Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.516697] ==================================================================
[   20.517221] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   20.517724] Free of addr fff00000c5a05a00 by task kunit_try_catch/224
[   20.518100] 
[   20.518319] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.518443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.518480] Hardware name: linux,dummy-virt (DT)
[   20.518592] Call trace:
[   20.518627]  show_stack+0x20/0x38 (C)
[   20.518690]  dump_stack_lvl+0x8c/0xd0
[   20.518755]  print_report+0x118/0x608
[   20.518812]  kasan_report_invalid_free+0xc0/0xe8
[   20.518868]  check_slab_allocation+0xd4/0x108
[   20.518922]  __kasan_mempool_poison_object+0x78/0x150
[   20.518980]  mempool_free+0x28c/0x328
[   20.519032]  mempool_double_free_helper+0x150/0x2e0
[   20.519088]  mempool_kmalloc_double_free+0xc0/0x118
[   20.519142]  kunit_try_run_case+0x170/0x3f0
[   20.519197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.519255]  kthread+0x318/0x620
[   20.519305]  ret_from_fork+0x10/0x20
[   20.519360] 
[   20.523888] Allocated by task 224:
[   20.524064]  kasan_save_stack+0x3c/0x68
[   20.524260]  kasan_save_track+0x20/0x40
[   20.524581]  kasan_save_alloc_info+0x40/0x58
[   20.524847]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.525272]  remove_element+0x130/0x1f8
[   20.525527]  mempool_alloc_preallocated+0x58/0xc0
[   20.525797]  mempool_double_free_helper+0x94/0x2e0
[   20.526124]  mempool_kmalloc_double_free+0xc0/0x118
[   20.526429]  kunit_try_run_case+0x170/0x3f0
[   20.526743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.527059]  kthread+0x318/0x620
[   20.527227]  ret_from_fork+0x10/0x20
[   20.527386] 
[   20.527569] Freed by task 224:
[   20.527728]  kasan_save_stack+0x3c/0x68
[   20.528227]  kasan_save_track+0x20/0x40
[   20.528396]  kasan_save_free_info+0x4c/0x78
[   20.528679]  __kasan_mempool_poison_object+0xc0/0x150
[   20.529016]  mempool_free+0x28c/0x328
[   20.529300]  mempool_double_free_helper+0x100/0x2e0
[   20.529509]  mempool_kmalloc_double_free+0xc0/0x118
[   20.529877]  kunit_try_run_case+0x170/0x3f0
[   20.530056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.531196]  kthread+0x318/0x620
[   20.531395]  ret_from_fork+0x10/0x20
[   20.531670] 
[   20.531858] The buggy address belongs to the object at fff00000c5a05a00
[   20.531858]  which belongs to the cache kmalloc-128 of size 128
[   20.532478] The buggy address is located 0 bytes inside of
[   20.532478]  128-byte region [fff00000c5a05a00, fff00000c5a05a80)
[   20.532966] 
[   20.533119] The buggy address belongs to the physical page:
[   20.533340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   20.533772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.534309] page_type: f5(slab)
[   20.534678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.535225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.535589] page dumped because: kasan: bad access detected
[   20.535863] 
[   20.536001] Memory state around the buggy address:
[   20.536170]  fff00000c5a05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.536530]  fff00000c5a05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.537095] >fff00000c5a05a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.537394]                    ^
[   20.537685]  fff00000c5a05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.538058]  fff00000c5a05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.539158] ==================================================================
[   20.570485] ==================================================================
[   20.571378] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   20.572003] Free of addr fff00000c665c000 by task kunit_try_catch/228
[   20.572663] 
[   20.572843] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.572955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.572990] Hardware name: linux,dummy-virt (DT)
[   20.573030] Call trace:
[   20.573057]  show_stack+0x20/0x38 (C)
[   20.573124]  dump_stack_lvl+0x8c/0xd0
[   20.573180]  print_report+0x118/0x608
[   20.573236]  kasan_report_invalid_free+0xc0/0xe8
[   20.573291]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.573351]  mempool_free+0x24c/0x328
[   20.573403]  mempool_double_free_helper+0x150/0x2e0
[   20.573460]  mempool_page_alloc_double_free+0xbc/0x118
[   20.573518]  kunit_try_run_case+0x170/0x3f0
[   20.573571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.573630]  kthread+0x318/0x620
[   20.573680]  ret_from_fork+0x10/0x20
[   20.573942] 
[   20.578336] The buggy address belongs to the physical page:
[   20.579193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   20.579528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.579844] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.580105] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.580351] page dumped because: kasan: bad access detected
