Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.000113] ================================================================== [ 18.000287] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.000394] Free of addr fff00000c799c000 by task kunit_try_catch/240 [ 18.000498] [ 18.000532] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.000633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.000659] Hardware name: linux,dummy-virt (DT) [ 18.000691] Call trace: [ 18.000712] show_stack+0x20/0x38 (C) [ 18.001073] dump_stack_lvl+0x8c/0xd0 [ 18.001194] print_report+0x118/0x5d0 [ 18.001330] kasan_report_invalid_free+0xc0/0xe8 [ 18.001406] __kasan_mempool_poison_pages+0xe0/0xe8 [ 18.001505] mempool_free+0x24c/0x328 [ 18.001612] mempool_double_free_helper+0x150/0x2e8 [ 18.001709] mempool_page_alloc_double_free+0xbc/0x118 [ 18.001804] kunit_try_run_case+0x170/0x3f0 [ 18.001932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.001997] kthread+0x328/0x630 [ 18.002038] ret_from_fork+0x10/0x20 [ 18.002394] [ 18.002455] The buggy address belongs to the physical page: [ 18.002508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799c [ 18.002611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.002748] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.002846] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.002945] page dumped because: kasan: bad access detected [ 18.003063] [ 18.003156] Memory state around the buggy address: [ 18.003281] fff00000c799bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.003327] fff00000c799bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.003389] >fff00000c799c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.003641] ^ [ 18.003688] fff00000c799c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.003735] fff00000c799c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.003833] ================================================================== [ 17.989636] ================================================================== [ 17.989699] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.989770] Free of addr fff00000c799c000 by task kunit_try_catch/238 [ 17.989814] [ 17.989873] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.989972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.989999] Hardware name: linux,dummy-virt (DT) [ 17.990030] Call trace: [ 17.990050] show_stack+0x20/0x38 (C) [ 17.990281] dump_stack_lvl+0x8c/0xd0 [ 17.990344] print_report+0x118/0x5d0 [ 17.990432] kasan_report_invalid_free+0xc0/0xe8 [ 17.990484] __kasan_mempool_poison_object+0x14c/0x150 [ 17.990538] mempool_free+0x28c/0x328 [ 17.990582] mempool_double_free_helper+0x150/0x2e8 [ 17.990656] mempool_kmalloc_large_double_free+0xc0/0x118 [ 17.990708] kunit_try_run_case+0x170/0x3f0 [ 17.990755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.990807] kthread+0x328/0x630 [ 17.990848] ret_from_fork+0x10/0x20 [ 17.990893] [ 17.990914] The buggy address belongs to the physical page: [ 17.990944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799c [ 17.990999] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.991046] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.991215] page_type: f8(unknown) [ 17.991264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.991316] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.991366] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.991561] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.991625] head: 0bfffe0000000002 ffffc1ffc31e6701 00000000ffffffff 00000000ffffffff [ 17.991676] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.991753] page dumped because: kasan: bad access detected [ 17.991815] [ 17.991834] Memory state around the buggy address: [ 17.991870] fff00000c799bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.991916] fff00000c799bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.991960] >fff00000c799c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.991998] ^ [ 17.992026] fff00000c799c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.992068] fff00000c799c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.992115] ================================================================== [ 17.975927] ================================================================== [ 17.975993] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 17.976057] Free of addr fff00000c58c3200 by task kunit_try_catch/236 [ 17.976179] [ 17.976277] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.976402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.976548] Hardware name: linux,dummy-virt (DT) [ 17.976637] Call trace: [ 17.976671] show_stack+0x20/0x38 (C) [ 17.976723] dump_stack_lvl+0x8c/0xd0 [ 17.977063] print_report+0x118/0x5d0 [ 17.977174] kasan_report_invalid_free+0xc0/0xe8 [ 17.977307] check_slab_allocation+0xd4/0x108 [ 17.977526] __kasan_mempool_poison_object+0x78/0x150 [ 17.977687] mempool_free+0x28c/0x328 [ 17.977794] mempool_double_free_helper+0x150/0x2e8 [ 17.977897] mempool_kmalloc_double_free+0xc0/0x118 [ 17.977992] kunit_try_run_case+0x170/0x3f0 [ 17.978041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978141] kthread+0x328/0x630 [ 17.978416] ret_from_fork+0x10/0x20 [ 17.978579] [ 17.978755] Allocated by task 236: [ 17.978788] kasan_save_stack+0x3c/0x68 [ 17.978978] kasan_save_track+0x20/0x40 [ 17.979119] kasan_save_alloc_info+0x40/0x58 [ 17.979206] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.979352] remove_element+0x130/0x1f8 [ 17.979438] mempool_alloc_preallocated+0x58/0xc0 [ 17.979515] mempool_double_free_helper+0x94/0x2e8 [ 17.979666] mempool_kmalloc_double_free+0xc0/0x118 [ 17.979771] kunit_try_run_case+0x170/0x3f0 [ 17.979907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.979952] kthread+0x328/0x630 [ 17.980493] ret_from_fork+0x10/0x20 [ 17.980692] [ 17.980715] Freed by task 236: [ 17.980745] kasan_save_stack+0x3c/0x68 [ 17.980843] kasan_save_track+0x20/0x40 [ 17.980883] kasan_save_free_info+0x4c/0x78 [ 17.980921] __kasan_mempool_poison_object+0xc0/0x150 [ 17.980963] mempool_free+0x28c/0x328 [ 17.980997] mempool_double_free_helper+0x100/0x2e8 [ 17.981035] mempool_kmalloc_double_free+0xc0/0x118 [ 17.981075] kunit_try_run_case+0x170/0x3f0 [ 17.981112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.981173] kthread+0x328/0x630 [ 17.981218] ret_from_fork+0x10/0x20 [ 17.981252] [ 17.981271] The buggy address belongs to the object at fff00000c58c3200 [ 17.981271] which belongs to the cache kmalloc-128 of size 128 [ 17.981500] The buggy address is located 0 bytes inside of [ 17.981500] 128-byte region [fff00000c58c3200, fff00000c58c3280) [ 17.981635] [ 17.981657] The buggy address belongs to the physical page: [ 17.981690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 17.981763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.981897] page_type: f5(slab) [ 17.981964] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.982043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.982084] page dumped because: kasan: bad access detected [ 17.982215] [ 17.982234] Memory state around the buggy address: [ 17.982267] fff00000c58c3100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.982321] fff00000c58c3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.982414] >fff00000c58c3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.982453] ^ [ 17.982482] fff00000c58c3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.982687] fff00000c58c3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.982760] ==================================================================
[ 18.735330] ================================================================== [ 18.735394] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.735447] Free of addr fff00000c78ec000 by task kunit_try_catch/238 [ 18.735491] [ 18.735525] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.735605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.735632] Hardware name: linux,dummy-virt (DT) [ 18.735664] Call trace: [ 18.735686] show_stack+0x20/0x38 (C) [ 18.735733] dump_stack_lvl+0x8c/0xd0 [ 18.735779] print_report+0x118/0x5d0 [ 18.735825] kasan_report_invalid_free+0xc0/0xe8 [ 18.736228] __kasan_mempool_poison_object+0x14c/0x150 [ 18.736427] mempool_free+0x28c/0x328 [ 18.736606] mempool_double_free_helper+0x150/0x2e8 [ 18.736708] mempool_kmalloc_large_double_free+0xc0/0x118 [ 18.736774] kunit_try_run_case+0x170/0x3f0 [ 18.736821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.737177] kthread+0x328/0x630 [ 18.737249] ret_from_fork+0x10/0x20 [ 18.737299] [ 18.737320] The buggy address belongs to the physical page: [ 18.737366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ec [ 18.737425] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.737794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.737874] page_type: f8(unknown) [ 18.738081] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.738251] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.738307] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.738358] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.738419] head: 0bfffe0000000002 ffffc1ffc31e3b01 00000000ffffffff 00000000ffffffff [ 18.738704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.738805] page dumped because: kasan: bad access detected [ 18.738837] [ 18.738854] Memory state around the buggy address: [ 18.738906] fff00000c78ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.739259] fff00000c78ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.739422] >fff00000c78ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.739469] ^ [ 