Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.657998] ==================================================================
[   32.658071] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.658212] Free of addr fff00000c9bd9a00 by task kunit_try_catch/268
[   32.658372] 
[   32.658517] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.658791] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.658852] Hardware name: linux,dummy-virt (DT)
[   32.658886] Call trace:
[   32.658918]  show_stack+0x20/0x38 (C)
[   32.658968]  dump_stack_lvl+0x8c/0xd0
[   32.659405]  print_report+0x118/0x5e8
[   32.659692]  kasan_report_invalid_free+0xc0/0xe8
[   32.659871]  check_slab_allocation+0xd4/0x108
[   32.659975]  __kasan_mempool_poison_object+0x78/0x150
[   32.660062]  mempool_free+0x3f4/0x5f0
[   32.660118]  mempool_double_free_helper+0x150/0x2e8
[   32.660483]  mempool_kmalloc_double_free+0xc0/0x118
[   32.660656]  kunit_try_run_case+0x170/0x3f0
[   32.660706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.660787]  kthread+0x328/0x630
[   32.660893]  ret_from_fork+0x10/0x20
[   32.660954] 
[   32.660975] Allocated by task 268:
[   32.661033]  kasan_save_stack+0x3c/0x68
[   32.661076]  kasan_save_track+0x20/0x40
[   32.661112]  kasan_save_alloc_info+0x40/0x58
[   32.661151]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.661194]  remove_element+0x130/0x1f8
[   32.661233]  mempool_alloc_preallocated+0x58/0xc0
[   32.661578]  mempool_double_free_helper+0x94/0x2e8
[   32.661660]  mempool_kmalloc_double_free+0xc0/0x118
[   32.661703]  kunit_try_run_case+0x170/0x3f0
[   32.661751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.662055]  kthread+0x328/0x630
[   32.662308]  ret_from_fork+0x10/0x20
[   32.662373] 
[   32.662394] Freed by task 268:
[   32.662474]  kasan_save_stack+0x3c/0x68
[   32.662591]  kasan_save_track+0x20/0x40
[   32.662627]  kasan_save_free_info+0x4c/0x78
[   32.662665]  __kasan_mempool_poison_object+0xc0/0x150
[   32.662833]  mempool_free+0x3f4/0x5f0
[   32.662999]  mempool_double_free_helper+0x100/0x2e8
[   32.663066]  mempool_kmalloc_double_free+0xc0/0x118
[   32.663108]  kunit_try_run_case+0x170/0x3f0
[   32.663306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.663358]  kthread+0x328/0x630
[   32.663392]  ret_from_fork+0x10/0x20
[   32.663646] 
[   32.663679] The buggy address belongs to the object at fff00000c9bd9a00
[   32.663679]  which belongs to the cache kmalloc-128 of size 128
[   32.663742] The buggy address is located 0 bytes inside of
[   32.663742]  128-byte region [fff00000c9bd9a00, fff00000c9bd9a80)
[   32.663801] 
[   32.663822] The buggy address belongs to the physical page:
[   32.663867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9
[   32.663933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.664342] page_type: f5(slab)
[   32.664503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.664554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.664659] page dumped because: kasan: bad access detected
[   32.664690] 
[   32.664711] Memory state around the buggy address:
[   32.664742]  fff00000c9bd9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.664789]  fff00000c9bd9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.664855] >fff00000c9bd9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.664893]                    ^
[   32.664935]  fff00000c9bd9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.665007]  fff00000c9bd9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.665447] ==================================================================
[   32.673272] ==================================================================
[   32.673332] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.673389] Free of addr fff00000c9bf8000 by task kunit_try_catch/270
[   32.673431] 
[   32.673486] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.673578] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.673606] Hardware name: linux,dummy-virt (DT)
[   32.673642] Call trace:
[   32.673753]  show_stack+0x20/0x38 (C)
[   32.673917]  dump_stack_lvl+0x8c/0xd0
[   32.674032]  print_report+0x118/0x5e8
[   32.674076]  kasan_report_invalid_free+0xc0/0xe8
[   32.674123]  __kasan_mempool_poison_object+0x14c/0x150
[   32.674178]  mempool_free+0x3f4/0x5f0
[   32.674384]  mempool_double_free_helper+0x150/0x2e8
[   32.674435]  mempool_kmalloc_large_double_free+0xc0/0x118
[   32.674486]  kunit_try_run_case+0x170/0x3f0
[   32.674534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.674596]  kthread+0x328/0x630
[   32.674797]  ret_from_fork+0x10/0x20
[   32.674931] 
[   32.674956] The buggy address belongs to the physical page:
[   32.674995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bf8
[   32.675389] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.675741] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.675870] page_type: f8(unknown)
[   32.675921] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.675974] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.676026] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.676077] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.676129] head: 0bfffe0000000002 ffffc1ffc326fe01 00000000ffffffff 00000000ffffffff
