Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.933026] ==================================================================
[   19.934252] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.934416] Free of addr fff00000c59e4e00 by task kunit_try_catch/237
[   19.934467] 
[   19.934499] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.934582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935388] Hardware name: linux,dummy-virt (DT)
[   19.935821] Call trace:
[   19.935999]  show_stack+0x20/0x38 (C)
[   19.936434]  dump_stack_lvl+0x8c/0xd0
[   19.936896]  print_report+0x118/0x5d0
[   19.936953]  kasan_report_invalid_free+0xc0/0xe8
[   19.937004]  check_slab_allocation+0xd4/0x108
[   19.937903]  __kasan_mempool_poison_object+0x78/0x150
[   19.937968]  mempool_free+0x28c/0x328
[   19.938545]  mempool_double_free_helper+0x150/0x2e8
[   19.939176]  mempool_kmalloc_double_free+0xc0/0x118
[   19.939505]  kunit_try_run_case+0x170/0x3f0
[   19.940064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.940567]  kthread+0x328/0x630
[   19.940921]  ret_from_fork+0x10/0x20
[   19.941221] 
[   19.941240] Allocated by task 237:
[   19.941272]  kasan_save_stack+0x3c/0x68
[   19.942169]  kasan_save_track+0x20/0x40
[   19.942393]  kasan_save_alloc_info+0x40/0x58
[   19.942436]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.942480]  remove_element+0x130/0x1f8
[   19.943125]  mempool_alloc_preallocated+0x58/0xc0
[   19.943459]  mempool_double_free_helper+0x94/0x2e8
[   19.943998]  mempool_kmalloc_double_free+0xc0/0x118
[   19.944466]  kunit_try_run_case+0x170/0x3f0
[   19.944518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.945194]  kthread+0x328/0x630
[   19.945909]  ret_from_fork+0x10/0x20
[   19.946014] 
[   19.946037] Freed by task 237:
[   19.946399]  kasan_save_stack+0x3c/0x68
[   19.946730]  kasan_save_track+0x20/0x40
[   19.946947]  kasan_save_free_info+0x4c/0x78
[   19.947808]  __kasan_mempool_poison_object+0xc0/0x150
[   19.948511]  mempool_free+0x28c/0x328
[   19.948747]  mempool_double_free_helper+0x100/0x2e8
[   19.948839]  mempool_kmalloc_double_free+0xc0/0x118
[   19.949038]  kunit_try_run_case+0x170/0x3f0
[   19.949078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.949879]  kthread+0x328/0x630
[   19.950033]  ret_from_fork+0x10/0x20
[   19.950088] 
[   19.950110] The buggy address belongs to the object at fff00000c59e4e00
[   19.950110]  which belongs to the cache kmalloc-128 of size 128
[   19.951175] The buggy address is located 0 bytes inside of
[   19.951175]  128-byte region [fff00000c59e4e00, fff00000c59e4e80)
[   19.951507] 
[   19.951543] The buggy address belongs to the physical page:
[   19.951614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   19.951671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.951722] page_type: f5(slab)
[   19.952976] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.953967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.954328] page dumped because: kasan: bad access detected
[   19.954435] 
[   19.954821] Memory state around the buggy address:
[   19.955047]  fff00000c59e4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.955540]  fff00000c59e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.956200] >fff00000c59e4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.956363]                    ^
[   19.956752]  fff00000c59e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958078]  fff00000c59e4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.958633] ==================================================================
[   19.973039] ==================================================================
[   19.973099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.973166] Free of addr fff00000c7938000 by task kunit_try_catch/239
[   19.973630] 
[   19.973963] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.974476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.974581] Hardware name: linux,dummy-virt (DT)
[   19.974679] Call trace:
[   19.974892]  show_stack+0x20/0x38 (C)
[   19.974976]  dump_stack_lvl+0x8c/0xd0
[   19.975153]  print_report+0x118/0x5d0
[   19.975221]  kasan_report_invalid_free+0xc0/0xe8
[   19.975411]  __kasan_mempool_poison_object+0x14c/0x150
[   19.975610]  mempool_free+0x28c/0x328
[   19.975681]  mempool_double_free_helper+0x150/0x2e8
[   19.975974]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.976315]  kunit_try_run_case+0x170/0x3f0
[   19.976662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.976797]  kthread+0x328/0x630
[   19.976893]  ret_from_fork+0x10/0x20
[   19.977348] 
[   19.977440] The buggy address belongs to the physical page:
[   19.977529] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   19.977854] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.978022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.978218] page_type: f8(unknown)
