Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 55.553471] ================================================================== [ 55.563636] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.571613] Free of addr ffff0008019ace01 by task kunit_try_catch/325 [ 55.578037] [ 55.579524] CPU: 3 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 55.579588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.579605] Hardware name: WinLink E850-96 board (DT) [ 55.579628] Call trace: [ 55.579641] show_stack+0x20/0x38 (C) [ 55.579677] dump_stack_lvl+0x8c/0xd0 [ 55.579710] print_report+0x118/0x5d0 [ 55.579739] kasan_report_invalid_free+0xc0/0xe8 [ 55.579773] check_slab_allocation+0xfc/0x108 [ 55.579816] __kasan_mempool_poison_object+0x78/0x150 [ 55.579854] mempool_free+0x28c/0x328 [ 55.579888] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.579926] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.579960] kunit_try_run_case+0x170/0x3f0 [ 55.580001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.580034] kthread+0x328/0x630 [ 55.580066] ret_from_fork+0x10/0x20 [ 55.580104] [ 55.659287] Allocated by task 325: [ 55.662675] kasan_save_stack+0x3c/0x68 [ 55.666491] kasan_save_track+0x20/0x40 [ 55.670310] kasan_save_alloc_info+0x40/0x58 [ 55.674563] __kasan_mempool_unpoison_object+0x11c/0x180 [ 55.679859] remove_element+0x130/0x1f8 [ 55.683678] mempool_alloc_preallocated+0x58/0xc0 [ 55.688367] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 55.693921] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.698868] kunit_try_run_case+0x170/0x3f0 [ 55.703035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.708504] kthread+0x328/0x630 [ 55.711715] ret_from_fork+0x10/0x20 [ 55.715275] [ 55.716752] The buggy address belongs to the object at ffff0008019ace00 [ 55.716752] which belongs to the cache kmalloc-128 of size 128 [ 55.729252] The buggy address is located 1 bytes inside of [ 55.729252] 128-byte region [ffff0008019ace00, ffff0008019ace80) [ 55.740795] [ 55.742273] The buggy address belongs to the physical page: [ 55.747831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 55.755815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.763453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.770396] page_type: f5(slab) [ 55.773534] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.781252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.788981] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.796791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.804603] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 55.812415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 55.820221] page dumped because: kasan: bad access detected [ 55.825776] [ 55.827251] Memory state around the buggy address: [ 55.832030] ffff0008019acd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.839235] ffff0008019acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.846441] >ffff0008019ace00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.853641] ^ [ 55.856856] ffff0008019ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.864061] ffff0008019acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.871263] ================================================================== [ 55.880310] ================================================================== [ 55.890452] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.898433] Free of addr ffff000805b50001 by task kunit_try_catch/327 [ 55.904856] [ 55.906342] CPU: 5 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 55.906405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.906424] Hardware name: WinLink E850-96 board (DT) [ 55.906449] Call trace: [ 55.906463] show_stack+0x20/0x38 (C) [ 55.906498] dump_stack_lvl+0x8c/0xd0 [ 55.906533] print_report+0x118/0x5d0 [ 55.906564] kasan_report_invalid_free+0xc0/0xe8 [ 55.906597] __kasan_mempool_poison_object+0xfc/0x150 [ 55.906639] mempool_free+0x28c/0x328 [ 55.906675] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.906713] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 55.906753] kunit_try_run_case+0x170/0x3f0 [ 55.906794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.906827] kthread+0x328/0x630 [ 55.906858] ret_from_fork+0x10/0x20 [ 55.906897] [ 55.982287] The buggy address belongs to the physical page: [ 55.987844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50 [ 55.995828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 56.003467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 56.010410] page_type: f8(unknown) [ 56.013807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 56.021526] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 56.029253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 56.037064] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 56.044878] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff [ 56.052689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 56.060495] page dumped because: kasan: bad access detected [ 56.066050] [ 56.067526] Memory state around the buggy address: [ 56.072305] ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.079509] ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.086715] >ffff000805b50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.093915] ^ [ 56.097130] ffff000805b50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.104335] ffff000805b50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.111537] ==================================================================
