Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   55.553471] ==================================================================
[   55.563636] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.571613] Free of addr ffff0008019ace01 by task kunit_try_catch/325
[   55.578037] 
[   55.579524] CPU: 3 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   55.579588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.579605] Hardware name: WinLink E850-96 board (DT)
[   55.579628] Call trace:
[   55.579641]  show_stack+0x20/0x38 (C)
[   55.579677]  dump_stack_lvl+0x8c/0xd0
[   55.579710]  print_report+0x118/0x5d0
[   55.579739]  kasan_report_invalid_free+0xc0/0xe8
[   55.579773]  check_slab_allocation+0xfc/0x108
[   55.579816]  __kasan_mempool_poison_object+0x78/0x150
[   55.579854]  mempool_free+0x28c/0x328
[   55.579888]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.579926]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.579960]  kunit_try_run_case+0x170/0x3f0
[   55.580001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.580034]  kthread+0x328/0x630
[   55.580066]  ret_from_fork+0x10/0x20
[   55.580104] 
[   55.659287] Allocated by task 325:
[   55.662675]  kasan_save_stack+0x3c/0x68
[   55.666491]  kasan_save_track+0x20/0x40
[   55.670310]  kasan_save_alloc_info+0x40/0x58
[   55.674563]  __kasan_mempool_unpoison_object+0x11c/0x180
[   55.679859]  remove_element+0x130/0x1f8
[   55.683678]  mempool_alloc_preallocated+0x58/0xc0
[   55.688367]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   55.693921]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.698868]  kunit_try_run_case+0x170/0x3f0
[   55.703035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.708504]  kthread+0x328/0x630
[   55.711715]  ret_from_fork+0x10/0x20
[   55.715275] 
[   55.716752] The buggy address belongs to the object at ffff0008019ace00
[   55.716752]  which belongs to the cache kmalloc-128 of size 128
[   55.729252] The buggy address is located 1 bytes inside of
[   55.729252]  128-byte region [ffff0008019ace00, ffff0008019ace80)
[   55.740795] 
[   55.742273] The buggy address belongs to the physical page:
[   55.747831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   55.755815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.763453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.770396] page_type: f5(slab)
[   55.773534] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.781252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.788981] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.796791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.804603] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   55.812415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   55.820221] page dumped because: kasan: bad access detected
[   55.825776] 
[   55.827251] Memory state around the buggy address:
[   55.832030]  ffff0008019acd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.839235]  ffff0008019acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.846441] >ffff0008019ace00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.853641]                    ^
[   55.856856]  ffff0008019ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.864061]  ffff0008019acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.871263] ==================================================================
[   55.880310] ==================================================================
[   55.890452] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.898433] Free of addr ffff000805b50001 by task kunit_try_catch/327
[   55.904856] 
[   55.906342] CPU: 5 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   55.906405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.906424] Hardware name: WinLink E850-96 board (DT)
[   55.906449] Call trace:
[   55.906463]  show_stack+0x20/0x38 (C)
[   55.906498]  dump_stack_lvl+0x8c/0xd0
[   55.906533]  print_report+0x118/0x5d0
[   55.906564]  kasan_report_invalid_free+0xc0/0xe8
[   55.906597]  __kasan_mempool_poison_object+0xfc/0x150
[   55.906639]  mempool_free+0x28c/0x328
[   55.906675]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.906713]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   55.906753]  kunit_try_run_case+0x170/0x3f0
[   55.906794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.906827]  kthread+0x328/0x630
[   55.906858]  ret_from_fork+0x10/0x20
[   55.906897] 
[   55.982287] The buggy address belongs to the physical page:
[   55.987844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50
[   55.995828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   56.003467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   56.010410] page_type: f8(unknown)
[   56.013807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   56.021526] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   56.029253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   56.037064] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   56.044878] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff
[   56.052689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   56.060495] page dumped because: kasan: bad access detected
[   56.066050] 
[   56.067526] Memory state around the buggy address:
[   56.072305]  ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.079509]  ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.086715] >ffff000805b50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.093915]                    ^
[   56.097130]  ffff000805b50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.104335]  ffff000805b50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.111537] ==================================================================

[   32.543440] ==================================================================
[   32.543755] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.543860] Free of addr fff00000c9b68001 by task kunit_try_catch/274
[   32.543906] 
[   32.544035] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.544126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.544153] Hardware name: linux,dummy-virt (DT)
[   32.544317] Call trace:
[   32.544423]  show_stack+0x20/0x38 (C)
[   32.544486]  dump_stack_lvl+0x8c/0xd0
[   32.544553]  print_report+0x118/0x5d0
[   32.544598]  kasan_report_invalid_free+0xc0/0xe8
[   32.544662]  __kasan_mempool_poison_object+0xfc/0x150
[   32.544715]  mempool_free+0x28c/0x328
