Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.246644] ================================================================== [ 17.246737] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.246798] Read of size 1 at addr fff00000c7822001 by task kunit_try_catch/223 [ 17.246851] [ 17.246886] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.246968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.246994] Hardware name: linux,dummy-virt (DT) [ 17.247050] Call trace: [ 17.247076] show_stack+0x20/0x38 (C) [ 17.247126] dump_stack_lvl+0x8c/0xd0 [ 17.247174] print_report+0x118/0x5d0 [ 17.247222] kasan_report+0xdc/0x128 [ 17.247270] __asan_report_load1_noabort+0x20/0x30 [ 17.247320] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.247369] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 17.247419] kunit_try_run_case+0x170/0x3f0 [ 17.247469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.247519] kthread+0x328/0x630 [ 17.247561] ret_from_fork+0x10/0x20 [ 17.247608] [ 17.247628] The buggy address belongs to the physical page: [ 17.247673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820 [ 17.247727] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.247773] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.247828] page_type: f8(unknown) [ 17.247870] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.247921] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.247969] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.248017] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.248065] head: 0bfffe0000000002 ffffc1ffc31e0801 00000000ffffffff 00000000ffffffff [ 17.248114] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.248154] page dumped because: kasan: bad access detected [ 17.248185] [ 17.248203] Memory state around the buggy address: [ 17.248235] fff00000c7821f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.248278] fff00000c7821f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.248320] >fff00000c7822000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.248358] ^ [ 17.248392] fff00000c7822080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.248434] fff00000c7822100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.248471] ================================================================== [ 17.275878] ================================================================== [ 17.275957] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.276022] Read of size 1 at addr fff00000c780f2bb by task kunit_try_catch/225 [ 17.276073] [ 17.276110] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.276193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.276221] Hardware name: linux,dummy-virt (DT) [ 17.276254] Call trace: [ 17.276282] show_stack+0x20/0x38 (C) [ 17.276331] dump_stack_lvl+0x8c/0xd0 [ 17.276385] print_report+0x118/0x5d0 [ 17.276432] kasan_report+0xdc/0x128 [ 17.276479] __asan_report_load1_noabort+0x20/0x30 [ 17.276532] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.276581] mempool_slab_oob_right+0xc0/0x118 [ 17.276629] kunit_try_run_case+0x170/0x3f0 [ 17.276691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.276743] kthread+0x328/0x630 [ 17.276787] ret_from_fork+0x10/0x20 [ 17.276836] [ 17.276855] Allocated by task 225: [ 17.276886] kasan_save_stack+0x3c/0x68 [ 17.276927] kasan_save_track+0x20/0x40 [ 17.276964] kasan_save_alloc_info+0x40/0x58 [ 17.277005] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.277046] remove_element+0x16c/0x1f8 [ 17.277084] mempool_alloc_preallocated+0x58/0xc0 [ 17.277126] mempool_oob_right_helper+0x98/0x2f0 [ 17.277165] mempool_slab_oob_right+0xc0/0x118 [ 17.277203] kunit_try_run_case+0x170/0x3f0 [ 17.277241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.277282] kthread+0x328/0x630 [ 17.277315] ret_from_fork+0x10/0x20 [ 17.277351] [ 17.277371] The buggy address belongs to the object at fff00000c780f240 [ 17.277371] which belongs to the cache test_cache of size 123 [ 17.277428] The buggy address is located 0 bytes to the right of [ 17.277428] allocated 123-byte region [fff00000c780f240, fff00000c780f2bb) [ 17.277491] [ 17.277512] The buggy address belongs to the physical page: [ 17.277544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780f [ 17.277597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.277648] page_type: f5(slab) [ 17.277696] raw: 0bfffe0000000000 fff00000c4370c80 dead000000000122 0000000000000000 [ 17.277746] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.277787] page dumped because: kasan: bad access detected [ 17.277818] [ 17.277836] Memory state around the buggy address: [ 17.277870] fff00000c780f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.277913] fff00000c780f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 17.277955] >fff00000c780f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 17.277993] ^ [ 17.278027] fff00000c780f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.278068] fff00000c780f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.278107] ================================================================== [ 