Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.498947] ==================================================================
[   33.500188] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.501384] Read of size 1 at addr fff00000c58e62bb by task kunit_try_catch/214
[   33.502015] 
[   33.502418] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.504107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.504952] Hardware name: linux,dummy-virt (DT)
[   33.505761] Call trace:
[   33.506407]  show_stack+0x20/0x38 (C)
[   33.507213]  dump_stack_lvl+0x8c/0xd0
[   33.508022]  print_report+0x118/0x5e0
[   33.508812]  kasan_report+0xc8/0x118
[   33.509380]  __asan_report_load1_noabort+0x20/0x30
[   33.509996]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.511221]  mempool_slab_oob_right+0xb8/0x110
[   33.511958]  kunit_try_run_case+0x14c/0x3d0
[   33.512970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513696]  kthread+0x24c/0x2d0
[   33.514329]  ret_from_fork+0x10/0x20
[   33.514864] 
[   33.515221] Allocated by task 214:
[   33.515720]  kasan_save_stack+0x3c/0x68
[   33.516260]  kasan_save_track+0x20/0x40
[   33.517429]  kasan_save_alloc_info+0x40/0x58
[   33.518088]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.518798]  remove_element+0x16c/0x1f8
[   33.519372]  mempool_alloc_preallocated+0x58/0xc0
[   33.520109]  mempool_oob_right_helper+0x98/0x2f0
[   33.521556]  mempool_slab_oob_right+0xb8/0x110
[   33.522520]  kunit_try_run_case+0x14c/0x3d0
[   33.523173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.523964]  kthread+0x24c/0x2d0
[   33.524817]  ret_from_fork+0x10/0x20
[   33.525550] 
[   33.525971] The buggy address belongs to the object at fff00000c58e6240
[   33.525971]  which belongs to the cache test_cache of size 123
[   33.527267] The buggy address is located 0 bytes to the right of
[   33.527267]  allocated 123-byte region [fff00000c58e6240, fff00000c58e62bb)
[   33.528793] 
[   33.529280] The buggy address belongs to the physical page:
[   33.529892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e6
[   33.530918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.531696] page_type: f5(slab)
[   33.532178] raw: 0bfffe0000000000 fff00000c5925280 dead000000000122 0000000000000000
[   33.533156] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   33.534041] page dumped because: kasan: bad access detected
[   33.534643] 
[   33.535336] Memory state around the buggy address:
[   33.535972]  fff00000c58e6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.537106]  fff00000c58e6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.538006] >fff00000c58e6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.538834]                                         ^
[   33.539488]  fff00000c58e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.540682]  fff00000c58e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.541508] ==================================================================
[   33.451850] ==================================================================
[   33.453554] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.454813] Read of size 1 at addr fff00000c65b6001 by task kunit_try_catch/212
[   33.455597] 
[   33.456026] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.457953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.459080] Hardware name: linux,dummy-virt (DT)
[   33.459744] Call trace:
[   33.460613]  show_stack+0x20/0x38 (C)
[   33.461279]  dump_stack_lvl+0x8c/0xd0
[   33.461985]  print_report+0x118/0x5e0
[   33.462633]  kasan_report+0xc8/0x118
[   33.463268]  __asan_report_load1_noabort+0x20/0x30
[   33.464051]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.464634]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   33.465468]  kunit_try_run_case+0x14c/0x3d0
[   33.466178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.466877]  kthread+0x24c/0x2d0
[   33.467377]  ret_from_fork+0x10/0x20
[   33.468022] 
[   33.468518] The buggy address belongs to the physical page:
[   33.469353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b4
[   33.470211] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.471130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.472032] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.473228] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.474206] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.475395] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.476202] head: 0bfffe0000000002 ffffc1ffc3196d01 ffffffffffffffff 0000000000000000
[   33.477393] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.478289] page dumped because: kasan: bad access detected
[   33.478970] 
[   33.479387] Memory state around the buggy address:
[   33.480001]  fff00000c65b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.481040]  fff00000c65b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.482060] >fff00000c65b6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.482809]                    ^
