Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   55.042254] ==================================================================
[   55.052293] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   55.059407] Free of addr ffff000808728000 by task kunit_try_catch/318
[   55.065830] 
[   55.067316] CPU: 7 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.067372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.067389] Hardware name: WinLink E850-96 board (DT)
[   55.067410] Call trace:
[   55.067423]  show_stack+0x20/0x38 (C)
[   55.067455]  dump_stack_lvl+0x8c/0xd0
[   55.067490]  print_report+0x118/0x5d0
[   55.067519]  kasan_report_invalid_free+0xc0/0xe8
[   55.067550]  __kasan_mempool_poison_object+0x14c/0x150
[   55.067582]  mempool_free+0x28c/0x328
[   55.067614]  mempool_double_free_helper+0x150/0x2e8
[   55.067647]  mempool_kmalloc_large_double_free+0xc0/0x118
[   55.067682]  kunit_try_run_case+0x170/0x3f0
[   55.067713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.067747]  kthread+0x328/0x630
[   55.067775]  ret_from_fork+0x10/0x20
[   55.067812] 
[   55.142481] The buggy address belongs to the physical page:
[   55.148038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888728
[   55.156021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.163661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.170603] page_type: f8(unknown)
[   55.174000] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.181719] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.189447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.197257] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.205071] head: 0bfffe0000000002 fffffdffe021ca01 00000000ffffffff 00000000ffffffff
[   55.212883] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   55.220688] page dumped because: kasan: bad access detected
[   55.226244] 
[   55.227719] Memory state around the buggy address:
[   55.232501]  ffff000808727f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.239702]  ffff000808727f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.246909] >ffff000808728000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.254108]                    ^
[   55.257323]  ffff000808728080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.264528]  ffff000808728100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.271730] ==================================================================
[   54.667233] ==================================================================
[   54.677037] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   54.684155] Free of addr ffff00080244df00 by task kunit_try_catch/316
[   54.690575] 
[   54.692060] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   54.692115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.692133] Hardware name: WinLink E850-96 board (DT)
[   54.692154] Call trace:
[   54.692167]  show_stack+0x20/0x38 (C)
[   54.692203]  dump_stack_lvl+0x8c/0xd0
[   54.692236]  print_report+0x118/0x5d0
[   54.692263]  kasan_report_invalid_free+0xc0/0xe8
[   54.692294]  check_slab_allocation+0xd4/0x108
[   54.692333]  __kasan_mempool_poison_object+0x78/0x150
[   54.692365]  mempool_free+0x28c/0x328
[   54.692397]  mempool_double_free_helper+0x150/0x2e8
[   54.692431]  mempool_kmalloc_double_free+0xc0/0x118
[   54.692466]  kunit_try_run_case+0x170/0x3f0
[   54.692496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.692531]  kthread+0x328/0x630
[   54.692561]  ret_from_fork+0x10/0x20
[   54.692596] 
[   54.770958] Allocated by task 316:
[   54.774345]  kasan_save_stack+0x3c/0x68
[   54.778160]  kasan_save_track+0x20/0x40
[   54.781980]  kasan_save_alloc_info+0x40/0x58
[   54.786233]  __kasan_mempool_unpoison_object+0x11c/0x180
[   54.791530]  remove_element+0x130/0x1f8
[   54.795348]  mempool_alloc_preallocated+0x58/0xc0
[   54.800035]  mempool_double_free_helper+0x94/0x2e8
[   54.804809]  mempool_kmalloc_double_free+0xc0/0x118
[   54.809670]  kunit_try_run_case+0x170/0x3f0
[   54.813837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.819306]  kthread+0x328/0x630
[   54.822517]  ret_from_fork+0x10/0x20
[   54.826076] 
[   54.827552] Freed by task 316:
[   54.830592]  kasan_save_stack+0x3c/0x68
[   54.834409]  kasan_save_track+0x20/0x40
[   54.838229]  kasan_save_free_info+0x4c/0x78
[   54.842395]  __kasan_mempool_poison_object+0xc0/0x150
[   54.847430]  mempool_free+0x28c/0x328
[   54.851076]  mempool_double_free_helper+0x100/0x2e8
[   54.855937]  mempool_kmalloc_double_free+0xc0/0x118
[   54.860798]  kunit_try_run_case+0x170/0x3f0
[   54.864964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.870433]  kthread+0x328/0x630
[   54.873645]  ret_from_fork+0x10/0x20
[   54.877204] 
[   54.878681] The buggy address belongs to the object at ffff00080244df00
