Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   37.968259] ==================================================================
[   37.978364] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.985479] Free of addr ffff000803330000 by task kunit_try_catch/286
[   37.991902] 
[   37.993386] CPU: 7 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.993442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.993457] Hardware name: WinLink E850-96 board (DT)
[   37.993481] Call trace:
[   37.993497]  show_stack+0x20/0x38 (C)
[   37.993532]  dump_stack_lvl+0x8c/0xd0
[   37.993570]  print_report+0x118/0x608
[   37.993603]  kasan_report_invalid_free+0xc0/0xe8
[   37.993635]  __kasan_mempool_poison_object+0x14c/0x150
[   37.993666]  mempool_free+0x28c/0x328
[   37.993703]  mempool_double_free_helper+0x150/0x2e8
[   37.993740]  mempool_kmalloc_large_double_free+0xc0/0x118
[   37.993779]  kunit_try_run_case+0x170/0x3f0
[   37.993818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.993856]  kthread+0x328/0x630
[   37.993892]  ret_from_fork+0x10/0x20
[   37.993929] 
[   38.067337] The buggy address belongs to the physical page:
[   38.072894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   38.080878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.088518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.095460] page_type: f8(unknown)
[   38.098858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.106576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.114302] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.122114] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.129927] head: 0bfffe0000000002 fffffdffe00ccc01 00000000ffffffff 00000000ffffffff
[   38.137740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.145544] page dumped because: kasan: bad access detected
[   38.151101] 
[   38.152577] Memory state around the buggy address:
[   38.157358]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.164561]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.171763] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.178964]                    ^
[   38.182180]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.189384]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.196587] ==================================================================
[   37.594678] ==================================================================
[   37.604324] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.611439] Free of addr ffff000800dad400 by task kunit_try_catch/284
[   37.617861] 
[   37.619350] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.619406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.619423] Hardware name: WinLink E850-96 board (DT)
[   37.619444] Call trace:
[   37.619460]  show_stack+0x20/0x38 (C)
[   37.619499]  dump_stack_lvl+0x8c/0xd0
[   37.619539]  print_report+0x118/0x608
[   37.619572]  kasan_report_invalid_free+0xc0/0xe8
[   37.619604]  check_slab_allocation+0xd4/0x108
[   37.619636]  __kasan_mempool_poison_object+0x78/0x150
[   37.619672]  mempool_free+0x28c/0x328
[   37.619708]  mempool_double_free_helper+0x150/0x2e8
[   37.619751]  mempool_kmalloc_double_free+0xc0/0x118
[   37.619787]  kunit_try_run_case+0x170/0x3f0
[   37.619823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.619863]  kthread+0x328/0x630
[   37.619901]  ret_from_fork+0x10/0x20
[   37.619937] 
[   37.697028] Allocated by task 284:
[   37.700417]  kasan_save_stack+0x3c/0x68
[   37.704231]  kasan_save_track+0x20/0x40
[   37.708051]  kasan_save_alloc_info+0x40/0x58
[   37.712305]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.717599]  remove_element+0x130/0x1f8
[   37.721419]  mempool_alloc_preallocated+0x58/0xc0
[   37.726106]  mempool_double_free_helper+0x94/0x2e8
[   37.730880]  mempool_kmalloc_double_free+0xc0/0x118
[   37.735743]  kunit_try_run_case+0x170/0x3f0
[   37.739908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.745377]  kthread+0x328/0x630
[   37.748588]  ret_from_fork+0x10/0x20
[   37.752147] 
[   37.753624] Freed by task 284:
[   37.756663]  kasan_save_stack+0x3c/0x68
[   37.760481]  kasan_save_track+0x20/0x40
[   37.764300]  kasan_save_free_info+0x4c/0x78
[   37.768467]  __kasan_mempool_poison_object+0xc0/0x150
[   37.773501]  mempool_free+0x28c/0x328
[   37.777147]  mempool_double_free_helper+0x100/0x2e8
[   37.782008]  mempool_kmalloc_double_free+0xc0/0x118
[   37.786869]  kunit_try_run_case+0x170/0x3f0
[   37.791036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.796505]  kthread+0x328/0x630
[   37.799716]  ret_from_fork+0x10/0x20
[   37.803275] 
[   37.804752] The buggy address belongs to the object at ffff000800dad400
