Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.058628] ==================================================================
[   33.058706] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.058771] Free of addr fff00000c8dc5000 by task kunit_try_catch/268
[   33.058815] 
[   33.058853] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.058964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.058995] Hardware name: linux,dummy-virt (DT)
[   33.059027] Call trace:
[   33.059053]  show_stack+0x20/0x38 (C)
[   33.059105]  dump_stack_lvl+0x8c/0xd0
[   33.059157]  print_report+0x118/0x608
[   33.059207]  kasan_report_invalid_free+0xc0/0xe8
[   33.059259]  check_slab_allocation+0xd4/0x108
[   33.059310]  __kasan_mempool_poison_object+0x78/0x150
[   33.059362]  mempool_free+0x28c/0x328
[   33.059410]  mempool_double_free_helper+0x150/0x2e8
[   33.059462]  mempool_kmalloc_double_free+0xc0/0x118
[   33.059513]  kunit_try_run_case+0x170/0x3f0
[   33.059606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.059680]  kthread+0x328/0x630
[   33.059726]  ret_from_fork+0x10/0x20
[   33.059776] 
[   33.059796] Allocated by task 268:
[   33.059828]  kasan_save_stack+0x3c/0x68
[   33.059871]  kasan_save_track+0x20/0x40
[   33.059909]  kasan_save_alloc_info+0x40/0x58
[   33.059957]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.060002]  remove_element+0x130/0x1f8
[   33.060039]  mempool_alloc_preallocated+0x58/0xc0
[   33.060094]  mempool_double_free_helper+0x94/0x2e8
[   33.060135]  mempool_kmalloc_double_free+0xc0/0x118
[   33.060177]  kunit_try_run_case+0x170/0x3f0
[   33.060215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.060260]  kthread+0x328/0x630
[   33.060292]  ret_from_fork+0x10/0x20
[   33.060329] 
[   33.060348] Freed by task 268:
[   33.060374]  kasan_save_stack+0x3c/0x68
[   33.060413]  kasan_save_track+0x20/0x40
[   33.060451]  kasan_save_free_info+0x4c/0x78
[   33.060487]  __kasan_mempool_poison_object+0xc0/0x150
[   33.060530]  mempool_free+0x28c/0x328
[   33.060566]  mempool_double_free_helper+0x100/0x2e8
[   33.060605]  mempool_kmalloc_double_free+0xc0/0x118
[   33.060646]  kunit_try_run_case+0x170/0x3f0
[   33.060684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.060728]  kthread+0x328/0x630
[   33.060760]  ret_from_fork+0x10/0x20
[   33.060797] 
[   33.060816] The buggy address belongs to the object at fff00000c8dc5000
[   33.060816]  which belongs to the cache kmalloc-128 of size 128
[   33.060877] The buggy address is located 0 bytes inside of
[   33.060877]  128-byte region [fff00000c8dc5000, fff00000c8dc5080)
[   33.060947] 
[   33.060969] The buggy address belongs to the physical page:
[   33.061003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5
[   33.061060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.061111] page_type: f5(slab)
[   33.061152] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.061204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.061245] page dumped because: kasan: bad access detected
[   33.061278] 
[   33.061296] Memory state around the buggy address:
[   33.061329]  fff00000c8dc4f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.061373]  fff00000c8dc4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.061415] >fff00000c8dc5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.061455]                    ^
[   33.061483]  fff00000c8dc5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.061525]  fff00000c8dc5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.061565] ==================================================================
[   33.066623] ==================================================================
[   33.066700] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.066783] Free of addr fff00000c8dbc000 by task kunit_try_catch/270
[   33.066828] 
[   33.066878] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.066981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.067010] Hardware name: linux,dummy-virt (DT)
[   33.067062] Call trace:
[   33.067085]  show_stack+0x20/0x38 (C)
[   33.067135]  dump_stack_lvl+0x8c/0xd0
[   33.067184]  print_report+0x118/0x608
[   33.067338]  kasan_report_invalid_free+0xc0/0xe8
[   33.067421]  __kasan_mempool_poison_object+0x14c/0x150
[   33.067477]  mempool_free+0x28c/0x328
[   33.067564]  mempool_double_free_helper+0x150/0x2e8
[   33.067680]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.067762]  kunit_try_run_case+0x170/0x3f0
[   33.067813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.067887]  kthread+0x328/0x630
[   33.067942]  ret_from_fork+0x10/0x20
[   33.067992] 
[   33.068012] The buggy address belongs to the physical page:
[   33.068044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dbc
[   33.068099] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.068291] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.068379] page_type: f8(unknown)
