Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.751072] ==================================================================
[   19.751156] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.751239] Read of size 1 at addr fff00000c6369973 by task kunit_try_catch/223
[   19.751291] 
[   19.751352] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.751440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.751469] Hardware name: linux,dummy-virt (DT)
[   19.751501] Call trace:
[   19.751528]  show_stack+0x20/0x38 (C)
[   19.751580]  dump_stack_lvl+0x8c/0xd0
[   19.751634]  print_report+0x118/0x608
[   19.751679]  kasan_report+0xdc/0x128
[   19.751722]  __asan_report_load1_noabort+0x20/0x30
[   19.751773]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.751824]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.751875]  kunit_try_run_case+0x170/0x3f0
[   19.751927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.751981]  kthread+0x328/0x630
[   19.752029]  ret_from_fork+0x10/0x20
[   19.752079] 
[   19.752098] Allocated by task 223:
[   19.752128]  kasan_save_stack+0x3c/0x68
[   19.752170]  kasan_save_track+0x20/0x40
[   19.752217]  kasan_save_alloc_info+0x40/0x58
[   19.752270]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.752313]  remove_element+0x130/0x1f8
[   19.752366]  mempool_alloc_preallocated+0x58/0xc0
[   19.752410]  mempool_oob_right_helper+0x98/0x2f0
[   19.752452]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.752495]  kunit_try_run_case+0x170/0x3f0
[   19.752535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752580]  kthread+0x328/0x630
[   19.752617]  ret_from_fork+0x10/0x20
[   19.752653] 
[   19.752673] The buggy address belongs to the object at fff00000c6369900
[   19.752673]  which belongs to the cache kmalloc-128 of size 128
[   19.752733] The buggy address is located 0 bytes to the right of
[   19.752733]  allocated 115-byte region [fff00000c6369900, fff00000c6369973)
[   19.752799] 
[   19.752821] The buggy address belongs to the physical page:
[   19.752852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106369
[   19.752908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.752960] page_type: f5(slab)
[   19.753003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.753053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.753095] page dumped because: kasan: bad access detected
[   19.753127] 
[   19.753147] Memory state around the buggy address:
[   19.753181]  fff00000c6369800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.753225]  fff00000c6369880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753267] >fff00000c6369900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753306]                                                              ^
[   19.753354]  fff00000c6369980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753396]  fff00000c6369a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753434] ==================================================================
[   19.769355] ==================================================================
[   19.769419] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.769478] Read of size 1 at addr fff00000c65ba001 by task kunit_try_catch/225
[   19.769536] 
[   19.769681] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.770009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.770042] Hardware name: linux,dummy-virt (DT)
[   19.770137] Call trace:
[   19.770162]  show_stack+0x20/0x38 (C)
[   19.770216]  dump_stack_lvl+0x8c/0xd0
[   19.770987]  print_report+0x118/0x608
[   19.771218]  kasan_report+0xdc/0x128
[   19.771315]  __asan_report_load1_noabort+0x20/0x30
[   19.771380]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.771432]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.771833]  kunit_try_run_case+0x170/0x3f0
[   19.771953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.772023]  kthread+0x328/0x630
[   19.772074]  ret_from_fork+0x10/0x20
[   19.772169] 
[   19.772191] The buggy address belongs to the physical page:
[   19.772747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8
[   19.772848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.773004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.773189] page_type: f8(unknown)
[   19.773258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.774055] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.774129] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.774180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.774231] head: 0bfffe0000000002 ffffc1ffc3196e01 00000000ffffffff 00000000ffffffff
[   19.774280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.774322] page dumped because: kasan: bad access detected
[   19.774367] 
[   19.775050] Memory state around the buggy address:
[   19.775585]  fff00000c65b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.775648]  fff00000c65b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.775750] >fff00000c65ba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.776060]                    ^
[   19.776112]  fff00000c65ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.776161]  fff00000c65ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.776714] ==================================================================
