Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   26.093644] ==================================================================
[   26.093764] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   26.094259] Free of addr fff00000c77a0000 by task kunit_try_catch/239
[   26.094373] 
[   26.094459] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.094647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.094716] Hardware name: linux,dummy-virt (DT)
[   26.094795] Call trace:
[   26.095294]  show_stack+0x20/0x38 (C)
[   26.095638]  dump_stack_lvl+0x8c/0xd0
[   26.096059]  print_report+0x118/0x608
[   26.096208]  kasan_report_invalid_free+0xc0/0xe8
[   26.096347]  __kasan_mempool_poison_object+0x14c/0x150
[   26.096808]  mempool_free+0x28c/0x328
[   26.097063]  mempool_double_free_helper+0x150/0x2e8
[   26.097888]  mempool_kmalloc_large_double_free+0xc0/0x118
[   26.098127]  kunit_try_run_case+0x170/0x3f0
[   26.098766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.099541]  kthread+0x328/0x630
[   26.099897]  ret_from_fork+0x10/0x20
[   26.100043] 
[   26.100090] The buggy address belongs to the physical page:
[   26.100832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0
[   26.101299] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.101416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.101540] page_type: f8(unknown)
[   26.101633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.101749] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.101865] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.102000] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.102118] head: 0bfffe0000000002 ffffc1ffc31de801 00000000ffffffff 00000000ffffffff
[   26.103073] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.103655] page dumped because: kasan: bad access detected
[   26.103836] 
[   26.103889] Memory state around the buggy address:
[   26.103993]  fff00000c779ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.104253]  fff00000c779ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.104593] >fff00000c77a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.104697]                    ^
[   26.105187]  fff00000c77a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.105296]  fff00000c77a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.105390] ==================================================================
[   26.121042] ==================================================================
[   26.121156] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   26.121274] Free of addr fff00000c77a0000 by task kunit_try_catch/241
[   26.121371] 
[   26.121436] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.121630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.121797] Hardware name: linux,dummy-virt (DT)
[   26.121974] Call trace:
[   26.122031]  show_stack+0x20/0x38 (C)
[   26.122419]  dump_stack_lvl+0x8c/0xd0
[   26.122553]  print_report+0x118/0x608
[   26.122673]  kasan_report_invalid_free+0xc0/0xe8
[   26.122797]  __kasan_mempool_poison_pages+0xe0/0xe8
[   26.122919]  mempool_free+0x24c/0x328
[   26.123060]  mempool_double_free_helper+0x150/0x2e8
[   26.123188]  mempool_page_alloc_double_free+0xbc/0x118
[   26.123310]  kunit_try_run_case+0x170/0x3f0
[   26.123430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.123581]  kthread+0x328/0x630
[   26.123768]  ret_from_fork+0x10/0x20
[   26.124193] 
[   26.124249] The buggy address belongs to the physical page:
[   26.124677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0
[   26.124819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.125169] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.125382] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.125622] page dumped because: kasan: bad access detected
[   26.125669] 
[   26.125692] Memory state around the buggy address:
[   26.125733]  fff00000c779ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.125829]  fff00000c779ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.126075] >fff00000c77a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.126167]                    ^
[   26.126235]  fff00000c77a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.126344]  fff00000c77a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.126619] ==================================================================
[   26.059726] ==================================================================
[   26.060124] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   26.060620] Free of addr fff00000c67e4000 by task kunit_try_catch/237
[   26.060815] 
[   26.060953] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.061144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.061212] Hardware name: linux,dummy-virt (DT)
