Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.837067] ================================================================== [ 19.837141] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.837199] Read of size 1 at addr fff00000c59912bb by task kunit_try_catch/227 [ 19.837281] [ 19.837319] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.837412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.837437] Hardware name: linux,dummy-virt (DT) [ 19.837466] Call trace: [ 19.837487] show_stack+0x20/0x38 (C) [ 19.837755] dump_stack_lvl+0x8c/0xd0 [ 19.837818] print_report+0x118/0x5d0 [ 19.837865] kasan_report+0xdc/0x128 [ 19.837908] __asan_report_load1_noabort+0x20/0x30 [ 19.837976] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.838067] mempool_slab_oob_right+0xc0/0x118 [ 19.838143] kunit_try_run_case+0x170/0x3f0 [ 19.838253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.838327] kthread+0x328/0x630 [ 19.838406] ret_from_fork+0x10/0x20 [ 19.838493] [ 19.838511] Allocated by task 227: [ 19.838563] kasan_save_stack+0x3c/0x68 [ 19.838631] kasan_save_track+0x20/0x40 [ 19.838679] kasan_save_alloc_info+0x40/0x58 [ 19.838740] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.838792] remove_element+0x16c/0x1f8 [ 19.838830] mempool_alloc_preallocated+0x58/0xc0 [ 19.838872] mempool_oob_right_helper+0x98/0x2f0 [ 19.838913] mempool_slab_oob_right+0xc0/0x118 [ 19.838951] kunit_try_run_case+0x170/0x3f0 [ 19.839241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.839330] kthread+0x328/0x630 [ 19.839418] ret_from_fork+0x10/0x20 [ 19.839499] [ 19.839569] The buggy address belongs to the object at fff00000c5991240 [ 19.839569] which belongs to the cache test_cache of size 123 [ 19.839686] The buggy address is located 0 bytes to the right of [ 19.839686] allocated 123-byte region [fff00000c5991240, fff00000c59912bb) [ 19.839787] [ 19.839859] The buggy address belongs to the physical page: [ 19.839906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105991 [ 19.839976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.840042] page_type: f5(slab) [ 19.840122] raw: 0bfffe0000000000 fff00000c1c3ac80 dead000000000122 0000000000000000 [ 19.840198] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.840287] page dumped because: kasan: bad access detected [ 19.840321] [ 19.840338] Memory state around the buggy address: [ 19.840613] fff00000c5991180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.840689] fff00000c5991200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.840745] >fff00000c5991280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.840876] ^ [ 19.840925] fff00000c5991300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.841027] fff00000c5991380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.841106] ================================================================== [ 19.808413] ================================================================== [ 19.808477] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.808533] Read of size 1 at addr fff00000c7932001 by task kunit_try_catch/225 [ 19.808583] [ 19.808614] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.808696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.808723] Hardware name: linux,dummy-virt (DT) [ 19.808754] Call trace: [ 19.809471] show_stack+0x20/0x38 (C) [ 19.809557] dump_stack_lvl+0x8c/0xd0 [ 19.809655] print_report+0x118/0x5d0 [ 19.809719] kasan_report+0xdc/0x128 [ 19.809775] __asan_report_load1_noabort+0x20/0x30 [ 19.809826] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.810014] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.810530] kunit_try_run_case+0x170/0x3f0 [ 19.810673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.810883] kthread+0x328/0x630 [ 19.810932] ret_from_fork+0x10/0x20 [ 19.811326] [ 19.811363] The buggy address belongs to the physical page: [ 19.811478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107930 [ 19.811721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.811802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.812188] page_type: f8(unknown) [ 19.812282] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.812341] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.812460] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.812698] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.813165] head: 0bfffe0000000002 ffffc1ffc31e4c01 00000000ffffffff 00000000ffffffff [ 19.813440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.813489] page dumped because: kasan: bad access detected [ 19.813521] [ 19.813541] Memory state around the buggy address: [ 19.813792] fff00000c7931f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.813854] fff00000c7931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.814048] >fff00000c7932000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.814090] ^ [ 