Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   18.964722] ==================================================================
[   18.964787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.964842] Read of size 1 at addr fff00000c78fe001 by task kunit_try_catch/224
[   18.964891] 
[   18.964928] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.965030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.966734] Hardware name: linux,dummy-virt (DT)
[   18.966848] Call trace:
[   18.967376]  show_stack+0x20/0x38 (C)
[   18.967729]  dump_stack_lvl+0x8c/0xd0
[   18.968039]  print_report+0x118/0x608
[   18.968245]  kasan_report+0xdc/0x128
[   18.968505]  __asan_report_load1_noabort+0x20/0x30
[   18.968772]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.968827]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.968878]  kunit_try_run_case+0x170/0x3f0
[   18.969128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.969260]  kthread+0x328/0x630
[   18.969360]  ret_from_fork+0x10/0x20
[   18.969606] 
[   18.969901] The buggy address belongs to the physical page:
[   18.970124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078fc
[   18.970362] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.970591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.970737] page_type: f8(unknown)
[   18.970988] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.971051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.971234] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.971320] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.971556] head: 0bfffe0000000002 ffffc1ffc31e3f01 00000000ffffffff 00000000ffffffff
[   18.971605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.971645] page dumped because: kasan: bad access detected
[   18.971679] 
[   18.971765] Memory state around the buggy address:
[   18.971801]  fff00000c78fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.972341]  fff00000c78fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.972411] >fff00000c78fe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.972816]                    ^
[   18.972881]  fff00000c78fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.972930]  fff00000c78fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.972972] ==================================================================
[   18.987641] ==================================================================
[   18.987712] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.988137] Read of size 1 at addr fff00000c77ab2bb by task kunit_try_catch/226
[   18.988207] 
[   18.988287] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.988399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.988456] Hardware name: linux,dummy-virt (DT)
[   18.988503] Call trace:
[   18.988529]  show_stack+0x20/0x38 (C)
[   18.988578]  dump_stack_lvl+0x8c/0xd0
[   18.988636]  print_report+0x118/0x608
[   18.988868]  kasan_report+0xdc/0x128
[   18.988927]  __asan_report_load1_noabort+0x20/0x30
[   18.989032]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.989108]  mempool_slab_oob_right+0xc0/0x118
[   18.989156]  kunit_try_run_case+0x170/0x3f0
[   18.989205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.989430]  kthread+0x328/0x630
[   18.989487]  ret_from_fork+0x10/0x20
[   18.989592] 
[   18.989654] Allocated by task 226:
[   18.989703]  kasan_save_stack+0x3c/0x68
[   18.989746]  kasan_save_track+0x20/0x40
[   18.989791]  kasan_save_alloc_info+0x40/0x58
[   18.989830]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.990090]  remove_element+0x16c/0x1f8
[   18.990187]  mempool_alloc_preallocated+0x58/0xc0
[   18.990229]  mempool_oob_right_helper+0x98/0x2f0
[   18.990285]  mempool_slab_oob_right+0xc0/0x118
[   18.990325]  kunit_try_run_case+0x170/0x3f0
[   18.990371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.990424]  kthread+0x328/0x630
[   18.990464]  ret_from_fork+0x10/0x20
[   18.990501] 
[   18.990520] The buggy address belongs to the object at fff00000c77ab240
[   18.990520]  which belongs to the cache test_cache of size 123
[   18.990581] The buggy address is located 0 bytes to the right of
[   18.990581]  allocated 123-byte region [fff00000c77ab240, fff00000c77ab2bb)
[   18.990659] 
[   18.990679] The buggy address belongs to the physical page:
[   18.990712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ab
[   18.990880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.990936] page_type: f5(slab)
[   18.991099] raw: 0bfffe0000000000 fff00000c1aa5b40 dead000000000122 0000000000000000
[   18.991155] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.991196] page dumped because: kasan: bad access detected
[   18.991278] 
[   18.991355] Memory state around the buggy address:
[   18.991498]  fff00000c77ab180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.991571]  fff00000c77ab200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.991611] >fff00000c77ab280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.991722]                                         ^
[   18.991807]  fff00000c77ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.991885]  fff00000c77ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.992010] ==================================================================
[   18.945431] ==================================================================
[   18.945509] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.945581] Read of size 1 at addr fff00000c69b6273 by task kunit_try_catch/222
[   18.945638] 
[   18.945682] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.945770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.945797] Hardware name: linux,dummy-virt (DT)
[   18.945831] Call trace:
[   18.945855]  show_stack+0x20/0x38 (C)
[   18.945906]  dump_stack_lvl+0x8c/0xd0
[   18.945956]  print_report+0x118/0x608
[   18.946017]  kasan_report+0xdc/0x128
[   18.946060]  __asan_report_load1_noabort+0x20/0x30
[   18.946110]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.946159]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.946206]  kunit_try_run_case+0x170/0x3f0
[   18.946255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.946307]  kthread+0x328/0x630
[   18.946348]  ret_from_fork+0x10/0x20
[   18.946397] 
[   18.946416] Allocated by task 222:
[   18.946447]  kasan_save_stack+0x3c/0x68
[   18.946488]  kasan_save_track+0x20/0x40
[   18.946524]  kasan_save_alloc_info+0x40/0x58
[   18.946564]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.946616]  remove_element+0x130/0x1f8
[   18.947083]  mempool_alloc_preallocated+0x58/0xc0
[   18.947124]  mempool_oob_right_helper+0x98/0x2f0
[   18.947162]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.947202]  kunit_try_run_case+0x170/0x3f0
