Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   36.537928] ==================================================================
[   36.539523] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   36.540617] Free of addr fff00000c6a52900 by task kunit_try_catch/224
[   36.542873] 
[   36.543258] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   36.545380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.546012] Hardware name: linux,dummy-virt (DT)
[   36.546880] Call trace:
[   36.547464]  show_stack+0x20/0x38 (C)
[   36.548257]  dump_stack_lvl+0x8c/0xd0
[   36.549159]  print_report+0x118/0x5e0
[   36.550005]  kasan_report_invalid_free+0xb0/0xd8
[   36.550665]  check_slab_allocation+0xd4/0x108
[   36.551343]  __kasan_mempool_poison_object+0x78/0x150
[   36.552422]  mempool_free+0x28c/0x328
[   36.552995]  mempool_double_free_helper+0x150/0x2e0
[   36.553578]  mempool_kmalloc_double_free+0xb8/0x110
[   36.555751]  kunit_try_run_case+0x14c/0x3d0
[   36.557799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.559890]  kthread+0x24c/0x2d0
[   36.560338]  ret_from_fork+0x10/0x20
[   36.562610] 
[   36.563520] Allocated by task 224:
[   36.564834]  kasan_save_stack+0x3c/0x68
[   36.565996]  kasan_save_track+0x20/0x40
[   36.566779]  kasan_save_alloc_info+0x40/0x58
[   36.567553]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.568062]  remove_element+0x130/0x1f8
[   36.569018]  mempool_alloc_preallocated+0x58/0xc0
[   36.570804]  mempool_double_free_helper+0x94/0x2e0
[   36.571848]  mempool_kmalloc_double_free+0xb8/0x110
[   36.572421]  kunit_try_run_case+0x14c/0x3d0
[   36.573205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.574601]  kthread+0x24c/0x2d0
[   36.575171]  ret_from_fork+0x10/0x20
[   36.575778] 
[   36.576243] Freed by task 224:
[   36.577463]  kasan_save_stack+0x3c/0x68
[   36.578143]  kasan_save_track+0x20/0x40
[   36.578953]  kasan_save_free_info+0x4c/0x78
[   36.579568]  __kasan_mempool_poison_object+0xc0/0x150
[   36.580362]  mempool_free+0x28c/0x328
[   36.581497]  mempool_double_free_helper+0x100/0x2e0
[   36.582579]  mempool_kmalloc_double_free+0xb8/0x110
[   36.583288]  kunit_try_run_case+0x14c/0x3d0
[   36.584058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.585492]  kthread+0x24c/0x2d0
[   36.585924]  ret_from_fork+0x10/0x20
[   36.586328] 
[   36.586744] The buggy address belongs to the object at fff00000c6a52900
[   36.586744]  which belongs to the cache kmalloc-128 of size 128
[   36.588208] The buggy address is located 0 bytes inside of
[   36.588208]  128-byte region [fff00000c6a52900, fff00000c6a52980)
[   36.590517] 
[   36.590946] The buggy address belongs to the physical page:
[   36.591936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a52
[   36.593904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.595052] page_type: f5(slab)
[   36.595727] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.597198] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.598254] page dumped because: kasan: bad access detected
[   36.599087] 
[   36.599476] Memory state around the buggy address:
[   36.600255]  fff00000c6a52800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.601670]  fff00000c6a52880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.602490] >fff00000c6a52900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.603636]                    ^
[   36.604236]  fff00000c6a52980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605291]  fff00000c6a52a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.607338] ==================================================================
[   36.671327] ==================================================================
[   36.673295] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   36.674272] Free of addr fff00000c6b84000 by task kunit_try_catch/228
[   36.675275] 
[   36.675632] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   36.677357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.677937] Hardware name: linux,dummy-virt (DT)
[   36.678830] Call trace:
[   36.679389]  show_stack+0x20/0x38 (C)
[   36.680019]  dump_stack_lvl+0x8c/0xd0
[   36.681168]  print_report+0x118/0x5e0
[   36.681852]  kasan_report_invalid_free+0xb0/0xd8
[   36.682744]  __kasan_mempool_poison_pages+0xe0/0xe8
[   36.683659]  mempool_free+0x24c/0x328
[   36.684271]  mempool_double_free_helper+0x150/0x2e0
[   36.685413]  mempool_page_alloc_double_free+0xb4/0x110
[   36.686193]  kunit_try_run_case+0x14c/0x3d0
[   36.687013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.687892]  kthread+0x24c/0x2d0
[   36.688506]  ret_from_fork+0x10/0x20
[   36.689241] 
[   36.689875] The buggy address belongs to the physical page:
[   36.691472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b84
[   36.692225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.694125] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.695145] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.696741] page dumped because: kasan: bad access detected
