Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 36.610391] ================================================================== [ 36.620503] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.628485] Free of addr ffff000803208001 by task kunit_try_catch/290 [ 36.634907] [ 36.636393] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 36.636449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.636464] Hardware name: WinLink E850-96 board (DT) [ 36.636485] Call trace: [ 36.636500] show_stack+0x20/0x38 (C) [ 36.636539] dump_stack_lvl+0x8c/0xd0 [ 36.636575] print_report+0x118/0x608 [ 36.636607] kasan_report_invalid_free+0xc0/0xe8 [ 36.636638] __kasan_mempool_poison_object+0xfc/0x150 [ 36.636671] mempool_free+0x28c/0x328 [ 36.636709] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.636745] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 36.636784] kunit_try_run_case+0x170/0x3f0 [ 36.636822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.636863] kthread+0x328/0x630 [ 36.636896] ret_from_fork+0x10/0x20 [ 36.636935] [ 36.711125] The buggy address belongs to the physical page: [ 36.716682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208 [ 36.724666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.732304] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.739246] page_type: f8(unknown) [ 36.742645] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.750363] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.758090] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.765901] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.773714] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff [ 36.781526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.789331] page dumped because: kasan: bad access detected [ 36.794887] [ 36.796362] Memory state around the buggy address: [ 36.801144] ffff000803207f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.808345] ffff000803207f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.815553] >ffff000803208000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.822752] ^ [ 36.825968] ffff000803208080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.833171] ffff000803208100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.840375] ================================================================== [ 36.284328] ================================================================== [ 36.294899] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.302882] Free of addr ffff000801dd0801 by task kunit_try_catch/288 [ 36.309304] [ 36.310790] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 36.310844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.310860] Hardware name: WinLink E850-96 board (DT) [ 36.310883] Call trace: [ 36.310898] show_stack+0x20/0x38 (C) [ 36.310933] dump_stack_lvl+0x8c/0xd0 [ 36.310968] print_report+0x118/0x608 [ 36.311000] kasan_report_invalid_free+0xc0/0xe8 [ 36.311031] check_slab_allocation+0xfc/0x108 [ 36.311064] __kasan_mempool_poison_object+0x78/0x150 [ 36.311099] mempool_free+0x28c/0x328 [ 36.311136] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.311171] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.311210] kunit_try_run_case+0x170/0x3f0 [ 36.311247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.311288] kthread+0x328/0x630 [ 36.311322] ret_from_fork+0x10/0x20 [ 36.311358] [ 36.389339] Allocated by task 288: [ 36.392726] kasan_save_stack+0x3c/0x68 [ 36.396543] kasan_save_track+0x20/0x40 [ 36.400362] kasan_save_alloc_info+0x40/0x58 [ 36.404615] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.409910] remove_element+0x130/0x1f8 [ 36.413730] mempool_alloc_preallocated+0x58/0xc0 [ 36.418417] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 36.423972] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.428921] kunit_try_run_case+0x170/0x3f0 [ 36.433087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.438557] kthread+0x328/0x630 [ 36.441768] ret_from_fork+0x10/0x20 [ 36.445326] [ 36.446804] The buggy address belongs to the object at ffff000801dd0800 [ 36.446804] which belongs to the cache kmalloc-128 of size 128 [ 36.459305] The buggy address is located 1 bytes inside of [ 36.459305] 128-byte region [ffff000801dd0800, ffff000801dd0880) [ 36.470847] [ 36.472325] The buggy address belongs to the physical page: [ 36.477883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0 [ 36.485868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.493506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.500449] page_type: f5(slab) [ 36.503586] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.511304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.519030] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.526842] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.534655] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff [ 36.542467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.550273] page dumped because: kasan: bad access detected [ 36.555830] [ 36.557304] Memory state around the buggy address: [ 36.562084] ffff000801dd0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.569287] ffff000801dd0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.576491] >ffff000801dd0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.583692] ^ [ 36.586908] ffff000801dd0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.594112] ffff000801dd0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.601316] ==================================================================
