Hay
Date
July 17, 2025, 10:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.755593] ==================================================================
[   31.755653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.756010] Free of addr fff00000c9bd4000 by task kunit_try_catch/268
[   31.756306] 
[   31.756347] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.756673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.756836] Hardware name: linux,dummy-virt (DT)
[   31.756868] Call trace:
[   31.756969]  show_stack+0x20/0x38 (C)
[   31.757229]  dump_stack_lvl+0x8c/0xd0
[   31.757322]  print_report+0x118/0x5d0
[   31.757687]  kasan_report_invalid_free+0xc0/0xe8
[   31.757884]  __kasan_mempool_poison_object+0x14c/0x150
[   31.757972]  mempool_free+0x28c/0x328
[   31.758343]  mempool_double_free_helper+0x150/0x2e8
[   31.758455]  mempool_kmalloc_large_double_free+0xc0/0x118
[   31.758549]  kunit_try_run_case+0x170/0x3f0
[   31.758937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.759049]  kthread+0x328/0x630
[   31.759177]  ret_from_fork+0x10/0x20
[   31.759268] 
[   31.759581] The buggy address belongs to the physical page:
[   31.759648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4
[   31.759706] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.760045] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.760246] page_type: f8(unknown)
[   31.760307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.760784] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.760844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.762123] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.762183] head: 0bfffe0000000002 ffffc1ffc326f501 00000000ffffffff 00000000ffffffff
[   31.762233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.762275] page dumped because: kasan: bad access detected
[   31.762305] 
[   31.762325] Memory state around the buggy address:
[   31.762357]  fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762401]  fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762443] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762481]                    ^
[   31.762509]  fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762550]  fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.762588] ==================================================================
[   31.736412] ==================================================================
[   31.736641] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.737382] Free of addr fff00000c98f2500 by task kunit_try_catch/266
[   31.737484] 
[   31.737786] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.737887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.737938] Hardware name: linux,dummy-virt (DT)
[   31.738114] Call trace:
[   31.738203]  show_stack+0x20/0x38 (C)
[   31.738376]  dump_stack_lvl+0x8c/0xd0
[   31.738432]  print_report+0x118/0x5d0
[   31.738502]  kasan_report_invalid_free+0xc0/0xe8
[   31.738597]  check_slab_allocation+0xd4/0x108
[   31.738661]  __kasan_mempool_poison_object+0x78/0x150
[   31.738711]  mempool_free+0x28c/0x328
[   31.738763]  mempool_double_free_helper+0x150/0x2e8
[   31.738818]  mempool_kmalloc_double_free+0xc0/0x118
[   31.738868]  kunit_try_run_case+0x170/0x3f0
[   31.738916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.738970]  kthread+0x328/0x630
[   31.739013]  ret_from_fork+0x10/0x20
[   31.739088] 
[   31.739117] Allocated by task 266:
[   31.739164]  kasan_save_stack+0x3c/0x68
[   31.739215]  kasan_save_track+0x20/0x40
[   31.739251]  kasan_save_alloc_info+0x40/0x58
[   31.739289]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.739329]  remove_element+0x130/0x1f8
[   31.739366]  mempool_alloc_preallocated+0x58/0xc0
[   31.739409]  mempool_double_free_helper+0x94/0x2e8
[   31.739450]  mempool_kmalloc_double_free+0xc0/0x118
[   31.739491]  kunit_try_run_case+0x170/0x3f0
[   31.739529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.739582]  kthread+0x328/0x630
[   31.739613]  ret_from_fork+0x10/0x20
[   31.739659] 
[   31.739693] Freed by task 266:
[   31.739727]  kasan_save_stack+0x3c/0x68
[   31.739770]  kasan_save_track+0x20/0x40
[   31.739820]  kasan_save_free_info+0x4c/0x78
[   31.739857]  __kasan_mempool_poison_object+0xc0/0x150
[   31.739906]  mempool_free+0x28c/0x328
[   31.739942]  mempool_double_free_helper+0x100/0x2e8
[   31.739984]  mempool_kmalloc_double_free+0xc0/0x118
[   31.740024]  kunit_try_run_case+0x170/0x3f0
[   31.740793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.740872]  kthread+0x328/0x630
[   31.740925]  ret_from_fork+0x10/0x20
[   31.741345] 
[   31.741396] The buggy address belongs to the object at fff00000c98f2500
[   31.741396]  which belongs to the cache kmalloc-128 of size 128
[   31.741462] The buggy address is located 0 bytes inside of
[   31.741462]  128-byte region [fff00000c98f2500, fff00000c98f2580)
[   31.741592] 
[   31.742014] The buggy address belongs to the physical page:
[   31.742548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1098f2