17.215344] ================================================================== [ 17.215445] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 17.215524] Read of size 1 at addr fff00000c7001173 by task kunit_try_catch/221 [ 17.215578] [ 17.215623] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.215727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.215754] Hardware name: linux,dummy-virt (DT) [ 17.215789] Call trace: [ 17.215814] show_stack+0x20/0x38 (C) [ 17.215868] dump_stack_lvl+0x8c/0xd0 [ 17.215921] print_report+0x118/0x5d0 [ 17.215967] kasan_report+0xdc/0x128 [ 17.216013] __asan_report_load1_noabort+0x20/0x30 [ 17.216062] mempool_oob_right_helper+0x2ac/0x2f0 [ 17.216111] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.216160] kunit_try_run_case+0x170/0x3f0 [ 17.216211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.216264] kthread+0x328/0x630 [ 17.216306] ret_from_fork+0x10/0x20 [ 17.216356] [ 17.216375] Allocated by task 221: [ 17.216408] kasan_save_stack+0x3c/0x68 [ 17.216452] kasan_save_track+0x20/0x40 [ 17.216491] kasan_save_alloc_info+0x40/0x58 [ 17.216531] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.216574] remove_element+0x130/0x1f8 [ 17.216611] mempool_alloc_preallocated+0x58/0xc0 [ 17.216650] mempool_oob_right_helper+0x98/0x2f0 [ 17.216699] mempool_kmalloc_oob_right+0xc4/0x120 [ 17.216737] kunit_try_run_case+0x170/0x3f0 [ 17.216776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.216819] kthread+0x328/0x630 [ 17.216851] ret_from_fork+0x10/0x20 [ 17.216887] [ 17.216908] The buggy address belongs to the object at fff00000c7001100 [ 17.216908] which belongs to the cache kmalloc-128 of size 128 [ 17.216966] The buggy address is located 0 bytes to the right of [ 17.216966] allocated 115-byte region [fff00000c7001100, fff00000c7001173) [ 17.217029] [ 17.217051] The buggy address belongs to the physical page: [ 17.217084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107001 [ 17.217141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.217198] page_type: f5(slab) [ 17.217245] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.217297] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.217340] page dumped because: kasan: bad access detected [ 17.217373] [ 17.217392] Memory state around the buggy address: [ 17.217427] fff00000c7001000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.217471] fff00000c7001080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.217514] >fff00000c7001100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.217553] ^ [ 17.217595] fff00000c7001180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.217638] fff00000c7001200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.217685] ==================================================================
[ 13.725010] ================================================================== [ 13.725698] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.726193] Read of size 1 at addr ffff88810272bd73 by task kunit_try_catch/238 [ 13.726615] [ 13.726754] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.726804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.726816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.726837] Call Trace: [ 13.726852] <TASK> [ 13.726870] dump_stack_lvl+0x73/0xb0 [ 13.726902] print_report+0xd1/0x610 [ 13.726937] ? __virt_addr_valid+0x1db/0x2d0 [ 13.726962] ? mempool_oob_right_helper+0x318/0x380 [ 13.726984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.727006] ? mempool_oob_right_helper+0x318/0x380 [ 13.727028] kasan_report+0x141/0x180 [ 13.727049] ? mempool_oob_right_helper+0x318/0x380 [ 13.727303] __asan_report_load1_noabort+0x18/0x20 [ 13.727335] mempool_oob_right_helper+0x318/0x380 [ 13.727361] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.727384] ? __kasan_check_write+0x18/0x20 [ 13.727403] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.727425] ? irqentry_exit+0x2a/0x60 [ 13.727446] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.727472] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.727494] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 13.727519] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.727544] ? __pfx_mempool_kfree+0x10/0x10 [ 13.727568] ? __pfx_read_tsc+0x10/0x10 [ 13.727589] ? ktime_get_ts64+0x86/0x230 [ 13.727613] kunit_try_run_case+0x1a5/0x480 [ 13.727639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.727661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.727700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.727723] ? __kthread_parkme+0x82/0x180 [ 13.727743] ? preempt_count_sub+0x50/0x80 [ 13.727767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.727790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.727812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.727834] kthread+0x337/0x6f0 [ 13.727853] ? trace_preempt_on+0x20/0xc0 [ 13.727876] ? __pfx_kthread+0x10/0x10 [ 