Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.806154] ==================================================================
[   18.806226] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.806290] Read of size 1 at addr fff00000c7952001 by task kunit_try_catch/223
[   18.806409] 
[   18.806450] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.806535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.806563] Hardware name: linux,dummy-virt (DT)
[   18.806592] Call trace:
[   18.806616]  show_stack+0x20/0x38 (C)
[   18.806670]  dump_stack_lvl+0x8c/0xd0
[   18.806719]  print_report+0x118/0x608
[   18.806767]  kasan_report+0xdc/0x128
[   18.806814]  __asan_report_load1_noabort+0x20/0x30
[   18.806867]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.806918]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.806971]  kunit_try_run_case+0x170/0x3f0
[   18.807022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.807076]  kthread+0x328/0x630
[   18.807121]  ret_from_fork+0x10/0x20
[   18.807169] 
[   18.807192] The buggy address belongs to the physical page:
[   18.807227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107950
[   18.807283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.807332] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.807404] page_type: f8(unknown)
[   18.807452] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.807503] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.807554] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.807604] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.807654] head: 0bfffe0000000002 ffffc1ffc31e5401 00000000ffffffff 00000000ffffffff
[   18.807703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.807741] page dumped because: kasan: bad access detected
[   18.807773] 
[   18.807791] Memory state around the buggy address:
[   18.807824]  fff00000c7951f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.807867]  fff00000c7951f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.807908] >fff00000c7952000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.807947]                    ^
[   18.807975]  fff00000c7952080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.808017]  fff00000c7952100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.808054] ==================================================================
[   18.775390] ==================================================================
[   18.775469] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.775546] Read of size 1 at addr fff00000c401eb73 by task kunit_try_catch/221
[   18.775594] 
[   18.775638] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.775727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.775755] Hardware name: linux,dummy-virt (DT)
[   18.775789] Call trace:
[   18.775815]  show_stack+0x20/0x38 (C)
[   18.775869]  dump_stack_lvl+0x8c/0xd0
[   18.775922]  print_report+0x118/0x608
[   18.775971]  kasan_report+0xdc/0x128
[   18.776016]  __asan_report_load1_noabort+0x20/0x30
[   18.776069]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.776119]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.776170]  kunit_try_run_case+0x170/0x3f0
[   18.776224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.776281]  kthread+0x328/0x630
[   18.776327]  ret_from_fork+0x10/0x20
[   18.776391] 
[   18.776409] Allocated by task 221:
[   18.776440]  kasan_save_stack+0x3c/0x68
[   18.776483]  kasan_save_track+0x20/0x40
[   18.776522]  kasan_save_alloc_info+0x40/0x58
[   18.776563]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.776609]  remove_element+0x130/0x1f8
[   18.776647]  mempool_alloc_preallocated+0x58/0xc0
[   18.776687]  mempool_oob_right_helper+0x98/0x2f0
[   18.776728]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.776769]  kunit_try_run_case+0x170/0x3f0
[   18.776808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.776852]  kthread+0x328/0x630
[   18.776885]  ret_from_fork+0x10/0x20
[   18.776921] 
[   18.776941] The buggy address belongs to the object at fff00000c401eb00
[   18.776941]  which belongs to the cache kmalloc-128 of size 128
[   18.776999] The buggy address is located 0 bytes to the right of
[   18.776999]  allocated 115-byte region [fff00000c401eb00, fff00000c401eb73)
[   18.777063] 
[   18.777084] The buggy address belongs to the physical page:
[   18.777119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10401e
[   18.777173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.777227] page_type: f5(slab)
[   18.777269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.777319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.777371] page dumped because: kasan: bad access detected
[   18.777402] 
[   18.777420] Memory state around the buggy address:
[   18.777454]  fff00000c401ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.777497]  fff00000c401ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.777539] >fff00000c401eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.777580]                                                              ^
[   18.777619]  fff00000c401eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.777660]  fff00000c401ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.777698] ==================================================================
