Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   52.820447] ==================================================================
[   52.820618] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   52.820754] Read of size 1 at addr ffff000800de6373 by task kunit_try_catch/305
[   52.827212] 
[   52.828697] CPU: 7 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   52.828754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.828769] Hardware name: WinLink E850-96 board (DT)
[   52.828793] Call trace:
[   52.828808]  show_stack+0x20/0x38 (C)
[   52.828844]  dump_stack_lvl+0x8c/0xd0
[   52.828878]  print_report+0x118/0x5d0
[   52.828906]  kasan_report+0xdc/0x128
[   52.828933]  __asan_report_load1_noabort+0x20/0x30
[   52.828963]  mempool_oob_right_helper+0x2ac/0x2f0
[   52.828995]  mempool_kmalloc_oob_right+0xc4/0x120
[   52.829027]  kunit_try_run_case+0x170/0x3f0
[   52.829061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.829092]  kthread+0x328/0x630
[   52.829119]  ret_from_fork+0x10/0x20
[   52.829150] 
[   52.897957] Allocated by task 305:
[   52.901346]  kasan_save_stack+0x3c/0x68
[   52.905162]  kasan_save_track+0x20/0x40
[   52.908979]  kasan_save_alloc_info+0x40/0x58
[   52.913233]  __kasan_mempool_unpoison_object+0x11c/0x180
[   52.918528]  remove_element+0x130/0x1f8
[   52.922348]  mempool_alloc_preallocated+0x58/0xc0
[   52.927035]  mempool_oob_right_helper+0x98/0x2f0
[   52.931636]  mempool_kmalloc_oob_right+0xc4/0x120
[   52.936323]  kunit_try_run_case+0x170/0x3f0
[   52.940489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.945958]  kthread+0x328/0x630
[   52.949170]  ret_from_fork+0x10/0x20
[   52.952729] 
[   52.954207] The buggy address belongs to the object at ffff000800de6300
[   52.954207]  which belongs to the cache kmalloc-128 of size 128
[   52.966708] The buggy address is located 0 bytes to the right of
[   52.966708]  allocated 115-byte region [ffff000800de6300, ffff000800de6373)
[   52.979638] 
[   52.981118] The buggy address belongs to the physical page:
[   52.986674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6
[   52.994657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.002298] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.009241] page_type: f5(slab)
[   53.012379] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   53.020099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.027826] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   53.035634] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.043447] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff
[   53.051258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   53.059064] page dumped because: kasan: bad access detected
[   53.064619] 
[   53.066095] Memory state around the buggy address:
[   53.070877]  ffff000800de6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.078078]  ffff000800de6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.085284] >ffff000800de6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   53.092484]                                                              ^
[   53.099345]  ffff000800de6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.106551]  ffff000800de6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   53.113753] ==================================================================
[   53.122842] ==================================================================
[   53.132678] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   53.140228] Read of size 1 at addr ffff0008078d6001 by task kunit_try_catch/307
[   53.147518] 
[   53.149005] CPU: 5 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   53.149062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.149080] Hardware name: WinLink E850-96 board (DT)
[   53.149103] Call trace:
[   53.149115]  show_stack+0x20/0x38 (C)
[   53.149150]  dump_stack_lvl+0x8c/0xd0
[   53.149181]  print_report+0x118/0x5d0
[   53.149212]  kasan_report+0xdc/0x128
[   53.149238]  __asan_report_load1_noabort+0x20/0x30
[   53.149274]  mempool_oob_right_helper+0x2ac/0x2f0
[   53.149310]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   53.149344]  kunit_try_run_case+0x170/0x3f0
[   53.149383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.149415]  kthread+0x328/0x630
[   53.149446]  ret_from_fork+0x10/0x20
[   53.149484] 
[   53.218787] The buggy address belongs to the physical page:
[   53.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8878d4
[   53.232328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.239966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.246910] page_type: f8(unknown)
[   53.250308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.258026] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.265754] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.273564] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.281377] head: 0bfffe0000000002 fffffdffe01e3501 00000000ffffffff 00000000ffffffff
