Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 38.369742] ================================================================== [ 38.380138] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.388122] Free of addr ffff000802ca6c01 by task kunit_try_catch/288 [ 38.394544] [ 38.396030] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.396086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.396103] Hardware name: WinLink E850-96 board (DT) [ 38.396126] Call trace: [ 38.396140] show_stack+0x20/0x38 (C) [ 38.396176] dump_stack_lvl+0x8c/0xd0 [ 38.396215] print_report+0x118/0x608 [ 38.396250] kasan_report_invalid_free+0xc0/0xe8 [ 38.396286] check_slab_allocation+0xfc/0x108 [ 38.396322] __kasan_mempool_poison_object+0x78/0x150 [ 38.396359] mempool_free+0x28c/0x328 [ 38.396393] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.396428] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.396459] kunit_try_run_case+0x170/0x3f0 [ 38.396496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.396536] kthread+0x328/0x630 [ 38.396565] ret_from_fork+0x10/0x20 [ 38.396603] [ 38.474579] Allocated by task 288: [ 38.477964] kasan_save_stack+0x3c/0x68 [ 38.481782] kasan_save_track+0x20/0x40 [ 38.485601] kasan_save_alloc_info+0x40/0x58 [ 38.489855] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.495150] remove_element+0x130/0x1f8 [ 38.498969] mempool_alloc_preallocated+0x58/0xc0 [ 38.503658] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.509212] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.514160] kunit_try_run_case+0x170/0x3f0 [ 38.518327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.523795] kthread+0x328/0x630 [ 38.527007] ret_from_fork+0x10/0x20 [ 38.530567] [ 38.532043] The buggy address belongs to the object at ffff000802ca6c00 [ 38.532043] which belongs to the cache kmalloc-128 of size 128 [ 38.544545] The buggy address is located 1 bytes inside of [ 38.544545] 128-byte region [ffff000802ca6c00, ffff000802ca6c80) [ 38.556086] [ 38.557566] The buggy address belongs to the physical page: [ 38.563123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882ca6 [ 38.571107] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.578744] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.585688] page_type: f5(slab) [ 38.588823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.596544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.604272] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.612082] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.619895] head: 0bfffe0000000001 fffffdffe00b2981 00000000ffffffff 00000000ffffffff [ 38.627707] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.635512] page dumped because: kasan: bad access detected [ 38.641068] [ 38.642544] Memory state around the buggy address: [ 38.647325] ffff000802ca6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.654526] ffff000802ca6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.661731] >ffff000802ca6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.668932] ^ [ 38.672148] ffff000802ca6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.679352] ffff000802ca6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.686555] ================================================================== [ 38.695692] ================================================================== [ 38.705740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.713723] Free of addr ffff000800e14001 by task kunit_try_catch/290 [ 38.720146] [ 38.721634] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.721691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.721707] Hardware name: WinLink E850-96 board (DT) [ 38.721730] Call trace: [ 38.721745] show_stack+0x20/0x38 (C) [ 38.721782] dump_stack_lvl+0x8c/0xd0 [ 38.721821] print_report+0x118/0x608 [ 38.721860] kasan_report_invalid_free+0xc0/0xe8 [ 38.721897] __kasan_mempool_poison_object+0xfc/0x150 [ 38.721936] mempool_free+0x28c/0x328 [ 38.721967] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.722005] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.722042] kunit_try_run_case+0x170/0x3f0 [ 38.722080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.722120] kthread+0x328/0x630 [ 38.722147] ret_from_fork+0x10/0x20 [ 38.722185] [ 38.796364] The buggy address belongs to the physical page: [ 38.801920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14 [ 38.809905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.817543] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.824486] page_type: f8(unknown) [ 38.827884] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.835603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.843331] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.851140] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.858954] head: 0bfffe0000000002 fffffdffe0038501 00000000ffffffff 00000000ffffffff [ 38.866766] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.874571] page dumped because: kasan: bad access detected [ 38.880126] [ 38.881602] Memory state around the buggy address: [ 38.886383] ffff000800e13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.893585] ffff000800e13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.900791] >ffff000800e14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.907991] ^ [ 38.911207] ffff000800e14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.918411] ffff000800e14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.925613] ==================================================================
