Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.665013] ==================================================================
[   17.665094] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.665156] Free of addr fff00000c77fa100 by task kunit_try_catch/238
[   17.665198] 
[   17.666270] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.666396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.668486] Hardware name: linux,dummy-virt (DT)
[   17.668538] Call trace:
[   17.668560]  show_stack+0x20/0x38 (C)
[   17.668612]  dump_stack_lvl+0x8c/0xd0
[   17.668661]  print_report+0x118/0x608
[   17.668706]  kasan_report_invalid_free+0xc0/0xe8
[   17.668754]  check_slab_allocation+0xd4/0x108
[   17.668801]  __kasan_mempool_poison_object+0x78/0x150
[   17.668851]  mempool_free+0x28c/0x328
[   17.668897]  mempool_double_free_helper+0x150/0x2e8
[   17.668962]  mempool_kmalloc_double_free+0xc0/0x118
[   17.669013]  kunit_try_run_case+0x170/0x3f0
[   17.669061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669114]  kthread+0x328/0x630
[   17.669158]  ret_from_fork+0x10/0x20
[   17.669206] 
[   17.669223] Allocated by task 238:
[   17.669256]  kasan_save_stack+0x3c/0x68
[   17.669294]  kasan_save_track+0x20/0x40
[   17.669330]  kasan_save_alloc_info+0x40/0x58
[   17.669367]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.669407]  remove_element+0x130/0x1f8
[   17.669443]  mempool_alloc_preallocated+0x58/0xc0
[   17.669483]  mempool_double_free_helper+0x94/0x2e8
[   17.669523]  mempool_kmalloc_double_free+0xc0/0x118
[   17.669564]  kunit_try_run_case+0x170/0x3f0
[   17.669600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669643]  kthread+0x328/0x630
[   17.669678]  ret_from_fork+0x10/0x20
[   17.669996] 
[   17.670052] Freed by task 238:
[   17.670291]  kasan_save_stack+0x3c/0x68
[   17.670387]  kasan_save_track+0x20/0x40
[   17.670465]  kasan_save_free_info+0x4c/0x78
[   17.670504]  __kasan_mempool_poison_object+0xc0/0x150
[   17.670544]  mempool_free+0x28c/0x328
[   17.670579]  mempool_double_free_helper+0x100/0x2e8
[   17.670619]  mempool_kmalloc_double_free+0xc0/0x118
[   17.670661]  kunit_try_run_case+0x170/0x3f0
[   17.670697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.670742]  kthread+0x328/0x630
[   17.670776]  ret_from_fork+0x10/0x20
[   17.670811] 
[   17.670829] The buggy address belongs to the object at fff00000c77fa100
[   17.670829]  which belongs to the cache kmalloc-128 of size 128
[   17.670889] The buggy address is located 0 bytes inside of
[   17.670889]  128-byte region [fff00000c77fa100, fff00000c77fa180)
[   17.670956] 
[   17.670976] The buggy address belongs to the physical page:
[   17.671007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   17.671060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.671106] page_type: f5(slab)
[   17.671145] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.671194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.671234] page dumped because: kasan: bad access detected
[   17.671263] 
[   17.671281] Memory state around the buggy address:
[   17.671312]  fff00000c77fa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.671426]  fff00000c77fa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671489] >fff00000c77fa100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.671527]                    ^
[   17.671558]  fff00000c77fa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671601]  fff00000c77fa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.671638] ==================================================================
[   17.693081] ==================================================================
[   17.693256] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.693412] Free of addr fff00000c7924000 by task kunit_try_catch/242
[   17.693462] 
[   17.693494] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.693595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.693759] Hardware name: linux,dummy-virt (DT)
[   17.693806] Call trace:
[   17.693834]  show_stack+0x20/0x38 (C)
[   17.693892]  dump_stack_lvl+0x8c/0xd0
[   17.693966]  print_report+0x118/0x608
[   17.694011]  kasan_report_invalid_free+0xc0/0xe8
[   17.694069]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.694125]  mempool_free+0x24c/0x328
[   17.694282]  mempool_double_free_helper+0x150/0x2e8
[   17.694368]  mempool_page_alloc_double_free+0xbc/0x118
[   17.694457]  kunit_try_run_case+0x170/0x3f0
[   17.694546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.694622]  kthread+0x328/0x630
[   17.694702]  ret_from_fork+0x10/0x20
[   17.694747] 
[   17.694767] The buggy address belongs to the physical page:
[   17.694818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924
[   17.694872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.694931] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.694991] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.695250] page dumped because: kasan: bad access detected
[   17.695329] 
[   17.695393] Memory state around the buggy address:
[   17.695450]  fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695549]  fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695607] >fff00000c7924000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695646]                    ^
[   17.695674]  fff00000c7924080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695856]  fff00000c7924100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.696027] ==================================================================
[   17.682502] ==================================================================
[   17.682566] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.683775] Free of addr fff00000c7924000 by task kunit_try_catch/240
[   17.683841] 
[   17.683877] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.683976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.684004] Hardware name: linux,dummy-virt (DT)
[   17.684038] Call trace:
[   17.684061]  show_stack+0x20/0x38 (C)
[   17.684111]  dump_stack_lvl+0x8c/0xd0
[   17.684158]  print_report+0x118/0x608
[   17.684210]  kasan_report_invalid_free+0xc0/0xe8
[   17.684258]  __kasan_mempool_poison_object+0x14c/0x150
[   17.684309]  mempool_free+0x28c/0x328
[   17.684359]  mempool_double_free_helper+0x150/0x2e8
[   17.684409]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.684820]  kunit_try_run_case+0x170/0x3f0
[   17.684894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.684988]  kthread+0x328/0x630
[   17.685034]  ret_from_fork+0x10/0x20
[   17.685110] 
[   17.685131] The buggy address belongs to the physical page:
[   17.685164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924
[   17.685219] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.685594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.685696] page_type: f8(unknown)
[   17.685752] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.685837] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.685988] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.686063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.686190] head: 0bfffe0000000002 ffffc1ffc31e4901 00000000ffffffff 00000000ffffffff
[   17.686258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.686343] page dumped because: kasan: bad access detected
[   17.686444] 
[   17.686491] Memory state around the buggy address:
[   17.686524]  fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686589]  fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686633] >fff00000c7924000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686671]                    ^
[   17.686698]  fff00000c7924080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686739]  fff00000c7924100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686777] ==================================================================

[   12.845382] ==================================================================
[   12.845883] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.846189] Free of addr ffff888102a3c000 by task kunit_try_catch/256
[   12.846568] 
[   12.846683] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.846733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.846903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.846932] Call Trace:
[   12.846947]  <TASK>
[   12.846966]  dump_stack_lvl+0x73/0xb0
[   12.846996]  print_report+0xd1/0x650
[   12.847020]  ? __virt_addr_valid+0x1db/0x2d0
[   12.847044]  ? kasan_addr_to_slab+0x11/0xa0
[   12.847066]  ? mempool_double_free_helper+0x184/0x370
[   12.847092]  kasan_report_invalid_free+0x10a/0x130
[   12.847119]  ? mempool_double_free_helper+0x184/0x370
[   12.847146]  ? mempool_double_free_helper+0x184/0x370
[   12.847169]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   12.847194]  mempool_free+0x2ec/0x380
[   12.847218]  mempool_double_free_helper+0x184/0x370
[   12.847256]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.847280]  ? dequeue_entities+0x852/0x1740
[   12.847306]  ? finish_task_switch.isra.0+0x153/0x700
[   12.847333]  mempool_kmalloc_large_double_free+0xed/0x140
[   12.847359]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   12.847385]  ? dequeue_task_fair+0x166/0x4e0
[   12.847407]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.847426]  ? __pfx_mempool_kfree+0x10/0x10
[   12.847449]  ? __pfx_read_tsc+0x10/0x10
[   12.847468]  ? ktime_get_ts64+0x86/0x230
[   12.847495]  kunit_try_run_case+0x1a5/0x480
[   12.847521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.847542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.847567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.847591]  ? __kthread_parkme+0x82/0x180
[   12.847613]  ? preempt_count_sub+0x50/0x80
[   12.847637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.847661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.847684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.847722]  kthread+0x337/0x6f0
[   12.847739]  ? trace_preempt_on+0x20/0xc0
[   12.847763]  ? __pfx_kthread+0x10/0x10
[   12.847781]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.847804]  ? calculate_sigpending+0x7b/0xa0
[   12.847828]  ? __pfx_kthread+0x10/0x10
