Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.402565] ==================================================================
[   18.402640] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.402929] Read of size 1 at addr fff00000c65b12bb by task kunit_try_catch/225
[   18.403361] 
[   18.403425] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.403513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.403541] Hardware name: linux,dummy-virt (DT)
[   18.403572] Call trace:
[   18.403594]  show_stack+0x20/0x38 (C)
[   18.403643]  dump_stack_lvl+0x8c/0xd0
[   18.403692]  print_report+0x118/0x5d0
[   18.403738]  kasan_report+0xdc/0x128
[   18.404057]  __asan_report_load1_noabort+0x20/0x30
[   18.404118]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.404300]  mempool_slab_oob_right+0xc0/0x118
[   18.404436]  kunit_try_run_case+0x170/0x3f0
[   18.404537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.404647]  kthread+0x328/0x630
[   18.404732]  ret_from_fork+0x10/0x20
[   18.404792] 
[   18.404810] Allocated by task 225:
[   18.405065]  kasan_save_stack+0x3c/0x68
[   18.405162]  kasan_save_track+0x20/0x40
[   18.405274]  kasan_save_alloc_info+0x40/0x58
[   18.405326]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.405416]  remove_element+0x16c/0x1f8
[   18.405469]  mempool_alloc_preallocated+0x58/0xc0
[   18.405514]  mempool_oob_right_helper+0x98/0x2f0
[   18.405563]  mempool_slab_oob_right+0xc0/0x118
[   18.405611]  kunit_try_run_case+0x170/0x3f0
[   18.405648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.405715]  kthread+0x328/0x630
[   18.405765]  ret_from_fork+0x10/0x20
[   18.405802] 
[   18.405823] The buggy address belongs to the object at fff00000c65b1240
[   18.405823]  which belongs to the cache test_cache of size 123
[   18.405882] The buggy address is located 0 bytes to the right of
[   18.405882]  allocated 123-byte region [fff00000c65b1240, fff00000c65b12bb)
[   18.406072] 
[   18.406135] The buggy address belongs to the physical page:
[   18.406267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   18.406362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.406415] page_type: f5(slab)
[   18.406454] raw: 0bfffe0000000000 fff00000c66fd140 dead000000000122 0000000000000000
[   18.406732] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.406780] page dumped because: kasan: bad access detected
[   18.406812] 
[   18.406848] Memory state around the buggy address:
[   18.406892]  fff00000c65b1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.406938]  fff00000c65b1200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.406991] >fff00000c65b1280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.407030]                                         ^
[   18.407073]  fff00000c65b1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.407134]  fff00000c65b1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.407182] ==================================================================
[   18.357441] ==================================================================
[   18.357517] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.357592] Read of size 1 at addr fff00000c7897373 by task kunit_try_catch/221
[   18.357644] 
[   18.357685] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.357772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.357798] Hardware name: linux,dummy-virt (DT)
[   18.357833] Call trace:
[   18.357856]  show_stack+0x20/0x38 (C)
[   18.357908]  dump_stack_lvl+0x8c/0xd0
[   18.357962]  print_report+0x118/0x5d0
[   18.358010]  kasan_report+0xdc/0x128
[   18.358053]  __asan_report_load1_noabort+0x20/0x30
[   18.358104]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.358152]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.358212]  kunit_try_run_case+0x170/0x3f0
[   18.358261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.358314]  kthread+0x328/0x630
[   18.358355]  ret_from_fork+0x10/0x20
[   18.358404] 
[   18.358423] Allocated by task 221:
[   18.358454]  kasan_save_stack+0x3c/0x68
[   18.358494]  kasan_save_track+0x20/0x40
[   18.358531]  kasan_save_alloc_info+0x40/0x58
[   18.358572]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.358616]  remove_element+0x130/0x1f8
[   18.358654]  mempool_alloc_preallocated+0x58/0xc0
[   18.358693]  mempool_oob_right_helper+0x98/0x2f0
[   18.358732]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.358773]  kunit_try_run_case+0x170/0x3f0
[   18.358812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.358854]  kthread+0x328/0x630
[   18.358888]  ret_from_fork+0x10/0x20
[   18.358923] 
[   18.358944] The buggy address belongs to the object at fff00000c7897300
[   18.358944]  which belongs to the cache kmalloc-128 of size 128
[   18.359004] The buggy address is located 0 bytes to the right of
[   18.359004]  allocated 115-byte region [fff00000c7897300, fff00000c7897373)
[   18.359072] 
[   18.359094] The buggy address belongs to the physical page:
[   18.359128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107897
[   18.359194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.359249] page_type: f5(slab)
