Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.897102] ==================================================================
[   18.897183] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.897267] Read of size 1 at addr fff00000c748af73 by task kunit_try_catch/230
[   18.897319] 
[   18.897361] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   18.897454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.897482] Hardware name: linux,dummy-virt (DT)
[   18.897515] Call trace:
[   18.897540]  show_stack+0x20/0x38 (C)
[   18.897602]  dump_stack_lvl+0x8c/0xd0
[   18.897653]  print_report+0x118/0x608
[   18.897703]  kasan_report+0xdc/0x128
[   18.897748]  __asan_report_load1_noabort+0x20/0x30
[   18.897796]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.897846]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.897895]  kunit_try_run_case+0x170/0x3f0
[   18.897959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.898015]  kthread+0x328/0x630
[   18.898271]  ret_from_fork+0x10/0x20
[   18.898332] 
[   18.898351] Allocated by task 230:
[   18.898383]  kasan_save_stack+0x3c/0x68
[   18.898426]  kasan_save_track+0x20/0x40
[   18.898465]  kasan_save_alloc_info+0x40/0x58
[   18.898502]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.898547]  remove_element+0x130/0x1f8
[   18.898585]  mempool_alloc_preallocated+0x58/0xc0
[   18.898626]  mempool_oob_right_helper+0x98/0x2f0
[   18.898666]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.898707]  kunit_try_run_case+0x170/0x3f0
[   18.898745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.898789]  kthread+0x328/0x630
[   18.898822]  ret_from_fork+0x10/0x20
[   18.898859] 
[   18.898879] The buggy address belongs to the object at fff00000c748af00
[   18.898879]  which belongs to the cache kmalloc-128 of size 128
[   18.898956] The buggy address is located 0 bytes to the right of
[   18.898956]  allocated 115-byte region [fff00000c748af00, fff00000c748af73)
[   18.899023] 
[   18.899045] The buggy address belongs to the physical page:
[   18.899081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   18.899138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.899191] page_type: f5(slab)
[   18.899236] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.899289] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   18.899331] page dumped because: kasan: bad access detected
[   18.899365] 
[   18.899383] Memory state around the buggy address:
[   18.899419]  fff00000c748ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.899463]  fff00000c748ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.899510] >fff00000c748af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.899551]                                                              ^
[   18.899594]  fff00000c748af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.899637]  fff00000c748b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.899677] ==================================================================
[   18.916875] ==================================================================
[   18.922319] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.922405] Read of size 1 at addr fff00000c52242bb by task kunit_try_catch/234
[   18.922458] 
[   18.922496] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   18.923110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.923485] Hardware name: linux,dummy-virt (DT)
[   18.924006] Call trace:
[   18.924042]  show_stack+0x20/0x38 (C)
[   18.924099]  dump_stack_lvl+0x8c/0xd0
[   18.924151]  print_report+0x118/0x608
[   18.924200]  kasan_report+0xdc/0x128
[   18.924247]  __asan_report_load1_noabort+0x20/0x30
[   18.924296]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.924345]  mempool_slab_oob_right+0xc0/0x118
[   18.924393]  kunit_try_run_case+0x170/0x3f0
[   18.925808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.926157]  kthread+0x328/0x630
[   18.926250]  ret_from_fork+0x10/0x20
[   18.926823] 
[   18.926913] Allocated by task 234:
[   18.927133]  kasan_save_stack+0x3c/0x68
[   18.927348]  kasan_save_track+0x20/0x40
[   18.927392]  kasan_save_alloc_info+0x40/0x58
[   18.927431]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.928364]  remove_element+0x16c/0x1f8
[   18.928692]  mempool_alloc_preallocated+0x58/0xc0
[   18.928748]  mempool_oob_right_helper+0x98/0x2f0
[   18.929017]  mempool_slab_oob_right+0xc0/0x118
[   18.929395]  kunit_try_run_case+0x170/0x3f0
[   18.929939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.929998]  kthread+0x328/0x630
[   18.930250]  ret_from_fork+0x10/0x20
[   18.930752] 
[   18.930782] The buggy address belongs to the object at fff00000c5224240
[   18.930782]  which belongs to the cache test_cache of size 123
[   18.930978] The buggy address is located 0 bytes to the right of
[   18.930978]  allocated 123-byte region [fff00000c5224240, fff00000c52242bb)
[   18.931151] 
[   18.931190] The buggy address belongs to the physical page:
[   18.931223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105224
[   18.931283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.932047] page_type: f5(slab)
[   18.932106] raw: 0bfffe0000000000 fff00000c115da00 dead000000000122 0000000000000000
