Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 62.782592] ================================================================== [ 62.793579] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 62.801208] Read of size 1 at addr cc22d373 by task kunit_try_catch/277 [ 62.807891] [ 62.809387] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 62.809448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 62.809448] Hardware name: Generic DRA74X (Flattened Device Tree) [ 62.809448] Call trace: [ 62.809478] unwind_backtrace from show_stack+0x18/0x1c [ 62.809509] show_stack from dump_stack_lvl+0x70/0x90 [ 62.809539] dump_stack_lvl from print_report+0x158/0x528 [ 62.809570] print_report from kasan_report+0xdc/0x118 [ 62.809600] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 62.809631] mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108 [ 62.809661] mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 62.809692] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.809722] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 62.809783] kthread from ret_from_fork+0x14/0x20 [ 62.809814] Exception stack(0xf25b3fb0 to 0xf25b3ff8) [ 62.809814] 3fa0: 00000000 00000000 00000000 00000000 [ 62.809844] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 62.809875] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 62.809875] [ 62.923431] Allocated by task 277: [ 62.926849] kasan_save_track+0x30/0x5c [ 62.930725] remove_element+0x180/0x264 [ 62.934600] mempool_alloc_preallocated+0x60/0x9c [ 62.939331] mempool_oob_right_helper+0x94/0x334 [ 62.944000] mempool_kmalloc_oob_right+0xbc/0x108 [ 62.948730] kunit_try_run_case+0x22c/0x5a8 [ 62.952941] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 62.958465] kthread+0x464/0x810 [ 62.961730] ret_from_fork+0x14/0x20 [ 62.965332] [ 62.966827] The buggy address belongs to the object at cc22d300 [ 62.966827] which belongs to the cache kmalloc-128 of size 128 [ 62.978729] The buggy address is located 0 bytes to the right of [ 62.978729] allocated 115-byte region [cc22d300, cc22d373) [ 62.990386] [ 62.991882] The buggy address belongs to the physical page: [ 62.997497] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d [ 63.004760] flags: 0x0(zone=0) [ 63.007843] page_type: f5(slab) [ 63.011016] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 63.019165] raw: 00000000 [ 63.021820] page dumped because: kasan: bad access detected [ 63.027404] [ 63.028900] Memory state around the buggy address: [ 63.033752] cc22d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.040313] cc22d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.046874] >cc22d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.053466] ^ [ 63.059661] cc22d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.066253] cc22d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 63.072814] ================================================================== [ 63.081176] ================================================================== [ 63.092987] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 63.100616] Read of size 1 at addr ccc0e001 by task kunit_try_catch/279 [ 63.107299] [ 63.108795] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 63.108825] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.108825] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.108856] Call trace: [ 63.108856] unwind_backtrace from show_stack+0x18/0x1c [ 63.108886] show_stack from dump_stack_lvl+0x70/0x90 [ 63.108917] dump_stack_lvl from print_report+0x158/0x528 [ 63.108917] print_report from kasan_report+0xdc/0x118 [ 63.108947] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 63.108978] mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108 [ 63.109008] mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 63.109039] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.109069] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.109069] kthread from ret_from_fork+0x14/0x20 [ 63.109100] Exception stack(0xf25bbfb0 to 0xf25bbff8) [ 63.109130] bfa0: 00000000 00000000 00000000 00000000 [ 63.109130] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.109161] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.109161] [ 63.223724] The buggy address belongs to the physical page: [ 63.229339] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 63.236602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.244323] flags: 0x40(head|zone=0) [ 63.247924] page_type: f8(unknown) [ 63.251373] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 63.259521] raw: 00000000 [ 63.262145] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 63.270385] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 63.278625] head: 00000000 00000004 [ 63.282135] page dumped because: kasan: bad access detected [ 63.287750] [ 63.289245] Memory state around the buggy address: [ 63.294067] ccc0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.300628] ccc0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.307220] >ccc0e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.313781] ^ [ 63.316345] ccc0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.322906] ccc0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 63.329467] ================================================================== [ 63.338226] ================================================================== [ 63.350585] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334 [ 63.358215] Read of size 1 at addr cc2382bb by task kunit_try_catch/281 [ 63.364868] [ 63.366363] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 63.366394] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 63.366424] Hardware name: Generic DRA74X (Flattened Device Tree) [ 63.366424] Call trace: [ 63.366424] unwind_backtrace from show_stack+0x18/0x1c [ 63.366455] show_stack from dump_stack_lvl+0x70/0x90 [ 63.366485] dump_stack_lvl from print_report+0x158/0x528 [ 63.366516] print_report from kasan_report+0xdc/0x118 [ 63.366516] kasan_report from mempool_oob_right_helper+0x2f8/0x334 [ 63.366546] mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100 [ 63.366577] mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 63.366607] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.366638] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 63.366668] kthread from ret_from_fork+0x14/0x20 [ 63.366668] Exception stack(0xf25c3fb0 to 0xf25c3ff8) [ 63.366699] 3fa0: 00000000 00000000 00000000 00000000 [ 63.366699] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 63.366729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 63.366729] [ 63.479736] Allocated by task 281: [ 63.483154] kasan_save_track+0x30/0x5c [ 63.487030] __kasan_mempool_unpoison_object+0xec/0x14c [ 63.492309] remove_element+0x1d4/0x264 [ 63.496154] mempool_alloc_preallocated+0x60/0x9c [ 63.500915] mempool_oob_right_helper+0x94/0x334 [ 63.505554] mempool_slab_oob_right+0xb8/0x100 [ 63.510040] kunit_try_run_case+0x22c/0x5a8 [ 63.514251] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 63.519805] kthread+0x464/0x810 [ 63.523040] ret_from_fork+0x14/0x20 [ 63.526672] [ 63.528167] The buggy address belongs to the object at cc238240 [ 63.528167] which belongs to the cache test_cache of size 123 [ 63.539978] The buggy address is located 0 bytes to the right of [ 63.539978] allocated 123-byte region [cc238240, cc2382bb) [ 63.551605] [ 63.553100] The buggy address belongs to the physical page: [ 63.558715] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c238 [ 63.566009] flags: 0x0(zone=0) [ 63.569061] page_type: f5(slab) [ 63.572235] raw: 00000000 cc22f700 00000122 00000000 00000000 80150015 f5000000 00000000 [ 63.580383] raw: 00000000 [ 63.583038] page dumped because: kasan: bad access detected [ 63.588623] [ 63.590148] Memory state around the buggy address: [ 63.594970] cc238180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.601531] cc238200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 63.608093] >cc238280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 63.614685] ^ [ 63.619049] cc238300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.625640] cc238380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.632202] ==================================================================
[ 36.196168] ================================================================== [ 36.208439] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 36.216013] Read of size 1 at addr ffff8881080522bb by task kunit_try_catch/268 [ 36.223327] [ 36.224829] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 36.224837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.224840] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 36.224843] Call Trace: [ 36.224845] <TASK> [ 36.224847] dump_stack_lvl+0x73/0xb0 [ 36.224851] print_report+0xd1/0x650 [ 36.224855] ? __virt_addr_valid+0x1db/0x2d0 [ 36.224859] ? mempool_oob_right_helper+0x318/0x380 [ 36.224863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.224868] ? mempool_oob_right_helper+0x318/0x380 [ 36.224872] kasan_report+0x141/0x180 [ 36.224876] ? mempool_oob_right_helper+0x318/0x380 [ 36.224882] __asan_report_load1_noabort+0x18/0x20 [ 36.224886] mempool_oob_right_helper+0x318/0x380 [ 36.224890] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 36.224896] ? finish_task_switch.isra.0+0x153/0x700 [ 36.224901] mempool_slab_oob_right+0xed/0x140 [ 36.224904] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 36.224908] ? dequeue_task_fair+0x166/0x4e0 [ 36.224912] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 36.224916] ? __pfx_mempool_free_slab+0x10/0x10 [ 36.224920] ? ktime_get_ts64+0x83/0x230 [ 36.224925] kunit_try_run_case+0x1a2/0x480 [ 36.224929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.224933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 36.224938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 36.224942] ? __kthread_parkme+0x82/0x180 [ 36.224947] ? preempt_count_sub+0x50/0x80 [ 36.224951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.224955] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.224959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.224964] kthread+0x334/0x6f0 [ 36.224968] ? trace_preempt_on+0x20/0xc0 [ 36.224972] ? __pfx_kthread+0x10/0x10 [ 36.224976] ? _raw_spin_unlock_irq+0x47/0x80 [ 36.224980] ? calculate_sigpending+0x7b/0xa0 [ 36.224984] ? __pfx_kthread+0x10/0x10 [ 36.224988] ret_from_fork+0x3e/0x80 [ 36.224992] ? __pfx_kthread+0x10/0x10 [ 36.224997] ret_from_fork_asm+0x1a/0x30 [ 36.225002] </TASK> [ 36.225004] [ 36.414991] Allocated by task 268: [ 36.418396] kasan_save_stack+0x45/0x70 [ 36.422235] kasan_save_track+0x18/0x40 [ 36.426074] kasan_save_alloc_info+0x3b/0x50 [ 36.430346] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 36.435659] remove_element+0x11e/0x190 [ 36.439532] mempool_alloc_preallocated+0x4d/0x90 [ 36.444240] mempool_oob_right_helper+0x8a/0x380 [ 36.448867] mempool_slab_oob_right+0xed/0x140 [ 36.453312] kunit_try_run_case+0x1a2/0x480 [ 36.457497] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.462899] kthread+0x334/0x6f0 [ 36.466140] ret_from_fork+0x3e/0x80 [ 36.469762] ret_from_fork_asm+0x1a/0x30 [ 36.473702] [ 36.475247] The buggy address belongs to the object at ffff888108052240 [ 36.475247] which belongs to the cache test_cache of size 123 [ 36.487702] The buggy address is located 0 bytes to the right of [ 36.487702] allocated 123-byte region [ffff888108052240, ffff8881080522bb) [ 36.500703] [ 36.502251] The buggy address belongs to the physical page: [ 36.507824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108052 [ 36.515832] flags: 0x200000000000000(node=0|zone=2) [ 36.520721] page_type: f5(slab) [ 36.523902] raw: 0200000000000000 ffff888100ac7680 dead000000000122 0000000000000000 [ 36.531649] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.539420] page dumped because: kasan: bad access detected [ 36.544993] [ 36.546492] Memory state around the buggy address: [ 36.551286] ffff888108052180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.558513] ffff888108052200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.565764] >ffff888108052280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.572986] ^ [ 36.578039] ffff888108052300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.585256] ffff888108052380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.592475] ================================================================== [ 35.429176] ================================================================== [ 35.440080] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 35.447687] Read of size 1 at addr ffff888104ee9573 by task kunit_try_catch/264 [ 35.455020] [ 35.456521] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 35.456530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.456533] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 35.456537] Call Trace: [ 35.456538] <TASK> [ 35.456541] dump_stack_lvl+0x73/0xb0 [ 35.456545] print_report+0xd1/0x650 [ 35.456550] ? __virt_addr_valid+0x1db/0x2d0 [ 35.456554] ? mempool_oob_right_helper+0x318/0x380 [ 35.456559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.456563] ? mempool_oob_right_helper+0x318/0x380 [ 35.456568] kasan_report+0x141/0x180 [ 35.456572] ? mempool_oob_right_helper+0x318/0x380 [ 35.456578] __asan_report_load1_noabort+0x18/0x20 [ 35.456581] mempool_oob_right_helper+0x318/0x380 [ 35.456586] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 35.456591] ? dequeue_entities+0xa24/0x1790 [ 35.456596] ? finish_task_switch.isra.0+0x153/0x700 [ 35.456601] mempool_kmalloc_oob_right+0xf2/0x150 [ 35.456606] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 35.456611] ? dequeue_task_fair+0x166/0x4e0 [ 35.456615] ? __pfx_mempool_kmalloc+0x10/0x10 [ 35.456619] ? __pfx_mempool_kfree+0x10/0x10 [ 35.456623] ? ktime_get_ts64+0x83/0x230 [ 35.456628] kunit_try_run_case+0x1a2/0x480 [ 35.456633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.456637] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.456642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.456647] ? __kthread_parkme+0x82/0x180 [ 35.456651] ? preempt_count_sub+0x50/0x80 [ 35.456656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.456675] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.456679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.456684] kthread+0x334/0x6f0 [ 35.456688] ? trace_preempt_on+0x20/0xc0 [ 35.456705] ? __pfx_kthread+0x10/0x10 [ 35.456710] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.456714] ? calculate_sigpending+0x7b/0xa0 [ 35.456718] ? __pfx_kthread+0x10/0x10 [ 35.456722] ret_from_fork+0x3e/0x80 [ 35.456727] ? __pfx_kthread+0x10/0x10 [ 35.456731] ret_from_fork_asm+0x1a/0x30 [ 35.456738] </TASK> [ 35.456739] [ 35.650938] Allocated by task 264: [ 35.654342] kasan_save_stack+0x45/0x70 [ 35.658183] kasan_save_track+0x18/0x40 [ 35.662020] kasan_save_alloc_info+0x3b/0x50 [ 35.666294] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 35.671605] remove_element+0x11e/0x190 [ 35.675444] mempool_alloc_preallocated+0x4d/0x90 [ 35.680153] mempool_oob_right_helper+0x8a/0x380 [ 35.684779] mempool_kmalloc_oob_right+0xf2/0x150 [ 35.689486] kunit_try_run_case+0x1a2/0x480 [ 35.693687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.699089] kthread+0x334/0x6f0 [ 35.702328] ret_from_fork+0x3e/0x80 [ 35.705908] ret_from_fork_asm+0x1a/0x30 [ 35.709833] [ 35.711334] The buggy address belongs to the object at ffff888104ee9500 [ 35.711334] which belongs to the cache kmalloc-128 of size 128 [ 35.723848] The buggy address is located 0 bytes to the right of [ 35.723848] allocated 115-byte region [ffff888104ee9500, ffff888104ee9573) [ 35.736795] [ 35.738293] The buggy address belongs to the physical page: [ 35.743865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9 [ 35.751873] flags: 0x200000000000000(node=0|zone=2) [ 35.756752] page_type: f5(slab) [ 35.759899] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 35.767639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.775384] page dumped because: kasan: bad access detected [ 35.780958] [ 35.782457] Memory state around the buggy address: [ 35.787250] ffff888104ee9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.794467] ffff888104ee9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.801688] >ffff888104ee9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.808932] ^ [ 35.815806] ffff888104ee9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.823031] ffff888104ee9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.830252] ================================================================== [ 35.838032] ================================================================== [ 35.849784] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 35.857358] Read of size 1 at addr ffff888105ec2001 by task kunit_try_catch/266 [ 35.864665] [ 35.866191] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 35.866199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.866201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 35.866205] Call Trace: [ 35.866206] <TASK> [ 35.866208] dump_stack_lvl+0x73/0xb0 [ 35.866212] print_report+0xd1/0x650 [ 35.866217] ? __virt_addr_valid+0x1db/0x2d0 [ 35.866221] ? mempool_oob_right_helper+0x318/0x380 [ 35.866225] ? kasan_addr_to_slab+0x11/0xa0 [ 35.866229] ? mempool_oob_right_helper+0x318/0x380 [ 35.866234] kasan_report+0x141/0x180 [ 35.866238] ? mempool_oob_right_helper+0x318/0x380 [ 35.866243] __asan_report_load1_noabort+0x18/0x20 [ 35.866247] mempool_oob_right_helper+0x318/0x380 [ 35.866252] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 35.866256] ? dequeue_entities+0xa24/0x1790 [ 35.866261] ? finish_task_switch.isra.0+0x153/0x700 [ 35.866266] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 35.866271] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 35.866276] ? dequeue_task_fair+0x166/0x4e0 [ 35.866280] ? __pfx_mempool_kmalloc+0x10/0x10 [ 35.866283] ? __pfx_mempool_kfree+0x10/0x10 [ 35.866288] ? ktime_get_ts64+0x83/0x230 [ 35.866292] kunit_try_run_case+0x1a2/0x480 [ 35.866297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.866301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.866306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.866310] ? __kthread_parkme+0x82/0x180 [ 35.866314] ? preempt_count_sub+0x50/0x80 [ 35.866319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.866323] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.866328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.866332] kthread+0x334/0x6f0 [ 35.866336] ? trace_preempt_on+0x20/0xc0 [ 35.866340] ? __pfx_kthread+0x10/0x10 [ 35.866344] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.866348] ? calculate_sigpending+0x7b/0xa0 [ 35.866352] ? __pfx_kthread+0x10/0x10 [ 35.866357] ret_from_fork+0x3e/0x80 [ 35.866361] ? __pfx_kthread+0x10/0x10 [ 35.866365] ret_from_fork_asm+0x1a/0x30 [ 35.866371] </TASK> [ 35.866372] [ 36.060435] The buggy address belongs to the physical page: [ 36.066007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec0 [ 36.074008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.081686] flags: 0x200000000000040(head|node=0|zone=2) [ 36.087034] page_type: f8(unknown) [ 36.090439] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.098178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.105919] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.113751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.121577] head: 0200000000000002 ffffea000417b001 00000000ffffffff 00000000ffffffff [ 36.129402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.137227] page dumped because: kasan: bad access detected [ 36.142799] [ 36.144300] Memory state around the buggy address: [ 36.149091] ffff888105ec1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.156311] ffff888105ec1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.163529] >ffff888105ec2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.170750] ^ [ 36.173982] ffff888105ec2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.181200] ffff888105ec2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.188418] ==================================================================