Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.635473] ================================================================== [ 18.635552] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.635616] Free of addr fff00000c76af600 by task kunit_try_catch/235 [ 18.635976] [ 18.636125] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.636436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.636492] Hardware name: linux,dummy-virt (DT) [ 18.636625] Call trace: [ 18.636971] show_stack+0x20/0x38 (C) [ 18.637103] dump_stack_lvl+0x8c/0xd0 [ 18.637170] print_report+0x118/0x608 [ 18.637430] kasan_report_invalid_free+0xc0/0xe8 [ 18.637631] check_slab_allocation+0xd4/0x108 [ 18.637756] __kasan_mempool_poison_object+0x78/0x150 [ 18.638077] mempool_free+0x28c/0x328 [ 18.638168] mempool_double_free_helper+0x150/0x2e8 [ 18.638221] mempool_kmalloc_double_free+0xc0/0x118 [ 18.638272] kunit_try_run_case+0x170/0x3f0 [ 18.638342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.638397] kthread+0x328/0x630 [ 18.638440] ret_from_fork+0x10/0x20 [ 18.638510] [ 18.638530] Allocated by task 235: [ 18.638562] kasan_save_stack+0x3c/0x68 [ 18.638604] kasan_save_track+0x20/0x40 [ 18.638641] kasan_save_alloc_info+0x40/0x58 [ 18.638687] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.638730] remove_element+0x130/0x1f8 [ 18.638774] mempool_alloc_preallocated+0x58/0xc0 [ 18.638822] mempool_double_free_helper+0x94/0x2e8 [ 18.638870] mempool_kmalloc_double_free+0xc0/0x118 [ 18.638912] kunit_try_run_case+0x170/0x3f0 [ 18.638949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.638992] kthread+0x328/0x630 [ 18.639024] ret_from_fork+0x10/0x20 [ 18.639060] [ 18.639080] Freed by task 235: [ 18.639107] kasan_save_stack+0x3c/0x68 [ 18.639715] kasan_save_track+0x20/0x40 [ 18.639785] kasan_save_free_info+0x4c/0x78 [ 18.639863] __kasan_mempool_poison_object+0xc0/0x150 [ 18.640040] mempool_free+0x28c/0x328 [ 18.640090] mempool_double_free_helper+0x100/0x2e8 [ 18.640142] mempool_kmalloc_double_free+0xc0/0x118 [ 18.640488] kunit_try_run_case+0x170/0x3f0 [ 18.640682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.641032] kthread+0x328/0x630 [ 18.641189] ret_from_fork+0x10/0x20 [ 18.641264] [ 18.641634] The buggy address belongs to the object at fff00000c76af600 [ 18.641634] which belongs to the cache kmalloc-128 of size 128 [ 18.641766] The buggy address is located 0 bytes inside of [ 18.641766] 128-byte region [fff00000c76af600, fff00000c76af680) [ 18.641828] [ 18.642146] The buggy address belongs to the physical page: [ 18.642229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af [ 18.642542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.642629] page_type: f5(slab) [ 18.642739] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.642836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.643109] page dumped because: kasan: bad access detected [ 18.643276] [ 18.643323] Memory state around the buggy address: [ 18.643443] fff00000c76af500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.643510] fff00000c76af580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.643602] >fff00000c76af600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.643641] ^ [ 18.643668] fff00000c76af680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.643992] fff00000c76af700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.644140] ================================================================== [ 18.671321] ================================================================== [ 18.671383] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.671445] Free of addr fff00000c640c000 by task kunit_try_catch/239 [ 18.671488] [ 18.671526] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.671904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.672125] Hardware name: linux,dummy-virt (DT) [ 18.672162] Call trace: [ 18.672214] show_stack+0x20/0x38 (C) [ 18.672270] dump_stack_lvl+0x8c/0xd0 [ 18.672325] print_report+0x118/0x608 [ 18.672375] kasan_report_invalid_free+0xc0/0xe8 [ 18.672425] __kasan_mempool_poison_pages+0xe0/0xe8 [ 18.672489] mempool_free+0x24c/0x328 [ 18.672535] mempool_double_free_helper+0x150/0x2e8 [ 18.672598] mempool_page_alloc_double_free+0xbc/0x118 [ 18.672648] kunit_try_run_case+0x170/0x3f0 [ 18.672698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.672750] kthread+0x328/0x630 [ 18.672809] ret_from_fork+0x10/0x20 [ 18.672861] [ 18.672884] The buggy address belongs to the physical page: [ 18.672917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640c [ 18.672983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.673049] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.673099] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.673151] page dumped because: kasan: bad access detected [ 18.673183] [ 18.673201] Memory state around the buggy address: [ 