Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.650637] ================================================================== [ 33.651842] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.652538] Free of addr fff00000c69f2600 by task kunit_try_catch/224 [ 33.653340] [ 33.653696] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.654875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.655480] Hardware name: linux,dummy-virt (DT) [ 33.656182] Call trace: [ 33.656625] show_stack+0x20/0x38 (C) [ 33.657152] dump_stack_lvl+0x8c/0xd0 [ 33.657743] print_report+0x118/0x5e0 [ 33.658291] kasan_report_invalid_free+0xb0/0xd8 [ 33.659046] check_slab_allocation+0xd4/0x108 [ 33.659630] __kasan_mempool_poison_object+0x78/0x150 [ 33.660376] mempool_free+0x28c/0x328 [ 33.660936] mempool_double_free_helper+0x150/0x2e0 [ 33.661668] mempool_kmalloc_double_free+0xb8/0x110 [ 33.662417] kunit_try_run_case+0x14c/0x3d0 [ 33.663135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.663837] kthread+0x24c/0x2d0 [ 33.664430] ret_from_fork+0x10/0x20 [ 33.665029] [ 33.665404] Allocated by task 224: [ 33.666013] kasan_save_stack+0x3c/0x68 [ 33.666587] kasan_save_track+0x20/0x40 [ 33.667228] kasan_save_alloc_info+0x40/0x58 [ 33.667880] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.668616] remove_element+0x130/0x1f8 [ 33.669243] mempool_alloc_preallocated+0x58/0xc0 [ 33.669963] mempool_double_free_helper+0x94/0x2e0 [ 33.670608] mempool_kmalloc_double_free+0xb8/0x110 [ 33.671341] kunit_try_run_case+0x14c/0x3d0 [ 33.671877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.672676] kthread+0x24c/0x2d0 [ 33.673139] ret_from_fork+0x10/0x20 [ 33.673761] [ 33.674134] Freed by task 224: [ 33.674659] kasan_save_stack+0x3c/0x68 [ 33.675256] kasan_save_track+0x20/0x40 [ 33.675872] kasan_save_free_info+0x4c/0x78 [ 33.676575] __kasan_mempool_poison_object+0xc0/0x150 [ 33.677325] mempool_free+0x28c/0x328 [ 33.677923] mempool_double_free_helper+0x100/0x2e0 [ 33.678481] mempool_kmalloc_double_free+0xb8/0x110 [ 33.679240] kunit_try_run_case+0x14c/0x3d0 [ 33.679899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.680669] kthread+0x24c/0x2d0 [ 33.681122] ret_from_fork+0x10/0x20 [ 33.681735] [ 33.682117] The buggy address belongs to the object at fff00000c69f2600 [ 33.682117] which belongs to the cache kmalloc-128 of size 128 [ 33.683199] The buggy address is located 0 bytes inside of [ 33.683199] 128-byte region [fff00000c69f2600, fff00000c69f2680) [ 33.684558] [ 33.684885] The buggy address belongs to the physical page: [ 33.685643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069f2 [ 33.686573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.687370] page_type: f5(slab) [ 33.687947] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.688787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.689575] page dumped because: kasan: bad access detected [ 33.690322] [ 33.690711] Memory state around the buggy address: [ 33.691306] fff00000c69f2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.692106] fff00000c69f2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.692924] >fff00000c69f2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.693834] ^ [ 33.694324] fff00000c69f2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.695040] fff00000c69f2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.695964] ================================================================== [ 33.707304] ================================================================== [ 33.708572] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.709276] Free of addr fff00000c6b30000 by task kunit_try_catch/226 [ 33.709931] [ 33.710336] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.711669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.712257] Hardware name: linux,dummy-virt (DT) [ 33.712910] Call trace: [ 33.713473] show_stack+0x20/0x38 (C) [ 33.714490] dump_stack_lvl+0x8c/0xd0 [ 33.715160] print_report+0x118/0x5e0 [ 33.715702] kasan_report_invalid_free+0xb0/0xd8 [ 33.716417] __kasan_mempool_poison_object+0x14c/0x150 [ 33.718873] mempool_free+0x28c/0x328 [ 33.719682] mempool_double_free_helper+0x150/0x2e0 [ 33.720529] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.721349] kunit_try_run_case+0x14c/0x3d0 [ 33.722165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.722964] kthread+0x24c/0x2d0 [ 33.723526] ret_from_fork+0x10/0x20 [ 33.724118] [ 33.724464] The buggy address belongs to the physical page: [ 33.725095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30 [ 