Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.742604] ================================================================== [ 21.743247] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 21.743951] Free of addr fff00000c6cc8500 by task kunit_try_catch/222 [ 21.744849] [ 21.745113] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.745315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.745354] Hardware name: linux,dummy-virt (DT) [ 21.745394] Call trace: [ 21.745423] dump_backtrace+0x9c/0x128 [ 21.745523] show_stack+0x20/0x38 [ 21.745573] dump_stack_lvl+0x8c/0xd0 [ 21.745625] print_report+0x118/0x5f0 [ 21.745667] kasan_report_invalid_free+0xc0/0xe8 [ 21.745714] check_slab_allocation+0xd4/0x108 [ 21.745758] __kasan_mempool_poison_object+0x78/0x150 [ 21.745806] mempool_free+0x28c/0x328 [ 21.745853] mempool_double_free_helper+0x15c/0x2f8 [ 21.745905] mempool_kmalloc_double_free+0xc0/0x118 [ 21.745954] kunit_try_run_case+0x170/0x3f0 [ 21.746001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.746052] kthread+0x24c/0x2d0 [ 21.746096] ret_from_fork+0x10/0x20 [ 21.746148] [ 21.750806] Allocated by task 222: [ 21.751381] kasan_save_stack+0x3c/0x68 [ 21.751784] kasan_save_track+0x20/0x40 [ 21.752117] kasan_save_alloc_info+0x40/0x58 [ 21.752333] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.752812] remove_element+0x130/0x1f8 [ 21.753121] mempool_alloc_preallocated+0x58/0xc0 [ 21.753486] mempool_double_free_helper+0x94/0x2f8 [ 21.753768] mempool_kmalloc_double_free+0xc0/0x118 [ 21.754122] kunit_try_run_case+0x170/0x3f0 [ 21.754449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.754829] kthread+0x24c/0x2d0 [ 21.755096] ret_from_fork+0x10/0x20 [ 21.755701] [ 21.755884] Freed by task 222: [ 21.756180] kasan_save_stack+0x3c/0x68 [ 21.756475] kasan_save_track+0x20/0x40 [ 21.756774] kasan_save_free_info+0x4c/0x78 [ 21.757082] __kasan_mempool_poison_object+0xc0/0x150 [ 21.757447] mempool_free+0x28c/0x328 [ 21.757728] mempool_double_free_helper+0x104/0x2f8 [ 21.758048] mempool_kmalloc_double_free+0xc0/0x118 [ 21.758411] kunit_try_run_case+0x170/0x3f0 [ 21.758839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.759256] kthread+0x24c/0x2d0 [ 21.759762] ret_from_fork+0x10/0x20 [ 21.760165] [ 21.760460] The buggy address belongs to the object at fff00000c6cc8500 [ 21.760460] which belongs to the cache kmalloc-128 of size 128 [ 21.761052] The buggy address is located 0 bytes inside of [ 21.761052] 128-byte region [fff00000c6cc8500, fff00000c6cc8580) [ 21.761854] [ 21.762014] The buggy address belongs to the physical page: [ 21.762227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc8 [ 21.762904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.763275] page_type: f5(slab) [ 21.763462] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.763794] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.764705] page dumped because: kasan: bad access detected [ 21.765841] [ 21.765992] Memory state around the buggy address: [ 21.766440] fff00000c6cc8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.766826] fff00000c6cc8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.767276] >fff00000c6cc8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.767677] ^ [ 21.767918] fff00000c6cc8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.768609] fff00000c6cc8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.768941] ================================================================== [ 21.777222] ================================================================== [ 21.777919] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 21.778575] Free of addr fff00000c6d60000 by task kunit_try_catch/224 [ 21.779022] [ 21.779315] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.779434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.779470] Hardware name: linux,dummy-virt (DT) [ 21.779571] Call trace: [ 21.779606] dump_backtrace+0x9c/0x128 [ 21.779678] show_stack+0x20/0x38 [ 21.779723] dump_stack_lvl+0x8c/0xd0 [ 21.779773] print_report+0x118/0x5f0 [ 21.779816] kasan_report_invalid_free+0xc0/0xe8 [ 21.779862] __kasan_mempool_poison_object+0x14c/0x150 [ 21.779911] mempool_free+0x28c/0x328 [ 21.779958] mempool_double_free_helper+0x15c/0x2f8 [ 21.780007] mempool_kmalloc_large_double_free+0xc0/0x118 [ 21.780057] kunit_try_run_case+0x170/0x3f0 [ 21.780103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.780154] kthread+0x24c/0x2d0 [ 21.780197] ret_from_fork+0x10/0x20 [ 21.780264] [ 21.786048] The buggy address belongs to the physical page: [ 21.786485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d60 [ 