Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.668932] ==================================================================
[   18.669139] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.669343] Free of addr fff00000c7994000 by task kunit_try_catch/237
[   18.669668] 
[   18.669726] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.669925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.670057] Hardware name: linux,dummy-virt (DT)
[   18.670162] Call trace:
[   18.670212]  show_stack+0x20/0x38 (C)
[   18.670267]  dump_stack_lvl+0x8c/0xd0
[   18.670716]  print_report+0x118/0x5d0
[   18.670971]  kasan_report_invalid_free+0xc0/0xe8
[   18.671092]  __kasan_mempool_poison_object+0x14c/0x150
[   18.671264]  mempool_free+0x28c/0x328
[   18.671312]  mempool_double_free_helper+0x150/0x2e8
[   18.671629]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.671849]  kunit_try_run_case+0x170/0x3f0
[   18.672065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.672515]  kthread+0x328/0x630
[   18.672596]  ret_from_fork+0x10/0x20
[   18.672780] 
[   18.672814] The buggy address belongs to the physical page:
[   18.672921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994
[   18.672991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.673048] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.673115] page_type: f8(unknown)
[   18.673156] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.673224] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.673289] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.673339] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.673397] head: 0bfffe0000000002 ffffc1ffc31e6501 00000000ffffffff 00000000ffffffff
[   18.673446] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.673496] page dumped because: kasan: bad access detected
[   18.673527] 
[   18.673546] Memory state around the buggy address:
[   18.673594]  fff00000c7993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.673641]  fff00000c7993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.673694] >fff00000c7994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.673747]                    ^
[   18.673774]  fff00000c7994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.674192]  fff00000c7994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.674394] ==================================================================
[   18.648594] ==================================================================
[   18.648652] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.648716] Free of addr fff00000c780a100 by task kunit_try_catch/235
[   18.648759] 
[   18.648840] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.648936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.648970] Hardware name: linux,dummy-virt (DT)
[   18.649003] Call trace:
[   18.649035]  show_stack+0x20/0x38 (C)
[   18.649086]  dump_stack_lvl+0x8c/0xd0
[   18.649144]  print_report+0x118/0x5d0
[   18.649191]  kasan_report_invalid_free+0xc0/0xe8
[   18.649250]  check_slab_allocation+0xd4/0x108
[   18.649301]  __kasan_mempool_poison_object+0x78/0x150
[   18.649353]  mempool_free+0x28c/0x328
[   18.649398]  mempool_double_free_helper+0x150/0x2e8
[   18.649448]  mempool_kmalloc_double_free+0xc0/0x118
[   18.649514]  kunit_try_run_case+0x170/0x3f0
[   18.649563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.649625]  kthread+0x328/0x630
[   18.649668]  ret_from_fork+0x10/0x20
[   18.649717] 
[   18.649735] Allocated by task 235:
[   18.649765]  kasan_save_stack+0x3c/0x68
[   18.650041]  kasan_save_track+0x20/0x40
[   18.650283]  kasan_save_alloc_info+0x40/0x58
[   18.650859]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.651221]  remove_element+0x130/0x1f8
[   18.651797]  mempool_alloc_preallocated+0x58/0xc0
[   18.652160]  mempool_double_free_helper+0x94/0x2e8
[   18.652334]  mempool_kmalloc_double_free+0xc0/0x118
[   18.652401]  kunit_try_run_case+0x170/0x3f0
[   18.652441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.652793]  kthread+0x328/0x630
[   18.652876]  ret_from_fork+0x10/0x20
[   18.653379] 
[   18.653527] Freed by task 235:
[   18.653559]  kasan_save_stack+0x3c/0x68
[   18.653954]  kasan_save_track+0x20/0x40
[   18.654049]  kasan_save_free_info+0x4c/0x78
[   18.654220]  __kasan_mempool_poison_object+0xc0/0x150
[   18.654432]  mempool_free+0x28c/0x328
[   18.654577]  mempool_double_free_helper+0x100/0x2e8
[   18.654764]  mempool_kmalloc_double_free+0xc0/0x118
[   18.655206]  kunit_try_run_case+0x170/0x3f0
[   18.655281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.655356]  kthread+0x328/0x630
[   18.655471]  ret_from_fork+0x10/0x20
[   18.655510] 
[   18.655578] The buggy address belongs to the object at fff00000c780a100
[   18.655578]  which belongs to the cache kmalloc-128 of size 128
[   18.655936] The buggy address is located 0 bytes inside of
[   18.655936]  128-byte region [fff00000c780a100, fff00000c780a180)
[   18.656227] 
[   18.656384] The buggy address belongs to the physical page:
