Hay
Date
June 19, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.020704] ==================================================================
[   33.020817] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.020927] Free of addr fff00000c649db00 by task kunit_try_catch/246
[   33.020978] 
[   33.021029] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.021131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.021160] Hardware name: linux,dummy-virt (DT)
[   33.021199] Call trace:
[   33.021226]  show_stack+0x20/0x38 (C)
[   33.021288]  dump_stack_lvl+0x8c/0xd0
[   33.021345]  print_report+0x118/0x608
[   33.021402]  kasan_report_invalid_free+0xc0/0xe8
[   33.021458]  check_slab_allocation+0xd4/0x108
[   33.021513]  __kasan_mempool_poison_object+0x78/0x150
[   33.021570]  mempool_free+0x28c/0x328
[   33.021627]  mempool_double_free_helper+0x150/0x2e8
[   33.021681]  mempool_kmalloc_double_free+0xc0/0x118
[   33.021737]  kunit_try_run_case+0x170/0x3f0
[   33.021792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.021851]  kthread+0x328/0x630
[   33.024351]  ret_from_fork+0x10/0x20
[   33.024885] 
[   33.025073] Allocated by task 246:
[   33.026794]  kasan_save_stack+0x3c/0x68
[   33.032207]  kasan_save_track+0x20/0x40
[   33.032324]  kasan_save_alloc_info+0x40/0x58
[   33.032438]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.032529]  remove_element+0x130/0x1f8
[   33.032610]  mempool_alloc_preallocated+0x58/0xc0
[   33.032693]  mempool_double_free_helper+0x94/0x2e8
[   33.032779]  mempool_kmalloc_double_free+0xc0/0x118
[   33.032864]  kunit_try_run_case+0x170/0x3f0
[   33.033260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.033409]  kthread+0x328/0x630
[   33.033499]  ret_from_fork+0x10/0x20
[   33.033605] 
[   33.033901] Freed by task 246:
[   33.033979]  kasan_save_stack+0x3c/0x68
[   33.034085]  kasan_save_track+0x20/0x40
[   33.034176]  kasan_save_free_info+0x4c/0x78
[   33.034336]  __kasan_mempool_poison_object+0xc0/0x150
[   33.034500]  mempool_free+0x28c/0x328
[   33.034688]  mempool_double_free_helper+0x100/0x2e8
[   33.034799]  mempool_kmalloc_double_free+0xc0/0x118
[   33.034936]  kunit_try_run_case+0x170/0x3f0
[   33.035150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.035326]  kthread+0x328/0x630
[   33.035416]  ret_from_fork+0x10/0x20
[   33.035587] 
[   33.035638] The buggy address belongs to the object at fff00000c649db00
[   33.035638]  which belongs to the cache kmalloc-128 of size 128
[   33.035787] The buggy address is located 0 bytes inside of
[   33.035787]  128-byte region [fff00000c649db00, fff00000c649db80)
[   33.035972] 
[   33.036022] The buggy address belongs to the physical page:
[   33.036095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d
[   33.036778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.036978] page_type: f5(slab)
[   33.037107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.037230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.037333] page dumped because: kasan: bad access detected
[   33.037457] 
[   33.037496] Memory state around the buggy address:
[   33.037572]  fff00000c649da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.038019]  fff00000c649da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.038255] >fff00000c649db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.038383]                    ^
[   33.038490]  fff00000c649db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.038642]  fff00000c649dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.038986] ==================================================================
[   33.089221] ==================================================================
[   33.089392] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.090478] Free of addr fff00000c63f4000 by task kunit_try_catch/250
[   33.090584] 
[   33.090741] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.091439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.091517] Hardware name: linux,dummy-virt (DT)
[   33.091595] Call trace:
[   33.091696]  show_stack+0x20/0x38 (C)
[   33.091981]  dump_stack_lvl+0x8c/0xd0
[   33.092214]  print_report+0x118/0x608
[   33.092709]  kasan_report_invalid_free+0xc0/0xe8
[   33.092984]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.093537]  mempool_free+0x24c/0x328
[   33.093930]  mempool_double_free_helper+0x150/0x2e8
[   33.094109]  mempool_page_alloc_double_free+0xbc/0x118
[   33.094222]  kunit_try_run_case+0x170/0x3f0
[   33.094331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.094450]  kthread+0x328/0x630
[   33.094541]  ret_from_fork+0x10/0x20
[   33.094657] 
[   33.094857] The buggy address belongs to the physical page:
[   33.095068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   33.095674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.095958] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.096518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.096761] page dumped because: kasan: bad access detected
[   33.097303] 
[   33.097361] Memory state around the buggy address:
[   33.097500]  fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.097638]  fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.097765] >fff00000c63f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.097852]                    ^
[   33.097923]  fff00000c63f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.098008]  fff00000c63f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.098119] ==================================================================
[   33.062930] ==================================================================
[   33.063181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.063356] Free of addr fff00000c63f4000 by task kunit_try_catch/248
[   33.063462] 
[   33.063555] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.063775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.063843] Hardware name: linux,dummy-virt (DT)
[   33.063937] Call trace:
[   33.063995]  show_stack+0x20/0x38 (C)
[   33.064120]  dump_stack_lvl+0x8c/0xd0
[   33.064239]  print_report+0x118/0x608
[   33.064359]  kasan_report_invalid_free+0xc0/0xe8
[   33.064483]  __kasan_mempool_poison_object+0x14c/0x150
[   33.064616]  mempool_free+0x28c/0x328
[   33.064730]  mempool_double_free_helper+0x150/0x2e8
[   33.064857]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.066122]  kunit_try_run_case+0x170/0x3f0
[   33.066487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.066761]  kthread+0x328/0x630
[   33.067057]  ret_from_fork+0x10/0x20
[   33.067351] 
[   33.067405] The buggy address belongs to the physical page:
[   33.067719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4
[   33.067948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.068211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.068459] page_type: f8(unknown)
[   33.068924] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.069455] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.069719] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.069961] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.070231] head: 0bfffe0000000002 ffffc1ffc318fd01 00000000ffffffff 00000000ffffffff
[   33.071282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.071352] page dumped because: kasan: bad access detected
[   33.071397] 
[   33.071421] Memory state around the buggy address:
[   33.071477]  fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.071620]  fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.071746] >fff00000c63f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.071849]                    ^
[   33.071937]  fff00000c63f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.072038]  fff00000c63f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.072139] ==================================================================

[   29.003849] ==================================================================
[   29.004830] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   29.005792] Free of addr ffff888102afc000 by task kunit_try_catch/266
[   29.006180] 
[   29.006342] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   29.006461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.006492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.006538] Call Trace:
[   29.006560]  <TASK>
[   29.006585]  dump_stack_lvl+0x73/0xb0
[   29.006632]  print_report+0xd1/0x650
[   29.006659]  ? __virt_addr_valid+0x1db/0x2d0
[   29.006703]  ? kasan_addr_to_slab+0x11/0xa0
[   29.006737]  ? mempool_double_free_helper+0x184/0x370
[   29.006764]  kasan_report_invalid_free+0x10a/0x130
[   29.006790]  ? mempool_double_free_helper+0x184/0x370
[   29.006818]  ? mempool_double_free_helper+0x184/0x370
[   29.006842]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   29.006869]  mempool_free+0x2ec/0x380
[   29.006898]  mempool_double_free_helper+0x184/0x370
[   29.006923]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   29.006950]  ? __kasan_check_write+0x18/0x20
[   29.006975]  ? __pfx_sched_clock_cpu+0x10/0x10
[   29.006999]  ? finish_task_switch.isra.0+0x153/0x700
[   29.007028]  mempool_kmalloc_large_double_free+0xed/0x140
[   29.007052]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   29.007081]  ? __pfx_mempool_kmalloc+0x10/0x10
[   29.007309]  ? __pfx_mempool_kfree+0x10/0x10
[   29.007387]  ? __pfx_read_tsc+0x10/0x10
[   29.007429]  ? ktime_get_ts64+0x86/0x230
[   29.007475]  kunit_try_run_case+0x1a5/0x480
[   29.007529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.007578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.007632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.007681]  ? __kthread_parkme+0x82/0x180
[   29.007729]  ? preempt_count_sub+0x50/0x80
[   29.007783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.007836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.007878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.007925]  kthread+0x337/0x6f0
[   29.007980]  ? trace_preempt_on+0x20/0xc0
[   29.008045]  ? __pfx_kthread+0x10/0x10
[   29.008084]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.008160]  ? calculate_sigpending+0x7b/0xa0
[   29.008200]  ? __pfx_kthread+0x10/0x10
[   29.008235]  ret_from_fork+0x116/0x1d0