[   18.820284] ==================================================================
[   18.820630] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.821027] Read of size 1 at addr fff00000c6bf02bb by task kunit_try_catch/225
[   18.821295] 
[   18.821561] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.821967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.822002] Hardware name: linux,dummy-virt (DT)
[   18.822035] Call trace:
[   18.822059]  show_stack+0x20/0x38 (C)
[   18.822112]  dump_stack_lvl+0x8c/0xd0
[   18.822163]  print_report+0x118/0x608
[   18.822235]  kasan_report+0xdc/0x128
[   18.822285]  __asan_report_load1_noabort+0x20/0x30
[   18.822583]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.822894]  mempool_slab_oob_right+0xc0/0x118
[   18.822947]  kunit_try_run_case+0x170/0x3f0
[   18.823005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.823084]  kthread+0x328/0x630
[   18.823127]  ret_from_fork+0x10/0x20
[   18.823174] 
[   18.823194] Allocated by task 225:
[   18.823437]  kasan_save_stack+0x3c/0x68
[   18.823678]  kasan_save_track+0x20/0x40
[   18.823740]  kasan_save_alloc_info+0x40/0x58
[   18.823781]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.823853]  remove_element+0x16c/0x1f8
[   18.823906]  mempool_alloc_preallocated+0x58/0xc0
[   18.823945]  mempool_oob_right_helper+0x98/0x2f0
[   18.823984]  mempool_slab_oob_right+0xc0/0x118
[   18.824027]  kunit_try_run_case+0x170/0x3f0
[   18.824077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.824123]  kthread+0x328/0x630
[   18.824157]  ret_from_fork+0x10/0x20
[   18.824467] 
[   18.824488] The buggy address belongs to the object at fff00000c6bf0240
[   18.824488]  which belongs to the cache test_cache of size 123
[   18.824848] The buggy address is located 0 bytes to the right of
[   18.824848]  allocated 123-byte region [fff00000c6bf0240, fff00000c6bf02bb)
[   18.824989] 
[   18.825011] The buggy address belongs to the physical page:
[   18.825148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106bf0
[   18.825215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.825402] page_type: f5(slab)
[   18.825443] raw: 0bfffe0000000000 fff00000c3e02a00 dead000000000122 0000000000000000
[   18.825551] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.825749] page dumped because: kasan: bad access detected
[   18.825780] 
[   18.825800] Memory state around the buggy address:
[   18.825898]  fff00000c6bf0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.825994]  fff00000c6bf0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.826036] >fff00000c6bf0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.826301]                                         ^
[   18.826353]  fff00000c6bf0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.826398]  fff00000c6bf0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.826436] ==================================================================

[   13.925919] ==================================================================
[   13.926577] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.927054] Read of size 1 at addr ffff888102ad2001 by task kunit_try_catch/240
[   13.927624] 
[   13.927759] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.927804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.927914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.927954] Call Trace:
[   13.927968]  <TASK>
[   13.927984]  dump_stack_lvl+0x73/0xb0
[   13.928016]  print_report+0xd1/0x650
[   13.928052]  ? __virt_addr_valid+0x1db/0x2d0
[   13.928079]  ? mempool_oob_right_helper+0x318/0x380
[   13.928104]  ? kasan_addr_to_slab+0x11/0xa0
[   13.928127]  ? mempool_oob_right_helper+0x318/0x380
[   13.928153]  kasan_report+0x141/0x180
[   13.928175]  ? mempool_oob_right_helper+0x318/0x380
[   13.928204]  __asan_report_load1_noabort+0x18/0x20
[   13.928229]  mempool_oob_right_helper+0x318/0x380
[   13.928255]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.928281]  ? __kasan_check_write+0x18/0x20
[   13.928301]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.928324]  ? finish_task_switch.isra.0+0x153/0x700
[   13.928351]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   13.928376]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.928405]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.928429]  ? __pfx_mempool_kfree+0x10/0x10
[   13.928455]  ? __pfx_read_tsc+0x10/0x10
[   13.928478]  ? ktime_get_ts64+0x86/0x230
[   13.928503]  kunit_try_run_case+0x1a5/0x480
[   13.928527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.928550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.928574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.928598]  ? __kthread_parkme+0x82/0x180
[   13.928618]  ? preempt_count_sub+0x50/0x80
[   13.928641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.928665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.928690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.928716]  kthread+0x337/0x6f0
[   13.928735]  ? trace_preempt_on+0x20/0xc0
[   13.928759]  ? __pfx_kthread+0x10/0x10
[   13.928781]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.928803]  ? calculate_sigpending+0x7b/0xa0
