Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.851039] ==================================================================
[   31.851096] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.851501] Free of addr fff00000c9c10000 by task kunit_try_catch/272
[   31.851559] 
[   31.851590] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   31.851676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.851703] Hardware name: linux,dummy-virt (DT)
[   31.851735] Call trace:
[   31.851767]  show_stack+0x20/0x38 (C)
[   31.851819]  dump_stack_lvl+0x8c/0xd0
[   31.852022]  print_report+0x118/0x608
[   31.852314]  kasan_report_invalid_free+0xc0/0xe8
[   31.852389]  __kasan_mempool_poison_pages+0xe0/0xe8
[   31.852441]  mempool_free+0x24c/0x328
[   31.852487]  mempool_double_free_helper+0x150/0x2e8
[   31.852535]  mempool_page_alloc_double_free+0xbc/0x118
[   31.852817]  kunit_try_run_case+0x170/0x3f0
[   31.852913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.852968]  kthread+0x328/0x630
[   31.853251]  ret_from_fork+0x10/0x20
[   31.853300] 
[   31.853320] The buggy address belongs to the physical page:
[   31.853351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c10
[   31.853403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.853463] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.853520] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.853736] page dumped because: kasan: bad access detected
[   31.853769] 
[   31.853787] Memory state around the buggy address:
[   31.854092]  fff00000c9c0ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.854165]  fff00000c9c0ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.854209] >fff00000c9c10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.854247]                    ^
[   31.854276]  fff00000c9c10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.854400]  fff00000c9c10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.854441] ==================================================================
[   31.823874] ==================================================================
[   31.823971] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.824226] Free of addr fff00000c929fb00 by task kunit_try_catch/268
[   31.824428] 
[   31.824569] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   31.824765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.824796] Hardware name: linux,dummy-virt (DT)
[   31.824830] Call trace:
[   31.824854]  show_stack+0x20/0x38 (C)
[   31.824913]  dump_stack_lvl+0x8c/0xd0
[   31.824958]  print_report+0x118/0x608
[   31.825005]  kasan_report_invalid_free+0xc0/0xe8
[   31.825054]  check_slab_allocation+0xd4/0x108
[   31.825104]  __kasan_mempool_poison_object+0x78/0x150
[   31.825155]  mempool_free+0x28c/0x328
[   31.825200]  mempool_double_free_helper+0x150/0x2e8
[   31.825250]  mempool_kmalloc_double_free+0xc0/0x118
[   31.825299]  kunit_try_run_case+0x170/0x3f0
[   31.825349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.825433]  kthread+0x328/0x630
[   31.825476]  ret_from_fork+0x10/0x20
[   31.825524] 
[   31.825543] Allocated by task 268:
[   31.825573]  kasan_save_stack+0x3c/0x68
[   31.825616]  kasan_save_track+0x20/0x40
[   31.825654]  kasan_save_alloc_info+0x40/0x58
[   31.825692]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.825765]  remove_element+0x130/0x1f8
[   31.825915]  mempool_alloc_preallocated+0x58/0xc0
[   31.826043]  mempool_double_free_helper+0x94/0x2e8
[   31.826085]  mempool_kmalloc_double_free+0xc0/0x118
[   31.826135]  kunit_try_run_case+0x170/0x3f0
[   31.826251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.826308]  kthread+0x328/0x630
[   31.826340]  ret_from_fork+0x10/0x20
[   31.826410] 
[   31.826429] Freed by task 268:
[   31.826468]  kasan_save_stack+0x3c/0x68
[   31.826617]  kasan_save_track+0x20/0x40
[   31.826686]  kasan_save_free_info+0x4c/0x78
[   31.826730]  __kasan_mempool_poison_object+0xc0/0x150
[   31.826773]  mempool_free+0x28c/0x328
[   31.826808]  mempool_double_free_helper+0x100/0x2e8
[   31.826849]  mempool_kmalloc_double_free+0xc0/0x118
[   31.826890]  kunit_try_run_case+0x170/0x3f0
[   31.826937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.827001]  kthread+0x328/0x630
[   31.827033]  ret_from_fork+0x10/0x20
[   31.827069] 
[   31.827088] The buggy address belongs to the object at fff00000c929fb00
[   31.827088]  which belongs to the cache kmalloc-128 of size 128
[   31.827146] The buggy address is located 0 bytes inside of
[   31.827146]  128-byte region [fff00000c929fb00, fff00000c929fb80)
[   31.827223] 
[   31.827243] The buggy address belongs to the physical page:
[   31.827280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10929f
[   31.827437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.827526] page_type: f5(slab)
[   31.827643] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.827702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.827870] page dumped because: kasan: bad access detected
[   31.827911] 
[   31.827930] Memory state around the buggy address:
