Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.238651] ==================================================================
[   21.238750] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.238828] Read of size 1 at addr fff00000c5ff5e73 by task kunit_try_catch/221
[   21.238879] 
[   21.238922] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.239011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.239037] Hardware name: linux,dummy-virt (DT)
[   21.239072] Call trace:
[   21.239096]  show_stack+0x20/0x38 (C)
[   21.239148]  dump_stack_lvl+0x8c/0xd0
[   21.239199]  print_report+0x118/0x608
[   21.239245]  kasan_report+0xdc/0x128
[   21.239288]  __asan_report_load1_noabort+0x20/0x30
[   21.239340]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.239387]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.239435]  kunit_try_run_case+0x170/0x3f0
[   21.239581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.239634]  kthread+0x328/0x630
[   21.239678]  ret_from_fork+0x10/0x20
[   21.239745] 
[   21.239764] Allocated by task 221:
[   21.239795]  kasan_save_stack+0x3c/0x68
[   21.239838]  kasan_save_track+0x20/0x40
[   21.239877]  kasan_save_alloc_info+0x40/0x58
[   21.239916]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.239961]  remove_element+0x130/0x1f8
[   21.239999]  mempool_alloc_preallocated+0x58/0xc0
[   21.240039]  mempool_oob_right_helper+0x98/0x2f0
[   21.240079]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.240125]  kunit_try_run_case+0x170/0x3f0
[   21.240164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.240208]  kthread+0x328/0x630
[   21.240241]  ret_from_fork+0x10/0x20
[   21.240277] 
[   21.240297] The buggy address belongs to the object at fff00000c5ff5e00
[   21.240297]  which belongs to the cache kmalloc-128 of size 128
[   21.240358] The buggy address is located 0 bytes to the right of
[   21.240358]  allocated 115-byte region [fff00000c5ff5e00, fff00000c5ff5e73)
[   21.240423] 
[   21.240444] The buggy address belongs to the physical page:
[   21.240478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ff5
[   21.240531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.240585] page_type: f5(slab)
[   21.240627] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.240678] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.240729] page dumped because: kasan: bad access detected
[   21.240762] 
[   21.240780] Memory state around the buggy address:
[   21.240817]  fff00000c5ff5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.240860]  fff00000c5ff5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.240902] >fff00000c5ff5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.240938]                                                              ^
[   21.240977]  fff00000c5ff5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.241019]  fff00000c5ff5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.241057] ==================================================================
[   21.279553] ==================================================================
[   21.279629] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.279683] Read of size 1 at addr fff00000c57132bb by task kunit_try_catch/225
[   21.279745] 
[   21.279779] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.279861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.279886] Hardware name: linux,dummy-virt (DT)
[   21.279917] Call trace:
[   21.279938]  show_stack+0x20/0x38 (C)
[   21.279986]  dump_stack_lvl+0x8c/0xd0
[   21.280177]  print_report+0x118/0x608
[   21.280504]  kasan_report+0xdc/0x128
[   21.280969]  __asan_report_load1_noabort+0x20/0x30
[   21.281318]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.281413]  mempool_slab_oob_right+0xc0/0x118
[   21.281477]  kunit_try_run_case+0x170/0x3f0
[   21.282036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.282141]  kthread+0x328/0x630
[   21.282323]  ret_from_fork+0x10/0x20
[   21.282737] 
[   21.282820] Allocated by task 225:
[   21.283204]  kasan_save_stack+0x3c/0x68
[   21.283309]  kasan_save_track+0x20/0x40
[   21.283345]  kasan_save_alloc_info+0x40/0x58
[   21.283385]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.283427]  remove_element+0x16c/0x1f8
[   21.284181]  mempool_alloc_preallocated+0x58/0xc0
[   21.284740]  mempool_oob_right_helper+0x98/0x2f0
[   21.284791]  mempool_slab_oob_right+0xc0/0x118
[   21.284831]  kunit_try_run_case+0x170/0x3f0
[   21.284869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.284911]  kthread+0x328/0x630
[   21.285663]  ret_from_fork+0x10/0x20
[   21.286510] 
[   21.286538] The buggy address belongs to the object at fff00000c5713240
[   21.286538]  which belongs to the cache test_cache of size 123
[   21.286601] The buggy address is located 0 bytes to the right of
[   21.286601]  allocated 123-byte region [fff00000c5713240, fff00000c57132bb)
[   21.287161] 
[   21.287370] The buggy address belongs to the physical page:
[   21.287784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713
[   21.287974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.288031] page_type: f5(slab)
[   21.288499] raw: 0bfffe0000000000 fff00000c5cfe780 dead000000000122 0000000000000000
