Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.478774] ==================================================================
[   34.479304] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.479783] Free of addr fff00000c9b8c000 by task kunit_try_catch/271
[   34.480326] 
[   34.480609] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.481836] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.482281] Hardware name: linux,dummy-virt (DT)
[   34.482500] Call trace:
[   34.482611]  show_stack+0x20/0x38 (C)
[   34.483013]  dump_stack_lvl+0x8c/0xd0
[   34.483212]  print_report+0x118/0x5e8
[   34.483562]  kasan_report_invalid_free+0xc0/0xe8
[   34.483855]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.484235]  mempool_free+0x3ac/0x5f0
[   34.484590]  mempool_double_free_helper+0x150/0x2e8
[   34.484653]  mempool_page_alloc_double_free+0xbc/0x118
[   34.484712]  kunit_try_run_case+0x170/0x3f0
[   34.484761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.486259]  kthread+0x328/0x630
[   34.486863]  ret_from_fork+0x10/0x20
[   34.487284] 
[   34.487313] The buggy address belongs to the physical page:
[   34.487351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   34.488130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.488422] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.488517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.488705] page dumped because: kasan: bad access detected
[   34.489205] 
[   34.489315] Memory state around the buggy address:
[   34.489355]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.489402]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.489960] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.490341]                    ^
[   34.490779]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.491285]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.491558] ==================================================================
[   34.454098] ==================================================================
[   34.454164] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.454224] Free of addr fff00000c9b8c000 by task kunit_try_catch/269
[   34.454784] 
[   34.454984] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.455178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.455234] Hardware name: linux,dummy-virt (DT)
[   34.455345] Call trace:
[   34.455410]  show_stack+0x20/0x38 (C)
[   34.455519]  dump_stack_lvl+0x8c/0xd0
[   34.455590]  print_report+0x118/0x5e8
[   34.455635]  kasan_report_invalid_free+0xc0/0xe8
[   34.455691]  __kasan_mempool_poison_object+0x14c/0x150
[   34.455741]  mempool_free+0x3f4/0x5f0
[   34.455956]  mempool_double_free_helper+0x150/0x2e8
[   34.456108]  mempool_kmalloc_large_double_free+0xc0/0x118
[   34.456210]  kunit_try_run_case+0x170/0x3f0
[   34.456277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.456428]  kthread+0x328/0x630
[   34.456471]  ret_from_fork+0x10/0x20
[   34.456841] 
[   34.456950] The buggy address belongs to the physical page:
[   34.457023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c
[   34.457081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.457129] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.457232] page_type: f8(unknown)
[   34.457273] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.457401] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.457548] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.457596] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   34.457654] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff
[   34.457704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.457770] page dumped because: kasan: bad access detected
[   34.457903] 
[   34.457921] Memory state around the buggy address:
[   34.458008]  fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458173]  fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458217] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458255]                    ^
[   34.458284]  fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458370]  fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.458409] ==================================================================
[   34.438055] ==================================================================
[   34.438126] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   34.438191] Free of addr fff00000c9a8b000 by task kunit_try_catch/267
[   34.438234] 
[   34.438273] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.438365] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.438393] Hardware name: linux,dummy-virt (DT)
[   34.438425] Call trace:
[   34.438449]  show_stack+0x20/0x38 (C)
[   34.438677]  dump_stack_lvl+0x8c/0xd0
[   34.438756]  print_report+0x118/0x5e8
[   34.439033]  kasan_report_invalid_free+0xc0/0xe8
[   34.439500]  check_slab_allocation+0xd4/0x108
[   34.439552]  __kasan_mempool_poison_object+0x78/0x150
[   34.439651]  mempool_free+0x3f4/0x5f0
[   34.439703]  mempool_double_free_helper+0x150/0x2e8
[   34.439914]  mempool_kmalloc_double_free+0xc0/0x118
