Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.751103] ==================================================================
[   19.751220] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.751308] Read of size 1 at addr fff00000c4693d73 by task kunit_try_catch/221
[   19.751389] 
[   19.751439] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.751534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.751564] Hardware name: linux,dummy-virt (DT)
[   19.751601] Call trace:
[   19.751632]  show_stack+0x20/0x38 (C)
[   19.751699]  dump_stack_lvl+0x8c/0xd0
[   19.751762]  print_report+0x118/0x608
[   19.751818]  kasan_report+0xdc/0x128
[   19.751871]  __asan_report_load1_noabort+0x20/0x30
[   19.751929]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.751986]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.752040]  kunit_try_run_case+0x170/0x3f0
[   19.752102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752160]  kthread+0x328/0x630
[   19.752211]  ret_from_fork+0x10/0x20
[   19.752269] 
[   19.752291] Allocated by task 221:
[   19.752333]  kasan_save_stack+0x3c/0x68
[   19.752381]  kasan_save_track+0x20/0x40
[   19.752419]  kasan_save_alloc_info+0x40/0x58
[   19.752475]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.752521]  remove_element+0x130/0x1f8
[   19.752562]  mempool_alloc_preallocated+0x58/0xc0
[   19.752602]  mempool_oob_right_helper+0x98/0x2f0
[   19.752642]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.752680]  kunit_try_run_case+0x170/0x3f0
[   19.752719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752761]  kthread+0x328/0x630
[   19.752795]  ret_from_fork+0x10/0x20
[   19.752832] 
[   19.752854] The buggy address belongs to the object at fff00000c4693d00
[   19.752854]  which belongs to the cache kmalloc-128 of size 128
[   19.752912] The buggy address is located 0 bytes to the right of
[   19.752912]  allocated 115-byte region [fff00000c4693d00, fff00000c4693d73)
[   19.752975] 
[   19.753001] The buggy address belongs to the physical page:
[   19.753038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104693
[   19.753099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.753157] page_type: f5(slab)
[   19.753204] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.753256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.753298] page dumped because: kasan: bad access detected
[   19.753342] 
[   19.753364] Memory state around the buggy address:
[   19.753402]  fff00000c4693c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.753448]  fff00000c4693c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753491] >fff00000c4693d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753531]                                                              ^
[   19.753571]  fff00000c4693d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753614]  fff00000c4693e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753655] ==================================================================
[   19.807504] ==================================================================
[   19.807720] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.807876] Read of size 1 at addr fff00000c789f2bb by task kunit_try_catch/225
[   19.808029] 
[   19.808151] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.808403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808462] Hardware name: linux,dummy-virt (DT)
[   19.808538] Call trace:
[   19.808590]  show_stack+0x20/0x38 (C)
[   19.808741]  dump_stack_lvl+0x8c/0xd0
[   19.809218]  print_report+0x118/0x608
[   19.809364]  kasan_report+0xdc/0x128
[   19.809501]  __asan_report_load1_noabort+0x20/0x30
[   19.809604]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.809695]  mempool_slab_oob_right+0xc0/0x118
[   19.809947]  kunit_try_run_case+0x170/0x3f0
[   19.810061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810185]  kthread+0x328/0x630
[   19.810587]  ret_from_fork+0x10/0x20
[   19.810745] 
[   19.810801] Allocated by task 225:
[   19.810901]  kasan_save_stack+0x3c/0x68
[   19.811031]  kasan_save_track+0x20/0x40
[   19.811145]  kasan_save_alloc_info+0x40/0x58
[   19.811263]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.811412]  remove_element+0x16c/0x1f8
[   19.811537]  mempool_alloc_preallocated+0x58/0xc0
[   19.811630]  mempool_oob_right_helper+0x98/0x2f0
[   19.811714]  mempool_slab_oob_right+0xc0/0x118
[   19.811805]  kunit_try_run_case+0x170/0x3f0
[   19.811893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.812003]  kthread+0x328/0x630
[   19.812107]  ret_from_fork+0x10/0x20
[   19.812231] 
[   19.812283] The buggy address belongs to the object at fff00000c789f240
[   19.812283]  which belongs to the cache test_cache of size 123
[   19.812414] The buggy address is located 0 bytes to the right of
[   19.812414]  allocated 123-byte region [fff00000c789f240, fff00000c789f2bb)
[   19.812584] 
[   19.812640] The buggy address belongs to the physical page:
[   19.812704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789f
[   19.812850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.812968] page_type: f5(slab)
[   19.813070] raw: 0bfffe0000000000 fff00000c794a500 dead000000000122 0000000000000000
