Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.650281] ==================================================================
[   18.650885] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.650965] Free of addr fff00000c7968000 by task kunit_try_catch/239
[   18.651010] 
[   18.651337] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.651522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.651551] Hardware name: linux,dummy-virt (DT)
[   18.651583] Call trace:
[   18.651871]  show_stack+0x20/0x38 (C)
[   18.652024]  dump_stack_lvl+0x8c/0xd0
[   18.652128]  print_report+0x118/0x5d0
[   18.652528]  kasan_report_invalid_free+0xc0/0xe8
[   18.652691]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.653195]  mempool_free+0x24c/0x328
[   18.653783]  mempool_double_free_helper+0x150/0x2e8
[   18.653850]  mempool_page_alloc_double_free+0xbc/0x118
[   18.654757]  kunit_try_run_case+0x170/0x3f0
[   18.654824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.654880]  kthread+0x328/0x630
[   18.654923]  ret_from_fork+0x10/0x20
[   18.654971] 
[   18.654993] The buggy address belongs to the physical page:
[   18.655028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107968
[   18.655084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.655150] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.655201] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.655262] page dumped because: kasan: bad access detected
[   18.655294] 
[   18.655311] Memory state around the buggy address:
[   18.655344]  fff00000c7967f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.655388]  fff00000c7967f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.655431] >fff00000c7968000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.655470]                    ^
[   18.655496]  fff00000c7968080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.655539]  fff00000c7968100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.655577] ==================================================================
[   18.617050] ==================================================================
[   18.617466] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.617705] Free of addr fff00000c5967700 by task kunit_try_catch/235
[   18.617785] 
[   18.617819] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.617901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.617928] Hardware name: linux,dummy-virt (DT)
[   18.618382] Call trace:
[   18.618460]  show_stack+0x20/0x38 (C)
[   18.618589]  dump_stack_lvl+0x8c/0xd0
[   18.618672]  print_report+0x118/0x5d0
[   18.618748]  kasan_report_invalid_free+0xc0/0xe8
[   18.618949]  check_slab_allocation+0xd4/0x108
[   18.619107]  __kasan_mempool_poison_object+0x78/0x150
[   18.619175]  mempool_free+0x28c/0x328
[   18.619225]  mempool_double_free_helper+0x150/0x2e8
[   18.619988]  mempool_kmalloc_double_free+0xc0/0x118
[   18.620150]  kunit_try_run_case+0x170/0x3f0
[   18.620406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.620487]  kthread+0x328/0x630
[   18.621020]  ret_from_fork+0x10/0x20
[   18.621182] 
[   18.621204] Allocated by task 235:
[   18.621268]  kasan_save_stack+0x3c/0x68
[   18.621695]  kasan_save_track+0x20/0x40
[   18.622064]  kasan_save_alloc_info+0x40/0x58
[   18.622219]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.622352]  remove_element+0x130/0x1f8
[   18.622402]  mempool_alloc_preallocated+0x58/0xc0
[   18.622451]  mempool_double_free_helper+0x94/0x2e8
[   18.622500]  mempool_kmalloc_double_free+0xc0/0x118
[   18.622575]  kunit_try_run_case+0x170/0x3f0
[   18.622623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622667]  kthread+0x328/0x630
[   18.622700]  ret_from_fork+0x10/0x20
[   18.622757] 
[   18.622786] Freed by task 235:
[   18.622814]  kasan_save_stack+0x3c/0x68
[   18.622852]  kasan_save_track+0x20/0x40
[   18.622889]  kasan_save_free_info+0x4c/0x78
[   18.622928]  __kasan_mempool_poison_object+0xc0/0x150
[   18.622984]  mempool_free+0x28c/0x328
[   18.623021]  mempool_double_free_helper+0x100/0x2e8
[   18.623069]  mempool_kmalloc_double_free+0xc0/0x118
[   18.623118]  kunit_try_run_case+0x170/0x3f0
[   18.623156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.623200]  kthread+0x328/0x630
[   18.623772]  ret_from_fork+0x10/0x20
[   18.623841] 
[   18.623862] The buggy address belongs to the object at fff00000c5967700
[   18.623862]  which belongs to the cache kmalloc-128 of size 128
[   18.623939] The buggy address is located 0 bytes inside of
[   18.623939]  128-byte region [fff00000c5967700, fff00000c5967780)
[   18.624175] 
[   18.624330] The buggy address belongs to the physical page:
[   18.624410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105967
[   18.624470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.624699] page_type: f5(slab)
[   18.624930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.625243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.625349] page dumped because: kasan: bad access detected
[   18.625426] 
[   18.625461] Memory state around the buggy address:
[   18.625511]  fff00000c5967600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.625768]  fff00000c5967680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.625983] >fff00000c5967700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.626072]                    ^
[   18.626172]  fff00000c5967780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.626497]  fff00000c5967800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.626730] ==================================================================
[   18.636778] ==================================================================
[   18.636839] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.637091] Free of addr fff00000c7968000 by task kunit_try_catch/237
[   18.637402] 
[   18.637441] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.637831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.637877] Hardware name: linux,dummy-virt (DT)
[   18.637952] Call trace:
[   18.638064]  show_stack+0x20/0x38 (C)
[   18.638158]  dump_stack_lvl+0x8c/0xd0
[   18.638274]  print_report+0x118/0x5d0
[   18.638328]  kasan_report_invalid_free+0xc0/0xe8
[   18.638406]  __kasan_mempool_poison_object+0x14c/0x150
[   18.638468]  mempool_free+0x28c/0x328
[   18.638513]  mempool_double_free_helper+0x150/0x2e8
[   18.638702]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.638958]  kunit_try_run_case+0x170/0x3f0
[   18.639092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.639160]  kthread+0x328/0x630
[   18.639346]  ret_from_fork+0x10/0x20
[   18.639667] 
[   18.639817] The buggy address belongs to the physical page:
[   18.639918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107968
[   18.639979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.640037] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.640448] page_type: f8(unknown)
[   18.640543] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.640720] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.640832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.640910] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.641038] head: 0bfffe0000000002 ffffc1ffc31e5a01 00000000ffffffff 00000000ffffffff
[   18.641089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.641130] page dumped because: kasan: bad access detected
[   18.641163] 
[   18.641180] Memory state around the buggy address:
[   18.641231]  fff00000c7967f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.641277]  fff00000c7967f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.641331] >fff00000c7968000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.641369]                    ^
[   18.641395]  fff00000c7968080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.641438]  fff00000c7968100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.641479] ==================================================================

[   14.236375] ==================================================================
[   14.236933] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.237378] Free of addr ffff88810307d600 by task kunit_try_catch/252
[   14.237905] 
[   14.238136] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.238185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.238198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.238221] Call Trace:
[   14.238233]  <TASK>
[   14.238248]  dump_stack_lvl+0x73/0xb0
[   14.238281]  print_report+0xd1/0x610
[   14.238306]  ? __virt_addr_valid+0x1db/0x2d0
[   14.238332]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.238357]  ? mempool_double_free_helper+0x184/0x370
[   14.238384]  kasan_report_invalid_free+0x10a/0x130
[   14.238411]  ? mempool_double_free_helper+0x184/0x370
[   14.238522]  ? mempool_double_free_helper+0x184/0x370
[   14.238721]  ? mempool_double_free_helper+0x184/0x370
[   14.238748]  check_slab_allocation+0x101/0x130
[   14.238787]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.238814]  mempool_free+0x2ec/0x380
[   14.238844]  mempool_double_free_helper+0x184/0x370
[   14.238870]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.238896]  ? update_load_avg+0x1be/0x21b0
[   14.238925]  ? finish_task_switch.isra.0+0x153/0x700
[   14.238951]  mempool_kmalloc_double_free+0xed/0x140
[   14.239048]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.239080]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.239104]  ? __pfx_mempool_kfree+0x10/0x10
[   14.239130]  ? __pfx_read_tsc+0x10/0x10
[   14.239153]  ? ktime_get_ts64+0x86/0x230
[   14.239185]  kunit_try_run_case+0x1a5/0x480
[   14.239212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.239237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.239263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.239289]  ? __kthread_parkme+0x82/0x180
[   14.239311]  ? preempt_count_sub+0x50/0x80
[   14.239336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.239362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.239388]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.239415]  kthread+0x337/0x6f0
[   14.239436]  ? trace_preempt_on+0x20/0xc0
[   14.239461]  ? __pfx_kthread+0x10/0x10
[   14.239482]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.239505]  ? calculate_sigpending+0x7b/0xa0
