Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.349559] ================================================================== [ 34.351261] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.351953] Read of size 1 at addr fff00000c664e2bb by task kunit_try_catch/213 [ 34.352571] [ 34.353111] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.354863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.355651] Hardware name: linux,dummy-virt (DT) [ 34.356503] Call trace: [ 34.358137] show_stack+0x20/0x38 (C) [ 34.359675] dump_stack_lvl+0x8c/0xd0 [ 34.360694] print_report+0x118/0x5e0 [ 34.362032] kasan_report+0xc8/0x118 [ 34.363066] __asan_report_load1_noabort+0x20/0x30 [ 34.364116] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.364869] mempool_slab_oob_right+0xb8/0x110 [ 34.365486] kunit_try_run_case+0x14c/0x3d0 [ 34.366529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.367528] kthread+0x24c/0x2d0 [ 34.368503] ret_from_fork+0x10/0x20 [ 34.369156] [ 34.369547] Allocated by task 213: [ 34.370236] kasan_save_stack+0x3c/0x68 [ 34.371160] kasan_save_track+0x20/0x40 [ 34.371573] kasan_save_alloc_info+0x40/0x58 [ 34.372538] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.373646] remove_element+0x16c/0x1f8 [ 34.375038] mempool_alloc_preallocated+0x58/0xc0 [ 34.376272] mempool_oob_right_helper+0x98/0x2f0 [ 34.377056] mempool_slab_oob_right+0xb8/0x110 [ 34.377663] kunit_try_run_case+0x14c/0x3d0 [ 34.378978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.379854] kthread+0x24c/0x2d0 [ 34.380753] ret_from_fork+0x10/0x20 [ 34.381280] [ 34.381570] The buggy address belongs to the object at fff00000c664e240 [ 34.381570] which belongs to the cache test_cache of size 123 [ 34.383490] The buggy address is located 0 bytes to the right of [ 34.383490] allocated 123-byte region [fff00000c664e240, fff00000c664e2bb) [ 34.385127] [ 34.385457] The buggy address belongs to the physical page: [ 34.387258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664e [ 34.388210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.388956] page_type: f5(slab) [ 34.389477] raw: 0bfffe0000000000 fff00000c6651000 dead000000000122 0000000000000000 [ 34.391191] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.392257] page dumped because: kasan: bad access detected [ 34.392603] [ 34.392888] Memory state around the buggy address: [ 34.393481] fff00000c664e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.395826] fff00000c664e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.396469] >fff00000c664e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.397096] ^ [ 34.397596] fff00000c664e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.398714] fff00000c664e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.400377] ================================================================== [ 34.249312] ================================================================== [ 34.250669] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.251395] Read of size 1 at addr fff00000c66e1373 by task kunit_try_catch/209 [ 34.252514] [ 34.252873] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.253984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.254648] Hardware name: linux,dummy-virt (DT) [ 34.255262] Call trace: [ 34.255765] show_stack+0x20/0x38 (C) [ 34.256380] dump_stack_lvl+0x8c/0xd0 [ 34.256903] print_report+0x118/0x5e0 [ 34.257548] kasan_report+0xc8/0x118 [ 34.258119] __asan_report_load1_noabort+0x20/0x30 [ 34.258923] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.259730] mempool_kmalloc_oob_right+0xbc/0x118 [ 34.260346] kunit_try_run_case+0x14c/0x3d0 [ 34.261053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.261809] kthread+0x24c/0x2d0 [ 34.262363] ret_from_fork+0x10/0x20 [ 34.263068] [ 34.263374] Allocated by task 209: [ 34.263918] kasan_save_stack+0x3c/0x68 [ 34.264601] kasan_save_track+0x20/0x40 [ 34.265117] kasan_save_alloc_info+0x40/0x58 [ 34.265758] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.266222] remove_element+0x130/0x1f8 [ 34.266595] mempool_alloc_preallocated+0x58/0xc0 [ 34.267062] mempool_oob_right_helper+0x98/0x2f0 [ 34.267476] mempool_kmalloc_oob_right+0xbc/0x118 [ 34.267989] kunit_try_run_case+0x14c/0x3d0 [ 34.268462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.269437] kthread+0x24c/0x2d0 [ 34.270046] ret_from_fork+0x10/0x20 [ 34.270644] [ 34.270984] The buggy address belongs to the object at fff00000c66e1300 [ 34.270984] which belongs to the cache kmalloc-128 of size 128 [ 34.272257] The buggy address is located 0 bytes to the right of [ 34.272257] allocated 115-byte region [fff00000c66e1300, fff00000c66e1373) [ 34.273912] [ 34.274263] The buggy address belongs to the physical page: [ 