Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.826022] ==================================================================
[   32.826080] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.826377] Free of addr fff00000c9bfc000 by task kunit_try_catch/270
[   32.826580] 
[   32.826885] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.827060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.827176] Hardware name: linux,dummy-virt (DT)
[   32.827211] Call trace:
[   32.827235]  show_stack+0x20/0x38 (C)
[   32.827285]  dump_stack_lvl+0x8c/0xd0
[   32.827340]  print_report+0x118/0x5d0
[   32.827564]  kasan_report_invalid_free+0xc0/0xe8
[   32.827640]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.827852]  mempool_free+0x24c/0x328
[   32.827900]  mempool_double_free_helper+0x150/0x2e8
[   32.827952]  mempool_page_alloc_double_free+0xbc/0x118
[   32.828151]  kunit_try_run_case+0x170/0x3f0
[   32.828406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.828463]  kthread+0x328/0x630
[   32.828791]  ret_from_fork+0x10/0x20
[   32.828878] 
[   32.828949] The buggy address belongs to the physical page:
[   32.829049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc
[   32.829148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.829266] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.829377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.829420] page dumped because: kasan: bad access detected
[   32.829451] 
[   32.829469] Memory state around the buggy address:
[   32.829581]  fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829765]  fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829810] >fff00000c9bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829850]                    ^
[   32.829878]  fff00000c9bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829922]  fff00000c9bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.829989] ==================================================================
[   32.809853] ==================================================================
[   32.809926] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.809984] Free of addr fff00000c9bf8000 by task kunit_try_catch/268
[   32.810238] 
[   32.810397] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.810758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.810937] Hardware name: linux,dummy-virt (DT)
[   32.811003] Call trace:
[   32.811026]  show_stack+0x20/0x38 (C)
[   32.811079]  dump_stack_lvl+0x8c/0xd0
[   32.811129]  print_report+0x118/0x5d0
[   32.811173]  kasan_report_invalid_free+0xc0/0xe8
[   32.811228]  __kasan_mempool_poison_object+0x14c/0x150
[   32.811468]  mempool_free+0x28c/0x328
[   32.811562]  mempool_double_free_helper+0x150/0x2e8
[   32.811815]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.811871]  kunit_try_run_case+0x170/0x3f0
[   32.812157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812347]  kthread+0x328/0x630
[   32.812395]  ret_from_fork+0x10/0x20
[   32.812778] 
[   32.812817] The buggy address belongs to the physical page:
[   32.812858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.812958] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.813190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.813252] page_type: f8(unknown)
[   32.813526] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.813587] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.813645] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.813696] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.814050] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff
[   32.814105] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.814148] page dumped because: kasan: bad access detected
[   32.814179] 
[   32.814546] Memory state around the buggy address:
[   32.814622]  fff00000c9bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.814668]  fff00000c9bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815039] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815087]                    ^
[   32.815117]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815224]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.815308] ==================================================================
[   32.787875] ==================================================================
[   32.787944] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.787997] Free of addr fff00000c9ba2a00 by task kunit_try_catch/266
[   32.788320] 
[   32.788394] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   32.788494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.788601] Hardware name: linux,dummy-virt (DT)
[   32.788638] Call trace:
[   32.788660]  show_stack+0x20/0x38 (C)
[   32.788713]  dump_stack_lvl+0x8c/0xd0
[   32.788760]  print_report+0x118/0x5d0
[   32.789132]  kasan_report_invalid_free+0xc0/0xe8
[   32.789185]  check_slab_allocation+0xd4/0x108
[   32.789254]  __kasan_mempool_poison_object+0x78/0x150
[   32.789320]  mempool_free+0x28c/0x328
[   32.789365]  mempool_double_free_helper+0x150/0x2e8
[   32.789417]  mempool_kmalloc_double_free+0xc0/0x118
