Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.759605] ==================================================================
[   21.759732] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.759862] Read of size 1 at addr fff00000c79b2001 by task kunit_try_catch/224
[   21.759923] 
[   21.759975] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.760078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.760109] Hardware name: linux,dummy-virt (DT)
[   21.760147] Call trace:
[   21.760175]  show_stack+0x20/0x38 (C)
[   21.760238]  dump_stack_lvl+0x8c/0xd0
[   21.760295]  print_report+0x118/0x608
[   21.760348]  kasan_report+0xdc/0x128
[   21.760397]  __asan_report_load1_noabort+0x20/0x30
[   21.760454]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.760505]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.760560]  kunit_try_run_case+0x170/0x3f0
[   21.760614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.760672]  kthread+0x328/0x630
[   21.760720]  ret_from_fork+0x10/0x20
[   21.760778] 
[   21.760805] The buggy address belongs to the physical page:
[   21.760861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0
[   21.760927] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.760980] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.761047] page_type: f8(unknown)
[   21.761097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.761241] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.761351] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.761466] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.761567] head: 0bfffe0000000002 ffffc1ffc31e6c01 00000000ffffffff 00000000ffffffff
[   21.761663] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.761784] page dumped because: kasan: bad access detected
[   21.761878] 
[   21.761913] Memory state around the buggy address:
[   21.761989]  fff00000c79b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.762094]  fff00000c79b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.762189] >fff00000c79b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.762255]                    ^
[   21.762292]  fff00000c79b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.762340]  fff00000c79b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.762383] ==================================================================
[   21.702635] ==================================================================
[   21.702881] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.702993] Read of size 1 at addr fff00000c599f673 by task kunit_try_catch/222
[   21.703055] 
[   21.703104] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.703203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.703233] Hardware name: linux,dummy-virt (DT)
[   21.703271] Call trace:
[   21.703299]  show_stack+0x20/0x38 (C)
[   21.703361]  dump_stack_lvl+0x8c/0xd0
[   21.703418]  print_report+0x118/0x608
[   21.703473]  kasan_report+0xdc/0x128
[   21.703524]  __asan_report_load1_noabort+0x20/0x30
[   21.703581]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.703636]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.703689]  kunit_try_run_case+0x170/0x3f0
[   21.703747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.703806]  kthread+0x328/0x630
[   21.703884]  ret_from_fork+0x10/0x20
[   21.703942] 
[   21.703965] Allocated by task 222:
[   21.704001]  kasan_save_stack+0x3c/0x68
[   21.704054]  kasan_save_track+0x20/0x40
[   21.704097]  kasan_save_alloc_info+0x40/0x58
[   21.704143]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.704194]  remove_element+0x130/0x1f8
[   21.704238]  mempool_alloc_preallocated+0x58/0xc0
[   21.704282]  mempool_oob_right_helper+0x98/0x2f0
[   21.704326]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.704368]  kunit_try_run_case+0x170/0x3f0
[   21.704412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.704461]  kthread+0x328/0x630
[   21.704497]  ret_from_fork+0x10/0x20
[   21.704539] 
[   21.704563] The buggy address belongs to the object at fff00000c599f600
[   21.704563]  which belongs to the cache kmalloc-128 of size 128
[   21.704630] The buggy address is located 0 bytes to the right of
[   21.704630]  allocated 115-byte region [fff00000c599f600, fff00000c599f673)
[   21.704701] 
[   21.704728] The buggy address belongs to the physical page:
[   21.704766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f
[   21.704853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.704918] page_type: f5(slab)
[   21.704971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.705030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.705074] page dumped because: kasan: bad access detected
[   21.705110] 
[   21.705147] Memory state around the buggy address:
[   21.705208]  fff00000c599f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.705259]  fff00000c599f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.705305] >fff00000c599f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.705347]                                                              ^
[   21.705391]  fff00000c599f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.705439]  fff00000c599f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.705480] ==================================================================
