Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   38.785156] ==================================================================
[   38.786373] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.788182] Read of size 1 at addr fff00000c1bf0f73 by task kunit_try_catch/210
[   38.789454] 
[   38.790505] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.792296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.792858] Hardware name: linux,dummy-virt (DT)
[   38.793764] Call trace:
[   38.794305]  show_stack+0x20/0x38 (C)
[   38.794984]  dump_stack_lvl+0x8c/0xd0
[   38.795513]  print_report+0x118/0x5e0
[   38.796149]  kasan_report+0xc8/0x118
[   38.796785]  __asan_report_load1_noabort+0x20/0x30
[   38.797508]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.797989]  mempool_kmalloc_oob_right+0xbc/0x118
[   38.798663]  kunit_try_run_case+0x14c/0x3d0
[   38.799200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.799970]  kthread+0x24c/0x2d0
[   38.800551]  ret_from_fork+0x10/0x20
[   38.801146] 
[   38.801465] Allocated by task 210:
[   38.802192]  kasan_save_stack+0x3c/0x68
[   38.802723]  kasan_save_track+0x20/0x40
[   38.803171]  kasan_save_alloc_info+0x40/0x58
[   38.803795]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.804385]  remove_element+0x130/0x1f8
[   38.805016]  mempool_alloc_preallocated+0x58/0xc0
[   38.805541]  mempool_oob_right_helper+0x98/0x2f0
[   38.806551]  mempool_kmalloc_oob_right+0xbc/0x118
[   38.807198]  kunit_try_run_case+0x14c/0x3d0
[   38.807776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.808396]  kthread+0x24c/0x2d0
[   38.808938]  ret_from_fork+0x10/0x20
[   38.809675] 
[   38.810057] The buggy address belongs to the object at fff00000c1bf0f00
[   38.810057]  which belongs to the cache kmalloc-128 of size 128
[   38.811738] The buggy address is located 0 bytes to the right of
[   38.811738]  allocated 115-byte region [fff00000c1bf0f00, fff00000c1bf0f73)
[   38.813039] 
[   38.813586] The buggy address belongs to the physical page:
[   38.814578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0
[   38.815577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.816257] page_type: f5(slab)
[   38.816795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.817921] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   38.818684] page dumped because: kasan: bad access detected
[   38.819294] 
[   38.820006] Memory state around the buggy address:
[   38.820527]  fff00000c1bf0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.821909]  fff00000c1bf0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.822619] >fff00000c1bf0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   38.823310]                                                              ^
[   38.824084]  fff00000c1bf0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.824876]  fff00000c1bf1000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.826211] ==================================================================
[   38.885066] ==================================================================
[   38.886552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.887648] Read of size 1 at addr fff00000c65cd2bb by task kunit_try_catch/214
[   38.888795] 
[   38.889200] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.890633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.891216] Hardware name: linux,dummy-virt (DT)
[   38.891765] Call trace:
[   38.892193]  show_stack+0x20/0x38 (C)
[   38.892795]  dump_stack_lvl+0x8c/0xd0
[   38.893675]  print_report+0x118/0x5e0
[   38.894139]  kasan_report+0xc8/0x118
[   38.894671]  __asan_report_load1_noabort+0x20/0x30
[   38.895335]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.895946]  mempool_slab_oob_right+0xb8/0x110
[   38.896536]  kunit_try_run_case+0x14c/0x3d0
[   38.897098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.898175]  kthread+0x24c/0x2d0
[   38.898657]  ret_from_fork+0x10/0x20
[   38.899239] 
[   38.899702] Allocated by task 214:
[   38.900109]  kasan_save_stack+0x3c/0x68
[   38.900725]  kasan_save_track+0x20/0x40
[   38.901615]  kasan_save_alloc_info+0x40/0x58
[   38.902237]  __kasan_mempool_unpoison_object+0xbc/0x180
[   38.902829]  remove_element+0x16c/0x1f8
[   38.903410]  mempool_alloc_preallocated+0x58/0xc0
[   38.904022]  mempool_oob_right_helper+0x98/0x2f0
[   38.904683]  mempool_slab_oob_right+0xb8/0x110
[   38.905888]  kunit_try_run_case+0x14c/0x3d0
[   38.906412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.907069]  kthread+0x24c/0x2d0
[   38.907564]  ret_from_fork+0x10/0x20
[   38.908091] 
[   38.908435] The buggy address belongs to the object at fff00000c65cd240
[   38.908435]  which belongs to the cache test_cache of size 123
[   38.909570] The buggy address is located 0 bytes to the right of
[   38.909570]  allocated 123-byte region [fff00000c65cd240, fff00000c65cd2bb)
[   38.911405] 
[   38.911788] The buggy address belongs to the physical page:
[   38.912602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd
[   38.913986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.914772] page_type: f5(slab)
[   38.915147] raw: 0bfffe0000000000 fff00000c652d3c0 dead000000000122 0000000000000000
[   38.916058] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   38.916765] page dumped because: kasan: bad access detected
[   38.917479] 
[   38.917820] Memory state around the buggy address:
[   38.918688]  fff00000c65cd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.919647]  fff00000c65cd200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   38.920461] >fff00000c65cd280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   38.921231]                                         ^
[   38.921840]  fff00000c65cd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.922621]  fff00000c65cd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.923473] ==================================================================
[   38.839570] ==================================================================
[   38.840503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.841293] Read of size 1 at addr fff00000c674e001 by task kunit_try_catch/212
[   38.841868] 
[   38.842187] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.843971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.844586] Hardware name: linux,dummy-virt (DT)
[   38.845801] Call trace:
[   38.846266]  show_stack+0x20/0x38 (C)
[   38.847237]  dump_stack_lvl+0x8c/0xd0
[   38.848175]  print_report+0x118/0x5e0
[   38.848845]  kasan_report+0xc8/0x118
[   38.849491]  __asan_report_load1_noabort+0x20/0x30
[   38.850248]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.851037]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   38.851763]  kunit_try_run_case+0x14c/0x3d0
[   38.852333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.853030]  kthread+0x24c/0x2d0
[   38.853869]  ret_from_fork+0x10/0x20
[   38.854274] 
[   38.854547] The buggy address belongs to the physical page:
[   38.855049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674c
[   38.855771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.856667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.857546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.858757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.859478] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.860389] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.861862] head: 0bfffe0000000002 ffffc1ffc319d301 ffffffffffffffff 0000000000000000
[   38.862463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   38.863058] page dumped because: kasan: bad access detected
[   38.863966] 
[   38.864298] Memory state around the buggy address:
[   38.864929]  fff00000c674df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.865757]  fff00000c674df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.866851] >fff00000c674e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.867819]                    ^
[   38.868511]  fff00000c674e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.869558]  fff00000c674e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.870605] ==================================================================

[   30.421100] ==================================================================
[   30.421912] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   30.423583] Read of size 1 at addr ffff8881029f32bb by task kunit_try_catch/232
[   30.424665] 
[   30.424966] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   30.425812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.426404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.428382] Call Trace:
[   30.428831]  <TASK>
[   30.429141]  dump_stack_lvl+0x73/0xb0
[   30.429625]  print_report+0xd1/0x640
[   30.430047]  ? __virt_addr_valid+0x1db/0x2d0
[   30.430803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.431466]  kasan_report+0x102/0x140
[   30.432033]  ? mempool_oob_right_helper+0x31a/0x380
[   30.432612]  ? mempool_oob_right_helper+0x31a/0x380
[   30.433320]  __asan_report_load1_noabort+0x18/0x20
[   30.434292]  mempool_oob_right_helper+0x31a/0x380
[   30.434936]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   30.435495]  ? finish_task_switch.isra.0+0x153/0x700
[   30.436364]  mempool_slab_oob_right+0xb1/0x100
[   30.436829]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   30.437368]  ? __switch_to+0x5d9/0xf60
[   30.438093]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   30.438871]  ? __pfx_mempool_free_slab+0x10/0x10
[   30.439294]  ? __pfx_read_tsc+0x10/0x10
[   30.440090]  ? ktime_get_ts64+0x84/0x230
[   30.440448]  kunit_try_run_case+0x1b3/0x490
[   30.441026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.441911]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.442527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.443175]  ? __kthread_parkme+0x82/0x160
[   30.443906]  ? preempt_count_sub+0x50/0x80
