Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.600271] ==================================================================
[   32.601506] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   32.602168] Free of addr fff00000c6567300 by task kunit_try_catch/224
[   32.603023] 
[   32.603850] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.604995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.605620] Hardware name: linux,dummy-virt (DT)
[   32.606221] Call trace:
[   32.606631]  show_stack+0x20/0x38 (C)
[   32.607147]  dump_stack_lvl+0x8c/0xd0
[   32.608014]  print_report+0x118/0x5e0
[   32.608515]  kasan_report_invalid_free+0xb0/0xd8
[   32.609282]  check_slab_allocation+0xd4/0x108
[   32.609949]  __kasan_mempool_poison_object+0x78/0x150
[   32.610735]  mempool_free+0x28c/0x328
[   32.611411]  mempool_double_free_helper+0x150/0x2e0
[   32.612072]  mempool_kmalloc_double_free+0xb8/0x110
[   32.612808]  kunit_try_run_case+0x14c/0x3d0
[   32.613481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.614285]  kthread+0x24c/0x2d0
[   32.614763]  ret_from_fork+0x10/0x20
[   32.615475] 
[   32.615841] Allocated by task 224:
[   32.616300]  kasan_save_stack+0x3c/0x68
[   32.617175]  kasan_save_track+0x20/0x40
[   32.617652]  kasan_save_alloc_info+0x40/0x58
[   32.618300]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.619073]  remove_element+0x130/0x1f8
[   32.619639]  mempool_alloc_preallocated+0x58/0xc0
[   32.620275]  mempool_double_free_helper+0x94/0x2e0
[   32.621387]  mempool_kmalloc_double_free+0xb8/0x110
[   32.622193]  kunit_try_run_case+0x14c/0x3d0
[   32.622861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.623489]  kthread+0x24c/0x2d0
[   32.624385]  ret_from_fork+0x10/0x20
[   32.624912] 
[   32.625232] Freed by task 224:
[   32.625727]  kasan_save_stack+0x3c/0x68
[   32.626295]  kasan_save_track+0x20/0x40
[   32.626855]  kasan_save_free_info+0x4c/0x78
[   32.627679]  __kasan_mempool_poison_object+0xc0/0x150
[   32.628535]  mempool_free+0x28c/0x328
[   32.628986]  mempool_double_free_helper+0x100/0x2e0
[   32.629722]  mempool_kmalloc_double_free+0xb8/0x110
[   32.630469]  kunit_try_run_case+0x14c/0x3d0
[   32.631090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.632142]  kthread+0x24c/0x2d0
[   32.633063]  ret_from_fork+0x10/0x20
[   32.633531] 
[   32.633812] The buggy address belongs to the object at fff00000c6567300
[   32.633812]  which belongs to the cache kmalloc-128 of size 128
[   32.635550] The buggy address is located 0 bytes inside of
[   32.635550]  128-byte region [fff00000c6567300, fff00000c6567380)
[   32.637010] 
[   32.637355] The buggy address belongs to the physical page:
[   32.638025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106567
[   32.639010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.640360] page_type: f5(slab)
[   32.640915] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.642146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.643476] page dumped because: kasan: bad access detected
[   32.644258] 
[   32.644601] Memory state around the buggy address:
[   32.645412]  fff00000c6567200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.646463]  fff00000c6567280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.647687] >fff00000c6567300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.648771]                    ^
[   32.649488]  fff00000c6567380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.650524]  fff00000c6567400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.651347] ==================================================================
[   32.661507] ==================================================================
[   32.662682] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   32.663823] Free of addr fff00000c660c000 by task kunit_try_catch/226
[   32.665355] 
[   32.666005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.667277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.667867] Hardware name: linux,dummy-virt (DT)
[   32.668746] Call trace:
[   32.669271]  show_stack+0x20/0x38 (C)
[   32.670002]  dump_stack_lvl+0x8c/0xd0
[   32.670700]  print_report+0x118/0x5e0
[   32.671137]  kasan_report_invalid_free+0xb0/0xd8
[   32.672418]  __kasan_mempool_poison_object+0x14c/0x150
[   32.673114]  mempool_free+0x28c/0x328
[   32.673664]  mempool_double_free_helper+0x150/0x2e0
[   32.674620]  mempool_kmalloc_large_double_free+0xb8/0x110
[   32.675625]  kunit_try_run_case+0x14c/0x3d0
[   32.676172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.676926]  kthread+0x24c/0x2d0
[   32.677407]  ret_from_fork+0x10/0x20
[   32.678055] 
[   32.678438] The buggy address belongs to the physical page:
[   32.679018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c
