Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.898711] ==================================================================
[   19.898765] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.898839] Free of addr fff00000c78e4000 by task kunit_try_catch/241
[   19.899046] 
[   19.899084] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.899276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.899368] Hardware name: linux,dummy-virt (DT)
[   19.899409] Call trace:
[   19.899448]  show_stack+0x20/0x38 (C)
[   19.899512]  dump_stack_lvl+0x8c/0xd0
[   19.899564]  print_report+0x118/0x608
[   19.899618]  kasan_report_invalid_free+0xc0/0xe8
[   19.899671]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.899721]  mempool_free+0x24c/0x328
[   19.899770]  mempool_double_free_helper+0x150/0x2e8
[   19.899822]  mempool_page_alloc_double_free+0xbc/0x118
[   19.899871]  kunit_try_run_case+0x170/0x3f0
[   19.899920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899973]  kthread+0x328/0x630
[   19.900193]  ret_from_fork+0x10/0x20
[   19.900322] 
[   19.900391] The buggy address belongs to the physical page:
[   19.900423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4
[   19.900479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.900787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.900900] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.900954] page dumped because: kasan: bad access detected
[   19.900985] 
[   19.901018] Memory state around the buggy address:
[   19.901056]  fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901099]  fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901141] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901178]                    ^
[   19.901205]  fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901246]  fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901285] ==================================================================
[   19.875830] ==================================================================
[   19.875886] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.875940] Free of addr fff00000c6e6c100 by task kunit_try_catch/237
[   19.875983] 
[   19.876014] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.876095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876123] Hardware name: linux,dummy-virt (DT)
[   19.876152] Call trace:
[   19.876382]  show_stack+0x20/0x38 (C)
[   19.876540]  dump_stack_lvl+0x8c/0xd0
[   19.876619]  print_report+0x118/0x608
[   19.876743]  kasan_report_invalid_free+0xc0/0xe8
[   19.876830]  check_slab_allocation+0xd4/0x108
[   19.876904]  __kasan_mempool_poison_object+0x78/0x150
[   19.876957]  mempool_free+0x28c/0x328
[   19.877032]  mempool_double_free_helper+0x150/0x2e8
[   19.877084]  mempool_kmalloc_double_free+0xc0/0x118
[   19.877137]  kunit_try_run_case+0x170/0x3f0
[   19.877397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.877471]  kthread+0x328/0x630
[   19.877562]  ret_from_fork+0x10/0x20
[   19.877658] 
[   19.877707] Allocated by task 237:
[   19.877777]  kasan_save_stack+0x3c/0x68
[   19.877866]  kasan_save_track+0x20/0x40
[   19.877903]  kasan_save_alloc_info+0x40/0x58
[   19.877959]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.878023]  remove_element+0x130/0x1f8
[   19.878311]  mempool_alloc_preallocated+0x58/0xc0
[   19.878418]  mempool_double_free_helper+0x94/0x2e8
[   19.878551]  mempool_kmalloc_double_free+0xc0/0x118
[   19.878606]  kunit_try_run_case+0x170/0x3f0
[   19.878644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.878920]  kthread+0x328/0x630
[   19.879001]  ret_from_fork+0x10/0x20
[   19.879105] 
[   19.879163] Freed by task 237:
[   19.879237]  kasan_save_stack+0x3c/0x68
[   19.879325]  kasan_save_track+0x20/0x40
[   19.879395]  kasan_save_free_info+0x4c/0x78
[   19.879432]  __kasan_mempool_poison_object+0xc0/0x150
[   19.879607]  mempool_free+0x28c/0x328
[   19.879788]  mempool_double_free_helper+0x100/0x2e8
[   19.879865]  mempool_kmalloc_double_free+0xc0/0x118
[   19.879968]  kunit_try_run_case+0x170/0x3f0
[   19.880045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.880188]  kthread+0x328/0x630
[   19.880244]  ret_from_fork+0x10/0x20
[   19.880302] 
[   19.880321] The buggy address belongs to the object at fff00000c6e6c100
[   19.880321]  which belongs to the cache kmalloc-128 of size 128
[   19.880394] The buggy address is located 0 bytes inside of
[   19.880394]  128-byte region [fff00000c6e6c100, fff00000c6e6c180)
[   19.880466] 
[   19.880499] The buggy address belongs to the physical page:
[   19.880529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   19.880581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.880627] page_type: f5(slab)
[   19.880805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.880874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.880991] page dumped because: kasan: bad access detected
[   19.881082] 
[   19.881129] Memory state around the buggy address:
[   19.881223]  fff00000c6e6c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.881272]  fff00000c6e6c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.881469] >fff00000c6e6c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.881644]                    ^
[   19.881706]  fff00000c6e6c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.881769]  fff00000c6e6c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.881808] ==================================================================
[   19.887845] ==================================================================
[   19.887908] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.887982] Free of addr fff00000c78e4000 by task kunit_try_catch/239
[   19.888053] 
[   19.888101] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.888183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.888208] Hardware name: linux,dummy-virt (DT)
[   19.888242] Call trace:
[   19.888263]  show_stack+0x20/0x38 (C)
[   19.888312]  dump_stack_lvl+0x8c/0xd0
[   19.888494]  print_report+0x118/0x608
[   19.888541]  kasan_report_invalid_free+0xc0/0xe8
[   19.888590]  __kasan_mempool_poison_object+0x14c/0x150
[   19.888639]  mempool_free+0x28c/0x328
[   19.888806]  mempool_double_free_helper+0x150/0x2e8
[   19.888942]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.889033]  kunit_try_run_case+0x170/0x3f0
[   19.889141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889274]  kthread+0x328/0x630
[   19.889352]  ret_from_fork+0x10/0x20
[   19.889432] 
[   19.889730] The buggy address belongs to the physical page:
[   19.889808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4
[   19.889878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.889935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.889988] page_type: f8(unknown)
[   19.890050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.890115] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.890171] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.890228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.890292] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff
[   19.890357] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.890397] page dumped because: kasan: bad access detected
[   19.890428] 
[   19.890454] Memory state around the buggy address:
[   19.890496]  fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890537]  fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890581] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890619]                    ^
[   19.890648]  fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890690]  fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890729] ==================================================================

[   12.989591] ==================================================================
[   12.990200] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.990509] Free of addr ffff888103cac000 by task kunit_try_catch/257
[   12.990754] 
[   12.990881] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   12.990929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.990942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.990980] Call Trace:
[   12.990992]  <TASK>
[   12.991007]  dump_stack_lvl+0x73/0xb0
[   12.991034]  print_report+0xd1/0x650
[   12.991058]  ? __virt_addr_valid+0x1db/0x2d0
[   12.991091]  ? kasan_addr_to_slab+0x11/0xa0
[   12.991113]  ? mempool_double_free_helper+0x184/0x370
[   12.991139]  kasan_report_invalid_free+0x10a/0x130
[   12.991166]  ? mempool_double_free_helper+0x184/0x370
[   12.991194]  ? mempool_double_free_helper+0x184/0x370
[   12.991219]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   12.991245]  mempool_free+0x2ec/0x380
[   12.991270]  mempool_double_free_helper+0x184/0x370
[   12.991297]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.991323]  ? update_load_avg+0x1be/0x21b0
[   12.991349]  ? finish_task_switch.isra.0+0x153/0x700
[   12.991376]  mempool_kmalloc_large_double_free+0xed/0x140
[   12.991404]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   12.991431]  ? dequeue_task_fair+0x166/0x4e0
[   12.991454]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.991476]  ? __pfx_mempool_kfree+0x10/0x10
[   12.991499]  ? __pfx_read_tsc+0x10/0x10
[   12.991522]  ? ktime_get_ts64+0x86/0x230
[   12.991549]  kunit_try_run_case+0x1a5/0x480
[   12.991772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.991810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.991846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.991871]  ? __kthread_parkme+0x82/0x180
[   12.991904]  ? preempt_count_sub+0x50/0x80
[   12.991929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.991951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.991975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.991999]  kthread+0x337/0x6f0
[   12.992017]  ? trace_preempt_on+0x20/0xc0
[   12.992041]  ? __pfx_kthread+0x10/0x10
[   12.992060]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.992083]  ? calculate_sigpending+0x7b/0xa0
[   12.992106]  ? __pfx_kthread+0x10/0x10
