Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.511004] ==================================================================
[   17.511086] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.511158] Read of size 1 at addr fff00000c78032bb by task kunit_try_catch/228
[   17.511208] 
[   17.511253] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.511347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.511374] Hardware name: linux,dummy-virt (DT)
[   17.511417] Call trace:
[   17.511439]  show_stack+0x20/0x38 (C)
[   17.511504]  dump_stack_lvl+0x8c/0xd0
[   17.511556]  print_report+0x118/0x608
[   17.511611]  kasan_report+0xdc/0x128
[   17.512052]  __asan_report_load1_noabort+0x20/0x30
[   17.512115]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.512165]  mempool_slab_oob_right+0xc0/0x118
[   17.512211]  kunit_try_run_case+0x170/0x3f0
[   17.512261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.512313]  kthread+0x328/0x630
[   17.512357]  ret_from_fork+0x10/0x20
[   17.512407] 
[   17.512424] Allocated by task 228:
[   17.512454]  kasan_save_stack+0x3c/0x68
[   17.512509]  kasan_save_track+0x20/0x40
[   17.512632]  kasan_save_alloc_info+0x40/0x58
[   17.512671]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.512719]  remove_element+0x16c/0x1f8
[   17.512870]  mempool_alloc_preallocated+0x58/0xc0
[   17.512938]  mempool_oob_right_helper+0x98/0x2f0
[   17.512998]  mempool_slab_oob_right+0xc0/0x118
[   17.513033]  kunit_try_run_case+0x170/0x3f0
[   17.513078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.513121]  kthread+0x328/0x630
[   17.513155]  ret_from_fork+0x10/0x20
[   17.513496] 
[   17.513521] The buggy address belongs to the object at fff00000c7803240
[   17.513521]  which belongs to the cache test_cache of size 123
[   17.513580] The buggy address is located 0 bytes to the right of
[   17.513580]  allocated 123-byte region [fff00000c7803240, fff00000c78032bb)
[   17.513642] 
[   17.513663] The buggy address belongs to the physical page:
[   17.513694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107803
[   17.513746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.513795] page_type: f5(slab)
[   17.514175] raw: 0bfffe0000000000 fff00000c5d10a00 dead000000000122 0000000000000000
[   17.514234] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.514278] page dumped because: kasan: bad access detected
[   17.514309] 
[   17.514326] Memory state around the buggy address:
[   17.514359]  fff00000c7803180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.514556]  fff00000c7803200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   17.514602] >fff00000c7803280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   17.514650]                                         ^
[   17.514804]  fff00000c7803300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.514879]  fff00000c7803380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.514927] ==================================================================
[   17.473773] ==================================================================
[   17.473847] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.473924] Read of size 1 at addr fff00000c638e973 by task kunit_try_catch/224
[   17.473992] 
[   17.474036] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.474124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.474159] Hardware name: linux,dummy-virt (DT)
[   17.474583] Call trace:
[   17.474610]  show_stack+0x20/0x38 (C)
[   17.474668]  dump_stack_lvl+0x8c/0xd0
[   17.474719]  print_report+0x118/0x608
[   17.474765]  kasan_report+0xdc/0x128
[   17.474808]  __asan_report_load1_noabort+0x20/0x30
[   17.474857]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.474907]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.474973]  kunit_try_run_case+0x170/0x3f0
[   17.475026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.475077]  kthread+0x328/0x630
[   17.475124]  ret_from_fork+0x10/0x20
[   17.475172] 
[   17.475191] Allocated by task 224:
[   17.475222]  kasan_save_stack+0x3c/0x68
[   17.475261]  kasan_save_track+0x20/0x40
[   17.475298]  kasan_save_alloc_info+0x40/0x58
[   17.475336]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.475378]  remove_element+0x130/0x1f8
[   17.475418]  mempool_alloc_preallocated+0x58/0xc0
[   17.475459]  mempool_oob_right_helper+0x98/0x2f0
[   17.475499]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.475540]  kunit_try_run_case+0x170/0x3f0
[   17.475580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.475625]  kthread+0x328/0x630
[   17.475659]  ret_from_fork+0x10/0x20
[   17.475694] 
[   17.475715] The buggy address belongs to the object at fff00000c638e900
[   17.475715]  which belongs to the cache kmalloc-128 of size 128
[   17.475772] The buggy address is located 0 bytes to the right of
[   17.475772]  allocated 115-byte region [fff00000c638e900, fff00000c638e973)
[   17.475835] 
[   17.475857] The buggy address belongs to the physical page:
[   17.475890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.475955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.476008] page_type: f5(slab)
