Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 37.563087] ================================================================== [ 37.563277] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 37.563453] Free of addr fff00000c7804000 by task kunit_try_catch/241 [ 37.563597] [ 37.563733] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.564453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.564545] Hardware name: linux,dummy-virt (DT) [ 37.564670] Call trace: [ 37.564745] show_stack+0x20/0x38 (C) [ 37.564895] dump_stack_lvl+0x8c/0xd0 [ 37.565044] print_report+0x118/0x5f0 [ 37.565201] kasan_report_invalid_free+0xb0/0xd8 [ 37.565727] __kasan_mempool_poison_pages+0xe0/0xe8 [ 37.566003] mempool_free+0x24c/0x328 [ 37.566189] mempool_double_free_helper+0x150/0x2e0 [ 37.566381] mempool_page_alloc_double_free+0xb4/0x110 [ 37.566659] kunit_try_run_case+0x14c/0x3d0 [ 37.566822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.567084] kthread+0x318/0x618 [ 37.567230] ret_from_fork+0x10/0x20 [ 37.567938] [ 37.568070] The buggy address belongs to the physical page: [ 37.568199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804 [ 37.568402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.568636] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.568873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.569011] page dumped because: kasan: bad access detected [ 37.569131] [ 37.569442] Memory state around the buggy address: [ 37.569593] fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.569805] fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.569952] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.570160] ^ [ 37.570256] fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.570443] fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.570578] ================================================================== [ 37.441570] ================================================================== [ 37.442412] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 37.442665] Free of addr fff00000c5da6800 by task kunit_try_catch/237 [ 37.442908] [ 37.443095] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.443378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.443470] Hardware name: linux,dummy-virt (DT) [ 37.443647] Call trace: [ 37.444329] show_stack+0x20/0x38 (C) [ 37.444617] dump_stack_lvl+0x8c/0xd0 [ 37.444853] print_report+0x118/0x5f0 [ 37.444999] kasan_report_invalid_free+0xb0/0xd8 [ 37.445173] check_slab_allocation+0xd4/0x108 [ 37.445901] __kasan_mempool_poison_object+0x78/0x150 [ 37.446678] mempool_free+0x28c/0x328 [ 37.446866] mempool_double_free_helper+0x150/0x2e0 [ 37.447047] mempool_kmalloc_double_free+0xb8/0x110 [ 37.447247] kunit_try_run_case+0x14c/0x3d0 [ 37.448350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.448662] kthread+0x318/0x618 [ 37.449083] ret_from_fork+0x10/0x20 [ 37.449674] [ 37.449754] Allocated by task 237: [ 37.449940] kasan_save_stack+0x3c/0x68 [ 37.450594] kasan_save_track+0x20/0x40 [ 37.450764] kasan_save_alloc_info+0x40/0x58 [ 37.450891] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.451636] remove_element+0x130/0x1f8 [ 37.452048] mempool_alloc_preallocated+0x58/0xc0 [ 37.452511] mempool_double_free_helper+0x94/0x2e0 [ 37.452705] mempool_kmalloc_double_free+0xb8/0x110 [ 37.452832] kunit_try_run_case+0x14c/0x3d0 [ 37.452946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.453093] kthread+0x318/0x618 [ 37.453842] ret_from_fork+0x10/0x20 [ 37.454093] [ 37.454157] Freed by task 237: [ 37.454753] kasan_save_stack+0x3c/0x68 [ 37.454890] kasan_save_track+0x20/0x40 [ 37.455126] kasan_save_free_info+0x4c/0x78 [ 37.455817] __kasan_mempool_poison_object+0xc0/0x150 [ 37.455979] mempool_free+0x28c/0x328 [ 37.456127] mempool_double_free_helper+0x100/0x2e0 [ 37.456267] mempool_kmalloc_double_free+0xb8/0x110 [ 37.457006] kunit_try_run_case+0x14c/0x3d0 [ 37.457285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.458042] kthread+0x318/0x618 [ 37.458324] ret_from_fork+0x10/0x20 [ 37.458521] [ 37.458585] The buggy address belongs to the object at fff00000c5da6800 [ 37.458585] which belongs to the cache kmalloc-128 of size 128 [ 37.459087] The buggy address is located 0 bytes inside of [ 37.459087] 128-byte region [fff00000c5da6800, fff00000c5da6880) [ 37.459282] [ 37.459346] The buggy address belongs to the physical page: [ 37.459939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.460258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.460866] page_type: f5(slab) [ 37.460993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.461182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.461437] page dumped because: kasan: bad access detected [ 37.461643] [ 37.461719] Memory state around the buggy address: [ 