Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.408507] ==================================================================
[   17.408590] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.408658] Read of size 1 at addr fff00000c786ab73 by task kunit_try_catch/222
[   17.408708] 
[   17.408749] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.408945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.408975] Hardware name: linux,dummy-virt (DT)
[   17.409021] Call trace:
[   17.409044]  show_stack+0x20/0x38 (C)
[   17.409095]  dump_stack_lvl+0x8c/0xd0
[   17.409143]  print_report+0x118/0x5d0
[   17.409188]  kasan_report+0xdc/0x128
[   17.409232]  __asan_report_load1_noabort+0x20/0x30
[   17.409282]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.409330]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.409375]  kunit_try_run_case+0x170/0x3f0
[   17.409424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.409475]  kthread+0x328/0x630
[   17.409516]  ret_from_fork+0x10/0x20
[   17.409562] 
[   17.409582] Allocated by task 222:
[   17.409610]  kasan_save_stack+0x3c/0x68
[   17.409649]  kasan_save_track+0x20/0x40
[   17.409689]  kasan_save_alloc_info+0x40/0x58
[   17.409730]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.409774]  remove_element+0x130/0x1f8
[   17.409814]  mempool_alloc_preallocated+0x58/0xc0
[   17.409855]  mempool_oob_right_helper+0x98/0x2f0
[   17.409897]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.409937]  kunit_try_run_case+0x170/0x3f0
[   17.409974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.410028]  kthread+0x328/0x630
[   17.410059]  ret_from_fork+0x10/0x20
[   17.410096] 
[   17.410116] The buggy address belongs to the object at fff00000c786ab00
[   17.410116]  which belongs to the cache kmalloc-128 of size 128
[   17.410177] The buggy address is located 0 bytes to the right of
[   17.410177]  allocated 115-byte region [fff00000c786ab00, fff00000c786ab73)
[   17.410242] 
[   17.410262] The buggy address belongs to the physical page:
[   17.410297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   17.410353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.410406] page_type: f5(slab)
[   17.410446] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.410497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.410538] page dumped because: kasan: bad access detected
[   17.410569] 
[   17.410587] Memory state around the buggy address:
[   17.410627]  fff00000c786aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.410672]  fff00000c786aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.410716] >fff00000c786ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.410756]                                                              ^
[   17.410796]  fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.410839]  fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.410880] ==================================================================
[   17.461259] ==================================================================
[   17.461344] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.461408] Read of size 1 at addr fff00000c65ee2bb by task kunit_try_catch/226
[   17.461461] 
[   17.461496] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.461581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.461609] Hardware name: linux,dummy-virt (DT)
[   17.461641] Call trace:
[   17.461663]  show_stack+0x20/0x38 (C)
[   17.461711]  dump_stack_lvl+0x8c/0xd0
[   17.461759]  print_report+0x118/0x5d0
[   17.461804]  kasan_report+0xdc/0x128
[   17.461851]  __asan_report_load1_noabort+0x20/0x30
[   17.461903]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.461951]  mempool_slab_oob_right+0xc0/0x118
[   17.462012]  kunit_try_run_case+0x170/0x3f0
[   17.462061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.462114]  kthread+0x328/0x630
[   17.462155]  ret_from_fork+0x10/0x20
[   17.462201] 
[   17.462221] Allocated by task 226:
[   17.462249]  kasan_save_stack+0x3c/0x68
[   17.462291]  kasan_save_track+0x20/0x40
[   17.462327]  kasan_save_alloc_info+0x40/0x58
[   17.462370]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.462414]  remove_element+0x16c/0x1f8
[   17.462449]  mempool_alloc_preallocated+0x58/0xc0
[   17.462487]  mempool_oob_right_helper+0x98/0x2f0
[   17.462526]  mempool_slab_oob_right+0xc0/0x118
[   17.462566]  kunit_try_run_case+0x170/0x3f0
[   17.462908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.462956]  kthread+0x328/0x630
[   17.463001]  ret_from_fork+0x10/0x20
[   17.463041] 
[   17.463061] The buggy address belongs to the object at fff00000c65ee240
[   17.463061]  which belongs to the cache test_cache of size 123
[   17.463120] The buggy address is located 0 bytes to the right of
[   17.463120]  allocated 123-byte region [fff00000c65ee240, fff00000c65ee2bb)
[   17.463187] 
[   17.463207] The buggy address belongs to the physical page:
[   17.463241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee
[   17.463297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.463347] page_type: f5(slab)
[   17.463387] raw: 0bfffe0000000000 fff00000c78a13c0 dead000000000122 0000000000000000
