Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.837067] ==================================================================
[   19.837141] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.837199] Read of size 1 at addr fff00000c59912bb by task kunit_try_catch/227
[   19.837281] 
[   19.837319] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.837412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.837437] Hardware name: linux,dummy-virt (DT)
[   19.837466] Call trace:
[   19.837487]  show_stack+0x20/0x38 (C)
[   19.837755]  dump_stack_lvl+0x8c/0xd0
[   19.837818]  print_report+0x118/0x5d0
[   19.837865]  kasan_report+0xdc/0x128
[   19.837908]  __asan_report_load1_noabort+0x20/0x30
[   19.837976]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.838067]  mempool_slab_oob_right+0xc0/0x118
[   19.838143]  kunit_try_run_case+0x170/0x3f0
[   19.838253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.838327]  kthread+0x328/0x630
[   19.838406]  ret_from_fork+0x10/0x20
[   19.838493] 
[   19.838511] Allocated by task 227:
[   19.838563]  kasan_save_stack+0x3c/0x68
[   19.838631]  kasan_save_track+0x20/0x40
[   19.838679]  kasan_save_alloc_info+0x40/0x58
[   19.838740]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.838792]  remove_element+0x16c/0x1f8
[   19.838830]  mempool_alloc_preallocated+0x58/0xc0
[   19.838872]  mempool_oob_right_helper+0x98/0x2f0
[   19.838913]  mempool_slab_oob_right+0xc0/0x118
[   19.838951]  kunit_try_run_case+0x170/0x3f0
[   19.839241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.839330]  kthread+0x328/0x630
[   19.839418]  ret_from_fork+0x10/0x20
[   19.839499] 
[   19.839569] The buggy address belongs to the object at fff00000c5991240
[   19.839569]  which belongs to the cache test_cache of size 123
[   19.839686] The buggy address is located 0 bytes to the right of
[   19.839686]  allocated 123-byte region [fff00000c5991240, fff00000c59912bb)
[   19.839787] 
[   19.839859] The buggy address belongs to the physical page:
[   19.839906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105991
[   19.839976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.840042] page_type: f5(slab)
[   19.840122] raw: 0bfffe0000000000 fff00000c1c3ac80 dead000000000122 0000000000000000
[   19.840198] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.840287] page dumped because: kasan: bad access detected
[   19.840321] 
[   19.840338] Memory state around the buggy address:
[   19.840613]  fff00000c5991180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.840689]  fff00000c5991200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.840745] >fff00000c5991280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.840876]                                         ^
[   19.840925]  fff00000c5991300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.841027]  fff00000c5991380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.841106] ==================================================================
[   19.808413] ==================================================================
[   19.808477] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.808533] Read of size 1 at addr fff00000c7932001 by task kunit_try_catch/225
[   19.808583] 
[   19.808614] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.808696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808723] Hardware name: linux,dummy-virt (DT)
[   19.808754] Call trace:
[   19.809471]  show_stack+0x20/0x38 (C)
[   19.809557]  dump_stack_lvl+0x8c/0xd0
[   19.809655]  print_report+0x118/0x5d0
[   19.809719]  kasan_report+0xdc/0x128
[   19.809775]  __asan_report_load1_noabort+0x20/0x30
[   19.809826]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.810014]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.810530]  kunit_try_run_case+0x170/0x3f0
[   19.810673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810883]  kthread+0x328/0x630
[   19.810932]  ret_from_fork+0x10/0x20
[   19.811326] 
[   19.811363] The buggy address belongs to the physical page:
[   19.811478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107930
[   19.811721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.811802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.812188] page_type: f8(unknown)
[   19.812282] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.812341] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.812460] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.812698] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.813165] head: 0bfffe0000000002 ffffc1ffc31e4c01 00000000ffffffff 00000000ffffffff
[   19.813440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.813489] page dumped because: kasan: bad access detected
[   19.813521] 
[   19.813541] Memory state around the buggy address:
[   19.813792]  fff00000c7931f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.813854]  fff00000c7931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.814048] >fff00000c7932000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.814090]                    ^
[   19.814119]  fff00000c7932080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.814684]  fff00000c7932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.814873] ==================================================================
