Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.144506] ==================================================================
[   19.144587] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.144648] Free of addr fff00000c7a04000 by task kunit_try_catch/239
[   19.144691] 
[   19.144729] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.144811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.144838] Hardware name: linux,dummy-virt (DT)
[   19.144887] Call trace:
[   19.144909]  show_stack+0x20/0x38 (C)
[   19.145083]  dump_stack_lvl+0x8c/0xd0
[   19.145200]  print_report+0x118/0x5d0
[   19.145252]  kasan_report_invalid_free+0xc0/0xe8
[   19.145395]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.145448]  mempool_free+0x24c/0x328
[   19.145500]  mempool_double_free_helper+0x150/0x2e8
[   19.145568]  mempool_page_alloc_double_free+0xbc/0x118
[   19.145776]  kunit_try_run_case+0x170/0x3f0
[   19.145854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.146012]  kthread+0x328/0x630
[   19.146136]  ret_from_fork+0x10/0x20
[   19.146228] 
[   19.146250] The buggy address belongs to the physical page:
[   19.146284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a04
[   19.146340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.146597] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.146659] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.146827] page dumped because: kasan: bad access detected
[   19.146872] 
[   19.146891] Memory state around the buggy address:
[   19.146924]  fff00000c7a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.146968]  fff00000c7a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.147202] >fff00000c7a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.147263]                    ^
[   19.147389]  fff00000c7a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.147549]  fff00000c7a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.147711] ==================================================================
[   19.103960] ==================================================================
[   19.104115] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.104360] Free of addr fff00000c78e9400 by task kunit_try_catch/235
[   19.104555] 
[   19.104652] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.104829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.105284] Hardware name: linux,dummy-virt (DT)
[   19.105358] Call trace:
[   19.105419]  show_stack+0x20/0x38 (C)
[   19.105690]  dump_stack_lvl+0x8c/0xd0
[   19.105945]  print_report+0x118/0x5d0
[   19.106043]  kasan_report_invalid_free+0xc0/0xe8
[   19.106241]  check_slab_allocation+0xd4/0x108
[   19.106306]  __kasan_mempool_poison_object+0x78/0x150
[   19.106381]  mempool_free+0x28c/0x328
[   19.106433]  mempool_double_free_helper+0x150/0x2e8
[   19.106516]  mempool_kmalloc_double_free+0xc0/0x118
[   19.106568]  kunit_try_run_case+0x170/0x3f0
[   19.106618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.106686]  kthread+0x328/0x630
[   19.106731]  ret_from_fork+0x10/0x20
[   19.106797] 
[   19.106831] Allocated by task 235:
[   19.106880]  kasan_save_stack+0x3c/0x68
[   19.106938]  kasan_save_track+0x20/0x40
[   19.106977]  kasan_save_alloc_info+0x40/0x58
[   19.107025]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.107070]  remove_element+0x130/0x1f8
[   19.107123]  mempool_alloc_preallocated+0x58/0xc0
[   19.107162]  mempool_double_free_helper+0x94/0x2e8
[   19.107210]  mempool_kmalloc_double_free+0xc0/0x118
[   19.107258]  kunit_try_run_case+0x170/0x3f0
[   19.107467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.107542]  kthread+0x328/0x630
[   19.107577]  ret_from_fork+0x10/0x20
[   19.107900] 
[   19.108104] Freed by task 235:
[   19.108140]  kasan_save_stack+0x3c/0x68
[   19.108553]  kasan_save_track+0x20/0x40
[   19.108643]  kasan_save_free_info+0x4c/0x78
[   19.108687]  __kasan_mempool_poison_object+0xc0/0x150
[   19.108799]  mempool_free+0x28c/0x328
[   19.109260]  mempool_double_free_helper+0x100/0x2e8
[   19.109443]  mempool_kmalloc_double_free+0xc0/0x118
[   19.109530]  kunit_try_run_case+0x170/0x3f0
[   19.109907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.109964]  kthread+0x328/0x630
[   19.110407]  ret_from_fork+0x10/0x20
[   19.110506] 
[   19.110528] The buggy address belongs to the object at fff00000c78e9400
[   19.110528]  which belongs to the cache kmalloc-128 of size 128
[   19.111066] The buggy address is located 0 bytes inside of
[   19.111066]  128-byte region [fff00000c78e9400, fff00000c78e9480)
[   19.111155] 
[   19.111189] The buggy address belongs to the physical page:
[   19.111225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   19.111480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.111672] page_type: f5(slab)
[   19.111946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.112004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.112235] page dumped because: kasan: bad access detected
[   19.112347] 
[   19.112463] Memory state around the buggy address:
[   19.112529]  fff00000c78e9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.113084]  fff00000c78e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.113145] >fff00000c78e9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.113327]                    ^
[   19.113548]  fff00000c78e9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.113760]  fff00000c78e9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.114002] ==================================================================
[   19.130180] ==================================================================
[   19.130456] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.130542] Free of addr fff00000c7a04000 by task kunit_try_catch/237
[   19.130609] 
[   19.130652] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.130740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.130767] Hardware name: linux,dummy-virt (DT)
[   19.131265] Call trace:
[   19.131502]  show_stack+0x20/0x38 (C)
[   19.131568]  dump_stack_lvl+0x8c/0xd0
[   19.131788]  print_report+0x118/0x5d0
[   19.131961]  kasan_report_invalid_free+0xc0/0xe8
[   19.132112]  __kasan_mempool_poison_object+0x14c/0x150
[   19.132331]  mempool_free+0x28c/0x328
[   19.132462]  mempool_double_free_helper+0x150/0x2e8
[   19.132526]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.132882]  kunit_try_run_case+0x170/0x3f0
[   19.133173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.133371]  kthread+0x328/0x630
[   19.133456]  ret_from_fork+0x10/0x20
[   19.133876] 
[   19.133922] The buggy address belongs to the physical page:
[   19.134033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a04
[   19.134141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.134361] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.134440] page_type: f8(unknown)
[   19.134563] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.134616] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.134695] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.134752] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.134817] head: 0bfffe0000000002 ffffc1ffc31e8101 00000000ffffffff 00000000ffffffff
[   19.134878] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.134927] page dumped because: kasan: bad access detected
[   19.134959] 
[   19.134984] Memory state around the buggy address:
[   19.135027]  fff00000c7a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.135086]  fff00000c7a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.135144] >fff00000c7a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.135183]                    ^