[   26.061290] Call trace:
[   26.061361]  show_stack+0x20/0x38 (C)
[   26.061577]  dump_stack_lvl+0x8c/0xd0
[   26.061740]  print_report+0x118/0x608
[   26.061867]  kasan_report_invalid_free+0xc0/0xe8
[   26.062237]  check_slab_allocation+0xd4/0x108
[   26.062427]  __kasan_mempool_poison_object+0x78/0x150
[   26.062682]  mempool_free+0x28c/0x328
[   26.062848]  mempool_double_free_helper+0x150/0x2e8
[   26.063019]  mempool_kmalloc_double_free+0xc0/0x118
[   26.063243]  kunit_try_run_case+0x170/0x3f0
[   26.063533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.063892]  kthread+0x328/0x630
[   26.064046]  ret_from_fork+0x10/0x20
[   26.064316] 
[   26.064367] Allocated by task 237:
[   26.064448]  kasan_save_stack+0x3c/0x68
[   26.064552]  kasan_save_track+0x20/0x40
[   26.064643]  kasan_save_alloc_info+0x40/0x58
[   26.065052]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.065309]  remove_element+0x130/0x1f8
[   26.065422]  mempool_alloc_preallocated+0x58/0xc0
[   26.065527]  mempool_double_free_helper+0x94/0x2e8
[   26.065625]  mempool_kmalloc_double_free+0xc0/0x118
[   26.065726]  kunit_try_run_case+0x170/0x3f0
[   26.065838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.066143]  kthread+0x328/0x630
[   26.066233]  ret_from_fork+0x10/0x20
[   26.066328] 
[   26.066452] Freed by task 237:
[   26.066561]  kasan_save_stack+0x3c/0x68
[   26.066684]  kasan_save_track+0x20/0x40
[   26.066836]  kasan_save_free_info+0x4c/0x78
[   26.067066]  __kasan_mempool_poison_object+0xc0/0x150
[   26.068289]  mempool_free+0x28c/0x328
[   26.068405]  mempool_double_free_helper+0x100/0x2e8
[   26.068529]  mempool_kmalloc_double_free+0xc0/0x118
[   26.068650]  kunit_try_run_case+0x170/0x3f0
[   26.068813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.069134]  kthread+0x328/0x630
[   26.069261]  ret_from_fork+0x10/0x20
[   26.069366] 
[   26.069417] The buggy address belongs to the object at fff00000c67e4000
[   26.069417]  which belongs to the cache kmalloc-128 of size 128
[   26.069555] The buggy address is located 0 bytes inside of
[   26.069555]  128-byte region [fff00000c67e4000, fff00000c67e4080)
[   26.069760] 
[   26.069810] The buggy address belongs to the physical page:
[   26.069881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067e4
[   26.070082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.070261] page_type: f5(slab)
[   26.070452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.070638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.070735] page dumped because: kasan: bad access detected
[   26.070810] 
[   26.070853] Memory state around the buggy address:
[   26.070922]  fff00000c67e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071201]  fff00000c67e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071321] >fff00000c67e4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.071428]                    ^
[   26.071515]  fff00000c67e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071630]  fff00000c67e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.071749] ==================================================================

[   13.164064] ==================================================================
[   13.165118] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.165415] Free of addr ffff888102a1c000 by task kunit_try_catch/257
[   13.166169] 
[   13.166410] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.166466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.166479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.166501] Call Trace:
[   13.166513]  <TASK>
[   13.166558]  dump_stack_lvl+0x73/0xb0
[   13.166586]  print_report+0xd1/0x650
[   13.166610]  ? __virt_addr_valid+0x1db/0x2d0
[   13.166633]  ? kasan_addr_to_slab+0x11/0xa0
[   13.166654]  ? mempool_double_free_helper+0x184/0x370
[   13.166679]  kasan_report_invalid_free+0x10a/0x130
[   13.166704]  ? mempool_double_free_helper+0x184/0x370
[   13.166731]  ? mempool_double_free_helper+0x184/0x370
[   13.166754]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.166779]  mempool_free+0x2ec/0x380
[   13.166802]  mempool_double_free_helper+0x184/0x370
[   13.166826]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.166850]  ? dequeue_entities+0xa24/0x1790
[   13.166875]  ? finish_task_switch.isra.0+0x153/0x700
[   13.166902]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.166928]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.166952]  ? dequeue_task_fair+0x166/0x4e0
[   13.166974]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.166993]  ? __pfx_mempool_kfree+0x10/0x10
[   13.167015]  ? __pfx_read_tsc+0x10/0x10