[   19.791389] ==================================================================
[   19.791468] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.791540] Read of size 1 at addr fff00000c59e4673 by task kunit_try_catch/223
[   19.791591] 
[   19.791632] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.791720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.791748] Hardware name: linux,dummy-virt (DT)
[   19.791782] Call trace:
[   19.791805]  show_stack+0x20/0x38 (C)
[   19.791856]  dump_stack_lvl+0x8c/0xd0
[   19.791906]  print_report+0x118/0x5d0
[   19.791951]  kasan_report+0xdc/0x128
[   19.791996]  __asan_report_load1_noabort+0x20/0x30
[   19.792045]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.792097]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.792147]  kunit_try_run_case+0x170/0x3f0
[   19.792197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792271]  kthread+0x328/0x630
[   19.792318]  ret_from_fork+0x10/0x20
[   19.792372] 
[   19.792393] Allocated by task 223:
[   19.792424]  kasan_save_stack+0x3c/0x68
[   19.792464]  kasan_save_track+0x20/0x40
[   19.792501]  kasan_save_alloc_info+0x40/0x58
[   19.792540]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.792584]  remove_element+0x130/0x1f8
[   19.792624]  mempool_alloc_preallocated+0x58/0xc0
[   19.792665]  mempool_oob_right_helper+0x98/0x2f0
[   19.792707]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.792749]  kunit_try_run_case+0x170/0x3f0
[   19.792790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792835]  kthread+0x328/0x630
[   19.792872]  ret_from_fork+0x10/0x20
[   19.792908] 
[   19.792927] The buggy address belongs to the object at fff00000c59e4600
[   19.792927]  which belongs to the cache kmalloc-128 of size 128
[   19.792988] The buggy address is located 0 bytes to the right of
[   19.792988]  allocated 115-byte region [fff00000c59e4600, fff00000c59e4673)
[   19.793055] 
[   19.793077] The buggy address belongs to the physical page:
[   19.793111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   19.793168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.793233] page_type: f5(slab)
[   19.793276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.793348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.793394] page dumped because: kasan: bad access detected
[   19.793440] 
[   19.793463] Memory state around the buggy address:
[   19.793498]  fff00000c59e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.793544]  fff00000c59e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793587] >fff00000c59e4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.793627]                                                              ^
[   19.793668]  fff00000c59e4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793712]  fff00000c59e4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.793752] ==================================================================

[   12.410401] ==================================================================
[   12.410929] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.411264] Read of size 1 at addr ffff888102225e73 by task kunit_try_catch/240
[   12.411579] 
[   12.411679] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   12.411728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.411740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.411761] Call Trace:
[   12.411774]  <TASK>
[   12.411792]  dump_stack_lvl+0x73/0xb0
[   12.411843]  print_report+0xd1/0x610
[   12.411867]  ? __virt_addr_valid+0x1db/0x2d0
[   12.411903]  ? mempool_oob_right_helper+0x318/0x380
[   12.411925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.411947]  ? mempool_oob_right_helper+0x318/0x380
[   12.411970]  kasan_report+0x141/0x180
[   12.411992]  ? mempool_oob_right_helper+0x318/0x380
[   12.412021]  __asan_report_load1_noabort+0x18/0x20
[   12.412042]  mempool_oob_right_helper+0x318/0x380
[   12.412067]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.412098]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.412120]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.412143]  ? dequeue_task_fair+0x166/0x4e0
[   12.412168]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.412189]  ? __pfx_mempool_kfree+0x10/0x10
[   12.412210]  ? __pfx_read_tsc+0x10/0x10
[   12.412231]  ? ktime_get_ts64+0x86/0x230
[   12.412256]  kunit_try_run_case+0x1a5/0x480
[   12.412279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.412296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.412322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.412345]  ? __kthread_parkme+0x82/0x180
[   12.412367]  ? preempt_count_sub+0x50/0x80
[   12.412392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.412411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.412435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.412457]  kthread+0x337/0x6f0
[   12.412474]  ? trace_preempt_on+0x20/0xc0
[   12.412497]  ? __pfx_kthread+0x10/0x10
[   12.412514]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.412535]  ? calculate_sigpending+0x7b/0xa0
