Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   19.194174] ==================================================================
[   19.194239] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.194297] Free of addr fff00000c69b6e01 by task kunit_try_catch/242
[   19.194338] 
[   19.194373] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.194454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.194481] Hardware name: linux,dummy-virt (DT)
[   19.194524] Call trace:
[   19.194548]  show_stack+0x20/0x38 (C)
[   19.194644]  dump_stack_lvl+0x8c/0xd0
[   19.194695]  print_report+0x118/0x608
[   19.195041]  kasan_report_invalid_free+0xc0/0xe8
[   19.195240]  check_slab_allocation+0xfc/0x108
[   19.195362]  __kasan_mempool_poison_object+0x78/0x150
[   19.195431]  mempool_free+0x28c/0x328
[   19.195477]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.195553]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.195679]  kunit_try_run_case+0x170/0x3f0
[   19.195739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.196199]  kthread+0x328/0x630
[   19.196251]  ret_from_fork+0x10/0x20
[   19.196300] 
[   19.196317] Allocated by task 242:
[   19.196365]  kasan_save_stack+0x3c/0x68
[   19.196422]  kasan_save_track+0x20/0x40
[   19.196460]  kasan_save_alloc_info+0x40/0x58
[   19.196498]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.196540]  remove_element+0x130/0x1f8
[   19.196576]  mempool_alloc_preallocated+0x58/0xc0
[   19.196613]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   19.196655]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.196694]  kunit_try_run_case+0x170/0x3f0
[   19.196730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.196773]  kthread+0x328/0x630
[   19.196804]  ret_from_fork+0x10/0x20
[   19.196838] 
[   19.196857] The buggy address belongs to the object at fff00000c69b6e00
[   19.196857]  which belongs to the cache kmalloc-128 of size 128
[   19.196917] The buggy address is located 1 bytes inside of
[   19.196917]  128-byte region [fff00000c69b6e00, fff00000c69b6e80)
[   19.196985] 
[   19.197005] The buggy address belongs to the physical page:
[   19.197036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   19.197091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.197140] page_type: f5(slab)
[   19.197178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.197228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.197269] page dumped because: kasan: bad access detected
[   19.197299] 
[   19.197316] Memory state around the buggy address:
[   19.197349]  fff00000c69b6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.197392]  fff00000c69b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197433] >fff00000c69b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.197472]                    ^
[   19.197497]  fff00000c69b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197538]  fff00000c69b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.197577] ==================================================================
[   19.206116] ==================================================================
[   19.206441] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.206660] Free of addr fff00000c7904001 by task kunit_try_catch/244
[   19.206706] 
[   19.206740] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.206821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.206849] Hardware name: linux,dummy-virt (DT)
[   19.207009] Call trace:
[   19.207036]  show_stack+0x20/0x38 (C)
[   19.207238]  dump_stack_lvl+0x8c/0xd0
[   19.207370]  print_report+0x118/0x608
[   19.207456]  kasan_report_invalid_free+0xc0/0xe8
[   19.207554]  __kasan_mempool_poison_object+0xfc/0x150
[   19.207638]  mempool_free+0x28c/0x328
[   19.207685]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.207742]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   19.207865]  kunit_try_run_case+0x170/0x3f0
[   19.208076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.208153]  kthread+0x328/0x630
[   19.208192]  ret_from_fork+0x10/0x20
[   19.208281] 
[   19.208336] The buggy address belongs to the physical page:
[   19.208431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.208585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.208634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.208690] page_type: f8(unknown)
[   19.209638] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.210177] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.210578] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.210883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.211015] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.211088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.211162] page dumped because: kasan: bad access detected
[   19.211228] 
[   19.211252] Memory state around the buggy address:
[   19.211289]  fff00000c7903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.211357]  fff00000c7903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.211401] >fff00000c7904000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211440]                    ^
