Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.297503] ==================================================================
[   19.297572] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.298143] Free of addr fff00000c789c000 by task kunit_try_catch/239
[   19.298225] 
[   19.298268] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.298361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.298395] Hardware name: linux,dummy-virt (DT)
[   19.298639] Call trace:
[   19.298897]  show_stack+0x20/0x38 (C)
[   19.299022]  dump_stack_lvl+0x8c/0xd0
[   19.299188]  print_report+0x118/0x608
[   19.299613]  kasan_report_invalid_free+0xc0/0xe8
[   19.299757]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.299916]  mempool_free+0x24c/0x328
[   19.300161]  mempool_double_free_helper+0x150/0x2e8
[   19.300252]  mempool_page_alloc_double_free+0xbc/0x118
[   19.300442]  kunit_try_run_case+0x170/0x3f0
[   19.300727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.300891]  kthread+0x328/0x630
[   19.301114]  ret_from_fork+0x10/0x20
[   19.301184] 
[   19.301207] The buggy address belongs to the physical page:
[   19.301626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789c
[   19.301708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.301787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.302139] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.302306] page dumped because: kasan: bad access detected
[   19.302481] 
[   19.302560] Memory state around the buggy address:
[   19.302648]  fff00000c789bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.302700]  fff00000c789bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.303154] >fff00000c789c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.303254]                    ^
[   19.303417]  fff00000c789c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.303512]  fff00000c789c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.303596] ==================================================================
[   19.262099] ==================================================================
[   19.262161] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.262217] Free of addr fff00000c5a52100 by task kunit_try_catch/235
[   19.262263] 
[   19.262296] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.262386] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.262418] Hardware name: linux,dummy-virt (DT)
[   19.262451] Call trace:
[   19.262475]  show_stack+0x20/0x38 (C)
[   19.262525]  dump_stack_lvl+0x8c/0xd0
[   19.262576]  print_report+0x118/0x608
[   19.262623]  kasan_report_invalid_free+0xc0/0xe8
[   19.262675]  check_slab_allocation+0xd4/0x108
[   19.262723]  __kasan_mempool_poison_object+0x78/0x150
[   19.262796]  mempool_free+0x28c/0x328
[   19.262846]  mempool_double_free_helper+0x150/0x2e8
[   19.262898]  mempool_kmalloc_double_free+0xc0/0x118
[   19.262952]  kunit_try_run_case+0x170/0x3f0
[   19.263003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.263057]  kthread+0x328/0x630
[   19.263110]  ret_from_fork+0x10/0x20
[   19.263889] 
[   19.263933] Allocated by task 235:
[   19.263986]  kasan_save_stack+0x3c/0x68
[   19.264060]  kasan_save_track+0x20/0x40
[   19.264555]  kasan_save_alloc_info+0x40/0x58
[   19.264625]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.264679]  remove_element+0x130/0x1f8
[   19.264717]  mempool_alloc_preallocated+0x58/0xc0
[   19.264950]  mempool_double_free_helper+0x94/0x2e8
[   19.265057]  mempool_kmalloc_double_free+0xc0/0x118
[   19.265451]  kunit_try_run_case+0x170/0x3f0
[   19.265585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.265688]  kthread+0x328/0x630
[   19.265733]  ret_from_fork+0x10/0x20
[   19.266110] 
[   19.266256] Freed by task 235:
[   19.266377]  kasan_save_stack+0x3c/0x68
[   19.266529]  kasan_save_track+0x20/0x40
[   19.266704]  kasan_save_free_info+0x4c/0x78
[   19.266782]  __kasan_mempool_poison_object+0xc0/0x150
[   19.266844]  mempool_free+0x28c/0x328
[   19.267109]  mempool_double_free_helper+0x100/0x2e8
[   19.267328]  mempool_kmalloc_double_free+0xc0/0x118
[   19.267425]  kunit_try_run_case+0x170/0x3f0
[   19.267592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.267666]  kthread+0x328/0x630
[   19.267700]  ret_from_fork+0x10/0x20
[   19.267914] 
[   19.268047] The buggy address belongs to the object at fff00000c5a52100
[   19.268047]  which belongs to the cache kmalloc-128 of size 128
[   19.268529] The buggy address is located 0 bytes inside of
[   19.268529]  128-byte region [fff00000c5a52100, fff00000c5a52180)
[   19.268708] 
[   19.268746] The buggy address belongs to the physical page:
[   19.268797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a52
[   19.268950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.269067] page_type: f5(slab)
[   19.269137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.269382] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.269551] page dumped because: kasan: bad access detected
[   19.269612] 
[   19.269744] Memory state around the buggy address:
