Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 53.443481] ================================================================== [ 53.453398] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 53.460514] Free of addr ffff000801e64400 by task kunit_try_catch/319 [ 53.466937] [ 53.468424] CPU: 6 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 53.468483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.468502] Hardware name: WinLink E850-96 board (DT) [ 53.468523] Call trace: [ 53.468539] show_stack+0x20/0x38 (C) [ 53.468577] dump_stack_lvl+0x8c/0xd0 [ 53.468612] print_report+0x118/0x5d0 [ 53.468641] kasan_report_invalid_free+0xc0/0xe8 [ 53.468673] check_slab_allocation+0xd4/0x108 [ 53.468713] __kasan_mempool_poison_object+0x78/0x150 [ 53.468753] mempool_free+0x28c/0x328 [ 53.468785] mempool_double_free_helper+0x150/0x2e8 [ 53.468824] mempool_kmalloc_double_free+0xc0/0x118 [ 53.468858] kunit_try_run_case+0x170/0x3f0 [ 53.468897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.468930] kthread+0x328/0x630 [ 53.468959] ret_from_fork+0x10/0x20 [ 53.468994] [ 53.547319] Allocated by task 319: [ 53.550707] kasan_save_stack+0x3c/0x68 [ 53.554522] kasan_save_track+0x20/0x40 [ 53.558341] kasan_save_alloc_info+0x40/0x58 [ 53.562595] __kasan_mempool_unpoison_object+0x11c/0x180 [ 53.567890] remove_element+0x130/0x1f8 [ 53.571709] mempool_alloc_preallocated+0x58/0xc0 [ 53.576398] mempool_double_free_helper+0x94/0x2e8 [ 53.581171] mempool_kmalloc_double_free+0xc0/0x118 [ 53.586032] kunit_try_run_case+0x170/0x3f0 [ 53.590199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.595667] kthread+0x328/0x630 [ 53.598879] ret_from_fork+0x10/0x20 [ 53.602438] [ 53.603915] Freed by task 319: [ 53.606953] kasan_save_stack+0x3c/0x68 [ 53.610771] kasan_save_track+0x20/0x40 [ 53.614592] kasan_save_free_info+0x4c/0x78 [ 53.618757] __kasan_mempool_poison_object+0xc0/0x150 [ 53.623792] mempool_free+0x28c/0x328 [ 53.627438] mempool_double_free_helper+0x100/0x2e8 [ 53.632299] mempool_kmalloc_double_free+0xc0/0x118 [ 53.637160] kunit_try_run_case+0x170/0x3f0 [ 53.641326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.646795] kthread+0x328/0x630 [ 53.650008] ret_from_fork+0x10/0x20 [ 53.653566] [ 53.655043] The buggy address belongs to the object at ffff000801e64400 [ 53.655043] which belongs to the cache kmalloc-128 of size 128 [ 53.667544] The buggy address is located 0 bytes inside of [ 53.667544] 128-byte region [ffff000801e64400, ffff000801e64480) [ 53.679086] [ 53.680566] The buggy address belongs to the physical page: [ 53.686123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e64 [ 53.694105] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.701746] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.708688] page_type: f5(slab) [ 53.711825] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.719544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.727270] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.735081] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.742894] head: 0bfffe0000000001 fffffdffe0079901 00000000ffffffff 00000000ffffffff [ 53.750706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 53.758514] page dumped because: kasan: bad access detected [ 53.764068] [ 53.765544] Memory state around the buggy address: [ 53.770326] ffff000801e64300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.777526] ffff000801e64380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.784732] >ffff000801e64400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.791932] ^ [ 53.795147] ffff000801e64480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.802352] ffff000801e64500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.809555] ================================================================== [ 54.056920] ================================================================== [ 54.067715] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 54.074827] Free of addr ffff000808920000 by task kunit_try_catch/323 [ 54.081252] [ 54.082738] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.082794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.082812] Hardware name: WinLink E850-96 board (DT) [ 54.082833] Call trace: [ 54.082846] show_stack+0x20/0x38 (C) [ 54.082880] dump_stack_lvl+0x8c/0xd0 [ 54.082914] print_report+0x118/0x5d0 [ 54.082942] kasan_report_invalid_free+0xc0/0xe8 [ 54.082973] __kasan_mempool_poison_pages+0xe0/0xe8 [ 54.083014] mempool_free+0x24c/0x328 [ 54.083047] mempool_double_free_helper+0x150/0x2e8 [ 54.083084] mempool_page_alloc_double_free+0xbc/0x118 [ 54.083124] kunit_try_run_case+0x170/0x3f0 [ 54.083160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.083193] kthread+0x328/0x630 [ 54.083223] ret_from_fork+0x10/0x20 [ 54.083258] [ 54.157381] The buggy address belongs to the physical page: [ 54.162938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920 [ 54.170922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.177443] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 54.185162] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.192881] page dumped because: kasan: bad access detected [ 54.198436] [ 54.199911] Memory state around the buggy address: [ 54.204692] ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.211895] ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.219100] >ffff000808920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.226300] ^ [ 54.229515] ffff000808920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.236720] ffff000808920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.243923] ================================================================== [ 53.818641] ================================================================== [ 53.828653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 53.835770] Free of addr ffff000805f94000 by task kunit_try_catch/321 [ 53.842194] [ 53.843678] CPU: 5 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 53.843730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.843750] Hardware name: WinLink E850-96 board (DT) [ 53.843772] Call trace: [ 53.843785] show_stack+0x20/0x38 (C) [ 53.843821] dump_stack_lvl+0x8c/0xd0 [ 53.843854] print_report+0x118/0x5d0 [ 53.843882] kasan_report_invalid_free+0xc0/0xe8 [ 53.843913] __kasan_mempool_poison_object+0x14c/0x150 [ 53.843953] mempool_free+0x28c/0x328 [ 53.843985] mempool_double_free_helper+0x150/0x2e8 [ 53.844022] mempool_kmalloc_large_double_free+0xc0/0x118 [ 53.844059] kunit_try_run_case+0x170/0x3f0 [ 53.844100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.844132] kthread+0x328/0x630 [ 53.844160] ret_from_fork+0x10/0x20 [ 53.844195] [ 53.918842] The buggy address belongs to the physical page: [ 53.924400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f94 [ 53.932383] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.940022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.946966] page_type: f8(unknown) [ 53.950363] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.958082] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.965810] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.973618] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.981433] head: 0bfffe0000000002 fffffdffe017e501 00000000ffffffff 00000000ffffffff [ 53.989245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 53.997052] page dumped because: kasan: bad access detected [ 54.002605] [ 54.004081] Memory state around the buggy address: [ 54.008861] ffff000805f93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.016064] ffff000805f93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.023270] >ffff000805f94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.030470] ^ [ 54.033685] ffff000805f94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.040890] ffff000805f94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.048093] ==================================================================
[ 31.798164] ================================================================== [ 31.798271] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.798418] Free of addr fff00000c9c04000 by task kunit_try_catch/268 [ 31.798486] [ 31.798543] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.798783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.798816] Hardware name: linux,dummy-virt (DT) [ 31.798847] Call trace: [ 31.798877] show_stack+0x20/0x38 (C) [ 31.799146] dump_stack_lvl+0x8c/0xd0 [ 31.799354] print_report+0x118/0x5d0 [ 31.799655] kasan_report_invalid_free+0xc0/0xe8 [ 31.799727] __kasan_mempool_poison_object+0x14c/0x150 [ 31.799780] mempool_free+0x28c/0x328 [ 31.799879] mempool_double_free_helper+0x150/0x2e8 [ 31.799966] mempool_kmalloc_large_double_free+0xc0/0x118 [ 31.800020] kunit_try_run_case+0x170/0x3f0 [ 31.800157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.800238] kthread+0x328/0x630 [ 31.800699] ret_from_fork+0x10/0x20 [ 31.800811] [ 31.801277] The buggy address belongs to the physical page: [ 31.801351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04 [ 31.801431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.801489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.801806] page_type: f8(unknown) [ 31.801960] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.802704] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.802776] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.802853] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.802937] head: 0bfffe0000000002 ffffc1ffc3270101 00000000ffffffff 00000000ffffffff [ 31.803255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.803372] page dumped because: kasan: bad access detected [ 31.803487] [ 31.803541] Memory state around the buggy address: [ 31.803622] fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.803788] fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.803867] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.804160] ^ [ 31.804263] fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.804336] fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.804428] ================================================================== [ 31.817115] ================================================================== [ 31.817181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.817245] Free of addr fff00000c9c04000 by task kunit_try_catch/270 [ 31.817288] [ 31.817756] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.817900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.818068] Hardware name: linux,dummy-virt (DT) [ 31.818159] Call trace: [ 31.818205] show_stack+0x20/0x38 (C) [ 31.818280] dump_stack_lvl+0x8c/0xd0 [ 31.818665] print_report+0x118/0x5d0 [ 31.818786] kasan_report_invalid_free+0xc0/0xe8 [ 31.818872] __kasan_mempool_poison_pages+0xe0/0xe8 [ 31.819011] mempool_free+0x24c/0x328 [ 31.819110] mempool_double_free_helper+0x150/0x2e8 [ 31.819472] mempool_page_alloc_double_free+0xbc/0x118 [ 31.819605] kunit_try_run_case+0x170/0x3f0 [ 31.819930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.820098] kthread+0x328/0x630 [ 31.820268] ret_from_fork+0x10/0x20 [ 31.820347] [ 31.820409] The buggy address belongs to the physical page: [ 31.820527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04 [ 31.820598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.820673] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.821032] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.821165] page dumped because: kasan: bad access detected [ 31.821302] [ 31.821355] Memory state around the buggy address: [ 31.821432] fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.821580] fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.821633] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.822099] ^ [ 31.822231] fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.822352] fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.822477] ================================================================== [ 31.775992] ================================================================== [ 31.776540] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.776872] Free of addr fff00000c85fc600 by task kunit_try_catch/266 [ 31.777226] [ 31.777269] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.777659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.777700] Hardware name: linux,dummy-virt (DT) [ 31.777769] Call trace: [ 31.778119] show_stack+0x20/0x38 (C) [ 31.778526] dump_stack_lvl+0x8c/0xd0 [ 31.778665] print_report+0x118/0x5d0 [ 31.778744] kasan_report_invalid_free+0xc0/0xe8 [ 31.779119] check_slab_allocation+0xd4/0x108 [ 31.779273] __kasan_mempool_poison_object+0x78/0x150 [ 31.779329] mempool_free+0x28c/0x328 [ 31.779680] mempool_double_free_helper+0x150/0x2e8 [ 31.779763] mempool_kmalloc_double_free+0xc0/0x118 [ 31.779848] kunit_try_run_case+0x170/0x3f0 [ 31.780247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.780415] kthread+0x328/0x630 [ 31.780494] ret_from_fork+0x10/0x20 [ 31.780562] [ 31.780580] Allocated by task 266: [ 31.780887] kasan_save_stack+0x3c/0x68 [ 31.780982] kasan_save_track+0x20/0x40 [ 31.781141] kasan_save_alloc_info+0x40/0x58 [ 31.781220] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.781519] remove_element+0x130/0x1f8 [ 31.781742] mempool_alloc_preallocated+0x58/0xc0 [ 31.781803] mempool_double_free_helper+0x94/0x2e8 [ 31.782031] mempool_kmalloc_double_free+0xc0/0x118 [ 31.782230] kunit_try_run_case+0x170/0x3f0 [ 31.782354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.782417] kthread+0x328/0x630 [ 31.782733] ret_from_fork+0x10/0x20 [ 31.782808] [ 31.782857] Freed by task 266: [ 31.783003] kasan_save_stack+0x3c/0x68 [ 31.783089] kasan_save_track+0x20/0x40 [ 