Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   37.563087] ==================================================================
[   37.563277] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   37.563453] Free of addr fff00000c7804000 by task kunit_try_catch/241
[   37.563597] 
[   37.563733] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.564453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.564545] Hardware name: linux,dummy-virt (DT)
[   37.564670] Call trace:
[   37.564745]  show_stack+0x20/0x38 (C)
[   37.564895]  dump_stack_lvl+0x8c/0xd0
[   37.565044]  print_report+0x118/0x5f0
[   37.565201]  kasan_report_invalid_free+0xb0/0xd8
[   37.565727]  __kasan_mempool_poison_pages+0xe0/0xe8
[   37.566003]  mempool_free+0x24c/0x328
[   37.566189]  mempool_double_free_helper+0x150/0x2e0
[   37.566381]  mempool_page_alloc_double_free+0xb4/0x110
[   37.566659]  kunit_try_run_case+0x14c/0x3d0
[   37.566822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.567084]  kthread+0x318/0x618
[   37.567230]  ret_from_fork+0x10/0x20
[   37.567938] 
[   37.568070] The buggy address belongs to the physical page:
[   37.568199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   37.568402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.568636] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.568873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.569011] page dumped because: kasan: bad access detected
[   37.569131] 
[   37.569442] Memory state around the buggy address:
[   37.569593]  fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.569805]  fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.569952] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.570160]                    ^
[   37.570256]  fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.570443]  fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.570578] ==================================================================
[   37.441570] ==================================================================
[   37.442412] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   37.442665] Free of addr fff00000c5da6800 by task kunit_try_catch/237
[   37.442908] 
[   37.443095] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.443378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.443470] Hardware name: linux,dummy-virt (DT)
[   37.443647] Call trace:
[   37.444329]  show_stack+0x20/0x38 (C)
[   37.444617]  dump_stack_lvl+0x8c/0xd0
[   37.444853]  print_report+0x118/0x5f0
[   37.444999]  kasan_report_invalid_free+0xb0/0xd8
[   37.445173]  check_slab_allocation+0xd4/0x108
[   37.445901]  __kasan_mempool_poison_object+0x78/0x150
[   37.446678]  mempool_free+0x28c/0x328
[   37.446866]  mempool_double_free_helper+0x150/0x2e0
[   37.447047]  mempool_kmalloc_double_free+0xb8/0x110
[   37.447247]  kunit_try_run_case+0x14c/0x3d0
[   37.448350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.448662]  kthread+0x318/0x618
[   37.449083]  ret_from_fork+0x10/0x20
[   37.449674] 
[   37.449754] Allocated by task 237:
[   37.449940]  kasan_save_stack+0x3c/0x68
[   37.450594]  kasan_save_track+0x20/0x40
[   37.450764]  kasan_save_alloc_info+0x40/0x58
[   37.450891]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.451636]  remove_element+0x130/0x1f8
[   37.452048]  mempool_alloc_preallocated+0x58/0xc0
[   37.452511]  mempool_double_free_helper+0x94/0x2e0
[   37.452705]  mempool_kmalloc_double_free+0xb8/0x110
[   37.452832]  kunit_try_run_case+0x14c/0x3d0
[   37.452946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.453093]  kthread+0x318/0x618
[   37.453842]  ret_from_fork+0x10/0x20
[   37.454093] 
[   37.454157] Freed by task 237:
[   37.454753]  kasan_save_stack+0x3c/0x68
[   37.454890]  kasan_save_track+0x20/0x40
[   37.455126]  kasan_save_free_info+0x4c/0x78
[   37.455817]  __kasan_mempool_poison_object+0xc0/0x150
[   37.455979]  mempool_free+0x28c/0x328
[   37.456127]  mempool_double_free_helper+0x100/0x2e0
[   37.456267]  mempool_kmalloc_double_free+0xb8/0x110
[   37.457006]  kunit_try_run_case+0x14c/0x3d0
[   37.457285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.458042]  kthread+0x318/0x618
[   37.458324]  ret_from_fork+0x10/0x20
[   37.458521] 
[   37.458585] The buggy address belongs to the object at fff00000c5da6800
[   37.458585]  which belongs to the cache kmalloc-128 of size 128
[   37.459087] The buggy address is located 0 bytes inside of
[   37.459087]  128-byte region [fff00000c5da6800, fff00000c5da6880)
[   37.459282] 
[   37.459346] The buggy address belongs to the physical page:
[   37.459939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6
[   37.460258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.460866] page_type: f5(slab)
[   37.460993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.461182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.461437] page dumped because: kasan: bad access detected
[   37.461643] 
[   37.461719] Memory state around the buggy address:
[   37.462329]  fff00000c5da6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.462507]  fff00000c5da6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.463314] >fff00000c5da6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.463567]                    ^
[   37.463935]  fff00000c5da6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.464370]  fff00000c5da6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.464613] ==================================================================
[   37.524177] ==================================================================
[   37.524359] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   37.524544] Free of addr fff00000c7804000 by task kunit_try_catch/239
[   37.524684] 
[   37.525354] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[   37.525720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.525820] Hardware name: linux,dummy-virt (DT)
[   37.525923] Call trace:
[   37.525990]  show_stack+0x20/0x38 (C)
[   37.526431]  dump_stack_lvl+0x8c/0xd0
[   37.527032]  print_report+0x118/0x5f0
[   37.527209]  kasan_report_invalid_free+0xb0/0xd8
[   37.527922]  __kasan_mempool_poison_object+0x14c/0x150
[   37.528146]  mempool_free+0x28c/0x328
[   37.528563]  mempool_double_free_helper+0x150/0x2e0
[   37.529269]  mempool_kmalloc_large_double_free+0xb8/0x110
[   37.529463]  kunit_try_run_case+0x14c/0x3d0
[   37.529615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.529769]  kthread+0x318/0x618
[   37.531116]  ret_from_fork+0x10/0x20
[   37.531298] 
[   37.531366] The buggy address belongs to the physical page:
[   37.531473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   37.531650] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.531807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.531994] page_type: f8(unknown)
[   37.532229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.532485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.533115] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.533389] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.533569] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff
[   37.534006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.534166] page dumped because: kasan: bad access detected
[   37.534344] 
[   37.534517] Memory state around the buggy address:
[   37.534744]  fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.534956]  fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535136] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535257]                    ^
[   37.535351]  fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535499]  fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.535639] ==================================================================

[   24.294503] ==================================================================
[   24.296660] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.297535] Free of addr ffff88810305ab00 by task kunit_try_catch/256
[   24.299433] 
[   24.299628] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   24.300219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.300248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.300281] Call Trace:
[   24.300302]  <TASK>
[   24.300323]  dump_stack_lvl+0x73/0xb0
[   24.300371]  print_report+0xd1/0x660
[   24.300407]  ? __virt_addr_valid+0x1db/0x2d0
[   24.300476]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.300512]  ? mempool_double_free_helper+0x184/0x370
[   24.300547]  kasan_report_invalid_free+0xce/0x100
[   24.300583]  ? mempool_double_free_helper+0x184/0x370
[   24.300623]  ? mempool_double_free_helper+0x184/0x370
[   24.300656]  ? mempool_double_free_helper+0x184/0x370
[   24.300746]  check_slab_allocation+0x101/0x130
[   24.300883]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.300943]  mempool_free+0x2ec/0x380
[   24.300984]  mempool_double_free_helper+0x184/0x370
[   24.301023]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.301059]  ? update_load_avg+0x1c3/0x2170
[   24.301097]  ? update_curr+0x80/0x810
[   24.301159]  ? finish_task_switch.isra.0+0x153/0x730
[   24.301199]  mempool_kmalloc_double_free+0xb0/0x100
[   24.301236]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   24.301270]  ? __switch_to+0x5d9/0xf70
[   24.301308]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.301337]  ? __pfx_mempool_kfree+0x10/0x10
[   24.301372]  ? __pfx_read_tsc+0x10/0x10
[   24.301402]  ? ktime_get_ts64+0x86/0x240
[   24.301441]  kunit_try_run_case+0x1b2/0x490
[   24.301478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.301509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.301541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.301574]  ? __kthread_parkme+0x82/0x160
[   24.301605]  ? preempt_count_sub+0x50/0x80
[   24.301641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.301689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.301822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.301894]  kthread+0x323/0x710
[   24.301952]  ? trace_preempt_on+0x20/0xc0