[   33.068453] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.068530] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.068641] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.068709] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.068772] head: 0bfffe0000000002 ffffc1ffc3236f01 00000000ffffffff 00000000ffffffff
[   33.068915] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.069083] page dumped because: kasan: bad access detected
[   33.069192] 
[   33.069261] Memory state around the buggy address:
[   33.069320]  fff00000c8dbbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.069364]  fff00000c8dbbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.069503] >fff00000c8dbc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.069631]                    ^
[   33.069663]  fff00000c8dbc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.069774]  fff00000c8dbc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.069870] ==================================================================
[   33.074041] ==================================================================
[   33.074106] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.074187] Free of addr fff00000c8dbc000 by task kunit_try_catch/272
[   33.074232] 
[   33.074265] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.074357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.074384] Hardware name: linux,dummy-virt (DT)
[   33.074415] Call trace:
[   33.074437]  show_stack+0x20/0x38 (C)
[   33.074609]  dump_stack_lvl+0x8c/0xd0
[   33.074671]  print_report+0x118/0x608
[   33.074750]  kasan_report_invalid_free+0xc0/0xe8
[   33.074829]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.074883]  mempool_free+0x24c/0x328
[   33.074943]  mempool_double_free_helper+0x150/0x2e8
[   33.074994]  mempool_page_alloc_double_free+0xbc/0x118
[   33.075202]  kunit_try_run_case+0x170/0x3f0
[   33.075270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.075348]  kthread+0x328/0x630
[   33.075403]  ret_from_fork+0x10/0x20
[   33.075460] 
[   33.075481] The buggy address belongs to the physical page:
[   33.075513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dbc
[   33.075642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.075706] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.075757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.075798] page dumped because: kasan: bad access detected
[   33.075828] 
[   33.075847] Memory state around the buggy address:
[   33.075892]  fff00000c8dbbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.075981]  fff00000c8dbbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.076026] >fff00000c8dbc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.076065]                    ^
[   33.076094]  fff00000c8dbc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.076136]  fff00000c8dbc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.076257] ==================================================================

[   34.876826] ==================================================================
[   34.876889] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.876965] Free of addr fff00000c9af4000 by task kunit_try_catch/270
[   34.877068] 
[   34.877104] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   34.877408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.877503] Hardware name: linux,dummy-virt (DT)
[   34.877561] Call trace:
[   34.877600]  show_stack+0x20/0x38 (C)
[   34.877712]  dump_stack_lvl+0x8c/0xd0
[   34.877787]  print_report+0x118/0x608
[   34.877850]  kasan_report_invalid_free+0xc0/0xe8
[   34.878046]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.878114]  mempool_free+0x24c/0x328
[   34.878206]  mempool_double_free_helper+0x150/0x2e8
[   34.878304]  mempool_page_alloc_double_free+0xbc/0x118
[   34.878359]  kunit_try_run_case+0x170/0x3f0
[   34.878426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.878521]  kthread+0x328/0x630
[   34.878566]  ret_from_fork+0x10/0x20
[   34.878634] 
[   34.878671] The buggy address belongs to the physical page:
[   34.878704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af4
[   34.878767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.878962] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.879086] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.879130] page dumped because: kasan: bad access detected
[   34.879239] 
[   34.879270] Memory state around the buggy address:
[   34.879305]  fff00000c9af3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.879365]  fff00000c9af3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.879416] >fff00000c9af4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.879649]                    ^
[   34.879788]  fff00000c9af4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.879867]  fff00000c9af4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.879981] ==================================================================
[   34.863470] ==================================================================
[   34.863549] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.863885] Free of addr fff00000c9af4000 by task kunit_try_catch/268
[   34.863963] 
