Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.607403] ================================================================== [ 31.607465] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.607521] Read of size 1 at addr fff00000c99f02bb by task kunit_try_catch/256 [ 31.607571] [ 31.607604] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.607693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.607721] Hardware name: linux,dummy-virt (DT) [ 31.607752] Call trace: [ 31.607776] show_stack+0x20/0x38 (C) [ 31.607844] dump_stack_lvl+0x8c/0xd0 [ 31.607897] print_report+0x118/0x5d0 [ 31.607942] kasan_report+0xdc/0x128 [ 31.607985] __asan_report_load1_noabort+0x20/0x30 [ 31.608065] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.608828] mempool_slab_oob_right+0xc0/0x118 [ 31.609037] kunit_try_run_case+0x170/0x3f0 [ 31.609299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.609477] kthread+0x328/0x630 [ 31.609557] ret_from_fork+0x10/0x20 [ 31.609706] [ 31.609855] Allocated by task 256: [ 31.609885] kasan_save_stack+0x3c/0x68 [ 31.610077] kasan_save_track+0x20/0x40 [ 31.610217] kasan_save_alloc_info+0x40/0x58 [ 31.610322] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.610448] remove_element+0x16c/0x1f8 [ 31.610533] mempool_alloc_preallocated+0x58/0xc0 [ 31.610719] mempool_oob_right_helper+0x98/0x2f0 [ 31.610838] mempool_slab_oob_right+0xc0/0x118 [ 31.610974] kunit_try_run_case+0x170/0x3f0 [ 31.611268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.611420] kthread+0x328/0x630 [ 31.611575] ret_from_fork+0x10/0x20 [ 31.611716] [ 31.611766] The buggy address belongs to the object at fff00000c99f0240 [ 31.611766] which belongs to the cache test_cache of size 123 [ 31.611982] The buggy address is located 0 bytes to the right of [ 31.611982] allocated 123-byte region [fff00000c99f0240, fff00000c99f02bb) [ 31.612186] [ 31.612430] The buggy address belongs to the physical page: [ 31.612558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0 [ 31.612693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.612836] page_type: f5(slab) [ 31.612897] raw: 0bfffe0000000000 fff00000c3f2dc80 dead000000000122 0000000000000000 [ 31.612969] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.613173] page dumped because: kasan: bad access detected [ 31.613294] [ 31.613349] Memory state around the buggy address: [ 31.613529] fff00000c99f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.613652] fff00000c99f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 31.613723] >fff00000c99f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 31.613815] ^ [ 31.613878] fff00000c99f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.613953] fff00000c99f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.614119] ================================================================== [ 31.587938] ================================================================== [ 31.589379] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.589510] Read of size 1 at addr fff00000c9b86001 by task kunit_try_catch/254 [ 31.589566] [ 31.589597] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.589969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.590001] Hardware name: linux,dummy-virt (DT) [ 31.590163] Call trace: [ 31.590243] show_stack+0x20/0x38 (C) [ 31.590661] dump_stack_lvl+0x8c/0xd0 [ 31.591045] print_report+0x118/0x5d0 [ 31.591100] kasan_report+0xdc/0x128 [ 31.591635] __asan_report_load1_noabort+0x20/0x30 [ 31.591758] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.592005] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 31.592259] kunit_try_run_case+0x170/0x3f0 [ 31.592309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.592361] kthread+0x328/0x630 [ 31.592760] ret_from_fork+0x10/0x20 [ 31.593015] [ 31.593038] The buggy address belongs to the physical page: [ 31.593083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b84 [ 31.593483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.593752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.593865] page_type: f8(unknown) [ 31.594291] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.594563] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.594617] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.595008] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.595319] head: 0bfffe0000000002 ffffc1ffc326e101 00000000ffffffff 00000000ffffffff [ 31.595400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.595487] page dumped because: kasan: bad access detected [ 31.595539] [ 31.595612] Memory state around the buggy address: [ 31.595752] fff00000c9b85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.595880] fff00000c9b85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.595972] >fff00000c9b86000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.596097] ^ [ 31.596150] fff00000c9b86080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.596193] fff00000c9b86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.596461] ================================================================== [ 