Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.651390] ==================================================================
[   31.651456] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.651533] Read of size 1 at addr fff00000c929f373 by task kunit_try_catch/254
[   31.651584] 
[   31.651630] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   31.651723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.652180] Hardware name: linux,dummy-virt (DT)
[   31.652287] Call trace:
[   31.652316]  show_stack+0x20/0x38 (C)
[   31.652380]  dump_stack_lvl+0x8c/0xd0
[   31.652431]  print_report+0x118/0x608
[   31.652480]  kasan_report+0xdc/0x128
[   31.652527]  __asan_report_load1_noabort+0x20/0x30
[   31.652577]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.652627]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.652675]  kunit_try_run_case+0x170/0x3f0
[   31.652726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.652780]  kthread+0x328/0x630
[   31.652826]  ret_from_fork+0x10/0x20
[   31.652877] 
[   31.652907] Allocated by task 254:
[   31.652937]  kasan_save_stack+0x3c/0x68
[   31.652984]  kasan_save_track+0x20/0x40
[   31.653976]  kasan_save_alloc_info+0x40/0x58
[   31.654042]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.654090]  remove_element+0x130/0x1f8
[   31.654133]  mempool_alloc_preallocated+0x58/0xc0
[   31.654172]  mempool_oob_right_helper+0x98/0x2f0
[   31.654212]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.654272]  kunit_try_run_case+0x170/0x3f0
[   31.654315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.654360]  kthread+0x328/0x630
[   31.654400]  ret_from_fork+0x10/0x20
[   31.654437] 
[   31.654458] The buggy address belongs to the object at fff00000c929f300
[   31.654458]  which belongs to the cache kmalloc-128 of size 128
[   31.654520] The buggy address is located 0 bytes to the right of
[   31.654520]  allocated 115-byte region [fff00000c929f300, fff00000c929f373)
[   31.654596] 
[   31.654618] The buggy address belongs to the physical page:
[   31.654654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10929f
[   31.654710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.654765] page_type: f5(slab)
[   31.654810] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.654868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.655526] page dumped because: kasan: bad access detected
[   31.655584] 
[   31.655605] Memory state around the buggy address:
[   31.655642]  fff00000c929f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.655687]  fff00000c929f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.655959] >fff00000c929f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.656078]                                                              ^
[   31.656168]  fff00000c929f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.656357]  fff00000c929f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.656528] ==================================================================
[   31.694302] ==================================================================
[   31.694370] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.695031] Read of size 1 at addr fff00000c9abc2bb by task kunit_try_catch/258
[   31.695416] 
[   31.695455] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   31.695959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.696070] Hardware name: linux,dummy-virt (DT)
[   31.696166] Call trace:
[   31.696278]  show_stack+0x20/0x38 (C)
[   31.696484]  dump_stack_lvl+0x8c/0xd0
[   31.696762]  print_report+0x118/0x608
[   31.696816]  kasan_report+0xdc/0x128
[   31.697276]  __asan_report_load1_noabort+0x20/0x30
[   31.697373]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.697424]  mempool_slab_oob_right+0xc0/0x118
[   31.698021]  kunit_try_run_case+0x170/0x3f0
[   31.698592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.698759]  kthread+0x328/0x630
[   31.698964]  ret_from_fork+0x10/0x20
[   31.699244] 
[   31.699432] Allocated by task 258:
[   31.699659]  kasan_save_stack+0x3c/0x68
[   31.699775]  kasan_save_track+0x20/0x40
[   31.699815]  kasan_save_alloc_info+0x40/0x58
[   31.699853]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.699909]  remove_element+0x16c/0x1f8
[   31.700617]  mempool_alloc_preallocated+0x58/0xc0
[   31.700691]  mempool_oob_right_helper+0x98/0x2f0
[   31.700732]  mempool_slab_oob_right+0xc0/0x118
[   31.701156]  kunit_try_run_case+0x170/0x3f0
[   31.701207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.701564]  kthread+0x328/0x630
[   31.701663]  ret_from_fork+0x10/0x20
[   31.701820] 
[   31.701843] The buggy address belongs to the object at fff00000c9abc240
[   31.701843]  which belongs to the cache test_cache of size 123
[   31.702092] The buggy address is located 0 bytes to the right of
[   31.702092]  allocated 123-byte region [fff00000c9abc240, fff00000c9abc2bb)
[   31.702190] 
[   31.702645] The buggy address belongs to the physical page:
[   31.702849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abc
[   31.703084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.703183] page_type: f5(slab)
[   31.703342] raw: 0bfffe0000000000 fff00000c3f32500 dead000000000122 0000000000000000
