Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.025459] ================================================================== [ 33.026641] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.027961] Free of addr fff00000c58ff200 by task kunit_try_catch/224 [ 33.028984] [ 33.029504] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.030807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.031835] Hardware name: linux,dummy-virt (DT) [ 33.032472] Call trace: [ 33.033155] show_stack+0x20/0x38 (C) [ 33.033759] dump_stack_lvl+0x8c/0xd0 [ 33.034203] print_report+0x118/0x5e0 [ 33.034881] kasan_report_invalid_free+0xb0/0xd8 [ 33.035996] check_slab_allocation+0xd4/0x108 [ 33.036592] __kasan_mempool_poison_object+0x78/0x150 [ 33.036950] mempool_free+0x28c/0x328 [ 33.037238] mempool_double_free_helper+0x150/0x2e0 [ 33.038099] mempool_kmalloc_double_free+0xb8/0x110 [ 33.039369] kunit_try_run_case+0x14c/0x3d0 [ 33.040372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.041553] kthread+0x24c/0x2d0 [ 33.042356] ret_from_fork+0x10/0x20 [ 33.042974] [ 33.043278] Allocated by task 224: [ 33.044175] kasan_save_stack+0x3c/0x68 [ 33.045007] kasan_save_track+0x20/0x40 [ 33.045801] kasan_save_alloc_info+0x40/0x58 [ 33.046516] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.047362] remove_element+0x130/0x1f8 [ 33.048421] mempool_alloc_preallocated+0x58/0xc0 [ 33.049817] mempool_double_free_helper+0x94/0x2e0 [ 33.050212] mempool_kmalloc_double_free+0xb8/0x110 [ 33.051002] kunit_try_run_case+0x14c/0x3d0 [ 33.051985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.052831] kthread+0x24c/0x2d0 [ 33.053548] ret_from_fork+0x10/0x20 [ 33.054115] [ 33.054485] Freed by task 224: [ 33.054913] kasan_save_stack+0x3c/0x68 [ 33.055785] kasan_save_track+0x20/0x40 [ 33.056422] kasan_save_free_info+0x4c/0x78 [ 33.057062] __kasan_mempool_poison_object+0xc0/0x150 [ 33.058458] mempool_free+0x28c/0x328 [ 33.058973] mempool_double_free_helper+0x100/0x2e0 [ 33.059751] mempool_kmalloc_double_free+0xb8/0x110 [ 33.060579] kunit_try_run_case+0x14c/0x3d0 [ 33.061117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.062235] kthread+0x24c/0x2d0 [ 33.062958] ret_from_fork+0x10/0x20 [ 33.063724] [ 33.064084] The buggy address belongs to the object at fff00000c58ff200 [ 33.064084] which belongs to the cache kmalloc-128 of size 128 [ 33.066022] The buggy address is located 0 bytes inside of [ 33.066022] 128-byte region [fff00000c58ff200, fff00000c58ff280) [ 33.068658] [ 33.069048] The buggy address belongs to the physical page: [ 33.069907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ff [ 33.071878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.072617] page_type: f5(slab) [ 33.073187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.074058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.075476] page dumped because: kasan: bad access detected [ 33.076494] [ 33.076867] Memory state around the buggy address: [ 33.077442] fff00000c58ff100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.078390] fff00000c58ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.079591] >fff00000c58ff200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.080865] ^ [ 33.081529] fff00000c58ff280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.082521] fff00000c58ff300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.083563] ================================================================== [ 33.093656] ================================================================== [ 33.094909] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.096132] Free of addr fff00000c65e0000 by task kunit_try_catch/226 [ 33.096850] [ 33.097316] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.098448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.099006] Hardware name: linux,dummy-virt (DT) [ 33.099755] Call trace: [ 33.100100] show_stack+0x20/0x38 (C) [ 33.101020] dump_stack_lvl+0x8c/0xd0 [ 33.101679] print_report+0x118/0x5e0 [ 33.102454] kasan_report_invalid_free+0xb0/0xd8 [ 33.103148] __kasan_mempool_poison_object+0x14c/0x150 [ 33.104017] mempool_free+0x28c/0x328 [ 33.104519] mempool_double_free_helper+0x150/0x2e0 [ 33.105271] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.106008] kunit_try_run_case+0x14c/0x3d0 [ 33.106778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.108080] kthread+0x24c/0x2d0 [ 33.108663] ret_from_fork+0x10/0x20 [ 33.109264] [ 33.109573] The buggy address belongs to the physical page: [ 33.110428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0 [ 