Date
June 25, 2025, 8:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.610964] ================================================================== [ 28.611081] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.611141] Read of size 1 at addr fff00000c79ee001 by task kunit_try_catch/235 [ 28.611703] [ 28.611797] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.612108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.612154] Hardware name: linux,dummy-virt (DT) [ 28.612227] Call trace: [ 28.612335] show_stack+0x20/0x38 (C) [ 28.612526] dump_stack_lvl+0x8c/0xd0 [ 28.612681] print_report+0x118/0x608 [ 28.612862] kasan_report+0xdc/0x128 [ 28.612951] __asan_report_load1_noabort+0x20/0x30 [ 28.613184] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.613239] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.613321] kunit_try_run_case+0x170/0x3f0 [ 28.614238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.614323] kthread+0x328/0x630 [ 28.614504] ret_from_fork+0x10/0x20 [ 28.614779] [ 28.614905] The buggy address belongs to the physical page: [ 28.614941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec [ 28.615035] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.615081] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.615487] page_type: f8(unknown) [ 28.615530] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.615752] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.615916] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.616018] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.616068] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff [ 28.616179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.616243] page dumped because: kasan: bad access detected [ 28.616275] [ 28.616294] Memory state around the buggy address: [ 28.616329] fff00000c79edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.616671] fff00000c79edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.616822] >fff00000c79ee000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.616868] ^ [ 28.616898] fff00000c79ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.616940] fff00000c79ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.616978] ================================================================== [ 28.627370] ================================================================== [ 28.627457] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.627743] Read of size 1 at addr fff00000c786a2bb by task kunit_try_catch/237 [ 28.627920] [ 28.627954] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.628326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.628488] Hardware name: linux,dummy-virt (DT) [ 28.628585] Call trace: [ 28.628610] show_stack+0x20/0x38 (C) [ 28.628662] dump_stack_lvl+0x8c/0xd0 [ 28.628709] print_report+0x118/0x608 [ 28.628766] kasan_report+0xdc/0x128 [ 28.628927] __asan_report_load1_noabort+0x20/0x30 [ 28.628989] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.629038] mempool_slab_oob_right+0xc0/0x118 [ 28.629107] kunit_try_run_case+0x170/0x3f0 [ 28.629314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.629431] kthread+0x328/0x630 [ 28.629607] ret_from_fork+0x10/0x20 [ 28.629662] [ 28.629680] Allocated by task 237: [ 28.629870] kasan_save_stack+0x3c/0x68 [ 28.629917] kasan_save_track+0x20/0x40 [ 28.629954] kasan_save_alloc_info+0x40/0x58 [ 28.629994] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.630258] remove_element+0x16c/0x1f8 [ 28.630325] mempool_alloc_preallocated+0x58/0xc0 [ 28.630383] mempool_oob_right_helper+0x98/0x2f0 [ 28.630462] mempool_slab_oob_right+0xc0/0x118 [ 28.630500] kunit_try_run_case+0x170/0x3f0 [ 28.630538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.630582] kthread+0x328/0x630 [ 28.630679] ret_from_fork+0x10/0x20 [ 28.630716] [ 28.630771] The buggy address belongs to the object at fff00000c786a240 [ 28.630771] which belongs to the cache test_cache of size 123 [ 28.630916] The buggy address is located 0 bytes to the right of [ 28.630916] allocated 123-byte region [fff00000c786a240, fff00000c786a2bb) [ 28.630980] [ 28.631000] The buggy address belongs to the physical page: [ 28.631077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 28.631143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.631374] page_type: f5(slab) [ 28.631510] raw: 0bfffe0000000000 fff00000c790a280 dead000000000122 0000000000000000 [ 28.631594] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.631633] page dumped because: kasan: bad access detected [ 28.631664] [ 28.631682] Memory state around the buggy address: [ 28.631741] fff00000c786a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.631791] fff00000c786a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.631933] >fff00000c786a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.631971] ^ [ 28.632006] fff00000c786a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.632607] fff00000c786a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.632655] ================================================================== [ 