Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.000223] ==================================================================
[   33.001635] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.002453] Free of addr fff00000c406bc00 by task kunit_try_catch/223
[   33.002984] 
[   33.004488] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.006269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.006698] Hardware name: linux,dummy-virt (DT)
[   33.007161] Call trace:
[   33.007484]  show_stack+0x20/0x38 (C)
[   33.009095]  dump_stack_lvl+0x8c/0xd0
[   33.009698]  print_report+0x118/0x5e0
[   33.010425]  kasan_report_invalid_free+0xb0/0xd8
[   33.011235]  check_slab_allocation+0xd4/0x108
[   33.011976]  __kasan_mempool_poison_object+0x78/0x150
[   33.012778]  mempool_free+0x28c/0x328
[   33.013813]  mempool_double_free_helper+0x150/0x2e0
[   33.014744]  mempool_kmalloc_double_free+0xb8/0x110
[   33.015359]  kunit_try_run_case+0x14c/0x3d0
[   33.015965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016630]  kthread+0x24c/0x2d0
[   33.017606]  ret_from_fork+0x10/0x20
[   33.018136] 
[   33.018694] Allocated by task 223:
[   33.019143]  kasan_save_stack+0x3c/0x68
[   33.019927]  kasan_save_track+0x20/0x40
[   33.020663]  kasan_save_alloc_info+0x40/0x58
[   33.021538]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.022065]  remove_element+0x130/0x1f8
[   33.022685]  mempool_alloc_preallocated+0x58/0xc0
[   33.023617]  mempool_double_free_helper+0x94/0x2e0
[   33.024261]  mempool_kmalloc_double_free+0xb8/0x110
[   33.025276]  kunit_try_run_case+0x14c/0x3d0
[   33.026044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.026874]  kthread+0x24c/0x2d0
[   33.027371]  ret_from_fork+0x10/0x20
[   33.028157] 
[   33.028658] Freed by task 223:
[   33.029131]  kasan_save_stack+0x3c/0x68
[   33.030070]  kasan_save_track+0x20/0x40
[   33.030535]  kasan_save_free_info+0x4c/0x78
[   33.031368]  __kasan_mempool_poison_object+0xc0/0x150
[   33.031979]  mempool_free+0x28c/0x328
[   33.032475]  mempool_double_free_helper+0x100/0x2e0
[   33.033216]  mempool_kmalloc_double_free+0xb8/0x110
[   33.034268]  kunit_try_run_case+0x14c/0x3d0
[   33.034949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.035751]  kthread+0x24c/0x2d0
[   33.036299]  ret_from_fork+0x10/0x20
[   33.036922] 
[   33.037247] The buggy address belongs to the object at fff00000c406bc00
[   33.037247]  which belongs to the cache kmalloc-128 of size 128
[   33.038366] The buggy address is located 0 bytes inside of
[   33.038366]  128-byte region [fff00000c406bc00, fff00000c406bc80)
[   33.039566] 
[   33.039913] The buggy address belongs to the physical page:
[   33.040508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406b
[   33.041695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.042374] page_type: f5(slab)
[   33.042995] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.043842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.045262] page dumped because: kasan: bad access detected
[   33.046701] 
[   33.047067] Memory state around the buggy address:
[   33.047679]  fff00000c406bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.048795]  fff00000c406bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.050016] >fff00000c406bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.050932]                    ^
[   33.051334]  fff00000c406bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.052016]  fff00000c406bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.052535] ==================================================================
[   33.064740] ==================================================================
[   33.066311] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.067213] Free of addr fff00000c6610000 by task kunit_try_catch/225
[   33.067952] 
[   33.068391] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.069784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.070300] Hardware name: linux,dummy-virt (DT)
[   33.070873] Call trace:
[   33.071317]  show_stack+0x20/0x38 (C)
[   33.071913]  dump_stack_lvl+0x8c/0xd0
[   33.072477]  print_report+0x118/0x5e0
[   33.072970]  kasan_report_invalid_free+0xb0/0xd8
[   33.073654]  __kasan_mempool_poison_object+0x14c/0x150
[   33.074351]  mempool_free+0x28c/0x328
[   33.074822]  mempool_double_free_helper+0x150/0x2e0
[   33.075766]  mempool_kmalloc_large_double_free+0xb8/0x110
[   33.076509]  kunit_try_run_case+0x14c/0x3d0
[   33.077399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.077750]  kthread+0x24c/0x2d0
[   33.077993]  ret_from_fork+0x10/0x20
[   33.078263] 
[   33.078419] The buggy address belongs to the physical page:
[   33.078698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   33.079076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.080599] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.081718] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.082479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.083284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.084061] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.084941] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000
[   33.085993] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.086781] page dumped because: kasan: bad access detected
[   33.087499] 
[   33.087834] Memory state around the buggy address:
[   33.088390]  fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.089430]  fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.090193] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.090921]                    ^
[   33.091412]  fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.092135]  fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.092964] ==================================================================
[   33.104808] ==================================================================
[   33.105957] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.106737] Free of addr fff00000c6610000 by task kunit_try_catch/227
[   33.108520] 
[   33.109098] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.110279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.110891] Hardware name: linux,dummy-virt (DT)
[   33.111530] Call trace:
[   33.112086]  show_stack+0x20/0x38 (C)
[   33.112664]  dump_stack_lvl+0x8c/0xd0
[   33.113610]  print_report+0x118/0x5e0
[   33.114131]  kasan_report_invalid_free+0xb0/0xd8
[   33.114458]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.114757]  mempool_free+0x24c/0x328
[   33.115011]  mempool_double_free_helper+0x150/0x2e0
[   33.115671]  mempool_page_alloc_double_free+0xb4/0x110
[   33.116476]  kunit_try_run_case+0x14c/0x3d0
[   33.117315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.118209]  kthread+0x24c/0x2d0
[   33.118734]  ret_from_fork+0x10/0x20
[   33.119296] 
[   33.119597] The buggy address belongs to the physical page:
[   33.120268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   33.121513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.122221] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.123054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.123869] page dumped because: kasan: bad access detected
[   33.124489] 
[   33.124798] Memory state around the buggy address:
[   33.125348]  fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.126691]  fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.127301] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.128160]                    ^
[   33.128732]  fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.129898]  fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.130773] ==================================================================

[   23.960822] ==================================================================
[   23.961968] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   23.962787] Free of addr ffff888102bd4000 by task kunit_try_catch/245
[   23.963458] 
[   23.963854] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   23.965446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.966110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.967006] Call Trace:
[   23.967415]  <TASK>
[   23.967981]  dump_stack_lvl+0x73/0xb0
[   23.968773]  print_report+0xd1/0x640
[   23.969319]  ? __virt_addr_valid+0x1db/0x2d0
[   23.969957]  ? mempool_double_free_helper+0x185/0x370
[   23.970750]  ? kasan_addr_to_slab+0x11/0xa0
[   23.971281]  ? mempool_double_free_helper+0x185/0x370
[   23.972082]  kasan_report_invalid_free+0xc0/0xf0
[   23.972858]  ? mempool_double_free_helper+0x185/0x370
[   23.973574]  ? mempool_double_free_helper+0x185/0x370
[   23.974413]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   23.975130]  mempool_free+0x2ec/0x380
[   23.975814]  mempool_double_free_helper+0x185/0x370
[   23.976603]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.977145]  ? finish_task_switch.isra.0+0x153/0x700
[   23.977985]  mempool_kmalloc_large_double_free+0xb1/0x100
[   23.978673]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   23.979566]  ? __switch_to+0x5d9/0xf60
[   23.980049]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.980471]  ? __pfx_mempool_kfree+0x10/0x10
[   23.980965]  ? __pfx_read_tsc+0x10/0x10
[   23.981519]  ? ktime_get_ts64+0x84/0x230
[   23.982355]  kunit_try_run_case+0x1b3/0x490
[   23.982690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.983325]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.983788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.984331]  ? __kthread_parkme+0x82/0x160
[   23.984855]  ? preempt_count_sub+0x50/0x80
[   23.985275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.985785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.986465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.986835]  kthread+0x257/0x310