18.739496] fff00000c78ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.739539] fff00000c78ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.739578] ================================================================== [ 18.718922] ================================================================== [ 18.719099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.719201] Free of addr fff00000c5ae0200 by task kunit_try_catch/236 [ 18.719246] [ 18.719479] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.719816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.719872] Hardware name: linux,dummy-virt (DT) [ 18.719957] Call trace: [ 18.719978] show_stack+0x20/0x38 (C) [ 18.720047] dump_stack_lvl+0x8c/0xd0 [ 18.720092] print_report+0x118/0x5d0 [ 18.720140] kasan_report_invalid_free+0xc0/0xe8 [ 18.720199] check_slab_allocation+0xd4/0x108 [ 18.720447] __kasan_mempool_poison_object+0x78/0x150 [ 18.720562] mempool_free+0x28c/0x328 [ 18.720655] mempool_double_free_helper+0x150/0x2e8 [ 18.720784] mempool_kmalloc_double_free+0xc0/0x118 [ 18.720851] kunit_try_run_case+0x170/0x3f0 [ 18.720993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.721047] kthread+0x328/0x630 [ 18.721089] ret_from_fork+0x10/0x20 [ 18.721154] [ 18.721254] Allocated by task 236: [ 18.721284] kasan_save_stack+0x3c/0x68 [ 18.721324] kasan_save_track+0x20/0x40 [ 18.721361] kasan_save_alloc_info+0x40/0x58 [ 18.721399] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.721559] remove_element+0x130/0x1f8 [ 18.721604] mempool_alloc_preallocated+0x58/0xc0 [ 18.721762] mempool_double_free_helper+0x94/0x2e8 [ 18.721954] mempool_kmalloc_double_free+0xc0/0x118 [ 18.722070] kunit_try_run_case+0x170/0x3f0 [ 18.722107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.722151] kthread+0x328/0x630 [ 18.722235] ret_from_fork+0x10/0x20 [ 18.722272] [ 18.722291] Freed by task 236: [ 18.722319] kasan_save_stack+0x3c/0x68 [ 18.722357] kasan_save_track+0x20/0x40 [ 18.722509] kasan_save_free_info+0x4c/0x78 [ 18.722550] __kasan_mempool_poison_object+0xc0/0x150 [ 18.722887] mempool_free+0x28c/0x328 [ 18.722962] mempool_double_free_helper+0x100/0x2e8 [ 18.723010] mempool_kmalloc_double_free+0xc0/0x118 [ 18.723052] kunit_try_run_case+0x170/0x3f0 [ 18.723191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.723236] kthread+0x328/0x630 [ 18.723269] ret_from_fork+0x10/0x20 [ 18.723305] [ 18.723324] The buggy address belongs to the object at fff00000c5ae0200 [ 18.723324] which belongs to the cache kmalloc-128 of size 128 [ 18.723385] The buggy address is located 0 bytes inside of [ 18.723385] 128-byte region [fff00000c5ae0200, fff00000c5ae0280) [ 18.723446] [ 18.723465] The buggy address belongs to the physical page: [ 18.723504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 18.723610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.723820] page_type: f5(slab) [ 18.723866] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.724004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.724046] page dumped because: kasan: bad access detected [ 18.724078] [ 18.724096] Memory state around the buggy address: [ 18.724127] fff00000c5ae0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.724458] fff00000c5ae0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.724774] >fff00000c5ae0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.724858] ^ [ 18.725077] fff00000c5ae0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.725173] fff00000c5ae0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.725246] ================================================================== [ 18.752901] ================================================================== [ 18.752963] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 18.753027] Free of addr fff00000c78ec000 by task kunit_try_catch/240 [ 18.753242] [ 18.753275] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.753594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.753622] Hardware name: linux,dummy-virt (DT) [ 18.753731] Call trace: [ 18.753839] show_stack+0x20/0x38 (C) [ 18.754008] dump_stack_lvl+0x8c/0xd0 [ 18.754457] print_report+0x118/0x5d0 [ 18.754555] kasan_report_invalid_free+0xc0/0xe8 [ 18.754607] __kasan_mempool_poison_pages+0xe0/0xe8 [ 18.754659] mempool_free+0x24c/0x328 [ 18.754703] mempool_double_free_helper+0x150/0x2e8 [ 18.755295] mempool_page_alloc_double_free+0xbc/0x118 [ 18.755542] kunit_try_run_case+0x170/0x3f0 [ 18.755861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.755946] kthread+0x328/0x630 [ 18.756005] ret_from_fork+0x10/0x20 [ 18.756053] [ 18.756075] The buggy address belongs to the physical page: [ 18.756107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ec [ 18.756167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.756241] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.756292] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.756334] page dumped because: kasan: bad access detected [ 18.756759] [ 18.756779] Memory state around the buggy address: [ 18.756819] fff00000c78ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.757013] fff00000c78ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.757320] >fff00000c78ec000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.757364] ^ [ 18.757395] fff00000c78ec080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.757441] fff00000c78ec100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.757479] ==================================================================
