Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.719598] ==================================================================
[   34.720169] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.720481] Free of addr fff00000c59fb700 by task kunit_try_catch/246
[   34.720685] 
[   34.721009] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.721326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.721382] Hardware name: linux,dummy-virt (DT)
[   34.721451] Call trace:
[   34.721507]  show_stack+0x20/0x38 (C)
[   34.721731]  dump_stack_lvl+0x8c/0xd0
[   34.722037]  print_report+0x118/0x608
[   34.722298]  kasan_report_invalid_free+0xc0/0xe8
[   34.722602]  check_slab_allocation+0xd4/0x108
[   34.722817]  __kasan_mempool_poison_object+0x78/0x150
[   34.723101]  mempool_free+0x28c/0x328
[   34.723220]  mempool_double_free_helper+0x150/0x2e8
[   34.723621]  mempool_kmalloc_double_free+0xc0/0x118
[   34.723903]  kunit_try_run_case+0x170/0x3f0
[   34.724131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.724275]  kthread+0x328/0x630
[   34.724468]  ret_from_fork+0x10/0x20
[   34.724851] 
[   34.724918] Allocated by task 246:
[   34.724978]  kasan_save_stack+0x3c/0x68
[   34.725068]  kasan_save_track+0x20/0x40
[   34.725263]  kasan_save_alloc_info+0x40/0x58
[   34.725435]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.725694]  remove_element+0x130/0x1f8
[   34.725899]  mempool_alloc_preallocated+0x58/0xc0
[   34.726015]  mempool_double_free_helper+0x94/0x2e8
[   34.726190]  mempool_kmalloc_double_free+0xc0/0x118
[   34.726519]  kunit_try_run_case+0x170/0x3f0
[   34.726760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.726872]  kthread+0x328/0x630
[   34.727055]  ret_from_fork+0x10/0x20
[   34.727257] 
[   34.727330] Freed by task 246:
[   34.727549]  kasan_save_stack+0x3c/0x68
[   34.727763]  kasan_save_track+0x20/0x40
[   34.727856]  kasan_save_free_info+0x4c/0x78
[   34.727960]  __kasan_mempool_poison_object+0xc0/0x150
[   34.728383]  mempool_free+0x28c/0x328
[   34.728503]  mempool_double_free_helper+0x100/0x2e8
[   34.728835]  mempool_kmalloc_double_free+0xc0/0x118
[   34.728924]  kunit_try_run_case+0x170/0x3f0
[   34.729007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.729107]  kthread+0x328/0x630
[   34.729328]  ret_from_fork+0x10/0x20
[   34.729420] 
[   34.729477] The buggy address belongs to the object at fff00000c59fb700
[   34.729477]  which belongs to the cache kmalloc-128 of size 128
[   34.729578] The buggy address is located 0 bytes inside of
[   34.729578]  128-byte region [fff00000c59fb700, fff00000c59fb780)
[   34.729672] 
[   34.729704] The buggy address belongs to the physical page:
[   34.729741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb
[   34.729810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.729875] page_type: f5(slab)
[   34.729928] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.729988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.730038] page dumped because: kasan: bad access detected
[   34.730073] 
[   34.730094] Memory state around the buggy address:
[   34.730136]  fff00000c59fb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.730188]  fff00000c59fb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.730239] >fff00000c59fb700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.730285]                    ^
[   34.730318]  fff00000c59fb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.730367]  fff00000c59fb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.730413] ==================================================================
[   34.743116] ==================================================================
[   34.743301] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.743460] Free of addr fff00000c5a48000 by task kunit_try_catch/248
[   34.743550] 
[   34.743641] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.743828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.743890] Hardware name: linux,dummy-virt (DT)
[   34.743969] Call trace:
[   34.744133]  show_stack+0x20/0x38 (C)
[   34.744463]  dump_stack_lvl+0x8c/0xd0
[   34.744693]  print_report+0x118/0x608
[   34.744817]  kasan_report_invalid_free+0xc0/0xe8
[   34.745342]  __kasan_mempool_poison_object+0x14c/0x150
[   34.745525]  mempool_free+0x28c/0x328
[   34.745647]  mempool_double_free_helper+0x150/0x2e8
[   34.745756]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.745990]  kunit_try_run_case+0x170/0x3f0
[   34.746128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.746786]  kthread+0x328/0x630
[   34.746926]  ret_from_fork+0x10/0x20
[   34.747054] 
[   34.747112] The buggy address belongs to the physical page:
[   34.747204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48
[   34.747350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.747509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.747683] page_type: f8(unknown)
