Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.066143] ==================================================================
[   20.066206] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.066520] Read of size 1 at addr fff00000c792d2bb by task kunit_try_catch/225
[   20.066683] 
[   20.066801] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.066955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066982] Hardware name: linux,dummy-virt (DT)
[   20.067014] Call trace:
[   20.067039]  show_stack+0x20/0x38 (C)
[   20.067085]  dump_stack_lvl+0x8c/0xd0
[   20.067131]  print_report+0x118/0x608
[   20.067177]  kasan_report+0xdc/0x128
[   20.067222]  __asan_report_load1_noabort+0x20/0x30
[   20.067271]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.067318]  mempool_slab_oob_right+0xc0/0x118
[   20.067366]  kunit_try_run_case+0x170/0x3f0
[   20.067444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.067499]  kthread+0x328/0x630
[   20.067635]  ret_from_fork+0x10/0x20
[   20.067942] 
[   20.067965] Allocated by task 225:
[   20.068103]  kasan_save_stack+0x3c/0x68
[   20.068177]  kasan_save_track+0x20/0x40
[   20.068363]  kasan_save_alloc_info+0x40/0x58
[   20.068552]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.068713]  remove_element+0x16c/0x1f8
[   20.068793]  mempool_alloc_preallocated+0x58/0xc0
[   20.068895]  mempool_oob_right_helper+0x98/0x2f0
[   20.068936]  mempool_slab_oob_right+0xc0/0x118
[   20.068974]  kunit_try_run_case+0x170/0x3f0
[   20.069031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.069210]  kthread+0x328/0x630
[   20.069242]  ret_from_fork+0x10/0x20
[   20.069322] 
[   20.069405] The buggy address belongs to the object at fff00000c792d240
[   20.069405]  which belongs to the cache test_cache of size 123
[   20.069488] The buggy address is located 0 bytes to the right of
[   20.069488]  allocated 123-byte region [fff00000c792d240, fff00000c792d2bb)
[   20.069659] 
[   20.069681] The buggy address belongs to the physical page:
[   20.069716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10792d
[   20.069839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.069896] page_type: f5(slab)
[   20.069932] raw: 0bfffe0000000000 fff00000c5ca5dc0 dead000000000122 0000000000000000
[   20.069981] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.070020] page dumped because: kasan: bad access detected
[   20.070051] 
[   20.070427] Memory state around the buggy address:
[   20.070644]  fff00000c792d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.070713]  fff00000c792d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.070784] >fff00000c792d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.070822]                                         ^
[   20.071095]  fff00000c792d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.071142]  fff00000c792d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.071180] ==================================================================
[   20.021842] ==================================================================
[   20.021942] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.022017] Read of size 1 at addr fff00000c6398073 by task kunit_try_catch/221
[   20.022068] 
[   20.022113] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.022196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.022223] Hardware name: linux,dummy-virt (DT)
[   20.022257] Call trace:
[   20.022281]  show_stack+0x20/0x38 (C)
[   20.022336]  dump_stack_lvl+0x8c/0xd0
[   20.022386]  print_report+0x118/0x608
[   20.022434]  kasan_report+0xdc/0x128
[   20.022480]  __asan_report_load1_noabort+0x20/0x30
[   20.022532]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.022579]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.022628]  kunit_try_run_case+0x170/0x3f0
[   20.022678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.022730]  kthread+0x328/0x630
[   20.022807]  ret_from_fork+0x10/0x20
[   20.022870] 
[   20.022901] Allocated by task 221:
[   20.022932]  kasan_save_stack+0x3c/0x68
[   20.022975]  kasan_save_track+0x20/0x40
[   20.023013]  kasan_save_alloc_info+0x40/0x58
[   20.023054]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.023098]  remove_element+0x130/0x1f8
[   20.023135]  mempool_alloc_preallocated+0x58/0xc0
[   20.023174]  mempool_oob_right_helper+0x98/0x2f0
[   20.023212]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.023253]  kunit_try_run_case+0x170/0x3f0
[   20.023291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.023334]  kthread+0x328/0x630
[   20.023367]  ret_from_fork+0x10/0x20
[   20.023403] 
[   20.023427] The buggy address belongs to the object at fff00000c6398000
[   20.023427]  which belongs to the cache kmalloc-128 of size 128
[   20.023485] The buggy address is located 0 bytes to the right of
[   20.023485]  allocated 115-byte region [fff00000c6398000, fff00000c6398073)
[   20.023548] 
[   20.023569] The buggy address belongs to the physical page:
[   20.023603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   20.023655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.023707] page_type: f5(slab)
