Hay
Date
July 15, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.448607] ==================================================================
[   17.448681] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.448741] Read of size 1 at addr fff00000c78ee001 by task kunit_try_catch/224
[   17.448791] 
[   17.448825] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.449003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.449056] Hardware name: linux,dummy-virt (DT)
[   17.449115] Call trace:
[   17.449266]  show_stack+0x20/0x38 (C)
[   17.449371]  dump_stack_lvl+0x8c/0xd0
[   17.449431]  print_report+0x118/0x5d0
[   17.449507]  kasan_report+0xdc/0x128
[   17.449554]  __asan_report_load1_noabort+0x20/0x30
[   17.449604]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.449651]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   17.449699]  kunit_try_run_case+0x170/0x3f0
[   17.450122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.450208]  kthread+0x328/0x630
[   17.450398]  ret_from_fork+0x10/0x20
[   17.450704] 
[   17.450853] The buggy address belongs to the physical page:
[   17.450972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ec
[   17.451364] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.451657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.452084] page_type: f8(unknown)
[   17.452789] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.453286] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.453375] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.453572] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.453627] head: 0bfffe0000000002 ffffc1ffc31e3b01 00000000ffffffff 00000000ffffffff
[   17.453685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.453727] page dumped because: kasan: bad access detected
[   17.453979] 
[   17.454030] Memory state around the buggy address:
[   17.454151]  fff00000c78edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.454210]  fff00000c78edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.454255] >fff00000c78ee000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.454419]                    ^
[   17.454718]  fff00000c78ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.454881]  fff00000c78ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.454968] ==================================================================
[   17.431704] ==================================================================
[   17.431788] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.431865] Read of size 1 at addr fff00000c5962273 by task kunit_try_catch/222
[   17.431917] 
[   17.431960] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.432047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.432073] Hardware name: linux,dummy-virt (DT)
[   17.432105] Call trace:
[   17.432131]  show_stack+0x20/0x38 (C)
[   17.432197]  dump_stack_lvl+0x8c/0xd0
[   17.432248]  print_report+0x118/0x5d0
[   17.432293]  kasan_report+0xdc/0x128
[   17.432338]  __asan_report_load1_noabort+0x20/0x30
[   17.432387]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.432434]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.432488]  kunit_try_run_case+0x170/0x3f0
[   17.432538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.432590]  kthread+0x328/0x630
[   17.432632]  ret_from_fork+0x10/0x20
[   17.432680] 
[   17.432699] Allocated by task 222:
[   17.432728]  kasan_save_stack+0x3c/0x68
[   17.432769]  kasan_save_track+0x20/0x40
[   17.432808]  kasan_save_alloc_info+0x40/0x58
[   17.432847]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.432891]  remove_element+0x130/0x1f8
[   17.432929]  mempool_alloc_preallocated+0x58/0xc0
[   17.433082]  mempool_oob_right_helper+0x98/0x2f0
[   17.433133]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.433171]  kunit_try_run_case+0x170/0x3f0
[   17.433226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.433270]  kthread+0x328/0x630
[   17.433303]  ret_from_fork+0x10/0x20
[   17.433341] 
[   17.433361] The buggy address belongs to the object at fff00000c5962200
[   17.433361]  which belongs to the cache kmalloc-128 of size 128
[   17.433423] The buggy address is located 0 bytes to the right of
[   17.433423]  allocated 115-byte region [fff00000c5962200, fff00000c5962273)
[   17.433487] 
[   17.433509] The buggy address belongs to the physical page:
[   17.433549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105962
[   17.433604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.433657] page_type: f5(slab)
[   17.433698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.433749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.433791] page dumped because: kasan: bad access detected
[   17.433824] 
[   17.433841] Memory state around the buggy address:
[   17.433873]  fff00000c5962100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.433918]  fff00000c5962180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.433962] >fff00000c5962200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.434001]                                                              ^
[   17.434042]  fff00000c5962280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.434084]  fff00000c5962300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.434124] ==================================================================