[   12.847846]  ret_from_fork+0x41/0x80
[   12.847867]  ? __pfx_kthread+0x10/0x10
[   12.847885]  ret_from_fork_asm+0x1a/0x30
[   12.847916]  </TASK>
[   12.847927] 
[   12.858550] The buggy address belongs to the physical page:
[   12.858776] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a3c
[   12.859116] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.859585] flags: 0x200000000000040(head|node=0|zone=2)
[   12.860014] page_type: f8(unknown)
[   12.860188] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.861203] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.861892] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.862727] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.863142] head: 0200000000000002 ffffea00040a8f01 00000000ffffffff 00000000ffffffff
[   12.863605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.864335] page dumped because: kasan: bad access detected
[   12.864654] 
[   12.864793] Memory state around the buggy address:
[   12.865198]  ffff888102a3bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.865756]  ffff888102a3bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.866201] >ffff888102a3c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.866787]                    ^
[   12.867038]  ffff888102a3c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.867485]  ffff888102a3c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.867929] ==================================================================
[   12.812481] ==================================================================
[   12.813099] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.813398] Free of addr ffff888103151600 by task kunit_try_catch/254
[   12.813701] 
[   12.813874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.813925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.813938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.814204] Call Trace:
[   12.814218]  <TASK>
[   12.814249]  dump_stack_lvl+0x73/0xb0
[   12.814279]  print_report+0xd1/0x650
[   12.814303]  ? __virt_addr_valid+0x1db/0x2d0
[   12.814328]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.814351]  ? mempool_double_free_helper+0x184/0x370
[   12.814376]  kasan_report_invalid_free+0x10a/0x130
[   12.814401]  ? mempool_double_free_helper+0x184/0x370
[   12.814428]  ? mempool_double_free_helper+0x184/0x370
[   12.814451]  ? mempool_double_free_helper+0x184/0x370
[   12.814475]  check_slab_allocation+0x101/0x130
[   12.814497]  __kasan_mempool_poison_object+0x91/0x1d0
[   12.814523]  mempool_free+0x2ec/0x380
[   12.814549]  mempool_double_free_helper+0x184/0x370
[   12.814574]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.814601]  ? kasan_save_track+0x18/0x40
[   12.814621]  ? kasan_save_alloc_info+0x3b/0x50
[   12.814641]  ? kasan_save_stack+0x45/0x70
[   12.814663]  ? mempool_alloc_preallocated+0x5b/0x90
[   12.814688]  mempool_kmalloc_double_free+0xed/0x140
[   12.814713]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   12.814736]  ? dequeue_task_fair+0x166/0x4e0
[   12.814762]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.814781]  ? __pfx_mempool_kfree+0x10/0x10
[   12.814806]  ? __pfx_read_tsc+0x10/0x10
[   12.814827]  ? ktime_get_ts64+0x86/0x230
[   12.814854]  kunit_try_run_case+0x1a5/0x480
[   12.814879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.814902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.814926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.814949]  ? __kthread_parkme+0x82/0x180
[   12.814972]  ? preempt_count_sub+0x50/0x80
[   12.814999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.815023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.815046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.815071]  kthread+0x337/0x6f0
[   12.815088]  ? trace_preempt_on+0x20/0xc0
[   12.815111]  ? __pfx_kthread+0x10/0x10
[   12.815129]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.815151]  ? calculate_sigpending+0x7b/0xa0
[   12.815173]  ? __pfx_kthread+0x10/0x10
[   12.815192]  ret_from_fork+0x41/0x80
[   12.815212]  ? __pfx_kthread+0x10/0x10
[   12.815239]  ret_from_fork_asm+0x1a/0x30
[   12.815271]  </TASK>
[   12.815304] 
[   12.827598] Allocated by task 254:
[   12.828019]  kasan_save_stack+0x45/0x70
[   12.828228]  kasan_save_track+0x18/0x40
[   12.828504]  kasan_save_alloc_info+0x3b/0x50
[   12.828910]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.829401]  remove_element+0x11e/0x190
[   12.829678]  mempool_alloc_preallocated+0x4d/0x90
[   12.829843]  mempool_double_free_helper+0x8a/0x370
[   12.830002]  mempool_kmalloc_double_free+0xed/0x140
[   12.830160]  kunit_try_run_case+0x1a5/0x480
[   12.830348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.830550]  kthread+0x337/0x6f0
[   12.830797]  ret_from_fork+0x41/0x80
[   12.830949]  ret_from_fork_asm+0x1a/0x30
[   12.831150] 
[   12.831223] Freed by task 254:
[   12.831383]  kasan_save_stack+0x45/0x70
[   12.831587]  kasan_save_track+0x18/0x40
[   12.831775]  kasan_save_free_info+0x3f/0x60
[   12.832249]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.832589]  mempool_free+0x2ec/0x380