[   34.747796] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.747928] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.748071] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.748253] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.748379] head: 0bfffe0000000002 ffffc1ffc3169201 00000000ffffffff 00000000ffffffff
[   34.748503] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.749047] page dumped because: kasan: bad access detected
[   34.749237] 
[   34.749297] Memory state around the buggy address:
[   34.749424]  fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749549]  fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749655] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749730]                    ^
[   34.749788]  fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749878]  fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.749979] ==================================================================
[   34.766759] ==================================================================
[   34.766959] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.767511] Free of addr fff00000c5a48000 by task kunit_try_catch/250
[   34.767722] 
[   34.767856] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   34.768368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.768637] Hardware name: linux,dummy-virt (DT)
[   34.768769] Call trace:
[   34.768866]  show_stack+0x20/0x38 (C)
[   34.769066]  dump_stack_lvl+0x8c/0xd0
[   34.769398]  print_report+0x118/0x608
[   34.769501]  kasan_report_invalid_free+0xc0/0xe8
[   34.769670]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.769866]  mempool_free+0x24c/0x328
[   34.770109]  mempool_double_free_helper+0x150/0x2e8
[   34.770450]  mempool_page_alloc_double_free+0xbc/0x118
[   34.770703]  kunit_try_run_case+0x170/0x3f0
[   34.770919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.771099]  kthread+0x328/0x630
[   34.771204]  ret_from_fork+0x10/0x20
[   34.771533] 
[   34.771623] The buggy address belongs to the physical page:
[   34.771712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48
[   34.771984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.772189] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.772516] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.772655] page dumped because: kasan: bad access detected
[   34.772744] 
[   34.773055] Memory state around the buggy address:
[   34.773170]  fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.773482]  fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.773578] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.773737]                    ^
[   34.773814]  fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.774029]  fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.774213] ==================================================================

[   27.499465] ==================================================================
[   27.500247] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.501105] Free of addr ffff888102a64000 by task kunit_try_catch/266
[   27.501614] 
[   27.501782] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.501894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.501922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.501971] Call Trace:
[   27.502005]  <TASK>
[   27.502073]  dump_stack_lvl+0x73/0xb0
[   27.502160]  print_report+0xd1/0x650
[   27.502210]  ? __virt_addr_valid+0x1db/0x2d0
[   27.502265]  ? kasan_addr_to_slab+0x11/0xa0
[   27.502305]  ? mempool_double_free_helper+0x184/0x370
[   27.502379]  kasan_report_invalid_free+0x10a/0x130
[   27.502455]  ? mempool_double_free_helper+0x184/0x370
[   27.502514]  ? mempool_double_free_helper+0x184/0x370
[   27.502594]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   27.502649]  mempool_free+0x2ec/0x380
[   27.502712]  mempool_double_free_helper+0x184/0x370
[   27.502768]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.502815]  ? __kasan_check_write+0x18/0x20
[   27.502858]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.502895]  ? finish_task_switch.isra.0+0x153/0x700
[   27.502939]  mempool_kmalloc_large_double_free+0xed/0x140
[   27.502985]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   27.503022]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.503046]  ? __pfx_mempool_kfree+0x10/0x10
[   27.503072]  ? __pfx_read_tsc+0x10/0x10
[   27.503097]  ? ktime_get_ts64+0x86/0x230
[   27.503125]  kunit_try_run_case+0x1a5/0x480
[   27.503181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.503212]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.503239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.503262]  ? __kthread_parkme+0x82/0x180
[   27.503284]  ? preempt_count_sub+0x50/0x80
[   27.503308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.503331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.503355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.503378]  kthread+0x337/0x6f0
[   27.503398]  ? trace_preempt_on+0x20/0xc0
[   27.503422]  ? __pfx_kthread+0x10/0x10
[   27.503463]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.503487]  ? calculate_sigpending+0x7b/0xa0
[   27.503512]  ? __pfx_kthread+0x10/0x10