[   18.947238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.947280]  kthread+0x328/0x630
[   18.947314]  ret_from_fork+0x10/0x20
[   18.947348] 
[   18.947369] The buggy address belongs to the object at fff00000c69b6200
[   18.947369]  which belongs to the cache kmalloc-128 of size 128
[   18.947429] The buggy address is located 0 bytes to the right of
[   18.947429]  allocated 115-byte region [fff00000c69b6200, fff00000c69b6273)
[   18.947492] 
[   18.947515] The buggy address belongs to the physical page:
[   18.947547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   18.947603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.947654] page_type: f5(slab)
[   18.947695] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.947744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.947784] page dumped because: kasan: bad access detected
[   18.947816] 
[   18.947834] Memory state around the buggy address:
[   18.947868]  fff00000c69b6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.947913]  fff00000c69b6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.947954] >fff00000c69b6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.948003]                                                              ^
[   18.948044]  fff00000c69b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.948085]  fff00000c69b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.948124] ==================================================================

[   18.617814] ==================================================================
[   18.618623] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.618749] Read of size 1 at addr fff00000c62332bb by task kunit_try_catch/226
[   18.619021] 
[   18.619057] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.619139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.619787] Hardware name: linux,dummy-virt (DT)
[   18.619826] Call trace:
[   18.619862]  show_stack+0x20/0x38 (C)
[   18.620084]  dump_stack_lvl+0x8c/0xd0
[   18.620179]  print_report+0x118/0x608
[   18.620351]  kasan_report+0xdc/0x128
[   18.620584]  __asan_report_load1_noabort+0x20/0x30
[   18.620874]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.621019]  mempool_slab_oob_right+0xc0/0x118
[   18.621076]  kunit_try_run_case+0x170/0x3f0
[   18.621132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.621545]  kthread+0x328/0x630
[   18.621676]  ret_from_fork+0x10/0x20
[   18.621751] 
[   18.622067] Allocated by task 226:
[   18.622343]  kasan_save_stack+0x3c/0x68
[   18.622395]  kasan_save_track+0x20/0x40
[   18.622485]  kasan_save_alloc_info+0x40/0x58
[   18.622529]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.622572]  remove_element+0x16c/0x1f8
[   18.622608]  mempool_alloc_preallocated+0x58/0xc0
[   18.622649]  mempool_oob_right_helper+0x98/0x2f0
[   18.622688]  mempool_slab_oob_right+0xc0/0x118
[   18.622725]  kunit_try_run_case+0x170/0x3f0
[   18.622764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622806]  kthread+0x328/0x630
[   18.622837]  ret_from_fork+0x10/0x20
[   18.622874] 
[   18.623147] The buggy address belongs to the object at fff00000c6233240
[   18.623147]  which belongs to the cache test_cache of size 123
[   18.623242] The buggy address is located 0 bytes to the right of
[   18.623242]  allocated 123-byte region [fff00000c6233240, fff00000c62332bb)
[   18.623598] 
[   18.624114] The buggy address belongs to the physical page:
[   18.624349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106233
[   18.624697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.625149] page_type: f5(slab)
[   18.625340] raw: 0bfffe0000000000 fff00000c77d98c0 dead000000000122 0000000000000000
[   18.625401] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.625753] page dumped because: kasan: bad access detected
[   18.625786] 
[   18.625804] Memory state around the buggy address:
[   18.626058]  fff00000c6233180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.626245]  fff00000c6233200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.626317] >fff00000c6233280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.626362]                                         ^
[   18.626489]  fff00000c6233300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626553]  fff00000c6233380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626591] ==================================================================
[   18.598275] ==================================================================
[   18.598339] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.598394] Read of size 1 at addr fff00000c7836001 by task kunit_try_catch/224
[   18.598444] 
[   18.598477] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.598560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.600030] Hardware name: linux,dummy-virt (DT)
[   18.600082] Call trace:
[   18.600168]  show_stack+0x20/0x38 (C)
[   18.600224]  dump_stack_lvl+0x8c/0xd0
[   18.600296]  print_report+0x118/0x608
[   18.600343]  kasan_report+0xdc/0x128
[   18.600387]  __asan_report_load1_noabort+0x20/0x30
[   18.600436]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.600483]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.600613]  kunit_try_run_case+0x170/0x3f0
[   18.600686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.600831]  kthread+0x328/0x630
[   18.601347]  ret_from_fork+0x10/0x20
[   18.601402] 
[   18.601425] The buggy address belongs to the physical page:
[   18.601659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   18.601849] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.602039] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.602308] page_type: f8(unknown)
[   18.602417] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.602531] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.602631] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.602680] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.602801] head: 0bfffe0000000002 ffffc1ffc31e0d01 00000000ffffffff 00000000ffffffff
[   18.603165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.603372] page dumped because: kasan: bad access detected
[   18.603495] 
[   18.603513] Memory state around the buggy address:
[   18.603899]  fff00000c7835f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.603960]  fff00000c7835f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.604446] >fff00000c7836000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.604487]                    ^
[   18.604784]  fff00000c7836080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.604830]  fff00000c7836100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.605237] ==================================================================
