Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.458163] ==================================================================
[   35.458552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.458713] Read of size 1 at addr fff00000c77ae001 by task kunit_try_catch/235
[   35.458914] 
[   35.459006] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.459888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.459955] Hardware name: linux,dummy-virt (DT)
[   35.460059] Call trace:
[   35.460119]  show_stack+0x20/0x38 (C)
[   35.460244]  dump_stack_lvl+0x8c/0xd0
[   35.461697]  print_report+0x118/0x608
[   35.461851]  kasan_report+0xdc/0x128
[   35.461918]  __asan_report_load1_noabort+0x20/0x30
[   35.461977]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.462073]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   35.462182]  kunit_try_run_case+0x170/0x3f0
[   35.462247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.462341]  kthread+0x328/0x630
[   35.462522]  ret_from_fork+0x10/0x20
[   35.462800] 
[   35.462856] The buggy address belongs to the physical page:
[   35.462955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   35.463218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.463520] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.463650] page_type: f8(unknown)
[   35.463786] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.463990] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.464343] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.464694] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.464816] head: 0bfffe0000000002 ffffc1ffc31deb01 00000000ffffffff 00000000ffffffff
[   35.464929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.465023] page dumped because: kasan: bad access detected
[   35.465121] 
[   35.465173] Memory state around the buggy address:
[   35.465327]  fff00000c77adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.465497]  fff00000c77adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.465616] >fff00000c77ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.465720]                    ^
[   35.465792]  fff00000c77ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.466075]  fff00000c77ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.466257] ==================================================================
[   35.420200] ==================================================================
[   35.420325] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.420475] Read of size 1 at addr fff00000c63f0c73 by task kunit_try_catch/233
[   35.420590] 
[   35.420700] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.421558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.422022] Hardware name: linux,dummy-virt (DT)
[   35.422136] Call trace:
[   35.422206]  show_stack+0x20/0x38 (C)
[   35.423157]  dump_stack_lvl+0x8c/0xd0
[   35.423440]  print_report+0x118/0x608
[   35.423839]  kasan_report+0xdc/0x128
[   35.424015]  __asan_report_load1_noabort+0x20/0x30
[   35.424242]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.424408]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.424539]  kunit_try_run_case+0x170/0x3f0
[   35.424662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.424813]  kthread+0x328/0x630
[   35.425106]  ret_from_fork+0x10/0x20
[   35.425509] 
[   35.425559] Allocated by task 233:
[   35.425932]  kasan_save_stack+0x3c/0x68
[   35.426065]  kasan_save_track+0x20/0x40
[   35.426187]  kasan_save_alloc_info+0x40/0x58
[   35.426450]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.426631]  remove_element+0x130/0x1f8
[   35.426825]  mempool_alloc_preallocated+0x58/0xc0
[   35.427182]  mempool_oob_right_helper+0x98/0x2f0
[   35.427470]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.427769]  kunit_try_run_case+0x170/0x3f0
[   35.428278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.428397]  kthread+0x328/0x630
[   35.428483]  ret_from_fork+0x10/0x20
[   35.428577] 
[   35.428653] The buggy address belongs to the object at fff00000c63f0c00
[   35.428653]  which belongs to the cache kmalloc-128 of size 128
[   35.429042] The buggy address is located 0 bytes to the right of
[   35.429042]  allocated 115-byte region [fff00000c63f0c00, fff00000c63f0c73)
[   35.429351] 
[   35.429413] The buggy address belongs to the physical page:
[   35.429506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0
[   35.429644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.429768] page_type: f5(slab)
[   35.429867] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.429980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.430756] page dumped because: kasan: bad access detected
[   35.430863] 
[   35.431260] Memory state around the buggy address:
[   35.431379]  fff00000c63f0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.431690]  fff00000c63f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.431819] >fff00000c63f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.431914]                                                              ^
[   35.432841]  fff00000c63f0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.432974]  fff00000c63f0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.433116] ==================================================================