[   18.359297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.359349] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.359392] page dumped because: kasan: bad access detected
[   18.359423] 
[   18.359441] Memory state around the buggy address:
[   18.359476]  fff00000c7897200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.359520]  fff00000c7897280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.359565] >fff00000c7897300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.359607]                                                              ^
[   18.359648]  fff00000c7897380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.359691]  fff00000c7897400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.359732] ==================================================================
[   18.380264] ==================================================================
[   18.380665] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.380820] Read of size 1 at addr fff00000c79b2001 by task kunit_try_catch/223
[   18.380871] 
[   18.381026] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.381410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.381500] Hardware name: linux,dummy-virt (DT)
[   18.381532] Call trace:
[   18.381798]  show_stack+0x20/0x38 (C)
[   18.382129]  dump_stack_lvl+0x8c/0xd0
[   18.382215]  print_report+0x118/0x5d0
[   18.382260]  kasan_report+0xdc/0x128
[   18.382621]  __asan_report_load1_noabort+0x20/0x30
[   18.382804]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.382859]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.383241]  kunit_try_run_case+0x170/0x3f0
[   18.383354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.383409]  kthread+0x328/0x630
[   18.383609]  ret_from_fork+0x10/0x20
[   18.383661] 
[   18.383681] The buggy address belongs to the physical page:
[   18.383715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b0
[   18.384014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.384123] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.384706] page_type: f8(unknown)
[   18.384755] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.385226] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.385284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.385365] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.385636] head: 0bfffe0000000002 ffffc1ffc31e6c01 00000000ffffffff 00000000ffffffff
[   18.385690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.386099] page dumped because: kasan: bad access detected
[   18.386293] 
[   18.386326] Memory state around the buggy address:
[   18.386635]  fff00000c79b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.386877]  fff00000c79b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.386942] >fff00000c79b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.386981]                    ^
[   18.387009]  fff00000c79b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.387244]  fff00000c79b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.387818] ==================================================================

[   14.466113] ==================================================================
[   14.466553] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.466823] Read of size 1 at addr ffff888102a082bb by task kunit_try_catch/242
[   14.467211] 
[   14.467456] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.467516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.467528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.467562] Call Trace:
[   14.467574]  <TASK>
[   14.467593]  dump_stack_lvl+0x73/0xb0
[   14.467637]  print_report+0xd1/0x610
[   14.467661]  ? __virt_addr_valid+0x1db/0x2d0
[   14.467687]  ? mempool_oob_right_helper+0x318/0x380
[   14.467711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.467734]  ? mempool_oob_right_helper+0x318/0x380
[   14.467758]  kasan_report+0x141/0x180
[   14.467789]  ? mempool_oob_right_helper+0x318/0x380
[   14.467818]  __asan_report_load1_noabort+0x18/0x20
[   14.467854]  mempool_oob_right_helper+0x318/0x380
[   14.467879]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.467906]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.467931]  ? finish_task_switch.isra.0+0x153/0x700
[   14.467958]  mempool_slab_oob_right+0xed/0x140
[   14.467982]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.468308]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.468337]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.468363]  ? __pfx_read_tsc+0x10/0x10
[   14.468396]  ? ktime_get_ts64+0x86/0x230
[   14.468422]  kunit_try_run_case+0x1a5/0x480
[   14.468449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.468473]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.468500]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.468525]  ? __kthread_parkme+0x82/0x180
[   14.468547]  ? preempt_count_sub+0x50/0x80
[   14.468580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.468622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.468658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.468684]  kthread+0x337/0x6f0
[   14.468703]  ? trace_preempt_on+0x20/0xc0
[   14.468727]  ? __pfx_kthread+0x10/0x10
