Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.884210] ================================================================== [ 19.884269] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.884319] Read of size 1 at addr fff00000c774e001 by task kunit_try_catch/223 [ 19.884374] [ 19.884404] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.884488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.884514] Hardware name: linux,dummy-virt (DT) [ 19.884544] Call trace: [ 19.884567] show_stack+0x20/0x38 (C) [ 19.884615] dump_stack_lvl+0x8c/0xd0 [ 19.884661] print_report+0x118/0x608 [ 19.884707] kasan_report+0xdc/0x128 [ 19.884751] __asan_report_load1_noabort+0x20/0x30 [ 19.884801] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.884848] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 19.884897] kunit_try_run_case+0x170/0x3f0 [ 19.884943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.884993] kthread+0x328/0x630 [ 19.885038] ret_from_fork+0x10/0x20 [ 19.885086] [ 19.885106] The buggy address belongs to the physical page: [ 19.885312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 19.885383] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.885432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.885526] page_type: f8(unknown) [ 19.885564] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.885613] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.885662] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.885708] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.885784] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 19.885847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.885886] page dumped because: kasan: bad access detected [ 19.885917] [ 19.885935] Memory state around the buggy address: [ 19.885966] fff00000c774df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.886008] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.886048] >fff00000c774e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.886090] ^ [ 19.886131] fff00000c774e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.886183] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.886318] ================================================================== [ 19.876013] ================================================================== [ 19.876093] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.876187] Read of size 1 at addr fff00000c1718973 by task kunit_try_catch/221 [ 19.876238] [ 19.876279] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.876371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876398] Hardware name: linux,dummy-virt (DT) [ 19.876433] Call trace: [ 19.876458] show_stack+0x20/0x38 (C) [ 19.876512] dump_stack_lvl+0x8c/0xd0 [ 19.876562] print_report+0x118/0x608 [ 19.876609] kasan_report+0xdc/0x128 [ 19.876656] __asan_report_load1_noabort+0x20/0x30 [ 19.876706] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.876753] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.876802] kunit_try_run_case+0x170/0x3f0 [ 19.876852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.876903] kthread+0x328/0x630 [ 19.876949] ret_from_fork+0x10/0x20 [ 19.876998] [ 19.877017] Allocated by task 221: [ 19.877047] kasan_save_stack+0x3c/0x68 [ 19.877088] kasan_save_track+0x20/0x40 [ 19.877126] kasan_save_alloc_info+0x40/0x58 [ 19.877176] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.877218] remove_element+0x130/0x1f8 [ 19.877255] mempool_alloc_preallocated+0x58/0xc0 [ 19.877293] mempool_oob_right_helper+0x98/0x2f0 [ 19.877330] mempool_kmalloc_oob_right+0xc4/0x120 [ 19.877367] kunit_try_run_case+0x170/0x3f0 [ 19.877406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.877449] kthread+0x328/0x630 [ 19.877483] ret_from_fork+0x10/0x20 [ 19.877520] [ 19.877540] The buggy address belongs to the object at fff00000c1718900 [ 19.877540] which belongs to the cache kmalloc-128 of size 128 [ 19.877597] The buggy address is located 0 bytes to the right of [ 19.877597] allocated 115-byte region [fff00000c1718900, fff00000c1718973) [ 19.877659] [ 19.877681] The buggy address belongs to the physical page: [ 19.877713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101718 [ 19.877767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.877820] page_type: f5(slab) [ 19.877860] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.877909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.877950] page dumped because: kasan: bad access detected [ 19.877982] [ 19.878001] Memory state around the buggy address: [ 19.878035] fff00000c1718800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.878077] fff00000c1718880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.878119] >fff00000c1718900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.878166] ^ [ 19.878204] fff00000c1718980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.878245] fff00000c1718a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.878284] ================================================================== [ 