Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   24.323465] ==================================================================
[   24.323649] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   24.323820] Free of addr fff00000c7a48000 by task kunit_try_catch/239
[   24.323921] 
[   24.324010] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   24.324210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.324277] Hardware name: linux,dummy-virt (DT)
[   24.324358] Call trace:
[   24.324412]  show_stack+0x20/0x38 (C)
[   24.324532]  dump_stack_lvl+0x8c/0xd0
[   24.325141]  print_report+0x118/0x608
[   24.325621]  kasan_report_invalid_free+0xc0/0xe8
[   24.325757]  __kasan_mempool_poison_object+0x14c/0x150
[   24.325896]  mempool_free+0x28c/0x328
[   24.326021]  mempool_double_free_helper+0x150/0x2e8
[   24.326145]  mempool_kmalloc_large_double_free+0xc0/0x118
[   24.326282]  kunit_try_run_case+0x170/0x3f0
[   24.326463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.326644]  kthread+0x328/0x630
[   24.326822]  ret_from_fork+0x10/0x20
[   24.326936] 
[   24.326979] The buggy address belongs to the physical page:
[   24.327039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a48
[   24.327181] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.327286] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.327477] page_type: f8(unknown)
[   24.327631] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.327835] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.327989] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.328151] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.328321] head: 0bfffe0000000002 ffffc1ffc31e9201 00000000ffffffff 00000000ffffffff
[   24.328445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.328597] page dumped because: kasan: bad access detected
[   24.328702] 
[   24.328758] Memory state around the buggy address:
[   24.328849]  fff00000c7a47f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.328960]  fff00000c7a47f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.329065] >fff00000c7a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.329159]                    ^
[   24.329235]  fff00000c7a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.329360]  fff00000c7a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.329453] ==================================================================
[   24.295341] ==================================================================
[   24.295530] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   24.295683] Free of addr fff00000c73ad000 by task kunit_try_catch/237
[   24.297600] 
[   24.297703] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   24.298403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.298497] Hardware name: linux,dummy-virt (DT)
[   24.298577] Call trace:
[   24.298628]  show_stack+0x20/0x38 (C)
[   24.298778]  dump_stack_lvl+0x8c/0xd0
[   24.298907]  print_report+0x118/0x608
[   24.299025]  kasan_report_invalid_free+0xc0/0xe8
[   24.299143]  check_slab_allocation+0xd4/0x108
[   24.299256]  __kasan_mempool_poison_object+0x78/0x150
[   24.299386]  mempool_free+0x28c/0x328
[   24.299512]  mempool_double_free_helper+0x150/0x2e8
[   24.299651]  mempool_kmalloc_double_free+0xc0/0x118
[   24.299794]  kunit_try_run_case+0x170/0x3f0
[   24.299968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.300116]  kthread+0x328/0x630
[   24.300236]  ret_from_fork+0x10/0x20
[   24.300362] 
[   24.300439] Allocated by task 237:
[   24.300521]  kasan_save_stack+0x3c/0x68
[   24.300668]  kasan_save_track+0x20/0x40
[   24.300814]  kasan_save_alloc_info+0x40/0x58
[   24.300909]  __kasan_mempool_unpoison_object+0x11c/0x180
[   24.301288]  remove_element+0x130/0x1f8
[   24.301374]  mempool_alloc_preallocated+0x58/0xc0
[   24.301478]  mempool_double_free_helper+0x94/0x2e8
[   24.301589]  mempool_kmalloc_double_free+0xc0/0x118
[   24.301703]  kunit_try_run_case+0x170/0x3f0
[   24.301810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.301922]  kthread+0x328/0x630
[   24.302066]  ret_from_fork+0x10/0x20
[   24.302162] 
[   24.302217] Freed by task 237:
[   24.302323]  kasan_save_stack+0x3c/0x68
[   24.302452]  kasan_save_track+0x20/0x40
[   24.302576]  kasan_save_free_info+0x4c/0x78
[   24.302666]  __kasan_mempool_poison_object+0xc0/0x150
[   24.302763]  mempool_free+0x28c/0x328
[   24.302838]  mempool_double_free_helper+0x100/0x2e8
[   24.302928]  mempool_kmalloc_double_free+0xc0/0x118
[   24.303059]  kunit_try_run_case+0x170/0x3f0
[   24.303200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.303348]  kthread+0x328/0x630
[   24.303476]  ret_from_fork+0x10/0x20
[   24.303597] 
[   24.303659] The buggy address belongs to the object at fff00000c73ad000
[   24.303659]  which belongs to the cache kmalloc-128 of size 128
[   24.303808] The buggy address is located 0 bytes inside of
[   24.303808]  128-byte region [fff00000c73ad000, fff00000c73ad080)
[   24.303989] 
[   24.304118] The buggy address belongs to the physical page:
[   24.304191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1073ad
