Date
July 8, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.209749] ================================================================== [ 21.209812] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.209866] Read of size 1 at addr fff00000c653e001 by task kunit_try_catch/223 [ 21.209915] [ 21.209947] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.210030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.210056] Hardware name: linux,dummy-virt (DT) [ 21.210101] Call trace: [ 21.210124] show_stack+0x20/0x38 (C) [ 21.210680] dump_stack_lvl+0x8c/0xd0 [ 21.210976] print_report+0x118/0x608 [ 21.211097] kasan_report+0xdc/0x128 [ 21.211236] __asan_report_load1_noabort+0x20/0x30 [ 21.211473] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.211586] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.211839] kunit_try_run_case+0x170/0x3f0 [ 21.211895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.211949] kthread+0x328/0x630 [ 21.212241] ret_from_fork+0x10/0x20 [ 21.212342] [ 21.212363] The buggy address belongs to the physical page: [ 21.212403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c [ 21.212495] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.212791] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.213010] page_type: f8(unknown) [ 21.213056] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.213337] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.213561] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.213613] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.213664] head: 0bfffe0000000002 ffffc1ffc3194f01 00000000ffffffff 00000000ffffffff [ 21.214031] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.214077] page dumped because: kasan: bad access detected [ 21.214232] [ 21.214251] Memory state around the buggy address: [ 21.214343] fff00000c653df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.214560] fff00000c653df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.214834] >fff00000c653e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.214940] ^ [ 21.215112] fff00000c653e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.215323] fff00000c653e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.215451] ================================================================== [ 21.198463] ================================================================== [ 21.198534] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.198608] Read of size 1 at addr fff00000c7706273 by task kunit_try_catch/221 [ 21.198659] [ 21.198702] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.198791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.198817] Hardware name: linux,dummy-virt (DT) [ 21.198851] Call trace: [ 21.198876] show_stack+0x20/0x38 (C) [ 21.198935] dump_stack_lvl+0x8c/0xd0 [ 21.198985] print_report+0x118/0x608 [ 21.199032] kasan_report+0xdc/0x128 [ 21.199075] __asan_report_load1_noabort+0x20/0x30 [ 21.199126] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.199186] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.199233] kunit_try_run_case+0x170/0x3f0 [ 21.199284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.199335] kthread+0x328/0x630 [ 21.199376] ret_from_fork+0x10/0x20 [ 21.199426] [ 21.199446] Allocated by task 221: [ 21.199475] kasan_save_stack+0x3c/0x68 [ 21.199623] kasan_save_track+0x20/0x40 [ 21.199666] kasan_save_alloc_info+0x40/0x58 [ 21.199707] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.199752] remove_element+0x130/0x1f8 [ 21.199791] mempool_alloc_preallocated+0x58/0xc0 [ 21.199829] mempool_oob_right_helper+0x98/0x2f0 [ 21.199869] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.199909] kunit_try_run_case+0x170/0x3f0 [ 21.199947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.199991] kthread+0x328/0x630 [ 21.200024] ret_from_fork+0x10/0x20 [ 21.200062] [ 21.200082] The buggy address belongs to the object at fff00000c7706200 [ 21.200082] which belongs to the cache kmalloc-128 of size 128 [ 21.200142] The buggy address is located 0 bytes to the right of [ 21.200142] allocated 115-byte region [fff00000c7706200, fff00000c7706273) [ 21.200222] [ 21.200244] The buggy address belongs to the physical page: [ 21.200279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107706 [ 21.200336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.200390] page_type: f5(slab) [ 21.200434] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.200483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.200524] page dumped because: kasan: bad access detected [ 21.200556] [ 21.200575] Memory state around the buggy address: [ 21.200607] fff00000c7706100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.200650] fff00000c7706180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200693] >fff00000c7706200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.200730] ^ [ 21.200771] fff00000c7706280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200813] fff00000c7706300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.200852] ================================================================== [ 