[   36.697751] 
[   36.698119] Memory state around the buggy address:
[   36.698825]  fff00000c6b83f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.699758]  fff00000c6b83f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.701070] >fff00000c6b84000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.702102]                    ^
[   36.702797]  fff00000c6b84080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.703752]  fff00000c6b84100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.704783] ==================================================================
[   36.619425] ==================================================================
[   36.620967] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   36.622298] Free of addr fff00000c6b90000 by task kunit_try_catch/226
[   36.623240] 
[   36.623696] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   36.625142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.626420] Hardware name: linux,dummy-virt (DT)
[   36.627165] Call trace:
[   36.628057]  show_stack+0x20/0x38 (C)
[   36.628803]  dump_stack_lvl+0x8c/0xd0
[   36.629285]  print_report+0x118/0x5e0
[   36.630115]  kasan_report_invalid_free+0xb0/0xd8
[   36.631478]  __kasan_mempool_poison_object+0x14c/0x150
[   36.632294]  mempool_free+0x28c/0x328
[   36.633265]  mempool_double_free_helper+0x150/0x2e0
[   36.634080]  mempool_kmalloc_large_double_free+0xb8/0x110
[   36.634838]  kunit_try_run_case+0x14c/0x3d0
[   36.635799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.637395]  kthread+0x24c/0x2d0
[   36.638134]  ret_from_fork+0x10/0x20
[   36.638793] 
[   36.639107] The buggy address belongs to the physical page:
[   36.639816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b90
[   36.641564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.642475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.643370] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.644839] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.646188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.646840] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.647966] head: 0bfffe0000000002 ffffc1ffc31ae401 ffffffffffffffff 0000000000000000
[   36.649317] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.650514] page dumped because: kasan: bad access detected
[   36.651322] 
[   36.651861] Memory state around the buggy address:
[   36.652351]  fff00000c6b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.653963]  fff00000c6b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.654835] >fff00000c6b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.655772]                    ^
[   36.656377]  fff00000c6b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.657955]  fff00000c6b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.659544] ==================================================================

[   27.526062] ==================================================================
[   27.527179] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   27.529295] Free of addr ffff888101abb900 by task kunit_try_catch/243
[   27.529691] 
[   27.529898] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   27.530847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.531268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.532562] Call Trace:
[   27.533217]  <TASK>
[   27.533916]  dump_stack_lvl+0x73/0xb0
[   27.534382]  print_report+0xd1/0x640
[   27.535312]  ? __virt_addr_valid+0x1db/0x2d0
[   27.535577]  ? mempool_double_free_helper+0x185/0x370
[   27.536106]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.536637]  ? mempool_double_free_helper+0x185/0x370
[   27.537223]  kasan_report_invalid_free+0xc0/0xf0
[   27.537545]  ? mempool_double_free_helper+0x185/0x370
[   27.538174]  ? mempool_double_free_helper+0x185/0x370
[   27.538724]  ? mempool_double_free_helper+0x185/0x370
[   27.539648]  check_slab_allocation+0x101/0x130
[   27.540686]  __kasan_mempool_poison_object+0x91/0x1d0
[   27.541267]  mempool_free+0x2ec/0x380
[   27.541916]  mempool_double_free_helper+0x185/0x370
[   27.542321]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.542853]  ? irqentry_exit+0x2a/0x60
[   27.543115]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.543726]  mempool_kmalloc_double_free+0xb1/0x100
[   27.544450]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.544989]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.545614]  ? __pfx_mempool_kfree+0x10/0x10
[   27.546205]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.547046]  kunit_try_run_case+0x1b3/0x490
[   27.547654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.548413]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.548924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.549293]  ? __kthread_parkme+0x82/0x160
[   27.549932]  ? preempt_count_sub+0x50/0x80
