Hay
Date
May 13, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.014666] ==================================================================
[   21.014872] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.015014] Read of size 1 at addr fff00000c4065b73 by task kunit_try_catch/221
[   21.015076] 
[   21.015130] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.015234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.015265] Hardware name: linux,dummy-virt (DT)
[   21.015305] Call trace:
[   21.015333]  show_stack+0x20/0x38 (C)
[   21.015392]  dump_stack_lvl+0x8c/0xd0
[   21.015446]  print_report+0x118/0x608
[   21.015500]  kasan_report+0xdc/0x128
[   21.015549]  __asan_report_load1_noabort+0x20/0x30
[   21.015605]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.015678]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.015734]  kunit_try_run_case+0x170/0x3f0
[   21.015788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.015843]  kthread+0x328/0x630
[   21.015891]  ret_from_fork+0x10/0x20
[   21.015945] 
[   21.015967] Allocated by task 221:
[   21.016021]  kasan_save_stack+0x3c/0x68
[   21.016071]  kasan_save_track+0x20/0x40
[   21.016111]  kasan_save_alloc_info+0x40/0x58
[   21.016156]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.016204]  remove_element+0x130/0x1f8
[   21.016249]  mempool_alloc_preallocated+0x58/0xc0
[   21.016297]  mempool_oob_right_helper+0x98/0x2f0
[   21.016335]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.016379]  kunit_try_run_case+0x170/0x3f0
[   21.016419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.016467]  kthread+0x328/0x630
[   21.016506]  ret_from_fork+0x10/0x20
[   21.016548] 
[   21.016571] The buggy address belongs to the object at fff00000c4065b00
[   21.016571]  which belongs to the cache kmalloc-128 of size 128
[   21.016635] The buggy address is located 0 bytes to the right of
[   21.016635]  allocated 115-byte region [fff00000c4065b00, fff00000c4065b73)
[   21.016703] 
[   21.016728] The buggy address belongs to the physical page:
[   21.016766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104065
[   21.016829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.016888] page_type: f5(slab)
[   21.016937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.017006] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.017056] page dumped because: kasan: bad access detected
[   21.017105] 
[   21.017132] Memory state around the buggy address:
[   21.017173]  fff00000c4065a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.017223]  fff00000c4065a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017272] >fff00000c4065b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.017314]                                                              ^
[   21.017359]  fff00000c4065b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017406]  fff00000c4065c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.017448] ==================================================================
[   21.028681] ==================================================================
[   21.028776] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.028865] Read of size 1 at addr fff00000c78b2001 by task kunit_try_catch/223
[   21.028926] 
[   21.028990] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.029096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.029128] Hardware name: linux,dummy-virt (DT)
[   21.029165] Call trace:
[   21.029199]  show_stack+0x20/0x38 (C)
[   21.029261]  dump_stack_lvl+0x8c/0xd0
[   21.029315]  print_report+0x118/0x608
[   21.029370]  kasan_report+0xdc/0x128
[   21.029421]  __asan_report_load1_noabort+0x20/0x30
[   21.029479]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.029532]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.029589]  kunit_try_run_case+0x170/0x3f0
[   21.029644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.029701]  kthread+0x328/0x630
[   21.029754]  ret_from_fork+0x10/0x20
[   21.029816] 
[   21.029848] The buggy address belongs to the physical page:
[   21.029890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   21.029954] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.030563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.030827] page_type: f8(unknown)
[   21.030895] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.030954] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.031023] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.031080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.031133] head: 0bfffe0000000002 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff
[   21.031215] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.031303] page dumped because: kasan: bad access detected
[   21.031343] 
[   21.031678] Memory state around the buggy address:
[   21.031881]  fff00000c78b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.031941]  fff00000c78b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.032005] >fff00000c78b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.032266]                    ^
[   21.032715]  fff00000c78b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.033037]  fff00000c78b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.033275] ==================================================================