[   19.135214]  fff00000c7a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.135280]  fff00000c7a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.135354] ==================================================================

[   18.788028] ==================================================================
[   18.788099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.788491] Free of addr fff00000c7a74000 by task kunit_try_catch/239
[   18.788673] 
[   18.788825] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.788947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.788986] Hardware name: linux,dummy-virt (DT)
[   18.789017] Call trace:
[   18.789043]  show_stack+0x20/0x38 (C)
[   18.789096]  dump_stack_lvl+0x8c/0xd0
[   18.789686]  print_report+0x118/0x5d0
[   18.789917]  kasan_report_invalid_free+0xc0/0xe8
[   18.790018]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.790628]  mempool_free+0x24c/0x328
[   18.790714]  mempool_double_free_helper+0x150/0x2e8
[   18.790928]  mempool_page_alloc_double_free+0xbc/0x118
[   18.791061]  kunit_try_run_case+0x170/0x3f0
[   18.791159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.791433]  kthread+0x328/0x630
[   18.791550]  ret_from_fork+0x10/0x20
[   18.791876] 
[   18.791944] The buggy address belongs to the physical page:
[   18.791997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74
[   18.792068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.792312] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.792564] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.792648] page dumped because: kasan: bad access detected
[   18.792706] 
[   18.792742] Memory state around the buggy address:
[   18.792817]  fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.792951]  fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793002] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793040]                    ^
[   18.793068]  fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793587]  fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793683] ==================================================================
[   18.774265] ==================================================================
[   18.774351] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.774409] Free of addr fff00000c7a74000 by task kunit_try_catch/237
[   18.774451] 
[   18.774499] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.774581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.774611] Hardware name: linux,dummy-virt (DT)
[   18.774644] Call trace:
[   18.774666]  show_stack+0x20/0x38 (C)
[   18.774715]  dump_stack_lvl+0x8c/0xd0
[   18.774774]  print_report+0x118/0x5d0
[   18.774825]  kasan_report_invalid_free+0xc0/0xe8
[   18.774876]  __kasan_mempool_poison_object+0x14c/0x150
[   18.774929]  mempool_free+0x28c/0x328
[   18.774983]  mempool_double_free_helper+0x150/0x2e8
[   18.775033]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.775084]  kunit_try_run_case+0x170/0x3f0
[   18.775131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.775191]  kthread+0x328/0x630
[   18.775234]  ret_from_fork+0x10/0x20
[   18.775283] 
[   18.775303] The buggy address belongs to the physical page:
[   18.775346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74
[   18.775679] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.775935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.776628] page_type: f8(unknown)
[   18.776712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.776765] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.776843] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.777694] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.777777] head: 0bfffe0000000002 ffffc1ffc31e9d01 00000000ffffffff 00000000ffffffff
[   18.777849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.777924] page dumped because: kasan: bad access detected
[   18.777984] 
[   18.778019] Memory state around the buggy address:
[   18.778072]  fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778140]  fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778185] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778539]                    ^
[   18.778740]  fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778817]  fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778893] ==================================================================
[   18.755153] ==================================================================
[   18.755232] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.755295] Free of addr fff00000c7a4e500 by task kunit_try_catch/235
[   18.755349] 
[   18.755652] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.755785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.755826] Hardware name: linux,dummy-virt (DT)
[   18.755865] Call trace:
[   18.755892]  show_stack+0x20/0x38 (C)
[   18.755949]  dump_stack_lvl+0x8c/0xd0
[   18.756217]  print_report+0x118/0x5d0
[   18.756296]  kasan_report_invalid_free+0xc0/0xe8
[   18.756358]  check_slab_allocation+0xd4/0x108
[   18.756740]  __kasan_mempool_poison_object+0x78/0x150
[   18.756829]  mempool_free+0x28c/0x328
[   18.756961]  mempool_double_free_helper+0x150/0x2e8
[   18.757087]  mempool_kmalloc_double_free+0xc0/0x118
[   18.757147]  kunit_try_run_case+0x170/0x3f0
[   18.757496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.757640]  kthread+0x328/0x630
[   18.757716]  ret_from_fork+0x10/0x20
[   18.758069] 
[   18.758124] Allocated by task 235:
[   18.758176]  kasan_save_stack+0x3c/0x68
[   18.758309]  kasan_save_track+0x20/0x40
[   18.758384]  kasan_save_alloc_info+0x40/0x58
[   18.758426]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.758762]  remove_element+0x130/0x1f8
[   18.758834]  mempool_alloc_preallocated+0x58/0xc0
[   18.758932]  mempool_double_free_helper+0x94/0x2e8
[   18.759047]  mempool_kmalloc_double_free+0xc0/0x118
[   18.759106]  kunit_try_run_case+0x170/0x3f0
[   18.759145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.759410]  kthread+0x328/0x630
[   18.759590]  ret_from_fork+0x10/0x20
[   18.759637] 
[   18.759699] Freed by task 235:
[   18.759983]  kasan_save_stack+0x3c/0x68
[   18.760127]  kasan_save_track+0x20/0x40
[   18.760182]  kasan_save_free_info+0x4c/0x78
[   18.760486]  __kasan_mempool_poison_object+0xc0/0x150
[   18.760573]  mempool_free+0x28c/0x328
[   18.760650]  mempool_double_free_helper+0x100/0x2e8
[   18.760993]  mempool_kmalloc_double_free+0xc0/0x118
[   18.761109]  kunit_try_run_case+0x170/0x3f0
[   18.761198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.761314]  kthread+0x328/0x630
[   18.761381]  ret_from_fork+0x10/0x20
[   18.761439] 
[   18.761779] The buggy address belongs to the object at fff00000c7a4e500
[   18.761779]  which belongs to the cache kmalloc-128 of size 128
[   18.761961] The buggy address is located 0 bytes inside of
[   18.761961]  128-byte region [fff00000c7a4e500, fff00000c7a4e580)
[   18.762032] 
[   18.762055] The buggy address belongs to the physical page:
[   18.762088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   18.762433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.762589] page_type: f5(slab)
[   18.762648] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.762743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.762851] page dumped because: kasan: bad access detected
[   18.762917] 
[   18.762958] Memory state around the buggy address:
[   18.763350]  fff00000c7a4e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.763449]  fff00000c7a4e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.763493] >fff00000c7a4e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.763531]                    ^
[   18.763578]  fff00000c7a4e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.763655]  fff00000c7a4e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.763733] ==================================================================

[   18.666489] ==================================================================
[   18.666690] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.666783] Free of addr fff00000c7800000 by task kunit_try_catch/237
[   18.666989] 
[   18.667030] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.667111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.667139] Hardware name: linux,dummy-virt (DT)
[   18.667171] Call trace:
[   18.667193]  show_stack+0x20/0x38 (C)
[   18.667500]  dump_stack_lvl+0x8c/0xd0
[   18.667568]  print_report+0x118/0x5d0
[   18.667693]  kasan_report_invalid_free+0xc0/0xe8
[   18.667816]  __kasan_mempool_poison_object+0x14c/0x150
[   18.667980]  mempool_free+0x28c/0x328
[   18.668065]  mempool_double_free_helper+0x150/0x2e8
[   18.668114]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.668431]  kunit_try_run_case+0x170/0x3f0
[   18.668576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.668787]  kthread+0x328/0x630
[   18.668920]  ret_from_fork+0x10/0x20
[   18.669041] 
[   18.669063] The buggy address belongs to the physical page:
[   18.669243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800
[   18.669406] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.669565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.669675] page_type: f8(unknown)
[   18.669749] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.670080] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.670181] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.670303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.670419] head: 0bfffe0000000002 ffffc1ffc31e0001 00000000ffffffff 00000000ffffffff
[   18.670499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.670745] page dumped because: kasan: bad access detected
[   18.671089] 
[   18.671145] Memory state around the buggy address:
[   18.671218]  fff00000c77fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.671396]  fff00000c77fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.671557] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.671721]                    ^
[   18.671790]  fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.671878]  fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.671995] ==================================================================
[   18.652596] ==================================================================
[   18.652656] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.652853] Free of addr fff00000c7716300 by task kunit_try_catch/235
[   18.652934] 
[   18.653007] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.653088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.653114] Hardware name: linux,dummy-virt (DT)
[   18.653183] Call trace:
[   18.653209]  show_stack+0x20/0x38 (C)
[   18.653264]  dump_stack_lvl+0x8c/0xd0
[   18.653326]  print_report+0x118/0x5d0
[   18.653393]  kasan_report_invalid_free+0xc0/0xe8
[   18.653456]  check_slab_allocation+0xd4/0x108
[   18.653506]  __kasan_mempool_poison_object+0x78/0x150
[   18.653662]  mempool_free+0x28c/0x328
[   18.653725]  mempool_double_free_helper+0x150/0x2e8
[   18.653809]  mempool_kmalloc_double_free+0xc0/0x118
[   18.653882]  kunit_try_run_case+0x170/0x3f0
[   18.653948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.654001]  kthread+0x328/0x630
[   18.654096]  ret_from_fork+0x10/0x20
[   18.654183] 
[   18.654232] Allocated by task 235:
[   18.654264]  kasan_save_stack+0x3c/0x68
[   18.654304]  kasan_save_track+0x20/0x40
[   18.654351]  kasan_save_alloc_info+0x40/0x58
[   18.654390]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.654460]  remove_element+0x130/0x1f8
[   18.654627]  mempool_alloc_preallocated+0x58/0xc0
[   18.654784]  mempool_double_free_helper+0x94/0x2e8
[   18.654901]  mempool_kmalloc_double_free+0xc0/0x118
[   18.655033]  kunit_try_run_case+0x170/0x3f0
[   18.655170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.655299]  kthread+0x328/0x630
[   18.655397]  ret_from_fork+0x10/0x20
[   18.655437] 
[   18.655456] Freed by task 235:
[   18.655484]  kasan_save_stack+0x3c/0x68
[   18.655541]  kasan_save_track+0x20/0x40
[   18.655579]  kasan_save_free_info+0x4c/0x78
[   18.655620]  __kasan_mempool_poison_object+0xc0/0x150
[   18.655661]  mempool_free+0x28c/0x328
[   18.655697]  mempool_double_free_helper+0x100/0x2e8
[   18.655748]  mempool_kmalloc_double_free+0xc0/0x118
[   18.655787]  kunit_try_run_case+0x170/0x3f0
[   18.656009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.656082]  kthread+0x328/0x630
[   18.656162]  ret_from_fork+0x10/0x20
[   18.656273] 
[   18.656362] The buggy address belongs to the object at fff00000c7716300
[   18.656362]  which belongs to the cache kmalloc-128 of size 128
[   18.656475] The buggy address is located 0 bytes inside of
[   18.656475]  128-byte region [fff00000c7716300, fff00000c7716380)
[   18.656542] 
[   18.656564] The buggy address belongs to the physical page:
[   18.656593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716
[   18.656916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.657064] page_type: f5(slab)
[   18.657205] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.657301] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.657393] page dumped because: kasan: bad access detected
[   18.657423] 
[   18.657441] Memory state around the buggy address:
[   18.657782]  fff00000c7716200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.657916]  fff00000c7716280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.657989] >fff00000c7716300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.658117]                    ^
[   18.658177]  fff00000c7716380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.658238]  fff00000c7716400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.658276] ==================================================================
[   18.687920] ==================================================================
[   18.688407] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.688509] Free of addr fff00000c7804000 by task kunit_try_catch/239
[   18.688579] 
[   18.688652] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.688750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.688776] Hardware name: linux,dummy-virt (DT)
[   18.688810] Call trace:
[   18.688839]  show_stack+0x20/0x38 (C)
[   18.688912]  dump_stack_lvl+0x8c/0xd0
[   18.688967]  print_report+0x118/0x5d0
[   18.689032]  kasan_report_invalid_free+0xc0/0xe8
[   18.689082]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.689175]  mempool_free+0x24c/0x328
[   18.689221]  mempool_double_free_helper+0x150/0x2e8
[   18.689342]  mempool_page_alloc_double_free+0xbc/0x118
[   18.689641]  kunit_try_run_case+0x170/0x3f0
[   18.689752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.689875]  kthread+0x328/0x630
[   18.689966]  ret_from_fork+0x10/0x20
[   18.690021] 
[   18.690046] The buggy address belongs to the physical page:
[   18.690085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804