31.567014] ================================================================== [ 31.567100] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.567172] Read of size 1 at addr fff00000c3f63d73 by task kunit_try_catch/252 [ 31.567224] [ 31.567265] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 31.567355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.567381] Hardware name: linux,dummy-virt (DT) [ 31.567415] Call trace: [ 31.567439] show_stack+0x20/0x38 (C) [ 31.567492] dump_stack_lvl+0x8c/0xd0 [ 31.567544] print_report+0x118/0x5d0 [ 31.567587] kasan_report+0xdc/0x128 [ 31.567631] __asan_report_load1_noabort+0x20/0x30 [ 31.567679] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.567728] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.567779] kunit_try_run_case+0x170/0x3f0 [ 31.567830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.567882] kthread+0x328/0x630 [ 31.567924] ret_from_fork+0x10/0x20 [ 31.567971] [ 31.567991] Allocated by task 252: [ 31.568021] kasan_save_stack+0x3c/0x68 [ 31.568072] kasan_save_track+0x20/0x40 [ 31.568106] kasan_save_alloc_info+0x40/0x58 [ 31.568145] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.568186] remove_element+0x130/0x1f8 [ 31.568230] mempool_alloc_preallocated+0x58/0xc0 [ 31.568272] mempool_oob_right_helper+0x98/0x2f0 [ 31.568313] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.568354] kunit_try_run_case+0x170/0x3f0 [ 31.568417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.568460] kthread+0x328/0x630 [ 31.568492] ret_from_fork+0x10/0x20 [ 31.568528] [ 31.568550] The buggy address belongs to the object at fff00000c3f63d00 [ 31.568550] which belongs to the cache kmalloc-128 of size 128 [ 31.568609] The buggy address is located 0 bytes to the right of [ 31.568609] allocated 115-byte region [fff00000c3f63d00, fff00000c3f63d73) [ 31.568671] [ 31.568694] The buggy address belongs to the physical page: [ 31.568726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f63 [ 31.568784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.568836] page_type: f5(slab) [ 31.568879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.568930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.568971] page dumped because: kasan: bad access detected [ 31.569003] [ 31.569021] Memory state around the buggy address: [ 31.569069] fff00000c3f63c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.569113] fff00000c3f63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.569157] >fff00000c3f63d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.569196] ^ [ 31.569236] fff00000c3f63d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.569278] fff00000c3f63e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.569316] ==================================================================
[ 27.130109] ================================================================== [ 27.130649] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 27.130956] Read of size 1 at addr ffff8881061872bb by task kunit_try_catch/274 [ 27.131260] [ 27.131362] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.131411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.131422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.131442] Call Trace: [ 27.131454] <TASK> [ 27.131469] dump_stack_lvl+0x73/0xb0 [ 27.131499] print_report+0xd1/0x610 [ 27.131521] ? __virt_addr_valid+0x1db/0x2d0 [ 27.131546] ? mempool_oob_right_helper+0x318/0x380 [ 27.131569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.131595] ? mempool_oob_right_helper+0x318/0x380 [ 27.131618] kasan_report+0x141/0x180 [ 27.131640] ? mempool_oob_right_helper+0x318/0x380 [ 27.131667] __asan_report_load1_noabort+0x18/0x20 [ 27.131691] mempool_oob_right_helper+0x318/0x380 [ 27.131715] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.131741] ? __pfx_sched_clock_cpu+0x10/0x10 [ 27.131761] ? finish_task_switch.isra.0+0x153/0x700 [ 27.131786] mempool_slab_oob_right+0xed/0x140 [ 27.131810] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 27.131837] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 27.131861] ? __pfx_mempool_free_slab+0x10/0x10 [ 27.131887] ? __pfx_read_tsc+0x10/0x10 [ 27.131908] ? ktime_get_ts64+0x86/0x230 [ 27.131933] kunit_try_run_case+0x1a5/0x480 [ 27.131965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.131988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.132040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.132064] ? __kthread_parkme+0x82/0x180 [ 27.132098] ? preempt_count_sub+0x50/0x80 [ 27.132121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.132145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.132168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.132190] kthread+0x337/0x6f0 [ 27.132209] ? trace_preempt_on+0x20/0xc0 [ 27.132233] ? __pfx_kthread+0x10/0x10 [ 27.132253] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.132275] ? calculate_sigpending+0x7b/0xa0 [ 27.132298] ? __pfx_kthread+0x10/0x10 [ 27.132319] ret_from_fork+0x116/0x1d0 [ 