[   21.288556] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.288598] page dumped because: kasan: bad access detected
[   21.288631] 
[   21.288650] Memory state around the buggy address:
[   21.288683]  fff00000c5713180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.288738]  fff00000c5713200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.288780] >fff00000c5713280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.290016]                                         ^
[   21.290573]  fff00000c5713300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290647]  fff00000c5713380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290688] ==================================================================
[   21.252536] ==================================================================
[   21.252851] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.252926] Read of size 1 at addr fff00000c77ba001 by task kunit_try_catch/223
[   21.253146] 
[   21.253180] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.253269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.253294] Hardware name: linux,dummy-virt (DT)
[   21.253324] Call trace:
[   21.253346]  show_stack+0x20/0x38 (C)
[   21.253395]  dump_stack_lvl+0x8c/0xd0
[   21.253440]  print_report+0x118/0x608
[   21.253485]  kasan_report+0xdc/0x128
[   21.253529]  __asan_report_load1_noabort+0x20/0x30
[   21.253891]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.253972]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.254414]  kunit_try_run_case+0x170/0x3f0
[   21.254604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.254791]  kthread+0x328/0x630
[   21.254832]  ret_from_fork+0x10/0x20
[   21.254878] 
[   21.254900] The buggy address belongs to the physical page:
[   21.254932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b8
[   21.254986] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.255416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.255789] page_type: f8(unknown)
[   21.255950] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.256018] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.256074] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.256129] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.256178] head: 0bfffe0000000002 ffffc1ffc31dee01 00000000ffffffff 00000000ffffffff
[   21.256227] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.256670] page dumped because: kasan: bad access detected
[   21.256812] 
[   21.256834] Memory state around the buggy address:
[   21.256868]  fff00000c77b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.257374]  fff00000c77b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.257430] >fff00000c77ba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.257467]                    ^
[   21.257621]  fff00000c77ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.257663]  fff00000c77ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.257912] ==================================================================

[   14.400815] ==================================================================
[   14.401498] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.401884] Read of size 1 at addr ffff888102af6673 by task kunit_try_catch/238
[   14.402189] 
[   14.402318] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.402368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.402380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.402403] Call Trace:
[   14.402428]  <TASK>
[   14.402447]  dump_stack_lvl+0x73/0xb0
[   14.402479]  print_report+0xd1/0x650
[   14.402514]  ? __virt_addr_valid+0x1db/0x2d0
[   14.402540]  ? mempool_oob_right_helper+0x318/0x380
[   14.402563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.402588]  ? mempool_oob_right_helper+0x318/0x380
[   14.402610]  kasan_report+0x141/0x180
[   14.402631]  ? mempool_oob_right_helper+0x318/0x380
[   14.402659]  __asan_report_load1_noabort+0x18/0x20
[   14.402682]  mempool_oob_right_helper+0x318/0x380
[   14.402715]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.402741]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.402763]  ? finish_task_switch.isra.0+0x153/0x700
[   14.402800]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.402823]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.402849]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.402873]  ? __pfx_mempool_kfree+0x10/0x10
[   14.402897]  ? __pfx_read_tsc+0x10/0x10
[   14.402919]  ? ktime_get_ts64+0x86/0x230
[   14.402943]  kunit_try_run_case+0x1a5/0x480
[   14.402969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.402991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.403014]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.403037]  ? __kthread_parkme+0x82/0x180
[   14.403066]  ? preempt_count_sub+0x50/0x80
[   14.403089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.403135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.403158]  kthread+0x337/0x6f0
[   14.403177]  ? trace_preempt_on+0x20/0xc0
[   14.403200]  ? __pfx_kthread+0x10/0x10
[   14.403220]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.403240]  ? calculate_sigpending+0x7b/0xa0
[   14.403264]  ? __pfx_kthread+0x10/0x10
