Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.252320] ==================================================================
[   34.252397] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.252476] Read of size 1 at addr fff00000c8636873 by task kunit_try_catch/253
[   34.252527] 
[   34.252569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.252681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.252713] Hardware name: linux,dummy-virt (DT)
[   34.252746] Call trace:
[   34.252774]  show_stack+0x20/0x38 (C)
[   34.252826]  dump_stack_lvl+0x8c/0xd0
[   34.252876]  print_report+0x118/0x5e8
[   34.252921]  kasan_report+0xdc/0x128
[   34.252964]  __asan_report_load1_noabort+0x20/0x30
[   34.253013]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.253065]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.253113]  kunit_try_run_case+0x170/0x3f0
[   34.253162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.253215]  kthread+0x328/0x630
[   34.253258]  ret_from_fork+0x10/0x20
[   34.253309] 
[   34.253329] Allocated by task 253:
[   34.253359]  kasan_save_stack+0x3c/0x68
[   34.253398]  kasan_save_track+0x20/0x40
[   34.253434]  kasan_save_alloc_info+0x40/0x58
[   34.253470]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.253515]  remove_element+0x130/0x1f8
[   34.253553]  mempool_alloc_preallocated+0x58/0xc0
[   34.253594]  mempool_oob_right_helper+0x98/0x2f0
[   34.253634]  mempool_kmalloc_oob_right+0xc4/0x120
[   34.253684]  kunit_try_run_case+0x170/0x3f0
[   34.253721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.253764]  kthread+0x328/0x630
[   34.253795]  ret_from_fork+0x10/0x20
[   34.253831] 
[   34.253851] The buggy address belongs to the object at fff00000c8636800
[   34.253851]  which belongs to the cache kmalloc-128 of size 128
[   34.253909] The buggy address is located 0 bytes to the right of
[   34.253909]  allocated 115-byte region [fff00000c8636800, fff00000c8636873)
[   34.253973] 
[   34.253996] The buggy address belongs to the physical page:
[   34.254034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108636
[   34.254093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.254146] page_type: f5(slab)
[   34.254189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.254239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.254280] page dumped because: kasan: bad access detected
[   34.254311] 
[   34.254331] Memory state around the buggy address:
[   34.254366]  fff00000c8636700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.254410]  fff00000c8636780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254456] >fff00000c8636800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.254495]                                                              ^
[   34.254536]  fff00000c8636880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254578]  fff00000c8636900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.254618] ==================================================================
[   34.269082] ==================================================================
[   34.269147] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.269208] Read of size 1 at addr fff00000c99fe001 by task kunit_try_catch/255
[   34.269257] 
[   34.269291] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.269383] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.269413] Hardware name: linux,dummy-virt (DT)
[   34.269443] Call trace:
[   34.269468]  show_stack+0x20/0x38 (C)
[   34.269514]  dump_stack_lvl+0x8c/0xd0
[   34.269987]  print_report+0x118/0x5e8
[   34.270058]  kasan_report+0xdc/0x128
[   34.270101]  __asan_report_load1_noabort+0x20/0x30
[   34.270659]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.270791]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   34.270849]  kunit_try_run_case+0x170/0x3f0
[   34.270899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.271341]  kthread+0x328/0x630
[   34.271401]  ret_from_fork+0x10/0x20
[   34.272073] 
[   34.272127] The buggy address belongs to the physical page:
[   34.272560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099fc
[   34.273070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.273525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.274084] page_type: f8(unknown)
[   34.274193] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.274244] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.274787] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.274911] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.274960] head: 0bfffe0000000002 ffffc1ffc3267f01 00000000ffffffff 00000000ffffffff
[   34.275531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.275580] page dumped because: kasan: bad access detected
[   34.275613] 
[   34.275632] Memory state around the buggy address:
[   34.276010]  fff00000c99fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.276828]  fff00000c99fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.277185] >fff00000c99fe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.277467]                    ^
[   34.277503]  fff00000c99fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.277950]  fff00000c99fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.278006] ==================================================================
