Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.347277] ==================================================================
[   20.347778] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.348229] Read of size 1 at addr fff00000c65fa001 by task kunit_try_catch/212
[   20.348733] 
[   20.348953] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.349062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.349096] Hardware name: linux,dummy-virt (DT)
[   20.349136] Call trace:
[   20.349165]  show_stack+0x20/0x38 (C)
[   20.349231]  dump_stack_lvl+0x8c/0xd0
[   20.349291]  print_report+0x118/0x608
[   20.349348]  kasan_report+0xdc/0x128
[   20.349400]  __asan_report_load1_noabort+0x20/0x30
[   20.349453]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.349507]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.349564]  kunit_try_run_case+0x170/0x3f0
[   20.349618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.349676]  kthread+0x318/0x620
[   20.349727]  ret_from_fork+0x10/0x20
[   20.349803] 
[   20.352733] The buggy address belongs to the physical page:
[   20.353081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8
[   20.353549] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.353812] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.354291] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.354638] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.355853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.356183] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.356500] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000
[   20.357008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.357326] page dumped because: kasan: bad access detected
[   20.357661] 
[   20.357839] Memory state around the buggy address:
[   20.358061]  fff00000c65f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.358434]  fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.359106] >fff00000c65fa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.359434]                    ^
[   20.359634]  fff00000c65fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.359950]  fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.360263] ==================================================================
[   20.368710] ==================================================================
[   20.369299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.369666] Read of size 1 at addr fff00000c1f122bb by task kunit_try_catch/214
[   20.370056] 
[   20.370207] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.370307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.370341] Hardware name: linux,dummy-virt (DT)
[   20.370379] Call trace:
[   20.370407]  show_stack+0x20/0x38 (C)
[   20.370465]  dump_stack_lvl+0x8c/0xd0
[   20.370910]  print_report+0x118/0x608
[   20.370971]  kasan_report+0xdc/0x128
[   20.371027]  __asan_report_load1_noabort+0x20/0x30
[   20.371080]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.371135]  mempool_slab_oob_right+0xc0/0x118
[   20.371189]  kunit_try_run_case+0x170/0x3f0
[   20.371243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.371298]  kthread+0x318/0x620
[   20.371347]  ret_from_fork+0x10/0x20
[   20.371401] 
[   20.375724] Allocated by task 214:
[   20.375904]  kasan_save_stack+0x3c/0x68
[   20.376199]  kasan_save_track+0x20/0x40
[   20.376426]  kasan_save_alloc_info+0x40/0x58
[   20.376774]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.377138]  remove_element+0x16c/0x1f8
[   20.377301]  mempool_alloc_preallocated+0x58/0xc0
[   20.377658]  mempool_oob_right_helper+0x98/0x2f0
[   20.377939]  mempool_slab_oob_right+0xc0/0x118
[   20.378170]  kunit_try_run_case+0x170/0x3f0
[   20.378397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.378679]  kthread+0x318/0x620
[   20.379033]  ret_from_fork+0x10/0x20
[   20.379454] 
[   20.379802] The buggy address belongs to the object at fff00000c1f12240
[   20.379802]  which belongs to the cache test_cache of size 123
[   20.380200] The buggy address is located 0 bytes to the right of
[   20.380200]  allocated 123-byte region [fff00000c1f12240, fff00000c1f122bb)
[   20.380612] 
[   20.380732] The buggy address belongs to the physical page:
[   20.380994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f12
[   20.381308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.381586] page_type: f5(slab)
[   20.382378] raw: 0bfffe0000000000 fff00000c596f780 dead000000000122 0000000000000000
[   20.382756] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.383597] page dumped because: kasan: bad access detected
[   20.383925] 
[   20.384048] Memory state around the buggy address:
[   20.384420]  fff00000c1f12180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.384851]  fff00000c1f12200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.385153] >fff00000c1f12280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.385657]                                         ^
[   20.385937]  fff00000c1f12300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.386421]  fff00000c1f12380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.387108] ==================================================================
