Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.309326] ==================================================================
[   31.309398] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.309476] Read of size 1 at addr fff00000c7d40273 by task kunit_try_catch/253
[   31.309529] 
[   31.309574] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.309668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.309696] Hardware name: linux,dummy-virt (DT)
[   31.309731] Call trace:
[   31.309758]  show_stack+0x20/0x38 (C)
[   31.309812]  dump_stack_lvl+0x8c/0xd0
[   31.309864]  print_report+0x118/0x5d0
[   31.310527]  kasan_report+0xdc/0x128
[   31.310700]  __asan_report_load1_noabort+0x20/0x30
[   31.310754]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.310807]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.311050]  kunit_try_run_case+0x170/0x3f0
[   31.311130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.311292]  kthread+0x328/0x630
[   31.311336]  ret_from_fork+0x10/0x20
[   31.311388] 
[   31.311408] Allocated by task 253:
[   31.311439]  kasan_save_stack+0x3c/0x68
[   31.311481]  kasan_save_track+0x20/0x40
[   31.311520]  kasan_save_alloc_info+0x40/0x58
[   31.311923]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.311970]  remove_element+0x130/0x1f8
[   31.312126]  mempool_alloc_preallocated+0x58/0xc0
[   31.312331]  mempool_oob_right_helper+0x98/0x2f0
[   31.312379]  mempool_kmalloc_oob_right+0xc4/0x120
[   31.312420]  kunit_try_run_case+0x170/0x3f0
[   31.312498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.312601]  kthread+0x328/0x630
[   31.312674]  ret_from_fork+0x10/0x20
[   31.312783] 
[   31.312804] The buggy address belongs to the object at fff00000c7d40200
[   31.312804]  which belongs to the cache kmalloc-128 of size 128
[   31.312909] The buggy address is located 0 bytes to the right of
[   31.312909]  allocated 115-byte region [fff00000c7d40200, fff00000c7d40273)
[   31.313048] 
[   31.313084] The buggy address belongs to the physical page:
[   31.313184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107d40
[   31.313296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.313447] page_type: f5(slab)
[   31.313534] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.313651] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.313701] page dumped because: kasan: bad access detected
[   31.313834] 
[   31.313873] Memory state around the buggy address:
[   31.313929]  fff00000c7d40100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.314027]  fff00000c7d40180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.314079] >fff00000c7d40200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.314118]                                                              ^
[   31.314159]  fff00000c7d40280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.314202]  fff00000c7d40300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.314241] ==================================================================
[   31.341358] ==================================================================
[   31.341605] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.342122] Read of size 1 at addr fff00000c7d542bb by task kunit_try_catch/257
[   31.342340] 
[   31.342386] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.342496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.342522] Hardware name: linux,dummy-virt (DT)
[   31.342554] Call trace:
[   31.342882]  show_stack+0x20/0x38 (C)
[   31.343177]  dump_stack_lvl+0x8c/0xd0
[   31.343240]  print_report+0x118/0x5d0
[   31.343322]  kasan_report+0xdc/0x128
[   31.343364]  __asan_report_load1_noabort+0x20/0x30
[   31.343414]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.343463]  mempool_slab_oob_right+0xc0/0x118
[   31.343817]  kunit_try_run_case+0x170/0x3f0
[   31.343872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.343927]  kthread+0x328/0x630
[   31.344224]  ret_from_fork+0x10/0x20
[   31.344283] 
[   31.344323] Allocated by task 257:
[   31.344354]  kasan_save_stack+0x3c/0x68
[   31.344399]  kasan_save_track+0x20/0x40
[   31.344437]  kasan_save_alloc_info+0x40/0x58
[   31.344691]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.345227]  remove_element+0x16c/0x1f8
[   31.345413]  mempool_alloc_preallocated+0x58/0xc0
[   31.345683]  mempool_oob_right_helper+0x98/0x2f0
[   31.345759]  mempool_slab_oob_right+0xc0/0x118
[   31.345801]  kunit_try_run_case+0x170/0x3f0
[   31.345850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.345982]  kthread+0x328/0x630
[   31.346016]  ret_from_fork+0x10/0x20
[   31.346064] 
[   31.346084] The buggy address belongs to the object at fff00000c7d54240
[   31.346084]  which belongs to the cache test_cache of size 123
[   31.346490] The buggy address is located 0 bytes to the right of
[   31.346490]  allocated 123-byte region [fff00000c7d54240, fff00000c7d542bb)
[   31.346597] 
[   31.346682] The buggy address belongs to the physical page:
[   31.346749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107d54
[   31.346800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.346894] page_type: f5(slab)
[   31.347031] raw: 0bfffe0000000000 fff00000c3f543c0 dead000000000122 0000000000000000