[   35.489653] ==================================================================
[   35.489938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.490251] Read of size 1 at addr fff00000c76d92bb by task kunit_try_catch/237
[   35.490551] 
[   35.490717] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.491076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.491175] Hardware name: linux,dummy-virt (DT)
[   35.491255] Call trace:
[   35.491654]  show_stack+0x20/0x38 (C)
[   35.491786]  dump_stack_lvl+0x8c/0xd0
[   35.491966]  print_report+0x118/0x608
[   35.492158]  kasan_report+0xdc/0x128
[   35.492376]  __asan_report_load1_noabort+0x20/0x30
[   35.492686]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.492850]  mempool_slab_oob_right+0xc0/0x118
[   35.492975]  kunit_try_run_case+0x170/0x3f0
[   35.493123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.493427]  kthread+0x328/0x630
[   35.493564]  ret_from_fork+0x10/0x20
[   35.493684] 
[   35.493728] Allocated by task 237:
[   35.493799]  kasan_save_stack+0x3c/0x68
[   35.493898]  kasan_save_track+0x20/0x40
[   35.493989]  kasan_save_alloc_info+0x40/0x58
[   35.494108]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.494235]  remove_element+0x16c/0x1f8
[   35.494351]  mempool_alloc_preallocated+0x58/0xc0
[   35.494454]  mempool_oob_right_helper+0x98/0x2f0
[   35.494551]  mempool_slab_oob_right+0xc0/0x118
[   35.494659]  kunit_try_run_case+0x170/0x3f0
[   35.494812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.494991]  kthread+0x328/0x630
[   35.495502]  ret_from_fork+0x10/0x20
[   35.495620] 
[   35.495676] The buggy address belongs to the object at fff00000c76d9240
[   35.495676]  which belongs to the cache test_cache of size 123
[   35.495820] The buggy address is located 0 bytes to the right of
[   35.495820]  allocated 123-byte region [fff00000c76d9240, fff00000c76d92bb)
[   35.496457] 
[   35.496586] The buggy address belongs to the physical page:
[   35.496737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d9
[   35.497217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.497395] page_type: f5(slab)
[   35.497496] raw: 0bfffe0000000000 fff00000c598fa00 dead000000000122 0000000000000000
[   35.497609] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   35.497701] page dumped because: kasan: bad access detected
[   35.497786] 
[   35.497834] Memory state around the buggy address:
[   35.497909]  fff00000c76d9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.498260]  fff00000c76d9200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   35.498885] >fff00000c76d9280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   35.499223]                                         ^
[   35.499431]  fff00000c76d9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.499695]  fff00000c76d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.501080] ==================================================================

[   23.346876] ==================================================================
[   23.347334] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   23.347848] Read of size 1 at addr ffff888102c182bb by task kunit_try_catch/254
[   23.348338] 
[   23.348556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.348647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.348670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.348700] Call Trace:
[   23.348720]  <TASK>
[   23.348744]  dump_stack_lvl+0x73/0xb0
[   23.348792]  print_report+0xd1/0x650
[   23.348822]  ? __virt_addr_valid+0x1db/0x2d0
[   23.348854]  ? mempool_oob_right_helper+0x318/0x380
[   23.348887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.348925]  ? mempool_oob_right_helper+0x318/0x380
[   23.349011]  kasan_report+0x141/0x180
[   23.349066]  ? mempool_oob_right_helper+0x318/0x380
[   23.349107]  __asan_report_load1_noabort+0x18/0x20
[   23.349143]  mempool_oob_right_helper+0x318/0x380
[   23.349182]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.349227]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.349266]  ? irqentry_exit+0x2a/0x60
[   23.349304]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.349340]  mempool_slab_oob_right+0xed/0x140
[   23.349371]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   23.349424]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   23.349460]  ? __pfx_mempool_free_slab+0x10/0x10
[   23.349497]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   23.349537]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   23.349619]  kunit_try_run_case+0x1a5/0x480
[   23.349662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.349695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.349732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.349774]  ? __kthread_parkme+0x82/0x180
[   23.349810]  ? preempt_count_sub+0x50/0x80
[   23.349875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.349914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.349952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.349992]  kthread+0x337/0x6f0
[   23.350022]  ? trace_preempt_on+0x20/0xc0
[   23.350077]  ? __pfx_kthread+0x10/0x10
[   23.350115]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.350145]  ? calculate_sigpending+0x7b/0xa0
