Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.392945] ==================================================================
[   20.393025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.393119] Read of size 1 at addr fff00000c588b2bb by task kunit_try_catch/225
[   20.393171] 
[   20.393236] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.393363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.393400] Hardware name: linux,dummy-virt (DT)
[   20.393466] Call trace:
[   20.393491]  show_stack+0x20/0x38 (C)
[   20.393540]  dump_stack_lvl+0x8c/0xd0
[   20.393592]  print_report+0x118/0x608
[   20.393639]  kasan_report+0xdc/0x128
[   20.393695]  __asan_report_load1_noabort+0x20/0x30
[   20.393744]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.393794]  mempool_slab_oob_right+0xc0/0x118
[   20.393850]  kunit_try_run_case+0x170/0x3f0
[   20.393899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.393953]  kthread+0x328/0x630
[   20.393995]  ret_from_fork+0x10/0x20
[   20.394043] 
[   20.394061] Allocated by task 225:
[   20.394090]  kasan_save_stack+0x3c/0x68
[   20.394129]  kasan_save_track+0x20/0x40
[   20.394175]  kasan_save_alloc_info+0x40/0x58
[   20.394213]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.394264]  remove_element+0x16c/0x1f8
[   20.394302]  mempool_alloc_preallocated+0x58/0xc0
[   20.394341]  mempool_oob_right_helper+0x98/0x2f0
[   20.394384]  mempool_slab_oob_right+0xc0/0x118
[   20.394433]  kunit_try_run_case+0x170/0x3f0
[   20.394470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.394514]  kthread+0x328/0x630
[   20.394545]  ret_from_fork+0x10/0x20
[   20.394580] 
[   20.394600] The buggy address belongs to the object at fff00000c588b240
[   20.394600]  which belongs to the cache test_cache of size 123
[   20.394655] The buggy address is located 0 bytes to the right of
[   20.394655]  allocated 123-byte region [fff00000c588b240, fff00000c588b2bb)
[   20.394715] 
[   20.394737] The buggy address belongs to the physical page:
[   20.394767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10588b
[   20.394817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.394889] page_type: f5(slab)
[   20.394932] raw: 0bfffe0000000000 fff00000c65c9500 dead000000000122 0000000000000000
[   20.394980] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.395020] page dumped because: kasan: bad access detected
[   20.395051] 
[   20.395068] Memory state around the buggy address:
[   20.395102]  fff00000c588b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.395146]  fff00000c588b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.395188] >fff00000c588b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.395225]                                         ^
[   20.395257]  fff00000c588b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.395299]  fff00000c588b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.395374] ==================================================================
[   20.342369] ==================================================================
[   20.342475] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.342556] Read of size 1 at addr fff00000c657ca73 by task kunit_try_catch/221
[   20.342608] 
[   20.342653] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.342746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.342774] Hardware name: linux,dummy-virt (DT)
[   20.342809] Call trace:
[   20.342833]  show_stack+0x20/0x38 (C)
[   20.342888]  dump_stack_lvl+0x8c/0xd0
[   20.342940]  print_report+0x118/0x608
[   20.342988]  kasan_report+0xdc/0x128
[   20.343033]  __asan_report_load1_noabort+0x20/0x30
[   20.343080]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.343127]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.343176]  kunit_try_run_case+0x170/0x3f0
[   20.343227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.343280]  kthread+0x328/0x630
[   20.343324]  ret_from_fork+0x10/0x20
[   20.343392] 
[   20.343412] Allocated by task 221:
[   20.343454]  kasan_save_stack+0x3c/0x68
[   20.343498]  kasan_save_track+0x20/0x40
[   20.343535]  kasan_save_alloc_info+0x40/0x58
[   20.343572]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.343616]  remove_element+0x130/0x1f8
[   20.343653]  mempool_alloc_preallocated+0x58/0xc0
[   20.343692]  mempool_oob_right_helper+0x98/0x2f0
[   20.343730]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.343769]  kunit_try_run_case+0x170/0x3f0
[   20.343806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.343849]  kthread+0x328/0x630
[   20.343881]  ret_from_fork+0x10/0x20
[   20.343916] 
[   20.343936] The buggy address belongs to the object at fff00000c657ca00
[   20.343936]  which belongs to the cache kmalloc-128 of size 128
[   20.343994] The buggy address is located 0 bytes to the right of
[   20.343994]  allocated 115-byte region [fff00000c657ca00, fff00000c657ca73)
[   20.344057] 
[   20.344078] The buggy address belongs to the physical page:
[   20.344113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   20.344166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.344221] page_type: f5(slab)
