Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.514933] ==================================================================
[   31.514999] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.515072] Free of addr fff00000c9ad4000 by task kunit_try_catch/271
[   31.515120] 
[   31.515164] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.515261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.515353] Hardware name: linux,dummy-virt (DT)
[   31.515703] Call trace:
[   31.515726]  show_stack+0x20/0x38 (C)
[   31.515807]  dump_stack_lvl+0x8c/0xd0
[   31.516237]  print_report+0x118/0x5d0
[   31.516422]  kasan_report_invalid_free+0xc0/0xe8
[   31.516476]  __kasan_mempool_poison_pages+0xe0/0xe8
[   31.516533]  mempool_free+0x24c/0x328
[   31.516581]  mempool_double_free_helper+0x150/0x2e8
[   31.516635]  mempool_page_alloc_double_free+0xbc/0x118
[   31.516691]  kunit_try_run_case+0x170/0x3f0
[   31.516741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.517286]  kthread+0x328/0x630
[   31.517372]  ret_from_fork+0x10/0x20
[   31.517481] 
[   31.517502] The buggy address belongs to the physical page:
[   31.517650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad4
[   31.517715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.517783] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   31.517836] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.517882] page dumped because: kasan: bad access detected
[   31.517917] 
[   31.517937] Memory state around the buggy address:
[   31.517970]  fff00000c9ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.518021]  fff00000c9ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.518081] >fff00000c9ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.518126]                    ^
[   31.518157]  fff00000c9ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.518206]  fff00000c9ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.518251] ==================================================================
[   31.488536] ==================================================================
[   31.488644] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.488909] Free of addr fff00000c7d40a00 by task kunit_try_catch/267
[   31.489092] 
[   31.489133] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.489222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.489389] Hardware name: linux,dummy-virt (DT)
[   31.489427] Call trace:
[   31.489460]  show_stack+0x20/0x38 (C)
[   31.489532]  dump_stack_lvl+0x8c/0xd0
[   31.489584]  print_report+0x118/0x5d0
[   31.489683]  kasan_report_invalid_free+0xc0/0xe8
[   31.489736]  check_slab_allocation+0xd4/0x108
[   31.489795]  __kasan_mempool_poison_object+0x78/0x150
[   31.489989]  mempool_free+0x28c/0x328
[   31.490044]  mempool_double_free_helper+0x150/0x2e8
[   31.490109]  mempool_kmalloc_double_free+0xc0/0x118
[   31.490160]  kunit_try_run_case+0x170/0x3f0
[   31.490350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.490513]  kthread+0x328/0x630
[   31.490568]  ret_from_fork+0x10/0x20
[   31.490770] 
[   31.490801] Allocated by task 267:
[   31.490860]  kasan_save_stack+0x3c/0x68
[   31.490913]  kasan_save_track+0x20/0x40
[   31.490974]  kasan_save_alloc_info+0x40/0x58
[   31.491066]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.491116]  remove_element+0x130/0x1f8
[   31.491192]  mempool_alloc_preallocated+0x58/0xc0
[   31.491276]  mempool_double_free_helper+0x94/0x2e8
[   31.491405]  mempool_kmalloc_double_free+0xc0/0x118
[   31.491620]  kunit_try_run_case+0x170/0x3f0
[   31.491748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.491865]  kthread+0x328/0x630
[   31.491933]  ret_from_fork+0x10/0x20
[   31.491970] 
[   31.492014] Freed by task 267:
[   31.492041]  kasan_save_stack+0x3c/0x68
[   31.492500]  kasan_save_track+0x20/0x40
[   31.492629]  kasan_save_free_info+0x4c/0x78
[   31.492713]  __kasan_mempool_poison_object+0xc0/0x150
[   31.492764]  mempool_free+0x28c/0x328
[   31.492950]  mempool_double_free_helper+0x100/0x2e8
[   31.493001]  mempool_kmalloc_double_free+0xc0/0x118
[   31.493199]  kunit_try_run_case+0x170/0x3f0
[   31.493285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.493428]  kthread+0x328/0x630
[   31.493494]  ret_from_fork+0x10/0x20
[   31.493531] 
[   31.493569] The buggy address belongs to the object at fff00000c7d40a00
[   31.493569]  which belongs to the cache kmalloc-128 of size 128
[   31.493778] The buggy address is located 0 bytes inside of
[   31.493778]  128-byte region [fff00000c7d40a00, fff00000c7d40a80)
[   31.494039] 
[   31.494085] The buggy address belongs to the physical page:
[   31.494120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107d40
[   31.494367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.494592] page_type: f5(slab)
[   31.494691] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.494782] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.495123] page dumped because: kasan: bad access detected
[   31.495199] 
[   31.495302] Memory state around the buggy address:
[   31.495514]  fff00000c7d40900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.495748]  fff00000c7d40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.495827] >fff00000c7d40a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.495942]                    ^
[   31.496128]  fff00000c7d40a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.496174]  fff00000c7d40b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.496213] ==================================================================
[   31.502566] ==================================================================
[   31.502627] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   31.502681] Free of addr fff00000c9ad4000 by task kunit_try_catch/269
[   31.502908] 
[   31.502952] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.503065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.503104] Hardware name: linux,dummy-virt (DT)
[   31.503138] Call trace:
[   31.503170]  show_stack+0x20/0x38 (C)
[   31.503222]  dump_stack_lvl+0x8c/0xd0
[   31.503369]  print_report+0x118/0x5d0
[   31.503417]  kasan_report_invalid_free+0xc0/0xe8
[   31.503639]  __kasan_mempool_poison_object+0x14c/0x150
[   31.503739]  mempool_free+0x28c/0x328
[   31.503828]  mempool_double_free_helper+0x150/0x2e8
[   31.503905]  mempool_kmalloc_large_double_free+0xc0/0x118
[   31.504092]  kunit_try_run_case+0x170/0x3f0
[   31.504190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.504254]  kthread+0x328/0x630
[   31.504363]  ret_from_fork+0x10/0x20
[   31.504517] 
[   31.504559] The buggy address belongs to the physical page:
[   31.504703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad4
[   31.504885] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.504969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.505050] page_type: f8(unknown)
[   31.505197] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.505401] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.505487] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.505559] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.505644] head: 0bfffe0000000002 ffffc1ffc326b501 00000000ffffffff 00000000ffffffff
[   31.505756] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.505879] page dumped because: kasan: bad access detected
[   31.506028] 
[   31.506141] Memory state around the buggy address:
[   31.506275]  fff00000c9ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.506351]  fff00000c9ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.506562] >fff00000c9ad4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.506754]                    ^
[   31.506873]  fff00000c9ad4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.507035]  fff00000c9ad4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.507267] ==================================================================

[   25.782735] ==================================================================
[   25.784124] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.784369] Free of addr ffff888106234000 by task kunit_try_catch/287
[   25.784566] 
[   25.784656] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.784753] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.784784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.784829] Call Trace:
[   25.784844]  <TASK>
[   25.784866]  dump_stack_lvl+0x73/0xb0
[   25.784901]  print_report+0xd1/0x610
[   25.784925]  ? __virt_addr_valid+0x1db/0x2d0
[   25.784952]  ? kasan_addr_to_slab+0x11/0xa0
[   25.784972]  ? mempool_double_free_helper+0x184/0x370
[   25.784996]  kasan_report_invalid_free+0x10a/0x130
[   25.785021]  ? mempool_double_free_helper+0x184/0x370
[   25.785049]  ? mempool_double_free_helper+0x184/0x370
[   25.785073]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   25.785097]  mempool_free+0x2ec/0x380
[   25.785123]  mempool_double_free_helper+0x184/0x370
[   25.785146]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.785171]  ? __kasan_check_write+0x18/0x20
[   25.785239]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.785263]  ? finish_task_switch.isra.0+0x153/0x700
[   25.785314]  mempool_kmalloc_large_double_free+0xed/0x140
[   25.785359]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   25.785394]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.785417]  ? __pfx_mempool_kfree+0x10/0x10
[   25.785442]  ? __pfx_read_tsc+0x10/0x10
[   25.785463]  ? ktime_get_ts64+0x86/0x230
[   25.785489]  kunit_try_run_case+0x1a5/0x480
[   25.785512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.785533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.785559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.785583]  ? __kthread_parkme+0x82/0x180
[   25.785603]  ? preempt_count_sub+0x50/0x80
[   25.785626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.785647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.785672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.785707]  kthread+0x337/0x6f0
[   25.785728]  ? trace_preempt_on+0x20/0xc0
[   25.785751]  ? __pfx_kthread+0x10/0x10
[   25.785788]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.785810]  ? calculate_sigpending+0x7b/0xa0
