Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   35.759456] ==================================================================
[   35.759638] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.759771] Read of size 1 at addr ffff000801aa0573 by task kunit_try_catch/265
[   35.766172] 
[   35.767659] CPU: 7 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   35.767718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.767734] Hardware name: WinLink E850-96 board (DT)
[   35.767755] Call trace:
[   35.767768]  show_stack+0x20/0x38 (C)
[   35.767808]  dump_stack_lvl+0x8c/0xd0
[   35.767849]  print_report+0x118/0x608
[   35.767884]  kasan_report+0xdc/0x128
[   35.767917]  __asan_report_load1_noabort+0x20/0x30
[   35.767947]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.767979]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.768010]  kunit_try_run_case+0x170/0x3f0
[   35.768048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.768086]  kthread+0x328/0x630
[   35.768117]  ret_from_fork+0x10/0x20
[   35.768151] 
[   35.836571] Allocated by task 265:
[   35.839959]  kasan_save_stack+0x3c/0x68
[   35.843774]  kasan_save_track+0x20/0x40
[   35.847594]  kasan_save_alloc_info+0x40/0x58
[   35.851847]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.857142]  remove_element+0x130/0x1f8
[   35.860961]  mempool_alloc_preallocated+0x58/0xc0
[   35.865651]  mempool_oob_right_helper+0x98/0x2f0
[   35.870249]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.874937]  kunit_try_run_case+0x170/0x3f0
[   35.879104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.884572]  kthread+0x328/0x630
[   35.887784]  ret_from_fork+0x10/0x20
[   35.891343] 
[   35.892820] The buggy address belongs to the object at ffff000801aa0500
[   35.892820]  which belongs to the cache kmalloc-128 of size 128
[   35.905322] The buggy address is located 0 bytes to the right of
[   35.905322]  allocated 115-byte region [ffff000801aa0500, ffff000801aa0573)
[   35.918252] 
[   35.919730] The buggy address belongs to the physical page:
[   35.925289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881aa0
[   35.933271] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.940911] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.947854] page_type: f5(slab)
[   35.950991] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.958710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.966439] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.974248] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.982060] head: 0bfffe0000000001 fffffdffe006a801 00000000ffffffff 00000000ffffffff
[   35.989872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.997678] page dumped because: kasan: bad access detected
[   36.003235] 
[   36.004709] Memory state around the buggy address:
[   36.009492]  ffff000801aa0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.016692]  ffff000801aa0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.023898] >ffff000801aa0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.031098]                                                              ^
[   36.037959]  ffff000801aa0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.045165]  ffff000801aa0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.052365] ==================================================================
[   36.296020] ==================================================================
[   36.305752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.313300] Read of size 1 at addr ffff0008061512bb by task kunit_try_catch/269
[   36.320592] 
[   36.322078] CPU: 4 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.322139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.322158] Hardware name: WinLink E850-96 board (DT)
[   36.322180] Call trace:
[   36.322193]  show_stack+0x20/0x38 (C)
[   36.322230]  dump_stack_lvl+0x8c/0xd0
[   36.322267]  print_report+0x118/0x608
[   36.322305]  kasan_report+0xdc/0x128
[   36.322338]  __asan_report_load1_noabort+0x20/0x30
[   36.322371]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.322402]  mempool_slab_oob_right+0xc0/0x118
[   36.322435]  kunit_try_run_case+0x170/0x3f0
[   36.322473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.322511]  kthread+0x328/0x630
[   36.322538]  ret_from_fork+0x10/0x20
[   36.322575] 
[   36.390728] Allocated by task 269:
[   36.394117]  kasan_save_stack+0x3c/0x68
[   36.397933]  kasan_save_track+0x20/0x40
[   36.401752]  kasan_save_alloc_info+0x40/0x58
[   36.406005]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.411215]  remove_element+0x16c/0x1f8
[   36.415033]  mempool_alloc_preallocated+0x58/0xc0
[   36.419721]  mempool_oob_right_helper+0x98/0x2f0
[   36.424321]  mempool_slab_oob_right+0xc0/0x118
