Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.721134] ================================================================== [ 34.722992] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 34.724413] Free of addr fff00000c6854000 by task kunit_try_catch/225 [ 34.725275] [ 34.725650] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.727091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.727611] Hardware name: linux,dummy-virt (DT) [ 34.728171] Call trace: [ 34.728682] show_stack+0x20/0x38 (C) [ 34.729307] dump_stack_lvl+0x8c/0xd0 [ 34.730299] print_report+0x118/0x5e0 [ 34.730847] kasan_report_invalid_free+0xb0/0xd8 [ 34.731593] __kasan_mempool_poison_object+0x14c/0x150 [ 34.732440] mempool_free+0x28c/0x328 [ 34.733039] mempool_double_free_helper+0x150/0x2e0 [ 34.733688] mempool_kmalloc_large_double_free+0xb8/0x110 [ 34.734564] kunit_try_run_case+0x14c/0x3d0 [ 34.735442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.736243] kthread+0x24c/0x2d0 [ 34.737148] ret_from_fork+0x10/0x20 [ 34.737680] [ 34.738059] The buggy address belongs to the physical page: [ 34.739406] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106854 [ 34.740377] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.741316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.742593] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.743449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.744449] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.745999] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.746749] head: 0bfffe0000000002 ffffc1ffc31a1501 ffffffffffffffff 0000000000000000 [ 34.747801] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.748490] page dumped because: kasan: bad access detected [ 34.749248] [ 34.749554] Memory state around the buggy address: [ 34.750738] fff00000c6853f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.751697] fff00000c6853f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.752539] >fff00000c6854000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.753369] ^ [ 34.753862] fff00000c6854080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.755107] fff00000c6854100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.756080] ================================================================== [ 34.767314] ================================================================== [ 34.768679] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 34.769500] Free of addr fff00000c6848000 by task kunit_try_catch/227 [ 34.771768] [ 34.772473] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.774864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.775439] Hardware name: linux,dummy-virt (DT) [ 34.776089] Call trace: [ 34.776550] show_stack+0x20/0x38 (C) [ 34.777286] dump_stack_lvl+0x8c/0xd0 [ 34.778305] print_report+0x118/0x5e0 [ 34.779281] kasan_report_invalid_free+0xb0/0xd8 [ 34.780066] __kasan_mempool_poison_pages+0xe0/0xe8 [ 34.780864] mempool_free+0x24c/0x328 [ 34.781549] mempool_double_free_helper+0x150/0x2e0 [ 34.782536] mempool_page_alloc_double_free+0xb4/0x110 [ 34.783300] kunit_try_run_case+0x14c/0x3d0 [ 34.783991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.784849] kthread+0x24c/0x2d0 [ 34.785499] ret_from_fork+0x10/0x20 [ 34.786430] [ 34.787310] The buggy address belongs to the physical page: [ 34.788197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106848 [ 34.789364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.790285] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.791853] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.792950] page dumped because: kasan: bad access detected [ 34.793915] [ 34.794385] Memory state around the buggy address: [ 34.795654] fff00000c6847f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.796602] fff00000c6847f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.797742] >fff00000c6848000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.798502] ^ [ 34.799732] fff00000c6848080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.800620] fff00000c6848100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.801452] ================================================================== [ 34.653065] ================================================================== [ 34.654270] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 34.655268] Free of addr fff00000c66a6d00 by task kunit_try_catch/223 [ 34.656026] [ 34.656414] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.659145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.659693] Hardware name: linux,dummy-virt (DT) [ 34.660375] Call trace: [ 34.660750] show_stack+0x20/0x38 (C) [ 34.661427] dump_stack_lvl+0x8c/0xd0 [ 34.662036] print_report+0x118/0x5e0 [ 34.662527] kasan_report_invalid_free+0xb0/0xd8 [ 34.663582] check_slab_allocation+0xd4/0x108 [ 34.664224] __kasan_mempool_poison_object+0x78/0x150 [ 34.665064] mempool_free+0x28c/0x328 [ 34.666268] mempool_double_free_helper+0x150/0x2e0 [ 34.666956] mempool_kmalloc_double_free+0xb8/0x110 [ 34.667500] kunit_try_run_case+0x14c/0x3d0 [ 34.668372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.669144] kthread+0x24c/0x2d0 [ 34.669680] ret_from_fork+0x10/0x20 [ 34.671008] [ 34.671361] Allocated by task 223: [ 34.671883] kasan_save_stack+0x3c/0x68 [ 34.672455] kasan_save_track+0x20/0x40 [ 34.673026] kasan_save_alloc_info+0x40/0x58 [ 34.673700] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.674961] remove_element+0x130/0x1f8 [ 34.675464] mempool_alloc_preallocated+0x58/0xc0 [ 34.676270] mempool_double_free_helper+0x94/0x2e0 [ 34.676900] mempool_kmalloc_double_free+0xb8/0x110 [ 34.677706] kunit_try_run_case+0x14c/0x3d0 [ 34.678971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.679724] kthread+0x24c/0x2d0 [ 34.680464] ret_from_fork+0x10/0x20 [ 34.681198] [ 34.681533] Freed by task 223: [ 34.682241] kasan_save_stack+0x3c/0x68 [ 34.683192] kasan_save_track+0x20/0x40 [ 34.683545] kasan_save_free_info+0x4c/0x78 [ 34.683912] __kasan_mempool_poison_object+0xc0/0x150 [ 34.684548] mempool_free+0x28c/0x328 [ 34.685544] mempool_double_free_helper+0x100/0x2e0 [ 34.686826] mempool_kmalloc_double_free+0xb8/0x110 [ 34.687651] kunit_try_run_case+0x14c/0x3d0 [ 34.688303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.689013] kthread+0x24c/0x2d0 [ 34.689600] ret_from_fork+0x10/0x20 [ 34.690238] [ 34.690704] The buggy address belongs to the object at fff00000c66a6d00 [ 34.690704] which belongs to the cache kmalloc-128 of size 128 [ 34.692767] The buggy address is located 0 bytes inside of [ 34.692767] 128-byte region [fff00000c66a6d00, fff00000c66a6d80) [ 34.694360] [ 34.695098] The buggy address belongs to the physical page: [ 34.695814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a6 [ 34.696958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.698047] page_type: f5(slab) [ 34.698755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.699895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.700887] page dumped because: kasan: bad access detected [ 34.702153] [ 34.702764] Memory state around the buggy address: [ 34.703421] fff00000c66a6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.704376] fff00000c66a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.705362] >fff00000c66a6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.706370] ^ [ 34.707319] fff00000c66a6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.708218] fff00000c66a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.709202] ==================================================================
[ 25.413886] ================================================================== [ 25.415097] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 25.415858] Free of addr ffff888101af9500 by task kunit_try_catch/243 [ 25.416525] [ 25.416762] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 25.417439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.417881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.418908] Call Trace: [ 25.419137] <TASK> [ 25.419472] dump_stack_lvl+0x73/0xb0 [ 25.420197] print_report+0xd1/0x640 [ 25.420911] ? __virt_addr_valid+0x1db/0x2d0 [ 25.421707] ? mempool_double_free_helper+0x185/0x370 [ 25.422534] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.423160] ? mempool_double_free_helper+0x185/0x370 [ 25.423838] kasan_report_invalid_free+0xc0/0xf0 [ 25.424564] ? mempool_double_free_helper+0x185/0x370 [ 25.425196] ? mempool_double_free_helper+0x185/0x370 [ 25.425847] ? mempool_double_free_helper+0x185/0x370 [ 25.426537] check_slab_allocation+0x101/0x130 [ 25.427142] __kasan_mempool_poison_object+0x91/0x1d0 [ 25.427954] mempool_free+0x2ec/0x380 [ 25.428545] mempool_double_free_helper+0x185/0x370 [ 25.429082] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.429930] ? ret_from_fork+0x41/0x80 [ 25.430681] ? kthread+0x257/0x310 [ 25.431113] ? ret_from_fork_asm+0x1a/0x30 [ 25.431742] ? ret_from_fork_asm+0x1a/0x30 [ 25.432146] mempool_kmalloc_double_free+0xb1/0x100 [ 25.432684] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 25.433364] ? __switch_to+0x5d9/0xf60 [ 25.433726] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.434545] ? __pfx_mempool_kfree+0x10/0x10 [ 25.435092] ? __pfx_read_tsc+0x10/0x10 [ 25.435811] ? ktime_get_ts64+0x86/0x230 [ 25.436240] kunit_try_run_case+0x1b3/0x490 [ 25.437019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.437822] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.438616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.439226] ? __kthread_parkme+0x82/0x160 [ 25.439767] ? preempt_count_sub+0x50/0x80 [ 25.440329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.440938] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.441839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.442498] kthread+0x257/0x310 [ 25.442920] ? __pfx_kthread+0x10/0x10 [ 25.443524] ret_from_fork+0x41/0x80 [ 25.443997] ? __pfx_kthread+0x10/0x10 [ 25.444617] ret_from_fork_asm+0x1a/0x30 [ 25.445048] </TASK> [ 25.445581] [ 25.445831] Allocated by task 243: [ 25.446095] kasan_save_stack+0x3d/0x60 [ 25.447004] kasan_save_track+0x18/0x40 [ 25.447476] kasan_save_alloc_info+0x3b/0x50 [ 25.448079] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 25.448710] remove_element+0x11e/0x190 [ 25.449210] mempool_alloc_preallocated+0x4d/0x90 [ 25.449608] mempool_double_free_helper+0x8b/0x370 [ 25.450011] mempool_kmalloc_double_free+0xb1/0x100 [ 25.450650] kunit_try_run_case+0x1b3/0x490 [ 25.450944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.451450] kthread+0x257/0x310 [ 25.452184] ret_from_fork+0x41/0x80 [ 25.453207] ret_from_fork_asm+0x1a/0x30 [ 25.453638] [ 25.454500] Freed by task 243: [ 25.455193] kasan_save_stack+0x3d/0x60 [ 25.455802] kasan_save_track+0x18/0x40 [ 25.456171] kasan_save_free_info+0x3f/0x60 [ 25.457039] __kasan_mempool_poison_object+0x131/0x1d0 [ 25.457962] mempool_free+0x2ec/0x380 [ 25.458706] mempool_double_free_helper+0x10a/0x370 [ 25.459515] mempool_kmalloc_double_free+0xb1/0x100 [ 25.460005] kunit_try_run_case+0x1b3/0x490 [ 25.461076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.462106] kthread+0x257/0x310 [ 25.462659] ret_from_fork+0x41/0x80 [ 25.463115] ret_from_fork_asm+0x1a/0x30 [ 25.463731] [ 25.464367] The buggy address belongs to the object at ffff888101af9500 [ 25.464367] which belongs to the cache kmalloc-128 of size 128 [ 25.466248] The buggy address is located 0 bytes inside of [ 25.466248] 128-byte region [ffff888101af9500, ffff888101af9580) [ 25.467887] [ 25.468091] The buggy address belongs to the physical page: [ 25.468746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101af9 [ 25.469382] flags: 0x200000000000000(node=0|zone=2) [ 25.470496] page_type: f5(slab) [ 25.471279] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.472279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.473211] page dumped because: kasan: bad access detected [ 25.474248] [ 25.474538] Memory state around the buggy address: [ 25.475306] ffff888101af9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.476194] ffff888101af9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.477648] >ffff888101af9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.478112] ^ [ 25.478923] ffff888101af9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.480096] ffff888101af9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.481161] ================================================================== [ 25.488988] ================================================================== [ 25.490270] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 25.491851] Free of addr ffff888102b40000 by task kunit_try_catch/245 [ 25.492625] [ 25.492912] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 25.493662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.494675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.495605] Call Trace: [ 25.495893] <TASK> [ 25.496170] dump_stack_lvl+0x73/0xb0 [ 25.496555] print_report+0xd1/0x640 [ 25.496881] ? __virt_addr_valid+0x1db/0x2d0 [ 25.497415] ? mempool_double_free_helper+0x185/0x370 [ 25.498146] ? kasan_addr_to_slab+0x11/0xa0 [ 25.498667] ? mempool_double_free_helper+0x185/0x370 [ 25.499084] kasan_report_invalid_free+0xc0/0xf0 [ 25.499554] ? mempool_double_free_helper+0x185/0x370 [ 25.500379] ? mempool_double_free_helper+0x185/0x370 [ 25.500888] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 25.501740] mempool_free+0x2ec/0x380 [ 25.502277] mempool_double_free_helper+0x185/0x370 [ 25.502754] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.503270] ? finish_task_switch.isra.0+0x153/0x700 [ 25.503646] mempool_kmalloc_large_double_free+0xb1/0x100 [ 25.504357] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 25.505109] ? __switch_to+0x5d9/0xf60 [ 25.505713] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.506063] ? __pfx_mempool_kfree+0x10/0x10 [ 25.506825] ? __pfx_read_tsc+0x10/0x10 [ 25.507696] ? ktime_get_ts64+0x86/0x230 [ 25.508298] kunit_try_run_case+0x1b3/0x490 [ 25.508813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.509301] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.509741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.510381] ? __kthread_parkme+0x82/0x160 [ 25.510759] ? preempt_count_sub+0x50/0x80 [ 25.511384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.511897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.513221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.513907] kthread+0x257/0x310 [ 25.514255] ? __pfx_kthread+0x10/0x10 [ 25.514854] ret_from_fork+0x41/0x80 [ 25.515258] ? __pfx_kthread+0x10/0x10 [ 25.516065] ret_from_fork_asm+0x1a/0x30 [ 25.516645] </TASK> [ 25.516883] [ 25.517042] The buggy address belongs to the physical page: [ 25.517702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40 [ 25.519504] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.520673] flags: 0x200000000000040(head|node=0|zone=2) [ 25.521266] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.522701] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.523122] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.524620] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.525880] head: 0200000000000002 ffffea00040ad001 ffffffffffffffff 0000000000000000 [ 25.526809] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 25.527612] page dumped because: kasan: bad access detected [ 25.527929] [ 25.528067] Memory state around the buggy address: [ 25.528661] ffff888102b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.530576] ffff888102b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.531781] >ffff888102b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.533038] ^ [ 25.533328] ffff888102b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.534546] ffff888102b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.535291] ================================================================== [ 25.543807] ================================================================== [ 25.545348] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 25.546475] Free of addr ffff888102b40000 by task kunit_try_catch/247 [ 25.547285] [ 25.547965] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 25.549240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.549977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.550974] Call Trace: [ 25.551236] <TASK> [ 25.551461] dump_stack_lvl+0x73/0xb0 [ 25.552538] print_report+0xd1/0x640 [ 25.552920] ? __virt_addr_valid+0x1db/0x2d0 [ 25.553476] ? mempool_double_free_helper+0x185/0x370 [ 25.554230] ? kasan_addr_to_slab+0x11/0xa0 [ 25.554884] ? mempool_double_free_helper+0x185/0x370 [ 25.555856] kasan_report_invalid_free+0xc0/0xf0 [ 25.556355] ? mempool_double_free_helper+0x185/0x370 [ 25.557214] ? mempool_double_free_helper+0x185/0x370 [ 25.557977] __kasan_mempool_poison_pages+0x115/0x130 [ 25.558510] mempool_free+0x290/0x380 [ 25.559520] mempool_double_free_helper+0x185/0x370 [ 25.560426] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.561003] ? finish_task_switch.isra.0+0x153/0x700 [ 25.561493] mempool_page_alloc_double_free+0xac/0x100 [ 25.562405] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 25.562978] ? __switch_to+0x5d9/0xf60 [ 25.563356] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 25.563913] ? __pfx_mempool_free_pages+0x10/0x10 [ 25.564285] ? __pfx_read_tsc+0x10/0x10 [ 25.564970] ? ktime_get_ts64+0x86/0x230 [ 25.565383] kunit_try_run_case+0x1b3/0x490 [ 25.565937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.566639] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.567207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.567806] ? __kthread_parkme+0x82/0x160 [ 25.568382] ? preempt_count_sub+0x50/0x80 [ 25.568912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.569432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.570084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.570695] kthread+0x257/0x310 [ 25.571264] ? __pfx_kthread+0x10/0x10 [ 25.571896] ret_from_fork+0x41/0x80 [ 25.572315] ? __pfx_kthread+0x10/0x10 [ 25.572835] ret_from_fork_asm+0x1a/0x30 [ 25.573436] </TASK> [ 25.573689] [ 25.574067] The buggy address belongs to the physical page: [ 25.574986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40 [ 25.575810] flags: 0x200000000000000(node=0|zone=2) [ 25.576553] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.577401] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.578126] page dumped because: kasan: bad access detected [ 25.578779] [ 25.578964] Memory state around the buggy address: [ 25.579547] ffff888102b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.580452] ffff888102b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.581289] >ffff888102b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.582196] ^ [ 25.582580] ffff888102b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.583413] ffff888102b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.584194] ==================================================================