[   34.864182] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   34.864295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.864474] Hardware name: linux,dummy-virt (DT)
[   34.864517] Call trace:
[   34.864540]  show_stack+0x20/0x38 (C)
[   34.864712]  dump_stack_lvl+0x8c/0xd0
[   34.864919]  print_report+0x118/0x608
[   34.865030]  kasan_report_invalid_free+0xc0/0xe8
[   34.865109]  __kasan_mempool_poison_object+0x14c/0x150
[   34.865280]  mempool_free+0x28c/0x328
[   34.865366]  mempool_double_free_helper+0x150/0x2e8
[   34.865570]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.865647]  kunit_try_run_case+0x170/0x3f0
[   34.865953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.866043]  kthread+0x328/0x630
[   34.866131]  ret_from_fork+0x10/0x20
[   34.866290] 
[   34.866313] The buggy address belongs to the physical page:
[   34.866363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af4
[   34.866800] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.866878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.866977] page_type: f8(unknown)
[   34.867148] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.867242] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.867453] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.867598] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.867707] head: 0bfffe0000000002 ffffc1ffc326bd01 00000000ffffffff 00000000ffffffff
[   34.867800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.867860] page dumped because: kasan: bad access detected
[   34.867927] 
[   34.868038] Memory state around the buggy address:
[   34.868096]  fff00000c9af3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.868170]  fff00000c9af3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.868222] >fff00000c9af4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.868552]                    ^
[   34.868849]  fff00000c9af4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.868954]  fff00000c9af4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.869034] ==================================================================
[   34.846738] ==================================================================
[   34.847015] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.847191] Free of addr fff00000c8dbd800 by task kunit_try_catch/266
[   34.847259] 
[   34.847295] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   34.847546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.847736] Hardware name: linux,dummy-virt (DT)
[   34.847816] Call trace:
[   34.847851]  show_stack+0x20/0x38 (C)
[   34.847921]  dump_stack_lvl+0x8c/0xd0
[   34.848027]  print_report+0x118/0x608
[   34.848076]  kasan_report_invalid_free+0xc0/0xe8
[   34.848126]  check_slab_allocation+0xd4/0x108
[   34.848188]  __kasan_mempool_poison_object+0x78/0x150
[   34.848240]  mempool_free+0x28c/0x328
[   34.848296]  mempool_double_free_helper+0x150/0x2e8
[   34.848355]  mempool_kmalloc_double_free+0xc0/0x118
[   34.848423]  kunit_try_run_case+0x170/0x3f0
[   34.848474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.848688]  kthread+0x328/0x630
[   34.848891]  ret_from_fork+0x10/0x20
[   34.848973] 
[   34.849078] Allocated by task 266:
[   34.849136]  kasan_save_stack+0x3c/0x68
[   34.849278]  kasan_save_track+0x20/0x40
[   34.849337]  kasan_save_alloc_info+0x40/0x58
[   34.849404]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.849488]  remove_element+0x130/0x1f8
[   34.849706]  mempool_alloc_preallocated+0x58/0xc0
[   34.849808]  mempool_double_free_helper+0x94/0x2e8
[   34.849961]  mempool_kmalloc_double_free+0xc0/0x118
[   34.850020]  kunit_try_run_case+0x170/0x3f0
[   34.850175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.850263]  kthread+0x328/0x630
[   34.850388]  ret_from_fork+0x10/0x20
[   34.850455] 
[   34.850480] Freed by task 266:
[   34.850520]  kasan_save_stack+0x3c/0x68
[   34.850758]  kasan_save_track+0x20/0x40
[   34.850805]  kasan_save_free_info+0x4c/0x78
[   34.850848]  __kasan_mempool_poison_object+0xc0/0x150
[   34.851017]  mempool_free+0x28c/0x328
[   34.851136]  mempool_double_free_helper+0x100/0x2e8
[   34.851232]  mempool_kmalloc_double_free+0xc0/0x118
[   34.851366]  kunit_try_run_case+0x170/0x3f0
[   34.851473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.851627]  kthread+0x328/0x630
[   34.851684]  ret_from_fork+0x10/0x20
[   34.851732] 
[   34.851879] The buggy address belongs to the object at fff00000c8dbd800
[   34.851879]  which belongs to the cache kmalloc-128 of size 128
[   34.851996] The buggy address is located 0 bytes inside of
[   34.851996]  128-byte region [fff00000c8dbd800, fff00000c8dbd880)
[   34.852179] 
[   34.852204] The buggy address belongs to the physical page:
[   34.852236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dbd
[   34.852296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.852346] page_type: f5(slab)
[   34.852386] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.852437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.852478] page dumped because: kasan: bad access detected
