Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.583806] ================================================================== [ 17.584014] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.584133] Free of addr fff00000c65ee300 by task kunit_try_catch/236 [ 17.584203] [ 17.584282] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.584364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.584635] Hardware name: linux,dummy-virt (DT) [ 17.584767] Call trace: [ 17.584816] show_stack+0x20/0x38 (C) [ 17.584871] dump_stack_lvl+0x8c/0xd0 [ 17.585063] print_report+0x118/0x5d0 [ 17.585217] kasan_report_invalid_free+0xc0/0xe8 [ 17.585276] check_slab_allocation+0xd4/0x108 [ 17.585327] __kasan_mempool_poison_object+0x78/0x150 [ 17.585430] mempool_free+0x28c/0x328 [ 17.585488] mempool_double_free_helper+0x150/0x2e8 [ 17.585536] mempool_kmalloc_double_free+0xc0/0x118 [ 17.585771] kunit_try_run_case+0x170/0x3f0 [ 17.585829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.585880] kthread+0x328/0x630 [ 17.586244] ret_from_fork+0x10/0x20 [ 17.586298] [ 17.586317] Allocated by task 236: [ 17.586354] kasan_save_stack+0x3c/0x68 [ 17.586410] kasan_save_track+0x20/0x40 [ 17.586445] kasan_save_alloc_info+0x40/0x58 [ 17.586755] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.586803] remove_element+0x130/0x1f8 [ 17.586840] mempool_alloc_preallocated+0x58/0xc0 [ 17.586878] mempool_double_free_helper+0x94/0x2e8 [ 17.586917] mempool_kmalloc_double_free+0xc0/0x118 [ 17.586969] kunit_try_run_case+0x170/0x3f0 [ 17.587020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.587326] kthread+0x328/0x630 [ 17.587785] ret_from_fork+0x10/0x20 [ 17.587832] [ 17.587850] Freed by task 236: [ 17.587878] kasan_save_stack+0x3c/0x68 [ 17.587920] kasan_save_track+0x20/0x40 [ 17.587958] kasan_save_free_info+0x4c/0x78 [ 17.588342] __kasan_mempool_poison_object+0xc0/0x150 [ 17.588449] mempool_free+0x28c/0x328 [ 17.588485] mempool_double_free_helper+0x100/0x2e8 [ 17.588764] mempool_kmalloc_double_free+0xc0/0x118 [ 17.588814] kunit_try_run_case+0x170/0x3f0 [ 17.588867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.588919] kthread+0x328/0x630 [ 17.589018] ret_from_fork+0x10/0x20 [ 17.589052] [ 17.589073] The buggy address belongs to the object at fff00000c65ee300 [ 17.589073] which belongs to the cache kmalloc-128 of size 128 [ 17.589136] The buggy address is located 0 bytes inside of [ 17.589136] 128-byte region [fff00000c65ee300, fff00000c65ee380) [ 17.589333] [ 17.589376] The buggy address belongs to the physical page: [ 17.589444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ee [ 17.589555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.589657] page_type: f5(slab) [ 17.589735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.589786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.589839] page dumped because: kasan: bad access detected [ 17.589871] [ 17.589940] Memory state around the buggy address: [ 17.590601] fff00000c65ee200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.590659] fff00000c65ee280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.590826] >fff00000c65ee300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.590906] ^ [ 17.591103] fff00000c65ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.591167] fff00000c65ee400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.591304] ================================================================== [ 17.657668] ================================================================== [ 17.657729] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.660682] Free of addr fff00000c7974000 by task kunit_try_catch/240 [ 17.660727] [ 17.660886] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.661348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.661378] Hardware name: linux,dummy-virt (DT) [ 17.662155] Call trace: [ 17.662782] show_stack+0x20/0x38 (C) [ 17.663500] dump_stack_lvl+0x8c/0xd0 [ 17.663672] print_report+0x118/0x5d0 [ 17.664115] kasan_report_invalid_free+0xc0/0xe8 [ 17.664531] __kasan_mempool_poison_pages+0xe0/0xe8 [ 17.665169] mempool_free+0x24c/0x328 [ 17.665539] mempool_double_free_helper+0x150/0x2e8 [ 17.665921] mempool_page_alloc_double_free+0xbc/0x118 [ 17.666285] kunit_try_run_case+0x170/0x3f0 [ 17.666340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.666398] kthread+0x328/0x630 [ 17.666443] ret_from_fork+0x10/0x20 [ 17.667728] [ 17.667754] The buggy address belongs to the physical page: [ 17.668143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107974 [ 17.668818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.669420] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 17.670010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.670554] page dumped because: kasan: bad access detected [ 17.671067] [ 17.671312] Memory state around the buggy