Hay
Date
June 16, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.858033] ==================================================================
[   21.858120] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.858205] Read of size 1 at addr fff00000c7886001 by task kunit_try_catch/232
[   21.858270] 
[   21.858319] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.858425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.858461] Hardware name: linux,dummy-virt (DT)
[   21.858499] Call trace:
[   21.858529]  show_stack+0x20/0x38 (C)
[   21.858591]  dump_stack_lvl+0x8c/0xd0
[   21.858646]  print_report+0x118/0x608
[   21.858735]  kasan_report+0xdc/0x128
[   21.858789]  __asan_report_load1_noabort+0x20/0x30
[   21.858860]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.858922]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.858982]  kunit_try_run_case+0x170/0x3f0
[   21.859040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859213]  kthread+0x328/0x630
[   21.859267]  ret_from_fork+0x10/0x20
[   21.859328] 
[   21.859359] The buggy address belongs to the physical page:
[   21.859405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   21.859470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.859521] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.859979] page_type: f8(unknown)
[   21.860152] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.860221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.860286] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.860345] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.860404] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   21.860577] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.860629] page dumped because: kasan: bad access detected
[   21.860665] 
[   21.860695] Memory state around the buggy address:
[   21.860735]  fff00000c7885f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.860829]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.861058] >fff00000c7886000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.861118]                    ^
[   21.861160]  fff00000c7886080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.861210]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.861254] ==================================================================
[   21.871790] ==================================================================
[   21.871895] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.871984] Read of size 1 at addr fff00000c63ff2bb by task kunit_try_catch/234
[   21.872042] 
[   21.872238] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.872483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.872663] Hardware name: linux,dummy-virt (DT)
[   21.872706] Call trace:
[   21.872737]  show_stack+0x20/0x38 (C)
[   21.872809]  dump_stack_lvl+0x8c/0xd0
[   21.872876]  print_report+0x118/0x608
[   21.872926]  kasan_report+0xdc/0x128
[   21.872973]  __asan_report_load1_noabort+0x20/0x30
[   21.873193]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.873342]  mempool_slab_oob_right+0xc0/0x118
[   21.873402]  kunit_try_run_case+0x170/0x3f0
[   21.873512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.873575]  kthread+0x328/0x630
[   21.873622]  ret_from_fork+0x10/0x20
[   21.873864] 
[   21.873908] Allocated by task 234:
[   21.873952]  kasan_save_stack+0x3c/0x68
[   21.874068]  kasan_save_track+0x20/0x40
[   21.874181]  kasan_save_alloc_info+0x40/0x58
[   21.874267]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.874338]  remove_element+0x16c/0x1f8
[   21.874382]  mempool_alloc_preallocated+0x58/0xc0
[   21.874424]  mempool_oob_right_helper+0x98/0x2f0
[   21.874469]  mempool_slab_oob_right+0xc0/0x118
[   21.874512]  kunit_try_run_case+0x170/0x3f0
[   21.874568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.874651]  kthread+0x328/0x630
[   21.874722]  ret_from_fork+0x10/0x20
[   21.874820] 
[   21.874949] The buggy address belongs to the object at fff00000c63ff240
[   21.874949]  which belongs to the cache test_cache of size 123
[   21.875550] The buggy address is located 0 bytes to the right of
[   21.875550]  allocated 123-byte region [fff00000c63ff240, fff00000c63ff2bb)
[   21.876099] 
[   21.876268] The buggy address belongs to the physical page:
[   21.876336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ff
[   21.876578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.876666] page_type: f5(slab)
[   21.876716] raw: 0bfffe0000000000 fff00000c6419140 dead000000000122 0000000000000000
[   21.876949] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.877146] page dumped because: kasan: bad access detected
[   21.877189] 
[   21.877212] Memory state around the buggy address:
[   21.877257]  fff00000c63ff180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.877310]  fff00000c63ff200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.877358] >fff00000c63ff280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.877402]                                         ^
[   21.877440]  fff00000c63ff300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.877488]  fff00000c63ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.877532] ==================================================================
