Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.597971] ================================================================== [ 21.598631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 21.598923] Read of size 1 at addr fff00000c6cca2bb by task kunit_try_catch/212 [ 21.599531] [ 21.599725] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.599831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.599864] Hardware name: linux,dummy-virt (DT) [ 21.599904] Call trace: [ 21.599930] dump_backtrace+0x9c/0x128 [ 21.599982] show_stack+0x20/0x38 [ 21.600021] dump_stack_lvl+0x8c/0xd0 [ 21.600070] print_report+0x118/0x5f0 [ 21.600112] kasan_report+0xdc/0x128 [ 21.600152] __asan_report_load1_noabort+0x20/0x30 [ 21.600200] mempool_oob_right_helper+0x2b8/0x2f8 [ 21.600260] mempool_slab_oob_right+0xc0/0x118 [ 21.600312] kunit_try_run_case+0x170/0x3f0 [ 21.600358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.600438] kthread+0x24c/0x2d0 [ 21.600826] ret_from_fork+0x10/0x20 [ 21.600881] [ 21.604592] Allocated by task 212: [ 21.604782] kasan_save_stack+0x3c/0x68 [ 21.605078] kasan_save_track+0x20/0x40 [ 21.605634] kasan_save_alloc_info+0x40/0x58 [ 21.605905] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.606170] remove_element+0x16c/0x1f8 [ 21.606425] mempool_alloc_preallocated+0x58/0xc0 [ 21.606609] mempool_oob_right_helper+0x98/0x2f8 [ 21.606995] mempool_slab_oob_right+0xc0/0x118 [ 21.607571] kunit_try_run_case+0x170/0x3f0 [ 21.607789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.608082] kthread+0x24c/0x2d0 [ 21.608366] ret_from_fork+0x10/0x20 [ 21.608602] [ 21.608778] The buggy address belongs to the object at fff00000c6cca240 [ 21.608778] which belongs to the cache test_cache of size 123 [ 21.609246] The buggy address is located 0 bytes to the right of [ 21.609246] allocated 123-byte region [fff00000c6cca240, fff00000c6cca2bb) [ 21.609801] [ 21.609977] The buggy address belongs to the physical page: [ 21.610225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cca [ 21.610651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.611056] page_type: f5(slab) [ 21.611570] raw: 0bfffe0000000000 fff00000ffeaef00 dead000000000122 0000000000000000 [ 21.611961] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 21.612454] page dumped because: kasan: bad access detected [ 21.612771] [ 21.612940] Memory state around the buggy address: [ 21.613141] fff00000c6cca180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.613544] fff00000c6cca200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.613941] >fff00000c6cca280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.614428] ^ [ 21.614687] fff00000c6cca300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.615254] fff00000c6cca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.615596] ================================================================== [ 21.545148] ================================================================== [ 21.545823] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 21.546401] Read of size 1 at addr fff00000c6cf2873 by task kunit_try_catch/208 [ 21.546703] [ 21.546839] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.546949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.546983] Hardware name: linux,dummy-virt (DT) [ 21.547023] Call trace: [ 21.547065] dump_backtrace+0x9c/0x128 [ 21.547123] show_stack+0x20/0x38 [ 21.547167] dump_stack_lvl+0x8c/0xd0 [ 21.547215] print_report+0x118/0x5f0 [ 21.547274] kasan_report+0xdc/0x128 [ 21.547316] __asan_report_load1_noabort+0x20/0x30 [ 21.547363] mempool_oob_right_helper+0x2b8/0x2f8 [ 21.547413] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.547460] kunit_try_run_case+0x170/0x3f0 [ 21.547510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.547560] kthread+0x24c/0x2d0 [ 21.547628] ret_from_fork+0x10/0x20 [ 21.547679] [ 21.551169] Allocated by task 208: [ 21.552331] kasan_save_stack+0x3c/0x68 [ 21.552644] kasan_save_track+0x20/0x40 [ 21.552875] kasan_save_alloc_info+0x40/0x58 [ 21.553198] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.553567] remove_element+0x130/0x1f8 [ 21.553866] mempool_alloc_preallocated+0x58/0xc0 [ 21.554246] mempool_oob_right_helper+0x98/0x2f8 [ 21.554488] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.554876] kunit_try_run_case+0x170/0x3f0 [ 21.555349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.555778] kthread+0x24c/0x2d0 [ 21.556139] ret_from_fork+0x10/0x20 [ 21.556422] [ 21.556692] The buggy address belongs to the object at fff00000c6cf2800 [ 21.556692] which belongs to the cache kmalloc-128 of size 128 [ 21.557403] The buggy address is located 0 bytes to the right of [ 21.557403] allocated 115-byte region [fff00000c6cf2800, fff00000c6cf2873) [ 21.558110] [ 21.558349] The buggy address