[   19.211466]  fff00000c7904080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211640]  fff00000c7904100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211692] ==================================================================

[   18.815677] ==================================================================
[   18.815884] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.815996] Free of addr fff00000c7729e01 by task kunit_try_catch/242
[   18.816314] 
[   18.816358] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.816440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.816696] Hardware name: linux,dummy-virt (DT)
[   18.816792] Call trace:
[   18.816819]  show_stack+0x20/0x38 (C)
[   18.816872]  dump_stack_lvl+0x8c/0xd0
[   18.816933]  print_report+0x118/0x608
[   18.817490]  kasan_report_invalid_free+0xc0/0xe8
[   18.817575]  check_slab_allocation+0xfc/0x108
[   18.817624]  __kasan_mempool_poison_object+0x78/0x150
[   18.817676]  mempool_free+0x28c/0x328
[   18.817721]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.818068]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.818143]  kunit_try_run_case+0x170/0x3f0
[   18.818194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.818495]  kthread+0x328/0x630
[   18.818670]  ret_from_fork+0x10/0x20
[   18.818732] 
[   18.818750] Allocated by task 242:
[   18.819149]  kasan_save_stack+0x3c/0x68
[   18.819253]  kasan_save_track+0x20/0x40
[   18.819434]  kasan_save_alloc_info+0x40/0x58
[   18.819633]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.819705]  remove_element+0x130/0x1f8
[   18.819879]  mempool_alloc_preallocated+0x58/0xc0
[   18.820193]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.820329]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.820434]  kunit_try_run_case+0x170/0x3f0
[   18.820490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.820827]  kthread+0x328/0x630
[   18.821028]  ret_from_fork+0x10/0x20
[   18.821134] 
[   18.821473] The buggy address belongs to the object at fff00000c7729e00
[   18.821473]  which belongs to the cache kmalloc-128 of size 128
[   18.821552] The buggy address is located 1 bytes inside of
[   18.821552]  128-byte region [fff00000c7729e00, fff00000c7729e80)
[   18.821710] 
[   18.821750] The buggy address belongs to the physical page:
[   18.821811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107729
[   18.822215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.822360] page_type: f5(slab)
[   18.822425] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.822488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.822529] page dumped because: kasan: bad access detected
[   18.822881] 
[   18.822954] Memory state around the buggy address:
[   18.823049]  fff00000c7729d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.823143]  fff00000c7729d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.823223] >fff00000c7729e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.823262]                    ^
[   18.823440]  fff00000c7729e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.823628]  fff00000c7729f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.824013] ==================================================================
[   18.832683] ==================================================================
[   18.832808] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.832903] Free of addr fff00000c7858001 by task kunit_try_catch/244
[   18.833135] 
[   18.833276] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.833365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.833392] Hardware name: linux,dummy-virt (DT)
[   18.833458] Call trace:
[   18.833483]  show_stack+0x20/0x38 (C)
[   18.833536]  dump_stack_lvl+0x8c/0xd0
[   18.833694]  print_report+0x118/0x608
[   18.833746]  kasan_report_invalid_free+0xc0/0xe8
[   18.833844]  __kasan_mempool_poison_object+0xfc/0x150
[   18.833897]  mempool_free+0x28c/0x328
[   18.834330]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.834512]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.834683]  kunit_try_run_case+0x170/0x3f0
[   18.834907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.835124]  kthread+0x328/0x630
[   18.835301]  ret_from_fork+0x10/0x20
[   18.835515] 
[   18.835594] The buggy address belongs to the physical page:
[   18.835667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107858
[   18.835834] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.835893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.836281] page_type: f8(unknown)
[   18.836329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.836654] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.836748] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.836902] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.837112] head: 0bfffe0000000002 ffffc1ffc31e1601 00000000ffffffff 00000000ffffffff
[   18.837189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.837242] page dumped because: kasan: bad access detected
[   18.837462] 
[   18.837674] Memory state around the buggy address:
[   18.837754]  fff00000c7857f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.837908]  fff00000c7857f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.838015] >fff00000c7858000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.838169]                    ^
[   18.838200]  fff00000c7858080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.838454]  fff00000c7858100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.838566] ==================================================================

[   15.296876] ==================================================================
[   15.297400] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.298106] Free of addr ffff888103ad8001 by task kunit_try_catch/261
[   15.298471] 
[   15.298656] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.298726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.298746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.298776] Call Trace:
[   15.298798]  <TASK>
[   15.298824]  dump_stack_lvl+0x73/0xb0
[   15.298879]  print_report+0xd1/0x650
[   15.298921]  ? __virt_addr_valid+0x1db/0x2d0
[   15.298962]  ? kasan_addr_to_slab+0x11/0xa0
[   15.298998]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.299045]  kasan_report_invalid_free+0x10a/0x130
[   15.299083]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.299122]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.299156]  __kasan_mempool_poison_object+0x102/0x1d0
[   15.299194]  mempool_free+0x2ec/0x380
[   15.299240]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.299285]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.299331]  ? __kasan_check_write+0x18/0x20
[   15.299363]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.299399]  ? finish_task_switch.isra.0+0x153/0x700
[   15.299451]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   15.299488]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   15.299553]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.299608]  ? __pfx_mempool_kfree+0x10/0x10
[   15.299677]  ? __pfx_read_tsc+0x10/0x10
[   15.299735]  ? ktime_get_ts64+0x86/0x230
[   15.299797]  kunit_try_run_case+0x1a5/0x480
[   15.299862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.299908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.299970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.300033]  ? __kthread_parkme+0x82/0x180
[   15.300068]  ? preempt_count_sub+0x50/0x80
[   15.300111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.300142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.300164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.300185]  kthread+0x337/0x6f0
[   15.300203]  ? trace_preempt_on+0x20/0xc0
[   15.300226]  ? __pfx_kthread+0x10/0x10
[   15.300244]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.300263]  ? calculate_sigpending+0x7b/0xa0
[   15.300285]  ? __pfx_kthread+0x10/0x10
[   15.300304]  ret_from_fork+0x116/0x1d0
[   15.300321]  ? __pfx_kthread+0x10/0x10
[   15.300339]  ret_from_fork_asm+0x1a/0x30
[   15.300368]  </TASK>
[   15.300380] 
[   15.312473] The buggy address belongs to the physical page:
[   15.313001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad8
[   15.313705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.314255] flags: 0x200000000000040(head|node=0|zone=2)
[   15.314963] page_type: f8(unknown)
[   15.315262] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.315947] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.316605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.317182] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.317818] head: 0200000000000002 ffffea00040eb601 00000000ffffffff 00000000ffffffff
[   15.318275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.318875] page dumped because: kasan: bad access detected
[   15.319156] 
[   15.319317] Memory state around the buggy address:
[   15.319995]  ffff888103ad7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.320244]  ffff888103ad7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.320867] >ffff888103ad8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.321185]                    ^
[   15.321477]  ffff888103ad8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.322068]  ffff888103ad8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.322677] ==================================================================
[   15.258317] ==================================================================
[   15.259321] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.259946] Free of addr ffff888102abe201 by task kunit_try_catch/259
[   15.260456] 
[   15.260838] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.260933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.260953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.260986] Call Trace:
[   15.261008]  <TASK>
[   15.261032]  dump_stack_lvl+0x73/0xb0
[   15.261091]  print_report+0xd1/0x650
[   15.261149]  ? __virt_addr_valid+0x1db/0x2d0
[   15.261197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.261260]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.261305]  kasan_report_invalid_free+0x10a/0x130