[   36.428748]  kunit_try_run_case+0x170/0x3f0
[   36.432915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.438384]  kthread+0x328/0x630
[   36.441595]  ret_from_fork+0x10/0x20
[   36.445154] 
[   36.446633] The buggy address belongs to the object at ffff000806151240
[   36.446633]  which belongs to the cache test_cache of size 123
[   36.459046] The buggy address is located 0 bytes to the right of
[   36.459046]  allocated 123-byte region [ffff000806151240, ffff0008061512bb)
[   36.471977] 
[   36.473455] The buggy address belongs to the physical page:
[   36.479012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886151
[   36.486998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.493506] page_type: f5(slab)
[   36.496643] raw: 0bfffe0000000000 ffff000801de7900 dead000000000122 0000000000000000
[   36.504362] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.512082] page dumped because: kasan: bad access detected
[   36.517637] 
[   36.519111] Memory state around the buggy address:
[   36.523895]  ffff000806151180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.531094]  ffff000806151200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.538300] >ffff000806151280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.545500]                                         ^
[   36.550538]  ffff000806151300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.557743]  ffff000806151380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.564944] ==================================================================
[   36.061524] ==================================================================
[   36.071294] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.078842] Read of size 1 at addr ffff000804b16001 by task kunit_try_catch/267
[   36.086132] 
[   36.087619] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   36.087679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.087695] Hardware name: WinLink E850-96 board (DT)
[   36.087716] Call trace:
[   36.087728]  show_stack+0x20/0x38 (C)
[   36.087764]  dump_stack_lvl+0x8c/0xd0
[   36.087801]  print_report+0x118/0x608
[   36.087839]  kasan_report+0xdc/0x128
[   36.087870]  __asan_report_load1_noabort+0x20/0x30
[   36.087902]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.087936]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   36.087969]  kunit_try_run_case+0x170/0x3f0
[   36.088006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.088045]  kthread+0x328/0x630
[   36.088075]  ret_from_fork+0x10/0x20
[   36.088112] 
[   36.157055] The buggy address belongs to the physical page:
[   36.162611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14
[   36.170593] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.178235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.185176] page_type: f8(unknown)
[   36.188571] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.196293] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.204020] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.211831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.219643] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff
[   36.227455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.235261] page dumped because: kasan: bad access detected
[   36.240818] 
[   36.242292] Memory state around the buggy address:
[   36.247074]  ffff000804b15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.254275]  ffff000804b15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.261482] >ffff000804b16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.268681]                    ^
[   36.271896]  ffff000804b16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.279101]  ffff000804b16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.286303] ==================================================================

[   27.731935] ==================================================================
[   27.732032] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   27.732129] Read of size 1 at addr fff00000c61c8f73 by task kunit_try_catch/222
[   27.732192] 
[   27.732243] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.732349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.732383] Hardware name: linux,dummy-virt (DT)
[   27.732424] Call trace:
[   27.732452]  show_stack+0x20/0x38 (C)
[   27.732521]  dump_stack_lvl+0x8c/0xd0
[   27.732590]  print_report+0x118/0x608
[   27.732648]  kasan_report+0xdc/0x128
[   27.732729]  __asan_report_load1_noabort+0x20/0x30
[   27.732792]  mempool_oob_right_helper+0x2ac/0x2f0
[   27.732855]  mempool_kmalloc_oob_right+0xc4/0x120
[   27.732917]  kunit_try_run_case+0x170/0x3f0
[   27.732981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.733050]  kthread+0x328/0x630