[   19.813196] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.813292] page dumped because: kasan: bad access detected
[   19.813385] 
[   19.813432] Memory state around the buggy address:
[   19.813507]  fff00000c789f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.814506]  fff00000c789f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.814654] >fff00000c789f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.814806]                                         ^
[   19.814991]  fff00000c789f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.815197]  fff00000c789f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.815401] ==================================================================
[   19.774907] ==================================================================
[   19.775056] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.775210] Read of size 1 at addr fff00000c797a001 by task kunit_try_catch/223
[   19.776020] 
[   19.776107] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   19.776301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.776379] Hardware name: linux,dummy-virt (DT)
[   19.776462] Call trace:
[   19.776527]  show_stack+0x20/0x38 (C)
[   19.776656]  dump_stack_lvl+0x8c/0xd0
[   19.776775]  print_report+0x118/0x608
[   19.776880]  kasan_report+0xdc/0x128
[   19.777018]  __asan_report_load1_noabort+0x20/0x30
[   19.777279]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.777482]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.777586]  kunit_try_run_case+0x170/0x3f0
[   19.777712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.777823]  kthread+0x328/0x630
[   19.777910]  ret_from_fork+0x10/0x20
[   19.778005] 
[   19.778050] The buggy address belongs to the physical page:
[   19.778450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107978
[   19.778579] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.778683] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.778836] page_type: f8(unknown)
[   19.778932] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.779384] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.779496] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.779590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.779718] head: 0bfffe0000000002 ffffc1ffc31e5e01 00000000ffffffff 00000000ffffffff
[   19.780017] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.780126] page dumped because: kasan: bad access detected
[   19.780238] 
[   19.780343] Memory state around the buggy address:
[   19.780479]  fff00000c7979f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.780761]  fff00000c7979f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.781058] >fff00000c797a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.781161]                    ^
[   19.781575]  fff00000c797a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.782099]  fff00000c797a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.782408] ==================================================================


[   12.408672] ==================================================================
[   12.409292] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.409608] Read of size 1 at addr ffff888102826473 by task kunit_try_catch/239
[   12.410200] 
[   12.410324] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   12.410389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.410401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.410720] Call Trace:
[   12.410739]  <TASK>
[   12.410760]  dump_stack_lvl+0x73/0xb0
[   12.410793]  print_report+0xd1/0x650
[   12.410818]  ? __virt_addr_valid+0x1db/0x2d0
[   12.410843]  ? mempool_oob_right_helper+0x318/0x380
[   12.410877]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.410900]  ? mempool_oob_right_helper+0x318/0x380
[   12.410924]  kasan_report+0x141/0x180
[   12.410946]  ? mempool_oob_right_helper+0x318/0x380
[   12.410974]  __asan_report_load1_noabort+0x18/0x20
[   12.410995]  mempool_oob_right_helper+0x318/0x380
[   12.411050]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.411076]  ? __kasan_check_write+0x18/0x20
[   12.411096]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.411119]  ? finish_task_switch.isra.0+0x153/0x700
[   12.411146]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.411170]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.411195]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.411217]  ? __pfx_mempool_kfree+0x10/0x10
[   12.411238]  ? __pfx_read_tsc+0x10/0x10
[   12.411260]  ? ktime_get_ts64+0x86/0x230
[   12.411285]  kunit_try_run_case+0x1a5/0x480
[   12.411308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.411328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.411353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.411389]  ? __kthread_parkme+0x82/0x180
[   12.411410]  ? preempt_count_sub+0x50/0x80
[   12.411433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.411454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.411477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.411501]  kthread+0x337/0x6f0
[   12.411521]  ? trace_preempt_on+0x20/0xc0
[   12.411545]  ? __pfx_kthread+0x10/0x10
[   12.411565]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.411587]  ? calculate_sigpending+0x7b/0xa0