[   13.928906]  ? __pfx_kthread+0x10/0x10
[   13.928928]  ret_from_fork+0x116/0x1d0
[   13.928957]  ? __pfx_kthread+0x10/0x10
[   13.928978]  ret_from_fork_asm+0x1a/0x30
[   13.929008]  </TASK>
[   13.929018] 
[   13.941594] The buggy address belongs to the physical page:
[   13.942458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad0
[   13.942799] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.943275] flags: 0x200000000000040(head|node=0|zone=2)
[   13.943538] page_type: f8(unknown)
[   13.943706] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.944450] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.944756] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.945278] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.945747] head: 0200000000000002 ffffea00040ab401 00000000ffffffff 00000000ffffffff
[   13.946281] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.946683] page dumped because: kasan: bad access detected
[   13.947124] 
[   13.947326] Memory state around the buggy address:
[   13.947693]  ffff888102ad1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.948274]  ffff888102ad1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.948596] >ffff888102ad2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.949086]                    ^
[   13.949422]  ffff888102ad2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.949780]  ffff888102ad2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.950263] ==================================================================
[   13.897896] ==================================================================
[   13.898420] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.898767] Read of size 1 at addr ffff888102b0c973 by task kunit_try_catch/238
[   13.899352] 
[   13.899456] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.899507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.899520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.899544] Call Trace:
[   13.899557]  <TASK>
[   13.899579]  dump_stack_lvl+0x73/0xb0
[   13.899612]  print_report+0xd1/0x650
[   13.899821]  ? __virt_addr_valid+0x1db/0x2d0
[   13.899850]  ? mempool_oob_right_helper+0x318/0x380
[   13.899875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.899900]  ? mempool_oob_right_helper+0x318/0x380
[   13.899924]  kasan_report+0x141/0x180
[   13.899953]  ? mempool_oob_right_helper+0x318/0x380
[   13.899981]  __asan_report_load1_noabort+0x18/0x20
[   13.900018]  mempool_oob_right_helper+0x318/0x380
[   13.900055]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.900226]  ? __kasan_check_write+0x18/0x20
[   13.900250]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.900275]  ? finish_task_switch.isra.0+0x153/0x700
[   13.900303]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.900327]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.900355]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.900381]  ? __pfx_mempool_kfree+0x10/0x10
[   13.900406]  ? __pfx_read_tsc+0x10/0x10
[   13.900430]  ? ktime_get_ts64+0x86/0x230
[   13.900456]  kunit_try_run_case+0x1a5/0x480
[   13.900483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.900506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.900531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.900555]  ? __kthread_parkme+0x82/0x180
[   13.900577]  ? preempt_count_sub+0x50/0x80
[   13.900600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.900624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.900650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.900675]  kthread+0x337/0x6f0
[   13.900696]  ? __pfx_kthread+0x10/0x10
[   13.900715]  ? recalc_sigpending+0x168/0x1f0
[   13.900738]  ? calculate_sigpending+0x7b/0xa0
[   13.900761]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.900783]  ? __x86_indirect_its_thunk_r15+0x80/0x80
[   13.900810]  ? __pfx_kthread+0x10/0x10
[   13.900831]  ret_from_fork+0x116/0x1d0
[   13.900851]  ? __pfx_kthread+0x10/0x10
[   13.900871]  ret_from_fork_asm+0x1a/0x30
[   13.900903]  </TASK>
[   13.900914] 
[   13.913454] Allocated by task 238:
[   13.913640]  kasan_save_stack+0x45/0x70
[   13.913791]  kasan_save_track+0x18/0x40
[   13.913977]  kasan_save_alloc_info+0x3b/0x50
[   13.914244]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.914423]  remove_element+0x11e/0x190
[   13.914690]  mempool_alloc_preallocated+0x4d/0x90
[   13.915041]  mempool_oob_right_helper+0x8a/0x380
[   13.915230]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.915465]  kunit_try_run_case+0x1a5/0x480
[   13.915643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.915959]  kthread+0x337/0x6f0
[   13.916110]  ret_from_fork+0x116/0x1d0
[   13.916289]  ret_from_fork_asm+0x1a/0x30
[   13.916430] 
[   13.916500] The buggy address belongs to the object at ffff888102b0c900
[   13.916500]  which belongs to the cache kmalloc-128 of size 128
[   13.917099] The buggy address is located 0 bytes to the right of
[   13.917099]  allocated 115-byte region [ffff888102b0c900, ffff888102b0c973)
[   13.917778] 
[   13.917924] The buggy address belongs to the physical page:
[   13.918367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b0c
[   13.918652] flags: 0x200000000000000(node=0|zone=2)