[   18.577211] ==================================================================
[   18.577288] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.577362] Read of size 1 at addr fff00000c7729273 by task kunit_try_catch/222
[   18.577415] 
[   18.577456] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.577543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.577569] Hardware name: linux,dummy-virt (DT)
[   18.577601] Call trace:
[   18.577627]  show_stack+0x20/0x38 (C)
[   18.577680]  dump_stack_lvl+0x8c/0xd0
[   18.577730]  print_report+0x118/0x608
[   18.577776]  kasan_report+0xdc/0x128
[   18.577819]  __asan_report_load1_noabort+0x20/0x30
[   18.577870]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.577931]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.577979]  kunit_try_run_case+0x170/0x3f0
[   18.578146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.578199]  kthread+0x328/0x630
[   18.578242]  ret_from_fork+0x10/0x20
[   18.578291] 
[   18.578310] Allocated by task 222:
[   18.578341]  kasan_save_stack+0x3c/0x68
[   18.578382]  kasan_save_track+0x20/0x40
[   18.578420]  kasan_save_alloc_info+0x40/0x58
[   18.578459]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.578502]  remove_element+0x130/0x1f8
[   18.578539]  mempool_alloc_preallocated+0x58/0xc0
[   18.578578]  mempool_oob_right_helper+0x98/0x2f0
[   18.578616]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.578655]  kunit_try_run_case+0x170/0x3f0
[   18.578695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.578739]  kthread+0x328/0x630
[   18.578770]  ret_from_fork+0x10/0x20
[   18.578807] 
[   18.578826] The buggy address belongs to the object at fff00000c7729200
[   18.578826]  which belongs to the cache kmalloc-128 of size 128
[   18.578884] The buggy address is located 0 bytes to the right of
[   18.578884]  allocated 115-byte region [fff00000c7729200, fff00000c7729273)
[   18.578963] 
[   18.578984] The buggy address belongs to the physical page:
[   18.579017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107729
[   18.579073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.579126] page_type: f5(slab)
[   18.579168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.579218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.579259] page dumped because: kasan: bad access detected
[   18.579292] 
[   18.579310] Memory state around the buggy address:
[   18.579344]  fff00000c7729100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.579387]  fff00000c7729180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.579432] >fff00000c7729200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.579470]                                                              ^
[   18.579511]  fff00000c7729280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.579553]  fff00000c7729300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.579594] ==================================================================

[   14.940467] ==================================================================
[   14.940968] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.941537] Read of size 1 at addr ffff888103a76001 by task kunit_try_catch/241
[   14.942149] 
[   14.942449] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.942568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.942600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.942650] Call Trace:
[   14.942674]  <TASK>
[   14.942703]  dump_stack_lvl+0x73/0xb0
[   14.942756]  print_report+0xd1/0x650
[   14.942788]  ? __virt_addr_valid+0x1db/0x2d0
[   14.942823]  ? mempool_oob_right_helper+0x318/0x380
[   14.942856]  ? kasan_addr_to_slab+0x11/0xa0
[   14.942887]  ? mempool_oob_right_helper+0x318/0x380
[   14.942959]  kasan_report+0x141/0x180
[   14.942994]  ? mempool_oob_right_helper+0x318/0x380
[   14.943059]  __asan_report_load1_noabort+0x18/0x20
[   14.943101]  mempool_oob_right_helper+0x318/0x380
[   14.943170]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.943214]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.943289]  ? finish_task_switch.isra.0+0x153/0x700
[   14.943354]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.943399]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.943430]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.943454]  ? __pfx_mempool_kfree+0x10/0x10
[   14.943477]  ? __pfx_read_tsc+0x10/0x10
[   14.943497]  ? ktime_get_ts64+0x86/0x230
[   14.943854]  kunit_try_run_case+0x1a5/0x480
[   14.943936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.943972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.943997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.944023]  ? __kthread_parkme+0x82/0x180
[   14.944044]  ? preempt_count_sub+0x50/0x80
[   14.944067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.944088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.944138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.944164]  kthread+0x337/0x6f0
[   14.944184]  ? trace_preempt_on+0x20/0xc0
[   14.944205]  ? __pfx_kthread+0x10/0x10
[   14.944224]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.944243]  ? calculate_sigpending+0x7b/0xa0
[   14.944267]  ? __pfx_kthread+0x10/0x10
[   14.944287]  ret_from_fork+0x116/0x1d0
[   14.944304]  ? __pfx_kthread+0x10/0x10
[   14.944323]  ret_from_fork_asm+0x1a/0x30
[   14.944352]  </TASK>
[   14.944365] 
[   14.955280] The buggy address belongs to the physical page:
[   14.955839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a74
[   14.956385] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.957239] flags: 0x200000000000040(head|node=0|zone=2)
[   14.957738] page_type: f8(unknown)
[   14.958027] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.958650] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.958931] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.959177] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.959877] head: 0200000000000002 ffffea00040e9d01 00000000ffffffff 00000000ffffffff
[   14.960413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.961149] page dumped because: kasan: bad access detected
[   14.961402] 
[   14.961749] Memory state around the buggy address:
[   14.962084]  ffff888103a75f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.962465]  ffff888103a75f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.963032] >ffff888103a76000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.963311]                    ^
[   14.963581]  ffff888103a76080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.963912]  ffff888103a76100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.964276] ==================================================================
[   14.905358] ==================================================================
