Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.391192] ==================================================================
[   17.391370] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.391611] Free of addr fff00000c776c000 by task kunit_try_catch/240
[   17.391825] 
[   17.391997] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.392078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.392105] Hardware name: linux,dummy-virt (DT)
[   17.392144] Call trace:
[   17.392264]  show_stack+0x20/0x38 (C)
[   17.392367]  dump_stack_lvl+0x8c/0xd0
[   17.392486]  print_report+0x118/0x5d0
[   17.392544]  kasan_report_invalid_free+0xc0/0xe8
[   17.392594]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.392644]  mempool_free+0x24c/0x328
[   17.392733]  mempool_double_free_helper+0x150/0x2e8
[   17.392785]  mempool_page_alloc_double_free+0xbc/0x118
[   17.393156]  kunit_try_run_case+0x170/0x3f0
[   17.393415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.393505]  kthread+0x328/0x630
[   17.393810]  ret_from_fork+0x10/0x20
[   17.393876] 
[   17.393920] The buggy address belongs to the physical page:
[   17.394073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776c
[   17.394126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.394188] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.394276] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.394527] page dumped because: kasan: bad access detected
[   17.394572] 
[   17.394620] Memory state around the buggy address:
[   17.394652]  fff00000c776bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.394696]  fff00000c776bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.394739] >fff00000c776c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.394778]                    ^
[   17.394805]  fff00000c776c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.395153]  fff00000c776c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.395248] ==================================================================
[   17.378051] ==================================================================
[   17.378132] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.378184] Free of addr fff00000c776c000 by task kunit_try_catch/238
[   17.378720] 
[   17.378758] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.378879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.378918] Hardware name: linux,dummy-virt (DT)
[   17.378949] Call trace:
[   17.378970]  show_stack+0x20/0x38 (C)
[   17.379023]  dump_stack_lvl+0x8c/0xd0
[   17.379070]  print_report+0x118/0x5d0
[   17.379119]  kasan_report_invalid_free+0xc0/0xe8
[   17.379213]  __kasan_mempool_poison_object+0x14c/0x150
[   17.379478]  mempool_free+0x28c/0x328
[   17.379542]  mempool_double_free_helper+0x150/0x2e8
[   17.379592]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.379866]  kunit_try_run_case+0x170/0x3f0
[   17.379921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.379978]  kthread+0x328/0x630
[   17.380021]  ret_from_fork+0x10/0x20
[   17.380091] 
[   17.380205] The buggy address belongs to the physical page:
[   17.380378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776c
[   17.380640] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.380785] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.380841] page_type: f8(unknown)
[   17.380880] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.380932] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.380981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.381064] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.381269] head: 0bfffe0000000002 ffffc1ffc31ddb01 00000000ffffffff 00000000ffffffff
[   17.381325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.381390] page dumped because: kasan: bad access detected
[   17.381420] 
[   17.381440] Memory state around the buggy address:
[   17.381470]  fff00000c776bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.381635]  fff00000c776bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.381680] >fff00000c776c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.381923]                    ^
[   17.381953]  fff00000c776c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.382085]  fff00000c776c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.382157] ==================================================================
[   17.364765] ==================================================================
[   17.364825] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.364876] Free of addr fff00000c6e65c00 by task kunit_try_catch/236
[   17.364918] 
[   17.364949] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.365029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.365055] Hardware name: linux,dummy-virt (DT)
[   17.365104] Call trace:
[   17.365127]  show_stack+0x20/0x38 (C)
[   17.365176]  dump_stack_lvl+0x8c/0xd0
[   17.365312]  print_report+0x118/0x5d0
[   17.365625]  kasan_report_invalid_free+0xc0/0xe8
[   17.365722]  check_slab_allocation+0xd4/0x108
[   17.365773]  __kasan_mempool_poison_object+0x78/0x150
