Date
Nov. 20, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 38.785156] ================================================================== [ 38.786373] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 38.788182] Read of size 1 at addr fff00000c1bf0f73 by task kunit_try_catch/210 [ 38.789454] [ 38.790505] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.792296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.792858] Hardware name: linux,dummy-virt (DT) [ 38.793764] Call trace: [ 38.794305] show_stack+0x20/0x38 (C) [ 38.794984] dump_stack_lvl+0x8c/0xd0 [ 38.795513] print_report+0x118/0x5e0 [ 38.796149] kasan_report+0xc8/0x118 [ 38.796785] __asan_report_load1_noabort+0x20/0x30 [ 38.797508] mempool_oob_right_helper+0x2ac/0x2f0 [ 38.797989] mempool_kmalloc_oob_right+0xbc/0x118 [ 38.798663] kunit_try_run_case+0x14c/0x3d0 [ 38.799200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.799970] kthread+0x24c/0x2d0 [ 38.800551] ret_from_fork+0x10/0x20 [ 38.801146] [ 38.801465] Allocated by task 210: [ 38.802192] kasan_save_stack+0x3c/0x68 [ 38.802723] kasan_save_track+0x20/0x40 [ 38.803171] kasan_save_alloc_info+0x40/0x58 [ 38.803795] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.804385] remove_element+0x130/0x1f8 [ 38.805016] mempool_alloc_preallocated+0x58/0xc0 [ 38.805541] mempool_oob_right_helper+0x98/0x2f0 [ 38.806551] mempool_kmalloc_oob_right+0xbc/0x118 [ 38.807198] kunit_try_run_case+0x14c/0x3d0 [ 38.807776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.808396] kthread+0x24c/0x2d0 [ 38.808938] ret_from_fork+0x10/0x20 [ 38.809675] [ 38.810057] The buggy address belongs to the object at fff00000c1bf0f00 [ 38.810057] which belongs to the cache kmalloc-128 of size 128 [ 38.811738] The buggy address is located 0 bytes to the right of [ 38.811738] allocated 115-byte region [fff00000c1bf0f00, fff00000c1bf0f73) [ 38.813039] [ 38.813586] The buggy address belongs to the physical page: [ 38.814578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0 [ 38.815577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.816257] page_type: f5(slab) [ 38.816795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.817921] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000 [ 38.818684] page dumped because: kasan: bad access detected [ 38.819294] [ 38.820006] Memory state around the buggy address: [ 38.820527] fff00000c1bf0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.821909] fff00000c1bf0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.822619] >fff00000c1bf0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 38.823310] ^ [ 38.824084] fff00000c1bf0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.824876] fff00000c1bf1000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.826211] ================================================================== [ 38.885066] ================================================================== [ 38.886552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 38.887648] Read of size 1 at addr fff00000c65cd2bb by task kunit_try_catch/214 [ 38.888795] [ 38.889200] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.890633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.891216] Hardware name: linux,dummy-virt (DT) [ 38.891765] Call trace: [ 38.892193] show_stack+0x20/0x38 (C) [ 38.892795] dump_stack_lvl+0x8c/0xd0 [ 38.893675] print_report+0x118/0x5e0 [ 38.894139] kasan_report+0xc8/0x118 [ 38.894671] __asan_report_load1_noabort+0x20/0x30 [ 38.895335] mempool_oob_right_helper+0x2ac/0x2f0 [ 38.895946] mempool_slab_oob_right+0xb8/0x110 [ 38.896536] kunit_try_run_case+0x14c/0x3d0 [ 38.897098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.898175] kthread+0x24c/0x2d0 [ 38.898657] ret_from_fork+0x10/0x20 [ 38.899239] [ 38.899702] Allocated by task 214: [ 38.900109] kasan_save_stack+0x3c/0x68 [ 38.900725] kasan_save_track+0x20/0x40 [ 38.901615] kasan_save_alloc_info+0x40/0x58 [ 38.902237] __kasan_mempool_unpoison_object+0xbc/0x180 [ 38.902829] remove_element+0x16c/0x1f8 [ 38.903410] mempool_alloc_preallocated+0x58/0xc0 [ 38.904022] mempool_oob_right_helper+0x98/0x2f0 [ 38.904683] mempool_slab_oob_right+0xb8/0x110 [ 38.905888] kunit_try_run_case+0x14c/0x3d0 [ 38.906412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.907069] kthread+0x24c/0x2d0 [ 38.907564] ret_from_fork+0x10/0x20 [ 38.908091] [ 38.908435] The buggy address belongs to the object at fff00000c65cd240 [ 38.908435] which belongs to the cache test_cache of size 123 [ 38.909570] The buggy address is located 0 bytes to the right of [ 38.909570] allocated 123-byte region [fff00000c65cd240, fff00000c65cd2bb) [ 38.911405] [ 38.911788] The buggy address belongs to the physical page: [ 