Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 54.579969] ================================================================== [ 54.590099] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.598083] Free of addr ffff000808920001 by task kunit_try_catch/327 [ 54.604506] [ 54.605994] CPU: 4 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.606049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.606067] Hardware name: WinLink E850-96 board (DT) [ 54.606089] Call trace: [ 54.606104] show_stack+0x20/0x38 (C) [ 54.606140] dump_stack_lvl+0x8c/0xd0 [ 54.606177] print_report+0x118/0x5d0 [ 54.606206] kasan_report_invalid_free+0xc0/0xe8 [ 54.606236] __kasan_mempool_poison_object+0xfc/0x150 [ 54.606277] mempool_free+0x28c/0x328 [ 54.606307] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.606346] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 54.606382] kunit_try_run_case+0x170/0x3f0 [ 54.606421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.606453] kthread+0x328/0x630 [ 54.606483] ret_from_fork+0x10/0x20 [ 54.606519] [ 54.681940] The buggy address belongs to the physical page: [ 54.687497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920 [ 54.695479] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.703118] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.710062] page_type: f8(unknown) [ 54.713459] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.721177] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.728904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.736716] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.744529] head: 0bfffe0000000002 fffffdffe0224801 00000000ffffffff 00000000ffffffff [ 54.752341] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 54.760148] page dumped because: kasan: bad access detected [ 54.765702] [ 54.767179] Memory state around the buggy address: [ 54.771959] ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.779160] ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.786365] >ffff000808920000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.793566] ^ [ 54.796781] ffff000808920080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.803986] ffff000808920100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.811189] ================================================================== [ 54.252759] ================================================================== [ 54.263283] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.271265] Free of addr ffff000801e0bd01 by task kunit_try_catch/325 [ 54.277688] [ 54.279175] CPU: 5 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.279231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.279249] Hardware name: WinLink E850-96 board (DT) [ 54.279271] Call trace: [ 54.279284] show_stack+0x20/0x38 (C) [ 54.279320] dump_stack_lvl+0x8c/0xd0 [ 54.279352] print_report+0x118/0x5d0 [ 54.279379] kasan_report_invalid_free+0xc0/0xe8 [ 54.279410] check_slab_allocation+0xfc/0x108 [ 54.279446] __kasan_mempool_poison_object+0x78/0x150 [ 54.279487] mempool_free+0x28c/0x328 [ 54.279522] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.279559] mempool_kmalloc_invalid_free+0xc0/0x118 [ 54.279593] kunit_try_run_case+0x170/0x3f0 [ 54.279632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.279666] kthread+0x328/0x630 [ 54.279697] ret_from_fork+0x10/0x20 [ 54.279731] [ 54.358939] Allocated by task 325: [ 54.362323] kasan_save_stack+0x3c/0x68 [ 54.366142] kasan_save_track+0x20/0x40 [ 54.369961] kasan_save_alloc_info+0x40/0x58 [ 54.374215] __kasan_mempool_unpoison_object+0x11c/0x180 [ 54.379511] remove_element+0x130/0x1f8 [ 54.383329] mempool_alloc_preallocated+0x58/0xc0 [ 54.388017] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 54.393572] mempool_kmalloc_invalid_free+0xc0/0x118 [ 54.398520] kunit_try_run_case+0x170/0x3f0 [ 54.402686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.408155] kthread+0x328/0x630 [ 54.411367] ret_from_fork+0x10/0x20 [ 54.414926] [ 54.416403] The buggy address belongs to the object at ffff000801e0bd00 [ 54.416403] which belongs to the cache kmalloc-128 of size 128 [ 54.428904] The buggy address is located 1 bytes inside of [ 54.428904] 128-byte region [ffff000801e0bd00, ffff000801e0bd80) [ 54.440446] [ 54.441926] The buggy address belongs to the physical page: [ 54.447483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a [ 54.455466] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.463104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.470048] page_type: f5(slab) [ 54.473184] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 54.480904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.488630] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 54.496442] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.504254] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff [ 54.512067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 54.519874] page dumped because: kasan: bad access detected [ 54.525428] [ 54.526904] Memory state around the buggy address: [ 54.531684] ffff000801e0bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.538886] ffff000801e0bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.546092] >ffff000801e0bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.553292] ^ [ 54.556507] ffff000801e0bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.563712] ffff000801e0be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.570913] ==================================================================
