Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.243906] ==================================================================
[   17.243964] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.244014] Free of addr fff00000c77e0000 by task kunit_try_catch/238
[   17.244057] 
[   17.244088] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.244170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.244213] Hardware name: linux,dummy-virt (DT)
[   17.244245] Call trace:
[   17.244268]  show_stack+0x20/0x38 (C)
[   17.244318]  dump_stack_lvl+0x8c/0xd0
[   17.244365]  print_report+0x118/0x5d0
[   17.244479]  kasan_report_invalid_free+0xc0/0xe8
[   17.244858]  __kasan_mempool_poison_object+0x14c/0x150
[   17.245258]  mempool_free+0x28c/0x328
[   17.245456]  mempool_double_free_helper+0x150/0x2e8
[   17.245533]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.245586]  kunit_try_run_case+0x170/0x3f0
[   17.246285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.247129]  kthread+0x328/0x630
[   17.247281]  ret_from_fork+0x10/0x20
[   17.247587] 
[   17.247884] The buggy address belongs to the physical page:
[   17.248090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   17.249370] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.249535] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.249839] page_type: f8(unknown)
[   17.250582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.250861] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.250975] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.251044] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.251253] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   17.252049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.252749] page dumped because: kasan: bad access detected
[   17.252878] 
[   17.252933] Memory state around the buggy address:
[   17.253010]  fff00000c77dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.253060]  fff00000c77dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.253296] >fff00000c77e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.254316]                    ^
[   17.254371]  fff00000c77e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.254620]  fff00000c77e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.255294] ==================================================================
[   17.291492] ==================================================================
[   17.292091] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.292359] Free of addr fff00000c77e0000 by task kunit_try_catch/240
[   17.292403] 
[   17.292437] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.292521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.293415] Hardware name: linux,dummy-virt (DT)
[   17.293518] Call trace:
[   17.293541]  show_stack+0x20/0x38 (C)
[   17.293620]  dump_stack_lvl+0x8c/0xd0
[   17.293670]  print_report+0x118/0x5d0
[   17.293796]  kasan_report_invalid_free+0xc0/0xe8
[   17.293851]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.293903]  mempool_free+0x24c/0x328
[   17.294069]  mempool_double_free_helper+0x150/0x2e8
[   17.294156]  mempool_page_alloc_double_free+0xbc/0x118
[   17.294221]  kunit_try_run_case+0x170/0x3f0
[   17.294331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.294514]  kthread+0x328/0x630
[   17.294557]  ret_from_fork+0x10/0x20
[   17.294627] 
[   17.294649] The buggy address belongs to the physical page:
[   17.294681] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   17.294737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.294925] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.295146] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.295310] page dumped because: kasan: bad access detected
[   17.295343] 
[   17.295361] Memory state around the buggy address:
[   17.295425]  fff00000c77dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.295537]  fff00000c77dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.295675] >fff00000c77e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.295714]                    ^
[   17.295767]  fff00000c77e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.295919]  fff00000c77e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.295991] ==================================================================
[   17.230404] ==================================================================
[   17.230463] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.230514] Free of addr fff00000c64d8800 by task kunit_try_catch/236
[   17.230555] 
[   17.230614] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.230704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.230731] Hardware name: linux,dummy-virt (DT)
[   17.230763] Call trace:
[   17.230784]  show_stack+0x20/0x38 (C)
[   17.230834]  dump_stack_lvl+0x8c/0xd0
[   17.230889]  print_report+0x118/0x5d0
[   17.230943]  kasan_report_invalid_free+0xc0/0xe8
[   17.230992]  check_slab_allocation+0xd4/0x108
[   17.231049]  __kasan_mempool_poison_object+0x78/0x150
[   17.231102]  mempool_free+0x28c/0x328
