Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.597971] ==================================================================
[   21.598631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   21.598923] Read of size 1 at addr fff00000c6cca2bb by task kunit_try_catch/212
[   21.599531] 
[   21.599725] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.599831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.599864] Hardware name: linux,dummy-virt (DT)
[   21.599904] Call trace:
[   21.599930]  dump_backtrace+0x9c/0x128
[   21.599982]  show_stack+0x20/0x38
[   21.600021]  dump_stack_lvl+0x8c/0xd0
[   21.600070]  print_report+0x118/0x5f0
[   21.600112]  kasan_report+0xdc/0x128
[   21.600152]  __asan_report_load1_noabort+0x20/0x30
[   21.600200]  mempool_oob_right_helper+0x2b8/0x2f8
[   21.600260]  mempool_slab_oob_right+0xc0/0x118
[   21.600312]  kunit_try_run_case+0x170/0x3f0
[   21.600358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.600438]  kthread+0x24c/0x2d0
[   21.600826]  ret_from_fork+0x10/0x20
[   21.600881] 
[   21.604592] Allocated by task 212:
[   21.604782]  kasan_save_stack+0x3c/0x68
[   21.605078]  kasan_save_track+0x20/0x40
[   21.605634]  kasan_save_alloc_info+0x40/0x58
[   21.605905]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.606170]  remove_element+0x16c/0x1f8
[   21.606425]  mempool_alloc_preallocated+0x58/0xc0
[   21.606609]  mempool_oob_right_helper+0x98/0x2f8
[   21.606995]  mempool_slab_oob_right+0xc0/0x118
[   21.607571]  kunit_try_run_case+0x170/0x3f0
[   21.607789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.608082]  kthread+0x24c/0x2d0
[   21.608366]  ret_from_fork+0x10/0x20
[   21.608602] 
[   21.608778] The buggy address belongs to the object at fff00000c6cca240
[   21.608778]  which belongs to the cache test_cache of size 123
[   21.609246] The buggy address is located 0 bytes to the right of
[   21.609246]  allocated 123-byte region [fff00000c6cca240, fff00000c6cca2bb)
[   21.609801] 
[   21.609977] The buggy address belongs to the physical page:
[   21.610225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cca
[   21.610651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.611056] page_type: f5(slab)
[   21.611570] raw: 0bfffe0000000000 fff00000ffeaef00 dead000000000122 0000000000000000
[   21.611961] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   21.612454] page dumped because: kasan: bad access detected
[   21.612771] 
[   21.612940] Memory state around the buggy address:
[   21.613141]  fff00000c6cca180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.613544]  fff00000c6cca200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.613941] >fff00000c6cca280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.614428]                                         ^
[   21.614687]  fff00000c6cca300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.615254]  fff00000c6cca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.615596] ==================================================================
[   21.545148] ==================================================================
[   21.545823] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   21.546401] Read of size 1 at addr fff00000c6cf2873 by task kunit_try_catch/208
[   21.546703] 
[   21.546839] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.546949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.546983] Hardware name: linux,dummy-virt (DT)
[   21.547023] Call trace:
[   21.547065]  dump_backtrace+0x9c/0x128
[   21.547123]  show_stack+0x20/0x38
[   21.547167]  dump_stack_lvl+0x8c/0xd0
[   21.547215]  print_report+0x118/0x5f0
[   21.547274]  kasan_report+0xdc/0x128
[   21.547316]  __asan_report_load1_noabort+0x20/0x30
[   21.547363]  mempool_oob_right_helper+0x2b8/0x2f8
[   21.547413]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.547460]  kunit_try_run_case+0x170/0x3f0
[   21.547510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.547560]  kthread+0x24c/0x2d0
[   21.547628]  ret_from_fork+0x10/0x20
[   21.547679] 
[   21.551169] Allocated by task 208:
[   21.552331]  kasan_save_stack+0x3c/0x68
[   21.552644]  kasan_save_track+0x20/0x40
[   21.552875]  kasan_save_alloc_info+0x40/0x58
[   21.553198]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.553567]  remove_element+0x130/0x1f8
[   21.553866]  mempool_alloc_preallocated+0x58/0xc0
[   21.554246]  mempool_oob_right_helper+0x98/0x2f8
[   21.554488]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.554876]  kunit_try_run_case+0x170/0x3f0
[   21.555349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.555778]  kthread+0x24c/0x2d0
[   21.556139]  ret_from_fork+0x10/0x20
[   21.556422] 
[   21.556692] The buggy address belongs to the object at fff00000c6cf2800
[   21.556692]  which belongs to the cache kmalloc-128 of size 128
[   21.557403] The buggy address is located 0 bytes to the right of
[   21.557403]  allocated 115-byte region [fff00000c6cf2800, fff00000c6cf2873)
[   21.558110] 