21.786937] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.787212] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.787810] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.788280] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.789070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.789510] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.789825] head: 0bfffe0000000002 ffffc1ffc31b5801 ffffffffffffffff 0000000000000000 [ 21.790395] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.790794] page dumped because: kasan: bad access detected [ 21.791540] [ 21.791783] Memory state around the buggy address: [ 21.792125] fff00000c6d5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.792914] fff00000c6d5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.793289] >fff00000c6d60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.793609] ^ [ 21.793926] fff00000c6d60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.794312] fff00000c6d60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.794810] ================================================================== [ 21.802325] ================================================================== [ 21.802999] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 21.803614] Free of addr fff00000c6c7c000 by task kunit_try_catch/226 [ 21.804039] [ 21.804252] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.804366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.804401] Hardware name: linux,dummy-virt (DT) [ 21.804440] Call trace: [ 21.804466] dump_backtrace+0x9c/0x128 [ 21.804519] show_stack+0x20/0x38 [ 21.804588] dump_stack_lvl+0x8c/0xd0 [ 21.804658] print_report+0x118/0x5f0 [ 21.804701] kasan_report_invalid_free+0xc0/0xe8 [ 21.804748] __kasan_mempool_poison_pages+0xe0/0xe8 [ 21.804795] mempool_free+0x24c/0x328 [ 21.804841] mempool_double_free_helper+0x15c/0x2f8 [ 21.804890] mempool_page_alloc_double_free+0xbc/0x118 [ 21.804940] kunit_try_run_case+0x170/0x3f0 [ 21.804986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.805037] kthread+0x24c/0x2d0 [ 21.805079] ret_from_fork+0x10/0x20 [ 21.805125] [ 21.809737] The buggy address belongs to the physical page: [ 21.810057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c7c [ 21.810379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.810954] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.811980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.812452] page dumped because: kasan: bad access detected [ 21.812903] [ 21.813071] Memory state around the buggy address: [ 21.813324] fff00000c6c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.813932] fff00000c6c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.814358] >fff00000c6c7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.814898] ^ [ 21.815097] fff00000c6c7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.815568] fff00000c6c7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.816128] ==================================================================
[ 13.805713] ================================================================== [ 13.806210] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 13.806567] Free of addr ffff888102b90000 by task kunit_try_catch/242 [ 13.807250] [ 13.807934] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.808143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.808175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.808217] Call Trace: [ 13.808236] <TASK> [ 13.808264] dump_stack_lvl+0x73/0xb0 [ 13.808310] print_report+0xd1/0x640 [ 13.808332] ? __virt_addr_valid+0x1db/0x2d0 [ 13.808356] ? kasan_addr_to_slab+0x11/0xa0 [ 13.808375] ? mempool_double_free_helper+0x185/0x370 [ 13.808395] kasan_report_invalid_free+0xfc/0x120 [ 13.808418] ? mempool_double_free_helper+0x185/0x370 [ 13.808439] ? mempool_double_free_helper+0x185/0x370 [ 13.808457] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 13.808479] mempool_free+0x2ec/0x380 [ 13.808500] mempool_double_free_helper+0x185/0x370 [ 13.808519] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.808542] ? finish_task_switch.isra.0+0x153/0x700 [ 13.808563] mempool_kmalloc_large_double_free+0xee/0x140 [ 13.808583] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 13.808606] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.808622] ? __pfx_mempool_kfree+0x10/0x10 [ 13.808641] ? __pfx_read_tsc+0x10/0x10 [ 13.808658] ? ktime_get_ts64+0x84/0x230 [ 13.808704] kunit_try_run_case+0x1a6/0x480 [ 13.808726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.808743] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.808763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.808785] ? __kthread_parkme+0x82/0x160 [ 13.808802] ? preempt_count_sub+0x50/0x80 [ 