Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.017556] ================================================================== [ 20.017639] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.017713] Read of size 1 at addr fff00000c76c4173 by task kunit_try_catch/221 [ 20.017764] [ 20.017823] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.017908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.017935] Hardware name: linux,dummy-virt (DT) [ 20.017969] Call trace: [ 20.017993] show_stack+0x20/0x38 (C) [ 20.018046] dump_stack_lvl+0x8c/0xd0 [ 20.018095] print_report+0x118/0x608 [ 20.018143] kasan_report+0xdc/0x128 [ 20.018186] __asan_report_load1_noabort+0x20/0x30 [ 20.018237] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.018285] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.018332] kunit_try_run_case+0x170/0x3f0 [ 20.018381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.018433] kthread+0x328/0x630 [ 20.018475] ret_from_fork+0x10/0x20 [ 20.018524] [ 20.018543] Allocated by task 221: [ 20.018571] kasan_save_stack+0x3c/0x68 [ 20.018612] kasan_save_track+0x20/0x40 [ 20.018649] kasan_save_alloc_info+0x40/0x58 [ 20.018689] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.018732] remove_element+0x130/0x1f8 [ 20.018769] mempool_alloc_preallocated+0x58/0xc0 [ 20.018818] mempool_oob_right_helper+0x98/0x2f0 [ 20.018856] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.018896] kunit_try_run_case+0x170/0x3f0 [ 20.018956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.018998] kthread+0x328/0x630 [ 20.019033] ret_from_fork+0x10/0x20 [ 20.019067] [ 20.019087] The buggy address belongs to the object at fff00000c76c4100 [ 20.019087] which belongs to the cache kmalloc-128 of size 128 [ 20.019145] The buggy address is located 0 bytes to the right of [ 20.019145] allocated 115-byte region [fff00000c76c4100, fff00000c76c4173) [ 20.019209] [ 20.019231] The buggy address belongs to the physical page: [ 20.019264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c4 [ 20.019319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.019373] page_type: f5(slab) [ 20.019413] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.019462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.019503] page dumped because: kasan: bad access detected [ 20.019536] [ 20.019555] Memory state around the buggy address: [ 20.019588] fff00000c76c4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.019631] fff00000c76c4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.019674] >fff00000c76c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.019712] ^ [ 20.019751] fff00000c76c4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.019792] fff00000c76c4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.019842] ================================================================== [ 20.060056] ================================================================== [ 20.060130] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.060190] Read of size 1 at addr fff00000c6f442bb by task kunit_try_catch/225 [ 20.060243] [ 20.060280] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.060361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.060387] Hardware name: linux,dummy-virt (DT) [ 20.060420] Call trace: [ 20.060443] show_stack+0x20/0x38 (C) [ 20.060491] dump_stack_lvl+0x8c/0xd0 [ 20.060660] print_report+0x118/0x608 [ 20.061082] kasan_report+0xdc/0x128 [ 20.061250] __asan_report_load1_noabort+0x20/0x30 [ 20.061302] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.061348] mempool_slab_oob_right+0xc0/0x118 [ 20.061395] kunit_try_run_case+0x170/0x3f0 [ 20.061440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.061491] kthread+0x328/0x630 [ 20.061536] ret_from_fork+0x10/0x20 [ 20.061585] [ 20.061604] Allocated by task 225: [ 20.061631] kasan_save_stack+0x3c/0x68 [ 20.061673] kasan_save_track+0x20/0x40 [ 20.061709] kasan_save_alloc_info+0x40/0x58 [ 20.061748] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.061789] remove_element+0x16c/0x1f8 [ 20.061839] mempool_alloc_preallocated+0x58/0xc0 [ 20.061878] mempool_oob_right_helper+0x98/0x2f0 [ 20.062845] mempool_slab_oob_right+0xc0/0x118 [ 20.062975] kunit_try_run_case+0x170/0x3f0 [ 20.063223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.063395] kthread+0x328/0x630 [ 20.063453] ret_from_fork+0x10/0x20 [ 20.063552] [ 20.063584] The buggy address belongs to the object at fff00000c6f44240 [ 20.063584] which belongs to the cache test_cache of size 123 [ 20.063642] The buggy address is located 0 bytes to the right of [ 20.063642] allocated 123-byte region [fff00000c6f44240, fff00000c6f442bb) [ 20.063712] [ 20.063740] The buggy address belongs to the physical page: [ 20.063783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f44 [ 20.063847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.063910] page_type: f5(slab) [ 20.063950] raw: 0bfffe0000000000 fff00000c6f47000 dead000000000122 0000000000000000 [ 20.064017] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.064066] page