[   25.785835]  ? __pfx_kthread+0x10/0x10
[   25.785905]  ret_from_fork+0x116/0x1d0
[   25.785926]  ? __pfx_kthread+0x10/0x10
[   25.785948]  ret_from_fork_asm+0x1a/0x30
[   25.785992]  </TASK>
[   25.786006] 
[   25.802053] The buggy address belongs to the physical page:
[   25.802578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106234
[   25.803079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.803620] flags: 0x200000000000040(head|node=0|zone=2)
[   25.803839] page_type: f8(unknown)
[   25.804215] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.805033] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.805743] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.806153] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.806935] head: 0200000000000002 ffffea0004188d01 00000000ffffffff 00000000ffffffff
[   25.807531] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.808166] page dumped because: kasan: bad access detected
[   25.808429] 
[   25.808494] Memory state around the buggy address:
[   25.808646]  ffff888106233f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.808892]  ffff888106233f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.809214] >ffff888106234000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.809811]                    ^
[   25.809965]  ffff888106234080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.810480]  ffff888106234100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.811098] ==================================================================
[   25.815113] ==================================================================
[   25.816444] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.817528] Free of addr ffff888106234000 by task kunit_try_catch/289
[   25.818187] 
[   25.818394] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.818453] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.818468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.818492] Call Trace:
[   25.818507]  <TASK>
[   25.818529]  dump_stack_lvl+0x73/0xb0
[   25.818587]  print_report+0xd1/0x610
[   25.818612]  ? __virt_addr_valid+0x1db/0x2d0
[   25.818640]  ? kasan_addr_to_slab+0x11/0xa0
[   25.818660]  ? mempool_double_free_helper+0x184/0x370
[   25.818685]  kasan_report_invalid_free+0x10a/0x130
[   25.818721]  ? mempool_double_free_helper+0x184/0x370
[   25.818747]  ? mempool_double_free_helper+0x184/0x370
[   25.818770]  __kasan_mempool_poison_pages+0x115/0x130
[   25.818805]  mempool_free+0x290/0x380
[   25.818833]  mempool_double_free_helper+0x184/0x370
[   25.818856]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.818924]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.818950]  ? irqentry_exit+0x2a/0x60
[   25.818974]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   25.819002]  mempool_page_alloc_double_free+0xe8/0x140
[   25.819027]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.819053]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.819076]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.819101]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.819128]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.819156]  kunit_try_run_case+0x1a5/0x480
[   25.819181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.819201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.819225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.819248]  ? __kthread_parkme+0x82/0x180
[   25.819272]  ? preempt_count_sub+0x50/0x80
[   25.819295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.819317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.819343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.819370]  kthread+0x337/0x6f0
[   25.819391]  ? trace_preempt_on+0x20/0xc0
[   25.819417]  ? __pfx_kthread+0x10/0x10
[   25.819437]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.819460]  ? calculate_sigpending+0x7b/0xa0
[   25.819485]  ? __pfx_kthread+0x10/0x10
[   25.819507]  ret_from_fork+0x116/0x1d0
[   25.819529]  ? __pfx_kthread+0x10/0x10
[   25.819549]  ret_from_fork_asm+0x1a/0x30
[   25.819581]  </TASK>
[   25.819595] 
[   25.831184] The buggy address belongs to the physical page:
[   25.831429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106234
[   25.831767] flags: 0x200000000000000(node=0|zone=2)
[   25.832231] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.832681] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.833224] page dumped because: kasan: bad access detected
[   25.833654] 
[   25.833901] Memory state around the buggy address:
[   25.834340]  ffff888106233f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.834636]  ffff888106233f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.835277] >ffff888106234000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.835734]                    ^
[   25.836029]  ffff888106234080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.836470]  ffff888106234100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.836769] ==================================================================
[   25.746712] ==================================================================
