Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 19.194174] ================================================================== [ 19.194239] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.194297] Free of addr fff00000c69b6e01 by task kunit_try_catch/242 [ 19.194338] [ 19.194373] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.194454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.194481] Hardware name: linux,dummy-virt (DT) [ 19.194524] Call trace: [ 19.194548] show_stack+0x20/0x38 (C) [ 19.194644] dump_stack_lvl+0x8c/0xd0 [ 19.194695] print_report+0x118/0x608 [ 19.195041] kasan_report_invalid_free+0xc0/0xe8 [ 19.195240] check_slab_allocation+0xfc/0x108 [ 19.195362] __kasan_mempool_poison_object+0x78/0x150 [ 19.195431] mempool_free+0x28c/0x328 [ 19.195477] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.195553] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.195679] kunit_try_run_case+0x170/0x3f0 [ 19.195739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.196199] kthread+0x328/0x630 [ 19.196251] ret_from_fork+0x10/0x20 [ 19.196300] [ 19.196317] Allocated by task 242: [ 19.196365] kasan_save_stack+0x3c/0x68 [ 19.196422] kasan_save_track+0x20/0x40 [ 19.196460] kasan_save_alloc_info+0x40/0x58 [ 19.196498] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.196540] remove_element+0x130/0x1f8 [ 19.196576] mempool_alloc_preallocated+0x58/0xc0 [ 19.196613] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 19.196655] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.196694] kunit_try_run_case+0x170/0x3f0 [ 19.196730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.196773] kthread+0x328/0x630 [ 19.196804] ret_from_fork+0x10/0x20 [ 19.196838] [ 19.196857] The buggy address belongs to the object at fff00000c69b6e00 [ 19.196857] which belongs to the cache kmalloc-128 of size 128 [ 19.196917] The buggy address is located 1 bytes inside of [ 19.196917] 128-byte region [fff00000c69b6e00, fff00000c69b6e80) [ 19.196985] [ 19.197005] The buggy address belongs to the physical page: [ 19.197036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6 [ 19.197091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.197140] page_type: f5(slab) [ 19.197178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.197228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.197269] page dumped because: kasan: bad access detected [ 19.197299] [ 19.197316] Memory state around the buggy address: [ 19.197349] fff00000c69b6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.197392] fff00000c69b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197433] >fff00000c69b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.197472] ^ [ 19.197497] fff00000c69b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197538] fff00000c69b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.197577] ================================================================== [ 19.206116] ================================================================== [ 19.206441] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.206660] Free of addr fff00000c7904001 by task kunit_try_catch/244 [ 19.206706] [ 19.206740] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.206821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.206849] Hardware name: linux,dummy-virt (DT) [ 19.207009] Call trace: [ 19.207036] show_stack+0x20/0x38 (C) [ 19.207238] dump_stack_lvl+0x8c/0xd0 [ 19.207370] print_report+0x118/0x608 [ 19.207456] kasan_report_invalid_free+0xc0/0xe8 [ 19.207554] __kasan_mempool_poison_object+0xfc/0x150 [ 19.207638] mempool_free+0x28c/0x328 [ 19.207685] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.207742] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 19.207865] kunit_try_run_case+0x170/0x3f0 [ 19.208076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.208153] kthread+0x328/0x630 [ 19.208192] ret_from_fork+0x10/0x20 [ 19.208281] [ 19.208336] The buggy address belongs to the physical page: [ 19.208431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904 [ 19.208585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.208634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.208690] page_type: f8(unknown) [ 19.209638] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.210177] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.210578] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.210883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.211015] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff [ 19.211088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.211162] page dumped because: kasan: bad access detected [ 19.211228] [ 19.211252] Memory state around the buggy address: [ 19.211289] fff00000c7903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.211357] fff00000c7903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.211401] >fff00000c7904000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.211440] ^ [ 19.211466] fff00000c7904080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.211640] fff00000c7904100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.211692] ==================================================================
