Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   26.172619] ==================================================================
[   26.172733] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   26.173433] Free of addr fff00000c77a0001 by task kunit_try_catch/245
[   26.174140] 
[   26.174473] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.175318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.175386] Hardware name: linux,dummy-virt (DT)
[   26.175714] Call trace:
[   26.175777]  show_stack+0x20/0x38 (C)
[   26.175951]  dump_stack_lvl+0x8c/0xd0
[   26.176085]  print_report+0x118/0x608
[   26.176214]  kasan_report_invalid_free+0xc0/0xe8
[   26.176719]  __kasan_mempool_poison_object+0xfc/0x150
[   26.176854]  mempool_free+0x28c/0x328
[   26.177000]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   26.177150]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   26.177292]  kunit_try_run_case+0x170/0x3f0
[   26.177424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.178010]  kthread+0x328/0x630
[   26.178207]  ret_from_fork+0x10/0x20
[   26.178341] 
[   26.178425] The buggy address belongs to the physical page:
[   26.178503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0
[   26.178836] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.178996] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.179429] page_type: f8(unknown)
[   26.180027] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.180221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.180576] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.180874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.181024] head: 0bfffe0000000002 ffffc1ffc31de801 00000000ffffffff 00000000ffffffff
[   26.181305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.181446] page dumped because: kasan: bad access detected
[   26.181631] 
[   26.181692] Memory state around the buggy address:
[   26.181867]  fff00000c779ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.182151]  fff00000c779ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.182666] >fff00000c77a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.183499]                    ^
[   26.183733]  fff00000c77a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.183871]  fff00000c77a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.183996] ==================================================================
[   26.138339] ==================================================================
[   26.138487] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   26.138637] Free of addr fff00000c67e4401 by task kunit_try_catch/243
[   26.138738] 
[   26.138815] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.139073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.139137] Hardware name: linux,dummy-virt (DT)
[   26.139223] Call trace:
[   26.139321]  show_stack+0x20/0x38 (C)
[   26.139518]  dump_stack_lvl+0x8c/0xd0
[   26.139723]  print_report+0x118/0x608
[   26.139857]  kasan_report_invalid_free+0xc0/0xe8
[   26.140022]  check_slab_allocation+0xfc/0x108
[   26.140156]  __kasan_mempool_poison_object+0x78/0x150
[   26.140298]  mempool_free+0x28c/0x328
[   26.140582]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   26.140728]  mempool_kmalloc_invalid_free+0xc0/0x118
[   26.140853]  kunit_try_run_case+0x170/0x3f0
[   26.140994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.141176]  kthread+0x328/0x630
[   26.141311]  ret_from_fork+0x10/0x20
[   26.141489] 
[   26.141539] Allocated by task 243:
[   26.141619]  kasan_save_stack+0x3c/0x68
[   26.141739]  kasan_save_track+0x20/0x40
[   26.141849]  kasan_save_alloc_info+0x40/0x58
[   26.142002]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.142124]  remove_element+0x130/0x1f8
[   26.142335]  mempool_alloc_preallocated+0x58/0xc0
[   26.142470]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   26.142698]  mempool_kmalloc_invalid_free+0xc0/0x118
[   26.142819]  kunit_try_run_case+0x170/0x3f0
[   26.143078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.143208]  kthread+0x328/0x630
[   26.143454]  ret_from_fork+0x10/0x20
[   26.143556] 
[   26.143609] The buggy address belongs to the object at fff00000c67e4400
[   26.143609]  which belongs to the cache kmalloc-128 of size 128
[   26.143806] The buggy address is located 1 bytes inside of
[   26.143806]  128-byte region [fff00000c67e4400, fff00000c67e4480)
[   26.143989] 
[   26.144042] The buggy address belongs to the physical page:
[   26.144205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   26.144355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.144595] page_type: f5(slab)
[   26.144693] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.144828] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.145137] page dumped because: kasan: bad access detected
[   26.145290] 
[   26.145408] Memory state around the buggy address:
[   26.145518]  fff00000c67e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.145623]  fff00000c67e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.145732] >fff00000c67e4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.145899]                    ^
[   26.146356]  fff00000c67e4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.146493]  fff00000c67e4500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.147309] ==================================================================

[   13.212952] ==================================================================
[   13.213705] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.214070] Free of addr ffff888102756401 by task kunit_try_catch/261
[   13.214382] 
[   13.214489] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.214532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.214566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.214586] Call Trace:
[   13.214597]  <TASK>
[   13.214610]  dump_stack_lvl+0x73/0xb0
[   13.214634]  print_report+0xd1/0x650
[   13.214656]  ? __virt_addr_valid+0x1db/0x2d0
[   13.214678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.214701]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.214727]  kasan_report_invalid_free+0x10a/0x130
[   13.214752]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.214778]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.214802]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.214827]  check_slab_allocation+0x11f/0x130