[   21.788081] ==================================================================
[   21.788359] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.788709] Read of size 1 at addr fff00000c59442bb by task kunit_try_catch/226
[   21.788909] 
[   21.789001] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.789197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.789255] Hardware name: linux,dummy-virt (DT)
[   21.789343] Call trace:
[   21.789762]  show_stack+0x20/0x38 (C)
[   21.789960]  dump_stack_lvl+0x8c/0xd0
[   21.790079]  print_report+0x118/0x608
[   21.790217]  kasan_report+0xdc/0x128
[   21.790353]  __asan_report_load1_noabort+0x20/0x30
[   21.790480]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.790604]  mempool_slab_oob_right+0xc0/0x118
[   21.790692]  kunit_try_run_case+0x170/0x3f0
[   21.790783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.791490]  kthread+0x328/0x630
[   21.792106]  ret_from_fork+0x10/0x20
[   21.792716] 
[   21.792779] Allocated by task 226:
[   21.792874]  kasan_save_stack+0x3c/0x68
[   21.792992]  kasan_save_track+0x20/0x40
[   21.793082]  kasan_save_alloc_info+0x40/0x58
[   21.793174]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.793259]  remove_element+0x16c/0x1f8
[   21.793326]  mempool_alloc_preallocated+0x58/0xc0
[   21.794162]  mempool_oob_right_helper+0x98/0x2f0
[   21.794445]  mempool_slab_oob_right+0xc0/0x118
[   21.794658]  kunit_try_run_case+0x170/0x3f0
[   21.795319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.795471]  kthread+0x328/0x630
[   21.795568]  ret_from_fork+0x10/0x20
[   21.795659] 
[   21.795717] The buggy address belongs to the object at fff00000c5944240
[   21.795717]  which belongs to the cache test_cache of size 123
[   21.795874] The buggy address is located 0 bytes to the right of
[   21.795874]  allocated 123-byte region [fff00000c5944240, fff00000c59442bb)
[   21.796048] 
[   21.796128] The buggy address belongs to the physical page:
[   21.796243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105944
[   21.796443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.796626] page_type: f5(slab)
[   21.796725] raw: 0bfffe0000000000 fff00000c3eaa3c0 dead000000000122 0000000000000000
[   21.796866] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.796977] page dumped because: kasan: bad access detected
[   21.797059] 
[   21.797106] Memory state around the buggy address:
[   21.797182]  fff00000c5944180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.797283]  fff00000c5944200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.797875] >fff00000c5944280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.798038]                                         ^
[   21.798166]  fff00000c5944300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.798672]  fff00000c5944380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.798807] ==================================================================

[   14.056500] ==================================================================
[   14.057071] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.057426] Read of size 1 at addr ffff888103b72001 by task kunit_try_catch/241
[   14.058352] 
[   14.058584] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.058654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.058817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.058840] Call Trace:
[   14.058853]  <TASK>
[   14.058869]  dump_stack_lvl+0x73/0xb0
[   14.058901]  print_report+0xd1/0x650
[   14.058923]  ? __virt_addr_valid+0x1db/0x2d0
[   14.058947]  ? mempool_oob_right_helper+0x318/0x380
[   14.058970]  ? kasan_addr_to_slab+0x11/0xa0
[   14.058991]  ? mempool_oob_right_helper+0x318/0x380
[   14.059015]  kasan_report+0x141/0x180
[   14.059037]  ? mempool_oob_right_helper+0x318/0x380
[   14.059065]  __asan_report_load1_noabort+0x18/0x20
[   14.059090]  mempool_oob_right_helper+0x318/0x380
[   14.059115]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.059141]  ? __kasan_check_write+0x18/0x20
[   14.059161]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.059184]  ? finish_task_switch.isra.0+0x153/0x700
[   14.059211]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.059237]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.059265]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.059290]  ? __pfx_mempool_kfree+0x10/0x10
[   14.059315]  ? __pfx_read_tsc+0x10/0x10
[   14.059336]  ? ktime_get_ts64+0x86/0x230
[   14.059360]  kunit_try_run_case+0x1a5/0x480
[   14.059384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.059407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.059431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.059455]  ? __kthread_parkme+0x82/0x180
[   14.059476]  ? preempt_count_sub+0x50/0x80
[   14.059499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.059523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.059547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.059573]  kthread+0x337/0x6f0
[   14.059591]  ? trace_preempt_on+0x20/0xc0
[   14.059615]  ? __pfx_kthread+0x10/0x10
[   14.059636]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.059716]  ? calculate_sigpending+0x7b/0xa0
