Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.180529] ================================================================== [ 33.180949] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.181022] Read of size 1 at addr fff00000c9b2e001 by task kunit_try_catch/254 [ 33.181112] [ 33.181146] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.181243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.181268] Hardware name: linux,dummy-virt (DT) [ 33.181301] Call trace: [ 33.181324] show_stack+0x20/0x38 (C) [ 33.181372] dump_stack_lvl+0x8c/0xd0 [ 33.181418] print_report+0x118/0x5d0 [ 33.181641] kasan_report+0xdc/0x128 [ 33.181870] __asan_report_load1_noabort+0x20/0x30 [ 33.181924] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.181972] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.182404] kunit_try_run_case+0x170/0x3f0 [ 33.182485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.182760] kthread+0x328/0x630 [ 33.182989] ret_from_fork+0x10/0x20 [ 33.183315] [ 33.183471] The buggy address belongs to the physical page: [ 33.183634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c [ 33.183866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.184340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.184406] page_type: f8(unknown) [ 33.184493] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.184544] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.185013] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.185093] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.185145] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff [ 33.185193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.185242] page dumped because: kasan: bad access detected [ 33.185276] [ 33.185295] Memory state around the buggy address: [ 33.185327] fff00000c9b2df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.185774] fff00000c9b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.186038] >fff00000c9b2e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.186086] ^ [ 33.186410] fff00000c9b2e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.186473] fff00000c9b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.186511] ================================================================== [ 33.204005] ================================================================== [ 33.204091] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.204293] Read of size 1 at addr fff00000c9add2bb by task kunit_try_catch/256 [ 33.204447] [ 33.204487] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.204638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.204666] Hardware name: linux,dummy-virt (DT) [ 33.204860] Call trace: [ 33.205255] show_stack+0x20/0x38 (C) [ 33.205352] dump_stack_lvl+0x8c/0xd0 [ 33.205596] print_report+0x118/0x5d0 [ 33.205778] kasan_report+0xdc/0x128 [ 33.206002] __asan_report_load1_noabort+0x20/0x30 [ 33.206117] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.206347] mempool_slab_oob_right+0xc0/0x118 [ 33.206445] kunit_try_run_case+0x170/0x3f0 [ 33.206529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.206803] kthread+0x328/0x630 [ 33.206967] ret_from_fork+0x10/0x20 [ 33.207084] [ 33.207117] Allocated by task 256: [ 33.207154] kasan_save_stack+0x3c/0x68 [ 33.207233] kasan_save_track+0x20/0x40 [ 33.207273] kasan_save_alloc_info+0x40/0x58 [ 33.207311] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.207355] remove_element+0x16c/0x1f8 [ 33.207401] mempool_alloc_preallocated+0x58/0xc0 [ 33.207442] mempool_oob_right_helper+0x98/0x2f0 [ 33.207490] mempool_slab_oob_right+0xc0/0x118 [ 33.207532] kunit_try_run_case+0x170/0x3f0 [ 33.207579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.207632] kthread+0x328/0x630 [ 33.207671] ret_from_fork+0x10/0x20 [ 33.207717] [ 33.207746] The buggy address belongs to the object at fff00000c9add240 [ 33.207746] which belongs to the cache test_cache of size 123 [ 33.207814] The buggy address is located 0 bytes to the right of [ 33.207814] allocated 123-byte region [fff00000c9add240, fff00000c9add2bb) [ 33.207877] [ 33.207904] The buggy address belongs to the physical page: [ 33.207954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109add [ 33.208014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.208075] page_type: f5(slab) [ 33.208116] raw: 0bfffe0000000000 fff00000c9ad53c0 dead000000000122 0000000000000000 [ 33.208171] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.208401] page dumped because: kasan: bad access detected [ 33.208493] [ 33.208732] Memory state around the buggy address: [ 33.208945] fff00000c9add180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.209096] fff00000c9add200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 33.209167] >fff00000c9add280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 33.209372] ^ [ 33.209417] fff00000c9add300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.209462] fff00000c9add380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.209501] ================================================================== [ 