[   54.878681]  which belongs to the cache kmalloc-128 of size 128
[   54.891182] The buggy address is located 0 bytes inside of
[   54.891182]  128-byte region [ffff00080244df00, ffff00080244df80)
[   54.902724] 
[   54.904204] The buggy address belongs to the physical page:
[   54.909760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   54.917744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.925384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.932326] page_type: f5(slab)
[   54.935464] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.943182] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   54.950909] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.958720] head: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   54.966533] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   54.974344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   54.982152] page dumped because: kasan: bad access detected
[   54.987706] 
[   54.989181] Memory state around the buggy address:
[   54.993965]  ffff00080244de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.001166]  ffff00080244de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.008369] >ffff00080244df00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.015570]                    ^
[   55.018785]  ffff00080244df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.025992]  ffff00080244e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.033191] ==================================================================
[   55.281456] ==================================================================
[   55.291350] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   55.298466] Free of addr ffff0008062cc000 by task kunit_try_catch/320
[   55.304889] 
[   55.306377] CPU: 2 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.306433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.306451] Hardware name: WinLink E850-96 board (DT)
[   55.306477] Call trace:
[   55.306491]  show_stack+0x20/0x38 (C)
[   55.306527]  dump_stack_lvl+0x8c/0xd0
[   55.306564]  print_report+0x118/0x5d0
[   55.306592]  kasan_report_invalid_free+0xc0/0xe8
[   55.306623]  __kasan_mempool_poison_pages+0xe0/0xe8
[   55.306656]  mempool_free+0x24c/0x328
[   55.306688]  mempool_double_free_helper+0x150/0x2e8
[   55.306723]  mempool_page_alloc_double_free+0xbc/0x118
[   55.306762]  kunit_try_run_case+0x170/0x3f0
[   55.306794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.306830]  kthread+0x328/0x630
[   55.306860]  ret_from_fork+0x10/0x20
[   55.306893] 
[   55.381020] The buggy address belongs to the physical page:
[   55.386575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc
[   55.394560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.401082] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   55.408800] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.416521] page dumped because: kasan: bad access detected
[   55.422074] 
[   55.423550] Memory state around the buggy address:
[   55.428331]  ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.435532]  ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.442739] >ffff0008062cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.449938]                    ^
[   55.453154]  ffff0008062cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.460358]  ffff0008062cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.467561] ==================================================================

[   32.740742] ==================================================================
[   32.740808] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.740870] Free of addr fff00000c9b28000 by task kunit_try_catch/269
[   32.740914] 
[   32.740948] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.741169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.741254] Hardware name: linux,dummy-virt (DT)
[   32.741287] Call trace:
[   32.741311]  show_stack+0x20/0x38 (C)
[   32.741982]  dump_stack_lvl+0x8c/0xd0
[   32.742178]  print_report+0x118/0x5d0
[   32.742227]  kasan_report_invalid_free+0xc0/0xe8
[   32.742622]  __kasan_mempool_poison_object+0x14c/0x150
[   32.742714]  mempool_free+0x28c/0x328
[   32.742890]  mempool_double_free_helper+0x150/0x2e8
[   32.743098]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.743195]  kunit_try_run_case+0x170/0x3f0
[   32.743267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.743427]  kthread+0x328/0x630
[   32.743482]  ret_from_fork+0x10/0x20
[   32.743530] 
[   32.743799] The buggy address belongs to the physical page:
[   32.743869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b28
[   32.744183] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.744240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.744295] page_type: f8(unknown)