[   20.315821] ==================================================================
[   20.316436] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.317139] Read of size 1 at addr fff00000c5a05673 by task kunit_try_catch/210
[   20.317562] 
[   20.317710] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.318003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.318040] Hardware name: linux,dummy-virt (DT)
[   20.318103] Call trace:
[   20.318140]  show_stack+0x20/0x38 (C)
[   20.318207]  dump_stack_lvl+0x8c/0xd0
[   20.318266]  print_report+0x118/0x608
[   20.318319]  kasan_report+0xdc/0x128
[   20.318372]  __asan_report_load1_noabort+0x20/0x30
[   20.318425]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.318495]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.318555]  kunit_try_run_case+0x170/0x3f0
[   20.318611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.318670]  kthread+0x318/0x620
[   20.318798]  ret_from_fork+0x10/0x20
[   20.318909] 
[   20.323722] Allocated by task 210:
[   20.323997]  kasan_save_stack+0x3c/0x68
[   20.324480]  kasan_save_track+0x20/0x40
[   20.324678]  kasan_save_alloc_info+0x40/0x58
[   20.324869]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.325526]  remove_element+0x130/0x1f8
[   20.325900]  mempool_alloc_preallocated+0x58/0xc0
[   20.326341]  mempool_oob_right_helper+0x98/0x2f0
[   20.326686]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.327122]  kunit_try_run_case+0x170/0x3f0
[   20.327484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.327826]  kthread+0x318/0x620
[   20.328054]  ret_from_fork+0x10/0x20
[   20.328294] 
[   20.328441] The buggy address belongs to the object at fff00000c5a05600
[   20.328441]  which belongs to the cache kmalloc-128 of size 128
[   20.329319] The buggy address is located 0 bytes to the right of
[   20.329319]  allocated 115-byte region [fff00000c5a05600, fff00000c5a05673)
[   20.330055] 
[   20.330278] The buggy address belongs to the physical page:
[   20.330612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   20.331156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.331580] page_type: f5(slab)
[   20.332010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.332523] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.333061] page dumped because: kasan: bad access detected
[   20.333428] 
[   20.333545] Memory state around the buggy address:
[   20.333735]  fff00000c5a05500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.334427]  fff00000c5a05580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.335206] >fff00000c5a05600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.335576]                                                              ^
[   20.335922]  fff00000c5a05680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.336322]  fff00000c5a05700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.336566] ==================================================================

[   13.887493] ==================================================================
[   13.888513] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   13.888964] Read of size 1 at addr ffff888102aee2bb by task kunit_try_catch/233
[   13.889353] 
[   13.889472] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   13.889525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.889557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.889582] Call Trace:
[   13.889597]  <TASK>
[   13.889618]  dump_stack_lvl+0x73/0xb0
[   13.889652]  print_report+0xd1/0x650
[   13.889674]  ? __virt_addr_valid+0x1db/0x2d0
[   13.889700]  ? mempool_oob_right_helper+0x31a/0x380
[   13.889747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.889774]  ? mempool_oob_right_helper+0x31a/0x380
[   13.889797]  kasan_report+0x140/0x180
[   13.889818]  ? mempool_oob_right_helper+0x31a/0x380
[   13.889855]  __asan_report_load1_noabort+0x18/0x20
[   13.889878]  mempool_oob_right_helper+0x31a/0x380
[   13.889902]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.889928]  ? finish_task_switch.isra.0+0x153/0x700
[   13.889975]  mempool_slab_oob_right+0xee/0x140
[   13.889999]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.890038]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.890061]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.890083]  ? __pfx_read_tsc+0x10/0x10
[   13.890106]  ? ktime_get_ts64+0x86/0x230
[   13.890133]  kunit_try_run_case+0x1a6/0x480
[   13.890170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890191]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.890215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.890241]  ? __kthread_parkme+0x82/0x160
[   13.890264]  ? preempt_count_sub+0x50/0x80
[   13.890289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.890338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.890364]  kthread+0x324/0x6e0
[   13.890386]  ? trace_preempt_on+0x20/0xc0
[   13.890410]  ? __pfx_kthread+0x10/0x10
[   13.890433]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.890457]  ? calculate_sigpending+0x7b/0xa0