[   14.905877] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.906217] Read of size 1 at addr ffff888102aa0a73 by task kunit_try_catch/239
[   14.906444] 
[   14.906584] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.906681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.906701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.906741] Call Trace:
[   14.906762]  <TASK>
[   14.906797]  dump_stack_lvl+0x73/0xb0
[   14.907738]  print_report+0xd1/0x650
[   14.907814]  ? __virt_addr_valid+0x1db/0x2d0
[   14.907844]  ? mempool_oob_right_helper+0x318/0x380
[   14.907867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.907892]  ? mempool_oob_right_helper+0x318/0x380
[   14.907914]  kasan_report+0x141/0x180
[   14.907934]  ? mempool_oob_right_helper+0x318/0x380
[   14.907961]  __asan_report_load1_noabort+0x18/0x20
[   14.907983]  mempool_oob_right_helper+0x318/0x380
[   14.908005]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.908034]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.908056]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.908079]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.908107]  ? __pfx_mempool_kfree+0x10/0x10
[   14.908153]  ? __pfx_read_tsc+0x10/0x10
[   14.908175]  ? ktime_get_ts64+0x86/0x230
[   14.908200]  kunit_try_run_case+0x1a5/0x480
[   14.908226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.908246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.908272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.908293]  ? __kthread_parkme+0x82/0x180
[   14.908315]  ? preempt_count_sub+0x50/0x80
[   14.908338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.908360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.908381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.908402]  kthread+0x337/0x6f0
[   14.908419]  ? trace_preempt_on+0x20/0xc0
[   14.908442]  ? __pfx_kthread+0x10/0x10
[   14.908461]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.908481]  ? calculate_sigpending+0x7b/0xa0
[   14.908508]  ? __pfx_kthread+0x10/0x10
[   14.908540]  ret_from_fork+0x116/0x1d0
[   14.908567]  ? __pfx_kthread+0x10/0x10
[   14.908597]  ret_from_fork_asm+0x1a/0x30
[   14.908658]  </TASK>
[   14.908677] 
[   14.919543] Allocated by task 239:
[   14.919928]  kasan_save_stack+0x45/0x70
[   14.920306]  kasan_save_track+0x18/0x40
[   14.920659]  kasan_save_alloc_info+0x3b/0x50
[   14.921038]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.921524]  remove_element+0x11e/0x190
[   14.921947]  mempool_alloc_preallocated+0x4d/0x90
[   14.922434]  mempool_oob_right_helper+0x8a/0x380
[   14.922999]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.923436]  kunit_try_run_case+0x1a5/0x480
[   14.923864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.924301]  kthread+0x337/0x6f0
[   14.924585]  ret_from_fork+0x116/0x1d0
[   14.924935]  ret_from_fork_asm+0x1a/0x30
[   14.925421] 
[   14.925835] The buggy address belongs to the object at ffff888102aa0a00
[   14.925835]  which belongs to the cache kmalloc-128 of size 128
[   14.926942] The buggy address is located 0 bytes to the right of
[   14.926942]  allocated 115-byte region [ffff888102aa0a00, ffff888102aa0a73)
[   14.927659] 
[   14.927999] The buggy address belongs to the physical page:
[   14.928410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aa0
[   14.928726] flags: 0x200000000000000(node=0|zone=2)
[   14.929310] page_type: f5(slab)
[   14.929472] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.930305] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.930642] page dumped because: kasan: bad access detected
[   14.931035] 
[   14.931195] Memory state around the buggy address:
[   14.931473]  ffff888102aa0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.931862]  ffff888102aa0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932372] >ffff888102aa0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.933197]                                                              ^
[   14.933765]  ffff888102aa0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934225]  ffff888102aa0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.934632] ==================================================================
[   14.970964] ==================================================================
[   14.971602] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.972477] Read of size 1 at addr ffff8881025722bb by task kunit_try_catch/243
[   14.973001] 
[   14.973190] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.973282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.973302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.973337] Call Trace:
[   14.973364]  <TASK>
[   14.973392]  dump_stack_lvl+0x73/0xb0
[   14.973450]  print_report+0xd1/0x650
[   14.973488]  ? __virt_addr_valid+0x1db/0x2d0
[   14.973565]  ? mempool_oob_right_helper+0x318/0x380
[   14.973604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.973655]  ? mempool_oob_right_helper+0x318/0x380
[   14.973686]  kasan_report+0x141/0x180
[   14.973720]  ? mempool_oob_right_helper+0x318/0x380
[   14.973749]  __asan_report_load1_noabort+0x18/0x20
[   14.973770]  mempool_oob_right_helper+0x318/0x380
[   14.973793]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.973820]  mempool_slab_oob_right+0xed/0x140
[   14.973841]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.973865]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.973888]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.973910]  ? __pfx_read_tsc+0x10/0x10
[   14.973942]  ? ktime_get_ts64+0x86/0x230
[   14.973966]  kunit_try_run_case+0x1a5/0x480
[   14.973990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.974009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.974031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.974050]  ? __kthread_parkme+0x82/0x180
[   14.974070]  ? preempt_count_sub+0x50/0x80
[   14.974093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.974132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.974153]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.974173]  kthread+0x337/0x6f0
[   14.974192]  ? trace_preempt_on+0x20/0xc0
[   14.974213]  ? __pfx_kthread+0x10/0x10
[   14.974232]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.974250]  ? calculate_sigpending+0x7b/0xa0
[   14.974273]  ? __pfx_kthread+0x10/0x10
[   14.974292]  ret_from_fork+0x116/0x1d0
[   14.974309]  ? __pfx_kthread+0x10/0x10
[   14.974328]  ret_from_fork_asm+0x1a/0x30
[   14.974356]  </TASK>
[   14.974368] 
[   14.987643] Allocated by task 243:
[   14.987898]  kasan_save_stack+0x45/0x70
[   14.988278]  kasan_save_track+0x18/0x40
[   14.988813]  kasan_save_alloc_info+0x3b/0x50