[   18.656437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a
[   18.656628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.657078] page_type: f5(slab)
[   18.657179] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.657239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.657581] page dumped because: kasan: bad access detected
[   18.657634] 
[   18.657825] Memory state around the buggy address:
[   18.657978]  fff00000c780a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.658027]  fff00000c780a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.658071] >fff00000c780a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.658379]                    ^
[   18.658770]  fff00000c780a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.658852]  fff00000c780a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.659057] ==================================================================
[   18.684455] ==================================================================
[   18.684515] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.684592] Free of addr fff00000c7994000 by task kunit_try_catch/239
[   18.684636] 
[   18.684676] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.684760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.684786] Hardware name: linux,dummy-virt (DT)
[   18.684823] Call trace:
[   18.684855]  show_stack+0x20/0x38 (C)
[   18.684917]  dump_stack_lvl+0x8c/0xd0
[   18.684966]  print_report+0x118/0x5d0
[   18.685019]  kasan_report_invalid_free+0xc0/0xe8
[   18.685071]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.685122]  mempool_free+0x24c/0x328
[   18.685167]  mempool_double_free_helper+0x150/0x2e8
[   18.685217]  mempool_page_alloc_double_free+0xbc/0x118
[   18.685268]  kunit_try_run_case+0x170/0x3f0
[   18.685325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.685379]  kthread+0x328/0x630
[   18.685422]  ret_from_fork+0x10/0x20
[   18.685470] 
[   18.685492] The buggy address belongs to the physical page:
[   18.685524] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994
[   18.685585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.685648] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.685699] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.685741] page dumped because: kasan: bad access detected
[   18.685773] 
[   18.686047] Memory state around the buggy address:
[   18.686084]  fff00000c7993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.686130]  fff00000c7993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.686662] >fff00000c7994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.686747]                    ^
[   18.687239]  fff00000c7994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687665]  fff00000c7994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687857] ==================================================================

[   18.830039] ==================================================================
[   18.830103] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.830162] Free of addr fff00000c79e8000 by task kunit_try_catch/239
[   18.830215] 
[   18.830279] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.830576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.830849] Hardware name: linux,dummy-virt (DT)
[   18.830905] Call trace:
[   18.830928]  show_stack+0x20/0x38 (C)
[   18.830979]  dump_stack_lvl+0x8c/0xd0
[   18.831028]  print_report+0x118/0x5d0
[   18.831075]  kasan_report_invalid_free+0xc0/0xe8
[   18.831318]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.831382]  mempool_free+0x24c/0x328
[   18.831564]  mempool_double_free_helper+0x150/0x2e8
[   18.831631]  mempool_page_alloc_double_free+0xbc/0x118
[   18.831683]  kunit_try_run_case+0x170/0x3f0
[   18.831732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.831787]  kthread+0x328/0x630
[   18.831829]  ret_from_fork+0x10/0x20
[   18.832184] 
[   18.832274] The buggy address belongs to the physical page:
[   18.832310] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e8
[   18.832569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.832886] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.833016] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.833058] page dumped because: kasan: bad access detected
[   18.833090] 
[   18.833108] Memory state around the buggy address:
[   18.833291]  fff00000c79e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.833488]  fff00000c79e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.833534] >fff00000c79e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.833572]                    ^
[   18.833636]  fff00000c79e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.833680]  fff00000c79e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.833719] ==================================================================
[   18.815466] ==================================================================
[   18.815529] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.815582] Free of addr fff00000c79e8000 by task kunit_try_catch/237
[   18.815638] 