[   25.747935] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   25.748657] Free of addr ffff8881058c1f00 by task kunit_try_catch/285
[   25.749409] 
[   25.749623] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.749706] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.749721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.749745] Call Trace:
[   25.749759]  <TASK>
[   25.749781]  dump_stack_lvl+0x73/0xb0
[   25.749848]  print_report+0xd1/0x610
[   25.749873]  ? __virt_addr_valid+0x1db/0x2d0
[   25.749912]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.749938]  ? mempool_double_free_helper+0x184/0x370
[   25.749962]  kasan_report_invalid_free+0x10a/0x130
[   25.749986]  ? mempool_double_free_helper+0x184/0x370
[   25.750012]  ? mempool_double_free_helper+0x184/0x370
[   25.750034]  ? mempool_double_free_helper+0x184/0x370
[   25.750056]  check_slab_allocation+0x101/0x130
[   25.750079]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.750102]  mempool_free+0x2ec/0x380
[   25.750131]  mempool_double_free_helper+0x184/0x370
[   25.750154]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.750176]  ? update_load_avg+0x1be/0x21b0
[   25.750204]  ? finish_task_switch.isra.0+0x153/0x700
[   25.750231]  mempool_kmalloc_double_free+0xed/0x140
[   25.750254]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   25.750280]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.750302]  ? __pfx_mempool_kfree+0x10/0x10
[   25.750327]  ? __pfx_read_tsc+0x10/0x10
[   25.750350]  ? ktime_get_ts64+0x86/0x230
[   25.750376]  kunit_try_run_case+0x1a5/0x480
[   25.750400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.750420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.750446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.750470]  ? __kthread_parkme+0x82/0x180
[   25.750491]  ? preempt_count_sub+0x50/0x80
[   25.750568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.750590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.750617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.750642]  kthread+0x337/0x6f0
[   25.750662]  ? trace_preempt_on+0x20/0xc0
[   25.750686]  ? __pfx_kthread+0x10/0x10
[   25.750721]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.750744]  ? calculate_sigpending+0x7b/0xa0
[   25.750769]  ? __pfx_kthread+0x10/0x10
[   25.750801]  ret_from_fork+0x116/0x1d0
[   25.750821]  ? __pfx_kthread+0x10/0x10
[   25.750841]  ret_from_fork_asm+0x1a/0x30
[   25.750874]  </TASK>
[   25.750920] 
[   25.764823] Allocated by task 285:
[   25.765146]  kasan_save_stack+0x45/0x70
[   25.765430]  kasan_save_track+0x18/0x40
[   25.765681]  kasan_save_alloc_info+0x3b/0x50
[   25.765907]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.766183]  remove_element+0x11e/0x190
[   25.766347]  mempool_alloc_preallocated+0x4d/0x90
[   25.766620]  mempool_double_free_helper+0x8a/0x370
[   25.766970]  mempool_kmalloc_double_free+0xed/0x140
[   25.767408]  kunit_try_run_case+0x1a5/0x480
[   25.767632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.768036]  kthread+0x337/0x6f0
[   25.768228]  ret_from_fork+0x116/0x1d0
[   25.768435]  ret_from_fork_asm+0x1a/0x30
[   25.768655] 
[   25.768745] Freed by task 285:
[   25.768912]  kasan_save_stack+0x45/0x70
[   25.769115]  kasan_save_track+0x18/0x40
[   25.769356]  kasan_save_free_info+0x3f/0x60
[   25.769489]  __kasan_mempool_poison_object+0x131/0x1d0
[   25.769758]  mempool_free+0x2ec/0x380
[   25.770106]  mempool_double_free_helper+0x109/0x370
[   25.770469]  mempool_kmalloc_double_free+0xed/0x140
[   25.770765]  kunit_try_run_case+0x1a5/0x480
[   25.770968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.771138]  kthread+0x337/0x6f0
[   25.771419]  ret_from_fork+0x116/0x1d0
[   25.771707]  ret_from_fork_asm+0x1a/0x30
[   25.771975] 
[   25.772046] The buggy address belongs to the object at ffff8881058c1f00
[   25.772046]  which belongs to the cache kmalloc-128 of size 128
[   25.773064] The buggy address is located 0 bytes inside of
[   25.773064]  128-byte region [ffff8881058c1f00, ffff8881058c1f80)
[   25.773541] 
[   25.773616] The buggy address belongs to the physical page:
[   25.774059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   25.774381] flags: 0x200000000000000(node=0|zone=2)
[   25.774614] page_type: f5(slab)
[   25.774797] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.775230] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   25.775539] page dumped because: kasan: bad access detected
[   25.775762] 
[   25.775855] Memory state around the buggy address:
[   25.776146]  ffff8881058c1e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.776455]  ffff8881058c1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.776803] >ffff8881058c1f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.777113]                    ^
[   25.777447]  ffff8881058c1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.777763]  ffff8881058c2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.778083] ==================================================================