[   19.978262] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.978624] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.978724] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.978797] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.979024] head: 0bfffe0000000002 ffffc1ffc31e4e01 00000000ffffffff 00000000ffffffff
[   19.979238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.979375] page dumped because: kasan: bad access detected
[   19.979460] 
[   19.979487] Memory state around the buggy address:
[   19.979806]  fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.979887]  fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980045] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980098]                    ^
[   19.980151]  fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980454]  fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980618] ==================================================================
[   19.987098] ==================================================================
[   19.987156] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.987224] Free of addr fff00000c793c000 by task kunit_try_catch/241
[   19.987319] 
[   19.987353] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.987581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.987701] Hardware name: linux,dummy-virt (DT)
[   19.987739] Call trace:
[   19.987849]  show_stack+0x20/0x38 (C)
[   19.987914]  dump_stack_lvl+0x8c/0xd0
[   19.987963]  print_report+0x118/0x5d0
[   19.988238]  kasan_report_invalid_free+0xc0/0xe8
[   19.988375]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.988443]  mempool_free+0x24c/0x328
[   19.988531]  mempool_double_free_helper+0x150/0x2e8
[   19.988585]  mempool_page_alloc_double_free+0xbc/0x118
[   19.988636]  kunit_try_run_case+0x170/0x3f0
[   19.988894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.988960]  kthread+0x328/0x630
[   19.989008]  ret_from_fork+0x10/0x20
[   19.989053] 
[   19.989073] The buggy address belongs to the physical page:
[   19.989104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793c
[   19.989159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.989232] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.989283] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.989401] page dumped because: kasan: bad access detected
[   19.989441] 
[   19.989459] Memory state around the buggy address:
[   19.989492]  fff00000c793bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989536]  fff00000c793bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989580] >fff00000c793c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989646]                    ^
[   19.989675]  fff00000c793c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989717]  fff00000c793c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989757] ==================================================================

[   12.662567] ==================================================================
[   12.663158] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.663480] Free of addr ffff888102ac8000 by task kunit_try_catch/256
[   12.663748] 
[   12.663836] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   12.663891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.663903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.663923] Call Trace:
[   12.663934]  <TASK>
[   12.663949]  dump_stack_lvl+0x73/0xb0
[   12.663972]  print_report+0xd1/0x610
[   12.664028]  ? __virt_addr_valid+0x1db/0x2d0
[   12.664051]  ? kasan_addr_to_slab+0x11/0xa0
[   12.664071]  ? mempool_double_free_helper+0x184/0x370
[   12.664095]  kasan_report_invalid_free+0x10a/0x130
[   12.664119]  ? mempool_double_free_helper+0x184/0x370
[   12.664145]  ? mempool_double_free_helper+0x184/0x370
[   12.664167]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   12.664191]  mempool_free+0x2ec/0x380
[   12.664214]  mempool_double_free_helper+0x184/0x370
[   12.664237]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.664264]  ? finish_task_switch.isra.0+0x153/0x700
[   12.664290]  mempool_kmalloc_large_double_free+0xed/0x140
[   12.664314]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   12.664337]  ? dequeue_task_fair+0x156/0x4e0
[   12.664359]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.664378]  ? __pfx_mempool_kfree+0x10/0x10
[   12.664399]  ? __pfx_read_tsc+0x10/0x10
[   12.664417]  ? ktime_get_ts64+0x86/0x230
[   12.664441]  kunit_try_run_case+0x1a5/0x480
[   12.664461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.664479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.664502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.664526]  ? __kthread_parkme+0x82/0x180
[   12.664547]  ? preempt_count_sub+0x50/0x80
[   12.664590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.664611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.664633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.664655]  kthread+0x337/0x6f0
[   12.664671]  ? trace_preempt_on+0x20/0xc0
[   12.664694]  ? __pfx_kthread+0x10/0x10
[   12.664711]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.664732]  ? calculate_sigpending+0x7b/0xa0
