Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.635884] ================================================================== [ 32.636913] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.638289] Read of size 1 at addr fff00000c6347a73 by task kunit_try_catch/209 [ 32.639453] [ 32.639950] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.641467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.641966] Hardware name: linux,dummy-virt (DT) [ 32.642566] Call trace: [ 32.642893] show_stack+0x20/0x38 (C) [ 32.643491] dump_stack_lvl+0x8c/0xd0 [ 32.644156] print_report+0x118/0x5e0 [ 32.644773] kasan_report+0xc8/0x118 [ 32.645432] __asan_report_load1_noabort+0x20/0x30 [ 32.646187] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.646881] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.647652] kunit_try_run_case+0x14c/0x3d0 [ 32.648379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.649333] kthread+0x24c/0x2d0 [ 32.650131] ret_from_fork+0x10/0x20 [ 32.650724] [ 32.651038] Allocated by task 209: [ 32.651464] kasan_save_stack+0x3c/0x68 [ 32.652036] kasan_save_track+0x20/0x40 [ 32.652828] kasan_save_alloc_info+0x40/0x58 [ 32.653805] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.654427] remove_element+0x130/0x1f8 [ 32.654942] mempool_alloc_preallocated+0x58/0xc0 [ 32.655540] mempool_oob_right_helper+0x98/0x2f0 [ 32.656153] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.656794] kunit_try_run_case+0x14c/0x3d0 [ 32.657458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.658062] kthread+0x24c/0x2d0 [ 32.658595] ret_from_fork+0x10/0x20 [ 32.659038] [ 32.660151] The buggy address belongs to the object at fff00000c6347a00 [ 32.660151] which belongs to the cache kmalloc-128 of size 128 [ 32.661381] The buggy address is located 0 bytes to the right of [ 32.661381] allocated 115-byte region [fff00000c6347a00, fff00000c6347a73) [ 32.662582] [ 32.662932] The buggy address belongs to the physical page: [ 32.663525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106347 [ 32.664579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.666130] page_type: f5(slab) [ 32.666644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.667435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.668634] page dumped because: kasan: bad access detected [ 32.669256] [ 32.669953] Memory state around the buggy address: [ 32.670654] fff00000c6347900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.671555] fff00000c6347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.672332] >fff00000c6347a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.673162] ^ [ 32.674299] fff00000c6347a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.674946] fff00000c6347b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.675846] ================================================================== [ 32.688263] ================================================================== [ 32.689764] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.690728] Read of size 1 at addr fff00000c653a001 by task kunit_try_catch/211 [ 32.692011] [ 32.692408] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.693544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.694220] Hardware name: linux,dummy-virt (DT) [ 32.694796] Call trace: [ 32.695268] show_stack+0x20/0x38 (C) [ 32.695875] dump_stack_lvl+0x8c/0xd0 [ 32.696549] print_report+0x118/0x5e0 [ 32.697404] kasan_report+0xc8/0x118 [ 32.697900] __asan_report_load1_noabort+0x20/0x30 [ 32.698442] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.698955] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 32.699526] kunit_try_run_case+0x14c/0x3d0 [ 32.700392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.701330] kthread+0x24c/0x2d0 [ 32.701721] ret_from_fork+0x10/0x20 [ 32.702180] [ 32.702415] The buggy address belongs to the physical page: [ 32.702957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106538 [ 32.704483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.705678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.706604] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.707484] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.708358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.709302] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.710489] head: 0bfffe0000000002 ffffc1ffc3194e01 ffffffffffffffff 0000000000000000 [ 32.711361] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.712715] page dumped because: kasan: bad access detected [ 32.713905] [ 32.714306] Memory state around the buggy address: [ 32.715034] fff00000c6539f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.715777] fff00000c6539f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.716547] >fff00000c653a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.717392] ^ [ 32.717902] fff00000c653a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.718615] fff00000c653a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.719446] ================================================================== [ 32.735493] ================================================================== [ 32.736544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.737248] Read of size 1 at addr fff00000c638c2bb by task kunit_try_catch/213 [ 32.737991] [ 32.738389] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.739365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.740130] Hardware name: linux,dummy-virt (DT) [ 32.740792] Call trace: [ 32.741444] show_stack+0x20/0x38 (C) [ 32.741911] dump_stack_lvl+0x8c/0xd0 [ 32.742429] print_report+0x118/0x5e0 [ 32.743006] kasan_report+0xc8/0x118 [ 32.743514] __asan_report_load1_noabort+0x20/0x30 [ 32.744164] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.744726] mempool_slab_oob_right+0xb8/0x110 [ 32.745784] kunit_try_run_case+0x14c/0x3d0 [ 32.746527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.747178] kthread+0x24c/0x2d0 [ 32.747761] ret_from_fork+0x10/0x20 [ 32.748377] [ 32.748660] Allocated by task 213: [ 32.749274] kasan_save_stack+0x3c/0x68 [ 32.750150] kasan_save_track+0x20/0x40 [ 32.750744] kasan_save_alloc_info+0x40/0x58 [ 32.751388] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.752072] remove_element+0x16c/0x1f8 [ 32.752655] mempool_alloc_preallocated+0x58/0xc0 [ 32.753417] mempool_oob_right_helper+0x98/0x2f0 [ 32.754372] mempool_slab_oob_right+0xb8/0x110 [ 32.755165] kunit_try_run_case+0x14c/0x3d0 [ 32.755870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.756759] kthread+0x24c/0x2d0 [ 32.757502] ret_from_fork+0x10/0x20 [ 32.757894] [ 32.758238] The buggy address belongs to the object at fff00000c638c240 [ 32.758238] which belongs to the cache test_cache of size 123 [ 32.759284] The buggy address is located 0 bytes to the right of [ 32.759284] allocated 123-byte region [fff00000c638c240, fff00000c638c2bb) [ 32.760601] [ 32.760950] The buggy address belongs to the physical page: [ 32.761622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638c [ 32.762744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.763597] page_type: f5(slab) [ 32.764152] raw: 0bfffe0000000000 fff00000c5b9f780 dead000000000122 0000000000000000 [ 32.764970] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 32.765926] page dumped because: kasan: bad access detected [ 32.766601] [ 32.766916] Memory state around the buggy address: [ 32.767519] fff00000c638c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.768309] fff00000c638c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.769219] >fff00000c638c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.770237] ^ [ 32.770994] fff00000c638c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.771785] fff00000c638c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.772542] ==================================================================
[ 23.500965] ================================================================== [ 23.502134] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 23.503447] Read of size 1 at addr ffff888101b61773 by task kunit_try_catch/229 [ 23.503993] [ 23.504227] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 23.505748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.506190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.506919] Call Trace: [ 23.507429] <TASK> [ 23.507768] dump_stack_lvl+0x73/0xb0 [ 23.508223] print_report+0xd1/0x640 [ 23.508658] ? __virt_addr_valid+0x1db/0x2d0 [ 23.509071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.509690] kasan_report+0x102/0x140 [ 23.510194] ? mempool_oob_right_helper+0x31a/0x380 [ 23.510612] ? mempool_oob_right_helper+0x31a/0x380 [ 23.511166] __asan_report_load1_noabort+0x18/0x20 [ 23.511553] mempool_oob_right_helper+0x31a/0x380 [ 23.512208] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.512886] ? finish_task_switch.isra.0+0x153/0x700 [ 23.513566] mempool_kmalloc_oob_right+0xb6/0x100 [ 23.514041] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 23.515434] ? __switch_to+0x5d9/0xf60 [ 23.516453] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.516870] ? __pfx_mempool_kfree+0x10/0x10 [ 23.517670] ? __pfx_read_tsc+0x10/0x10 [ 23.518172] ? ktime_get_ts64+0x84/0x230 [ 23.518889] kunit_try_run_case+0x1b3/0x490 [ 23.519235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.520891] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.521473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.522081] ? __kthread_parkme+0x82/0x160 [ 23.522906] ? preempt_count_sub+0x50/0x80 [ 