Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   38.259468] ==================================================================
[   38.270208] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.277325] Free of addr ffff0008034a0000 by task kunit_try_catch/284
[   38.283746] 
[   38.285232] CPU: 6 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.285292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.285310] Hardware name: WinLink E850-96 board (DT)
[   38.285334] Call trace:
[   38.285349]  show_stack+0x20/0x38 (C)
[   38.285385]  dump_stack_lvl+0x8c/0xd0
[   38.285418]  print_report+0x118/0x608
[   38.285455]  kasan_report_invalid_free+0xc0/0xe8
[   38.285490]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.285523]  mempool_free+0x24c/0x328
[   38.285561]  mempool_double_free_helper+0x150/0x2e8
[   38.285594]  mempool_page_alloc_double_free+0xbc/0x118
[   38.285627]  kunit_try_run_case+0x170/0x3f0
[   38.285661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.285696]  kthread+0x328/0x630
[   38.285731]  ret_from_fork+0x10/0x20
[   38.285767] 
[   38.359876] The buggy address belongs to the physical page:
[   38.365431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834a0
[   38.373416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.379938] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.387656] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.395375] page dumped because: kasan: bad access detected
[   38.400930] 
[   38.402406] Memory state around the buggy address:
[   38.407188]  ffff00080349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.414389]  ffff00080349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.421595] >ffff0008034a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.428795]                    ^
[   38.432010]  ffff0008034a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.439215]  ffff0008034a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.446417] ==================================================================
[   38.021360] ==================================================================
[   38.031154] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.038265] Free of addr ffff0008067b4000 by task kunit_try_catch/282
[   38.044687] 
[   38.046174] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.046228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.046244] Hardware name: WinLink E850-96 board (DT)
[   38.046264] Call trace:
[   38.046276]  show_stack+0x20/0x38 (C)
[   38.046311]  dump_stack_lvl+0x8c/0xd0
[   38.046346]  print_report+0x118/0x608
[   38.046380]  kasan_report_invalid_free+0xc0/0xe8
[   38.046414]  __kasan_mempool_poison_object+0x14c/0x150
[   38.046448]  mempool_free+0x28c/0x328
[   38.046488]  mempool_double_free_helper+0x150/0x2e8
[   38.046521]  mempool_kmalloc_large_double_free+0xc0/0x118
[   38.046553]  kunit_try_run_case+0x170/0x3f0
[   38.046585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.046620]  kthread+0x328/0x630
[   38.046655]  ret_from_fork+0x10/0x20
[   38.046687] 
[   38.121337] The buggy address belongs to the physical page:
[   38.126893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867b4
[   38.134877] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.142519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.149460] page_type: f8(unknown)
[   38.152857] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.160576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.168302] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.176113] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.183927] head: 0bfffe0000000002 fffffdffe019ed01 00000000ffffffff 00000000ffffffff
[   38.191739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.199544] page dumped because: kasan: bad access detected
[   38.205100] 
[   38.206575] Memory state around the buggy address:
[   38.211357]  ffff0008067b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.218562]  ffff0008067b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.225763] >ffff0008067b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.232964]                    ^
[   38.236180]  ffff0008067b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.243384]  ffff0008067b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.250587] ==================================================================
[   37.646161] ==================================================================
[   37.655895] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.663012] Free of addr ffff000801edec00 by task kunit_try_catch/280
[   37.669432] 
[   37.670919] CPU: 6 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   37.670981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.670998] Hardware name: WinLink E850-96 board (DT)
[   37.671021] Call trace:
[   37.671035]  show_stack+0x20/0x38 (C)
[   37.671072]  dump_stack_lvl+0x8c/0xd0
[   37.671108]  print_report+0x118/0x608
[   37.671143]  kasan_report_invalid_free+0xc0/0xe8
[   37.671180]  check_slab_allocation+0xd4/0x108
[   37.671212]  __kasan_mempool_poison_object+0x78/0x150
[   37.671250]  mempool_free+0x28c/0x328
[   37.671287]  mempool_double_free_helper+0x150/0x2e8
[   37.671317]  mempool_kmalloc_double_free+0xc0/0x118
[   37.671349]  kunit_try_run_case+0x170/0x3f0
[   37.671382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.671417]  kthread+0x328/0x630
[   37.671452]  ret_from_fork+0x10/0x20
[   37.671489] 
[   37.749813] Allocated by task 280:
[   37.753200]  kasan_save_stack+0x3c/0x68
[   37.757017]  kasan_save_track+0x20/0x40
[   37.760836]  kasan_save_alloc_info+0x40/0x58
[   37.765089]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.770384]  remove_element+0x130/0x1f8
[   37.774204]  mempool_alloc_preallocated+0x58/0xc0
[   37.778891]  mempool_double_free_helper+0x94/0x2e8
[   37.783665]  mempool_kmalloc_double_free+0xc0/0x118
[   37.788527]  kunit_try_run_case+0x170/0x3f0
[   37.792693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.798161]  kthread+0x328/0x630
[   37.801373]  ret_from_fork+0x10/0x20
[   37.804932] 
[   37.806410] Freed by task 280:
[   37.809449]  kasan_save_stack+0x3c/0x68
[   37.813266]  kasan_save_track+0x20/0x40
[   37.817085]  kasan_save_free_info+0x4c/0x78
[   37.821252]  __kasan_mempool_poison_object+0xc0/0x150
[   37.826286]  mempool_free+0x28c/0x328
[   37.829932]  mempool_double_free_helper+0x100/0x2e8
[   37.834793]  mempool_kmalloc_double_free+0xc0/0x118
[   37.839654]  kunit_try_run_case+0x170/0x3f0
[   37.843822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.849289]  kthread+0x328/0x630
[   37.852501]  ret_from_fork+0x10/0x20
[   37.856060] 
[   37.857538] The buggy address belongs to the object at ffff000801edec00
[   37.857538]  which belongs to the cache kmalloc-128 of size 128
[   37.870039] The buggy address is located 0 bytes inside of
[   37.870039]  128-byte region [ffff000801edec00, ffff000801edec80)
[   37.881580] 
[   37.883061] The buggy address belongs to the physical page:
[   37.888616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ede
[   37.896599] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.904240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.911183] page_type: f5(slab)
[   37.914319] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.922038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.929765] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.937576] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.945389] head: 0bfffe0000000001 fffffdffe007b781 00000000ffffffff 00000000ffffffff
[   37.953201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.961006] page dumped because: kasan: bad access detected
[   37.966562] 
[   37.968037] Memory state around the buggy address:
[   37.972819]  ffff000801edeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.980022]  ffff000801edeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.987225] >ffff000801edec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.994426]                    ^
[   37.997641]  ffff000801edec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.004847]  ffff000801eded00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.012049] ==================================================================