Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.268272] ==================================================================
[   23.269322] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   23.270131] Read of size 1 at addr fff00000c424f2bb by task kunit_try_catch/213
[   23.270824] 
[   23.271198] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.271408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.271489] Hardware name: linux,dummy-virt (DT)
[   23.271578] Call trace:
[   23.271642]  dump_backtrace+0x9c/0x128
[   23.271764]  show_stack+0x20/0x38
[   23.271889]  dump_stack_lvl+0x8c/0xd0
[   23.272012]  print_report+0x118/0x5f0
[   23.272125]  kasan_report+0xdc/0x128
[   23.272221]  __asan_report_load1_noabort+0x20/0x30
[   23.272332]  mempool_oob_right_helper+0x2b8/0x2f8
[   23.272440]  mempool_slab_oob_right+0xc0/0x118
[   23.272542]  kunit_try_run_case+0x170/0x3f0
[   23.272638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.272742]  kthread+0x24c/0x2d0
[   23.272853]  ret_from_fork+0x10/0x20
[   23.273255] 
[   23.281248] Allocated by task 213:
[   23.281734]  kasan_save_stack+0x3c/0x68
[   23.282290]  kasan_save_track+0x20/0x40
[   23.282742]  kasan_save_alloc_info+0x40/0x58
[   23.283273]  __kasan_mempool_unpoison_object+0xbc/0x180
[   23.283954]  remove_element+0x16c/0x1f8
[   23.284534]  mempool_alloc_preallocated+0x58/0xc0
[   23.285155]  mempool_oob_right_helper+0x98/0x2f8
[   23.285779]  mempool_slab_oob_right+0xc0/0x118
[   23.286320]  kunit_try_run_case+0x170/0x3f0
[   23.286907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.287565]  kthread+0x24c/0x2d0
[   23.288038]  ret_from_fork+0x10/0x20
[   23.288605] 
[   23.288929] The buggy address belongs to the object at fff00000c424f240
[   23.288929]  which belongs to the cache test_cache of size 123
[   23.289768] The buggy address is located 0 bytes to the right of
[   23.289768]  allocated 123-byte region [fff00000c424f240, fff00000c424f2bb)
[   23.290629] 
[   23.290880] The buggy address belongs to the physical page:
[   23.291392] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424f
[   23.292234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.293140] page_type: f5(slab)
[   23.293525] raw: 0bfffe0000000000 fff00000c11cd8c0 dead000000000122 0000000000000000
[   23.294301] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   23.295225] page dumped because: kasan: bad access detected
[   23.295914] 
[   23.296208] Memory state around the buggy address:
[   23.296741]  fff00000c424f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.298778]  fff00000c424f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   23.299711] >fff00000c424f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   23.300562]                                         ^
[   23.301062]  fff00000c424f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.302305]  fff00000c424f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.303274] ==================================================================
[   23.226921] ==================================================================
[   23.228665] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   23.229548] Read of size 1 at addr fff00000c6a26001 by task kunit_try_catch/211
[   23.230216] 
[   23.230599] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.230806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.230885] Hardware name: linux,dummy-virt (DT)
[   23.230991] Call trace:
[   23.231057]  dump_backtrace+0x9c/0x128
[   23.231179]  show_stack+0x20/0x38
[   23.231287]  dump_stack_lvl+0x8c/0xd0
[   23.231451]  print_report+0x118/0x5f0
[   23.231590]  kasan_report+0xdc/0x128
[   23.231725]  __asan_report_load1_noabort+0x20/0x30
[   23.231842]  mempool_oob_right_helper+0x2b8/0x2f8
[   23.231902]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   23.231983]  kunit_try_run_case+0x170/0x3f0
[   23.232040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.232093]  kthread+0x24c/0x2d0
[   23.232142]  ret_from_fork+0x10/0x20
[   23.232191] 
[   23.239599] The buggy address belongs to the physical page:
[   23.240230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[   23.241337] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.242242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.243039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.244635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.245286] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.245875] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.246478] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[   23.247796] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.248757] page dumped because: kasan: bad access detected
[   23.250497] 
[   23.251217] Memory state around the buggy address:
[   23.253147]  fff00000c6a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.253860]  fff00000c6a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.254617] >fff00000c6a26000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.255440]                    ^
