Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   49.315735] ==================================================================
[   49.327411] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   49.334664] Free of addr ffff00008039f600 by task kunit_try_catch/321
[   49.341196] 
[   49.342735] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   49.342774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.342785] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.342804] Call trace:
[   49.342814]  show_stack+0x20/0x38 (C)
[   49.342835]  dump_stack_lvl+0x8c/0xd0
[   49.342860]  print_report+0x118/0x608
[   49.342883]  kasan_report_invalid_free+0xc0/0xe8
[   49.342904]  check_slab_allocation+0xd4/0x108
[   49.342927]  __kasan_mempool_poison_object+0x78/0x150
[   49.342952]  mempool_free+0x28c/0x328
[   49.342973]  mempool_double_free_helper+0x150/0x2e8
[   49.342993]  mempool_kmalloc_double_free+0xc0/0x118
[   49.343013]  kunit_try_run_case+0x170/0x3f0
[   49.343038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.343061]  kthread+0x328/0x630
[   49.343078]  ret_from_fork+0x10/0x20
[   49.343099] 
[   49.423874] Allocated by task 321:
[   49.427337]  kasan_save_stack+0x3c/0x68
[   49.431248]  kasan_save_track+0x20/0x40
[   49.435159]  kasan_save_alloc_info+0x40/0x58
[   49.439505]  __kasan_mempool_unpoison_object+0x11c/0x180
[   49.444900]  remove_element+0x130/0x1f8
[   49.448806]  mempool_alloc_preallocated+0x58/0xc0
[   49.453588]  mempool_double_free_helper+0x94/0x2e8
[   49.458456]  mempool_kmalloc_double_free+0xc0/0x118
[   49.463420]  kunit_try_run_case+0x170/0x3f0
[   49.467676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.473241]  kthread+0x328/0x630
[   49.476532]  ret_from_fork+0x10/0x20
[   49.480169] 
[   49.481701] Freed by task 321:
[   49.484813]  kasan_save_stack+0x3c/0x68
[   49.488722]  kasan_save_track+0x20/0x40
[   49.492632]  kasan_save_free_info+0x4c/0x78
[   49.496882]  __kasan_mempool_poison_object+0xc0/0x150
[   49.502013]  mempool_free+0x28c/0x328
[   49.505748]  mempool_double_free_helper+0x100/0x2e8
[   49.510702]  mempool_kmalloc_double_free+0xc0/0x118
[   49.515654]  kunit_try_run_case+0x170/0x3f0
[   49.519916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.525486]  kthread+0x328/0x630
[   49.528776]  ret_from_fork+0x10/0x20
[   49.532424] 
[   49.533955] The buggy address belongs to the object at ffff00008039f600
[   49.533955]  which belongs to the cache kmalloc-128 of size 128
[   49.546621] The buggy address is located 0 bytes inside of
[   49.546621]  128-byte region [ffff00008039f600, ffff00008039f680)
[   49.558321] 
[   49.559850] The buggy address belongs to the physical page:
[   49.565499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   49.573615] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.581371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.588431] page_type: f5(slab)
[   49.591645] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   49.599489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.607333] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   49.615265] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.623205] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   49.631144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.639070] page dumped because: kasan: bad access detected
[   49.644722] 
[   49.646253] Memory state around the buggy address:
[   49.651120]  ffff00008039f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.658440]  ffff00008039f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.665763] >ffff00008039f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.673083]                    ^
[   49.676368]  ffff00008039f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.683686]  ffff00008039f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.691006] ==================================================================
[   49.702329] ==================================================================
[   49.714432] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   49.721679] Free of addr ffff000096708000 by task kunit_try_catch/323
[   49.728211] 
[   49.729750] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   49.729785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.729797] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.729813] Call trace:
[   49.729823]  show_stack+0x20/0x38 (C)
[   49.729844]  dump_stack_lvl+0x8c/0xd0
[   49.729867]  print_report+0x118/0x608
[   49.729889]  kasan_report_invalid_free+0xc0/0xe8
[   49.729910]  __kasan_mempool_poison_object+0x14c/0x150
[   49.729934]  mempool_free+0x28c/0x328
[   49.729955]  mempool_double_free_helper+0x150/0x2e8
[   49.729977]  mempool_kmalloc_large_double_free+0xc0/0x118
[   49.729999]  kunit_try_run_case+0x170/0x3f0
