Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.762740] ==================================================================
[   18.762804] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.763350] Free of addr fff00000c656aa00 by task kunit_try_catch/235
[   18.763414] 
[   18.763573] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.763666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.763967] Hardware name: linux,dummy-virt (DT)
[   18.764020] Call trace:
[   18.764228]  show_stack+0x20/0x38 (C)
[   18.764705]  dump_stack_lvl+0x8c/0xd0
[   18.764801]  print_report+0x118/0x5d0
[   18.764896]  kasan_report_invalid_free+0xc0/0xe8
[   18.764946]  check_slab_allocation+0xd4/0x108
[   18.764995]  __kasan_mempool_poison_object+0x78/0x150
[   18.765045]  mempool_free+0x28c/0x328
[   18.765106]  mempool_double_free_helper+0x150/0x2e8
[   18.765155]  mempool_kmalloc_double_free+0xc0/0x118
[   18.765203]  kunit_try_run_case+0x170/0x3f0
[   18.765260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.765329]  kthread+0x328/0x630
[   18.765372]  ret_from_fork+0x10/0x20
[   18.765428] 
[   18.765447] Allocated by task 235:
[   18.765487]  kasan_save_stack+0x3c/0x68
[   18.765528]  kasan_save_track+0x20/0x40
[   18.765576]  kasan_save_alloc_info+0x40/0x58
[   18.765614]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.765656]  remove_element+0x130/0x1f8
[   18.765700]  mempool_alloc_preallocated+0x58/0xc0
[   18.765748]  mempool_double_free_helper+0x94/0x2e8
[   18.765796]  mempool_kmalloc_double_free+0xc0/0x118
[   18.765836]  kunit_try_run_case+0x170/0x3f0
[   18.765884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.765927]  kthread+0x328/0x630
[   18.765959]  ret_from_fork+0x10/0x20
[   18.766005] 
[   18.766034] Freed by task 235:
[   18.766060]  kasan_save_stack+0x3c/0x68
[   18.766111]  kasan_save_track+0x20/0x40
[   18.766159]  kasan_save_free_info+0x4c/0x78
[   18.766198]  __kasan_mempool_poison_object+0xc0/0x150
[   18.766239]  mempool_free+0x28c/0x328
[   18.766288]  mempool_double_free_helper+0x100/0x2e8
[   18.766329]  mempool_kmalloc_double_free+0xc0/0x118
[   18.766389]  kunit_try_run_case+0x170/0x3f0
[   18.766427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.766477]  kthread+0x328/0x630
[   18.766515]  ret_from_fork+0x10/0x20
[   18.766549] 
[   18.766567] The buggy address belongs to the object at fff00000c656aa00
[   18.766567]  which belongs to the cache kmalloc-128 of size 128
[   18.766626] The buggy address is located 0 bytes inside of
[   18.766626]  128-byte region [fff00000c656aa00, fff00000c656aa80)
[   18.766685] 
[   18.766711] The buggy address belongs to the physical page:
[   18.766763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656a
[   18.766819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.767857] page_type: f5(slab)
[   18.767943] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.767997] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.768037] page dumped because: kasan: bad access detected
[   18.768179] 
[   18.768410] Memory state around the buggy address:
[   18.768526]  fff00000c656a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.768706]  fff00000c656a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.769239] >fff00000c656aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.769503]                    ^
[   18.769640]  fff00000c656aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.769800]  fff00000c656ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.770013] ==================================================================
[   18.781441] ==================================================================
[   18.781502] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.781918] Free of addr fff00000c79b4000 by task kunit_try_catch/237
[   18.782228] 
[   18.782282] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.782593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.782978] Hardware name: linux,dummy-virt (DT)
[   18.783034] Call trace:
[   18.783128]  show_stack+0x20/0x38 (C)
[   18.783408]  dump_stack_lvl+0x8c/0xd0
[   18.783549]  print_report+0x118/0x5d0
[   18.783774]  kasan_report_invalid_free+0xc0/0xe8
[   18.783942]  __kasan_mempool_poison_object+0x14c/0x150
[   18.783999]  mempool_free+0x28c/0x328
[   18.784044]  mempool_double_free_helper+0x150/0x2e8
[   18.784240]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.784515]  kunit_try_run_case+0x170/0x3f0
[   18.784905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.785112]  kthread+0x328/0x630
[   18.785311]  ret_from_fork+0x10/0x20
[   18.785455] 
[   18.785577] The buggy address belongs to the physical page:
[   18.785651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b4
[   18.785970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.786347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.786550] page_type: f8(unknown)
[   18.786606] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.786809] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.787064] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.787132] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.787488] head: 0bfffe0000000002 ffffc1ffc31e6d01 00000000ffffffff 00000000ffffffff
