Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.600329] ==================================================================
[   18.600390] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.600746] Read of size 1 at addr fff00000c659a001 by task kunit_try_catch/224
[   18.600810] 
[   18.601533] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.601711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.601740] Hardware name: linux,dummy-virt (DT)
[   18.601772] Call trace:
[   18.601796]  show_stack+0x20/0x38 (C)
[   18.601861]  dump_stack_lvl+0x8c/0xd0
[   18.601907]  print_report+0x118/0x608
[   18.601951]  kasan_report+0xdc/0x128
[   18.601996]  __asan_report_load1_noabort+0x20/0x30
[   18.602045]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.602755]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.603248]  kunit_try_run_case+0x170/0x3f0
[   18.603356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.603545]  kthread+0x328/0x630
[   18.604045]  ret_from_fork+0x10/0x20
[   18.604352] 
[   18.604383] The buggy address belongs to the physical page:
[   18.604719] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106598
[   18.604789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.605217] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.605286] page_type: f8(unknown)
[   18.605326] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.605783] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.605852] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.606238] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.606447] head: 0bfffe0000000002 ffffc1ffc3196601 00000000ffffffff 00000000ffffffff
[   18.606622] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.606920] page dumped because: kasan: bad access detected
[   18.606957] 
[   18.607003] Memory state around the buggy address:
[   18.607118]  fff00000c6599f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.607181]  fff00000c6599f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.607504] >fff00000c659a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.607547]                    ^
[   18.607885]  fff00000c659a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.608024]  fff00000c659a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.608063] ==================================================================
[   18.625404] ==================================================================
[   18.625480] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.625772] Read of size 1 at addr fff00000c6f592bb by task kunit_try_catch/226
[   18.626275] 
[   18.626364] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.626453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.626480] Hardware name: linux,dummy-virt (DT)
[   18.626511] Call trace:
[   18.626535]  show_stack+0x20/0x38 (C)
[   18.627131]  dump_stack_lvl+0x8c/0xd0
[   18.627545]  print_report+0x118/0x608
[   18.627671]  kasan_report+0xdc/0x128
[   18.627990]  __asan_report_load1_noabort+0x20/0x30
[   18.628177]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.628227]  mempool_slab_oob_right+0xc0/0x118
[   18.628275]  kunit_try_run_case+0x170/0x3f0
[   18.628760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.628814]  kthread+0x328/0x630
[   18.629123]  ret_from_fork+0x10/0x20
[   18.629422] 
[   18.629516] Allocated by task 226:
[   18.629560]  kasan_save_stack+0x3c/0x68
[   18.629606]  kasan_save_track+0x20/0x40
[   18.629643]  kasan_save_alloc_info+0x40/0x58
[   18.629682]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.630046]  remove_element+0x16c/0x1f8
[   18.630090]  mempool_alloc_preallocated+0x58/0xc0
[   18.630135]  mempool_oob_right_helper+0x98/0x2f0
[   18.630172]  mempool_slab_oob_right+0xc0/0x118
[   18.630211]  kunit_try_run_case+0x170/0x3f0
[   18.630628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.630678]  kthread+0x328/0x630
[   18.630861]  ret_from_fork+0x10/0x20
[   18.631090] 
[   18.631140] The buggy address belongs to the object at fff00000c6f59240
[   18.631140]  which belongs to the cache test_cache of size 123
[   18.631209] The buggy address is located 0 bytes to the right of
[   18.631209]  allocated 123-byte region [fff00000c6f59240, fff00000c6f592bb)
[   18.631295] 
[   18.631347] The buggy address belongs to the physical page:
[   18.631382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f59
[   18.631433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.631483] page_type: f5(slab)
[   18.631599] raw: 0bfffe0000000000 fff00000c6f4f140 dead000000000122 0000000000000000
[   18.631804] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.631969] page dumped because: kasan: bad access detected
[   18.632014] 
[   18.632031] Memory state around the buggy address:
[   18.632063]  fff00000c6f59180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.632113]  fff00000c6f59200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.632178] >fff00000c6f59280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.632215]                                         ^
[   18.632614]  fff00000c6f59300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.632661]  fff00000c6f59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.632706] ==================================================================