[   14.059741]  ? __pfx_kthread+0x10/0x10
[   14.059773]  ret_from_fork+0x116/0x1d0
[   14.059792]  ? __pfx_kthread+0x10/0x10
[   14.059812]  ret_from_fork_asm+0x1a/0x30
[   14.059843]  </TASK>
[   14.059854] 
[   14.071970] The buggy address belongs to the physical page:
[   14.072595] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b70
[   14.073086] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.073370] flags: 0x200000000000040(head|node=0|zone=2)
[   14.073607] page_type: f8(unknown)
[   14.073818] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.074487] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.074935] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.075405] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.075824] head: 0200000000000002 ffffea00040edc01 00000000ffffffff 00000000ffffffff
[   14.076143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.076675] page dumped because: kasan: bad access detected
[   14.077082] 
[   14.077292] Memory state around the buggy address:
[   14.077493]  ffff888103b71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.078009]  ffff888103b71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.078426] >ffff888103b72000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.078925]                    ^
[   14.079100]  ffff888103b72080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.079549]  ffff888103b72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.080105] ==================================================================
[   14.023233] ==================================================================
[   14.023890] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.024230] Read of size 1 at addr ffff888102655873 by task kunit_try_catch/239
[   14.024447] 
[   14.024591] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.024640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.024776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.024804] Call Trace:
[   14.024818]  <TASK>
[   14.024837]  dump_stack_lvl+0x73/0xb0
[   14.024872]  print_report+0xd1/0x650
[   14.024896]  ? __virt_addr_valid+0x1db/0x2d0
[   14.024922]  ? mempool_oob_right_helper+0x318/0x380
[   14.024946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.024969]  ? mempool_oob_right_helper+0x318/0x380
[   14.024994]  kasan_report+0x141/0x180
[   14.025015]  ? mempool_oob_right_helper+0x318/0x380
[   14.025043]  __asan_report_load1_noabort+0x18/0x20
[   14.025068]  mempool_oob_right_helper+0x318/0x380
[   14.025094]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.025119]  ? __kasan_check_write+0x18/0x20
[   14.025139]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.025163]  ? finish_task_switch.isra.0+0x153/0x700
[   14.025190]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.025213]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.025241]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.025267]  ? __pfx_mempool_kfree+0x10/0x10
[   14.025292]  ? __pfx_read_tsc+0x10/0x10
[   14.025314]  ? ktime_get_ts64+0x86/0x230
[   14.025339]  kunit_try_run_case+0x1a5/0x480
[   14.025366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.025388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.025414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.025439]  ? __kthread_parkme+0x82/0x180
[   14.025460]  ? preempt_count_sub+0x50/0x80
[   14.025483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.025508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.025533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.025558]  kthread+0x337/0x6f0
[   14.025578]  ? trace_preempt_on+0x20/0xc0
[   14.025602]  ? __pfx_kthread+0x10/0x10
[   14.025622]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.025687]  ? calculate_sigpending+0x7b/0xa0
[   14.025714]  ? __pfx_kthread+0x10/0x10
[   14.025735]  ret_from_fork+0x116/0x1d0
[   14.025765]  ? __pfx_kthread+0x10/0x10
[   14.025786]  ret_from_fork_asm+0x1a/0x30
[   14.025819]  </TASK>
[   14.025830] 
[   14.040187] Allocated by task 239:
[   14.040330]  kasan_save_stack+0x45/0x70
[   14.040479]  kasan_save_track+0x18/0x40
[   14.040617]  kasan_save_alloc_info+0x3b/0x50
[   14.041092]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.041555]  remove_element+0x11e/0x190
[   14.041989]  mempool_alloc_preallocated+0x4d/0x90
[   14.042678]  mempool_oob_right_helper+0x8a/0x380
[   14.043634]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.044458]  kunit_try_run_case+0x1a5/0x480
[   14.044930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.045197]  kthread+0x337/0x6f0
[   14.045723]  ret_from_fork+0x116/0x1d0
[   14.046078]  ret_from_fork_asm+0x1a/0x30
[   14.046226] 
[   14.046298] The buggy address belongs to the object at ffff888102655800
[   14.046298]  which belongs to the cache kmalloc-128 of size 128
[   14.046870] The buggy address is located 0 bytes to the right of
[   14.046870]  allocated 115-byte region [ffff888102655800, ffff888102655873)
[   14.047827] 
[   14.047958] The buggy address belongs to the physical page:
[   14.048197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   14.048532] flags: 0x200000000000000(node=0|zone=2)
[   14.048808] page_type: f5(slab)
