Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.347580] ==================================================================
[   33.347640] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.347695] Free of addr fff00000c9b90000 by task kunit_try_catch/268
[   33.347737] 
[   33.347770] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.347853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.347881] Hardware name: linux,dummy-virt (DT)
[   33.347915] Call trace:
[   33.347938]  show_stack+0x20/0x38 (C)
[   33.347988]  dump_stack_lvl+0x8c/0xd0
[   33.348033]  print_report+0x118/0x5d0
[   33.348081]  kasan_report_invalid_free+0xc0/0xe8
[   33.348131]  __kasan_mempool_poison_object+0x14c/0x150
[   33.348658]  mempool_free+0x28c/0x328
[   33.348714]  mempool_double_free_helper+0x150/0x2e8
[   33.348799]  mempool_kmalloc_large_double_free+0xc0/0x118
[   33.348855]  kunit_try_run_case+0x170/0x3f0
[   33.348906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348960]  kthread+0x328/0x630
[   33.349002]  ret_from_fork+0x10/0x20
[   33.349050] 
[   33.349071] The buggy address belongs to the physical page:
[   33.349101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90
[   33.349156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.349203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.349267] page_type: f8(unknown)
[   33.349308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.349439] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.349621] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.349788] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.349906] head: 0bfffe0000000002 ffffc1ffc326e401 00000000ffffffff 00000000ffffffff
[   33.349961] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.350067] page dumped because: kasan: bad access detected
[   33.350098] 
[   33.350160] Memory state around the buggy address:
[   33.350277]  fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350321]  fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350363] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350429]                    ^
[   33.350464]  fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350841]  fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.350889] ==================================================================
[   33.367757] ==================================================================
[   33.367826] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.367883] Free of addr fff00000c9b94000 by task kunit_try_catch/270
[   33.367925] 
[   33.367957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.368044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.368069] Hardware name: linux,dummy-virt (DT)
[   33.368101] Call trace:
[   33.368124]  show_stack+0x20/0x38 (C)
[   33.368173]  dump_stack_lvl+0x8c/0xd0
[   33.368231]  print_report+0x118/0x5d0
[   33.368280]  kasan_report_invalid_free+0xc0/0xe8
[   33.368712]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.368787]  mempool_free+0x24c/0x328
[   33.368835]  mempool_double_free_helper+0x150/0x2e8
[   33.369335]  mempool_page_alloc_double_free+0xbc/0x118
[   33.369389]  kunit_try_run_case+0x170/0x3f0
[   33.369499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.369559]  kthread+0x328/0x630
[   33.369606]  ret_from_fork+0x10/0x20
[   33.370285] 
[   33.370394] The buggy address belongs to the physical page:
[   33.370428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b94
[   33.370483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.370547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.370914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.370961] page dumped because: kasan: bad access detected
[   33.370991] 
[   33.371079] Memory state around the buggy address:
[   33.371113]  fff00000c9b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371336]  fff00000c9b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371384] >fff00000c9b94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371421]                    ^
[   33.371686]  fff00000c9b94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371829]  fff00000c9b94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.371873] ==================================================================
[   33.335484] ==================================================================
[   33.335631] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   33.335790] Free of addr fff00000c9adf300 by task kunit_try_catch/266
[   33.335961] 
[   33.336042] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.336840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.336920] Hardware name: linux,dummy-virt (DT)
[   33.336952] Call trace:
[   33.336976]  show_stack+0x20/0x38 (C)
[   33.337095]  dump_stack_lvl+0x8c/0xd0
[   33.337200]  print_report+0x118/0x5d0
[   33.337497]  kasan_report_invalid_free+0xc0/0xe8
[   33.337566]  check_slab_allocation+0xd4/0x108
[   33.337663]  __kasan_mempool_poison_object+0x78/0x150
[   33.337715]  mempool_free+0x28c/0x328
[   33.337832]  mempool_double_free_helper+0x150/0x2e8