[   31.827962]  fff00000c929fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.828006]  fff00000c929fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.828086] >fff00000c929fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.828150]                    ^
[   31.828212]  fff00000c929fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.828359]  fff00000c929fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.828401] ==================================================================
[   31.836022] ==================================================================
[   31.836084] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.836137] Free of addr fff00000c9c10000 by task kunit_try_catch/270
[   31.836180] 
[   31.836210] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   31.836295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.836323] Hardware name: linux,dummy-virt (DT)
[   31.836356] Call trace:
[   31.836386]  show_stack+0x20/0x38 (C)
[   31.836538]  dump_stack_lvl+0x8c/0xd0
[   31.836681]  print_report+0x118/0x608
[   31.837223]  kasan_report_invalid_free+0xc0/0xe8
[   31.837321]  __kasan_mempool_poison_object+0x14c/0x150
[   31.837387]  mempool_free+0x28c/0x328
[   31.837432]  mempool_double_free_helper+0x150/0x2e8
[   31.837847]  mempool_kmalloc_large_double_free+0xc0/0x118
[   31.838089]  kunit_try_run_case+0x170/0x3f0
[   31.838142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.838195]  kthread+0x328/0x630
[   31.838239]  ret_from_fork+0x10/0x20
[   31.838287] 
[   31.838317] The buggy address belongs to the physical page:
[   31.838349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c10
[   31.839518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.839622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.839682] page_type: f8(unknown)
[   31.839980] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.840090] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.840174] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.840236] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.840427] head: 0bfffe0000000002 ffffc1ffc3270401 00000000ffffffff 00000000ffffffff
[   31.840524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.840707] page dumped because: kasan: bad access detected
[   31.840741] 
[   31.840760] Memory state around the buggy address:
[   31.841140]  fff00000c9c0ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.841191]  fff00000c9c0ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.841256] >fff00000c9c10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.841296]                    ^
[   31.841323]  fff00000c9c10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.841423]  fff00000c9c10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.841596] ==================================================================

[   26.773931] ==================================================================
[   26.775093] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   26.776190] Free of addr ffff8881062d8000 by task kunit_try_catch/288
[   26.776948] 
[   26.777070] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   26.777133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.777300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.777336] Call Trace:
[   26.777355]  <TASK>
[   26.777379]  dump_stack_lvl+0x73/0xb0
[   26.777467]  print_report+0xd1/0x650
[   26.777495]  ? __virt_addr_valid+0x1db/0x2d0
[   26.777523]  ? kasan_addr_to_slab+0x11/0xa0
[   26.777551]  ? mempool_double_free_helper+0x184/0x370
[   26.777578]  kasan_report_invalid_free+0x10a/0x130
[   26.777605]  ? mempool_double_free_helper+0x184/0x370
[   26.777633]  ? mempool_double_free_helper+0x184/0x370
[   26.777659]  __kasan_mempool_poison_pages+0x115/0x130
[   26.777685]  mempool_free+0x290/0x380
[   26.777716]  mempool_double_free_helper+0x184/0x370
[   26.777742]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.777768]  ? __kasan_check_write+0x18/0x20
[   26.777794]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.777818]  ? finish_task_switch.isra.0+0x153/0x700
[   26.777848]  mempool_page_alloc_double_free+0xe8/0x140
[   26.777875]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   26.777907]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   26.777932]  ? __pfx_mempool_free_pages+0x10/0x10
[   26.777960]  ? __pfx_read_tsc+0x10/0x10
[   26.777984]  ? ktime_get_ts64+0x86/0x230
[   26.778013]  kunit_try_run_case+0x1a5/0x480
[   26.778043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.778068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.778096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.778123]  ? __kthread_parkme+0x82/0x180
[   26.778155]  ? preempt_count_sub+0x50/0x80
[   26.778180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.778207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.778234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.778261]  kthread+0x337/0x6f0
[   26.778283]  ? trace_preempt_on+0x20/0xc0
[   26.778309]  ? __pfx_kthread+0x10/0x10
[   26.778333]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.778358]  ? calculate_sigpending+0x7b/0xa0
