Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.789866] ================================================================== [ 33.791291] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.792232] Free of addr fff00000c6087400 by task kunit_try_catch/224 [ 33.793728] [ 33.794156] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.795840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.797017] Hardware name: linux,dummy-virt (DT) [ 33.797743] Call trace: [ 33.798283] show_stack+0x20/0x38 (C) [ 33.798994] dump_stack_lvl+0x8c/0xd0 [ 33.799646] print_report+0x118/0x5e0 [ 33.800163] kasan_report_invalid_free+0xb0/0xd8 [ 33.801212] check_slab_allocation+0xd4/0x108 [ 33.801926] __kasan_mempool_poison_object+0x78/0x150 [ 33.802522] mempool_free+0x28c/0x328 [ 33.803157] mempool_double_free_helper+0x150/0x2e0 [ 33.803722] mempool_kmalloc_double_free+0xb8/0x110 [ 33.804960] kunit_try_run_case+0x14c/0x3d0 [ 33.805570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.806376] kthread+0x24c/0x2d0 [ 33.806934] ret_from_fork+0x10/0x20 [ 33.807502] [ 33.807824] Allocated by task 224: [ 33.809527] kasan_save_stack+0x3c/0x68 [ 33.810067] kasan_save_track+0x20/0x40 [ 33.810635] kasan_save_alloc_info+0x40/0x58 [ 33.811345] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.811987] remove_element+0x130/0x1f8 [ 33.812939] mempool_alloc_preallocated+0x58/0xc0 [ 33.813604] mempool_double_free_helper+0x94/0x2e0 [ 33.814401] mempool_kmalloc_double_free+0xb8/0x110 [ 33.815186] kunit_try_run_case+0x14c/0x3d0 [ 33.815739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.816800] kthread+0x24c/0x2d0 [ 33.817278] ret_from_fork+0x10/0x20 [ 33.817774] [ 33.818311] Freed by task 224: [ 33.818875] kasan_save_stack+0x3c/0x68 [ 33.819437] kasan_save_track+0x20/0x40 [ 33.819952] kasan_save_free_info+0x4c/0x78 [ 33.820963] __kasan_mempool_poison_object+0xc0/0x150 [ 33.821520] mempool_free+0x28c/0x328 [ 33.822016] mempool_double_free_helper+0x100/0x2e0 [ 33.822601] mempool_kmalloc_double_free+0xb8/0x110 [ 33.823180] kunit_try_run_case+0x14c/0x3d0 [ 33.823693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.825706] kthread+0x24c/0x2d0 [ 33.826127] ret_from_fork+0x10/0x20 [ 33.826587] [ 33.827020] The buggy address belongs to the object at fff00000c6087400 [ 33.827020] which belongs to the cache kmalloc-128 of size 128 [ 33.828392] The buggy address is located 0 bytes inside of [ 33.828392] 128-byte region [fff00000c6087400, fff00000c6087480) [ 33.830199] [ 33.830576] The buggy address belongs to the physical page: [ 33.831463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106087 [ 33.832520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.833131] page_type: f5(slab) [ 33.833534] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.834743] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.835539] page dumped because: kasan: bad access detected [ 33.836836] [ 33.837354] Memory state around the buggy address: [ 33.838112] fff00000c6087300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.839117] fff00000c6087380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840131] >fff00000c6087400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.841173] ^ [ 33.841562] fff00000c6087480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.842419] fff00000c6087500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.843754] ================================================================== [ 33.854859] ================================================================== [ 33.856280] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.857686] Free of addr fff00000c65b8000 by task kunit_try_catch/226 [ 33.858246] [ 33.858660] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.860922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.861428] Hardware name: linux,dummy-virt (DT) [ 33.862246] Call trace: [ 33.862860] show_stack+0x20/0x38 (C) [ 33.863648] dump_stack_lvl+0x8c/0xd0 [ 33.864450] print_report+0x118/0x5e0 [ 33.865083] kasan_report_invalid_free+0xb0/0xd8 [ 33.865699] __kasan_mempool_poison_object+0x14c/0x150 [ 33.866762] mempool_free+0x28c/0x328 [ 33.867247] mempool_double_free_helper+0x150/0x2e0 [ 33.868083] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.869032] kunit_try_run_case+0x14c/0x3d0 [ 33.869833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.870866] kthread+0x24c/0x2d0 [ 33.871596] ret_from_fork+0x10/0x20 [ 33.872550] [ 33.872922] The buggy address belongs to the physical page: [ 33.874225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8 [ 