Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.883914] ==================================================================
[   18.884678] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.884935] Free of addr fff00000c78b0001 by task kunit_try_catch/244
[   18.885211] 
[   18.885321] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.885508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.885553] Hardware name: linux,dummy-virt (DT)
[   18.885589] Call trace:
[   18.885618]  show_stack+0x20/0x38 (C)
[   18.885852]  dump_stack_lvl+0x8c/0xd0
[   18.886092]  print_report+0x118/0x608
[   18.886270]  kasan_report_invalid_free+0xc0/0xe8
[   18.886478]  __kasan_mempool_poison_object+0xfc/0x150
[   18.886730]  mempool_free+0x28c/0x328
[   18.886795]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.886857]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.887281]  kunit_try_run_case+0x170/0x3f0
[   18.887420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.887685]  kthread+0x328/0x630
[   18.888066]  ret_from_fork+0x10/0x20
[   18.888128] 
[   18.888151] The buggy address belongs to the physical page:
[   18.888581] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0
[   18.888825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.889062] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.889252] page_type: f8(unknown)
[   18.889296] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.889528] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.889741] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.889990] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.890432] head: 0bfffe0000000002 ffffc1ffc31e2c01 00000000ffffffff 00000000ffffffff
[   18.890614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.890878] page dumped because: kasan: bad access detected
[   18.890910] 
[   18.890929] Memory state around the buggy address:
[   18.891255]  fff00000c78aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.891354]  fff00000c78aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.891542] >fff00000c78b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.891730]                    ^
[   18.891789]  fff00000c78b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.892162]  fff00000c78b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.892272] ==================================================================
[   18.865046] ==================================================================
[   18.865415] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.865646] Free of addr fff00000c5903301 by task kunit_try_catch/242
[   18.865701] 
[   18.865736] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.865883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.866144] Hardware name: linux,dummy-virt (DT)
[   18.866195] Call trace:
[   18.866262]  show_stack+0x20/0x38 (C)
[   18.866452]  dump_stack_lvl+0x8c/0xd0
[   18.866506]  print_report+0x118/0x608
[   18.866551]  kasan_report_invalid_free+0xc0/0xe8
[   18.866620]  check_slab_allocation+0xfc/0x108
[   18.866751]  __kasan_mempool_poison_object+0x78/0x150
[   18.866816]  mempool_free+0x28c/0x328
[   18.866994]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.867052]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.867316]  kunit_try_run_case+0x170/0x3f0
[   18.867548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.867749]  kthread+0x328/0x630
[   18.867883]  ret_from_fork+0x10/0x20
[   18.868020] 
[   18.868045] Allocated by task 242:
[   18.868325]  kasan_save_stack+0x3c/0x68
[   18.868400]  kasan_save_track+0x20/0x40
[   18.868558]  kasan_save_alloc_info+0x40/0x58
[   18.868715]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.869008]  remove_element+0x130/0x1f8
[   18.869072]  mempool_alloc_preallocated+0x58/0xc0
[   18.869279]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.869517]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.869701]  kunit_try_run_case+0x170/0x3f0
[   18.869851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.869989]  kthread+0x328/0x630
[   18.870041]  ret_from_fork+0x10/0x20
[   18.870245] 
[   18.870357] The buggy address belongs to the object at fff00000c5903300
[   18.870357]  which belongs to the cache kmalloc-128 of size 128
[   18.870577] The buggy address is located 1 bytes inside of
[   18.870577]  128-byte region [fff00000c5903300, fff00000c5903380)
[   18.870651] 
[   18.870679] The buggy address belongs to the physical page:
[   18.870835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105903
[   18.870903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.870954] page_type: f5(slab)
[   18.870992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.871457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.871652] page dumped because: kasan: bad access detected
[   18.871925] 
[   18.871960] Memory state around the buggy address:
[   18.872396]  fff00000c5903200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.872516]  fff00000c5903280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.872609] >fff00000c5903300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.872669]                    ^
[   18.872710]  fff00000c5903380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.872761]  fff00000c5903400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.872809] ==================================================================

[   14.143554] ==================================================================
[   14.144070] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.144430] Free of addr ffff8881039c4001 by task kunit_try_catch/260
[   14.144726] 
[   14.144840] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.144882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.144894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.144914] Call Trace:
[   14.145325]  <TASK>
[   14.145530]  dump_stack_lvl+0x73/0xb0
[   14.145572]  print_report+0xd1/0x650
[   14.145596]  ? __virt_addr_valid+0x1db/0x2d0
[   14.145623]  ? kasan_addr_to_slab+0x11/0xa0
[   14.145644]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.145671]  kasan_report_invalid_free+0x10a/0x130
[   14.145696]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.145726]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.145773]  __kasan_mempool_poison_object+0x102/0x1d0
[   14.145798]  mempool_free+0x2ec/0x380
[   14.145825]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.145852]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.145881]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.145904]  ? finish_task_switch.isra.0+0x153/0x700