13.727895] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.727926] ? calculate_sigpending+0x7b/0xa0 [ 13.727950] ? __pfx_kthread+0x10/0x10 [ 13.727971] ret_from_fork+0x116/0x1d0 [ 13.727989] ? __pfx_kthread+0x10/0x10 [ 13.728008] ret_from_fork_asm+0x1a/0x30 [ 13.728040] </TASK> [ 13.728051] [ 13.740367] Allocated by task 238: [ 13.740650] kasan_save_stack+0x45/0x70 [ 13.740934] kasan_save_track+0x18/0x40 [ 13.741076] kasan_save_alloc_info+0x3b/0x50 [ 13.741286] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.741501] remove_element+0x11e/0x190 [ 13.741776] mempool_alloc_preallocated+0x4d/0x90 [ 13.742006] mempool_oob_right_helper+0x8a/0x380 [ 13.742181] mempool_kmalloc_oob_right+0xf2/0x150 [ 13.742371] kunit_try_run_case+0x1a5/0x480 [ 13.742649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.742818] kthread+0x337/0x6f0 [ 13.743235] ret_from_fork+0x116/0x1d0 [ 13.743483] ret_from_fork_asm+0x1a/0x30 [ 13.743646] [ 13.743718] The buggy address belongs to the object at ffff88810272bd00 [ 13.743718] which belongs to the cache kmalloc-128 of size 128 [ 13.744485] The buggy address is located 0 bytes to the right of [ 13.744485] allocated 115-byte region [ffff88810272bd00, ffff88810272bd73) [ 13.745152] [ 13.745255] The buggy address belongs to the physical page: [ 13.745594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10272b [ 13.746003] flags: 0x200000000000000(node=0|zone=2) [ 13.746252] page_type: f5(slab) [ 13.746384] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.746691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.747086] page dumped because: kasan: bad access detected [ 13.747291] [ 13.747511] Memory state around the buggy address: [ 13.747878] ffff88810272bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.748171] ffff88810272bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.748548] >ffff88810272bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.748921] ^ [ 13.749195] ffff88810272bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.749618] ffff88810272be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 13.749987] ================================================================== [ 13.782587] ================================================================== [ 13.783658] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.784074] Read of size 1 at addr ffff888103af02bb by task kunit_try_catch/242 [ 13.784518] [ 13.784654] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.784700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.784712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.784733] Call Trace: [ 13.784776] <TASK> [ 13.784818] dump_stack_lvl+0x73/0xb0 [ 13.784848] print_report+0xd1/0x610 [ 13.784895] ? __virt_addr_valid+0x1db/0x2d0 [ 13.784928] ? mempool_oob_right_helper+0x318/0x380 [ 13.784951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.784972] ? mempool_oob_right_helper+0x318/0x380 [ 13.784994] kasan_report+0x141/0x180 [ 13.785015] ? mempool_oob_right_helper+0x318/0x380 [ 13.785044] __asan_report_load1_noabort+0x18/0x20 [ 13.785067] mempool_oob_right_helper+0x318/0x380 [ 13.785089] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.785114] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.785135] ? finish_task_switch.isra.0+0x153/0x700 [ 13.785161] mempool_slab_oob_right+0xed/0x140 [ 13.785183] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 13.785208] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.785232] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.785257] ? __pfx_read_tsc+0x10/0x10 [ 13.785277] ? ktime_get_ts64+0x86/0x230 [ 13.785301] kunit_try_run_case+0x1a5/0x480 [ 13.785325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.785388] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.785415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.785437] ? __kthread_parkme+0x82/0x180 [ 13.785457] ? preempt_count_sub+0x50/0x80 [ 13.785479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.785502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.785524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.785546] kthread+0x337/0x6f0 [ 13.785565] ? trace_preempt_on+0x20/0xc0 [ 13.785586] ? __pfx_kthread+0x10/0x10 [ 13.785606] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.785626] ? calculate_sigpending+0x7b/0xa0 [ 13.785648] ? __pfx_kthread+0x10/0x10 [ 13.785669] ret_from_fork+0x116/0x1d0 [ 13.785700] ? __pfx_kthread+0x10/0x10 [ 13.785719] ret_from_fork_asm+0x1a/0x30 [ 13.785750] </TASK> [ 13.785761] [ 13.798324] Allocated by task 242: [ 13.798514] kasan_save_stack+0x45/0x70 [ 13.799059] kasan_save_track+0x18/0x40 [ 13.799248] kasan_save_alloc_info+0x3b/0x50 [ 13.799596] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.800030] remove_element+0x11e/0x190 [ 13.800189] mempool_alloc_preallocated+0x4d/0x90 [ 13.800637] mempool_oob_right_helper+0x8a/0x380 [ 13.800986] mempool_slab_oob_right+0xed/0x140 [ 13.801219] kunit_try_run_case+0x1a5/0x480 [ 