[   33.338035]  mempool_kmalloc_double_free+0xc0/0x118
[   33.338108]  kunit_try_run_case+0x170/0x3f0
[   33.338183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338246]  kthread+0x328/0x630
[   33.338290]  ret_from_fork+0x10/0x20
[   33.338338] 
[   33.338356] Allocated by task 266:
[   33.338387]  kasan_save_stack+0x3c/0x68
[   33.338446]  kasan_save_track+0x20/0x40
[   33.338557]  kasan_save_alloc_info+0x40/0x58
[   33.338596]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.338668]  remove_element+0x130/0x1f8
[   33.338706]  mempool_alloc_preallocated+0x58/0xc0
[   33.338777]  mempool_double_free_helper+0x94/0x2e8
[   33.338818]  mempool_kmalloc_double_free+0xc0/0x118
[   33.338874]  kunit_try_run_case+0x170/0x3f0
[   33.338912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338957]  kthread+0x328/0x630
[   33.338988]  ret_from_fork+0x10/0x20
[   33.339024] 
[   33.339041] Freed by task 266:
[   33.339066]  kasan_save_stack+0x3c/0x68
[   33.339105]  kasan_save_track+0x20/0x40
[   33.339143]  kasan_save_free_info+0x4c/0x78
[   33.339179]  __kasan_mempool_poison_object+0xc0/0x150
[   33.339266]  mempool_free+0x28c/0x328
[   33.339379]  mempool_double_free_helper+0x100/0x2e8
[   33.339475]  mempool_kmalloc_double_free+0xc0/0x118
[   33.339524]  kunit_try_run_case+0x170/0x3f0
[   33.339600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.339658]  kthread+0x328/0x630
[   33.339701]  ret_from_fork+0x10/0x20
[   33.339737] 
[   33.339756] The buggy address belongs to the object at fff00000c9adf300
[   33.339756]  which belongs to the cache kmalloc-128 of size 128
[   33.339815] The buggy address is located 0 bytes inside of
[   33.339815]  128-byte region [fff00000c9adf300, fff00000c9adf380)
[   33.339874] 
[   33.339893] The buggy address belongs to the physical page:
[   33.339923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   33.340073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.340120] page_type: f5(slab)
[   33.340164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.340290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.340331] page dumped because: kasan: bad access detected
[   33.340402] 
[   33.340419] Memory state around the buggy address:
[   33.340450]  fff00000c9adf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.340492]  fff00000c9adf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.340534] >fff00000c9adf300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.340579]                    ^
[   33.340610]  fff00000c9adf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.340688]  fff00000c9adf400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.341044] ==================================================================

[   25.074218] ==================================================================
[   25.074696] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.076532] Free of addr ffff888102668000 by task kunit_try_catch/285
[   25.077347] 
[   25.077457] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.077516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.077529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.077554] Call Trace:
[   25.077571]  <TASK>
[   25.077593]  dump_stack_lvl+0x73/0xb0
[   25.077631]  print_report+0xd1/0x610
[   25.077655]  ? __virt_addr_valid+0x1db/0x2d0
[   25.077684]  ? kasan_addr_to_slab+0x11/0xa0
[   25.077705]  ? mempool_double_free_helper+0x184/0x370
[   25.077730]  kasan_report_invalid_free+0x10a/0x130
[   25.077765]  ? mempool_double_free_helper+0x184/0x370
[   25.077792]  ? mempool_double_free_helper+0x184/0x370
[   25.077816]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   25.077841]  mempool_free+0x2ec/0x380
[   25.077872]  mempool_double_free_helper+0x184/0x370
[   25.077899]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.077925]  ? __kasan_check_write+0x18/0x20
[   25.077951]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.077975]  ? finish_task_switch.isra.0+0x153/0x700
[   25.078003]  mempool_kmalloc_large_double_free+0xed/0x140
[   25.078030]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   25.078056]  ? __kasan_check_write+0x18/0x20
[   25.078084]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.078109]  ? __pfx_mempool_kfree+0x10/0x10
[   25.078137]  ? __pfx_read_tsc+0x10/0x10
[   25.078164]  ? ktime_get_ts64+0x86/0x230
[   25.078189]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   25.078217]  kunit_try_run_case+0x1a5/0x480
[   25.078254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.078277]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.078300]  ? __kthread_parkme+0x82/0x180
[   25.078322]  ? preempt_count_sub+0x50/0x80
[   25.078346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.078368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.078395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.078423]  kthread+0x337/0x6f0
[   25.078445]  ? trace_preempt_on+0x20/0xc0
[   25.078471]  ? __pfx_kthread+0x10/0x10
[   25.078493]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.078521]  ? calculate_sigpending+0x7b/0xa0
