Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.729808] ==================================================================
[   35.729940] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.730112] Free of addr fff00000c77b0000 by task kunit_try_catch/249
[   35.730216] 
[   35.730294] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.730490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.730596] Hardware name: linux,dummy-virt (DT)
[   35.730764] Call trace:
[   35.730835]  show_stack+0x20/0x38 (C)
[   35.730988]  dump_stack_lvl+0x8c/0xd0
[   35.731144]  print_report+0x118/0x608
[   35.731282]  kasan_report_invalid_free+0xc0/0xe8
[   35.731452]  __kasan_mempool_poison_object+0x14c/0x150
[   35.731684]  mempool_free+0x28c/0x328
[   35.731819]  mempool_double_free_helper+0x150/0x2e8
[   35.731942]  mempool_kmalloc_large_double_free+0xc0/0x118
[   35.732096]  kunit_try_run_case+0x170/0x3f0
[   35.732291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.732427]  kthread+0x328/0x630
[   35.732596]  ret_from_fork+0x10/0x20
[   35.732806] 
[   35.732860] The buggy address belongs to the physical page:
[   35.732935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   35.733086] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.733274] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.733465] page_type: f8(unknown)
[   35.733572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.733707] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.733889] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.734104] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   35.734321] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff
[   35.734442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.734535] page dumped because: kasan: bad access detected
[   35.734866] 
[   35.735557] Memory state around the buggy address:
[   35.735624]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735679]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735744] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735822]                    ^
[   35.735864]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735916]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.735961] ==================================================================
[   35.755618] ==================================================================
[   35.755704] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.755835] Free of addr fff00000c77b0000 by task kunit_try_catch/251
[   35.755934] 
[   35.756005] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.756223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.756289] Hardware name: linux,dummy-virt (DT)
[   35.756357] Call trace:
[   35.756407]  show_stack+0x20/0x38 (C)
[   35.756545]  dump_stack_lvl+0x8c/0xd0
[   35.756664]  print_report+0x118/0x608
[   35.756785]  kasan_report_invalid_free+0xc0/0xe8
[   35.756908]  __kasan_mempool_poison_pages+0xe0/0xe8
[   35.757045]  mempool_free+0x24c/0x328
[   35.757163]  mempool_double_free_helper+0x150/0x2e8
[   35.757280]  mempool_page_alloc_double_free+0xbc/0x118
[   35.757405]  kunit_try_run_case+0x170/0x3f0
[   35.757523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.757661]  kthread+0x328/0x630
[   35.757915]  ret_from_fork+0x10/0x20
[   35.758076] 
[   35.758140] The buggy address belongs to the physical page:
[   35.758276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   35.758425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.759131] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.759623] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.759766] page dumped because: kasan: bad access detected
[   35.759848] 
[   35.759896] Memory state around the buggy address:
[   35.760051]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.760176]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.760329] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.760744]                    ^
[   35.760836]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.761002]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.761095] ==================================================================
[   35.693015] ==================================================================
[   35.693650] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.694297] Free of addr fff00000c76da400 by task kunit_try_catch/247
[   35.694403] 
[   35.695529] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   35.695856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.695969] Hardware name: linux,dummy-virt (DT)
[   35.696067] Call trace:
[   35.696164]  show_stack+0x20/0x38 (C)
[   35.696296]  dump_stack_lvl+0x8c/0xd0
[   35.696416]  print_report+0x118/0x608
[   35.696767]  kasan_report_invalid_free+0xc0/0xe8
[   35.697157]  check_slab_allocation+0xd4/0x108
[   35.697521]  __kasan_mempool_poison_object+0x78/0x150
[   35.697747]  mempool_free+0x28c/0x328
[   35.698041]  mempool_double_free_helper+0x150/0x2e8
[   35.698188]  mempool_kmalloc_double_free+0xc0/0x118
[   35.698331]  kunit_try_run_case+0x170/0x3f0
