Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.224258] ==================================================================
[   20.224379] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.224452] Free of addr fff00000c7964000 by task kunit_try_catch/237
[   20.224495] 
[   20.224725] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.224904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.224953] Hardware name: linux,dummy-virt (DT)
[   20.225003] Call trace:
[   20.225028]  show_stack+0x20/0x38 (C)
[   20.225163]  dump_stack_lvl+0x8c/0xd0
[   20.225214]  print_report+0x118/0x608
[   20.225262]  kasan_report_invalid_free+0xc0/0xe8
[   20.225469]  __kasan_mempool_poison_object+0x14c/0x150
[   20.225616]  mempool_free+0x28c/0x328
[   20.225711]  mempool_double_free_helper+0x150/0x2e8
[   20.225765]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.225844]  kunit_try_run_case+0x170/0x3f0
[   20.225993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.226048]  kthread+0x328/0x630
[   20.226107]  ret_from_fork+0x10/0x20
[   20.226289] 
[   20.226355] The buggy address belongs to the physical page:
[   20.226507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107964
[   20.226589] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.226731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.226886] page_type: f8(unknown)
[   20.227042] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.227150] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.227374] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.227589] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.227751] head: 0bfffe0000000002 ffffc1ffc31e5901 00000000ffffffff 00000000ffffffff
[   20.227850] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.228018] page dumped because: kasan: bad access detected
[   20.228097] 
[   20.228138] Memory state around the buggy address:
[   20.228277]  fff00000c7963f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.228407]  fff00000c7963f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.228451] >fff00000c7964000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.228676]                    ^
[   20.228759]  fff00000c7964080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.228816]  fff00000c7964100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.229316] ==================================================================
[   20.211678] ==================================================================
[   20.211738] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.211794] Free of addr fff00000c6398400 by task kunit_try_catch/235
[   20.211836] 
[   20.211886] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.211967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.211994] Hardware name: linux,dummy-virt (DT)
[   20.212026] Call trace:
[   20.212048]  show_stack+0x20/0x38 (C)
[   20.212097]  dump_stack_lvl+0x8c/0xd0
[   20.212479]  print_report+0x118/0x608
[   20.212545]  kasan_report_invalid_free+0xc0/0xe8
[   20.212606]  check_slab_allocation+0xd4/0x108
[   20.212665]  __kasan_mempool_poison_object+0x78/0x150
[   20.212767]  mempool_free+0x28c/0x328
[   20.212828]  mempool_double_free_helper+0x150/0x2e8
[   20.212889]  mempool_kmalloc_double_free+0xc0/0x118
[   20.212937]  kunit_try_run_case+0x170/0x3f0
[   20.212988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.213041]  kthread+0x328/0x630
[   20.213082]  ret_from_fork+0x10/0x20
[   20.213149] 
[   20.213166] Allocated by task 235:
[   20.213195]  kasan_save_stack+0x3c/0x68
[   20.213237]  kasan_save_track+0x20/0x40
[   20.213274]  kasan_save_alloc_info+0x40/0x58
[   20.213329]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.213373]  remove_element+0x130/0x1f8
[   20.213406]  mempool_alloc_preallocated+0x58/0xc0
[   20.213455]  mempool_double_free_helper+0x94/0x2e8
[   20.213493]  mempool_kmalloc_double_free+0xc0/0x118
[   20.213543]  kunit_try_run_case+0x170/0x3f0
[   20.213596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.213639]  kthread+0x328/0x630
[   20.213671]  ret_from_fork+0x10/0x20
[   20.213707] 
[   20.213736] Freed by task 235:
[   20.213771]  kasan_save_stack+0x3c/0x68
[   20.213808]  kasan_save_track+0x20/0x40
[   20.213845]  kasan_save_free_info+0x4c/0x78
[   20.213894]  __kasan_mempool_poison_object+0xc0/0x150
[   20.213936]  mempool_free+0x28c/0x328
[   20.213970]  mempool_double_free_helper+0x100/0x2e8
[   20.214027]  mempool_kmalloc_double_free+0xc0/0x118
[   20.214067]  kunit_try_run_case+0x170/0x3f0
[   20.214120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.214163]  kthread+0x328/0x630
[   20.214195]  ret_from_fork+0x10/0x20
[   20.214232] 
[   20.214258] The buggy address belongs to the object at fff00000c6398400
[   20.214258]  which belongs to the cache kmalloc-128 of size 128
[   20.214332] The buggy address is located 0 bytes inside of
[   20.214332]  128-byte region [fff00000c6398400, fff00000c6398480)
[   20.214414] 
[   20.214442] The buggy address belongs to the physical page:
[   20.214479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   20.214531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.214578] page_type: f5(slab)
[   20.214629] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.214679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.214719] page dumped because: kasan: bad access detected
[   20.214934] 
[   20.215072] Memory state around the buggy address:
[   20.215230]  fff00000c6398300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.215380]  fff00000c6398380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.215478] >fff00000c6398400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.215519]                    ^
[   20.215548]  fff00000c6398480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.215693]  fff00000c6398500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.215735] ==================================================================
[   20.237407] ==================================================================
[   20.237463] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.237516] Free of addr fff00000c7964000 by task kunit_try_catch/239
[   20.237555] 
[   20.237794] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.237951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.238010] Hardware name: linux,dummy-virt (DT)
[   20.238060] Call trace:
[   20.238152]  show_stack+0x20/0x38 (C)
[   20.238207]  dump_stack_lvl+0x8c/0xd0
[   20.238265]  print_report+0x118/0x608
[   20.238313]  kasan_report_invalid_free+0xc0/0xe8
[   20.238363]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.238603]  mempool_free+0x24c/0x328
[   20.238709]  mempool_double_free_helper+0x150/0x2e8
[   20.238773]  mempool_page_alloc_double_free+0xbc/0x118
[   20.238933]  kunit_try_run_case+0x170/0x3f0
[   20.239127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.239324]  kthread+0x328/0x630
[   20.239465]  ret_from_fork+0x10/0x20
[   20.239635] 
[   20.239715] The buggy address belongs to the physical page:
[   20.239824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107964
[   20.239943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.240189] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.240356] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.240425] page dumped because: kasan: bad access detected
[   20.240554] 
[   20.240634] Memory state around the buggy address:
[   20.240672]  fff00000c7963f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.240890]  fff00000c7963f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.241075] >fff00000c7964000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.241191]                    ^
[   20.241221]  fff00000c7964080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.241298]  fff00000c7964100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.241493] ==================================================================

[   13.254053] ==================================================================
[   13.254667] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.254966] Free of addr ffff888102a40000 by task kunit_try_catch/255
[   13.255264] 
[   13.255438] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.255498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.255511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.255534] Call Trace:
[   13.255546]  <TASK>
[   13.255563]  dump_stack_lvl+0x73/0xb0
[   13.255592]  print_report+0xd1/0x650
[   13.255613]  ? __virt_addr_valid+0x1db/0x2d0
[   13.255636]  ? kasan_addr_to_slab+0x11/0xa0
[   13.255657]  ? mempool_double_free_helper+0x184/0x370
[   13.255682]  kasan_report_invalid_free+0x10a/0x130
[   13.255706]  ? mempool_double_free_helper+0x184/0x370
[   13.255734]  ? mempool_double_free_helper+0x184/0x370
[   13.255757]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   13.255781]  mempool_free+0x2ec/0x380
[   13.255804]  mempool_double_free_helper+0x184/0x370
[   13.255828]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.255856]  ? finish_task_switch.isra.0+0x153/0x700
[   13.255881]  mempool_kmalloc_large_double_free+0xed/0x140
[   13.255906]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   13.255934]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.255956]  ? __pfx_mempool_kfree+0x10/0x10
[   13.255981]  ? __pfx_read_tsc+0x10/0x10
[   13.256002]  ? ktime_get_ts64+0x86/0x230
[   13.256025]  kunit_try_run_case+0x1a5/0x480
[   13.256049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.256071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.256095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.256118]  ? __kthread_parkme+0x82/0x180
[   13.256138]  ? preempt_count_sub+0x50/0x80
[   13.256161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.256183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.256255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.256278]  kthread+0x337/0x6f0
[   13.256299]  ? trace_preempt_on+0x20/0xc0
[   13.256321]  ? __pfx_kthread+0x10/0x10
[   13.256342]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.256362]  ? calculate_sigpending+0x7b/0xa0
[   13.256387]  ? __pfx_kthread+0x10/0x10