[   29.008259]  ? __pfx_kthread+0x10/0x10
[   29.008281]  ret_from_fork_asm+0x1a/0x30
[   29.008314]  </TASK>
[   29.008328] 
[   29.026056] The buggy address belongs to the physical page:
[   29.026788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc
[   29.027520] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.028273] flags: 0x200000000000040(head|node=0|zone=2)
[   29.028522] page_type: f8(unknown)
[   29.029218] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   29.030160] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.030897] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   29.031091] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.031379] head: 0200000000000002 ffffea00040abf01 00000000ffffffff 00000000ffffffff
[   29.032001] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.032447] page dumped because: kasan: bad access detected
[   29.032851] 
[   29.032968] Memory state around the buggy address:
[   29.033833]  ffff888102afbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.034681]  ffff888102afbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.035369] >ffff888102afc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.036156]                    ^
[   29.036479]  ffff888102afc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.037314]  ffff888102afc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.038078] ==================================================================
[   28.956163] ==================================================================
[   28.956940] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   28.957749] Free of addr ffff888103259800 by task kunit_try_catch/264
[   28.958417] 
[   28.958624] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   28.958746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.958773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.958819] Call Trace:
[   28.958849]  <TASK>
[   28.958890]  dump_stack_lvl+0x73/0xb0
[   28.959187]  print_report+0xd1/0x650
[   28.959234]  ? __virt_addr_valid+0x1db/0x2d0
[   28.959292]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.959364]  ? mempool_double_free_helper+0x184/0x370
[   28.959429]  kasan_report_invalid_free+0x10a/0x130
[   28.959481]  ? mempool_double_free_helper+0x184/0x370
[   28.959536]  ? mempool_double_free_helper+0x184/0x370
[   28.959587]  ? mempool_double_free_helper+0x184/0x370
[   28.959640]  check_slab_allocation+0x101/0x130
[   28.959685]  __kasan_mempool_poison_object+0x91/0x1d0
[   28.959737]  mempool_free+0x2ec/0x380
[   28.959796]  mempool_double_free_helper+0x184/0x370
[   28.959850]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   28.959933]  ? update_load_avg+0x1be/0x21b0
[   28.960193]  ? update_load_avg+0x1be/0x21b0
[   28.960223]  ? update_curr+0x80/0x810
[   28.960246]  ? __kasan_check_write+0x18/0x20
[   28.960276]  ? finish_task_switch.isra.0+0x153/0x700
[   28.960307]  mempool_kmalloc_double_free+0xed/0x140
[   28.960334]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   28.960363]  ? __pfx_mempool_kmalloc+0x10/0x10
[   28.960388]  ? __pfx_mempool_kfree+0x10/0x10
[   28.960414]  ? __pfx_read_tsc+0x10/0x10
[   28.960441]  ? ktime_get_ts64+0x86/0x230
[   28.960469]  kunit_try_run_case+0x1a5/0x480
[   28.960499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.960522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.960550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.960576]  ? __kthread_parkme+0x82/0x180
[   28.960599]  ? preempt_count_sub+0x50/0x80
[   28.960625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.960650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.960675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.960703]  kthread+0x337/0x6f0
[   28.960725]  ? trace_preempt_on+0x20/0xc0
[   28.960751]  ? __pfx_kthread+0x10/0x10
[   28.960774]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.960797]  ? calculate_sigpending+0x7b/0xa0
[   28.960824]  ? __pfx_kthread+0x10/0x10
[   28.960848]  ret_from_fork+0x116/0x1d0
[   28.960870]  ? __pfx_kthread+0x10/0x10
[   28.960892]  ret_from_fork_asm+0x1a/0x30
[   28.960927]  </TASK>
[   28.960941] 
[   28.975937] Allocated by task 264:
[   28.976536]  kasan_save_stack+0x45/0x70
[   28.977285]  kasan_save_track+0x18/0x40
[   28.977576]  kasan_save_alloc_info+0x3b/0x50
[   28.977791]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   28.978194]  remove_element+0x11e/0x190
[   28.978403]  mempool_alloc_preallocated+0x4d/0x90
[   28.978619]  mempool_double_free_helper+0x8a/0x370
[   28.979195]  mempool_kmalloc_double_free+0xed/0x140
[   28.979696]  kunit_try_run_case+0x1a5/0x480
[   28.980242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.980736]  kthread+0x337/0x6f0
[   28.981192]  ret_from_fork+0x116/0x1d0
[   28.981546]  ret_from_fork_asm+0x1a/0x30
[   28.981806] 
[   28.981975] Freed by task 264:
[   28.982471]  kasan_save_stack+0x45/0x70
[   28.982807]  kasan_save_track+0x18/0x40
[   28.983339]  kasan_save_free_info+0x3f/0x60
[   28.983692]  __kasan_mempool_poison_object+0x131/0x1d0
[   28.984256]  mempool_free+0x2ec/0x380