[   24.304327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.304457] page_type: f5(slab)
[   24.304581] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.304713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.304847] page dumped because: kasan: bad access detected
[   24.304964] 
[   24.305019] Memory state around the buggy address:
[   24.305129]  fff00000c73acf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.305253]  fff00000c73acf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.305381] >fff00000c73ad000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.305475]                    ^
[   24.305547]  fff00000c73ad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.305653]  fff00000c73ad100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.305750] ==================================================================
[   24.372593] ==================================================================
[   24.374347] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   24.374525] Free of addr fff00000c7a48000 by task kunit_try_catch/241
[   24.374620] 
[   24.374761] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   24.375332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.375467] Hardware name: linux,dummy-virt (DT)
[   24.375564] Call trace:
[   24.375617]  show_stack+0x20/0x38 (C)
[   24.375758]  dump_stack_lvl+0x8c/0xd0
[   24.375871]  print_report+0x118/0x608
[   24.376333]  kasan_report_invalid_free+0xc0/0xe8
[   24.376493]  __kasan_mempool_poison_pages+0xe0/0xe8
[   24.376630]  mempool_free+0x24c/0x328
[   24.376759]  mempool_double_free_helper+0x150/0x2e8
[   24.376877]  mempool_page_alloc_double_free+0xbc/0x118
[   24.377004]  kunit_try_run_case+0x170/0x3f0
[   24.377132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.377269]  kthread+0x328/0x630
[   24.377417]  ret_from_fork+0x10/0x20
[   24.377963] 
[   24.378045] The buggy address belongs to the physical page:
[   24.378324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a48
[   24.378479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.378613] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.378725] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.378868] page dumped because: kasan: bad access detected
[   24.378969] 
[   24.379038] Memory state around the buggy address:
[   24.379119]  fff00000c7a47f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.379249]  fff00000c7a47f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.379384] >fff00000c7a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.379493]                    ^
[   24.379570]  fff00000c7a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.379681]  fff00000c7a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.379788] ==================================================================

[   21.876747] ==================================================================
[   21.878019] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   21.879120] Free of addr ffff888102a08000 by task kunit_try_catch/257
[   21.880643] 
[   21.880881] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   21.881210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.881246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.881281] Call Trace:
[   21.881325]  <TASK>
[   21.881352]  dump_stack_lvl+0x73/0xb0
[   21.881396]  print_report+0xd1/0x650
[   21.881434]  ? __virt_addr_valid+0x1db/0x2d0
[   21.881471]  ? kasan_addr_to_slab+0x11/0xa0
[   21.881504]  ? mempool_double_free_helper+0x184/0x370
[   21.881545]  kasan_report_invalid_free+0x10a/0x130
[   21.881585]  ? mempool_double_free_helper+0x184/0x370
[   21.881627]  ? mempool_double_free_helper+0x184/0x370
[   21.881663]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   21.881702]  mempool_free+0x2ec/0x380
[   21.881741]  mempool_double_free_helper+0x184/0x370
[   21.881783]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   21.881822]  ? update_load_avg+0x1be/0x21b0
[   21.881853]  ? dequeue_entities+0x27e/0x1740
[   21.881891]  ? finish_task_switch.isra.0+0x153/0x700
[   21.881932]  mempool_kmalloc_large_double_free+0xed/0x140
[   21.881972]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   21.882012]  ? dequeue_task_fair+0x166/0x4e0
[   21.882322]  ? __pfx_mempool_kmalloc+0x10/0x10
[   21.882369]  ? __pfx_mempool_kfree+0x10/0x10
[   21.882405]  ? __pfx_read_tsc+0x10/0x10
[   21.882443]  ? ktime_get_ts64+0x86/0x230
[   21.882484]  kunit_try_run_case+0x1a5/0x480
[   21.882528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.882565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.882604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.882643]  ? __kthread_parkme+0x82/0x180
[   21.882678]  ? preempt_count_sub+0x50/0x80
[   21.882717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.882754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.882790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.882826]  kthread+0x337/0x6f0
[   21.882850]  ? trace_preempt_on+0x20/0xc0
[   21.882888]  ? __pfx_kthread+0x10/0x10
[   21.882915]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.882948]  ? calculate_sigpending+0x7b/0xa0
