Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.189304] ================================================================== [ 20.189365] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.189422] Free of addr fff00000c77fc000 by task kunit_try_catch/239 [ 20.189465] [ 20.189498] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.189694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.189723] Hardware name: linux,dummy-virt (DT) [ 20.189900] Call trace: [ 20.190009] show_stack+0x20/0x38 (C) [ 20.190113] dump_stack_lvl+0x8c/0xd0 [ 20.190193] print_report+0x118/0x608 [ 20.190239] kasan_report_invalid_free+0xc0/0xe8 [ 20.190289] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.190356] mempool_free+0x24c/0x328 [ 20.190401] mempool_double_free_helper+0x150/0x2e8 [ 20.190457] mempool_page_alloc_double_free+0xbc/0x118 [ 20.190509] kunit_try_run_case+0x170/0x3f0 [ 20.190557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.190609] kthread+0x328/0x630 [ 20.190651] ret_from_fork+0x10/0x20 [ 20.190696] [ 20.190718] The buggy address belongs to the physical page: [ 20.190748] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fc [ 20.190995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.191138] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.191315] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.191356] page dumped because: kasan: bad access detected [ 20.191387] [ 20.191404] Memory state around the buggy address: [ 20.191474] fff00000c77fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.191716] fff00000c77fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.191801] >fff00000c77fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.191864] ^ [ 20.191945] fff00000c77fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.191987] fff00000c77fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.192025] ================================================================== [ 20.174941] ================================================================== [ 20.174996] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.175049] Free of addr fff00000c77fc000 by task kunit_try_catch/237 [ 20.175089] [ 20.175240] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.175322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.175350] Hardware name: linux,dummy-virt (DT) [ 20.175586] Call trace: [ 20.175612] show_stack+0x20/0x38 (C) [ 20.175799] dump_stack_lvl+0x8c/0xd0 [ 20.176019] print_report+0x118/0x608 [ 20.176105] kasan_report_invalid_free+0xc0/0xe8 [ 20.176158] __kasan_mempool_poison_object+0x14c/0x150 [ 20.176293] mempool_free+0x28c/0x328 [ 20.176426] mempool_double_free_helper+0x150/0x2e8 [ 20.176784] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.177046] kunit_try_run_case+0x170/0x3f0 [ 20.177288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.177486] kthread+0x328/0x630 [ 20.177631] ret_from_fork+0x10/0x20 [ 20.177704] [ 20.177727] The buggy address belongs to the physical page: [ 20.177932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fc [ 20.178196] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.178381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.178509] page_type: f8(unknown) [ 20.178933] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.179074] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.179151] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.179199] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.179248] head: 0bfffe0000000002 ffffc1ffc31dff01 00000000ffffffff 00000000ffffffff [ 20.179433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.179599] page dumped because: kasan: bad access detected [ 20.179663] [ 20.179965] Memory state around the buggy address: [ 20.180344] fff00000c77fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.180410] fff00000c77fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.180483] >fff00000c77fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.180598] ^ [ 20.180676] fff00000c77fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.180736] fff00000c77fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.180775] ================================================================== [ 20.160632] ================================================================== [ 20.160713] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.160837] Free of addr fff00000c76c4900 by task kunit_try_catch/235 [ 20.160902] [ 20.160940] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.161020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.161071] Hardware name: linux,dummy-virt (DT) [ 20.161242] Call trace: [ 20.161300] show_stack+0x20/0x38 (C) [ 20.161624] dump_stack_lvl+0x8c/0xd0 [ 20.161719] print_report+0x118/0x608 [ 20.161831] kasan_report_invalid_free+0xc0/0xe8 [ 20.161911] check_slab_allocation+0xd4/0x108 [ 20.161977] __kasan_mempool_poison_object+0x78/0x150 [ 20.162030] mempool_free+0x28c/0x328 [ 20.162095] mempool_double_free_helper+0x150/0x2e8 [ 20.162175] mempool_kmalloc_double_free+0xc0/0x118 [ 20.162242] kunit_try_run_case+0x170/0x3f0 [ 20.162323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.162377] kthread+0x328/0x630 [ 20.162522] ret_from_fork+0x10/0x20 [ 20.162570] [ 20.162614] Allocated by task 235: [ 20.162788] kasan_save_stack+0x3c/0x68 [ 20.162911] kasan_save_track+0x20/0x40 [ 20.162989] kasan_save_alloc_info+0x40/0x58 [ 20.163127] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.163255] remove_element+0x130/0x1f8 [ 20.163438] mempool_alloc_preallocated+0x58/0xc0 [ 20.163566] mempool_double_free_helper+0x94/0x2e8 [ 20.163605] mempool_kmalloc_double_free+0xc0/0x118 [ 20.163646] kunit_try_run_case+0x170/0x3f0 [ 20.163844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.163885] kthread+0x328/0x630 [ 20.163920] ret_from_fork+0x10/0x20 [ 20.163964] [ 20.163983] Freed by task 235: [ 20.164011] kasan_save_stack+0x3c/0x68 [ 20.164323] kasan_save_track+0x20/0x40 [ 20.164604] kasan_save_free_info+0x4c/0x78 [ 20.164647] __kasan_mempool_poison_object+0xc0/0x150 [ 20.164690] mempool_free+0x28c/0x328 [ 20.164725] mempool_double_free_helper+0x100/0x2e8 [ 20.164765] mempool_kmalloc_double_free+0xc0/0x118 [ 20.164817] kunit_try_run_case+0x170/0x3f0 [ 20.165132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.165262] kthread+0x328/0x630 [ 20.165435] ret_from_fork+0x10/0x20 [ 20.165610] [ 20.165767] The buggy address belongs to the object at fff00000c76c4900 [ 20.165767] which belongs to the cache kmalloc-128 of size 128 [ 20.165927] The buggy address is located 0 bytes inside of [ 20.165927] 128-byte region [fff00000c76c4900, fff00000c76c4980) [ 20.165986] [ 20.166005] The buggy address belongs to the physical page: [ 20.166048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c4 [ 20.166278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.166351] page_type: f5(slab) [ 20.166461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.166799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.166993] page dumped because: kasan: bad access detected [ 20.167121] [ 20.167201] Memory state around the buggy address: [ 20.167351] fff00000c76c4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.167396] fff00000c76c4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.167439] >fff00000c76c4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.167478] ^ [ 20.167506] fff00000c76c4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.167547] fff00000c76c4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.167585] ==================================================================
[ 13.673854] ================================================================== [ 13.674813] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 13.675179] Free of addr ffff888103a3c000 by task kunit_try_catch/254 [ 13.675400] [ 13.675517] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.675567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.675580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.675603] Call Trace: [ 13.675619] <TASK> [ 13.675638] dump_stack_lvl+0x73/0xb0 [ 13.675753] print_report+0xd1/0x650 [ 13.675777] ? __virt_addr_valid+0x1db/0x2d0 [ 13.675801] ? kasan_addr_to_slab+0x11/0xa0 [ 13.675820] ? mempool_double_free_helper+0x184/0x370 [ 13.675843] kasan_report_invalid_free+0x10a/0x130 [ 13.675866] ? mempool_double_free_helper+0x184/0x370 [ 13.675892] ? mempool_double_free_helper+0x184/0x370 [ 13.675914] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 13.675938] mempool_free+0x2ec/0x380 [ 13.675961] mempool_double_free_helper+0x184/0x370 [ 13.675983] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.676008] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.676030] ? finish_task_switch.isra.0+0x153/0x700 [ 13.676055] mempool_kmalloc_large_double_free+0xed/0x140 [ 13.676078] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 13.676105] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.676128] ? __pfx_mempool_kfree+0x10/0x10 [ 13.676154] ? __pfx_read_tsc+0x10/0x10 [ 13.676175] ? ktime_get_ts64+0x86/0x230 [ 13.676198] kunit_try_run_case+0x1a5/0x480 [ 13.676235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.676256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.676279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.676302] ? __kthread_parkme+0x82/0x180 [ 13.676322] ? preempt_count_sub+0x50/0x80 [ 13.676343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.676366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.676387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.676409] kthread+0x337/0x6f0 [ 13.676426] ? trace_preempt_on+0x20/0xc0 [ 13.676448] ? __pfx_kthread+0x10/0x10 [ 13.676469] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.676488] ? calculate_sigpending+0x7b/0xa0 [ 13.676511] ? __pfx_kthread+0x10/0x10 [ 13.676531] ret_from_fork+0x116/0x1d0 [ 13.676549] ? __pfx_kthread+0x10/0x10 [ 13.676568] ret_from_fork_asm+0x1a/0x30 [ 13.676599] </TASK> [ 13.676609] [ 13.686602] The buggy address belongs to the physical page: [ 13.686883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a3c [ 13.687147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.688582] flags: 0x200000000000040(head|node=0|zone=2) [ 13.688886] page_type: f8(unknown) [ 13.689067] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.689621] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.689962] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.690572] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.690923] head: 0200000000000002 ffffea00040e8f01 00000000ffffffff 00000000ffffffff [ 13.691638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.691975] page dumped because: kasan: bad access detected [ 13.692268] [ 13.692471] Memory state around the buggy address: [ 13.692719] ffff888103a3bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.693051] ffff888103a3bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.693523] >ffff888103a3c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.693883] ^ [ 13.694091] ffff888103a3c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.694549] ffff888103a3c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.694883] ================================================================== [ 13.699074] ================================================================== [ 13.699768] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 13.700138] Free of addr ffff888103a3c000 by task kunit_try_catch/256 [ 13.700935] [ 13.701063] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.701116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.701129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.701154] Call Trace: [ 13.701172] <TASK> [ 13.701193] dump_stack_lvl+0x73/0xb0 [ 13.701242] print_report+0xd1/0x650 [ 13.701266] ? __virt_addr_valid+0x1db/0x2d0 [ 13.701289] ? kasan_addr_to_slab+0x11/0xa0 [ 13.701308] ? mempool_double_free_helper+0x184/0x370 [ 13.701333] kasan_report_invalid_free+0x10a/0x130 [ 13.701356] ? mempool_double_free_helper+0x184/0x370 [ 13.701381] ? mempool_double_free_helper+0x184/0x370 [ 13.701403] __kasan_mempool_poison_pages+0x115/0x130 [ 13.701511] mempool_free+0x290/0x380 [ 13.701538] mempool_double_free_helper+0x184/0x370 [ 13.701561] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.701588] ? finish_task_switch.isra.0+0x153/0x700 [ 13.701614] mempool_page_alloc_double_free+0xe8/0x140 [ 13.701638] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 13.701665] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 13.701684] ? __pfx_mempool_free_pages+0x10/0x10 [ 13.701706] ? __pfx_read_tsc+0x10/0x10 [ 13.701727] ? ktime_get_ts64+0x86/0x230 [ 13.701751] kunit_try_run_case+0x1a5/0x480 [ 13.701775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.701796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.701820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.701841] ? __kthread_parkme+0x82/0x180 [ 13.701861] ? preempt_count_sub+0x50/0x80 [ 13.701883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.701906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.701928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.701950] kthread+0x337/0x6f0 [ 13.701968] ? trace_preempt_on+0x20/0xc0 [ 13.701990] ? __pfx_kthread+0x10/0x10 [ 13.702009] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.702028] ? calculate_sigpending+0x7b/0xa0 [ 13.702051] ? __pfx_kthread+0x10/0x10 [ 13.702072] ret_from_fork+0x116/0x1d0 [ 13.702090] ? __pfx_kthread+0x10/0x10 [ 13.702109] ret_from_fork_asm+0x1a/0x30 [ 13.702138] </TASK> [ 13.702150] [ 13.710677] The buggy address belongs to the physical page: [ 13.710975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a3c [ 13.711781] flags: 0x200000000000000(node=0|zone=2) [ 13.712014] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 13.712473] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.712745] page dumped because: kasan: bad access detected [ 13.712933] [ 13.713006] Memory state around the buggy address: [ 13.713331] ffff888103a3bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.713624] ffff888103a3bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.713939] >ffff888103a3c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.714287] ^ [ 13.714435] ffff888103a3c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.714759] ffff888103a3c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.715079] ================================================================== [ 13.639750] ================================================================== [ 13.640247] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 