dumped because: kasan: bad access detected [ 20.064098] [ 20.064115] Memory state around the buggy address: [ 20.064173] fff00000c6f44180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.064215] fff00000c6f44200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.064257] >fff00000c6f44280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.064296] ^ [ 20.064336] fff00000c6f44300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.064389] fff00000c6f44380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.064442] ================================================================== [ 20.043850] ================================================================== [ 20.043927] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.044610] Read of size 1 at addr fff00000c77f6001 by task kunit_try_catch/223 [ 20.044682] [ 20.044754] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.045022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.045050] Hardware name: linux,dummy-virt (DT) [ 20.045084] Call trace: [ 20.045108] show_stack+0x20/0x38 (C) [ 20.045161] dump_stack_lvl+0x8c/0xd0 [ 20.045257] print_report+0x118/0x608 [ 20.045303] kasan_report+0xdc/0x128 [ 20.045348] __asan_report_load1_noabort+0x20/0x30 [ 20.045405] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.045454] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.045510] kunit_try_run_case+0x170/0x3f0 [ 20.045574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.045626] kthread+0x328/0x630 [ 20.045667] ret_from_fork+0x10/0x20 [ 20.045723] [ 20.045753] The buggy address belongs to the physical page: [ 20.045790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f4 [ 20.045855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.045902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.045957] page_type: f8(unknown) [ 20.045999] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.046047] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.046096] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.046150] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.046199] head: 0bfffe0000000002 ffffc1ffc31dfd01 00000000ffffffff 00000000ffffffff [ 20.046270] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.046310] page dumped because: kasan: bad access detected [ 20.046341] [ 20.046360] Memory state around the buggy address: [ 20.046393] fff00000c77f5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.046435] fff00000c77f5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.046476] >fff00000c77f6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.046521] ^ [ 20.046559] fff00000c77f6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.046601] fff00000c77f6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.046639] ==================================================================
[ 13.404485] ================================================================== [ 13.404964] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.405564] Read of size 1 at addr ffff888103980373 by task kunit_try_catch/238 [ 13.405835] [ 13.405961] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.406012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.406024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.406047] Call Trace: [ 13.406061] <TASK> [ 13.406082] dump_stack_lvl+0x73/0xb0 [ 13.406112] print_report+0xd1/0x650 [ 13.406135] ? __virt_addr_valid+0x1db/0x2d0 [ 13.406157] ? mempool_oob_right_helper+0x318/0x380 [ 13.406179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.406199] ? mempool_oob_right_helper+0x318/0x380 [ 13.406235] kasan_report+0x141/0x180 [ 13.406257] ? mempool_oob_right_helper+0x318/0x380 [ 13.406283] __asan_report_load1_noabort+0x18/0x20 [ 13.406307] mempool_oob_right_helper+0x318/0x380 [ 13.406332] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.406355] ? __kasan_check_write+0x18/0x20 [ 13.406373] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.406395] ? finish_task_switch.isra.0+0x153/0x700 [ 13.406419] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.406441] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.406466] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.406493] ? __pfx_mempool_kfree+0x10/0x10 [ 13.406519] ? __pfx_read_tsc+0x10/0x10 [ 13.406539] ? ktime_get_ts64+0x86/0x230 [ 13.406563] kunit_try_run_case+0x1a5/0x480 [ 13.406587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.406608] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.406631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.406652] ? __kthread_parkme+0x82/0x180 [ 13.406672] ? preempt_count_sub+0x50/0x80 [ 13.406692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.406715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.406735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.406758] kthread+0x337/0x6f0 [ 13.406776] ? trace_preempt_on+0x20/0xc0 [ 13.406798] ? __pfx_kthread+0x10/0x10 [ 13.406818] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.406838] ? calculate_sigpending+0x7b/0xa0 [ 