Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 26.172619] ================================================================== [ 26.172733] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 26.173433] Free of addr fff00000c77a0001 by task kunit_try_catch/245 [ 26.174140] [ 26.174473] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.175318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.175386] Hardware name: linux,dummy-virt (DT) [ 26.175714] Call trace: [ 26.175777] show_stack+0x20/0x38 (C) [ 26.175951] dump_stack_lvl+0x8c/0xd0 [ 26.176085] print_report+0x118/0x608 [ 26.176214] kasan_report_invalid_free+0xc0/0xe8 [ 26.176719] __kasan_mempool_poison_object+0xfc/0x150 [ 26.176854] mempool_free+0x28c/0x328 [ 26.177000] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 26.177150] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 26.177292] kunit_try_run_case+0x170/0x3f0 [ 26.177424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.178010] kthread+0x328/0x630 [ 26.178207] ret_from_fork+0x10/0x20 [ 26.178341] [ 26.178425] The buggy address belongs to the physical page: [ 26.178503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0 [ 26.178836] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.178996] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.179429] page_type: f8(unknown) [ 26.180027] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.180221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.180576] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.180874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 26.181024] head: 0bfffe0000000002 ffffc1ffc31de801 00000000ffffffff 00000000ffffffff [ 26.181305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.181446] page dumped because: kasan: bad access detected [ 26.181631] [ 26.181692] Memory state around the buggy address: [ 26.181867] fff00000c779ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.182151] fff00000c779ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.182666] >fff00000c77a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.183499] ^ [ 26.183733] fff00000c77a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.183871] fff00000c77a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.183996] ================================================================== [ 26.138339] ================================================================== [ 26.138487] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 26.138637] Free of addr fff00000c67e4401 by task kunit_try_catch/243 [ 26.138738] [ 26.138815] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 26.139073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.139137] Hardware name: linux,dummy-virt (DT) [ 26.139223] Call trace: [ 26.139321] show_stack+0x20/0x38 (C) [ 26.139518] dump_stack_lvl+0x8c/0xd0 [ 26.139723] print_report+0x118/0x608 [ 26.139857] kasan_report_invalid_free+0xc0/0xe8 [ 26.140022] check_slab_allocation+0xfc/0x108 [ 26.140156] __kasan_mempool_poison_object+0x78/0x150 [ 26.140298] mempool_free+0x28c/0x328 [ 26.140582] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 26.140728] mempool_kmalloc_invalid_free+0xc0/0x118 [ 26.140853] kunit_try_run_case+0x170/0x3f0 [ 26.140994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.141176] kthread+0x328/0x630 [ 26.141311] ret_from_fork+0x10/0x20 [ 26.141489] [ 26.141539] Allocated by task 243: [ 26.141619] kasan_save_stack+0x3c/0x68 [ 26.141739] kasan_save_track+0x20/0x40 [ 26.141849] kasan_save_alloc_info+0x40/0x58 [ 26.142002] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.142124] remove_element+0x130/0x1f8 [ 26.142335] mempool_alloc_preallocated+0x58/0xc0 [ 26.142470] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 26.142698] mempool_kmalloc_invalid_free+0xc0/0x118 [ 26.142819] kunit_try_run_case+0x170/0x3f0 [ 26.143078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.143208] kthread+0x328/0x630 [ 26.143454] ret_from_fork+0x10/0x20 [ 26.143556] [ 26.143609] The buggy address belongs to the object at fff00000c67e4400 [ 26.143609] which belongs to the cache kmalloc-128 of size 128 [ 26.143806] The buggy address is located 1 bytes inside of [ 26.143806] 128-byte region [fff00000c67e4400, fff00000c67e4480) [ 26.143989] [ 26.144042] The buggy address belongs to the physical page: [ 26.144205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4 [ 26.144355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.144595] page_type: f5(slab) [ 26.144693] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.144828] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.145137] page dumped because: kasan: bad access detected [ 26.145290] [ 26.145408] Memory state around the buggy address: [ 26.145518] fff00000c67e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.145623] fff00000c67e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.145732] >fff00000c67e4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.145899] ^ [ 26.146356] fff00000c67e4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.146493] fff00000c67e4500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.147309] ==================================================================
[ 13.212952] ================================================================== [ 13.213705] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.214070] Free of addr ffff888102756401 by task kunit_try_catch/261 [ 13.214382] [ 13.214489] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.214532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.214566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.214586] Call Trace: [ 13.214597] <TASK> [ 13.214610] dump_stack_lvl+0x73/0xb0 [ 13.214634] print_report+0xd1/0x650 [ 13.214656] ? __virt_addr_valid+0x1db/0x2d0 [ 13.214678] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.214701] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.214727] kasan_report_invalid_free+0x10a/0x130 [ 13.214752] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.214778] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.214802] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.214827] check_slab_allocation+0x11f/0x130 [ 13.214849] __kasan_mempool_poison_object+0x91/0x1d0 [ 13.214873] mempool_free+0x2ec/0x380 [ 13.214895] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.214920] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 13.214945] ? update_load_avg+0x1be/0x21b0 [ 13.214971] ? finish_task_switch.isra.0+0x153/0x700 [ 13.214997] mempool_kmalloc_invalid_free+0xed/0x140 [ 13.215020] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 13.215043] ? dequeue_task_fair+0x166/0x4e0 [ 13.215066] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.215084] ? __pfx_mempool_kfree+0x10/0x10 [ 13.215105] ? __pfx_read_tsc+0x10/0x10 [ 13.215141] ? ktime_get_ts64+0x86/0x230 [ 13.215166] kunit_try_run_case+0x1a5/0x480 [ 13.215188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.215210] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.215233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.215256] ? __kthread_parkme+0x82/0x180 [ 13.215278] ? preempt_count_sub+0x50/0x80 [ 13.215302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.215334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.215356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.215396] kthread+0x337/0x6f0 [ 13.215418] ? trace_preempt_on+0x20/0xc0 [ 13.215440] ? __pfx_kthread+0x10/0x10 [ 13.215461] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.215483] ? calculate_sigpending+0x7b/0xa0 [ 13.215504] ? __pfx_kthread+0x10/0x10 [ 13.215526] ret_from_fork+0x41/0x80 [ 13.215546] ? __pfx_kthread+0x10/0x10 [ 13.215568] ret_from_fork_asm+0x1a/0x30 [ 13.215599] </TASK> [ 13.215610] [ 13.225284] Allocated by task 261: [ 13.225584] kasan_save_stack+0x45/0x70 [ 13.225736] kasan_save_track+0x18/0x40 [ 13.225878] kasan_save_alloc_info+0x3b/0x50 [ 13.226022] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.226307] remove_element+0x11e/0x190 [ 13.226720] mempool_alloc_preallocated+0x4d/0x90 [ 13.227128] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 13.227823] mempool_kmalloc_invalid_free+0xed/0x140 [ 13.228264] kunit_try_run_case+0x1a5/0x480 [ 13.228745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.229245] kthread+0x337/0x6f0 [ 13.229625] ret_from_fork+0x41/0x80 [ 13.229872] ret_from_fork_asm+0x1a/0x30 [ 13.230011] [ 13.230083] The buggy address belongs to the object at ffff888102756400 [ 13.230083] which belongs to the cache kmalloc-128 of size 128 [ 13.231255] The buggy address is located 1 bytes inside of [ 13.231255] 128-byte region [ffff888102756400, ffff888102756480) [ 13.231884] [ 13.231959] The buggy address belongs to the physical page: [ 13.232189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102756 [ 13.233056] flags: 0x200000000000000(node=0|zone=2) [ 13.233609] page_type: f5(slab) [ 13.233932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.234668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.234942] page dumped because: kasan: bad access detected [ 13.235133] [ 13.235293] Memory state around the buggy address: [ 13.235807] ffff888102756300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.236470] ffff888102756380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.237000] >ffff888102756400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.237684] ^ [ 13.238007] ffff888102756480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.238346] ffff888102756500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.238586] ================================================================== [ 13.242498] ================================================================== [ 13.243234] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.244191] Free of addr ffff888103af0001 by task kunit_try_catch/263 [ 13.244626] [ 13.244805] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.244854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.244866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.244888] Call Trace: [ 13.244901] <TASK> [ 13.244915] dump_stack_lvl+0x73/0xb0 [ 13.244942] print_report+0xd1/0x650 [ 13.244964] ? __virt_addr_valid+0x1db/0x2d0 [ 13.244986] ? kasan_addr_to_slab+0x11/0xa0 [ 13.245006] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.245032] kasan_report_invalid_free+0x10a/0x130 [ 13.245057] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.245086] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.245110] __kasan_mempool_poison_object+0x102/0x1d0 [ 13.245152] mempool_free+0x2ec/0x380 [ 13.245176] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.245202] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 13.245226] ? update_load_avg+0x1be/0x21b0 [ 13.245251] ? finish_task_switch.isra.0+0x153/0x700 [ 13.245278] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 13.245303] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 13.245340] ? dequeue_task_fair+0x166/0x4e0 [ 13.245363] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.245382] ? __pfx_mempool_kfree+0x10/0x10 [ 13.245450] ? __pfx_read_tsc+0x10/0x10 [ 13.245468] ? ktime_get_ts64+0x86/0x230 [ 13.245494] kunit_try_run_case+0x1a5/0x480 [ 13.245517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.245539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.245562] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.245586] ? __kthread_parkme+0x82/0x180 [ 13.245608] ? preempt_count_sub+0x50/0x80 [ 13.245632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.245655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.245677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.245700] kthread+0x337/0x6f0 [ 13.245720] ? trace_preempt_on+0x20/0xc0 [ 13.245743] ? __pfx_kthread+0x10/0x10 [ 13.245765] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.245792] ? calculate_sigpending+0x7b/0xa0 [ 13.245812] ? __pfx_kthread+0x10/0x10 [ 13.245835] ret_from_fork+0x41/0x80 [ 13.245855] ? __pfx_kthread+0x10/0x10 [ 13.245876] ret_from_fork_asm+0x1a/0x30 [ 13.245907] </TASK> [ 13.245917] [ 13.260731] The buggy address belongs to the physical page: [ 13.261250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103af0 [ 13.261846] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.262075] flags: 0x200000000000040(head|node=0|zone=2) [ 13.262310] page_type: f8(unknown) [ 13.262449] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.262932] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.263255] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.263800] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.264122] head: 0200000000000002 ffffea00040ebc01 00000000ffffffff 00000000ffffffff [ 13.264573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.264890] page dumped because: kasan: bad access detected [ 13.265100] [ 13.265238] Memory state around the buggy address: [ 13.265537] ffff888103aeff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.265842] ffff888103aeff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.266115] >ffff888103af0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.266371] ^ [ 13.266581] ffff888103af0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.266855] ffff888103af0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.267126] ==================================================================
[ 23.292942] ================================================================== [ 23.294088] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.294860] Free of addr ffff00001019f501 by task kunit_try_catch/295 [ 23.295460] [ 23.295627] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.295678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.295694] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.295713] Call trace: [ 23.295726] show_stack+0x20/0x38 (C) [ 23.295758] dump_stack_lvl+0x8c/0xd0 [ 23.295791] print_report+0x118/0x608 [ 23.295821] kasan_report_invalid_free+0xc0/0xe8 [ 23.295853] check_slab_allocation+0xfc/0x108 [ 23.295884] __kasan_mempool_poison_object+0x78/0x150 [ 23.295917] mempool_free+0x28c/0x328 [ 23.295954] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.295994] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.296030] kunit_try_run_case+0x170/0x3f0 [ 23.296066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.296107] kthread+0x328/0x630 [ 23.296142] ret_from_fork+0x10/0x20 [ 23.296176] [ 23.303155] Allocated by task 295: [ 23.303483] kasan_save_stack+0x3c/0x68 [ 23.303859] kasan_save_track+0x20/0x40 [ 23.304231] kasan_save_alloc_info+0x40/0x58 [ 23.304646] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.305152] remove_element+0x130/0x1f8 [ 23.305530] mempool_alloc_preallocated+0x58/0xc0 [ 23.305985] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 23.306520] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.306999] kunit_try_run_case+0x170/0x3f0 [ 23.307406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.307932] kthread+0x328/0x630 [ 23.308256] ret_from_fork+0x10/0x20 [ 23.308607] [ 23.308762] The buggy address belongs to the object at ffff00001019f500 [ 23.308762] which belongs to the cache kmalloc-128 of size 128 [ 23.309898] The buggy address is located 1 bytes inside of [ 23.309898] 128-byte region [ffff00001019f500, ffff00001019f580) [ 23.310950] [ 23.311105] The buggy address belongs to the physical page: [ 23.311624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f [ 23.312356] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.312969] page_type: f5(slab) [ 23.313285] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 23.314002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.314712] page dumped because: kasan: bad access detected [ 23.315225] [ 23.315380] Memory state around the buggy address: [ 23.315829] ffff00001019f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.316497] ffff00001019f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.317164] >ffff00001019f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.317827] ^ [ 23.318140] ffff00001019f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.318808] ffff00001019f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.319470] ================================================================== [ 23.323176] ================================================================== [ 23.324345] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.325107] Free of addr ffff00000dc7c001 by task kunit_try_catch/297 [ 23.325706] [ 23.325875] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.325929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.325945] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.325963] Call trace: [ 23.325976] show_stack+0x20/0x38 (C) [ 23.326011] dump_stack_lvl+0x8c/0xd0 [ 23.326044] print_report+0x118/0x608 [ 23.326075] kasan_report_invalid_free+0xc0/0xe8 [ 23.326108] __kasan_mempool_poison_object+0xfc/0x150 [ 23.326142] mempool_free+0x28c/0x328 [ 23.326179] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.326219] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 23.326258] kunit_try_run_case+0x170/0x3f0 [ 23.326295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.326336] kthread+0x328/0x630 [ 23.326371] ret_from_fork+0x10/0x20 [ 23.326405] [ 23.333043] The buggy address belongs to the physical page: [ 23.333561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc7c [ 23.334288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.334996] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 23.335649] page_type: f8(unknown) [ 23.335985] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.336702] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.337419] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.338144] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 23.338869] head: 03fffe0000000002 fffffdffc0371f01 00000000ffffffff 00000000ffffffff [ 23.339593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.340310] page dumped because: kasan: bad access detected [ 23.340825] [ 23.340980] Memory state around the buggy address: [ 23.341429] ffff00000dc7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.342096] ffff00000dc7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.342764] >ffff00000dc7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.343427] ^ [ 23.343739] ffff00000dc7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.344406] ffff00000dc7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.345069] ==================================================================