13.808822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.808840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.808862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.808884] kthread+0x257/0x310 [ 13.808901] ? __pfx_kthread+0x10/0x10 [ 13.808919] ret_from_fork+0x41/0x80 [ 13.808937] ? __pfx_kthread+0x10/0x10 [ 13.808954] ret_from_fork_asm+0x1a/0x30 [ 13.808982] </TASK> [ 13.808994] [ 13.819268] The buggy address belongs to the physical page: [ 13.819482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b90 [ 13.819970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.820573] flags: 0x200000000000040(head|node=0|zone=2) [ 13.820973] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.821572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.821937] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.822773] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.823112] head: 0200000000000002 ffffea00040ae401 ffffffffffffffff 0000000000000000 [ 13.823371] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 13.824007] page dumped because: kasan: bad access detected [ 13.824490] [ 13.824655] Memory state around the buggy address: [ 13.824973] ffff888102b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.825577] ffff888102b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.825986] >ffff888102b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.826750] ^ [ 13.827025] ffff888102b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.827494] ffff888102b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.827848] ================================================================== [ 13.832466] ================================================================== [ 13.832940] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 13.833373] Free of addr ffff888102590000 by task kunit_try_catch/244 [ 13.833677] [ 13.834053] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.834262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.834289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.834331] Call Trace: [ 13.834359] <TASK> [ 13.834389] dump_stack_lvl+0x73/0xb0 [ 13.834448] print_report+0xd1/0x640 [ 13.834490] ? __virt_addr_valid+0x1db/0x2d0 [ 13.834537] ? kasan_addr_to_slab+0x11/0xa0 [ 13.834579] ? mempool_double_free_helper+0x185/0x370 [ 13.834617] kasan_report_invalid_free+0xfc/0x120 [ 13.834689] ? mempool_double_free_helper+0x185/0x370 [ 13.834739] ? mempool_double_free_helper+0x185/0x370 [ 13.834775] __kasan_mempool_poison_pages+0x115/0x130 [ 13.834825] mempool_free+0x290/0x380 [ 13.834874] mempool_double_free_helper+0x185/0x370 [ 13.834919] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.834966] ? finish_task_switch.isra.0+0x153/0x700 [ 13.834993] mempool_page_alloc_double_free+0xe9/0x140 [ 13.835016] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 13.835040] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 13.835064] ? __pfx_mempool_free_pages+0x10/0x10 [ 13.835196] ? __pfx_read_tsc+0x10/0x10 [ 13.835218] ? ktime_get_ts64+0x84/0x230 [ 13.835244] kunit_try_run_case+0x1a6/0x480 [ 13.835268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.835288] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.835309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.835334] ? __kthread_parkme+0x82/0x160 [ 13.835353] ? preempt_count_sub+0x50/0x80 [ 13.835374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.835393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.835417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.835443] kthread+0x257/0x310 [ 13.835461] ? __pfx_kthread+0x10/0x10 [ 13.835479] ret_from_fork+0x41/0x80 [ 13.835498] ? __pfx_kthread+0x10/0x10 [ 13.835516] ret_from_fork_asm+0x1a/0x30 [ 13.835547] </TASK> [ 13.835559] [ 13.845443] The buggy address belongs to the physical page: [ 13.845751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102590 [ 13.846314] flags: 0x200000000000000(node=0|zone=2) [ 13.846690] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 13.846972] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.847540] page dumped because: kasan: bad access detected [ 13.847910] [ 13.848066] Memory state around the buggy address: [ 13.848532] ffff88810258ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.848895] ffff88810258ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.849336] >ffff888102590000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.849788] ^ [ 13.850030] ffff888102590080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.850650] ffff888102590100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.851003] ================================================================== [ 