[ 28.707709] ================================================================== [ 28.707877] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.708247] Free of addr fff00000c7874001 by task kunit_try_catch/243 [ 28.708397] [ 28.708490] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.708694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.709173] Hardware name: linux,dummy-virt (DT) [ 28.709273] Call trace: [ 28.709410] show_stack+0x20/0x38 (C) [ 28.709551] dump_stack_lvl+0x8c/0xd0 [ 28.709843] print_report+0x118/0x608 [ 28.710149] kasan_report_invalid_free+0xc0/0xe8 [ 28.710293] __kasan_mempool_poison_object+0xfc/0x150 [ 28.710434] mempool_free+0x28c/0x328 [ 28.710555] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.710705] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 28.711570] kunit_try_run_case+0x170/0x3f0 [ 28.712650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.712927] kthread+0x328/0x630 [ 28.713150] ret_from_fork+0x10/0x20 [ 28.713282] [ 28.713333] The buggy address belongs to the physical page: [ 28.713416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107874 [ 28.713551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.713667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.713862] page_type: f8(unknown) [ 28.714107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.714249] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.714374] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.714608] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.714736] head: 0bfffe0000000002 ffffc1ffc31e1d01 00000000ffffffff 00000000ffffffff [ 28.715211] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.715337] page dumped because: kasan: bad access detected [ 28.715425] [ 28.715476] Memory state around the buggy address: [ 28.715567] fff00000c7873f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.715688] fff00000c7873f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.715919] >fff00000c7874000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.716109] ^ [ 28.716289] fff00000c7874080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.716473] fff00000c7874100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.716849] ================================================================== [ 28.672735] ================================================================== [ 28.672916] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.673102] Free of addr fff00000c6431901 by task kunit_try_catch/241 [ 28.673368] [ 28.673477] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.673707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.673780] Hardware name: linux,dummy-virt (DT) [ 28.673892] Call trace: [ 28.673967] show_stack+0x20/0x38 (C) [ 28.674100] dump_stack_lvl+0x8c/0xd0 [ 28.674219] print_report+0x118/0x608 [ 28.674340] kasan_report_invalid_free+0xc0/0xe8 [ 28.674460] check_slab_allocation+0xfc/0x108 [ 28.674586] __kasan_mempool_poison_object+0x78/0x150 [ 28.674717] mempool_free+0x28c/0x328 [ 28.674827] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.674983] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.675113] kunit_try_run_case+0x170/0x3f0 [ 28.675254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.675486] kthread+0x328/0x630 [ 28.675769] ret_from_fork+0x10/0x20 [ 28.675905] [ 28.675971] Allocated by task 241: [ 28.676046] kasan_save_stack+0x3c/0x68 [ 28.676161] kasan_save_track+0x20/0x40 [ 28.676274] kasan_save_alloc_info+0x40/0x58 [ 28.676454] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.676613] remove_element+0x130/0x1f8 [ 28.676722] mempool_alloc_preallocated+0x58/0xc0 [ 28.676832] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.676990] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.677135] kunit_try_run_case+0x170/0x3f0 [ 28.677232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.677340] kthread+0x328/0x630 [ 28.677442] ret_from_fork+0x10/0x20 [ 28.677853] [ 28.677955] The buggy address belongs to the object at fff00000c6431900 [ 28.677955] which belongs to the cache kmalloc-128 of size 128 [ 28.678110] The buggy address is located 1 bytes inside of [ 28.678110] 128-byte region [fff00000c6431900, fff00000c6431980) [ 28.678257] [ 28.678312] The buggy address belongs to the physical page: [ 28.678392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106431 [ 28.678596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.678726] page_type: f5(slab) [ 28.678829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.678989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.679104] page dumped because: kasan: bad access detected [ 28.679239] [ 28.679476] Memory state around the buggy address: [ 28.679905] fff00000c6431800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.680346] fff00000c6431880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.680479] >fff00000c6431900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.680854] ^ [ 28.681047] fff00000c6431980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.681190] fff00000c6431a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.681309] ==================================================================
