Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 38.175154] ================================================================== [ 38.185784] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 38.192900] Free of addr ffff000800e14000 by task kunit_try_catch/286 [ 38.199322] [ 38.200809] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.200867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.200883] Hardware name: WinLink E850-96 board (DT) [ 38.200904] Call trace: [ 38.200919] show_stack+0x20/0x38 (C) [ 38.200956] dump_stack_lvl+0x8c/0xd0 [ 38.200993] print_report+0x118/0x608 [ 38.201030] kasan_report_invalid_free+0xc0/0xe8 [ 38.201068] __kasan_mempool_poison_pages+0xe0/0xe8 [ 38.201107] mempool_free+0x24c/0x328 [ 38.201139] mempool_double_free_helper+0x150/0x2e8 [ 38.201172] mempool_page_alloc_double_free+0xbc/0x118 [ 38.201209] kunit_try_run_case+0x170/0x3f0 [ 38.201250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.201287] kthread+0x328/0x630 [ 38.201316] ret_from_fork+0x10/0x20 [ 38.201353] [ 38.274235] The buggy address belongs to the physical page: [ 38.279794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14 [ 38.287777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.294298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.302017] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.309739] page dumped because: kasan: bad access detected [ 38.315291] [ 38.316767] Memory state around the buggy address: [ 38.321549] ffff000800e13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.328750] ffff000800e13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.335956] >ffff000800e14000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.343156] ^ [ 38.346371] ffff000800e14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.353576] ffff000800e14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.360778] ================================================================== [ 37.937870] ================================================================== [ 37.947941] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.955057] Free of addr ffff000806390000 by task kunit_try_catch/284 [ 37.961479] [ 37.962965] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 37.963021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.963038] Hardware name: WinLink E850-96 board (DT) [ 37.963062] Call trace: [ 37.963075] show_stack+0x20/0x38 (C) [ 37.963111] dump_stack_lvl+0x8c/0xd0 [ 37.963146] print_report+0x118/0x608 [ 37.963185] kasan_report_invalid_free+0xc0/0xe8 [ 37.963222] __kasan_mempool_poison_object+0x14c/0x150 [ 37.963259] mempool_free+0x28c/0x328 [ 37.963291] mempool_double_free_helper+0x150/0x2e8 [ 37.963324] mempool_kmalloc_large_double_free+0xc0/0x118 [ 37.963359] kunit_try_run_case+0x170/0x3f0 [ 37.963394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.963432] kthread+0x328/0x630 [ 37.963460] ret_from_fork+0x10/0x20 [ 37.963492] [ 38.036913] The buggy address belongs to the physical page: [ 38.042470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886390 [ 38.050455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.058093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.065035] page_type: f8(unknown) [ 38.068434] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.076153] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.083880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.091690] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.099504] head: 0bfffe0000000002 fffffdffe018e401 00000000ffffffff 00000000ffffffff [ 38.107315] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.115121] page dumped because: kasan: bad access detected [ 38.120676] [ 38.122152] Memory state around the buggy address: [ 38.126937] ffff00080638ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.134135] ffff00080638ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.141341] >ffff000806390000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.148540] ^ [ 38.151756] ffff000806390080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.158961] ffff000806390100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.166163] ================================================================== [ 37.564296] ================================================================== [ 37.573900] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 37.581016] Free of addr ffff000802ca6800 by task kunit_try_catch/282 [ 37.587439] [ 37.588925] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 37.588983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.589002] Hardware name: WinLink E850-96 board (DT) [ 37.589023] Call trace: [ 37.589039] show_stack+0x20/0x38 (C) [ 37.589079] dump_stack_lvl+0x8c/0xd0 [ 37.589116] print_report+0x118/0x608 [ 37.589154] kasan_report_invalid_free+0xc0/0xe8 [ 37.589193] check_slab_allocation+0xd4/0x108 [ 37.589229] __kasan_mempool_poison_object+0x78/0x150 [ 37.589266] mempool_free+0x28c/0x328 [ 37.589297] mempool_double_free_helper+0x150/0x2e8 [ 37.589333] mempool_kmalloc_double_free+0xc0/0x118 [ 37.589367] kunit_try_run_case+0x170/0x3f0 [ 37.589406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.589444] kthread+0x328/0x630 [ 37.589473] ret_from_fork+0x10/0x20 [ 37.589506] [ 37.666605] Allocated by task 282: [ 37.669992] kasan_save_stack+0x3c/0x68 [ 37.673808] kasan_save_track+0x20/0x40 [ 37.677628] kasan_save_alloc_info+0x40/0x58 [ 37.681881] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.687177] remove_element+0x130/0x1f8 [ 37.690995] mempool_alloc_preallocated+0x58/0xc0 [ 37.695682] mempool_double_free_helper+0x94/0x2e8 [ 37.700457] mempool_kmalloc_double_free+0xc0/0x118 [ 37.705318] kunit_try_run_case+0x170/0x3f0 [ 37.709485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.714953] kthread+0x328/0x630 [ 37.718165] ret_from_fork+0x10/0x20 [ 37.721724] [ 37.723201] Freed by task 282: [ 37.726237] kasan_save_stack+0x3c/0x68 [ 37.730057] kasan_save_track+0x20/0x40 [ 37.733876] kasan_save_free_info+0x4c/0x78 [ 37.738043] __kasan_mempool_poison_object+0xc0/0x150 [ 37.743079] mempool_free+0x28c/0x328 [ 37.746724] mempool_double_free_helper+0x100/0x2e8 [ 37.751585] mempool_kmalloc_double_free+0xc0/0x118 [ 37.756445] kunit_try_run_case+0x170/0x3f0 [ 37.760612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.766081] kthread+0x328/0x630 [ 37.769293] ret_from_fork+0x10/0x20 [ 37.772852] [ 37.774329] The buggy address belongs to the object at ffff000802ca6800 [ 37.774329] which belongs to the cache kmalloc-128 of size 128 [ 37.786830] The buggy address is located 0 bytes inside of [ 37.786830] 128-byte region [ffff000802ca6800, ffff000802ca6880) [ 37.798372] [ 37.799852] The buggy address belongs to the physical page: [ 37.805408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882ca6 [ 