Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.635884] ==================================================================
[   32.636913] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.638289] Read of size 1 at addr fff00000c6347a73 by task kunit_try_catch/209
[   32.639453] 
[   32.639950] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.641467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.641966] Hardware name: linux,dummy-virt (DT)
[   32.642566] Call trace:
[   32.642893]  show_stack+0x20/0x38 (C)
[   32.643491]  dump_stack_lvl+0x8c/0xd0
[   32.644156]  print_report+0x118/0x5e0
[   32.644773]  kasan_report+0xc8/0x118
[   32.645432]  __asan_report_load1_noabort+0x20/0x30
[   32.646187]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.646881]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.647652]  kunit_try_run_case+0x14c/0x3d0
[   32.648379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.649333]  kthread+0x24c/0x2d0
[   32.650131]  ret_from_fork+0x10/0x20
[   32.650724] 
[   32.651038] Allocated by task 209:
[   32.651464]  kasan_save_stack+0x3c/0x68
[   32.652036]  kasan_save_track+0x20/0x40
[   32.652828]  kasan_save_alloc_info+0x40/0x58
[   32.653805]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.654427]  remove_element+0x130/0x1f8
[   32.654942]  mempool_alloc_preallocated+0x58/0xc0
[   32.655540]  mempool_oob_right_helper+0x98/0x2f0
[   32.656153]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.656794]  kunit_try_run_case+0x14c/0x3d0
[   32.657458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.658062]  kthread+0x24c/0x2d0
[   32.658595]  ret_from_fork+0x10/0x20
[   32.659038] 
[   32.660151] The buggy address belongs to the object at fff00000c6347a00
[   32.660151]  which belongs to the cache kmalloc-128 of size 128
[   32.661381] The buggy address is located 0 bytes to the right of
[   32.661381]  allocated 115-byte region [fff00000c6347a00, fff00000c6347a73)
[   32.662582] 
[   32.662932] The buggy address belongs to the physical page:
[   32.663525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106347
[   32.664579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.666130] page_type: f5(slab)
[   32.666644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.667435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.668634] page dumped because: kasan: bad access detected
[   32.669256] 
[   32.669953] Memory state around the buggy address:
[   32.670654]  fff00000c6347900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.671555]  fff00000c6347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.672332] >fff00000c6347a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.673162]                                                              ^
[   32.674299]  fff00000c6347a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.674946]  fff00000c6347b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.675846] ==================================================================
[   32.688263] ==================================================================
[   32.689764] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.690728] Read of size 1 at addr fff00000c653a001 by task kunit_try_catch/211
[   32.692011] 
[   32.692408] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.693544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.694220] Hardware name: linux,dummy-virt (DT)
[   32.694796] Call trace:
[   32.695268]  show_stack+0x20/0x38 (C)
[   32.695875]  dump_stack_lvl+0x8c/0xd0
[   32.696549]  print_report+0x118/0x5e0
[   32.697404]  kasan_report+0xc8/0x118
[   32.697900]  __asan_report_load1_noabort+0x20/0x30
[   32.698442]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.698955]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   32.699526]  kunit_try_run_case+0x14c/0x3d0
[   32.700392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.701330]  kthread+0x24c/0x2d0
[   32.701721]  ret_from_fork+0x10/0x20
[   32.702180] 
[   32.702415] The buggy address belongs to the physical page:
[   32.702957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106538
[   32.704483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.705678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.706604] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.707484] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.708358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.709302] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.710489] head: 0bfffe0000000002 ffffc1ffc3194e01 ffffffffffffffff 0000000000000000
[   32.711361] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.712715] page dumped because: kasan: bad access detected
[   32.713905] 
[   32.714306] Memory state around the buggy address:
[   32.715034]  fff00000c6539f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.715777]  fff00000c6539f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.716547] >fff00000c653a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.717392]                    ^
