Hay
Date
July 24, 2025, 4:41 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.671081] ==================================================================
[   34.671190] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.671408] Free of addr fff00000c9bac000 by task kunit_try_catch/270
[   34.671458] 
[   34.671556] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.671779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.671885] Hardware name: linux,dummy-virt (DT)
[   34.671985] Call trace:
[   34.672055]  show_stack+0x20/0x38 (C)
[   34.672155]  dump_stack_lvl+0x8c/0xd0
[   34.672241]  print_report+0x118/0x5e8
[   34.672457]  kasan_report_invalid_free+0xc0/0xe8
[   34.672515]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.672620]  mempool_free+0x3ac/0x5f0
[   34.672800]  mempool_double_free_helper+0x150/0x2e8
[   34.672858]  mempool_page_alloc_double_free+0xbc/0x118
[   34.672928]  kunit_try_run_case+0x170/0x3f0
[   34.672988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.673055]  kthread+0x328/0x630
[   34.673097]  ret_from_fork+0x10/0x20
[   34.673153] 
[   34.673177] The buggy address belongs to the physical page:
[   34.673215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac
[   34.673273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.673352] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.673402] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.673457] page dumped because: kasan: bad access detected
[   34.673488] 
[   34.673509] Memory state around the buggy address:
[   34.673544]  fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673597]  fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673656] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673695]                    ^
[   34.673739]  fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.673792]  fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.674140] ==================================================================
[   34.633059] ==================================================================
[   34.633202] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.633273] Free of addr fff00000c4564b00 by task kunit_try_catch/266
[   34.633379] 
[   34.633421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.633692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.633741] Hardware name: linux,dummy-virt (DT)
[   34.633901] Call trace:
[   34.633938]  show_stack+0x20/0x38 (C)
[   34.633992]  dump_stack_lvl+0x8c/0xd0
[   34.634061]  print_report+0x118/0x5e8
[   34.634106]  kasan_report_invalid_free+0xc0/0xe8
[   34.634249]  check_slab_allocation+0xd4/0x108
[   34.634326]  __kasan_mempool_poison_object+0x78/0x150
[   34.634378]  mempool_free+0x3f4/0x5f0
[   34.634588]  mempool_double_free_helper+0x150/0x2e8
[   34.634689]  mempool_kmalloc_double_free+0xc0/0x118
[   34.634832]  kunit_try_run_case+0x170/0x3f0
[   34.634887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.635134]  kthread+0x328/0x630
[   34.635188]  ret_from_fork+0x10/0x20
[   34.635363] 
[   34.635464] Allocated by task 266:
[   34.635525]  kasan_save_stack+0x3c/0x68
[   34.635592]  kasan_save_track+0x20/0x40
[   34.635840]  kasan_save_alloc_info+0x40/0x58
[   34.635888]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.635939]  remove_element+0x130/0x1f8
[   34.635979]  mempool_alloc_preallocated+0x58/0xc0
[   34.636047]  mempool_double_free_helper+0x94/0x2e8
[   34.636110]  mempool_kmalloc_double_free+0xc0/0x118
[   34.636283]  kunit_try_run_case+0x170/0x3f0
[   34.636467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.636559]  kthread+0x328/0x630
[   34.636601]  ret_from_fork+0x10/0x20
[   34.636639] 
[   34.636708] Freed by task 266:
[   34.636738]  kasan_save_stack+0x3c/0x68
[   34.636806]  kasan_save_track+0x20/0x40
[   34.636848]  kasan_save_free_info+0x4c/0x78
[   34.636897]  __kasan_mempool_poison_object+0xc0/0x150
[   34.636944]  mempool_free+0x3f4/0x5f0
[   34.636982]  mempool_double_free_helper+0x100/0x2e8
[   34.637038]  mempool_kmalloc_double_free+0xc0/0x118
[   34.637090]  kunit_try_run_case+0x170/0x3f0
[   34.637127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.637172]  kthread+0x328/0x630
[   34.637204]  ret_from_fork+0x10/0x20
[   34.637241] 
[   34.637260] The buggy address belongs to the object at fff00000c4564b00
[   34.637260]  which belongs to the cache kmalloc-128 of size 128
[   34.637329] The buggy address is located 0 bytes inside of
[   34.637329]  128-byte region [fff00000c4564b00, fff00000c4564b80)
[   34.637390] 
[   34.637412] The buggy address belongs to the physical page:
[   34.637452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104564
[   34.637519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.637581] page_type: f5(slab)
[   34.637626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   34.637677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.637727] page dumped because: kasan: bad access detected
[   34.637805] 
[   34.638225] Memory state around the buggy address:
[   34.638875]  fff00000c4564a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.639240]  fff00000c4564a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639419] >fff00000c4564b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.639503]                    ^