37.813392] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.821031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.827974] page_type: f5(slab) [ 37.831112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.838830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.846558] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.854367] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.862181] head: 0bfffe0000000001 fffffdffe00b2981 00000000ffffffff 00000000ffffffff [ 37.869992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.877798] page dumped because: kasan: bad access detected [ 37.883353] [ 37.884829] Memory state around the buggy address: [ 37.889611] ffff000802ca6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.896813] ffff000802ca6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.904018] >ffff000802ca6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.911218] ^ [ 37.914433] ffff000802ca6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.921638] ffff000802ca6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.928840] ==================================================================
[ 28.646200] ================================================================== [ 28.646343] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.646589] Free of addr fff00000c7870000 by task kunit_try_catch/239 [ 28.646736] [ 28.646918] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.647264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.647336] Hardware name: linux,dummy-virt (DT) [ 28.647423] Call trace: [ 28.647484] show_stack+0x20/0x38 (C) [ 28.647725] dump_stack_lvl+0x8c/0xd0 [ 28.647909] print_report+0x118/0x608 [ 28.648066] kasan_report_invalid_free+0xc0/0xe8 [ 28.648430] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.648743] mempool_free+0x24c/0x328 [ 28.648879] mempool_double_free_helper+0x150/0x2e8 [ 28.649221] mempool_page_alloc_double_free+0xbc/0x118 [ 28.649397] kunit_try_run_case+0x170/0x3f0 [ 28.649540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.649694] kthread+0x328/0x630 [ 28.649892] ret_from_fork+0x10/0x20 [ 28.650073] [ 28.650161] The buggy address belongs to the physical page: [ 28.650393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107870 [ 28.650604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.650780] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.651095] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.651255] page dumped because: kasan: bad access detected [ 28.651419] [ 28.651505] Memory state around the buggy address: [ 28.651590] fff00000c786ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.651714] fff00000c786ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.651830] >fff00000c7870000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.651964] ^ [ 28.652122] fff00000c7870080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.652241] fff00000c7870100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.652397] ================================================================== [ 28.623204] ================================================================== [ 28.623356] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.623546] Free of addr fff00000c786c000 by task kunit_try_catch/237 [ 28.623656] [ 28.623788] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.624031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.624115] Hardware name: linux,dummy-virt (DT) [ 28.624195] Call trace: [ 28.624248] show_stack+0x20/0x38 (C) [ 28.624380] dump_stack_lvl+0x8c/0xd0 [ 28.624540] print_report+0x118/0x608 [ 28.624798] kasan_report_invalid_free+0xc0/0xe8 [ 28.624953] __kasan_mempool_poison_object+0x14c/0x150 [ 28.625161] mempool_free+0x28c/0x328 [ 28.625294] mempool_double_free_helper+0x150/0x2e8 [ 28.625634] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.625832] kunit_try_run_case+0x170/0x3f0 [ 28.626066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.626226] kthread+0x328/0x630 [ 28.626365] ret_from_fork+0x10/0x20 [ 28.626735] [ 28.626795] The buggy address belongs to the physical page: [ 28.626904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c [ 28.627076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.627450] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.627614] page_type: f8(unknown) [ 28.627675] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.627765] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.628102] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.628369] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.628499] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff [ 28.628676] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.628965] page dumped because: kasan: bad access detected [ 28.629169] [ 28.629214] Memory state around the buggy address: [ 28.629294] fff00000c786bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.629476] fff00000c786bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.629764] >fff00000c786c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.629862] ^ [ 28.630205] fff00000c786c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.630335] fff00000c786c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.630444] ================================================================== [ 28.595444] ================================================================== [ 28.595923] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.596201] Free of addr fff00000c6431500 by task kunit_try_catch/235 [ 28.596363] [ 28.596477] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.596687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.596908] Hardware name: linux,dummy-virt (DT) [ 28.597008] Call trace: [ 28.597151] show_stack+0x20/0x38 (C) [ 28.597297] dump_stack_lvl+0x8c/0xd0 [ 28.597431] print_report+0x118/0x608 [ 28.597553] kasan_report_invalid_free+0xc0/0xe8 [ 28.597898] check_slab_allocation+0xd4/0x108 [ 28.598393] __kasan_mempool_poison_object+0x78/0x150 [ 28.598526] mempool_free+0x28c/0x328 [ 28.598965] mempool_double_free_helper+0x150/0x2e8 [ 28.599260] mempool_kmalloc_double_free+0xc0/0x118 [ 28.599520] kunit_try_run_case+0x170/0x3f0 [ 28.600551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.601145] kthread+0x328/0x630 [ 28.601531] ret_from_fork+0x10/0x20 [ 28.601662] [ 28.602092] Allocated by task 235: [ 28.602185] kasan_save_stack+0x3c/0x68 [ 28.602918] kasan_save_track+0x20/0x40 [ 28.603390] kasan_save_alloc_info+0x40/0x58 [ 28.604137] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.604259] remove_element+0x130/0x1f8 [ 28.604347] mempool_alloc_preallocated+0x58/0xc0 [ 28.604450] mempool_double_free_helper+0x94/0x2e8 [ 28.604731] mempool_kmalloc_double_free+0xc0/0x118 [ 28.604976] kunit_try_run_case+0x170/0x3f0 [ 28.605121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.605806] kthread+0x328/0x630 [ 28.606139] ret_from_fork+0x10/0x20 [ 28.606248] [ 28.606307] Freed by task 235: [ 28.606427] kasan_save_stack+0x3c/0x68 [ 28.606565] kasan_save_track+0x20/0x40 [ 28.606782] kasan_save_free_info+0x4c/0x78 [ 28.607056] __kasan_mempool_poison_object+0xc0/0x150 [ 28.607276] mempool_free+0x28c/0x328 [ 28.607389] mempool_double_free_helper+0x100/0x2e8 [ 28.607513] mempool_kmalloc_double_free+0xc0/0x118 [ 28.607626] kunit_try_run_case+0x170/0x3f0 [ 28.607738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.607864] kthread+0x328/0x630 [ 28.607999] ret_from_fork+0x10/0x20 [ 28.608095] [ 28.608140] The buggy address belongs to the object at fff00000c6431500 [ 28.608140] which belongs to the cache kmalloc-128 of size 128 [ 28.608282] The buggy address is located 0 bytes inside of [ 28.608282] 128-byte region [fff00000c6431500, fff00000c6431580) [ 28.608484] [ 28.608552] The buggy address belongs to the physical page: [ 28.608637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431 [ 28.608785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.608920] page_type: f5(slab) [ 28.609083] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.609341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.609498] page dumped because: kasan: bad access detected [ 28.609611] [ 28.609676] Memory state around the buggy address: [ 28.609760] fff00000c6431400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.609983] fff00000c6431480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.610092] >fff00000c6431500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.610207] ^ [ 28.610281] fff00000c6431580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.610391] fff00000c6431600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.610488] ==================================================================
[ 28.660896] ================================================================== [ 28.661129] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.661242] Free of addr fff00000c7772100 by task kunit_try_catch/235 [ 28.661380] [ 28.661471] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.661676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.661743] Hardware name: linux,dummy-virt (DT) [ 28.661821] Call trace: [ 28.661937] show_stack+0x20/0x38 (C) [ 28.662308] dump_stack_lvl+0x8c/0xd0 [ 28.662524] print_report+0x118/0x608 [ 28.662651] kasan_report_invalid_free+0xc0/0xe8 [ 28.662792] check_slab_allocation+0xd4/0x108 [ 28.662975] __kasan_mempool_poison_object+0x78/0x150 [ 28.663130] mempool_free+0x28c/0x328 [ 28.663864] mempool_double_free_helper+0x150/0x2e8 [ 28.664009] mempool_kmalloc_double_free+0xc0/0x118 [ 28.664157] kunit_try_run_case+0x170/0x3f0 [ 28.664400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.664648] kthread+0x328/0x630 [ 28.664772] ret_from_fork+0x10/0x20 [ 28.664937] [ 28.664991] Allocated by task 235: [ 28.665131] kasan_save_stack+0x3c/0x68 [ 28.665291] kasan_save_track+0x20/0x40 [ 28.665393] kasan_save_alloc_info+0x40/0x58 [ 28.665518] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.665631] remove_element+0x130/0x1f8 [ 28.665778] mempool_alloc_preallocated+0x58/0xc0 [ 28.665908] mempool_double_free_helper+0x94/0x2e8 [ 28.666376] mempool_kmalloc_double_free+0xc0/0x118 [ 28.666499] kunit_try_run_case+0x170/0x3f0 [ 28.666877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.667023] kthread+0x328/0x630 [ 28.667211] ret_from_fork+0x10/0x20 [ 28.667418] [ 28.667505] Freed by task 235: [ 28.671977] kasan_save_stack+0x3c/0x68 [ 28.672233] kasan_save_track+0x20/0x40 [ 28.672366] kasan_save_free_info+0x4c/0x78 [ 28.672535] __kasan_mempool_poison_object+0xc0/0x150 [ 28.672726] mempool_free+0x28c/0x328 [ 28.673094] mempool_double_free_helper+0x100/0x2e8 [ 28.673427] mempool_kmalloc_double_free+0xc0/0x118 [ 28.673661] kunit_try_run_case+0x170/0x3f0 [ 28.673902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.674296] kthread+0x328/0x630 [ 28.674662] ret_from_fork+0x10/0x20 [ 28.674931] [ 28.675163] The buggy address belongs to the object at fff00000c7772100 [ 28.675163] which belongs to the cache kmalloc-128 of size 128 [ 28.675410] The buggy address is located 0 bytes inside of [ 28.675410] 128-byte region [fff00000c7772100, fff00000c7772180) [ 28.675893] [ 28.675996] The buggy address belongs to the physical page: [ 28.676131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 28.676268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.676396] page_type: f5(slab) [ 28.676501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.677093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.677573] page dumped because: kasan: bad access detected [ 28.677760] [ 28.677890] Memory state around the buggy address: [ 28.677996] fff00000c7772000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.678201] fff00000c7772080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.678315] >fff00000c7772100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.678417] ^ [ 28.678496] fff00000c7772180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.679031] fff00000c7772200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.679133] ================================================================== [ 28.758808] ================================================================== [ 28.759005] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.759167] Free of addr fff00000c7730000 by task kunit_try_catch/239 [ 28.759269] [ 28.759352] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.759550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.759619] Hardware name: linux,dummy-virt (DT) [ 28.759696] Call trace: [ 28.759747] show_stack+0x20/0x38 (C) [ 28.760590] dump_stack_lvl+0x8c/0xd0 [ 28.760869] print_report+0x118/0x608 [ 28.761104] kasan_report_invalid_free+0xc0/0xe8 [ 28.761344] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.761513] mempool_free+0x24c/0x328 [ 28.761664] mempool_double_free_helper+0x150/0x2e8 [ 28.761872] mempool_page_alloc_double_free+0xbc/0x118 [ 28.762016] kunit_try_run_case+0x170/0x3f0 [ 28.762154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.762292] kthread+0x328/0x630 [ 28.762429] ret_from_fork+0x10/0x20 [ 28.762887] [ 28.762951] The buggy address belongs to the physical page: [ 28.763030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107730 [ 28.763197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.763470] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.763604] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.763701] page dumped because: kasan: bad access detected [ 28.763809] [ 28.763880] Memory state around the buggy address: [ 28.764302] fff00000c772ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.764415] fff00000c772ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.764522] >fff00000c7730000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.764630] ^ [ 28.764879] fff00000c7730080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.765036] fff00000c7730100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.765511] ================================================================== [ 28.704411] ================================================================== [ 28.704564] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.704695] Free of addr fff00000c7730000 by task kunit_try_catch/237 [ 28.707226] [ 28.708472] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.709703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.710130] Hardware name: linux,dummy-virt (DT) [ 28.710578] Call trace: [ 28.711202] show_stack+0x20/0x38 (C) [ 28.711426] dump_stack_lvl+0x8c/0xd0 [ 28.711948] print_report+0x118/0x608 [ 28.712132] kasan_report_invalid_free+0xc0/0xe8 [ 28.712240] __kasan_mempool_poison_object+0x14c/0x150 [ 28.712311] mempool_free+0x28c/0x328 [ 28.712428] mempool_double_free_helper+0x150/0x2e8 [ 28.713088] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.713182] kunit_try_run_case+0x170/0x3f0 [ 28.713295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.713438] kthread+0x328/0x630 [ 28.713546] ret_from_fork+0x10/0x20 [ 28.713678] [ 28.713734] The buggy address belongs to the physical page: [ 28.713857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107730 [ 28.713995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.714158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.714313] page_type: f8(unknown) [ 28.714419] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.714545] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.714684] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.714825] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.715207] head: 0bfffe0000000002 ffffc1ffc31dcc01 00000000ffffffff 00000000ffffffff [ 28.715346] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.715450] page dumped because: kasan: bad access detected [ 28.716681] [ 28.716730] Memory state around the buggy address: [ 28.717090] fff00000c772ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.717521] fff00000c772ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.718261] >fff00000c7730000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.718421] ^ [ 28.718495] fff00000c7730080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.718603] fff00000c7730100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.720204] ==================================================================
[ 21.592916] ================================================================== [ 21.594267] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 21.594959] Free of addr ffff888103a78000 by task kunit_try_catch/255 [ 21.595651] [ 21.596813] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.596960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.597004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.597072] Call Trace: [ 21.597119] <TASK> [ 21.597171] dump_stack_lvl+0x73/0xb0 [ 21.597250] print_report+0xd1/0x650 [ 21.597310] ? __virt_addr_valid+0x1db/0x2d0 [ 21.597353] ? kasan_addr_to_slab+0x11/0xa0 [ 21.597384] ? mempool_double_free_helper+0x184/0x370 [ 21.597422] kasan_report_invalid_free+0x10a/0x130 [ 21.597458] ? mempool_double_free_helper+0x184/0x370 [ 21.597518] ? mempool_double_free_helper+0x184/0x370 [ 21.597668] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 21.597746] mempool_free+0x2ec/0x380 [ 21.597820] mempool_double_free_helper+0x184/0x370 [ 21.597858] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 21.597898] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.597934] ? finish_task_switch.isra.0+0x153/0x700 [ 21.597973] mempool_kmalloc_large_double_free+0xed/0x140 [ 21.598010] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 21.598051] ? __pfx_mempool_kmalloc+0x10/0x10 [ 21.598086] ? __pfx_mempool_kfree+0x10/0x10 [ 21.598126] ? __pfx_read_tsc+0x10/0x10 [ 21.598161] ? ktime_get_ts64+0x86/0x230 [ 21.598197] kunit_try_run_case+0x1a5/0x480 [ 21.598284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.598328] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.598369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.598405] ? __kthread_parkme+0x82/0x180 [ 21.598435] ? preempt_count_sub+0x50/0x80 [ 21.598469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.598534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.598622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.598694] kthread+0x337/0x6f0 [ 21.598727] ? trace_preempt_on+0x20/0xc0 [ 21.598766] ? __pfx_kthread+0x10/0x10 [ 21.598797] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.598830] ? calculate_sigpending+0x7b/0xa0 [ 21.598868] ? __pfx_kthread+0x10/0x10 [ 21.598899] ret_from_fork+0x116/0x1d0 [ 21.598926] ? __pfx_kthread+0x10/0x10 [ 21.598957] ret_from_fork_asm+0x1a/0x30 [ 21.599003] </TASK> [ 21.599019] [ 21.620459] The buggy address belongs to the physical page: [ 21.621194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a78 [ 21.622135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.623078] flags: 0x200000000000040(head|node=0|zone=2) [ 21.623819] page_type: f8(unknown) [ 21.624283] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.625060] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.625951] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.627605] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.628479] head: 0200000000000002 ffffea00040e9e01 00000000ffffffff 00000000ffffffff [ 21.629609] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.631091] page dumped because: kasan: bad access detected [ 21.631437] [ 21.632278] Memory state around the buggy address: [ 21.634279] ffff888103a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.636379] ffff888103a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.637939] >ffff888103a78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.638334] ^ [ 21.639840] ffff888103a78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.642432] ffff888103a78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.644406] ================================================================== [ 21.529234] ================================================================== [ 21.530055] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 21.530472] Free of addr ffff8881039c8400 by task kunit_try_catch/253 [ 21.531300] [ 21.532226] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.532362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.532529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.532601] Call Trace: [ 21.532693] <TASK> [ 21.532763] dump_stack_lvl+0x73/0xb0 [ 21.532883] print_report+0xd1/0x650 [ 21.532971] ? __virt_addr_valid+0x1db/0x2d0 [ 