 28.366078] ? __pfx_mempool_free_slab+0x10/0x10 [ 28.366103] ? __pfx_read_tsc+0x10/0x10 [ 28.366125] ? ktime_get_ts64+0x86/0x230 [ 28.366151] kunit_try_run_case+0x1a5/0x480 [ 28.366177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.366199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.366226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.366251] ? __kthread_parkme+0x82/0x180 [ 28.366272] ? preempt_count_sub+0x50/0x80 [ 28.366294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.366319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.366342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.366365] kthread+0x337/0x6f0 [ 28.366384] ? trace_preempt_on+0x20/0xc0 [ 28.366408] ? __pfx_kthread+0x10/0x10 [ 28.366427] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.366450] ? calculate_sigpending+0x7b/0xa0 [ 28.366474] ? __pfx_kthread+0x10/0x10 [ 28.366495] ret_from_fork+0x116/0x1d0 [ 28.366514] ? __pfx_kthread+0x10/0x10 [ 28.366535] ret_from_fork_asm+0x1a/0x30 [ 28.366566] </TASK> [ 28.366591] [ 28.377533] Allocated by task 273: [ 28.377964] kasan_save_stack+0x45/0x70 [ 28.378370] kasan_save_track+0x18/0x40 [ 28.378551] kasan_save_alloc_info+0x3b/0x50 [ 28.378750] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 28.379365] remove_element+0x11e/0x190 [ 28.379538] mempool_alloc_preallocated+0x4d/0x90 [ 28.380015] mempool_oob_right_helper+0x8a/0x380 [ 28.380315] mempool_slab_oob_right+0xed/0x140 [ 28.380521] kunit_try_run_case+0x1a5/0x480 [ 28.380876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.381313] kthread+0x337/0x6f0 [ 28.381465] ret_from_fork+0x116/0x1d0 [ 28.381735] ret_from_fork_asm+0x1a/0x30 [ 28.381913] [ 28.382232] The buggy address belongs to the object at ffff88810546d240 [ 28.382232] which belongs to the cache test_cache of size 123 [ 28.382932] The buggy address is located 0 bytes to the right of [ 28.382932] allocated 123-byte region [ffff88810546d240, ffff88810546d2bb) [ 28.383470] [ 28.383564] The buggy address belongs to the physical page: [ 28.383810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10546d [ 28.384535] flags: 0x200000000000000(node=0|zone=2) [ 28.384920] page_type: f5(slab) [ 28.385167] raw: 0200000000000000 ffff888101d87a00 dead000000000122 0000000000000000 [ 28.385616] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.386174] page dumped because: kasan: bad access detected [ 28.386364] [ 28.386454] Memory state around the buggy address: [ 28.386897] ffff88810546d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.387198] ffff88810546d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.387497] >ffff88810546d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.387791] ^ [ 28.388423] ffff88810546d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.388691] ffff88810546d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.389174] ==================================================================