Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.884331] ==================================================================
[   18.884471] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.884557] Free of addr fff00000c78d3300 by task kunit_try_catch/235
[   18.884733] 
[   18.884768] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.885109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.885303] Hardware name: linux,dummy-virt (DT)
[   18.885355] Call trace:
[   18.885396]  show_stack+0x20/0x38 (C)
[   18.885463]  dump_stack_lvl+0x8c/0xd0
[   18.885515]  print_report+0x118/0x608
[   18.885561]  kasan_report_invalid_free+0xc0/0xe8
[   18.885608]  check_slab_allocation+0xd4/0x108
[   18.885870]  __kasan_mempool_poison_object+0x78/0x150
[   18.886209]  mempool_free+0x28c/0x328
[   18.886266]  mempool_double_free_helper+0x150/0x2e8
[   18.886458]  mempool_kmalloc_double_free+0xc0/0x118
[   18.886713]  kunit_try_run_case+0x170/0x3f0
[   18.886767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.886873]  kthread+0x328/0x630
[   18.886973]  ret_from_fork+0x10/0x20
[   18.887132] 
[   18.887155] Allocated by task 235:
[   18.887362]  kasan_save_stack+0x3c/0x68
[   18.887536]  kasan_save_track+0x20/0x40
[   18.887662]  kasan_save_alloc_info+0x40/0x58
[   18.887715]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.887759]  remove_element+0x130/0x1f8
[   18.887967]  mempool_alloc_preallocated+0x58/0xc0
[   18.888142]  mempool_double_free_helper+0x94/0x2e8
[   18.888190]  mempool_kmalloc_double_free+0xc0/0x118
[   18.888568]  kunit_try_run_case+0x170/0x3f0
[   18.888649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.888692]  kthread+0x328/0x630
[   18.889007]  ret_from_fork+0x10/0x20
[   18.889076] 
[   18.889099] Freed by task 235:
[   18.889130]  kasan_save_stack+0x3c/0x68
[   18.889177]  kasan_save_track+0x20/0x40
[   18.889212]  kasan_save_free_info+0x4c/0x78
[   18.889419]  __kasan_mempool_poison_object+0xc0/0x150
[   18.889523]  mempool_free+0x28c/0x328
[   18.889920]  mempool_double_free_helper+0x100/0x2e8
[   18.889973]  mempool_kmalloc_double_free+0xc0/0x118
[   18.890046]  kunit_try_run_case+0x170/0x3f0
[   18.890120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.890164]  kthread+0x328/0x630
[   18.890387]  ret_from_fork+0x10/0x20
[   18.890429] 
[   18.890580] The buggy address belongs to the object at fff00000c78d3300
[   18.890580]  which belongs to the cache kmalloc-128 of size 128
[   18.890685] The buggy address is located 0 bytes inside of
[   18.890685]  128-byte region [fff00000c78d3300, fff00000c78d3380)
[   18.890760] 
[   18.890975] The buggy address belongs to the physical page:
[   18.891115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d3
[   18.891176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.891225] page_type: f5(slab)
[   18.891474] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.891667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.891797] page dumped because: kasan: bad access detected
[   18.891837] 
[   18.891916] Memory state around the buggy address:
[   18.892089]  fff00000c78d3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.892137]  fff00000c78d3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892199] >fff00000c78d3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.892262]                    ^
[   18.892304]  fff00000c78d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892605]  fff00000c78d3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.892795] ==================================================================
[   18.900817] ==================================================================
[   18.900883] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.900942] Free of addr fff00000c79ec000 by task kunit_try_catch/237
[   18.900984] 
[   18.901014] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.901123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.901152] Hardware name: linux,dummy-virt (DT)
[   18.901181] Call trace:
[   18.901205]  show_stack+0x20/0x38 (C)
[   18.901252]  dump_stack_lvl+0x8c/0xd0
[   18.901298]  print_report+0x118/0x608
[   18.901340]  kasan_report_invalid_free+0xc0/0xe8
[   18.901387]  __kasan_mempool_poison_object+0x14c/0x150
[   18.901436]  mempool_free+0x28c/0x328
[   18.901480]  mempool_double_free_helper+0x150/0x2e8
[   18.901526]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.901574]  kunit_try_run_case+0x170/0x3f0
[   18.901618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.901665]  kthread+0x328/0x630
[   18.901709]  ret_from_fork+0x10/0x20
[   18.901756] 
[   18.901776] The buggy address belongs to the physical page:
[   18.901808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec
[   18.901860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.901923] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.902030] page_type: f8(unknown)
[   18.902081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.902131] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.902179] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.902226] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.902272] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff
[   18.902317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.902355] page dumped because: kasan: bad access detected
[   18.902387] 
[   18.902404] Memory state around the buggy address:
[   18.902435]  fff00000c79ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902475]  fff00000c79ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902514] >fff00000c79ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902579]                    ^
[   18.902648]  fff00000c79ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902737]  fff00000c79ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.902815] ==================================================================
[   18.907931] ==================================================================
[   18.907999] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.908074] Free of addr fff00000c79f0000 by task kunit_try_catch/239
[   18.908118] 
[   18.908151] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.908232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.908259] Hardware name: linux,dummy-virt (DT)
[   18.908289] Call trace:
[   18.908311]  show_stack+0x20/0x38 (C)
[   18.908372]  dump_stack_lvl+0x8c/0xd0
[   18.908432]  print_report+0x118/0x608
[   18.908476]  kasan_report_invalid_free+0xc0/0xe8
[   18.908522]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.908569]  mempool_free+0x24c/0x328
[   18.908614]  mempool_double_free_helper+0x150/0x2e8
[   18.908661]  mempool_page_alloc_double_free+0xbc/0x118
[   18.908713]  kunit_try_run_case+0x170/0x3f0
[   18.908803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.908874]  kthread+0x328/0x630
[   18.908947]  ret_from_fork+0x10/0x20
[   18.909069] 
[   18.909183] The buggy address belongs to the physical page:
[   18.909242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0
[   18.909345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.909472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.909529] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.909582] page dumped because: kasan: bad access detected
[   18.909629] 
[   18.909669] Memory state around the buggy address:
[   18.909738]  fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.909780]  fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.909819] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.909855]                    ^
[   18.909881]  fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.910406]  fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.910452] ==================================================================

[   18.550512] ==================================================================
[   18.551022] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   18.551687] Free of addr ffff888102b61000 by task kunit_try_catch/252
[   18.552154] 
[   18.552334] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.552441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.552464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.552504] Call Trace:
[   18.552525]  <TASK>
[   18.552603]  dump_stack_lvl+0x73/0xb0
[   18.552687]  print_report+0xd1/0x650
[   18.552734]  ? __virt_addr_valid+0x1db/0x2d0
[   18.552787]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.552833]  ? mempool_double_free_helper+0x184/0x370
[   18.552879]  kasan_report_invalid_free+0x10a/0x130
[   18.552948]  ? mempool_double_free_helper+0x184/0x370
[   18.552990]  ? mempool_double_free_helper+0x184/0x370
[   18.553375]  ? mempool_double_free_helper+0x184/0x370
[   18.553422]  check_slab_allocation+0x101/0x130
[   18.553469]  __kasan_mempool_poison_object+0x91/0x1d0
[   18.553518]  mempool_free+0x2ec/0x380
[   18.553570]  mempool_double_free_helper+0x184/0x370
[   18.553617]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   18.553657]  ? update_load_avg+0x1be/0x21b0
[   18.553886]  ? update_load_avg+0x1be/0x21b0
[   18.553935]  ? update_curr+0x80/0x810
[   18.553981]  ? finish_task_switch.isra.0+0x153/0x700
[   18.554016]  mempool_kmalloc_double_free+0xed/0x140
[   18.554052]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   18.554160]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.554181]  ? __pfx_mempool_kfree+0x10/0x10
[   18.554204]  ? __pfx_read_tsc+0x10/0x10
[   18.554229]  ? ktime_get_ts64+0x86/0x230
[   18.554271]  kunit_try_run_case+0x1a5/0x480
[   18.554308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.554332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.554360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.554383]  ? __kthread_parkme+0x82/0x180
[   18.554407]  ? preempt_count_sub+0x50/0x80
[   18.554431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.554456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.554480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.554505]  kthread+0x337/0x6f0
[   18.554526]  ? trace_preempt_on+0x20/0xc0
[   18.554552]  ? __pfx_kthread+0x10/0x10