34.274883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e1 [ 34.275954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.276672] page_type: f5(slab) [ 34.277239] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.278347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.279126] page dumped because: kasan: bad access detected [ 34.279959] [ 34.280297] Memory state around the buggy address: [ 34.281036] fff00000c66e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.281947] fff00000c66e1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.282770] >fff00000c66e1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.283736] ^ [ 34.284395] fff00000c66e1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.285335] fff00000c66e1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.286258] ================================================================== [ 34.299973] ================================================================== [ 34.301215] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.302399] Read of size 1 at addr fff00000c6856001 by task kunit_try_catch/211 [ 34.303357] [ 34.303720] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.305719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.306614] Hardware name: linux,dummy-virt (DT) [ 34.307298] Call trace: [ 34.307719] show_stack+0x20/0x38 (C) [ 34.308524] dump_stack_lvl+0x8c/0xd0 [ 34.309224] print_report+0x118/0x5e0 [ 34.310167] kasan_report+0xc8/0x118 [ 34.310733] __asan_report_load1_noabort+0x20/0x30 [ 34.311604] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.312348] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 34.313386] kunit_try_run_case+0x14c/0x3d0 [ 34.314794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.315549] kthread+0x24c/0x2d0 [ 34.316211] ret_from_fork+0x10/0x20 [ 34.316898] [ 34.317258] The buggy address belongs to the physical page: [ 34.318344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106854 [ 34.319470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.320379] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.321512] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.322517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.324260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.325918] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.326996] head: 0bfffe0000000002 ffffc1ffc31a1501 ffffffffffffffff 0000000000000000 [ 34.328034] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.328917] page dumped because: kasan: bad access detected [ 34.329567] [ 34.329920] Memory state around the buggy address: [ 34.330658] fff00000c6855f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.331416] fff00000c6855f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.332395] >fff00000c6856000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.333286] ^ [ 34.333959] fff00000c6856080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.334802] fff00000c6856100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.335740] ==================================================================
[ 25.039509] ================================================================== [ 25.041162] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 25.041935] Read of size 1 at addr ffff888102b3e001 by task kunit_try_catch/231 [ 25.043313] [ 25.043542] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 25.045502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.046265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.047045] Call Trace: [ 25.047445] <TASK> [ 25.047886] dump_stack_lvl+0x73/0xb0 [ 25.048919] print_report+0xd1/0x640 [ 25.049837] ? __virt_addr_valid+0x1db/0x2d0 [ 25.050489] ? kasan_addr_to_slab+0x11/0xa0 [ 25.050879] kasan_report+0x102/0x140 [ 25.051634] ? mempool_oob_right_helper+0x31a/0x380 [ 25.052246] ? mempool_oob_right_helper+0x31a/0x380 [ 25.053181] __asan_report_load1_noabort+0x18/0x20 [ 25.053779] mempool_oob_right_helper+0x31a/0x380 [ 25.054541] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 25.055018] ? finish_task_switch.isra.0+0x153/0x700 [ 25.055975] mempool_kmalloc_large_oob_right+0xb6/0x100 [ 25.056984] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 25.058116] ? __switch_to+0x5d9/0xf60 [ 25.058987] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.059513] ? __pfx_mempool_kfree+0x10/0x10 [ 25.060293] ? __pfx_read_tsc+0x10/0x10 [ 25.061256] ? ktime_get_ts64+0x86/0x230 [ 25.061735] kunit_try_run_case+0x1b3/0x490 [ 25.062532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.063109] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.063797] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.065154] ? __kthread_parkme+0x82/0x160 [ 25.065775] ? preempt_count_sub+0x50/0x80 [ 