Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.478263] ==================================================================
[   34.478575] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.479139] Read of size 1 at addr fff00000c5a992bb by task kunit_try_catch/236
[   34.479681] 
[   34.479779] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.480014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.480085] Hardware name: linux,dummy-virt (DT)
[   34.480169] Call trace:
[   34.480227]  show_stack+0x20/0x38 (C)
[   34.481121]  dump_stack_lvl+0x8c/0xd0
[   34.481339]  print_report+0x118/0x608
[   34.481771]  kasan_report+0xdc/0x128
[   34.482317]  __asan_report_load1_noabort+0x20/0x30
[   34.482720]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.483112]  mempool_slab_oob_right+0xc0/0x118
[   34.483408]  kunit_try_run_case+0x170/0x3f0
[   34.483729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.484132]  kthread+0x328/0x630
[   34.484601]  ret_from_fork+0x10/0x20
[   34.484967] 
[   34.485008] Allocated by task 236:
[   34.485065]  kasan_save_stack+0x3c/0x68
[   34.485147]  kasan_save_track+0x20/0x40
[   34.485514]  kasan_save_alloc_info+0x40/0x58
[   34.486109]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.486262]  remove_element+0x16c/0x1f8
[   34.486362]  mempool_alloc_preallocated+0x58/0xc0
[   34.486461]  mempool_oob_right_helper+0x98/0x2f0
[   34.486567]  mempool_slab_oob_right+0xc0/0x118
[   34.487965]  kunit_try_run_case+0x170/0x3f0
[   34.488379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.488703]  kthread+0x328/0x630
[   34.488813]  ret_from_fork+0x10/0x20
[   34.488902] 
[   34.488946] The buggy address belongs to the object at fff00000c5a99240
[   34.488946]  which belongs to the cache test_cache of size 123
[   34.489071] The buggy address is located 0 bytes to the right of
[   34.489071]  allocated 123-byte region [fff00000c5a99240, fff00000c5a992bb)
[   34.489217] 
[   34.489272] The buggy address belongs to the physical page:
[   34.490266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99
[   34.490890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.491262] page_type: f5(slab)
[   34.491490] raw: 0bfffe0000000000 fff00000c59f33c0 dead000000000122 0000000000000000
[   34.492100] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.492282] page dumped because: kasan: bad access detected
[   34.492835] 
[   34.492894] Memory state around the buggy address:
[   34.492989]  fff00000c5a99180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.493097]  fff00000c5a99200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.493212] >fff00000c5a99280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.493308]                                         ^
[   34.493410]  fff00000c5a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.493488]  fff00000c5a99380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.493536] ==================================================================
[   34.417345] ==================================================================
[   34.417591] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.417738] Read of size 1 at addr fff00000c44dff73 by task kunit_try_catch/232
[   34.417808] 
[   34.417863] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.417976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.418009] Hardware name: linux,dummy-virt (DT)
[   34.418056] Call trace:
[   34.418090]  show_stack+0x20/0x38 (C)
[   34.418153]  dump_stack_lvl+0x8c/0xd0
[   34.418212]  print_report+0x118/0x608
[   34.418269]  kasan_report+0xdc/0x128
[   34.418323]  __asan_report_load1_noabort+0x20/0x30
[   34.418381]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.418437]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.418492]  kunit_try_run_case+0x170/0x3f0
[   34.418551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.418625]  kthread+0x328/0x630
[   34.418680]  ret_from_fork+0x10/0x20
[   34.418738] 
[   34.418761] Allocated by task 232:
[   34.418797]  kasan_save_stack+0x3c/0x68
[   34.418850]  kasan_save_track+0x20/0x40
[   34.418895]  kasan_save_alloc_info+0x40/0x58
[   34.418944]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.418996]  remove_element+0x130/0x1f8
[   34.419041]  mempool_alloc_preallocated+0x58/0xc0
[   34.419087]  mempool_oob_right_helper+0x98/0x2f0
[   34.419131]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.419176]  kunit_try_run_case+0x170/0x3f0
[   34.419245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.419298]  kthread+0x328/0x630
[   34.419334]  ret_from_fork+0x10/0x20
[   34.419375] 
[   34.419401] The buggy address belongs to the object at fff00000c44dff00
[   34.419401]  which belongs to the cache kmalloc-128 of size 128
[   34.419495] The buggy address is located 0 bytes to the right of
[   34.419495]  allocated 115-byte region [fff00000c44dff00, fff00000c44dff73)
[   34.419590] 
[   34.419639] The buggy address belongs to the physical page:
[   34.419701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df
[   34.419784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.419867] page_type: f5(slab)
