Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.561389] ==================================================================
[   23.562408] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   23.563026] Free of addr fff00000c6a74000 by task kunit_try_catch/225
[   23.564475] 
[   23.566235] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.566451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.566533] Hardware name: linux,dummy-virt (DT)
[   23.566626] Call trace:
[   23.566689]  dump_backtrace+0x9c/0x128
[   23.566800]  show_stack+0x20/0x38
[   23.566900]  dump_stack_lvl+0x8c/0xd0
[   23.567044]  print_report+0x118/0x5f0
[   23.567140]  kasan_report_invalid_free+0xc0/0xe8
[   23.567246]  __kasan_mempool_poison_object+0x14c/0x150
[   23.567349]  mempool_free+0x28c/0x328
[   23.567455]  mempool_double_free_helper+0x15c/0x2f8
[   23.567558]  mempool_kmalloc_large_double_free+0xc0/0x118
[   23.567663]  kunit_try_run_case+0x170/0x3f0
[   23.567753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.567857]  kthread+0x24c/0x2d0
[   23.567943]  ret_from_fork+0x10/0x20
[   23.568068] 
[   23.582854] The buggy address belongs to the physical page:
[   23.584060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74
[   23.584655] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.585449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.586245] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.587031] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.587800] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.588601] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.589406] head: 0bfffe0000000002 ffffc1ffc31a9d01 ffffffffffffffff 0000000000000000
[   23.590246] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.591009] page dumped because: kasan: bad access detected
[   23.591552] 
[   23.591856] Memory state around the buggy address:
[   23.593027]  fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.593749]  fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.594483] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.595202]                    ^
[   23.595645]  fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.596389]  fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.597481] ==================================================================
[   23.605599] ==================================================================
[   23.606634] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   23.607419] Free of addr fff00000c6a74000 by task kunit_try_catch/227
[   23.608108] 
[   23.608454] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.608672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.608757] Hardware name: linux,dummy-virt (DT)
[   23.608856] Call trace:
[   23.608923]  dump_backtrace+0x9c/0x128
[   23.609102]  show_stack+0x20/0x38
[   23.609219]  dump_stack_lvl+0x8c/0xd0
[   23.609334]  print_report+0x118/0x5f0
[   23.609484]  kasan_report_invalid_free+0xc0/0xe8
[   23.609606]  __kasan_mempool_poison_pages+0xe0/0xe8
[   23.609725]  mempool_free+0x24c/0x328
[   23.609844]  mempool_double_free_helper+0x15c/0x2f8
[   23.609979]  mempool_page_alloc_double_free+0xbc/0x118
[   23.610100]  kunit_try_run_case+0x170/0x3f0
[   23.610198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.610308]  kthread+0x24c/0x2d0
[   23.610412]  ret_from_fork+0x10/0x20
[   23.610490] 
[   23.618878] The buggy address belongs to the physical page:
[   23.619932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74
[   23.620849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.621677] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.622532] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.623286] page dumped because: kasan: bad access detected
[   23.624602] 
[   23.624932] Memory state around the buggy address:
[   23.625503]  fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.626458]  fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.627233] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.628284]                    ^
[   23.628700]  fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.629441]  fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.630187] ==================================================================
[   23.512344] ==================================================================
[   23.513618] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   23.514390] Free of addr fff00000c424c200 by task kunit_try_catch/223
[   23.515121] 
[   23.515473] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.515691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.515776] Hardware name: linux,dummy-virt (DT)
[   23.515867] Call trace:
[   23.515931]  dump_backtrace+0x9c/0x128
[   23.516074]  show_stack+0x20/0x38
[   23.516179]  dump_stack_lvl+0x8c/0xd0
[   23.516294]  print_report+0x118/0x5f0