[   17.483667] ==================================================================
[   17.483778] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.483887] Read of size 1 at addr fff00000c59662bb by task kunit_try_catch/226
[   17.483941] 
[   17.484004] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.484092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.484119] Hardware name: linux,dummy-virt (DT)
[   17.484151] Call trace:
[   17.484172]  show_stack+0x20/0x38 (C)
[   17.484352]  dump_stack_lvl+0x8c/0xd0
[   17.484403]  print_report+0x118/0x5d0
[   17.484449]  kasan_report+0xdc/0x128
[   17.484530]  __asan_report_load1_noabort+0x20/0x30
[   17.484589]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.484646]  mempool_slab_oob_right+0xc0/0x118
[   17.484767]  kunit_try_run_case+0x170/0x3f0
[   17.484819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.484872]  kthread+0x328/0x630
[   17.484980]  ret_from_fork+0x10/0x20
[   17.485103] 
[   17.485217] Allocated by task 226:
[   17.485322]  kasan_save_stack+0x3c/0x68
[   17.485365]  kasan_save_track+0x20/0x40
[   17.485402]  kasan_save_alloc_info+0x40/0x58
[   17.485442]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.485485]  remove_element+0x16c/0x1f8
[   17.485794]  mempool_alloc_preallocated+0x58/0xc0
[   17.485920]  mempool_oob_right_helper+0x98/0x2f0
[   17.485989]  mempool_slab_oob_right+0xc0/0x118
[   17.486039]  kunit_try_run_case+0x170/0x3f0
[   17.486128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.486192]  kthread+0x328/0x630
[   17.486272]  ret_from_fork+0x10/0x20
[   17.486397] 
[   17.486456] The buggy address belongs to the object at fff00000c5966240
[   17.486456]  which belongs to the cache test_cache of size 123
[   17.486612] The buggy address is located 0 bytes to the right of
[   17.486612]  allocated 123-byte region [fff00000c5966240, fff00000c59662bb)
[   17.486736] 
[   17.486756] The buggy address belongs to the physical page:
[   17.486806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966
[   17.486918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.486986] page_type: f5(slab)
[   17.487144] raw: 0bfffe0000000000 fff00000c590fa00 dead000000000122 0000000000000000
[   17.487260] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.487386] page dumped because: kasan: bad access detected
[   17.487420] 
[   17.487449] Memory state around the buggy address:
[   17.487481]  fff00000c5966180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.487524]  fff00000c5966200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   17.487570] >fff00000c5966280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   17.487608]                                         ^
[   17.487640]  fff00000c5966300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.487683]  fff00000c5966380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.487721] ==================================================================

[   13.961773] ==================================================================
[   13.962240] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.963170] Read of size 1 at addr ffff888102afc873 by task kunit_try_catch/238
[   13.963636] 
[   13.964001] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.964054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.964067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.964092] Call Trace:
[   13.964106]  <TASK>
[   13.964126]  dump_stack_lvl+0x73/0xb0
[   13.964316]  print_report+0xd1/0x610
[   13.964388]  ? __virt_addr_valid+0x1db/0x2d0
[   13.964414]  ? mempool_oob_right_helper+0x318/0x380
[   13.964453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.964478]  ? mempool_oob_right_helper+0x318/0x380
[   13.964502]  kasan_report+0x141/0x180
[   13.964525]  ? mempool_oob_right_helper+0x318/0x380
[   13.964554]  __asan_report_load1_noabort+0x18/0x20
[   13.964580]  mempool_oob_right_helper+0x318/0x380
[   13.964606]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.964634]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.964658]  ? finish_task_switch.isra.0+0x153/0x700
[   13.964686]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.964710]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.964738]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.964779]  ? __pfx_mempool_kfree+0x10/0x10
[   13.964804]  ? __pfx_read_tsc+0x10/0x10
[   13.964827]  ? ktime_get_ts64+0x86/0x230
[   13.964852]  kunit_try_run_case+0x1a5/0x480
[   13.964879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.964903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.964929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.964954]  ? __kthread_parkme+0x82/0x180
[   13.964976]  ? preempt_count_sub+0x50/0x80
[   13.964999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.965023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.965049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.965075]  kthread+0x337/0x6f0
[   13.965095]  ? trace_preempt_on+0x20/0xc0
[   13.965119]  ? __pfx_kthread+0x10/0x10
