Hay
Date
June 25, 2025, 8:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   28.753371] ==================================================================
[   28.753458] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.753528] Free of addr fff00000c79f0000 by task kunit_try_catch/249
[   28.753610] 
[   28.753647] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.753733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.753758] Hardware name: linux,dummy-virt (DT)
[   28.753791] Call trace:
[   28.753813]  show_stack+0x20/0x38 (C)
[   28.753864]  dump_stack_lvl+0x8c/0xd0
[   28.753910]  print_report+0x118/0x608
[   28.753957]  kasan_report_invalid_free+0xc0/0xe8
[   28.754009]  __kasan_mempool_poison_object+0x14c/0x150
[   28.755332]  mempool_free+0x28c/0x328
[   28.755545]  mempool_double_free_helper+0x150/0x2e8
[   28.755708]  mempool_kmalloc_large_double_free+0xc0/0x118
[   28.756213]  kunit_try_run_case+0x170/0x3f0
[   28.756293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.756660]  kthread+0x328/0x630
[   28.756713]  ret_from_fork+0x10/0x20
[   28.757318] 
[   28.757346] The buggy address belongs to the physical page:
[   28.757492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   28.757876] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.758160] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.758249] page_type: f8(unknown)
[   28.758591] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.758930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.759185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.759261] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.759620] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff
[   28.759909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.759954] page dumped because: kasan: bad access detected
[   28.759986] 
[   28.760529] Memory state around the buggy address:
[   28.760576]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.760875]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761087] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761170]                    ^
[   28.761326]  fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761423]  fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.761463] ==================================================================
[   28.776641] ==================================================================
[   28.778139] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.778444] Free of addr fff00000c79f4000 by task kunit_try_catch/251
[   28.778488] 
[   28.778526] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.778610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.778637] Hardware name: linux,dummy-virt (DT)
[   28.778987] Call trace:
[   28.779013]  show_stack+0x20/0x38 (C)
[   28.779088]  dump_stack_lvl+0x8c/0xd0
[   28.779356]  print_report+0x118/0x608
[   28.779417]  kasan_report_invalid_free+0xc0/0xe8
[   28.779465]  __kasan_mempool_poison_pages+0xe0/0xe8
[   28.779518]  mempool_free+0x24c/0x328
[   28.779564]  mempool_double_free_helper+0x150/0x2e8
[   28.779615]  mempool_page_alloc_double_free+0xbc/0x118
[   28.780279]  kunit_try_run_case+0x170/0x3f0
[   28.780484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.780596]  kthread+0x328/0x630
[   28.780828]  ret_from_fork+0x10/0x20
[   28.781010] 
[   28.781036] The buggy address belongs to the physical page:
[   28.781067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f4
[   28.781365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.781443] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.781493] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.781534] page dumped because: kasan: bad access detected
[   28.781564] 
[   28.781585] Memory state around the buggy address:
[   28.782109]  fff00000c79f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782190]  fff00000c79f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782234] >fff00000c79f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782389]                    ^
[   28.782488]  fff00000c79f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782642]  fff00000c79f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.782853] ==================================================================
[   28.722931] ==================================================================
[   28.722996] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.723053] Free of addr fff00000c786a400 by task kunit_try_catch/247
[   28.723094] 
[   28.723126] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   28.723460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.723552] Hardware name: linux,dummy-virt (DT)
[   28.723583] Call trace:
[   28.723606]  show_stack+0x20/0x38 (C)
[   28.723910]  dump_stack_lvl+0x8c/0xd0
[   28.724134]  print_report+0x118/0x608
[   28.724241]  kasan_report_invalid_free+0xc0/0xe8
[   28.724295]  check_slab_allocation+0xd4/0x108
[   28.724343]  __kasan_mempool_poison_object+0x78/0x150
[   28.724407]  mempool_free+0x28c/0x328
[   28.724798]  mempool_double_free_helper+0x150/0x2e8
[   28.724915]  mempool_kmalloc_double_free+0xc0/0x118