[   18.815669] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.815751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.815778] Hardware name: linux,dummy-virt (DT)
[   18.815809] Call trace:
[   18.815834]  show_stack+0x20/0x38 (C)
[   18.815884]  dump_stack_lvl+0x8c/0xd0
[   18.815931]  print_report+0x118/0x5d0
[   18.815978]  kasan_report_invalid_free+0xc0/0xe8
[   18.816029]  __kasan_mempool_poison_object+0x14c/0x150
[   18.816081]  mempool_free+0x28c/0x328
[   18.816126]  mempool_double_free_helper+0x150/0x2e8
[   18.816176]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.816261]  kunit_try_run_case+0x170/0x3f0
[   18.816315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.816368]  kthread+0x328/0x630
[   18.816411]  ret_from_fork+0x10/0x20
[   18.816651] 
[   18.816674] The buggy address belongs to the physical page:
[   18.816708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e8
[   18.816763] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.816813] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.817001] page_type: f8(unknown)
[   18.817351] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.817403] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.817454] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.817504] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.817554] head: 0bfffe0000000002 ffffc1ffc31e7a01 00000000ffffffff 00000000ffffffff
[   18.817603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.817655] page dumped because: kasan: bad access detected
[   18.817685] 
[   18.817702] Memory state around the buggy address:
[   18.817735]  fff00000c79e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.817780]  fff00000c79e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.817824] >fff00000c79e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.817863]                    ^
[   18.818515]  fff00000c79e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.818787]  fff00000c79e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.818895] ==================================================================
[   18.801079] ==================================================================
[   18.801753] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.801904] Free of addr fff00000c5b4c900 by task kunit_try_catch/235
[   18.801965] 
[   18.802004] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.802089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.802117] Hardware name: linux,dummy-virt (DT)
[   18.802476] Call trace:
[   18.802503]  show_stack+0x20/0x38 (C)
[   18.802555]  dump_stack_lvl+0x8c/0xd0
[   18.802607]  print_report+0x118/0x5d0
[   18.802665]  kasan_report_invalid_free+0xc0/0xe8
[   18.802718]  check_slab_allocation+0xd4/0x108
[   18.802768]  __kasan_mempool_poison_object+0x78/0x150
[   18.802818]  mempool_free+0x28c/0x328
[   18.802865]  mempool_double_free_helper+0x150/0x2e8
[   18.802926]  mempool_kmalloc_double_free+0xc0/0x118
[   18.802974]  kunit_try_run_case+0x170/0x3f0
[   18.803025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.803088]  kthread+0x328/0x630
[   18.803304]  ret_from_fork+0x10/0x20
[   18.803357] 
[   18.803375] Allocated by task 235:
[   18.803405]  kasan_save_stack+0x3c/0x68
[   18.803673]  kasan_save_track+0x20/0x40
[   18.803788]  kasan_save_alloc_info+0x40/0x58
[   18.803829]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.803873]  remove_element+0x130/0x1f8
[   18.803907]  mempool_alloc_preallocated+0x58/0xc0
[   18.803946]  mempool_double_free_helper+0x94/0x2e8
[   18.804300]  mempool_kmalloc_double_free+0xc0/0x118
[   18.804374]  kunit_try_run_case+0x170/0x3f0
[   18.804415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.804459]  kthread+0x328/0x630
[   18.804492]  ret_from_fork+0x10/0x20
[   18.804586] 
[   18.804647] Freed by task 235:
[   18.804675]  kasan_save_stack+0x3c/0x68
[   18.804759]  kasan_save_track+0x20/0x40
[   18.804931]  kasan_save_free_info+0x4c/0x78
[   18.804971]  __kasan_mempool_poison_object+0xc0/0x150
[   18.805013]  mempool_free+0x28c/0x328
[   18.805048]  mempool_double_free_helper+0x100/0x2e8
[   18.805087]  mempool_kmalloc_double_free+0xc0/0x118
[   18.805127]  kunit_try_run_case+0x170/0x3f0
[   18.805288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.805338]  kthread+0x328/0x630
[   18.805371]  ret_from_fork+0x10/0x20
[   18.805481] 
[   18.805505] The buggy address belongs to the object at fff00000c5b4c900
[   18.805505]  which belongs to the cache kmalloc-128 of size 128
[   18.805594] The buggy address is located 0 bytes inside of
[   18.805594]  128-byte region [fff00000c5b4c900, fff00000c5b4c980)
[   18.805709] 
[   18.805736] The buggy address belongs to the physical page:
[   18.805825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4c
[   18.805880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.805948] page_type: f5(slab)
[   18.806077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.806209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.806256] page dumped because: kasan: bad access detected