[   14.468748]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.468769]  ? calculate_sigpending+0x7b/0xa0
[   14.468795]  ? __pfx_kthread+0x10/0x10
[   14.468816]  ret_from_fork+0x116/0x1d0
[   14.468835]  ? __pfx_kthread+0x10/0x10
[   14.468855]  ret_from_fork_asm+0x1a/0x30
[   14.468887]  </TASK>
[   14.468897] 
[   14.482616] Allocated by task 242:
[   14.482959]  kasan_save_stack+0x45/0x70
[   14.483427]  kasan_save_track+0x18/0x40
[   14.483793]  kasan_save_alloc_info+0x3b/0x50
[   14.484341]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.484912]  remove_element+0x11e/0x190
[   14.485225]  mempool_alloc_preallocated+0x4d/0x90
[   14.485399]  mempool_oob_right_helper+0x8a/0x380
[   14.485553]  mempool_slab_oob_right+0xed/0x140
[   14.485702]  kunit_try_run_case+0x1a5/0x480
[   14.485849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.486059]  kthread+0x337/0x6f0
[   14.486178]  ret_from_fork+0x116/0x1d0
[   14.486501]  ret_from_fork_asm+0x1a/0x30
[   14.486736] 
[   14.486840] The buggy address belongs to the object at ffff888102a08240
[   14.486840]  which belongs to the cache test_cache of size 123
[   14.487412] The buggy address is located 0 bytes to the right of
[   14.487412]  allocated 123-byte region [ffff888102a08240, ffff888102a082bb)
[   14.487863] 
[   14.487939] The buggy address belongs to the physical page:
[   14.488523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   14.488921] flags: 0x200000000000000(node=0|zone=2)
[   14.489169] page_type: f5(slab)
[   14.489363] raw: 0200000000000000 ffff888101cdddc0 dead000000000122 0000000000000000
[   14.489793] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.490137] page dumped because: kasan: bad access detected
[   14.490453] 
[   14.490570] Memory state around the buggy address:
[   14.490798]  ffff888102a08180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.491130]  ffff888102a08200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.491400] >ffff888102a08280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.491885]                                         ^
[   14.492183]  ffff888102a08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492536]  ffff888102a08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492806] ==================================================================
[   14.408300] ==================================================================
[   14.408752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.409433] Read of size 1 at addr ffff8881027eb873 by task kunit_try_catch/238
[   14.409774] 
[   14.409895] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.409946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.409958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.409983] Call Trace:
[   14.410130]  <TASK>
[   14.410315]  dump_stack_lvl+0x73/0xb0
[   14.410354]  print_report+0xd1/0x610
[   14.410379]  ? __virt_addr_valid+0x1db/0x2d0
[   14.410405]  ? mempool_oob_right_helper+0x318/0x380
[   14.410430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.410453]  ? mempool_oob_right_helper+0x318/0x380
[   14.410478]  kasan_report+0x141/0x180
[   14.410501]  ? mempool_oob_right_helper+0x318/0x380
[   14.410530]  __asan_report_load1_noabort+0x18/0x20
[   14.410556]  mempool_oob_right_helper+0x318/0x380
[   14.410581]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.410608]  ? __kasan_check_write+0x18/0x20
[   14.410629]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.410653]  ? finish_task_switch.isra.0+0x153/0x700
[   14.410681]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.410711]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.410739]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.410765]  ? __pfx_mempool_kfree+0x10/0x10
[   14.410791]  ? __pfx_read_tsc+0x10/0x10
[   14.410814]  ? ktime_get_ts64+0x86/0x230
[   14.410840]  kunit_try_run_case+0x1a5/0x480
[   14.410867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.410891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.410917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.410942]  ? __kthread_parkme+0x82/0x180
[   14.410964]  ? preempt_count_sub+0x50/0x80
[   14.411008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.411053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.411078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.411104]  kthread+0x337/0x6f0
[   14.411123]  ? trace_preempt_on+0x20/0xc0
[   14.411149]  ? __pfx_kthread+0x10/0x10
[   14.411169]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.411191]  ? calculate_sigpending+0x7b/0xa0
[   14.411217]  ? __pfx_kthread+0x10/0x10
[   14.411239]  ret_from_fork+0x116/0x1d0
[   14.411257]  ? __pfx_kthread+0x10/0x10
[   14.411287]  ret_from_fork_asm+0x1a/0x30
[   14.411319]  </TASK>
[   14.411331] 
[   14.422331] Allocated by task 238:
[   14.422495]  kasan_save_stack+0x45/0x70
[   14.422696]  kasan_save_track+0x18/0x40
[   14.422889]  kasan_save_alloc_info+0x3b/0x50
[   14.423191]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.423505]  remove_element+0x11e/0x190
[   14.423695]  mempool_alloc_preallocated+0x4d/0x90
[   14.423854]  mempool_oob_right_helper+0x8a/0x380
[   14.424070]  mempool_kmalloc_oob_right+0xf2/0x150
