Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.247313] ==================================================================
[   26.248393] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.249095] Read of size 1 at addr fff00000c6576001 by task kunit_try_catch/211
[   26.250171] 
[   26.250583] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.252180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.253012] Hardware name: linux,dummy-virt (DT)
[   26.253581] Call trace:
[   26.253943]  show_stack+0x20/0x38 (C)
[   26.254415]  dump_stack_lvl+0x8c/0xd0
[   26.255217]  print_report+0x118/0x5e0
[   26.255871]  kasan_report+0xc8/0x118
[   26.256626]  __asan_report_load1_noabort+0x20/0x30
[   26.257325]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.258047]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   26.258850]  kunit_try_run_case+0x14c/0x3d0
[   26.259638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.260481]  kthread+0x24c/0x2d0
[   26.260964]  ret_from_fork+0x10/0x20
[   26.261447] 
[   26.261800] The buggy address belongs to the physical page:
[   26.262403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   26.263880] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.264634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.265633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.266613] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.267569] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.268682] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.269604] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   26.270574] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.272079] page dumped because: kasan: bad access detected
[   26.272825] 
[   26.273219] Memory state around the buggy address:
[   26.273943]  fff00000c6575f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.274849]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.275658] >fff00000c6576000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.276376]                    ^
[   26.276842]  fff00000c6576080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.277585]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.278362] ==================================================================
[   26.199638] ==================================================================
[   26.200659] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.201484] Read of size 1 at addr fff00000c6514673 by task kunit_try_catch/209
[   26.202181] 
[   26.202520] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.204041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.204584] Hardware name: linux,dummy-virt (DT)
[   26.205135] Call trace:
[   26.205530]  show_stack+0x20/0x38 (C)
[   26.206126]  dump_stack_lvl+0x8c/0xd0
[   26.206676]  print_report+0x118/0x5e0
[   26.207410]  kasan_report+0xc8/0x118
[   26.207978]  __asan_report_load1_noabort+0x20/0x30
[   26.208657]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.209355]  mempool_kmalloc_oob_right+0xbc/0x118
[   26.209966]  kunit_try_run_case+0x14c/0x3d0
[   26.210596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.211461]  kthread+0x24c/0x2d0
[   26.211990]  ret_from_fork+0x10/0x20
[   26.212541] 
[   26.212937] Allocated by task 209:
[   26.213389]  kasan_save_stack+0x3c/0x68
[   26.213959]  kasan_save_track+0x20/0x40
[   26.214483]  kasan_save_alloc_info+0x40/0x58
[   26.215599]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.216201]  remove_element+0x130/0x1f8
[   26.216757]  mempool_alloc_preallocated+0x58/0xc0
[   26.217393]  mempool_oob_right_helper+0x98/0x2f0
[   26.218030]  mempool_kmalloc_oob_right+0xbc/0x118
[   26.218645]  kunit_try_run_case+0x14c/0x3d0
[   26.219508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.220187]  kthread+0x24c/0x2d0
[   26.220721]  ret_from_fork+0x10/0x20
[   26.221226] 
[   26.221528] The buggy address belongs to the object at fff00000c6514600
[   26.221528]  which belongs to the cache kmalloc-128 of size 128
[   26.222772] The buggy address is located 0 bytes to the right of
[   26.222772]  allocated 115-byte region [fff00000c6514600, fff00000c6514673)
[   26.224300] 
[   26.224658] The buggy address belongs to the physical page:
[   26.225199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106514
[   26.226189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.226889] page_type: f5(slab)
[   26.227725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.228555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.229397] page dumped because: kasan: bad access detected
[   26.230038] 
[   26.230374] Memory state around the buggy address:
[   26.230980]  fff00000c6514500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.231995]  fff00000c6514580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.232642] >fff00000c6514600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.233291]                                                              ^
