Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.578453] ==================================================================
[   18.578544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.578623] Read of size 1 at addr fff00000c6691d73 by task kunit_try_catch/221
[   18.578673] 
[   18.578716] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.578800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.578827] Hardware name: linux,dummy-virt (DT)
[   18.578876] Call trace:
[   18.578902]  show_stack+0x20/0x38 (C)
[   18.578957]  dump_stack_lvl+0x8c/0xd0
[   18.579007]  print_report+0x118/0x5d0
[   18.579054]  kasan_report+0xdc/0x128
[   18.579097]  __asan_report_load1_noabort+0x20/0x30
[   18.579147]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.579194]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.579247]  kunit_try_run_case+0x170/0x3f0
[   18.579297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.579347]  kthread+0x328/0x630
[   18.579389]  ret_from_fork+0x10/0x20
[   18.579437] 
[   18.579456] Allocated by task 221:
[   18.579487]  kasan_save_stack+0x3c/0x68
[   18.579527]  kasan_save_track+0x20/0x40
[   18.579565]  kasan_save_alloc_info+0x40/0x58
[   18.579604]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.579648]  remove_element+0x130/0x1f8
[   18.579685]  mempool_alloc_preallocated+0x58/0xc0
[   18.579725]  mempool_oob_right_helper+0x98/0x2f0
[   18.580281]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.580333]  kunit_try_run_case+0x170/0x3f0
[   18.580374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.580417]  kthread+0x328/0x630
[   18.580449]  ret_from_fork+0x10/0x20
[   18.580486] 
[   18.580507] The buggy address belongs to the object at fff00000c6691d00
[   18.580507]  which belongs to the cache kmalloc-128 of size 128
[   18.580565] The buggy address is located 0 bytes to the right of
[   18.580565]  allocated 115-byte region [fff00000c6691d00, fff00000c6691d73)
[   18.580627] 
[   18.580650] The buggy address belongs to the physical page:
[   18.580682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691
[   18.580738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.580788] page_type: f5(slab)
[   18.580832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.580896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.580937] page dumped because: kasan: bad access detected
[   18.580966] 
[   18.580984] Memory state around the buggy address:
[   18.581019]  fff00000c6691c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.581063]  fff00000c6691c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.581106] >fff00000c6691d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.581144]                                                              ^
[   18.581183]  fff00000c6691d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.581225]  fff00000c6691e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.581263] ==================================================================
[   18.611515] ==================================================================
[   18.611608] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.611689] Read of size 1 at addr fff00000c79ae001 by task kunit_try_catch/223
[   18.611752] 
[   18.611923] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.612014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.612042] Hardware name: linux,dummy-virt (DT)
[   18.612077] Call trace:
[   18.612103]  show_stack+0x20/0x38 (C)
[   18.612158]  dump_stack_lvl+0x8c/0xd0
[   18.612208]  print_report+0x118/0x5d0
[   18.612253]  kasan_report+0xdc/0x128
[   18.612299]  __asan_report_load1_noabort+0x20/0x30
[   18.612348]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.612396]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.612445]  kunit_try_run_case+0x170/0x3f0
[   18.612495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.612546]  kthread+0x328/0x630
[   18.612588]  ret_from_fork+0x10/0x20
[   18.612639] 
[   18.612664] The buggy address belongs to the physical page:
[   18.612698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ac
[   18.612756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.612803] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.612871] page_type: f8(unknown)
[   18.612914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.612963] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.613014] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.613062] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.613111] head: 0bfffe0000000002 ffffc1ffc31e6b01 00000000ffffffff 00000000ffffffff
[   18.613159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.613199] page dumped because: kasan: bad access detected
[   18.613230] 
[   18.613248] Memory state around the buggy address:
[   18.613283]  fff00000c79adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.613326]  fff00000c79adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.613367] >fff00000c79ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.613404]                    ^
[   18.613431]  fff00000c79ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.613472]  fff00000c79ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.613509] ==================================================================
