Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.681482] ==================================================================
[   32.682698] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.683931] Read of size 1 at addr fff00000c6566001 by task kunit_try_catch/212
[   32.685792] 
[   32.686305] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.687960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.688451] Hardware name: linux,dummy-virt (DT)
[   32.689061] Call trace:
[   32.689473]  show_stack+0x20/0x38 (C)
[   32.690284]  dump_stack_lvl+0x8c/0xd0
[   32.691090]  print_report+0x118/0x5e0
[   32.691831]  kasan_report+0xc8/0x118
[   32.693102]  __asan_report_load1_noabort+0x20/0x30
[   32.693636]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.693988]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   32.694382]  kunit_try_run_case+0x14c/0x3d0
[   32.696475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.697300]  kthread+0x24c/0x2d0
[   32.698048]  ret_from_fork+0x10/0x20
[   32.698720] 
[   32.699059] The buggy address belongs to the physical page:
[   32.700542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   32.702021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.702631] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.704131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.705231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.706238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.707796] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.709502] head: 0bfffe0000000002 ffffc1ffc3195901 ffffffffffffffff 0000000000000000
[   32.710057] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.710598] page dumped because: kasan: bad access detected
[   32.712229] 
[   32.712789] Memory state around the buggy address:
[   32.713610]  fff00000c6565f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.714542]  fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.716372] >fff00000c6566000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.717383]                    ^
[   32.717888]  fff00000c6566080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.719027]  fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.720119] ==================================================================
[   32.625144] ==================================================================
[   32.626690] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.628156] Read of size 1 at addr fff00000c590f073 by task kunit_try_catch/210
[   32.629785] 
[   32.630098] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.631983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.633318] Hardware name: linux,dummy-virt (DT)
[   32.634255] Call trace:
[   32.634778]  show_stack+0x20/0x38 (C)
[   32.635634]  dump_stack_lvl+0x8c/0xd0
[   32.636559]  print_report+0x118/0x5e0
[   32.637102]  kasan_report+0xc8/0x118
[   32.637703]  __asan_report_load1_noabort+0x20/0x30
[   32.638424]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.639484]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.640150]  kunit_try_run_case+0x14c/0x3d0
[   32.640800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.641518]  kthread+0x24c/0x2d0
[   32.642101]  ret_from_fork+0x10/0x20
[   32.642686] 
[   32.642958] Allocated by task 210:
[   32.644017]  kasan_save_stack+0x3c/0x68
[   32.644874]  kasan_save_track+0x20/0x40
[   32.645529]  kasan_save_alloc_info+0x40/0x58
[   32.646347]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.647190]  remove_element+0x130/0x1f8
[   32.648177]  mempool_alloc_preallocated+0x58/0xc0
[   32.648809]  mempool_oob_right_helper+0x98/0x2f0
[   32.649524]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.650247]  kunit_try_run_case+0x14c/0x3d0
[   32.650956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.651858]  kthread+0x24c/0x2d0
[   32.652666]  ret_from_fork+0x10/0x20
[   32.653269] 
[   32.653841] The buggy address belongs to the object at fff00000c590f000
[   32.653841]  which belongs to the cache kmalloc-128 of size 128
[   32.655950] The buggy address is located 0 bytes to the right of
[   32.655950]  allocated 115-byte region [fff00000c590f000, fff00000c590f073)
[   32.657252] 
[   32.657658] The buggy address belongs to the physical page:
[   32.658412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590f
[   32.659439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.660120] page_type: f5(slab)
[   32.660820] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.661990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.663236] page dumped because: kasan: bad access detected
[   32.663940] 
[   32.664257] Memory state around the buggy address:
[   32.664968]  fff00000c590ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.665853]  fff00000c590ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.666633] >fff00000c590f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.667661]                                                              ^
