Hay
Date
June 18, 2025, 6:43 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.884947] ==================================================================
[   22.885108] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.885258] Free of addr fff00000c7791700 by task kunit_try_catch/245
[   22.885365] 
[   22.885452] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.885665] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.885741] Hardware name: linux,dummy-virt (DT)
[   22.885815] Call trace:
[   22.885866]  show_stack+0x20/0x38 (C)
[   22.885983]  dump_stack_lvl+0x8c/0xd0
[   22.886116]  print_report+0x118/0x608
[   22.886233]  kasan_report_invalid_free+0xc0/0xe8
[   22.887185]  check_slab_allocation+0xd4/0x108
[   22.887963]  __kasan_mempool_poison_object+0x78/0x150
[   22.888283]  mempool_free+0x28c/0x328
[   22.888572]  mempool_double_free_helper+0x150/0x2e8
[   22.888991]  mempool_kmalloc_double_free+0xc0/0x118
[   22.889582]  kunit_try_run_case+0x170/0x3f0
[   22.889731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.890156]  kthread+0x328/0x630
[   22.890396]  ret_from_fork+0x10/0x20
[   22.890625] 
[   22.890767] Allocated by task 245:
[   22.890912]  kasan_save_stack+0x3c/0x68
[   22.891405]  kasan_save_track+0x20/0x40
[   22.891827]  kasan_save_alloc_info+0x40/0x58
[   22.892246]  __kasan_mempool_unpoison_object+0x11c/0x180
[   22.892425]  remove_element+0x130/0x1f8
[   22.892819]  mempool_alloc_preallocated+0x58/0xc0
[   22.893103]  mempool_double_free_helper+0x94/0x2e8
[   22.893746]  mempool_kmalloc_double_free+0xc0/0x118
[   22.893874]  kunit_try_run_case+0x170/0x3f0
[   22.893970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.894959]  kthread+0x328/0x630
[   22.895326]  ret_from_fork+0x10/0x20
[   22.895512] 
[   22.895657] Freed by task 245:
[   22.895807]  kasan_save_stack+0x3c/0x68
[   22.895905]  kasan_save_track+0x20/0x40
[   22.896321]  kasan_save_free_info+0x4c/0x78
[   22.896949]  __kasan_mempool_poison_object+0xc0/0x150
[   22.897231]  mempool_free+0x28c/0x328
[   22.897418]  mempool_double_free_helper+0x100/0x2e8
[   22.897715]  mempool_kmalloc_double_free+0xc0/0x118
[   22.898111]  kunit_try_run_case+0x170/0x3f0
[   22.898210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.898751]  kthread+0x328/0x630
[   22.899262]  ret_from_fork+0x10/0x20
[   22.899581] 
[   22.899633] The buggy address belongs to the object at fff00000c7791700
[   22.899633]  which belongs to the cache kmalloc-128 of size 128
[   22.899783] The buggy address is located 0 bytes inside of
[   22.899783]  128-byte region [fff00000c7791700, fff00000c7791780)
[   22.899931] 
[   22.899979] The buggy address belongs to the physical page:
[   22.900914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791
[   22.901513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.902054] page_type: f5(slab)
[   22.902568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.903108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.903204] page dumped because: kasan: bad access detected
[   22.903908] 
[   22.904219] Memory state around the buggy address:
[   22.904314]  fff00000c7791600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.905110]  fff00000c7791680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.905235] >fff00000c7791700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.905330]                    ^
[   22.905399]  fff00000c7791780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.906197]  fff00000c7791800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.906866] ==================================================================
[   22.951273] ==================================================================
[   22.951454] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.951596] Free of addr fff00000c77c4000 by task kunit_try_catch/247
[   22.951688] 
[   22.951762] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.951939] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.951999] Hardware name: linux,dummy-virt (DT)
[   22.952136] Call trace:
[   22.952196]  show_stack+0x20/0x38 (C)
[   22.952334]  dump_stack_lvl+0x8c/0xd0
[   22.952452]  print_report+0x118/0x608
[   22.952580]  kasan_report_invalid_free+0xc0/0xe8
[   22.952828]  __kasan_mempool_poison_object+0x14c/0x150
[   22.953480]  mempool_free+0x28c/0x328
[   22.953652]  mempool_double_free_helper+0x150/0x2e8
[   22.953862]  mempool_kmalloc_large_double_free+0xc0/0x118
[   22.954083]  kunit_try_run_case+0x170/0x3f0
[   22.954243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.954356]  kthread+0x328/0x630
[   22.954482]  ret_from_fork+0x10/0x20
[   22.954600] 
[   22.954648] The buggy address belongs to the physical page:
[   22.955167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4
[   22.955544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.955678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.956769] page_type: f8(unknown)