[   18.690167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.690260] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.690367] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.690410] page dumped because: kasan: bad access detected
[   18.690439] 
[   18.690458] Memory state around the buggy address:
[   18.690726]  fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.690835]  fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.690907] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.690972]                    ^
[   18.691033]  fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.691098]  fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.691231] ==================================================================

[   13.879819] ==================================================================
[   13.880536] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.880952] Free of addr ffff8881039f8000 by task kunit_try_catch/254
[   13.881221] 
[   13.881360] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.881406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.881418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.881440] Call Trace:
[   13.881453]  <TASK>
[   13.881469]  dump_stack_lvl+0x73/0xb0
[   13.881499]  print_report+0xd1/0x610
[   13.881522]  ? __virt_addr_valid+0x1db/0x2d0
[   13.881546]  ? kasan_addr_to_slab+0x11/0xa0
[   13.881577]  ? mempool_double_free_helper+0x184/0x370
[   13.881603]  kasan_report_invalid_free+0x10a/0x130
[   13.881640]  ? mempool_double_free_helper+0x184/0x370
[   13.881668]  ? mempool_double_free_helper+0x184/0x370
[   13.881691]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.881770]  mempool_free+0x2ec/0x380
[   13.881796]  mempool_double_free_helper+0x184/0x370
[   13.881831]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.881855]  ? update_load_avg+0x1be/0x21b0
[   13.881878]  ? dequeue_entities+0x27e/0x1740
[   13.881921]  ? finish_task_switch.isra.0+0x153/0x700
[   13.881948]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.881974]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.882013]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.882044]  ? __pfx_mempool_kfree+0x10/0x10
[   13.882070]  ? __pfx_read_tsc+0x10/0x10
[   13.882091]  ? ktime_get_ts64+0x86/0x230
[   13.882126]  kunit_try_run_case+0x1a5/0x480
[   13.882150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.882173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.882198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.882221]  ? __kthread_parkme+0x82/0x180
[   13.882241]  ? preempt_count_sub+0x50/0x80
[   13.882265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.882288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.882312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.882336]  kthread+0x337/0x6f0
[   13.882355]  ? trace_preempt_on+0x20/0xc0
[   13.882379]  ? __pfx_kthread+0x10/0x10
[   13.882399]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.882420]  ? calculate_sigpending+0x7b/0xa0
[   13.882444]  ? __pfx_kthread+0x10/0x10
[   13.882465]  ret_from_fork+0x116/0x1d0
[   13.882483]  ? __pfx_kthread+0x10/0x10
[   13.882503]  ret_from_fork_asm+0x1a/0x30
[   13.882535]  </TASK>
[   13.882545] 
[   13.892576] The buggy address belongs to the physical page:
[   13.892857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f8
[   13.893230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.893464] flags: 0x200000000000040(head|node=0|zone=2)
[   13.893651] page_type: f8(unknown)
[   13.893831] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.894218] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.894707] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.895278] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.896386] head: 0200000000000002 ffffea00040e7e01 00000000ffffffff 00000000ffffffff
[   13.896953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.897271] page dumped because: kasan: bad access detected
[   13.897502] 
[   13.898065] Memory state around the buggy address:
[   13.898375]  ffff8881039f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.898726]  ffff8881039f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.899110] >ffff8881039f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.899400]                    ^
[   13.899992]  ffff8881039f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.900307]  ffff8881039f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.900961] ==================================================================
[   13.849146] ==================================================================
[   13.849682] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.850297] Free of addr ffff888102988b00 by task kunit_try_catch/252
[   13.850575] 
[   13.850757] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.850821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.850833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.850868] Call Trace:
[   13.850880]  <TASK>
[   13.850907]  dump_stack_lvl+0x73/0xb0
[   13.850939]  print_report+0xd1/0x610
[   13.850961]  ? __virt_addr_valid+0x1db/0x2d0
[   13.850986]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.851018]  ? mempool_double_free_helper+0x184/0x370
[   13.851044]  kasan_report_invalid_free+0x10a/0x130
[   13.851069]  ? mempool_double_free_helper+0x184/0x370
[   13.851107]  ? mempool_double_free_helper+0x184/0x370
[   13.851130]  ? mempool_double_free_helper+0x184/0x370
[   13.851153]  check_slab_allocation+0x101/0x130
[   13.851176]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.851201]  mempool_free+0x2ec/0x380
[   13.851229]  mempool_double_free_helper+0x184/0x370
[   13.851253]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.851277]  ? update_load_avg+0x1be/0x21b0
[   13.851314]  ? finish_task_switch.isra.0+0x153/0x700
[   13.851341]  mempool_kmalloc_double_free+0xed/0x140
[   13.851366]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.851404]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.851427]  ? __pfx_mempool_kfree+0x10/0x10
[   13.851452]  ? __pfx_read_tsc+0x10/0x10
[   13.851473]  ? ktime_get_ts64+0x86/0x230
[   13.851499]  kunit_try_run_case+0x1a5/0x480
[   13.851526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.851558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.851584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.851609]  ? __kthread_parkme+0x82/0x180
[   13.851630]  ? preempt_count_sub+0x50/0x80
[   13.851654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.851678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.851702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.851727]  kthread+0x337/0x6f0
[   13.851746]  ? trace_preempt_on+0x20/0xc0
[   13.851771]  ? __pfx_kthread+0x10/0x10
[   13.851791]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.851812]  ? calculate_sigpending+0x7b/0xa0
[   13.851837]  ? __pfx_kthread+0x10/0x10
[   13.851858]  ret_from_fork+0x116/0x1d0
[   13.851876]  ? __pfx_kthread+0x10/0x10
[   13.851904]  ret_from_fork_asm+0x1a/0x30
[   13.851938]  </TASK>
[   13.851948] 
[   13.862128] Allocated by task 252:
[   13.862295]  kasan_save_stack+0x45/0x70
[   13.862528]  kasan_save_track+0x18/0x40
[   13.862751]  kasan_save_alloc_info+0x3b/0x50
[   13.863037]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.863330]  remove_element+0x11e/0x190
[   13.863500]  mempool_alloc_preallocated+0x4d/0x90
[   13.863731]  mempool_double_free_helper+0x8a/0x370
[   13.864009]  mempool_kmalloc_double_free+0xed/0x140
[   13.864270]  kunit_try_run_case+0x1a5/0x480
