Hay
Date
July 2, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.235206] ==================================================================
[   20.235283] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.235350] Free of addr fff00000c7938000 by task kunit_try_catch/239
[   20.235659] 
[   20.235703] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.235790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.235818] Hardware name: linux,dummy-virt (DT)
[   20.235852] Call trace:
[   20.236051]  show_stack+0x20/0x38 (C)
[   20.236121]  dump_stack_lvl+0x8c/0xd0
[   20.236326]  print_report+0x118/0x608
[   20.236538]  kasan_report_invalid_free+0xc0/0xe8
[   20.236790]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.236972]  mempool_free+0x24c/0x328
[   20.237116]  mempool_double_free_helper+0x150/0x2e8
[   20.237288]  mempool_page_alloc_double_free+0xbc/0x118
[   20.237402]  kunit_try_run_case+0x170/0x3f0
[   20.237460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.237513]  kthread+0x328/0x630
[   20.237730]  ret_from_fork+0x10/0x20
[   20.238098] 
[   20.238169] The buggy address belongs to the physical page:
[   20.238234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   20.238308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.238418] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.238506] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.238754] page dumped because: kasan: bad access detected
[   20.239047] 
[   20.239202] Memory state around the buggy address:
[   20.239295]  fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.239346]  fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.239746] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.239861]                    ^
[   20.239902]  fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.240448]  fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.240767] ==================================================================
[   20.192231] ==================================================================
[   20.192601] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.192686] Free of addr fff00000c7041000 by task kunit_try_catch/235
[   20.192743] 
[   20.192804] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.193293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.193381] Hardware name: linux,dummy-virt (DT)
[   20.193437] Call trace:
[   20.193462]  show_stack+0x20/0x38 (C)
[   20.193833]  dump_stack_lvl+0x8c/0xd0
[   20.193979]  print_report+0x118/0x608
[   20.194231]  kasan_report_invalid_free+0xc0/0xe8
[   20.194478]  check_slab_allocation+0xd4/0x108
[   20.194673]  __kasan_mempool_poison_object+0x78/0x150
[   20.194875]  mempool_free+0x28c/0x328
[   20.194965]  mempool_double_free_helper+0x150/0x2e8
[   20.195018]  mempool_kmalloc_double_free+0xc0/0x118
[   20.195240]  kunit_try_run_case+0x170/0x3f0
[   20.195560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.195643]  kthread+0x328/0x630
[   20.196077]  ret_from_fork+0x10/0x20
[   20.196474] 
[   20.196960] Allocated by task 235:
[   20.197029]  kasan_save_stack+0x3c/0x68
[   20.197205]  kasan_save_track+0x20/0x40
[   20.197267]  kasan_save_alloc_info+0x40/0x58
[   20.197314]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.197595]  remove_element+0x130/0x1f8
[   20.197841]  mempool_alloc_preallocated+0x58/0xc0
[   20.198080]  mempool_double_free_helper+0x94/0x2e8
[   20.198181]  mempool_kmalloc_double_free+0xc0/0x118
[   20.198427]  kunit_try_run_case+0x170/0x3f0
[   20.198475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.198564]  kthread+0x328/0x630
[   20.198799]  ret_from_fork+0x10/0x20
[   20.199190] 
[   20.199318] Freed by task 235:
[   20.199420]  kasan_save_stack+0x3c/0x68
[   20.199527]  kasan_save_track+0x20/0x40
[   20.199743]  kasan_save_free_info+0x4c/0x78
[   20.199889]  __kasan_mempool_poison_object+0xc0/0x150
[   20.200047]  mempool_free+0x28c/0x328
[   20.200102]  mempool_double_free_helper+0x100/0x2e8
[   20.200466]  mempool_kmalloc_double_free+0xc0/0x118
[   20.200550]  kunit_try_run_case+0x170/0x3f0
[   20.200721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.200769]  kthread+0x328/0x630
[   20.200802]  ret_from_fork+0x10/0x20
[   20.201009] 
[   20.201209] The buggy address belongs to the object at fff00000c7041000
[   20.201209]  which belongs to the cache kmalloc-128 of size 128
[   20.201497] The buggy address is located 0 bytes inside of
[   20.201497]  128-byte region [fff00000c7041000, fff00000c7041080)
[   20.201698] 
[   20.201760] The buggy address belongs to the physical page:
[   20.201793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107041
[   20.202023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.202286] page_type: f5(slab)
[   20.202664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.202779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.203007] page dumped because: kasan: bad access detected
[   20.203219] 
[   20.203274] Memory state around the buggy address:
[   20.203380]  fff00000c7040f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.203465]  fff00000c7040f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.203509] >fff00000c7041000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.203620]                    ^
[   20.203659]  fff00000c7041080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.203708]  fff00000c7041100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.203753] ==================================================================
[   20.216147] ==================================================================
[   20.216523] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.217362] Free of addr fff00000c7938000 by task kunit_try_catch/237
[   20.217429] 
[   20.217469] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.217554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.217833] Hardware name: linux,dummy-virt (DT)
[   20.217891] Call trace:
[   20.218303]  show_stack+0x20/0x38 (C)
[   20.218901]  dump_stack_lvl+0x8c/0xd0
[   20.219042]  print_report+0x118/0x608
[   20.219172]  kasan_report_invalid_free+0xc0/0xe8
[   20.219294]  __kasan_mempool_poison_object+0x14c/0x150
[   20.219501]  mempool_free+0x28c/0x328
[   20.219728]  mempool_double_free_helper+0x150/0x2e8
[   20.220039]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.220161]  kunit_try_run_case+0x170/0x3f0
[   20.220401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.220562]  kthread+0x328/0x630
[   20.220687]  ret_from_fork+0x10/0x20
[   20.220741] 
[   20.220763] The buggy address belongs to the physical page:
[   20.220806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   20.221039] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.221345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.221771] page_type: f8(unknown)
[   20.221941] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.222028] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.222265] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.222360] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.222663] head: 0bfffe0000000002 ffffc1ffc31e4e01 00000000ffffffff 00000000ffffffff
[   20.222747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.222813] page dumped because: kasan: bad access detected
[   20.223148] 
[   20.223690] Memory state around the buggy address:
[   20.223766]  fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.223813]  fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.224106] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.224503]                    ^
[   20.224763]  fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.224863]  fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.224903] ==================================================================

[   13.115394] ==================================================================
[   13.116044] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.116406] Free of addr ffff8881039bc000 by task kunit_try_catch/258
[   13.116690] 
[   13.116889] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.116938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.116950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.116971] Call Trace:
[   13.116984]  <TASK>
[   13.117001]  dump_stack_lvl+0x73/0xb0
[   13.117032]  print_report+0xd1/0x650
[   13.117055]  ? __virt_addr_valid+0x1db/0x2d0
[   13.117489]  ? kasan_addr_to_slab+0x11/0xa0
[   13.117519]  ? mempool_double_free_helper+0x184/0x370
[   13.117546]  kasan_report_invalid_free+0x10a/0x130
[   13.117754]  ? mempool_double_free_helper+0x184/0x370
[   13.117788]  ? mempool_double_free_helper+0x184/0x370
[   13.117811]  __kasan_mempool_poison_pages+0x115/0x130
[   13.117835]  mempool_free+0x290/0x380
[   13.117857]  mempool_double_free_helper+0x184/0x370
[   13.117880]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.117905]  ? __kasan_check_write+0x18/0x20
[   13.117924]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.117946]  ? finish_task_switch.isra.0+0x153/0x700
[   13.117972]  mempool_page_alloc_double_free+0xe8/0x140
[   13.117996]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.118023]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.118042]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.118064]  ? __pfx_read_tsc+0x10/0x10
[   13.118086]  ? ktime_get_ts64+0x86/0x230
[   13.118112]  kunit_try_run_case+0x1a5/0x480
[   13.118137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.118159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.118182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.118204]  ? __kthread_parkme+0x82/0x180
[   13.118225]  ? preempt_count_sub+0x50/0x80
[   13.118247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.118271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.118293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.118315]  kthread+0x337/0x6f0
[   13.118334]  ? trace_preempt_on+0x20/0xc0
[   13.118357]  ? __pfx_kthread+0x10/0x10
[   13.118392]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.118411]  ? calculate_sigpending+0x7b/0xa0