27.132338] ? __pfx_kthread+0x10/0x10 [ 27.132358] ret_from_fork_asm+0x1a/0x30 [ 27.132398] </TASK> [ 27.132408] [ 27.140226] Allocated by task 274: [ 27.140456] kasan_save_stack+0x45/0x70 [ 27.140654] kasan_save_track+0x18/0x40 [ 27.140830] kasan_save_alloc_info+0x3b/0x50 [ 27.140985] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 27.141163] remove_element+0x11e/0x190 [ 27.141543] mempool_alloc_preallocated+0x4d/0x90 [ 27.141776] mempool_oob_right_helper+0x8a/0x380 [ 27.142007] mempool_slab_oob_right+0xed/0x140 [ 27.142201] kunit_try_run_case+0x1a5/0x480 [ 27.142440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.142650] kthread+0x337/0x6f0 [ 27.142809] ret_from_fork+0x116/0x1d0 [ 27.142964] ret_from_fork_asm+0x1a/0x30 [ 27.143159] [ 27.143224] The buggy address belongs to the object at ffff888106187240 [ 27.143224] which belongs to the cache test_cache of size 123 [ 27.143786] The buggy address is located 0 bytes to the right of [ 27.143786] allocated 123-byte region [ffff888106187240, ffff8881061872bb) [ 27.144451] [ 27.144555] The buggy address belongs to the physical page: [ 27.144766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106187 [ 27.145003] flags: 0x200000000000000(node=0|zone=2) [ 27.145173] page_type: f5(slab) [ 27.145289] raw: 0200000000000000 ffff888101e9e8c0 dead000000000122 0000000000000000 [ 27.145543] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 27.145864] page dumped because: kasan: bad access detected [ 27.146120] [ 27.146226] Memory state around the buggy address: [ 27.146521] ffff888106187180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.146732] ffff888106187200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 27.146937] >ffff888106187280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 27.147364] ^ [ 27.147608] ffff888106187300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.147931] ffff888106187380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.148283] ================================================================== [ 27.109053] ================================================================== [ 27.109883] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 27.110315] Read of size 1 at addr ffff8881060ae001 by task kunit_try_catch/272 [ 27.110648] [ 27.110739] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.110788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.110799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.110821] Call Trace: [ 27.110834] <TASK> [ 27.110850] dump_stack_lvl+0x73/0xb0 [ 27.110881] print_report+0xd1/0x610 [ 27.110903] ? __virt_addr_valid+0x1db/0x2d0 [ 27.110928] ? mempool_oob_right_helper+0x318/0x380 [ 27.110950] ? kasan_addr_to_slab+0x11/0xa0 [ 27.110970] ? mempool_oob_right_helper+0x318/0x380 [ 27.110992] kasan_report+0x141/0x180 [ 27.111014] ? mempool_oob_right_helper+0x318/0x380 [ 27.111042] __asan_report_load1_noabort+0x18/0x20 [ 27.111066] mempool_oob_right_helper+0x318/0x380 [ 27.111105] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.111132] ? dequeue_entities+0x23f/0x1630 [ 27.111155] ? __kasan_check_write+0x18/0x20 [ 27.111178] ? __pfx_sched_clock_cpu+0x10/0x10 [ 27.111199] ? finish_task_switch.isra.0+0x153/0x700 [ 27.111223] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 27.111247] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 27.111274] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.111298] ? __pfx_mempool_kfree+0x10/0x10 [ 27.111323] ? __pfx_read_tsc+0x10/0x10 [ 27.111344] ? ktime_get_ts64+0x86/0x230 [ 27.111372] kunit_try_run_case+0x1a5/0x480 [ 27.111397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.111439] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.111463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.111485] ? __kthread_parkme+0x82/0x180 [ 27.111510] ? preempt_count_sub+0x50/0x80 [ 27.111532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.111555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.111577] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.111600] kthread+0x337/0x6f0 [ 27.111619] ? trace_preempt_on+0x20/0xc0 [ 27.111643] ? __pfx_kthread+0x10/0x10 [ 27.111662] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.111683] ? calculate_sigpending+0x7b/0xa0 [ 27.111707] ? __pfx_kthread+0x10/0x10 [ 27.111727] ret_from_fork+0x116/0x1d0 [ 27.111746] ? __pfx_kthread+0x10/0x10 [ 27.111765] ret_from_fork_asm+0x1a/0x30 [ 27.111797] </TASK> [ 27.111808] [ 27.120014] The buggy address belongs to the physical page: [ 27.120203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ac [ 27.120689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.121032] flags: 0x200000000000040(head|node=0|zone=2) [ 27.121415] page_type: f8(unknown) [ 27.121600] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.121957] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 27.122196] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.122950] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 27.123292] head: 0200000000000002 ffffea0004182b01 00000000ffffffff 