Date
June 19, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.860922] ================================================================== [ 32.861025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.861121] Read of size 1 at addr fff00000c76d22bb by task kunit_try_catch/236 [ 32.861182] [ 32.861233] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.861341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.861372] Hardware name: linux,dummy-virt (DT) [ 32.861412] Call trace: [ 32.861439] show_stack+0x20/0x38 (C) [ 32.861499] dump_stack_lvl+0x8c/0xd0 [ 32.861554] print_report+0x118/0x608 [ 32.861608] kasan_report+0xdc/0x128 [ 32.861660] __asan_report_load1_noabort+0x20/0x30 [ 32.861718] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.861770] mempool_slab_oob_right+0xc0/0x118 [ 32.861823] kunit_try_run_case+0x170/0x3f0 [ 32.861883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862348] kthread+0x328/0x630 [ 32.862411] ret_from_fork+0x10/0x20 [ 32.862557] [ 32.862617] Allocated by task 236: [ 32.862699] kasan_save_stack+0x3c/0x68 [ 32.862775] kasan_save_track+0x20/0x40 [ 32.862971] kasan_save_alloc_info+0x40/0x58 [ 32.863028] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.863078] remove_element+0x16c/0x1f8 [ 32.863127] mempool_alloc_preallocated+0x58/0xc0 [ 32.863171] mempool_oob_right_helper+0x98/0x2f0 [ 32.863215] mempool_slab_oob_right+0xc0/0x118 [ 32.863256] kunit_try_run_case+0x170/0x3f0 [ 32.863318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.863391] kthread+0x328/0x630 [ 32.863433] ret_from_fork+0x10/0x20 [ 32.863474] [ 32.863508] The buggy address belongs to the object at fff00000c76d2240 [ 32.863508] which belongs to the cache test_cache of size 123 [ 32.863711] The buggy address is located 0 bytes to the right of [ 32.863711] allocated 123-byte region [fff00000c76d2240, fff00000c76d22bb) [ 32.863958] [ 32.863998] The buggy address belongs to the physical page: [ 32.864037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d2 [ 32.864100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.864161] page_type: f5(slab) [ 32.864211] raw: 0bfffe0000000000 fff00000c76a5140 dead000000000122 0000000000000000 [ 32.864269] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.864315] page dumped because: kasan: bad access detected [ 32.864353] [ 32.864375] Memory state around the buggy address: [ 32.864416] fff00000c76d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.864465] fff00000c76d2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.864514] >fff00000c76d2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.864557] ^ [ 32.864597] fff00000c76d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.864644] fff00000c76d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.865517] ================================================================== [ 32.830748] ================================================================== [ 32.830865] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.831027] Read of size 1 at addr fff00000c649d373 by task kunit_try_catch/232 [ 32.831089] [ 32.831146] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.831252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.831283] Hardware name: linux,dummy-virt (DT) [ 32.831324] Call trace: [ 32.831353] show_stack+0x20/0x38 (C) [ 32.831418] dump_stack_lvl+0x8c/0xd0 [ 32.831477] print_report+0x118/0x608 [ 32.831530] kasan_report+0xdc/0x128 [ 32.831583] __asan_report_load1_noabort+0x20/0x30 [ 32.831641] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.831694] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.831751] kunit_try_run_case+0x170/0x3f0 [ 32.831809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.831868] kthread+0x328/0x630 [ 32.831934] ret_from_fork+0x10/0x20 [ 32.831993] [ 32.832015] Allocated by task 232: [ 32.832048] kasan_save_stack+0x3c/0x68 [ 32.832100] kasan_save_track+0x20/0x40 [ 32.832142] kasan_save_alloc_info+0x40/0x58 [ 32.832189] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.832238] remove_element+0x130/0x1f8 [ 32.832280] mempool_alloc_preallocated+0x58/0xc0 [ 32.832324] mempool_oob_right_helper+0x98/0x2f0 [ 32.832367] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.832413] kunit_try_run_case+0x170/0x3f0 [ 32.832456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.832504] kthread+0x328/0x630 [ 32.832539] ret_from_fork+0x10/0x20 [ 32.832578] [ 32.832604] The buggy address belongs to the object at fff00000c649d300 [ 32.832604] which belongs to the cache kmalloc-128 of size 128 [ 32.832670] The buggy address is located 0 bytes to the right of [ 32.832670] allocated 115-byte region [fff00000c649d300, fff00000c649d373) [ 32.832738] [ 32.832766] The buggy address belongs to the physical page: [ 32.832807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d [ 32.832869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.832946] page_type: f5(slab) [ 32.832997] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.833056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.833103] page