[   14.048945] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.049345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.049706] page dumped because: kasan: bad access detected
[   14.049995] 
[   14.050086] Memory state around the buggy address:
[   14.050307]  ffff888102655700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.050591]  ffff888102655780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.050941] >ffff888102655800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.051333]                                                              ^
[   14.051730]  ffff888102655880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.052150]  ffff888102655900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.052600] ==================================================================
[   14.084525] ==================================================================
[   14.085849] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.086449] Read of size 1 at addr ffff888103ace2bb by task kunit_try_catch/243
[   14.087072] 
[   14.087367] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.087417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.087429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.087451] Call Trace:
[   14.087465]  <TASK>
[   14.087482]  dump_stack_lvl+0x73/0xb0
[   14.087515]  print_report+0xd1/0x650
[   14.087539]  ? __virt_addr_valid+0x1db/0x2d0
[   14.087564]  ? mempool_oob_right_helper+0x318/0x380
[   14.087589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.087612]  ? mempool_oob_right_helper+0x318/0x380
[   14.087636]  kasan_report+0x141/0x180
[   14.087808]  ? mempool_oob_right_helper+0x318/0x380
[   14.087839]  __asan_report_load1_noabort+0x18/0x20
[   14.087865]  mempool_oob_right_helper+0x318/0x380
[   14.087937]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.087967]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.087992]  ? finish_task_switch.isra.0+0x153/0x700
[   14.088019]  mempool_slab_oob_right+0xed/0x140
[   14.088044]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.088073]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.088100]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.088126]  ? __pfx_read_tsc+0x10/0x10
[   14.088149]  ? ktime_get_ts64+0x86/0x230
[   14.088173]  kunit_try_run_case+0x1a5/0x480
[   14.088199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.088222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.088248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.088271]  ? __kthread_parkme+0x82/0x180
[   14.088292]  ? preempt_count_sub+0x50/0x80
[   14.088316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.088340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.088365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.088390]  kthread+0x337/0x6f0
[   14.088410]  ? trace_preempt_on+0x20/0xc0
[   14.088434]  ? __pfx_kthread+0x10/0x10
[   14.088454]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.088476]  ? calculate_sigpending+0x7b/0xa0
[   14.088501]  ? __pfx_kthread+0x10/0x10
[   14.088522]  ret_from_fork+0x116/0x1d0
[   14.088541]  ? __pfx_kthread+0x10/0x10
[   14.088561]  ret_from_fork_asm+0x1a/0x30
[   14.088593]  </TASK>
[   14.088604] 
[   14.106499] Allocated by task 243:
[   14.106645]  kasan_save_stack+0x45/0x70
[   14.107409]  kasan_save_track+0x18/0x40
[   14.108069]  kasan_save_alloc_info+0x3b/0x50
[   14.108592]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.109388]  remove_element+0x11e/0x190
[   14.109996]  mempool_alloc_preallocated+0x4d/0x90
[   14.110280]  mempool_oob_right_helper+0x8a/0x380
[   14.110567]  mempool_slab_oob_right+0xed/0x140
[   14.111255]  kunit_try_run_case+0x1a5/0x480
[   14.111467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.111998]  kthread+0x337/0x6f0
[   14.112426]  ret_from_fork+0x116/0x1d0
[   14.112616]  ret_from_fork_asm+0x1a/0x30
[   14.113077] 
[   14.113228] The buggy address belongs to the object at ffff888103ace240
[   14.113228]  which belongs to the cache test_cache of size 123
[   14.114183] The buggy address is located 0 bytes to the right of
[   14.114183]  allocated 123-byte region [ffff888103ace240, ffff888103ace2bb)
[   14.115071] 
[   14.115194] The buggy address belongs to the physical page:
[   14.115410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ace
[   14.116394] flags: 0x200000000000000(node=0|zone=2)
[   14.116604] page_type: f5(slab)
[   14.116797] raw: 0200000000000000 ffff888101342780 dead000000000122 0000000000000000
[   14.117508] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.118050] page dumped because: kasan: bad access detected
[   14.118421] 
[   14.118717] Memory state around the buggy address:
[   14.119164]  ffff888103ace180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.119609]  ffff888103ace200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.120019] >ffff888103ace280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.120342]                                         ^
[   14.120565]  ffff888103ace300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.121393]  ffff888103ace380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.121835] ==================================================================