Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   36.610391] ==================================================================
[   36.620503] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.628485] Free of addr ffff000803208001 by task kunit_try_catch/290
[   36.634907] 
[   36.636393] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   36.636449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.636464] Hardware name: WinLink E850-96 board (DT)
[   36.636485] Call trace:
[   36.636500]  show_stack+0x20/0x38 (C)
[   36.636539]  dump_stack_lvl+0x8c/0xd0
[   36.636575]  print_report+0x118/0x608
[   36.636607]  kasan_report_invalid_free+0xc0/0xe8
[   36.636638]  __kasan_mempool_poison_object+0xfc/0x150
[   36.636671]  mempool_free+0x28c/0x328
[   36.636709]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.636745]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   36.636784]  kunit_try_run_case+0x170/0x3f0
[   36.636822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.636863]  kthread+0x328/0x630
[   36.636896]  ret_from_fork+0x10/0x20
[   36.636935] 
[   36.711125] The buggy address belongs to the physical page:
[   36.716682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208
[   36.724666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.732304] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.739246] page_type: f8(unknown)
[   36.742645] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.750363] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.758090] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.765901] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.773714] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff
[   36.781526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.789331] page dumped because: kasan: bad access detected
[   36.794887] 
[   36.796362] Memory state around the buggy address:
[   36.801144]  ffff000803207f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.808345]  ffff000803207f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.815553] >ffff000803208000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.822752]                    ^
[   36.825968]  ffff000803208080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.833171]  ffff000803208100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.840375] ==================================================================
[   36.284328] ==================================================================
[   36.294899] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.302882] Free of addr ffff000801dd0801 by task kunit_try_catch/288
[   36.309304] 
[   36.310790] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   36.310844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.310860] Hardware name: WinLink E850-96 board (DT)
[   36.310883] Call trace:
[   36.310898]  show_stack+0x20/0x38 (C)
[   36.310933]  dump_stack_lvl+0x8c/0xd0
[   36.310968]  print_report+0x118/0x608
[   36.311000]  kasan_report_invalid_free+0xc0/0xe8
[   36.311031]  check_slab_allocation+0xfc/0x108
[   36.311064]  __kasan_mempool_poison_object+0x78/0x150
[   36.311099]  mempool_free+0x28c/0x328
[   36.311136]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.311171]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.311210]  kunit_try_run_case+0x170/0x3f0
[   36.311247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.311288]  kthread+0x328/0x630
[   36.311322]  ret_from_fork+0x10/0x20
[   36.311358] 
[   36.389339] Allocated by task 288:
[   36.392726]  kasan_save_stack+0x3c/0x68
[   36.396543]  kasan_save_track+0x20/0x40
[   36.400362]  kasan_save_alloc_info+0x40/0x58
[   36.404615]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.409910]  remove_element+0x130/0x1f8
[   36.413730]  mempool_alloc_preallocated+0x58/0xc0
[   36.418417]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   36.423972]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.428921]  kunit_try_run_case+0x170/0x3f0
[   36.433087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.438557]  kthread+0x328/0x630
[   36.441768]  ret_from_fork+0x10/0x20
[   36.445326] 
[   36.446804] The buggy address belongs to the object at ffff000801dd0800
[   36.446804]  which belongs to the cache kmalloc-128 of size 128
[   36.459305] The buggy address is located 1 bytes inside of
[   36.459305]  128-byte region [ffff000801dd0800, ffff000801dd0880)
[   36.470847] 
[   36.472325] The buggy address belongs to the physical page:
[   36.477883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0
[   36.485868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.493506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.500449] page_type: f5(slab)
[   36.503586] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.511304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.519030] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.526842] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.534655] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff
[   36.542467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.550273] page dumped because: kasan: bad access detected
[   36.555830] 
[   36.557304] Memory state around the buggy address:
[   36.562084]  ffff000801dd0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.569287]  ffff000801dd0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.576491] >ffff000801dd0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.583692]                    ^
[   36.586908]  ffff000801dd0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.594112]  ffff000801dd0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.601316] ==================================================================

[   20.572968] ==================================================================
[   20.573023] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.573084] Free of addr fff00000c3f9e301 by task kunit_try_catch/244
[   20.573126] 
[   20.573159] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.573318] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.573382] Hardware name: linux,dummy-virt (DT)
[   20.573452] Call trace:
[   20.573507]  show_stack+0x20/0x38 (C)
[   20.573615]  dump_stack_lvl+0x8c/0xd0
[   20.573705]  print_report+0x118/0x608
[   20.573758]  kasan_report_invalid_free+0xc0/0xe8
[   20.573812]  check_slab_allocation+0xfc/0x108
[   20.573877]  __kasan_mempool_poison_object+0x78/0x150
[   20.573944]  mempool_free+0x28c/0x328