address: [ 17.671471] fff00000c7973f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.672159] fff00000c7973f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.673049] >fff00000c7974000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.673122] ^ [ 17.673156] fff00000c7974080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.673278] fff00000c7974100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.673370] ================================================================== [ 17.614792] ================================================================== [ 17.614860] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.614920] Free of addr fff00000c7970000 by task kunit_try_catch/238 [ 17.614963] [ 17.615010] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.617273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.617810] Hardware name: linux,dummy-virt (DT) [ 17.617898] Call trace: [ 17.617922] show_stack+0x20/0x38 (C) [ 17.619197] dump_stack_lvl+0x8c/0xd0 [ 17.619569] print_report+0x118/0x5d0 [ 17.620148] kasan_report_invalid_free+0xc0/0xe8 [ 17.620448] __kasan_mempool_poison_object+0x14c/0x150 [ 17.621243] mempool_free+0x28c/0x328 [ 17.621493] mempool_double_free_helper+0x150/0x2e8 [ 17.621708] mempool_kmalloc_large_double_free+0xc0/0x118 [ 17.622360] kunit_try_run_case+0x170/0x3f0 [ 17.622863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.622931] kthread+0x328/0x630 [ 17.622976] ret_from_fork+0x10/0x20 [ 17.623767] [ 17.624015] The buggy address belongs to the physical page: [ 17.624366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107970 [ 17.625015] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.625180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.625841] page_type: f8(unknown) [ 17.626227] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.626754] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.626815] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.626865] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.626915] head: 0bfffe0000000002 ffffc1ffc31e5c01 00000000ffffffff 00000000ffffffff [ 17.628085] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.628556] page dumped because: kasan: bad access detected [ 17.628600] [ 17.628617] Memory state around the buggy address: [ 17.629271] fff00000c796ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.630051] fff00000c796ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.630266] >fff00000c7970000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.630394] ^ [ 17.631068] fff00000c7970080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.631294] fff00000c7970100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.631348] ==================================================================
[ 14.708903] ================================================================== [ 14.709462] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.709873] Free of addr ffff888102a04f00 by task kunit_try_catch/252 [ 14.710119] [ 14.710427] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.710478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.710490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.710512] Call Trace: [ 14.710523] <TASK> [ 14.710539] dump_stack_lvl+0x73/0xb0 [ 14.710582] print_report+0xd1/0x610 [ 14.710606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.710631] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.710655] ? mempool_double_free_helper+0x184/0x370 [ 14.710681] kasan_report_invalid_free+0x10a/0x130 [ 14.710707] ? mempool_double_free_helper+0x184/0x370 [ 14.710734] ? mempool_double_free_helper+0x184/0x370 [ 14.710758] ? mempool_double_free_helper+0x184/0x370 [ 14.710783] check_slab_allocation+0x101/0x130 [ 14.710806] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.710832] mempool_free+0x2ec/0x380 [ 14.710860] mempool_double_free_helper+0x184/0x370 [ 14.710886] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.710912] ? __pfx___resched_curr+0x10/0x10 [ 14.710935] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.710958] ? finish_task_switch.isra.0+0x153/0x700 [ 14.710984] mempool_kmalloc_double_free+0xed/0x140 [ 14.711009] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.711038] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.711062] ? __pfx_mempool_kfree+0x10/0x10 [ 14.711087] ? __pfx_read_tsc+0x10/0x10 [ 14.711109] ? ktime_get_ts64+0x86/0x230 [ 14.711135] kunit_try_run_case+0x1a5/0x480 [ 14.711161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.711209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.711277] ? __kthread_parkme+0x82/0x180 [ 14.711299] ? preempt_count_sub+0x50/0x80 [ 14.711323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.711416] kthread+0x337/0x6f0 [ 14.711435] ? trace_preempt_on+0x20/0xc0 [ 14.711459] ? __pfx_kthread+0x10/0x10 [ 