Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.418022] ==================================================================
[   17.418081] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.418142] Free of addr fff00000c7898000 by task kunit_try_catch/237
[   17.418353] 
[   17.418507] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.418768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.418857] Hardware name: linux,dummy-virt (DT)
[   17.418894] Call trace:
[   17.419001]  show_stack+0x20/0x38 (C)
[   17.419062]  dump_stack_lvl+0x8c/0xd0
[   17.419109]  print_report+0x118/0x5d0
[   17.419154]  kasan_report_invalid_free+0xc0/0xe8
[   17.419203]  __kasan_mempool_poison_object+0x14c/0x150
[   17.419788]  mempool_free+0x28c/0x328
[   17.419856]  mempool_double_free_helper+0x150/0x2e8
[   17.419956]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.420161]  kunit_try_run_case+0x170/0x3f0
[   17.420238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.420290]  kthread+0x328/0x630
[   17.420332]  ret_from_fork+0x10/0x20
[   17.420863] 
[   17.420918] The buggy address belongs to the physical page:
[   17.420985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107898
[   17.421052] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.421221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.421304] page_type: f8(unknown)
[   17.421387] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.421438] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.421764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.421820] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.421869] head: 0bfffe0000000002 ffffc1ffc31e2601 00000000ffffffff 00000000ffffffff
[   17.421917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.421983] page dumped because: kasan: bad access detected
[   17.422016] 
[   17.422353] Memory state around the buggy address:
[   17.422396]  fff00000c7897f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.422440]  fff00000c7897f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.422771] >fff00000c7898000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.422813]                    ^
[   17.422842]  fff00000c7898080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.422885]  fff00000c7898100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.423177] ==================================================================
[   17.432831] ==================================================================
[   17.432891] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.433410] Free of addr fff00000c7898000 by task kunit_try_catch/239
[   17.433854] 
[   17.433900] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.433982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.434010] Hardware name: linux,dummy-virt (DT)
[   17.434157] Call trace:
[   17.434185]  show_stack+0x20/0x38 (C)
[   17.434625]  dump_stack_lvl+0x8c/0xd0
[   17.434760]  print_report+0x118/0x5d0
[   17.434828]  kasan_report_invalid_free+0xc0/0xe8
[   17.435009]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.435530]  mempool_free+0x24c/0x328
[   17.435749]  mempool_double_free_helper+0x150/0x2e8
[   17.435799]  mempool_page_alloc_double_free+0xbc/0x118
[   17.435979]  kunit_try_run_case+0x170/0x3f0
[   17.436028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.436078]  kthread+0x328/0x630
[   17.436122]  ret_from_fork+0x10/0x20
[   17.436170] 
[   17.436191] The buggy address belongs to the physical page:
[   17.436514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107898
[   17.436609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.436748] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.436865] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.436970] page dumped because: kasan: bad access detected
[   17.437258] 
[   17.437374] Memory state around the buggy address:
[   17.437564]  fff00000c7897f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.437612]  fff00000c7897f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.437709] >fff00000c7898000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.437874]                    ^
[   17.437975]  fff00000c7898080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.438018]  fff00000c7898100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.438056] ==================================================================
[   17.401591] ==================================================================
[   17.401676] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.401731] Free of addr fff00000c7025500 by task kunit_try_catch/235
[   17.402207] 
[   17.402241] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.402561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.402589] Hardware name: linux,dummy-virt (DT)
[   17.402622] Call trace:
[   17.402645]  show_stack+0x20/0x38 (C)
[   17.403090]  dump_stack_lvl+0x8c/0xd0
[   17.403226]  print_report+0x118/0x5d0
[   17.403333]  kasan_report_invalid_free+0xc0/0xe8
[   17.403384]  check_slab_allocation+0xd4/0x108
[   17.403434]  __kasan_mempool_poison_object+0x78/0x150