[   32.717902]  fff00000c653a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.718615]  fff00000c653a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.719446] ==================================================================
[   32.735493] ==================================================================
[   32.736544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.737248] Read of size 1 at addr fff00000c638c2bb by task kunit_try_catch/213
[   32.737991] 
[   32.738389] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.739365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.740130] Hardware name: linux,dummy-virt (DT)
[   32.740792] Call trace:
[   32.741444]  show_stack+0x20/0x38 (C)
[   32.741911]  dump_stack_lvl+0x8c/0xd0
[   32.742429]  print_report+0x118/0x5e0
[   32.743006]  kasan_report+0xc8/0x118
[   32.743514]  __asan_report_load1_noabort+0x20/0x30
[   32.744164]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.744726]  mempool_slab_oob_right+0xb8/0x110
[   32.745784]  kunit_try_run_case+0x14c/0x3d0
[   32.746527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.747178]  kthread+0x24c/0x2d0
[   32.747761]  ret_from_fork+0x10/0x20
[   32.748377] 
[   32.748660] Allocated by task 213:
[   32.749274]  kasan_save_stack+0x3c/0x68
[   32.750150]  kasan_save_track+0x20/0x40
[   32.750744]  kasan_save_alloc_info+0x40/0x58
[   32.751388]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.752072]  remove_element+0x16c/0x1f8
[   32.752655]  mempool_alloc_preallocated+0x58/0xc0
[   32.753417]  mempool_oob_right_helper+0x98/0x2f0
[   32.754372]  mempool_slab_oob_right+0xb8/0x110
[   32.755165]  kunit_try_run_case+0x14c/0x3d0
[   32.755870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.756759]  kthread+0x24c/0x2d0
[   32.757502]  ret_from_fork+0x10/0x20
[   32.757894] 
[   32.758238] The buggy address belongs to the object at fff00000c638c240
[   32.758238]  which belongs to the cache test_cache of size 123
[   32.759284] The buggy address is located 0 bytes to the right of
[   32.759284]  allocated 123-byte region [fff00000c638c240, fff00000c638c2bb)
[   32.760601] 
[   32.760950] The buggy address belongs to the physical page:
[   32.761622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638c
[   32.762744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.763597] page_type: f5(slab)
[   32.764152] raw: 0bfffe0000000000 fff00000c5b9f780 dead000000000122 0000000000000000
[   32.764970] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   32.765926] page dumped because: kasan: bad access detected
[   32.766601] 
[   32.766916] Memory state around the buggy address:
[   32.767519]  fff00000c638c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.768309]  fff00000c638c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.769219] >fff00000c638c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.770237]                                         ^
[   32.770994]  fff00000c638c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.771785]  fff00000c638c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.772542] ==================================================================

[   23.500965] ==================================================================
[   23.502134] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   23.503447] Read of size 1 at addr ffff888101b61773 by task kunit_try_catch/229
[   23.503993] 
[   23.504227] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   23.505748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.506190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.506919] Call Trace:
[   23.507429]  <TASK>
[   23.507768]  dump_stack_lvl+0x73/0xb0
[   23.508223]  print_report+0xd1/0x640
[   23.508658]  ? __virt_addr_valid+0x1db/0x2d0
[   23.509071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.509690]  kasan_report+0x102/0x140
[   23.510194]  ? mempool_oob_right_helper+0x31a/0x380
[   23.510612]  ? mempool_oob_right_helper+0x31a/0x380
[   23.511166]  __asan_report_load1_noabort+0x18/0x20
[   23.511553]  mempool_oob_right_helper+0x31a/0x380
[   23.512208]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.512886]  ? finish_task_switch.isra.0+0x153/0x700
[   23.513566]  mempool_kmalloc_oob_right+0xb6/0x100
[   23.514041]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   23.515434]  ? __switch_to+0x5d9/0xf60
[   23.516453]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.516870]  ? __pfx_mempool_kfree+0x10/0x10
[   23.517670]  ? __pfx_read_tsc+0x10/0x10
[   23.518172]  ? ktime_get_ts64+0x84/0x230
[   23.518889]  kunit_try_run_case+0x1b3/0x490
[   23.519235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.520891]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.521473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.522081]  ? __kthread_parkme+0x82/0x160
[   23.522906]  ? preempt_count_sub+0x50/0x80