33.111500] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.112447] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.113678] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.115283] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.116290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.117226] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.118134] head: 0bfffe0000000002 ffffc1ffc3197801 ffffffffffffffff 0000000000000000 [ 33.119311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.120504] page dumped because: kasan: bad access detected [ 33.121263] [ 33.121640] Memory state around the buggy address: [ 33.122380] fff00000c65dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.123548] fff00000c65dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.124312] >fff00000c65e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.124895] ^ [ 33.125234] fff00000c65e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.125908] fff00000c65e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.127389] ================================================================== [ 33.138743] ================================================================== [ 33.140514] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.141561] Free of addr fff00000c6620000 by task kunit_try_catch/228 [ 33.142837] [ 33.143468] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.144756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.145286] Hardware name: linux,dummy-virt (DT) [ 33.145945] Call trace: [ 33.146354] show_stack+0x20/0x38 (C) [ 33.147060] dump_stack_lvl+0x8c/0xd0 [ 33.147644] print_report+0x118/0x5e0 [ 33.148307] kasan_report_invalid_free+0xb0/0xd8 [ 33.148905] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.150015] mempool_free+0x24c/0x328 [ 33.150701] mempool_double_free_helper+0x150/0x2e0 [ 33.151654] mempool_page_alloc_double_free+0xb4/0x110 [ 33.152385] kunit_try_run_case+0x14c/0x3d0 [ 33.152970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.153754] kthread+0x24c/0x2d0 [ 33.154469] ret_from_fork+0x10/0x20 [ 33.155196] [ 33.155598] The buggy address belongs to the physical page: [ 33.156364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 33.157365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.158231] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.159424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.160873] page dumped because: kasan: bad access detected [ 33.161595] [ 33.161928] Memory state around the buggy address: [ 33.162608] fff00000c661ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.164110] fff00000c661ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.165273] >fff00000c6620000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.166134] ^ [ 33.166744] fff00000c6620080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.167671] fff00000c6620100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.168810] ==================================================================
[ 28.441964] ================================================================== [ 28.443075] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 28.443648] Free of addr ffff888102764000 by task kunit_try_catch/248 [ 28.443996] [ 28.444540] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 28.446145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.446881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.447908] Call Trace: [ 28.448280] <TASK> [ 28.448629] dump_stack_lvl+0x73/0xb0 [ 28.449518] print_report+0xd1/0x640 [ 28.449827] ? __virt_addr_valid+0x1db/0x2d0 [ 28.450436] ? mempool_double_free_helper+0x185/0x370 [ 28.451154] ? kasan_addr_to_slab+0x11/0xa0 [ 28.451587] ? mempool_double_free_helper+0x185/0x370 [ 28.452110] kasan_report_invalid_free+0xc0/0xf0 [ 28.452644] ? mempool_double_free_helper+0x185/0x370 [ 28.453455] ? mempool_double_free_helper+0x185/0x370 [ 28.453778] __kasan_mempool_poison_pages+0x115/0x130 [ 28.454404] mempool_free+0x290/0x380 [ 28.455248] mempool_double_free_helper+0x185/0x370 [ 28.455755] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 28.456659] ? irqentry_exit+0x2a/0x60 [ 28.457010] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.457788] mempool_page_alloc_double_free+0xac/0x100 [ 28.458294] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 28.458984] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 28.459653] ? __pfx_mempool_free_pages+0x10/0x10 [ 28.459986] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 28.460857] kunit_try_run_case+0x1b3/0x490 [ 28.461316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.462022] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.462378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.463281] ? __kthread_parkme+0x82/0x160 [ 28.464014] ? preempt_count_sub+0x50/0x80 [ 28.464492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.465033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.465690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.466249] kthread+0x257/0x310 [ 28.466527] ? __pfx_kthread+0x10/0x10 [ 28.466741] ret_from_fork+0x41/0x80 [ 28.467554] ? __pfx_kthread+0x10/0x10 [ 28.468207] ret_from_fork_asm+0x1a/0x30 [ 28.468950] </TASK> [ 28.469274] [ 28.469865] The buggy address belongs to the physical page: [ 28.470285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102764 [ 28.471455] flags: 0x200000000000000(node=0|zone=2) [ 28.472393] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.472980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.473552] page dumped because: kasan: bad access detected [ 28.473980] [ 28.474180] Memory state around the buggy address: [ 28.474560] ffff888102763f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.475121] ffff888102763f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.476050] >ffff888102764000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.477048] ^ [ 28.477288] ffff888102764080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.478373] ffff888102764100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.479358] ================================================================== [ 28.394715] ================================================================== [ 28.395494] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 28.396339] Free of addr ffff888102ba0000 by task kunit_try_catch/246 [ 28.396940] [ 28.397117] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 28.398108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.398439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.399161] Call Trace: [ 28.399828] <TASK> [ 28.400070] dump_stack_lvl+0x73/0xb0 [ 28.400499] print_report+0xd1/0x640 [ 28.401690] ? __virt_addr_valid+0x1db/0x2d0 [ 28.402111] ? mempool_double_free_helper+0x185/0x370 [ 28.403262] ? kasan_addr_to_slab+0x11/0xa0 [ 28.404014] ? mempool_double_free_helper+0x185/0x370 [ 28.404356] kasan_report_invalid_free+0xc0/0xf0 [ 28.404751] ? mempool_double_free_helper+0x185/0x370 [ 28.405328] ? mempool_double_free_helper+0x185/0x370 [ 28.405662] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 28.406254] mempool_free+0x2ec/0x380 [ 28.406605] mempool_double_free_helper+0x185/0x370 [ 28.407370] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 28.407777] ? finish_task_switch.isra.0+0x153/0x700 [ 28.408426] mempool_kmalloc_large_double_free+0xb1/0x100 [ 28.409512] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 28.410531] ? __switch_to+0x5d9/0xf60 [ 28.411085] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.411613] ? __pfx_mempool_kfree+0x10/0x10 [ 28.412163] ? __pfx_read_tsc+0x10/0x10 [ 28.412386] ? ktime_get_ts64+0x86/0x230 [ 28.413300] kunit_try_run_case+0x1b3/0x490 [ 28.413664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.414546] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.415283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.415788] ? __kthread_parkme+0x82/0x160 [ 28.416242] ? preempt_count_sub+0x50/0x80 [ 28.416626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.417379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.418217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.419044] kthread+0x257/0x310 [ 28.419311] ? __pfx_kthread+0x10/0x10 [ 28.419533] ret_from_fork+0x41/0x80 [ 28.419768] ? __pfx_kthread+0x10/0x10 [ 28.419958] ret_from_fork_asm+0x1a/0x30 [ 28.420317] </TASK> [ 28.420697] [ 28.421091] The buggy address belongs to the physical page: [ 28.421535] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba0 [ 28.422501] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.423218] flags: 0x200000000000040(head|node=0|zone=2) [ 28.423795] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.424702] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.425694] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.426491] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.427485] head: 0200000000000002 ffffea00040ae801 ffffffffffffffff 0000000000000000 [ 28.428099] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 28.428956] page dumped because: kasan: bad access detected [ 28.429585] [ 28.429842] Memory state around the buggy address: [ 28.430409] ffff888102b9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.431466] ffff888102b9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.432250] >ffff888102ba0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.433152] ^ [ 28.433532] ffff888102ba0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.434214] ffff888102ba0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.434696] ================================================================== [ 28.325399] ================================================================== [ 