Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 38.293340] ================================================================== [ 38.303900] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.311012] Free of addr ffff000806014000 by task kunit_try_catch/283 [ 38.317435] [ 38.318920] CPU: 4 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.318980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.318997] Hardware name: WinLink E850-96 board (DT) [ 38.319017] Call trace: [ 38.319033] show_stack+0x20/0x38 (C) [ 38.319068] dump_stack_lvl+0x8c/0xd0 [ 38.319105] print_report+0x118/0x608 [ 38.319141] kasan_report_invalid_free+0xc0/0xe8 [ 38.319176] __kasan_mempool_poison_pages+0xe0/0xe8 [ 38.319211] mempool_free+0x24c/0x328 [ 38.319242] mempool_double_free_helper+0x150/0x2e8 [ 38.319275] mempool_page_alloc_double_free+0xbc/0x118 [ 38.319311] kunit_try_run_case+0x170/0x3f0 [ 38.319347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.319386] kthread+0x328/0x630 [ 38.319416] ret_from_fork+0x10/0x20 [ 38.319450] [ 38.393218] The buggy address belongs to the physical page: [ 38.398775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014 [ 38.406759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.413281] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.420999] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.428720] page dumped because: kasan: bad access detected [ 38.434275] [ 38.435749] Memory state around the buggy address: [ 38.440530] ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.447732] ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.454938] >ffff000806014000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.462138] ^ [ 38.465353] ffff000806014080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.472558] ffff000806014100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.479761] ================================================================== [ 37.680536] ================================================================== [ 37.690278] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.697393] Free of addr ffff000801e2a400 by task kunit_try_catch/279 [ 37.703816] [ 37.705301] CPU: 5 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 37.705362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.705380] Hardware name: WinLink E850-96 board (DT) [ 37.705398] Call trace: [ 37.705416] show_stack+0x20/0x38 (C) [ 37.705449] dump_stack_lvl+0x8c/0xd0 [ 37.705491] print_report+0x118/0x608 [ 37.705528] kasan_report_invalid_free+0xc0/0xe8 [ 37.705561] check_slab_allocation+0xd4/0x108 [ 37.705599] __kasan_mempool_poison_object+0x78/0x150 [ 37.705635] mempool_free+0x28c/0x328 [ 37.705667] mempool_double_free_helper+0x150/0x2e8 [ 37.705701] mempool_kmalloc_double_free+0xc0/0x118 [ 37.705733] kunit_try_run_case+0x170/0x3f0 [ 37.705768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.705807] kthread+0x328/0x630 [ 37.705837] ret_from_fork+0x10/0x20 [ 37.705873] [ 37.783851] Allocated by task 279: [ 37.787239] kasan_save_stack+0x3c/0x68 [ 37.791054] kasan_save_track+0x20/0x40 [ 37.794873] kasan_save_alloc_info+0x40/0x58 [ 37.799127] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.804422] remove_element+0x130/0x1f8 [ 37.808241] mempool_alloc_preallocated+0x58/0xc0 [ 37.812930] mempool_double_free_helper+0x94/0x2e8 [ 37.817703] mempool_kmalloc_double_free+0xc0/0x118 [ 37.822564] kunit_try_run_case+0x170/0x3f0 [ 37.826730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.832199] kthread+0x328/0x630 [ 37.835411] ret_from_fork+0x10/0x20 [ 37.838970] [ 37.840447] Freed by task 279: [ 37.843484] kasan_save_stack+0x3c/0x68 [ 37.847303] kasan_save_track+0x20/0x40 [ 37.851123] kasan_save_free_info+0x4c/0x78 [ 37.855290] __kasan_mempool_poison_object+0xc0/0x150 [ 37.860324] mempool_free+0x28c/0x328 [ 37.863969] mempool_double_free_helper+0x100/0x2e8 [ 37.868832] mempool_kmalloc_double_free+0xc0/0x118 [ 37.873692] kunit_try_run_case+0x170/0x3f0 [ 37.877858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.883327] kthread+0x328/0x630 [ 37.886539] ret_from_fork+0x10/0x20 [ 37.890098] [ 37.891575] The buggy address belongs to the object at ffff000801e2a400 [ 37.891575] which belongs to the cache kmalloc-128 of size 128 [ 37.904075] The buggy address is located 0 bytes inside of [ 37.904075] 128-byte region [ffff000801e2a400, ffff000801e2a480) [ 37.915618] [ 37.917098] The buggy address belongs to the physical page: [ 37.922654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2a [ 37.930639] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.938277] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.945220] page_type: f5(slab) [ 37.948355] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.956076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.963804] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.971613] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.979427] head: 0bfffe0000000001 fffffdffe0078a81 00000000ffffffff 00000000ffffffff [ 37.987238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.995044] page dumped because: kasan: bad access detected [ 38.000601] [ 38.002075] Memory state around the buggy address: [ 38.006857] ffff000801e2a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.014058] ffff000801e2a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.021264] >ffff000801e2a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.028464] ^ [ 38.031679] ffff000801e2a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.038884] ffff000801e2a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.046085] ================================================================== [ 38.055224] ================================================================== [ 38.065185] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.072303] Free of addr ffff000804b14000 by task kunit_try_catch/281 [ 38.078723] [ 38.080210] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.080269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.080285] Hardware name: WinLink E850-96 board (DT) [ 38.080305] Call trace: [ 38.080321] show_stack+0x20/0x38 (C) [ 38.080357] dump_stack_lvl+0x8c/0xd0 [ 38.080397] print_report+0x118/0x608 [ 38.080434] kasan_report_invalid_free+0xc0/0xe8 [ 38.080470] __kasan_mempool_poison_object+0x14c/0x150 [ 38.080508] mempool_free+0x28c/0x328 [ 38.080543] mempool_double_free_helper+0x150/0x2e8 [ 38.080576] mempool_kmalloc_large_double_free+0xc0/0x118 [ 38.080612] kunit_try_run_case+0x170/0x3f0 [ 38.080646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.080685] kthread+0x328/0x630 [ 38.080715] ret_from_fork+0x10/0x20 [ 38.080751] [ 38.155026] The buggy address belongs to the physical page: [ 38.160584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b14 [ 38.168569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.176208] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.183150] page_type: f8(unknown) [ 38.186546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.194266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.201994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.209804] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.217617] head: 0bfffe0000000002 fffffdffe012c501 00000000ffffffff 00000000ffffffff [ 38.225429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.233235] page dumped because: kasan: bad access detected [ 38.238792] [ 38.240266] Memory state around the buggy address: [ 38.245047] ffff000804b13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.252248] ffff000804b13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.259456] >ffff000804b14000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.266655] ^ [ 38.269870] ffff000804b14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.277075] ffff000804b14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.284276] ==================================================================
[ 28.119737] ================================================================== [ 28.119873] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.120244] Free of addr fff00000c78d4000 by task kunit_try_catch/238 [ 28.120470] [ 28.120573] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.120938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.121015] Hardware name: linux,dummy-virt (DT) [ 28.121483] Call trace: [ 28.121544] show_stack+0x20/0x38 (C) [ 28.121677] dump_stack_lvl+0x8c/0xd0 [ 28.121829] print_report+0x118/0x608 [ 28.121946] kasan_report_invalid_free+0xc0/0xe8 [ 28.122075] __kasan_mempool_poison_object+0x14c/0x150 [ 28.122929] mempool_free+0x28c/0x328 [ 28.123164] mempool_double_free_helper+0x150/0x2e8 [ 28.123845] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.124211] kunit_try_run_case+0x170/0x3f0 [ 28.124439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.124609] kthread+0x328/0x630 [ 28.124744] ret_from_fork+0x10/0x20 [ 28.125491] [ 28.125658] The buggy address belongs to the physical page: [ 28.126156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d4 [ 28.126435] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.126851] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.126990] page_type: f8(unknown) [ 28.127128] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.127345] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.127467] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.127583] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.127724] head: 0bfffe0000000002 ffffc1ffc31e3501 00000000ffffffff 00000000ffffffff [ 28.127847] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.127973] page dumped because: kasan: bad access detected [ 28.128190] [ 28.128238] Memory state around the buggy address: [ 28.128315] fff00000c78d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.128430] fff00000c78d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.128709] >fff00000c78d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.128806] ^ [ 28.129445] fff00000c78d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.129824] fff00000c78d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.129938] ================================================================== [ 28.148333] ================================================================== [ 28.148466] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.148613] Free of addr fff00000c78d4000 by task kunit_try_catch/240 [ 28.148752] [ 28.148846] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.149050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.149536] Hardware name: linux,dummy-virt (DT) [ 28.149986] Call trace: [ 28.150100] show_stack+0x20/0x38 (C) [ 28.150386] dump_stack_lvl+0x8c/0xd0 [ 28.150671] print_report+0x118/0x608 [ 28.151054] kasan_report_invalid_free+0xc0/0xe8 [ 28.151190] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.151422] mempool_free+0x24c/0x328 [ 28.151540] mempool_double_free_helper+0x150/0x2e8 [ 28.151879] mempool_page_alloc_double_free+0xbc/0x118 [ 28.152146] kunit_try_run_case+0x170/0x3f0 [ 28.152283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.152627] kthread+0x328/0x630 [ 28.152969] ret_from_fork+0x10/0x20 [ 28.153114] [ 28.153168] The buggy address belongs to the physical page: [ 28.153243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d4 [ 28.153388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.153550] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.154408] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.154964] page dumped because: kasan: bad access detected [ 28.155045] [ 28.155278] Memory state around the buggy address: [ 28.155492] fff00000c78d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.155704] fff00000c78d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.156217] >fff00000c78d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.156313] ^ [ 28.156875] fff00000c78d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.157414] fff00000c78d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.158103] ================================================================== [ 28.073221] ================================================================== [ 28.073393] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.073534] Free of addr fff00000c56e8700 by task kunit_try_catch/236 [ 28.073638] [ 28.074488] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.074948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.075023] Hardware name: linux,dummy-virt (DT) [ 28.075186] Call trace: [ 28.075567] show_stack+0x20/0x38 (C) [ 28.076155] dump_stack_lvl+0x8c/0xd0 [ 28.076662] print_report+0x118/0x608 [ 28.076802] kasan_report_invalid_free+0xc0/0xe8 [ 28.076931] check_slab_allocation+0xd4/0x108 [ 28.077054] __kasan_mempool_poison_object+0x78/0x150 [ 28.077181] mempool_free+0x28c/0x328 [ 28.077323] mempool_double_free_helper+0x150/0x2e8 [ 28.077445] mempool_kmalloc_double_free+0xc0/0x118 [ 28.079063] kunit_try_run_case+0x170/0x3f0 [ 28.079215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.080550] kthread+0x328/0x630 [ 28.080948] ret_from_fork+0x10/0x20 [ 28.081173] [ 28.081347] Allocated by task 236: [ 28.081426] kasan_save_stack+0x3c/0x68 [ 28.082053] kasan_save_track+0x20/0x40 [ 28.082225] kasan_save_alloc_info+0x40/0x58 [ 28.082900] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.083338] remove_element+0x130/0x1f8 [ 28.083489] mempool_alloc_preallocated+0x58/0xc0 [ 28.083616] mempool_double_free_helper+0x94/0x2e8 [ 