[   17.366149]  mempool_free+0x28c/0x328
[   17.366219]  mempool_double_free_helper+0x150/0x2e8
[   17.366269]  mempool_kmalloc_double_free+0xc0/0x118
[   17.366320]  kunit_try_run_case+0x170/0x3f0
[   17.366366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.366424]  kthread+0x328/0x630
[   17.366477]  ret_from_fork+0x10/0x20
[   17.366526] 
[   17.366555] Allocated by task 236:
[   17.366696]  kasan_save_stack+0x3c/0x68
[   17.366741]  kasan_save_track+0x20/0x40
[   17.366866]  kasan_save_alloc_info+0x40/0x58
[   17.367067]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.367123]  remove_element+0x130/0x1f8
[   17.367158]  mempool_alloc_preallocated+0x58/0xc0
[   17.367275]  mempool_double_free_helper+0x94/0x2e8
[   17.367314]  mempool_kmalloc_double_free+0xc0/0x118
[   17.367355]  kunit_try_run_case+0x170/0x3f0
[   17.367393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.367471]  kthread+0x328/0x630
[   17.367504]  ret_from_fork+0x10/0x20
[   17.367872] 
[   17.367896] Freed by task 236:
[   17.368198]  kasan_save_stack+0x3c/0x68
[   17.368242]  kasan_save_track+0x20/0x40
[   17.368280]  kasan_save_free_info+0x4c/0x78
[   17.368320]  __kasan_mempool_poison_object+0xc0/0x150
[   17.368364]  mempool_free+0x28c/0x328
[   17.368717]  mempool_double_free_helper+0x100/0x2e8
[   17.368775]  mempool_kmalloc_double_free+0xc0/0x118
[   17.368815]  kunit_try_run_case+0x170/0x3f0
[   17.368853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.368896]  kthread+0x328/0x630
[   17.368929]  ret_from_fork+0x10/0x20
[   17.368963] 
[   17.368984] The buggy address belongs to the object at fff00000c6e65c00
[   17.368984]  which belongs to the cache kmalloc-128 of size 128
[   17.369045] The buggy address is located 0 bytes inside of
[   17.369045]  128-byte region [fff00000c6e65c00, fff00000c6e65c80)
[   17.369106] 
[   17.369135] The buggy address belongs to the physical page:
[   17.369164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   17.369376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.369429] page_type: f5(slab)
[   17.369467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.369641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.369934] page dumped because: kasan: bad access detected
[   17.369965] 
[   17.369984] Memory state around the buggy address:
[   17.370015]  fff00000c6e65b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.370060]  fff00000c6e65b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.370133] >fff00000c6e65c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.370266]                    ^
[   17.370298]  fff00000c6e65c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.370463]  fff00000c6e65d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.370501] ==================================================================

[   13.659638] ==================================================================
[   13.660096] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.660516] Free of addr ffff8881027f9000 by task kunit_try_catch/253
[   13.660802] 
[   13.660960] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.661217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.661231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.661255] Call Trace:
[   13.661268]  <TASK>
[   13.661286]  dump_stack_lvl+0x73/0xb0
[   13.661320]  print_report+0xd1/0x610
[   13.661343]  ? __virt_addr_valid+0x1db/0x2d0
[   13.661367]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.661389]  ? mempool_double_free_helper+0x184/0x370
[   13.661414]  kasan_report_invalid_free+0x10a/0x130
[   13.661438]  ? mempool_double_free_helper+0x184/0x370
[   13.661464]  ? mempool_double_free_helper+0x184/0x370
[   13.661487]  ? mempool_double_free_helper+0x184/0x370
[   13.661523]  check_slab_allocation+0x101/0x130
[   13.661545]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.661570]  mempool_free+0x2ec/0x380
[   13.661596]  mempool_double_free_helper+0x184/0x370
[   13.661620]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.661644]  ? update_curr+0x5c1/0x810
[   13.661672]  mempool_kmalloc_double_free+0xed/0x140
[   13.661696]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.661720]  ? schedule+0x7c/0x2e0
[   13.661743]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.661764]  ? __pfx_mempool_kfree+0x10/0x10
[   13.661788]  ? __pfx_read_tsc+0x10/0x10
[   13.661809]  ? ktime_get_ts64+0x86/0x230
[   13.661833]  kunit_try_run_case+0x1a5/0x480
[   13.661858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.661880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.661904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.661927]  ? __kthread_parkme+0x82/0x180
[   13.661948]  ? preempt_count_sub+0x50/0x80
[   13.661970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.661994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.662016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.662040]  kthread+0x337/0x6f0
[   13.662070]  ? trace_preempt_on+0x20/0xc0
[   13.662093]  ? __pfx_kthread+0x10/0x10