[   32.680642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.681727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.682764] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.683829] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.684796] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.685688] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.686626] head: 0bfffe0000000002 ffffc1ffc3198301 ffffffffffffffff 0000000000000000
[   32.688343] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.689029] page dumped because: kasan: bad access detected
[   32.689591] 
[   32.689977] Memory state around the buggy address:
[   32.690544]  fff00000c660bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.691422]  fff00000c660bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.692428] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693454]                    ^
[   32.693907]  fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.694732]  fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.695765] ==================================================================
[   32.705798] ==================================================================
[   32.707028] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   32.707863] Free of addr fff00000c65d0000 by task kunit_try_catch/228
[   32.708551] 
[   32.709027] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   32.709982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.710644] Hardware name: linux,dummy-virt (DT)
[   32.711804] Call trace:
[   32.712230]  show_stack+0x20/0x38 (C)
[   32.712954]  dump_stack_lvl+0x8c/0xd0
[   32.713591]  print_report+0x118/0x5e0
[   32.714310]  kasan_report_invalid_free+0xb0/0xd8
[   32.715004]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.715951]  mempool_free+0x24c/0x328
[   32.716460]  mempool_double_free_helper+0x150/0x2e0
[   32.717266]  mempool_page_alloc_double_free+0xb4/0x110
[   32.717999]  kunit_try_run_case+0x14c/0x3d0
[   32.718555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.719476]  kthread+0x24c/0x2d0
[   32.720054]  ret_from_fork+0x10/0x20
[   32.720669] 
[   32.721272] The buggy address belongs to the physical page:
[   32.721982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0
[   32.723010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.724220] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.725154] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.726042] page dumped because: kasan: bad access detected
[   32.726671] 
[   32.727038] Memory state around the buggy address:
[   32.727972]  fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.728888]  fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.729753] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.730637]                    ^
[   32.731125]  fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.732141]  fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.732548] ==================================================================

[   30.377914] ==================================================================
[   30.378792] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   30.380111] Free of addr ffff888102a0f400 by task kunit_try_catch/242
[   30.380650] 
[   30.380903] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.382908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.383662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.384824] Call Trace:
[   30.385180]  <TASK>
[   30.385565]  dump_stack_lvl+0x73/0xb0
[   30.386091]  print_report+0xd1/0x640
[   30.386732]  ? __virt_addr_valid+0x1db/0x2d0
[   30.387492]  ? mempool_double_free_helper+0x185/0x370
[   30.388510]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.389285]  ? mempool_double_free_helper+0x185/0x370
[   30.389921]  kasan_report_invalid_free+0xc0/0xf0
[   30.390622]  ? mempool_double_free_helper+0x185/0x370
[   30.391067]  ? mempool_double_free_helper+0x185/0x370
[   30.391883]  ? mempool_double_free_helper+0x185/0x370
[   30.392719]  check_slab_allocation+0x101/0x130
[   30.393322]  __kasan_mempool_poison_object+0x91/0x1d0
[   30.394145]  mempool_free+0x2ec/0x380
[   30.394506]  mempool_double_free_helper+0x185/0x370
[   30.395058]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   30.395819]  ? finish_task_switch.isra.0+0x153/0x700
[   30.396457]  mempool_kmalloc_double_free+0xb1/0x100
[   30.397014]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   30.397637]  ? __switch_to+0x5d9/0xf60
[   30.398360]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.398766]  ? __pfx_mempool_kfree+0x10/0x10
[   30.399297]  ? __pfx_read_tsc+0x10/0x10
[   30.399932]  ? ktime_get_ts64+0x86/0x230
[   30.400434]  kunit_try_run_case+0x1b3/0x490
[   30.401224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.401623]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.402529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.403142]  ? __kthread_parkme+0x82/0x160
[   30.403633]  ? preempt_count_sub+0x50/0x80