[   35.698454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.698668]  kthread+0x328/0x630
[   35.698852]  ret_from_fork+0x10/0x20
[   35.698987] 
[   35.699061] Allocated by task 247:
[   35.699209]  kasan_save_stack+0x3c/0x68
[   35.699364]  kasan_save_track+0x20/0x40
[   35.699622]  kasan_save_alloc_info+0x40/0x58
[   35.699730]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.700387]  remove_element+0x130/0x1f8
[   35.700846]  mempool_alloc_preallocated+0x58/0xc0
[   35.701731]  mempool_double_free_helper+0x94/0x2e8
[   35.702045]  mempool_kmalloc_double_free+0xc0/0x118
[   35.702153]  kunit_try_run_case+0x170/0x3f0
[   35.702249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.702896]  kthread+0x328/0x630
[   35.703564]  ret_from_fork+0x10/0x20
[   35.703926] 
[   35.704055] Freed by task 247:
[   35.704176]  kasan_save_stack+0x3c/0x68
[   35.704423]  kasan_save_track+0x20/0x40
[   35.704999]  kasan_save_free_info+0x4c/0x78
[   35.705128]  __kasan_mempool_poison_object+0xc0/0x150
[   35.705337]  mempool_free+0x28c/0x328
[   35.705458]  mempool_double_free_helper+0x100/0x2e8
[   35.705562]  mempool_kmalloc_double_free+0xc0/0x118
[   35.705710]  kunit_try_run_case+0x170/0x3f0
[   35.705940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.706100]  kthread+0x328/0x630
[   35.706333]  ret_from_fork+0x10/0x20
[   35.706437] 
[   35.706620] The buggy address belongs to the object at fff00000c76da400
[   35.706620]  which belongs to the cache kmalloc-128 of size 128
[   35.706785] The buggy address is located 0 bytes inside of
[   35.706785]  128-byte region [fff00000c76da400, fff00000c76da480)
[   35.707061] 
[   35.707159] The buggy address belongs to the physical page:
[   35.707289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   35.707504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.707631] page_type: f5(slab)
[   35.707733] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.707946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.708100] page dumped because: kasan: bad access detected
[   35.708210] 
[   35.708259] Memory state around the buggy address:
[   35.708414]  fff00000c76da300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.708520]  fff00000c76da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.708618] >fff00000c76da400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.708765]                    ^
[   35.708970]  fff00000c76da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709163]  fff00000c76da500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.709350] ==================================================================

[   23.563952] ==================================================================
[   23.564655] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.565582] Free of addr ffff88810381c000 by task kunit_try_catch/266
[   23.566100] 
[   23.566222] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.566306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.566324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.566354] Call Trace:
[   23.566375]  <TASK>
[   23.566413]  dump_stack_lvl+0x73/0xb0
[   23.566457]  print_report+0xd1/0x650
[   23.566488]  ? __virt_addr_valid+0x1db/0x2d0
[   23.566520]  ? kasan_addr_to_slab+0x11/0xa0
[   23.566548]  ? mempool_double_free_helper+0x184/0x370
[   23.566579]  kasan_report_invalid_free+0x10a/0x130
[   23.566609]  ? mempool_double_free_helper+0x184/0x370
[   23.566646]  ? mempool_double_free_helper+0x184/0x370
[   23.566671]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   23.566698]  mempool_free+0x2ec/0x380
[   23.566728]  mempool_double_free_helper+0x184/0x370
[   23.566753]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.566780]  ? __kasan_check_write+0x18/0x20
[   23.566808]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.566834]  ? finish_task_switch.isra.0+0x153/0x700
[   23.566861]  mempool_kmalloc_large_double_free+0xed/0x140
[   23.566881]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   23.566903]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.566921]  ? __pfx_mempool_kfree+0x10/0x10
[   23.566941]  ? __pfx_read_tsc+0x10/0x10
[   23.566959]  ? ktime_get_ts64+0x86/0x230
[   23.566979]  kunit_try_run_case+0x1a5/0x480
[   23.566998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.567017]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.567035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.567054]  ? __kthread_parkme+0x82/0x180
[   23.567074]  ? preempt_count_sub+0x50/0x80
[   23.567107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.567138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.567159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.567178]  kthread+0x337/0x6f0
[   23.567194]  ? trace_preempt_on+0x20/0xc0
[   23.567213]  ? __pfx_kthread+0x10/0x10
[   23.567231]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.567248]  ? calculate_sigpending+0x7b/0xa0
[   23.567268]  ? __pfx_kthread+0x10/0x10
[   23.567286]  ret_from_fork+0x116/0x1d0
[   23.567301]  ? __pfx_kthread+0x10/0x10
