Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.000223] ================================================================== [ 33.001635] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.002453] Free of addr fff00000c406bc00 by task kunit_try_catch/223 [ 33.002984] [ 33.004488] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.006269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.006698] Hardware name: linux,dummy-virt (DT) [ 33.007161] Call trace: [ 33.007484] show_stack+0x20/0x38 (C) [ 33.009095] dump_stack_lvl+0x8c/0xd0 [ 33.009698] print_report+0x118/0x5e0 [ 33.010425] kasan_report_invalid_free+0xb0/0xd8 [ 33.011235] check_slab_allocation+0xd4/0x108 [ 33.011976] __kasan_mempool_poison_object+0x78/0x150 [ 33.012778] mempool_free+0x28c/0x328 [ 33.013813] mempool_double_free_helper+0x150/0x2e0 [ 33.014744] mempool_kmalloc_double_free+0xb8/0x110 [ 33.015359] kunit_try_run_case+0x14c/0x3d0 [ 33.015965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.016630] kthread+0x24c/0x2d0 [ 33.017606] ret_from_fork+0x10/0x20 [ 33.018136] [ 33.018694] Allocated by task 223: [ 33.019143] kasan_save_stack+0x3c/0x68 [ 33.019927] kasan_save_track+0x20/0x40 [ 33.020663] kasan_save_alloc_info+0x40/0x58 [ 33.021538] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.022065] remove_element+0x130/0x1f8 [ 33.022685] mempool_alloc_preallocated+0x58/0xc0 [ 33.023617] mempool_double_free_helper+0x94/0x2e0 [ 33.024261] mempool_kmalloc_double_free+0xb8/0x110 [ 33.025276] kunit_try_run_case+0x14c/0x3d0 [ 33.026044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.026874] kthread+0x24c/0x2d0 [ 33.027371] ret_from_fork+0x10/0x20 [ 33.028157] [ 33.028658] Freed by task 223: [ 33.029131] kasan_save_stack+0x3c/0x68 [ 33.030070] kasan_save_track+0x20/0x40 [ 33.030535] kasan_save_free_info+0x4c/0x78 [ 33.031368] __kasan_mempool_poison_object+0xc0/0x150 [ 33.031979] mempool_free+0x28c/0x328 [ 33.032475] mempool_double_free_helper+0x100/0x2e0 [ 33.033216] mempool_kmalloc_double_free+0xb8/0x110 [ 33.034268] kunit_try_run_case+0x14c/0x3d0 [ 33.034949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.035751] kthread+0x24c/0x2d0 [ 33.036299] ret_from_fork+0x10/0x20 [ 33.036922] [ 33.037247] The buggy address belongs to the object at fff00000c406bc00 [ 33.037247] which belongs to the cache kmalloc-128 of size 128 [ 33.038366] The buggy address is located 0 bytes inside of [ 33.038366] 128-byte region [fff00000c406bc00, fff00000c406bc80) [ 33.039566] [ 33.039913] The buggy address belongs to the physical page: [ 33.040508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406b [ 33.041695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.042374] page_type: f5(slab) [ 33.042995] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.043842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.045262] page dumped because: kasan: bad access detected [ 33.046701] [ 33.047067] Memory state around the buggy address: [ 33.047679] fff00000c406bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.048795] fff00000c406bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.050016] >fff00000c406bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.050932] ^ [ 33.051334] fff00000c406bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.052016] fff00000c406bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.052535] ================================================================== [ 33.064740] ================================================================== [ 33.066311] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.067213] Free of addr fff00000c6610000 by task kunit_try_catch/225 [ 33.067952] [ 33.068391] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.069784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.070300] Hardware name: linux,dummy-virt (DT) [ 33.070873] Call trace: [ 33.071317] show_stack+0x20/0x38 (C) [ 33.071913] dump_stack_lvl+0x8c/0xd0 [ 33.072477] print_report+0x118/0x5e0 [ 33.072970] kasan_report_invalid_free+0xb0/0xd8 [ 33.073654] __kasan_mempool_poison_object+0x14c/0x150 [ 33.074351] mempool_free+0x28c/0x328 [ 33.074822] mempool_double_free_helper+0x150/0x2e0 [ 33.075766] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.076509] kunit_try_run_case+0x14c/0x3d0 [ 33.077399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.077750] kthread+0x24c/0x2d0 [ 33.077993] ret_from_fork+0x10/0x20 [ 33.078263] [ 33.078419] The buggy address belongs to the physical page: [ 33.078698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 