21.533027] ? kasan_complete_mode_report_info+0x64/0x200 [ 21.533062] ? mempool_double_free_helper+0x184/0x370 [ 21.533099] kasan_report_invalid_free+0x10a/0x130 [ 21.533133] ? mempool_double_free_helper+0x184/0x370 [ 21.533170] ? mempool_double_free_helper+0x184/0x370 [ 21.533204] ? mempool_double_free_helper+0x184/0x370 [ 21.533257] check_slab_allocation+0x101/0x130 [ 21.533305] __kasan_mempool_poison_object+0x91/0x1d0 [ 21.533341] mempool_free+0x2ec/0x380 [ 21.533376] mempool_double_free_helper+0x184/0x370 [ 21.533412] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 21.533449] ? __kasan_check_write+0x18/0x20 [ 21.533479] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.533547] ? finish_task_switch.isra.0+0x153/0x700 [ 21.533649] mempool_kmalloc_double_free+0xed/0x140 [ 21.533703] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 21.533745] ? __pfx_mempool_kmalloc+0x10/0x10 [ 21.533782] ? __pfx_mempool_kfree+0x10/0x10 [ 21.533822] ? __pfx_read_tsc+0x10/0x10 [ 21.533852] ? ktime_get_ts64+0x86/0x230 [ 21.533889] kunit_try_run_case+0x1a5/0x480 [ 21.533930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.533965] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.534002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.534036] ? __kthread_parkme+0x82/0x180 [ 21.534064] ? preempt_count_sub+0x50/0x80 [ 21.534095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.534131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.534165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.534199] kthread+0x337/0x6f0 [ 21.534244] ? trace_preempt_on+0x20/0xc0 [ 21.534293] ? __pfx_kthread+0x10/0x10 [ 21.534328] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.534361] ? calculate_sigpending+0x7b/0xa0 [ 21.534400] ? __pfx_kthread+0x10/0x10 [ 21.534430] ret_from_fork+0x116/0x1d0 [ 21.534456] ? __pfx_kthread+0x10/0x10 [ 21.534485] ret_from_fork_asm+0x1a/0x30 [ 21.534561] </TASK> [ 21.534595] [ 21.557767] Allocated by task 253: [ 21.558191] kasan_save_stack+0x45/0x70 [ 21.558845] kasan_save_track+0x18/0x40 [ 21.559264] kasan_save_alloc_info+0x3b/0x50 [ 21.559773] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 21.560298] remove_element+0x11e/0x190 [ 21.561241] mempool_alloc_preallocated+0x4d/0x90 [ 21.561823] mempool_double_free_helper+0x8a/0x370 [ 21.562350] mempool_kmalloc_double_free+0xed/0x140 [ 21.562899] kunit_try_run_case+0x1a5/0x480 [ 21.563341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.563940] kthread+0x337/0x6f0 [ 21.564296] ret_from_fork+0x116/0x1d0 [ 21.564742] ret_from_fork_asm+0x1a/0x30 [ 21.565095] [ 21.565322] Freed by task 253: [ 21.565710] kasan_save_stack+0x45/0x70 [ 21.566097] kasan_save_track+0x18/0x40 [ 21.566648] kasan_save_free_info+0x3f/0x60 [ 21.567104] __kasan_mempool_poison_object+0x131/0x1d0 [ 21.567592] mempool_free+0x2ec/0x380 [ 21.568880] mempool_double_free_helper+0x109/0x370 [ 21.569260] mempool_kmalloc_double_free+0xed/0x140 [ 21.569777] kunit_try_run_case+0x1a5/0x480 [ 21.570289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.570870] kthread+0x337/0x6f0 [ 21.571247] ret_from_fork+0x116/0x1d0 [ 21.571599] ret_from_fork_asm+0x1a/0x30 [ 21.572028] [ 21.572270] The buggy address belongs to the object at ffff8881039c8400 [ 21.572270] which belongs to the cache kmalloc-128 of size 128 [ 21.573205] The buggy address is located 0 bytes inside of [ 21.573205] 128-byte region [ffff8881039c8400, ffff8881039c8480) [ 21.574397] [ 21.574879] The buggy address belongs to the physical page: [ 21.575297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8 [ 21.576395] flags: 0x200000000000000(node=0|zone=2) [ 21.576968] page_type: f5(slab) [ 21.577308] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.577932] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.578724] page dumped because: kasan: bad access detected [ 21.579088] [ 21.579271] Memory state around the buggy address: [ 21.580641] ffff8881039c8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.581692] ffff8881039c8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.582154] >ffff8881039c8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.583093] ^ [ 21.583533] ffff8881039c8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.584178] ffff8881039c8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.584789] ================================================================== [ 21.651811] ================================================================== [ 21.652700] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 21.654122] Free of addr ffff888103ab8000 by task kunit_try_catch/257 [ 21.655193] [ 21.655645] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.655834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.655895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.655961] Call Trace: [ 21.656005] <TASK> [ 21.656058] dump_stack_lvl+0x73/0xb0 [ 21.656160] print_report+0xd1/0x650 [ 21.656229] ? __virt_addr_valid+0x1db/0x2d0 [ 21.656294] ? kasan_addr_to_slab+0x11/0xa0 [ 21.656325] ? mempool_double_free_helper+0x184/0x370 [ 21.656360] kasan_report_invalid_free+0x10a/0x130 [ 21.656396] ? mempool_double_free_helper+0x184/0x370 [ 21.656434] ? mempool_double_free_helper+0x184/0x370 [ 21.656468] __kasan_mempool_poison_pages+0x115/0x130 [ 21.656533] mempool_free+0x290/0x380 [ 21.656637] mempool_double_free_helper+0x184/0x370 [ 21.656712] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 21.656786] ? __kasan_check_write+0x18/0x20 [ 21.656845] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.656912] ? finish_task_switch.isra.0+0x153/0x700 [ 21.656984] mempool_page_alloc_double_free+0xe8/0x140 [ 21.657026] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 21.657067] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 21.657094] ? __pfx_mempool_free_pages+0x10/0x10 [ 21.657126] ? __pfx_read_tsc+0x10/0x10 [ 21.657157] ? ktime_get_ts64+0x86/0x230 [ 21.657192] kunit_try_run_case+0x1a5/0x480 [ 21.657245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.657299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.657337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.657371] ? __kthread_parkme+0x82/0x180 [ 21.657400] ? preempt_count_sub+0x50/0x80 [ 21.657431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.657465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.657523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.657597] kthread+0x337/0x6f0 [ 21.657692] ? trace_preempt_on+0x20/0xc0 [ 21.657732] ? __pfx_kthread+0x10/0x10 [ 21.657762] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.657794] ? calculate_sigpending+0x7b/0xa0 [ 21.657830] ? __pfx_kthread+0x10/0x10 [ 21.657859] ret_from_fork+0x116/0x1d0 [ 21.657886] ? __pfx_kthread+0x10/0x10 [ 21.657914] ret_from_fork_asm+0x1a/0x30 [ 21.657958] </TASK> [ 21.657974] [ 21.683755] The buggy address belongs to the physical page: [ 21.684492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab8 [ 21.685859] flags: 0x200000000000000(node=0|zone=2) [ 21.686564] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.687443] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.688189] page dumped because: kasan: bad access detected [ 21.689054] [ 21.689219] Memory state around the buggy address: [ 21.689986] ffff888103ab7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.690929] ffff888103ab7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.691790] >ffff888103ab8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.693094] ^ [ 21.693886] ffff888103ab8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.694466] ffff888103ab8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.695357] ==================================================================