[   18.787588] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.787656] page dumped because: kasan: bad access detected
[   18.787837] 
[   18.788175] Memory state around the buggy address:
[   18.788329]  fff00000c79b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.788478]  fff00000c79b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.788532] >fff00000c79b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.788571]                    ^
[   18.788609]  fff00000c79b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.788651]  fff00000c79b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.788829] ==================================================================
[   18.797916] ==================================================================
[   18.798076] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.798139] Free of addr fff00000c79b4000 by task kunit_try_catch/239
[   18.798304] 
[   18.798348] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.798577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.798608] Hardware name: linux,dummy-virt (DT)
[   18.798645] Call trace:
[   18.798685]  show_stack+0x20/0x38 (C)
[   18.798745]  dump_stack_lvl+0x8c/0xd0
[   18.799003]  print_report+0x118/0x5d0
[   18.799273]  kasan_report_invalid_free+0xc0/0xe8
[   18.799343]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.799783]  mempool_free+0x24c/0x328
[   18.799845]  mempool_double_free_helper+0x150/0x2e8
[   18.799911]  mempool_page_alloc_double_free+0xbc/0x118
[   18.799962]  kunit_try_run_case+0x170/0x3f0
[   18.800013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.800067]  kthread+0x328/0x630
[   18.800120]  ret_from_fork+0x10/0x20
[   18.800169] 
[   18.800192] The buggy address belongs to the physical page:
[   18.800225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b4
[   18.800278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.800341] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.800390] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.800432] page dumped because: kasan: bad access detected
[   18.800472] 
[   18.800490] Memory state around the buggy address:
[   18.800535]  fff00000c79b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.800587]  fff00000c79b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.800635] >fff00000c79b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.800674]                    ^
[   18.800703]  fff00000c79b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.800743]  fff00000c79b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.800787] ==================================================================

[   14.028686] ==================================================================
[   14.029289] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.029590] Free of addr ffff888102b48000 by task kunit_try_catch/256
[   14.029890] 
[   14.030117] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.030167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.030178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.030201] Call Trace:
[   14.030217]  <TASK>
[   14.030234]  dump_stack_lvl+0x73/0xb0
[   14.030265]  print_report+0xd1/0x610
[   14.030288]  ? __virt_addr_valid+0x1db/0x2d0
[   14.030313]  ? kasan_addr_to_slab+0x11/0xa0
[   14.030333]  ? mempool_double_free_helper+0x184/0x370
[   14.030358]  kasan_report_invalid_free+0x10a/0x130
[   14.030382]  ? mempool_double_free_helper+0x184/0x370
[   14.030409]  ? mempool_double_free_helper+0x184/0x370
[   14.030432]  __kasan_mempool_poison_pages+0x115/0x130
[   14.030456]  mempool_free+0x290/0x380
[   14.030484]  mempool_double_free_helper+0x184/0x370
[   14.030507]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.030532]  ? __kasan_check_write+0x18/0x20
[   14.030552]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.030573]  ? finish_task_switch.isra.0+0x153/0x700
[   14.030611]  mempool_page_alloc_double_free+0xe8/0x140
[   14.030637]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.030666]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.030690]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.030715]  ? __pfx_read_tsc+0x10/0x10
[   14.030736]  ? ktime_get_ts64+0x86/0x230
[   14.030761]  kunit_try_run_case+0x1a5/0x480
[   14.030789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.030811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.030836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.030859]  ? __kthread_parkme+0x82/0x180
[   14.030879]  ? preempt_count_sub+0x50/0x80
[   14.030953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.030980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.031005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.031029]  kthread+0x337/0x6f0
[   14.031048]  ? trace_preempt_on+0x20/0xc0
[   14.031084]  ? __pfx_kthread+0x10/0x10
[   14.031104]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.031126]  ? calculate_sigpending+0x7b/0xa0