[   24.302017]  ? __pfx_kthread+0x10/0x10
[   24.302060]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.302092]  ? calculate_sigpending+0x7b/0xa0
[   24.302152]  ? __pfx_kthread+0x10/0x10
[   24.302187]  ret_from_fork+0x41/0x80
[   24.302221]  ? __pfx_kthread+0x10/0x10
[   24.302254]  ret_from_fork_asm+0x1a/0x30
[   24.302305]  </TASK>
[   24.302321] 
[   24.327251] Allocated by task 256:
[   24.327600]  kasan_save_stack+0x3d/0x60
[   24.327906]  kasan_save_track+0x18/0x40
[   24.328387]  kasan_save_alloc_info+0x3b/0x50
[   24.329829]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.330475]  remove_element+0x11e/0x190
[   24.330915]  mempool_alloc_preallocated+0x4d/0x90
[   24.332070]  mempool_double_free_helper+0x8a/0x370
[   24.332560]  mempool_kmalloc_double_free+0xb0/0x100
[   24.333106]  kunit_try_run_case+0x1b2/0x490
[   24.334286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.334982]  kthread+0x323/0x710
[   24.335332]  ret_from_fork+0x41/0x80
[   24.336549]  ret_from_fork_asm+0x1a/0x30
[   24.337156] 
[   24.337660] Freed by task 256:
[   24.338014]  kasan_save_stack+0x3d/0x60
[   24.338399]  kasan_save_track+0x18/0x40
[   24.339430]  kasan_save_free_info+0x3f/0x60
[   24.339775]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.341020]  mempool_free+0x2ec/0x380
[   24.341447]  mempool_double_free_helper+0x109/0x370
[   24.341810]  mempool_kmalloc_double_free+0xb0/0x100
[   24.342407]  kunit_try_run_case+0x1b2/0x490
[   24.342887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.343360]  kthread+0x323/0x710
[   24.343729]  ret_from_fork+0x41/0x80
[   24.344683]  ret_from_fork_asm+0x1a/0x30
[   24.346031] 
[   24.346326] The buggy address belongs to the object at ffff88810305ab00
[   24.346326]  which belongs to the cache kmalloc-128 of size 128
[   24.347152] The buggy address is located 0 bytes inside of
[   24.347152]  128-byte region [ffff88810305ab00, ffff88810305ab80)
[   24.348194] 
[   24.348372] The buggy address belongs to the physical page:
[   24.349381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a
[   24.350043] flags: 0x200000000000000(node=0|zone=2)
[   24.350795] page_type: f5(slab)
[   24.351409] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.352354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.353398] page dumped because: kasan: bad access detected
[   24.354180] 
[   24.354443] Memory state around the buggy address:
[   24.355017]  ffff88810305aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.355333]  ffff88810305aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.355556] >ffff88810305ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.355797]                    ^
[   24.355925]  ffff88810305ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.356173]  ffff88810305ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.356382] ==================================================================
[   24.415952] ==================================================================
[   24.417250] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.417859] Free of addr ffff888103920000 by task kunit_try_catch/260
[   24.418415] 
[   24.418688] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   24.418854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.419063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.419154] Call Trace:
[   24.419192]  <TASK>
[   24.419228]  dump_stack_lvl+0x73/0xb0
[   24.419307]  print_report+0xd1/0x660
[   24.419415]  ? __virt_addr_valid+0x1db/0x2d0
[   24.419558]  ? kasan_addr_to_slab+0x11/0xa0
[   24.419655]  ? mempool_double_free_helper+0x184/0x370
[   24.419766]  kasan_report_invalid_free+0xce/0x100
[   24.419850]  ? mempool_double_free_helper+0x184/0x370
[   24.419978]  ? mempool_double_free_helper+0x184/0x370
[   24.420051]  __kasan_mempool_poison_pages+0x115/0x130
[   24.420154]  mempool_free+0x290/0x380
[   24.420266]  mempool_double_free_helper+0x184/0x370
[   24.420341]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.420429]  ? finish_task_switch.isra.0+0x153/0x730
[   24.420511]  mempool_page_alloc_double_free+0xab/0x100
[   24.420557]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   24.420595]  ? __switch_to+0x5d9/0xf70
[   24.420633]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   24.420665]  ? __pfx_mempool_free_pages+0x10/0x10
[   24.420700]  ? __pfx_read_tsc+0x10/0x10
[   24.421022]  ? ktime_get_ts64+0x86/0x240
[   24.421094]  kunit_try_run_case+0x1b2/0x490
[   24.421165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.421199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.421233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.421265]  ? __kthread_parkme+0x82/0x160
[   24.421300]  ? preempt_count_sub+0x50/0x80
[   24.421336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.421371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.421404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.421438]  kthread+0x323/0x710
[   24.421469]  ? trace_preempt_on+0x20/0xc0