[   32.744336] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.744646] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.744874] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.744926] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.744975] head: 0bfffe0000000002 ffffc1ffc326ca01 00000000ffffffff 00000000ffffffff
[   32.745057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.745105] page dumped because: kasan: bad access detected
[   32.745342] 
[   32.745577] Memory state around the buggy address:
[   32.745660]  fff00000c9b27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745704]  fff00000c9b27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745746] >fff00000c9b28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745785]                    ^
[   32.745837]  fff00000c9b28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745881]  fff00000c9b28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.745921] ==================================================================
[   32.780127] ==================================================================
[   32.780204] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.780367] Free of addr fff00000c9b2c000 by task kunit_try_catch/271
[   32.782153] 
[   32.782292] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.783516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.783554] Hardware name: linux,dummy-virt (DT)
[   32.783692] Call trace:
[   32.784149]  show_stack+0x20/0x38 (C)
[   32.784565]  dump_stack_lvl+0x8c/0xd0
[   32.784815]  print_report+0x118/0x5d0
[   32.784898]  kasan_report_invalid_free+0xc0/0xe8
[   32.785305]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.785397]  mempool_free+0x24c/0x328
[   32.786517]  mempool_double_free_helper+0x150/0x2e8
[   32.786993]  mempool_page_alloc_double_free+0xbc/0x118
[   32.787318]  kunit_try_run_case+0x170/0x3f0
[   32.787432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.787498]  kthread+0x328/0x630
[   32.787544]  ret_from_fork+0x10/0x20
[   32.787596] 
[   32.788353] The buggy address belongs to the physical page:
[   32.788835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c
[   32.789188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.789543] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.789594] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.790503] page dumped because: kasan: bad access detected
[   32.791243] 
[   32.791308] Memory state around the buggy address:
[   32.791344]  fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.791848]  fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.792083] >fff00000c9b2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.792925]                    ^
[   32.793142]  fff00000c9b2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.793270]  fff00000c9b2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.793557] ==================================================================
[   32.722882] ==================================================================
[   32.723257] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.723478] Free of addr fff00000c9147e00 by task kunit_try_catch/267
[   32.723591] 
[   32.723624] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.723708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.723733] Hardware name: linux,dummy-virt (DT)
[   32.723788] Call trace:
[   32.723917]  show_stack+0x20/0x38 (C)
[   32.723977]  dump_stack_lvl+0x8c/0xd0
[   32.724026]  print_report+0x118/0x5d0
[   32.724070]  kasan_report_invalid_free+0xc0/0xe8
[   32.724119]  check_slab_allocation+0xd4/0x108
[   32.724172]  __kasan_mempool_poison_object+0x78/0x150
[   32.724314]  mempool_free+0x28c/0x328
[   32.724848]  mempool_double_free_helper+0x150/0x2e8
[   32.724990]  mempool_kmalloc_double_free+0xc0/0x118
[   32.725345]  kunit_try_run_case+0x170/0x3f0
[   32.725401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.725465]  kthread+0x328/0x630
[   32.725510]  ret_from_fork+0x10/0x20
[   32.725971] 
[   32.726218] Allocated by task 267:
[   32.726359]  kasan_save_stack+0x3c/0x68
[   32.726406]  kasan_save_track+0x20/0x40
[   32.726459]  kasan_save_alloc_info+0x40/0x58
[   32.726615]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.726805]  remove_element+0x130/0x1f8
[   32.726848]  mempool_alloc_preallocated+0x58/0xc0
[   32.726909]  mempool_double_free_helper+0x94/0x2e8
[   32.727012]  mempool_kmalloc_double_free+0xc0/0x118
[   32.727055]  kunit_try_run_case+0x170/0x3f0
[   32.727091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.727139]  kthread+0x328/0x630
[   32.727184]  ret_from_fork+0x10/0x20
[   32.727243] 
[   32.727262] Freed by task 267:
[   32.727589]  kasan_save_stack+0x3c/0x68
[   32.727639]  kasan_save_track+0x20/0x40
