Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.078589] ==================================================================
[   22.078728] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.078852] Free of addr fff00000c79b8000 by task kunit_try_catch/240
[   22.078951] 
[   22.079021] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.079207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.079272] Hardware name: linux,dummy-virt (DT)
[   22.079346] Call trace:
[   22.079397]  show_stack+0x20/0x38 (C)
[   22.079506]  dump_stack_lvl+0x8c/0xd0
[   22.079617]  print_report+0x118/0x608
[   22.079726]  kasan_report_invalid_free+0xc0/0xe8
[   22.080715]  __kasan_mempool_poison_pages+0xe0/0xe8
[   22.080875]  mempool_free+0x24c/0x328
[   22.080976]  mempool_double_free_helper+0x150/0x2e8
[   22.081088]  mempool_page_alloc_double_free+0xbc/0x118
[   22.081240]  kunit_try_run_case+0x170/0x3f0
[   22.081599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.081707]  kthread+0x328/0x630
[   22.081813]  ret_from_fork+0x10/0x20
[   22.081920] 
[   22.081962] The buggy address belongs to the physical page:
[   22.082023] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   22.082347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.082532] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.082690] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.082799] page dumped because: kasan: bad access detected
[   22.082900] 
[   22.082951] Memory state around the buggy address:
[   22.083028]  fff00000c79b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.083318]  fff00000c79b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.083468] >fff00000c79b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.083584]                    ^
[   22.083673]  fff00000c79b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.083805]  fff00000c79b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.083941] ==================================================================
[   22.016391] ==================================================================
[   22.016526] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.016647] Free of addr fff00000c5942100 by task kunit_try_catch/236
[   22.016741] 
[   22.016813] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.019359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.020056] Hardware name: linux,dummy-virt (DT)
[   22.020528] Call trace:
[   22.020779]  show_stack+0x20/0x38 (C)
[   22.021431]  dump_stack_lvl+0x8c/0xd0
[   22.021948]  print_report+0x118/0x608
[   22.022178]  kasan_report_invalid_free+0xc0/0xe8
[   22.022891]  check_slab_allocation+0xd4/0x108
[   22.023145]  __kasan_mempool_poison_object+0x78/0x150
[   22.023394]  mempool_free+0x28c/0x328
[   22.024013]  mempool_double_free_helper+0x150/0x2e8
[   22.024711]  mempool_kmalloc_double_free+0xc0/0x118
[   22.025356]  kunit_try_run_case+0x170/0x3f0
[   22.025535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.025645]  kthread+0x328/0x630
[   22.025738]  ret_from_fork+0x10/0x20
[   22.026724] 
[   22.026773] Allocated by task 236:
[   22.027389]  kasan_save_stack+0x3c/0x68
[   22.027512]  kasan_save_track+0x20/0x40
[   22.027609]  kasan_save_alloc_info+0x40/0x58
[   22.027703]  __kasan_mempool_unpoison_object+0x11c/0x180
[   22.027803]  remove_element+0x130/0x1f8
[   22.029469]  mempool_alloc_preallocated+0x58/0xc0
[   22.029570]  mempool_double_free_helper+0x94/0x2e8
[   22.030150]  mempool_kmalloc_double_free+0xc0/0x118
[   22.030466]  kunit_try_run_case+0x170/0x3f0
[   22.030640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030764]  kthread+0x328/0x630
[   22.030854]  ret_from_fork+0x10/0x20
[   22.030945] 
[   22.030991] Freed by task 236:
[   22.031412]  kasan_save_stack+0x3c/0x68
[   22.031667]  kasan_save_track+0x20/0x40
[   22.032310]  kasan_save_free_info+0x4c/0x78
[   22.032480]  __kasan_mempool_poison_object+0xc0/0x150
[   22.033258]  mempool_free+0x28c/0x328
[   22.033849]  mempool_double_free_helper+0x100/0x2e8
[   22.034028]  mempool_kmalloc_double_free+0xc0/0x118
[   22.034247]  kunit_try_run_case+0x170/0x3f0
[   22.034341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034440]  kthread+0x328/0x630
[   22.034509]  ret_from_fork+0x10/0x20
[   22.034604] 
[   22.034649] The buggy address belongs to the object at fff00000c5942100
[   22.034649]  which belongs to the cache kmalloc-128 of size 128
[   22.034793] The buggy address is located 0 bytes inside of
[   22.034793]  128-byte region [fff00000c5942100, fff00000c5942180)
[   22.036912] 
[   22.037190] The buggy address belongs to the physical page:
[   22.037274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   22.037408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.037525] page_type: f5(slab)
[   22.037615] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.037727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.037785] page dumped because: kasan: bad access detected
[   22.037833] 
[   22.037908] Memory state around the buggy address:
[   22.037994]  fff00000c5942000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.038093]  fff00000c5942080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.038172] >fff00000c5942100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.038649]                    ^
[   22.038796]  fff00000c5942180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.038929]  fff00000c5942200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.039024] ==================================================================
[   22.051529] ==================================================================
[   22.051661] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.051781] Free of addr fff00000c79b8000 by task kunit_try_catch/238
[   22.052484] 
[   22.052596] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.052935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.053006] Hardware name: linux,dummy-virt (DT)
[   22.053078] Call trace:
[   22.053129]  show_stack+0x20/0x38 (C)
[   22.053247]  dump_stack_lvl+0x8c/0xd0
[   22.053580]  print_report+0x118/0x608
[   22.053722]  kasan_report_invalid_free+0xc0/0xe8
[   22.053857]  __kasan_mempool_poison_object+0x14c/0x150
[   22.053986]  mempool_free+0x28c/0x328
[   22.054092]  mempool_double_free_helper+0x150/0x2e8
[   22.054210]  mempool_kmalloc_large_double_free+0xc0/0x118
[   22.054334]  kunit_try_run_case+0x170/0x3f0
[   22.054446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.054818]  kthread+0x328/0x630
[   22.054918]  ret_from_fork+0x10/0x20
[   22.054975] 
[   22.055000] The buggy address belongs to the physical page:
[   22.055037] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   22.055105] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.055158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.055220] page_type: f8(unknown)
[   22.055268] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.055327] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.055382] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.055435] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.055489] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   22.055542] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.055585] page dumped because: kasan: bad access detected
[   22.055620] 
[   22.055640] Memory state around the buggy address:
[   22.055677]  fff00000c79b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.055727]  fff00000c79b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.055774] >fff00000c79b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.055815]                    ^
[   22.055891]  fff00000c79b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.055977]  fff00000c79b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.056065] ==================================================================

[   14.269244] ==================================================================
[   14.270479] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.271204] Free of addr ffff888102655c00 by task kunit_try_catch/253
[   14.272080] 
[   14.272338] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.272384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.272396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.272417] Call Trace:
[   14.272430]  <TASK>
[   14.272450]  dump_stack_lvl+0x73/0xb0
[   14.272483]  print_report+0xd1/0x650
[   14.272507]  ? __virt_addr_valid+0x1db/0x2d0
[   14.272533]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.272557]  ? mempool_double_free_helper+0x184/0x370
[   14.272583]  kasan_report_invalid_free+0x10a/0x130
[   14.272609]  ? mempool_double_free_helper+0x184/0x370
[   14.272636]  ? mempool_double_free_helper+0x184/0x370
[   14.272672]  ? mempool_double_free_helper+0x184/0x370
[   14.272697]  check_slab_allocation+0x101/0x130
[   14.272721]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.272812]  mempool_free+0x2ec/0x380
[   14.272842]  mempool_double_free_helper+0x184/0x370
[   14.272867]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.272892]  ? update_load_avg+0x1be/0x21b0
[   14.272922]  ? finish_task_switch.isra.0+0x153/0x700
[   14.272950]  mempool_kmalloc_double_free+0xed/0x140
[   14.272975]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.273004]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.273027]  ? __pfx_mempool_kfree+0x10/0x10
[   14.273053]  ? __pfx_read_tsc+0x10/0x10
[   14.273076]  ? ktime_get_ts64+0x86/0x230
[   14.273102]  kunit_try_run_case+0x1a5/0x480
[   14.273129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.273152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.273178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.273203]  ? __kthread_parkme+0x82/0x180
[   14.273225]  ? preempt_count_sub+0x50/0x80
[   14.273249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.273277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.273303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.273331]  kthread+0x337/0x6f0
[   14.273350]  ? trace_preempt_on+0x20/0xc0