[   12.412557]  ? __pfx_kthread+0x10/0x10
[   12.412576]  ret_from_fork+0x41/0x80
[   12.412596]  ? __pfx_kthread+0x10/0x10
[   12.412613]  ret_from_fork_asm+0x1a/0x30
[   12.412643]  </TASK>
[   12.412655] 
[   12.424212] Allocated by task 240:
[   12.424349]  kasan_save_stack+0x45/0x70
[   12.424529]  kasan_save_track+0x18/0x40
[   12.424682]  kasan_save_alloc_info+0x3b/0x50
[   12.424850]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.425159]  remove_element+0x11e/0x190
[   12.425350]  mempool_alloc_preallocated+0x4d/0x90
[   12.426088]  mempool_oob_right_helper+0x8a/0x380
[   12.426282]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.426515]  kunit_try_run_case+0x1a5/0x480
[   12.426949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.427201]  kthread+0x337/0x6f0
[   12.427543]  ret_from_fork+0x41/0x80
[   12.427725]  ret_from_fork_asm+0x1a/0x30
[   12.428132] 
[   12.428222] The buggy address belongs to the object at ffff888102225e00
[   12.428222]  which belongs to the cache kmalloc-128 of size 128
[   12.428998] The buggy address is located 0 bytes to the right of
[   12.428998]  allocated 115-byte region [ffff888102225e00, ffff888102225e73)
[   12.429673] 
[   12.429973] The buggy address belongs to the physical page:
[   12.430332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102225
[   12.430824] flags: 0x200000000000000(node=0|zone=2)
[   12.431215] page_type: f5(slab)
[   12.431385] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.431793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.432347] page dumped because: kasan: bad access detected
[   12.432764] 
[   12.432871] Memory state around the buggy address:
[   12.433356]  ffff888102225d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.433638]  ffff888102225d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.434081] >ffff888102225e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.434470]                                                              ^
[   12.434889]  ffff888102225e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.435357]  ffff888102225f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.435664] ==================================================================
[   12.438954] ==================================================================
[   12.439699] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.439974] Read of size 1 at addr ffff888103966001 by task kunit_try_catch/242
[   12.440314] 
[   12.440514] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   12.440562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.440573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.440594] Call Trace:
[   12.440606]  <TASK>
[   12.440623]  dump_stack_lvl+0x73/0xb0
[   12.440649]  print_report+0xd1/0x610
[   12.440671]  ? __virt_addr_valid+0x1db/0x2d0
[   12.440703]  ? mempool_oob_right_helper+0x318/0x380
[   12.440726]  ? kasan_addr_to_slab+0x11/0xa0
[   12.440746]  ? mempool_oob_right_helper+0x318/0x380
[   12.440780]  kasan_report+0x141/0x180
[   12.440819]  ? mempool_oob_right_helper+0x318/0x380
[   12.440847]  __asan_report_load1_noabort+0x18/0x20
[   12.440867]  mempool_oob_right_helper+0x318/0x380
[   12.440900]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.440923]  ? dequeue_entities+0x852/0x1740
[   12.440947]  ? finish_task_switch.isra.0+0x153/0x700
[   12.440973]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.440997]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.441030]  ? dequeue_task_fair+0x166/0x4e0
[   12.441052]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.441071]  ? __pfx_mempool_kfree+0x10/0x10
[   12.441093]  ? __pfx_read_tsc+0x10/0x10
[   12.441123]  ? ktime_get_ts64+0x86/0x230
[   12.441152]  kunit_try_run_case+0x1a5/0x480
[   12.441173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.441191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.441214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.441237]  ? __kthread_parkme+0x82/0x180
[   12.441259]  ? preempt_count_sub+0x50/0x80
[   12.441282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.441302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.441325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.441348]  kthread+0x337/0x6f0
[   12.441364]  ? trace_preempt_on+0x20/0xc0
[   12.441386]  ? __pfx_kthread+0x10/0x10
[   12.441403]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.441424]  ? calculate_sigpending+0x7b/0xa0
[   12.441445]  ? __pfx_kthread+0x10/0x10
[   12.441462]  ret_from_fork+0x41/0x80
[   12.441482]  ? __pfx_kthread+0x10/0x10
[   12.441499]  ret_from_fork_asm+0x1a/0x30
[   12.441529]  </TASK>
[   12.441540] 
[   12.451959] The buggy address belongs to the physical page:
[   12.452226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103964
[   12.452555] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.453256] flags: 0x200000000000040(head|node=0|zone=2)
[   12.453458] page_type: f8(unknown)
[   12.453650] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.454308] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.454613] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.455166] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.455582] head: 0200000000000002 ffffea00040e5901 00000000ffffffff 00000000ffffffff