[   12.411612]  ? __pfx_kthread+0x10/0x10
[   12.411633]  ret_from_fork+0x116/0x1d0
[   12.411651]  ? __pfx_kthread+0x10/0x10
[   12.411671]  ret_from_fork_asm+0x1a/0x30
[   12.411702]  </TASK>
[   12.411713] 
[   12.421065] Allocated by task 239:
[   12.421208]  kasan_save_stack+0x45/0x70
[   12.421362]  kasan_save_track+0x18/0x40
[   12.421596]  kasan_save_alloc_info+0x3b/0x50
[   12.421892]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.422522]  remove_element+0x11e/0x190
[   12.422666]  mempool_alloc_preallocated+0x4d/0x90
[   12.423180]  mempool_oob_right_helper+0x8a/0x380
[   12.423365]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.423658]  kunit_try_run_case+0x1a5/0x480
[   12.423908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.424275]  kthread+0x337/0x6f0
[   12.424455]  ret_from_fork+0x116/0x1d0
[   12.424654]  ret_from_fork_asm+0x1a/0x30
[   12.424928] 
[   12.425045] The buggy address belongs to the object at ffff888102826400
[   12.425045]  which belongs to the cache kmalloc-128 of size 128
[   12.425508] The buggy address is located 0 bytes to the right of
[   12.425508]  allocated 115-byte region [ffff888102826400, ffff888102826473)
[   12.426281] 
[   12.426362] The buggy address belongs to the physical page:
[   12.426730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102826
[   12.427156] flags: 0x200000000000000(node=0|zone=2)
[   12.427491] page_type: f5(slab)
[   12.427651] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.428066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.428435] page dumped because: kasan: bad access detected
[   12.428712] 
[   12.428864] Memory state around the buggy address:
[   12.429168]  ffff888102826300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.429444]  ffff888102826380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.429796] >ffff888102826400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.430107]                                                              ^
[   12.430472]  ffff888102826480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.430803]  ffff888102826500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.431198] ==================================================================
[   12.459388] ==================================================================
[   12.460270] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.460635] Read of size 1 at addr ffff88810397e2bb by task kunit_try_catch/243
[   12.460960] 
[   12.461064] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   12.461170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.461198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.461220] Call Trace:
[   12.461233]  <TASK>
[   12.461249]  dump_stack_lvl+0x73/0xb0
[   12.461286]  print_report+0xd1/0x650
[   12.461309]  ? __virt_addr_valid+0x1db/0x2d0
[   12.461331]  ? mempool_oob_right_helper+0x318/0x380
[   12.461354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.461386]  ? mempool_oob_right_helper+0x318/0x380
[   12.461410]  kasan_report+0x141/0x180
[   12.461432]  ? mempool_oob_right_helper+0x318/0x380
[   12.461461]  __asan_report_load1_noabort+0x18/0x20
[   12.461481]  mempool_oob_right_helper+0x318/0x380
[   12.461505]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.461531]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.461552]  ? finish_task_switch.isra.0+0x153/0x700
[   12.461577]  mempool_slab_oob_right+0xed/0x140
[   12.461598]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.461618]  ? __kasan_check_write+0x18/0x20
[   12.461649]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.461669]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.461690]  ? __pfx_read_tsc+0x10/0x10
[   12.461721]  ? ktime_get_ts64+0x86/0x230
[   12.461744]  kunit_try_run_case+0x1a5/0x480
[   12.461783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.461802]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   12.461836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.461861]  ? __kthread_parkme+0x82/0x180
[   12.461880]  ? preempt_count_sub+0x50/0x80
[   12.461903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.461923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.461947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.461971]  kthread+0x337/0x6f0
[   12.461990]  ? trace_preempt_on+0x20/0xc0
[   12.462033]  ? __pfx_kthread+0x10/0x10
[   12.462054]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.462075]  ? calculate_sigpending+0x7b/0xa0
[   12.462098]  ? __pfx_kthread+0x10/0x10
[   12.462120]  ret_from_fork+0x116/0x1d0
[   12.462138]  ? __pfx_kthread+0x10/0x10
[   12.462158]  ret_from_fork_asm+0x1a/0x30
[   12.462188]  </TASK>
[   12.462199] 
[   12.472189] Allocated by task 243:
[   12.472475]  kasan_save_stack+0x45/0x70
[   12.472687]  kasan_save_track+0x18/0x40
[   12.472841]  kasan_save_alloc_info+0x3b/0x50
[   12.472988]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.473162]  remove_element+0x11e/0x190
[   12.473340]  mempool_alloc_preallocated+0x4d/0x90
[   12.473627]  mempool_oob_right_helper+0x8a/0x380
[   12.474040]  mempool_slab_oob_right+0xed/0x140
[   12.474223]  kunit_try_run_case+0x1a5/0x480
[   12.474461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.474699]  kthread+0x337/0x6f0
