Date
May 23, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.632524] ================================================================== [ 30.632709] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 30.632876] Free of addr fff00000c7894000 by task kunit_try_catch/241 [ 30.632994] [ 30.633419] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 30.633771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.633864] Hardware name: linux,dummy-virt (DT) [ 30.633961] Call trace: [ 30.634024] show_stack+0x20/0x38 (C) [ 30.634179] dump_stack_lvl+0x8c/0xd0 [ 30.634324] print_report+0x118/0x608 [ 30.634477] kasan_report_invalid_free+0xc0/0xe8 [ 30.634610] __kasan_mempool_poison_pages+0xe0/0xe8 [ 30.635040] mempool_free+0x24c/0x328 [ 30.635247] mempool_double_free_helper+0x150/0x2e8 [ 30.635441] mempool_page_alloc_double_free+0xbc/0x118 [ 30.635640] kunit_try_run_case+0x170/0x3f0 [ 30.635861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.636066] kthread+0x328/0x630 [ 30.636226] ret_from_fork+0x10/0x20 [ 30.636936] [ 30.637126] The buggy address belongs to the physical page: [ 30.637265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 30.637505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.637744] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.637900] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.638046] page dumped because: kasan: bad access detected [ 30.638122] [ 30.638161] Memory state around the buggy address: [ 30.638237] fff00000c7893f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.638373] fff00000c7893f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.638519] >fff00000c7894000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.638997] ^ [ 30.639144] fff00000c7894080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.639277] fff00000c7894100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.639513] ================================================================== [ 30.590418] ================================================================== [ 30.590702] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 30.590900] Free of addr fff00000c7894000 by task kunit_try_catch/239 [ 30.591094] [ 30.591216] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 30.592235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.592312] Hardware name: linux,dummy-virt (DT) [ 30.592406] Call trace: [ 30.592485] show_stack+0x20/0x38 (C) [ 30.593162] dump_stack_lvl+0x8c/0xd0 [ 30.593844] print_report+0x118/0x608 [ 30.594003] kasan_report_invalid_free+0xc0/0xe8 [ 30.594154] __kasan_mempool_poison_object+0x14c/0x150 [ 30.594314] mempool_free+0x28c/0x328 [ 30.595158] mempool_double_free_helper+0x150/0x2e8 [ 30.595356] mempool_kmalloc_large_double_free+0xc0/0x118 [ 30.595542] kunit_try_run_case+0x170/0x3f0 [ 30.595692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.595859] kthread+0x328/0x630 [ 30.596704] ret_from_fork+0x10/0x20 [ 30.597271] [ 30.597403] The buggy address belongs to the physical page: [ 30.597598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 30.598041] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.598401] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.598617] page_type: f8(unknown) [ 30.598735] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.599345] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 30.599833] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.599993] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 30.600339] head: 0bfffe0000000002 ffffc1ffc31e2501 00000000ffffffff 00000000ffffffff [ 30.600915] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.601043] page dumped because: kasan: bad access detected [ 30.601167] [ 30.601226] Memory state around the buggy address: [ 30.601341] fff00000c7893f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.601593] fff00000c7893f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.601805] >fff00000c7894000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.602371] ^ [ 30.602492] fff00000c7894080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.602633] fff00000c7894100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.602756] ================================================================== [ 30.550366] ================================================================== [ 30.551069] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 30.551602] Free of addr fff00000c775a800 by task kunit_try_catch/237 [ 30.551913] [ 30.552232] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 30.552483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.552663] Hardware name: linux,dummy-virt (DT) [ 30.552804] Call trace: [ 30.552921] show_stack+0x20/0x38 (C) [ 30.553479] dump_stack_lvl+0x8c/0xd0 [ 30.553921] print_report+0x118/0x608 [ 30.554585] kasan_report_invalid_free+0xc0/0xe8 [ 30.554984] check_slab_allocation+0xd4/0x108 [ 