[   13.965139]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.965162]  ? calculate_sigpending+0x7b/0xa0
[   13.965188]  ? __pfx_kthread+0x10/0x10
[   13.965210]  ret_from_fork+0x116/0x1d0
[   13.965229]  ? __pfx_kthread+0x10/0x10
[   13.965250]  ret_from_fork_asm+0x1a/0x30
[   13.965281]  </TASK>
[   13.965292] 
[   13.977550] Allocated by task 238:
[   13.977728]  kasan_save_stack+0x45/0x70
[   13.977979]  kasan_save_track+0x18/0x40
[   13.978453]  kasan_save_alloc_info+0x3b/0x50
[   13.978695]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.979116]  remove_element+0x11e/0x190
[   13.979313]  mempool_alloc_preallocated+0x4d/0x90
[   13.979658]  mempool_oob_right_helper+0x8a/0x380
[   13.979886]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.980101]  kunit_try_run_case+0x1a5/0x480
[   13.980296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.980847]  kthread+0x337/0x6f0
[   13.981082]  ret_from_fork+0x116/0x1d0
[   13.981292]  ret_from_fork_asm+0x1a/0x30
[   13.981696] 
[   13.981818] The buggy address belongs to the object at ffff888102afc800
[   13.981818]  which belongs to the cache kmalloc-128 of size 128
[   13.982269] The buggy address is located 0 bytes to the right of
[   13.982269]  allocated 115-byte region [ffff888102afc800, ffff888102afc873)
[   13.982885] 
[   13.982960] The buggy address belongs to the physical page:
[   13.983322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc
[   13.983914] flags: 0x200000000000000(node=0|zone=2)
[   13.984194] page_type: f5(slab)
[   13.984413] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.984886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.985199] page dumped because: kasan: bad access detected
[   13.985466] 
[   13.985655] Memory state around the buggy address:
[   13.985912]  ffff888102afc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.986248]  ffff888102afc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.986682] >ffff888102afc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.987136]                                                              ^
[   13.987443]  ffff888102afc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.987833]  ffff888102afc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.988109] ==================================================================
[   13.991550] ==================================================================
[   13.992105] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.992624] Read of size 1 at addr ffff8881029d2001 by task kunit_try_catch/240
[   13.992879] 
[   13.993217] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.993264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.993276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.993299] Call Trace:
[   13.993312]  <TASK>
[   13.993328]  dump_stack_lvl+0x73/0xb0
[   13.993435]  print_report+0xd1/0x610
[   13.993459]  ? __virt_addr_valid+0x1db/0x2d0
[   13.993483]  ? mempool_oob_right_helper+0x318/0x380
[   13.993532]  ? kasan_addr_to_slab+0x11/0xa0
[   13.993554]  ? mempool_oob_right_helper+0x318/0x380
[   13.993578]  kasan_report+0x141/0x180
[   13.993600]  ? mempool_oob_right_helper+0x318/0x380
[   13.993628]  __asan_report_load1_noabort+0x18/0x20
[   13.993654]  mempool_oob_right_helper+0x318/0x380
[   13.993680]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.993707]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.993731]  ? finish_task_switch.isra.0+0x153/0x700
[   13.993768]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   13.993795]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.993825]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.993850]  ? __pfx_mempool_kfree+0x10/0x10
[   13.993877]  ? __pfx_read_tsc+0x10/0x10
[   13.993899]  ? ktime_get_ts64+0x86/0x230
[   13.993924]  kunit_try_run_case+0x1a5/0x480
[   13.993949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.993973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.993998]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.994023]  ? __kthread_parkme+0x82/0x180
[   13.994045]  ? preempt_count_sub+0x50/0x80
[   13.994068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.994092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.994118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.994144]  kthread+0x337/0x6f0
[   13.994164]  ? trace_preempt_on+0x20/0xc0
[   13.994187]  ? __pfx_kthread+0x10/0x10
[   13.994208]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.994231]  ? calculate_sigpending+0x7b/0xa0
[   13.994257]  ? __pfx_kthread+0x10/0x10
[   13.994278]  ret_from_fork+0x116/0x1d0
[   13.994298]  ? __pfx_kthread+0x10/0x10
[   13.994319]  ret_from_fork_asm+0x1a/0x30
[   13.994359]  </TASK>
[   13.994369] 
[   14.003085] The buggy address belongs to the physical page:
[   14.003325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d0
[   14.003966] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.004283] flags: 0x200000000000040(head|node=0|zone=2)
[   14.004726] page_type: f8(unknown)
[   14.004929] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.005163] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.005516] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.006347] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.006592] head: 0200000000000002 ffffea00040a7401 00000000ffffffff 00000000ffffffff