28.084266] mempool_kmalloc_double_free+0xc0/0x118 [ 28.084385] kunit_try_run_case+0x170/0x3f0 [ 28.084491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.085968] kthread+0x328/0x630 [ 28.086275] ret_from_fork+0x10/0x20 [ 28.086380] [ 28.086904] Freed by task 236: [ 28.087484] kasan_save_stack+0x3c/0x68 [ 28.087634] kasan_save_track+0x20/0x40 [ 28.087775] kasan_save_free_info+0x4c/0x78 [ 28.087887] __kasan_mempool_poison_object+0xc0/0x150 [ 28.088006] mempool_free+0x28c/0x328 [ 28.088254] mempool_double_free_helper+0x100/0x2e8 [ 28.088479] mempool_kmalloc_double_free+0xc0/0x118 [ 28.088648] kunit_try_run_case+0x170/0x3f0 [ 28.088945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.089191] kthread+0x328/0x630 [ 28.089289] ret_from_fork+0x10/0x20 [ 28.089382] [ 28.089444] The buggy address belongs to the object at fff00000c56e8700 [ 28.089444] which belongs to the cache kmalloc-128 of size 128 [ 28.089647] The buggy address is located 0 bytes inside of [ 28.089647] 128-byte region [fff00000c56e8700, fff00000c56e8780) [ 28.090322] [ 28.090580] The buggy address belongs to the physical page: [ 28.090708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 28.091000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.091172] page_type: f5(slab) [ 28.091409] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.091534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.091630] page dumped because: kasan: bad access detected [ 28.091780] [ 28.091876] Memory state around the buggy address: [ 28.091991] fff00000c56e8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.092114] fff00000c56e8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.092225] >fff00000c56e8700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.092399] ^ [ 28.092587] fff00000c56e8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.092859] fff00000c56e8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.093128] ==================================================================
[ 20.805171] ================================================================== [ 20.806675] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 20.807043] Free of addr ffff888103c28000 by task kunit_try_catch/254 [ 20.807649] [ 20.808979] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.809060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.809100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.809151] Call Trace: [ 20.809182] <TASK> [ 20.809224] dump_stack_lvl+0x73/0xb0 [ 20.809269] print_report+0xd1/0x650 [ 20.809304] ? __virt_addr_valid+0x1db/0x2d0 [ 20.809339] ? kasan_addr_to_slab+0x11/0xa0 [ 20.809369] ? mempool_double_free_helper+0x184/0x370 [ 20.809404] kasan_report_invalid_free+0x10a/0x130 [ 20.809440] ? mempool_double_free_helper+0x184/0x370 [ 20.809479] ? mempool_double_free_helper+0x184/0x370 [ 20.809513] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 20.809549] mempool_free+0x2ec/0x380 [ 20.809583] mempool_double_free_helper+0x184/0x370 [ 20.809619] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.809654] ? __kasan_check_write+0x18/0x20 [ 20.809899] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.809948] ? finish_task_switch.isra.0+0x153/0x700 [ 20.810012] mempool_kmalloc_large_double_free+0xed/0x140 [ 20.810053] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 20.810094] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.810120] ? __pfx_mempool_kfree+0x10/0x10 [ 20.810150] ? __pfx_read_tsc+0x10/0x10 [ 20.810274] ? ktime_get_ts64+0x86/0x230 [ 20.810321] kunit_try_run_case+0x1a5/0x480 [ 20.810355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.810384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.810420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.810456] ? __kthread_parkme+0x82/0x180 [ 20.810487] ? preempt_count_sub+0x50/0x80 [ 20.810520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.810548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.810584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.810619] kthread+0x337/0x6f0 [ 20.810646] ? trace_preempt_on+0x20/0xc0 [ 20.810696] ? __pfx_kthread+0x10/0x10 [ 20.810741] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.810774] ? calculate_sigpending+0x7b/0xa0 [ 20.810812] ? __pfx_kthread+0x10/0x10 [ 20.810841] ret_from_fork+0x116/0x1d0 [ 20.810868] ? __pfx_kthread+0x10/0x10 [ 20.810896] ret_from_fork_asm+0x1a/0x30 [ 20.810939] </TASK> [ 20.810978] [ 20.834558] The buggy address belongs to the physical page: [ 20.835040] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c28 [ 20.835838] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.836927] flags: 0x200000000000040(head|node=0|zone=2) [ 20.837682] page_type: f8(unknown) [ 20.838163] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.839690] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.841314] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.842045] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.843031] head: 0200000000000002 ffffea00040f0a01 00000000ffffffff 00000000ffffffff [ 20.843924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.844617] page dumped because: kasan: bad access detected [ 20.845361] [ 20.845540] Memory state around the buggy address: [ 20.846438] ffff888103c27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.847359] ffff888103c27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.847993] >ffff888103c28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.848807] ^ [ 20.849064] ffff888103c28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.850337] ffff888103c28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.851044] ================================================================== [ 20.857232] ================================================================== [ 20.858124] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 20.859185] Free of addr ffff888103c60000 by task kunit_try_catch/256 [ 20.859902] [ 20.860253] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.860388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.860464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.860645] Call Trace: [ 20.860692] <TASK> [ 20.860743] dump_stack_lvl+0x73/0xb0 [ 20.860822] print_report+0xd1/0x650 [ 20.860899] ? __virt_addr_valid+0x1db/0x2d0 [ 20.860999] ? kasan_addr_to_slab+0x11/0xa0 [ 20.861070] ? mempool_double_free_helper+0x184/0x370 [ 20.861266] kasan_report_invalid_free+0x10a/0x130 [ 20.861361] ? mempool_double_free_helper+0x184/0x370 [ 20.861452] ? mempool_double_free_helper+0x184/0x370 [ 20.861511] __kasan_mempool_poison_pages+0x115/0x130 [ 20.861552] mempool_free+0x290/0x380 [ 20.861586] mempool_double_free_helper+0x184/0x370 [ 20.861624] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.861661] ? __kasan_check_write+0x18/0x20 [ 20.861726] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.861763] ? finish_task_switch.isra.0+0x153/0x700 [ 20.861800] mempool_page_alloc_double_free+0xe8/0x140 [ 20.861839] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 20.861880] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 20.861907] ? __pfx_mempool_free_pages+0x10/0x10 [ 20.861938] ? __pfx_read_tsc+0x10/0x10 [ 20.861997] ? ktime_get_ts64+0x86/0x230 [ 20.862033] kunit_try_run_case+0x1a5/0x480 [ 20.862067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.862095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.862129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.862175] ? __kthread_parkme+0x82/0x180 [ 20.862304] ? preempt_count_sub+0x50/0x80 [ 20.862339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.862369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.862407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.862443] kthread+0x337/0x6f0 [ 20.862471] ? trace_preempt_on+0x20/0xc0 [ 20.862503] ? __pfx_kthread+0x10/0x10 [ 20.862532] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.862565] ? calculate_sigpending+0x7b/0xa0 [ 20.862601] ? __pfx_kthread+0x10/0x10 [ 20.862632] ret_from_fork+0x116/0x1d0 [ 20.862657] ? __pfx_kthread+0x10/0x10 [ 20.862699] ret_from_fork_asm+0x1a/0x30 [ 20.862759] </TASK> [ 20.862775] [ 20.890004] The buggy address belongs to the physical page: [ 20.891118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c60 [ 20.892403] flags: 0x200000000000000(node=0|zone=2) [ 20.892809] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.894010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.894632] page dumped because: kasan: bad access detected [ 20.895131] [ 20.895349] Memory state around the buggy address: [ 20.895787] ffff888103c5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.897210] ffff888103c5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.897798] >ffff888103c60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.898669] ^ [ 20.898993] ffff888103c60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.899981] ffff888103c60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.900991] ================================================================== [ 