[   26.234563]  fff00000c6514680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.235518]  fff00000c6514700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.236395] ==================================================================
[   26.288955] ==================================================================
[   26.290269] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   26.291238] Read of size 1 at addr fff00000c12042bb by task kunit_try_catch/213
[   26.292213] 
[   26.292687] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.293855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.294510] Hardware name: linux,dummy-virt (DT)
[   26.295112] Call trace:
[   26.295463]  show_stack+0x20/0x38 (C)
[   26.296193]  dump_stack_lvl+0x8c/0xd0
[   26.296762]  print_report+0x118/0x5e0
[   26.297411]  kasan_report+0xc8/0x118
[   26.298078]  __asan_report_load1_noabort+0x20/0x30
[   26.298722]  mempool_oob_right_helper+0x2ac/0x2f0
[   26.299341]  mempool_slab_oob_right+0xb8/0x110
[   26.299981]  kunit_try_run_case+0x14c/0x3d0
[   26.300571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.301348]  kthread+0x24c/0x2d0
[   26.301884]  ret_from_fork+0x10/0x20
[   26.302409] 
[   26.302743] Allocated by task 213:
[   26.303190]  kasan_save_stack+0x3c/0x68
[   26.303856]  kasan_save_track+0x20/0x40
[   26.304393]  kasan_save_alloc_info+0x40/0x58
[   26.305046]  __kasan_mempool_unpoison_object+0xbc/0x180
[   26.305648]  remove_element+0x16c/0x1f8
[   26.306281]  mempool_alloc_preallocated+0x58/0xc0
[   26.306901]  mempool_oob_right_helper+0x98/0x2f0
[   26.307486]  mempool_slab_oob_right+0xb8/0x110
[   26.308052]  kunit_try_run_case+0x14c/0x3d0
[   26.308630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.309306]  kthread+0x24c/0x2d0
[   26.309790]  ret_from_fork+0x10/0x20
[   26.310342] 
[   26.310625] The buggy address belongs to the object at fff00000c1204240
[   26.310625]  which belongs to the cache test_cache of size 123
[   26.311793] The buggy address is located 0 bytes to the right of
[   26.311793]  allocated 123-byte region [fff00000c1204240, fff00000c12042bb)
[   26.313077] 
[   26.313422] The buggy address belongs to the physical page:
[   26.314050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204
[   26.314979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.315732] page_type: f5(slab)
[   26.316191] raw: 0bfffe0000000000 fff00000c5798640 dead000000000122 0000000000000000
[   26.316995] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.317874] page dumped because: kasan: bad access detected
[   26.318527] 
[   26.318885] Memory state around the buggy address:
[   26.319436]  fff00000c1204180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.320210]  fff00000c1204200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.321004] >fff00000c1204280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.321773]                                         ^
[   26.322357]  fff00000c1204300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.323184]  fff00000c1204380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.323959] ==================================================================

[   26.446628] ==================================================================
[   26.447970] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   26.449820] Read of size 1 at addr ffff8881029672bb by task kunit_try_catch/232
[   26.450860] 
[   26.451426] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.452497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.452876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.453632] Call Trace:
[   26.453932]  <TASK>
[   26.454197]  dump_stack_lvl+0x73/0xb0
[   26.455504]  print_report+0xd1/0x640
[   26.455923]  ? __virt_addr_valid+0x1db/0x2d0
[   26.456357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.456929]  kasan_report+0x102/0x140
[   26.457480]  ? mempool_oob_right_helper+0x31a/0x380
[   26.457990]  ? mempool_oob_right_helper+0x31a/0x380
[   26.458610]  __asan_report_load1_noabort+0x18/0x20
[   26.459382]  mempool_oob_right_helper+0x31a/0x380
[   26.460333]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.461286]  ? finish_task_switch.isra.0+0x153/0x700
[   26.462585]  mempool_slab_oob_right+0xb1/0x100
[   26.463482]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   26.464332]  ? __switch_to+0x5d9/0xf60
[   26.464733]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   26.465207]  ? __pfx_mempool_free_slab+0x10/0x10
[   26.465677]  ? __pfx_read_tsc+0x10/0x10
[   26.466060]  ? ktime_get_ts64+0x86/0x230
[   26.466669]  kunit_try_run_case+0x1b3/0x490
[   26.467041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.468261]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.469161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.469824]  ? __kthread_parkme+0x82/0x160
[   26.470167]  ? preempt_count_sub+0x50/0x80