[ 20.335164] ================================================================== [ 20.336191] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 20.337138] Free of addr ffff8881038d5a00 by task kunit_try_catch/253 [ 20.338164] [ 20.338675] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.338794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.338832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.338910] Call Trace: [ 20.338947] <TASK> [ 20.338971] dump_stack_lvl+0x73/0xb0 [ 20.339017] print_report+0xd1/0x650 [ 20.339050] ? __virt_addr_valid+0x1db/0x2d0 [ 20.339084] ? kasan_complete_mode_report_info+0x64/0x200 [ 20.339136] ? mempool_double_free_helper+0x184/0x370 [ 20.339185] kasan_report_invalid_free+0x10a/0x130 [ 20.339222] ? mempool_double_free_helper+0x184/0x370 [ 20.339259] ? mempool_double_free_helper+0x184/0x370 [ 20.339293] ? mempool_double_free_helper+0x184/0x370 [ 20.339326] check_slab_allocation+0x101/0x130 [ 20.339356] __kasan_mempool_poison_object+0x91/0x1d0 [ 20.339392] mempool_free+0x2ec/0x380 [ 20.339426] mempool_double_free_helper+0x184/0x370 [ 20.339461] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.339497] ? __kasan_check_write+0x18/0x20 [ 20.339726] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.339814] ? finish_task_switch.isra.0+0x153/0x700 [ 20.339978] mempool_kmalloc_double_free+0xed/0x140 [ 20.340021] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 20.340063] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.340104] ? __pfx_mempool_kfree+0x10/0x10 [ 20.340168] ? __pfx_read_tsc+0x10/0x10 [ 20.340201] ? ktime_get_ts64+0x86/0x230 [ 20.340234] kunit_try_run_case+0x1a5/0x480 [ 20.340270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.340304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.340341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.340375] ? __kthread_parkme+0x82/0x180 [ 20.340401] ? preempt_count_sub+0x50/0x80 [ 20.340433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.340470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.340502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.340575] kthread+0x337/0x6f0 [ 20.340654] ? trace_preempt_on+0x20/0xc0 [ 20.340709] ? __pfx_kthread+0x10/0x10 [ 20.340743] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.340775] ? calculate_sigpending+0x7b/0xa0 [ 20.340809] ? __pfx_kthread+0x10/0x10 [ 20.340840] ret_from_fork+0x116/0x1d0 [ 20.340865] ? __pfx_kthread+0x10/0x10 [ 20.340923] ret_from_fork_asm+0x1a/0x30 [ 20.340967] </TASK> [ 20.340982] [ 20.360153] Allocated by task 253: [ 20.360680] kasan_save_stack+0x45/0x70 [ 20.361174] kasan_save_track+0x18/0x40 [ 20.361821] kasan_save_alloc_info+0x3b/0x50 [ 20.362377] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 20.363175] remove_element+0x11e/0x190 [ 20.363737] mempool_alloc_preallocated+0x4d/0x90 [ 20.364302] mempool_double_free_helper+0x8a/0x370 [ 20.364927] mempool_kmalloc_double_free+0xed/0x140 [ 20.365500] kunit_try_run_case+0x1a5/0x480 [ 20.366180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.366850] kthread+0x337/0x6f0 [ 20.367304] ret_from_fork+0x116/0x1d0 [ 20.367740] ret_from_fork_asm+0x1a/0x30 [ 20.368444] [ 20.368795] Freed by task 253: [ 20.369143] kasan_save_stack+0x45/0x70 [ 20.369720] kasan_save_track+0x18/0x40 [ 20.370217] kasan_save_free_info+0x3f/0x60 [ 20.370843] __kasan_mempool_poison_object+0x131/0x1d0 [ 20.371301] mempool_free+0x2ec/0x380 [ 20.371801] mempool_double_free_helper+0x109/0x370 [ 20.372455] mempool_kmalloc_double_free+0xed/0x140 [ 20.373188] kunit_try_run_case+0x1a5/0x480 [ 20.373871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.374484] kthread+0x337/0x6f0 [ 20.375002] ret_from_fork+0x116/0x1d0 [ 20.375334] ret_from_fork_asm+0x1a/0x30 [ 20.375761] [ 20.376220] The buggy address belongs to the object at ffff8881038d5a00 [ 20.376220] which belongs to the cache kmalloc-128 of size 128 [ 20.377437] The buggy address is located 0 bytes inside of [ 20.377437] 128-byte region [ffff8881038d5a00, ffff8881038d5a80) [ 20.378743] [ 20.379014] The buggy address belongs to the physical page: [ 20.379527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d5 [ 20.380390] flags: 0x200000000000000(node=0|zone=2) [ 20.381034] page_type: f5(slab) [ 20.381461] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.382226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.383124] page dumped because: kasan: bad access detected [ 20.384182] [ 20.384384] Memory state around the buggy address: [ 20.385035] ffff8881038d5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.385847] ffff8881038d5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.386673] >ffff8881038d5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.387314] ^ [ 20.388024] ffff8881038d5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.388721] ffff8881038d5b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.389322] ================================================================== [ 20.447837] ================================================================== [ 20.449058] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 20.450775] Free of addr ffff888102a48000 by task kunit_try_catch/257 [ 20.452610] [ 20.452764] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.452829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.452847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.452901] Call Trace: [ 20.452943] <TASK> [ 20.452985] dump_stack_lvl+0x73/0xb0 [ 20.453075] print_report+0xd1/0x650 [ 20.453215] ? __virt_addr_valid+0x1db/0x2d0 [ 20.453284] ? kasan_addr_to_slab+0x11/0xa0 [ 20.453322] ? mempool_double_free_helper+0x184/0x370 [ 20.453396] kasan_report_invalid_free+0x10a/0x130 [ 20.453437] ? mempool_double_free_helper+0x184/0x370 [ 20.453475] ? mempool_double_free_helper+0x184/0x370 [ 20.453510] __kasan_mempool_poison_pages+0x115/0x130 [ 20.453771] mempool_free+0x290/0x380 [ 20.453816] mempool_double_free_helper+0x184/0x370 [ 