[   18.806287] 
[   18.806304] Memory state around the buggy address:
[   18.806337]  fff00000c5b4c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.806381]  fff00000c5b4c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806425] >fff00000c5b4c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.806464]                    ^
[   18.806727]  fff00000c5b4c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.806818]  fff00000c5b4ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.806940] ==================================================================

[   14.362762] ==================================================================
[   14.363486] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.364384] Free of addr ffff8881038b4000 by task kunit_try_catch/255
[   14.364871] 
[   14.364998] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.365049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.365062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.365085] Call Trace:
[   14.365099]  <TASK>
[   14.365117]  dump_stack_lvl+0x73/0xb0
[   14.365150]  print_report+0xd1/0x610
[   14.365344]  ? __virt_addr_valid+0x1db/0x2d0
[   14.365373]  ? kasan_addr_to_slab+0x11/0xa0
[   14.365408]  ? mempool_double_free_helper+0x184/0x370
[   14.365433]  kasan_report_invalid_free+0x10a/0x130
[   14.365458]  ? mempool_double_free_helper+0x184/0x370
[   14.365519]  ? mempool_double_free_helper+0x184/0x370
[   14.365542]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.365567]  mempool_free+0x2ec/0x380
[   14.365612]  mempool_double_free_helper+0x184/0x370
[   14.365638]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.365663]  ? __kasan_check_write+0x18/0x20
[   14.365683]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.365706]  ? finish_task_switch.isra.0+0x153/0x700
[   14.365733]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.365757]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.365785]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.365807]  ? __pfx_mempool_kfree+0x10/0x10
[   14.365833]  ? __pfx_read_tsc+0x10/0x10
[   14.365854]  ? ktime_get_ts64+0x86/0x230
[   14.365880]  kunit_try_run_case+0x1a5/0x480
[   14.365906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.365929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.365953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.365977]  ? __kthread_parkme+0x82/0x180
[   14.365997]  ? preempt_count_sub+0x50/0x80
[   14.366021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.366068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.366092]  kthread+0x337/0x6f0
[   14.366112]  ? trace_preempt_on+0x20/0xc0
[   14.366136]  ? __pfx_kthread+0x10/0x10
[   14.366156]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.366178]  ? calculate_sigpending+0x7b/0xa0
[   14.366203]  ? __pfx_kthread+0x10/0x10
[   14.366224]  ret_from_fork+0x116/0x1d0
[   14.366243]  ? __pfx_kthread+0x10/0x10
[   14.366263]  ret_from_fork_asm+0x1a/0x30
[   14.366296]  </TASK>
[   14.366306] 
[   14.380789] The buggy address belongs to the physical page:
[   14.381329] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b4
[   14.381811] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.382531] flags: 0x200000000000040(head|node=0|zone=2)
[   14.382829] page_type: f8(unknown)
[   14.383006] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.383311] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.384015] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.384557] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.385200] head: 0200000000000002 ffffea00040e2d01 00000000ffffffff 00000000ffffffff
[   14.385884] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.386404] page dumped because: kasan: bad access detected
[   14.386938] 
[   14.387186] Memory state around the buggy address:
[   14.387625]  ffff8881038b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.388331]  ffff8881038b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.388861] >ffff8881038b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.389474]                    ^
[   14.389802]  ffff8881038b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.390325]  ffff8881038b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.390792] ==================================================================
[   14.318586] ==================================================================
[   14.319818] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.320562] Free of addr ffff888101bc1900 by task kunit_try_catch/253
[   14.321237] 
[   14.321337] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.321384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.321411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.321434] Call Trace:
[   14.321447]  <TASK>
[   14.321464]  dump_stack_lvl+0x73/0xb0
[   14.321495]  print_report+0xd1/0x610
[   14.321517]  ? __virt_addr_valid+0x1db/0x2d0
[   14.321544]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.321566]  ? mempool_double_free_helper+0x184/0x370