[   26.470885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.471953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.473183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.474033]  kthread+0x257/0x310
[   26.474454]  ? __pfx_kthread+0x10/0x10
[   26.475334]  ret_from_fork+0x41/0x80
[   26.476561]  ? __pfx_kthread+0x10/0x10
[   26.477112]  ret_from_fork_asm+0x1a/0x30
[   26.478181]  </TASK>
[   26.478677] 
[   26.479651] Allocated by task 232:
[   26.480837]  kasan_save_stack+0x3d/0x60
[   26.481402]  kasan_save_track+0x18/0x40
[   26.481988]  kasan_save_alloc_info+0x3b/0x50
[   26.482773]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   26.484108]  remove_element+0x11e/0x190
[   26.485375]  mempool_alloc_preallocated+0x4d/0x90
[   26.485852]  mempool_oob_right_helper+0x8b/0x380
[   26.486728]  mempool_slab_oob_right+0xb1/0x100
[   26.487354]  kunit_try_run_case+0x1b3/0x490
[   26.487956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.488442]  kthread+0x257/0x310
[   26.488906]  ret_from_fork+0x41/0x80
[   26.489976]  ret_from_fork_asm+0x1a/0x30
[   26.490414] 
[   26.490586] The buggy address belongs to the object at ffff888102967240
[   26.490586]  which belongs to the cache test_cache of size 123
[   26.491839] The buggy address is located 0 bytes to the right of
[   26.491839]  allocated 123-byte region [ffff888102967240, ffff8881029672bb)
[   26.493524] 
[   26.493870] The buggy address belongs to the physical page:
[   26.494514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102967
[   26.495342] flags: 0x200000000000000(node=0|zone=2)
[   26.496380] page_type: f5(slab)
[   26.496761] raw: 0200000000000000 ffff888101a8e8c0 dead000000000122 0000000000000000
[   26.497750] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   26.498791] page dumped because: kasan: bad access detected
[   26.499158] 
[   26.499518] Memory state around the buggy address:
[   26.500873]  ffff888102967180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.501546]  ffff888102967200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   26.502603] >ffff888102967280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   26.503505]                                         ^
[   26.504057]  ffff888102967300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.505223]  ffff888102967380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.505978] ==================================================================
[   26.317124] ==================================================================
[   26.318014] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   26.318662] Read of size 1 at addr ffff888102960373 by task kunit_try_catch/228
[   26.320015] 
[   26.320565] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.321593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.322061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.323117] Call Trace:
[   26.323831]  <TASK>
[   26.324469]  dump_stack_lvl+0x73/0xb0
[   26.325239]  print_report+0xd1/0x640
[   26.326119]  ? __virt_addr_valid+0x1db/0x2d0
[   26.326786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.327532]  kasan_report+0x102/0x140
[   26.327730]  ? mempool_oob_right_helper+0x31a/0x380
[   26.328593]  ? mempool_oob_right_helper+0x31a/0x380
[   26.329929]  __asan_report_load1_noabort+0x18/0x20
[   26.330851]  mempool_oob_right_helper+0x31a/0x380
[   26.331110]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.331505]  ? finish_task_switch.isra.0+0x153/0x700
[   26.331769]  mempool_kmalloc_oob_right+0xb6/0x100
[   26.332902]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   26.333962]  ? __switch_to+0x5d9/0xf60
[   26.334927]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.335744]  ? __pfx_mempool_kfree+0x10/0x10
[   26.336251]  ? __pfx_read_tsc+0x10/0x10
[   26.336661]  ? ktime_get_ts64+0x86/0x230
[   26.337068]  kunit_try_run_case+0x1b3/0x490
[   26.338044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.338938]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.339847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.340730]  ? __kthread_parkme+0x82/0x160
[   26.341620]  ? preempt_count_sub+0x50/0x80
[   26.342069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.343131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.343844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.344786]  kthread+0x257/0x310
[   26.345703]  ? __pfx_kthread+0x10/0x10
[   26.346254]  ret_from_fork+0x41/0x80
[   26.347490]  ? __pfx_kthread+0x10/0x10
[   26.347861]  ret_from_fork_asm+0x1a/0x30
[   26.349036]  </TASK>
[   26.349268] 
[   26.349432] Allocated by task 228:
[   26.349851]  kasan_save_stack+0x3d/0x60
[   26.350824]  kasan_save_track+0x18/0x40
[   26.351472]  kasan_save_alloc_info+0x3b/0x50
[   26.352379]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.352809]  remove_element+0x11e/0x190
[   26.353385]  mempool_alloc_preallocated+0x4d/0x90
[   26.353798]  mempool_oob_right_helper+0x8b/0x380
[   26.354791]  mempool_kmalloc_oob_right+0xb6/0x100
[   26.355725]  kunit_try_run_case+0x1b3/0x490
