Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 36.537928] ================================================================== [ 36.539523] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 36.540617] Free of addr fff00000c6a52900 by task kunit_try_catch/224 [ 36.542873] [ 36.543258] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.545380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.546012] Hardware name: linux,dummy-virt (DT) [ 36.546880] Call trace: [ 36.547464] show_stack+0x20/0x38 (C) [ 36.548257] dump_stack_lvl+0x8c/0xd0 [ 36.549159] print_report+0x118/0x5e0 [ 36.550005] kasan_report_invalid_free+0xb0/0xd8 [ 36.550665] check_slab_allocation+0xd4/0x108 [ 36.551343] __kasan_mempool_poison_object+0x78/0x150 [ 36.552422] mempool_free+0x28c/0x328 [ 36.552995] mempool_double_free_helper+0x150/0x2e0 [ 36.553578] mempool_kmalloc_double_free+0xb8/0x110 [ 36.555751] kunit_try_run_case+0x14c/0x3d0 [ 36.557799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.559890] kthread+0x24c/0x2d0 [ 36.560338] ret_from_fork+0x10/0x20 [ 36.562610] [ 36.563520] Allocated by task 224: [ 36.564834] kasan_save_stack+0x3c/0x68 [ 36.565996] kasan_save_track+0x20/0x40 [ 36.566779] kasan_save_alloc_info+0x40/0x58 [ 36.567553] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.568062] remove_element+0x130/0x1f8 [ 36.569018] mempool_alloc_preallocated+0x58/0xc0 [ 36.570804] mempool_double_free_helper+0x94/0x2e0 [ 36.571848] mempool_kmalloc_double_free+0xb8/0x110 [ 36.572421] kunit_try_run_case+0x14c/0x3d0 [ 36.573205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.574601] kthread+0x24c/0x2d0 [ 36.575171] ret_from_fork+0x10/0x20 [ 36.575778] [ 36.576243] Freed by task 224: [ 36.577463] kasan_save_stack+0x3c/0x68 [ 36.578143] kasan_save_track+0x20/0x40 [ 36.578953] kasan_save_free_info+0x4c/0x78 [ 36.579568] __kasan_mempool_poison_object+0xc0/0x150 [ 36.580362] mempool_free+0x28c/0x328 [ 36.581497] mempool_double_free_helper+0x100/0x2e0 [ 36.582579] mempool_kmalloc_double_free+0xb8/0x110 [ 36.583288] kunit_try_run_case+0x14c/0x3d0 [ 36.584058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.585492] kthread+0x24c/0x2d0 [ 36.585924] ret_from_fork+0x10/0x20 [ 36.586328] [ 36.586744] The buggy address belongs to the object at fff00000c6a52900 [ 36.586744] which belongs to the cache kmalloc-128 of size 128 [ 36.588208] The buggy address is located 0 bytes inside of [ 36.588208] 128-byte region [fff00000c6a52900, fff00000c6a52980) [ 36.590517] [ 36.590946] The buggy address belongs to the physical page: [ 36.591936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a52 [ 36.593904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.595052] page_type: f5(slab) [ 36.595727] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.597198] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.598254] page dumped because: kasan: bad access detected [ 36.599087] [ 36.599476] Memory state around the buggy address: [ 36.600255] fff00000c6a52800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.601670] fff00000c6a52880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.602490] >fff00000c6a52900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.603636] ^ [ 36.604236] fff00000c6a52980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605291] fff00000c6a52a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.607338] ================================================================== [ 36.671327] ================================================================== [ 36.673295] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 36.674272] Free of addr fff00000c6b84000 by task kunit_try_catch/228 [ 36.675275] [ 36.675632] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.677357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.677937] Hardware name: linux,dummy-virt (DT) [ 36.678830] Call trace: [ 36.679389] show_stack+0x20/0x38 (C) [ 36.680019] dump_stack_lvl+0x8c/0xd0 [ 36.681168] print_report+0x118/0x5e0 [ 36.681852] kasan_report_invalid_free+0xb0/0xd8 [ 36.682744] __kasan_mempool_poison_pages+0xe0/0xe8 [ 36.683659] mempool_free+0x24c/0x328 [ 36.684271] mempool_double_free_helper+0x150/0x2e0 [ 36.685413] mempool_page_alloc_double_free+0xb4/0x110 [ 36.686193] kunit_try_run_case+0x14c/0x3d0 [ 36.687013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.687892] kthread+0x24c/0x2d0 [ 36.688506] ret_from_fork+0x10/0x20 [ 36.689241] [ 36.689875] The buggy address belongs to the physical page: [ 36.691472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b84 [ 36.692225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.694125] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.695145] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.696741] page