[   53.289189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   53.296994] page dumped because: kasan: bad access detected
[   53.302550] 
[   53.304025] Memory state around the buggy address:
[   53.308804]  ffff0008078d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.316008]  ffff0008078d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.323215] >ffff0008078d6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.330414]                    ^
[   53.333630]  ffff0008078d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.340835]  ffff0008078d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.348035] ==================================================================
[   53.357540] ==================================================================
[   53.367486] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   53.375032] Read of size 1 at addr ffff0008084ed2bb by task kunit_try_catch/309
[   53.382325] 
[   53.383809] CPU: 3 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   53.383870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.383888] Hardware name: WinLink E850-96 board (DT)
[   53.383909] Call trace:
[   53.383923]  show_stack+0x20/0x38 (C)
[   53.383959]  dump_stack_lvl+0x8c/0xd0
[   53.383993]  print_report+0x118/0x5d0
[   53.384023]  kasan_report+0xdc/0x128
[   53.384050]  __asan_report_load1_noabort+0x20/0x30
[   53.384087]  mempool_oob_right_helper+0x2ac/0x2f0
[   53.384123]  mempool_slab_oob_right+0xc0/0x118
[   53.384159]  kunit_try_run_case+0x170/0x3f0
[   53.384197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.384234]  kthread+0x328/0x630
[   53.384264]  ret_from_fork+0x10/0x20
[   53.384299] 
[   53.452810] Allocated by task 309:
[   53.456196]  kasan_save_stack+0x3c/0x68
[   53.460013]  kasan_save_track+0x20/0x40
[   53.463832]  kasan_save_alloc_info+0x40/0x58
[   53.468086]  __kasan_mempool_unpoison_object+0xbc/0x180
[   53.473294]  remove_element+0x16c/0x1f8
[   53.477114]  mempool_alloc_preallocated+0x58/0xc0
[   53.481802]  mempool_oob_right_helper+0x98/0x2f0
[   53.486402]  mempool_slab_oob_right+0xc0/0x118
[   53.490829]  kunit_try_run_case+0x170/0x3f0
[   53.494995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.500464]  kthread+0x328/0x630
[   53.503675]  ret_from_fork+0x10/0x20
[   53.507235] 
[   53.508712] The buggy address belongs to the object at ffff0008084ed240
[   53.508712]  which belongs to the cache test_cache of size 123
[   53.521126] The buggy address is located 0 bytes to the right of
[   53.521126]  allocated 123-byte region [ffff0008084ed240, ffff0008084ed2bb)
[   53.534057] 
[   53.535536] The buggy address belongs to the physical page:
[   53.541092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884ed
[   53.549077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.555586] page_type: f5(slab)
[   53.558722] raw: 0bfffe0000000000 ffff0008019cc140 dead000000000122 0000000000000000
[   53.566442] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   53.574161] page dumped because: kasan: bad access detected
[   53.579716] 
[   53.581191] Memory state around the buggy address:
[   53.585975]  ffff0008084ed180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.593176]  ffff0008084ed200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   53.600381] >ffff0008084ed280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   53.607580]                                         ^
[   53.612619]  ffff0008084ed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.619823]  ffff0008084ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.627025] ==================================================================

[   32.364085] ==================================================================
[   32.364167] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.364253] Read of size 1 at addr fff00000c99f0573 by task kunit_try_catch/252
[   32.364307] 
[   32.364369] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.364463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.364491] Hardware name: linux,dummy-virt (DT)
[   32.364525] Call trace:
[   32.364552]  show_stack+0x20/0x38 (C)
[   32.364605]  dump_stack_lvl+0x8c/0xd0
[   32.364655]  print_report+0x118/0x5d0
[   32.364699]  kasan_report+0xdc/0x128
[   32.364742]  __asan_report_load1_noabort+0x20/0x30
[   32.364791]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.364840]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.364889]  kunit_try_run_case+0x170/0x3f0
[   32.364941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.364991]  kthread+0x328/0x630
[   32.365035]  ret_from_fork+0x10/0x20
[   32.365085] 
[   32.365104] Allocated by task 252:
[   32.365134]  kasan_save_stack+0x3c/0x68
[   32.365179]  kasan_save_track+0x20/0x40
[   32.365220]  kasan_save_alloc_info+0x40/0x58
[   32.365260]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.365306]  remove_element+0x130/0x1f8