[   30.404297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.404770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.405600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.406251]  kthread+0x257/0x310
[   30.406809]  ? __pfx_kthread+0x10/0x10
[   30.407485]  ret_from_fork+0x41/0x80
[   30.407894]  ? __pfx_kthread+0x10/0x10
[   30.408432]  ret_from_fork_asm+0x1a/0x30
[   30.409087]  </TASK>
[   30.409561] 
[   30.409805] Allocated by task 242:
[   30.410286]  kasan_save_stack+0x3d/0x60
[   30.410742]  kasan_save_track+0x18/0x40
[   30.411287]  kasan_save_alloc_info+0x3b/0x50
[   30.412047]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   30.412484]  remove_element+0x11e/0x190
[   30.413270]  mempool_alloc_preallocated+0x4d/0x90
[   30.413803]  mempool_double_free_helper+0x8b/0x370
[   30.414429]  mempool_kmalloc_double_free+0xb1/0x100
[   30.415166]  kunit_try_run_case+0x1b3/0x490
[   30.415572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.416289]  kthread+0x257/0x310
[   30.416768]  ret_from_fork+0x41/0x80
[   30.417329]  ret_from_fork_asm+0x1a/0x30
[   30.417802] 
[   30.418201] Freed by task 242:
[   30.418465]  kasan_save_stack+0x3d/0x60
[   30.419015]  kasan_save_track+0x18/0x40
[   30.419531]  kasan_save_free_info+0x3f/0x60
[   30.420848]  __kasan_mempool_poison_object+0x131/0x1d0
[   30.422304]  mempool_free+0x2ec/0x380
[   30.422727]  mempool_double_free_helper+0x10a/0x370
[   30.423476]  mempool_kmalloc_double_free+0xb1/0x100
[   30.424325]  kunit_try_run_case+0x1b3/0x490
[   30.424986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.425697]  kthread+0x257/0x310
[   30.426111]  ret_from_fork+0x41/0x80
[   30.426926]  ret_from_fork_asm+0x1a/0x30
[   30.427448] 
[   30.427743] The buggy address belongs to the object at ffff888102a0f400
[   30.427743]  which belongs to the cache kmalloc-128 of size 128
[   30.429217] The buggy address is located 0 bytes inside of
[   30.429217]  128-byte region [ffff888102a0f400, ffff888102a0f480)
[   30.431229] 
[   30.431340] The buggy address belongs to the physical page:
[   30.431563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0f
[   30.432010] flags: 0x200000000000000(node=0|zone=2)
[   30.433560] page_type: f5(slab)
[   30.434002] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.434769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.435658] page dumped because: kasan: bad access detected
[   30.436274] 
[   30.436528] Memory state around the buggy address:
[   30.437235]  ffff888102a0f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.438078]  ffff888102a0f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.438739] >ffff888102a0f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.439945]                    ^
[   30.440180]  ffff888102a0f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.441178]  ffff888102a0f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.441894] ==================================================================
[   30.450540] ==================================================================
[   30.451739] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   30.452654] Free of addr ffff888102d60000 by task kunit_try_catch/244
[   30.453262] 
[   30.453447] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.455573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.456056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.457245] Call Trace:
[   30.457582]  <TASK>
[   30.457818]  dump_stack_lvl+0x73/0xb0
[   30.458485]  print_report+0xd1/0x640
[   30.458829]  ? __virt_addr_valid+0x1db/0x2d0
[   30.459443]  ? mempool_double_free_helper+0x185/0x370
[   30.460120]  ? kasan_addr_to_slab+0x11/0xa0
[   30.460624]  ? mempool_double_free_helper+0x185/0x370
[   30.461276]  kasan_report_invalid_free+0xc0/0xf0
[   30.461708]  ? mempool_double_free_helper+0x185/0x370
[   30.462421]  ? mempool_double_free_helper+0x185/0x370
[   30.462959]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   30.463771]  mempool_free+0x2ec/0x380
[   30.464150]  mempool_double_free_helper+0x185/0x370
[   30.464672]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   30.465216]  ? finish_task_switch.isra.0+0x153/0x700
[   30.465634]  mempool_kmalloc_large_double_free+0xb1/0x100
[   30.466271]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   30.467117]  ? __switch_to+0x5d9/0xf60
[   30.467581]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.468210]  ? __pfx_mempool_kfree+0x10/0x10
[   30.468544]  ? __pfx_read_tsc+0x10/0x10
[   30.469174]  ? ktime_get_ts64+0x86/0x230
[   30.469630]  kunit_try_run_case+0x1b3/0x490
[   30.470500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.470875]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.471548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.472193]  ? __kthread_parkme+0x82/0x160
[   30.472615]  ? preempt_count_sub+0x50/0x80