[   21.883046]  ? __pfx_kthread+0x10/0x10
[   21.883127]  ret_from_fork+0x41/0x80
[   21.883167]  ? __pfx_kthread+0x10/0x10
[   21.883194]  ret_from_fork_asm+0x1a/0x30
[   21.883242]  </TASK>
[   21.883258] 
[   21.907070] The buggy address belongs to the physical page:
[   21.907597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a08
[   21.908612] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.909563] flags: 0x200000000000040(head|node=0|zone=2)
[   21.909953] page_type: f8(unknown)
[   21.910363] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.912695] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.913464] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.914734] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.915656] head: 0200000000000002 ffffea00040a8201 00000000ffffffff 00000000ffffffff
[   21.916765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.917807] page dumped because: kasan: bad access detected
[   21.918601] 
[   21.918772] Memory state around the buggy address:
[   21.919253]  ffff888102a07f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.919799]  ffff888102a07f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.921749] >ffff888102a08000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.922626]                    ^
[   21.922959]  ffff888102a08080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.923745]  ffff888102a08100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.924712] ==================================================================
[   21.932320] ==================================================================
[   21.933193] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   21.934344] Free of addr ffff888103928000 by task kunit_try_catch/259
[   21.934985] 
[   21.935729] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   21.935867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.935924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.936362] Call Trace:
[   21.936408]  <TASK>
[   21.936457]  dump_stack_lvl+0x73/0xb0
[   21.936558]  print_report+0xd1/0x650
[   21.936637]  ? __virt_addr_valid+0x1db/0x2d0
[   21.936700]  ? kasan_addr_to_slab+0x11/0xa0
[   21.936738]  ? mempool_double_free_helper+0x184/0x370
[   21.936779]  kasan_report_invalid_free+0x10a/0x130
[   21.936851]  ? mempool_double_free_helper+0x184/0x370
[   21.936904]  ? mempool_double_free_helper+0x184/0x370
[   21.936942]  __kasan_mempool_poison_pages+0x115/0x130
[   21.937020]  mempool_free+0x290/0x380
[   21.937278]  mempool_double_free_helper+0x184/0x370
[   21.937352]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   21.937396]  ? dequeue_entities+0x852/0x1740
[   21.937438]  ? irqentry_exit+0x2a/0x60
[   21.937466]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.937510]  mempool_page_alloc_double_free+0xe8/0x140
[   21.937544]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   21.937581]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   21.937613]  ? __pfx_mempool_free_pages+0x10/0x10
[   21.937647]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   21.937684]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   21.937720]  kunit_try_run_case+0x1a5/0x480
[   21.937761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.937798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.937838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.937875]  ? __kthread_parkme+0x82/0x180
[   21.937909]  ? preempt_count_sub+0x50/0x80
[   21.937950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.938031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.938111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.938152]  kthread+0x337/0x6f0
[   21.938179]  ? trace_preempt_on+0x20/0xc0
[   21.938219]  ? __pfx_kthread+0x10/0x10
[   21.938247]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.938280]  ? calculate_sigpending+0x7b/0xa0
[   21.938341]  ? __pfx_kthread+0x10/0x10
[   21.938370]  ret_from_fork+0x41/0x80
[   21.938406]  ? __pfx_kthread+0x10/0x10
[   21.938437]  ret_from_fork_asm+0x1a/0x30
[   21.938486]  </TASK>
[   21.938502] 
[   21.965673] The buggy address belongs to the physical page:
[   21.966319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103928
[   21.966984] flags: 0x200000000000000(node=0|zone=2)
[   21.968150] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   21.968757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.970094] page dumped because: kasan: bad access detected
[   21.970718] 
[   21.970942] Memory state around the buggy address:
[   21.972120]  ffff888103927f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.973461]  ffff888103927f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.973961] >ffff888103928000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.974643]                    ^
[   21.974968]  ffff888103928080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.976459]  ffff888103928100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.978194] ==================================================================
[   21.811576] ==================================================================
