Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.076698] ==================================================================
[   19.076771] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.076844] Read of size 1 at addr fff00000c5a4a973 by task kunit_try_catch/221
[   19.076896] 
[   19.076938] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.077029] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.077062] Hardware name: linux,dummy-virt (DT)
[   19.077109] Call trace:
[   19.077134]  show_stack+0x20/0x38 (C)
[   19.077188]  dump_stack_lvl+0x8c/0xd0
[   19.077242]  print_report+0x118/0x608
[   19.077291]  kasan_report+0xdc/0x128
[   19.077338]  __asan_report_load1_noabort+0x20/0x30
[   19.077391]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.077442]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.077492]  kunit_try_run_case+0x170/0x3f0
[   19.077543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.077596]  kthread+0x328/0x630
[   19.077660]  ret_from_fork+0x10/0x20
[   19.077723] 
[   19.077750] Allocated by task 221:
[   19.077781]  kasan_save_stack+0x3c/0x68
[   19.077824]  kasan_save_track+0x20/0x40
[   19.077864]  kasan_save_alloc_info+0x40/0x58
[   19.077905]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.077950]  remove_element+0x130/0x1f8
[   19.077989]  mempool_alloc_preallocated+0x58/0xc0
[   19.078029]  mempool_oob_right_helper+0x98/0x2f0
[   19.078068]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.078120]  kunit_try_run_case+0x170/0x3f0
[   19.078160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.078204]  kthread+0x328/0x630
[   19.078237]  ret_from_fork+0x10/0x20
[   19.078274] 
[   19.078295] The buggy address belongs to the object at fff00000c5a4a900
[   19.078295]  which belongs to the cache kmalloc-128 of size 128
[   19.078355] The buggy address is located 0 bytes to the right of
[   19.078355]  allocated 115-byte region [fff00000c5a4a900, fff00000c5a4a973)
[   19.078418] 
[   19.078439] The buggy address belongs to the physical page:
[   19.078474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4a
[   19.078531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.078585] page_type: f5(slab)
[   19.078628] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.078679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.078722] page dumped because: kasan: bad access detected
[   19.078753] 
[   19.078771] Memory state around the buggy address:
[   19.078803]  fff00000c5a4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.078847]  fff00000c5a4a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.078891] >fff00000c5a4a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.078929]                                                              ^
[   19.078970]  fff00000c5a4a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.079014]  fff00000c5a4aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.079056] ==================================================================
[   19.111444] ==================================================================
[   19.112024] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.112809] Read of size 1 at addr fff00000c6c192bb by task kunit_try_catch/225
[   19.112982] 
[   19.113291] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.113568] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.113608] Hardware name: linux,dummy-virt (DT)
[   19.113639] Call trace:
[   19.113664]  show_stack+0x20/0x38 (C)
[   19.113719]  dump_stack_lvl+0x8c/0xd0
[   19.113773]  print_report+0x118/0x608
[   19.113822]  kasan_report+0xdc/0x128
[   19.113871]  __asan_report_load1_noabort+0x20/0x30
[   19.113923]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.113972]  mempool_slab_oob_right+0xc0/0x118
[   19.114021]  kunit_try_run_case+0x170/0x3f0
[   19.114069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.114134]  kthread+0x328/0x630
[   19.114181]  ret_from_fork+0x10/0x20
[   19.114231] 
[   19.114249] Allocated by task 225:
[   19.114279]  kasan_save_stack+0x3c/0x68
[   19.114320]  kasan_save_track+0x20/0x40
[   19.114359]  kasan_save_alloc_info+0x40/0x58
[   19.114398]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.114443]  remove_element+0x16c/0x1f8
[   19.114479]  mempool_alloc_preallocated+0x58/0xc0
[   19.114518]  mempool_oob_right_helper+0x98/0x2f0
[   19.114556]  mempool_slab_oob_right+0xc0/0x118
[   19.114598]  kunit_try_run_case+0x170/0x3f0
[   19.114635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.114681]  kthread+0x328/0x630
[   19.114713]  ret_from_fork+0x10/0x20
[   19.115326] 
[   19.115365] The buggy address belongs to the object at fff00000c6c19240
[   19.115365]  which belongs to the cache test_cache of size 123
[   19.115444] The buggy address is located 0 bytes to the right of
[   19.115444]  allocated 123-byte region [fff00000c6c19240, fff00000c6c192bb)
[   19.115575] 
[   19.115596] The buggy address belongs to the physical page:
[   19.115631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c19
[   19.115688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.115741] page_type: f5(slab)
[   19.115905] raw: 0bfffe0000000000 fff00000c582bc80 dead000000000122 0000000000000000
