Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.803203] ==================================================================
[   18.803274] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.803335] Read of size 1 at addr fff00000c78d32bb by task kunit_try_catch/225
[   18.803385] 
[   18.803417] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.803499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.803525] Hardware name: linux,dummy-virt (DT)
[   18.803555] Call trace:
[   18.803579]  show_stack+0x20/0x38 (C)
[   18.803625]  dump_stack_lvl+0x8c/0xd0
[   18.803672]  print_report+0x118/0x608
[   18.803715]  kasan_report+0xdc/0x128
[   18.803757]  __asan_report_load1_noabort+0x20/0x30
[   18.803805]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.803851]  mempool_slab_oob_right+0xc0/0x118
[   18.803896]  kunit_try_run_case+0x170/0x3f0
[   18.803940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.803988]  kthread+0x328/0x630
[   18.804030]  ret_from_fork+0x10/0x20
[   18.804107] 
[   18.804781] Allocated by task 225:
[   18.804902]  kasan_save_stack+0x3c/0x68
[   18.804952]  kasan_save_track+0x20/0x40
[   18.804994]  kasan_save_alloc_info+0x40/0x58
[   18.805084]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.805128]  remove_element+0x16c/0x1f8
[   18.805199]  mempool_alloc_preallocated+0x58/0xc0
[   18.805302]  mempool_oob_right_helper+0x98/0x2f0
[   18.805346]  mempool_slab_oob_right+0xc0/0x118
[   18.805383]  kunit_try_run_case+0x170/0x3f0
[   18.805418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.805458]  kthread+0x328/0x630
[   18.805491]  ret_from_fork+0x10/0x20
[   18.805532] 
[   18.805563] The buggy address belongs to the object at fff00000c78d3240
[   18.805563]  which belongs to the cache test_cache of size 123
[   18.805657] The buggy address is located 0 bytes to the right of
[   18.805657]  allocated 123-byte region [fff00000c78d3240, fff00000c78d32bb)
[   18.805722] 
[   18.805744] The buggy address belongs to the physical page:
[   18.805774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   18.805823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.805870] page_type: f5(slab)
[   18.805917] raw: 0bfffe0000000000 fff00000c5d1e280 dead000000000122 0000000000000000
[   18.805965] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.806399] page dumped because: kasan: bad access detected
[   18.806437] 
[   18.806535] Memory state around the buggy address:
[   18.806575]  fff00000c78d3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.806643]  fff00000c78d3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.806684] >fff00000c78d3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.806784]                                         ^
[   18.806826]  fff00000c78d3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806903]  fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806940] ==================================================================
[   18.788949] ==================================================================
[   18.789381] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.789472] Read of size 1 at addr fff00000c79e6001 by task kunit_try_catch/223
[   18.789523] 
[   18.789634] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.789730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.789758] Hardware name: linux,dummy-virt (DT)
[   18.789802] Call trace:
[   18.789834]  show_stack+0x20/0x38 (C)
[   18.789993]  dump_stack_lvl+0x8c/0xd0
[   18.790159]  print_report+0x118/0x608
[   18.790222]  kasan_report+0xdc/0x128
[   18.790279]  __asan_report_load1_noabort+0x20/0x30
[   18.790329]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.790375]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.790623]  kunit_try_run_case+0x170/0x3f0
[   18.790823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.790958]  kthread+0x328/0x630
[   18.791164]  ret_from_fork+0x10/0x20
[   18.791268] 
[   18.791307] The buggy address belongs to the physical page:
[   18.791343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   18.791398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.791442] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.791497] page_type: f8(unknown)
[   18.791540] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.791588] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.791634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.791681] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.791728] head: 0bfffe0000000002 ffffc1ffc31e7901 00000000ffffffff 00000000ffffffff
[   18.791773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.791955] page dumped because: kasan: bad access detected
[   18.791989] 
[   18.792010] Memory state around the buggy address:
[   18.792050]  fff00000c79e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.793439]  fff00000c79e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.793686] >fff00000c79e6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.793849]                    ^
[   18.794007]  fff00000c79e6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.794096]  fff00000c79e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.794134] ==================================================================