[ 32.543440] ================================================================== [ 32.543755] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.543860] Free of addr fff00000c9b68001 by task kunit_try_catch/274 [ 32.543906] [ 32.544035] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.544126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.544153] Hardware name: linux,dummy-virt (DT) [ 32.544317] Call trace: [ 32.544423] show_stack+0x20/0x38 (C) [ 32.544486] dump_stack_lvl+0x8c/0xd0 [ 32.544553] print_report+0x118/0x5d0 [ 32.544598] kasan_report_invalid_free+0xc0/0xe8 [ 32.544662] __kasan_mempool_poison_object+0xfc/0x150 [ 32.544715] mempool_free+0x28c/0x328 [ 32.544900] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.544960] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.545013] kunit_try_run_case+0x170/0x3f0 [ 32.545081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.545136] kthread+0x328/0x630 [ 32.545180] ret_from_fork+0x10/0x20 [ 32.545248] [ 32.545291] The buggy address belongs to the physical page: [ 32.545334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68 [ 32.545433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.545485] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.545694] page_type: f8(unknown) [ 32.545788] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.545909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.545994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.546042] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.546131] head: 0bfffe0000000002 ffffc1ffc326da01 00000000ffffffff 00000000ffffffff [ 32.546254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.546388] page dumped because: kasan: bad access detected [ 32.546470] [ 32.546518] Memory state around the buggy address: [ 32.546552] fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.546832] fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.546924] >fff00000c9b68000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.547012] ^ [ 32.547077] fff00000c9b68080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.547117] fff00000c9b68100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.547213] ================================================================== [ 32.532365] ================================================================== [ 32.532558] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.532651] Free of addr fff00000c91a7101 by task kunit_try_catch/272 [ 32.532703] [ 32.532742] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.532830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.532867] Hardware name: linux,dummy-virt (DT) [ 32.532908] Call trace: [ 32.532932] show_stack+0x20/0x38 (C) [ 32.532984] dump_stack_lvl+0x8c/0xd0 [ 32.533031] print_report+0x118/0x5d0 [ 32.533092] kasan_report_invalid_free+0xc0/0xe8 [ 32.533139] check_slab_allocation+0xfc/0x108 [ 32.533198] __kasan_mempool_poison_object+0x78/0x150 [ 32.533251] mempool_free+0x28c/0x328 [ 32.533297] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.533598] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.534117] kunit_try_run_case+0x170/0x3f0 [ 32.534219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.534284] kthread+0x328/0x630 [ 32.534343] ret_from_fork+0x10/0x20 [ 32.534393] [ 32.534411] Allocated by task 272: [ 32.534442] kasan_save_stack+0x3c/0x68 [ 32.534485] kasan_save_track+0x20/0x40 [ 32.534525] kasan_save_alloc_info+0x40/0x58 [ 32.534563] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.534828] remove_element+0x130/0x1f8 [ 32.534906] mempool_alloc_preallocated+0x58/0xc0 [ 32.534979] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.535053] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.535105] kunit_try_run_case+0x170/0x3f0 [ 32.535174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.535255] kthread+0x328/0x630 [ 32.535319] ret_from_fork+0x10/0x20 [ 32.535416] [ 32.535487] The buggy address belongs to the object at fff00000c91a7100 [ 32.535487] which belongs to the cache kmalloc-128 of size 128 [ 32.535575] The buggy address is located 1 bytes inside of [ 32.535575] 128-byte region [fff00000c91a7100, fff00000c91a7180) [ 32.535656] [ 32.535676] The buggy address belongs to the physical page: [ 32.535911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 32.536019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.536108] page_type: f5(slab) [ 32.536169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.536254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.536336] page dumped because: kasan: bad access detected [ 32.536713] [ 32.536753] Memory state around the buggy address: [ 32.536805] fff00000c91a7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.536849] fff00000c91a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537067] >fff00000c91a7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.537220] ^ [ 32.537294] fff00000c91a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537441] fff00000c91a7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.537525] ==================================================================
[ 25.581569] ================================================================== [ 25.582077] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.582585] Free of addr ffff888104cacf01 by task kunit_try_catch/291 [ 25.582873] [ 25.582990] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 25.583045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.583056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.583080] Call Trace: [ 25.583095] <TASK> [ 25.583113] dump_stack_lvl+0x73/0xb0 [ 25.583146] print_report+0xd1/0x610 [ 25.583168] ? __virt_addr_valid+0x1db/0x2d0 [ 25.583193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.583219] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.583245] kasan_report_invalid_free+0x10a/0x130 [ 25.583278] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.583304] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.583328] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.583351] check_slab_allocation+0x11f/0x130 [ 25.583373] __kasan_mempool_poison_object+0x91/0x1d0 [ 25.583397] mempool_free+0x2ec/0x380 [ 25.583423] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.583447] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 25.583473] ? __kasan_check_write+0x18/0x20 [ 25.583496] ? __pfx_sched_clock_cpu+0x10/0x10 [ 25.583518] ? finish_task_switch.isra.0+0x153/0x700 [ 25.583544] mempool_kmalloc_invalid_free+0xed/0x140 [ 25.583568] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 25.583594] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.583616] ? __pfx_mempool_kfree+0x10/0x10 [ 25.583640] ? __pfx_read_tsc+0x10/0x10 [ 25.583663] ? ktime_get_ts64+0x86/0x230 [ 25.583689] kunit_try_run_case+0x1a5/0x480 [ 25.583713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.583743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.583767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.583791] ? __kthread_parkme+0x82/0x180 [ 25.583812] ? preempt_count_sub+0x50/0x80 [ 25.583835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.583856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.583881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.583907] kthread+0x337/0x6f0 [ 25.583927] ? trace_preempt_on+0x20/0xc0 [ 25.583951] ? __pfx_kthread+0x10/0x10 [ 25.583971] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.583992] ? calculate_sigpending+0x7b/0xa0 [ 25.584017] ? __pfx_kthread+0x10/0x10 [ 25.584038] ret_from_fork+0x116/0x1d0 [ 25.584057] ? __pfx_kthread+0x10/0x10 [ 25.584078] ret_from_fork_asm+0x1a/0x30 [ 25.584108] </TASK> [ 25.584120] [ 25.593510] Allocated by task 291: [ 25.593643] kasan_save_stack+0x45/0x70 [ 25.593992] kasan_save_track+0x18/0x40 [ 25.594155] kasan_save_alloc_info+0x3b/0x50 [ 25.594420] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 25.594636] remove_element+0x11e/0x190 [ 25.594817] mempool_alloc_preallocated+0x4d/0x90 [ 25.595016] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 25.595242] mempool_kmalloc_invalid_free+0xed/0x140 [ 25.595510] kunit_try_run_case+0x1a5/0x480 [ 25.595708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.595942] kthread+0x337/0x6f0 [ 25.596060] ret_from_fork+0x116/0x1d0 [ 25.596185] ret_from_fork_asm+0x1a/0x30 [ 25.596426] [ 25.596522] The buggy address belongs to the object at ffff888104cacf00 [ 25.596522] which belongs to the cache kmalloc-128 of size 128 [ 25.597057] The buggy address is located 1 bytes inside of [ 25.597057] 128-byte region [ffff888104cacf00, ffff888104cacf80) [ 25.597667] [ 25.597784] The buggy address belongs to the physical page: [ 25.598009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104cac [ 25.598400] flags: 0x200000000000000(node=0|zone=2) [ 25.598620] page_type: f5(slab) [ 25.598778] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.599075] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 25.599296] page dumped because: kasan: bad access detected [ 25.599460] [ 25.599523] Memory state around the buggy address: [ 25.599778] ffff888104cace00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.600085] ffff888104cace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.600527] >ffff888104cacf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.600808] ^ [ 25.600973] ffff888104cacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.601248] ffff888104cad000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.601674] ================================================================== [ 25.605546] ================================================================== [ 25.606048] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.606365] Free of addr ffff888102bac001 by task kunit_try_catch/293 [ 25.606688] [ 25.606805] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 25.606861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.606874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.606898] Call Trace: [ 25.606912] <TASK> [ 25.606930] dump_stack_lvl+0x73/0xb0 [ 25.606965] print_report+0xd1/0x610 [ 25.606988] ? __virt_addr_valid+0x1db/0x2d0 [ 25.607015] ? kasan_addr_to_slab+0x11/0xa0 [ 25.607036] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.607061] kasan_report_invalid_free+0x10a/0x130 [ 25.607086] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.607114] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.607138] __kasan_mempool_poison_object+0x102/0x1d0 [ 25.607162] mempool_free+0x2ec/0x380 [ 25.607190] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.607215] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 25.607242] ? __kasan_check_write+0x18/0x20 [ 25.607266] ? __pfx_sched_clock_cpu+0x10/0x10 [ 25.607290] ? finish_task_switch.isra.0+0x153/0x700 [ 25.607317] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 25.607342] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 25.607369] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.607449] ? __pfx_mempool_kfree+0x10/0x10 [ 25.607480] ? __pfx_read_tsc+0x10/0x10 [ 25.607504] ? ktime_get_ts64+0x86/0x230 [ 25.607530] kunit_try_run_case+0x1a5/0x480 [ 25.607556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.607578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.607605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.607630] ? __kthread_parkme+0x82/0x180 [ 25.607651] ? preempt_count_sub+0x50/0x80 [ 25.607674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.607696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.607721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.607758] kthread+0x337/0x6f0 [ 25.607779] ? trace_preempt_on+0x20/0xc0 [ 25.607804] ? __pfx_kthread+0x10/0x10 [ 25.607827] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.607848] ? calculate_sigpending+0x7b/0xa0 [ 25.607874] ? __pfx_kthread+0x10/0x10 [ 25.607896] ret_from_fork+0x116/0x1d0 [ 25.607916] ? __pfx_kthread+0x10/0x10 [ 25.607938] ret_from_fork_asm+0x1a/0x30 [ 25.607970] </TASK> [ 25.607981] [ 25.619828] The buggy address belongs to the physical page: [ 25.620070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bac [ 25.620406] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.621371] flags: 0x200000000000040(head|node=0|zone=2) [ 25.621807] page_type: f8(unknown) [ 25.622112] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.622758] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.623086] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.623395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.623697] head: 0200000000000002 ffffea00040aeb01 00000000ffffffff 00000000ffffffff [ 25.624551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.625127] page dumped because: kasan: bad access detected [ 25.625643] [ 25.625915] Memory state around the buggy address: [ 25.626181] ffff888102babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.626794] ffff888102babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.627105] >ffff888102bac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.627687] ^ [ 25.627852] ffff888102bac080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.628139] ffff888102bac100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.628771] ==================================================================