dumped because: kasan: bad access detected [ 36.697751] [ 36.698119] Memory state around the buggy address: [ 36.698825] fff00000c6b83f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.699758] fff00000c6b83f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.701070] >fff00000c6b84000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.702102] ^ [ 36.702797] fff00000c6b84080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.703752] fff00000c6b84100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.704783] ================================================================== [ 36.619425] ================================================================== [ 36.620967] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 36.622298] Free of addr fff00000c6b90000 by task kunit_try_catch/226 [ 36.623240] [ 36.623696] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.625142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.626420] Hardware name: linux,dummy-virt (DT) [ 36.627165] Call trace: [ 36.628057] show_stack+0x20/0x38 (C) [ 36.628803] dump_stack_lvl+0x8c/0xd0 [ 36.629285] print_report+0x118/0x5e0 [ 36.630115] kasan_report_invalid_free+0xb0/0xd8 [ 36.631478] __kasan_mempool_poison_object+0x14c/0x150 [ 36.632294] mempool_free+0x28c/0x328 [ 36.633265] mempool_double_free_helper+0x150/0x2e0 [ 36.634080] mempool_kmalloc_large_double_free+0xb8/0x110 [ 36.634838] kunit_try_run_case+0x14c/0x3d0 [ 36.635799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.637395] kthread+0x24c/0x2d0 [ 36.638134] ret_from_fork+0x10/0x20 [ 36.638793] [ 36.639107] The buggy address belongs to the physical page: [ 36.639816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b90 [ 36.641564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.642475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.643370] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.644839] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.646188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.646840] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.647966] head: 0bfffe0000000002 ffffc1ffc31ae401 ffffffffffffffff 0000000000000000 [ 36.649317] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.650514] page dumped because: kasan: bad access detected [ 36.651322] [ 36.651861] Memory state around the buggy address: [ 36.652351] fff00000c6b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.653963] fff00000c6b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.654835] >fff00000c6b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.655772] ^ [ 36.656377] fff00000c6b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.657955] fff00000c6b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.659544] ==================================================================
[ 27.526062] ================================================================== [ 27.527179] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.529295] Free of addr ffff888101abb900 by task kunit_try_catch/243 [ 27.529691] [ 27.529898] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.530847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.531268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.532562] Call Trace: [ 27.533217] <TASK> [ 27.533916] dump_stack_lvl+0x73/0xb0 [ 27.534382] print_report+0xd1/0x640 [ 27.535312] ? __virt_addr_valid+0x1db/0x2d0 [ 27.535577] ? mempool_double_free_helper+0x185/0x370 [ 27.536106] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.536637] ? mempool_double_free_helper+0x185/0x370 [ 27.537223] kasan_report_invalid_free+0xc0/0xf0 [ 27.537545] ? mempool_double_free_helper+0x185/0x370 [ 27.538174] ? mempool_double_free_helper+0x185/0x370 [ 27.538724] ? mempool_double_free_helper+0x185/0x370 [ 27.539648] check_slab_allocation+0x101/0x130 [ 27.540686] __kasan_mempool_poison_object+0x91/0x1d0 [ 27.541267] mempool_free+0x2ec/0x380 [ 27.541916] mempool_double_free_helper+0x185/0x370 [ 27.542321] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.542853] ? irqentry_exit+0x2a/0x60 [ 27.543115] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.543726] mempool_kmalloc_double_free+0xb1/0x100 [ 27.544450] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 27.544989] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.545614] ? __pfx_mempool_kfree+0x10/0x10 [ 27.546205] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 27.547046] kunit_try_run_case+0x1b3/0x490 [ 27.547654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.548413] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.548924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.549293] ? __kthread_parkme+0x82/0x160 [ 27.549932] ? preempt_count_sub+0x50/0x80 [ 27.550549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.551198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.551649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.551956] kthread+0x257/0x310 [ 27.552429] ? __pfx_kthread+0x10/0x10 [ 27.552977] ret_from_fork+0x41/0x80 [ 27.553561] ? __pfx_kthread+0x10/0x10 [ 27.554207] ret_from_fork_asm+0x1a/0x30 [ 27.554655] </TASK> [ 27.555010] [ 27.555245] Allocated by task 243: [ 27.555746] kasan_save_stack+0x3d/0x60 [ 27.556229] kasan_save_track+0x18/0x40 [ 27.556728] kasan_save_alloc_info+0x3b/0x50 [ 27.557346] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.558041] remove_element+0x11e/0x190 [ 27.558540] mempool_alloc_preallocated+0x4d/0x90 [ 27.559151] mempool_double_free_helper+0x8b/0x370 [ 27.559731] mempool_kmalloc_double_free+0xb1/0x100 [ 27.561038] kunit_try_run_case+0x1b3/0x490 [ 27.561440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.561888] kthread+0x257/0x310 [ 27.562236] ret_from_fork+0x41/0x80 [ 27.562645] ret_from_fork_asm+0x1a/0x30 [ 27.563257] [ 27.563408] Freed by task 243: [ 27.563621] kasan_save_stack+0x3d/0x60 [ 27.564046] kasan_save_track+0x18/0x40 [ 27.564465] kasan_save_free_info+0x3f/0x60 [ 27.565213] __kasan_mempool_poison_object+0x131/0x1d0 [ 27.565729] mempool_free+0x2ec/0x380 [ 27.566192] mempool_double_free_helper+0x10a/0x370 [ 27.566867] mempool_kmalloc_double_free+0xb1/0x100 [ 27.567418] kunit_try_run_case+0x1b3/0x490 [ 27.567791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.568137] kthread+0x257/0x310 [ 27.568416] ret_from_fork+0x41/0x80 [ 27.569745] ret_from_fork_asm+0x1a/0x30 [ 27.570523] [ 27.570755] The buggy address belongs to the object at ffff888101abb900 [ 27.570755] which belongs to the cache kmalloc-128 of size 128 [ 27.571994] The buggy address is located 0 bytes inside of [ 27.571994] 128-byte region [ffff888101abb900, ffff888101abb980) [ 27.572987] [ 27.573297] The buggy address belongs to the physical page: [ 27.573668] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abb [ 27.574104] flags: 0x200000000000000(node=0|zone=2) [ 27.574558] page_type: f5(slab) [ 27.575573] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.576612] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.577662] page dumped because: kasan: bad access detected [ 27.578259] [ 27.578409] Memory state around the buggy address: [ 27.578809] ffff888101abb800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.579794] ffff888101abb880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.580455] >ffff888101abb900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.580812] ^ [ 27.581140] ffff888101abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.582738] ffff888101abba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.583587] ================================================================== [ 27.648628] ================================================================== [ 27.650200] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.650817] Free of addr ffff888102cf4000 by task kunit_try_catch/247 [ 27.651925] [ 27.652459] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.653204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.653894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.654969] Call Trace: [ 27.655164] <TASK> [ 27.655457] dump_stack_lvl+0x73/0xb0 [ 27.655916] print_report+0xd1/0x640 [ 27.656273] ? __virt_addr_valid+0x1db/0x2d0 [ 27.657611] ? mempool_double_free_helper+0x185/0x370 [ 27.658002] ? kasan_addr_to_slab+0x11/0xa0 [ 27.658696] ? mempool_double_free_helper+0x185/0x370 [ 27.659175] kasan_report_invalid_free+0xc0/0xf0 [ 27.660370] ? mempool_double_free_helper+0x185/0x370 [ 27.660756] ? mempool_double_free_helper+0x185/0x370 [ 27.661363] __kasan_mempool_poison_pages+0x115/0x130 [ 27.662023] mempool_free+0x290/0x380 [ 27.662941] mempool_double_free_helper+0x185/0x370 [ 27.663450] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.664053] ? finish_task_switch.isra.0+0x153/0x700 [ 27.664789] mempool_page_alloc_double_free+0xac/0x100 [ 27.665414] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 27.665890] ? __switch_to+0x5d9/0xf60 [ 27.666275] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 27.667142] ? __pfx_mempool_free_pages+0x10/0x10 [ 27.667804] ? __pfx_read_tsc+0x10/0x10 [ 27.668424] ? ktime_get_ts64+0x84/0x230 [ 27.668809] kunit_try_run_case+0x1b3/0x490 [ 27.669259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.670380] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.670796] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.671446] ? __kthread_parkme+0x82/0x160 [ 27.672030] ? preempt_count_sub+0x50/0x80 [ 