[   32.544900]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.544960]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.545013]  kunit_try_run_case+0x170/0x3f0
[   32.545081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.545136]  kthread+0x328/0x630
[   32.545180]  ret_from_fork+0x10/0x20
[   32.545248] 
[   32.545291] The buggy address belongs to the physical page:
[   32.545334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68
[   32.545433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.545485] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.545694] page_type: f8(unknown)
[   32.545788] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.545909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.545994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.546042] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.546131] head: 0bfffe0000000002 ffffc1ffc326da01 00000000ffffffff 00000000ffffffff
[   32.546254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.546388] page dumped because: kasan: bad access detected
[   32.546470] 
[   32.546518] Memory state around the buggy address:
[   32.546552]  fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.546832]  fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.546924] >fff00000c9b68000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.547012]                    ^
[   32.547077]  fff00000c9b68080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.547117]  fff00000c9b68100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.547213] ==================================================================
[   32.532365] ==================================================================
[   32.532558] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.532651] Free of addr fff00000c91a7101 by task kunit_try_catch/272
[   32.532703] 
[   32.532742] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.532830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.532867] Hardware name: linux,dummy-virt (DT)
[   32.532908] Call trace:
[   32.532932]  show_stack+0x20/0x38 (C)
[   32.532984]  dump_stack_lvl+0x8c/0xd0
[   32.533031]  print_report+0x118/0x5d0
[   32.533092]  kasan_report_invalid_free+0xc0/0xe8
[   32.533139]  check_slab_allocation+0xfc/0x108
[   32.533198]  __kasan_mempool_poison_object+0x78/0x150
[   32.533251]  mempool_free+0x28c/0x328
[   32.533297]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.533598]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.534117]  kunit_try_run_case+0x170/0x3f0
[   32.534219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.534284]  kthread+0x328/0x630
[   32.534343]  ret_from_fork+0x10/0x20
[   32.534393] 
[   32.534411] Allocated by task 272:
[   32.534442]  kasan_save_stack+0x3c/0x68
[   32.534485]  kasan_save_track+0x20/0x40
[   32.534525]  kasan_save_alloc_info+0x40/0x58
[   32.534563]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.534828]  remove_element+0x130/0x1f8
[   32.534906]  mempool_alloc_preallocated+0x58/0xc0
[   32.534979]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.535053]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.535105]  kunit_try_run_case+0x170/0x3f0
[   32.535174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.535255]  kthread+0x328/0x630
[   32.535319]  ret_from_fork+0x10/0x20
[   32.535416] 
[   32.535487] The buggy address belongs to the object at fff00000c91a7100
[   32.535487]  which belongs to the cache kmalloc-128 of size 128
[   32.535575] The buggy address is located 1 bytes inside of
[   32.535575]  128-byte region [fff00000c91a7100, fff00000c91a7180)
[   32.535656] 
[   32.535676] The buggy address belongs to the physical page:
[   32.535911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7
[   32.536019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.536108] page_type: f5(slab)
[   32.536169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.536254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.536336] page dumped because: kasan: bad access detected
[   32.536713] 
[   32.536753] Memory state around the buggy address:
[   32.536805]  fff00000c91a7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.536849]  fff00000c91a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537067] >fff00000c91a7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537220]                    ^
[   32.537294]  fff00000c91a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537441]  fff00000c91a7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.537525] ==================================================================

[   25.581569] ==================================================================
[   25.582077] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.582585] Free of addr ffff888104cacf01 by task kunit_try_catch/291
[   25.582873] 
[   25.582990] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.583045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.583056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.583080] Call Trace:
[   25.583095]  <TASK>
[   25.583113]  dump_stack_lvl+0x73/0xb0
[   25.583146]  print_report+0xd1/0x610
[   25.583168]  ? __virt_addr_valid+0x1db/0x2d0
[   25.583193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.583219]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.583245]  kasan_report_invalid_free+0x10a/0x130
[   25.583278]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.583304]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.583328]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.583351]  check_slab_allocation+0x11f/0x130
[   25.583373]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.583397]  mempool_free+0x2ec/0x380
[   25.583423]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.583447]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.583473]  ? __kasan_check_write+0x18/0x20
[   25.583496]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.583518]  ? finish_task_switch.isra.0+0x153/0x700
[   25.583544]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.583568]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   25.583594]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.583616]  ? __pfx_mempool_kfree+0x10/0x10
[   25.583640]  ? __pfx_read_tsc+0x10/0x10
[   25.583663]  ? ktime_get_ts64+0x86/0x230
[   25.583689]  kunit_try_run_case+0x1a5/0x480
[   25.583713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.583743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.583767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.583791]  ? __kthread_parkme+0x82/0x180