13.640900] Free of addr ffff888103980b00 by task kunit_try_catch/252 [ 13.641211] [ 13.641531] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.641586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.641681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.641708] Call Trace: [ 13.641723] <TASK> [ 13.641744] dump_stack_lvl+0x73/0xb0 [ 13.641781] print_report+0xd1/0x650 [ 13.641804] ? __virt_addr_valid+0x1db/0x2d0 [ 13.641831] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.641852] ? mempool_double_free_helper+0x184/0x370 [ 13.641876] kasan_report_invalid_free+0x10a/0x130 [ 13.641900] ? mempool_double_free_helper+0x184/0x370 [ 13.641924] ? mempool_double_free_helper+0x184/0x370 [ 13.641948] ? mempool_double_free_helper+0x184/0x370 [ 13.641969] check_slab_allocation+0x101/0x130 [ 13.641990] __kasan_mempool_poison_object+0x91/0x1d0 [ 13.642013] mempool_free+0x2ec/0x380 [ 13.642037] mempool_double_free_helper+0x184/0x370 [ 13.642060] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.642082] ? update_load_avg+0x1be/0x21b0 [ 13.642105] ? update_load_avg+0x1be/0x21b0 [ 13.642719] ? update_curr+0x80/0x810 [ 13.642751] ? finish_task_switch.isra.0+0x153/0x700 [ 13.642778] mempool_kmalloc_double_free+0xed/0x140 [ 13.642802] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 13.642828] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.642853] ? __pfx_mempool_kfree+0x10/0x10 [ 13.642880] ? __pfx_read_tsc+0x10/0x10 [ 13.642902] ? ktime_get_ts64+0x86/0x230 [ 13.642926] kunit_try_run_case+0x1a5/0x480 [ 13.642952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.642974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.642999] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.643021] ? __kthread_parkme+0x82/0x180 [ 13.643042] ? preempt_count_sub+0x50/0x80 [ 13.643064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.643087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.643109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.643131] kthread+0x337/0x6f0 [ 13.643150] ? trace_preempt_on+0x20/0xc0 [ 13.643173] ? __pfx_kthread+0x10/0x10 [ 13.643193] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.643244] ? calculate_sigpending+0x7b/0xa0 [ 13.643269] ? __pfx_kthread+0x10/0x10 [ 13.643289] ret_from_fork+0x116/0x1d0 [ 13.643308] ? __pfx_kthread+0x10/0x10 [ 13.643327] ret_from_fork_asm+0x1a/0x30 [ 13.643359] </TASK> [ 13.643371] [ 13.656718] Allocated by task 252: [ 13.656938] kasan_save_stack+0x45/0x70 [ 13.657155] kasan_save_track+0x18/0x40 [ 13.658073] kasan_save_alloc_info+0x3b/0x50 [ 13.658474] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.658751] remove_element+0x11e/0x190 [ 13.659025] mempool_alloc_preallocated+0x4d/0x90 [ 13.659206] mempool_double_free_helper+0x8a/0x370 [ 13.659647] mempool_kmalloc_double_free+0xed/0x140 [ 13.659963] kunit_try_run_case+0x1a5/0x480 [ 13.660127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.660536] kthread+0x337/0x6f0 [ 13.660847] ret_from_fork+0x116/0x1d0 [ 13.660999] ret_from_fork_asm+0x1a/0x30 [ 13.661202] [ 13.661543] Freed by task 252: [ 13.661722] kasan_save_stack+0x45/0x70 [ 13.661880] kasan_save_track+0x18/0x40 [ 13.662053] kasan_save_free_info+0x3f/0x60 [ 13.662280] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.662862] mempool_free+0x2ec/0x380 [ 13.663006] mempool_double_free_helper+0x109/0x370 [ 13.663257] mempool_kmalloc_double_free+0xed/0x140 [ 13.663625] kunit_try_run_case+0x1a5/0x480 [ 13.663922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.664113] kthread+0x337/0x6f0 [ 13.664283] ret_from_fork+0x116/0x1d0 [ 13.664490] ret_from_fork_asm+0x1a/0x30 [ 13.664680] [ 13.664754] The buggy address belongs to the object at ffff888103980b00 [ 13.664754] which belongs to the cache kmalloc-128 of size 128 [ 13.665288] The buggy address is located 0 bytes inside of [ 13.665288] 128-byte region [ffff888103980b00, ffff888103980b80) [ 13.665771] [ 13.665870] The buggy address belongs to the physical page: [ 13.666121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103980 [ 13.666483] flags: 0x200000000000000(node=0|zone=2) [ 13.666712] page_type: f5(slab) [ 13.666893] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.667208] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.667446] page dumped because: kasan: bad access detected [ 13.667762] [ 13.667948] Memory state around the buggy address: [ 13.668179] ffff888103980a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.668471] ffff888103980a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.668698] >ffff888103980b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.669140] ^ [ 13.669336] ffff888103980b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.669659] ffff888103980c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.669944] ==================================================================