[   23.567318]  ret_from_fork_asm+0x1a/0x30
[   23.567344]  </TASK>
[   23.567355] 
[   23.577567] The buggy address belongs to the physical page:
[   23.577909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10381c
[   23.578294] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.578541] flags: 0x200000000000040(head|node=0|zone=2)
[   23.578733] page_type: f8(unknown)
[   23.578896] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.579190] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.579588] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.580228] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.580640] head: 0200000000000002 ffffea00040e0701 00000000ffffffff 00000000ffffffff
[   23.580900] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.581563] page dumped because: kasan: bad access detected
[   23.581747] 
[   23.581870] Memory state around the buggy address:
[   23.582328]  ffff88810381bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.582597]  ffff88810381bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.583043] >ffff88810381c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.583622]                    ^
[   23.583769]  ffff88810381c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.583982]  ffff88810381c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.584348] ==================================================================
[   23.594114] ==================================================================
[   23.594499] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.594886] Free of addr ffff888103a94000 by task kunit_try_catch/268
[   23.595090] 
[   23.595472] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.595556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.595578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.595613] Call Trace:
[   23.595637]  <TASK>
[   23.596100]  dump_stack_lvl+0x73/0xb0
[   23.596173]  print_report+0xd1/0x650
[   23.596210]  ? __virt_addr_valid+0x1db/0x2d0
[   23.596245]  ? kasan_addr_to_slab+0x11/0xa0
[   23.596276]  ? mempool_double_free_helper+0x184/0x370
[   23.596315]  kasan_report_invalid_free+0x10a/0x130
[   23.596357]  ? mempool_double_free_helper+0x184/0x370
[   23.596414]  ? mempool_double_free_helper+0x184/0x370
[   23.596757]  __kasan_mempool_poison_pages+0x115/0x130
[   23.596791]  mempool_free+0x290/0x380
[   23.596818]  mempool_double_free_helper+0x184/0x370
[   23.596854]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.596881]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.596900]  ? finish_task_switch.isra.0+0x153/0x700
[   23.596923]  mempool_page_alloc_double_free+0xe8/0x140
[   23.596945]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   23.596969]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   23.596989]  ? __pfx_mempool_free_pages+0x10/0x10
[   23.597011]  ? __pfx_read_tsc+0x10/0x10
[   23.597030]  ? ktime_get_ts64+0x86/0x230
[   23.597052]  kunit_try_run_case+0x1a5/0x480
[   23.597088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.597142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.597180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.597204]  ? __kthread_parkme+0x82/0x180
[   23.597223]  ? preempt_count_sub+0x50/0x80
[   23.597243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.597264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.597285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.597308]  kthread+0x337/0x6f0
[   23.597324]  ? trace_preempt_on+0x20/0xc0
[   23.597344]  ? __pfx_kthread+0x10/0x10
[   23.597361]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.597396]  ? calculate_sigpending+0x7b/0xa0
[   23.597419]  ? __pfx_kthread+0x10/0x10
[   23.597439]  ret_from_fork+0x116/0x1d0
[   23.597454]  ? __pfx_kthread+0x10/0x10
[   23.597472]  ret_from_fork_asm+0x1a/0x30
[   23.597505]  </TASK>
[   23.597516] 
[   23.606888] The buggy address belongs to the physical page:
[   23.607430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a94
[   23.607851] flags: 0x200000000000000(node=0|zone=2)
[   23.608213] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   23.608689] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.609325] page dumped because: kasan: bad access detected
[   23.609692] 
[   23.609828] Memory state around the buggy address:
[   23.610190]  ffff888103a93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.610645]  ffff888103a93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.610931] >ffff888103a94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.611154]                    ^
[   23.611280]  ffff888103a94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.611805]  ffff888103a94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.612421] ==================================================================
[   23.522576] ==================================================================
[   23.523013] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   23.523695] Free of addr ffff8881023acd00 by task kunit_try_catch/264
[   23.523958] 