[   27.503535]  ret_from_fork+0x116/0x1d0
[   27.503565]  ? __pfx_kthread+0x10/0x10
[   27.503601]  ret_from_fork_asm+0x1a/0x30
[   27.503652]  </TASK>
[   27.503673] 
[   27.517296] The buggy address belongs to the physical page:
[   27.518007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a64
[   27.518907] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.519742] flags: 0x200000000000040(head|node=0|zone=2)
[   27.520228] page_type: f8(unknown)
[   27.520531] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.521103] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.522112] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.522778] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.523122] head: 0200000000000002 ffffea00040a9901 00000000ffffffff 00000000ffffffff
[   27.523701] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.524041] page dumped because: kasan: bad access detected
[   27.524818] 
[   27.525058] Memory state around the buggy address:
[   27.525486]  ffff888102a63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.526003]  ffff888102a63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.526762] >ffff888102a64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.527166]                    ^
[   27.527472]  ffff888102a64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.527929]  ffff888102a64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.528373] ==================================================================
[   27.449317] ==================================================================
[   27.450200] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.450830] Free of addr ffff88810232aa00 by task kunit_try_catch/264
[   27.451313] 
[   27.451532] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.451670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.451695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.451738] Call Trace:
[   27.451778]  <TASK>
[   27.451816]  dump_stack_lvl+0x73/0xb0
[   27.451899]  print_report+0xd1/0x650
[   27.451970]  ? __virt_addr_valid+0x1db/0x2d0
[   27.452038]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.452089]  ? mempool_double_free_helper+0x184/0x370
[   27.452143]  kasan_report_invalid_free+0x10a/0x130
[   27.452208]  ? mempool_double_free_helper+0x184/0x370
[   27.452261]  ? mempool_double_free_helper+0x184/0x370
[   27.452312]  ? mempool_double_free_helper+0x184/0x370
[   27.452363]  check_slab_allocation+0x101/0x130
[   27.452415]  __kasan_mempool_poison_object+0x91/0x1d0
[   27.452481]  mempool_free+0x2ec/0x380
[   27.452544]  mempool_double_free_helper+0x184/0x370
[   27.452603]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.452660]  ? pick_eevdf+0x3c9/0x590
[   27.452716]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.452757]  ? finish_task_switch.isra.0+0x153/0x700
[   27.452813]  mempool_kmalloc_double_free+0xed/0x140
[   27.452857]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.452901]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.452936]  ? __pfx_mempool_kfree+0x10/0x10
[   27.452976]  ? __pfx_read_tsc+0x10/0x10
[   27.453013]  ? ktime_get_ts64+0x86/0x230
[   27.453057]  kunit_try_run_case+0x1a5/0x480
[   27.453101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.453133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.453172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.453207]  ? __kthread_parkme+0x82/0x180
[   27.453242]  ? preempt_count_sub+0x50/0x80
[   27.453285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.453321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.453348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.453374]  kthread+0x337/0x6f0
[   27.453397]  ? trace_preempt_on+0x20/0xc0
[   27.453423]  ? __pfx_kthread+0x10/0x10
[   27.453471]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.453498]  ? calculate_sigpending+0x7b/0xa0
[   27.453526]  ? __pfx_kthread+0x10/0x10
[   27.453549]  ret_from_fork+0x116/0x1d0
[   27.453579]  ? __pfx_kthread+0x10/0x10
[   27.453615]  ret_from_fork_asm+0x1a/0x30
[   27.453671]  </TASK>
[   27.453692] 
[   27.471539] Allocated by task 264:
[   27.471922]  kasan_save_stack+0x45/0x70
[   27.472319]  kasan_save_track+0x18/0x40
[   27.472655]  kasan_save_alloc_info+0x3b/0x50
[   27.473068]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.473636]  remove_element+0x11e/0x190
[   27.474108]  mempool_alloc_preallocated+0x4d/0x90
[   27.474562]  mempool_double_free_helper+0x8a/0x370
[   27.475096]  mempool_kmalloc_double_free+0xed/0x140
[   27.475347]  kunit_try_run_case+0x1a5/0x480
[   27.475686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.476138]  kthread+0x337/0x6f0
[   27.476528]  ret_from_fork+0x116/0x1d0
[   27.476930]  ret_from_fork_asm+0x1a/0x30
[   27.477366] 
[   27.477557] Freed by task 264:
[   27.477882]  kasan_save_stack+0x45/0x70
[   27.478270]  kasan_save_track+0x18/0x40
[   27.478435]  kasan_save_free_info+0x3f/0x60
[   27.478756]  __kasan_mempool_poison_object+0x131/0x1d0
[   27.479516]  mempool_free+0x2ec/0x380
