Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.332385] ================================================================== [ 17.332445] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.333766] Read of size 1 at addr fff00000c781a001 by task kunit_try_catch/223 [ 17.333862] [ 17.333897] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.333979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.334006] Hardware name: linux,dummy-virt (DT) [ 17.334036] Call trace: [ 17.334060] show_stack+0x20/0x38 (C) [ 17.334109] dump_stack_lvl+0x8c/0xd0 [ 17.335935] print_report+0x118/0x5d0 [ 17.336781] kasan_report+0xdc/0x128 [ 17.337034] __asan_report_load1_noabort+0x20/0x30 [ 17.337673] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.337828] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.337878] kunit_try_run_case+0x170/0x3f0 [ 17.337926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.337978] kthread+0x328/0x630 [ 17.338019] ret_from_fork+0x10/0x20 [ 17.339204] [ 17.339603] The buggy address belongs to the physical page: [ 17.340070] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818 [ 17.340605] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.341038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.341183] page_type: f8(unknown) [ 17.341226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.341278] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.341937] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.342343] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.342961] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff [ 17.343352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.343401] page dumped because: kasan: bad access detected [ 17.343940] [ 17.344120] Memory state around the buggy address: [ 17.344158] fff00000c7819f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.344204] fff00000c7819f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.344248] >fff00000c781a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.345130] ^ [ 17.345422] fff00000c781a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.345466] fff00000c781a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.345504] ================================================================== [ 17.363299] ================================================================== [ 17.363384] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.363440] Read of size 1 at addr fff00000c5a8b2bb by task kunit_try_catch/225 [ 17.363491] [ 17.363524] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.363720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.363753] Hardware name: linux,dummy-virt (DT) [ 17.363783] Call trace: [ 17.363808] show_stack+0x20/0x38 (C) [ 17.363860] dump_stack_lvl+0x8c/0xd0 [ 17.363910] print_report+0x118/0x5d0 [ 17.364002] kasan_report+0xdc/0x128 [ 17.364048] __asan_report_load1_noabort+0x20/0x30 [ 17.364138] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.364191] mempool_slab_oob_right+0xc0/0x118 [ 17.364253] kunit_try_run_case+0x170/0x3f0 [ 17.364311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.364458] kthread+0x328/0x630 [ 17.364502] ret_from_fork+0x10/0x20 [ 17.364551] [ 17.364569] Allocated by task 225: [ 17.364599] kasan_save_stack+0x3c/0x68 [ 17.364639] kasan_save_track+0x20/0x40 [ 17.364701] kasan_save_alloc_info+0x40/0x58 [ 17.364751] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.364804] remove_element+0x16c/0x1f8 [ 17.364841] mempool_alloc_preallocated+0x58/0xc0 [ 17.364879] mempool_oob_right_helper+0x98/0x2f0 [ 17.364933] mempool_slab_oob_right+0xc0/0x118 [ 17.364971] kunit_try_run_case+0x170/0x3f0 [ 17.365009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.365053] kthread+0x328/0x630 [ 17.365085] ret_from_fork+0x10/0x20 [ 17.365122] [ 17.365147] The buggy address belongs to the object at fff00000c5a8b240 [ 17.365147] which belongs to the cache test_cache of size 123 [ 17.365213] The buggy address is located 0 bytes to the right of [ 17.365213] allocated 123-byte region [fff00000c5a8b240, fff00000c5a8b2bb) [ 17.365284] [ 17.365305] The buggy address belongs to the physical page: [ 17.365356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8b [ 17.365408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.365459] page_type: f5(slab) [ 17.365498] raw: 0bfffe0000000000 fff00000c5a56280 dead000000000122 0000000000000000 [ 17.365613] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.365659] page dumped because: kasan: bad access detected [ 17.365692] [ 17.365829] Memory state around the buggy address: [ 17.365868] fff00000c5a8b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.365973] fff00000c5a8b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.366049] >fff00000c5a8b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.366158] ^ [ 17.366222] fff00000c5a8b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.366268] fff00000c5a8b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.366307] ================================================================== [ 