[   17.403493]  mempool_free+0x28c/0x328
[   17.403542]  mempool_double_free_helper+0x150/0x2e8
[   17.403589]  mempool_kmalloc_double_free+0xc0/0x118
[   17.403638]  kunit_try_run_case+0x170/0x3f0
[   17.403695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.403747]  kthread+0x328/0x630
[   17.403789]  ret_from_fork+0x10/0x20
[   17.404079] 
[   17.404334] Allocated by task 235:
[   17.404437]  kasan_save_stack+0x3c/0x68
[   17.404521]  kasan_save_track+0x20/0x40
[   17.404597]  kasan_save_alloc_info+0x40/0x58
[   17.404681]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.404736]  remove_element+0x130/0x1f8
[   17.404769]  mempool_alloc_preallocated+0x58/0xc0
[   17.404807]  mempool_double_free_helper+0x94/0x2e8
[   17.404844]  mempool_kmalloc_double_free+0xc0/0x118
[   17.404884]  kunit_try_run_case+0x170/0x3f0
[   17.404922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.404999]  kthread+0x328/0x630
[   17.405032]  ret_from_fork+0x10/0x20
[   17.405113] 
[   17.405208] Freed by task 235:
[   17.405301]  kasan_save_stack+0x3c/0x68
[   17.405339]  kasan_save_track+0x20/0x40
[   17.405421]  kasan_save_free_info+0x4c/0x78
[   17.405461]  __kasan_mempool_poison_object+0xc0/0x150
[   17.405548]  mempool_free+0x28c/0x328
[   17.405882]  mempool_double_free_helper+0x100/0x2e8
[   17.406168]  mempool_kmalloc_double_free+0xc0/0x118
[   17.406210]  kunit_try_run_case+0x170/0x3f0
[   17.406249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.406293]  kthread+0x328/0x630
[   17.406703]  ret_from_fork+0x10/0x20
[   17.406754] 
[   17.407194] The buggy address belongs to the object at fff00000c7025500
[   17.407194]  which belongs to the cache kmalloc-128 of size 128
[   17.407263] The buggy address is located 0 bytes inside of
[   17.407263]  128-byte region [fff00000c7025500, fff00000c7025580)
[   17.407324] 
[   17.407354] The buggy address belongs to the physical page:
[   17.407465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107025
[   17.407589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.407648] page_type: f5(slab)
[   17.407840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.408000] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.408166] page dumped because: kasan: bad access detected
[   17.408270] 
[   17.408309] Memory state around the buggy address:
[   17.408390]  fff00000c7025400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.408433]  fff00000c7025480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.408494] >fff00000c7025500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.408637]                    ^
[   17.408674]  fff00000c7025580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.408809]  fff00000c7025600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.408847] ==================================================================

[   13.974667] ==================================================================
[   13.975169] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.975462] Free of addr ffff888102b8c000 by task kunit_try_catch/254
[   13.975768] 
[   13.975886] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.975943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.975954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.975976] Call Trace:
[   13.975988]  <TASK>
[   13.976003]  dump_stack_lvl+0x73/0xb0
[   13.976033]  print_report+0xd1/0x610
[   13.976054]  ? __virt_addr_valid+0x1db/0x2d0
[   13.976078]  ? kasan_addr_to_slab+0x11/0xa0
[   13.976097]  ? mempool_double_free_helper+0x184/0x370
[   13.976121]  kasan_report_invalid_free+0x10a/0x130
[   13.976144]  ? mempool_double_free_helper+0x184/0x370
[   13.976170]  ? mempool_double_free_helper+0x184/0x370
[   13.976191]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.976214]  mempool_free+0x2ec/0x380
[   13.976241]  mempool_double_free_helper+0x184/0x370
[   13.976265]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.976287]  ? update_load_avg+0x1be/0x21b0
[   13.976310]  ? dequeue_entities+0x27e/0x1740
[   13.976335]  ? finish_task_switch.isra.0+0x153/0x700
[   13.976359]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.976383]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.976409]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.976432]  ? __pfx_mempool_kfree+0x10/0x10
[   13.976456]  ? __pfx_read_tsc+0x10/0x10
[   13.976476]  ? ktime_get_ts64+0x86/0x230
[   13.976499]  kunit_try_run_case+0x1a5/0x480
[   13.976524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.976545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.976569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.976591]  ? __kthread_parkme+0x82/0x180
[   13.976611]  ? preempt_count_sub+0x50/0x80
[   13.976633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.976656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.976678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.976701]  kthread+0x337/0x6f0
[   13.976719]  ? recalc_sigpending+0x168/0x1f0
[   13.976743]  ? __pfx_kthread+0x10/0x10
[   13.976950]  ? calculate_sigpending+0x7b/0xa0