33.875132] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.876107] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.877171] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.877563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.877965] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.879083] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.880261] head: 0bfffe0000000002 ffffc1ffc3196e01 ffffffffffffffff 0000000000000000 [ 33.881170] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.883035] page dumped because: kasan: bad access detected [ 33.883704] [ 33.884117] Memory state around the buggy address: [ 33.884670] fff00000c65b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.885479] fff00000c65b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.886701] >fff00000c65b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.887546] ^ [ 33.888140] fff00000c65b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.889711] fff00000c65b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.890785] ================================================================== [ 33.904200] ================================================================== [ 33.905451] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.906596] Free of addr fff00000c65b8000 by task kunit_try_catch/228 [ 33.907927] [ 33.908317] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.909632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.910195] Hardware name: linux,dummy-virt (DT) [ 33.911062] Call trace: [ 33.911680] show_stack+0x20/0x38 (C) [ 33.912321] dump_stack_lvl+0x8c/0xd0 [ 33.912850] print_report+0x118/0x5e0 [ 33.913388] kasan_report_invalid_free+0xb0/0xd8 [ 33.914184] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.915144] mempool_free+0x24c/0x328 [ 33.915655] mempool_double_free_helper+0x150/0x2e0 [ 33.916416] mempool_page_alloc_double_free+0xb4/0x110 [ 33.917111] kunit_try_run_case+0x14c/0x3d0 [ 33.917800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.918618] kthread+0x24c/0x2d0 [ 33.919181] ret_from_fork+0x10/0x20 [ 33.919718] [ 33.920108] The buggy address belongs to the physical page: [ 33.920888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8 [ 33.921953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.922694] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.923358] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.924485] page dumped because: kasan: bad access detected [ 33.925148] [ 33.925576] Memory state around the buggy address: [ 33.926261] fff00000c65b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.927042] fff00000c65b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.927956] >fff00000c65b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.928760] ^ [ 33.929275] fff00000c65b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.930163] fff00000c65b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.930966] ==================================================================
[ 33.814687] ================================================================== [ 33.816123] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.816861] Free of addr fff00000c5e7bc00 by task kunit_try_catch/224 [ 33.817566] [ 33.817970] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.820113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.820759] Hardware name: linux,dummy-virt (DT) [ 33.821356] Call trace: [ 33.822061] show_stack+0x20/0x38 (C) [ 33.822663] dump_stack_lvl+0x8c/0xd0 [ 33.823248] print_report+0x118/0x5e0 [ 33.824374] kasan_report_invalid_free+0xb0/0xd8 [ 33.825117] check_slab_allocation+0xd4/0x108 [ 33.826149] __kasan_mempool_poison_object+0x78/0x150 [ 33.826831] mempool_free+0x28c/0x328 [ 33.827323] mempool_double_free_helper+0x150/0x2e0 [ 33.828081] mempool_kmalloc_double_free+0xb8/0x110 [ 33.828811] kunit_try_run_case+0x14c/0x3d0 [ 33.829513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.830372] kthread+0x24c/0x2d0 [ 33.831422] ret_from_fork+0x10/0x20 [ 33.832357] [ 33.832755] Allocated by task 224: [ 33.833301] kasan_save_stack+0x3c/0x68 [ 33.833895] kasan_save_track+0x20/0x40 [ 33.834509] kasan_save_alloc_info+0x40/0x58 [ 33.835622] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.836223] remove_element+0x130/0x1f8 [ 33.836864] mempool_alloc_preallocated+0x58/0xc0 [ 33.837490] mempool_double_free_helper+0x94/0x2e0 [ 33.838081] mempool_kmalloc_double_free+0xb8/0x110 [ 33.838987] kunit_try_run_case+0x14c/0x3d0 [ 33.840393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.841107] kthread+0x24c/0x2d0 [ 33.841594] ret_from_fork+0x10/0x20 [ 33.842609] [ 33.842956] Freed by task 224: [ 33.843427] kasan_save_stack+0x3c/0x68 [ 33.843953] kasan_save_track+0x20/0x40 [ 33.844487] kasan_save_free_info+0x4c/0x78 [ 33.845211] __kasan_mempool_poison_object+0xc0/0x150 [ 