Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.583806] ==================================================================
[   17.584014] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.584133] Free of addr fff00000c65ee300 by task kunit_try_catch/236
[   17.584203] 
[   17.584282] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.584364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.584635] Hardware name: linux,dummy-virt (DT)
[   17.584767] Call trace:
[   17.584816]  show_stack+0x20/0x38 (C)
[   17.584871]  dump_stack_lvl+0x8c/0xd0
[   17.585063]  print_report+0x118/0x5d0
[   17.585217]  kasan_report_invalid_free+0xc0/0xe8
[   17.585276]  check_slab_allocation+0xd4/0x108
[   17.585327]  __kasan_mempool_poison_object+0x78/0x150
[   17.585430]  mempool_free+0x28c/0x328
[   17.585488]  mempool_double_free_helper+0x150/0x2e8
[   17.585536]  mempool_kmalloc_double_free+0xc0/0x118
[   17.585771]  kunit_try_run_case+0x170/0x3f0
[   17.585829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.585880]  kthread+0x328/0x630
[   17.586244]  ret_from_fork+0x10/0x20
[   17.586298] 
[   17.586317] Allocated by task 236:
[   17.586354]  kasan_save_stack+0x3c/0x68
[   17.586410]  kasan_save_track+0x20/0x40
[   17.586445]  kasan_save_alloc_info+0x40/0x58
[   17.586755]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.586803]  remove_element+0x130/0x1f8
[   17.586840]  mempool_alloc_preallocated+0x58/0xc0
[   17.586878]  mempool_double_free_helper+0x94/0x2e8
[   17.586917]  mempool_kmalloc_double_free+0xc0/0x118
[   17.586969]  kunit_try_run_case+0x170/0x3f0
[   17.587020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.587326]  kthread+0x328/0x630
[   17.587785]  ret_from_fork+0x10/0x20
[   17.587832] 
[   17.587850] Freed by task 236:
[   17.587878]  kasan_save_stack+0x3c/0x68
[   17.587920]  kasan_save_track+0x20/0x40
[   17.587958]  kasan_save_free_info+0x4c/0x78
[   17.588342]  __kasan_mempool_poison_object+0xc0/0x150
[   17.588449]  mempool_free+0x28c/0x328
[   17.588485]  mempool_double_free_helper+0x100/0x2e8
[   17.588764]  mempool_kmalloc_double_free+0xc0/0x118
[   17.588814]  kunit_try_run_case+0x170/0x3f0
[   17.588867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.588919]  kthread+0x328/0x630
[   17.589018]  ret_from_fork+0x10/0x20
[   17.589052] 
[   17.589073] The buggy address belongs to the object at fff00000c65ee300
[   17.589073]  which belongs to the cache kmalloc-128 of size 128
[   17.589136] The buggy address is located 0 bytes inside of
[   17.589136]  128-byte region [fff00000c65ee300, fff00000c65ee380)
[   17.589333] 
[   17.589376] The buggy address belongs to the physical page:
[   17.589444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee
[   17.589555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.589657] page_type: f5(slab)
[   17.589735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.589786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.589839] page dumped because: kasan: bad access detected
[   17.589871] 
[   17.589940] Memory state around the buggy address:
[   17.590601]  fff00000c65ee200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.590659]  fff00000c65ee280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.590826] >fff00000c65ee300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.590906]                    ^
[   17.591103]  fff00000c65ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.591167]  fff00000c65ee400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.591304] ==================================================================
[   17.657668] ==================================================================
[   17.657729] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.660682] Free of addr fff00000c7974000 by task kunit_try_catch/240
[   17.660727] 
[   17.660886] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.661348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.661378] Hardware name: linux,dummy-virt (DT)
[   17.662155] Call trace:
[   17.662782]  show_stack+0x20/0x38 (C)
[   17.663500]  dump_stack_lvl+0x8c/0xd0
[   17.663672]  print_report+0x118/0x5d0
[   17.664115]  kasan_report_invalid_free+0xc0/0xe8
[   17.664531]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.665169]  mempool_free+0x24c/0x328
[   17.665539]  mempool_double_free_helper+0x150/0x2e8
[   17.665921]  mempool_page_alloc_double_free+0xbc/0x118
[   17.666285]  kunit_try_run_case+0x170/0x3f0
[   17.666340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.666398]  kthread+0x328/0x630
[   17.666443]  ret_from_fork+0x10/0x20
[   17.667728] 
[   17.667754] The buggy address belongs to the physical page:
[   17.668143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107974
[   17.668818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.669420] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.670010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.670554] page dumped because: kasan: bad access detected
[   17.671067] 
[   17.671312] Memory state around the buggy address:
[   17.671471]  fff00000c7973f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.672159]  fff00000c7973f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.673049] >fff00000c7974000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.673122]                    ^
[   17.673156]  fff00000c7974080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.673278]  fff00000c7974100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.673370] ==================================================================
[   17.614792] ==================================================================
[   17.614860] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.614920] Free of addr fff00000c7970000 by task kunit_try_catch/238
[   17.614963] 
[   17.615010] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.617273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.617810] Hardware name: linux,dummy-virt (DT)
[   17.617898] Call trace:
[   17.617922]  show_stack+0x20/0x38 (C)
[   17.619197]  dump_stack_lvl+0x8c/0xd0
[   17.619569]  print_report+0x118/0x5d0
[   17.620148]  kasan_report_invalid_free+0xc0/0xe8
[   17.620448]  __kasan_mempool_poison_object+0x14c/0x150
[   17.621243]  mempool_free+0x28c/0x328
[   17.621493]  mempool_double_free_helper+0x150/0x2e8
[   17.621708]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.622360]  kunit_try_run_case+0x170/0x3f0
[   17.622863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.622931]  kthread+0x328/0x630
[   17.622976]  ret_from_fork+0x10/0x20
[   17.623767] 
[   17.624015] The buggy address belongs to the physical page:
[   17.624366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107970
[   17.625015] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.625180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.625841] page_type: f8(unknown)
[   17.626227] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.626754] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.626815] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.626865] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.626915] head: 0bfffe0000000002 ffffc1ffc31e5c01 00000000ffffffff 00000000ffffffff
[   17.628085] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.628556] page dumped because: kasan: bad access detected
[   17.628600] 
[   17.628617] Memory state around the buggy address:
[   17.629271]  fff00000c796ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.630051]  fff00000c796ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.630266] >fff00000c7970000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.630394]                    ^
[   17.631068]  fff00000c7970080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.631294]  fff00000c7970100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.631348] ==================================================================

[   14.708903] ==================================================================
[   14.709462] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.709873] Free of addr ffff888102a04f00 by task kunit_try_catch/252
[   14.710119] 
[   14.710427] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.710478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.710490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.710512] Call Trace:
[   14.710523]  <TASK>
[   14.710539]  dump_stack_lvl+0x73/0xb0
[   14.710582]  print_report+0xd1/0x610
[   14.710606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.710631]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.710655]  ? mempool_double_free_helper+0x184/0x370
[   14.710681]  kasan_report_invalid_free+0x10a/0x130
[   14.710707]  ? mempool_double_free_helper+0x184/0x370
[   14.710734]  ? mempool_double_free_helper+0x184/0x370
[   14.710758]  ? mempool_double_free_helper+0x184/0x370
[   14.710783]  check_slab_allocation+0x101/0x130
[   14.710806]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.710832]  mempool_free+0x2ec/0x380
[   14.710860]  mempool_double_free_helper+0x184/0x370
[   14.710886]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.710912]  ? __pfx___resched_curr+0x10/0x10
[   14.710935]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.710958]  ? finish_task_switch.isra.0+0x153/0x700
[   14.710984]  mempool_kmalloc_double_free+0xed/0x140
[   14.711009]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.711038]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.711062]  ? __pfx_mempool_kfree+0x10/0x10
[   14.711087]  ? __pfx_read_tsc+0x10/0x10
[   14.711109]  ? ktime_get_ts64+0x86/0x230
[   14.711135]  kunit_try_run_case+0x1a5/0x480
[   14.711161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.711209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.711277]  ? __kthread_parkme+0x82/0x180
[   14.711299]  ? preempt_count_sub+0x50/0x80
[   14.711323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.711374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.711416]  kthread+0x337/0x6f0
[   14.711435]  ? trace_preempt_on+0x20/0xc0
[   14.711459]  ? __pfx_kthread+0x10/0x10