[   13.890480]  ? __pfx_kthread+0x10/0x10
[   13.890502]  ret_from_fork+0x41/0x80
[   13.890522]  ? __pfx_kthread+0x10/0x10
[   13.890544]  ret_from_fork_asm+0x1a/0x30
[   13.890577]  </TASK>
[   13.890589] 
[   13.899400] Allocated by task 233:
[   13.899657]  kasan_save_stack+0x45/0x70
[   13.899866]  kasan_save_track+0x18/0x40
[   13.900072]  kasan_save_alloc_info+0x3b/0x50
[   13.900304]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.900622]  remove_element+0x11e/0x190
[   13.900824]  mempool_alloc_preallocated+0x4d/0x90
[   13.901099]  mempool_oob_right_helper+0x8b/0x380
[   13.901381]  mempool_slab_oob_right+0xee/0x140
[   13.901563]  kunit_try_run_case+0x1a6/0x480
[   13.901706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.902000]  kthread+0x324/0x6e0
[   13.902341]  ret_from_fork+0x41/0x80
[   13.902508]  ret_from_fork_asm+0x1a/0x30
[   13.902683] 
[   13.902779] The buggy address belongs to the object at ffff888102aee240
[   13.902779]  which belongs to the cache test_cache of size 123
[   13.903466] The buggy address is located 0 bytes to the right of
[   13.903466]  allocated 123-byte region [ffff888102aee240, ffff888102aee2bb)
[   13.904026] 
[   13.904137] The buggy address belongs to the physical page:
[   13.904384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aee
[   13.904742] flags: 0x200000000000000(node=0|zone=2)
[   13.904942] page_type: f5(slab)
[   13.905064] raw: 0200000000000000 ffff888102aeb000 dead000000000122 0000000000000000
[   13.905286] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.905913] page dumped because: kasan: bad access detected
[   13.906411] 
[   13.906532] Memory state around the buggy address:
[   13.906794]  ffff888102aee180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.907249]  ffff888102aee200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.907585] >ffff888102aee280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.907907]                                         ^
[   13.908136]  ffff888102aee300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.908362]  ffff888102aee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.908567] ==================================================================
[   13.864163] ==================================================================
[   13.864657] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   13.865129] Read of size 1 at addr ffff888102952001 by task kunit_try_catch/231
[   13.865545] 
[   13.865749] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   13.865802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.865814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.865849] Call Trace:
[   13.865862]  <TASK>
[   13.865895]  dump_stack_lvl+0x73/0xb0
[   13.866023]  print_report+0xd1/0x650
[   13.866048]  ? __virt_addr_valid+0x1db/0x2d0
[   13.866072]  ? mempool_oob_right_helper+0x31a/0x380
[   13.866094]  ? kasan_addr_to_slab+0x11/0xa0
[   13.866114]  ? mempool_oob_right_helper+0x31a/0x380
[   13.866136]  kasan_report+0x140/0x180
[   13.866157]  ? mempool_oob_right_helper+0x31a/0x380
[   13.866184]  __asan_report_load1_noabort+0x18/0x20
[   13.866207]  mempool_oob_right_helper+0x31a/0x380
[   13.866231]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.866399]  ? finish_task_switch.isra.0+0x153/0x700
[   13.866441]  mempool_kmalloc_large_oob_right+0xf3/0x150
[   13.866478]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.866505]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.866527]  ? __pfx_mempool_kfree+0x10/0x10
[   13.866548]  ? __pfx_read_tsc+0x10/0x10
[   13.866572]  ? ktime_get_ts64+0x86/0x230
[   13.866597]  kunit_try_run_case+0x1a6/0x480
[   13.866622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.866642]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.866664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.866689]  ? __kthread_parkme+0x82/0x160
[   13.866713]  ? preempt_count_sub+0x50/0x80
[   13.866735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.866758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.866783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.866809]  kthread+0x324/0x6e0
[   13.866830]  ? trace_preempt_on+0x20/0xc0
[   13.866863]  ? __pfx_kthread+0x10/0x10
[   13.866885]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.866908]  ? calculate_sigpending+0x7b/0xa0
[   13.866930]  ? __pfx_kthread+0x10/0x10
[   13.866952]  ret_from_fork+0x41/0x80
[   13.866971]  ? __pfx_kthread+0x10/0x10
[   13.866993]  ret_from_fork_asm+0x1a/0x30
[   13.867065]  </TASK>
[   13.867078] 
[   13.875950] The buggy address belongs to the physical page:
[   13.876478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102950
[   13.876898] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.877483] flags: 0x200000000000040(head|node=0|zone=2)
[   13.877822] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.878237] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.878478] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.878747] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.879235] head: 0200000000000002 ffffea00040a5401 ffffffffffffffff 0000000000000000