[   21.045106] ==================================================================
[   21.045523] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.045770] Read of size 1 at addr fff00000c66202bb by task kunit_try_catch/225
[   21.045909] 
[   21.046020] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.046169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.046231] Hardware name: linux,dummy-virt (DT)
[   21.046323] Call trace:
[   21.046359]  show_stack+0x20/0x38 (C)
[   21.046508]  dump_stack_lvl+0x8c/0xd0
[   21.046570]  print_report+0x118/0x608
[   21.046627]  kasan_report+0xdc/0x128
[   21.046682]  __asan_report_load1_noabort+0x20/0x30
[   21.046738]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.046791]  mempool_slab_oob_right+0xc0/0x118
[   21.047364]  kunit_try_run_case+0x170/0x3f0
[   21.047439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.047503]  kthread+0x328/0x630
[   21.047621]  ret_from_fork+0x10/0x20
[   21.047842] 
[   21.047899] Allocated by task 225:
[   21.048136]  kasan_save_stack+0x3c/0x68
[   21.048211]  kasan_save_track+0x20/0x40
[   21.048299]  kasan_save_alloc_info+0x40/0x58
[   21.048414]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.048506]  remove_element+0x16c/0x1f8
[   21.048557]  mempool_alloc_preallocated+0x58/0xc0
[   21.048605]  mempool_oob_right_helper+0x98/0x2f0
[   21.048701]  mempool_slab_oob_right+0xc0/0x118
[   21.048897]  kunit_try_run_case+0x170/0x3f0
[   21.049173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049511]  kthread+0x328/0x630
[   21.049671]  ret_from_fork+0x10/0x20
[   21.050254] 
[   21.050359] The buggy address belongs to the object at fff00000c6620240
[   21.050359]  which belongs to the cache test_cache of size 123
[   21.050481] The buggy address is located 0 bytes to the right of
[   21.050481]  allocated 123-byte region [fff00000c6620240, fff00000c66202bb)
[   21.050615] 
[   21.050771] The buggy address belongs to the physical page:
[   21.050884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   21.050982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.051165] page_type: f5(slab)
[   21.051322] raw: 0bfffe0000000000 fff00000c6617500 dead000000000122 0000000000000000
[   21.051383] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.051453] page dumped because: kasan: bad access detected
[   21.051489] 
[   21.051512] Memory state around the buggy address:
[   21.051551]  fff00000c6620180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.051599]  fff00000c6620200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.051645] >fff00000c6620280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.051687]                                         ^
[   21.051728]  fff00000c6620300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.051774]  fff00000c6620380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.051818] ==================================================================

[   12.560113] ==================================================================
[   12.560727] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.561057] Read of size 1 at addr ffff88810397a001 by task kunit_try_catch/240
[   12.561468] 
[   12.561592] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   12.561655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.561668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.561708] Call Trace:
[   12.561722]  <TASK>
[   12.561741]  dump_stack_lvl+0x73/0xb0
[   12.561783]  print_report+0xd1/0x650
[   12.561807]  ? __virt_addr_valid+0x1db/0x2d0
[   12.561831]  ? mempool_oob_right_helper+0x318/0x380
[   12.561854]  ? kasan_addr_to_slab+0x11/0xa0
[   12.561875]  ? mempool_oob_right_helper+0x318/0x380
[   12.561899]  kasan_report+0x141/0x180
[   12.561921]  ? mempool_oob_right_helper+0x318/0x380
[   12.561950]  __asan_report_load1_noabort+0x18/0x20
[   12.561970]  mempool_oob_right_helper+0x318/0x380
[   12.561995]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.562054]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.562078]  ? finish_task_switch.isra.0+0x153/0x700
[   12.562127]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.562151]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.562179]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.562199]  ? __pfx_mempool_kfree+0x10/0x10
[   12.562220]  ? __pfx_read_tsc+0x10/0x10
[   12.562241]  ? ktime_get_ts64+0x86/0x230
[   12.562276]  kunit_try_run_case+0x1a5/0x480
[   12.562300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.562322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.562345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.562367]  ? __kthread_parkme+0x82/0x180
[   12.562388]  ? preempt_count_sub+0x50/0x80
[   12.562411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.562435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.562458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.562488]  kthread+0x337/0x6f0
[   12.562507]  ? trace_preempt_on+0x20/0xc0
[   12.562722]  ? __pfx_kthread+0x10/0x10
[   12.562749]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.562771]  ? calculate_sigpending+0x7b/0xa0
