Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.004035] ================================================================== [ 20.004088] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.004141] Free of addr fff00000c7868000 by task kunit_try_catch/237 [ 20.004198] [ 20.004228] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.004311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.004337] Hardware name: linux,dummy-virt (DT) [ 20.004368] Call trace: [ 20.004390] show_stack+0x20/0x38 (C) [ 20.004440] dump_stack_lvl+0x8c/0xd0 [ 20.004486] print_report+0x118/0x608 [ 20.004532] kasan_report_invalid_free+0xc0/0xe8 [ 20.004581] __kasan_mempool_poison_object+0x14c/0x150 [ 20.004633] mempool_free+0x28c/0x328 [ 20.004680] mempool_double_free_helper+0x150/0x2e8 [ 20.004728] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.004778] kunit_try_run_case+0x170/0x3f0 [ 20.004823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.004874] kthread+0x328/0x630 [ 20.004919] ret_from_fork+0x10/0x20 [ 20.004964] [ 20.004984] The buggy address belongs to the physical page: [ 20.005016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 20.005069] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.005115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.005199] page_type: f8(unknown) [ 20.005239] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.005286] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.005344] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.005394] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.005443] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff [ 20.005492] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.005532] page dumped because: kasan: bad access detected [ 20.005570] [ 20.005588] Memory state around the buggy address: [ 20.005627] fff00000c7867f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.005681] fff00000c7867f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.005723] >fff00000c7868000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.005759] ^ [ 20.005785] fff00000c7868080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.005826] fff00000c7868100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.005864] ================================================================== [ 20.012327] ================================================================== [ 20.012447] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.012506] Free of addr fff00000c786c000 by task kunit_try_catch/239 [ 20.012600] [ 20.012679] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.012792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.012820] Hardware name: linux,dummy-virt (DT) [ 20.012869] Call trace: [ 20.012901] show_stack+0x20/0x38 (C) [ 20.012952] dump_stack_lvl+0x8c/0xd0 [ 20.012998] print_report+0x118/0x608 [ 20.013044] kasan_report_invalid_free+0xc0/0xe8 [ 20.013197] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.013298] mempool_free+0x24c/0x328 [ 20.013385] mempool_double_free_helper+0x150/0x2e8 [ 20.013436] mempool_page_alloc_double_free+0xbc/0x118 [ 20.013486] kunit_try_run_case+0x170/0x3f0 [ 20.013533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.013584] kthread+0x328/0x630 [ 20.013630] ret_from_fork+0x10/0x20 [ 20.013772] [ 20.013855] The buggy address belongs to the physical page: [ 20.013926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 20.014007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.014102] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.014215] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.014276] page dumped because: kasan: bad access detected [ 20.014320] [ 20.014338] Memory state around the buggy address: [ 20.014371] fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014414] fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014456] >fff00000c786c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014599] ^ [ 20.014669] fff00000c786c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.014847] fff00000c786c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.015016] ================================================================== [ 19.993797] ================================================================== [ 19.993932] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.994098] Free of addr fff00000c1729100 by task kunit_try_catch/235 [ 19.994264] [ 19.994333] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 19.994425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.994473] Hardware name: linux,dummy-virt (DT) [ 19.994502] Call trace: [ 19.994531] show_stack+0x20/0x38 (C) [ 19.994581] dump_stack_lvl+0x8c/0xd0 [ 19.994629] print_report+0x118/0x608 [ 19.994674] kasan_report_invalid_free+0xc0/0xe8 [ 19.994729] check_slab_allocation+0xd4/0x108 [ 