[   25.078550]  ? __pfx_kthread+0x10/0x10
[   25.078574]  ret_from_fork+0x116/0x1d0
[   25.078594]  ? __pfx_kthread+0x10/0x10
[   25.078617]  ret_from_fork_asm+0x1a/0x30
[   25.078652]  </TASK>
[   25.078665] 
[   25.089632] The buggy address belongs to the physical page:
[   25.090324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102668
[   25.090669] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.091158] flags: 0x200000000000040(head|node=0|zone=2)
[   25.091371] page_type: f8(unknown)
[   25.091576] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.091992] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.092252] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.092597] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.092894] head: 0200000000000002 ffffea0004099a01 00000000ffffffff 00000000ffffffff
[   25.093228] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.093592] page dumped because: kasan: bad access detected
[   25.093875] 
[   25.093940] Memory state around the buggy address:
[   25.094248]  ffff888102667f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.094506]  ffff888102667f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.094816] >ffff888102668000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.095233]                    ^
[   25.095384]  ffff888102668080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.095959]  ffff888102668100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.096296] ==================================================================
[   25.099394] ==================================================================
[   25.100142] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.101126] Free of addr ffff88810266c000 by task kunit_try_catch/287
[   25.101498] 
[   25.101610] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.101664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.101678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.101701] Call Trace:
[   25.101717]  <TASK>
[   25.101745]  dump_stack_lvl+0x73/0xb0
[   25.101776]  print_report+0xd1/0x610
[   25.101802]  ? __virt_addr_valid+0x1db/0x2d0
[   25.101828]  ? kasan_addr_to_slab+0x11/0xa0
[   25.101847]  ? mempool_double_free_helper+0x184/0x370
[   25.101873]  kasan_report_invalid_free+0x10a/0x130
[   25.102204]  ? mempool_double_free_helper+0x184/0x370
[   25.102256]  ? mempool_double_free_helper+0x184/0x370
[   25.102283]  __kasan_mempool_poison_pages+0x115/0x130
[   25.102310]  mempool_free+0x290/0x380
[   25.102340]  mempool_double_free_helper+0x184/0x370
[   25.102365]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.102391]  ? __kasan_check_write+0x18/0x20
[   25.102418]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.102443]  ? finish_task_switch.isra.0+0x153/0x700
[   25.102471]  mempool_page_alloc_double_free+0xe8/0x140
[   25.102498]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.102527]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.102554]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.102583]  ? __pfx_read_tsc+0x10/0x10
[   25.102608]  ? ktime_get_ts64+0x86/0x230
[   25.102635]  kunit_try_run_case+0x1a5/0x480
[   25.102659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.102681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.102704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.102734]  ? __kthread_parkme+0x82/0x180
[   25.102809]  ? preempt_count_sub+0x50/0x80
[   25.102835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.102858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.102885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.102913]  kthread+0x337/0x6f0
[   25.102935]  ? trace_preempt_on+0x20/0xc0
[   25.102961]  ? __pfx_kthread+0x10/0x10
[   25.102983]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.103011]  ? calculate_sigpending+0x7b/0xa0
[   25.103039]  ? __pfx_kthread+0x10/0x10
[   25.103063]  ret_from_fork+0x116/0x1d0
[   25.103083]  ? __pfx_kthread+0x10/0x10
[   25.103106]  ret_from_fork_asm+0x1a/0x30
[   25.103141]  </TASK>
[   25.103154] 
[   25.114296] The buggy address belongs to the physical page:
[   25.114660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10266c
[   25.115095] flags: 0x200000000000000(node=0|zone=2)
[   25.115364] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.115669] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.116228] page dumped because: kasan: bad access detected
[   25.116539] 
[   25.116626] Memory state around the buggy address:
[   25.116815]  ffff88810266bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.117426]  ffff88810266bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.117783] >ffff88810266c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.118282]                    ^
[   25.118455]  ffff88810266c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.118866]  ffff88810266c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.119170] ==================================================================
[   25.039821] ==================================================================