33.079076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.080599] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.081718] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.082479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.083284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.084061] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.084941] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000 [ 33.085993] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.086781] page dumped because: kasan: bad access detected [ 33.087499] [ 33.087834] Memory state around the buggy address: [ 33.088390] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.089430] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.090193] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.090921] ^ [ 33.091412] fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.092135] fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.092964] ================================================================== [ 33.104808] ================================================================== [ 33.105957] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.106737] Free of addr fff00000c6610000 by task kunit_try_catch/227 [ 33.108520] [ 33.109098] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.110279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.110891] Hardware name: linux,dummy-virt (DT) [ 33.111530] Call trace: [ 33.112086] show_stack+0x20/0x38 (C) [ 33.112664] dump_stack_lvl+0x8c/0xd0 [ 33.113610] print_report+0x118/0x5e0 [ 33.114131] kasan_report_invalid_free+0xb0/0xd8 [ 33.114458] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.114757] mempool_free+0x24c/0x328 [ 33.115011] mempool_double_free_helper+0x150/0x2e0 [ 33.115671] mempool_page_alloc_double_free+0xb4/0x110 [ 33.116476] kunit_try_run_case+0x14c/0x3d0 [ 33.117315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.118209] kthread+0x24c/0x2d0 [ 33.118734] ret_from_fork+0x10/0x20 [ 33.119296] [ 33.119597] The buggy address belongs to the physical page: [ 33.120268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 33.121513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.122221] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.123054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.123869] page dumped because: kasan: bad access detected [ 33.124489] [ 33.124798] Memory state around the buggy address: [ 33.125348] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.126691] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.127301] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.128160] ^ [ 33.128732] fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.129898] fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.130773] ==================================================================
[ 23.960822] ================================================================== [ 23.961968] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 23.962787] Free of addr ffff888102bd4000 by task kunit_try_catch/245 [ 23.963458] [ 23.963854] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 23.965446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.966110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.967006] Call Trace: [ 23.967415] <TASK> [ 23.967981] dump_stack_lvl+0x73/0xb0 [ 23.968773] print_report+0xd1/0x640 [ 23.969319] ? __virt_addr_valid+0x1db/0x2d0 [ 23.969957] ? mempool_double_free_helper+0x185/0x370 [ 23.970750] ? kasan_addr_to_slab+0x11/0xa0 [ 23.971281] ? mempool_double_free_helper+0x185/0x370 [ 23.972082] kasan_report_invalid_free+0xc0/0xf0 [ 23.972858] ? mempool_double_free_helper+0x185/0x370 [ 23.973574] ? mempool_double_free_helper+0x185/0x370 [ 23.974413] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 23.975130] mempool_free+0x2ec/0x380 [ 23.975814] mempool_double_free_helper+0x185/0x370 [ 23.976603] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 23.977145] ? finish_task_switch.isra.0+0x153/0x700 [ 23.977985] mempool_kmalloc_large_double_free+0xb1/0x100 [ 23.978673] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 23.979566] ? __switch_to+0x5d9/0xf60 [ 23.980049] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.980471] ? __pfx_mempool_kfree+0x10/0x10 [ 23.980965] ? __pfx_read_tsc+0x10/0x10 [ 23.981519] ? ktime_get_ts64+0x84/0x230 [ 23.982355] kunit_try_run_case+0x1b3/0x490 [ 23.982690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.983325] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.983788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.984331] ? __kthread_parkme+0x82/0x160 [ 23.984855] ? preempt_count_sub+0x50/0x80 [ 23.985275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.985785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.986465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.986835] kthread+0x257/0x310 [ 23.987300] ? __pfx_kthread+0x10/0x10 [ 23.987800] ret_from_fork+0x41/0x80 [ 23.988955] ? __pfx_kthread+0x10/0x10 [ 23.989602] ret_from_fork_asm+0x1a/0x30 [ 23.989985] </TASK> [ 23.990774] [ 23.991026] The buggy address belongs to the physical page: [ 23.992031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd4 [ 23.993217] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.994304] flags: 0x200000000000040(head|node=0|zone=2) [ 23.994869] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.996064] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.997098] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.998194] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.999173] head: 0200000000000002 ffffea00040af501 ffffffffffffffff 0000000000000000 [ 23.999777] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 24.000748] page dumped because: kasan: bad access detected [ 24.002229] [ 24.002597] Memory state around the buggy address: [ 24.002889] ffff888102bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.003834] ffff888102bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.004716] >ffff888102bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.005665] ^ [ 24.006377] ffff888102bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.007554] ffff888102bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.008231] ================================================================== [ 23.896047] ================================================================== [ 23.897264] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 23.898796] Free of addr ffff888101b62400 by task kunit_try_catch/243 [ 23.899422] [ 23.899657] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 23.900895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.901588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.902737] Call Trace: [ 23.903019] <TASK> [ 23.903460] dump_stack_lvl+0x73/0xb0 [ 23.903881] print_report+0xd1/0x640 [ 23.904546] ? __virt_addr_valid+0x1db/0x2d0 [ 23.904981] ? mempool_double_free_helper+0x185/0x370 [ 23.905656] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.906409] ? mempool_double_free_helper+0x185/0x370 [ 23.907536] kasan_report_invalid_free+0xc0/0xf0 [ 23.908014] ? mempool_double_free_helper+0x185/0x370 [ 23.908729] ? mempool_double_free_helper+0x185/0x370 [ 23.909093] ? mempool_double_free_helper+0x185/0x370 [ 23.909628] check_slab_allocation+0x101/0x130 [ 23.910084] __kasan_mempool_poison_object+0x91/0x1d0 [ 23.911226] mempool_free+0x2ec/0x380 [ 23.911567] mempool_double_free_helper+0x185/0x370 [ 23.911996] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 23.912845] ? finish_task_switch.isra.0+0x153/0x700 [ 23.913442] mempool_kmalloc_double_free+0xb1/0x100 [ 23.913906] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 23.914244] ? __switch_to+0x5d9/0xf60 [ 23.914708] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.915079] ? __pfx_mempool_kfree+0x10/0x10 [ 23.915685] ? __pfx_read_tsc+0x10/0x10 [ 23.916017] ? ktime_get_ts64+0x84/0x230 [ 23.916908] kunit_try_run_case+0x1b3/0x490 [ 23.917711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.918232] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.918726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.919560] ? __kthread_parkme+0x82/0x160 [ 23.920119] ? preempt_count_sub+0x50/0x80 [ 23.920453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.921025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.921514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.922374] kthread+0x257/0x310 [ 23.923028] ? __pfx_kthread+0x10/0x10 [ 23.923556] ret_from_fork+0x41/0x80 [ 23.924160] ? __pfx_kthread+0x10/0x10 [ 23.924627] ret_from_fork_asm+0x1a/0x30 [ 23.925061] </TASK> [ 23.925472] [ 23.925838] Allocated by task 243: [ 23.926212] kasan_save_stack+0x3d/0x60 [ 23.926801] kasan_save_track+0x18/0x40 [ 23.927377] kasan_save_alloc_info+0x3b/0x50 [ 23.927862] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 23.928580] remove_element+0x11e/0x190 [ 23.929048] mempool_alloc_preallocated+0x4d/0x90 [ 23.929748] mempool_double_free_helper+0x8b/0x370 [ 23.930448] mempool_kmalloc_double_free+0xb1/0x100 [ 23.930881] kunit_try_run_case+0x1b3/0x490 [ 23.931311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.932144] kthread+0x257/0x310 [ 23.932526] ret_from_fork+0x41/0x80 [ 23.932924] ret_from_fork_asm+0x1a/0x30 [ 23.933604] [ 23.933758] Freed by task 243: [ 23.934285] kasan_save_stack+0x3d/0x60 [ 23.934867] kasan_save_track+0x18/0x40 [ 23.935479] kasan_save_free_info+0x3f/0x60 [ 23.935960] __kasan_mempool_poison_object+0x131/0x1d0 [ 