[   13.167034]  ? ktime_get_ts64+0x86/0x230
[   13.167059]  kunit_try_run_case+0x1a5/0x480
[   13.167083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.167104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.167148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.167173]  ? __kthread_parkme+0x82/0x180
[   13.167195]  ? preempt_count_sub+0x50/0x80
[   13.167219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.167243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.167266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.167288]  kthread+0x337/0x6f0
[   13.167309]  ? trace_preempt_on+0x20/0xc0
[   13.167341]  ? __pfx_kthread+0x10/0x10
[   13.167363]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.167385]  ? calculate_sigpending+0x7b/0xa0
[   13.167410]  ? __pfx_kthread+0x10/0x10
[   13.167433]  ret_from_fork+0x41/0x80
[   13.167454]  ? __pfx_kthread+0x10/0x10
[   13.167475]  ret_from_fork_asm+0x1a/0x30
[   13.167506]  </TASK>
[   13.167517] 
[   13.177128] The buggy address belongs to the physical page:
[   13.177403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   13.177815] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.178192] flags: 0x200000000000040(head|node=0|zone=2)
[   13.179278] page_type: f8(unknown)
[   13.179527] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.179893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.180390] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.180831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.181482] head: 0200000000000002 ffffea00040a8701 00000000ffffffff 00000000ffffffff
[   13.181991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.182479] page dumped because: kasan: bad access detected
[   13.182732] 
[   13.182975] Memory state around the buggy address:
[   13.183185]  ffff888102a1bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.183744]  ffff888102a1bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.184143] >ffff888102a1c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.184782]                    ^
[   13.185026]  ffff888102a1c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.185636]  ffff888102a1c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.185943] ==================================================================
[   13.188827] ==================================================================
[   13.189499] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.189743] Free of addr ffff888102a1c000 by task kunit_try_catch/259
[   13.190036] 
[   13.190184] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.190229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.190241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.190262] Call Trace:
[   13.190273]  <TASK>
[   13.190289]  dump_stack_lvl+0x73/0xb0
[   13.190314]  print_report+0xd1/0x650
[   13.190350]  ? __virt_addr_valid+0x1db/0x2d0
[   13.190374]  ? kasan_addr_to_slab+0x11/0xa0
[   13.190453]  ? mempool_double_free_helper+0x184/0x370
[   13.190480]  kasan_report_invalid_free+0x10a/0x130
[   13.190505]  ? mempool_double_free_helper+0x184/0x370
[   13.190532]  ? mempool_double_free_helper+0x184/0x370
[   13.190576]  __kasan_mempool_poison_pages+0x115/0x130
[   13.190602]  mempool_free+0x290/0x380
[   13.190627]  mempool_double_free_helper+0x184/0x370
[   13.190651]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.190675]  ? dequeue_entities+0xa24/0x1790
[   13.190700]  ? finish_task_switch.isra.0+0x153/0x700
[   13.190745]  mempool_page_alloc_double_free+0xe8/0x140
[   13.190767]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.190788]  ? dequeue_task_fair+0x166/0x4e0
[   13.190811]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.190831]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.190854]  ? __pfx_read_tsc+0x10/0x10
[   13.190874]  ? ktime_get_ts64+0x86/0x230
[   13.190899]  kunit_try_run_case+0x1a5/0x480
[   13.190924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.190946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.190970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.190994]  ? __kthread_parkme+0x82/0x180
[   13.191016]  ? preempt_count_sub+0x50/0x80
[   13.191040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.191063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.191085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.191107]  kthread+0x337/0x6f0
[   13.191142]  ? trace_preempt_on+0x20/0xc0
[   13.191167]  ? __pfx_kthread+0x10/0x10
[   13.191189]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.191210]  ? calculate_sigpending+0x7b/0xa0
[   13.191232]  ? __pfx_kthread+0x10/0x10
[   13.191254]  ret_from_fork+0x41/0x80
[   13.191275]  ? __pfx_kthread+0x10/0x10
