Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   62.782592] ==================================================================
[   62.793579] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   62.801208] Read of size 1 at addr cc22d373 by task kunit_try_catch/277
[   62.807891] 
[   62.809387] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   62.809448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   62.809448] Hardware name: Generic DRA74X (Flattened Device Tree)
[   62.809448] Call trace: 
[   62.809478]  unwind_backtrace from show_stack+0x18/0x1c
[   62.809509]  show_stack from dump_stack_lvl+0x70/0x90
[   62.809539]  dump_stack_lvl from print_report+0x158/0x528
[   62.809570]  print_report from kasan_report+0xdc/0x118
[   62.809600]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   62.809631]  mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108
[   62.809661]  mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   62.809692]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.809722]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   62.809783]  kthread from ret_from_fork+0x14/0x20
[   62.809814] Exception stack(0xf25b3fb0 to 0xf25b3ff8)
[   62.809814] 3fa0:                                     00000000 00000000 00000000 00000000
[   62.809844] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   62.809875] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   62.809875] 
[   62.923431] Allocated by task 277:
[   62.926849]  kasan_save_track+0x30/0x5c
[   62.930725]  remove_element+0x180/0x264
[   62.934600]  mempool_alloc_preallocated+0x60/0x9c
[   62.939331]  mempool_oob_right_helper+0x94/0x334
[   62.944000]  mempool_kmalloc_oob_right+0xbc/0x108
[   62.948730]  kunit_try_run_case+0x22c/0x5a8
[   62.952941]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.958465]  kthread+0x464/0x810
[   62.961730]  ret_from_fork+0x14/0x20
[   62.965332] 
[   62.966827] The buggy address belongs to the object at cc22d300
[   62.966827]  which belongs to the cache kmalloc-128 of size 128
[   62.978729] The buggy address is located 0 bytes to the right of
[   62.978729]  allocated 115-byte region [cc22d300, cc22d373)
[   62.990386] 
[   62.991882] The buggy address belongs to the physical page:
[   62.997497] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d
[   63.004760] flags: 0x0(zone=0)
[   63.007843] page_type: f5(slab)
[   63.011016] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   63.019165] raw: 00000000
[   63.021820] page dumped because: kasan: bad access detected
[   63.027404] 
[   63.028900] Memory state around the buggy address:
[   63.033752]  cc22d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.040313]  cc22d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.046874] >cc22d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   63.053466]                                                      ^
[   63.059661]  cc22d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.066253]  cc22d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   63.072814] ==================================================================
[   63.081176] ==================================================================
[   63.092987] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   63.100616] Read of size 1 at addr ccc0e001 by task kunit_try_catch/279
[   63.107299] 
[   63.108795] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   63.108825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.108825] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.108856] Call trace: 
[   63.108856]  unwind_backtrace from show_stack+0x18/0x1c
[   63.108886]  show_stack from dump_stack_lvl+0x70/0x90
[   63.108917]  dump_stack_lvl from print_report+0x158/0x528
[   63.108917]  print_report from kasan_report+0xdc/0x118
[   63.108947]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   63.108978]  mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108
[   63.109008]  mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8
[   63.109039]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.109069]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.109069]  kthread from ret_from_fork+0x14/0x20
[   63.109100] Exception stack(0xf25bbfb0 to 0xf25bbff8)
[   63.109130] bfa0:                                     00000000 00000000 00000000 00000000
[   63.109130] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.109161] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.109161] 
[   63.223724] The buggy address belongs to the physical page:
[   63.229339] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c
[   63.236602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.244323] flags: 0x40(head|zone=0)
[   63.247924] page_type: f8(unknown)
[   63.251373] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   63.259521] raw: 00000000
[   63.262145] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   63.270385] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   63.278625] head: 00000000 00000004
[   63.282135] page dumped because: kasan: bad access detected
[   63.287750] 
[   63.289245] Memory state around the buggy address:
[   63.294067]  ccc0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.300628]  ccc0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.307220] >ccc0e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.313781]            ^