[   15.261358]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.261405]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.261431]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.261453]  check_slab_allocation+0x11f/0x130
[   15.261474]  __kasan_mempool_poison_object+0x91/0x1d0
[   15.261498]  mempool_free+0x2ec/0x380
[   15.261648]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.261675]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.261701]  ? __kasan_check_write+0x18/0x20
[   15.261720]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.261740]  ? finish_task_switch.isra.0+0x153/0x700
[   15.261766]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.261788]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   15.261812]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.261832]  ? __pfx_mempool_kfree+0x10/0x10
[   15.261855]  ? __pfx_read_tsc+0x10/0x10
[   15.261875]  ? ktime_get_ts64+0x86/0x230
[   15.261899]  kunit_try_run_case+0x1a5/0x480
[   15.261933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.261954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.261977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.261998]  ? __kthread_parkme+0x82/0x180
[   15.262017]  ? preempt_count_sub+0x50/0x80
[   15.262039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.262081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.262104]  kthread+0x337/0x6f0
[   15.262129]  ? trace_preempt_on+0x20/0xc0
[   15.262152]  ? __pfx_kthread+0x10/0x10
[   15.262171]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.262190]  ? calculate_sigpending+0x7b/0xa0
[   15.262213]  ? __pfx_kthread+0x10/0x10
[   15.262232]  ret_from_fork+0x116/0x1d0
[   15.262249]  ? __pfx_kthread+0x10/0x10
[   15.262268]  ret_from_fork_asm+0x1a/0x30
[   15.262305]  </TASK>
[   15.262321] 
[   15.278177] Allocated by task 259:
[   15.278349]  kasan_save_stack+0x45/0x70
[   15.278541]  kasan_save_track+0x18/0x40
[   15.279118]  kasan_save_alloc_info+0x3b/0x50
[   15.279338]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.279565]  remove_element+0x11e/0x190
[   15.279750]  mempool_alloc_preallocated+0x4d/0x90
[   15.279963]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   15.280824]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.281437]  kunit_try_run_case+0x1a5/0x480
[   15.282088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.282321]  kthread+0x337/0x6f0
[   15.282891]  ret_from_fork+0x116/0x1d0
[   15.283095]  ret_from_fork_asm+0x1a/0x30
[   15.283295] 
[   15.283398] The buggy address belongs to the object at ffff888102abe200
[   15.283398]  which belongs to the cache kmalloc-128 of size 128
[   15.284681] The buggy address is located 1 bytes inside of
[   15.284681]  128-byte region [ffff888102abe200, ffff888102abe280)
[   15.285463] 
[   15.285884] The buggy address belongs to the physical page:
[   15.286255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102abe
[   15.286721] flags: 0x200000000000000(node=0|zone=2)
[   15.286880] page_type: f5(slab)
[   15.286964] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.287090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.287961] page dumped because: kasan: bad access detected
[   15.288192] 
[   15.288388] Memory state around the buggy address:
[   15.288780]  ffff888102abe100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.289133]  ffff888102abe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289843] >ffff888102abe200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.290216]                    ^
[   15.290360]  ffff888102abe280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.290797]  ffff888102abe300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.291230] ==================================================================

[   15.326673] ==================================================================
[   15.327305] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.327681] Free of addr ffff8881039f3501 by task kunit_try_catch/258
[   15.327999] 
[   15.328144] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.328189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.328201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.328223] Call Trace:
[   15.328235]  <TASK>
[   15.328250]  dump_stack_lvl+0x73/0xb0
[   15.328278]  print_report+0xd1/0x650
[   15.328302]  ? __virt_addr_valid+0x1db/0x2d0
[   15.328325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.328351]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.328379]  kasan_report_invalid_free+0x10a/0x130
[   15.328403]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.328431]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.328456]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.328479]  check_slab_allocation+0x11f/0x130
[   15.328502]  __kasan_mempool_poison_object+0x91/0x1d0
[   15.328527]  mempool_free+0x2ec/0x380
[   15.328555]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.328581]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.328611]  ? finish_task_switch.isra.0+0x153/0x700