[   21.812959] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   21.813584] Free of addr ffff8881030b5200 by task kunit_try_catch/255
[   21.814058] 
[   21.815360] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   21.815478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.815501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.815532] Call Trace:
[   21.815551]  <TASK>
[   21.815577]  dump_stack_lvl+0x73/0xb0
[   21.815621]  print_report+0xd1/0x650
[   21.815659]  ? __virt_addr_valid+0x1db/0x2d0
[   21.815696]  ? kasan_complete_mode_report_info+0x64/0x200
[   21.815733]  ? mempool_double_free_helper+0x184/0x370
[   21.815775]  kasan_report_invalid_free+0x10a/0x130
[   21.815817]  ? mempool_double_free_helper+0x184/0x370
[   21.815862]  ? mempool_double_free_helper+0x184/0x370
[   21.815920]  ? mempool_double_free_helper+0x184/0x370
[   21.816017]  check_slab_allocation+0x101/0x130
[   21.816117]  __kasan_mempool_poison_object+0x91/0x1d0
[   21.816170]  mempool_free+0x2ec/0x380
[   21.816211]  mempool_double_free_helper+0x184/0x370
[   21.816254]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   21.816321]  ? dequeue_entities+0x852/0x1740
[   21.816366]  ? finish_task_switch.isra.0+0x153/0x700
[   21.816410]  mempool_kmalloc_double_free+0xed/0x140
[   21.816451]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   21.816492]  ? dequeue_task_fair+0x166/0x4e0
[   21.816529]  ? __pfx_mempool_kmalloc+0x10/0x10
[   21.816561]  ? __pfx_mempool_kfree+0x10/0x10
[   21.816596]  ? __pfx_read_tsc+0x10/0x10
[   21.816629]  ? ktime_get_ts64+0x86/0x230
[   21.816669]  kunit_try_run_case+0x1a5/0x480
[   21.816709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.816747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.816787]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.816825]  ? __kthread_parkme+0x82/0x180
[   21.816860]  ? preempt_count_sub+0x50/0x80
[   21.816897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.816936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.817030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.817120]  kthread+0x337/0x6f0
[   21.817160]  ? trace_preempt_on+0x20/0xc0
[   21.817201]  ? __pfx_kthread+0x10/0x10
[   21.817229]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.817265]  ? calculate_sigpending+0x7b/0xa0
[   21.817329]  ? __pfx_kthread+0x10/0x10
[   21.817363]  ret_from_fork+0x41/0x80
[   21.817400]  ? __pfx_kthread+0x10/0x10
[   21.817427]  ret_from_fork_asm+0x1a/0x30
[   21.817476]  </TASK>
[   21.817492] 
[   21.839122] Allocated by task 255:
[   21.839563]  kasan_save_stack+0x45/0x70
[   21.840234]  kasan_save_track+0x18/0x40
[   21.840679]  kasan_save_alloc_info+0x3b/0x50
[   21.841544]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   21.842410]  remove_element+0x11e/0x190
[   21.842843]  mempool_alloc_preallocated+0x4d/0x90
[   21.843459]  mempool_double_free_helper+0x8a/0x370
[   21.844086]  mempool_kmalloc_double_free+0xed/0x140
[   21.844586]  kunit_try_run_case+0x1a5/0x480
[   21.845447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.846159]  kthread+0x337/0x6f0
[   21.846646]  ret_from_fork+0x41/0x80
[   21.847068]  ret_from_fork_asm+0x1a/0x30
[   21.847664] 
[   21.847920] Freed by task 255:
[   21.848365]  kasan_save_stack+0x45/0x70
[   21.848685]  kasan_save_track+0x18/0x40
[   21.849042]  kasan_save_free_info+0x3f/0x60
[   21.849560]  __kasan_mempool_poison_object+0x131/0x1d0
[   21.850144]  mempool_free+0x2ec/0x380
[   21.851082]  mempool_double_free_helper+0x109/0x370
[   21.851990]  mempool_kmalloc_double_free+0xed/0x140
[   21.852588]  kunit_try_run_case+0x1a5/0x480
[   21.853053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.854068]  kthread+0x337/0x6f0
[   21.854577]  ret_from_fork+0x41/0x80
[   21.855276]  ret_from_fork_asm+0x1a/0x30
[   21.855890] 
[   21.856281] The buggy address belongs to the object at ffff8881030b5200
[   21.856281]  which belongs to the cache kmalloc-128 of size 128
[   21.857144] The buggy address is located 0 bytes inside of
[   21.857144]  128-byte region [ffff8881030b5200, ffff8881030b5280)
[   21.858378] 
[   21.858827] The buggy address belongs to the physical page:
[   21.859333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030b5
[   21.860035] flags: 0x200000000000000(node=0|zone=2)
[   21.860916] page_type: f5(slab)
[   21.861595] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.862275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.863345] page dumped because: kasan: bad access detected
[   21.863783] 
[   21.864024] Memory state around the buggy address:
[   21.864587]  ffff8881030b5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.865728]  ffff8881030b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.866304] >ffff8881030b5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.867214]                    ^
[   21.867605]  ffff8881030b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.868237]  ffff8881030b5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.868953] ==================================================================