[   32.365358]  mempool_alloc_preallocated+0x58/0xc0
[   32.365621]  mempool_oob_right_helper+0x98/0x2f0
[   32.365672]  mempool_kmalloc_oob_right+0xc4/0x120
[   32.365712]  kunit_try_run_case+0x170/0x3f0
[   32.365751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.365794]  kthread+0x328/0x630
[   32.365828]  ret_from_fork+0x10/0x20
[   32.365864] 
[   32.365885] The buggy address belongs to the object at fff00000c99f0500
[   32.365885]  which belongs to the cache kmalloc-128 of size 128
[   32.365945] The buggy address is located 0 bytes to the right of
[   32.365945]  allocated 115-byte region [fff00000c99f0500, fff00000c99f0573)
[   32.366009] 
[   32.366030] The buggy address belongs to the physical page:
[   32.366065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0
[   32.366124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.366177] page_type: f5(slab)
[   32.366221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.366270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.366312] page dumped because: kasan: bad access detected
[   32.366360] 
[   32.366378] Memory state around the buggy address:
[   32.366415]  fff00000c99f0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.366459]  fff00000c99f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.366503] >fff00000c99f0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.366539]                                                              ^
[   32.366580]  fff00000c99f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.366620]  fff00000c99f0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.366659] ==================================================================
[   32.388103] ==================================================================
[   32.388174] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.388236] Read of size 1 at addr fff00000c9ad12bb by task kunit_try_catch/256
[   32.388288] 
[   32.388343] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.388431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.388457] Hardware name: linux,dummy-virt (DT)
[   32.388487] Call trace:
[   32.388512]  show_stack+0x20/0x38 (C)
[   32.388561]  dump_stack_lvl+0x8c/0xd0
[   32.388608]  print_report+0x118/0x5d0
[   32.388650]  kasan_report+0xdc/0x128
[   32.388694]  __asan_report_load1_noabort+0x20/0x30
[   32.388743]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.388791]  mempool_slab_oob_right+0xc0/0x118
[   32.388838]  kunit_try_run_case+0x170/0x3f0
[   32.388888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.388936]  kthread+0x328/0x630
[   32.388979]  ret_from_fork+0x10/0x20
[   32.389025] 
[   32.389044] Allocated by task 256:
[   32.389076]  kasan_save_stack+0x3c/0x68
[   32.389118]  kasan_save_track+0x20/0x40
[   32.389155]  kasan_save_alloc_info+0x40/0x58
[   32.389193]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.389237]  remove_element+0x16c/0x1f8
[   32.389277]  mempool_alloc_preallocated+0x58/0xc0
[   32.389317]  mempool_oob_right_helper+0x98/0x2f0
[   32.389396]  mempool_slab_oob_right+0xc0/0x118
[   32.389508]  kunit_try_run_case+0x170/0x3f0
[   32.389548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.389589]  kthread+0x328/0x630
[   32.389622]  ret_from_fork+0x10/0x20
[   32.389668] 
[   32.389689] The buggy address belongs to the object at fff00000c9ad1240
[   32.389689]  which belongs to the cache test_cache of size 123
[   32.389749] The buggy address is located 0 bytes to the right of
[   32.389749]  allocated 123-byte region [fff00000c9ad1240, fff00000c9ad12bb)
[   32.389961] 
[   32.389985] The buggy address belongs to the physical page:
[   32.390031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad1
[   32.390239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.390422] page_type: f5(slab)
[   32.390482] raw: 0bfffe0000000000 fff00000c5d1f8c0 dead000000000122 0000000000000000
[   32.390531] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.390573] page dumped because: kasan: bad access detected
[   32.390614] 
[   32.390632] Memory state around the buggy address:
[   32.390664]  fff00000c9ad1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.390777]  fff00000c9ad1200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.390822] >fff00000c9ad1280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.390912]                                         ^
[   32.390945]  fff00000c9ad1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.391084]  fff00000c9ad1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.391123] ==================================================================
[   32.376400] ==================================================================
[   32.376478] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.376544] Read of size 1 at addr fff00000c9b66001 by task kunit_try_catch/254
[   32.376595] 