[   14.321602]  kasan_report_invalid_free+0x10a/0x130
[   14.321627]  ? mempool_double_free_helper+0x184/0x370
[   14.321653]  ? mempool_double_free_helper+0x184/0x370
[   14.321676]  ? mempool_double_free_helper+0x184/0x370
[   14.321722]  check_slab_allocation+0x101/0x130
[   14.321769]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.321794]  mempool_free+0x2ec/0x380
[   14.321823]  mempool_double_free_helper+0x184/0x370
[   14.321860]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.321889]  ? finish_task_switch.isra.0+0x153/0x700
[   14.321928]  mempool_kmalloc_double_free+0xed/0x140
[   14.321953]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.321981]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.322004]  ? __pfx_mempool_kfree+0x10/0x10
[   14.322030]  ? __pfx_read_tsc+0x10/0x10
[   14.322052]  ? ktime_get_ts64+0x86/0x230
[   14.322077]  kunit_try_run_case+0x1a5/0x480
[   14.322104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.322126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.322151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.322175]  ? __kthread_parkme+0x82/0x180
[   14.322196]  ? preempt_count_sub+0x50/0x80
[   14.322221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.322245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.322269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.322292]  kthread+0x337/0x6f0
[   14.322312]  ? trace_preempt_on+0x20/0xc0
[   14.322336]  ? __pfx_kthread+0x10/0x10
[   14.322356]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.322378]  ? calculate_sigpending+0x7b/0xa0
[   14.322412]  ? __pfx_kthread+0x10/0x10
[   14.322434]  ret_from_fork+0x116/0x1d0
[   14.322454]  ? __pfx_kthread+0x10/0x10
[   14.322475]  ret_from_fork_asm+0x1a/0x30
[   14.322507]  </TASK>
[   14.322518] 
[   14.338866] Allocated by task 253:
[   14.339012]  kasan_save_stack+0x45/0x70
[   14.339520]  kasan_save_track+0x18/0x40
[   14.340002]  kasan_save_alloc_info+0x3b/0x50
[   14.340578]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.340940]  remove_element+0x11e/0x190
[   14.341306]  mempool_alloc_preallocated+0x4d/0x90
[   14.341790]  mempool_double_free_helper+0x8a/0x370
[   14.341955]  mempool_kmalloc_double_free+0xed/0x140
[   14.342501]  kunit_try_run_case+0x1a5/0x480
[   14.342945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.343501]  kthread+0x337/0x6f0
[   14.343849]  ret_from_fork+0x116/0x1d0
[   14.343988]  ret_from_fork_asm+0x1a/0x30
[   14.344365] 
[   14.344580] Freed by task 253:
[   14.344977]  kasan_save_stack+0x45/0x70
[   14.345388]  kasan_save_track+0x18/0x40
[   14.345717]  kasan_save_free_info+0x3f/0x60
[   14.345873]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.346213]  mempool_free+0x2ec/0x380
[   14.346626]  mempool_double_free_helper+0x109/0x370
[   14.347156]  mempool_kmalloc_double_free+0xed/0x140
[   14.347633]  kunit_try_run_case+0x1a5/0x480
[   14.348011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348187]  kthread+0x337/0x6f0
[   14.348306]  ret_from_fork+0x116/0x1d0
[   14.348461]  ret_from_fork_asm+0x1a/0x30
[   14.348915] 
[   14.349080] The buggy address belongs to the object at ffff888101bc1900
[   14.349080]  which belongs to the cache kmalloc-128 of size 128
[   14.350456] The buggy address is located 0 bytes inside of
[   14.350456]  128-byte region [ffff888101bc1900, ffff888101bc1980)
[   14.351278] 
[   14.351510] The buggy address belongs to the physical page:
[   14.352143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc1
[   14.352880] flags: 0x200000000000000(node=0|zone=2)
[   14.353316] page_type: f5(slab)
[   14.353470] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.353985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.354791] page dumped because: kasan: bad access detected
[   14.355414] 
[   14.355574] Memory state around the buggy address:
[   14.355928]  ffff888101bc1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.356466]  ffff888101bc1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.357140] >ffff888101bc1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.357795]                    ^
[   14.358143]  ffff888101bc1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358515]  ffff888101bc1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.359199] ==================================================================
[   14.394558] ==================================================================
[   14.395004] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.395908] Free of addr ffff888103920000 by task kunit_try_catch/257
[   14.396897] 
[   14.397089] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.397139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.397152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.397175] Call Trace:
[   14.397190]  <TASK>
[   14.397208]  dump_stack_lvl+0x73/0xb0
[   14.397243]  print_report+0xd1/0x610
[   14.397266]  ? __virt_addr_valid+0x1db/0x2d0
[   14.397293]  ? kasan_addr_to_slab+0x11/0xa0