28.601929] ================================================================== [ 28.602010] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.602086] Read of size 1 at addr fff00000c5906c73 by task kunit_try_catch/233 [ 28.602134] [ 28.602178] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.602265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.602301] Hardware name: linux,dummy-virt (DT) [ 28.602333] Call trace: [ 28.602357] show_stack+0x20/0x38 (C) [ 28.602423] dump_stack_lvl+0x8c/0xd0 [ 28.602473] print_report+0x118/0x608 [ 28.602524] kasan_report+0xdc/0x128 [ 28.602570] __asan_report_load1_noabort+0x20/0x30 [ 28.602617] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.602668] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.602718] kunit_try_run_case+0x170/0x3f0 [ 28.602767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.602819] kthread+0x328/0x630 [ 28.602863] ret_from_fork+0x10/0x20 [ 28.602913] [ 28.602932] Allocated by task 233: [ 28.602962] kasan_save_stack+0x3c/0x68 [ 28.603001] kasan_save_track+0x20/0x40 [ 28.603040] kasan_save_alloc_info+0x40/0x58 [ 28.603075] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.603119] remove_element+0x130/0x1f8 [ 28.603155] mempool_alloc_preallocated+0x58/0xc0 [ 28.603195] mempool_oob_right_helper+0x98/0x2f0 [ 28.603235] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.603275] kunit_try_run_case+0x170/0x3f0 [ 28.603311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.603355] kthread+0x328/0x630 [ 28.603386] ret_from_fork+0x10/0x20 [ 28.603433] [ 28.603453] The buggy address belongs to the object at fff00000c5906c00 [ 28.603453] which belongs to the cache kmalloc-128 of size 128 [ 28.603512] The buggy address is located 0 bytes to the right of [ 28.603512] allocated 115-byte region [fff00000c5906c00, fff00000c5906c73) [ 28.603575] [ 28.603597] The buggy address belongs to the physical page: [ 28.603633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 28.603689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.603742] page_type: f5(slab) [ 28.603783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.603833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.603899] page dumped because: kasan: bad access detected [ 28.603932] [ 28.603950] Memory state around the buggy address: [ 28.603985] fff00000c5906b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.604028] fff00000c5906b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604070] >fff00000c5906c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.604109] ^ [ 28.604149] fff00000c5906c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604191] fff00000c5906d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.604229] ==================================================================
[ 23.276048] ================================================================== [ 23.276490] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.277139] Read of size 1 at addr ffff88810257ef73 by task kunit_try_catch/250 [ 23.277480] [ 23.277605] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.277660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.277673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.277696] Call Trace: [ 23.277710] <TASK> [ 23.277732] dump_stack_lvl+0x73/0xb0 [ 23.277764] print_report+0xd1/0x650 [ 23.277785] ? __virt_addr_valid+0x1db/0x2d0 [ 23.277810] ? mempool_oob_right_helper+0x318/0x380 [ 23.277833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.277858] ? mempool_oob_right_helper+0x318/0x380 [ 23.277900] kasan_report+0x141/0x180 [ 23.277920] ? mempool_oob_right_helper+0x318/0x380 [ 23.277957] __asan_report_load1_noabort+0x18/0x20 [ 23.277980] mempool_oob_right_helper+0x318/0x380 [ 23.278002] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.278032] mempool_kmalloc_oob_right+0xf2/0x150 [ 23.278053] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 23.278077] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.278102] ? __pfx_mempool_kfree+0x10/0x10 [ 23.278136] ? __pfx_read_tsc+0x10/0x10 [ 23.278158] ? ktime_get_ts64+0x86/0x230 [ 23.278183] kunit_try_run_case+0x1a5/0x480 [ 23.278210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.278231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.278253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.278278] ? __kthread_parkme+0x82/0x180 [ 23.278300] ? preempt_count_sub+0x50/0x80 [ 23.278323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.278345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.278367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.278390] kthread+0x337/0x6f0 [ 23.278409] ? trace_preempt_on+0x20/0xc0 [ 23.278432] ? __pfx_kthread+0x10/0x10 [ 23.278451] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.278474] ? calculate_sigpending+0x7b/0xa0 [ 23.278498] ? __pfx_kthread+0x10/0x10 [ 23.278517] ret_from_fork+0x116/0x1d0 [ 23.278535] ? __pfx_kthread+0x10/0x10 [ 23.278554] ret_from_fork_asm+0x1a/0x30 [ 23.278584] </TASK> [ 23.278596] [ 23.287960] Allocated by task 250: [ 23.288287] kasan_save_stack+0x45/0x70 [ 23.288476] kasan_save_track+0x18/0x40 [ 23.288662] kasan_save_alloc_info+0x3b/0x50 [ 23.288971] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 23.289390] remove_element+0x11e/0x190 [ 23.289586] mempool_alloc_preallocated+0x4d/0x90 [ 23.289800] mempool_oob_right_helper+0x8a/0x380 [ 23.290022] mempool_kmalloc_oob_right+0xf2/0x150 [ 23.290461] kunit_try_run_case+0x1a5/0x480 [ 23.290627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.290995] kthread+0x337/0x6f0 [ 23.291300] ret_from_fork+0x116/0x1d0 [ 23.291505] ret_from_fork_asm+0x1a/0x30 [ 23.291803] [ 23.291901] The buggy address belongs to the object at ffff88810257ef00 [ 23.291901] which belongs to the cache kmalloc-128 of size 128 [ 23.292648] The buggy address is located 0 bytes to the right of [ 23.292648] allocated 115-byte region [ffff88810257ef00, ffff88810257ef73) [ 23.293336] [ 23.293548] The buggy address belongs to the physical page: [ 23.293773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257e [ 23.294182] flags: 0x200000000000000(node=0|zone=2) [ 23.294483] page_type: f5(slab) [ 23.294676] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.295103] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 23.295432] page dumped because: kasan: bad access detected [ 23.295775] [ 23.295964] Memory state around the buggy address: [ 23.296154] ffff88810257ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.296601] ffff88810257ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.296969] >ffff88810257ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.297429] ^ [ 23.297788] ffff88810257ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.298115] ffff88810257f000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 23.298531] ================================================================== [ 23.329535] ================================================================== [ 23.330037] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.330468] Read of size 1 at addr ffff88810259a2bb by task kunit_try_catch/254 [ 23.330770] [ 23.330895] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.330956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.330972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.330994] Call Trace: [ 23.331007] <TASK> [ 23.331024] dump_stack_lvl+0x73/0xb0 [ 23.331102] print_report+0xd1/0x650 [ 23.331148] ? __virt_addr_valid+0x1db/0x2d0 [ 23.331173] ? mempool_oob_right_helper+0x318/0x380 [ 23.331194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.331219] ? mempool_oob_right_helper+0x318/0x380 [ 23.331241] kasan_report+0x141/0x180 [ 23.331271] ? mempool_oob_right_helper+0x318/0x380 [ 23.331296] __asan_report_load1_noabort+0x18/0x20 [ 23.331319] mempool_oob_right_helper+0x318/0x380 [ 23.331353] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.331377] ? __pfx_sched_clock_cpu+0x10/0x10 [ 23.331399] ? finish_task_switch.isra.0+0x153/0x700 [ 23.331425] mempool_slab_oob_right+0xed/0x140 [ 23.331448] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 23.331473] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 23.331496] ? __pfx_mempool_free_slab+0x10/0x10 [ 23.331521] ? __pfx_read_tsc+0x10/0x10 [ 23.331542] ? ktime_get_ts64+0x86/0x230 [ 23.331566] kunit_try_run_case+0x1a5/0x480 [ 23.331592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.331625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.331645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.331670] ? __kthread_parkme+0x82/0x180 [ 23.331700] ? preempt_count_sub+0x50/0x80 [ 23.331721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.331745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.331776] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.331799] kthread+0x337/0x6f0 [ 23.331818] ? trace_preempt_on+0x20/0xc0 [ 23.331851] ? __pfx_kthread+0x10/0x10 [ 23.331909] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.331952] ? calculate_sigpending+0x7b/0xa0 [ 23.331976] ? __pfx_kthread+0x10/0x10 [ 23.331996] ret_from_fork+0x116/0x1d0 [ 23.332015] ? __pfx_kthread+0x10/0x10 [ 23.332034] ret_from_fork_asm+0x1a/0x30 [ 23.332063] </TASK> [ 23.332075] [ 23.343384] Allocated by task 254: [ 23.343557] kasan_save_stack+0x45/0x70 [ 23.343995] kasan_save_track+0x18/0x40 [ 23.344360] kasan_save_alloc_info+0x3b/0x50 [ 23.344565] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 23.344827] remove_element+0x11e/0x190 [ 23.345272] mempool_alloc_preallocated+0x4d/0x90 [ 23.345459] mempool_oob_right_helper+0x8a/0x380 [ 23.345781] mempool_slab_oob_right+0xed/0x140 [ 23.346195] kunit_try_run_case+0x1a5/0x480 [ 23.346359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.346601] kthread+0x337/0x6f0 [ 23.346751] ret_from_fork+0x116/0x1d0 [ 