23.523734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.524688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.525584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.526296] kthread+0x257/0x310 [ 23.526645] ? __pfx_kthread+0x10/0x10 [ 23.527448] ret_from_fork+0x41/0x80 [ 23.528289] ? __pfx_kthread+0x10/0x10 [ 23.528661] ret_from_fork_asm+0x1a/0x30 [ 23.529541] </TASK> [ 23.529992] [ 23.530153] Allocated by task 229: [ 23.530662] kasan_save_stack+0x3d/0x60 [ 23.530987] kasan_save_track+0x18/0x40 [ 23.531917] kasan_save_alloc_info+0x3b/0x50 [ 23.532459] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 23.533391] remove_element+0x11e/0x190 [ 23.533658] mempool_alloc_preallocated+0x4d/0x90 [ 23.533973] mempool_oob_right_helper+0x8b/0x380 [ 23.534810] mempool_kmalloc_oob_right+0xb6/0x100 [ 23.535813] kunit_try_run_case+0x1b3/0x490 [ 23.536406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.536877] kthread+0x257/0x310 [ 23.537473] ret_from_fork+0x41/0x80 [ 23.537955] ret_from_fork_asm+0x1a/0x30 [ 23.538572] [ 23.538766] The buggy address belongs to the object at ffff888101b61700 [ 23.538766] which belongs to the cache kmalloc-128 of size 128 [ 23.540106] The buggy address is located 0 bytes to the right of [ 23.540106] allocated 115-byte region [ffff888101b61700, ffff888101b61773) [ 23.542187] [ 23.542518] The buggy address belongs to the physical page: [ 23.543317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b61 [ 23.544429] flags: 0x200000000000000(node=0|zone=2) [ 23.544925] page_type: f5(slab) [ 23.545950] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.546494] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.547638] page dumped because: kasan: bad access detected [ 23.548147] [ 23.548424] Memory state around the buggy address: [ 23.548943] ffff888101b61600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.549749] ffff888101b61680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.550441] >ffff888101b61700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.551322] ^ [ 23.551926] ffff888101b61780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.552863] ffff888101b61800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.553375] ================================================================== [ 23.607509] ================================================================== [ 23.608550] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 23.609115] Read of size 1 at addr ffff888102a2f2bb by task kunit_try_catch/233 [ 23.609750] [ 23.609936] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 23.610983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.611660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.612539] Call Trace: [ 23.612833] <TASK> [ 23.613044] dump_stack_lvl+0x73/0xb0 [ 23.613710] print_report+0xd1/0x640 [ 23.614408] ? __virt_addr_valid+0x1db/0x2d0 [ 23.614831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.615411] kasan_report+0x102/0x140 [ 23.615829] ? mempool_oob_right_helper+0x31a/0x380 [ 23.616378] ? mempool_oob_right_helper+0x31a/0x380 [ 23.616811] __asan_report_load1_noabort+0x18/0x20 [ 23.617479] mempool_oob_right_helper+0x31a/0x380 [ 23.618019] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.618702] ? finish_task_switch.isra.0+0x153/0x700 [ 23.619409] mempool_slab_oob_right+0xb1/0x100 [ 23.619952] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 23.620662] ? __switch_to+0x5d9/0xf60 [ 23.621019] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 23.621728] ? __pfx_mempool_free_slab+0x10/0x10 [ 23.622385] ? __pfx_read_tsc+0x10/0x10 [ 23.622817] ? ktime_get_ts64+0x84/0x230 [ 23.623111] kunit_try_run_case+0x1b3/0x490 [ 23.623818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.624245] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.624643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.625142] ? __kthread_parkme+0x82/0x160 [ 23.625679] ? preempt_count_sub+0x50/0x80 [ 23.626109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.626760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.627428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.628045] kthread+0x257/0x310 [ 23.628628] ? __pfx_kthread+0x10/0x10 [ 23.628989] ret_from_fork+0x41/0x80 [ 23.629459] ? __pfx_kthread+0x10/0x10 [ 23.629799] ret_from_fork_asm+0x1a/0x30 [ 23.630315] </TASK> [ 23.630571] [ 23.630751] Allocated by task 233: [ 23.630996] kasan_save_stack+0x3d/0x60 [ 23.631661] kasan_save_track+0x18/0x40 [ 23.631935] kasan_save_alloc_info+0x3b/0x50 [ 23.632629] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 23.633448] remove_element+0x11e/0x190 [ 23.633806] mempool_alloc_preallocated+0x4d/0x90 [ 23.634426] mempool_oob_right_helper+0x8b/0x380 [ 23.634831] mempool_slab_oob_right+0xb1/0x100 [ 23.635555] kunit_try_run_case+0x1b3/0x490 [ 23.635966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.636709] kthread+0x257/0x310 [ 23.637114] ret_from_fork+0x41/0x80 [ 23.637629] ret_from_fork_asm+0x1a/0x30 [ 23.638018] [ 23.638662] The buggy address belongs to the object at ffff888102a2f240 [ 23.638662] which belongs to the cache test_cache of size 123 [ 23.640035] The buggy address is located 0 bytes to the right of [ 23.640035] allocated 123-byte region [ffff888102a2f240, ffff888102a2f2bb) [ 23.641204] [ 23.641492] The buggy address belongs to the physical page: [ 23.642022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2f [ 23.642653] flags: 0x200000000000000(node=0|zone=2) [ 23.642992] page_type: f5(slab) [ 23.643757] raw: 0200000000000000 ffff888102a2b140 dead000000000122 0000000000000000 [ 23.644534] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 23.645067] page dumped because: kasan: bad access detected [ 23.645439] [ 23.645587] Memory state around the buggy address: [ 23.646058] ffff888102a2f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.647035] ffff888102a2f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 23.648212] >ffff888102a2f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 23.649229] ^ [ 23.649858] ffff888102a2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.650676] ffff888102a2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.651485] ================================================================== [ 23.561707] ================================================================== [ 23.562753] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 23.563421] Read of size 1 at addr ffff888102bd2001 by task kunit_try_catch/231 [ 23.564005] [ 23.564254] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 23.565880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.566523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.567562] Call Trace: [ 23.567828] <TASK> [ 23.568062] dump_stack_lvl+0x73/0xb0 [ 23.568611] print_report+0xd1/0x640 [ 23.569013] ? __virt_addr_valid+0x1db/0x2d0 [ 23.569361] ? kasan_addr_to_slab+0x11/0xa0 [ 23.569851] kasan_report+0x102/0x140 [ 23.570264] ? mempool_oob_right_helper+0x31a/0x380 [ 23.571430] ? mempool_oob_right_helper+0x31a/0x380 [ 23.571865] __asan_report_load1_noabort+0x18/0x20 [ 23.572611] mempool_oob_right_helper+0x31a/0x380 [ 23.573034] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 23.573693] mempool_kmalloc_large_oob_right+0xb6/0x100 [ 23.574631] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 23.575132] ? __switch_to+0x5d9/0xf60 [ 23.575734] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.576072] ? __pfx_mempool_kfree+0x10/0x10 [ 23.576738] ? __pfx_read_tsc+0x10/0x10 [ 23.577118] ? ktime_get_ts64+0x84/0x230 [ 23.577677] kunit_try_run_case+0x1b3/0x490 [ 23.578082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.578904] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.579396] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.579976] ? __kthread_parkme+0x82/0x160 [ 23.580625] ? preempt_count_sub+0x50/0x80 [ 23.580972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.581683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.582178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.582756] kthread+0x257/0x310 [ 23.583043] ? __pfx_kthread+0x10/0x10 [ 23.583967] ret_from_fork+0x41/0x80 [ 23.584533] ? __pfx_kthread+0x10/0x10 [ 23.584856] ret_from_fork_asm+0x1a/0x30 [ 23.585493] </TASK> [ 23.585821] [ 23.586006] The buggy address belongs to the physical page: [ 23.586674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd0 [ 23.587776] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.588692] flags: 0x200000000000040(head|node=0|zone=2) [ 23.589078] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.589855] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.590613] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.591391] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.592003] head: 0200000000000002 ffffea00040af401 ffffffffffffffff 0000000000000000 [ 23.592991] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.593770] page dumped because: kasan: bad access detected [ 23.594442] [ 23.594679] Memory state around the buggy address: [ 23.595048] ffff888102bd1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.595792] ffff888102bd1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.596701] >ffff888102bd2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.597289] ^ [ 23.597695] ffff888102bd2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.598507] ffff888102bd2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.599077] ==================================================================