[   32.376633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.376831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.377111] Hardware name: linux,dummy-virt (DT)
[   32.377150] Call trace:
[   32.377182]  show_stack+0x20/0x38 (C)
[   32.377284]  dump_stack_lvl+0x8c/0xd0
[   32.377350]  print_report+0x118/0x5d0
[   32.377396]  kasan_report+0xdc/0x128
[   32.377438]  __asan_report_load1_noabort+0x20/0x30
[   32.377493]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.377603]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   32.377767]  kunit_try_run_case+0x170/0x3f0
[   32.377843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.377893]  kthread+0x328/0x630
[   32.377943]  ret_from_fork+0x10/0x20
[   32.378160] 
[   32.378211] The buggy address belongs to the physical page:
[   32.378269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b64
[   32.378336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.378386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.378442] page_type: f8(unknown)
[   32.378486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.378988] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.379107] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.379226] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.379292] head: 0bfffe0000000002 ffffc1ffc326d901 00000000ffffffff 00000000ffffffff
[   32.379350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.379391] page dumped because: kasan: bad access detected
[   32.379437] 
[   32.379456] Memory state around the buggy address:
[   32.379490]  fff00000c9b65f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.379775]  fff00000c9b65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.379861] >fff00000c9b66000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.379899]                    ^
[   32.379954]  fff00000c9b66080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.380046]  fff00000c9b66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.380085] ==================================================================

[   25.290149] ==================================================================
[   25.291013] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   25.291545] Read of size 1 at addr ffff88810613c2bb by task kunit_try_catch/275
[   25.292025] 
[   25.292147] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.292204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.292217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.292241] Call Trace:
[   25.292256]  <TASK>
[   25.292275]  dump_stack_lvl+0x73/0xb0
[   25.292308]  print_report+0xd1/0x610
[   25.292338]  ? __virt_addr_valid+0x1db/0x2d0
[   25.292364]  ? mempool_oob_right_helper+0x318/0x380
[   25.292387]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.292757]  ? mempool_oob_right_helper+0x318/0x380
[   25.292789]  kasan_report+0x141/0x180
[   25.292813]  ? mempool_oob_right_helper+0x318/0x380
[   25.292840]  __asan_report_load1_noabort+0x18/0x20
[   25.292865]  mempool_oob_right_helper+0x318/0x380
[   25.292890]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   25.292916]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.292940]  ? finish_task_switch.isra.0+0x153/0x700
[   25.292965]  mempool_slab_oob_right+0xed/0x140
[   25.292989]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   25.293015]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   25.293040]  ? __pfx_mempool_free_slab+0x10/0x10
[   25.293065]  ? __pfx_read_tsc+0x10/0x10
[   25.293088]  ? ktime_get_ts64+0x86/0x230
[   25.293113]  kunit_try_run_case+0x1a5/0x480
[   25.293137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.293157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.293182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.293205]  ? __kthread_parkme+0x82/0x180
[   25.293226]  ? preempt_count_sub+0x50/0x80
[   25.293249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.293288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.293315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.293340]  kthread+0x337/0x6f0
[   25.293360]  ? trace_preempt_on+0x20/0xc0
[   25.293385]  ? __pfx_kthread+0x10/0x10
[   25.293406]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.293435]  ? calculate_sigpending+0x7b/0xa0
[   25.293461]  ? __pfx_kthread+0x10/0x10
[   25.293483]  ret_from_fork+0x116/0x1d0
[   25.293502]  ? __pfx_kthread+0x10/0x10
[   25.293525]  ret_from_fork_asm+0x1a/0x30
[   25.293556]  </TASK>
[   25.293568] 
[   25.306128] Allocated by task 275:
[   25.306461]  kasan_save_stack+0x45/0x70
[   25.306783]  kasan_save_track+0x18/0x40
[   25.307062]  kasan_save_alloc_info+0x3b/0x50
[   25.307441]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   25.307813]  remove_element+0x11e/0x190
[   25.308087]  mempool_alloc_preallocated+0x4d/0x90
[   25.308313]  mempool_oob_right_helper+0x8a/0x380
[   25.308788]  mempool_slab_oob_right+0xed/0x140
[   25.309096]  kunit_try_run_case+0x1a5/0x480
