Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   50.527886] ==================================================================
[   50.539970] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   50.547202] Free of addr ffff000096d10000 by task kunit_try_catch/346
[   50.553732] 
[   50.555273] CPU: 5 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   50.555304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.555313] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.555325] Call trace:
[   50.555332]  show_stack+0x20/0x38 (C)
[   50.555350]  dump_stack_lvl+0x8c/0xd0
[   50.555370]  print_report+0x118/0x608
[   50.555391]  kasan_report_invalid_free+0xc0/0xe8
[   50.555412]  __kasan_mempool_poison_object+0x14c/0x150
[   50.555433]  mempool_free+0x28c/0x328
[   50.555450]  mempool_double_free_helper+0x150/0x2e8
[   50.555470]  mempool_kmalloc_large_double_free+0xc0/0x118
[   50.555489]  kunit_try_run_case+0x170/0x3f0
[   50.555508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.555529]  kthread+0x328/0x630
[   50.555544]  ret_from_fork+0x10/0x20
[   50.555562] 
[   50.632486] The buggy address belongs to the physical page:
[   50.638132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116d10
[   50.646237] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.653991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.661043] page_type: f8(unknown)
[   50.664504] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.672348] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   50.680194] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.688120] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   50.696049] head: 0bfffe0000000002 fffffdffc25b4401 00000000ffffffff 00000000ffffffff
[   50.703981] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   50.711908] page dumped because: kasan: bad access detected
[   50.717551] 
[   50.719084] Memory state around the buggy address:
[   50.723936]  ffff000096d0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.731246]  ffff000096d0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.738557] >ffff000096d10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.745864]                    ^
[   50.749146]  ffff000096d10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.756455]  ffff000096d10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.763772] ==================================================================
[   50.775160] ==================================================================
[   50.787784] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   50.795020] Free of addr ffff00008553c000 by task kunit_try_catch/348
[   50.801544] 
[   50.803078] CPU: 3 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   50.803110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.803120] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.803134] Call trace:
[   50.803142]  show_stack+0x20/0x38 (C)
[   50.803161]  dump_stack_lvl+0x8c/0xd0
[   50.803184]  print_report+0x118/0x608
[   50.803205]  kasan_report_invalid_free+0xc0/0xe8
[   50.803226]  __kasan_mempool_poison_pages+0xe0/0xe8
[   50.803252]  mempool_free+0x24c/0x328
[   50.803271]  mempool_double_free_helper+0x150/0x2e8
[   50.803291]  mempool_page_alloc_double_free+0xbc/0x118
[   50.803314]  kunit_try_run_case+0x170/0x3f0
[   50.803335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.803358]  kthread+0x328/0x630
[   50.803375]  ret_from_fork+0x10/0x20
[   50.803393] 
[   50.879848] The buggy address belongs to the physical page:
[   50.885504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553c
[   50.893611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.900236] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.908086] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.915931] page dumped because: kasan: bad access detected
[   50.921583] 
[   50.923111] Memory state around the buggy address:
[   50.927974]  ffff00008553bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.935294]  ffff00008553bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.942614] >ffff00008553c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.949929]                    ^
[   50.953219]  ffff00008553c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.960536]  ffff00008553c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.967851] ==================================================================
[   50.139739] ==================================================================
[   50.151398] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   50.158641] Free of addr ffff000082240900 by task kunit_try_catch/344
[   50.165169] 