[   23.523734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.524688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.525584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.526296]  kthread+0x257/0x310
[   23.526645]  ? __pfx_kthread+0x10/0x10
[   23.527448]  ret_from_fork+0x41/0x80
[   23.528289]  ? __pfx_kthread+0x10/0x10
[   23.528661]  ret_from_fork_asm+0x1a/0x30
[   23.529541]  </TASK>
[   23.529992] 
[   23.530153] Allocated by task 229:
[   23.530662]  kasan_save_stack+0x3d/0x60
[   23.530987]  kasan_save_track+0x18/0x40
[   23.531917]  kasan_save_alloc_info+0x3b/0x50
[   23.532459]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.533391]  remove_element+0x11e/0x190
[   23.533658]  mempool_alloc_preallocated+0x4d/0x90
[   23.533973]  mempool_oob_right_helper+0x8b/0x380
[   23.534810]  mempool_kmalloc_oob_right+0xb6/0x100
[   23.535813]  kunit_try_run_case+0x1b3/0x490
[   23.536406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.536877]  kthread+0x257/0x310
[   23.537473]  ret_from_fork+0x41/0x80
[   23.537955]  ret_from_fork_asm+0x1a/0x30
[   23.538572] 
[   23.538766] The buggy address belongs to the object at ffff888101b61700
[   23.538766]  which belongs to the cache kmalloc-128 of size 128
[   23.540106] The buggy address is located 0 bytes to the right of
[   23.540106]  allocated 115-byte region [ffff888101b61700, ffff888101b61773)
[   23.542187] 
[   23.542518] The buggy address belongs to the physical page:
[   23.543317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b61
[   23.544429] flags: 0x200000000000000(node=0|zone=2)
[   23.544925] page_type: f5(slab)
[   23.545950] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.546494] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.547638] page dumped because: kasan: bad access detected
[   23.548147] 
[   23.548424] Memory state around the buggy address:
[   23.548943]  ffff888101b61600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.549749]  ffff888101b61680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.550441] >ffff888101b61700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.551322]                                                              ^
[   23.551926]  ffff888101b61780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.552863]  ffff888101b61800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.553375] ==================================================================
[   23.607509] ==================================================================
[   23.608550] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   23.609115] Read of size 1 at addr ffff888102a2f2bb by task kunit_try_catch/233
[   23.609750] 
[   23.609936] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   23.610983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.611660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.612539] Call Trace:
[   23.612833]  <TASK>
[   23.613044]  dump_stack_lvl+0x73/0xb0
[   23.613710]  print_report+0xd1/0x640
[   23.614408]  ? __virt_addr_valid+0x1db/0x2d0
[   23.614831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.615411]  kasan_report+0x102/0x140
[   23.615829]  ? mempool_oob_right_helper+0x31a/0x380
[   23.616378]  ? mempool_oob_right_helper+0x31a/0x380
[   23.616811]  __asan_report_load1_noabort+0x18/0x20
[   23.617479]  mempool_oob_right_helper+0x31a/0x380
[   23.618019]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.618702]  ? finish_task_switch.isra.0+0x153/0x700
[   23.619409]  mempool_slab_oob_right+0xb1/0x100
[   23.619952]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   23.620662]  ? __switch_to+0x5d9/0xf60
[   23.621019]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   23.621728]  ? __pfx_mempool_free_slab+0x10/0x10
[   23.622385]  ? __pfx_read_tsc+0x10/0x10
[   23.622817]  ? ktime_get_ts64+0x84/0x230
[   23.623111]  kunit_try_run_case+0x1b3/0x490
[   23.623818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.624245]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.624643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.625142]  ? __kthread_parkme+0x82/0x160
[   23.625679]  ? preempt_count_sub+0x50/0x80
[   23.626109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.626760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.627428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.628045]  kthread+0x257/0x310
[   23.628628]  ? __pfx_kthread+0x10/0x10
[   23.628989]  ret_from_fork+0x41/0x80
[   23.629459]  ? __pfx_kthread+0x10/0x10
[   23.629799]  ret_from_fork_asm+0x1a/0x30
[   23.630315]  </TASK>
[   23.630571] 
[   23.630751] Allocated by task 233:
[   23.630996]  kasan_save_stack+0x3d/0x60
[   23.631661]  kasan_save_track+0x18/0x40
[   23.631935]  kasan_save_alloc_info+0x3b/0x50
[   23.632629]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   23.633448]  remove_element+0x11e/0x190
[   23.633806]  mempool_alloc_preallocated+0x4d/0x90
[   23.634426]  mempool_oob_right_helper+0x8b/0x380
[   23.634831]  mempool_slab_oob_right+0xb1/0x100