19.814119] fff00000c7932080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.814684] fff00000c7932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.814873] ================================================================== [ 19.791389] ================================================================== [ 19.791468] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.791540] Read of size 1 at addr fff00000c59e4673 by task kunit_try_catch/223 [ 19.791591] [ 19.791632] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 19.791720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.791748] Hardware name: linux,dummy-virt (DT) [ 19.791782] Call trace: [ 19.791805] show_stack+0x20/0x38 (C) [ 19.791856] dump_stack_lvl+0x8c/0xd0 [ 19.791906] print_report+0x118/0x5d0 [ 19.791951] kasan_report+0xdc/0x128 [ 19.791996] __asan_report_load1_noabort+0x20/0x30 [ 19.792045] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.792097] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.792147] kunit_try_run_case+0x170/0x3f0 [ 19.792197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792271] kthread+0x328/0x630 [ 19.792318] ret_from_fork+0x10/0x20 [ 19.792372] [ 19.792393] Allocated by task 223: [ 19.792424] kasan_save_stack+0x3c/0x68 [ 19.792464] kasan_save_track+0x20/0x40 [ 19.792501] kasan_save_alloc_info+0x40/0x58 [ 19.792540] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.792584] remove_element+0x130/0x1f8 [ 19.792624] mempool_alloc_preallocated+0x58/0xc0 [ 19.792665] mempool_oob_right_helper+0x98/0x2f0 [ 19.792707] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.792749] kunit_try_run_case+0x170/0x3f0 [ 19.792790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792835] kthread+0x328/0x630 [ 19.792872] ret_from_fork+0x10/0x20 [ 19.792908] [ 19.792927] The buggy address belongs to the object at fff00000c59e4600 [ 19.792927] which belongs to the cache kmalloc-128 of size 128 [ 19.792988] The buggy address is located 0 bytes to the right of [ 19.792988] allocated 115-byte region [fff00000c59e4600, fff00000c59e4673) [ 19.793055] [ 19.793077] The buggy address belongs to the physical page: [ 19.793111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4 [ 19.793168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793233] page_type: f5(slab) [ 19.793276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.793348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.793394] page dumped because: kasan: bad access detected [ 19.793440] [ 19.793463] Memory state around the buggy address: [ 19.793498] fff00000c59e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.793544] fff00000c59e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793587] >fff00000c59e4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.793627] ^ [ 19.793668] fff00000c59e4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793712] fff00000c59e4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.793752] ==================================================================
[ 12.410401] ================================================================== [ 12.410929] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.411264] Read of size 1 at addr ffff888102225e73 by task kunit_try_catch/240 [ 12.411579] [ 12.411679] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 12.411728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.411740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.411761] Call Trace: [ 12.411774] <TASK> [ 12.411792] dump_stack_lvl+0x73/0xb0 [ 12.411843] print_report+0xd1/0x610 [ 12.411867] ? __virt_addr_valid+0x1db/0x2d0 [ 12.411903] ? mempool_oob_right_helper+0x318/0x380 [ 12.411925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.411947] ? mempool_oob_right_helper+0x318/0x380 [ 12.411970] kasan_report+0x141/0x180 [ 12.411992] ? mempool_oob_right_helper+0x318/0x380 [ 12.412021] __asan_report_load1_noabort+0x18/0x20 [ 12.412042] mempool_oob_right_helper+0x318/0x380 [ 12.412067] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.412098] mempool_kmalloc_oob_right+0xf2/0x150 [ 12.412120] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 12.412143] ? dequeue_task_fair+0x166/0x4e0 [ 12.412168] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.412189] ? __pfx_mempool_kfree+0x10/0x10 [ 12.412210] ? __pfx_read_tsc+0x10/0x10 [ 12.412231] ? ktime_get_ts64+0x86/0x230 [ 12.412256] kunit_try_run_case+0x1a5/0x480 [ 12.412279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.412296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.412322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.412345] ? __kthread_parkme+0x82/0x180 [ 12.412367] ? preempt_count_sub+0x50/0x80 [ 12.412392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.412411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.412435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.412457] kthread+0x337/0x6f0 [ 12.412474] ? trace_preempt_on+0x20/0xc0 [ 12.412497] ? __pfx_kthread+0x10/0x10 [ 12.412514] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.412535] ? calculate_sigpending+0x7b/0xa0 [ 