[   34.852508] 
[   34.852527] Memory state around the buggy address:
[   34.852559]  fff00000c8dbd700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.852602]  fff00000c8dbd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.852645] >fff00000c8dbd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.852683]                    ^
[   34.852712]  fff00000c8dbd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.852752]  fff00000c8dbd900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.852792] ==================================================================

[   24.976391] ==================================================================
[   24.976908] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.977717] Free of addr ffff88810255ea00 by task kunit_try_catch/284
[   24.978001] 
[   24.978349] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   24.978412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.978448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.978473] Call Trace:
[   24.978487]  <TASK>
[   24.978509]  dump_stack_lvl+0x73/0xb0
[   24.978544]  print_report+0xd1/0x650
[   24.978568]  ? __virt_addr_valid+0x1db/0x2d0
[   24.978594]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.978621]  ? mempool_double_free_helper+0x184/0x370
[   24.978646]  kasan_report_invalid_free+0x10a/0x130
[   24.978671]  ? mempool_double_free_helper+0x184/0x370
[   24.978696]  ? mempool_double_free_helper+0x184/0x370
[   24.978719]  ? mempool_double_free_helper+0x184/0x370
[   24.978743]  check_slab_allocation+0x101/0x130
[   24.978766]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.978791]  mempool_free+0x2ec/0x380
[   24.978819]  mempool_double_free_helper+0x184/0x370
[   24.978844]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.978868]  ? update_curr+0x5c1/0x810
[   24.978899]  mempool_kmalloc_double_free+0xed/0x140
[   24.978922]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   24.978961]  ? schedule+0x7c/0x2e0
[   24.978983]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.979006]  ? __pfx_mempool_kfree+0x10/0x10
[   24.979032]  ? __pfx_read_tsc+0x10/0x10
[   24.979054]  ? ktime_get_ts64+0x86/0x230
[   24.979091]  kunit_try_run_case+0x1a5/0x480
[   24.979120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.979145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.979167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.979281]  ? __kthread_parkme+0x82/0x180
[   24.979309]  ? preempt_count_sub+0x50/0x80
[   24.979332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.979357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.979384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.979408]  kthread+0x337/0x6f0
[   24.979428]  ? trace_preempt_on+0x20/0xc0
[   24.979453]  ? __pfx_kthread+0x10/0x10
[   24.979474]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.979499]  ? calculate_sigpending+0x7b/0xa0
[   24.979524]  ? __pfx_kthread+0x10/0x10
[   24.979546]  ret_from_fork+0x116/0x1d0
[   24.979565]  ? __pfx_kthread+0x10/0x10
[   24.979587]  ret_from_fork_asm+0x1a/0x30
[   24.979618]  </TASK>
[   24.979632] 
[   24.990306] Allocated by task 284:
[   24.990629]  kasan_save_stack+0x45/0x70
[   24.990890]  kasan_save_track+0x18/0x40
[   24.991112]  kasan_save_alloc_info+0x3b/0x50
[   24.991364]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.991702]  remove_element+0x11e/0x190
[   24.991882]  mempool_alloc_preallocated+0x4d/0x90
[   24.992042]  mempool_double_free_helper+0x8a/0x370
[   24.992234]  mempool_kmalloc_double_free+0xed/0x140
[   24.992456]  kunit_try_run_case+0x1a5/0x480
[   24.993088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.993451]  kthread+0x337/0x6f0
[   24.993574]  ret_from_fork+0x116/0x1d0
[   24.993698]  ret_from_fork_asm+0x1a/0x30
[   24.993858] 
[   24.994021] Freed by task 284:
[   24.994190]  kasan_save_stack+0x45/0x70
[   24.994404]  kasan_save_track+0x18/0x40
[   24.994673]  kasan_save_free_info+0x3f/0x60
[   24.994857]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.995164]  mempool_free+0x2ec/0x380
[   24.995409]  mempool_double_free_helper+0x109/0x370
[   24.995628]  mempool_kmalloc_double_free+0xed/0x140
[   24.995876]  kunit_try_run_case+0x1a5/0x480
[   24.996083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.996549]  kthread+0x337/0x6f0
[   24.996741]  ret_from_fork+0x116/0x1d0
[   24.996928]  ret_from_fork_asm+0x1a/0x30
[   24.997131] 
[   24.997201] The buggy address belongs to the object at ffff88810255ea00
[   24.997201]  which belongs to the cache kmalloc-128 of size 128
[   24.997892] The buggy address is located 0 bytes inside of
[   24.997892]  128-byte region [ffff88810255ea00, ffff88810255ea80)
[   24.998453] 
[   24.998581] The buggy address belongs to the physical page:
[   24.998784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10255e
[   24.999290] flags: 0x200000000000000(node=0|zone=2)
[   24.999518] page_type: f5(slab)