[   12.456417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.457331] page dumped because: kasan: bad access detected
[   12.457926] 
[   12.458082] Memory state around the buggy address:
[   12.458502]  ffff888103965f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.458970]  ffff888103965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.459423] >ffff888103966000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.459635]                    ^
[   12.459855]  ffff888103966080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.460519]  ffff888103966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.461261] ==================================================================
[   12.465388] ==================================================================
[   12.466060] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.466308] Read of size 1 at addr ffff8881022402bb by task kunit_try_catch/244
[   12.466528] 
[   12.466612] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   12.466656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.466667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.466687] Call Trace:
[   12.466697]  <TASK>
[   12.466711]  dump_stack_lvl+0x73/0xb0
[   12.466734]  print_report+0xd1/0x610
[   12.466755]  ? __virt_addr_valid+0x1db/0x2d0
[   12.466776]  ? mempool_oob_right_helper+0x318/0x380
[   12.466799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.466828]  ? mempool_oob_right_helper+0x318/0x380
[   12.466850]  kasan_report+0x141/0x180
[   12.466872]  ? mempool_oob_right_helper+0x318/0x380
[   12.466909]  __asan_report_load1_noabort+0x18/0x20
[   12.466929]  mempool_oob_right_helper+0x318/0x380
[   12.466953]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.466980]  ? finish_task_switch.isra.0+0x153/0x700
[   12.467006]  mempool_slab_oob_right+0xed/0x140
[   12.467026]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.467045]  ? dequeue_task_fair+0x166/0x4e0
[   12.467067]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.467087]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.467109]  ? __pfx_read_tsc+0x10/0x10
[   12.467128]  ? ktime_get_ts64+0x86/0x230
[   12.467151]  kunit_try_run_case+0x1a5/0x480
[   12.467172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.467189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.467212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.467235]  ? __kthread_parkme+0x82/0x180
[   12.467256]  ? preempt_count_sub+0x50/0x80
[   12.467279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.467298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.467320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.467343]  kthread+0x337/0x6f0
[   12.467358]  ? trace_preempt_on+0x20/0xc0
[   12.467380]  ? __pfx_kthread+0x10/0x10
[   12.467398]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.467418]  ? calculate_sigpending+0x7b/0xa0
[   12.467439]  ? __pfx_kthread+0x10/0x10
[   12.467457]  ret_from_fork+0x41/0x80
[   12.467475]  ? __pfx_kthread+0x10/0x10
[   12.467493]  ret_from_fork_asm+0x1a/0x30
[   12.467522]  </TASK>
[   12.467532] 
[   12.480298] Allocated by task 244:
[   12.480766]  kasan_save_stack+0x45/0x70
[   12.481177]  kasan_save_track+0x18/0x40
[   12.481612]  kasan_save_alloc_info+0x3b/0x50
[   12.482005]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.482696]  remove_element+0x11e/0x190
[   12.483027]  mempool_alloc_preallocated+0x4d/0x90
[   12.483598]  mempool_oob_right_helper+0x8a/0x380
[   12.483843]  mempool_slab_oob_right+0xed/0x140
[   12.484045]  kunit_try_run_case+0x1a5/0x480
[   12.484185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.484351]  kthread+0x337/0x6f0
[   12.484463]  ret_from_fork+0x41/0x80
[   12.484586]  ret_from_fork_asm+0x1a/0x30
[   12.484957] 
[   12.485244] The buggy address belongs to the object at ffff888102240240
[   12.485244]  which belongs to the cache test_cache of size 123
[   12.486426] The buggy address is located 0 bytes to the right of
[   12.486426]  allocated 123-byte region [ffff888102240240, ffff8881022402bb)
[   12.487643] 
[   12.487863] The buggy address belongs to the physical page:
[   12.488449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   12.489012] flags: 0x200000000000000(node=0|zone=2)
[   12.489188] page_type: f5(slab)
[   12.489305] raw: 0200000000000000 ffff8881019498c0 dead000000000122 0000000000000000
[   12.489524] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.489759] page dumped because: kasan: bad access detected
[   12.490326] 
[   12.490510] Memory state around the buggy address:
[   12.491023]  ffff888102240180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.491477]  ffff888102240200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.491708] >ffff888102240280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.492520]                                         ^
[   12.492973]  ffff888102240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.493452]  ffff888102240380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.493675] ==================================================================