23.346919] ret_from_fork_asm+0x1a/0x30 [ 23.347108] [ 23.347560] The buggy address belongs to the object at ffff88810259a240 [ 23.347560] which belongs to the cache test_cache of size 123 [ 23.348407] The buggy address is located 0 bytes to the right of [ 23.348407] allocated 123-byte region [ffff88810259a240, ffff88810259a2bb) [ 23.349152] [ 23.349245] The buggy address belongs to the physical page: [ 23.349671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10259a [ 23.350244] flags: 0x200000000000000(node=0|zone=2) [ 23.350584] page_type: f5(slab) [ 23.350717] raw: 0200000000000000 ffff888102598000 dead000000000122 0000000000000000 [ 23.351275] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 23.351682] page dumped because: kasan: bad access detected [ 23.352064] [ 23.352169] Memory state around the buggy address: [ 23.352380] ffff88810259a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.352857] ffff88810259a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 23.353283] >ffff88810259a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 23.353670] ^ [ 23.353960] ffff88810259a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.354451] ffff88810259a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.354827] ================================================================== [ 23.301826] ================================================================== [ 23.302530] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 23.302966] Read of size 1 at addr ffff888103966001 by task kunit_try_catch/252 [ 23.303733] [ 23.303848] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.304017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.304040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.304062] Call Trace: [ 23.304076] <TASK> [ 23.304094] dump_stack_lvl+0x73/0xb0 [ 23.304124] print_report+0xd1/0x650 [ 23.304144] ? __virt_addr_valid+0x1db/0x2d0 [ 23.304170] ? mempool_oob_right_helper+0x318/0x380 [ 23.304191] ? kasan_addr_to_slab+0x11/0xa0 [ 23.304210] ? mempool_oob_right_helper+0x318/0x380 [ 23.304231] kasan_report+0x141/0x180 [ 23.304251] ? mempool_oob_right_helper+0x318/0x380 [ 23.304277] __asan_report_load1_noabort+0x18/0x20 [ 23.304299] mempool_oob_right_helper+0x318/0x380 [ 23.304321] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.304351] ? __kasan_check_write+0x18/0x20 [ 23.304373] ? __pfx_sched_clock_cpu+0x10/0x10 [ 23.304394] ? finish_task_switch.isra.0+0x153/0x700 [ 23.304420] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 23.304442] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 23.304468] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.304491] ? __pfx_mempool_kfree+0x10/0x10 [ 23.304513] ? __pfx_read_tsc+0x10/0x10 [ 23.304533] ? ktime_get_ts64+0x86/0x230 [ 23.304557] kunit_try_run_case+0x1a5/0x480 [ 23.304581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.304602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.304622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.304646] ? __kthread_parkme+0x82/0x180 [ 23.304665] ? preempt_count_sub+0x50/0x80 [ 23.304686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.304708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.304732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.304755] kthread+0x337/0x6f0 [ 23.304773] ? trace_preempt_on+0x20/0xc0 [ 23.304795] ? __pfx_kthread+0x10/0x10 [ 23.304816] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.304837] ? calculate_sigpending+0x7b/0xa0 [ 23.304861] ? __pfx_kthread+0x10/0x10 [ 23.304881] ret_from_fork+0x116/0x1d0 [ 23.304899] ? __pfx_kthread+0x10/0x10 [ 23.304918] ret_from_fork_asm+0x1a/0x30 [ 23.304959] </TASK> [ 23.304971] [ 23.313295] The buggy address belongs to the physical page: [ 23.313858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103964 [ 23.314240] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.314900] flags: 0x200000000000040(head|node=0|zone=2) [ 23.315159] page_type: f8(unknown) [ 23.315392] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.315665] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.316648] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.317233] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.317639] head: 0200000000000002 ffffea00040e5901 00000000ffffffff 00000000ffffffff [ 23.317976] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.318307] page dumped because: kasan: bad access detected [ 23.318534] [ 23.318604] Memory state around the buggy address: [ 23.318818] ffff888103965f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.319235] ffff888103965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.319521] >ffff888103966000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.319961] ^ [ 23.320105] ffff888103966080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.320460] ffff888103966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.320774] ==================================================================