[   13.214849]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.214873]  mempool_free+0x2ec/0x380
[   13.214895]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.214920]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   13.214945]  ? update_load_avg+0x1be/0x21b0
[   13.214971]  ? finish_task_switch.isra.0+0x153/0x700
[   13.214997]  mempool_kmalloc_invalid_free+0xed/0x140
[   13.215020]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   13.215043]  ? dequeue_task_fair+0x166/0x4e0
[   13.215066]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.215084]  ? __pfx_mempool_kfree+0x10/0x10
[   13.215105]  ? __pfx_read_tsc+0x10/0x10
[   13.215141]  ? ktime_get_ts64+0x86/0x230
[   13.215166]  kunit_try_run_case+0x1a5/0x480
[   13.215188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.215210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.215233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.215256]  ? __kthread_parkme+0x82/0x180
[   13.215278]  ? preempt_count_sub+0x50/0x80
[   13.215302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.215334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.215356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.215396]  kthread+0x337/0x6f0
[   13.215418]  ? trace_preempt_on+0x20/0xc0
[   13.215440]  ? __pfx_kthread+0x10/0x10
[   13.215461]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.215483]  ? calculate_sigpending+0x7b/0xa0
[   13.215504]  ? __pfx_kthread+0x10/0x10
[   13.215526]  ret_from_fork+0x41/0x80
[   13.215546]  ? __pfx_kthread+0x10/0x10
[   13.215568]  ret_from_fork_asm+0x1a/0x30
[   13.215599]  </TASK>
[   13.215610] 
[   13.225284] Allocated by task 261:
[   13.225584]  kasan_save_stack+0x45/0x70
[   13.225736]  kasan_save_track+0x18/0x40
[   13.225878]  kasan_save_alloc_info+0x3b/0x50
[   13.226022]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.226307]  remove_element+0x11e/0x190
[   13.226720]  mempool_alloc_preallocated+0x4d/0x90
[   13.227128]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   13.227823]  mempool_kmalloc_invalid_free+0xed/0x140
[   13.228264]  kunit_try_run_case+0x1a5/0x480
[   13.228745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.229245]  kthread+0x337/0x6f0
[   13.229625]  ret_from_fork+0x41/0x80
[   13.229872]  ret_from_fork_asm+0x1a/0x30
[   13.230011] 
[   13.230083] The buggy address belongs to the object at ffff888102756400
[   13.230083]  which belongs to the cache kmalloc-128 of size 128
[   13.231255] The buggy address is located 1 bytes inside of
[   13.231255]  128-byte region [ffff888102756400, ffff888102756480)
[   13.231884] 
[   13.231959] The buggy address belongs to the physical page:
[   13.232189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102756
[   13.233056] flags: 0x200000000000000(node=0|zone=2)
[   13.233609] page_type: f5(slab)
[   13.233932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.234668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.234942] page dumped because: kasan: bad access detected
[   13.235133] 
[   13.235293] Memory state around the buggy address:
[   13.235807]  ffff888102756300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.236470]  ffff888102756380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.237000] >ffff888102756400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.237684]                    ^
[   13.238007]  ffff888102756480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.238346]  ffff888102756500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.238586] ==================================================================
[   13.242498] ==================================================================
[   13.243234] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.244191] Free of addr ffff888103af0001 by task kunit_try_catch/263
[   13.244626] 
[   13.244805] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.244854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.244866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.244888] Call Trace:
[   13.244901]  <TASK>
[   13.244915]  dump_stack_lvl+0x73/0xb0
[   13.244942]  print_report+0xd1/0x650
[   13.244964]  ? __virt_addr_valid+0x1db/0x2d0
[   13.244986]  ? kasan_addr_to_slab+0x11/0xa0
[   13.245006]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.245032]  kasan_report_invalid_free+0x10a/0x130
[   13.245057]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.245086]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.245110]  __kasan_mempool_poison_object+0x102/0x1d0
[   13.245152]  mempool_free+0x2ec/0x380
[   13.245176]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.245202]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   13.245226]  ? update_load_avg+0x1be/0x21b0
[   13.245251]  ? finish_task_switch.isra.0+0x153/0x700
[   13.245278]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   13.245303]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   13.245340]  ? dequeue_task_fair+0x166/0x4e0
[   13.245363]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.245382]  ? __pfx_mempool_kfree+0x10/0x10
[   13.245450]  ? __pfx_read_tsc+0x10/0x10
[   13.245468]  ? ktime_get_ts64+0x86/0x230
[   13.245494]  kunit_try_run_case+0x1a5/0x480
[   13.245517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.245539]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.245562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.245586]  ? __kthread_parkme+0x82/0x180
[   13.245608]  ? preempt_count_sub+0x50/0x80
[   13.245632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.245655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.245677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.245700]  kthread+0x337/0x6f0
[   13.245720]  ? trace_preempt_on+0x20/0xc0
[   13.245743]  ? __pfx_kthread+0x10/0x10
[   13.245765]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.245792]  ? calculate_sigpending+0x7b/0xa0
[   13.245812]  ? __pfx_kthread+0x10/0x10
[   13.245835]  ret_from_fork+0x41/0x80
[   13.245855]  ? __pfx_kthread+0x10/0x10
[   13.245876]  ret_from_fork_asm+0x1a/0x30
[   13.245907]  </TASK>
[   13.245917] 
[   13.260731] The buggy address belongs to the physical page:
[   13.261250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103af0
[   13.261846] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.262075] flags: 0x200000000000040(head|node=0|zone=2)
[   13.262310] page_type: f8(unknown)
