Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.681482] ================================================================== [ 32.682698] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.683931] Read of size 1 at addr fff00000c6566001 by task kunit_try_catch/212 [ 32.685792] [ 32.686305] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.687960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.688451] Hardware name: linux,dummy-virt (DT) [ 32.689061] Call trace: [ 32.689473] show_stack+0x20/0x38 (C) [ 32.690284] dump_stack_lvl+0x8c/0xd0 [ 32.691090] print_report+0x118/0x5e0 [ 32.691831] kasan_report+0xc8/0x118 [ 32.693102] __asan_report_load1_noabort+0x20/0x30 [ 32.693636] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.693988] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 32.694382] kunit_try_run_case+0x14c/0x3d0 [ 32.696475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.697300] kthread+0x24c/0x2d0 [ 32.698048] ret_from_fork+0x10/0x20 [ 32.698720] [ 32.699059] The buggy address belongs to the physical page: [ 32.700542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 32.702021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.702631] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.704131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.705231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.706238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.707796] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.709502] head: 0bfffe0000000002 ffffc1ffc3195901 ffffffffffffffff 0000000000000000 [ 32.710057] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.710598] page dumped because: kasan: bad access detected [ 32.712229] [ 32.712789] Memory state around the buggy address: [ 32.713610] fff00000c6565f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.714542] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.716372] >fff00000c6566000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.717383] ^ [ 32.717888] fff00000c6566080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.719027] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.720119] ================================================================== [ 32.625144] ================================================================== [ 32.626690] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.628156] Read of size 1 at addr fff00000c590f073 by task kunit_try_catch/210 [ 32.629785] [ 32.630098] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.631983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.633318] Hardware name: linux,dummy-virt (DT) [ 32.634255] Call trace: [ 32.634778] show_stack+0x20/0x38 (C) [ 32.635634] dump_stack_lvl+0x8c/0xd0 [ 32.636559] print_report+0x118/0x5e0 [ 32.637102] kasan_report+0xc8/0x118 [ 32.637703] __asan_report_load1_noabort+0x20/0x30 [ 32.638424] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.639484] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.640150] kunit_try_run_case+0x14c/0x3d0 [ 32.640800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.641518] kthread+0x24c/0x2d0 [ 32.642101] ret_from_fork+0x10/0x20 [ 32.642686] [ 32.642958] Allocated by task 210: [ 32.644017] kasan_save_stack+0x3c/0x68 [ 32.644874] kasan_save_track+0x20/0x40 [ 32.645529] kasan_save_alloc_info+0x40/0x58 [ 32.646347] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.647190] remove_element+0x130/0x1f8 [ 32.648177] mempool_alloc_preallocated+0x58/0xc0 [ 32.648809] mempool_oob_right_helper+0x98/0x2f0 [ 32.649524] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.650247] kunit_try_run_case+0x14c/0x3d0 [ 32.650956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.651858] kthread+0x24c/0x2d0 [ 32.652666] ret_from_fork+0x10/0x20 [ 32.653269] [ 32.653841] The buggy address belongs to the object at fff00000c590f000 [ 32.653841] which belongs to the cache kmalloc-128 of size 128 [ 32.655950] The buggy address is located 0 bytes to the right of [ 32.655950] allocated 115-byte region [fff00000c590f000, fff00000c590f073) [ 32.657252] [ 32.657658] The buggy address belongs to the physical page: [ 32.658412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590f [ 32.659439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.660120] page_type: f5(slab) [ 32.660820] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.661990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.663236] page dumped because: kasan: bad access detected [ 32.663940] [ 32.664257] Memory state around the buggy address: [ 32.664968] fff00000c590ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.665853] fff00000c590ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.666633] >fff00000c590f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.667661] ^ [ 32.668485] fff00000c590f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.669427] fff00000c590f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.670194] ================================================================== [ 32.734121] ================================================================== [ 32.735570] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.736843] Read of size 1 at addr fff00000c591e2bb by task kunit_try_catch/214 [ 32.737969] [ 32.738285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.739499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.740095] Hardware name: linux,dummy-virt (DT) [ 32.740615] Call trace: [ 32.741085] show_stack+0x20/0x38 (C) [ 32.741927] dump_stack_lvl+0x8c/0xd0 [ 32.742534] print_report+0x118/0x5e0 [ 32.743499] kasan_report+0xc8/0x118 [ 32.744037] __asan_report_load1_noabort+0x20/0x30 [ 32.744798] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.745488] mempool_slab_oob_right+0xb8/0x110 [ 32.746253] kunit_try_run_case+0x14c/0x3d0 [ 32.747247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.747989] kthread+0x24c/0x2d0 [ 32.748528] ret_from_fork+0x10/0x20 [ 32.749182] [ 32.749492] Allocated by task 214: [ 32.750122] kasan_save_stack+0x3c/0x68 [ 32.750701] kasan_save_track+0x20/0x40 [ 32.751675] kasan_save_alloc_info+0x40/0x58 [ 32.752292] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.753074] remove_element+0x16c/0x1f8 [ 32.753679] mempool_alloc_preallocated+0x58/0xc0 [ 32.754423] mempool_oob_right_helper+0x98/0x2f0 [ 32.755410] mempool_slab_oob_right+0xb8/0x110 [ 32.756030] kunit_try_run_case+0x14c/0x3d0 [ 32.756660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.757898] kthread+0x24c/0x2d0 [ 32.758680] ret_from_fork+0x10/0x20 [ 32.759201] [ 32.759551] The buggy address belongs to the object at fff00000c591e240 [ 32.759551] which belongs to the cache test_cache of size 123 [ 32.761374] The buggy address is located 0 bytes to the right of [ 32.761374] allocated 123-byte region [fff00000c591e240, fff00000c591e2bb) [ 32.762848] [ 32.763427] The buggy address belongs to the physical page: [ 32.764189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591e [ 32.765208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.766179] page_type: f5(slab) [ 32.766693] raw: 0bfffe0000000000 fff00000c59073c0 dead000000000122 0000000000000000 [ 32.767913] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.768835] page dumped because: kasan: bad access detected [ 32.769688] [ 32.770013] Memory state around the buggy address: [ 32.770847] fff00000c591e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.771981] fff00000c591e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.772845] >fff00000c591e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.773735] ^ [ 32.774461] fff00000c591e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.776064] fff00000c591e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.777040] ==================================================================
[ 28.062225] ================================================================== [ 28.063215] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 28.063643] Read of size 1 at addr ffff888102a072bb by task kunit_try_catch/234 [ 28.064383] [ 28.064566] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 28.064892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.065029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.066719] Call Trace: [ 28.067019] <TASK> [ 28.067232] dump_stack_lvl+0x73/0xb0 [ 28.067897] print_report+0xd1/0x640 [ 28.068253] ? __virt_addr_valid+0x1db/0x2d0 [ 28.069081] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.069597] kasan_report+0x102/0x140 [ 28.069899] ? mempool_oob_right_helper+0x31a/0x380 [ 28.070321] ? mempool_oob_right_helper+0x31a/0x380 [ 28.070793] __asan_report_load1_noabort+0x18/0x20 [ 28.071244] mempool_oob_right_helper+0x31a/0x380 [ 28.071928] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.072378] ? finish_task_switch.isra.0+0x153/0x700 [ 28.073412] mempool_slab_oob_right+0xb1/0x100 [ 28.073876] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 28.074538] ? __switch_to+0x5d9/0xf60 [ 28.075019] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 28.075784] ? __pfx_mempool_free_slab+0x10/0x10 [ 28.076183] ? __pfx_read_tsc+0x10/0x10 [ 28.076545] ? ktime_get_ts64+0x86/0x230 [ 28.076972] kunit_try_run_case+0x1b3/0x490 [ 28.077843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.078307] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.079121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.079691] ? __kthread_parkme+0x82/0x160 [ 28.080022] ? preempt_count_sub+0x50/0x80 [ 