[   23.350182]  ? __pfx_kthread+0x10/0x10
[   23.350209]  ret_from_fork+0x116/0x1d0
[   23.350228]  ? __pfx_kthread+0x10/0x10
[   23.350245]  ret_from_fork_asm+0x1a/0x30
[   23.350272]  </TASK>
[   23.350285] 
[   23.360565] Allocated by task 254:
[   23.360809]  kasan_save_stack+0x45/0x70
[   23.361172]  kasan_save_track+0x18/0x40
[   23.361637]  kasan_save_alloc_info+0x3b/0x50
[   23.361978]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   23.362430]  remove_element+0x11e/0x190
[   23.362751]  mempool_alloc_preallocated+0x4d/0x90
[   23.363039]  mempool_oob_right_helper+0x8a/0x380
[   23.363205]  mempool_slab_oob_right+0xed/0x140
[   23.363363]  kunit_try_run_case+0x1a5/0x480
[   23.363673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.364241]  kthread+0x337/0x6f0
[   23.364527]  ret_from_fork+0x116/0x1d0
[   23.364807]  ret_from_fork_asm+0x1a/0x30
[   23.365267] 
[   23.365433] The buggy address belongs to the object at ffff888102c18240
[   23.365433]  which belongs to the cache test_cache of size 123
[   23.366226] The buggy address is located 0 bytes to the right of
[   23.366226]  allocated 123-byte region [ffff888102c18240, ffff888102c182bb)
[   23.366634] 
[   23.366733] The buggy address belongs to the physical page:
[   23.366920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c18
[   23.367435] flags: 0x200000000000000(node=0|zone=2)
[   23.367832] page_type: f5(slab)
[   23.368343] raw: 0200000000000000 ffff888102c11140 dead000000000122 0000000000000000
[   23.368885] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   23.369327] page dumped because: kasan: bad access detected
[   23.369521] 
[   23.369603] Memory state around the buggy address:
[   23.369766]  ffff888102c18180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.369975]  ffff888102c18200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   23.370254] >ffff888102c18280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   23.370916]                                         ^
[   23.371291]  ffff888102c18300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.371891]  ffff888102c18380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.372359] ==================================================================
[   23.313753] ==================================================================
[   23.314415] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   23.314920] Read of size 1 at addr ffff888103a92001 by task kunit_try_catch/252
[   23.315790] 
[   23.316001] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.316094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.316115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.316156] Call Trace:
[   23.316183]  <TASK>
[   23.316411]  dump_stack_lvl+0x73/0xb0
[   23.316495]  print_report+0xd1/0x650
[   23.316533]  ? __virt_addr_valid+0x1db/0x2d0
[   23.316571]  ? mempool_oob_right_helper+0x318/0x380
[   23.316607]  ? kasan_addr_to_slab+0x11/0xa0
[   23.316641]  ? mempool_oob_right_helper+0x318/0x380
[   23.316681]  kasan_report+0x141/0x180
[   23.316724]  ? mempool_oob_right_helper+0x318/0x380
[   23.316777]  __asan_report_load1_noabort+0x18/0x20
[   23.316805]  mempool_oob_right_helper+0x318/0x380
[   23.316828]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.316875]  ? update_load_avg+0x1be/0x21b0
[   23.316903]  ? dequeue_entities+0x27e/0x1740
[   23.316927]  ? finish_task_switch.isra.0+0x153/0x700
[   23.316950]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   23.316973]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   23.316997]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.317021]  ? __pfx_mempool_kfree+0x10/0x10
[   23.317043]  ? __pfx_read_tsc+0x10/0x10
[   23.317064]  ? ktime_get_ts64+0x86/0x230
[   23.317101]  kunit_try_run_case+0x1a5/0x480
[   23.317138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.317170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.317200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.317221]  ? __kthread_parkme+0x82/0x180
[   23.317242]  ? preempt_count_sub+0x50/0x80
[   23.317262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.317283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.317305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.317327]  kthread+0x337/0x6f0
[   23.317344]  ? trace_preempt_on+0x20/0xc0
[   23.317366]  ? __pfx_kthread+0x10/0x10
[   23.317402]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.317423]  ? calculate_sigpending+0x7b/0xa0
[   23.317448]  ? __pfx_kthread+0x10/0x10
[   23.317468]  ret_from_fork+0x116/0x1d0
[   23.317485]  ? __pfx_kthread+0x10/0x10
[   23.317504]  ret_from_fork_asm+0x1a/0x30
[   23.317534]  </TASK>
[   23.317546] 
[   23.330491] The buggy address belongs to the physical page:
[   23.330754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a90
[   23.331459] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.331931] flags: 0x200000000000040(head|node=0|zone=2)
[   23.332818] page_type: f8(unknown)
[   23.333089] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.333685] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.334215] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.335070] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.335608] head: 0200000000000002 ffffea00040ea401 00000000ffffffff 00000000ffffffff