[   18.630829] ==================================================================
[   18.631164] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.631244] Read of size 1 at addr fff00000c78d52bb by task kunit_try_catch/225
[   18.631526] 
[   18.631596] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.631684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.631712] Hardware name: linux,dummy-virt (DT)
[   18.632192] Call trace:
[   18.632264]  show_stack+0x20/0x38 (C)
[   18.632407]  dump_stack_lvl+0x8c/0xd0
[   18.632484]  print_report+0x118/0x5d0
[   18.632541]  kasan_report+0xdc/0x128
[   18.632586]  __asan_report_load1_noabort+0x20/0x30
[   18.632647]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.632706]  mempool_slab_oob_right+0xc0/0x118
[   18.632767]  kunit_try_run_case+0x170/0x3f0
[   18.632817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.632891]  kthread+0x328/0x630
[   18.632934]  ret_from_fork+0x10/0x20
[   18.632997] 
[   18.633036] Allocated by task 225:
[   18.633072]  kasan_save_stack+0x3c/0x68
[   18.633136]  kasan_save_track+0x20/0x40
[   18.633174]  kasan_save_alloc_info+0x40/0x58
[   18.633224]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.633276]  remove_element+0x16c/0x1f8
[   18.633321]  mempool_alloc_preallocated+0x58/0xc0
[   18.633358]  mempool_oob_right_helper+0x98/0x2f0
[   18.633395]  mempool_slab_oob_right+0xc0/0x118
[   18.633433]  kunit_try_run_case+0x170/0x3f0
[   18.633513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.633919]  kthread+0x328/0x630
[   18.634109]  ret_from_fork+0x10/0x20
[   18.634253] 
[   18.634508] The buggy address belongs to the object at fff00000c78d5240
[   18.634508]  which belongs to the cache test_cache of size 123
[   18.634613] The buggy address is located 0 bytes to the right of
[   18.634613]  allocated 123-byte region [fff00000c78d5240, fff00000c78d52bb)
[   18.634775] 
[   18.635094] The buggy address belongs to the physical page:
[   18.635311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d5
[   18.635502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.635600] page_type: f5(slab)
[   18.635943] raw: 0bfffe0000000000 fff00000c5875640 dead000000000122 0000000000000000
[   18.636556] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.636654] page dumped because: kasan: bad access detected
[   18.636832] 
[   18.637040] Memory state around the buggy address:
[   18.637101]  fff00000c78d5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.637320]  fff00000c78d5200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.637643] >fff00000c78d5280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.637904]                                         ^
[   18.638063]  fff00000c78d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638174]  fff00000c78d5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638300] ==================================================================

[   13.779103] ==================================================================
[   13.779629] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.779993] Read of size 1 at addr ffff888102f532bb by task kunit_try_catch/242
[   13.780373] 
[   13.780499] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.780572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.780584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.780607] Call Trace:
[   13.780619]  <TASK>
[   13.780636]  dump_stack_lvl+0x73/0xb0
[   13.780687]  print_report+0xd1/0x610
[   13.780710]  ? __virt_addr_valid+0x1db/0x2d0
[   13.780734]  ? mempool_oob_right_helper+0x318/0x380
[   13.780758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.780781]  ? mempool_oob_right_helper+0x318/0x380
[   13.780806]  kasan_report+0x141/0x180
[   13.780829]  ? mempool_oob_right_helper+0x318/0x380
[   13.780858]  __asan_report_load1_noabort+0x18/0x20
[   13.780899]  mempool_oob_right_helper+0x318/0x380
[   13.780925]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.780949]  ? update_load_avg+0x1be/0x21b0
[   13.780977]  ? finish_task_switch.isra.0+0x153/0x700
[   13.781004]  mempool_slab_oob_right+0xed/0x140
[   13.781028]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   13.781065]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.781090]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.781116]  ? __pfx_read_tsc+0x10/0x10
[   13.781138]  ? ktime_get_ts64+0x86/0x230
[   13.781163]  kunit_try_run_case+0x1a5/0x480
[   13.781189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.781211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.781256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.781281]  ? __kthread_parkme+0x82/0x180
[   13.781301]  ? preempt_count_sub+0x50/0x80
[   13.781325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.781349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.781373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.781397]  kthread+0x337/0x6f0
[   13.781416]  ? trace_preempt_on+0x20/0xc0
[   13.781440]  ? __pfx_kthread+0x10/0x10
[   13.781460]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.781482]  ? calculate_sigpending+0x7b/0xa0
[   13.781506]  ? __pfx_kthread+0x10/0x10