[   50.166709] CPU: 3 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   50.166742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.166753] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.166769] Call trace:
[   50.166777]  show_stack+0x20/0x38 (C)
[   50.166797]  dump_stack_lvl+0x8c/0xd0
[   50.166821]  print_report+0x118/0x608
[   50.166843]  kasan_report_invalid_free+0xc0/0xe8
[   50.166866]  check_slab_allocation+0xd4/0x108
[   50.166891]  __kasan_mempool_poison_object+0x78/0x150
[   50.166913]  mempool_free+0x28c/0x328
[   50.166934]  mempool_double_free_helper+0x150/0x2e8
[   50.166954]  mempool_kmalloc_double_free+0xc0/0x118
[   50.166974]  kunit_try_run_case+0x170/0x3f0
[   50.166995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.167019]  kthread+0x328/0x630
[   50.167037]  ret_from_fork+0x10/0x20
[   50.167058] 
[   50.247832] Allocated by task 344:
[   50.251300]  kasan_save_stack+0x3c/0x68
[   50.255213]  kasan_save_track+0x20/0x40
[   50.259125]  kasan_save_alloc_info+0x40/0x58
[   50.263464]  __kasan_mempool_unpoison_object+0x11c/0x180
[   50.268865]  remove_element+0x130/0x1f8
[   50.272775]  mempool_alloc_preallocated+0x58/0xc0
[   50.277560]  mempool_double_free_helper+0x94/0x2e8
[   50.282432]  mempool_kmalloc_double_free+0xc0/0x118
[   50.287393]  kunit_try_run_case+0x170/0x3f0
[   50.291646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.297219]  kthread+0x328/0x630
[   50.300513]  ret_from_fork+0x10/0x20
[   50.304154] 
[   50.305685] Freed by task 344:
[   50.308801]  kasan_save_stack+0x3c/0x68
[   50.312713]  kasan_save_track+0x20/0x40
[   50.316625]  kasan_save_free_info+0x4c/0x78
[   50.320877]  __kasan_mempool_poison_object+0xc0/0x150
[   50.326012]  mempool_free+0x28c/0x328
[   50.329738]  mempool_double_free_helper+0x100/0x2e8
[   50.334695]  mempool_kmalloc_double_free+0xc0/0x118
[   50.339652]  kunit_try_run_case+0x170/0x3f0
[   50.343905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.349481]  kthread+0x328/0x630
[   50.352773]  ret_from_fork+0x10/0x20
[   50.356413] 
[   50.357948] The buggy address belongs to the object at ffff000082240900
[   50.357948]  which belongs to the cache kmalloc-128 of size 128
[   50.370609] The buggy address is located 0 bytes inside of
[   50.370609]  128-byte region [ffff000082240900, ffff000082240980)
[   50.382310] 
[   50.383849] The buggy address belongs to the physical page:
[   50.389501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   50.397611] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.405371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.412436] page_type: f5(slab)
[   50.415647] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   50.423497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.431347] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   50.439281] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.447218] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff
[   50.455155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.463085] page dumped because: kasan: bad access detected
[   50.468733] 
[   50.470264] Memory state around the buggy address:
[   50.475131]  ffff000082240800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.482448]  ffff000082240880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.489767] >ffff000082240900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.497082]                    ^
[   50.500372]  ffff000082240980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.507691]  ffff000082240a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.515008] ==================================================================

[   33.148998] ==================================================================
[   33.149058] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.149118] Free of addr fff00000c9c7c000 by task kunit_try_catch/269
[   33.149163] 
[   33.149196] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.149282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.149309] Hardware name: linux,dummy-virt (DT)
[   33.149343] Call trace:
[   33.149366]  show_stack+0x20/0x38 (C)
[   33.149413]  dump_stack_lvl+0x8c/0xd0
[   33.149463]  print_report+0x118/0x608
[   33.149511]  kasan_report_invalid_free+0xc0/0xe8
[   33.149561]  __kasan_mempool_poison_object+0x14c/0x150
[   33.149615]  mempool_free+0x28c/0x328
[   33.149661]  mempool_double_free_helper+0x150/0x2e8
[   33.149712]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.149765]  kunit_try_run_case+0x170/0x3f0
[   33.149814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.149965]  kthread+0x328/0x630
[   33.150061]  ret_from_fork+0x10/0x20
[   33.150110] 
[   33.150131] The buggy address belongs to the physical page:
[   33.150227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c7c