[   17.231147]  mempool_double_free_helper+0x150/0x2e8
[   17.231207]  mempool_kmalloc_double_free+0xc0/0x118
[   17.231254]  kunit_try_run_case+0x170/0x3f0
[   17.231303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.231354]  kthread+0x328/0x630
[   17.231397]  ret_from_fork+0x10/0x20
[   17.231444] 
[   17.231782] Allocated by task 236:
[   17.231830]  kasan_save_stack+0x3c/0x68
[   17.231873]  kasan_save_track+0x20/0x40
[   17.231976]  kasan_save_alloc_info+0x40/0x58
[   17.232020]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.232090]  remove_element+0x130/0x1f8
[   17.232125]  mempool_alloc_preallocated+0x58/0xc0
[   17.232220]  mempool_double_free_helper+0x94/0x2e8
[   17.232288]  mempool_kmalloc_double_free+0xc0/0x118
[   17.232337]  kunit_try_run_case+0x170/0x3f0
[   17.232381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.232425]  kthread+0x328/0x630
[   17.232467]  ret_from_fork+0x10/0x20
[   17.232771] 
[   17.232803] Freed by task 236:
[   17.232833]  kasan_save_stack+0x3c/0x68
[   17.232876]  kasan_save_track+0x20/0x40
[   17.233075]  kasan_save_free_info+0x4c/0x78
[   17.233130]  __kasan_mempool_poison_object+0xc0/0x150
[   17.233174]  mempool_free+0x28c/0x328
[   17.233285]  mempool_double_free_helper+0x100/0x2e8
[   17.233361]  mempool_kmalloc_double_free+0xc0/0x118
[   17.233412]  kunit_try_run_case+0x170/0x3f0
[   17.233470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.233545]  kthread+0x328/0x630
[   17.233652]  ret_from_fork+0x10/0x20
[   17.233730] 
[   17.233818] The buggy address belongs to the object at fff00000c64d8800
[   17.233818]  which belongs to the cache kmalloc-128 of size 128
[   17.233906] The buggy address is located 0 bytes inside of
[   17.233906]  128-byte region [fff00000c64d8800, fff00000c64d8880)
[   17.233966] 
[   17.233986] The buggy address belongs to the physical page:
[   17.234016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d8
[   17.234277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.234365] page_type: f5(slab)
[   17.234488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.234565] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.234688] page dumped because: kasan: bad access detected
[   17.234803] 
[   17.234853] Memory state around the buggy address:
[   17.234912]  fff00000c64d8700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.234993]  fff00000c64d8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235058] >fff00000c64d8800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.235111]                    ^
[   17.235139]  fff00000c64d8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235181]  fff00000c64d8900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.235229] ==================================================================

[   14.614524] ==================================================================
[   14.615754] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.616090] Free of addr ffff8881039bc000 by task kunit_try_catch/255
[   14.616716] 
[   14.616905] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.616955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.616968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.616992] Call Trace:
[   14.617005]  <TASK>
[   14.617023]  dump_stack_lvl+0x73/0xb0
[   14.617108]  print_report+0xd1/0x610
[   14.617132]  ? __virt_addr_valid+0x1db/0x2d0
[   14.617157]  ? kasan_addr_to_slab+0x11/0xa0
[   14.617177]  ? mempool_double_free_helper+0x184/0x370
[   14.617202]  kasan_report_invalid_free+0x10a/0x130
[   14.617227]  ? mempool_double_free_helper+0x184/0x370
[   14.617254]  ? mempool_double_free_helper+0x184/0x370
[   14.617278]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   14.617302]  mempool_free+0x2ec/0x380
[   14.617330]  mempool_double_free_helper+0x184/0x370
[   14.617355]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.617378]  ? update_load_avg+0x1be/0x21b0
[   14.617404]  ? dequeue_entities+0x27e/0x1740
[   14.617431]  ? finish_task_switch.isra.0+0x153/0x700
[   14.617457]  mempool_kmalloc_large_double_free+0xed/0x140
[   14.617495]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   14.617524]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.617547]  ? __pfx_mempool_kfree+0x10/0x10
[   14.617572]  ? __pfx_read_tsc+0x10/0x10
[   14.617594]  ? ktime_get_ts64+0x86/0x230
[   14.617619]  kunit_try_run_case+0x1a5/0x480
[   14.617645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.617668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.617693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.617717]  ? __kthread_parkme+0x82/0x180
[   14.617738]  ? preempt_count_sub+0x50/0x80
[   14.617761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.617786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.617810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.617835]  kthread+0x337/0x6f0
[   14.617854]  ? trace_preempt_on+0x20/0xc0
[   14.617879]  ? __pfx_kthread+0x10/0x10
[   14.617900]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.617922]  ? calculate_sigpending+0x7b/0xa0