[   20.573997]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.574059]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.574118]  kunit_try_run_case+0x170/0x3f0
[   20.574206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574445]  kthread+0x328/0x630
[   20.574527]  ret_from_fork+0x10/0x20
[   20.574592] 
[   20.574643] Allocated by task 244:
[   20.574710]  kasan_save_stack+0x3c/0x68
[   20.574819]  kasan_save_track+0x20/0x40
[   20.574885]  kasan_save_alloc_info+0x40/0x58
[   20.574929]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.574977]  remove_element+0x130/0x1f8
[   20.575024]  mempool_alloc_preallocated+0x58/0xc0
[   20.575080]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   20.575141]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.575188]  kunit_try_run_case+0x170/0x3f0
[   20.575269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.575382]  kthread+0x328/0x630
[   20.575483]  ret_from_fork+0x10/0x20
[   20.575586] 
[   20.575608] The buggy address belongs to the object at fff00000c3f9e300
[   20.575608]  which belongs to the cache kmalloc-128 of size 128
[   20.575679] The buggy address is located 1 bytes inside of
[   20.575679]  128-byte region [fff00000c3f9e300, fff00000c3f9e380)
[   20.575740] 
[   20.575762] The buggy address belongs to the physical page:
[   20.575806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   20.575871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.576014] page_type: f5(slab)
[   20.576109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.576216] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.576293] page dumped because: kasan: bad access detected
[   20.576376] 
[   20.576397] Memory state around the buggy address:
[   20.576431]  fff00000c3f9e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.576702]  fff00000c3f9e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.576779] >fff00000c3f9e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.576878]                    ^
[   20.577019]  fff00000c3f9e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.577156]  fff00000c3f9e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.577218] ==================================================================
[   20.583509] ==================================================================
[   20.583568] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.583632] Free of addr fff00000c65c4001 by task kunit_try_catch/246
[   20.583677] 
[   20.583710] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.583798] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.583829] Hardware name: linux,dummy-virt (DT)
[   20.583864] Call trace:
[   20.583888]  show_stack+0x20/0x38 (C)
[   20.583940]  dump_stack_lvl+0x8c/0xd0
[   20.583992]  print_report+0x118/0x608
[   20.584039]  kasan_report_invalid_free+0xc0/0xe8
[   20.584093]  __kasan_mempool_poison_object+0xfc/0x150
[   20.584148]  mempool_free+0x28c/0x328
[   20.584200]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.584258]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.584318]  kunit_try_run_case+0x170/0x3f0
[   20.584427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.584490]  kthread+0x328/0x630
[   20.584558]  ret_from_fork+0x10/0x20
[   20.584610] 
[   20.584652] The buggy address belongs to the physical page:
[   20.584687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4
[   20.584801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.584889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.584946] page_type: f8(unknown)
[   20.586061] >fff00000c65c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.594749] 
[   20.594844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47bf1
[   20.595209]  ffffaf0a3e9f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.620509] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.620867] Read of size 1 at addr ffff800080a37c2a by task kunit_try_catch/252
[   20.620942] 
[   20.621164] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.622733]  ret_from_fork+0x10/0x20
[   20.626362] 
[   20.626515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.626847]  ffff800080a37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.637117] 
[   20.638255] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.647627] 
[   20.648998] 
[   20.649653] 
[   20.650616] ==================================================================

[   18.676974] ==================================================================
[   18.678166] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.679071] Free of addr ffff888101de5d01 by task kunit_try_catch/262
[   18.679599] 
[   18.680114] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   18.680505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.680559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.680606] Call Trace:
[   18.680636]  <TASK>
[   18.680674]  dump_stack_lvl+0x73/0xb0
[   18.680744]  print_report+0xd1/0x650
[   18.680803]  ? __virt_addr_valid+0x1db/0x2d0
[   18.680853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.680903]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.680963]  kasan_report_invalid_free+0x10a/0x130
[   18.681020]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.681082]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.681131]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.681187]  check_slab_allocation+0x11f/0x130
[   18.681230]  __kasan_mempool_poison_object+0x91/0x1d0
[   18.681273]  mempool_free+0x2ec/0x380
[   18.681322]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.681371]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   18.681402]  ? update_load_avg+0x1be/0x21b0
[   18.681425]  ? update_load_avg+0x1be/0x21b0
[   18.681446]  ? update_curr+0x80/0x810
[   18.681467]  ? irqentry_exit+0x2a/0x60
[   18.681493]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.681522]  mempool_kmalloc_invalid_free+0xed/0x140
[   18.681548]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   18.681578]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.681599]  ? __pfx_mempool_kfree+0x10/0x10
[   18.681623]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   18.681651]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   18.681681]  kunit_try_run_case+0x1a5/0x480
[   18.681709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.681732]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.681785]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.681812]  ? __kthread_parkme+0x82/0x180