12.412557] ? __pfx_kthread+0x10/0x10 [ 12.412576] ret_from_fork+0x41/0x80 [ 12.412596] ? __pfx_kthread+0x10/0x10 [ 12.412613] ret_from_fork_asm+0x1a/0x30 [ 12.412643] </TASK> [ 12.412655] [ 12.424212] Allocated by task 240: [ 12.424349] kasan_save_stack+0x45/0x70 [ 12.424529] kasan_save_track+0x18/0x40 [ 12.424682] kasan_save_alloc_info+0x3b/0x50 [ 12.424850] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 12.425159] remove_element+0x11e/0x190 [ 12.425350] mempool_alloc_preallocated+0x4d/0x90 [ 12.426088] mempool_oob_right_helper+0x8a/0x380 [ 12.426282] mempool_kmalloc_oob_right+0xf2/0x150 [ 12.426515] kunit_try_run_case+0x1a5/0x480 [ 12.426949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.427201] kthread+0x337/0x6f0 [ 12.427543] ret_from_fork+0x41/0x80 [ 12.427725] ret_from_fork_asm+0x1a/0x30 [ 12.428132] [ 12.428222] The buggy address belongs to the object at ffff888102225e00 [ 12.428222] which belongs to the cache kmalloc-128 of size 128 [ 12.428998] The buggy address is located 0 bytes to the right of [ 12.428998] allocated 115-byte region [ffff888102225e00, ffff888102225e73) [ 12.429673] [ 12.429973] The buggy address belongs to the physical page: [ 12.430332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102225 [ 12.430824] flags: 0x200000000000000(node=0|zone=2) [ 12.431215] page_type: f5(slab) [ 12.431385] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.431793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.432347] page dumped because: kasan: bad access detected [ 12.432764] [ 12.432871] Memory state around the buggy address: [ 12.433356] ffff888102225d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.433638] ffff888102225d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.434081] >ffff888102225e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.434470] ^ [ 12.434889] ffff888102225e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.435357] ffff888102225f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 12.435664] ================================================================== [ 12.438954] ================================================================== [ 12.439699] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.439974] Read of size 1 at addr ffff888103966001 by task kunit_try_catch/242 [ 12.440314] [ 12.440514] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 12.440562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.440573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.440594] Call Trace: [ 12.440606] <TASK> [ 12.440623] dump_stack_lvl+0x73/0xb0 [ 12.440649] print_report+0xd1/0x610 [ 12.440671] ? __virt_addr_valid+0x1db/0x2d0 [ 12.440703] ? mempool_oob_right_helper+0x318/0x380 [ 12.440726] ? kasan_addr_to_slab+0x11/0xa0 [ 12.440746] ? mempool_oob_right_helper+0x318/0x380 [ 12.440780] kasan_report+0x141/0x180 [ 12.440819] ? mempool_oob_right_helper+0x318/0x380 [ 12.440847] __asan_report_load1_noabort+0x18/0x20 [ 12.440867] mempool_oob_right_helper+0x318/0x380 [ 12.440900] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.440923] ? dequeue_entities+0x852/0x1740 [ 12.440947] ? finish_task_switch.isra.0+0x153/0x700 [ 12.440973] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 12.440997] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 12.441030] ? dequeue_task_fair+0x166/0x4e0 [ 12.441052] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.441071] ? __pfx_mempool_kfree+0x10/0x10 [ 12.441093] ? __pfx_read_tsc+0x10/0x10 [ 12.441123] ? ktime_get_ts64+0x86/0x230 [ 12.441152] kunit_try_run_case+0x1a5/0x480 [ 12.441173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.441191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.441214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.441237] ? __kthread_parkme+0x82/0x180 [ 12.441259] ? preempt_count_sub+0x50/0x80 [ 12.441282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.441302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.441325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.441348] kthread+0x337/0x6f0 [ 12.441364] ? trace_preempt_on+0x20/0xc0 [ 12.441386] ? __pfx_kthread+0x10/0x10 [ 12.441403] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.441424] ? calculate_sigpending+0x7b/0xa0 [ 12.441445] ? __pfx_kthread+0x10/0x10 [ 12.441462] ret_from_fork+0x41/0x80 [ 12.441482] ? __pfx_kthread+0x10/0x10 [ 12.441499] ret_from_fork_asm+0x1a/0x30 [ 12.441529] </TASK> [ 12.441540] [ 12.451959] The buggy address belongs to the physical page: [ 12.452226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103964 [ 12.452555] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.453256] flags: 0x200000000000040(head|node=0|zone=2) [ 12.453458] page_type: f8(unknown) [ 12.453650] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.454308] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.454613] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.455166] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.455582] head: 