Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.837179] ================================================================== [ 18.837446] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.837855] Free of addr fff00000c7864000 by task kunit_try_catch/240 [ 18.837958] [ 18.838137] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.838246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.838273] Hardware name: linux,dummy-virt (DT) [ 18.838323] Call trace: [ 18.838390] show_stack+0x20/0x38 (C) [ 18.838762] dump_stack_lvl+0x8c/0xd0 [ 18.838892] print_report+0x118/0x608 [ 18.838984] kasan_report_invalid_free+0xc0/0xe8 [ 18.839127] __kasan_mempool_poison_pages+0xe0/0xe8 [ 18.839226] mempool_free+0x24c/0x328 [ 18.839273] mempool_double_free_helper+0x150/0x2e8 [ 18.839328] mempool_page_alloc_double_free+0xbc/0x118 [ 18.839594] kunit_try_run_case+0x170/0x3f0 [ 18.839770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.839881] kthread+0x328/0x630 [ 18.839968] ret_from_fork+0x10/0x20 [ 18.840320] [ 18.840363] The buggy address belongs to the physical page: [ 18.840460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107864 [ 18.840554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.840992] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.841148] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.841546] page dumped because: kasan: bad access detected [ 18.841702] [ 18.841770] Memory state around the buggy address: [ 18.841808] fff00000c7863f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.842138] fff00000c7863f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.842323] >fff00000c7864000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.842621] ^ [ 18.842714] fff00000c7864080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.843092] fff00000c7864100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.843457] ================================================================== [ 18.804077] ================================================================== [ 18.804148] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.804207] Free of addr fff00000c5872f00 by task kunit_try_catch/236 [ 18.804249] [ 18.804283] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.804367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.804392] Hardware name: linux,dummy-virt (DT) [ 18.804425] Call trace: [ 18.804448] show_stack+0x20/0x38 (C) [ 18.804498] dump_stack_lvl+0x8c/0xd0 [ 18.804545] print_report+0x118/0x608 [ 18.804592] kasan_report_invalid_free+0xc0/0xe8 [ 18.804641] check_slab_allocation+0xd4/0x108 [ 18.804689] __kasan_mempool_poison_object+0x78/0x150 [ 18.804741] mempool_free+0x28c/0x328 [ 18.804786] mempool_double_free_helper+0x150/0x2e8 [ 18.804835] mempool_kmalloc_double_free+0xc0/0x118 [ 18.804900] kunit_try_run_case+0x170/0x3f0 [ 18.804948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.805000] kthread+0x328/0x630 [ 18.805044] ret_from_fork+0x10/0x20 [ 18.805091] [ 18.805109] Allocated by task 236: [ 18.805140] kasan_save_stack+0x3c/0x68 [ 18.805180] kasan_save_track+0x20/0x40 [ 18.805217] kasan_save_alloc_info+0x40/0x58 [ 18.805255] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.805298] remove_element+0x130/0x1f8 [ 18.805331] mempool_alloc_preallocated+0x58/0xc0 [ 18.805370] mempool_double_free_helper+0x94/0x2e8 [ 18.805407] mempool_kmalloc_double_free+0xc0/0x118 [ 18.805447] kunit_try_run_case+0x170/0x3f0 [ 18.805484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.805527] kthread+0x328/0x630 [ 18.805558] ret_from_fork+0x10/0x20 [ 18.805595] [ 18.805614] Freed by task 236: [ 18.805640] kasan_save_stack+0x3c/0x68 [ 18.805678] kasan_save_track+0x20/0x40 [ 18.805712] kasan_save_free_info+0x4c/0x78 [ 18.805751] __kasan_mempool_poison_object+0xc0/0x150 [ 18.805792] mempool_free+0x28c/0x328 [ 18.805826] mempool_double_free_helper+0x100/0x2e8 [ 18.805875] mempool_kmalloc_double_free+0xc0/0x118 [ 18.805914] kunit_try_run_case+0x170/0x3f0 [ 18.805952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.805996] kthread+0x328/0x630 [ 18.806028] ret_from_fork+0x10/0x20 [ 18.806062] [ 18.806080] The buggy address belongs to the object at fff00000c5872f00 [ 18.806080] which belongs to the cache kmalloc-128 of size 128 [ 18.806138] The buggy address is located 0 bytes inside of [ 18.806138] 128-byte region [fff00000c5872f00, fff00000c5872f80) [ 18.806198] [ 18.806218] The buggy address belongs to the physical page: [ 18.806249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105872 [ 18.806300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.806348] page_type: f5(slab) [ 18.806388] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.806438] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 18.806479] page dumped because: kasan: bad access detected [ 18.806508] [ 18.806529] Memory state around the buggy address: [ 