Date
Nov. 27, 2024, 3:37 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 50.372009] ================================================================== [ 50.372979] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 50.373640] Free of addr fff00000c615a300 by task kunit_try_catch/224 [ 50.374181] [ 50.375700] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.377099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.377622] Hardware name: linux,dummy-virt (DT) [ 50.378074] Call trace: [ 50.378367] show_stack+0x20/0x38 (C) [ 50.379086] dump_stack_lvl+0x8c/0xd0 [ 50.381663] print_report+0x118/0x5e0 [ 50.382234] kasan_report_invalid_free+0xb0/0xd8 [ 50.382938] check_slab_allocation+0xd4/0x108 [ 50.383597] __kasan_mempool_poison_object+0x78/0x150 [ 50.384425] mempool_free+0x28c/0x328 [ 50.385015] mempool_double_free_helper+0x150/0x2e0 [ 50.385927] mempool_kmalloc_double_free+0xb8/0x110 [ 50.387176] kunit_try_run_case+0x14c/0x3d0 [ 50.388101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.388942] kthread+0x24c/0x2d0 [ 50.389856] ret_from_fork+0x10/0x20 [ 50.390405] [ 50.390775] Allocated by task 224: [ 50.391238] kasan_save_stack+0x3c/0x68 [ 50.391990] kasan_save_track+0x20/0x40 [ 50.392585] kasan_save_alloc_info+0x40/0x58 [ 50.393344] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.393976] remove_element+0x130/0x1f8 [ 50.394560] mempool_alloc_preallocated+0x58/0xc0 [ 50.395188] mempool_double_free_helper+0x94/0x2e0 [ 50.396010] mempool_kmalloc_double_free+0xb8/0x110 [ 50.396659] kunit_try_run_case+0x14c/0x3d0 [ 50.397536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.398191] kthread+0x24c/0x2d0 [ 50.398827] ret_from_fork+0x10/0x20 [ 50.399283] [ 50.399924] Freed by task 224: [ 50.400421] kasan_save_stack+0x3c/0x68 [ 50.401402] kasan_save_track+0x20/0x40 [ 50.401947] kasan_save_free_info+0x4c/0x78 [ 50.402574] __kasan_mempool_poison_object+0xc0/0x150 [ 50.403328] mempool_free+0x28c/0x328 [ 50.403865] mempool_double_free_helper+0x100/0x2e0 [ 50.404573] mempool_kmalloc_double_free+0xb8/0x110 [ 50.405553] kunit_try_run_case+0x14c/0x3d0 [ 50.406100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.406817] kthread+0x24c/0x2d0 [ 50.407416] ret_from_fork+0x10/0x20 [ 50.408002] [ 50.408313] The buggy address belongs to the object at fff00000c615a300 [ 50.408313] which belongs to the cache kmalloc-128 of size 128 [ 50.410042] The buggy address is located 0 bytes inside of [ 50.410042] 128-byte region [fff00000c615a300, fff00000c615a380) [ 50.411339] [ 50.411632] The buggy address belongs to the physical page: [ 50.412353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615a [ 50.413582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.414477] page_type: f5(slab) [ 50.414999] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 50.415960] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 50.416835] page dumped because: kasan: bad access detected [ 50.417687] [ 50.418039] Memory state around the buggy address: [ 50.418737] fff00000c615a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.419787] fff00000c615a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.420695] >fff00000c615a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.421849] ^ [ 50.422429] fff00000c615a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.423165] fff00000c615a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.424462] ================================================================== [ 50.435053] ================================================================== [ 50.436167] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 50.437048] Free of addr fff00000c66e4000 by task kunit_try_catch/226 [ 50.438523] [ 50.438930] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.440038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.440682] Hardware name: linux,dummy-virt (DT) [ 50.441436] Call trace: [ 50.441803] show_stack+0x20/0x38 (C) [ 50.442362] dump_stack_lvl+0x8c/0xd0 [ 50.442896] print_report+0x118/0x5e0 [ 50.443834] kasan_report_invalid_free+0xb0/0xd8 [ 50.444526] __kasan_mempool_poison_object+0x14c/0x150 [ 50.445182] mempool_free+0x28c/0x328 [ 50.446093] mempool_double_free_helper+0x150/0x2e0 [ 50.446976] mempool_kmalloc_large_double_free+0xb8/0x110 [ 50.447651] kunit_try_run_case+0x14c/0x3d0 [ 50.448360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.449037] kthread+0x24c/0x2d0 [ 50.449664] ret_from_fork+0x10/0x20 [ 50.450362] [ 50.450723] The buggy address belongs to the physical page: [ 50.451562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 