13.801635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.802074] kthread+0x337/0x6f0 [ 13.802340] ret_from_fork+0x116/0x1d0 [ 13.802849] ret_from_fork_asm+0x1a/0x30 [ 13.803144] [ 13.803225] The buggy address belongs to the object at ffff888103af0240 [ 13.803225] which belongs to the cache test_cache of size 123 [ 13.804128] The buggy address is located 0 bytes to the right of [ 13.804128] allocated 123-byte region [ffff888103af0240, ffff888103af02bb) [ 13.804965] [ 13.805050] The buggy address belongs to the physical page: [ 13.805300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103af0 [ 13.805931] flags: 0x200000000000000(node=0|zone=2) [ 13.806267] page_type: f5(slab) [ 13.806653] raw: 0200000000000000 ffff8881015acb40 dead000000000122 0000000000000000 [ 13.807124] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.807792] page dumped because: kasan: bad access detected [ 13.808055] [ 13.808148] Memory state around the buggy address: [ 13.808633] ffff888103af0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.809064] ffff888103af0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 13.809608] >ffff888103af0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 13.810054] ^ [ 13.810424] ffff888103af0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.810875] ffff888103af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.811291] ================================================================== [ 13.752866] ================================================================== [ 13.753804] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 13.754229] Read of size 1 at addr ffff888103abe001 by task kunit_try_catch/240 [ 13.754585] [ 13.754700] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.754742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.754753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.754773] Call Trace: [ 13.754784] <TASK> [ 13.754800] dump_stack_lvl+0x73/0xb0 [ 13.754828] print_report+0xd1/0x610 [ 13.754849] ? __virt_addr_valid+0x1db/0x2d0 [ 13.754871] ? mempool_oob_right_helper+0x318/0x380 [ 13.754926] ? kasan_addr_to_slab+0x11/0xa0 [ 13.754947] ? mempool_oob_right_helper+0x318/0x380 [ 13.754969] kasan_report+0x141/0x180 [ 13.754991] ? mempool_oob_right_helper+0x318/0x380 [ 13.755017] __asan_report_load1_noabort+0x18/0x20 [ 13.755041] mempool_oob_right_helper+0x318/0x380 [ 13.755074] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 13.755096] ? update_load_avg+0x1be/0x21b0 [ 13.755124] ? finish_task_switch.isra.0+0x153/0x700 [ 13.755167] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 13.755191] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 13.755217] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.755239] ? __pfx_mempool_kfree+0x10/0x10 [ 13.755263] ? __pfx_read_tsc+0x10/0x10 [ 13.755284] ? ktime_get_ts64+0x86/0x230 [ 13.755306] kunit_try_run_case+0x1a5/0x480 [ 13.755329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.755351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.755373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.755395] ? __kthread_parkme+0x82/0x180 [ 13.755431] ? preempt_count_sub+0x50/0x80 [ 13.755454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.755476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.755498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.755521] kthread+0x337/0x6f0 [ 13.755540] ? trace_preempt_on+0x20/0xc0 [ 13.755561] ? __pfx_kthread+0x10/0x10 [ 13.755581] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.755602] ? calculate_sigpending+0x7b/0xa0 [ 13.755624] ? __pfx_kthread+0x10/0x10 [ 13.755645] ret_from_fork+0x116/0x1d0 [ 13.755662] ? __pfx_kthread+0x10/0x10 [ 13.755681] ret_from_fork_asm+0x1a/0x30 [ 13.755710] </TASK> [ 13.755720] [ 13.767618] The buggy address belongs to the physical page: [ 13.768368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103abc [ 13.769218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.769728] flags: 0x200000000000040(head|node=0|zone=2) [ 13.769927] page_type: f8(unknown) [ 13.770056] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.770288] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.770534] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.771180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.772077] head: 0200000000000002 ffffea00040eaf01 00000000ffffffff 00000000ffffffff [ 13.772895] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.773702] page dumped because: kasan: bad access detected [ 13.774269] [ 13.774447] Memory state around the buggy address: [ 13.775044] ffff888103abdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.775632] ffff888103abdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.776152] >ffff888103abe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.776878] ^ [ 13.777016] ffff888103abe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.777757] ffff888103abe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 13.778201] ==================================================================