18.673241] fff00000c640bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.673294] fff00000c640bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.673336] >fff00000c640c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.673384] ^ [ 18.673423] fff00000c640c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.673465] fff00000c640c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.673510] ================================================================== [ 18.653880] ================================================================== [ 18.654037] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.654152] Free of addr fff00000c640c000 by task kunit_try_catch/237 [ 18.654258] [ 18.654294] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.654383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.654411] Hardware name: linux,dummy-virt (DT) [ 18.654629] Call trace: [ 18.654845] show_stack+0x20/0x38 (C) [ 18.654916] dump_stack_lvl+0x8c/0xd0 [ 18.654975] print_report+0x118/0x608 [ 18.655022] kasan_report_invalid_free+0xc0/0xe8 [ 18.655499] __kasan_mempool_poison_object+0x14c/0x150 [ 18.655698] mempool_free+0x28c/0x328 [ 18.655844] mempool_double_free_helper+0x150/0x2e8 [ 18.655932] mempool_kmalloc_large_double_free+0xc0/0x118 [ 18.655985] kunit_try_run_case+0x170/0x3f0 [ 18.656044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.656504] kthread+0x328/0x630 [ 18.656655] ret_from_fork+0x10/0x20 [ 18.656851] [ 18.656972] The buggy address belongs to the physical page: [ 18.657008] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640c [ 18.657112] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.657580] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.657785] page_type: f8(unknown) [ 18.658078] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.658335] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.658468] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.659320] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.659416] head: 0bfffe0000000002 ffffc1ffc3190301 00000000ffffffff 00000000ffffffff [ 18.659476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.659520] page dumped because: kasan: bad access detected [ 18.659551] [ 18.659580] Memory state around the buggy address: [ 18.659922] fff00000c640bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.659982] fff00000c640bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.660032] >fff00000c640c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.660074] ^ [ 18.660105] fff00000c640c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.660663] fff00000c640c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.660732] ==================================================================
[ 14.226325] ================================================================== [ 14.226807] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.227322] Free of addr ffff888103990000 by task kunit_try_catch/254 [ 14.227584] [ 14.227681] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.227739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.227751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.227773] Call Trace: [ 14.227784] <TASK> [ 14.227800] dump_stack_lvl+0x73/0xb0 [ 14.227830] print_report+0xd1/0x650 [ 14.227852] ? __virt_addr_valid+0x1db/0x2d0 [ 14.227877] ? kasan_addr_to_slab+0x11/0xa0 [ 14.227897] ? mempool_double_free_helper+0x184/0x370 [ 14.227923] kasan_report_invalid_free+0x10a/0x130 [ 14.227948] ? mempool_double_free_helper+0x184/0x370 [ 14.227975] ? mempool_double_free_helper+0x184/0x370 [ 14.227999] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.228024] mempool_free+0x2ec/0x380 [ 14.228064] mempool_double_free_helper+0x184/0x370 [ 14.228088] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.228114] ? __kasan_check_write+0x18/0x20 [ 14.228134] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.228156] ? finish_task_switch.isra.0+0x153/0x700 [ 14.228183] mempool_kmalloc_large_double_free+0xed/0x140 [ 14.228208] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.228238] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.228261] ? __pfx_mempool_kfree+0x10/0x10 [ 14.228286] ? __pfx_read_tsc+0x10/0x10 [ 14.228307] ? ktime_get_ts64+0x86/0x230 [ 14.228335] kunit_try_run_case+0x1a5/0x480 [ 14.228359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.228381] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.228407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.228431] ? __kthread_parkme+0x82/0x180 [ 14.228451] ? preempt_count_sub+0x50/0x80 [ 14.228476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.228500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.228525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.228551] kthread+0x337/0x6f0 [ 14.228570] ? trace_preempt_on+0x20/0xc0 [ 14.228594] ? __pfx_kthread+0x10/0x10 [ 14.228615] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.228636] ? calculate_sigpending+0x7b/0xa0 [ 14.228661] ? __pfx_kthread+0x10/0x10 [ 14.228683] ret_from_fork+0x116/0x1d0 [ 14.228711] ? __pfx_kthread+0x10/0x10 [ 14.228742] ret_from_fork_asm+0x1a/0x30 [ 14.228791] </TASK> [ 14.228802] [ 14.237563] The buggy address belongs to the physical page: [ 14.237839] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990 [ 14.238215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.238518] flags: 0x200000000000040(head|node=0|zone=2) [ 14.238773] page_type: f8(unknown) [ 14.238958] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.239281] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.239629] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.239878] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.240115] head: 0200000000000002 ffffea00040e6401 00000000ffffffff 00000000ffffffff [ 14.240412] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.240777] page dumped because: kasan: bad access detected [ 14.241030] [ 14.241226] Memory state around the buggy address: [ 14.241394] ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.241609] ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.241889] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.242481] ^ [ 14.242649] ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.242979] ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.243459] ================================================================== [ 14.247859] ================================================================== [ 14.248462] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.248786] Free of addr ffff888102a44000 by task kunit_try_catch/256 [ 14.249168] [ 14.249268] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.249311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.249323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.249343] Call Trace: [ 14.249354] <TASK> [ 14.249369] dump_stack_lvl+0x73/0xb0 [ 14.249397] print_report+0xd1/0x650 [ 14.249418] ? __virt_addr_valid+0x1db/0x2d0 [ 14.249442] ? kasan_addr_to_slab+0x11/0xa0 [ 14.249462] ? mempool_double_free_helper+0x184/0x370 [ 14.249487] kasan_report_invalid_free+0x10a/0x130 [ 14.249512] ? mempool_double_free_helper+0x184/0x370 [ 14.249540] ? mempool_double_free_helper+0x184/0x370 [ 14.249563] __kasan_mempool_poison_pages+0x115/0x130 [ 14.249588] mempool_free+0x290/0x380 [ 14.249613] mempool_double_free_helper+0x184/0x370 [ 14.249638] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.249664] ? __kasan_check_write+0x18/0x20 [ 14.249684] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.249720] ? finish_task_switch.isra.0+0x153/0x700 [ 14.249747] mempool_page_alloc_double_free+0xe8/0x140 [ 14.249772] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.249801] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.249826] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.249852] ? __pfx_read_tsc+0x10/0x10 [ 14.249872] ? ktime_get_ts64+0x86/0x230 [ 14.249896] kunit_try_run_case+0x1a5/0x480 [ 14.249919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.249942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.249966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.249990] ? __kthread_parkme+0x82/0x180 [ 14.250011] ? preempt_count_sub+0x50/0x80 [ 14.250178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.250205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.250231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.250256] kthread+0x337/0x6f0 [ 14.250275] ? trace_preempt_on+0x20/0xc0 [ 14.250299] ? __pfx_kthread+0x10/0x10 [ 14.250320] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.250341] ? calculate_sigpending+0x7b/0xa0 [ 14.250365] ? __pfx_kthread+0x10/0x10 [ 14.250387] ret_from_fork+0x116/0x1d0 [ 14.250406] ? __pfx_kthread+0x10/0x10 [ 14.250426] ret_from_fork_asm+0x1a/0x30 [ 14.250457] </TASK> [ 14.250468] [ 14.258749] The buggy address belongs to the physical page: [ 14.259010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 14.260217] flags: 0x200000000000000(node=0|zone=2) [ 14.260406] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.260880] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.261220] page dumped because: kasan: bad access detected [ 14.261538] [ 14.261636] Memory state around the buggy address: [ 14.261824] ffff888102a43f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.262127] ffff888102a43f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.262457] >ffff888102a44000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.262790] ^ [ 14.263195] ffff888102a44080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.263486] ffff888102a44100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.263766] ================================================================== [ 14.187042] ================================================================== [ 