33.846268] mempool_free+0x28c/0x328 [ 33.847411] mempool_double_free_helper+0x100/0x2e0 [ 33.848616] mempool_kmalloc_double_free+0xb8/0x110 [ 33.849290] kunit_try_run_case+0x14c/0x3d0 [ 33.850112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.851205] kthread+0x24c/0x2d0 [ 33.851795] ret_from_fork+0x10/0x20 [ 33.852386] [ 33.852780] The buggy address belongs to the object at fff00000c5e7bc00 [ 33.852780] which belongs to the cache kmalloc-128 of size 128 [ 33.854318] The buggy address is located 0 bytes inside of [ 33.854318] 128-byte region [fff00000c5e7bc00, fff00000c5e7bc80) [ 33.856403] [ 33.856814] The buggy address belongs to the physical page: [ 33.857496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7b [ 33.858818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.859737] page_type: f5(slab) [ 33.860321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.861452] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.862610] page dumped because: kasan: bad access detected [ 33.863367] [ 33.863718] Memory state around the buggy address: [ 33.864403] fff00000c5e7bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.865348] fff00000c5e7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.866024] >fff00000c5e7bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.867356] ^ [ 33.867764] fff00000c5e7bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.868850] fff00000c5e7bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.870001] ================================================================== [ 33.882966] ================================================================== [ 33.884217] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.885068] Free of addr fff00000c6630000 by task kunit_try_catch/226 [ 33.885991] [ 33.887430] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.888478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.889084] Hardware name: linux,dummy-virt (DT) [ 33.889862] Call trace: [ 33.890246] show_stack+0x20/0x38 (C) [ 33.890896] dump_stack_lvl+0x8c/0xd0 [ 33.891715] print_report+0x118/0x5e0 [ 33.892307] kasan_report_invalid_free+0xb0/0xd8 [ 33.892978] __kasan_mempool_poison_object+0x14c/0x150 [ 33.893911] mempool_free+0x28c/0x328 [ 33.894446] mempool_double_free_helper+0x150/0x2e0 [ 33.895139] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.895859] kunit_try_run_case+0x14c/0x3d0 [ 33.896580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897277] kthread+0x24c/0x2d0 [ 33.898268] ret_from_fork+0x10/0x20 [ 33.898866] [ 33.899229] The buggy address belongs to the physical page: [ 33.899849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630 [ 33.900829] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.901701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.903051] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.904635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.905612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.906832] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.907760] head: 0bfffe0000000002 ffffc1ffc3198c01 ffffffffffffffff 0000000000000000 [ 33.908700] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.909503] page dumped because: kasan: bad access detected [ 33.910368] [ 33.910757] Memory state around the buggy address: [ 33.911285] fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.912502] fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.913373] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.914447] ^ [ 33.914939] fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.915855] fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.916728] ================================================================== [ 33.929269] ================================================================== [ 33.930953] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.931989] Free of addr fff00000c6630000 by task kunit_try_catch/228 [ 33.932969] [ 33.933411] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.934781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.935620] Hardware name: linux,dummy-virt (DT) [ 33.936328] Call trace: [ 33.936853] show_stack+0x20/0x38 (C) [ 33.937508] dump_stack_lvl+0x8c/0xd0 [ 33.938376] print_report+0x118/0x5e0 [ 33.938979] kasan_report_invalid_free+0xb0/0xd8 [ 33.939654] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.940327] mempool_free+0x24c/0x328 [ 33.940953] mempool_double_free_helper+0x150/0x2e0 [ 33.941581] mempool_page_alloc_double_free+0xb4/0x110 [ 33.942743] kunit_try_run_case+0x14c/0x3d0 [ 33.943305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.944097] kthread+0x24c/0x2d0 [ 33.944721] ret_from_fork+0x10/0x20 [ 33.945299] [ 33.945651] The buggy address