[   34.440027]  kunit_try_run_case+0x170/0x3f0
[   34.440226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.440317]  kthread+0x328/0x630
[   34.440359]  ret_from_fork+0x10/0x20
[   34.440419] 
[   34.440439] Allocated by task 267:
[   34.440558]  kasan_save_stack+0x3c/0x68
[   34.440610]  kasan_save_track+0x20/0x40
[   34.440658]  kasan_save_alloc_info+0x40/0x58
[   34.440699]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.440848]  remove_element+0x130/0x1f8
[   34.440986]  mempool_alloc_preallocated+0x58/0xc0
[   34.441110]  mempool_double_free_helper+0x94/0x2e8
[   34.441169]  mempool_kmalloc_double_free+0xc0/0x118
[   34.441490]  kunit_try_run_case+0x170/0x3f0
[   34.441756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.441809]  kthread+0x328/0x630
[   34.441892]  ret_from_fork+0x10/0x20
[   34.441930] 
[   34.442002] Freed by task 267:
[   34.442084]  kasan_save_stack+0x3c/0x68
[   34.442121]  kasan_save_track+0x20/0x40
[   34.442183]  kasan_save_free_info+0x4c/0x78
[   34.442219]  __kasan_mempool_poison_object+0xc0/0x150
[   34.442305]  mempool_free+0x3f4/0x5f0
[   34.442488]  mempool_double_free_helper+0x100/0x2e8
[   34.442532]  mempool_kmalloc_double_free+0xc0/0x118
[   34.442573]  kunit_try_run_case+0x170/0x3f0
[   34.442610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.442691]  kthread+0x328/0x630
[   34.442724]  ret_from_fork+0x10/0x20
[   34.442839] 
[   34.442859] The buggy address belongs to the object at fff00000c9a8b000
[   34.442859]  which belongs to the cache kmalloc-128 of size 128
[   34.443027] The buggy address is located 0 bytes inside of
[   34.443027]  128-byte region [fff00000c9a8b000, fff00000c9a8b080)
[   34.443087] 
[   34.443110] The buggy address belongs to the physical page:
[   34.443147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b
[   34.443474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.443549] page_type: f5(slab)
[   34.443593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.443654] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.443733] page dumped because: kasan: bad access detected
[   34.443769] 
[   34.443943] Memory state around the buggy address:
[   34.444036]  fff00000c9a8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.444080]  fff00000c9a8af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.444123] >fff00000c9a8b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.444163]                    ^
[   34.444409]  fff00000c9a8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444456]  fff00000c9a8b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.444542] ==================================================================

[   27.549593] ==================================================================
[   27.550360] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.550686] Free of addr ffff888106370000 by task kunit_try_catch/288
[   27.551027] 
[   27.551302] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.551356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.551370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.551393] Call Trace:
[   27.551407]  <TASK>
[   27.551424]  dump_stack_lvl+0x73/0xb0
[   27.551454]  print_report+0xd1/0x640
[   27.551478]  ? __virt_addr_valid+0x1db/0x2d0
[   27.551504]  ? kasan_addr_to_slab+0x11/0xa0
[   27.551526]  ? mempool_double_free_helper+0x184/0x370
[   27.551551]  kasan_report_invalid_free+0x10a/0x130
[   27.551577]  ? mempool_double_free_helper+0x184/0x370
[   27.551604]  ? mempool_double_free_helper+0x184/0x370
[   27.551629]  __kasan_mempool_poison_pages+0x115/0x130
[   27.551655]  mempool_free+0x430/0x640
[   27.551682]  mempool_double_free_helper+0x184/0x370
[   27.551707]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.551735]  ? finish_task_switch.isra.0+0x153/0x700
[   27.551762]  mempool_page_alloc_double_free+0xe8/0x140
[   27.551835]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   27.551869]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   27.551893]  ? __pfx_mempool_free_pages+0x10/0x10
[   27.551920]  ? __pfx_read_tsc+0x10/0x10
[   27.551957]  ? ktime_get_ts64+0x86/0x230
[   27.551981]  kunit_try_run_case+0x1a5/0x480
[   27.552007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.552031]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.552063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.552091]  ? __kthread_parkme+0x82/0x180
[   27.552112]  ? preempt_count_sub+0x50/0x80
[   27.552136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.552161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.552185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.552210]  kthread+0x337/0x6f0
[   27.552231]  ? trace_preempt_on+0x20/0xc0
[   27.552255]  ? __pfx_kthread+0x10/0x10
[   27.552276]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.552301]  ? calculate_sigpending+0x7b/0xa0
[   27.552326]  ? __pfx_kthread+0x10/0x10
[   27.552349]  ret_from_fork+0x116/0x1d0
[   27.552370]  ? __pfx_kthread+0x10/0x10