[   34.297527] ==================================================================
[   34.297938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.298022] Read of size 1 at addr fff00000c9a902bb by task kunit_try_catch/257
[   34.298073] 
[   34.298108] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.298202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.298232] Hardware name: linux,dummy-virt (DT)
[   34.298265] Call trace:
[   34.298289]  show_stack+0x20/0x38 (C)
[   34.299693]  dump_stack_lvl+0x8c/0xd0
[   34.299771]  print_report+0x118/0x5e8
[   34.300055]  kasan_report+0xdc/0x128
[   34.300116]  __asan_report_load1_noabort+0x20/0x30
[   34.300223]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.300274]  mempool_slab_oob_right+0xc0/0x118
[   34.300323]  kunit_try_run_case+0x170/0x3f0
[   34.300373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.300608]  kthread+0x328/0x630
[   34.300677]  ret_from_fork+0x10/0x20
[   34.300724] 
[   34.300746] Allocated by task 257:
[   34.300831]  kasan_save_stack+0x3c/0x68
[   34.300938]  kasan_save_track+0x20/0x40
[   34.301017]  kasan_save_alloc_info+0x40/0x58
[   34.301095]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.301175]  remove_element+0x16c/0x1f8
[   34.301229]  mempool_alloc_preallocated+0x58/0xc0
[   34.301317]  mempool_oob_right_helper+0x98/0x2f0
[   34.301357]  mempool_slab_oob_right+0xc0/0x118
[   34.301397]  kunit_try_run_case+0x170/0x3f0
[   34.301434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.301696]  kthread+0x328/0x630
[   34.301736]  ret_from_fork+0x10/0x20
[   34.301921] 
[   34.301946] The buggy address belongs to the object at fff00000c9a90240
[   34.301946]  which belongs to the cache test_cache of size 123
[   34.302226] The buggy address is located 0 bytes to the right of
[   34.302226]  allocated 123-byte region [fff00000c9a90240, fff00000c9a902bb)
[   34.302356] 
[   34.302375] The buggy address belongs to the physical page:
[   34.302409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a90
[   34.302465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.302515] page_type: f5(slab)
[   34.302565] raw: 0bfffe0000000000 fff00000c4517780 dead000000000122 0000000000000000
[   34.302614] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.303055] page dumped because: kasan: bad access detected
[   34.303131] 
[   34.303169] Memory state around the buggy address:
[   34.303295]  fff00000c9a90180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.303349]  fff00000c9a90200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.303397] >fff00000c9a90280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.303459]                                         ^
[   34.303495]  fff00000c9a90300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.303536]  fff00000c9a90380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.303574] ==================================================================

[   27.234646] ==================================================================
[   27.235140] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   27.235475] Read of size 1 at addr ffff888105800873 by task kunit_try_catch/270
[   27.235963] 
[   27.236142] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.236201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.236214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.236238] Call Trace:
[   27.236252]  <TASK>
[   27.236274]  dump_stack_lvl+0x73/0xb0
[   27.236308]  print_report+0xd1/0x640
[   27.236334]  ? __virt_addr_valid+0x1db/0x2d0
[   27.236362]  ? mempool_oob_right_helper+0x318/0x380
[   27.236386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.236414]  ? mempool_oob_right_helper+0x318/0x380
[   27.236438]  kasan_report+0x141/0x180
[   27.236462]  ? mempool_oob_right_helper+0x318/0x380
[   27.236491]  __asan_report_load1_noabort+0x18/0x20
[   27.236516]  mempool_oob_right_helper+0x318/0x380
[   27.236542]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.236568]  ? dequeue_entities+0x23f/0x1630
[   27.236594]  ? __kasan_check_write+0x18/0x20
[   27.236619]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.236642]  ? finish_task_switch.isra.0+0x153/0x700
[   27.236670]  mempool_kmalloc_oob_right+0xf2/0x150
[   27.236694]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   27.236722]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.236748]  ? __pfx_mempool_kfree+0x10/0x10
[   27.236774]  ? __pfx_read_tsc+0x10/0x10
[   27.237314]  ? ktime_get_ts64+0x86/0x230
[   27.237345]  kunit_try_run_case+0x1a5/0x480
[   27.237376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.237402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.237427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.237455]  ? __kthread_parkme+0x82/0x180
[   27.237477]  ? preempt_count_sub+0x50/0x80
[   27.237502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.237527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.237553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.237578]  kthread+0x337/0x6f0
[   27.237600]  ? trace_preempt_on+0x20/0xc0
[   27.237626]  ? __pfx_kthread+0x10/0x10
[   27.237647]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.237675]  ? calculate_sigpending+0x7b/0xa0