[ 28.788256] ================================================================== [ 28.788702] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.788958] Free of addr fff00000c7772501 by task kunit_try_catch/241 [ 28.789073] [ 28.789167] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.789443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.789550] Hardware name: linux,dummy-virt (DT) [ 28.789818] Call trace: [ 28.790071] show_stack+0x20/0x38 (C) [ 28.790250] dump_stack_lvl+0x8c/0xd0 [ 28.790388] print_report+0x118/0x608 [ 28.790517] kasan_report_invalid_free+0xc0/0xe8 [ 28.790748] check_slab_allocation+0xfc/0x108 [ 28.790904] __kasan_mempool_poison_object+0x78/0x150 [ 28.791057] mempool_free+0x28c/0x328 [ 28.791317] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.791528] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.791670] kunit_try_run_case+0x170/0x3f0 [ 28.791888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.792049] kthread+0x328/0x630 [ 28.792347] ret_from_fork+0x10/0x20 [ 28.792830] [ 28.793157] Allocated by task 241: [ 28.793236] kasan_save_stack+0x3c/0x68 [ 28.793816] kasan_save_track+0x20/0x40 [ 28.793932] kasan_save_alloc_info+0x40/0x58 [ 28.794035] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.794136] remove_element+0x130/0x1f8 [ 28.794224] mempool_alloc_preallocated+0x58/0xc0 [ 28.794318] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.794420] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.794519] kunit_try_run_case+0x170/0x3f0 [ 28.794609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.794725] kthread+0x328/0x630 [ 28.794805] ret_from_fork+0x10/0x20 [ 28.794915] [ 28.794963] The buggy address belongs to the object at fff00000c7772500 [ 28.794963] which belongs to the cache kmalloc-128 of size 128 [ 28.795105] The buggy address is located 1 bytes inside of [ 28.795105] 128-byte region [fff00000c7772500, fff00000c7772580) [ 28.795249] [ 28.795300] The buggy address belongs to the physical page: [ 28.795374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 28.795500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.795621] page_type: f5(slab) [ 28.795717] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.799366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.799806] page dumped because: kasan: bad access detected [ 28.800055] [ 28.800327] Memory state around the buggy address: [ 28.800420] fff00000c7772400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.800822] fff00000c7772480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.801328] >fff00000c7772500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.801538] ^ [ 28.803886] fff00000c7772580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.804026] fff00000c7772600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.804185] ================================================================== [ 28.819967] ================================================================== [ 28.820196] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.820693] Free of addr fff00000c7730001 by task kunit_try_catch/243 [ 28.820820] [ 28.820989] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.821297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.821449] Hardware name: linux,dummy-virt (DT) [ 28.821584] Call trace: [ 28.821916] show_stack+0x20/0x38 (C) [ 28.822194] dump_stack_lvl+0x8c/0xd0 [ 28.822417] print_report+0x118/0x608 [ 28.823062] kasan_report_invalid_free+0xc0/0xe8 [ 28.823277] __kasan_mempool_poison_object+0xfc/0x150 [ 28.824019] mempool_free+0x28c/0x328 [ 28.824795] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.825474] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 28.826005] kunit_try_run_case+0x170/0x3f0 [ 28.826357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.826501] kthread+0x328/0x630 [ 28.826612] ret_from_fork+0x10/0x20 [ 28.826730] [ 28.826786] The buggy address belongs to the physical page: [ 28.826882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107730 [ 28.827450] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.828402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.828642] page_type: f8(unknown) [ 28.829256] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.829769] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.829917] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.830045] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.830170] head: 0bfffe0000000002 ffffc1ffc31dcc01 00000000ffffffff 00000000ffffffff [ 28.830873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.831007] page dumped because: kasan: bad access detected [ 28.831434] [ 28.831810] Memory state around the buggy address: [ 28.832324] fff00000c772ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.832441] fff00000c772ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.832816] >fff00000c7730000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.833553] ^ [ 28.833691] fff00000c7730080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.834012] fff00000c7730100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.834145] ==================================================================