20.453855] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.453918] ? __kasan_check_write+0x18/0x20 [ 20.453949] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.453979] ? irqentry_exit+0x2a/0x60 [ 20.454013] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 20.454052] mempool_page_alloc_double_free+0xe8/0x140 [ 20.454089] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 20.454159] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 20.454189] ? __pfx_mempool_free_pages+0x10/0x10 [ 20.454219] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 20.454268] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 20.454308] kunit_try_run_case+0x1a5/0x480 [ 20.454348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.454384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.454419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.454453] ? __kthread_parkme+0x82/0x180 [ 20.454483] ? preempt_count_sub+0x50/0x80 [ 20.454523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.454602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.454660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.454696] kthread+0x337/0x6f0 [ 20.454725] ? trace_preempt_on+0x20/0xc0 [ 20.454757] ? __pfx_kthread+0x10/0x10 [ 20.454786] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.454816] ? calculate_sigpending+0x7b/0xa0 [ 20.454851] ? __pfx_kthread+0x10/0x10 [ 20.454904] ret_from_fork+0x116/0x1d0 [ 20.454937] ? __pfx_kthread+0x10/0x10 [ 20.454967] ret_from_fork_asm+0x1a/0x30 [ 20.455010] </TASK> [ 20.455024] [ 20.478702] The buggy address belongs to the physical page: [ 20.479373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a48 [ 20.480301] flags: 0x200000000000000(node=0|zone=2) [ 20.480934] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.482313] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.482944] page dumped because: kasan: bad access detected [ 20.483714] [ 20.483954] Memory state around the buggy address: [ 20.484872] ffff888102a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.485575] ffff888102a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.486504] >ffff888102a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.487417] ^ [ 20.488076] ffff888102a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.489090] ffff888102a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.489909] ================================================================== [ 20.395377] ================================================================== [ 20.396703] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 20.397747] Free of addr ffff888103990000 by task kunit_try_catch/255 [ 20.398359] [ 20.398716] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.398836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.398891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.398956] Call Trace: [ 20.398992] <TASK> [ 20.399155] dump_stack_lvl+0x73/0xb0 [ 20.399421] print_report+0xd1/0x650 [ 20.399487] ? __virt_addr_valid+0x1db/0x2d0 [ 20.400030] ? kasan_addr_to_slab+0x11/0xa0 [ 20.400074] ? mempool_double_free_helper+0x184/0x370 [ 20.400130] kasan_report_invalid_free+0x10a/0x130 [ 20.400181] ? mempool_double_free_helper+0x184/0x370 [ 20.400220] ? mempool_double_free_helper+0x184/0x370 [ 20.400254] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 20.400292] mempool_free+0x2ec/0x380 [ 20.400324] mempool_double_free_helper+0x184/0x370 [ 20.400359] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 20.400397] ? __kasan_check_write+0x18/0x20 [ 20.400424] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.400455] ? finish_task_switch.isra.0+0x153/0x700 [ 20.400491] mempool_kmalloc_large_double_free+0xed/0x140 [ 20.400587] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 20.400671] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.400709] ? __pfx_mempool_kfree+0x10/0x10 [ 20.400746] ? __pfx_read_tsc+0x10/0x10 [ 20.400777] ? ktime_get_ts64+0x86/0x230 [ 20.400810] kunit_try_run_case+0x1a5/0x480 [ 20.400848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.400909] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.400951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.400986] ? __kthread_parkme+0x82/0x180 [ 20.401014] ? preempt_count_sub+0x50/0x80 [ 20.401045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.401080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.401157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.401199] kthread+0x337/0x6f0 [ 20.401228] ? trace_preempt_on+0x20/0xc0 [ 20.401262] ? __pfx_kthread+0x10/0x10 [ 20.401292] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.401323] ? calculate_sigpending+0x7b/0xa0 [ 20.401359] ? __pfx_kthread+0x10/0x10 [ 20.401389] ret_from_fork+0x116/0x1d0 [ 20.401414] ? __pfx_kthread+0x10/0x10 [ 20.401443] ret_from_fork_asm+0x1a/0x30 [ 20.401483] </TASK> [ 20.401497] [ 20.427678] The buggy address belongs to the physical page: [ 20.428255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990 [ 20.429004] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.429899] flags: 0x200000000000040(head|node=0|zone=2) [ 20.430535] page_type: f8(unknown) [ 20.431080] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.432187] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.432948] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.433734] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.434470] head: 0200000000000002 ffffea00040e6401 00000000ffffffff 00000000ffffffff [ 20.435261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.436163] page dumped because: kasan: bad access detected [ 20.436673] [ 20.437075] Memory state around the buggy address: [ 20.437579] ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.438674] ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.439354] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.440297] ^ [ 20.440655] ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.441387] ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.441900] ==================================================================