[   23.516401]  kasan_report_invalid_free+0xc0/0xe8
[   23.516517]  check_slab_allocation+0xd4/0x108
[   23.516670]  __kasan_mempool_poison_object+0x78/0x150
[   23.516789]  mempool_free+0x28c/0x328
[   23.516851]  mempool_double_free_helper+0x15c/0x2f8
[   23.516905]  mempool_kmalloc_double_free+0xc0/0x118
[   23.516983]  kunit_try_run_case+0x170/0x3f0
[   23.517040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.517095]  kthread+0x24c/0x2d0
[   23.517142]  ret_from_fork+0x10/0x20
[   23.517192] 
[   23.523174] Allocated by task 223:
[   23.523579]  kasan_save_stack+0x3c/0x68
[   23.524389]  kasan_save_track+0x20/0x40
[   23.524976]  kasan_save_alloc_info+0x40/0x58
[   23.525585]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.526278]  remove_element+0x130/0x1f8
[   23.526789]  mempool_alloc_preallocated+0x58/0xc0
[   23.527348]  mempool_double_free_helper+0x94/0x2f8
[   23.528238]  mempool_kmalloc_double_free+0xc0/0x118
[   23.528938]  kunit_try_run_case+0x170/0x3f0
[   23.529429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.530166]  kthread+0x24c/0x2d0
[   23.530624]  ret_from_fork+0x10/0x20
[   23.531141] 
[   23.532399] Freed by task 223:
[   23.532844]  kasan_save_stack+0x3c/0x68
[   23.533553]  kasan_save_track+0x20/0x40
[   23.534134]  kasan_save_free_info+0x4c/0x78
[   23.534648]  __kasan_mempool_poison_object+0xc0/0x150
[   23.535315]  mempool_free+0x28c/0x328
[   23.536021]  mempool_double_free_helper+0x104/0x2f8
[   23.536639]  mempool_kmalloc_double_free+0xc0/0x118
[   23.537279]  kunit_try_run_case+0x170/0x3f0
[   23.537897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.538567]  kthread+0x24c/0x2d0
[   23.538996]  ret_from_fork+0x10/0x20
[   23.539773] 
[   23.540150] The buggy address belongs to the object at fff00000c424c200
[   23.540150]  which belongs to the cache kmalloc-128 of size 128
[   23.541508] The buggy address is located 0 bytes inside of
[   23.541508]  128-byte region [fff00000c424c200, fff00000c424c280)
[   23.542506] 
[   23.542819] The buggy address belongs to the physical page:
[   23.543733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424c
[   23.544534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.545243] page_type: f5(slab)
[   23.545692] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.546447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.547225] page dumped because: kasan: bad access detected
[   23.548055] 
[   23.548356] Memory state around the buggy address:
[   23.548862]  fff00000c424c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.549560]  fff00000c424c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.550322] >fff00000c424c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.551088]                    ^
[   23.551719]  fff00000c424c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.552490]  fff00000c424c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.553236] ==================================================================

[   20.103929] ==================================================================
[   20.104862] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   20.105445] Free of addr ffff888102930f00 by task kunit_try_catch/240
[   20.105901] 
[   20.106148] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.107159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.107201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.107286] Call Trace:
[   20.107317]  <TASK>
[   20.107362]  dump_stack_lvl+0x73/0xb0
[   20.107456]  print_report+0xd1/0x640
[   20.107539]  ? __virt_addr_valid+0x1db/0x2d0
[   20.107597]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.107631]  ? mempool_double_free_helper+0x185/0x370
[   20.107660]  kasan_report_invalid_free+0xfc/0x120
[   20.107696]  ? mempool_double_free_helper+0x185/0x370
[   20.107727]  ? mempool_double_free_helper+0x185/0x370
[   20.107754]  ? mempool_double_free_helper+0x185/0x370
[   20.107779]  check_slab_allocation+0x101/0x130
[   20.107818]  __kasan_mempool_poison_object+0x91/0x1d0
[   20.107890]  mempool_free+0x2ec/0x380
[   20.107923]  mempool_double_free_helper+0x185/0x370
[   20.107952]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   20.107986]  ? finish_task_switch.isra.0+0x153/0x700
[   20.108020]  mempool_kmalloc_double_free+0xee/0x140
[   20.108049]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   20.108081]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.108106]  ? __pfx_mempool_kfree+0x10/0x10
[   20.108134]  ? __pfx_read_tsc+0x10/0x10
[   20.108161]  ? ktime_get_ts64+0x84/0x230
[   20.108197]  kunit_try_run_case+0x1a6/0x480
[   20.108260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.108291]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.108322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.108357]  ? __kthread_parkme+0x82/0x160
