Hay
Date
May 13, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.217209] ==================================================================
[   21.217296] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.217435] Free of addr fff00000c78b8000 by task kunit_try_catch/237
[   21.217487] 
[   21.217535] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.217654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.217687] Hardware name: linux,dummy-virt (DT)
[   21.217726] Call trace:
[   21.217756]  show_stack+0x20/0x38 (C)
[   21.217831]  dump_stack_lvl+0x8c/0xd0
[   21.217918]  print_report+0x118/0x608
[   21.218361]  kasan_report_invalid_free+0xc0/0xe8
[   21.218429]  __kasan_mempool_poison_object+0x14c/0x150
[   21.218635]  mempool_free+0x28c/0x328
[   21.218792]  mempool_double_free_helper+0x150/0x2e8
[   21.218880]  mempool_kmalloc_large_double_free+0xc0/0x118
[   21.218944]  kunit_try_run_case+0x170/0x3f0
[   21.219015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.219245]  kthread+0x328/0x630
[   21.219305]  ret_from_fork+0x10/0x20
[   21.219545] 
[   21.219587] The buggy address belongs to the physical page:
[   21.219629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8
[   21.219694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.219750] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.219817] page_type: f8(unknown)
[   21.220131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.220199] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.220285] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.220385] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.220449] head: 0bfffe0000000002 ffffc1ffc31e2e01 00000000ffffffff 00000000ffffffff
[   21.220556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.220607] page dumped because: kasan: bad access detected
[   21.220646] 
[   21.220666] Memory state around the buggy address:
[   21.220708]  fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220756]  fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220804] >fff00000c78b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220845]                    ^
[   21.220928]  fff00000c78b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.220990]  fff00000c78b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.221035] ==================================================================
[   21.231735] ==================================================================
[   21.231829] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.231924] Free of addr fff00000c78b8000 by task kunit_try_catch/239
[   21.231987] 
[   21.232040] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.232139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.232171] Hardware name: linux,dummy-virt (DT)
[   21.232213] Call trace:
[   21.232241]  show_stack+0x20/0x38 (C)
[   21.232303]  dump_stack_lvl+0x8c/0xd0
[   21.232356]  print_report+0x118/0x608
[   21.232410]  kasan_report_invalid_free+0xc0/0xe8
[   21.232463]  __kasan_mempool_poison_pages+0xe0/0xe8
[   21.232520]  mempool_free+0x24c/0x328
[   21.232574]  mempool_double_free_helper+0x150/0x2e8
[   21.232628]  mempool_page_alloc_double_free+0xbc/0x118
[   21.232685]  kunit_try_run_case+0x170/0x3f0
[   21.232739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.232795]  kthread+0x328/0x630
[   21.232847]  ret_from_fork+0x10/0x20
[   21.232901] 
[   21.232927] The buggy address belongs to the physical page:
[   21.232963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b8
[   21.233119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.233241] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.233309] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.233376] page dumped because: kasan: bad access detected
[   21.233422] 
[   21.233442] Memory state around the buggy address:
[   21.233481]  fff00000c78b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233529]  fff00000c78b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233599] >fff00000c78b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233652]                    ^
[   21.233688]  fff00000c78b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233749]  fff00000c78b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.233837] ==================================================================
[   21.201855] ==================================================================
[   21.201952] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.202056] Free of addr fff00000c6620300 by task kunit_try_catch/235
[   21.202106] 
[   21.202157] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.202256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.202286] Hardware name: linux,dummy-virt (DT)
[   21.202326] Call trace:
[   21.202354]  show_stack+0x20/0x38 (C)
[   21.203219]  dump_stack_lvl+0x8c/0xd0
[   21.203303]  print_report+0x118/0x608
[   21.203431]  kasan_report_invalid_free+0xc0/0xe8
[   21.203572]  check_slab_allocation+0xd4/0x108
[   21.203884]  __kasan_mempool_poison_object+0x78/0x150