[   25.040346] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.040697] Free of addr ffff8881062af400 by task kunit_try_catch/283
[   25.040938] 
[   25.041076] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.041133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.041147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.041179] Call Trace:
[   25.041371]  <TASK>
[   25.041402]  dump_stack_lvl+0x73/0xb0
[   25.041437]  print_report+0xd1/0x610
[   25.041462]  ? __virt_addr_valid+0x1db/0x2d0
[   25.041492]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.041521]  ? mempool_double_free_helper+0x184/0x370
[   25.041547]  kasan_report_invalid_free+0x10a/0x130
[   25.041572]  ? mempool_double_free_helper+0x184/0x370
[   25.041611]  ? mempool_double_free_helper+0x184/0x370
[   25.041637]  ? mempool_double_free_helper+0x184/0x370
[   25.041662]  check_slab_allocation+0x101/0x130
[   25.041695]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.041721]  mempool_free+0x2ec/0x380
[   25.041750]  ? __wake_up+0x49/0x60
[   25.041792]  mempool_double_free_helper+0x184/0x370
[   25.041828]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.041853]  ? update_load_avg+0x1be/0x21b0
[   25.041884]  ? finish_task_switch.isra.0+0x153/0x700
[   25.041921]  mempool_kmalloc_double_free+0xed/0x140
[   25.041946]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   25.041974]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.042019]  ? __pfx_mempool_kfree+0x10/0x10
[   25.042072]  ? __pfx_read_tsc+0x10/0x10
[   25.042099]  ? ktime_get_ts64+0x86/0x230
[   25.042127]  kunit_try_run_case+0x1a5/0x480
[   25.042153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.042182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.042205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.042250]  ? __kthread_parkme+0x82/0x180
[   25.042273]  ? preempt_count_sub+0x50/0x80
[   25.042297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.042320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.042349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.042378]  kthread+0x337/0x6f0
[   25.042400]  ? trace_preempt_on+0x20/0xc0
[   25.042427]  ? __pfx_kthread+0x10/0x10
[   25.042450]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.042479]  ? calculate_sigpending+0x7b/0xa0
[   25.042507]  ? __pfx_kthread+0x10/0x10
[   25.042532]  ret_from_fork+0x116/0x1d0
[   25.042552]  ? __pfx_kthread+0x10/0x10
[   25.042575]  ret_from_fork_asm+0x1a/0x30
[   25.042612]  </TASK>
[   25.042626] 
[   25.052547] Allocated by task 283:
[   25.052733]  kasan_save_stack+0x45/0x70
[   25.052990]  kasan_save_track+0x18/0x40
[   25.053182]  kasan_save_alloc_info+0x3b/0x50
[   25.053395]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.053615]  remove_element+0x11e/0x190
[   25.053869]  mempool_alloc_preallocated+0x4d/0x90
[   25.054146]  mempool_double_free_helper+0x8a/0x370
[   25.054384]  mempool_kmalloc_double_free+0xed/0x140
[   25.054599]  kunit_try_run_case+0x1a5/0x480
[   25.054819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.055121]  kthread+0x337/0x6f0
[   25.055299]  ret_from_fork+0x116/0x1d0
[   25.055533]  ret_from_fork_asm+0x1a/0x30
[   25.055676] 
[   25.055740] Freed by task 283:
[   25.055844]  kasan_save_stack+0x45/0x70
[   25.055971]  kasan_save_track+0x18/0x40
[   25.056097]  kasan_save_free_info+0x3f/0x60
[   25.056368]  __kasan_mempool_poison_object+0x131/0x1d0
[   25.056602]  mempool_free+0x2ec/0x380
[   25.056903]  mempool_double_free_helper+0x109/0x370
[   25.057378]  mempool_kmalloc_double_free+0xed/0x140
[   25.057599]  kunit_try_run_case+0x1a5/0x480
[   25.057738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.058044]  kthread+0x337/0x6f0
[   25.058247]  ret_from_fork+0x116/0x1d0
[   25.058406]  ret_from_fork_asm+0x1a/0x30
[   25.058592] 
[   25.058660] The buggy address belongs to the object at ffff8881062af400
[   25.058660]  which belongs to the cache kmalloc-128 of size 128
[   25.059012] The buggy address is located 0 bytes inside of
[   25.059012]  128-byte region [ffff8881062af400, ffff8881062af480)
[   25.059746] 
[   25.059884] The buggy address belongs to the physical page:
[   25.060152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   25.060427] flags: 0x200000000000000(node=0|zone=2)
[   25.060595] page_type: f5(slab)
[   25.060717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.061338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.061672] page dumped because: kasan: bad access detected
[   25.062080] 
[   25.062152] Memory state around the buggy address:
[   25.062418]  ffff8881062af300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.062638]  ffff8881062af380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.063324] >ffff8881062af400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.063670]                    ^
[   25.063926]  ffff8881062af480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.064220]  ffff8881062af500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.064496] ==================================================================