[   33.483408]  fff00000c65b6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.484208]  fff00000c65b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.485369] ==================================================================
[   33.398545] ==================================================================
[   33.399584] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.400786] Read of size 1 at addr fff00000c58fc173 by task kunit_try_catch/210
[   33.401731] 
[   33.402090] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.402741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.403098] Hardware name: linux,dummy-virt (DT)
[   33.403551] Call trace:
[   33.403918]  show_stack+0x20/0x38 (C)
[   33.404976]  dump_stack_lvl+0x8c/0xd0
[   33.405527]  print_report+0x118/0x5e0
[   33.406870]  kasan_report+0xc8/0x118
[   33.407604]  __asan_report_load1_noabort+0x20/0x30
[   33.408714]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.409333]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.409943]  kunit_try_run_case+0x14c/0x3d0
[   33.410598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.411366]  kthread+0x24c/0x2d0
[   33.411977]  ret_from_fork+0x10/0x20
[   33.412800] 
[   33.413384] Allocated by task 210:
[   33.413788]  kasan_save_stack+0x3c/0x68
[   33.414274]  kasan_save_track+0x20/0x40
[   33.414878]  kasan_save_alloc_info+0x40/0x58
[   33.415462]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.416137]  remove_element+0x130/0x1f8
[   33.416774]  mempool_alloc_preallocated+0x58/0xc0
[   33.417866]  mempool_oob_right_helper+0x98/0x2f0
[   33.418587]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.419352]  kunit_try_run_case+0x14c/0x3d0
[   33.420031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.421072]  kthread+0x24c/0x2d0
[   33.421570]  ret_from_fork+0x10/0x20
[   33.422004] 
[   33.422270] The buggy address belongs to the object at fff00000c58fc100
[   33.422270]  which belongs to the cache kmalloc-128 of size 128
[   33.424877] The buggy address is located 0 bytes to the right of
[   33.424877]  allocated 115-byte region [fff00000c58fc100, fff00000c58fc173)
[   33.426295] 
[   33.426571] The buggy address belongs to the physical page:
[   33.427141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058fc
[   33.428099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.429358] page_type: f5(slab)
[   33.429782] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.430754] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.431759] page dumped because: kasan: bad access detected
[   33.432543] 
[   33.432886] Memory state around the buggy address:
[   33.433728]  fff00000c58fc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.434305]  fff00000c58fc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.435223] >fff00000c58fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.436006]                                                              ^
[   33.437162]  fff00000c58fc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.438313]  fff00000c58fc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.439652] ==================================================================

[   33.480956] ==================================================================
[   33.482496] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.483298] Read of size 1 at addr fff00000c662e001 by task kunit_try_catch/212
[   33.484336] 
[   33.484855] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.486971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.487633] Hardware name: linux,dummy-virt (DT)
[   33.488194] Call trace:
[   33.488684]  show_stack+0x20/0x38 (C)
[   33.489290]  dump_stack_lvl+0x8c/0xd0
[   33.489862]  print_report+0x118/0x5e0
[   33.490512]  kasan_report+0xc8/0x118
[   33.491163]  __asan_report_load1_noabort+0x20/0x30
[   33.492428]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.493010]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   33.493854]  kunit_try_run_case+0x14c/0x3d0
[   33.495003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.495731]  kthread+0x24c/0x2d0
[   33.496300]  ret_from_fork+0x10/0x20
[   33.496898] 
[   33.497273] The buggy address belongs to the physical page:
[   33.498922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662c
[   33.499793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.500728] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.502095] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.503029] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.503844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.504771] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.506564] head: 0bfffe0000000002 ffffc1ffc3198b01 ffffffffffffffff 0000000000000000
[   33.507396] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.508245] page dumped because: kasan: bad access detected
[   33.508866] 
[   33.509236] Memory state around the buggy address:
[   33.510377]  fff00000c662df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.511161]  fff00000c662df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.512045] >fff00000c662e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.512819]                    ^
[   33.513367]  fff00000c662e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.515111]  fff00000c662e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.515900] ==================================================================
[   33.528781] ==================================================================
[   33.530150] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.531232] Read of size 1 at addr fff00000c65992bb by task kunit_try_catch/214
[   33.532038] 
[   33.532446] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.533519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.534958] Hardware name: linux,dummy-virt (DT)
[   33.535921] Call trace:
[   33.536365]  show_stack+0x20/0x38 (C)
[   33.536931]  dump_stack_lvl+0x8c/0xd0
[   33.537607]  print_report+0x118/0x5e0
[   33.538263]  kasan_report+0xc8/0x118
[   33.538894]  __asan_report_load1_noabort+0x20/0x30
[   33.539505]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.540360]  mempool_slab_oob_right+0xb8/0x110
[   33.541083]  kunit_try_run_case+0x14c/0x3d0
[   33.541780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.542418]  kthread+0x24c/0x2d0
[   33.543041]  ret_from_fork+0x10/0x20
[   33.544656] 
[   33.544931] Allocated by task 214:
[   33.545404]  kasan_save_stack+0x3c/0x68
[   33.545972]  kasan_save_track+0x20/0x40
[   33.546996]  kasan_save_alloc_info+0x40/0x58
[   33.547622]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.548300]  remove_element+0x16c/0x1f8
[   33.548953]  mempool_alloc_preallocated+0x58/0xc0
[   33.550640]  mempool_oob_right_helper+0x98/0x2f0
[   33.551189]  mempool_slab_oob_right+0xb8/0x110
[   33.552055]  kunit_try_run_case+0x14c/0x3d0
[   33.552931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.553976]  kthread+0x24c/0x2d0
[   33.554559]  ret_from_fork+0x10/0x20
[   33.555176] 
[   33.555516] The buggy address belongs to the object at fff00000c6599240
[   33.555516]  which belongs to the cache test_cache of size 123
[   33.557034] The buggy address is located 0 bytes to the right of
[   33.557034]  allocated 123-byte region [fff00000c6599240, fff00000c65992bb)
[   33.558833] 
[   33.559244] The buggy address belongs to the physical page:
[   33.559969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106599
[   33.560878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.562086] page_type: f5(slab)
[   33.562728] raw: 0bfffe0000000000 fff00000c46cadc0 dead000000000122 0000000000000000
[   33.563649] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   33.564729] page dumped because: kasan: bad access detected
[   33.565388] 
[   33.566289] Memory state around the buggy address:
[   33.566922]  fff00000c6599180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.567599]  fff00000c6599200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.568554] >fff00000c6599280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.569377]                                         ^
[   33.570074]  fff00000c6599300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.571028]  fff00000c6599380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.572370] ==================================================================
[   33.428291] ==================================================================
[   33.429544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.430803] Read of size 1 at addr fff00000c5e99d73 by task kunit_try_catch/210
[   33.431191] 
[   33.431375] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.432343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.432839] Hardware name: linux,dummy-virt (DT)
[   33.433516] Call trace:
[   33.433892]  show_stack+0x20/0x38 (C)
[   33.435259]  dump_stack_lvl+0x8c/0xd0
[   33.435810]  print_report+0x118/0x5e0
[   33.436421]  kasan_report+0xc8/0x118
[   33.437039]  __asan_report_load1_noabort+0x20/0x30
[   33.437774]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.439020]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.439778]  kunit_try_run_case+0x14c/0x3d0
[   33.440415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.441078]  kthread+0x24c/0x2d0
[   33.442019]  ret_from_fork+0x10/0x20
[   33.442604] 
[   33.442971] Allocated by task 210:
[   33.443555]  kasan_save_stack+0x3c/0x68
[   33.444077]  kasan_save_track+0x20/0x40
[   33.444727]  kasan_save_alloc_info+0x40/0x58
[   33.445301]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.446359]  remove_element+0x130/0x1f8
[   33.447030]  mempool_alloc_preallocated+0x58/0xc0
[   33.447694]  mempool_oob_right_helper+0x98/0x2f0
[   33.448263]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.449031]  kunit_try_run_case+0x14c/0x3d0
