Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   54.579969] ==================================================================
[   54.590099] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.598083] Free of addr ffff000808920001 by task kunit_try_catch/327
[   54.604506] 
[   54.605994] CPU: 4 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   54.606049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.606067] Hardware name: WinLink E850-96 board (DT)
[   54.606089] Call trace:
[   54.606104]  show_stack+0x20/0x38 (C)
[   54.606140]  dump_stack_lvl+0x8c/0xd0
[   54.606177]  print_report+0x118/0x5d0
[   54.606206]  kasan_report_invalid_free+0xc0/0xe8
[   54.606236]  __kasan_mempool_poison_object+0xfc/0x150
[   54.606277]  mempool_free+0x28c/0x328
[   54.606307]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.606346]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   54.606382]  kunit_try_run_case+0x170/0x3f0
[   54.606421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.606453]  kthread+0x328/0x630
[   54.606483]  ret_from_fork+0x10/0x20
[   54.606519] 
[   54.681940] The buggy address belongs to the physical page:
[   54.687497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920
[   54.695479] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.703118] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.710062] page_type: f8(unknown)
[   54.713459] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.721177] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.728904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.736716] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.744529] head: 0bfffe0000000002 fffffdffe0224801 00000000ffffffff 00000000ffffffff
[   54.752341] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   54.760148] page dumped because: kasan: bad access detected
[   54.765702] 
[   54.767179] Memory state around the buggy address:
[   54.771959]  ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.779160]  ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.786365] >ffff000808920000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.793566]                    ^
[   54.796781]  ffff000808920080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.803986]  ffff000808920100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.811189] ==================================================================
[   54.252759] ==================================================================
[   54.263283] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.271265] Free of addr ffff000801e0bd01 by task kunit_try_catch/325
[   54.277688] 
[   54.279175] CPU: 5 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   54.279231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.279249] Hardware name: WinLink E850-96 board (DT)
[   54.279271] Call trace:
[   54.279284]  show_stack+0x20/0x38 (C)
[   54.279320]  dump_stack_lvl+0x8c/0xd0
[   54.279352]  print_report+0x118/0x5d0
[   54.279379]  kasan_report_invalid_free+0xc0/0xe8
[   54.279410]  check_slab_allocation+0xfc/0x108
[   54.279446]  __kasan_mempool_poison_object+0x78/0x150
[   54.279487]  mempool_free+0x28c/0x328
[   54.279522]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.279559]  mempool_kmalloc_invalid_free+0xc0/0x118
[   54.279593]  kunit_try_run_case+0x170/0x3f0
[   54.279632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.279666]  kthread+0x328/0x630
[   54.279697]  ret_from_fork+0x10/0x20
[   54.279731] 
[   54.358939] Allocated by task 325:
[   54.362323]  kasan_save_stack+0x3c/0x68
[   54.366142]  kasan_save_track+0x20/0x40
[   54.369961]  kasan_save_alloc_info+0x40/0x58
[   54.374215]  __kasan_mempool_unpoison_object+0x11c/0x180
[   54.379511]  remove_element+0x130/0x1f8
[   54.383329]  mempool_alloc_preallocated+0x58/0xc0
[   54.388017]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   54.393572]  mempool_kmalloc_invalid_free+0xc0/0x118
[   54.398520]  kunit_try_run_case+0x170/0x3f0
[   54.402686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.408155]  kthread+0x328/0x630
[   54.411367]  ret_from_fork+0x10/0x20
[   54.414926] 
[   54.416403] The buggy address belongs to the object at ffff000801e0bd00
[   54.416403]  which belongs to the cache kmalloc-128 of size 128
[   54.428904] The buggy address is located 1 bytes inside of
[   54.428904]  128-byte region [ffff000801e0bd00, ffff000801e0bd80)
[   54.440446] 
[   54.441926] The buggy address belongs to the physical page:
[   54.447483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   54.455466] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.463104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.470048] page_type: f5(slab)
[   54.473184] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.480904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.488630] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.496442] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.504254] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   54.512067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   54.519874] page dumped because: kasan: bad access detected
[   54.525428] 
[   54.526904] Memory state around the buggy address:
[   54.531684]  ffff000801e0bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.538886]  ffff000801e0bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.546092] >ffff000801e0bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.553292]                    ^
[   54.556507]  ffff000801e0bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.563712]  ffff000801e0be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.570913] ==================================================================

[   31.853582] ==================================================================
[   31.853654] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.853713] Free of addr fff00000c9c08001 by task kunit_try_catch/274
[   31.853759] 
[   31.853794] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.853878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.853903] Hardware name: linux,dummy-virt (DT)
[   31.853935] Call trace:
[   31.853957]  show_stack+0x20/0x38 (C)
[   31.854074]  dump_stack_lvl+0x8c/0xd0
[   31.854140]  print_report+0x118/0x5d0
[   31.854186]  kasan_report_invalid_free+0xc0/0xe8
[   31.854232]  __kasan_mempool_poison_object+0xfc/0x150
[   31.854285]  mempool_free+0x28c/0x328
[   31.854340]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.854391]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   31.854443]  kunit_try_run_case+0x170/0x3f0
