Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.268588] ================================================================== [ 32.269815] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.270808] Read of size 1 at addr fff00000c65d2001 by task kunit_try_catch/212 [ 32.271902] [ 32.272196] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.274060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.274568] Hardware name: linux,dummy-virt (DT) [ 32.275224] Call trace: [ 32.275839] show_stack+0x20/0x38 (C) [ 32.276640] dump_stack_lvl+0x8c/0xd0 [ 32.277195] print_report+0x118/0x5e0 [ 32.277919] kasan_report+0xc8/0x118 [ 32.278476] __asan_report_load1_noabort+0x20/0x30 [ 32.279772] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.280563] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 32.281266] kunit_try_run_case+0x14c/0x3d0 [ 32.281982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.282711] kthread+0x24c/0x2d0 [ 32.283467] ret_from_fork+0x10/0x20 [ 32.284539] [ 32.284795] The buggy address belongs to the physical page: [ 32.285680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 32.286687] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.287974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.289033] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.289853] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.290854] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.292360] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.293429] head: 0bfffe0000000002 ffffc1ffc3197401 ffffffffffffffff 0000000000000000 [ 32.294448] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.295802] page dumped because: kasan: bad access detected [ 32.296948] [ 32.297440] Memory state around the buggy address: [ 32.298229] fff00000c65d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.299785] fff00000c65d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.300559] >fff00000c65d2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.301519] ^ [ 32.302102] fff00000c65d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.303124] fff00000c65d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.304249] ================================================================== [ 32.215794] ================================================================== [ 32.217323] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.218213] Read of size 1 at addr fff00000c64e2073 by task kunit_try_catch/210 [ 32.219140] [ 32.219807] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.220732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221662] Hardware name: linux,dummy-virt (DT) [ 32.222940] Call trace: [ 32.223476] show_stack+0x20/0x38 (C) [ 32.224230] dump_stack_lvl+0x8c/0xd0 [ 32.224996] print_report+0x118/0x5e0 [ 32.225726] kasan_report+0xc8/0x118 [ 32.226445] __asan_report_load1_noabort+0x20/0x30 [ 32.227174] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.228040] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.228691] kunit_try_run_case+0x14c/0x3d0 [ 32.229431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.230206] kthread+0x24c/0x2d0 [ 32.230776] ret_from_fork+0x10/0x20 [ 32.231386] [ 32.231805] Allocated by task 210: [ 32.232514] kasan_save_stack+0x3c/0x68 [ 32.233107] kasan_save_track+0x20/0x40 [ 32.233642] kasan_save_alloc_info+0x40/0x58 [ 32.234341] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.234961] remove_element+0x130/0x1f8 [ 32.235630] mempool_alloc_preallocated+0x58/0xc0 [ 32.236594] mempool_oob_right_helper+0x98/0x2f0 [ 32.237174] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.238078] kunit_try_run_case+0x14c/0x3d0 [ 32.238830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.240264] kthread+0x24c/0x2d0 [ 32.240834] ret_from_fork+0x10/0x20 [ 32.241533] [ 32.242029] The buggy address belongs to the object at fff00000c64e2000 [ 32.242029] which belongs to the cache kmalloc-128 of size 128 [ 32.243083] The buggy address is located 0 bytes to the right of [ 32.243083] allocated 115-byte region [fff00000c64e2000, fff00000c64e2073) [ 32.244993] [ 32.245336] The buggy address belongs to the physical page: [ 32.246112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e2 [ 32.247101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.248244] page_type: f5(slab) [ 32.248842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.249929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.250870] page dumped because: kasan: bad access detected [ 32.251798] [ 32.252292] Memory state around the buggy address: [ 32.253095] fff00000c64e1f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.254098] fff00000c64e1f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.255136] >fff00000c64e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.256199] ^ [ 32.257346] fff00000c64e2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.258075] fff00000c64e2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.258501] ================================================================== [ 32.316764] ================================================================== [ 32.318053] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.318838] Read of size 1 at addr fff00000c63cf2bb by task kunit_try_catch/214 [ 32.319616] [ 32.320037] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.322093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.322788] Hardware name: linux,dummy-virt (DT) [ 32.323684] Call trace: [ 32.324095] show_stack+0x20/0x38 (C) [ 32.324671] dump_stack_lvl+0x8c/0xd0 [ 32.325246] print_report+0x118/0x5e0 [ 32.326532] kasan_report+0xc8/0x118 [ 32.327123] __asan_report_load1_noabort+0x20/0x30 [ 32.327944] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.328720] mempool_slab_oob_right+0xb8/0x110 [ 32.329542] kunit_try_run_case+0x14c/0x3d0 [ 32.330219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.331028] kthread+0x24c/0x2d0 [ 32.331615] ret_from_fork+0x10/0x20 [ 32.332828] [ 32.333266] Allocated by task 214: [ 32.333734] kasan_save_stack+0x3c/0x68 [ 32.334477] kasan_save_track+0x20/0x40 [ 32.335146] kasan_save_alloc_info+0x40/0x58 [ 32.335707] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.336347] remove_element+0x16c/0x1f8 [ 32.337173] mempool_alloc_preallocated+0x58/0xc0 [ 32.337817] mempool_oob_right_helper+0x98/0x2f0 [ 32.338482] mempool_slab_oob_right+0xb8/0x110 [ 32.339200] kunit_try_run_case+0x14c/0x3d0 [ 32.340406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.341102] kthread+0x24c/0x2d0 [ 32.341533] ret_from_fork+0x10/0x20 [ 32.342298] [ 32.342695] The buggy address belongs to the object at fff00000c63cf240 [ 32.342695] which belongs to the cache test_cache of size 123 [ 32.344716] The buggy address is located 0 bytes to the right of [ 32.344716] allocated 123-byte region [fff00000c63cf240, fff00000c63cf2bb) [ 32.346194] [ 32.346547] The buggy address belongs to the physical page: [ 32.347927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cf [ 32.348921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.349711] page_type: f5(slab) [ 32.350162] raw: 0bfffe0000000000 fff00000c63a8280 dead000000000122 0000000000000000 [ 32.351096] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.352110] page dumped because: kasan: bad access detected [ 32.352780] [ 32.353196] Memory state around the buggy address: [ 32.353770] fff00000c63cf180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.354618] fff00000c63cf200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.356186] >fff00000c63cf280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.357731] ^ [ 32.358427] fff00000c63cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.359336] fff00000c63cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.360432] ==================================================================
[ 30.078110] ================================================================== [ 30.079363] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 30.080343] Read of size 1 at addr ffff888101ac22bb by task kunit_try_catch/232 [ 30.081506] [ 30.081807] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.083202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.083629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.084579] Call Trace: [ 30.085041] <TASK> [ 30.085377] dump_stack_lvl+0x73/0xb0 [ 30.085847] print_report+0xd1/0x640 [ 30.086228] ? __virt_addr_valid+0x1db/0x2d0 [ 30.086873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.087531] kasan_report+0x102/0x140 [ 30.087934] ? mempool_oob_right_helper+0x31a/0x380 [ 30.088844] ? mempool_oob_right_helper+0x31a/0x380 [ 30.089513] __asan_report_load1_noabort+0x18/0x20 [ 30.090315] mempool_oob_right_helper+0x31a/0x380 [ 30.091162] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 30.091743] mempool_slab_oob_right+0xb1/0x100 [ 30.092373] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 30.092956] ? __switch_to+0x5d9/0xf60 [ 30.093840] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 30.094473] ? __pfx_mempool_free_slab+0x10/0x10 [ 30.095195] ? __pfx_read_tsc+0x10/0x10 [ 30.095972] ? ktime_get_ts64+0x86/0x230 [ 30.096873] kunit_try_run_case+0x1b3/0x490 [ 30.097283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.097793] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.098320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.099321] ? __kthread_parkme+0x82/0x160 [ 30.099735] ? preempt_count_sub+0x50/0x80 [ 