[   63.316345]  ccc0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.322906]  ccc0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.329467] ==================================================================
[   63.338226] ==================================================================
[   63.350585] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   63.358215] Read of size 1 at addr cc2382bb by task kunit_try_catch/281
[   63.364868] 
[   63.366363] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   63.366394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.366424] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.366424] Call trace: 
[   63.366424]  unwind_backtrace from show_stack+0x18/0x1c
[   63.366455]  show_stack from dump_stack_lvl+0x70/0x90
[   63.366485]  dump_stack_lvl from print_report+0x158/0x528
[   63.366516]  print_report from kasan_report+0xdc/0x118
[   63.366516]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   63.366546]  mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100
[   63.366577]  mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8
[   63.366607]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.366638]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.366668]  kthread from ret_from_fork+0x14/0x20
[   63.366668] Exception stack(0xf25c3fb0 to 0xf25c3ff8)
[   63.366699] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.366699] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.366729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.366729] 
[   63.479736] Allocated by task 281:
[   63.483154]  kasan_save_track+0x30/0x5c
[   63.487030]  __kasan_mempool_unpoison_object+0xec/0x14c
[   63.492309]  remove_element+0x1d4/0x264
[   63.496154]  mempool_alloc_preallocated+0x60/0x9c
[   63.500915]  mempool_oob_right_helper+0x94/0x334
[   63.505554]  mempool_slab_oob_right+0xb8/0x100
[   63.510040]  kunit_try_run_case+0x22c/0x5a8
[   63.514251]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.519805]  kthread+0x464/0x810
[   63.523040]  ret_from_fork+0x14/0x20
[   63.526672] 
[   63.528167] The buggy address belongs to the object at cc238240
[   63.528167]  which belongs to the cache test_cache of size 123
[   63.539978] The buggy address is located 0 bytes to the right of
[   63.539978]  allocated 123-byte region [cc238240, cc2382bb)
[   63.551605] 
[   63.553100] The buggy address belongs to the physical page:
[   63.558715] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c238
[   63.566009] flags: 0x0(zone=0)
[   63.569061] page_type: f5(slab)
[   63.572235] raw: 00000000 cc22f700 00000122 00000000 00000000 80150015 f5000000 00000000
[   63.580383] raw: 00000000
[   63.583038] page dumped because: kasan: bad access detected
[   63.588623] 
[   63.590148] Memory state around the buggy address:
[   63.594970]  cc238180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.601531]  cc238200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   63.608093] >cc238280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   63.614685]                                 ^
[   63.619049]  cc238300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.625640]  cc238380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.632202] ==================================================================

[   36.196168] ==================================================================
[   36.208439] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   36.216013] Read of size 1 at addr ffff8881080522bb by task kunit_try_catch/268
[   36.223327] 
[   36.224829] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   36.224837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.224840] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.224843] Call Trace:
[   36.224845]  <TASK>
[   36.224847]  dump_stack_lvl+0x73/0xb0
[   36.224851]  print_report+0xd1/0x650
[   36.224855]  ? __virt_addr_valid+0x1db/0x2d0
[   36.224859]  ? mempool_oob_right_helper+0x318/0x380
[   36.224863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.224868]  ? mempool_oob_right_helper+0x318/0x380
[   36.224872]  kasan_report+0x141/0x180
[   36.224876]  ? mempool_oob_right_helper+0x318/0x380
[   36.224882]  __asan_report_load1_noabort+0x18/0x20
[   36.224886]  mempool_oob_right_helper+0x318/0x380
[   36.224890]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   36.224896]  ? finish_task_switch.isra.0+0x153/0x700
[   36.224901]  mempool_slab_oob_right+0xed/0x140
[   36.224904]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   36.224908]  ? dequeue_task_fair+0x166/0x4e0
[   36.224912]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   36.224916]  ? __pfx_mempool_free_slab+0x10/0x10
[   36.224920]  ? ktime_get_ts64+0x83/0x230
[   36.224925]  kunit_try_run_case+0x1a2/0x480
[   36.224929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.224933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.224938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.224942]  ? __kthread_parkme+0x82/0x180
[   36.224947]  ? preempt_count_sub+0x50/0x80
[   36.224951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.224955]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.224959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.224964]  kthread+0x334/0x6f0