[   28.725386]  kunit_try_run_case+0x170/0x3f0
[   28.725597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.726095]  kthread+0x328/0x630
[   28.726720]  ret_from_fork+0x10/0x20
[   28.727044] 
[   28.727123] Allocated by task 247:
[   28.727425]  kasan_save_stack+0x3c/0x68
[   28.727472]  kasan_save_track+0x20/0x40
[   28.727937]  kasan_save_alloc_info+0x40/0x58
[   28.727986]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.728352]  remove_element+0x130/0x1f8
[   28.728428]  mempool_alloc_preallocated+0x58/0xc0
[   28.728467]  mempool_double_free_helper+0x94/0x2e8
[   28.728659]  mempool_kmalloc_double_free+0xc0/0x118
[   28.728886]  kunit_try_run_case+0x170/0x3f0
[   28.728923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.728967]  kthread+0x328/0x630
[   28.728998]  ret_from_fork+0x10/0x20
[   28.729034] 
[   28.729053] Freed by task 247:
[   28.729079]  kasan_save_stack+0x3c/0x68
[   28.729121]  kasan_save_track+0x20/0x40
[   28.729951]  kasan_save_free_info+0x4c/0x78
[   28.730000]  __kasan_mempool_poison_object+0xc0/0x150
[   28.730041]  mempool_free+0x28c/0x328
[   28.730746]  mempool_double_free_helper+0x100/0x2e8
[   28.730908]  mempool_kmalloc_double_free+0xc0/0x118
[   28.731046]  kunit_try_run_case+0x170/0x3f0
[   28.731082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.731127]  kthread+0x328/0x630
[   28.731511]  ret_from_fork+0x10/0x20
[   28.731548] 
[   28.732052] The buggy address belongs to the object at fff00000c786a400
[   28.732052]  which belongs to the cache kmalloc-128 of size 128
[   28.732129] The buggy address is located 0 bytes inside of
[   28.732129]  128-byte region [fff00000c786a400, fff00000c786a480)
[   28.732638] 
[   28.732664] The buggy address belongs to the physical page:
[   28.732699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a
[   28.732991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.733047] page_type: f5(slab)
[   28.733088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.733452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.733690] page dumped because: kasan: bad access detected
[   28.733869] 
[   28.733923] Memory state around the buggy address:
[   28.734130]  fff00000c786a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.734283]  fff00000c786a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.734468] >fff00000c786a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.734782]                    ^
[   28.734835]  fff00000c786a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.735187]  fff00000c786a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.735230] ==================================================================

[   23.486724] ==================================================================
[   23.487373] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.487663] Free of addr ffff888102597700 by task kunit_try_catch/264
[   23.487916] 
[   23.488095] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.488147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.488160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.488181] Call Trace:
[   23.488195]  <TASK>
[   23.488211]  dump_stack_lvl+0x73/0xb0
[   23.488239]  print_report+0xd1/0x650
[   23.488260]  ? __virt_addr_valid+0x1db/0x2d0
[   23.488286]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.488310]  ? mempool_double_free_helper+0x184/0x370
[   23.488340]  kasan_report_invalid_free+0x10a/0x130
[   23.488364]  ? mempool_double_free_helper+0x184/0x370
[   23.488388]  ? mempool_double_free_helper+0x184/0x370
[   23.488409]  ? mempool_double_free_helper+0x184/0x370
[   23.488430]  check_slab_allocation+0x101/0x130
[   23.488450]  __kasan_mempool_poison_object+0x91/0x1d0
[   23.488473]  mempool_free+0x2ec/0x380
[   23.488498]  mempool_double_free_helper+0x184/0x370
[   23.488520]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.488541]  ? update_load_avg+0x1be/0x21b0
[   23.488568]  ? finish_task_switch.isra.0+0x153/0x700
[   23.488593]  mempool_kmalloc_double_free+0xed/0x140
[   23.488615]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   23.488640]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.488661]  ? __pfx_mempool_kfree+0x10/0x10
[   23.488685]  ? __pfx_read_tsc+0x10/0x10
[   23.488706]  ? ktime_get_ts64+0x86/0x230
[   23.488731]  kunit_try_run_case+0x1a5/0x480
[   23.488757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.488779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.488800]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.488825]  ? __kthread_parkme+0x82/0x180
[   23.488844]  ? preempt_count_sub+0x50/0x80
[   23.488867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.488929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.488966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.488989]  kthread+0x337/0x6f0
[   23.489007]  ? trace_preempt_on+0x20/0xc0
[   23.489032]  ? __pfx_kthread+0x10/0x10
[   23.489051]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.489073]  ? calculate_sigpending+0x7b/0xa0
[   23.489096]  ? __pfx_kthread+0x10/0x10