[   19.787714] ==================================================================
[   19.788127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.788200] Read of size 1 at addr fff00000c63952bb by task kunit_try_catch/227
[   19.788265] 
[   19.788298] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.788393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.788421] Hardware name: linux,dummy-virt (DT)
[   19.788450] Call trace:
[   19.788474]  show_stack+0x20/0x38 (C)
[   19.788522]  dump_stack_lvl+0x8c/0xd0
[   19.788701]  print_report+0x118/0x608
[   19.788932]  kasan_report+0xdc/0x128
[   19.789033]  __asan_report_load1_noabort+0x20/0x30
[   19.789135]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.789186]  mempool_slab_oob_right+0xc0/0x118
[   19.789233]  kunit_try_run_case+0x170/0x3f0
[   19.789644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.789711]  kthread+0x328/0x630
[   19.789759]  ret_from_fork+0x10/0x20
[   19.790107] 
[   19.790129] Allocated by task 227:
[   19.790159]  kasan_save_stack+0x3c/0x68
[   19.790199]  kasan_save_track+0x20/0x40
[   19.790236]  kasan_save_alloc_info+0x40/0x58
[   19.790887]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.790943]  remove_element+0x16c/0x1f8
[   19.791352]  mempool_alloc_preallocated+0x58/0xc0
[   19.791424]  mempool_oob_right_helper+0x98/0x2f0
[   19.791739]  mempool_slab_oob_right+0xc0/0x118
[   19.791994]  kunit_try_run_case+0x170/0x3f0
[   19.792106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792155]  kthread+0x328/0x630
[   19.792191]  ret_from_fork+0x10/0x20
[   19.792228] 
[   19.792373] The buggy address belongs to the object at fff00000c6395240
[   19.792373]  which belongs to the cache test_cache of size 123
[   19.792453] The buggy address is located 0 bytes to the right of
[   19.792453]  allocated 123-byte region [fff00000c6395240, fff00000c63952bb)
[   19.792522] 
[   19.792542] The buggy address belongs to the physical page:
[   19.792576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106395
[   19.793102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.793158] page_type: f5(slab)
[   19.793225] raw: 0bfffe0000000000 fff00000c1bc0b40 dead000000000122 0000000000000000
[   19.793308] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.793652] page dumped because: kasan: bad access detected
[   19.793693] 
[   19.793712] Memory state around the buggy address:
[   19.793876]  fff00000c6395180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.794205]  fff00000c6395200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.794252] >fff00000c6395280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.794290]                                         ^
[   19.794456]  fff00000c6395300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794544]  fff00000c6395380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794845] ==================================================================

[   12.733814] ==================================================================
[   12.734327] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.735014] Read of size 1 at addr ffff888103606273 by task kunit_try_catch/241
[   12.735255] 
[   12.735400] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   12.735558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.735580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.735606] Call Trace:
[   12.735621]  <TASK>
[   12.735641]  dump_stack_lvl+0x73/0xb0
[   12.735673]  print_report+0xd1/0x650
[   12.735700]  ? __virt_addr_valid+0x1db/0x2d0
[   12.735726]  ? mempool_oob_right_helper+0x318/0x380
[   12.735751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.735775]  ? mempool_oob_right_helper+0x318/0x380
[   12.735800]  kasan_report+0x141/0x180
[   12.735824]  ? mempool_oob_right_helper+0x318/0x380
[   12.736101]  __asan_report_load1_noabort+0x18/0x20
[   12.736132]  mempool_oob_right_helper+0x318/0x380
[   12.736158]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.736188]  ? finish_task_switch.isra.0+0x153/0x700
[   12.736219]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.736245]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.736269]  ? dequeue_task_fair+0x156/0x4e0
[   12.736293]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.736318]  ? __pfx_mempool_kfree+0x10/0x10
[   12.736341]  ? __pfx_read_tsc+0x10/0x10
[   12.736363]  ? ktime_get_ts64+0x86/0x230
[   12.736390]  kunit_try_run_case+0x1a5/0x480
[   12.736414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.736434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.736462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.736487]  ? __kthread_parkme+0x82/0x180
[   12.736526]  ? preempt_count_sub+0x50/0x80
[   12.736552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.736572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.736596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.736622]  kthread+0x337/0x6f0
[   12.736639]  ? trace_preempt_on+0x20/0xc0
[   12.736664]  ? __pfx_kthread+0x10/0x10
[   12.736684]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.736706]  ? calculate_sigpending+0x7b/0xa0