33.726818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.727658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.729039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.729869] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.730924] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.731842] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.732911] head: 0bfffe0000000002 ffffc1ffc31acc01 ffffffffffffffff 0000000000000000 [ 33.733837] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.735417] page dumped because: kasan: bad access detected [ 33.736125] [ 33.736564] Memory state around the buggy address: [ 33.737320] fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.738485] fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.739250] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.740205] ^ [ 33.740689] fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.741068] fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.741419] ================================================================== [ 33.752243] ================================================================== [ 33.753528] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.754468] Free of addr fff00000c6b30000 by task kunit_try_catch/228 [ 33.755572] [ 33.756976] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.758065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.758681] Hardware name: linux,dummy-virt (DT) [ 33.759723] Call trace: [ 33.760186] show_stack+0x20/0x38 (C) [ 33.760852] dump_stack_lvl+0x8c/0xd0 [ 33.761548] print_report+0x118/0x5e0 [ 33.762152] kasan_report_invalid_free+0xb0/0xd8 [ 33.763716] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.764440] mempool_free+0x24c/0x328 [ 33.765034] mempool_double_free_helper+0x150/0x2e0 [ 33.765823] mempool_page_alloc_double_free+0xb4/0x110 [ 33.766635] kunit_try_run_case+0x14c/0x3d0 [ 33.767634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.768452] kthread+0x24c/0x2d0 [ 33.769063] ret_from_fork+0x10/0x20 [ 33.769714] [ 33.770086] The buggy address belongs to the physical page: [ 33.771705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30 [ 33.772669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.773474] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.774862] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.775756] page dumped because: kasan: bad access detected [ 33.776450] [ 33.776875] Memory state around the buggy address: [ 33.777441] fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.778904] fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.780164] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.780977] ^ [ 33.781578] fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.782693] fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.783460] ==================================================================
[ 26.555182] ================================================================== [ 26.556771] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 26.557762] Free of addr ffff888102acc000 by task kunit_try_catch/247 [ 26.558748] [ 26.559188] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 26.560656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.561081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.562248] Call Trace: [ 26.562970] <TASK> [ 26.563335] dump_stack_lvl+0x73/0xb0 [ 26.564069] print_report+0xd1/0x640 [ 26.564493] ? __virt_addr_valid+0x1db/0x2d0 [ 26.565736] ? mempool_double_free_helper+0x185/0x370 [ 26.567309] ? kasan_addr_to_slab+0x11/0xa0 [ 26.568261] ? mempool_double_free_helper+0x185/0x370 [ 26.568749] kasan_report_invalid_free+0xc0/0xf0 [ 26.569854] ? mempool_double_free_helper+0x185/0x370 [ 26.570357] ? mempool_double_free_helper+0x185/0x370 [ 26.570873] __kasan_mempool_poison_pages+0x115/0x130 [ 26.571967] mempool_free+0x290/0x380 [ 26.572428] mempool_double_free_helper+0x185/0x370 [ 26.573439] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.574164] mempool_page_alloc_double_free+0xac/0x100 [ 26.575080] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 26.575820] ? __switch_to+0x5d9/0xf60 [ 26.576821] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 26.577280] ? __pfx_mempool_free_pages+0x10/0x10 [ 26.577792] ? __pfx_read_tsc+0x10/0x10 [ 26.578532] ? ktime_get_ts64+0x86/0x230 [ 26.579143] kunit_try_run_case+0x1b3/0x490 [ 26.579718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.580115] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.580817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.581386] ? __kthread_parkme+0x82/0x160 [ 26.582030] ? preempt_count_sub+0x50/0x80 [ 26.582392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.583741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.584510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.585061] kthread+0x257/0x310 [ 26.585427] ? __pfx_kthread+0x10/0x10 [ 26.585808] ret_from_fork+0x41/0x80 [ 26.587168] ? __pfx_kthread+0x10/0x10 [ 26.587946] ret_from_fork_asm+0x1a/0x30 [ 26.588729] </TASK> [ 26.589330] [ 26.589619] The buggy address belongs to the physical page: [ 26.590143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc [ 26.591069] flags: 0x200000000000000(node=0|zone=2) [ 26.591973] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.593178] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.594449] page dumped because: kasan: bad access detected [ 26.595159] [ 26.596076] Memory state around the buggy address: [ 26.596549] ffff888102acbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.597525] ffff888102acbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.599129] >ffff888102acc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.599952] ^ [ 26.600589] ffff888102acc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.601215] ffff888102acc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.602663] ================================================================== [ 26.498604] ================================================================== [ 26.499514] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 26.500007] Free of addr ffff888102acc000 by task kunit_try_catch/245 [ 26.500721] [ 26.501223] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 26.501900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.502992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.504132] Call Trace: [ 26.504432] <TASK> [ 26.505214] dump_stack_lvl+0x73/0xb0 [ 26.505829] print_report+0xd1/0x640 [ 26.506283] ? __virt_addr_valid+0x1db/0x2d0 [ 26.506806] ? mempool_double_free_helper+0x185/0x370 [ 26.507406] ? kasan_addr_to_slab+0x11/0xa0 [ 26.507966] ? mempool_double_free_helper+0x185/0x370 [ 26.508679] kasan_report_invalid_free+0xc0/0xf0 [ 26.509206] ? mempool_double_free_helper+0x185/0x370 [ 26.509657] ? mempool_double_free_helper+0x185/0x370 [ 26.510118] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 26.510675] mempool_free+0x2ec/0x380 [ 26.511226] mempool_double_free_helper+0x185/0x370 [ 26.512745] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.513186] ? finish_task_switch.isra.0+0x153/0x700 [ 26.514190] mempool_kmalloc_large_double_free+0xb1/0x100 [ 26.514975] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 26.515679] ? __switch_to+0x5d9/0xf60 [ 26.516302] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.516852] ? __pfx_mempool_kfree+0x10/0x10 [ 26.517164] ? __pfx_read_tsc+0x10/0x10 [ 26.517689] ? ktime_get_ts64+0x86/0x230 [ 26.518713] kunit_try_run_case+0x1b3/0x490 [ 26.519268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.520176] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.520654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.521135] ? __kthread_parkme+0x82/0x160 [ 26.521545] ? preempt_count_sub+0x50/0x80 [ 26.522701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.523181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.524454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.525247] kthread+0x257/0x310 [ 26.525765] ? __pfx_kthread+0x10/0x10 [ 26.526630] ret_from_fork+0x41/0x80 [ 26.527030] ? __pfx_kthread+0x10/0x10 [ 26.528018] ret_from_fork_asm+0x1a/0x30 [ 26.528555] </TASK> [ 26.528801] [ 26.529007] The buggy address belongs to the physical page: [ 26.529513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc [ 26.531036] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.532000] flags: 0x200000000000040(head|node=0|zone=2) [ 26.532821] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.534153] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.535329] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.536252] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.537892] head: 0200000000000002 ffffea00040ab301 ffffffffffffffff 0000000000000000 [ 26.539475] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.540521] page dumped because: kasan: bad access detected [ 26.541648] [ 26.542124] Memory state around the buggy address: [ 26.542768] ffff888102acbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.544301] ffff888102acbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.544656] >ffff888102acc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.544952] ^ [ 26.545159] ffff888102acc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.545432] ffff888102acc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.545700] ================================================================== [ 26.414204] ================================================================== [ 