[   13.864496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.864904]  kthread+0x337/0x6f0
[   13.865230]  ret_from_fork+0x116/0x1d0
[   13.865413]  ret_from_fork_asm+0x1a/0x30
[   13.865695] 
[   13.865786] Freed by task 252:
[   13.865951]  kasan_save_stack+0x45/0x70
[   13.866156]  kasan_save_track+0x18/0x40
[   13.866348]  kasan_save_free_info+0x3f/0x60
[   13.866614]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.866883]  mempool_free+0x2ec/0x380
[   13.867171]  mempool_double_free_helper+0x109/0x370
[   13.867395]  mempool_kmalloc_double_free+0xed/0x140
[   13.867560]  kunit_try_run_case+0x1a5/0x480
[   13.867706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.867882]  kthread+0x337/0x6f0
[   13.868257]  ret_from_fork+0x116/0x1d0
[   13.868498]  ret_from_fork_asm+0x1a/0x30
[   13.868975] 
[   13.869077] The buggy address belongs to the object at ffff888102988b00
[   13.869077]  which belongs to the cache kmalloc-128 of size 128
[   13.869475] The buggy address is located 0 bytes inside of
[   13.869475]  128-byte region [ffff888102988b00, ffff888102988b80)
[   13.869855] 
[   13.869965] The buggy address belongs to the physical page:
[   13.870249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   13.870647] flags: 0x200000000000000(node=0|zone=2)
[   13.871168] page_type: f5(slab)
[   13.871335] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.871903] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.872190] page dumped because: kasan: bad access detected
[   13.872450] 
[   13.872565] Memory state around the buggy address:
[   13.872986]  ffff888102988a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.873383]  ffff888102988a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.873836] >ffff888102988b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.874101]                    ^
[   13.874282]  ffff888102988b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.874559]  ffff888102988c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.874779] ==================================================================
[   13.905129] ==================================================================
[   13.905673] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.906144] Free of addr ffff8881039f8000 by task kunit_try_catch/256
[   13.906455] 
[   13.906666] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.906715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.906726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.906749] Call Trace:
[   13.906768]  <TASK>
[   13.906794]  dump_stack_lvl+0x73/0xb0
[   13.906826]  print_report+0xd1/0x610
[   13.906848]  ? __virt_addr_valid+0x1db/0x2d0
[   13.906885]  ? kasan_addr_to_slab+0x11/0xa0
[   13.906916]  ? mempool_double_free_helper+0x184/0x370
[   13.906942]  kasan_report_invalid_free+0x10a/0x130
[   13.906967]  ? mempool_double_free_helper+0x184/0x370
[   13.907004]  ? mempool_double_free_helper+0x184/0x370
[   13.907037]  __kasan_mempool_poison_pages+0x115/0x130
[   13.907063]  mempool_free+0x290/0x380
[   13.907090]  mempool_double_free_helper+0x184/0x370
[   13.907125]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.907154]  ? finish_task_switch.isra.0+0x153/0x700
[   13.907181]  mempool_page_alloc_double_free+0xe8/0x140
[   13.907207]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.907237]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.907260]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.907287]  ? __pfx_read_tsc+0x10/0x10
[   13.907307]  ? ktime_get_ts64+0x86/0x230
[   13.907331]  kunit_try_run_case+0x1a5/0x480
[   13.907357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.907388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.907413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.907437]  ? __kthread_parkme+0x82/0x180
[   13.907469]  ? preempt_count_sub+0x50/0x80
[   13.907492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.907516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.907540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.907608]  kthread+0x337/0x6f0
[   13.907628]  ? trace_preempt_on+0x20/0xc0
[   13.907652]  ? __pfx_kthread+0x10/0x10
[   13.907672]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.907693]  ? calculate_sigpending+0x7b/0xa0
[   13.907717]  ? __pfx_kthread+0x10/0x10
[   13.907738]  ret_from_fork+0x116/0x1d0
[   13.907757]  ? __pfx_kthread+0x10/0x10
[   13.907776]  ret_from_fork_asm+0x1a/0x30
[   13.907809]  </TASK>
[   13.907820] 
[   13.916781] The buggy address belongs to the physical page:
[   13.917135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f8
[   13.917492] flags: 0x200000000000000(node=0|zone=2)
[   13.917773] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.918123] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.918498] page dumped because: kasan: bad access detected
[   13.918718] 
[   13.918826] Memory state around the buggy address:
[   13.919144]  ffff8881039f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.919390]  ffff8881039f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.919655] >ffff8881039f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.920119]                    ^
[   13.920284]  ffff8881039f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.920516]  ffff8881039f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.921181] ==================================================================

[   13.755785] ==================================================================
[   13.756298] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.756647] Free of addr ffff888103af8000 by task kunit_try_catch/257
[   13.756941] 
[   13.757040] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.757084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.757096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.757117] Call Trace:
[   13.757135]  <TASK>
[   13.757151]  dump_stack_lvl+0x73/0xb0
[   13.757180]  print_report+0xd1/0x610
[   13.757202]  ? __virt_addr_valid+0x1db/0x2d0
[   13.757226]  ? kasan_addr_to_slab+0x11/0xa0
[   13.757246]  ? mempool_double_free_helper+0x184/0x370
[   13.757272]  kasan_report_invalid_free+0x10a/0x130
[   13.757297]  ? mempool_double_free_helper+0x184/0x370
[   13.757324]  ? mempool_double_free_helper+0x184/0x370
[   13.757347]  __kasan_mempool_poison_pages+0x115/0x130
[   13.757372]  mempool_free+0x290/0x380
[   13.757400]  mempool_double_free_helper+0x184/0x370
[   13.757425]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.757463]  ? __kasan_check_write+0x18/0x20
[   13.757484]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.757506]  ? finish_task_switch.isra.0+0x153/0x700
[   13.757537]  mempool_page_alloc_double_free+0xe8/0x140
[   13.757562]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.757592]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.757616]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.757644]  ? __pfx_read_tsc+0x10/0x10
[   13.757664]  ? ktime_get_ts64+0x86/0x230
[   13.757690]  kunit_try_run_case+0x1a5/0x480
[   13.757715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.757774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.757798]  ? __kthread_parkme+0x82/0x180
[   13.758025]  ? preempt_count_sub+0x50/0x80
[   13.758048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.758072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.758096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.758120]  kthread+0x337/0x6f0
[   13.758138]  ? trace_preempt_on+0x20/0xc0
[   13.758161]  ? __pfx_kthread+0x10/0x10