[   31.703591] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.703631] page dumped because: kasan: bad access detected
[   31.703663] 
[   31.703681] Memory state around the buggy address:
[   31.704163]  fff00000c9abc180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.704263]  fff00000c9abc200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   31.704414] >fff00000c9abc280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   31.704643]                                         ^
[   31.704684]  fff00000c9abc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.704891]  fff00000c9abc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.704942] ==================================================================
[   31.676791] ==================================================================
[   31.677072] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.677130] Read of size 1 at addr fff00000c9bde001 by task kunit_try_catch/256
[   31.677180] 
[   31.677214] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   31.677308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.677382] Hardware name: linux,dummy-virt (DT)
[   31.677447] Call trace:
[   31.677575]  show_stack+0x20/0x38 (C)
[   31.677717]  dump_stack_lvl+0x8c/0xd0
[   31.677764]  print_report+0x118/0x608
[   31.677810]  kasan_report+0xdc/0x128
[   31.677856]  __asan_report_load1_noabort+0x20/0x30
[   31.677922]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.677972]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   31.678023]  kunit_try_run_case+0x170/0x3f0
[   31.678071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.678124]  kthread+0x328/0x630
[   31.678165]  ret_from_fork+0x10/0x20
[   31.678214] 
[   31.678327] The buggy address belongs to the physical page:
[   31.678388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bdc
[   31.678522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.678586] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.678641] page_type: f8(unknown)
[   31.678682] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.678731] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.678781] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.678829] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.678878] head: 0bfffe0000000002 ffffc1ffc326f701 00000000ffffffff 00000000ffffffff
[   31.678938] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.678978] page dumped because: kasan: bad access detected
[   31.679009] 
[   31.679029] Memory state around the buggy address:
[   31.679061]  fff00000c9bddf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.679105]  fff00000c9bddf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.679148] >fff00000c9bde000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.679187]                    ^
[   31.679216]  fff00000c9bde080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.679257]  fff00000c9bde100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.679296] ==================================================================

[   26.501992] ==================================================================
[   26.502818] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.503339] Read of size 1 at addr ffff888105aba2bb by task kunit_try_catch/274
[   26.504063] 
[   26.504302] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   26.504366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.504382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.504423] Call Trace:
[   26.504441]  <TASK>
[   26.504463]  dump_stack_lvl+0x73/0xb0
[   26.504500]  print_report+0xd1/0x650
[   26.504526]  ? __virt_addr_valid+0x1db/0x2d0
[   26.504554]  ? mempool_oob_right_helper+0x318/0x380
[   26.504580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.504609]  ? mempool_oob_right_helper+0x318/0x380
[   26.504636]  kasan_report+0x141/0x180
[   26.504661]  ? mempool_oob_right_helper+0x318/0x380
[   26.504692]  __asan_report_load1_noabort+0x18/0x20
[   26.504720]  mempool_oob_right_helper+0x318/0x380
[   26.504746]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.504774]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.504802]  ? finish_task_switch.isra.0+0x153/0x700
[   26.504831]  mempool_slab_oob_right+0xed/0x140
[   26.504857]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   26.504885]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   26.504914]  ? __pfx_mempool_free_slab+0x10/0x10
[   26.504941]  ? __pfx_read_tsc+0x10/0x10
[   26.504968]  ? ktime_get_ts64+0x86/0x230
[   26.504996]  kunit_try_run_case+0x1a5/0x480
[   26.505028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.505054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.505083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.505110]  ? __kthread_parkme+0x82/0x180
[   26.505133]  ? preempt_count_sub+0x50/0x80
[   26.505159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.505187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.505229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.505257]  kthread+0x337/0x6f0
[   26.505280]  ? trace_preempt_on+0x20/0xc0
[   26.505309]  ? __pfx_kthread+0x10/0x10
[   26.505331]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.505357]  ? calculate_sigpending+0x7b/0xa0