50.452611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.453781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.454877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.455567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.456469] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.457327] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.458612] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 [ 50.459571] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 50.460622] page dumped because: kasan: bad access detected [ 50.461365] [ 50.462097] Memory state around the buggy address: [ 50.462924] fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.463759] fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.464569] >fff00000c66e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.465828] ^ [ 50.466269] fff00000c66e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.467163] fff00000c66e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.468032] ================================================================== [ 50.476842] ================================================================== [ 50.478482] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 50.479846] Free of addr fff00000c6614000 by task kunit_try_catch/228 [ 50.481333] [ 50.482277] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.483886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.484609] Hardware name: linux,dummy-virt (DT) [ 50.485505] Call trace: [ 50.486116] show_stack+0x20/0x38 (C) [ 50.486827] dump_stack_lvl+0x8c/0xd0 [ 50.487129] print_report+0x118/0x5e0 [ 50.487518] kasan_report_invalid_free+0xb0/0xd8 [ 50.488250] __kasan_mempool_poison_pages+0xe0/0xe8 [ 50.489074] mempool_free+0x24c/0x328 [ 50.489933] mempool_double_free_helper+0x150/0x2e0 [ 50.490717] mempool_page_alloc_double_free+0xb4/0x110 [ 50.491579] kunit_try_run_case+0x14c/0x3d0 [ 50.492284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.493109] kthread+0x24c/0x2d0 [ 50.493652] ret_from_fork+0x10/0x20 [ 50.494526] [ 50.495077] The buggy address belongs to the physical page: [ 50.495855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 50.496746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.497911] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.499523] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.500632] page dumped because: kasan: bad access detected [ 50.501348] [ 50.502023] Memory state around the buggy address: [ 50.502599] fff00000c6613f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.503741] fff00000c6613f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.504676] >fff00000c6614000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.506011] ^ [ 50.506556] fff00000c6614080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.507439] fff00000c6614100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.508273] ==================================================================
[ 27.773844] ================================================================== [ 27.775852] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.776665] Free of addr ffff888102cdc000 by task kunit_try_catch/245 [ 27.777210] [ 27.777399] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 27.779642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.780332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.781830] Call Trace: [ 27.782374] <TASK> [ 27.782601] dump_stack_lvl+0x73/0xb0 [ 27.783405] print_report+0xd1/0x640 [ 27.783772] ? __virt_addr_valid+0x1db/0x2d0 [ 27.784612] ? mempool_double_free_helper+0x185/0x370 [ 27.785378] ? kasan_addr_to_slab+0x11/0xa0 [ 27.786015] ? mempool_double_free_helper+0x185/0x370 [ 27.786814] kasan_report_invalid_free+0xc0/0xf0 [ 27.787799] ? mempool_double_free_helper+0x185/0x370 [ 27.788788] ? mempool_double_free_helper+0x185/0x370 [ 27.789415] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 27.790371] mempool_free+0x2ec/0x380 [ 27.790782] mempool_double_free_helper+0x185/0x370 [ 27.791807] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.792698] ? finish_task_switch.isra.0+0x153/0x700 [ 27.793701] mempool_kmalloc_large_double_free+0xb1/0x100 [ 27.794511] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 27.795308] ? __switch_to+0x5d9/0xf60 [ 27.795736] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.796122] ? __pfx_mempool_kfree+0x10/0x10 [ 27.796713] ? __pfx_read_tsc+0x10/0x10 [ 27.797065] ? ktime_get_ts64+0x84/0x230 [ 27.797476] kunit_try_run_case+0x1b3/0x490 [ 27.798425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.799047] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.799555] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.800460] ? __kthread_parkme+0x82/0x160 [ 27.801085] ? preempt_count_sub+0x50/0x80 [ 