Date
July 10, 2025, 6:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.806154] ================================================================== [ 18.806226] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.806290] Read of size 1 at addr fff00000c7952001 by task kunit_try_catch/223 [ 18.806409] [ 18.806450] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.806535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.806563] Hardware name: linux,dummy-virt (DT) [ 18.806592] Call trace: [ 18.806616] show_stack+0x20/0x38 (C) [ 18.806670] dump_stack_lvl+0x8c/0xd0 [ 18.806719] print_report+0x118/0x608 [ 18.806767] kasan_report+0xdc/0x128 [ 18.806814] __asan_report_load1_noabort+0x20/0x30 [ 18.806867] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.806918] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 18.806971] kunit_try_run_case+0x170/0x3f0 [ 18.807022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.807076] kthread+0x328/0x630 [ 18.807121] ret_from_fork+0x10/0x20 [ 18.807169] [ 18.807192] The buggy address belongs to the physical page: [ 18.807227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107950 [ 18.807283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.807332] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.807404] page_type: f8(unknown) [ 18.807452] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.807503] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.807554] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.807604] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.807654] head: 0bfffe0000000002 ffffc1ffc31e5401 00000000ffffffff 00000000ffffffff [ 18.807703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.807741] page dumped because: kasan: bad access detected [ 18.807773] [ 18.807791] Memory state around the buggy address: [ 18.807824] fff00000c7951f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.807867] fff00000c7951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.807908] >fff00000c7952000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.807947] ^ [ 18.807975] fff00000c7952080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.808017] fff00000c7952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.808054] ================================================================== [ 18.775390] ================================================================== [ 18.775469] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.775546] Read of size 1 at addr fff00000c401eb73 by task kunit_try_catch/221 [ 18.775594] [ 18.775638] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.775727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.775755] Hardware name: linux,dummy-virt (DT) [ 18.775789] Call trace: [ 18.775815] show_stack+0x20/0x38 (C) [ 18.775869] dump_stack_lvl+0x8c/0xd0 [ 18.775922] print_report+0x118/0x608 [ 18.775971] kasan_report+0xdc/0x128 [ 18.776016] __asan_report_load1_noabort+0x20/0x30 [ 18.776069] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.776119] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.776170] kunit_try_run_case+0x170/0x3f0 [ 18.776224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.776281] kthread+0x328/0x630 [ 18.776327] ret_from_fork+0x10/0x20 [ 18.776391] [ 18.776409] Allocated by task 221: [ 18.776440] kasan_save_stack+0x3c/0x68 [ 18.776483] kasan_save_track+0x20/0x40 [ 18.776522] kasan_save_alloc_info+0x40/0x58 [ 18.776563] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.776609] remove_element+0x130/0x1f8 [ 18.776647] mempool_alloc_preallocated+0x58/0xc0 [ 18.776687] mempool_oob_right_helper+0x98/0x2f0 [ 18.776728] mempool_kmalloc_oob_right+0xc4/0x120 [ 18.776769] kunit_try_run_case+0x170/0x3f0 [ 18.776808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.776852] kthread+0x328/0x630 [ 18.776885] ret_from_fork+0x10/0x20 [ 18.776921] [ 18.776941] The buggy address belongs to the object at fff00000c401eb00 [ 18.776941] which belongs to the cache kmalloc-128 of size 128 [ 18.776999] The buggy address is located 0 bytes to the right of [ 18.776999] allocated 115-byte region [fff00000c401eb00, fff00000c401eb73) [ 18.777063] [ 18.777084] The buggy address belongs to the physical page: [ 18.777119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10401e [ 18.777173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.777227] page_type: f5(slab) [ 18.777269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.777319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.777371] page dumped because: kasan: bad access detected [ 18.777402] [ 18.777420] Memory state around the buggy address: [ 18.777454] fff00000c401ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.777497] fff00000c401ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.777539] >fff00000c401eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.777580] ^ [ 18.777619] fff00000c401eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.777660] fff00000c401ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.777698] ================================================================== [ 