Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.572239] ==================================================================
[   33.572299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.572351] Read of size 1 at addr fff00000c907a2bb by task kunit_try_catch/256
[   33.572452] 
[   33.572550] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.572636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.572661] Hardware name: linux,dummy-virt (DT)
[   33.572807] Call trace:
[   33.572978]  show_stack+0x20/0x38 (C)
[   33.573212]  dump_stack_lvl+0x8c/0xd0
[   33.573268]  print_report+0x118/0x5e8
[   33.573407]  kasan_report+0xdc/0x128
[   33.573451]  __asan_report_load1_noabort+0x20/0x30
[   33.573504]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.573666]  mempool_slab_oob_right+0xc0/0x118
[   33.573963]  kunit_try_run_case+0x170/0x3f0
[   33.574068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.574131]  kthread+0x328/0x630
[   33.574175]  ret_from_fork+0x10/0x20
[   33.574220] 
[   33.574248] Allocated by task 256:
[   33.574278]  kasan_save_stack+0x3c/0x68
[   33.574315]  kasan_save_track+0x20/0x40
[   33.574425]  kasan_save_alloc_info+0x40/0x58
[   33.574528]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.574825]  remove_element+0x16c/0x1f8
[   33.574893]  mempool_alloc_preallocated+0x58/0xc0
[   33.574934]  mempool_oob_right_helper+0x98/0x2f0
[   33.574973]  mempool_slab_oob_right+0xc0/0x118
[   33.575013]  kunit_try_run_case+0x170/0x3f0
[   33.575049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.575102]  kthread+0x328/0x630
[   33.575144]  ret_from_fork+0x10/0x20
[   33.575180] 
[   33.575199] The buggy address belongs to the object at fff00000c907a240
[   33.575199]  which belongs to the cache test_cache of size 123
[   33.575531] The buggy address is located 0 bytes to the right of
[   33.575531]  allocated 123-byte region [fff00000c907a240, fff00000c907a2bb)
[   33.575706] 
[   33.575729] The buggy address belongs to the physical page:
[   33.575758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10907a
[   33.575852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.576098] page_type: f5(slab)
[   33.576136] raw: 0bfffe0000000000 fff00000c4743c80 dead000000000122 0000000000000000
[   33.576184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   33.576402] page dumped because: kasan: bad access detected
[   33.576439] 
[   33.576457] Memory state around the buggy address:
[   33.576589]  fff00000c907a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.576701]  fff00000c907a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.576758] >fff00000c907a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.576829]                                         ^
[   33.576878]  fff00000c907a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.576920]  fff00000c907a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.576975] ==================================================================
[   33.558504] ==================================================================
[   33.558595] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.558647] Read of size 1 at addr fff00000c9bb2001 by task kunit_try_catch/254
[   33.558696] 
[   33.558726] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.558896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.559006] Hardware name: linux,dummy-virt (DT)
[   33.559044] Call trace:
[   33.559148]  show_stack+0x20/0x38 (C)
[   33.559197]  dump_stack_lvl+0x8c/0xd0
[   33.559243]  print_report+0x118/0x5e8
[   33.559294]  kasan_report+0xdc/0x128
[   33.559338]  __asan_report_load1_noabort+0x20/0x30
[   33.559384]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.559551]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   33.559698]  kunit_try_run_case+0x170/0x3f0
[   33.559756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.559812]  kthread+0x328/0x630
[   33.559928]  ret_from_fork+0x10/0x20
[   33.559975] 
[   33.559995] The buggy address belongs to the physical page:
[   33.560027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb0
[   33.560089] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.560135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.560187] page_type: f8(unknown)
[   33.560225] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.560273] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.560321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.560368] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.560423] head: 0bfffe0000000002 ffffc1ffc326ec01 00000000ffffffff 00000000ffffffff
[   33.560634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.560686] page dumped because: kasan: bad access detected
[   33.560722] 
[   33.560786] Memory state around the buggy address:
[   33.560824]  fff00000c9bb1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.560921]  fff00000c9bb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.560970] >fff00000c9bb2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.561029]                    ^
[   33.561091]  fff00000c9bb2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.561134]  fff00000c9bb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.561173] ==================================================================
