Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 38.400235] ================================================================== [ 38.410561] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.418550] Free of addr ffff000802d03401 by task kunit_try_catch/290 [ 38.424967] [ 38.426456] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 38.426515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.426534] Hardware name: WinLink E850-96 board (DT) [ 38.426559] Call trace: [ 38.426571] show_stack+0x20/0x38 (C) [ 38.426608] dump_stack_lvl+0x8c/0xd0 [ 38.426646] print_report+0x118/0x608 [ 38.426677] kasan_report_invalid_free+0xc0/0xe8 [ 38.426711] check_slab_allocation+0xfc/0x108 [ 38.426744] __kasan_mempool_poison_object+0x78/0x150 [ 38.426776] mempool_free+0x28c/0x328 [ 38.426815] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.426855] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.426890] kunit_try_run_case+0x170/0x3f0 [ 38.426929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.426971] kthread+0x328/0x630 [ 38.427008] ret_from_fork+0x10/0x20 [ 38.427044] [ 38.505003] Allocated by task 290: [ 38.508391] kasan_save_stack+0x3c/0x68 [ 38.512205] kasan_save_track+0x20/0x40 [ 38.516026] kasan_save_alloc_info+0x40/0x58 [ 38.520279] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.525573] remove_element+0x130/0x1f8 [ 38.529392] mempool_alloc_preallocated+0x58/0xc0 [ 38.534080] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.539636] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.544584] kunit_try_run_case+0x170/0x3f0 [ 38.548750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.554218] kthread+0x328/0x630 [ 38.557430] ret_from_fork+0x10/0x20 [ 38.560989] [ 38.562467] The buggy address belongs to the object at ffff000802d03400 [ 38.562467] which belongs to the cache kmalloc-128 of size 128 [ 38.574967] The buggy address is located 1 bytes inside of [ 38.574967] 128-byte region [ffff000802d03400, ffff000802d03480) [ 38.586510] [ 38.587990] The buggy address belongs to the physical page: [ 38.593547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02 [ 38.601530] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.609168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.616113] page_type: f5(slab) [ 38.619250] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.626967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.634694] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.642505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.650318] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff [ 38.658131] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.665936] page dumped because: kasan: bad access detected [ 38.671491] [ 38.672967] Memory state around the buggy address: [ 38.677749] ffff000802d03300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.684951] ffff000802d03380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.692156] >ffff000802d03400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.699355] ^ [ 38.702571] ffff000802d03480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.709776] ffff000802d03500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.716978] ================================================================== [ 38.726091] ================================================================== [ 38.736164] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.744147] Free of addr ffff00080586c001 by task kunit_try_catch/292 [ 38.750572] [ 38.752059] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 38.752115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.752129] Hardware name: WinLink E850-96 board (DT) [ 38.752151] Call trace: [ 38.752167] show_stack+0x20/0x38 (C) [ 38.752204] dump_stack_lvl+0x8c/0xd0 [ 38.752244] print_report+0x118/0x608 [ 38.752276] kasan_report_invalid_free+0xc0/0xe8 [ 38.752309] __kasan_mempool_poison_object+0xfc/0x150 [ 38.752342] mempool_free+0x28c/0x328 [ 38.752378] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.752420] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.752460] kunit_try_run_case+0x170/0x3f0 [ 38.752499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.752542] kthread+0x328/0x630 [ 38.752576] ret_from_fork+0x10/0x20 [ 38.752614] [ 38.826787] The buggy address belongs to the physical page: [ 38.832345] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88586c [ 38.840328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.847967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.854910] page_type: f8(unknown) [ 38.858307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.866026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.873752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.881564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.889378] head: 0bfffe0000000002 fffffdffe0161b01 00000000ffffffff 00000000ffffffff [ 38.897189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.904995] page dumped because: kasan: bad access detected [ 38.910550] [ 38.912027] Memory state around the buggy address: [ 38.916809] ffff00080586bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.924010] ffff00080586bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.931215] >ffff00080586c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.938414] ^ [ 38.941630] ffff00080586c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.948834] ffff00080586c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.956037] ==================================================================