[   23.489116]  ret_from_fork+0x116/0x1d0
[   23.489134]  ? __pfx_kthread+0x10/0x10
[   23.489153]  ret_from_fork_asm+0x1a/0x30
[   23.489183]  </TASK>
[   23.489194] 
[   23.498829] Allocated by task 264:
[   23.498984]  kasan_save_stack+0x45/0x70
[   23.499167]  kasan_save_track+0x18/0x40
[   23.499451]  kasan_save_alloc_info+0x3b/0x50
[   23.499998]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.500479]  remove_element+0x11e/0x190
[   23.500753]  mempool_alloc_preallocated+0x4d/0x90
[   23.501034]  mempool_double_free_helper+0x8a/0x370
[   23.501597]  mempool_kmalloc_double_free+0xed/0x140
[   23.501908]  kunit_try_run_case+0x1a5/0x480
[   23.502356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.502726]  kthread+0x337/0x6f0
[   23.503010]  ret_from_fork+0x116/0x1d0
[   23.503232]  ret_from_fork_asm+0x1a/0x30
[   23.503607] 
[   23.503824] Freed by task 264:
[   23.504154]  kasan_save_stack+0x45/0x70
[   23.504344]  kasan_save_track+0x18/0x40
[   23.504512]  kasan_save_free_info+0x3f/0x60
[   23.504689]  __kasan_mempool_poison_object+0x131/0x1d0
[   23.505241]  mempool_free+0x2ec/0x380
[   23.505543]  mempool_double_free_helper+0x109/0x370
[   23.505968]  mempool_kmalloc_double_free+0xed/0x140
[   23.506445]  kunit_try_run_case+0x1a5/0x480
[   23.506658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.507047]  kthread+0x337/0x6f0
[   23.507347]  ret_from_fork+0x116/0x1d0
[   23.507539]  ret_from_fork_asm+0x1a/0x30
[   23.507716] 
[   23.507801] The buggy address belongs to the object at ffff888102597700
[   23.507801]  which belongs to the cache kmalloc-128 of size 128
[   23.508819] The buggy address is located 0 bytes inside of
[   23.508819]  128-byte region [ffff888102597700, ffff888102597780)
[   23.509962] 
[   23.510064] The buggy address belongs to the physical page:
[   23.510446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102597
[   23.510770] flags: 0x200000000000000(node=0|zone=2)
[   23.511238] page_type: f5(slab)
[   23.511412] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.511718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.512460] page dumped because: kasan: bad access detected
[   23.512713] 
[   23.512796] Memory state around the buggy address:
[   23.513133]  ffff888102597600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.513505]  ffff888102597680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.513762] >ffff888102597700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.514098]                    ^
[   23.514343]  ffff888102597780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.514636]  ffff888102597800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.514917] ==================================================================
[   23.520280] ==================================================================
[   23.520763] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.521273] Free of addr ffff888103968000 by task kunit_try_catch/266
[   23.521515] 
[   23.521629] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.521678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.521690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.521713] Call Trace:
[   23.521726]  <TASK>
[   23.521742]  dump_stack_lvl+0x73/0xb0
[   23.521772]  print_report+0xd1/0x650
[   23.521792]  ? __virt_addr_valid+0x1db/0x2d0
[   23.521817]  ? kasan_addr_to_slab+0x11/0xa0
[   23.521836]  ? mempool_double_free_helper+0x184/0x370
[   23.521859]  kasan_report_invalid_free+0x10a/0x130
[   23.521881]  ? mempool_double_free_helper+0x184/0x370
[   23.521906]  ? mempool_double_free_helper+0x184/0x370
[   23.521926]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   23.522061]  mempool_free+0x2ec/0x380
[   23.522088]  mempool_double_free_helper+0x184/0x370
[   23.522111]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.522134]  ? __kasan_check_write+0x18/0x20
[   23.522157]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.522179]  ? finish_task_switch.isra.0+0x153/0x700
[   23.522204]  mempool_kmalloc_large_double_free+0xed/0x140
[   23.522227]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   23.522251]  ? __kasan_check_write+0x18/0x20
[   23.522273]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.522294]  ? __pfx_mempool_kfree+0x10/0x10
[   23.522317]  ? __pfx_read_tsc+0x10/0x10
[   23.522338]  ? ktime_get_ts64+0x86/0x230
[   23.522364]  kunit_try_run_case+0x1a5/0x480
[   23.522389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.522412]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   23.522433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.522457]  ? __kthread_parkme+0x82/0x180
[   23.522477]  ? preempt_count_sub+0x50/0x80
[   23.522498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.522521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.522545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.522567]  kthread+0x337/0x6f0
[   23.522585]  ? trace_preempt_on+0x20/0xc0
[   23.522608]  ? __pfx_kthread+0x10/0x10
[   23.522627]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.522648]  ? calculate_sigpending+0x7b/0xa0