[   33.150500] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.150599] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.150702] page_type: f8(unknown)
[   33.150831] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.150892] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.150944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.151034] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.151084] head: 0bfffe0000000002 ffffc1ffc3271f01 00000000ffffffff 00000000ffffffff
[   33.151141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.151304] page dumped because: kasan: bad access detected
[   33.151363] 
[   33.151382] Memory state around the buggy address:
[   33.151415]  fff00000c9c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.151491]  fff00000c9c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.151535] >fff00000c9c7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.151574]                    ^
[   33.151601]  fff00000c9c7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.151680]  fff00000c9c7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.151854] ==================================================================
[   33.160004] ==================================================================
[   33.160145] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.160310] Free of addr fff00000c9c7c000 by task kunit_try_catch/271
[   33.160511] 
[   33.160632] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.160726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.160753] Hardware name: linux,dummy-virt (DT)
[   33.160785] Call trace:
[   33.160813]  show_stack+0x20/0x38 (C)
[   33.161067]  dump_stack_lvl+0x8c/0xd0
[   33.161232]  print_report+0x118/0x608
[   33.161291]  kasan_report_invalid_free+0xc0/0xe8
[   33.161341]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.161401]  mempool_free+0x24c/0x328
[   33.161617]  mempool_double_free_helper+0x150/0x2e8
[   33.161805]  mempool_page_alloc_double_free+0xbc/0x118
[   33.162130]  kunit_try_run_case+0x170/0x3f0
[   33.162548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.162745]  kthread+0x328/0x630
[   33.162888]  ret_from_fork+0x10/0x20
[   33.162938] 
[   33.162960] The buggy address belongs to the physical page:
[   33.162990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c7c
[   33.163070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.163138] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.163192] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.163658] page dumped because: kasan: bad access detected
[   33.163742] 
[   33.163862] Memory state around the buggy address:
[   33.163898]  fff00000c9c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.163944]  fff00000c9c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.163987] >fff00000c9c7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.164026]                    ^
[   33.164053]  fff00000c9c7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.164128]  fff00000c9c7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.164201] ==================================================================
[   33.134258] ==================================================================
[   33.134332] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.134398] Free of addr fff00000c9ae3c00 by task kunit_try_catch/267
[   33.134442] 
[   33.134480] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.134567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.134595] Hardware name: linux,dummy-virt (DT)
[   33.134627] Call trace:
[   33.134652]  show_stack+0x20/0x38 (C)
[   33.134701]  dump_stack_lvl+0x8c/0xd0
[   33.134754]  print_report+0x118/0x608
[   33.134801]  kasan_report_invalid_free+0xc0/0xe8
[   33.136003]  check_slab_allocation+0xd4/0x108
[   33.136086]  __kasan_mempool_poison_object+0x78/0x150
[   33.136545]  mempool_free+0x28c/0x328
[   33.136695]  mempool_double_free_helper+0x150/0x2e8
[   33.136748]  mempool_kmalloc_double_free+0xc0/0x118
[   33.136802]  kunit_try_run_case+0x170/0x3f0
[   33.136868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136925]  kthread+0x328/0x630
[   33.136996]  ret_from_fork+0x10/0x20
[   33.137369] 
[   33.137419] Allocated by task 267:
[   33.137494]  kasan_save_stack+0x3c/0x68
[   33.137542]  kasan_save_track+0x20/0x40
[   33.137582]  kasan_save_alloc_info+0x40/0x58
[   33.137630]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.137676]  remove_element+0x130/0x1f8
[   33.137714]  mempool_alloc_preallocated+0x58/0xc0
[   33.138041]  mempool_double_free_helper+0x94/0x2e8
[   33.138123]  mempool_kmalloc_double_free+0xc0/0x118
[   33.138168]  kunit_try_run_case+0x170/0x3f0
[   33.138207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.138253]  kthread+0x328/0x630
[   33.138285]  ret_from_fork+0x10/0x20