[   20.580581] 
[   20.580706] Memory state around the buggy address:
[   20.581456]  fff00000c665bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.581695]  fff00000c665bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.582101] >fff00000c665c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.582379]                    ^
[   20.583343]  fff00000c665c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.583828]  fff00000c665c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.584419] ==================================================================
[   20.545791] ==================================================================
[   20.546369] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   20.547397] Free of addr fff00000c65fc000 by task kunit_try_catch/226
[   20.547836] 
[   20.548005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.548110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.548145] Hardware name: linux,dummy-virt (DT)
[   20.548185] Call trace:
[   20.548212]  show_stack+0x20/0x38 (C)
[   20.548275]  dump_stack_lvl+0x8c/0xd0
[   20.548335]  print_report+0x118/0x608
[   20.548387]  kasan_report_invalid_free+0xc0/0xe8
[   20.548442]  __kasan_mempool_poison_object+0x14c/0x150
[   20.548500]  mempool_free+0x28c/0x328
[   20.548555]  mempool_double_free_helper+0x150/0x2e0
[   20.548609]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.548667]  kunit_try_run_case+0x170/0x3f0
[   20.548722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548798]  kthread+0x318/0x620
[   20.548854]  ret_from_fork+0x10/0x20
[   20.548908] 
[   20.553774] The buggy address belongs to the physical page:
[   20.554110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   20.554632] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.555072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.555357] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.555645] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.555900] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.556141] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.556408] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[   20.556654] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.557421] page dumped because: kasan: bad access detected
[   20.557714] 
[   20.557837] Memory state around the buggy address:
[   20.558231]  fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.558687]  fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559031] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559371]                    ^
[   20.559597]  fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.561198]  fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.561713] ==================================================================

[   14.034723] ==================================================================
[   14.035430] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   14.035684] Free of addr ffff888102add700 by task kunit_try_catch/243
[   14.035898] 
[   14.035988] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.036051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.036063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.036088] Call Trace:
[   14.036101]  <TASK>
[   14.036120]  dump_stack_lvl+0x73/0xb0
[   14.036149]  print_report+0xd1/0x650
[   14.036171]  ? __virt_addr_valid+0x1db/0x2d0
[   14.036196]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.036221]  ? mempool_double_free_helper+0x185/0x370
[   14.036245]  kasan_report_invalid_free+0xfc/0x120
[   14.036269]  ? mempool_double_free_helper+0x185/0x370
[   14.036293]  ? mempool_double_free_helper+0x185/0x370
[   14.036314]  ? mempool_double_free_helper+0x185/0x370
[   14.036337]  check_slab_allocation+0x101/0x130
[   14.036358]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.036381]  mempool_free+0x2ec/0x380
[   14.036720]  mempool_double_free_helper+0x185/0x370
[   14.036761]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.036797]  ? finish_task_switch.isra.0+0x153/0x700
[   14.036828]  mempool_kmalloc_double_free+0xee/0x140
[   14.036863]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.036888]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.036909]  ? __pfx_mempool_kfree+0x10/0x10
[   14.036931]  ? __pfx_read_tsc+0x10/0x10
[   14.036954]  ? ktime_get_ts64+0x86/0x230
[   14.036979]  kunit_try_run_case+0x1a6/0x480
[   14.037003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.037025]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.037338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.037398]  ? __kthread_parkme+0x82/0x160
[   14.037424]  ? preempt_count_sub+0x50/0x80
[   14.037449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.037473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.037499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.037525]  kthread+0x324/0x6e0
[   14.037546]  ? trace_preempt_on+0x20/0xc0
[   14.037571]  ? __pfx_kthread+0x10/0x10