30.555148] __kasan_mempool_poison_object+0x78/0x150 [ 30.555304] mempool_free+0x28c/0x328 [ 30.555472] mempool_double_free_helper+0x150/0x2e8 [ 30.555621] mempool_kmalloc_double_free+0xc0/0x118 [ 30.555769] kunit_try_run_case+0x170/0x3f0 [ 30.556271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.557005] kthread+0x328/0x630 [ 30.557412] ret_from_fork+0x10/0x20 [ 30.557799] [ 30.557886] Allocated by task 237: [ 30.558049] kasan_save_stack+0x3c/0x68 [ 30.558391] kasan_save_track+0x20/0x40 [ 30.558542] kasan_save_alloc_info+0x40/0x58 [ 30.558641] __kasan_mempool_unpoison_object+0x11c/0x180 [ 30.558728] remove_element+0x130/0x1f8 [ 30.559153] mempool_alloc_preallocated+0x58/0xc0 [ 30.559669] mempool_double_free_helper+0x94/0x2e8 [ 30.559991] mempool_kmalloc_double_free+0xc0/0x118 [ 30.560317] kunit_try_run_case+0x170/0x3f0 [ 30.560951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.561137] kthread+0x328/0x630 [ 30.561241] ret_from_fork+0x10/0x20 [ 30.561337] [ 30.561391] Freed by task 237: [ 30.561620] kasan_save_stack+0x3c/0x68 [ 30.561838] kasan_save_track+0x20/0x40 [ 30.561952] kasan_save_free_info+0x4c/0x78 [ 30.562051] __kasan_mempool_poison_object+0xc0/0x150 [ 30.562154] mempool_free+0x28c/0x328 [ 30.562248] mempool_double_free_helper+0x100/0x2e8 [ 30.562364] mempool_kmalloc_double_free+0xc0/0x118 [ 30.562545] kunit_try_run_case+0x170/0x3f0 [ 30.562663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.562759] kthread+0x328/0x630 [ 30.562997] ret_from_fork+0x10/0x20 [ 30.563110] [ 30.563242] The buggy address belongs to the object at fff00000c775a800 [ 30.563242] which belongs to the cache kmalloc-128 of size 128 [ 30.563591] The buggy address is located 0 bytes inside of [ 30.563591] 128-byte region [fff00000c775a800, fff00000c775a880) [ 30.563780] [ 30.563966] The buggy address belongs to the physical page: [ 30.564146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775a [ 30.564297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.564429] page_type: f5(slab) [ 30.564551] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.564697] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.564816] page dumped because: kasan: bad access detected [ 30.564906] [ 30.564956] Memory state around the buggy address: [ 30.565051] fff00000c775a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.565179] fff00000c775a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.565306] >fff00000c775a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.565418] ^ [ 30.565511] fff00000c775a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.565639] fff00000c775a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.565751] ==================================================================
[ 14.301804] ================================================================== [ 14.302473] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.302768] Free of addr ffff888102acc000 by task kunit_try_catch/256 [ 14.303245] [ 14.303369] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.303418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.303430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.303452] Call Trace: [ 14.303463] <TASK> [ 14.303479] dump_stack_lvl+0x73/0xb0 [ 14.303508] print_report+0xd1/0x650 [ 14.303530] ? __virt_addr_valid+0x1db/0x2d0 [ 14.303553] ? kasan_addr_to_slab+0x11/0xa0 [ 14.303573] ? mempool_double_free_helper+0x184/0x370 [ 14.303598] kasan_report_invalid_free+0x10a/0x130 [ 14.303622] ? mempool_double_free_helper+0x184/0x370 [ 14.303649] ? mempool_double_free_helper+0x184/0x370 [ 14.303671] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.303696] mempool_free+0x2ec/0x380 [ 14.303719] mempool_double_free_helper+0x184/0x370 [ 14.303743] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.303766] ? update_load_avg+0x1be/0x21b0 [ 14.303789] ? finish_task_switch.isra.0+0x153/0x700 [ 14.303817] mempool_kmalloc_large_double_free+0xed/0x140 [ 14.303842] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.303866] ? dequeue_task_fair+0x156/0x4e0 [ 14.303889] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.303908] ? __pfx_mempool_kfree+0x10/0x10 [ 14.303930] ? __pfx_read_tsc+0x10/0x10 [ 14.303949] ? ktime_get_ts64+0x86/0x230 [ 14.303974] kunit_try_run_case+0x1a5/0x480 [ 14.303998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.304019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.304042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.304065] ? __kthread_parkme+0x82/0x180 [ 14.304086] ? preempt_count_sub+0x50/0x80 [ 14.304111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.304134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.304156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.304178] kthread+0x337/0x6f0 [ 14.304195] ? trace_preempt_on+0x20/0xc0 [ 14.304218] ? __pfx_kthread+0x10/0x10 [ 