Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.538758] ==================================================================
[   21.538925] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.539372] Read of size 1 at addr fff00000c79462bb by task kunit_try_catch/226
[   21.539516] 
[   21.539587] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.539767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.539866] Hardware name: linux,dummy-virt (DT)
[   21.539923] Call trace:
[   21.540206]  show_stack+0x20/0x38 (C)
[   21.540711]  dump_stack_lvl+0x8c/0xd0
[   21.540898]  print_report+0x118/0x608
[   21.540997]  kasan_report+0xdc/0x128
[   21.541102]  __asan_report_load1_noabort+0x20/0x30
[   21.541216]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.541321]  mempool_slab_oob_right+0xc0/0x118
[   21.541446]  kunit_try_run_case+0x170/0x3f0
[   21.541546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.541663]  kthread+0x328/0x630
[   21.541758]  ret_from_fork+0x10/0x20
[   21.542371] 
[   21.542456] Allocated by task 226:
[   21.543194]  kasan_save_stack+0x3c/0x68
[   21.543304]  kasan_save_track+0x20/0x40
[   21.543400]  kasan_save_alloc_info+0x40/0x58
[   21.543482]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.543580]  remove_element+0x16c/0x1f8
[   21.543690]  mempool_alloc_preallocated+0x58/0xc0
[   21.543799]  mempool_oob_right_helper+0x98/0x2f0
[   21.543965]  mempool_slab_oob_right+0xc0/0x118
[   21.544121]  kunit_try_run_case+0x170/0x3f0
[   21.544215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.544391]  kthread+0x328/0x630
[   21.544471]  ret_from_fork+0x10/0x20
[   21.544551] 
[   21.544596] The buggy address belongs to the object at fff00000c7946240
[   21.544596]  which belongs to the cache test_cache of size 123
[   21.545201] The buggy address is located 0 bytes to the right of
[   21.545201]  allocated 123-byte region [fff00000c7946240, fff00000c79462bb)
[   21.545375] 
[   21.545424] The buggy address belongs to the physical page:
[   21.545501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107946
[   21.545612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.546346] page_type: f5(slab)
[   21.546467] raw: 0bfffe0000000000 fff00000c7936140 dead000000000122 0000000000000000
[   21.546578] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.546665] page dumped because: kasan: bad access detected
[   21.546728] 
[   21.546766] Memory state around the buggy address:
[   21.546832]  fff00000c7946180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.547488]  fff00000c7946200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.547692] >fff00000c7946280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.547992]                                         ^
[   21.548082]  fff00000c7946300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.548184]  fff00000c7946380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.548274] ==================================================================
[   21.510823] ==================================================================
[   21.511000] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.511251] Read of size 1 at addr fff00000c797a001 by task kunit_try_catch/224
[   21.511443] 
[   21.511527] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.511901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.512158] Hardware name: linux,dummy-virt (DT)
[   21.512244] Call trace:
[   21.512297]  show_stack+0x20/0x38 (C)
[   21.512426]  dump_stack_lvl+0x8c/0xd0
[   21.513061]  print_report+0x118/0x608
[   21.513203]  kasan_report+0xdc/0x128
[   21.513528]  __asan_report_load1_noabort+0x20/0x30
[   21.513712]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.513828]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.514156]  kunit_try_run_case+0x170/0x3f0
[   21.514493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.515045]  kthread+0x328/0x630
[   21.515175]  ret_from_fork+0x10/0x20
[   21.515284] 
[   21.515328] The buggy address belongs to the physical page:
[   21.515416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107978
[   21.515529] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.515618] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.515967] page_type: f8(unknown)
[   21.516124] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.516251] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.516853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.516966] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.517554] head: 0bfffe0000000002 ffffc1ffc31e5e01 00000000ffffffff 00000000ffffffff
[   21.517847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.517989] page dumped because: kasan: bad access detected
[   21.518083] 
[   21.518485] Memory state around the buggy address:
[   21.518568]  fff00000c7979f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.518664]  fff00000c7979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.518755] >fff00000c797a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.518830]                    ^
[   21.518891]  fff00000c797a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.519267]  fff00000c797a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.519854] ==================================================================