20.731068] ================================================================== [ 20.731918] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 20.732793] Free of addr ffff8881022e0500 by task kunit_try_catch/252 [ 20.734376] [ 20.735236] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.735310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.735329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.735363] Call Trace: [ 20.735383] <TASK> [ 20.735408] dump_stack_lvl+0x73/0xb0 [ 20.735450] print_report+0xd1/0x650 [ 20.735482] ? __virt_addr_valid+0x1db/0x2d0 [ 20.735518] ? kasan_complete_mode_report_info+0x64/0x200 [ 20.735551] ? mempool_double_free_helper+0x184/0x370 [ 20.735587] kasan_report_invalid_free+0x10a/0x130 [ 20.735622] ? mempool_double_free_helper+0x184/0x370 [ 20.735660] ? mempool_double_free_helper+0x184/0x370 [ 20.735721] ? mempool_double_free_helper+0x184/0x370 [ 20.735760] check_slab_allocation+0x101/0x130 [ 20.735796] __kasan_mempool_poison_object+0x91/0x1d0 [ 20.735832] mempool_free+0x2ec/0x380 [ 20.735866] mempool_double_free_helper+0x184/0x370 [ 20.735902] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.735940] ? __kasan_check_write+0x18/0x20 [ 20.736029] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.736130] ? finish_task_switch.isra.0+0x153/0x700 [ 20.736239] mempool_kmalloc_double_free+0xed/0x140 [ 20.736280] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 20.736319] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.736346] ? __pfx_mempool_kfree+0x10/0x10 [ 20.736377] ? __pfx_read_tsc+0x10/0x10 [ 20.736408] ? ktime_get_ts64+0x86/0x230 [ 20.736442] kunit_try_run_case+0x1a5/0x480 [ 20.736474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.736502] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.736539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.736575] ? __kthread_parkme+0x82/0x180 [ 20.736605] ? preempt_count_sub+0x50/0x80 [ 20.736635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.736663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.736726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.736765] kthread+0x337/0x6f0 [ 20.736795] ? trace_preempt_on+0x20/0xc0 [ 20.736828] ? __pfx_kthread+0x10/0x10 [ 20.736857] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.736891] ? calculate_sigpending+0x7b/0xa0 [ 20.736926] ? __pfx_kthread+0x10/0x10 [ 20.736985] ret_from_fork+0x116/0x1d0 [ 20.737027] ? __pfx_kthread+0x10/0x10 [ 20.737059] ret_from_fork_asm+0x1a/0x30 [ 20.737104] </TASK> [ 20.737119] [ 20.765233] Allocated by task 252: [ 20.766107] kasan_save_stack+0x45/0x70 [ 20.766791] kasan_save_track+0x18/0x40 [ 20.767465] kasan_save_alloc_info+0x3b/0x50 [ 20.767818] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 20.768949] remove_element+0x11e/0x190 [ 20.769695] mempool_alloc_preallocated+0x4d/0x90 [ 20.770105] mempool_double_free_helper+0x8a/0x370 [ 20.771021] mempool_kmalloc_double_free+0xed/0x140 [ 20.771604] kunit_try_run_case+0x1a5/0x480 [ 20.772074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.773234] kthread+0x337/0x6f0 [ 20.773531] ret_from_fork+0x116/0x1d0 [ 20.774346] ret_from_fork_asm+0x1a/0x30 [ 20.774674] [ 20.775306] Freed by task 252: [ 20.775605] kasan_save_stack+0x45/0x70 [ 20.776500] kasan_save_track+0x18/0x40 [ 20.776768] kasan_save_free_info+0x3f/0x60 [ 20.777587] __kasan_mempool_poison_object+0x131/0x1d0 [ 20.778636] mempool_free+0x2ec/0x380 [ 20.779359] mempool_double_free_helper+0x109/0x370 [ 20.779982] mempool_kmalloc_double_free+0xed/0x140 [ 20.780666] kunit_try_run_case+0x1a5/0x480 [ 20.781117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.782026] kthread+0x337/0x6f0 [ 20.782993] ret_from_fork+0x116/0x1d0 [ 20.783393] ret_from_fork_asm+0x1a/0x30 [ 20.783571] [ 20.783660] The buggy address belongs to the object at ffff8881022e0500 [ 20.783660] which belongs to the cache kmalloc-128 of size 128 [ 20.784108] The buggy address is located 0 bytes inside of [ 20.784108] 128-byte region [ffff8881022e0500, ffff8881022e0580) [ 20.785835] [ 20.786342] The buggy address belongs to the physical page: [ 20.787155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0 [ 20.788406] flags: 0x200000000000000(node=0|zone=2) [ 20.789089] page_type: f5(slab) [ 20.789567] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.790479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.791591] page dumped because: kasan: bad access detected [ 20.792248] [ 20.792672] Memory state around the buggy address: [ 20.793164] ffff8881022e0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.794498] ffff8881022e0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.795280] >ffff8881022e0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.795909] ^ [ 20.796278] ffff8881022e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.797424] ffff8881022e0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.797893] ==================================================================