[   31.742811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.743070] page_type: f5(slab)
[   31.743211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.743787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.743862] page dumped because: kasan: bad access detected
[   31.744205] 
[   31.744262] Memory state around the buggy address:
[   31.744316]  fff00000c98f2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.744515]  fff00000c98f2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.744579] >fff00000c98f2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.744695]                    ^
[   31.744727]  fff00000c98f2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.744790]  fff00000c98f2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.745128] ==================================================================
[   31.773403] ==================================================================
[   31.773464] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.773520] Free of addr fff00000c9bd4000 by task kunit_try_catch/270
[   31.773561] 
[   31.773593] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   31.773676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.773703] Hardware name: linux,dummy-virt (DT)
[   31.773786] Call trace:
[   31.773810]  show_stack+0x20/0x38 (C)
[   31.773860]  dump_stack_lvl+0x8c/0xd0
[   31.773916]  print_report+0x118/0x5d0
[   31.773972]  kasan_report_invalid_free+0xc0/0xe8
[   31.774032]  __kasan_mempool_poison_pages+0xe0/0xe8
[   31.774104]  mempool_free+0x24c/0x328
[   31.774226]  mempool_double_free_helper+0x150/0x2e8
[   31.774278]  mempool_page_alloc_double_free+0xbc/0x118
[   31.774367]  kunit_try_run_case+0x170/0x3f0
[   31.774422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.774475]  kthread+0x328/0x630
[   31.774523]  ret_from_fork+0x10/0x20
[   31.774573] 
[   31.774593] The buggy address belongs to the physical page:
[   31.774764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd4
[   31.774827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.774902] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.774969] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.775012] page dumped because: kasan: bad access detected
[   31.775113] 
[   31.775131] Memory state around the buggy address:
[   31.775189]  fff00000c9bd3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775233]  fff00000c9bd3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775275] >fff00000c9bd4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775312]                    ^
[   31.775339]  fff00000c9bd4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775505]  fff00000c9bd4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.775548] ==================================================================

[   27.321467] ==================================================================
[   27.321947] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.322242] Free of addr ffff8881061b4000 by task kunit_try_catch/286
[   27.322585] 
[   27.322674] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.322722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.322734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.322755] Call Trace:
[   27.322767]  <TASK>
[   27.322784]  dump_stack_lvl+0x73/0xb0
[   27.322814]  print_report+0xd1/0x610
[   27.322836]  ? __virt_addr_valid+0x1db/0x2d0
[   27.322860]  ? kasan_addr_to_slab+0x11/0xa0
[   27.322880]  ? mempool_double_free_helper+0x184/0x370
[   27.322903]  kasan_report_invalid_free+0x10a/0x130
[   27.322928]  ? mempool_double_free_helper+0x184/0x370
[   27.322953]  ? mempool_double_free_helper+0x184/0x370
[   27.322975]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   27.322999]  mempool_free+0x2ec/0x380
[   27.323025]  mempool_double_free_helper+0x184/0x370
[   27.323048]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.323074]  ? irqentry_exit+0x2a/0x60
[   27.323109]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.323135]  mempool_kmalloc_large_double_free+0xed/0x140
[   27.323159]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   27.323186]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.323207]  ? __pfx_mempool_kfree+0x10/0x10
[   27.323231]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   27.323257]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   27.323291]  kunit_try_run_case+0x1a5/0x480
[   27.323316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.323337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.323370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.323393]  ? __kthread_parkme+0x82/0x180
[   27.323417]  ? preempt_count_sub+0x50/0x80
[   27.323440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.323464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.323486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.323509]  kthread+0x337/0x6f0
[   27.323527]  ? trace_preempt_on+0x20/0xc0
[   27.323551]  ? __pfx_kthread+0x10/0x10
[   27.323571]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.323592]  ? calculate_sigpending+0x7b/0xa0
