Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.561389] ================================================================== [ 23.562408] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 23.563026] Free of addr fff00000c6a74000 by task kunit_try_catch/225 [ 23.564475] [ 23.566235] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.566451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.566533] Hardware name: linux,dummy-virt (DT) [ 23.566626] Call trace: [ 23.566689] dump_backtrace+0x9c/0x128 [ 23.566800] show_stack+0x20/0x38 [ 23.566900] dump_stack_lvl+0x8c/0xd0 [ 23.567044] print_report+0x118/0x5f0 [ 23.567140] kasan_report_invalid_free+0xc0/0xe8 [ 23.567246] __kasan_mempool_poison_object+0x14c/0x150 [ 23.567349] mempool_free+0x28c/0x328 [ 23.567455] mempool_double_free_helper+0x15c/0x2f8 [ 23.567558] mempool_kmalloc_large_double_free+0xc0/0x118 [ 23.567663] kunit_try_run_case+0x170/0x3f0 [ 23.567753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.567857] kthread+0x24c/0x2d0 [ 23.567943] ret_from_fork+0x10/0x20 [ 23.568068] [ 23.582854] The buggy address belongs to the physical page: [ 23.584060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74 [ 23.584655] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.585449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.586245] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.587031] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.587800] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.588601] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.589406] head: 0bfffe0000000002 ffffc1ffc31a9d01 ffffffffffffffff 0000000000000000 [ 23.590246] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.591009] page dumped because: kasan: bad access detected [ 23.591552] [ 23.591856] Memory state around the buggy address: [ 23.593027] fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.593749] fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.594483] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.595202] ^ [ 23.595645] fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.596389] fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.597481] ================================================================== [ 23.605599] ================================================================== [ 23.606634] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 23.607419] Free of addr fff00000c6a74000 by task kunit_try_catch/227 [ 23.608108] [ 23.608454] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.608672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.608757] Hardware name: linux,dummy-virt (DT) [ 23.608856] Call trace: [ 23.608923] dump_backtrace+0x9c/0x128 [ 23.609102] show_stack+0x20/0x38 [ 23.609219] dump_stack_lvl+0x8c/0xd0 [ 23.609334] print_report+0x118/0x5f0 [ 23.609484] kasan_report_invalid_free+0xc0/0xe8 [ 23.609606] __kasan_mempool_poison_pages+0xe0/0xe8 [ 23.609725] mempool_free+0x24c/0x328 [ 23.609844] mempool_double_free_helper+0x15c/0x2f8 [ 23.609979] mempool_page_alloc_double_free+0xbc/0x118 [ 23.610100] kunit_try_run_case+0x170/0x3f0 [ 23.610198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.610308] kthread+0x24c/0x2d0 [ 23.610412] ret_from_fork+0x10/0x20 [ 23.610490] [ 23.618878] The buggy address belongs to the physical page: [ 23.619932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74 [ 23.620849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.621677] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.622532] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.623286] page dumped because: kasan: bad access detected [ 23.624602] [ 23.624932] Memory state around the buggy address: [ 23.625503] fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.626458] fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.627233] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.628284] ^ [ 23.628700] fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.629441] fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.630187] ================================================================== [ 23.512344] ================================================================== [ 23.513618] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 23.514390] Free of addr fff00000c424c200 by task kunit_try_catch/223 [ 23.515121] [ 23.515473] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.515691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.515776] Hardware name: linux,dummy-virt (DT) [ 23.515867] Call trace: [ 23.515931] dump_backtrace+0x9c/0x128 [ 23.516074] show_stack+0x20/0x38 [ 23.516179] dump_stack_lvl+0x8c/0xd0 [ 