[   14.397313]  ? mempool_double_free_helper+0x184/0x370
[   14.397338]  kasan_report_invalid_free+0x10a/0x130
[   14.397363]  ? mempool_double_free_helper+0x184/0x370
[   14.397391]  ? mempool_double_free_helper+0x184/0x370
[   14.397429]  __kasan_mempool_poison_pages+0x115/0x130
[   14.397496]  mempool_free+0x290/0x380
[   14.397527]  mempool_double_free_helper+0x184/0x370
[   14.397558]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.397583]  ? __kasan_check_write+0x18/0x20
[   14.397603]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.397627]  ? finish_task_switch.isra.0+0x153/0x700
[   14.397653]  mempool_page_alloc_double_free+0xe8/0x140
[   14.397679]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.397708]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.397733]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.397760]  ? __pfx_read_tsc+0x10/0x10
[   14.397782]  ? ktime_get_ts64+0x86/0x230
[   14.397808]  kunit_try_run_case+0x1a5/0x480
[   14.397835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.397858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.397882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.397907]  ? __kthread_parkme+0x82/0x180
[   14.397929]  ? preempt_count_sub+0x50/0x80
[   14.397953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.397977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.398001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.398025]  kthread+0x337/0x6f0
[   14.398045]  ? trace_preempt_on+0x20/0xc0
[   14.398070]  ? __pfx_kthread+0x10/0x10
[   14.398091]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.398113]  ? calculate_sigpending+0x7b/0xa0
[   14.398139]  ? __pfx_kthread+0x10/0x10
[   14.398161]  ret_from_fork+0x116/0x1d0
[   14.398179]  ? __pfx_kthread+0x10/0x10
[   14.398200]  ret_from_fork_asm+0x1a/0x30
[   14.398233]  </TASK>
[   14.398244] 
[   14.415646] The buggy address belongs to the physical page:
[   14.416218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920
[   14.416485] flags: 0x200000000000000(node=0|zone=2)
[   14.416692] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.417813] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.418869] page dumped because: kasan: bad access detected
[   14.419505] 
[   14.419588] Memory state around the buggy address:
[   14.419747]  ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.419964]  ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.420611] >ffff888103920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.421125]                    ^
[   14.421544]  ffff888103920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.422058]  ffff888103920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.422807] ==================================================================

[   14.416419] ==================================================================
[   14.416861] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.417655] Free of addr ffff888102a51500 by task kunit_try_catch/253
[   14.418438] 
[   14.418680] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.418730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.418743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.418767] Call Trace:
[   14.418780]  <TASK>
[   14.418798]  dump_stack_lvl+0x73/0xb0
[   14.418830]  print_report+0xd1/0x610
[   14.418861]  ? __virt_addr_valid+0x1db/0x2d0
[   14.418886]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.418908]  ? mempool_double_free_helper+0x184/0x370
[   14.418932]  kasan_report_invalid_free+0x10a/0x130
[   14.418957]  ? mempool_double_free_helper+0x184/0x370
[   14.418981]  ? mempool_double_free_helper+0x184/0x370
[   14.419005]  ? mempool_double_free_helper+0x184/0x370
[   14.419027]  check_slab_allocation+0x101/0x130
[   14.419049]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.419072]  mempool_free+0x2ec/0x380
[   14.419100]  mempool_double_free_helper+0x184/0x370
[   14.419124]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.419159]  ? __kasan_check_write+0x18/0x20
[   14.419180]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.419202]  ? finish_task_switch.isra.0+0x153/0x700
[   14.419229]  mempool_kmalloc_double_free+0xed/0x140
[   14.419252]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.419279]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.419301]  ? __pfx_mempool_kfree+0x10/0x10
[   14.419325]  ? __pfx_read_tsc+0x10/0x10
[   14.419347]  ? ktime_get_ts64+0x86/0x230
[   14.419371]  kunit_try_run_case+0x1a5/0x480
[   14.419397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.419419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.419444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.419466]  ? __kthread_parkme+0x82/0x180
[   14.419487]  ? preempt_count_sub+0x50/0x80
[   14.419509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.419533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.419556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.419580]  kthread+0x337/0x6f0
[   14.419599]  ? trace_preempt_on+0x20/0xc0