[   21.847753] ==================================================================
[   21.847888] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.847993] Read of size 1 at addr fff00000c6408673 by task kunit_try_catch/230
[   21.848059] 
[   21.848128] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   21.848230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.848262] Hardware name: linux,dummy-virt (DT)
[   21.848302] Call trace:
[   21.848335]  show_stack+0x20/0x38 (C)
[   21.848397]  dump_stack_lvl+0x8c/0xd0
[   21.848451]  print_report+0x118/0x608
[   21.848507]  kasan_report+0xdc/0x128
[   21.848556]  __asan_report_load1_noabort+0x20/0x30
[   21.848613]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.848667]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.848720]  kunit_try_run_case+0x170/0x3f0
[   21.848777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.848861]  kthread+0x328/0x630
[   21.848911]  ret_from_fork+0x10/0x20
[   21.848969] 
[   21.849022] Allocated by task 230:
[   21.849064]  kasan_save_stack+0x3c/0x68
[   21.849122]  kasan_save_track+0x20/0x40
[   21.849173]  kasan_save_alloc_info+0x40/0x58
[   21.849213]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.849260]  remove_element+0x130/0x1f8
[   21.849303]  mempool_alloc_preallocated+0x58/0xc0
[   21.849347]  mempool_oob_right_helper+0x98/0x2f0
[   21.849388]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.849430]  kunit_try_run_case+0x170/0x3f0
[   21.849472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.849518]  kthread+0x328/0x630
[   21.849553]  ret_from_fork+0x10/0x20
[   21.849595] 
[   21.849628] The buggy address belongs to the object at fff00000c6408600
[   21.849628]  which belongs to the cache kmalloc-128 of size 128
[   21.849697] The buggy address is located 0 bytes to the right of
[   21.849697]  allocated 115-byte region [fff00000c6408600, fff00000c6408673)
[   21.849768] 
[   21.849798] The buggy address belongs to the physical page:
[   21.849875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   21.849948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.850016] page_type: f5(slab)
[   21.850071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.850134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.850189] page dumped because: kasan: bad access detected
[   21.850230] 
[   21.850271] Memory state around the buggy address:
[   21.850318]  fff00000c6408500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.850376]  fff00000c6408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.850432] >fff00000c6408600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.850482]                                                              ^
[   21.850533]  fff00000c6408680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.850588]  fff00000c6408700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.850640] ==================================================================

[   12.893286] ==================================================================
[   12.893894] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.894277] Read of size 1 at addr ffff8881028e2973 by task kunit_try_catch/246
[   12.894572] 
[   12.894663] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   12.894715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.894727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.894762] Call Trace:
[   12.894786]  <TASK>
[   12.894807]  dump_stack_lvl+0x73/0xb0
[   12.894840]  print_report+0xd1/0x650
[   12.894862]  ? __virt_addr_valid+0x1db/0x2d0
[   12.894889]  ? mempool_oob_right_helper+0x318/0x380
[   12.894913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.894947]  ? mempool_oob_right_helper+0x318/0x380
[   12.894971]  kasan_report+0x141/0x180
[   12.894992]  ? mempool_oob_right_helper+0x318/0x380
[   12.895019]  __asan_report_load1_noabort+0x18/0x20
[   12.895043]  mempool_oob_right_helper+0x318/0x380
[   12.895066]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.895088]  ? update_load_avg+0x1be/0x21b0
[   12.895113]  ? dequeue_entities+0x27e/0x1740
[   12.895138]  ? finish_task_switch.isra.0+0x153/0x700
[   12.895164]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.895187]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   12.895212]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.895238]  ? __pfx_mempool_kfree+0x10/0x10
[   12.895263]  ? __pfx_read_tsc+0x10/0x10
[   12.895285]  ? ktime_get_ts64+0x86/0x230
[   12.895310]  kunit_try_run_case+0x1a5/0x480
[   12.895337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.895358]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.895382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.895404]  ? __kthread_parkme+0x82/0x180
[   12.895501]  ? preempt_count_sub+0x50/0x80
[   12.895528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.895552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.895575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.895597]  kthread+0x337/0x6f0
[   12.895617]  ? trace_preempt_on+0x20/0xc0
[   12.895642]  ? __pfx_kthread+0x10/0x10
[   12.895663]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.895683]  ? calculate_sigpending+0x7b/0xa0