[   24.999682] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.000055] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.000393] page dumped because: kasan: bad access detected
[   25.000897] 
[   25.000998] Memory state around the buggy address:
[   25.001234]  ffff88810255e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.001781]  ffff88810255e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.002115] >ffff88810255ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.002680]                    ^
[   25.002944]  ffff88810255ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.003352]  ffff88810255eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.003639] ==================================================================
[   25.031183] ==================================================================
[   25.032501] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.033116] Free of addr ffff8881060cc000 by task kunit_try_catch/288
[   25.033632] 
[   25.033836] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.033895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.033910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.033952] Call Trace:
[   25.033970]  <TASK>
[   25.034003]  dump_stack_lvl+0x73/0xb0
[   25.034037]  print_report+0xd1/0x650
[   25.034070]  ? __virt_addr_valid+0x1db/0x2d0
[   25.034095]  ? kasan_addr_to_slab+0x11/0xa0
[   25.034115]  ? mempool_double_free_helper+0x184/0x370
[   25.034140]  kasan_report_invalid_free+0x10a/0x130
[   25.034163]  ? mempool_double_free_helper+0x184/0x370
[   25.034210]  ? mempool_double_free_helper+0x184/0x370
[   25.034233]  __kasan_mempool_poison_pages+0x115/0x130
[   25.034257]  mempool_free+0x290/0x380
[   25.034285]  mempool_double_free_helper+0x184/0x370
[   25.034308]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.034330]  ? update_load_avg+0x1be/0x21b0
[   25.034357]  ? finish_task_switch.isra.0+0x153/0x700
[   25.034383]  mempool_page_alloc_double_free+0xe8/0x140
[   25.034406]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.034434]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.034457]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.034481]  ? __pfx_read_tsc+0x10/0x10
[   25.034504]  ? ktime_get_ts64+0x86/0x230
[   25.034528]  kunit_try_run_case+0x1a5/0x480
[   25.034555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.034578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.034600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.034623]  ? __kthread_parkme+0x82/0x180
[   25.034643]  ? preempt_count_sub+0x50/0x80
[   25.034666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.034690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.034714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.034738]  kthread+0x337/0x6f0
[   25.034758]  ? trace_preempt_on+0x20/0xc0
[   25.034782]  ? __pfx_kthread+0x10/0x10
[   25.034802]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.034826]  ? calculate_sigpending+0x7b/0xa0
[   25.034851]  ? __pfx_kthread+0x10/0x10
[   25.034872]  ret_from_fork+0x116/0x1d0
[   25.034892]  ? __pfx_kthread+0x10/0x10
[   25.034912]  ret_from_fork_asm+0x1a/0x30
[   25.034960]  </TASK>
[   25.034973] 
[   25.048608] The buggy address belongs to the physical page:
[   25.048966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060cc
[   25.049223] flags: 0x200000000000000(node=0|zone=2)
[   25.049575] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.049812] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.050477] page dumped because: kasan: bad access detected
[   25.051058] 
[   25.051219] Memory state around the buggy address:
[   25.051693]  ffff8881060cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.052389]  ffff8881060cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.052754] >ffff8881060cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.053024]                    ^
[   25.053329]  ffff8881060cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.054040]  ffff8881060cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.054947] ==================================================================
[   25.008743] ==================================================================
[   25.009700] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.010125] Free of addr ffff8881060cc000 by task kunit_try_catch/286
[   25.010384] 
[   25.010862] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.010943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.010958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.010997] Call Trace:
[   25.011015]  <TASK>
[   25.011038]  dump_stack_lvl+0x73/0xb0
[   25.011108]  print_report+0xd1/0x650
[   25.011143]  ? __virt_addr_valid+0x1db/0x2d0
[   25.011171]  ? kasan_addr_to_slab+0x11/0xa0
[   25.011487]  ? mempool_double_free_helper+0x184/0x370
[   25.011517]  kasan_report_invalid_free+0x10a/0x130
[   25.011542]  ? mempool_double_free_helper+0x184/0x370
[   25.011569]  ? mempool_double_free_helper+0x184/0x370
[   25.011592]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   25.011617]  mempool_free+0x2ec/0x380