[   19.116268] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.117205] page dumped because: kasan: bad access detected
[   19.117656] 
[   19.117675] Memory state around the buggy address:
[   19.118132]  fff00000c6c19180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.118236]  fff00000c6c19200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.118391] >fff00000c6c19280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.118857]                                         ^
[   19.118924]  fff00000c6c19300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.119322]  fff00000c6c19380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.119378] ==================================================================
[   19.090976] ==================================================================
[   19.091500] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.091681] Read of size 1 at addr fff00000c7742001 by task kunit_try_catch/223
[   19.092107] 
[   19.092350] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.092455] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.092484] Hardware name: linux,dummy-virt (DT)
[   19.092670] Call trace:
[   19.092700]  show_stack+0x20/0x38 (C)
[   19.092928]  dump_stack_lvl+0x8c/0xd0
[   19.093005]  print_report+0x118/0x608
[   19.093204]  kasan_report+0xdc/0x128
[   19.093250]  __asan_report_load1_noabort+0x20/0x30
[   19.093304]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.093352]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.093682]  kunit_try_run_case+0x170/0x3f0
[   19.093765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.093828]  kthread+0x328/0x630
[   19.093890]  ret_from_fork+0x10/0x20
[   19.093943] 
[   19.094442] The buggy address belongs to the physical page:
[   19.094479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107740
[   19.094856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.094967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.095389] page_type: f8(unknown)
[   19.095461] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.095790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.095856] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.096280] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.096645] head: 0bfffe0000000002 ffffc1ffc31dd001 00000000ffffffff 00000000ffffffff
[   19.096851] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.097072] page dumped because: kasan: bad access detected
[   19.097305] 
[   19.097324] Memory state around the buggy address:
[   19.097600]  fff00000c7741f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.097649]  fff00000c7741f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.097691] >fff00000c7742000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.097901]                    ^
[   19.097937]  fff00000c7742080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.098262]  fff00000c7742100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.098315] ==================================================================

[   14.227901] ==================================================================
[   14.228440] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.228796] Read of size 1 at addr ffff888102ac6001 by task kunit_try_catch/240
[   14.229258] 
[   14.229381] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.229432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.229444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.229466] Call Trace:
[   14.229479]  <TASK>
[   14.229497]  dump_stack_lvl+0x73/0xb0
[   14.229533]  print_report+0xd1/0x650
[   14.229556]  ? __virt_addr_valid+0x1db/0x2d0
[   14.229581]  ? mempool_oob_right_helper+0x318/0x380
[   14.229662]  ? kasan_addr_to_slab+0x11/0xa0
[   14.229683]  ? mempool_oob_right_helper+0x318/0x380
[   14.229707]  kasan_report+0x141/0x180
[   14.229729]  ? mempool_oob_right_helper+0x318/0x380
[   14.229758]  __asan_report_load1_noabort+0x18/0x20
[   14.229782]  mempool_oob_right_helper+0x318/0x380
[   14.229807]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.229833]  ? __kasan_check_write+0x18/0x20
[   14.229852]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.229877]  ? finish_task_switch.isra.0+0x153/0x700
[   14.229904]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.229929]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.229957]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.230053]  ? __pfx_mempool_kfree+0x10/0x10
[   14.230078]  ? __pfx_read_tsc+0x10/0x10
[   14.230101]  ? ktime_get_ts64+0x86/0x230
[   14.230127]  kunit_try_run_case+0x1a5/0x480
[   14.230153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.230176]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.230203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.230226]  ? __kthread_parkme+0x82/0x180
[   14.230248]  ? preempt_count_sub+0x50/0x80
[   14.230271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.230295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.230319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.230344]  kthread+0x337/0x6f0
[   14.230363]  ? trace_preempt_on+0x20/0xc0
[   14.230388]  ? __pfx_kthread+0x10/0x10