belongs to the physical page: [ 21.558724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf2 [ 21.559176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.559656] page_type: f5(slab) [ 21.559899] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.560504] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.560868] page dumped because: kasan: bad access detected [ 21.561332] [ 21.561605] Memory state around the buggy address: [ 21.561874] fff00000c6cf2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.562381] fff00000c6cf2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.563806] >fff00000c6cf2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.564256] ^ [ 21.564574] fff00000c6cf2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.565068] fff00000c6cf2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.565488] ================================================================== [ 21.573433] ================================================================== [ 21.574154] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 21.574749] Read of size 1 at addr fff00000c6c7a001 by task kunit_try_catch/210 [ 21.575092] [ 21.575232] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.575429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.575465] Hardware name: linux,dummy-virt (DT) [ 21.575506] Call trace: [ 21.575535] dump_backtrace+0x9c/0x128 [ 21.575591] show_stack+0x20/0x38 [ 21.575632] dump_stack_lvl+0x8c/0xd0 [ 21.575682] print_report+0x118/0x5f0 [ 21.575724] kasan_report+0xdc/0x128 [ 21.575768] __asan_report_load1_noabort+0x20/0x30 [ 21.575832] mempool_oob_right_helper+0x2b8/0x2f8 [ 21.575902] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.576035] kunit_try_run_case+0x170/0x3f0 [ 21.576093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.576147] kthread+0x24c/0x2d0 [ 21.576194] ret_from_fork+0x10/0x20 [ 21.576260] [ 21.580830] The buggy address belongs to the physical page: [ 21.581226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78 [ 21.581762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.582183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.582665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.583085] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.584034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.584338] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.584880] head: 0bfffe0000000002 ffffc1ffc31b1e01 ffffffffffffffff 0000000000000000 [ 21.585174] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.585680] page dumped because: kasan: bad access detected [ 21.586086] [ 21.586208] Memory state around the buggy address: [ 21.586508] fff00000c6c79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.586900] fff00000c6c79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.587276] >fff00000c6c7a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.587879] ^ [ 21.588161] fff00000c6c7a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.588581] fff00000c6c7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.589000] ==================================================================
[ 13.570472] ================================================================== [ 13.570953] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 13.571392] Read of size 1 at addr ffff888102b8e001 by task kunit_try_catch/228 [ 13.571827] [ 13.572312] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.572375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.572389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.572410] Call Trace: [ 13.572426] <TASK> [ 13.572447] dump_stack_lvl+0x73/0xb0 [ 13.572484] print_report+0xd1/0x640 [ 13.572506] ? __virt_addr_valid+0x1db/0x2d0 [ 13.572529] ? mempool_oob_right_helper+0x31a/0x380 [ 13.572546] ? kasan_addr_to_slab+0x11/0xa0 [ 13.572565] ? mempool_oob_right_helper+0x31a/0x380 [ 13.572583] kasan_report+0x140/0x180 [ 13.572604] ? mempool_oob_right_helper+0x31a/0x380 [ 13.572626] __asan_report_load1_noabort+0x18/0x20 [ 13.572645] mempool_oob_right_helper+0x31a/0x380 [ 13.572681] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.572720] ? finish_task_switch.isra.0+0x153/0x700 [ 13.572760] mempool_kmalloc_large_oob_right+0xf3/0x150 [ 13.572797] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.572842] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.572881] ? __pfx_mempool_kfree+0x10/0x10 [ 13.572922] ? __pfx_read_tsc+0x10/0x10 [ 13.572952] ? ktime_get_ts64+0x84/0x230 [ 13.572991] kunit_try_run_case+0x1a6/0x480 [ 13.573031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.573065] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.573100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.573141] ? __kthread_parkme+0x82/0x160 [ 13.573180] ? preempt_count_sub+0x50/0x80 [ 