31.783351] kasan_save_free_info+0x4c/0x78 [ 31.783566] __kasan_mempool_poison_object+0xc0/0x150 [ 31.783690] mempool_free+0x28c/0x328 [ 31.783880] mempool_double_free_helper+0x100/0x2e8 [ 31.784072] mempool_kmalloc_double_free+0xc0/0x118 [ 31.784147] kunit_try_run_case+0x170/0x3f0 [ 31.784365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.784598] kthread+0x328/0x630 [ 31.784686] ret_from_fork+0x10/0x20 [ 31.784798] [ 31.784851] The buggy address belongs to the object at fff00000c85fc600 [ 31.784851] which belongs to the cache kmalloc-128 of size 128 [ 31.784972] The buggy address is located 0 bytes inside of [ 31.784972] 128-byte region [fff00000c85fc600, fff00000c85fc680) [ 31.785097] [ 31.785148] The buggy address belongs to the physical page: [ 31.785180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 31.785246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.785294] page_type: f5(slab) [ 31.785335] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.785394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.785434] page dumped because: kasan: bad access detected [ 31.785465] [ 31.785482] Memory state around the buggy address: [ 31.785520] fff00000c85fc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.785578] fff00000c85fc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.785636] >fff00000c85fc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.785673] ^ [ 31.785715] fff00000c85fc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.785758] fff00000c85fc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.785805] ==================================================================
[ 26.010341] ================================================================== [ 26.011912] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 26.012693] Free of addr ffff8881061b4000 by task kunit_try_catch/286 [ 26.013336] [ 26.013583] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.013644] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.013667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.013693] Call Trace: [ 26.013706] <TASK> [ 26.013727] dump_stack_lvl+0x73/0xb0 [ 26.013777] print_report+0xd1/0x610 [ 26.013835] ? __virt_addr_valid+0x1db/0x2d0 [ 26.013863] ? kasan_addr_to_slab+0x11/0xa0 [ 26.013883] ? mempool_double_free_helper+0x184/0x370 [ 26.013919] kasan_report_invalid_free+0x10a/0x130 [ 26.013943] ? mempool_double_free_helper+0x184/0x370 [ 26.013980] ? mempool_double_free_helper+0x184/0x370 [ 26.014003] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 26.014027] mempool_free+0x2ec/0x380 [ 26.014061] mempool_double_free_helper+0x184/0x370 [ 26.014085] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.014109] ? dequeue_entities+0x23f/0x1630 [ 26.014135] ? __kasan_check_write+0x18/0x20 [ 26.014159] ? __pfx_sched_clock_cpu+0x10/0x10 [ 26.014181] ? finish_task_switch.isra.0+0x153/0x700 [ 26.014206] mempool_kmalloc_large_double_free+0xed/0x140 [ 26.014230] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 26.014256] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.014279] ? __pfx_mempool_kfree+0x10/0x10 [ 26.014301] ? irqentry_exit+0x2a/0x60 [ 26.014325] ? __pfx_read_tsc+0x10/0x10 [ 26.014347] ? ktime_get_ts64+0x86/0x230 [ 26.014373] kunit_try_run_case+0x1a5/0x480 [ 26.014396] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.014420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.014442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.014469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.014490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.014516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.014541] kthread+0x337/0x6f0 [ 26.014561] ? trace_preempt_on+0x20/0xc0 [ 26.014585] ? __pfx_kthread+0x10/0x10 [ 26.014605] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.014627] ? calculate_sigpending+0x7b/0xa0 [ 26.014652] ? __pfx_kthread+0x10/0x10 [ 26.014682] ret_from_fork+0x116/0x1d0 [ 26.014701] ? __pfx_kthread+0x10/0x10 [ 26.014722] ret_from_fork_asm+0x1a/0x30 [ 26.014769] </TASK> [ 26.014780] [ 26.029284] The buggy address belongs to the physical page: [ 26.029665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 26.030115] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.030509] flags: 0x200000000000040(head|node=0|zone=2) [ 26.030702] page_type: f8(unknown) [ 26.030861] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.031157] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.031521] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.031832] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.032194] head: 