[   34.639538]  fff00000c4564b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.639582]  fff00000c4564c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.639620] ==================================================================
[   34.652875] ==================================================================
[   34.652959] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.653030] Free of addr fff00000c9bac000 by task kunit_try_catch/268
[   34.653075] 
[   34.653117] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250724 #1 PREEMPT 
[   34.653208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.653234] Hardware name: linux,dummy-virt (DT)
[   34.653338] Call trace:
[   34.653367]  show_stack+0x20/0x38 (C)
[   34.653443]  dump_stack_lvl+0x8c/0xd0
[   34.653492]  print_report+0x118/0x5e8
[   34.653537]  kasan_report_invalid_free+0xc0/0xe8
[   34.653583]  __kasan_mempool_poison_object+0x14c/0x150
[   34.653643]  mempool_free+0x3f4/0x5f0
[   34.653699]  mempool_double_free_helper+0x150/0x2e8
[   34.654441]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.654761]  kunit_try_run_case+0x170/0x3f0
[   34.654981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.655360]  kthread+0x328/0x630
[   34.655426]  ret_from_fork+0x10/0x20
[   34.655524] 
[   34.655610] The buggy address belongs to the physical page:
[   34.655666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bac
[   34.655804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.655876] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.655937] page_type: f8(unknown)
[   34.656005] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.656380] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.656506] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.656624] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.656771] head: 0bfffe0000000002 ffffc1ffc326eb01 00000000ffffffff 00000000ffffffff
[   34.656870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.656980] page dumped because: kasan: bad access detected
[   34.657026] 
[   34.657045] Memory state around the buggy address:
[   34.657389]  fff00000c9babf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657610]  fff00000c9babf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657677] >fff00000c9bac000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657836]                    ^
[   34.657902]  fff00000c9bac080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.657980]  fff00000c9bac100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.658340] ==================================================================

[   28.573050] ==================================================================
[   28.573448] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   28.574121] Free of addr ffff88810614c000 by task kunit_try_catch/285
[   28.574758] 
[   28.575039] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.575105] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.575119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.575145] Call Trace:
[   28.575158]  <TASK>
[   28.575181]  dump_stack_lvl+0x73/0xb0
[   28.575214]  print_report+0xd1/0x640
[   28.575238]  ? __virt_addr_valid+0x1db/0x2d0
[   28.575271]  ? kasan_addr_to_slab+0x11/0xa0
[   28.575291]  ? mempool_double_free_helper+0x184/0x370
[   28.575316]  kasan_report_invalid_free+0x10a/0x130
[   28.575341]  ? mempool_double_free_helper+0x184/0x370
[   28.575369]  ? mempool_double_free_helper+0x184/0x370
[   28.575390]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   28.575414]  mempool_free+0x490/0x640
[   28.575442]  mempool_double_free_helper+0x184/0x370
[   28.575466]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   28.575490]  ? dequeue_entities+0x23f/0x1630
[   28.575515]  ? __kasan_check_write+0x18/0x20
[   28.575537]  ? __pfx_sched_clock_cpu+0x10/0x10
[   28.575557]  ? irqentry_exit+0x2a/0x60
[   28.575590]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   28.575615]  mempool_kmalloc_large_double_free+0xed/0x140
[   28.575642]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   28.575669]  ? __pfx_mempool_kmalloc+0x10/0x10
[   28.575691]  ? __pfx_mempool_kfree+0x10/0x10
[   28.575714]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   28.575740]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   28.575766]  kunit_try_run_case+0x1a5/0x480
[   28.575848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.575873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.575899]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.575923]  ? __kthread_parkme+0x82/0x180
[   28.575945]  ? preempt_count_sub+0x50/0x80
[   28.575969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.575991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.576015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.576038]  kthread+0x337/0x6f0
[   28.576057]  ? trace_preempt_on+0x20/0xc0
[   28.576082]  ? __pfx_kthread+0x10/0x10
[   28.576102]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.576126]  ? calculate_sigpending+0x7b/0xa0