[   12.664753]  ? __pfx_kthread+0x10/0x10
[   12.664770]  ret_from_fork+0x41/0x80
[   12.664790]  ? __pfx_kthread+0x10/0x10
[   12.664807]  ret_from_fork_asm+0x1a/0x30
[   12.664837]  </TASK>
[   12.664847] 
[   12.674161] The buggy address belongs to the physical page:
[   12.674389] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac8
[   12.674836] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.675259] flags: 0x200000000000040(head|node=0|zone=2)
[   12.675441] page_type: f8(unknown)
[   12.675578] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.675918] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.676297] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.676530] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.676929] head: 0200000000000002 ffffea00040ab201 00000000ffffffff 00000000ffffffff
[   12.677312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.677673] page dumped because: kasan: bad access detected
[   12.678077] 
[   12.678176] Memory state around the buggy address:
[   12.678384]  ffff888102ac7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.678670]  ffff888102ac7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.679078] >ffff888102ac8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.679351]                    ^
[   12.679513]  ffff888102ac8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.679738]  ffff888102ac8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.680037] ==================================================================
[   12.620068] ==================================================================
[   12.620560] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.621006] Free of addr ffff888102240600 by task kunit_try_catch/254
[   12.621277] 
[   12.621405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   12.621454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.621466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.621488] Call Trace:
[   12.621500]  <TASK>
[   12.621515]  dump_stack_lvl+0x73/0xb0
[   12.621543]  print_report+0xd1/0x610
[   12.621566]  ? __virt_addr_valid+0x1db/0x2d0
[   12.621611]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.621632]  ? mempool_double_free_helper+0x184/0x370
[   12.621656]  kasan_report_invalid_free+0x10a/0x130
[   12.621765]  ? mempool_double_free_helper+0x184/0x370
[   12.621822]  ? mempool_double_free_helper+0x184/0x370
[   12.621846]  ? mempool_double_free_helper+0x184/0x370
[   12.621867]  check_slab_allocation+0x101/0x130
[   12.621900]  __kasan_mempool_poison_object+0x91/0x1d0
[   12.621924]  mempool_free+0x2ec/0x380
[   12.621948]  mempool_double_free_helper+0x184/0x370
[   12.621972]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.621995]  ? dequeue_entities+0x852/0x1740
[   12.622019]  ? finish_task_switch.isra.0+0x153/0x700
[   12.622045]  mempool_kmalloc_double_free+0xed/0x140
[   12.622069]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   12.622091]  ? dequeue_task_fair+0x166/0x4e0
[   12.622113]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.622131]  ? __pfx_mempool_kfree+0x10/0x10
[   12.622152]  ? __pfx_read_tsc+0x10/0x10
[   12.622193]  ? ktime_get_ts64+0x86/0x230
[   12.622218]  kunit_try_run_case+0x1a5/0x480
[   12.622239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.622257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.622282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.622305]  ? __kthread_parkme+0x82/0x180
[   12.622327]  ? preempt_count_sub+0x50/0x80
[   12.622366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.622386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.622408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.622430]  kthread+0x337/0x6f0
[   12.622446]  ? trace_preempt_on+0x20/0xc0
[   12.622469]  ? __pfx_kthread+0x10/0x10
[   12.622487]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.622508]  ? calculate_sigpending+0x7b/0xa0
[   12.622530]  ? __pfx_kthread+0x10/0x10
[   12.622547]  ret_from_fork+0x41/0x80
[   12.622567]  ? __pfx_kthread+0x10/0x10
[   12.622584]  ret_from_fork_asm+0x1a/0x30
[   12.622615]  </TASK>
[   12.622625] 
[   12.636529] Allocated by task 254:
[   12.636663]  kasan_save_stack+0x45/0x70
[   12.637067]  kasan_save_track+0x18/0x40
[   12.637443]  kasan_save_alloc_info+0x3b/0x50
[   12.637935]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.638468]  remove_element+0x11e/0x190
[   12.638866]  mempool_alloc_preallocated+0x4d/0x90
[   12.639035]  mempool_double_free_helper+0x8a/0x370
[   12.639193]  mempool_kmalloc_double_free+0xed/0x140
[   12.639354]  kunit_try_run_case+0x1a5/0x480
[   12.639496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.639667]  kthread+0x337/0x6f0
[   12.639782]  ret_from_fork+0x41/0x80
[   12.640310]  ret_from_fork_asm+0x1a/0x30
[   12.640747] 
[   12.640947] Freed by task 254:
[   12.641259]  kasan_save_stack+0x45/0x70
[   12.641845]  kasan_save_track+0x18/0x40
[   12.642225]  kasan_save_free_info+0x3f/0x60