[   23.987300]  ? __pfx_kthread+0x10/0x10
[   23.987800]  ret_from_fork+0x41/0x80
[   23.988955]  ? __pfx_kthread+0x10/0x10
[   23.989602]  ret_from_fork_asm+0x1a/0x30
[   23.989985]  </TASK>
[   23.990774] 
[   23.991026] The buggy address belongs to the physical page:
[   23.992031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd4
[   23.993217] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.994304] flags: 0x200000000000040(head|node=0|zone=2)
[   23.994869] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.996064] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.997098] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.998194] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.999173] head: 0200000000000002 ffffea00040af501 ffffffffffffffff 0000000000000000
[   23.999777] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.000748] page dumped because: kasan: bad access detected
[   24.002229] 
[   24.002597] Memory state around the buggy address:
[   24.002889]  ffff888102bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.003834]  ffff888102bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.004716] >ffff888102bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.005665]                    ^
[   24.006377]  ffff888102bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.007554]  ffff888102bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.008231] ==================================================================
[   23.896047] ==================================================================
[   23.897264] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   23.898796] Free of addr ffff888101b62400 by task kunit_try_catch/243
[   23.899422] 
[   23.899657] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   23.900895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.901588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.902737] Call Trace:
[   23.903019]  <TASK>
[   23.903460]  dump_stack_lvl+0x73/0xb0
[   23.903881]  print_report+0xd1/0x640
[   23.904546]  ? __virt_addr_valid+0x1db/0x2d0
[   23.904981]  ? mempool_double_free_helper+0x185/0x370
[   23.905656]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.906409]  ? mempool_double_free_helper+0x185/0x370
[   23.907536]  kasan_report_invalid_free+0xc0/0xf0
[   23.908014]  ? mempool_double_free_helper+0x185/0x370
[   23.908729]  ? mempool_double_free_helper+0x185/0x370
[   23.909093]  ? mempool_double_free_helper+0x185/0x370
[   23.909628]  check_slab_allocation+0x101/0x130
[   23.910084]  __kasan_mempool_poison_object+0x91/0x1d0
[   23.911226]  mempool_free+0x2ec/0x380
[   23.911567]  mempool_double_free_helper+0x185/0x370
[   23.911996]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.912845]  ? finish_task_switch.isra.0+0x153/0x700
[   23.913442]  mempool_kmalloc_double_free+0xb1/0x100
[   23.913906]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   23.914244]  ? __switch_to+0x5d9/0xf60
[   23.914708]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.915079]  ? __pfx_mempool_kfree+0x10/0x10
[   23.915685]  ? __pfx_read_tsc+0x10/0x10
[   23.916017]  ? ktime_get_ts64+0x84/0x230
[   23.916908]  kunit_try_run_case+0x1b3/0x490
[   23.917711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.918232]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.918726]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.919560]  ? __kthread_parkme+0x82/0x160
[   23.920119]  ? preempt_count_sub+0x50/0x80
[   23.920453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.921514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.922374]  kthread+0x257/0x310
[   23.923028]  ? __pfx_kthread+0x10/0x10
[   23.923556]  ret_from_fork+0x41/0x80
[   23.924160]  ? __pfx_kthread+0x10/0x10
[   23.924627]  ret_from_fork_asm+0x1a/0x30
[   23.925061]  </TASK>
[   23.925472] 
[   23.925838] Allocated by task 243:
[   23.926212]  kasan_save_stack+0x3d/0x60
[   23.926801]  kasan_save_track+0x18/0x40
[   23.927377]  kasan_save_alloc_info+0x3b/0x50
[   23.927862]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.928580]  remove_element+0x11e/0x190
[   23.929048]  mempool_alloc_preallocated+0x4d/0x90
[   23.929748]  mempool_double_free_helper+0x8b/0x370
[   23.930448]  mempool_kmalloc_double_free+0xb1/0x100
[   23.930881]  kunit_try_run_case+0x1b3/0x490
[   23.931311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.932144]  kthread+0x257/0x310
[   23.932526]  ret_from_fork+0x41/0x80
[   23.932924]  ret_from_fork_asm+0x1a/0x30
[   23.933604] 
[   23.933758] Freed by task 243:
[   23.934285]  kasan_save_stack+0x3d/0x60
[   23.934867]  kasan_save_track+0x18/0x40
[   23.935479]  kasan_save_free_info+0x3f/0x60
[   23.935960]  __kasan_mempool_poison_object+0x131/0x1d0
[   23.936722]  mempool_free+0x2ec/0x380