[   18.932597] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.932840] page dumped because: kasan: bad access detected
[   18.933211] 
[   18.933398] Memory state around the buggy address:
[   18.933518]  fff00000c5224180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.933847]  fff00000c5224200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.933907] >fff00000c5224280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.933956]                                         ^
[   18.933993]  fff00000c5224300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934035]  fff00000c5224380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934075] ==================================================================
[   18.905371] ==================================================================
[   18.905430] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.905488] Read of size 1 at addr fff00000c5252001 by task kunit_try_catch/232
[   18.905538] 
[   18.905578] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   18.905669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.905697] Hardware name: linux,dummy-virt (DT)
[   18.905746] Call trace:
[   18.905771]  show_stack+0x20/0x38 (C)
[   18.905823]  dump_stack_lvl+0x8c/0xd0
[   18.905922]  print_report+0x118/0x608
[   18.905990]  kasan_report+0xdc/0x128
[   18.906034]  __asan_report_load1_noabort+0x20/0x30
[   18.906096]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.906215]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.906342]  kunit_try_run_case+0x170/0x3f0
[   18.906392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.906444]  kthread+0x328/0x630
[   18.906498]  ret_from_fork+0x10/0x20
[   18.906658] 
[   18.906723] The buggy address belongs to the physical page:
[   18.906794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105250
[   18.906852] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.906899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.907002] page_type: f8(unknown)
[   18.907058] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.907109] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.907176] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.907225] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.907275] head: 0bfffe0000000002 ffffc1ffc3149401 00000000ffffffff 00000000ffffffff
[   18.907324] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.907364] page dumped because: kasan: bad access detected
[   18.907396] 
[   18.907414] Memory state around the buggy address:
[   18.907445]  fff00000c5251f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.907488]  fff00000c5251f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.907532] >fff00000c5252000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.907571]                    ^
[   18.907600]  fff00000c5252080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.907643]  fff00000c5252100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.907682] ==================================================================

[   19.944360] ==================================================================
[   19.945419] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   19.946084] Read of size 1 at addr ffff888100ab8873 by task kunit_try_catch/248
[   19.946888] 
[   19.947128] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   19.947431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.947469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.947531] Call Trace:
[   19.947580]  <TASK>
[   19.947633]  dump_stack_lvl+0x73/0xb0
[   19.947767]  print_report+0xd1/0x650
[   19.947863]  ? __virt_addr_valid+0x1db/0x2d0
[   19.947942]  ? mempool_oob_right_helper+0x318/0x380
[   19.948014]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.948085]  ? mempool_oob_right_helper+0x318/0x380
[   19.948159]  kasan_report+0x141/0x180
[   19.948233]  ? mempool_oob_right_helper+0x318/0x380
[   19.948320]  __asan_report_load1_noabort+0x18/0x20
[   19.948380]  mempool_oob_right_helper+0x318/0x380
[   19.948418]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   19.948455]  ? __pfx_sched_clock_cpu+0x10/0x10
[   19.948487]  ? finish_task_switch.isra.0+0x153/0x700
[   19.948524]  mempool_kmalloc_oob_right+0xf2/0x150
[   19.948557]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   19.948593]  ? __pfx_mempool_kmalloc+0x10/0x10
[   19.948627]  ? __pfx_mempool_kfree+0x10/0x10
[   19.948660]  ? __pfx_read_tsc+0x10/0x10
[   19.948691]  ? ktime_get_ts64+0x86/0x230
[   19.948724]  kunit_try_run_case+0x1a5/0x480
[   19.948760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.948792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.948821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.948891]  ? __kthread_parkme+0x82/0x180
[   19.948922]  ? preempt_count_sub+0x50/0x80
[   19.948955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.948988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.949019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.949052]  kthread+0x337/0x6f0
[   19.949079]  ? trace_preempt_on+0x20/0xc0
[   19.949112]  ? __pfx_kthread+0x10/0x10
[   19.949140]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.949174]  ? calculate_sigpending+0x7b/0xa0