[   26.778385]  ? __pfx_kthread+0x10/0x10
[   26.778421]  ret_from_fork+0x116/0x1d0
[   26.778443]  ? __pfx_kthread+0x10/0x10
[   26.778465]  ret_from_fork_asm+0x1a/0x30
[   26.778501]  </TASK>
[   26.778515] 
[   26.795649] The buggy address belongs to the physical page:
[   26.795966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d8
[   26.796443] flags: 0x200000000000000(node=0|zone=2)
[   26.796645] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   26.797107] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.797441] page dumped because: kasan: bad access detected
[   26.797774] 
[   26.798082] Memory state around the buggy address:
[   26.798814]  ffff8881062d7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.799382]  ffff8881062d7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.799835] >ffff8881062d8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.800333]                    ^
[   26.800540]  ffff8881062d8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.801091]  ffff8881062d8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.801597] ==================================================================
[   26.703749] ==================================================================
[   26.704332] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   26.704758] Free of addr ffff888105aaca00 by task kunit_try_catch/284
[   26.705173] 
[   26.705281] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   26.705341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.705356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.705384] Call Trace:
[   26.705471]  <TASK>
[   26.705496]  dump_stack_lvl+0x73/0xb0
[   26.705532]  print_report+0xd1/0x650
[   26.705558]  ? __virt_addr_valid+0x1db/0x2d0
[   26.705588]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.705618]  ? mempool_double_free_helper+0x184/0x370
[   26.705644]  kasan_report_invalid_free+0x10a/0x130
[   26.705671]  ? mempool_double_free_helper+0x184/0x370
[   26.705699]  ? mempool_double_free_helper+0x184/0x370
[   26.705724]  ? mempool_double_free_helper+0x184/0x370
[   26.705749]  check_slab_allocation+0x101/0x130
[   26.705778]  __kasan_mempool_poison_object+0x91/0x1d0
[   26.705805]  mempool_free+0x2ec/0x380
[   26.705836]  mempool_double_free_helper+0x184/0x370
[   26.705861]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.705889]  ? __kasan_check_write+0x18/0x20
[   26.705914]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.705939]  ? finish_task_switch.isra.0+0x153/0x700
[   26.705968]  mempool_kmalloc_double_free+0xed/0x140
[   26.705993]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   26.706022]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.706047]  ? __pfx_mempool_kfree+0x10/0x10
[   26.706072]  ? irqentry_exit+0x2a/0x60
[   26.706099]  ? __pfx_read_tsc+0x10/0x10
[   26.706125]  ? ktime_get_ts64+0x86/0x230
[   26.706189]  kunit_try_run_case+0x1a5/0x480
[   26.706221]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   26.706250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.706277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.706310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.706339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.706367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.706405]  kthread+0x337/0x6f0
[   26.706428]  ? trace_preempt_on+0x20/0xc0
[   26.706455]  ? __pfx_kthread+0x10/0x10
[   26.706478]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.706504]  ? calculate_sigpending+0x7b/0xa0
[   26.706532]  ? __pfx_kthread+0x10/0x10
[   26.706556]  ret_from_fork+0x116/0x1d0
[   26.706577]  ? __pfx_kthread+0x10/0x10
[   26.706600]  ret_from_fork_asm+0x1a/0x30
[   26.706635]  </TASK>
[   26.706649] 
[   26.716813] Allocated by task 284:
[   26.716961]  kasan_save_stack+0x45/0x70
[   26.717401]  kasan_save_track+0x18/0x40
[   26.717618]  kasan_save_alloc_info+0x3b/0x50
[   26.717837]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.718761]  remove_element+0x11e/0x190
[   26.719441]  mempool_alloc_preallocated+0x4d/0x90
[   26.720214]  mempool_double_free_helper+0x8a/0x370
[   26.720486]  mempool_kmalloc_double_free+0xed/0x140
[   26.720717]  kunit_try_run_case+0x1a5/0x480
[   26.721023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.721268]  kthread+0x337/0x6f0
[   26.721467]  ret_from_fork+0x116/0x1d0
[   26.721673]  ret_from_fork_asm+0x1a/0x30
[   26.721841] 
[   26.721928] Freed by task 284:
[   26.722408]  kasan_save_stack+0x45/0x70
[   26.722595]  kasan_save_track+0x18/0x40
[   26.722771]  kasan_save_free_info+0x3f/0x60
[   26.723102]  __kasan_mempool_poison_object+0x131/0x1d0
[   26.723294]  mempool_free+0x2ec/0x380
[   26.723580]  mempool_double_free_helper+0x109/0x370
[   26.723800]  mempool_kmalloc_double_free+0xed/0x140
[   26.724613]  kunit_try_run_case+0x1a5/0x480
[   26.724804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.725016]  kthread+0x337/0x6f0
[   26.725143]  ret_from_fork+0x116/0x1d0
[   26.725565]  ret_from_fork_asm+0x1a/0x30
[   26.725990] 
