Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   36.214244] ==================================================================
[   36.224136] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.231687] Read of size 1 at addr ffff00080659a2bb by task kunit_try_catch/274
[   36.238975] 
[   36.240464] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.240523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.240539] Hardware name: WinLink E850-96 board (DT)
[   36.240561] Call trace:
[   36.240577]  show_stack+0x20/0x38 (C)
[   36.240613]  dump_stack_lvl+0x8c/0xd0
[   36.240651]  print_report+0x118/0x608
[   36.240681]  kasan_report+0xdc/0x128
[   36.240712]  __asan_report_load1_noabort+0x20/0x30
[   36.240750]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.240786]  mempool_slab_oob_right+0xc0/0x118
[   36.240819]  kunit_try_run_case+0x170/0x3f0
[   36.240857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.240897]  kthread+0x328/0x630
[   36.240931]  ret_from_fork+0x10/0x20
[   36.240964] 
[   36.308247] Allocated by task 274:
[   36.311635]  kasan_save_stack+0x3c/0x68
[   36.315450]  kasan_save_track+0x20/0x40
[   36.319270]  kasan_save_alloc_info+0x40/0x58
[   36.323523]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.328733]  remove_element+0x16c/0x1f8
[   36.332550]  mempool_alloc_preallocated+0x58/0xc0
[   36.337238]  mempool_oob_right_helper+0x98/0x2f0
[   36.341839]  mempool_slab_oob_right+0xc0/0x118
[   36.346266]  kunit_try_run_case+0x170/0x3f0
[   36.350432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.355901]  kthread+0x328/0x630
[   36.359113]  ret_from_fork+0x10/0x20
[   36.362672] 
[   36.364149] The buggy address belongs to the object at ffff00080659a240
[   36.364149]  which belongs to the cache test_cache of size 123
[   36.376562] The buggy address is located 0 bytes to the right of
[   36.376562]  allocated 123-byte region [ffff00080659a240, ffff00080659a2bb)
[   36.389494] 
[   36.390974] The buggy address belongs to the physical page:
[   36.396530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88659a
[   36.404514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.411025] page_type: f5(slab)
[   36.414162] raw: 0bfffe0000000000 ffff000800dbe3c0 dead000000000122 0000000000000000
[   36.421879] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.429598] page dumped because: kasan: bad access detected
[   36.435155] 
[   36.436630] Memory state around the buggy address:
[   36.441411]  ffff00080659a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.448612]  ffff00080659a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.455817] >ffff00080659a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.463017]                                         ^
[   36.468056]  ffff00080659a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.475261]  ffff00080659a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.482463] ==================================================================
[   35.980585] ==================================================================
[   35.990549] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.998094] Read of size 1 at addr ffff00080315a001 by task kunit_try_catch/272
[   36.005385] 
[   36.006874] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.006933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.006953] Hardware name: WinLink E850-96 board (DT)
[   36.006975] Call trace:
[   36.006990]  show_stack+0x20/0x38 (C)
[   36.007024]  dump_stack_lvl+0x8c/0xd0
[   36.007067]  print_report+0x118/0x608
[   36.007099]  kasan_report+0xdc/0x128
[   36.007130]  __asan_report_load1_noabort+0x20/0x30
[   36.007168]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.007205]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   36.007245]  kunit_try_run_case+0x170/0x3f0
[   36.007284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.007323]  kthread+0x328/0x630
[   36.007360]  ret_from_fork+0x10/0x20
[   36.007397] 
[   36.075439] The buggy address belongs to the physical page:
[   36.080997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883158
[   36.088980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.096621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.103562] page_type: f8(unknown)
[   36.106962] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.114679] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.122405] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.130216] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.138030] head: 0bfffe0000000002 fffffdffe00c5601 00000000ffffffff 00000000ffffffff
[   36.145842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.153647] page dumped because: kasan: bad access detected
[   36.159204] 
[   36.160680] Memory state around the buggy address:
[   36.165460]  ffff000803159f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.172661]  ffff000803159f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.179869] >ffff00080315a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.187067]                    ^
[   36.190282]  ffff00080315a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.197487]  ffff00080315a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.204689] ==================================================================
[   35.679590] ==================================================================
[   35.679768] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.679902] Read of size 1 at addr ffff000801e72b73 by task kunit_try_catch/270
[   35.686293] 
[   35.687781] CPU: 5 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   35.687835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.687853] Hardware name: WinLink E850-96 board (DT)
[   35.687876] Call trace:
[   35.687889]  show_stack+0x20/0x38 (C)
[   35.687924]  dump_stack_lvl+0x8c/0xd0
[   35.687961]  print_report+0x118/0x608
[   35.687990]  kasan_report+0xdc/0x128
[   35.688021]  __asan_report_load1_noabort+0x20/0x30
[   35.688063]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.688096]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.688132]  kunit_try_run_case+0x170/0x3f0
[   35.688172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.688211]  kthread+0x328/0x630
[   35.688249]  ret_from_fork+0x10/0x20
[   35.688285] 
[   35.755825] Allocated by task 270:
[   35.759212]  kasan_save_stack+0x3c/0x68
[   35.763030]  kasan_save_track+0x20/0x40
[   35.766849]  kasan_save_alloc_info+0x40/0x58
[   35.771101]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.776396]  remove_element+0x130/0x1f8
[   35.780215]  mempool_alloc_preallocated+0x58/0xc0
[   35.784903]  mempool_oob_right_helper+0x98/0x2f0
[   35.789503]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.794191]  kunit_try_run_case+0x170/0x3f0
[   35.798357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.803827]  kthread+0x328/0x630
[   35.807038]  ret_from_fork+0x10/0x20
[   35.810597] 
[   35.812074] The buggy address belongs to the object at ffff000801e72b00
[   35.812074]  which belongs to the cache kmalloc-128 of size 128
[   35.824574] The buggy address is located 0 bytes to the right of
[   35.824574]  allocated 115-byte region [ffff000801e72b00, ffff000801e72b73)
[   35.837506] 
[   35.838986] The buggy address belongs to the physical page:
[   35.844542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e72
[   35.852526] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.860166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.867108] page_type: f5(slab)
[   35.870247] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.877964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.885690] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.893501] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.901315] head: 0bfffe0000000001 fffffdffe0079c81 00000000ffffffff 00000000ffffffff
[   35.909126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.916931] page dumped because: kasan: bad access detected
[   35.922489] 
[   35.923964] Memory state around the buggy address:
[   35.928743]  ffff000801e72a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.935946]  ffff000801e72a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.943152] >ffff000801e72b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.950352]                                                              ^
[   35.957213]  ffff000801e72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.964419]  ffff000801e72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.971620] ==================================================================

[   19.933393] ==================================================================
[   19.933451] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.933510] Read of size 1 at addr fff00000c7a6e001 by task kunit_try_catch/225
[   19.933559] 
[   19.933591] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.933676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.933703] Hardware name: linux,dummy-virt (DT)
[   19.933735] Call trace:
[   19.933757]  show_stack+0x20/0x38 (C)
[   19.935894]  dump_stack_lvl+0x8c/0xd0
[   19.936288]  print_report+0x118/0x608
[   19.936333]  kasan_report+0xdc/0x128
[   19.936378]  __asan_report_load1_noabort+0x20/0x30
[   19.936426]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.936477]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.936530]  kunit_try_run_case+0x170/0x3f0
[   19.936577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.936630]  kthread+0x328/0x630
[   19.936675]  ret_from_fork+0x10/0x20
[   19.936723] 
[   19.936743] The buggy address belongs to the physical page:
[   19.936779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a6c
[   19.936833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.936959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.937019] page_type: f8(unknown)