13.573220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.573254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.573300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.573356] kthread+0x257/0x310 [ 13.573407] ? __pfx_kthread+0x10/0x10 [ 13.573438] ret_from_fork+0x41/0x80 [ 13.573468] ? __pfx_kthread+0x10/0x10 [ 13.573496] ret_from_fork_asm+0x1a/0x30 [ 13.573550] </TASK> [ 13.573573] [ 13.584658] The buggy address belongs to the physical page: [ 13.585133] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b8c [ 13.585607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.586046] flags: 0x200000000000040(head|node=0|zone=2) [ 13.586339] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.586633] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.586991] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.587333] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.587855] head: 0200000000000002 ffffea00040ae301 ffffffffffffffff 0000000000000000 [ 13.588425] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 13.588755] page dumped because: kasan: bad access detected [ 13.588982] [ 13.589336] Memory state around the buggy address: [ 13.589605] ffff888102b8df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.590024] ffff888102b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.590479] >ffff888102b8e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.590855] ^ [ 13.591058] ffff888102b8e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.591572] ffff888102b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.592007] ================================================================== [ 13.537023] ================================================================== [ 13.537493] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 13.538757] Read of size 1 at addr ffff88810262b073 by task kunit_try_catch/226 [ 13.539341] [ 13.539504] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.539591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.539613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.539652] Call Trace: [ 13.539693] <TASK> [ 13.539728] dump_stack_lvl+0x73/0xb0 [ 13.539786] print_report+0xd1/0x640 [ 13.539827] ? __virt_addr_valid+0x1db/0x2d0 [ 13.539870] ? mempool_oob_right_helper+0x31a/0x380 [ 13.539909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.539951] ? mempool_oob_right_helper+0x31a/0x380 [ 13.539992] kasan_report+0x140/0x180 [ 13.540032] ? mempool_oob_right_helper+0x31a/0x380 [ 13.540074] __asan_report_load1_noabort+0x18/0x20 [ 13.540138] mempool_oob_right_helper+0x31a/0x380 [ 13.540174] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.540211] ? finish_task_switch.isra.0+0x153/0x700 [ 13.540240] mempool_kmalloc_oob_right+0xf3/0x150 [ 13.540260] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.540282] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.540304] ? __pfx_mempool_kfree+0x10/0x10 [ 13.540323] ? __pfx_read_tsc+0x10/0x10 [ 13.540343] ? ktime_get_ts64+0x84/0x230 [ 13.540370] kunit_try_run_case+0x1a6/0x480 [ 13.540394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.540413] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.540436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.540459] ? __kthread_parkme+0x82/0x160 [ 13.540479] ? preempt_count_sub+0x50/0x80 [ 13.540499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.540518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.540541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.540565] kthread+0x257/0x310 [ 13.540582] ? __pfx_kthread+0x10/0x10 [ 13.540600] ret_from_fork+0x41/0x80 [ 13.540618] ? __pfx_kthread+0x10/0x10 [ 13.540636] ret_from_fork_asm+0x1a/0x30 [ 13.540681] </TASK> [ 13.540702] [ 13.551423] Allocated by task 226: [ 13.551634] kasan_save_stack+0x45/0x70 [ 13.551898] kasan_save_track+0x18/0x40 [ 13.552113] kasan_save_alloc_info+0x3b/0x50 [ 13.552358] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.553538] remove_element+0x11e/0x190 [ 13.553861] mempool_alloc_preallocated+0x4d/0x90 [ 13.554048] mempool_oob_right_helper+0x8b/0x380 [ 13.554401] mempool_kmalloc_oob_right+0xf3/0x150 [ 13.555034] kunit_try_run_case+0x1a6/0x480 [ 13.555258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.555481] kthread+0x257/0x310 [ 13.555740] ret_from_fork+0x41/0x80 [ 13.555971] ret_from_fork_asm+0x1a/0x30 [ 13.556210] [ 13.556360] The buggy address belongs to the object at ffff88810262b000 [ 13.556360] which belongs to the cache kmalloc-128 of size 128 [ 13.557478] The buggy address is located 0 bytes to the right of [ 13.557478] allocated 115-byte region [ffff88810262b000, ffff88810262b073) [ 13.558036] [ 13.558363] The buggy address belongs to the physical page: [ 13.558705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262b [ 