[   49.730020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.730044]  kthread+0x328/0x630
[   49.730061]  ret_from_fork+0x10/0x20
[   49.730084] 
[   49.807065] The buggy address belongs to the physical page:
[   49.812718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116708
[   49.820830] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.828585] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.835647] page_type: f8(unknown)
[   49.839116] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.846957] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.854809] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.862749] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.870689] head: 0bfffe0000000002 fffffdffc259c201 00000000ffffffff 00000000ffffffff
[   49.878628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   49.886563] page dumped because: kasan: bad access detected
[   49.892215] 
[   49.893743] Memory state around the buggy address:
[   49.898609]  ffff000096707f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.905928]  ffff000096707f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.913250] >ffff000096708000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.920568]                    ^
[   49.923860]  ffff000096708080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.931183]  ffff000096708100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.938500] ==================================================================
[   49.949529] ==================================================================
[   49.962152] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   49.969396] Free of addr ffff000095370000 by task kunit_try_catch/325
[   49.975929] 
[   49.977466] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   49.977502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.977513] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.977530] Call trace:
[   49.977539]  show_stack+0x20/0x38 (C)
[   49.977560]  dump_stack_lvl+0x8c/0xd0
[   49.977582]  print_report+0x118/0x608
[   49.977604]  kasan_report_invalid_free+0xc0/0xe8
[   49.977626]  __kasan_mempool_poison_pages+0xe0/0xe8
[   49.977649]  mempool_free+0x24c/0x328
[   49.977669]  mempool_double_free_helper+0x150/0x2e8
[   49.977690]  mempool_page_alloc_double_free+0xbc/0x118
[   49.977715]  kunit_try_run_case+0x170/0x3f0
[   49.977738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.977762]  kthread+0x328/0x630
[   49.977778]  ret_from_fork+0x10/0x20
[   49.977800] 
[   50.054259] The buggy address belongs to the physical page:
[   50.059904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115370
[   50.068016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.074641] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.082482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.090321] page dumped because: kasan: bad access detected
[   50.095966] 
[   50.097492] Memory state around the buggy address:
[   50.102357]  ffff00009536ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.109679]  ffff00009536ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.117000] >ffff000095370000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.124319]                    ^
[   50.127600]  ffff000095370080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.134924]  ffff000095370100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.142244] ==================================================================

[   28.963159] ==================================================================
[   28.963245] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.963305] Free of addr fff00000c5773500 by task kunit_try_catch/247
[   28.963392] 
[   28.963429] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.963544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.963592] Hardware name: linux,dummy-virt (DT)
[   28.963645] Call trace:
[   28.963679]  show_stack+0x20/0x38 (C)
[   28.963763]  dump_stack_lvl+0x8c/0xd0
[   28.963884]  print_report+0x118/0x608
[   28.964027]  kasan_report_invalid_free+0xc0/0xe8
[   28.964187]  check_slab_allocation+0xd4/0x108
[   28.964244]  __kasan_mempool_poison_object+0x78/0x150
[   28.964297]  mempool_free+0x28c/0x328
[   28.964573]  mempool_double_free_helper+0x150/0x2e8
[   28.964629]  mempool_kmalloc_double_free+0xc0/0x118
[   28.964766]  kunit_try_run_case+0x170/0x3f0
[   28.964860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.964967]  kthread+0x328/0x630
[   28.965023]  ret_from_fork+0x10/0x20
[   28.965194] 
[   28.965231] Allocated by task 247:
[   28.965261]  kasan_save_stack+0x3c/0x68
[   28.965571]  kasan_save_track+0x20/0x40
[   28.965681]  kasan_save_alloc_info+0x40/0x58
[   28.965719]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.965773]  remove_element+0x130/0x1f8