[   25.011647]  mempool_double_free_helper+0x184/0x370
[   25.011671]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.011694]  ? update_load_avg+0x1be/0x21b0
[   25.011723]  ? finish_task_switch.isra.0+0x153/0x700
[   25.011749]  mempool_kmalloc_large_double_free+0xed/0x140
[   25.011774]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   25.011802]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.011824]  ? __pfx_mempool_kfree+0x10/0x10
[   25.011850]  ? __pfx_read_tsc+0x10/0x10
[   25.011875]  ? ktime_get_ts64+0x86/0x230
[   25.011902]  kunit_try_run_case+0x1a5/0x480
[   25.011942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.011967]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.011991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.012014]  ? __kthread_parkme+0x82/0x180
[   25.012036]  ? preempt_count_sub+0x50/0x80
[   25.012075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.012101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.012125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.012149]  kthread+0x337/0x6f0
[   25.012169]  ? trace_preempt_on+0x20/0xc0
[   25.012248]  ? __pfx_kthread+0x10/0x10
[   25.012271]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.012296]  ? calculate_sigpending+0x7b/0xa0
[   25.012322]  ? __pfx_kthread+0x10/0x10
[   25.012344]  ret_from_fork+0x116/0x1d0
[   25.012364]  ? __pfx_kthread+0x10/0x10
[   25.012385]  ret_from_fork_asm+0x1a/0x30
[   25.012417]  </TASK>
[   25.012430] 
[   25.020877] The buggy address belongs to the physical page:
[   25.021071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060cc
[   25.021450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.021789] flags: 0x200000000000040(head|node=0|zone=2)
[   25.022500] page_type: f8(unknown)
[   25.022695] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.022960] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.023431] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.023762] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.024396] head: 0200000000000002 ffffea0004183301 00000000ffffffff 00000000ffffffff
[   25.024732] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.025091] page dumped because: kasan: bad access detected
[   25.025443] 
[   25.025537] Memory state around the buggy address:
[   25.025769]  ffff8881060cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.026098]  ffff8881060cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.026425] >ffff8881060cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.026730]                    ^
[   25.026890]  ffff8881060cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.027236]  ffff8881060cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.027432] ==================================================================

[   24.764836] ==================================================================
[   24.765841] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.766610] Free of addr ffff8881060dc000 by task kunit_try_catch/285
[   24.767097] 
[   24.767450] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   24.767511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.767525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.767548] Call Trace:
[   24.767561]  <TASK>
[   24.767582]  dump_stack_lvl+0x73/0xb0
[   24.767616]  print_report+0xd1/0x650
[   24.767640]  ? __virt_addr_valid+0x1db/0x2d0
[   24.767666]  ? kasan_addr_to_slab+0x11/0xa0
[   24.767686]  ? mempool_double_free_helper+0x184/0x370
[   24.767711]  kasan_report_invalid_free+0x10a/0x130
[   24.767808]  ? mempool_double_free_helper+0x184/0x370
[   24.767836]  ? mempool_double_free_helper+0x184/0x370
[   24.767858]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   24.767883]  mempool_free+0x2ec/0x380
[   24.767909]  mempool_double_free_helper+0x184/0x370
[   24.767932]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.767957]  ? __kasan_check_write+0x18/0x20
[   24.767981]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.768003]  ? finish_task_switch.isra.0+0x153/0x700
[   24.768030]  mempool_kmalloc_large_double_free+0xed/0x140
[   24.768054]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   24.768081]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.768104]  ? __pfx_mempool_kfree+0x10/0x10
[   24.768128]  ? __pfx_read_tsc+0x10/0x10
[   24.768150]  ? ktime_get_ts64+0x86/0x230
[   24.768174]  kunit_try_run_case+0x1a5/0x480
[   24.768201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.768223]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.768247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.768269]  ? __kthread_parkme+0x82/0x180
[   24.768290]  ? preempt_count_sub+0x50/0x80
[   24.768324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.768349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.768374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.768398]  kthread+0x337/0x6f0
[   24.768419]  ? trace_preempt_on+0x20/0xc0
[   24.768442]  ? __pfx_kthread+0x10/0x10
