Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.412478] ==================================================================
[   20.413002] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.413781] Read of size 1 at addr fff00000c3f2b2bb by task kunit_try_catch/215
[   20.414376] 
[   20.414515] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.414610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.414642] Hardware name: linux,dummy-virt (DT)
[   20.414678] Call trace:
[   20.414706]  show_stack+0x20/0x38 (C)
[   20.414770]  dump_stack_lvl+0x8c/0xd0
[   20.414822]  print_report+0x118/0x608
[   20.414877]  kasan_report+0xdc/0x128
[   20.414926]  __asan_report_load1_noabort+0x20/0x30
[   20.414980]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.415031]  mempool_slab_oob_right+0xc0/0x118
[   20.415085]  kunit_try_run_case+0x170/0x3f0
[   20.415138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.415925]  kthread+0x318/0x620
[   20.416026]  ret_from_fork+0x10/0x20
[   20.416088] 
[   20.419377] Allocated by task 215:
[   20.419605]  kasan_save_stack+0x3c/0x68
[   20.419828]  kasan_save_track+0x20/0x40
[   20.419979]  kasan_save_alloc_info+0x40/0x58
[   20.420334]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.420651]  remove_element+0x16c/0x1f8
[   20.420826]  mempool_alloc_preallocated+0x58/0xc0
[   20.421238]  mempool_oob_right_helper+0x98/0x2f0
[   20.421623]  mempool_slab_oob_right+0xc0/0x118
[   20.421849]  kunit_try_run_case+0x170/0x3f0
[   20.422295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.422681]  kthread+0x318/0x620
[   20.422958]  ret_from_fork+0x10/0x20
[   20.423306] 
[   20.423464] The buggy address belongs to the object at fff00000c3f2b240
[   20.423464]  which belongs to the cache test_cache of size 123
[   20.423904] The buggy address is located 0 bytes to the right of
[   20.423904]  allocated 123-byte region [fff00000c3f2b240, fff00000c3f2b2bb)
[   20.424403] 
[   20.424542] The buggy address belongs to the physical page:
[   20.424809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f2b
[   20.425681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.425977] page_type: f5(slab)
[   20.426670] raw: 0bfffe0000000000 fff00000c3f5c280 dead000000000122 0000000000000000
[   20.426994] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.427274] page dumped because: kasan: bad access detected
[   20.427482] 
[   20.427596] Memory state around the buggy address:
[   20.427797]  fff00000c3f2b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.428062]  fff00000c3f2b200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.428798] >fff00000c3f2b280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.429055]                                         ^
[   20.429422]  fff00000c3f2b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.429765]  fff00000c3f2b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.430245] ==================================================================
[   20.391448] ==================================================================
[   20.391934] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.392548] Read of size 1 at addr fff00000c669a001 by task kunit_try_catch/213
[   20.392962] 
[   20.393113] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.393231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.393266] Hardware name: linux,dummy-virt (DT)
[   20.393305] Call trace:
[   20.393332]  show_stack+0x20/0x38 (C)
[   20.393396]  dump_stack_lvl+0x8c/0xd0
[   20.393454]  print_report+0x118/0x608
[   20.393530]  kasan_report+0xdc/0x128
[   20.393588]  __asan_report_load1_noabort+0x20/0x30
[   20.393643]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.393698]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.393754]  kunit_try_run_case+0x170/0x3f0
[   20.393812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.393871]  kthread+0x318/0x620
[   20.393924]  ret_from_fork+0x10/0x20
[   20.393981] 
[   20.397554] The buggy address belongs to the physical page:
[   20.397843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106698
[   20.398103] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.398344] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.398594] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.399958] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.400244] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.400479] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.400714] head: 0bfffe0000000002 ffffc1ffc319a601 ffffffffffffffff 0000000000000000
[   20.400982] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.401274] page dumped because: kasan: bad access detected
[   20.401529] 
[   20.401666] Memory state around the buggy address:
[   20.401847]  fff00000c6699f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.402086]  fff00000c6699f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.403357] >fff00000c669a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.403589]                    ^
[   20.403732]  fff00000c669a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.403995]  fff00000c669a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.404281] ==================================================================