25.066151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.066721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.067547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.068035] kthread+0x257/0x310 [ 25.068922] ? __pfx_kthread+0x10/0x10 [ 25.069252] ret_from_fork+0x41/0x80 [ 25.069775] ? __pfx_kthread+0x10/0x10 [ 25.070268] ret_from_fork_asm+0x1a/0x30 [ 25.070880] </TASK> [ 25.071209] [ 25.071558] The buggy address belongs to the physical page: [ 25.072039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b3c [ 25.072867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.073879] flags: 0x200000000000040(head|node=0|zone=2) [ 25.074982] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.075717] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.076323] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.077303] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.078132] head: 0200000000000002 ffffea00040acf01 ffffffffffffffff 0000000000000000 [ 25.079484] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 25.080691] page dumped because: kasan: bad access detected [ 25.081172] [ 25.081406] Memory state around the buggy address: [ 25.082067] ffff888102b3df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.083333] ffff888102b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.084542] >ffff888102b3e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.085624] ^ [ 25.086943] ffff888102b3e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.088145] ffff888102b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 25.089879] ================================================================== [ 25.098685] ================================================================== [ 25.100595] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 25.101510] Read of size 1 at addr ffff888101af92bb by task kunit_try_catch/233 [ 25.103051] [ 25.103288] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 25.104510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.104945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.105645] Call Trace: [ 25.105994] <TASK> [ 25.106663] dump_stack_lvl+0x73/0xb0 [ 25.107413] print_report+0xd1/0x640 [ 25.108221] ? __virt_addr_valid+0x1db/0x2d0 [ 25.109132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.109473] kasan_report+0x102/0x140 [ 25.110601] ? mempool_oob_right_helper+0x31a/0x380 [ 25.111617] ? mempool_oob_right_helper+0x31a/0x380 [ 25.112393] __asan_report_load1_noabort+0x18/0x20 [ 25.113168] mempool_oob_right_helper+0x31a/0x380 [ 25.114259] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 25.115597] ? finish_task_switch.isra.0+0x153/0x700 [ 25.116122] mempool_slab_oob_right+0xb1/0x100 [ 25.117015] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 25.117753] ? __switch_to+0x5d9/0xf60 [ 25.118295] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 25.119072] ? __pfx_mempool_free_slab+0x10/0x10 [ 25.120027] ? __pfx_read_tsc+0x10/0x10 [ 25.120570] ? ktime_get_ts64+0x86/0x230 [ 25.120951] kunit_try_run_case+0x1b3/0x490 [ 25.121922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.122830] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.123278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.124584] ? __kthread_parkme+0x82/0x160 [ 25.125025] ? preempt_count_sub+0x50/0x80 [ 25.125845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.126644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.127482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.128315] kthread+0x257/0x310 [ 25.129190] ? __pfx_kthread+0x10/0x10 [ 25.129983] ret_from_fork+0x41/0x80 [ 25.130483] ? __pfx_kthread+0x10/0x10 [ 25.131671] ret_from_fork_asm+0x1a/0x30 [ 25.132311] </TASK> [ 25.132766] [ 25.133464] Allocated by task 233: [ 25.134022] kasan_save_stack+0x3d/0x60 [ 25.134769] kasan_save_track+0x18/0x40 [ 25.135139] kasan_save_alloc_info+0x3b/0x50 [ 25.136162] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 25.136829] remove_element+0x11e/0x190 [ 25.137704] mempool_alloc_preallocated+0x4d/0x90 [ 25.138831] mempool_oob_right_helper+0x8b/0x380 [ 25.139739] mempool_slab_oob_right+0xb1/0x100 [ 25.140191] kunit_try_run_case+0x1b3/0x490 [ 25.140555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.142396] kthread+0x257/0x310 [ 25.143010] ret_from_fork+0x41/0x80 [ 25.143428] ret_from_fork_asm+0x1a/0x30 [ 25.144318] [ 25.144750] The buggy address belongs to the object at ffff888101af9240 [ 25.144750] which belongs to the cache test_cache of size 123 [ 25.146575] The buggy address is located 0 bytes to the right of [ 25.146575] allocated 123-byte region [ffff888101af9240, ffff888101af92bb) [ 25.148255] [ 25.148654] The buggy address belongs to the physical page: [ 25.149688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101af9 [ 25.150583] flags: 