Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.751072] ================================================================== [ 19.751156] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.751239] Read of size 1 at addr fff00000c6369973 by task kunit_try_catch/223 [ 19.751291] [ 19.751352] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.751440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.751469] Hardware name: linux,dummy-virt (DT) [ 19.751501] Call trace: [ 19.751528] show_stack+0x20/0x38 (C) [ 19.751580] dump_stack_lvl+0x8c/0xd0 [ 19.751634] print_report+0x118/0x608 [ 19.751679] kasan_report+0xdc/0x128 [ 19.751722] __asan_report_load1_noabort+0x20/0x30 [ 19.751773] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.751824] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.751875] kunit_try_run_case+0x170/0x3f0 [ 19.751927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.751981] kthread+0x328/0x630 [ 19.752029] ret_from_fork+0x10/0x20 [ 19.752079] [ 19.752098] Allocated by task 223: [ 19.752128] kasan_save_stack+0x3c/0x68 [ 19.752170] kasan_save_track+0x20/0x40 [ 19.752217] kasan_save_alloc_info+0x40/0x58 [ 19.752270] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.752313] remove_element+0x130/0x1f8 [ 19.752366] mempool_alloc_preallocated+0x58/0xc0 [ 19.752410] mempool_oob_right_helper+0x98/0x2f0 [ 19.752452] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.752495] kunit_try_run_case+0x170/0x3f0 [ 19.752535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.752580] kthread+0x328/0x630 [ 19.752617] ret_from_fork+0x10/0x20 [ 19.752653] [ 19.752673] The buggy address belongs to the object at fff00000c6369900 [ 19.752673] which belongs to the cache kmalloc-128 of size 128 [ 19.752733] The buggy address is located 0 bytes to the right of [ 19.752733] allocated 115-byte region [fff00000c6369900, fff00000c6369973) [ 19.752799] [ 19.752821] The buggy address belongs to the physical page: [ 19.752852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106369 [ 19.752908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.752960] page_type: f5(slab) [ 19.753003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.753053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.753095] page dumped because: kasan: bad access detected [ 19.753127] [ 19.753147] Memory state around the buggy address: [ 19.753181] fff00000c6369800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.753225] fff00000c6369880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753267] >fff00000c6369900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.753306] ^ [ 19.753354] fff00000c6369980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753396] fff00000c6369a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.753434] ================================================================== [ 19.769355] ================================================================== [ 19.769419] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.769478] Read of size 1 at addr fff00000c65ba001 by task kunit_try_catch/225 [ 19.769536] [ 19.769681] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.770009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.770042] Hardware name: linux,dummy-virt (DT) [ 19.770137] Call trace: [ 19.770162] show_stack+0x20/0x38 (C) [ 19.770216] dump_stack_lvl+0x8c/0xd0 [ 19.770987] print_report+0x118/0x608 [ 19.771218] kasan_report+0xdc/0x128 [ 19.771315] __asan_report_load1_noabort+0x20/0x30 [ 19.771380] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.771432] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.771833] kunit_try_run_case+0x170/0x3f0 [ 19.771953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772023] kthread+0x328/0x630 [ 19.772074] ret_from_fork+0x10/0x20 [ 19.772169] [ 19.772191] The buggy address belongs to the physical page: [ 19.772747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8 [ 19.772848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.773004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.773189] page_type: f8(unknown) [ 19.773258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.774055] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.774129] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.774180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.774231] head: 0bfffe0000000002 ffffc1ffc3196e01 00000000ffffffff 00000000ffffffff [ 19.774280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.774322] page dumped because: kasan: bad access detected [ 19.774367] [ 19.775050] Memory state around the buggy address: [ 19.775585] fff00000c65b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.775648] fff00000c65b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.775750] >fff00000c65ba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.776060] ^ [ 19.776112] fff00000c65ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.776161] fff00000c65ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.776714] ================================================================== [ 