Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.117653] ================================================================== [ 20.117728] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.117799] Read of size 1 at addr fff00000c3ec0a73 by task kunit_try_catch/221 [ 20.117846] [ 20.117886] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.117969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.117997] Hardware name: linux,dummy-virt (DT) [ 20.118028] Call trace: [ 20.118053] show_stack+0x20/0x38 (C) [ 20.118105] dump_stack_lvl+0x8c/0xd0 [ 20.118168] print_report+0x118/0x608 [ 20.118214] kasan_report+0xdc/0x128 [ 20.118257] __asan_report_load1_noabort+0x20/0x30 [ 20.118308] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.118356] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.118404] kunit_try_run_case+0x170/0x3f0 [ 20.118453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.118503] kthread+0x328/0x630 [ 20.118546] ret_from_fork+0x10/0x20 [ 20.118593] [ 20.118612] Allocated by task 221: [ 20.118642] kasan_save_stack+0x3c/0x68 [ 20.118682] kasan_save_track+0x20/0x40 [ 20.118720] kasan_save_alloc_info+0x40/0x58 [ 20.118759] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.118804] remove_element+0x130/0x1f8 [ 20.118840] mempool_alloc_preallocated+0x58/0xc0 [ 20.118881] mempool_oob_right_helper+0x98/0x2f0 [ 20.118921] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.118959] kunit_try_run_case+0x170/0x3f0 [ 20.119004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.119047] kthread+0x328/0x630 [ 20.119079] ret_from_fork+0x10/0x20 [ 20.119115] [ 20.119135] The buggy address belongs to the object at fff00000c3ec0a00 [ 20.119135] which belongs to the cache kmalloc-128 of size 128 [ 20.119201] The buggy address is located 0 bytes to the right of [ 20.119201] allocated 115-byte region [fff00000c3ec0a00, fff00000c3ec0a73) [ 20.119264] [ 20.119285] The buggy address belongs to the physical page: [ 20.119317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 20.119370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.119422] page_type: f5(slab) [ 20.119462] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.119512] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.119553] page dumped because: kasan: bad access detected [ 20.119583] [ 20.119600] Memory state around the buggy address: [ 20.119634] fff00000c3ec0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.119678] fff00000c3ec0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.119721] >fff00000c3ec0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.119759] ^ [ 20.119798] fff00000c3ec0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.119840] fff00000c3ec0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.119878] ================================================================== [ 20.130710] ================================================================== [ 20.130776] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.130833] Read of size 1 at addr fff00000c7902001 by task kunit_try_catch/223 [ 20.130882] [ 20.130916] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.131004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.131033] Hardware name: linux,dummy-virt (DT) [ 20.131065] Call trace: [ 20.131088] show_stack+0x20/0x38 (C) [ 20.131137] dump_stack_lvl+0x8c/0xd0 [ 20.131198] print_report+0x118/0x608 [ 20.131991] kasan_report+0xdc/0x128 [ 20.132089] __asan_report_load1_noabort+0x20/0x30 [ 20.132187] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.132239] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.132288] kunit_try_run_case+0x170/0x3f0 [ 20.132337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.132390] kthread+0x328/0x630 [ 20.132432] ret_from_fork+0x10/0x20 [ 20.132480] [ 20.132505] The buggy address belongs to the physical page: [ 20.132537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 20.132591] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.132637] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.132691] page_type: f8(unknown) [ 20.132730] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.132779] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.132828] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.132875] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.132925] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff [ 20.132975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.133031] page dumped because: kasan: bad access detected [ 20.133089] [ 20.133107] Memory state around the buggy address: [ 20.133221] fff00000c7901f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.133265] fff00000c7901f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.133310] >fff00000c7902000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.133347] ^ [ 20.133375] fff00000c7902080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.133417] fff00000c7902100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.133455] ================================================================== [ 