[   27.480101]  mempool_double_free_helper+0x109/0x370
[   27.480319]  mempool_kmalloc_double_free+0xed/0x140
[   27.480664]  kunit_try_run_case+0x1a5/0x480
[   27.481107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.481554]  kthread+0x337/0x6f0
[   27.481946]  ret_from_fork+0x116/0x1d0
[   27.482172]  ret_from_fork_asm+0x1a/0x30
[   27.482363] 
[   27.482559] The buggy address belongs to the object at ffff88810232aa00
[   27.482559]  which belongs to the cache kmalloc-128 of size 128
[   27.484189] The buggy address is located 0 bytes inside of
[   27.484189]  128-byte region [ffff88810232aa00, ffff88810232aa80)
[   27.484991] 
[   27.485226] The buggy address belongs to the physical page:
[   27.485926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a
[   27.486330] flags: 0x200000000000000(node=0|zone=2)
[   27.486744] page_type: f5(slab)
[   27.486992] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.487687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.488340] page dumped because: kasan: bad access detected
[   27.488601] 
[   27.488707] Memory state around the buggy address:
[   27.489128]  ffff88810232a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.490301]  ffff88810232a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.490947] >ffff88810232aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.491310]                    ^
[   27.491603]  ffff88810232aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.492336]  ffff88810232ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.492652] ==================================================================
[   27.535380] ==================================================================
[   27.536106] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.537349] Free of addr ffff888102a64000 by task kunit_try_catch/268
[   27.538070] 
[   27.538275] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   27.538393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.538420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.538481] Call Trace:
[   27.538512]  <TASK>
[   27.538587]  dump_stack_lvl+0x73/0xb0
[   27.538771]  print_report+0xd1/0x650
[   27.538818]  ? __virt_addr_valid+0x1db/0x2d0
[   27.538861]  ? kasan_addr_to_slab+0x11/0xa0
[   27.538883]  ? mempool_double_free_helper+0x184/0x370
[   27.538910]  kasan_report_invalid_free+0x10a/0x130
[   27.538936]  ? mempool_double_free_helper+0x184/0x370
[   27.538966]  ? mempool_double_free_helper+0x184/0x370
[   27.538990]  __kasan_mempool_poison_pages+0x115/0x130
[   27.539017]  mempool_free+0x290/0x380
[   27.539044]  mempool_double_free_helper+0x184/0x370
[   27.539068]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.539095]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.539119]  ? finish_task_switch.isra.0+0x153/0x700
[   27.539152]  mempool_page_alloc_double_free+0xe8/0x140
[   27.539193]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   27.539221]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   27.539245]  ? __pfx_mempool_free_pages+0x10/0x10
[   27.539271]  ? __pfx_read_tsc+0x10/0x10
[   27.539293]  ? ktime_get_ts64+0x86/0x230
[   27.539320]  kunit_try_run_case+0x1a5/0x480
[   27.539347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.539369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.539394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.539418]  ? __kthread_parkme+0x82/0x180
[   27.539460]  ? preempt_count_sub+0x50/0x80
[   27.539490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.539515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.539540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.539579]  kthread+0x337/0x6f0
[   27.539612]  ? trace_preempt_on+0x20/0xc0
[   27.539651]  ? __pfx_kthread+0x10/0x10
[   27.539685]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.539717]  ? calculate_sigpending+0x7b/0xa0
[   27.539756]  ? __pfx_kthread+0x10/0x10
[   27.539792]  ret_from_fork+0x116/0x1d0
[   27.539822]  ? __pfx_kthread+0x10/0x10
[   27.539855]  ret_from_fork_asm+0x1a/0x30
[   27.539908]  </TASK>
[   27.539930] 
[   27.555024] The buggy address belongs to the physical page:
[   27.555603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a64
[   27.556387] flags: 0x200000000000000(node=0|zone=2)
[   27.556913] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   27.557534] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.557891] page dumped because: kasan: bad access detected
[   27.558293] 
[   27.558388] Memory state around the buggy address:
[   27.558580]  ffff888102a63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.559105]  ffff888102a63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.559528] >ffff888102a64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.559792]                    ^
[   27.560068]  ffff888102a64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.561025]  ffff888102a64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.561676] ==================================================================