[   21.495952] ==================================================================
[   21.496048] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.496134] Read of size 1 at addr fff00000c7938273 by task kunit_try_catch/222
[   21.496187] 
[   21.496232] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.496320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.496349] Hardware name: linux,dummy-virt (DT)
[   21.496410] Call trace:
[   21.496437]  show_stack+0x20/0x38 (C)
[   21.496491]  dump_stack_lvl+0x8c/0xd0
[   21.496543]  print_report+0x118/0x608
[   21.496591]  kasan_report+0xdc/0x128
[   21.496637]  __asan_report_load1_noabort+0x20/0x30
[   21.496688]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.496736]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.496785]  kunit_try_run_case+0x170/0x3f0
[   21.496833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.496885]  kthread+0x328/0x630
[   21.496929]  ret_from_fork+0x10/0x20
[   21.496980] 
[   21.497001] Allocated by task 222:
[   21.497033]  kasan_save_stack+0x3c/0x68
[   21.497079]  kasan_save_track+0x20/0x40
[   21.497119]  kasan_save_alloc_info+0x40/0x58
[   21.497160]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.497204]  remove_element+0x130/0x1f8
[   21.497244]  mempool_alloc_preallocated+0x58/0xc0
[   21.497283]  mempool_oob_right_helper+0x98/0x2f0
[   21.497323]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.497378]  kunit_try_run_case+0x170/0x3f0
[   21.497421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.497465]  kthread+0x328/0x630
[   21.497501]  ret_from_fork+0x10/0x20
[   21.497538] 
[   21.497560] The buggy address belongs to the object at fff00000c7938200
[   21.497560]  which belongs to the cache kmalloc-128 of size 128
[   21.497619] The buggy address is located 0 bytes to the right of
[   21.497619]  allocated 115-byte region [fff00000c7938200, fff00000c7938273)
[   21.497681] 
[   21.497706] The buggy address belongs to the physical page:
[   21.497741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   21.497797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.497853] page_type: f5(slab)
[   21.497897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.497947] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.497986] page dumped because: kasan: bad access detected
[   21.498069] 
[   21.498104] Memory state around the buggy address:
[   21.498168]  fff00000c7938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.498258]  fff00000c7938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.498338] >fff00000c7938200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.498432]                                                              ^
[   21.498524]  fff00000c7938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.498625]  fff00000c7938300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.498711] ==================================================================

[   15.200952] ==================================================================
[   15.201522] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.202283] Read of size 1 at addr ffff888102aba001 by task kunit_try_catch/241
[   15.202564] 
[   15.203069] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.203140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.203156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.203184] Call Trace:
[   15.203202]  <TASK>
[   15.203226]  dump_stack_lvl+0x73/0xb0
[   15.203267]  print_report+0xd1/0x650
[   15.203295]  ? __virt_addr_valid+0x1db/0x2d0
[   15.203324]  ? mempool_oob_right_helper+0x318/0x380
[   15.203352]  ? kasan_addr_to_slab+0x11/0xa0
[   15.203376]  ? mempool_oob_right_helper+0x318/0x380
[   15.203403]  kasan_report+0x141/0x180
[   15.203429]  ? mempool_oob_right_helper+0x318/0x380
[   15.203464]  __asan_report_load1_noabort+0x18/0x20
[   15.203493]  mempool_oob_right_helper+0x318/0x380
[   15.203522]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.203552]  ? __kasan_check_write+0x18/0x20
[   15.203575]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.203603]  ? finish_task_switch.isra.0+0x153/0x700
[   15.203633]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   15.203681]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   15.203714]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.203743]  ? __pfx_mempool_kfree+0x10/0x10
[   15.203785]  ? __pfx_read_tsc+0x10/0x10
[   15.203890]  ? ktime_get_ts64+0x86/0x230
[   15.203923]  kunit_try_run_case+0x1a5/0x480
[   15.203955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.204012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.204040]  ? __kthread_parkme+0x82/0x180
[   15.204066]  ? preempt_count_sub+0x50/0x80
[   15.204092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.204120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.204148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.204175]  kthread+0x337/0x6f0
[   15.204198]  ? trace_preempt_on+0x20/0xc0
[   15.204226]  ? __pfx_kthread+0x10/0x10
[   15.204251]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.204275]  ? calculate_sigpending+0x7b/0xa0