[   37.804752]  which belongs to the cache kmalloc-128 of size 128
[   37.817254] The buggy address is located 0 bytes inside of
[   37.817254]  128-byte region [ffff000800dad400, ffff000800dad480)
[   37.828796] 
[   37.830276] The buggy address belongs to the physical page:
[   37.835832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   37.843815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.851455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.858397] page_type: f5(slab)
[   37.861536] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.869253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.876980] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.884791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.892604] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   37.900416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.908221] page dumped because: kasan: bad access detected
[   37.913778] 
[   37.915254] Memory state around the buggy address:
[   37.920036]  ffff000800dad300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.927240]  ffff000800dad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.934442] >ffff000800dad400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.941641]                    ^
[   37.944857]  ffff000800dad480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.952062]  ffff000800dad500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.959264] ==================================================================
[   38.205655] ==================================================================
[   38.216208] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.223324] Free of addr ffff000803330000 by task kunit_try_catch/288
[   38.229746] 
[   38.231232] CPU: 7 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   38.231290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.231306] Hardware name: WinLink E850-96 board (DT)
[   38.231328] Call trace:
[   38.231342]  show_stack+0x20/0x38 (C)
[   38.231380]  dump_stack_lvl+0x8c/0xd0
[   38.231417]  print_report+0x118/0x608
[   38.231451]  kasan_report_invalid_free+0xc0/0xe8
[   38.231486]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.231519]  mempool_free+0x24c/0x328
[   38.231555]  mempool_double_free_helper+0x150/0x2e8
[   38.231592]  mempool_page_alloc_double_free+0xbc/0x118
[   38.231625]  kunit_try_run_case+0x170/0x3f0
[   38.231663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.231701]  kthread+0x328/0x630
[   38.231737]  ret_from_fork+0x10/0x20
[   38.231773] 
[   38.304659] The buggy address belongs to the physical page:
[   38.310217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   38.318200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.324723] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.332441] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.340159] page dumped because: kasan: bad access detected
[   38.345716] 
[   38.347192] Memory state around the buggy address:
[   38.351973]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.359175]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.366380] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.373579]                    ^
[   38.376795]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.383999]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.391202] ==================================================================

[   20.125112] ==================================================================
[   20.125181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.125241] Free of addr fff00000c791d500 by task kunit_try_catch/237
[   20.125284] 
[   20.125317] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.125403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.125432] Hardware name: linux,dummy-virt (DT)
[   20.125464] Call trace:
[   20.125487]  show_stack+0x20/0x38 (C)
[   20.125535]  dump_stack_lvl+0x8c/0xd0
[   20.125584]  print_report+0x118/0x608
[   20.125631]  kasan_report_invalid_free+0xc0/0xe8
[   20.125682]  check_slab_allocation+0xd4/0x108
[   20.125728]  __kasan_mempool_poison_object+0x78/0x150
[   20.125779]  mempool_free+0x28c/0x328
[   20.125829]  mempool_double_free_helper+0x150/0x2e8
[   20.125895]  mempool_kmalloc_double_free+0xc0/0x118
[   20.125947]  kunit_try_run_case+0x170/0x3f0
[   20.125997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.126052]  kthread+0x328/0x630
[   20.126097]  ret_from_fork+0x10/0x20
[   20.126144] 
[   20.126164] Allocated by task 237:
[   20.126191]  kasan_save_stack+0x3c/0x68
[   20.126231]  kasan_save_track+0x20/0x40
[   20.126266]  kasan_save_alloc_info+0x40/0x58