[ 18.815677] ================================================================== [ 18.815884] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.815996] Free of addr fff00000c7729e01 by task kunit_try_catch/242 [ 18.816314] [ 18.816358] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.816440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.816696] Hardware name: linux,dummy-virt (DT) [ 18.816792] Call trace: [ 18.816819] show_stack+0x20/0x38 (C) [ 18.816872] dump_stack_lvl+0x8c/0xd0 [ 18.816933] print_report+0x118/0x608 [ 18.817490] kasan_report_invalid_free+0xc0/0xe8 [ 18.817575] check_slab_allocation+0xfc/0x108 [ 18.817624] __kasan_mempool_poison_object+0x78/0x150 [ 18.817676] mempool_free+0x28c/0x328 [ 18.817721] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.818068] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.818143] kunit_try_run_case+0x170/0x3f0 [ 18.818194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.818495] kthread+0x328/0x630 [ 18.818670] ret_from_fork+0x10/0x20 [ 18.818732] [ 18.818750] Allocated by task 242: [ 18.819149] kasan_save_stack+0x3c/0x68 [ 18.819253] kasan_save_track+0x20/0x40 [ 18.819434] kasan_save_alloc_info+0x40/0x58 [ 18.819633] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.819705] remove_element+0x130/0x1f8 [ 18.819879] mempool_alloc_preallocated+0x58/0xc0 [ 18.820193] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.820329] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.820434] kunit_try_run_case+0x170/0x3f0 [ 18.820490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.820827] kthread+0x328/0x630 [ 18.821028] ret_from_fork+0x10/0x20 [ 18.821134] [ 18.821473] The buggy address belongs to the object at fff00000c7729e00 [ 18.821473] which belongs to the cache kmalloc-128 of size 128 [ 18.821552] The buggy address is located 1 bytes inside of [ 18.821552] 128-byte region [fff00000c7729e00, fff00000c7729e80) [ 18.821710] [ 18.821750] The buggy address belongs to the physical page: [ 18.821811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107729 [ 18.822215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.822360] page_type: f5(slab) [ 18.822425] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.822488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.822529] page dumped because: kasan: bad access detected [ 18.822881] [ 18.822954] Memory state around the buggy address: [ 18.823049] fff00000c7729d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.823143] fff00000c7729d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.823223] >fff00000c7729e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.823262] ^ [ 18.823440] fff00000c7729e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.823628] fff00000c7729f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.824013] ================================================================== [ 18.832683] ================================================================== [ 18.832808] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.832903] Free of addr fff00000c7858001 by task kunit_try_catch/244 [ 18.833135] [ 18.833276] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.833365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.833392] Hardware name: linux,dummy-virt (DT) [ 18.833458] Call trace: [ 18.833483] show_stack+0x20/0x38 (C) [ 18.833536] dump_stack_lvl+0x8c/0xd0 [ 18.833694] print_report+0x118/0x608 [ 18.833746] kasan_report_invalid_free+0xc0/0xe8 [ 18.833844] __kasan_mempool_poison_object+0xfc/0x150 [ 18.833897] mempool_free+0x28c/0x328 [ 18.834330] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.834512] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.834683] kunit_try_run_case+0x170/0x3f0 [ 18.834907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.835124] kthread+0x328/0x630 [ 18.835301] ret_from_fork+0x10/0x20 [ 18.835515] [ 18.835594] The buggy address belongs to the physical page: [ 18.835667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107858 [ 18.835834] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.835893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.836281] page_type: f8(unknown) [ 18.836329] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.836654] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.836748] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.836902] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.837112] head: 0bfffe0000000002 ffffc1ffc31e1601 00000000ffffffff 00000000ffffffff [ 18.837189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.837242] page dumped because: kasan: bad access detected [ 18.837462] [ 18.837674] Memory state around the buggy address: [ 18.837754] fff00000c7857f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.837908] fff00000c7857f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.838015] >fff00000c7858000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.838169] ^ [ 18.838200] fff00000c7858080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.838454] fff00000c7858100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.838566] ==================================================================
