Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.269123] ================================================================== [ 19.269202] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.269256] Free of addr fff00000c5b89e00 by task kunit_try_catch/237 [ 19.269312] [ 19.269343] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.269594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.269787] Hardware name: linux,dummy-virt (DT) [ 19.269858] Call trace: [ 19.269887] show_stack+0x20/0x38 (C) [ 19.269950] dump_stack_lvl+0x8c/0xd0 [ 19.270001] print_report+0x118/0x5d0 [ 19.270179] kasan_report_invalid_free+0xc0/0xe8 [ 19.270263] check_slab_allocation+0xd4/0x108 [ 19.270401] __kasan_mempool_poison_object+0x78/0x150 [ 19.270488] mempool_free+0x28c/0x328 [ 19.270554] mempool_double_free_helper+0x150/0x2e8 [ 19.270614] mempool_kmalloc_double_free+0xc0/0x118 [ 19.270674] kunit_try_run_case+0x170/0x3f0 [ 19.270776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.270841] kthread+0x328/0x630 [ 19.271277] ret_from_fork+0x10/0x20 [ 19.271377] [ 19.271407] Allocated by task 237: [ 19.271487] kasan_save_stack+0x3c/0x68 [ 19.271587] kasan_save_track+0x20/0x40 [ 19.271655] kasan_save_alloc_info+0x40/0x58 [ 19.271722] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.271763] remove_element+0x130/0x1f8 [ 19.271823] mempool_alloc_preallocated+0x58/0xc0 [ 19.271865] mempool_double_free_helper+0x94/0x2e8 [ 19.271906] mempool_kmalloc_double_free+0xc0/0x118 [ 19.271969] kunit_try_run_case+0x170/0x3f0 [ 19.272139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.272228] kthread+0x328/0x630 [ 19.272326] ret_from_fork+0x10/0x20 [ 19.272385] [ 19.272444] Freed by task 237: [ 19.272546] kasan_save_stack+0x3c/0x68 [ 19.272611] kasan_save_track+0x20/0x40 [ 19.272655] kasan_save_free_info+0x4c/0x78 [ 19.272738] __kasan_mempool_poison_object+0xc0/0x150 [ 19.272779] mempool_free+0x28c/0x328 [ 19.272832] mempool_double_free_helper+0x100/0x2e8 [ 19.272873] mempool_kmalloc_double_free+0xc0/0x118 [ 19.272914] kunit_try_run_case+0x170/0x3f0 [ 19.272953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.273113] kthread+0x328/0x630 [ 19.273184] ret_from_fork+0x10/0x20 [ 19.273222] [ 19.273241] The buggy address belongs to the object at fff00000c5b89e00 [ 19.273241] which belongs to the cache kmalloc-128 of size 128 [ 19.273326] The buggy address is located 0 bytes inside of [ 19.273326] 128-byte region [fff00000c5b89e00, fff00000c5b89e80) [ 19.273394] [ 19.273416] The buggy address belongs to the physical page: [ 19.273452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b89 [ 19.273511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.273568] page_type: f5(slab) [ 19.273605] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.273662] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.273702] page dumped because: kasan: bad access detected [ 19.273734] [ 19.273751] Memory state around the buggy address: [ 19.273782] fff00000c5b89d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.273836] fff00000c5b89d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.273878] >fff00000c5b89e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.273926] ^ [ 19.273954] fff00000c5b89e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.273996] fff00000c5b89f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.274034] ================================================================== [ 19.288153] ================================================================== [ 19.288228] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.288310] Free of addr fff00000c78e4000 by task kunit_try_catch/239 [ 19.288354] [ 19.288392] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.288474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.288500] Hardware name: linux,dummy-virt (DT) [ 19.288531] Call trace: [ 19.288554] show_stack+0x20/0x38 (C) [ 19.288603] dump_stack_lvl+0x8c/0xd0 [ 19.288655] print_report+0x118/0x5d0 [ 19.288700] kasan_report_invalid_free+0xc0/0xe8 [ 19.288757] __kasan_mempool_poison_object+0x14c/0x150 [ 19.288807] mempool_free+0x28c/0x328 [ 19.288853] mempool_double_free_helper+0x150/0x2e8 [ 19.288903] mempool_kmalloc_large_double_free+0xc0/0x118 [ 19.288955] kunit_try_run_case+0x170/0x3f0 [ 19.289005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.289054] kthread+0x328/0x630 [ 19.289099] ret_from_fork+0x10/0x20 [ 19.289146] [ 19.289169] The buggy address belongs to the physical page: [ 19.289204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4 [ 19.289258] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.289315] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.289371] page_type: f8(unknown) [ 