[   20.365427] ==================================================================
[   20.366024] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.366545] Read of size 1 at addr fff00000c5a72f73 by task kunit_try_catch/211
[   20.366901] 
[   20.367021] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   20.367117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.367159] Hardware name: linux,dummy-virt (DT)
[   20.367206] Call trace:
[   20.367234]  show_stack+0x20/0x38 (C)
[   20.367295]  dump_stack_lvl+0x8c/0xd0
[   20.367352]  print_report+0x118/0x608
[   20.367406]  kasan_report+0xdc/0x128
[   20.367455]  __asan_report_load1_noabort+0x20/0x30
[   20.367504]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.367567]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.367619]  kunit_try_run_case+0x170/0x3f0
[   20.367679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.367733]  kthread+0x318/0x620
[   20.367829]  ret_from_fork+0x10/0x20
[   20.367910] 
[   20.372147] Allocated by task 211:
[   20.372376]  kasan_save_stack+0x3c/0x68
[   20.372559]  kasan_save_track+0x20/0x40
[   20.372915]  kasan_save_alloc_info+0x40/0x58
[   20.373257]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.373538]  remove_element+0x130/0x1f8
[   20.373742]  mempool_alloc_preallocated+0x58/0xc0
[   20.374038]  mempool_oob_right_helper+0x98/0x2f0
[   20.374387]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.374688]  kunit_try_run_case+0x170/0x3f0
[   20.374918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.375340]  kthread+0x318/0x620
[   20.375508]  ret_from_fork+0x10/0x20
[   20.375775] 
[   20.375950] The buggy address belongs to the object at fff00000c5a72f00
[   20.375950]  which belongs to the cache kmalloc-128 of size 128
[   20.376722] The buggy address is located 0 bytes to the right of
[   20.376722]  allocated 115-byte region [fff00000c5a72f00, fff00000c5a72f73)
[   20.377263] 
[   20.377440] The buggy address belongs to the physical page:
[   20.377728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a72
[   20.378105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.378431] page_type: f5(slab)
[   20.378643] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.379076] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   20.379470] page dumped because: kasan: bad access detected
[   20.379815] 
[   20.379989] Memory state around the buggy address:
[   20.380392]  fff00000c5a72e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.380762]  fff00000c5a72e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.381107] >fff00000c5a72f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.381482]                                                              ^
[   20.381877]  fff00000c5a72f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.382702]  fff00000c5a73000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.383336] ==================================================================

[   14.146535] ==================================================================
[   14.148060] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   14.149230] Read of size 1 at addr ffff888101bf12bb by task kunit_try_catch/233
[   14.150217] 
[   14.150508] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.150672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.150689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.150711] Call Trace:
[   14.150724]  <TASK>
[   14.150741]  dump_stack_lvl+0x73/0xb0
[   14.150771]  print_report+0xd1/0x650
[   14.150795]  ? __virt_addr_valid+0x1db/0x2d0
[   14.150856]  ? mempool_oob_right_helper+0x31a/0x380
[   14.150879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.150905]  ? mempool_oob_right_helper+0x31a/0x380
[   14.150927]  kasan_report+0x140/0x180
[   14.150948]  ? mempool_oob_right_helper+0x31a/0x380
[   14.150975]  __asan_report_load1_noabort+0x18/0x20
[   14.150998]  mempool_oob_right_helper+0x31a/0x380
[   14.151033]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.151060]  ? finish_task_switch.isra.0+0x153/0x700
[   14.151088]  mempool_slab_oob_right+0xee/0x140
[   14.151111]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   14.151136]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   14.151157]  ? __pfx_mempool_free_slab+0x10/0x10
[   14.151179]  ? __pfx_read_tsc+0x10/0x10
[   14.151201]  ? ktime_get_ts64+0x86/0x230
[   14.151226]  kunit_try_run_case+0x1a6/0x480
[   14.151250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.151270]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.151295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.151318]  ? __kthread_parkme+0x82/0x160
[   14.151341]  ? preempt_count_sub+0x50/0x80
[   14.151364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.151387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.151412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.151438]  kthread+0x324/0x6e0
[   14.151458]  ? trace_preempt_on+0x20/0xc0
[   14.151482]  ? __pfx_kthread+0x10/0x10