[   28.965816]  mempool_alloc_preallocated+0x58/0xc0
[   28.965855]  mempool_double_free_helper+0x94/0x2e8
[   28.965909]  mempool_kmalloc_double_free+0xc0/0x118
[   28.965964]  kunit_try_run_case+0x170/0x3f0
[   28.966005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.966065]  kthread+0x328/0x630
[   28.966097]  ret_from_fork+0x10/0x20
[   28.966134] 
[   28.966165] Freed by task 247:
[   28.966209]  kasan_save_stack+0x3c/0x68
[   28.966251]  kasan_save_track+0x20/0x40
[   28.966288]  kasan_save_free_info+0x4c/0x78
[   28.966322]  __kasan_mempool_poison_object+0xc0/0x150
[   28.966364]  mempool_free+0x28c/0x328
[   28.966396]  mempool_double_free_helper+0x100/0x2e8
[   28.966446]  mempool_kmalloc_double_free+0xc0/0x118
[   28.966508]  kunit_try_run_case+0x170/0x3f0
[   28.966546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.966589]  kthread+0x328/0x630
[   28.966634]  ret_from_fork+0x10/0x20
[   28.966671] 
[   28.966697] The buggy address belongs to the object at fff00000c5773500
[   28.966697]  which belongs to the cache kmalloc-128 of size 128
[   28.966754] The buggy address is located 0 bytes inside of
[   28.966754]  128-byte region [fff00000c5773500, fff00000c5773580)
[   28.966814] 
[   28.966833] The buggy address belongs to the physical page:
[   28.966865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   28.966921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.966983] page_type: f5(slab)
[   28.967024] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.967083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.967123] page dumped because: kasan: bad access detected
[   28.967154] 
[   28.967172] Memory state around the buggy address:
[   28.967206]  fff00000c5773400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.967249]  fff00000c5773480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.967290] >fff00000c5773500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.967748]                    ^
[   28.967842]  fff00000c5773580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.968008]  fff00000c5773600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.968128] ==================================================================
[   28.983790] ==================================================================
[   28.983848] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.984219] Free of addr fff00000c6550000 by task kunit_try_catch/251
[   28.984393] 
[   28.984500] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.984625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.984716] Hardware name: linux,dummy-virt (DT)
[   28.984748] Call trace:
[   28.984807]  show_stack+0x20/0x38 (C)
[   28.984874]  dump_stack_lvl+0x8c/0xd0
[   28.985046]  print_report+0x118/0x608
[   28.985176]  kasan_report_invalid_free+0xc0/0xe8
[   28.985256]  __kasan_mempool_poison_pages+0xe0/0xe8
[   28.985307]  mempool_free+0x24c/0x328
[   28.985352]  mempool_double_free_helper+0x150/0x2e8
[   28.985400]  mempool_page_alloc_double_free+0xbc/0x118
[   28.985600]  kunit_try_run_case+0x170/0x3f0
[   28.985781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.985998]  kthread+0x328/0x630
[   28.986075]  ret_from_fork+0x10/0x20
[   28.986174] 
[   28.986296] The buggy address belongs to the physical page:
[   28.986373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   28.986453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.986537] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.986596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.986857] page dumped because: kasan: bad access detected
[   28.986905] 
[   28.986924] Memory state around the buggy address:
[   28.987006]  fff00000c654ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987185]  fff00000c654ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987294] >fff00000c6550000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987382]                    ^
[   28.987472]  fff00000c6550080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987613]  fff00000c6550100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.987713] ==================================================================
[   28.974745] ==================================================================
[   28.974805] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   28.974914] Free of addr fff00000c6550000 by task kunit_try_catch/249
[   28.974955] 
[   28.975009] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.975146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.975228] Hardware name: linux,dummy-virt (DT)
[   28.975287] Call trace:
[   28.975355]  show_stack+0x20/0x38 (C)
[   28.975435]  dump_stack_lvl+0x8c/0xd0
[   28.975520]  print_report+0x118/0x608