[   18.588743] ==================================================================
[   18.588822] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.588914] Read of size 1 at addr fff00000c5872773 by task kunit_try_catch/222
[   18.588963] 
[   18.589007] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.589096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.589123] Hardware name: linux,dummy-virt (DT)
[   18.589157] Call trace:
[   18.589183]  show_stack+0x20/0x38 (C)
[   18.589236]  dump_stack_lvl+0x8c/0xd0
[   18.589286]  print_report+0x118/0x608
[   18.589333]  kasan_report+0xdc/0x128
[   18.589377]  __asan_report_load1_noabort+0x20/0x30
[   18.589428]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.589476]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.589525]  kunit_try_run_case+0x170/0x3f0
[   18.589575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.589625]  kthread+0x328/0x630
[   18.589669]  ret_from_fork+0x10/0x20
[   18.589717] 
[   18.589736] Allocated by task 222:
[   18.589766]  kasan_save_stack+0x3c/0x68
[   18.589805]  kasan_save_track+0x20/0x40
[   18.589854]  kasan_save_alloc_info+0x40/0x58
[   18.589892]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.589935]  remove_element+0x130/0x1f8
[   18.589972]  mempool_alloc_preallocated+0x58/0xc0
[   18.590011]  mempool_oob_right_helper+0x98/0x2f0
[   18.590051]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.590091]  kunit_try_run_case+0x170/0x3f0
[   18.590128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.590171]  kthread+0x328/0x630
[   18.590202]  ret_from_fork+0x10/0x20
[   18.590239] 
[   18.590259] The buggy address belongs to the object at fff00000c5872700
[   18.590259]  which belongs to the cache kmalloc-128 of size 128
[   18.590317] The buggy address is located 0 bytes to the right of
[   18.590317]  allocated 115-byte region [fff00000c5872700, fff00000c5872773)
[   18.590379] 
[   18.590400] The buggy address belongs to the physical page:
[   18.590434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105872
[   18.590492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.590543] page_type: f5(slab)
[   18.590585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.590636] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.590678] page dumped because: kasan: bad access detected
[   18.590708] 
[   18.590733] Memory state around the buggy address:
[   18.590881]  fff00000c5872600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.590929]  fff00000c5872680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.590973] >fff00000c5872700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.591012]                                                              ^
[   18.591052]  fff00000c5872780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.591096]  fff00000c5872800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.591136] ==================================================================

[   13.788999] ==================================================================
[   13.789668] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.790222] Read of size 1 at addr ffff888102a13273 by task kunit_try_catch/238
[   13.790749] 
[   13.790945] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.791147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.791162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.791186] Call Trace:
[   13.791200]  <TASK>
[   13.791220]  dump_stack_lvl+0x73/0xb0
[   13.791256]  print_report+0xd1/0x650
[   13.791279]  ? __virt_addr_valid+0x1db/0x2d0
[   13.791305]  ? mempool_oob_right_helper+0x318/0x380
[   13.791330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.791354]  ? mempool_oob_right_helper+0x318/0x380
[   13.791378]  kasan_report+0x141/0x180
[   13.791401]  ? mempool_oob_right_helper+0x318/0x380
[   13.791430]  __asan_report_load1_noabort+0x18/0x20
[   13.791455]  mempool_oob_right_helper+0x318/0x380
[   13.791480]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.791503]  ? update_load_avg+0x1be/0x21b0
[   13.791529]  ? update_load_avg+0x1be/0x21b0
[   13.791551]  ? update_curr+0x80/0x810
[   13.791570]  ? pick_eevdf+0x18a/0x590
[   13.791592]  ? finish_task_switch.isra.0+0x153/0x700
[   13.791619]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.791644]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.791671]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.791697]  ? __pfx_mempool_kfree+0x10/0x10
[   13.791723]  ? __pfx_read_tsc+0x10/0x10
[   13.791755]  ? ktime_get_ts64+0x86/0x230
[   13.791781]  kunit_try_run_case+0x1a5/0x480
[   13.791808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.791830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.791855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.791879]  ? __kthread_parkme+0x82/0x180
[   13.791901]  ? preempt_count_sub+0x50/0x80
[   13.791937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.791961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.791986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.792028]  kthread+0x337/0x6f0
[   13.792054]  ? trace_preempt_on+0x20/0xc0
[   13.792078]  ? __pfx_kthread+0x10/0x10