[   14.273374]  ? __pfx_kthread+0x10/0x10
[   14.273395]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.273418]  ? calculate_sigpending+0x7b/0xa0
[   14.273443]  ? __pfx_kthread+0x10/0x10
[   14.273466]  ret_from_fork+0x116/0x1d0
[   14.273485]  ? __pfx_kthread+0x10/0x10
[   14.273506]  ret_from_fork_asm+0x1a/0x30
[   14.273540]  </TASK>
[   14.273551] 
[   14.288896] Allocated by task 253:
[   14.289350]  kasan_save_stack+0x45/0x70
[   14.289783]  kasan_save_track+0x18/0x40
[   14.290165]  kasan_save_alloc_info+0x3b/0x50
[   14.290519]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.290710]  remove_element+0x11e/0x190
[   14.291237]  mempool_alloc_preallocated+0x4d/0x90
[   14.291535]  mempool_double_free_helper+0x8a/0x370
[   14.291880]  mempool_kmalloc_double_free+0xed/0x140
[   14.292119]  kunit_try_run_case+0x1a5/0x480
[   14.292268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.292445]  kthread+0x337/0x6f0
[   14.292565]  ret_from_fork+0x116/0x1d0
[   14.292812]  ret_from_fork_asm+0x1a/0x30
[   14.293186] 
[   14.293419] Freed by task 253:
[   14.293801]  kasan_save_stack+0x45/0x70
[   14.294176]  kasan_save_track+0x18/0x40
[   14.294540]  kasan_save_free_info+0x3f/0x60
[   14.294997]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.295543]  mempool_free+0x2ec/0x380
[   14.296935]  mempool_double_free_helper+0x109/0x370
[   14.297199]  mempool_kmalloc_double_free+0xed/0x140
[   14.297440]  kunit_try_run_case+0x1a5/0x480
[   14.297641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.297830]  kthread+0x337/0x6f0
[   14.297950]  ret_from_fork+0x116/0x1d0
[   14.298081]  ret_from_fork_asm+0x1a/0x30
[   14.298219] 
[   14.298292] The buggy address belongs to the object at ffff888102655c00
[   14.298292]  which belongs to the cache kmalloc-128 of size 128
[   14.298667] The buggy address is located 0 bytes inside of
[   14.298667]  128-byte region [ffff888102655c00, ffff888102655c80)
[   14.301284] 
[   14.301874] The buggy address belongs to the physical page:
[   14.302592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   14.303579] flags: 0x200000000000000(node=0|zone=2)
[   14.304384] page_type: f5(slab)
[   14.304592] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.305509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.306042] page dumped because: kasan: bad access detected
[   14.306224] 
[   14.306295] Memory state around the buggy address:
[   14.306458]  ffff888102655b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.306691]  ffff888102655b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.307280] >ffff888102655c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.308044]                    ^
[   14.308360]  ffff888102655c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.309154]  ffff888102655d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.309458] ==================================================================
[   14.338802] ==================================================================
[   14.340068] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.340488] Free of addr ffff888102bd0000 by task kunit_try_catch/257
[   14.340927] 
[   14.341049] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.341094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.341106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.341127] Call Trace:
[   14.341140]  <TASK>
[   14.341180]  dump_stack_lvl+0x73/0xb0
[   14.341213]  print_report+0xd1/0x650
[   14.341236]  ? __virt_addr_valid+0x1db/0x2d0
[   14.341280]  ? kasan_addr_to_slab+0x11/0xa0
[   14.341301]  ? mempool_double_free_helper+0x184/0x370
[   14.341326]  kasan_report_invalid_free+0x10a/0x130
[   14.341351]  ? mempool_double_free_helper+0x184/0x370
[   14.341378]  ? mempool_double_free_helper+0x184/0x370
[   14.341403]  __kasan_mempool_poison_pages+0x115/0x130
[   14.341428]  mempool_free+0x290/0x380
[   14.341456]  mempool_double_free_helper+0x184/0x370
[   14.341482]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.341509]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.341533]  ? finish_task_switch.isra.0+0x153/0x700
[   14.341559]  mempool_page_alloc_double_free+0xe8/0x140
[   14.341585]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.341615]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.341639]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.341683]  ? __pfx_read_tsc+0x10/0x10
[   14.341706]  ? ktime_get_ts64+0x86/0x230
[   14.341731]  kunit_try_run_case+0x1a5/0x480
[   14.341789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.341989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.342018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.342043]  ? __kthread_parkme+0x82/0x180
[   14.342065]  ? preempt_count_sub+0x50/0x80
[   14.342088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.342113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.342140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.342165]  kthread+0x337/0x6f0
[   14.342184]  ? trace_preempt_on+0x20/0xc0