[   19.269802]  fff00000c5a52000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.269944]  fff00000c5a52080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.270050] >fff00000c5a52100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.270133]                    ^
[   19.270442]  fff00000c5a52180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.270533]  fff00000c5a52200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.270622] ==================================================================
[   19.280205] ==================================================================
[   19.280275] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.280334] Free of addr fff00000c789c000 by task kunit_try_catch/237
[   19.280600] 
[   19.280650] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.280916] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.280961] Hardware name: linux,dummy-virt (DT)
[   19.281348] Call trace:
[   19.281708]  show_stack+0x20/0x38 (C)
[   19.281859]  dump_stack_lvl+0x8c/0xd0
[   19.282033]  print_report+0x118/0x608
[   19.282151]  kasan_report_invalid_free+0xc0/0xe8
[   19.282316]  __kasan_mempool_poison_object+0x14c/0x150
[   19.282474]  mempool_free+0x28c/0x328
[   19.282553]  mempool_double_free_helper+0x150/0x2e8
[   19.282655]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.282712]  kunit_try_run_case+0x170/0x3f0
[   19.282762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.282817]  kthread+0x328/0x630
[   19.282860]  ret_from_fork+0x10/0x20
[   19.282911] 
[   19.283251] The buggy address belongs to the physical page:
[   19.283297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10789c
[   19.283534] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.284054] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.284256] page_type: f8(unknown)
[   19.284411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.284575] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.284762] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.285030] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.285176] head: 0bfffe0000000002 ffffc1ffc31e2701 00000000ffffffff 00000000ffffffff
[   19.285302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.285391] page dumped because: kasan: bad access detected
[   19.285426] 
[   19.285461] Memory state around the buggy address:
[   19.285816]  fff00000c789bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.285880]  fff00000c789bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.285941] >fff00000c789c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.285985]                    ^
[   19.286017]  fff00000c789c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.286339]  fff00000c789c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.286414] ==================================================================

[   14.419153] ==================================================================
[   14.419660] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.420101] Free of addr ffff888103966200 by task kunit_try_catch/252
[   14.420402] 
[   14.420512] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.420558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.420569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.420589] Call Trace:
[   14.420618]  <TASK>
[   14.420634]  dump_stack_lvl+0x73/0xb0
[   14.420666]  print_report+0xd1/0x650
[   14.420689]  ? __virt_addr_valid+0x1db/0x2d0
[   14.420715]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.420737]  ? mempool_double_free_helper+0x184/0x370
[   14.420762]  kasan_report_invalid_free+0x10a/0x130
[   14.420787]  ? mempool_double_free_helper+0x184/0x370
[   14.420813]  ? mempool_double_free_helper+0x184/0x370
[   14.420835]  ? mempool_double_free_helper+0x184/0x370
[   14.420859]  check_slab_allocation+0x101/0x130
[   14.420935]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.420961]  mempool_free+0x2ec/0x380
[   14.420985]  ? mempool_alloc_preallocated+0x5b/0x90
[   14.421011]  mempool_double_free_helper+0x184/0x370
[   14.421038]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.421068]  ? finish_task_switch.isra.0+0x153/0x700
[   14.421099]  mempool_kmalloc_double_free+0xed/0x140
[   14.421124]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.421152]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.421175]  ? __pfx_mempool_kfree+0x10/0x10
[   14.421201]  ? __pfx_read_tsc+0x10/0x10
[   14.421223]  ? ktime_get_ts64+0x86/0x230
[   14.421249]  kunit_try_run_case+0x1a5/0x480
[   14.421275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.421298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.421324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.421348]  ? __kthread_parkme+0x82/0x180
[   14.421370]  ? preempt_count_sub+0x50/0x80
[   14.421393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.421418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.421443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.421468]  kthread+0x337/0x6f0
[   14.421487]  ? trace_preempt_on+0x20/0xc0