27.801548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.802227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.802893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.803577] kthread+0x257/0x310 [ 27.804086] ? __pfx_kthread+0x10/0x10 [ 27.804862] ret_from_fork+0x41/0x80 [ 27.805854] ? __pfx_kthread+0x10/0x10 [ 27.806570] ret_from_fork_asm+0x1a/0x30 [ 27.807119] </TASK> [ 27.807710] [ 27.807908] The buggy address belongs to the physical page: [ 27.808609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cdc [ 27.809719] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.810848] flags: 0x200000000000040(head|node=0|zone=2) [ 27.811619] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.812565] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.813454] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.814173] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.814892] head: 0200000000000002 ffffea00040b3701 ffffffffffffffff 0000000000000000 [ 27.815719] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.816625] page dumped because: kasan: bad access detected [ 27.817181] [ 27.817471] Memory state around the buggy address: [ 27.818038] ffff888102cdbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.818878] ffff888102cdbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.819512] >ffff888102cdc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.820324] ^ [ 27.820765] ffff888102cdc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.821711] ffff888102cdc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.822764] ================================================================== [ 27.828596] ================================================================== [ 27.829849] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.831304] Free of addr ffff888102c6c000 by task kunit_try_catch/247 [ 27.832490] [ 27.832773] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 27.833903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.834649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.836323] Call Trace: [ 27.836773] <TASK> [ 27.837012] dump_stack_lvl+0x73/0xb0 [ 27.838041] print_report+0xd1/0x640 [ 27.838447] ? __virt_addr_valid+0x1db/0x2d0 [ 27.839085] ? mempool_double_free_helper+0x185/0x370 [ 27.839615] ? kasan_addr_to_slab+0x11/0xa0 [ 27.840454] ? mempool_double_free_helper+0x185/0x370 [ 27.841244] kasan_report_invalid_free+0xc0/0xf0 [ 27.841728] ? mempool_double_free_helper+0x185/0x370 [ 27.842732] ? mempool_double_free_helper+0x185/0x370 [ 27.843277] __kasan_mempool_poison_pages+0x115/0x130 [ 27.843539] mempool_free+0x290/0x380 [ 27.843731] mempool_double_free_helper+0x185/0x370 [ 27.844062] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.845391] ? finish_task_switch.isra.0+0x153/0x700 [ 27.846767] mempool_page_alloc_double_free+0xac/0x100 [ 27.847471] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 27.848350] ? __switch_to+0x5d9/0xf60 [ 27.848904] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 27.849424] ? __pfx_mempool_free_pages+0x10/0x10 [ 27.849651] ? __pfx_read_tsc+0x10/0x10 [ 27.849833] ? ktime_get_ts64+0x84/0x230 [ 27.850208] kunit_try_run_case+0x1b3/0x490 [ 27.851001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.852170] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.852740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.853215] ? __kthread_parkme+0x82/0x160 [ 27.853836] ? preempt_count_sub+0x50/0x80 [ 27.854572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.855123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.855961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.856671] kthread+0x257/0x310 [ 27.857120] ? __pfx_kthread+0x10/0x10 [ 27.858000] ret_from_fork+0x41/0x80 [ 27.858671] ? __pfx_kthread+0x10/0x10 [ 27.859295] ret_from_fork_asm+0x1a/0x30 [ 27.859670] </TASK> [ 27.860122] [ 27.860363] The buggy address belongs to the physical page: [ 27.860769] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c6c [ 27.861448] flags: 0x200000000000000(node=0|zone=2) [ 27.862384] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 27.863049] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.863781] page dumped because: kasan: bad access detected [ 27.864443] [ 27.864961] Memory state around the buggy address: [ 27.865442] ffff888102c6bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.866445] ffff888102c6bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.867191] >ffff888102c6c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.868145] ^ [ 27.868480] ffff888102c6c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.869347] ffff888102c6c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.870484] ================================================================== [ 27.699324] ================================================================== [ 