[   23.336651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.336978] page dumped because: kasan: bad access detected
[   23.337316] 
[   23.337472] Memory state around the buggy address:
[   23.337656]  ffff888103a91f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.338176]  ffff888103a91f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.338677] >ffff888103a92000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.339230]                    ^
[   23.339506]  ffff888103a92080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.339990]  ffff888103a92100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.340246] ==================================================================
[   23.281857] ==================================================================
[   23.282300] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   23.283177] Read of size 1 at addr ffff888102c14173 by task kunit_try_catch/250
[   23.283408] 
[   23.283538] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.283633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.283654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.283713] Call Trace:
[   23.283740]  <TASK>
[   23.283784]  dump_stack_lvl+0x73/0xb0
[   23.283860]  print_report+0xd1/0x650
[   23.283905]  ? __virt_addr_valid+0x1db/0x2d0
[   23.283952]  ? mempool_oob_right_helper+0x318/0x380
[   23.283995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.284040]  ? mempool_oob_right_helper+0x318/0x380
[   23.284083]  kasan_report+0x141/0x180
[   23.284121]  ? mempool_oob_right_helper+0x318/0x380
[   23.284173]  __asan_report_load1_noabort+0x18/0x20
[   23.284205]  mempool_oob_right_helper+0x318/0x380
[   23.284253]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.284278]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.284297]  ? irqentry_exit+0x2a/0x60
[   23.284317]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.284338]  mempool_kmalloc_oob_right+0xf2/0x150
[   23.284358]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   23.284395]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.284420]  ? __pfx_mempool_kfree+0x10/0x10
[   23.284440]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   23.284462]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   23.284483]  kunit_try_run_case+0x1a5/0x480
[   23.284507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.284525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.284545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.284564]  ? __kthread_parkme+0x82/0x180
[   23.284583]  ? preempt_count_sub+0x50/0x80
[   23.284603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.284624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.284643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.284663]  kthread+0x337/0x6f0
[   23.284679]  ? trace_preempt_on+0x20/0xc0
[   23.284700]  ? __pfx_kthread+0x10/0x10
[   23.284717]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.284735]  ? calculate_sigpending+0x7b/0xa0
[   23.284756]  ? __pfx_kthread+0x10/0x10
[   23.284773]  ret_from_fork+0x116/0x1d0
[   23.284791]  ? __pfx_kthread+0x10/0x10
[   23.284808]  ret_from_fork_asm+0x1a/0x30
[   23.284847]  </TASK>
[   23.284860] 
[   23.297117] Allocated by task 250:
[   23.297277]  kasan_save_stack+0x45/0x70
[   23.297464]  kasan_save_track+0x18/0x40
[   23.297633]  kasan_save_alloc_info+0x3b/0x50
[   23.297815]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.298548]  remove_element+0x11e/0x190
[   23.298747]  mempool_alloc_preallocated+0x4d/0x90
[   23.298928]  mempool_oob_right_helper+0x8a/0x380
[   23.299146]  mempool_kmalloc_oob_right+0xf2/0x150
[   23.299348]  kunit_try_run_case+0x1a5/0x480
[   23.299488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.299662]  kthread+0x337/0x6f0
[   23.299845]  ret_from_fork+0x116/0x1d0
[   23.300206]  ret_from_fork_asm+0x1a/0x30
[   23.300499] 
[   23.300634] The buggy address belongs to the object at ffff888102c14100
[   23.300634]  which belongs to the cache kmalloc-128 of size 128
[   23.302164] The buggy address is located 0 bytes to the right of
[   23.302164]  allocated 115-byte region [ffff888102c14100, ffff888102c14173)
[   23.302649] 
[   23.302801] The buggy address belongs to the physical page:
[   23.303085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c14
[   23.303506] flags: 0x200000000000000(node=0|zone=2)
[   23.304164] page_type: f5(slab)
[   23.304307] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.304582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.304710] page dumped because: kasan: bad access detected
[   23.304799] 
[   23.305165] Memory state around the buggy address:
[   23.305400]  ffff888102c14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.305811]  ffff888102c14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.306552] >ffff888102c14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.306801]                                                              ^
[   23.307292]  ffff888102c14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.307589]  ffff888102c14200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.308468] ==================================================================