[   19.937061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.937121] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.937242] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.937303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.937357] head: 0bfffe0000000002 ffffc1ffc31e9b01 00000000ffffffff 00000000ffffffff
[   19.937409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.937876] page dumped because: kasan: bad access detected
[   19.938280] 
[   19.938338] Memory state around the buggy address:
[   19.938393]  fff00000c7a6df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.938474]  fff00000c7a6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.938698] >fff00000c7a6e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.939037]                    ^
[   19.939099]  fff00000c7a6e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.939155]  fff00000c7a6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.939244] ==================================================================
[   19.911022] ==================================================================
[   19.911092] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.911170] Read of size 1 at addr fff00000c7a5f173 by task kunit_try_catch/223
[   19.911220] 
[   19.911261] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.911350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.911377] Hardware name: linux,dummy-virt (DT)
[   19.911413] Call trace:
[   19.911437]  show_stack+0x20/0x38 (C)
[   19.911487]  dump_stack_lvl+0x8c/0xd0
[   19.911536]  print_report+0x118/0x608
[   19.911582]  kasan_report+0xdc/0x128
[   19.911625]  __asan_report_load1_noabort+0x20/0x30
[   19.911676]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.911728]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.911779]  kunit_try_run_case+0x170/0x3f0
[   19.911830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.911915]  kthread+0x328/0x630
[   19.911962]  ret_from_fork+0x10/0x20
[   19.912012] 
[   19.912031] Allocated by task 223:
[   19.912059]  kasan_save_stack+0x3c/0x68
[   19.912100]  kasan_save_track+0x20/0x40
[   19.912139]  kasan_save_alloc_info+0x40/0x58
[   19.912177]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.912221]  remove_element+0x130/0x1f8
[   19.912261]  mempool_alloc_preallocated+0x58/0xc0
[   19.912303]  mempool_oob_right_helper+0x98/0x2f0
[   19.912346]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.912386]  kunit_try_run_case+0x170/0x3f0
[   19.912427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.912471]  kthread+0x328/0x630
[   19.912527]  ret_from_fork+0x10/0x20
[   19.912563] 
[   19.912583] The buggy address belongs to the object at fff00000c7a5f100
[   19.912583]  which belongs to the cache kmalloc-128 of size 128
[   19.912642] The buggy address is located 0 bytes to the right of
[   19.912642]  allocated 115-byte region [fff00000c7a5f100, fff00000c7a5f173)
[   19.912710] 
[   19.912731] The buggy address belongs to the physical page:
[   19.912764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5f
[   19.912819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.912882] page_type: f5(slab)
[   19.912927] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.912980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.913023] page dumped because: kasan: bad access detected
[   19.913059] 
[   19.913077] Memory state around the buggy address:
[   19.913111]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.913158]  fff00000c7a5f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913205] >fff00000c7a5f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.913249]                                                              ^
[   19.913293]  fff00000c7a5f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913341]  fff00000c7a5f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.913382] ==================================================================
[   19.952297] ==================================================================
[   19.952418] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.952484] Read of size 1 at addr fff00000c5c432bb by task kunit_try_catch/227
[   19.952538] 
[   19.952571] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.953355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.954038] Hardware name: linux,dummy-virt (DT)
[   19.954738] Call trace:
[   19.954802]  show_stack+0x20/0x38 (C)
[   19.955068]  dump_stack_lvl+0x8c/0xd0
[   19.955325]  print_report+0x118/0x608
[   19.955504]  kasan_report+0xdc/0x128
[   19.955668]  __asan_report_load1_noabort+0x20/0x30
[   19.955727]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.956083]  mempool_slab_oob_right+0xc0/0x118
[   19.956238]  kunit_try_run_case+0x170/0x3f0
[   19.956401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.956532]  kthread+0x328/0x630