[   26.726250] The buggy address belongs to the object at ffff888105aaca00
[   26.726250]  which belongs to the cache kmalloc-128 of size 128
[   26.726827] The buggy address is located 0 bytes inside of
[   26.726827]  128-byte region [ffff888105aaca00, ffff888105aaca80)
[   26.727826] 
[   26.728054] The buggy address belongs to the physical page:
[   26.728629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aac
[   26.729362] flags: 0x200000000000000(node=0|zone=2)
[   26.729562] page_type: f5(slab)
[   26.729693] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.729982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.730403] page dumped because: kasan: bad access detected
[   26.730616] 
[   26.730694] Memory state around the buggy address:
[   26.731079]  ffff888105aac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.731360]  ffff888105aac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731856] >ffff888105aaca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.732081]                    ^
[   26.732453]  ffff888105aaca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.732814]  ffff888105aacb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.733051] ==================================================================
[   26.736556] ==================================================================
[   26.737124] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   26.737380] Free of addr ffff888106268000 by task kunit_try_catch/286
[   26.737704] 
[   26.737830] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   26.737889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.737903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.738059] Call Trace:
[   26.738115]  <TASK>
[   26.738173]  dump_stack_lvl+0x73/0xb0
[   26.738208]  print_report+0xd1/0x650
[   26.738247]  ? __virt_addr_valid+0x1db/0x2d0
[   26.738276]  ? kasan_addr_to_slab+0x11/0xa0
[   26.738303]  ? mempool_double_free_helper+0x184/0x370
[   26.738330]  kasan_report_invalid_free+0x10a/0x130
[   26.738356]  ? mempool_double_free_helper+0x184/0x370
[   26.738386]  ? mempool_double_free_helper+0x184/0x370
[   26.738421]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   26.738448]  mempool_free+0x2ec/0x380
[   26.738476]  mempool_double_free_helper+0x184/0x370
[   26.738502]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.738526]  ? update_load_avg+0x1be/0x21b0
[   26.738553]  ? dequeue_entities+0x27e/0x1740
[   26.738580]  ? finish_task_switch.isra.0+0x153/0x700
[   26.738609]  mempool_kmalloc_large_double_free+0xed/0x140
[   26.738637]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   26.738667]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.738691]  ? __pfx_mempool_kfree+0x10/0x10
[   26.738719]  ? __pfx_read_tsc+0x10/0x10
[   26.738777]  ? ktime_get_ts64+0x86/0x230
[   26.738805]  kunit_try_run_case+0x1a5/0x480
[   26.738834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.738938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.738979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.739007]  ? __kthread_parkme+0x82/0x180
[   26.739030]  ? preempt_count_sub+0x50/0x80
[   26.739057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.739084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.739112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.739157]  kthread+0x337/0x6f0
[   26.739180]  ? trace_preempt_on+0x20/0xc0
[   26.739206]  ? __pfx_kthread+0x10/0x10
[   26.739229]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.739254]  ? calculate_sigpending+0x7b/0xa0
[   26.739281]  ? __pfx_kthread+0x10/0x10
[   26.739304]  ret_from_fork+0x116/0x1d0
[   26.739325]  ? __pfx_kthread+0x10/0x10
[   26.739349]  ret_from_fork_asm+0x1a/0x30
[   26.739383]  </TASK>
[   26.739410] 
[   26.758051] The buggy address belongs to the physical page:
[   26.758537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106268
[   26.759373] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.759968] flags: 0x200000000000040(head|node=0|zone=2)
[   26.760270] page_type: f8(unknown)
[   26.760711] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.761571] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.762240] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.762508] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.762760] head: 0200000000000002 ffffea0004189a01 00000000ffffffff 00000000ffffffff
[   26.763384] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.764228] page dumped because: kasan: bad access detected
[   26.764790] 
[   26.765009] Memory state around the buggy address:
[   26.765530]  ffff888106267f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.766274]  ffff888106267f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.766979] >ffff888106268000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.767793]                    ^
[   26.768100]  ffff888106268080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.768690]  ffff888106268100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.769278] ==================================================================