[ 31.853582] ================================================================== [ 31.853654] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.853713] Free of addr fff00000c9c08001 by task kunit_try_catch/274 [ 31.853759] [ 31.853794] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.853878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.853903] Hardware name: linux,dummy-virt (DT) [ 31.853935] Call trace: [ 31.853957] show_stack+0x20/0x38 (C) [ 31.854074] dump_stack_lvl+0x8c/0xd0 [ 31.854140] print_report+0x118/0x5d0 [ 31.854186] kasan_report_invalid_free+0xc0/0xe8 [ 31.854232] __kasan_mempool_poison_object+0xfc/0x150 [ 31.854285] mempool_free+0x28c/0x328 [ 31.854340] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.854391] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 31.854443] kunit_try_run_case+0x170/0x3f0 [ 31.854492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.854548] kthread+0x328/0x630 [ 31.854591] ret_from_fork+0x10/0x20 [ 31.854646] [ 31.854676] The buggy address belongs to the physical page: [ 31.854709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c08 [ 31.854773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.854821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.854883] page_type: f8(unknown) [ 31.854922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.854978] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.855028] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.855885] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.856159] head: 0bfffe0000000002 ffffc1ffc3270201 00000000ffffffff 00000000ffffffff [ 31.856284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.856370] page dumped because: kasan: bad access detected [ 31.856455] [ 31.856759] Memory state around the buggy address: [ 31.856830] fff00000c9c07f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.856977] fff00000c9c07f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.857106] >fff00000c9c08000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.857339] ^ [ 31.857422] fff00000c9c08080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.857571] fff00000c9c08100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.857976] ================================================================== [ 31.833790] ================================================================== [ 31.833862] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.833948] Free of addr fff00000c85fca01 by task kunit_try_catch/272 [ 31.833992] [ 31.834038] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.834136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.834171] Hardware name: linux,dummy-virt (DT) [ 31.834204] Call trace: [ 31.834235] show_stack+0x20/0x38 (C) [ 31.834284] dump_stack_lvl+0x8c/0xd0 [ 31.834332] print_report+0x118/0x5d0 [ 31.834376] kasan_report_invalid_free+0xc0/0xe8 [ 31.834422] check_slab_allocation+0xfc/0x108 [ 31.834478] __kasan_mempool_poison_object+0x78/0x150 [ 31.834532] mempool_free+0x28c/0x328 [ 31.834576] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.834629] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.834684] kunit_try_run_case+0x170/0x3f0 [ 31.834731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.834781] kthread+0x328/0x630 [ 31.834824] ret_from_fork+0x10/0x20 [ 31.834873] [ 31.834897] Allocated by task 272: [ 31.834925] kasan_save_stack+0x3c/0x68 [ 31.834965] kasan_save_track+0x20/0x40 [ 31.835004] kasan_save_alloc_info+0x40/0x58 [ 31.835962] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.836067] remove_element+0x130/0x1f8 [ 31.836130] mempool_alloc_preallocated+0x58/0xc0 [ 31.836183] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 31.836261] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.836443] kunit_try_run_case+0x170/0x3f0 [ 31.836493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.836535] kthread+0x328/0x630 [ 31.836568] ret_from_fork+0x10/0x20 [ 31.836976] [ 31.837070] The buggy address belongs to the object at fff00000c85fca00 [ 31.837070] which belongs to the cache kmalloc-128 of size 128 [ 31.837433] The buggy address is located 1 bytes inside of [ 31.837433] 128-byte region [fff00000c85fca00, fff00000c85fca80) [ 31.837602] [ 31.837682] The buggy address belongs to the physical page: [ 31.837993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 31.838079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.838247] page_type: f5(slab) [ 31.838343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.838706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.838839] page dumped because: kasan: bad access detected [ 31.838899] [ 31.839205] Memory state around the buggy address: [ 31.839291] fff00000c85fc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.839367] fff00000c85fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.839508] >fff00000c85fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.839585] ^ [ 31.839614] fff00000c85fca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.839986] fff00000c85fcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.840069] ==================================================================
[ 26.062345] ================================================================== [ 26.062875] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.063545] Free of addr ffff888103e99901 by task kunit_try_catch/290 [ 26.063764] [ 26.063852] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.063908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.063923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.063947] Call Trace: [ 26.063960] <TASK> [ 26.063979] dump_stack_lvl+0x73/0xb0 [ 26.064012] print_report+0xd1/0x610 [ 26.064036] ? __virt_addr_valid+0x1db/0x2d0 [ 26.064083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.064109] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.064134] kasan_report_invalid_free+0x10a/0x130 [ 26.064157] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.064183] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.064207] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.064230] check_slab_allocation+0x11f/0x130 [ 26.064251] __kasan_mempool_poison_object+0x91/0x1d0 [ 26.064274] mempool_free+0x2ec/0x380 [ 26.064300] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.064324] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 26.064349] ? dequeue_entities+0x23f/0x1630 [ 26.064375] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.064397] ? finish_task_switch.isra.0+0x153/0x700 [ 26.064422] mempool_kmalloc_invalid_free+0xed/0x140 [ 26.064445] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 26.064470] ? __kasan_check_write+0x18/0x20 [ 26.064494] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.064516] ? __pfx_mempool_kfree+0x10/0x10 [ 26.064539] ? __pfx_read_tsc+0x10/0x10 [ 26.064561] ? ktime_get_ts64+0x86/0x230 [ 26.064587] kunit_try_run_case+0x1a5/0x480 [ 26.064610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.064630] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 26.064666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.064763] ? __kthread_parkme+0x82/0x180 [ 26.064784] ? preempt_count_sub+0x50/0x80 [ 26.064807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.064829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.064854] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.064880] kthread+0x337/0x6f0 [ 26.064899] ? trace_preempt_on+0x20/0xc0 [ 26.064923] ? __pfx_kthread+0x10/0x10 [ 26.064958] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.065026] ? calculate_sigpending+0x7b/0xa0 [ 26.065051] ? __pfx_kthread+0x10/0x10 [ 26.065073] ret_from_fork+0x116/0x1d0 [ 26.065092] ? __pfx_kthread+0x10/0x10 [ 26.065113] ret_from_fork_asm+0x1a/0x30 [ 26.065143] </TASK> [ 26.065154] [ 26.081694] Allocated by task 290: [ 26.081895] kasan_save_stack+0x45/0x70 [ 26.082095] kasan_save_track+0x18/0x40 [ 26.082268] kasan_save_alloc_info+0x3b/0x50 [ 26.082460] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 26.082714] remove_element+0x11e/0x190 [ 26.082921] mempool_alloc_preallocated+0x4d/0x90 [ 26.083560] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 26.083819] mempool_kmalloc_invalid_free+0xed/0x140 [ 26.084298] kunit_try_run_case+0x1a5/0x480 [ 26.084482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.084719] kthread+0x337/0x6f0 [ 26.085499] ret_from_fork+0x116/0x1d0 [ 26.085711] ret_from_fork_asm+0x1a/0x30 [ 26.085865] [ 26.085955] The buggy address belongs to the object at ffff888103e99900 [ 26.085955] which belongs to the cache kmalloc-128 of size 128 [ 26.087011] The buggy address is located 1 bytes inside of [ 26.087011] 128-byte region [ffff888103e99900, ffff888103e99980) [ 26.087488] [ 26.087572] The buggy address belongs to the physical page: [ 26.088131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e99 [ 26.088534] flags: 0x200000000000000(node=0|zone=2) [ 26.088787] page_type: f5(slab) [ 26.089124] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.089461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.090302] page dumped because: kasan: bad access detected [ 26.090534] [ 26.090614] Memory state around the buggy address: [ 26.091226] ffff888103e99800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.091519] ffff888103e99880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.091941] >ffff888103e99900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.092439] ^ [ 26.092564] ffff888103e99980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.092931] ffff888103e99a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.093498] ================================================================== [ 26.097274] ================================================================== [ 26.097915] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.098895] Free of addr ffff888106148001 by task kunit_try_catch/292 [ 26.099547] [ 26.099651] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.099718] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.099738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.099763] Call Trace: [ 26.099777] <TASK> [ 26.099796] dump_stack_lvl+0x73/0xb0 [ 26.099842] print_report+0xd1/0x610 [ 26.099865] ? __virt_addr_valid+0x1db/0x2d0 [ 26.099913] ? kasan_addr_to_slab+0x11/0xa0 [ 26.099934] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.099960] kasan_report_invalid_free+0x10a/0x130 [ 26.099984] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.100011] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.100034] __kasan_mempool_poison_object+0x102/0x1d0 [ 26.100058] mempool_free+0x2ec/0x380 [ 26.100087] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 26.100153] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 26.100191] ? dequeue_entities+0x23f/0x1630 [ 26.100216] ? __kasan_check_write+0x18/0x20 [ 26.100239] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.100272] ? finish_task_switch.isra.0+0x153/0x700 [ 26.100299] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 26.100323] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 26.100351] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.100372] ? __pfx_mempool_kfree+0x10/0x10 [ 26.100396] ? __pfx_read_tsc+0x10/0x10 [ 26.100418] ? ktime_get_ts64+0x86/0x230 [ 26.100442] kunit_try_run_case+0x1a5/0x480 [ 26.100467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.100487] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.100511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.100534] ? __kthread_parkme+0x82/0x180 [ 26.100556] ? preempt_count_sub+0x50/0x80 [ 26.100579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.100599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.100624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.100649] kthread+0x337/0x6f0 [ 26.100678] ? trace_preempt_on+0x20/0xc0 [ 26.100702] ? __pfx_kthread+0x10/0x10 [ 26.100723] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.100744] ? calculate_sigpending+0x7b/0xa0 [ 26.100768] ? __pfx_kthread+0x10/0x10 [ 26.100789] ret_from_fork+0x116/0x1d0 [ 26.100808] ? __pfx_kthread+0x10/0x10 [ 26.100828] ret_from_fork_asm+0x1a/0x30 [ 26.100859] </TASK> [ 26.100870] [ 26.118834] The buggy address belongs to the physical page: [ 26.119455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106148 [ 26.119897] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.120665] flags: 0x200000000000040(head|node=0|zone=2) [ 26.121245] page_type: f8(unknown) [ 26.121380] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.121599] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.122162] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.122965] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.123702] head: 0200000000000002 ffffea0004185201 00000000ffffffff 00000000ffffffff [ 26.124493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.125099] page dumped because: kasan: bad access detected [ 26.125279] [ 26.125342] Memory state around the buggy address: [ 26.125489] ffff888106147f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.125722] ffff888106147f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.126297] >ffff888106148000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.126742] ^ [ 26.126858] ffff888106148080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.127414] ffff888106148100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.128182] ==================================================================