[   19.949208]  ? __pfx_kthread+0x10/0x10
[   19.949272]  ret_from_fork+0x116/0x1d0
[   19.949340]  ? __pfx_kthread+0x10/0x10
[   19.949400]  ret_from_fork_asm+0x1a/0x30
[   19.949446]  </TASK>
[   19.949464] 
[   19.969607] Allocated by task 248:
[   19.970269]  kasan_save_stack+0x45/0x70
[   19.970985]  kasan_save_track+0x18/0x40
[   19.971787]  kasan_save_alloc_info+0x3b/0x50
[   19.972199]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   19.972944]  remove_element+0x11e/0x190
[   19.973488]  mempool_alloc_preallocated+0x4d/0x90
[   19.973933]  mempool_oob_right_helper+0x8a/0x380
[   19.974447]  mempool_kmalloc_oob_right+0xf2/0x150
[   19.974902]  kunit_try_run_case+0x1a5/0x480
[   19.975490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.976010]  kthread+0x337/0x6f0
[   19.976508]  ret_from_fork+0x116/0x1d0
[   19.976927]  ret_from_fork_asm+0x1a/0x30
[   19.977453] 
[   19.977632] The buggy address belongs to the object at ffff888100ab8800
[   19.977632]  which belongs to the cache kmalloc-128 of size 128
[   19.978670] The buggy address is located 0 bytes to the right of
[   19.978670]  allocated 115-byte region [ffff888100ab8800, ffff888100ab8873)
[   19.979908] 
[   19.980103] The buggy address belongs to the physical page:
[   19.980615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab8
[   19.981529] flags: 0x200000000000000(node=0|zone=2)
[   19.981939] page_type: f5(slab)
[   19.982468] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.983051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.983737] page dumped because: kasan: bad access detected
[   19.984519] 
[   19.984701] Memory state around the buggy address:
[   19.985155]  ffff888100ab8700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.985785]  ffff888100ab8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.986762] >ffff888100ab8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.987253]                                                              ^
[   19.988061]  ffff888100ab8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.988821]  ffff888100ab8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.989513] ==================================================================
[   19.995947] ==================================================================
[   19.997053] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   19.997811] Read of size 1 at addr ffff888103886001 by task kunit_try_catch/250
[   19.998536] 
[   19.998805] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   19.998953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.998993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.999052] Call Trace:
[   19.999090]  <TASK>
[   19.999135]  dump_stack_lvl+0x73/0xb0
[   19.999377]  print_report+0xd1/0x650
[   19.999467]  ? __virt_addr_valid+0x1db/0x2d0
[   19.999552]  ? mempool_oob_right_helper+0x318/0x380
[   19.999629]  ? kasan_addr_to_slab+0x11/0xa0
[   19.999732]  ? mempool_oob_right_helper+0x318/0x380
[   19.999818]  kasan_report+0x141/0x180
[   19.999909]  ? mempool_oob_right_helper+0x318/0x380
[   19.999995]  __asan_report_load1_noabort+0x18/0x20
[   20.000043]  mempool_oob_right_helper+0x318/0x380
[   20.000081]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.000118]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.000153]  ? finish_task_switch.isra.0+0x153/0x700
[   20.000188]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   20.000251]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   20.000340]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.000385]  ? __pfx_mempool_kfree+0x10/0x10
[   20.000422]  ? __pfx_read_tsc+0x10/0x10
[   20.000451]  ? ktime_get_ts64+0x86/0x230
[   20.000485]  kunit_try_run_case+0x1a5/0x480
[   20.000520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.000553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.000583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.000621]  ? __kthread_parkme+0x82/0x180
[   20.000649]  ? preempt_count_sub+0x50/0x80
[   20.000681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.000715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.000746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.000778]  kthread+0x337/0x6f0
[   20.000805]  ? trace_preempt_on+0x20/0xc0
[   20.000862]  ? __pfx_kthread+0x10/0x10
[   20.000894]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.000929]  ? calculate_sigpending+0x7b/0xa0
[   20.000964]  ? __pfx_kthread+0x10/0x10
[   20.000994]  ret_from_fork+0x116/0x1d0
[   20.001021]  ? __pfx_kthread+0x10/0x10
[   20.001049]  ret_from_fork_asm+0x1a/0x30
[   20.001089]  </TASK>
[   20.001104] 
[   20.020149] The buggy address belongs to the physical page:
[   20.021074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103884
[   20.021660] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.022928] flags: 0x200000000000040(head|node=0|zone=2)
[   20.023690] page_type: f8(unknown)
[   20.024110] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.025357] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.026652] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.027562] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.028381] head: 0200000000000002 ffffea00040e2101 00000000ffffffff 00000000ffffffff