[   14.711480]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.711503]  ? calculate_sigpending+0x7b/0xa0
[   14.711528]  ? __pfx_kthread+0x10/0x10
[   14.711559]  ret_from_fork+0x116/0x1d0
[   14.711579]  ? __pfx_kthread+0x10/0x10
[   14.711600]  ret_from_fork_asm+0x1a/0x30
[   14.711632]  </TASK>
[   14.711642] 
[   14.720988] Allocated by task 252:
[   14.721123]  kasan_save_stack+0x45/0x70
[   14.721357]  kasan_save_track+0x18/0x40
[   14.721590]  kasan_save_alloc_info+0x3b/0x50
[   14.721814]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.722070]  remove_element+0x11e/0x190
[   14.722274]  mempool_alloc_preallocated+0x4d/0x90
[   14.722501]  mempool_double_free_helper+0x8a/0x370
[   14.722743]  mempool_kmalloc_double_free+0xed/0x140
[   14.722952]  kunit_try_run_case+0x1a5/0x480
[   14.723113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.723321]  kthread+0x337/0x6f0
[   14.723492]  ret_from_fork+0x116/0x1d0
[   14.723774]  ret_from_fork_asm+0x1a/0x30
[   14.723984] 
[   14.724087] Freed by task 252:
[   14.724216]  kasan_save_stack+0x45/0x70
[   14.724697]  kasan_save_track+0x18/0x40
[   14.724842]  kasan_save_free_info+0x3f/0x60
[   14.725020]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.725340]  mempool_free+0x2ec/0x380
[   14.725577]  mempool_double_free_helper+0x109/0x370
[   14.725774]  mempool_kmalloc_double_free+0xed/0x140
[   14.725998]  kunit_try_run_case+0x1a5/0x480
[   14.726191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.726484]  kthread+0x337/0x6f0
[   14.726654]  ret_from_fork+0x116/0x1d0
[   14.726848]  ret_from_fork_asm+0x1a/0x30
[   14.727042] 
[   14.727127] The buggy address belongs to the object at ffff888102a04f00
[   14.727127]  which belongs to the cache kmalloc-128 of size 128
[   14.727660] The buggy address is located 0 bytes inside of
[   14.727660]  128-byte region [ffff888102a04f00, ffff888102a04f80)
[   14.728009] 
[   14.728109] The buggy address belongs to the physical page:
[   14.728443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04
[   14.728810] flags: 0x200000000000000(node=0|zone=2)
[   14.729047] page_type: f5(slab)
[   14.729215] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.729678] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   14.729944] page dumped because: kasan: bad access detected
[   14.730201] 
[   14.730367] Memory state around the buggy address:
[   14.730637]  ffff888102a04e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.730960]  ffff888102a04e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.731267] >ffff888102a04f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.731543]                    ^
[   14.731717]  ffff888102a04f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.732005]  ffff888102a05000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.732255] ==================================================================
[   14.771632] ==================================================================
[   14.772065] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.772319] Free of addr ffff8881027e4000 by task kunit_try_catch/256
[   14.772520] 
[   14.772622] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.772666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.772678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.772698] Call Trace:
[   14.772711]  <TASK>
[   14.772726]  dump_stack_lvl+0x73/0xb0
[   14.772755]  print_report+0xd1/0x610
[   14.772776]  ? __virt_addr_valid+0x1db/0x2d0
[   14.772800]  ? kasan_addr_to_slab+0x11/0xa0
[   14.772820]  ? mempool_double_free_helper+0x184/0x370
[   14.772845]  kasan_report_invalid_free+0x10a/0x130
[   14.772920]  ? mempool_double_free_helper+0x184/0x370
[   14.772950]  ? mempool_double_free_helper+0x184/0x370
[   14.772975]  __kasan_mempool_poison_pages+0x115/0x130
[   14.773001]  mempool_free+0x290/0x380
[   14.773029]  mempool_double_free_helper+0x184/0x370
[   14.773055]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.773497]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.773526]  ? finish_task_switch.isra.0+0x153/0x700
[   14.773568]  mempool_page_alloc_double_free+0xe8/0x140
[   14.773597]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.773627]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.773653]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.773680]  ? __pfx_read_tsc+0x10/0x10
[   14.773701]  ? ktime_get_ts64+0x86/0x230
[   14.773726]  kunit_try_run_case+0x1a5/0x480
[   14.773753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.773777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.773802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.773826]  ? __kthread_parkme+0x82/0x180
[   14.773848]  ? preempt_count_sub+0x50/0x80
[   14.773871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.773896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.773922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.773948]  kthread+0x337/0x6f0
[   14.773968]  ? trace_preempt_on+0x20/0xc0
[   14.773992]  ? __pfx_kthread+0x10/0x10