33.171428] ================================================================== [ 33.171503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.171578] Read of size 1 at addr fff00000c9a9cb73 by task kunit_try_catch/252 [ 33.171629] [ 33.171671] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.171760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.171786] Hardware name: linux,dummy-virt (DT) [ 33.171820] Call trace: [ 33.171846] show_stack+0x20/0x38 (C) [ 33.171899] dump_stack_lvl+0x8c/0xd0 [ 33.171949] print_report+0x118/0x5d0 [ 33.171998] kasan_report+0xdc/0x128 [ 33.172045] __asan_report_load1_noabort+0x20/0x30 [ 33.172093] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.172142] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.172192] kunit_try_run_case+0x170/0x3f0 [ 33.172261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.172315] kthread+0x328/0x630 [ 33.172358] ret_from_fork+0x10/0x20 [ 33.172408] [ 33.172427] Allocated by task 252: [ 33.172458] kasan_save_stack+0x3c/0x68 [ 33.172500] kasan_save_track+0x20/0x40 [ 33.172548] kasan_save_alloc_info+0x40/0x58 [ 33.172616] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.172680] remove_element+0x130/0x1f8 [ 33.172721] mempool_alloc_preallocated+0x58/0xc0 [ 33.172762] mempool_oob_right_helper+0x98/0x2f0 [ 33.172801] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.172843] kunit_try_run_case+0x170/0x3f0 [ 33.172881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.172927] kthread+0x328/0x630 [ 33.172970] ret_from_fork+0x10/0x20 [ 33.173006] [ 33.173026] The buggy address belongs to the object at fff00000c9a9cb00 [ 33.173026] which belongs to the cache kmalloc-128 of size 128 [ 33.173086] The buggy address is located 0 bytes to the right of [ 33.173086] allocated 115-byte region [fff00000c9a9cb00, fff00000c9a9cb73) [ 33.173151] [ 33.173174] The buggy address belongs to the physical page: [ 33.173219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 33.173277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.173329] page_type: f5(slab) [ 33.173372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.173422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.173464] page dumped because: kasan: bad access detected [ 33.173495] [ 33.173515] Memory state around the buggy address: [ 33.173547] fff00000c9a9ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.173595] fff00000c9a9ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.173641] >fff00000c9a9cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.173680] ^ [ 33.173720] fff00000c9a9cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.173763] fff00000c9a9cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.173802] ==================================================================
[ 24.838643] ================================================================== [ 24.839562] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.840044] Read of size 1 at addr ffff88810632e001 by task kunit_try_catch/271 [ 24.840398] [ 24.840492] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 24.840804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.840832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.840855] Call Trace: [ 24.840871] <TASK> [ 24.840891] dump_stack_lvl+0x73/0xb0 [ 24.840922] print_report+0xd1/0x610 [ 24.840946] ? __virt_addr_valid+0x1db/0x2d0 [ 24.840973] ? mempool_oob_right_helper+0x318/0x380 [ 24.840998] ? kasan_addr_to_slab+0x11/0xa0 [ 24.841019] ? mempool_oob_right_helper+0x318/0x380 [ 24.841044] kasan_report+0x141/0x180 [ 24.841067] ? mempool_oob_right_helper+0x318/0x380 [ 24.841097] __asan_report_load1_noabort+0x18/0x20 [ 24.841124] mempool_oob_right_helper+0x318/0x380 [ 24.841150] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.841178] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.841207] ? finish_task_switch.isra.0+0x153/0x700 [ 24.841235] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 24.841286] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 24.841324] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.841363] ? __pfx_mempool_kfree+0x10/0x10 [ 24.841391] ? __pfx_read_tsc+0x10/0x10 [ 24.841418] ? ktime_get_ts64+0x86/0x230 [ 24.841446] kunit_try_run_case+0x1a5/0x480 [ 24.841469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.841491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.841513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.841542] ? __kthread_parkme+0x82/0x180 [ 24.841565] ? preempt_count_sub+0x50/0x80 [ 24.841589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.841612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.841639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.841667] kthread+0x337/0x6f0 [ 24.841689] ? trace_preempt_on+0x20/0xc0 [ 24.841715] ? __pfx_kthread+0x10/0x10 [ 24.841738] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.841778] ? calculate_sigpending+0x7b/0xa0 [ 24.841805] ? __pfx_kthread+0x10/0x10 [ 24.841835] ret_from_fork+0x116/0x1d0 [ 24.841856] ? __pfx_kthread+0x10/0x10 [ 24.841878] ret_from_fork_asm+0x1a/0x30 [ 24.841913] </TASK> [ 24.841926] [ 24.853165] The buggy address belongs to the physical page: [ 24.853490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10632c [ 24.853964] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.854331] flags: 0x200000000000040(head|node=0|zone=2) [ 24.854863] page_type: f8(unknown) [ 24.855049] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.855408] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.855727] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.856320] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 24.856747] head: 0200000000000002 ffffea000418cb01 00000000ffffffff 00000000ffffffff [ 24.857333] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.857740] page dumped because: kasan: bad access detected [ 24.858190] [ 24.858307] Memory state around the buggy address: [ 24.858677] ffff88810632df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.859156] ffff88810632df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.859595] >ffff88810632e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.860108] ^ [ 24.860301] ffff88810632e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.860710] ffff88810632e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 24.861144] ================================================================== [ 24.865685] ================================================================== [ 24.866252] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.866868] Read of size 1 at addr ffff88810620e2bb by task kunit_try_catch/273 [ 24.867345] [ 24.867609] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 24.867670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.867684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.867710] Call Trace: [ 24.867787] <TASK> [ 24.867812] dump_stack_lvl+0x73/0xb0 [ 24.867850] print_report+0xd1/0x610 [ 24.867890] ? __virt_addr_valid+0x1db/0x2d0 [ 24.867919] ? mempool_oob_right_helper+0x318/0x380 [ 24.867944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.867973] ? mempool_oob_right_helper+0x318/0x380 [ 24.867999] kasan_report+0x141/0x180 [ 24.868024] ? mempool_oob_right_helper+0x318/0x380 [ 24.868055] __asan_report_load1_noabort+0x18/0x20 [ 24.868085] mempool_oob_right_helper+0x318/0x380 [ 24.868112] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.868139] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.868165] ? finish_task_switch.isra.0+0x153/0x700 [ 24.868194] mempool_slab_oob_right+0xed/0x140 [ 24.868220] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 24.868261] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 24.868290] ? __pfx_mempool_free_slab+0x10/0x10 [ 24.868319] ? __pfx_read_tsc+0x10/0x10 [ 24.868346] ? ktime_get_ts64+0x86/0x230 [ 24.868374] kunit_try_run_case+0x1a5/0x480 [ 24.868401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.868422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.868445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.868476] ? __kthread_parkme+0x82/0x180 [ 24.868498] ? preempt_count_sub+0x50/0x80 [ 24.868523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.868545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.868573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.868601] kthread+0x337/0x6f0 [ 24.868624] ? trace_preempt_on+0x20/0xc0 [ 24.868650] ? __pfx_kthread+0x10/0x10 [ 24.868672] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.868700] ? calculate_sigpending+0x7b/0xa0 [ 24.868729] ? __pfx_kthread+0x10/0x10 [ 24.868808] ret_from_fork+0x116/0x1d0 [ 24.868844] ? __pfx_kthread+0x10/0x10 [ 24.868868] ret_from_fork_asm+0x1a/0x30 [ 24.868906] </TASK> [ 24.868920] [ 24.879615] Allocated by task 273: [ 24.880290] kasan_save_stack+0x45/0x70 [ 24.880508] kasan_save_track+0x18/0x40 [ 24.880643] kasan_save_alloc_info+0x3b/0x50 [ 24.881099] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 24.881421] remove_element+0x11e/0x190 [ 24.881605] mempool_alloc_preallocated+0x4d/0x90 [ 24.882059] mempool_oob_right_helper+0x8a/0x380 [ 24.882298] mempool_slab_oob_right+0xed/0x140 [ 24.882566] kunit_try_run_case+0x1a5/0x480 [ 24.882756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.883251] kthread+0x337/0x6f0 [ 24.883490] ret_from_fork+0x116/0x1d0 [ 24.883637] ret_from_fork_asm+0x1a/0x30 [ 24.883925] [ 24.884041] The buggy address belongs to the object at ffff88810620e240 [ 24.884041] which belongs to the cache test_cache of size 123 [ 24.884524] The buggy address is located 0 bytes to the right of [ 24.884524] allocated 123-byte region [ffff88810620e240, ffff88810620e2bb) [ 24.885646] [ 24.885744] The buggy address belongs to the physical page: [ 24.886024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10620e [ 24.886381] flags: 0x200000000000000(node=0|zone=2) [ 24.886592] page_type: f5(slab) [ 