[   14.421511]  ? __pfx_kthread+0x10/0x10
[   14.421531]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.421553]  ? calculate_sigpending+0x7b/0xa0
[   14.421577]  ? __pfx_kthread+0x10/0x10
[   14.421609]  ret_from_fork+0x116/0x1d0
[   14.421628]  ? __pfx_kthread+0x10/0x10
[   14.421647]  ret_from_fork_asm+0x1a/0x30
[   14.421679]  </TASK>
[   14.421690] 
[   14.430741] Allocated by task 252:
[   14.431272]  kasan_save_stack+0x45/0x70
[   14.431512]  kasan_save_track+0x18/0x40
[   14.431704]  kasan_save_alloc_info+0x3b/0x50
[   14.432010]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.432260]  remove_element+0x11e/0x190
[   14.432434]  mempool_alloc_preallocated+0x4d/0x90
[   14.432640]  mempool_double_free_helper+0x8a/0x370
[   14.432990]  mempool_kmalloc_double_free+0xed/0x140
[   14.433191]  kunit_try_run_case+0x1a5/0x480
[   14.433369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433612]  kthread+0x337/0x6f0
[   14.433792]  ret_from_fork+0x116/0x1d0
[   14.433967]  ret_from_fork_asm+0x1a/0x30
[   14.434137] 
[   14.434234] Freed by task 252:
[   14.434374]  kasan_save_stack+0x45/0x70
[   14.434552]  kasan_save_track+0x18/0x40
[   14.434790]  kasan_save_free_info+0x3f/0x60
[   14.435196]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.435421]  mempool_free+0x2ec/0x380
[   14.435615]  mempool_double_free_helper+0x109/0x370
[   14.435803]  mempool_kmalloc_double_free+0xed/0x140
[   14.436107]  kunit_try_run_case+0x1a5/0x480
[   14.436285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.436512]  kthread+0x337/0x6f0
[   14.436646]  ret_from_fork+0x116/0x1d0
[   14.436780]  ret_from_fork_asm+0x1a/0x30
[   14.436923] 
[   14.436998] The buggy address belongs to the object at ffff888103966200
[   14.436998]  which belongs to the cache kmalloc-128 of size 128
[   14.437443] The buggy address is located 0 bytes inside of
[   14.437443]  128-byte region [ffff888103966200, ffff888103966280)
[   14.438528] 
[   14.438646] The buggy address belongs to the physical page:
[   14.438878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103966
[   14.439127] flags: 0x200000000000000(node=0|zone=2)
[   14.439293] page_type: f5(slab)
[   14.439417] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.439658] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.440475] page dumped because: kasan: bad access detected
[   14.440764] 
[   14.440860] Memory state around the buggy address:
[   14.441167]  ffff888103966100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.441430]  ffff888103966180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.441768] >ffff888103966200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.441983]                    ^
[   14.442098]  ffff888103966280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.442764]  ffff888103966300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.443132] ==================================================================
[   14.447769] ==================================================================
[   14.448286] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.448624] Free of addr ffff888102acc000 by task kunit_try_catch/254
[   14.448908] 
[   14.449019] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.449068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.449136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.449159] Call Trace:
[   14.449172]  <TASK>
[   14.449189]  dump_stack_lvl+0x73/0xb0
[   14.449222]  print_report+0xd1/0x650
[   14.449244]  ? __virt_addr_valid+0x1db/0x2d0
[   14.449270]  ? kasan_addr_to_slab+0x11/0xa0
[   14.449290]  ? mempool_double_free_helper+0x184/0x370
[   14.449315]  kasan_report_invalid_free+0x10a/0x130
[   14.449341]  ? mempool_double_free_helper+0x184/0x370
[   14.449368]  ? mempool_double_free_helper+0x184/0x370
[   14.449392]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.449417]  mempool_free+0x2ec/0x380
[   14.449444]  mempool_double_free_helper+0x184/0x370
[   14.449468]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.449496]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.449519]  ? finish_task_switch.isra.0+0x153/0x700
[   14.449546]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.449571]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.449611]  ? __kasan_check_write+0x18/0x20
[   14.449632]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.449655]  ? __pfx_mempool_kfree+0x10/0x10
[   14.449681]  ? __pfx_read_tsc+0x10/0x10
[   14.449704]  ? ktime_get_ts64+0x86/0x230
[   14.449729]  kunit_try_run_case+0x1a5/0x480
[   14.449754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.449777]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.449813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.449877]  ? __kthread_parkme+0x82/0x180
[   14.449901]  ? preempt_count_sub+0x50/0x80
[   14.449925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.449950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.449975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.450001]  kthread+0x337/0x6f0
[   14.450020]  ? trace_preempt_on+0x20/0xc0