[   14.031151]  ? __pfx_kthread+0x10/0x10
[   14.031172]  ret_from_fork+0x116/0x1d0
[   14.031191]  ? __pfx_kthread+0x10/0x10
[   14.031210]  ret_from_fork_asm+0x1a/0x30
[   14.031244]  </TASK>
[   14.031255] 
[   14.043215] The buggy address belongs to the physical page:
[   14.043667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   14.044135] flags: 0x200000000000000(node=0|zone=2)
[   14.044376] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.045040] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.045388] page dumped because: kasan: bad access detected
[   14.045726] 
[   14.045931] Memory state around the buggy address:
[   14.046245]  ffff888102b47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.046536]  ffff888102b47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.047107] >ffff888102b48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.047494]                    ^
[   14.047662]  ffff888102b48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.048175]  ffff888102b48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.048482] ==================================================================
[   14.002617] ==================================================================
[   14.003417] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.003751] Free of addr ffff888103ab8000 by task kunit_try_catch/254
[   14.004009] 
[   14.004127] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.004174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.004186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.004209] Call Trace:
[   14.004224]  <TASK>
[   14.004242]  dump_stack_lvl+0x73/0xb0
[   14.004270]  print_report+0xd1/0x610
[   14.004292]  ? __virt_addr_valid+0x1db/0x2d0
[   14.004316]  ? kasan_addr_to_slab+0x11/0xa0
[   14.004336]  ? mempool_double_free_helper+0x184/0x370
[   14.004361]  kasan_report_invalid_free+0x10a/0x130
[   14.004386]  ? mempool_double_free_helper+0x184/0x370
[   14.004413]  ? mempool_double_free_helper+0x184/0x370
[   14.004435]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.004460]  mempool_free+0x2ec/0x380
[   14.004486]  mempool_double_free_helper+0x184/0x370
[   14.004510]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.004535]  ? __kasan_check_write+0x18/0x20
[   14.004554]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.004576]  ? finish_task_switch.isra.0+0x153/0x700
[   14.004602]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.004627]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.004655]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.004678]  ? __pfx_mempool_kfree+0x10/0x10
[   14.004703]  ? __pfx_read_tsc+0x10/0x10
[   14.004724]  ? ktime_get_ts64+0x86/0x230
[   14.004749]  kunit_try_run_case+0x1a5/0x480
[   14.004776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.004798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.004822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.004846]  ? __kthread_parkme+0x82/0x180
[   14.004866]  ? preempt_count_sub+0x50/0x80
[   14.004890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.004914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.004937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.004961]  kthread+0x337/0x6f0
[   14.005080]  ? trace_preempt_on+0x20/0xc0
[   14.005108]  ? __pfx_kthread+0x10/0x10
[   14.005129]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.005151]  ? calculate_sigpending+0x7b/0xa0
[   14.005175]  ? __pfx_kthread+0x10/0x10
[   14.005195]  ret_from_fork+0x116/0x1d0
[   14.005213]  ? __pfx_kthread+0x10/0x10
[   14.005234]  ret_from_fork_asm+0x1a/0x30
[   14.005266]  </TASK>
[   14.005276] 
[   14.017466] The buggy address belongs to the physical page:
[   14.018019] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab8
[   14.018460] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.019122] flags: 0x200000000000040(head|node=0|zone=2)
[   14.019447] page_type: f8(unknown)
[   14.019619] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.020177] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.020515] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.021033] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.021449] head: 0200000000000002 ffffea00040eae01 00000000ffffffff 00000000ffffffff
[   14.021939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.022384] page dumped because: kasan: bad access detected
[   14.022587] 
[   14.022697] Memory state around the buggy address:
[   14.022920]  ffff888103ab7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.023790]  ffff888103ab7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.024305] >ffff888103ab8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.024586]                    ^
[   14.024739]  ffff888103ab8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.025284]  ffff888103ab8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.025702] ==================================================================
[   13.971985] ==================================================================