[   23.635555]  kunit_try_run_case+0x1b3/0x490
[   23.635966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.636709]  kthread+0x257/0x310
[   23.637114]  ret_from_fork+0x41/0x80
[   23.637629]  ret_from_fork_asm+0x1a/0x30
[   23.638018] 
[   23.638662] The buggy address belongs to the object at ffff888102a2f240
[   23.638662]  which belongs to the cache test_cache of size 123
[   23.640035] The buggy address is located 0 bytes to the right of
[   23.640035]  allocated 123-byte region [ffff888102a2f240, ffff888102a2f2bb)
[   23.641204] 
[   23.641492] The buggy address belongs to the physical page:
[   23.642022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2f
[   23.642653] flags: 0x200000000000000(node=0|zone=2)
[   23.642992] page_type: f5(slab)
[   23.643757] raw: 0200000000000000 ffff888102a2b140 dead000000000122 0000000000000000
[   23.644534] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   23.645067] page dumped because: kasan: bad access detected
[   23.645439] 
[   23.645587] Memory state around the buggy address:
[   23.646058]  ffff888102a2f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.647035]  ffff888102a2f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   23.648212] >ffff888102a2f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   23.649229]                                         ^
[   23.649858]  ffff888102a2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.650676]  ffff888102a2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.651485] ==================================================================
[   23.561707] ==================================================================
[   23.562753] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   23.563421] Read of size 1 at addr ffff888102bd2001 by task kunit_try_catch/231
[   23.564005] 
[   23.564254] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   23.565880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.566523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.567562] Call Trace:
[   23.567828]  <TASK>
[   23.568062]  dump_stack_lvl+0x73/0xb0
[   23.568611]  print_report+0xd1/0x640
[   23.569013]  ? __virt_addr_valid+0x1db/0x2d0
[   23.569361]  ? kasan_addr_to_slab+0x11/0xa0
[   23.569851]  kasan_report+0x102/0x140
[   23.570264]  ? mempool_oob_right_helper+0x31a/0x380
[   23.571430]  ? mempool_oob_right_helper+0x31a/0x380
[   23.571865]  __asan_report_load1_noabort+0x18/0x20
[   23.572611]  mempool_oob_right_helper+0x31a/0x380
[   23.573034]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   23.573693]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   23.574631]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   23.575132]  ? __switch_to+0x5d9/0xf60
[   23.575734]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.576072]  ? __pfx_mempool_kfree+0x10/0x10
[   23.576738]  ? __pfx_read_tsc+0x10/0x10
[   23.577118]  ? ktime_get_ts64+0x84/0x230
[   23.577677]  kunit_try_run_case+0x1b3/0x490
[   23.578082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.578904]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.579396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.579976]  ? __kthread_parkme+0x82/0x160
[   23.580625]  ? preempt_count_sub+0x50/0x80
[   23.580972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.581683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.582178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.582756]  kthread+0x257/0x310
[   23.583043]  ? __pfx_kthread+0x10/0x10
[   23.583967]  ret_from_fork+0x41/0x80
[   23.584533]  ? __pfx_kthread+0x10/0x10
[   23.584856]  ret_from_fork_asm+0x1a/0x30
[   23.585493]  </TASK>
[   23.585821] 
[   23.586006] The buggy address belongs to the physical page:
[   23.586674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd0
[   23.587776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.588692] flags: 0x200000000000040(head|node=0|zone=2)
[   23.589078] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.589855] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.590613] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.591391] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.592003] head: 0200000000000002 ffffea00040af401 ffffffffffffffff 0000000000000000
[   23.592991] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.593770] page dumped because: kasan: bad access detected
[   23.594442] 
[   23.594679] Memory state around the buggy address:
[   23.595048]  ffff888102bd1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.595792]  ffff888102bd1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.596701] >ffff888102bd2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.597289]                    ^
[   23.597695]  ffff888102bd2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.598507]  ffff888102bd2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.599077] ==================================================================