17.317305] ================================================================== [ 17.317402] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.317478] Read of size 1 at addr fff00000c7711173 by task kunit_try_catch/221 [ 17.317530] [ 17.317574] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.317661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.317689] Hardware name: linux,dummy-virt (DT) [ 17.317723] Call trace: [ 17.317750] show_stack+0x20/0x38 (C) [ 17.317801] dump_stack_lvl+0x8c/0xd0 [ 17.317852] print_report+0x118/0x5d0 [ 17.317900] kasan_report+0xdc/0x128 [ 17.317945] __asan_report_load1_noabort+0x20/0x30 [ 17.317997] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.318044] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.318092] kunit_try_run_case+0x170/0x3f0 [ 17.318143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.318196] kthread+0x328/0x630 [ 17.318243] ret_from_fork+0x10/0x20 [ 17.318294] [ 17.318312] Allocated by task 221: [ 17.318355] kasan_save_stack+0x3c/0x68 [ 17.318399] kasan_save_track+0x20/0x40 [ 17.318438] kasan_save_alloc_info+0x40/0x58 [ 17.318479] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.318523] remove_element+0x130/0x1f8 [ 17.318562] mempool_alloc_preallocated+0x58/0xc0 [ 17.318601] mempool_oob_right_helper+0x98/0x2f0 [ 17.318641] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.318682] kunit_try_run_case+0x170/0x3f0 [ 17.318720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.318763] kthread+0x328/0x630 [ 17.318797] ret_from_fork+0x10/0x20 [ 17.318833] [ 17.318853] The buggy address belongs to the object at fff00000c7711100 [ 17.318853] which belongs to the cache kmalloc-128 of size 128 [ 17.318915] The buggy address is located 0 bytes to the right of [ 17.318915] allocated 115-byte region [fff00000c7711100, fff00000c7711173) [ 17.318979] [ 17.319002] The buggy address belongs to the physical page: [ 17.319037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107711 [ 17.319089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.319142] page_type: f5(slab) [ 17.319184] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.319235] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.319276] page dumped because: kasan: bad access detected [ 17.319308] [ 17.319335] Memory state around the buggy address: [ 17.319370] fff00000c7711000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.319413] fff00000c7711080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.319456] >fff00000c7711100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.319493] ^ [ 17.319533] fff00000c7711180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.319575] fff00000c7711200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.319613] ==================================================================
[ 13.571573] ================================================================== [ 13.572186] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.572691] Read of size 1 at addr ffff8881030d9d73 by task kunit_try_catch/240 [ 13.572968] [ 13.573092] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.573143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.573155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.573179] Call Trace: [ 13.573191] <TASK> [ 13.573210] dump_stack_lvl+0x73/0xb0 [ 13.573242] print_report+0xd1/0x610 [ 13.573265] ? __virt_addr_valid+0x1db/0x2d0 [ 13.573302] ? mempool_oob_right_helper+0x318/0x380 [ 13.573326] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.573349] ? mempool_oob_right_helper+0x318/0x380 [ 13.573372] kasan_report+0x141/0x180 [ 13.573394] ? mempool_oob_right_helper+0x318/0x380 [ 13.573422] __asan_report_load1_noabort+0x18/0x20 [ 13.573446] mempool_oob_right_helper+0x318/0x380 [ 13.573770] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.573812] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.573838] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.573864] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.573891] ? __pfx_mempool_kfree+0x10/0x10 [ 13.573916] ? __pfx_read_tsc+0x10/0x10 [ 13.573938] ? ktime_get_ts64+0x86/0x230 [ 13.573963] kunit_try_run_case+0x1a5/0x480 [ 13.573990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.574012] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.574039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.574063] ? __kthread_parkme+0x82/0x180 [ 13.574084] ? preempt_count_sub+0x50/0x80 [ 13.574108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.574132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.574156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.574180] kthread+0x337/0x6f0 [ 13.574199] ? trace_preempt_on+0x20/0xc0 [ 13.574222] ? __pfx_kthread+0x10/0x10 [ 13.574242] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.574263] ? calculate_sigpending+0x7b/0xa0 [ 