13.406862] ? __pfx_kthread+0x10/0x10 [ 13.406883] ret_from_fork+0x116/0x1d0 [ 13.406900] ? __pfx_kthread+0x10/0x10 [ 13.406919] ret_from_fork_asm+0x1a/0x30 [ 13.406949] </TASK> [ 13.406961] [ 13.419532] Allocated by task 238: [ 13.419786] kasan_save_stack+0x45/0x70 [ 13.420094] kasan_save_track+0x18/0x40 [ 13.420370] kasan_save_alloc_info+0x3b/0x50 [ 13.420669] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.420944] remove_element+0x11e/0x190 [ 13.421117] mempool_alloc_preallocated+0x4d/0x90 [ 13.421431] mempool_oob_right_helper+0x8a/0x380 [ 13.421978] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.422335] kunit_try_run_case+0x1a5/0x480 [ 13.422586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.422914] kthread+0x337/0x6f0 [ 13.423072] ret_from_fork+0x116/0x1d0 [ 13.423439] ret_from_fork_asm+0x1a/0x30 [ 13.423636] [ 13.423726] The buggy address belongs to the object at ffff888103980300 [ 13.423726] which belongs to the cache kmalloc-128 of size 128 [ 13.424462] The buggy address is located 0 bytes to the right of [ 13.424462] allocated 115-byte region [ffff888103980300, ffff888103980373) [ 13.425058] [ 13.425162] The buggy address belongs to the physical page: [ 13.425931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103980 [ 13.426764] flags: 0x200000000000000(node=0|zone=2) [ 13.427011] page_type: f5(slab) [ 13.427177] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.427782] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.428109] page dumped because: kasan: bad access detected [ 13.428318] [ 13.428455] Memory state around the buggy address: [ 13.428811] ffff888103980200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.429125] ffff888103980280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.429416] >ffff888103980300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.429731] ^ [ 13.430002] ffff888103980380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.430710] ffff888103980400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.431035] ================================================================== [ 13.463951] ================================================================== [ 13.464639] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.465123] Read of size 1 at addr ffff8881026482bb by task kunit_try_catch/242 [ 13.465544] [ 13.465765] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.465849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.465862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.465886] Call Trace: [ 13.465902] <TASK> [ 13.465923] dump_stack_lvl+0x73/0xb0 [ 13.465960] print_report+0xd1/0x650 [ 13.465985] ? __virt_addr_valid+0x1db/0x2d0 [ 13.466009] ? mempool_oob_right_helper+0x318/0x380 [ 13.466032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.466053] ? mempool_oob_right_helper+0x318/0x380 [ 13.466076] kasan_report+0x141/0x180 [ 13.466097] ? mempool_oob_right_helper+0x318/0x380 [ 13.466124] __asan_report_load1_noabort+0x18/0x20 [ 13.466147] mempool_oob_right_helper+0x318/0x380 [ 13.466171] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.466326] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.466350] ? finish_task_switch.isra.0+0x153/0x700 [ 13.466376] mempool_slab_oob_right+0xed/0x140 [ 13.466399] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.466424] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.466477] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.466498] ? __pfx_read_tsc+0x10/0x10 [ 13.466520] ? ktime_get_ts64+0x86/0x230 [ 13.466556] kunit_try_run_case+0x1a5/0x480 [ 13.466582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.466603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.466627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.466649] ? __kthread_parkme+0x82/0x180 [ 13.466670] ? preempt_count_sub+0x50/0x80 [ 13.466692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.466714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.466736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.466758] kthread+0x337/0x6f0 [ 13.466776] ? trace_preempt_on+0x20/0xc0 [ 13.466799] ? __pfx_kthread+0x10/0x10 [ 13.466819] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.466839] ? calculate_sigpending+0x7b/0xa0 [ 13.466864] ? __pfx_kthread+0x10/0x10 [ 13.466885] ret_from_fork+0x116/0x1d0 [ 13.466904] ? __pfx_kthread+0x10/0x10 [ 13.466923] ret_from_fork_asm+0x1a/0x30 [ 13.466955] </TASK> [ 13.466967] [ 13.476810] Allocated by task 242: [ 13.477032] kasan_save_stack+0x45/0x70 [ 13.477345] kasan_save_track+0x18/0x40 [ 13.477555] kasan_save_alloc_info+0x3b/0x50 [ 13.477760] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.477960] remove_element+0x11e/0x190 [ 13.478091] mempool_alloc_preallocated+0x4d/0x90 [ 13.478524] mempool_oob_right_helper+0x8a/0x380 [ 13.478761] mempool_slab_oob_right+0xed/0x140 [ 13.478953] kunit_try_run_case+0x1a5/0x480 [ 13.479128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.479730] kthread+0x337/0x6f0 [ 13.479911] ret_from_fork+0x116/0x1d0 [ 