[   23.255898]  fff00000c6a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.256660]  fff00000c6a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.257700] ==================================================================
[   23.178905] ==================================================================
[   23.180074] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   23.180815] Read of size 1 at addr fff00000c418f873 by task kunit_try_catch/209
[   23.181518] 
[   23.181743] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.181848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.181883] Hardware name: linux,dummy-virt (DT)
[   23.181923] Call trace:
[   23.181949]  dump_backtrace+0x9c/0x128
[   23.182098]  show_stack+0x20/0x38
[   23.182201]  dump_stack_lvl+0x8c/0xd0
[   23.182325]  print_report+0x118/0x5f0
[   23.182434]  kasan_report+0xdc/0x128
[   23.182569]  __asan_report_load1_noabort+0x20/0x30
[   23.182700]  mempool_oob_right_helper+0x2b8/0x2f8
[   23.182823]  mempool_kmalloc_oob_right+0xc4/0x120
[   23.182945]  kunit_try_run_case+0x170/0x3f0
[   23.183091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.183211]  kthread+0x24c/0x2d0
[   23.183328]  ret_from_fork+0x10/0x20
[   23.183446] 
[   23.193935] Allocated by task 209:
[   23.194571]  kasan_save_stack+0x3c/0x68
[   23.195118]  kasan_save_track+0x20/0x40
[   23.195595]  kasan_save_alloc_info+0x40/0x58
[   23.196217]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.197436]  remove_element+0x130/0x1f8
[   23.198003]  mempool_alloc_preallocated+0x58/0xc0
[   23.198631]  mempool_oob_right_helper+0x98/0x2f8
[   23.199262]  mempool_kmalloc_oob_right+0xc4/0x120
[   23.199828]  kunit_try_run_case+0x170/0x3f0
[   23.200694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.201382]  kthread+0x24c/0x2d0
[   23.201877]  ret_from_fork+0x10/0x20
[   23.202407] 
[   23.202727] The buggy address belongs to the object at fff00000c418f800
[   23.202727]  which belongs to the cache kmalloc-128 of size 128
[   23.204664] The buggy address is located 0 bytes to the right of
[   23.204664]  allocated 115-byte region [fff00000c418f800, fff00000c418f873)
[   23.205616] 
[   23.205759] The buggy address belongs to the physical page:
[   23.206142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10418f
[   23.207644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.208551] page_type: f5(slab)
[   23.209078] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.209758] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.210499] page dumped because: kasan: bad access detected
[   23.211141] 
[   23.211485] Memory state around the buggy address:
[   23.212299]  fff00000c418f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.213753]  fff00000c418f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.214828] >fff00000c418f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.215539]                                                              ^
[   23.216291]  fff00000c418f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.217468]  fff00000c418f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.218205] ==================================================================

[   19.764050] ==================================================================
[   19.765299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   19.766107] Read of size 1 at addr ffff888102bf6001 by task kunit_try_catch/228
[   19.766801] 
[   19.767209] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   19.767367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.767401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.767464] Call Trace:
[   19.767711]  <TASK>
[   19.767766]  dump_stack_lvl+0x73/0xb0
[   19.767881]  print_report+0xd1/0x640
[   19.767960]  ? __virt_addr_valid+0x1db/0x2d0
[   19.768039]  ? mempool_oob_right_helper+0x31a/0x380
[   19.768139]  ? kasan_addr_to_slab+0x11/0xa0
[   19.768179]  ? mempool_oob_right_helper+0x31a/0x380
[   19.768209]  kasan_report+0x140/0x180
[   19.768271]  ? mempool_oob_right_helper+0x31a/0x380
[   19.768308]  __asan_report_load1_noabort+0x18/0x20
[   19.768337]  mempool_oob_right_helper+0x31a/0x380
[   19.768366]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   19.768398]  ? finish_task_switch.isra.0+0x153/0x700
[   19.768434]  mempool_kmalloc_large_oob_right+0xf3/0x150
[   19.768495]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   19.768580]  ? __pfx_mempool_kmalloc+0x10/0x10
[   19.768613]  ? __pfx_mempool_kfree+0x10/0x10
[   19.768642]  ? __pfx_read_tsc+0x10/0x10
[   19.768669]  ? ktime_get_ts64+0x84/0x230
[   19.768704]  kunit_try_run_case+0x1a6/0x480
[   19.768737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.768766]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.768797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.768856]  ? __kthread_parkme+0x82/0x160
[   19.768888]  ? preempt_count_sub+0x50/0x80