[   20.023749] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.023798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.023838] page dumped because: kasan: bad access detected
[   20.023881] 
[   20.023900] Memory state around the buggy address:
[   20.023934]  fff00000c6397f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.023976]  fff00000c6397f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.024019] >fff00000c6398000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.024059]                                                              ^
[   20.024098]  fff00000c6398080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.024140]  fff00000c6398100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.024178] ==================================================================
[   20.052949] ==================================================================
[   20.053020] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.053086] Read of size 1 at addr fff00000c7916001 by task kunit_try_catch/223
[   20.053135] 
[   20.053173] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.053257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.053286] Hardware name: linux,dummy-virt (DT)
[   20.053319] Call trace:
[   20.053343]  show_stack+0x20/0x38 (C)
[   20.053394]  dump_stack_lvl+0x8c/0xd0
[   20.053448]  print_report+0x118/0x608
[   20.053498]  kasan_report+0xdc/0x128
[   20.053543]  __asan_report_load1_noabort+0x20/0x30
[   20.053592]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.053640]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.053689]  kunit_try_run_case+0x170/0x3f0
[   20.053739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.053791]  kthread+0x328/0x630
[   20.053834]  ret_from_fork+0x10/0x20
[   20.053894] 
[   20.053915] The buggy address belongs to the physical page:
[   20.053949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   20.054001] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.054049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.054103] page_type: f8(unknown)
[   20.054141] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.054190] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.054238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.054287] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.054335] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff
[   20.054382] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.054424] page dumped because: kasan: bad access detected
[   20.054454] 
[   20.054474] Memory state around the buggy address:
[   20.054505]  fff00000c7915f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.054547]  fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.054590] >fff00000c7916000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.054627]                    ^
[   20.054653]  fff00000c7916080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.054694]  fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.054732] ==================================================================

[   13.080762] ==================================================================
[   13.081281] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.081831] Read of size 1 at addr ffff8881038e72bb by task kunit_try_catch/243
[   13.082072] 
[   13.082189] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.082233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.082245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.082268] Call Trace:
[   13.082282]  <TASK>
[   13.082298]  dump_stack_lvl+0x73/0xb0
[   13.082329]  print_report+0xd1/0x650
[   13.082352]  ? __virt_addr_valid+0x1db/0x2d0
[   13.082376]  ? mempool_oob_right_helper+0x318/0x380
[   13.082400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.082422]  ? mempool_oob_right_helper+0x318/0x380
[   13.082446]  kasan_report+0x141/0x180
[   13.082481]  ? mempool_oob_right_helper+0x318/0x380
[   13.082509]  __asan_report_load1_noabort+0x18/0x20
[   13.082532]  mempool_oob_right_helper+0x318/0x380
[   13.082556]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.082582]  ? irqentry_exit+0x2a/0x60
[   13.082603]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.082629]  mempool_slab_oob_right+0xed/0x140
[   13.082652]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.082678]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.082698]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.082719]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.082744]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.082769]  kunit_try_run_case+0x1a5/0x480
[   13.082794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.082815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.082839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.082861]  ? __kthread_parkme+0x82/0x180
[   13.082882]  ? preempt_count_sub+0x50/0x80
[   13.082905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.082929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.082952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.082975]  kthread+0x337/0x6f0
[   13.082994]  ? trace_preempt_on+0x20/0xc0
[   13.083017]  ? __pfx_kthread+0x10/0x10
[   13.083037]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.083058]  ? calculate_sigpending+0x7b/0xa0