[   32.676182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.676224] page dumped because: kasan: bad access detected
[   32.676258] 
[   32.676280] Memory state around the buggy address:
[   32.676313]  fff00000c9bf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676359]  fff00000c9bf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676401] >fff00000c9bf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.676442]                    ^
[   32.676473]  fff00000c9bf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.677333]  fff00000c9bf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.677700] ==================================================================
[   32.691721] ==================================================================
[   32.691783] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   32.691838] Free of addr fff00000c9bfc000 by task kunit_try_catch/272
[   32.691883] 
[   32.691939] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   32.692055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.692123] Hardware name: linux,dummy-virt (DT)
[   32.692165] Call trace:
[   32.692190]  show_stack+0x20/0x38 (C)
[   32.692242]  dump_stack_lvl+0x8c/0xd0
[   32.692290]  print_report+0x118/0x5e8
[   32.692344]  kasan_report_invalid_free+0xc0/0xe8
[   32.692393]  __kasan_mempool_poison_pages+0xe0/0xe8
[   32.692441]  mempool_free+0x3ac/0x5f0
[   32.692488]  mempool_double_free_helper+0x150/0x2e8
[   32.692573]  mempool_page_alloc_double_free+0xbc/0x118
[   32.692626]  kunit_try_run_case+0x170/0x3f0
[   32.692676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.692727]  kthread+0x328/0x630
[   32.692771]  ret_from_fork+0x10/0x20
[   32.692818] 
[   32.692920] The buggy address belongs to the physical page:
[   32.692980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bfc
[   32.693082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.693202] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.693292] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.693390] page dumped because: kasan: bad access detected
[   32.693472] 
[   32.693571] Memory state around the buggy address:
[   32.693616]  fff00000c9bfbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693661]  fff00000c9bfbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693729] >fff00000c9bfc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.693772]                    ^
[   32.693805]  fff00000c9bfc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.694244]  fff00000c9bfc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.694326] ==================================================================

[   26.958604] ==================================================================
[   26.959183] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   26.959538] Free of addr ffff888106228000 by task kunit_try_catch/288
[   26.959869] 
[   26.960040] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.960094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.960106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.960129] Call Trace:
[   26.960153]  <TASK>
[   26.960172]  dump_stack_lvl+0x73/0xb0
[   26.960203]  print_report+0xd1/0x640
[   26.960227]  ? __virt_addr_valid+0x1db/0x2d0
[   26.960252]  ? kasan_addr_to_slab+0x11/0xa0
[   26.960274]  ? mempool_double_free_helper+0x184/0x370
[   26.960299]  kasan_report_invalid_free+0x10a/0x130
[   26.960491]  ? mempool_double_free_helper+0x184/0x370
[   26.960528]  ? mempool_double_free_helper+0x184/0x370
[   26.960551]  __kasan_mempool_poison_pages+0x115/0x130
[   26.960576]  mempool_free+0x430/0x640
[   26.960605]  mempool_double_free_helper+0x184/0x370
[   26.960630]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.960655]  ? dequeue_entities+0x23f/0x1630
[   26.960704]  ? __kasan_check_write+0x18/0x20
[   26.960730]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.960751]  ? finish_task_switch.isra.0+0x153/0x700
[   26.960779]  mempool_page_alloc_double_free+0xe8/0x140
[   26.960805]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   26.960833]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   26.960858]  ? __pfx_mempool_free_pages+0x10/0x10
[   26.960884]  ? __pfx_read_tsc+0x10/0x10
[   26.960906]  ? ktime_get_ts64+0x86/0x230
[   26.960931]  kunit_try_run_case+0x1a5/0x480
[   26.960969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.960992]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.961019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.961045]  ? __kthread_parkme+0x82/0x180
[   26.961066]  ? preempt_count_sub+0x50/0x80
[   26.961089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.961113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.961137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.961173]  kthread+0x337/0x6f0
[   26.961194]  ? trace_preempt_on+0x20/0xc0
[   26.961219]  ? __pfx_kthread+0x10/0x10
[   26.961239]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.961263]  ? calculate_sigpending+0x7b/0xa0