19.787714] ================================================================== [ 19.788127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.788200] Read of size 1 at addr fff00000c63952bb by task kunit_try_catch/227 [ 19.788265] [ 19.788298] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 19.788393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.788421] Hardware name: linux,dummy-virt (DT) [ 19.788450] Call trace: [ 19.788474] show_stack+0x20/0x38 (C) [ 19.788522] dump_stack_lvl+0x8c/0xd0 [ 19.788701] print_report+0x118/0x608 [ 19.788932] kasan_report+0xdc/0x128 [ 19.789033] __asan_report_load1_noabort+0x20/0x30 [ 19.789135] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.789186] mempool_slab_oob_right+0xc0/0x118 [ 19.789233] kunit_try_run_case+0x170/0x3f0 [ 19.789644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.789711] kthread+0x328/0x630 [ 19.789759] ret_from_fork+0x10/0x20 [ 19.790107] [ 19.790129] Allocated by task 227: [ 19.790159] kasan_save_stack+0x3c/0x68 [ 19.790199] kasan_save_track+0x20/0x40 [ 19.790236] kasan_save_alloc_info+0x40/0x58 [ 19.790887] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.790943] remove_element+0x16c/0x1f8 [ 19.791352] mempool_alloc_preallocated+0x58/0xc0 [ 19.791424] mempool_oob_right_helper+0x98/0x2f0 [ 19.791739] mempool_slab_oob_right+0xc0/0x118 [ 19.791994] kunit_try_run_case+0x170/0x3f0 [ 19.792106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792155] kthread+0x328/0x630 [ 19.792191] ret_from_fork+0x10/0x20 [ 19.792228] [ 19.792373] The buggy address belongs to the object at fff00000c6395240 [ 19.792373] which belongs to the cache test_cache of size 123 [ 19.792453] The buggy address is located 0 bytes to the right of [ 19.792453] allocated 123-byte region [fff00000c6395240, fff00000c63952bb) [ 19.792522] [ 19.792542] The buggy address belongs to the physical page: [ 19.792576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106395 [ 19.793102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793158] page_type: f5(slab) [ 19.793225] raw: 0bfffe0000000000 fff00000c1bc0b40 dead000000000122 0000000000000000 [ 19.793308] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.793652] page dumped because: kasan: bad access detected [ 19.793693] [ 19.793712] Memory state around the buggy address: [ 19.793876] fff00000c6395180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.794205] fff00000c6395200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.794252] >fff00000c6395280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.794290] ^ [ 19.794456] fff00000c6395300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.794544] fff00000c6395380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.794845] ==================================================================
[ 12.733814] ================================================================== [ 12.734327] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.735014] Read of size 1 at addr ffff888103606273 by task kunit_try_catch/241 [ 12.735255] [ 12.735400] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 12.735558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.735580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.735606] Call Trace: [ 12.735621] <TASK> [ 12.735641] dump_stack_lvl+0x73/0xb0 [ 12.735673] print_report+0xd1/0x650 [ 12.735700] ? __virt_addr_valid+0x1db/0x2d0 [ 12.735726] ? mempool_oob_right_helper+0x318/0x380 [ 12.735751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.735775] ? mempool_oob_right_helper+0x318/0x380 [ 12.735800] kasan_report+0x141/0x180 [ 12.735824] ? mempool_oob_right_helper+0x318/0x380 [ 12.736101] __asan_report_load1_noabort+0x18/0x20 [ 12.736132] mempool_oob_right_helper+0x318/0x380 [ 12.736158] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.736188] ? finish_task_switch.isra.0+0x153/0x700 [ 12.736219] mempool_kmalloc_oob_right+0xf2/0x150 [ 12.736245] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 12.736269] ? dequeue_task_fair+0x156/0x4e0 [ 12.736293] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.736318] ? __pfx_mempool_kfree+0x10/0x10 [ 12.736341] ? __pfx_read_tsc+0x10/0x10 [ 12.736363] ? ktime_get_ts64+0x86/0x230 [ 12.736390] kunit_try_run_case+0x1a5/0x480 [ 12.736414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.736434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.736462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.736487] ? __kthread_parkme+0x82/0x180 [ 12.736526] ? preempt_count_sub+0x50/0x80 [ 12.736552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.736572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.736596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.736622] kthread+0x337/0x6f0 [ 12.736639] ? trace_preempt_on+0x20/0xc0 [ 12.736664] ? __pfx_kthread+0x10/0x10 [ 12.736684] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.736706] ? calculate_sigpending+0x7b/0xa0 [ 12.736730] ? __pfx_kthread+0x10/0x10 [ 12.736749] ret_from_fork+0x41/0x80 [ 12.736772] ? __pfx_kthread+0x10/0x10 [ 12.736791] ret_from_fork_asm+0x1a/0x30 [ 12.736823] </TASK> [ 12.736851] [ 12.748167] Allocated by task 241: [ 12.748351] kasan_save_stack+0x45/0x70 [ 12.748894] kasan_save_track+0x18/0x40 [ 12.749194] kasan_save_alloc_info+0x3b/0x50 [ 12.749358] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 12.749600] remove_element+0x11e/0x190 [ 12.750111] mempool_alloc_preallocated+0x4d/0x90 [ 12.750399] mempool_oob_right_helper+0x8a/0x380 [ 12.750687] mempool_kmalloc_oob_right+0xf2/0x150 [ 12.750944] kunit_try_run_case+0x1a5/0x480 [ 12.751098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.751455] kthread+0x337/0x6f0 [ 12.751641] ret_from_fork+0x41/0x80 [ 12.751798] ret_from_fork_asm+0x1a/0x30 [ 12.752231] [ 12.752367] The buggy address belongs to the object at ffff888103606200 [ 12.752367] which belongs to the cache kmalloc-128 of size 128 [ 12.752818] The buggy address is located 0 bytes to the right of [ 12.752818] allocated 115-byte region [ffff888103606200, ffff888103606273) [ 12.753659] [ 12.754063] The buggy address belongs to the physical page: [ 12.754409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103606 [ 12.754986] flags: 0x200000000000000(node=0|zone=2) [ 12.755345] page_type: f5(slab) [ 12.755660] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.756345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.756823] page dumped because: kasan: bad access detected [ 12.757157] [ 12.757266] Memory state around the buggy address: [ 12.757483] ffff888103606100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.758135] ffff888103606180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.758556] >ffff888103606200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.759042] ^ [ 12.759416] ffff888103606280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.760084] ffff888103606300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.760397] ================================================================== [ 12.764145] ================================================================== [ 12.765049] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.765316] Read of size 1 at addr ffff888102d86001 by task kunit_try_catch/243 [ 12.765560] [ 12.765658] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 12.765710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.765722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.765748] Call Trace: [ 12.766012] <TASK> [ 12.766040] dump_stack_lvl+0x73/0xb0 [ 12.766074] print_report+0xd1/0x650 [ 12.766098] ? __virt_addr_valid+0x1db/0x2d0 [ 12.766124] ? mempool_oob_right_helper+0x318/0x380 [ 12.766149] ? kasan_addr_to_slab+0x11/0xa0 [ 12.766171] ? mempool_oob_right_helper+0x318/0x380 [ 12.766196] kasan_report+0x141/0x180 [ 12.766220] ? mempool_oob_right_helper+0x318/0x380 [ 12.766249] __asan_report_load1_noabort+0x18/0x20 [ 12.766270] mempool_oob_right_helper+0x318/0x380 [ 12.766296] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.766320] ? dequeue_entities+0x852/0x1740 [ 12.766347] ? finish_task_switch.isra.0+0x153/0x700 [ 12.766375] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 12.766400] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 12.766425] ? dequeue_task_fair+0x166/0x4e0 [ 12.766448] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.766471] ? __pfx_mempool_kfree+0x10/0x10 [ 12.766493] ? __pfx_read_tsc+0x10/0x10 [ 12.766555] ? ktime_get_ts64+0x86/0x230 [ 12.766585] kunit_try_run_case+0x1a5/0x480 [ 12.766607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.766627] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.766654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.766679] ? __kthread_parkme+0x82/0x180 [ 12.766702] ? preempt_count_sub+0x50/0x80 [ 12.766726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.766747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.766770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.766795] kthread+0x337/0x6f0 [ 12.766813] ? trace_preempt_on+0x20/0xc0 [ 12.766838] ? __pfx_kthread+0x10/0x10 [ 12.766919] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.766943] ? calculate_sigpending+0x7b/0xa0 [ 12.766967] ? __pfx_kthread+0x10/0x10 [ 12.766985] ret_from_fork+0x41/0x80 [ 12.767007] ? __pfx_kthread+0x10/0x10 [ 12.767026] ret_from_fork_asm+0x1a/0x30 [ 12.767058] </TASK> [ 12.767071] [ 12.779033] The buggy address belongs to the physical page: [ 12.779299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d84 [ 12.779920] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.780401] flags: 0x200000000000040(head|node=0|zone=2) [ 12.780766] page_type: f8(unknown) [ 12.781009] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.781517] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.782233] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.782558] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.783049] head: 