[   28.975591]  kasan_report_invalid_free+0xc0/0xe8
[   28.975654]  __kasan_mempool_poison_object+0x14c/0x150
[   28.975707]  mempool_free+0x28c/0x328
[   28.975750]  mempool_double_free_helper+0x150/0x2e8
[   28.975811]  mempool_kmalloc_large_double_free+0xc0/0x118
[   28.975863]  kunit_try_run_case+0x170/0x3f0
[   28.975909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.976144]  kthread+0x328/0x630
[   28.976231]  ret_from_fork+0x10/0x20
[   28.976353] 
[   28.976451] The buggy address belongs to the physical page:
[   28.976516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   28.976611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.976686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.976810] page_type: f8(unknown)
[   28.976878] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.976961] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.977010] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   28.977258] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.977359] head: 0bfffe0000000002 ffffc1ffc3195401 00000000ffffffff 00000000ffffffff
[   28.977494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.977598] page dumped because: kasan: bad access detected
[   28.977669] 
[   28.977834] Memory state around the buggy address:
[   28.977941]  fff00000c654ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978091]  fff00000c654ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978350] >fff00000c6550000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978389]                    ^
[   28.978645]  fff00000c6550080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978751]  fff00000c6550100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.978835] ==================================================================

[   23.822073] ==================================================================
[   23.823207] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.824169] Free of addr ffff888102ca4000 by task kunit_try_catch/268
[   23.824399] 
[   23.824491] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   23.824546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.824559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.824583] Call Trace:
[   23.824599]  <TASK>
[   23.824621]  dump_stack_lvl+0x73/0xb0
[   23.824655]  print_report+0xd1/0x650
[   23.824679]  ? __virt_addr_valid+0x1db/0x2d0
[   23.824706]  ? kasan_addr_to_slab+0x11/0xa0
[   23.824725]  ? mempool_double_free_helper+0x184/0x370
[   23.824748]  kasan_report_invalid_free+0x10a/0x130
[   23.824772]  ? mempool_double_free_helper+0x184/0x370
[   23.824796]  ? mempool_double_free_helper+0x184/0x370
[   23.824818]  __kasan_mempool_poison_pages+0x115/0x130
[   23.824842]  mempool_free+0x290/0x380
[   23.824870]  mempool_double_free_helper+0x184/0x370
[   23.824893]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.824917]  ? __kasan_check_write+0x18/0x20
[   23.824939]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.824961]  ? irqentry_exit+0x2a/0x60
[   23.824982]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.825022]  mempool_page_alloc_double_free+0xe8/0x140
[   23.825048]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   23.825076]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   23.825110]  ? __pfx_mempool_free_pages+0x10/0x10
[   23.825135]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   23.825162]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   23.825188]  kunit_try_run_case+0x1a5/0x480
[   23.825216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.825271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.825307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.825331]  ? __kthread_parkme+0x82/0x180
[   23.825353]  ? preempt_count_sub+0x50/0x80
[   23.825388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.825411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.825435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.825458]  kthread+0x337/0x6f0
[   23.825478]  ? trace_preempt_on+0x20/0xc0
[   23.825502]  ? __pfx_kthread+0x10/0x10
[   23.825531]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.825554]  ? calculate_sigpending+0x7b/0xa0
[   23.825578]  ? __pfx_kthread+0x10/0x10
[   23.825612]  ret_from_fork+0x116/0x1d0
[   23.825633]  ? __pfx_kthread+0x10/0x10
[   23.825654]  ret_from_fork_asm+0x1a/0x30
[   23.825687]  </TASK>
[   23.825699] 
[   23.842431] The buggy address belongs to the physical page:
[   23.842639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ca4
[   23.843234] flags: 0x200000000000000(node=0|zone=2)
[   23.843709] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   23.844485] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.845292] page dumped because: kasan: bad access detected
[   23.845742] 