[ 14.346146] ================================================================== [ 14.346847] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.347826] Free of addr ffff888103a64000 by task kunit_try_catch/257 [ 14.348058] [ 14.348259] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.348317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.348329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.348350] Call Trace: [ 14.348363] <TASK> [ 14.348398] dump_stack_lvl+0x73/0xb0 [ 14.348432] print_report+0xd1/0x610 [ 14.348467] ? __virt_addr_valid+0x1db/0x2d0 [ 14.348510] ? kasan_addr_to_slab+0x11/0xa0 [ 14.348532] ? mempool_double_free_helper+0x184/0x370 [ 14.348558] kasan_report_invalid_free+0x10a/0x130 [ 14.348691] ? mempool_double_free_helper+0x184/0x370 [ 14.348720] ? mempool_double_free_helper+0x184/0x370 [ 14.348745] __kasan_mempool_poison_pages+0x115/0x130 [ 14.348771] mempool_free+0x290/0x380 [ 14.348799] mempool_double_free_helper+0x184/0x370 [ 14.348824] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.348848] ? update_load_avg+0x1be/0x21b0 [ 14.348877] ? finish_task_switch.isra.0+0x153/0x700 [ 14.348904] mempool_page_alloc_double_free+0xe8/0x140 [ 14.348933] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.348964] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.348988] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.349015] ? __pfx_read_tsc+0x10/0x10 [ 14.349037] ? ktime_get_ts64+0x86/0x230 [ 14.349063] kunit_try_run_case+0x1a5/0x480 [ 14.349089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.349113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.349138] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.349163] ? __kthread_parkme+0x82/0x180 [ 14.349185] ? preempt_count_sub+0x50/0x80 [ 14.349209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.349234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.349260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.349286] kthread+0x337/0x6f0 [ 14.349305] ? trace_preempt_on+0x20/0xc0 [ 14.349330] ? __pfx_kthread+0x10/0x10 [ 14.349351] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.349372] ? calculate_sigpending+0x7b/0xa0 [ 14.349397] ? __pfx_kthread+0x10/0x10 [ 14.349420] ret_from_fork+0x116/0x1d0 [ 14.349439] ? __pfx_kthread+0x10/0x10 [ 14.349475] ret_from_fork_asm+0x1a/0x30 [ 14.349505] </TASK> [ 14.349516] [ 14.359139] The buggy address belongs to the physical page: [ 14.359417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a64 [ 14.359984] flags: 0x200000000000000(node=0|zone=2) [ 14.360165] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.360732] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.361181] page dumped because: kasan: bad access detected [ 14.361407] [ 14.361491] Memory state around the buggy address: [ 14.361735] ffff888103a63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.362153] ffff888103a63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.362476] >ffff888103a64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.362884] ^ [ 14.363006] ffff888103a64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.363347] ffff888103a64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.363691] ================================================================== [ 14.325321] ================================================================== [ 14.326124] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.326443] Free of addr ffff888103a64000 by task kunit_try_catch/255 [ 14.326814] [ 14.326936] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.326984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.326996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.327018] Call Trace: [ 14.327053] <TASK> [ 14.327069] dump_stack_lvl+0x73/0xb0 [ 14.327102] print_report+0xd1/0x610 [ 14.327127] ? __virt_addr_valid+0x1db/0x2d0 [ 14.327153] ? kasan_addr_to_slab+0x11/0xa0 [ 14.327175] ? mempool_double_free_helper+0x184/0x370 [ 14.327202] kasan_report_invalid_free+0x10a/0x130 [ 14.327250] ? mempool_double_free_helper+0x184/0x370 [ 14.327279] ? mempool_double_free_helper+0x184/0x370 [ 14.327304] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.327330] mempool_free+0x2ec/0x380 [ 