[   15.328637]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.328661]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   15.328689]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.328711]  ? __pfx_mempool_kfree+0x10/0x10
[   15.328756]  ? __pfx_read_tsc+0x10/0x10
[   15.328777]  ? ktime_get_ts64+0x86/0x230
[   15.328802]  kunit_try_run_case+0x1a5/0x480
[   15.328827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.328850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.328874]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.328897]  ? __kthread_parkme+0x82/0x180
[   15.328917]  ? preempt_count_sub+0x50/0x80
[   15.328941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.328965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.329011]  kthread+0x337/0x6f0
[   15.329031]  ? trace_preempt_on+0x20/0xc0
[   15.329064]  ? __pfx_kthread+0x10/0x10
[   15.329085]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.329106]  ? calculate_sigpending+0x7b/0xa0
[   15.329131]  ? __pfx_kthread+0x10/0x10
[   15.329156]  ret_from_fork+0x116/0x1d0
[   15.329176]  ? __pfx_kthread+0x10/0x10
[   15.329197]  ret_from_fork_asm+0x1a/0x30
[   15.329229]  </TASK>
[   15.329240] 
[   15.338854] Allocated by task 258:
[   15.339014]  kasan_save_stack+0x45/0x70
[   15.339225]  kasan_save_track+0x18/0x40
[   15.339400]  kasan_save_alloc_info+0x3b/0x50
[   15.339603]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.339819]  remove_element+0x11e/0x190
[   15.340083]  mempool_alloc_preallocated+0x4d/0x90
[   15.340325]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   15.340627]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.340797]  kunit_try_run_case+0x1a5/0x480
[   15.340948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.341174]  kthread+0x337/0x6f0
[   15.341347]  ret_from_fork+0x116/0x1d0
[   15.341541]  ret_from_fork_asm+0x1a/0x30
[   15.341917] 
[   15.342021] The buggy address belongs to the object at ffff8881039f3500
[   15.342021]  which belongs to the cache kmalloc-128 of size 128
[   15.342528] The buggy address is located 1 bytes inside of
[   15.342528]  128-byte region [ffff8881039f3500, ffff8881039f3580)
[   15.343126] 
[   15.343228] The buggy address belongs to the physical page:
[   15.343411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f3
[   15.343702] flags: 0x200000000000000(node=0|zone=2)
[   15.344008] page_type: f5(slab)
[   15.344198] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.344556] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.345064] page dumped because: kasan: bad access detected
[   15.345246] 
[   15.345319] Memory state around the buggy address:
[   15.345480]  ffff8881039f3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.345856]  ffff8881039f3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.346191] >ffff8881039f3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.346515]                    ^
[   15.346685]  ffff8881039f3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.347068]  ffff8881039f3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.347300] ==================================================================
[   15.349547] ==================================================================
[   15.350486] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.350873] Free of addr ffff888102a10001 by task kunit_try_catch/260
[   15.351422] 
[   15.351547] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.351594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.351605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.351627] Call Trace:
[   15.351639]  <TASK>
[   15.351653]  dump_stack_lvl+0x73/0xb0
[   15.351683]  print_report+0xd1/0x650
[   15.351706]  ? __virt_addr_valid+0x1db/0x2d0
[   15.351729]  ? kasan_addr_to_slab+0x11/0xa0
[   15.351750]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.351776]  kasan_report_invalid_free+0x10a/0x130
[   15.351801]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.351829]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.351854]  __kasan_mempool_poison_object+0x102/0x1d0
[   15.351878]  mempool_free+0x2ec/0x380
[   15.351906]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.351931]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.351955]  ? update_load_avg+0x1be/0x21b0
[   15.351984]  ? finish_task_switch.isra.0+0x153/0x700
[   15.352010]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   15.352035]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   15.352077]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.352100]  ? __pfx_mempool_kfree+0x10/0x10
[   15.352126]  ? __pfx_read_tsc+0x10/0x10
[   15.352146]  ? ktime_get_ts64+0x86/0x230
[   15.352171]  kunit_try_run_case+0x1a5/0x480
[   15.352195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.352218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.352242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.352265]  ? __kthread_parkme+0x82/0x180
[   15.352285]  ? preempt_count_sub+0x50/0x80