18.806560] fff00000c5872e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.806605] fff00000c5872e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.806647] >fff00000c5872f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.806685] ^ [ 18.806711] fff00000c5872f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.806971] fff00000c5873000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.807014] ================================================================== [ 18.816365] ================================================================== [ 18.816423] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.816479] Free of addr fff00000c7864000 by task kunit_try_catch/238 [ 18.816520] [ 18.816553] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.816636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.816665] Hardware name: linux,dummy-virt (DT) [ 18.816695] Call trace: [ 18.816715] show_stack+0x20/0x38 (C) [ 18.816765] dump_stack_lvl+0x8c/0xd0 [ 18.816812] print_report+0x118/0x608 [ 18.817072] kasan_report_invalid_free+0xc0/0xe8 [ 18.817296] __kasan_mempool_poison_object+0x14c/0x150 [ 18.817583] mempool_free+0x28c/0x328 [ 18.817764] mempool_double_free_helper+0x150/0x2e8 [ 18.817868] mempool_kmalloc_large_double_free+0xc0/0x118 [ 18.817966] kunit_try_run_case+0x170/0x3f0 [ 18.818013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.818066] kthread+0x328/0x630 [ 18.818315] ret_from_fork+0x10/0x20 [ 18.818467] [ 18.818488] The buggy address belongs to the physical page: [ 18.818522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107864 [ 18.818638] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.818686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.819180] page_type: f8(unknown) [ 18.819242] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.819294] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.819359] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.819547] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.819597] head: 0bfffe0000000002 ffffc1ffc31e1901 00000000ffffffff 00000000ffffffff [ 18.819645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.819729] page dumped because: kasan: bad access detected [ 18.819871] [ 18.819951] Memory state around the buggy address: [ 18.819983] fff00000c7863f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.820135] fff00000c7863f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.820211] >fff00000c7864000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.820276] ^ [ 18.820304] fff00000c7864080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.820381] fff00000c7864100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.820441] ==================================================================
[ 14.050216] ================================================================== [ 14.050702] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.051424] Free of addr ffff888102a58000 by task kunit_try_catch/254 [ 14.052100] [ 14.052285] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.052343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.052355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.052377] Call Trace: [ 14.052389] <TASK> [ 14.052404] dump_stack_lvl+0x73/0xb0 [ 14.052442] print_report+0xd1/0x650 [ 14.052464] ? __virt_addr_valid+0x1db/0x2d0 [ 14.052488] ? kasan_addr_to_slab+0x11/0xa0 [ 14.052520] ? mempool_double_free_helper+0x184/0x370 [ 14.052545] kasan_report_invalid_free+0x10a/0x130 [ 14.052571] ? mempool_double_free_helper+0x184/0x370 [ 14.052599] ? mempool_double_free_helper+0x184/0x370 [ 14.052624] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.052650] mempool_free+0x2ec/0x380 [ 14.052676] mempool_double_free_helper+0x184/0x370 [ 14.052702] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.052726] ? update_load_avg+0x1be/0x21b0 [ 14.052758] ? update_load_avg+0x1be/0x21b0 [ 14.052780] ? update_curr+0x80/0x810 [ 14.052802] ? irqentry_exit+0x2a/0x60 [ 14.052823] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.052851] mempool_kmalloc_large_double_free+0xed/0x140 [ 14.052878] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.052908] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.052942] ? __pfx_mempool_kfree+0x10/0x10 [ 14.052966] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.052996] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.053042] kunit_try_run_case+0x1a5/0x480 [ 14.053066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.053090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.053114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.053140] ? __kthread_parkme+0x82/0x180 [ 14.053161] ? preempt_count_sub+0x50/0x80 [ 14.053185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.053210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.053236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.053262] kthread+0x337/0x6f0 [ 14.053281] ? trace_preempt_on+0x20/0xc0 [ 14.053305] ? __pfx_kthread+0x10/0x10 [ 