[   14.007011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.007462] page dumped because: kasan: bad access detected
[   14.007724] 
[   14.007817] Memory state around the buggy address:
[   14.008038]  ffff8881029d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.008325]  ffff8881029d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.008776] >ffff8881029d2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.009031]                    ^
[   14.009149]  ffff8881029d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.009691]  ffff8881029d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.010008] ==================================================================
[   14.014311] ==================================================================
[   14.015038] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.015369] Read of size 1 at addr ffff8881038e02bb by task kunit_try_catch/242
[   14.015745] 
[   14.015948] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.015997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.016009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.016029] Call Trace:
[   14.016042]  <TASK>
[   14.016059]  dump_stack_lvl+0x73/0xb0
[   14.016089]  print_report+0xd1/0x610
[   14.016111]  ? __virt_addr_valid+0x1db/0x2d0
[   14.016135]  ? mempool_oob_right_helper+0x318/0x380
[   14.016159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.016183]  ? mempool_oob_right_helper+0x318/0x380
[   14.016208]  kasan_report+0x141/0x180
[   14.016230]  ? mempool_oob_right_helper+0x318/0x380
[   14.016259]  __asan_report_load1_noabort+0x18/0x20
[   14.016284]  mempool_oob_right_helper+0x318/0x380
[   14.016310]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.016382]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.016407]  ? finish_task_switch.isra.0+0x153/0x700
[   14.016434]  mempool_slab_oob_right+0xed/0x140
[   14.016467]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.016495]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.016521]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.016547]  ? __pfx_read_tsc+0x10/0x10
[   14.016568]  ? ktime_get_ts64+0x86/0x230
[   14.016592]  kunit_try_run_case+0x1a5/0x480
[   14.016618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.016641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.016666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.016691]  ? __kthread_parkme+0x82/0x180
[   14.016712]  ? preempt_count_sub+0x50/0x80
[   14.016735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.016773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.016798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.016825]  kthread+0x337/0x6f0
[   14.016844]  ? trace_preempt_on+0x20/0xc0
[   14.016867]  ? __pfx_kthread+0x10/0x10
[   14.016888]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.016911]  ? calculate_sigpending+0x7b/0xa0
[   14.016935]  ? __pfx_kthread+0x10/0x10
[   14.016956]  ret_from_fork+0x116/0x1d0
[   14.016975]  ? __pfx_kthread+0x10/0x10
[   14.016996]  ret_from_fork_asm+0x1a/0x30
[   14.017026]  </TASK>
[   14.017037] 
[   14.025720] Allocated by task 242:
[   14.025926]  kasan_save_stack+0x45/0x70
[   14.026086]  kasan_save_track+0x18/0x40
[   14.026282]  kasan_save_alloc_info+0x3b/0x50
[   14.026542]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.026801]  remove_element+0x11e/0x190
[   14.027000]  mempool_alloc_preallocated+0x4d/0x90
[   14.027199]  mempool_oob_right_helper+0x8a/0x380
[   14.027455]  mempool_slab_oob_right+0xed/0x140
[   14.027614]  kunit_try_run_case+0x1a5/0x480
[   14.027775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.027958]  kthread+0x337/0x6f0
[   14.028126]  ret_from_fork+0x116/0x1d0
[   14.028337]  ret_from_fork_asm+0x1a/0x30
[   14.028700] 
[   14.028818] The buggy address belongs to the object at ffff8881038e0240
[   14.028818]  which belongs to the cache test_cache of size 123
[   14.029209] The buggy address is located 0 bytes to the right of
[   14.029209]  allocated 123-byte region [ffff8881038e0240, ffff8881038e02bb)
[   14.030169] 
[   14.030272] The buggy address belongs to the physical page:
[   14.030646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e0
[   14.030978] flags: 0x200000000000000(node=0|zone=2)
[   14.031184] page_type: f5(slab)
[   14.031342] raw: 0200000000000000 ffff8881038d9140 dead000000000122 0000000000000000
[   14.031895] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.032197] page dumped because: kasan: bad access detected
[   14.032577] 
[   14.032654] Memory state around the buggy address:
[   14.032832]  ffff8881038e0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.033073]  ffff8881038e0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.033394] >ffff8881038e0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.033829]                                         ^
[   14.034000]  ffff8881038e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.034222]  ffff8881038e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.034892] ==================================================================