19.289410] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.289466] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.289514] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.289562] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.289610] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff [ 19.289658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.289699] page dumped because: kasan: bad access detected [ 19.289730] [ 19.289747] Memory state around the buggy address: [ 19.289780] fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.289822] fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.289864] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.289903] ^ [ 19.289929] fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.289969] fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.290007] ================================================================== [ 19.296893] ================================================================== [ 19.296957] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 19.297135] Free of addr fff00000c78e4000 by task kunit_try_catch/241 [ 19.297188] [ 19.297223] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.297314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.297482] Hardware name: linux,dummy-virt (DT) [ 19.297519] Call trace: [ 19.297636] show_stack+0x20/0x38 (C) [ 19.297700] dump_stack_lvl+0x8c/0xd0 [ 19.297775] print_report+0x118/0x5d0 [ 19.297892] kasan_report_invalid_free+0xc0/0xe8 [ 19.297971] __kasan_mempool_poison_pages+0xe0/0xe8 [ 19.298032] mempool_free+0x24c/0x328 [ 19.298114] mempool_double_free_helper+0x150/0x2e8 [ 19.298181] mempool_page_alloc_double_free+0xbc/0x118 [ 19.298248] kunit_try_run_case+0x170/0x3f0 [ 19.298352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.298404] kthread+0x328/0x630 [ 19.298458] ret_from_fork+0x10/0x20 [ 19.298506] [ 19.298527] The buggy address belongs to the physical page: [ 19.298560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4 [ 19.298612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.298683] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.298771] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.298812] page dumped because: kasan: bad access detected [ 19.298843] [ 19.298860] Memory state around the buggy address: [ 19.299091] fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.299146] fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.299208] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.299271] ^ [ 19.299327] fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.299371] fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.299409] ==================================================================
[ 12.841380] ================================================================== [ 12.842236] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 12.843301] Free of addr ffff888103ca0000 by task kunit_try_catch/259 [ 12.843548] [ 12.843720] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 12.843767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.843778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.843799] Call Trace: [ 12.843811] <TASK> [ 12.843945] dump_stack_lvl+0x73/0xb0 [ 12.843974] print_report+0xd1/0x610 [ 12.843998] ? __virt_addr_valid+0x1db/0x2d0 [ 12.844019] ? kasan_addr_to_slab+0x11/0xa0 [ 12.844039] ? mempool_double_free_helper+0x184/0x370 [ 12.844063] kasan_report_invalid_free+0x10a/0x130 [ 12.844088] ? mempool_double_free_helper+0x184/0x370 [ 12.844114] ? mempool_double_free_helper+0x184/0x370 [ 12.844137] __kasan_mempool_poison_pages+0x115/0x130 [ 12.844160] mempool_free+0x290/0x380 [ 12.844183] mempool_double_free_helper+0x184/0x370 [ 12.844207] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 12.844247] ? finish_task_switch.isra.0+0x153/0x700 [ 12.844274] mempool_page_alloc_double_free+0xe8/0x140 [ 12.844296] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 12.844315] ? dequeue_task_fair+0x156/0x4e0 [ 12.844338] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 12.844546] ? __pfx_mempool_free_pages+0x10/0x10 [ 12.844575] ? __pfx_read_tsc+0x10/0x10 [ 12.844598] ? ktime_get_ts64+0x86/0x230 [ 12.844624] kunit_try_run_case+0x1a5/0x480 [ 12.844646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.844682] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.844703] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.844727] ? __kthread_parkme+0x82/0x180 [ 12.844748] ? preempt_count_sub+0x50/0x80 [ 12.844772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.844792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.844815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.844838] kthread+0x337/0x6f0 [ 12.844854] ? trace_preempt_on+0x20/0xc0 [ 12.844877] ? __pfx_kthread+0x10/0x10 [ 12.844895] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.844921] ? calculate_sigpending+0x7b/0xa0 [ 12.844943] ? __pfx_kthread+0x10/0x10 [ 12.844961] ret_from_fork+0x41/0x80 [ 