[   33.449794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.451156]  kthread+0x24c/0x2d0
[   33.451870]  ret_from_fork+0x10/0x20
[   33.452458] 
[   33.453032] The buggy address belongs to the object at fff00000c5e99d00
[   33.453032]  which belongs to the cache kmalloc-128 of size 128
[   33.454221] The buggy address is located 0 bytes to the right of
[   33.454221]  allocated 115-byte region [fff00000c5e99d00, fff00000c5e99d73)
[   33.455494] 
[   33.455891] The buggy address belongs to the physical page:
[   33.456479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99
[   33.457477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.458226] page_type: f5(slab)
[   33.458805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.459845] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.460665] page dumped because: kasan: bad access detected
[   33.461409] 
[   33.461773] Memory state around the buggy address:
[   33.462379]  fff00000c5e99c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.463219]  fff00000c5e99c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.464071] >fff00000c5e99d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.464912]                                                              ^
[   33.465691]  fff00000c5e99d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.466450]  fff00000c5e99e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.467279] ==================================================================

[   27.620239] ==================================================================
[   27.621183] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   27.621183] Read of size 1 at addr ffff8881028ee2bb by task kunit_try_catch/234
[   27.621183] 
[   27.621183] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.621183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.621183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.621183] Call Trace:
[   27.621183]  <TASK>
[   27.621183]  dump_stack_lvl+0x73/0xb0
[   27.621183]  print_report+0xd1/0x640
[   27.621183]  ? __virt_addr_valid+0x1db/0x2d0
[   27.621183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.621183]  kasan_report+0x102/0x140
[   27.621183]  ? mempool_oob_right_helper+0x31a/0x380
[   27.621183]  ? mempool_oob_right_helper+0x31a/0x380
[   27.621183]  __asan_report_load1_noabort+0x18/0x20
[   27.621183]  mempool_oob_right_helper+0x31a/0x380
[   27.621183]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.621183]  ? ktime_get_ts64+0x84/0x230
[   27.621183]  ? trace_hardirqs_on+0x37/0xe0
[   27.621183]  mempool_slab_oob_right+0xb1/0x100
[   27.621183]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   27.621183]  ? __switch_to+0x5d9/0xf60
[   27.621183]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   27.621183]  ? __pfx_mempool_free_slab+0x10/0x10
[   27.621183]  ? ktime_get_ts64+0x84/0x230
[   27.621183]  kunit_try_run_case+0x1b3/0x490
[   27.621183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.621183]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.621183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.621183]  ? __kthread_parkme+0x82/0x160
[   27.621183]  ? preempt_count_sub+0x50/0x80
[   27.621183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.621183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.621183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.621183]  kthread+0x257/0x310
[   27.621183]  ? __pfx_kthread+0x10/0x10
[   27.621183]  ret_from_fork+0x41/0x80
[   27.621183]  ? __pfx_kthread+0x10/0x10
[   27.621183]  ret_from_fork_asm+0x1a/0x30
[   27.621183]  </TASK>
[   27.621183] 
[   27.621183] Allocated by task 234:
[   27.621183]  kasan_save_stack+0x3d/0x60
[   27.621183]  kasan_save_track+0x18/0x40
[   27.621183]  kasan_save_alloc_info+0x3b/0x50
[   27.621183]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   27.621183]  remove_element+0x11e/0x190
[   27.621183]  mempool_alloc_preallocated+0x4d/0x90
[   27.621183]  mempool_oob_right_helper+0x8b/0x380
[   27.621183]  mempool_slab_oob_right+0xb1/0x100
[   27.621183]  kunit_try_run_case+0x1b3/0x490
[   27.621183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.621183]  kthread+0x257/0x310
[   27.621183]  ret_from_fork+0x41/0x80
[   27.621183]  ret_from_fork_asm+0x1a/0x30
[   27.621183] 
[   27.621183] The buggy address belongs to the object at ffff8881028ee240
[   27.621183]  which belongs to the cache test_cache of size 123
[   27.621183] The buggy address is located 0 bytes to the right of
[   27.621183]  allocated 123-byte region [ffff8881028ee240, ffff8881028ee2bb)
[   27.621183] 
[   27.621183] The buggy address belongs to the physical page:
[   27.621183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ee
[   27.621183] flags: 0x200000000000000(node=0|zone=2)
[   27.621183] page_type: f5(slab)
[   27.621183] raw: 0200000000000000 ffff888100a2bdc0 dead000000000122 0000000000000000
[   27.621183] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   27.621183] page dumped because: kasan: bad access detected