[   18.764536] ==================================================================
[   18.764631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.764729] Read of size 1 at addr fff00000c6370b73 by task kunit_try_catch/221
[   18.764781] 
[   18.764826] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.764917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.764946] Hardware name: linux,dummy-virt (DT)
[   18.764981] Call trace:
[   18.765006]  show_stack+0x20/0x38 (C)
[   18.765078]  dump_stack_lvl+0x8c/0xd0
[   18.765135]  print_report+0x118/0x608
[   18.765182]  kasan_report+0xdc/0x128
[   18.765225]  __asan_report_load1_noabort+0x20/0x30
[   18.765275]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.765319]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.765364]  kunit_try_run_case+0x170/0x3f0
[   18.765410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.765460]  kthread+0x328/0x630
[   18.765506]  ret_from_fork+0x10/0x20
[   18.765556] 
[   18.765575] Allocated by task 221:
[   18.765603]  kasan_save_stack+0x3c/0x68
[   18.765646]  kasan_save_track+0x20/0x40
[   18.765681]  kasan_save_alloc_info+0x40/0x58
[   18.765720]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.765759]  remove_element+0x130/0x1f8
[   18.765799]  mempool_alloc_preallocated+0x58/0xc0
[   18.765837]  mempool_oob_right_helper+0x98/0x2f0
[   18.765873]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.765929]  kunit_try_run_case+0x170/0x3f0
[   18.765968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.766006]  kthread+0x328/0x630
[   18.766050]  ret_from_fork+0x10/0x20
[   18.766088] 
[   18.766125] The buggy address belongs to the object at fff00000c6370b00
[   18.766125]  which belongs to the cache kmalloc-128 of size 128
[   18.766183] The buggy address is located 0 bytes to the right of
[   18.766183]  allocated 115-byte region [fff00000c6370b00, fff00000c6370b73)
[   18.766242] 
[   18.766267] The buggy address belongs to the physical page:
[   18.766301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370
[   18.766356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.766409] page_type: f5(slab)
[   18.766452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.766501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.766540] page dumped because: kasan: bad access detected
[   18.766581] 
[   18.766600] Memory state around the buggy address:
[   18.766634]  fff00000c6370a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.766676]  fff00000c6370a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.766716] >fff00000c6370b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.766752]                                                              ^
[   18.766790]  fff00000c6370b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.766830]  fff00000c6370c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.766866] ==================================================================

[   18.306218] ==================================================================
[   18.306683] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   18.307407] Read of size 1 at addr ffff888102b42c73 by task kunit_try_catch/238
[   18.307834] 
[   18.307941] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.308004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.308018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.308046] Call Trace:
[   18.308063]  <TASK>
[   18.308088]  dump_stack_lvl+0x73/0xb0
[   18.308128]  print_report+0xd1/0x650
[   18.308155]  ? __virt_addr_valid+0x1db/0x2d0
[   18.308181]  ? mempool_oob_right_helper+0x318/0x380
[   18.308206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.308230]  ? mempool_oob_right_helper+0x318/0x380
[   18.308255]  kasan_report+0x141/0x180
[   18.308295]  ? mempool_oob_right_helper+0x318/0x380
[   18.308324]  __asan_report_load1_noabort+0x18/0x20
[   18.308346]  mempool_oob_right_helper+0x318/0x380
[   18.308372]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   18.308396]  ? update_load_avg+0x1be/0x21b0
[   18.308422]  ? dequeue_entities+0x27e/0x1740
[   18.308449]  ? finish_task_switch.isra.0+0x153/0x700
[   18.308475]  mempool_kmalloc_oob_right+0xf2/0x150
[   18.308524]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   18.308553]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.308575]  ? __pfx_mempool_kfree+0x10/0x10
[   18.308597]  ? __pfx_read_tsc+0x10/0x10
[   18.308620]  ? ktime_get_ts64+0x86/0x230
[   18.308646]  kunit_try_run_case+0x1a5/0x480
[   18.308673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.308696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.308721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.308744]  ? __kthread_parkme+0x82/0x180
[   18.308766]  ? preempt_count_sub+0x50/0x80
[   18.308789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.308813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.308859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.308883]  kthread+0x337/0x6f0
[   18.308904]  ? trace_preempt_on+0x20/0xc0
[   18.308931]  ? __pfx_kthread+0x10/0x10
[   18.308952]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.308972]  ? calculate_sigpending+0x7b/0xa0