[   14.151504]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.151526]  ? calculate_sigpending+0x7b/0xa0
[   14.151569]  ? __pfx_kthread+0x10/0x10
[   14.151592]  ret_from_fork+0x41/0x80
[   14.151611]  ? __pfx_kthread+0x10/0x10
[   14.151632]  ret_from_fork_asm+0x1a/0x30
[   14.151664]  </TASK>
[   14.151675] 
[   14.169270] Allocated by task 233:
[   14.169412]  kasan_save_stack+0x45/0x70
[   14.169561]  kasan_save_track+0x18/0x40
[   14.169695]  kasan_save_alloc_info+0x3b/0x50
[   14.169850]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   14.170031]  remove_element+0x11e/0x190
[   14.170166]  mempool_alloc_preallocated+0x4d/0x90
[   14.170323]  mempool_oob_right_helper+0x8b/0x380
[   14.170485]  mempool_slab_oob_right+0xee/0x140
[   14.170639]  kunit_try_run_case+0x1a6/0x480
[   14.170784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.170960]  kthread+0x324/0x6e0
[   14.171395]  ret_from_fork+0x41/0x80
[   14.171622]  ret_from_fork_asm+0x1a/0x30
[   14.171984] 
[   14.172098] The buggy address belongs to the object at ffff888101bf1240
[   14.172098]  which belongs to the cache test_cache of size 123
[   14.172458] The buggy address is located 0 bytes to the right of
[   14.172458]  allocated 123-byte region [ffff888101bf1240, ffff888101bf12bb)
[   14.173516] 
[   14.173762] The buggy address belongs to the physical page:
[   14.174251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf1
[   14.175274] flags: 0x200000000000000(node=0|zone=2)
[   14.175498] page_type: f5(slab)
[   14.175640] raw: 0200000000000000 ffff888101b62b40 dead000000000122 0000000000000000
[   14.175958] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   14.177495] page dumped because: kasan: bad access detected
[   14.177691] 
[   14.177773] Memory state around the buggy address:
[   14.177930]  ffff888101bf1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.178157]  ffff888101bf1200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   14.179254] >ffff888101bf1280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   14.179636]                                         ^
[   14.179883]  ffff888101bf1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180249]  ffff888101bf1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180625] ==================================================================
[   14.097990] ==================================================================
[   14.098431] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   14.098830] Read of size 1 at addr ffff888102a2c573 by task kunit_try_catch/229
[   14.099192] 
[   14.099311] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.099356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.099404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.099452] Call Trace:
[   14.099476]  <TASK>
[   14.099497]  dump_stack_lvl+0x73/0xb0
[   14.099580]  print_report+0xd1/0x650
[   14.099625]  ? __virt_addr_valid+0x1db/0x2d0
[   14.099654]  ? mempool_oob_right_helper+0x31a/0x380
[   14.099681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.099710]  ? mempool_oob_right_helper+0x31a/0x380
[   14.099736]  kasan_report+0x140/0x180
[   14.099760]  ? mempool_oob_right_helper+0x31a/0x380
[   14.099791]  __asan_report_load1_noabort+0x18/0x20
[   14.099816]  mempool_oob_right_helper+0x31a/0x380
[   14.099843]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.099872]  ? finish_task_switch.isra.0+0x153/0x700
[   14.099905]  mempool_kmalloc_oob_right+0xf3/0x150
[   14.099932]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   14.099959]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.099985]  ? __pfx_mempool_kfree+0x10/0x10
[   14.100009]  ? __pfx_read_tsc+0x10/0x10
[   14.100043]  ? ktime_get_ts64+0x86/0x230
[   14.100073]  kunit_try_run_case+0x1a6/0x480
[   14.100102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.100127]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.100156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.100184]  ? __kthread_parkme+0x82/0x160
[   14.100211]  ? preempt_count_sub+0x50/0x80
[   14.100238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.100264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.100294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.100322]  kthread+0x324/0x6e0
[   14.100346]  ? trace_preempt_on+0x20/0xc0
[   14.100374]  ? __pfx_kthread+0x10/0x10
[   14.100398]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.100424]  ? calculate_sigpending+0x7b/0xa0
[   14.100450]  ? __pfx_kthread+0x10/0x10
[   14.100475]  ret_from_fork+0x41/0x80
[   14.100497]  ? __pfx_kthread+0x10/0x10
[   14.100522]  ret_from_fork_asm+0x1a/0x30
[   14.100558]  </TASK>
[   14.100569] 
[   14.110216] Allocated by task 229:
[   14.110611]  kasan_save_stack+0x45/0x70
[   14.110833]  kasan_save_track+0x18/0x40
[   14.111089]  kasan_save_alloc_info+0x3b/0x50
[   14.111361]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.111742]  remove_element+0x11e/0x190
[   14.111991]  mempool_alloc_preallocated+0x4d/0x90
[   14.112253]  mempool_oob_right_helper+0x8b/0x380
[   14.112530]  mempool_kmalloc_oob_right+0xf3/0x150
[   14.112729]  kunit_try_run_case+0x1a6/0x480