[   13.758182]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.758202]  ? calculate_sigpending+0x7b/0xa0
[   13.758226]  ? __pfx_kthread+0x10/0x10
[   13.758247]  ret_from_fork+0x116/0x1d0
[   13.758266]  ? __pfx_kthread+0x10/0x10
[   13.758286]  ret_from_fork_asm+0x1a/0x30
[   13.758318]  </TASK>
[   13.758329] 
[   13.770793] The buggy address belongs to the physical page:
[   13.771451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103af8
[   13.772428] flags: 0x200000000000000(node=0|zone=2)
[   13.773304] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.773766] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.774155] page dumped because: kasan: bad access detected
[   13.774417] 
[   13.774548] Memory state around the buggy address:
[   13.774998]  ffff888103af7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.775282]  ffff888103af7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.775759] >ffff888103af8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.776103]                    ^
[   13.776265]  ffff888103af8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.776757]  ffff888103af8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.777077] ==================================================================
[   13.692684] ==================================================================
[   13.694016] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.694929] Free of addr ffff8881026ef500 by task kunit_try_catch/253
[   13.695651] 
[   13.695862] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.695910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.695922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.695946] Call Trace:
[   13.695958]  <TASK>
[   13.695976]  dump_stack_lvl+0x73/0xb0
[   13.696010]  print_report+0xd1/0x610
[   13.696033]  ? __virt_addr_valid+0x1db/0x2d0
[   13.696059]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.696082]  ? mempool_double_free_helper+0x184/0x370
[   13.696108]  kasan_report_invalid_free+0x10a/0x130
[   13.696133]  ? mempool_double_free_helper+0x184/0x370
[   13.696159]  ? mempool_double_free_helper+0x184/0x370
[   13.696182]  ? mempool_double_free_helper+0x184/0x370
[   13.696205]  check_slab_allocation+0x101/0x130
[   13.696227]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.696252]  mempool_free+0x2ec/0x380
[   13.696280]  mempool_double_free_helper+0x184/0x370
[   13.696306]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.696329]  ? update_load_avg+0x1be/0x21b0
[   13.696358]  ? finish_task_switch.isra.0+0x153/0x700
[   13.696385]  mempool_kmalloc_double_free+0xed/0x140
[   13.696410]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.696449]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.696471]  ? __pfx_mempool_kfree+0x10/0x10
[   13.696497]  ? __pfx_read_tsc+0x10/0x10
[   13.696519]  ? ktime_get_ts64+0x86/0x230
[   13.696557]  kunit_try_run_case+0x1a5/0x480
[   13.696585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.696608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.696633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.696657]  ? __kthread_parkme+0x82/0x180
[   13.696679]  ? preempt_count_sub+0x50/0x80
[   13.696704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.696728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.696752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.696777]  kthread+0x337/0x6f0
[   13.696795]  ? trace_preempt_on+0x20/0xc0
[   13.696820]  ? __pfx_kthread+0x10/0x10
[   13.696840]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.696862]  ? calculate_sigpending+0x7b/0xa0
[   13.696887]  ? __pfx_kthread+0x10/0x10
[   13.696909]  ret_from_fork+0x116/0x1d0
[   13.696928]  ? __pfx_kthread+0x10/0x10
[   13.696948]  ret_from_fork_asm+0x1a/0x30
[   13.696983]  </TASK>
[   13.696993] 
[   13.713184] Allocated by task 253:
[   13.713557]  kasan_save_stack+0x45/0x70
[   13.714056]  kasan_save_track+0x18/0x40
[   13.714203]  kasan_save_alloc_info+0x3b/0x50
[   13.714355]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.714856]  remove_element+0x11e/0x190
[   13.715248]  mempool_alloc_preallocated+0x4d/0x90
[   13.715776]  mempool_double_free_helper+0x8a/0x370
[   13.716291]  mempool_kmalloc_double_free+0xed/0x140
[   13.716876]  kunit_try_run_case+0x1a5/0x480
[   13.717031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.717216]  kthread+0x337/0x6f0
[   13.717340]  ret_from_fork+0x116/0x1d0
[   13.717502]  ret_from_fork_asm+0x1a/0x30
[   13.717644] 
[   13.717871] Freed by task 253:
[   13.718035]  kasan_save_stack+0x45/0x70
[   13.718185]  kasan_save_track+0x18/0x40
[   13.718348]  kasan_save_free_info+0x3f/0x60
[   13.718924]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.719161]  mempool_free+0x2ec/0x380
[   13.719301]  mempool_double_free_helper+0x109/0x370
[   13.719541]  mempool_kmalloc_double_free+0xed/0x140
[   13.719851]  kunit_try_run_case+0x1a5/0x480
[   13.720031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.720261]  kthread+0x337/0x6f0
[   13.720477]  ret_from_fork+0x116/0x1d0
[   13.720737]  ret_from_fork_asm+0x1a/0x30
[   13.720923] 
[   13.721020] The buggy address belongs to the object at ffff8881026ef500
[   13.721020]  which belongs to the cache kmalloc-128 of size 128
[   13.721570] The buggy address is located 0 bytes inside of
[   13.721570]  128-byte region [ffff8881026ef500, ffff8881026ef580)
[   13.721968] 
[   13.722044] The buggy address belongs to the physical page:
[   13.722220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ef
[   13.722581] flags: 0x200000000000000(node=0|zone=2)
[   13.723031] page_type: f5(slab)
[   13.723212] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.723527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.723755] page dumped because: kasan: bad access detected
[   13.724176] 
[   13.724352] Memory state around the buggy address:
[   13.724696]  ffff8881026ef400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.724975]  ffff8881026ef480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.725596] >ffff8881026ef500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.725821]                    ^
[   13.725988]  ffff8881026ef580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.726306]  ffff8881026ef600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.726671] ==================================================================
[   13.732724] ==================================================================
[   13.733231] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.733593] Free of addr ffff888103af8000 by task kunit_try_catch/255
[   13.733873] 
[   13.734117] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.734167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.734178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.734201] Call Trace:
[   13.734214]  <TASK>
[   13.734231]  dump_stack_lvl+0x73/0xb0
[   13.734263]  print_report+0xd1/0x610
[   13.734286]  ? __virt_addr_valid+0x1db/0x2d0
[   13.734311]  ? kasan_addr_to_slab+0x11/0xa0
[   13.734331]  ? mempool_double_free_helper+0x184/0x370
[   13.734356]  kasan_report_invalid_free+0x10a/0x130
[   13.734381]  ? mempool_double_free_helper+0x184/0x370
[   13.734724]  ? mempool_double_free_helper+0x184/0x370
[   13.734748]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.734774]  mempool_free+0x2ec/0x380
[   13.734803]  mempool_double_free_helper+0x184/0x370
[   13.734828]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.734854]  ? __kasan_check_write+0x18/0x20
