Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.289808] ==================================================================
[   30.290476] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   30.290667] Read of size 1 at addr fff00000c779c2bb by task kunit_try_catch/227
[   30.290813] 
[   30.290907] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   30.291158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.291241] Hardware name: linux,dummy-virt (DT)
[   30.291338] Call trace:
[   30.292013]  show_stack+0x20/0x38 (C)
[   30.292816]  dump_stack_lvl+0x8c/0xd0
[   30.293083]  print_report+0x118/0x608
[   30.293240]  kasan_report+0xdc/0x128
[   30.293370]  __asan_report_load1_noabort+0x20/0x30
[   30.293540]  mempool_oob_right_helper+0x2ac/0x2f0
[   30.293813]  mempool_slab_oob_right+0xc0/0x118
[   30.294475]  kunit_try_run_case+0x170/0x3f0
[   30.294778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.295044]  kthread+0x328/0x630
[   30.295218]  ret_from_fork+0x10/0x20
[   30.295855] 
[   30.296049] Allocated by task 227:
[   30.296161]  kasan_save_stack+0x3c/0x68
[   30.296402]  kasan_save_track+0x20/0x40
[   30.296944]  kasan_save_alloc_info+0x40/0x58
[   30.297087]  __kasan_mempool_unpoison_object+0xbc/0x180
[   30.297218]  remove_element+0x16c/0x1f8
[   30.297420]  mempool_alloc_preallocated+0x58/0xc0
[   30.297710]  mempool_oob_right_helper+0x98/0x2f0
[   30.297972]  mempool_slab_oob_right+0xc0/0x118
[   30.298204]  kunit_try_run_case+0x170/0x3f0
[   30.298341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298492]  kthread+0x328/0x630
[   30.299053]  ret_from_fork+0x10/0x20
[   30.299208] 
[   30.299270] The buggy address belongs to the object at fff00000c779c240
[   30.299270]  which belongs to the cache test_cache of size 123
[   30.299535] The buggy address is located 0 bytes to the right of
[   30.299535]  allocated 123-byte region [fff00000c779c240, fff00000c779c2bb)
[   30.300352] 
[   30.300552] The buggy address belongs to the physical page:
[   30.300674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10779c
[   30.300946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.301093] page_type: f5(slab)
[   30.301192] raw: 0bfffe0000000000 fff00000c11fdb40 dead000000000122 0000000000000000
[   30.301501] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   30.301644] page dumped because: kasan: bad access detected
[   30.301959] 
[   30.302043] Memory state around the buggy address:
[   30.303576]  fff00000c779c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.303742]  fff00000c779c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   30.303883] >fff00000c779c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   30.303989]                                         ^
[   30.304074]  fff00000c779c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.304178]  fff00000c779c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.304286] ==================================================================
[   30.251703] ==================================================================
[   30.251909] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   30.252108] Read of size 1 at addr fff00000c788e001 by task kunit_try_catch/225
[   30.252714] 
[   30.252810] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   30.253366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.253461] Hardware name: linux,dummy-virt (DT)
[   30.253554] Call trace:
[   30.253620]  show_stack+0x20/0x38 (C)
[   30.254044]  dump_stack_lvl+0x8c/0xd0
[   30.254251]  print_report+0x118/0x608
[   30.254436]  kasan_report+0xdc/0x128
[   30.254619]  __asan_report_load1_noabort+0x20/0x30
[   30.254780]  mempool_oob_right_helper+0x2ac/0x2f0
[   30.254938]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   30.255096]  kunit_try_run_case+0x170/0x3f0
[   30.255246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.255414]  kthread+0x328/0x630
[   30.255558]  ret_from_fork+0x10/0x20
[   30.256030] 
[   30.256159] The buggy address belongs to the physical page:
[   30.256578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788c
[   30.256840] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.256957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.257105] page_type: f8(unknown)
[   30.257204] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.257329] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   30.257471] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.257605] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   30.258124] head: 0bfffe0000000002 ffffc1ffc31e2301 00000000ffffffff 00000000ffffffff
[   30.258326] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.258497] page dumped because: kasan: bad access detected
[   30.258638] 
[   30.258709] Memory state around the buggy address:
[   30.258841]  fff00000c788df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.258974]  fff00000c788df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.259136] >fff00000c788e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.259297]                    ^
[   30.259426]  fff00000c788e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.259627]  fff00000c788e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.259776] ==================================================================