[   23.522672]  ? __pfx_kthread+0x10/0x10
[   23.522692]  ret_from_fork+0x116/0x1d0
[   23.522710]  ? __pfx_kthread+0x10/0x10
[   23.522728]  ret_from_fork_asm+0x1a/0x30
[   23.522757]  </TASK>
[   23.522768] 
[   23.531644] The buggy address belongs to the physical page:
[   23.532013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff88810396e600 pfn:0x103968
[   23.532281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.532908] flags: 0x200000000000040(head|node=0|zone=2)
[   23.533262] page_type: f8(unknown)
[   23.533442] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.533692] raw: ffff88810396e600 0000000000000000 00000000f8000000 0000000000000000
[   23.533913] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.534191] head: ffff88810396e600 0000000000000000 00000000f8000000 0000000000000000
[   23.534610] head: 0200000000000002 ffffea00040e5a01 00000000ffffffff 00000000ffffffff
[   23.535107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.535556] page dumped because: kasan: bad access detected
[   23.535722] 
[   23.535784] Memory state around the buggy address:
[   23.536134]  ffff888103967f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.536448]  ffff888103967f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.536714] >ffff888103968000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.536917]                    ^
[   23.537215]  ffff888103968080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.537538]  ffff888103968100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.537798] ==================================================================
[   23.545199] ==================================================================
[   23.545692] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.546228] Free of addr ffff888102bec000 by task kunit_try_catch/268
[   23.546494] 
[   23.546590] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.546638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.546650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.546672] Call Trace:
[   23.546686]  <TASK>
[   23.546703]  dump_stack_lvl+0x73/0xb0
[   23.546730]  print_report+0xd1/0x650
[   23.546751]  ? __virt_addr_valid+0x1db/0x2d0
[   23.546775]  ? kasan_addr_to_slab+0x11/0xa0
[   23.546794]  ? mempool_double_free_helper+0x184/0x370
[   23.546816]  kasan_report_invalid_free+0x10a/0x130
[   23.546852]  ? mempool_double_free_helper+0x184/0x370
[   23.546875]  ? mempool_double_free_helper+0x184/0x370
[   23.546897]  __kasan_mempool_poison_pages+0x115/0x130
[   23.546920]  mempool_free+0x290/0x380
[   23.546958]  mempool_double_free_helper+0x184/0x370
[   23.546980]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.547003]  ? __kasan_check_write+0x18/0x20
[   23.547025]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.547047]  ? finish_task_switch.isra.0+0x153/0x700
[   23.547072]  mempool_page_alloc_double_free+0xe8/0x140
[   23.547095]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   23.547119]  ? __kasan_check_write+0x18/0x20
[   23.547141]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   23.547164]  ? __pfx_mempool_free_pages+0x10/0x10
[   23.547189]  ? __pfx_read_tsc+0x10/0x10
[   23.547211]  ? ktime_get_ts64+0x86/0x230
[   23.547231]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.547255]  kunit_try_run_case+0x1a5/0x480
[   23.547281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.547397]  ? queued_spin_lock_slowpath+0x116/0xb40
[   23.547442]  ? __kthread_parkme+0x82/0x180
[   23.547461]  ? preempt_count_sub+0x50/0x80
[   23.547482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.547506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.547528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.547551]  kthread+0x337/0x6f0
[   23.547571]  ? trace_preempt_on+0x20/0xc0
[   23.547592]  ? __pfx_kthread+0x10/0x10
[   23.547612]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.547634]  ? calculate_sigpending+0x7b/0xa0
[   23.547658]  ? __pfx_kthread+0x10/0x10
[   23.547678]  ret_from_fork+0x116/0x1d0
[   23.547697]  ? __pfx_kthread+0x10/0x10
[   23.547715]  ret_from_fork_asm+0x1a/0x30
[   23.547743]  </TASK>
[   23.547754] 
[   23.559278] The buggy address belongs to the physical page:
[   23.559522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bec
[   23.560127] flags: 0x200000000000000(node=0|zone=2)
[   23.560524] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   23.560976] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.561416] page dumped because: kasan: bad access detected
[   23.561805] 
[   23.561965] Memory state around the buggy address:
[   23.562210]  ffff888102bebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.562601]  ffff888102bebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.563131] >ffff888102bec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.563437]                    ^
[   23.563586]  ffff888102bec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.563885]  ffff888102bec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.564571] ==================================================================