[   36.224968]  ? trace_preempt_on+0x20/0xc0
[   36.224972]  ? __pfx_kthread+0x10/0x10
[   36.224976]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.224980]  ? calculate_sigpending+0x7b/0xa0
[   36.224984]  ? __pfx_kthread+0x10/0x10
[   36.224988]  ret_from_fork+0x3e/0x80
[   36.224992]  ? __pfx_kthread+0x10/0x10
[   36.224997]  ret_from_fork_asm+0x1a/0x30
[   36.225002]  </TASK>
[   36.225004] 
[   36.414991] Allocated by task 268:
[   36.418396]  kasan_save_stack+0x45/0x70
[   36.422235]  kasan_save_track+0x18/0x40
[   36.426074]  kasan_save_alloc_info+0x3b/0x50
[   36.430346]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   36.435659]  remove_element+0x11e/0x190
[   36.439532]  mempool_alloc_preallocated+0x4d/0x90
[   36.444240]  mempool_oob_right_helper+0x8a/0x380
[   36.448867]  mempool_slab_oob_right+0xed/0x140
[   36.453312]  kunit_try_run_case+0x1a2/0x480
[   36.457497]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.462899]  kthread+0x334/0x6f0
[   36.466140]  ret_from_fork+0x3e/0x80
[   36.469762]  ret_from_fork_asm+0x1a/0x30
[   36.473702] 
[   36.475247] The buggy address belongs to the object at ffff888108052240
[   36.475247]  which belongs to the cache test_cache of size 123
[   36.487702] The buggy address is located 0 bytes to the right of
[   36.487702]  allocated 123-byte region [ffff888108052240, ffff8881080522bb)
[   36.500703] 
[   36.502251] The buggy address belongs to the physical page:
[   36.507824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108052
[   36.515832] flags: 0x200000000000000(node=0|zone=2)
[   36.520721] page_type: f5(slab)
[   36.523902] raw: 0200000000000000 ffff888100ac7680 dead000000000122 0000000000000000
[   36.531649] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.539420] page dumped because: kasan: bad access detected
[   36.544993] 
[   36.546492] Memory state around the buggy address:
[   36.551286]  ffff888108052180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.558513]  ffff888108052200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.565764] >ffff888108052280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.572986]                                         ^
[   36.578039]  ffff888108052300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.585256]  ffff888108052380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.592475] ==================================================================
[   35.429176] ==================================================================
[   35.440080] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   35.447687] Read of size 1 at addr ffff888104ee9573 by task kunit_try_catch/264
[   35.455020] 
[   35.456521] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   35.456530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.456533] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   35.456537] Call Trace:
[   35.456538]  <TASK>
[   35.456541]  dump_stack_lvl+0x73/0xb0
[   35.456545]  print_report+0xd1/0x650
[   35.456550]  ? __virt_addr_valid+0x1db/0x2d0
[   35.456554]  ? mempool_oob_right_helper+0x318/0x380
[   35.456559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.456563]  ? mempool_oob_right_helper+0x318/0x380
[   35.456568]  kasan_report+0x141/0x180
[   35.456572]  ? mempool_oob_right_helper+0x318/0x380
[   35.456578]  __asan_report_load1_noabort+0x18/0x20
[   35.456581]  mempool_oob_right_helper+0x318/0x380
[   35.456586]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   35.456591]  ? dequeue_entities+0xa24/0x1790
[   35.456596]  ? finish_task_switch.isra.0+0x153/0x700
[   35.456601]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.456606]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   35.456611]  ? dequeue_task_fair+0x166/0x4e0
[   35.456615]  ? __pfx_mempool_kmalloc+0x10/0x10
[   35.456619]  ? __pfx_mempool_kfree+0x10/0x10
[   35.456623]  ? ktime_get_ts64+0x83/0x230
[   35.456628]  kunit_try_run_case+0x1a2/0x480
[   35.456633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.456637]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   35.456642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.456647]  ? __kthread_parkme+0x82/0x180
[   35.456651]  ? preempt_count_sub+0x50/0x80
[   35.456656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.456675]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.456679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.456684]  kthread+0x334/0x6f0
[   35.456688]  ? trace_preempt_on+0x20/0xc0
[   35.456705]  ? __pfx_kthread+0x10/0x10
[   35.456710]  ? _raw_spin_unlock_irq+0x47/0x80
[   35.456714]  ? calculate_sigpending+0x7b/0xa0
[   35.456718]  ? __pfx_kthread+0x10/0x10
[   35.456722]  ret_from_fork+0x3e/0x80
[   35.456727]  ? __pfx_kthread+0x10/0x10
[   35.456731]  ret_from_fork_asm+0x1a/0x30
[   35.456738]  </TASK>
[   35.456739] 
[   35.650938] Allocated by task 264:
[   35.654342]  kasan_save_stack+0x45/0x70
[   35.658183]  kasan_save_track+0x18/0x40
[   35.662020]  kasan_save_alloc_info+0x3b/0x50
[   35.666294]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   35.671605]  remove_element+0x11e/0x190
[   35.675444]  mempool_alloc_preallocated+0x4d/0x90
[   35.680153]  mempool_oob_right_helper+0x8a/0x380