[ 15.296876] ================================================================== [ 15.297400] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.298106] Free of addr ffff888103ad8001 by task kunit_try_catch/261 [ 15.298471] [ 15.298656] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.298726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.298746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.298776] Call Trace: [ 15.298798] <TASK> [ 15.298824] dump_stack_lvl+0x73/0xb0 [ 15.298879] print_report+0xd1/0x650 [ 15.298921] ? __virt_addr_valid+0x1db/0x2d0 [ 15.298962] ? kasan_addr_to_slab+0x11/0xa0 [ 15.298998] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.299045] kasan_report_invalid_free+0x10a/0x130 [ 15.299083] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.299122] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.299156] __kasan_mempool_poison_object+0x102/0x1d0 [ 15.299194] mempool_free+0x2ec/0x380 [ 15.299240] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.299285] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 15.299331] ? __kasan_check_write+0x18/0x20 [ 15.299363] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.299399] ? finish_task_switch.isra.0+0x153/0x700 [ 15.299451] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 15.299488] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 15.299553] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.299608] ? __pfx_mempool_kfree+0x10/0x10 [ 15.299677] ? __pfx_read_tsc+0x10/0x10 [ 15.299735] ? ktime_get_ts64+0x86/0x230 [ 15.299797] kunit_try_run_case+0x1a5/0x480 [ 15.299862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.299908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.299970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.300033] ? __kthread_parkme+0x82/0x180 [ 15.300068] ? preempt_count_sub+0x50/0x80 [ 15.300111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.300142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.300164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.300185] kthread+0x337/0x6f0 [ 15.300203] ? trace_preempt_on+0x20/0xc0 [ 15.300226] ? __pfx_kthread+0x10/0x10 [ 15.300244] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.300263] ? calculate_sigpending+0x7b/0xa0 [ 15.300285] ? __pfx_kthread+0x10/0x10 [ 15.300304] ret_from_fork+0x116/0x1d0 [ 15.300321] ? __pfx_kthread+0x10/0x10 [ 15.300339] ret_from_fork_asm+0x1a/0x30 [ 15.300368] </TASK> [ 15.300380] [ 15.312473] The buggy address belongs to the physical page: [ 15.313001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad8 [ 15.313705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.314255] flags: 0x200000000000040(head|node=0|zone=2) [ 15.314963] page_type: f8(unknown) [ 15.315262] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.315947] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.316605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.317182] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.317818] head: 0200000000000002 ffffea00040eb601 00000000ffffffff 00000000ffffffff [ 15.318275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.318875] page dumped because: kasan: bad access detected [ 15.319156] [ 15.319317] Memory state around the buggy address: [ 15.319995] ffff888103ad7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.320244] ffff888103ad7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.320867] >ffff888103ad8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.321185] ^ [ 15.321477] ffff888103ad8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.322068] ffff888103ad8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.322677] ================================================================== [ 15.258317] ================================================================== [ 15.259321] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.259946] Free of addr ffff888102abe201 by task kunit_try_catch/259 [ 15.260456] [ 15.260838] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.260933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.260953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.260986] Call Trace: [ 15.261008] <TASK> [ 15.261032] dump_stack_lvl+0x73/0xb0 [ 15.261091] print_report+0xd1/0x650 [ 15.261149] ? __virt_addr_valid+0x1db/0x2d0 [ 