38.912602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd [ 38.913986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.914772] page_type: f5(slab) [ 38.915147] raw: 0bfffe0000000000 fff00000c652d3c0 dead000000000122 0000000000000000 [ 38.916058] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 38.916765] page dumped because: kasan: bad access detected [ 38.917479] [ 38.917820] Memory state around the buggy address: [ 38.918688] fff00000c65cd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.919647] fff00000c65cd200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 38.920461] >fff00000c65cd280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 38.921231] ^ [ 38.921840] fff00000c65cd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.922621] fff00000c65cd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.923473] ================================================================== [ 38.839570] ================================================================== [ 38.840503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 38.841293] Read of size 1 at addr fff00000c674e001 by task kunit_try_catch/212 [ 38.841868] [ 38.842187] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.843971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.844586] Hardware name: linux,dummy-virt (DT) [ 38.845801] Call trace: [ 38.846266] show_stack+0x20/0x38 (C) [ 38.847237] dump_stack_lvl+0x8c/0xd0 [ 38.848175] print_report+0x118/0x5e0 [ 38.848845] kasan_report+0xc8/0x118 [ 38.849491] __asan_report_load1_noabort+0x20/0x30 [ 38.850248] mempool_oob_right_helper+0x2ac/0x2f0 [ 38.851037] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 38.851763] kunit_try_run_case+0x14c/0x3d0 [ 38.852333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.853030] kthread+0x24c/0x2d0 [ 38.853869] ret_from_fork+0x10/0x20 [ 38.854274] [ 38.854547] The buggy address belongs to the physical page: [ 38.855049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674c [ 38.855771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.856667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.857546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.858757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.859478] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.860389] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.861862] head: 0bfffe0000000002 ffffc1ffc319d301 ffffffffffffffff 0000000000000000 [ 38.862463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 38.863058] page dumped because: kasan: bad access detected [ 38.863966] [ 38.864298] Memory state around the buggy address: [ 38.864929] fff00000c674df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.865757] fff00000c674df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.866851] >fff00000c674e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.867819] ^ [ 38.868511] fff00000c674e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.869558] fff00000c674e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.870605] ==================================================================
[ 30.421100] ================================================================== [ 30.421912] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 30.423583] Read of size 1 at addr ffff8881029f32bb by task kunit_try_catch/232 [ 30.424665] [ 30.424966] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 30.425812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.426404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.428382] Call Trace: [ 30.428831] <TASK> [ 30.429141] dump_stack_lvl+0x73/0xb0 [ 30.429625] print_report+0xd1/0x640 [ 30.430047] ? __virt_addr_valid+0x1db/0x2d0 [ 30.430803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.431466] kasan_report+0x102/0x140 [ 30.432033] ? mempool_oob_right_helper+0x31a/0x380 [ 30.432612] ? mempool_oob_right_helper+0x31a/0x380 [ 30.433320] __asan_report_load1_noabort+0x18/0x20 [ 30.434292] mempool_oob_right_helper+0x31a/0x380 [ 30.434936] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 30.435495] ? finish_task_switch.isra.0+0x153/0x700 [ 30.436364] mempool_slab_oob_right+0xb1/0x100 [ 30.436829] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 30.437368] ? __switch_to+0x5d9/0xf60 [ 30.438093] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 30.438871] ? __pfx_mempool_free_slab+0x10/0x10 [ 30.439294] ? __pfx_read_tsc+0x10/0x10 [ 30.440090] ? ktime_get_ts64+0x84/0x230 [ 30.440448] kunit_try_run_case+0x1b3/0x490 [ 30.441026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.441911] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.442527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.443175] ? __kthread_parkme+0x82/0x160 [ 