14.327358] mempool_double_free_helper+0x184/0x370 [ 14.327384] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.327422] ? __kasan_check_write+0x18/0x20 [ 14.327473] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.327498] ? finish_task_switch.isra.0+0x153/0x700 [ 14.327526] mempool_kmalloc_large_double_free+0xed/0x140 [ 14.327553] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.327636] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.327660] ? __pfx_mempool_kfree+0x10/0x10 [ 14.327686] ? __pfx_read_tsc+0x10/0x10 [ 14.327729] ? ktime_get_ts64+0x86/0x230 [ 14.327755] kunit_try_run_case+0x1a5/0x480 [ 14.327783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.327807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.327833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.327858] ? __kthread_parkme+0x82/0x180 [ 14.327881] ? preempt_count_sub+0x50/0x80 [ 14.327906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.327931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.327956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.327982] kthread+0x337/0x6f0 [ 14.328003] ? trace_preempt_on+0x20/0xc0 [ 14.328027] ? __pfx_kthread+0x10/0x10 [ 14.328047] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.328070] ? calculate_sigpending+0x7b/0xa0 [ 14.328095] ? __pfx_kthread+0x10/0x10 [ 14.328117] ret_from_fork+0x116/0x1d0 [ 14.328136] ? __pfx_kthread+0x10/0x10 [ 14.328157] ret_from_fork_asm+0x1a/0x30 [ 14.328189] </TASK> [ 14.328199] [ 14.337130] The buggy address belongs to the physical page: [ 14.337438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a64 [ 14.337840] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.338135] flags: 0x200000000000040(head|node=0|zone=2) [ 14.338393] page_type: f8(unknown) [ 14.338551] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.338899] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.339266] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.339842] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.340081] head: 0200000000000002 ffffea00040e9901 00000000ffffffff 00000000ffffffff [ 14.340372] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.340874] page dumped because: kasan: bad access detected [ 14.341051] [ 14.341144] Memory state around the buggy address: [ 14.341369] ffff888103a63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.341834] ffff888103a63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.342076] >ffff888103a64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.342415] ^ [ 14.342629] ffff888103a64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.342999] ffff888103a64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.343305] ================================================================== [ 14.293904] ================================================================== [ 14.295087] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.295344] Free of addr ffff8881026ce500 by task kunit_try_catch/253 [ 14.296585] [ 14.297019] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.297072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.297085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.297117] Call Trace: [ 14.297129] <TASK> [ 14.297146] dump_stack_lvl+0x73/0xb0 [ 14.297178] print_report+0xd1/0x610 [ 14.297202] ? __virt_addr_valid+0x1db/0x2d0 [ 14.297228] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.297252] ? mempool_double_free_helper+0x184/0x370 [ 14.297277] kasan_report_invalid_free+0x10a/0x130 [ 14.297302] ? mempool_double_free_helper+0x184/0x370 [ 14.297330] ? mempool_double_free_helper+0x184/0x370 [ 14.297353] ? mempool_double_free_helper+0x184/0x370 [ 14.297377] check_slab_allocation+0x101/0x130 [ 14.297400] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.297702] mempool_free+0x2ec/0x380 [ 14.297737] mempool_double_free_helper+0x184/0x370 [ 14.297763] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.297790] ? update_curr+0x5c1/0x810 [ 14.297820] mempool_kmalloc_double_free+0xed/0x140 [ 14.297845] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.297871] ? schedule+0x7c/0x2e0 [ 14.297894] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.297917] ? __pfx_mempool_kfree+0x10/0x10 [ 14.297943] ? __pfx_read_tsc+0x10/0x10 [ 14.297965] ? ktime_get_ts64+0x86/0x230 [ 14.297987] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.298014] kunit_try_run_case+0x1a5/0x480 [ 14.298041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.298067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.298092] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 14.298115] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 14.298142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.298166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.298191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.298217] kthread+0x337/0x6f0 [ 14.298237] ? trace_preempt_on+0x20/0xc0 [ 14.298261] ? __pfx_kthread+0x10/0x10 [ 14.298282] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.298304] ? calculate_sigpending+0x7b/0xa0 [ 14.298329] ? __pfx_kthread+0x10/0x10 [ 14.298351] ret_from_fork+0x116/0x1d0 [ 14.298369] ? __pfx_kthread+0x10/0x10 [ 14.298390] ret_from_fork_asm+0x1a/0x30 [ 14.298421] </TASK> [ 14.298432] [ 14.309148] Allocated by task 253: [ 14.309355] kasan_save_stack+0x45/0x70 [ 14.309678] kasan_save_track+0x18/0x40 [ 14.309904] kasan_save_alloc_info+0x3b/0x50 [ 14.310142] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.310410] remove_element+0x11e/0x190 [ 14.310889] mempool_alloc_preallocated+0x4d/0x90 [ 14.311080] mempool_double_free_helper+0x8a/0x370 [ 14.311380] mempool_kmalloc_double_free+0xed/0x140 [ 14.311696] kunit_try_run_case+0x1a5/0x480 [ 14.312081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312340] kthread+0x337/0x6f0 [ 14.312543] ret_from_fork+0x116/0x1d0 [ 14.312785] ret_from_fork_asm+0x1a/0x30 [ 14.313024] [ 14.313146] Freed by task 253: [ 14.313314] kasan_save_stack+0x45/0x70 [ 14.313641] kasan_save_track+0x18/0x40 [ 14.313853] kasan_save_free_info+0x3f/0x60 [ 14.314004] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.314251] mempool_free+0x2ec/0x380 [ 14.314511] mempool_double_free_helper+0x109/0x370 [ 14.314819] mempool_kmalloc_double_free+0xed/0x140 [ 14.314989] kunit_try_run_case+0x1a5/0x480 [ 14.315196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.315475] kthread+0x337/0x6f0 [ 14.315646] ret_from_fork+0x116/0x1d0 [ 14.315830] ret_from_fork_asm+0x1a/0x30 [ 14.316035] [ 14.316133] The buggy address belongs to the object at ffff8881026ce500 [ 14.316133] which belongs to the cache kmalloc-128 of size 128 [ 14.316900] The buggy address is located 0 bytes inside of [ 14.316900] 128-byte region [ffff8881026ce500, ffff8881026ce580) [ 14.317435] [ 14.317598] The buggy address belongs to the physical page: [ 14.317867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce [ 14.318251] flags: 0x200000000000000(node=0|zone=2) [ 14.318480] page_type: f5(slab) [ 14.318672] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.319003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.319458] page dumped because: kasan: bad access detected [ 14.319842] [ 14.319941] Memory state around the buggy address: [ 14.320164] ffff8881026ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.320510] ffff8881026ce480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321010] >ffff8881026ce500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.321347] ^ [ 14.321650] ffff8881026ce580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321981] ffff8881026ce600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.322307] ==================================================================
[ 14.557436] ================================================================== [ 14.558163] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.558526] Free of addr ffff888102cc0000 by task kunit_try_catch/257 [ 14.558817] [ 14.558986] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.559034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.559047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.559091] Call Trace: [ 14.559103] <TASK> [ 14.559118] dump_stack_lvl+0x73/0xb0 [ 14.559163] print_report+0xd1/0x610 [ 14.559186] ? __virt_addr_valid+0x1db/0x2d0 [ 14.559212] ? kasan_addr_to_slab+0x11/0xa0 [ 14.559241] ? mempool_double_free_helper+0x184/0x370 [ 14.559268] kasan_report_invalid_free+0x10a/0x130 [ 14.559294] ? mempool_double_free_helper+0x184/0x370 [ 14.559323] ? mempool_double_free_helper+0x184/0x370 [ 14.559357] __kasan_mempool_poison_pages+0x115/0x130 [ 14.559384] mempool_free+0x290/0x380 [ 14.559412] mempool_double_free_helper+0x184/0x370 [ 14.559450] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.559490] ? finish_task_switch.isra.0+0x153/0x700 [ 14.559517] mempool_page_alloc_double_free+0xe8/0x140 [ 14.559555] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 14.559585] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.559611] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.559639] ? __pfx_read_tsc+0x10/0x10 [ 14.559671] ? ktime_get_ts64+0x86/0x230 [ 14.559697] kunit_try_run_case+0x1a5/0x480 [ 14.559724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.559774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559800] ? __kthread_parkme+0x82/0x180 [ 14.559821] ? preempt_count_sub+0x50/0x80 [ 14.559847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559925] kthread+0x337/0x6f0 [ 14.559945] ? trace_preempt_on+0x20/0xc0 [ 14.559969] ? __pfx_kthread+0x10/0x10 [ 14.559991] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.560012] ? calculate_sigpending+0x7b/0xa0 [ 