belongs to the physical page: [ 33.946654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630 [ 33.947461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.948402] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.949254] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.950712] page dumped because: kasan: bad access detected [ 33.951916] [ 33.952313] Memory state around the buggy address: [ 33.953130] fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.954546] fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.955410] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.956263] ^ [ 33.956761] fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.957911] fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.958887] ==================================================================
[ 27.994389] ================================================================== [ 27.995154] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.995154] Free of addr ffff888102b24000 by task kunit_try_catch/246 [ 27.995154] [ 27.995154] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.995154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.995154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.995154] Call Trace: [ 27.995154] <TASK> [ 27.995154] dump_stack_lvl+0x73/0xb0 [ 27.995154] print_report+0xd1/0x640 [ 27.995154] ? __virt_addr_valid+0x1db/0x2d0 [ 27.995154] ? mempool_double_free_helper+0x185/0x370 [ 27.995154] ? kasan_addr_to_slab+0x11/0xa0 [ 27.995154] ? mempool_double_free_helper+0x185/0x370 [ 27.995154] kasan_report_invalid_free+0xc0/0xf0 [ 27.995154] ? mempool_double_free_helper+0x185/0x370 [ 27.995154] ? mempool_double_free_helper+0x185/0x370 [ 27.995154] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 27.995154] mempool_free+0x2ec/0x380 [ 27.995154] mempool_double_free_helper+0x185/0x370 [ 27.995154] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.995154] mempool_kmalloc_large_double_free+0xb1/0x100 [ 27.995154] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 27.995154] ? __switch_to+0x5d9/0xf60 [ 27.995154] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.995154] ? __pfx_mempool_kfree+0x10/0x10 [ 27.995154] ? ktime_get_ts64+0x84/0x230 [ 27.995154] kunit_try_run_case+0x1b3/0x490 [ 27.995154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.995154] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.995154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.995154] ? __kthread_parkme+0x82/0x160 [ 27.995154] ? preempt_count_sub+0x50/0x80 [ 27.995154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.995154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.995154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.995154] kthread+0x257/0x310 [ 27.995154] ? __pfx_kthread+0x10/0x10 [ 27.995154] ret_from_fork+0x41/0x80 [ 27.995154] ? __pfx_kthread+0x10/0x10 [ 27.995154] ret_from_fork_asm+0x1a/0x30 [ 27.995154] </TASK> [ 27.995154] [ 27.995154] The buggy address belongs to the physical page: [ 27.995154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b24 [ 27.995154] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.995154] flags: 0x200000000000040(head|node=0|zone=2) [ 27.995154] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.995154] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.995154] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.995154] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.995154] head: 0200000000000002 ffffea00040ac901 ffffffffffffffff 0000000000000000 [ 27.995154] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.995154] page dumped because: kasan: bad access detected [ 27.995154] [ 27.995154] Memory state around the buggy address: [ 27.995154] ffff888102b23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.995154] ffff888102b23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.995154] >ffff888102b24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.995154] ^ [ 27.995154] ffff888102b24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.995154] ffff888102b24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.995154] ================================================================== [ 28.041822] ================================================================== [ 28.042248] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 28.042248] Free of addr ffff888102b9c000 by task kunit_try_catch/248 [ 28.042248] [ 28.042248] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.042248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.042248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.042248] Call Trace: [ 28.047960] <TASK> [ 28.047960] dump_stack_lvl+0x73/0xb0 [ 28.047960] print_report+0xd1/0x640 [ 28.047960] ? __virt_addr_valid+0x1db/0x2d0 [ 28.047960] ? mempool_double_free_helper+0x185/0x370 [ 28.047960] ? kasan_addr_to_slab+0x11/0xa0 [ 28.047960] ? mempool_double_free_helper+0x185/0x370 [ 28.047960] kasan_report_invalid_free+0xc0/0xf0 [ 28.047960] ? mempool_double_free_helper+0x185/0x370 [ 28.047960] ? mempool_double_free_helper+0x185/0x370 [ 28.047960] __kasan_mempool_poison_pages+0x115/0x130 [ 28.047960] mempool_free+0x290/0x380 [ 28.047960] mempool_double_free_helper+0x185/0x370 [ 28.047960] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 28.047960] ? read_hpet+0x1f0/0x230 [ 28.047960] ? ktime_get_ts64+0x84/0x230 [ 28.047960] ? trace_hardirqs_on+0x37/0xe0 [ 28.047960] mempool_page_alloc_double_free+0xac/0x100 [ 28.047960] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 28.047960] ? __switch_to+0x5d9/0xf60 [ 28.047960] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 28.047960] ? __pfx_mempool_free_pages+0x10/0x10 [ 28.047960] ? ktime_get_ts64+0x84/0x230 [ 28.047960] kunit_try_run_case+0x1b3/0x490 [ 28.047960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.047960] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.047960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.047960] ? __kthread_parkme+0x82/0x160 [ 28.047960] ? preempt_count_sub+0x50/0x80 [ 28.047960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.047960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.047960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.047960] kthread+0x257/0x310 [ 28.047960] ? __pfx_kthread+0x10/0x10 [ 28.047960] ret_from_fork+0x41/0x80 [ 28.047960] ? __pfx_kthread+0x10/0x10 [ 28.047960] ret_from_fork_asm+0x1a/0x30 [ 28.047960] </TASK> [ 28.047960] [ 28.047960] The buggy address belongs to the physical page: [ 28.047960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b9c [ 28.047960] flags: 0x200000000000000(node=0|zone=2) [ 28.047960] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.047960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.047960] page dumped because: kasan: bad access detected [ 28.047960] [ 28.047960] Memory state around the buggy address: [ 28.047960] ffff888102b9bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.047960] ffff888102b9bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.047960] >ffff888102b9c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.047960] ^ [ 28.047960] ffff888102b9c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.047960] ffff888102b9c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.047960] ================================================================== [ 27.924522] ================================================================== [ 27.925187] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.925187] Free of addr ffff8881028f1100 by task kunit_try_catch/244 [ 27.925187] [ 27.925187] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.925187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.925187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.925187] Call Trace: [ 27.925187] <TASK> [ 27.925187] dump_stack_lvl+0x73/0xb0 [ 27.925187] print_report+0xd1/0x640 [ 27.925187] ? __virt_addr_valid+0x1db/0x2d0 [ 27.925187] ? mempool_double_free_helper+0x185/0x370 [ 27.925187] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.925187] ? mempool_double_free_helper+0x185/0x370 [ 27.925187] kasan_report_invalid_free+0xc0/0xf0 [ 27.925187] ? mempool_double_free_helper+0x185/0x370 [ 27.925187] ? mempool_double_free_helper+0x185/0x370 [ 27.925187] ? mempool_double_free_helper+0x185/0x370 [ 27.925187] check_slab_allocation+0x101/0x130 [ 27.925187] __kasan_mempool_poison_object+0x91/0x1d0 [ 27.925187] mempool_free+0x2ec/0x380 [ 27.925187] mempool_double_free_helper+0x185/0x370 [ 27.925187] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.925187] ? ret_from_fork+0x41/0x80 [ 27.925187] ? kthread+0x257/0x310 [ 27.925187] ? ret_from_fork_asm+0x1a/0x30 [ 27.925187] ? ret_from_fork_asm+0x1a/0x30 [ 27.925187] mempool_kmalloc_double_free+0xb1/0x100 [ 27.925187] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 27.925187] ? __switch_to+0x5d9/0xf60 [ 27.925187] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.925187] ? __pfx_mempool_kfree+0x10/0x10 [ 27.925187] ? ktime_get_ts64+0x84/0x230 [ 27.925187] kunit_try_run_case+0x1b3/0x490 [ 27.925187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.925187] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.925187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.925187] ? __kthread_parkme+0x82/0x160 [ 27.925187] ? preempt_count_sub+0x50/0x80 [ 