Hay
Date
July 15, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.641927] ==================================================================
[   17.641989] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.642067] Free of addr fff00000c78f4000 by task kunit_try_catch/238
[   17.642110] 
[   17.642149] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.642246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.642272] Hardware name: linux,dummy-virt (DT)
[   17.642314] Call trace:
[   17.642336]  show_stack+0x20/0x38 (C)
[   17.642384]  dump_stack_lvl+0x8c/0xd0
[   17.642433]  print_report+0x118/0x5d0
[   17.642523]  kasan_report_invalid_free+0xc0/0xe8
[   17.642575]  __kasan_mempool_poison_object+0x14c/0x150
[   17.642628]  mempool_free+0x28c/0x328
[   17.642671]  mempool_double_free_helper+0x150/0x2e8
[   17.642720]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.642770]  kunit_try_run_case+0x170/0x3f0
[   17.642837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.642891]  kthread+0x328/0x630
[   17.642939]  ret_from_fork+0x10/0x20
[   17.643023] 
[   17.643071] The buggy address belongs to the physical page:
[   17.643105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078f4
[   17.643210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.643266] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.643350] page_type: f8(unknown)
[   17.643390] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.643486] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.643573] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.643627] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.643702] head: 0bfffe0000000002 ffffc1ffc31e3d01 00000000ffffffff 00000000ffffffff
[   17.643772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.643839] page dumped because: kasan: bad access detected
[   17.643871] 
[   17.643888] Memory state around the buggy address:
[   17.643919]  fff00000c78f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.644049]  fff00000c78f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.644095] >fff00000c78f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.644134]                    ^
[   17.644204]  fff00000c78f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.644248]  fff00000c78f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.644341] ==================================================================
[   17.614952] ==================================================================
[   17.615018] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.615077] Free of addr fff00000c5962a00 by task kunit_try_catch/236
[   17.615119] 
[   17.615153] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.616195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.616499] Hardware name: linux,dummy-virt (DT)
[   17.616859] Call trace:
[   17.617167]  show_stack+0x20/0x38 (C)
[   17.617273]  dump_stack_lvl+0x8c/0xd0
[   17.617348]  print_report+0x118/0x5d0
[   17.617451]  kasan_report_invalid_free+0xc0/0xe8
[   17.617547]  check_slab_allocation+0xd4/0x108
[   17.617691]  __kasan_mempool_poison_object+0x78/0x150
[   17.618145]  mempool_free+0x28c/0x328
[   17.618216]  mempool_double_free_helper+0x150/0x2e8
[   17.618653]  mempool_kmalloc_double_free+0xc0/0x118
[   17.618721]  kunit_try_run_case+0x170/0x3f0
[   17.618986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.619106]  kthread+0x328/0x630
[   17.619174]  ret_from_fork+0x10/0x20
[   17.619297] 
[   17.619468] Allocated by task 236:
[   17.619501]  kasan_save_stack+0x3c/0x68
[   17.619858]  kasan_save_track+0x20/0x40
[   17.620126]  kasan_save_alloc_info+0x40/0x58
[   17.620172]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.620224]  remove_element+0x130/0x1f8
[   17.620259]  mempool_alloc_preallocated+0x58/0xc0
[   17.620710]  mempool_double_free_helper+0x94/0x2e8
[   17.620761]  mempool_kmalloc_double_free+0xc0/0x118
[   17.620913]  kunit_try_run_case+0x170/0x3f0
[   17.621130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.621411]  kthread+0x328/0x630
[   17.621479]  ret_from_fork+0x10/0x20
[   17.621541] 
[   17.621568] Freed by task 236:
[   17.621596]  kasan_save_stack+0x3c/0x68
[   17.621769]  kasan_save_track+0x20/0x40
[   17.622015]  kasan_save_free_info+0x4c/0x78
[   17.622235]  __kasan_mempool_poison_object+0xc0/0x150
[   17.622281]  mempool_free+0x28c/0x328
[   17.622776]  mempool_double_free_helper+0x100/0x2e8
[   17.622841]  mempool_kmalloc_double_free+0xc0/0x118
[   17.622881]  kunit_try_run_case+0x170/0x3f0
[   17.622918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.622961]  kthread+0x328/0x630
[   17.622995]  ret_from_fork+0x10/0x20
[   17.623029] 
[   17.623814] The buggy address belongs to the object at fff00000c5962a00
[   17.623814]  which belongs to the cache kmalloc-128 of size 128
[   17.624331] The buggy address is located 0 bytes inside of
[   17.624331]  128-byte region [fff00000c5962a00, fff00000c5962a80)
[   17.624782] 
[   17.624805] The buggy address belongs to the physical page:
[   17.625554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105962
[   17.626193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.626252] page_type: f5(slab)
[   17.626291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.627317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.627394] page dumped because: kasan: bad access detected
[   17.627682] 
[   17.627701] Memory state around the buggy address:
[   17.627737]  fff00000c5962900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.627783]  fff00000c5962980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.628799] >fff00000c5962a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.628865]                    ^
[   17.628894]  fff00000c5962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.629377]  fff00000c5962b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.629748] ==================================================================
[   17.650212] ==================================================================
[   17.650296] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.650389] Free of addr fff00000c78f4000 by task kunit_try_catch/240
[   17.650432] 
[   17.650460] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.650569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.650639] Hardware name: linux,dummy-virt (DT)
[   17.650676] Call trace:
[   17.650696]  show_stack+0x20/0x38 (C)
[   17.650744]  dump_stack_lvl+0x8c/0xd0
[   17.651045]  print_report+0x118/0x5d0
[   17.651099]  kasan_report_invalid_free+0xc0/0xe8
[   17.651207]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.651289]  mempool_free+0x24c/0x328
[   17.651334]  mempool_double_free_helper+0x150/0x2e8
[   17.651382]  mempool_page_alloc_double_free+0xbc/0x118
[   17.651432]  kunit_try_run_case+0x170/0x3f0
[   17.651488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.651550]  kthread+0x328/0x630
[   17.651593]  ret_from_fork+0x10/0x20
[   17.651648] 
[   17.651667] The buggy address belongs to the physical page:
[   17.651699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078f4
[   17.651762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.651821] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.651870] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.651910] page dumped because: kasan: bad access detected
[   17.651950] 
[   17.651975] Memory state around the buggy address:
[   17.652005]  fff00000c78f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.652054]  fff00000c78f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.652109] >fff00000c78f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.652146]                    ^
[   17.652173]  fff00000c78f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.652225]  fff00000c78f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.652263] ==================================================================

[   14.198705] ==================================================================
[   14.199849] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.200175] Free of addr ffff8881029d4000 by task kunit_try_catch/254
[   14.201060] 
[   14.201184] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.201234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.201247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.201267] Call Trace:
[   14.201279]  <TASK>
[   14.201295]  dump_stack_lvl+0x73/0xb0
[   14.201728]  print_report+0xd1/0x610
[   14.201781]  ? __virt_addr_valid+0x1db/0x2d0
[   14.201809]  ? kasan_addr_to_slab+0x11/0xa0
[   14.201830]  ? mempool_double_free_helper+0x184/0x370
[   14.201855]  kasan_report_invalid_free+0x10a/0x130
[   14.201881]  ? mempool_double_free_helper+0x184/0x370
[   14.201909]  ? mempool_double_free_helper+0x184/0x370
[   14.201933]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.201959]  mempool_free+0x2ec/0x380
[   14.201988]  mempool_double_free_helper+0x184/0x370
[   14.202014]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.202042]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.202065]  ? finish_task_switch.isra.0+0x153/0x700
[   14.202093]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.202119]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.202149]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.202173]  ? __pfx_mempool_kfree+0x10/0x10
[   14.202199]  ? __pfx_read_tsc+0x10/0x10
[   14.202220]  ? ktime_get_ts64+0x86/0x230
[   14.202246]  kunit_try_run_case+0x1a5/0x480
[   14.202271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.202416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.202458]  ? __kthread_parkme+0x82/0x180
[   14.202482]  ? preempt_count_sub+0x50/0x80
[   14.202507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.202558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.202584]  kthread+0x337/0x6f0
[   14.202604]  ? trace_preempt_on+0x20/0xc0
[   14.202628]  ? __pfx_kthread+0x10/0x10
[   14.202650]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.202672]  ? calculate_sigpending+0x7b/0xa0