[   14.403285]  ret_from_fork+0x116/0x1d0
[   14.403303]  ? __pfx_kthread+0x10/0x10
[   14.403322]  ret_from_fork_asm+0x1a/0x30
[   14.403354]  </TASK>
[   14.403367] 
[   14.412690] Allocated by task 238:
[   14.412884]  kasan_save_stack+0x45/0x70
[   14.413102]  kasan_save_track+0x18/0x40
[   14.413256]  kasan_save_alloc_info+0x3b/0x50
[   14.413415]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.413706]  remove_element+0x11e/0x190
[   14.413905]  mempool_alloc_preallocated+0x4d/0x90
[   14.414079]  mempool_oob_right_helper+0x8a/0x380
[   14.414238]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.414466]  kunit_try_run_case+0x1a5/0x480
[   14.414675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.414852]  kthread+0x337/0x6f0
[   14.414973]  ret_from_fork+0x116/0x1d0
[   14.415174]  ret_from_fork_asm+0x1a/0x30
[   14.415383] 
[   14.415484] The buggy address belongs to the object at ffff888102af6600
[   14.415484]  which belongs to the cache kmalloc-128 of size 128
[   14.416139] The buggy address is located 0 bytes to the right of
[   14.416139]  allocated 115-byte region [ffff888102af6600, ffff888102af6673)
[   14.416706] 
[   14.416797] The buggy address belongs to the physical page:
[   14.417007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102af6
[   14.417346] flags: 0x200000000000000(node=0|zone=2)
[   14.417611] page_type: f5(slab)
[   14.417761] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.418005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.418361] page dumped because: kasan: bad access detected
[   14.418583] 
[   14.418656] Memory state around the buggy address:
[   14.418819]  ffff888102af6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.419423]  ffff888102af6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419771] >ffff888102af6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.420073]                                                              ^
[   14.420336]  ffff888102af6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.420602]  ffff888102af6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.421007] ==================================================================
[   14.424962] ==================================================================
[   14.425463] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.425782] Read of size 1 at addr ffff888102b82001 by task kunit_try_catch/240
[   14.426050] 
[   14.426226] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.426277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.426291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.426319] Call Trace:
[   14.426334]  <TASK>
[   14.426352]  dump_stack_lvl+0x73/0xb0
[   14.426382]  print_report+0xd1/0x650
[   14.426405]  ? __virt_addr_valid+0x1db/0x2d0
[   14.426429]  ? mempool_oob_right_helper+0x318/0x380
[   14.426453]  ? kasan_addr_to_slab+0x11/0xa0
[   14.426474]  ? mempool_oob_right_helper+0x318/0x380
[   14.426499]  kasan_report+0x141/0x180
[   14.426520]  ? mempool_oob_right_helper+0x318/0x380
[   14.426549]  __asan_report_load1_noabort+0x18/0x20
[   14.426574]  mempool_oob_right_helper+0x318/0x380
[   14.426600]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.426627]  ? __kasan_check_write+0x18/0x20
[   14.426646]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.426670]  ? finish_task_switch.isra.0+0x153/0x700
[   14.426697]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.426722]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.426750]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.426775]  ? __pfx_mempool_kfree+0x10/0x10
[   14.426799]  ? __pfx_read_tsc+0x10/0x10
[   14.426820]  ? ktime_get_ts64+0x86/0x230
[   14.426845]  kunit_try_run_case+0x1a5/0x480
[   14.426870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.426893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.426917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.426941]  ? __kthread_parkme+0x82/0x180
[   14.426962]  ? preempt_count_sub+0x50/0x80
[   14.426985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.427009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.427033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.427469]  kthread+0x337/0x6f0
[   14.427492]  ? trace_preempt_on+0x20/0xc0
[   14.427518]  ? __pfx_kthread+0x10/0x10
[   14.427539]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.427561]  ? calculate_sigpending+0x7b/0xa0
[   14.427586]  ? __pfx_kthread+0x10/0x10
[   14.427608]  ret_from_fork+0x116/0x1d0
[   14.427626]  ? __pfx_kthread+0x10/0x10
[   14.427646]  ret_from_fork_asm+0x1a/0x30
[   14.427680]  </TASK>
[   14.427693] 
[   14.440554] The buggy address belongs to the physical page:
[   14.441255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b80
[   14.441797] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.442299] flags: 0x200000000000040(head|node=0|zone=2)
[   14.442702] page_type: f8(unknown)
[   14.442836] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.443128] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.443510] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.444121] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.444597] head: 0200000000000002 ffffea00040ae001 00000000ffffffff 00000000ffffffff