[ 64.487854] ================================================================== [ 64.499420] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 64.506591] Free of addr cc893700 by task kunit_try_catch/287 [ 64.512390] [ 64.513885] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 64.513916] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.513946] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.513946] Call trace: [ 64.513946] unwind_backtrace from show_stack+0x18/0x1c [ 64.513977] show_stack from dump_stack_lvl+0x70/0x90 [ 64.514007] dump_stack_lvl from print_report+0x158/0x528 [ 64.514038] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 64.514068] kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8 [ 64.514068] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 64.514099] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 64.514129] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 64.514160] mempool_double_free_helper from mempool_kmalloc_double_free+0xb8/0x104 [ 64.514190] mempool_kmalloc_double_free from kunit_try_run_case+0x22c/0x5a8 [ 64.514221] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.514251] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.514251] kthread from ret_from_fork+0x14/0x20 [ 64.514282] Exception stack(0xf243bfb0 to 0xf243bff8) [ 64.514282] bfa0: 00000000 00000000 00000000 00000000 [ 64.514312] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.514343] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.514343] [ 64.651611] Allocated by task 287: [ 64.655059] kasan_save_track+0x30/0x5c [ 64.658905] remove_element+0x180/0x264 [ 64.662780] mempool_alloc_preallocated+0x60/0x9c [ 64.667510] mempool_double_free_helper+0x8c/0x368 [ 64.672363] mempool_kmalloc_double_free+0xb8/0x104 [ 64.677276] kunit_try_run_case+0x22c/0x5a8 [ 64.681488] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.687011] kthread+0x464/0x810 [ 64.690277] ret_from_fork+0x14/0x20 [ 64.693878] [ 64.695373] Freed by task 287: [ 64.698455] kasan_save_track+0x30/0x5c [ 64.702331] kasan_save_free_info+0x3c/0x48 [ 64.706542] __kasan_mempool_poison_object+0x94/0x128 [ 64.711639] mempool_free+0x360/0x440 [ 64.715332] mempool_double_free_helper+0x13c/0x368 [ 64.720245] mempool_kmalloc_double_free+0xb8/0x104 [ 64.725158] kunit_try_run_case+0x22c/0x5a8 [ 64.729370] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.734893] kthread+0x464/0x810 [ 64.738159] ret_from_fork+0x14/0x20 [ 64.741760] [ 64.743255] The buggy address belongs to the object at cc893700 [ 64.743255] which belongs to the cache kmalloc-128 of size 128 [ 64.755157] The buggy address is located 0 bytes inside of [ 64.755157] 128-byte region [cc893700, cc893780) [ 64.765411] [ 64.766906] The buggy address belongs to the physical page: [ 64.772521] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c893 [ 64.779785] flags: 0x0(zone=0) [ 64.782867] page_type: f5(slab) [ 64.786041] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 64.794189] raw: 00000000 [ 64.796813] page dumped because: kasan: bad access detected [ 64.802429] [ 64.803924] Memory state around the buggy address: [ 64.808746] cc893600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.815307] cc893680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.821899] >cc893700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.828460] ^ [ 64.831024] cc893780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.837585] cc893800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.844146] ================================================================== [ 64.852233] ================================================================== [ 64.864227] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 64.871398] Free of addr cc8fc000 by task kunit_try_catch/289 [ 64.877197] [ 64.878692] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 