[   26.961288]  ? __pfx_kthread+0x10/0x10
[   26.961309]  ret_from_fork+0x116/0x1d0
[   26.961330]  ? __pfx_kthread+0x10/0x10
[   26.961351]  ret_from_fork_asm+0x1a/0x30
[   26.961437]  </TASK>
[   26.961451] 
[   26.976510] The buggy address belongs to the physical page:
[   26.976832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106228
[   26.977403] flags: 0x200000000000000(node=0|zone=2)
[   26.977879] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   26.978527] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.978839] page dumped because: kasan: bad access detected
[   26.979043] 
[   26.979207] Memory state around the buggy address:
[   26.979658]  ffff888106227f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.980399]  ffff888106227f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.981161] >ffff888106228000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.981759]                    ^
[   26.981893]  ffff888106228080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.982494]  ffff888106228100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.982833] ==================================================================
[   26.931741] ==================================================================
[   26.932330] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   26.933135] Free of addr ffff8881060f0000 by task kunit_try_catch/286
[   26.933756] 
[   26.934014] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.934070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.934083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.934107] Call Trace:
[   26.934121]  <TASK>
[   26.934142]  dump_stack_lvl+0x73/0xb0
[   26.934186]  print_report+0xd1/0x640
[   26.934210]  ? __virt_addr_valid+0x1db/0x2d0
[   26.934238]  ? kasan_addr_to_slab+0x11/0xa0
[   26.934259]  ? mempool_double_free_helper+0x184/0x370
[   26.934283]  kasan_report_invalid_free+0x10a/0x130
[   26.934308]  ? mempool_double_free_helper+0x184/0x370
[   26.934335]  ? mempool_double_free_helper+0x184/0x370
[   26.934358]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   26.934450]  mempool_free+0x490/0x640
[   26.934483]  mempool_double_free_helper+0x184/0x370
[   26.934508]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.934533]  ? dequeue_entities+0x23f/0x1630
[   26.934558]  ? __kasan_check_write+0x18/0x20
[   26.934582]  ? __pfx_sched_clock_cpu+0x10/0x10
[   26.934604]  ? finish_task_switch.isra.0+0x153/0x700
[   26.934632]  mempool_kmalloc_large_double_free+0xed/0x140
[   26.934657]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   26.934682]  ? __kasan_check_write+0x18/0x20
[   26.934708]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.934732]  ? __pfx_mempool_kfree+0x10/0x10
[   26.934758]  ? __pfx_read_tsc+0x10/0x10
[   26.934781]  ? ktime_get_ts64+0x86/0x230
[   26.934803]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   26.934830]  kunit_try_run_case+0x1a5/0x480
[   26.934857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.934882]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.934909]  ? __kthread_parkme+0x82/0x180
[   26.934930]  ? preempt_count_sub+0x50/0x80
[   26.934953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.934977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.935002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.935025]  kthread+0x337/0x6f0
[   26.935046]  ? trace_preempt_on+0x20/0xc0
[   26.935071]  ? __pfx_kthread+0x10/0x10
[   26.935092]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.935115]  ? calculate_sigpending+0x7b/0xa0
[   26.935140]  ? __pfx_kthread+0x10/0x10
[   26.935174]  ret_from_fork+0x116/0x1d0
[   26.935196]  ? __pfx_kthread+0x10/0x10
[   26.935218]  ret_from_fork_asm+0x1a/0x30
[   26.935250]  </TASK>
[   26.935262] 
[   26.948766] The buggy address belongs to the physical page:
[   26.949082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f0
[   26.949417] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.949759] flags: 0x200000000000040(head|node=0|zone=2)
[   26.950009] page_type: f8(unknown)
[   26.950255] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.950678] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.951052] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.951581] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.951943] head: 0200000000000002 ffffea0004183c01 00000000ffffffff 00000000ffffffff
[   26.952432] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.952777] page dumped because: kasan: bad access detected
[   26.953012] 
[   26.953105] Memory state around the buggy address:
[   26.953353]  ffff8881060eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.953759]  ffff8881060eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.954040] >ffff8881060f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.954313]                    ^
[   26.954475]  ffff8881060f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.954788]  ffff8881060f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.955115] ==================================================================