[   25.583812]  ? preempt_count_sub+0x50/0x80
[   25.583835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.583856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.583881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.583907]  kthread+0x337/0x6f0
[   25.583927]  ? trace_preempt_on+0x20/0xc0
[   25.583951]  ? __pfx_kthread+0x10/0x10
[   25.583971]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.583992]  ? calculate_sigpending+0x7b/0xa0
[   25.584017]  ? __pfx_kthread+0x10/0x10
[   25.584038]  ret_from_fork+0x116/0x1d0
[   25.584057]  ? __pfx_kthread+0x10/0x10
[   25.584078]  ret_from_fork_asm+0x1a/0x30
[   25.584108]  </TASK>
[   25.584120] 
[   25.593510] Allocated by task 291:
[   25.593643]  kasan_save_stack+0x45/0x70
[   25.593992]  kasan_save_track+0x18/0x40
[   25.594155]  kasan_save_alloc_info+0x3b/0x50
[   25.594420]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.594636]  remove_element+0x11e/0x190
[   25.594817]  mempool_alloc_preallocated+0x4d/0x90
[   25.595016]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   25.595242]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.595510]  kunit_try_run_case+0x1a5/0x480
[   25.595708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.595942]  kthread+0x337/0x6f0
[   25.596060]  ret_from_fork+0x116/0x1d0
[   25.596185]  ret_from_fork_asm+0x1a/0x30
[   25.596426] 
[   25.596522] The buggy address belongs to the object at ffff888104cacf00
[   25.596522]  which belongs to the cache kmalloc-128 of size 128
[   25.597057] The buggy address is located 1 bytes inside of
[   25.597057]  128-byte region [ffff888104cacf00, ffff888104cacf80)
[   25.597667] 
[   25.597784] The buggy address belongs to the physical page:
[   25.598009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104cac
[   25.598400] flags: 0x200000000000000(node=0|zone=2)
[   25.598620] page_type: f5(slab)
[   25.598778] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.599075] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   25.599296] page dumped because: kasan: bad access detected
[   25.599460] 
[   25.599523] Memory state around the buggy address:
[   25.599778]  ffff888104cace00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.600085]  ffff888104cace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.600527] >ffff888104cacf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.600808]                    ^
[   25.600973]  ffff888104cacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.601248]  ffff888104cad000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.601674] ==================================================================
[   25.605546] ==================================================================
[   25.606048] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.606365] Free of addr ffff888102bac001 by task kunit_try_catch/293
[   25.606688] 
[   25.606805] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.606861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.606874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.606898] Call Trace:
[   25.606912]  <TASK>
[   25.606930]  dump_stack_lvl+0x73/0xb0
[   25.606965]  print_report+0xd1/0x610
[   25.606988]  ? __virt_addr_valid+0x1db/0x2d0
[   25.607015]  ? kasan_addr_to_slab+0x11/0xa0
[   25.607036]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.607061]  kasan_report_invalid_free+0x10a/0x130
[   25.607086]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.607114]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.607138]  __kasan_mempool_poison_object+0x102/0x1d0
[   25.607162]  mempool_free+0x2ec/0x380
[   25.607190]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.607215]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.607242]  ? __kasan_check_write+0x18/0x20
[   25.607266]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.607290]  ? finish_task_switch.isra.0+0x153/0x700
[   25.607317]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   25.607342]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   25.607369]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.607449]  ? __pfx_mempool_kfree+0x10/0x10
[   25.607480]  ? __pfx_read_tsc+0x10/0x10
[   25.607504]  ? ktime_get_ts64+0x86/0x230
[   25.607530]  kunit_try_run_case+0x1a5/0x480
[   25.607556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.607578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.607605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.607630]  ? __kthread_parkme+0x82/0x180
[   25.607651]  ? preempt_count_sub+0x50/0x80
[   25.607674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.607696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.607721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.607758]  kthread+0x337/0x6f0
[   25.607779]  ? trace_preempt_on+0x20/0xc0
[   25.607804]  ? __pfx_kthread+0x10/0x10
[   25.607827]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.607848]  ? calculate_sigpending+0x7b/0xa0
[   25.607874]  ? __pfx_kthread+0x10/0x10
[   25.607896]  ret_from_fork+0x116/0x1d0
[   25.607916]  ? __pfx_kthread+0x10/0x10
[   25.607938]  ret_from_fork_asm+0x1a/0x30
[   25.607970]  </TASK>
[   25.607981] 
[   25.619828] The buggy address belongs to the physical page:
[   25.620070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bac
[   25.620406] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.621371] flags: 0x200000000000040(head|node=0|zone=2)
[   25.621807] page_type: f8(unknown)
[   25.622112] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.622758] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.623086] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.623395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.623697] head: 0200000000000002 ffffea00040aeb01 00000000ffffffff 00000000ffffffff
[   25.624551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.625127] page dumped because: kasan: bad access detected
[   25.625643] 
[   25.625915] Memory state around the buggy address:
[   25.626181]  ffff888102babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.626794]  ffff888102babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.627105] >ffff888102bac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.627687]                    ^
[   25.627852]  ffff888102bac080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.628139]  ffff888102bac100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.628771] ==================================================================