[   24.421504]  ? __pfx_kthread+0x10/0x10
[   24.421539]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.421569]  ? calculate_sigpending+0x7b/0xa0
[   24.421600]  ? __pfx_kthread+0x10/0x10
[   24.421634]  ret_from_fork+0x41/0x80
[   24.421666]  ? __pfx_kthread+0x10/0x10
[   24.421769]  ret_from_fork_asm+0x1a/0x30
[   24.421869]  </TASK>
[   24.421887] 
[   24.449205] The buggy address belongs to the physical page:
[   24.449510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920
[   24.449956] flags: 0x200000000000000(node=0|zone=2)
[   24.452703] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   24.454730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.456330] page dumped because: kasan: bad access detected
[   24.457366] 
[   24.457587] Memory state around the buggy address:
[   24.457955]  ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.458395]  ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.458944] >ffff888103920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.460553]                    ^
[   24.461300]  ffff888103920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.462222]  ffff888103920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.463436] ==================================================================
[   24.363978] ==================================================================
[   24.365680] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.366278] Free of addr ffff8881039c0000 by task kunit_try_catch/258
[   24.366955] 
[   24.367539] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) 
[   24.367772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.367857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.367916] Call Trace:
[   24.367956]  <TASK>
[   24.367980]  dump_stack_lvl+0x73/0xb0
[   24.368026]  print_report+0xd1/0x660
[   24.368075]  ? __virt_addr_valid+0x1db/0x2d0
[   24.368213]  ? kasan_addr_to_slab+0x11/0xa0
[   24.368273]  ? mempool_double_free_helper+0x184/0x370
[   24.368335]  kasan_report_invalid_free+0xce/0x100
[   24.368376]  ? mempool_double_free_helper+0x184/0x370
[   24.368416]  ? mempool_double_free_helper+0x184/0x370
[   24.368450]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   24.368487]  mempool_free+0x2ec/0x380
[   24.368525]  mempool_double_free_helper+0x184/0x370
[   24.368561]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.368603]  ? finish_task_switch.isra.0+0x153/0x730
[   24.368643]  mempool_kmalloc_large_double_free+0xb0/0x100
[   24.368683]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   24.368973]  ? __switch_to+0x5d9/0xf70
[   24.369050]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.369105]  ? __pfx_mempool_kfree+0x10/0x10
[   24.369192]  ? __pfx_read_tsc+0x10/0x10
[   24.369245]  ? ktime_get_ts64+0x86/0x240
[   24.369316]  kunit_try_run_case+0x1b2/0x490
[   24.369371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.369403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.369437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.369470]  ? __kthread_parkme+0x82/0x160
[   24.369502]  ? preempt_count_sub+0x50/0x80
[   24.369537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.369572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.369605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.369639]  kthread+0x323/0x710
[   24.369668]  ? trace_preempt_on+0x20/0xc0
[   24.369801]  ? __pfx_kthread+0x10/0x10
[   24.369855]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.369887]  ? calculate_sigpending+0x7b/0xa0
[   24.369921]  ? __pfx_kthread+0x10/0x10
[   24.369955]  ret_from_fork+0x41/0x80
[   24.369987]  ? __pfx_kthread+0x10/0x10
[   24.370018]  ret_from_fork_asm+0x1a/0x30
[   24.370066]  </TASK>
[   24.370082] 
[   24.394045] The buggy address belongs to the physical page:
[   24.394477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c0
[   24.395186] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.396341] flags: 0x200000000000040(head|node=0|zone=2)
[   24.396930] page_type: f8(unknown)
[   24.398190] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.399215] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.399805] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.400353] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.401017] head: 0200000000000002 ffffea00040e7001 00000000ffffffff 00000000ffffffff
[   24.402565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.403541] page dumped because: kasan: bad access detected
[   24.404101] 
[   24.404347] Memory state around the buggy address:
[   24.404796]  ffff8881039bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.405316]  ffff8881039bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.406166] >ffff8881039c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.406649]                    ^
[   24.406884]  ffff8881039c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.407509]  ffff8881039c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.408413] ==================================================================