[   15.204306]  ? __pfx_kthread+0x10/0x10
[   15.204331]  ret_from_fork+0x116/0x1d0
[   15.204352]  ? __pfx_kthread+0x10/0x10
[   15.204376]  ret_from_fork_asm+0x1a/0x30
[   15.204415]  </TASK>
[   15.204430] 
[   15.220548] The buggy address belongs to the physical page:
[   15.221436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8
[   15.222108] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.222519] flags: 0x200000000000040(head|node=0|zone=2)
[   15.222949] page_type: f8(unknown)
[   15.223109] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.223519] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.224455] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.224757] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.225030] head: 0200000000000002 ffffea00040aae01 00000000ffffffff 00000000ffffffff
[   15.225302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.225565] page dumped because: kasan: bad access detected
[   15.225782] 
[   15.225870] Memory state around the buggy address:
[   15.226057]  ffff888102ab9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.226319]  ffff888102ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.226581] >ffff888102aba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.226838]                    ^
[   15.226975]  ffff888102aba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.227222]  ffff888102aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.229229] ==================================================================
[   15.166313] ==================================================================
[   15.166903] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.167468] Read of size 1 at addr ffff888103332673 by task kunit_try_catch/239
[   15.167915] 
[   15.168085] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.168148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.168164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.168192] Call Trace:
[   15.168237]  <TASK>
[   15.168263]  dump_stack_lvl+0x73/0xb0
[   15.168305]  print_report+0xd1/0x650
[   15.168334]  ? __virt_addr_valid+0x1db/0x2d0
[   15.168824]  ? mempool_oob_right_helper+0x318/0x380
[   15.168858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.168887]  ? mempool_oob_right_helper+0x318/0x380
[   15.168915]  kasan_report+0x141/0x180
[   15.168943]  ? mempool_oob_right_helper+0x318/0x380
[   15.168976]  __asan_report_load1_noabort+0x18/0x20
[   15.169004]  mempool_oob_right_helper+0x318/0x380
[   15.169034]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.169065]  ? __kasan_check_write+0x18/0x20
[   15.169089]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.169120]  ? finish_task_switch.isra.0+0x153/0x700
[   15.169154]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.169184]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   15.169215]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.169248]  ? __pfx_mempool_kfree+0x10/0x10
[   15.169279]  ? __pfx_read_tsc+0x10/0x10
[   15.169306]  ? ktime_get_ts64+0x86/0x230
[   15.169337]  kunit_try_run_case+0x1a5/0x480
[   15.169370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.169397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.169428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.169456]  ? __kthread_parkme+0x82/0x180
[   15.169482]  ? preempt_count_sub+0x50/0x80
[   15.169511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.169540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.169567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.169595]  kthread+0x337/0x6f0
[   15.169617]  ? trace_preempt_on+0x20/0xc0
[   15.169662]  ? __pfx_kthread+0x10/0x10
[   15.169687]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.169711]  ? calculate_sigpending+0x7b/0xa0
[   15.169741]  ? __pfx_kthread+0x10/0x10
[   15.169768]  ret_from_fork+0x116/0x1d0
[   15.169790]  ? __pfx_kthread+0x10/0x10
[   15.169816]  ret_from_fork_asm+0x1a/0x30
[   15.169854]  </TASK>
[   15.169869] 
[   15.182508] Allocated by task 239:
[   15.182772]  kasan_save_stack+0x45/0x70
[   15.183897]  kasan_save_track+0x18/0x40
[   15.184138]  kasan_save_alloc_info+0x3b/0x50
[   15.184366]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.184641]  remove_element+0x11e/0x190
[   15.184908]  mempool_alloc_preallocated+0x4d/0x90
[   15.185477]  mempool_oob_right_helper+0x8a/0x380
[   15.185733]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.186227]  kunit_try_run_case+0x1a5/0x480
[   15.186587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.187015]  kthread+0x337/0x6f0
[   15.187322]  ret_from_fork+0x116/0x1d0
[   15.187547]  ret_from_fork_asm+0x1a/0x30
[   15.187782] 
[   15.188094] The buggy address belongs to the object at ffff888103332600
[   15.188094]  which belongs to the cache kmalloc-128 of size 128
[   15.188906] The buggy address is located 0 bytes to the right of
[   15.188906]  allocated 115-byte region [ffff888103332600, ffff888103332673)
[   15.189694] 
[   15.190053] The buggy address belongs to the physical page:
[   15.190361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   15.190775] flags: 0x200000000000000(node=0|zone=2)