14.304236] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.304257] ? calculate_sigpending+0x7b/0xa0 [ 14.304277] ? __pfx_kthread+0x10/0x10 [ 14.304305] ret_from_fork+0x41/0x80 [ 14.304326] ? __pfx_kthread+0x10/0x10 [ 14.304345] ret_from_fork_asm+0x1a/0x30 [ 14.304375] </TASK> [ 14.304387] [ 14.312739] The buggy address belongs to the physical page: [ 14.313005] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc [ 14.313372] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.313646] flags: 0x200000000000040(head|node=0|zone=2) [ 14.314076] page_type: f8(unknown) [ 14.314237] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.314514] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.314758] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.315180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.315666] head: 0200000000000002 ffffea00040ab301 00000000ffffffff 00000000ffffffff [ 14.315990] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.316218] page dumped because: kasan: bad access detected [ 14.316401] [ 14.316732] Memory state around the buggy address: [ 14.316967] ffff888102acbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.317554] ffff888102acbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.317882] >ffff888102acc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.318197] ^ [ 14.318371] ffff888102acc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.319400] ffff888102acc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.319716] ================================================================== [ 14.271850] ================================================================== [ 14.272400] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.272775] Free of addr ffff8881026f5600 by task kunit_try_catch/254 [ 14.273052] [ 14.273175] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.273222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.273235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.273258] Call Trace: [ 14.273271] <TASK> [ 14.273287] dump_stack_lvl+0x73/0xb0 [ 14.273329] print_report+0xd1/0x650 [ 14.273351] ? __virt_addr_valid+0x1db/0x2d0 [ 14.273374] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.273396] ? mempool_double_free_helper+0x184/0x370 [ 14.273419] kasan_report_invalid_free+0x10a/0x130 [ 14.273445] ? mempool_double_free_helper+0x184/0x370 [ 14.273471] ? mempool_double_free_helper+0x184/0x370 [ 14.273494] ? mempool_double_free_helper+0x184/0x370 [ 14.273518] check_slab_allocation+0x101/0x130 [ 14.273541] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.273565] mempool_free+0x2ec/0x380 [ 14.273591] mempool_double_free_helper+0x184/0x370 [ 14.273616] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.273643] ? dequeue_entities+0x852/0x1740 [ 14.273671] ? finish_task_switch.isra.0+0x153/0x700 [ 14.273699] mempool_kmalloc_double_free+0xed/0x140 [ 14.273722] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.273745] ? dequeue_task_fair+0x166/0x4e0 [ 14.273768] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.273787] ? __pfx_mempool_kfree+0x10/0x10 [ 14.273809] ? __pfx_read_tsc+0x10/0x10 [ 14.273828] ? ktime_get_ts64+0x86/0x230 [ 14.273854] kunit_try_run_case+0x1a5/0x480 [ 14.273953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273979] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.274004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.274026] ? __kthread_parkme+0x82/0x180 [ 14.274048] ? preempt_count_sub+0x50/0x80 [ 14.274072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.274096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.274118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.274140] kthread+0x337/0x6f0 [ 14.274157] ? trace_preempt_on+0x20/0xc0 [ 14.274181] ? __pfx_kthread+0x10/0x10 [ 14.274198] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.274219] ? calculate_sigpending+0x7b/0xa0 [ 14.274240] ? __pfx_kthread+0x10/0x10 [ 14.274259] ret_from_fork+0x41/0x80 [ 14.274280] ? __pfx_kthread+0x10/0x10 [ 14.274309] ret_from_fork_asm+0x1a/0x30 [ 14.274340] </TASK> [ 14.274351] [ 14.284503] Allocated by task 254: [ 14.284685] kasan_save_stack+0x45/0x70 [ 14.284859] kasan_save_track+0x18/0x40 [ 14.285076] kasan_save_alloc_info+0x3b/0x50 [ 14.285354] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.285699] remove_element+0x11e/0x190 [ 14.285871] mempool_alloc_preallocated+0x4d/0x90 [ 14.286153] mempool_double_free_helper+0x8a/0x370 [ 14.286381] mempool_kmalloc_double_free+0xed/0x140 [ 14.286551] kunit_try_run_case+0x1a5/0x480 [ 14.286706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.286882] kthread+0x337/0x6f0 [ 14.287149] ret_from_fork+0x41/0x80 [ 14.287370] ret_from_fork_asm+0x1a/0x30 [ 14.287757] [ 14.287855] Freed by task 254: [ 14.288080] kasan_save_stack+0x45/0x70 [ 14.288247] kasan_save_track+0x18/0x40 [ 14.288444] kasan_save_free_info+0x3f/0x60 [ 