13.766886] ================================================================== [ 13.767327] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 13.767587] Free of addr ffff88810262bf00 by task kunit_try_catch/240 [ 13.768600] [ 13.768874] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.768967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.768989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.769028] Call Trace: [ 13.769055] <TASK> [ 13.769088] dump_stack_lvl+0x73/0xb0 [ 13.769207] print_report+0xd1/0x640 [ 13.769247] ? __virt_addr_valid+0x1db/0x2d0 [ 13.769302] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.769345] ? mempool_double_free_helper+0x185/0x370 [ 13.769387] kasan_report_invalid_free+0xfc/0x120 [ 13.769429] ? mempool_double_free_helper+0x185/0x370 [ 13.769461] ? mempool_double_free_helper+0x185/0x370 [ 13.769481] ? mempool_double_free_helper+0x185/0x370 [ 13.769499] check_slab_allocation+0x101/0x130 [ 13.769522] __kasan_mempool_poison_object+0x91/0x1d0 [ 13.769546] mempool_free+0x2ec/0x380 [ 13.769569] mempool_double_free_helper+0x185/0x370 [ 13.769590] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 13.769613] ? finish_task_switch.isra.0+0x153/0x700 [ 13.769638] mempool_kmalloc_double_free+0xee/0x140 [ 13.769658] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 13.769705] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.769722] ? __pfx_mempool_kfree+0x10/0x10 [ 13.769742] ? __pfx_read_tsc+0x10/0x10 [ 13.769762] ? ktime_get_ts64+0x84/0x230 [ 13.769788] kunit_try_run_case+0x1a6/0x480 [ 13.769812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.769831] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.769852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.769876] ? __kthread_parkme+0x82/0x160 [ 13.769902] ? preempt_count_sub+0x50/0x80 [ 13.769927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.769947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.769972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.769997] kthread+0x257/0x310 [ 13.770014] ? __pfx_kthread+0x10/0x10 [ 13.770032] ret_from_fork+0x41/0x80 [ 13.770063] ? __pfx_kthread+0x10/0x10 [ 13.770121] ret_from_fork_asm+0x1a/0x30 [ 13.770175] </TASK> [ 13.770191] [ 13.781667] Allocated by task 240: [ 13.781970] kasan_save_stack+0x45/0x70 [ 13.782433] kasan_save_track+0x18/0x40 [ 13.782765] kasan_save_alloc_info+0x3b/0x50 [ 13.782951] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.783463] remove_element+0x11e/0x190 [ 13.783796] mempool_alloc_preallocated+0x4d/0x90 [ 13.784130] mempool_double_free_helper+0x8b/0x370 [ 13.784437] mempool_kmalloc_double_free+0xee/0x140 [ 13.784720] kunit_try_run_case+0x1a6/0x480 [ 13.785032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.785332] kthread+0x257/0x310 [ 13.785570] ret_from_fork+0x41/0x80 [ 13.786314] ret_from_fork_asm+0x1a/0x30 [ 13.786616] [ 13.786794] Freed by task 240: [ 13.787026] kasan_save_stack+0x45/0x70 [ 13.787474] kasan_save_track+0x18/0x40 [ 13.787734] kasan_save_free_info+0x3f/0x60 [ 13.788211] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.788472] mempool_free+0x2ec/0x380 [ 13.788646] mempool_double_free_helper+0x10a/0x370 [ 13.789006] mempool_kmalloc_double_free+0xee/0x140 [ 13.789778] kunit_try_run_case+0x1a6/0x480 [ 13.790086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.790649] kthread+0x257/0x310 [ 13.790945] ret_from_fork+0x41/0x80 [ 13.791301] ret_from_fork_asm+0x1a/0x30 [ 13.791485] [ 13.791646] The buggy address belongs to the object at ffff88810262bf00 [ 13.791646] which belongs to the cache kmalloc-128 of size 128 [ 13.792455] The buggy address is located 0 bytes inside of [ 13.792455] 128-byte region [ffff88810262bf00, ffff88810262bf80) [ 13.793226] [ 13.793410] The buggy address belongs to the physical page: [ 13.793672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262b [ 13.794595] flags: 0x200000000000000(node=0|zone=2) [ 13.794902] page_type: f5(slab) [ 13.795341] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.795777] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000 [ 13.796293] page dumped because: kasan: bad access detected [ 13.796555] [ 13.796841] Memory state around the buggy address: [ 13.797288] ffff88810262be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.797691] ffff88810262be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.798041] >ffff88810262bf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.798629] ^ [ 13.798807] ffff88810262bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.799444] ffff88810262c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.800328] ==================================================================