Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   48.576619] ==================================================================
[   48.589243] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   48.596482] Free of addr ffff000095610000 by task kunit_try_catch/337
[   48.603010] 
[   48.604551] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   48.604586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.604596] Hardware name: Thundercomm Dragonboard 845c (DT)
[   48.604612] Call trace:
[   48.604620]  show_stack+0x20/0x38 (C)
[   48.604640]  dump_stack_lvl+0x8c/0xd0
[   48.604661]  print_report+0x118/0x608
[   48.604681]  kasan_report_invalid_free+0xc0/0xe8
[   48.604703]  __kasan_mempool_poison_pages+0xe0/0xe8
[   48.604723]  mempool_free+0x24c/0x328
[   48.604741]  mempool_double_free_helper+0x150/0x2e8
[   48.604759]  mempool_page_alloc_double_free+0xbc/0x118
[   48.604779]  kunit_try_run_case+0x170/0x3f0
[   48.604798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.604819]  kthread+0x328/0x630
[   48.604833]  ret_from_fork+0x10/0x20
[   48.604853] 
[   48.681270] The buggy address belongs to the physical page:
[   48.686916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610
[   48.695019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.701640] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   48.709481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   48.717317] page dumped because: kasan: bad access detected
[   48.722958] 
[   48.724488] Memory state around the buggy address:
[   48.729342]  ffff00009560ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.736657]  ffff00009560ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.743973] >ffff000095610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.751286]                    ^
[   48.754566]  ffff000095610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.761880]  ffff000095610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.769193] ==================================================================
[   47.942736] ==================================================================
[   47.954401] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   47.961645] Free of addr ffff000080f19400 by task kunit_try_catch/333
[   47.968170] 
[   47.969715] CPU: 4 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   47.969750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.969761] Hardware name: Thundercomm Dragonboard 845c (DT)
[   47.969776] Call trace:
[   47.969784]  show_stack+0x20/0x38 (C)
[   47.969805]  dump_stack_lvl+0x8c/0xd0
[   47.969828]  print_report+0x118/0x608
[   47.969850]  kasan_report_invalid_free+0xc0/0xe8
[   47.969872]  check_slab_allocation+0xd4/0x108
[   47.969891]  __kasan_mempool_poison_object+0x78/0x150
[   47.969913]  mempool_free+0x28c/0x328
[   47.969931]  mempool_double_free_helper+0x150/0x2e8
[   47.969949]  mempool_kmalloc_double_free+0xc0/0x118
[   47.969969]  kunit_try_run_case+0x170/0x3f0
[   47.969989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.970011]  kthread+0x328/0x630
[   47.970026]  ret_from_fork+0x10/0x20
[   47.970045] 
[   48.050749] Allocated by task 333:
[   48.054213]  kasan_save_stack+0x3c/0x68
[   48.058118]  kasan_save_track+0x20/0x40
[   48.062024]  kasan_save_alloc_info+0x40/0x58
[   48.066358]  __kasan_mempool_unpoison_object+0x11c/0x180
[   48.071744]  remove_element+0x130/0x1f8
[   48.075645]  mempool_alloc_preallocated+0x58/0xc0
[   48.080414]  mempool_double_free_helper+0x94/0x2e8
[   48.085272]  mempool_kmalloc_double_free+0xc0/0x118
[   48.090224]  kunit_try_run_case+0x170/0x3f0
[   48.094471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.100042]  kthread+0x328/0x630
[   48.103324]  ret_from_fork+0x10/0x20
[   48.106957] 
[   48.108486] Freed by task 333:
[   48.111591]  kasan_save_stack+0x3c/0x68
[   48.115495]  kasan_save_track+0x20/0x40
[   48.119398]  kasan_save_free_info+0x4c/0x78
[   48.123642]  __kasan_mempool_poison_object+0xc0/0x150
[   48.128775]  mempool_free+0x28c/0x328
[   48.132501]  mempool_double_free_helper+0x100/0x2e8
[   48.137454]  mempool_kmalloc_double_free+0xc0/0x118
[   48.142408]  kunit_try_run_case+0x170/0x3f0
[   48.146656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.152224]  kthread+0x328/0x630
[   48.155505]  ret_from_fork+0x10/0x20
[   48.159138] 
[   48.160670] The buggy address belongs to the object at ffff000080f19400
[   48.160670]  which belongs to the cache kmalloc-128 of size 128
[   48.173330] The buggy address is located 0 bytes inside of
[   48.173330]  128-byte region [ffff000080f19400, ffff000080f19480)
[   48.185025] 
[   48.186551] The buggy address belongs to the physical page:
[   48.192200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f18
[   48.200300] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.208050] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.215101] page_type: f5(slab)
[   48.218303] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   48.226141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.233979] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   48.241903] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.249825] head: 0bfffe0000000001 fffffdffc203c601 00000000ffffffff 00000000ffffffff
[   48.257747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.265666] page dumped because: kasan: bad access detected
[   48.271315] 
[   48.272847] Memory state around the buggy address:
[   48.277710]  ffff000080f19300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.285022]  ffff000080f19380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.292335] >ffff000080f19400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.299645]                    ^
[   48.302930]  ffff000080f19480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.310241]  ffff000080f19500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.317552] ==================================================================
[   48.328933] ==================================================================
[   48.341027] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   48.348267] Free of addr ffff000095654000 by task kunit_try_catch/335
[   48.354795] 
[   48.356333] CPU: 6 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   48.356367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.356376] Hardware name: Thundercomm Dragonboard 845c (DT)
[   48.356393] Call trace:
[   48.356401]  show_stack+0x20/0x38 (C)
[   48.356422]  dump_stack_lvl+0x8c/0xd0
[   48.356444]  print_report+0x118/0x608
[   48.356462]  kasan_report_invalid_free+0xc0/0xe8
[   48.356484]  __kasan_mempool_poison_object+0x14c/0x150
[   48.356504]  mempool_free+0x28c/0x328
[   48.356522]  mempool_double_free_helper+0x150/0x2e8
[   48.356540]  mempool_kmalloc_large_double_free+0xc0/0x118
[   48.356559]  kunit_try_run_case+0x170/0x3f0
[   48.356579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.356600]  kthread+0x328/0x630
[   48.356615]  ret_from_fork+0x10/0x20
[   48.356635] 
[   48.433563] The buggy address belongs to the physical page:
[   48.439204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115654
[   48.447313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.455062] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.462110] page_type: f8(unknown)
[   48.465579] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   48.473413] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   48.481256] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   48.489186] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   48.497117] head: 0bfffe0000000002 fffffdffc2559501 00000000ffffffff 00000000ffffffff
[   48.505047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   48.512964] page dumped because: kasan: bad access detected
[   48.518604] 
[   48.520130] Memory state around the buggy address:
[   48.524994]  ffff000095653f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.532304]  ffff000095653f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.539614] >ffff000095654000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.546929]                    ^
[   48.550208]  ffff000095654080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.557519]  ffff000095654100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.564827] ==================================================================

[   35.954475] ==================================================================
[   35.955081] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.955482] Free of addr fff00000c77e6100 by task kunit_try_catch/246
[   35.955725] 
[   35.955800] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.956017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.956083] Hardware name: linux,dummy-virt (DT)
[   35.956164] Call trace:
[   35.956224]  show_stack+0x20/0x38 (C)
[   35.956355]  dump_stack_lvl+0x8c/0xd0
[   35.956529]  print_report+0x118/0x608
[   35.956669]  kasan_report_invalid_free+0xc0/0xe8
[   35.957329]  check_slab_allocation+0xd4/0x108
[   35.957632]  __kasan_mempool_poison_object+0x78/0x150
[   35.957834]  mempool_free+0x28c/0x328
[   35.958071]  mempool_double_free_helper+0x150/0x2e8
[   35.958222]  mempool_kmalloc_double_free+0xc0/0x118
[   35.958363]  kunit_try_run_case+0x170/0x3f0
[   35.958484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.958619]  kthread+0x328/0x630
[   35.958733]  ret_from_fork+0x10/0x20