30.100426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.101355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.102002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.102966] kthread+0x257/0x310 [ 30.103500] ? __pfx_kthread+0x10/0x10 [ 30.104097] ret_from_fork+0x41/0x80 [ 30.104601] ? __pfx_kthread+0x10/0x10 [ 30.105091] ret_from_fork_asm+0x1a/0x30 [ 30.105486] </TASK> [ 30.106409] [ 30.106590] Allocated by task 232: [ 30.107275] kasan_save_stack+0x3d/0x60 [ 30.107622] kasan_save_track+0x18/0x40 [ 30.108421] kasan_save_alloc_info+0x3b/0x50 [ 30.108908] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 30.109724] remove_element+0x11e/0x190 [ 30.110291] mempool_alloc_preallocated+0x4d/0x90 [ 30.111206] mempool_oob_right_helper+0x8b/0x380 [ 30.111705] mempool_slab_oob_right+0xb1/0x100 [ 30.112356] kunit_try_run_case+0x1b3/0x490 [ 30.113087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.113708] kthread+0x257/0x310 [ 30.114185] ret_from_fork+0x41/0x80 [ 30.114655] ret_from_fork_asm+0x1a/0x30 [ 30.115574] [ 30.116183] The buggy address belongs to the object at ffff888101ac2240 [ 30.116183] which belongs to the cache test_cache of size 123 [ 30.117494] The buggy address is located 0 bytes to the right of [ 30.117494] allocated 123-byte region [ffff888101ac2240, ffff888101ac22bb) [ 30.119207] [ 30.119382] The buggy address belongs to the physical page: [ 30.120412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac2 [ 30.121345] flags: 0x200000000000000(node=0|zone=2) [ 30.121910] page_type: f5(slab) [ 30.122663] raw: 0200000000000000 ffff888101abe140 dead000000000122 0000000000000000 [ 30.123420] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 30.124574] page dumped because: kasan: bad access detected [ 30.125334] [ 30.125571] Memory state around the buggy address: [ 30.126596] ffff888101ac2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.127374] ffff888101ac2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 30.128261] >ffff888101ac2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 30.129064] ^ [ 30.129371] ffff888101ac2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.130192] ffff888101ac2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.131322] ================================================================== [ 30.024166] ================================================================== [ 30.025457] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 30.026496] Read of size 1 at addr ffff8881027be001 by task kunit_try_catch/230 [ 30.027227] [ 30.027554] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.028852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.029409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.030918] Call Trace: [ 30.031254] <TASK> [ 30.031627] dump_stack_lvl+0x73/0xb0 [ 30.032120] print_report+0xd1/0x640 [ 30.032612] ? __virt_addr_valid+0x1db/0x2d0 [ 30.033266] ? kasan_addr_to_slab+0x11/0xa0 [ 30.033760] kasan_report+0x102/0x140 [ 30.034371] ? mempool_oob_right_helper+0x31a/0x380 [ 30.035075] ? mempool_oob_right_helper+0x31a/0x380 [ 30.036072] __asan_report_load1_noabort+0x18/0x20 [ 30.036702] mempool_oob_right_helper+0x31a/0x380 [ 30.037283] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 30.037794] ? finish_task_switch.isra.0+0x153/0x700 [ 30.038719] mempool_kmalloc_large_oob_right+0xb6/0x100 [ 30.039313] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 30.040231] ? __switch_to+0x5d9/0xf60 [ 30.040637] ? __pfx_mempool_kmalloc+0x10/0x10 [ 30.041362] ? __pfx_mempool_kfree+0x10/0x10 [ 30.041996] ? __pfx_read_tsc+0x10/0x10 [ 30.042651] ? ktime_get_ts64+0x86/0x230 [ 30.043600] kunit_try_run_case+0x1b3/0x490 [ 30.044310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.044893] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.045563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.046251] ? __kthread_parkme+0x82/0x160 [ 30.046737] ? preempt_count_sub+0x50/0x80 [ 30.047456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.048308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.049050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.049769] kthread+0x257/0x310 [ 30.050379] ? __pfx_kthread+0x10/0x10 [ 30.051112] ret_from_fork+0x41/0x80 [ 30.051525] ? __pfx_kthread+0x10/0x10 [ 30.052070] ret_from_fork_asm+0x1a/0x30 [ 30.052895] </TASK> [ 30.053361] [ 30.053590] The buggy address belongs to the physical page: [ 30.054366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc [ 30.055155] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.056219] flags: 0x200000000000040(head|node=0|zone=2) [ 30.057040] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.057887] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.058911] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.059778] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.060709] head: 