[   20.126306]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.126348]  remove_element+0x130/0x1f8
[   20.126385]  mempool_alloc_preallocated+0x58/0xc0
[   20.126427]  mempool_double_free_helper+0x94/0x2e8
[   20.126469]  mempool_kmalloc_double_free+0xc0/0x118
[   20.126510]  kunit_try_run_case+0x170/0x3f0
[   20.126553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.126596]  kthread+0x328/0x630
[   20.126632]  ret_from_fork+0x10/0x20
[   20.126668] 
[   20.126685] Freed by task 237:
[   20.126712]  kasan_save_stack+0x3c/0x68
[   20.126747]  kasan_save_track+0x20/0x40
[   20.126783]  kasan_save_free_info+0x4c/0x78
[   20.126823]  __kasan_mempool_poison_object+0xc0/0x150
[   20.126896]  mempool_free+0x28c/0x328
[   20.126935]  mempool_double_free_helper+0x100/0x2e8
[   20.126977]  mempool_kmalloc_double_free+0xc0/0x118
[   20.127019]  kunit_try_run_case+0x170/0x3f0
[   20.127058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.127102]  kthread+0x328/0x630
[   20.127136]  ret_from_fork+0x10/0x20
[   20.127178] 
[   20.127196] The buggy address belongs to the object at fff00000c791d500
[   20.127196]  which belongs to the cache kmalloc-128 of size 128
[   20.127257] The buggy address is located 0 bytes inside of
[   20.127257]  128-byte region [fff00000c791d500, fff00000c791d580)
[   20.127317] 
[   20.127336] The buggy address belongs to the physical page:
[   20.127366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.127421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.127470] page_type: f5(slab)
[   20.127511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.127564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.127607] page dumped because: kasan: bad access detected
[   20.127639] 
[   20.127656] Memory state around the buggy address:
[   20.127686]  fff00000c791d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.127731]  fff00000c791d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.127776] >fff00000c791d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.127819]                    ^
[   20.127845]  fff00000c791d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.127926]  fff00000c791d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.127989] ==================================================================
[   20.184788] ==================================================================
[   20.185330] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.185995] Free of addr fff00000c795c000 by task kunit_try_catch/241
[   20.186045] 
[   20.186082] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.186167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.186196] Hardware name: linux,dummy-virt (DT)
[   20.187754] Call trace:
[   20.188049]  show_stack+0x20/0x38 (C)
[   20.188625]  dump_stack_lvl+0x8c/0xd0
[   20.188873]  print_report+0x118/0x608
[   20.188922]  kasan_report_invalid_free+0xc0/0xe8
[   20.188971]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.189021]  mempool_free+0x24c/0x328
[   20.190339]  mempool_double_free_helper+0x150/0x2e8
[   20.190409]  mempool_page_alloc_double_free+0xbc/0x118
[   20.190460]  kunit_try_run_case+0x170/0x3f0
[   20.191659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.191862]  kthread+0x328/0x630
[   20.192364]  ret_from_fork+0x10/0x20
[   20.192776] 
[   20.193317] The buggy address belongs to the physical page:
[   20.193393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.194021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.194459] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.194762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.195044] page dumped because: kasan: bad access detected
[   20.195081] 
[   20.195099] Memory state around the buggy address:
[   20.195623]  fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.195678]  fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.196240] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.196439]                    ^
[   20.197006]  fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.197076]  fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.197119] ==================================================================
[   20.154959] ==================================================================
[   20.155045] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.155141] Free of addr fff00000c795c000 by task kunit_try_catch/239
[   20.155372] 
[   20.155679] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.155944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.156007] Hardware name: linux,dummy-virt (DT)
[   20.156059] Call trace:
[   20.156223]  show_stack+0x20/0x38 (C)