[   18.554574]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.554596]  ? calculate_sigpending+0x7b/0xa0
[   18.554623]  ? __pfx_kthread+0x10/0x10
[   18.554645]  ret_from_fork+0x116/0x1d0
[   18.554674]  ? __pfx_kthread+0x10/0x10
[   18.554703]  ret_from_fork_asm+0x1a/0x30
[   18.554736]  </TASK>
[   18.554750] 
[   18.570729] Allocated by task 252:
[   18.570963]  kasan_save_stack+0x45/0x70
[   18.571215]  kasan_save_track+0x18/0x40
[   18.571714]  kasan_save_alloc_info+0x3b/0x50
[   18.572084]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   18.572581]  remove_element+0x11e/0x190
[   18.573154]  mempool_alloc_preallocated+0x4d/0x90
[   18.573552]  mempool_double_free_helper+0x8a/0x370
[   18.574213]  mempool_kmalloc_double_free+0xed/0x140
[   18.574618]  kunit_try_run_case+0x1a5/0x480
[   18.575101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.575359]  kthread+0x337/0x6f0
[   18.575670]  ret_from_fork+0x116/0x1d0
[   18.576464]  ret_from_fork_asm+0x1a/0x30
[   18.576958] 
[   18.577341] Freed by task 252:
[   18.577618]  kasan_save_stack+0x45/0x70
[   18.577941]  kasan_save_track+0x18/0x40
[   18.578570]  kasan_save_free_info+0x3f/0x60
[   18.578821]  __kasan_mempool_poison_object+0x131/0x1d0
[   18.579080]  mempool_free+0x2ec/0x380
[   18.579423]  mempool_double_free_helper+0x109/0x370
[   18.580026]  mempool_kmalloc_double_free+0xed/0x140
[   18.581023]  kunit_try_run_case+0x1a5/0x480
[   18.581431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.582060]  kthread+0x337/0x6f0
[   18.582393]  ret_from_fork+0x116/0x1d0
[   18.582794]  ret_from_fork_asm+0x1a/0x30
[   18.583008] 
[   18.583422] The buggy address belongs to the object at ffff888102b61000
[   18.583422]  which belongs to the cache kmalloc-128 of size 128
[   18.584542] The buggy address is located 0 bytes inside of
[   18.584542]  128-byte region [ffff888102b61000, ffff888102b61080)
[   18.585351] 
[   18.585913] The buggy address belongs to the physical page:
[   18.586302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b61
[   18.586559] flags: 0x200000000000000(node=0|zone=2)
[   18.587023] page_type: f5(slab)
[   18.587841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.588130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.588714] page dumped because: kasan: bad access detected
[   18.588994] 
[   18.589167] Memory state around the buggy address:
[   18.589909]  ffff888102b60f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.590811]  ffff888102b60f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.591499] >ffff888102b61000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.592853]                    ^
[   18.593110]  ffff888102b61080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.593378]  ffff888102b61100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.594546] ==================================================================
[   18.601769] ==================================================================
[   18.602883] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   18.603651] Free of addr ffff888103cd0000 by task kunit_try_catch/254
[   18.604455] 
[   18.604855] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.605398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.605423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.605463] Call Trace:
[   18.605488]  <TASK>
[   18.605523]  dump_stack_lvl+0x73/0xb0
[   18.605586]  print_report+0xd1/0x650
[   18.605627]  ? __virt_addr_valid+0x1db/0x2d0
[   18.605675]  ? kasan_addr_to_slab+0x11/0xa0
[   18.605734]  ? mempool_double_free_helper+0x184/0x370
[   18.605762]  kasan_report_invalid_free+0x10a/0x130
[   18.605789]  ? mempool_double_free_helper+0x184/0x370
[   18.605818]  ? mempool_double_free_helper+0x184/0x370
[   18.605844]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   18.605870]  mempool_free+0x2ec/0x380
[   18.605897]  mempool_double_free_helper+0x184/0x370
[   18.605923]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   18.605952]  ? __pfx_sched_clock_cpu+0x10/0x10
[   18.605978]  ? finish_task_switch.isra.0+0x153/0x700
[   18.606006]  mempool_kmalloc_large_double_free+0xed/0x140
[   18.606033]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   18.606169]  ? __pfx_mempool_kmalloc+0x10/0x10
[   18.606193]  ? __pfx_mempool_kfree+0x10/0x10
[   18.606216]  ? __pfx_read_tsc+0x10/0x10
[   18.606241]  ? ktime_get_ts64+0x86/0x230
[   18.606287]  kunit_try_run_case+0x1a5/0x480
[   18.606319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.606344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.606370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.606393]  ? __kthread_parkme+0x82/0x180
[   18.606417]  ? preempt_count_sub+0x50/0x80
[   18.606441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.606467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.606491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.606516]  kthread+0x337/0x6f0
[   18.606538]  ? trace_preempt_on+0x20/0xc0
[   18.606566]  ? __pfx_kthread+0x10/0x10