[   15.352309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.352333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.352380]  kthread+0x337/0x6f0
[   15.352400]  ? trace_preempt_on+0x20/0xc0
[   15.352423]  ? __pfx_kthread+0x10/0x10
[   15.352445]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.352466]  ? calculate_sigpending+0x7b/0xa0
[   15.352490]  ? __pfx_kthread+0x10/0x10
[   15.352513]  ret_from_fork+0x116/0x1d0
[   15.352531]  ? __pfx_kthread+0x10/0x10
[   15.352552]  ret_from_fork_asm+0x1a/0x30
[   15.352583]  </TASK>
[   15.352595] 
[   15.361981] The buggy address belongs to the physical page:
[   15.362293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a10
[   15.362743] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.363204] flags: 0x200000000000040(head|node=0|zone=2)
[   15.363412] page_type: f8(unknown)
[   15.363552] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.363882] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.364306] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.365073] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.365414] head: 0200000000000002 ffffea00040a8401 00000000ffffffff 00000000ffffffff
[   15.365737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.366016] page dumped because: kasan: bad access detected
[   15.366480] 
[   15.366582] Memory state around the buggy address:
[   15.366771]  ffff888102a0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.367100]  ffff888102a0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.367445] >ffff888102a10000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.367903]                    ^
[   15.368082]  ffff888102a10080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.368395]  ffff888102a10100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.368684] ==================================================================

[   40.023043] ==================================================================
[   40.035072] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.043081] Free of addr ffff888104eb8001 by task kunit_try_catch/284
[   40.049527] 
[   40.051028] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   40.051037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   40.051040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.051044] Call Trace:
[   40.051046]  <TASK>
[   40.051048]  dump_stack_lvl+0x73/0xb0
[   40.051053]  print_report+0xd1/0x650
[   40.051057]  ? __virt_addr_valid+0x1db/0x2d0
[   40.051061]  ? kasan_addr_to_slab+0x11/0xa0
[   40.051064]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051070]  kasan_report_invalid_free+0x10a/0x130
[   40.051074]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051079]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051084]  __kasan_mempool_poison_object+0x102/0x1d0
[   40.051089]  mempool_free+0x2ec/0x380
[   40.051094]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051098]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   40.051104]  ? __pfx_sched_clock_cpu+0x10/0x10
[   40.051108]  ? finish_task_switch.isra.0+0x153/0x700
[   40.051112]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   40.051117]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   40.051122]  ? __pfx_mempool_kmalloc+0x10/0x10
[   40.051126]  ? __pfx_mempool_kfree+0x10/0x10
[   40.051131]  ? ktime_get_ts64+0x83/0x230
[   40.051136]  kunit_try_run_case+0x1a2/0x480
[   40.051140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.051144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.051149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.051153]  ? __kthread_parkme+0x82/0x180
[   40.051157]  ? preempt_count_sub+0x50/0x80
[   40.051161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.051165]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.051169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.051174]  kthread+0x334/0x6f0
[   40.051177]  ? trace_preempt_on+0x20/0xc0
[   40.051181]  ? __pfx_kthread+0x10/0x10
[   40.051185]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.051189]  ? calculate_sigpending+0x7b/0xa0
[   40.051193]  ? __pfx_kthread+0x10/0x10
[   40.051197]  ret_from_fork+0x113/0x1d0
[   40.051200]  ? __pfx_kthread+0x10/0x10
[   40.051204]  ret_from_fork_asm+0x1a/0x30
[   40.051210]  </TASK>
[   40.051212] 
[   40.253515] The buggy address belongs to the physical page:
[   40.259086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8
[   40.267085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.274739] flags: 0x200000000000040(head|node=0|zone=2)
[   40.280051] page_type: f8(unknown)
[   40.283458] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   40.291205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   40.298945] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   40.306772] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   40.314597] head: 0200000000000002 ffffea000413ae01 00000000ffffffff 00000000ffffffff
[   40.322424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.330256] page dumped because: kasan: bad access detected
[   40.335829] 
