Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   25.007551] ==================================================================
[   25.007653] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   25.007753] Read of size 1 at addr fff00000c770e2bb by task kunit_try_catch/229
[   25.008712] 
[   25.008793] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.009251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.009296] Hardware name: linux,dummy-virt (DT)
[   25.009338] Call trace:
[   25.009373]  show_stack+0x20/0x38 (C)
[   25.009465]  dump_stack_lvl+0x8c/0xd0
[   25.009526]  print_report+0x118/0x608
[   25.009579]  kasan_report+0xdc/0x128
[   25.009629]  __asan_report_load1_noabort+0x20/0x30
[   25.009689]  mempool_oob_right_helper+0x2ac/0x2f0
[   25.009748]  mempool_slab_oob_right+0xc0/0x118
[   25.009803]  kunit_try_run_case+0x170/0x3f0
[   25.009874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.009994]  kthread+0x328/0x630
[   25.010094]  ret_from_fork+0x10/0x20
[   25.010213] 
[   25.010237] Allocated by task 229:
[   25.010275]  kasan_save_stack+0x3c/0x68
[   25.010341]  kasan_save_track+0x20/0x40
[   25.010434]  kasan_save_alloc_info+0x40/0x58
[   25.010486]  __kasan_mempool_unpoison_object+0xbc/0x180
[   25.010539]  remove_element+0x16c/0x1f8
[   25.010592]  mempool_alloc_preallocated+0x58/0xc0
[   25.011020]  mempool_oob_right_helper+0x98/0x2f0
[   25.011127]  mempool_slab_oob_right+0xc0/0x118
[   25.011218]  kunit_try_run_case+0x170/0x3f0
[   25.011290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.011368]  kthread+0x328/0x630
[   25.011424]  ret_from_fork+0x10/0x20
[   25.011474] 
[   25.011501] The buggy address belongs to the object at fff00000c770e240
[   25.011501]  which belongs to the cache test_cache of size 123
[   25.011608] The buggy address is located 0 bytes to the right of
[   25.011608]  allocated 123-byte region [fff00000c770e240, fff00000c770e2bb)
[   25.011689] 
[   25.011877] The buggy address belongs to the physical page:
[   25.011965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770e
[   25.012052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.012125] page_type: f5(slab)
[   25.012184] raw: 0bfffe0000000000 fff00000c56b5780 dead000000000122 0000000000000000
[   25.012536] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   25.012608] page dumped because: kasan: bad access detected
[   25.012664] 
[   25.012723] Memory state around the buggy address:
[   25.012807]  fff00000c770e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.012879]  fff00000c770e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   25.012928] >fff00000c770e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   25.012972]                                         ^
[   25.013015]  fff00000c770e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.013065]  fff00000c770e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.013182] ==================================================================
[   24.992233] ==================================================================
[   24.992355] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   24.992484] Read of size 1 at addr fff00000c784a001 by task kunit_try_catch/227
[   24.992548] 
[   24.992604] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   24.992715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.992745] Hardware name: linux,dummy-virt (DT)
[   24.992790] Call trace:
[   24.992822]  show_stack+0x20/0x38 (C)
[   24.992884]  dump_stack_lvl+0x8c/0xd0
[   24.992945]  print_report+0x118/0x608
[   24.992996]  kasan_report+0xdc/0x128
[   24.993048]  __asan_report_load1_noabort+0x20/0x30
[   24.993108]  mempool_oob_right_helper+0x2ac/0x2f0
[   24.993178]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   24.993301]  kunit_try_run_case+0x170/0x3f0
[   24.993365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.993442]  kthread+0x328/0x630
[   24.993500]  ret_from_fork+0x10/0x20
[   24.993627] 
[   24.993801] The buggy address belongs to the physical page:
[   24.993993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   24.994081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.994140] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.994787] page_type: f8(unknown)
[   24.994918] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.994984] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.995045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.995102] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.995160] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   24.995216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.995261] page dumped because: kasan: bad access detected
[   24.995301] 
[   24.995322] Memory state around the buggy address:
[   24.995369]  fff00000c7849f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.995441]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.995583] >fff00000c784a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.995645]                    ^
[   24.995687]  fff00000c784a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.995754]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.995797] ==================================================================