[   14.037593]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.037617]  ? calculate_sigpending+0x7b/0xa0
[   14.037640]  ? __pfx_kthread+0x10/0x10
[   14.037663]  ret_from_fork+0x41/0x80
[   14.037682]  ? __pfx_kthread+0x10/0x10
[   14.037704]  ret_from_fork_asm+0x1a/0x30
[   14.037736]  </TASK>
[   14.037753] 
[   14.054461] Allocated by task 243:
[   14.055007]  kasan_save_stack+0x45/0x70
[   14.055217]  kasan_save_track+0x18/0x40
[   14.055419]  kasan_save_alloc_info+0x3b/0x50
[   14.055610]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.055860]  remove_element+0x11e/0x190
[   14.056037]  mempool_alloc_preallocated+0x4d/0x90
[   14.056558]  mempool_double_free_helper+0x8b/0x370
[   14.056884]  mempool_kmalloc_double_free+0xee/0x140
[   14.057169]  kunit_try_run_case+0x1a6/0x480
[   14.057432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.057779]  kthread+0x324/0x6e0
[   14.057945]  ret_from_fork+0x41/0x80
[   14.058290]  ret_from_fork_asm+0x1a/0x30
[   14.058589] 
[   14.058695] Freed by task 243:
[   14.058881]  kasan_save_stack+0x45/0x70
[   14.059108]  kasan_save_track+0x18/0x40
[   14.059303]  kasan_save_free_info+0x3f/0x60
[   14.059521]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.059753]  mempool_free+0x2ec/0x380
[   14.059913]  mempool_double_free_helper+0x10a/0x370
[   14.060175]  mempool_kmalloc_double_free+0xee/0x140
[   14.060380]  kunit_try_run_case+0x1a6/0x480
[   14.060580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.060820]  kthread+0x324/0x6e0
[   14.060971]  ret_from_fork+0x41/0x80
[   14.061114]  ret_from_fork_asm+0x1a/0x30
[   14.061340] 
[   14.061490] The buggy address belongs to the object at ffff888102add700
[   14.061490]  which belongs to the cache kmalloc-128 of size 128
[   14.062013] The buggy address is located 0 bytes inside of
[   14.062013]  128-byte region [ffff888102add700, ffff888102add780)
[   14.062527] 
[   14.062603] The buggy address belongs to the physical page:
[   14.062776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add
[   14.063727] flags: 0x200000000000000(node=0|zone=2)
[   14.064210] page_type: f5(slab)
[   14.064532] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.065227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.065565] page dumped because: kasan: bad access detected
[   14.065804] 
[   14.065902] Memory state around the buggy address:
[   14.066407]  ffff888102add600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.066886]  ffff888102add680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.067391] >ffff888102add700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.067825]                    ^
[   14.067991]  ffff888102add780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.068856]  ffff888102add800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.069383] ==================================================================
[   14.073492] ==================================================================
[   14.073934] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   14.074433] Free of addr ffff888102954000 by task kunit_try_catch/245
[   14.075258] 
[   14.075355] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.075405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.075418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.075442] Call Trace:
[   14.075456]  <TASK>
[   14.075478]  dump_stack_lvl+0x73/0xb0
[   14.075511]  print_report+0xd1/0x650
[   14.075533]  ? __virt_addr_valid+0x1db/0x2d0
[   14.075558]  ? kasan_addr_to_slab+0x11/0xa0
[   14.075578]  ? mempool_double_free_helper+0x185/0x370
[   14.075602]  kasan_report_invalid_free+0xfc/0x120
[   14.075625]  ? mempool_double_free_helper+0x185/0x370
[   14.075650]  ? mempool_double_free_helper+0x185/0x370
[   14.075672]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.075695]  mempool_free+0x2ec/0x380
[   14.075720]  mempool_double_free_helper+0x185/0x370
[   14.075742]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.075769]  ? finish_task_switch.isra.0+0x153/0x700
[   14.075797]  mempool_kmalloc_large_double_free+0xee/0x140
[   14.075821]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.075864]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.075883]  ? __pfx_mempool_kfree+0x10/0x10
[   14.075904]  ? __pfx_read_tsc+0x10/0x10
[   14.075928]  ? ktime_get_ts64+0x86/0x230
[   14.075953]  kunit_try_run_case+0x1a6/0x480
[   14.075978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.076000]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.076023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.076049]  ? __kthread_parkme+0x82/0x160
[   14.076072]  ? preempt_count_sub+0x50/0x80
[   14.076095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.076117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.076142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.076168]  kthread+0x324/0x6e0
[   14.076188]  ? trace_preempt_on+0x20/0xc0
[   14.076213]  ? __pfx_kthread+0x10/0x10