[   21.203958]  mempool_free+0x28c/0x328
[   21.204282]  mempool_double_free_helper+0x150/0x2e8
[   21.204339]  mempool_kmalloc_double_free+0xc0/0x118
[   21.204853]  kunit_try_run_case+0x170/0x3f0
[   21.204950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.205085]  kthread+0x328/0x630
[   21.205164]  ret_from_fork+0x10/0x20
[   21.205221] 
[   21.205263] Allocated by task 235:
[   21.205357]  kasan_save_stack+0x3c/0x68
[   21.205474]  kasan_save_track+0x20/0x40
[   21.205530]  kasan_save_alloc_info+0x40/0x58
[   21.205614]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.205871]  remove_element+0x130/0x1f8
[   21.205998]  mempool_alloc_preallocated+0x58/0xc0
[   21.206300]  mempool_double_free_helper+0x94/0x2e8
[   21.206359]  mempool_kmalloc_double_free+0xc0/0x118
[   21.206444]  kunit_try_run_case+0x170/0x3f0
[   21.206511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.206561]  kthread+0x328/0x630
[   21.206602]  ret_from_fork+0x10/0x20
[   21.206662] 
[   21.206686] Freed by task 235:
[   21.206718]  kasan_save_stack+0x3c/0x68
[   21.206799]  kasan_save_track+0x20/0x40
[   21.206838]  kasan_save_free_info+0x4c/0x78
[   21.206884]  __kasan_mempool_poison_object+0xc0/0x150
[   21.206930]  mempool_free+0x28c/0x328
[   21.206980]  mempool_double_free_helper+0x100/0x2e8
[   21.207032]  mempool_kmalloc_double_free+0xc0/0x118
[   21.207355]  kunit_try_run_case+0x170/0x3f0
[   21.207427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207498]  kthread+0x328/0x630
[   21.207543]  ret_from_fork+0x10/0x20
[   21.207586] 
[   21.207609] The buggy address belongs to the object at fff00000c6620300
[   21.207609]  which belongs to the cache kmalloc-128 of size 128
[   21.207675] The buggy address is located 0 bytes inside of
[   21.207675]  128-byte region [fff00000c6620300, fff00000c6620380)
[   21.207743] 
[   21.207769] The buggy address belongs to the physical page:
[   21.207808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   21.207873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.207932] page_type: f5(slab)
[   21.207991] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.208394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.208458] page dumped because: kasan: bad access detected
[   21.208506] 
[   21.208531] Memory state around the buggy address:
[   21.208794]  fff00000c6620200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.209135]  fff00000c6620280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209241] >fff00000c6620300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.209450]                    ^
[   21.209496]  fff00000c6620380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209661]  fff00000c6620400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.209717] ==================================================================

[   12.784968] ==================================================================
[   12.785471] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.785804] Free of addr ffff888102ab8000 by task kunit_try_catch/254
[   12.786092] 
[   12.786199] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   12.786248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.786260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.786282] Call Trace:
[   12.786296]  <TASK>
[   12.786312]  dump_stack_lvl+0x73/0xb0
[   12.786342]  print_report+0xd1/0x650
[   12.786364]  ? __virt_addr_valid+0x1db/0x2d0
[   12.786390]  ? kasan_addr_to_slab+0x11/0xa0
[   12.786410]  ? mempool_double_free_helper+0x184/0x370
[   12.786435]  kasan_report_invalid_free+0x10a/0x130
[   12.786461]  ? mempool_double_free_helper+0x184/0x370
[   12.786492]  ? mempool_double_free_helper+0x184/0x370
[   12.786923]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   12.786959]  mempool_free+0x2ec/0x380
[   12.786986]  mempool_double_free_helper+0x184/0x370
[   12.787012]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.787040]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.787065]  ? finish_task_switch.isra.0+0x153/0x700
[   12.787091]  mempool_kmalloc_large_double_free+0xed/0x140
[   12.787117]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   12.787145]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.787164]  ? __pfx_mempool_kfree+0x10/0x10
[   12.787201]  ? __pfx_read_tsc+0x10/0x10
[   12.787223]  ? ktime_get_ts64+0x86/0x230
[   12.787250]  kunit_try_run_case+0x1a5/0x480
[   12.787275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.787297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.787321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.787344]  ? __kthread_parkme+0x82/0x180
[   12.787364]  ? preempt_count_sub+0x50/0x80
[   12.787389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.787413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.787436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.787459]  kthread+0x337/0x6f0
[   12.787478]  ? trace_preempt_on+0x20/0xc0
[   12.787503]  ? __pfx_kthread+0x10/0x10
