Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.334644] ==================================================================
[   21.335082] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.335274] Free of addr fff00000c7818000 by task kunit_try_catch/237
[   21.335323] 
[   21.335362] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.335780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.335973] Hardware name: linux,dummy-virt (DT)
[   21.336041] Call trace:
[   21.336148]  show_stack+0x20/0x38 (C)
[   21.336304]  dump_stack_lvl+0x8c/0xd0
[   21.336473]  print_report+0x118/0x608
[   21.336744]  kasan_report_invalid_free+0xc0/0xe8
[   21.336906]  __kasan_mempool_poison_object+0x14c/0x150
[   21.336993]  mempool_free+0x28c/0x328
[   21.337166]  mempool_double_free_helper+0x150/0x2e8
[   21.337264]  mempool_kmalloc_large_double_free+0xc0/0x118
[   21.337360]  kunit_try_run_case+0x170/0x3f0
[   21.337562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.337614]  kthread+0x328/0x630
[   21.337665]  ret_from_fork+0x10/0x20
[   21.337817] 
[   21.337849] The buggy address belongs to the physical page:
[   21.337904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   21.337960] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.338060] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.338125] page_type: f8(unknown)
[   21.338183] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.338245] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.338309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.338380] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.338438] head: 0bfffe0000000002 ffffc1ffc31e0601 00000000ffffffff 00000000ffffffff
[   21.338504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.338545] page dumped because: kasan: bad access detected
[   21.338584] 
[   21.338610] Memory state around the buggy address:
[   21.338649]  fff00000c7817f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.338692]  fff00000c7817f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.338735] >fff00000c7818000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.338773]                    ^
[   21.338824]  fff00000c7818080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.338879]  fff00000c7818100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.338924] ==================================================================
[   21.349607] ==================================================================
[   21.349667] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.349725] Free of addr fff00000c7818000 by task kunit_try_catch/239
[   21.349768] 
[   21.349799] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.349881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.350027] Hardware name: linux,dummy-virt (DT)
[   21.350072] Call trace:
[   21.350095]  show_stack+0x20/0x38 (C)
[   21.350148]  dump_stack_lvl+0x8c/0xd0
[   21.350208]  print_report+0x118/0x608
[   21.350254]  kasan_report_invalid_free+0xc0/0xe8
[   21.350321]  __kasan_mempool_poison_pages+0xe0/0xe8
[   21.350378]  mempool_free+0x24c/0x328
[   21.350422]  mempool_double_free_helper+0x150/0x2e8
[   21.350471]  mempool_page_alloc_double_free+0xbc/0x118
[   21.350523]  kunit_try_run_case+0x170/0x3f0
[   21.350573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.350633]  kthread+0x328/0x630
[   21.350676]  ret_from_fork+0x10/0x20
[   21.350732] 
[   21.350751] The buggy address belongs to the physical page:
[   21.350782] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107818
[   21.350842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.350907] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.350957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.351004] page dumped because: kasan: bad access detected
[   21.351035] 
[   21.351052] Memory state around the buggy address:
[   21.351094]  fff00000c7817f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.351145]  fff00000c7817f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.351966] >fff00000c7818000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.352011]                    ^
[   21.352041]  fff00000c7818080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.352494]  fff00000c7818100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.352562] ==================================================================
[   21.322478] ==================================================================
[   21.322536] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.322589] Free of addr fff00000c7706a00 by task kunit_try_catch/235
[   21.322632] 
[   21.323089] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.323196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.323248] Hardware name: linux,dummy-virt (DT)
[   21.323352] Call trace:
[   21.323377]  show_stack+0x20/0x38 (C)
[   21.323428]  dump_stack_lvl+0x8c/0xd0
[   21.323474]  print_report+0x118/0x608
[   21.323549]  kasan_report_invalid_free+0xc0/0xe8
[   21.323598]  check_slab_allocation+0xd4/0x108
[   21.323834]  __kasan_mempool_poison_object+0x78/0x150
[   21.323907]  mempool_free+0x28c/0x328