[   25.309575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.310023]  kthread+0x337/0x6f0
[   25.310173]  ret_from_fork+0x116/0x1d0
[   25.310318]  ret_from_fork_asm+0x1a/0x30
[   25.310455] 
[   25.310523] The buggy address belongs to the object at ffff88810613c240
[   25.310523]  which belongs to the cache test_cache of size 123
[   25.310961] The buggy address is located 0 bytes to the right of
[   25.310961]  allocated 123-byte region [ffff88810613c240, ffff88810613c2bb)
[   25.311590] 
[   25.311796] The buggy address belongs to the physical page:
[   25.312390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   25.312949] flags: 0x200000000000000(node=0|zone=2)
[   25.313116] page_type: f5(slab)
[   25.313236] raw: 0200000000000000 ffff888101590780 dead000000000122 0000000000000000
[   25.314000] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   25.314757] page dumped because: kasan: bad access detected
[   25.315236] 
[   25.315316] Memory state around the buggy address:
[   25.315492]  ffff88810613c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.316229]  ffff88810613c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   25.316836] >ffff88810613c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   25.317312]                                         ^
[   25.317751]  ffff88810613c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.318450]  ffff88810613c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.319110] ==================================================================
[   25.232991] ==================================================================
[   25.233410] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   25.234008] Read of size 1 at addr ffff888105745573 by task kunit_try_catch/271
[   25.234234] 
[   25.234327] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.234385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.234623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.234854] Call Trace:
[   25.234872]  <TASK>
[   25.234927]  dump_stack_lvl+0x73/0xb0
[   25.234967]  print_report+0xd1/0x610
[   25.234990]  ? __virt_addr_valid+0x1db/0x2d0
[   25.235017]  ? mempool_oob_right_helper+0x318/0x380
[   25.235044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.235072]  ? mempool_oob_right_helper+0x318/0x380
[   25.235096]  kasan_report+0x141/0x180
[   25.235118]  ? mempool_oob_right_helper+0x318/0x380
[   25.235146]  __asan_report_load1_noabort+0x18/0x20
[   25.235170]  mempool_oob_right_helper+0x318/0x380
[   25.235194]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   25.235220]  ? __kasan_check_write+0x18/0x20
[   25.235245]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.235446]  ? finish_task_switch.isra.0+0x153/0x700
[   25.235484]  mempool_kmalloc_oob_right+0xf2/0x150
[   25.235510]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   25.235536]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.235562]  ? __pfx_mempool_kfree+0x10/0x10
[   25.235586]  ? __pfx_read_tsc+0x10/0x10
[   25.235610]  ? ktime_get_ts64+0x86/0x230
[   25.235633]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   25.235662]  kunit_try_run_case+0x1a5/0x480
[   25.235687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.235707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.235742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.235765]  ? __kthread_parkme+0x82/0x180
[   25.235786]  ? preempt_count_sub+0x50/0x80
[   25.235809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.235830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.235855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.235881]  kthread+0x337/0x6f0
[   25.235901]  ? trace_preempt_on+0x20/0xc0
[   25.235925]  ? __pfx_kthread+0x10/0x10
[   25.235946]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.235968]  ? calculate_sigpending+0x7b/0xa0
[   25.235993]  ? __pfx_kthread+0x10/0x10
[   25.236015]  ret_from_fork+0x116/0x1d0
[   25.236034]  ? __pfx_kthread+0x10/0x10
[   25.236055]  ret_from_fork_asm+0x1a/0x30
[   25.236087]  </TASK>
[   25.236100] 
[   25.248842] Allocated by task 271:
[   25.249022]  kasan_save_stack+0x45/0x70
[   25.249224]  kasan_save_track+0x18/0x40
[   25.249758]  kasan_save_alloc_info+0x3b/0x50
[   25.249998]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.250423]  remove_element+0x11e/0x190
[   25.250745]  mempool_alloc_preallocated+0x4d/0x90
[   25.250986]  mempool_oob_right_helper+0x8a/0x380
[   25.251345]  mempool_kmalloc_oob_right+0xf2/0x150
[   25.251720]  kunit_try_run_case+0x1a5/0x480
[   25.251949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.252188]  kthread+0x337/0x6f0
[   25.252380]  ret_from_fork+0x116/0x1d0
[   25.252606]  ret_from_fork_asm+0x1a/0x30
[   25.252847] 
[   25.253084] The buggy address belongs to the object at ffff888105745500
[   25.253084]  which belongs to the cache kmalloc-128 of size 128
[   25.253754] The buggy address is located 0 bytes to the right of
