Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   26.812601] ==================================================================
[   26.813062] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.813604] Read of size 1 at addr fff00000c5a6c2bb by task kunit_try_catch/227
[   26.813939] 
[   26.814773] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   26.815708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.815842] Hardware name: linux,dummy-virt (DT)
[   26.816034] Call trace:
[   26.816156]  show_stack+0x20/0x38 (C)
[   26.816303]  dump_stack_lvl+0x8c/0xd0
[   26.816949]  print_report+0x118/0x608
[   26.817126]  kasan_report+0xdc/0x128
[   26.817242]  __asan_report_load1_noabort+0x20/0x30
[   26.817371]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.817526]  mempool_slab_oob_right+0xc0/0x118
[   26.817827]  kunit_try_run_case+0x170/0x3f0
[   26.818232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.818445]  kthread+0x328/0x630
[   26.818585]  ret_from_fork+0x10/0x20
[   26.818947] 
[   26.819066] Allocated by task 227:
[   26.819163]  kasan_save_stack+0x3c/0x68
[   26.819307]  kasan_save_track+0x20/0x40
[   26.819574]  kasan_save_alloc_info+0x40/0x58
[   26.819722]  __kasan_mempool_unpoison_object+0xbc/0x180
[   26.819829]  remove_element+0x16c/0x1f8
[   26.819928]  mempool_alloc_preallocated+0x58/0xc0
[   26.820061]  mempool_oob_right_helper+0x98/0x2f0
[   26.820222]  mempool_slab_oob_right+0xc0/0x118
[   26.820339]  kunit_try_run_case+0x170/0x3f0
[   26.820644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.821049]  kthread+0x328/0x630
[   26.821161]  ret_from_fork+0x10/0x20
[   26.821270] 
[   26.821409] The buggy address belongs to the object at fff00000c5a6c240
[   26.821409]  which belongs to the cache test_cache of size 123
[   26.821756] The buggy address is located 0 bytes to the right of
[   26.821756]  allocated 123-byte region [fff00000c5a6c240, fff00000c5a6c2bb)
[   26.821967] 
[   26.822033] The buggy address belongs to the physical page:
[   26.822355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a6c
[   26.822633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.822805] page_type: f5(slab)
[   26.822973] raw: 0bfffe0000000000 fff00000c5a5d140 dead000000000122 0000000000000000
[   26.823244] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.823399] page dumped because: kasan: bad access detected
[   26.823558] 
[   26.823605] Memory state around the buggy address:
[   26.823679]  fff00000c5a6c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.823792]  fff00000c5a6c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.823972] >fff00000c5a6c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.824073]                                         ^
[   26.824205]  fff00000c5a6c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.824331]  fff00000c5a6c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.824832] ==================================================================
[   26.779426] ==================================================================
[   26.779564] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.779708] Read of size 1 at addr fff00000c78ae001 by task kunit_try_catch/225
[   26.779821] 
[   26.779899] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   26.780107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.780177] Hardware name: linux,dummy-virt (DT)
[   26.780254] Call trace:
[   26.780310]  show_stack+0x20/0x38 (C)
[   26.781673]  dump_stack_lvl+0x8c/0xd0
[   26.781802]  print_report+0x118/0x608
[   26.781914]  kasan_report+0xdc/0x128
[   26.782022]  __asan_report_load1_noabort+0x20/0x30
[   26.782227]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.782369]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   26.782748]  kunit_try_run_case+0x170/0x3f0
[   26.782886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.783034]  kthread+0x328/0x630
[   26.783341]  ret_from_fork+0x10/0x20
[   26.783586] 
[   26.783955] The buggy address belongs to the physical page:
[   26.784074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ac
[   26.784217] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.784955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.785129] page_type: f8(unknown)
[   26.785256] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.785464] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.785604] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.785736] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.785925] head: 0bfffe0000000002 ffffc1ffc31e2b01 00000000ffffffff 00000000ffffffff
[   26.786361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.786540] page dumped because: kasan: bad access detected
[   26.786634] 
[   26.786718] Memory state around the buggy address:
[   26.786801]  fff00000c78adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.787060]  fff00000c78adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.787338] >fff00000c78ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.787456]                    ^
[   26.787600]  fff00000c78ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.787745]  fff00000c78ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.787983] ==================================================================