[   30.444465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.444907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.445832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.446822]  kthread+0x257/0x310
[   30.447099]  ? __pfx_kthread+0x10/0x10
[   30.447550]  ret_from_fork+0x41/0x80
[   30.448222]  ? __pfx_kthread+0x10/0x10
[   30.448987]  ret_from_fork_asm+0x1a/0x30
[   30.449413]  </TASK>
[   30.449866] 
[   30.450037] Allocated by task 232:
[   30.450526]  kasan_save_stack+0x3d/0x60
[   30.451028]  kasan_save_track+0x18/0x40
[   30.451790]  kasan_save_alloc_info+0x3b/0x50
[   30.452453]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   30.453035]  remove_element+0x11e/0x190
[   30.453633]  mempool_alloc_preallocated+0x4d/0x90
[   30.454322]  mempool_oob_right_helper+0x8b/0x380
[   30.454984]  mempool_slab_oob_right+0xb1/0x100
[   30.455309]  kunit_try_run_case+0x1b3/0x490
[   30.455914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.457016]  kthread+0x257/0x310
[   30.457279]  ret_from_fork+0x41/0x80
[   30.457961]  ret_from_fork_asm+0x1a/0x30
[   30.458272] 
[   30.458477] The buggy address belongs to the object at ffff8881029f3240
[   30.458477]  which belongs to the cache test_cache of size 123
[   30.460140] The buggy address is located 0 bytes to the right of
[   30.460140]  allocated 123-byte region [ffff8881029f3240, ffff8881029f32bb)
[   30.461476] 
[   30.461633] The buggy address belongs to the physical page:
[   30.462522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f3
[   30.463228] flags: 0x200000000000000(node=0|zone=2)
[   30.464006] page_type: f5(slab)
[   30.464374] raw: 0200000000000000 ffff888101ebcb40 dead000000000122 0000000000000000
[   30.465089] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   30.466301] page dumped because: kasan: bad access detected
[   30.467010] 
[   30.467403] Memory state around the buggy address:
[   30.467853]  ffff8881029f3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.468668]  ffff8881029f3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   30.469300] >ffff8881029f3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   30.470280]                                         ^
[   30.470651]  ffff8881029f3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.471615]  ffff8881029f3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.472371] ==================================================================
[   30.300254] ==================================================================
[   30.300938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   30.301682] Read of size 1 at addr ffff8881029e9973 by task kunit_try_catch/228
[   30.302183] 
[   30.302367] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   30.303393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.303833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.305382] Call Trace:
[   30.305801]  <TASK>
[   30.306035]  dump_stack_lvl+0x73/0xb0
[   30.306603]  print_report+0xd1/0x640
[   30.307342]  ? __virt_addr_valid+0x1db/0x2d0
[   30.308484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.309053]  kasan_report+0x102/0x140
[   30.309573]  ? mempool_oob_right_helper+0x31a/0x380
[   30.310211]  ? mempool_oob_right_helper+0x31a/0x380
[   30.310661]  __asan_report_load1_noabort+0x18/0x20
[   30.311135]  mempool_oob_right_helper+0x31a/0x380
[   30.311569]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   30.312850]  ? irqentry_exit+0x2a/0x60
[   30.313154]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   30.314013]  mempool_kmalloc_oob_right+0xb6/0x100
[   30.315107]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   30.315827]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.316613]  ? __pfx_mempool_kfree+0x10/0x10
[   30.317348]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   30.318564]  kunit_try_run_case+0x1b3/0x490
[   30.319090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.320242]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.321021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.322307]  ? __kthread_parkme+0x82/0x160
[   30.322824]  ? preempt_count_sub+0x50/0x80
[   30.323187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.323706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.324189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.324912]  kthread+0x257/0x310
[   30.325498]  ? __pfx_kthread+0x10/0x10
[   30.325995]  ret_from_fork+0x41/0x80
[   30.326617]  ? __pfx_kthread+0x10/0x10
[   30.327011]  ret_from_fork_asm+0x1a/0x30
[   30.327595]  </TASK>
[   30.327809] 
[   30.328108] Allocated by task 228:
[   30.328764]  kasan_save_stack+0x3d/0x60
[   30.329068]  kasan_save_track+0x18/0x40
[   30.329565]  kasan_save_alloc_info+0x3b/0x50
[   30.329975]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   30.330650]  remove_element+0x11e/0x190
[   30.332077]  mempool_alloc_preallocated+0x4d/0x90
[   30.332916]  mempool_oob_right_helper+0x8b/0x380