14.288623] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.288795] mempool_free+0x2ec/0x380 [ 14.288928] mempool_double_free_helper+0x109/0x370 [ 14.289094] mempool_kmalloc_double_free+0xed/0x140 [ 14.289432] kunit_try_run_case+0x1a5/0x480 [ 14.289718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.290122] kthread+0x337/0x6f0 [ 14.290312] ret_from_fork+0x41/0x80 [ 14.290567] ret_from_fork_asm+0x1a/0x30 [ 14.290766] [ 14.290841] The buggy address belongs to the object at ffff8881026f5600 [ 14.290841] which belongs to the cache kmalloc-128 of size 128 [ 14.291887] The buggy address is located 0 bytes inside of [ 14.291887] 128-byte region [ffff8881026f5600, ffff8881026f5680) [ 14.292454] [ 14.292555] The buggy address belongs to the physical page: [ 14.292749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f5 [ 14.293092] flags: 0x200000000000000(node=0|zone=2) [ 14.293347] page_type: f5(slab) [ 14.293524] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.293938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.294207] page dumped because: kasan: bad access detected [ 14.294468] [ 14.294543] Memory state around the buggy address: [ 14.294710] ffff8881026f5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.295188] ffff8881026f5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.295611] >ffff8881026f5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.295839] ^ [ 14.296200] ffff8881026f5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.296575] ffff8881026f5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.296848] ================================================================== [ 14.323412] ================================================================== [ 14.323930] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.324476] Free of addr ffff888103928000 by task kunit_try_catch/258 [ 14.324831] [ 14.325141] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.325192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.325207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.325227] Call Trace: [ 14.325241] <TASK> [ 14.325258] dump_stack_lvl+0x73/0xb0 [ 14.325289] print_report+0xd1/0x650 [ 14.325324] ? __virt_addr_valid+0x1db/0x2d0 [ 14.325348] ? kasan_addr_to_slab+0x11/0xa0 [ 14.325369] ? mempool_double_free_helper+0x184/0x370 [ 14.325394] kasan_report_invalid_free+0x10a/0x130 [ 14.325419] ? mempool_double_free_helper+0x184/0x370 [ 14.325445] ? mempool_double_free_helper+0x184/0x370 [ 14.325468] __kasan_mempool_poison_pages+0x115/0x130 [ 14.325493] mempool_free+0x290/0x380 [ 14.325517] mempool_double_free_helper+0x184/0x370 [ 14.325541] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.325565] ? dequeue_entities+0x852/0x1740 [ 14.325590] ? finish_task_switch.isra.0+0x153/0x700 [ 14.325616] mempool_page_alloc_double_free+0xe8/0x140 [ 14.325638] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.325659] ? dequeue_task_fair+0x166/0x4e0 [ 14.325681] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.325702] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.325724] ? __pfx_read_tsc+0x10/0x10 [ 14.325745] ? ktime_get_ts64+0x86/0x230 [ 14.325770] kunit_try_run_case+0x1a5/0x480 [ 14.325795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.325841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.325863] ? __kthread_parkme+0x82/0x180 [ 14.325954] ? preempt_count_sub+0x50/0x80 [ 14.325982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.326006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.326029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.326052] kthread+0x337/0x6f0 [ 14.326068] ? trace_preempt_on+0x20/0xc0 [ 14.326093] ? __pfx_kthread+0x10/0x10 [ 14.326111] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.326132] ? calculate_sigpending+0x7b/0xa0 [ 14.326155] ? __pfx_kthread+0x10/0x10 [ 14.326173] ret_from_fork+0x41/0x80 [ 14.326194] ? __pfx_kthread+0x10/0x10 [ 14.326212] ret_from_fork_asm+0x1a/0x30 [ 14.326244] </TASK> [ 14.326256] [ 14.334938] The buggy address belongs to the physical page: [ 14.335166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103928 [ 14.335533] flags: 0x200000000000000(node=0|zone=2) [ 14.335733] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.336071] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.336323] page dumped because: kasan: bad access detected [ 14.336656] [ 14.336756] Memory state around the buggy address: [ 14.336986] ffff888103927f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.337268] ffff888103927f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.337563] >ffff888103928000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.337815] ^ [ 14.337961] ffff888103928080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.338272] ffff888103928100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.338565] ==================================================================