[   34.419934] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.420008] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   34.420066] page dumped because: kasan: bad access detected
[   34.420114] 
[   34.420136] Memory state around the buggy address:
[   34.420191]  fff00000c44dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.420257]  fff00000c44dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.420358] >fff00000c44dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.420458]                                                              ^
[   34.420541]  fff00000c44dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.420641]  fff00000c44e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.420729] ==================================================================
[   34.449189] ==================================================================
[   34.449389] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.449534] Read of size 1 at addr fff00000c5a42001 by task kunit_try_catch/234
[   34.449682] 
[   34.449775] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.450004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.450071] Hardware name: linux,dummy-virt (DT)
[   34.450144] Call trace:
[   34.450201]  show_stack+0x20/0x38 (C)
[   34.450353]  dump_stack_lvl+0x8c/0xd0
[   34.450505]  print_report+0x118/0x608
[   34.450679]  kasan_report+0xdc/0x128
[   34.450831]  __asan_report_load1_noabort+0x20/0x30
[   34.450994]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.451158]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   34.451279]  kunit_try_run_case+0x170/0x3f0
[   34.451451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.451633]  kthread+0x328/0x630
[   34.451721]  ret_from_fork+0x10/0x20
[   34.451834] 
[   34.451927] The buggy address belongs to the physical page:
[   34.452011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a40
[   34.452141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.452383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.452508] page_type: f8(unknown)
[   34.452565] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.452658] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.452798] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.452927] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.453043] head: 0bfffe0000000002 ffffc1ffc3169001 00000000ffffffff 00000000ffffffff
[   34.453135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.453213] page dumped because: kasan: bad access detected
[   34.453301] 
[   34.453345] Memory state around the buggy address:
[   34.453750]  fff00000c5a41f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.454090]  fff00000c5a41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.454309] >fff00000c5a42000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.454419]                    ^
[   34.454489]  fff00000c5a42080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.454595]  fff00000c5a42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.454716] ==================================================================

[   27.205958] ==================================================================
[   27.206359] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   27.206596] Read of size 1 at addr ffff888102b06001 by task kunit_try_catch/252
[   27.206753] 
[   27.207049] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.207155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.207173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.207201] Call Trace:
[   27.207220]  <TASK>
[   27.207245]  dump_stack_lvl+0x73/0xb0
[   27.207296]  print_report+0xd1/0x650
[   27.207323]  ? __virt_addr_valid+0x1db/0x2d0
[   27.207354]  ? mempool_oob_right_helper+0x318/0x380
[   27.207381]  ? kasan_addr_to_slab+0x11/0xa0
[   27.207405]  ? mempool_oob_right_helper+0x318/0x380
[   27.207430]  kasan_report+0x141/0x180
[   27.207469]  ? mempool_oob_right_helper+0x318/0x380
[   27.207501]  __asan_report_load1_noabort+0x18/0x20
[   27.207529]  mempool_oob_right_helper+0x318/0x380
[   27.207556]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.207585]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.207613]  ? finish_task_switch.isra.0+0x153/0x700
[   27.207644]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   27.207671]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   27.207734]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.207780]  ? __pfx_mempool_kfree+0x10/0x10
[   27.207812]  ? __pfx_read_tsc+0x10/0x10
[   27.207841]  ? ktime_get_ts64+0x86/0x230
[   27.207873]  kunit_try_run_case+0x1a5/0x480
[   27.207903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.207929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.207956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.207981]  ? __kthread_parkme+0x82/0x180
[   27.208006]  ? preempt_count_sub+0x50/0x80
[   27.208032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.208061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.208088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.208115]  kthread+0x337/0x6f0
[   27.208137]  ? trace_preempt_on+0x20/0xc0
[   27.208183]  ? __pfx_kthread+0x10/0x10
[   27.208207]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.208232]  ? calculate_sigpending+0x7b/0xa0