[   30.219328] ==================================================================
[   30.219524] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   30.219639] Read of size 1 at addr fff00000c4621d73 by task kunit_try_catch/223
[   30.219712] 
[   30.219771] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   30.219896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.219990] Hardware name: linux,dummy-virt (DT)
[   30.220078] Call trace:
[   30.220142]  show_stack+0x20/0x38 (C)
[   30.220289]  dump_stack_lvl+0x8c/0xd0
[   30.220422]  print_report+0x118/0x608
[   30.220520]  kasan_report+0xdc/0x128
[   30.220587]  __asan_report_load1_noabort+0x20/0x30
[   30.220659]  mempool_oob_right_helper+0x2ac/0x2f0
[   30.220732]  mempool_kmalloc_oob_right+0xc4/0x120
[   30.220805]  kunit_try_run_case+0x170/0x3f0
[   30.220879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.220953]  kthread+0x328/0x630
[   30.221018]  ret_from_fork+0x10/0x20
[   30.221089] 
[   30.221116] Allocated by task 223:
[   30.221158]  kasan_save_stack+0x3c/0x68
[   30.221216]  kasan_save_track+0x20/0x40
[   30.221271]  kasan_save_alloc_info+0x40/0x58
[   30.221324]  __kasan_mempool_unpoison_object+0x11c/0x180
[   30.221385]  remove_element+0x130/0x1f8
[   30.221441]  mempool_alloc_preallocated+0x58/0xc0
[   30.221521]  mempool_oob_right_helper+0x98/0x2f0
[   30.221581]  mempool_kmalloc_oob_right+0xc4/0x120
[   30.221638]  kunit_try_run_case+0x170/0x3f0
[   30.221695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221759]  kthread+0x328/0x630
[   30.221809]  ret_from_fork+0x10/0x20
[   30.221862] 
[   30.221890] The buggy address belongs to the object at fff00000c4621d00
[   30.221890]  which belongs to the cache kmalloc-128 of size 128
[   30.221972] The buggy address is located 0 bytes to the right of
[   30.221972]  allocated 115-byte region [fff00000c4621d00, fff00000c4621d73)
[   30.222061] 
[   30.222091] The buggy address belongs to the physical page:
[   30.222139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104621
[   30.222215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.222289] page_type: f5(slab)
[   30.222345] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.222418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.222494] page dumped because: kasan: bad access detected
[   30.222537] 
[   30.222565] Memory state around the buggy address:
[   30.222610]  fff00000c4621c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.222671]  fff00000c4621c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222732] >fff00000c4621d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.222786]                                                              ^
[   30.222843]  fff00000c4621d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.222902]  fff00000c4621e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.222957] ==================================================================

[   14.107458] ==================================================================
[   14.107952] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.108372] Read of size 1 at addr ffff888103922001 by task kunit_try_catch/242
[   14.108694] 
[   14.108829] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.108882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.108946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.108968] Call Trace:
[   14.108983]  <TASK>
[   14.109001]  dump_stack_lvl+0x73/0xb0
[   14.109033]  print_report+0xd1/0x650
[   14.109056]  ? __virt_addr_valid+0x1db/0x2d0
[   14.109079]  ? mempool_oob_right_helper+0x318/0x380
[   14.109102]  ? kasan_addr_to_slab+0x11/0xa0
[   14.109123]  ? mempool_oob_right_helper+0x318/0x380
[   14.109147]  kasan_report+0x141/0x180
[   14.109169]  ? mempool_oob_right_helper+0x318/0x380
[   14.109197]  __asan_report_load1_noabort+0x18/0x20
[   14.109219]  mempool_oob_right_helper+0x318/0x380
[   14.109244]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.109268]  ? dequeue_entities+0x852/0x1740
[   14.109293]  ? finish_task_switch.isra.0+0x153/0x700
[   14.109333]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.109357]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.109382]  ? dequeue_task_fair+0x166/0x4e0
[   14.109404]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.109424]  ? __pfx_mempool_kfree+0x10/0x10
[   14.109455]  ? __pfx_read_tsc+0x10/0x10
[   14.109476]  ? ktime_get_ts64+0x86/0x230
[   14.109502]  kunit_try_run_case+0x1a5/0x480
[   14.109526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.109571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.109593]  ? __kthread_parkme+0x82/0x180
[   14.109615]  ? preempt_count_sub+0x50/0x80
[   14.109639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.109684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.109707]  kthread+0x337/0x6f0
[   14.109723]  ? trace_preempt_on+0x20/0xc0
[   14.109747]  ? __pfx_kthread+0x10/0x10
[   14.109764]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.109785]  ? calculate_sigpending+0x7b/0xa0
[   14.109808]  ? __pfx_kthread+0x10/0x10