[   32.789469]  kunit_try_run_case+0x170/0x3f0
[   32.789526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.789580]  kthread+0x328/0x630
[   32.790008]  ret_from_fork+0x10/0x20
[   32.790223] 
[   32.790267] Allocated by task 266:
[   32.790370]  kasan_save_stack+0x3c/0x68
[   32.790411]  kasan_save_track+0x20/0x40
[   32.790469]  kasan_save_alloc_info+0x40/0x58
[   32.790794]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.790846]  remove_element+0x130/0x1f8
[   32.791138]  mempool_alloc_preallocated+0x58/0xc0
[   32.791250]  mempool_double_free_helper+0x94/0x2e8
[   32.791319]  mempool_kmalloc_double_free+0xc0/0x118
[   32.791492]  kunit_try_run_case+0x170/0x3f0
[   32.791548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.791605]  kthread+0x328/0x630
[   32.791639]  ret_from_fork+0x10/0x20
[   32.791674] 
[   32.791695] Freed by task 266:
[   32.791749]  kasan_save_stack+0x3c/0x68
[   32.791828]  kasan_save_track+0x20/0x40
[   32.791864]  kasan_save_free_info+0x4c/0x78
[   32.792581]  __kasan_mempool_poison_object+0xc0/0x150
[   32.792641]  mempool_free+0x28c/0x328
[   32.792678]  mempool_double_free_helper+0x100/0x2e8
[   32.792722]  mempool_kmalloc_double_free+0xc0/0x118
[   32.793056]  kunit_try_run_case+0x170/0x3f0
[   32.793101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.793146]  kthread+0x328/0x630
[   32.793378]  ret_from_fork+0x10/0x20
[   32.793428] 
[   32.793532] The buggy address belongs to the object at fff00000c9ba2a00
[   32.793532]  which belongs to the cache kmalloc-128 of size 128
[   32.793600] The buggy address is located 0 bytes inside of
[   32.793600]  128-byte region [fff00000c9ba2a00, fff00000c9ba2a80)
[   32.793838] 
[   32.793858] The buggy address belongs to the physical page:
[   32.793947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ba2
[   32.794028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.794127] page_type: f5(slab)
[   32.794249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.794399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.794513] page dumped because: kasan: bad access detected
[   32.794544] 
[   32.794563] Memory state around the buggy address:
[   32.794595]  fff00000c9ba2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.794802]  fff00000c9ba2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.795206] >fff00000c9ba2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.795495]                    ^
[   32.795803]  fff00000c9ba2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.795879]  fff00000c9ba2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.795920] ==================================================================

[   24.968036] ==================================================================
[   24.968986] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.969331] Free of addr ffff888106104000 by task kunit_try_catch/286
[   24.969756] 
[   24.970161] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   24.970227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.970242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.970266] Call Trace:
[   24.970303]  <TASK>
[   24.970325]  dump_stack_lvl+0x73/0xb0
[   24.970363]  print_report+0xd1/0x610
[   24.970388]  ? __virt_addr_valid+0x1db/0x2d0
[   24.970415]  ? kasan_addr_to_slab+0x11/0xa0
[   24.970434]  ? mempool_double_free_helper+0x184/0x370
[   24.970459]  kasan_report_invalid_free+0x10a/0x130
[   24.970482]  ? mempool_double_free_helper+0x184/0x370
[   24.970508]  ? mempool_double_free_helper+0x184/0x370
[   24.970531]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   24.970554]  mempool_free+0x2ec/0x380
[   24.970582]  mempool_double_free_helper+0x184/0x370
[   24.970606]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.970668]  ? dequeue_entities+0x23f/0x1630
[   24.970694]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.970716]  ? finish_task_switch.isra.0+0x153/0x700
[   24.970742]  mempool_kmalloc_large_double_free+0xed/0x140
[   24.970766]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   24.970793]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.970814]  ? __pfx_mempool_kfree+0x10/0x10
[   24.970838]  ? __pfx_read_tsc+0x10/0x10
[   24.970861]  ? ktime_get_ts64+0x86/0x230
[   24.970958]  kunit_try_run_case+0x1a5/0x480
[   24.970985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.971008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.971032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.971055]  ? __kthread_parkme+0x82/0x180
[   24.971077]  ? preempt_count_sub+0x50/0x80
[   24.971098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.971121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.971148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.971174]  kthread+0x337/0x6f0
[   24.971194]  ? trace_preempt_on+0x20/0xc0
[   24.971218]  ? __pfx_kthread+0x10/0x10
[   24.971237]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.971258]  ? calculate_sigpending+0x7b/0xa0
[   24.971283]  ? __pfx_kthread+0x10/0x10
[   24.971316]  ret_from_fork+0x116/0x1d0