[   17.463445] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.463486] page dumped because: kasan: bad access detected
[   17.463517] 
[   17.463536] Memory state around the buggy address:
[   17.463569]  fff00000c65ee180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.463613]  fff00000c65ee200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   17.463656] >fff00000c65ee280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   17.463697]                                         ^
[   17.463728]  fff00000c65ee300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.463771]  fff00000c65ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.463810] ==================================================================
[   17.422605] ==================================================================
[   17.422664] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.422717] Read of size 1 at addr fff00000c7956001 by task kunit_try_catch/224
[   17.422769] 
[   17.422801] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.422885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.422913] Hardware name: linux,dummy-virt (DT)
[   17.422945] Call trace:
[   17.422997]  show_stack+0x20/0x38 (C)
[   17.423047]  dump_stack_lvl+0x8c/0xd0
[   17.423134]  print_report+0x118/0x5d0
[   17.423380]  kasan_report+0xdc/0x128
[   17.423518]  __asan_report_load1_noabort+0x20/0x30
[   17.423792]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.423910]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   17.424140]  kunit_try_run_case+0x170/0x3f0
[   17.424422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.424641]  kthread+0x328/0x630
[   17.424683]  ret_from_fork+0x10/0x20
[   17.424816] 
[   17.424836] The buggy address belongs to the physical page:
[   17.424870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107954
[   17.425060] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.425355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.425508] page_type: f8(unknown)
[   17.425575] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.425799] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.425935] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.426019] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.426079] head: 0bfffe0000000002 ffffc1ffc31e5501 00000000ffffffff 00000000ffffffff
[   17.426129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.426217] page dumped because: kasan: bad access detected
[   17.426388] 
[   17.426405] Memory state around the buggy address:
[   17.426466]  fff00000c7955f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.426535]  fff00000c7955f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.426577] >fff00000c7956000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.426616]                    ^
[   17.426682]  fff00000c7956080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.426799]  fff00000c7956100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.426900] ==================================================================

[   14.464503] ==================================================================
[   14.464978] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.465808] Read of size 1 at addr ffff888102a04b73 by task kunit_try_catch/238
[   14.466133] 
[   14.466277] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.466342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.466355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.466378] Call Trace:
[   14.466392]  <TASK>
[   14.466412]  dump_stack_lvl+0x73/0xb0
[   14.466446]  print_report+0xd1/0x610
[   14.466469]  ? __virt_addr_valid+0x1db/0x2d0
[   14.466495]  ? mempool_oob_right_helper+0x318/0x380
[   14.466519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.466543]  ? mempool_oob_right_helper+0x318/0x380
[   14.466579]  kasan_report+0x141/0x180
[   14.466601]  ? mempool_oob_right_helper+0x318/0x380
[   14.466630]  __asan_report_load1_noabort+0x18/0x20
[   14.466656]  mempool_oob_right_helper+0x318/0x380
[   14.466681]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.466707]  ? __kasan_check_write+0x18/0x20
[   14.466728]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.466752]  ? finish_task_switch.isra.0+0x153/0x700
[   14.466781]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.466805]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.466834]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.466860]  ? __pfx_mempool_kfree+0x10/0x10
[   14.466886]  ? __pfx_read_tsc+0x10/0x10
[   14.466909]  ? ktime_get_ts64+0x86/0x230
[   14.466934]  kunit_try_run_case+0x1a5/0x480
[   14.466962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.466986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.467013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.467040]  ? __kthread_parkme+0x82/0x180
[   14.467063]  ? preempt_count_sub+0x50/0x80
[   14.467086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.467163]  kthread+0x337/0x6f0
[   14.467182]  ? trace_preempt_on+0x20/0xc0
[   14.467206]  ? __pfx_kthread+0x10/0x10
[   14.467226]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.467404]  ? calculate_sigpending+0x7b/0xa0
[   14.467435]  ? __pfx_kthread+0x10/0x10