[ 21.702120] ================================================================== [ 21.703752] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.704522] Free of addr ffff888101b3e701 by task kunit_try_catch/259 [ 21.705796] [ 21.706271] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.706521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.706609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.706672] Call Trace: [ 21.706711] <TASK> [ 21.706755] dump_stack_lvl+0x73/0xb0 [ 21.706824] print_report+0xd1/0x650 [ 21.706861] ? __virt_addr_valid+0x1db/0x2d0 [ 21.706898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.706929] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.706965] kasan_report_invalid_free+0x10a/0x130 [ 21.707000] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.707039] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.707075] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.707110] check_slab_allocation+0x11f/0x130 [ 21.707139] __kasan_mempool_poison_object+0x91/0x1d0 [ 21.707173] mempool_free+0x2ec/0x380 [ 21.707203] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.707284] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 21.707332] ? kasan_save_track+0x18/0x40 [ 21.707359] ? kasan_save_alloc_info+0x3b/0x50 [ 21.707393] ? kasan_save_stack+0x45/0x70 [ 21.707422] ? mempool_alloc_preallocated+0x5b/0x90 [ 21.707454] mempool_kmalloc_invalid_free+0xed/0x140 [ 21.707488] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 21.707595] ? __pfx_mempool_kmalloc+0x10/0x10 [ 21.707670] ? __pfx_mempool_kfree+0x10/0x10 [ 21.707710] ? __pfx_read_tsc+0x10/0x10 [ 21.707742] ? ktime_get_ts64+0x86/0x230 [ 21.707777] kunit_try_run_case+0x1a5/0x480 [ 21.707818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.707853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.707890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.707923] ? __kthread_parkme+0x82/0x180 [ 21.707954] ? preempt_count_sub+0x50/0x80 [ 21.707988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.708023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.708058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.708093] kthread+0x337/0x6f0 [ 21.708119] ? trace_preempt_on+0x20/0xc0 [ 21.708153] ? __pfx_kthread+0x10/0x10 [ 21.708183] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.708215] ? calculate_sigpending+0x7b/0xa0 [ 21.708278] ? __pfx_kthread+0x10/0x10 [ 21.708310] ret_from_fork+0x116/0x1d0 [ 21.708337] ? __pfx_kthread+0x10/0x10 [ 21.708366] ret_from_fork_asm+0x1a/0x30 [ 21.708411] </TASK> [ 21.708428] [ 21.732691] Allocated by task 259: [ 21.733133] kasan_save_stack+0x45/0x70 [ 21.734642] kasan_save_track+0x18/0x40 [ 21.735351] kasan_save_alloc_info+0x3b/0x50 [ 21.736550] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 21.737486] remove_element+0x11e/0x190 [ 21.738216] mempool_alloc_preallocated+0x4d/0x90 [ 21.739117] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 21.739967] mempool_kmalloc_invalid_free+0xed/0x140 [ 21.740966] kunit_try_run_case+0x1a5/0x480 [ 21.741577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.742232] kthread+0x337/0x6f0 [ 21.742725] ret_from_fork+0x116/0x1d0 [ 21.743455] ret_from_fork_asm+0x1a/0x30 [ 21.744080] [ 21.744817] The buggy address belongs to the object at ffff888101b3e700 [ 21.744817] which belongs to the cache kmalloc-128 of size 128 [ 21.745821] The buggy address is located 1 bytes inside of [ 21.745821] 128-byte region [ffff888101b3e700, ffff888101b3e780) [ 21.747295] [ 21.747826] The buggy address belongs to the physical page: [ 21.748291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e [ 21.748913] flags: 0x200000000000000(node=0|zone=2) [ 21.750157] page_type: f5(slab) [ 21.750824] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.751667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.752190] page dumped because: kasan: bad access detected [ 21.752883] [ 21.753541] Memory state around the buggy address: [ 21.754171] ffff888101b3e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.755583] ffff888101b3e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.756293] >ffff888101b3e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.756894] ^ [ 21.757239] ffff888101b3e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.757981] ffff888101b3e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.758752] ================================================================== [ 21.766007] ================================================================== [ 21.767529] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.768270] Free of addr ffff888103ab8001 by task kunit_try_catch/261 [ 21.769529] [ 21.770464] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.770702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.770749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.770789] Call Trace: [ 21.770827] <TASK> [ 21.770881] dump_stack_lvl+0x73/0xb0 [ 21.770951] print_report+0xd1/0x650 [ 21.770992] ? __virt_addr_valid+0x1db/0x2d0 [ 21.771030] ? kasan_addr_to_slab+0x11/0xa0 [ 21.771060] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.771101] kasan_report_invalid_free+0x10a/0x130 [ 21.771137] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.771179] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.771216] __kasan_mempool_poison_object+0x102/0x1d0 [ 21.771294] mempool_free+0x2ec/0x380 [ 21.771330] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 