[   12.992125]  ret_from_fork+0x41/0x80
[   12.992146]  ? __pfx_kthread+0x10/0x10
[   12.992165]  ret_from_fork_asm+0x1a/0x30
[   12.992196]  </TASK>
[   12.992208] 
[   13.003306] The buggy address belongs to the physical page:
[   13.003607] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cac
[   13.004111] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.004473] flags: 0x200000000000040(head|node=0|zone=2)
[   13.004831] page_type: f8(unknown)
[   13.004975] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.005583] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.005908] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.006373] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.006943] head: 0200000000000002 ffffea00040f2b01 00000000ffffffff 00000000ffffffff
[   13.007290] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.007707] page dumped because: kasan: bad access detected
[   13.008058] 
[   13.008175] Memory state around the buggy address:
[   13.008371]  ffff888103cabf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.008781]  ffff888103cabf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.009267] >ffff888103cac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.009573]                    ^
[   13.009775]  ffff888103cac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.010199]  ffff888103cac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.010552] ==================================================================
[   12.960139] ==================================================================
[   12.960565] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.960888] Free of addr ffff8881029e8200 by task kunit_try_catch/255
[   12.961140] 
[   12.961263] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   12.961310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.961323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.961347] Call Trace:
[   12.961360]  <TASK>
[   12.961375]  dump_stack_lvl+0x73/0xb0
[   12.961402]  print_report+0xd1/0x650
[   12.961430]  ? __virt_addr_valid+0x1db/0x2d0
[   12.961454]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.961478]  ? mempool_double_free_helper+0x184/0x370
[   12.961505]  kasan_report_invalid_free+0x10a/0x130
[   12.961531]  ? mempool_double_free_helper+0x184/0x370
[   12.961560]  ? mempool_double_free_helper+0x184/0x370
[   12.961585]  ? mempool_double_free_helper+0x184/0x370
[   12.961609]  check_slab_allocation+0x101/0x130
[   12.961633]  __kasan_mempool_poison_object+0x91/0x1d0
[   12.961659]  mempool_free+0x2ec/0x380
[   12.961686]  mempool_double_free_helper+0x184/0x370
[   12.961712]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.961737]  ? update_load_avg+0x1be/0x21b0
[   12.961766]  ? finish_task_switch.isra.0+0x153/0x700
[   12.961797]  mempool_kmalloc_double_free+0xed/0x140
[   12.961823]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   12.961849]  ? dequeue_task_fair+0x166/0x4e0
[   12.961884]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.961905]  ? __pfx_mempool_kfree+0x10/0x10
[   12.961929]  ? __pfx_read_tsc+0x10/0x10
[   12.961950]  ? ktime_get_ts64+0x86/0x230
[   12.961977]  kunit_try_run_case+0x1a5/0x480
[   12.962000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.962020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.962046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.962072]  ? __kthread_parkme+0x82/0x180
[   12.962096]  ? preempt_count_sub+0x50/0x80
[   12.962122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.962144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.962170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.962195]  kthread+0x337/0x6f0
[   12.962213]  ? trace_preempt_on+0x20/0xc0
[   12.962238]  ? __pfx_kthread+0x10/0x10
[   12.962258]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.962281]  ? calculate_sigpending+0x7b/0xa0
[   12.962304]  ? __pfx_kthread+0x10/0x10
[   12.962326]  ret_from_fork+0x41/0x80
[   12.962348]  ? __pfx_kthread+0x10/0x10
[   12.962368]  ret_from_fork_asm+0x1a/0x30
[   12.962404]  </TASK>
[   12.962417] 
[   12.972009] Allocated by task 255:
[   12.972479]  kasan_save_stack+0x45/0x70
[   12.972662]  kasan_save_track+0x18/0x40
[   12.972803]  kasan_save_alloc_info+0x3b/0x50
[   12.972967]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.973160]  remove_element+0x11e/0x190
[   12.973356]  mempool_alloc_preallocated+0x4d/0x90
[   12.973811]  mempool_double_free_helper+0x8a/0x370
[   12.974127]  mempool_kmalloc_double_free+0xed/0x140
[   12.974303]  kunit_try_run_case+0x1a5/0x480
[   12.974451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.974761]  kthread+0x337/0x6f0
[   12.975077]  ret_from_fork+0x41/0x80
[   12.975270]  ret_from_fork_asm+0x1a/0x30
[   12.975473] 
[   12.975576] Freed by task 255:
[   12.975815]  kasan_save_stack+0x45/0x70
[   12.976127]  kasan_save_track+0x18/0x40
[   12.976267]  kasan_save_free_info+0x3f/0x60
[   12.976411]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.977035]  mempool_free+0x2ec/0x380