[   17.476050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.476100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.476140] page dumped because: kasan: bad access detected
[   17.476172] 
[   17.476191] Memory state around the buggy address:
[   17.476223]  fff00000c638e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.476266]  fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.476310] >fff00000c638e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.476348]                                                              ^
[   17.476388]  fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.476431]  fff00000c638ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.476470] ==================================================================
[   17.484139] ==================================================================
[   17.484221] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.484279] Read of size 1 at addr fff00000c791e001 by task kunit_try_catch/226
[   17.484339] 
[   17.484372] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.484465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.484492] Hardware name: linux,dummy-virt (DT)
[   17.484523] Call trace:
[   17.484550]  show_stack+0x20/0x38 (C)
[   17.484599]  dump_stack_lvl+0x8c/0xd0
[   17.484650]  print_report+0x118/0x608
[   17.484697]  kasan_report+0xdc/0x128
[   17.484738]  __asan_report_load1_noabort+0x20/0x30
[   17.484797]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.484851]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   17.484909]  kunit_try_run_case+0x170/0x3f0
[   17.485396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.485661]  kthread+0x328/0x630
[   17.485731]  ret_from_fork+0x10/0x20
[   17.485922] 
[   17.485992] The buggy address belongs to the physical page:
[   17.486063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c
[   17.486137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.486229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.486291] page_type: f8(unknown)
[   17.486339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.486395] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.486451] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.486748] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.486907] head: 0bfffe0000000002 ffffc1ffc31e4701 00000000ffffffff 00000000ffffffff
[   17.487204] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.487535] page dumped because: kasan: bad access detected
[   17.487573] 
[   17.487767] Memory state around the buggy address:
[   17.487803]  fff00000c791df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.488125]  fff00000c791df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.488183] >fff00000c791e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.488419]                    ^
[   17.488453]  fff00000c791e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.488512]  fff00000c791e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.488550] ==================================================================

[   12.605608] ==================================================================
[   12.606091] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.606651] Read of size 1 at addr ffff888102a3a001 by task kunit_try_catch/242
[   12.606970] 
[   12.607204] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.607266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.607352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.607378] Call Trace:
[   12.607392]  <TASK>
[   12.607469]  dump_stack_lvl+0x73/0xb0
[   12.607503]  print_report+0xd1/0x650
[   12.607527]  ? __virt_addr_valid+0x1db/0x2d0
[   12.607551]  ? mempool_oob_right_helper+0x318/0x380
[   12.607575]  ? kasan_addr_to_slab+0x11/0xa0
[   12.607597]  ? mempool_oob_right_helper+0x318/0x380
[   12.607622]  kasan_report+0x141/0x180
[   12.607644]  ? mempool_oob_right_helper+0x318/0x380
[   12.607674]  __asan_report_load1_noabort+0x18/0x20
[   12.607695]  mempool_oob_right_helper+0x318/0x380
[   12.607720]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.607746]  ? dequeue_entities+0x852/0x1740
[   12.607772]  ? irqentry_exit+0x2a/0x60
[   12.607791]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.607820]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.607845]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.607873]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.607896]  ? __pfx_mempool_kfree+0x10/0x10
[   12.607918]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.607945]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.607973]  kunit_try_run_case+0x1a5/0x480
[   12.607999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.608022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.608047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.608071]  ? __kthread_parkme+0x82/0x180
[   12.608095]  ? preempt_count_sub+0x50/0x80
[   12.608120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.608144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.608167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.608191]  kthread+0x337/0x6f0
[   12.608208]  ? trace_preempt_on+0x20/0xc0
[   12.608244]  ? __pfx_kthread+0x10/0x10
[   12.608262]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.608294]  ? calculate_sigpending+0x7b/0xa0