[   23.524112] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.524344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.524370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.524420] Call Trace:
[   23.524444]  <TASK>
[   23.524476]  dump_stack_lvl+0x73/0xb0
[   23.524535]  print_report+0xd1/0x650
[   23.524575]  ? __virt_addr_valid+0x1db/0x2d0
[   23.524622]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.524667]  ? mempool_double_free_helper+0x184/0x370
[   23.524711]  kasan_report_invalid_free+0x10a/0x130
[   23.524755]  ? mempool_double_free_helper+0x184/0x370
[   23.524801]  ? mempool_double_free_helper+0x184/0x370
[   23.524838]  ? mempool_double_free_helper+0x184/0x370
[   23.524906]  check_slab_allocation+0x101/0x130
[   23.524928]  __kasan_mempool_poison_object+0x91/0x1d0
[   23.524950]  mempool_free+0x2ec/0x380
[   23.524974]  mempool_double_free_helper+0x184/0x370
[   23.524995]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   23.525017]  ? __kasan_check_write+0x18/0x20
[   23.525038]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.525056]  ? irqentry_exit+0x2a/0x60
[   23.525167]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.525197]  mempool_kmalloc_double_free+0xed/0x140
[   23.525219]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   23.525242]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.525262]  ? __pfx_mempool_kfree+0x10/0x10
[   23.525283]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   23.525306]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   23.525328]  kunit_try_run_case+0x1a5/0x480
[   23.525350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.525370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.525409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.525434]  ? __kthread_parkme+0x82/0x180
[   23.525460]  ? preempt_count_sub+0x50/0x80
[   23.525480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.525501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.525521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.525542]  kthread+0x337/0x6f0
[   23.525558]  ? trace_preempt_on+0x20/0xc0
[   23.525578]  ? __pfx_kthread+0x10/0x10
[   23.525596]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.525614]  ? calculate_sigpending+0x7b/0xa0
[   23.525636]  ? __pfx_kthread+0x10/0x10
[   23.525655]  ret_from_fork+0x116/0x1d0
[   23.525672]  ? __pfx_kthread+0x10/0x10
[   23.525689]  ret_from_fork_asm+0x1a/0x30
[   23.525717]  </TASK>
[   23.525729] 
[   23.539884] Allocated by task 264:
[   23.540346]  kasan_save_stack+0x45/0x70
[   23.540617]  kasan_save_track+0x18/0x40
[   23.541363]  kasan_save_alloc_info+0x3b/0x50
[   23.541871]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.542313]  remove_element+0x11e/0x190
[   23.542593]  mempool_alloc_preallocated+0x4d/0x90
[   23.543073]  mempool_double_free_helper+0x8a/0x370
[   23.543435]  mempool_kmalloc_double_free+0xed/0x140
[   23.543769]  kunit_try_run_case+0x1a5/0x480
[   23.544179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.544373]  kthread+0x337/0x6f0
[   23.544514]  ret_from_fork+0x116/0x1d0
[   23.544656]  ret_from_fork_asm+0x1a/0x30
[   23.544937] 
[   23.545535] Freed by task 264:
[   23.545700]  kasan_save_stack+0x45/0x70
[   23.546024]  kasan_save_track+0x18/0x40
[   23.546419]  kasan_save_free_info+0x3f/0x60
[   23.546612]  __kasan_mempool_poison_object+0x131/0x1d0
[   23.546793]  mempool_free+0x2ec/0x380
[   23.546920]  mempool_double_free_helper+0x109/0x370
[   23.547053]  mempool_kmalloc_double_free+0xed/0x140
[   23.547202]  kunit_try_run_case+0x1a5/0x480
[   23.547347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.547937]  kthread+0x337/0x6f0
[   23.548169]  ret_from_fork+0x116/0x1d0
[   23.548488]  ret_from_fork_asm+0x1a/0x30
[   23.548770] 
[   23.548849] The buggy address belongs to the object at ffff8881023acd00
[   23.548849]  which belongs to the cache kmalloc-128 of size 128
[   23.550133] The buggy address is located 0 bytes inside of
[   23.550133]  128-byte region [ffff8881023acd00, ffff8881023acd80)
[   23.550470] 
[   23.550563] The buggy address belongs to the physical page:
[   23.550793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023ac
[   23.551093] flags: 0x200000000000000(node=0|zone=2)
[   23.551292] page_type: f5(slab)
[   23.551444] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.552051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.552695] page dumped because: kasan: bad access detected
[   23.553764] 
[   23.554797] Memory state around the buggy address:
[   23.555004]  ffff8881023acc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.555212]  ffff8881023acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.555591] >ffff8881023acd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.556109]                    ^
[   23.556624]  ffff8881023acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.557015]  ffff8881023ace00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.557423] ==================================================================