Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.385090] ================================================================== [ 17.385148] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.385199] Free of addr fff00000c78e4000 by task kunit_try_catch/237 [ 17.385241] [ 17.385273] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.385352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.385379] Hardware name: linux,dummy-virt (DT) [ 17.385409] Call trace: [ 17.385430] show_stack+0x20/0x38 (C) [ 17.385955] dump_stack_lvl+0x8c/0xd0 [ 17.386303] print_report+0x118/0x5d0 [ 17.386355] kasan_report_invalid_free+0xc0/0xe8 [ 17.386406] __kasan_mempool_poison_object+0x14c/0x150 [ 17.386742] mempool_free+0x28c/0x328 [ 17.386872] mempool_double_free_helper+0x150/0x2e8 [ 17.387112] mempool_kmalloc_large_double_free+0xc0/0x118 [ 17.387162] kunit_try_run_case+0x170/0x3f0 [ 17.387213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.387265] kthread+0x328/0x630 [ 17.387306] ret_from_fork+0x10/0x20 [ 17.387360] [ 17.387462] The buggy address belongs to the physical page: [ 17.387513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4 [ 17.387971] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.388416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.388512] page_type: f8(unknown) [ 17.388554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.388658] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.388745] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.388793] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.388843] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff [ 17.388894] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.388935] page dumped because: kasan: bad access detected [ 17.388968] [ 17.388987] Memory state around the buggy address: [ 17.389020] fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.389091] fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.389222] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.389435] ^ [ 17.389493] fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.389545] fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.389601] ================================================================== [ 17.372716] ================================================================== [ 17.372773] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.372828] Free of addr fff00000c63ebd00 by task kunit_try_catch/235 [ 17.372908] [ 17.372956] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.373358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.373389] Hardware name: linux,dummy-virt (DT) [ 17.373422] Call trace: [ 17.373444] show_stack+0x20/0x38 (C) [ 17.373495] dump_stack_lvl+0x8c/0xd0 [ 17.373542] print_report+0x118/0x5d0 [ 17.373589] kasan_report_invalid_free+0xc0/0xe8 [ 17.373644] check_slab_allocation+0xd4/0x108 [ 17.374146] __kasan_mempool_poison_object+0x78/0x150 [ 17.374269] mempool_free+0x28c/0x328 [ 17.374351] mempool_double_free_helper+0x150/0x2e8 [ 17.374401] mempool_kmalloc_double_free+0xc0/0x118 [ 17.374476] kunit_try_run_case+0x170/0x3f0 [ 17.374539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.374592] kthread+0x328/0x630 [ 17.374699] ret_from_fork+0x10/0x20 [ 17.374748] [ 17.374766] Allocated by task 235: [ 17.374797] kasan_save_stack+0x3c/0x68 [ 17.374862] kasan_save_track+0x20/0x40 [ 17.375134] kasan_save_alloc_info+0x40/0x58 [ 17.375182] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.375244] remove_element+0x130/0x1f8 [ 17.375298] mempool_alloc_preallocated+0x58/0xc0 [ 17.375403] mempool_double_free_helper+0x94/0x2e8 [ 17.375481] mempool_kmalloc_double_free+0xc0/0x118 [ 17.375541] kunit_try_run_case+0x170/0x3f0 [ 17.375623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.375664] kthread+0x328/0x630 [ 17.375842] ret_from_fork+0x10/0x20 [ 17.375878] [ 17.375927] Freed by task 235: [ 17.376116] kasan_save_stack+0x3c/0x68 [ 17.376244] kasan_save_track+0x20/0x40 [ 17.376319] kasan_save_free_info+0x4c/0x78 [ 17.376397] __kasan_mempool_poison_object+0xc0/0x150 [ 17.376438] mempool_free+0x28c/0x328 [ 17.376473] mempool_double_free_helper+0x100/0x2e8 [ 17.376512] mempool_kmalloc_double_free+0xc0/0x118 [ 17.376550] kunit_try_run_case+0x170/0x3f0 [ 17.376587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.376638] kthread+0x328/0x630 [ 17.376669] ret_from_fork+0x10/0x20 [ 17.376716] [ 17.376735] The buggy address belongs to the object at fff00000c63ebd00 [ 17.376735] which belongs to the cache kmalloc-128 of size 128 [ 17.376796] The buggy address is located 0 bytes inside of [ 17.376796] 128-byte region [fff00000c63ebd00, fff00000c63ebd80) [ 17.376915] [ 17.376936] The buggy address belongs to the physical page: [ 17.377117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 17.377172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.377247] page_type: f5(slab) [ 17.377385] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.377543] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.377704] page dumped because: kasan: bad access detected [ 17.377737] [ 17.377756] Memory state around the buggy address: [ 17.377836] fff00000c63ebc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.377892] fff00000c63ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.377935] >fff00000c63ebd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.377974] ^ [ 17.378025] fff00000c63ebd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.378085] fff00000c63ebe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.378277] ================================================================== [ 17.400619] ================================================================== [ 17.400675] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.400741] Free of addr fff00000c78e8000 by task kunit_try_catch/239 [ 17.400783] [ 17.401035] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.401137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.401166] Hardware name: linux,dummy-virt (DT) [ 17.401195] Call trace: [ 17.401231] show_stack+0x20/0x38 (C) [ 17.401429] dump_stack_lvl+0x8c/0xd0 [ 17.401502] print_report+0x118/0x5d0 [ 17.401559] kasan_report_invalid_free+0xc0/0xe8 [ 17.401618] __kasan_mempool_poison_pages+0xe0/0xe8 [ 17.401669] mempool_free+0x24c/0x328 [ 17.401924] mempool_double_free_helper+0x150/0x2e8 [ 17.402065] mempool_page_alloc_double_free+0xbc/0x118 [ 17.402115] kunit_try_run_case+0x170/0x3f0 [ 17.402165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.402218] kthread+0x328/0x630 [ 17.402259] ret_from_fork+0x10/0x20 [ 17.402327] [ 17.402376] The buggy address belongs to the physical page: [ 17.402406] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e8 [ 17.402486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.402547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 17.402843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.403034] page dumped because: kasan: bad access detected [ 17.403189] [ 17.403208] Memory state around the buggy address: [ 17.403246] fff00000c78e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.403348] fff00000c78e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.403407] >fff00000c78e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.403446] ^ [ 17.403475] fff00000c78e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.403517] fff00000c78e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.403557] ==================================================================
[ 13.644842] ================================================================== [ 13.645775] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 13.646107] Free of addr ffff8881039b7200 by task kunit_try_catch/252 [ 13.646366] [ 13.646498] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.646544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.646555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.646577] Call Trace: [ 13.646588] <TASK> [ 13.646603] dump_stack_lvl+0x73/0xb0 [ 13.646632] print_report+0xd1/0x610 [ 13.646653] ? __virt_addr_valid+0x1db/0x2d0 [ 13.646679] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.646700] ? mempool_double_free_helper+0x184/0x370 [ 13.646723] kasan_report_invalid_free+0x10a/0x130 [ 13.646746] ? mempool_double_free_helper+0x184/0x370 [ 13.646771] ? mempool_double_free_helper+0x184/0x370 [ 13.646793] ? mempool_double_free_helper+0x184/0x370 [ 13.646815] check_slab_allocation+0x101/0x130 [ 13.646835] __kasan_mempool_poison_object+0x91/0x1d0 [ 13.646859] mempool_free+0x2ec/0x380 [ 13.646887] mempool_double_free_helper+0x184/0x370 [ 13.646910] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.646935] ? __kasan_check_write+0x18/0x20 [ 13.646953] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.646974] ? finish_task_switch.isra.0+0x153/0x700 [ 13.646999] mempool_kmalloc_double_free+0xed/0x140 [ 13.647044] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 13.647071] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.647092] ? __pfx_mempool_kfree+0x10/0x10 [ 13.647116] ? __pfx_read_tsc+0x10/0x10 [ 13.647137] ? ktime_get_ts64+0x86/0x230 [ 13.647161] kunit_try_run_case+0x1a5/0x480 [ 13.647186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.647208] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.647231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.647253] ? __kthread_parkme+0x82/0x180 [ 13.647273] ? preempt_count_sub+0x50/0x80 [ 13.647294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.647317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.647340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.647363] kthread+0x337/0x6f0 [ 13.647392] ? trace_preempt_on+0x20/0xc0 [ 