[   20.028977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.029500] page dumped because: kasan: bad access detected
[   20.030027] 
[   20.030279] Memory state around the buggy address:
[   20.030899]  ffff888103885f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.031913]  ffff888103885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.033060] >ffff888103886000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.034400]                    ^
[   20.034881]  ffff888103886080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.035965]  ffff888103886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.036198] ==================================================================
[   20.044399] ==================================================================
[   20.045320] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.046104] Read of size 1 at addr ffff88810383d2bb by task kunit_try_catch/252
[   20.046767] 
[   20.047258] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   20.047535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.047582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.047642] Call Trace:
[   20.047683]  <TASK>
[   20.047728]  dump_stack_lvl+0x73/0xb0
[   20.047823]  print_report+0xd1/0x650
[   20.047922]  ? __virt_addr_valid+0x1db/0x2d0
[   20.048020]  ? mempool_oob_right_helper+0x318/0x380
[   20.048124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.048196]  ? mempool_oob_right_helper+0x318/0x380
[   20.048273]  kasan_report+0x141/0x180
[   20.048346]  ? mempool_oob_right_helper+0x318/0x380
[   20.048458]  __asan_report_load1_noabort+0x18/0x20
[   20.048506]  mempool_oob_right_helper+0x318/0x380
[   20.048543]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.048582]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.048615]  ? finish_task_switch.isra.0+0x153/0x700
[   20.048652]  mempool_slab_oob_right+0xed/0x140
[   20.048687]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   20.048725]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   20.048760]  ? __pfx_mempool_free_slab+0x10/0x10
[   20.048796]  ? __pfx_read_tsc+0x10/0x10
[   20.048826]  ? ktime_get_ts64+0x86/0x230
[   20.048890]  kunit_try_run_case+0x1a5/0x480
[   20.048930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.048962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.048992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.049029]  ? __kthread_parkme+0x82/0x180
[   20.049057]  ? preempt_count_sub+0x50/0x80
[   20.049088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.049120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.049152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.049184]  kthread+0x337/0x6f0
[   20.049212]  ? trace_preempt_on+0x20/0xc0
[   20.049275]  ? __pfx_kthread+0x10/0x10
[   20.049305]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.049341]  ? calculate_sigpending+0x7b/0xa0
[   20.049375]  ? __pfx_kthread+0x10/0x10
[   20.049405]  ret_from_fork+0x116/0x1d0
[   20.049431]  ? __pfx_kthread+0x10/0x10
[   20.049459]  ret_from_fork_asm+0x1a/0x30
[   20.049500]  </TASK>
[   20.049515] 
[   20.064370] Allocated by task 252:
[   20.064623]  kasan_save_stack+0x45/0x70
[   20.064971]  kasan_save_track+0x18/0x40
[   20.065399]  kasan_save_alloc_info+0x3b/0x50
[   20.065882]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   20.066509]  remove_element+0x11e/0x190
[   20.066978]  mempool_alloc_preallocated+0x4d/0x90
[   20.067472]  mempool_oob_right_helper+0x8a/0x380
[   20.068026]  mempool_slab_oob_right+0xed/0x140
[   20.068514]  kunit_try_run_case+0x1a5/0x480
[   20.068891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.069383]  kthread+0x337/0x6f0
[   20.069647]  ret_from_fork+0x116/0x1d0
[   20.069986]  ret_from_fork_asm+0x1a/0x30
[   20.070404] 
[   20.070607] The buggy address belongs to the object at ffff88810383d240
[   20.070607]  which belongs to the cache test_cache of size 123
[   20.071646] The buggy address is located 0 bytes to the right of
[   20.071646]  allocated 123-byte region [ffff88810383d240, ffff88810383d2bb)
[   20.072653] 
[   20.072817] The buggy address belongs to the physical page:
[   20.073908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383d
[   20.074628] flags: 0x200000000000000(node=0|zone=2)
[   20.075135] page_type: f5(slab)
[   20.075460] raw: 0200000000000000 ffff888101db3a00 dead000000000122 0000000000000000
[   20.076087] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.076767] page dumped because: kasan: bad access detected
[   20.077281] 
[   20.077482] Memory state around the buggy address:
[   20.077959]  ffff88810383d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.078579]  ffff88810383d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.079153] >ffff88810383d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.079683]                                         ^
[   20.080028]  ffff88810383d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.080491]  ffff88810383d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.081046] ==================================================================