[   25.253754]  allocated 115-byte region [ffff888105745500, ffff888105745573)
[   25.254397] 
[   25.254532] The buggy address belongs to the physical page:
[   25.254803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105745
[   25.255150] flags: 0x200000000000000(node=0|zone=2)
[   25.255459] page_type: f5(slab)
[   25.255685] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.256040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.256442] page dumped because: kasan: bad access detected
[   25.256753] 
[   25.256818] Memory state around the buggy address:
[   25.257075]  ffff888105745400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.257692]  ffff888105745480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.258005] >ffff888105745500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.258319]                                                              ^
[   25.258709]  ffff888105745580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.258986]  ffff888105745600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.259404] ==================================================================
[   25.264070] ==================================================================
[   25.264645] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   25.265259] Read of size 1 at addr ffff888102baa001 by task kunit_try_catch/273
[   25.265661] 
[   25.265788] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.265845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.265857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.265881] Call Trace:
[   25.265896]  <TASK>
[   25.265915]  dump_stack_lvl+0x73/0xb0
[   25.265951]  print_report+0xd1/0x610
[   25.265975]  ? __virt_addr_valid+0x1db/0x2d0
[   25.266000]  ? mempool_oob_right_helper+0x318/0x380
[   25.266028]  ? kasan_addr_to_slab+0x11/0xa0
[   25.266050]  ? mempool_oob_right_helper+0x318/0x380
[   25.266074]  kasan_report+0x141/0x180
[   25.266096]  ? mempool_oob_right_helper+0x318/0x380
[   25.266124]  __asan_report_load1_noabort+0x18/0x20
[   25.266148]  mempool_oob_right_helper+0x318/0x380
[   25.266172]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   25.266197]  ? __kasan_check_write+0x18/0x20
[   25.266220]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.266244]  ? finish_task_switch.isra.0+0x153/0x700
[   25.266620]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   25.266657]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   25.266684]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.266710]  ? __pfx_mempool_kfree+0x10/0x10
[   25.266748]  ? __pfx_read_tsc+0x10/0x10
[   25.266772]  ? ktime_get_ts64+0x86/0x230
[   25.266798]  kunit_try_run_case+0x1a5/0x480
[   25.266823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.266843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.266869]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.266893]  ? __kthread_parkme+0x82/0x180
[   25.266914]  ? preempt_count_sub+0x50/0x80
[   25.266938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.266961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.266987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.267011]  kthread+0x337/0x6f0
[   25.267032]  ? trace_preempt_on+0x20/0xc0
[   25.267057]  ? __pfx_kthread+0x10/0x10
[   25.267077]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.267100]  ? calculate_sigpending+0x7b/0xa0
[   25.267125]  ? __pfx_kthread+0x10/0x10
[   25.267147]  ret_from_fork+0x116/0x1d0
[   25.267167]  ? __pfx_kthread+0x10/0x10
[   25.267188]  ret_from_fork_asm+0x1a/0x30
[   25.267220]  </TASK>
[   25.267234] 
[   25.278454] The buggy address belongs to the physical page:
[   25.278753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba8
[   25.279066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.279352] flags: 0x200000000000040(head|node=0|zone=2)
[   25.279677] page_type: f8(unknown)
[   25.279856] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.280114] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.280661] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.281022] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.281284] head: 0200000000000002 ffffea00040aea01 00000000ffffffff 00000000ffffffff
[   25.281902] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.282360] page dumped because: kasan: bad access detected
[   25.282610] 
[   25.282675] Memory state around the buggy address:
[   25.283090]  ffff888102ba9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.283530]  ffff888102ba9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.283780] >ffff888102baa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.284340]                    ^
[   25.284598]  ffff888102baa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.284885]  ffff888102baa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.285140] ==================================================================