[ 20.208949] ================================================================== [ 20.209022] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.209083] Free of addr fff00000c791d901 by task kunit_try_catch/243 [ 20.209127] [ 20.209161] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.209247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.209276] Hardware name: linux,dummy-virt (DT) [ 20.209307] Call trace: [ 20.209331] show_stack+0x20/0x38 (C) [ 20.209379] dump_stack_lvl+0x8c/0xd0 [ 20.209429] print_report+0x118/0x608 [ 20.209473] kasan_report_invalid_free+0xc0/0xe8 [ 20.209524] check_slab_allocation+0xfc/0x108 [ 20.209570] __kasan_mempool_poison_object+0x78/0x150 [ 20.209620] mempool_free+0x28c/0x328 [ 20.209667] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.209722] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.209776] kunit_try_run_case+0x170/0x3f0 [ 20.209825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.209893] kthread+0x328/0x630 [ 20.209938] ret_from_fork+0x10/0x20 [ 20.209986] [ 20.210006] Allocated by task 243: [ 20.210034] kasan_save_stack+0x3c/0x68 [ 20.210074] kasan_save_track+0x20/0x40 [ 20.210110] kasan_save_alloc_info+0x40/0x58 [ 20.210149] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.210192] remove_element+0x130/0x1f8 [ 20.210230] mempool_alloc_preallocated+0x58/0xc0 [ 20.210272] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.210316] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.210358] kunit_try_run_case+0x170/0x3f0 [ 20.210398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.210444] kthread+0x328/0x630 [ 20.210480] ret_from_fork+0x10/0x20 [ 20.210517] [ 20.210536] The buggy address belongs to the object at fff00000c791d900 [ 20.210536] which belongs to the cache kmalloc-128 of size 128 [ 20.210593] The buggy address is located 1 bytes inside of [ 20.210593] 128-byte region [fff00000c791d900, fff00000c791d980) [ 20.210654] [ 20.210673] The buggy address belongs to the physical page: [ 20.210703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d [ 20.210756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.210807] page_type: f5(slab) [ 20.210845] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.210907] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.210951] page dumped because: kasan: bad access detected [ 20.210983] [ 20.211000] Memory state around the buggy address: [ 20.211031] fff00000c791d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.211078] fff00000c791d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.211123] >fff00000c791d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.211170] ^ [ 20.211196] fff00000c791d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.211240] fff00000c791da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.211282] ================================================================== [ 20.222833] ================================================================== [ 20.222955] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.223016] Free of addr fff00000c7adc001 by task kunit_try_catch/245 [ 20.223122] [ 20.223159] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.223448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.223483] Hardware name: linux,dummy-virt (DT) [ 20.223573] Call trace: [ 20.223600] show_stack+0x20/0x38 (C) [ 20.223652] dump_stack_lvl+0x8c/0xd0 [ 20.223702] print_report+0x118/0x608 [ 20.223747] kasan_report_invalid_free+0xc0/0xe8 [ 20.223823] __kasan_mempool_poison_object+0xfc/0x150 [ 20.223888] mempool_free+0x28c/0x328 [ 20.223936] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.224105] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.224279] kunit_try_run_case+0x170/0x3f0 [ 20.224411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.224498] kthread+0x328/0x630 [ 20.224545] ret_from_fork+0x10/0x20 [ 20.224601] [ 20.224622] The buggy address belongs to the physical page: [ 20.224654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107adc [ 20.224745] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.224794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.224849] page_type: f8(unknown) [ 20.224901] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.224957] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.225010] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.225190] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.225296] head: 0bfffe0000000002 ffffc1ffc31eb701 00000000ffffffff 00000000ffffffff [ 20.225410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.225521] page dumped because: kasan: bad access detected [ 20.225576] [ 20.225610] Memory state around the buggy address: [ 20.225707] fff00000c7adbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.225752] fff00000c7adbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.226107] >fff00000c7adc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.226170] ^ [ 20.226208] fff00000c7adc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.226267] fff00000c7adc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.226308] ==================================================================
[ 12.648648] ================================================================== [ 12.649314] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.650127] Free of addr ffff8881029f9d01 by task kunit_try_catch/260 [ 12.650423] [ 12.650522] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 12.650573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.650585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.650607] Call Trace: [ 12.650621] <TASK> [ 12.650641] dump_stack_lvl+0x73/0xb0 [ 12.650672] print_report+0xd1/0x650 [ 12.650696] ? __virt_addr_valid+0x1db/0x2d0 [ 12.650720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.650742] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.650769] kasan_report_invalid_free+0x10a/0x130 [ 12.650793] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.650820] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.650844] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.650869] check_slab_allocation+0x11f/0x130 [ 12.650891] __kasan_mempool_poison_object+0x91/0x1d0 [ 12.650926] mempool_free+0x2ec/0x380 [ 12.650951] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.650977] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 12.651001] ? update_load_avg+0x1be/0x21b0 [ 12.651026] ? finish_task_switch.isra.0+0x153/0x700 [ 12.651054] mempool_kmalloc_invalid_free+0xed/0x140 [ 12.651078] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 12.651102] ? dequeue_task_fair+0x166/0x4e0 [ 12.651124] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.651143] ? __pfx_mempool_kfree+0x10/0x10 [ 12.651166] ? __pfx_read_tsc+0x10/0x10 [ 12.651187] ? ktime_get_ts64+0x86/0x230 [ 12.651213] kunit_try_run_case+0x1a5/0x480 [ 12.651239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.651261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.651287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.651310] ? __kthread_parkme+0x82/0x180 [ 12.651332] ? preempt_count_sub+0x50/0x80 [ 12.651358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.651381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.651404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.651426] kthread+0x337/0x6f0 [ 12.651442] ? trace_preempt_on+0x20/0xc0 [ 12.651468] ? __pfx_kthread+0x10/0x10 [ 12.651487] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.651509] ? calculate_sigpending+0x7b/0xa0 [ 12.651531] ? __pfx_kthread+0x10/0x10 [ 12.651549] ret_from_fork+0x41/0x80 [ 12.651891] ? __pfx_kthread+0x10/0x10 [ 12.651936] ret_from_fork_asm+0x1a/0x30 [ 12.651969] </TASK> [ 12.651981] [ 12.662484] Allocated by task 260: [ 12.662679] kasan_save_stack+0x45/0x70 [ 12.662993] kasan_save_track+0x18/0x40 [ 12.663265] kasan_save_alloc_info+0x3b/0x50 [ 12.663457] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 12.663876] remove_element+0x11e/0x190 [ 12.664097] mempool_alloc_preallocated+0x4d/0x90 [ 12.664290] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 12.664471] mempool_kmalloc_invalid_free+0xed/0x140 [ 12.664633] kunit_try_run_case+0x1a5/0x480 [ 12.664842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.665234] kthread+0x337/0x6f0 [ 12.665404] ret_from_fork+0x41/0x80 [ 12.665599] ret_from_fork_asm+0x1a/0x30 [ 12.665888] [ 12.665994] The buggy address belongs to the object at ffff8881029f9d00 [ 12.665994] which belongs to the cache kmalloc-128 of size 128 [ 12.666434] The buggy address is located 1 bytes inside of [ 12.666434] 128-byte region [ffff8881029f9d00, ffff8881029f9d80) [ 12.667096] [ 12.667197] The buggy address belongs to the physical page: [ 12.667425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 12.667784] flags: 0x200000000000000(node=0|zone=2) [ 12.667961] page_type: f5(slab) [ 12.668312] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.668663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.669120] page dumped because: kasan: bad access detected [ 12.669348] [ 12.669466] Memory state around the buggy address: [ 12.669664] ffff8881029f9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.670070] ffff8881029f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.670355] >ffff8881029f9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.670671] ^ [ 12.670947] ffff8881029f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.671243] ffff8881029f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.671560] ================================================================== [ 12.674665] ================================================================== [ 12.675247] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.676194] Free of addr ffff888103a04001 by task kunit_try_catch/262 [ 12.676488] [ 12.676642] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 12.676692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.676772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.676797] Call Trace: [ 12.676821] <TASK> [ 12.676839] dump_stack_lvl+0x73/0xb0 [ 12.676869] print_report+0xd1/0x650 [ 12.676904] ? __virt_addr_valid+0x1db/0x2d0 [ 12.676937] ? kasan_addr_to_slab+0x11/0xa0 [ 12.676957] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.676984] kasan_report_invalid_free+0x10a/0x130 [ 12.677017] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.677047] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.677071] __kasan_mempool_poison_object+0x102/0x1d0 [ 12.677106] mempool_free+0x2ec/0x380 [ 12.677130] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 12.677156] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 12.677180] ? update_load_avg+0x1be/0x21b0 [ 12.677202] ? update_load_avg+0x1be/0x21b0 [ 12.677220] ? update_curr+0x80/0x810 [ 12.677240] ? finish_task_switch.isra.0+0x153/0x700 [ 12.677267] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 12.677301] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 12.677326] ? dequeue_task_fair+0x156/0x4e0 [ 12.677347] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.677377] ? __pfx_mempool_kfree+0x10/0x10 [ 12.677398] ? __pfx_read_tsc+0x10/0x10 [ 12.677418] ? ktime_get_ts64+0x86/0x230 [ 12.677444] kunit_try_run_case+0x1a5/0x480 [ 12.677470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.677491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.677517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.677541] ? __kthread_parkme+0x82/0x180 [ 12.677582] ? preempt_count_sub+0x50/0x80 [ 12.677616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.677640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.677663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.677696] kthread+0x337/0x6f0 [ 12.677766] ? trace_preempt_on+0x20/0xc0 [ 12.677791] ? __pfx_kthread+0x10/0x10 [ 12.677809] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.677831] ? calculate_sigpending+0x7b/0xa0 [ 12.677853] ? __pfx_kthread+0x10/0x10 [ 12.677871] ret_from_fork+0x41/0x80 [ 12.677892] ? __pfx_kthread+0x10/0x10 [ 12.677910] ret_from_fork_asm+0x1a/0x30 [ 12.677951] </TASK> [ 12.677963] [ 12.688361] The buggy address belongs to the physical page: [ 12.688633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a04 [ 12.688973] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.689358] flags: 0x200000000000040(head|node=0|zone=2) [ 12.689598] page_type: f8(unknown) [ 12.689791] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.690160] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.690513] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.691111] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.691394] head: 0200000000000002 ffffea00040e8101 00000000ffffffff 00000000ffffffff [ 12.691872] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.692260] page dumped because: kasan: bad access detected [ 12.692493] [ 12.692620] Memory state around the buggy address: [ 12.692887] ffff888103a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.693156] ffff888103a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.693483] >ffff888103a04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.693832] ^ [ 12.694025] ffff888103a04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.694312] ffff888103a04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.694615] ==================================================================