[   21.324013]  mempool_double_free_helper+0x150/0x2e8
[   21.324136]  mempool_kmalloc_double_free+0xc0/0x118
[   21.324195]  kunit_try_run_case+0x170/0x3f0
[   21.324244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.324319]  kthread+0x328/0x630
[   21.324393]  ret_from_fork+0x10/0x20
[   21.324447] 
[   21.324528] Allocated by task 235:
[   21.324584]  kasan_save_stack+0x3c/0x68
[   21.324691]  kasan_save_track+0x20/0x40
[   21.324756]  kasan_save_alloc_info+0x40/0x58
[   21.324855]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.324949]  remove_element+0x130/0x1f8
[   21.325021]  mempool_alloc_preallocated+0x58/0xc0
[   21.325104]  mempool_double_free_helper+0x94/0x2e8
[   21.325394]  mempool_kmalloc_double_free+0xc0/0x118
[   21.325438]  kunit_try_run_case+0x170/0x3f0
[   21.325476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.325519]  kthread+0x328/0x630
[   21.325550]  ret_from_fork+0x10/0x20
[   21.325587] 
[   21.325605] Freed by task 235:
[   21.325644]  kasan_save_stack+0x3c/0x68
[   21.325795]  kasan_save_track+0x20/0x40
[   21.325831]  kasan_save_free_info+0x4c/0x78
[   21.325888]  __kasan_mempool_poison_object+0xc0/0x150
[   21.325930]  mempool_free+0x28c/0x328
[   21.325964]  mempool_double_free_helper+0x100/0x2e8
[   21.326003]  mempool_kmalloc_double_free+0xc0/0x118
[   21.326043]  kunit_try_run_case+0x170/0x3f0
[   21.326079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326131]  kthread+0x328/0x630
[   21.326172]  ret_from_fork+0x10/0x20
[   21.326208] 
[   21.326225] The buggy address belongs to the object at fff00000c7706a00
[   21.326225]  which belongs to the cache kmalloc-128 of size 128
[   21.326487] The buggy address is located 0 bytes inside of
[   21.326487]  128-byte region [fff00000c7706a00, fff00000c7706a80)
[   21.326702] 
[   21.326729] The buggy address belongs to the physical page:
[   21.326759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107706
[   21.326813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.326878] page_type: f5(slab)
[   21.326921] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.326974] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.327014] page dumped because: kasan: bad access detected
[   21.327096] 
[   21.327114] Memory state around the buggy address:
[   21.327256]  fff00000c7706900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.327451]  fff00000c7706980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327541] >fff00000c7706a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.327580]                    ^
[   21.327609]  fff00000c7706a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327670]  fff00000c7706b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.327710] ==================================================================

[   14.183016] ==================================================================
[   14.183571] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.183965] Free of addr ffff888102b9f100 by task kunit_try_catch/253
[   14.184211] 
[   14.184396] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.184443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.184454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.184476] Call Trace:
[   14.184487]  <TASK>
[   14.184502]  dump_stack_lvl+0x73/0xb0
[   14.184572]  print_report+0xd1/0x650
[   14.184595]  ? __virt_addr_valid+0x1db/0x2d0
[   14.184635]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.184676]  ? mempool_double_free_helper+0x184/0x370
[   14.184702]  kasan_report_invalid_free+0x10a/0x130
[   14.184727]  ? mempool_double_free_helper+0x184/0x370
[   14.184752]  ? mempool_double_free_helper+0x184/0x370
[   14.184776]  ? mempool_double_free_helper+0x184/0x370
[   14.184800]  check_slab_allocation+0x101/0x130
[   14.184842]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.184868]  mempool_free+0x2ec/0x380
[   14.184892]  ? __wake_up+0x49/0x60
[   14.184918]  mempool_double_free_helper+0x184/0x370
[   14.184943]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.184967]  ? update_load_avg+0x1be/0x21b0
[   14.184990]  ? update_load_avg+0x1be/0x21b0
[   14.185089]  ? update_curr+0x80/0x810
[   14.185138]  ? finish_task_switch.isra.0+0x153/0x700
[   14.185178]  mempool_kmalloc_double_free+0xed/0x140
[   14.185203]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.185231]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.185255]  ? __pfx_mempool_kfree+0x10/0x10
[   14.185280]  ? __pfx_read_tsc+0x10/0x10
[   14.185303]  ? ktime_get_ts64+0x86/0x230
[   14.185328]  kunit_try_run_case+0x1a5/0x480
[   14.185354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.185377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.185402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.185426]  ? __kthread_parkme+0x82/0x180
[   14.185447]  ? preempt_count_sub+0x50/0x80
[   14.185471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.185495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.185530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.185555]  kthread+0x337/0x6f0