[   12.736730]  ? __pfx_kthread+0x10/0x10
[   12.736749]  ret_from_fork+0x41/0x80
[   12.736772]  ? __pfx_kthread+0x10/0x10
[   12.736791]  ret_from_fork_asm+0x1a/0x30
[   12.736823]  </TASK>
[   12.736851] 
[   12.748167] Allocated by task 241:
[   12.748351]  kasan_save_stack+0x45/0x70
[   12.748894]  kasan_save_track+0x18/0x40
[   12.749194]  kasan_save_alloc_info+0x3b/0x50
[   12.749358]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.749600]  remove_element+0x11e/0x190
[   12.750111]  mempool_alloc_preallocated+0x4d/0x90
[   12.750399]  mempool_oob_right_helper+0x8a/0x380
[   12.750687]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.750944]  kunit_try_run_case+0x1a5/0x480
[   12.751098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.751455]  kthread+0x337/0x6f0
[   12.751641]  ret_from_fork+0x41/0x80
[   12.751798]  ret_from_fork_asm+0x1a/0x30
[   12.752231] 
[   12.752367] The buggy address belongs to the object at ffff888103606200
[   12.752367]  which belongs to the cache kmalloc-128 of size 128
[   12.752818] The buggy address is located 0 bytes to the right of
[   12.752818]  allocated 115-byte region [ffff888103606200, ffff888103606273)
[   12.753659] 
[   12.754063] The buggy address belongs to the physical page:
[   12.754409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103606
[   12.754986] flags: 0x200000000000000(node=0|zone=2)
[   12.755345] page_type: f5(slab)
[   12.755660] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.756345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.756823] page dumped because: kasan: bad access detected
[   12.757157] 
[   12.757266] Memory state around the buggy address:
[   12.757483]  ffff888103606100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.758135]  ffff888103606180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.758556] >ffff888103606200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.759042]                                                              ^
[   12.759416]  ffff888103606280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.760084]  ffff888103606300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.760397] ==================================================================
[   12.764145] ==================================================================
[   12.765049] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.765316] Read of size 1 at addr ffff888102d86001 by task kunit_try_catch/243
[   12.765560] 
[   12.765658] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   12.765710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.765722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.765748] Call Trace:
[   12.766012]  <TASK>
[   12.766040]  dump_stack_lvl+0x73/0xb0
[   12.766074]  print_report+0xd1/0x650
[   12.766098]  ? __virt_addr_valid+0x1db/0x2d0
[   12.766124]  ? mempool_oob_right_helper+0x318/0x380
[   12.766149]  ? kasan_addr_to_slab+0x11/0xa0
[   12.766171]  ? mempool_oob_right_helper+0x318/0x380
[   12.766196]  kasan_report+0x141/0x180
[   12.766220]  ? mempool_oob_right_helper+0x318/0x380
[   12.766249]  __asan_report_load1_noabort+0x18/0x20
[   12.766270]  mempool_oob_right_helper+0x318/0x380
[   12.766296]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.766320]  ? dequeue_entities+0x852/0x1740
[   12.766347]  ? finish_task_switch.isra.0+0x153/0x700
[   12.766375]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.766400]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.766425]  ? dequeue_task_fair+0x166/0x4e0
[   12.766448]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.766471]  ? __pfx_mempool_kfree+0x10/0x10
[   12.766493]  ? __pfx_read_tsc+0x10/0x10
[   12.766555]  ? ktime_get_ts64+0x86/0x230
[   12.766585]  kunit_try_run_case+0x1a5/0x480
[   12.766607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.766627]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.766654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.766679]  ? __kthread_parkme+0x82/0x180
[   12.766702]  ? preempt_count_sub+0x50/0x80
[   12.766726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.766747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.766770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.766795]  kthread+0x337/0x6f0
[   12.766813]  ? trace_preempt_on+0x20/0xc0
[   12.766838]  ? __pfx_kthread+0x10/0x10
[   12.766919]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.766943]  ? calculate_sigpending+0x7b/0xa0
[   12.766967]  ? __pfx_kthread+0x10/0x10
[   12.766985]  ret_from_fork+0x41/0x80
[   12.767007]  ? __pfx_kthread+0x10/0x10
[   12.767026]  ret_from_fork_asm+0x1a/0x30
[   12.767058]  </TASK>
[   12.767071] 
[   12.779033] The buggy address belongs to the physical page:
[   12.779299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d84
[   12.779920] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.780401] flags: 0x200000000000040(head|node=0|zone=2)
[   12.780766] page_type: f8(unknown)
[   12.781009] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.781517] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.782233] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.782558] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.783049] head: 0200000000000002 ffffea00040b6101 00000000ffffffff 00000000ffffffff