[   27.733104]  ret_from_fork+0x10/0x20
[   27.733165] 
[   27.733187] Allocated by task 222:
[   27.733227]  kasan_save_stack+0x3c/0x68
[   27.733297]  kasan_save_track+0x20/0x40
[   27.733349]  kasan_save_alloc_info+0x40/0x58
[   27.733395]  __kasan_mempool_unpoison_object+0x11c/0x180
[   27.733451]  remove_element+0x130/0x1f8
[   27.733502]  mempool_alloc_preallocated+0x58/0xc0
[   27.733551]  mempool_oob_right_helper+0x98/0x2f0
[   27.733600]  mempool_kmalloc_oob_right+0xc4/0x120
[   27.733647]  kunit_try_run_case+0x170/0x3f0
[   27.733711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.733770]  kthread+0x328/0x630
[   27.733814]  ret_from_fork+0x10/0x20
[   27.733864] 
[   27.733889] The buggy address belongs to the object at fff00000c61c8f00
[   27.733889]  which belongs to the cache kmalloc-128 of size 128
[   27.733961] The buggy address is located 0 bytes to the right of
[   27.733961]  allocated 115-byte region [fff00000c61c8f00, fff00000c61c8f73)
[   27.734037] 
[   27.734065] The buggy address belongs to the physical page:
[   27.734104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061c8
[   27.734172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.734236] page_type: f5(slab)
[   27.734286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   27.734349] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   27.734399] page dumped because: kasan: bad access detected
[   27.734438] 
[   27.734459] Memory state around the buggy address:
[   27.734500]  fff00000c61c8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.734554]  fff00000c61c8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734606] >fff00000c61c8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.734745]                                                              ^
[   27.734857]  fff00000c61c8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734966]  fff00000c61c9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.735061] ==================================================================
[   27.764705] ==================================================================
[   27.764846] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   27.765003] Read of size 1 at addr fff00000c78ce001 by task kunit_try_catch/224
[   27.765262] 
[   27.765430] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.765832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.765978] Hardware name: linux,dummy-virt (DT)
[   27.766067] Call trace:
[   27.766128]  show_stack+0x20/0x38 (C)
[   27.766262]  dump_stack_lvl+0x8c/0xd0
[   27.766382]  print_report+0x118/0x608
[   27.766512]  kasan_report+0xdc/0x128
[   27.766805]  __asan_report_load1_noabort+0x20/0x30
[   27.766953]  mempool_oob_right_helper+0x2ac/0x2f0
[   27.767096]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   27.767287]  kunit_try_run_case+0x170/0x3f0
[   27.767432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.767590]  kthread+0x328/0x630
[   27.767732]  ret_from_fork+0x10/0x20
[   27.767907] 
[   27.767964] The buggy address belongs to the physical page:
[   27.768051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078cc
[   27.768229] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.768399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.768746] page_type: f8(unknown)
[   27.768847] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.768971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.769094] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   27.769326] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.769615] head: 0bfffe0000000002 ffffc1ffc31e3301 00000000ffffffff 00000000ffffffff
[   27.769761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.769872] page dumped because: kasan: bad access detected
[   27.769964] 
[   27.770018] Memory state around the buggy address:
[   27.770111]  fff00000c78cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.770221]  fff00000c78cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.770338] >fff00000c78ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.770437]                    ^
[   27.770508]  fff00000c78ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.770723]  fff00000c78ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.770811] ==================================================================
[   27.801156] ==================================================================
[   27.801331] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   27.801481] Read of size 1 at addr fff00000c78b42bb by task kunit_try_catch/226
[   27.801597] 
[   27.801708] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   27.801932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.802013] Hardware name: linux,dummy-virt (DT)
