Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.383635] ================================================================== [ 25.387389] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 25.388764] Free of addr fff00000c6594000 by task kunit_try_catch/228 [ 25.391611] [ 25.392413] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 25.392676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.392742] Hardware name: linux,dummy-virt (DT) [ 25.392812] Call trace: [ 25.392868] show_stack+0x20/0x38 (C) [ 25.393418] dump_stack_lvl+0x8c/0xd0 [ 25.393549] print_report+0x118/0x608 [ 25.393661] kasan_report_invalid_free+0xc0/0xe8 [ 25.393786] __kasan_mempool_poison_pages+0xe0/0xe8 [ 25.393929] mempool_free+0x24c/0x328 [ 25.394063] mempool_double_free_helper+0x150/0x2e0 [ 25.394199] mempool_page_alloc_double_free+0xbc/0x118 [ 25.394321] kunit_try_run_case+0x170/0x3f0 [ 25.394434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.394561] kthread+0x318/0x620 [ 25.394667] ret_from_fork+0x10/0x20 [ 25.394789] [ 25.409854] The buggy address belongs to the physical page: [ 25.411401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106594 [ 25.414643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.416588] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.419061] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.420445] page dumped because: kasan: bad access detected [ 25.422981] [ 25.423816] Memory state around the buggy address: [ 25.425662] fff00000c6593f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.426924] fff00000c6593f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.428350] >fff00000c6594000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.430346] ^ [ 25.431972] fff00000c6594080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.434388] fff00000c6594100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.436285] ================================================================== [ 25.295254] ================================================================== [ 25.299225] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 25.301520] Free of addr fff00000c6610000 by task kunit_try_catch/226 [ 25.302547] [ 25.304064] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 25.304262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.304327] Hardware name: linux,dummy-virt (DT) [ 25.304400] Call trace: [ 25.304452] show_stack+0x20/0x38 (C) [ 25.304578] dump_stack_lvl+0x8c/0xd0 [ 25.304697] print_report+0x118/0x608 [ 25.304814] kasan_report_invalid_free+0xc0/0xe8 [ 25.305590] __kasan_mempool_poison_object+0x14c/0x150 [ 25.305723] mempool_free+0x28c/0x328 [ 25.305845] mempool_double_free_helper+0x150/0x2e0 [ 25.305988] mempool_kmalloc_large_double_free+0xc0/0x118 [ 25.306114] kunit_try_run_case+0x170/0x3f0 [ 25.306240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.306365] kthread+0x318/0x620 [ 25.306475] ret_from_fork+0x10/0x20 [ 25.306595] [ 25.320754] The buggy address belongs to the physical page: [ 25.323114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 25.324769] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.327367] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.327976] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.328550] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.331119] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.333977] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.335694] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000 [ 25.337734] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 25.339629] page dumped because: kasan: bad access detected [ 25.342082] [ 25.342489] Memory state around the buggy address: [ 25.342922] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.343459] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.345640] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.347322] ^ [ 25.348451] fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.351045] fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.352765] ================================================================== [ 25.183444] ================================================================== [ 25.186700] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 25.188857] Free of addr fff00000c64f9700 by task kunit_try_catch/224 [ 25.190598] [ 25.191479] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 25.191694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.191760] Hardware name: linux,dummy-virt (DT) [ 25.191835] Call trace: [ 25.191900] show_stack+0x20/0x38 (C) [ 25.192025] dump_stack_lvl+0x8c/0xd0 [ 25.192142] print_report+0x118/0x608 [ 25.192254] kasan_report_invalid_free+0xc0/0xe8 [ 25.192375] check_slab_allocation+0xd4/0x108 [ 25.192498] __kasan_mempool_poison_object+0x78/0x150 [ 25.192618] mempool_free+0x28c/0x328 [ 25.192729] mempool_double_free_helper+0x150/0x2e0 [ 25.192844] mempool_kmalloc_double_free+0xc0/0x118 [ 25.194302] kunit_try_run_case+0x170/0x3f0 [ 25.194420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.194569] kthread+0x318/0x620 [ 25.194688] ret_from_fork+0x10/0x20 [ 25.194802] [ 25.209590] Allocated by task 224: [ 25.211173] kasan_save_stack+0x3c/0x68 [ 25.212434] kasan_save_track+0x20/0x40 [ 25.214698] kasan_save_alloc_info+0x40/0x58 [ 25.216064] __kasan_mempool_unpoison_object+0x11c/0x180 [ 25.217728] remove_element+0x130/0x1f8 [ 25.218908] mempool_alloc_preallocated+0x58/0xc0 [ 25.219773] mempool_double_free_helper+0x94/0x2e0 [ 25.220253] mempool_kmalloc_double_free+0xc0/0x118 [ 25.220686] kunit_try_run_case+0x170/0x3f0 [ 25.223163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.224519] kthread+0x318/0x620 [ 25.225812] ret_from_fork+0x10/0x20 [ 25.226786] [ 25.227860] Freed by task 224: [ 25.228908] kasan_save_stack+0x3c/0x68 [ 25.231150] kasan_save_track+0x20/0x40 [ 25.232266] kasan_save_free_info+0x4c/0x78 [ 25.232666] __kasan_mempool_poison_object+0xc0/0x150 [ 25.234557] mempool_free+0x28c/0x328 [ 25.235742] mempool_double_free_helper+0x100/0x2e0 [ 25.238560] mempool_kmalloc_double_free+0xc0/0x118 [ 25.239839] kunit_try_run_case+0x170/0x3f0 [ 25.240607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.242305] kthread+0x318/0x620 [ 25.243465] ret_from_fork+0x10/0x20 [ 25.244762] [ 25.246175] The buggy address belongs to the object at fff00000c64f9700 [ 25.246175] which belongs to the cache kmalloc-128 of size 128 [ 25.248168] The buggy address is located 0 bytes inside of [ 25.248168] 128-byte region [fff00000c64f9700, fff00000c64f9780) [ 25.249879] [ 25.250688] The buggy address belongs to the physical page: [ 25.252084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 25.254924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.256511] page_type: f5(slab) [ 25.257956] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.258557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.260288] page dumped because: kasan: bad access detected [ 25.262477] [ 25.263113] Memory state around the buggy address: [ 25.264600] fff00000c64f9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.266631] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.267637] >fff00000c64f9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.268183] ^ [ 25.268511] fff00000c64f9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.271183] fff00000c64f9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.272815] ==================================================================
[ 19.824630] ================================================================== [ 19.825441] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 19.826702] Free of addr ffff888102cbc000 by task kunit_try_catch/245 [ 19.827037] [ 19.827237] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 19.827345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.827379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.827433] Call Trace: [ 19.827464] <TASK> [ 19.827505] dump_stack_lvl+0x73/0xb0 [ 19.827582] print_report+0xd1/0x650 [ 19.827634] ? __virt_addr_valid+0x1db/0x2d0 [ 19.827672] ? kasan_addr_to_slab+0x11/0xa0 [ 19.827711] ? mempool_double_free_helper+0x185/0x370 [ 19.827743] kasan_report_invalid_free+0xfc/0x120 [ 19.827780] ? mempool_double_free_helper+0x185/0x370 [ 19.827833] ? mempool_double_free_helper+0x185/0x370 [ 19.827881] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 19.827914] mempool_free+0x2ec/0x380 [ 19.827947] mempool_double_free_helper+0x185/0x370 [ 19.827979] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 19.828015] ? finish_task_switch.isra.0+0x153/0x700 [ 19.828051] mempool_kmalloc_large_double_free+0xee/0x140 [ 19.828081] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 19.828116] ? __pfx_mempool_kmalloc+0x10/0x10 [ 19.828141] ? __pfx_mempool_kfree+0x10/0x10 [ 19.828168] ? __pfx_read_tsc+0x10/0x10 [ 19.828197] ? ktime_get_ts64+0x86/0x230 [ 19.828231] kunit_try_run_case+0x1a6/0x480 [ 19.828263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.828290] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.828372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.828436] ? __kthread_parkme+0x82/0x160 [ 19.828497] ? preempt_count_sub+0x50/0x80 [ 19.828563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.828615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.828685] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.828755] kthread+0x324/0x6e0 [ 19.828813] ? trace_preempt_on+0x20/0xc0 [ 19.828896] ? __pfx_kthread+0x10/0x10 [ 19.828950] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.829005] ? calculate_sigpending+0x7b/0xa0 [ 19.829044] ? __pfx_kthread+0x10/0x10 [ 19.829075] ret_from_fork+0x41/0x80 [ 19.829103] ? __pfx_kthread+0x10/0x10 [ 19.829132] ret_from_fork_asm+0x1a/0x30 [ 19.829173] </TASK> [ 19.829189] [ 19.847869] The buggy address belongs to the physical page: [ 19.848563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cbc [ 19.849302] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.849956] flags: 0x200000000000040(head|node=0|zone=2) [ 19.850624] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.851519] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.852329] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.853154] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.853920] head: 0200000000000002 ffffea00040b2f01 ffffffffffffffff 0000000000000000 [ 19.854915] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.855454] page dumped because: kasan: bad access detected [ 19.855964] [ 19.856173] Memory state around the buggy address: [ 19.856520] ffff888102cbbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.857464] ffff888102cbbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.858132] >ffff888102cbc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.858994] ^ [ 19.859387] ffff888102cbc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.859997] ffff888102cbc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.860457] ================================================================== [ 19.768174] ================================================================== [ 19.769001] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 19.769743] Free of addr ffff88810298a500 by task kunit_try_catch/243 [ 19.770393] [ 19.770735] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 19.770842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.770895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.770948] Call Trace: [ 19.770978] <TASK> [ 19.771019] dump_stack_lvl+0x73/0xb0 [ 19.771092] print_report+0xd1/0x650 [ 19.771147] ? __virt_addr_valid+0x1db/0x2d0 [ 19.771210] ? kasan_complete_mode_report_info+0x64/0x200 [ 19.771272] ? mempool_double_free_helper+0x185/0x370 [ 19.771326] kasan_report_invalid_free+0xfc/0x120 [ 19.771382] ? mempool_double_free_helper+0x185/0x370 [ 19.771435] ? mempool_double_free_helper+0x185/0x370 [ 19.771487] ? mempool_double_free_helper+0x185/0x370 [ 19.771537] check_slab_allocation+0x101/0x130 [ 19.771603] __kasan_mempool_poison_object+0x91/0x1d0 [ 19.771680] mempool_free+0x2ec/0x380 [ 19.771760] mempool_double_free_helper+0x185/0x370 [ 19.771819] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 19.771910] ? finish_task_switch.isra.0+0x153/0x700 [ 19.771979] mempool_kmalloc_double_free+0xee/0x140 [ 19.772015] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 19.772049] ? __pfx_mempool_kmalloc+0x10/0x10 [ 19.772074] ? __pfx_mempool_kfree+0x10/0x10 [ 19.772103] ? __pfx_read_tsc+0x10/0x10 [ 19.772132] ? ktime_get_ts64+0x86/0x230 [ 19.772166] kunit_try_run_case+0x1a6/0x480 [ 19.772198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.772226] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.772258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.772288] ? __kthread_parkme+0x82/0x160 [ 19.772333] ? preempt_count_sub+0x50/0x80 [ 19.772365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.772394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.772431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.772487] kthread+0x324/0x6e0 [ 19.772534] ? trace_preempt_on+0x20/0xc0 [ 19.772569] ? __pfx_kthread+0x10/0x10 [ 19.772598] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.772627] ? calculate_sigpending+0x7b/0xa0 [ 19.772656] ? __pfx_kthread+0x10/0x10 [ 19.772684] ret_from_fork+0x41/0x80 [ 19.772709] ? __pfx_kthread+0x10/0x10 [ 19.772737] ret_from_fork_asm+0x1a/0x30 [ 19.772778] </TASK> [ 19.772793] [ 19.790871] Allocated by task 243: [ 19.791774] kasan_save_stack+0x45/0x70 [ 19.792102] kasan_save_track+0x18/0x40 [ 19.792396] kasan_save_alloc_info+0x3b/0x50 [ 19.792821] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 19.793883] remove_element+0x11e/0x190 [ 19.794334] mempool_alloc_preallocated+0x4d/0x90 [ 19.795325] mempool_double_free_helper+0x8b/0x370 [ 19.795666] mempool_kmalloc_double_free+0xee/0x140 [ 19.796405] kunit_try_run_case+0x1a6/0x480 [ 19.797024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.797776] kthread+0x324/0x6e0 [ 19.798307] ret_from_fork+0x41/0x80 [ 19.798895] ret_from_fork_asm+0x1a/0x30 [ 19.799367] [ 19.799801] Freed by task 243: [ 19.800030] kasan_save_stack+0x45/0x70 [ 19.800425] kasan_save_track+0x18/0x40 [ 19.800747] kasan_save_free_info+0x3f/0x60 [ 19.801751] __kasan_mempool_poison_object+0x131/0x1d0 [ 19.802107] mempool_free+0x2ec/0x380 [ 19.802971] mempool_double_free_helper+0x10a/0x370 [ 19.803224] mempool_kmalloc_double_free+0xee/0x140 [ 19.804038] kunit_try_run_case+0x1a6/0x480 [ 19.805008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.805392] kthread+0x324/0x6e0 [ 19.805937] ret_from_fork+0x41/0x80 [ 19.806192] ret_from_fork_asm+0x1a/0x30 [ 19.807055] [ 19.807224] The buggy address belongs to the object at ffff88810298a500 [ 19.807224] which belongs to the cache kmalloc-128 of size 128 [ 19.808562] The buggy address is located 0 bytes inside of [ 19.808562] 128-byte region [ffff88810298a500, ffff88810298a580) [ 19.809607] [ 19.809938] The buggy address belongs to the physical page: [ 19.810398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298a [ 19.811203] flags: 0x200000000000000(node=0|zone=2) [ 19.811742] page_type: f5(slab) [ 19.812214] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.813181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.813939] page dumped because: kasan: bad access detected [ 19.814618] [ 19.815006] Memory state around the buggy address: [ 19.815590] ffff88810298a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.816119] ffff88810298a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.816302] >ffff88810298a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.816603] ^ [ 19.816969] ffff88810298a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817587] ffff88810298a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.818291] ================================================================== [ 19.865293] ================================================================== [ 19.866203] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 19.866841] Free of addr ffff888102d78000 by task kunit_try_catch/247 [ 19.867182] [ 19.867437] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 19.867546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.867576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.867622] Call Trace: [ 19.867654] <TASK> [ 19.867698] dump_stack_lvl+0x73/0xb0 [ 19.867770] print_report+0xd1/0x650 [ 19.867822] ? __virt_addr_valid+0x1db/0x2d0 [ 19.867899] ? kasan_addr_to_slab+0x11/0xa0 [ 19.867948] ? mempool_double_free_helper+0x185/0x370 [ 19.868001] kasan_report_invalid_free+0xfc/0x120 [ 19.868061] ? mempool_double_free_helper+0x185/0x370 [ 19.868126] ? mempool_double_free_helper+0x185/0x370 [ 19.868178] __kasan_mempool_poison_pages+0x115/0x130 [ 19.868213] mempool_free+0x290/0x380 [ 19.868247] mempool_double_free_helper+0x185/0x370 [ 19.868277] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 19.868322] ? finish_task_switch.isra.0+0x153/0x700 [ 19.868381] mempool_page_alloc_double_free+0xe9/0x140 [ 19.868444] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 19.868508] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 19.868562] ? __pfx_mempool_free_pages+0x10/0x10 [ 19.868617] ? __pfx_read_tsc+0x10/0x10 [ 19.868669] ? ktime_get_ts64+0x86/0x230 [ 19.868726] kunit_try_run_case+0x1a6/0x480 [ 19.868787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.868845] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.868926] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.868978] ? __kthread_parkme+0x82/0x160 [ 19.869011] ? preempt_count_sub+0x50/0x80 [ 19.869043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.869073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.869107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.869140] kthread+0x324/0x6e0 [ 19.869168] ? trace_preempt_on+0x20/0xc0 [ 19.869199] ? __pfx_kthread+0x10/0x10 [ 19.869227] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.869255] ? calculate_sigpending+0x7b/0xa0 [ 19.869283] ? __pfx_kthread+0x10/0x10 [ 19.869325] ret_from_fork+0x41/0x80 [ 19.869371] ? __pfx_kthread+0x10/0x10 [ 19.869418] ret_from_fork_asm+0x1a/0x30 [ 19.869490] </TASK> [ 19.869513] [ 19.882755] The buggy address belongs to the physical page: [ 19.883604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d78 [ 19.884304] flags: 0x200000000000000(node=0|zone=2) [ 19.884911] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.885266] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.885963] page dumped because: kasan: bad access detected [ 19.886512] [ 19.886655] Memory state around the buggy address: [ 19.886923] ffff888102d77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.887470] ffff888102d77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.888258] >ffff888102d78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.889207] ^ [ 19.889433] ffff888102d78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.889773] ffff888102d78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.890467] ==================================================================