[   20.344264] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.344316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.344357] page dumped because: kasan: bad access detected
[   20.344389] 
[   20.344408] Memory state around the buggy address:
[   20.344450]  fff00000c657c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.344493]  fff00000c657c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344536] >fff00000c657ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.344576]                                                              ^
[   20.344615]  fff00000c657ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344656]  fff00000c657cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.344695] ==================================================================
[   20.373838] ==================================================================
[   20.373922] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.373999] Read of size 1 at addr fff00000c795e001 by task kunit_try_catch/223
[   20.374049] 
[   20.374089] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   20.374178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.374206] Hardware name: linux,dummy-virt (DT)
[   20.374239] Call trace:
[   20.374264]  show_stack+0x20/0x38 (C)
[   20.374314]  dump_stack_lvl+0x8c/0xd0
[   20.374366]  print_report+0x118/0x608
[   20.374413]  kasan_report+0xdc/0x128
[   20.374476]  __asan_report_load1_noabort+0x20/0x30
[   20.374524]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.374572]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.374622]  kunit_try_run_case+0x170/0x3f0
[   20.374674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.374726]  kthread+0x328/0x630
[   20.374772]  ret_from_fork+0x10/0x20
[   20.374819] 
[   20.374842] The buggy address belongs to the physical page:
[   20.374877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.374931] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.374977] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.375036] page_type: f8(unknown)
[   20.375081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.375130] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.375180] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.375228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.375276] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff
[   20.375325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.375408] page dumped because: kasan: bad access detected
[   20.375447] 
[   20.375487] Memory state around the buggy address:
[   20.375521]  fff00000c795df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.375564]  fff00000c795df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.375607] >fff00000c795e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.375646]                    ^
[   20.375673]  fff00000c795e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.375715]  fff00000c795e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.375753] ==================================================================


[   16.228328] ==================================================================
[   16.229002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   16.229669] Read of size 1 at addr ffff888103962001 by task kunit_try_catch/240
[   16.230351] 
[   16.230545] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.230651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.230683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.230730] Call Trace:
[   16.230760]  <TASK>
[   16.230798]  dump_stack_lvl+0x73/0xb0
[   16.230864]  print_report+0xd1/0x650
[   16.230913]  ? __virt_addr_valid+0x1db/0x2d0
[   16.230956]  ? mempool_oob_right_helper+0x318/0x380
[   16.230986]  ? kasan_addr_to_slab+0x11/0xa0
[   16.231017]  ? mempool_oob_right_helper+0x318/0x380
[   16.231044]  kasan_report+0x141/0x180
[   16.231071]  ? mempool_oob_right_helper+0x318/0x380
[   16.231116]  __asan_report_load1_noabort+0x18/0x20
[   16.231148]  mempool_oob_right_helper+0x318/0x380
[   16.231175]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   16.231212]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.231598]  ? finish_task_switch.isra.0+0x153/0x700
[   16.231716]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   16.231811]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   16.231900]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.231953]  ? __pfx_mempool_kfree+0x10/0x10
[   16.232007]  ? __pfx_read_tsc+0x10/0x10
[   16.232055]  ? ktime_get_ts64+0x86/0x230
[   16.232105]  kunit_try_run_case+0x1a5/0x480
[   16.232132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.232154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.232182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.232232]  ? __kthread_parkme+0x82/0x180
[   16.232266]  ? preempt_count_sub+0x50/0x80
[   16.232291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.232315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.232341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.232368]  kthread+0x337/0x6f0
[   16.232389]  ? trace_preempt_on+0x20/0xc0
[   16.232415]  ? __pfx_kthread+0x10/0x10
[   16.232438]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.232479]  ? calculate_sigpending+0x7b/0xa0
[   16.232509]  ? __pfx_kthread+0x10/0x10