15.261197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.261260] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.261305] kasan_report_invalid_free+0x10a/0x130 [ 15.261358] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.261405] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.261431] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.261453] check_slab_allocation+0x11f/0x130 [ 15.261474] __kasan_mempool_poison_object+0x91/0x1d0 [ 15.261498] mempool_free+0x2ec/0x380 [ 15.261648] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.261675] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 15.261701] ? __kasan_check_write+0x18/0x20 [ 15.261720] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.261740] ? finish_task_switch.isra.0+0x153/0x700 [ 15.261766] mempool_kmalloc_invalid_free+0xed/0x140 [ 15.261788] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 15.261812] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.261832] ? __pfx_mempool_kfree+0x10/0x10 [ 15.261855] ? __pfx_read_tsc+0x10/0x10 [ 15.261875] ? ktime_get_ts64+0x86/0x230 [ 15.261899] kunit_try_run_case+0x1a5/0x480 [ 15.261933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.261954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.261977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.261998] ? __kthread_parkme+0x82/0x180 [ 15.262017] ? preempt_count_sub+0x50/0x80 [ 15.262039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.262104] kthread+0x337/0x6f0 [ 15.262129] ? trace_preempt_on+0x20/0xc0 [ 15.262152] ? __pfx_kthread+0x10/0x10 [ 15.262171] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.262190] ? calculate_sigpending+0x7b/0xa0 [ 15.262213] ? __pfx_kthread+0x10/0x10 [ 15.262232] ret_from_fork+0x116/0x1d0 [ 15.262249] ? __pfx_kthread+0x10/0x10 [ 15.262268] ret_from_fork_asm+0x1a/0x30 [ 15.262305] </TASK> [ 15.262321] [ 15.278177] Allocated by task 259: [ 15.278349] kasan_save_stack+0x45/0x70 [ 15.278541] kasan_save_track+0x18/0x40 [ 15.279118] kasan_save_alloc_info+0x3b/0x50 [ 15.279338] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.279565] remove_element+0x11e/0x190 [ 15.279750] mempool_alloc_preallocated+0x4d/0x90 [ 15.279963] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 15.280824] mempool_kmalloc_invalid_free+0xed/0x140 [ 15.281437] kunit_try_run_case+0x1a5/0x480 [ 15.282088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.282321] kthread+0x337/0x6f0 [ 15.282891] ret_from_fork+0x116/0x1d0 [ 15.283095] ret_from_fork_asm+0x1a/0x30 [ 15.283295] [ 15.283398] The buggy address belongs to the object at ffff888102abe200 [ 15.283398] which belongs to the cache kmalloc-128 of size 128 [ 15.284681] The buggy address is located 1 bytes inside of [ 15.284681] 128-byte region [ffff888102abe200, ffff888102abe280) [ 15.285463] [ 15.285884] The buggy address belongs to the physical page: [ 15.286255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102abe [ 15.286721] flags: 0x200000000000000(node=0|zone=2) [ 15.286880] page_type: f5(slab) [ 15.286964] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.287090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.287961] page dumped because: kasan: bad access detected [ 15.288192] [ 15.288388] Memory state around the buggy address: [ 15.288780] ffff888102abe100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.289133] ffff888102abe180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289843] >ffff888102abe200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.290216] ^ [ 15.290360] ffff888102abe280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.290797] ffff888102abe300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.291230] ==================================================================
[ 15.326673] ================================================================== [ 15.327305] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.327681] Free of addr ffff8881039f3501 by task kunit_try_catch/258 [ 15.327999] [ 15.328144] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.328189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.328201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.328223] Call Trace: [ 15.328235] <TASK> [ 15.328250] dump_stack_lvl+0x73/0xb0 [ 15.328278] print_report+0xd1/0x650 [ 15.328302] ? __virt_addr_valid+0x1db/0x2d0 [ 15.328325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.328351] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.328379] kasan_report_invalid_free+0x10a/0x130 [ 15.328403] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.328431] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.328456] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.328479] check_slab_allocation+0x11f/0x130 [ 15.328502] __kasan_mempool_poison_object+0x91/0x1d0 [ 15.328527] mempool_free+0x2ec/0x380 [ 15.328555] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.328581] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 