[   13.734874]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.734896]  ? finish_task_switch.isra.0+0x153/0x700
[   13.734924]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.734950]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.734979]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.735001]  ? __pfx_mempool_kfree+0x10/0x10
[   13.735027]  ? __pfx_read_tsc+0x10/0x10
[   13.735048]  ? ktime_get_ts64+0x86/0x230
[   13.735073]  kunit_try_run_case+0x1a5/0x480
[   13.735098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.735120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.735145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.735170]  ? __kthread_parkme+0x82/0x180
[   13.735191]  ? preempt_count_sub+0x50/0x80
[   13.735214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.735238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.735263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.735287]  kthread+0x337/0x6f0
[   13.735306]  ? trace_preempt_on+0x20/0xc0
[   13.735330]  ? __pfx_kthread+0x10/0x10
[   13.735350]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.735371]  ? calculate_sigpending+0x7b/0xa0
[   13.735396]  ? __pfx_kthread+0x10/0x10
[   13.735500]  ret_from_fork+0x116/0x1d0
[   13.735519]  ? __pfx_kthread+0x10/0x10
[   13.735552]  ret_from_fork_asm+0x1a/0x30
[   13.735585]  </TASK>
[   13.735596] 
[   13.744685] The buggy address belongs to the physical page:
[   13.745080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103af8
[   13.745616] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.745945] flags: 0x200000000000040(head|node=0|zone=2)
[   13.746154] page_type: f8(unknown)
[   13.746332] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.746986] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.747313] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.747718] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.748037] head: 0200000000000002 ffffea00040ebe01 00000000ffffffff 00000000ffffffff
[   13.748329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.748760] page dumped because: kasan: bad access detected
[   13.748984] 
[   13.749080] Memory state around the buggy address:
[   13.749277]  ffff888103af7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.749802]  ffff888103af7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.750113] >ffff888103af8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.750402]                    ^
[   13.750584]  ffff888103af8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.750979]  ffff888103af8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.751239] ==================================================================

[   13.938264] ==================================================================
[   13.940064] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.940347] Free of addr ffff888102b7d800 by task kunit_try_catch/252
[   13.940926] 
[   13.941692] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.941748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.941759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.941783] Call Trace:
[   13.941796]  <TASK>
[   13.941816]  dump_stack_lvl+0x73/0xb0
[   13.941853]  print_report+0xd1/0x610
[   13.941876]  ? __virt_addr_valid+0x1db/0x2d0
[   13.941903]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.941926]  ? mempool_double_free_helper+0x184/0x370
[   13.941950]  kasan_report_invalid_free+0x10a/0x130
[   13.941975]  ? mempool_double_free_helper+0x184/0x370
[   13.942069]  ? mempool_double_free_helper+0x184/0x370
[   13.942094]  ? mempool_double_free_helper+0x184/0x370
[   13.942131]  check_slab_allocation+0x101/0x130
[   13.942154]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.942178]  mempool_free+0x2ec/0x380
[   13.942207]  mempool_double_free_helper+0x184/0x370
[   13.942231]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.942256]  ? kasan_save_track+0x18/0x40
[   13.942275]  ? kasan_save_alloc_info+0x3b/0x50
[   13.942298]  ? kasan_save_stack+0x45/0x70
[   13.942323]  mempool_kmalloc_double_free+0xed/0x140
[   13.942348]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.942376]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.942398]  ? __pfx_mempool_kfree+0x10/0x10
[   13.942423]  ? __pfx_read_tsc+0x10/0x10
[   13.942445]  ? ktime_get_ts64+0x86/0x230
[   13.942471]  kunit_try_run_case+0x1a5/0x480
[   13.942499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.942523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.942549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.942573]  ? __kthread_parkme+0x82/0x180
[   13.942594]  ? preempt_count_sub+0x50/0x80
[   13.942619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.942643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.942668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.942692]  kthread+0x337/0x6f0
[   13.942711]  ? trace_preempt_on+0x20/0xc0
[   13.942734]  ? __pfx_kthread+0x10/0x10
[   13.942754]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.942776]  ? calculate_sigpending+0x7b/0xa0
[   13.942801]  ? __pfx_kthread+0x10/0x10
[   13.942822]  ret_from_fork+0x116/0x1d0
[   13.942840]  ? __pfx_kthread+0x10/0x10
[   13.942860]  ret_from_fork_asm+0x1a/0x30
[   13.942893]  </TASK>
[   13.942904] 
[   13.959537] Allocated by task 252:
[   13.959703]  kasan_save_stack+0x45/0x70
[   13.959864]  kasan_save_track+0x18/0x40
[   13.959996]  kasan_save_alloc_info+0x3b/0x50
[   13.960152]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.960630]  remove_element+0x11e/0x190
[   13.961107]  mempool_alloc_preallocated+0x4d/0x90
[   13.961662]  mempool_double_free_helper+0x8a/0x370
[   13.962178]  mempool_kmalloc_double_free+0xed/0x140
[   13.962783]  kunit_try_run_case+0x1a5/0x480
[   13.963228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.963791]  kthread+0x337/0x6f0
[   13.964108]  ret_from_fork+0x116/0x1d0
[   13.964528]  ret_from_fork_asm+0x1a/0x30
[   13.965039] 
[   13.965228] Freed by task 252:
[   13.965595]  kasan_save_stack+0x45/0x70
[   13.965996]  kasan_save_track+0x18/0x40
[   13.966490]  kasan_save_free_info+0x3f/0x60
[   13.966913]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.967486]  mempool_free+0x2ec/0x380
[   13.967907]  mempool_double_free_helper+0x109/0x370
[   13.968279]  mempool_kmalloc_double_free+0xed/0x140
[   13.968446]  kunit_try_run_case+0x1a5/0x480
[   13.968616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.968816]  kthread+0x337/0x6f0
[   13.969555]  ret_from_fork+0x116/0x1d0
[   13.969936]  ret_from_fork_asm+0x1a/0x30
[   13.970357] 
[   13.970565] The buggy address belongs to the object at ffff888102b7d800
[   13.970565]  which belongs to the cache kmalloc-128 of size 128
[   13.971605] The buggy address is located 0 bytes inside of
[   13.971605]  128-byte region [ffff888102b7d800, ffff888102b7d880)
[   13.972652] 
[   13.972993] The buggy address belongs to the physical page:
[   13.973341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   13.974187] flags: 0x200000000000000(node=0|zone=2)
[   13.974421] page_type: f5(slab)
[   13.974887] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.975128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.975772] page dumped because: kasan: bad access detected
[   13.976535] 
[   13.976824] Memory state around the buggy address:
[   13.977434]  ffff888102b7d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.978191]  ffff888102b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.979070] >ffff888102b7d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.979738]                    ^