[   26.759350] ==================================================================
[   26.759472] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.759571] Read of size 1 at addr fff00000c597aa73 by task kunit_try_catch/223
[   26.759637] 
[   26.759692] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   26.759801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.759837] Hardware name: linux,dummy-virt (DT)
[   26.759880] Call trace:
[   26.759910]  show_stack+0x20/0x38 (C)
[   26.759977]  dump_stack_lvl+0x8c/0xd0
[   26.760044]  print_report+0x118/0x608
[   26.760161]  kasan_report+0xdc/0x128
[   26.760294]  __asan_report_load1_noabort+0x20/0x30
[   26.760445]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.760587]  mempool_kmalloc_oob_right+0xc4/0x120
[   26.760689]  kunit_try_run_case+0x170/0x3f0
[   26.760761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.760831]  kthread+0x328/0x630
[   26.760892]  ret_from_fork+0x10/0x20
[   26.760958] 
[   26.760981] Allocated by task 223:
[   26.761020]  kasan_save_stack+0x3c/0x68
[   26.761072]  kasan_save_track+0x20/0x40
[   26.761120]  kasan_save_alloc_info+0x40/0x58
[   26.761166]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.761216]  remove_element+0x130/0x1f8
[   26.761267]  mempool_alloc_preallocated+0x58/0xc0
[   26.761316]  mempool_oob_right_helper+0x98/0x2f0
[   26.761365]  mempool_kmalloc_oob_right+0xc4/0x120
[   26.761451]  kunit_try_run_case+0x170/0x3f0
[   26.761503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.761557]  kthread+0x328/0x630
[   26.761603]  ret_from_fork+0x10/0x20
[   26.761648] 
[   26.761672] The buggy address belongs to the object at fff00000c597aa00
[   26.761672]  which belongs to the cache kmalloc-128 of size 128
[   26.761746] The buggy address is located 0 bytes to the right of
[   26.761746]  allocated 115-byte region [fff00000c597aa00, fff00000c597aa73)
[   26.761822] 
[   26.761850] The buggy address belongs to the physical page:
[   26.761890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10597a
[   26.761959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.762025] page_type: f5(slab)
[   26.762074] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.762136] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.762187] page dumped because: kasan: bad access detected
[   26.762226] 
[   26.762247] Memory state around the buggy address:
[   26.762286]  fff00000c597a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.762340]  fff00000c597a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.762420] >fff00000c597aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.762471]                                                              ^
[   26.762519]  fff00000c597aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.762571]  fff00000c597ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.762619] ==================================================================

[   13.373780] ==================================================================
[   13.374387] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.375460] Read of size 1 at addr ffff888103afe001 by task kunit_try_catch/243
[   13.376098] 
[   13.376663] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   13.377064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.377090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.377132] Call Trace:
[   13.377153]  <TASK>
[   13.377177]  dump_stack_lvl+0x73/0xb0
[   13.377216]  print_report+0xd1/0x650
[   13.377239]  ? __virt_addr_valid+0x1db/0x2d0
[   13.377263]  ? mempool_oob_right_helper+0x318/0x380
[   13.377323]  ? kasan_addr_to_slab+0x11/0xa0
[   13.377357]  ? mempool_oob_right_helper+0x318/0x380
[   13.377391]  kasan_report+0x141/0x180
[   13.377421]  ? mempool_oob_right_helper+0x318/0x380
[   13.377449]  __asan_report_load1_noabort+0x18/0x20
[   13.377469]  mempool_oob_right_helper+0x318/0x380
[   13.377492]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.377515]  ? dequeue_entities+0x852/0x1740
[   13.377542]  ? finish_task_switch.isra.0+0x153/0x700
[   13.377575]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   13.377598]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.377637]  ? dequeue_task_fair+0x166/0x4e0
[   13.377662]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.377685]  ? __pfx_mempool_kfree+0x10/0x10
[   13.377705]  ? __pfx_read_tsc+0x10/0x10
[   13.377726]  ? ktime_get_ts64+0x86/0x230
[   13.377752]  kunit_try_run_case+0x1a5/0x480
[   13.377778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.377799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.377823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.377861]  ? __kthread_parkme+0x82/0x180
[   13.377884]  ? preempt_count_sub+0x50/0x80
[   13.377906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.377928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.377963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.377988]  kthread+0x337/0x6f0
[   13.378006]  ? trace_preempt_on+0x20/0xc0
[   13.378032]  ? __pfx_kthread+0x10/0x10
[   13.378051]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.378072]  ? calculate_sigpending+0x7b/0xa0