[   20.108384]  ? preempt_count_sub+0x50/0x80
[   20.108412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.108444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.108553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.108601]  kthread+0x257/0x310
[   20.108626]  ? __pfx_kthread+0x10/0x10
[   20.108651]  ret_from_fork+0x41/0x80
[   20.108680]  ? __pfx_kthread+0x10/0x10
[   20.108705]  ret_from_fork_asm+0x1a/0x30
[   20.108748]  </TASK>
[   20.108762] 
[   20.132267] Allocated by task 240:
[   20.132836]  kasan_save_stack+0x45/0x70
[   20.133627]  kasan_save_track+0x18/0x40
[   20.134345]  kasan_save_alloc_info+0x3b/0x50
[   20.135199]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   20.135908]  remove_element+0x11e/0x190
[   20.136872]  mempool_alloc_preallocated+0x4d/0x90
[   20.137722]  mempool_double_free_helper+0x8b/0x370
[   20.138287]  mempool_kmalloc_double_free+0xee/0x140
[   20.139036]  kunit_try_run_case+0x1a6/0x480
[   20.139532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.140164]  kthread+0x257/0x310
[   20.140725]  ret_from_fork+0x41/0x80
[   20.141668]  ret_from_fork_asm+0x1a/0x30
[   20.141979] 
[   20.142689] Freed by task 240:
[   20.143458]  kasan_save_stack+0x45/0x70
[   20.143866]  kasan_save_track+0x18/0x40
[   20.144259]  kasan_save_free_info+0x3f/0x60
[   20.145108]  __kasan_mempool_poison_object+0x131/0x1d0
[   20.145869]  mempool_free+0x2ec/0x380
[   20.146246]  mempool_double_free_helper+0x10a/0x370
[   20.147122]  mempool_kmalloc_double_free+0xee/0x140
[   20.147860]  kunit_try_run_case+0x1a6/0x480
[   20.148393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.148840]  kthread+0x257/0x310
[   20.149568]  ret_from_fork+0x41/0x80
[   20.150357]  ret_from_fork_asm+0x1a/0x30
[   20.150683] 
[   20.151244] The buggy address belongs to the object at ffff888102930f00
[   20.151244]  which belongs to the cache kmalloc-128 of size 128
[   20.152751] The buggy address is located 0 bytes inside of
[   20.152751]  128-byte region [ffff888102930f00, ffff888102930f80)
[   20.153772] 
[   20.154264] The buggy address belongs to the physical page:
[   20.155479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102930
[   20.156280] flags: 0x200000000000000(node=0|zone=2)
[   20.157131] page_type: f5(slab)
[   20.157465] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.158412] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   20.159296] page dumped because: kasan: bad access detected
[   20.159889] 
[   20.160669] Memory state around the buggy address:
[   20.161018]  ffff888102930e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.162113]  ffff888102930e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.162986] >ffff888102930f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.163963]                    ^
[   20.164208]  ffff888102930f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.165202]  ffff888102931000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.165739] ==================================================================
[   20.219088] ==================================================================
[   20.219978] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   20.221207] Free of addr ffff888102bfc000 by task kunit_try_catch/244
[   20.222116] 
[   20.222522] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.222661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.222682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.222728] Call Trace:
[   20.222751]  <TASK>
[   20.222777]  dump_stack_lvl+0x73/0xb0
[   20.222857]  print_report+0xd1/0x640
[   20.223066]  ? __virt_addr_valid+0x1db/0x2d0
[   20.223108]  ? kasan_addr_to_slab+0x11/0xa0
[   20.223140]  ? mempool_double_free_helper+0x185/0x370
[   20.223170]  kasan_report_invalid_free+0xfc/0x120
[   20.223207]  ? mempool_double_free_helper+0x185/0x370
[   20.223279]  ? mempool_double_free_helper+0x185/0x370
[   20.223314]  __kasan_mempool_poison_pages+0x115/0x130
[   20.223354]  mempool_free+0x290/0x380
[   20.223388]  mempool_double_free_helper+0x185/0x370
[   20.223420]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   20.223455]  ? finish_task_switch.isra.0+0x153/0x700
[   20.223490]  mempool_page_alloc_double_free+0xe9/0x140
[   20.223522]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   20.223558]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   20.223585]  ? __pfx_mempool_free_pages+0x10/0x10
[   20.223616]  ? __pfx_read_tsc+0x10/0x10
[   20.223643]  ? ktime_get_ts64+0x84/0x230
[   20.223678]  kunit_try_run_case+0x1a6/0x480
[   20.223710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.223740]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.223770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.223807]  ? __kthread_parkme+0x82/0x160
[   20.223890]  ? preempt_count_sub+0x50/0x80