14.711480] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.711503] ? calculate_sigpending+0x7b/0xa0 [ 14.711528] ? __pfx_kthread+0x10/0x10 [ 14.711559] ret_from_fork+0x116/0x1d0 [ 14.711579] ? __pfx_kthread+0x10/0x10 [ 14.711600] ret_from_fork_asm+0x1a/0x30 [ 14.711632] </TASK> [ 14.711642] [ 14.720988] Allocated by task 252: [ 14.721123] kasan_save_stack+0x45/0x70 [ 14.721357] kasan_save_track+0x18/0x40 [ 14.721590] kasan_save_alloc_info+0x3b/0x50 [ 14.721814] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.722070] remove_element+0x11e/0x190 [ 14.722274] mempool_alloc_preallocated+0x4d/0x90 [ 14.722501] mempool_double_free_helper+0x8a/0x370 [ 14.722743] mempool_kmalloc_double_free+0xed/0x140 [ 14.722952] kunit_try_run_case+0x1a5/0x480 [ 14.723113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.723321] kthread+0x337/0x6f0 [ 14.723492] ret_from_fork+0x116/0x1d0 [ 14.723774] ret_from_fork_asm+0x1a/0x30 [ 14.723984] [ 14.724087] Freed by task 252: [ 14.724216] kasan_save_stack+0x45/0x70 [ 14.724697] kasan_save_track+0x18/0x40 [ 14.724842] kasan_save_free_info+0x3f/0x60 [ 14.725020] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.725340] mempool_free+0x2ec/0x380 [ 14.725577] mempool_double_free_helper+0x109/0x370 [ 14.725774] mempool_kmalloc_double_free+0xed/0x140 [ 14.725998] kunit_try_run_case+0x1a5/0x480 [ 14.726191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.726484] kthread+0x337/0x6f0 [ 14.726654] ret_from_fork+0x116/0x1d0 [ 14.726848] ret_from_fork_asm+0x1a/0x30 [ 14.727042] [ 14.727127] The buggy address belongs to the object at ffff888102a04f00 [ 14.727127] which belongs to the cache kmalloc-128 of size 128 [ 14.727660] The buggy address is located 0 bytes inside of [ 14.727660] 128-byte region [ffff888102a04f00, ffff888102a04f80) [ 14.728009] [ 14.728109] The buggy address belongs to the physical page: [ 14.728443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a04 [ 14.728810] flags: 0x200000000000000(node=0|zone=2) [ 14.729047] page_type: f5(slab) [ 14.729215] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.729678] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 14.729944] page dumped because: kasan: bad access detected [ 14.730201] [ 14.730367] Memory state around the buggy address: [ 14.730637] ffff888102a04e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.730960] ffff888102a04e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.731267] >ffff888102a04f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.731543] ^ [ 14.731717] ffff888102a04f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.732005] ffff888102a05000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.732255] ================================================================== [ 14.771632] ================================================================== [ 14.772065] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.772319] Free of addr ffff8881027e4000 by task kunit_try_catch/256 [ 14.772520] [ 14.772622] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.772666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.772678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.772698] Call Trace: [ 14.772711] <TASK> [ 14.772726] dump_stack_lvl+0x73/0xb0 [ 14.772755] print_report+0xd1/0x610 [ 14.772776] ? __virt_addr_valid+0x1db/0x2d0 [ 14.772800] ? kasan_addr_to_slab+0x11/0xa0 [ 14.772820] ? mempool_double_free_helper+0x184/0x370 [ 14.772845] kasan_report_invalid_free+0x10a/0x130 [ 14.772920] ? mempool_double_free_helper+0x184/0x370 [ 14.772950] ? mempool_double_free_helper+0x184/0x370 [ 14.772975] __kasan_mempool_poison_pages+0x115/0x130 [ 14.773001] mempool_free+0x290/0x380 [ 14.773029] mempool_double_free_helper+0x184/0x370 [ 14.773055] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.773497] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.773526] ? finish_task_switch.isra.0+0x153/0x700 [ 14.773568] mempool_page_alloc_double_free+0xe8/0x140 [ 14.773597] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.773627] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.773653] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.773680] ? __pfx_read_tsc+0x10/0x10 [ 14.773701] ? ktime_get_ts64+0x86/0x230 [ 14.773726] kunit_try_run_case+0x1a5/0x480 [ 14.773753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.773777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.773802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.773826] ? __kthread_parkme+0x82/0x180 [ 14.773848] ? preempt_count_sub+0x50/0x80 [ 14.773871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.773896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.773922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.773948] kthread+0x337/0x6f0 [ 14.773968] ? trace_preempt_on+0x20/0xc0 [ 14.773992] ? __pfx_kthread+0x10/0x10 [ 