14.053326] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.053348] ? calculate_sigpending+0x7b/0xa0 [ 14.053372] ? __pfx_kthread+0x10/0x10 [ 14.053394] ret_from_fork+0x116/0x1d0 [ 14.053413] ? __pfx_kthread+0x10/0x10 [ 14.053434] ret_from_fork_asm+0x1a/0x30 [ 14.053466] </TASK> [ 14.053476] [ 14.063336] The buggy address belongs to the physical page: [ 14.063608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a58 [ 14.064024] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.064312] flags: 0x200000000000040(head|node=0|zone=2) [ 14.064530] page_type: f8(unknown) [ 14.064707] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.065063] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.065301] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.065631] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.066101] head: 0200000000000002 ffffea00040a9601 00000000ffffffff 00000000ffffffff [ 14.066421] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.066653] page dumped because: kasan: bad access detected [ 14.067044] [ 14.067177] Memory state around the buggy address: [ 14.067477] ffff888102a57f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.067899] ffff888102a57f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.068479] >ffff888102a58000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.068821] ^ [ 14.068947] ffff888102a58080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.069497] ffff888102a58100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.069859] ================================================================== [ 14.075810] ================================================================== [ 14.076633] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.076881] Free of addr ffff8881039c4000 by task kunit_try_catch/256 [ 14.077100] [ 14.077188] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.077232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.077243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.077262] Call Trace: [ 14.077274] <TASK> [ 14.077288] dump_stack_lvl+0x73/0xb0 [ 14.077317] print_report+0xd1/0x650 [ 14.077339] ? __virt_addr_valid+0x1db/0x2d0 [ 14.077363] ? kasan_addr_to_slab+0x11/0xa0 [ 14.077382] ? mempool_double_free_helper+0x184/0x370 [ 14.077406] kasan_report_invalid_free+0x10a/0x130 [ 14.077432] ? mempool_double_free_helper+0x184/0x370 [ 14.077459] ? mempool_double_free_helper+0x184/0x370 [ 14.077483] __kasan_mempool_poison_pages+0x115/0x130 [ 14.077507] mempool_free+0x290/0x380 [ 14.077535] mempool_double_free_helper+0x184/0x370 [ 14.077561] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.077587] ? __kasan_check_write+0x18/0x20 [ 14.077607] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.078379] ? finish_task_switch.isra.0+0x153/0x700 [ 14.078413] mempool_page_alloc_double_free+0xe8/0x140 [ 14.078454] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.078485] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.078518] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.078545] ? __pfx_read_tsc+0x10/0x10 [ 14.078567] ? ktime_get_ts64+0x86/0x230 [ 14.078592] kunit_try_run_case+0x1a5/0x480 [ 14.078617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.078669] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.078694] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.078719] ? __kthread_parkme+0x82/0x180 [ 14.078986] ? preempt_count_sub+0x50/0x80 [ 14.079024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.079049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.079076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.079102] kthread+0x337/0x6f0 [ 14.079121] ? trace_preempt_on+0x20/0xc0 [ 14.079146] ? __pfx_kthread+0x10/0x10 [ 14.079167] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.079189] ? calculate_sigpending+0x7b/0xa0 [ 14.079213] ? __pfx_kthread+0x10/0x10 [ 14.079235] ret_from_fork+0x116/0x1d0 [ 14.079254] ? __pfx_kthread+0x10/0x10 [ 14.079275] ret_from_fork_asm+0x1a/0x30 [ 14.079307] </TASK> [ 14.079317] [ 14.096707] The buggy address belongs to the physical page: [ 14.097191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c4 [ 14.098112] flags: 0x200000000000000(node=0|zone=2) [ 14.098407] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.098645] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.099136] page dumped because: kasan: bad access detected [ 14.099659] [ 14.099831] Memory state around the buggy address: [ 14.100327] ffff8881039c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.100988] ffff8881039c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.101418] >ffff8881039c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.101632] ^ [ 14.101748] ffff8881039c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.101990] ffff8881039c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.102346] ================================================================== [ 