[   31.347334] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.347426] page dumped because: kasan: bad access detected
[   31.347459] 
[   31.347477] Memory state around the buggy address:
[   31.347511]  fff00000c7d54180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.347557]  fff00000c7d54200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   31.347603] >fff00000c7d54280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   31.347648]                                         ^
[   31.348188]  fff00000c7d54300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.348615]  fff00000c7d54380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.349123] ==================================================================
[   31.325877] ==================================================================
[   31.325942] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   31.326002] Read of size 1 at addr fff00000c9ace001 by task kunit_try_catch/255
[   31.326340] 
[   31.326386] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.326478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.326505] Hardware name: linux,dummy-virt (DT)
[   31.326537] Call trace:
[   31.326791]  show_stack+0x20/0x38 (C)
[   31.327143]  dump_stack_lvl+0x8c/0xd0
[   31.327414]  print_report+0x118/0x5d0
[   31.327791]  kasan_report+0xdc/0x128
[   31.327843]  __asan_report_load1_noabort+0x20/0x30
[   31.327894]  mempool_oob_right_helper+0x2ac/0x2f0
[   31.327943]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   31.327995]  kunit_try_run_case+0x170/0x3f0
[   31.328048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.328113]  kthread+0x328/0x630
[   31.328155]  ret_from_fork+0x10/0x20
[   31.328202] 
[   31.328225] The buggy address belongs to the physical page:
[   31.328258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acc
[   31.328309] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.328355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.328409] page_type: f8(unknown)
[   31.328449] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.328500] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.328550] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.328598] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.328648] head: 0bfffe0000000002 ffffc1ffc326b301 00000000ffffffff 00000000ffffffff
[   31.328697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.328738] page dumped because: kasan: bad access detected
[   31.328770] 
[   31.328788] Memory state around the buggy address:
[   31.328819]  fff00000c9acdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.328860]  fff00000c9acdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.328903] >fff00000c9ace000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.328943]                    ^
[   31.328971]  fff00000c9ace080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.329013]  fff00000c9ace100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.329059] ==================================================================

[   25.516384] ==================================================================
[   25.516834] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   25.517222] Read of size 1 at addr ffff8881060ac173 by task kunit_try_catch/271
[   25.517564] 
[   25.517661] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.517732] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.517746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.517770] Call Trace:
[   25.517798]  <TASK>
[   25.517889]  dump_stack_lvl+0x73/0xb0
[   25.517938]  print_report+0xd1/0x610
[   25.517996]  ? __virt_addr_valid+0x1db/0x2d0
[   25.518069]  ? mempool_oob_right_helper+0x318/0x380
[   25.518093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.518120]  ? mempool_oob_right_helper+0x318/0x380
[   25.518143]  kasan_report+0x141/0x180
[   25.518167]  ? mempool_oob_right_helper+0x318/0x380
[   25.518194]  __asan_report_load1_noabort+0x18/0x20
[   25.518219]  mempool_oob_right_helper+0x318/0x380
[   25.518242]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   25.518267]  ? __kasan_check_write+0x18/0x20
[   25.518290]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.518314]  ? finish_task_switch.isra.0+0x153/0x700
[   25.518340]  mempool_kmalloc_oob_right+0xf2/0x150
[   25.518364]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   25.518389]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.518415]  ? __pfx_mempool_kfree+0x10/0x10
[   25.518439]  ? __pfx_read_tsc+0x10/0x10
[   25.518462]  ? ktime_get_ts64+0x86/0x230
[   25.518488]  kunit_try_run_case+0x1a5/0x480
[   25.518512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.518533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.518558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.518583]  ? __kthread_parkme+0x82/0x180
[   25.518604]  ? preempt_count_sub+0x50/0x80
[   25.518628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.518650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.518675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.518711]  kthread+0x337/0x6f0
[   25.518730]  ? trace_preempt_on+0x20/0xc0
[   25.518755]  ? __pfx_kthread+0x10/0x10
[   25.518784]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.518806]  ? calculate_sigpending+0x7b/0xa0