0200000000000002 ffffea00040b6101 00000000ffffffff 00000000ffffffff [ 12.783406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.783797] page dumped because: kasan: bad access detected [ 12.784447] [ 12.784609] Memory state around the buggy address: [ 12.784836] ffff888102d85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.785378] ffff888102d85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.785788] >ffff888102d86000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.786374] ^ [ 12.786535] ffff888102d86080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.786977] ffff888102d86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.787591] ================================================================== [ 12.793535] ================================================================== [ 12.793984] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.794266] Read of size 1 at addr ffff8881036092bb by task kunit_try_catch/245 [ 12.794684] [ 12.795078] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 12.795132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.795146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.795171] Call Trace: [ 12.795184] <TASK> [ 12.795202] dump_stack_lvl+0x73/0xb0 [ 12.795231] print_report+0xd1/0x650 [ 12.795257] ? __virt_addr_valid+0x1db/0x2d0 [ 12.795283] ? mempool_oob_right_helper+0x318/0x380 [ 12.795309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.795333] ? mempool_oob_right_helper+0x318/0x380 [ 12.795357] kasan_report+0x141/0x180 [ 12.795381] ? mempool_oob_right_helper+0x318/0x380 [ 12.795410] __asan_report_load1_noabort+0x18/0x20 [ 12.795432] mempool_oob_right_helper+0x318/0x380 [ 12.795472] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.795501] ? finish_task_switch.isra.0+0x153/0x700 [ 12.795538] mempool_slab_oob_right+0xed/0x140 [ 12.795561] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 12.795586] ? dequeue_task_fair+0x166/0x4e0 [ 12.795610] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 12.795634] ? __pfx_mempool_free_slab+0x10/0x10 [ 12.795656] ? __pfx_read_tsc+0x10/0x10 [ 12.795679] ? ktime_get_ts64+0x86/0x230 [ 12.795705] kunit_try_run_case+0x1a5/0x480 [ 12.795729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.795749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.795775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.795800] ? __kthread_parkme+0x82/0x180 [ 12.795823] ? preempt_count_sub+0x50/0x80 [ 12.795908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.795933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.795958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.795982] kthread+0x337/0x6f0 [ 12.796000] ? trace_preempt_on+0x20/0xc0 [ 12.796024] ? __pfx_kthread+0x10/0x10 [ 12.796044] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.796067] ? calculate_sigpending+0x7b/0xa0 [ 12.796089] ? __pfx_kthread+0x10/0x10 [ 12.796109] ret_from_fork+0x41/0x80 [ 12.796131] ? __pfx_kthread+0x10/0x10 [ 12.796150] ret_from_fork_asm+0x1a/0x30 [ 12.796182] </TASK> [ 12.796195] [ 12.810484] Allocated by task 245: [ 12.810726] kasan_save_stack+0x45/0x70 [ 12.811106] kasan_save_track+0x18/0x40 [ 12.811257] kasan_save_alloc_info+0x3b/0x50 [ 12.811406] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 12.811734] remove_element+0x11e/0x190 [ 12.812223] mempool_alloc_preallocated+0x4d/0x90 [ 12.812708] mempool_oob_right_helper+0x8a/0x380 [ 12.813191] mempool_slab_oob_right+0xed/0x140 [ 12.813814] kunit_try_run_case+0x1a5/0x480 [ 12.814290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.814691] kthread+0x337/0x6f0 [ 12.814816] ret_from_fork+0x41/0x80 [ 12.815068] ret_from_fork_asm+0x1a/0x30 [ 12.815458] [ 12.815649] The buggy address belongs to the object at ffff888103609240 [ 12.815649] which belongs to the cache test_cache of size 123 [ 12.816573] The buggy address is located 0 bytes to the right of [ 12.816573] allocated 123-byte region [ffff888103609240, ffff8881036092bb) [ 12.816997] [ 12.817073] The buggy address belongs to the physical page: [ 12.817613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103609 [ 12.818046] flags: 0x200000000000000(node=0|zone=2) [ 12.818323] page_type: f5(slab) [ 12.818517] raw: 0200000000000000 ffff888101744780 dead000000000122 0000000000000000 [ 12.818807] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 12.819167] page dumped because: kasan: bad access detected [ 12.819460] [ 12.819534] Memory state around the buggy address: [ 12.819920] ffff888103609180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.820294] ffff888103609200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 12.820636] >ffff888103609280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 12.820868] ^ [ 12.821259] ffff888103609300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.821549] ffff888103609380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.822158] ==================================================================