[   13.191297]  ret_from_fork_asm+0x1a/0x30
[   13.191341]  </TASK>
[   13.191352] 
[   13.203761] The buggy address belongs to the physical page:
[   13.204005] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   13.204561] flags: 0x200000000000000(node=0|zone=2)
[   13.204935] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.205564] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.206262] page dumped because: kasan: bad access detected
[   13.206520] 
[   13.206834] Memory state around the buggy address:
[   13.207500]  ffff888102a1bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.208051]  ffff888102a1bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.208802] >ffff888102a1c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.209238]                    ^
[   13.209372]  ffff888102a1c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.210055]  ffff888102a1c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.210779] ==================================================================
[   13.125208] ==================================================================
[   13.125674] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.125911] Free of addr ffff888102756000 by task kunit_try_catch/255
[   13.126107] 
[   13.126189] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.126234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.126246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.126266] Call Trace:
[   13.126277]  <TASK>
[   13.126290]  dump_stack_lvl+0x73/0xb0
[   13.126313]  print_report+0xd1/0x650
[   13.126349]  ? __virt_addr_valid+0x1db/0x2d0
[   13.126370]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.126392]  ? mempool_double_free_helper+0x184/0x370
[   13.126416]  kasan_report_invalid_free+0x10a/0x130
[   13.126440]  ? mempool_double_free_helper+0x184/0x370
[   13.126999]  ? mempool_double_free_helper+0x184/0x370
[   13.127026]  ? mempool_double_free_helper+0x184/0x370
[   13.127049]  check_slab_allocation+0x101/0x130
[   13.127073]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.127098]  mempool_free+0x2ec/0x380
[   13.127121]  mempool_double_free_helper+0x184/0x370
[   13.127146]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.127170]  ? dequeue_entities+0xa24/0x1790
[   13.127195]  ? finish_task_switch.isra.0+0x153/0x700
[   13.127224]  mempool_kmalloc_double_free+0xed/0x140
[   13.127249]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.127273]  ? dequeue_task_fair+0x166/0x4e0
[   13.127295]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.127314]  ? __pfx_mempool_kfree+0x10/0x10
[   13.127351]  ? __pfx_read_tsc+0x10/0x10
[   13.127370]  ? ktime_get_ts64+0x86/0x230
[   13.127442]  kunit_try_run_case+0x1a5/0x480
[   13.127467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.127490]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.127513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.127537]  ? __kthread_parkme+0x82/0x180
[   13.127558]  ? preempt_count_sub+0x50/0x80
[   13.127582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.127605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.127627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.127650]  kthread+0x337/0x6f0
[   13.127670]  ? trace_preempt_on+0x20/0xc0
[   13.127693]  ? __pfx_kthread+0x10/0x10
[   13.127715]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.127737]  ? calculate_sigpending+0x7b/0xa0
[   13.127757]  ? __pfx_kthread+0x10/0x10
[   13.127779]  ret_from_fork+0x41/0x80
[   13.127799]  ? __pfx_kthread+0x10/0x10
[   13.127820]  ret_from_fork_asm+0x1a/0x30
[   13.127851]  </TASK>
[   13.127862] 
[   13.142387] Allocated by task 255:
[   13.142753]  kasan_save_stack+0x45/0x70
[   13.142906]  kasan_save_track+0x18/0x40
[   13.143038]  kasan_save_alloc_info+0x3b/0x50
[   13.143309]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.143873]  remove_element+0x11e/0x190
[   13.144262]  mempool_alloc_preallocated+0x4d/0x90
[   13.144819]  mempool_double_free_helper+0x8a/0x370
[   13.145280]  mempool_kmalloc_double_free+0xed/0x140
[   13.145874]  kunit_try_run_case+0x1a5/0x480
[   13.146028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.146418]  kthread+0x337/0x6f0
[   13.146834]  ret_from_fork+0x41/0x80
[   13.147194]  ret_from_fork_asm+0x1a/0x30
[   13.147616] 
[   13.147711] Freed by task 255:
[   13.148067]  kasan_save_stack+0x45/0x70
[   13.148242]  kasan_save_track+0x18/0x40
[   13.148679]  kasan_save_free_info+0x3f/0x60
[   13.149072]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.149559]  mempool_free+0x2ec/0x380
[   13.149772]  mempool_double_free_helper+0x109/0x370
[   13.149931]  mempool_kmalloc_double_free+0xed/0x140