[   13.662113]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.662135]  ? calculate_sigpending+0x7b/0xa0
[   13.662158]  ? __pfx_kthread+0x10/0x10
[   13.662179]  ret_from_fork+0x116/0x1d0
[   13.662202]  ? __pfx_kthread+0x10/0x10
[   13.662221]  ret_from_fork_asm+0x1a/0x30
[   13.662251]  </TASK>
[   13.662262] 
[   13.672752] Allocated by task 253:
[   13.672914]  kasan_save_stack+0x45/0x70
[   13.673150]  kasan_save_track+0x18/0x40
[   13.673877]  kasan_save_alloc_info+0x3b/0x50
[   13.674322]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.674613]  remove_element+0x11e/0x190
[   13.674797]  mempool_alloc_preallocated+0x4d/0x90
[   13.675005]  mempool_double_free_helper+0x8a/0x370
[   13.675522]  mempool_kmalloc_double_free+0xed/0x140
[   13.675741]  kunit_try_run_case+0x1a5/0x480
[   13.675937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.676810]  kthread+0x337/0x6f0
[   13.677128]  ret_from_fork+0x116/0x1d0
[   13.677327]  ret_from_fork_asm+0x1a/0x30
[   13.677518] 
[   13.677607] Freed by task 253:
[   13.677752]  kasan_save_stack+0x45/0x70
[   13.677923]  kasan_save_track+0x18/0x40
[   13.678623]  kasan_save_free_info+0x3f/0x60
[   13.679252]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.679576]  mempool_free+0x2ec/0x380
[   13.680010]  mempool_double_free_helper+0x109/0x370
[   13.680451]  mempool_kmalloc_double_free+0xed/0x140
[   13.680639]  kunit_try_run_case+0x1a5/0x480
[   13.680846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.681045]  kthread+0x337/0x6f0
[   13.681197]  ret_from_fork+0x116/0x1d0
[   13.681463]  ret_from_fork_asm+0x1a/0x30
[   13.681692] 
[   13.681789] The buggy address belongs to the object at ffff8881027f9000
[   13.681789]  which belongs to the cache kmalloc-128 of size 128
[   13.682338] The buggy address is located 0 bytes inside of
[   13.682338]  128-byte region [ffff8881027f9000, ffff8881027f9080)
[   13.682784] 
[   13.682875] The buggy address belongs to the physical page:
[   13.683078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027f9
[   13.683470] flags: 0x200000000000000(node=0|zone=2)
[   13.683722] page_type: f5(slab)
[   13.683845] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.684070] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.684742] page dumped because: kasan: bad access detected
[   13.684943] 
[   13.685035] Memory state around the buggy address:
[   13.685453]  ffff8881027f8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.685773]  ffff8881027f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.686066] >ffff8881027f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.686397]                    ^
[   13.686525]  ffff8881027f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.686822]  ffff8881027f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.687262] ==================================================================
[   13.717329] ==================================================================
[   13.717871] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.718172] Free of addr ffff888103960000 by task kunit_try_catch/257
[   13.718666] 
[   13.718791] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.718839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.718851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.718874] Call Trace:
[   13.718888]  <TASK>
[   13.718904]  dump_stack_lvl+0x73/0xb0
[   13.718936]  print_report+0xd1/0x610
[   13.718959]  ? __virt_addr_valid+0x1db/0x2d0
[   13.718983]  ? kasan_addr_to_slab+0x11/0xa0
[   13.719003]  ? mempool_double_free_helper+0x184/0x370
[   13.719028]  kasan_report_invalid_free+0x10a/0x130
[   13.719115]  ? mempool_double_free_helper+0x184/0x370
[   13.719144]  ? mempool_double_free_helper+0x184/0x370
[   13.719167]  __kasan_mempool_poison_pages+0x115/0x130
[   13.719192]  mempool_free+0x290/0x380
[   13.719220]  mempool_double_free_helper+0x184/0x370
[   13.719244]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.719283]  ? update_load_avg+0x1be/0x21b0
[   13.719309]  ? finish_task_switch.isra.0+0x153/0x700
[   13.719335]  mempool_page_alloc_double_free+0xe8/0x140
[   13.719361]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.719388]  ? __kasan_check_write+0x18/0x20
[   13.719408]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.719431]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.719457]  ? __pfx_read_tsc+0x10/0x10
[   13.719478]  ? ktime_get_ts64+0x86/0x230
[   13.719511]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.719538]  kunit_try_run_case+0x1a5/0x480
[   13.719565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.719590]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.719616]  ? __kthread_parkme+0x82/0x180
[   13.719638]  ? preempt_count_sub+0x50/0x80
[   13.719660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.719683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.719707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.719731]  kthread+0x337/0x6f0
[   13.719749]  ? trace_preempt_on+0x20/0xc0