[   12.787584]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.787608]  ? calculate_sigpending+0x7b/0xa0
[   12.787647]  ? __pfx_kthread+0x10/0x10
[   12.787670]  ret_from_fork+0x116/0x1d0
[   12.787690]  ? __pfx_kthread+0x10/0x10
[   12.787711]  ret_from_fork_asm+0x1a/0x30
[   12.787743]  </TASK>
[   12.787756] 
[   12.802811] The buggy address belongs to the physical page:
[   12.803198] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab8
[   12.803781] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.804270] flags: 0x200000000000040(head|node=0|zone=2)
[   12.804665] page_type: f8(unknown)
[   12.804858] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.805266] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.805806] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.806134] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.806492] head: 0200000000000002 ffffea00040aae01 00000000ffffffff 00000000ffffffff
[   12.807024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.807459] page dumped because: kasan: bad access detected
[   12.807809] 
[   12.807912] Memory state around the buggy address:
[   12.808225]  ffff888102ab7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.808674]  ffff888102ab7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.809038] >ffff888102ab8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.809447]                    ^
[   12.809642]  ffff888102ab8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.810114]  ffff888102ab8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.810501] ==================================================================
[   12.813718] ==================================================================
[   12.814186] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.814429] Free of addr ffff88810397c000 by task kunit_try_catch/256
[   12.815160] 
[   12.815550] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   12.815606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.815668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.815691] Call Trace:
[   12.815705]  <TASK>
[   12.815722]  dump_stack_lvl+0x73/0xb0
[   12.815754]  print_report+0xd1/0x650
[   12.815776]  ? __virt_addr_valid+0x1db/0x2d0
[   12.815802]  ? kasan_addr_to_slab+0x11/0xa0
[   12.815823]  ? mempool_double_free_helper+0x184/0x370
[   12.815847]  kasan_report_invalid_free+0x10a/0x130
[   12.815872]  ? mempool_double_free_helper+0x184/0x370
[   12.815899]  ? mempool_double_free_helper+0x184/0x370
[   12.815923]  __kasan_mempool_poison_pages+0x115/0x130
[   12.815948]  mempool_free+0x290/0x380
[   12.815971]  mempool_double_free_helper+0x184/0x370
[   12.815995]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.816028]  mempool_page_alloc_double_free+0xe8/0x140
[   12.816054]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   12.816082]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   12.816102]  ? __pfx_mempool_free_pages+0x10/0x10
[   12.816125]  ? __pfx_read_tsc+0x10/0x10
[   12.816145]  ? ktime_get_ts64+0x86/0x230
[   12.816170]  kunit_try_run_case+0x1a5/0x480
[   12.816196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.816284]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.816309]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.816331]  ? __kthread_parkme+0x82/0x180
[   12.816353]  ? preempt_count_sub+0x50/0x80
[   12.816378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.816401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.816424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.816447]  kthread+0x337/0x6f0
[   12.816467]  ? trace_preempt_on+0x20/0xc0
[   12.816490]  ? __pfx_kthread+0x10/0x10
[   12.816511]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.816574]  ? calculate_sigpending+0x7b/0xa0
[   12.816598]  ? __pfx_kthread+0x10/0x10
[   12.816631]  ret_from_fork+0x116/0x1d0
[   12.816650]  ? __pfx_kthread+0x10/0x10
[   12.816671]  ret_from_fork_asm+0x1a/0x30
[   12.816703]  </TASK>
[   12.816714] 
[   12.831956] The buggy address belongs to the physical page:
[   12.832483] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10397c
[   12.833268] flags: 0x200000000000000(node=0|zone=2)
[   12.833810] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   12.834177] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   12.834943] page dumped because: kasan: bad access detected
[   12.835306] 
[   12.835378] Memory state around the buggy address:
[   12.835535]  ffff88810397bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.836237]  ffff88810397bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.837069] >ffff88810397c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.837526]                    ^
[   12.837949]  ffff88810397c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.838271]  ffff88810397c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.838488] ==================================================================
[   12.742805] ==================================================================
