Date
May 12, 2025, 6:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.516697] ================================================================== [ 20.517221] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 20.517724] Free of addr fff00000c5a05a00 by task kunit_try_catch/224 [ 20.518100] [ 20.518319] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.518443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.518480] Hardware name: linux,dummy-virt (DT) [ 20.518592] Call trace: [ 20.518627] show_stack+0x20/0x38 (C) [ 20.518690] dump_stack_lvl+0x8c/0xd0 [ 20.518755] print_report+0x118/0x608 [ 20.518812] kasan_report_invalid_free+0xc0/0xe8 [ 20.518868] check_slab_allocation+0xd4/0x108 [ 20.518922] __kasan_mempool_poison_object+0x78/0x150 [ 20.518980] mempool_free+0x28c/0x328 [ 20.519032] mempool_double_free_helper+0x150/0x2e0 [ 20.519088] mempool_kmalloc_double_free+0xc0/0x118 [ 20.519142] kunit_try_run_case+0x170/0x3f0 [ 20.519197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.519255] kthread+0x318/0x620 [ 20.519305] ret_from_fork+0x10/0x20 [ 20.519360] [ 20.523888] Allocated by task 224: [ 20.524064] kasan_save_stack+0x3c/0x68 [ 20.524260] kasan_save_track+0x20/0x40 [ 20.524581] kasan_save_alloc_info+0x40/0x58 [ 20.524847] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.525272] remove_element+0x130/0x1f8 [ 20.525527] mempool_alloc_preallocated+0x58/0xc0 [ 20.525797] mempool_double_free_helper+0x94/0x2e0 [ 20.526124] mempool_kmalloc_double_free+0xc0/0x118 [ 20.526429] kunit_try_run_case+0x170/0x3f0 [ 20.526743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.527059] kthread+0x318/0x620 [ 20.527227] ret_from_fork+0x10/0x20 [ 20.527386] [ 20.527569] Freed by task 224: [ 20.527728] kasan_save_stack+0x3c/0x68 [ 20.528227] kasan_save_track+0x20/0x40 [ 20.528396] kasan_save_free_info+0x4c/0x78 [ 20.528679] __kasan_mempool_poison_object+0xc0/0x150 [ 20.529016] mempool_free+0x28c/0x328 [ 20.529300] mempool_double_free_helper+0x100/0x2e0 [ 20.529509] mempool_kmalloc_double_free+0xc0/0x118 [ 20.529877] kunit_try_run_case+0x170/0x3f0 [ 20.530056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531196] kthread+0x318/0x620 [ 20.531395] ret_from_fork+0x10/0x20 [ 20.531670] [ 20.531858] The buggy address belongs to the object at fff00000c5a05a00 [ 20.531858] which belongs to the cache kmalloc-128 of size 128 [ 20.532478] The buggy address is located 0 bytes inside of [ 20.532478] 128-byte region [fff00000c5a05a00, fff00000c5a05a80) [ 20.532966] [ 20.533119] The buggy address belongs to the physical page: [ 20.533340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 20.533772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.534309] page_type: f5(slab) [ 20.534678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.535225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.535589] page dumped because: kasan: bad access detected [ 20.535863] [ 20.536001] Memory state around the buggy address: [ 20.536170] fff00000c5a05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.536530] fff00000c5a05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.537095] >fff00000c5a05a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.537394] ^ [ 20.537685] fff00000c5a05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.538058] fff00000c5a05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.539158] ================================================================== [ 20.570485] ================================================================== [ 20.571378] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 20.572003] Free of addr fff00000c665c000 by task kunit_try_catch/228 [ 20.572663] [ 20.572843] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.572955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.572990] Hardware name: linux,dummy-virt (DT) [ 20.573030] Call trace: [ 20.573057] show_stack+0x20/0x38 (C) [ 20.573124] dump_stack_lvl+0x8c/0xd0 [ 20.573180] print_report+0x118/0x608 [ 20.573236] kasan_report_invalid_free+0xc0/0xe8 [ 20.573291] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.573351] mempool_free+0x24c/0x328 [ 20.573403] mempool_double_free_helper+0x150/0x2e0 [ 20.573460] mempool_page_alloc_double_free+0xbc/0x118 [ 20.573518] kunit_try_run_case+0x170/0x3f0 [ 20.573571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.573630] kthread+0x318/0x620 [ 20.573680] ret_from_fork+0x10/0x20 [ 20.573942] [ 20.578336] The buggy address belongs to the physical page: [ 20.579193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c [ 20.579528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.579844] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.580105] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.580351] page dumped because: kasan: bad access