Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   39.259923] ==================================================================
[   39.260980] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   39.262887] Free of addr fff00000c6c18000 by task kunit_try_catch/228
[   39.263552] 
[   39.263934] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.265015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.265622] Hardware name: linux,dummy-virt (DT)
[   39.266113] Call trace:
[   39.266822]  show_stack+0x20/0x38 (C)
[   39.267516]  dump_stack_lvl+0x8c/0xd0
[   39.268054]  print_report+0x118/0x5e0
[   39.268707]  kasan_report_invalid_free+0xb0/0xd8
[   39.269376]  __kasan_mempool_poison_pages+0xe0/0xe8
[   39.270193]  mempool_free+0x24c/0x328
[   39.270704]  mempool_double_free_helper+0x150/0x2e0
[   39.271392]  mempool_page_alloc_double_free+0xb4/0x110
[   39.272111]  kunit_try_run_case+0x14c/0x3d0
[   39.272677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.273378]  kthread+0x24c/0x2d0
[   39.274017]  ret_from_fork+0x10/0x20
[   39.274663] 
[   39.275333] The buggy address belongs to the physical page:
[   39.276302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18
[   39.277156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.278083] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.279313] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.280501] page dumped because: kasan: bad access detected
[   39.281185] 
[   39.281812] Memory state around the buggy address:
[   39.282730]  fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.283617]  fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.284395] >fff00000c6c18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.285204]                    ^
[   39.285916]  fff00000c6c18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.286538]  fff00000c6c18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.287078] ==================================================================
[   39.216934] ==================================================================
[   39.218660] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   39.219416] Free of addr fff00000c6c18000 by task kunit_try_catch/226
[   39.220053] 
[   39.220501] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.221725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.222278] Hardware name: linux,dummy-virt (DT)
[   39.222952] Call trace:
[   39.223684]  show_stack+0x20/0x38 (C)
[   39.224166]  dump_stack_lvl+0x8c/0xd0
[   39.224754]  print_report+0x118/0x5e0
[   39.225396]  kasan_report_invalid_free+0xb0/0xd8
[   39.225987]  __kasan_mempool_poison_object+0x14c/0x150
[   39.226925]  mempool_free+0x28c/0x328
[   39.227499]  mempool_double_free_helper+0x150/0x2e0
[   39.228189]  mempool_kmalloc_large_double_free+0xb8/0x110
[   39.229425]  kunit_try_run_case+0x14c/0x3d0
[   39.230271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.231103]  kthread+0x24c/0x2d0
[   39.231737]  ret_from_fork+0x10/0x20
[   39.232477] 
[   39.232968] The buggy address belongs to the physical page:
[   39.233972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18
[   39.234607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.235389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.236314] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.236984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.238062] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.238899] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.239547] head: 0bfffe0000000002 ffffc1ffc31b0601 ffffffffffffffff 0000000000000000
[   39.240472] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   39.241235] page dumped because: kasan: bad access detected
[   39.242187] 
[   39.242546] Memory state around the buggy address:
[   39.243200]  fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.243798]  fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.244650] >fff00000c6c18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.245418]                    ^
[   39.246042]  fff00000c6c18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.246991]  fff00000c6c18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.247887] ==================================================================
[   39.156405] ==================================================================
[   39.157419] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   39.158241] Free of addr fff00000c6599a00 by task kunit_try_catch/224
[   39.158917] 
[   39.159263] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.161539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.162365] Hardware name: linux,dummy-virt (DT)
[   39.163424] Call trace:
[   39.163817]  show_stack+0x20/0x38 (C)
[   39.164369]  dump_stack_lvl+0x8c/0xd0
[   39.164948]  print_report+0x118/0x5e0
[   39.165581]  kasan_report_invalid_free+0xb0/0xd8
[   39.166494]  check_slab_allocation+0xd4/0x108