[   20.223921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.223951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.223989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.224027]  kthread+0x257/0x310
[   20.224053]  ? __pfx_kthread+0x10/0x10
[   20.224081]  ret_from_fork+0x41/0x80
[   20.224109]  ? __pfx_kthread+0x10/0x10
[   20.224135]  ret_from_fork_asm+0x1a/0x30
[   20.224177]  </TASK>
[   20.224193] 
[   20.242652] The buggy address belongs to the physical page:
[   20.243525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bfc
[   20.244400] flags: 0x200000000000000(node=0|zone=2)
[   20.245370] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   20.245885] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.246675] page dumped because: kasan: bad access detected
[   20.247128] 
[   20.247387] Memory state around the buggy address:
[   20.247812]  ffff888102bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.248862]  ffff888102bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.249616] >ffff888102bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.250472]                    ^
[   20.250957]  ffff888102bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.251769]  ffff888102bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.252586] ==================================================================
[   20.173429] ==================================================================
[   20.174514] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   20.175417] Free of addr ffff888102bf8000 by task kunit_try_catch/242
[   20.177012] 
[   20.177189] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.177305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.177343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.177404] Call Trace:
[   20.177528]  <TASK>
[   20.177583]  dump_stack_lvl+0x73/0xb0
[   20.177674]  print_report+0xd1/0x640
[   20.177754]  ? __virt_addr_valid+0x1db/0x2d0
[   20.177847]  ? kasan_addr_to_slab+0x11/0xa0
[   20.177884]  ? mempool_double_free_helper+0x185/0x370
[   20.177915]  kasan_report_invalid_free+0xfc/0x120
[   20.177952]  ? mempool_double_free_helper+0x185/0x370
[   20.177984]  ? mempool_double_free_helper+0x185/0x370
[   20.178011]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   20.178047]  mempool_free+0x2ec/0x380
[   20.178079]  mempool_double_free_helper+0x185/0x370
[   20.178109]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   20.178142]  ? finish_task_switch.isra.0+0x153/0x700
[   20.178178]  mempool_kmalloc_large_double_free+0xee/0x140
[   20.178207]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   20.178295]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.178324]  ? __pfx_mempool_kfree+0x10/0x10
[   20.178352]  ? __pfx_read_tsc+0x10/0x10
[   20.178379]  ? ktime_get_ts64+0x84/0x230
[   20.178415]  kunit_try_run_case+0x1a6/0x480
[   20.178461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.178572]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.178606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.178641]  ? __kthread_parkme+0x82/0x160
[   20.178671]  ? preempt_count_sub+0x50/0x80
[   20.178702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.178729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.178768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.178805]  kthread+0x257/0x310
[   20.178867]  ? __pfx_kthread+0x10/0x10
[   20.178895]  ret_from_fork+0x41/0x80
[   20.178924]  ? __pfx_kthread+0x10/0x10
[   20.178949]  ret_from_fork_asm+0x1a/0x30
[   20.178993]  </TASK>
[   20.179007] 
[   20.196104] The buggy address belongs to the physical page:
[   20.196670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf8
[   20.197448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.198501] flags: 0x200000000000040(head|node=0|zone=2)
[   20.199274] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.200352] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.201384] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.202309] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.203161] head: 0200000000000002 ffffea00040afe01 ffffffffffffffff 0000000000000000
[   20.203659] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.204312] page dumped because: kasan: bad access detected
[   20.204861] 
[   20.205261] Memory state around the buggy address:
[   20.205618]  ffff888102bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.206333]  ffff888102bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.207052] >ffff888102bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.207698]                    ^
[   20.208171]  ffff888102bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.209528]  ffff888102bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.210656] ==================================================================