[   13.262449] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.262932] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.263255] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.263800] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.264122] head: 0200000000000002 ffffea00040ebc01 00000000ffffffff 00000000ffffffff
[   13.264573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.264890] page dumped because: kasan: bad access detected
[   13.265100] 
[   13.265238] Memory state around the buggy address:
[   13.265537]  ffff888103aeff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.265842]  ffff888103aeff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.266115] >ffff888103af0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.266371]                    ^
[   13.266581]  ffff888103af0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.266855]  ffff888103af0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.267126] ==================================================================

[   23.292942] ==================================================================
[   23.294088] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.294860] Free of addr ffff00001019f501 by task kunit_try_catch/295
[   23.295460] 
[   23.295627] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.295678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.295694] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.295713] Call trace:
[   23.295726]  show_stack+0x20/0x38 (C)
[   23.295758]  dump_stack_lvl+0x8c/0xd0
[   23.295791]  print_report+0x118/0x608
[   23.295821]  kasan_report_invalid_free+0xc0/0xe8
[   23.295853]  check_slab_allocation+0xfc/0x108
[   23.295884]  __kasan_mempool_poison_object+0x78/0x150
[   23.295917]  mempool_free+0x28c/0x328
[   23.295954]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.295994]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.296030]  kunit_try_run_case+0x170/0x3f0
[   23.296066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.296107]  kthread+0x328/0x630
[   23.296142]  ret_from_fork+0x10/0x20
[   23.296176] 
[   23.303155] Allocated by task 295:
[   23.303483]  kasan_save_stack+0x3c/0x68
[   23.303859]  kasan_save_track+0x20/0x40
[   23.304231]  kasan_save_alloc_info+0x40/0x58
[   23.304646]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.305152]  remove_element+0x130/0x1f8
[   23.305530]  mempool_alloc_preallocated+0x58/0xc0
[   23.305985]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   23.306520]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.306999]  kunit_try_run_case+0x170/0x3f0
[   23.307406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.307932]  kthread+0x328/0x630
[   23.308256]  ret_from_fork+0x10/0x20
[   23.308607] 
[   23.308762] The buggy address belongs to the object at ffff00001019f500
[   23.308762]  which belongs to the cache kmalloc-128 of size 128
[   23.309898] The buggy address is located 1 bytes inside of
[   23.309898]  128-byte region [ffff00001019f500, ffff00001019f580)
[   23.310950] 
[   23.311105] The buggy address belongs to the physical page:
[   23.311624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f
[   23.312356] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.312969] page_type: f5(slab)
[   23.313285] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.314002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.314712] page dumped because: kasan: bad access detected
[   23.315225] 
[   23.315380] Memory state around the buggy address:
[   23.315829]  ffff00001019f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.316497]  ffff00001019f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.317164] >ffff00001019f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.317827]                    ^
[   23.318140]  ffff00001019f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.318808]  ffff00001019f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.319470] ==================================================================
[   23.323176] ==================================================================
[   23.324345] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.325107] Free of addr ffff00000dc7c001 by task kunit_try_catch/297
[   23.325706] 
[   23.325875] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.325929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.325945] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.325963] Call trace:
[   23.325976]  show_stack+0x20/0x38 (C)
[   23.326011]  dump_stack_lvl+0x8c/0xd0
[   23.326044]  print_report+0x118/0x608
[   23.326075]  kasan_report_invalid_free+0xc0/0xe8
[   23.326108]  __kasan_mempool_poison_object+0xfc/0x150
[   23.326142]  mempool_free+0x28c/0x328
[   23.326179]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.326219]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   23.326258]  kunit_try_run_case+0x170/0x3f0
[   23.326295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.326336]  kthread+0x328/0x630
[   23.326371]  ret_from_fork+0x10/0x20
[   23.326405] 
[   23.333043] The buggy address belongs to the physical page:
[   23.333561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc7c
[   23.334288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.334996] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   23.335649] page_type: f8(unknown)
[   23.335985] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.336702] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.337419] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.338144] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.338869] head: 03fffe0000000002 fffffdffc0371f01 00000000ffffffff 00000000ffffffff
[   23.339593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.340310] page dumped because: kasan: bad access detected
[   23.340825] 
[   23.340980] Memory state around the buggy address:
[   23.341429]  ffff00000dc7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.342096]  ffff00000dc7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.342764] >ffff00000dc7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.343427]                    ^
[   23.343739]  ffff00000dc7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.344406]  ffff00000dc7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.345069] ==================================================================