[   24.959523] ==================================================================
[   24.959664] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   24.959782] Read of size 1 at addr fff00000c6a86a73 by task kunit_try_catch/225
[   24.959846] 
[   24.959906] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   24.960016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.960049] Hardware name: linux,dummy-virt (DT)
[   24.960094] Call trace:
[   24.960127]  show_stack+0x20/0x38 (C)
[   24.960191]  dump_stack_lvl+0x8c/0xd0
[   24.960256]  print_report+0x118/0x608
[   24.960309]  kasan_report+0xdc/0x128
[   24.960361]  __asan_report_load1_noabort+0x20/0x30
[   24.960435]  mempool_oob_right_helper+0x2ac/0x2f0
[   24.960500]  mempool_kmalloc_oob_right+0xc4/0x120
[   24.960559]  kunit_try_run_case+0x170/0x3f0
[   24.960622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.960686]  kthread+0x328/0x630
[   24.960743]  ret_from_fork+0x10/0x20
[   24.960800] 
[   24.960823] Allocated by task 225:
[   24.960861]  kasan_save_stack+0x3c/0x68
[   24.960914]  kasan_save_track+0x20/0x40
[   24.960960]  kasan_save_alloc_info+0x40/0x58
[   24.961007]  __kasan_mempool_unpoison_object+0x11c/0x180
[   24.961059]  remove_element+0x130/0x1f8
[   24.961106]  mempool_alloc_preallocated+0x58/0xc0
[   24.961158]  mempool_oob_right_helper+0x98/0x2f0
[   24.961209]  mempool_kmalloc_oob_right+0xc4/0x120
[   24.961273]  kunit_try_run_case+0x170/0x3f0
[   24.961327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.961380]  kthread+0x328/0x630
[   24.961436]  ret_from_fork+0x10/0x20
[   24.961484] 
[   24.961512] The buggy address belongs to the object at fff00000c6a86a00
[   24.961512]  which belongs to the cache kmalloc-128 of size 128
[   24.961582] The buggy address is located 0 bytes to the right of
[   24.961582]  allocated 115-byte region [fff00000c6a86a00, fff00000c6a86a73)
[   24.961658] 
[   24.961687] The buggy address belongs to the physical page:
[   24.961730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a86
[   24.961797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.961863] page_type: f5(slab)
[   24.961916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.961979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.962028] page dumped because: kasan: bad access detected
[   24.962064] 
[   24.962087] Memory state around the buggy address:
[   24.962128]  fff00000c6a86900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.962180]  fff00000c6a86980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.962233] >fff00000c6a86a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.962277]                                                              ^
[   24.962338]  fff00000c6a86a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.962417]  fff00000c6a86b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.962495] ==================================================================

[   15.409864] ==================================================================
[   15.410294] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.411181] Read of size 1 at addr ffff8881039f02bb by task kunit_try_catch/245
[   15.411348] 
[   15.411597] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.411741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.411834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.411862] Call Trace:
[   15.411879]  <TASK>
[   15.411977]  dump_stack_lvl+0x73/0xb0
[   15.412019]  print_report+0xd1/0x650
[   15.412045]  ? __virt_addr_valid+0x1db/0x2d0
[   15.412071]  ? mempool_oob_right_helper+0x318/0x380
[   15.412093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.412114]  ? mempool_oob_right_helper+0x318/0x380
[   15.412137]  kasan_report+0x141/0x180
[   15.412158]  ? mempool_oob_right_helper+0x318/0x380
[   15.412573]  __asan_report_load1_noabort+0x18/0x20
[   15.412612]  mempool_oob_right_helper+0x318/0x380
[   15.412641]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.412667]  ? finish_task_switch.isra.0+0x153/0x700
[   15.412698]  mempool_slab_oob_right+0xed/0x140
[   15.412719]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   15.412739]  ? dequeue_task_fair+0x166/0x4e0
[   15.412776]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.412799]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.412819]  ? __pfx_read_tsc+0x10/0x10
[   15.412839]  ? ktime_get_ts64+0x86/0x230
[   15.412866]  kunit_try_run_case+0x1a5/0x480
[   15.412893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.412914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.412939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.412961]  ? __kthread_parkme+0x82/0x180
[   15.412983]  ? preempt_count_sub+0x50/0x80
[   15.413006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.413027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.413048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.413069]  kthread+0x337/0x6f0
[   15.413086]  ? trace_preempt_on+0x20/0xc0
[   15.413111]  ? __pfx_kthread+0x10/0x10
[   15.413128]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.413148]  ? calculate_sigpending+0x7b/0xa0
[   15.413171]  ? __pfx_kthread+0x10/0x10