[   13.378096]  ? __pfx_kthread+0x10/0x10
[   13.378114]  ret_from_fork+0x41/0x80
[   13.378134]  ? __pfx_kthread+0x10/0x10
[   13.378153]  ret_from_fork_asm+0x1a/0x30
[   13.378184]  </TASK>
[   13.378197] 
[   13.392950] The buggy address belongs to the physical page:
[   13.394062] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103afc
[   13.394636] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.395125] flags: 0x200000000000040(head|node=0|zone=2)
[   13.395668] page_type: f8(unknown)
[   13.396021] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.396644] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.396991] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.397555] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.398021] head: 0200000000000002 ffffea00040ebf01 00000000ffffffff 00000000ffffffff
[   13.398222] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.398476] page dumped because: kasan: bad access detected
[   13.398970] 
[   13.399859] Memory state around the buggy address:
[   13.400252]  ffff888103afdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.401023]  ffff888103afdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.401760] >ffff888103afe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.402268]                    ^
[   13.402568]  ffff888103afe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.403722]  ffff888103afe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.404235] ==================================================================
[   13.338589] ==================================================================
[   13.339126] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.339722] Read of size 1 at addr ffff888102d97973 by task kunit_try_catch/241
[   13.340098] 
[   13.340330] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   13.340419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.340438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.340474] Call Trace:
[   13.340498]  <TASK>
[   13.341182]  dump_stack_lvl+0x73/0xb0
[   13.341493]  print_report+0xd1/0x650
[   13.341593]  ? __virt_addr_valid+0x1db/0x2d0
[   13.341652]  ? mempool_oob_right_helper+0x318/0x380
[   13.341692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.341728]  ? mempool_oob_right_helper+0x318/0x380
[   13.341769]  kasan_report+0x141/0x180
[   13.341811]  ? mempool_oob_right_helper+0x318/0x380
[   13.341868]  __asan_report_load1_noabort+0x18/0x20
[   13.341909]  mempool_oob_right_helper+0x318/0x380
[   13.341969]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.342012]  ? dequeue_entities+0x852/0x1740
[   13.342042]  ? finish_task_switch.isra.0+0x153/0x700
[   13.342070]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.342095]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.342118]  ? dequeue_task_fair+0x166/0x4e0
[   13.342140]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.342164]  ? __pfx_mempool_kfree+0x10/0x10
[   13.342186]  ? __pfx_read_tsc+0x10/0x10
[   13.342206]  ? ktime_get_ts64+0x86/0x230
[   13.342232]  kunit_try_run_case+0x1a5/0x480
[   13.342259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.342312]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.342363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.342400]  ? __kthread_parkme+0x82/0x180
[   13.342431]  ? preempt_count_sub+0x50/0x80
[   13.342460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.342490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.342519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.342574]  kthread+0x337/0x6f0
[   13.342593]  ? trace_preempt_on+0x20/0xc0
[   13.342618]  ? __pfx_kthread+0x10/0x10
[   13.342658]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.342679]  ? calculate_sigpending+0x7b/0xa0
[   13.342701]  ? __pfx_kthread+0x10/0x10
[   13.342719]  ret_from_fork+0x41/0x80
[   13.342739]  ? __pfx_kthread+0x10/0x10
[   13.342756]  ret_from_fork_asm+0x1a/0x30
[   13.342786]  </TASK>
[   13.342801] 
[   13.353420] Allocated by task 241:
[   13.353740]  kasan_save_stack+0x45/0x70
[   13.354080]  kasan_save_track+0x18/0x40
[   13.354418]  kasan_save_alloc_info+0x3b/0x50
[   13.354814]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.355264]  remove_element+0x11e/0x190
[   13.355456]  mempool_alloc_preallocated+0x4d/0x90
[   13.355854]  mempool_oob_right_helper+0x8a/0x380
[   13.356050]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.356237]  kunit_try_run_case+0x1a5/0x480
[   13.356417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.356820]  kthread+0x337/0x6f0
[   13.357133]  ret_from_fork+0x41/0x80
[   13.357423]  ret_from_fork_asm+0x1a/0x30
[   13.357774] 
[   13.358028] The buggy address belongs to the object at ffff888102d97900
[   13.358028]  which belongs to the cache kmalloc-128 of size 128
[   13.358323] The buggy address is located 0 bytes to the right of
[   13.358323]  allocated 115-byte region [ffff888102d97900, ffff888102d97973)
[   13.359168] 
[   13.359299] The buggy address belongs to the physical page:
[   13.359718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d97
[   13.360193] flags: 0x200000000000000(node=0|zone=2)
[   13.360499] page_type: f5(slab)