[   14.202697]  ? __pfx_kthread+0x10/0x10
[   14.202719]  ret_from_fork+0x116/0x1d0
[   14.202738]  ? __pfx_kthread+0x10/0x10
[   14.202770]  ret_from_fork_asm+0x1a/0x30
[   14.202802]  </TASK>
[   14.202813] 
[   14.217666] The buggy address belongs to the physical page:
[   14.218138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d4
[   14.218598] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.219274] flags: 0x200000000000040(head|node=0|zone=2)
[   14.219950] page_type: f8(unknown)
[   14.220216] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.220870] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.221115] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.221424] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.221865] head: 0200000000000002 ffffea00040a7501 00000000ffffffff 00000000ffffffff
[   14.222195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.222626] page dumped because: kasan: bad access detected
[   14.223125] 
[   14.223202] Memory state around the buggy address:
[   14.223575]  ffff8881029d3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.223922]  ffff8881029d3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.224269] >ffff8881029d4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.224695]                    ^
[   14.224932]  ffff8881029d4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.225267]  ffff8881029d4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.225818] ==================================================================
[   14.153584] ==================================================================
[   14.154773] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.155555] Free of addr ffff8881038e2000 by task kunit_try_catch/252
[   14.156537] 
[   14.156829] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.156878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.156890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.156912] Call Trace:
[   14.156925]  <TASK>
[   14.156940]  dump_stack_lvl+0x73/0xb0
[   14.156987]  print_report+0xd1/0x610
[   14.157011]  ? __virt_addr_valid+0x1db/0x2d0
[   14.157036]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.157074]  ? mempool_double_free_helper+0x184/0x370
[   14.157101]  kasan_report_invalid_free+0x10a/0x130
[   14.157127]  ? mempool_double_free_helper+0x184/0x370
[   14.157154]  ? mempool_double_free_helper+0x184/0x370
[   14.157179]  ? mempool_double_free_helper+0x184/0x370
[   14.157203]  check_slab_allocation+0x101/0x130
[   14.157226]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.157252]  mempool_free+0x2ec/0x380
[   14.157281]  mempool_double_free_helper+0x184/0x370
[   14.157305]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.157373]  ? update_load_avg+0x1be/0x21b0
[   14.157400]  ? update_load_avg+0x1be/0x21b0
[   14.157421]  ? update_curr+0x80/0x810
[   14.157457]  ? finish_task_switch.isra.0+0x153/0x700
[   14.157484]  mempool_kmalloc_double_free+0xed/0x140
[   14.157509]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.157538]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.157561]  ? __pfx_mempool_kfree+0x10/0x10
[   14.157587]  ? __pfx_read_tsc+0x10/0x10
[   14.157609]  ? ktime_get_ts64+0x86/0x230
[   14.157634]  kunit_try_run_case+0x1a5/0x480
[   14.157660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.157683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.157709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.157734]  ? __kthread_parkme+0x82/0x180
[   14.157765]  ? preempt_count_sub+0x50/0x80
[   14.157790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.157815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.157840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.157866]  kthread+0x337/0x6f0
[   14.157886]  ? trace_preempt_on+0x20/0xc0
[   14.157910]  ? __pfx_kthread+0x10/0x10
[   14.157931]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.157953]  ? calculate_sigpending+0x7b/0xa0
[   14.157978]  ? __pfx_kthread+0x10/0x10
[   14.158000]  ret_from_fork+0x116/0x1d0
[   14.158020]  ? __pfx_kthread+0x10/0x10
[   14.158040]  ret_from_fork_asm+0x1a/0x30
[   14.158072]  </TASK>
[   14.158082] 
[   14.174971] Allocated by task 252:
[   14.175207]  kasan_save_stack+0x45/0x70
[   14.175672]  kasan_save_track+0x18/0x40
[   14.176027]  kasan_save_alloc_info+0x3b/0x50
[   14.176178]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.176439]  remove_element+0x11e/0x190
[   14.176827]  mempool_alloc_preallocated+0x4d/0x90
[   14.177266]  mempool_double_free_helper+0x8a/0x370
[   14.177811]  mempool_kmalloc_double_free+0xed/0x140
[   14.178268]  kunit_try_run_case+0x1a5/0x480
[   14.178713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.179117]  kthread+0x337/0x6f0
[   14.179243]  ret_from_fork+0x116/0x1d0
[   14.179590]  ret_from_fork_asm+0x1a/0x30
[   14.180004] 
[   14.180164] Freed by task 252:
[   14.180535]  kasan_save_stack+0x45/0x70
[   14.181039]  kasan_save_track+0x18/0x40
[   14.181492]  kasan_save_free_info+0x3f/0x60