15.328611] ? finish_task_switch.isra.0+0x153/0x700 [ 15.328637] mempool_kmalloc_invalid_free+0xed/0x140 [ 15.328661] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 15.328689] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.328711] ? __pfx_mempool_kfree+0x10/0x10 [ 15.328756] ? __pfx_read_tsc+0x10/0x10 [ 15.328777] ? ktime_get_ts64+0x86/0x230 [ 15.328802] kunit_try_run_case+0x1a5/0x480 [ 15.328827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.328850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.328874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.328897] ? __kthread_parkme+0x82/0x180 [ 15.328917] ? preempt_count_sub+0x50/0x80 [ 15.328941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.328965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.329011] kthread+0x337/0x6f0 [ 15.329031] ? trace_preempt_on+0x20/0xc0 [ 15.329064] ? __pfx_kthread+0x10/0x10 [ 15.329085] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.329106] ? calculate_sigpending+0x7b/0xa0 [ 15.329131] ? __pfx_kthread+0x10/0x10 [ 15.329156] ret_from_fork+0x116/0x1d0 [ 15.329176] ? __pfx_kthread+0x10/0x10 [ 15.329197] ret_from_fork_asm+0x1a/0x30 [ 15.329229] </TASK> [ 15.329240] [ 15.338854] Allocated by task 258: [ 15.339014] kasan_save_stack+0x45/0x70 [ 15.339225] kasan_save_track+0x18/0x40 [ 15.339400] kasan_save_alloc_info+0x3b/0x50 [ 15.339603] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.339819] remove_element+0x11e/0x190 [ 15.340083] mempool_alloc_preallocated+0x4d/0x90 [ 15.340325] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 15.340627] mempool_kmalloc_invalid_free+0xed/0x140 [ 15.340797] kunit_try_run_case+0x1a5/0x480 [ 15.340948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.341174] kthread+0x337/0x6f0 [ 15.341347] ret_from_fork+0x116/0x1d0 [ 15.341541] ret_from_fork_asm+0x1a/0x30 [ 15.341917] [ 15.342021] The buggy address belongs to the object at ffff8881039f3500 [ 15.342021] which belongs to the cache kmalloc-128 of size 128 [ 15.342528] The buggy address is located 1 bytes inside of [ 15.342528] 128-byte region [ffff8881039f3500, ffff8881039f3580) [ 15.343126] [ 15.343228] The buggy address belongs to the physical page: [ 15.343411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f3 [ 15.343702] flags: 0x200000000000000(node=0|zone=2) [ 15.344008] page_type: f5(slab) [ 15.344198] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.344556] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.345064] page dumped because: kasan: bad access detected [ 15.345246] [ 15.345319] Memory state around the buggy address: [ 15.345480] ffff8881039f3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.345856] ffff8881039f3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.346191] >ffff8881039f3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.346515] ^ [ 15.346685] ffff8881039f3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.347068] ffff8881039f3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.347300] ================================================================== [ 15.349547] ================================================================== [ 15.350486] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.350873] Free of addr ffff888102a10001 by task kunit_try_catch/260 [ 15.351422] [ 15.351547] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.351594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.351605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.351627] Call Trace: [ 15.351639] <TASK> [ 15.351653] dump_stack_lvl+0x73/0xb0 [ 15.351683] print_report+0xd1/0x650 [ 15.351706] ? __virt_addr_valid+0x1db/0x2d0 [ 15.351729] ? kasan_addr_to_slab+0x11/0xa0 [ 15.351750] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.351776] kasan_report_invalid_free+0x10a/0x130 [ 15.351801] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.351829] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.351854] __kasan_mempool_poison_object+0x102/0x1d0 [ 15.351878] mempool_free+0x2ec/0x380 [ 15.351906] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 15.351931] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 15.351955] ? update_load_avg+0x1be/0x21b0 [ 15.351984] ? finish_task_switch.isra.0+0x153/0x700 [ 15.352010] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 15.352035] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 15.352077] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.352100] ? __pfx_mempool_kfree+0x10/0x10 [ 15.352126] ? __pfx_read_tsc+0x10/0x10 [ 15.352146] ? ktime_get_ts64+0x86/0x230 [ 15.352171] kunit_try_run_case+0x1a5/0x480 [ 15.352195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.352218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.352242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.352265] ? __kthread_parkme+0x82/0x180 [ 15.352285] ? preempt_count_sub+0x50/0x80 [ 