[   18.681837]  ? preempt_count_sub+0x50/0x80
[   18.681865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.681890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.681914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.681938]  kthread+0x337/0x6f0
[   18.681957]  ? trace_preempt_on+0x20/0xc0
[   18.681984]  ? __pfx_kthread+0x10/0x10
[   18.682004]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.682026]  ? calculate_sigpending+0x7b/0xa0
[   18.682050]  ? __pfx_kthread+0x10/0x10
[   18.682070]  ret_from_fork+0x41/0x80
[   18.682095]  ? __pfx_kthread+0x10/0x10
[   18.682142]  ret_from_fork_asm+0x1a/0x30
[   18.682183]  </TASK>
[   18.682213] 
[   18.697184] Allocated by task 262:
[   18.697772]  kasan_save_stack+0x45/0x70
[   18.698211]  kasan_save_track+0x18/0x40
[   18.698867]  kasan_save_alloc_info+0x3b/0x50
[   18.699882]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   18.700155]  remove_element+0x11e/0x190
[   18.700360]  mempool_alloc_preallocated+0x4d/0x90
[   18.700727]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   18.701017]  mempool_kmalloc_invalid_free+0xed/0x140
[   18.701392]  kunit_try_run_case+0x1a5/0x480
[   18.701685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.702553]  kthread+0x337/0x6f0
[   18.702889]  ret_from_fork+0x41/0x80
[   18.703333]  ret_from_fork_asm+0x1a/0x30
[   18.703701] 
[   18.703881] The buggy address belongs to the object at ffff888101de5d00
[   18.703881]  which belongs to the cache kmalloc-128 of size 128
[   18.704714] The buggy address is located 1 bytes inside of
[   18.704714]  128-byte region [ffff888101de5d00, ffff888101de5d80)
[   18.705499] 
[   18.705699] The buggy address belongs to the physical page:
[   18.706135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5
[   18.706515] flags: 0x200000000000000(node=0|zone=2)
[   18.706941] page_type: f5(slab)
[   18.707255] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.707719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.708617] page dumped because: kasan: bad access detected
[   18.709070] 
[   18.709425] Memory state around the buggy address:
[   18.709826]  ffff888101de5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.710187]  ffff888101de5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.710826] >ffff888101de5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.711566]                    ^
[   18.711860]  ffff888101de5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.712289]  ffff888101de5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.712890] ==================================================================
[   18.719686] ==================================================================
[   18.720990] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.721521] Free of addr ffff888102a98001 by task kunit_try_catch/264
[   18.722039] 
[   18.722228] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   18.722346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.722377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.722430] Call Trace:
[   18.722458]  <TASK>
[   18.722520]  dump_stack_lvl+0x73/0xb0
[   18.722588]  print_report+0xd1/0x650
[   18.722637]  ? __virt_addr_valid+0x1db/0x2d0
[   18.722692]  ? kasan_addr_to_slab+0x11/0xa0
[   18.722741]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.722814]  kasan_report_invalid_free+0x10a/0x130
[   18.722864]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.722925]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.722980]  __kasan_mempool_poison_object+0x102/0x1d0
[   18.723037]  mempool_free+0x2ec/0x380
[   18.723101]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   18.723154]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   18.723211]  ? dequeue_entities+0x852/0x1740
[   18.723259]  ? finish_task_switch.isra.0+0x153/0x700
[   18.723310]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   18.723355]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   18.723407]  ? dequeue_task_fair+0x166/0x4e0
[   18.723454]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.723494]  ? __pfx_mempool_kfree+0x10/0x10
[   18.723545]  ? __pfx_read_tsc+0x10/0x10
[   18.723586]  ? ktime_get_ts64+0x86/0x230
[   18.723669]  kunit_try_run_case+0x1a5/0x480
[   18.723724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.723780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.723838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.723892]  ? __kthread_parkme+0x82/0x180
[   18.723945]  ? preempt_count_sub+0x50/0x80
[   18.723990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.724028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.724066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.724152]  kthread+0x337/0x6f0
[   18.724188]  ? trace_preempt_on+0x20/0xc0
[   18.724232]  ? __pfx_kthread+0x10/0x10
[   18.724261]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.724293]  ? calculate_sigpending+0x7b/0xa0
[   18.724328]  ? __pfx_kthread+0x10/0x10
[   18.724359]  ret_from_fork+0x41/0x80
[   18.724396]  ? __pfx_kthread+0x10/0x10
[   18.724428]  ret_from_fork_asm+0x1a/0x30
[   18.724485]  </TASK>
[   18.724508] 
[   18.741383] The buggy address belongs to the physical page:
[   18.742041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a98
[   18.742583] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.743342] flags: 0x200000000000040(head|node=0|zone=2)
[   18.743957] page_type: f8(unknown)
[   18.744206] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.745229] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.746095] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.746711] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.747434] head: 0200000000000002 ffffea00040aa601 00000000ffffffff 00000000ffffffff
[   18.747852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.748358] page dumped because: kasan: bad access detected
[   18.748731] 
[   18.748948] Memory state around the buggy address:
[   18.749892]  ffff888102a97f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.750801]  ffff888102a97f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.751613] >ffff888102a98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.752099]                    ^
[   18.752324]  ffff888102a98080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.753104]  ffff888102a98100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.753704] ==================================================================