[   12.562796]  ? __pfx_kthread+0x10/0x10
[   12.562818]  ret_from_fork+0x116/0x1d0
[   12.562836]  ? __pfx_kthread+0x10/0x10
[   12.562857]  ret_from_fork_asm+0x1a/0x30
[   12.562888]  </TASK>
[   12.562900] 
[   12.573997] The buggy address belongs to the physical page:
[   12.574267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103978
[   12.574683] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.574906] flags: 0x200000000000040(head|node=0|zone=2)
[   12.575165] page_type: f8(unknown)
[   12.575664] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.576009] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.576349] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.576767] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.577074] head: 0200000000000002 ffffea00040e5e01 00000000ffffffff 00000000ffffffff
[   12.577427] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.577823] page dumped because: kasan: bad access detected
[   12.578093] 
[   12.578201] Memory state around the buggy address:
[   12.578362]  ffff888103979f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.578741]  ffff888103979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.579005] >ffff88810397a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.579485]                    ^
[   12.579641]  ffff88810397a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.579995]  ffff88810397a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.580335] ==================================================================
[   12.584735] ==================================================================
[   12.585253] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.585568] Read of size 1 at addr ffff8881039e22bb by task kunit_try_catch/242
[   12.586001] 
[   12.586111] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   12.586162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.586174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.586196] Call Trace:
[   12.586208]  <TASK>
[   12.586225]  dump_stack_lvl+0x73/0xb0
[   12.586256]  print_report+0xd1/0x650
[   12.586279]  ? __virt_addr_valid+0x1db/0x2d0
[   12.586304]  ? mempool_oob_right_helper+0x318/0x380
[   12.586328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.586351]  ? mempool_oob_right_helper+0x318/0x380
[   12.586375]  kasan_report+0x141/0x180
[   12.586398]  ? mempool_oob_right_helper+0x318/0x380
[   12.586428]  __asan_report_load1_noabort+0x18/0x20
[   12.586449]  mempool_oob_right_helper+0x318/0x380
[   12.586481]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.586508]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.586528]  ? irqentry_exit+0x2a/0x60
[   12.586550]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.586641]  mempool_slab_oob_right+0xed/0x140
[   12.586663]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.586687]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.586710]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.586732]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.586754]  ? mempool_slab_oob_right+0x9/0x140
[   12.586777]  kunit_try_run_case+0x1a5/0x480
[   12.586801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.586823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.586846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.586869]  ? __kthread_parkme+0x82/0x180
[   12.586890]  ? preempt_count_sub+0x50/0x80
[   12.586914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.586938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.586962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.586985]  kthread+0x337/0x6f0
[   12.587005]  ? trace_preempt_on+0x20/0xc0
[   12.587029]  ? __pfx_kthread+0x10/0x10
[   12.587051]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.587071]  ? calculate_sigpending+0x7b/0xa0
[   12.587096]  ? __pfx_kthread+0x10/0x10
[   12.587119]  ret_from_fork+0x116/0x1d0
[   12.587138]  ? __pfx_kthread+0x10/0x10
[   12.587158]  ret_from_fork_asm+0x1a/0x30
[   12.587204]  </TASK>
[   12.587215] 
[   12.598535] Allocated by task 242:
[   12.598940]  kasan_save_stack+0x45/0x70
[   12.599139]  kasan_save_track+0x18/0x40
[   12.599475]  kasan_save_alloc_info+0x3b/0x50
[   12.599888]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.600140]  remove_element+0x11e/0x190
[   12.600584]  mempool_alloc_preallocated+0x4d/0x90
[   12.600895]  mempool_oob_right_helper+0x8a/0x380
[   12.601077]  mempool_slab_oob_right+0xed/0x140
[   12.601501]  kunit_try_run_case+0x1a5/0x480
[   12.601822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.602039]  kthread+0x337/0x6f0
[   12.602192]  ret_from_fork+0x116/0x1d0
[   12.602383]  ret_from_fork_asm+0x1a/0x30
[   12.602584] 
[   12.602686] The buggy address belongs to the object at ffff8881039e2240
[   12.602686]  which belongs to the cache test_cache of size 123
[   12.603288] The buggy address is located 0 bytes to the right of
[   12.603288]  allocated 123-byte region [ffff8881039e2240, ffff8881039e22bb)
[   12.603733] 
[   12.603872] The buggy address belongs to the physical page:
[   12.604131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e2
[   12.604408] flags: 0x200000000000000(node=0|zone=2)
[   12.604659] page_type: f5(slab)