[   27.552391]  ret_from_fork_asm+0x1a/0x30
[   27.552425]  </TASK>
[   27.552436] 
[   27.560859] The buggy address belongs to the physical page:
[   27.561139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370
[   27.561390] flags: 0x200000000000000(node=0|zone=2)
[   27.561568] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   27.562147] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.562505] page dumped because: kasan: bad access detected
[   27.562758] 
[   27.563004] Memory state around the buggy address:
[   27.563329]  ffff88810636ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.563588]  ffff88810636ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.563920] >ffff888106370000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.564276]                    ^
[   27.564433]  ffff888106370080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.564703]  ffff888106370100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.565081] ==================================================================
[   27.520205] ==================================================================
[   27.520804] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.521291] Free of addr ffff888106370000 by task kunit_try_catch/286
[   27.521579] 
[   27.521674] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.521727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.521740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.521763] Call Trace:
[   27.521776]  <TASK>
[   27.521793]  dump_stack_lvl+0x73/0xb0
[   27.521825]  print_report+0xd1/0x640
[   27.521849]  ? __virt_addr_valid+0x1db/0x2d0
[   27.521875]  ? kasan_addr_to_slab+0x11/0xa0
[   27.521897]  ? mempool_double_free_helper+0x184/0x370
[   27.521922]  kasan_report_invalid_free+0x10a/0x130
[   27.521958]  ? mempool_double_free_helper+0x184/0x370
[   27.521986]  ? mempool_double_free_helper+0x184/0x370
[   27.522010]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   27.522036]  mempool_free+0x490/0x640
[   27.522064]  mempool_double_free_helper+0x184/0x370
[   27.522089]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.522421]  ? dequeue_entities+0x23f/0x1630
[   27.522449]  ? __kasan_check_write+0x18/0x20
[   27.522474]  ? __pfx_sched_clock_cpu+0x10/0x10
[   27.522497]  ? finish_task_switch.isra.0+0x153/0x700
[   27.522527]  mempool_kmalloc_large_double_free+0xed/0x140
[   27.522556]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   27.522585]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.522610]  ? __pfx_mempool_kfree+0x10/0x10
[   27.522636]  ? __pfx_read_tsc+0x10/0x10
[   27.522660]  ? ktime_get_ts64+0x86/0x230
[   27.522685]  kunit_try_run_case+0x1a5/0x480
[   27.522712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.522736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.522759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.522787]  ? __kthread_parkme+0x82/0x180
[   27.522808]  ? preempt_count_sub+0x50/0x80
[   27.522832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.522857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.522882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.522907]  kthread+0x337/0x6f0
[   27.522927]  ? trace_preempt_on+0x20/0xc0
[   27.522963]  ? __pfx_kthread+0x10/0x10
[   27.522984]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.523017]  ? calculate_sigpending+0x7b/0xa0
[   27.523042]  ? __pfx_kthread+0x10/0x10
[   27.523076]  ret_from_fork+0x116/0x1d0
[   27.523097]  ? __pfx_kthread+0x10/0x10
[   27.523118]  ret_from_fork_asm+0x1a/0x30
[   27.523150]  </TASK>
[   27.523162] 
[   27.536655] The buggy address belongs to the physical page:
[   27.536974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106370
[   27.537654] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.538211] flags: 0x200000000000040(head|node=0|zone=2)
[   27.538559] page_type: f8(unknown)
[   27.538749] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.539318] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.539756] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.540302] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   27.540656] head: 0200000000000002 ffffea000418dc01 00000000ffffffff 00000000ffffffff
[   27.541310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.541622] page dumped because: kasan: bad access detected
[   27.542132] 
[   27.542245] Memory state around the buggy address:
[   27.542446]  ffff88810636ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.542903]  ffff88810636ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.543433] >ffff888106370000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.543759]                    ^
[   27.543999]  ffff888106370080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.544562]  ffff888106370100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.545098] ==================================================================
[   27.487680] ==================================================================