[   12.608317]  ? __pfx_kthread+0x10/0x10
[   12.608336]  ret_from_fork+0x41/0x80
[   12.608359]  ? __pfx_kthread+0x10/0x10
[   12.608377]  ret_from_fork_asm+0x1a/0x30
[   12.608409]  </TASK>
[   12.608421] 
[   12.620398] The buggy address belongs to the physical page:
[   12.620966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a38
[   12.621510] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.621959] flags: 0x200000000000040(head|node=0|zone=2)
[   12.622228] page_type: f8(unknown)
[   12.622563] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.623004] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.623627] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.623978] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.624578] head: 0200000000000002 ffffea00040a8e01 00000000ffffffff 00000000ffffffff
[   12.624950] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.625261] page dumped because: kasan: bad access detected
[   12.625612] 
[   12.626319] Memory state around the buggy address:
[   12.626493]  ffff888102a39f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.626717]  ffff888102a39f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.626934] >ffff888102a3a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.627148]                    ^
[   12.627279]  ffff888102a3a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.627582]  ffff888102a3a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.627797] ==================================================================
[   12.577979] ==================================================================
[   12.578450] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.579026] Read of size 1 at addr ffff888103151273 by task kunit_try_catch/240
[   12.579322] 
[   12.579443] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.579496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.579509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.579533] Call Trace:
[   12.579546]  <TASK>
[   12.579567]  dump_stack_lvl+0x73/0xb0
[   12.579598]  print_report+0xd1/0x650
[   12.579622]  ? __virt_addr_valid+0x1db/0x2d0
[   12.579647]  ? mempool_oob_right_helper+0x318/0x380
[   12.579672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.579695]  ? mempool_oob_right_helper+0x318/0x380
[   12.579720]  kasan_report+0x141/0x180
[   12.579743]  ? mempool_oob_right_helper+0x318/0x380
[   12.579771]  __asan_report_load1_noabort+0x18/0x20
[   12.579793]  mempool_oob_right_helper+0x318/0x380
[   12.579818]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.579842]  ? dequeue_entities+0x852/0x1740
[   12.579868]  ? irqentry_exit+0x2a/0x60
[   12.579888]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.579916]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.579941]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.579969]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.579992]  ? __pfx_mempool_kfree+0x10/0x10
[   12.580013]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.580039]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.580066]  kunit_try_run_case+0x1a5/0x480
[   12.580092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.580115]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.580140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.580164]  ? __kthread_parkme+0x82/0x180
[   12.580188]  ? preempt_count_sub+0x50/0x80
[   12.580215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.580251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.580276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.580300]  kthread+0x337/0x6f0
[   12.580317]  ? trace_preempt_on+0x20/0xc0
[   12.580343]  ? __pfx_kthread+0x10/0x10
[   12.580361]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.580384]  ? calculate_sigpending+0x7b/0xa0
[   12.580407]  ? __pfx_kthread+0x10/0x10
[   12.580426]  ret_from_fork+0x41/0x80
[   12.580448]  ? __pfx_kthread+0x10/0x10
[   12.580467]  ret_from_fork_asm+0x1a/0x30
[   12.580499]  </TASK>
[   12.580511] 
[   12.590784] Allocated by task 240:
[   12.590952]  kasan_save_stack+0x45/0x70
[   12.591174]  kasan_save_track+0x18/0x40
[   12.591393]  kasan_save_alloc_info+0x3b/0x50
[   12.591617]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.591897]  remove_element+0x11e/0x190
[   12.592062]  mempool_alloc_preallocated+0x4d/0x90
[   12.592303]  mempool_oob_right_helper+0x8a/0x380
[   12.592624]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.592792]  kunit_try_run_case+0x1a5/0x480
[   12.593005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.593224]  kthread+0x337/0x6f0
[   12.593434]  ret_from_fork+0x41/0x80
[   12.593594]  ret_from_fork_asm+0x1a/0x30
[   12.593820] 
[   12.593895] The buggy address belongs to the object at ffff888103151200
[   12.593895]  which belongs to the cache kmalloc-128 of size 128
[   12.594336] The buggy address is located 0 bytes to the right of
[   12.594336]  allocated 115-byte region [ffff888103151200, ffff888103151273)
[   12.594948] 
[   12.595024] The buggy address belongs to the physical page:
[   12.595510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151
[   12.595897] flags: 0x200000000000000(node=0|zone=2)
[   12.596123] page_type: f5(slab)