[   13.918905] page_type: f5(slab)
[   13.919084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.919339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.919642] page dumped because: kasan: bad access detected
[   13.919889] 
[   13.919980] Memory state around the buggy address:
[   13.920174]  ffff888102b0c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.920493]  ffff888102b0c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.920727] >ffff888102b0c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.920995]                                                              ^
[   13.921310]  ffff888102b0c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.921710]  ffff888102b0ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.922064] ==================================================================
[   13.954754] ==================================================================
[   13.955561] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.956166] Read of size 1 at addr ffff8881027ad2bb by task kunit_try_catch/242
[   13.956672] 
[   13.956815] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.957020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.957051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.957073] Call Trace:
[   13.957086]  <TASK>
[   13.957104]  dump_stack_lvl+0x73/0xb0
[   13.957139]  print_report+0xd1/0x650
[   13.957161]  ? __virt_addr_valid+0x1db/0x2d0
[   13.957186]  ? mempool_oob_right_helper+0x318/0x380
[   13.957210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.957233]  ? mempool_oob_right_helper+0x318/0x380
[   13.957257]  kasan_report+0x141/0x180
[   13.957279]  ? mempool_oob_right_helper+0x318/0x380
[   13.957307]  __asan_report_load1_noabort+0x18/0x20
[   13.957332]  mempool_oob_right_helper+0x318/0x380
[   13.957357]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.957385]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.957409]  ? finish_task_switch.isra.0+0x153/0x700
[   13.957435]  mempool_slab_oob_right+0xed/0x140
[   13.957460]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.957488]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.957513]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.957540]  ? __pfx_read_tsc+0x10/0x10
[   13.957561]  ? ktime_get_ts64+0x86/0x230
[   13.957585]  kunit_try_run_case+0x1a5/0x480
[   13.957611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.957634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.957658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.957682]  ? __kthread_parkme+0x82/0x180
[   13.957703]  ? preempt_count_sub+0x50/0x80
[   13.957726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.957751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.957775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.957801]  kthread+0x337/0x6f0
[   13.957912]  ? trace_preempt_on+0x20/0xc0
[   13.957939]  ? __pfx_kthread+0x10/0x10
[   13.957959]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.957981]  ? calculate_sigpending+0x7b/0xa0
[   13.958006]  ? __pfx_kthread+0x10/0x10
[   13.958040]  ret_from_fork+0x116/0x1d0
[   13.958058]  ? __pfx_kthread+0x10/0x10
[   13.958080]  ret_from_fork_asm+0x1a/0x30
[   13.958111]  </TASK>
[   13.958122] 
[   13.970525] Allocated by task 242:
[   13.970683]  kasan_save_stack+0x45/0x70
[   13.971127]  kasan_save_track+0x18/0x40
[   13.971451]  kasan_save_alloc_info+0x3b/0x50
[   13.971696]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.972171]  remove_element+0x11e/0x190
[   13.972490]  mempool_alloc_preallocated+0x4d/0x90
[   13.972734]  mempool_oob_right_helper+0x8a/0x380
[   13.973208]  mempool_slab_oob_right+0xed/0x140
[   13.973431]  kunit_try_run_case+0x1a5/0x480
[   13.973706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.974186]  kthread+0x337/0x6f0
[   13.974325]  ret_from_fork+0x116/0x1d0
[   13.974693]  ret_from_fork_asm+0x1a/0x30
[   13.974908] 
[   13.975109] The buggy address belongs to the object at ffff8881027ad240
[   13.975109]  which belongs to the cache test_cache of size 123
[   13.975576] The buggy address is located 0 bytes to the right of
[   13.975576]  allocated 123-byte region [ffff8881027ad240, ffff8881027ad2bb)
[   13.976438] 
[   13.976542] The buggy address belongs to the physical page:
[   13.977055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027ad
[   13.977520] flags: 0x200000000000000(node=0|zone=2)
[   13.977821] page_type: f5(slab)
[   13.978194] raw: 0200000000000000 ffff8881027a43c0 dead000000000122 0000000000000000
[   13.978478] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.978711] page dumped because: kasan: bad access detected
[   13.978895] 
[   13.978967] Memory state around the buggy address:
[   13.979243]  ffff8881027ad180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.979737]  ffff8881027ad200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.980444] >ffff8881027ad280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.980948]                                         ^
[   13.981331]  ffff8881027ad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.981549]  ffff8881027ad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.981763] ==================================================================