0x200000000000000(node=0|zone=2) [ 25.151430] page_type: f5(slab) [ 25.151775] raw: 0200000000000000 ffff888101a9c780 dead000000000122 0000000000000000 [ 25.152506] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 25.153210] page dumped because: kasan: bad access detected [ 25.154844] [ 25.155081] Memory state around the buggy address: [ 25.156168] ffff888101af9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.157517] ffff888101af9200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 25.158478] >ffff888101af9280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 25.159205] ^ [ 25.159680] ffff888101af9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.160584] ffff888101af9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.161371] ================================================================== [ 24.983894] ================================================================== [ 24.984928] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 24.986382] Read of size 1 at addr ffff888101af5a73 by task kunit_try_catch/229 [ 24.987208] [ 24.987417] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 24.988235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.988603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.989486] Call Trace: [ 24.989711] <TASK> [ 24.989958] dump_stack_lvl+0x73/0xb0 [ 24.990552] print_report+0xd1/0x640 [ 24.990979] ? __virt_addr_valid+0x1db/0x2d0 [ 24.991399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.991963] kasan_report+0x102/0x140 [ 24.992414] ? mempool_oob_right_helper+0x31a/0x380 [ 24.992839] ? mempool_oob_right_helper+0x31a/0x380 [ 24.993309] __asan_report_load1_noabort+0x18/0x20 [ 24.993785] mempool_oob_right_helper+0x31a/0x380 [ 24.994366] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 24.995651] ? finish_task_switch.isra.0+0x153/0x700 [ 24.996130] mempool_kmalloc_oob_right+0xb6/0x100 [ 24.996725] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 24.997120] ? __switch_to+0x5d9/0xf60 [ 24.997722] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.998202] ? __pfx_mempool_kfree+0x10/0x10 [ 24.999022] ? __pfx_read_tsc+0x10/0x10 [ 24.999714] ? ktime_get_ts64+0x86/0x230 [ 25.000231] kunit_try_run_case+0x1b3/0x490 [ 25.000871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.001468] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.001936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.003125] ? __kthread_parkme+0x82/0x160 [ 25.003633] ? preempt_count_sub+0x50/0x80 [ 25.004137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.004562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.005231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.005689] kthread+0x257/0x310 [ 25.006225] ? __pfx_kthread+0x10/0x10 [ 25.006951] ret_from_fork+0x41/0x80 [ 25.007274] ? __pfx_kthread+0x10/0x10 [ 25.007790] ret_from_fork_asm+0x1a/0x30 [ 25.008232] </TASK> [ 25.008482] [ 25.008727] Allocated by task 229: [ 25.009222] kasan_save_stack+0x3d/0x60 [ 25.009632] kasan_save_track+0x18/0x40 [ 25.010182] kasan_save_alloc_info+0x3b/0x50 [ 25.010904] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 25.011711] remove_element+0x11e/0x190 [ 25.012018] mempool_alloc_preallocated+0x4d/0x90 [ 25.013202] mempool_oob_right_helper+0x8b/0x380 [ 25.013654] mempool_kmalloc_oob_right+0xb6/0x100 [ 25.014112] kunit_try_run_case+0x1b3/0x490 [ 25.014793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.015216] kthread+0x257/0x310 [ 25.016002] ret_from_fork+0x41/0x80 [ 25.016470] ret_from_fork_asm+0x1a/0x30 [ 25.016762] [ 25.017041] The buggy address belongs to the object at ffff888101af5a00 [ 25.017041] which belongs to the cache kmalloc-128 of size 128 [ 25.018395] The buggy address is located 0 bytes to the right of [ 25.018395] allocated 115-byte region [ffff888101af5a00, ffff888101af5a73) [ 25.019414] [ 25.019719] The buggy address belongs to the physical page: [ 25.020141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101af5 [ 25.020631] flags: 0x200000000000000(node=0|zone=2) [ 25.021194] page_type: f5(slab) [ 25.022031] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.022492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.023756] page dumped because: kasan: bad access detected [ 25.024204] [ 25.024486] Memory state around the buggy address: [ 25.024934] ffff888101af5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.025957] ffff888101af5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.027063] >ffff888101af5a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.027876] ^ [ 25.028758] ffff888101af5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.030003] ffff888101af5b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 25.031010] ==================================================================