15.352309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.352333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.352356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.352380] kthread+0x337/0x6f0 [ 15.352400] ? trace_preempt_on+0x20/0xc0 [ 15.352423] ? __pfx_kthread+0x10/0x10 [ 15.352445] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.352466] ? calculate_sigpending+0x7b/0xa0 [ 15.352490] ? __pfx_kthread+0x10/0x10 [ 15.352513] ret_from_fork+0x116/0x1d0 [ 15.352531] ? __pfx_kthread+0x10/0x10 [ 15.352552] ret_from_fork_asm+0x1a/0x30 [ 15.352583] </TASK> [ 15.352595] [ 15.361981] The buggy address belongs to the physical page: [ 15.362293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a10 [ 15.362743] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.363204] flags: 0x200000000000040(head|node=0|zone=2) [ 15.363412] page_type: f8(unknown) [ 15.363552] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.363882] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.364306] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.365073] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.365414] head: 0200000000000002 ffffea00040a8401 00000000ffffffff 00000000ffffffff [ 15.365737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.366016] page dumped because: kasan: bad access detected [ 15.366480] [ 15.366582] Memory state around the buggy address: [ 15.366771] ffff888102a0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.367100] ffff888102a0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.367445] >ffff888102a10000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.367903] ^ [ 15.368082] ffff888102a10080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.368395] ffff888102a10100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.368684] ==================================================================
[ 40.023043] ================================================================== [ 40.035072] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.043081] Free of addr ffff888104eb8001 by task kunit_try_catch/284 [ 40.049527] [ 40.051028] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 40.051037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 40.051040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.051044] Call Trace: [ 40.051046] <TASK> [ 40.051048] dump_stack_lvl+0x73/0xb0 [ 40.051053] print_report+0xd1/0x650 [ 40.051057] ? __virt_addr_valid+0x1db/0x2d0 [ 40.051061] ? kasan_addr_to_slab+0x11/0xa0 [ 40.051064] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051070] kasan_report_invalid_free+0x10a/0x130 [ 40.051074] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051079] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051084] __kasan_mempool_poison_object+0x102/0x1d0 [ 40.051089] mempool_free+0x2ec/0x380 [ 40.051094] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051098] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 40.051104] ? __pfx_sched_clock_cpu+0x10/0x10 [ 40.051108] ? finish_task_switch.isra.0+0x153/0x700 [ 40.051112] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 40.051117] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 40.051122] ? __pfx_mempool_kmalloc+0x10/0x10 [ 40.051126] ? __pfx_mempool_kfree+0x10/0x10 [ 40.051131] ? ktime_get_ts64+0x83/0x230 [ 40.051136] kunit_try_run_case+0x1a2/0x480 [ 40.051140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.051144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.051149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.051153] ? __kthread_parkme+0x82/0x180 [ 40.051157] ? preempt_count_sub+0x50/0x80 [ 40.051161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.051165] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.051169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.051174] kthread+0x334/0x6f0 [ 40.051177] ? trace_preempt_on+0x20/0xc0 [ 40.051181] ? __pfx_kthread+0x10/0x10 [ 40.051185] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.051189] ? calculate_sigpending+0x7b/0xa0 [ 40.051193] ? __pfx_kthread+0x10/0x10 [ 40.051197] ret_from_fork+0x113/0x1d0 [ 40.051200] ? __pfx_kthread+0x10/0x10 [ 40.051204] ret_from_fork_asm+0x1a/0x30 [ 40.051210] </TASK> [ 40.051212] [ 40.253515] The buggy address belongs to the physical page: [ 40.259086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8 [ 40.267085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.274739] flags: 0x200000000000040(head|node=0|zone=2) [ 40.280051] page_type: f8(unknown) [ 40.283458] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.291205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.298945] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.306772] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.314597] head: 0200000000000002 ffffea000413ae01 00000000ffffffff 00000000ffffffff [ 40.322424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.330256] page dumped because: kasan: bad access detected [ 