21.226687] ================================================================== [ 21.226752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 21.226960] Read of size 1 at addr fff00000c76e52bb by task kunit_try_catch/225 [ 21.227182] [ 21.227215] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.228025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.228068] Hardware name: linux,dummy-virt (DT) [ 21.228121] Call trace: [ 21.228146] show_stack+0x20/0x38 (C) [ 21.228231] dump_stack_lvl+0x8c/0xd0 [ 21.228278] print_report+0x118/0x608 [ 21.228324] kasan_report+0xdc/0x128 [ 21.228502] __asan_report_load1_noabort+0x20/0x30 [ 21.228555] mempool_oob_right_helper+0x2ac/0x2f0 [ 21.228706] mempool_slab_oob_right+0xc0/0x118 [ 21.228752] kunit_try_run_case+0x170/0x3f0 [ 21.228812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.229037] kthread+0x328/0x630 [ 21.229108] ret_from_fork+0x10/0x20 [ 21.229258] [ 21.229278] Allocated by task 225: [ 21.229309] kasan_save_stack+0x3c/0x68 [ 21.229353] kasan_save_track+0x20/0x40 [ 21.229392] kasan_save_alloc_info+0x40/0x58 [ 21.229443] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.229488] remove_element+0x16c/0x1f8 [ 21.229765] mempool_alloc_preallocated+0x58/0xc0 [ 21.229824] mempool_oob_right_helper+0x98/0x2f0 [ 21.229863] mempool_slab_oob_right+0xc0/0x118 [ 21.229913] kunit_try_run_case+0x170/0x3f0 [ 21.230138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.230193] kthread+0x328/0x630 [ 21.230227] ret_from_fork+0x10/0x20 [ 21.230272] [ 21.230291] The buggy address belongs to the object at fff00000c76e5240 [ 21.230291] which belongs to the cache test_cache of size 123 [ 21.230351] The buggy address is located 0 bytes to the right of [ 21.230351] allocated 123-byte region [fff00000c76e5240, fff00000c76e52bb) [ 21.230591] [ 21.230614] The buggy address belongs to the physical page: [ 21.230873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e5 [ 21.230980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.231072] page_type: f5(slab) [ 21.231177] raw: 0bfffe0000000000 fff00000c1757b40 dead000000000122 0000000000000000 [ 21.231241] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 21.231283] page dumped because: kasan: bad access detected [ 21.231315] [ 21.231333] Memory state around the buggy address: [ 21.231781] fff00000c76e5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.231934] fff00000c76e5200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.231983] >fff00000c76e5280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.232024] ^ [ 21.232059] fff00000c76e5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.232103] fff00000c76e5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.232142] ==================================================================
[ 14.020321] ================================================================== [ 14.021339] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 14.022228] Read of size 1 at addr ffff888102b9c2bb by task kunit_try_catch/243 [ 14.023158] [ 14.023269] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.023502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.023517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.023539] Call Trace: [ 14.023553] <TASK> [ 14.023571] dump_stack_lvl+0x73/0xb0 [ 14.023619] print_report+0xd1/0x650 [ 14.023643] ? __virt_addr_valid+0x1db/0x2d0 [ 14.023667] ? mempool_oob_right_helper+0x318/0x380 [ 14.023691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.023715] ? mempool_oob_right_helper+0x318/0x380 [ 14.023739] kasan_report+0x141/0x180 [ 14.023761] ? mempool_oob_right_helper+0x318/0x380 [ 14.023790] __asan_report_load1_noabort+0x18/0x20 [ 14.023815] mempool_oob_right_helper+0x318/0x380 [ 14.023843] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.023871] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.023894] ? finish_task_switch.isra.0+0x153/0x700 [ 14.023920] mempool_slab_oob_right+0xed/0x140 [ 14.023946] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 14.023973] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 14.023999] ? __pfx_mempool_free_slab+0x10/0x10 [ 14.024026] ? __pfx_read_tsc+0x10/0x10 [ 14.024047] ? ktime_get_ts64+0x86/0x230 [ 14.024073] kunit_try_run_case+0x1a5/0x480 [ 14.024098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.024120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.024146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.024170] ? __kthread_parkme+0x82/0x180 [ 14.024191] ? preempt_count_sub+0x50/0x80 [ 14.024215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.024239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.024263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.024288] kthread+0x337/0x6f0 [ 14.024307] ? trace_preempt_on+0x20/0xc0 [ 14.024333] ? __pfx_kthread+0x10/0x10 [ 14.024353] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.024375] ? calculate_sigpending+0x7b/0xa0 [ 14.024400] ? __pfx_kthread+0x10/0x10 [ 14.024421] ret_from_fork+0x116/0x1d0 [ 14.024439] ? __pfx_kthread+0x10/0x10 [ 14.024460] ret_from_fork_asm+0x1a/0x30 [ 14.024492] </TASK> [ 14.024503] [ 14.037649] Allocated by task 243: [ 14.037789] kasan_save_stack+0x45/0x70 [ 14.038108] kasan_save_track+0x18/0x40 [ 14.038623] kasan_save_alloc_info+0x3b/0x50 [ 14.039181] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 14.039762] remove_element+0x11e/0x190 [ 14.040241] mempool_alloc_preallocated+0x4d/0x90 [ 14.040728] mempool_oob_right_helper+0x8a/0x380 [ 14.041217] mempool_slab_oob_right+0xed/0x140 [ 14.041653] kunit_try_run_case+0x1a5/0x480 [ 14.042195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.042788] kthread+0x337/0x6f0 [ 14.043031] ret_from_fork+0x116/0x1d0 [ 14.043255] ret_from_fork_asm+0x1a/0x30 [ 14.043396] [ 14.043466] The buggy address belongs to the object at ffff888102b9c240 [ 14.043466] which belongs to the cache test_cache of size 123 [ 14.044439] The buggy address is located 0 bytes to the right of [ 14.044439] allocated 123-byte region [ffff888102b9c240, ffff888102b9c2bb) [ 14.045733] [ 14.045968] The buggy address belongs to the physical page: [ 14.046321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b9c [ 14.046596] flags: 0x200000000000000(node=0|zone=2) [ 14.047135] page_type: f5(slab) [ 14.047464] raw: 0200000000000000 ffff888102b913c0 dead000000000122 0000000000000000 [ 14.048296] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 14.048809] page dumped because: kasan: bad access detected [ 14.049189] [ 14.049368] Memory state around the buggy address: [ 14.049846] ffff888102b9c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.050394] ffff888102b9c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 14.050883] >ffff888102b9c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 14.051631] ^ [ 14.052039] ffff888102b9c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.052442] ffff888102b9c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053016] ================================================================== [ 13.995681] ================================================================== [ 13.996208] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.996520] Read of size 1 at addr ffff88810298a001 by task kunit_try_catch/241 [ 13.996871] [ 13.996974] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.997022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.997034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.997056] Call Trace: [ 13.997070] <TASK> [ 13.997087] dump_stack_lvl+0x73/0xb0 [ 13.997119] print_report+0xd1/0x650 [ 13.997143] ? __virt_addr_valid+0x1db/0x2d0 [ 13.997168] ? mempool_oob_right_helper+0x318/0x380 [ 13.997191] ? kasan_addr_to_slab+0x11/0xa0 [ 13.997212] ? mempool_oob_right_helper+0x318/0x380 [ 13.997236] kasan_report+0x141/0x180 [ 13.997258] ? mempool_oob_right_helper+0x318/0x380 [ 13.997287] __asan_report_load1_noabort+0x18/0x20 [ 13.997312] mempool_oob_right_helper+0x318/0x380 [ 13.997337] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.997362] ? __kasan_check_write+0x18/0x20 [ 13.997382] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.997406] ? finish_task_switch.isra.0+0x153/0x700 [ 13.997434] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.997461] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.997490] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.997554] ? __pfx_mempool_kfree+0x10/0x10 [ 13.997580] ? __pfx_read_tsc+0x10/0x10 [ 13.997614] ? ktime_get_ts64+0x86/0x230 [ 13.997640] kunit_try_run_case+0x1a5/0x480 [ 13.997665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.997687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.997715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.997739] ? __kthread_parkme+0x82/0x180 [ 13.997761] ? preempt_count_sub+0x50/0x80 [ 13.997784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.997808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.997832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.997858] kthread+0x337/0x6f0 [ 13.997877] ? trace_preempt_on+0x20/0xc0 [ 13.997901] ? __pfx_kthread+0x10/0x10 [ 13.997922] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.998300] ? calculate_sigpending+0x7b/0xa0 [ 13.998327] ? __pfx_kthread+0x10/0x10 [ 13.998350] ret_from_fork+0x116/0x1d0 [ 13.998368] ? __pfx_kthread+0x10/0x10 [ 13.998389] ret_from_fork_asm+0x1a/0x30 [ 13.998422] </TASK> [ 13.998434] [ 14.009393] The buggy address belongs to the physical page: [ 14.009777] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988 [ 14.010176] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.010525] flags: 0x200000000000040(head|node=0|zone=2) [ 14.010737] page_type: f8(unknown) [ 14.010891] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.011323] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.011689] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.012143] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.012456] head: 