21.771369] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 21.771408] ? __kasan_check_write+0x18/0x20 [ 21.771438] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.771470] ? finish_task_switch.isra.0+0x153/0x700 [ 21.771542] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 21.771652] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 21.771716] ? __pfx_mempool_kmalloc+0x10/0x10 [ 21.771755] ? __pfx_mempool_kfree+0x10/0x10 [ 21.771794] ? __pfx_read_tsc+0x10/0x10 [ 21.771826] ? ktime_get_ts64+0x86/0x230 [ 21.771860] kunit_try_run_case+0x1a5/0x480 [ 21.771901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.771935] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.771971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.772005] ? __kthread_parkme+0x82/0x180 [ 21.772033] ? preempt_count_sub+0x50/0x80 [ 21.772063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.772099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.772133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.772167] kthread+0x337/0x6f0 [ 21.772195] ? trace_preempt_on+0x20/0xc0 [ 21.772242] ? __pfx_kthread+0x10/0x10 [ 21.772292] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.772327] ? calculate_sigpending+0x7b/0xa0 [ 21.772364] ? __pfx_kthread+0x10/0x10 [ 21.772395] ret_from_fork+0x116/0x1d0 [ 21.772421] ? __pfx_kthread+0x10/0x10 [ 21.772451] ret_from_fork_asm+0x1a/0x30 [ 21.772514] </TASK> [ 21.772539] [ 21.796244] The buggy address belongs to the physical page: [ 21.797139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab8 [ 21.798705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.800126] flags: 0x200000000000040(head|node=0|zone=2) [ 21.800763] page_type: f8(unknown) [ 21.801239] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.802114] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.803689] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.804302] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.805199] head: 0200000000000002 ffffea00040eae01 00000000ffffffff 00000000ffffffff [ 21.806201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.807246] page dumped because: kasan: bad access detected [ 21.807827] [ 21.808016] Memory state around the buggy address: [ 21.808424] ffff888103ab7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.809148] ffff888103ab7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.809655] >ffff888103ab8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.810896] ^ [ 21.811189] ffff888103ab8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.812128] ffff888103ab8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.812618] ==================================================================
[ 20.561396] ================================================================== [ 20.562769] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.563563] Free of addr ffff888103990001 by task kunit_try_catch/261 [ 20.564748] [ 20.564945] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.565012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.565030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.565062] Call Trace: [ 20.565077] <TASK> [ 20.565098] dump_stack_lvl+0x73/0xb0 [ 20.565542] print_report+0xd1/0x650 [ 20.565803] ? __virt_addr_valid+0x1db/0x2d0 [ 20.565847] ? kasan_addr_to_slab+0x11/0xa0 [ 20.565906] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.565953] kasan_report_invalid_free+0x10a/0x130 [ 20.565992] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.566036] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.566075] __kasan_mempool_poison_object+0x102/0x1d0 [ 20.566151] mempool_free+0x2ec/0x380 [ 20.566192] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.566233] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 20.566286] ? __kasan_check_write+0x18/0x20 [ 20.566317] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.566351] ? finish_task_switch.isra.0+0x153/0x700 [ 20.566390] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 20.566430] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 20.566473] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.566509] ? __pfx_mempool_kfree+0x10/0x10 [ 20.566614] ? __pfx_read_tsc+0x10/0x10 [ 20.566669] ? ktime_get_ts64+0x86/0x230 [ 20.566707] kunit_try_run_case+0x1a5/0x480 [ 20.566750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.566788] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.566826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.566864] ? __kthread_parkme+0x82/0x180 [ 20.566924] ? preempt_count_sub+0x50/0x80 [ 20.566961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.567000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.567038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.567078] kthread+0x337/0x6f0 [ 20.567142] ? trace_preempt_on+0x20/0xc0 [ 20.567185] ? __pfx_kthread+0x10/0x10 [ 20.567217] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.567251] ? calculate_sigpending+0x7b/0xa0 [ 20.567291] ? __pfx_kthread+0x10/0x10 [ 20.567323] ret_from_fork+0x116/0x1d0 [ 20.567350] ? __pfx_kthread+0x10/0x10 [ 20.567382] ret_from_fork_asm+0x1a/0x30 [ 20.567426] </TASK> [ 20.567441] [ 20.592448] The buggy address belongs to the physical page: [ 20.593086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990 [ 20.594033] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.594904] flags: 