[   32.727961]  kasan_save_free_info+0x4c/0x78
[   32.728143]  __kasan_mempool_poison_object+0xc0/0x150
[   32.728197]  mempool_free+0x28c/0x328
[   32.728232]  mempool_double_free_helper+0x100/0x2e8
[   32.728301]  mempool_kmalloc_double_free+0xc0/0x118
[   32.728383]  kunit_try_run_case+0x170/0x3f0
[   32.728447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.728490]  kthread+0x328/0x630
[   32.728522]  ret_from_fork+0x10/0x20
[   32.728560] 
[   32.728580] The buggy address belongs to the object at fff00000c9147e00
[   32.728580]  which belongs to the cache kmalloc-128 of size 128
[   32.728642] The buggy address is located 0 bytes inside of
[   32.728642]  128-byte region [fff00000c9147e00, fff00000c9147e80)
[   32.728711] 
[   32.728733] The buggy address belongs to the physical page:
[   32.728766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147
[   32.729230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.729285] page_type: f5(slab)
[   32.729326] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   32.729682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.729797] page dumped because: kasan: bad access detected
[   32.729887] 
[   32.729911] Memory state around the buggy address:
[   32.729945]  fff00000c9147d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.729988]  fff00000c9147d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.730029] >fff00000c9147e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.730170]                    ^
[   32.730204]  fff00000c9147e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.730366]  fff00000c9147f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.730473] ==================================================================

[   25.727541] ==================================================================
[   25.729012] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.729266] Free of addr ffff888106228000 by task kunit_try_catch/285
[   25.729468] 
[   25.729571] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.729658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.729673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.729699] Call Trace:
[   25.729714]  <TASK>
[   25.729736]  dump_stack_lvl+0x73/0xb0
[   25.729772]  print_report+0xd1/0x610
[   25.729800]  ? __virt_addr_valid+0x1db/0x2d0
[   25.729831]  ? kasan_addr_to_slab+0x11/0xa0
[   25.729857]  ? mempool_double_free_helper+0x184/0x370
[   25.729946]  kasan_report_invalid_free+0x10a/0x130
[   25.729990]  ? mempool_double_free_helper+0x184/0x370
[   25.730024]  ? mempool_double_free_helper+0x184/0x370
[   25.730052]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   25.730081]  mempool_free+0x2ec/0x380
[   25.730116]  mempool_double_free_helper+0x184/0x370
[   25.730145]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.730175]  ? dequeue_entities+0x23f/0x1630
[   25.730206]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.730251]  ? finish_task_switch.isra.0+0x153/0x700
[   25.730283]  mempool_kmalloc_large_double_free+0xed/0x140
[   25.730314]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   25.730348]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.730376]  ? __pfx_mempool_kfree+0x10/0x10
[   25.730407]  ? __pfx_read_tsc+0x10/0x10
[   25.730435]  ? ktime_get_ts64+0x86/0x230
[   25.730480]  kunit_try_run_case+0x1a5/0x480
[   25.730550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.730639]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.730667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.730695]  ? __kthread_parkme+0x82/0x180
[   25.730720]  ? preempt_count_sub+0x50/0x80
[   25.730749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.730778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.730809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.730841]  kthread+0x337/0x6f0
[   25.730866]  ? trace_preempt_on+0x20/0xc0
[   25.730896]  ? __pfx_kthread+0x10/0x10
[   25.730922]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.730951]  ? calculate_sigpending+0x7b/0xa0
[   25.730981]  ? __pfx_kthread+0x10/0x10
[   25.731007]  ret_from_fork+0x116/0x1d0
[   25.731031]  ? __pfx_kthread+0x10/0x10
[   25.731057]  ret_from_fork_asm+0x1a/0x30
[   25.731098]  </TASK>
[   25.731112] 
[   25.749892] The buggy address belongs to the physical page:
[   25.750098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106228
[   25.750354] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.751179] flags: 0x200000000000040(head|node=0|zone=2)
[   25.751791] page_type: f8(unknown)
[   25.752205] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.753047] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.753751] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.754601] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.755245] head: 0200000000000002 ffffea0004188a01 00000000ffffffff 00000000ffffffff