26.415576] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 26.416220] Free of addr ffff88810292ca00 by task kunit_try_catch/243 [ 26.416760] [ 26.417034] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 26.419215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.419687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.420769] Call Trace: [ 26.421254] <TASK> [ 26.421449] dump_stack_lvl+0x73/0xb0 [ 26.422355] print_report+0xd1/0x640 [ 26.423144] ? __virt_addr_valid+0x1db/0x2d0 [ 26.423902] ? mempool_double_free_helper+0x185/0x370 [ 26.425207] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.426100] ? mempool_double_free_helper+0x185/0x370 [ 26.427328] kasan_report_invalid_free+0xc0/0xf0 [ 26.427646] ? mempool_double_free_helper+0x185/0x370 [ 26.428922] ? mempool_double_free_helper+0x185/0x370 [ 26.430445] ? mempool_double_free_helper+0x185/0x370 [ 26.430955] check_slab_allocation+0x101/0x130 [ 26.432212] __kasan_mempool_poison_object+0x91/0x1d0 [ 26.432869] mempool_free+0x2ec/0x380 [ 26.433240] mempool_double_free_helper+0x185/0x370 [ 26.433608] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.434325] ? irqentry_exit+0x2a/0x60 [ 26.434739] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.435395] mempool_kmalloc_double_free+0xb1/0x100 [ 26.436155] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 26.437572] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.438089] ? __pfx_mempool_kfree+0x10/0x10 [ 26.438476] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 26.439151] kunit_try_run_case+0x1b3/0x490 [ 26.439496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.440358] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.440997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.442525] ? __kthread_parkme+0x82/0x160 [ 26.443185] ? preempt_count_sub+0x50/0x80 [ 26.443854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.444287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.445123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.445799] kthread+0x257/0x310 [ 26.446558] ? __pfx_kthread+0x10/0x10 [ 26.447516] ret_from_fork+0x41/0x80 [ 26.448796] ? __pfx_kthread+0x10/0x10 [ 26.449434] ret_from_fork_asm+0x1a/0x30 [ 26.450070] </TASK> [ 26.450363] [ 26.450546] Allocated by task 243: [ 26.450908] kasan_save_stack+0x3d/0x60 [ 26.452155] kasan_save_track+0x18/0x40 [ 26.452750] kasan_save_alloc_info+0x3b/0x50 [ 26.454107] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 26.454637] remove_element+0x11e/0x190 [ 26.455105] mempool_alloc_preallocated+0x4d/0x90 [ 26.455477] mempool_double_free_helper+0x8b/0x370 [ 26.456581] mempool_kmalloc_double_free+0xb1/0x100 [ 26.458083] kunit_try_run_case+0x1b3/0x490 [ 26.459247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.460012] kthread+0x257/0x310 [ 26.461182] ret_from_fork+0x41/0x80 [ 26.461866] ret_from_fork_asm+0x1a/0x30 [ 26.462983] [ 26.463177] Freed by task 243: [ 26.464103] kasan_save_stack+0x3d/0x60 [ 26.465004] kasan_save_track+0x18/0x40 [ 26.465289] kasan_save_free_info+0x3f/0x60 [ 26.465806] __kasan_mempool_poison_object+0x131/0x1d0 [ 26.466999] mempool_free+0x2ec/0x380 [ 26.467212] mempool_double_free_helper+0x10a/0x370 [ 26.467430] mempool_kmalloc_double_free+0xb1/0x100 [ 26.467642] kunit_try_run_case+0x1b3/0x490 [ 26.467829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.468314] kthread+0x257/0x310 [ 26.468736] ret_from_fork+0x41/0x80 [ 26.470443] ret_from_fork_asm+0x1a/0x30 [ 26.471195] [ 26.471433] The buggy address belongs to the object at ffff88810292ca00 [ 26.471433] which belongs to the cache kmalloc-128 of size 128 [ 26.472900] The buggy address is located 0 bytes inside of [ 26.472900] 128-byte region [ffff88810292ca00, ffff88810292ca80) [ 26.475526] [ 26.475858] The buggy address belongs to the physical page: [ 26.476902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10292c [ 26.478373] flags: 0x200000000000000(node=0|zone=2) [ 26.478684] page_type: f5(slab) [ 26.479686] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.480844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.481977] page dumped because: kasan: bad access detected [ 26.483434] [ 26.483623] Memory state around the buggy address: [ 26.483978] ffff88810292c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.484963] ffff88810292c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.486487] >ffff88810292ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.487573] ^ [ 26.488411] ffff88810292ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.489594] ffff88810292cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.490232] ==================================================================