[   27.237701]  ? __pfx_kthread+0x10/0x10
[   27.237723]  ret_from_fork+0x116/0x1d0
[   27.237745]  ? __pfx_kthread+0x10/0x10
[   27.237766]  ret_from_fork_asm+0x1a/0x30
[   27.237855]  </TASK>
[   27.237869] 
[   27.249782] Allocated by task 270:
[   27.250330]  kasan_save_stack+0x45/0x70
[   27.250517]  kasan_save_track+0x18/0x40
[   27.250691]  kasan_save_alloc_info+0x3b/0x50
[   27.251176]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.251657]  remove_element+0x11e/0x190
[   27.251827]  mempool_alloc_preallocated+0x4d/0x90
[   27.252282]  mempool_oob_right_helper+0x8a/0x380
[   27.252481]  mempool_kmalloc_oob_right+0xf2/0x150
[   27.252660]  kunit_try_run_case+0x1a5/0x480
[   27.252971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.253156]  kthread+0x337/0x6f0
[   27.253320]  ret_from_fork+0x116/0x1d0
[   27.253609]  ret_from_fork_asm+0x1a/0x30
[   27.253775] 
[   27.253907] The buggy address belongs to the object at ffff888105800800
[   27.253907]  which belongs to the cache kmalloc-128 of size 128
[   27.254414] The buggy address is located 0 bytes to the right of
[   27.254414]  allocated 115-byte region [ffff888105800800, ffff888105800873)
[   27.254858] 
[   27.254960] The buggy address belongs to the physical page:
[   27.255363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105800
[   27.255662] flags: 0x200000000000000(node=0|zone=2)
[   27.255831] page_type: f5(slab)
[   27.256050] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.256365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.256622] page dumped because: kasan: bad access detected
[   27.256995] 
[   27.257081] Memory state around the buggy address:
[   27.257288]  ffff888105800700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.257544]  ffff888105800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.257971] >ffff888105800800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.258256]                                                              ^
[   27.258561]  ffff888105800880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.258853]  ffff888105800900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.259140] ==================================================================
[   27.263766] ==================================================================
[   27.264339] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   27.264659] Read of size 1 at addr ffff88810636e001 by task kunit_try_catch/272
[   27.265558] 
[   27.265677] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.265732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.265745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.265768] Call Trace:
[   27.265782]  <TASK>
[   27.265801]  dump_stack_lvl+0x73/0xb0
[   27.266019]  print_report+0xd1/0x640
[   27.266045]  ? __virt_addr_valid+0x1db/0x2d0
[   27.266086]  ? mempool_oob_right_helper+0x318/0x380
[   27.266110]  ? kasan_addr_to_slab+0x11/0xa0
[   27.266132]  ? mempool_oob_right_helper+0x318/0x380
[   27.266156]  kasan_report+0x141/0x180
[   27.266180]  ? mempool_oob_right_helper+0x318/0x380
[   27.266209]  __asan_report_load1_noabort+0x18/0x20
[   27.266234]  mempool_oob_right_helper+0x318/0x380
[   27.266259]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.266286]  ? dequeue_entities+0x23f/0x1630
[   27.266313]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.266335]  ? finish_task_switch.isra.0+0x153/0x700
[   27.266362]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   27.266388]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   27.266417]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.266441]  ? __pfx_mempool_kfree+0x10/0x10
[   27.266467]  ? __pfx_read_tsc+0x10/0x10
[   27.266490]  ? ktime_get_ts64+0x86/0x230
[   27.266515]  kunit_try_run_case+0x1a5/0x480
[   27.266540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.266565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.266590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.266617]  ? __kthread_parkme+0x82/0x180
[   27.266639]  ? preempt_count_sub+0x50/0x80
[   27.266663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.266688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.266714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.266739]  kthread+0x337/0x6f0
[   27.266759]  ? trace_preempt_on+0x20/0xc0
[   27.266794]  ? __pfx_kthread+0x10/0x10
[   27.266817]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.266842]  ? calculate_sigpending+0x7b/0xa0
[   27.266868]  ? __pfx_kthread+0x10/0x10
[   27.266891]  ret_from_fork+0x116/0x1d0
[   27.266911]  ? __pfx_kthread+0x10/0x10
[   27.266933]  ret_from_fork_asm+0x1a/0x30
[   27.266977]  </TASK>
[   27.266990] 
[   27.278228] The buggy address belongs to the physical page:
[   27.278595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636c
[   27.279101] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.279415] flags: 0x200000000000040(head|node=0|zone=2)
[   27.279645] page_type: f8(unknown)
[   27.279890] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.280229] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.280506] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.280762] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.281186] head: 0200000000000002 ffffea000418db01 00000000ffffffff 00000000ffffffff