[   12.596345] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.597142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.597415] page dumped because: kasan: bad access detected
[   12.598022] 
[   12.598138] Memory state around the buggy address:
[   12.598571]  ffff888103151100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.599122]  ffff888103151180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.599478] >ffff888103151200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.599805]                                                              ^
[   12.600069]  ffff888103151280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.600354]  ffff888103151300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.600710] ==================================================================
[   12.633424] ==================================================================
[   12.634817] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.635510] Read of size 1 at addr ffff8881031542bb by task kunit_try_catch/244
[   12.635868] 
[   12.636011] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.636065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.636079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.636104] Call Trace:
[   12.636117]  <TASK>
[   12.636139]  dump_stack_lvl+0x73/0xb0
[   12.636169]  print_report+0xd1/0x650
[   12.636193]  ? __virt_addr_valid+0x1db/0x2d0
[   12.636218]  ? mempool_oob_right_helper+0x318/0x380
[   12.636253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.636276]  ? mempool_oob_right_helper+0x318/0x380
[   12.636301]  kasan_report+0x141/0x180
[   12.636324]  ? mempool_oob_right_helper+0x318/0x380
[   12.636354]  __asan_report_load1_noabort+0x18/0x20
[   12.636374]  mempool_oob_right_helper+0x318/0x380
[   12.636400]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.636428]  ? finish_task_switch.isra.0+0x153/0x700
[   12.636458]  mempool_slab_oob_right+0xed/0x140
[   12.636479]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.636499]  ? dequeue_task_fair+0x166/0x4e0
[   12.636522]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.636546]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.636569]  ? __pfx_read_tsc+0x10/0x10
[   12.636590]  ? ktime_get_ts64+0x86/0x230
[   12.636616]  kunit_try_run_case+0x1a5/0x480
[   12.636643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.636666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.636692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.636716]  ? __kthread_parkme+0x82/0x180
[   12.636739]  ? preempt_count_sub+0x50/0x80
[   12.636763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.636787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.636810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.636834]  kthread+0x337/0x6f0
[   12.636851]  ? trace_preempt_on+0x20/0xc0
[   12.636876]  ? __pfx_kthread+0x10/0x10
[   12.636895]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.636917]  ? calculate_sigpending+0x7b/0xa0
[   12.636940]  ? __pfx_kthread+0x10/0x10
[   12.636959]  ret_from_fork+0x41/0x80
[   12.636980]  ? __pfx_kthread+0x10/0x10
[   12.636998]  ret_from_fork_asm+0x1a/0x30
[   12.637030]  </TASK>
[   12.637043] 
[   12.649960] Allocated by task 244:
[   12.650371]  kasan_save_stack+0x45/0x70
[   12.650809]  kasan_save_track+0x18/0x40
[   12.651073]  kasan_save_alloc_info+0x3b/0x50
[   12.651446]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.651954]  remove_element+0x11e/0x190
[   12.652358]  mempool_alloc_preallocated+0x4d/0x90
[   12.652804]  mempool_oob_right_helper+0x8a/0x380
[   12.653043]  mempool_slab_oob_right+0xed/0x140
[   12.653254]  kunit_try_run_case+0x1a5/0x480
[   12.653492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.654022]  kthread+0x337/0x6f0
[   12.654299]  ret_from_fork+0x41/0x80
[   12.654626]  ret_from_fork_asm+0x1a/0x30
[   12.655008] 
[   12.655104] The buggy address belongs to the object at ffff888103154240
[   12.655104]  which belongs to the cache test_cache of size 123
[   12.655957] The buggy address is located 0 bytes to the right of
[   12.655957]  allocated 123-byte region [ffff888103154240, ffff8881031542bb)
[   12.656940] 
[   12.657043] The buggy address belongs to the physical page:
[   12.657289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103154
[   12.657968] flags: 0x200000000000000(node=0|zone=2)
[   12.658431] page_type: f5(slab)
[   12.658600] raw: 0200000000000000 ffff88810111e640 dead000000000122 0000000000000000
[   12.659080] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.659600] page dumped because: kasan: bad access detected
[   12.660179] 
[   12.660427] Memory state around the buggy address:
[   12.661027]  ffff888103154180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.661410]  ffff888103154200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.661772] >ffff888103154280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.662069]                                         ^
[   12.662608]  ffff888103154300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.663456]  ffff888103154380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.663898] ==================================================================