Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.519126] ==================================================================
[   32.519206] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.519286] Read of size 1 at addr fff00000c9bd9273 by task kunit_try_catch/254
[   32.519339] 
[   32.519383] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.519481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.519511] Hardware name: linux,dummy-virt (DT)
[   32.519548] Call trace:
[   32.519573]  show_stack+0x20/0x38 (C)
[   32.519625]  dump_stack_lvl+0x8c/0xd0
[   32.519676]  print_report+0x118/0x5e8
[   32.519719]  kasan_report+0xdc/0x128
[   32.519760]  __asan_report_load1_noabort+0x20/0x30
[   32.519808]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.519858]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.519924]  kunit_try_run_case+0x170/0x3f0
[   32.519973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.520025]  kthread+0x328/0x630
[   32.520067]  ret_from_fork+0x10/0x20
[   32.520116] 
[   32.520137] Allocated by task 254:
[   32.520168]  kasan_save_stack+0x3c/0x68
[   32.520209]  kasan_save_track+0x20/0x40
[   32.520243]  kasan_save_alloc_info+0x40/0x58
[   32.520282]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.520323]  remove_element+0x130/0x1f8
[   32.520364]  mempool_alloc_preallocated+0x58/0xc0
[   32.520403]  mempool_oob_right_helper+0x98/0x2f0
[   32.520445]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.520484]  kunit_try_run_case+0x170/0x3f0
[   32.520522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.520677]  kthread+0x328/0x630
[   32.520713]  ret_from_fork+0x10/0x20
[   32.520748] 
[   32.520768] The buggy address belongs to the object at fff00000c9bd9200
[   32.520768]  which belongs to the cache kmalloc-128 of size 128
[   32.520828] The buggy address is located 0 bytes to the right of
[   32.520828]  allocated 115-byte region [fff00000c9bd9200, fff00000c9bd9273)
[   32.520891] 
[   32.520925] The buggy address belongs to the physical page:
[   32.520968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   32.521029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.521084] page_type: f5(slab)
[   32.521127] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.521177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.521217] page dumped because: kasan: bad access detected
[   32.521248] 
[   32.521266] Memory state around the buggy address:
[   32.521300]  fff00000c9bd9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.521343]  fff00000c9bd9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.521385] >fff00000c9bd9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.521424]                                                              ^
[   32.521466]  fff00000c9bd9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.521509]  fff00000c9bd9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.521545] ==================================================================
[   32.554136] ==================================================================
[   32.554207] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.554270] Read of size 1 at addr fff00000c9c1d2bb by task kunit_try_catch/258
[   32.554427] 
[   32.554473] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.554662] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.554719] Hardware name: linux,dummy-virt (DT)
[   32.554769] Call trace:
[   32.554857]  show_stack+0x20/0x38 (C)
[   32.554938]  dump_stack_lvl+0x8c/0xd0
[   32.555249]  print_report+0x118/0x5e8
[   32.555323]  kasan_report+0xdc/0x128
[   32.555375]  __asan_report_load1_noabort+0x20/0x30
[   32.555433]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.555492]  mempool_slab_oob_right+0xc0/0x118
[   32.555566]  kunit_try_run_case+0x170/0x3f0
[   32.555627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.555680]  kthread+0x328/0x630
[   32.555728]  ret_from_fork+0x10/0x20
[   32.555847] 
[   32.555884] Allocated by task 258:
[   32.556082]  kasan_save_stack+0x3c/0x68
[   32.556130]  kasan_save_track+0x20/0x40
[   32.556166]  kasan_save_alloc_info+0x40/0x58
[   32.556224]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.556268]  remove_element+0x16c/0x1f8
[   32.556350]  mempool_alloc_preallocated+0x58/0xc0
[   32.556489]  mempool_oob_right_helper+0x98/0x2f0
[   32.556545]  mempool_slab_oob_right+0xc0/0x118
[   32.556639]  kunit_try_run_case+0x170/0x3f0
[   32.556982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.557170]  kthread+0x328/0x630
[   32.557227]  ret_from_fork+0x10/0x20
[   32.557265] 
[   32.557285] The buggy address belongs to the object at fff00000c9c1d240
[   32.557285]  which belongs to the cache test_cache of size 123
[   32.557346] The buggy address is located 0 bytes to the right of
[   32.557346]  allocated 123-byte region [fff00000c9c1d240, fff00000c9c1d2bb)
[   32.557592] 
[   32.557617] The buggy address belongs to the physical page:
[   32.557653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c1d
[   32.557736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.557884] page_type: f5(slab)
[   32.557952] raw: 0bfffe0000000000 fff00000c1b0d780 dead000000000122 0000000000000000