[   33.550149] ==================================================================
[   33.550226] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.550300] Read of size 1 at addr fff00000c3fed173 by task kunit_try_catch/252
[   33.550350] 
[   33.550391] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   33.550480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.550509] Hardware name: linux,dummy-virt (DT)
[   33.550542] Call trace:
[   33.550569]  show_stack+0x20/0x38 (C)
[   33.550618]  dump_stack_lvl+0x8c/0xd0
[   33.550670]  print_report+0x118/0x5e8
[   33.550712]  kasan_report+0xdc/0x128
[   33.550756]  __asan_report_load1_noabort+0x20/0x30
[   33.550803]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.550851]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.550899]  kunit_try_run_case+0x170/0x3f0
[   33.550948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.550997]  kthread+0x328/0x630
[   33.551042]  ret_from_fork+0x10/0x20
[   33.551117] 
[   33.551138] Allocated by task 252:
[   33.551167]  kasan_save_stack+0x3c/0x68
[   33.551208]  kasan_save_track+0x20/0x40
[   33.551242]  kasan_save_alloc_info+0x40/0x58
[   33.551280]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.551320]  remove_element+0x130/0x1f8
[   33.551360]  mempool_alloc_preallocated+0x58/0xc0
[   33.551400]  mempool_oob_right_helper+0x98/0x2f0
[   33.551441]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.551480]  kunit_try_run_case+0x170/0x3f0
[   33.551517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.551558]  kthread+0x328/0x630
[   33.551592]  ret_from_fork+0x10/0x20
[   33.551627] 
[   33.551646] The buggy address belongs to the object at fff00000c3fed100
[   33.551646]  which belongs to the cache kmalloc-128 of size 128
[   33.551704] The buggy address is located 0 bytes to the right of
[   33.551704]  allocated 115-byte region [fff00000c3fed100, fff00000c3fed173)
[   33.551790] 
[   33.551821] The buggy address belongs to the physical page:
[   33.551855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fed
[   33.551911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.551964] page_type: f5(slab)
[   33.552006] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.552056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.552110] page dumped because: kasan: bad access detected
[   33.552142] 
[   33.552171] Memory state around the buggy address:
[   33.552206]  fff00000c3fed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.552249]  fff00000c3fed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.552292] >fff00000c3fed100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.552330]                                                              ^
[   33.552370]  fff00000c3fed180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.552414]  fff00000c3fed200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.552450] ==================================================================


[   26.341750] ==================================================================
[   26.342322] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.342617] Read of size 1 at addr ffff8881053c52bb by task kunit_try_catch/273
[   26.342932] 
[   26.343042] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   26.343113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.343127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.343151] Call Trace:
[   26.343164]  <TASK>
[   26.343194]  dump_stack_lvl+0x73/0xb0
[   26.343402]  print_report+0xd1/0x640
[   26.343431]  ? __virt_addr_valid+0x1db/0x2d0
[   26.343457]  ? mempool_oob_right_helper+0x318/0x380
[   26.343481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.343506]  ? mempool_oob_right_helper+0x318/0x380
[   26.343551]  kasan_report+0x141/0x180
[   26.343575]  ? mempool_oob_right_helper+0x318/0x380
[   26.343603]  __asan_report_load1_noabort+0x18/0x20
[   26.343629]  mempool_oob_right_helper+0x318/0x380
[   26.343652]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.343679]  ? finish_task_switch.isra.0+0x153/0x700
[   26.343704]  mempool_slab_oob_right+0xed/0x140
[   26.343727]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   26.343752]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   26.343778]  ? __pfx_mempool_free_slab+0x10/0x10
[   26.343818]  ? __pfx_read_tsc+0x10/0x10
[   26.343989]  ? ktime_get_ts64+0x86/0x230
[   26.344015]  kunit_try_run_case+0x1a5/0x480
[   26.344060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.344081]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.344117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.344149]  ? __kthread_parkme+0x82/0x180
[   26.344170]  ? preempt_count_sub+0x50/0x80
[   26.344193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.344216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.344241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.344273]  kthread+0x337/0x6f0
[   26.344293]  ? trace_preempt_on+0x20/0xc0
[   26.344316]  ? __pfx_kthread+0x10/0x10
[   26.344336]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.344367]  ? calculate_sigpending+0x7b/0xa0
[   26.344393]  ? __pfx_kthread+0x10/0x10
[   26.344414]  ret_from_fork+0x116/0x1d0