[ 22.339973] ================================================================== [ 22.341142] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.341830] Free of addr ffff00000e1f8000 by task kunit_try_catch/292 [ 22.342427] [ 22.342590] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.342640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.342654] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.342672] Call trace: [ 22.342683] show_stack+0x20/0x38 (C) [ 22.342717] dump_stack_lvl+0x8c/0xd0 [ 22.342752] print_report+0x118/0x608 [ 22.342787] kasan_report_invalid_free+0xc0/0xe8 [ 22.342821] __kasan_mempool_poison_pages+0xe0/0xe8 [ 22.342857] mempool_free+0x24c/0x328 [ 22.342885] mempool_double_free_helper+0x150/0x2e8 [ 22.342916] mempool_page_alloc_double_free+0xbc/0x118 [ 22.342951] kunit_try_run_case+0x170/0x3f0 [ 22.342986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.343025] kthread+0x328/0x630 [ 22.343053] ret_from_fork+0x10/0x20 [ 22.343087] [ 22.349610] The buggy address belongs to the physical page: [ 22.350127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1f8 [ 22.350853] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.351477] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.352193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.352902] page dumped because: kasan: bad access detected [ 22.353416] [ 22.353569] Memory state around the buggy address: [ 22.354018] ffff00000e1f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.354685] ffff00000e1f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.355351] >ffff00000e1f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.356014] ^ [ 22.356325] ffff00000e1f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.356992] ffff00000e1f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.357655] ================================================================== [ 22.315025] ================================================================== [ 22.316152] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.316825] Free of addr ffff00000e270000 by task kunit_try_catch/290 [ 22.317417] [ 22.317577] CPU: 3 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.317620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.317632] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.317647] Call trace: [ 22.317657] show_stack+0x20/0x38 (C) [ 22.317688] dump_stack_lvl+0x8c/0xd0 [ 22.317719] print_report+0x118/0x608 [ 22.317748] kasan_report_invalid_free+0xc0/0xe8 [ 22.317777] __kasan_mempool_poison_object+0x14c/0x150 [ 22.317807] mempool_free+0x28c/0x328 [ 22.317831] mempool_double_free_helper+0x150/0x2e8 [ 22.317859] mempool_kmalloc_large_double_free+0xc0/0x118 [ 22.317886] kunit_try_run_case+0x170/0x3f0 [ 22.317916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.317948] kthread+0x328/0x630 [ 22.317972] ret_from_fork+0x10/0x20 [ 22.317999] [ 22.324535] The buggy address belongs to the physical page: [ 22.325047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe270 [ 22.325765] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.326463] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.327108] page_type: f8(unknown) [ 22.327437] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.328144] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.328852] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.329567] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.330284] head: 03fffe0000000002 fffffdffc0389c01 00000000ffffffff 00000000ffffffff [ 22.330999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.331708] page dumped because: kasan: bad access detected [ 22.332216] [ 22.332364] Memory state around the buggy address: [ 22.332808] ffff00000e26ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.333467] ffff00000e26ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.334127] >ffff00000e270000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.334781] ^ [ 22.335087] ffff00000e270080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.335746] ffff00000e270100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.336402] ================================================================== [ 22.280405] ================================================================== [ 22.281489] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.282171] Free of addr ffff00000cea4600 by task kunit_try_catch/288 [ 22.282763] [ 22.282922] CPU: 3 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.282965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.282978] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.282993] Call trace: [ 22.283003] show_stack+0x20/0x38 (C) [ 22.283031] dump_stack_lvl+0x8c/0xd0 [ 22.283061] print_report+0x118/0x608 [ 22.283090] kasan_report_invalid_free+0xc0/0xe8 [ 22.283119] check_slab_allocation+0xd4/0x108 [ 22.283147] __kasan_mempool_poison_object+0x78/0x150 [ 22.283177] mempool_free+0x28c/0x328 [ 22.283202] mempool_double_free_helper+0x150/0x2e8 [ 22.283228] mempool_kmalloc_double_free+0xc0/0x118 [ 22.283255] kunit_try_run_case+0x170/0x3f0 [ 22.283285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.283317] kthread+0x328/0x630 [ 22.283340] ret_from_fork+0x10/0x20 [ 22.283367] [ 22.290235] Allocated by task 288: [ 22.290557] kasan_save_stack+0x3c/0x68 [ 22.290928] kasan_save_track+0x20/0x40 [ 22.291296] kasan_save_alloc_info+0x40/0x58 [ 22.291705] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.292206] remove_element+0x130/0x1f8 [ 22.292572] mempool_alloc_preallocated+0x58/0xc0 [ 22.293014] mempool_double_free_helper+0x94/0x2e8 [ 22.293466] mempool_kmalloc_double_free+0xc0/0x118 [ 22.293923] kunit_try_run_case+0x170/0x3f0 [ 22.294322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.294838] kthread+0x328/0x630 [ 22.295148] ret_from_fork+0x10/0x20 [ 22.295491] [ 22.295641] Freed by task 288: [ 22.295930] kasan_save_stack+0x3c/0x68 [ 22.296298] kasan_save_track+0x20/0x40 [ 22.296667] kasan_save_free_info+0x4c/0x78 [ 22.297068] __kasan_mempool_poison_object+0xc0/0x150 [ 22.297545] mempool_free+0x28c/0x328 [ 22.297895] mempool_double_free_helper+0x100/0x2e8 [ 22.298354] mempool_kmalloc_double_free+0xc0/0x118 [ 22.298812] kunit_try_run_case+0x170/0x3f0 [ 22.299212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.299727] kthread+0x328/0x630 [ 22.300037] ret_from_fork+0x10/0x20 [ 22.300381] [ 22.300531] The buggy address belongs to the object at ffff00000cea4600 [ 22.300531] which belongs to the cache kmalloc-128 of size 128 [ 22.301656] The buggy address is located 0 bytes inside of [ 22.301656] 128-byte region [ffff00000cea4600, ffff00000cea4680) [ 22.302698] [ 22.302848] The buggy address belongs to the physical page: [ 22.303359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcea4 [ 22.304077] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.304682] page_type: f5(slab) [ 22.304990] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 22.305697] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.306399] page dumped because: kasan: bad access detected [ 22.306907] [ 22.307056] Memory state around the buggy address: [ 22.307499] ffff00000cea4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.308158] ffff00000cea4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.308817] >ffff00000cea4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.309473] ^ [ 22.309778] ffff00000cea4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.310436] ffff00000cea4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.311092] ==================================================================