[   23.845948] Memory state around the buggy address:
[   23.846521]  ffff888102ca3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.847038]  ffff888102ca3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.847266] >ffff888102ca4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.847477]                    ^
[   23.847589]  ffff888102ca4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.847823]  ffff888102ca4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.848261] ==================================================================
[   23.798949] ==================================================================
[   23.799451] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.799772] Free of addr ffff888102bd8000 by task kunit_try_catch/266
[   23.800038] 
[   23.800185] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   23.800250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.800263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.800287] Call Trace:
[   23.800303]  <TASK>
[   23.800326]  dump_stack_lvl+0x73/0xb0
[   23.800360]  print_report+0xd1/0x650
[   23.800383]  ? __virt_addr_valid+0x1db/0x2d0
[   23.800414]  ? kasan_addr_to_slab+0x11/0xa0
[   23.800435]  ? mempool_double_free_helper+0x184/0x370
[   23.800459]  kasan_report_invalid_free+0x10a/0x130
[   23.800515]  ? mempool_double_free_helper+0x184/0x370
[   23.800541]  ? mempool_double_free_helper+0x184/0x370
[   23.800563]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   23.800586]  mempool_free+0x2ec/0x380
[   23.800614]  mempool_double_free_helper+0x184/0x370
[   23.800638]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.800662]  ? __kasan_check_write+0x18/0x20
[   23.800686]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.800709]  ? finish_task_switch.isra.0+0x153/0x700
[   23.800737]  mempool_kmalloc_large_double_free+0xed/0x140
[   23.800762]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   23.800791]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.800815]  ? __pfx_mempool_kfree+0x10/0x10
[   23.800839]  ? __pfx_read_tsc+0x10/0x10
[   23.800863]  ? ktime_get_ts64+0x86/0x230
[   23.800887]  kunit_try_run_case+0x1a5/0x480
[   23.800916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.800961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.800988]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.801013]  ? __kthread_parkme+0x82/0x180
[   23.801035]  ? preempt_count_sub+0x50/0x80
[   23.801058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.801083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.801106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.801142]  kthread+0x337/0x6f0
[   23.801162]  ? trace_preempt_on+0x20/0xc0
[   23.801188]  ? __pfx_kthread+0x10/0x10
[   23.801208]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.801241]  ? calculate_sigpending+0x7b/0xa0
[   23.801266]  ? __pfx_kthread+0x10/0x10
[   23.801287]  ret_from_fork+0x116/0x1d0
[   23.801306]  ? __pfx_kthread+0x10/0x10
[   23.801326]  ret_from_fork_asm+0x1a/0x30
[   23.801359]  </TASK>
[   23.801371] 
[   23.811248] The buggy address belongs to the physical page:
[   23.811530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd8
[   23.811991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.812310] flags: 0x200000000000040(head|node=0|zone=2)
[   23.812491] page_type: f8(unknown)
[   23.812614] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.812992] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.813685] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.814229] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.814481] head: 0200000000000002 ffffea00040af601 00000000ffffffff 00000000ffffffff
[   23.814927] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.815670] page dumped because: kasan: bad access detected
[   23.816034] 
[   23.816169] Memory state around the buggy address:
[   23.816358]  ffff888102bd7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.816714]  ffff888102bd7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.817124] >ffff888102bd8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.817518]                    ^
[   23.817693]  ffff888102bd8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.817987]  ffff888102bd8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.818374] ==================================================================
[   23.770282] ==================================================================
[   23.770743] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.771112] Free of addr ffff888102d56a00 by task kunit_try_catch/264
[   23.771410] 
[   23.771505] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   23.771557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.771571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.771594] Call Trace:
[   23.771608]  <TASK>
[   23.771628]  dump_stack_lvl+0x73/0xb0
[   23.771658]  print_report+0xd1/0x650
[   23.771681]  ? __virt_addr_valid+0x1db/0x2d0
[   23.771706]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.771731]  ? mempool_double_free_helper+0x184/0x370
[   23.771754]  kasan_report_invalid_free+0x10a/0x130
[   23.771777]  ? mempool_double_free_helper+0x184/0x370
[   23.771801]  ? mempool_double_free_helper+0x184/0x370
[   23.771823]  ? mempool_double_free_helper+0x184/0x370
[   23.771844]  check_slab_allocation+0x101/0x130
[   23.771865]  __kasan_mempool_poison_object+0x91/0x1d0
[   23.771889]  mempool_free+0x2ec/0x380
[   23.771916]  mempool_double_free_helper+0x184/0x370
[   23.771986]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.772027]  ? __kasan_check_write+0x18/0x20
[   23.772050]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.772072]  ? finish_task_switch.isra.0+0x153/0x700
[   23.772098]  mempool_kmalloc_double_free+0xed/0x140
[   23.772120]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   23.772145]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.772167]  ? __pfx_mempool_kfree+0x10/0x10
[   23.772190]  ? __pfx_read_tsc+0x10/0x10
[   23.772212]  ? ktime_get_ts64+0x86/0x230
[   23.772246]  kunit_try_run_case+0x1a5/0x480
[   23.772272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.772295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.772322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.772347]  ? __kthread_parkme+0x82/0x180
[   23.772368]  ? preempt_count_sub+0x50/0x80
[   23.772390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.772414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.772438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.772462]  kthread+0x337/0x6f0
[   23.772481]  ? trace_preempt_on+0x20/0xc0
[   23.772504]  ? __pfx_kthread+0x10/0x10
[   23.772524]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.772547]  ? calculate_sigpending+0x7b/0xa0
[   23.772571]  ? __pfx_kthread+0x10/0x10
[   23.772592]  ret_from_fork+0x116/0x1d0
[   23.772611]  ? __pfx_kthread+0x10/0x10
[   23.772631]  ret_from_fork_asm+0x1a/0x30
[   23.772662]  </TASK>
[   23.772674] 
[   23.781920] Allocated by task 264:
[   23.782124]  kasan_save_stack+0x45/0x70
[   23.782302]  kasan_save_track+0x18/0x40
[   23.782491]  kasan_save_alloc_info+0x3b/0x50
[   23.782666]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.782878]  remove_element+0x11e/0x190
[   23.783080]  mempool_alloc_preallocated+0x4d/0x90
[   23.783360]  mempool_double_free_helper+0x8a/0x370
[   23.783547]  mempool_kmalloc_double_free+0xed/0x140
[   23.783833]  kunit_try_run_case+0x1a5/0x480
[   23.784000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.784258]  kthread+0x337/0x6f0
[   23.784418]  ret_from_fork+0x116/0x1d0
[   23.784601]  ret_from_fork_asm+0x1a/0x30
[   23.784949] 
[   23.785091] Freed by task 264:
[   23.785240]  kasan_save_stack+0x45/0x70
[   23.785433]  kasan_save_track+0x18/0x40
[   23.785593]  kasan_save_free_info+0x3f/0x60
[   23.785875]  __kasan_mempool_poison_object+0x131/0x1d0
[   23.786113]  mempool_free+0x2ec/0x380
[   23.786281]  mempool_double_free_helper+0x109/0x370
[   23.786474]  mempool_kmalloc_double_free+0xed/0x140
[   23.786699]  kunit_try_run_case+0x1a5/0x480
[   23.786971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.787226]  kthread+0x337/0x6f0
[   23.787343]  ret_from_fork+0x116/0x1d0
[   23.787469]  ret_from_fork_asm+0x1a/0x30
[   23.787600] 
[   23.787665] The buggy address belongs to the object at ffff888102d56a00
[   23.787665]  which belongs to the cache kmalloc-128 of size 128
[   23.788252] The buggy address is located 0 bytes inside of
[   23.788252]  128-byte region [ffff888102d56a00, ffff888102d56a80)
[   23.788756] 
[   23.788852] The buggy address belongs to the physical page:
[   23.789108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d56
[   23.789688] flags: 0x200000000000000(node=0|zone=2)
[   23.789988] page_type: f5(slab)
[   23.790179] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.790539] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.790977] page dumped because: kasan: bad access detected
[   23.791272] 
[   23.791365] Memory state around the buggy address:
[   23.791594]  ffff888102d56900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.791986]  ffff888102d56980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.792310] >ffff888102d56a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.792540]                    ^
[   23.792701]  ffff888102d56a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.793283]  ffff888102d56b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.793503] ==================================================================