[   15.413190]  ret_from_fork+0x41/0x80
[   15.413210]  ? __pfx_kthread+0x10/0x10
[   15.413228]  ret_from_fork_asm+0x1a/0x30
[   15.413259]  </TASK>
[   15.413273] 
[   15.425071] Allocated by task 245:
[   15.425659]  kasan_save_stack+0x45/0x70
[   15.425915]  kasan_save_track+0x18/0x40
[   15.426659]  kasan_save_alloc_info+0x3b/0x50
[   15.427144]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.427290]  remove_element+0x11e/0x190
[   15.427987]  mempool_alloc_preallocated+0x4d/0x90
[   15.428121]  mempool_oob_right_helper+0x8a/0x380
[   15.428289]  mempool_slab_oob_right+0xed/0x140
[   15.428577]  kunit_try_run_case+0x1a5/0x480
[   15.428882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.429254]  kthread+0x337/0x6f0
[   15.429755]  ret_from_fork+0x41/0x80
[   15.430097]  ret_from_fork_asm+0x1a/0x30
[   15.430426] 
[   15.430498] The buggy address belongs to the object at ffff8881039f0240
[   15.430498]  which belongs to the cache test_cache of size 123
[   15.431528] The buggy address is located 0 bytes to the right of
[   15.431528]  allocated 123-byte region [ffff8881039f0240, ffff8881039f02bb)
[   15.432336] 
[   15.432457] The buggy address belongs to the physical page:
[   15.432632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f0
[   15.433680] flags: 0x200000000000000(node=0|zone=2)
[   15.434016] page_type: f5(slab)
[   15.434144] raw: 0200000000000000 ffff888101c8f8c0 dead000000000122 0000000000000000
[   15.434512] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.434766] page dumped because: kasan: bad access detected
[   15.435059] 
[   15.435148] Memory state around the buggy address:
[   15.435383]  ffff8881039f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.436169]  ffff8881039f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   15.436431] >ffff8881039f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   15.437037]                                         ^
[   15.437343]  ffff8881039f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.437884]  ffff8881039f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.438535] ==================================================================
[   15.383445] ==================================================================
[   15.384150] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.384383] Read of size 1 at addr ffff888103986001 by task kunit_try_catch/243
[   15.384826] 
[   15.384946] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.385025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.385039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.385063] Call Trace:
[   15.385079]  <TASK>
[   15.385100]  dump_stack_lvl+0x73/0xb0
[   15.385131]  print_report+0xd1/0x650
[   15.385157]  ? __virt_addr_valid+0x1db/0x2d0
[   15.385181]  ? mempool_oob_right_helper+0x318/0x380
[   15.385206]  ? kasan_addr_to_slab+0x11/0xa0
[   15.385227]  ? mempool_oob_right_helper+0x318/0x380
[   15.385536]  kasan_report+0x141/0x180
[   15.385619]  ? mempool_oob_right_helper+0x318/0x380
[   15.385669]  __asan_report_load1_noabort+0x18/0x20
[   15.385704]  mempool_oob_right_helper+0x318/0x380
[   15.385730]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.385755]  ? dequeue_entities+0x852/0x1740
[   15.385783]  ? finish_task_switch.isra.0+0x153/0x700
[   15.385811]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   15.385837]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   15.385862]  ? dequeue_task_fair+0x166/0x4e0
[   15.385885]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.385907]  ? __pfx_mempool_kfree+0x10/0x10
[   15.385929]  ? __pfx_read_tsc+0x10/0x10
[   15.385950]  ? ktime_get_ts64+0x86/0x230
[   15.385976]  kunit_try_run_case+0x1a5/0x480
[   15.386003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.386026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.386053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.386076]  ? __kthread_parkme+0x82/0x180
[   15.386099]  ? preempt_count_sub+0x50/0x80
[   15.386124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.386149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.386172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.386195]  kthread+0x337/0x6f0
[   15.386212]  ? trace_preempt_on+0x20/0xc0
[   15.386237]  ? __pfx_kthread+0x10/0x10
[   15.386256]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.386277]  ? calculate_sigpending+0x7b/0xa0
[   15.386300]  ? __pfx_kthread+0x10/0x10
[   15.386319]  ret_from_fork+0x41/0x80
[   15.386341]  ? __pfx_kthread+0x10/0x10
[   15.386360]  ret_from_fork_asm+0x1a/0x30
[   15.386390]  </TASK>
[   15.386402] 
[   15.395564] The buggy address belongs to the physical page:
[   15.395908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103984
[   15.396265] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.396565] flags: 0x200000000000040(head|node=0|zone=2)
[   15.397079] page_type: f8(unknown)
[   15.397236] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.397492] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.397943] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.398266] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.398551] head: 0200000000000002 ffffea00040e6101 00000000ffffffff 00000000ffffffff