[   14.774014]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.774036]  ? calculate_sigpending+0x7b/0xa0
[   14.774061]  ? __pfx_kthread+0x10/0x10
[   14.774082]  ret_from_fork+0x116/0x1d0
[   14.774101]  ? __pfx_kthread+0x10/0x10
[   14.774122]  ret_from_fork_asm+0x1a/0x30
[   14.774154]  </TASK>
[   14.774165] 
[   14.783508] The buggy address belongs to the physical page:
[   14.783786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   14.784148] flags: 0x200000000000000(node=0|zone=2)
[   14.784398] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.785008] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.785362] page dumped because: kasan: bad access detected
[   14.785721] 
[   14.785807] Memory state around the buggy address:
[   14.785972]  ffff8881027e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.786325]  ffff8881027e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.786661] >ffff8881027e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.786949]                    ^
[   14.787098]  ffff8881027e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.787473]  ffff8881027e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.787833] ==================================================================
[   14.739565] ==================================================================
[   14.740069] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.740604] Free of addr ffff8881039f8000 by task kunit_try_catch/254
[   14.741724] 
[   14.742081] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.742132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.742145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.742166] Call Trace:
[   14.742229]  <TASK>
[   14.742258]  dump_stack_lvl+0x73/0xb0
[   14.742437]  print_report+0xd1/0x610
[   14.742466]  ? __virt_addr_valid+0x1db/0x2d0
[   14.742492]  ? kasan_addr_to_slab+0x11/0xa0
[   14.742513]  ? mempool_double_free_helper+0x184/0x370
[   14.742539]  kasan_report_invalid_free+0x10a/0x130
[   14.742580]  ? mempool_double_free_helper+0x184/0x370
[   14.742608]  ? mempool_double_free_helper+0x184/0x370
[   14.742632]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.742658]  mempool_free+0x2ec/0x380
[   14.742684]  mempool_double_free_helper+0x184/0x370
[   14.742711]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.742738]  ? __kasan_check_write+0x18/0x20
[   14.742759]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.742782]  ? finish_task_switch.isra.0+0x153/0x700
[   14.742809]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.742835]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.742865]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.742889]  ? __pfx_mempool_kfree+0x10/0x10
[   14.742914]  ? __pfx_read_tsc+0x10/0x10
[   14.742936]  ? ktime_get_ts64+0x86/0x230
[   14.742960]  kunit_try_run_case+0x1a5/0x480
[   14.742985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.743009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.743034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.743059]  ? __kthread_parkme+0x82/0x180
[   14.743081]  ? preempt_count_sub+0x50/0x80
[   14.743105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.743130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.743155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.743181]  kthread+0x337/0x6f0
[   14.743201]  ? trace_preempt_on+0x20/0xc0
[   14.743224]  ? __pfx_kthread+0x10/0x10
[   14.743245]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.743268]  ? calculate_sigpending+0x7b/0xa0
[   14.743294]  ? __pfx_kthread+0x10/0x10
[   14.743315]  ret_from_fork+0x116/0x1d0
[   14.743334]  ? __pfx_kthread+0x10/0x10
[   14.743354]  ret_from_fork_asm+0x1a/0x30
[   14.743386]  </TASK>
[   14.743397] 
[   14.759250] The buggy address belongs to the physical page:
[   14.759648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f8
[   14.759962] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.760295] flags: 0x200000000000040(head|node=0|zone=2)
[   14.760571] page_type: f8(unknown)
[   14.760698] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.761446] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.762106] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.762625] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.763099] head: 0200000000000002 ffffea00040e7e01 00000000ffffffff 00000000ffffffff
[   14.763998] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.764716] page dumped because: kasan: bad access detected
[   14.764978] 
[   14.765069] Memory state around the buggy address:
[   14.765505]  ffff8881039f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.766135]  ffff8881039f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.766598] >ffff8881039f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.767051]                    ^
[   14.767206]  ffff8881039f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.767925]  ffff8881039f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.768481] ==================================================================