[   25.755809] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.756266] page dumped because: kasan: bad access detected
[   25.756440] 
[   25.756507] Memory state around the buggy address:
[   25.756698]  ffff888106227f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.757376]  ffff888106227f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.758115] >ffff888106228000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.758515]                    ^
[   25.758921]  ffff888106228080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.759573]  ffff888106228100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.759811] ==================================================================
[   25.689391] ==================================================================
[   25.690188] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.690789] Free of addr ffff8881060ab000 by task kunit_try_catch/283
[   25.691378] 
[   25.691496] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.691564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.692607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.692638] Call Trace:
[   25.692654]  <TASK>
[   25.692677]  dump_stack_lvl+0x73/0xb0
[   25.692714]  print_report+0xd1/0x610
[   25.692739]  ? __virt_addr_valid+0x1db/0x2d0
[   25.692766]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.692792]  ? mempool_double_free_helper+0x184/0x370
[   25.692817]  kasan_report_invalid_free+0x10a/0x130
[   25.692843]  ? mempool_double_free_helper+0x184/0x370
[   25.692870]  ? mempool_double_free_helper+0x184/0x370
[   25.692892]  ? mempool_double_free_helper+0x184/0x370
[   25.692915]  check_slab_allocation+0x101/0x130
[   25.692937]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.692962]  mempool_free+0x2ec/0x380
[   25.692989]  mempool_double_free_helper+0x184/0x370
[   25.693013]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.693037]  ? dequeue_entities+0x23f/0x1630
[   25.693062]  ? __kasan_check_write+0x18/0x20
[   25.693086]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.693315]  ? finish_task_switch.isra.0+0x153/0x700
[   25.693343]  mempool_kmalloc_double_free+0xed/0x140
[   25.693368]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   25.693395]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.693418]  ? __pfx_mempool_kfree+0x10/0x10
[   25.693442]  ? __pfx_read_tsc+0x10/0x10
[   25.693465]  ? ktime_get_ts64+0x86/0x230
[   25.693491]  kunit_try_run_case+0x1a5/0x480
[   25.693517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.693553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.693576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.693600]  ? __kthread_parkme+0x82/0x180
[   25.693633]  ? preempt_count_sub+0x50/0x80
[   25.693679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.693703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.693730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.693757]  kthread+0x337/0x6f0
[   25.693776]  ? trace_preempt_on+0x20/0xc0
[   25.693801]  ? __pfx_kthread+0x10/0x10
[   25.693822]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.693848]  ? calculate_sigpending+0x7b/0xa0
[   25.693873]  ? __pfx_kthread+0x10/0x10
[   25.693895]  ret_from_fork+0x116/0x1d0
[   25.693915]  ? __pfx_kthread+0x10/0x10
[   25.693935]  ret_from_fork_asm+0x1a/0x30
[   25.693969]  </TASK>
[   25.693982] 
[   25.709722] Allocated by task 283:
[   25.709937]  kasan_save_stack+0x45/0x70
[   25.710114]  kasan_save_track+0x18/0x40
[   25.710248]  kasan_save_alloc_info+0x3b/0x50
[   25.710393]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.710629]  remove_element+0x11e/0x190
[   25.710842]  mempool_alloc_preallocated+0x4d/0x90
[   25.710997]  mempool_double_free_helper+0x8a/0x370
[   25.711406]  mempool_kmalloc_double_free+0xed/0x140
[   25.711882]  kunit_try_run_case+0x1a5/0x480
[   25.712412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.712979]  kthread+0x337/0x6f0
[   25.713166]  ret_from_fork+0x116/0x1d0
[   25.713302]  ret_from_fork_asm+0x1a/0x30
[   25.713440] 
[   25.713507] Freed by task 283:
[   25.713994]  kasan_save_stack+0x45/0x70
[   25.714459]  kasan_save_track+0x18/0x40
[   25.714830]  kasan_save_free_info+0x3f/0x60
[   25.715267]  __kasan_mempool_poison_object+0x131/0x1d0
[   25.715853]  mempool_free+0x2ec/0x380
[   25.716209]  mempool_double_free_helper+0x109/0x370
[   25.716695]  mempool_kmalloc_double_free+0xed/0x140
[   25.716893]  kunit_try_run_case+0x1a5/0x480
[   25.717037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.717206]  kthread+0x337/0x6f0
[   25.717319]  ret_from_fork+0x116/0x1d0
[   25.717447]  ret_from_fork_asm+0x1a/0x30
[   25.717605] 