[   26.344432]  ? __pfx_kthread+0x10/0x10
[   26.344452]  ret_from_fork_asm+0x1a/0x30
[   26.344483]  </TASK>
[   26.344494] 
[   26.352805] Allocated by task 273:
[   26.352940]  kasan_save_stack+0x45/0x70
[   26.353323]  kasan_save_track+0x18/0x40
[   26.353518]  kasan_save_alloc_info+0x3b/0x50
[   26.354040]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   26.354321]  remove_element+0x11e/0x190
[   26.354505]  mempool_alloc_preallocated+0x4d/0x90
[   26.354720]  mempool_oob_right_helper+0x8a/0x380
[   26.355003]  mempool_slab_oob_right+0xed/0x140
[   26.355217]  kunit_try_run_case+0x1a5/0x480
[   26.355421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.355644]  kthread+0x337/0x6f0
[   26.355755]  ret_from_fork+0x116/0x1d0
[   26.355929]  ret_from_fork_asm+0x1a/0x30
[   26.356110] 
[   26.356174] The buggy address belongs to the object at ffff8881053c5240
[   26.356174]  which belongs to the cache test_cache of size 123
[   26.356520] The buggy address is located 0 bytes to the right of
[   26.356520]  allocated 123-byte region [ffff8881053c5240, ffff8881053c52bb)
[   26.357498] 
[   26.357573] The buggy address belongs to the physical page:
[   26.357733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c5
[   26.357959] flags: 0x200000000000000(node=0|zone=2)
[   26.358111] page_type: f5(slab)
[   26.358231] raw: 0200000000000000 ffff888100a0b8c0 dead000000000122 0000000000000000
[   26.358582] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.358915] page dumped because: kasan: bad access detected
[   26.359161] 
[   26.359246] Memory state around the buggy address:
[   26.359547]  ffff8881053c5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.359882]  ffff8881053c5200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.360233] >ffff8881053c5280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.360439]                                         ^
[   26.360906]  ffff8881053c5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.361200]  ffff8881053c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.361484] ==================================================================
[   26.290184] ==================================================================
[   26.290663] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.290970] Read of size 1 at addr ffff8881053b7673 by task kunit_try_catch/269
[   26.291344] 
[   26.291455] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   26.291510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.291522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.291547] Call Trace:
[   26.291561]  <TASK>
[   26.291581]  dump_stack_lvl+0x73/0xb0
[   26.291619]  print_report+0xd1/0x640
[   26.291687]  ? __virt_addr_valid+0x1db/0x2d0
[   26.291715]  ? mempool_oob_right_helper+0x318/0x380
[   26.291764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.291791]  ? mempool_oob_right_helper+0x318/0x380
[   26.291814]  kasan_report+0x141/0x180
[   26.291853]  ? mempool_oob_right_helper+0x318/0x380
[   26.291881]  __asan_report_load1_noabort+0x18/0x20
[   26.291904]  mempool_oob_right_helper+0x318/0x380
[   26.291928]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.291952]  ? dequeue_entities+0x23f/0x1630
[   26.291978]  ? __kasan_check_write+0x18/0x20
[   26.292002]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.292023]  ? finish_task_switch.isra.0+0x153/0x700
[   26.292049]  mempool_kmalloc_oob_right+0xf2/0x150
[   26.292072]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   26.292134]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.292159]  ? __pfx_mempool_kfree+0x10/0x10
[   26.292185]  ? __pfx_read_tsc+0x10/0x10
[   26.292207]  ? ktime_get_ts64+0x86/0x230
[   26.292235]  kunit_try_run_case+0x1a5/0x480
[   26.292311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.292335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.292372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.292406]  ? __kthread_parkme+0x82/0x180
[   26.292428]  ? preempt_count_sub+0x50/0x80
[   26.292453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.292476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.292499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.292522]  kthread+0x337/0x6f0
[   26.292542]  ? trace_preempt_on+0x20/0xc0
[   26.292567]  ? __pfx_kthread+0x10/0x10
[   26.292588]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.292618]  ? calculate_sigpending+0x7b/0xa0
[   26.292643]  ? __pfx_kthread+0x10/0x10
[   26.292663]  ret_from_fork+0x116/0x1d0
[   26.292683]  ? __pfx_kthread+0x10/0x10
[   26.292703]  ret_from_fork_asm+0x1a/0x30
[   26.292737]  </TASK>
[   26.292749] 
[   26.304769] Allocated by task 269:
[   26.304934]  kasan_save_stack+0x45/0x70
[   26.305174]  kasan_save_track+0x18/0x40
[   26.305353]  kasan_save_alloc_info+0x3b/0x50
[   26.305502]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.305753]  remove_element+0x11e/0x190
[   26.306090]  mempool_alloc_preallocated+0x4d/0x90
[   26.306299]  mempool_oob_right_helper+0x8a/0x380
[   26.306502]  mempool_kmalloc_oob_right+0xf2/0x150
[   26.306660]  kunit_try_run_case+0x1a5/0x480
[   26.306799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.307038]  kthread+0x337/0x6f0
[   26.307258]  ret_from_fork+0x116/0x1d0