[   22.956925] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.957082] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.957225] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.958363] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.958656] head: 0bfffe0000000002 ffffc1ffc31df101 00000000ffffffff 00000000ffffffff
[   22.959373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.959492] page dumped because: kasan: bad access detected
[   22.959624] 
[   22.959669] Memory state around the buggy address:
[   22.960578]  fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.960724]  fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.960837] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.960937]                    ^
[   22.961011]  fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.961789]  fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.962040] ==================================================================
[   22.988250] ==================================================================
[   22.988435] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   22.988603] Free of addr fff00000c77c4000 by task kunit_try_catch/249
[   22.988717] 
[   22.988814] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc2-next-20250618 #1 PREEMPT 
[   22.989552] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.989884] Hardware name: linux,dummy-virt (DT)
[   22.990088] Call trace:
[   22.990181]  show_stack+0x20/0x38 (C)
[   22.990531]  dump_stack_lvl+0x8c/0xd0
[   22.990905]  print_report+0x118/0x608
[   22.991285]  kasan_report_invalid_free+0xc0/0xe8
[   22.991658]  __kasan_mempool_poison_pages+0xe0/0xe8
[   22.991843]  mempool_free+0x24c/0x328
[   22.991962]  mempool_double_free_helper+0x150/0x2e8
[   22.992196]  mempool_page_alloc_double_free+0xbc/0x118
[   22.992347]  kunit_try_run_case+0x170/0x3f0
[   22.992459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.992593]  kthread+0x328/0x630
[   22.992696]  ret_from_fork+0x10/0x20
[   22.992815] 
[   22.992869] The buggy address belongs to the physical page:
[   22.992953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4
[   22.993114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.993289] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.994553] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.994820] page dumped because: kasan: bad access detected
[   22.995009] 
[   22.995102] Memory state around the buggy address:
[   22.995204]  fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.995320]  fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.995417] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.995509]                    ^
[   22.995586]  fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.996171]  fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.996580] ==================================================================

[   12.822958] ==================================================================
[   12.824062] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.825115] Free of addr ffff888103888000 by task kunit_try_catch/265
[   12.826331] 
[   12.826758] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   12.826813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.826865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.826889] Call Trace:
[   12.826901]  <TASK>
[   12.826916]  dump_stack_lvl+0x73/0xb0
[   12.826946]  print_report+0xd1/0x650
[   12.826966]  ? __virt_addr_valid+0x1db/0x2d0
[   12.826988]  ? kasan_addr_to_slab+0x11/0xa0
[   12.827007]  ? mempool_double_free_helper+0x184/0x370
[   12.827030]  kasan_report_invalid_free+0x10a/0x130
[   12.827053]  ? mempool_double_free_helper+0x184/0x370
[   12.827078]  ? mempool_double_free_helper+0x184/0x370
[   12.827100]  __kasan_mempool_poison_pages+0x115/0x130
[   12.827123]  mempool_free+0x290/0x380
[   12.827146]  mempool_double_free_helper+0x184/0x370
[   12.827187]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.827220]  ? __kasan_check_write+0x18/0x20
[   12.827241]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.827263]  ? finish_task_switch.isra.0+0x153/0x700
[   12.827287]  mempool_page_alloc_double_free+0xe8/0x140
[   12.827311]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   12.827338]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   12.827360]  ? __pfx_mempool_free_pages+0x10/0x10
[   12.827384]  ? __pfx_read_tsc+0x10/0x10
[   12.827405]  ? ktime_get_ts64+0x86/0x230
[   12.827445]  kunit_try_run_case+0x1a5/0x480
[   12.827468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.827488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.827510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.827531]  ? __kthread_parkme+0x82/0x180
[   12.827550]  ? preempt_count_sub+0x50/0x80
[   12.827571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.827593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.827615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.827636]  kthread+0x337/0x6f0
[   12.827655]  ? trace_preempt_on+0x20/0xc0
[   12.827677]  ? __pfx_kthread+0x10/0x10
[   12.827696]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.827715]  ? calculate_sigpending+0x7b/0xa0