[   13.879778] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   13.880299] page dumped because: kasan: bad access detected
[   13.880505] 
[   13.880601] Memory state around the buggy address:
[   13.880821]  ffff888102951f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.881441]  ffff888102951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.881779] >ffff888102952000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.882202]                    ^
[   13.882418]  ffff888102952080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.882763]  ffff888102952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.883174] ==================================================================
[   13.835487] ==================================================================
[   13.836004] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   13.836530] Read of size 1 at addr ffff888101b34073 by task kunit_try_catch/229
[   13.836871] 
[   13.836976] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   13.837180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.837198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.837222] Call Trace:
[   13.837238]  <TASK>
[   13.837259]  dump_stack_lvl+0x73/0xb0
[   13.837293]  print_report+0xd1/0x650
[   13.837316]  ? __virt_addr_valid+0x1db/0x2d0
[   13.837339]  ? mempool_oob_right_helper+0x31a/0x380
[   13.837586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.837613]  ? mempool_oob_right_helper+0x31a/0x380
[   13.837637]  kasan_report+0x140/0x180
[   13.837659]  ? mempool_oob_right_helper+0x31a/0x380
[   13.837686]  __asan_report_load1_noabort+0x18/0x20
[   13.837710]  mempool_oob_right_helper+0x31a/0x380
[   13.837734]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.837767]  ? finish_task_switch.isra.0+0x153/0x700
[   13.837795]  mempool_kmalloc_oob_right+0xf3/0x150
[   13.837818]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.837854]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.837876]  ? __pfx_mempool_kfree+0x10/0x10
[   13.837897]  ? __pfx_read_tsc+0x10/0x10
[   13.837920]  ? ktime_get_ts64+0x86/0x230
[   13.837946]  kunit_try_run_case+0x1a6/0x480
[   13.837970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.837991]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.838240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.838269]  ? __kthread_parkme+0x82/0x160
[   13.838293]  ? preempt_count_sub+0x50/0x80
[   13.838317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.838341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.838367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.838393]  kthread+0x324/0x6e0
[   13.838415]  ? trace_preempt_on+0x20/0xc0
[   13.838441]  ? __pfx_kthread+0x10/0x10
[   13.838463]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.838486]  ? calculate_sigpending+0x7b/0xa0
[   13.838508]  ? __pfx_kthread+0x10/0x10
[   13.838531]  ret_from_fork+0x41/0x80
[   13.838551]  ? __pfx_kthread+0x10/0x10
[   13.838572]  ret_from_fork_asm+0x1a/0x30
[   13.838605]  </TASK>
[   13.838617] 
[   13.848868] Allocated by task 229:
[   13.849226]  kasan_save_stack+0x45/0x70
[   13.849397]  kasan_save_track+0x18/0x40
[   13.849756]  kasan_save_alloc_info+0x3b/0x50
[   13.849973]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.850455]  remove_element+0x11e/0x190
[   13.850884]  mempool_alloc_preallocated+0x4d/0x90
[   13.851233]  mempool_oob_right_helper+0x8b/0x380
[   13.851388]  mempool_kmalloc_oob_right+0xf3/0x150
[   13.851539]  kunit_try_run_case+0x1a6/0x480
[   13.851738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.852012]  kthread+0x324/0x6e0
[   13.852534]  ret_from_fork+0x41/0x80
[   13.852716]  ret_from_fork_asm+0x1a/0x30
[   13.852868] 
[   13.852940] The buggy address belongs to the object at ffff888101b34000
[   13.852940]  which belongs to the cache kmalloc-128 of size 128
[   13.853867] The buggy address is located 0 bytes to the right of
[   13.853867]  allocated 115-byte region [ffff888101b34000, ffff888101b34073)
[   13.854387] 
[   13.854606] The buggy address belongs to the physical page:
[   13.854882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b34
[   13.855270] flags: 0x200000000000000(node=0|zone=2)
[   13.855607] page_type: f5(slab)
[   13.855735] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.856406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.856662] page dumped because: kasan: bad access detected
[   13.856965] 
[   13.857147] Memory state around the buggy address:
[   13.857354]  ffff888101b33f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.857766]  ffff888101b33f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.858216] >ffff888101b34000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.858547]                                                              ^
[   13.858894]  ffff888101b34080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.859220]  ffff888101b34100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.859629] ==================================================================