[   20.156374]  dump_stack_lvl+0x8c/0xd0
[   20.156423]  print_report+0x118/0x608
[   20.156469]  kasan_report_invalid_free+0xc0/0xe8
[   20.156520]  __kasan_mempool_poison_object+0x14c/0x150
[   20.156872]  mempool_free+0x28c/0x328
[   20.157267]  mempool_double_free_helper+0x150/0x2e8
[   20.157385]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.157666]  kunit_try_run_case+0x170/0x3f0
[   20.158240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.158635]  kthread+0x328/0x630
[   20.158741]  ret_from_fork+0x10/0x20
[   20.159306] 
[   20.159430] The buggy address belongs to the physical page:
[   20.159634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.160022] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.160364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.160425] page_type: f8(unknown)
[   20.160665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.160729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.161057] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.161119] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.161470] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff
[   20.162182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.162261] page dumped because: kasan: bad access detected
[   20.162573] 
[   20.162598] Memory state around the buggy address:
[   20.162635]  fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.162688]  fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.162734] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.162776]                    ^
[   20.163412]  fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.163471]  fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.163514] ==================================================================

[   12.601269] ==================================================================
[   12.602498] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.602767] Free of addr ffff888103a04000 by task kunit_try_catch/256
[   12.603210] 
[   12.603340] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.603533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.603591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.603614] Call Trace:
[   12.603626]  <TASK>
[   12.603645]  dump_stack_lvl+0x73/0xb0
[   12.603688]  print_report+0xd1/0x650
[   12.603712]  ? __virt_addr_valid+0x1db/0x2d0
[   12.603736]  ? kasan_addr_to_slab+0x11/0xa0
[   12.603785]  ? mempool_double_free_helper+0x184/0x370
[   12.603811]  kasan_report_invalid_free+0x10a/0x130
[   12.603836]  ? mempool_double_free_helper+0x184/0x370
[   12.603931]  ? mempool_double_free_helper+0x184/0x370
[   12.603954]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   12.603979]  mempool_free+0x2ec/0x380
[   12.604025]  mempool_double_free_helper+0x184/0x370
[   12.604049]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.604088]  ? dequeue_entities+0x852/0x1740
[   12.604122]  ? finish_task_switch.isra.0+0x153/0x700
[   12.604149]  mempool_kmalloc_large_double_free+0xed/0x140
[   12.604173]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   12.604211]  ? dequeue_task_fair+0x166/0x4e0
[   12.604232]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.604257]  ? __pfx_mempool_kfree+0x10/0x10
[   12.604290]  ? __pfx_read_tsc+0x10/0x10
[   12.604311]  ? ktime_get_ts64+0x86/0x230
[   12.604337]  kunit_try_run_case+0x1a5/0x480
[   12.604363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.604410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.604433]  ? __kthread_parkme+0x82/0x180
[   12.604455]  ? preempt_count_sub+0x50/0x80
[   12.604480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.604526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.604548]  kthread+0x337/0x6f0
[   12.604576]  ? trace_preempt_on+0x20/0xc0
[   12.604600]  ? __pfx_kthread+0x10/0x10
[   12.604617]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.604639]  ? calculate_sigpending+0x7b/0xa0
[   12.604661]  ? __pfx_kthread+0x10/0x10
[   12.604678]  ret_from_fork+0x41/0x80
[   12.604699]  ? __pfx_kthread+0x10/0x10
[   12.604788]  ret_from_fork_asm+0x1a/0x30
[   12.604825]  </TASK>
[   12.604836] 
[   12.615444] The buggy address belongs to the physical page:
[   12.615754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a04
[   12.616452] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.616875] flags: 0x200000000000040(head|node=0|zone=2)
[   12.617342] page_type: f8(unknown)
[   12.617550] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.618036] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.618414] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.618847] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.619306] head: 0200000000000002 ffffea00040e8101 00000000ffffffff 00000000ffffffff