[   13.360793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.360991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.361478] page dumped because: kasan: bad access detected
[   13.361763] 
[   13.361914] Memory state around the buggy address:
[   13.362120]  ffff888102d97800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.362367]  ffff888102d97880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.362608] >ffff888102d97900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.362847]                                                              ^
[   13.363588]  ffff888102d97980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.364005]  ffff888102d97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.364350] ==================================================================
[   13.411657] ==================================================================
[   13.412163] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.413192] Read of size 1 at addr ffff8881039ee2bb by task kunit_try_catch/245
[   13.414377] 
[   13.414637] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   13.414742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.414761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.414799] Call Trace:
[   13.414819]  <TASK>
[   13.414853]  dump_stack_lvl+0x73/0xb0
[   13.414913]  print_report+0xd1/0x650
[   13.414947]  ? __virt_addr_valid+0x1db/0x2d0
[   13.414979]  ? mempool_oob_right_helper+0x318/0x380
[   13.415010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.415042]  ? mempool_oob_right_helper+0x318/0x380
[   13.415077]  kasan_report+0x141/0x180
[   13.415109]  ? mempool_oob_right_helper+0x318/0x380
[   13.415150]  __asan_report_load1_noabort+0x18/0x20
[   13.415180]  mempool_oob_right_helper+0x318/0x380
[   13.415217]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.415257]  ? finish_task_switch.isra.0+0x153/0x700
[   13.415298]  mempool_slab_oob_right+0xed/0x140
[   13.415329]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.415359]  ? dequeue_task_fair+0x166/0x4e0
[   13.415392]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.415429]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.415468]  ? __pfx_read_tsc+0x10/0x10
[   13.415504]  ? ktime_get_ts64+0x86/0x230
[   13.415829]  kunit_try_run_case+0x1a5/0x480
[   13.415871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.415894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.415920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.415943]  ? __kthread_parkme+0x82/0x180
[   13.415966]  ? preempt_count_sub+0x50/0x80
[   13.415989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.416012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.416034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.416056]  kthread+0x337/0x6f0
[   13.416072]  ? trace_preempt_on+0x20/0xc0
[   13.416097]  ? __pfx_kthread+0x10/0x10
[   13.416114]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.416134]  ? calculate_sigpending+0x7b/0xa0
[   13.416156]  ? __pfx_kthread+0x10/0x10
[   13.416174]  ret_from_fork+0x41/0x80
[   13.416194]  ? __pfx_kthread+0x10/0x10
[   13.416211]  ret_from_fork_asm+0x1a/0x30
[   13.416244]  </TASK>
[   13.416257] 
[   13.430245] Allocated by task 245:
[   13.430572]  kasan_save_stack+0x45/0x70
[   13.431156]  kasan_save_track+0x18/0x40
[   13.432047]  kasan_save_alloc_info+0x3b/0x50
[   13.432571]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.432903]  remove_element+0x11e/0x190
[   13.433075]  mempool_alloc_preallocated+0x4d/0x90
[   13.433562]  mempool_oob_right_helper+0x8a/0x380
[   13.433975]  mempool_slab_oob_right+0xed/0x140
[   13.434244]  kunit_try_run_case+0x1a5/0x480
[   13.434684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.435052]  kthread+0x337/0x6f0
[   13.435254]  ret_from_fork+0x41/0x80
[   13.436207]  ret_from_fork_asm+0x1a/0x30
[   13.436595] 
[   13.436776] The buggy address belongs to the object at ffff8881039ee240
[   13.436776]  which belongs to the cache test_cache of size 123
[   13.437418] The buggy address is located 0 bytes to the right of
[   13.437418]  allocated 123-byte region [ffff8881039ee240, ffff8881039ee2bb)
[   13.438111] 
[   13.438233] The buggy address belongs to the physical page:
[   13.438724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039ee
[   13.439161] flags: 0x200000000000000(node=0|zone=2)
[   13.439529] page_type: f5(slab)
[   13.439753] raw: 0200000000000000 ffff888101e34780 dead000000000122 0000000000000000
[   13.440175] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.440534] page dumped because: kasan: bad access detected
[   13.441724] 
[   13.441896] Memory state around the buggy address:
[   13.442131]  ffff8881039ee180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.442479]  ffff8881039ee200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.443041] >ffff8881039ee280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.443709]                                         ^
[   13.443920]  ffff8881039ee300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.444599]  ffff8881039ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.444856] ==================================================================