[   39.166891]  __kasan_mempool_poison_object+0x78/0x150
[   39.167600]  mempool_free+0x28c/0x328
[   39.168152]  mempool_double_free_helper+0x150/0x2e0
[   39.168845]  mempool_kmalloc_double_free+0xb8/0x110
[   39.169421]  kunit_try_run_case+0x14c/0x3d0
[   39.170092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.170762]  kthread+0x24c/0x2d0
[   39.171256]  ret_from_fork+0x10/0x20
[   39.171825] 
[   39.172164] Allocated by task 224:
[   39.172692]  kasan_save_stack+0x3c/0x68
[   39.173314]  kasan_save_track+0x20/0x40
[   39.174199]  kasan_save_alloc_info+0x40/0x58
[   39.174704]  __kasan_mempool_unpoison_object+0x11c/0x180
[   39.175465]  remove_element+0x130/0x1f8
[   39.176050]  mempool_alloc_preallocated+0x58/0xc0
[   39.176715]  mempool_double_free_helper+0x94/0x2e0
[   39.177319]  mempool_kmalloc_double_free+0xb8/0x110
[   39.177985]  kunit_try_run_case+0x14c/0x3d0
[   39.178507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.179223]  kthread+0x24c/0x2d0
[   39.179693]  ret_from_fork+0x10/0x20
[   39.180620] 
[   39.181429] Freed by task 224:
[   39.181975]  kasan_save_stack+0x3c/0x68
[   39.182642]  kasan_save_track+0x20/0x40
[   39.183399]  kasan_save_free_info+0x4c/0x78
[   39.184057]  __kasan_mempool_poison_object+0xc0/0x150
[   39.184710]  mempool_free+0x28c/0x328
[   39.185275]  mempool_double_free_helper+0x100/0x2e0
[   39.185912]  mempool_kmalloc_double_free+0xb8/0x110
[   39.186511]  kunit_try_run_case+0x14c/0x3d0
[   39.187053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.188020]  kthread+0x24c/0x2d0
[   39.188610]  ret_from_fork+0x10/0x20
[   39.189117] 
[   39.189476] The buggy address belongs to the object at fff00000c6599a00
[   39.189476]  which belongs to the cache kmalloc-128 of size 128
[   39.191093] The buggy address is located 0 bytes inside of
[   39.191093]  128-byte region [fff00000c6599a00, fff00000c6599a80)
[   39.192232] 
[   39.192603] The buggy address belongs to the physical page:
[   39.193566] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106599
[   39.194426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.195106] page_type: f5(slab)
[   39.195667] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.196510] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   39.197459] page dumped because: kasan: bad access detected
[   39.198203] 
[   39.198539] Memory state around the buggy address:
[   39.199618]  fff00000c6599900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.200706]  fff00000c6599980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.201781] >fff00000c6599a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.202762]                    ^
[   39.203341]  fff00000c6599a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.204129]  fff00000c6599b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.204928] ==================================================================

[   30.835929] ==================================================================
[   30.837570] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   30.838380] Free of addr ffff888102ce8000 by task kunit_try_catch/246
[   30.839787] 
[   30.840215] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   30.841432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.841909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.842930] Call Trace:
[   30.843065]  <TASK>
[   30.843289]  dump_stack_lvl+0x73/0xb0
[   30.844375]  print_report+0xd1/0x640
[   30.845155]  ? __virt_addr_valid+0x1db/0x2d0
[   30.845551]  ? mempool_double_free_helper+0x185/0x370
[   30.846337]  ? kasan_addr_to_slab+0x11/0xa0
[   30.846946]  ? mempool_double_free_helper+0x185/0x370
[   30.847754]  kasan_report_invalid_free+0xc0/0xf0
[   30.848741]  ? mempool_double_free_helper+0x185/0x370
[   30.849224]  ? mempool_double_free_helper+0x185/0x370
[   30.849986]  __kasan_mempool_poison_pages+0x115/0x130
[   30.850804]  mempool_free+0x290/0x380
[   30.851225]  mempool_double_free_helper+0x185/0x370
[   30.852595]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   30.853126]  ? finish_task_switch.isra.0+0x153/0x700
[   30.853985]  mempool_page_alloc_double_free+0xac/0x100
[   30.854888]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   30.855556]  ? __switch_to+0x5d9/0xf60
[   30.856090]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   30.856846]  ? __pfx_mempool_free_pages+0x10/0x10
[   30.857410]  ? __pfx_read_tsc+0x10/0x10
[   30.858151]  ? ktime_get_ts64+0x84/0x230
[   30.858571]  kunit_try_run_case+0x1b3/0x490
[   30.859306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.859855]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.860624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.861172]  ? __kthread_parkme+0x82/0x160
[   30.861996]  ? preempt_count_sub+0x50/0x80
