Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.412478] ================================================================== [ 20.413002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.413781] Read of size 1 at addr fff00000c3f2b2bb by task kunit_try_catch/215 [ 20.414376] [ 20.414515] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.414610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.414642] Hardware name: linux,dummy-virt (DT) [ 20.414678] Call trace: [ 20.414706] show_stack+0x20/0x38 (C) [ 20.414770] dump_stack_lvl+0x8c/0xd0 [ 20.414822] print_report+0x118/0x608 [ 20.414877] kasan_report+0xdc/0x128 [ 20.414926] __asan_report_load1_noabort+0x20/0x30 [ 20.414980] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.415031] mempool_slab_oob_right+0xc0/0x118 [ 20.415085] kunit_try_run_case+0x170/0x3f0 [ 20.415138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.415925] kthread+0x318/0x620 [ 20.416026] ret_from_fork+0x10/0x20 [ 20.416088] [ 20.419377] Allocated by task 215: [ 20.419605] kasan_save_stack+0x3c/0x68 [ 20.419828] kasan_save_track+0x20/0x40 [ 20.419979] kasan_save_alloc_info+0x40/0x58 [ 20.420334] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.420651] remove_element+0x16c/0x1f8 [ 20.420826] mempool_alloc_preallocated+0x58/0xc0 [ 20.421238] mempool_oob_right_helper+0x98/0x2f0 [ 20.421623] mempool_slab_oob_right+0xc0/0x118 [ 20.421849] kunit_try_run_case+0x170/0x3f0 [ 20.422295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.422681] kthread+0x318/0x620 [ 20.422958] ret_from_fork+0x10/0x20 [ 20.423306] [ 20.423464] The buggy address belongs to the object at fff00000c3f2b240 [ 20.423464] which belongs to the cache test_cache of size 123 [ 20.423904] The buggy address is located 0 bytes to the right of [ 20.423904] allocated 123-byte region [fff00000c3f2b240, fff00000c3f2b2bb) [ 20.424403] [ 20.424542] The buggy address belongs to the physical page: [ 20.424809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f2b [ 20.425681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.425977] page_type: f5(slab) [ 20.426670] raw: 0bfffe0000000000 fff00000c3f5c280 dead000000000122 0000000000000000 [ 20.426994] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.427274] page dumped because: kasan: bad access detected [ 20.427482] [ 20.427596] Memory state around the buggy address: [ 20.427797] fff00000c3f2b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.428062] fff00000c3f2b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.428798] >fff00000c3f2b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.429055] ^ [ 20.429422] fff00000c3f2b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.429765] fff00000c3f2b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.430245] ================================================================== [ 20.391448] ================================================================== [ 20.391934] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.392548] Read of size 1 at addr fff00000c669a001 by task kunit_try_catch/213 [ 20.392962] [ 20.393113] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.393231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.393266] Hardware name: linux,dummy-virt (DT) [ 20.393305] Call trace: [ 20.393332] show_stack+0x20/0x38 (C) [ 20.393396] dump_stack_lvl+0x8c/0xd0 [ 20.393454] print_report+0x118/0x608 [ 20.393530] kasan_report+0xdc/0x128 [ 20.393588] __asan_report_load1_noabort+0x20/0x30 [ 20.393643] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.393698] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.393754] kunit_try_run_case+0x170/0x3f0 [ 20.393812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.393871] kthread+0x318/0x620 [ 20.393924] ret_from_fork+0x10/0x20 [ 20.393981] [ 20.397554] The buggy address belongs to the physical page: [ 20.397843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106698 [ 20.398103] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.398344] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.398594] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.399958] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.400244] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.400479] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.400714] head: 0bfffe0000000002 ffffc1ffc319a601 ffffffffffffffff 0000000000000000 [ 20.400982] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.401274] page dumped because: kasan: bad access detected [ 20.401529] [ 20.401666] Memory state around the buggy address: [ 20.401847] fff00000c6699f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.402086] fff00000c6699f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.403357] >fff00000c669a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.403589] ^ [ 