[   25.518831]  ? __pfx_kthread+0x10/0x10
[   25.518853]  ret_from_fork+0x116/0x1d0
[   25.518874]  ? __pfx_kthread+0x10/0x10
[   25.518912]  ret_from_fork_asm+0x1a/0x30
[   25.518945]  </TASK>
[   25.518957] 
[   25.529400] Allocated by task 271:
[   25.529580]  kasan_save_stack+0x45/0x70
[   25.530041]  kasan_save_track+0x18/0x40
[   25.530246]  kasan_save_alloc_info+0x3b/0x50
[   25.530427]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.530650]  remove_element+0x11e/0x190
[   25.531157]  mempool_alloc_preallocated+0x4d/0x90
[   25.531464]  mempool_oob_right_helper+0x8a/0x380
[   25.531630]  mempool_kmalloc_oob_right+0xf2/0x150
[   25.531939]  kunit_try_run_case+0x1a5/0x480
[   25.532216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.532456]  kthread+0x337/0x6f0
[   25.532618]  ret_from_fork+0x116/0x1d0
[   25.532816]  ret_from_fork_asm+0x1a/0x30
[   25.532973] 
[   25.533041] The buggy address belongs to the object at ffff8881060ac100
[   25.533041]  which belongs to the cache kmalloc-128 of size 128
[   25.533849] The buggy address is located 0 bytes to the right of
[   25.533849]  allocated 115-byte region [ffff8881060ac100, ffff8881060ac173)
[   25.534977] 
[   25.535269] The buggy address belongs to the physical page:
[   25.535651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ac
[   25.536057] flags: 0x200000000000000(node=0|zone=2)
[   25.536304] page_type: f5(slab)
[   25.536545] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.536881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.537264] page dumped because: kasan: bad access detected
[   25.537512] 
[   25.537604] Memory state around the buggy address:
[   25.537813]  ffff8881060ac000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.538100]  ffff8881060ac080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.538508] >ffff8881060ac100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.538941]                                                              ^
[   25.539186]  ffff8881060ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.539500]  ffff8881060ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   25.539925] ==================================================================
[   25.568774] ==================================================================
[   25.569558] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   25.569853] Read of size 1 at addr ffff8881060af2bb by task kunit_try_catch/275
[   25.570937] 
[   25.571185] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.571245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.571260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.571283] Call Trace:
[   25.571298]  <TASK>
[   25.571318]  dump_stack_lvl+0x73/0xb0
[   25.571355]  print_report+0xd1/0x610
[   25.571380]  ? __virt_addr_valid+0x1db/0x2d0
[   25.571407]  ? mempool_oob_right_helper+0x318/0x380
[   25.571430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.571457]  ? mempool_oob_right_helper+0x318/0x380
[   25.571480]  kasan_report+0x141/0x180
[   25.571502]  ? mempool_oob_right_helper+0x318/0x380
[   25.571530]  __asan_report_load1_noabort+0x18/0x20
[   25.571553]  mempool_oob_right_helper+0x318/0x380
[   25.571577]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   25.571603]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.571626]  ? finish_task_switch.isra.0+0x153/0x700
[   25.571651]  mempool_slab_oob_right+0xed/0x140
[   25.571675]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   25.571715]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   25.571739]  ? __pfx_mempool_free_slab+0x10/0x10
[   25.571765]  ? __pfx_read_tsc+0x10/0x10
[   25.571805]  ? ktime_get_ts64+0x86/0x230
[   25.571835]  kunit_try_run_case+0x1a5/0x480
[   25.571860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.571953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.571986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.572011]  ? __kthread_parkme+0x82/0x180
[   25.572032]  ? preempt_count_sub+0x50/0x80
[   25.572055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.572077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.572103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.572128]  kthread+0x337/0x6f0
[   25.572148]  ? trace_preempt_on+0x20/0xc0
[   25.572172]  ? __pfx_kthread+0x10/0x10
[   25.572193]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.572215]  ? calculate_sigpending+0x7b/0xa0
[   25.572240]  ? __pfx_kthread+0x10/0x10
[   25.572261]  ret_from_fork+0x116/0x1d0
[   25.572280]  ? __pfx_kthread+0x10/0x10
[   25.572301]  ret_from_fork_asm+0x1a/0x30
[   25.572333]  </TASK>
[   25.572345] 
[   25.581824] Allocated by task 275:
[   25.581948]  kasan_save_stack+0x45/0x70
[   25.582221]  kasan_save_track+0x18/0x40
[   25.583149]  kasan_save_alloc_info+0x3b/0x50
[   25.583326]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   25.583749]  remove_element+0x11e/0x190
[   25.584175]  mempool_alloc_preallocated+0x4d/0x90
[   25.584517]  mempool_oob_right_helper+0x8a/0x380
[   25.584678]  mempool_slab_oob_right+0xed/0x140
[   25.585146]  kunit_try_run_case+0x1a5/0x480
[   25.585677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.586326]  kthread+0x337/0x6f0