[   14.989052]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.990184]  remove_element+0x11e/0x190
[   14.990409]  mempool_alloc_preallocated+0x4d/0x90
[   14.990652]  mempool_oob_right_helper+0x8a/0x380
[   14.991374]  mempool_slab_oob_right+0xed/0x140
[   14.991704]  kunit_try_run_case+0x1a5/0x480
[   14.991883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992535]  kthread+0x337/0x6f0
[   14.992887]  ret_from_fork+0x116/0x1d0
[   14.993095]  ret_from_fork_asm+0x1a/0x30
[   14.993449] 
[   14.993759] The buggy address belongs to the object at ffff888102572240
[   14.993759]  which belongs to the cache test_cache of size 123
[   14.994290] The buggy address is located 0 bytes to the right of
[   14.994290]  allocated 123-byte region [ffff888102572240, ffff8881025722bb)
[   14.995097] 
[   14.995328] The buggy address belongs to the physical page:
[   14.995866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102572
[   14.996431] flags: 0x200000000000000(node=0|zone=2)
[   14.996833] page_type: f5(slab)
[   14.996990] raw: 0200000000000000 ffff888102568280 dead000000000122 0000000000000000
[   14.997493] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.998027] page dumped because: kasan: bad access detected
[   14.998441] 
[   14.998787] Memory state around the buggy address:
[   14.998975]  ffff888102572180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.999676]  ffff888102572200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   15.000151] >ffff888102572280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   15.000544]                                         ^
[   15.001072]  ffff888102572300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001410]  ffff888102572380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001962] ==================================================================

[   15.078036] ==================================================================
[   15.078608] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.079219] Read of size 1 at addr ffff8881039f02bb by task kunit_try_catch/242
[   15.079508] 
[   15.079652] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.079700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.079713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.079736] Call Trace:
[   15.079750]  <TASK>
[   15.079769]  dump_stack_lvl+0x73/0xb0
[   15.079804]  print_report+0xd1/0x650
[   15.079831]  ? __virt_addr_valid+0x1db/0x2d0
[   15.079860]  ? mempool_oob_right_helper+0x318/0x380
[   15.080000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.080030]  ? mempool_oob_right_helper+0x318/0x380
[   15.080067]  kasan_report+0x141/0x180
[   15.080091]  ? mempool_oob_right_helper+0x318/0x380
[   15.080122]  __asan_report_load1_noabort+0x18/0x20
[   15.080147]  mempool_oob_right_helper+0x318/0x380
[   15.080174]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.080198]  ? update_load_avg+0x1be/0x21b0
[   15.080226]  ? enqueue_entity+0x215/0x1080
[   15.080253]  ? finish_task_switch.isra.0+0x153/0x700
[   15.080280]  mempool_slab_oob_right+0xed/0x140
[   15.080306]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   15.080335]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   15.080363]  ? __pfx_mempool_free_slab+0x10/0x10
[   15.080390]  ? __pfx_read_tsc+0x10/0x10
[   15.080413]  ? ktime_get_ts64+0x86/0x230
[   15.080440]  kunit_try_run_case+0x1a5/0x480
[   15.080468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.080492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.080517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.080542]  ? __kthread_parkme+0x82/0x180
[   15.080565]  ? preempt_count_sub+0x50/0x80
[   15.080591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.080617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.080641]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.080667]  kthread+0x337/0x6f0
[   15.080689]  ? trace_preempt_on+0x20/0xc0
[   15.080741]  ? __pfx_kthread+0x10/0x10
[   15.080764]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.080788]  ? calculate_sigpending+0x7b/0xa0
[   15.080824]  ? __pfx_kthread+0x10/0x10
[   15.080847]  ret_from_fork+0x116/0x1d0
[   15.080869]  ? __pfx_kthread+0x10/0x10
[   15.080892]  ret_from_fork_asm+0x1a/0x30
[   15.080926]  </TASK>
[   15.080939] 
[   15.089767] Allocated by task 242:
[   15.089909]  kasan_save_stack+0x45/0x70
[   15.090139]  kasan_save_track+0x18/0x40
[   15.090343]  kasan_save_alloc_info+0x3b/0x50
[   15.090570]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   15.090801]  remove_element+0x11e/0x190
[   15.090947]  mempool_alloc_preallocated+0x4d/0x90
[   15.091392]  mempool_oob_right_helper+0x8a/0x380
[   15.091639]  mempool_slab_oob_right+0xed/0x140
[   15.092139]  kunit_try_run_case+0x1a5/0x480
[   15.092336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.092559]  kthread+0x337/0x6f0
[   15.092825]  ret_from_fork+0x116/0x1d0
[   15.093008]  ret_from_fork_asm+0x1a/0x30
[   15.093188] 
[   15.093288] The buggy address belongs to the object at ffff8881039f0240
[   15.093288]  which belongs to the cache test_cache of size 123
[   15.093869] The buggy address is located 0 bytes to the right of
[   15.093869]  allocated 123-byte region [ffff8881039f0240, ffff8881039f02bb)
[   15.094420] 
[   15.094500] The buggy address belongs to the physical page:
[   15.094679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f0
[   15.094924] flags: 0x200000000000000(node=0|zone=2)
[   15.095408] page_type: f5(slab)
[   15.095872] raw: 0200000000000000 ffff8881016018c0 dead000000000122 0000000000000000
[   15.096239] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   15.096634] page dumped because: kasan: bad access detected
[   15.096874] 
[   15.097031] Memory state around the buggy address:
[   15.097310]  ffff8881039f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.097660]  ffff8881039f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   15.098031] >ffff8881039f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   15.098322]                                         ^
[   15.098588]  ffff8881039f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.098930]  ffff8881039f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.099172] ==================================================================
[   15.026120] ==================================================================
[   15.026651] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.027438] Read of size 1 at addr ffff8881031c0373 by task kunit_try_catch/238
[   15.027965] 
[   15.028225] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.028282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.028294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.028318] Call Trace:
[   15.028332]  <TASK>
[   15.028350]  dump_stack_lvl+0x73/0xb0
[   15.028383]  print_report+0xd1/0x650
[   15.028407]  ? __virt_addr_valid+0x1db/0x2d0
[   15.028430]  ? mempool_oob_right_helper+0x318/0x380
[   15.028454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.028480]  ? mempool_oob_right_helper+0x318/0x380
[   15.028503]  kasan_report+0x141/0x180
[   15.028525]  ? mempool_oob_right_helper+0x318/0x380
[   15.028554]  __asan_report_load1_noabort+0x18/0x20
[   15.028577]  mempool_oob_right_helper+0x318/0x380
[   15.028602]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.028627]  ? __kasan_check_write+0x18/0x20
[   15.028646]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.028669]  ? finish_task_switch.isra.0+0x153/0x700
[   15.028696]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.028825]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   15.028854]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.028881]  ? __pfx_mempool_kfree+0x10/0x10
[   15.028905]  ? __pfx_read_tsc+0x10/0x10
[   15.028934]  ? ktime_get_ts64+0x86/0x230
[   15.028959]  kunit_try_run_case+0x1a5/0x480
[   15.028985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.029007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.029031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.029063]  ? __kthread_parkme+0x82/0x180
[   15.029085]  ? preempt_count_sub+0x50/0x80
[   15.029108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.029134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.029158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.029181]  kthread+0x337/0x6f0
[   15.029201]  ? trace_preempt_on+0x20/0xc0
[   15.029225]  ? __pfx_kthread+0x10/0x10
[   15.029246]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.029266]  ? calculate_sigpending+0x7b/0xa0
[   15.029291]  ? __pfx_kthread+0x10/0x10
[   15.029312]  ret_from_fork+0x116/0x1d0
[   15.029330]  ? __pfx_kthread+0x10/0x10
[   15.029351]  ret_from_fork_asm+0x1a/0x30
[   15.029384]  </TASK>
[   15.029398] 
[   15.038394] Allocated by task 238:
[   15.038561]  kasan_save_stack+0x45/0x70
[   15.038943]  kasan_save_track+0x18/0x40
[   15.039182]  kasan_save_alloc_info+0x3b/0x50
[   15.039419]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.039684]  remove_element+0x11e/0x190
[   15.039894]  mempool_alloc_preallocated+0x4d/0x90
[   15.040104]  mempool_oob_right_helper+0x8a/0x380
[   15.040264]  mempool_kmalloc_oob_right+0xf2/0x150
[   15.040457]  kunit_try_run_case+0x1a5/0x480
[   15.040680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.040943]  kthread+0x337/0x6f0
[   15.041194]  ret_from_fork+0x116/0x1d0
[   15.041447]  ret_from_fork_asm+0x1a/0x30
[   15.041604] 
[   15.041682] The buggy address belongs to the object at ffff8881031c0300
[   15.041682]  which belongs to the cache kmalloc-128 of size 128
[   15.042240] The buggy address is located 0 bytes to the right of
[   15.042240]  allocated 115-byte region [ffff8881031c0300, ffff8881031c0373)
[   15.042976] 
[   15.043091] The buggy address belongs to the physical page:
[   15.043608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   15.044012] flags: 0x200000000000000(node=0|zone=2)
[   15.044209] page_type: f5(slab)
[   15.044357] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.044800] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.045269] page dumped because: kasan: bad access detected
[   15.045573] 
[   15.045677] Memory state around the buggy address:
[   15.045963]  ffff8881031c0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.046319]  ffff8881031c0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.046692] >ffff8881031c0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.046968]                                                              ^
[   15.047505]  ffff8881031c0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.047958]  ffff8881031c0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.048335] ==================================================================
[   15.052678] ==================================================================
[   15.053300] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   15.053690] Read of size 1 at addr ffff888102a0a001 by task kunit_try_catch/240
[   15.054625] 
[   15.054962] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.055072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.055087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.055109] Call Trace:
[   15.055123]  <TASK>
[   15.055139]  dump_stack_lvl+0x73/0xb0
[   15.055169]  print_report+0xd1/0x650
[   15.055193]  ? __virt_addr_valid+0x1db/0x2d0
[   15.055215]  ? mempool_oob_right_helper+0x318/0x380
[   15.055239]  ? kasan_addr_to_slab+0x11/0xa0
[   15.055260]  ? mempool_oob_right_helper+0x318/0x380
[   15.055283]  kasan_report+0x141/0x180
[   15.055306]  ? mempool_oob_right_helper+0x318/0x380
[   15.055336]  __asan_report_load1_noabort+0x18/0x20
[   15.055359]  mempool_oob_right_helper+0x318/0x380
[   15.055385]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   15.055410]  ? __kasan_check_write+0x18/0x20
[   15.055430]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.055453]  ? finish_task_switch.isra.0+0x153/0x700
[   15.055479]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   15.055504]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   15.055532]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.055557]  ? __pfx_mempool_kfree+0x10/0x10
[   15.055583]  ? __pfx_read_tsc+0x10/0x10
[   15.055604]  ? ktime_get_ts64+0x86/0x230
[   15.055628]  kunit_try_run_case+0x1a5/0x480
[   15.055654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.055701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.055723]  ? __kthread_parkme+0x82/0x180
[   15.055744]  ? preempt_count_sub+0x50/0x80
[   15.055768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.055831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.055854]  kthread+0x337/0x6f0
[   15.055874]  ? trace_preempt_on+0x20/0xc0
[   15.055898]  ? __pfx_kthread+0x10/0x10
[   15.055920]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.055941]  ? calculate_sigpending+0x7b/0xa0
[   15.055965]  ? __pfx_kthread+0x10/0x10
[   15.055989]  ret_from_fork+0x116/0x1d0
[   15.056008]  ? __pfx_kthread+0x10/0x10
[   15.056030]  ret_from_fork_asm+0x1a/0x30
[   15.056073]  </TASK>
[   15.056085] 
[   15.065685] The buggy address belongs to the physical page:
[   15.066103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   15.066514] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.066933] flags: 0x200000000000040(head|node=0|zone=2)
[   15.067174] page_type: f8(unknown)