12.844981] ? __pfx_kthread+0x10/0x10 [ 12.845000] ret_from_fork_asm+0x1a/0x30 [ 12.845032] </TASK> [ 12.845045] [ 12.863097] The buggy address belongs to the physical page: [ 12.863304] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ca0 [ 12.864325] flags: 0x200000000000000(node=0|zone=2) [ 12.864959] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 12.865787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 12.866698] page dumped because: kasan: bad access detected [ 12.867074] [ 12.867148] Memory state around the buggy address: [ 12.867321] ffff888103c9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.868209] ffff888103c9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.868995] >ffff888103ca0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.869767] ^ [ 12.870155] ffff888103ca0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.870731] ffff888103ca0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.871296] ================================================================== [ 12.809859] ================================================================== [ 12.810283] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 12.811306] Free of addr ffff888103c9c000 by task kunit_try_catch/257 [ 12.811838] [ 12.812020] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 12.812211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.812303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.812328] Call Trace: [ 12.812341] <TASK> [ 12.812373] dump_stack_lvl+0x73/0xb0 [ 12.812401] print_report+0xd1/0x610 [ 12.812423] ? __virt_addr_valid+0x1db/0x2d0 [ 12.812445] ? kasan_addr_to_slab+0x11/0xa0 [ 12.812465] ? mempool_double_free_helper+0x184/0x370 [ 12.812489] kasan_report_invalid_free+0x10a/0x130 [ 12.812513] ? mempool_double_free_helper+0x184/0x370 [ 12.812540] ? mempool_double_free_helper+0x184/0x370 [ 12.812562] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 12.812587] mempool_free+0x2ec/0x380 [ 12.812610] mempool_double_free_helper+0x184/0x370 [ 12.812634] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 12.812658] ? dequeue_entities+0x852/0x1740 [ 12.812689] ? irqentry_exit+0x2a/0x60 [ 12.812707] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.812731] mempool_kmalloc_large_double_free+0xed/0x140 [ 12.812755] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 12.812782] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.812802] ? __pfx_mempool_kfree+0x10/0x10 [ 12.812823] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 12.812849] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 12.812876] kunit_try_run_case+0x1a5/0x480 [ 12.812896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.812920] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.812941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.812965] ? __kthread_parkme+0x82/0x180 [ 12.812986] ? preempt_count_sub+0x50/0x80 [ 12.813013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.813035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.813058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.813082] kthread+0x337/0x6f0 [ 12.813099] ? trace_preempt_on+0x20/0xc0 [ 12.813122] ? __pfx_kthread+0x10/0x10 [ 12.813139] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.813161] ? calculate_sigpending+0x7b/0xa0 [ 12.813183] ? __pfx_kthread+0x10/0x10 [ 12.813201] ret_from_fork+0x41/0x80 [ 12.813234] ? __pfx_kthread+0x10/0x10 [ 12.813252] ret_from_fork_asm+0x1a/0x30 [ 12.813283] </TASK> [ 12.813294] [ 12.826829] The buggy address belongs to the physical page: [ 12.827320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c9c [ 12.827567] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.828127] flags: 0x200000000000040(head|node=0|zone=2) [ 12.828734] page_type: f8(unknown) [ 12.829089] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.829905] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.830297] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.830852] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.831793] head: 0200000000000002 ffffea00040f2701 00000000ffffffff 00000000ffffffff [ 12.832484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.833010] page dumped because: kasan: bad access detected [ 12.833421] [ 12.833493] Memory state around the buggy address: [ 12.833645] ffff888103c9bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.834202] ffff888103c9bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.834909] >ffff888103c9c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.835629] ^ [ 12.836007] ffff888103c9c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.836546] ffff888103c9c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.836975] ================================================================== [ 12.771239] ================================================================== [ 