[   21.558349] The buggy address belongs to the physical page:
[   21.558724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf2
[   21.559176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.559656] page_type: f5(slab)
[   21.559899] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.560504] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.560868] page dumped because: kasan: bad access detected
[   21.561332] 
[   21.561605] Memory state around the buggy address:
[   21.561874]  fff00000c6cf2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.562381]  fff00000c6cf2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.563806] >fff00000c6cf2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.564256]                                                              ^
[   21.564574]  fff00000c6cf2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.565068]  fff00000c6cf2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.565488] ==================================================================
[   21.573433] ==================================================================
[   21.574154] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   21.574749] Read of size 1 at addr fff00000c6c7a001 by task kunit_try_catch/210
[   21.575092] 
[   21.575232] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.575429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.575465] Hardware name: linux,dummy-virt (DT)
[   21.575506] Call trace:
[   21.575535]  dump_backtrace+0x9c/0x128
[   21.575591]  show_stack+0x20/0x38
[   21.575632]  dump_stack_lvl+0x8c/0xd0
[   21.575682]  print_report+0x118/0x5f0
[   21.575724]  kasan_report+0xdc/0x128
[   21.575768]  __asan_report_load1_noabort+0x20/0x30
[   21.575832]  mempool_oob_right_helper+0x2b8/0x2f8
[   21.575902]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.576035]  kunit_try_run_case+0x170/0x3f0
[   21.576093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.576147]  kthread+0x24c/0x2d0
[   21.576194]  ret_from_fork+0x10/0x20
[   21.576260] 
[   21.580830] The buggy address belongs to the physical page:
[   21.581226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78
[   21.581762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.582183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.582665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.583085] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.584034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.584338] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.584880] head: 0bfffe0000000002 ffffc1ffc31b1e01 ffffffffffffffff 0000000000000000
[   21.585174] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.585680] page dumped because: kasan: bad access detected
[   21.586086] 
[   21.586208] Memory state around the buggy address:
[   21.586508]  fff00000c6c79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.586900]  fff00000c6c79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.587276] >fff00000c6c7a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.587879]                    ^
[   21.588161]  fff00000c6c7a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.588581]  fff00000c6c7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.589000] ==================================================================

[   13.570472] ==================================================================
[   13.570953] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   13.571392] Read of size 1 at addr ffff888102b8e001 by task kunit_try_catch/228
[   13.571827] 
[   13.572312] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   13.572375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.572389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.572410] Call Trace:
[   13.572426]  <TASK>
[   13.572447]  dump_stack_lvl+0x73/0xb0
[   13.572484]  print_report+0xd1/0x640
[   13.572506]  ? __virt_addr_valid+0x1db/0x2d0
[   13.572529]  ? mempool_oob_right_helper+0x31a/0x380
[   13.572546]  ? kasan_addr_to_slab+0x11/0xa0
[   13.572565]  ? mempool_oob_right_helper+0x31a/0x380
[   13.572583]  kasan_report+0x140/0x180
[   13.572604]  ? mempool_oob_right_helper+0x31a/0x380
[   13.572626]  __asan_report_load1_noabort+0x18/0x20
[   13.572645]  mempool_oob_right_helper+0x31a/0x380
[   13.572681]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.572720]  ? finish_task_switch.isra.0+0x153/0x700
[   13.572760]  mempool_kmalloc_large_oob_right+0xf3/0x150
[   13.572797]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.572842]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.572881]  ? __pfx_mempool_kfree+0x10/0x10
[   13.572922]  ? __pfx_read_tsc+0x10/0x10
[   13.572952]  ? ktime_get_ts64+0x84/0x230
[   13.572991]  kunit_try_run_case+0x1a6/0x480
[   13.573031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.573065]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.573100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.573141]  ? __kthread_parkme+0x82/0x160
[   13.573180]  ? preempt_count_sub+0x50/0x80