[   18.308999]  ? __pfx_kthread+0x10/0x10
[   18.309021]  ret_from_fork+0x116/0x1d0
[   18.309041]  ? __pfx_kthread+0x10/0x10
[   18.309064]  ret_from_fork_asm+0x1a/0x30
[   18.309154]  </TASK>
[   18.309169] 
[   18.318110] Allocated by task 238:
[   18.318505]  kasan_save_stack+0x45/0x70
[   18.318707]  kasan_save_track+0x18/0x40
[   18.318947]  kasan_save_alloc_info+0x3b/0x50
[   18.319168]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   18.319370]  remove_element+0x11e/0x190
[   18.319724]  mempool_alloc_preallocated+0x4d/0x90
[   18.319896]  mempool_oob_right_helper+0x8a/0x380
[   18.320023]  mempool_kmalloc_oob_right+0xf2/0x150
[   18.320388]  kunit_try_run_case+0x1a5/0x480
[   18.320747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.321084]  kthread+0x337/0x6f0
[   18.321367]  ret_from_fork+0x116/0x1d0
[   18.321592]  ret_from_fork_asm+0x1a/0x30
[   18.321787] 
[   18.321950] The buggy address belongs to the object at ffff888102b42c00
[   18.321950]  which belongs to the cache kmalloc-128 of size 128
[   18.322723] The buggy address is located 0 bytes to the right of
[   18.322723]  allocated 115-byte region [ffff888102b42c00, ffff888102b42c73)
[   18.323294] 
[   18.323380] The buggy address belongs to the physical page:
[   18.323723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b42
[   18.324193] flags: 0x200000000000000(node=0|zone=2)
[   18.324471] page_type: f5(slab)
[   18.324670] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.325026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.325536] page dumped because: kasan: bad access detected
[   18.325680] 
[   18.325832] Memory state around the buggy address:
[   18.326226]  ffff888102b42b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.326468]  ffff888102b42b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.326837] >ffff888102b42c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.327494]                                                              ^
[   18.327828]  ffff888102b42c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.328073]  ffff888102b42d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.328535] ==================================================================
[   18.334876] ==================================================================
[   18.335410] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   18.335615] Read of size 1 at addr ffff888102cd6001 by task kunit_try_catch/240
[   18.336493] 
[   18.336703] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.336776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.336790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.336819] Call Trace:
[   18.336836]  <TASK>
[   18.336860]  dump_stack_lvl+0x73/0xb0
[   18.336912]  print_report+0xd1/0x650
[   18.336943]  ? __virt_addr_valid+0x1db/0x2d0
[   18.337066]  ? mempool_oob_right_helper+0x318/0x380
[   18.337105]  ? kasan_addr_to_slab+0x11/0xa0
[   18.337130]  ? mempool_oob_right_helper+0x318/0x380
[   18.337157]  kasan_report+0x141/0x180
[   18.337185]  ? mempool_oob_right_helper+0x318/0x380
[   18.337268]  __asan_report_load1_noabort+0x18/0x20
[   18.337297]  mempool_oob_right_helper+0x318/0x380
[   18.337325]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   18.337354]  ? __pfx_sched_clock_cpu+0x10/0x10
[   18.337381]  ? finish_task_switch.isra.0+0x153/0x700
[   18.337410]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   18.337437]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   18.337468]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.337492]  ? __pfx_mempool_kfree+0x10/0x10
[   18.337515]  ? __pfx_read_tsc+0x10/0x10
[   18.337539]  ? ktime_get_ts64+0x86/0x230
[   18.337566]  kunit_try_run_case+0x1a5/0x480
[   18.337595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.337619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.337650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.337679]  ? __kthread_parkme+0x82/0x180
[   18.337734]  ? preempt_count_sub+0x50/0x80
[   18.337759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.337786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.337815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.337840]  kthread+0x337/0x6f0
[   18.337863]  ? trace_preempt_on+0x20/0xc0
[   18.337890]  ? __pfx_kthread+0x10/0x10
[   18.337914]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.337939]  ? calculate_sigpending+0x7b/0xa0
[   18.337968]  ? __pfx_kthread+0x10/0x10
[   18.337991]  ret_from_fork+0x116/0x1d0
[   18.338013]  ? __pfx_kthread+0x10/0x10
[   18.338036]  ret_from_fork_asm+0x1a/0x30
[   18.338339]  </TASK>
[   18.338369] 
[   18.348529] The buggy address belongs to the physical page:
[   18.348843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cd4
[   18.349305] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.349748] flags: 0x200000000000040(head|node=0|zone=2)
[   18.349976] page_type: f8(unknown)
[   18.350202] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.350902] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.351358] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.351682] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.352153] head: 0200000000000002 ffffea00040b3501 00000000ffffffff 00000000ffffffff