[   27.802106] Call trace:
[   27.802179]  show_stack+0x20/0x38 (C)
[   27.802316]  dump_stack_lvl+0x8c/0xd0
[   27.802458]  print_report+0x118/0x608
[   27.802595]  kasan_report+0xdc/0x128
[   27.802948]  __asan_report_load1_noabort+0x20/0x30
[   27.803088]  mempool_oob_right_helper+0x2ac/0x2f0
[   27.803284]  mempool_slab_oob_right+0xc0/0x118
[   27.803460]  kunit_try_run_case+0x170/0x3f0
[   27.804674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.805008]  kthread+0x328/0x630
[   27.805155]  ret_from_fork+0x10/0x20
[   27.806023] 
[   27.806564] Allocated by task 226:
[   27.807289]  kasan_save_stack+0x3c/0x68
[   27.807788]  kasan_save_track+0x20/0x40
[   27.808494]  kasan_save_alloc_info+0x40/0x58
[   27.808948]  __kasan_mempool_unpoison_object+0xbc/0x180
[   27.809437]  remove_element+0x16c/0x1f8
[   27.809630]  mempool_alloc_preallocated+0x58/0xc0
[   27.810945]  mempool_oob_right_helper+0x98/0x2f0
[   27.811105]  mempool_slab_oob_right+0xc0/0x118
[   27.811237]  kunit_try_run_case+0x170/0x3f0
[   27.811473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.811811]  kthread+0x328/0x630
[   27.812093]  ret_from_fork+0x10/0x20
[   27.812189] 
[   27.813129] The buggy address belongs to the object at fff00000c78b4240
[   27.813129]  which belongs to the cache test_cache of size 123
[   27.814186] The buggy address is located 0 bytes to the right of
[   27.814186]  allocated 123-byte region [fff00000c78b4240, fff00000c78b42bb)
[   27.814338] 
[   27.814391] The buggy address belongs to the physical page:
[   27.814467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b4
[   27.814592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.816128] page_type: f5(slab)
[   27.816284] raw: 0bfffe0000000000 fff00000c56eb140 dead000000000122 0000000000000000
[   27.816417] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   27.817793] page dumped because: kasan: bad access detected
[   27.818335] 
[   27.818461] Memory state around the buggy address:
[   27.818541]  fff00000c78b4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.818653]  fff00000c78b4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   27.818776] >fff00000c78b4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   27.820176]                                         ^
[   27.820257]  fff00000c78b4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.820361]  fff00000c78b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.820455] ==================================================================

[   20.434859] ==================================================================
[   20.436023] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.437738] Read of size 1 at addr ffff8881022e02bb by task kunit_try_catch/242
[   20.438575] 
[   20.439375] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   20.439476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.439495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.439528] Call Trace:
[   20.439547]  <TASK>
[   20.439571]  dump_stack_lvl+0x73/0xb0
[   20.439612]  print_report+0xd1/0x650
[   20.439646]  ? __virt_addr_valid+0x1db/0x2d0
[   20.439680]  ? mempool_oob_right_helper+0x318/0x380
[   20.439752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.439788]  ? mempool_oob_right_helper+0x318/0x380
[   20.439823]  kasan_report+0x141/0x180
[   20.439854]  ? mempool_oob_right_helper+0x318/0x380
[   20.439894]  __asan_report_load1_noabort+0x18/0x20
[   20.439922]  mempool_oob_right_helper+0x318/0x380
[   20.439958]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.440029]  mempool_slab_oob_right+0xed/0x140
[   20.440060]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   20.440094]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   20.440126]  ? __pfx_mempool_free_slab+0x10/0x10
[   20.440157]  ? __pfx_read_tsc+0x10/0x10
[   20.440228]  ? ktime_get_ts64+0x86/0x230
[   20.440303]  kunit_try_run_case+0x1a5/0x480
[   20.440342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.440371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.440407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.440444]  ? __kthread_parkme+0x82/0x180
[   20.440474]  ? preempt_count_sub+0x50/0x80
[   20.440507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.440536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.440571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.440607]  kthread+0x337/0x6f0
[   20.440634]  ? trace_preempt_on+0x20/0xc0
[   20.440667]  ? __pfx_kthread+0x10/0x10
[   20.440731]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.440768]  ? calculate_sigpending+0x7b/0xa0
[   20.440805]  ? __pfx_kthread+0x10/0x10
[   20.440835]  ret_from_fork+0x116/0x1d0
[   20.440863]  ? __pfx_kthread+0x10/0x10