14.774014] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.774036] ? calculate_sigpending+0x7b/0xa0 [ 14.774061] ? __pfx_kthread+0x10/0x10 [ 14.774082] ret_from_fork+0x116/0x1d0 [ 14.774101] ? __pfx_kthread+0x10/0x10 [ 14.774122] ret_from_fork_asm+0x1a/0x30 [ 14.774154] </TASK> [ 14.774165] [ 14.783508] The buggy address belongs to the physical page: [ 14.783786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4 [ 14.784148] flags: 0x200000000000000(node=0|zone=2) [ 14.784398] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.785008] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.785362] page dumped because: kasan: bad access detected [ 14.785721] [ 14.785807] Memory state around the buggy address: [ 14.785972] ffff8881027e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.786325] ffff8881027e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.786661] >ffff8881027e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.786949] ^ [ 14.787098] ffff8881027e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.787473] ffff8881027e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.787833] ================================================================== [ 14.739565] ================================================================== [ 14.740069] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.740604] Free of addr ffff8881039f8000 by task kunit_try_catch/254 [ 14.741724] [ 14.742081] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.742132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.742145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.742166] Call Trace: [ 14.742229] <TASK> [ 14.742258] dump_stack_lvl+0x73/0xb0 [ 14.742437] print_report+0xd1/0x610 [ 14.742466] ? __virt_addr_valid+0x1db/0x2d0 [ 14.742492] ? kasan_addr_to_slab+0x11/0xa0 [ 14.742513] ? mempool_double_free_helper+0x184/0x370 [ 14.742539] kasan_report_invalid_free+0x10a/0x130 [ 14.742580] ? mempool_double_free_helper+0x184/0x370 [ 14.742608] ? mempool_double_free_helper+0x184/0x370 [ 14.742632] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.742658] mempool_free+0x2ec/0x380 [ 14.742684] mempool_double_free_helper+0x184/0x370 [ 14.742711] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.742738] ? __kasan_check_write+0x18/0x20 [ 14.742759] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.742782] ? finish_task_switch.isra.0+0x153/0x700 [ 14.742809] mempool_kmalloc_large_double_free+0xed/0x140 [ 14.742835] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.742865] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.742889] ? __pfx_mempool_kfree+0x10/0x10 [ 14.742914] ? __pfx_read_tsc+0x10/0x10 [ 14.742936] ? ktime_get_ts64+0x86/0x230 [ 14.742960] kunit_try_run_case+0x1a5/0x480 [ 14.742985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.743009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.743034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.743059] ? __kthread_parkme+0x82/0x180 [ 14.743081] ? preempt_count_sub+0x50/0x80 [ 14.743105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.743130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.743155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.743181] kthread+0x337/0x6f0 [ 14.743201] ? trace_preempt_on+0x20/0xc0 [ 14.743224] ? __pfx_kthread+0x10/0x10 [ 14.743245] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.743268] ? calculate_sigpending+0x7b/0xa0 [ 14.743294] ? __pfx_kthread+0x10/0x10 [ 14.743315] ret_from_fork+0x116/0x1d0 [ 14.743334] ? __pfx_kthread+0x10/0x10 [ 14.743354] ret_from_fork_asm+0x1a/0x30 [ 14.743386] </TASK> [ 14.743397] [ 14.759250] The buggy address belongs to the physical page: [ 14.759648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f8 [ 14.759962] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.760295] flags: 0x200000000000040(head|node=0|zone=2) [ 14.760571] page_type: f8(unknown) [ 14.760698] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.761446] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.762106] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.762625] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.763099] head: 0200000000000002 ffffea00040e7e01 00000000ffffffff 00000000ffffffff [ 14.763998] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.764716] page dumped because: kasan: bad access detected [ 14.764978] [ 14.765069] Memory state around the buggy address: [ 14.765505] ffff8881039f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.766135] ffff8881039f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.766598] >ffff8881039f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.767051] ^ [ 14.767206] ffff8881039f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.767925] ffff8881039f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.768481] ==================================================================