[   15.067371] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.067782] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.068090] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.068490] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.068844] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   15.069276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.069560] page dumped because: kasan: bad access detected
[   15.069797] 
[   15.069902] Memory state around the buggy address:
[   15.070151]  ffff888102a09f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.070511]  ffff888102a09f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.070880] >ffff888102a0a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.071232]                    ^
[   15.071378]  ffff888102a0a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.071693]  ffff888102a0a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.072139] ==================================================================

[   35.685931] ==================================================================
[   35.696828] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   35.704410] Read of size 1 at addr ffff8881066f8773 by task kunit_try_catch/262
[   35.711723] 
[   35.713228] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   35.713238] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   35.713241] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   35.713245] Call Trace:
[   35.713246]  <TASK>
[   35.713249]  dump_stack_lvl+0x73/0xb0
[   35.713254]  print_report+0xd1/0x650
[   35.713259]  ? __virt_addr_valid+0x1db/0x2d0
[   35.713263]  ? mempool_oob_right_helper+0x318/0x380
[   35.713268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.713273]  ? mempool_oob_right_helper+0x318/0x380
[   35.713278]  kasan_report+0x141/0x180
[   35.713282]  ? mempool_oob_right_helper+0x318/0x380
[   35.713287]  __asan_report_load1_noabort+0x18/0x20
[   35.713292]  mempool_oob_right_helper+0x318/0x380
[   35.713296]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   35.713301]  ? __pfx_sched_clock_cpu+0x10/0x10
[   35.713305]  ? finish_task_switch.isra.0+0x153/0x700
[   35.713310]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.713315]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   35.713320]  ? __pfx_mempool_kmalloc+0x10/0x10
[   35.713325]  ? __pfx_mempool_kfree+0x10/0x10
[   35.713347]  ? ktime_get_ts64+0x83/0x230
[   35.713352]  kunit_try_run_case+0x1a2/0x480
[   35.713357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.713361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   35.713366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.713371]  ? __kthread_parkme+0x82/0x180
[   35.713387]  ? preempt_count_sub+0x50/0x80
[   35.713391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.713396]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.713400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.713404]  kthread+0x334/0x6f0
[   35.713408]  ? trace_preempt_on+0x20/0xc0
[   35.713412]  ? __pfx_kthread+0x10/0x10
[   35.713416]  ? _raw_spin_unlock_irq+0x47/0x80
[   35.713420]  ? calculate_sigpending+0x7b/0xa0
[   35.713425]  ? __pfx_kthread+0x10/0x10
[   35.713429]  ret_from_fork+0x113/0x1d0
[   35.713433]  ? __pfx_kthread+0x10/0x10
[   35.713436]  ret_from_fork_asm+0x1a/0x30
[   35.713443]  </TASK>
[   35.713444] 
[   35.905512] Allocated by task 262:
[   35.908918]  kasan_save_stack+0x45/0x70
[   35.912763]  kasan_save_track+0x18/0x40
[   35.916603]  kasan_save_alloc_info+0x3b/0x50
[   35.920877]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   35.926190]  remove_element+0x11e/0x190
[   35.930038]  mempool_alloc_preallocated+0x4d/0x90
[   35.934751]  mempool_oob_right_helper+0x8a/0x380
[   35.939370]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.944104]  kunit_try_run_case+0x1a2/0x480
[   35.948297]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.953698]  kthread+0x334/0x6f0
[   35.956930]  ret_from_fork+0x113/0x1d0
[   35.960682]  ret_from_fork_asm+0x1a/0x30
[   35.964610] 
[   35.966107] The buggy address belongs to the object at ffff8881066f8700
[   35.966107]  which belongs to the cache kmalloc-128 of size 128
[   35.978622] The buggy address is located 0 bytes to the right of
[   35.978622]  allocated 115-byte region [ffff8881066f8700, ffff8881066f8773)
[   35.991578] 
[   35.993079] The buggy address belongs to the physical page:
[   35.998652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   36.006658] flags: 0x200000000000000(node=0|zone=2)
[   36.011537] page_type: f5(slab)
[   36.014685] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   36.022425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.030173] page dumped because: kasan: bad access detected
[   36.035743] 
[   36.037242] Memory state around the buggy address:
[   36.042037]  ffff8881066f8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.049255]  ffff8881066f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.056474] >ffff8881066f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.063693]                                                              ^
[   36.070566]  ffff8881066f8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.077787]  ffff8881066f8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.085005] ==================================================================
[   36.092766] ==================================================================
[   36.104576] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   36.112156] Read of size 1 at addr ffff8881081fa001 by task kunit_try_catch/264
[   36.119465] 
[   36.120964] CPU: 3 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   36.120973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   36.120976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.120980] Call Trace:
[   36.120981]  <TASK>
[   36.120983]  dump_stack_lvl+0x73/0xb0
[   36.120989]  print_report+0xd1/0x650
[   36.120993]  ? __virt_addr_valid+0x1db/0x2d0
[   36.120997]  ? mempool_oob_right_helper+0x318/0x380
[   36.121001]  ? kasan_addr_to_slab+0x11/0xa0
[   36.121005]  ? mempool_oob_right_helper+0x318/0x380
[   36.121009]  kasan_report+0x141/0x180
[   36.121013]  ? mempool_oob_right_helper+0x318/0x380
[   36.121019]  __asan_report_load1_noabort+0x18/0x20
[   36.121023]  mempool_oob_right_helper+0x318/0x380
[   36.121028]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   36.121033]  ? __kasan_check_write+0x18/0x20
[   36.121036]  ? __pfx_sched_clock_cpu+0x10/0x10
[   36.121040]  ? finish_task_switch.isra.0+0x153/0x700
[   36.121045]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   36.121049]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   36.121055]  ? __pfx_mempool_kmalloc+0x10/0x10