[   13.719773]  ? __pfx_kthread+0x10/0x10
[   13.719793]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.719816]  ? calculate_sigpending+0x7b/0xa0
[   13.719840]  ? __pfx_kthread+0x10/0x10
[   13.719861]  ret_from_fork+0x116/0x1d0
[   13.719880]  ? __pfx_kthread+0x10/0x10
[   13.719899]  ret_from_fork_asm+0x1a/0x30
[   13.719931]  </TASK>
[   13.719942] 
[   13.728245] The buggy address belongs to the physical page:
[   13.728513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103960
[   13.728875] flags: 0x200000000000000(node=0|zone=2)
[   13.729124] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.729583] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.729834] page dumped because: kasan: bad access detected
[   13.730091] 
[   13.730516] Memory state around the buggy address:
[   13.730766]  ffff88810395ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.731512]  ffff88810395ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.731830] >ffff888103960000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.732247]                    ^
[   13.732414]  ffff888103960080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.732687]  ffff888103960100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.732941] ==================================================================
[   13.694243] ==================================================================
[   13.694741] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.695062] Free of addr ffff888103934000 by task kunit_try_catch/255
[   13.695363] 
[   13.695623] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.695676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.695688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.695711] Call Trace:
[   13.695725]  <TASK>
[   13.695742]  dump_stack_lvl+0x73/0xb0
[   13.695775]  print_report+0xd1/0x610
[   13.695796]  ? __virt_addr_valid+0x1db/0x2d0
[   13.695821]  ? kasan_addr_to_slab+0x11/0xa0
[   13.695842]  ? mempool_double_free_helper+0x184/0x370
[   13.695867]  kasan_report_invalid_free+0x10a/0x130
[   13.695891]  ? mempool_double_free_helper+0x184/0x370
[   13.695917]  ? mempool_double_free_helper+0x184/0x370
[   13.695943]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.695969]  mempool_free+0x2ec/0x380
[   13.695996]  mempool_double_free_helper+0x184/0x370
[   13.696021]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.696348]  ? update_curr+0x5c1/0x810
[   13.696382]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.696408]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.696433]  ? schedule+0x7c/0x2e0
[   13.696455]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.696478]  ? __pfx_mempool_kfree+0x10/0x10
[   13.696517]  ? __pfx_read_tsc+0x10/0x10
[   13.696538]  ? ktime_get_ts64+0x86/0x230
[   13.696563]  kunit_try_run_case+0x1a5/0x480
[   13.696588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.696610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.696634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.696658]  ? __kthread_parkme+0x82/0x180
[   13.696678]  ? preempt_count_sub+0x50/0x80
[   13.696702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.696725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.696748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.696771]  kthread+0x337/0x6f0
[   13.696789]  ? trace_preempt_on+0x20/0xc0
[   13.696813]  ? __pfx_kthread+0x10/0x10
[   13.696832]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.696853]  ? calculate_sigpending+0x7b/0xa0
[   13.696878]  ? __pfx_kthread+0x10/0x10
[   13.696898]  ret_from_fork+0x116/0x1d0
[   13.696917]  ? __pfx_kthread+0x10/0x10
[   13.696936]  ret_from_fork_asm+0x1a/0x30
[   13.696966]  </TASK>
[   13.696977] 
[   13.705430] The buggy address belongs to the physical page:
[   13.705715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103934
[   13.706078] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.706644] flags: 0x200000000000040(head|node=0|zone=2)
[   13.706873] page_type: f8(unknown)
[   13.707014] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.707675] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.707989] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.708286] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.708529] head: 0200000000000002 ffffea00040e4d01 00000000ffffffff 00000000ffffffff
[   13.708767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.709369] page dumped because: kasan: bad access detected
[   13.709628] 
[   13.709719] Memory state around the buggy address:
[   13.709938]  ffff888103933f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.710340]  ffff888103933f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.710572] >ffff888103934000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.710843]                    ^
[   13.711007]  ffff888103934080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.711748]  ffff888103934100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.712094] ==================================================================