[   24.768463]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.768497]  ? calculate_sigpending+0x7b/0xa0
[   24.768521]  ? __pfx_kthread+0x10/0x10
[   24.768543]  ret_from_fork+0x116/0x1d0
[   24.768561]  ? __pfx_kthread+0x10/0x10
[   24.768582]  ret_from_fork_asm+0x1a/0x30
[   24.768613]  </TASK>
[   24.768626] 
[   24.781944] The buggy address belongs to the physical page:
[   24.782161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc
[   24.782493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.783100] flags: 0x200000000000040(head|node=0|zone=2)
[   24.783452] page_type: f8(unknown)
[   24.783884] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.784333] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.784931] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.785392] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.785904] head: 0200000000000002 ffffea0004183701 00000000ffffffff 00000000ffffffff
[   24.786210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.786687] page dumped because: kasan: bad access detected
[   24.787052] 
[   24.787171] Memory state around the buggy address:
[   24.787412]  ffff8881060dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.788027]  ffff8881060dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.788452] >ffff8881060dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.788897]                    ^
[   24.789040]  ffff8881060dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.789725]  ffff8881060dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.790043] ==================================================================
[   24.795296] ==================================================================
[   24.795734] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.795976] Free of addr ffff8881060dc000 by task kunit_try_catch/287
[   24.796171] 
[   24.796256] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   24.796321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.796334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.796356] Call Trace:
[   24.796370]  <TASK>
[   24.796389]  dump_stack_lvl+0x73/0xb0
[   24.796418]  print_report+0xd1/0x650
[   24.796441]  ? __virt_addr_valid+0x1db/0x2d0
[   24.796467]  ? kasan_addr_to_slab+0x11/0xa0
[   24.796486]  ? mempool_double_free_helper+0x184/0x370
[   24.796510]  kasan_report_invalid_free+0x10a/0x130
[   24.796533]  ? mempool_double_free_helper+0x184/0x370
[   24.796558]  ? mempool_double_free_helper+0x184/0x370
[   24.796580]  __kasan_mempool_poison_pages+0x115/0x130
[   24.796605]  mempool_free+0x290/0x380
[   24.796631]  mempool_double_free_helper+0x184/0x370
[   24.796655]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.796681]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.796704]  ? finish_task_switch.isra.0+0x153/0x700
[   24.796730]  mempool_page_alloc_double_free+0xe8/0x140
[   24.797228]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   24.797258]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   24.797283]  ? __pfx_mempool_free_pages+0x10/0x10
[   24.797321]  ? __pfx_read_tsc+0x10/0x10
[   24.797345]  ? ktime_get_ts64+0x86/0x230
[   24.797370]  kunit_try_run_case+0x1a5/0x480
[   24.797396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.797421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.797443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.797464]  ? __kthread_parkme+0x82/0x180
[   24.797486]  ? preempt_count_sub+0x50/0x80
[   24.797521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.797546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.797571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.797595]  kthread+0x337/0x6f0
[   24.797614]  ? trace_preempt_on+0x20/0xc0
[   24.797638]  ? __pfx_kthread+0x10/0x10
[   24.797659]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.797690]  ? calculate_sigpending+0x7b/0xa0
[   24.797714]  ? __pfx_kthread+0x10/0x10
[   24.797735]  ret_from_fork+0x116/0x1d0
[   24.797759]  ? __pfx_kthread+0x10/0x10
[   24.797779]  ret_from_fork_asm+0x1a/0x30
[   24.797811]  </TASK>
[   24.797824] 
[   24.808147] The buggy address belongs to the physical page:
[   24.808400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc
[   24.809205] flags: 0x200000000000000(node=0|zone=2)
[   24.809503] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   24.809972] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.810205] page dumped because: kasan: bad access detected
[   24.810385] 
[   24.810488] Memory state around the buggy address:
[   24.810796]  ffff8881060dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.811234]  ffff8881060dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.811545] >ffff8881060dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.811918]                    ^
[   24.812063]  ffff8881060dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.812419]  ffff8881060dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.812739] ==================================================================
[   24.725973] ==================================================================