[   14.239531]  ? __pfx_kthread+0x10/0x10
[   14.239553]  ret_from_fork+0x116/0x1d0
[   14.239572]  ? __pfx_kthread+0x10/0x10
[   14.239593]  ret_from_fork_asm+0x1a/0x30
[   14.239625]  </TASK>
[   14.239636] 
[   14.253518] Allocated by task 252:
[   14.254104]  kasan_save_stack+0x45/0x70
[   14.254414]  kasan_save_track+0x18/0x40
[   14.254629]  kasan_save_alloc_info+0x3b/0x50
[   14.254961]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.255396]  remove_element+0x11e/0x190
[   14.255710]  mempool_alloc_preallocated+0x4d/0x90
[   14.255958]  mempool_double_free_helper+0x8a/0x370
[   14.256586]  mempool_kmalloc_double_free+0xed/0x140
[   14.256936]  kunit_try_run_case+0x1a5/0x480
[   14.257260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.257790]  kthread+0x337/0x6f0
[   14.257992]  ret_from_fork+0x116/0x1d0
[   14.258391]  ret_from_fork_asm+0x1a/0x30
[   14.258628] 
[   14.258732] Freed by task 252:
[   14.259134]  kasan_save_stack+0x45/0x70
[   14.259547]  kasan_save_track+0x18/0x40
[   14.259822]  kasan_save_free_info+0x3f/0x60
[   14.260258]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.260596]  mempool_free+0x2ec/0x380
[   14.260787]  mempool_double_free_helper+0x109/0x370
[   14.261397]  mempool_kmalloc_double_free+0xed/0x140
[   14.261605]  kunit_try_run_case+0x1a5/0x480
[   14.261940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.262505]  kthread+0x337/0x6f0
[   14.262679]  ret_from_fork+0x116/0x1d0
[   14.262844]  ret_from_fork_asm+0x1a/0x30
[   14.263165] 
[   14.263453] The buggy address belongs to the object at ffff88810307d600
[   14.263453]  which belongs to the cache kmalloc-128 of size 128
[   14.264199] The buggy address is located 0 bytes inside of
[   14.264199]  128-byte region [ffff88810307d600, ffff88810307d680)
[   14.264989] 
[   14.265096] The buggy address belongs to the physical page:
[   14.265576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10307d
[   14.266004] flags: 0x200000000000000(node=0|zone=2)
[   14.266319] page_type: f5(slab)
[   14.266715] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.267140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.267539] page dumped because: kasan: bad access detected
[   14.267871] 
[   14.268062] Memory state around the buggy address:
[   14.268290]  ffff88810307d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.268908]  ffff88810307d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.269517] >ffff88810307d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.269948]                    ^
[   14.270349]  ffff88810307d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.270789]  ffff88810307d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.271332] ==================================================================
[   14.307244] ==================================================================
[   14.307825] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.308583] Free of addr ffff8881039b0000 by task kunit_try_catch/256
[   14.309066] 
[   14.309370] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.309422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.309591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.309619] Call Trace:
[   14.309633]  <TASK>
[   14.309652]  dump_stack_lvl+0x73/0xb0
[   14.309687]  print_report+0xd1/0x610
[   14.309710]  ? __virt_addr_valid+0x1db/0x2d0
[   14.309735]  ? kasan_addr_to_slab+0x11/0xa0
[   14.309769]  ? mempool_double_free_helper+0x184/0x370
[   14.309795]  kasan_report_invalid_free+0x10a/0x130
[   14.309820]  ? mempool_double_free_helper+0x184/0x370
[   14.309848]  ? mempool_double_free_helper+0x184/0x370
[   14.309872]  __kasan_mempool_poison_pages+0x115/0x130
[   14.309898]  mempool_free+0x290/0x380
[   14.309926]  mempool_double_free_helper+0x184/0x370
[   14.309951]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.310034]  ? __kasan_check_write+0x18/0x20
[   14.310057]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.310080]  ? irqentry_exit+0x2a/0x60
[   14.310103]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.310131]  mempool_page_alloc_double_free+0xe8/0x140
[   14.310158]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.310189]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.310213]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.310239]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.310269]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.310298]  kunit_try_run_case+0x1a5/0x480
[   14.310324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.310347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.310373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.310398]  ? __kthread_parkme+0x82/0x180
[   14.310419]  ? preempt_count_sub+0x50/0x80
[   14.310444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.310468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.310492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.310518]  kthread+0x337/0x6f0
[   14.310538]  ? trace_preempt_on+0x20/0xc0
[   14.310561]  ? __pfx_kthread+0x10/0x10