[   27.550549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.551198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.551649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.551956]  kthread+0x257/0x310
[   27.552429]  ? __pfx_kthread+0x10/0x10
[   27.552977]  ret_from_fork+0x41/0x80
[   27.553561]  ? __pfx_kthread+0x10/0x10
[   27.554207]  ret_from_fork_asm+0x1a/0x30
[   27.554655]  </TASK>
[   27.555010] 
[   27.555245] Allocated by task 243:
[   27.555746]  kasan_save_stack+0x3d/0x60
[   27.556229]  kasan_save_track+0x18/0x40
[   27.556728]  kasan_save_alloc_info+0x3b/0x50
[   27.557346]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.558041]  remove_element+0x11e/0x190
[   27.558540]  mempool_alloc_preallocated+0x4d/0x90
[   27.559151]  mempool_double_free_helper+0x8b/0x370
[   27.559731]  mempool_kmalloc_double_free+0xb1/0x100
[   27.561038]  kunit_try_run_case+0x1b3/0x490
[   27.561440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.561888]  kthread+0x257/0x310
[   27.562236]  ret_from_fork+0x41/0x80
[   27.562645]  ret_from_fork_asm+0x1a/0x30
[   27.563257] 
[   27.563408] Freed by task 243:
[   27.563621]  kasan_save_stack+0x3d/0x60
[   27.564046]  kasan_save_track+0x18/0x40
[   27.564465]  kasan_save_free_info+0x3f/0x60
[   27.565213]  __kasan_mempool_poison_object+0x131/0x1d0
[   27.565729]  mempool_free+0x2ec/0x380
[   27.566192]  mempool_double_free_helper+0x10a/0x370
[   27.566867]  mempool_kmalloc_double_free+0xb1/0x100
[   27.567418]  kunit_try_run_case+0x1b3/0x490
[   27.567791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.568137]  kthread+0x257/0x310
[   27.568416]  ret_from_fork+0x41/0x80
[   27.569745]  ret_from_fork_asm+0x1a/0x30
[   27.570523] 
[   27.570755] The buggy address belongs to the object at ffff888101abb900
[   27.570755]  which belongs to the cache kmalloc-128 of size 128
[   27.571994] The buggy address is located 0 bytes inside of
[   27.571994]  128-byte region [ffff888101abb900, ffff888101abb980)
[   27.572987] 
[   27.573297] The buggy address belongs to the physical page:
[   27.573668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abb
[   27.574104] flags: 0x200000000000000(node=0|zone=2)
[   27.574558] page_type: f5(slab)
[   27.575573] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.576612] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   27.577662] page dumped because: kasan: bad access detected
[   27.578259] 
[   27.578409] Memory state around the buggy address:
[   27.578809]  ffff888101abb800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.579794]  ffff888101abb880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.580455] >ffff888101abb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.580812]                    ^
[   27.581140]  ffff888101abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.582738]  ffff888101abba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.583587] ==================================================================
[   27.648628] ==================================================================
[   27.650200] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   27.650817] Free of addr ffff888102cf4000 by task kunit_try_catch/247
[   27.651925] 
[   27.652459] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   27.653204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.653894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.654969] Call Trace:
[   27.655164]  <TASK>
[   27.655457]  dump_stack_lvl+0x73/0xb0
[   27.655916]  print_report+0xd1/0x640
[   27.656273]  ? __virt_addr_valid+0x1db/0x2d0
[   27.657611]  ? mempool_double_free_helper+0x185/0x370
[   27.658002]  ? kasan_addr_to_slab+0x11/0xa0
[   27.658696]  ? mempool_double_free_helper+0x185/0x370
[   27.659175]  kasan_report_invalid_free+0xc0/0xf0
[   27.660370]  ? mempool_double_free_helper+0x185/0x370
[   27.660756]  ? mempool_double_free_helper+0x185/0x370
[   27.661363]  __kasan_mempool_poison_pages+0x115/0x130
[   27.662023]  mempool_free+0x290/0x380
[   27.662941]  mempool_double_free_helper+0x185/0x370
[   27.663450]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.664053]  ? finish_task_switch.isra.0+0x153/0x700
[   27.664789]  mempool_page_alloc_double_free+0xac/0x100
[   27.665414]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   27.665890]  ? __switch_to+0x5d9/0xf60
[   27.666275]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   27.667142]  ? __pfx_mempool_free_pages+0x10/0x10
[   27.667804]  ? __pfx_read_tsc+0x10/0x10
[   27.668424]  ? ktime_get_ts64+0x84/0x230
[   27.668809]  kunit_try_run_case+0x1b3/0x490
[   27.669259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.670380]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.670796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.671446]  ? __kthread_parkme+0x82/0x160
[   27.672030]  ? preempt_count_sub+0x50/0x80