[   14.109826]  ret_from_fork+0x41/0x80
[   14.109846]  ? __pfx_kthread+0x10/0x10
[   14.109864]  ret_from_fork_asm+0x1a/0x30
[   14.109894]  </TASK>
[   14.109906] 
[   14.118533] The buggy address belongs to the physical page:
[   14.118843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920
[   14.119314] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.119616] flags: 0x200000000000040(head|node=0|zone=2)
[   14.119841] page_type: f8(unknown)
[   14.120100] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.120379] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.120719] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.121114] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.121452] head: 0200000000000002 ffffea00040e4801 00000000ffffffff 00000000ffffffff
[   14.121804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.122243] page dumped because: kasan: bad access detected
[   14.122557] 
[   14.122655] Memory state around the buggy address:
[   14.122850]  ffff888103921f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.123155]  ffff888103921f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.123428] >ffff888103922000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.123744]                    ^
[   14.123934]  ffff888103922080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.124281]  ffff888103922100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.124731] ==================================================================
[   14.077590] ==================================================================
[   14.078362] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.078741] Read of size 1 at addr ffff888102a2da73 by task kunit_try_catch/240
[   14.079511] 
[   14.079773] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.079854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.079868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.079892] Call Trace:
[   14.079907]  <TASK>
[   14.079926]  dump_stack_lvl+0x73/0xb0
[   14.079961]  print_report+0xd1/0x650
[   14.080062]  ? __virt_addr_valid+0x1db/0x2d0
[   14.080092]  ? mempool_oob_right_helper+0x318/0x380
[   14.080115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.080137]  ? mempool_oob_right_helper+0x318/0x380
[   14.080161]  kasan_report+0x141/0x180
[   14.080184]  ? mempool_oob_right_helper+0x318/0x380
[   14.080212]  __asan_report_load1_noabort+0x18/0x20
[   14.080232]  mempool_oob_right_helper+0x318/0x380
[   14.080257]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.080280]  ? dequeue_entities+0x852/0x1740
[   14.080323]  ? finish_task_switch.isra.0+0x153/0x700
[   14.080351]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.080374]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.080397]  ? dequeue_task_fair+0x166/0x4e0
[   14.080419]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.080463]  ? __pfx_mempool_kfree+0x10/0x10
[   14.080485]  ? __pfx_read_tsc+0x10/0x10
[   14.080506]  ? ktime_get_ts64+0x86/0x230
[   14.080533]  kunit_try_run_case+0x1a5/0x480
[   14.080558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.080580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.080605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.080628]  ? __kthread_parkme+0x82/0x180
[   14.080651]  ? preempt_count_sub+0x50/0x80
[   14.080674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.080698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.080720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.080742]  kthread+0x337/0x6f0
[   14.080759]  ? trace_preempt_on+0x20/0xc0
[   14.080784]  ? __pfx_kthread+0x10/0x10
[   14.080802]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.080822]  ? calculate_sigpending+0x7b/0xa0
[   14.080845]  ? __pfx_kthread+0x10/0x10
[   14.080864]  ret_from_fork+0x41/0x80
[   14.080884]  ? __pfx_kthread+0x10/0x10
[   14.080903]  ret_from_fork_asm+0x1a/0x30
[   14.080935]  </TASK>
[   14.080947] 
[   14.093604] Allocated by task 240:
[   14.094064]  kasan_save_stack+0x45/0x70
[   14.094292]  kasan_save_track+0x18/0x40
[   14.094698]  kasan_save_alloc_info+0x3b/0x50
[   14.095178]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.095469]  remove_element+0x11e/0x190
[   14.095620]  mempool_alloc_preallocated+0x4d/0x90
[   14.095864]  mempool_oob_right_helper+0x8a/0x380
[   14.096064]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.096373]  kunit_try_run_case+0x1a5/0x480
[   14.096574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.096855]  kthread+0x337/0x6f0
[   14.097048]  ret_from_fork+0x41/0x80
[   14.097273]  ret_from_fork_asm+0x1a/0x30
[   14.097492] 
[   14.097570] The buggy address belongs to the object at ffff888102a2da00
[   14.097570]  which belongs to the cache kmalloc-128 of size 128
[   14.098068] The buggy address is located 0 bytes to the right of
[   14.098068]  allocated 115-byte region [ffff888102a2da00, ffff888102a2da73)
[   14.098721] 
[   14.098842] The buggy address belongs to the physical page:
[   14.099101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   14.099676] flags: 0x200000000000000(node=0|zone=2)
[   14.100098] page_type: f5(slab)