[   32.668485]  fff00000c590f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.669427]  fff00000c590f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.670194] ==================================================================
[   32.734121] ==================================================================
[   32.735570] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.736843] Read of size 1 at addr fff00000c591e2bb by task kunit_try_catch/214
[   32.737969] 
[   32.738285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.739499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.740095] Hardware name: linux,dummy-virt (DT)
[   32.740615] Call trace:
[   32.741085]  show_stack+0x20/0x38 (C)
[   32.741927]  dump_stack_lvl+0x8c/0xd0
[   32.742534]  print_report+0x118/0x5e0
[   32.743499]  kasan_report+0xc8/0x118
[   32.744037]  __asan_report_load1_noabort+0x20/0x30
[   32.744798]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.745488]  mempool_slab_oob_right+0xb8/0x110
[   32.746253]  kunit_try_run_case+0x14c/0x3d0
[   32.747247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.747989]  kthread+0x24c/0x2d0
[   32.748528]  ret_from_fork+0x10/0x20
[   32.749182] 
[   32.749492] Allocated by task 214:
[   32.750122]  kasan_save_stack+0x3c/0x68
[   32.750701]  kasan_save_track+0x20/0x40
[   32.751675]  kasan_save_alloc_info+0x40/0x58
[   32.752292]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.753074]  remove_element+0x16c/0x1f8
[   32.753679]  mempool_alloc_preallocated+0x58/0xc0
[   32.754423]  mempool_oob_right_helper+0x98/0x2f0
[   32.755410]  mempool_slab_oob_right+0xb8/0x110
[   32.756030]  kunit_try_run_case+0x14c/0x3d0
[   32.756660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.757898]  kthread+0x24c/0x2d0
[   32.758680]  ret_from_fork+0x10/0x20
[   32.759201] 
[   32.759551] The buggy address belongs to the object at fff00000c591e240
[   32.759551]  which belongs to the cache test_cache of size 123
[   32.761374] The buggy address is located 0 bytes to the right of
[   32.761374]  allocated 123-byte region [fff00000c591e240, fff00000c591e2bb)
[   32.762848] 
[   32.763427] The buggy address belongs to the physical page:
[   32.764189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591e
[   32.765208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.766179] page_type: f5(slab)
[   32.766693] raw: 0bfffe0000000000 fff00000c59073c0 dead000000000122 0000000000000000
[   32.767913] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.768835] page dumped because: kasan: bad access detected
[   32.769688] 
[   32.770013] Memory state around the buggy address:
[   32.770847]  fff00000c591e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.771981]  fff00000c591e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.772845] >fff00000c591e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.773735]                                         ^
[   32.774461]  fff00000c591e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.776064]  fff00000c591e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.777040] ==================================================================

[   28.062225] ==================================================================
[   28.063215] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   28.063643] Read of size 1 at addr ffff888102a072bb by task kunit_try_catch/234
[   28.064383] 
[   28.064566] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   28.064892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.065029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.066719] Call Trace:
[   28.067019]  <TASK>
[   28.067232]  dump_stack_lvl+0x73/0xb0
[   28.067897]  print_report+0xd1/0x640
[   28.068253]  ? __virt_addr_valid+0x1db/0x2d0
[   28.069081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.069597]  kasan_report+0x102/0x140
[   28.069899]  ? mempool_oob_right_helper+0x31a/0x380
[   28.070321]  ? mempool_oob_right_helper+0x31a/0x380
[   28.070793]  __asan_report_load1_noabort+0x18/0x20
[   28.071244]  mempool_oob_right_helper+0x31a/0x380
[   28.071928]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   28.072378]  ? finish_task_switch.isra.0+0x153/0x700
[   28.073412]  mempool_slab_oob_right+0xb1/0x100
[   28.073876]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   28.074538]  ? __switch_to+0x5d9/0xf60
[   28.075019]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   28.075784]  ? __pfx_mempool_free_slab+0x10/0x10
[   28.076183]  ? __pfx_read_tsc+0x10/0x10
[   28.076545]  ? ktime_get_ts64+0x86/0x230
[   28.076972]  kunit_try_run_case+0x1b3/0x490
[   28.077843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.078307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.079121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.079691]  ? __kthread_parkme+0x82/0x160
[   28.080022]  ? preempt_count_sub+0x50/0x80