[   20.440892]  ret_from_fork_asm+0x1a/0x30
[   20.440935]  </TASK>
[   20.440950] 
[   20.459041] Allocated by task 242:
[   20.459458]  kasan_save_stack+0x45/0x70
[   20.459796]  kasan_save_track+0x18/0x40
[   20.460514]  kasan_save_alloc_info+0x3b/0x50
[   20.460949]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   20.461664]  remove_element+0x11e/0x190
[   20.462339]  mempool_alloc_preallocated+0x4d/0x90
[   20.462901]  mempool_oob_right_helper+0x8a/0x380
[   20.463597]  mempool_slab_oob_right+0xed/0x140
[   20.464140]  kunit_try_run_case+0x1a5/0x480
[   20.464749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.465454]  kthread+0x337/0x6f0
[   20.465868]  ret_from_fork+0x116/0x1d0
[   20.466380]  ret_from_fork_asm+0x1a/0x30
[   20.466835] 
[   20.467086] The buggy address belongs to the object at ffff8881022e0240
[   20.467086]  which belongs to the cache test_cache of size 123
[   20.468140] The buggy address is located 0 bytes to the right of
[   20.468140]  allocated 123-byte region [ffff8881022e0240, ffff8881022e02bb)
[   20.469593] 
[   20.469864] The buggy address belongs to the physical page:
[   20.470467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0
[   20.471519] flags: 0x200000000000000(node=0|zone=2)
[   20.472043] page_type: f5(slab)
[   20.472595] raw: 0200000000000000 ffff8881022d3500 dead000000000122 0000000000000000
[   20.473515] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.474322] page dumped because: kasan: bad access detected
[   20.474838] 
[   20.475121] Memory state around the buggy address:
[   20.475705]  ffff8881022e0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.476510]  ffff8881022e0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.477447] >ffff8881022e0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.477937]                                         ^
[   20.478283]  ffff8881022e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.479288]  ffff8881022e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.479815] ==================================================================
[   20.322552] ==================================================================
[   20.323525] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.325146] Read of size 1 at addr ffff8881022c3d73 by task kunit_try_catch/238
[   20.326213] 
[   20.326737] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   20.326926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.327000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.327069] Call Trace:
[   20.327159]  <TASK>
[   20.327216]  dump_stack_lvl+0x73/0xb0
[   20.327310]  print_report+0xd1/0x650
[   20.327395]  ? __virt_addr_valid+0x1db/0x2d0
[   20.327479]  ? mempool_oob_right_helper+0x318/0x380
[   20.327524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.327559]  ? mempool_oob_right_helper+0x318/0x380
[   20.327595]  kasan_report+0x141/0x180
[   20.327629]  ? mempool_oob_right_helper+0x318/0x380
[   20.327672]  __asan_report_load1_noabort+0x18/0x20
[   20.327717]  mempool_oob_right_helper+0x318/0x380
[   20.327772]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.327811]  ? __kasan_check_write+0x18/0x20
[   20.327840]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.327876]  ? finish_task_switch.isra.0+0x153/0x700
[   20.327913]  mempool_kmalloc_oob_right+0xf2/0x150
[   20.327949]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   20.328032]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.328092]  ? __pfx_mempool_kfree+0x10/0x10
[   20.328145]  ? __pfx_read_tsc+0x10/0x10
[   20.328223]  ? ktime_get_ts64+0x86/0x230
[   20.328306]  kunit_try_run_case+0x1a5/0x480
[   20.328344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.328373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.328413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.328449]  ? __kthread_parkme+0x82/0x180
[   20.328479]  ? preempt_count_sub+0x50/0x80
[   20.328513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.328543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.328578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.328613]  kthread+0x337/0x6f0
[   20.328641]  ? trace_preempt_on+0x20/0xc0
[   20.328674]  ? __pfx_kthread+0x10/0x10
[   20.328732]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.328770]  ? calculate_sigpending+0x7b/0xa0
[   20.328807]  ? __pfx_kthread+0x10/0x10
[   20.328838]  ret_from_fork+0x116/0x1d0
[   20.328864]  ? __pfx_kthread+0x10/0x10
[   20.328892]  ret_from_fork_asm+0x1a/0x30
[   20.328936]  </TASK>
[   20.328952] 
[   20.351470] Allocated by task 238:
[   20.351783]  kasan_save_stack+0x45/0x70
[   20.352141]  kasan_save_track+0x18/0x40
[   20.353300]  kasan_save_alloc_info+0x3b/0x50
