Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.630504] ================================================================== [ 31.630564] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.630617] Free of addr fff00000c9b8c000 by task kunit_try_catch/268 [ 31.630660] [ 31.630692] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.633909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.633941] Hardware name: linux,dummy-virt (DT) [ 31.634532] Call trace: [ 31.634562] show_stack+0x20/0x38 (C) [ 31.634786] dump_stack_lvl+0x8c/0xd0 [ 31.635238] print_report+0x118/0x5d0 [ 31.635296] kasan_report_invalid_free+0xc0/0xe8 [ 31.635345] __kasan_mempool_poison_object+0x14c/0x150 [ 31.635399] mempool_free+0x28c/0x328 [ 31.635448] mempool_double_free_helper+0x150/0x2e8 [ 31.635506] mempool_kmalloc_large_double_free+0xc0/0x118 [ 31.635559] kunit_try_run_case+0x170/0x3f0 [ 31.635607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.635661] kthread+0x328/0x630 [ 31.635701] ret_from_fork+0x10/0x20 [ 31.635749] [ 31.635772] The buggy address belongs to the physical page: [ 31.635805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 31.635860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.635909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.635963] page_type: f8(unknown) [ 31.636004] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.636056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.636106] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.636167] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.636218] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff [ 31.636308] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.636350] page dumped because: kasan: bad access detected [ 31.636383] [ 31.636442] Memory state around the buggy address: [ 31.636547] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636593] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636674] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636856] ^ [ 31.636923] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636972] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.637012] ================================================================== [ 31.651355] ================================================================== [ 31.651546] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.651671] Free of addr fff00000c9b8c000 by task kunit_try_catch/270 [ 31.651994] [ 31.652046] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.652295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.652404] Hardware name: linux,dummy-virt (DT) [ 31.652606] Call trace: [ 31.652655] show_stack+0x20/0x38 (C) [ 31.652923] dump_stack_lvl+0x8c/0xd0 [ 31.653049] print_report+0x118/0x5d0 [ 31.653422] kasan_report_invalid_free+0xc0/0xe8 [ 31.653661] __kasan_mempool_poison_pages+0xe0/0xe8 [ 31.653725] mempool_free+0x24c/0x328 [ 31.653779] mempool_double_free_helper+0x150/0x2e8 [ 31.653855] mempool_page_alloc_double_free+0xbc/0x118 [ 31.653908] kunit_try_run_case+0x170/0x3f0 [ 31.653976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.654503] kthread+0x328/0x630 [ 31.654737] ret_from_fork+0x10/0x20 [ 31.654829] [ 31.654850] The buggy address belongs to the physical page: [ 31.655180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 31.655260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.655591] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.655666] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.655710] page dumped because: kasan: bad access detected [ 31.655742] [ 31.655761] Memory state around the buggy address: [ 31.655808] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.655857] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.655901] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.656216] ^ [ 31.656260] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.656306] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.656356] ================================================================== [ 31.615828] ================================================================== [ 31.615950] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.616039] Free of addr fff00000c9bc2000 by task kunit_try_catch/266 [ 31.618196] [ 31.618232] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.618320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.618346] Hardware name: linux,dummy-virt (DT) [ 31.618378] Call trace: [ 31.618399] show_stack+0x20/0x38 (C) [ 31.618451] dump_stack_lvl+0x8c/0xd0 [ 31.618495] print_report+0x118/0x5d0 [ 31.618539] kasan_report_invalid_free+0xc0/0xe8 [ 31.618585] check_slab_allocation+0xd4/0x108 [ 31.618634] __kasan_mempool_poison_object+0x78/0x150 [ 31.618687] mempool_free+0x28c/0x328 [ 31.618740] mempool_double_free_helper+0x150/0x2e8 [ 31.618790] mempool_kmalloc_double_free+0xc0/0x118 [ 31.618839] kunit_try_run_case+0x170/0x3f0 [ 31.618889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.618943] kthread+0x328/0x630 [ 31.618984] ret_from_fork+0x10/0x20 [ 31.619029] [ 31.619047] Allocated by task 266: [ 31.619076] kasan_save_stack+0x3c/0x68 [ 31.619116] kasan_save_track+0x20/0x40 [ 31.619200] kasan_save_alloc_info+0x40/0x58 [ 31.619279] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.619325] remove_element+0x130/0x1f8 [ 31.619483] mempool_alloc_preallocated+0x58/0xc0 [ 31.619528] mempool_double_free_helper+0x94/0x2e8 [ 31.619568] mempool_kmalloc_double_free+0xc0/0x118 [ 31.619609] kunit_try_run_case+0x170/0x3f0 [ 31.619858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.622194] kthread+0x328/0x630 [ 31.622228] ret_from_fork+0x10/0x20 [ 31.622263] [ 31.622282] Freed by task 266: [ 31.622312] kasan_save_stack+0x3c/0x68 [ 31.622352] kasan_save_track+0x20/0x40 [ 31.622388] kasan_save_free_info+0x4c/0x78 [ 31.622425] __kasan_mempool_poison_object+0xc0/0x150 [ 31.622466] mempool_free+0x28c/0x328 [ 31.622502] mempool_double_free_helper+0x100/0x2e8 [ 31.622543] mempool_kmalloc_double_free+0xc0/0x118 [ 31.622582] kunit_try_run_case+0x170/0x3f0 [ 31.622621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.622665] kthread+0x328/0x630 [ 31.622703] ret_from_fork+0x10/0x20 [ 31.622739] [ 31.622757] The buggy address belongs to the object at fff00000c9bc2000 [ 31.622757] which belongs to the cache kmalloc-128 of size 128 [ 31.622817] The buggy address is located 0 bytes inside of [ 31.622817] 128-byte region [fff00000c9bc2000, fff00000c9bc2080) [ 31.622879] [ 31.622899] The buggy address belongs to the physical page: [ 31.622930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 31.622983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.623033] page_type: f5(slab) [ 31.623069] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.623120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.623173] page dumped because: kasan: bad access detected [ 31.623205] [ 31.623222] Memory state around the buggy address: [ 31.623254] fff00000c9bc1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.623297] fff00000c9bc1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.623341] >fff00000c9bc2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.623382] ^ [ 31.623410] fff00000c9bc2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.623453] fff00000c9bc2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.623492] ==================================================================
[ 26.810771] ================================================================== [ 26.812233] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 26.813369] Free of addr ffff8881060f4000 by task kunit_try_catch/285 [ 26.814049] [ 26.814347] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 26.814406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.814420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.814444] Call Trace: [ 26.814459] <TASK> [ 26.814479] dump_stack_lvl+0x73/0xb0 [ 26.814510] print_report+0xd1/0x610 [ 26.814534] ? __virt_addr_valid+0x1db/0x2d0 [ 26.814559] ? kasan_addr_to_slab+0x11/0xa0 [ 26.814581] ? mempool_double_free_helper+0x184/0x370 [ 26.814606] kasan_report_invalid_free+0x10a/0x130 [ 26.814630] ? mempool_double_free_helper+0x184/0x370 [ 26.814657] ? mempool_double_free_helper+0x184/0x370 [ 26.814680] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 26.814716] mempool_free+0x2ec/0x380 [ 26.814745] mempool_double_free_helper+0x184/0x370 [ 26.814770] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.814796] ? __kasan_check_write+0x18/0x20 [ 26.814821] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.814843] ? finish_task_switch.isra.0+0x153/0x700 [ 26.814869] mempool_kmalloc_large_double_free+0xed/0x140 [ 26.814893] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 26.814920] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.814942] ? __pfx_mempool_kfree+0x10/0x10 [ 26.814980] ? __pfx_read_tsc+0x10/0x10 [ 26.815002] ? ktime_get_ts64+0x86/0x230 [ 26.815028] kunit_try_run_case+0x1a5/0x480 [ 26.815059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.815080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.815104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.815128] ? __kthread_parkme+0x82/0x180 [ 26.815148] ? preempt_count_sub+0x50/0x80 [ 26.815172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.815194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.815219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.815245] kthread+0x337/0x6f0 [ 26.815265] ? trace_preempt_on+0x20/0xc0 [ 26.815288] ? __pfx_kthread+0x10/0x10 [ 26.815309] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.815331] ? calculate_sigpending+0x7b/0xa0 [ 