[   19.768919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.768948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.768984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.769020]  kthread+0x257/0x310
[   19.769044]  ? __pfx_kthread+0x10/0x10
[   19.769069]  ret_from_fork+0x41/0x80
[   19.769096]  ? __pfx_kthread+0x10/0x10
[   19.769120]  ret_from_fork_asm+0x1a/0x30
[   19.769163]  </TASK>
[   19.769179] 
[   19.787114] The buggy address belongs to the physical page:
[   19.788812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf4
[   19.790096] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.791021] flags: 0x200000000000040(head|node=0|zone=2)
[   19.792124] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   19.792849] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.794141] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   19.795585] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.796459] head: 0200000000000002 ffffea00040afd01 ffffffffffffffff 0000000000000000
[   19.797402] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.798415] page dumped because: kasan: bad access detected
[   19.799293] 
[   19.799739] Memory state around the buggy address:
[   19.800319]  ffff888102bf5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.801049]  ffff888102bf5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.801629] >ffff888102bf6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.802434]                    ^
[   19.803029]  ffff888102bf6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.803751]  ffff888102bf6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.804299] ==================================================================
[   19.703366] ==================================================================
[   19.704844] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   19.705988] Read of size 1 at addr ffff888102310f73 by task kunit_try_catch/226
[   19.707104] 
[   19.707328] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   19.707393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.707410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.707448] Call Trace:
[   19.708199]  <TASK>
[   19.708279]  dump_stack_lvl+0x73/0xb0
[   19.708392]  print_report+0xd1/0x640
[   19.708434]  ? __virt_addr_valid+0x1db/0x2d0
[   19.708504]  ? mempool_oob_right_helper+0x31a/0x380
[   19.708575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.708613]  ? mempool_oob_right_helper+0x31a/0x380
[   19.708642]  kasan_report+0x140/0x180
[   19.708677]  ? mempool_oob_right_helper+0x31a/0x380
[   19.708713]  __asan_report_load1_noabort+0x18/0x20
[   19.708744]  mempool_oob_right_helper+0x31a/0x380
[   19.708775]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   19.708810]  ? finish_task_switch.isra.0+0x153/0x700
[   19.708884]  mempool_kmalloc_oob_right+0xf3/0x150
[   19.708918]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   19.708951]  ? __pfx_mempool_kmalloc+0x10/0x10
[   19.708979]  ? __pfx_mempool_kfree+0x10/0x10
[   19.709006]  ? __pfx_read_tsc+0x10/0x10
[   19.709033]  ? ktime_get_ts64+0x84/0x230
[   19.709068]  kunit_try_run_case+0x1a6/0x480
[   19.709102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.709129]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.709158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.709196]  ? __kthread_parkme+0x82/0x160
[   19.709246]  ? preempt_count_sub+0x50/0x80
[   19.709280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.709309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.709346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.709383]  kthread+0x257/0x310
[   19.709409]  ? __pfx_kthread+0x10/0x10
[   19.709435]  ret_from_fork+0x41/0x80
[   19.709735]  ? __pfx_kthread+0x10/0x10
[   19.709772]  ret_from_fork_asm+0x1a/0x30
[   19.709824]  </TASK>
[   19.709871] 
[   19.727209] Allocated by task 226:
[   19.727575]  kasan_save_stack+0x45/0x70
[   19.728411]  kasan_save_track+0x18/0x40
[   19.729062]  kasan_save_alloc_info+0x3b/0x50
[   19.730038]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   19.730742]  remove_element+0x11e/0x190
[   19.731318]  mempool_alloc_preallocated+0x4d/0x90
[   19.732089]  mempool_oob_right_helper+0x8b/0x380
[   19.732839]  mempool_kmalloc_oob_right+0xf3/0x150
[   19.733326]  kunit_try_run_case+0x1a6/0x480
[   19.734238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.735006]  kthread+0x257/0x310
[   19.735377]  ret_from_fork+0x41/0x80
[   19.736178]  ret_from_fork_asm+0x1a/0x30
[   19.736840] 
[   19.737107] The buggy address belongs to the object at ffff888102310f00
[   19.737107]  which belongs to the cache kmalloc-128 of size 128
[   19.738522] The buggy address is located 0 bytes to the right of
[   19.738522]  allocated 115-byte region [ffff888102310f00, ffff888102310f73)
[   19.738910] 
[   19.739056] The buggy address belongs to the physical page:
[   19.739403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102310
[   19.739823] flags: 0x200000000000000(node=0|zone=2)