[   12.619692] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.620339] page dumped because: kasan: bad access detected
[   12.620610] 
[   12.620721] Memory state around the buggy address:
[   12.621107]  ffff888103a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.621482]  ffff888103a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.621975] >ffff888103a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.622361]                    ^
[   12.622528]  ffff888103a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.622937]  ffff888103a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.623322] ==================================================================
[   12.627340] ==================================================================
[   12.627974] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.628464] Free of addr ffff8881039c4000 by task kunit_try_catch/258
[   12.628767] 
[   12.628884] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.628945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.628958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.629035] Call Trace:
[   12.629062]  <TASK>
[   12.629083]  dump_stack_lvl+0x73/0xb0
[   12.629114]  print_report+0xd1/0x650
[   12.629138]  ? __virt_addr_valid+0x1db/0x2d0
[   12.629163]  ? kasan_addr_to_slab+0x11/0xa0
[   12.629216]  ? mempool_double_free_helper+0x184/0x370
[   12.629241]  kasan_report_invalid_free+0x10a/0x130
[   12.629277]  ? mempool_double_free_helper+0x184/0x370
[   12.629303]  ? mempool_double_free_helper+0x184/0x370
[   12.629352]  __kasan_mempool_poison_pages+0x115/0x130
[   12.629377]  mempool_free+0x290/0x380
[   12.629403]  mempool_double_free_helper+0x184/0x370
[   12.629438]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.629461]  ? dequeue_entities+0x852/0x1740
[   12.629487]  ? finish_task_switch.isra.0+0x153/0x700
[   12.629514]  mempool_page_alloc_double_free+0xe8/0x140
[   12.629535]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   12.629556]  ? dequeue_task_fair+0x166/0x4e0
[   12.629578]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   12.629598]  ? __pfx_mempool_free_pages+0x10/0x10
[   12.629620]  ? __pfx_read_tsc+0x10/0x10
[   12.629641]  ? ktime_get_ts64+0x86/0x230
[   12.629667]  kunit_try_run_case+0x1a5/0x480
[   12.629694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.629731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.629756]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.629779]  ? __kthread_parkme+0x82/0x180
[   12.629802]  ? preempt_count_sub+0x50/0x80
[   12.629826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.629849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.629871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.629894]  kthread+0x337/0x6f0
[   12.629910]  ? trace_preempt_on+0x20/0xc0
[   12.629944]  ? __pfx_kthread+0x10/0x10
[   12.629961]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.629983]  ? calculate_sigpending+0x7b/0xa0
[   12.630006]  ? __pfx_kthread+0x10/0x10
[   12.630023]  ret_from_fork+0x41/0x80
[   12.630044]  ? __pfx_kthread+0x10/0x10
[   12.630061]  ret_from_fork_asm+0x1a/0x30
[   12.630093]  </TASK>
[   12.630105] 
[   12.639861] The buggy address belongs to the physical page:
[   12.640179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c4
[   12.640547] flags: 0x200000000000000(node=0|zone=2)
[   12.640818] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   12.641195] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   12.641503] page dumped because: kasan: bad access detected
[   12.641787] 
[   12.641855] Memory state around the buggy address:
[   12.642020]  ffff8881039c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.642374]  ffff8881039c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.642689] >ffff8881039c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.643038]                    ^
[   12.643158]  ffff8881039c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.643828]  ffff8881039c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.644151] ==================================================================
[   12.572408] ==================================================================
[   12.573038] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.573472] Free of addr ffff888102f60c00 by task kunit_try_catch/254
[   12.573764] 
[   12.573945] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.573997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.574008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.574030] Call Trace:
[   12.574043]  <TASK>
[   12.574063]  dump_stack_lvl+0x73/0xb0
[   12.574092]  print_report+0xd1/0x650
[   12.574116]  ? __virt_addr_valid+0x1db/0x2d0
[   12.574142]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.574165]  ? mempool_double_free_helper+0x184/0x370
[   12.574190]  kasan_report_invalid_free+0x10a/0x130
[   12.574215]  ? mempool_double_free_helper+0x184/0x370
[   12.574241]  ? mempool_double_free_helper+0x184/0x370
[   12.574263]  ? mempool_double_free_helper+0x184/0x370
[   12.574286]  check_slab_allocation+0x101/0x130
[   12.574308]  __kasan_mempool_poison_object+0x91/0x1d0
[   12.574333]  mempool_free+0x2ec/0x380
[   12.574358]  mempool_double_free_helper+0x184/0x370
[   12.574383]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.574407]  ? dequeue_entities+0x852/0x1740
[   12.574433]  ? finish_task_switch.isra.0+0x153/0x700
[   12.574460]  mempool_kmalloc_double_free+0xed/0x140
[   12.574487]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   12.574510]  ? dequeue_task_fair+0x166/0x4e0
[   12.574532]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.574552]  ? __pfx_mempool_kfree+0x10/0x10
[   12.574584]  ? __pfx_read_tsc+0x10/0x10
[   12.574605]  ? ktime_get_ts64+0x86/0x230
[   12.574632]  kunit_try_run_case+0x1a5/0x480
[   12.574673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.574721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.574795]  ? __kthread_parkme+0x82/0x180
[   12.574822]  ? preempt_count_sub+0x50/0x80
[   12.574847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.574870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.574894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.574927]  kthread+0x337/0x6f0
[   12.574944]  ? trace_preempt_on+0x20/0xc0
[   12.574969]  ? __pfx_kthread+0x10/0x10
[   12.574987]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.575009]  ? calculate_sigpending+0x7b/0xa0
[   12.575031]  ? __pfx_kthread+0x10/0x10
[   12.575049]  ret_from_fork+0x41/0x80
[   12.575070]  ? __pfx_kthread+0x10/0x10
[   12.575088]  ret_from_fork_asm+0x1a/0x30
[   12.575119]  </TASK>
[   12.575131] 
[   12.584749] Allocated by task 254:
[   12.584895]  kasan_save_stack+0x45/0x70
[   12.585061]  kasan_save_track+0x18/0x40
[   12.585460]  kasan_save_alloc_info+0x3b/0x50
[   12.585897]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.586166]  remove_element+0x11e/0x190
[   12.586361]  mempool_alloc_preallocated+0x4d/0x90
[   12.586533]  mempool_double_free_helper+0x8a/0x370
[   12.586828]  mempool_kmalloc_double_free+0xed/0x140
[   12.587091]  kunit_try_run_case+0x1a5/0x480
[   12.587242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.587491]  kthread+0x337/0x6f0
[   12.587666]  ret_from_fork+0x41/0x80
[   12.587955]  ret_from_fork_asm+0x1a/0x30
[   12.588102] 
[   12.588172] Freed by task 254:
[   12.588291]  kasan_save_stack+0x45/0x70
[   12.588483]  kasan_save_track+0x18/0x40
[   12.588841]  kasan_save_free_info+0x3f/0x60
[   12.589195]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.589543]  mempool_free+0x2ec/0x380
[   12.589751]  mempool_double_free_helper+0x109/0x370
[   12.590033]  mempool_kmalloc_double_free+0xed/0x140
[   12.590241]  kunit_try_run_case+0x1a5/0x480
[   12.590387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.590602]  kthread+0x337/0x6f0
[   12.590764]  ret_from_fork+0x41/0x80
[   12.591020]  ret_from_fork_asm+0x1a/0x30
[   12.591218] 
[   12.591315] The buggy address belongs to the object at ffff888102f60c00
[   12.591315]  which belongs to the cache kmalloc-128 of size 128
[   12.592058] The buggy address is located 0 bytes inside of
[   12.592058]  128-byte region [ffff888102f60c00, ffff888102f60c80)
[   12.592540] 
[   12.592636] The buggy address belongs to the physical page:
[   12.592984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   12.593320] flags: 0x200000000000000(node=0|zone=2)
[   12.593528] page_type: f5(slab)
[   12.593792] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.594322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.594673] page dumped because: kasan: bad access detected
[   12.594978] 
[   12.595048] Memory state around the buggy address:
[   12.595204]  ffff888102f60b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.595541]  ffff888102f60b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.596063] >ffff888102f60c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.596284]                    ^
[   12.596442]  ffff888102f60c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.597027]  ffff888102f60d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.597415] ==================================================================