[   20.353788]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   20.354592]  remove_element+0x11e/0x190
[   20.355046]  mempool_alloc_preallocated+0x4d/0x90
[   20.355601]  mempool_oob_right_helper+0x8a/0x380
[   20.356686]  mempool_kmalloc_oob_right+0xf2/0x150
[   20.357131]  kunit_try_run_case+0x1a5/0x480
[   20.357648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.358629]  kthread+0x337/0x6f0
[   20.359041]  ret_from_fork+0x116/0x1d0
[   20.359458]  ret_from_fork_asm+0x1a/0x30
[   20.359850] 
[   20.360111] The buggy address belongs to the object at ffff8881022c3d00
[   20.360111]  which belongs to the cache kmalloc-128 of size 128
[   20.361703] The buggy address is located 0 bytes to the right of
[   20.361703]  allocated 115-byte region [ffff8881022c3d00, ffff8881022c3d73)
[   20.363127] 
[   20.363434] The buggy address belongs to the physical page:
[   20.364178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c3
[   20.364815] flags: 0x200000000000000(node=0|zone=2)
[   20.365991] page_type: f5(slab)
[   20.366751] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.367442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.367990] page dumped because: kasan: bad access detected
[   20.368410] 
[   20.368954] Memory state around the buggy address:
[   20.369438]  ffff8881022c3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.370503]  ffff8881022c3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.371601] >ffff8881022c3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.372405]                                                              ^
[   20.373466]  ffff8881022c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.374583]  ffff8881022c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.375163] ==================================================================
[   20.381771] ==================================================================
[   20.382753] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.383381] Read of size 1 at addr ffff888102cd6001 by task kunit_try_catch/240
[   20.383947] 
[   20.384992] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   20.385128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.385288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.385359] Call Trace:
[   20.385403]  <TASK>
[   20.385452]  dump_stack_lvl+0x73/0xb0
[   20.385536]  print_report+0xd1/0x650
[   20.385616]  ? __virt_addr_valid+0x1db/0x2d0
[   20.385678]  ? mempool_oob_right_helper+0x318/0x380
[   20.385776]  ? kasan_addr_to_slab+0x11/0xa0
[   20.385811]  ? mempool_oob_right_helper+0x318/0x380
[   20.385848]  kasan_report+0x141/0x180
[   20.385880]  ? mempool_oob_right_helper+0x318/0x380
[   20.385921]  __asan_report_load1_noabort+0x18/0x20
[   20.385951]  mempool_oob_right_helper+0x318/0x380
[   20.386016]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.386054]  ? update_load_avg+0x1be/0x21b0
[   20.386090]  ? dequeue_entities+0x27e/0x1740
[   20.386127]  ? finish_task_switch.isra.0+0x153/0x700
[   20.386167]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   20.386298]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   20.386347]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.386378]  ? __pfx_mempool_kfree+0x10/0x10
[   20.386409]  ? __pfx_read_tsc+0x10/0x10
[   20.386440]  ? ktime_get_ts64+0x86/0x230
[   20.386474]  kunit_try_run_case+0x1a5/0x480
[   20.386507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.386533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.386570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.386606]  ? __kthread_parkme+0x82/0x180
[   20.386635]  ? preempt_count_sub+0x50/0x80
[   20.386667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.386731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.386774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.386811]  kthread+0x337/0x6f0
[   20.386838]  ? trace_preempt_on+0x20/0xc0
[   20.386872]  ? __pfx_kthread+0x10/0x10
[   20.386902]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.386934]  ? calculate_sigpending+0x7b/0xa0
[   20.386993]  ? __pfx_kthread+0x10/0x10
[   20.387030]  ret_from_fork+0x116/0x1d0
[   20.387056]  ? __pfx_kthread+0x10/0x10
[   20.387086]  ret_from_fork_asm+0x1a/0x30
[   20.387130]  </TASK>
[   20.387146] 
[   20.410838] The buggy address belongs to the physical page:
[   20.411929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cd4
[   20.412848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.413954] flags: 0x200000000000040(head|node=0|zone=2)
[   20.414727] page_type: f8(unknown)
[   20.415745] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.416733] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.417642] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.418442] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.419628] head: 0200000000000002 ffffea00040b3501 00000000ffffffff 00000000ffffffff