26.815355] ? __pfx_kthread+0x10/0x10 [ 26.815377] ret_from_fork+0x116/0x1d0 [ 26.815396] ? __pfx_kthread+0x10/0x10 [ 26.815418] ret_from_fork_asm+0x1a/0x30 [ 26.815449] </TASK> [ 26.815460] [ 26.829068] The buggy address belongs to the physical page: [ 26.829260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4 [ 26.829645] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.830265] flags: 0x200000000000040(head|node=0|zone=2) [ 26.830597] page_type: f8(unknown) [ 26.830762] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.831235] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.831522] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.832085] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.832475] head: 0200000000000002 ffffea0004183d01 00000000ffffffff 00000000ffffffff [ 26.832973] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.833304] page dumped because: kasan: bad access detected [ 26.833535] [ 26.833619] Memory state around the buggy address: [ 26.833850] ffff8881060f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.834355] ffff8881060f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.834668] >ffff8881060f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.835127] ^ [ 26.835289] ffff8881060f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.835828] ffff8881060f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.836286] ================================================================== [ 26.839379] ================================================================== [ 26.840168] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 26.840411] Free of addr ffff8881060f4000 by task kunit_try_catch/287 [ 26.841444] [ 26.841724] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 26.841781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.841794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.841818] Call Trace: [ 26.841832] <TASK> [ 26.841852] dump_stack_lvl+0x73/0xb0 [ 26.841884] print_report+0xd1/0x610 [ 26.841908] ? __virt_addr_valid+0x1db/0x2d0 [ 26.841933] ? kasan_addr_to_slab+0x11/0xa0 [ 26.841953] ? mempool_double_free_helper+0x184/0x370 [ 26.841978] kasan_report_invalid_free+0x10a/0x130 [ 26.842002] ? mempool_double_free_helper+0x184/0x370 [ 26.842028] ? mempool_double_free_helper+0x184/0x370 [ 26.842051] __kasan_mempool_poison_pages+0x115/0x130 [ 26.842075] mempool_free+0x290/0x380 [ 26.842102] mempool_double_free_helper+0x184/0x370 [ 26.842126] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.842153] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.842174] ? finish_task_switch.isra.0+0x153/0x700 [ 26.842199] mempool_page_alloc_double_free+0xe8/0x140 [ 26.842224] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 26.842252] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 26.842277] ? __pfx_mempool_free_pages+0x10/0x10 [ 26.842302] ? __pfx_read_tsc+0x10/0x10 [ 26.842323] ? ktime_get_ts64+0x86/0x230 [ 26.842347] kunit_try_run_case+0x1a5/0x480 [ 26.842371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.842393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.842491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.842518] ? __kthread_parkme+0x82/0x180 [ 26.842560] ? preempt_count_sub+0x50/0x80 [ 26.842602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.842624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.842649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.842674] kthread+0x337/0x6f0 [ 26.842694] ? trace_preempt_on+0x20/0xc0 [ 26.842727] ? __pfx_kthread+0x10/0x10 [ 26.842748] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.842775] ? calculate_sigpending+0x7b/0xa0 [ 26.842799] ? __pfx_kthread+0x10/0x10 [ 26.842820] ret_from_fork+0x116/0x1d0 [ 26.842841] ? __pfx_kthread+0x10/0x10 [ 26.842861] ret_from_fork_asm+0x1a/0x30 [ 26.842893] </TASK> [ 26.842905] [ 26.857499] The buggy address belongs to the physical page: [ 26.858040] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f4 [ 26.858439] flags: 0x200000000000000(node=0|zone=2) [ 26.858992] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.859608] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.860236] page dumped because: kasan: bad access detected [ 26.860414] [ 26.860497] Memory state around the buggy address: [ 26.860983] ffff8881060f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.861720] ffff8881060f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.862327] >ffff8881060f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.862549] ^ [ 26.862666] ffff8881060f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.862959] ffff8881060f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.863434] ================================================================== [ 26.767856] ================================================================== [ 