37.462329] fff00000c5da6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.462507] fff00000c5da6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.463314] >fff00000c5da6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.463567] ^ [ 37.463935] fff00000c5da6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.464370] fff00000c5da6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.464613] ================================================================== [ 37.524177] ================================================================== [ 37.524359] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 37.524544] Free of addr fff00000c7804000 by task kunit_try_catch/239 [ 37.524684] [ 37.525354] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.525720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.525820] Hardware name: linux,dummy-virt (DT) [ 37.525923] Call trace: [ 37.525990] show_stack+0x20/0x38 (C) [ 37.526431] dump_stack_lvl+0x8c/0xd0 [ 37.527032] print_report+0x118/0x5f0 [ 37.527209] kasan_report_invalid_free+0xb0/0xd8 [ 37.527922] __kasan_mempool_poison_object+0x14c/0x150 [ 37.528146] mempool_free+0x28c/0x328 [ 37.528563] mempool_double_free_helper+0x150/0x2e0 [ 37.529269] mempool_kmalloc_large_double_free+0xb8/0x110 [ 37.529463] kunit_try_run_case+0x14c/0x3d0 [ 37.529615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.529769] kthread+0x318/0x618 [ 37.531116] ret_from_fork+0x10/0x20 [ 37.531298] [ 37.531366] The buggy address belongs to the physical page: [ 37.531473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804 [ 37.531650] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.531807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.531994] page_type: f8(unknown) [ 37.532229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.532485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.533115] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.533389] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.533569] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff [ 37.534006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.534166] page dumped because: kasan: bad access detected [ 37.534344] [ 37.534517] Memory state around the buggy address: [ 37.534744] fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.534956] fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535136] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535257] ^ [ 37.535351] fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535499] fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535639] ==================================================================
[ 24.294503] ================================================================== [ 24.296660] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 24.297535] Free of addr ffff88810305ab00 by task kunit_try_catch/256 [ 24.299433] [ 24.299628] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.300219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.300248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.300281] Call Trace: [ 24.300302] <TASK> [ 24.300323] dump_stack_lvl+0x73/0xb0 [ 24.300371] print_report+0xd1/0x660 [ 24.300407] ? __virt_addr_valid+0x1db/0x2d0 [ 24.300476] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.300512] ? mempool_double_free_helper+0x184/0x370 [ 24.300547] kasan_report_invalid_free+0xce/0x100 [ 24.300583] ? mempool_double_free_helper+0x184/0x370 [ 24.300623] ? mempool_double_free_helper+0x184/0x370 [ 24.300656] ? mempool_double_free_helper+0x184/0x370 [ 24.300746] check_slab_allocation+0x101/0x130 [ 24.300883] __kasan_mempool_poison_object+0x91/0x1d0 [ 24.300943] mempool_free+0x2ec/0x380 [ 24.300984] mempool_double_free_helper+0x184/0x370 [ 24.301023] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 24.301059] ? update_load_avg+0x1c3/0x2170 [ 24.301097] ? update_curr+0x80/0x810 [ 24.301159] ? finish_task_switch.isra.0+0x153/0x730 [ 24.301199] mempool_kmalloc_double_free+0xb0/0x100 [ 24.301236] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 24.301270] ? __switch_to+0x5d9/0xf70 [ 24.301308] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.301337] ? __pfx_mempool_kfree+0x10/0x10 [ 24.301372] ? __pfx_read_tsc+0x10/0x10 [ 24.301402] ? ktime_get_ts64+0x86/0x240 [ 24.301441] kunit_try_run_case+0x1b2/0x490 [ 24.301478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.301509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.301541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.301574] ? __kthread_parkme+0x82/0x160 [ 24.301605] ? preempt_count_sub+0x50/0x80 [ 24.301641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.301689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.301822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.301894] kthread+0x323/0x710 [ 24.301952] ? trace_preempt_on+0x20/0xc0 [ 