[   36.121059]  ? __pfx_mempool_kfree+0x10/0x10
[   36.121064]  ? ktime_get_ts64+0x83/0x230
[   36.121068]  kunit_try_run_case+0x1a2/0x480
[   36.121073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.121077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.121082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.121086]  ? __kthread_parkme+0x82/0x180
[   36.121090]  ? preempt_count_sub+0x50/0x80
[   36.121094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.121099]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.121103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.121107]  kthread+0x334/0x6f0
[   36.121111]  ? trace_preempt_on+0x20/0xc0
[   36.121115]  ? __pfx_kthread+0x10/0x10
[   36.121119]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.121123]  ? calculate_sigpending+0x7b/0xa0
[   36.121127]  ? __pfx_kthread+0x10/0x10
[   36.121131]  ret_from_fork+0x113/0x1d0
[   36.121135]  ? __pfx_kthread+0x10/0x10
[   36.121138]  ret_from_fork_asm+0x1a/0x30
[   36.121144]  </TASK>
[   36.121146] 
[   36.317412] The buggy address belongs to the physical page:
[   36.322991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081f8
[   36.330998] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.338651] flags: 0x200000000000040(head|node=0|zone=2)
[   36.343965] page_type: f8(unknown)
[   36.347372] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.355137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.362883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.370709] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.378537] head: 0200000000000002 ffffea0004207e01 00000000ffffffff 00000000ffffffff
[   36.386369] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.394222] page dumped because: kasan: bad access detected
[   36.399795] 
[   36.401293] Memory state around the buggy address:
[   36.406085]  ffff8881081f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.413307]  ffff8881081f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.420525] >ffff8881081fa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.427745]                    ^
[   36.430977]  ffff8881081fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.438197]  ffff8881081fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.445416] ==================================================================
[   36.453058] ==================================================================
[   36.465360] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   36.472932] Read of size 1 at addr ffff8881066eb2bb by task kunit_try_catch/266
[   36.480247] 
[   36.481748] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   36.481757] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   36.481760] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.481763] Call Trace:
[   36.481765]  <TASK>
[   36.481767]  dump_stack_lvl+0x73/0xb0
[   36.481771]  print_report+0xd1/0x650
[   36.481775]  ? __virt_addr_valid+0x1db/0x2d0
[   36.481779]  ? mempool_oob_right_helper+0x318/0x380
[   36.481784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.481789]  ? mempool_oob_right_helper+0x318/0x380
[   36.481793]  kasan_report+0x141/0x180
[   36.481797]  ? mempool_oob_right_helper+0x318/0x380
[   36.481803]  __asan_report_load1_noabort+0x18/0x20
[   36.481807]  mempool_oob_right_helper+0x318/0x380
[   36.481812]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   36.481817]  ? __pfx_sched_clock_cpu+0x10/0x10
[   36.481820]  ? finish_task_switch.isra.0+0x153/0x700
[   36.481825]  mempool_slab_oob_right+0xed/0x140
[   36.481830]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   36.481835]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   36.481840]  ? __pfx_mempool_free_slab+0x10/0x10
[   36.481845]  ? ktime_get_ts64+0x83/0x230
[   36.481849]  kunit_try_run_case+0x1a2/0x480
[   36.481853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.481858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.481862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.481866]  ? __kthread_parkme+0x82/0x180
[   36.481870]  ? preempt_count_sub+0x50/0x80
[   36.481874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.481878]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.481882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.481887]  kthread+0x334/0x6f0
[   36.481890]  ? trace_preempt_on+0x20/0xc0
[   36.481894]  ? __pfx_kthread+0x10/0x10
[   36.481898]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.481902]  ? calculate_sigpending+0x7b/0xa0
[   36.481907]  ? __pfx_kthread+0x10/0x10
[   36.481910]  ret_from_fork+0x113/0x1d0
[   36.481914]  ? __pfx_kthread+0x10/0x10
[   36.481917]  ret_from_fork_asm+0x1a/0x30
[   36.481923]  </TASK>
[   36.481925] 
[   36.674137] Allocated by task 266:
[   36.677544]  kasan_save_stack+0x45/0x70
[   36.681403]  kasan_save_track+0x18/0x40
[   36.685248]  kasan_save_alloc_info+0x3b/0x50
[   36.689528]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   36.694840]  remove_element+0x11e/0x190
[   36.698679]  mempool_alloc_preallocated+0x4d/0x90
[   36.703406]  mempool_oob_right_helper+0x8a/0x380
[   36.708030]  mempool_slab_oob_right+0xed/0x140
[   36.712478]  kunit_try_run_case+0x1a2/0x480
[   36.716664]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.722061]  kthread+0x334/0x6f0
[   36.725295]  ret_from_fork+0x113/0x1d0
[   36.729047]  ret_from_fork_asm+0x1a/0x30
[   36.732974] 
[   36.734473] The buggy address belongs to the object at ffff8881066eb240
[   36.734473]  which belongs to the cache test_cache of size 123
[   36.746902] The buggy address is located 0 bytes to the right of
[   36.746902]  allocated 123-byte region [ffff8881066eb240, ffff8881066eb2bb)
[   36.759849] 
[   36.761364] The buggy address belongs to the physical page:
[   36.766937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066eb
[   36.774937] flags: 0x200000000000000(node=0|zone=2)
[   36.779818] page_type: f5(slab)
[   36.782964] raw: 0200000000000000 ffff8881038052c0 dead000000000122 0000000000000000
[   36.790712] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.798450] page dumped because: kasan: bad access detected
[   36.804024] 
[   36.805523] Memory state around the buggy address:
[   36.810316]  ffff8881066eb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.817561]  ffff8881066eb200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.824781] >ffff8881066eb280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.831999]                                         ^
[   36.837051]  ffff8881066eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.844270]  ffff8881066eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.851492] ==================================================================