12.772159] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 12.772968] Free of addr ffff888103cfc500 by task kunit_try_catch/255 [ 12.773438] [ 12.773644] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 12.773767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.773781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.773804] Call Trace: [ 12.773816] <TASK> [ 12.773833] dump_stack_lvl+0x73/0xb0 [ 12.773864] print_report+0xd1/0x610 [ 12.773888] ? __virt_addr_valid+0x1db/0x2d0 [ 12.773913] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.773935] ? mempool_double_free_helper+0x184/0x370 [ 12.773960] kasan_report_invalid_free+0x10a/0x130 [ 12.773984] ? mempool_double_free_helper+0x184/0x370 [ 12.774011] ? mempool_double_free_helper+0x184/0x370 [ 12.774033] ? mempool_double_free_helper+0x184/0x370 [ 12.774056] check_slab_allocation+0x101/0x130 [ 12.774079] __kasan_mempool_poison_object+0x91/0x1d0 [ 12.774103] mempool_free+0x2ec/0x380 [ 12.774128] mempool_double_free_helper+0x184/0x370 [ 12.774152] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 12.774175] ? update_load_avg+0x1be/0x21b0 [ 12.774200] ? finish_task_switch.isra.0+0x153/0x700 [ 12.774240] mempool_kmalloc_double_free+0xed/0x140 [ 12.774264] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 12.774288] ? dequeue_task_fair+0x166/0x4e0 [ 12.774310] ? __pfx_mempool_kmalloc+0x10/0x10 [ 12.774328] ? __pfx_mempool_kfree+0x10/0x10 [ 12.774350] ? __pfx_read_tsc+0x10/0x10 [ 12.774370] ? ktime_get_ts64+0x86/0x230 [ 12.774395] kunit_try_run_case+0x1a5/0x480 [ 12.774418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.774436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.774459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.774483] ? __kthread_parkme+0x82/0x180 [ 12.774505] ? preempt_count_sub+0x50/0x80 [ 12.774529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.774549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.774572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.774595] kthread+0x337/0x6f0 [ 12.774611] ? trace_preempt_on+0x20/0xc0 [ 12.774636] ? __pfx_kthread+0x10/0x10 [ 12.774654] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.774686] ? calculate_sigpending+0x7b/0xa0 [ 12.774709] ? __pfx_kthread+0x10/0x10 [ 12.774727] ret_from_fork+0x41/0x80 [ 12.774747] ? __pfx_kthread+0x10/0x10 [ 12.774764] ret_from_fork_asm+0x1a/0x30 [ 12.774796] </TASK> [ 12.774807] [ 12.788038] Allocated by task 255: [ 12.788452] kasan_save_stack+0x45/0x70 [ 12.788651] kasan_save_track+0x18/0x40 [ 12.789058] kasan_save_alloc_info+0x3b/0x50 [ 12.789267] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 12.789901] remove_element+0x11e/0x190 [ 12.790131] mempool_alloc_preallocated+0x4d/0x90 [ 12.790486] mempool_double_free_helper+0x8a/0x370 [ 12.791054] mempool_kmalloc_double_free+0xed/0x140 [ 12.791421] kunit_try_run_case+0x1a5/0x480 [ 12.791614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.791958] kthread+0x337/0x6f0 [ 12.792188] ret_from_fork+0x41/0x80 [ 12.792665] ret_from_fork_asm+0x1a/0x30 [ 12.792953] [ 12.793195] Freed by task 255: [ 12.793488] kasan_save_stack+0x45/0x70 [ 12.793818] kasan_save_track+0x18/0x40 [ 12.794208] kasan_save_free_info+0x3f/0x60 [ 12.794680] __kasan_mempool_poison_object+0x131/0x1d0 [ 12.794971] mempool_free+0x2ec/0x380 [ 12.795170] mempool_double_free_helper+0x109/0x370 [ 12.795422] mempool_kmalloc_double_free+0xed/0x140 [ 12.795642] kunit_try_run_case+0x1a5/0x480 [ 12.796191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.796616] kthread+0x337/0x6f0 [ 12.796961] ret_from_fork+0x41/0x80 [ 12.797321] ret_from_fork_asm+0x1a/0x30 [ 12.797763] [ 12.797871] The buggy address belongs to the object at ffff888103cfc500 [ 12.797871] which belongs to the cache kmalloc-128 of size 128 [ 12.798625] The buggy address is located 0 bytes inside of [ 12.798625] 128-byte region [ffff888103cfc500, ffff888103cfc580) [ 12.799342] [ 12.799619] The buggy address belongs to the physical page: [ 12.799995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cfc [ 12.800703] flags: 0x200000000000000(node=0|zone=2) [ 12.800924] page_type: f5(slab) [ 12.801083] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.801419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.801986] page dumped because: kasan: bad access detected [ 12.802469] [ 12.802721] Memory state around the buggy address: [ 12.803071] ffff888103cfc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.803607] ffff888103cfc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.804107] >ffff888103cfc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.804788] ^ [ 12.805025] ffff888103cfc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.805340] ffff888103cfc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.805635] ==================================================================