[   27.281650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.282039] page dumped because: kasan: bad access detected
[   27.282369] 
[   27.282440] Memory state around the buggy address:
[   27.282637]  ffff88810636df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.283057]  ffff88810636df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.283322] >ffff88810636e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.283599]                    ^
[   27.283781]  ffff88810636e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.284032]  ffff88810636e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.284469] ==================================================================
[   27.288603] ==================================================================
[   27.289467] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   27.289795] Read of size 1 at addr ffff8881062632bb by task kunit_try_catch/274
[   27.290530] 
[   27.290634] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.290689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.290702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.290727] Call Trace:
[   27.290741]  <TASK>
[   27.290874]  dump_stack_lvl+0x73/0xb0
[   27.290986]  print_report+0xd1/0x640
[   27.291013]  ? __virt_addr_valid+0x1db/0x2d0
[   27.291040]  ? mempool_oob_right_helper+0x318/0x380
[   27.291065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.291156]  ? mempool_oob_right_helper+0x318/0x380
[   27.291183]  kasan_report+0x141/0x180
[   27.291206]  ? mempool_oob_right_helper+0x318/0x380
[   27.291236]  __asan_report_load1_noabort+0x18/0x20
[   27.291260]  mempool_oob_right_helper+0x318/0x380
[   27.291286]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.291313]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.291337]  ? finish_task_switch.isra.0+0x153/0x700
[   27.291365]  mempool_slab_oob_right+0xed/0x140
[   27.291390]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   27.291417]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   27.291444]  ? __pfx_mempool_free_slab+0x10/0x10
[   27.291471]  ? __pfx_read_tsc+0x10/0x10
[   27.291494]  ? ktime_get_ts64+0x86/0x230
[   27.291520]  kunit_try_run_case+0x1a5/0x480
[   27.291548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.291572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.291595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.291623]  ? __kthread_parkme+0x82/0x180
[   27.291646]  ? preempt_count_sub+0x50/0x80
[   27.291670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.291694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.291719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.291744]  kthread+0x337/0x6f0
[   27.291765]  ? trace_preempt_on+0x20/0xc0
[   27.291809]  ? __pfx_kthread+0x10/0x10
[   27.291831]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.291856]  ? calculate_sigpending+0x7b/0xa0
[   27.291882]  ? __pfx_kthread+0x10/0x10
[   27.291904]  ret_from_fork+0x116/0x1d0
[   27.291923]  ? __pfx_kthread+0x10/0x10
[   27.291957]  ret_from_fork_asm+0x1a/0x30
[   27.291990]  </TASK>
[   27.292002] 
[   27.307836] Allocated by task 274:
[   27.308008]  kasan_save_stack+0x45/0x70
[   27.308705]  kasan_save_track+0x18/0x40
[   27.309099]  kasan_save_alloc_info+0x3b/0x50
[   27.309724]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   27.310417]  remove_element+0x11e/0x190
[   27.310580]  mempool_alloc_preallocated+0x4d/0x90
[   27.310750]  mempool_oob_right_helper+0x8a/0x380
[   27.311278]  mempool_slab_oob_right+0xed/0x140
[   27.311720]  kunit_try_run_case+0x1a5/0x480
[   27.312258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.312896]  kthread+0x337/0x6f0
[   27.313400]  ret_from_fork+0x116/0x1d0
[   27.313768]  ret_from_fork_asm+0x1a/0x30
[   27.314103] 
[   27.314179] The buggy address belongs to the object at ffff888106263240
[   27.314179]  which belongs to the cache test_cache of size 123
[   27.314567] The buggy address is located 0 bytes to the right of
[   27.314567]  allocated 123-byte region [ffff888106263240, ffff8881062632bb)
[   27.314999] 
[   27.315078] The buggy address belongs to the physical page:
[   27.315554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106263
[   27.315873] flags: 0x200000000000000(node=0|zone=2)
[   27.316362] page_type: f5(slab)
[   27.316553] raw: 0200000000000000 ffff8881062583c0 dead000000000122 0000000000000000
[   27.317104] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   27.317395] page dumped because: kasan: bad access detected
[   27.317756] 
[   27.317955] Memory state around the buggy address:
[   27.318155]  ffff888106263180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.318621]  ffff888106263200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   27.318958] >ffff888106263280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   27.319221]                                         ^
[   27.319522]  ffff888106263300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.319933]  ffff888106263380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.320362] ==================================================================