[   26.356321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.357232]  kthread+0x257/0x310
[   26.357740]  ret_from_fork+0x41/0x80
[   26.358411]  ret_from_fork_asm+0x1a/0x30
[   26.358795] 
[   26.359040] The buggy address belongs to the object at ffff888102960300
[   26.359040]  which belongs to the cache kmalloc-128 of size 128
[   26.360464] The buggy address is located 0 bytes to the right of
[   26.360464]  allocated 115-byte region [ffff888102960300, ffff888102960373)
[   26.362491] 
[   26.362679] The buggy address belongs to the physical page:
[   26.363516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102960
[   26.364502] flags: 0x200000000000000(node=0|zone=2)
[   26.365190] page_type: f5(slab)
[   26.365542] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.366964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.367500] page dumped because: kasan: bad access detected
[   26.368600] 
[   26.368790] Memory state around the buggy address:
[   26.369207]  ffff888102960200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.370399]  ffff888102960280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.371625] >ffff888102960300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.372612]                                                              ^
[   26.373470]  ffff888102960380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.374409]  ffff888102960400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.374968] ==================================================================
[   26.381826] ==================================================================
[   26.383629] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   26.384631] Read of size 1 at addr ffff8881023ae001 by task kunit_try_catch/230
[   26.385515] 
[   26.385724] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.386653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.387064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.389644] Call Trace:
[   26.390223]  <TASK>
[   26.391085]  dump_stack_lvl+0x73/0xb0
[   26.392112]  print_report+0xd1/0x640
[   26.392818]  ? __virt_addr_valid+0x1db/0x2d0
[   26.393749]  ? kasan_addr_to_slab+0x11/0xa0
[   26.394189]  kasan_report+0x102/0x140
[   26.395155]  ? mempool_oob_right_helper+0x31a/0x380
[   26.396150]  ? mempool_oob_right_helper+0x31a/0x380
[   26.397159]  __asan_report_load1_noabort+0x18/0x20
[   26.398055]  mempool_oob_right_helper+0x31a/0x380
[   26.398434]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   26.398705]  ? finish_task_switch.isra.0+0x153/0x700
[   26.399867]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   26.401178]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   26.401736]  ? __switch_to+0x5d9/0xf60
[   26.403233]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.404024]  ? __pfx_mempool_kfree+0x10/0x10
[   26.404714]  ? __pfx_read_tsc+0x10/0x10
[   26.405648]  ? ktime_get_ts64+0x86/0x230
[   26.406705]  kunit_try_run_case+0x1b3/0x490
[   26.407172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.408244]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.409030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.409476]  ? __kthread_parkme+0x82/0x160
[   26.410524]  ? preempt_count_sub+0x50/0x80
[   26.411629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.412447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.413641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.414163]  kthread+0x257/0x310
[   26.414715]  ? __pfx_kthread+0x10/0x10
[   26.415601]  ret_from_fork+0x41/0x80
[   26.415961]  ? __pfx_kthread+0x10/0x10
[   26.416784]  ret_from_fork_asm+0x1a/0x30
[   26.418224]  </TASK>
[   26.418598] 
[   26.418836] The buggy address belongs to the physical page:
[   26.420366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023ac
[   26.421750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.422848] flags: 0x200000000000040(head|node=0|zone=2)
[   26.424379] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.425991] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.426770] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.428005] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.430260] head: 0200000000000002 ffffea000408eb01 ffffffffffffffff 0000000000000000
[   26.430690] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.431999] page dumped because: kasan: bad access detected
[   26.432834] 
[   26.433036] Memory state around the buggy address:
[   26.434054]  ffff8881023adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.435152]  ffff8881023adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.435763] >ffff8881023ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.436518]                    ^
[   26.436877]  ffff8881023ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.437918]  ffff8881023ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.438614] ==================================================================