14.560038] ? __pfx_kthread+0x10/0x10 [ 14.560070] ret_from_fork+0x116/0x1d0 [ 14.560090] ? __pfx_kthread+0x10/0x10 [ 14.560110] ret_from_fork_asm+0x1a/0x30 [ 14.560189] </TASK> [ 14.560199] [ 14.569395] The buggy address belongs to the physical page: [ 14.569659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cc0 [ 14.570007] flags: 0x200000000000000(node=0|zone=2) [ 14.570484] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.570903] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.571175] page dumped because: kasan: bad access detected [ 14.571351] [ 14.571423] Memory state around the buggy address: [ 14.571646] ffff888102cbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.571969] ffff888102cbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.572295] >ffff888102cc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.572507] ^ [ 14.572624] ffff888102cc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.573352] ffff888102cc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.573696] ================================================================== [ 14.505120] ================================================================== [ 14.505608] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.506111] Free of addr ffff888102594d00 by task kunit_try_catch/253 [ 14.506395] [ 14.506593] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.506638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.506651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.506672] Call Trace: [ 14.506684] <TASK> [ 14.506699] dump_stack_lvl+0x73/0xb0 [ 14.506737] print_report+0xd1/0x610 [ 14.506760] ? __virt_addr_valid+0x1db/0x2d0 [ 14.506787] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.506810] ? mempool_double_free_helper+0x184/0x370 [ 14.506837] kasan_report_invalid_free+0x10a/0x130 [ 14.506863] ? mempool_double_free_helper+0x184/0x370 [ 14.506891] ? mempool_double_free_helper+0x184/0x370 [ 14.506915] ? mempool_double_free_helper+0x184/0x370 [ 14.506940] check_slab_allocation+0x101/0x130 [ 14.507015] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.507068] mempool_free+0x2ec/0x380 [ 14.507097] mempool_double_free_helper+0x184/0x370 [ 14.507123] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.507150] ? __kasan_check_write+0x18/0x20 [ 14.507170] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.507192] ? finish_task_switch.isra.0+0x153/0x700 [ 14.507231] mempool_kmalloc_double_free+0xed/0x140 [ 14.507256] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 14.507285] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.507308] ? __pfx_mempool_kfree+0x10/0x10 [ 14.507335] ? __pfx_read_tsc+0x10/0x10 [ 14.507357] ? ktime_get_ts64+0x86/0x230 [ 14.507382] kunit_try_run_case+0x1a5/0x480 [ 14.507407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.507457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.507482] ? __kthread_parkme+0x82/0x180 [ 14.507504] ? preempt_count_sub+0x50/0x80 [ 14.507528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.507552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.507578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.507605] kthread+0x337/0x6f0 [ 14.507624] ? trace_preempt_on+0x20/0xc0 [ 14.507686] ? __pfx_kthread+0x10/0x10 [ 14.507708] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.507731] ? calculate_sigpending+0x7b/0xa0 [ 14.507757] ? __pfx_kthread+0x10/0x10 [ 14.507780] ret_from_fork+0x116/0x1d0 [ 14.507800] ? __pfx_kthread+0x10/0x10 [ 14.507821] ret_from_fork_asm+0x1a/0x30 [ 14.507854] </TASK> [ 14.507865] [ 14.517489] Allocated by task 253: [ 14.517687] kasan_save_stack+0x45/0x70 [ 14.517950] kasan_save_track+0x18/0x40 [ 14.518167] kasan_save_alloc_info+0x3b/0x50 [ 14.518346] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.518521] remove_element+0x11e/0x190 [ 14.518662] mempool_alloc_preallocated+0x4d/0x90 [ 14.518826] mempool_double_free_helper+0x8a/0x370 [ 14.519070] mempool_kmalloc_double_free+0xed/0x140 [ 14.519409] kunit_try_run_case+0x1a5/0x480 [ 14.519624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.519914] kthread+0x337/0x6f0 [ 14.520036] ret_from_fork+0x116/0x1d0 [ 14.520350] ret_from_fork_asm+0x1a/0x30 [ 14.520554] [ 14.520737] Freed by task 253: [ 14.520952] kasan_save_stack+0x45/0x70 [ 14.521194] kasan_save_track+0x18/0x40 [ 14.521344] kasan_save_free_info+0x3f/0x60 [ 14.521491] __kasan_mempool_poison_object+0x131/0x1d0 [ 14.521693] mempool_free+0x2ec/0x380 [ 14.521920] mempool_double_free_helper+0x109/0x370 [ 14.522256] mempool_kmalloc_double_free+0xed/0x140 [ 14.522495] kunit_try_run_case+0x1a5/0x480 [ 14.522795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.522979] kthread+0x337/0x6f0 [ 14.523113] ret_from_fork+0x116/0x1d0 [ 14.523310] ret_from_fork_asm+0x1a/0x30 [ 14.523514] [ 14.523625] The buggy address