[   30.862656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.863249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.863988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.864928]  kthread+0x257/0x310
[   30.865233]  ? __pfx_kthread+0x10/0x10
[   30.865978]  ret_from_fork+0x41/0x80
[   30.866671]  ? __pfx_kthread+0x10/0x10
[   30.866990]  ret_from_fork_asm+0x1a/0x30
[   30.867531]  </TASK>
[   30.867911] 
[   30.868521] The buggy address belongs to the physical page:
[   30.868921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ce8
[   30.869970] flags: 0x200000000000000(node=0|zone=2)
[   30.871062] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   30.872046] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.872712] page dumped because: kasan: bad access detected
[   30.873483] 
[   30.873672] Memory state around the buggy address:
[   30.874591]  ffff888102ce7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.875416]  ffff888102ce7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.876210] >ffff888102ce8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.877010]                    ^
[   30.877707]  ffff888102ce8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.878071]  ffff888102ce8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.878420] ==================================================================
[   30.792896] ==================================================================
[   30.794203] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   30.794931] Free of addr ffff888102cb0000 by task kunit_try_catch/244
[   30.795537] 
[   30.796717] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   30.797842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.798388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.799422] Call Trace:
[   30.799925]  <TASK>
[   30.800132]  dump_stack_lvl+0x73/0xb0
[   30.800907]  print_report+0xd1/0x640
[   30.801441]  ? __virt_addr_valid+0x1db/0x2d0
[   30.802158]  ? mempool_double_free_helper+0x185/0x370
[   30.802776]  ? kasan_addr_to_slab+0x11/0xa0
[   30.803125]  ? mempool_double_free_helper+0x185/0x370
[   30.803572]  kasan_report_invalid_free+0xc0/0xf0
[   30.804160]  ? mempool_double_free_helper+0x185/0x370
[   30.804662]  ? mempool_double_free_helper+0x185/0x370
[   30.805248]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   30.805790]  mempool_free+0x2ec/0x380
[   30.806120]  mempool_double_free_helper+0x185/0x370
[   30.806707]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   30.807185]  ? finish_task_switch.isra.0+0x153/0x700
[   30.807615]  mempool_kmalloc_large_double_free+0xb1/0x100
[   30.808176]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   30.808594]  ? __switch_to+0x5d9/0xf60
[   30.809128]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.809525]  ? __pfx_mempool_kfree+0x10/0x10
[   30.810076]  ? __pfx_read_tsc+0x10/0x10
[   30.810384]  ? ktime_get_ts64+0x84/0x230
[   30.810893]  kunit_try_run_case+0x1b3/0x490
[   30.811366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.811846]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.812350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.812833]  ? __kthread_parkme+0x82/0x160
[   30.813329]  ? preempt_count_sub+0x50/0x80
[   30.813892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.814255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.814970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.815502]  kthread+0x257/0x310
[   30.815847]  ? __pfx_kthread+0x10/0x10
[   30.816275]  ret_from_fork+0x41/0x80
[   30.816810]  ? __pfx_kthread+0x10/0x10
[   30.817130]  ret_from_fork_asm+0x1a/0x30
[   30.817542]  </TASK>
[   30.817855] 
[   30.818021] The buggy address belongs to the physical page:
[   30.818470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cb0
[   30.819079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.819788] flags: 0x200000000000040(head|node=0|zone=2)
[   30.820388] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.821113] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.821832] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   30.822455] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.823056] head: 0200000000000002 ffffea00040b2c01 ffffffffffffffff 0000000000000000
[   30.823861] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.824403] page dumped because: kasan: bad access detected
[   30.824866] 
[   30.825119] Memory state around the buggy address:
[   30.825656]  ffff888102caff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.826291]  ffff888102caff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.826920] >ffff888102cb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.827550]                    ^
[   30.827915]  ffff888102cb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.828563]  ffff888102cb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.829334] ==================================================================