0200000000000002 ffffea0004186d01 00000000ffffffff 00000000ffffffff [ 26.032491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.032833] page dumped because: kasan: bad access detected [ 26.033096] [ 26.033178] Memory state around the buggy address: [ 26.033810] ffff8881061b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.034203] ffff8881061b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.034510] >ffff8881061b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.034783] ^ [ 26.034953] ffff8881061b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.035255] ffff8881061b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.035567] ================================================================== [ 26.039298] ================================================================== [ 26.039885] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 26.040245] Free of addr ffff888106144000 by task kunit_try_catch/288 [ 26.040542] [ 26.040682] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.040739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.040753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.040777] Call Trace: [ 26.040790] <TASK> [ 26.040810] dump_stack_lvl+0x73/0xb0 [ 26.040844] print_report+0xd1/0x610 [ 26.040867] ? __virt_addr_valid+0x1db/0x2d0 [ 26.040894] ? kasan_addr_to_slab+0x11/0xa0 [ 26.040914] ? mempool_double_free_helper+0x184/0x370 [ 26.040938] kasan_report_invalid_free+0x10a/0x130 [ 26.040963] ? mempool_double_free_helper+0x184/0x370 [ 26.040988] ? mempool_double_free_helper+0x184/0x370 [ 26.041023] __kasan_mempool_poison_pages+0x115/0x130 [ 26.041059] mempool_free+0x290/0x380 [ 26.041087] mempool_double_free_helper+0x184/0x370 [ 26.041124] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.041148] ? update_load_avg+0x1be/0x21b0 [ 26.041184] ? update_curr+0x7d/0x7f0 [ 26.041207] ? finish_task_switch.isra.0+0x153/0x700 [ 26.041245] mempool_page_alloc_double_free+0xe8/0x140 [ 26.041271] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 26.041297] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 26.041322] ? __pfx_mempool_free_pages+0x10/0x10 [ 26.041418] ? __pfx_read_tsc+0x10/0x10 [ 26.041443] ? ktime_get_ts64+0x86/0x230 [ 26.041469] kunit_try_run_case+0x1a5/0x480 [ 26.041493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.041514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.041538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.041563] ? __kthread_parkme+0x82/0x180 [ 26.041585] ? preempt_count_sub+0x50/0x80 [ 26.041608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.041630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.041666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.041692] kthread+0x337/0x6f0 [ 26.041712] ? trace_preempt_on+0x20/0xc0 [ 26.041736] ? __pfx_kthread+0x10/0x10 [ 26.041773] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.041794] ? calculate_sigpending+0x7b/0xa0 [ 26.041819] ? __pfx_kthread+0x10/0x10 [ 26.041841] ret_from_fork+0x116/0x1d0 [ 26.041860] ? __pfx_kthread+0x10/0x10 [ 26.041881] ret_from_fork_asm+0x1a/0x30 [ 26.041913] </TASK> [ 26.041925] [ 26.052107] The buggy address belongs to the physical page: [ 26.052481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106144 [ 26.053018] flags: 0x200000000000000(node=0|zone=2) [ 26.053614] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.054004] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.054380] page dumped because: kasan: bad access detected [ 26.054724] [ 26.054866] Memory state around the buggy address: [ 26.055064] ffff888106143f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.055453] ffff888106143f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.055751] >ffff888106144000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.056045] ^ [ 26.056252] ffff888106144080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.056460] ffff888106144100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.057002] ================================================================== [ 25.967147] ================================================================== [ 25.967565] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 25.968144] Free of addr ffff888105919a00 by task kunit_try_catch/284 [ 25.969477] [ 25.969596] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 25.969667] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 25.969681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.969706] Call Trace: [ 25.969719] <TASK> [ 25.969739] dump_stack_lvl+0x73/0xb0 [ 