19.897281] ================================================================== [ 19.897342] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 19.897405] Read of size 1 at addr fff00000c76702bb by task kunit_try_catch/225 [ 19.897454] [ 19.897486] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.897581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.897664] Hardware name: linux,dummy-virt (DT) [ 19.897707] Call trace: [ 19.897731] show_stack+0x20/0x38 (C) [ 19.897792] dump_stack_lvl+0x8c/0xd0 [ 19.898044] print_report+0x118/0x608 [ 19.898111] kasan_report+0xdc/0x128 [ 19.898226] __asan_report_load1_noabort+0x20/0x30 [ 19.898346] mempool_oob_right_helper+0x2ac/0x2f0 [ 19.898479] mempool_slab_oob_right+0xc0/0x118 [ 19.898582] kunit_try_run_case+0x170/0x3f0 [ 19.898664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899690] kthread+0x328/0x630 [ 19.899794] ret_from_fork+0x10/0x20 [ 19.899945] [ 19.899995] Allocated by task 225: [ 19.900184] kasan_save_stack+0x3c/0x68 [ 19.900233] kasan_save_track+0x20/0x40 [ 19.900303] kasan_save_alloc_info+0x40/0x58 [ 19.900607] __kasan_mempool_unpoison_object+0xbc/0x180 [ 19.900659] remove_element+0x16c/0x1f8 [ 19.900697] mempool_alloc_preallocated+0x58/0xc0 [ 19.901064] mempool_oob_right_helper+0x98/0x2f0 [ 19.901179] mempool_slab_oob_right+0xc0/0x118 [ 19.901226] kunit_try_run_case+0x170/0x3f0 [ 19.901264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.901557] kthread+0x328/0x630 [ 19.901720] ret_from_fork+0x10/0x20 [ 19.902001] [ 19.902029] The buggy address belongs to the object at fff00000c7670240 [ 19.902029] which belongs to the cache test_cache of size 123 [ 19.902103] The buggy address is located 0 bytes to the right of [ 19.902103] allocated 123-byte region [fff00000c7670240, fff00000c76702bb) [ 19.902177] [ 19.902199] The buggy address belongs to the physical page: [ 19.902690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107670 [ 19.902995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.903314] page_type: f5(slab) [ 19.903522] raw: 0bfffe0000000000 fff00000c17368c0 dead000000000122 0000000000000000 [ 19.903596] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 19.903638] page dumped because: kasan: bad access detected [ 19.904020] [ 19.904040] Memory state around the buggy address: [ 19.904143] fff00000c7670180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.904196] fff00000c7670200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 19.904239] >fff00000c7670280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 19.904276] ^ [ 19.904579] fff00000c7670300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904840] fff00000c7670380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.904884] ==================================================================
[ 15.690966] ================================================================== [ 15.691410] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.691928] Read of size 1 at addr ffff888102b682bb by task kunit_try_catch/243 [ 15.692667] [ 15.692924] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.693344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.693382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.693451] Call Trace: [ 15.693479] <TASK> [ 15.693520] dump_stack_lvl+0x73/0xb0 [ 15.693631] print_report+0xd1/0x650 [ 15.693678] ? __virt_addr_valid+0x1db/0x2d0 [ 15.693725] ? mempool_oob_right_helper+0x318/0x380 [ 15.693769] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.693812] ? mempool_oob_right_helper+0x318/0x380 [ 15.693855] kasan_report+0x141/0x180 [ 15.693896] ? mempool_oob_right_helper+0x318/0x380 [ 15.693933] __asan_report_load1_noabort+0x18/0x20 [ 15.693956] mempool_oob_right_helper+0x318/0x380 [ 15.693984] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.694014] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.694042] ? finish_task_switch.isra.0+0x153/0x700 [ 15.694073] mempool_slab_oob_right+0xed/0x140 [ 15.694098] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 15.694125] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 15.694149] ? __pfx_mempool_free_slab+0x10/0x10 [ 15.694174] ? __pfx_read_tsc+0x10/0x10 [ 15.694197] ? ktime_get_ts64+0x86/0x230 [ 15.694248] kunit_try_run_case+0x1a5/0x480 [ 15.694280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.694306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.694341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.694376] ? __kthread_parkme+0x82/0x180 [ 15.694403] ? preempt_count_sub+0x50/0x80 [ 15.694430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.694462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.694534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.694580] kthread+0x337/0x6f0 [ 15.694614] ? trace_preempt_on+0x20/0xc0 [ 15.694654] ? __pfx_kthread+0x10/0x10 [ 15.694676] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.694698] ? calculate_sigpending+0x7b/0xa0 [ 15.694724] ? __pfx_kthread+0x10/0x10 [ 15.694747] ret_from_fork+0x116/0x1d0 [ 15.694766] ? __pfx_kthread+0x10/0x10 [ 15.694788] ret_from_fork_asm+0x1a/0x30 [ 15.694822] </TASK> [ 15.694835] [ 15.706611] Allocated by task 243: [ 15.706905] kasan_save_stack+0x45/0x70 [ 15.707247] kasan_save_track+0x18/0x40 [ 15.707549] kasan_save_alloc_info+0x3b/0x50 [ 15.707857] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 15.708754] remove_element+0x11e/0x190 [ 15.709054] mempool_alloc_preallocated+0x4d/0x90 [ 15.709352] mempool_oob_right_helper+0x8a/0x380 [ 15.709805] mempool_slab_oob_right+0xed/0x140 [ 15.710133] kunit_try_run_case+0x1a5/0x480 [ 15.710426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.710937] kthread+0x337/0x6f0 [ 15.711198] ret_from_fork+0x116/0x1d0 [ 15.711414] ret_from_fork_asm+0x1a/0x30 [ 15.712109] [ 15.712254] The buggy address belongs to the object at ffff888102b68240 [ 15.712254] which belongs to the cache test_cache of size 123 [ 15.713076] The buggy address is located 0 bytes to the right of [ 15.713076] allocated 123-byte region [ffff888102b68240, ffff888102b682bb) [ 15.713704] [ 15.713859] The buggy address belongs to the physical page: [ 15.714234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b68 [ 15.714924] flags: 0x200000000000000(node=0|zone=2) [ 15.715164] page_type: f5(slab) [ 15.715444] raw: 0200000000000000 ffff8881009b3c80 dead000000000122 0000000000000000 [ 15.716190] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 15.716847] page dumped because: kasan: bad access detected [ 15.717092] [ 15.717195] Memory state around the buggy address: [ 15.717699] ffff888102b68180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.718111] ffff888102b68200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 15.718648] >ffff888102b68280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 15.719048] ^ [ 15.719299] ffff888102b68300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720167] ffff888102b68380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720741] ================================================================== [ 15.660100] ================================================================== [ 15.660553] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.661334] Read of size 1 at addr ffff888103c2a001 by task kunit_try_catch/241 [ 15.662112] [ 15.662303] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.662414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.662433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.662460] Call Trace: [ 15.662486] <TASK> [ 15.662515] dump_stack_lvl+0x73/0xb0 [ 15.662556] print_report+0xd1/0x650 [ 15.662580] ? __virt_addr_valid+0x1db/0x2d0 [ 15.662605] ? mempool_oob_right_helper+0x318/0x380 [ 15.662628] ? kasan_addr_to_slab+0x11/0xa0 [ 15.662648] ? mempool_oob_right_helper+0x318/0x380 [ 15.662670] kasan_report+0x141/0x180 [ 15.662691] ? mempool_oob_right_helper+0x318/0x380 [ 15.662718] __asan_report_load1_noabort+0x18/0x20 [ 15.662737] mempool_oob_right_helper+0x318/0x380 [ 15.662761] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.662786] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.662810] ? finish_task_switch.isra.0+0x153/0x700 [ 15.662836] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 15.662859] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 15.662884] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.662906] ? __pfx_mempool_kfree+0x10/0x10 [ 15.662927] ? __pfx_read_tsc+0x10/0x10 [ 15.662948] ? ktime_get_ts64+0x86/0x230 [ 15.662973] kunit_try_run_case+0x1a5/0x480 [ 15.662999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.663019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.663042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.663064] ? __kthread_parkme+0x82/0x180 [ 15.663085] ? preempt_count_sub+0x50/0x80 [ 15.663107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.663129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.663151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.663173] kthread+0x337/0x6f0 [ 15.663192] ? trace_preempt_on+0x20/0xc0 [ 15.663214] ? __pfx_kthread+0x10/0x10 [ 15.663261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.663431] ? calculate_sigpending+0x7b/0xa0 [ 15.663575] ? __pfx_kthread+0x10/0x10 [ 15.663621] ret_from_fork+0x116/0x1d0 [ 15.663663] ? __pfx_kthread+0x10/0x10 [ 15.663707] ret_from_fork_asm+0x1a/0x30 [ 15.663791] </TASK> [ 15.663817] [ 15.674855] The buggy address belongs to the physical page: [ 15.675313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c28 [ 15.675830] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.676563] flags: 0x200000000000040(head|node=0|zone=2) [ 15.676922] page_type: f8(unknown) [ 15.677264] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.677886] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.678340] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.678782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.679179] head: 0200000000000002 ffffea00040f0a01 