Not allocated shadow for addr ffff880118ad0828 (page ffffea0006940e00) Attempted to access 8 bytes ------------[ cut here ]------------ kernel BUG at mm/kmsan/kmsan.c:1091! invalid opcode: 0000 [#1] SMP CPU: 1 PID: 1244 Comm: kworker/1:2 Not tainted 4.19.0-rc4+ #65 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events __blk_release_queue RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 mm/kmsan/kmsan.c:1089 Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 1c bc 57 8b 31 c0 4c RSP: 0018:ffff88012a9df700 EFLAGS: 00010046 RAX: 000000000000001b RBX: 0000000000000000 RCX: 9e651028c4cff500 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 RBP: ffff88012a9df730 R08: 0000000000000000 R09: ffff88021fd38f50 R10: 0000000000000000 R11: ffffffff862594e0 R12: 0000000000000001 R13: ffff880118ad0828 R14: 0000000000000001 R15: 0000000000000008 FS: 0000000000000000(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fff2143ebec CR3: 0000000117229000 CR4: 00000000001406e0 Call Trace: kmsan_internal_memset_shadow mm/kmsan/kmsan.c:163 [inline] kmsan_internal_unpoison_shadow+0x5c/0xe0 mm/kmsan/kmsan.c:200 kmsan_unpoison_shadow+0x72/0xd0 mm/kmsan/kmsan.c:214 native_ptep_get_and_clear arch/x86/include/asm/pgtable_64.h:87 [inline] ptep_get_and_clear arch/x86/include/asm/pgtable.h:1104 [inline] vunmap_pte_range mm/vmalloc.c:67 [inline] vunmap_pmd_range mm/vmalloc.c:84 [inline] vunmap_pud_range mm/vmalloc.c:100 [inline] vunmap_p4d_range mm/vmalloc.c:116 [inline] vunmap_page_range+0x828/0xc20 mm/vmalloc.c:131 unmap_vmap_area mm/vmalloc.c:604 [inline] free_unmap_vmap_area mm/vmalloc.c:739 [inline] remove_vm_area+0x39b/0x450 mm/vmalloc.c:1491 __vunmap+0x34c/0x5d0 mm/vmalloc.c:1519 vunmap+0x69/0xb0 mm/vmalloc.c:1612 relay_destroy_buf+0xac/0x430 kernel/relay.c:213 relay_remove_buf kernel/relay.c:235 [inline] kref_put include/linux/kref.h:70 [inline] relay_close_buf kernel/relay.c:496 [inline] relay_close+0x470/0xa20 kernel/relay.c:846 blk_trace_free kernel/trace/blktrace.c:314 [inline] blk_trace_cleanup kernel/trace/blktrace.c:339 [inline] __blk_trace_remove+0x256/0x320 kernel/trace/blktrace.c:352 blk_trace_shutdown+0x2d6/0x420 kernel/trace/blktrace.c:752 __blk_release_queue+0x550/0x700 block/blk-sysfs.c:852 process_one_work+0x19c4/0x24f0 kernel/workqueue.c:2153 worker_thread+0x206d/0x2b30 kernel/workqueue.c:2296 kthread+0x59c/0x5d0 kernel/kthread.c:247 ret_from_fork+0x35/0x40 arch/x86/entry/entry_64.S:416 Modules linked in: ---[ end trace 75a1c3525f422a1a ]--- RIP: 0010:kmsan_get_shadow_address+0x2d6/0x3d0 mm/kmsan/kmsan.c:1089 Code: e9 89 00 00 00 c7 04 25 20 73 28 8c 01 00 00 00 65 48 8b 04 25 00 fd 02 00 c6 80 7b 09 00 00 01 80 3c 25 38 73 28 8c 00 74 0c <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 48 c7 c7 1c bc 57 8b 31 c0 4c RSP: 0018:ffff88012a9df700 EFLAGS: 00010046 RAX: 000000000000001b RBX: 0000000000000000 RCX: 9e651028c4cff500 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 RBP: ffff88012a9df730 R08: 0000000000000000 R09: ffff88021fd38f50 R10: 0000000000000000 R11: ffffffff862594e0 R12: 0000000000000001 R13: ffff880118ad0828 R14: 0000000000000001 R15: 0000000000000008 FS: 0000000000000000(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fff2143ebec CR3: 0000000117229000 CR4: 00000000001406e0