[   25.586744]  ret_from_fork+0x116/0x1d0
[   25.587277]  ret_from_fork_asm+0x1a/0x30
[   25.587428] 
[   25.587498] The buggy address belongs to the object at ffff8881060af240
[   25.587498]  which belongs to the cache test_cache of size 123
[   25.587875] The buggy address is located 0 bytes to the right of
[   25.587875]  allocated 123-byte region [ffff8881060af240, ffff8881060af2bb)
[   25.589009] 
[   25.589111] The buggy address belongs to the physical page:
[   25.589342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060af
[   25.589681] flags: 0x200000000000000(node=0|zone=2)
[   25.590186] page_type: f5(slab)
[   25.590350] raw: 0200000000000000 ffff8881017adc80 dead000000000122 0000000000000000
[   25.590867] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   25.591238] page dumped because: kasan: bad access detected
[   25.591430] 
[   25.591595] Memory state around the buggy address:
[   25.592130]  ffff8881060af180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.592436]  ffff8881060af200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   25.592744] >ffff8881060af280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   25.593208]                                         ^
[   25.593517]  ffff8881060af300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.593778]  ffff8881060af380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.594334] ==================================================================
[   25.543571] ==================================================================
[   25.544178] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   25.544703] Read of size 1 at addr ffff888106232001 by task kunit_try_catch/273
[   25.545105] 
[   25.545202] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.545292] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.545307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.545341] Call Trace:
[   25.545355]  <TASK>
[   25.545376]  dump_stack_lvl+0x73/0xb0
[   25.545438]  print_report+0xd1/0x610
[   25.545461]  ? __virt_addr_valid+0x1db/0x2d0
[   25.545498]  ? mempool_oob_right_helper+0x318/0x380
[   25.545520]  ? kasan_addr_to_slab+0x11/0xa0
[   25.545540]  ? mempool_oob_right_helper+0x318/0x380
[   25.545564]  kasan_report+0x141/0x180
[   25.545613]  ? mempool_oob_right_helper+0x318/0x380
[   25.545658]  __asan_report_load1_noabort+0x18/0x20
[   25.545700]  mempool_oob_right_helper+0x318/0x380
[   25.545725]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   25.545748]  ? update_load_avg+0x1be/0x21b0
[   25.545774]  ? dequeue_entities+0x27e/0x1740
[   25.545800]  ? finish_task_switch.isra.0+0x153/0x700
[   25.545842]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   25.545866]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   25.545936]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.545963]  ? __pfx_mempool_kfree+0x10/0x10
[   25.545988]  ? __pfx_read_tsc+0x10/0x10
[   25.546011]  ? ktime_get_ts64+0x86/0x230
[   25.546037]  kunit_try_run_case+0x1a5/0x480
[   25.546061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.546082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.546108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.546131]  ? __kthread_parkme+0x82/0x180
[   25.546153]  ? preempt_count_sub+0x50/0x80
[   25.546176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.546197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.546222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.546247]  kthread+0x337/0x6f0
[   25.546266]  ? trace_preempt_on+0x20/0xc0
[   25.546290]  ? __pfx_kthread+0x10/0x10
[   25.546311]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.546332]  ? calculate_sigpending+0x7b/0xa0
[   25.546357]  ? __pfx_kthread+0x10/0x10
[   25.546379]  ret_from_fork+0x116/0x1d0
[   25.546397]  ? __pfx_kthread+0x10/0x10
[   25.546418]  ret_from_fork_asm+0x1a/0x30
[   25.546450]  </TASK>
[   25.546462] 
[   25.556656] The buggy address belongs to the physical page:
[   25.557067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106230
[   25.557475] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.557722] flags: 0x200000000000040(head|node=0|zone=2)
[   25.558358] page_type: f8(unknown)
[   25.558618] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.559138] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.559447] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.559840] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.560165] head: 0200000000000002 ffffea0004188c01 00000000ffffffff 00000000ffffffff
[   25.560496] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.560905] page dumped because: kasan: bad access detected
[   25.561111] 
[   25.561202] Memory state around the buggy address:
[   25.561431]  ffff888106231f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.561767]  ffff888106231f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.562127] >ffff888106232000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.562452]                    ^
[   25.562638]  ffff888106232080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.562991]  ffff888106232100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.563322] ==================================================================