detected [ 20.580581] [ 20.580706] Memory state around the buggy address: [ 20.581456] fff00000c665bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.581695] fff00000c665bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.582101] >fff00000c665c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.582379] ^ [ 20.583343] fff00000c665c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.583828] fff00000c665c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.584419] ================================================================== [ 20.545791] ================================================================== [ 20.546369] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 20.547397] Free of addr fff00000c65fc000 by task kunit_try_catch/226 [ 20.547836] [ 20.548005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.548110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.548145] Hardware name: linux,dummy-virt (DT) [ 20.548185] Call trace: [ 20.548212] show_stack+0x20/0x38 (C) [ 20.548275] dump_stack_lvl+0x8c/0xd0 [ 20.548335] print_report+0x118/0x608 [ 20.548387] kasan_report_invalid_free+0xc0/0xe8 [ 20.548442] __kasan_mempool_poison_object+0x14c/0x150 [ 20.548500] mempool_free+0x28c/0x328 [ 20.548555] mempool_double_free_helper+0x150/0x2e0 [ 20.548609] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.548667] kunit_try_run_case+0x170/0x3f0 [ 20.548722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548798] kthread+0x318/0x620 [ 20.548854] ret_from_fork+0x10/0x20 [ 20.548908] [ 20.553774] The buggy address belongs to the physical page: [ 20.554110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc [ 20.554632] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.555072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.555357] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.555645] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.555900] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.556141] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.556408] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000 [ 20.556654] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.557421] page dumped because: kasan: bad access detected [ 20.557714] [ 20.557837] Memory state around the buggy address: [ 20.558231] fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.558687] fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559031] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559371] ^ [ 20.559597] fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.561198] fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.561713] ==================================================================
[ 14.034723] ================================================================== [ 14.035430] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 14.035684] Free of addr ffff888102add700 by task kunit_try_catch/243 [ 14.035898] [ 14.035988] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.036051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.036063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.036088] Call Trace: [ 14.036101] <TASK> [ 14.036120] dump_stack_lvl+0x73/0xb0 [ 14.036149] print_report+0xd1/0x650 [ 14.036171] ? __virt_addr_valid+0x1db/0x2d0 [ 14.036196] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.036221] ? mempool_double_free_helper+0x185/0x370 [ 14.036245] kasan_report_invalid_free+0xfc/0x120 [ 14.036269] ? mempool_double_free_helper+0x185/0x370 [ 14.036293] ? mempool_double_free_helper+0x185/0x370 [ 14.036314] ? mempool_double_free_helper+0x185/0x370 [ 14.036337] check_slab_allocation+0x101/0x130 [ 14.036358] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.036381] mempool_free+0x2ec/0x380 [ 14.036720] mempool_double_free_helper+0x185/0x370 [ 14.036761] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.036797] ? finish_task_switch.isra.0+0x153/0x700 [ 14.036828] mempool_kmalloc_double_free+0xee/0x140 [ 14.036863] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.036888] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.036909] ? __pfx_mempool_kfree+0x10/0x10 [ 14.036931] ? __pfx_read_tsc+0x10/0x10 [ 14.036954] ? ktime_get_ts64+0x86/0x230 [ 14.036979] kunit_try_run_case+0x1a6/0x480 [ 14.037003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.037025] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.037338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.037398] ? __kthread_parkme+0x82/0x160 [ 14.037424] ? preempt_count_sub+0x50/0x80 [ 14.037449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.037473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.037499] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.037525] kthread+0x324/0x6e0 [ 14.037546] ? trace_preempt_on+0x20/0xc0 [ 