[   33.138323] 
[   33.138342] Freed by task 267:
[   33.138371]  kasan_save_stack+0x3c/0x68
[   33.138410]  kasan_save_track+0x20/0x40
[   33.138447]  kasan_save_free_info+0x4c/0x78
[   33.138485]  __kasan_mempool_poison_object+0xc0/0x150
[   33.138528]  mempool_free+0x28c/0x328
[   33.138575]  mempool_double_free_helper+0x100/0x2e8
[   33.138615]  mempool_kmalloc_double_free+0xc0/0x118
[   33.138657]  kunit_try_run_case+0x170/0x3f0
[   33.138695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.139066]  kthread+0x328/0x630
[   33.139102]  ret_from_fork+0x10/0x20
[   33.139141] 
[   33.139160] The buggy address belongs to the object at fff00000c9ae3c00
[   33.139160]  which belongs to the cache kmalloc-128 of size 128
[   33.139226] The buggy address is located 0 bytes inside of
[   33.139226]  128-byte region [fff00000c9ae3c00, fff00000c9ae3c80)
[   33.139296] 
[   33.139319] The buggy address belongs to the physical page:
[   33.139350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3
[   33.139642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.139703] page_type: f5(slab)
[   33.139749] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.139811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.139863] page dumped because: kasan: bad access detected
[   33.140054] 
[   33.140074] Memory state around the buggy address:
[   33.140110]  fff00000c9ae3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.140516]  fff00000c9ae3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.140606] >fff00000c9ae3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.140646]                    ^
[   33.140675]  fff00000c9ae3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.140733]  fff00000c9ae3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.140773] ==================================================================

[   24.863935] ==================================================================
[   24.864341] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.864642] Free of addr ffff888106164000 by task kunit_try_catch/288
[   24.865738] 
[   24.866045] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.866101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.866218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.866248] Call Trace:
[   24.866262]  <TASK>
[   24.866279]  dump_stack_lvl+0x73/0xb0
[   24.866312]  print_report+0xd1/0x650
[   24.866335]  ? __virt_addr_valid+0x1db/0x2d0
[   24.866361]  ? kasan_addr_to_slab+0x11/0xa0
[   24.866386]  ? mempool_double_free_helper+0x184/0x370
[   24.866431]  kasan_report_invalid_free+0x10a/0x130
[   24.866482]  ? mempool_double_free_helper+0x184/0x370
[   24.866509]  ? mempool_double_free_helper+0x184/0x370
[   24.866532]  __kasan_mempool_poison_pages+0x115/0x130
[   24.866557]  mempool_free+0x290/0x380
[   24.866584]  mempool_double_free_helper+0x184/0x370
[   24.866609]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.866633]  ? __kasan_check_write+0x18/0x20
[   24.866656]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.866679]  ? finish_task_switch.isra.0+0x153/0x700
[   24.866705]  mempool_page_alloc_double_free+0xe8/0x140
[   24.866731]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   24.866758]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   24.866781]  ? __pfx_mempool_free_pages+0x10/0x10
[   24.866806]  ? __pfx_read_tsc+0x10/0x10
[   24.866828]  ? ktime_get_ts64+0x86/0x230
[   24.866852]  kunit_try_run_case+0x1a5/0x480
[   24.866879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.866903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.866926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.866952]  ? __kthread_parkme+0x82/0x180
[   24.866973]  ? preempt_count_sub+0x50/0x80
[   24.866996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.867021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.867045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.867069]  kthread+0x337/0x6f0
[   24.867089]  ? trace_preempt_on+0x20/0xc0
[   24.867112]  ? __pfx_kthread+0x10/0x10
[   24.867152]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.867191]  ? calculate_sigpending+0x7b/0xa0
[   24.867216]  ? __pfx_kthread+0x10/0x10
[   24.867239]  ret_from_fork+0x116/0x1d0
[   24.867258]  ? __pfx_kthread+0x10/0x10
[   24.867279]  ret_from_fork_asm+0x1a/0x30
[   24.867310]  </TASK>
[   24.867322] 
[   24.878961] The buggy address belongs to the physical page:
[   24.879422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106164
[   24.879846] flags: 0x200000000000000(node=0|zone=2)
[   24.880074] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   24.880685] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.880977] page dumped because: kasan: bad access detected
