Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.487524] ==================================================================
[   17.487612] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.487666] Free of addr fff00000c781c000 by task kunit_try_catch/237
[   17.487718] 
[   17.487753] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.487960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.488129] Hardware name: linux,dummy-virt (DT)
[   17.488165] Call trace:
[   17.488536]  show_stack+0x20/0x38 (C)
[   17.488835]  dump_stack_lvl+0x8c/0xd0
[   17.489008]  print_report+0x118/0x5d0
[   17.489068]  kasan_report_invalid_free+0xc0/0xe8
[   17.489511]  __kasan_mempool_poison_object+0x14c/0x150
[   17.489836]  mempool_free+0x28c/0x328
[   17.489935]  mempool_double_free_helper+0x150/0x2e8
[   17.489988]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.490039]  kunit_try_run_case+0x170/0x3f0
[   17.490204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.490265]  kthread+0x328/0x630
[   17.490308]  ret_from_fork+0x10/0x20
[   17.490369] 
[   17.490391] The buggy address belongs to the physical page:
[   17.490423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10781c
[   17.490490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.490542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.490594] page_type: f8(unknown)
[   17.490633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.490691] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.490750] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.490808] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.490859] head: 0bfffe0000000002 ffffc1ffc31e0701 00000000ffffffff 00000000ffffffff
[   17.490908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.490958] page dumped because: kasan: bad access detected
[   17.490990] 
[   17.491008] Memory state around the buggy address:
[   17.491058]  fff00000c781bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.491101]  fff00000c781bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.491159] >fff00000c781c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.491196]                    ^
[   17.491226]  fff00000c781c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.491271]  fff00000c781c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.491311] ==================================================================
[   17.467766] ==================================================================
[   17.467828] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.467883] Free of addr fff00000c7711900 by task kunit_try_catch/235
[   17.467926] 
[   17.468517] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.468869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.469001] Hardware name: linux,dummy-virt (DT)
[   17.469170] Call trace:
[   17.469268]  show_stack+0x20/0x38 (C)
[   17.469369]  dump_stack_lvl+0x8c/0xd0
[   17.469539]  print_report+0x118/0x5d0
[   17.469591]  kasan_report_invalid_free+0xc0/0xe8
[   17.469640]  check_slab_allocation+0xd4/0x108
[   17.469694]  __kasan_mempool_poison_object+0x78/0x150
[   17.469931]  mempool_free+0x28c/0x328
[   17.470090]  mempool_double_free_helper+0x150/0x2e8
[   17.470268]  mempool_kmalloc_double_free+0xc0/0x118
[   17.470410]  kunit_try_run_case+0x170/0x3f0
[   17.470527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.470662]  kthread+0x328/0x630
[   17.470709]  ret_from_fork+0x10/0x20
[   17.470950] 
[   17.471111] Allocated by task 235:
[   17.471239]  kasan_save_stack+0x3c/0x68
[   17.471404]  kasan_save_track+0x20/0x40
[   17.471544]  kasan_save_alloc_info+0x40/0x58
[   17.471634]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.471690]  remove_element+0x130/0x1f8
[   17.471886]  mempool_alloc_preallocated+0x58/0xc0
[   17.472029]  mempool_double_free_helper+0x94/0x2e8
[   17.472091]  mempool_kmalloc_double_free+0xc0/0x118
[   17.472243]  kunit_try_run_case+0x170/0x3f0
[   17.472396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.472543]  kthread+0x328/0x630
[   17.472579]  ret_from_fork+0x10/0x20
[   17.472926] 
[   17.473071] Freed by task 235:
[   17.473103]  kasan_save_stack+0x3c/0x68
[   17.473315]  kasan_save_track+0x20/0x40
[   17.473479]  kasan_save_free_info+0x4c/0x78
[   17.473588]  __kasan_mempool_poison_object+0xc0/0x150
[   17.473652]  mempool_free+0x28c/0x328
[   17.473687]  mempool_double_free_helper+0x100/0x2e8
[   17.473780]  mempool_kmalloc_double_free+0xc0/0x118
[   17.473841]  kunit_try_run_case+0x170/0x3f0
[   17.473880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.474199]  kthread+0x328/0x630
[   17.474266]  ret_from_fork+0x10/0x20
[   17.474389] 
[   17.474449] The buggy address belongs to the object at fff00000c7711900
[   17.474449]  which belongs to the cache kmalloc-128 of size 128
[   17.474610] The buggy address is located 0 bytes inside of
[   17.474610]  128-byte region [fff00000c7711900, fff00000c7711980)
[   17.474704] 
[   17.474753] The buggy address belongs to the physical page:
[   17.474817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107711