[   24.971336]  ? __pfx_kthread+0x10/0x10
[   24.971356]  ret_from_fork_asm+0x1a/0x30
[   24.971388]  </TASK>
[   24.971400] 
[   24.986455] The buggy address belongs to the physical page:
[   24.986993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106104
[   24.987467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.988009] flags: 0x200000000000040(head|node=0|zone=2)
[   24.988251] page_type: f8(unknown)
[   24.988713] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.989316] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.990141] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.990719] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.991255] head: 0200000000000002 ffffea0004184101 00000000ffffffff 00000000ffffffff
[   24.991779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.992269] page dumped because: kasan: bad access detected
[   24.992514] 
[   24.992814] Memory state around the buggy address:
[   24.993266]  ffff888106103f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.993737]  ffff888106103f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.994243] >ffff888106104000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.994543]                    ^
[   24.994885]  ffff888106104080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.995682]  ffff888106104100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.996191] ==================================================================
[   24.924915] ==================================================================
[   24.925345] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.925688] Free of addr ffff88810611d200 by task kunit_try_catch/284
[   24.926136] 
[   24.926236] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   24.926307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.926323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.926347] Call Trace:
[   24.926363]  <TASK>
[   24.926383]  dump_stack_lvl+0x73/0xb0
[   24.926416]  print_report+0xd1/0x610
[   24.926442]  ? __virt_addr_valid+0x1db/0x2d0
[   24.926469]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.926497]  ? mempool_double_free_helper+0x184/0x370
[   24.926524]  kasan_report_invalid_free+0x10a/0x130
[   24.926550]  ? mempool_double_free_helper+0x184/0x370
[   24.926578]  ? mempool_double_free_helper+0x184/0x370
[   24.926602]  ? mempool_double_free_helper+0x184/0x370
[   24.926626]  check_slab_allocation+0x101/0x130
[   24.926650]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.926675]  mempool_free+0x2ec/0x380
[   24.926699]  ? __wake_up+0x49/0x60
[   24.926727]  mempool_double_free_helper+0x184/0x370
[   24.926752]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.926777]  ? dequeue_entities+0x23f/0x1630
[   24.926804]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.926826]  ? finish_task_switch.isra.0+0x153/0x700
[   24.926853]  mempool_kmalloc_double_free+0xed/0x140
[   24.926958]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   24.926986]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.927009]  ? __pfx_mempool_kfree+0x10/0x10
[   24.927036]  ? __pfx_read_tsc+0x10/0x10
[   24.927061]  ? ktime_get_ts64+0x86/0x230
[   24.927088]  kunit_try_run_case+0x1a5/0x480
[   24.927115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.927139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.927165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.927188]  ? __kthread_parkme+0x82/0x180
[   24.927210]  ? preempt_count_sub+0x50/0x80
[   24.927234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.927259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.927288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.927327]  kthread+0x337/0x6f0
[   24.927348]  ? trace_preempt_on+0x20/0xc0
[   24.927373]  ? __pfx_kthread+0x10/0x10
[   24.927395]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.927417]  ? calculate_sigpending+0x7b/0xa0
[   24.927443]  ? __pfx_kthread+0x10/0x10
[   24.927466]  ret_from_fork+0x116/0x1d0
[   24.927486]  ? __pfx_kthread+0x10/0x10
[   24.927508]  ret_from_fork_asm+0x1a/0x30
[   24.927543]  </TASK>
[   24.927556] 
[   24.942128] Allocated by task 284:
[   24.943143]  kasan_save_stack+0x45/0x70
[   24.943346]  kasan_save_track+0x18/0x40
[   24.944144]  kasan_save_alloc_info+0x3b/0x50
[   24.944835]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.945543]  remove_element+0x11e/0x190
[   24.946071]  mempool_alloc_preallocated+0x4d/0x90
[   24.946592]  mempool_double_free_helper+0x8a/0x370
[   24.947281]  mempool_kmalloc_double_free+0xed/0x140
[   24.947473]  kunit_try_run_case+0x1a5/0x480
[   24.947655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.948423]  kthread+0x337/0x6f0
[   24.948898]  ret_from_fork+0x116/0x1d0
[   24.949465]  ret_from_fork_asm+0x1a/0x30
[   24.950134] 
[   24.950328] Freed by task 284:
[   24.950452]  kasan_save_stack+0x45/0x70
[   24.950615]  kasan_save_track+0x18/0x40
[   24.951124]  kasan_save_free_info+0x3f/0x60
[   24.951580]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.952162]  mempool_free+0x2ec/0x380