0x200000000000040(head|node=0|zone=2) [ 20.595461] page_type: f8(unknown) [ 20.595985] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.596836] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.597762] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.598392] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.599222] head: 0200000000000002 ffffea00040e6401 00000000ffffffff 00000000ffffffff [ 20.599936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.600788] page dumped because: kasan: bad access detected [ 20.601325] [ 20.601715] Memory state around the buggy address: [ 20.602216] ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.603021] ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.603806] >ffff888103990000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.604489] ^ [ 20.605028] ffff888103990080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.605857] ffff888103990100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.606565] ================================================================== [ 20.496028] ================================================================== [ 20.497260] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.498176] Free of addr ffff888103314001 by task kunit_try_catch/259 [ 20.499175] [ 20.499646] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.499773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.499815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.499899] Call Trace: [ 20.500099] <TASK> [ 20.500169] dump_stack_lvl+0x73/0xb0 [ 20.500231] print_report+0xd1/0x650 [ 20.500267] ? __virt_addr_valid+0x1db/0x2d0 [ 20.500304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.500337] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.500374] kasan_report_invalid_free+0x10a/0x130 [ 20.500409] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.500447] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.500482] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.500527] check_slab_allocation+0x11f/0x130 [ 20.500653] __kasan_mempool_poison_object+0x91/0x1d0 [ 20.500693] mempool_free+0x2ec/0x380 [ 20.500728] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.500766] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 20.500807] ? __kasan_check_write+0x18/0x20 [ 20.500835] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.500866] ? finish_task_switch.isra.0+0x153/0x700 [ 20.500934] mempool_kmalloc_invalid_free+0xed/0x140 [ 20.500970] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 20.501009] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.501044] ? __pfx_mempool_kfree+0x10/0x10 [ 20.501079] ? __pfx_read_tsc+0x10/0x10 [ 20.501117] ? ktime_get_ts64+0x86/0x230 [ 20.501175] kunit_try_run_case+0x1a5/0x480 [ 20.501216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.501250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.501285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.501320] ? __kthread_parkme+0x82/0x180 [ 20.501348] ? preempt_count_sub+0x50/0x80 [ 20.501379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.501414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.501448] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.501483] kthread+0x337/0x6f0 [ 20.501519] ? trace_preempt_on+0x20/0xc0 [ 20.501602] ? __pfx_kthread+0x10/0x10 [ 20.501661] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.501694] ? calculate_sigpending+0x7b/0xa0 [ 20.501732] ? __pfx_kthread+0x10/0x10 [ 20.501762] ret_from_fork+0x116/0x1d0 [ 20.501790] ? __pfx_kthread+0x10/0x10 [ 20.501820] ret_from_fork_asm+0x1a/0x30 [ 20.501864] </TASK> [ 20.501900] [ 20.527250] Allocated by task 259: [ 20.527651] kasan_save_stack+0x45/0x70 [ 20.528109] kasan_save_track+0x18/0x40 [ 20.528550] kasan_save_alloc_info+0x3b/0x50 [ 20.530329] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 20.531325] remove_element+0x11e/0x190 [ 20.531634] mempool_alloc_preallocated+0x4d/0x90 [ 20.532014] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 20.532437] mempool_kmalloc_invalid_free+0xed/0x140 [ 20.532818] kunit_try_run_case+0x1a5/0x480 [ 20.533540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.533905] kthread+0x337/0x6f0 [ 20.534188] ret_from_fork+0x116/0x1d0 [ 20.534511] ret_from_fork_asm+0x1a/0x30 [ 20.534804] [ 20.535111] The buggy address belongs to the object at ffff888103314000 [ 20.535111] which belongs to the cache kmalloc-128 of size 128 [ 20.536980] The buggy address is located 1 bytes inside of [ 20.536980] 128-byte region [ffff888103314000, ffff888103314080) [ 20.541130] [ 20.541469] The buggy address belongs to the physical page: [ 20.542007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103314 [ 20.542529] flags: 0x200000000000000(node=0|zone=2) [ 20.545249] page_type: f5(slab) [ 20.545616] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.546305] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.547936] page dumped because: kasan: bad access detected [ 20.548292] [ 20.548441] Memory state around the buggy address: [ 20.550279] ffff888103313f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.551264] ffff888103313f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.552225] >ffff888103314000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.553460] ^ [ 20.553851] ffff888103314080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.554461] ffff888103314100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.555191] ==================================================================