[   12.474859]  ret_from_fork+0x116/0x1d0
[   12.475220]  ret_from_fork_asm+0x1a/0x30
[   12.475392] 
[   12.475467] The buggy address belongs to the object at ffff88810397e240
[   12.475467]  which belongs to the cache test_cache of size 123
[   12.476109] The buggy address is located 0 bytes to the right of
[   12.476109]  allocated 123-byte region [ffff88810397e240, ffff88810397e2bb)
[   12.476999] 
[   12.477122] The buggy address belongs to the physical page:
[   12.477352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10397e
[   12.477669] flags: 0x200000000000000(node=0|zone=2)
[   12.477958] page_type: f5(slab)
[   12.478281] raw: 0200000000000000 ffff88810189cb40 dead000000000122 0000000000000000
[   12.478639] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.478990] page dumped because: kasan: bad access detected
[   12.479460] 
[   12.479562] Memory state around the buggy address:
[   12.479792]  ffff88810397e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.480167]  ffff88810397e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.480450] >ffff88810397e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.480818]                                         ^
[   12.481055]  ffff88810397e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.481449]  ffff88810397e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.481737] ==================================================================
[   12.434804] ==================================================================
[   12.435319] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.435643] Read of size 1 at addr ffff8881039f6001 by task kunit_try_catch/241
[   12.436011] 
[   12.436115] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   12.436161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.436173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.436194] Call Trace:
[   12.436207]  <TASK>
[   12.436235]  dump_stack_lvl+0x73/0xb0
[   12.436265]  print_report+0xd1/0x650
[   12.436289]  ? __virt_addr_valid+0x1db/0x2d0
[   12.436325]  ? mempool_oob_right_helper+0x318/0x380
[   12.436348]  ? kasan_addr_to_slab+0x11/0xa0
[   12.436369]  ? mempool_oob_right_helper+0x318/0x380
[   12.436401]  kasan_report+0x141/0x180
[   12.436424]  ? mempool_oob_right_helper+0x318/0x380
[   12.436452]  __asan_report_load1_noabort+0x18/0x20
[   12.436482]  mempool_oob_right_helper+0x318/0x380
[   12.436506]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.436531]  ? __kasan_check_write+0x18/0x20
[   12.436562]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.436585]  ? finish_task_switch.isra.0+0x153/0x700
[   12.436612]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.436637]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.436665]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.436685]  ? __pfx_mempool_kfree+0x10/0x10
[   12.436706]  ? __pfx_read_tsc+0x10/0x10
[   12.436738]  ? ktime_get_ts64+0x86/0x230
[   12.436763]  kunit_try_run_case+0x1a5/0x480
[   12.436794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.436814]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.436840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.436876]  ? __kthread_parkme+0x82/0x180
[   12.436895]  ? preempt_count_sub+0x50/0x80
[   12.436918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.436939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.436972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.436996]  kthread+0x337/0x6f0
[   12.437016]  ? trace_preempt_on+0x20/0xc0
[   12.437051]  ? __pfx_kthread+0x10/0x10
[   12.437072]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.437118]  ? calculate_sigpending+0x7b/0xa0
[   12.437142]  ? __pfx_kthread+0x10/0x10
[   12.437164]  ret_from_fork+0x116/0x1d0
[   12.437182]  ? __pfx_kthread+0x10/0x10
[   12.437203]  ret_from_fork_asm+0x1a/0x30
[   12.437233]  </TASK>
[   12.437244] 
[   12.446641] The buggy address belongs to the physical page:
[   12.447180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   12.447560] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.447920] flags: 0x200000000000040(head|node=0|zone=2)
[   12.448252] page_type: f8(unknown)
[   12.448436] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.448775] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.449118] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.449443] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.449717] head: 0200000000000002 ffffea00040e7d01 00000000ffffffff 00000000ffffffff
[   12.450055] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.450343] page dumped because: kasan: bad access detected
[   12.450616] 
[   12.450689] Memory state around the buggy address:
[   12.450944]  ffff8881039f5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.451213]  ffff8881039f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.451751] >ffff8881039f6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.452289]                    ^
[   12.452472]  ffff8881039f6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.452693]  ffff8881039f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.453057] ==================================================================