belongs to the object at ffff888102594d00 [ 14.523625] which belongs to the cache kmalloc-128 of size 128 [ 14.524306] The buggy address is located 0 bytes inside of [ 14.524306] 128-byte region [ffff888102594d00, ffff888102594d80) [ 14.524671] [ 14.524769] The buggy address belongs to the physical page: [ 14.525078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594 [ 14.525574] flags: 0x200000000000000(node=0|zone=2) [ 14.525952] page_type: f5(slab) [ 14.526085] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.526519] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.526871] page dumped because: kasan: bad access detected [ 14.527122] [ 14.527232] Memory state around the buggy address: [ 14.527471] ffff888102594c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.527788] ffff888102594c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.528168] >ffff888102594d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.528489] ^ [ 14.528612] ffff888102594d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.528829] ffff888102594e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.529074] ================================================================== [ 14.533522] ================================================================== [ 14.534297] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 14.534637] Free of addr ffff888103bc0000 by task kunit_try_catch/255 [ 14.534896] [ 14.535162] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.535222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.535236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.535258] Call Trace: [ 14.535271] <TASK> [ 14.535298] dump_stack_lvl+0x73/0xb0 [ 14.535330] print_report+0xd1/0x610 [ 14.535354] ? __virt_addr_valid+0x1db/0x2d0 [ 14.535379] ? kasan_addr_to_slab+0x11/0xa0 [ 14.535410] ? mempool_double_free_helper+0x184/0x370 [ 14.535436] kasan_report_invalid_free+0x10a/0x130 [ 14.535473] ? mempool_double_free_helper+0x184/0x370 [ 14.535502] ? mempool_double_free_helper+0x184/0x370 [ 14.535526] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 14.535555] mempool_free+0x2ec/0x380 [ 14.535585] mempool_double_free_helper+0x184/0x370 [ 14.535612] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 14.535637] ? update_load_avg+0x1be/0x21b0 [ 14.535723] ? finish_task_switch.isra.0+0x153/0x700 [ 14.535751] mempool_kmalloc_large_double_free+0xed/0x140 [ 14.535778] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 14.535808] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.535845] ? __pfx_mempool_kfree+0x10/0x10 [ 14.535871] ? __pfx_read_tsc+0x10/0x10 [ 14.535893] ? ktime_get_ts64+0x86/0x230 [ 14.535930] kunit_try_run_case+0x1a5/0x480 [ 14.535957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.535981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.536007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.536032] ? __kthread_parkme+0x82/0x180 [ 14.536062] ? preempt_count_sub+0x50/0x80 [ 14.536086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.536112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.536147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.536173] kthread+0x337/0x6f0 [ 14.536192] ? trace_preempt_on+0x20/0xc0 [ 14.536216] ? __pfx_kthread+0x10/0x10 [ 14.536238] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.536261] ? calculate_sigpending+0x7b/0xa0 [ 14.536286] ? __pfx_kthread+0x10/0x10 [ 14.536308] ret_from_fork+0x116/0x1d0 [ 14.536327] ? __pfx_kthread+0x10/0x10 [ 14.536348] ret_from_fork_asm+0x1a/0x30 [ 14.536380] </TASK> [ 14.536389] [ 14.545968] The buggy address belongs to the physical page: [ 14.546297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bc0 [ 14.546720] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.547064] flags: 0x200000000000040(head|node=0|zone=2) [ 14.547347] page_type: f8(unknown) [ 14.547560] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.547930] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.548221] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.548474] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.549067] head: 0200000000000002 ffffea00040ef001 00000000ffffffff 00000000ffffffff [ 14.549377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.549604] page dumped because: kasan: bad access detected [ 14.550186] [ 14.550307] Memory state around the buggy address: [ 14.550507] ffff888103bbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.550942] ffff888103bbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.551287] >ffff888103bc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.551611] ^ [ 14.551857] ffff888103bc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.552226] ffff888103bc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.552445] ==================================================================