25.969777] print_report+0xd1/0x610 [ 25.969802] ? __virt_addr_valid+0x1db/0x2d0 [ 25.969828] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.969854] ? mempool_double_free_helper+0x184/0x370 [ 25.969878] kasan_report_invalid_free+0x10a/0x130 [ 25.969901] ? mempool_double_free_helper+0x184/0x370 [ 25.969925] ? mempool_double_free_helper+0x184/0x370 [ 25.969947] ? mempool_double_free_helper+0x184/0x370 [ 25.969969] check_slab_allocation+0x101/0x130 [ 25.970141] __kasan_mempool_poison_object+0x91/0x1d0 [ 25.970166] mempool_free+0x2ec/0x380 [ 25.970193] ? mempool_alloc_preallocated+0x5b/0x90 [ 25.970222] mempool_double_free_helper+0x184/0x370 [ 25.970245] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 25.970269] ? dequeue_entities+0x23f/0x1630 [ 25.970295] ? __kasan_check_write+0x18/0x20 [ 25.970318] ? __pfx_sched_clock_cpu+0x10/0x10 [ 25.970341] ? finish_task_switch.isra.0+0x153/0x700 [ 25.970369] mempool_kmalloc_double_free+0xed/0x140 [ 25.970392] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 25.970417] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.970441] ? __pfx_mempool_kfree+0x10/0x10 [ 25.970467] ? __pfx_read_tsc+0x10/0x10 [ 25.970493] ? ktime_get_ts64+0x86/0x230 [ 25.970519] kunit_try_run_case+0x1a5/0x480 [ 25.970545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.970566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.970591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.970615] ? __kthread_parkme+0x82/0x180 [ 25.970637] ? preempt_count_sub+0x50/0x80 [ 25.970671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.970694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.970719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.970745] kthread+0x337/0x6f0 [ 25.970765] ? trace_preempt_on+0x20/0xc0 [ 25.970792] ? __pfx_kthread+0x10/0x10 [ 25.970814] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.970836] ? calculate_sigpending+0x7b/0xa0 [ 25.970862] ? __pfx_kthread+0x10/0x10 [ 25.970883] ret_from_fork+0x116/0x1d0 [ 25.970903] ? __pfx_kthread+0x10/0x10 [ 25.970924] ret_from_fork_asm+0x1a/0x30 [ 25.971188] </TASK> [ 25.971201] [ 25.985329] Allocated by task 284: [ 25.985771] kasan_save_stack+0x45/0x70 [ 25.986248] kasan_save_track+0x18/0x40 [ 25.986457] kasan_save_alloc_info+0x3b/0x50 [ 25.986647] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 25.987136] remove_element+0x11e/0x190 [ 25.987551] mempool_alloc_preallocated+0x4d/0x90 [ 25.987844] mempool_double_free_helper+0x8a/0x370 [ 25.988182] mempool_kmalloc_double_free+0xed/0x140 [ 25.988391] kunit_try_run_case+0x1a5/0x480 [ 25.988579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.989568] kthread+0x337/0x6f0 [ 25.989895] ret_from_fork+0x116/0x1d0 [ 25.990306] ret_from_fork_asm+0x1a/0x30 [ 25.990631] [ 25.990856] Freed by task 284: [ 25.991129] kasan_save_stack+0x45/0x70 [ 25.991430] kasan_save_track+0x18/0x40 [ 25.991621] kasan_save_free_info+0x3f/0x60 [ 25.992095] __kasan_mempool_poison_object+0x131/0x1d0 [ 25.992483] mempool_free+0x2ec/0x380 [ 25.992668] mempool_double_free_helper+0x109/0x370 [ 25.993031] mempool_kmalloc_double_free+0xed/0x140 [ 25.993889] kunit_try_run_case+0x1a5/0x480 [ 25.994036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.994218] kthread+0x337/0x6f0 [ 25.994341] ret_from_fork+0x116/0x1d0 [ 25.994469] ret_from_fork_asm+0x1a/0x30 [ 25.994604] [ 25.994684] The buggy address belongs to the object at ffff888105919a00 [ 25.994684] which belongs to the cache kmalloc-128 of size 128 [ 25.996535] The buggy address is located 0 bytes inside of [ 25.996535] 128-byte region [ffff888105919a00, ffff888105919a80) [ 25.997939] [ 25.998288] The buggy address belongs to the physical page: [ 25.998948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 25.999859] flags: 0x200000000000000(node=0|zone=2) [ 26.000490] page_type: f5(slab) [ 26.000969] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.001524] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.001867] page dumped because: kasan: bad access detected [ 26.002454] [ 26.002617] Memory state around the buggy address: [ 26.003172] ffff888105919900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.003923] ffff888105919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.004176] >ffff888105919a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.004384] ^ [ 26.004497] ffff888105919a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.004726] ffff888105919b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.004976] ==================================================================