27.672531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.673367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.674220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.674960] kthread+0x257/0x310 [ 27.675340] ? __pfx_kthread+0x10/0x10 [ 27.676220] ret_from_fork+0x41/0x80 [ 27.676572] ? __pfx_kthread+0x10/0x10 [ 27.676907] ret_from_fork_asm+0x1a/0x30 [ 27.677346] </TASK> [ 27.677614] [ 27.678516] The buggy address belongs to the physical page: [ 27.679012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cf4 [ 27.679798] flags: 0x200000000000000(node=0|zone=2) [ 27.680156] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 27.680806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.681935] page dumped because: kasan: bad access detected [ 27.682412] [ 27.682634] Memory state around the buggy address: [ 27.683063] ffff888102cf3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.683703] ffff888102cf3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.684247] >ffff888102cf4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.684850] ^ [ 27.685424] ffff888102cf4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.686033] ffff888102cf4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.686849] ================================================================== [ 27.593425] ================================================================== [ 27.595916] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.596578] Free of addr ffff888102cf4000 by task kunit_try_catch/245 [ 27.597299] [ 27.597560] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.598753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.599101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.600360] Call Trace: [ 27.600864] <TASK> [ 27.601194] dump_stack_lvl+0x73/0xb0 [ 27.601807] print_report+0xd1/0x640 [ 27.602399] ? __virt_addr_valid+0x1db/0x2d0 [ 27.603127] ? mempool_double_free_helper+0x185/0x370 [ 27.603970] ? kasan_addr_to_slab+0x11/0xa0 [ 27.604641] ? mempool_double_free_helper+0x185/0x370 [ 27.605192] kasan_report_invalid_free+0xc0/0xf0 [ 27.605893] ? mempool_double_free_helper+0x185/0x370 [ 27.606430] ? mempool_double_free_helper+0x185/0x370 [ 27.607030] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 27.607733] mempool_free+0x2ec/0x380 [ 27.608679] mempool_double_free_helper+0x185/0x370 [ 27.609303] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.609853] ? finish_task_switch.isra.0+0x153/0x700 [ 27.610683] mempool_kmalloc_large_double_free+0xb1/0x100 [ 27.611295] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 27.611881] ? __switch_to+0x5d9/0xf60 [ 27.612600] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.613265] ? __pfx_mempool_kfree+0x10/0x10 [ 27.613756] ? __pfx_read_tsc+0x10/0x10 [ 27.614382] ? ktime_get_ts64+0x84/0x230 [ 27.614899] kunit_try_run_case+0x1b3/0x490 [ 27.615287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.616369] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.616870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.617521] ? __kthread_parkme+0x82/0x160 [ 27.618463] ? preempt_count_sub+0x50/0x80 [ 27.618880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.619517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.620334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.621433] kthread+0x257/0x310 [ 27.621746] ? __pfx_kthread+0x10/0x10 [ 27.622113] ret_from_fork+0x41/0x80 [ 27.622578] ? __pfx_kthread+0x10/0x10 [ 27.623382] ret_from_fork_asm+0x1a/0x30 [ 27.623879] </TASK> [ 27.624162] [ 27.624705] The buggy address belongs to the physical page: [ 27.625421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cf4 [ 27.626216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.626893] flags: 0x200000000000040(head|node=0|zone=2) [ 27.627893] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.628580] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.629429] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.630413] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.630804] head: 0200000000000002 ffffea00040b3d01 ffffffffffffffff 0000000000000000 [ 27.632157] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.633065] page dumped because: kasan: bad access detected [ 27.633576] [ 27.633746] Memory state around the buggy address: [ 27.634062] ffff888102cf3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.635259] ffff888102cf3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.636672] >ffff888102cf4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.637812] ^ [ 27.638504] ffff888102cf4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.639545] ffff888102cf4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.640468] ==================================================================