30.443906] ? preempt_count_sub+0x50/0x80 [ 30.444465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.444907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.445832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.446822] kthread+0x257/0x310 [ 30.447099] ? __pfx_kthread+0x10/0x10 [ 30.447550] ret_from_fork+0x41/0x80 [ 30.448222] ? __pfx_kthread+0x10/0x10 [ 30.448987] ret_from_fork_asm+0x1a/0x30 [ 30.449413] </TASK> [ 30.449866] [ 30.450037] Allocated by task 232: [ 30.450526] kasan_save_stack+0x3d/0x60 [ 30.451028] kasan_save_track+0x18/0x40 [ 30.451790] kasan_save_alloc_info+0x3b/0x50 [ 30.452453] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 30.453035] remove_element+0x11e/0x190 [ 30.453633] mempool_alloc_preallocated+0x4d/0x90 [ 30.454322] mempool_oob_right_helper+0x8b/0x380 [ 30.454984] mempool_slab_oob_right+0xb1/0x100 [ 30.455309] kunit_try_run_case+0x1b3/0x490 [ 30.455914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.457016] kthread+0x257/0x310 [ 30.457279] ret_from_fork+0x41/0x80 [ 30.457961] ret_from_fork_asm+0x1a/0x30 [ 30.458272] [ 30.458477] The buggy address belongs to the object at ffff8881029f3240 [ 30.458477] which belongs to the cache test_cache of size 123 [ 30.460140] The buggy address is located 0 bytes to the right of [ 30.460140] allocated 123-byte region [ffff8881029f3240, ffff8881029f32bb) [ 30.461476] [ 30.461633] The buggy address belongs to the physical page: [ 30.462522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f3 [ 30.463228] flags: 0x200000000000000(node=0|zone=2) [ 30.464006] page_type: f5(slab) [ 30.464374] raw: 0200000000000000 ffff888101ebcb40 dead000000000122 0000000000000000 [ 30.465089] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 30.466301] page dumped because: kasan: bad access detected [ 30.467010] [ 30.467403] Memory state around the buggy address: [ 30.467853] ffff8881029f3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.468668] ffff8881029f3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 30.469300] >ffff8881029f3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 30.470280] ^ [ 30.470651] ffff8881029f3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.471615] ffff8881029f3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.472371] ================================================================== [ 30.300254] ================================================================== [ 30.300938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 30.301682] Read of size 1 at addr ffff8881029e9973 by task kunit_try_catch/228 [ 30.302183] [ 30.302367] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 30.303393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.303833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.305382] Call Trace: [ 30.305801] <TASK> [ 30.306035] dump_stack_lvl+0x73/0xb0 [ 30.306603] print_report+0xd1/0x640 [ 30.307342] ? __virt_addr_valid+0x1db/0x2d0 [ 30.308484] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.309053] kasan_report+0x102/0x140 [ 30.309573] ? mempool_oob_right_helper+0x31a/0x380 [ 30.310211] ? mempool_oob_right_helper+0x31a/0x380 [ 30.310661] __asan_report_load1_noabort+0x18/0x20 [ 30.311135] mempool_oob_right_helper+0x31a/0x380 [ 30.311569] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 30.312850] ? irqentry_exit+0x2a/0x60 [ 30.313154] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 30.314013] mempool_kmalloc_oob_right+0xb6/0x100 [ 30.315107] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 30.315827] ? __pfx_mempool_kmalloc+0x10/0x10 [ 30.316613] ? __pfx_mempool_kfree+0x10/0x10 [ 30.317348] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 30.318564] kunit_try_run_case+0x1b3/0x490 [ 30.319090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.320242] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.321021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.322307] ? __kthread_parkme+0x82/0x160 [ 30.322824] ? preempt_count_sub+0x50/0x80 [ 30.323187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.323706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.324189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.324912] kthread+0x257/0x310 [ 30.325498] ? __pfx_kthread+0x10/0x10 [ 30.325995] ret_from_fork+0x41/0x80 [ 30.326617] ? __pfx_kthread+0x10/0x10 [ 30.327011] ret_from_fork_asm+0x1a/0x30 [ 30.327595] </TASK> [ 30.327809] [ 30.328108] Allocated by task 228: [ 30.328764] kasan_save_stack+0x3d/0x60 [ 30.329068] kasan_save_track+0x18/0x40 [ 30.329565] kasan_save_alloc_info+0x3b/0x50 [ 30.329975] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 30.330650] remove_element+0x11e/0x190 [ 30.332077] mempool_alloc_preallocated+0x4d/0x90 [ 30.332916] mempool_oob_right_helper+0x8b/0x380 [ 30.333634] mempool_kmalloc_oob_right+0xb6/0x100 [ 30.334400] kunit_try_run_case+0x1b3/0x490 [ 30.335207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.335440] kthread+0x257/0x310 [ 30.335606] ret_from_fork+0x41/0x80 [ 30.336254] ret_from_fork_asm+0x1a/0x30 [ 30.337198] [ 30.337803] The buggy address belongs to the object at ffff8881029e9900 [ 30.337803] which belongs to the cache kmalloc-128 of size 128 [ 30.340467] The buggy address is located 0 bytes to the right of [ 30.340467] allocated 115-byte region [ffff8881029e9900, ffff8881029e9973) [ 30.341617] [ 30.341851] The buggy address belongs to the physical page: [ 30.343775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e9 [ 30.344287] flags: 0x200000000000000(node=0|zone=2) [ 30.344569] page_type: f5(slab) [ 30.344817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 30.345196] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.345574] page dumped because: kasan: bad access detected [ 30.348851] [ 30.351220] Memory state around the buggy address: [ 30.352678] ffff8881029e9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.354880] ffff8881029e9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.356047] >ffff8881029e9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.356814] ^ [ 30.357595] ffff8881029e9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.358742] ffff8881029e9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.359525] ================================================================== [ 30.366741] ================================================================== [ 30.368143] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 30.369163] Read of size 1 at addr ffff888102cae001 by task kunit_try_catch/230 [ 30.370276] [ 30.370930] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 30.372071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.372876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.374319] Call Trace: [ 30.374619] <TASK> [ 30.375197] dump_stack_lvl+0x73/0xb0 [ 30.376221] print_report+0xd1/0x640 [ 30.376677] ? __virt_addr_valid+0x1db/0x2d0 [ 30.377327] ? kasan_addr_to_slab+0x11/0xa0 [ 30.377766] kasan_report+0x102/0x140 [ 30.378542] ? mempool_oob_right_helper+0x31a/0x380 [ 30.379116] ? mempool_oob_right_helper+0x31a/0x380 [ 30.380022] __asan_report_load1_noabort+0x18/0x20 [ 30.380869] mempool_oob_right_helper+0x31a/0x380 [ 30.381656] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 30.382553] mempool_kmalloc_large_oob_right+0xb6/0x100 [ 30.383322] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 30.383832] ? __switch_to+0x5d9/0xf60 [ 30.384451] ? __pfx_mempool_kmalloc+0x10/0x10 [ 30.385279] ? __pfx_mempool_kfree+0x10/0x10 [ 30.386040] ? __pfx_read_tsc+0x10/0x10 [ 30.386529] ? ktime_get_ts64+0x84/0x230 [ 30.387446] kunit_try_run_case+0x1b3/0x490 [ 30.388115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.388940] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.389540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.390778] ? __kthread_parkme+0x82/0x160 [ 30.391624] ? preempt_count_sub+0x50/0x80 [ 30.392449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.393214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.393902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.394909] kthread+0x257/0x310 [ 30.395266] ? __pfx_kthread+0x10/0x10 [ 30.396088] ret_from_fork+0x41/0x80 [ 30.396565] ? __pfx_kthread+0x10/0x10 [ 30.397008] ret_from_fork_asm+0x1a/0x30 [ 30.398005] </TASK> [ 30.398227] [ 30.398746] The buggy address belongs to the physical page: [ 30.399251] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac [ 30.399982] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.400742] flags: 0x200000000000040(head|node=0|zone=2) [ 30.401646] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.402455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.403160] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.403901] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.404794] head: 0200000000000002 ffffea00040b2b01 ffffffffffffffff 0000000000000000 [ 30.405620] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.406489] page dumped because: kasan: bad access detected [ 30.407135] [ 30.407432] Memory state around the buggy address: [ 30.407825] ffff888102cadf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.409104] ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.410080] >ffff888102cae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.410793] ^ [ 30.411172] ffff888102cae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.412526] ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.413110] ==================================================================