[   14.100263] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.100576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.100997] page dumped because: kasan: bad access detected
[   14.101384] 
[   14.101508] Memory state around the buggy address:
[   14.101751]  ffff888102a2d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.102130]  ffff888102a2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.102402] >ffff888102a2da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.102752]                                                              ^
[   14.103063]  ffff888102a2da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.103651]  ffff888102a2db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.103935] ==================================================================
[   14.129620] ==================================================================
[   14.130548] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.130871] Read of size 1 at addr ffff888102a472bb by task kunit_try_catch/244
[   14.131206] 
[   14.131399] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.131449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.131462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.131484] Call Trace:
[   14.131496]  <TASK>
[   14.131513]  dump_stack_lvl+0x73/0xb0
[   14.131543]  print_report+0xd1/0x650
[   14.131566]  ? __virt_addr_valid+0x1db/0x2d0
[   14.131588]  ? mempool_oob_right_helper+0x318/0x380
[   14.131612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.131634]  ? mempool_oob_right_helper+0x318/0x380
[   14.131658]  kasan_report+0x141/0x180
[   14.131681]  ? mempool_oob_right_helper+0x318/0x380
[   14.131710]  __asan_report_load1_noabort+0x18/0x20
[   14.131731]  mempool_oob_right_helper+0x318/0x380
[   14.131756]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.131779]  ? update_load_avg+0x1be/0x21b0
[   14.131804]  ? finish_task_switch.isra.0+0x153/0x700
[   14.131831]  mempool_slab_oob_right+0xed/0x140
[   14.131852]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.131872]  ? dequeue_task_fair+0x156/0x4e0
[   14.131895]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.131916]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.131939]  ? __pfx_read_tsc+0x10/0x10
[   14.131959]  ? ktime_get_ts64+0x86/0x230
[   14.131998]  kunit_try_run_case+0x1a5/0x480
[   14.132022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.132044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.132068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.132091]  ? __kthread_parkme+0x82/0x180
[   14.132112]  ? preempt_count_sub+0x50/0x80
[   14.132137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.132159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.132182]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.132205]  kthread+0x337/0x6f0
[   14.132222]  ? trace_preempt_on+0x20/0xc0
[   14.132245]  ? __pfx_kthread+0x10/0x10
[   14.132263]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.132284]  ? calculate_sigpending+0x7b/0xa0
[   14.132318]  ? __pfx_kthread+0x10/0x10
[   14.132336]  ret_from_fork+0x41/0x80
[   14.132357]  ? __pfx_kthread+0x10/0x10
[   14.132376]  ret_from_fork_asm+0x1a/0x30
[   14.132407]  </TASK>
[   14.132419] 
[   14.141310] Allocated by task 244:
[   14.141516]  kasan_save_stack+0x45/0x70
[   14.141687]  kasan_save_track+0x18/0x40
[   14.141825]  kasan_save_alloc_info+0x3b/0x50
[   14.141970]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.142225]  remove_element+0x11e/0x190
[   14.142486]  mempool_alloc_preallocated+0x4d/0x90
[   14.142729]  mempool_oob_right_helper+0x8a/0x380
[   14.143022]  mempool_slab_oob_right+0xed/0x140
[   14.143181]  kunit_try_run_case+0x1a5/0x480
[   14.143400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.143663]  kthread+0x337/0x6f0
[   14.143960]  ret_from_fork+0x41/0x80
[   14.144106]  ret_from_fork_asm+0x1a/0x30
[   14.144320] 
[   14.144399] The buggy address belongs to the object at ffff888102a47240
[   14.144399]  which belongs to the cache test_cache of size 123
[   14.144867] The buggy address is located 0 bytes to the right of
[   14.144867]  allocated 123-byte region [ffff888102a47240, ffff888102a472bb)
[   14.145348] 
[   14.145622] The buggy address belongs to the physical page:
[   14.145952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a47
[   14.146290] flags: 0x200000000000000(node=0|zone=2)
[   14.146575] page_type: f5(slab)
[   14.146735] raw: 0200000000000000 ffff8881020d6640 dead000000000122 0000000000000000
[   14.147153] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.147407] page dumped because: kasan: bad access detected
[   14.147586] 
[   14.147657] Memory state around the buggy address:
[   14.147814]  ffff888102a47180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.148105]  ffff888102a47200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.148438] >ffff888102a47280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.148829]                                         ^
[   14.149132]  ffff888102a47300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.149665]  ffff888102a47380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.150060] ==================================================================