[   27.621183] 
[   27.621183] Memory state around the buggy address:
[   27.621183]  ffff8881028ee180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.621183]  ffff8881028ee200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   27.621183] >ffff8881028ee280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   27.621183]                                         ^
[   27.621183]  ffff8881028ee300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.621183]  ffff8881028ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.621183] ==================================================================
[   27.517373] ==================================================================
[   27.518065] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   27.518173] Read of size 1 at addr ffff888102945873 by task kunit_try_catch/230
[   27.518173] 
[   27.518173] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.518173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.518173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.518173] Call Trace:
[   27.518173]  <TASK>
[   27.518173]  dump_stack_lvl+0x73/0xb0
[   27.518173]  print_report+0xd1/0x640
[   27.518173]  ? __virt_addr_valid+0x1db/0x2d0
[   27.518173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.518173]  kasan_report+0x102/0x140
[   27.518173]  ? mempool_oob_right_helper+0x31a/0x380
[   27.518173]  ? mempool_oob_right_helper+0x31a/0x380
[   27.518173]  __asan_report_load1_noabort+0x18/0x20
[   27.518173]  mempool_oob_right_helper+0x31a/0x380
[   27.518173]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.518173]  mempool_kmalloc_oob_right+0xb6/0x100
[   27.518173]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   27.518173]  ? __switch_to+0x5d9/0xf60
[   27.518173]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.518173]  ? __pfx_mempool_kfree+0x10/0x10
[   27.518173]  ? ktime_get_ts64+0x84/0x230
[   27.518173]  kunit_try_run_case+0x1b3/0x490
[   27.518173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.518173]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.518173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.518173]  ? __kthread_parkme+0x82/0x160
[   27.518173]  ? preempt_count_sub+0x50/0x80
[   27.518173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.518173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.518173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.518173]  kthread+0x257/0x310
[   27.518173]  ? __pfx_kthread+0x10/0x10
[   27.518173]  ret_from_fork+0x41/0x80
[   27.518173]  ? __pfx_kthread+0x10/0x10
[   27.518173]  ret_from_fork_asm+0x1a/0x30
[   27.518173]  </TASK>
[   27.518173] 
[   27.518173] Allocated by task 230:
[   27.518173]  kasan_save_stack+0x3d/0x60
[   27.518173]  kasan_save_track+0x18/0x40
[   27.518173]  kasan_save_alloc_info+0x3b/0x50
[   27.518173]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.518173]  remove_element+0x11e/0x190
[   27.518173]  mempool_alloc_preallocated+0x4d/0x90
[   27.518173]  mempool_oob_right_helper+0x8b/0x380
[   27.518173]  mempool_kmalloc_oob_right+0xb6/0x100
[   27.518173]  kunit_try_run_case+0x1b3/0x490
[   27.518173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.518173]  kthread+0x257/0x310
[   27.518173]  ret_from_fork+0x41/0x80
[   27.518173]  ret_from_fork_asm+0x1a/0x30
[   27.518173] 
[   27.518173] The buggy address belongs to the object at ffff888102945800
[   27.518173]  which belongs to the cache kmalloc-128 of size 128
[   27.518173] The buggy address is located 0 bytes to the right of
[   27.518173]  allocated 115-byte region [ffff888102945800, ffff888102945873)
[   27.518173] 
[   27.518173] The buggy address belongs to the physical page:
[   27.518173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102945
[   27.518173] flags: 0x200000000000000(node=0|zone=2)
[   27.518173] page_type: f5(slab)
[   27.518173] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.518173] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.518173] page dumped because: kasan: bad access detected
[   27.518173] 
[   27.518173] Memory state around the buggy address:
[   27.518173]  ffff888102945700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.518173]  ffff888102945780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.518173] >ffff888102945800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.518173]                                                              ^
[   27.518173]  ffff888102945880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.518173]  ffff888102945900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   27.518173] ==================================================================
[   27.571610] ==================================================================
[   27.572173] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   27.572173] Read of size 1 at addr ffff888102b22001 by task kunit_try_catch/232
[   27.572173] 