[   27.672531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.673367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.674220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.674960]  kthread+0x257/0x310
[   27.675340]  ? __pfx_kthread+0x10/0x10
[   27.676220]  ret_from_fork+0x41/0x80
[   27.676572]  ? __pfx_kthread+0x10/0x10
[   27.676907]  ret_from_fork_asm+0x1a/0x30
[   27.677346]  </TASK>
[   27.677614] 
[   27.678516] The buggy address belongs to the physical page:
[   27.679012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cf4
[   27.679798] flags: 0x200000000000000(node=0|zone=2)
[   27.680156] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   27.680806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.681935] page dumped because: kasan: bad access detected
[   27.682412] 
[   27.682634] Memory state around the buggy address:
[   27.683063]  ffff888102cf3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.683703]  ffff888102cf3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.684247] >ffff888102cf4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.684850]                    ^
[   27.685424]  ffff888102cf4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.686033]  ffff888102cf4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.686849] ==================================================================
[   27.593425] ==================================================================
[   27.595916] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   27.596578] Free of addr ffff888102cf4000 by task kunit_try_catch/245
[   27.597299] 
[   27.597560] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   27.598753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.599101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.600360] Call Trace:
[   27.600864]  <TASK>
[   27.601194]  dump_stack_lvl+0x73/0xb0
[   27.601807]  print_report+0xd1/0x640
[   27.602399]  ? __virt_addr_valid+0x1db/0x2d0
[   27.603127]  ? mempool_double_free_helper+0x185/0x370
[   27.603970]  ? kasan_addr_to_slab+0x11/0xa0
[   27.604641]  ? mempool_double_free_helper+0x185/0x370
[   27.605192]  kasan_report_invalid_free+0xc0/0xf0
[   27.605893]  ? mempool_double_free_helper+0x185/0x370
[   27.606430]  ? mempool_double_free_helper+0x185/0x370
[   27.607030]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   27.607733]  mempool_free+0x2ec/0x380
[   27.608679]  mempool_double_free_helper+0x185/0x370
[   27.609303]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.609853]  ? finish_task_switch.isra.0+0x153/0x700
[   27.610683]  mempool_kmalloc_large_double_free+0xb1/0x100
[   27.611295]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   27.611881]  ? __switch_to+0x5d9/0xf60
[   27.612600]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.613265]  ? __pfx_mempool_kfree+0x10/0x10
[   27.613756]  ? __pfx_read_tsc+0x10/0x10
[   27.614382]  ? ktime_get_ts64+0x84/0x230
[   27.614899]  kunit_try_run_case+0x1b3/0x490
[   27.615287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.616369]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.616870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.617521]  ? __kthread_parkme+0x82/0x160
[   27.618463]  ? preempt_count_sub+0x50/0x80
[   27.618880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.619517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.620334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.621433]  kthread+0x257/0x310
[   27.621746]  ? __pfx_kthread+0x10/0x10
[   27.622113]  ret_from_fork+0x41/0x80
[   27.622578]  ? __pfx_kthread+0x10/0x10
[   27.623382]  ret_from_fork_asm+0x1a/0x30
[   27.623879]  </TASK>
[   27.624162] 
[   27.624705] The buggy address belongs to the physical page:
[   27.625421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cf4
[   27.626216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.626893] flags: 0x200000000000040(head|node=0|zone=2)
[   27.627893] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.628580] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.629429] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.630413] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.630804] head: 0200000000000002 ffffea00040b3d01 ffffffffffffffff 0000000000000000
[   27.632157] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   27.633065] page dumped because: kasan: bad access detected
[   27.633576] 
[   27.633746] Memory state around the buggy address:
[   27.634062]  ffff888102cf3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.635259]  ffff888102cf3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.636672] >ffff888102cf4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.637812]                    ^
[   27.638504]  ffff888102cf4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.639545]  ffff888102cf4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.640468] ==================================================================