18.820284] ================================================================== [ 18.820630] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 18.821027] Read of size 1 at addr fff00000c6bf02bb by task kunit_try_catch/225 [ 18.821295] [ 18.821561] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.821967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.822002] Hardware name: linux,dummy-virt (DT) [ 18.822035] Call trace: [ 18.822059] show_stack+0x20/0x38 (C) [ 18.822112] dump_stack_lvl+0x8c/0xd0 [ 18.822163] print_report+0x118/0x608 [ 18.822235] kasan_report+0xdc/0x128 [ 18.822285] __asan_report_load1_noabort+0x20/0x30 [ 18.822583] mempool_oob_right_helper+0x2ac/0x2f0 [ 18.822894] mempool_slab_oob_right+0xc0/0x118 [ 18.822947] kunit_try_run_case+0x170/0x3f0 [ 18.823005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.823084] kthread+0x328/0x630 [ 18.823127] ret_from_fork+0x10/0x20 [ 18.823174] [ 18.823194] Allocated by task 225: [ 18.823437] kasan_save_stack+0x3c/0x68 [ 18.823678] kasan_save_track+0x20/0x40 [ 18.823740] kasan_save_alloc_info+0x40/0x58 [ 18.823781] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.823853] remove_element+0x16c/0x1f8 [ 18.823906] mempool_alloc_preallocated+0x58/0xc0 [ 18.823945] mempool_oob_right_helper+0x98/0x2f0 [ 18.823984] mempool_slab_oob_right+0xc0/0x118 [ 18.824027] kunit_try_run_case+0x170/0x3f0 [ 18.824077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.824123] kthread+0x328/0x630 [ 18.824157] ret_from_fork+0x10/0x20 [ 18.824467] [ 18.824488] The buggy address belongs to the object at fff00000c6bf0240 [ 18.824488] which belongs to the cache test_cache of size 123 [ 18.824848] The buggy address is located 0 bytes to the right of [ 18.824848] allocated 123-byte region [fff00000c6bf0240, fff00000c6bf02bb) [ 18.824989] [ 18.825011] The buggy address belongs to the physical page: [ 18.825148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106bf0 [ 18.825215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.825402] page_type: f5(slab) [ 18.825443] raw: 0bfffe0000000000 fff00000c3e02a00 dead000000000122 0000000000000000 [ 18.825551] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.825749] page dumped because: kasan: bad access detected [ 18.825780] [ 18.825800] Memory state around the buggy address: [ 18.825898] fff00000c6bf0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.825994] fff00000c6bf0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 18.826036] >fff00000c6bf0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 18.826301] ^ [ 18.826353] fff00000c6bf0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.826398] fff00000c6bf0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.826436] ==================================================================
[ 13.925919] ================================================================== [ 13.926577] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.927054] Read of size 1 at addr ffff888102ad2001 by task kunit_try_catch/240 [ 13.927624] [ 13.927759] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.927804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.927914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.927954] Call Trace: [ 13.927968] <TASK> [ 13.927984] dump_stack_lvl+0x73/0xb0 [ 13.928016] print_report+0xd1/0x650 [ 13.928052] ? __virt_addr_valid+0x1db/0x2d0 [ 13.928079] ? mempool_oob_right_helper+0x318/0x380 [ 13.928104] ? kasan_addr_to_slab+0x11/0xa0 [ 13.928127] ? mempool_oob_right_helper+0x318/0x380 [ 13.928153] kasan_report+0x141/0x180 [ 13.928175] ? mempool_oob_right_helper+0x318/0x380 [ 13.928204] __asan_report_load1_noabort+0x18/0x20 [ 13.928229] mempool_oob_right_helper+0x318/0x380 [ 13.928255] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.928281] ? __kasan_check_write+0x18/0x20 [ 13.928301] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.928324] ? finish_task_switch.isra.0+0x153/0x700 [ 13.928351] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.928376] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.928405] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.928429] ? __pfx_mempool_kfree+0x10/0x10 [ 13.928455] ? __pfx_read_tsc+0x10/0x10 [ 13.928478] ? ktime_get_ts64+0x86/0x230 [ 13.928503] kunit_try_run_case+0x1a5/0x480 [ 13.928527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.928550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.928574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.928598] ? __kthread_parkme+0x82/0x180 [ 13.928618] ? preempt_count_sub+0x50/0x80 [ 13.928641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.928665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.928690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.928716] kthread+0x337/0x6f0 [ 13.928735] ? trace_preempt_on+0x20/0xc0 [ 13.928759] ? __pfx_kthread+0x10/0x10 [ 13.928781] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.928803] ? calculate_sigpending+0x7b/0xa0 [ 13.928906] ? __pfx_kthread+0x10/0x10 [ 13.928928] ret_from_fork+0x116/0x1d0 [ 13.928957] ? __pfx_kthread+0x10/0x10 [ 13.928978] ret_from_fork_asm+0x1a/0x30 [ 13.929008] </TASK> [ 13.929018] [ 13.941594] The buggy address belongs to the physical page: [ 13.942458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0 [ 13.942799] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.943275] flags: 0x200000000000040(head|node=0|zone=2) [ 13.943538] page_type: f8(unknown) [ 13.943706] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.944450] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.944756] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.945278] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.945747] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff [ 13.946281] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.946683] page dumped because: kasan: bad access detected [ 13.947124] [ 13.947326] Memory state around the buggy address: [ 13.947693] ffff888102ad1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.948274] ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.948596] >ffff888102ad2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.949086] ^ [ 13.949422] ffff888102ad2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.949780] ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.950263] ================================================================== [ 13.897896] ================================================================== [ 13.898420] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.898767] Read of size 1 at addr ffff888102b0c973 by task kunit_try_catch/238 [ 13.899352] [ 13.899456] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.899507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.899520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.899544] Call Trace: [ 13.899557] <TASK> [ 13.899579] dump_stack_lvl+0x73/0xb0 [ 13.899612] print_report+0xd1/0x650 [ 13.899821] ? __virt_addr_valid+0x1db/0x2d0 [ 13.899850] ? mempool_oob_right_helper+0x318/0x380 [ 13.899875] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.899900] ? mempool_oob_right_helper+0x318/0x380 [ 13.899924] kasan_report+0x141/0x180 [ 13.899953] ? mempool_oob_right_helper+0x318/0x380 [ 13.899981] __asan_report_load1_noabort+0x18/0x20 [ 13.900018] mempool_oob_right_helper+0x318/0x380 [ 13.900055] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.900226] ? __kasan_check_write+0x18/0x20 [ 13.900250] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.900275] ? finish_task_switch.isra.0+0x153/0x700 [ 13.900303] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.900327] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.900355] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.900381] ? __pfx_mempool_kfree+0x10/0x10 [ 13.900406] ? __pfx_read_tsc+0x10/0x10 [ 13.900430] ? ktime_get_ts64+0x86/0x230 [ 13.900456] kunit_try_run_case+0x1a5/0x480 [ 13.900483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.900506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.900531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.900555] ? __kthread_parkme+0x82/0x180 [ 13.900577] ? preempt_count_sub+0x50/0x80 [ 13.900600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.900624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.900650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.900675] kthread+0x337/0x6f0 [ 13.900696] ? __pfx_kthread+0x10/0x10 [ 13.900715] ? recalc_sigpending+0x168/0x1f0 [ 13.900738] ? calculate_sigpending+0x7b/0xa0 [ 13.900761] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.900783] ? __x86_indirect_its_thunk_r15+0x80/0x80 [ 13.900810] ? __pfx_kthread+0x10/0x10 [ 13.900831] ret_from_fork+0x116/0x1d0 [ 13.900851] ? __pfx_kthread+0x10/0x10 [ 13.900871] ret_from_fork_asm+0x1a/0x30 [ 13.900903] </TASK> [ 13.900914] [ 13.913454] Allocated by task 238: [ 13.913640] kasan_save_stack+0x45/0x70 [ 13.913791] kasan_save_track+0x18/0x40 [ 13.913977] kasan_save_alloc_info+0x3b/0x50 [ 13.914244] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.914423] remove_element+0x11e/0x190 [ 13.914690] mempool_alloc_preallocated+0x4d/0x90 [ 13.915041] mempool_oob_right_helper+0x8a/0x380 [ 13.915230] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.915465] kunit_try_run_case+0x1a5/0x480 [ 13.915643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.915959] kthread+0x337/0x6f0 [ 13.916110] ret_from_fork+0x116/0x1d0 [ 13.916289] ret_from_fork_asm+0x1a/0x30 [ 13.916430] [ 13.916500] The buggy address belongs to the object at ffff888102b0c900 [ 13.916500] which belongs to the cache kmalloc-128 of size 128 [ 13.917099] The buggy address is located 0 bytes to the right of [ 13.917099] allocated 115-byte region [ffff888102b0c900, ffff888102b0c973) [ 13.917778] [ 13.917924] The buggy address belongs to the physical page: [ 13.918367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0c [ 13.918652] flags: 