[   23.937364]  mempool_double_free_helper+0x10a/0x370
[   23.937941]  mempool_kmalloc_double_free+0xb1/0x100
[   23.938601]  kunit_try_run_case+0x1b3/0x490
[   23.939004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.939716]  kthread+0x257/0x310
[   23.940086]  ret_from_fork+0x41/0x80
[   23.940747]  ret_from_fork_asm+0x1a/0x30
[   23.941209] 
[   23.941488] The buggy address belongs to the object at ffff888101b62400
[   23.941488]  which belongs to the cache kmalloc-128 of size 128
[   23.942755] The buggy address is located 0 bytes inside of
[   23.942755]  128-byte region [ffff888101b62400, ffff888101b62480)
[   23.943891] 
[   23.944198] The buggy address belongs to the physical page:
[   23.944620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b62
[   23.945978] flags: 0x200000000000000(node=0|zone=2)
[   23.946422] page_type: f5(slab)
[   23.946935] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.947701] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.948843] page dumped because: kasan: bad access detected
[   23.949419] 
[   23.949697] Memory state around the buggy address:
[   23.950272]  ffff888101b62300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.951017]  ffff888101b62380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.951445] >ffff888101b62400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.952380]                    ^
[   23.952787]  ffff888101b62480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.953430]  ffff888101b62500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.954435] ==================================================================
[   24.015517] ==================================================================
[   24.017058] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   24.017934] Free of addr ffff888102bd4000 by task kunit_try_catch/247
[   24.018705] 
[   24.019168] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   24.020508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.021382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.022234] Call Trace:
[   24.022618]  <TASK>
[   24.022957]  dump_stack_lvl+0x73/0xb0
[   24.023627]  print_report+0xd1/0x640
[   24.024429]  ? __virt_addr_valid+0x1db/0x2d0
[   24.024815]  ? mempool_double_free_helper+0x185/0x370
[   24.025464]  ? kasan_addr_to_slab+0x11/0xa0
[   24.025867]  ? mempool_double_free_helper+0x185/0x370
[   24.026397]  kasan_report_invalid_free+0xc0/0xf0
[   24.026789]  ? mempool_double_free_helper+0x185/0x370
[   24.027245]  ? mempool_double_free_helper+0x185/0x370
[   24.027871]  __kasan_mempool_poison_pages+0x115/0x130
[   24.028326]  mempool_free+0x290/0x380
[   24.028847]  mempool_double_free_helper+0x185/0x370
[   24.029457]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.029854]  ? irqentry_exit+0x2a/0x60
[   24.030410]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.030871]  mempool_page_alloc_double_free+0xac/0x100
[   24.031459]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   24.032029]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   24.032481]  ? __pfx_mempool_free_pages+0x10/0x10
[   24.032962]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   24.033543]  kunit_try_run_case+0x1b3/0x490
[   24.033967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.034369]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.034885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.035369]  ? __kthread_parkme+0x82/0x160
[   24.035730]  ? preempt_count_sub+0x50/0x80
[   24.036130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.036751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.037290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.037891]  kthread+0x257/0x310
[   24.038224]  ? __pfx_kthread+0x10/0x10
[   24.038646]  ret_from_fork+0x41/0x80
[   24.039031]  ? __pfx_kthread+0x10/0x10
[   24.039481]  ret_from_fork_asm+0x1a/0x30
[   24.039982]  </TASK>
[   24.040302] 
[   24.040509] The buggy address belongs to the physical page:
[   24.041116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd4
[   24.041751] flags: 0x200000000000000(node=0|zone=2)
[   24.042372] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   24.042926] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.043631] page dumped because: kasan: bad access detected
[   24.044179] 
[   24.044406] Memory state around the buggy address:
[   24.044709]  ffff888102bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.045498]  ffff888102bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.045938] >ffff888102bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.046760]                    ^
[   24.047214]  ffff888102bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.047646]  ffff888102bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.048482] ==================================================================