64.878723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.878753] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.878753] Call trace: [ 64.878753] unwind_backtrace from show_stack+0x18/0x1c [ 64.878784] show_stack from dump_stack_lvl+0x70/0x90 [ 64.878814] dump_stack_lvl from print_report+0x158/0x528 [ 64.878845] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 64.878875] kasan_report_invalid_free from __kasan_mempool_poison_object+0x124/0x128 [ 64.878875] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 64.878906] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 64.878936] mempool_double_free_helper from mempool_kmalloc_large_double_free+0xb8/0x104 [ 64.878967] mempool_kmalloc_large_double_free from kunit_try_run_case+0x22c/0x5a8 [ 64.878997] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.879028] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.879058] kthread from ret_from_fork+0x14/0x20 [ 64.879058] Exception stack(0xf1833fb0 to 0xf1833ff8) [ 64.879089] 3fa0: 00000000 00000000 00000000 00000000 [ 64.879089] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.879119] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.879119] [ 65.010894] The buggy address belongs to the physical page: [ 65.016510] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc [ 65.023773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.031494] flags: 0x40(head|zone=0) [ 65.035095] page_type: f8(unknown) [ 65.038513] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.046661] raw: 00000000 [ 65.049316] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.057556] head: 00000000 00000002 eebc3371 ffffffff 00000000 ffffffff 00000000 ffffffff [ 65.065795] head: 00000000 00000004 [ 65.069305] page dumped because: kasan: bad access detected [ 65.074890] [ 65.076416] Memory state around the buggy address: [ 65.081237] cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.087799] cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.094360] >cc8fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.100952] ^ [ 65.103485] cc8fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.110076] cc8fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.116638] ================================================================== [ 65.124847] ================================================================== [ 65.137359] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368 [ 65.144561] Free of addr cc8fc000 by task kunit_try_catch/291 [ 65.150329] [ 65.151855] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.151885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.151885] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.151885] Call trace: [ 65.151916] unwind_backtrace from show_stack+0x18/0x1c [ 65.151916] show_stack from dump_stack_lvl+0x70/0x90 [ 65.151947] dump_stack_lvl from print_report+0x158/0x528 [ 65.151977] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.152008] kasan_report_invalid_free from __kasan_mempool_poison_pages+0xdc/0xe0 [ 65.152038] __kasan_mempool_poison_pages from mempool_free+0x314/0x440 [ 65.152038] mempool_free from mempool_double_free_helper+0x1c4/0x368 [ 65.152069] mempool_double_free_helper from mempool_page_alloc_double_free+0xb4/0x100 [ 65.152099] mempool_page_alloc_double_free from kunit_try_run_case+0x22c/0x5a8 [ 65.152130] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.152160] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.152191] kthread from ret_from_fork+0x14/0x20 [ 65.152221] Exception stack(0xf244bfb0 to 0xf244bff8) [ 65.152221] bfa0: 00000000 00000000 00000000 00000000 [ 65.152252] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.152252] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.152252] [ 65.283172] The buggy address belongs to the physical page: [ 65.288757] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc [ 65.296051] flags: 0x0(zone=0) [ 65.299133] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 65.307281] raw: 00000000 [ 65.309906] page dumped because: kasan: bad access detected [ 65.315521] [ 65.317016] Memory state around the buggy address: [ 65.321838] cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.328399] cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.334991] >cc8fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.341552] ^ [ 65.344085] cc8fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.350677] cc8fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.357238] ==================================================================