[   14.617946]  ? __pfx_kthread+0x10/0x10
[   14.617968]  ret_from_fork+0x116/0x1d0
[   14.617988]  ? __pfx_kthread+0x10/0x10
[   14.618008]  ret_from_fork_asm+0x1a/0x30
[   14.618038]  </TASK>
[   14.618050] 
[   14.630771] The buggy address belongs to the physical page:
[   14.631453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bc
[   14.631992] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.632528] flags: 0x200000000000040(head|node=0|zone=2)
[   14.632911] page_type: f8(unknown)
[   14.633619] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.633983] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.634640] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.635269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.635643] head: 0200000000000002 ffffea00040e6f01 00000000ffffffff 00000000ffffffff
[   14.636130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.636624] page dumped because: kasan: bad access detected
[   14.637021] 
[   14.637341] Memory state around the buggy address:
[   14.637745]  ffff8881039bbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.638356]  ffff8881039bbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.638816] >ffff8881039bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.639254]                    ^
[   14.639621]  ffff8881039bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.639978]  ffff8881039bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.640449] ==================================================================
[   14.645404] ==================================================================
[   14.646031] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.646394] Free of addr ffff8881039f4000 by task kunit_try_catch/257
[   14.646646] 
[   14.646758] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.646810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.646823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.646850] Call Trace:
[   14.646864]  <TASK>
[   14.646883]  dump_stack_lvl+0x73/0xb0
[   14.646915]  print_report+0xd1/0x610
[   14.646940]  ? __virt_addr_valid+0x1db/0x2d0
[   14.646968]  ? kasan_addr_to_slab+0x11/0xa0
[   14.646990]  ? mempool_double_free_helper+0x184/0x370
[   14.647116]  kasan_report_invalid_free+0x10a/0x130
[   14.647146]  ? mempool_double_free_helper+0x184/0x370
[   14.647173]  ? mempool_double_free_helper+0x184/0x370
[   14.647197]  __kasan_mempool_poison_pages+0x115/0x130
[   14.647223]  mempool_free+0x290/0x380
[   14.647253]  mempool_double_free_helper+0x184/0x370
[   14.647278]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.647305]  ? __kasan_check_write+0x18/0x20
[   14.647325]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.647349]  ? finish_task_switch.isra.0+0x153/0x700
[   14.647378]  mempool_page_alloc_double_free+0xe8/0x140
[   14.647404]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   14.647431]  ? __kasan_check_write+0x18/0x20
[   14.647453]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   14.647490]  ? __pfx_mempool_free_pages+0x10/0x10
[   14.647518]  ? __pfx_read_tsc+0x10/0x10
[   14.647542]  ? ktime_get_ts64+0x86/0x230
[   14.647565]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.647594]  kunit_try_run_case+0x1a5/0x480
[   14.647622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647648]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.647675]  ? __kthread_parkme+0x82/0x180
[   14.647697]  ? preempt_count_sub+0x50/0x80
[   14.647721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.647814]  kthread+0x337/0x6f0
[   14.647835]  ? trace_preempt_on+0x20/0xc0
[   14.647861]  ? __pfx_kthread+0x10/0x10
[   14.647881]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.647903]  ? calculate_sigpending+0x7b/0xa0
[   14.647929]  ? __pfx_kthread+0x10/0x10
[   14.647951]  ret_from_fork+0x116/0x1d0
[   14.647971]  ? __pfx_kthread+0x10/0x10
[   14.647992]  ret_from_fork_asm+0x1a/0x30
[   14.648025]  </TASK>
[   14.648077] 
[   14.657985] The buggy address belongs to the physical page:
[   14.658348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.658764] flags: 0x200000000000000(node=0|zone=2)
[   14.659021] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   14.659340] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.659691] page dumped because: kasan: bad access detected
[   14.660032] 
[   14.660109] Memory state around the buggy address:
[   14.660346]  ffff8881039f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.660585]  ffff8881039f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.660813] >ffff8881039f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.661040]                    ^
[   14.661207]  ffff8881039f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.661689]  ffff8881039f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.662022] ==================================================================
[   14.574182] ==================================================================