[   26.890678] ==================================================================
[   26.891674] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   26.892572] Free of addr ffff8881060a7100 by task kunit_try_catch/284
[   26.892784] 
[   26.892875] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.892929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.892942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.892966] Call Trace:
[   26.892980]  <TASK>
[   26.892998]  dump_stack_lvl+0x73/0xb0
[   26.893030]  print_report+0xd1/0x640
[   26.893053]  ? __virt_addr_valid+0x1db/0x2d0
[   26.893079]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.893104]  ? mempool_double_free_helper+0x184/0x370
[   26.893128]  kasan_report_invalid_free+0x10a/0x130
[   26.893170]  ? mempool_double_free_helper+0x184/0x370
[   26.893196]  ? mempool_double_free_helper+0x184/0x370
[   26.893218]  ? mempool_double_free_helper+0x184/0x370
[   26.893240]  check_slab_allocation+0x101/0x130
[   26.893263]  __kasan_mempool_poison_object+0x91/0x1d0
[   26.893286]  mempool_free+0x490/0x640
[   26.893315]  mempool_double_free_helper+0x184/0x370
[   26.893339]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.893365]  ? finish_task_switch.isra.0+0x153/0x700
[   26.893391]  mempool_kmalloc_double_free+0xed/0x140
[   26.893415]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   26.893441]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.893465]  ? __pfx_mempool_kfree+0x10/0x10
[   26.893490]  ? __pfx_read_tsc+0x10/0x10
[   26.893513]  ? ktime_get_ts64+0x86/0x230
[   26.893539]  kunit_try_run_case+0x1a5/0x480
[   26.893564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.893587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.893614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.893639]  ? __kthread_parkme+0x82/0x180
[   26.893680]  ? preempt_count_sub+0x50/0x80
[   26.893705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.893729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.893753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.893777]  kthread+0x337/0x6f0
[   26.893798]  ? trace_preempt_on+0x20/0xc0
[   26.893823]  ? __pfx_kthread+0x10/0x10
[   26.893844]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.893868]  ? calculate_sigpending+0x7b/0xa0
[   26.893892]  ? __pfx_kthread+0x10/0x10
[   26.893914]  ret_from_fork+0x116/0x1d0
[   26.893935]  ? __pfx_kthread+0x10/0x10
[   26.893956]  ret_from_fork_asm+0x1a/0x30
[   26.893988]  </TASK>
[   26.893999] 
[   26.909286] Allocated by task 284:
[   26.909708]  kasan_save_stack+0x45/0x70
[   26.910127]  kasan_save_track+0x18/0x40
[   26.910528]  kasan_save_alloc_info+0x3b/0x50
[   26.910695]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.911183]  remove_element+0x11e/0x190
[   26.911543]  mempool_alloc_preallocated+0x4d/0x90
[   26.911915]  mempool_double_free_helper+0x8a/0x370
[   26.912187]  mempool_kmalloc_double_free+0xed/0x140
[   26.912347]  kunit_try_run_case+0x1a5/0x480
[   26.912491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.912699]  kthread+0x337/0x6f0
[   26.912820]  ret_from_fork+0x116/0x1d0
[   26.912949]  ret_from_fork_asm+0x1a/0x30
[   26.913106] 
[   26.913182] Freed by task 284:
[   26.913291]  kasan_save_stack+0x45/0x70
[   26.913436]  kasan_save_track+0x18/0x40
[   26.913568]  kasan_save_free_info+0x3f/0x60
[   26.913712]  __kasan_mempool_poison_object+0x131/0x1d0
[   26.913883]  mempool_free+0x490/0x640
[   26.914041]  mempool_double_free_helper+0x109/0x370
[   26.914384]  mempool_kmalloc_double_free+0xed/0x140
[   26.914855]  kunit_try_run_case+0x1a5/0x480
[   26.915316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.915789]  kthread+0x337/0x6f0
[   26.916094]  ret_from_fork+0x116/0x1d0
[   26.916519]  ret_from_fork_asm+0x1a/0x30
[   26.916928] 
[   26.917089] The buggy address belongs to the object at ffff8881060a7100
[   26.917089]  which belongs to the cache kmalloc-128 of size 128
[   26.918188] The buggy address is located 0 bytes inside of
[   26.918188]  128-byte region [ffff8881060a7100, ffff8881060a7180)
[   26.919342] 
[   26.919498] The buggy address belongs to the physical page:
[   26.920057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060a7
[   26.920757] flags: 0x200000000000000(node=0|zone=2)
[   26.920971] page_type: f5(slab)
[   26.921279] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.921978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.922322] page dumped because: kasan: bad access detected
[   26.922813] 
[   26.922878] Memory state around the buggy address:
[   26.923141]  ffff8881060a7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.923834]  ffff8881060a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.924524] >ffff8881060a7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.924949]                    ^
[   26.925070]  ffff8881060a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.925697]  ffff8881060a7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.926357] ==================================================================