[   14.185574]  ? trace_preempt_on+0x20/0xc0
[   14.185610]  ? __pfx_kthread+0x10/0x10
[   14.185631]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.185652]  ? calculate_sigpending+0x7b/0xa0
[   14.185678]  ? __pfx_kthread+0x10/0x10
[   14.185699]  ret_from_fork+0x116/0x1d0
[   14.185723]  ? __pfx_kthread+0x10/0x10
[   14.185743]  ret_from_fork_asm+0x1a/0x30
[   14.185776]  </TASK>
[   14.185787] 
[   14.198316] Allocated by task 253:
[   14.198522]  kasan_save_stack+0x45/0x70
[   14.198702]  kasan_save_track+0x18/0x40
[   14.198890]  kasan_save_alloc_info+0x3b/0x50
[   14.199169]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.199393]  remove_element+0x11e/0x190
[   14.199612]  mempool_alloc_preallocated+0x4d/0x90
[   14.199771]  mempool_double_free_helper+0x8a/0x370
[   14.200058]  mempool_kmalloc_double_free+0xed/0x140
[   14.200296]  kunit_try_run_case+0x1a5/0x480
[   14.200499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.200735]  kthread+0x337/0x6f0
[   14.200962]  ret_from_fork+0x116/0x1d0
[   14.201145]  ret_from_fork_asm+0x1a/0x30
[   14.201327] 
[   14.201397] Freed by task 253:
[   14.201506]  kasan_save_stack+0x45/0x70
[   14.201872]  kasan_save_track+0x18/0x40
[   14.202242]  kasan_save_free_info+0x3f/0x60
[   14.202450]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.202693]  mempool_free+0x2ec/0x380
[   14.202825]  mempool_double_free_helper+0x109/0x370
[   14.203183]  mempool_kmalloc_double_free+0xed/0x140
[   14.203426]  kunit_try_run_case+0x1a5/0x480
[   14.203642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.204017]  kthread+0x337/0x6f0
[   14.204157]  ret_from_fork+0x116/0x1d0
[   14.204290]  ret_from_fork_asm+0x1a/0x30
[   14.204486] 
[   14.204583] The buggy address belongs to the object at ffff888102b9f100
[   14.204583]  which belongs to the cache kmalloc-128 of size 128
[   14.205151] The buggy address is located 0 bytes inside of
[   14.205151]  128-byte region [ffff888102b9f100, ffff888102b9f180)
[   14.205576] 
[   14.205661] The buggy address belongs to the physical page:
[   14.205860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b9f
[   14.206419] flags: 0x200000000000000(node=0|zone=2)
[   14.206653] page_type: f5(slab)
[   14.206780] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.207460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.207849] page dumped because: kasan: bad access detected
[   14.208049] 
[   14.208181] Memory state around the buggy address:
[   14.208440]  ffff888102b9f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.208707]  ffff888102b9f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.209077] >ffff888102b9f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.209313]                    ^
[   14.209425]  ffff888102b9f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.210195]  ffff888102b9f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.210416] ==================================================================
[   14.235437] ==================================================================
[   14.236057] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.236550] Free of addr ffff88810298c000 by task kunit_try_catch/257
[   14.236802] 
[   14.236913] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.237013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.237025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.237046] Call Trace:
[   14.237057]  <TASK>
[   14.237072]  dump_stack_lvl+0x73/0xb0
[   14.237102]  print_report+0xd1/0x650
[   14.237124]  ? __virt_addr_valid+0x1db/0x2d0
[   14.237149]  ? kasan_addr_to_slab+0x11/0xa0
[   14.237169]  ? mempool_double_free_helper+0x184/0x370
[   14.237195]  kasan_report_invalid_free+0x10a/0x130
[   14.237220]  ? mempool_double_free_helper+0x184/0x370
[   14.237247]  ? mempool_double_free_helper+0x184/0x370
[   14.237271]  __kasan_mempool_poison_pages+0x115/0x130
[   14.237297]  mempool_free+0x290/0x380
[   14.237324]  mempool_double_free_helper+0x184/0x370
[   14.237348]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.237374]  ? __kasan_check_write+0x18/0x20
[   14.237395]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.237418]  ? finish_task_switch.isra.0+0x153/0x700
[   14.237444]  mempool_page_alloc_double_free+0xe8/0x140
[   14.237470]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.237500]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.237524]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.237551]  ? __pfx_read_tsc+0x10/0x10
[   14.237573]  ? ktime_get_ts64+0x86/0x230
[   14.237610]  kunit_try_run_case+0x1a5/0x480
[   14.237635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.237657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.237682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.237709]  ? __kthread_parkme+0x82/0x180
[   14.237730]  ? preempt_count_sub+0x50/0x80
[   14.237753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.237777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.237802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.237828]  kthread+0x337/0x6f0