[   27.572173] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   27.572173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.572173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.572173] Call Trace:
[   27.572173]  <TASK>
[   27.572173]  dump_stack_lvl+0x73/0xb0
[   27.572173]  print_report+0xd1/0x640
[   27.572173]  ? __virt_addr_valid+0x1db/0x2d0
[   27.572173]  ? kasan_addr_to_slab+0x11/0xa0
[   27.572173]  kasan_report+0x102/0x140
[   27.572173]  ? mempool_oob_right_helper+0x31a/0x380
[   27.572173]  ? mempool_oob_right_helper+0x31a/0x380
[   27.572173]  __asan_report_load1_noabort+0x18/0x20
[   27.572173]  mempool_oob_right_helper+0x31a/0x380
[   27.572173]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.572173]  ? read_hpet+0x1f0/0x230
[   27.572173]  ? ktime_get_ts64+0x84/0x230
[   27.572173]  ? trace_hardirqs_on+0x37/0xe0
[   27.572173]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   27.572173]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   27.572173]  ? __switch_to+0x5d9/0xf60
[   27.572173]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.572173]  ? __pfx_mempool_kfree+0x10/0x10
[   27.572173]  ? ktime_get_ts64+0x84/0x230
[   27.572173]  kunit_try_run_case+0x1b3/0x490
[   27.572173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.572173]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.572173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.572173]  ? __kthread_parkme+0x82/0x160
[   27.572173]  ? preempt_count_sub+0x50/0x80
[   27.572173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.572173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.572173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.572173]  kthread+0x257/0x310
[   27.572173]  ? __pfx_kthread+0x10/0x10
[   27.572173]  ret_from_fork+0x41/0x80
[   27.572173]  ? __pfx_kthread+0x10/0x10
[   27.572173]  ret_from_fork_asm+0x1a/0x30
[   27.572173]  </TASK>
[   27.572173] 
[   27.572173] The buggy address belongs to the physical page:
[   27.572173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20
[   27.572173] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.572173] flags: 0x200000000000040(head|node=0|zone=2)
[   27.572173] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.572173] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.572173] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.572173] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.572173] head: 0200000000000002 ffffea00040ac801 ffffffffffffffff 0000000000000000
[   27.572173] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.572173] page dumped because: kasan: bad access detected
[   27.572173] 
[   27.572173] Memory state around the buggy address:
[   27.572173]  ffff888102b21f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.572173]  ffff888102b21f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.572173] >ffff888102b22000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.572173]                    ^
[   27.572173]  ffff888102b22080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.572173]  ffff888102b22100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.572173] ==================================================================

[   22.512667] ==================================================================
[   22.513782] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   22.514793] Read of size 1 at addr ffff888102a32001 by task kunit_try_catch/230
[   22.515403] 
[   22.515745] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   22.517279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.517876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.518415] Call Trace:
[   22.519361]  <TASK>
[   22.520030]  dump_stack_lvl+0x73/0xb0
[   22.520732]  print_report+0xd1/0x640
[   22.521341]  ? __virt_addr_valid+0x1db/0x2d0
[   22.521868]  ? kasan_addr_to_slab+0x11/0xa0
[   22.522767]  kasan_report+0x102/0x140
[   22.523382]  ? mempool_oob_right_helper+0x31a/0x380
[   22.523774]  ? mempool_oob_right_helper+0x31a/0x380
[   22.524312]  __asan_report_load1_noabort+0x18/0x20
[   22.524763]  mempool_oob_right_helper+0x31a/0x380
[   22.525420]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   22.526444]  ? finish_task_switch.isra.0+0x153/0x700
[   22.527161]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   22.527992]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   22.528656]  ? __switch_to+0x5d9/0xf60
[   22.529036]  ? __pfx_mempool_kmalloc+0x10/0x10
[   22.529431]  ? __pfx_mempool_kfree+0x10/0x10
[   22.529855]  ? __pfx_read_tsc+0x10/0x10
[   22.530216]  ? ktime_get_ts64+0x84/0x230
[   22.531148]  kunit_try_run_case+0x1b3/0x490
[   22.531828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.532479]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.533243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.533863]  ? __kthread_parkme+0x82/0x160
[   22.534655]  ? preempt_count_sub+0x50/0x80