[   13.150088]  kunit_try_run_case+0x1a5/0x480
[   13.150468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.151033]  kthread+0x337/0x6f0
[   13.151423]  ret_from_fork+0x41/0x80
[   13.151766]  ret_from_fork_asm+0x1a/0x30
[   13.152112] 
[   13.152288] The buggy address belongs to the object at ffff888102756000
[   13.152288]  which belongs to the cache kmalloc-128 of size 128
[   13.153009] The buggy address is located 0 bytes inside of
[   13.153009]  128-byte region [ffff888102756000, ffff888102756080)
[   13.153866] 
[   13.154028] The buggy address belongs to the physical page:
[   13.154634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102756
[   13.155185] flags: 0x200000000000000(node=0|zone=2)
[   13.155361] page_type: f5(slab)
[   13.155550] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.156205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.156945] page dumped because: kasan: bad access detected
[   13.157530] 
[   13.157693] Memory state around the buggy address:
[   13.157874]  ffff888102755f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.158081]  ffff888102755f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.158702] >ffff888102756000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.159357]                    ^
[   13.159721]  ffff888102756080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.160369]  ffff888102756100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.160770] ==================================================================

[   23.246704] ==================================================================
[   23.247836] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   23.248521] Free of addr ffff00000df00000 by task kunit_try_catch/291
[   23.249118] 
[   23.249283] CPU: 2 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.249334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.249347] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.249366] Call trace:
[   23.249378]  show_stack+0x20/0x38 (C)
[   23.249411]  dump_stack_lvl+0x8c/0xd0
[   23.249442]  print_report+0x118/0x608
[   23.249472]  kasan_report_invalid_free+0xc0/0xe8
[   23.249502]  __kasan_mempool_poison_object+0x14c/0x150
[   23.249537]  mempool_free+0x28c/0x328
[   23.249571]  mempool_double_free_helper+0x150/0x2e8
[   23.249607]  mempool_kmalloc_large_double_free+0xc0/0x118
[   23.249645]  kunit_try_run_case+0x170/0x3f0
[   23.249682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.249722]  kthread+0x328/0x630
[   23.249757]  ret_from_fork+0x10/0x20
[   23.249791] 
[   23.256360] The buggy address belongs to the physical page:
[   23.256878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf00
[   23.257603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.258310] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   23.258962] page_type: f8(unknown)
[   23.259298] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.260014] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.260729] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.261452] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.262175] head: 03fffe0000000002 fffffdffc037c001 00000000ffffffff 00000000ffffffff
[   23.262898] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.263613] page dumped because: kasan: bad access detected
[   23.264128] 
[   23.264280] Memory state around the buggy address:
[   23.264729]  ffff00000defff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.265395]  ffff00000defff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.266062] >ffff00000df00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.266723]                    ^
[   23.267034]  ffff00000df00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.267700]  ffff00000df00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.268362] ==================================================================
[   23.212805] ==================================================================
[   23.213872] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   23.214550] Free of addr ffff0000101ea200 by task kunit_try_catch/289
[   23.215143] 
[   23.215303] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.215346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.215359] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.215373] Call trace:
[   23.215384]  show_stack+0x20/0x38 (C)
[   23.215412]  dump_stack_lvl+0x8c/0xd0
[   23.215438]  print_report+0x118/0x608
[   23.215463]  kasan_report_invalid_free+0xc0/0xe8
[   23.215489]  check_slab_allocation+0xd4/0x108
[   23.215514]  __kasan_mempool_poison_object+0x78/0x150
[   23.215542]  mempool_free+0x28c/0x328
[   23.215571]  mempool_double_free_helper+0x150/0x2e8