[   17.474902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.474975] page_type: f5(slab)
[   17.475321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.475492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.475580] page dumped because: kasan: bad access detected
[   17.475714] 
[   17.475827] Memory state around the buggy address:
[   17.475875]  fff00000c7711800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.475985]  fff00000c7711880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.476027] >fff00000c7711900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.476353]                    ^
[   17.476422]  fff00000c7711980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.476570]  fff00000c7711a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.476703] ==================================================================
[   17.504165] ==================================================================
[   17.504514] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.504648] Free of addr fff00000c781c000 by task kunit_try_catch/239
[   17.504695] 
[   17.504752] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.504991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.505029] Hardware name: linux,dummy-virt (DT)
[   17.505062] Call trace:
[   17.505090]  show_stack+0x20/0x38 (C)
[   17.505142]  dump_stack_lvl+0x8c/0xd0
[   17.505187]  print_report+0x118/0x5d0
[   17.505572]  kasan_report_invalid_free+0xc0/0xe8
[   17.505674]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.505728]  mempool_free+0x24c/0x328
[   17.505774]  mempool_double_free_helper+0x150/0x2e8
[   17.506305]  mempool_page_alloc_double_free+0xbc/0x118
[   17.506419]  kunit_try_run_case+0x170/0x3f0
[   17.506470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.506930]  kthread+0x328/0x630
[   17.507025]  ret_from_fork+0x10/0x20
[   17.507321] 
[   17.507364] The buggy address belongs to the physical page:
[   17.507405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10781c
[   17.507525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.507590] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.507933] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.508069] page dumped because: kasan: bad access detected
[   17.508119] 
[   17.508139] Memory state around the buggy address:
[   17.508587]  fff00000c781bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.508693]  fff00000c781bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.508738] >fff00000c781c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.509346]                    ^
[   17.509383]  fff00000c781c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.509804]  fff00000c781c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.509865] ==================================================================

[   13.836636] ==================================================================
[   13.837226] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.837701] Free of addr ffff888103aa0000 by task kunit_try_catch/256
[   13.838163] 
[   13.838346] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.838405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.838416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.838448] Call Trace:
[   13.838459]  <TASK>
[   13.838474]  dump_stack_lvl+0x73/0xb0
[   13.838525]  print_report+0xd1/0x610
[   13.838548]  ? __virt_addr_valid+0x1db/0x2d0
[   13.838572]  ? kasan_addr_to_slab+0x11/0xa0
[   13.838592]  ? mempool_double_free_helper+0x184/0x370
[   13.838617]  kasan_report_invalid_free+0x10a/0x130
[   13.838641]  ? mempool_double_free_helper+0x184/0x370
[   13.838668]  ? mempool_double_free_helper+0x184/0x370
[   13.838691]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.838716]  mempool_free+0x2ec/0x380
[   13.838744]  mempool_double_free_helper+0x184/0x370
[   13.838768]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.838796]  ? finish_task_switch.isra.0+0x153/0x700
[   13.838832]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.838857]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.838893]  ? __kasan_check_write+0x18/0x20
[   13.838914]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.838936]  ? __pfx_mempool_kfree+0x10/0x10
[   13.838961]  ? __pfx_read_tsc+0x10/0x10
[   13.838982]  ? ktime_get_ts64+0x86/0x230
[   13.839003]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.839073]  kunit_try_run_case+0x1a5/0x480
[   13.839100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.839125]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.839151]  ? __kthread_parkme+0x82/0x180
[   13.839172]  ? preempt_count_sub+0x50/0x80
[   13.839195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.839219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.839243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.839266]  kthread+0x337/0x6f0
[   13.839285]  ? trace_preempt_on+0x20/0xc0
[   13.839320]  ? __pfx_kthread+0x10/0x10
[   13.839339]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.839361]  ? calculate_sigpending+0x7b/0xa0
[   13.839386]  ? __pfx_kthread+0x10/0x10
[   13.839406]  ret_from_fork+0x116/0x1d0