[   24.952375]  mempool_double_free_helper+0x109/0x370
[   24.952539]  mempool_kmalloc_double_free+0xed/0x140
[   24.953027]  kunit_try_run_case+0x1a5/0x480
[   24.953498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.954074]  kthread+0x337/0x6f0
[   24.954432]  ret_from_fork+0x116/0x1d0
[   24.954571]  ret_from_fork_asm+0x1a/0x30
[   24.954712] 
[   24.954783] The buggy address belongs to the object at ffff88810611d200
[   24.954783]  which belongs to the cache kmalloc-128 of size 128
[   24.955844] The buggy address is located 0 bytes inside of
[   24.955844]  128-byte region [ffff88810611d200, ffff88810611d280)
[   24.956988] 
[   24.957238] The buggy address belongs to the physical page:
[   24.957743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10611d
[   24.958175] flags: 0x200000000000000(node=0|zone=2)
[   24.958680] page_type: f5(slab)
[   24.959085] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.959735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.959986] page dumped because: kasan: bad access detected
[   24.960159] 
[   24.960226] Memory state around the buggy address:
[   24.960615]  ffff88810611d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.961391]  ffff88810611d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.961904] >ffff88810611d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.962416]                    ^
[   24.962543]  ffff88810611d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.963394]  ffff88810611d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.964128] ==================================================================
[   25.000235] ==================================================================
[   25.000678] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.000921] Free of addr ffff888106104000 by task kunit_try_catch/288
[   25.001112] 
[   25.001197] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.001249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.001262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.001285] Call Trace:
[   25.001801]  <TASK>
[   25.001831]  dump_stack_lvl+0x73/0xb0
[   25.002133]  print_report+0xd1/0x610
[   25.002161]  ? __virt_addr_valid+0x1db/0x2d0
[   25.002187]  ? kasan_addr_to_slab+0x11/0xa0
[   25.002207]  ? mempool_double_free_helper+0x184/0x370
[   25.002231]  kasan_report_invalid_free+0x10a/0x130
[   25.002255]  ? mempool_double_free_helper+0x184/0x370
[   25.002281]  ? mempool_double_free_helper+0x184/0x370
[   25.002793]  __kasan_mempool_poison_pages+0x115/0x130
[   25.002824]  mempool_free+0x290/0x380
[   25.002982]  mempool_double_free_helper+0x184/0x370
[   25.003009]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.003035]  ? dequeue_entities+0x23f/0x1630
[   25.003061]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.003083]  ? finish_task_switch.isra.0+0x153/0x700
[   25.003107]  mempool_page_alloc_double_free+0xe8/0x140
[   25.003132]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.003160]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.003183]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.003208]  ? __pfx_read_tsc+0x10/0x10
[   25.003232]  ? ktime_get_ts64+0x86/0x230
[   25.003258]  kunit_try_run_case+0x1a5/0x480
[   25.003283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.003317]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.003341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.003363]  ? __kthread_parkme+0x82/0x180
[   25.003383]  ? preempt_count_sub+0x50/0x80
[   25.003405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.003427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.003454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.003480]  kthread+0x337/0x6f0
[   25.003499]  ? trace_preempt_on+0x20/0xc0
[   25.003523]  ? __pfx_kthread+0x10/0x10
[   25.003542]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.003582]  ? calculate_sigpending+0x7b/0xa0
[   25.003607]  ? __pfx_kthread+0x10/0x10
[   25.003627]  ret_from_fork+0x116/0x1d0
[   25.003647]  ? __pfx_kthread+0x10/0x10
[   25.003666]  ret_from_fork_asm+0x1a/0x30
[   25.003698]  </TASK>
[   25.003709] 
[   25.020788] The buggy address belongs to the physical page:
[   25.021450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106104
[   25.021727] flags: 0x200000000000000(node=0|zone=2)
[   25.022183] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.023082] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.023828] page dumped because: kasan: bad access detected
[   25.024139] 
[   25.024316] Memory state around the buggy address:
[   25.024923]  ffff888106103f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.025190]  ffff888106103f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.025413] >ffff888106104000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.025739]                    ^
[   25.026105]  ffff888106104080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.026822]  ffff888106104100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.027636] ==================================================================