[   13.792099]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.792121]  ? calculate_sigpending+0x7b/0xa0
[   13.792145]  ? __pfx_kthread+0x10/0x10
[   13.792167]  ret_from_fork+0x116/0x1d0
[   13.792185]  ? __pfx_kthread+0x10/0x10
[   13.792205]  ret_from_fork_asm+0x1a/0x30
[   13.792238]  </TASK>
[   13.792250] 
[   13.804455] Allocated by task 238:
[   13.804648]  kasan_save_stack+0x45/0x70
[   13.804858]  kasan_save_track+0x18/0x40
[   13.805075]  kasan_save_alloc_info+0x3b/0x50
[   13.805566]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.805844]  remove_element+0x11e/0x190
[   13.806176]  mempool_alloc_preallocated+0x4d/0x90
[   13.806376]  mempool_oob_right_helper+0x8a/0x380
[   13.806585]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.806971]  kunit_try_run_case+0x1a5/0x480
[   13.807305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807504]  kthread+0x337/0x6f0
[   13.807839]  ret_from_fork+0x116/0x1d0
[   13.808024]  ret_from_fork_asm+0x1a/0x30
[   13.808414] 
[   13.808519] The buggy address belongs to the object at ffff888102a13200
[   13.808519]  which belongs to the cache kmalloc-128 of size 128
[   13.809222] The buggy address is located 0 bytes to the right of
[   13.809222]  allocated 115-byte region [ffff888102a13200, ffff888102a13273)
[   13.809720] 
[   13.810118] The buggy address belongs to the physical page:
[   13.810440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a13
[   13.810874] flags: 0x200000000000000(node=0|zone=2)
[   13.811061] page_type: f5(slab)
[   13.811186] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.811420] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.811816] page dumped because: kasan: bad access detected
[   13.811997] 
[   13.812065] Memory state around the buggy address:
[   13.812217]  ffff888102a13100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.812428]  ffff888102a13180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.812637] >ffff888102a13200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.812844]                                                              ^
[   13.813456]  ffff888102a13280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.813685]  ffff888102a13300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.814391] ==================================================================
[   13.852824] ==================================================================
[   13.853580] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.853865] Read of size 1 at addr ffff8881039532bb by task kunit_try_catch/242
[   13.854411] 
[   13.854532] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.854579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.854590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.854613] Call Trace:
[   13.854625]  <TASK>
[   13.854642]  dump_stack_lvl+0x73/0xb0
[   13.854674]  print_report+0xd1/0x650
[   13.854697]  ? __virt_addr_valid+0x1db/0x2d0
[   13.854724]  ? mempool_oob_right_helper+0x318/0x380
[   13.855006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.855253]  ? mempool_oob_right_helper+0x318/0x380
[   13.855280]  kasan_report+0x141/0x180
[   13.855302]  ? mempool_oob_right_helper+0x318/0x380
[   13.855332]  __asan_report_load1_noabort+0x18/0x20
[   13.855357]  mempool_oob_right_helper+0x318/0x380
[   13.855382]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.855409]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.855432]  ? finish_task_switch.isra.0+0x153/0x700
[   13.855459]  mempool_slab_oob_right+0xed/0x140
[   13.855483]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.855511]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.855537]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.855563]  ? __pfx_read_tsc+0x10/0x10
[   13.855584]  ? ktime_get_ts64+0x86/0x230
[   13.855608]  kunit_try_run_case+0x1a5/0x480
[   13.855634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.855681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.855705]  ? __kthread_parkme+0x82/0x180
[   13.855726]  ? preempt_count_sub+0x50/0x80
[   13.855751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.855801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.855827]  kthread+0x337/0x6f0
[   13.855846]  ? trace_preempt_on+0x20/0xc0
[   13.855869]  ? __pfx_kthread+0x10/0x10
[   13.855891]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.855913]  ? calculate_sigpending+0x7b/0xa0
[   13.855955]  ? __pfx_kthread+0x10/0x10
[   13.855977]  ret_from_fork+0x116/0x1d0
[   13.855995]  ? __pfx_kthread+0x10/0x10
[   13.856015]  ret_from_fork_asm+0x1a/0x30
[   13.856061]  </TASK>
[   13.856071] 
[   13.867987] Allocated by task 242:
[   13.868195]  kasan_save_stack+0x45/0x70
[   13.868491]  kasan_save_track+0x18/0x40
[   13.868644]  kasan_save_alloc_info+0x3b/0x50
[   13.868788]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.869059]  remove_element+0x11e/0x190
[   13.869280]  mempool_alloc_preallocated+0x4d/0x90
[   13.869507]  mempool_oob_right_helper+0x8a/0x380
[   13.869661]  mempool_slab_oob_right+0xed/0x140
[   13.869895]  kunit_try_run_case+0x1a5/0x480
[   13.870223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.870481]  kthread+0x337/0x6f0