00000000ffffffff 00000000ffffffff [ 15.679681] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.679940] page dumped because: kasan: bad access detected [ 15.680133] [ 15.680315] Memory state around the buggy address: [ 15.680747] ffff888103c29f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.681385] ffff888103c29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.681865] >ffff888103c2a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.682371] ^ [ 15.682546] ffff888103c2a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.683151] ffff888103c2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.683693] ================================================================== [ 15.625661] ================================================================== [ 15.626110] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.626869] Read of size 1 at addr ffff888102b5b373 by task kunit_try_catch/239 [ 15.627435] [ 15.628046] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.628169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.628194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.628250] Call Trace: [ 15.628292] <TASK> [ 15.628384] dump_stack_lvl+0x73/0xb0 [ 15.628560] print_report+0xd1/0x650 [ 15.628628] ? __virt_addr_valid+0x1db/0x2d0 [ 15.628674] ? mempool_oob_right_helper+0x318/0x380 [ 15.628704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.628727] ? mempool_oob_right_helper+0x318/0x380 [ 15.628751] kasan_report+0x141/0x180 [ 15.628773] ? mempool_oob_right_helper+0x318/0x380 [ 15.628802] __asan_report_load1_noabort+0x18/0x20 [ 15.628823] mempool_oob_right_helper+0x318/0x380 [ 15.628848] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.628875] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.628899] ? irqentry_exit+0x2a/0x60 [ 15.628922] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.628949] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.628973] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.629001] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.629022] ? __pfx_mempool_kfree+0x10/0x10 [ 15.629043] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.629069] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.629094] kunit_try_run_case+0x1a5/0x480 [ 15.629121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.629142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.629165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.629187] ? __kthread_parkme+0x82/0x180 [ 15.629210] ? preempt_count_sub+0x50/0x80 [ 15.629257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.629283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.629307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.629329] kthread+0x337/0x6f0 [ 15.629349] ? trace_preempt_on+0x20/0xc0 [ 15.629372] ? __pfx_kthread+0x10/0x10 [ 15.629392] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.629414] ? calculate_sigpending+0x7b/0xa0 [ 15.629440] ? __pfx_kthread+0x10/0x10 [ 15.629476] ret_from_fork+0x116/0x1d0 [ 15.629523] ? __pfx_kthread+0x10/0x10 [ 15.629557] ret_from_fork_asm+0x1a/0x30 [ 15.629610] </TASK> [ 15.629630] [ 15.639245] Allocated by task 239: [ 15.639428] kasan_save_stack+0x45/0x70 [ 15.639639] kasan_save_track+0x18/0x40 [ 15.639936] kasan_save_alloc_info+0x3b/0x50 [ 15.640340] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.640769] remove_element+0x11e/0x190 [ 15.641071] mempool_alloc_preallocated+0x4d/0x90 [ 15.641318] mempool_oob_right_helper+0x8a/0x380 [ 15.641504] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.641696] kunit_try_run_case+0x1a5/0x480 [ 15.642011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.642395] kthread+0x337/0x6f0 [ 15.642678] ret_from_fork+0x116/0x1d0 [ 15.642940] ret_from_fork_asm+0x1a/0x30 [ 15.643114] [ 15.643414] The buggy address belongs to the object at ffff888102b5b300 [ 15.643414] which belongs to the cache kmalloc-128 of size 128 [ 15.644881] The buggy address is located 0 bytes to the right of [ 15.644881] allocated 115-byte region [ffff888102b5b300, ffff888102b5b373) [ 15.645518] [ 15.645826] The buggy address belongs to the physical page: [ 15.646134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b5b [ 15.646780] flags: 0x200000000000000(node=0|zone=2) [ 15.647129] page_type: f5(slab) [ 15.647432] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.647732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.647988] page dumped because: kasan: bad access detected [ 15.648187] [ 15.648560] Memory state around the buggy address: [ 15.648925] ffff888102b5b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.649403] ffff888102b5b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.650416] >ffff888102b5b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.651004] ^ [ 15.651264] ffff888102b5b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.651735] ffff888102b5b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.652267] ==================================================================