[   12.895708]  ? __pfx_kthread+0x10/0x10
[   12.895729]  ret_from_fork+0x116/0x1d0
[   12.895748]  ? __pfx_kthread+0x10/0x10
[   12.895768]  ret_from_fork_asm+0x1a/0x30
[   12.895800]  </TASK>
[   12.895812] 
[   12.905009] Allocated by task 246:
[   12.905150]  kasan_save_stack+0x45/0x70
[   12.905299]  kasan_save_track+0x18/0x40
[   12.905424]  kasan_save_alloc_info+0x3b/0x50
[   12.905563]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.905730]  remove_element+0x11e/0x190
[   12.905862]  mempool_alloc_preallocated+0x4d/0x90
[   12.906044]  mempool_oob_right_helper+0x8a/0x380
[   12.906191]  mempool_kmalloc_oob_right+0xf2/0x150
[   12.906337]  kunit_try_run_case+0x1a5/0x480
[   12.906593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.906767]  kthread+0x337/0x6f0
[   12.906885]  ret_from_fork+0x116/0x1d0
[   12.907047]  ret_from_fork_asm+0x1a/0x30
[   12.907235] 
[   12.907327] The buggy address belongs to the object at ffff8881028e2900
[   12.907327]  which belongs to the cache kmalloc-128 of size 128
[   12.907989] The buggy address is located 0 bytes to the right of
[   12.907989]  allocated 115-byte region [ffff8881028e2900, ffff8881028e2973)
[   12.908343] 
[   12.908410] The buggy address belongs to the physical page:
[   12.910082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e2
[   12.910321] flags: 0x200000000000000(node=0|zone=2)
[   12.910483] page_type: f5(slab)
[   12.910647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.911479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.911833] page dumped because: kasan: bad access detected
[   12.912046] 
[   12.912112] Memory state around the buggy address:
[   12.912263]  ffff8881028e2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.912496]  ffff8881028e2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.912776] >ffff8881028e2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.912990]                                                              ^
[   12.913263]  ffff8881028e2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.913470]  ffff8881028e2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   12.913672] ==================================================================
[   12.945020] ==================================================================
[   12.945671] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.946053] Read of size 1 at addr ffff8881028da2bb by task kunit_try_catch/250
[   12.946784] 
[   12.946886] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   12.946950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.946961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.946983] Call Trace:
[   12.946996]  <TASK>
[   12.947013]  dump_stack_lvl+0x73/0xb0
[   12.947045]  print_report+0xd1/0x650
[   12.947068]  ? __virt_addr_valid+0x1db/0x2d0
[   12.947092]  ? mempool_oob_right_helper+0x318/0x380
[   12.947116]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.947138]  ? mempool_oob_right_helper+0x318/0x380
[   12.947160]  kasan_report+0x141/0x180
[   12.947182]  ? mempool_oob_right_helper+0x318/0x380
[   12.947209]  __asan_report_load1_noabort+0x18/0x20
[   12.947233]  mempool_oob_right_helper+0x318/0x380
[   12.947256]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.947281]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.947304]  ? finish_task_switch.isra.0+0x153/0x700
[   12.947330]  mempool_slab_oob_right+0xed/0x140
[   12.947353]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   12.947380]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.947404]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.947429]  ? __pfx_read_tsc+0x10/0x10
[   12.947450]  ? ktime_get_ts64+0x86/0x230
[   12.947474]  kunit_try_run_case+0x1a5/0x480
[   12.947499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.947521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.947543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.947565]  ? __kthread_parkme+0x82/0x180
[   12.947585]  ? preempt_count_sub+0x50/0x80
[   12.947608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.947631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.947652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.947675]  kthread+0x337/0x6f0
[   12.947696]  ? trace_preempt_on+0x20/0xc0
[   12.947720]  ? __pfx_kthread+0x10/0x10
[   12.947740]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.947760]  ? calculate_sigpending+0x7b/0xa0
[   12.947784]  ? __pfx_kthread+0x10/0x10
[   12.947806]  ret_from_fork+0x116/0x1d0
[   12.947825]  ? __pfx_kthread+0x10/0x10
[   12.947844]  ret_from_fork_asm+0x1a/0x30
[   12.947875]  </TASK>
[   12.947886] 
[   12.959529] Allocated by task 250:
[   12.959709]  kasan_save_stack+0x45/0x70
[   12.959901]  kasan_save_track+0x18/0x40
[   12.960086]  kasan_save_alloc_info+0x3b/0x50
[   12.960278]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.960711]  remove_element+0x11e/0x190
[   12.960897]  mempool_alloc_preallocated+0x4d/0x90
[   12.961109]  mempool_oob_right_helper+0x8a/0x380
[   12.961306]  mempool_slab_oob_right+0xed/0x140
[   12.962173]  kunit_try_run_case+0x1a5/0x480
[   12.962393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.962563]  kthread+0x337/0x6f0