[   13.839424]  ? __pfx_kthread+0x10/0x10
[   13.839444]  ret_from_fork_asm+0x1a/0x30
[   13.839475]  </TASK>
[   13.839486] 
[   13.848895] The buggy address belongs to the physical page:
[   13.849242] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aa0
[   13.849503] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.849804] flags: 0x200000000000040(head|node=0|zone=2)
[   13.850083] page_type: f8(unknown)
[   13.850259] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.850675] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.850999] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.851366] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.851719] head: 0200000000000002 ffffea00040ea801 00000000ffffffff 00000000ffffffff
[   13.852100] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.852448] page dumped because: kasan: bad access detected
[   13.852668] 
[   13.852784] Memory state around the buggy address:
[   13.852989]  ffff888103a9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.853573]  ffff888103a9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.853904] >ffff888103aa0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.854118]                    ^
[   13.854236]  ffff888103aa0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.854585]  ffff888103aa0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.855010] ==================================================================
[   13.805875] ==================================================================
[   13.806491] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.806938] Free of addr ffff8881029ceb00 by task kunit_try_catch/254
[   13.807199] 
[   13.807331] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.807375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.807387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.807409] Call Trace:
[   13.807422]  <TASK>
[   13.807436]  dump_stack_lvl+0x73/0xb0
[   13.807465]  print_report+0xd1/0x610
[   13.807684]  ? __virt_addr_valid+0x1db/0x2d0
[   13.807711]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.807733]  ? mempool_double_free_helper+0x184/0x370
[   13.807769]  kasan_report_invalid_free+0x10a/0x130
[   13.807794]  ? mempool_double_free_helper+0x184/0x370
[   13.807820]  ? mempool_double_free_helper+0x184/0x370
[   13.807855]  ? mempool_double_free_helper+0x184/0x370
[   13.807878]  check_slab_allocation+0x101/0x130
[   13.807899]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.807924]  mempool_free+0x2ec/0x380
[   13.807959]  mempool_double_free_helper+0x184/0x370
[   13.807983]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.808016]  ? update_load_avg+0x1be/0x21b0
[   13.808094]  ? update_load_avg+0x1be/0x21b0
[   13.808115]  ? update_curr+0x80/0x810
[   13.808147]  ? irqentry_exit+0x2a/0x60
[   13.808168]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.808195]  mempool_kmalloc_double_free+0xed/0x140
[   13.808231]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.808257]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.808280]  ? __pfx_mempool_kfree+0x10/0x10
[   13.808314]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.808340]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.808366]  kunit_try_run_case+0x1a5/0x480
[   13.808391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.808413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.808437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.808461]  ? __kthread_parkme+0x82/0x180
[   13.808494]  ? preempt_count_sub+0x50/0x80
[   13.808517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.808541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.808565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.808589]  kthread+0x337/0x6f0
[   13.808609]  ? trace_preempt_on+0x20/0xc0
[   13.808632]  ? __pfx_kthread+0x10/0x10
[   13.808653]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.808675]  ? calculate_sigpending+0x7b/0xa0
[   13.808699]  ? __pfx_kthread+0x10/0x10
[   13.808720]  ret_from_fork+0x116/0x1d0
[   13.808739]  ? __pfx_kthread+0x10/0x10
[   13.808759]  ret_from_fork_asm+0x1a/0x30
[   13.808790]  </TASK>
[   13.808800] 
[   13.819722] Allocated by task 254:
[   13.819894]  kasan_save_stack+0x45/0x70
[   13.820115]  kasan_save_track+0x18/0x40
[   13.820359]  kasan_save_alloc_info+0x3b/0x50
[   13.820562]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.820829]  remove_element+0x11e/0x190
[   13.821017]  mempool_alloc_preallocated+0x4d/0x90
[   13.821432]  mempool_double_free_helper+0x8a/0x370
[   13.821689]  mempool_kmalloc_double_free+0xed/0x140
[   13.821855]  kunit_try_run_case+0x1a5/0x480
[   13.822002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.822176]  kthread+0x337/0x6f0
[   13.822307]  ret_from_fork+0x116/0x1d0
[   13.822470]  ret_from_fork_asm+0x1a/0x30
[   13.822662] 
[   13.822919] Freed by task 254:
[   13.823305]  kasan_save_stack+0x45/0x70
[   13.823499]  kasan_save_track+0x18/0x40
[   13.823852]  kasan_save_free_info+0x3f/0x60
[   13.824109]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.824359]  mempool_free+0x2ec/0x380