[   19.956758]  ret_from_fork+0x10/0x20
[   19.956869] 
[   19.956889] Allocated by task 227:
[   19.956917]  kasan_save_stack+0x3c/0x68
[   19.956957]  kasan_save_track+0x20/0x40
[   19.957049]  kasan_save_alloc_info+0x40/0x58
[   19.957090]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.957299]  remove_element+0x16c/0x1f8
[   19.957562]  mempool_alloc_preallocated+0x58/0xc0
[   19.957697]  mempool_oob_right_helper+0x98/0x2f0
[   19.957902]  mempool_slab_oob_right+0xc0/0x118
[   19.957960]  kunit_try_run_case+0x170/0x3f0
[   19.958086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.958338]  kthread+0x328/0x630
[   19.958377]  ret_from_fork+0x10/0x20
[   19.958614] 
[   19.958661] The buggy address belongs to the object at fff00000c5c43240
[   19.958661]  which belongs to the cache test_cache of size 123
[   19.959103] The buggy address is located 0 bytes to the right of
[   19.959103]  allocated 123-byte region [fff00000c5c43240, fff00000c5c432bb)
[   19.959178] 
[   19.959516] The buggy address belongs to the physical page:
[   19.959750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c43
[   19.959825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.960086] page_type: f5(slab)
[   19.960217] raw: 0bfffe0000000000 fff00000c59d6a00 dead000000000122 0000000000000000
[   19.960415] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.960461] page dumped because: kasan: bad access detected
[   19.960751] 
[   19.960779] Memory state around the buggy address:
[   19.960878]  fff00000c5c43180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.960925]  fff00000c5c43200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.960970] >fff00000c5c43280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.961086]                                         ^
[   19.961123]  fff00000c5c43300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.961352]  fff00000c5c43380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.961396] ==================================================================

[   12.373991] ==================================================================
[   12.374454] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.375120] Read of size 1 at addr ffff8881029f9573 by task kunit_try_catch/240
[   12.375350] 
[   12.375444] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.375495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.375508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.375531] Call Trace:
[   12.375544]  <TASK>
[   12.375565]  dump_stack_lvl+0x73/0xb0
[   12.375595]  print_report+0xd1/0x650
[   12.375619]  ? __virt_addr_valid+0x1db/0x2d0
[   12.375641]  ? mempool_oob_right_helper+0x318/0x380
[   12.375664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.375687]  ? mempool_oob_right_helper+0x318/0x380
[   12.375711]  kasan_report+0x141/0x180
[   12.375733]  ? mempool_oob_right_helper+0x318/0x380
[   12.375761]  __asan_report_load1_noabort+0x18/0x20
[   12.375782]  mempool_oob_right_helper+0x318/0x380
[   12.375806]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.375831]  ? dequeue_entities+0x852/0x1740
[   12.375857]  ? finish_task_switch.isra.0+0x153/0x700
[   12.375884]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.375908]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.375941]  ? dequeue_task_fair+0x166/0x4e0
[   12.375963]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.375985]  ? __pfx_mempool_kfree+0x10/0x10
[   12.376008]  ? __pfx_read_tsc+0x10/0x10
[   12.376029]  ? ktime_get_ts64+0x86/0x230
[   12.376056]  kunit_try_run_case+0x1a5/0x480
[   12.376083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.376105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.376130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.376154]  ? __kthread_parkme+0x82/0x180
[   12.376177]  ? preempt_count_sub+0x50/0x80
[   12.376202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.376226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.376255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.376278]  kthread+0x337/0x6f0
[   12.376295]  ? trace_preempt_on+0x20/0xc0
[   12.376318]  ? __pfx_kthread+0x10/0x10
[   12.376336]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.376358]  ? calculate_sigpending+0x7b/0xa0
[   12.376379]  ? __pfx_kthread+0x10/0x10
[   12.376398]  ret_from_fork+0x41/0x80
[   12.376418]  ? __pfx_kthread+0x10/0x10
[   12.376436]  ret_from_fork_asm+0x1a/0x30
[   12.376467]  </TASK>
[   12.376479] 
[   12.387392] Allocated by task 240:
[   12.387603]  kasan_save_stack+0x45/0x70
[   12.388271]  kasan_save_track+0x18/0x40
[   12.388440]  kasan_save_alloc_info+0x3b/0x50
[   12.388678]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.389154]  remove_element+0x11e/0x190
[   12.389356]  mempool_alloc_preallocated+0x4d/0x90
[   12.389585]  mempool_oob_right_helper+0x8a/0x380