[   28.080359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.081620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.082086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.082854]  kthread+0x257/0x310
[   28.083372]  ? __pfx_kthread+0x10/0x10
[   28.083988]  ret_from_fork+0x41/0x80
[   28.084326]  ? __pfx_kthread+0x10/0x10
[   28.085166]  ret_from_fork_asm+0x1a/0x30
[   28.085705]  </TASK>
[   28.085987] 
[   28.086200] Allocated by task 234:
[   28.086534]  kasan_save_stack+0x3d/0x60
[   28.087145]  kasan_save_track+0x18/0x40
[   28.087823]  kasan_save_alloc_info+0x3b/0x50
[   28.088248]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   28.089047]  remove_element+0x11e/0x190
[   28.089344]  mempool_alloc_preallocated+0x4d/0x90
[   28.090135]  mempool_oob_right_helper+0x8b/0x380
[   28.090678]  mempool_slab_oob_right+0xb1/0x100
[   28.091290]  kunit_try_run_case+0x1b3/0x490
[   28.091575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.092045]  kthread+0x257/0x310
[   28.092514]  ret_from_fork+0x41/0x80
[   28.092935]  ret_from_fork_asm+0x1a/0x30
[   28.093391] 
[   28.093658] The buggy address belongs to the object at ffff888102a07240
[   28.093658]  which belongs to the cache test_cache of size 123
[   28.094824] The buggy address is located 0 bytes to the right of
[   28.094824]  allocated 123-byte region [ffff888102a07240, ffff888102a072bb)
[   28.095401] 
[   28.095599] The buggy address belongs to the physical page:
[   28.096072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a07
[   28.096698] flags: 0x200000000000000(node=0|zone=2)
[   28.097072] page_type: f5(slab)
[   28.097326] raw: 0200000000000000 ffff888101e70780 dead000000000122 0000000000000000
[   28.097988] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   28.098519] page dumped because: kasan: bad access detected
[   28.098923] 
[   28.099142] Memory state around the buggy address:
[   28.099613]  ffff888102a07180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.100124]  ffff888102a07200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   28.100756] >ffff888102a07280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   28.101258]                                         ^
[   28.101588]  ffff888102a07300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.102202]  ffff888102a07380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.102729] ==================================================================
[   27.963647] ==================================================================
[   27.964364] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   27.964790] Read of size 1 at addr ffff888102989e73 by task kunit_try_catch/230
[   27.965155] 
[   27.965317] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   27.966969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.967379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.968990] Call Trace:
[   27.969221]  <TASK>
[   27.969414]  dump_stack_lvl+0x73/0xb0
[   27.970421]  print_report+0xd1/0x640
[   27.971406]  ? __virt_addr_valid+0x1db/0x2d0
[   27.971996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.972589]  kasan_report+0x102/0x140
[   27.973199]  ? mempool_oob_right_helper+0x31a/0x380
[   27.973536]  ? mempool_oob_right_helper+0x31a/0x380
[   27.973983]  __asan_report_load1_noabort+0x18/0x20
[   27.974580]  mempool_oob_right_helper+0x31a/0x380
[   27.974984]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   27.975450]  mempool_kmalloc_oob_right+0xb6/0x100
[   27.975950]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   27.976694]  ? __switch_to+0x5d9/0xf60
[   27.976965]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.977238]  ? __pfx_mempool_kfree+0x10/0x10
[   27.978656]  ? __pfx_read_tsc+0x10/0x10
[   27.979239]  ? ktime_get_ts64+0x86/0x230
[   27.979833]  kunit_try_run_case+0x1b3/0x490
[   27.980422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.981082]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.981446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.982377]  ? __kthread_parkme+0x82/0x160
[   27.983031]  ? preempt_count_sub+0x50/0x80
[   27.983324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.984449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.984956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.985381]  kthread+0x257/0x310
[   27.986235]  ? __pfx_kthread+0x10/0x10
[   27.986825]  ret_from_fork+0x41/0x80
[   27.987174]  ? __pfx_kthread+0x10/0x10
[   27.987529]  ret_from_fork_asm+0x1a/0x30
[   27.988582]  </TASK>
[   27.988924] 
[   27.989049] Allocated by task 230:
[   27.989255]  kasan_save_stack+0x3d/0x60
[   27.990086]  kasan_save_track+0x18/0x40
[   27.990609]  kasan_save_alloc_info+0x3b/0x50
[   27.991042]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.991524]  remove_element+0x11e/0x190
[   27.991757]  mempool_alloc_preallocated+0x4d/0x90
[   27.992221]  mempool_oob_right_helper+0x8b/0x380
[   27.992676]  mempool_kmalloc_oob_right+0xb6/0x100
[   27.994134]  kunit_try_run_case+0x1b3/0x490