14.010458] ================================================================== [ 14.011328] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.011684] Free of addr ffff888103953600 by task kunit_try_catch/252 [ 14.012372] [ 14.012592] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.012647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.012659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.012681] Call Trace: [ 14.012694] <TASK> [ 14.012711] dump_stack_lvl+0x73/0xb0 [ 14.012790] print_report+0xd1/0x650 [ 14.012814] ? __virt_addr_valid+0x1db/0x2d0 [ 14.012840] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.012874] ? mempool_double_free_helper+0x184/0x370 [ 14.012899] kasan_report_invalid_free+0x10a/0x130 [ 14.012934] ? mempool_double_free_helper+0x184/0x370 [ 14.012960] ? mempool_double_free_helper+0x184/0x370 [ 14.012984] ? mempool_double_free_helper+0x184/0x370 [ 14.013033] check_slab_allocation+0x101/0x130 [ 14.013056] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.013082] mempool_free+0x2ec/0x380 [ 14.013110] mempool_double_free_helper+0x184/0x370 [ 14.013134] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.013161] ? __kasan_check_write+0x18/0x20 [ 14.013180] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.013202] ? finish_task_switch.isra.0+0x153/0x700 [ 14.013230] mempool_kmalloc_double_free+0xed/0x140 [ 14.013254] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.013282] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.013304] ? __pfx_mempool_kfree+0x10/0x10 [ 14.013330] ? __pfx_read_tsc+0x10/0x10 [ 14.013352] ? ktime_get_ts64+0x86/0x230 [ 14.013378] kunit_try_run_case+0x1a5/0x480 [ 14.013404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013427] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.013451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.013476] ? __kthread_parkme+0x82/0x180 [ 14.013497] ? preempt_count_sub+0x50/0x80 [ 14.013520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.013569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.013594] kthread+0x337/0x6f0 [ 14.013613] ? trace_preempt_on+0x20/0xc0 [ 14.013637] ? __pfx_kthread+0x10/0x10 [ 14.013657] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.013679] ? calculate_sigpending+0x7b/0xa0 [ 14.013703] ? __pfx_kthread+0x10/0x10 [ 14.013724] ret_from_fork+0x116/0x1d0 [ 14.013759] ? __pfx_kthread+0x10/0x10 [ 14.013780] ret_from_fork_asm+0x1a/0x30 [ 14.013812] </TASK> [ 14.013822] [ 14.027278] Allocated by task 252: [ 14.027620] kasan_save_stack+0x45/0x70 [ 14.028102] kasan_save_track+0x18/0x40 [ 14.028580] kasan_save_alloc_info+0x3b/0x50 [ 14.029069] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.029546] remove_element+0x11e/0x190 [ 14.029937] mempool_alloc_preallocated+0x4d/0x90 [ 14.030557] mempool_double_free_helper+0x8a/0x370 [ 14.031016] mempool_kmalloc_double_free+0xed/0x140 [ 14.031495] kunit_try_run_case+0x1a5/0x480 [ 14.031898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.032505] kthread+0x337/0x6f0 [ 14.032904] ret_from_fork+0x116/0x1d0 [ 14.033298] ret_from_fork_asm+0x1a/0x30 [ 14.033664] [ 14.033841] Freed by task 252: [ 14.034213] kasan_save_stack+0x45/0x70 [ 14.034707] kasan_save_track+0x18/0x40 [ 14.035207] kasan_save_free_info+0x3f/0x60 [ 14.035597] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.036154] mempool_free+0x2ec/0x380 [ 14.036505] mempool_double_free_helper+0x109/0x370 [ 14.036977] mempool_kmalloc_double_free+0xed/0x140 [ 14.037524] kunit_try_run_case+0x1a5/0x480 [ 14.038035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.038664] kthread+0x337/0x6f0 [ 14.039051] ret_from_fork+0x116/0x1d0 [ 14.039356] ret_from_fork_asm+0x1a/0x30 [ 14.039494] [ 14.039562] The buggy address belongs to the object at ffff888103953600 [ 14.039562] which belongs to the cache kmalloc-128 of size 128 [ 14.039913] The buggy address is located 0 bytes inside of [ 14.039913] 128-byte region [ffff888103953600, ffff888103953680) [ 14.040540] [ 14.040738] The buggy address belongs to the physical page: [ 14.041205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953 [ 14.041439] flags: 0x200000000000000(node=0|zone=2) [ 14.041595] page_type: f5(slab) [ 14.041711] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.042492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.043402] page dumped because: kasan: bad access detected [ 14.043937] [ 14.044128] Memory state around the buggy address: [ 14.044542] ffff888103953500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.044819] ffff888103953580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.045509] >ffff888103953600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.045996] ^ [ 14.046378] ffff888103953680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.046829] ffff888103953700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.047332] ==================================================================