0x200000000000000(node=0|zone=2) [ 13.918905] page_type: f5(slab) [ 13.919084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.919339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.919642] page dumped because: kasan: bad access detected [ 13.919889] [ 13.919980] Memory state around the buggy address: [ 13.920174] ffff888102b0c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.920493] ffff888102b0c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.920727] >ffff888102b0c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.920995] ^ [ 13.921310] ffff888102b0c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.921710] ffff888102b0ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.922064] ================================================================== [ 13.954754] ================================================================== [ 13.955561] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.956166] Read of size 1 at addr ffff8881027ad2bb by task kunit_try_catch/242 [ 13.956672] [ 13.956815] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.957020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.957051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.957073] Call Trace: [ 13.957086] <TASK> [ 13.957104] dump_stack_lvl+0x73/0xb0 [ 13.957139] print_report+0xd1/0x650 [ 13.957161] ? __virt_addr_valid+0x1db/0x2d0 [ 13.957186] ? mempool_oob_right_helper+0x318/0x380 [ 13.957210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.957233] ? mempool_oob_right_helper+0x318/0x380 [ 13.957257] kasan_report+0x141/0x180 [ 13.957279] ? mempool_oob_right_helper+0x318/0x380 [ 13.957307] __asan_report_load1_noabort+0x18/0x20 [ 13.957332] mempool_oob_right_helper+0x318/0x380 [ 13.957357] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.957385] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.957409] ? finish_task_switch.isra.0+0x153/0x700 [ 13.957435] mempool_slab_oob_right+0xed/0x140 [ 13.957460] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.957488] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.957513] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.957540] ? __pfx_read_tsc+0x10/0x10 [ 13.957561] ? ktime_get_ts64+0x86/0x230 [ 13.957585] kunit_try_run_case+0x1a5/0x480 [ 13.957611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.957634] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.957658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.957682] ? __kthread_parkme+0x82/0x180 [ 13.957703] ? preempt_count_sub+0x50/0x80 [ 13.957726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.957751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.957775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.957801] kthread+0x337/0x6f0 [ 13.957912] ? trace_preempt_on+0x20/0xc0 [ 13.957939] ? __pfx_kthread+0x10/0x10 [ 13.957959] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.957981] ? calculate_sigpending+0x7b/0xa0 [ 13.958006] ? __pfx_kthread+0x10/0x10 [ 13.958040] ret_from_fork+0x116/0x1d0 [ 13.958058] ? __pfx_kthread+0x10/0x10 [ 13.958080] ret_from_fork_asm+0x1a/0x30 [ 13.958111] </TASK> [ 13.958122] [ 13.970525] Allocated by task 242: [ 13.970683] kasan_save_stack+0x45/0x70 [ 13.971127] kasan_save_track+0x18/0x40 [ 13.971451] kasan_save_alloc_info+0x3b/0x50 [ 13.971696] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.972171] remove_element+0x11e/0x190 [ 13.972490] mempool_alloc_preallocated+0x4d/0x90 [ 13.972734] mempool_oob_right_helper+0x8a/0x380 [ 13.973208] mempool_slab_oob_right+0xed/0x140 [ 13.973431] kunit_try_run_case+0x1a5/0x480 [ 13.973706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.974186] kthread+0x337/0x6f0 [ 13.974325] ret_from_fork+0x116/0x1d0 [ 13.974693] ret_from_fork_asm+0x1a/0x30 [ 13.974908] [ 13.975109] The buggy address belongs to the object at ffff8881027ad240 [ 13.975109] which belongs to the cache test_cache of size 123 [ 13.975576] The buggy address is located 0 bytes to the right of [ 13.975576] allocated 123-byte region [ffff8881027ad240, ffff8881027ad2bb) [ 13.976438] [ 13.976542] The buggy address belongs to the physical page: [ 13.977055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027ad [ 13.977520] flags: 0x200000000000000(node=0|zone=2) [ 13.977821] page_type: f5(slab) [ 13.978194] raw: 0200000000000000 ffff8881027a43c0 dead000000000122 0000000000000000 [ 13.978478] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.978711] page dumped because: kasan: bad access detected [ 13.978895] [ 13.978967] Memory state around the buggy address: [ 13.979243] ffff8881027ad180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.979737] ffff8881027ad200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.980444] >ffff8881027ad280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.980948] ^ [ 13.981331] ffff8881027ad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.981549] ffff8881027ad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.981763] ==================================================================