[   14.424317]  kunit_try_run_case+0x1a5/0x480
[   14.424641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.424838]  kthread+0x337/0x6f0
[   14.425082]  ret_from_fork+0x116/0x1d0
[   14.425319]  ret_from_fork_asm+0x1a/0x30
[   14.425536] 
[   14.425640] The buggy address belongs to the object at ffff8881027eb800
[   14.425640]  which belongs to the cache kmalloc-128 of size 128
[   14.426139] The buggy address is located 0 bytes to the right of
[   14.426139]  allocated 115-byte region [ffff8881027eb800, ffff8881027eb873)
[   14.426626] 
[   14.426730] The buggy address belongs to the physical page:
[   14.427005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027eb
[   14.427361] flags: 0x200000000000000(node=0|zone=2)
[   14.427814] page_type: f5(slab)
[   14.428014] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.428452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.428709] page dumped because: kasan: bad access detected
[   14.429061] 
[   14.429158] Memory state around the buggy address:
[   14.429389]  ffff8881027eb700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.429651]  ffff8881027eb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429924] >ffff8881027eb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.430238]                                                              ^
[   14.430453]  ffff8881027eb880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430922]  ffff8881027eb900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.431141] ==================================================================
[   14.441733] ==================================================================
[   14.442521] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   14.442858] Read of size 1 at addr ffff888102c06001 by task kunit_try_catch/240
[   14.443225] 
[   14.443364] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.443414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.443427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.443451] Call Trace:
[   14.443463]  <TASK>
[   14.443482]  dump_stack_lvl+0x73/0xb0
[   14.443516]  print_report+0xd1/0x610
[   14.443541]  ? __virt_addr_valid+0x1db/0x2d0
[   14.443566]  ? mempool_oob_right_helper+0x318/0x380
[   14.443591]  ? kasan_addr_to_slab+0x11/0xa0
[   14.443611]  ? mempool_oob_right_helper+0x318/0x380
[   14.443635]  kasan_report+0x141/0x180
[   14.443657]  ? mempool_oob_right_helper+0x318/0x380
[   14.443686]  __asan_report_load1_noabort+0x18/0x20
[   14.443711]  mempool_oob_right_helper+0x318/0x380
[   14.443737]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.443765]  ? __kasan_check_write+0x18/0x20
[   14.443785]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.443810]  ? finish_task_switch.isra.0+0x153/0x700
[   14.443836]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   14.443863]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.443892]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.443918]  ? __pfx_mempool_kfree+0x10/0x10
[   14.443942]  ? __pfx_read_tsc+0x10/0x10
[   14.443965]  ? ktime_get_ts64+0x86/0x230
[   14.443989]  kunit_try_run_case+0x1a5/0x480
[   14.444016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.444260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.444296]  ? __kthread_parkme+0x82/0x180
[   14.444318]  ? preempt_count_sub+0x50/0x80
[   14.444342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.444418]  kthread+0x337/0x6f0
[   14.444438]  ? trace_preempt_on+0x20/0xc0
[   14.444462]  ? __pfx_kthread+0x10/0x10
[   14.444483]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.444505]  ? calculate_sigpending+0x7b/0xa0
[   14.444530]  ? __pfx_kthread+0x10/0x10
[   14.444551]  ret_from_fork+0x116/0x1d0
[   14.444571]  ? __pfx_kthread+0x10/0x10
[   14.444592]  ret_from_fork_asm+0x1a/0x30
[   14.444624]  </TASK>
[   14.444635] 
[   14.454521] The buggy address belongs to the physical page:
[   14.454797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c04
[   14.455271] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.455552] flags: 0x200000000000040(head|node=0|zone=2)
[   14.455772] page_type: f8(unknown)
[   14.455925] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.456241] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.456665] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.456937] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.457218] head: 0200000000000002 ffffea00040b0101 00000000ffffffff 00000000ffffffff
[   14.457627] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.458093] page dumped because: kasan: bad access detected
[   14.458298] 
[   14.458393] Memory state around the buggy address:
[   14.458625]  ffff888102c05f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.458900]  ffff888102c05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.459322] >ffff888102c06000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.459637]                    ^
[   14.459812]  ffff888102c06080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.460191]  ffff888102c06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.460469] ==================================================================