[   12.962980]  ret_from_fork+0x116/0x1d0
[   12.963160]  ret_from_fork_asm+0x1a/0x30
[   12.963333] 
[   12.963487] The buggy address belongs to the object at ffff8881028da240
[   12.963487]  which belongs to the cache test_cache of size 123
[   12.963979] The buggy address is located 0 bytes to the right of
[   12.963979]  allocated 123-byte region [ffff8881028da240, ffff8881028da2bb)
[   12.964633] 
[   12.964728] The buggy address belongs to the physical page:
[   12.964958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028da
[   12.965265] flags: 0x200000000000000(node=0|zone=2)
[   12.965557] page_type: f5(slab)
[   12.966380] raw: 0200000000000000 ffff888101894780 dead000000000122 0000000000000000
[   12.966751] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.966991] page dumped because: kasan: bad access detected
[   12.967171] 
[   12.967258] Memory state around the buggy address:
[   12.967478]  ffff8881028da180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.967719]  ffff8881028da200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   12.967996] >ffff8881028da280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   12.968346]                                         ^
[   12.968730]  ffff8881028da300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.969025]  ffff8881028da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.969334] ==================================================================
[   12.921693] ==================================================================
[   12.922225] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   12.922656] Read of size 1 at addr ffff888102bea001 by task kunit_try_catch/248
[   12.922978] 
[   12.923102] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   12.923153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.923165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.923186] Call Trace:
[   12.923200]  <TASK>
[   12.923219]  dump_stack_lvl+0x73/0xb0
[   12.923252]  print_report+0xd1/0x650
[   12.923276]  ? __virt_addr_valid+0x1db/0x2d0
[   12.923299]  ? mempool_oob_right_helper+0x318/0x380
[   12.923344]  ? kasan_addr_to_slab+0x11/0xa0
[   12.923365]  ? mempool_oob_right_helper+0x318/0x380
[   12.923388]  kasan_report+0x141/0x180
[   12.923469]  ? mempool_oob_right_helper+0x318/0x380
[   12.923499]  __asan_report_load1_noabort+0x18/0x20
[   12.923524]  mempool_oob_right_helper+0x318/0x380
[   12.923573]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   12.923599]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.923624]  ? finish_task_switch.isra.0+0x153/0x700
[   12.923652]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   12.923675]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   12.923702]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.923726]  ? __pfx_mempool_kfree+0x10/0x10
[   12.923750]  ? __pfx_read_tsc+0x10/0x10
[   12.923772]  ? ktime_get_ts64+0x86/0x230
[   12.923797]  kunit_try_run_case+0x1a5/0x480
[   12.923822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.923844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.923866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.923889]  ? __kthread_parkme+0x82/0x180
[   12.923966]  ? preempt_count_sub+0x50/0x80
[   12.923989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.924012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.924035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.924057]  kthread+0x337/0x6f0
[   12.924076]  ? trace_preempt_on+0x20/0xc0
[   12.924101]  ? __pfx_kthread+0x10/0x10
[   12.924121]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.924162]  ? calculate_sigpending+0x7b/0xa0
[   12.924188]  ? __pfx_kthread+0x10/0x10
[   12.924209]  ret_from_fork+0x116/0x1d0
[   12.924228]  ? __pfx_kthread+0x10/0x10
[   12.924248]  ret_from_fork_asm+0x1a/0x30
[   12.924279]  </TASK>
[   12.924292] 
[   12.933122] The buggy address belongs to the physical page:
[   12.933464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be8
[   12.934032] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.934306] flags: 0x200000000000040(head|node=0|zone=2)
[   12.934575] page_type: f8(unknown)
[   12.934863] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.935187] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.935684] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.936019] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.936245] head: 0200000000000002 ffffea00040afa01 00000000ffffffff 00000000ffffffff
[   12.936800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.937193] page dumped because: kasan: bad access detected
[   12.937476] 
[   12.937699] Memory state around the buggy address:
[   12.937873]  ffff888102be9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.938252]  ffff888102be9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.938499] >ffff888102bea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.939068]                    ^
[   12.939276]  ffff888102bea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.939601]  ffff888102bea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.940033] ==================================================================