[   13.824505]  mempool_double_free_helper+0x109/0x370
[   13.824669]  mempool_kmalloc_double_free+0xed/0x140
[   13.824831]  kunit_try_run_case+0x1a5/0x480
[   13.824981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.825156]  kthread+0x337/0x6f0
[   13.825278]  ret_from_fork+0x116/0x1d0
[   13.825422]  ret_from_fork_asm+0x1a/0x30
[   13.825566] 
[   13.825639] The buggy address belongs to the object at ffff8881029ceb00
[   13.825639]  which belongs to the cache kmalloc-128 of size 128
[   13.826089] The buggy address is located 0 bytes inside of
[   13.826089]  128-byte region [ffff8881029ceb00, ffff8881029ceb80)
[   13.826684] 
[   13.826763] The buggy address belongs to the physical page:
[   13.826935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   13.827518] flags: 0x200000000000000(node=0|zone=2)
[   13.827775] page_type: f5(slab)
[   13.827940] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.828349] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.828743] page dumped because: kasan: bad access detected
[   13.829014] 
[   13.829146] Memory state around the buggy address:
[   13.829382]  ffff8881029cea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.829713]  ffff8881029cea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.830025] >ffff8881029ceb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.830464]                    ^
[   13.830731]  ffff8881029ceb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.831099]  ffff8881029cec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.831415] ==================================================================
[   13.859171] ==================================================================
[   13.859776] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.860570] Free of addr ffff888103a6c000 by task kunit_try_catch/258
[   13.860856] 
[   13.860996] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.861042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.861054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.861074] Call Trace:
[   13.861087]  <TASK>
[   13.861102]  dump_stack_lvl+0x73/0xb0
[   13.861133]  print_report+0xd1/0x610
[   13.861155]  ? __virt_addr_valid+0x1db/0x2d0
[   13.861179]  ? kasan_addr_to_slab+0x11/0xa0
[   13.861199]  ? mempool_double_free_helper+0x184/0x370
[   13.861225]  kasan_report_invalid_free+0x10a/0x130
[   13.861260]  ? mempool_double_free_helper+0x184/0x370
[   13.861499]  ? mempool_double_free_helper+0x184/0x370
[   13.861526]  __kasan_mempool_poison_pages+0x115/0x130
[   13.861552]  mempool_free+0x290/0x380
[   13.861579]  mempool_double_free_helper+0x184/0x370
[   13.861603]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.861629]  ? __kasan_check_write+0x18/0x20
[   13.861649]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.861672]  ? finish_task_switch.isra.0+0x153/0x700
[   13.861697]  mempool_page_alloc_double_free+0xe8/0x140
[   13.861724]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.861750]  ? __kasan_check_write+0x18/0x20
[   13.861771]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.861794]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.861820]  ? __pfx_read_tsc+0x10/0x10
[   13.861842]  ? ktime_get_ts64+0x86/0x230
[   13.861864]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.861891]  kunit_try_run_case+0x1a5/0x480
[   13.861916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.861941]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.861966]  ? __kthread_parkme+0x82/0x180
[   13.861987]  ? preempt_count_sub+0x50/0x80
[   13.862010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.862041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.862066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.862090]  kthread+0x337/0x6f0
[   13.862110]  ? trace_preempt_on+0x20/0xc0
[   13.862133]  ? __pfx_kthread+0x10/0x10
[   13.862153]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.862173]  ? calculate_sigpending+0x7b/0xa0
[   13.862197]  ? __pfx_kthread+0x10/0x10
[   13.862217]  ret_from_fork+0x116/0x1d0
[   13.862237]  ? __pfx_kthread+0x10/0x10
[   13.862256]  ret_from_fork_asm+0x1a/0x30
[   13.862287]  </TASK>
[   13.862309] 
[   13.872467] The buggy address belongs to the physical page:
[   13.872757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a6c
[   13.873136] flags: 0x200000000000000(node=0|zone=2)
[   13.873321] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.873553] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.873944] page dumped because: kasan: bad access detected
[   13.874289] 
[   13.874393] Memory state around the buggy address:
[   13.874753]  ffff888103a6bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.875179]  ffff888103a6bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.875416] >ffff888103a6c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.876136]                    ^
[   13.876331]  ffff888103a6c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.876654]  ffff888103a6c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.876979] ==================================================================