0200000000000002 ffffea00040a6201 00000000ffffffff 00000000ffffffff [ 14.012840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.013256] page dumped because: kasan: bad access detected [ 14.013511] [ 14.013633] Memory state around the buggy address: [ 14.013855] ffff888102989f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.014237] ffff888102989f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.014576] >ffff88810298a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.014901] ^ [ 14.015139] ffff88810298a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.015452] ffff88810298a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.015758] ================================================================== [ 13.969219] ================================================================== [ 13.969797] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.970190] Read of size 1 at addr ffff888102675373 by task kunit_try_catch/239 [ 13.970997] [ 13.971197] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.971247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.971259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.971282] Call Trace: [ 13.971308] <TASK> [ 13.971327] dump_stack_lvl+0x73/0xb0 [ 13.971375] print_report+0xd1/0x650 [ 13.971399] ? __virt_addr_valid+0x1db/0x2d0 [ 13.971424] ? mempool_oob_right_helper+0x318/0x380 [ 13.971447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.971471] ? mempool_oob_right_helper+0x318/0x380 [ 13.971497] kasan_report+0x141/0x180 [ 13.971539] ? mempool_oob_right_helper+0x318/0x380 [ 13.971569] __asan_report_load1_noabort+0x18/0x20 [ 13.971594] mempool_oob_right_helper+0x318/0x380 [ 13.971630] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.971653] ? update_load_avg+0x1be/0x21b0 [ 13.971678] ? dequeue_entities+0x27e/0x1740 [ 13.971703] ? finish_task_switch.isra.0+0x153/0x700 [ 13.971730] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.971754] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.971782] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.971807] ? __pfx_mempool_kfree+0x10/0x10 [ 13.971832] ? __pfx_read_tsc+0x10/0x10 [ 13.971854] ? ktime_get_ts64+0x86/0x230 [ 13.971880] kunit_try_run_case+0x1a5/0x480 [ 13.971907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.971986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.972015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.972039] ? __kthread_parkme+0x82/0x180 [ 13.972062] ? preempt_count_sub+0x50/0x80 [ 13.972085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.972111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.972135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.972160] kthread+0x337/0x6f0 [ 13.972178] ? trace_preempt_on+0x20/0xc0 [ 13.972202] ? __pfx_kthread+0x10/0x10 [ 13.972223] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.972244] ? calculate_sigpending+0x7b/0xa0 [ 13.972269] ? __pfx_kthread+0x10/0x10 [ 13.972290] ret_from_fork+0x116/0x1d0 [ 13.972308] ? __pfx_kthread+0x10/0x10 [ 13.972328] ret_from_fork_asm+0x1a/0x30 [ 13.972361] </TASK> [ 13.972372] [ 13.981947] Allocated by task 239: [ 13.982355] kasan_save_stack+0x45/0x70 [ 13.982510] kasan_save_track+0x18/0x40 [ 13.982709] kasan_save_alloc_info+0x3b/0x50 [ 13.982862] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.983384] remove_element+0x11e/0x190 [ 13.983684] mempool_alloc_preallocated+0x4d/0x90 [ 13.984000] mempool_oob_right_helper+0x8a/0x380 [ 13.984283] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.984509] kunit_try_run_case+0x1a5/0x480 [ 13.984750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.984950] kthread+0x337/0x6f0 [ 13.985069] ret_from_fork+0x116/0x1d0 [ 13.985365] ret_from_fork_asm+0x1a/0x30 [ 13.985653] [ 13.985882] The buggy address belongs to the object at ffff888102675300 [ 13.985882] which belongs to the cache kmalloc-128 of size 128 [ 13.986339] The buggy address is located 0 bytes to the right of [ 13.986339] allocated 115-byte region [ffff888102675300, ffff888102675373) [ 13.987313] [ 13.987409] The buggy address belongs to the physical page: [ 13.987692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102675 [ 13.988131] flags: 0x200000000000000(node=0|zone=2) [ 13.988343] page_type: f5(slab) [ 13.988535] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.988795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.989222] page dumped because: kasan: bad access detected [ 13.989414] [ 13.989483] Memory state around the buggy address: [ 13.989771] ffff888102675200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.990177] ffff888102675280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.990655] >ffff888102675300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.990907] ^ [ 13.991427] ffff888102675380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.991761] ffff888102675400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.992084] ==================================================================