[   14.444924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.445562] page dumped because: kasan: bad access detected
[   14.445838] 
[   14.446163] Memory state around the buggy address:
[   14.446504]  ffff888102b81f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.446812]  ffff888102b81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.447338] >ffff888102b82000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.447795]                    ^
[   14.448054]  ffff888102b82080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.448542]  ffff888102b82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.448834] ==================================================================
[   14.461805] ==================================================================
[   14.462721] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.463302] Read of size 1 at addr ffff88810261f2bb by task kunit_try_catch/242
[   14.463818] 
[   14.464239] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.464312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.464325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.464349] Call Trace:
[   14.464362]  <TASK>
[   14.464381]  dump_stack_lvl+0x73/0xb0
[   14.464413]  print_report+0xd1/0x650
[   14.464436]  ? __virt_addr_valid+0x1db/0x2d0
[   14.464461]  ? mempool_oob_right_helper+0x318/0x380
[   14.464484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.464662]  ? mempool_oob_right_helper+0x318/0x380
[   14.464692]  kasan_report+0x141/0x180
[   14.464714]  ? mempool_oob_right_helper+0x318/0x380
[   14.464742]  __asan_report_load1_noabort+0x18/0x20
[   14.464766]  mempool_oob_right_helper+0x318/0x380
[   14.464789]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.464815]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.464839]  ? finish_task_switch.isra.0+0x153/0x700
[   14.464864]  mempool_slab_oob_right+0xed/0x140
[   14.464887]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.464911]  ? __kasan_check_write+0x18/0x20
[   14.464931]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.464955]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.464981]  ? __pfx_read_tsc+0x10/0x10
[   14.465002]  ? ktime_get_ts64+0x86/0x230
[   14.465023]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.465133]  kunit_try_run_case+0x1a5/0x480
[   14.465164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.465187]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.465212]  ? __kthread_parkme+0x82/0x180
[   14.465233]  ? preempt_count_sub+0x50/0x80
[   14.465256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.465278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.465301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.465323]  kthread+0x337/0x6f0
[   14.465341]  ? trace_preempt_on+0x20/0xc0
[   14.465365]  ? __pfx_kthread+0x10/0x10
[   14.465384]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.465405]  ? calculate_sigpending+0x7b/0xa0
[   14.465428]  ? __pfx_kthread+0x10/0x10
[   14.465449]  ret_from_fork+0x116/0x1d0
[   14.465467]  ? __pfx_kthread+0x10/0x10
[   14.465487]  ret_from_fork_asm+0x1a/0x30
[   14.465519]  </TASK>
[   14.465531] 
[   14.478795] Allocated by task 242:
[   14.479355]  kasan_save_stack+0x45/0x70
[   14.479681]  kasan_save_track+0x18/0x40
[   14.479842]  kasan_save_alloc_info+0x3b/0x50
[   14.480306]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.480820]  remove_element+0x11e/0x190
[   14.481010]  mempool_alloc_preallocated+0x4d/0x90
[   14.481361]  mempool_oob_right_helper+0x8a/0x380
[   14.481856]  mempool_slab_oob_right+0xed/0x140
[   14.482171]  kunit_try_run_case+0x1a5/0x480
[   14.482463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.482906]  kthread+0x337/0x6f0
[   14.483077]  ret_from_fork+0x116/0x1d0
[   14.483756]  ret_from_fork_asm+0x1a/0x30
[   14.483957] 
[   14.484038] The buggy address belongs to the object at ffff88810261f240
[   14.484038]  which belongs to the cache test_cache of size 123
[   14.485032] The buggy address is located 0 bytes to the right of
[   14.485032]  allocated 123-byte region [ffff88810261f240, ffff88810261f2bb)
[   14.485923] 
[   14.486059] The buggy address belongs to the physical page:
[   14.486472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261f
[   14.486834] flags: 0x200000000000000(node=0|zone=2)
[   14.487299] page_type: f5(slab)
[   14.487646] raw: 0200000000000000 ffff888101f21500 dead000000000122 0000000000000000
[   14.488059] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.488427] page dumped because: kasan: bad access detected
[   14.488958] 
[   14.489274] Memory state around the buggy address:
[   14.489586]  ffff88810261f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.489989]  ffff88810261f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.490443] >ffff88810261f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.490968]                                         ^
[   14.491481]  ffff88810261f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492028]  ffff88810261f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492359] ==================================================================