[   13.083082]  ? __pfx_kthread+0x10/0x10
[   13.083102]  ret_from_fork+0x116/0x1d0
[   13.083121]  ? __pfx_kthread+0x10/0x10
[   13.083141]  ret_from_fork_asm+0x1a/0x30
[   13.083172]  </TASK>
[   13.083182] 
[   13.091158] Allocated by task 243:
[   13.091305]  kasan_save_stack+0x45/0x70
[   13.091514]  kasan_save_track+0x18/0x40
[   13.091705]  kasan_save_alloc_info+0x3b/0x50
[   13.091876]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.092054]  remove_element+0x11e/0x190
[   13.092211]  mempool_alloc_preallocated+0x4d/0x90
[   13.092406]  mempool_oob_right_helper+0x8a/0x380
[   13.092600]  mempool_slab_oob_right+0xed/0x140
[   13.092796]  kunit_try_run_case+0x1a5/0x480
[   13.093053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.093277]  kthread+0x337/0x6f0
[   13.093437]  ret_from_fork+0x116/0x1d0
[   13.093580]  ret_from_fork_asm+0x1a/0x30
[   13.093900] 
[   13.093998] The buggy address belongs to the object at ffff8881038e7240
[   13.093998]  which belongs to the cache test_cache of size 123
[   13.094383] The buggy address is located 0 bytes to the right of
[   13.094383]  allocated 123-byte region [ffff8881038e7240, ffff8881038e72bb)
[   13.094815] 
[   13.094914] The buggy address belongs to the physical page:
[   13.095167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e7
[   13.095533] flags: 0x200000000000000(node=0|zone=2)
[   13.095854] page_type: f5(slab)
[   13.096005] raw: 0200000000000000 ffff888101690a00 dead000000000122 0000000000000000
[   13.096240] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.096522] page dumped because: kasan: bad access detected
[   13.096903] 
[   13.096998] Memory state around the buggy address:
[   13.097223]  ffff8881038e7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.097557]  ffff8881038e7200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.097886] >ffff8881038e7280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.098155]                                         ^
[   13.098355]  ffff8881038e7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.098647]  ffff8881038e7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.098994] ==================================================================
[   13.053254] ==================================================================
[   13.054594] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.055146] Read of size 1 at addr ffff88810395a001 by task kunit_try_catch/241
[   13.055842] 
[   13.056142] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.056195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.056208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.056230] Call Trace:
[   13.056244]  <TASK>
[   13.056262]  dump_stack_lvl+0x73/0xb0
[   13.056294]  print_report+0xd1/0x650
[   13.056317]  ? __virt_addr_valid+0x1db/0x2d0
[   13.056341]  ? mempool_oob_right_helper+0x318/0x380
[   13.056363]  ? kasan_addr_to_slab+0x11/0xa0
[   13.056384]  ? mempool_oob_right_helper+0x318/0x380
[   13.056407]  kasan_report+0x141/0x180
[   13.056428]  ? mempool_oob_right_helper+0x318/0x380
[   13.056470]  __asan_report_load1_noabort+0x18/0x20
[   13.056494]  mempool_oob_right_helper+0x318/0x380
[   13.056518]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.056545]  ? mempool_alloc_preallocated+0x5b/0x90
[   13.056570]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   13.056594]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.056620]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.056643]  ? __pfx_mempool_kfree+0x10/0x10
[   13.056667]  ? __pfx_read_tsc+0x10/0x10
[   13.056689]  ? ktime_get_ts64+0x86/0x230
[   13.056714]  kunit_try_run_case+0x1a5/0x480
[   13.056738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.056760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.056783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.056806]  ? __kthread_parkme+0x82/0x180
[   13.056826]  ? preempt_count_sub+0x50/0x80
[   13.056850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.056873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.056895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.056918]  kthread+0x337/0x6f0
[   13.056938]  ? trace_preempt_on+0x20/0xc0
[   13.056960]  ? __pfx_kthread+0x10/0x10
[   13.056981]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.057002]  ? calculate_sigpending+0x7b/0xa0
[   13.057027]  ? __pfx_kthread+0x10/0x10
[   13.057047]  ret_from_fork+0x116/0x1d0
[   13.057066]  ? __pfx_kthread+0x10/0x10
[   13.057085]  ret_from_fork_asm+0x1a/0x30
[   13.057117]  </TASK>
[   13.057128] 
[   13.067077] The buggy address belongs to the physical page:
[   13.067705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103958
[   13.068665] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.069192] flags: 0x200000000000040(head|node=0|zone=2)
[   13.069594] page_type: f8(unknown)
[   13.069797] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.070111] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.070585] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.070908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.071195] head: 0200000000000002 ffffea00040e5601 00000000ffffffff 00000000ffffffff