24.886787] raw: 0200000000000000 ffff888106209140 dead000000000122 0000000000000000 [ 24.887110] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 24.887421] page dumped because: kasan: bad access detected [ 24.887644] [ 24.887718] Memory state around the buggy address: [ 24.887921] ffff88810620e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.888812] ffff88810620e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 24.889169] >ffff88810620e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 24.889480] ^ [ 24.889687] ffff88810620e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.890220] ffff88810620e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.890519] ================================================================== [ 24.809285] ================================================================== [ 24.809804] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 24.810757] Read of size 1 at addr ffff8881059ac973 by task kunit_try_catch/269 [ 24.811252] [ 24.811564] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 24.811625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.811638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.811663] Call Trace: [ 24.811678] <TASK> [ 24.811700] dump_stack_lvl+0x73/0xb0 [ 24.811738] print_report+0xd1/0x610 [ 24.812061] ? __virt_addr_valid+0x1db/0x2d0 [ 24.812095] ? mempool_oob_right_helper+0x318/0x380 [ 24.812122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.812152] ? mempool_oob_right_helper+0x318/0x380 [ 24.812177] kasan_report+0x141/0x180 [ 24.812201] ? mempool_oob_right_helper+0x318/0x380 [ 24.812231] __asan_report_load1_noabort+0x18/0x20 [ 24.812273] mempool_oob_right_helper+0x318/0x380 [ 24.812298] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.812324] ? __kasan_check_write+0x18/0x20 [ 24.812351] ? __pfx_sched_clock_cpu+0x10/0x10 [ 24.812375] ? finish_task_switch.isra.0+0x153/0x700 [ 24.812402] mempool_kmalloc_oob_right+0xf2/0x150 [ 24.812427] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 24.812454] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.812483] ? __pfx_mempool_kfree+0x10/0x10 [ 24.812511] ? __pfx_read_tsc+0x10/0x10 [ 24.812536] ? ktime_get_ts64+0x86/0x230 [ 24.812564] kunit_try_run_case+0x1a5/0x480 [ 24.812589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.812610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.812633] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.812663] ? __kthread_parkme+0x82/0x180 [ 24.812684] ? preempt_count_sub+0x50/0x80 [ 24.812707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.812730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.813021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.813056] kthread+0x337/0x6f0 [ 24.813079] ? trace_preempt_on+0x20/0xc0 [ 24.813107] ? __pfx_kthread+0x10/0x10 [ 24.813131] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.813159] ? calculate_sigpending+0x7b/0xa0 [ 24.813187] ? __pfx_kthread+0x10/0x10 [ 24.813218] ret_from_fork+0x116/0x1d0 [ 24.813253] ? __pfx_kthread+0x10/0x10 [ 24.813277] ret_from_fork_asm+0x1a/0x30 [ 24.813312] </TASK> [ 24.813325] [ 24.824781] Allocated by task 269: [ 24.825190] kasan_save_stack+0x45/0x70 [ 24.825480] kasan_save_track+0x18/0x40 [ 24.825641] kasan_save_alloc_info+0x3b/0x50 [ 24.825864] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 24.826175] remove_element+0x11e/0x190 [ 24.826335] mempool_alloc_preallocated+0x4d/0x90 [ 24.826495] mempool_oob_right_helper+0x8a/0x380 [ 24.826702] mempool_kmalloc_oob_right+0xf2/0x150 [ 24.826982] kunit_try_run_case+0x1a5/0x480 [ 24.827192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.827460] kthread+0x337/0x6f0 [ 24.827697] ret_from_fork+0x116/0x1d0 [ 24.828012] ret_from_fork_asm+0x1a/0x30 [ 24.828187] [ 24.828287] The buggy address belongs to the object at ffff8881059ac900 [ 24.828287] which belongs to the cache kmalloc-128 of size 128 [ 24.828710] The buggy address is located 0 bytes to the right of [ 24.828710] allocated 115-byte region [ffff8881059ac900, ffff8881059ac973) [ 24.829680] [ 24.829865] The buggy address belongs to the physical page: [ 24.830137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ac [ 24.830679] flags: 0x200000000000000(node=0|zone=2) [ 24.830972] page_type: f5(slab) [ 24.831137] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.831474] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.831925] page dumped because: kasan: bad access detected [ 24.832170] [ 24.832267] Memory state around the buggy address: [ 24.832533] ffff8881059ac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.832785] ffff8881059ac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.833444] >ffff8881059ac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.833878] ^ [ 24.834157] ffff8881059ac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.834443] ffff8881059aca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.834764] ==================================================================