[   26.307455]  ret_from_fork_asm+0x1a/0x30
[   26.307644] 
[   26.307720] The buggy address belongs to the object at ffff8881053b7600
[   26.307720]  which belongs to the cache kmalloc-128 of size 128
[   26.308174] The buggy address is located 0 bytes to the right of
[   26.308174]  allocated 115-byte region [ffff8881053b7600, ffff8881053b7673)
[   26.308650] 
[   26.308746] The buggy address belongs to the physical page:
[   26.308992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7
[   26.309375] flags: 0x200000000000000(node=0|zone=2)
[   26.309541] page_type: f5(slab)
[   26.309661] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.309926] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.310419] page dumped because: kasan: bad access detected
[   26.310589] 
[   26.310658] Memory state around the buggy address:
[   26.310808]  ffff8881053b7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.311536]  ffff8881053b7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.311834] >ffff8881053b7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.312110]                                                              ^
[   26.312366]  ffff8881053b7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.312634]  ffff8881053b7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.312886] ==================================================================
[   26.318551] ==================================================================
[   26.319268] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   26.319662] Read of size 1 at addr ffff888106252001 by task kunit_try_catch/271
[   26.320151] 
[   26.320313] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   26.320412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.320426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.320450] Call Trace:
[   26.320512]  <TASK>
[   26.320535]  dump_stack_lvl+0x73/0xb0
[   26.320585]  print_report+0xd1/0x640
[   26.320609]  ? __virt_addr_valid+0x1db/0x2d0
[   26.320635]  ? mempool_oob_right_helper+0x318/0x380
[   26.320657]  ? kasan_addr_to_slab+0x11/0xa0
[   26.320677]  ? mempool_oob_right_helper+0x318/0x380
[   26.320699]  kasan_report+0x141/0x180
[   26.320720]  ? mempool_oob_right_helper+0x318/0x380
[   26.320794]  __asan_report_load1_noabort+0x18/0x20
[   26.320819]  mempool_oob_right_helper+0x318/0x380
[   26.320854]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.320983]  ? dequeue_entities+0x23f/0x1630
[   26.321011]  ? __kasan_check_write+0x18/0x20
[   26.321035]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.321056]  ? finish_task_switch.isra.0+0x153/0x700
[   26.321081]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   26.321105]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   26.321131]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.321155]  ? __pfx_mempool_kfree+0x10/0x10
[   26.321179]  ? __pfx_read_tsc+0x10/0x10
[   26.321201]  ? ktime_get_ts64+0x86/0x230
[   26.321226]  kunit_try_run_case+0x1a5/0x480
[   26.321265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.321288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.321312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.321335]  ? __kthread_parkme+0x82/0x180
[   26.321355]  ? preempt_count_sub+0x50/0x80
[   26.321377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.321399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.321422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.321444]  kthread+0x337/0x6f0
[   26.321463]  ? trace_preempt_on+0x20/0xc0
[   26.321486]  ? __pfx_kthread+0x10/0x10
[   26.321508]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.321529]  ? calculate_sigpending+0x7b/0xa0
[   26.321553]  ? __pfx_kthread+0x10/0x10
[   26.321574]  ret_from_fork+0x116/0x1d0
[   26.321592]  ? __pfx_kthread+0x10/0x10
[   26.321612]  ret_from_fork_asm+0x1a/0x30
[   26.321643]  </TASK>
[   26.321655] 
[   26.330496] The buggy address belongs to the physical page:
[   26.330765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106250
[   26.331094] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.331503] flags: 0x200000000000040(head|node=0|zone=2)
[   26.331689] page_type: f8(unknown)
[   26.331932] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.332311] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.332620] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.332937] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.333291] head: 0200000000000002 ffffea0004189401 00000000ffffffff 00000000ffffffff
[   26.333592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.334041] page dumped because: kasan: bad access detected
[   26.334272] 
[   26.334384] Memory state around the buggy address:
[   26.334594]  ffff888106251f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.334813]  ffff888106251f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.335023] >ffff888106252000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.335567]                    ^
[   26.335993]  ffff888106252080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.336220]  ffff888106252100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.336438] ==================================================================