[   35.684779]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.689486]  kunit_try_run_case+0x1a2/0x480
[   35.693687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.699089]  kthread+0x334/0x6f0
[   35.702328]  ret_from_fork+0x3e/0x80
[   35.705908]  ret_from_fork_asm+0x1a/0x30
[   35.709833] 
[   35.711334] The buggy address belongs to the object at ffff888104ee9500
[   35.711334]  which belongs to the cache kmalloc-128 of size 128
[   35.723848] The buggy address is located 0 bytes to the right of
[   35.723848]  allocated 115-byte region [ffff888104ee9500, ffff888104ee9573)
[   35.736795] 
[   35.738293] The buggy address belongs to the physical page:
[   35.743865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   35.751873] flags: 0x200000000000000(node=0|zone=2)
[   35.756752] page_type: f5(slab)
[   35.759899] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   35.767639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.775384] page dumped because: kasan: bad access detected
[   35.780958] 
[   35.782457] Memory state around the buggy address:
[   35.787250]  ffff888104ee9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.794467]  ffff888104ee9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.801688] >ffff888104ee9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.808932]                                                              ^
[   35.815806]  ffff888104ee9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.823031]  ffff888104ee9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.830252] ==================================================================
[   35.838032] ==================================================================
[   35.849784] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   35.857358] Read of size 1 at addr ffff888105ec2001 by task kunit_try_catch/266
[   35.864665] 
[   35.866191] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   35.866199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.866201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   35.866205] Call Trace:
[   35.866206]  <TASK>
[   35.866208]  dump_stack_lvl+0x73/0xb0
[   35.866212]  print_report+0xd1/0x650
[   35.866217]  ? __virt_addr_valid+0x1db/0x2d0
[   35.866221]  ? mempool_oob_right_helper+0x318/0x380
[   35.866225]  ? kasan_addr_to_slab+0x11/0xa0
[   35.866229]  ? mempool_oob_right_helper+0x318/0x380
[   35.866234]  kasan_report+0x141/0x180
[   35.866238]  ? mempool_oob_right_helper+0x318/0x380
[   35.866243]  __asan_report_load1_noabort+0x18/0x20
[   35.866247]  mempool_oob_right_helper+0x318/0x380
[   35.866252]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   35.866256]  ? dequeue_entities+0xa24/0x1790
[   35.866261]  ? finish_task_switch.isra.0+0x153/0x700
[   35.866266]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   35.866271]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   35.866276]  ? dequeue_task_fair+0x166/0x4e0
[   35.866280]  ? __pfx_mempool_kmalloc+0x10/0x10
[   35.866283]  ? __pfx_mempool_kfree+0x10/0x10
[   35.866288]  ? ktime_get_ts64+0x83/0x230
[   35.866292]  kunit_try_run_case+0x1a2/0x480
[   35.866297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.866301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   35.866306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.866310]  ? __kthread_parkme+0x82/0x180
[   35.866314]  ? preempt_count_sub+0x50/0x80
[   35.866319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.866323]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.866328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.866332]  kthread+0x334/0x6f0
[   35.866336]  ? trace_preempt_on+0x20/0xc0
[   35.866340]  ? __pfx_kthread+0x10/0x10
[   35.866344]  ? _raw_spin_unlock_irq+0x47/0x80
[   35.866348]  ? calculate_sigpending+0x7b/0xa0
[   35.866352]  ? __pfx_kthread+0x10/0x10
[   35.866357]  ret_from_fork+0x3e/0x80
[   35.866361]  ? __pfx_kthread+0x10/0x10
[   35.866365]  ret_from_fork_asm+0x1a/0x30
[   35.866371]  </TASK>
[   35.866372] 
[   36.060435] The buggy address belongs to the physical page:
[   36.066007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec0
[   36.074008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.081686] flags: 0x200000000000040(head|node=0|zone=2)
[   36.087034] page_type: f8(unknown)
[   36.090439] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.098178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.105919] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.113751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.121577] head: 0200000000000002 ffffea000417b001 00000000ffffffff 00000000ffffffff
[   36.129402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.137227] page dumped because: kasan: bad access detected
[   36.142799] 
[   36.144300] Memory state around the buggy address:
[   36.149091]  ffff888105ec1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.156311]  ffff888105ec1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.163529] >ffff888105ec2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.170750]                    ^
[   36.173982]  ffff888105ec2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.181200]  ffff888105ec2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.188418] ==================================================================