[   30.725801] ==================================================================
[   30.726744] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   30.727195] Free of addr ffff888101acff00 by task kunit_try_catch/242
[   30.727930] 
[   30.728490] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   30.730430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.730768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.731598] Call Trace:
[   30.732120]  <TASK>
[   30.732320]  dump_stack_lvl+0x73/0xb0
[   30.732842]  print_report+0xd1/0x640
[   30.733247]  ? __virt_addr_valid+0x1db/0x2d0
[   30.733802]  ? mempool_double_free_helper+0x185/0x370
[   30.735040]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.735765]  ? mempool_double_free_helper+0x185/0x370
[   30.736452]  kasan_report_invalid_free+0xc0/0xf0
[   30.737008]  ? mempool_double_free_helper+0x185/0x370
[   30.737832]  ? mempool_double_free_helper+0x185/0x370
[   30.738991]  ? mempool_double_free_helper+0x185/0x370
[   30.740047]  check_slab_allocation+0x101/0x130
[   30.740787]  __kasan_mempool_poison_object+0x91/0x1d0
[   30.741475]  mempool_free+0x2ec/0x380
[   30.741843]  mempool_double_free_helper+0x185/0x370
[   30.742764]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   30.743304]  mempool_kmalloc_double_free+0xb1/0x100
[   30.743858]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   30.744638]  ? __switch_to+0x5d9/0xf60
[   30.745723]  ? __pfx_mempool_kmalloc+0x10/0x10
[   30.746426]  ? __pfx_mempool_kfree+0x10/0x10
[   30.747042]  ? __pfx_read_tsc+0x10/0x10
[   30.748509]  ? ktime_get_ts64+0x84/0x230
[   30.748902]  kunit_try_run_case+0x1b3/0x490
[   30.749606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.750322]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   30.751272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.751790]  ? __kthread_parkme+0x82/0x160
[   30.752231]  ? preempt_count_sub+0x50/0x80
[   30.753302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.753904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.754544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.755878]  kthread+0x257/0x310
[   30.756165]  ? __pfx_kthread+0x10/0x10
[   30.757250]  ret_from_fork+0x41/0x80
[   30.757823]  ? __pfx_kthread+0x10/0x10
[   30.758264]  ret_from_fork_asm+0x1a/0x30
[   30.758671]  </TASK>
[   30.758972] 
[   30.759121] Allocated by task 242:
[   30.759545]  kasan_save_stack+0x3d/0x60
[   30.760045]  kasan_save_track+0x18/0x40
[   30.760626]  kasan_save_alloc_info+0x3b/0x50
[   30.761383]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   30.762041]  remove_element+0x11e/0x190
[   30.762651]  mempool_alloc_preallocated+0x4d/0x90
[   30.763230]  mempool_double_free_helper+0x8b/0x370
[   30.763844]  mempool_kmalloc_double_free+0xb1/0x100
[   30.764402]  kunit_try_run_case+0x1b3/0x490
[   30.764898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.765451]  kthread+0x257/0x310
[   30.765888]  ret_from_fork+0x41/0x80
[   30.766524]  ret_from_fork_asm+0x1a/0x30
[   30.767054] 
[   30.767360] Freed by task 242:
[   30.767603]  kasan_save_stack+0x3d/0x60
[   30.768191]  kasan_save_track+0x18/0x40
[   30.768542]  kasan_save_free_info+0x3f/0x60
[   30.768991]  __kasan_mempool_poison_object+0x131/0x1d0
[   30.769353]  mempool_free+0x2ec/0x380
[   30.769841]  mempool_double_free_helper+0x10a/0x370
[   30.770448]  mempool_kmalloc_double_free+0xb1/0x100
[   30.771009]  kunit_try_run_case+0x1b3/0x490
[   30.771648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.772053]  kthread+0x257/0x310
[   30.772908]  ret_from_fork+0x41/0x80
[   30.773498]  ret_from_fork_asm+0x1a/0x30
[   30.773913] 
[   30.774284] The buggy address belongs to the object at ffff888101acff00
[   30.774284]  which belongs to the cache kmalloc-128 of size 128
[   30.775212] The buggy address is located 0 bytes inside of
[   30.775212]  128-byte region [ffff888101acff00, ffff888101acff80)
[   30.776467] 
[   30.776767] The buggy address belongs to the physical page:
[   30.777579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101acf
[   30.778344] flags: 0x200000000000000(node=0|zone=2)
[   30.778726] page_type: f5(slab)
[   30.779143] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   30.779669] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   30.780755] page dumped because: kasan: bad access detected
[   30.781356] 
[   30.781525] Memory state around the buggy address:
[   30.782200]  ffff888101acfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.782759]  ffff888101acfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.783395] >ffff888101acff00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.784473]                    ^
[   30.784823]  ffff888101acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.785526]  ffff888101ad0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.786353] ==================================================================