Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.347580] ================================================================== [ 33.347640] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.347695] Free of addr fff00000c9b90000 by task kunit_try_catch/268 [ 33.347737] [ 33.347770] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.347853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.347881] Hardware name: linux,dummy-virt (DT) [ 33.347915] Call trace: [ 33.347938] show_stack+0x20/0x38 (C) [ 33.347988] dump_stack_lvl+0x8c/0xd0 [ 33.348033] print_report+0x118/0x5d0 [ 33.348081] kasan_report_invalid_free+0xc0/0xe8 [ 33.348131] __kasan_mempool_poison_object+0x14c/0x150 [ 33.348658] mempool_free+0x28c/0x328 [ 33.348714] mempool_double_free_helper+0x150/0x2e8 [ 33.348799] mempool_kmalloc_large_double_free+0xc0/0x118 [ 33.348855] kunit_try_run_case+0x170/0x3f0 [ 33.348906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348960] kthread+0x328/0x630 [ 33.349002] ret_from_fork+0x10/0x20 [ 33.349050] [ 33.349071] The buggy address belongs to the physical page: [ 33.349101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90 [ 33.349156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.349203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.349267] page_type: f8(unknown) [ 33.349308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.349439] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.349621] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.349788] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.349906] head: 0bfffe0000000002 ffffc1ffc326e401 00000000ffffffff 00000000ffffffff [ 33.349961] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.350067] page dumped because: kasan: bad access detected [ 33.350098] [ 33.350160] Memory state around the buggy address: [ 33.350277] fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350321] fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350363] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350429] ^ [ 33.350464] fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350841] fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350889] ================================================================== [ 33.367757] ================================================================== [ 33.367826] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.367883] Free of addr fff00000c9b94000 by task kunit_try_catch/270 [ 33.367925] [ 33.367957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.368044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.368069] Hardware name: linux,dummy-virt (DT) [ 33.368101] Call trace: [ 33.368124] show_stack+0x20/0x38 (C) [ 33.368173] dump_stack_lvl+0x8c/0xd0 [ 33.368231] print_report+0x118/0x5d0 [ 33.368280] kasan_report_invalid_free+0xc0/0xe8 [ 33.368712] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.368787] mempool_free+0x24c/0x328 [ 33.368835] mempool_double_free_helper+0x150/0x2e8 [ 33.369335] mempool_page_alloc_double_free+0xbc/0x118 [ 33.369389] kunit_try_run_case+0x170/0x3f0 [ 33.369499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.369559] kthread+0x328/0x630 [ 33.369606] ret_from_fork+0x10/0x20 [ 33.370285] [ 33.370394] The buggy address belongs to the physical page: [ 33.370428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b94 [ 33.370483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.370547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.370914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.370961] page dumped because: kasan: bad access detected [ 33.370991] [ 33.371079] Memory state around the buggy address: [ 33.371113] fff00000c9b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371336] fff00000c9b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371384] >fff00000c9b94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371421] ^ [ 33.371686] fff00000c9b94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371829] fff00000c9b94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371873] ================================================================== [ 33.335484] ================================================================== [ 33.335631] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.335790] Free of addr fff00000c9adf300 by task kunit_try_catch/266 [ 33.335961] [ 33.336042] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.336840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.336920] Hardware name: linux,dummy-virt (DT) [ 33.336952] Call trace: [ 33.336976] show_stack+0x20/0x38 (C) [ 33.337095] dump_stack_lvl+0x8c/0xd0 [ 33.337200] print_report+0x118/0x5d0 [ 33.337497] kasan_report_invalid_free+0xc0/0xe8 [ 33.337566] check_slab_allocation+0xd4/0x108 [ 33.337663] __kasan_mempool_poison_object+0x78/0x150 [ 33.337715] mempool_free+0x28c/0x328 [ 33.337832] mempool_double_free_helper+0x150/0x2e8 [ 33.338035] mempool_kmalloc_double_free+0xc0/0x118 [ 33.338108] kunit_try_run_case+0x170/0x3f0 [ 33.338183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338246] kthread+0x328/0x630 [ 33.338290] ret_from_fork+0x10/0x20 [ 33.338338] [ 33.338356] Allocated by task 266: [ 33.338387] kasan_save_stack+0x3c/0x68 [ 33.338446] kasan_save_track+0x20/0x40 [ 33.338557] kasan_save_alloc_info+0x40/0x58 [ 33.338596] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.338668] remove_element+0x130/0x1f8 [ 33.338706] mempool_alloc_preallocated+0x58/0xc0 [ 33.338777] mempool_double_free_helper+0x94/0x2e8 [ 33.338818] mempool_kmalloc_double_free+0xc0/0x118 [ 33.338874] kunit_try_run_case+0x170/0x3f0 [ 33.338912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338957] kthread+0x328/0x630 [ 33.338988] ret_from_fork+0x10/0x20 [ 33.339024] [ 33.339041] Freed by task 266: [ 33.339066] kasan_save_stack+0x3c/0x68 [ 33.339105] kasan_save_track+0x20/0x40 [ 33.339143] kasan_save_free_info+0x4c/0x78 [ 33.339179] __kasan_mempool_poison_object+0xc0/0x150 [ 33.339266] mempool_free+0x28c/0x328 [ 33.339379] mempool_double_free_helper+0x100/0x2e8 [ 33.339475] mempool_kmalloc_double_free+0xc0/0x118 [ 33.339524] kunit_try_run_case+0x170/0x3f0 [ 33.339600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.339658] kthread+0x328/0x630 [ 33.339701] ret_from_fork+0x10/0x20 [ 33.339737] [ 33.339756] The buggy address belongs to the object at fff00000c9adf300 [ 33.339756] which belongs to the cache kmalloc-128 of size 128 [ 33.339815] The buggy address is located 0 bytes inside of [ 33.339815] 128-byte region [fff00000c9adf300, fff00000c9adf380) [ 33.339874] [ 33.339893] The buggy address belongs to the physical page: [ 33.339923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 33.340073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.340120] page_type: f5(slab) [ 33.340164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.340290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.340331] page dumped because: kasan: bad access detected [ 33.340402] [ 33.340419] Memory state around the buggy address: [ 33.340450] fff00000c9adf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.340492] fff00000c9adf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.340534] >fff00000c9adf300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.340579] ^ [ 33.340610] fff00000c9adf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.340688] fff00000c9adf400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.341044] ==================================================================
[ 25.074218] ================================================================== [ 25.074696] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 25.076532] Free of addr ffff888102668000 by task kunit_try_catch/285 [ 25.077347] [ 25.077457] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.077516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.077529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.077554] Call Trace: [ 25.077571] <TASK> [ 25.077593] dump_stack_lvl+0x73/0xb0 [ 25.077631] print_report+0xd1/0x610 [ 25.077655] ? __virt_addr_valid+0x1db/0x2d0 [ 25.077684] ? kasan_addr_to_slab+0x11/0xa0 [ 25.077705] ? mempool_double_free_helper+0x184/0x370 [ 25.077730] kasan_report_invalid_free+0x10a/0x130 [ 25.077765] ? mempool_double_free_helper+0x184/0x370 [ 25.077792] ? mempool_double_free_helper+0x184/0x370 [ 25.077816] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 25.077841] mempool_free+0x2ec/0x380 [ 25.077872] mempool_double_free_helper+0x184/0x370 [ 25.077899] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.077925] ? __kasan_check_write+0x18/0x20 [ 25.077951] ? __pfx_sched_clock_cpu+0x10/0x10 [ 25.077975] ? finish_task_switch.isra.0+0x153/0x700 [ 25.078003] mempool_kmalloc_large_double_free+0xed/0x140 [ 25.078030] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 25.078056] ? __kasan_check_write+0x18/0x20 [ 25.078084] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.078109] ? __pfx_mempool_kfree+0x10/0x10 [ 25.078137] ? __pfx_read_tsc+0x10/0x10 [ 25.078164] ? ktime_get_ts64+0x86/0x230 [ 25.078189] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 25.078217] kunit_try_run_case+0x1a5/0x480 [ 25.078254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.078277] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.078300] ? __kthread_parkme+0x82/0x180 [ 25.078322] ? preempt_count_sub+0x50/0x80 [ 25.078346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.078368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.078395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.078423] kthread+0x337/0x6f0 [ 25.078445] ? trace_preempt_on+0x20/0xc0 [ 25.078471] ? __pfx_kthread+0x10/0x10 [ 25.078493] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.078521] ? calculate_sigpending+0x7b/0xa0 [ 25.078550] ? __pfx_kthread+0x10/0x10 [ 25.078574] ret_from_fork+0x116/0x1d0 [ 25.078594] ? __pfx_kthread+0x10/0x10 [ 25.078617] ret_from_fork_asm+0x1a/0x30 [ 25.078652] </TASK> [ 25.078665] [ 25.089632] The buggy address belongs to the physical page: [ 25.090324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102668 [ 25.090669] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.091158] flags: 0x200000000000040(head|node=0|zone=2) [ 25.091371] page_type: f8(unknown) [ 25.091576] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.091992] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.092252] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.092597] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.092894] head: 0200000000000002 ffffea0004099a01 00000000ffffffff 00000000ffffffff [ 25.093228] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.093592] page dumped because: kasan: bad access detected [ 25.093875] [ 25.093940] Memory state around the buggy address: [ 25.094248] ffff888102667f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.094506] ffff888102667f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.094816] >ffff888102668000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.095233] ^ [ 25.095384] ffff888102668080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.095959] ffff888102668100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.096296] ================================================================== [ 25.099394] ================================================================== [ 25.100142] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 25.101126] Free of addr ffff88810266c000 by task kunit_try_catch/287 [ 25.101498] [ 25.101610] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.101664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.101678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.101701] Call Trace: [ 25.101717] <TASK> [ 25.101745] dump_stack_lvl+0x73/0xb0 [ 25.101776] print_report+0xd1/0x610 [ 25.101802] ? __virt_addr_valid+0x1db/0x2d0 [ 25.101828] ? kasan_addr_to_slab+0x11/0xa0 [ 25.101847] ? mempool_double_free_helper+0x184/0x370 [ 25.101873] kasan_report_invalid_free+0x10a/0x130 [ 25.102204] ? mempool_double_free_helper+0x184/0x370 [ 25.102256] ? mempool_double_free_helper+0x184/0x370 [ 25.102283] __kasan_mempool_poison_pages+0x115/0x130 [ 25.102310] mempool_free+0x290/0x380 [ 25.102340] mempool_double_free_helper+0x184/0x370 [ 25.102365] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.102391] ? __kasan_check_write+0x18/0x20 [ 25.102418] ? __pfx_sched_clock_cpu+0x10/0x10 [ 25.102443] ? finish_task_switch.isra.0+0x153/0x700 [ 25.102471] mempool_page_alloc_double_free+0xe8/0x140 [ 25.102498] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 25.102527] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 25.102554] ? __pfx_mempool_free_pages+0x10/0x10 [ 25.102583] ? __pfx_read_tsc+0x10/0x10 [ 25.102608] ? ktime_get_ts64+0x86/0x230 [ 25.102635] kunit_try_run_case+0x1a5/0x480 [ 25.102659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.102681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.102704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.102734] ? __kthread_parkme+0x82/0x180 [ 25.102809] ? preempt_count_sub+0x50/0x80 [ 25.102835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.102858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.102885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.102913] kthread+0x337/0x6f0 [ 25.102935] ? trace_preempt_on+0x20/0xc0 [ 25.102961] ? __pfx_kthread+0x10/0x10 [ 25.102983] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.103011] ? calculate_sigpending+0x7b/0xa0 [ 25.103039] ? __pfx_kthread+0x10/0x10 [ 25.103063] ret_from_fork+0x116/0x1d0 [ 25.103083] ? __pfx_kthread+0x10/0x10 [ 25.103106] ret_from_fork_asm+0x1a/0x30 [ 25.103141] </TASK> [ 25.103154] [ 25.114296] The buggy address belongs to the physical page: [ 25.114660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10266c [ 25.115095] flags: 0x200000000000000(node=0|zone=2) [ 25.115364] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.115669] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.116228] page dumped because: kasan: bad access detected [ 25.116539] [ 25.116626] Memory state around the buggy address: [ 25.116815] ffff88810266bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.117426] ffff88810266bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.117783] >ffff88810266c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.118282] ^ [ 25.118455] ffff88810266c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.118866] ffff88810266c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.119170] ================================================================== [ 25.039821] ================================================================== [ 