20.403732] fff00000c669a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.403995] fff00000c669a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.404281] ================================================================== [ 20.365427] ================================================================== [ 20.366024] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.366545] Read of size 1 at addr fff00000c5a72f73 by task kunit_try_catch/211 [ 20.366901] [ 20.367021] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.367117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.367159] Hardware name: linux,dummy-virt (DT) [ 20.367206] Call trace: [ 20.367234] show_stack+0x20/0x38 (C) [ 20.367295] dump_stack_lvl+0x8c/0xd0 [ 20.367352] print_report+0x118/0x608 [ 20.367406] kasan_report+0xdc/0x128 [ 20.367455] __asan_report_load1_noabort+0x20/0x30 [ 20.367504] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.367567] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.367619] kunit_try_run_case+0x170/0x3f0 [ 20.367679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.367733] kthread+0x318/0x620 [ 20.367829] ret_from_fork+0x10/0x20 [ 20.367910] [ 20.372147] Allocated by task 211: [ 20.372376] kasan_save_stack+0x3c/0x68 [ 20.372559] kasan_save_track+0x20/0x40 [ 20.372915] kasan_save_alloc_info+0x40/0x58 [ 20.373257] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.373538] remove_element+0x130/0x1f8 [ 20.373742] mempool_alloc_preallocated+0x58/0xc0 [ 20.374038] mempool_oob_right_helper+0x98/0x2f0 [ 20.374387] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.374688] kunit_try_run_case+0x170/0x3f0 [ 20.374918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.375340] kthread+0x318/0x620 [ 20.375508] ret_from_fork+0x10/0x20 [ 20.375775] [ 20.375950] The buggy address belongs to the object at fff00000c5a72f00 [ 20.375950] which belongs to the cache kmalloc-128 of size 128 [ 20.376722] The buggy address is located 0 bytes to the right of [ 20.376722] allocated 115-byte region [fff00000c5a72f00, fff00000c5a72f73) [ 20.377263] [ 20.377440] The buggy address belongs to the physical page: [ 20.377728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72 [ 20.378105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.378431] page_type: f5(slab) [ 20.378643] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.379076] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 20.379470] page dumped because: kasan: bad access detected [ 20.379815] [ 20.379989] Memory state around the buggy address: [ 20.380392] fff00000c5a72e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.380762] fff00000c5a72e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.381107] >fff00000c5a72f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.381482] ^ [ 20.381877] fff00000c5a72f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.382702] fff00000c5a73000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.383336] ==================================================================
[ 14.146535] ================================================================== [ 14.148060] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 14.149230] Read of size 1 at addr ffff888101bf12bb by task kunit_try_catch/233 [ 14.150217] [ 14.150508] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.150672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.150689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.150711] Call Trace: [ 14.150724] <TASK> [ 14.150741] dump_stack_lvl+0x73/0xb0 [ 14.150771] print_report+0xd1/0x650 [ 14.150795] ? __virt_addr_valid+0x1db/0x2d0 [ 14.150856] ? mempool_oob_right_helper+0x31a/0x380 [ 14.150879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.150905] ? mempool_oob_right_helper+0x31a/0x380 [ 14.150927] kasan_report+0x140/0x180 [ 14.150948] ? mempool_oob_right_helper+0x31a/0x380 [ 14.150975] __asan_report_load1_noabort+0x18/0x20 [ 14.150998] mempool_oob_right_helper+0x31a/0x380 [ 14.151033] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.151060] ? finish_task_switch.isra.0+0x153/0x700 [ 14.151088] mempool_slab_oob_right+0xee/0x140 [ 14.151111] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 14.151136] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 14.151157] ? __pfx_mempool_free_slab+0x10/0x10 [ 14.151179] ? __pfx_read_tsc+0x10/0x10 [ 14.151201] ? ktime_get_ts64+0x86/0x230 [ 14.151226] kunit_try_run_case+0x1a6/0x480 [ 14.151250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.151270] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.151295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.151318] ? __kthread_parkme+0x82/0x160 [ 14.151341] ? preempt_count_sub+0x50/0x80 [ 14.151364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.151387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.151412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.151438] kthread+0x324/0x6e0 [ 14.151458] ? trace_preempt_on+0x20/0xc0 [ 14.151482] ? __pfx_kthread+0x10/0x10 [ 