[   14.230408]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.230429]  ? calculate_sigpending+0x7b/0xa0
[   14.230455]  ? __pfx_kthread+0x10/0x10
[   14.230475]  ret_from_fork+0x116/0x1d0
[   14.230493]  ? __pfx_kthread+0x10/0x10
[   14.230513]  ret_from_fork_asm+0x1a/0x30
[   14.230546]  </TASK>
[   14.230557] 
[   14.242635] The buggy address belongs to the physical page:
[   14.243094] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   14.243445] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.243975] flags: 0x200000000000040(head|node=0|zone=2)
[   14.244306] page_type: f8(unknown)
[   14.244613] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.245219] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.245524] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.246054] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.246383] head: 0200000000000002 ffffea00040ab101 00000000ffffffff 00000000ffffffff
[   14.246880] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.247354] page dumped because: kasan: bad access detected
[   14.247715] 
[   14.247883] Memory state around the buggy address:
[   14.248241]  ffff888102ac5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.248642]  ffff888102ac5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.249149] >ffff888102ac6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.249561]                    ^
[   14.249813]  ffff888102ac6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.250271]  ffff888102ac6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.250677] ==================================================================
[   14.255285] ==================================================================
[   14.255847] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.256361] Read of size 1 at addr ffff8881039662bb by task kunit_try_catch/242
[   14.256707] 
[   14.257059] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.257130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.257143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.257165] Call Trace:
[   14.257177]  <TASK>
[   14.257194]  dump_stack_lvl+0x73/0xb0
[   14.257227]  print_report+0xd1/0x650
[   14.257251]  ? __virt_addr_valid+0x1db/0x2d0
[   14.257275]  ? mempool_oob_right_helper+0x318/0x380
[   14.257299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.257321]  ? mempool_oob_right_helper+0x318/0x380
[   14.257346]  kasan_report+0x141/0x180
[   14.257367]  ? mempool_oob_right_helper+0x318/0x380
[   14.257396]  __asan_report_load1_noabort+0x18/0x20
[   14.257421]  mempool_oob_right_helper+0x318/0x380
[   14.257446]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.257469]  ? update_load_avg+0x1be/0x21b0
[   14.257497]  ? finish_task_switch.isra.0+0x153/0x700
[   14.257522]  mempool_slab_oob_right+0xed/0x140
[   14.257548]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.257574]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.257614]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.257640]  ? __pfx_read_tsc+0x10/0x10
[   14.257661]  ? ktime_get_ts64+0x86/0x230
[   14.257686]  kunit_try_run_case+0x1a5/0x480
[   14.257713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.257735]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.257761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.257797]  ? __kthread_parkme+0x82/0x180
[   14.258023]  ? preempt_count_sub+0x50/0x80
[   14.258048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.258072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.258097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.258123]  kthread+0x337/0x6f0
[   14.258141]  ? trace_preempt_on+0x20/0xc0
[   14.258166]  ? __pfx_kthread+0x10/0x10
[   14.258186]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.258209]  ? calculate_sigpending+0x7b/0xa0
[   14.258234]  ? __pfx_kthread+0x10/0x10
[   14.258254]  ret_from_fork+0x116/0x1d0
[   14.258273]  ? __pfx_kthread+0x10/0x10
[   14.258293]  ret_from_fork_asm+0x1a/0x30
[   14.258324]  </TASK>
[   14.258335] 
[   14.267478] Allocated by task 242:
[   14.267678]  kasan_save_stack+0x45/0x70
[   14.267856]  kasan_save_track+0x18/0x40
[   14.267993]  kasan_save_alloc_info+0x3b/0x50
[   14.268461]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.268737]  remove_element+0x11e/0x190
[   14.268988]  mempool_alloc_preallocated+0x4d/0x90
[   14.269182]  mempool_oob_right_helper+0x8a/0x380
[   14.269334]  mempool_slab_oob_right+0xed/0x140
[   14.269483]  kunit_try_run_case+0x1a5/0x480
[   14.269651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.269956]  kthread+0x337/0x6f0
[   14.270158]  ret_from_fork+0x116/0x1d0
[   14.270460]  ret_from_fork_asm+0x1a/0x30
[   14.270700] 
[   14.271041] The buggy address belongs to the object at ffff888103966240
[   14.271041]  which belongs to the cache test_cache of size 123
[   14.271465] The buggy address is located 0 bytes to the right of
[   14.271465]  allocated 123-byte region [ffff888103966240, ffff8881039662bb)
[   14.271834] 
[   14.271905] The buggy address belongs to the physical page:
[   14.272251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103966
[   14.272668] flags: 0x200000000000000(node=0|zone=2)
[   14.272933] page_type: f5(slab)