[   32.558081] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.558160] page dumped because: kasan: bad access detected
[   32.558271] 
[   32.558330] Memory state around the buggy address:
[   32.558436]  fff00000c9c1d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.558492]  fff00000c9c1d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.558850] >fff00000c9c1d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.559007]                                         ^
[   32.559080]  fff00000c9c1d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.559200]  fff00000c9c1d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.559277] ==================================================================
[   32.528281] ==================================================================
[   32.529047] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.530175] Read of size 1 at addr fff00000c99a6001 by task kunit_try_catch/256
[   32.531025] 
[   32.531293] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.531708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.531871] Hardware name: linux,dummy-virt (DT)
[   32.532294] Call trace:
[   32.532325]  show_stack+0x20/0x38 (C)
[   32.532623]  dump_stack_lvl+0x8c/0xd0
[   32.532694]  print_report+0x118/0x5e8
[   32.533313]  kasan_report+0xdc/0x128
[   32.533370]  __asan_report_load1_noabort+0x20/0x30
[   32.533420]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.533470]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.533522]  kunit_try_run_case+0x170/0x3f0
[   32.533573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.533624]  kthread+0x328/0x630
[   32.533666]  ret_from_fork+0x10/0x20
[   32.533714] 
[   32.533735] The buggy address belongs to the physical page:
[   32.533771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099a4
[   32.533825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.533872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.533938] page_type: f8(unknown)
[   32.533974] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.534023] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.535320] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.535382] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.535914] head: 0bfffe0000000002 ffffc1ffc3266901 00000000ffffffff 00000000ffffffff
[   32.536558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.536936] page dumped because: kasan: bad access detected
[   32.536977] 
[   32.536996] Memory state around the buggy address:
[   32.537520]  fff00000c99a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537697]  fff00000c99a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537742] >fff00000c99a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.537781]                    ^
[   32.538238]  fff00000c99a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.538858]  fff00000c99a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.539134] ==================================================================

[   26.698198] ==================================================================
[   26.698667] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.699027] Read of size 1 at addr ffff888106146001 by task kunit_try_catch/272
[   26.699288] 
[   26.699382] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.699435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.699449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.699473] Call Trace:
[   26.699486]  <TASK>
[   26.699506]  dump_stack_lvl+0x73/0xb0
[   26.699537]  print_report+0xd1/0x640
[   26.699562]  ? __virt_addr_valid+0x1db/0x2d0
[   26.699587]  ? mempool_oob_right_helper+0x318/0x380
[   26.699611]  ? kasan_addr_to_slab+0x11/0xa0
[   26.699639]  ? mempool_oob_right_helper+0x318/0x380
[   26.699663]  kasan_report+0x141/0x180
[   26.699687]  ? mempool_oob_right_helper+0x318/0x380
[   26.699714]  __asan_report_load1_noabort+0x18/0x20
[   26.699739]  mempool_oob_right_helper+0x318/0x380
[   26.699764]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.699789]  ? dequeue_entities+0x23f/0x1630
[   26.699815]  ? __kasan_check_write+0x18/0x20
[   26.699839]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.699860]  ? finish_task_switch.isra.0+0x153/0x700
[   26.699887]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   26.699912]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   26.700004]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.700038]  ? __pfx_mempool_kfree+0x10/0x10
[   26.700066]  ? __pfx_read_tsc+0x10/0x10
[   26.700090]  ? ktime_get_ts64+0x86/0x230
[   26.700115]  kunit_try_run_case+0x1a5/0x480
[   26.700142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.700178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.700206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.700231]  ? __kthread_parkme+0x82/0x180
[   26.700252]  ? preempt_count_sub+0x50/0x80
[   26.700276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.700300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.700325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.700350]  kthread+0x337/0x6f0
[   26.700425]  ? trace_preempt_on+0x20/0xc0
[   26.700456]  ? __pfx_kthread+0x10/0x10