28.080359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.081620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.082086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.082854] kthread+0x257/0x310 [ 28.083372] ? __pfx_kthread+0x10/0x10 [ 28.083988] ret_from_fork+0x41/0x80 [ 28.084326] ? __pfx_kthread+0x10/0x10 [ 28.085166] ret_from_fork_asm+0x1a/0x30 [ 28.085705] </TASK> [ 28.085987] [ 28.086200] Allocated by task 234: [ 28.086534] kasan_save_stack+0x3d/0x60 [ 28.087145] kasan_save_track+0x18/0x40 [ 28.087823] kasan_save_alloc_info+0x3b/0x50 [ 28.088248] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 28.089047] remove_element+0x11e/0x190 [ 28.089344] mempool_alloc_preallocated+0x4d/0x90 [ 28.090135] mempool_oob_right_helper+0x8b/0x380 [ 28.090678] mempool_slab_oob_right+0xb1/0x100 [ 28.091290] kunit_try_run_case+0x1b3/0x490 [ 28.091575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.092045] kthread+0x257/0x310 [ 28.092514] ret_from_fork+0x41/0x80 [ 28.092935] ret_from_fork_asm+0x1a/0x30 [ 28.093391] [ 28.093658] The buggy address belongs to the object at ffff888102a07240 [ 28.093658] which belongs to the cache test_cache of size 123 [ 28.094824] The buggy address is located 0 bytes to the right of [ 28.094824] allocated 123-byte region [ffff888102a07240, ffff888102a072bb) [ 28.095401] [ 28.095599] The buggy address belongs to the physical page: [ 28.096072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a07 [ 28.096698] flags: 0x200000000000000(node=0|zone=2) [ 28.097072] page_type: f5(slab) [ 28.097326] raw: 0200000000000000 ffff888101e70780 dead000000000122 0000000000000000 [ 28.097988] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.098519] page dumped because: kasan: bad access detected [ 28.098923] [ 28.099142] Memory state around the buggy address: [ 28.099613] ffff888102a07180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.100124] ffff888102a07200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.100756] >ffff888102a07280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.101258] ^ [ 28.101588] ffff888102a07300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.102202] ffff888102a07380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.102729] ================================================================== [ 27.963647] ================================================================== [ 27.964364] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 27.964790] Read of size 1 at addr ffff888102989e73 by task kunit_try_catch/230 [ 27.965155] [ 27.965317] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 27.966969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.967379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.968990] Call Trace: [ 27.969221] <TASK> [ 27.969414] dump_stack_lvl+0x73/0xb0 [ 27.970421] print_report+0xd1/0x640 [ 27.971406] ? __virt_addr_valid+0x1db/0x2d0 [ 27.971996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.972589] kasan_report+0x102/0x140 [ 27.973199] ? mempool_oob_right_helper+0x31a/0x380 [ 27.973536] ? mempool_oob_right_helper+0x31a/0x380 [ 27.973983] __asan_report_load1_noabort+0x18/0x20 [ 27.974580] mempool_oob_right_helper+0x31a/0x380 [ 27.974984] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 27.975450] mempool_kmalloc_oob_right+0xb6/0x100 [ 27.975950] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 27.976694] ? __switch_to+0x5d9/0xf60 [ 27.976965] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.977238] ? __pfx_mempool_kfree+0x10/0x10 [ 27.978656] ? __pfx_read_tsc+0x10/0x10 [ 27.979239] ? ktime_get_ts64+0x86/0x230 [ 27.979833] kunit_try_run_case+0x1b3/0x490 [ 27.980422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.981082] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.981446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.982377] ? __kthread_parkme+0x82/0x160 [ 27.983031] ? preempt_count_sub+0x50/0x80 [ 27.983324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.984449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.984956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.985381] kthread+0x257/0x310 [ 27.986235] ? __pfx_kthread+0x10/0x10 [ 27.986825] ret_from_fork+0x41/0x80 [ 27.987174] ? __pfx_kthread+0x10/0x10 [ 27.987529] ret_from_fork_asm+0x1a/0x30 [ 27.988582] </TASK> [ 27.988924] [ 27.989049] Allocated by task 230: [ 27.989255] kasan_save_stack+0x3d/0x60 [ 27.990086] kasan_save_track+0x18/0x40 [ 27.990609] kasan_save_alloc_info+0x3b/0x50 [ 27.991042] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.991524] remove_element+0x11e/0x190 [ 27.991757] mempool_alloc_preallocated+0x4d/0x90 [ 27.992221] mempool_oob_right_helper+0x8b/0x380 [ 27.992676] mempool_kmalloc_oob_right+0xb6/0x100 [ 27.994134] kunit_try_run_case+0x1b3/0x490 [ 27.994577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.995174] kthread+0x257/0x310 [ 27.995763] ret_from_fork+0x41/0x80 [ 27.996085] ret_from_fork_asm+0x1a/0x30 [ 27.996354] [ 27.996593] The buggy address belongs to the object at ffff888102989e00 [ 27.996593] which belongs to the cache kmalloc-128 of size 128 [ 27.997833] The buggy address is located 0 bytes to the right of [ 27.997833] allocated 115-byte region [ffff888102989e00, ffff888102989e73) [ 27.999566] [ 27.999871] The buggy address belongs to the physical page: [ 28.000181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102989 [ 28.001400] flags: 0x200000000000000(node=0|zone=2) [ 28.002069] page_type: f5(slab) [ 28.002506] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.004031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.004777] page dumped because: kasan: bad access detected [ 28.005073] [ 28.005321] Memory state around the buggy address: [ 28.005776] ffff888102989d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.006300] ffff888102989d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.007020] >ffff888102989e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.007848] ^ [ 28.008320] ffff888102989e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.009745] ffff888102989f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.011333] ================================================================== [ 28.019364] ================================================================== [ 28.020567] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 28.021245] Read of size 1 at addr ffff888102a4e001 by task kunit_try_catch/232 [ 28.021614] [ 28.021842] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 28.022754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.023016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.023853] Call Trace: [ 28.024081] <TASK> [ 28.024365] dump_stack_lvl+0x73/0xb0 [ 28.024905] print_report+0xd1/0x640 [ 28.025277] ? __virt_addr_valid+0x1db/0x2d0 [ 28.025896] ? kasan_addr_to_slab+0x11/0xa0 [ 28.026348] kasan_report+0x102/0x140 [ 28.026892] ? mempool_oob_right_helper+0x31a/0x380 [ 28.027226] ? mempool_oob_right_helper+0x31a/0x380 [ 28.027870] __asan_report_load1_noabort+0x18/0x20 [ 28.028346] mempool_oob_right_helper+0x31a/0x380 [ 28.028874] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 28.029389] ? finish_task_switch.isra.0+0x153/0x700 [ 28.029984] mempool_kmalloc_large_oob_right+0xb6/0x100 [ 28.030376] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 28.031134] ? __switch_to+0x5d9/0xf60 [ 28.031532] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.032131] ? __pfx_mempool_kfree+0x10/0x10 [ 28.032588] ? __pfx_read_tsc+0x10/0x10 [ 28.033005] ? ktime_get_ts64+0x86/0x230 [ 28.033407] kunit_try_run_case+0x1b3/0x490 [ 28.033999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.034478] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.034878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.035210] ? __kthread_parkme+0x82/0x160 [ 28.035635] ? preempt_count_sub+0x50/0x80 [ 28.036047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.036998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.037583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.038246] kthread+0x257/0x310 [ 28.038756] ? __pfx_kthread+0x10/0x10 [ 28.039174] ret_from_fork+0x41/0x80 [ 28.039559] ? __pfx_kthread+0x10/0x10 [ 28.040041] ret_from_fork_asm+0x1a/0x30 [ 28.040353] </TASK> [ 28.040542] [ 28.040687] The buggy address belongs to the physical page: [ 28.040977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4c [ 28.041647] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.042616] flags: 0x200000000000040(head|node=0|zone=2) [ 28.043400] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.044260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.044997] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.045403] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.045980] head: 0200000000000002 ffffea00040a9301 ffffffffffffffff 0000000000000000 [ 28.046972] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 28.047380] page dumped because: kasan: bad access detected [ 28.047858] [ 28.048067] Memory state around the buggy address: [ 28.048661] ffff888102a4df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.049541] ffff888102a4df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.050006] >ffff888102a4e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.050710] ^ [ 28.050936] ffff888102a4e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.051634] ffff888102a4e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.052246] ==================================================================