[   13.071553] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.071900] page dumped because: kasan: bad access detected
[   13.072137] 
[   13.072226] Memory state around the buggy address:
[   13.072427]  ffff888103959f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.072706]  ffff888103959f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.073093] >ffff88810395a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.073581]                    ^
[   13.073792]  ffff88810395a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.074107]  ffff88810395a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.074413] ==================================================================
[   13.024600] ==================================================================
[   13.025094] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.025661] Read of size 1 at addr ffff8881031a0973 by task kunit_try_catch/239
[   13.025979] 
[   13.026222] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.026295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.026312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.026352] Call Trace:
[   13.026368]  <TASK>
[   13.026390]  dump_stack_lvl+0x73/0xb0
[   13.026427]  print_report+0xd1/0x650
[   13.026471]  ? __virt_addr_valid+0x1db/0x2d0
[   13.026503]  ? mempool_oob_right_helper+0x318/0x380
[   13.026532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.026561]  ? mempool_oob_right_helper+0x318/0x380
[   13.026589]  kasan_report+0x141/0x180
[   13.026613]  ? mempool_oob_right_helper+0x318/0x380
[   13.026647]  __asan_report_load1_noabort+0x18/0x20
[   13.026725]  mempool_oob_right_helper+0x318/0x380
[   13.026756]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.026786]  ? __kasan_check_write+0x18/0x20
[   13.026809]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.026837]  ? finish_task_switch.isra.0+0x153/0x700
[   13.026868]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.026895]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.026927]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.026955]  ? __pfx_mempool_kfree+0x10/0x10
[   13.026983]  ? __pfx_read_tsc+0x10/0x10
[   13.027008]  ? ktime_get_ts64+0x86/0x230
[   13.027037]  kunit_try_run_case+0x1a5/0x480
[   13.027067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.027094]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.027123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.027151]  ? __kthread_parkme+0x82/0x180
[   13.027176]  ? preempt_count_sub+0x50/0x80
[   13.027262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.027295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.027323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.027353]  kthread+0x337/0x6f0
[   13.027374]  ? trace_preempt_on+0x20/0xc0
[   13.027401]  ? __pfx_kthread+0x10/0x10
[   13.027425]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.027450]  ? calculate_sigpending+0x7b/0xa0
[   13.027490]  ? __pfx_kthread+0x10/0x10
[   13.027515]  ret_from_fork+0x116/0x1d0
[   13.027535]  ? __pfx_kthread+0x10/0x10
[   13.027558]  ret_from_fork_asm+0x1a/0x30
[   13.027593]  </TASK>
[   13.027606] 
[   13.038383] Allocated by task 239:
[   13.038694]  kasan_save_stack+0x45/0x70
[   13.038971]  kasan_save_track+0x18/0x40
[   13.039154]  kasan_save_alloc_info+0x3b/0x50
[   13.039593]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.039886]  remove_element+0x11e/0x190
[   13.040068]  mempool_alloc_preallocated+0x4d/0x90
[   13.040674]  mempool_oob_right_helper+0x8a/0x380
[   13.040868]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.041662]  kunit_try_run_case+0x1a5/0x480
[   13.041833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.042018]  kthread+0x337/0x6f0
[   13.042142]  ret_from_fork+0x116/0x1d0
[   13.042280]  ret_from_fork_asm+0x1a/0x30
[   13.042422] 
[   13.042605] The buggy address belongs to the object at ffff8881031a0900
[   13.042605]  which belongs to the cache kmalloc-128 of size 128
[   13.042981] The buggy address is located 0 bytes to the right of
[   13.042981]  allocated 115-byte region [ffff8881031a0900, ffff8881031a0973)
[   13.043987] 
[   13.044083] The buggy address belongs to the physical page:
[   13.044265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031a0
[   13.044953] flags: 0x200000000000000(node=0|zone=2)
[   13.045139] page_type: f5(slab)
[   13.045318] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.045606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.046018] page dumped because: kasan: bad access detected
[   13.046784] 
[   13.047136] Memory state around the buggy address:
[   13.047525]  ffff8881031a0800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.047775]  ffff8881031a0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.048008] >ffff8881031a0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.048233]                                                              ^
[   13.048464]  ffff8881031a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.048690]  ffff8881031a0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.048915] ==================================================================