[   16.232532]  ret_from_fork+0x116/0x1d0
[   16.232553]  ? __pfx_kthread+0x10/0x10
[   16.232575]  ret_from_fork_asm+0x1a/0x30
[   16.232607]  </TASK>
[   16.232621] 
[   16.247112] The buggy address belongs to the physical page:
[   16.248346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103960
[   16.248859] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.249176] flags: 0x200000000000040(head|node=0|zone=2)
[   16.249531] page_type: f8(unknown)
[   16.249759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.250196] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.251100] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.251373] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.252210] head: 0200000000000002 ffffea00040e5801 00000000ffffffff 00000000ffffffff
[   16.252659] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.253017] page dumped because: kasan: bad access detected
[   16.253725] 
[   16.253843] Memory state around the buggy address:
[   16.254062]  ffff888103961f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.254847]  ffff888103961f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.255191] >ffff888103962000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.256012]                    ^
[   16.256300]  ffff888103962080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.256839]  ffff888103962100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.257366] ==================================================================
[   16.183500] ==================================================================
[   16.184178] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   16.184778] Read of size 1 at addr ffff888103341073 by task kunit_try_catch/238
[   16.185522] 
[   16.186072] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.186194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.186697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.186764] Call Trace:
[   16.186797]  <TASK>
[   16.186839]  dump_stack_lvl+0x73/0xb0
[   16.186915]  print_report+0xd1/0x650
[   16.186964]  ? __virt_addr_valid+0x1db/0x2d0
[   16.187014]  ? mempool_oob_right_helper+0x318/0x380
[   16.187060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.187110]  ? mempool_oob_right_helper+0x318/0x380
[   16.187161]  kasan_report+0x141/0x180
[   16.187202]  ? mempool_oob_right_helper+0x318/0x380
[   16.187292]  __asan_report_load1_noabort+0x18/0x20
[   16.187382]  mempool_oob_right_helper+0x318/0x380
[   16.187426]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   16.187482]  ? update_load_avg+0x1be/0x21b0
[   16.187516]  ? dequeue_entities+0x27e/0x1740
[   16.187547]  ? finish_task_switch.isra.0+0x153/0x700
[   16.187575]  mempool_kmalloc_oob_right+0xf2/0x150
[   16.187601]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   16.187628]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.187651]  ? __pfx_mempool_kfree+0x10/0x10
[   16.187675]  ? __pfx_read_tsc+0x10/0x10
[   16.187750]  ? ktime_get_ts64+0x86/0x230
[   16.187801]  kunit_try_run_case+0x1a5/0x480
[   16.187836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.187858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.187884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.187910]  ? __kthread_parkme+0x82/0x180
[   16.187933]  ? preempt_count_sub+0x50/0x80
[   16.187957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.187979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.188004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.188029]  kthread+0x337/0x6f0
[   16.188050]  ? trace_preempt_on+0x20/0xc0
[   16.188075]  ? __pfx_kthread+0x10/0x10
[   16.188097]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.188119]  ? calculate_sigpending+0x7b/0xa0
[   16.188144]  ? __pfx_kthread+0x10/0x10
[   16.188169]  ret_from_fork+0x116/0x1d0
[   16.188190]  ? __pfx_kthread+0x10/0x10
[   16.188243]  ret_from_fork_asm+0x1a/0x30
[   16.188279]  </TASK>
[   16.188293] 
[   16.202417] Allocated by task 238:
[   16.202908]  kasan_save_stack+0x45/0x70
[   16.203384]  kasan_save_track+0x18/0x40
[   16.203789]  kasan_save_alloc_info+0x3b/0x50
[   16.204247]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.204589]  remove_element+0x11e/0x190
[   16.204798]  mempool_alloc_preallocated+0x4d/0x90
[   16.205010]  mempool_oob_right_helper+0x8a/0x380
[   16.205265]  mempool_kmalloc_oob_right+0xf2/0x150
[   16.205670]  kunit_try_run_case+0x1a5/0x480
[   16.206066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.206671]  kthread+0x337/0x6f0
[   16.207104]  ret_from_fork+0x116/0x1d0
[   16.207516]  ret_from_fork_asm+0x1a/0x30
[   16.207875] 
[   16.208004] The buggy address belongs to the object at ffff888103341000
[   16.208004]  which belongs to the cache kmalloc-128 of size 128
[   16.209641] The buggy address is located 0 bytes to the right of
[   16.209641]  allocated 115-byte region [ffff888103341000, ffff888103341073)
[   16.210407] 
[   16.210672] The buggy address belongs to the physical page:
[   16.211312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103341
[   16.212727] flags: 0x200000000000000(node=0|zone=2)
[   16.213419] page_type: f5(slab)