[   27.488427] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   27.488756] Free of addr ffff888106253400 by task kunit_try_catch/284
[   27.489295] 
[   27.489404] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   27.489456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.489470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.489493] Call Trace:
[   27.489505]  <TASK>
[   27.489523]  dump_stack_lvl+0x73/0xb0
[   27.489559]  print_report+0xd1/0x640
[   27.489583]  ? __virt_addr_valid+0x1db/0x2d0
[   27.489610]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.489637]  ? mempool_double_free_helper+0x184/0x370
[   27.489663]  kasan_report_invalid_free+0x10a/0x130
[   27.489689]  ? mempool_double_free_helper+0x184/0x370
[   27.489715]  ? mempool_double_free_helper+0x184/0x370
[   27.489739]  ? mempool_double_free_helper+0x184/0x370
[   27.489763]  check_slab_allocation+0x101/0x130
[   27.489786]  __kasan_mempool_poison_object+0x91/0x1d0
[   27.489863]  mempool_free+0x490/0x640
[   27.489897]  mempool_double_free_helper+0x184/0x370
[   27.489923]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   27.489962]  ? update_load_avg+0x1be/0x21b0
[   27.489990]  ? finish_task_switch.isra.0+0x153/0x700
[   27.490016]  mempool_kmalloc_double_free+0xed/0x140
[   27.490040]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   27.490076]  ? __pfx_mempool_kmalloc+0x10/0x10
[   27.490100]  ? __pfx_mempool_kfree+0x10/0x10
[   27.490125]  ? __pfx_read_tsc+0x10/0x10
[   27.490149]  ? ktime_get_ts64+0x86/0x230
[   27.490174]  kunit_try_run_case+0x1a5/0x480
[   27.490201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.490225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.490248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.490274]  ? __kthread_parkme+0x82/0x180
[   27.490295]  ? preempt_count_sub+0x50/0x80
[   27.490319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.490344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.490370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.490395]  kthread+0x337/0x6f0
[   27.490415]  ? trace_preempt_on+0x20/0xc0
[   27.490439]  ? __pfx_kthread+0x10/0x10
[   27.490461]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.490486]  ? calculate_sigpending+0x7b/0xa0
[   27.490512]  ? __pfx_kthread+0x10/0x10
[   27.490533]  ret_from_fork+0x116/0x1d0
[   27.490554]  ? __pfx_kthread+0x10/0x10
[   27.490575]  ret_from_fork_asm+0x1a/0x30
[   27.490607]  </TASK>
[   27.490619] 
[   27.499553] Allocated by task 284:
[   27.499735]  kasan_save_stack+0x45/0x70
[   27.500176]  kasan_save_track+0x18/0x40
[   27.500350]  kasan_save_alloc_info+0x3b/0x50
[   27.500501]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   27.500754]  remove_element+0x11e/0x190
[   27.500958]  mempool_alloc_preallocated+0x4d/0x90
[   27.501257]  mempool_double_free_helper+0x8a/0x370
[   27.501448]  mempool_kmalloc_double_free+0xed/0x140
[   27.501679]  kunit_try_run_case+0x1a5/0x480
[   27.501959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.502276]  kthread+0x337/0x6f0
[   27.502434]  ret_from_fork+0x116/0x1d0
[   27.502605]  ret_from_fork_asm+0x1a/0x30
[   27.502834] 
[   27.502925] Freed by task 284:
[   27.503073]  kasan_save_stack+0x45/0x70
[   27.503267]  kasan_save_track+0x18/0x40
[   27.503409]  kasan_save_free_info+0x3f/0x60
[   27.503555]  __kasan_mempool_poison_object+0x131/0x1d0
[   27.503724]  mempool_free+0x490/0x640
[   27.504975]  mempool_double_free_helper+0x109/0x370
[   27.505710]  mempool_kmalloc_double_free+0xed/0x140
[   27.506583]  kunit_try_run_case+0x1a5/0x480
[   27.507343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.508165]  kthread+0x337/0x6f0
[   27.508647]  ret_from_fork+0x116/0x1d0
[   27.508864]  ret_from_fork_asm+0x1a/0x30
[   27.509031] 
[   27.509121] The buggy address belongs to the object at ffff888106253400
[   27.509121]  which belongs to the cache kmalloc-128 of size 128
[   27.509642] The buggy address is located 0 bytes inside of
[   27.509642]  128-byte region [ffff888106253400, ffff888106253480)
[   27.510143] 
[   27.510236] The buggy address belongs to the physical page:
[   27.510479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106253
[   27.510837] flags: 0x200000000000000(node=0|zone=2)
[   27.511694] page_type: f5(slab)
[   27.512186] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.512634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.513189] page dumped because: kasan: bad access detected
[   27.513513] 
[   27.513608] Memory state around the buggy address:
[   27.514110]  ffff888106253300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.514485]  ffff888106253380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.515026] >ffff888106253400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.515344]                    ^
[   27.515508]  ffff888106253480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.516236]  ffff888106253500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.516678] ==================================================================