[   27.323625]  ? __pfx_kthread+0x10/0x10
[   27.323646]  ret_from_fork+0x116/0x1d0
[   27.323665]  ? __pfx_kthread+0x10/0x10
[   27.323685]  ret_from_fork_asm+0x1a/0x30
[   27.323716]  </TASK>
[   27.323726] 
[   27.332098] The buggy address belongs to the physical page:
[   27.332304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   27.332546] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.332767] flags: 0x200000000000040(head|node=0|zone=2)
[   27.334868] page_type: f8(unknown)
[   27.335020] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.335261] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.335487] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.336031] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.336665] head: 0200000000000002 ffffea0004186d01 00000000ffffffff 00000000ffffffff
[   27.336899] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.337136] page dumped because: kasan: bad access detected
[   27.337349] 
[   27.337441] Memory state around the buggy address:
[   27.337891]  ffff8881061b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.338281]  ffff8881061b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.338596] >ffff8881061b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.339044]                    ^
[   27.339197]  ffff8881061b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.339575]  ffff8881061b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.339771] ==================================================================
[   27.287591] ==================================================================
[   27.288005] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.288312] Free of addr ffff888104588400 by task kunit_try_catch/284
[   27.288884] 
[   27.288997] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.289048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.289060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.289095] Call Trace:
[   27.289106]  <TASK>
[   27.289121]  dump_stack_lvl+0x73/0xb0
[   27.289151]  print_report+0xd1/0x610
[   27.289174]  ? __virt_addr_valid+0x1db/0x2d0
[   27.289198]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.289224]  ? mempool_double_free_helper+0x184/0x370
[   27.289250]  kasan_report_invalid_free+0x10a/0x130
[   27.289289]  ? mempool_double_free_helper+0x184/0x370
[   27.289315]  ? mempool_double_free_helper+0x184/0x370
[   27.289338]  ? mempool_double_free_helper+0x184/0x370
[   27.289360]  check_slab_allocation+0x101/0x130
[   27.289382]  __kasan_mempool_poison_object+0x91/0x1d0
[   27.289406]  mempool_free+0x2ec/0x380
[   27.289432]  mempool_double_free_helper+0x184/0x370
[   27.289466]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.289494]  ? irqentry_exit+0x2a/0x60
[   27.289518]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   27.289546]  mempool_kmalloc_double_free+0xed/0x140
[   27.289568]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.289595]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.289617]  ? __pfx_mempool_kfree+0x10/0x10
[   27.289641]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.289667]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.289692]  kunit_try_run_case+0x1a5/0x480
[   27.289716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.289738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.289760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.289783]  ? __kthread_parkme+0x82/0x180
[   27.289807]  ? preempt_count_sub+0x50/0x80
[   27.289831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.289854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.289877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.289900]  kthread+0x337/0x6f0
[   27.289918]  ? trace_preempt_on+0x20/0xc0
[   27.289946]  ? __pfx_kthread+0x10/0x10
[   27.289965]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.289987]  ? calculate_sigpending+0x7b/0xa0
[   27.290010]  ? __pfx_kthread+0x10/0x10
[   27.290031]  ret_from_fork+0x116/0x1d0
[   27.290051]  ? __pfx_kthread+0x10/0x10
[   27.290071]  ret_from_fork_asm+0x1a/0x30
[   27.290116]  </TASK>
[   27.290127] 
[   27.301421] Allocated by task 284:
[   27.301595]  kasan_save_stack+0x45/0x70
[   27.301770]  kasan_save_track+0x18/0x40
[   27.301946]  kasan_save_alloc_info+0x3b/0x50
[   27.302148]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.302435]  remove_element+0x11e/0x190
[   27.302615]  mempool_alloc_preallocated+0x4d/0x90
[   27.302816]  mempool_double_free_helper+0x8a/0x370
[   27.303010]  mempool_kmalloc_double_free+0xed/0x140
[   27.303225]  kunit_try_run_case+0x1a5/0x480
[   27.304059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.304492]  kthread+0x337/0x6f0
[   27.304738]  ret_from_fork+0x116/0x1d0
[   27.304974]  ret_from_fork_asm+0x1a/0x30
[   27.305172] 
[   27.305397] Freed by task 284:
[   27.305549]  kasan_save_stack+0x45/0x70
[   27.305728]  kasan_save_track+0x18/0x40
[   27.305899]  kasan_save_free_info+0x3f/0x60
[   27.306538]  __kasan_mempool_poison_object+0x131/0x1d0