[   13.573220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.573254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.573300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.573356]  kthread+0x257/0x310
[   13.573407]  ? __pfx_kthread+0x10/0x10
[   13.573438]  ret_from_fork+0x41/0x80
[   13.573468]  ? __pfx_kthread+0x10/0x10
[   13.573496]  ret_from_fork_asm+0x1a/0x30
[   13.573550]  </TASK>
[   13.573573] 
[   13.584658] The buggy address belongs to the physical page:
[   13.585133] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b8c
[   13.585607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.586046] flags: 0x200000000000040(head|node=0|zone=2)
[   13.586339] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.586633] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.586991] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.587333] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.587855] head: 0200000000000002 ffffea00040ae301 ffffffffffffffff 0000000000000000
[   13.588425] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   13.588755] page dumped because: kasan: bad access detected
[   13.588982] 
[   13.589336] Memory state around the buggy address:
[   13.589605]  ffff888102b8df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.590024]  ffff888102b8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.590479] >ffff888102b8e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.590855]                    ^
[   13.591058]  ffff888102b8e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.591572]  ffff888102b8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.592007] ==================================================================
[   13.537023] ==================================================================
[   13.537493] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   13.538757] Read of size 1 at addr ffff88810262b073 by task kunit_try_catch/226
[   13.539341] 
[   13.539504] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   13.539591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.539613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.539652] Call Trace:
[   13.539693]  <TASK>
[   13.539728]  dump_stack_lvl+0x73/0xb0
[   13.539786]  print_report+0xd1/0x640
[   13.539827]  ? __virt_addr_valid+0x1db/0x2d0
[   13.539870]  ? mempool_oob_right_helper+0x31a/0x380
[   13.539909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.539951]  ? mempool_oob_right_helper+0x31a/0x380
[   13.539992]  kasan_report+0x140/0x180
[   13.540032]  ? mempool_oob_right_helper+0x31a/0x380
[   13.540074]  __asan_report_load1_noabort+0x18/0x20
[   13.540138]  mempool_oob_right_helper+0x31a/0x380
[   13.540174]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.540211]  ? finish_task_switch.isra.0+0x153/0x700
[   13.540240]  mempool_kmalloc_oob_right+0xf3/0x150
[   13.540260]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.540282]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.540304]  ? __pfx_mempool_kfree+0x10/0x10
[   13.540323]  ? __pfx_read_tsc+0x10/0x10
[   13.540343]  ? ktime_get_ts64+0x84/0x230
[   13.540370]  kunit_try_run_case+0x1a6/0x480
[   13.540394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.540413]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.540436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.540459]  ? __kthread_parkme+0x82/0x160
[   13.540479]  ? preempt_count_sub+0x50/0x80
[   13.540499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.540518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.540541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.540565]  kthread+0x257/0x310
[   13.540582]  ? __pfx_kthread+0x10/0x10
[   13.540600]  ret_from_fork+0x41/0x80
[   13.540618]  ? __pfx_kthread+0x10/0x10
[   13.540636]  ret_from_fork_asm+0x1a/0x30
[   13.540681]  </TASK>
[   13.540702] 
[   13.551423] Allocated by task 226:
[   13.551634]  kasan_save_stack+0x45/0x70
[   13.551898]  kasan_save_track+0x18/0x40
[   13.552113]  kasan_save_alloc_info+0x3b/0x50
[   13.552358]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.553538]  remove_element+0x11e/0x190
[   13.553861]  mempool_alloc_preallocated+0x4d/0x90
[   13.554048]  mempool_oob_right_helper+0x8b/0x380
[   13.554401]  mempool_kmalloc_oob_right+0xf3/0x150
[   13.555034]  kunit_try_run_case+0x1a6/0x480
[   13.555258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.555481]  kthread+0x257/0x310
[   13.555740]  ret_from_fork+0x41/0x80
[   13.555971]  ret_from_fork_asm+0x1a/0x30
[   13.556210] 
[   13.556360] The buggy address belongs to the object at ffff88810262b000
[   13.556360]  which belongs to the cache kmalloc-128 of size 128
[   13.557478] The buggy address is located 0 bytes to the right of
[   13.557478]  allocated 115-byte region [ffff88810262b000, ffff88810262b073)
[   13.558036] 
[   13.558363] The buggy address belongs to the physical page:
[   13.558705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262b
[   13.559010] flags: 0x200000000000000(node=0|zone=2)