[   13.870607]  ret_from_fork+0x116/0x1d0
[   13.870735]  ret_from_fork_asm+0x1a/0x30
[   13.870953] 
[   13.871126] The buggy address belongs to the object at ffff888103953240
[   13.871126]  which belongs to the cache test_cache of size 123
[   13.871676] The buggy address is located 0 bytes to the right of
[   13.871676]  allocated 123-byte region [ffff888103953240, ffff8881039532bb)
[   13.872412] 
[   13.872491] The buggy address belongs to the physical page:
[   13.872712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953
[   13.873289] flags: 0x200000000000000(node=0|zone=2)
[   13.873488] page_type: f5(slab)
[   13.873694] raw: 0200000000000000 ffff88810394a3c0 dead000000000122 0000000000000000
[   13.874011] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.874349] page dumped because: kasan: bad access detected
[   13.874520] 
[   13.874586] Memory state around the buggy address:
[   13.874827]  ffff888103953180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.875414]  ffff888103953200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.875748] >ffff888103953280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.875997]                                         ^
[   13.876169]  ffff888103953300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.876592]  ffff888103953380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.876950] ==================================================================
[   13.823745] ==================================================================
[   13.824484] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.825012] Read of size 1 at addr ffff888102a56001 by task kunit_try_catch/240
[   13.825466] 
[   13.825651] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.825698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.825709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.825728] Call Trace:
[   13.825741]  <TASK>
[   13.825755]  dump_stack_lvl+0x73/0xb0
[   13.825956]  print_report+0xd1/0x650
[   13.825990]  ? __virt_addr_valid+0x1db/0x2d0
[   13.826046]  ? mempool_oob_right_helper+0x318/0x380
[   13.826088]  ? kasan_addr_to_slab+0x11/0xa0
[   13.826112]  ? mempool_oob_right_helper+0x318/0x380
[   13.826137]  kasan_report+0x141/0x180
[   13.826160]  ? mempool_oob_right_helper+0x318/0x380
[   13.826189]  __asan_report_load1_noabort+0x18/0x20
[   13.826214]  mempool_oob_right_helper+0x318/0x380
[   13.826240]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.826268]  ? __kasan_check_write+0x18/0x20
[   13.826289]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.826312]  ? finish_task_switch.isra.0+0x153/0x700
[   13.826339]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   13.826366]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.826396]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.826421]  ? __pfx_mempool_kfree+0x10/0x10
[   13.826447]  ? __pfx_read_tsc+0x10/0x10
[   13.826468]  ? ktime_get_ts64+0x86/0x230
[   13.826494]  kunit_try_run_case+0x1a5/0x480
[   13.826522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.826545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.826570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.826593]  ? __kthread_parkme+0x82/0x180
[   13.826613]  ? preempt_count_sub+0x50/0x80
[   13.826637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.826661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.826686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.826711]  kthread+0x337/0x6f0
[   13.826729]  ? trace_preempt_on+0x20/0xc0
[   13.826771]  ? __pfx_kthread+0x10/0x10
[   13.826791]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.826814]  ? calculate_sigpending+0x7b/0xa0
[   13.826838]  ? __pfx_kthread+0x10/0x10
[   13.826859]  ret_from_fork+0x116/0x1d0
[   13.826878]  ? __pfx_kthread+0x10/0x10
[   13.826898]  ret_from_fork_asm+0x1a/0x30
[   13.826941]  </TASK>
[   13.826951] 
[   13.838215] The buggy address belongs to the physical page:
[   13.838468] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a54
[   13.839017] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.839667] flags: 0x200000000000040(head|node=0|zone=2)
[   13.840329] page_type: f8(unknown)
[   13.840530] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.840944] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.841537] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.842131] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.842466] head: 0200000000000002 ffffea00040a9501 00000000ffffffff 00000000ffffffff
[   13.842991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.843681] page dumped because: kasan: bad access detected
[   13.844001] 
[   13.844236] Memory state around the buggy address:
[   13.844454]  ffff888102a55f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.844748]  ffff888102a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.845048] >ffff888102a56000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.845337]                    ^
[   13.845489]  ffff888102a56080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.846417]  ffff888102a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.846973] ==================================================================