[   14.574632] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   14.574894] Free of addr ffff888103249e00 by task kunit_try_catch/253
[   14.575102] 
[   14.575202] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.575252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.575265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.575288] Call Trace:
[   14.575301]  <TASK>
[   14.575320]  dump_stack_lvl+0x73/0xb0
[   14.575351]  print_report+0xd1/0x610
[   14.575374]  ? __virt_addr_valid+0x1db/0x2d0
[   14.575399]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.575422]  ? mempool_double_free_helper+0x184/0x370
[   14.575445]  kasan_report_invalid_free+0x10a/0x130
[   14.576083]  ? mempool_double_free_helper+0x184/0x370
[   14.576129]  ? mempool_double_free_helper+0x184/0x370
[   14.576154]  ? mempool_double_free_helper+0x184/0x370
[   14.576179]  check_slab_allocation+0x101/0x130
[   14.576205]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.576230]  mempool_free+0x2ec/0x380
[   14.576260]  mempool_double_free_helper+0x184/0x370
[   14.576284]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   14.576311]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.576334]  ? finish_task_switch.isra.0+0x153/0x700
[   14.576361]  mempool_kmalloc_double_free+0xed/0x140
[   14.576385]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   14.576412]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.576435]  ? __pfx_mempool_kfree+0x10/0x10
[   14.576461]  ? __pfx_read_tsc+0x10/0x10
[   14.576494]  ? ktime_get_ts64+0x86/0x230
[   14.576520]  kunit_try_run_case+0x1a5/0x480
[   14.576547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.576570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.576596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.576620]  ? __kthread_parkme+0x82/0x180
[   14.576641]  ? preempt_count_sub+0x50/0x80
[   14.576665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.576689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.576712]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.576737]  kthread+0x337/0x6f0
[   14.576756]  ? trace_preempt_on+0x20/0xc0
[   14.576796]  ? __pfx_kthread+0x10/0x10
[   14.576817]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.576838]  ? calculate_sigpending+0x7b/0xa0
[   14.576864]  ? __pfx_kthread+0x10/0x10
[   14.576886]  ret_from_fork+0x116/0x1d0
[   14.576905]  ? __pfx_kthread+0x10/0x10
[   14.576927]  ret_from_fork_asm+0x1a/0x30
[   14.576960]  </TASK>
[   14.576971] 
[   14.591563] Allocated by task 253:
[   14.591718]  kasan_save_stack+0x45/0x70
[   14.592061]  kasan_save_track+0x18/0x40
[   14.592418]  kasan_save_alloc_info+0x3b/0x50
[   14.593004]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.593555]  remove_element+0x11e/0x190
[   14.593969]  mempool_alloc_preallocated+0x4d/0x90
[   14.594484]  mempool_double_free_helper+0x8a/0x370
[   14.594843]  mempool_kmalloc_double_free+0xed/0x140
[   14.595416]  kunit_try_run_case+0x1a5/0x480
[   14.595664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.595879]  kthread+0x337/0x6f0
[   14.596195]  ret_from_fork+0x116/0x1d0
[   14.596616]  ret_from_fork_asm+0x1a/0x30
[   14.597014] 
[   14.597229] Freed by task 253:
[   14.597561]  kasan_save_stack+0x45/0x70
[   14.597794]  kasan_save_track+0x18/0x40
[   14.597944]  kasan_save_free_info+0x3f/0x60
[   14.598249]  __kasan_mempool_poison_object+0x131/0x1d0
[   14.598728]  mempool_free+0x2ec/0x380
[   14.599154]  mempool_double_free_helper+0x109/0x370
[   14.599533]  mempool_kmalloc_double_free+0xed/0x140
[   14.599707]  kunit_try_run_case+0x1a5/0x480
[   14.599899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.600427]  kthread+0x337/0x6f0
[   14.600753]  ret_from_fork+0x116/0x1d0
[   14.601182]  ret_from_fork_asm+0x1a/0x30
[   14.601570] 
[   14.601737] The buggy address belongs to the object at ffff888103249e00
[   14.601737]  which belongs to the cache kmalloc-128 of size 128
[   14.602607] The buggy address is located 0 bytes inside of
[   14.602607]  128-byte region [ffff888103249e00, ffff888103249e80)
[   14.602983] 
[   14.603064] The buggy address belongs to the physical page:
[   14.603526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103249
[   14.604346] flags: 0x200000000000000(node=0|zone=2)
[   14.604887] page_type: f5(slab)
[   14.605240] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.605619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.605951] page dumped because: kasan: bad access detected
[   14.606514] 
[   14.606690] Memory state around the buggy address:
[   14.607274]  ffff888103249d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.608195]  ffff888103249d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.608857] >ffff888103249e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.609134]                    ^
[   14.609466]  ffff888103249e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610231]  ffff888103249f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.610872] ==================================================================