20.143800] ================================================================== [ 20.143866] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.144295] Read of size 1 at addr fff00000c78db2bb by task kunit_try_catch/225 [ 20.144361] [ 20.144512] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.144621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.144682] Hardware name: linux,dummy-virt (DT) [ 20.144764] Call trace: [ 20.144805] show_stack+0x20/0x38 (C) [ 20.144856] dump_stack_lvl+0x8c/0xd0 [ 20.144903] print_report+0x118/0x608 [ 20.144947] kasan_report+0xdc/0x128 [ 20.145031] __asan_report_load1_noabort+0x20/0x30 [ 20.145304] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.145355] mempool_slab_oob_right+0xc0/0x118 [ 20.145401] kunit_try_run_case+0x170/0x3f0 [ 20.145448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.145500] kthread+0x328/0x630 [ 20.145563] ret_from_fork+0x10/0x20 [ 20.145689] [ 20.145718] Allocated by task 225: [ 20.145747] kasan_save_stack+0x3c/0x68 [ 20.145788] kasan_save_track+0x20/0x40 [ 20.145825] kasan_save_alloc_info+0x40/0x58 [ 20.145867] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.145929] remove_element+0x16c/0x1f8 [ 20.145965] mempool_alloc_preallocated+0x58/0xc0 [ 20.146118] mempool_oob_right_helper+0x98/0x2f0 [ 20.146165] mempool_slab_oob_right+0xc0/0x118 [ 20.146203] kunit_try_run_case+0x170/0x3f0 [ 20.146239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.146306] kthread+0x328/0x630 [ 20.146352] ret_from_fork+0x10/0x20 [ 20.146415] [ 20.146435] The buggy address belongs to the object at fff00000c78db240 [ 20.146435] which belongs to the cache test_cache of size 123 [ 20.146969] The buggy address is located 0 bytes to the right of [ 20.146969] allocated 123-byte region [fff00000c78db240, fff00000c78db2bb) [ 20.147042] [ 20.147346] The buggy address belongs to the physical page: [ 20.147381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078db [ 20.147470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.147780] page_type: f5(slab) [ 20.147923] raw: 0bfffe0000000000 fff00000c78c0140 dead000000000122 0000000000000000 [ 20.147974] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.148013] page dumped because: kasan: bad access detected [ 20.148062] [ 20.148080] Memory state around the buggy address: [ 20.148112] fff00000c78db180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.148168] fff00000c78db200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.148211] >fff00000c78db280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.148249] ^ [ 20.148284] fff00000c78db300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.148334] fff00000c78db380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.148374] ==================================================================
[ 15.197846] ================================================================== [ 15.198458] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.198752] Read of size 1 at addr ffff888102a092bb by task kunit_try_catch/243 [ 15.200310] [ 15.200703] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.200765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.200782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.200824] Call Trace: [ 15.200841] <TASK> [ 15.200863] dump_stack_lvl+0x73/0xb0 [ 15.200903] print_report+0xd1/0x650 [ 15.200929] ? __virt_addr_valid+0x1db/0x2d0 [ 15.200957] ? mempool_oob_right_helper+0x318/0x380 [ 15.200984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.201010] ? mempool_oob_right_helper+0x318/0x380 [ 15.201037] kasan_report+0x141/0x180 [ 15.201062] ? mempool_oob_right_helper+0x318/0x380 [ 15.201351] __asan_report_load1_noabort+0x18/0x20 [ 15.201399] mempool_oob_right_helper+0x318/0x380 [ 15.201431] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.201465] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.201490] ? finish_task_switch.isra.0+0x153/0x700 [ 15.201521] mempool_slab_oob_right+0xed/0x140 [ 15.201553] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 15.201585] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 15.201610] ? __pfx_mempool_free_slab+0x10/0x10 [ 15.201635] ? __pfx_read_tsc+0x10/0x10 [ 15.201660] ? ktime_get_ts64+0x86/0x230 [ 15.201689] kunit_try_run_case+0x1a5/0x480 [ 15.201718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.201743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.201771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.201808] ? __kthread_parkme+0x82/0x180 [ 15.201834] ? preempt_count_sub+0x50/0x80 [ 15.201861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.201889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.201918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.201946] kthread+0x337/0x6f0 [ 15.201969] ? trace_preempt_on+0x20/0xc0 [ 15.201996] ? __pfx_kthread+0x10/0x10 [ 15.202021] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.202048] ? calculate_sigpending+0x7b/0xa0 [ 15.202077] ? __pfx_kthread+0x10/0x10 [ 