[   28.984491]  mempool_double_free_helper+0x109/0x370
[   28.984714]  mempool_kmalloc_double_free+0xed/0x140
[   28.985077]  kunit_try_run_case+0x1a5/0x480
[   28.985493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.986158]  kthread+0x337/0x6f0
[   28.986491]  ret_from_fork+0x116/0x1d0
[   28.986826]  ret_from_fork_asm+0x1a/0x30
[   28.987495] 
[   28.987708] The buggy address belongs to the object at ffff888103259800
[   28.987708]  which belongs to the cache kmalloc-128 of size 128
[   28.988677] The buggy address is located 0 bytes inside of
[   28.988677]  128-byte region [ffff888103259800, ffff888103259880)
[   28.989480] 
[   28.989712] The buggy address belongs to the physical page:
[   28.990321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103259
[   28.990985] flags: 0x200000000000000(node=0|zone=2)
[   28.991593] page_type: f5(slab)
[   28.991874] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.992396] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.992693] page dumped because: kasan: bad access detected
[   28.993274] 
[   28.993467] Memory state around the buggy address:
[   28.993923]  ffff888103259700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.994662]  ffff888103259780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.995417] >ffff888103259800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.996150]                    ^
[   28.996348]  ffff888103259880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.996824]  ffff888103259900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.997673] ==================================================================
[   29.045497] ==================================================================
[   29.046298] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   29.047033] Free of addr ffff888102afc000 by task kunit_try_catch/268
[   29.048038] 
[   29.048310] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT(voluntary) 
[   29.048654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.048683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.048728] Call Trace:
[   29.048752]  <TASK>
[   29.048777]  dump_stack_lvl+0x73/0xb0
[   29.048828]  print_report+0xd1/0x650
[   29.048856]  ? __virt_addr_valid+0x1db/0x2d0
[   29.048885]  ? kasan_addr_to_slab+0x11/0xa0
[   29.049062]  ? mempool_double_free_helper+0x184/0x370
[   29.049096]  kasan_report_invalid_free+0x10a/0x130
[   29.049147]  ? mempool_double_free_helper+0x184/0x370
[   29.049175]  ? mempool_double_free_helper+0x184/0x370
[   29.049199]  __kasan_mempool_poison_pages+0x115/0x130
[   29.049264]  mempool_free+0x290/0x380
[   29.049310]  mempool_double_free_helper+0x184/0x370
[   29.049351]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   29.049391]  ? __kasan_check_write+0x18/0x20
[   29.049429]  ? __pfx_sched_clock_cpu+0x10/0x10
[   29.049467]  ? finish_task_switch.isra.0+0x153/0x700
[   29.049512]  mempool_page_alloc_double_free+0xe8/0x140
[   29.049552]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   29.049595]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   29.049669]  ? __pfx_mempool_free_pages+0x10/0x10
[   29.049715]  ? __pfx_read_tsc+0x10/0x10
[   29.049741]  ? ktime_get_ts64+0x86/0x230
[   29.049770]  kunit_try_run_case+0x1a5/0x480
[   29.049799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.049823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.049849]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.049873]  ? __kthread_parkme+0x82/0x180
[   29.049897]  ? preempt_count_sub+0x50/0x80
[   29.049945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.050003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.050043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.050082]  kthread+0x337/0x6f0
[   29.050131]  ? trace_preempt_on+0x20/0xc0
[   29.050161]  ? __pfx_kthread+0x10/0x10
[   29.050184]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.050206]  ? calculate_sigpending+0x7b/0xa0
[   29.050232]  ? __pfx_kthread+0x10/0x10
[   29.050254]  ret_from_fork+0x116/0x1d0
[   29.050277]  ? __pfx_kthread+0x10/0x10
[   29.050299]  ret_from_fork_asm+0x1a/0x30
[   29.050331]  </TASK>
[   29.050345] 
[   29.065816] The buggy address belongs to the physical page:
[   29.066375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc
[   29.066942] flags: 0x200000000000000(node=0|zone=2)
[   29.067202] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   29.067426] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.067657] page dumped because: kasan: bad access detected
[   29.067844] 
[   29.067927] Memory state around the buggy address:
[   29.068152]  ffff888102afbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.068535]  ffff888102afbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.069079] >ffff888102afc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.069655]                    ^
[   29.069975]  ffff888102afc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.070660]  ffff888102afc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.071294] ==================================================================