24.302017] ? __pfx_kthread+0x10/0x10 [ 24.302060] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.302092] ? calculate_sigpending+0x7b/0xa0 [ 24.302152] ? __pfx_kthread+0x10/0x10 [ 24.302187] ret_from_fork+0x41/0x80 [ 24.302221] ? __pfx_kthread+0x10/0x10 [ 24.302254] ret_from_fork_asm+0x1a/0x30 [ 24.302305] </TASK> [ 24.302321] [ 24.327251] Allocated by task 256: [ 24.327600] kasan_save_stack+0x3d/0x60 [ 24.327906] kasan_save_track+0x18/0x40 [ 24.328387] kasan_save_alloc_info+0x3b/0x50 [ 24.329829] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 24.330475] remove_element+0x11e/0x190 [ 24.330915] mempool_alloc_preallocated+0x4d/0x90 [ 24.332070] mempool_double_free_helper+0x8a/0x370 [ 24.332560] mempool_kmalloc_double_free+0xb0/0x100 [ 24.333106] kunit_try_run_case+0x1b2/0x490 [ 24.334286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.334982] kthread+0x323/0x710 [ 24.335332] ret_from_fork+0x41/0x80 [ 24.336549] ret_from_fork_asm+0x1a/0x30 [ 24.337156] [ 24.337660] Freed by task 256: [ 24.338014] kasan_save_stack+0x3d/0x60 [ 24.338399] kasan_save_track+0x18/0x40 [ 24.339430] kasan_save_free_info+0x3f/0x60 [ 24.339775] __kasan_mempool_poison_object+0x131/0x1d0 [ 24.341020] mempool_free+0x2ec/0x380 [ 24.341447] mempool_double_free_helper+0x109/0x370 [ 24.341810] mempool_kmalloc_double_free+0xb0/0x100 [ 24.342407] kunit_try_run_case+0x1b2/0x490 [ 24.342887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.343360] kthread+0x323/0x710 [ 24.343729] ret_from_fork+0x41/0x80 [ 24.344683] ret_from_fork_asm+0x1a/0x30 [ 24.346031] [ 24.346326] The buggy address belongs to the object at ffff88810305ab00 [ 24.346326] which belongs to the cache kmalloc-128 of size 128 [ 24.347152] The buggy address is located 0 bytes inside of [ 24.347152] 128-byte region [ffff88810305ab00, ffff88810305ab80) [ 24.348194] [ 24.348372] The buggy address belongs to the physical page: [ 24.349381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10305a [ 24.350043] flags: 0x200000000000000(node=0|zone=2) [ 24.350795] page_type: f5(slab) [ 24.351409] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.352354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.353398] page dumped because: kasan: bad access detected [ 24.354180] [ 24.354443] Memory state around the buggy address: [ 24.355017] ffff88810305aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.355333] ffff88810305aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.355556] >ffff88810305ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.355797] ^ [ 24.355925] ffff88810305ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.356173] ffff88810305ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.356382] ================================================================== [ 24.415952] ================================================================== [ 24.417250] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 24.417859] Free of addr ffff888103920000 by task kunit_try_catch/260 [ 24.418415] [ 24.418688] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.418854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.419063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.419154] Call Trace: [ 24.419192] <TASK> [ 24.419228] dump_stack_lvl+0x73/0xb0 [ 24.419307] print_report+0xd1/0x660 [ 24.419415] ? __virt_addr_valid+0x1db/0x2d0 [ 24.419558] ? kasan_addr_to_slab+0x11/0xa0 [ 24.419655] ? mempool_double_free_helper+0x184/0x370 [ 24.419766] kasan_report_invalid_free+0xce/0x100 [ 24.419850] ? mempool_double_free_helper+0x184/0x370 [ 24.419978] ? mempool_double_free_helper+0x184/0x370 [ 24.420051] __kasan_mempool_poison_pages+0x115/0x130 [ 24.420154] mempool_free+0x290/0x380 [ 24.420266] mempool_double_free_helper+0x184/0x370 [ 24.420341] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 24.420429] ? finish_task_switch.isra.0+0x153/0x730 [ 24.420511] mempool_page_alloc_double_free+0xab/0x100 [ 24.420557] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 24.420595] ? __switch_to+0x5d9/0xf70 [ 24.420633] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 24.420665] ? __pfx_mempool_free_pages+0x10/0x10 [ 24.420700] ? __pfx_read_tsc+0x10/0x10 [ 24.421022] ? ktime_get_ts64+0x86/0x240 [ 24.421094] kunit_try_run_case+0x1b2/0x490 [ 24.421165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.421199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.421233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.421265] ? __kthread_parkme+0x82/0x160 [ 24.421300] ? preempt_count_sub+0x50/0x80 [ 24.421336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.421371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.421404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.421438] kthread+0x323/0x710 [ 24.421469] ? trace_preempt_on+0x20/0xc0 [ 24.421504] ? __pfx_kthread+0x10/0x10 [ 24.421539] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.421569] ? calculate_sigpending+0x7b/0xa0 [ 24.421600] ? __pfx_kthread+0x10/0x10 [ 24.421634] ret_from_fork+0x41/0x80 [ 24.421666] ? __pfx_kthread+0x10/0x10 [ 24.421769] ret_from_fork_asm+0x1a/0x30 [ 24.421869] </TASK> [ 24.421887] [ 24.449205] The buggy address belongs to the physical page: [ 24.449510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920 [ 24.449956] flags: 0x200000000000000(node=0|zone=2) [ 24.452703] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.454730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.456330] page dumped because: kasan: bad access detected [ 24.457366] [ 24.457587] Memory state around the buggy address: [ 24.457955] ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.458395] ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.458944] >ffff888103920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.460553] ^ [ 24.461300] ffff888103920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.462222] ffff888103920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.463436] ================================================================== [ 24.363978] ================================================================== [ 24.365680] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 24.366278] Free of addr ffff8881039c0000 by task kunit_try_catch/258 [ 24.366955] [ 24.367539] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.367772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.367857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.367916] Call Trace: [ 24.367956] <TASK> [ 24.367980] dump_stack_lvl+0x73/0xb0 [ 24.368026] print_report+0xd1/0x660 [ 24.368075] ? __virt_addr_valid+0x1db/0x2d0 [ 24.368213] ? kasan_addr_to_slab+0x11/0xa0 [ 24.368273] ? mempool_double_free_helper+0x184/0x370 [ 24.368335] kasan_report_invalid_free+0xce/0x100 [ 24.368376] ? mempool_double_free_helper+0x184/0x370 [ 24.368416] ? mempool_double_free_helper+0x184/0x370 [ 24.368450] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 24.368487] mempool_free+0x2ec/0x380 [ 24.368525] mempool_double_free_helper+0x184/0x370 [ 24.368561] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 24.368603] ? finish_task_switch.isra.0+0x153/0x730 [ 24.368643] mempool_kmalloc_large_double_free+0xb0/0x100 [ 24.368683] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 24.368973] ? __switch_to+0x5d9/0xf70 [ 24.369050] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.369105] ? __pfx_mempool_kfree+0x10/0x10 [ 24.369192] ? __pfx_read_tsc+0x10/0x10 [ 24.369245] ? ktime_get_ts64+0x86/0x240 [ 24.369316] kunit_try_run_case+0x1b2/0x490 [ 24.369371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.369403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.369437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.369470] ? __kthread_parkme+0x82/0x160 [ 24.369502] ? preempt_count_sub+0x50/0x80 [ 24.369537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.369572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.369605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.369639] kthread+0x323/0x710 [ 24.369668] ? trace_preempt_on+0x20/0xc0 [ 24.369801] ? __pfx_kthread+0x10/0x10 [ 24.369855] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.369887] ? calculate_sigpending+0x7b/0xa0 [ 24.369921] ? __pfx_kthread+0x10/0x10 [ 24.369955] ret_from_fork+0x41/0x80 [ 24.369987] ? __pfx_kthread+0x10/0x10 [ 24.370018] ret_from_fork_asm+0x1a/0x30 [ 24.370066] </TASK> [ 24.370082] [ 24.394045] The buggy address belongs to the physical page: [ 24.394477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c0 [ 24.395186] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.396341] flags: 0x200000000000040(head|node=0|zone=2) [ 24.396930] page_type: f8(unknown) [ 24.398190] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.399215] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.399805] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.400353] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.401017] head: 0200000000000002 ffffea00040e7001 00000000ffffffff 00000000ffffffff [ 24.402565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.403541] page dumped because: kasan: bad access detected [ 24.404101] [ 24.404347] Memory state around the buggy address: [ 24.404796] ffff8881039bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.405316] ffff8881039bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.406166] >ffff8881039c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.406649] ^ [ 24.406884] ffff8881039c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.407509] ffff8881039c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.408413] ==================================================================