[   14.419622]  ? __pfx_kthread+0x10/0x10
[   14.419642]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.419664]  ? calculate_sigpending+0x7b/0xa0
[   14.419687]  ? __pfx_kthread+0x10/0x10
[   14.419708]  ret_from_fork+0x116/0x1d0
[   14.419726]  ? __pfx_kthread+0x10/0x10
[   14.419747]  ret_from_fork_asm+0x1a/0x30
[   14.419777]  </TASK>
[   14.419789] 
[   14.434666] Allocated by task 253:
[   14.435115]  kasan_save_stack+0x45/0x70
[   14.435393]  kasan_save_track+0x18/0x40
[   14.435663]  kasan_save_alloc_info+0x3b/0x50
[   14.435812]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.436353]  remove_element+0x11e/0x190
[   14.436723]  mempool_alloc_preallocated+0x4d/0x90
[   14.437381]  mempool_double_free_helper+0x8a/0x370
[   14.437656]  mempool_kmalloc_double_free+0xed/0x140
[   14.437818]  kunit_try_run_case+0x1a5/0x480
[   14.438288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.438769]  kthread+0x337/0x6f0
[   14.439200]  ret_from_fork+0x116/0x1d0
[   14.439636]  ret_from_fork_asm+0x1a/0x30
[   14.439830] 
[   14.440058] Freed by task 253:
[   14.440395]  kasan_save_stack+0x45/0x70
[   14.440677]  kasan_save_track+0x18/0x40
[   14.440815]  kasan_save_free_info+0x3f/0x60
[   14.441282]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.441765]  mempool_free+0x2ec/0x380
[   14.442372]  mempool_double_free_helper+0x109/0x370
[   14.442623]  mempool_kmalloc_double_free+0xed/0x140
[   14.442786]  kunit_try_run_case+0x1a5/0x480
[   14.443243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.443824]  kthread+0x337/0x6f0
[   14.444211]  ret_from_fork+0x116/0x1d0
[   14.444605]  ret_from_fork_asm+0x1a/0x30
[   14.444913] 
[   14.445101] The buggy address belongs to the object at ffff888102a51500
[   14.445101]  which belongs to the cache kmalloc-128 of size 128
[   14.445603] The buggy address is located 0 bytes inside of
[   14.445603]  128-byte region [ffff888102a51500, ffff888102a51580)
[   14.446199] 
[   14.446365] The buggy address belongs to the physical page:
[   14.446894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a51
[   14.448042] flags: 0x200000000000000(node=0|zone=2)
[   14.448635] page_type: f5(slab)
[   14.448991] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.449237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.449512] page dumped because: kasan: bad access detected
[   14.450099] 
[   14.450279] Memory state around the buggy address:
[   14.450725]  ffff888102a51400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.451447]  ffff888102a51480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.452173] >ffff888102a51500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.452445]                    ^
[   14.452746]  ffff888102a51580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.453491]  ffff888102a51600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.454239] ==================================================================
[   14.489756] ==================================================================
[   14.490386] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.490646] Free of addr ffff8881038c4000 by task kunit_try_catch/257
[   14.490851] 
[   14.490950] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.491000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.491013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.491038] Call Trace:
[   14.491051]  <TASK>
[   14.491071]  dump_stack_lvl+0x73/0xb0
[   14.491102]  print_report+0xd1/0x610
[   14.491126]  ? __virt_addr_valid+0x1db/0x2d0
[   14.491164]  ? kasan_addr_to_slab+0x11/0xa0
[   14.491184]  ? mempool_double_free_helper+0x184/0x370
[   14.491209]  kasan_report_invalid_free+0x10a/0x130
[   14.491233]  ? mempool_double_free_helper+0x184/0x370
[   14.491258]  ? mempool_double_free_helper+0x184/0x370
[   14.491282]  __kasan_mempool_poison_pages+0x115/0x130
[   14.491305]  mempool_free+0x290/0x380
[   14.491334]  mempool_double_free_helper+0x184/0x370
[   14.491357]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.491381]  ? __kasan_check_write+0x18/0x20
[   14.491401]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.491424]  ? finish_task_switch.isra.0+0x153/0x700
[   14.491450]  mempool_page_alloc_double_free+0xe8/0x140
[   14.491475]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.491503]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.491525]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.491551]  ? __pfx_read_tsc+0x10/0x10
[   14.491572]  ? ktime_get_ts64+0x86/0x230
[   14.492052]  kunit_try_run_case+0x1a5/0x480
[   14.492082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.492132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.492167]  ? __kthread_parkme+0x82/0x180
[   14.492189]  ? preempt_count_sub+0x50/0x80
[   14.492212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.492258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.492282]  kthread+0x337/0x6f0
[   14.492301]  ? trace_preempt_on+0x20/0xc0
[   14.492329]  ? __pfx_kthread+0x10/0x10