dumped because: kasan: bad access detected [ 32.833140] [ 32.833159] Memory state around the buggy address: [ 32.833199] fff00000c649d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.833248] fff00000c649d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.833296] >fff00000c649d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.833339] ^ [ 32.833385] fff00000c649d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.833433] fff00000c649d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.833506] ================================================================== [ 32.845160] ================================================================== [ 32.845910] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.846029] Read of size 1 at addr fff00000c63ea001 by task kunit_try_catch/234 [ 32.846093] [ 32.846144] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.846263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.846295] Hardware name: linux,dummy-virt (DT) [ 32.846332] Call trace: [ 32.846360] show_stack+0x20/0x38 (C) [ 32.846423] dump_stack_lvl+0x8c/0xd0 [ 32.846479] print_report+0x118/0x608 [ 32.846532] kasan_report+0xdc/0x128 [ 32.846585] __asan_report_load1_noabort+0x20/0x30 [ 32.846643] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.846697] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.846754] kunit_try_run_case+0x170/0x3f0 [ 32.846836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.846933] kthread+0x328/0x630 [ 32.847054] ret_from_fork+0x10/0x20 [ 32.847410] [ 32.847505] The buggy address belongs to the physical page: [ 32.847666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e8 [ 32.847938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.847998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.848067] page_type: f8(unknown) [ 32.848119] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.848246] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.848612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.848675] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.848732] head: 0bfffe0000000002 ffffc1ffc318fa01 00000000ffffffff 00000000ffffffff [ 32.848865] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.848929] page dumped because: kasan: bad access detected [ 32.849389] [ 32.849419] Memory state around the buggy address: [ 32.849462] fff00000c63e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.849647] fff00000c63e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.849707] >fff00000c63ea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.849752] ^ [ 32.849797] fff00000c63ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.849852] fff00000c63ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.849907] ==================================================================
[ 28.708483] ================================================================== [ 28.709014] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 28.709687] Read of size 1 at addr ffff88810326a2bb by task kunit_try_catch/254 [ 28.710333] [ 28.710496] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 28.710611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.710627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.710657] Call Trace: [ 28.710677] <TASK> [ 28.710702] dump_stack_lvl+0x73/0xb0 [ 28.710762] print_report+0xd1/0x650 [ 28.710801] ? __virt_addr_valid+0x1db/0x2d0 [ 28.710845] ? mempool_oob_right_helper+0x318/0x380 [ 28.710890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.710960] ? mempool_oob_right_helper+0x318/0x380 [ 28.711160] kasan_report+0x141/0x180 [ 28.711210] ? mempool_oob_right_helper+0x318/0x380 [ 28.711271] __asan_report_load1_noabort+0x18/0x20 [ 28.711325] mempool_oob_right_helper+0x318/0x380 [ 28.711378] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.711409] ? update_load_avg+0x1be/0x21b0 [ 28.711443] ? finish_task_switch.isra.0+0x153/0x700 [ 28.711474] mempool_slab_oob_right+0xed/0x140 [ 28.711501] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 28.711543] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 28.711584] ? __pfx_mempool_free_slab+0x10/0x10 [ 28.711625] ? __pfx_read_tsc+0x10/0x10 [ 28.711664] ? ktime_get_ts64+0x86/0x230 [ 28.711706] kunit_try_run_case+0x1a5/0x480 [ 28.711753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.711799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.711848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.711899] ? __kthread_parkme+0x82/0x180 [ 28.711984] ? preempt_count_sub+0x50/0x80 [ 28.712038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.712089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.712175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.712231] kthread+0x337/0x6f0 [ 28.712276] ? trace_preempt_on+0x20/0xc0 [ 28.712318] ? __pfx_kthread+0x10/0x10 [ 28.712352] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.712388] ? calculate_sigpending+0x7b/0xa0 [ 