27.925187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.925187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.925187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.925187] kthread+0x257/0x310 [ 27.925187] ? __pfx_kthread+0x10/0x10 [ 27.925187] ret_from_fork+0x41/0x80 [ 27.925187] ? __pfx_kthread+0x10/0x10 [ 27.925187] ret_from_fork_asm+0x1a/0x30 [ 27.925187] </TASK> [ 27.925187] [ 27.925187] Allocated by task 244: [ 27.925187] kasan_save_stack+0x3d/0x60 [ 27.925187] kasan_save_track+0x18/0x40 [ 27.925187] kasan_save_alloc_info+0x3b/0x50 [ 27.925187] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.925187] remove_element+0x11e/0x190 [ 27.925187] mempool_alloc_preallocated+0x4d/0x90 [ 27.925187] mempool_double_free_helper+0x8b/0x370 [ 27.925187] mempool_kmalloc_double_free+0xb1/0x100 [ 27.925187] kunit_try_run_case+0x1b3/0x490 [ 27.925187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.925187] kthread+0x257/0x310 [ 27.925187] ret_from_fork+0x41/0x80 [ 27.925187] ret_from_fork_asm+0x1a/0x30 [ 27.925187] [ 27.925187] Freed by task 244: [ 27.925187] kasan_save_stack+0x3d/0x60 [ 27.925187] kasan_save_track+0x18/0x40 [ 27.925187] kasan_save_free_info+0x3f/0x60 [ 27.925187] __kasan_mempool_poison_object+0x131/0x1d0 [ 27.925187] mempool_free+0x2ec/0x380 [ 27.925187] mempool_double_free_helper+0x10a/0x370 [ 27.925187] mempool_kmalloc_double_free+0xb1/0x100 [ 27.925187] kunit_try_run_case+0x1b3/0x490 [ 27.925187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.925187] kthread+0x257/0x310 [ 27.925187] ret_from_fork+0x41/0x80 [ 27.925187] ret_from_fork_asm+0x1a/0x30 [ 27.925187] [ 27.925187] The buggy address belongs to the object at ffff8881028f1100 [ 27.925187] which belongs to the cache kmalloc-128 of size 128 [ 27.925187] The buggy address is located 0 bytes inside of [ 27.925187] 128-byte region [ffff8881028f1100, ffff8881028f1180) [ 27.925187] [ 27.925187] The buggy address belongs to the physical page: [ 27.925187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f1 [ 27.925187] flags: 0x200000000000000(node=0|zone=2) [ 27.925187] page_type: f5(slab) [ 27.925187] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.925187] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.925187] page dumped because: kasan: bad access detected [ 27.925187] [ 27.925187] Memory state around the buggy address: [ 27.925187] ffff8881028f1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.925187] ffff8881028f1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.925187] >ffff8881028f1100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.925187] ^ [ 27.925187] ffff8881028f1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.925187] ffff8881028f1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.925187] ==================================================================
[ 22.921870] ================================================================== [ 22.922810] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 22.924024] Free of addr ffff888102a30000 by task kunit_try_catch/244 [ 22.924647] [ 22.924842] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 22.926195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.926873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.928254] Call Trace: [ 22.928504] <TASK> [ 22.928879] dump_stack_lvl+0x73/0xb0 [ 22.929298] print_report+0xd1/0x640 [ 22.929923] ? __virt_addr_valid+0x1db/0x2d0 [ 22.931002] ? mempool_double_free_helper+0x185/0x370 [ 22.931514] ? kasan_addr_to_slab+0x11/0xa0 [ 22.932010] ? mempool_double_free_helper+0x185/0x370 [ 22.932713] kasan_report_invalid_free+0xc0/0xf0 [ 22.933473] ? mempool_double_free_helper+0x185/0x370 [ 22.933889] ? mempool_double_free_helper+0x185/0x370 [ 22.934716] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 22.935159] mempool_free+0x2ec/0x380 [ 22.936506] mempool_double_free_helper+0x185/0x370 [ 22.937025] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 22.937625] ? finish_task_switch.isra.0+0x153/0x700 [ 22.938382] mempool_kmalloc_large_double_free+0xb1/0x100 [ 22.939249] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 22.939952] ? __switch_to+0x5d9/0xf60 [ 22.940366] ? __pfx_mempool_kmalloc+0x10/0x10 [ 22.941371] ? __pfx_mempool_kfree+0x10/0x10 [ 22.941800] ? __pfx_read_tsc+0x10/0x10 [ 22.942570] ? ktime_get_ts64+0x84/0x230 [ 22.943434] kunit_try_run_case+0x1b3/0x490 [ 22.944171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.945404] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.946463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.946950] ? __kthread_parkme+0x82/0x160 [ 22.947563] ? preempt_count_sub+0x50/0x80 [ 22.948069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.948861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.949442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.949942] kthread+0x257/0x310 [ 22.950305] ? __pfx_kthread+0x10/0x10 [ 22.951813] ret_from_fork+0x41/0x80 [ 22.952273] ? __pfx_kthread+0x10/0x10 [ 22.952577] ret_from_fork_asm+0x1a/0x30 [ 22.953754] </TASK> [ 22.954178] [ 22.954660] The buggy address belongs to the physical page: [ 22.955406] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30 [ 22.956659] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.957559] flags: 0x200000000000040(head|node=0|zone=2) [ 22.958847] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.959332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.960007] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.960811] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.961502] head: 0200000000000002 ffffea00040a8c01 ffffffffffffffff 0000000000000000 [ 22.962061] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 22.963506] page dumped because: kasan: bad access detected [ 22.964558] [ 22.964761] Memory state around the buggy address: [ 22.965070] ffff888102a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.966335] ffff888102a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.967187] >ffff888102a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.967809] ^ [ 22.968115] ffff888102a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.969517] ffff888102a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.970132] ================================================================== [ 22.977735] ================================================================== [ 22.978562] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 22.979406] Free of addr ffff888102ad8000 by task kunit_try_catch/246 [ 22.980417] [ 22.980647] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 22.981434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.983032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.983874] Call Trace: [ 22.984244] <TASK> [ 22.984476] dump_stack_lvl+0x73/0xb0 [ 22.985036] print_report+0xd1/0x640 [ 22.985630] ? __virt_addr_valid+0x1db/0x2d0 [ 22.986687] ? mempool_double_free_helper+0x185/0x370 [ 22.987425] ? kasan_addr_to_slab+0x11/0xa0 [ 22.987726] ? mempool_double_free_helper+0x185/0x370 [ 22.988974] kasan_report_invalid_free+0xc0/0xf0 [ 22.989794] ? mempool_double_free_helper+0x185/0x370 [ 22.990503] ? mempool_double_free_helper+0x185/0x370 [ 22.991534] __kasan_mempool_poison_pages+0x115/0x130 [ 22.992370] mempool_free+0x290/0x380 [ 22.993246] mempool_double_free_helper+0x185/0x370 [ 22.993811] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 22.994364] ? finish_task_switch.isra.0+0x153/0x700 [ 22.995390] mempool_page_alloc_double_free+0xac/0x100 [ 22.996541] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 22.997251] ? __switch_to+0x5d9/0xf60 [ 22.998249] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 22.998619] ? __pfx_mempool_free_pages+0x10/0x10 [ 22.999811] ? __pfx_read_tsc+0x10/0x10 [ 23.000173] ? ktime_get_ts64+0x84/0x230 [ 23.001055] kunit_try_run_case+0x1b3/0x490 [ 23.001438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.001967] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.002909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.003453] ? __kthread_parkme+0x82/0x160 [ 23.004043] ? preempt_count_sub+0x50/0x80 [ 23.004626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.004881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.005093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.005326] kthread+0x257/0x310 [ 23.005466] ? __pfx_kthread+0x10/0x10 [ 23.005728] ret_from_fork+0x41/0x80 [ 23.006000] ? __pfx_kthread+0x10/0x10 [ 23.006401] ret_from_fork_asm+0x1a/0x30 [ 23.007068] </TASK> [ 23.007349] [ 23.007647] The buggy address belongs to the physical page: [ 23.008283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad8 [ 23.009109] flags: 0x200000000000000(node=0|zone=2) [ 23.009713] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.010710] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.011246] page dumped because: kasan: bad access detected [ 23.011715] [ 23.011968] Memory state around the buggy address: [ 23.012689] ffff888102ad7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.013118] ffff888102ad7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.013514] >ffff888102ad8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.014250] ^ [ 23.014832] ffff888102ad8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.015836] ffff888102ad8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.016281] ================================================================== [ 22.852925] ================================================================== [ 