23.516294] print_report+0x118/0x5f0 [ 23.516401] kasan_report_invalid_free+0xc0/0xe8 [ 23.516517] check_slab_allocation+0xd4/0x108 [ 23.516670] __kasan_mempool_poison_object+0x78/0x150 [ 23.516789] mempool_free+0x28c/0x328 [ 23.516851] mempool_double_free_helper+0x15c/0x2f8 [ 23.516905] mempool_kmalloc_double_free+0xc0/0x118 [ 23.516983] kunit_try_run_case+0x170/0x3f0 [ 23.517040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.517095] kthread+0x24c/0x2d0 [ 23.517142] ret_from_fork+0x10/0x20 [ 23.517192] [ 23.523174] Allocated by task 223: [ 23.523579] kasan_save_stack+0x3c/0x68 [ 23.524389] kasan_save_track+0x20/0x40 [ 23.524976] kasan_save_alloc_info+0x40/0x58 [ 23.525585] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.526278] remove_element+0x130/0x1f8 [ 23.526789] mempool_alloc_preallocated+0x58/0xc0 [ 23.527348] mempool_double_free_helper+0x94/0x2f8 [ 23.528238] mempool_kmalloc_double_free+0xc0/0x118 [ 23.528938] kunit_try_run_case+0x170/0x3f0 [ 23.529429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.530166] kthread+0x24c/0x2d0 [ 23.530624] ret_from_fork+0x10/0x20 [ 23.531141] [ 23.532399] Freed by task 223: [ 23.532844] kasan_save_stack+0x3c/0x68 [ 23.533553] kasan_save_track+0x20/0x40 [ 23.534134] kasan_save_free_info+0x4c/0x78 [ 23.534648] __kasan_mempool_poison_object+0xc0/0x150 [ 23.535315] mempool_free+0x28c/0x328 [ 23.536021] mempool_double_free_helper+0x104/0x2f8 [ 23.536639] mempool_kmalloc_double_free+0xc0/0x118 [ 23.537279] kunit_try_run_case+0x170/0x3f0 [ 23.537897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.538567] kthread+0x24c/0x2d0 [ 23.538996] ret_from_fork+0x10/0x20 [ 23.539773] [ 23.540150] The buggy address belongs to the object at fff00000c424c200 [ 23.540150] which belongs to the cache kmalloc-128 of size 128 [ 23.541508] The buggy address is located 0 bytes inside of [ 23.541508] 128-byte region [fff00000c424c200, fff00000c424c280) [ 23.542506] [ 23.542819] The buggy address belongs to the physical page: [ 23.543733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424c [ 23.544534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.545243] page_type: f5(slab) [ 23.545692] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.546447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.547225] page dumped because: kasan: bad access detected [ 23.548055] [ 23.548356] Memory state around the buggy address: [ 23.548862] fff00000c424c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.549560] fff00000c424c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.550322] >fff00000c424c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.551088] ^ [ 23.551719] fff00000c424c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.552490] fff00000c424c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.553236] ==================================================================
[ 20.103929] ================================================================== [ 20.104862] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 20.105445] Free of addr ffff888102930f00 by task kunit_try_catch/240 [ 20.105901] [ 20.106148] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.107159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.107201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.107286] Call Trace: [ 20.107317] <TASK> [ 20.107362] dump_stack_lvl+0x73/0xb0 [ 20.107456] print_report+0xd1/0x640 [ 20.107539] ? __virt_addr_valid+0x1db/0x2d0 [ 20.107597] ? kasan_complete_mode_report_info+0x64/0x200 [ 20.107631] ? mempool_double_free_helper+0x185/0x370 [ 20.107660] kasan_report_invalid_free+0xfc/0x120 [ 20.107696] ? mempool_double_free_helper+0x185/0x370 [ 20.107727] ? mempool_double_free_helper+0x185/0x370 [ 20.107754] ? mempool_double_free_helper+0x185/0x370 [ 20.107779] check_slab_allocation+0x101/0x130 [ 20.107818] __kasan_mempool_poison_object+0x91/0x1d0 [ 20.107890] mempool_free+0x2ec/0x380 [ 20.107923] mempool_double_free_helper+0x185/0x370 [ 20.107952] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.107986] ? finish_task_switch.isra.0+0x153/0x700 [ 20.108020] mempool_kmalloc_double_free+0xee/0x140 [ 20.108049] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 20.108081] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.108106] ? __pfx_mempool_kfree+0x10/0x10 [ 20.108134] ? __pfx_read_tsc+0x10/0x10 [ 20.108161] ? ktime_get_ts64+0x84/0x230 [ 20.108197] kunit_try_run_case+0x1a6/0x480 [ 20.108260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.108291] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.108322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.108357] ? __kthread_parkme+0x82/0x160 [ 20.108384] ? preempt_count_sub+0x50/0x80 [ 20.108412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.108444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.108553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.108601] kthread+0x257/0x310 [ 20.108626] ? __pfx_kthread+0x10/0x10 [ 20.108651] ret_from_fork+0x41/0x80 [ 20.108680] ? __pfx_kthread+0x10/0x10 [ 20.108705] ret_from_fork_asm+0x1a/0x30 [ 20.108748] </TASK> [ 20.108762] [ 20.132267] Allocated by task 240: [ 20.132836] kasan_save_stack+0x45/0x70 [ 20.133627] kasan_save_track+0x18/0x40 [ 20.134345] kasan_save_alloc_info+0x3b/0x50 [ 20.135199] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 20.135908] remove_element+0x11e/0x190 [ 20.136872] mempool_alloc_preallocated+0x4d/0x90 [ 20.137722] mempool_double_free_helper+0x8b/0x370 [ 20.138287] mempool_kmalloc_double_free+0xee/0x140 [ 20.139036] kunit_try_run_case+0x1a6/0x480 [ 20.139532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.140164] kthread+0x257/0x310 [ 20.140725] ret_from_fork+0x41/0x80 [ 20.141668] ret_from_fork_asm+0x1a/0x30 [ 20.141979] [ 20.142689] Freed by task 240: [ 20.143458] kasan_save_stack+0x45/0x70 [ 20.143866] kasan_save_track+0x18/0x40 [ 20.144259] kasan_save_free_info+0x3f/0x60 [ 20.145108] __kasan_mempool_poison_object+0x131/0x1d0 [ 20.145869] mempool_free+0x2ec/0x380 [ 20.146246] mempool_double_free_helper+0x10a/0x370 [ 20.147122] mempool_kmalloc_double_free+0xee/0x140 [ 20.147860] kunit_try_run_case+0x1a6/0x480 [ 20.148393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.148840] kthread+0x257/0x310 [ 20.149568] ret_from_fork+0x41/0x80 [ 20.150357] ret_from_fork_asm+0x1a/0x30 [ 20.150683] [ 20.151244] The buggy address belongs to the object at ffff888102930f00 [ 20.151244] which belongs to the cache kmalloc-128 of size 128 [ 20.152751] The buggy address is located 0 bytes inside of [ 20.152751] 128-byte region [ffff888102930f00, ffff888102930f80) [ 20.153772] [ 20.154264] The buggy address belongs to the physical page: [ 20.155479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102930 [ 20.156280] flags: 0x200000000000000(node=0|zone=2) [ 20.157131] page_type: f5(slab) [ 20.157465] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.158412] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000 [ 20.159296] page dumped because: kasan: bad access detected [ 20.159889] [ 20.160669] Memory state around the buggy address: [ 20.161018] ffff888102930e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.162113] ffff888102930e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.162986] >ffff888102930f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.163963] ^ [ 20.164208] ffff888102930f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.165202] ffff888102931000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.165739] ================================================================== [ 20.219088] ================================================================== [ 20.219978] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 20.221207] Free of addr ffff888102bfc000 by task kunit_try_catch/244 [ 20.222116] [ 20.222522] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.222661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.222682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.222728] Call Trace: [ 20.222751] <TASK> [ 20.222777] dump_stack_lvl+0x73/0xb0 [ 20.222857] print_report+0xd1/0x640 [ 20.223066] ? __virt_addr_valid+0x1db/0x2d0 [ 20.223108] ? kasan_addr_to_slab+0x11/0xa0 [ 20.223140] ? mempool_double_free_helper+0x185/0x370 [ 20.223170] kasan_report_invalid_free+0xfc/0x120 [ 20.223207] ? mempool_double_free_helper+0x185/0x370 [ 20.223279] ? mempool_double_free_helper+0x185/0x370 [ 20.223314] __kasan_mempool_poison_pages+0x115/0x130 [ 20.223354] mempool_free+0x290/0x380 [ 20.223388] mempool_double_free_helper+0x185/0x370 [ 20.223420] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.223455] ? finish_task_switch.isra.0+0x153/0x700 [ 20.223490] mempool_page_alloc_double_free+0xe9/0x140 [ 20.223522] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 20.223558] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 20.223585] ? __pfx_mempool_free_pages+0x10/0x10 [ 20.223616] ? __pfx_read_tsc+0x10/0x10 [ 20.223643] ? ktime_get_ts64+0x84/0x230 [ 20.223678] kunit_try_run_case+0x1a6/0x480 [ 20.223710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.223740] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.223770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.223807] ? __kthread_parkme+0x82/0x160 [ 20.223890] ? preempt_count_sub+0x50/0x80 [ 