[   25.717690] The buggy address belongs to the object at ffff8881060ab000
[   25.717690]  which belongs to the cache kmalloc-128 of size 128
[   25.718418] The buggy address is located 0 bytes inside of
[   25.718418]  128-byte region [ffff8881060ab000, ffff8881060ab080)
[   25.718966] 
[   25.719068] The buggy address belongs to the physical page:
[   25.719256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ab
[   25.719561] flags: 0x200000000000000(node=0|zone=2)
[   25.719728] page_type: f5(slab)
[   25.719910] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.720243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.720555] page dumped because: kasan: bad access detected
[   25.721047] 
[   25.721131] Memory state around the buggy address:
[   25.721352]  ffff8881060aaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.721720]  ffff8881060aaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.721986] >ffff8881060ab000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.722241]                    ^
[   25.722401]  ffff8881060ab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.722699]  ffff8881060ab100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.723002] ==================================================================
[   25.764043] ==================================================================
[   25.764601] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.764937] Free of addr ffff888106128000 by task kunit_try_catch/287
[   25.765222] 
[   25.765315] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.765368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.765381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.765404] Call Trace:
[   25.765419]  <TASK>
[   25.765439]  dump_stack_lvl+0x73/0xb0
[   25.765471]  print_report+0xd1/0x610
[   25.765495]  ? __virt_addr_valid+0x1db/0x2d0
[   25.765971]  ? kasan_addr_to_slab+0x11/0xa0
[   25.766008]  ? mempool_double_free_helper+0x184/0x370
[   25.766037]  kasan_report_invalid_free+0x10a/0x130
[   25.766066]  ? mempool_double_free_helper+0x184/0x370
[   25.766093]  ? mempool_double_free_helper+0x184/0x370
[   25.766116]  __kasan_mempool_poison_pages+0x115/0x130
[   25.766141]  mempool_free+0x290/0x380
[   25.766170]  mempool_double_free_helper+0x184/0x370
[   25.766194]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.766219]  ? dequeue_entities+0x23f/0x1630
[   25.766244]  ? __kasan_check_write+0x18/0x20
[   25.766268]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.766290]  ? finish_task_switch.isra.0+0x153/0x700
[   25.766318]  mempool_page_alloc_double_free+0xe8/0x140
[   25.766343]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.766371]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.766394]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.766420]  ? __pfx_read_tsc+0x10/0x10
[   25.766443]  ? ktime_get_ts64+0x86/0x230
[   25.766478]  kunit_try_run_case+0x1a5/0x480
[   25.766505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.766541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.766589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.766647]  ? __kthread_parkme+0x82/0x180
[   25.766668]  ? preempt_count_sub+0x50/0x80
[   25.766692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.766715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.766741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.766768]  kthread+0x337/0x6f0
[   25.766787]  ? trace_preempt_on+0x20/0xc0
[   25.766812]  ? __pfx_kthread+0x10/0x10
[   25.766835]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.766861]  ? calculate_sigpending+0x7b/0xa0
[   25.766886]  ? __pfx_kthread+0x10/0x10
[   25.766908]  ret_from_fork+0x116/0x1d0
[   25.766927]  ? __pfx_kthread+0x10/0x10
[   25.766948]  ret_from_fork_asm+0x1a/0x30
[   25.766981]  </TASK>
[   25.766994] 
[   25.779290] The buggy address belongs to the physical page:
[   25.779818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106128
[   25.780177] flags: 0x200000000000000(node=0|zone=2)
[   25.780636] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.781081] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.781489] page dumped because: kasan: bad access detected
[   25.781981] 
[   25.782128] Memory state around the buggy address:
[   25.782547]  ffff888106127f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.782954]  ffff888106127f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.783342] >ffff888106128000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.783824]                    ^
[   25.783997]  ffff888106128080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.784507]  ffff888106128100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.784958] ==================================================================