[   14.237847]  ? trace_preempt_on+0x20/0xc0
[   14.237869]  ? __pfx_kthread+0x10/0x10
[   14.237889]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.237911]  ? calculate_sigpending+0x7b/0xa0
[   14.237945]  ? __pfx_kthread+0x10/0x10
[   14.237966]  ret_from_fork+0x116/0x1d0
[   14.237985]  ? __pfx_kthread+0x10/0x10
[   14.238005]  ret_from_fork_asm+0x1a/0x30
[   14.238037]  </TASK>
[   14.238047] 
[   14.246700] The buggy address belongs to the physical page:
[   14.247037] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298c
[   14.247311] flags: 0x200000000000000(node=0|zone=2)
[   14.247487] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.247846] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.248574] page dumped because: kasan: bad access detected
[   14.248810] 
[   14.248883] Memory state around the buggy address:
[   14.249199]  ffff88810298bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.249488]  ffff88810298bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.249820] >ffff88810298c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.250171]                    ^
[   14.250312]  ffff88810298c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.250627]  ffff88810298c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.250901] ==================================================================
[   14.213902] ==================================================================
[   14.214405] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.214762] Free of addr ffff888103b34000 by task kunit_try_catch/255
[   14.215088] 
[   14.215194] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.215242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.215254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.215276] Call Trace:
[   14.215290]  <TASK>
[   14.215308]  dump_stack_lvl+0x73/0xb0
[   14.215341]  print_report+0xd1/0x650
[   14.215364]  ? __virt_addr_valid+0x1db/0x2d0
[   14.215390]  ? kasan_addr_to_slab+0x11/0xa0
[   14.215410]  ? mempool_double_free_helper+0x184/0x370
[   14.215436]  kasan_report_invalid_free+0x10a/0x130
[   14.215462]  ? mempool_double_free_helper+0x184/0x370
[   14.215490]  ? mempool_double_free_helper+0x184/0x370
[   14.215530]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.215556]  mempool_free+0x2ec/0x380
[   14.215584]  mempool_double_free_helper+0x184/0x370
[   14.215622]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.215647]  ? update_load_avg+0x1be/0x21b0
[   14.215675]  ? finish_task_switch.isra.0+0x153/0x700
[   14.215704]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.215731]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.215761]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.215786]  ? __pfx_mempool_kfree+0x10/0x10
[   14.215812]  ? __pfx_read_tsc+0x10/0x10
[   14.215834]  ? ktime_get_ts64+0x86/0x230
[   14.215860]  kunit_try_run_case+0x1a5/0x480
[   14.215887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.215910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.215947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.215971]  ? __kthread_parkme+0x82/0x180
[   14.215992]  ? preempt_count_sub+0x50/0x80
[   14.216016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.216042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.216067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.216093]  kthread+0x337/0x6f0
[   14.216112]  ? trace_preempt_on+0x20/0xc0
[   14.216137]  ? __pfx_kthread+0x10/0x10
[   14.216157]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.216179]  ? calculate_sigpending+0x7b/0xa0
[   14.216206]  ? __pfx_kthread+0x10/0x10
[   14.216229]  ret_from_fork+0x116/0x1d0
[   14.216248]  ? __pfx_kthread+0x10/0x10
[   14.216269]  ret_from_fork_asm+0x1a/0x30
[   14.216303]  </TASK>
[   14.216314] 
[   14.225043] The buggy address belongs to the physical page:
[   14.225310] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b34
[   14.225722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.226096] flags: 0x200000000000040(head|node=0|zone=2)
[   14.226300] page_type: f8(unknown)
[   14.226426] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.226731] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.227144] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.227471] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.227824] head: 0200000000000002 ffffea00040ecd01 00000000ffffffff 00000000ffffffff
[   14.228288] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.228521] page dumped because: kasan: bad access detected
[   14.228806] 
[   14.228899] Memory state around the buggy address:
[   14.229143]  ffff888103b33f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.229460]  ffff888103b33f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.229866] >ffff888103b34000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.230203]                    ^
[   14.230329]  ffff888103b34080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.230581]  ffff888103b34100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.230962] ==================================================================