13.480087] ret_from_fork_asm+0x1a/0x30 [ 13.480389] [ 13.480493] The buggy address belongs to the object at ffff888102648240 [ 13.480493] which belongs to the cache test_cache of size 123 [ 13.481036] The buggy address is located 0 bytes to the right of [ 13.481036] allocated 123-byte region [ffff888102648240, ffff8881026482bb) [ 13.481669] [ 13.481791] The buggy address belongs to the physical page: [ 13.482032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102648 [ 13.482469] flags: 0x200000000000000(node=0|zone=2) [ 13.482708] page_type: f5(slab) [ 13.482834] raw: 0200000000000000 ffff888101643640 dead000000000122 0000000000000000 [ 13.483573] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.483934] page dumped because: kasan: bad access detected [ 13.484169] [ 13.484270] Memory state around the buggy address: [ 13.484483] ffff888102648180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.484759] ffff888102648200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.485066] >ffff888102648280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.485610] ^ [ 13.485808] ffff888102648300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.486132] ffff888102648380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.486547] ================================================================== [ 13.434685] ================================================================== [ 13.435176] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.435726] Read of size 1 at addr ffff888102a5a001 by task kunit_try_catch/240 [ 13.436019] [ 13.436124] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.436178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.436190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.436214] Call Trace: [ 13.436241] <TASK> [ 13.436262] dump_stack_lvl+0x73/0xb0 [ 13.436297] print_report+0xd1/0x650 [ 13.436321] ? __virt_addr_valid+0x1db/0x2d0 [ 13.436421] ? mempool_oob_right_helper+0x318/0x380 [ 13.436447] ? kasan_addr_to_slab+0x11/0xa0 [ 13.436466] ? mempool_oob_right_helper+0x318/0x380 [ 13.436489] kasan_report+0x141/0x180 [ 13.436510] ? mempool_oob_right_helper+0x318/0x380 [ 13.436536] __asan_report_load1_noabort+0x18/0x20 [ 13.436560] mempool_oob_right_helper+0x318/0x380 [ 13.436583] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.436616] ? __kasan_check_write+0x18/0x20 [ 13.436636] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.436658] ? irqentry_exit+0x2a/0x60 [ 13.436679] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.436703] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.436726] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.436752] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.436777] ? __pfx_mempool_kfree+0x10/0x10 [ 13.436808] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.436834] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.436869] kunit_try_run_case+0x1a5/0x480 [ 13.436895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.436916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.436951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.436973] ? __kthread_parkme+0x82/0x180 [ 13.436994] ? preempt_count_sub+0x50/0x80 [ 13.437018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.437040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.437062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.437084] kthread+0x337/0x6f0 [ 13.437102] ? trace_preempt_on+0x20/0xc0 [ 13.437125] ? __pfx_kthread+0x10/0x10 [ 13.437145] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.437164] ? calculate_sigpending+0x7b/0xa0 [ 13.437189] ? __pfx_kthread+0x10/0x10 [ 13.437272] ret_from_fork+0x116/0x1d0 [ 13.437295] ? __pfx_kthread+0x10/0x10 [ 13.437315] ret_from_fork_asm+0x1a/0x30 [ 13.437347] </TASK> [ 13.437359] [ 13.449826] The buggy address belongs to the physical page: [ 13.450060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a58 [ 13.450563] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.451234] flags: 0x200000000000040(head|node=0|zone=2) [ 13.451584] page_type: f8(unknown) [ 13.451856] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.452336] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.452698] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.453099] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.453550] head: 0200000000000002 ffffea00040a9601 00000000ffffffff 00000000ffffffff [ 13.453871] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.454268] page dumped because: kasan: bad access detected [ 13.454662] [ 13.454816] Memory state around the buggy address: [ 13.455049] ffff888102a59f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.455471] ffff888102a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.455861] >ffff888102a5a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.456171] ^ [ 13.456662] ffff888102a5a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.457031] ffff888102a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.457664] ==================================================================