[   14.076234]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.076257]  ? calculate_sigpending+0x7b/0xa0
[   14.076280]  ? __pfx_kthread+0x10/0x10
[   14.076324]  ret_from_fork+0x41/0x80
[   14.076343]  ? __pfx_kthread+0x10/0x10
[   14.076365]  ret_from_fork_asm+0x1a/0x30
[   14.076396]  </TASK>
[   14.076408] 
[   14.085103] The buggy address belongs to the physical page:
[   14.085393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954
[   14.085643] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.085967] flags: 0x200000000000040(head|node=0|zone=2)
[   14.086409] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.087711] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.088259] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.088736] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.089333] head: 0200000000000002 ffffea00040a5501 ffffffffffffffff 0000000000000000
[   14.089649] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   14.089970] page dumped because: kasan: bad access detected
[   14.090784] 
[   14.091392] Memory state around the buggy address:
[   14.091708]  ffff888102953f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.092562]  ffff888102953f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.093072] >ffff888102954000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.093526]                    ^
[   14.093681]  ffff888102954080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.093971]  ffff888102954100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.095047] ==================================================================
[   14.100618] ==================================================================
[   14.101187] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   14.101528] Free of addr ffff888102954000 by task kunit_try_catch/247
[   14.101809] 
[   14.101936] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.101986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.101998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.102021] Call Trace:
[   14.102036]  <TASK>
[   14.102055]  dump_stack_lvl+0x73/0xb0
[   14.102084]  print_report+0xd1/0x650
[   14.102107]  ? __virt_addr_valid+0x1db/0x2d0
[   14.102131]  ? kasan_addr_to_slab+0x11/0xa0
[   14.102150]  ? mempool_double_free_helper+0x185/0x370
[   14.102174]  kasan_report_invalid_free+0xfc/0x120
[   14.102197]  ? mempool_double_free_helper+0x185/0x370
[   14.102222]  ? mempool_double_free_helper+0x185/0x370
[   14.102244]  __kasan_mempool_poison_pages+0x115/0x130
[   14.102267]  mempool_free+0x290/0x380
[   14.102290]  mempool_double_free_helper+0x185/0x370
[   14.102313]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.102339]  ? finish_task_switch.isra.0+0x153/0x700
[   14.102368]  mempool_page_alloc_double_free+0xe9/0x140
[   14.102394]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.102421]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.102440]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.102462]  ? __pfx_read_tsc+0x10/0x10
[   14.102484]  ? ktime_get_ts64+0x86/0x230
[   14.102509]  kunit_try_run_case+0x1a6/0x480
[   14.102533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.102554]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.102576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.102602]  ? __kthread_parkme+0x82/0x160
[   14.102625]  ? preempt_count_sub+0x50/0x80
[   14.102649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.102672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.102698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.102724]  kthread+0x324/0x6e0
[   14.102746]  ? trace_preempt_on+0x20/0xc0
[   14.102770]  ? __pfx_kthread+0x10/0x10
[   14.102792]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.102815]  ? calculate_sigpending+0x7b/0xa0
[   14.102875]  ? __pfx_kthread+0x10/0x10
[   14.102901]  ret_from_fork+0x41/0x80
[   14.102921]  ? __pfx_kthread+0x10/0x10
[   14.102943]  ret_from_fork_asm+0x1a/0x30
[   14.103016]  </TASK>
[   14.103029] 
[   14.113364] The buggy address belongs to the physical page:
[   14.113676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954
[   14.114120] flags: 0x200000000000000(node=0|zone=2)
[   14.114338] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.114651] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.114963] page dumped because: kasan: bad access detected
[   14.115318] 
[   14.115418] Memory state around the buggy address:
[   14.115614]  ffff888102953f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.115946]  ffff888102953f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.116293] >ffff888102954000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.116565]                    ^
[   14.116689]  ffff888102954080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.116939]  ffff888102954100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.117333] ==================================================================