[   14.112945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.113192]  kthread+0x324/0x6e0
[   14.113362]  ret_from_fork+0x41/0x80
[   14.113548]  ret_from_fork_asm+0x1a/0x30
[   14.113729] 
[   14.113827] The buggy address belongs to the object at ffff888102a2c500
[   14.113827]  which belongs to the cache kmalloc-128 of size 128
[   14.114325] The buggy address is located 0 bytes to the right of
[   14.114325]  allocated 115-byte region [ffff888102a2c500, ffff888102a2c573)
[   14.114969] 
[   14.115112] The buggy address belongs to the physical page:
[   14.115401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   14.115848] flags: 0x200000000000000(node=0|zone=2)
[   14.116093] page_type: f5(slab)
[   14.116251] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.117071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.117358] page dumped because: kasan: bad access detected
[   14.117690] 
[   14.117785] Memory state around the buggy address:
[   14.118125]  ffff888102a2c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.118416]  ffff888102a2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.118852] >ffff888102a2c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.119125]                                                              ^
[   14.119408]  ffff888102a2c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.119969]  ffff888102a2c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.120231] ==================================================================
[   14.124118] ==================================================================
[   14.124582] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   14.125158] Read of size 1 at addr ffff888102cda001 by task kunit_try_catch/231
[   14.125509] 
[   14.125796] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   14.125842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.125854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.125875] Call Trace:
[   14.125887]  <TASK>
[   14.125904]  dump_stack_lvl+0x73/0xb0
[   14.125936]  print_report+0xd1/0x650
[   14.125963]  ? __virt_addr_valid+0x1db/0x2d0
[   14.125989]  ? mempool_oob_right_helper+0x31a/0x380
[   14.126027]  ? kasan_addr_to_slab+0x11/0xa0
[   14.126071]  ? mempool_oob_right_helper+0x31a/0x380
[   14.126097]  kasan_report+0x140/0x180
[   14.126123]  ? mempool_oob_right_helper+0x31a/0x380
[   14.126153]  __asan_report_load1_noabort+0x18/0x20
[   14.126181]  mempool_oob_right_helper+0x31a/0x380
[   14.126208]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   14.126237]  ? finish_task_switch.isra.0+0x153/0x700
[   14.126268]  mempool_kmalloc_large_oob_right+0xf3/0x150
[   14.126296]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   14.126326]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.126350]  ? __pfx_mempool_kfree+0x10/0x10
[   14.126374]  ? __pfx_read_tsc+0x10/0x10
[   14.126398]  ? ktime_get_ts64+0x86/0x230
[   14.126427]  kunit_try_run_case+0x1a6/0x480
[   14.126454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.126479]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.126507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.126535]  ? __kthread_parkme+0x82/0x160
[   14.126561]  ? preempt_count_sub+0x50/0x80
[   14.126589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.126616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.126646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.126675]  kthread+0x324/0x6e0
[   14.126699]  ? trace_preempt_on+0x20/0xc0
[   14.126726]  ? __pfx_kthread+0x10/0x10
[   14.126751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.126777]  ? calculate_sigpending+0x7b/0xa0
[   14.126803]  ? __pfx_kthread+0x10/0x10
[   14.126829]  ret_from_fork+0x41/0x80
[   14.126852]  ? __pfx_kthread+0x10/0x10
[   14.126876]  ret_from_fork_asm+0x1a/0x30
[   14.126912]  </TASK>
[   14.126922] 
[   14.136281] The buggy address belongs to the physical page:
[   14.136527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cd8
[   14.136930] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.137164] flags: 0x200000000000040(head|node=0|zone=2)
[   14.137355] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.137807] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.138378] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.138906] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.139236] head: 0200000000000002 ffffea00040b3601 ffffffffffffffff 0000000000000000
[   14.139489] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   14.140010] page dumped because: kasan: bad access detected
[   14.140295] 
[   14.140374] Memory state around the buggy address:
[   14.140666]  ffff888102cd9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.140987]  ffff888102cd9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.141317] >ffff888102cda000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.141650]                    ^
[   14.141967]  ffff888102cda080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.142249]  ffff888102cda100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   14.142521] ==================================================================