[   12.977245]  mempool_double_free_helper+0x109/0x370
[   12.977490]  mempool_kmalloc_double_free+0xed/0x140
[   12.977718]  kunit_try_run_case+0x1a5/0x480
[   12.978011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.978221]  kthread+0x337/0x6f0
[   12.978344]  ret_from_fork+0x41/0x80
[   12.978478]  ret_from_fork_asm+0x1a/0x30
[   12.978661] 
[   12.978810] The buggy address belongs to the object at ffff8881029e8200
[   12.978810]  which belongs to the cache kmalloc-128 of size 128
[   12.979373] The buggy address is located 0 bytes inside of
[   12.979373]  128-byte region [ffff8881029e8200, ffff8881029e8280)
[   12.979976] 
[   12.980083] The buggy address belongs to the physical page:
[   12.980340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e8
[   12.980683] flags: 0x200000000000000(node=0|zone=2)
[   12.980945] page_type: f5(slab)
[   12.981070] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.981305] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.982019] page dumped because: kasan: bad access detected
[   12.982298] 
[   12.982400] Memory state around the buggy address:
[   12.982640]  ffff8881029e8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.983034]  ffff8881029e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.983261] >ffff8881029e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.983583]                    ^
[   12.983782]  ffff8881029e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.984136]  ffff8881029e8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.984357] ==================================================================
[   13.013534] ==================================================================
[   13.014170] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.014541] Free of addr ffff888103cec000 by task kunit_try_catch/259
[   13.014789] 
[   13.014919] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.014970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.014984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.015007] Call Trace:
[   13.015021]  <TASK>
[   13.015037]  dump_stack_lvl+0x73/0xb0
[   13.015066]  print_report+0xd1/0x650
[   13.015091]  ? __virt_addr_valid+0x1db/0x2d0
[   13.015119]  ? kasan_addr_to_slab+0x11/0xa0
[   13.015142]  ? mempool_double_free_helper+0x184/0x370
[   13.015169]  kasan_report_invalid_free+0x10a/0x130
[   13.015197]  ? mempool_double_free_helper+0x184/0x370
[   13.015226]  ? mempool_double_free_helper+0x184/0x370
[   13.015252]  __kasan_mempool_poison_pages+0x115/0x130
[   13.015280]  mempool_free+0x290/0x380
[   13.015306]  mempool_double_free_helper+0x184/0x370
[   13.015333]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.015359]  ? update_load_avg+0x1be/0x21b0
[   13.015387]  ? finish_task_switch.isra.0+0x153/0x700
[   13.015416]  mempool_page_alloc_double_free+0xe8/0x140
[   13.015441]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.015465]  ? dequeue_task_fair+0x166/0x4e0
[   13.015490]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.015514]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.015539]  ? __pfx_read_tsc+0x10/0x10
[   13.015562]  ? ktime_get_ts64+0x86/0x230
[   13.015595]  kunit_try_run_case+0x1a5/0x480
[   13.015620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.015641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.015668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.015695]  ? __kthread_parkme+0x82/0x180
[   13.015719]  ? preempt_count_sub+0x50/0x80
[   13.016073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.016108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.016135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.016163]  kthread+0x337/0x6f0
[   13.016182]  ? trace_preempt_on+0x20/0xc0
[   13.016209]  ? __pfx_kthread+0x10/0x10
[   13.016230]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.016254]  ? calculate_sigpending+0x7b/0xa0
[   13.016278]  ? __pfx_kthread+0x10/0x10
[   13.016299]  ret_from_fork+0x41/0x80
[   13.016322]  ? __pfx_kthread+0x10/0x10
[   13.016344]  ret_from_fork_asm+0x1a/0x30
[   13.016378]  </TASK>
[   13.016391] 
[   13.026129] The buggy address belongs to the physical page:
[   13.026398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cec
[   13.026723] flags: 0x200000000000000(node=0|zone=2)
[   13.027167] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.027466] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.027814] page dumped because: kasan: bad access detected
[   13.028101] 
[   13.028182] Memory state around the buggy address:
[   13.028384]  ffff888103cebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.028714]  ffff888103cebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.028975] >ffff888103cec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.029196]                    ^
[   13.029331]  ffff888103cec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.029653]  ffff888103cec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.030490] ==================================================================