[   18.606589]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.606610]  ? calculate_sigpending+0x7b/0xa0
[   18.606638]  ? __pfx_kthread+0x10/0x10
[   18.606666]  ret_from_fork+0x116/0x1d0
[   18.606707]  ? __pfx_kthread+0x10/0x10
[   18.606730]  ret_from_fork_asm+0x1a/0x30
[   18.606763]  </TASK>
[   18.606778] 
[   18.624389] The buggy address belongs to the physical page:
[   18.625215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cd0
[   18.625705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.626086] flags: 0x200000000000040(head|node=0|zone=2)
[   18.626558] page_type: f8(unknown)
[   18.626995] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.627342] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.628092] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   18.629097] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.630252] head: 0200000000000002 ffffea00040f3401 00000000ffffffff 00000000ffffffff
[   18.630619] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.631417] page dumped because: kasan: bad access detected
[   18.631628] 
[   18.631756] Memory state around the buggy address:
[   18.632715]  ffff888103ccff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.633397]  ffff888103ccff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.633664] >ffff888103cd0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.634424]                    ^
[   18.634899]  ffff888103cd0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.635926]  ffff888103cd0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.636606] ==================================================================
[   18.642909] ==================================================================
[   18.644351] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   18.644804] Free of addr ffff888103cd0000 by task kunit_try_catch/256
[   18.645529] 
[   18.645763] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.645875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.645899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.645943] Call Trace:
[   18.645973]  <TASK>
[   18.646013]  dump_stack_lvl+0x73/0xb0
[   18.646099]  print_report+0xd1/0x650
[   18.646149]  ? __virt_addr_valid+0x1db/0x2d0
[   18.646191]  ? kasan_addr_to_slab+0x11/0xa0
[   18.646215]  ? mempool_double_free_helper+0x184/0x370
[   18.646243]  kasan_report_invalid_free+0x10a/0x130
[   18.646300]  ? mempool_double_free_helper+0x184/0x370
[   18.646348]  ? mempool_double_free_helper+0x184/0x370
[   18.646389]  __kasan_mempool_poison_pages+0x115/0x130
[   18.646432]  mempool_free+0x290/0x380
[   18.646485]  mempool_double_free_helper+0x184/0x370
[   18.646539]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   18.646597]  ? __pfx_sched_clock_cpu+0x10/0x10
[   18.646649]  ? finish_task_switch.isra.0+0x153/0x700
[   18.646708]  mempool_page_alloc_double_free+0xe8/0x140
[   18.646794]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   18.646841]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   18.646873]  ? __pfx_mempool_free_pages+0x10/0x10
[   18.646928]  ? __pfx_read_tsc+0x10/0x10
[   18.646967]  ? ktime_get_ts64+0x86/0x230
[   18.647024]  kunit_try_run_case+0x1a5/0x480
[   18.647139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.647169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.647197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.647221]  ? __kthread_parkme+0x82/0x180
[   18.647245]  ? preempt_count_sub+0x50/0x80
[   18.647292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.647320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.647346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.647371]  kthread+0x337/0x6f0
[   18.647393]  ? trace_preempt_on+0x20/0xc0
[   18.647419]  ? __pfx_kthread+0x10/0x10
[   18.647442]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.647464]  ? calculate_sigpending+0x7b/0xa0
[   18.647492]  ? __pfx_kthread+0x10/0x10
[   18.647515]  ret_from_fork+0x116/0x1d0
[   18.647536]  ? __pfx_kthread+0x10/0x10
[   18.647558]  ret_from_fork_asm+0x1a/0x30
[   18.647591]  </TASK>
[   18.647606] 
[   18.660316] The buggy address belongs to the physical page:
[   18.660670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cd0
[   18.661137] flags: 0x200000000000000(node=0|zone=2)
[   18.661547] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   18.661857] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.662401] page dumped because: kasan: bad access detected
[   18.662781] 
[   18.663030] Memory state around the buggy address:
[   18.663314]  ffff888103ccff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.663845]  ffff888103ccff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.664118] >ffff888103cd0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.664610]                    ^
[   18.664927]  ffff888103cd0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.665278]  ffff888103cd0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.665667] ==================================================================