[   13.781527]  ret_from_fork+0x116/0x1d0
[   13.781546]  ? __pfx_kthread+0x10/0x10
[   13.781567]  ret_from_fork_asm+0x1a/0x30
[   13.781600]  </TASK>
[   13.781611] 
[   13.789731] Allocated by task 242:
[   13.789924]  kasan_save_stack+0x45/0x70
[   13.790152]  kasan_save_track+0x18/0x40
[   13.790375]  kasan_save_alloc_info+0x3b/0x50
[   13.790599]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.790830]  remove_element+0x11e/0x190
[   13.791021]  mempool_alloc_preallocated+0x4d/0x90
[   13.791299]  mempool_oob_right_helper+0x8a/0x380
[   13.791561]  mempool_slab_oob_right+0xed/0x140
[   13.791780]  kunit_try_run_case+0x1a5/0x480
[   13.792015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.792277]  kthread+0x337/0x6f0
[   13.792446]  ret_from_fork+0x116/0x1d0
[   13.792631]  ret_from_fork_asm+0x1a/0x30
[   13.792827] 
[   13.792897] The buggy address belongs to the object at ffff888102f53240
[   13.792897]  which belongs to the cache test_cache of size 123
[   13.793697] The buggy address is located 0 bytes to the right of
[   13.793697]  allocated 123-byte region [ffff888102f53240, ffff888102f532bb)
[   13.794217] 
[   13.794294] The buggy address belongs to the physical page:
[   13.794480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f53
[   13.794836] flags: 0x200000000000000(node=0|zone=2)
[   13.795217] page_type: f5(slab)
[   13.795345] raw: 0200000000000000 ffff888101a308c0 dead000000000122 0000000000000000
[   13.795578] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.795917] page dumped because: kasan: bad access detected
[   13.796220] 
[   13.796317] Memory state around the buggy address:
[   13.796523]  ffff888102f53180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.796834]  ffff888102f53200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   13.797091] >ffff888102f53280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   13.797434]                                         ^
[   13.797760]  ffff888102f53300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.798097]  ffff888102f53380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.798359] ==================================================================
[   13.722633] ==================================================================
[   13.723191] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.723523] Read of size 1 at addr ffff888102f42473 by task kunit_try_catch/238
[   13.723906] 
[   13.724020] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.724082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.724095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.724119] Call Trace:
[   13.724132]  <TASK>
[   13.724152]  dump_stack_lvl+0x73/0xb0
[   13.724186]  print_report+0xd1/0x610
[   13.724209]  ? __virt_addr_valid+0x1db/0x2d0
[   13.724235]  ? mempool_oob_right_helper+0x318/0x380
[   13.724259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.724283]  ? mempool_oob_right_helper+0x318/0x380
[   13.724306]  kasan_report+0x141/0x180
[   13.724329]  ? mempool_oob_right_helper+0x318/0x380
[   13.724358]  __asan_report_load1_noabort+0x18/0x20
[   13.724383]  mempool_oob_right_helper+0x318/0x380
[   13.724408]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.724434]  ? __kasan_check_write+0x18/0x20
[   13.724453]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.724477]  ? finish_task_switch.isra.0+0x153/0x700
[   13.724504]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.724528]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   13.724555]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.724580]  ? __pfx_mempool_kfree+0x10/0x10
[   13.724604]  ? __pfx_read_tsc+0x10/0x10
[   13.724626]  ? ktime_get_ts64+0x86/0x230
[   13.724652]  kunit_try_run_case+0x1a5/0x480
[   13.724680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.724702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.724728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.724770]  ? __kthread_parkme+0x82/0x180
[   13.724794]  ? preempt_count_sub+0x50/0x80
[   13.724872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.724899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.724924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.724948]  kthread+0x337/0x6f0
[   13.724968]  ? trace_preempt_on+0x20/0xc0
[   13.724993]  ? __pfx_kthread+0x10/0x10
[   13.725013]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.725035]  ? calculate_sigpending+0x7b/0xa0
[   13.725073]  ? __pfx_kthread+0x10/0x10
[   13.725095]  ret_from_fork+0x116/0x1d0
[   13.725115]  ? __pfx_kthread+0x10/0x10
[   13.725136]  ret_from_fork_asm+0x1a/0x30
[   13.725170]  </TASK>
[   13.725182] 
[   13.734683] Allocated by task 238:
[   13.734879]  kasan_save_stack+0x45/0x70
[   13.735287]  kasan_save_track+0x18/0x40
[   13.735707]  kasan_save_alloc_info+0x3b/0x50
[   13.735959]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.736404]  remove_element+0x11e/0x190
[   13.736812]  mempool_alloc_preallocated+0x4d/0x90
[   13.737178]  mempool_oob_right_helper+0x8a/0x380
[   13.737393]  mempool_kmalloc_oob_right+0xf2/0x150
[   13.737634]  kunit_try_run_case+0x1a5/0x480
[   13.737839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.738303]  kthread+0x337/0x6f0