[ 22.391264] ================================================================== [ 22.392441] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.393234] Free of addr ffff00000e1f8001 by task kunit_try_catch/296 [ 22.393861] [ 22.394044] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.394128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.394154] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.394182] Call trace: [ 22.394203] show_stack+0x20/0x38 (C) [ 22.394258] dump_stack_lvl+0x8c/0xd0 [ 22.394317] print_report+0x118/0x608 [ 22.394376] kasan_report_invalid_free+0xc0/0xe8 [ 22.394435] __kasan_mempool_poison_object+0xfc/0x150 [ 22.394497] mempool_free+0x28c/0x328 [ 22.394546] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.394606] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 22.394664] kunit_try_run_case+0x170/0x3f0 [ 22.394723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.394788] kthread+0x328/0x630 [ 22.394833] ret_from_fork+0x10/0x20 [ 22.394887] [ 22.401642] The buggy address belongs to the physical page: [ 22.402184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe1f8 [ 22.402940] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.403676] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 22.404362] page_type: f8(unknown) [ 22.404725] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.405473] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.406222] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.406977] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.407734] head: 03fffe0000000002 fffffdffc0387e01 00000000ffffffff 00000000ffffffff [ 22.408490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.409234] page dumped because: kasan: bad access detected [ 22.409769] [ 22.409940] Memory state around the buggy address: [ 22.410411] ffff00000e1f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.411106] ffff00000e1f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.411801] >ffff00000e1f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.412489] ^ [ 22.412825] ffff00000e1f8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.413519] ffff00000e1f8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.414207] ================================================================== [ 22.361508] ================================================================== [ 22.362624] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.363362] Free of addr ffff00000c5d5201 by task kunit_try_catch/294 [ 22.363939] [ 22.364088] CPU: 5 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.364114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.364121] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.364130] Call trace: [ 22.364136] show_stack+0x20/0x38 (C) [ 22.364154] dump_stack_lvl+0x8c/0xd0 [ 22.364171] print_report+0x118/0x608 [ 22.364187] kasan_report_invalid_free+0xc0/0xe8 [ 22.364204] check_slab_allocation+0xfc/0x108 [ 22.364220] __kasan_mempool_poison_object+0x78/0x150 [ 22.364236] mempool_free+0x28c/0x328 [ 22.364250] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 22.364266] mempool_kmalloc_invalid_free+0xc0/0x118 [ 22.364279] kunit_try_run_case+0x170/0x3f0 [ 22.364296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.364314] kthread+0x328/0x630 [ 22.364327] ret_from_fork+0x10/0x20 [ 22.364341] [ 22.371218] Allocated by task 294: [ 22.371528] kasan_save_stack+0x3c/0x68 [ 22.371883] kasan_save_track+0x20/0x40 [ 22.372234] kasan_save_alloc_info+0x40/0x58 [ 22.372627] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.373110] remove_element+0x130/0x1f8 [ 22.373460] mempool_alloc_preallocated+0x58/0xc0 [ 22.373886] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 22.374390] mempool_kmalloc_invalid_free+0xc0/0x118 [ 22.374840] kunit_try_run_case+0x170/0x3f0 [ 22.375222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.375719] kthread+0x328/0x630 [ 22.376016] ret_from_fork+0x10/0x20 [ 22.376344] [ 22.376486] The buggy address belongs to the object at ffff00000c5d5200 [ 22.376486] which belongs to the cache kmalloc-128 of size 128 [ 22.377592] The buggy address is located 1 bytes inside of [ 22.377592] 128-byte region [ffff00000c5d5200, ffff00000c5d5280) [ 22.378616] [ 22.378758] The buggy address belongs to the physical page: [ 22.379257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc5d5 [ 22.379957] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.380545] page_type: f5(slab) [ 22.380838] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000 [ 22.381529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.382216] page dumped because: kasan: bad access detected [ 22.382713] [ 22.382854] Memory state around the buggy address: [ 22.383285] ffff00000c5d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.383928] ffff00000c5d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384572] >ffff00000c5d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.385214] ^ [ 22.385509] ffff00000c5d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.386152] ffff00000c5d5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.386794] ==================================================================