[   35.958851] 
[   35.958913] Allocated by task 246:
[   35.959006]  kasan_save_stack+0x3c/0x68
[   35.959462]  kasan_save_track+0x20/0x40
[   35.959598]  kasan_save_alloc_info+0x40/0x58
[   35.959752]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.959869]  remove_element+0x130/0x1f8
[   35.959979]  mempool_alloc_preallocated+0x58/0xc0
[   35.960098]  mempool_double_free_helper+0x94/0x2e8
[   35.960234]  mempool_kmalloc_double_free+0xc0/0x118
[   35.960344]  kunit_try_run_case+0x170/0x3f0
[   35.960453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.960803]  kthread+0x328/0x630
[   35.960977]  ret_from_fork+0x10/0x20
[   35.961360] 
[   35.961676] Freed by task 246:
[   35.961850]  kasan_save_stack+0x3c/0x68
[   35.962218]  kasan_save_track+0x20/0x40
[   35.962338]  kasan_save_free_info+0x4c/0x78
[   35.962443]  __kasan_mempool_poison_object+0xc0/0x150
[   35.963397]  mempool_free+0x28c/0x328
[   35.963490]  mempool_double_free_helper+0x100/0x2e8
[   35.963605]  mempool_kmalloc_double_free+0xc0/0x118
[   35.963708]  kunit_try_run_case+0x170/0x3f0
[   35.963826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.964064]  kthread+0x328/0x630
[   35.964163]  ret_from_fork+0x10/0x20
[   35.964600] 
[   35.964655] The buggy address belongs to the object at fff00000c77e6100
[   35.964655]  which belongs to the cache kmalloc-128 of size 128
[   35.964816] The buggy address is located 0 bytes inside of
[   35.964816]  128-byte region [fff00000c77e6100, fff00000c77e6180)
[   35.965065] 
[   35.965425] The buggy address belongs to the physical page:
[   35.965770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e6
[   35.966117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.966244] page_type: f5(slab)
[   35.966343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.966869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.967244] page dumped because: kasan: bad access detected
[   35.967363] 
[   35.967516] Memory state around the buggy address:
[   35.967603]  fff00000c77e6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.967835]  fff00000c77e6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.968137] >fff00000c77e6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.968292]                    ^
[   35.968371]  fff00000c77e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.968485]  fff00000c77e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.968592] ==================================================================
[   36.007749] ==================================================================
[   36.007954] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   36.008086] Free of addr fff00000c781c000 by task kunit_try_catch/250
[   36.008186] 
[   36.008306] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.008744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.008937] Hardware name: linux,dummy-virt (DT)
[   36.009039] Call trace:
[   36.009133]  show_stack+0x20/0x38 (C)
[   36.009263]  dump_stack_lvl+0x8c/0xd0
[   36.009378]  print_report+0x118/0x608
[   36.009493]  kasan_report_invalid_free+0xc0/0xe8
[   36.009622]  __kasan_mempool_poison_pages+0xe0/0xe8
[   36.009933]  mempool_free+0x24c/0x328
[   36.010073]  mempool_double_free_helper+0x150/0x2e8
[   36.010215]  mempool_page_alloc_double_free+0xbc/0x118
[   36.010416]  kunit_try_run_case+0x170/0x3f0
[   36.010564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.010710]  kthread+0x328/0x630
[   36.010897]  ret_from_fork+0x10/0x20
[   36.011128] 
[   36.011172] The buggy address belongs to the physical page:
[   36.011236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10781c
[   36.011346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.011430] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.011544] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.011600] page dumped because: kasan: bad access detected
[   36.011639] 
[   36.011661] Memory state around the buggy address:
[   36.011702]  fff00000c781bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.011756]  fff00000c781bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.011809] >fff00000c781c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.011856]                    ^
[   36.011970]  fff00000c781c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.012097]  fff00000c781c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.012641] ==================================================================
[   35.980351] ==================================================================
[   35.980482] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.980614] Free of addr fff00000c781c000 by task kunit_try_catch/248
[   35.980739] 