[   13.559492] page_type: f5(slab)
[   13.559738] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.560554] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   13.560819] page dumped because: kasan: bad access detected
[   13.561166] 
[   13.561272] Memory state around the buggy address:
[   13.561748]  ffff88810262af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.562116]  ffff88810262af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.562630] >ffff88810262b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.562985]                                                              ^
[   13.563494]  ffff88810262b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.563865]  ffff88810262b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.564565] ==================================================================
[   13.598252] ==================================================================
[   13.598854] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   13.599604] Read of size 1 at addr ffff88810262e2bb by task kunit_try_catch/230
[   13.600268] 
[   13.600413] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   13.600606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.600630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.600679] Call Trace:
[   13.600706]  <TASK>
[   13.600742]  dump_stack_lvl+0x73/0xb0
[   13.600800]  print_report+0xd1/0x640
[   13.600834]  ? __virt_addr_valid+0x1db/0x2d0
[   13.600860]  ? mempool_oob_right_helper+0x31a/0x380
[   13.600880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.600901]  ? mempool_oob_right_helper+0x31a/0x380
[   13.600920]  kasan_report+0x140/0x180
[   13.600942]  ? mempool_oob_right_helper+0x31a/0x380
[   13.600965]  __asan_report_load1_noabort+0x18/0x20
[   13.600984]  mempool_oob_right_helper+0x31a/0x380
[   13.601004]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.601026]  ? finish_task_switch.isra.0+0x153/0x700
[   13.601063]  mempool_slab_oob_right+0xee/0x140
[   13.601132]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.601165]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.601195]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.601225]  ? __pfx_read_tsc+0x10/0x10
[   13.601253]  ? ktime_get_ts64+0x84/0x230
[   13.601284]  kunit_try_run_case+0x1a6/0x480
[   13.601307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.601326]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.601347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.601370]  ? __kthread_parkme+0x82/0x160
[   13.601389]  ? preempt_count_sub+0x50/0x80
[   13.601409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.601427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.601450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.601474]  kthread+0x257/0x310
[   13.601491]  ? __pfx_kthread+0x10/0x10
[   13.601508]  ret_from_fork+0x41/0x80
[   13.601526]  ? __pfx_kthread+0x10/0x10
[   13.601543]  ret_from_fork_asm+0x1a/0x30
[   13.601574]  </TASK>
[   13.601586] 
[   13.610251] Allocated by task 230:
[   13.610553]  kasan_save_stack+0x45/0x70
[   13.610909]  kasan_save_track+0x18/0x40
[   13.611282]  kasan_save_alloc_info+0x3b/0x50
[   13.611694]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.611975]  remove_element+0x11e/0x190
[   13.612471]  mempool_alloc_preallocated+0x4d/0x90
[   13.612836]  mempool_oob_right_helper+0x8b/0x380
[   13.613336]  mempool_slab_oob_right+0xee/0x140
[   13.613717]  kunit_try_run_case+0x1a6/0x480
[   13.614123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.614657]  kthread+0x257/0x310
[   13.614971]  ret_from_fork+0x41/0x80
[   13.615326]  ret_from_fork_asm+0x1a/0x30
[   13.615695] 
[   13.615860] The buggy address belongs to the object at ffff88810262e240
[   13.615860]  which belongs to the cache test_cache of size 123
[   13.616882] The buggy address is located 0 bytes to the right of
[   13.616882]  allocated 123-byte region [ffff88810262e240, ffff88810262e2bb)
[   13.617492] 
[   13.617630] The buggy address belongs to the physical page:
[   13.618020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262e
[   13.618803] flags: 0x200000000000000(node=0|zone=2)
[   13.619386] page_type: f5(slab)
[   13.619554] raw: 0200000000000000 ffff888102621500 dead000000000122 0000000000000000
[   13.620387] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   13.620805] page dumped because: kasan: bad access detected
[   13.621213] 
[   13.621363] Memory state around the buggy address:
[   13.621533]  ffff88810262e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.621875]  ffff88810262e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.622560] >ffff88810262e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.622962]                                         ^
[   13.623330]  ffff88810262e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.623847]  ffff88810262e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.624136] ==================================================================