13.559010] flags: 0x200000000000000(node=0|zone=2) [ 13.559492] page_type: f5(slab) [ 13.559738] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.560554] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 13.560819] page dumped because: kasan: bad access detected [ 13.561166] [ 13.561272] Memory state around the buggy address: [ 13.561748] ffff88810262af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.562116] ffff88810262af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.562630] >ffff88810262b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.562985] ^ [ 13.563494] ffff88810262b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.563865] ffff88810262b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.564565] ================================================================== [ 13.598252] ================================================================== [ 13.598854] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 13.599604] Read of size 1 at addr ffff88810262e2bb by task kunit_try_catch/230 [ 13.600268] [ 13.600413] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.600606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.600630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.600679] Call Trace: [ 13.600706] <TASK> [ 13.600742] dump_stack_lvl+0x73/0xb0 [ 13.600800] print_report+0xd1/0x640 [ 13.600834] ? __virt_addr_valid+0x1db/0x2d0 [ 13.600860] ? mempool_oob_right_helper+0x31a/0x380 [ 13.600880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.600901] ? mempool_oob_right_helper+0x31a/0x380 [ 13.600920] kasan_report+0x140/0x180 [ 13.600942] ? mempool_oob_right_helper+0x31a/0x380 [ 13.600965] __asan_report_load1_noabort+0x18/0x20 [ 13.600984] mempool_oob_right_helper+0x31a/0x380 [ 13.601004] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.601026] ? finish_task_switch.isra.0+0x153/0x700 [ 13.601063] mempool_slab_oob_right+0xee/0x140 [ 13.601132] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.601165] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.601195] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.601225] ? __pfx_read_tsc+0x10/0x10 [ 13.601253] ? ktime_get_ts64+0x84/0x230 [ 13.601284] kunit_try_run_case+0x1a6/0x480 [ 13.601307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.601326] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.601347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.601370] ? __kthread_parkme+0x82/0x160 [ 13.601389] ? preempt_count_sub+0x50/0x80 [ 13.601409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.601427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.601450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.601474] kthread+0x257/0x310 [ 13.601491] ? __pfx_kthread+0x10/0x10 [ 13.601508] ret_from_fork+0x41/0x80 [ 13.601526] ? __pfx_kthread+0x10/0x10 [ 13.601543] ret_from_fork_asm+0x1a/0x30 [ 13.601574] </TASK> [ 13.601586] [ 13.610251] Allocated by task 230: [ 13.610553] kasan_save_stack+0x45/0x70 [ 13.610909] kasan_save_track+0x18/0x40 [ 13.611282] kasan_save_alloc_info+0x3b/0x50 [ 13.611694] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.611975] remove_element+0x11e/0x190 [ 13.612471] mempool_alloc_preallocated+0x4d/0x90 [ 13.612836] mempool_oob_right_helper+0x8b/0x380 [ 13.613336] mempool_slab_oob_right+0xee/0x140 [ 13.613717] kunit_try_run_case+0x1a6/0x480 [ 13.614123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.614657] kthread+0x257/0x310 [ 13.614971] ret_from_fork+0x41/0x80 [ 13.615326] ret_from_fork_asm+0x1a/0x30 [ 13.615695] [ 13.615860] The buggy address belongs to the object at ffff88810262e240 [ 13.615860] which belongs to the cache test_cache of size 123 [ 13.616882] The buggy address is located 0 bytes to the right of [ 13.616882] allocated 123-byte region [ffff88810262e240, ffff88810262e2bb) [ 13.617492] [ 13.617630] The buggy address belongs to the physical page: [ 13.618020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262e [ 13.618803] flags: 0x200000000000000(node=0|zone=2) [ 13.619386] page_type: f5(slab) [ 13.619554] raw: 0200000000000000 ffff888102621500 dead000000000122 0000000000000000 [ 13.620387] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 13.620805] page dumped because: kasan: bad access detected [ 13.621213] [ 13.621363] Memory state around the buggy address: [ 13.621533] ffff88810262e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.621875] ffff88810262e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.622560] >ffff88810262e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.622962] ^ [ 13.623330] ffff88810262e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.623847] ffff88810262e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.624136] ==================================================================