[   30.473143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.473598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.474275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.474906]  kthread+0x257/0x310
[   30.475550]  ? __pfx_kthread+0x10/0x10
[   30.476225]  ret_from_fork+0x41/0x80
[   30.476565]  ? __pfx_kthread+0x10/0x10
[   30.477316]  ret_from_fork_asm+0x1a/0x30
[   30.477979]  </TASK>
[   30.478218] 
[   30.478663] The buggy address belongs to the physical page:
[   30.478946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d60
[   30.480535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.481417] flags: 0x200000000000040(head|node=0|zone=2)
[   30.481928] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.482631] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.483853] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.484745] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.486483] head: 0200000000000002 ffffea00040b5801 ffffffffffffffff 0000000000000000
[   30.487416] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.487757] page dumped because: kasan: bad access detected
[   30.488644] 
[   30.489219] Memory state around the buggy address:
[   30.489713]  ffff888102d5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.490501]  ffff888102d5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.491270] >ffff888102d60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.491939]                    ^
[   30.492611]  ffff888102d60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.493395]  ffff888102d60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.494352] ==================================================================
[   30.500317] ==================================================================
[   30.501579] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   30.502627] Free of addr ffff888102d60000 by task kunit_try_catch/246
[   30.503339] 
[   30.503562] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.505472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.506283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.507279] Call Trace:
[   30.507510]  <TASK>
[   30.508215]  dump_stack_lvl+0x73/0xb0
[   30.508507]  print_report+0xd1/0x640
[   30.509003]  ? __virt_addr_valid+0x1db/0x2d0
[   30.509803]  ? mempool_double_free_helper+0x185/0x370
[   30.510371]  ? kasan_addr_to_slab+0x11/0xa0
[   30.511379]  ? mempool_double_free_helper+0x185/0x370
[   30.512195]  kasan_report_invalid_free+0xc0/0xf0
[   30.512629]  ? mempool_double_free_helper+0x185/0x370
[   30.513343]  ? mempool_double_free_helper+0x185/0x370
[   30.514355]  __kasan_mempool_poison_pages+0x115/0x130
[   30.514830]  mempool_free+0x290/0x380
[   30.515543]  mempool_double_free_helper+0x185/0x370
[   30.516742]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   30.517296]  mempool_page_alloc_double_free+0xac/0x100
[   30.518006]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   30.518673]  ? __switch_to+0x5d9/0xf60
[   30.519224]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   30.520290]  ? __pfx_mempool_free_pages+0x10/0x10
[   30.520783]  ? __pfx_read_tsc+0x10/0x10
[   30.521451]  ? ktime_get_ts64+0x86/0x230
[   30.522251]  kunit_try_run_case+0x1b3/0x490
[   30.523208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.523715]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.524411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.525411]  ? __kthread_parkme+0x82/0x160
[   30.525925]  ? preempt_count_sub+0x50/0x80
[   30.526306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.526758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.527207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.528280]  kthread+0x257/0x310
[   30.528709]  ? __pfx_kthread+0x10/0x10
[   30.529319]  ret_from_fork+0x41/0x80
[   30.529735]  ? __pfx_kthread+0x10/0x10
[   30.530717]  ret_from_fork_asm+0x1a/0x30
[   30.531210]  </TASK>
[   30.531562] 
[   30.531813] The buggy address belongs to the physical page:
[   30.532766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d60
[   30.533971] flags: 0x200000000000000(node=0|zone=2)
[   30.534496] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   30.535749] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.536557] page dumped because: kasan: bad access detected
[   30.537429] 
[   30.537937] Memory state around the buggy address:
[   30.538398]  ffff888102d5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.539542]  ffff888102d5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.540807] >ffff888102d60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.541338]                    ^
[   30.542197]  ffff888102d60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.542774]  ffff888102d60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.543475] ==================================================================