0200000000000002 ffffea000409ef01 ffffffffffffffff 0000000000000000 [ 30.061667] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.062548] page dumped because: kasan: bad access detected [ 30.063107] [ 30.063459] Memory state around the buggy address: [ 30.064281] ffff8881027bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.065247] ffff8881027bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.065893] >ffff8881027be000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.066973] ^ [ 30.067450] ffff8881027be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.068557] ffff8881027be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.069321] ================================================================== [ 29.963737] ================================================================== [ 29.965015] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 29.965768] Read of size 1 at addr ffff888102a0c373 by task kunit_try_catch/228 [ 29.966389] [ 29.966713] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.967939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.968700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.969902] Call Trace: [ 29.970604] <TASK> [ 29.971285] dump_stack_lvl+0x73/0xb0 [ 29.971852] print_report+0xd1/0x640 [ 29.972286] ? __virt_addr_valid+0x1db/0x2d0 [ 29.973263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.973779] kasan_report+0x102/0x140 [ 29.974484] ? mempool_oob_right_helper+0x31a/0x380 [ 29.975165] ? mempool_oob_right_helper+0x31a/0x380 [ 29.975649] __asan_report_load1_noabort+0x18/0x20 [ 29.976219] mempool_oob_right_helper+0x31a/0x380 [ 29.977235] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 29.977894] ? finish_task_switch.isra.0+0x153/0x700 [ 29.978635] mempool_kmalloc_oob_right+0xb6/0x100 [ 29.979315] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 29.980114] ? __switch_to+0x5d9/0xf60 [ 29.980613] ? __pfx_mempool_kmalloc+0x10/0x10 [ 29.981405] ? __pfx_mempool_kfree+0x10/0x10 [ 29.982113] ? __pfx_read_tsc+0x10/0x10 [ 29.982530] ? ktime_get_ts64+0x86/0x230 [ 29.983175] kunit_try_run_case+0x1b3/0x490 [ 29.983747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.984662] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.985367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.986296] ? __kthread_parkme+0x82/0x160 [ 29.986750] ? preempt_count_sub+0x50/0x80 [ 29.987429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.988129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.988882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.989489] kthread+0x257/0x310 [ 29.990084] ? __pfx_kthread+0x10/0x10 [ 29.990454] ret_from_fork+0x41/0x80 [ 29.990940] ? __pfx_kthread+0x10/0x10 [ 29.991296] ret_from_fork_asm+0x1a/0x30 [ 29.991789] </TASK> [ 29.992071] [ 29.992332] Allocated by task 228: [ 29.992901] kasan_save_stack+0x3d/0x60 [ 29.993465] kasan_save_track+0x18/0x40 [ 29.993998] kasan_save_alloc_info+0x3b/0x50 [ 29.995623] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 29.996217] remove_element+0x11e/0x190 [ 29.996760] mempool_alloc_preallocated+0x4d/0x90 [ 29.997283] mempool_oob_right_helper+0x8b/0x380 [ 29.997977] mempool_kmalloc_oob_right+0xb6/0x100 [ 29.998756] kunit_try_run_case+0x1b3/0x490 [ 29.999639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.000587] kthread+0x257/0x310 [ 30.000930] ret_from_fork+0x41/0x80 [ 30.001377] ret_from_fork_asm+0x1a/0x30 [ 30.001762] [ 30.001964] The buggy address belongs to the object at ffff888102a0c300 [ 30.001964] which belongs to the cache kmalloc-128 of size 128 [ 30.003351] The buggy address is located 0 bytes to the right of [ 30.003351] allocated 115-byte region [ffff888102a0c300, ffff888102a0c373) [ 30.004515] [ 30.004907] The buggy address belongs to the physical page: [ 30.005907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0c [ 30.006720] flags: 0x200000000000000(node=0|zone=2) [ 30.007467] page_type: f5(slab) [ 30.007898] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.008730] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.009657] page dumped because: kasan: bad access detected [ 30.010485] [ 30.010774] Memory state around the buggy address: [ 30.011405] ffff888102a0c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.012172] ffff888102a0c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.013038] >ffff888102a0c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.013786] ^ [ 30.014571] ffff888102a0c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.015824] ffff888102a0c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.017063] ==================================================================