[   13.256409]  ret_from_fork+0x116/0x1d0
[   13.256428]  ? __pfx_kthread+0x10/0x10
[   13.256449]  ret_from_fork_asm+0x1a/0x30
[   13.256490]  </TASK>
[   13.256502] 
[   13.264988] The buggy address belongs to the physical page:
[   13.265431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a40
[   13.265992] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.266230] flags: 0x200000000000040(head|node=0|zone=2)
[   13.266498] page_type: f8(unknown)
[   13.266755] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.267169] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.267627] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.267954] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.268283] head: 0200000000000002 ffffea00040a9001 00000000ffffffff 00000000ffffffff
[   13.268621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.268993] page dumped because: kasan: bad access detected
[   13.269211] 
[   13.269482] Memory state around the buggy address:
[   13.269676]  ffff888102a3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.269990]  ffff888102a3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.270206] >ffff888102a40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.270574]                    ^
[   13.270779]  ffff888102a40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.271101]  ffff888102a40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.271484] ==================================================================
[   13.276803] ==================================================================
[   13.277569] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.277928] Free of addr ffff888102a40000 by task kunit_try_catch/257
[   13.278165] 
[   13.278411] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.278472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.278486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.278509] Call Trace:
[   13.278522]  <TASK>
[   13.278538]  dump_stack_lvl+0x73/0xb0
[   13.278567]  print_report+0xd1/0x650
[   13.278590]  ? __virt_addr_valid+0x1db/0x2d0
[   13.278641]  ? kasan_addr_to_slab+0x11/0xa0
[   13.278663]  ? mempool_double_free_helper+0x184/0x370
[   13.278697]  kasan_report_invalid_free+0x10a/0x130
[   13.278722]  ? mempool_double_free_helper+0x184/0x370
[   13.278764]  ? mempool_double_free_helper+0x184/0x370
[   13.278789]  __kasan_mempool_poison_pages+0x115/0x130
[   13.278814]  mempool_free+0x290/0x380
[   13.278852]  mempool_double_free_helper+0x184/0x370
[   13.278876]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.278904]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.278926]  ? finish_task_switch.isra.0+0x153/0x700
[   13.278951]  mempool_page_alloc_double_free+0xe8/0x140
[   13.278978]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   13.279003]  ? __kasan_check_write+0x18/0x20
[   13.279025]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   13.279044]  ? __pfx_mempool_free_pages+0x10/0x10
[   13.279067]  ? __pfx_read_tsc+0x10/0x10
[   13.279088]  ? ktime_get_ts64+0x86/0x230
[   13.279108]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.279135]  kunit_try_run_case+0x1a5/0x480
[   13.279160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.279184]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.279277]  ? __kthread_parkme+0x82/0x180
[   13.279299]  ? preempt_count_sub+0x50/0x80
[   13.279322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.279346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.279369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.279392]  kthread+0x337/0x6f0
[   13.279412]  ? trace_preempt_on+0x20/0xc0
[   13.279435]  ? __pfx_kthread+0x10/0x10
[   13.279468]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.279489]  ? calculate_sigpending+0x7b/0xa0
[   13.279513]  ? __pfx_kthread+0x10/0x10
[   13.279535]  ret_from_fork+0x116/0x1d0
[   13.279553]  ? __pfx_kthread+0x10/0x10
[   13.279574]  ret_from_fork_asm+0x1a/0x30
[   13.279605]  </TASK>
[   13.279616] 
[   13.290019] The buggy address belongs to the physical page:
[   13.290394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a40
[   13.290857] flags: 0x200000000000000(node=0|zone=2)
[   13.291090] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   13.291492] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.291975] page dumped because: kasan: bad access detected
[   13.292568] 
[   13.292677] Memory state around the buggy address:
[   13.292875]  ffff888102a3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.293123]  ffff888102a3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.293750] >ffff888102a40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.294266]                    ^
[   13.294405]  ffff888102a40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.294845]  ffff888102a40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.295248] ==================================================================
[   13.225955] ==================================================================