[   12.389935]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.390098]  kunit_try_run_case+0x1a5/0x480
[   12.390382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.390872]  kthread+0x337/0x6f0
[   12.391157]  ret_from_fork+0x41/0x80
[   12.391485]  ret_from_fork_asm+0x1a/0x30
[   12.391780] 
[   12.392045] The buggy address belongs to the object at ffff8881029f9500
[   12.392045]  which belongs to the cache kmalloc-128 of size 128
[   12.392548] The buggy address is located 0 bytes to the right of
[   12.392548]  allocated 115-byte region [ffff8881029f9500, ffff8881029f9573)
[   12.393441] 
[   12.393662] The buggy address belongs to the physical page:
[   12.394101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   12.394514] flags: 0x200000000000000(node=0|zone=2)
[   12.395232] page_type: f5(slab)
[   12.395474] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.396011] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.396515] page dumped because: kasan: bad access detected
[   12.396949] 
[   12.397026] Memory state around the buggy address:
[   12.397325]  ffff8881029f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.397632]  ffff8881029f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.398267] >ffff8881029f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.398740]                                                              ^
[   12.399234]  ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.399792]  ffff8881029f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.400196] ==================================================================
[   12.404078] ==================================================================
[   12.404542] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.404955] Read of size 1 at addr ffff888102f7e001 by task kunit_try_catch/242
[   12.405273] 
[   12.405732] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.405820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.405833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.405896] Call Trace:
[   12.405910]  <TASK>
[   12.405948]  dump_stack_lvl+0x73/0xb0
[   12.405980]  print_report+0xd1/0x650
[   12.406004]  ? __virt_addr_valid+0x1db/0x2d0
[   12.406029]  ? mempool_oob_right_helper+0x318/0x380
[   12.406052]  ? kasan_addr_to_slab+0x11/0xa0
[   12.406074]  ? mempool_oob_right_helper+0x318/0x380
[   12.406098]  kasan_report+0x141/0x180
[   12.406121]  ? mempool_oob_right_helper+0x318/0x380
[   12.406150]  __asan_report_load1_noabort+0x18/0x20
[   12.406171]  mempool_oob_right_helper+0x318/0x380
[   12.406196]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.406219]  ? dequeue_entities+0x852/0x1740
[   12.406246]  ? irqentry_exit+0x2a/0x60
[   12.406265]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.406292]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.406342]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.406371]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.406393]  ? __pfx_mempool_kfree+0x10/0x10
[   12.406426]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.406452]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.406479]  kunit_try_run_case+0x1a5/0x480
[   12.406506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.406528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.406552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.406575]  ? __kthread_parkme+0x82/0x180
[   12.406598]  ? preempt_count_sub+0x50/0x80
[   12.406624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.406649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.406672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.406695]  kthread+0x337/0x6f0
[   12.406712]  ? trace_preempt_on+0x20/0xc0
[   12.406736]  ? __pfx_kthread+0x10/0x10
[   12.406753]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.406775]  ? calculate_sigpending+0x7b/0xa0
[   12.406797]  ? __pfx_kthread+0x10/0x10
[   12.406815]  ret_from_fork+0x41/0x80
[   12.406837]  ? __pfx_kthread+0x10/0x10
[   12.406854]  ret_from_fork_asm+0x1a/0x30
[   12.406887]  </TASK>
[   12.406898] 
[   12.416521] The buggy address belongs to the physical page:
[   12.416900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f7c
[   12.417313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.417706] flags: 0x200000000000040(head|node=0|zone=2)
[   12.418011] page_type: f8(unknown)
[   12.418197] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.418431] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.419077] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.419449] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.420022] head: 0200000000000002 ffffea00040bdf01 00000000ffffffff 00000000ffffffff
[   12.420337] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.420782] page dumped because: kasan: bad access detected
[   12.421214] 
[   12.421325] Memory state around the buggy address:
[   12.421505]  ffff888102f7df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.421962]  ffff888102f7df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.422341] >ffff888102f7e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.422707]                    ^
[   12.422904]  ffff888102f7e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.423272]  ffff888102f7e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.423564] ==================================================================
[   12.428041] ==================================================================
[   12.428538] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.428964] Read of size 1 at addr ffff888102a0b2bb by task kunit_try_catch/244
[   12.429527] 
[   12.429746] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.429818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.429832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.429857] Call Trace:
[   12.429870]  <TASK>
[   12.429891]  dump_stack_lvl+0x73/0xb0
[   12.429963]  print_report+0xd1/0x650
[   12.429989]  ? __virt_addr_valid+0x1db/0x2d0
[   12.430039]  ? mempool_oob_right_helper+0x318/0x380
[   12.430064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.430098]  ? mempool_oob_right_helper+0x318/0x380
[   12.430122]  kasan_report+0x141/0x180
[   12.430145]  ? mempool_oob_right_helper+0x318/0x380
[   12.430173]  __asan_report_load1_noabort+0x18/0x20
[   12.430194]  mempool_oob_right_helper+0x318/0x380
[   12.430216]  ? call_rcu+0x12/0x20
[   12.430240]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.430265]  ? __pfx_task_dead_fair+0x10/0x10
[   12.430293]  mempool_slab_oob_right+0xed/0x140
[   12.430317]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.430338]  ? dequeue_task_fair+0x156/0x4e0
[   12.430360]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.430383]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.430405]  ? __pfx_read_tsc+0x10/0x10
[   12.430427]  ? ktime_get_ts64+0x86/0x230
[   12.430453]  kunit_try_run_case+0x1a5/0x480
[   12.430479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.430502]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.430527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.430551]  ? __kthread_parkme+0x82/0x180
[   12.430572]  ? preempt_count_sub+0x50/0x80
[   12.430599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.430624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.430648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.430671]  kthread+0x337/0x6f0
[   12.430688]  ? trace_preempt_on+0x20/0xc0
[   12.430711]  ? __pfx_kthread+0x10/0x10
[   12.430729]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.430750]  ? calculate_sigpending+0x7b/0xa0
[   12.430771]  ? __pfx_kthread+0x10/0x10
[   12.430790]  ret_from_fork+0x41/0x80
[   12.430810]  ? __pfx_kthread+0x10/0x10
[   12.430828]  ret_from_fork_asm+0x1a/0x30
[   12.430859]  </TASK>
[   12.430871] 
[   12.440674] Allocated by task 244:
[   12.440995]  kasan_save_stack+0x45/0x70
[   12.441399]  kasan_save_track+0x18/0x40
[   12.441559]  kasan_save_alloc_info+0x3b/0x50
[   12.442039]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.442303]  remove_element+0x11e/0x190
[   12.442501]  mempool_alloc_preallocated+0x4d/0x90
[   12.442856]  mempool_oob_right_helper+0x8a/0x380
[   12.443104]  mempool_slab_oob_right+0xed/0x140
[   12.443263]  kunit_try_run_case+0x1a5/0x480
[   12.443522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.443756]  kthread+0x337/0x6f0
[   12.444047]  ret_from_fork+0x41/0x80
[   12.444269]  ret_from_fork_asm+0x1a/0x30
[   12.444411] 
[   12.444497] The buggy address belongs to the object at ffff888102a0b240
[   12.444497]  which belongs to the cache test_cache of size 123
[   12.445128] The buggy address is located 0 bytes to the right of
[   12.445128]  allocated 123-byte region [ffff888102a0b240, ffff888102a0b2bb)
[   12.445910] 
[   12.446000] The buggy address belongs to the physical page:
[   12.446221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   12.446578] flags: 0x200000000000000(node=0|zone=2)
[   12.447172] page_type: f5(slab)
[   12.447388] raw: 0200000000000000 ffff888102109500 dead000000000122 0000000000000000
[   12.447691] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.448176] page dumped because: kasan: bad access detected
[   12.448359] 
[   12.448455] Memory state around the buggy address:
[   12.448870]  ffff888102a0b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.449202]  ffff888102a0b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.449476] >ffff888102a0b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.449956]                                         ^
[   12.450125]  ffff888102a0b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.450433]  ffff888102a0b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.450800] ==================================================================