40.335829] [ 40.337330] Memory state around the buggy address: [ 40.342150] ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 40.349378] ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 40.356621] >ffff888104eb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.363839] ^ [ 40.367075] ffff888104eb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.374302] ffff888104eb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.381519] ================================================================== [ 39.594219] ================================================================== [ 39.606404] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.614412] Free of addr ffff8881066f8f01 by task kunit_try_catch/282 [ 39.620852] [ 39.622365] CPU: 3 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 39.622374] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 39.622389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.622393] Call Trace: [ 39.622394] <TASK> [ 39.622396] dump_stack_lvl+0x73/0xb0 [ 39.622401] print_report+0xd1/0x650 [ 39.622405] ? __virt_addr_valid+0x1db/0x2d0 [ 39.622409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 39.622414] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622419] kasan_report_invalid_free+0x10a/0x130 [ 39.622424] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622429] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622434] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622438] check_slab_allocation+0x11f/0x130 [ 39.622442] __kasan_mempool_poison_object+0x91/0x1d0 [ 39.622447] mempool_free+0x2ec/0x380 [ 39.622452] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622456] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 39.622462] ? __kasan_check_write+0x18/0x20 [ 39.622465] ? __pfx_sched_clock_cpu+0x10/0x10 [ 39.622469] ? finish_task_switch.isra.0+0x153/0x700 [ 39.622474] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.622478] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 39.622483] ? __pfx_mempool_kmalloc+0x10/0x10 [ 39.622487] ? __pfx_mempool_kfree+0x10/0x10 [ 39.622492] ? ktime_get_ts64+0x83/0x230 [ 39.622496] kunit_try_run_case+0x1a2/0x480 [ 39.622501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.622505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.622509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.622513] ? __kthread_parkme+0x82/0x180 [ 39.622517] ? preempt_count_sub+0x50/0x80 [ 39.622521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.622526] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.622530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.622534] kthread+0x334/0x6f0 [ 39.622538] ? trace_preempt_on+0x20/0xc0 [ 39.622542] ? __pfx_kthread+0x10/0x10 [ 39.622545] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.622549] ? calculate_sigpending+0x7b/0xa0 [ 39.622554] ? __pfx_kthread+0x10/0x10 [ 39.622558] ret_from_fork+0x113/0x1d0 [ 39.622561] ? __pfx_kthread+0x10/0x10 [ 39.622565] ret_from_fork_asm+0x1a/0x30 [ 39.622570] </TASK> [ 39.622572] [ 39.839578] Allocated by task 282: [ 39.842986] kasan_save_stack+0x45/0x70 [ 39.846831] kasan_save_track+0x18/0x40 [ 39.850672] kasan_save_alloc_info+0x3b/0x50 [ 39.854945] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 39.860259] remove_element+0x11e/0x190 [ 39.864106] mempool_alloc_preallocated+0x4d/0x90 [ 39.868812] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 39.874405] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.879387] kunit_try_run_case+0x1a2/0x480 [ 39.883578] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.888979] kthread+0x334/0x6f0 [ 39.892210] ret_from_fork+0x113/0x1d0 [ 39.895963] ret_from_fork_asm+0x1a/0x30 [ 39.899889] [ 39.901409] The buggy address belongs to the object at ffff8881066f8f00 [ 39.901409] which belongs to the cache kmalloc-128 of size 128 [ 39.913923] The buggy address is located 1 bytes inside of [ 39.913923] 128-byte region [ffff8881066f8f00, ffff8881066f8f80) [ 39.925492] [ 39.926991] The buggy address belongs to the physical page: [ 39.932563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 39.940570] flags: 0x200000000000000(node=0|zone=2) [ 39.945451] page_type: f5(slab) [ 39.948599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 39.956370] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 39.964134] page dumped because: kasan: bad access detected [ 39.969708] [ 39.971207] Memory state around the buggy address: [ 39.976000] ffff8881066f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.983221] ffff8881066f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.990438] >ffff8881066f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.997658] ^ [ 40.000890] ffff8881066f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.008111] ffff8881066f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.015347] ==================================================================