[   22.535318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.535821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.536515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.537092]  kthread+0x257/0x310
[   22.537445]  ? __pfx_kthread+0x10/0x10
[   22.537871]  ret_from_fork+0x41/0x80
[   22.538309]  ? __pfx_kthread+0x10/0x10
[   22.539080]  ret_from_fork_asm+0x1a/0x30
[   22.539427]  </TASK>
[   22.539738] 
[   22.539957] The buggy address belongs to the physical page:
[   22.540378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   22.541359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.541888] flags: 0x200000000000040(head|node=0|zone=2)
[   22.542916] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.543793] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.544669] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.545692] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.546415] head: 0200000000000002 ffffea00040a8c01 ffffffffffffffff 0000000000000000
[   22.547236] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   22.547942] page dumped because: kasan: bad access detected
[   22.548263] 
[   22.548517] Memory state around the buggy address:
[   22.549146]  ffff888102a31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.549829]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.550238] >ffff888102a32000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.551566]                    ^
[   22.552160]  ffff888102a32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.553403]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.554308] ==================================================================
[   22.455915] ==================================================================
[   22.456801] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   22.458338] Read of size 1 at addr ffff8881028bfb73 by task kunit_try_catch/228
[   22.458882] 
[   22.459397] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   22.460139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.460550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.461508] Call Trace:
[   22.462103]  <TASK>
[   22.462529]  dump_stack_lvl+0x73/0xb0
[   22.463315]  print_report+0xd1/0x640
[   22.463924]  ? __virt_addr_valid+0x1db/0x2d0
[   22.464511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.465034]  kasan_report+0x102/0x140
[   22.465397]  ? mempool_oob_right_helper+0x31a/0x380
[   22.466069]  ? mempool_oob_right_helper+0x31a/0x380
[   22.466717]  __asan_report_load1_noabort+0x18/0x20
[   22.467131]  mempool_oob_right_helper+0x31a/0x380
[   22.467722]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   22.468710]  ? finish_task_switch.isra.0+0x153/0x700
[   22.469828]  mempool_kmalloc_oob_right+0xb6/0x100
[   22.470594]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   22.471097]  ? __switch_to+0x5d9/0xf60
[   22.471996]  ? __pfx_mempool_kmalloc+0x10/0x10
[   22.472512]  ? __pfx_mempool_kfree+0x10/0x10
[   22.472999]  ? __pfx_read_tsc+0x10/0x10
[   22.473429]  ? ktime_get_ts64+0x84/0x230
[   22.474285]  kunit_try_run_case+0x1b3/0x490
[   22.474878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.475578]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.476371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.477227]  ? __kthread_parkme+0x82/0x160
[   22.477744]  ? preempt_count_sub+0x50/0x80
[   22.478480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.478924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.479780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.480425]  kthread+0x257/0x310
[   22.480891]  ? __pfx_kthread+0x10/0x10
[   22.481167]  ret_from_fork+0x41/0x80
[   22.481821]  ? __pfx_kthread+0x10/0x10
[   22.482420]  ret_from_fork_asm+0x1a/0x30
[   22.482936]  </TASK>
[   22.483465] 
[   22.483786] Allocated by task 228:
[   22.484287]  kasan_save_stack+0x3d/0x60
[   22.484772]  kasan_save_track+0x18/0x40
[   22.485362]  kasan_save_alloc_info+0x3b/0x50
[   22.485882]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   22.486535]  remove_element+0x11e/0x190
[   22.486984]  mempool_alloc_preallocated+0x4d/0x90
[   22.487787]  mempool_oob_right_helper+0x8b/0x380
[   22.488202]  mempool_kmalloc_oob_right+0xb6/0x100
[   22.488897]  kunit_try_run_case+0x1b3/0x490
[   22.489549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.490262]  kthread+0x257/0x310
[   22.490543]  ret_from_fork+0x41/0x80
[   22.491012]  ret_from_fork_asm+0x1a/0x30
[   22.491692] 
[   22.491934] The buggy address belongs to the object at ffff8881028bfb00
[   22.491934]  which belongs to the cache kmalloc-128 of size 128
[   22.493101] The buggy address is located 0 bytes to the right of
[   22.493101]  allocated 115-byte region [ffff8881028bfb00, ffff8881028bfb73)
[   22.494324] 
[   22.494568] The buggy address belongs to the physical page:
[   22.495151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028bf
[   22.496236] flags: 0x200000000000000(node=0|zone=2)
[   22.496704] page_type: f5(slab)