[   14.467457]  ret_from_fork+0x116/0x1d0
[   14.467477]  ? __pfx_kthread+0x10/0x10
[   14.467498]  ret_from_fork_asm+0x1a/0x30
[   14.467532]  </TASK>
[   14.467544] 
[   14.480258] Allocated by task 238:
[   14.480674]  kasan_save_stack+0x45/0x70
[   14.481080]  kasan_save_track+0x18/0x40
[   14.481257]  kasan_save_alloc_info+0x3b/0x50
[   14.481800]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.482075]  remove_element+0x11e/0x190
[   14.482457]  mempool_alloc_preallocated+0x4d/0x90
[   14.482900]  mempool_oob_right_helper+0x8a/0x380
[   14.483136]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.483547]  kunit_try_run_case+0x1a5/0x480
[   14.483722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.483903]  kthread+0x337/0x6f0
[   14.484093]  ret_from_fork+0x116/0x1d0
[   14.484282]  ret_from_fork_asm+0x1a/0x30
[   14.484422] 
[   14.484499] The buggy address belongs to the object at ffff888102a04b00
[   14.484499]  which belongs to the cache kmalloc-128 of size 128
[   14.485054] The buggy address is located 0 bytes to the right of
[   14.485054]  allocated 115-byte region [ffff888102a04b00, ffff888102a04b73)
[   14.485430] 
[   14.485502] The buggy address belongs to the physical page:
[   14.486011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04
[   14.486853] flags: 0x200000000000000(node=0|zone=2)
[   14.487683] page_type: f5(slab)
[   14.487964] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.488296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.488525] page dumped because: kasan: bad access detected
[   14.488721] 
[   14.488792] Memory state around the buggy address:
[   14.488952]  ffff888102a04a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.489290]  ffff888102a04a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.489585] >ffff888102a04b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.490200]                                                              ^
[   14.490457]  ffff888102a04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.491062]  ffff888102a04c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.491360] ==================================================================
[   14.497646] ==================================================================
[   14.498160] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.498816] Read of size 1 at addr ffff8881039f6001 by task kunit_try_catch/240
[   14.499214] 
[   14.499385] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.499445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.499457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.499512] Call Trace:
[   14.499525]  <TASK>
[   14.499543]  dump_stack_lvl+0x73/0xb0
[   14.499709]  print_report+0xd1/0x610
[   14.499785]  ? __virt_addr_valid+0x1db/0x2d0
[   14.499845]  ? mempool_oob_right_helper+0x318/0x380
[   14.499892]  ? kasan_addr_to_slab+0x11/0xa0
[   14.499914]  ? mempool_oob_right_helper+0x318/0x380
[   14.499939]  kasan_report+0x141/0x180
[   14.499962]  ? mempool_oob_right_helper+0x318/0x380
[   14.499991]  __asan_report_load1_noabort+0x18/0x20
[   14.500016]  mempool_oob_right_helper+0x318/0x380
[   14.500041]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.500073]  ? __kasan_check_write+0x18/0x20
[   14.500093]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.500116]  ? irqentry_exit+0x2a/0x60
[   14.500138]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.500165]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.500191]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.500221]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.500331]  ? __pfx_mempool_kfree+0x10/0x10
[   14.500361]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.500391]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.500433]  kunit_try_run_case+0x1a5/0x480
[   14.500460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.500484]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.500510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.500534]  ? __kthread_parkme+0x82/0x180
[   14.500569]  ? preempt_count_sub+0x50/0x80
[   14.500596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.500621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.500647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.500673]  kthread+0x337/0x6f0
[   14.500692]  ? trace_preempt_on+0x20/0xc0
[   14.500716]  ? __pfx_kthread+0x10/0x10
[   14.500738]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.500760]  ? calculate_sigpending+0x7b/0xa0
[   14.500785]  ? __pfx_kthread+0x10/0x10
[   14.500807]  ret_from_fork+0x116/0x1d0
[   14.500828]  ? __pfx_kthread+0x10/0x10
[   14.500849]  ret_from_fork_asm+0x1a/0x30
[   14.500881]  </TASK>
[   14.500893] 
[   14.510913] The buggy address belongs to the physical page:
[   14.511150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.511740] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.512163] flags: 0x200000000000040(head|node=0|zone=2)
[   14.512346] page_type: f8(unknown)
[   14.512475] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.512965] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.513312] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.513850] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.514311] head: 0200000000000002 ffffea00040e7d01 00000000ffffffff 00000000ffffffff