[   13.976973]  ? __pfx_kthread+0x10/0x10
[   13.976995]  ret_from_fork+0x116/0x1d0
[   13.977014]  ? __pfx_kthread+0x10/0x10
[   13.977033]  ret_from_fork_asm+0x1a/0x30
[   13.977064]  </TASK>
[   13.977075] 
[   13.985872] The buggy address belongs to the physical page:
[   13.986147] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b8c
[   13.986448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.986692] flags: 0x200000000000040(head|node=0|zone=2)
[   13.986967] page_type: f8(unknown)
[   13.987154] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.987492] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.987745] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.987986] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.988227] head: 0200000000000002 ffffea00040ae301 00000000ffffffff 00000000ffffffff
[   13.988568] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.989057] page dumped because: kasan: bad access detected
[   13.989331] 
[   13.989477] Memory state around the buggy address:
[   13.989705]  ffff888102b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.989976]  ffff888102b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.990296] >ffff888102b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.990623]                    ^
[   13.990826]  ffff888102b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.991057]  ffff888102b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.991274] ==================================================================
[   13.936536] ==================================================================
[   13.937110] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.937397] Free of addr ffff888102747100 by task kunit_try_catch/252
[   13.937706] 
[   13.937802] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.937845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.937856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.937878] Call Trace:
[   13.937889]  <TASK>
[   13.937915]  dump_stack_lvl+0x73/0xb0
[   13.937943]  print_report+0xd1/0x610
[   13.937964]  ? __virt_addr_valid+0x1db/0x2d0
[   13.937987]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.938007]  ? mempool_double_free_helper+0x184/0x370
[   13.938031]  kasan_report_invalid_free+0x10a/0x130
[   13.938055]  ? mempool_double_free_helper+0x184/0x370
[   13.938147]  ? mempool_double_free_helper+0x184/0x370
[   13.938183]  ? mempool_double_free_helper+0x184/0x370
[   13.938205]  check_slab_allocation+0x101/0x130
[   13.938225]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.938249]  mempool_free+0x2ec/0x380
[   13.938275]  mempool_double_free_helper+0x184/0x370
[   13.938298]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.938320]  ? update_load_avg+0x1be/0x21b0
[   13.938342]  ? update_load_avg+0x1be/0x21b0
[   13.938363]  ? update_curr+0x80/0x810
[   13.938385]  ? finish_task_switch.isra.0+0x153/0x700
[   13.938409]  mempool_kmalloc_double_free+0xed/0x140
[   13.938432]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.938458]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.938479]  ? __pfx_mempool_kfree+0x10/0x10
[   13.938503]  ? __pfx_read_tsc+0x10/0x10
[   13.938523]  ? ktime_get_ts64+0x86/0x230
[   13.938558]  kunit_try_run_case+0x1a5/0x480
[   13.938581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.938602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.938625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.938647]  ? __kthread_parkme+0x82/0x180
[   13.938666]  ? preempt_count_sub+0x50/0x80
[   13.938687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.938710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.938745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.938768]  kthread+0x337/0x6f0
[   13.938787]  ? trace_preempt_on+0x20/0xc0
[   13.938809]  ? __pfx_kthread+0x10/0x10
[   13.938829]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.938850]  ? calculate_sigpending+0x7b/0xa0
[   13.938872]  ? __pfx_kthread+0x10/0x10
[   13.938892]  ret_from_fork+0x116/0x1d0
[   13.938920]  ? __pfx_kthread+0x10/0x10
[   13.938939]  ret_from_fork_asm+0x1a/0x30
[   13.938968]  </TASK>
[   13.938978] 
[   13.951797] Allocated by task 252:
[   13.952655]  kasan_save_stack+0x45/0x70
[   13.953395]  kasan_save_track+0x18/0x40
[   13.954131]  kasan_save_alloc_info+0x3b/0x50
[   13.954879]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.955554]  remove_element+0x11e/0x190
[   13.956238]  mempool_alloc_preallocated+0x4d/0x90
[   13.957090]  mempool_double_free_helper+0x8a/0x370
[   13.957822]  mempool_kmalloc_double_free+0xed/0x140
[   13.958825]  kunit_try_run_case+0x1a5/0x480
[   13.959295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.960202]  kthread+0x337/0x6f0
[   13.960809]  ret_from_fork+0x116/0x1d0
[   13.961199]  ret_from_fork_asm+0x1a/0x30
[   13.961426] 
[   13.961527] Freed by task 252:
[   13.961686]  kasan_save_stack+0x45/0x70
[   13.961888]  kasan_save_track+0x18/0x40
[   13.962093]  kasan_save_free_info+0x3f/0x60
[   13.962302]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.962545]  mempool_free+0x2ec/0x380