[   22.497290] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.497804] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.498747] page dumped because: kasan: bad access detected
[   22.499437] 
[   22.499687] Memory state around the buggy address:
[   22.500358]  ffff8881028bfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.500959]  ffff8881028bfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.501835] >ffff8881028bfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.502625]                                                              ^
[   22.503468]  ffff8881028bfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.504185]  ffff8881028bfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.504919] ==================================================================
[   22.564184] ==================================================================
[   22.565262] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   22.565919] Read of size 1 at addr ffff888102bab2bb by task kunit_try_catch/232
[   22.567307] 
[   22.567717] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   22.569108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.569632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.570306] Call Trace:
[   22.570600]  <TASK>
[   22.570918]  dump_stack_lvl+0x73/0xb0
[   22.571371]  print_report+0xd1/0x640
[   22.571772]  ? __virt_addr_valid+0x1db/0x2d0
[   22.572139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.572797]  kasan_report+0x102/0x140
[   22.573088]  ? mempool_oob_right_helper+0x31a/0x380
[   22.573413]  ? mempool_oob_right_helper+0x31a/0x380
[   22.574609]  __asan_report_load1_noabort+0x18/0x20
[   22.575476]  mempool_oob_right_helper+0x31a/0x380
[   22.576027]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   22.576737]  ? finish_task_switch.isra.0+0x153/0x700
[   22.577894]  mempool_slab_oob_right+0xb1/0x100
[   22.578511]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   22.579077]  ? __switch_to+0x5d9/0xf60
[   22.579372]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   22.579910]  ? __pfx_mempool_free_slab+0x10/0x10
[   22.580397]  ? __pfx_read_tsc+0x10/0x10
[   22.580811]  ? ktime_get_ts64+0x84/0x230
[   22.581400]  kunit_try_run_case+0x1b3/0x490
[   22.581800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.582324]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.582996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.583513]  ? __kthread_parkme+0x82/0x160
[   22.583989]  ? preempt_count_sub+0x50/0x80
[   22.584772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.585261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.585667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.586033]  kthread+0x257/0x310
[   22.586447]  ? __pfx_kthread+0x10/0x10
[   22.586956]  ret_from_fork+0x41/0x80
[   22.587238]  ? __pfx_kthread+0x10/0x10
[   22.587798]  ret_from_fork_asm+0x1a/0x30
[   22.588333]  </TASK>
[   22.588726] 
[   22.589043] Allocated by task 232:
[   22.589402]  kasan_save_stack+0x3d/0x60
[   22.589892]  kasan_save_track+0x18/0x40
[   22.590244]  kasan_save_alloc_info+0x3b/0x50
[   22.590568]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   22.591219]  remove_element+0x11e/0x190
[   22.591789]  mempool_alloc_preallocated+0x4d/0x90
[   22.593138]  mempool_oob_right_helper+0x8b/0x380
[   22.594539]  mempool_slab_oob_right+0xb1/0x100
[   22.595268]  kunit_try_run_case+0x1b3/0x490
[   22.595959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.596330]  kthread+0x257/0x310
[   22.596792]  ret_from_fork+0x41/0x80
[   22.597785]  ret_from_fork_asm+0x1a/0x30
[   22.598435] 
[   22.598619] The buggy address belongs to the object at ffff888102bab240
[   22.598619]  which belongs to the cache test_cache of size 123
[   22.600296] The buggy address is located 0 bytes to the right of
[   22.600296]  allocated 123-byte region [ffff888102bab240, ffff888102bab2bb)
[   22.601544] 
[   22.601817] The buggy address belongs to the physical page:
[   22.602782] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bab
[   22.603445] flags: 0x200000000000000(node=0|zone=2)
[   22.604172] page_type: f5(slab)
[   22.604832] raw: 0200000000000000 ffff888102ba5280 dead000000000122 0000000000000000
[   22.605866] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   22.606694] page dumped because: kasan: bad access detected
[   22.607192] 
[   22.607411] Memory state around the buggy address:
[   22.607762]  ffff888102bab180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.608370]  ffff888102bab200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   22.609294] >ffff888102bab280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   22.610115]                                         ^
[   22.610603]  ffff888102bab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611076]  ffff888102bab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611684] ==================================================================