[   26.505384]  ? __pfx_kthread+0x10/0x10
[   26.505418]  ret_from_fork+0x116/0x1d0
[   26.505440]  ? __pfx_kthread+0x10/0x10
[   26.505465]  ret_from_fork_asm+0x1a/0x30
[   26.505501]  </TASK>
[   26.505516] 
[   26.517816] Allocated by task 274:
[   26.518048]  kasan_save_stack+0x45/0x70
[   26.518369]  kasan_save_track+0x18/0x40
[   26.518719]  kasan_save_alloc_info+0x3b/0x50
[   26.518956]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   26.519524]  remove_element+0x11e/0x190
[   26.519745]  mempool_alloc_preallocated+0x4d/0x90
[   26.520211]  mempool_oob_right_helper+0x8a/0x380
[   26.520569]  mempool_slab_oob_right+0xed/0x140
[   26.520805]  kunit_try_run_case+0x1a5/0x480
[   26.521142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.521495]  kthread+0x337/0x6f0
[   26.521675]  ret_from_fork+0x116/0x1d0
[   26.521845]  ret_from_fork_asm+0x1a/0x30
[   26.522071] 
[   26.522746] The buggy address belongs to the object at ffff888105aba240
[   26.522746]  which belongs to the cache test_cache of size 123
[   26.523461] The buggy address is located 0 bytes to the right of
[   26.523461]  allocated 123-byte region [ffff888105aba240, ffff888105aba2bb)
[   26.524411] 
[   26.524522] The buggy address belongs to the physical page:
[   26.524717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aba
[   26.525091] flags: 0x200000000000000(node=0|zone=2)
[   26.525358] page_type: f5(slab)
[   26.525731] raw: 0200000000000000 ffff888101d9e640 dead000000000122 0000000000000000
[   26.526174] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.526707] page dumped because: kasan: bad access detected
[   26.527583] 
[   26.527693] Memory state around the buggy address:
[   26.527873]  ffff888105aba180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.528243]  ffff888105aba200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.528776] >ffff888105aba280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.529107]                                         ^
[   26.529499]  ffff888105aba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529828]  ffff888105aba380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.530088] ==================================================================
[   26.474719] ==================================================================
[   26.475764] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.476175] Read of size 1 at addr ffff8881062d6001 by task kunit_try_catch/272
[   26.476585] 
[   26.476754] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   26.476845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.476859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.476886] Call Trace:
[   26.476903]  <TASK>
[   26.476925]  dump_stack_lvl+0x73/0xb0
[   26.476960]  print_report+0xd1/0x650
[   26.476986]  ? __virt_addr_valid+0x1db/0x2d0
[   26.477013]  ? mempool_oob_right_helper+0x318/0x380
[   26.477039]  ? kasan_addr_to_slab+0x11/0xa0
[   26.477065]  ? mempool_oob_right_helper+0x318/0x380
[   26.477091]  kasan_report+0x141/0x180
[   26.477116]  ? mempool_oob_right_helper+0x318/0x380
[   26.477147]  __asan_report_load1_noabort+0x18/0x20
[   26.477174]  mempool_oob_right_helper+0x318/0x380
[   26.477200]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.477226]  ? update_load_avg+0x1be/0x21b0
[   26.477255]  ? dequeue_entities+0x27e/0x1740
[   26.477282]  ? finish_task_switch.isra.0+0x153/0x700
[   26.477311]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   26.477338]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   26.477367]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.477406]  ? __pfx_mempool_kfree+0x10/0x10
[   26.477433]  ? __pfx_read_tsc+0x10/0x10
[   26.477459]  ? ktime_get_ts64+0x86/0x230
[   26.477486]  kunit_try_run_case+0x1a5/0x480
[   26.477518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.477544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.477572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.477600]  ? __kthread_parkme+0x82/0x180
[   26.477623]  ? preempt_count_sub+0x50/0x80
[   26.477648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.477676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.477704]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.477731]  kthread+0x337/0x6f0
[   26.477754]  ? trace_preempt_on+0x20/0xc0
[   26.477781]  ? __pfx_kthread+0x10/0x10
[   26.477804]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.477829]  ? calculate_sigpending+0x7b/0xa0
[   26.477857]  ? __pfx_kthread+0x10/0x10
[   26.477897]  ret_from_fork+0x116/0x1d0
[   26.477921]  ? __pfx_kthread+0x10/0x10
[   26.477945]  ret_from_fork_asm+0x1a/0x30
[   26.477979]  </TASK>
[   26.477993] 
[   26.487750] The buggy address belongs to the physical page:
[   26.488656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   26.489273] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.489701] flags: 0x200000000000040(head|node=0|zone=2)
[   26.490068] page_type: f8(unknown)
[   26.490252] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.490576] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.491149] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.491610] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.492510] head: 0200000000000002 ffffea000418b501 00000000ffffffff 00000000ffffffff