28.326255] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 28.326928] Free of addr ffff888102996000 by task kunit_try_catch/244 [ 28.327393] [ 28.327639] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 28.329044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.329377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.331009] Call Trace: [ 28.331214] <TASK> [ 28.331371] dump_stack_lvl+0x73/0xb0 [ 28.331620] print_report+0xd1/0x640 [ 28.332999] ? __virt_addr_valid+0x1db/0x2d0 [ 28.333422] ? mempool_double_free_helper+0x185/0x370 [ 28.333997] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.335012] ? mempool_double_free_helper+0x185/0x370 [ 28.335293] kasan_report_invalid_free+0xc0/0xf0 [ 28.335536] ? mempool_double_free_helper+0x185/0x370 [ 28.335999] ? mempool_double_free_helper+0x185/0x370 [ 28.337538] ? mempool_double_free_helper+0x185/0x370 [ 28.338202] check_slab_allocation+0x101/0x130 [ 28.338841] __kasan_mempool_poison_object+0x91/0x1d0 [ 28.339131] mempool_free+0x2ec/0x380 [ 28.339353] mempool_double_free_helper+0x185/0x370 [ 28.340104] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 28.340723] ? irqentry_exit+0x2a/0x60 [ 28.341234] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 28.342566] mempool_kmalloc_double_free+0xb1/0x100 [ 28.343427] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 28.344286] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.345114] ? __pfx_mempool_kfree+0x10/0x10 [ 28.345886] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 28.346339] kunit_try_run_case+0x1b3/0x490 [ 28.346763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.347157] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.347597] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.348346] ? __kthread_parkme+0x82/0x160 [ 28.349186] ? preempt_count_sub+0x50/0x80 [ 28.349603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.350224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.350768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.351392] kthread+0x257/0x310 [ 28.351975] ? __pfx_kthread+0x10/0x10 [ 28.352515] ret_from_fork+0x41/0x80 [ 28.353180] ? __pfx_kthread+0x10/0x10 [ 28.353641] ret_from_fork_asm+0x1a/0x30 [ 28.354189] </TASK> [ 28.354599] [ 28.354802] Allocated by task 244: [ 28.355029] kasan_save_stack+0x3d/0x60 [ 28.355590] kasan_save_track+0x18/0x40 [ 28.356155] kasan_save_alloc_info+0x3b/0x50 [ 28.356780] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 28.357244] remove_element+0x11e/0x190 [ 28.357732] mempool_alloc_preallocated+0x4d/0x90 [ 28.358316] mempool_double_free_helper+0x8b/0x370 [ 28.359113] mempool_kmalloc_double_free+0xb1/0x100 [ 28.359706] kunit_try_run_case+0x1b3/0x490 [ 28.360099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.361446] kthread+0x257/0x310 [ 28.362387] ret_from_fork+0x41/0x80 [ 28.363141] ret_from_fork_asm+0x1a/0x30 [ 28.363478] [ 28.363895] Freed by task 244: [ 28.364178] kasan_save_stack+0x3d/0x60 [ 28.364995] kasan_save_track+0x18/0x40 [ 28.365981] kasan_save_free_info+0x3f/0x60 [ 28.366934] __kasan_mempool_poison_object+0x131/0x1d0 [ 28.367291] mempool_free+0x2ec/0x380 [ 28.368178] mempool_double_free_helper+0x10a/0x370 [ 28.368564] mempool_kmalloc_double_free+0xb1/0x100 [ 28.369084] kunit_try_run_case+0x1b3/0x490 [ 28.369313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.370426] kthread+0x257/0x310 [ 28.370783] ret_from_fork+0x41/0x80 [ 28.371217] ret_from_fork_asm+0x1a/0x30 [ 28.371948] [ 28.372297] The buggy address belongs to the object at ffff888102996000 [ 28.372297] which belongs to the cache kmalloc-128 of size 128 [ 28.373910] The buggy address is located 0 bytes inside of [ 28.373910] 128-byte region [ffff888102996000, ffff888102996080) [ 28.375184] [ 28.375494] The buggy address belongs to the physical page: [ 28.376104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102996 [ 28.376786] flags: 0x200000000000000(node=0|zone=2) [ 28.377173] page_type: f5(slab) [ 28.377881] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.379308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.379891] page dumped because: kasan: bad access detected [ 28.380736] [ 28.381017] Memory state around the buggy address: [ 28.381421] ffff888102995f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.381937] ffff888102995f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.382915] >ffff888102996000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.384149] ^ [ 28.384498] ffff888102996080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.385226] ffff888102996100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.386030] ==================================================================