[   14.273239] raw: 0200000000000000 ffff88810395f280 dead000000000122 0000000000000000
[   14.273656] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.274159] page dumped because: kasan: bad access detected
[   14.274424] 
[   14.274507] Memory state around the buggy address:
[   14.274679]  ffff888103966180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.275241]  ffff888103966200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.275568] >ffff888103966280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.275993]                                         ^
[   14.276209]  ffff888103966300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.276527]  ffff888103966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.276857] ==================================================================
[   14.200339] ==================================================================
[   14.200763] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.201787] Read of size 1 at addr ffff8881029c7173 by task kunit_try_catch/238
[   14.202299] 
[   14.202440] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.202517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.202529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.202551] Call Trace:
[   14.202564]  <TASK>
[   14.202583]  dump_stack_lvl+0x73/0xb0
[   14.202631]  print_report+0xd1/0x650
[   14.202656]  ? __virt_addr_valid+0x1db/0x2d0
[   14.202682]  ? mempool_oob_right_helper+0x318/0x380
[   14.202705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.202729]  ? mempool_oob_right_helper+0x318/0x380
[   14.202753]  kasan_report+0x141/0x180
[   14.202774]  ? mempool_oob_right_helper+0x318/0x380
[   14.202816]  __asan_report_load1_noabort+0x18/0x20
[   14.202846]  mempool_oob_right_helper+0x318/0x380
[   14.202871]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.202898]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.202923]  ? finish_task_switch.isra.0+0x153/0x700
[   14.202949]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.202973]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.202999]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.203025]  ? __pfx_mempool_kfree+0x10/0x10
[   14.203050]  ? __pfx_read_tsc+0x10/0x10
[   14.203072]  ? ktime_get_ts64+0x86/0x230
[   14.203097]  kunit_try_run_case+0x1a5/0x480
[   14.203124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.203146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.203172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.203195]  ? __kthread_parkme+0x82/0x180
[   14.203217]  ? preempt_count_sub+0x50/0x80
[   14.203240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.203264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.203288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.203313]  kthread+0x337/0x6f0
[   14.203331]  ? trace_preempt_on+0x20/0xc0
[   14.203356]  ? __pfx_kthread+0x10/0x10
[   14.203375]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.203397]  ? calculate_sigpending+0x7b/0xa0
[   14.203422]  ? __pfx_kthread+0x10/0x10
[   14.203443]  ret_from_fork+0x116/0x1d0
[   14.203461]  ? __pfx_kthread+0x10/0x10
[   14.203481]  ret_from_fork_asm+0x1a/0x30
[   14.203513]  </TASK>
[   14.203523] 
[   14.211627] Allocated by task 238:
[   14.211828]  kasan_save_stack+0x45/0x70
[   14.211972]  kasan_save_track+0x18/0x40
[   14.212102]  kasan_save_alloc_info+0x3b/0x50
[   14.212246]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.212413]  remove_element+0x11e/0x190
[   14.212547]  mempool_alloc_preallocated+0x4d/0x90
[   14.212710]  mempool_oob_right_helper+0x8a/0x380
[   14.212917]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.213134]  kunit_try_run_case+0x1a5/0x480
[   14.213345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.213639]  kthread+0x337/0x6f0
[   14.213841]  ret_from_fork+0x116/0x1d0
[   14.214063]  ret_from_fork_asm+0x1a/0x30
[   14.214265] 
[   14.214363] The buggy address belongs to the object at ffff8881029c7100
[   14.214363]  which belongs to the cache kmalloc-128 of size 128
[   14.214792] The buggy address is located 0 bytes to the right of
[   14.214792]  allocated 115-byte region [ffff8881029c7100, ffff8881029c7173)
[   14.215237] 
[   14.215308] The buggy address belongs to the physical page:
[   14.215474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c7
[   14.215808] flags: 0x200000000000000(node=0|zone=2)
[   14.216036] page_type: f5(slab)
[   14.216210] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.216552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.216793] page dumped because: kasan: bad access detected
[   14.217958] 
[   14.218086] Memory state around the buggy address:
[   14.218319]  ffff8881029c7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.218659]  ffff8881029c7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.218893] >ffff8881029c7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.219136]                                                              ^
[   14.219430]  ffff8881029c7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.220018]  ffff8881029c7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.220233] ==================================================================