26.768367] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 26.769003] Free of addr ffff88810583aa00 by task kunit_try_catch/283 [ 26.769690] [ 26.769877] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 26.770013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.770027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.770050] Call Trace: [ 26.770064] <TASK> [ 26.770083] dump_stack_lvl+0x73/0xb0 [ 26.770113] print_report+0xd1/0x610 [ 26.770137] ? __virt_addr_valid+0x1db/0x2d0 [ 26.770163] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.770189] ? mempool_double_free_helper+0x184/0x370 [ 26.770214] kasan_report_invalid_free+0x10a/0x130 [ 26.770238] ? mempool_double_free_helper+0x184/0x370 [ 26.770264] ? mempool_double_free_helper+0x184/0x370 [ 26.770286] ? mempool_double_free_helper+0x184/0x370 [ 26.770309] check_slab_allocation+0x101/0x130 [ 26.770331] __kasan_mempool_poison_object+0x91/0x1d0 [ 26.770355] mempool_free+0x2ec/0x380 [ 26.770382] mempool_double_free_helper+0x184/0x370 [ 26.770407] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.770431] ? __call_rcu_common.constprop.0+0x455/0x9e0 [ 26.770456] ? __pfx_task_dead_fair+0x10/0x10 [ 26.770508] mempool_kmalloc_double_free+0xed/0x140 [ 26.770532] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 26.770558] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.770580] ? __pfx_mempool_kfree+0x10/0x10 [ 26.770605] ? __pfx_read_tsc+0x10/0x10 [ 26.770627] ? ktime_get_ts64+0x86/0x230 [ 26.770652] kunit_try_run_case+0x1a5/0x480 [ 26.770674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.770695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.770726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.770750] ? __kthread_parkme+0x82/0x180 [ 26.770772] ? preempt_count_sub+0x50/0x80 [ 26.770795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.770817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.770842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.770868] kthread+0x337/0x6f0 [ 26.770887] ? trace_preempt_on+0x20/0xc0 [ 26.770909] ? __pfx_kthread+0x10/0x10 [ 26.770930] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.770951] ? calculate_sigpending+0x7b/0xa0 [ 26.770976] ? __pfx_kthread+0x10/0x10 [ 26.770998] ret_from_fork+0x116/0x1d0 [ 26.771017] ? __pfx_kthread+0x10/0x10 [ 26.771038] ret_from_fork_asm+0x1a/0x30 [ 26.771069] </TASK> [ 26.771081] [ 26.785716] Allocated by task 283: [ 26.785853] kasan_save_stack+0x45/0x70 [ 26.786000] kasan_save_track+0x18/0x40 [ 26.786130] kasan_save_alloc_info+0x3b/0x50 [ 26.786275] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 26.786443] remove_element+0x11e/0x190 [ 26.786976] mempool_alloc_preallocated+0x4d/0x90 [ 26.787414] mempool_double_free_helper+0x8a/0x370 [ 26.787948] mempool_kmalloc_double_free+0xed/0x140 [ 26.788501] kunit_try_run_case+0x1a5/0x480 [ 26.788909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.789398] kthread+0x337/0x6f0 [ 26.789761] ret_from_fork+0x116/0x1d0 [ 26.790122] ret_from_fork_asm+0x1a/0x30 [ 26.790523] [ 26.790723] Freed by task 283: [ 26.791034] kasan_save_stack+0x45/0x70 [ 26.791330] kasan_save_track+0x18/0x40 [ 26.791462] kasan_save_free_info+0x3f/0x60 [ 26.791918] __kasan_mempool_poison_object+0x131/0x1d0 [ 26.792391] mempool_free+0x2ec/0x380 [ 26.792757] mempool_double_free_helper+0x109/0x370 [ 26.792922] mempool_kmalloc_double_free+0xed/0x140 [ 26.793081] kunit_try_run_case+0x1a5/0x480 [ 26.793221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.793394] kthread+0x337/0x6f0 [ 26.793510] ret_from_fork+0x116/0x1d0 [ 26.793641] ret_from_fork_asm+0x1a/0x30 [ 26.793792] [ 26.793860] The buggy address belongs to the object at ffff88810583aa00 [ 26.793860] which belongs to the cache kmalloc-128 of size 128 [ 26.794222] The buggy address is located 0 bytes inside of [ 26.794222] 128-byte region [ffff88810583aa00, ffff88810583aa80) [ 26.794903] [ 26.795565] The buggy address belongs to the physical page: [ 26.796064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10583a [ 26.796897] flags: 0x200000000000000(node=0|zone=2) [ 26.797600] page_type: f5(slab) [ 26.798067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.799195] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.800231] page dumped because: kasan: bad access detected [ 26.801080] [ 26.801396] Memory state around the buggy address: [ 26.802052] ffff88810583a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.802937] ffff88810583a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.803925] >ffff88810583aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.804480] ^ [ 26.805078] ffff88810583aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.805434] ffff88810583ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.806292] ==================================================================