[   15.191343] page_type: f5(slab)
[   15.191628] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.192163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.192702] page dumped because: kasan: bad access detected
[   15.193134] 
[   15.193259] Memory state around the buggy address:
[   15.193503]  ffff888103332500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.194024]  ffff888103332580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.194323] >ffff888103332600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.194607]                                                              ^
[   15.195019]  ffff888103332680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.195472]  ffff888103332700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.196179] ==================================================================
[   15.238293] ==================================================================
[   15.239501] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.240813] Read of size 1 at addr ffff8881033442bb by task kunit_try_catch/243
[   15.241162] 
[   15.241281] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.241342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.241357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.241385] Call Trace:
[   15.241403]  <TASK>
[   15.241426]  dump_stack_lvl+0x73/0xb0
[   15.241467]  print_report+0xd1/0x650
[   15.241495]  ? __virt_addr_valid+0x1db/0x2d0
[   15.241527]  ? mempool_oob_right_helper+0x318/0x380
[   15.241556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.241582]  ? mempool_oob_right_helper+0x318/0x380
[   15.241610]  kasan_report+0x141/0x180
[   15.241637]  ? mempool_oob_right_helper+0x318/0x380
[   15.241690]  __asan_report_load1_noabort+0x18/0x20
[   15.241721]  mempool_oob_right_helper+0x318/0x380
[   15.241750]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.241782]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.241812]  ? finish_task_switch.isra.0+0x153/0x700
[   15.241844]  mempool_slab_oob_right+0xed/0x140
[   15.241874]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   15.241905]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.241931]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.241958]  ? __pfx_read_tsc+0x10/0x10
[   15.241983]  ? ktime_get_ts64+0x86/0x230
[   15.242014]  kunit_try_run_case+0x1a5/0x480
[   15.242046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.242104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.242132]  ? __kthread_parkme+0x82/0x180
[   15.242159]  ? preempt_count_sub+0x50/0x80
[   15.242186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.242245]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.242274]  kthread+0x337/0x6f0
[   15.242297]  ? trace_preempt_on+0x20/0xc0
[   15.242327]  ? __pfx_kthread+0x10/0x10
[   15.242351]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.242377]  ? calculate_sigpending+0x7b/0xa0
[   15.242407]  ? __pfx_kthread+0x10/0x10
[   15.242438]  ret_from_fork+0x116/0x1d0
[   15.242461]  ? __pfx_kthread+0x10/0x10
[   15.242486]  ret_from_fork_asm+0x1a/0x30
[   15.242524]  </TASK>
[   15.242540] 
[   15.253485] Allocated by task 243:
[   15.254117]  kasan_save_stack+0x45/0x70
[   15.254676]  kasan_save_track+0x18/0x40
[   15.255231]  kasan_save_alloc_info+0x3b/0x50
[   15.255751]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.256439]  remove_element+0x11e/0x190
[   15.256973]  mempool_alloc_preallocated+0x4d/0x90
[   15.257492]  mempool_oob_right_helper+0x8a/0x380
[   15.258060]  mempool_slab_oob_right+0xed/0x140
[   15.258581]  kunit_try_run_case+0x1a5/0x480
[   15.259227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.259945]  kthread+0x337/0x6f0
[   15.260358]  ret_from_fork+0x116/0x1d0
[   15.260801]  ret_from_fork_asm+0x1a/0x30
[   15.261352] 
[   15.261550] The buggy address belongs to the object at ffff888103344240
[   15.261550]  which belongs to the cache test_cache of size 123
[   15.263115] The buggy address is located 0 bytes to the right of
[   15.263115]  allocated 123-byte region [ffff888103344240, ffff8881033442bb)
[   15.264826] 
[   15.265053] The buggy address belongs to the physical page:
[   15.265784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103344
[   15.266500] flags: 0x200000000000000(node=0|zone=2)
[   15.267100] page_type: f5(slab)
[   15.267594] raw: 0200000000000000 ffff88810333c280 dead000000000122 0000000000000000
[   15.268148] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.268957] page dumped because: kasan: bad access detected
[   15.269642] 
[   15.269815] Memory state around the buggy address:
[   15.270255]  ffff888103344180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.270929]  ffff888103344200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   15.271733] >ffff888103344280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   15.272191]                                         ^
[   15.272828]  ffff888103344300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273557]  ffff888103344380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.274294] ==================================================================