[   20.420728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.421457] page dumped because: kasan: bad access detected
[   20.421928] 
[   20.422137] Memory state around the buggy address:
[   20.422664]  ffff888102cd5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.423271]  ffff888102cd5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.423851] >ffff888102cd6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.424400]                    ^
[   20.424766]  ffff888102cd6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.425385]  ffff888102cd6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.426324] ==================================================================

[   62.754791] ==================================================================
[   62.766632] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   62.774261] Read of size 1 at addr cc8a6001 by task kunit_try_catch/275
[   62.780914] 
[   62.782409] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   62.782440] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   62.782440] Hardware name: Generic DRA74X (Flattened Device Tree)
[   62.782470] Call trace: 
[   62.782470]  unwind_backtrace from show_stack+0x18/0x1c
[   62.782501]  show_stack from dump_stack_lvl+0x70/0x90
[   62.782531]  dump_stack_lvl from print_report+0x158/0x528
[   62.782562]  print_report from kasan_report+0xdc/0x118
[   62.782562]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   62.782592]  mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108
[   62.782623]  mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8
[   62.782653]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.782684]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   62.782714]  kthread from ret_from_fork+0x14/0x20
[   62.782714] Exception stack(0xf23f3fb0 to 0xf23f3ff8)
[   62.782745] 3fa0:                                     00000000 00000000 00000000 00000000
[   62.782745] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   62.782775] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   62.782775] 
[   62.898223] The buggy address belongs to the physical page:
[   62.903839] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4
[   62.911102] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.918823] flags: 0x40(head|zone=0)
[   62.922424] page_type: f8(unknown)
[   62.925842] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   62.933990] raw: 00000000
[   62.936645] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   62.944854] head: 00000000 00000002 eebc2711 ffffffff 00000000 ffffffff 00000000 ffffffff
[   62.953094] head: 00000000 00000004
[   62.956604] page dumped because: kasan: bad access detected
[   62.962219] 
[   62.963714] Memory state around the buggy address:
[   62.968536]  cc8a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.975097]  cc8a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.981689] >cc8a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   62.988250]            ^
[   62.990814]  cc8a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   62.997375]  cc8a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.003936] ==================================================================
[   62.455444] ==================================================================
[   62.466430] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   62.474060] Read of size 1 at addr cc854573 by task kunit_try_catch/273
[   62.480743] 
[   62.482269] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   62.482299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   62.482299] Hardware name: Generic DRA74X (Flattened Device Tree)
[   62.482330] Call trace: 
[   62.482330]  unwind_backtrace from show_stack+0x18/0x1c
[   62.482360]  show_stack from dump_stack_lvl+0x70/0x90
[   62.482391]  dump_stack_lvl from print_report+0x158/0x528
[   62.482421]  print_report from kasan_report+0xdc/0x118
[   62.482452]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   62.482482]  mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108
[   62.482543]  mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   62.482574]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.482604]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   62.482635]  kthread from ret_from_fork+0x14/0x20
[   62.482666] Exception stack(0xf23e3fb0 to 0xf23e3ff8)
[   62.482696] 3fa0:                                     00000000 00000000 00000000 00000000
[   62.482696] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   62.482727] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   62.482727] 
[   62.597167] Allocated by task 273:
[   62.600585]  kasan_save_track+0x30/0x5c
[   62.604461]  remove_element+0x180/0x264
[   62.608337]  mempool_alloc_preallocated+0x60/0x9c
[   62.613067]  mempool_oob_right_helper+0x94/0x334
[   62.617736]  mempool_kmalloc_oob_right+0xbc/0x108
[   62.622467]  kunit_try_run_case+0x22c/0x5a8
[   62.626678]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.632202]  kthread+0x464/0x810
[   62.635467]  ret_from_fork+0x14/0x20
[   62.639068] 
[   62.640563] The buggy address belongs to the object at cc854500
[   62.640563]  which belongs to the cache kmalloc-128 of size 128
[   62.652465] The buggy address is located 0 bytes to the right of
[   62.652465]  allocated 115-byte region [cc854500, cc854573)
[   62.664123] 
[   62.665618] The buggy address belongs to the physical page:
[   62.671234] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854
[   62.678497] flags: 0x0(zone=0)
[   62.681579] page_type: f5(slab)
[   62.684753] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   62.692901] raw: 00000000
[   62.695526] page dumped because: kasan: bad access detected
[   62.701141] 
[   62.702636] Memory state around the buggy address:
[   62.707458]  cc854400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.714050]  cc854480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.720611] >cc854500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   62.727172]                                                      ^
[   62.733398]  cc854580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.739959]  cc854600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   62.746551] ==================================================================
[   63.013275] ==================================================================
[   63.025604] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   63.033233] Read of size 1 at addr cc8b62bb by task kunit_try_catch/277
[   63.039886] 
[   63.041412] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.041442] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.041442] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.041442] Call trace: 
[   63.041473]  unwind_backtrace from show_stack+0x18/0x1c
[   63.041473]  show_stack from dump_stack_lvl+0x70/0x90
[   63.041503]  dump_stack_lvl from print_report+0x158/0x528
[   63.041534]  print_report from kasan_report+0xdc/0x118
[   63.041564]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   63.041595]  mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100
[   63.041625]  mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8
[   63.041625]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.041656]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.041687]  kthread from ret_from_fork+0x14/0x20
[   63.041717] Exception stack(0xf2403fb0 to 0xf2403ff8)
[   63.041717] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.041748] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.041748] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.041778] 
[   63.155639] Allocated by task 277:
[   63.159057]  kasan_save_track+0x30/0x5c
[   63.162933]  __kasan_mempool_unpoison_object+0xec/0x14c
[   63.168182]  remove_element+0x1d4/0x264
[   63.172058]  mempool_alloc_preallocated+0x60/0x9c
[   63.176788]  mempool_oob_right_helper+0x94/0x334
[   63.181457]  mempool_slab_oob_right+0xb8/0x100
[   63.185943]  kunit_try_run_case+0x22c/0x5a8
[   63.190155]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.195678]  kthread+0x464/0x810
[   63.198944]  ret_from_fork+0x14/0x20
[   63.202545] 
[   63.204040] The buggy address belongs to the object at cc8b6240
[   63.204040]  which belongs to the cache test_cache of size 123
[   63.215850] The buggy address is located 0 bytes to the right of
[   63.215850]  allocated 123-byte region [cc8b6240, cc8b62bb)
[   63.227508] 
[   63.229003] The buggy address belongs to the physical page:
[   63.234619] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8b6
[   63.241882] flags: 0x0(zone=0)
[   63.244964] page_type: f5(slab)
[   63.248138] raw: 00000000 cc85a700 00000122 00000000 00000000 80150015 f5000000 00000000
[   63.256256] raw: 00000000
[   63.258911] page dumped because: kasan: bad access detected
[   63.264526] 
[   63.266021] Memory state around the buggy address:
[   63.270843]  cc8b6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.277404]  cc8b6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   63.283996] >cc8b6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   63.290557]                                 ^
[   63.294921]  cc8b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.301513]  cc8b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.308074] ==================================================================