[   18.352342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.352776] page dumped because: kasan: bad access detected
[   18.352986] 
[   18.353175] Memory state around the buggy address:
[   18.353368]  ffff888102cd5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.353732]  ffff888102cd5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.353948] >ffff888102cd6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.354600]                    ^
[   18.354827]  ffff888102cd6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.355302]  ffff888102cd6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.355509] ==================================================================
[   18.362193] ==================================================================
[   18.362736] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   18.362940] Read of size 1 at addr ffff8881023232bb by task kunit_try_catch/242
[   18.363509] 
[   18.363602] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.363666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.363681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.363710] Call Trace:
[   18.363725]  <TASK>
[   18.363748]  dump_stack_lvl+0x73/0xb0
[   18.363788]  print_report+0xd1/0x650
[   18.363817]  ? __virt_addr_valid+0x1db/0x2d0
[   18.363846]  ? mempool_oob_right_helper+0x318/0x380
[   18.363871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.363894]  ? mempool_oob_right_helper+0x318/0x380
[   18.363919]  kasan_report+0x141/0x180
[   18.363943]  ? mempool_oob_right_helper+0x318/0x380
[   18.363995]  __asan_report_load1_noabort+0x18/0x20
[   18.364136]  mempool_oob_right_helper+0x318/0x380
[   18.364172]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   18.364203]  ? __pfx_sched_clock_cpu+0x10/0x10
[   18.364231]  ? finish_task_switch.isra.0+0x153/0x700
[   18.364270]  mempool_slab_oob_right+0xed/0x140
[   18.364301]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   18.364331]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   18.364354]  ? __pfx_mempool_free_slab+0x10/0x10
[   18.364378]  ? __pfx_read_tsc+0x10/0x10
[   18.364402]  ? ktime_get_ts64+0x86/0x230
[   18.364430]  kunit_try_run_case+0x1a5/0x480
[   18.364459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.364483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.364513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.364538]  ? __kthread_parkme+0x82/0x180
[   18.364562]  ? preempt_count_sub+0x50/0x80
[   18.364588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.364644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.364681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.364709]  kthread+0x337/0x6f0
[   18.364731]  ? trace_preempt_on+0x20/0xc0
[   18.364760]  ? __pfx_kthread+0x10/0x10
[   18.364783]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.364809]  ? calculate_sigpending+0x7b/0xa0
[   18.364837]  ? __pfx_kthread+0x10/0x10
[   18.364860]  ret_from_fork+0x116/0x1d0
[   18.364882]  ? __pfx_kthread+0x10/0x10
[   18.364996]  ret_from_fork_asm+0x1a/0x30
[   18.365040]  </TASK>
[   18.365057] 
[   18.371031] Allocated by task 242:
[   18.371327]  kasan_save_stack+0x45/0x70
[   18.371649]  kasan_save_track+0x18/0x40
[   18.371972]  kasan_save_alloc_info+0x3b/0x50
[   18.372305]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   18.372440]  remove_element+0x11e/0x190
[   18.372545]  mempool_alloc_preallocated+0x4d/0x90
[   18.372682]  mempool_oob_right_helper+0x8a/0x380
[   18.372806]  mempool_slab_oob_right+0xed/0x140
[   18.372922]  kunit_try_run_case+0x1a5/0x480
[   18.373197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.373541]  kthread+0x337/0x6f0
[   18.373797]  ret_from_fork+0x116/0x1d0
[   18.374079]  ret_from_fork_asm+0x1a/0x30
[   18.374374] 
[   18.374494] The buggy address belongs to the object at ffff888102323240
[   18.374494]  which belongs to the cache test_cache of size 123
[   18.374950] The buggy address is located 0 bytes to the right of
[   18.374950]  allocated 123-byte region [ffff888102323240, ffff8881023232bb)
[   18.375480] 
[   18.375625] The buggy address belongs to the physical page:
[   18.375777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102323
[   18.375948] flags: 0x200000000000000(node=0|zone=2)
[   18.376073] page_type: f5(slab)
[   18.376174] raw: 0200000000000000 ffff888102321000 dead000000000122 0000000000000000
[   18.376347] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.376499] page dumped because: kasan: bad access detected
[   18.376616] 
[   18.376700] Memory state around the buggy address:
[   18.376989]  ffff888102323180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.377432]  ffff888102323200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.377958] >ffff888102323280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.378285]                                         ^
[   18.378401]  ffff888102323300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378541]  ffff888102323380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378707] ==================================================================