[   12.604971] raw: 0200000000000000 ffff888100faf8c0 dead000000000122 0000000000000000
[   12.605356] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.605708] page dumped because: kasan: bad access detected
[   12.605968] 
[   12.606062] Memory state around the buggy address:
[   12.606305]  ffff8881039e2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.606669]  ffff8881039e2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.606967] >ffff8881039e2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.607228]                                         ^
[   12.607469]  ffff8881039e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.607715]  ffff8881039e2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.608180] ==================================================================
[   12.528653] ==================================================================
[   12.529098] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.529779] Read of size 1 at addr ffff8881026a8e73 by task kunit_try_catch/238
[   12.530006] 
[   12.530106] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   12.530163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.530177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.530201] Call Trace:
[   12.530215]  <TASK>
[   12.530237]  dump_stack_lvl+0x73/0xb0
[   12.530272]  print_report+0xd1/0x650
[   12.530296]  ? __virt_addr_valid+0x1db/0x2d0
[   12.530324]  ? mempool_oob_right_helper+0x318/0x380
[   12.530347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.530370]  ? mempool_oob_right_helper+0x318/0x380
[   12.530420]  kasan_report+0x141/0x180
[   12.530459]  ? mempool_oob_right_helper+0x318/0x380
[   12.530509]  __asan_report_load1_noabort+0x18/0x20
[   12.530531]  mempool_oob_right_helper+0x318/0x380
[   12.530571]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.530598]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.530634]  ? finish_task_switch.isra.0+0x153/0x700
[   12.530662]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.530685]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.530713]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.531032]  ? __pfx_mempool_kfree+0x10/0x10
[   12.531058]  ? __pfx_read_tsc+0x10/0x10
[   12.531081]  ? ktime_get_ts64+0x86/0x230
[   12.531108]  kunit_try_run_case+0x1a5/0x480
[   12.531137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.531159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.531194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.531218]  ? __kthread_parkme+0x82/0x180
[   12.531240]  ? preempt_count_sub+0x50/0x80
[   12.531264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.531289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.531313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.531336]  kthread+0x337/0x6f0
[   12.531357]  ? trace_preempt_on+0x20/0xc0
[   12.531382]  ? __pfx_kthread+0x10/0x10
[   12.531403]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.531424]  ? calculate_sigpending+0x7b/0xa0
[   12.531451]  ? __pfx_kthread+0x10/0x10
[   12.531473]  ret_from_fork+0x116/0x1d0
[   12.531492]  ? __pfx_kthread+0x10/0x10
[   12.531513]  ret_from_fork_asm+0x1a/0x30
[   12.531610]  </TASK>
[   12.531635] 
[   12.543866] Allocated by task 238:
[   12.544141]  kasan_save_stack+0x45/0x70
[   12.544509]  kasan_save_track+0x18/0x40
[   12.544965]  kasan_save_alloc_info+0x3b/0x50
[   12.545333]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.545789]  remove_element+0x11e/0x190
[   12.546002]  mempool_alloc_preallocated+0x4d/0x90
[   12.546330]  mempool_oob_right_helper+0x8a/0x380
[   12.546538]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.546865]  kunit_try_run_case+0x1a5/0x480
[   12.547057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.547307]  kthread+0x337/0x6f0
[   12.547773]  ret_from_fork+0x116/0x1d0
[   12.547930]  ret_from_fork_asm+0x1a/0x30
[   12.548180] 
[   12.548459] The buggy address belongs to the object at ffff8881026a8e00
[   12.548459]  which belongs to the cache kmalloc-128 of size 128
[   12.549298] The buggy address is located 0 bytes to the right of
[   12.549298]  allocated 115-byte region [ffff8881026a8e00, ffff8881026a8e73)
[   12.550244] 
[   12.550514] The buggy address belongs to the physical page:
[   12.550859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a8
[   12.551177] flags: 0x200000000000000(node=0|zone=2)
[   12.551711] page_type: f5(slab)
[   12.551998] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.552482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.552978] page dumped because: kasan: bad access detected
[   12.553375] 
[   12.553484] Memory state around the buggy address:
[   12.553867]  ffff8881026a8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.554166]  ffff8881026a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.554674] >ffff8881026a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.554955]                                                              ^
[   12.555535]  ffff8881026a8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.556023]  ffff8881026a8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.556444] ==================================================================