15.202101] ret_from_fork+0x116/0x1d0 [ 15.202125] ? __pfx_kthread+0x10/0x10 [ 15.202241] ret_from_fork_asm+0x1a/0x30 [ 15.202278] </TASK> [ 15.202293] [ 15.213739] Allocated by task 243: [ 15.214530] kasan_save_stack+0x45/0x70 [ 15.214902] kasan_save_track+0x18/0x40 [ 15.215423] kasan_save_alloc_info+0x3b/0x50 [ 15.215801] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 15.216369] remove_element+0x11e/0x190 [ 15.216736] mempool_alloc_preallocated+0x4d/0x90 [ 15.217065] mempool_oob_right_helper+0x8a/0x380 [ 15.217732] mempool_slab_oob_right+0xed/0x140 [ 15.218212] kunit_try_run_case+0x1a5/0x480 [ 15.218457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.218720] kthread+0x337/0x6f0 [ 15.218925] ret_from_fork+0x116/0x1d0 [ 15.219524] ret_from_fork_asm+0x1a/0x30 [ 15.219762] [ 15.219869] The buggy address belongs to the object at ffff888102a09240 [ 15.219869] which belongs to the cache test_cache of size 123 [ 15.220944] The buggy address is located 0 bytes to the right of [ 15.220944] allocated 123-byte region [ffff888102a09240, ffff888102a092bb) [ 15.222051] [ 15.222189] The buggy address belongs to the physical page: [ 15.222453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a09 [ 15.222850] flags: 0x200000000000000(node=0|zone=2) [ 15.223122] page_type: f5(slab) [ 15.223587] raw: 0200000000000000 ffff888101a64dc0 dead000000000122 0000000000000000 [ 15.223916] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 15.224507] page dumped because: kasan: bad access detected [ 15.224765] [ 15.225030] Memory state around the buggy address: [ 15.225250] ffff888102a09180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.225691] ffff888102a09200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 15.226171] >ffff888102a09280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 15.226803] ^ [ 15.227090] ffff888102a09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227559] ffff888102a09380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227949] ================================================================== [ 15.129857] ================================================================== [ 15.130516] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.131503] Read of size 1 at addr ffff8881029f9473 by task kunit_try_catch/239 [ 15.131962] [ 15.132276] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.132340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.132355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.132383] Call Trace: [ 15.132399] <TASK> [ 15.132421] dump_stack_lvl+0x73/0xb0 [ 15.132463] print_report+0xd1/0x650 [ 15.132491] ? __virt_addr_valid+0x1db/0x2d0 [ 15.132518] ? mempool_oob_right_helper+0x318/0x380 [ 15.132545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.132570] ? mempool_oob_right_helper+0x318/0x380 [ 15.132596] kasan_report+0x141/0x180 [ 15.132621] ? mempool_oob_right_helper+0x318/0x380 [ 15.132653] __asan_report_load1_noabort+0x18/0x20 [ 15.132680] mempool_oob_right_helper+0x318/0x380 [ 15.132707] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.132735] ? __kasan_check_write+0x18/0x20 [ 15.132758] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.132783] ? irqentry_exit+0x2a/0x60 [ 15.132823] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.132854] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.132881] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.132911] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.132939] ? __pfx_mempool_kfree+0x10/0x10 [ 15.132966] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.132996] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 15.133024] kunit_try_run_case+0x1a5/0x480 [ 15.133054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.133079] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.133108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.133135] ? __kthread_parkme+0x82/0x180 [ 15.133159] ? preempt_count_sub+0x50/0x80 [ 15.133187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.133213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.133239] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.133265] kthread+0x337/0x6f0 [ 15.133288] ? trace_preempt_on+0x20/0xc0 [ 15.133315] ? __pfx_kthread+0x10/0x10 [ 15.133342] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.133368] ? calculate_sigpending+0x7b/0xa0 [ 15.133395] ? __pfx_kthread+0x10/0x10 [ 15.133420] ret_from_fork+0x116/0x1d0 [ 15.133441] ? __pfx_kthread+0x10/0x10 [ 15.133465] ret_from_fork_asm+0x1a/0x30 [ 15.133500] </TASK> [ 15.133514] [ 15.147447] Allocated by task 239: [ 15.147671] kasan_save_stack+0x45/0x70 [ 15.148029] kasan_save_track+0x18/0x40 [ 15.148472] kasan_save_alloc_info+0x3b/0x50 [ 15.148744] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.149337] remove_element+0x11e/0x190 [ 15.149555] mempool_alloc_preallocated+0x4d/0x90 [ 15.150014] mempool_oob_right_helper+0x8a/0x380 [ 15.150611] mempool_kmalloc_oob_right+0xf2/0x150 [ 15.150884] kunit_try_run_case+0x1a5/0x480 [ 