[   14.514698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.515039] page dumped because: kasan: bad access detected
[   14.515439] 
[   14.515541] Memory state around the buggy address:
[   14.515740]  ffff8881039f5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.516029]  ffff8881039f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.516479] >ffff8881039f6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.516713]                    ^
[   14.516881]  ffff8881039f6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.517196]  ffff8881039f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.517810] ==================================================================
[   14.521419] ==================================================================
[   14.522217] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.522478] Read of size 1 at addr ffff8881039b62bb by task kunit_try_catch/242
[   14.522714] 
[   14.522803] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.522846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.522858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.522878] Call Trace:
[   14.522890]  <TASK>
[   14.522905]  dump_stack_lvl+0x73/0xb0
[   14.522936]  print_report+0xd1/0x610
[   14.522958]  ? __virt_addr_valid+0x1db/0x2d0
[   14.522981]  ? mempool_oob_right_helper+0x318/0x380
[   14.523004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.523026]  ? mempool_oob_right_helper+0x318/0x380
[   14.523049]  kasan_report+0x141/0x180
[   14.523070]  ? mempool_oob_right_helper+0x318/0x380
[   14.523097]  __asan_report_load1_noabort+0x18/0x20
[   14.523121]  mempool_oob_right_helper+0x318/0x380
[   14.523145]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.523171]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.523192]  ? finish_task_switch.isra.0+0x153/0x700
[   14.523218]  mempool_slab_oob_right+0xed/0x140
[   14.523241]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.523267]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.523292]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.523317]  ? __pfx_read_tsc+0x10/0x10
[   14.523337]  ? ktime_get_ts64+0x86/0x230
[   14.523362]  kunit_try_run_case+0x1a5/0x480
[   14.523388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.523410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.523435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.523459]  ? __kthread_parkme+0x82/0x180
[   14.523479]  ? preempt_count_sub+0x50/0x80
[   14.523503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.523528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.523576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.523601]  kthread+0x337/0x6f0
[   14.523620]  ? trace_preempt_on+0x20/0xc0
[   14.523642]  ? __pfx_kthread+0x10/0x10
[   14.523662]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.523683]  ? calculate_sigpending+0x7b/0xa0
[   14.523707]  ? __pfx_kthread+0x10/0x10
[   14.523728]  ret_from_fork+0x116/0x1d0
[   14.523775]  ? __pfx_kthread+0x10/0x10
[   14.523796]  ret_from_fork_asm+0x1a/0x30
[   14.523827]  </TASK>
[   14.523838] 
[   14.540790] Allocated by task 242:
[   14.541152]  kasan_save_stack+0x45/0x70
[   14.541656]  kasan_save_track+0x18/0x40
[   14.542229]  kasan_save_alloc_info+0x3b/0x50
[   14.542776]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.543286]  remove_element+0x11e/0x190
[   14.543815]  mempool_alloc_preallocated+0x4d/0x90
[   14.544135]  mempool_oob_right_helper+0x8a/0x380
[   14.544514]  mempool_slab_oob_right+0xed/0x140
[   14.544963]  kunit_try_run_case+0x1a5/0x480
[   14.545412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.545832]  kthread+0x337/0x6f0
[   14.545953]  ret_from_fork+0x116/0x1d0
[   14.546083]  ret_from_fork_asm+0x1a/0x30
[   14.546218] 
[   14.546591] The buggy address belongs to the object at ffff8881039b6240
[   14.546591]  which belongs to the cache test_cache of size 123
[   14.547826] The buggy address is located 0 bytes to the right of
[   14.547826]  allocated 123-byte region [ffff8881039b6240, ffff8881039b62bb)
[   14.549100] 
[   14.549176] The buggy address belongs to the physical page:
[   14.549585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b6
[   14.550336] flags: 0x200000000000000(node=0|zone=2)
[   14.550757] page_type: f5(slab)
[   14.550883] raw: 0200000000000000 ffff8881039b4000 dead000000000122 0000000000000000
[   14.551114] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.551706] page dumped because: kasan: bad access detected
[   14.552228] 
[   14.552601] Memory state around the buggy address:
[   14.553057]  ffff8881039b6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.553835]  ffff8881039b6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.554573] >ffff8881039b6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.554897]                                         ^
[   14.555057]  ffff8881039b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555319]  ffff8881039b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556124] ==================================================================