[   23.215603]  mempool_kmalloc_double_free+0xc0/0x118
[   23.215633]  kunit_try_run_case+0x170/0x3f0
[   23.215664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.215697]  kthread+0x328/0x630
[   23.215727]  ret_from_fork+0x10/0x20
[   23.215754] 
[   23.222625] Allocated by task 289:
[   23.222946]  kasan_save_stack+0x3c/0x68
[   23.223312]  kasan_save_track+0x20/0x40
[   23.223678]  kasan_save_alloc_info+0x40/0x58
[   23.224084]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.224581]  remove_element+0x130/0x1f8
[   23.224951]  mempool_alloc_preallocated+0x58/0xc0
[   23.225397]  mempool_double_free_helper+0x94/0x2e8
[   23.225852]  mempool_kmalloc_double_free+0xc0/0x118
[   23.226313]  kunit_try_run_case+0x170/0x3f0
[   23.226713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.227229]  kthread+0x328/0x630
[   23.227544]  ret_from_fork+0x10/0x20
[   23.227887] 
[   23.228036] Freed by task 289:
[   23.228325]  kasan_save_stack+0x3c/0x68
[   23.228691]  kasan_save_track+0x20/0x40
[   23.229055]  kasan_save_free_info+0x4c/0x78
[   23.229453]  __kasan_mempool_poison_object+0xc0/0x150
[   23.229928]  mempool_free+0x28c/0x328
[   23.230282]  mempool_double_free_helper+0x100/0x2e8
[   23.230744]  mempool_kmalloc_double_free+0xc0/0x118
[   23.231205]  kunit_try_run_case+0x170/0x3f0
[   23.231605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.232120]  kthread+0x328/0x630
[   23.232436]  ret_from_fork+0x10/0x20
[   23.232779] 
[   23.232929] The buggy address belongs to the object at ffff0000101ea200
[   23.232929]  which belongs to the cache kmalloc-128 of size 128
[   23.234053] The buggy address is located 0 bytes inside of
[   23.234053]  128-byte region [ffff0000101ea200, ffff0000101ea280)
[   23.235097] 
[   23.235247] The buggy address belongs to the physical page:
[   23.235758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   23.236484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.237089] page_type: f5(slab)
[   23.237397] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.238106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.238807] page dumped because: kasan: bad access detected
[   23.239317] 
[   23.239466] Memory state around the buggy address:
[   23.239909]  ffff0000101ea100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.240568]  ffff0000101ea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.241228] >ffff0000101ea200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.241884]                    ^
[   23.242189]  ffff0000101ea280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.242849]  ffff0000101ea300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.243505] ==================================================================
[   23.271597] ==================================================================
[   23.272750] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   23.273418] Free of addr ffff00000d73c000 by task kunit_try_catch/293
[   23.274006] 
[   23.274171] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.274223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.274237] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.274254] Call trace:
[   23.274266]  show_stack+0x20/0x38 (C)
[   23.274301]  dump_stack_lvl+0x8c/0xd0
[   23.274331]  print_report+0x118/0x608
[   23.274362]  kasan_report_invalid_free+0xc0/0xe8
[   23.274393]  __kasan_mempool_poison_pages+0xe0/0xe8
[   23.274425]  mempool_free+0x24c/0x328
[   23.274460]  mempool_double_free_helper+0x150/0x2e8
[   23.274498]  mempool_page_alloc_double_free+0xbc/0x118
[   23.274531]  kunit_try_run_case+0x170/0x3f0
[   23.274567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.274607]  kthread+0x328/0x630
[   23.274641]  ret_from_fork+0x10/0x20
[   23.274673] 
[   23.281196] The buggy address belongs to the physical page:
[   23.281713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd73c
[   23.282439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.283063] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.283781] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.284488] page dumped because: kasan: bad access detected
[   23.285002] 
[   23.285154] Memory state around the buggy address:
[   23.285603]  ffff00000d73bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.286269]  ffff00000d73bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.286936] >ffff00000d73c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.287600]                    ^
[   23.287911]  ffff00000d73c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.288578]  ffff00000d73c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.289241] ==================================================================