[   12.783406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.783797] page dumped because: kasan: bad access detected
[   12.784447] 
[   12.784609] Memory state around the buggy address:
[   12.784836]  ffff888102d85f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.785378]  ffff888102d85f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.785788] >ffff888102d86000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.786374]                    ^
[   12.786535]  ffff888102d86080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.786977]  ffff888102d86100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.787591] ==================================================================
[   12.793535] ==================================================================
[   12.793984] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.794266] Read of size 1 at addr ffff8881036092bb by task kunit_try_catch/245
[   12.794684] 
[   12.795078] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   12.795132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.795146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.795171] Call Trace:
[   12.795184]  <TASK>
[   12.795202]  dump_stack_lvl+0x73/0xb0
[   12.795231]  print_report+0xd1/0x650
[   12.795257]  ? __virt_addr_valid+0x1db/0x2d0
[   12.795283]  ? mempool_oob_right_helper+0x318/0x380
[   12.795309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.795333]  ? mempool_oob_right_helper+0x318/0x380
[   12.795357]  kasan_report+0x141/0x180
[   12.795381]  ? mempool_oob_right_helper+0x318/0x380
[   12.795410]  __asan_report_load1_noabort+0x18/0x20
[   12.795432]  mempool_oob_right_helper+0x318/0x380
[   12.795472]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.795501]  ? finish_task_switch.isra.0+0x153/0x700
[   12.795538]  mempool_slab_oob_right+0xed/0x140
[   12.795561]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.795586]  ? dequeue_task_fair+0x166/0x4e0
[   12.795610]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.795634]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.795656]  ? __pfx_read_tsc+0x10/0x10
[   12.795679]  ? ktime_get_ts64+0x86/0x230
[   12.795705]  kunit_try_run_case+0x1a5/0x480
[   12.795729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.795749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.795775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.795800]  ? __kthread_parkme+0x82/0x180
[   12.795823]  ? preempt_count_sub+0x50/0x80
[   12.795908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.795933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.795958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.795982]  kthread+0x337/0x6f0
[   12.796000]  ? trace_preempt_on+0x20/0xc0
[   12.796024]  ? __pfx_kthread+0x10/0x10
[   12.796044]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.796067]  ? calculate_sigpending+0x7b/0xa0
[   12.796089]  ? __pfx_kthread+0x10/0x10
[   12.796109]  ret_from_fork+0x41/0x80
[   12.796131]  ? __pfx_kthread+0x10/0x10
[   12.796150]  ret_from_fork_asm+0x1a/0x30
[   12.796182]  </TASK>
[   12.796195] 
[   12.810484] Allocated by task 245:
[   12.810726]  kasan_save_stack+0x45/0x70
[   12.811106]  kasan_save_track+0x18/0x40
[   12.811257]  kasan_save_alloc_info+0x3b/0x50
[   12.811406]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.811734]  remove_element+0x11e/0x190
[   12.812223]  mempool_alloc_preallocated+0x4d/0x90
[   12.812708]  mempool_oob_right_helper+0x8a/0x380
[   12.813191]  mempool_slab_oob_right+0xed/0x140
[   12.813814]  kunit_try_run_case+0x1a5/0x480
[   12.814290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.814691]  kthread+0x337/0x6f0
[   12.814816]  ret_from_fork+0x41/0x80
[   12.815068]  ret_from_fork_asm+0x1a/0x30
[   12.815458] 
[   12.815649] The buggy address belongs to the object at ffff888103609240
[   12.815649]  which belongs to the cache test_cache of size 123
[   12.816573] The buggy address is located 0 bytes to the right of
[   12.816573]  allocated 123-byte region [ffff888103609240, ffff8881036092bb)
[   12.816997] 
[   12.817073] The buggy address belongs to the physical page:
[   12.817613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103609
[   12.818046] flags: 0x200000000000000(node=0|zone=2)
[   12.818323] page_type: f5(slab)
[   12.818517] raw: 0200000000000000 ffff888101744780 dead000000000122 0000000000000000
[   12.818807] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.819167] page dumped because: kasan: bad access detected
[   12.819460] 
[   12.819534] Memory state around the buggy address:
[   12.819920]  ffff888103609180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.820294]  ffff888103609200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.820636] >ffff888103609280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.820868]                                         ^
[   12.821259]  ffff888103609300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.821549]  ffff888103609380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.822158] ==================================================================