[   14.181786]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.182121]  mempool_free+0x2ec/0x380
[   14.182503]  mempool_double_free_helper+0x109/0x370
[   14.182809]  mempool_kmalloc_double_free+0xed/0x140
[   14.182978]  kunit_try_run_case+0x1a5/0x480
[   14.183126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.183303]  kthread+0x337/0x6f0
[   14.183664]  ret_from_fork+0x116/0x1d0
[   14.184049]  ret_from_fork_asm+0x1a/0x30
[   14.184624] 
[   14.184836] The buggy address belongs to the object at ffff8881038e2000
[   14.184836]  which belongs to the cache kmalloc-128 of size 128
[   14.186063] The buggy address is located 0 bytes inside of
[   14.186063]  128-byte region [ffff8881038e2000, ffff8881038e2080)
[   14.187194] 
[   14.187273] The buggy address belongs to the physical page:
[   14.187794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e2
[   14.188432] flags: 0x200000000000000(node=0|zone=2)
[   14.188894] page_type: f5(slab)
[   14.189021] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.189254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.189911] page dumped because: kasan: bad access detected
[   14.190560] 
[   14.190772] Memory state around the buggy address:
[   14.191210]  ffff8881038e1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.191962]  ffff8881038e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.192502] >ffff8881038e2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.193066]                    ^
[   14.193186]  ffff8881038e2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.193559]  ffff8881038e2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.194268] ==================================================================
[   14.228898] ==================================================================
[   14.229804] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.230122] Free of addr ffff8881039c8000 by task kunit_try_catch/256
[   14.230526] 
[   14.230661] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.230706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.230717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.230739] Call Trace:
[   14.230750]  <TASK>
[   14.230777]  dump_stack_lvl+0x73/0xb0
[   14.230834]  print_report+0xd1/0x610
[   14.230857]  ? __virt_addr_valid+0x1db/0x2d0
[   14.230882]  ? kasan_addr_to_slab+0x11/0xa0
[   14.230904]  ? mempool_double_free_helper+0x184/0x370
[   14.230929]  kasan_report_invalid_free+0x10a/0x130
[   14.230956]  ? mempool_double_free_helper+0x184/0x370
[   14.230983]  ? mempool_double_free_helper+0x184/0x370
[   14.231008]  __kasan_mempool_poison_pages+0x115/0x130
[   14.231034]  mempool_free+0x290/0x380
[   14.231061]  mempool_double_free_helper+0x184/0x370
[   14.231086]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.231116]  ? finish_task_switch.isra.0+0x153/0x700
[   14.231143]  mempool_page_alloc_double_free+0xe8/0x140
[   14.231170]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.231199]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.231224]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.231251]  ? __pfx_read_tsc+0x10/0x10
[   14.231272]  ? ktime_get_ts64+0x86/0x230
[   14.231296]  kunit_try_run_case+0x1a5/0x480
[   14.231321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.231379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.231404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.231428]  ? __kthread_parkme+0x82/0x180
[   14.231456]  ? preempt_count_sub+0x50/0x80
[   14.231481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.231506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.231531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.231557]  kthread+0x337/0x6f0
[   14.231578]  ? trace_preempt_on+0x20/0xc0
[   14.231601]  ? __pfx_kthread+0x10/0x10
[   14.231622]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.231645]  ? calculate_sigpending+0x7b/0xa0
[   14.231669]  ? __pfx_kthread+0x10/0x10
[   14.231691]  ret_from_fork+0x116/0x1d0
[   14.231711]  ? __pfx_kthread+0x10/0x10
[   14.231732]  ret_from_fork_asm+0x1a/0x30
[   14.231773]  </TASK>
[   14.231783] 
[   14.241191] The buggy address belongs to the physical page:
[   14.241617] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   14.241999] flags: 0x200000000000000(node=0|zone=2)
[   14.242246] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.242742] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.243033] page dumped because: kasan: bad access detected
[   14.243225] 
[   14.243318] Memory state around the buggy address:
[   14.243839]  ffff8881039c7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.244176]  ffff8881039c7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.244497] >ffff8881039c8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.245030]                    ^
[   14.245191]  ffff8881039c8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.245608]  ffff8881039c8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.245973] ==================================================================