[   26.493106] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.493707] page dumped because: kasan: bad access detected
[   26.493919] 
[   26.494279] Memory state around the buggy address:
[   26.494826]  ffff8881062d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.495425]  ffff8881062d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.495656] >ffff8881062d6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.495872]                    ^
[   26.495998]  ffff8881062d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.496309]  ffff8881062d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.496971] ==================================================================
[   26.440458] ==================================================================
[   26.440937] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.441898] Read of size 1 at addr ffff888105aac673 by task kunit_try_catch/270
[   26.442528] 
[   26.442676] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   26.442914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.442934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.442963] Call Trace:
[   26.442979]  <TASK>
[   26.443003]  dump_stack_lvl+0x73/0xb0
[   26.443060]  print_report+0xd1/0x650
[   26.443088]  ? __virt_addr_valid+0x1db/0x2d0
[   26.443116]  ? mempool_oob_right_helper+0x318/0x380
[   26.443143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.443193]  ? mempool_oob_right_helper+0x318/0x380
[   26.443219]  kasan_report+0x141/0x180
[   26.443243]  ? mempool_oob_right_helper+0x318/0x380
[   26.443274]  __asan_report_load1_noabort+0x18/0x20
[   26.443300]  mempool_oob_right_helper+0x318/0x380
[   26.443327]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.443355]  ? __kasan_check_write+0x18/0x20
[   26.443380]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.443421]  ? finish_task_switch.isra.0+0x153/0x700
[   26.443451]  mempool_kmalloc_oob_right+0xf2/0x150
[   26.443477]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   26.443506]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.443533]  ? __pfx_mempool_kfree+0x10/0x10
[   26.443560]  ? __pfx_read_tsc+0x10/0x10
[   26.443587]  ? ktime_get_ts64+0x86/0x230
[   26.443615]  kunit_try_run_case+0x1a5/0x480
[   26.443647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.443672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.443702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.443729]  ? __kthread_parkme+0x82/0x180
[   26.443753]  ? preempt_count_sub+0x50/0x80
[   26.443778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.443806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.443833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.443860]  kthread+0x337/0x6f0
[   26.443882]  ? trace_preempt_on+0x20/0xc0
[   26.443909]  ? __pfx_kthread+0x10/0x10
[   26.443933]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.443957]  ? calculate_sigpending+0x7b/0xa0
[   26.443986]  ? __pfx_kthread+0x10/0x10
[   26.444011]  ret_from_fork+0x116/0x1d0
[   26.444032]  ? __pfx_kthread+0x10/0x10
[   26.444057]  ret_from_fork_asm+0x1a/0x30
[   26.444093]  </TASK>
[   26.444109] 
[   26.456097] Allocated by task 270:
[   26.456368]  kasan_save_stack+0x45/0x70
[   26.456577]  kasan_save_track+0x18/0x40
[   26.457315]  kasan_save_alloc_info+0x3b/0x50
[   26.457591]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.457862]  remove_element+0x11e/0x190
[   26.458313]  mempool_alloc_preallocated+0x4d/0x90
[   26.458577]  mempool_oob_right_helper+0x8a/0x380
[   26.458869]  mempool_kmalloc_oob_right+0xf2/0x150
[   26.459317]  kunit_try_run_case+0x1a5/0x480
[   26.459680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.460376]  kthread+0x337/0x6f0
[   26.460592]  ret_from_fork+0x116/0x1d0
[   26.460803]  ret_from_fork_asm+0x1a/0x30
[   26.461037] 
[   26.461252] The buggy address belongs to the object at ffff888105aac600
[   26.461252]  which belongs to the cache kmalloc-128 of size 128
[   26.462433] The buggy address is located 0 bytes to the right of
[   26.462433]  allocated 115-byte region [ffff888105aac600, ffff888105aac673)
[   26.463436] 
[   26.463792] The buggy address belongs to the physical page:
[   26.464128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aac
[   26.464734] flags: 0x200000000000000(node=0|zone=2)
[   26.465248] page_type: f5(slab)
[   26.465558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.465874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.466454] page dumped because: kasan: bad access detected
[   26.466710] 
[   26.466810] Memory state around the buggy address:
[   26.467069]  ffff888105aac500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.467716]  ffff888105aac580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.468107] >ffff888105aac600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.468609]                                                              ^
[   26.468946]  ffff888105aac680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.469297]  ffff888105aac700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.469699] ==================================================================