[   31.854492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.854548]  kthread+0x328/0x630
[   31.854591]  ret_from_fork+0x10/0x20
[   31.854646] 
[   31.854676] The buggy address belongs to the physical page:
[   31.854709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c08
[   31.854773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.854821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.854883] page_type: f8(unknown)
[   31.854922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.854978] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.855028] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.855885] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.856159] head: 0bfffe0000000002 ffffc1ffc3270201 00000000ffffffff 00000000ffffffff
[   31.856284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.856370] page dumped because: kasan: bad access detected
[   31.856455] 
[   31.856759] Memory state around the buggy address:
[   31.856830]  fff00000c9c07f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.856977]  fff00000c9c07f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.857106] >fff00000c9c08000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.857339]                    ^
[   31.857422]  fff00000c9c08080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.857571]  fff00000c9c08100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.857976] ==================================================================
[   31.833790] ==================================================================
[   31.833862] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.833948] Free of addr fff00000c85fca01 by task kunit_try_catch/272
[   31.833992] 
[   31.834038] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.834136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.834171] Hardware name: linux,dummy-virt (DT)
[   31.834204] Call trace:
[   31.834235]  show_stack+0x20/0x38 (C)
[   31.834284]  dump_stack_lvl+0x8c/0xd0
[   31.834332]  print_report+0x118/0x5d0
[   31.834376]  kasan_report_invalid_free+0xc0/0xe8
[   31.834422]  check_slab_allocation+0xfc/0x108
[   31.834478]  __kasan_mempool_poison_object+0x78/0x150
[   31.834532]  mempool_free+0x28c/0x328
[   31.834576]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.834629]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.834684]  kunit_try_run_case+0x170/0x3f0
[   31.834731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.834781]  kthread+0x328/0x630
[   31.834824]  ret_from_fork+0x10/0x20
[   31.834873] 
[   31.834897] Allocated by task 272:
[   31.834925]  kasan_save_stack+0x3c/0x68
[   31.834965]  kasan_save_track+0x20/0x40
[   31.835004]  kasan_save_alloc_info+0x40/0x58
[   31.835962]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.836067]  remove_element+0x130/0x1f8
[   31.836130]  mempool_alloc_preallocated+0x58/0xc0
[   31.836183]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   31.836261]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.836443]  kunit_try_run_case+0x170/0x3f0
[   31.836493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.836535]  kthread+0x328/0x630
[   31.836568]  ret_from_fork+0x10/0x20
[   31.836976] 
[   31.837070] The buggy address belongs to the object at fff00000c85fca00
[   31.837070]  which belongs to the cache kmalloc-128 of size 128
[   31.837433] The buggy address is located 1 bytes inside of
[   31.837433]  128-byte region [fff00000c85fca00, fff00000c85fca80)
[   31.837602] 
[   31.837682] The buggy address belongs to the physical page:
[   31.837993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   31.838079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.838247] page_type: f5(slab)
[   31.838343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.838706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.838839] page dumped because: kasan: bad access detected
[   31.838899] 
[   31.839205] Memory state around the buggy address:
[   31.839291]  fff00000c85fc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.839367]  fff00000c85fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.839508] >fff00000c85fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.839585]                    ^
[   31.839614]  fff00000c85fca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.839986]  fff00000c85fcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.840069] ==================================================================

[   26.062345] ==================================================================
[   26.062875] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.063545] Free of addr ffff888103e99901 by task kunit_try_catch/290
[   26.063764] 
[   26.063852] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.063908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.063923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.063947] Call Trace:
[   26.063960]  <TASK>
[   26.063979]  dump_stack_lvl+0x73/0xb0
[   26.064012]  print_report+0xd1/0x610
[   26.064036]  ? __virt_addr_valid+0x1db/0x2d0
[   26.064083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.064109]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.064134]  kasan_report_invalid_free+0x10a/0x130
[   26.064157]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.064183]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.064207]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.064230]  check_slab_allocation+0x11f/0x130
[   26.064251]  __kasan_mempool_poison_object+0x91/0x1d0
[   26.064274]  mempool_free+0x2ec/0x380
[   26.064300]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.064324]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   26.064349]  ? dequeue_entities+0x23f/0x1630
[   26.064375]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.064397]  ? finish_task_switch.isra.0+0x153/0x700
[   26.064422]  mempool_kmalloc_invalid_free+0xed/0x140
[   26.064445]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   26.064470]  ? __kasan_check_write+0x18/0x20
[   26.064494]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.064516]  ? __pfx_mempool_kfree+0x10/0x10
[   26.064539]  ? __pfx_read_tsc+0x10/0x10
[   26.064561]  ? ktime_get_ts64+0x86/0x230
[   26.064587]  kunit_try_run_case+0x1a5/0x480
[   26.064610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.064630]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.064666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.064763]  ? __kthread_parkme+0x82/0x180