[   13.972429] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.973139] Free of addr ffff888102f42800 by task kunit_try_catch/252
[   13.974019] 
[   13.974245] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.974295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.974307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.974330] Call Trace:
[   13.974343]  <TASK>
[   13.974360]  dump_stack_lvl+0x73/0xb0
[   13.974392]  print_report+0xd1/0x610
[   13.974416]  ? __virt_addr_valid+0x1db/0x2d0
[   13.974441]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.974464]  ? mempool_double_free_helper+0x184/0x370
[   13.974491]  kasan_report_invalid_free+0x10a/0x130
[   13.974516]  ? mempool_double_free_helper+0x184/0x370
[   13.974543]  ? mempool_double_free_helper+0x184/0x370
[   13.974566]  ? mempool_double_free_helper+0x184/0x370
[   13.974597]  check_slab_allocation+0x101/0x130
[   13.974618]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.974644]  mempool_free+0x2ec/0x380
[   13.974672]  mempool_double_free_helper+0x184/0x370
[   13.974695]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.974721]  ? ret_from_fork+0x116/0x1d0
[   13.974740]  ? kthread+0x337/0x6f0
[   13.974761]  ? ret_from_fork_asm+0x1a/0x30
[   13.974788]  mempool_kmalloc_double_free+0xed/0x140
[   13.974813]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.974840]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.974862]  ? __pfx_mempool_kfree+0x10/0x10
[   13.974886]  ? __pfx_read_tsc+0x10/0x10
[   13.974906]  ? ktime_get_ts64+0x86/0x230
[   13.974930]  kunit_try_run_case+0x1a5/0x480
[   13.974956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.974978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.975002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.975026]  ? __kthread_parkme+0x82/0x180
[   13.975045]  ? preempt_count_sub+0x50/0x80
[   13.975079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.975103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.975127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.975150]  kthread+0x337/0x6f0
[   13.975168]  ? trace_preempt_on+0x20/0xc0
[   13.975191]  ? __pfx_kthread+0x10/0x10
[   13.975211]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.975232]  ? calculate_sigpending+0x7b/0xa0
[   13.975256]  ? __pfx_kthread+0x10/0x10
[   13.975277]  ret_from_fork+0x116/0x1d0
[   13.975295]  ? __pfx_kthread+0x10/0x10
[   13.975314]  ret_from_fork_asm+0x1a/0x30
[   13.975346]  </TASK>
[   13.975357] 
[   13.986706] Allocated by task 252:
[   13.986959]  kasan_save_stack+0x45/0x70
[   13.987167]  kasan_save_track+0x18/0x40
[   13.987346]  kasan_save_alloc_info+0x3b/0x50
[   13.987499]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.987702]  remove_element+0x11e/0x190
[   13.988035]  mempool_alloc_preallocated+0x4d/0x90
[   13.988293]  mempool_double_free_helper+0x8a/0x370
[   13.988533]  mempool_kmalloc_double_free+0xed/0x140
[   13.988859]  kunit_try_run_case+0x1a5/0x480
[   13.989094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.989355]  kthread+0x337/0x6f0
[   13.989524]  ret_from_fork+0x116/0x1d0
[   13.989741]  ret_from_fork_asm+0x1a/0x30
[   13.990001] 
[   13.990093] Freed by task 252:
[   13.990207]  kasan_save_stack+0x45/0x70
[   13.990413]  kasan_save_track+0x18/0x40
[   13.990604]  kasan_save_free_info+0x3f/0x60
[   13.990910]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.991172]  mempool_free+0x2ec/0x380
[   13.991319]  mempool_double_free_helper+0x109/0x370
[   13.991482]  mempool_kmalloc_double_free+0xed/0x140
[   13.991746]  kunit_try_run_case+0x1a5/0x480
[   13.992126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.992395]  kthread+0x337/0x6f0
[   13.992566]  ret_from_fork+0x116/0x1d0
[   13.992754]  ret_from_fork_asm+0x1a/0x30
[   13.993019] 
[   13.993135] The buggy address belongs to the object at ffff888102f42800
[   13.993135]  which belongs to the cache kmalloc-128 of size 128
[   13.993698] The buggy address is located 0 bytes inside of
[   13.993698]  128-byte region [ffff888102f42800, ffff888102f42880)
[   13.994259] 
[   13.994361] The buggy address belongs to the physical page:
[   13.994587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42
[   13.994976] flags: 0x200000000000000(node=0|zone=2)
[   13.995163] page_type: f5(slab)
[   13.995288] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.995661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.996188] page dumped because: kasan: bad access detected
[   13.996394] 
[   13.996491] Memory state around the buggy address:
[   13.996734]  ffff888102f42700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.997106]  ffff888102f42780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.997373] >ffff888102f42800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.997654]                    ^
[   13.997907]  ffff888102f42880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.998249]  ffff888102f42900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.998543] ==================================================================