0200000000000002 ffffea00040e5901 00000000ffffffff 00000000ffffffff [ 12.456417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.457331] page dumped because: kasan: bad access detected [ 12.457926] [ 12.458082] Memory state around the buggy address: [ 12.458502] ffff888103965f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.458970] ffff888103965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.459423] >ffff888103966000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.459635] ^ [ 12.459855] ffff888103966080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.460519] ffff888103966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 12.461261] ================================================================== [ 12.465388] ================================================================== [ 12.466060] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 12.466308] Read of size 1 at addr ffff8881022402bb by task kunit_try_catch/244 [ 12.466528] [ 12.466612] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 12.466656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.466667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.466687] Call Trace: [ 12.466697] <TASK> [ 12.466711] dump_stack_lvl+0x73/0xb0 [ 12.466734] print_report+0xd1/0x610 [ 12.466755] ? __virt_addr_valid+0x1db/0x2d0 [ 12.466776] ? mempool_oob_right_helper+0x318/0x380 [ 12.466799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.466828] ? mempool_oob_right_helper+0x318/0x380 [ 12.466850] kasan_report+0x141/0x180 [ 12.466872] ? mempool_oob_right_helper+0x318/0x380 [ 12.466909] __asan_report_load1_noabort+0x18/0x20 [ 12.466929] mempool_oob_right_helper+0x318/0x380 [ 12.466953] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 12.466980] ? finish_task_switch.isra.0+0x153/0x700 [ 12.467006] mempool_slab_oob_right+0xed/0x140 [ 12.467026] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 12.467045] ? dequeue_task_fair+0x166/0x4e0 [ 12.467067] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 12.467087] ? __pfx_mempool_free_slab+0x10/0x10 [ 12.467109] ? __pfx_read_tsc+0x10/0x10 [ 12.467128] ? ktime_get_ts64+0x86/0x230 [ 12.467151] kunit_try_run_case+0x1a5/0x480 [ 12.467172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.467189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.467212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.467235] ? __kthread_parkme+0x82/0x180 [ 12.467256] ? preempt_count_sub+0x50/0x80 [ 12.467279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.467298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.467320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.467343] kthread+0x337/0x6f0 [ 12.467358] ? trace_preempt_on+0x20/0xc0 [ 12.467380] ? __pfx_kthread+0x10/0x10 [ 12.467398] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.467418] ? calculate_sigpending+0x7b/0xa0 [ 12.467439] ? __pfx_kthread+0x10/0x10 [ 12.467457] ret_from_fork+0x41/0x80 [ 12.467475] ? __pfx_kthread+0x10/0x10 [ 12.467493] ret_from_fork_asm+0x1a/0x30 [ 12.467522] </TASK> [ 12.467532] [ 12.480298] Allocated by task 244: [ 12.480766] kasan_save_stack+0x45/0x70 [ 12.481177] kasan_save_track+0x18/0x40 [ 12.481612] kasan_save_alloc_info+0x3b/0x50 [ 12.482005] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 12.482696] remove_element+0x11e/0x190 [ 12.483027] mempool_alloc_preallocated+0x4d/0x90 [ 12.483598] mempool_oob_right_helper+0x8a/0x380 [ 12.483843] mempool_slab_oob_right+0xed/0x140 [ 12.484045] kunit_try_run_case+0x1a5/0x480 [ 12.484185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.484351] kthread+0x337/0x6f0 [ 12.484463] ret_from_fork+0x41/0x80 [ 12.484586] ret_from_fork_asm+0x1a/0x30 [ 12.484957] [ 12.485244] The buggy address belongs to the object at ffff888102240240 [ 12.485244] which belongs to the cache test_cache of size 123 [ 12.486426] The buggy address is located 0 bytes to the right of [ 12.486426] allocated 123-byte region [ffff888102240240, ffff8881022402bb) [ 12.487643] [ 12.487863] The buggy address belongs to the physical page: [ 12.488449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 12.489012] flags: 0x200000000000000(node=0|zone=2) [ 12.489188] page_type: f5(slab) [ 12.489305] raw: 0200000000000000 ffff8881019498c0 dead000000000122 0000000000000000 [ 12.489524] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 12.489759] page dumped because: kasan: bad access detected [ 12.490326] [ 12.490510] Memory state around the buggy address: [ 12.491023] ffff888102240180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.491477] ffff888102240200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 12.491708] >ffff888102240280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 12.492520] ^ [ 12.492973] ffff888102240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.493452] ffff888102240380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.493675] ==================================================================