27.700517] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 27.702098] Free of addr ffff888101ab3800 by task kunit_try_catch/243 [ 27.703342] [ 27.703550] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 27.705035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.705416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.706279] Call Trace: [ 27.707306] <TASK> [ 27.707802] dump_stack_lvl+0x73/0xb0 [ 27.708486] print_report+0xd1/0x640 [ 27.708917] ? __virt_addr_valid+0x1db/0x2d0 [ 27.709669] ? mempool_double_free_helper+0x185/0x370 [ 27.710499] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.711553] ? mempool_double_free_helper+0x185/0x370 [ 27.712542] kasan_report_invalid_free+0xc0/0xf0 [ 27.713125] ? mempool_double_free_helper+0x185/0x370 [ 27.713573] ? mempool_double_free_helper+0x185/0x370 [ 27.714052] ? mempool_double_free_helper+0x185/0x370 [ 27.715410] check_slab_allocation+0x101/0x130 [ 27.715795] __kasan_mempool_poison_object+0x91/0x1d0 [ 27.716381] mempool_free+0x2ec/0x380 [ 27.716790] mempool_double_free_helper+0x185/0x370 [ 27.717840] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 27.719044] ? finish_task_switch.isra.0+0x153/0x700 [ 27.719560] mempool_kmalloc_double_free+0xb1/0x100 [ 27.719789] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 27.720622] ? __switch_to+0x5d9/0xf60 [ 27.720916] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.721599] ? __pfx_mempool_kfree+0x10/0x10 [ 27.722361] ? __pfx_read_tsc+0x10/0x10 [ 27.722868] ? ktime_get_ts64+0x84/0x230 [ 27.723685] kunit_try_run_case+0x1b3/0x490 [ 27.724467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.725182] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.725660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.726299] ? __kthread_parkme+0x82/0x160 [ 27.726789] ? preempt_count_sub+0x50/0x80 [ 27.727355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.727726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.728713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.729524] kthread+0x257/0x310 [ 27.729882] ? __pfx_kthread+0x10/0x10 [ 27.730745] ret_from_fork+0x41/0x80 [ 27.731473] ? __pfx_kthread+0x10/0x10 [ 27.731873] ret_from_fork_asm+0x1a/0x30 [ 27.732551] </TASK> [ 27.732852] [ 27.733418] Allocated by task 243: [ 27.733766] kasan_save_stack+0x3d/0x60 [ 27.734756] kasan_save_track+0x18/0x40 [ 27.735734] kasan_save_alloc_info+0x3b/0x50 [ 27.736366] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.736906] remove_element+0x11e/0x190 [ 27.737514] mempool_alloc_preallocated+0x4d/0x90 [ 27.738620] mempool_double_free_helper+0x8b/0x370 [ 27.739041] mempool_kmalloc_double_free+0xb1/0x100 [ 27.739585] kunit_try_run_case+0x1b3/0x490 [ 27.740002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.740473] kthread+0x257/0x310 [ 27.740793] ret_from_fork+0x41/0x80 [ 27.741654] ret_from_fork_asm+0x1a/0x30 [ 27.741927] [ 27.742177] Freed by task 243: [ 27.743300] kasan_save_stack+0x3d/0x60 [ 27.743799] kasan_save_track+0x18/0x40 [ 27.744436] kasan_save_free_info+0x3f/0x60 [ 27.745183] __kasan_mempool_poison_object+0x131/0x1d0 [ 27.745591] mempool_free+0x2ec/0x380 [ 27.746509] mempool_double_free_helper+0x10a/0x370 [ 27.746927] mempool_kmalloc_double_free+0xb1/0x100 [ 27.747547] kunit_try_run_case+0x1b3/0x490 [ 27.747966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.749080] kthread+0x257/0x310 [ 27.749390] ret_from_fork+0x41/0x80 [ 27.749670] ret_from_fork_asm+0x1a/0x30 [ 27.750524] [ 27.750767] The buggy address belongs to the object at ffff888101ab3800 [ 27.750767] which belongs to the cache kmalloc-128 of size 128 [ 27.752563] The buggy address is located 0 bytes inside of [ 27.752563] 128-byte region [ffff888101ab3800, ffff888101ab3880) [ 27.753916] [ 27.754253] The buggy address belongs to the physical page: [ 27.754845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab3 [ 27.756544] flags: 0x200000000000000(node=0|zone=2) [ 27.756962] page_type: f5(slab) [ 27.757479] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.759205] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.759800] page dumped because: kasan: bad access detected [ 27.760542] [ 27.760858] Memory state around the buggy address: [ 27.761284] ffff888101ab3700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.762745] ffff888101ab3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.763679] >ffff888101ab3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.764656] ^ [ 27.765097] ffff888101ab3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.765681] ffff888101ab3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.766801] ==================================================================