[   13.118434]  ? __pfx_kthread+0x10/0x10
[   13.118456]  ret_from_fork+0x116/0x1d0
[   13.118473]  ? __pfx_kthread+0x10/0x10
[   13.118493]  ret_from_fork_asm+0x1a/0x30
[   13.118523]  </TASK>
[   13.118535] 
[   13.132271] The buggy address belongs to the physical page:
[   13.132767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bc
[   13.133135] flags: 0x200000000000000(node=0|zone=2)
[   13.133396] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.134156] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.134582] page dumped because: kasan: bad access detected
[   13.134996] 
[   13.135118] Memory state around the buggy address:
[   13.135474]  ffff8881039bbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.136147]  ffff8881039bbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.136456] >ffff8881039bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.136944]                    ^
[   13.137185]  ffff8881039bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.137541]  ffff8881039bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.138125] ==================================================================
[   13.086805] ==================================================================
[   13.087276] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.088268] Free of addr ffff8881039f4000 by task kunit_try_catch/256
[   13.088674] 
[   13.089207] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.089260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.089272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.089294] Call Trace:
[   13.089307]  <TASK>
[   13.089326]  dump_stack_lvl+0x73/0xb0
[   13.089357]  print_report+0xd1/0x650
[   13.089394]  ? __virt_addr_valid+0x1db/0x2d0
[   13.089418]  ? kasan_addr_to_slab+0x11/0xa0
[   13.089438]  ? mempool_double_free_helper+0x184/0x370
[   13.089461]  kasan_report_invalid_free+0x10a/0x130
[   13.089486]  ? mempool_double_free_helper+0x184/0x370
[   13.089511]  ? mempool_double_free_helper+0x184/0x370
[   13.089533]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.089557]  mempool_free+0x2ec/0x380
[   13.089708]  mempool_double_free_helper+0x184/0x370
[   13.089734]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.089759]  ? __kasan_check_write+0x18/0x20
[   13.089779]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.089801]  ? finish_task_switch.isra.0+0x153/0x700
[   13.089827]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.089851]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.089877]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.089899]  ? __pfx_mempool_kfree+0x10/0x10
[   13.089923]  ? __pfx_read_tsc+0x10/0x10
[   13.089943]  ? ktime_get_ts64+0x86/0x230
[   13.089966]  kunit_try_run_case+0x1a5/0x480
[   13.089990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.090012]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.090035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.090058]  ? __kthread_parkme+0x82/0x180
[   13.090078]  ? preempt_count_sub+0x50/0x80
[   13.090100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.090123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.090145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.090168]  kthread+0x337/0x6f0
[   13.090187]  ? trace_preempt_on+0x20/0xc0
[   13.090209]  ? __pfx_kthread+0x10/0x10
[   13.090230]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.090249]  ? calculate_sigpending+0x7b/0xa0
[   13.090271]  ? __pfx_kthread+0x10/0x10
[   13.090293]  ret_from_fork+0x116/0x1d0
[   13.090310]  ? __pfx_kthread+0x10/0x10
[   13.090330]  ret_from_fork_asm+0x1a/0x30
[   13.090372]  </TASK>
[   13.090385] 
[   13.103405] The buggy address belongs to the physical page:
[   13.103911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.104377] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.104867] flags: 0x200000000000040(head|node=0|zone=2)
[   13.105244] page_type: f8(unknown)
[   13.105530] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.106101] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.106451] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.107076] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.107483] head: 0200000000000002 ffffea00040e7d01 00000000ffffffff 00000000ffffffff
[   13.108049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.108499] page dumped because: kasan: bad access detected
[   13.108989] 
[   13.109189] Memory state around the buggy address:
[   13.109389]  ffff8881039f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.110052]  ffff8881039f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.110471] >ffff8881039f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.111024]                    ^
[   13.111212]  ffff8881039f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.111601]  ffff8881039f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.112155] ==================================================================
[   13.052813] ==================================================================