[   14.492350]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.492370]  ? calculate_sigpending+0x7b/0xa0
[   14.492396]  ? __pfx_kthread+0x10/0x10
[   14.492417]  ret_from_fork+0x116/0x1d0
[   14.492436]  ? __pfx_kthread+0x10/0x10
[   14.492457]  ret_from_fork_asm+0x1a/0x30
[   14.492489]  </TASK>
[   14.492500] 
[   14.508204] The buggy address belongs to the physical page:
[   14.508583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038c4
[   14.509165] flags: 0x200000000000000(node=0|zone=2)
[   14.509537] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.509767] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.510378] page dumped because: kasan: bad access detected
[   14.510919] 
[   14.511102] Memory state around the buggy address:
[   14.511637]  ffff8881038c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.512284]  ffff8881038c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.512510] >ffff8881038c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.512721]                    ^
[   14.512839]  ffff8881038c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.513181]  ffff8881038c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.513449] ==================================================================
[   14.458389] ==================================================================
[   14.458871] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.459664] Free of addr ffff88810395c000 by task kunit_try_catch/255
[   14.460734] 
[   14.460997] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.461049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.461063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.461086] Call Trace:
[   14.461100]  <TASK>
[   14.461119]  dump_stack_lvl+0x73/0xb0
[   14.461164]  print_report+0xd1/0x610
[   14.461188]  ? __virt_addr_valid+0x1db/0x2d0
[   14.461213]  ? kasan_addr_to_slab+0x11/0xa0
[   14.461232]  ? mempool_double_free_helper+0x184/0x370
[   14.461256]  kasan_report_invalid_free+0x10a/0x130
[   14.461279]  ? mempool_double_free_helper+0x184/0x370
[   14.461305]  ? mempool_double_free_helper+0x184/0x370
[   14.461329]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.461353]  mempool_free+0x2ec/0x380
[   14.461379]  mempool_double_free_helper+0x184/0x370
[   14.461403]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.461428]  ? __kasan_check_write+0x18/0x20
[   14.461447]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.461469]  ? finish_task_switch.isra.0+0x153/0x700
[   14.461496]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.461520]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.461547]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.461570]  ? __pfx_mempool_kfree+0x10/0x10
[   14.461594]  ? __pfx_read_tsc+0x10/0x10
[   14.461615]  ? ktime_get_ts64+0x86/0x230
[   14.461640]  kunit_try_run_case+0x1a5/0x480
[   14.461665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.461688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.461713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.461736]  ? __kthread_parkme+0x82/0x180
[   14.461756]  ? preempt_count_sub+0x50/0x80
[   14.461780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.461803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.461826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.461849]  kthread+0x337/0x6f0
[   14.461867]  ? trace_preempt_on+0x20/0xc0
[   14.461891]  ? __pfx_kthread+0x10/0x10
[   14.461911]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.461933]  ? calculate_sigpending+0x7b/0xa0
[   14.461969]  ? __pfx_kthread+0x10/0x10
[   14.461989]  ret_from_fork+0x116/0x1d0
[   14.462008]  ? __pfx_kthread+0x10/0x10
[   14.462028]  ret_from_fork_asm+0x1a/0x30
[   14.462071]  </TASK>
[   14.462082] 
[   14.475495] The buggy address belongs to the physical page:
[   14.476112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10395c
[   14.476606] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.477169] flags: 0x200000000000040(head|node=0|zone=2)
[   14.477641] page_type: f8(unknown)
[   14.477926] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.478278] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.478852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.479461] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.480097] head: 0200000000000002 ffffea00040e5701 00000000ffffffff 00000000ffffffff
[   14.480738] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.481260] page dumped because: kasan: bad access detected
[   14.481720] 
[   14.482004] Memory state around the buggy address:
[   14.482547]  ffff88810395bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.483074]  ffff88810395bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.483529] >ffff88810395c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.483849]                    ^
[   14.484222]  ffff88810395c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.484638]  ffff88810395c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.485072] ==================================================================