[   24.881206] 
[   24.881391] Memory state around the buggy address:
[   24.881609]  ffff888106163f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.881915]  ffff888106163f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.882193] >ffff888106164000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.882893]                    ^
[   24.883054]  ffff888106164080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.883476]  ffff888106164100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.883766] ==================================================================
[   24.793079] ==================================================================
[   24.793664] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.793901] Free of addr ffff888105540800 by task kunit_try_catch/284
[   24.794096] 
[   24.794182] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.794233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.794246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.794269] Call Trace:
[   24.794281]  <TASK>
[   24.794298]  dump_stack_lvl+0x73/0xb0
[   24.794324]  print_report+0xd1/0x650
[   24.794347]  ? __virt_addr_valid+0x1db/0x2d0
[   24.794370]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.794395]  ? mempool_double_free_helper+0x184/0x370
[   24.794419]  kasan_report_invalid_free+0x10a/0x130
[   24.794442]  ? mempool_double_free_helper+0x184/0x370
[   24.794477]  ? mempool_double_free_helper+0x184/0x370
[   24.794500]  ? mempool_double_free_helper+0x184/0x370
[   24.794522]  check_slab_allocation+0x101/0x130
[   24.794548]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.794572]  mempool_free+0x2ec/0x380
[   24.794597]  mempool_double_free_helper+0x184/0x370
[   24.794621]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.794648]  ? finish_task_switch.isra.0+0x153/0x700
[   24.794673]  mempool_kmalloc_double_free+0xed/0x140
[   24.794695]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   24.794721]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.794743]  ? __pfx_mempool_kfree+0x10/0x10
[   24.794767]  ? __pfx_read_tsc+0x10/0x10
[   24.794789]  ? ktime_get_ts64+0x86/0x230
[   24.794812]  kunit_try_run_case+0x1a5/0x480
[   24.794839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.794862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.794884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.794909]  ? __kthread_parkme+0x82/0x180
[   24.794929]  ? preempt_count_sub+0x50/0x80
[   24.794951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.794975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.794999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.795023]  kthread+0x337/0x6f0
[   24.795042]  ? trace_preempt_on+0x20/0xc0
[   24.795064]  ? __pfx_kthread+0x10/0x10
[   24.795084]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.795108]  ? calculate_sigpending+0x7b/0xa0
[   24.795130]  ? __pfx_kthread+0x10/0x10
[   24.795152]  ret_from_fork+0x116/0x1d0
[   24.795170]  ? __pfx_kthread+0x10/0x10
[   24.795190]  ret_from_fork_asm+0x1a/0x30
[   24.795221]  </TASK>
[   24.795232] 
[   24.813423] Allocated by task 284:
[   24.813967]  kasan_save_stack+0x45/0x70
[   24.814208]  kasan_save_track+0x18/0x40
[   24.814340]  kasan_save_alloc_info+0x3b/0x50
[   24.814493]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.814934]  remove_element+0x11e/0x190
[   24.815089]  mempool_alloc_preallocated+0x4d/0x90
[   24.815833]  mempool_double_free_helper+0x8a/0x370
[   24.816388]  mempool_kmalloc_double_free+0xed/0x140
[   24.816817]  kunit_try_run_case+0x1a5/0x480
[   24.817327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.817684]  kthread+0x337/0x6f0
[   24.818005]  ret_from_fork+0x116/0x1d0
[   24.818550]  ret_from_fork_asm+0x1a/0x30
[   24.818921] 
[   24.819082] Freed by task 284:
[   24.819465]  kasan_save_stack+0x45/0x70
[   24.819623]  kasan_save_track+0x18/0x40
[   24.819752]  kasan_save_free_info+0x3f/0x60
[   24.819891]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.820052]  mempool_free+0x2ec/0x380
[   24.820228]  mempool_double_free_helper+0x109/0x370
[   24.821009]  mempool_kmalloc_double_free+0xed/0x140
[   24.821369]  kunit_try_run_case+0x1a5/0x480
[   24.821559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.822248]  kthread+0x337/0x6f0
[   24.822836]  ret_from_fork+0x116/0x1d0
[   24.823368]  ret_from_fork_asm+0x1a/0x30
[   24.823626] 
[   24.823695] The buggy address belongs to the object at ffff888105540800
[   24.823695]  which belongs to the cache kmalloc-128 of size 128
[   24.824049] The buggy address is located 0 bytes inside of
[   24.824049]  128-byte region [ffff888105540800, ffff888105540880)
[   24.825480] 
[   24.825854] The buggy address belongs to the physical page:
[   24.826786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540
[   24.827522] flags: 0x200000000000000(node=0|zone=2)
[   24.827889] page_type: f5(slab)
[   24.828018] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.828361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.829300] page dumped because: kasan: bad access detected
[   24.830030] 
[   24.830305] Memory state around the buggy address:
[   24.830886]  ffff888105540700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.831110]  ffff888105540780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.831942] >ffff888105540800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.832696]                    ^
[   24.832824]  ffff888105540880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.833039]  ffff888105540900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.833271] ==================================================================
[   24.837542] ==================================================================
[   24.838046] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   24.838338] Free of addr ffff88810607c000 by task kunit_try_catch/286
[   24.838856] 
[   24.838975] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.839028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.839042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.839065] Call Trace:
[   24.839077]  <TASK>
[   24.839094]  dump_stack_lvl+0x73/0xb0
[   24.839124]  print_report+0xd1/0x650
[   24.839147]  ? __virt_addr_valid+0x1db/0x2d0
[   24.839290]  ? kasan_addr_to_slab+0x11/0xa0
[   24.839315]  ? mempool_double_free_helper+0x184/0x370
[   24.839339]  kasan_report_invalid_free+0x10a/0x130
[   24.839363]  ? mempool_double_free_helper+0x184/0x370
[   24.839389]  ? mempool_double_free_helper+0x184/0x370
[   24.839412]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   24.839436]  mempool_free+0x2ec/0x380
[   24.839509]  mempool_double_free_helper+0x184/0x370
[   24.839559]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   24.839581]  ? update_load_avg+0x1be/0x21b0
[   24.839605]  ? dequeue_entities+0x27e/0x1740
[   24.839630]  ? finish_task_switch.isra.0+0x153/0x700
[   24.839656]  mempool_kmalloc_large_double_free+0xed/0x140
[   24.839681]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   24.839708]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.839729]  ? __pfx_mempool_kfree+0x10/0x10
[   24.839753]  ? __pfx_read_tsc+0x10/0x10
[   24.839776]  ? ktime_get_ts64+0x86/0x230
[   24.839801]  kunit_try_run_case+0x1a5/0x480
[   24.839827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.839849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.839871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.839897]  ? __kthread_parkme+0x82/0x180
[   24.839918]  ? preempt_count_sub+0x50/0x80
[   24.839941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.839965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.839988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.840012]  kthread+0x337/0x6f0
[   24.840032]  ? trace_preempt_on+0x20/0xc0
[   24.840055]  ? __pfx_kthread+0x10/0x10
[   24.840076]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.840099]  ? calculate_sigpending+0x7b/0xa0
[   24.840123]  ? __pfx_kthread+0x10/0x10
[   24.840145]  ret_from_fork+0x116/0x1d0
[   24.840163]  ? __pfx_kthread+0x10/0x10
[   24.840238]  ret_from_fork_asm+0x1a/0x30
[   24.840270]  </TASK>
[   24.840280] 
[   24.851780] The buggy address belongs to the physical page:
[   24.852142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10607c
[   24.852862] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.853482] flags: 0x200000000000040(head|node=0|zone=2)
[   24.853853] page_type: f8(unknown)
[   24.854030] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.854653] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.855145] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.855783] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.856322] head: 0200000000000002 ffffea0004181f01 00000000ffffffff 00000000ffffffff
[   24.856640] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.856944] page dumped because: kasan: bad access detected
[   24.857392] 
[   24.857515] Memory state around the buggy address:
[   24.857901]  ffff88810607bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.858566]  ffff88810607bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.858983] >ffff88810607c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.859512]                    ^
[   24.859804]  ffff88810607c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.860496]  ffff88810607c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.860942] ==================================================================