[   26.064784]  ? preempt_count_sub+0x50/0x80
[   26.064807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.064829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.064854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.064880]  kthread+0x337/0x6f0
[   26.064899]  ? trace_preempt_on+0x20/0xc0
[   26.064923]  ? __pfx_kthread+0x10/0x10
[   26.064958]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.065026]  ? calculate_sigpending+0x7b/0xa0
[   26.065051]  ? __pfx_kthread+0x10/0x10
[   26.065073]  ret_from_fork+0x116/0x1d0
[   26.065092]  ? __pfx_kthread+0x10/0x10
[   26.065113]  ret_from_fork_asm+0x1a/0x30
[   26.065143]  </TASK>
[   26.065154] 
[   26.081694] Allocated by task 290:
[   26.081895]  kasan_save_stack+0x45/0x70
[   26.082095]  kasan_save_track+0x18/0x40
[   26.082268]  kasan_save_alloc_info+0x3b/0x50
[   26.082460]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.082714]  remove_element+0x11e/0x190
[   26.082921]  mempool_alloc_preallocated+0x4d/0x90
[   26.083560]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   26.083819]  mempool_kmalloc_invalid_free+0xed/0x140
[   26.084298]  kunit_try_run_case+0x1a5/0x480
[   26.084482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.084719]  kthread+0x337/0x6f0
[   26.085499]  ret_from_fork+0x116/0x1d0
[   26.085711]  ret_from_fork_asm+0x1a/0x30
[   26.085865] 
[   26.085955] The buggy address belongs to the object at ffff888103e99900
[   26.085955]  which belongs to the cache kmalloc-128 of size 128
[   26.087011] The buggy address is located 1 bytes inside of
[   26.087011]  128-byte region [ffff888103e99900, ffff888103e99980)
[   26.087488] 
[   26.087572] The buggy address belongs to the physical page:
[   26.088131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e99
[   26.088534] flags: 0x200000000000000(node=0|zone=2)
[   26.088787] page_type: f5(slab)
[   26.089124] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.089461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.090302] page dumped because: kasan: bad access detected
[   26.090534] 
[   26.090614] Memory state around the buggy address:
[   26.091226]  ffff888103e99800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.091519]  ffff888103e99880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091941] >ffff888103e99900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.092439]                    ^
[   26.092564]  ffff888103e99980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.092931]  ffff888103e99a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.093498] ==================================================================
[   26.097274] ==================================================================
[   26.097915] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.098895] Free of addr ffff888106148001 by task kunit_try_catch/292
[   26.099547] 
[   26.099651] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.099718] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.099738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.099763] Call Trace:
[   26.099777]  <TASK>
[   26.099796]  dump_stack_lvl+0x73/0xb0
[   26.099842]  print_report+0xd1/0x610
[   26.099865]  ? __virt_addr_valid+0x1db/0x2d0
[   26.099913]  ? kasan_addr_to_slab+0x11/0xa0
[   26.099934]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.099960]  kasan_report_invalid_free+0x10a/0x130
[   26.099984]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.100011]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.100034]  __kasan_mempool_poison_object+0x102/0x1d0
[   26.100058]  mempool_free+0x2ec/0x380
[   26.100087]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   26.100153]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   26.100191]  ? dequeue_entities+0x23f/0x1630
[   26.100216]  ? __kasan_check_write+0x18/0x20
[   26.100239]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.100272]  ? finish_task_switch.isra.0+0x153/0x700
[   26.100299]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   26.100323]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   26.100351]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.100372]  ? __pfx_mempool_kfree+0x10/0x10
[   26.100396]  ? __pfx_read_tsc+0x10/0x10
[   26.100418]  ? ktime_get_ts64+0x86/0x230
[   26.100442]  kunit_try_run_case+0x1a5/0x480
[   26.100467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.100487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.100511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.100534]  ? __kthread_parkme+0x82/0x180
[   26.100556]  ? preempt_count_sub+0x50/0x80
[   26.100579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.100599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.100624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.100649]  kthread+0x337/0x6f0
[   26.100678]  ? trace_preempt_on+0x20/0xc0
[   26.100702]  ? __pfx_kthread+0x10/0x10
[   26.100723]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.100744]  ? calculate_sigpending+0x7b/0xa0
[   26.100768]  ? __pfx_kthread+0x10/0x10
[   26.100789]  ret_from_fork+0x116/0x1d0
[   26.100808]  ? __pfx_kthread+0x10/0x10
[   26.100828]  ret_from_fork_asm+0x1a/0x30
[   26.100859]  </TASK>
[   26.100870] 
[   26.118834] The buggy address belongs to the physical page:
[   26.119455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106148
[   26.119897] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.120665] flags: 0x200000000000040(head|node=0|zone=2)
[   26.121245] page_type: f8(unknown)
[   26.121380] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.121599] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.122162] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.122965] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.123702] head: 0200000000000002 ffffea0004185201 00000000ffffffff 00000000ffffffff
[   26.124493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.125099] page dumped because: kasan: bad access detected
[   26.125279] 
[   26.125342] Memory state around the buggy address:
[   26.125489]  ffff888106147f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.125722]  ffff888106147f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.126297] >ffff888106148000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.126742]                    ^
[   26.126858]  ffff888106148080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.127414]  ffff888106148100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.128182] ==================================================================