13.647414] ? __pfx_kthread+0x10/0x10 [ 13.647434] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.647454] ? calculate_sigpending+0x7b/0xa0 [ 13.647477] ? __pfx_kthread+0x10/0x10 [ 13.647498] ret_from_fork+0x116/0x1d0 [ 13.647516] ? __pfx_kthread+0x10/0x10 [ 13.647536] ret_from_fork_asm+0x1a/0x30 [ 13.647565] </TASK> [ 13.647575] [ 13.660182] Allocated by task 252: [ 13.660362] kasan_save_stack+0x45/0x70 [ 13.660973] kasan_save_track+0x18/0x40 [ 13.661158] kasan_save_alloc_info+0x3b/0x50 [ 13.661728] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.662114] remove_element+0x11e/0x190 [ 13.662398] mempool_alloc_preallocated+0x4d/0x90 [ 13.662792] mempool_double_free_helper+0x8a/0x370 [ 13.662995] mempool_kmalloc_double_free+0xed/0x140 [ 13.663223] kunit_try_run_case+0x1a5/0x480 [ 13.663431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.663920] kthread+0x337/0x6f0 [ 13.664068] ret_from_fork+0x116/0x1d0 [ 13.664505] ret_from_fork_asm+0x1a/0x30 [ 13.664808] [ 13.664911] Freed by task 252: [ 13.665217] kasan_save_stack+0x45/0x70 [ 13.665426] kasan_save_track+0x18/0x40 [ 13.665764] kasan_save_free_info+0x3f/0x60 [ 13.665974] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.666215] mempool_free+0x2ec/0x380 [ 13.666721] mempool_double_free_helper+0x109/0x370 [ 13.666958] mempool_kmalloc_double_free+0xed/0x140 [ 13.667258] kunit_try_run_case+0x1a5/0x480 [ 13.667430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.667860] kthread+0x337/0x6f0 [ 13.668051] ret_from_fork+0x116/0x1d0 [ 13.668232] ret_from_fork_asm+0x1a/0x30 [ 13.668667] [ 13.668841] The buggy address belongs to the object at ffff8881039b7200 [ 13.668841] which belongs to the cache kmalloc-128 of size 128 [ 13.669427] The buggy address is located 0 bytes inside of [ 13.669427] 128-byte region [ffff8881039b7200, ffff8881039b7280) [ 13.670185] [ 13.670283] The buggy address belongs to the physical page: [ 13.670611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b7 [ 13.671111] flags: 0x200000000000000(node=0|zone=2) [ 13.671325] page_type: f5(slab) [ 13.671793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.672176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.672715] page dumped because: kasan: bad access detected [ 13.672976] [ 13.673081] Memory state around the buggy address: [ 13.673269] ffff8881039b7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.673587] ffff8881039b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.674158] >ffff8881039b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.674598] ^ [ 13.674749] ffff8881039b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.675049] ffff8881039b7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.675375] ================================================================== [ 13.678357] ================================================================== [ 13.679550] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 13.679887] Free of addr ffff8881039f8000 by task kunit_try_catch/254 [ 13.680189] [ 13.680298] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.680342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.680353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.680374] Call Trace: [ 13.680385] <TASK> [ 13.680399] dump_stack_lvl+0x73/0xb0 [ 13.680427] print_report+0xd1/0x610 [ 13.680448] ? __virt_addr_valid+0x1db/0x2d0 [ 13.680471] ? kasan_addr_to_slab+0x11/0xa0 [ 13.680490] ? mempool_double_free_helper+0x184/0x370 [ 13.680513] kasan_report_invalid_free+0x10a/0x130 [ 13.680537] ? mempool_double_free_helper+0x184/0x370 [ 13.680563] ? mempool_double_free_helper+0x184/0x370 [ 13.680584] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 13.680608] mempool_free+0x2ec/0x380 [ 13.680634] mempool_double_free_helper+0x184/0x370 [ 13.680657] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.680682] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.680703] ? finish_task_switch.isra.0+0x153/0x700 [ 13.680728] mempool_kmalloc_large_double_free+0xed/0x140 [ 13.680752] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 13.680779] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.680800] ? __pfx_mempool_kfree+0x10/0x10 [ 13.680824] ? __pfx_read_tsc+0x10/0x10 [ 13.680844] ? ktime_get_ts64+0x86/0x230 [ 13.680867] kunit_try_run_case+0x1a5/0x480 [ 13.680890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.680912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.680934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.680957] ? __kthread_parkme+0x82/0x180 [ 13.680982] ? preempt_count_sub+0x50/0x80 [ 13.681013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.681037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.681058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.681081] kthread+0x337/0x6f0 [ 13.681100] ? trace_preempt_on+0x20/0xc0 [ 13.681121] ? __pfx_kthread+0x10/0x10 [ 13.681141] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.681162] ? calculate_sigpending+0x7b/0xa0 [ 13.681186] ? __pfx_kthread+0x10/0x10 [ 13.681206] ret_from_fork+0x116/0x1d0 [ 13.681223] ? __pfx_kthread+0x10/0x10 [ 13.681242] ret_from_fork_asm+0x1a/0x30 [ 13.681271] </TASK> [ 13.681281] [ 13.689526] The buggy address belongs to the physical page: [ 13.689788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f8 [ 13.690151] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.690577] flags: 0x200000000000040(head|node=0|zone=2) [ 13.690755] page_type: f8(unknown) [ 13.690909] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.691266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.691627] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.691905] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.692147] head: 0200000000000002 ffffea00040e7e01 00000000ffffffff 00000000ffffffff [ 13.692380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.692795] page dumped because: kasan: bad access detected [ 13.693067] [ 13.693161] Memory state around the buggy address: [ 13.693383] ffff8881039f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.693702] ffff8881039f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.694031] >ffff8881039f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.694246] ^ [ 13.694364] ffff8881039f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.695088] ffff8881039f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.695370] ================================================================== [ 13.699946] ================================================================== [ 13.700486] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 13.700879] Free of addr ffff8881039f8000 by task kunit_try_catch/256 [ 13.701192] [ 13.701298] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.701343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.701355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.701377] Call Trace: [ 13.701388] <TASK> [ 13.701403] dump_stack_lvl+0x73/0xb0 [ 13.701432] print_report+0xd1/0x610 [ 13.701453] ? __virt_addr_valid+0x1db/0x2d0 [ 13.701477] ? kasan_addr_to_slab+0x11/0xa0 [ 13.701495] ? mempool_double_free_helper+0x184/0x370 [ 13.701519] kasan_report_invalid_free+0x10a/0x130 [ 13.701543] ? mempool_double_free_helper+0x184/0x370 [ 13.701568] ? mempool_double_free_helper+0x184/0x370 [ 13.701590] __kasan_mempool_poison_pages+0x115/0x130 [ 13.701614] mempool_free+0x290/0x380 [ 13.701640] mempool_double_free_helper+0x184/0x370 [ 13.701662] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.701687] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.701709] ? finish_task_switch.isra.0+0x153/0x700 [ 13.701733] mempool_page_alloc_double_free+0xe8/0x140 [ 13.701757] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 13.701782] ? __kasan_check_write+0x18/0x20 [ 13.701802] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 13.701824] ? __pfx_mempool_free_pages+0x10/0x10 [ 13.701849] ? __pfx_read_tsc+0x10/0x10 [ 13.701869] ? ktime_get_ts64+0x86/0x230 [ 13.701889] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.701915] kunit_try_run_case+0x1a5/0x480 [ 13.701940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.701963] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.701988] ? __kthread_parkme+0x82/0x180 [ 13.702018] ? preempt_count_sub+0x50/0x80 [ 13.702040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.702085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.702107] kthread+0x337/0x6f0 [ 13.702125] ? trace_preempt_on+0x20/0xc0 [ 13.702147] ? __pfx_kthread+0x10/0x10 [ 13.702167] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.702187] ? calculate_sigpending+0x7b/0xa0 [ 13.702210] ? __pfx_kthread+0x10/0x10 [ 13.702231] ret_from_fork+0x116/0x1d0 [ 13.702249] ? __pfx_kthread+0x10/0x10 [ 13.702269] ret_from_fork_asm+0x1a/0x30 [ 13.702300] </TASK> [ 13.702310] [ 13.710488] The buggy address belongs to the physical page: [ 13.710667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f8 [ 13.711346] flags: 0x200000000000000(node=0|zone=2) [ 13.711646] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 13.712030] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.712326] page dumped because: kasan: bad access detected [ 13.712770] [ 13.712842] Memory state around the buggy address: [ 13.713074] ffff8881039f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.713389] ffff8881039f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.713695] >ffff8881039f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.713986] ^ [ 13.714136] ffff8881039f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.714465] ffff8881039f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.714794] ==================================================================