[   13.980187]  ffff888102b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.980576]  ffff888102b7d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.981377] ==================================================================
[   14.011964] ==================================================================
[   14.012478] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.012870] Free of addr ffff888103a30000 by task kunit_try_catch/256
[   14.013108] 
[   14.013204] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.013254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.013266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.013289] Call Trace:
[   14.013302]  <TASK>
[   14.013321]  dump_stack_lvl+0x73/0xb0
[   14.013378]  print_report+0xd1/0x610
[   14.013402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.013426]  ? kasan_addr_to_slab+0x11/0xa0
[   14.013455]  ? mempool_double_free_helper+0x184/0x370
[   14.013480]  kasan_report_invalid_free+0x10a/0x130
[   14.013504]  ? mempool_double_free_helper+0x184/0x370
[   14.013531]  ? mempool_double_free_helper+0x184/0x370
[   14.013554]  __kasan_mempool_poison_pages+0x115/0x130
[   14.013578]  mempool_free+0x290/0x380
[   14.013604]  mempool_double_free_helper+0x184/0x370
[   14.013628]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.013677]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.013699]  ? finish_task_switch.isra.0+0x153/0x700
[   14.013725]  mempool_page_alloc_double_free+0xe8/0x140
[   14.013750]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.013778]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.013801]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.013841]  ? __pfx_read_tsc+0x10/0x10
[   14.013863]  ? ktime_get_ts64+0x86/0x230
[   14.013887]  kunit_try_run_case+0x1a5/0x480
[   14.013912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.013934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.013959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.013983]  ? __kthread_parkme+0x82/0x180
[   14.014004]  ? preempt_count_sub+0x50/0x80
[   14.014070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.014094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.014118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.014142]  kthread+0x337/0x6f0
[   14.014161]  ? trace_preempt_on+0x20/0xc0
[   14.014186]  ? __pfx_kthread+0x10/0x10
[   14.014207]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.014228]  ? calculate_sigpending+0x7b/0xa0
[   14.014252]  ? __pfx_kthread+0x10/0x10
[   14.014273]  ret_from_fork+0x116/0x1d0
[   14.014292]  ? __pfx_kthread+0x10/0x10
[   14.014312]  ret_from_fork_asm+0x1a/0x30
[   14.014343]  </TASK>
[   14.014375] 
[   14.023585] The buggy address belongs to the physical page:
[   14.023792] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a30
[   14.024205] flags: 0x200000000000000(node=0|zone=2)
[   14.024536] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.024896] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.025282] page dumped because: kasan: bad access detected
[   14.025457] 
[   14.025528] Memory state around the buggy address:
[   14.025684]  ffff888103a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.025976]  ffff888103a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.026327] >ffff888103a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.026820]                    ^
[   14.026983]  ffff888103a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.027288]  ffff888103a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.027710] ==================================================================
[   13.985683] ==================================================================
[   13.986196] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.986760] Free of addr ffff888103a30000 by task kunit_try_catch/254
[   13.987070] 
[   13.987171] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.987222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.987236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.987260] Call Trace:
[   13.987272]  <TASK>
[   13.987293]  dump_stack_lvl+0x73/0xb0
[   13.987327]  print_report+0xd1/0x610
[   13.987350]  ? __virt_addr_valid+0x1db/0x2d0
[   13.987376]  ? kasan_addr_to_slab+0x11/0xa0
[   13.987397]  ? mempool_double_free_helper+0x184/0x370
[   13.987422]  kasan_report_invalid_free+0x10a/0x130
[   13.987446]  ? mempool_double_free_helper+0x184/0x370
[   13.987473]  ? mempool_double_free_helper+0x184/0x370
[   13.987496]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.987521]  mempool_free+0x2ec/0x380
[   13.987549]  mempool_double_free_helper+0x184/0x370
[   13.987573]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.987598]  ? __kasan_check_write+0x18/0x20
[   13.987617]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.987673]  ? finish_task_switch.isra.0+0x153/0x700
[   13.987701]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.987726]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.987756]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.987778]  ? __pfx_mempool_kfree+0x10/0x10
[   13.987802]  ? __pfx_read_tsc+0x10/0x10
[   13.987825]  ? ktime_get_ts64+0x86/0x230
[   13.987850]  kunit_try_run_case+0x1a5/0x480
[   13.987877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.987899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.987924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.987948]  ? __kthread_parkme+0x82/0x180
[   13.987970]  ? preempt_count_sub+0x50/0x80
[   13.987993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.988026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.988050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.988074]  kthread+0x337/0x6f0
[   13.988092]  ? trace_preempt_on+0x20/0xc0
[   13.988132]  ? __pfx_kthread+0x10/0x10
[   13.988171]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.988200]  ? calculate_sigpending+0x7b/0xa0
[   13.988226]  ? __pfx_kthread+0x10/0x10
[   13.988247]  ret_from_fork+0x116/0x1d0
[   13.988267]  ? __pfx_kthread+0x10/0x10
[   13.988288]  ret_from_fork_asm+0x1a/0x30
[   13.988320]  </TASK>
[   13.988332] 
[   14.001387] The buggy address belongs to the physical page:
[   14.001684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a30
[   14.002027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.002252] flags: 0x200000000000040(head|node=0|zone=2)
[   14.002432] page_type: f8(unknown)
[   14.002668] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.003002] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.003328] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.003703] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.003927] head: 0200000000000002 ffffea00040e8c01 00000000ffffffff 00000000ffffffff
[   14.004272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.004958] page dumped because: kasan: bad access detected
[   14.005332] 
[   14.005414] Memory state around the buggy address:
[   14.005632]  ffff888103a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.005953]  ffff888103a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.006373] >ffff888103a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.006679]                    ^
[   14.006842]  ffff888103a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.007147]  ffff888103a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.007413] ==================================================================