[   12.743912] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.745291] Free of addr ffff8881039e2600 by task kunit_try_catch/252
[   12.745924] 
[   12.746028] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   12.746078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.746091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.746112] Call Trace:
[   12.746126]  <TASK>
[   12.746144]  dump_stack_lvl+0x73/0xb0
[   12.746174]  print_report+0xd1/0x650
[   12.746199]  ? __virt_addr_valid+0x1db/0x2d0
[   12.746225]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.746248]  ? mempool_double_free_helper+0x184/0x370
[   12.746273]  kasan_report_invalid_free+0x10a/0x130
[   12.746299]  ? mempool_double_free_helper+0x184/0x370
[   12.746324]  ? mempool_double_free_helper+0x184/0x370
[   12.746348]  ? mempool_double_free_helper+0x184/0x370
[   12.746370]  check_slab_allocation+0x101/0x130
[   12.746392]  __kasan_mempool_poison_object+0x91/0x1d0
[   12.746417]  mempool_free+0x2ec/0x380
[   12.746441]  mempool_double_free_helper+0x184/0x370
[   12.746471]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.746496]  ? update_load_avg+0x1be/0x21b0
[   12.746525]  ? finish_task_switch.isra.0+0x153/0x700
[   12.746551]  mempool_kmalloc_double_free+0xed/0x140
[   12.746575]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   12.746602]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.746633]  ? __pfx_mempool_kfree+0x10/0x10
[   12.746655]  ? __pfx_read_tsc+0x10/0x10
[   12.746711]  ? ktime_get_ts64+0x86/0x230
[   12.746897]  kunit_try_run_case+0x1a5/0x480
[   12.746928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.746950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.746974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.747012]  ? __kthread_parkme+0x82/0x180
[   12.747034]  ? preempt_count_sub+0x50/0x80
[   12.747058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.747094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.747117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.747152]  kthread+0x337/0x6f0
[   12.747173]  ? trace_preempt_on+0x20/0xc0
[   12.747197]  ? __pfx_kthread+0x10/0x10
[   12.747230]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.747250]  ? calculate_sigpending+0x7b/0xa0
[   12.747275]  ? __pfx_kthread+0x10/0x10
[   12.747308]  ret_from_fork+0x116/0x1d0
[   12.747327]  ? __pfx_kthread+0x10/0x10
[   12.747348]  ret_from_fork_asm+0x1a/0x30
[   12.747392]  </TASK>
[   12.747403] 
[   12.765150] Allocated by task 252:
[   12.765311]  kasan_save_stack+0x45/0x70
[   12.765803]  kasan_save_track+0x18/0x40
[   12.765998]  kasan_save_alloc_info+0x3b/0x50
[   12.766433]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.766797]  remove_element+0x11e/0x190
[   12.766964]  mempool_alloc_preallocated+0x4d/0x90
[   12.767369]  mempool_double_free_helper+0x8a/0x370
[   12.767817]  mempool_kmalloc_double_free+0xed/0x140
[   12.768151]  kunit_try_run_case+0x1a5/0x480
[   12.768321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.768770]  kthread+0x337/0x6f0
[   12.769052]  ret_from_fork+0x116/0x1d0
[   12.769342]  ret_from_fork_asm+0x1a/0x30
[   12.769605] 
[   12.769866] Freed by task 252:
[   12.770122]  kasan_save_stack+0x45/0x70
[   12.770271]  kasan_save_track+0x18/0x40
[   12.770677]  kasan_save_free_info+0x3f/0x60
[   12.770841]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.771260]  mempool_free+0x2ec/0x380
[   12.771508]  mempool_double_free_helper+0x109/0x370
[   12.771955]  mempool_kmalloc_double_free+0xed/0x140
[   12.772262]  kunit_try_run_case+0x1a5/0x480
[   12.772526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.773012]  kthread+0x337/0x6f0
[   12.773208]  ret_from_fork+0x116/0x1d0
[   12.773596]  ret_from_fork_asm+0x1a/0x30
[   12.773757] 
[   12.773878] The buggy address belongs to the object at ffff8881039e2600
[   12.773878]  which belongs to the cache kmalloc-128 of size 128
[   12.774370] The buggy address is located 0 bytes inside of
[   12.774370]  128-byte region [ffff8881039e2600, ffff8881039e2680)
[   12.775307] 
[   12.775640] The buggy address belongs to the physical page:
[   12.775895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e2
[   12.776456] flags: 0x200000000000000(node=0|zone=2)
[   12.776875] page_type: f5(slab)
[   12.777213] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.777779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.778221] page dumped because: kasan: bad access detected
[   12.778574] 
[   12.778798] Memory state around the buggy address:
[   12.779178]  ffff8881039e2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.779717]  ffff8881039e2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.780181] >ffff8881039e2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.780589]                    ^
[   12.780979]  ffff8881039e2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.781404]  ffff8881039e2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.781904] ==================================================================