23.936722] mempool_free+0x2ec/0x380 [ 23.937364] mempool_double_free_helper+0x10a/0x370 [ 23.937941] mempool_kmalloc_double_free+0xb1/0x100 [ 23.938601] kunit_try_run_case+0x1b3/0x490 [ 23.939004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.939716] kthread+0x257/0x310 [ 23.940086] ret_from_fork+0x41/0x80 [ 23.940747] ret_from_fork_asm+0x1a/0x30 [ 23.941209] [ 23.941488] The buggy address belongs to the object at ffff888101b62400 [ 23.941488] which belongs to the cache kmalloc-128 of size 128 [ 23.942755] The buggy address is located 0 bytes inside of [ 23.942755] 128-byte region [ffff888101b62400, ffff888101b62480) [ 23.943891] [ 23.944198] The buggy address belongs to the physical page: [ 23.944620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b62 [ 23.945978] flags: 0x200000000000000(node=0|zone=2) [ 23.946422] page_type: f5(slab) [ 23.946935] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.947701] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.948843] page dumped because: kasan: bad access detected [ 23.949419] [ 23.949697] Memory state around the buggy address: [ 23.950272] ffff888101b62300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.951017] ffff888101b62380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.951445] >ffff888101b62400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.952380] ^ [ 23.952787] ffff888101b62480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.953430] ffff888101b62500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.954435] ================================================================== [ 24.015517] ================================================================== [ 24.017058] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 24.017934] Free of addr ffff888102bd4000 by task kunit_try_catch/247 [ 24.018705] [ 24.019168] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.020508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.021382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.022234] Call Trace: [ 24.022618] <TASK> [ 24.022957] dump_stack_lvl+0x73/0xb0 [ 24.023627] print_report+0xd1/0x640 [ 24.024429] ? __virt_addr_valid+0x1db/0x2d0 [ 24.024815] ? mempool_double_free_helper+0x185/0x370 [ 24.025464] ? kasan_addr_to_slab+0x11/0xa0 [ 24.025867] ? mempool_double_free_helper+0x185/0x370 [ 24.026397] kasan_report_invalid_free+0xc0/0xf0 [ 24.026789] ? mempool_double_free_helper+0x185/0x370 [ 24.027245] ? mempool_double_free_helper+0x185/0x370 [ 24.027871] __kasan_mempool_poison_pages+0x115/0x130 [ 24.028326] mempool_free+0x290/0x380 [ 24.028847] mempool_double_free_helper+0x185/0x370 [ 24.029457] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 24.029854] ? irqentry_exit+0x2a/0x60 [ 24.030410] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.030871] mempool_page_alloc_double_free+0xac/0x100 [ 24.031459] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 24.032029] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 24.032481] ? __pfx_mempool_free_pages+0x10/0x10 [ 24.032962] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 24.033543] kunit_try_run_case+0x1b3/0x490 [ 24.033967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.034369] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.034885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.035369] ? __kthread_parkme+0x82/0x160 [ 24.035730] ? preempt_count_sub+0x50/0x80 [ 24.036130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.036751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.037290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.037891] kthread+0x257/0x310 [ 24.038224] ? __pfx_kthread+0x10/0x10 [ 24.038646] ret_from_fork+0x41/0x80 [ 24.039031] ? __pfx_kthread+0x10/0x10 [ 24.039481] ret_from_fork_asm+0x1a/0x30 [ 24.039982] </TASK> [ 24.040302] [ 24.040509] The buggy address belongs to the physical page: [ 24.041116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd4 [ 24.041751] flags: 0x200000000000000(node=0|zone=2) [ 24.042372] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.042926] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.043631] page dumped because: kasan: bad access detected [ 24.044179] [ 24.044406] Memory state around the buggy address: [ 24.044709] ffff888102bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.045498] ffff888102bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.045938] >ffff888102bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.046760] ^ [ 24.047214] ffff888102bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.047646] ffff888102bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.048482] ==================================================================