14.187448] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.187692] Free of addr ffff88810291d900 by task kunit_try_catch/252 [ 14.187905] [ 14.187996] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.188039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.188050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.188071] Call Trace: [ 14.188084] <TASK> [ 14.188101] dump_stack_lvl+0x73/0xb0 [ 14.188130] print_report+0xd1/0x650 [ 14.188151] ? __virt_addr_valid+0x1db/0x2d0 [ 14.188176] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.188198] ? mempool_double_free_helper+0x184/0x370 [ 14.188222] kasan_report_invalid_free+0x10a/0x130 [ 14.188246] ? mempool_double_free_helper+0x184/0x370 [ 14.188271] ? mempool_double_free_helper+0x184/0x370 [ 14.188294] ? mempool_double_free_helper+0x184/0x370 [ 14.188323] check_slab_allocation+0x101/0x130 [ 14.188344] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.188367] mempool_free+0x2ec/0x380 [ 14.188394] mempool_double_free_helper+0x184/0x370 [ 14.188417] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.188443] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.188464] ? finish_task_switch.isra.0+0x153/0x700 [ 14.188490] mempool_kmalloc_double_free+0xed/0x140 [ 14.188512] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.188537] ? __kasan_check_write+0x18/0x20 [ 14.188556] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.188577] ? __pfx_mempool_kfree+0x10/0x10 [ 14.188602] ? __pfx_read_tsc+0x10/0x10 [ 14.188622] ? ktime_get_ts64+0x86/0x230 [ 14.188643] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.188669] kunit_try_run_case+0x1a5/0x480 [ 14.188694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.189032] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.189061] ? __kthread_parkme+0x82/0x180 [ 14.189084] ? preempt_count_sub+0x50/0x80 [ 14.189107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.189131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.189326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.189353] kthread+0x337/0x6f0 [ 14.189374] ? trace_preempt_on+0x20/0xc0 [ 14.189399] ? __pfx_kthread+0x10/0x10 [ 14.189628] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.189651] ? calculate_sigpending+0x7b/0xa0 [ 14.189677] ? __pfx_kthread+0x10/0x10 [ 14.189699] ret_from_fork+0x116/0x1d0 [ 14.189732] ? __pfx_kthread+0x10/0x10 [ 14.189752] ret_from_fork_asm+0x1a/0x30 [ 14.189785] </TASK> [ 14.189795] [ 14.204836] Allocated by task 252: [ 14.205001] kasan_save_stack+0x45/0x70 [ 14.205685] kasan_save_track+0x18/0x40 [ 14.206029] kasan_save_alloc_info+0x3b/0x50 [ 14.206587] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.207123] remove_element+0x11e/0x190 [ 14.207401] mempool_alloc_preallocated+0x4d/0x90 [ 14.207840] mempool_double_free_helper+0x8a/0x370 [ 14.208284] mempool_kmalloc_double_free+0xed/0x140 [ 14.208523] kunit_try_run_case+0x1a5/0x480 [ 14.208728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.208963] kthread+0x337/0x6f0 [ 14.209526] ret_from_fork+0x116/0x1d0 [ 14.209845] ret_from_fork_asm+0x1a/0x30 [ 14.210197] [ 14.210301] Freed by task 252: [ 14.210445] kasan_save_stack+0x45/0x70 [ 14.210622] kasan_save_track+0x18/0x40 [ 14.210807] kasan_save_free_info+0x3f/0x60 [ 14.210993] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.211686] mempool_free+0x2ec/0x380 [ 14.212004] mempool_double_free_helper+0x109/0x370 [ 14.212310] mempool_kmalloc_double_free+0xed/0x140 [ 14.212532] kunit_try_run_case+0x1a5/0x480 [ 14.212731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.212959] kthread+0x337/0x6f0 [ 14.213451] ret_from_fork+0x116/0x1d0 [ 14.213838] ret_from_fork_asm+0x1a/0x30 [ 14.214215] [ 14.214314] The buggy address belongs to the object at ffff88810291d900 [ 14.214314] which belongs to the cache kmalloc-128 of size 128 [ 14.214819] The buggy address is located 0 bytes inside of [ 14.214819] 128-byte region [ffff88810291d900, ffff88810291d980) [ 14.215770] [ 14.216012] The buggy address belongs to the physical page: [ 14.216567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291d [ 14.217287] flags: 0x200000000000000(node=0|zone=2) [ 14.217647] page_type: f5(slab) [ 14.217841] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.218555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.218881] page dumped because: kasan: bad access detected [ 14.219557] [ 14.219669] Memory state around the buggy address: [ 14.219903] ffff88810291d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.220682] ffff88810291d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.221128] >ffff88810291d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.221427] ^ [ 14.221580] ffff88810291d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.221880] ffff88810291da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.222558] ==================================================================