[   16.213945] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.214291] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.214872] page dumped because: kasan: bad access detected
[   16.215426] 
[   16.215625] Memory state around the buggy address:
[   16.216623]  ffff888103340f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.217615]  ffff888103340f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.218152] >ffff888103341000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.218737]                                                              ^
[   16.219338]  ffff888103341080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.220330]  ffff888103341100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.221351] ==================================================================
[   16.264999] ==================================================================
[   16.265701] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   16.266681] Read of size 1 at addr ffff8881033452bb by task kunit_try_catch/242
[   16.267164] 
[   16.267796] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   16.267913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.267942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.267980] Call Trace:
[   16.267999]  <TASK>
[   16.268028]  dump_stack_lvl+0x73/0xb0
[   16.268089]  print_report+0xd1/0x650
[   16.268117]  ? __virt_addr_valid+0x1db/0x2d0
[   16.268143]  ? mempool_oob_right_helper+0x318/0x380
[   16.268168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.268195]  ? mempool_oob_right_helper+0x318/0x380
[   16.268415]  kasan_report+0x141/0x180
[   16.268443]  ? mempool_oob_right_helper+0x318/0x380
[   16.268498]  __asan_report_load1_noabort+0x18/0x20
[   16.268522]  mempool_oob_right_helper+0x318/0x380
[   16.268547]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   16.268575]  ? __pfx_sched_clock_cpu+0x10/0x10
[   16.268601]  ? finish_task_switch.isra.0+0x153/0x700
[   16.268629]  mempool_slab_oob_right+0xed/0x140
[   16.268652]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   16.268679]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   16.268702]  ? __pfx_mempool_free_slab+0x10/0x10
[   16.268726]  ? __pfx_read_tsc+0x10/0x10
[   16.268750]  ? ktime_get_ts64+0x86/0x230
[   16.268776]  kunit_try_run_case+0x1a5/0x480
[   16.268800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.268821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.268848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.268873]  ? __kthread_parkme+0x82/0x180
[   16.268896]  ? preempt_count_sub+0x50/0x80
[   16.268920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.268943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.268970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.268996]  kthread+0x337/0x6f0
[   16.269016]  ? trace_preempt_on+0x20/0xc0
[   16.269042]  ? __pfx_kthread+0x10/0x10
[   16.269065]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.269089]  ? calculate_sigpending+0x7b/0xa0
[   16.269115]  ? __pfx_kthread+0x10/0x10
[   16.269138]  ret_from_fork+0x116/0x1d0
[   16.269158]  ? __pfx_kthread+0x10/0x10
[   16.269181]  ret_from_fork_asm+0x1a/0x30
[   16.269246]  </TASK>
[   16.269263] 
[   16.280444] Allocated by task 242:
[   16.280715]  kasan_save_stack+0x45/0x70
[   16.280967]  kasan_save_track+0x18/0x40
[   16.281316]  kasan_save_alloc_info+0x3b/0x50
[   16.281662]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   16.282021]  remove_element+0x11e/0x190
[   16.282281]  mempool_alloc_preallocated+0x4d/0x90
[   16.282536]  mempool_oob_right_helper+0x8a/0x380
[   16.282899]  mempool_slab_oob_right+0xed/0x140
[   16.283277]  kunit_try_run_case+0x1a5/0x480
[   16.283593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.283848]  kthread+0x337/0x6f0
[   16.284077]  ret_from_fork+0x116/0x1d0
[   16.284292]  ret_from_fork_asm+0x1a/0x30
[   16.284512] 
[   16.284701] The buggy address belongs to the object at ffff888103345240
[   16.284701]  which belongs to the cache test_cache of size 123
[   16.285600] The buggy address is located 0 bytes to the right of
[   16.285600]  allocated 123-byte region [ffff888103345240, ffff8881033452bb)
[   16.286326] 
[   16.286452] The buggy address belongs to the physical page:
[   16.286679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103345
[   16.286974] flags: 0x200000000000000(node=0|zone=2)
[   16.287330] page_type: f5(slab)
[   16.287658] raw: 0200000000000000 ffff888103342000 dead000000000122 0000000000000000
[   16.288259] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   16.288810] page dumped because: kasan: bad access detected
[   16.289186] 
[   16.289355] Memory state around the buggy address:
[   16.289622]  ffff888103345180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.289889]  ffff888103345200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   16.291715] >ffff888103345280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   16.292297]                                         ^
[   16.292624]  ffff888103345300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.293005]  ffff888103345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.294632] ==================================================================