28.712427] ? __pfx_kthread+0x10/0x10 [ 28.712463] ret_from_fork+0x116/0x1d0 [ 28.712495] ? __pfx_kthread+0x10/0x10 [ 28.712520] ret_from_fork_asm+0x1a/0x30 [ 28.712556] </TASK> [ 28.712570] [ 28.722958] Allocated by task 254: [ 28.723530] kasan_save_stack+0x45/0x70 [ 28.723888] kasan_save_track+0x18/0x40 [ 28.724310] kasan_save_alloc_info+0x3b/0x50 [ 28.724660] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 28.725287] remove_element+0x11e/0x190 [ 28.725639] mempool_alloc_preallocated+0x4d/0x90 [ 28.726220] mempool_oob_right_helper+0x8a/0x380 [ 28.726513] mempool_slab_oob_right+0xed/0x140 [ 28.726724] kunit_try_run_case+0x1a5/0x480 [ 28.726914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.727431] kthread+0x337/0x6f0 [ 28.727687] ret_from_fork+0x116/0x1d0 [ 28.728023] ret_from_fork_asm+0x1a/0x30 [ 28.728378] [ 28.728508] The buggy address belongs to the object at ffff88810326a240 [ 28.728508] which belongs to the cache test_cache of size 123 [ 28.728928] The buggy address is located 0 bytes to the right of [ 28.728928] allocated 123-byte region [ffff88810326a240, ffff88810326a2bb) [ 28.729743] [ 28.729906] The buggy address belongs to the physical page: [ 28.730588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10326a [ 28.731066] flags: 0x200000000000000(node=0|zone=2) [ 28.731524] page_type: f5(slab) [ 28.731713] raw: 0200000000000000 ffff888103267000 dead000000000122 0000000000000000 [ 28.732064] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.732703] page dumped because: kasan: bad access detected [ 28.733350] [ 28.733487] Memory state around the buggy address: [ 28.733694] ffff88810326a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.733939] ffff88810326a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.734330] >ffff88810326a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.734856] ^ [ 28.735594] ffff88810326a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.736349] ffff88810326a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.736873] ================================================================== [ 28.632960] ================================================================== [ 28.633553] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 28.634201] Read of size 1 at addr ffff888103259473 by task kunit_try_catch/250 [ 28.634452] [ 28.634599] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 28.634703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.634728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.634769] Call Trace: [ 28.634800] <TASK> [ 28.634842] dump_stack_lvl+0x73/0xb0 [ 28.634932] print_report+0xd1/0x650 [ 28.634975] ? __virt_addr_valid+0x1db/0x2d0 [ 28.635022] ? mempool_oob_right_helper+0x318/0x380 [ 28.635063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.635126] ? mempool_oob_right_helper+0x318/0x380 [ 28.635175] kasan_report+0x141/0x180 [ 28.635223] ? mempool_oob_right_helper+0x318/0x380 [ 28.635282] __asan_report_load1_noabort+0x18/0x20 [ 28.635328] mempool_oob_right_helper+0x318/0x380 [ 28.635372] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.635419] ? __kasan_check_write+0x18/0x20 [ 28.635466] ? __pfx_sched_clock_cpu+0x10/0x10 [ 28.635519] ? finish_task_switch.isra.0+0x153/0x700 [ 28.635580] mempool_kmalloc_oob_right+0xf2/0x150 [ 28.635635] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 28.635692] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.635942] ? __pfx_mempool_kfree+0x10/0x10 [ 28.636529] ? __pfx_read_tsc+0x10/0x10 [ 28.636588] ? ktime_get_ts64+0x86/0x230 [ 28.636649] kunit_try_run_case+0x1a5/0x480 [ 28.636701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.636741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.636770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.636796] ? __kthread_parkme+0x82/0x180 [ 28.636821] ? preempt_count_sub+0x50/0x80 [ 28.636848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.636873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.636919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.636966] kthread+0x337/0x6f0 [ 28.637130] ? trace_preempt_on+0x20/0xc0 [ 28.637163] ? __pfx_kthread+0x10/0x10 [ 28.637186] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.637209] ? calculate_sigpending+0x7b/0xa0 [ 28.637238] ? __pfx_kthread+0x10/0x10 [ 28.637262] ret_from_fork+0x116/0x1d0 [ 28.637284] ? __pfx_kthread+0x10/0x10 [ 28.637307] ret_from_fork_asm+0x1a/0x30 [ 28.637342] </TASK> [ 28.637356] [ 28.649521] Allocated by task 250: [ 28.649832] kasan_save_stack+0x45/0x70 [ 28.650060] kasan_save_track+0x18/0x40 [ 28.650574] kasan_save_alloc_info+0x3b/0x50 [ 28.650924] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 28.651216] remove_element+0x11e/0x190 [ 28.651408] mempool_alloc_preallocated+0x4d/0x90 [ 28.651746] mempool_oob_right_helper+0x8a/0x380 [ 28.652068] mempool_kmalloc_oob_right+0xf2/0x150 [ 28.652564] kunit_try_run_case+0x1a5/0x480 [ 28.652792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.653014] kthread+0x337/0x6f0 [ 28.653820] ret_from_fork+0x116/0x1d0 [ 28.654375] ret_from_fork_asm+0x1a/0x30 [ 28.654705] [ 28.654857] The buggy address belongs to the object at ffff888103259400 [ 28.654857] which belongs to the cache kmalloc-128 of size 128 [ 28.655472] The buggy address is located 0 bytes to the right of [ 28.655472] allocated 115-byte region [ffff888103259400, ffff888103259473) [ 28.656283] [ 28.656530] The buggy address belongs to the physical page: [ 28.656750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103259 [ 28.657054] flags: 0x200000000000000(node=0|zone=2) [ 28.657317] page_type: f5(slab) [ 28.657633] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.658749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.659586] page dumped because: kasan: bad access detected [ 28.659819] [ 28.659916] Memory state around the buggy address: [ 28.660140] ffff888103259300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.660419] ffff888103259380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.660860] >ffff888103259400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.661424] ^ [ 28.662865] ffff888103259480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.663650] ffff888103259500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.664198] ================================================================== [ 28.671842] ================================================================== [ 28.672603] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 28.673163] Read of size 1 at addr ffff888102afe001 by task kunit_try_catch/252 [ 28.673667] [ 28.673854] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) [ 28.673961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.673989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.674038] Call Trace: [ 28.674067] <TASK> [ 28.674120] dump_stack_lvl+0x73/0xb0 [ 28.674193] print_report+0xd1/0x650 [ 28.674237] ? __virt_addr_valid+0x1db/0x2d0 [ 28.674281] ? mempool_oob_right_helper+0x318/0x380 [ 28.674325] ? kasan_addr_to_slab+0x11/0xa0 [ 28.674364] ? mempool_oob_right_helper+0x318/0x380 [ 28.674411] kasan_report+0x141/0x180 [ 28.674458] ? mempool_oob_right_helper+0x318/0x380 [ 28.674518] __asan_report_load1_noabort+0x18/0x20 [ 28.674573] mempool_oob_right_helper+0x318/0x380 [ 28.674624] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.674674] ? __kasan_check_write+0x18/0x20 [ 28.674721] ? __pfx_sched_clock_cpu+0x10/0x10 [ 28.674770] ? finish_task_switch.isra.0+0x153/0x700 [ 28.674819] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 28.674862] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 28.674915] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.674967] ? __pfx_mempool_kfree+0x10/0x10 [ 28.675019] ? __pfx_read_tsc+0x10/0x10 [ 28.675064] ? ktime_get_ts64+0x86/0x230 [ 28.675155] kunit_try_run_case+0x1a5/0x480 [ 28.675215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.675264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.675318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.675372] ? __kthread_parkme+0x82/0x180 [ 28.675420] ? preempt_count_sub+0x50/0x80 [ 28.675471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.675515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.675565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.675626] kthread+0x337/0x6f0 [ 28.675662] ? trace_preempt_on+0x20/0xc0 [ 28.675702] ? __pfx_kthread+0x10/0x10 [ 28.675736] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.675776] ? calculate_sigpending+0x7b/0xa0 [ 28.675822] ? __pfx_kthread+0x10/0x10 [ 28.675865] ret_from_fork+0x116/0x1d0 [ 28.675936] ? __pfx_kthread+0x10/0x10 [ 28.676005] ret_from_fork_asm+0x1a/0x30 [ 28.676078] </TASK> [ 28.676142] [ 28.691758] The buggy address belongs to the physical page: [ 28.692929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 28.693529] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.694035] flags: 0x200000000000040(head|node=0|zone=2) [ 28.694465] page_type: f8(unknown) [ 28.694700] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.695056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.696174] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.696348] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.696491] head: 0200000000000002 ffffea00040abf01 00000000ffffffff 00000000ffffffff [ 28.696631] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.696766] page dumped because: kasan: bad access detected [ 28.696871] [ 28.697054] Memory state around the buggy address: [ 28.697479] ffff888102afdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.698437] ffff888102afdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.698657] >ffff888102afe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.698795] ^ [ 28.698874] ffff888102afe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.699116] ffff888102afe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.699541] ==================================================================