[   26.700478]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.700503]  ? calculate_sigpending+0x7b/0xa0
[   26.700527]  ? __pfx_kthread+0x10/0x10
[   26.700550]  ret_from_fork+0x116/0x1d0
[   26.700572]  ? __pfx_kthread+0x10/0x10
[   26.700592]  ret_from_fork_asm+0x1a/0x30
[   26.700625]  </TASK>
[   26.700637] 
[   26.709198] The buggy address belongs to the physical page:
[   26.709518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144
[   26.709801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.710282] flags: 0x200000000000040(head|node=0|zone=2)
[   26.710972] page_type: f8(unknown)
[   26.711163] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.711569] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.711866] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.712232] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.712583] head: 0200000000000002 ffffea0004185101 00000000ffffffff 00000000ffffffff
[   26.712849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.713316] page dumped because: kasan: bad access detected
[   26.713537] 
[   26.713678] Memory state around the buggy address:
[   26.713876]  ffff888106145f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.714236]  ffff888106145f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.714564] >ffff888106146000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.714832]                    ^
[   26.714992]  ffff888106146080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.715292]  ffff888106146100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.715725] ==================================================================
[   26.722058] ==================================================================
[   26.722572] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.722907] Read of size 1 at addr ffff8881060a62bb by task kunit_try_catch/274
[   26.723198] 
[   26.723297] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.723352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.723366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.723390] Call Trace:
[   26.723403]  <TASK>
[   26.723423]  dump_stack_lvl+0x73/0xb0
[   26.723456]  print_report+0xd1/0x640
[   26.723481]  ? __virt_addr_valid+0x1db/0x2d0
[   26.723518]  ? mempool_oob_right_helper+0x318/0x380
[   26.723541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.723568]  ? mempool_oob_right_helper+0x318/0x380
[   26.723591]  kasan_report+0x141/0x180
[   26.723614]  ? mempool_oob_right_helper+0x318/0x380
[   26.723647]  __asan_report_load1_noabort+0x18/0x20
[   26.723672]  mempool_oob_right_helper+0x318/0x380
[   26.723697]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.723724]  ? finish_task_switch.isra.0+0x153/0x700
[   26.723750]  mempool_slab_oob_right+0xed/0x140
[   26.723774]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   26.723800]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   26.723827]  ? __pfx_mempool_free_slab+0x10/0x10
[   26.723853]  ? __pfx_read_tsc+0x10/0x10
[   26.723876]  ? ktime_get_ts64+0x86/0x230
[   26.723903]  kunit_try_run_case+0x1a5/0x480
[   26.723930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.723953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.723991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.724016]  ? __kthread_parkme+0x82/0x180
[   26.724037]  ? preempt_count_sub+0x50/0x80
[   26.724060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.724085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.724109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.724132]  kthread+0x337/0x6f0
[   26.724164]  ? trace_preempt_on+0x20/0xc0
[   26.724190]  ? __pfx_kthread+0x10/0x10
[   26.724210]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.724234]  ? calculate_sigpending+0x7b/0xa0
[   26.724260]  ? __pfx_kthread+0x10/0x10
[   26.724282]  ret_from_fork+0x116/0x1d0
[   26.724301]  ? __pfx_kthread+0x10/0x10
[   26.724322]  ret_from_fork_asm+0x1a/0x30
[   26.724355]  </TASK>
[   26.724367] 
[   26.732762] Allocated by task 274:
[   26.732909]  kasan_save_stack+0x45/0x70
[   26.733128]  kasan_save_track+0x18/0x40
[   26.733305]  kasan_save_alloc_info+0x3b/0x50
[   26.733494]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   26.733716]  remove_element+0x11e/0x190
[   26.733889]  mempool_alloc_preallocated+0x4d/0x90
[   26.734046]  mempool_oob_right_helper+0x8a/0x380
[   26.734208]  mempool_slab_oob_right+0xed/0x140
[   26.734382]  kunit_try_run_case+0x1a5/0x480
[   26.734581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.734830]  kthread+0x337/0x6f0
[   26.734995]  ret_from_fork+0x116/0x1d0
[   26.735143]  ret_from_fork_asm+0x1a/0x30
[   26.735355] 
[   26.735552] The buggy address belongs to the object at ffff8881060a6240
[   26.735552]  which belongs to the cache test_cache of size 123
[   26.736234] The buggy address is located 0 bytes to the right of
[   26.736234]  allocated 123-byte region [ffff8881060a6240, ffff8881060a62bb)
[   26.736880] 
[   26.737024] The buggy address belongs to the physical page:
[   26.737240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a6
[   26.737675] flags: 0x200000000000000(node=0|zone=2)
[   26.737884] page_type: f5(slab)