20.223921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.223951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.223989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.224027] kthread+0x257/0x310 [ 20.224053] ? __pfx_kthread+0x10/0x10 [ 20.224081] ret_from_fork+0x41/0x80 [ 20.224109] ? __pfx_kthread+0x10/0x10 [ 20.224135] ret_from_fork_asm+0x1a/0x30 [ 20.224177] </TASK> [ 20.224193] [ 20.242652] The buggy address belongs to the physical page: [ 20.243525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bfc [ 20.244400] flags: 0x200000000000000(node=0|zone=2) [ 20.245370] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.245885] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.246675] page dumped because: kasan: bad access detected [ 20.247128] [ 20.247387] Memory state around the buggy address: [ 20.247812] ffff888102bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.248862] ffff888102bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.249616] >ffff888102bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.250472] ^ [ 20.250957] ffff888102bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.251769] ffff888102bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.252586] ================================================================== [ 20.173429] ================================================================== [ 20.174514] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 20.175417] Free of addr ffff888102bf8000 by task kunit_try_catch/242 [ 20.177012] [ 20.177189] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.177305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.177343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.177404] Call Trace: [ 20.177528] <TASK> [ 20.177583] dump_stack_lvl+0x73/0xb0 [ 20.177674] print_report+0xd1/0x640 [ 20.177754] ? __virt_addr_valid+0x1db/0x2d0 [ 20.177847] ? kasan_addr_to_slab+0x11/0xa0 [ 20.177884] ? mempool_double_free_helper+0x185/0x370 [ 20.177915] kasan_report_invalid_free+0xfc/0x120 [ 20.177952] ? mempool_double_free_helper+0x185/0x370 [ 20.177984] ? mempool_double_free_helper+0x185/0x370 [ 20.178011] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 20.178047] mempool_free+0x2ec/0x380 [ 20.178079] mempool_double_free_helper+0x185/0x370 [ 20.178109] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.178142] ? finish_task_switch.isra.0+0x153/0x700 [ 20.178178] mempool_kmalloc_large_double_free+0xee/0x140 [ 20.178207] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 20.178295] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.178324] ? __pfx_mempool_kfree+0x10/0x10 [ 20.178352] ? __pfx_read_tsc+0x10/0x10 [ 20.178379] ? ktime_get_ts64+0x84/0x230 [ 20.178415] kunit_try_run_case+0x1a6/0x480 [ 20.178461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.178572] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.178606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.178641] ? __kthread_parkme+0x82/0x160 [ 20.178671] ? preempt_count_sub+0x50/0x80 [ 20.178702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.178729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.178768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.178805] kthread+0x257/0x310 [ 20.178867] ? __pfx_kthread+0x10/0x10 [ 20.178895] ret_from_fork+0x41/0x80 [ 20.178924] ? __pfx_kthread+0x10/0x10 [ 20.178949] ret_from_fork_asm+0x1a/0x30 [ 20.178993] </TASK> [ 20.179007] [ 20.196104] The buggy address belongs to the physical page: [ 20.196670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf8 [ 20.197448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.198501] flags: 0x200000000000040(head|node=0|zone=2) [ 20.199274] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.200352] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.201384] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.202309] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.203161] head: 0200000000000002 ffffea00040afe01 ffffffffffffffff 0000000000000000 [ 20.203659] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.204312] page dumped because: kasan: bad access detected [ 20.204861] [ 20.205261] Memory state around the buggy address: [ 20.205618] ffff888102bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.206333] ffff888102bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.207052] >ffff888102bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.207698] ^ [ 20.208171] ffff888102bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.209528] ffff888102bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.210656] ==================================================================