25.040346] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 25.040697] Free of addr ffff8881062af400 by task kunit_try_catch/283 [ 25.040938] [ 25.041076] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.041133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.041147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.041179] Call Trace: [ 25.041371] <TASK> [ 25.041402] dump_stack_lvl+0x73/0xb0 [ 25.041437] print_report+0xd1/0x610 [ 25.041462] ? __virt_addr_valid+0x1db/0x2d0 [ 25.041492] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.041521] ? mempool_double_free_helper+0x184/0x370 [ 25.041547] kasan_report_invalid_free+0x10a/0x130 [ 25.041572] ? mempool_double_free_helper+0x184/0x370 [ 25.041611] ? mempool_double_free_helper+0x184/0x370 [ 25.041637] ? mempool_double_free_helper+0x184/0x370 [ 25.041662] check_slab_allocation+0x101/0x130 [ 25.041695] __kasan_mempool_poison_object+0x91/0x1d0 [ 25.041721] mempool_free+0x2ec/0x380 [ 25.041750] ? __wake_up+0x49/0x60 [ 25.041792] mempool_double_free_helper+0x184/0x370 [ 25.041828] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.041853] ? update_load_avg+0x1be/0x21b0 [ 25.041884] ? finish_task_switch.isra.0+0x153/0x700 [ 25.041921] mempool_kmalloc_double_free+0xed/0x140 [ 25.041946] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 25.041974] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.042019] ? __pfx_mempool_kfree+0x10/0x10 [ 25.042072] ? __pfx_read_tsc+0x10/0x10 [ 25.042099] ? ktime_get_ts64+0x86/0x230 [ 25.042127] kunit_try_run_case+0x1a5/0x480 [ 25.042153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.042182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.042205] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.042250] ? __kthread_parkme+0x82/0x180 [ 25.042273] ? preempt_count_sub+0x50/0x80 [ 25.042297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.042320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.042349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.042378] kthread+0x337/0x6f0 [ 25.042400] ? trace_preempt_on+0x20/0xc0 [ 25.042427] ? __pfx_kthread+0x10/0x10 [ 25.042450] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.042479] ? calculate_sigpending+0x7b/0xa0 [ 25.042507] ? __pfx_kthread+0x10/0x10 [ 25.042532] ret_from_fork+0x116/0x1d0 [ 25.042552] ? __pfx_kthread+0x10/0x10 [ 25.042575] ret_from_fork_asm+0x1a/0x30 [ 25.042612] </TASK> [ 25.042626] [ 25.052547] Allocated by task 283: [ 25.052733] kasan_save_stack+0x45/0x70 [ 25.052990] kasan_save_track+0x18/0x40 [ 25.053182] kasan_save_alloc_info+0x3b/0x50 [ 25.053395] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 25.053615] remove_element+0x11e/0x190 [ 25.053869] mempool_alloc_preallocated+0x4d/0x90 [ 25.054146] mempool_double_free_helper+0x8a/0x370 [ 25.054384] mempool_kmalloc_double_free+0xed/0x140 [ 25.054599] kunit_try_run_case+0x1a5/0x480 [ 25.054819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.055121] kthread+0x337/0x6f0 [ 25.055299] ret_from_fork+0x116/0x1d0 [ 25.055533] ret_from_fork_asm+0x1a/0x30 [ 25.055676] [ 25.055740] Freed by task 283: [ 25.055844] kasan_save_stack+0x45/0x70 [ 25.055971] kasan_save_track+0x18/0x40 [ 25.056097] kasan_save_free_info+0x3f/0x60 [ 25.056368] __kasan_mempool_poison_object+0x131/0x1d0 [ 25.056602] mempool_free+0x2ec/0x380 [ 25.056903] mempool_double_free_helper+0x109/0x370 [ 25.057378] mempool_kmalloc_double_free+0xed/0x140 [ 25.057599] kunit_try_run_case+0x1a5/0x480 [ 25.057738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.058044] kthread+0x337/0x6f0 [ 25.058247] ret_from_fork+0x116/0x1d0 [ 25.058406] ret_from_fork_asm+0x1a/0x30 [ 25.058592] [ 25.058660] The buggy address belongs to the object at ffff8881062af400 [ 25.058660] which belongs to the cache kmalloc-128 of size 128 [ 25.059012] The buggy address is located 0 bytes inside of [ 25.059012] 128-byte region [ffff8881062af400, ffff8881062af480) [ 25.059746] [ 25.059884] The buggy address belongs to the physical page: [ 25.060152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af [ 25.060427] flags: 0x200000000000000(node=0|zone=2) [ 25.060595] page_type: f5(slab) [ 25.060717] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.061338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.061672] page dumped because: kasan: bad access detected [ 25.062080] [ 25.062152] Memory state around the buggy address: [ 25.062418] ffff8881062af300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.062638] ffff8881062af380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.063324] >ffff8881062af400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.063670] ^ [ 25.063926] ffff8881062af480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.064220] ffff8881062af500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.064496] ==================================================================