[   27.208272]  ? __pfx_kthread+0x10/0x10
[   27.208300]  ret_from_fork+0x116/0x1d0
[   27.208324]  ? __pfx_kthread+0x10/0x10
[   27.208370]  ret_from_fork_asm+0x1a/0x30
[   27.208410]  </TASK>
[   27.208426] 
[   27.215619] The buggy address belongs to the physical page:
[   27.216542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b04
[   27.217501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.217740] flags: 0x200000000000040(head|node=0|zone=2)
[   27.217879] page_type: f8(unknown)
[   27.217980] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.218151] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.218313] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.218489] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.218650] head: 0200000000000002 ffffea00040ac101 00000000ffffffff 00000000ffffffff
[   27.218825] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.220993] page dumped because: kasan: bad access detected
[   27.221336] 
[   27.221434] Memory state around the buggy address:
[   27.221740]  ffff888102b05f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.222076]  ffff888102b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.222616] >ffff888102b06000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.222867]                    ^
[   27.223048]  ffff888102b06080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.223509]  ffff888102b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.224318] ==================================================================
[   27.178998] ==================================================================
[   27.179485] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   27.179795] Read of size 1 at addr ffff888102b17573 by task kunit_try_catch/250
[   27.180143] 
[   27.180579] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.180680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.180697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.180724] Call Trace:
[   27.180743]  <TASK>
[   27.180767]  dump_stack_lvl+0x73/0xb0
[   27.180856]  print_report+0xd1/0x650
[   27.180918]  ? __virt_addr_valid+0x1db/0x2d0
[   27.180952]  ? mempool_oob_right_helper+0x318/0x380
[   27.180991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.181050]  ? mempool_oob_right_helper+0x318/0x380
[   27.181076]  kasan_report+0x141/0x180
[   27.181117]  ? mempool_oob_right_helper+0x318/0x380
[   27.181170]  __asan_report_load1_noabort+0x18/0x20
[   27.181200]  mempool_oob_right_helper+0x318/0x380
[   27.181227]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.181255]  ? finish_task_switch.isra.0+0x153/0x700
[   27.181286]  mempool_kmalloc_oob_right+0xf2/0x150
[   27.181309]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   27.181337]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.181363]  ? __pfx_mempool_kfree+0x10/0x10
[   27.181389]  ? __pfx_read_tsc+0x10/0x10
[   27.181414]  ? ktime_get_ts64+0x86/0x230
[   27.181462]  kunit_try_run_case+0x1a5/0x480
[   27.181494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.181519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.181546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.181570]  ? __kthread_parkme+0x82/0x180
[   27.181595]  ? preempt_count_sub+0x50/0x80
[   27.181619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.181643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.181668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.181692]  kthread+0x337/0x6f0
[   27.181713]  ? trace_preempt_on+0x20/0xc0
[   27.181741]  ? __pfx_kthread+0x10/0x10
[   27.181764]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.181787]  ? calculate_sigpending+0x7b/0xa0
[   27.181817]  ? __pfx_kthread+0x10/0x10
[   27.181840]  ret_from_fork+0x116/0x1d0
[   27.181862]  ? __pfx_kthread+0x10/0x10
[   27.181885]  ret_from_fork_asm+0x1a/0x30
[   27.181919]  </TASK>
[   27.181932] 
[   27.190877] Allocated by task 250:
[   27.191539]  kasan_save_stack+0x45/0x70
[   27.191716]  kasan_save_track+0x18/0x40
[   27.191947]  kasan_save_alloc_info+0x3b/0x50
[   27.192211]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.192587]  remove_element+0x11e/0x190
[   27.192838]  mempool_alloc_preallocated+0x4d/0x90
[   27.192975]  mempool_oob_right_helper+0x8a/0x380
[   27.193200]  mempool_kmalloc_oob_right+0xf2/0x150
[   27.193381]  kunit_try_run_case+0x1a5/0x480
[   27.193510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.193915]  kthread+0x337/0x6f0
[   27.194116]  ret_from_fork+0x116/0x1d0
[   27.194522]  ret_from_fork_asm+0x1a/0x30
[   27.194796] 
[   27.194909] The buggy address belongs to the object at ffff888102b17500
[   27.194909]  which belongs to the cache kmalloc-128 of size 128
[   27.195185] The buggy address is located 0 bytes to the right of
[   27.195185]  allocated 115-byte region [ffff888102b17500, ffff888102b17573)
[   27.195716] 
[   27.195830] The buggy address belongs to the physical page:
[   27.196001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b17
[   27.196472] flags: 0x200000000000000(node=0|zone=2)
[   27.196676] page_type: f5(slab)