[   14.342209]  ? __pfx_kthread+0x10/0x10
[   14.342230]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.342251]  ? calculate_sigpending+0x7b/0xa0
[   14.342276]  ? __pfx_kthread+0x10/0x10
[   14.342297]  ret_from_fork+0x116/0x1d0
[   14.342316]  ? __pfx_kthread+0x10/0x10
[   14.342336]  ret_from_fork_asm+0x1a/0x30
[   14.342374]  </TASK>
[   14.342385] 
[   14.352779] The buggy address belongs to the physical page:
[   14.353041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd0
[   14.353434] flags: 0x200000000000000(node=0|zone=2)
[   14.353679] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.354517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.355077] page dumped because: kasan: bad access detected
[   14.355318] 
[   14.355386] Memory state around the buggy address:
[   14.355609]  ffff888102bcff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.356018]  ffff888102bcff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.356324] >ffff888102bd0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.356649]                    ^
[   14.356920]  ffff888102bd0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.357298]  ffff888102bd0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.357771] ==================================================================
[   14.312603] ==================================================================
[   14.313862] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.314560] Free of addr ffff888103b74000 by task kunit_try_catch/255
[   14.315012] 
[   14.315106] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.315149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.315161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.315182] Call Trace:
[   14.315196]  <TASK>
[   14.315211]  dump_stack_lvl+0x73/0xb0
[   14.315241]  print_report+0xd1/0x650
[   14.315264]  ? __virt_addr_valid+0x1db/0x2d0
[   14.315288]  ? kasan_addr_to_slab+0x11/0xa0
[   14.315308]  ? mempool_double_free_helper+0x184/0x370
[   14.315334]  kasan_report_invalid_free+0x10a/0x130
[   14.315359]  ? mempool_double_free_helper+0x184/0x370
[   14.315386]  ? mempool_double_free_helper+0x184/0x370
[   14.315410]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.315435]  mempool_free+0x2ec/0x380
[   14.315462]  mempool_double_free_helper+0x184/0x370
[   14.315487]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.315515]  ? finish_task_switch.isra.0+0x153/0x700
[   14.315542]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.315567]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.315597]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.315620]  ? __pfx_mempool_kfree+0x10/0x10
[   14.315693]  ? __pfx_read_tsc+0x10/0x10
[   14.315717]  ? ktime_get_ts64+0x86/0x230
[   14.315776]  kunit_try_run_case+0x1a5/0x480
[   14.315802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.315825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.315884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.315907]  ? __kthread_parkme+0x82/0x180
[   14.315928]  ? preempt_count_sub+0x50/0x80
[   14.315952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.315977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.316001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.316026]  kthread+0x337/0x6f0
[   14.316045]  ? trace_preempt_on+0x20/0xc0
[   14.316069]  ? __pfx_kthread+0x10/0x10
[   14.316090]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.316112]  ? calculate_sigpending+0x7b/0xa0
[   14.316136]  ? __pfx_kthread+0x10/0x10
[   14.316158]  ret_from_fork+0x116/0x1d0
[   14.316176]  ? __pfx_kthread+0x10/0x10
[   14.316197]  ret_from_fork_asm+0x1a/0x30
[   14.316227]  </TASK>
[   14.316237] 
[   14.328476] The buggy address belongs to the physical page:
[   14.328663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b74
[   14.329269] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.329613] flags: 0x200000000000040(head|node=0|zone=2)
[   14.330002] page_type: f8(unknown)
[   14.330131] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.330521] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.330859] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.331203] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.331496] head: 0200000000000002 ffffea00040edd01 00000000ffffffff 00000000ffffffff
[   14.331981] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.332346] page dumped because: kasan: bad access detected
[   14.332546] 
[   14.332640] Memory state around the buggy address:
[   14.333051]  ffff888103b73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.333472]  ffff888103b73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.333938] >ffff888103b74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.334295]                    ^
[   14.334449]  ffff888103b74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.334926]  ffff888103b74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.335260] ==================================================================