19.994775] __kasan_mempool_poison_object+0x78/0x150 [ 19.994827] mempool_free+0x28c/0x328 [ 19.994874] mempool_double_free_helper+0x150/0x2e8 [ 19.994922] mempool_kmalloc_double_free+0xc0/0x118 [ 19.994970] kunit_try_run_case+0x170/0x3f0 [ 19.995016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.995068] kthread+0x328/0x630 [ 19.995112] ret_from_fork+0x10/0x20 [ 19.995167] [ 19.995188] Allocated by task 235: [ 19.995215] kasan_save_stack+0x3c/0x68 [ 19.995255] kasan_save_track+0x20/0x40 [ 19.995292] kasan_save_alloc_info+0x40/0x58 [ 19.995331] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.995371] remove_element+0x130/0x1f8 [ 19.995417] mempool_alloc_preallocated+0x58/0xc0 [ 19.995470] mempool_double_free_helper+0x94/0x2e8 [ 19.995572] mempool_kmalloc_double_free+0xc0/0x118 [ 19.995671] kunit_try_run_case+0x170/0x3f0 [ 19.995744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.995861] kthread+0x328/0x630 [ 19.995940] ret_from_fork+0x10/0x20 [ 19.996008] [ 19.996072] Freed by task 235: [ 19.996099] kasan_save_stack+0x3c/0x68 [ 19.996379] kasan_save_track+0x20/0x40 [ 19.996480] kasan_save_free_info+0x4c/0x78 [ 19.996581] __kasan_mempool_poison_object+0xc0/0x150 [ 19.996633] mempool_free+0x28c/0x328 [ 19.996670] mempool_double_free_helper+0x100/0x2e8 [ 19.996709] mempool_kmalloc_double_free+0xc0/0x118 [ 19.996757] kunit_try_run_case+0x170/0x3f0 [ 19.996801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.996842] kthread+0x328/0x630 [ 19.996886] ret_from_fork+0x10/0x20 [ 19.996927] [ 19.996945] The buggy address belongs to the object at fff00000c1729100 [ 19.996945] which belongs to the cache kmalloc-128 of size 128 [ 19.997013] The buggy address is located 0 bytes inside of [ 19.997013] 128-byte region [fff00000c1729100, fff00000c1729180) [ 19.997069] [ 19.997098] The buggy address belongs to the physical page: [ 19.997128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101729 [ 19.997188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.997236] page_type: f5(slab) [ 19.997275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.997324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.997364] page dumped because: kasan: bad access detected [ 19.997395] [ 19.997412] Memory state around the buggy address: [ 19.997443] fff00000c1729000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.997486] fff00000c1729080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997527] >fff00000c1729100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.997564] ^ [ 19.997589] fff00000c1729180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997630] fff00000c1729200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.997669] ==================================================================
[ 15.926734] ================================================================== [ 15.927173] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 15.927724] Free of addr ffff8881029a4000 by task kunit_try_catch/255 [ 15.928017] [ 15.928760] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.928916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.928946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.929115] Call Trace: [ 15.929153] <TASK> [ 15.929187] dump_stack_lvl+0x73/0xb0 [ 15.929254] print_report+0xd1/0x650 [ 15.929283] ? __virt_addr_valid+0x1db/0x2d0 [ 15.929311] ? kasan_addr_to_slab+0x11/0xa0 [ 15.929333] ? mempool_double_free_helper+0x184/0x370 [ 15.929359] kasan_report_invalid_free+0x10a/0x130 [ 15.929385] ? mempool_double_free_helper+0x184/0x370 [ 15.929413] ? mempool_double_free_helper+0x184/0x370 [ 15.929436] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 15.929482] mempool_free+0x2ec/0x380 [ 15.929524] mempool_double_free_helper+0x184/0x370 [ 15.929562] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 15.929609] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.929635] ? finish_task_switch.isra.0+0x153/0x700 [ 15.929664] mempool_kmalloc_large_double_free+0xed/0x140 [ 15.929690] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 15.929717] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.929735] ? __pfx_mempool_kfree+0x10/0x10 [ 15.929756] ? __pfx_read_tsc+0x10/0x10 [ 15.929778] ? ktime_get_ts64+0x86/0x230 [ 15.929803] kunit_try_run_case+0x1a5/0x480 [ 15.929828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.929872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.929893] ? __kthread_parkme+0x82/0x180 [ 15.929914] ? preempt_count_sub+0x50/0x80 [ 15.929937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.929981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.930002] kthread+0x337/0x6f0 [ 15.930020] ? trace_preempt_on+0x20/0xc0 [ 15.930045] ? __pfx_kthread+0x10/0x10 [ 15.930065] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.930085] ? calculate_sigpending+0x7b/0xa0 [ 15.930109] ? __pfx_kthread+0x10/0x10 [ 15.930130] ret_from_fork+0x116/0x1d0 [ 15.930148] ? __pfx_kthread+0x10/0x10 [ 15.930167] ret_from_fork_asm+0x1a/0x30 [ 15.930199] </TASK> [ 15.930212] [ 15.941314] The buggy address belongs to the physical page: [ 15.941717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 15.942478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.942803] flags: 0x200000000000040(head|node=0|zone=2) [ 15.943577] page_type: f8(unknown) [ 15.943759] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.944410] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.944852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.945314] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.945460] head: 0200000000000002 ffffea00040a6901 00000000ffffffff 00000000ffffffff [ 15.945591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.946789] page dumped because: kasan: bad access detected [ 15.947127] [ 15.947307] Memory state around the buggy address: [ 15.947633] ffff8881029a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.947873] ffff8881029a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.948192] >ffff8881029a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.948644] ^ [ 15.948908] ffff8881029a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.949197] ffff8881029a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.949491] ================================================================== [ 15.883059] ================================================================== [ 15.883536] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 15.884485] Free of addr ffff88810231a600 by task kunit_try_catch/253 [ 15.884924] [ 15.885658] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.885728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.885741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.885764] Call Trace: [ 15.885780] <TASK> [ 15.885802] dump_stack_lvl+0x73/0xb0 [ 15.885838] print_report+0xd1/0x650 [ 15.885862] ? __virt_addr_valid+0x1db/0x2d0 [ 15.885886] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.885907] ? mempool_double_free_helper+0x184/0x370 [ 15.885929] kasan_report_invalid_free+0x10a/0x130 [ 15.885952] ? mempool_double_free_helper+0x184/0x370 [ 15.885976] ? mempool_double_free_helper+0x184/0x370 [ 15.885998] ? mempool_double_free_helper+0x184/0x370 [ 15.886020] check_slab_allocation+0x101/0x130 [ 15.886041] __kasan_mempool_poison_object+0x91/0x1d0 [ 15.886064] mempool_free+0x2ec/0x380 [ 15.886088] mempool_double_free_helper+0x184/0x370 [ 15.886111] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 15.886136] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.886156] ? irqentry_exit+0x2a/0x60 [ 15.886177] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.886201] mempool_kmalloc_double_free+0xed/0x140 [ 15.886244] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 15.886287] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.886318] ? __pfx_mempool_kfree+0x10/0x10 [ 15.886369] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 15.886418] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 15.886460] kunit_try_run_case+0x1a5/0x480 [ 15.886514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.886586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.886621] ? __kthread_parkme+0x82/0x180 [ 15.886657] ? preempt_count_sub+0x50/0x80 [ 15.886695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.886732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.886768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.886805] kthread+0x337/0x6f0 [ 15.886837] ? trace_preempt_on+0x20/0xc0 [ 15.886875] ? __pfx_kthread+0x10/0x10 [ 15.886908] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.886943] ? calculate_sigpending+0x7b/0xa0 [ 15.886979] ? __pfx_kthread+0x10/0x10 [ 15.887014] ret_from_fork+0x116/0x1d0 [ 15.887052] ? __pfx_kthread+0x10/0x10 [ 15.887090] ret_from_fork_asm+0x1a/0x30 [ 15.887151] </TASK> [ 15.887167] [ 15.900713] Allocated by task 253: [ 15.901649] kasan_save_stack+0x45/0x70 [ 15.902016] kasan_save_track+0x18/0x40 [ 15.902174] kasan_save_alloc_info+0x3b/0x50 [ 15.902336] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 15.902862] remove_element+0x11e/0x190 [ 15.903139] mempool_alloc_preallocated+0x4d/0x90 [ 15.903400] mempool_double_free_helper+0x8a/0x370 [ 15.904624] mempool_kmalloc_double_free+0xed/0x140 [ 15.905046] kunit_try_run_case+0x1a5/0x480 [ 15.905319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.905862] kthread+0x337/0x6f0 [ 15.906096] ret_from_fork+0x116/0x1d0 [ 15.906268] ret_from_fork_asm+0x1a/0x30 [ 15.906512] [ 15.906743] Freed by task 253: [ 15.907178] kasan_save_stack+0x45/0x70 [ 15.907738] kasan_save_track+0x18/0x40 [ 15.908204] kasan_save_free_info+0x3f/0x60 [ 