[   14.310582]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.310603]  ? calculate_sigpending+0x7b/0xa0
[   14.310629]  ? __pfx_kthread+0x10/0x10
[   14.310651]  ret_from_fork+0x116/0x1d0
[   14.310670]  ? __pfx_kthread+0x10/0x10
[   14.310691]  ret_from_fork_asm+0x1a/0x30
[   14.310722]  </TASK>
[   14.310732] 
[   14.325455] The buggy address belongs to the physical page:
[   14.325970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b0
[   14.326361] flags: 0x200000000000000(node=0|zone=2)
[   14.326800] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.327189] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.327789] page dumped because: kasan: bad access detected
[   14.328203] 
[   14.328283] Memory state around the buggy address:
[   14.328737]  ffff8881039aff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.329398]  ffff8881039aff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.329865] >ffff8881039b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.330297]                    ^
[   14.330771]  ffff8881039b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.331372]  ffff8881039b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.331729] ==================================================================
[   14.275237] ==================================================================
[   14.275753] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.276144] Free of addr ffff888102a50000 by task kunit_try_catch/254
[   14.276588] 
[   14.276699] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.277157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.277175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.277201] Call Trace:
[   14.277214]  <TASK>
[   14.277231]  dump_stack_lvl+0x73/0xb0
[   14.277267]  print_report+0xd1/0x610
[   14.277291]  ? __virt_addr_valid+0x1db/0x2d0
[   14.277317]  ? kasan_addr_to_slab+0x11/0xa0
[   14.277337]  ? mempool_double_free_helper+0x184/0x370
[   14.277364]  kasan_report_invalid_free+0x10a/0x130
[   14.277390]  ? mempool_double_free_helper+0x184/0x370
[   14.277418]  ? mempool_double_free_helper+0x184/0x370
[   14.277441]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.277468]  mempool_free+0x2ec/0x380
[   14.277495]  mempool_double_free_helper+0x184/0x370
[   14.277521]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.277547]  ? __kasan_check_write+0x18/0x20
[   14.277568]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.277591]  ? irqentry_exit+0x2a/0x60
[   14.277613]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.277641]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.277668]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.277697]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.277721]  ? __pfx_mempool_kfree+0x10/0x10
[   14.277745]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.277789]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.277818]  kunit_try_run_case+0x1a5/0x480
[   14.277845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.277869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.277895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.277919]  ? __kthread_parkme+0x82/0x180
[   14.277942]  ? preempt_count_sub+0x50/0x80
[   14.277967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.278040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.278065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.278091]  kthread+0x337/0x6f0
[   14.278110]  ? trace_preempt_on+0x20/0xc0
[   14.278135]  ? __pfx_kthread+0x10/0x10
[   14.278156]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.278179]  ? calculate_sigpending+0x7b/0xa0
[   14.278204]  ? __pfx_kthread+0x10/0x10
[   14.278226]  ret_from_fork+0x116/0x1d0
[   14.278247]  ? __pfx_kthread+0x10/0x10
[   14.278267]  ret_from_fork_asm+0x1a/0x30
[   14.278298]  </TASK>
[   14.278308] 
[   14.293108] The buggy address belongs to the physical page:
[   14.293373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a50
[   14.293950] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.294464] flags: 0x200000000000040(head|node=0|zone=2)
[   14.294948] page_type: f8(unknown)
[   14.295290] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.295852] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.296397] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.296881] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.297412] head: 0200000000000002 ffffea00040a9401 00000000ffffffff 00000000ffffffff
[   14.297952] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.298486] page dumped because: kasan: bad access detected
[   14.298891] 
[   14.299227] Memory state around the buggy address:
[   14.299506]  ffff888102a4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.299942]  ffff888102a4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.301027] >ffff888102a50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.301932]                    ^
[   14.302570]  ffff888102a50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.303153]  ffff888102a50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.304039] ==================================================================