14.151504] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.151526] ? calculate_sigpending+0x7b/0xa0 [ 14.151569] ? __pfx_kthread+0x10/0x10 [ 14.151592] ret_from_fork+0x41/0x80 [ 14.151611] ? __pfx_kthread+0x10/0x10 [ 14.151632] ret_from_fork_asm+0x1a/0x30 [ 14.151664] </TASK> [ 14.151675] [ 14.169270] Allocated by task 233: [ 14.169412] kasan_save_stack+0x45/0x70 [ 14.169561] kasan_save_track+0x18/0x40 [ 14.169695] kasan_save_alloc_info+0x3b/0x50 [ 14.169850] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 14.170031] remove_element+0x11e/0x190 [ 14.170166] mempool_alloc_preallocated+0x4d/0x90 [ 14.170323] mempool_oob_right_helper+0x8b/0x380 [ 14.170485] mempool_slab_oob_right+0xee/0x140 [ 14.170639] kunit_try_run_case+0x1a6/0x480 [ 14.170784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.170960] kthread+0x324/0x6e0 [ 14.171395] ret_from_fork+0x41/0x80 [ 14.171622] ret_from_fork_asm+0x1a/0x30 [ 14.171984] [ 14.172098] The buggy address belongs to the object at ffff888101bf1240 [ 14.172098] which belongs to the cache test_cache of size 123 [ 14.172458] The buggy address is located 0 bytes to the right of [ 14.172458] allocated 123-byte region [ffff888101bf1240, ffff888101bf12bb) [ 14.173516] [ 14.173762] The buggy address belongs to the physical page: [ 14.174251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf1 [ 14.175274] flags: 0x200000000000000(node=0|zone=2) [ 14.175498] page_type: f5(slab) [ 14.175640] raw: 0200000000000000 ffff888101b62b40 dead000000000122 0000000000000000 [ 14.175958] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 14.177495] page dumped because: kasan: bad access detected [ 14.177691] [ 14.177773] Memory state around the buggy address: [ 14.177930] ffff888101bf1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.178157] ffff888101bf1200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 14.179254] >ffff888101bf1280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 14.179636] ^ [ 14.179883] ffff888101bf1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.180249] ffff888101bf1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.180625] ================================================================== [ 14.097990] ================================================================== [ 14.098431] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 14.098830] Read of size 1 at addr ffff888102a2c573 by task kunit_try_catch/229 [ 14.099192] [ 14.099311] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.099356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.099404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.099452] Call Trace: [ 14.099476] <TASK> [ 14.099497] dump_stack_lvl+0x73/0xb0 [ 14.099580] print_report+0xd1/0x650 [ 14.099625] ? __virt_addr_valid+0x1db/0x2d0 [ 14.099654] ? mempool_oob_right_helper+0x31a/0x380 [ 14.099681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.099710] ? mempool_oob_right_helper+0x31a/0x380 [ 14.099736] kasan_report+0x140/0x180 [ 14.099760] ? mempool_oob_right_helper+0x31a/0x380 [ 14.099791] __asan_report_load1_noabort+0x18/0x20 [ 14.099816] mempool_oob_right_helper+0x31a/0x380 [ 14.099843] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.099872] ? finish_task_switch.isra.0+0x153/0x700 [ 14.099905] mempool_kmalloc_oob_right+0xf3/0x150 [ 14.099932] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 14.099959] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.099985] ? __pfx_mempool_kfree+0x10/0x10 [ 14.100009] ? __pfx_read_tsc+0x10/0x10 [ 14.100043] ? ktime_get_ts64+0x86/0x230 [ 14.100073] kunit_try_run_case+0x1a6/0x480 [ 14.100102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.100127] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.100156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.100184] ? __kthread_parkme+0x82/0x160 [ 14.100211] ? preempt_count_sub+0x50/0x80 [ 14.100238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.100264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.100294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.100322] kthread+0x324/0x6e0 [ 14.100346] ? trace_preempt_on+0x20/0xc0 [ 14.100374] ? __pfx_kthread+0x10/0x10 [ 14.100398] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.100424] ? calculate_sigpending+0x7b/0xa0 [ 14.100450] ? __pfx_kthread+0x10/0x10 [ 14.100475] ret_from_fork+0x41/0x80 [ 14.100497] ? __pfx_kthread+0x10/0x10 [ 14.100522] ret_from_fork_asm+0x1a/0x30 [ 14.100558] </TASK> [ 14.100569] [ 14.110216] Allocated by task 229: [ 14.110611] kasan_save_stack+0x45/0x70 [ 14.110833] kasan_save_track+0x18/0x40 [ 14.111089] kasan_save_alloc_info+0x3b/0x50 [ 14.111361] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.111742] remove_element+0x11e/0x190 [ 14.111991] mempool_alloc_preallocated+0x4d/0x90 [ 14.112253] mempool_oob_right_helper+0x8b/0x380 [ 14.112530] mempool_kmalloc_oob_right+0xf3/0x150 [ 14.112729] kunit_try_run_case+0x1a6/0x480 [ 