[   12.827737]  ? __pfx_kthread+0x10/0x10
[   12.827757]  ret_from_fork+0x116/0x1d0
[   12.827776]  ? __pfx_kthread+0x10/0x10
[   12.827794]  ret_from_fork_asm+0x1a/0x30
[   12.827825]  </TASK>
[   12.827835] 
[   12.842951] The buggy address belongs to the physical page:
[   12.843138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88810388e600 pfn:0x103888
[   12.843487] flags: 0x200000000000000(node=0|zone=2)
[   12.843679] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   12.843980] raw: ffff88810388e600 0000000000000000 00000001ffffffff 0000000000000000
[   12.844258] page dumped because: kasan: bad access detected
[   12.844436] 
[   12.844499] Memory state around the buggy address:
[   12.844716]  ffff888103887f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.845186]  ffff888103887f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.845464] >ffff888103888000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.845668]                    ^
[   12.845777]  ffff888103888080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.846338]  ffff888103888100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.846761] ==================================================================
[   12.803024] ==================================================================
[   12.803707] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.804149] Free of addr ffff888102b48000 by task kunit_try_catch/263
[   12.804424] 
[   12.804562] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   12.804615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.804629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.804656] Call Trace:
[   12.804670]  <TASK>
[   12.804686]  dump_stack_lvl+0x73/0xb0
[   12.804716]  print_report+0xd1/0x650
[   12.804737]  ? __virt_addr_valid+0x1db/0x2d0
[   12.804760]  ? kasan_addr_to_slab+0x11/0xa0
[   12.804780]  ? mempool_double_free_helper+0x184/0x370
[   12.804804]  kasan_report_invalid_free+0x10a/0x130
[   12.804827]  ? mempool_double_free_helper+0x184/0x370
[   12.804852]  ? mempool_double_free_helper+0x184/0x370
[   12.804874]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   12.804897]  mempool_free+0x2ec/0x380
[   12.804921]  mempool_double_free_helper+0x184/0x370
[   12.804944]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.804968]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.804992]  ? finish_task_switch.isra.0+0x153/0x700
[   12.805017]  mempool_kmalloc_large_double_free+0xed/0x140
[   12.805040]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   12.805066]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.805088]  ? __pfx_mempool_kfree+0x10/0x10
[   12.805111]  ? __pfx_read_tsc+0x10/0x10
[   12.805132]  ? ktime_get_ts64+0x86/0x230
[   12.805156]  kunit_try_run_case+0x1a5/0x480
[   12.805180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.805201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.805234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.805256]  ? __kthread_parkme+0x82/0x180
[   12.805276]  ? preempt_count_sub+0x50/0x80
[   12.805297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.805320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.805343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.805364]  kthread+0x337/0x6f0
[   12.805382]  ? trace_preempt_on+0x20/0xc0
[   12.805406]  ? __pfx_kthread+0x10/0x10
[   12.805425]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.805444]  ? calculate_sigpending+0x7b/0xa0
[   12.805467]  ? __pfx_kthread+0x10/0x10
[   12.805488]  ret_from_fork+0x116/0x1d0
[   12.805505]  ? __pfx_kthread+0x10/0x10
[   12.805525]  ret_from_fork_asm+0x1a/0x30
[   12.805553]  </TASK>
[   12.805564] 
[   12.813698] The buggy address belongs to the physical page:
[   12.813870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48
[   12.814473] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.814815] flags: 0x200000000000040(head|node=0|zone=2)
[   12.815082] page_type: f8(unknown)
[   12.815289] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.815668] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   12.815885] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.816100] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   12.816432] head: 0200000000000002 ffffea00040ad201 00000000ffffffff 00000000ffffffff
[   12.816956] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.817181] page dumped because: kasan: bad access detected
[   12.817725] 
[   12.817822] Memory state around the buggy address:
[   12.817964]  ffff888102b47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.818167]  ffff888102b47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.818542] >ffff888102b48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.818854]                    ^
[   12.818959]  ffff888102b48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.819159]  ffff888102b48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.819489] ==================================================================
[   12.756357] ==================================================================