13.574287] ? __pfx_kthread+0x10/0x10 [ 13.574320] ret_from_fork+0x116/0x1d0 [ 13.574339] ? __pfx_kthread+0x10/0x10 [ 13.574359] ret_from_fork_asm+0x1a/0x30 [ 13.574390] </TASK> [ 13.574400] [ 13.584130] Allocated by task 240: [ 13.584339] kasan_save_stack+0x45/0x70 [ 13.584515] kasan_save_track+0x18/0x40 [ 13.585008] kasan_save_alloc_info+0x3b/0x50 [ 13.585199] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.585605] remove_element+0x11e/0x190 [ 13.585862] mempool_alloc_preallocated+0x4d/0x90 [ 13.586131] mempool_oob_right_helper+0x8a/0x380 [ 13.586433] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.586632] kunit_try_run_case+0x1a5/0x480 [ 13.586959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.587213] kthread+0x337/0x6f0 [ 13.587374] ret_from_fork+0x116/0x1d0 [ 13.587541] ret_from_fork_asm+0x1a/0x30 [ 13.587918] [ 13.588004] The buggy address belongs to the object at ffff8881030d9d00 [ 13.588004] which belongs to the cache kmalloc-128 of size 128 [ 13.588693] The buggy address is located 0 bytes to the right of [ 13.588693] allocated 115-byte region [ffff8881030d9d00, ffff8881030d9d73) [ 13.589171] [ 13.589271] The buggy address belongs to the physical page: [ 13.589514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030d9 [ 13.590146] flags: 0x200000000000000(node=0|zone=2) [ 13.590456] page_type: f5(slab) [ 13.590604] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.591044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.591431] page dumped because: kasan: bad access detected [ 13.591783] [ 13.591871] Memory state around the buggy address: [ 13.592062] ffff8881030d9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.592553] ffff8881030d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.592856] >ffff8881030d9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.593152] ^ [ 13.593442] ffff8881030d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.593940] ffff8881030d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.594312] ================================================================== [ 13.622523] ================================================================== [ 13.623084] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.623524] Read of size 1 at addr ffff8881039e82bb by task kunit_try_catch/244 [ 13.624077] [ 13.624253] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.624309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.624321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.624341] Call Trace: [ 13.624353] <TASK> [ 13.624367] dump_stack_lvl+0x73/0xb0 [ 13.624395] print_report+0xd1/0x610 [ 13.624416] ? __virt_addr_valid+0x1db/0x2d0 [ 13.624437] ? mempool_oob_right_helper+0x318/0x380 [ 13.624460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.624483] ? mempool_oob_right_helper+0x318/0x380 [ 13.624506] kasan_report+0x141/0x180 [ 13.624527] ? mempool_oob_right_helper+0x318/0x380 [ 13.624556] __asan_report_load1_noabort+0x18/0x20 [ 13.624580] mempool_oob_right_helper+0x318/0x380 [ 13.624604] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.624627] ? update_load_avg+0x1be/0x21b0 [ 13.624665] ? finish_task_switch.isra.0+0x153/0x700 [ 13.624690] mempool_slab_oob_right+0xed/0x140 [ 13.624714] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.624740] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.624764] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.624789] ? __pfx_read_tsc+0x10/0x10 [ 13.624808] ? ktime_get_ts64+0x86/0x230 [ 13.624832] kunit_try_run_case+0x1a5/0x480 [ 13.624856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.624878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.624901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.624924] ? __kthread_parkme+0x82/0x180 [ 13.624950] ? preempt_count_sub+0x50/0x80 [ 13.624973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.624996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.625062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.625088] kthread+0x337/0x6f0 [ 13.625106] ? trace_preempt_on+0x20/0xc0 [ 13.625129] ? __pfx_kthread+0x10/0x10 [ 13.625149] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.625171] ? calculate_sigpending+0x7b/0xa0 [ 13.625194] ? __pfx_kthread+0x10/0x10 [ 13.625216] ret_from_fork+0x116/0x1d0 [ 13.625233] ? __pfx_kthread+0x10/0x10 [ 13.625253] ret_from_fork_asm+0x1a/0x30 [ 13.625283] </TASK> [ 13.625304] [ 13.639434] Allocated by task 244: [ 13.639758] kasan_save_stack+0x45/0x70 [ 13.640148] kasan_save_track+0x18/0x40 [ 13.640505] kasan_save_alloc_info+0x3b/0x50 [ 13.640892] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.641254] remove_element+0x11e/0x190 [ 13.641408] mempool_alloc_preallocated+0x4d/0x90 [ 13.641607] mempool_oob_right_helper+0x8a/0x380 [ 13.642012] mempool_slab_oob_right+0xed/0x140 [ 13.642583] kunit_try_run_case+0x1a5/0x480 [ 13.642973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.643496] kthread+0x337/0x6f0 [ 13.643881] ret_from_fork+0x116/0x1d0 [ 13.644250] ret_from_fork_asm+0x1a/0x30 [ 13.644445] [ 13.644564] The buggy address belongs to the object at ffff8881039e8240 [ 13.644564] which belongs to the cache test_cache of size 123 [ 13.644923] The buggy address is located 0 bytes to the right of [ 13.644923] allocated 123-byte region [ffff8881039e8240, ffff8881039e82bb) [ 13.645459] [ 13.645549] The buggy address belongs to the physical page: [ 13.645795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e8 [ 13.646250] flags: 0x200000000000000(node=0|zone=2) [ 13.646462] page_type: f5(slab) [ 13.646659] raw: 0200000000000000 ffff888101093c80 dead000000000122 0000000000000000 [ 13.646955] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.647459] page dumped because: kasan: bad access detected [ 13.647673] [ 13.647779] Memory state around the buggy address: [ 13.648006] ffff8881039e8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.648225] ffff8881039e8200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.648762] >ffff8881039e8280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.649008] ^ [ 13.649230] ffff8881039e8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.649662] ffff8881039e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.649936] ================================================================== [ 13.597424] ================================================================== [ 13.597829] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.598432] Read of size 1 at addr ffff888103a6e001 by task kunit_try_catch/242 [ 13.599412] [ 13.599658] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.599706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.599719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.599741] Call Trace: [ 13.599752] <TASK> [ 13.599768] dump_stack_lvl+0x73/0xb0 [ 13.599799] print_report+0xd1/0x610 [ 13.599821] ? __virt_addr_valid+0x1db/0x2d0 [ 13.599844] ? mempool_oob_right_helper+0x318/0x380 [ 13.599868] ? kasan_addr_to_slab+0x11/0xa0 [ 13.599889] ? mempool_oob_right_helper+0x318/0x380 [ 13.599912] kasan_report+0x141/0x180 [ 13.599933] ? mempool_oob_right_helper+0x318/0x380 [ 13.599962] __asan_report_load1_noabort+0x18/0x20 [ 13.599986] mempool_oob_right_helper+0x318/0x380 [ 13.600010] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.600046] ? update_load_avg+0x1be/0x21b0 [ 13.600070] ? dequeue_entities+0x27e/0x1740 [ 13.600094] ? finish_task_switch.isra.0+0x153/0x700 [ 13.600119] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.600144] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.600172] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.600196] ? __pfx_mempool_kfree+0x10/0x10 [ 13.600220] ? __pfx_read_tsc+0x10/0x10 [ 13.600241] ? ktime_get_ts64+0x86/0x230 [ 13.600265] kunit_try_run_case+0x1a5/0x480 [ 13.600302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.600324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.600350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.600373] ? __kthread_parkme+0x82/0x180 [ 13.600394] ? preempt_count_sub+0x50/0x80 [ 13.600417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.600441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.600464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.600565] kthread+0x337/0x6f0 [ 13.600585] ? trace_preempt_on+0x20/0xc0 [ 13.600608] ? __pfx_kthread+0x10/0x10 [ 13.600628] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.600651] ? calculate_sigpending+0x7b/0xa0 [ 13.600675] ? __pfx_kthread+0x10/0x10 [ 13.600695] ret_from_fork+0x116/0x1d0 [ 13.600715] ? __pfx_kthread+0x10/0x10 [ 13.600735] ret_from_fork_asm+0x1a/0x30 [ 13.600766] </TASK> [ 13.600775] [ 13.609882] The buggy address belongs to the physical page: [ 13.610183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a6c [ 13.610504] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.610847] flags: 0x200000000000040(head|node=0|zone=2) [ 13.611152] page_type: f8(unknown) [ 13.611284] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.611795] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.612160] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.612507] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.612820] head: 0200000000000002 ffffea00040e9b01 00000000ffffffff 00000000ffffffff [ 13.613358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.613707] page dumped because: kasan: bad access detected [ 13.613881] [ 13.613950] Memory state around the buggy address: [ 13.614106] ffff888103a6df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.614393] ffff888103a6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.614858] >ffff888103a6e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.615096] ^ [ 13.615212] ffff888103a6e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.615647] ffff888103a6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.615972] ==================================================================