[   27.196883] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.197070] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.197691] page dumped because: kasan: bad access detected
[   27.198021] 
[   27.198099] Memory state around the buggy address:
[   27.198245]  ffff888102b17400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.198637]  ffff888102b17480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.198873] >ffff888102b17500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.199245]                                                              ^
[   27.199635]  ffff888102b17580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.199919]  ffff888102b17600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.200233] ==================================================================
[   27.231737] ==================================================================
[   27.232143] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   27.232506] Read of size 1 at addr ffff8881023332bb by task kunit_try_catch/254
[   27.232663] 
[   27.232743] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.232806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.232821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.232848] Call Trace:
[   27.234461]  <TASK>
[   27.234515]  dump_stack_lvl+0x73/0xb0
[   27.234658]  print_report+0xd1/0x650
[   27.234688]  ? __virt_addr_valid+0x1db/0x2d0
[   27.234717]  ? mempool_oob_right_helper+0x318/0x380
[   27.234743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.234774]  ? mempool_oob_right_helper+0x318/0x380
[   27.234799]  kasan_report+0x141/0x180
[   27.234823]  ? mempool_oob_right_helper+0x318/0x380
[   27.234853]  __asan_report_load1_noabort+0x18/0x20
[   27.234880]  mempool_oob_right_helper+0x318/0x380
[   27.234906]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.234934]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.234961]  ? finish_task_switch.isra.0+0x153/0x700
[   27.234990]  mempool_slab_oob_right+0xed/0x140
[   27.235017]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   27.235045]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   27.235073]  ? __pfx_mempool_free_slab+0x10/0x10
[   27.235101]  ? __pfx_read_tsc+0x10/0x10
[   27.235124]  ? ktime_get_ts64+0x86/0x230
[   27.235172]  kunit_try_run_case+0x1a5/0x480
[   27.235202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.235227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.235254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.235279]  ? __kthread_parkme+0x82/0x180
[   27.235302]  ? preempt_count_sub+0x50/0x80
[   27.235327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.235352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.235378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.235403]  kthread+0x337/0x6f0
[   27.235425]  ? trace_preempt_on+0x20/0xc0
[   27.235463]  ? __pfx_kthread+0x10/0x10
[   27.235487]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.235511]  ? calculate_sigpending+0x7b/0xa0
[   27.235556]  ? __pfx_kthread+0x10/0x10
[   27.235585]  ret_from_fork+0x116/0x1d0
[   27.235608]  ? __pfx_kthread+0x10/0x10
[   27.235630]  ret_from_fork_asm+0x1a/0x30
[   27.235666]  </TASK>
[   27.235680] 
[   27.250655] Allocated by task 254:
[   27.251082]  kasan_save_stack+0x45/0x70
[   27.251508]  kasan_save_track+0x18/0x40
[   27.251923]  kasan_save_alloc_info+0x3b/0x50
[   27.252276]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   27.253033]  remove_element+0x11e/0x190
[   27.253502]  mempool_alloc_preallocated+0x4d/0x90
[   27.254051]  mempool_oob_right_helper+0x8a/0x380
[   27.254488]  mempool_slab_oob_right+0xed/0x140
[   27.254977]  kunit_try_run_case+0x1a5/0x480
[   27.255187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.255616]  kthread+0x337/0x6f0
[   27.255854]  ret_from_fork+0x116/0x1d0
[   27.256379]  ret_from_fork_asm+0x1a/0x30
[   27.257349] 
[   27.257709] The buggy address belongs to the object at ffff888102333240
[   27.257709]  which belongs to the cache test_cache of size 123
[   27.258438] The buggy address is located 0 bytes to the right of
[   27.258438]  allocated 123-byte region [ffff888102333240, ffff8881023332bb)
[   27.259312] 
[   27.259530] The buggy address belongs to the physical page:
[   27.259930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102333
[   27.260418] flags: 0x200000000000000(node=0|zone=2)
[   27.261370] page_type: f5(slab)
[   27.261711] raw: 0200000000000000 ffff8881017a3a00 dead000000000122 0000000000000000
[   27.262175] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   27.262774] page dumped because: kasan: bad access detected
[   27.263249] 
[   27.263382] Memory state around the buggy address:
[   27.263791]  ffff888102333180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.264392]  ffff888102333200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   27.265400] >ffff888102333280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   27.265963]                                         ^
[   27.266344]  ffff888102333300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.266892]  ffff888102333380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.267351] ==================================================================