[   27.994577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.995174]  kthread+0x257/0x310
[   27.995763]  ret_from_fork+0x41/0x80
[   27.996085]  ret_from_fork_asm+0x1a/0x30
[   27.996354] 
[   27.996593] The buggy address belongs to the object at ffff888102989e00
[   27.996593]  which belongs to the cache kmalloc-128 of size 128
[   27.997833] The buggy address is located 0 bytes to the right of
[   27.997833]  allocated 115-byte region [ffff888102989e00, ffff888102989e73)
[   27.999566] 
[   27.999871] The buggy address belongs to the physical page:
[   28.000181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102989
[   28.001400] flags: 0x200000000000000(node=0|zone=2)
[   28.002069] page_type: f5(slab)
[   28.002506] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.004031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.004777] page dumped because: kasan: bad access detected
[   28.005073] 
[   28.005321] Memory state around the buggy address:
[   28.005776]  ffff888102989d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.006300]  ffff888102989d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.007020] >ffff888102989e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.007848]                                                              ^
[   28.008320]  ffff888102989e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.009745]  ffff888102989f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.011333] ==================================================================
[   28.019364] ==================================================================
[   28.020567] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   28.021245] Read of size 1 at addr ffff888102a4e001 by task kunit_try_catch/232
[   28.021614] 
[   28.021842] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   28.022754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.023016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.023853] Call Trace:
[   28.024081]  <TASK>
[   28.024365]  dump_stack_lvl+0x73/0xb0
[   28.024905]  print_report+0xd1/0x640
[   28.025277]  ? __virt_addr_valid+0x1db/0x2d0
[   28.025896]  ? kasan_addr_to_slab+0x11/0xa0
[   28.026348]  kasan_report+0x102/0x140
[   28.026892]  ? mempool_oob_right_helper+0x31a/0x380
[   28.027226]  ? mempool_oob_right_helper+0x31a/0x380
[   28.027870]  __asan_report_load1_noabort+0x18/0x20
[   28.028346]  mempool_oob_right_helper+0x31a/0x380
[   28.028874]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   28.029389]  ? finish_task_switch.isra.0+0x153/0x700
[   28.029984]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   28.030376]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   28.031134]  ? __switch_to+0x5d9/0xf60
[   28.031532]  ? __pfx_mempool_kmalloc+0x10/0x10
[   28.032131]  ? __pfx_mempool_kfree+0x10/0x10
[   28.032588]  ? __pfx_read_tsc+0x10/0x10
[   28.033005]  ? ktime_get_ts64+0x86/0x230
[   28.033407]  kunit_try_run_case+0x1b3/0x490
[   28.033999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.034478]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.034878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.035210]  ? __kthread_parkme+0x82/0x160
[   28.035635]  ? preempt_count_sub+0x50/0x80
[   28.036047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.036998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.037583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.038246]  kthread+0x257/0x310
[   28.038756]  ? __pfx_kthread+0x10/0x10
[   28.039174]  ret_from_fork+0x41/0x80
[   28.039559]  ? __pfx_kthread+0x10/0x10
[   28.040041]  ret_from_fork_asm+0x1a/0x30
[   28.040353]  </TASK>
[   28.040542] 
[   28.040687] The buggy address belongs to the physical page:
[   28.040977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4c
[   28.041647] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.042616] flags: 0x200000000000040(head|node=0|zone=2)
[   28.043400] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.044260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.044997] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.045403] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.045980] head: 0200000000000002 ffffea00040a9301 ffffffffffffffff 0000000000000000
[   28.046972] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   28.047380] page dumped because: kasan: bad access detected
[   28.047858] 
[   28.048067] Memory state around the buggy address:
[   28.048661]  ffff888102a4df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.049541]  ffff888102a4df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.050006] >ffff888102a4e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.050710]                    ^
[   28.050936]  ffff888102a4e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.051634]  ffff888102a4e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   28.052246] ==================================================================