[   12.642614]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.643162]  mempool_free+0x2ec/0x380
[   12.643624]  mempool_double_free_helper+0x109/0x370
[   12.644220]  mempool_kmalloc_double_free+0xed/0x140
[   12.644924]  kunit_try_run_case+0x1a5/0x480
[   12.645336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.645675]  kthread+0x337/0x6f0
[   12.645809]  ret_from_fork+0x41/0x80
[   12.646047]  ret_from_fork_asm+0x1a/0x30
[   12.646420] 
[   12.646577] The buggy address belongs to the object at ffff888102240600
[   12.646577]  which belongs to the cache kmalloc-128 of size 128
[   12.647887] The buggy address is located 0 bytes inside of
[   12.647887]  128-byte region [ffff888102240600, ffff888102240680)
[   12.648508] 
[   12.648700] The buggy address belongs to the physical page:
[   12.649285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   12.649908] flags: 0x200000000000000(node=0|zone=2)
[   12.650179] page_type: f5(slab)
[   12.650495] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.651255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.651809] page dumped because: kasan: bad access detected
[   12.652237] 
[   12.652305] Memory state around the buggy address:
[   12.652459]  ffff888102240500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.652671]  ffff888102240580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.653569] >ffff888102240600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.654411]                    ^
[   12.654729]  ffff888102240680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.655669]  ffff888102240700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.656490] ==================================================================
[   12.683366] ==================================================================
[   12.683928] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.684343] Free of addr ffff888102acc000 by task kunit_try_catch/258
[   12.684603] 
[   12.684689] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   12.684733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.684744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.684763] Call Trace:
[   12.684774]  <TASK>
[   12.684788]  dump_stack_lvl+0x73/0xb0
[   12.684821]  print_report+0xd1/0x610
[   12.684844]  ? __virt_addr_valid+0x1db/0x2d0
[   12.684865]  ? kasan_addr_to_slab+0x11/0xa0
[   12.684895]  ? mempool_double_free_helper+0x184/0x370
[   12.684920]  kasan_report_invalid_free+0x10a/0x130
[   12.684944]  ? mempool_double_free_helper+0x184/0x370
[   12.684969]  ? mempool_double_free_helper+0x184/0x370
[   12.684992]  __kasan_mempool_poison_pages+0x115/0x130
[   12.685015]  mempool_free+0x290/0x380
[   12.685037]  mempool_double_free_helper+0x184/0x370
[   12.685060]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.685084]  ? dequeue_entities+0x852/0x1740
[   12.685107]  ? finish_task_switch.isra.0+0x153/0x700
[   12.685137]  mempool_page_alloc_double_free+0xe8/0x140
[   12.685158]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   12.685178]  ? dequeue_task_fair+0x166/0x4e0
[   12.685200]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   12.685219]  ? __pfx_mempool_free_pages+0x10/0x10
[   12.685240]  ? __pfx_read_tsc+0x10/0x10
[   12.685259]  ? ktime_get_ts64+0x86/0x230
[   12.685282]  kunit_try_run_case+0x1a5/0x480
[   12.685302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.685341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.685364]  ? __kthread_parkme+0x82/0x180
[   12.685384]  ? preempt_count_sub+0x50/0x80
[   12.685407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.685449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.685472]  kthread+0x337/0x6f0
[   12.685487]  ? trace_preempt_on+0x20/0xc0
[   12.685509]  ? __pfx_kthread+0x10/0x10
[   12.685526]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.685547]  ? calculate_sigpending+0x7b/0xa0
[   12.685567]  ? __pfx_kthread+0x10/0x10
[   12.685584]  ret_from_fork+0x41/0x80
[   12.685603]  ? __pfx_kthread+0x10/0x10
[   12.685620]  ret_from_fork_asm+0x1a/0x30
[   12.685651]  </TASK>
[   12.685661] 
[   12.694500] The buggy address belongs to the physical page:
[   12.694744] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   12.695023] flags: 0x200000000000000(node=0|zone=2)
[   12.695193] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   12.695731] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   12.696283] page dumped because: kasan: bad access detected
[   12.696453] 
[   12.696519] Memory state around the buggy address:
[   12.696670]  ffff888102acbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.696887]  ffff888102acbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.697370] >ffff888102acc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.697696]                    ^
[   12.697866]  ffff888102acc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.698171]  ffff888102acc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.698591] ==================================================================