[   13.226504] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   13.226783] Free of addr ffff8881031c1100 by task kunit_try_catch/253
[   13.227447] 
[   13.227659] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.227705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.227718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.227741] Call Trace:
[   13.227755]  <TASK>
[   13.227772]  dump_stack_lvl+0x73/0xb0
[   13.227803]  print_report+0xd1/0x650
[   13.227826]  ? __virt_addr_valid+0x1db/0x2d0
[   13.227851]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.227874]  ? mempool_double_free_helper+0x184/0x370
[   13.227910]  kasan_report_invalid_free+0x10a/0x130
[   13.227934]  ? mempool_double_free_helper+0x184/0x370
[   13.227960]  ? mempool_double_free_helper+0x184/0x370
[   13.227983]  ? mempool_double_free_helper+0x184/0x370
[   13.228005]  check_slab_allocation+0x101/0x130
[   13.228027]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.228052]  mempool_free+0x2ec/0x380
[   13.228075]  mempool_double_free_helper+0x184/0x370
[   13.228099]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   13.228122]  ? update_load_avg+0x1be/0x21b0
[   13.228146]  ? dequeue_entities+0x27e/0x1740
[   13.228172]  ? finish_task_switch.isra.0+0x153/0x700
[   13.228198]  mempool_kmalloc_double_free+0xed/0x140
[   13.228238]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   13.228267]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.228290]  ? __pfx_mempool_kfree+0x10/0x10
[   13.228316]  ? __pfx_read_tsc+0x10/0x10
[   13.228337]  ? ktime_get_ts64+0x86/0x230
[   13.228363]  kunit_try_run_case+0x1a5/0x480
[   13.228388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.228411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.228435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.228470]  ? __kthread_parkme+0x82/0x180
[   13.228492]  ? preempt_count_sub+0x50/0x80
[   13.228516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.228540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.228563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.228587]  kthread+0x337/0x6f0
[   13.228606]  ? trace_preempt_on+0x20/0xc0
[   13.228630]  ? __pfx_kthread+0x10/0x10
[   13.228651]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.228672]  ? calculate_sigpending+0x7b/0xa0
[   13.228697]  ? __pfx_kthread+0x10/0x10
[   13.228719]  ret_from_fork+0x116/0x1d0
[   13.228738]  ? __pfx_kthread+0x10/0x10
[   13.228759]  ret_from_fork_asm+0x1a/0x30
[   13.228791]  </TASK>
[   13.228804] 
[   13.238373] Allocated by task 253:
[   13.238587]  kasan_save_stack+0x45/0x70
[   13.238912]  kasan_save_track+0x18/0x40
[   13.239092]  kasan_save_alloc_info+0x3b/0x50
[   13.239391]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.239618]  remove_element+0x11e/0x190
[   13.239758]  mempool_alloc_preallocated+0x4d/0x90
[   13.239915]  mempool_double_free_helper+0x8a/0x370
[   13.240115]  mempool_kmalloc_double_free+0xed/0x140
[   13.240503]  kunit_try_run_case+0x1a5/0x480
[   13.240787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.241028]  kthread+0x337/0x6f0
[   13.241152]  ret_from_fork+0x116/0x1d0
[   13.241512]  ret_from_fork_asm+0x1a/0x30
[   13.241702] 
[   13.241811] Freed by task 253:
[   13.241974]  kasan_save_stack+0x45/0x70
[   13.242150]  kasan_save_track+0x18/0x40
[   13.242318]  kasan_save_free_info+0x3f/0x60
[   13.242523]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.242787]  mempool_free+0x2ec/0x380
[   13.242955]  mempool_double_free_helper+0x109/0x370
[   13.243173]  mempool_kmalloc_double_free+0xed/0x140
[   13.243342]  kunit_try_run_case+0x1a5/0x480
[   13.243512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.243764]  kthread+0x337/0x6f0
[   13.244022]  ret_from_fork+0x116/0x1d0
[   13.244297]  ret_from_fork_asm+0x1a/0x30
[   13.244562] 
[   13.244638] The buggy address belongs to the object at ffff8881031c1100
[   13.244638]  which belongs to the cache kmalloc-128 of size 128
[   13.245291] The buggy address is located 0 bytes inside of
[   13.245291]  128-byte region [ffff8881031c1100, ffff8881031c1180)
[   13.245771] 
[   13.245847] The buggy address belongs to the physical page:
[   13.246248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c1
[   13.246633] flags: 0x200000000000000(node=0|zone=2)
[   13.246850] page_type: f5(slab)
[   13.247041] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.247288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.247638] page dumped because: kasan: bad access detected
[   13.247918] 
[   13.247995] Memory state around the buggy address:
[   13.248346]  ffff8881031c1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.248693]  ffff8881031c1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.248968] >ffff8881031c1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.249184]                    ^
[   13.249301]  ffff8881031c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.249559]  ffff8881031c1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.249874] ==================================================================