[   28.576150]  ? __pfx_kthread+0x10/0x10
[   28.576172]  ret_from_fork+0x116/0x1d0
[   28.576193]  ? __pfx_kthread+0x10/0x10
[   28.576213]  ret_from_fork_asm+0x1a/0x30
[   28.576246]  </TASK>
[   28.576258] 
[   28.589184] The buggy address belongs to the physical page:
[   28.589478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10614c
[   28.590647] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.591118] flags: 0x200000000000040(head|node=0|zone=2)
[   28.591465] page_type: f8(unknown)
[   28.591616] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.592169] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.592556] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   28.593042] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   28.593486] head: 0200000000000002 ffffea0004185301 00000000ffffffff 00000000ffffffff
[   28.594054] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   28.594436] page dumped because: kasan: bad access detected
[   28.594705] 
[   28.594863] Memory state around the buggy address:
[   28.595218]  ffff88810614bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.595631]  ffff88810614bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.596094] >ffff88810614c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.596425]                    ^
[   28.596715]  ffff88810614c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.597207]  ffff88810614c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.597604] ==================================================================
[   28.601372] ==================================================================
[   28.601982] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   28.602281] Free of addr ffff888104980000 by task kunit_try_catch/287
[   28.602567] 
[   28.602670] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.602725] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.602738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.602762] Call Trace:
[   28.602774]  <TASK>
[   28.602838]  dump_stack_lvl+0x73/0xb0
[   28.602874]  print_report+0xd1/0x640
[   28.602898]  ? __virt_addr_valid+0x1db/0x2d0
[   28.602940]  ? kasan_addr_to_slab+0x11/0xa0
[   28.602960]  ? mempool_double_free_helper+0x184/0x370
[   28.602985]  kasan_report_invalid_free+0x10a/0x130
[   28.603008]  ? mempool_double_free_helper+0x184/0x370
[   28.603034]  ? mempool_double_free_helper+0x184/0x370
[   28.603057]  __kasan_mempool_poison_pages+0x115/0x130
[   28.603080]  mempool_free+0x430/0x640
[   28.603108]  mempool_double_free_helper+0x184/0x370
[   28.603131]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   28.603155]  ? dequeue_entities+0x23f/0x1630
[   28.603180]  ? __kasan_check_write+0x18/0x20
[   28.603203]  ? __pfx_sched_clock_cpu+0x10/0x10
[   28.603224]  ? finish_task_switch.isra.0+0x153/0x700
[   28.603257]  mempool_page_alloc_double_free+0xe8/0x140
[   28.603282]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   28.603309]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   28.603333]  ? __pfx_mempool_free_pages+0x10/0x10
[   28.603358]  ? __pfx_read_tsc+0x10/0x10
[   28.603380]  ? ktime_get_ts64+0x86/0x230
[   28.603405]  kunit_try_run_case+0x1a5/0x480
[   28.603431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.603453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.603478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.603503]  ? __kthread_parkme+0x82/0x180
[   28.603523]  ? preempt_count_sub+0x50/0x80
[   28.603545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.603569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.603602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.603625]  kthread+0x337/0x6f0
[   28.603644]  ? trace_preempt_on+0x20/0xc0
[   28.603668]  ? __pfx_kthread+0x10/0x10
[   28.603688]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.603710]  ? calculate_sigpending+0x7b/0xa0
[   28.603734]  ? __pfx_kthread+0x10/0x10
[   28.603755]  ret_from_fork+0x116/0x1d0
[   28.603774]  ? __pfx_kthread+0x10/0x10
[   28.603873]  ret_from_fork_asm+0x1a/0x30
[   28.603907]  </TASK>
[   28.603930] 
[   28.615671] The buggy address belongs to the physical page:
[   28.615899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104980
[   28.616343] flags: 0x200000000000000(node=0|zone=2)
[   28.616571] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   28.617264] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.617543] page dumped because: kasan: bad access detected
[   28.617883] 
[   28.618144] Memory state around the buggy address:
[   28.618348]  ffff88810497ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.618672]  ffff88810497ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.619215] >ffff888104980000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.619525]                    ^
[   28.619671]  ffff888104980080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.620255]  ffff888104980100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.620555] ==================================================================
[   28.534130] ==================================================================