22.854146] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 22.855129] Free of addr ffff888102ba4b00 by task kunit_try_catch/242 [ 22.856373] [ 22.856637] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 22.857373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.857833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.858422] Call Trace: [ 22.858815] <TASK> [ 22.859103] dump_stack_lvl+0x73/0xb0 [ 22.859665] print_report+0xd1/0x640 [ 22.860510] ? __virt_addr_valid+0x1db/0x2d0 [ 22.860892] ? mempool_double_free_helper+0x185/0x370 [ 22.861446] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.862145] ? mempool_double_free_helper+0x185/0x370 [ 22.862682] kasan_report_invalid_free+0xc0/0xf0 [ 22.863266] ? mempool_double_free_helper+0x185/0x370 [ 22.863884] ? mempool_double_free_helper+0x185/0x370 [ 22.864890] ? mempool_double_free_helper+0x185/0x370 [ 22.865436] check_slab_allocation+0x101/0x130 [ 22.866006] __kasan_mempool_poison_object+0x91/0x1d0 [ 22.866719] mempool_free+0x2ec/0x380 [ 22.867167] mempool_double_free_helper+0x185/0x370 [ 22.867736] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 22.868332] ? finish_task_switch.isra.0+0x153/0x700 [ 22.868891] mempool_kmalloc_double_free+0xb1/0x100 [ 22.871169] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 22.872014] ? __switch_to+0x5d9/0xf60 [ 22.872412] ? __pfx_mempool_kmalloc+0x10/0x10 [ 22.872884] ? __pfx_mempool_kfree+0x10/0x10 [ 22.873269] ? __pfx_read_tsc+0x10/0x10 [ 22.873735] ? ktime_get_ts64+0x84/0x230 [ 22.874155] kunit_try_run_case+0x1b3/0x490 [ 22.874782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.875056] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.875543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.875870] ? __kthread_parkme+0x82/0x160 [ 22.876430] ? preempt_count_sub+0x50/0x80 [ 22.877151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.878361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.878983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.880233] kthread+0x257/0x310 [ 22.880747] ? __pfx_kthread+0x10/0x10 [ 22.881316] ret_from_fork+0x41/0x80 [ 22.882005] ? __pfx_kthread+0x10/0x10 [ 22.882574] ret_from_fork_asm+0x1a/0x30 [ 22.883264] </TASK> [ 22.883668] [ 22.883924] Allocated by task 242: [ 22.884388] kasan_save_stack+0x3d/0x60 [ 22.885247] kasan_save_track+0x18/0x40 [ 22.885766] kasan_save_alloc_info+0x3b/0x50 [ 22.886366] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 22.887003] remove_element+0x11e/0x190 [ 22.887547] mempool_alloc_preallocated+0x4d/0x90 [ 22.888201] mempool_double_free_helper+0x8b/0x370 [ 22.888745] mempool_kmalloc_double_free+0xb1/0x100 [ 22.889345] kunit_try_run_case+0x1b3/0x490 [ 22.889722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.890402] kthread+0x257/0x310 [ 22.891513] ret_from_fork+0x41/0x80 [ 22.891859] ret_from_fork_asm+0x1a/0x30 [ 22.892315] [ 22.892527] Freed by task 242: [ 22.893241] kasan_save_stack+0x3d/0x60 [ 22.893913] kasan_save_track+0x18/0x40 [ 22.894466] kasan_save_free_info+0x3f/0x60 [ 22.895114] __kasan_mempool_poison_object+0x131/0x1d0 [ 22.895999] mempool_free+0x2ec/0x380 [ 22.896354] mempool_double_free_helper+0x10a/0x370 [ 22.897051] mempool_kmalloc_double_free+0xb1/0x100 [ 22.897961] kunit_try_run_case+0x1b3/0x490 [ 22.898363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.899168] kthread+0x257/0x310 [ 22.899665] ret_from_fork+0x41/0x80 [ 22.900379] ret_from_fork_asm+0x1a/0x30 [ 22.900655] [ 22.901395] The buggy address belongs to the object at ffff888102ba4b00 [ 22.901395] which belongs to the cache kmalloc-128 of size 128 [ 22.902303] The buggy address is located 0 bytes inside of [ 22.902303] 128-byte region [ffff888102ba4b00, ffff888102ba4b80) [ 22.902855] [ 22.903065] The buggy address belongs to the physical page: [ 22.904520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba4 [ 22.905563] flags: 0x200000000000000(node=0|zone=2) [ 22.905941] page_type: f5(slab) [ 22.906343] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.907247] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.908110] page dumped because: kasan: bad access detected [ 22.908636] [ 22.909088] Memory state around the buggy address: [ 22.909510] ffff888102ba4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.910691] ffff888102ba4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.911154] >ffff888102ba4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.911877] ^ [ 22.912154] ffff888102ba4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.913441] ffff888102ba4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.913884] ==================================================================