[   12.833086]  mempool_double_free_helper+0x109/0x370
[   12.833292]  mempool_kmalloc_double_free+0xed/0x140
[   12.833658]  kunit_try_run_case+0x1a5/0x480
[   12.833880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.834115]  kthread+0x337/0x6f0
[   12.834637]  ret_from_fork+0x41/0x80
[   12.834834]  ret_from_fork_asm+0x1a/0x30
[   12.834975] 
[   12.835072] The buggy address belongs to the object at ffff888103151600
[   12.835072]  which belongs to the cache kmalloc-128 of size 128
[   12.835790] The buggy address is located 0 bytes inside of
[   12.835790]  128-byte region [ffff888103151600, ffff888103151680)
[   12.836547] 
[   12.836633] The buggy address belongs to the physical page:
[   12.836974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103151
[   12.837569] flags: 0x200000000000000(node=0|zone=2)
[   12.837822] page_type: f5(slab)
[   12.837969] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.838296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.838947] page dumped because: kasan: bad access detected
[   12.839143] 
[   12.839253] Memory state around the buggy address:
[   12.839706]  ffff888103151500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.839952]  ffff888103151580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.840538] >ffff888103151600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.840883]                    ^
[   12.841037]  ffff888103151680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.841624]  ffff888103151700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.841873] ==================================================================
[   12.872044] ==================================================================
[   12.872746] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.873004] Free of addr ffff88810392c000 by task kunit_try_catch/258
[   12.873316] 
[   12.873632] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.873686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.873699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.873749] Call Trace:
[   12.873762]  <TASK>
[   12.873782]  dump_stack_lvl+0x73/0xb0
[   12.873811]  print_report+0xd1/0x650
[   12.873836]  ? __virt_addr_valid+0x1db/0x2d0
[   12.873860]  ? kasan_addr_to_slab+0x11/0xa0
[   12.873881]  ? mempool_double_free_helper+0x184/0x370
[   12.873908]  kasan_report_invalid_free+0x10a/0x130
[   12.874008]  ? mempool_double_free_helper+0x184/0x370
[   12.874037]  ? mempool_double_free_helper+0x184/0x370
[   12.874062]  __kasan_mempool_poison_pages+0x115/0x130
[   12.874088]  mempool_free+0x290/0x380
[   12.874113]  mempool_double_free_helper+0x184/0x370
[   12.874138]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.874162]  ? dequeue_entities+0x852/0x1740
[   12.874188]  ? finish_task_switch.isra.0+0x153/0x700
[   12.874217]  mempool_page_alloc_double_free+0xe8/0x140
[   12.874251]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   12.874273]  ? dequeue_task_fair+0x166/0x4e0
[   12.874296]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   12.874317]  ? __pfx_mempool_free_pages+0x10/0x10
[   12.874340]  ? __pfx_read_tsc+0x10/0x10
[   12.874361]  ? ktime_get_ts64+0x86/0x230
[   12.874387]  kunit_try_run_case+0x1a5/0x480
[   12.874412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.874434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.874459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.874484]  ? __kthread_parkme+0x82/0x180
[   12.874506]  ? preempt_count_sub+0x50/0x80
[   12.874530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.874554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.874578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.874601]  kthread+0x337/0x6f0
[   12.874618]  ? trace_preempt_on+0x20/0xc0
[   12.874642]  ? __pfx_kthread+0x10/0x10
[   12.874660]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.874682]  ? calculate_sigpending+0x7b/0xa0
[   12.874704]  ? __pfx_kthread+0x10/0x10
[   12.874724]  ret_from_fork+0x41/0x80
[   12.874744]  ? __pfx_kthread+0x10/0x10
[   12.874763]  ret_from_fork_asm+0x1a/0x30
[   12.874794]  </TASK>
[   12.874805] 
[   12.885854] The buggy address belongs to the physical page:
[   12.886142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392c
[   12.886711] flags: 0x200000000000000(node=0|zone=2)
[   12.887139] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   12.887555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   12.888010] page dumped because: kasan: bad access detected
[   12.888487] 
[   12.888605] Memory state around the buggy address:
[   12.889023]  ffff88810392bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.889405]  ffff88810392bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.889665] >ffff88810392c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.890271]                    ^
[   12.890448]  ffff88810392c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.890964]  ffff88810392c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.891259] ==================================================================