[   28.534570] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   28.534901] Free of addr ffff88810604d000 by task kunit_try_catch/283
[   28.535795] 
[   28.535979] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) 
[   28.536039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.536052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.536076] Call Trace:
[   28.536090]  <TASK>
[   28.536130]  dump_stack_lvl+0x73/0xb0
[   28.536167]  print_report+0xd1/0x640
[   28.536191]  ? __virt_addr_valid+0x1db/0x2d0
[   28.536219]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.536244]  ? mempool_double_free_helper+0x184/0x370
[   28.536268]  kasan_report_invalid_free+0x10a/0x130
[   28.536292]  ? mempool_double_free_helper+0x184/0x370
[   28.536317]  ? mempool_double_free_helper+0x184/0x370
[   28.536340]  ? mempool_double_free_helper+0x184/0x370
[   28.536363]  check_slab_allocation+0x101/0x130
[   28.536384]  __kasan_mempool_poison_object+0x91/0x1d0
[   28.536408]  mempool_free+0x490/0x640
[   28.536436]  mempool_double_free_helper+0x184/0x370
[   28.536460]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   28.536484]  ? dequeue_entities+0x23f/0x1630
[   28.536509]  ? __kasan_check_write+0x18/0x20
[   28.536532]  ? __pfx_sched_clock_cpu+0x10/0x10
[   28.536553]  ? finish_task_switch.isra.0+0x153/0x700
[   28.536594]  mempool_kmalloc_double_free+0xed/0x140
[   28.536617]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   28.536644]  ? __pfx_mempool_kmalloc+0x10/0x10
[   28.536666]  ? __pfx_mempool_kfree+0x10/0x10
[   28.536691]  ? __pfx_read_tsc+0x10/0x10
[   28.536712]  ? ktime_get_ts64+0x86/0x230
[   28.536738]  kunit_try_run_case+0x1a5/0x480
[   28.536765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.536787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.536813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.536838]  ? __kthread_parkme+0x82/0x180
[   28.536859]  ? preempt_count_sub+0x50/0x80
[   28.536883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.536906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.537024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.537052]  kthread+0x337/0x6f0
[   28.537073]  ? trace_preempt_on+0x20/0xc0
[   28.537098]  ? __pfx_kthread+0x10/0x10
[   28.537119]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.537143]  ? calculate_sigpending+0x7b/0xa0
[   28.537167]  ? __pfx_kthread+0x10/0x10
[   28.537188]  ret_from_fork+0x116/0x1d0
[   28.537208]  ? __pfx_kthread+0x10/0x10
[   28.537229]  ret_from_fork_asm+0x1a/0x30
[   28.537260]  </TASK>
[   28.537271] 
[   28.551061] Allocated by task 283:
[   28.551213]  kasan_save_stack+0x45/0x70
[   28.551410]  kasan_save_track+0x18/0x40
[   28.551595]  kasan_save_alloc_info+0x3b/0x50
[   28.551766]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   28.552020]  remove_element+0x11e/0x190
[   28.552341]  mempool_alloc_preallocated+0x4d/0x90
[   28.552557]  mempool_double_free_helper+0x8a/0x370
[   28.553491]  mempool_kmalloc_double_free+0xed/0x140
[   28.553741]  kunit_try_run_case+0x1a5/0x480
[   28.553884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.554733]  kthread+0x337/0x6f0
[   28.555087]  ret_from_fork+0x116/0x1d0
[   28.555258]  ret_from_fork_asm+0x1a/0x30
[   28.555431] 
[   28.555511] Freed by task 283:
[   28.555659]  kasan_save_stack+0x45/0x70
[   28.555877]  kasan_save_track+0x18/0x40
[   28.556211]  kasan_save_free_info+0x3f/0x60
[   28.556394]  __kasan_mempool_poison_object+0x131/0x1d0
[   28.556619]  mempool_free+0x490/0x640
[   28.557361]  mempool_double_free_helper+0x109/0x370
[   28.557652]  mempool_kmalloc_double_free+0xed/0x140
[   28.558436]  kunit_try_run_case+0x1a5/0x480
[   28.558726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.559238]  kthread+0x337/0x6f0
[   28.559547]  ret_from_fork+0x116/0x1d0
[   28.559743]  ret_from_fork_asm+0x1a/0x30
[   28.560374] 
[   28.560503] The buggy address belongs to the object at ffff88810604d000
[   28.560503]  which belongs to the cache kmalloc-128 of size 128
[   28.561498] The buggy address is located 0 bytes inside of
[   28.561498]  128-byte region [ffff88810604d000, ffff88810604d080)
[   28.562225] 
[   28.562328] The buggy address belongs to the physical page:
[   28.562562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604d
[   28.563448] flags: 0x200000000000000(node=0|zone=2)
[   28.563778] page_type: f5(slab)
[   28.564248] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.564774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.565254] page dumped because: kasan: bad access detected
[   28.565487] 
[   28.565580] Memory state around the buggy address:
[   28.566463]  ffff88810604cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.567119]  ffff88810604cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.567419] >ffff88810604d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.567711]                    ^
[   28.567939]  ffff88810604d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.568225]  ffff88810604d100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.568502] ==================================================================