[   15.398858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.399217] page dumped because: kasan: bad access detected
[   15.399430] 
[   15.399568] Memory state around the buggy address:
[   15.399848]  ffff888103985f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.400232]  ffff888103985f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.400820] >ffff888103986000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.401006]                    ^
[   15.401214]  ffff888103986080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.401364]  ffff888103986100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.401769] ==================================================================
[   15.350074] ==================================================================
[   15.350565] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.351664] Read of size 1 at addr ffff888103391e73 by task kunit_try_catch/241
[   15.352004] 
[   15.352357] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.352711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.352736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.352765] Call Trace:
[   15.352782]  <TASK>
[   15.352806]  dump_stack_lvl+0x73/0xb0
[   15.352851]  print_report+0xd1/0x650
[   15.352877]  ? __virt_addr_valid+0x1db/0x2d0
[   15.352904]  ? mempool_oob_right_helper+0x318/0x380
[   15.352929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.352953]  ? mempool_oob_right_helper+0x318/0x380
[   15.352978]  kasan_report+0x141/0x180
[   15.353002]  ? mempool_oob_right_helper+0x318/0x380
[   15.353031]  __asan_report_load1_noabort+0x18/0x20
[   15.353052]  mempool_oob_right_helper+0x318/0x380
[   15.353078]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.353103]  ? dequeue_entities+0x852/0x1740
[   15.353132]  ? finish_task_switch.isra.0+0x153/0x700
[   15.353160]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.353185]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   15.353210]  ? dequeue_task_fair+0x166/0x4e0
[   15.353233]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.353257]  ? __pfx_mempool_kfree+0x10/0x10
[   15.353280]  ? __pfx_read_tsc+0x10/0x10
[   15.353302]  ? ktime_get_ts64+0x86/0x230
[   15.353329]  kunit_try_run_case+0x1a5/0x480
[   15.353356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.353379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.353405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.353428]  ? __kthread_parkme+0x82/0x180
[   15.353452]  ? preempt_count_sub+0x50/0x80
[   15.353477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.353503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.353527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.353552]  kthread+0x337/0x6f0
[   15.353593]  ? trace_preempt_on+0x20/0xc0
[   15.353619]  ? __pfx_kthread+0x10/0x10
[   15.353637]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.353658]  ? calculate_sigpending+0x7b/0xa0
[   15.353681]  ? __pfx_kthread+0x10/0x10
[   15.353700]  ret_from_fork+0x41/0x80
[   15.353721]  ? __pfx_kthread+0x10/0x10
[   15.353739]  ret_from_fork_asm+0x1a/0x30
[   15.353770]  </TASK>
[   15.353783] 
[   15.364414] Allocated by task 241:
[   15.364593]  kasan_save_stack+0x45/0x70
[   15.364715]  kasan_save_track+0x18/0x40
[   15.364810]  kasan_save_alloc_info+0x3b/0x50
[   15.364908]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.365599]  remove_element+0x11e/0x190
[   15.365877]  mempool_alloc_preallocated+0x4d/0x90
[   15.366294]  mempool_oob_right_helper+0x8a/0x380
[   15.366807]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.366957]  kunit_try_run_case+0x1a5/0x480
[   15.367369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.367506]  kthread+0x337/0x6f0
[   15.367754]  ret_from_fork+0x41/0x80
[   15.367891]  ret_from_fork_asm+0x1a/0x30
[   15.368178] 
[   15.368236] The buggy address belongs to the object at ffff888103391e00
[   15.368236]  which belongs to the cache kmalloc-128 of size 128
[   15.369396] The buggy address is located 0 bytes to the right of
[   15.369396]  allocated 115-byte region [ffff888103391e00, ffff888103391e73)
[   15.370554] 
[   15.370911] The buggy address belongs to the physical page:
[   15.371054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103391
[   15.371480] flags: 0x200000000000000(node=0|zone=2)
[   15.371635] page_type: f5(slab)
[   15.371968] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.372218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.372516] page dumped because: kasan: bad access detected
[   15.373153] 
[   15.373232] Memory state around the buggy address:
[   15.373507]  ffff888103391d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.373808]  ffff888103391d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.374180] >ffff888103391e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.375212]                                                              ^
[   15.375470]  ffff888103391e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.375766]  ffff888103391f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.376146] ==================================================================