[   13.738453]  ret_from_fork+0x116/0x1d0
[   13.738736]  ret_from_fork_asm+0x1a/0x30
[   13.738907] 
[   13.739030] The buggy address belongs to the object at ffff888102f42400
[   13.739030]  which belongs to the cache kmalloc-128 of size 128
[   13.739547] The buggy address is located 0 bytes to the right of
[   13.739547]  allocated 115-byte region [ffff888102f42400, ffff888102f42473)
[   13.740396] 
[   13.740480] The buggy address belongs to the physical page:
[   13.740813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42
[   13.741313] flags: 0x200000000000000(node=0|zone=2)
[   13.741561] page_type: f5(slab)
[   13.741866] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.742261] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.742594] page dumped because: kasan: bad access detected
[   13.742868] 
[   13.742985] Memory state around the buggy address:
[   13.743221]  ffff888102f42300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.743682]  ffff888102f42380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.744250] >ffff888102f42400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.744538]                                                              ^
[   13.745001]  ffff888102f42480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.745337]  ffff888102f42500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.745678] ==================================================================
[   13.749179] ==================================================================
[   13.749673] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   13.750445] Read of size 1 at addr ffff888103aba001 by task kunit_try_catch/240
[   13.751048] 
[   13.751305] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.751359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.751465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.751491] Call Trace:
[   13.751507]  <TASK>
[   13.751527]  dump_stack_lvl+0x73/0xb0
[   13.751563]  print_report+0xd1/0x610
[   13.751587]  ? __virt_addr_valid+0x1db/0x2d0
[   13.751610]  ? mempool_oob_right_helper+0x318/0x380
[   13.751635]  ? kasan_addr_to_slab+0x11/0xa0
[   13.751656]  ? mempool_oob_right_helper+0x318/0x380
[   13.751681]  kasan_report+0x141/0x180
[   13.751703]  ? mempool_oob_right_helper+0x318/0x380
[   13.751732]  __asan_report_load1_noabort+0x18/0x20
[   13.751757]  mempool_oob_right_helper+0x318/0x380
[   13.751782]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   13.751808]  ? __kasan_check_write+0x18/0x20
[   13.751841]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.751864]  ? finish_task_switch.isra.0+0x153/0x700
[   13.751891]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   13.751918]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   13.751946]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.751971]  ? __pfx_mempool_kfree+0x10/0x10
[   13.751997]  ? __pfx_read_tsc+0x10/0x10
[   13.752018]  ? ktime_get_ts64+0x86/0x230
[   13.752044]  kunit_try_run_case+0x1a5/0x480
[   13.752085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.752106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.752132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.752156]  ? __kthread_parkme+0x82/0x180
[   13.752177]  ? preempt_count_sub+0x50/0x80
[   13.752200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.752224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.752248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.752272]  kthread+0x337/0x6f0
[   13.752290]  ? trace_preempt_on+0x20/0xc0
[   13.752314]  ? __pfx_kthread+0x10/0x10
[   13.752335]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.752355]  ? calculate_sigpending+0x7b/0xa0
[   13.752380]  ? __pfx_kthread+0x10/0x10
[   13.752401]  ret_from_fork+0x116/0x1d0
[   13.752420]  ? __pfx_kthread+0x10/0x10
[   13.752441]  ret_from_fork_asm+0x1a/0x30
[   13.752474]  </TASK>
[   13.752484] 
[   13.765428] The buggy address belongs to the physical page:
[   13.765808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab8
[   13.766173] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.766496] flags: 0x200000000000040(head|node=0|zone=2)
[   13.767125] page_type: f8(unknown)
[   13.767380] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.767918] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.768363] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.768911] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.769258] head: 0200000000000002 ffffea00040eae01 00000000ffffffff 00000000ffffffff
[   13.770000] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.770363] page dumped because: kasan: bad access detected
[   13.770731] 
[   13.770992] Memory state around the buggy address:
[   13.771236]  ffff888103ab9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.771635]  ffff888103ab9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.772117] >ffff888103aba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.772452]                    ^
[   13.772822]  ffff888103aba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.773303]  ffff888103aba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.773744] ==================================================================