[   35.980783] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.980909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.980980] Hardware name: linux,dummy-virt (DT)
[   35.981065] Call trace:
[   35.981118]  show_stack+0x20/0x38 (C)
[   35.981345]  dump_stack_lvl+0x8c/0xd0
[   35.981566]  print_report+0x118/0x608
[   35.981701]  kasan_report_invalid_free+0xc0/0xe8
[   35.981826]  __kasan_mempool_poison_object+0x14c/0x150
[   35.981975]  mempool_free+0x28c/0x328
[   35.982086]  mempool_double_free_helper+0x150/0x2e8
[   35.982216]  mempool_kmalloc_large_double_free+0xc0/0x118
[   35.982338]  kunit_try_run_case+0x170/0x3f0
[   35.982463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.982593]  kthread+0x328/0x630
[   35.982695]  ret_from_fork+0x10/0x20
[   35.982833] 
[   35.982915] The buggy address belongs to the physical page:
[   35.982999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10781c
[   35.983154] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.983282] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.983429] page_type: f8(unknown)
[   35.983622] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.983859] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.984112] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.984285] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.984415] head: 0bfffe0000000002 ffffc1ffc31e0701 00000000ffffffff 00000000ffffffff
[   35.985726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.986284] page dumped because: kasan: bad access detected
[   35.986375] 
[   35.986462] Memory state around the buggy address:
[   35.986649]  fff00000c781bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.986758]  fff00000c781bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.986921] >fff00000c781c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.987029]                    ^
[   35.987174]  fff00000c781c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.987386]  fff00000c781c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.987545] ==================================================================

[   31.234973] ==================================================================
[   31.235961] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   31.236449] Free of addr ffff888102d80000 by task kunit_try_catch/267
[   31.236963] 
[   31.237157] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   31.237274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.237309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.237359] Call Trace:
[   31.237391]  <TASK>
[   31.237429]  dump_stack_lvl+0x73/0xb0
[   31.237507]  print_report+0xd1/0x650
[   31.237829]  ? __virt_addr_valid+0x1db/0x2d0
[   31.237912]  ? kasan_addr_to_slab+0x11/0xa0
[   31.237967]  ? mempool_double_free_helper+0x184/0x370
[   31.238026]  kasan_report_invalid_free+0x10a/0x130
[   31.238239]  ? mempool_double_free_helper+0x184/0x370
[   31.238310]  ? mempool_double_free_helper+0x184/0x370
[   31.238366]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   31.238432]  mempool_free+0x2ec/0x380
[   31.238509]  mempool_double_free_helper+0x184/0x370
[   31.238596]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   31.238685]  ? __kasan_check_write+0x18/0x20
[   31.238720]  ? __pfx_sched_clock_cpu+0x10/0x10
[   31.238752]  ? finish_task_switch.isra.0+0x153/0x700
[   31.238790]  mempool_kmalloc_large_double_free+0xed/0x140
[   31.238823]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   31.238858]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.238888]  ? __pfx_mempool_kfree+0x10/0x10
[   31.238920]  ? __pfx_read_tsc+0x10/0x10
[   31.238949]  ? ktime_get_ts64+0x86/0x230
[   31.238983]  kunit_try_run_case+0x1a5/0x480
[   31.239019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.239064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.239153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.239209]  ? __kthread_parkme+0x82/0x180
[   31.239258]  ? preempt_count_sub+0x50/0x80
[   31.239308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.239363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.239418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.239452]  kthread+0x337/0x6f0
[   31.239480]  ? trace_preempt_on+0x20/0xc0
[   31.239514]  ? __pfx_kthread+0x10/0x10
[   31.239565]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.239598]  ? calculate_sigpending+0x7b/0xa0
[   31.239647]  ? __pfx_kthread+0x10/0x10
[   31.239696]  ret_from_fork+0x116/0x1d0
[   31.239723]  ? __pfx_kthread+0x10/0x10
[   31.239752]  ret_from_fork_asm+0x1a/0x30
[   31.239795]  </TASK>
[   31.239810] 
[   31.256474] The buggy address belongs to the physical page:
[   31.257035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d80
[   31.258351] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.258925] flags: 0x200000000000040(head|node=0|zone=2)
[   31.259378] page_type: f8(unknown)
[   31.259790] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.260618] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.261731] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.262482] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.263326] head: 0200000000000002 ffffea00040b6001 00000000ffffffff 00000000ffffffff
[   31.263768] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.264488] page dumped because: kasan: bad access detected
[   31.265002] 
[   31.265575] Memory state around the buggy address:
[   31.265865]  ffff888102d7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.266442]  ffff888102d7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.266941] >ffff888102d80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.267438]                    ^
[   31.267985]  ffff888102d80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.268745]  ffff888102d80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.269589] ==================================================================
[   31.276757] ==================================================================
[   31.277722] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   31.279079] Free of addr ffff888103be0000 by task kunit_try_catch/269
[   31.279576] 
[   31.280226] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   31.280354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.280399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.280469] Call Trace:
[   31.280505]  <TASK>
[   31.280560]  dump_stack_lvl+0x73/0xb0
[   31.280611]  print_report+0xd1/0x650
[   31.280644]  ? __virt_addr_valid+0x1db/0x2d0
[   31.280679]  ? kasan_addr_to_slab+0x11/0xa0
[   31.280709]  ? mempool_double_free_helper+0x184/0x370
[   31.280753]  kasan_report_invalid_free+0x10a/0x130
[   31.280786]  ? mempool_double_free_helper+0x184/0x370
[   31.280820]  ? mempool_double_free_helper+0x184/0x370
[   31.280851]  __kasan_mempool_poison_pages+0x115/0x130
[   31.280882]  mempool_free+0x290/0x380
[   31.280915]  mempool_double_free_helper+0x184/0x370
[   31.280945]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   31.280977]  ? __kasan_check_write+0x18/0x20
[   31.281008]  ? __pfx_sched_clock_cpu+0x10/0x10
[   31.281037]  ? finish_task_switch.isra.0+0x153/0x700
[   31.281092]  mempool_page_alloc_double_free+0xe8/0x140
[   31.281148]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   31.281193]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   31.281224]  ? __pfx_mempool_free_pages+0x10/0x10
[   31.281257]  ? __pfx_read_tsc+0x10/0x10
[   31.281289]  ? ktime_get_ts64+0x86/0x230
[   31.281323]  kunit_try_run_case+0x1a5/0x480
[   31.281357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.281386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.281419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.281451]  ? __kthread_parkme+0x82/0x180
[   31.281477]  ? preempt_count_sub+0x50/0x80
[   31.281507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.281556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.281590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.281622]  kthread+0x337/0x6f0
[   31.281647]  ? trace_preempt_on+0x20/0xc0
[   31.281678]  ? __pfx_kthread+0x10/0x10
[   31.281706]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.281750]  ? calculate_sigpending+0x7b/0xa0
[   31.281781]  ? __pfx_kthread+0x10/0x10
[   31.281809]  ret_from_fork+0x116/0x1d0
[   31.281834]  ? __pfx_kthread+0x10/0x10
[   31.281861]  ret_from_fork_asm+0x1a/0x30
[   31.281900]  </TASK>
[   31.281914] 
[   31.303513] The buggy address belongs to the physical page:
[   31.303982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103be0
[   31.304816] flags: 0x200000000000000(node=0|zone=2)
[   31.305209] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   31.305757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.307068] page dumped because: kasan: bad access detected
[   31.307525] 
[   31.307754] Memory state around the buggy address:
[   31.308609]  ffff888103bdff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.309288]  ffff888103bdff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.309485] >ffff888103be0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.309786]                    ^
[   31.310271]  ffff888103be0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.311606]  ffff888103be0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.312441] ==================================================================