15.151387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.151683] kthread+0x337/0x6f0 [ 15.151878] ret_from_fork+0x116/0x1d0 [ 15.152071] ret_from_fork_asm+0x1a/0x30 [ 15.152267] [ 15.152749] The buggy address belongs to the object at ffff8881029f9400 [ 15.152749] which belongs to the cache kmalloc-128 of size 128 [ 15.153597] The buggy address is located 0 bytes to the right of [ 15.153597] allocated 115-byte region [ffff8881029f9400, ffff8881029f9473) [ 15.154565] [ 15.154836] The buggy address belongs to the physical page: [ 15.155345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 15.155731] flags: 0x200000000000000(node=0|zone=2) [ 15.156215] page_type: f5(slab) [ 15.156625] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.157367] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.157702] page dumped because: kasan: bad access detected [ 15.158032] [ 15.158145] Memory state around the buggy address: [ 15.158756] ffff8881029f9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.159144] ffff8881029f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159723] >ffff8881029f9400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.160097] ^ [ 15.160680] ffff8881029f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.161052] ffff8881029f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 15.161660] ================================================================== [ 15.166004] ================================================================== [ 15.166768] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 15.167388] Read of size 1 at addr ffff888103a6a001 by task kunit_try_catch/241 [ 15.167963] [ 15.168095] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.168268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.168288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.168332] Call Trace: [ 15.168465] <TASK> [ 15.168494] dump_stack_lvl+0x73/0xb0 [ 15.168538] print_report+0xd1/0x650 [ 15.168566] ? __virt_addr_valid+0x1db/0x2d0 [ 15.168596] ? mempool_oob_right_helper+0x318/0x380 [ 15.168626] ? kasan_addr_to_slab+0x11/0xa0 [ 15.168651] ? mempool_oob_right_helper+0x318/0x380 [ 15.168678] kasan_report+0x141/0x180 [ 15.168704] ? mempool_oob_right_helper+0x318/0x380 [ 15.168735] __asan_report_load1_noabort+0x18/0x20 [ 15.168763] mempool_oob_right_helper+0x318/0x380 [ 15.168806] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 15.168838] ? __kasan_check_write+0x18/0x20 [ 15.168861] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.168887] ? finish_task_switch.isra.0+0x153/0x700 [ 15.168918] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 15.168946] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 15.168977] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.169009] ? __pfx_mempool_kfree+0x10/0x10 [ 15.169038] ? __pfx_read_tsc+0x10/0x10 [ 15.169063] ? ktime_get_ts64+0x86/0x230 [ 15.169104] kunit_try_run_case+0x1a5/0x480 [ 15.169150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.169177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.169206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.169233] ? __kthread_parkme+0x82/0x180 [ 15.169260] ? preempt_count_sub+0x50/0x80 [ 15.169286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.169313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.169345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.169371] kthread+0x337/0x6f0 [ 15.169394] ? trace_preempt_on+0x20/0xc0 [ 15.169421] ? __pfx_kthread+0x10/0x10 [ 15.169447] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.169472] ? calculate_sigpending+0x7b/0xa0 [ 15.169503] ? __pfx_kthread+0x10/0x10 [ 15.169528] ret_from_fork+0x116/0x1d0 [ 15.169551] ? __pfx_kthread+0x10/0x10 [ 15.169575] ret_from_fork_asm+0x1a/0x30 [ 15.169612] </TASK> [ 15.169627] [ 15.182532] The buggy address belongs to the physical page: [ 15.182754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a68 [ 15.183250] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.184375] flags: 0x200000000000040(head|node=0|zone=2) [ 15.184658] page_type: f8(unknown) [ 15.185139] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.185630] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.186152] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.186710] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.187235] head: 0200000000000002 ffffea00040e9a01 00000000ffffffff 00000000ffffffff [ 15.187625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.188022] page dumped because: kasan: bad access detected [ 15.188654] [ 15.188770] Memory state around the buggy address: [ 15.188972] ffff888103a69f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.189898] ffff888103a69f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.190502] >ffff888103a6a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.190976] ^ [ 15.191188] ffff888103a6a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.191810] ffff888103a6a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 15.192456] ==================================================================