14.112945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.113192] kthread+0x324/0x6e0 [ 14.113362] ret_from_fork+0x41/0x80 [ 14.113548] ret_from_fork_asm+0x1a/0x30 [ 14.113729] [ 14.113827] The buggy address belongs to the object at ffff888102a2c500 [ 14.113827] which belongs to the cache kmalloc-128 of size 128 [ 14.114325] The buggy address is located 0 bytes to the right of [ 14.114325] allocated 115-byte region [ffff888102a2c500, ffff888102a2c573) [ 14.114969] [ 14.115112] The buggy address belongs to the physical page: [ 14.115401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c [ 14.115848] flags: 0x200000000000000(node=0|zone=2) [ 14.116093] page_type: f5(slab) [ 14.116251] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.117071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.117358] page dumped because: kasan: bad access detected [ 14.117690] [ 14.117785] Memory state around the buggy address: [ 14.118125] ffff888102a2c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.118416] ffff888102a2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.118852] >ffff888102a2c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.119125] ^ [ 14.119408] ffff888102a2c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.119969] ffff888102a2c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.120231] ================================================================== [ 14.124118] ================================================================== [ 14.124582] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380 [ 14.125158] Read of size 1 at addr ffff888102cda001 by task kunit_try_catch/231 [ 14.125509] [ 14.125796] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.125842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.125854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.125875] Call Trace: [ 14.125887] <TASK> [ 14.125904] dump_stack_lvl+0x73/0xb0 [ 14.125936] print_report+0xd1/0x650 [ 14.125963] ? __virt_addr_valid+0x1db/0x2d0 [ 14.125989] ? mempool_oob_right_helper+0x31a/0x380 [ 14.126027] ? kasan_addr_to_slab+0x11/0xa0 [ 14.126071] ? mempool_oob_right_helper+0x31a/0x380 [ 14.126097] kasan_report+0x140/0x180 [ 14.126123] ? mempool_oob_right_helper+0x31a/0x380 [ 14.126153] __asan_report_load1_noabort+0x18/0x20 [ 14.126181] mempool_oob_right_helper+0x31a/0x380 [ 14.126208] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 14.126237] ? finish_task_switch.isra.0+0x153/0x700 [ 14.126268] mempool_kmalloc_large_oob_right+0xf3/0x150 [ 14.126296] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 14.126326] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.126350] ? __pfx_mempool_kfree+0x10/0x10 [ 14.126374] ? __pfx_read_tsc+0x10/0x10 [ 14.126398] ? ktime_get_ts64+0x86/0x230 [ 14.126427] kunit_try_run_case+0x1a6/0x480 [ 14.126454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.126479] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.126507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.126535] ? __kthread_parkme+0x82/0x160 [ 14.126561] ? preempt_count_sub+0x50/0x80 [ 14.126589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.126616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.126646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.126675] kthread+0x324/0x6e0 [ 14.126699] ? trace_preempt_on+0x20/0xc0 [ 14.126726] ? __pfx_kthread+0x10/0x10 [ 14.126751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.126777] ? calculate_sigpending+0x7b/0xa0 [ 14.126803] ? __pfx_kthread+0x10/0x10 [ 14.126829] ret_from_fork+0x41/0x80 [ 14.126852] ? __pfx_kthread+0x10/0x10 [ 14.126876] ret_from_fork_asm+0x1a/0x30 [ 14.126912] </TASK> [ 14.126922] [ 14.136281] The buggy address belongs to the physical page: [ 14.136527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cd8 [ 14.136930] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.137164] flags: 0x200000000000040(head|node=0|zone=2) [ 14.137355] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.137807] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.138378] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.138906] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.139236] head: 0200000000000002 ffffea00040b3601 ffffffffffffffff 0000000000000000 [ 14.139489] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 14.140010] page dumped because: kasan: bad access detected [ 14.140295] [ 14.140374] Memory state around the buggy address: [ 14.140666] ffff888102cd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.140987] ffff888102cd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.141317] >ffff888102cda000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.141650] ^ [ 14.141967] ffff888102cda080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.142249] ffff888102cda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 14.142521] ==================================================================