[   26.738127] raw: 0200000000000000 ffff888101242c80 dead000000000122 0000000000000000
[   26.738511] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.738798] page dumped because: kasan: bad access detected
[   26.739059] 
[   26.739158] Memory state around the buggy address:
[   26.739356]  ffff8881060a6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.739639]  ffff8881060a6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.739920] >ffff8881060a6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.740287]                                         ^
[   26.740732]  ffff8881060a6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.741027]  ffff8881060a6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.741320] ==================================================================
[   26.669553] ==================================================================
[   26.669984] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.670730] Read of size 1 at addr ffff888104964973 by task kunit_try_catch/270
[   26.671023] 
[   26.671118] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.671190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.671204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.671228] Call Trace:
[   26.671243]  <TASK>
[   26.671264]  dump_stack_lvl+0x73/0xb0
[   26.671300]  print_report+0xd1/0x640
[   26.671325]  ? __virt_addr_valid+0x1db/0x2d0
[   26.671353]  ? mempool_oob_right_helper+0x318/0x380
[   26.671762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.671804]  ? mempool_oob_right_helper+0x318/0x380
[   26.671829]  kasan_report+0x141/0x180
[   26.671853]  ? mempool_oob_right_helper+0x318/0x380
[   26.671883]  __asan_report_load1_noabort+0x18/0x20
[   26.671909]  mempool_oob_right_helper+0x318/0x380
[   26.671934]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.671974]  ? ret_from_fork+0x116/0x1d0
[   26.671994]  ? kthread+0x337/0x6f0
[   26.672017]  ? ret_from_fork_asm+0x1a/0x30
[   26.672046]  mempool_kmalloc_oob_right+0xf2/0x150
[   26.672070]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   26.672097]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.672125]  ? __pfx_mempool_kfree+0x10/0x10
[   26.672163]  ? __pfx_read_tsc+0x10/0x10
[   26.672186]  ? ktime_get_ts64+0x86/0x230
[   26.672212]  kunit_try_run_case+0x1a5/0x480
[   26.672241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.672264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.672292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.672317]  ? __kthread_parkme+0x82/0x180
[   26.672337]  ? preempt_count_sub+0x50/0x80
[   26.672362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.672445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.672470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.672494]  kthread+0x337/0x6f0
[   26.672514]  ? trace_preempt_on+0x20/0xc0
[   26.672540]  ? __pfx_kthread+0x10/0x10
[   26.672561]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.672586]  ? calculate_sigpending+0x7b/0xa0
[   26.672612]  ? __pfx_kthread+0x10/0x10
[   26.672634]  ret_from_fork+0x116/0x1d0
[   26.672653]  ? __pfx_kthread+0x10/0x10
[   26.672675]  ret_from_fork_asm+0x1a/0x30
[   26.672705]  </TASK>
[   26.672718] 
[   26.684465] Allocated by task 270:
[   26.684613]  kasan_save_stack+0x45/0x70
[   26.684782]  kasan_save_track+0x18/0x40
[   26.684994]  kasan_save_alloc_info+0x3b/0x50
[   26.685211]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.685437]  remove_element+0x11e/0x190
[   26.685617]  mempool_alloc_preallocated+0x4d/0x90
[   26.685847]  mempool_oob_right_helper+0x8a/0x380
[   26.686093]  mempool_kmalloc_oob_right+0xf2/0x150
[   26.686303]  kunit_try_run_case+0x1a5/0x480
[   26.686797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.687052]  kthread+0x337/0x6f0
[   26.687188]  ret_from_fork+0x116/0x1d0
[   26.687324]  ret_from_fork_asm+0x1a/0x30
[   26.687592] 
[   26.687700] The buggy address belongs to the object at ffff888104964900
[   26.687700]  which belongs to the cache kmalloc-128 of size 128
[   26.688283] The buggy address is located 0 bytes to the right of
[   26.688283]  allocated 115-byte region [ffff888104964900, ffff888104964973)
[   26.688892] 
[   26.688986] The buggy address belongs to the physical page:
[   26.689188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104964
[   26.689491] flags: 0x200000000000000(node=0|zone=2)
[   26.689697] page_type: f5(slab)
[   26.689833] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.690133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.690555] page dumped because: kasan: bad access detected
[   26.690810] 
[   26.690901] Memory state around the buggy address:
[   26.691114]  ffff888104964800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.691630]  ffff888104964880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.691930] >ffff888104964900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.692257]                                                              ^
[   26.692593]  ffff888104964980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.692865]  ffff888104964a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.693184] ==================================================================