[ 20.572968] ================================================================== [ 20.573023] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.573084] Free of addr fff00000c3f9e301 by task kunit_try_catch/244 [ 20.573126] [ 20.573159] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.573318] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.573382] Hardware name: linux,dummy-virt (DT) [ 20.573452] Call trace: [ 20.573507] show_stack+0x20/0x38 (C) [ 20.573615] dump_stack_lvl+0x8c/0xd0 [ 20.573705] print_report+0x118/0x608 [ 20.573758] kasan_report_invalid_free+0xc0/0xe8 [ 20.573812] check_slab_allocation+0xfc/0x108 [ 20.573877] __kasan_mempool_poison_object+0x78/0x150 [ 20.573944] mempool_free+0x28c/0x328 [ 20.573997] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.574059] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.574118] kunit_try_run_case+0x170/0x3f0 [ 20.574206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574445] kthread+0x328/0x630 [ 20.574527] ret_from_fork+0x10/0x20 [ 20.574592] [ 20.574643] Allocated by task 244: [ 20.574710] kasan_save_stack+0x3c/0x68 [ 20.574819] kasan_save_track+0x20/0x40 [ 20.574885] kasan_save_alloc_info+0x40/0x58 [ 20.574929] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.574977] remove_element+0x130/0x1f8 [ 20.575024] mempool_alloc_preallocated+0x58/0xc0 [ 20.575080] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.575141] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.575188] kunit_try_run_case+0x170/0x3f0 [ 20.575269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.575382] kthread+0x328/0x630 [ 20.575483] ret_from_fork+0x10/0x20 [ 20.575586] [ 20.575608] The buggy address belongs to the object at fff00000c3f9e300 [ 20.575608] which belongs to the cache kmalloc-128 of size 128 [ 20.575679] The buggy address is located 1 bytes inside of [ 20.575679] 128-byte region [fff00000c3f9e300, fff00000c3f9e380) [ 20.575740] [ 20.575762] The buggy address belongs to the physical page: [ 20.575806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 20.575871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.576014] page_type: f5(slab) [ 20.576109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.576216] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.576293] page dumped because: kasan: bad access detected [ 20.576376] [ 20.576397] Memory state around the buggy address: [ 20.576431] fff00000c3f9e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.576702] fff00000c3f9e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.576779] >fff00000c3f9e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.576878] ^ [ 20.577019] fff00000c3f9e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.577156] fff00000c3f9e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.577218] ================================================================== [ 20.583509] ================================================================== [ 20.583568] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.583632] Free of addr fff00000c65c4001 by task kunit_try_catch/246 [ 20.583677] [ 20.583710] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.583798] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.583829] Hardware name: linux,dummy-virt (DT) [ 20.583864] Call trace: [ 20.583888] show_stack+0x20/0x38 (C) [ 20.583940] dump_stack_lvl+0x8c/0xd0 [ 20.583992] print_report+0x118/0x608 [ 20.584039] kasan_report_invalid_free+0xc0/0xe8 [ 20.584093] __kasan_mempool_poison_object+0xfc/0x150 [ 20.584148] mempool_free+0x28c/0x328 [ 20.584200] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.584258] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.584318] kunit_try_run_case+0x170/0x3f0 [ 20.584427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.584490] kthread+0x328/0x630 [ 20.584558] ret_from_fork+0x10/0x20 [ 20.584610] [ 20.584652] The buggy address belongs to the physical page: [ 20.584687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4 [ 20.584801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.584889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.584946] page_type: f8(unknown) [ 20.586061] >fff00000c65c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.594749] [ 20.594844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47bf1 [ 20.595209] ffffaf0a3e9f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.620509] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.620867] Read of size 1 at addr ffff800080a37c2a by task kunit_try_catch/252 [ 20.620942] [ 20.621164] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.622733] ret_from_fork+0x10/0x20 [ 20.626362] [ 20.626515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.626847] ffff800080a37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.637117] [ 20.638255] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.647627] [ 20.648998] [ 20.649653] [ 20.650616] ==================================================================
[ 18.676974] ================================================================== [ 18.678166] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.679071] Free of addr ffff888101de5d01 by task kunit_try_catch/262 [ 18.679599] [ 18.680114] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.680505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.680559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.680606] Call Trace: [ 18.680636] <TASK> [ 18.680674] dump_stack_lvl+0x73/0xb0 [ 18.680744] print_report+0xd1/0x650 [ 18.680803] ? __virt_addr_valid+0x1db/0x2d0 [ 18.680853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.680903] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.680963] kasan_report_invalid_free+0x10a/0x130 [ 18.681020] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.681082] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.681131] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.681187] check_slab_allocation+0x11f/0x130 [ 18.681230] __kasan_mempool_poison_object+0x91/0x1d0 [ 18.681273] mempool_free+0x2ec/0x380 [ 18.681322] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.681371] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 18.681402] ? update_load_avg+0x1be/0x21b0 [ 18.681425] ? update_load_avg+0x1be/0x21b0 [ 18.681446] ? update_curr+0x80/0x810 [ 18.681467] ? irqentry_exit+0x2a/0x60 [ 18.681493] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 18.681522] mempool_kmalloc_invalid_free+0xed/0x140 [ 18.681548] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 18.681578] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.681599] ? __pfx_mempool_kfree+0x10/0x10 [ 18.681623] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 18.681651] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 18.681681] kunit_try_run_case+0x1a5/0x480 [ 18.681709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.681732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.681785] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.681812] ? __kthread_parkme+0x82/0x180 [ 18.681837] ? preempt_count_sub+0x50/0x80 [ 18.681865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.681890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.681914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.681938] kthread+0x337/0x6f0 [ 18.681957] ? trace_preempt_on+0x20/0xc0 [ 18.681984] ? __pfx_kthread+0x10/0x10 [ 18.682004] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.682026] ? calculate_sigpending+0x7b/0xa0 [ 18.682050] ? __pfx_kthread+0x10/0x10 [ 18.682070] ret_from_fork+0x41/0x80 [ 18.682095] ? __pfx_kthread+0x10/0x10 [ 18.682142] ret_from_fork_asm+0x1a/0x30 [ 18.682183] </TASK> [ 18.682213] [ 18.697184] Allocated by task 262: [ 18.697772] kasan_save_stack+0x45/0x70 [ 18.698211] kasan_save_track+0x18/0x40 [ 18.698867] kasan_save_alloc_info+0x3b/0x50 [ 18.699882] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 18.700155] remove_element+0x11e/0x190 [ 18.700360] mempool_alloc_preallocated+0x4d/0x90 [ 18.700727] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 18.701017] mempool_kmalloc_invalid_free+0xed/0x140 [ 18.701392] kunit_try_run_case+0x1a5/0x480 [ 18.701685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.702553] kthread+0x337/0x6f0 [ 18.702889] ret_from_fork+0x41/0x80 [ 18.703333] ret_from_fork_asm+0x1a/0x30 [ 18.703701] [ 18.703881] The buggy address belongs to the object at ffff888101de5d00 [ 18.703881] which belongs to the cache kmalloc-128 of size 128 [ 18.704714] The buggy address is located 1 bytes inside of [ 18.704714] 128-byte region [ffff888101de5d00, ffff888101de5d80) [ 18.705499] [ 18.705699] The buggy address belongs to the physical page: [ 18.706135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de5 [ 18.706515] flags: 0x200000000000000(node=0|zone=2) [ 18.706941] page_type: f5(slab) [ 18.707255] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.707719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.708617] page dumped because: kasan: bad access detected [ 18.709070] [ 18.709425] Memory state around the buggy address: [ 18.709826] ffff888101de5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.710187] ffff888101de5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.710826] >ffff888101de5d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.711566] ^ [ 18.711860] ffff888101de5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.712289] ffff888101de5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.712890] ================================================================== [ 18.719686] ================================================================== [ 18.720990] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.721521] Free of addr ffff888102a98001 by task kunit_try_catch/264 [ 18.722039] [ 18.722228] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.722346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.722377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.722430] Call Trace: [ 18.722458] <TASK> [ 18.722520] dump_stack_lvl+0x73/0xb0 [ 18.722588] print_report+0xd1/0x650 [ 18.722637] ? __virt_addr_valid+0x1db/0x2d0 [ 18.722692] ? kasan_addr_to_slab+0x11/0xa0 [ 18.722741] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.722814] kasan_report_invalid_free+0x10a/0x130 [ 18.722864] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.722925] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.722980] __kasan_mempool_poison_object+0x102/0x1d0 [ 18.723037] mempool_free+0x2ec/0x380 [ 18.723101] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 18.723154] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 18.723211] ? dequeue_entities+0x852/0x1740 [ 18.723259] ? finish_task_switch.isra.0+0x153/0x700 [ 18.723310] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 18.723355] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 18.723407] ? dequeue_task_fair+0x166/0x4e0 [ 18.723454] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.723494] ? __pfx_mempool_kfree+0x10/0x10 [ 18.723545] ? __pfx_read_tsc+0x10/0x10 [ 18.723586] ? ktime_get_ts64+0x86/0x230 [ 18.723669] kunit_try_run_case+0x1a5/0x480 [ 18.723724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.723780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.723838] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.723892] ? __kthread_parkme+0x82/0x180 [ 18.723945] ? preempt_count_sub+0x50/0x80 [ 18.723990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.724028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.724066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.724152] kthread+0x337/0x6f0 [ 18.724188] ? trace_preempt_on+0x20/0xc0 [ 18.724232] ? __pfx_kthread+0x10/0x10 [ 18.724261] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.724293] ? calculate_sigpending+0x7b/0xa0 [ 18.724328] ? __pfx_kthread+0x10/0x10 [ 18.724359] ret_from_fork+0x41/0x80 [ 18.724396] ? __pfx_kthread+0x10/0x10 [ 18.724428] ret_from_fork_asm+0x1a/0x30 [ 18.724485] </TASK> [ 18.724508] [ 18.741383] The buggy address belongs to the physical page: [ 18.742041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a98 [ 18.742583] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.743342] flags: 0x200000000000040(head|node=0|zone=2) [ 18.743957] page_type: f8(unknown) [ 18.744206] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.745229] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.746095] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.746711] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.747434] head: 0200000000000002 ffffea00040aa601 00000000ffffffff 00000000ffffffff [ 18.747852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.748358] page dumped because: kasan: bad access detected [ 18.748731] [ 18.748948] Memory state around the buggy address: [ 18.749892] ffff888102a97f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.750801] ffff888102a97f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.751613] >ffff888102a98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.752099] ^ [ 18.752324] ffff888102a98080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.753104] ffff888102a98100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.753704] ==================================================================