[   12.757718] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   12.758830] Free of addr ffff8881038fb600 by task kunit_try_catch/261
[   12.759535] 
[   12.759882] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) 
[   12.759934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.759946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.759967] Call Trace:
[   12.759978]  <TASK>
[   12.759995]  dump_stack_lvl+0x73/0xb0
[   12.760023]  print_report+0xd1/0x650
[   12.760044]  ? __virt_addr_valid+0x1db/0x2d0
[   12.760067]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.760091]  ? mempool_double_free_helper+0x184/0x370
[   12.760113]  kasan_report_invalid_free+0x10a/0x130
[   12.760136]  ? mempool_double_free_helper+0x184/0x370
[   12.760160]  ? mempool_double_free_helper+0x184/0x370
[   12.760329]  ? mempool_double_free_helper+0x184/0x370
[   12.760352]  check_slab_allocation+0x101/0x130
[   12.760373]  __kasan_mempool_poison_object+0x91/0x1d0
[   12.760409]  mempool_free+0x2ec/0x380
[   12.760485]  mempool_double_free_helper+0x184/0x370
[   12.760511]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   12.760536]  ? __pfx_sched_clock_cpu+0x10/0x10
[   12.760559]  ? finish_task_switch.isra.0+0x153/0x700
[   12.760583]  mempool_kmalloc_double_free+0xed/0x140
[   12.760606]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   12.760631]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.760655]  ? __pfx_mempool_kfree+0x10/0x10
[   12.760679]  ? __pfx_read_tsc+0x10/0x10
[   12.760700]  ? ktime_get_ts64+0x86/0x230
[   12.760725]  kunit_try_run_case+0x1a5/0x480
[   12.760747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.760767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.760790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.760811]  ? __kthread_parkme+0x82/0x180
[   12.760829]  ? preempt_count_sub+0x50/0x80
[   12.760851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.760873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.760895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.760917]  kthread+0x337/0x6f0
[   12.760936]  ? trace_preempt_on+0x20/0xc0
[   12.760958]  ? __pfx_kthread+0x10/0x10
[   12.760978]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.760996]  ? calculate_sigpending+0x7b/0xa0
[   12.761019]  ? __pfx_kthread+0x10/0x10
[   12.761039]  ret_from_fork+0x116/0x1d0
[   12.761057]  ? __pfx_kthread+0x10/0x10
[   12.761077]  ret_from_fork_asm+0x1a/0x30
[   12.761106]  </TASK>
[   12.761116] 
[   12.779070] Allocated by task 261:
[   12.779522]  kasan_save_stack+0x45/0x70
[   12.779942]  kasan_save_track+0x18/0x40
[   12.780344]  kasan_save_alloc_info+0x3b/0x50
[   12.780864]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.781385]  remove_element+0x11e/0x190
[   12.781856]  mempool_alloc_preallocated+0x4d/0x90
[   12.782320]  mempool_double_free_helper+0x8a/0x370
[   12.782862]  mempool_kmalloc_double_free+0xed/0x140
[   12.783348]  kunit_try_run_case+0x1a5/0x480
[   12.783806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.784318]  kthread+0x337/0x6f0
[   12.784520]  ret_from_fork+0x116/0x1d0
[   12.784972]  ret_from_fork_asm+0x1a/0x30
[   12.785370] 
[   12.785495] Freed by task 261:
[   12.785828]  kasan_save_stack+0x45/0x70
[   12.786132]  kasan_save_track+0x18/0x40
[   12.786400]  kasan_save_free_info+0x3f/0x60
[   12.786834]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.787266]  mempool_free+0x2ec/0x380
[   12.787391]  mempool_double_free_helper+0x109/0x370
[   12.787944]  mempool_kmalloc_double_free+0xed/0x140
[   12.788434]  kunit_try_run_case+0x1a5/0x480
[   12.788850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.789016]  kthread+0x337/0x6f0
[   12.789125]  ret_from_fork+0x116/0x1d0
[   12.789554]  ret_from_fork_asm+0x1a/0x30
[   12.790031] 
[   12.790278] The buggy address belongs to the object at ffff8881038fb600
[   12.790278]  which belongs to the cache kmalloc-128 of size 128
[   12.791672] The buggy address is located 0 bytes inside of
[   12.791672]  128-byte region [ffff8881038fb600, ffff8881038fb680)
[   12.792627] 
[   12.792730] The buggy address belongs to the physical page:
[   12.793013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038fb
[   12.793836] flags: 0x200000000000000(node=0|zone=2)
[   12.794194] page_type: f5(slab)
[   12.794535] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.794757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.794967] page dumped because: kasan: bad access detected
[   12.795123] 
[   12.795238] Memory state around the buggy address:
[   12.795763]  ffff8881038fb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.796486]  ffff8881038fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.797219] >ffff8881038fb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.797937]                    ^
[   12.798303]  ffff8881038fb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.799014]  ffff8881038fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.799757] ==================================================================