[   14.450045]  ? __pfx_kthread+0x10/0x10
[   14.450065]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.450087]  ? calculate_sigpending+0x7b/0xa0
[   14.450113]  ? __pfx_kthread+0x10/0x10
[   14.450135]  ret_from_fork+0x116/0x1d0
[   14.450155]  ? __pfx_kthread+0x10/0x10
[   14.450176]  ret_from_fork_asm+0x1a/0x30
[   14.450208]  </TASK>
[   14.450220] 
[   14.459316] The buggy address belongs to the physical page:
[   14.459505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   14.460130] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.460491] flags: 0x200000000000040(head|node=0|zone=2)
[   14.460737] page_type: f8(unknown)
[   14.461051] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.461352] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.461675] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.462041] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.462279] head: 0200000000000002 ffffea00040ab301 00000000ffffffff 00000000ffffffff
[   14.462635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.463211] page dumped because: kasan: bad access detected
[   14.463417] 
[   14.463517] Memory state around the buggy address:
[   14.463744]  ffff888102acbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.464157]  ffff888102acbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.464389] >ffff888102acc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.464719]                    ^
[   14.464894]  ffff888102acc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.465417]  ffff888102acc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.465649] ==================================================================
[   14.468994] ==================================================================
[   14.470373] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.470742] Free of addr ffff888103a40000 by task kunit_try_catch/256
[   14.471210] 
[   14.471308] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.471353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.471364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.471384] Call Trace:
[   14.471396]  <TASK>
[   14.471411]  dump_stack_lvl+0x73/0xb0
[   14.471440]  print_report+0xd1/0x650
[   14.471463]  ? __virt_addr_valid+0x1db/0x2d0
[   14.471487]  ? kasan_addr_to_slab+0x11/0xa0
[   14.471507]  ? mempool_double_free_helper+0x184/0x370
[   14.471532]  kasan_report_invalid_free+0x10a/0x130
[   14.471557]  ? mempool_double_free_helper+0x184/0x370
[   14.471583]  ? mempool_double_free_helper+0x184/0x370
[   14.471618]  __kasan_mempool_poison_pages+0x115/0x130
[   14.471643]  mempool_free+0x290/0x380
[   14.471670]  mempool_double_free_helper+0x184/0x370
[   14.471694]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.471719]  ? update_load_avg+0x1be/0x21b0
[   14.471746]  ? finish_task_switch.isra.0+0x153/0x700
[   14.471772]  mempool_page_alloc_double_free+0xe8/0x140
[   14.471798]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.471874]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.471898]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.471925]  ? __pfx_read_tsc+0x10/0x10
[   14.471946]  ? ktime_get_ts64+0x86/0x230
[   14.471970]  kunit_try_run_case+0x1a5/0x480
[   14.471995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.472020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.472044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.472069]  ? __kthread_parkme+0x82/0x180
[   14.472091]  ? preempt_count_sub+0x50/0x80
[   14.472114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.472138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.472162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.472189]  kthread+0x337/0x6f0
[   14.472208]  ? trace_preempt_on+0x20/0xc0
[   14.472233]  ? __pfx_kthread+0x10/0x10
[   14.472253]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.472275]  ? calculate_sigpending+0x7b/0xa0
[   14.472299]  ? __pfx_kthread+0x10/0x10
[   14.472320]  ret_from_fork+0x116/0x1d0
[   14.472338]  ? __pfx_kthread+0x10/0x10
[   14.472358]  ret_from_fork_asm+0x1a/0x30
[   14.472389]  </TASK>
[   14.472399] 
[   14.482434] The buggy address belongs to the physical page:
[   14.482730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a40
[   14.482982] flags: 0x200000000000000(node=0|zone=2)
[   14.484985] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.485234] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.485453] page dumped because: kasan: bad access detected
[   14.485633] 
[   14.485701] Memory state around the buggy address:
[   14.486121]  ffff888103a3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.486336]  ffff888103a3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.486543] >ffff888103a40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.486810]                    ^
[   14.486994]  ffff888103a40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.487311]  ffff888103a40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.487526] ==================================================================