[   24.727098] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.727830] Free of addr ffff888105898700 by task kunit_try_catch/283
[   24.728515] 
[   24.728705] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   24.728774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.728788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.728820] Call Trace:
[   24.728833]  <TASK>
[   24.728853]  dump_stack_lvl+0x73/0xb0
[   24.729037]  print_report+0xd1/0x650
[   24.729065]  ? __virt_addr_valid+0x1db/0x2d0
[   24.729091]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.729116]  ? mempool_double_free_helper+0x184/0x370
[   24.729141]  kasan_report_invalid_free+0x10a/0x130
[   24.729165]  ? mempool_double_free_helper+0x184/0x370
[   24.729190]  ? mempool_double_free_helper+0x184/0x370
[   24.729212]  ? mempool_double_free_helper+0x184/0x370
[   24.729235]  check_slab_allocation+0x101/0x130
[   24.729257]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.729280]  mempool_free+0x2ec/0x380
[   24.729322]  mempool_double_free_helper+0x184/0x370
[   24.729348]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.729375]  ? finish_task_switch.isra.0+0x153/0x700
[   24.729401]  mempool_kmalloc_double_free+0xed/0x140
[   24.729424]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   24.729450]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.729472]  ? __pfx_mempool_kfree+0x10/0x10
[   24.729536]  ? __pfx_read_tsc+0x10/0x10
[   24.729560]  ? ktime_get_ts64+0x86/0x230
[   24.729586]  kunit_try_run_case+0x1a5/0x480
[   24.729613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.729636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.729657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.729746]  ? __kthread_parkme+0x82/0x180
[   24.729769]  ? preempt_count_sub+0x50/0x80
[   24.729792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.729817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.729842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.729866]  kthread+0x337/0x6f0
[   24.729886]  ? trace_preempt_on+0x20/0xc0
[   24.729910]  ? __pfx_kthread+0x10/0x10
[   24.729930]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.729954]  ? calculate_sigpending+0x7b/0xa0
[   24.729977]  ? __pfx_kthread+0x10/0x10
[   24.729999]  ret_from_fork+0x116/0x1d0
[   24.730017]  ? __pfx_kthread+0x10/0x10
[   24.730039]  ret_from_fork_asm+0x1a/0x30
[   24.730070]  </TASK>
[   24.730083] 
[   24.742277] Allocated by task 283:
[   24.742481]  kasan_save_stack+0x45/0x70
[   24.742670]  kasan_save_track+0x18/0x40
[   24.742961]  kasan_save_alloc_info+0x3b/0x50
[   24.743108]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.743276]  remove_element+0x11e/0x190
[   24.743420]  mempool_alloc_preallocated+0x4d/0x90
[   24.743859]  mempool_double_free_helper+0x8a/0x370
[   24.744148]  mempool_kmalloc_double_free+0xed/0x140
[   24.744391]  kunit_try_run_case+0x1a5/0x480
[   24.744600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.744849]  kthread+0x337/0x6f0
[   24.745051]  ret_from_fork+0x116/0x1d0
[   24.745822]  ret_from_fork_asm+0x1a/0x30
[   24.746022] 
[   24.746090] Freed by task 283:
[   24.746299]  kasan_save_stack+0x45/0x70
[   24.746538]  kasan_save_track+0x18/0x40
[   24.747138]  kasan_save_free_info+0x3f/0x60
[   24.747368]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.747865]  mempool_free+0x2ec/0x380
[   24.748175]  mempool_double_free_helper+0x109/0x370
[   24.748520]  mempool_kmalloc_double_free+0xed/0x140
[   24.748908]  kunit_try_run_case+0x1a5/0x480
[   24.749135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.749791]  kthread+0x337/0x6f0
[   24.750142]  ret_from_fork+0x116/0x1d0
[   24.750355]  ret_from_fork_asm+0x1a/0x30
[   24.750778] 
[   24.750876] The buggy address belongs to the object at ffff888105898700
[   24.750876]  which belongs to the cache kmalloc-128 of size 128
[   24.751530] The buggy address is located 0 bytes inside of
[   24.751530]  128-byte region [ffff888105898700, ffff888105898780)
[   24.752299] 
[   24.752644] The buggy address belongs to the physical page:
[   24.753685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105898
[   24.754294] flags: 0x200000000000000(node=0|zone=2)
[   24.754483] page_type: f5(slab)
[   24.754913] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.755804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.756254] page dumped because: kasan: bad access detected
[   24.756436] 
[   24.756525] Memory state around the buggy address:
[   24.757195]  ffff888105898600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.758085]  ffff888105898680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.758616] >ffff888105898700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.759174]                    ^
[   24.759499]  ffff888105898780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.760119]  ffff888105898800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.761011] ==================================================================