[   13.962738]  mempool_double_free_helper+0x109/0x370
[   13.963213]  mempool_kmalloc_double_free+0xed/0x140
[   13.963529]  kunit_try_run_case+0x1a5/0x480
[   13.963770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.964010]  kthread+0x337/0x6f0
[   13.964183]  ret_from_fork+0x116/0x1d0
[   13.964439]  ret_from_fork_asm+0x1a/0x30
[   13.964594] 
[   13.964685] The buggy address belongs to the object at ffff888102747100
[   13.964685]  which belongs to the cache kmalloc-128 of size 128
[   13.965242] The buggy address is located 0 bytes inside of
[   13.965242]  128-byte region [ffff888102747100, ffff888102747180)
[   13.965813] 
[   13.965925] The buggy address belongs to the physical page:
[   13.966210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102747
[   13.966791] flags: 0x200000000000000(node=0|zone=2)
[   13.967077] page_type: f5(slab)
[   13.967251] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.967672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.968040] page dumped because: kasan: bad access detected
[   13.968240] 
[   13.968419] Memory state around the buggy address:
[   13.968636]  ffff888102747000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.969004]  ffff888102747080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.969302] >ffff888102747100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.969713]                    ^
[   13.969892]  ffff888102747180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.970217]  ffff888102747200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.970716] ==================================================================
[   13.996583] ==================================================================
[   13.997318] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.997684] Free of addr ffff888102b8c000 by task kunit_try_catch/256
[   13.997973] 
[   13.998058] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.998100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.998111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.998131] Call Trace:
[   13.998141]  <TASK>
[   13.998155]  dump_stack_lvl+0x73/0xb0
[   13.998181]  print_report+0xd1/0x610
[   13.998201]  ? __virt_addr_valid+0x1db/0x2d0
[   13.998225]  ? kasan_addr_to_slab+0x11/0xa0
[   13.998244]  ? mempool_double_free_helper+0x184/0x370
[   13.998267]  kasan_report_invalid_free+0x10a/0x130
[   13.998290]  ? mempool_double_free_helper+0x184/0x370
[   13.998315]  ? mempool_double_free_helper+0x184/0x370
[   13.998337]  __kasan_mempool_poison_pages+0x115/0x130
[   13.998361]  mempool_free+0x290/0x380
[   13.998387]  mempool_double_free_helper+0x184/0x370
[   13.998410]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.998434]  ? __kasan_check_write+0x18/0x20
[   13.998453]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.998473]  ? finish_task_switch.isra.0+0x153/0x700
[   13.998498]  mempool_page_alloc_double_free+0xe8/0x140
[   13.998521]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.998549]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.998571]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.998596]  ? __pfx_read_tsc+0x10/0x10
[   13.998616]  ? ktime_get_ts64+0x86/0x230
[   13.998639]  kunit_try_run_case+0x1a5/0x480
[   13.998663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.998684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.998706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.998729]  ? __kthread_parkme+0x82/0x180
[   13.998749]  ? preempt_count_sub+0x50/0x80
[   13.998771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.998794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.998816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.998839]  kthread+0x337/0x6f0
[   13.998857]  ? trace_preempt_on+0x20/0xc0
[   13.998880]  ? __pfx_kthread+0x10/0x10
[   13.998929]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.998949]  ? calculate_sigpending+0x7b/0xa0
[   13.998972]  ? __pfx_kthread+0x10/0x10
[   13.998992]  ret_from_fork+0x116/0x1d0
[   13.999008]  ? __pfx_kthread+0x10/0x10
[   13.999027]  ret_from_fork_asm+0x1a/0x30
[   13.999064]  </TASK>
[   13.999074] 
[   14.007597] The buggy address belongs to the physical page:
[   14.007871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b8c
[   14.008179] flags: 0x200000000000000(node=0|zone=2)
[   14.008407] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.008753] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.009060] page dumped because: kasan: bad access detected
[   14.009259] 
[   14.009328] Memory state around the buggy address:
[   14.009552]  ffff888102b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.009926]  ffff888102b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.010141] >ffff888102b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.010349]                    ^
[   14.010463]  ffff888102b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.010693]  ffff888102b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.011012] ==================================================================