14.037571] ? __pfx_kthread+0x10/0x10 [ 14.037593] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.037617] ? calculate_sigpending+0x7b/0xa0 [ 14.037640] ? __pfx_kthread+0x10/0x10 [ 14.037663] ret_from_fork+0x41/0x80 [ 14.037682] ? __pfx_kthread+0x10/0x10 [ 14.037704] ret_from_fork_asm+0x1a/0x30 [ 14.037736] </TASK> [ 14.037753] [ 14.054461] Allocated by task 243: [ 14.055007] kasan_save_stack+0x45/0x70 [ 14.055217] kasan_save_track+0x18/0x40 [ 14.055419] kasan_save_alloc_info+0x3b/0x50 [ 14.055610] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.055860] remove_element+0x11e/0x190 [ 14.056037] mempool_alloc_preallocated+0x4d/0x90 [ 14.056558] mempool_double_free_helper+0x8b/0x370 [ 14.056884] mempool_kmalloc_double_free+0xee/0x140 [ 14.057169] kunit_try_run_case+0x1a6/0x480 [ 14.057432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.057779] kthread+0x324/0x6e0 [ 14.057945] ret_from_fork+0x41/0x80 [ 14.058290] ret_from_fork_asm+0x1a/0x30 [ 14.058589] [ 14.058695] Freed by task 243: [ 14.058881] kasan_save_stack+0x45/0x70 [ 14.059108] kasan_save_track+0x18/0x40 [ 14.059303] kasan_save_free_info+0x3f/0x60 [ 14.059521] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.059753] mempool_free+0x2ec/0x380 [ 14.059913] mempool_double_free_helper+0x10a/0x370 [ 14.060175] mempool_kmalloc_double_free+0xee/0x140 [ 14.060380] kunit_try_run_case+0x1a6/0x480 [ 14.060580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.060820] kthread+0x324/0x6e0 [ 14.060971] ret_from_fork+0x41/0x80 [ 14.061114] ret_from_fork_asm+0x1a/0x30 [ 14.061340] [ 14.061490] The buggy address belongs to the object at ffff888102add700 [ 14.061490] which belongs to the cache kmalloc-128 of size 128 [ 14.062013] The buggy address is located 0 bytes inside of [ 14.062013] 128-byte region [ffff888102add700, ffff888102add780) [ 14.062527] [ 14.062603] The buggy address belongs to the physical page: [ 14.062776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102add [ 14.063727] flags: 0x200000000000000(node=0|zone=2) [ 14.064210] page_type: f5(slab) [ 14.064532] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.065227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.065565] page dumped because: kasan: bad access detected [ 14.065804] [ 14.065902] Memory state around the buggy address: [ 14.066407] ffff888102add600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.066886] ffff888102add680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.067391] >ffff888102add700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.067825] ^ [ 14.067991] ffff888102add780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.068856] ffff888102add800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.069383] ================================================================== [ 14.073492] ================================================================== [ 14.073934] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 14.074433] Free of addr ffff888102954000 by task kunit_try_catch/245 [ 14.075258] [ 14.075355] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.075405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.075418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.075442] Call Trace: [ 14.075456] <TASK> [ 14.075478] dump_stack_lvl+0x73/0xb0 [ 14.075511] print_report+0xd1/0x650 [ 14.075533] ? __virt_addr_valid+0x1db/0x2d0 [ 14.075558] ? kasan_addr_to_slab+0x11/0xa0 [ 14.075578] ? mempool_double_free_helper+0x185/0x370 [ 14.075602] kasan_report_invalid_free+0xfc/0x120 [ 14.075625] ? mempool_double_free_helper+0x185/0x370 [ 14.075650] ? mempool_double_free_helper+0x185/0x370 [ 14.075672] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.075695] mempool_free+0x2ec/0x380 [ 14.075720] mempool_double_free_helper+0x185/0x370 [ 14.075742] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.075769] ? finish_task_switch.isra.0+0x153/0x700 [ 14.075797] mempool_kmalloc_large_double_free+0xee/0x140 [ 14.075821] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.075864] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.075883] ? __pfx_mempool_kfree+0x10/0x10 [ 14.075904] ? __pfx_read_tsc+0x10/0x10 [ 14.075928] ? ktime_get_ts64+0x86/0x230 [ 14.075953] kunit_try_run_case+0x1a6/0x480 [ 14.075978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.076000] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.076023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.076049] ? __kthread_parkme+0x82/0x160 [ 14.076072] ? preempt_count_sub+0x50/0x80 [ 14.076095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.076117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.076142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.076168] kthread+0x324/0x6e0 [ 14.076188] ? trace_preempt_on+0x20/0xc0 [ 14.076213] ? __pfx_kthread+0x10/0x10 [ 14.076234] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.076257] ? calculate_sigpending+0x7b/0xa0 [ 14.076280] ? __pfx_kthread+0x10/0x10 [ 14.076324] ret_from_fork+0x41/0x80 [ 14.076343] ? __pfx_kthread+0x10/0x10 [ 14.076365] ret_from_fork_asm+0x1a/0x30 [ 14.076396] </TASK> [ 14.076408] [ 14.085103] The buggy address belongs to the physical page: [ 14.085393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954 [ 14.085643] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.085967] flags: 0x200000000000040(head|node=0|zone=2) [ 14.086409] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.087711] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.088259] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.088736] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.089333] head: 0200000000000002 ffffea00040a5501 ffffffffffffffff 0000000000000000 [ 14.089649] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 14.089970] page dumped because: kasan: bad access detected [ 14.090784] [ 14.091392] Memory state around the buggy address: [ 14.091708] ffff888102953f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.092562] ffff888102953f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.093072] >ffff888102954000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.093526] ^ [ 14.093681] ffff888102954080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.093971] ffff888102954100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.095047] ================================================================== [ 14.100618] ================================================================== [ 14.101187] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 14.101528] Free of addr ffff888102954000 by task kunit_try_catch/247 [ 14.101809] [ 14.101936] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.101986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.101998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.102021] Call Trace: [ 14.102036] <TASK> [ 14.102055] dump_stack_lvl+0x73/0xb0 [ 14.102084] print_report+0xd1/0x650 [ 14.102107] ? __virt_addr_valid+0x1db/0x2d0 [ 14.102131] ? kasan_addr_to_slab+0x11/0xa0 [ 14.102150] ? mempool_double_free_helper+0x185/0x370 [ 14.102174] kasan_report_invalid_free+0xfc/0x120 [ 14.102197] ? mempool_double_free_helper+0x185/0x370 [ 14.102222] ? mempool_double_free_helper+0x185/0x370 [ 14.102244] __kasan_mempool_poison_pages+0x115/0x130 [ 14.102267] mempool_free+0x290/0x380 [ 14.102290] mempool_double_free_helper+0x185/0x370 [ 14.102313] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.102339] ? finish_task_switch.isra.0+0x153/0x700 [ 14.102368] mempool_page_alloc_double_free+0xe9/0x140 [ 14.102394] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.102421] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.102440] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.102462] ? __pfx_read_tsc+0x10/0x10 [ 14.102484] ? ktime_get_ts64+0x86/0x230 [ 14.102509] kunit_try_run_case+0x1a6/0x480 [ 14.102533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.102554] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.102576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.102602] ? __kthread_parkme+0x82/0x160 [ 14.102625] ? preempt_count_sub+0x50/0x80 [ 14.102649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.102672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.102698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.102724] kthread+0x324/0x6e0 [ 14.102746] ? trace_preempt_on+0x20/0xc0 [ 14.102770] ? __pfx_kthread+0x10/0x10 [ 14.102792] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.102815] ? calculate_sigpending+0x7b/0xa0 [ 14.102875] ? __pfx_kthread+0x10/0x10 [ 14.102901] ret_from_fork+0x41/0x80 [ 14.102921] ? __pfx_kthread+0x10/0x10 [ 14.102943] ret_from_fork_asm+0x1a/0x30 [ 14.103016] </TASK> [ 14.103029] [ 14.113364] The buggy address belongs to the physical page: [ 14.113676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954 [ 14.114120] flags: 0x200000000000000(node=0|zone=2) [ 14.114338] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.114651] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.114963] page dumped because: kasan: bad access detected [ 14.115318] [ 14.115418] Memory state around the buggy address: [ 14.115614] ffff888102953f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.115946] ffff888102953f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.116293] >ffff888102954000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.116565] ^ [ 14.116689] ffff888102954080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.116939] ffff888102954100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.117333] ==================================================================