[   30.333634]  mempool_kmalloc_oob_right+0xb6/0x100
[   30.334400]  kunit_try_run_case+0x1b3/0x490
[   30.335207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.335440]  kthread+0x257/0x310
[   30.335606]  ret_from_fork+0x41/0x80
[   30.336254]  ret_from_fork_asm+0x1a/0x30
[   30.337198] 
[   30.337803] The buggy address belongs to the object at ffff8881029e9900
[   30.337803]  which belongs to the cache kmalloc-128 of size 128
[   30.340467] The buggy address is located 0 bytes to the right of
[   30.340467]  allocated 115-byte region [ffff8881029e9900, ffff8881029e9973)
[   30.341617] 
[   30.341851] The buggy address belongs to the physical page:
[   30.343775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e9
[   30.344287] flags: 0x200000000000000(node=0|zone=2)
[   30.344569] page_type: f5(slab)
[   30.344817] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.345196] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.345574] page dumped because: kasan: bad access detected
[   30.348851] 
[   30.351220] Memory state around the buggy address:
[   30.352678]  ffff8881029e9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.354880]  ffff8881029e9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.356047] >ffff8881029e9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.356814]                                                              ^
[   30.357595]  ffff8881029e9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.358742]  ffff8881029e9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.359525] ==================================================================
[   30.366741] ==================================================================
[   30.368143] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   30.369163] Read of size 1 at addr ffff888102cae001 by task kunit_try_catch/230
[   30.370276] 
[   30.370930] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   30.372071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.372876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.374319] Call Trace:
[   30.374619]  <TASK>
[   30.375197]  dump_stack_lvl+0x73/0xb0
[   30.376221]  print_report+0xd1/0x640
[   30.376677]  ? __virt_addr_valid+0x1db/0x2d0
[   30.377327]  ? kasan_addr_to_slab+0x11/0xa0
[   30.377766]  kasan_report+0x102/0x140
[   30.378542]  ? mempool_oob_right_helper+0x31a/0x380
[   30.379116]  ? mempool_oob_right_helper+0x31a/0x380
[   30.380022]  __asan_report_load1_noabort+0x18/0x20
[   30.380869]  mempool_oob_right_helper+0x31a/0x380
[   30.381656]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   30.382553]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   30.383322]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   30.383832]  ? __switch_to+0x5d9/0xf60
[   30.384451]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.385279]  ? __pfx_mempool_kfree+0x10/0x10
[   30.386040]  ? __pfx_read_tsc+0x10/0x10
[   30.386529]  ? ktime_get_ts64+0x84/0x230
[   30.387446]  kunit_try_run_case+0x1b3/0x490
[   30.388115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.388940]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.389540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.390778]  ? __kthread_parkme+0x82/0x160
[   30.391624]  ? preempt_count_sub+0x50/0x80
[   30.392449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.393214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.393902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.394909]  kthread+0x257/0x310
[   30.395266]  ? __pfx_kthread+0x10/0x10
[   30.396088]  ret_from_fork+0x41/0x80
[   30.396565]  ? __pfx_kthread+0x10/0x10
[   30.397008]  ret_from_fork_asm+0x1a/0x30
[   30.398005]  </TASK>
[   30.398227] 
[   30.398746] The buggy address belongs to the physical page:
[   30.399251] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cac
[   30.399982] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.400742] flags: 0x200000000000040(head|node=0|zone=2)
[   30.401646] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.402455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.403160] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.403901] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.404794] head: 0200000000000002 ffffea00040b2b01 ffffffffffffffff 0000000000000000
[   30.405620] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.406489] page dumped because: kasan: bad access detected
[   30.407135] 
[   30.407432] Memory state around the buggy address:
[   30.407825]  ffff888102cadf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.409104]  ffff888102cadf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.410080] >ffff888102cae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.410793]                    ^
[   30.411172]  ffff888102cae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.412526]  ffff888102cae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.413110] ==================================================================