00000000ffffffff [ 27.123783] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 27.124038] page dumped because: kasan: bad access detected [ 27.124213] [ 27.124276] Memory state around the buggy address: [ 27.124424] ffff8881060adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.124738] ffff8881060adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.125054] >ffff8881060ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.125479] ^ [ 27.125640] ffff8881060ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.125886] ffff8881060ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 27.126125] ================================================================== [ 27.080673] ================================================================== [ 27.081875] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 27.082512] Read of size 1 at addr ffff88810553dc73 by task kunit_try_catch/270 [ 27.082786] [ 27.082880] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.082941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.082953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.082977] Call Trace: [ 27.082992] <TASK> [ 27.083013] dump_stack_lvl+0x73/0xb0 [ 27.083050] print_report+0xd1/0x610 [ 27.083074] ? __virt_addr_valid+0x1db/0x2d0 [ 27.083117] ? mempool_oob_right_helper+0x318/0x380 [ 27.083152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.083179] ? mempool_oob_right_helper+0x318/0x380 [ 27.083203] kasan_report+0x141/0x180 [ 27.083225] ? mempool_oob_right_helper+0x318/0x380 [ 27.083254] __asan_report_load1_noabort+0x18/0x20 [ 27.083292] mempool_oob_right_helper+0x318/0x380 [ 27.083317] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.083341] ? dequeue_entities+0x23f/0x1630 [ 27.083405] ? __kasan_check_write+0x18/0x20 [ 27.083431] ? __pfx_sched_clock_cpu+0x10/0x10 [ 27.083452] ? irqentry_exit+0x2a/0x60 [ 27.083479] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.083508] mempool_kmalloc_oob_right+0xf2/0x150 [ 27.083532] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 27.083559] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.083586] ? __pfx_mempool_kfree+0x10/0x10 [ 27.083611] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 27.083637] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 27.083663] kunit_try_run_case+0x1a5/0x480 [ 27.083691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.083714] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 27.083741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.083765] ? __kthread_parkme+0x82/0x180 [ 27.083793] ? preempt_count_sub+0x50/0x80 [ 27.083818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.083843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.083866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.083890] kthread+0x337/0x6f0 [ 27.083911] ? trace_preempt_on+0x20/0xc0 [ 27.083940] ? __pfx_kthread+0x10/0x10 [ 27.083962] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.083986] ? calculate_sigpending+0x7b/0xa0 [ 27.084013] ? __pfx_kthread+0x10/0x10 [ 27.084035] ret_from_fork+0x116/0x1d0 [ 27.084057] ? __pfx_kthread+0x10/0x10 [ 27.084095] ret_from_fork_asm+0x1a/0x30 [ 27.084131] </TASK> [ 27.084143] [ 27.096726] Allocated by task 270: [ 27.096863] kasan_save_stack+0x45/0x70 [ 27.097193] kasan_save_track+0x18/0x40 [ 27.097576] kasan_save_alloc_info+0x3b/0x50 [ 27.097747] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.097999] remove_element+0x11e/0x190 [ 27.098162] mempool_alloc_preallocated+0x4d/0x90 [ 27.098384] mempool_oob_right_helper+0x8a/0x380 [ 27.098621] mempool_kmalloc_oob_right+0xf2/0x150 [ 27.098857] kunit_try_run_case+0x1a5/0x480 [ 27.098998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.099234] kthread+0x337/0x6f0 [ 27.099422] ret_from_fork+0x116/0x1d0 [ 27.099578] ret_from_fork_asm+0x1a/0x30 [ 27.099711] [ 27.099797] The buggy address belongs to the object at ffff88810553dc00 [ 27.099797] which belongs to the cache kmalloc-128 of size 128 [ 27.100218] The buggy address is located 0 bytes to the right of [ 27.100218] allocated 115-byte region [ffff88810553dc00, ffff88810553dc73) [ 27.100910] [ 27.101013] The buggy address belongs to the physical page: [ 27.101192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 27.101506] flags: 0x200000000000000(node=0|zone=2) [ 27.101868] page_type: f5(slab) [ 27.102012] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.102522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.102823] page dumped because: kasan: bad access detected [ 27.103029] [ 27.103131] Memory state around the buggy address: [ 27.103384] ffff88810553db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.103662] ffff88810553db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.103949] >ffff88810553dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.104212] ^ [ 27.104571] ffff88810553dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.104828] ffff88810553dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.105153] ==================================================================