[   27.306731]  mempool_free+0x2ec/0x380
[   27.306902]  mempool_double_free_helper+0x109/0x370
[   27.307128]  mempool_kmalloc_double_free+0xed/0x140
[   27.307829]  kunit_try_run_case+0x1a5/0x480
[   27.308204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.308747]  kthread+0x337/0x6f0
[   27.308998]  ret_from_fork+0x116/0x1d0
[   27.309297]  ret_from_fork_asm+0x1a/0x30
[   27.309518] 
[   27.309606] The buggy address belongs to the object at ffff888104588400
[   27.309606]  which belongs to the cache kmalloc-128 of size 128
[   27.310111] The buggy address is located 0 bytes inside of
[   27.310111]  128-byte region [ffff888104588400, ffff888104588480)
[   27.311473] 
[   27.311566] The buggy address belongs to the physical page:
[   27.311996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104588
[   27.312752] flags: 0x200000000000000(node=0|zone=2)
[   27.312988] page_type: f5(slab)
[   27.313150] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.313750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.314066] page dumped because: kasan: bad access detected
[   27.314246] 
[   27.314336] Memory state around the buggy address:
[   27.314855]  ffff888104588300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.315219]  ffff888104588380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.315548] >ffff888104588400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.315871]                    ^
[   27.316018]  ffff888104588480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.316333]  ffff888104588500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.316729] ==================================================================
[   27.344647] ==================================================================
[   27.345375] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.345638] Free of addr ffff8881061b4000 by task kunit_try_catch/288
[   27.346183] 
[   27.346278] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   27.346329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.346341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.346364] Call Trace:
[   27.346378]  <TASK>
[   27.346394]  dump_stack_lvl+0x73/0xb0
[   27.346424]  print_report+0xd1/0x610
[   27.346446]  ? __virt_addr_valid+0x1db/0x2d0
[   27.346596]  ? kasan_addr_to_slab+0x11/0xa0
[   27.346618]  ? mempool_double_free_helper+0x184/0x370
[   27.346642]  kasan_report_invalid_free+0x10a/0x130
[   27.346667]  ? mempool_double_free_helper+0x184/0x370
[   27.346692]  ? mempool_double_free_helper+0x184/0x370
[   27.346715]  __kasan_mempool_poison_pages+0x115/0x130
[   27.346739]  mempool_free+0x290/0x380
[   27.346764]  mempool_double_free_helper+0x184/0x370
[   27.346787]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.346814]  ? finish_task_switch.isra.0+0x153/0x700
[   27.346840]  mempool_page_alloc_double_free+0xe8/0x140
[   27.346865]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   27.346892]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   27.346915]  ? __pfx_mempool_free_pages+0x10/0x10
[   27.346940]  ? __pfx_read_tsc+0x10/0x10
[   27.346961]  ? ktime_get_ts64+0x86/0x230
[   27.346987]  kunit_try_run_case+0x1a5/0x480
[   27.347011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.347032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.347056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.347103]  ? __kthread_parkme+0x82/0x180
[   27.347128]  ? preempt_count_sub+0x50/0x80
[   27.347151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.347174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.347197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.347219]  kthread+0x337/0x6f0
[   27.347278]  ? trace_preempt_on+0x20/0xc0
[   27.347304]  ? __pfx_kthread+0x10/0x10
[   27.347323]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.347345]  ? calculate_sigpending+0x7b/0xa0
[   27.347369]  ? __pfx_kthread+0x10/0x10
[   27.347390]  ret_from_fork+0x116/0x1d0
[   27.347410]  ? __pfx_kthread+0x10/0x10
[   27.347430]  ret_from_fork_asm+0x1a/0x30
[   27.347462]  </TASK>
[   27.347472] 
[   27.357618] The buggy address belongs to the physical page:
[   27.357797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   27.358066] flags: 0x200000000000000(node=0|zone=2)
[   27.358307] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   27.358633] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.358958] page dumped because: kasan: bad access detected
[   27.359203] 
[   27.359269] Memory state around the buggy address:
[   27.359417]  ffff8881061b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.359902]  ffff8881061b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.360239] >ffff8881061b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.360597]                    ^
[   27.360742]  ffff8881061b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.360975]  ffff8881061b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.361250] ==================================================================