[   40.337330] Memory state around the buggy address:
[   40.342150]  ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   40.349378]  ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   40.356621] >ffff888104eb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.363839]                    ^
[   40.367075]  ffff888104eb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.374302]  ffff888104eb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.381519] ==================================================================
[   39.594219] ==================================================================
[   39.606404] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.614412] Free of addr ffff8881066f8f01 by task kunit_try_catch/282
[   39.620852] 
[   39.622365] CPU: 3 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   39.622374] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   39.622389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   39.622393] Call Trace:
[   39.622394]  <TASK>
[   39.622396]  dump_stack_lvl+0x73/0xb0
[   39.622401]  print_report+0xd1/0x650
[   39.622405]  ? __virt_addr_valid+0x1db/0x2d0
[   39.622409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   39.622414]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622419]  kasan_report_invalid_free+0x10a/0x130
[   39.622424]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622429]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622434]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622438]  check_slab_allocation+0x11f/0x130
[   39.622442]  __kasan_mempool_poison_object+0x91/0x1d0
[   39.622447]  mempool_free+0x2ec/0x380
[   39.622452]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622456]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   39.622462]  ? __kasan_check_write+0x18/0x20
[   39.622465]  ? __pfx_sched_clock_cpu+0x10/0x10
[   39.622469]  ? finish_task_switch.isra.0+0x153/0x700
[   39.622474]  mempool_kmalloc_invalid_free+0xed/0x140
[   39.622478]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   39.622483]  ? __pfx_mempool_kmalloc+0x10/0x10
[   39.622487]  ? __pfx_mempool_kfree+0x10/0x10
[   39.622492]  ? ktime_get_ts64+0x83/0x230
[   39.622496]  kunit_try_run_case+0x1a2/0x480
[   39.622501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.622505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   39.622509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   39.622513]  ? __kthread_parkme+0x82/0x180
[   39.622517]  ? preempt_count_sub+0x50/0x80
[   39.622521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.622526]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.622530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   39.622534]  kthread+0x334/0x6f0
[   39.622538]  ? trace_preempt_on+0x20/0xc0
[   39.622542]  ? __pfx_kthread+0x10/0x10
[   39.622545]  ? _raw_spin_unlock_irq+0x47/0x80
[   39.622549]  ? calculate_sigpending+0x7b/0xa0
[   39.622554]  ? __pfx_kthread+0x10/0x10
[   39.622558]  ret_from_fork+0x113/0x1d0
[   39.622561]  ? __pfx_kthread+0x10/0x10
[   39.622565]  ret_from_fork_asm+0x1a/0x30
[   39.622570]  </TASK>
[   39.622572] 
[   39.839578] Allocated by task 282:
[   39.842986]  kasan_save_stack+0x45/0x70
[   39.846831]  kasan_save_track+0x18/0x40
[   39.850672]  kasan_save_alloc_info+0x3b/0x50
[   39.854945]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   39.860259]  remove_element+0x11e/0x190
[   39.864106]  mempool_alloc_preallocated+0x4d/0x90
[   39.868812]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   39.874405]  mempool_kmalloc_invalid_free+0xed/0x140
[   39.879387]  kunit_try_run_case+0x1a2/0x480
[   39.883578]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.888979]  kthread+0x334/0x6f0
[   39.892210]  ret_from_fork+0x113/0x1d0
[   39.895963]  ret_from_fork_asm+0x1a/0x30
[   39.899889] 
[   39.901409] The buggy address belongs to the object at ffff8881066f8f00
[   39.901409]  which belongs to the cache kmalloc-128 of size 128
[   39.913923] The buggy address is located 1 bytes inside of
[   39.913923]  128-byte region [ffff8881066f8f00, ffff8881066f8f80)
[   39.925492] 
[   39.926991] The buggy address belongs to the physical page:
[   39.932563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   39.940570] flags: 0x200000000000000(node=0|zone=2)
[   39.945451] page_type: f5(slab)
[   39.948599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   39.956370] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   39.964134] page dumped because: kasan: bad access detected
[   39.969708] 
[   39.971207] Memory state around the buggy address:
[   39.976000]  ffff8881066f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.983221]  ffff8881066f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.990438] >ffff8881066f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.997658]                    ^
[   40.000890]  ffff8881066f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.008111]  ffff8881066f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   40.015347] ==================================================================