15.908504] __kasan_mempool_poison_object+0x131/0x1d0 [ 15.909081] mempool_free+0x2ec/0x380 [ 15.909284] mempool_double_free_helper+0x109/0x370 [ 15.909697] mempool_kmalloc_double_free+0xed/0x140 [ 15.909912] kunit_try_run_case+0x1a5/0x480 [ 15.910560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.910865] kthread+0x337/0x6f0 [ 15.911135] ret_from_fork+0x116/0x1d0 [ 15.911363] ret_from_fork_asm+0x1a/0x30 [ 15.912133] [ 15.912258] The buggy address belongs to the object at ffff88810231a600 [ 15.912258] which belongs to the cache kmalloc-128 of size 128 [ 15.912908] The buggy address is located 0 bytes inside of [ 15.912908] 128-byte region [ffff88810231a600, ffff88810231a680) [ 15.913479] [ 15.913651] The buggy address belongs to the physical page: [ 15.913945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10231a [ 15.914435] flags: 0x200000000000000(node=0|zone=2) [ 15.914920] page_type: f5(slab) [ 15.915111] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.915388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.916319] page dumped because: kasan: bad access detected [ 15.916903] [ 15.917074] Memory state around the buggy address: [ 15.917431] ffff88810231a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.918079] ffff88810231a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.918681] >ffff88810231a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.918947] ^ [ 15.919238] ffff88810231a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.920079] ffff88810231a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.920558] ================================================================== [ 15.954383] ================================================================== [ 15.955523] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 15.956218] Free of addr ffff888103c2c000 by task kunit_try_catch/257 [ 15.956461] [ 15.956648] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 15.956706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.956719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.956742] Call Trace: [ 15.956758] <TASK> [ 15.956778] dump_stack_lvl+0x73/0xb0 [ 15.956812] print_report+0xd1/0x650 [ 15.956836] ? __virt_addr_valid+0x1db/0x2d0 [ 15.956862] ? kasan_addr_to_slab+0x11/0xa0 [ 15.956882] ? mempool_double_free_helper+0x184/0x370 [ 15.956906] kasan_report_invalid_free+0x10a/0x130 [ 15.956929] ? mempool_double_free_helper+0x184/0x370 [ 15.956955] ? mempool_double_free_helper+0x184/0x370 [ 15.956977] __kasan_mempool_poison_pages+0x115/0x130 [ 15.957001] mempool_free+0x290/0x380 [ 15.957024] mempool_double_free_helper+0x184/0x370 [ 15.957048] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 15.957073] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.957095] ? finish_task_switch.isra.0+0x153/0x700 [ 15.957121] mempool_page_alloc_double_free+0xe8/0x140 [ 15.957145] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 15.957171] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 15.957189] ? __pfx_mempool_free_pages+0x10/0x10 [ 15.957210] ? __pfx_read_tsc+0x10/0x10 [ 15.957271] ? ktime_get_ts64+0x86/0x230 [ 15.957300] kunit_try_run_case+0x1a5/0x480 [ 15.957327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.957371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.957395] ? __kthread_parkme+0x82/0x180 [ 15.957425] ? preempt_count_sub+0x50/0x80 [ 15.957470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.957553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.958015] kthread+0x337/0x6f0 [ 15.958086] ? trace_preempt_on+0x20/0xc0 [ 15.958133] ? __pfx_kthread+0x10/0x10 [ 15.958170] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.958207] ? calculate_sigpending+0x7b/0xa0 [ 15.958263] ? __pfx_kthread+0x10/0x10 [ 15.958356] ret_from_fork+0x116/0x1d0 [ 15.958397] ? __pfx_kthread+0x10/0x10 [ 15.958437] ret_from_fork_asm+0x1a/0x30 [ 15.958713] </TASK> [ 15.958761] [ 15.971285] The buggy address belongs to the physical page: [ 15.971827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c2c [ 15.972447] flags: 0x200000000000000(node=0|zone=2) [ 15.973039] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 15.973426] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.974164] page dumped because: kasan: bad access detected [ 15.974560] [ 15.974672] Memory state around the buggy address: [ 15.975164] ffff888103c2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.975617] ffff888103c2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.975998] >ffff888103c2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.976295] ^ [ 15.976515] ffff888103c2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.976854] ffff888103c2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.977173] ==================================================================