[   19.740140] page_type: f5(slab)
[   19.741014] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.742733] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   19.744296] page dumped because: kasan: bad access detected
[   19.746779] 
[   19.747144] Memory state around the buggy address:
[   19.748735]  ffff888102310e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.750487]  ffff888102310e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.751969] >ffff888102310f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753417]                                                              ^
[   19.754709]  ffff888102310f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.755672]  ffff888102311000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.756110] ==================================================================
[   19.812916] ==================================================================
[   19.813834] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   19.814865] Read of size 1 at addr ffff88810231a2bb by task kunit_try_catch/230
[   19.815612] 
[   19.815857] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   19.815976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.816023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.816082] Call Trace:
[   19.816121]  <TASK>
[   19.816164]  dump_stack_lvl+0x73/0xb0
[   19.816264]  print_report+0xd1/0x640
[   19.816345]  ? __virt_addr_valid+0x1db/0x2d0
[   19.816420]  ? mempool_oob_right_helper+0x31a/0x380
[   19.816485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.816558]  ? mempool_oob_right_helper+0x31a/0x380
[   19.816624]  kasan_report+0x140/0x180
[   19.816700]  ? mempool_oob_right_helper+0x31a/0x380
[   19.816780]  __asan_report_load1_noabort+0x18/0x20
[   19.816849]  mempool_oob_right_helper+0x31a/0x380
[   19.817037]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   19.817119]  ? finish_task_switch.isra.0+0x153/0x700
[   19.817199]  mempool_slab_oob_right+0xee/0x140
[   19.817272]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   19.817308]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   19.817339]  ? __pfx_mempool_free_slab+0x10/0x10
[   19.817368]  ? __pfx_read_tsc+0x10/0x10
[   19.817394]  ? ktime_get_ts64+0x84/0x230
[   19.817429]  kunit_try_run_case+0x1a6/0x480
[   19.817561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.817595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.817625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.817661]  ? __kthread_parkme+0x82/0x160
[   19.817688]  ? preempt_count_sub+0x50/0x80
[   19.817718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.817745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.817780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.817827]  kthread+0x257/0x310
[   19.817874]  ? __pfx_kthread+0x10/0x10
[   19.817901]  ret_from_fork+0x41/0x80
[   19.817929]  ? __pfx_kthread+0x10/0x10
[   19.817954]  ret_from_fork_asm+0x1a/0x30
[   19.817995]  </TASK>
[   19.818009] 
[   19.837656] Allocated by task 230:
[   19.838026]  kasan_save_stack+0x45/0x70
[   19.839021]  kasan_save_track+0x18/0x40
[   19.839356]  kasan_save_alloc_info+0x3b/0x50
[   19.840314]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   19.840962]  remove_element+0x11e/0x190
[   19.841301]  mempool_alloc_preallocated+0x4d/0x90
[   19.842317]  mempool_oob_right_helper+0x8b/0x380
[   19.843582]  mempool_slab_oob_right+0xee/0x140
[   19.843943]  kunit_try_run_case+0x1a6/0x480
[   19.844910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.845615]  kthread+0x257/0x310
[   19.845869]  ret_from_fork+0x41/0x80
[   19.846317]  ret_from_fork_asm+0x1a/0x30
[   19.847281] 
[   19.847866] The buggy address belongs to the object at ffff88810231a240
[   19.847866]  which belongs to the cache test_cache of size 123
[   19.849516] The buggy address is located 0 bytes to the right of
[   19.849516]  allocated 123-byte region [ffff88810231a240, ffff88810231a2bb)
[   19.851710] 
[   19.851862] The buggy address belongs to the physical page:
[   19.852328] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a
[   19.852946] flags: 0x200000000000000(node=0|zone=2)
[   19.853993] page_type: f5(slab)
[   19.854362] raw: 0200000000000000 ffff8881010958c0 dead000000000122 0000000000000000
[   19.855521] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   19.856411] page dumped because: kasan: bad access detected
[   19.856929] 
[   19.857493] Memory state around the buggy address:
[   19.858265]  ffff88810231a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.859017]  ffff88810231a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.860204] >ffff88810231a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.860698]                                         ^
[   19.861267]  ffff88810231a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.862242]  ffff88810231a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.863284] ==================================================================