[   13.053310] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.053911] Free of addr ffff888103124200 by task kunit_try_catch/254
[   13.054385] 
[   13.054520] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.054606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.054620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.054640] Call Trace:
[   13.054652]  <TASK>
[   13.054667]  dump_stack_lvl+0x73/0xb0
[   13.054699]  print_report+0xd1/0x650
[   13.054723]  ? __virt_addr_valid+0x1db/0x2d0
[   13.054886]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.054912]  ? mempool_double_free_helper+0x184/0x370
[   13.054938]  kasan_report_invalid_free+0x10a/0x130
[   13.054962]  ? mempool_double_free_helper+0x184/0x370
[   13.054989]  ? mempool_double_free_helper+0x184/0x370
[   13.055011]  ? mempool_double_free_helper+0x184/0x370
[   13.055033]  check_slab_allocation+0x101/0x130
[   13.055054]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.055078]  mempool_free+0x2ec/0x380
[   13.055101]  mempool_double_free_helper+0x184/0x370
[   13.055124]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.055150]  ? finish_task_switch.isra.0+0x153/0x700
[   13.055176]  mempool_kmalloc_double_free+0xed/0x140
[   13.055199]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.055225]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.055247]  ? __pfx_mempool_kfree+0x10/0x10
[   13.055271]  ? __pfx_read_tsc+0x10/0x10
[   13.055292]  ? ktime_get_ts64+0x86/0x230
[   13.055315]  kunit_try_run_case+0x1a5/0x480
[   13.055339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.055371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.055396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.055417]  ? __kthread_parkme+0x82/0x180
[   13.055437]  ? preempt_count_sub+0x50/0x80
[   13.055459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.055482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.055504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.055526]  kthread+0x337/0x6f0
[   13.055546]  ? trace_preempt_on+0x20/0xc0
[   13.055593]  ? __pfx_kthread+0x10/0x10
[   13.055614]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.055635]  ? calculate_sigpending+0x7b/0xa0
[   13.055659]  ? __pfx_kthread+0x10/0x10
[   13.055687]  ret_from_fork+0x116/0x1d0
[   13.055706]  ? __pfx_kthread+0x10/0x10
[   13.055728]  ret_from_fork_asm+0x1a/0x30
[   13.055777]  </TASK>
[   13.055787] 
[   13.068000] Allocated by task 254:
[   13.068221]  kasan_save_stack+0x45/0x70
[   13.068824]  kasan_save_track+0x18/0x40
[   13.069027]  kasan_save_alloc_info+0x3b/0x50
[   13.069375]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.069679]  remove_element+0x11e/0x190
[   13.070137]  mempool_alloc_preallocated+0x4d/0x90
[   13.070396]  mempool_double_free_helper+0x8a/0x370
[   13.070864]  mempool_kmalloc_double_free+0xed/0x140
[   13.071118]  kunit_try_run_case+0x1a5/0x480
[   13.071438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.071701]  kthread+0x337/0x6f0
[   13.072018]  ret_from_fork+0x116/0x1d0
[   13.072241]  ret_from_fork_asm+0x1a/0x30
[   13.072562] 
[   13.072830] Freed by task 254:
[   13.072995]  kasan_save_stack+0x45/0x70
[   13.073249]  kasan_save_track+0x18/0x40
[   13.073457]  kasan_save_free_info+0x3f/0x60
[   13.073665]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.073876]  mempool_free+0x2ec/0x380
[   13.074054]  mempool_double_free_helper+0x109/0x370
[   13.074279]  mempool_kmalloc_double_free+0xed/0x140
[   13.074515]  kunit_try_run_case+0x1a5/0x480
[   13.074724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.074946]  kthread+0x337/0x6f0
[   13.075115]  ret_from_fork+0x116/0x1d0
[   13.075288]  ret_from_fork_asm+0x1a/0x30
[   13.076176] 
[   13.076292] The buggy address belongs to the object at ffff888103124200
[   13.076292]  which belongs to the cache kmalloc-128 of size 128
[   13.077212] The buggy address is located 0 bytes inside of
[   13.077212]  128-byte region [ffff888103124200, ffff888103124280)
[   13.077968] 
[   13.078086] The buggy address belongs to the physical page:
[   13.078452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103124
[   13.078962] flags: 0x200000000000000(node=0|zone=2)
[   13.079294] page_type: f5(slab)
[   13.079567] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.080083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.080513] page dumped because: kasan: bad access detected
[   13.080911] 
[   13.081017] Memory state around the buggy address:
[   13.081241]  ffff888103124100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.081871]  ffff888103124180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.082245] >ffff888103124200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.082609]                    ^
[   13.082862]  ffff888103124280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.083372]  ffff888103124300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.083797] ==================================================================