[   14.145939]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   14.145965]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.145994]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.146056]  ? __pfx_mempool_kfree+0x10/0x10
[   14.146080]  ? __pfx_read_tsc+0x10/0x10
[   14.146103]  ? ktime_get_ts64+0x86/0x230
[   14.146128]  kunit_try_run_case+0x1a5/0x480
[   14.146154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.146177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.146201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.146225]  ? __kthread_parkme+0x82/0x180
[   14.146244]  ? preempt_count_sub+0x50/0x80
[   14.146267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.146292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.146316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.146341]  kthread+0x337/0x6f0
[   14.146359]  ? trace_preempt_on+0x20/0xc0
[   14.146383]  ? __pfx_kthread+0x10/0x10
[   14.146403]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.146424]  ? calculate_sigpending+0x7b/0xa0
[   14.146448]  ? __pfx_kthread+0x10/0x10
[   14.146470]  ret_from_fork+0x116/0x1d0
[   14.146489]  ? __pfx_kthread+0x10/0x10
[   14.146516]  ret_from_fork_asm+0x1a/0x30
[   14.146550]  </TASK>
[   14.146560] 
[   14.165540] The buggy address belongs to the physical page:
[   14.166023] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c4
[   14.166556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.166951] flags: 0x200000000000040(head|node=0|zone=2)
[   14.167536] page_type: f8(unknown)
[   14.167887] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.168423] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.168659] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.168899] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.169167] head: 0200000000000002 ffffea00040e7101 00000000ffffffff 00000000ffffffff
[   14.169518] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.169861] page dumped because: kasan: bad access detected
[   14.170339] 
[   14.170425] Memory state around the buggy address:
[   14.170664]  ffff8881039c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.170986]  ffff8881039c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.171408] >ffff8881039c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.171717]                    ^
[   14.171902]  ffff8881039c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.172244]  ffff8881039c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.172589] ==================================================================
[   14.105835] ==================================================================
[   14.107447] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.108117] Free of addr ffff888103953a01 by task kunit_try_catch/258
[   14.108506] 
[   14.108685] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.108729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.108741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.108762] Call Trace:
[   14.108775]  <TASK>
[   14.108790]  dump_stack_lvl+0x73/0xb0
[   14.108819]  print_report+0xd1/0x650
[   14.108841]  ? __virt_addr_valid+0x1db/0x2d0
[   14.108865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.108888]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.108916]  kasan_report_invalid_free+0x10a/0x130
[   14.108953]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.108982]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.109007]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.109033]  check_slab_allocation+0x11f/0x130
[   14.109098]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.109126]  mempool_free+0x2ec/0x380
[   14.109153]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.109180]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.109210]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.109231]  ? finish_task_switch.isra.0+0x153/0x700
[   14.109258]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.109282]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   14.109310]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.109332]  ? __pfx_mempool_kfree+0x10/0x10
[   14.109357]  ? __pfx_read_tsc+0x10/0x10
[   14.109378]  ? ktime_get_ts64+0x86/0x230
[   14.109402]  kunit_try_run_case+0x1a5/0x480
[   14.109427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.109474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.109498]  ? __kthread_parkme+0x82/0x180
[   14.109519]  ? preempt_count_sub+0x50/0x80
[   14.109542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.109592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.109617]  kthread+0x337/0x6f0
[   14.109635]  ? trace_preempt_on+0x20/0xc0
[   14.109659]  ? __pfx_kthread+0x10/0x10
[   14.109679]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.109701]  ? calculate_sigpending+0x7b/0xa0
[   14.109726]  ? __pfx_kthread+0x10/0x10
[   14.109747]  ret_from_fork+0x116/0x1d0
[   14.109765]  ? __pfx_kthread+0x10/0x10
[   14.109786]  ret_from_fork_asm+0x1a/0x30
[   14.109818]  </TASK>
[   14.109829] 
[   14.125909] Allocated by task 258:
[   14.126385]  kasan_save_stack+0x45/0x70
[   14.126767]  kasan_save_track+0x18/0x40
[   14.127013]  kasan_save_alloc_info+0x3b/0x50
[   14.127453]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.127643]  remove_element+0x11e/0x190
[   14.127799]  mempool_alloc_preallocated+0x4d/0x90
[   14.127971]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   14.128306]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.128738]  kunit_try_run_case+0x1a5/0x480
[   14.129161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129686]  kthread+0x337/0x6f0
[   14.130152]  ret_from_fork+0x116/0x1d0
[   14.130452]  ret_from_fork_asm+0x1a/0x30
[   14.130605] 
[   14.130678] The buggy address belongs to the object at ffff888103953a00
[   14.130678]  which belongs to the cache kmalloc-128 of size 128
[   14.131788] The buggy address is located 1 bytes inside of
[   14.131788]  128-byte region [ffff888103953a00, ffff888103953a80)
[   14.132837] 
[   14.132913] The buggy address belongs to the physical page:
[   14.133289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103953
[   14.134010] flags: 0x200000000000000(node=0|zone=2)
[   14.134428] page_type: f5(slab)
[   14.134565] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.134880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.135643] page dumped because: kasan: bad access detected
[   14.136237] 
[   14.136432] Memory state around the buggy address:
[   14.136855]  ffff888103953900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.137419]  ffff888103953980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.137638] >ffff888103953a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.138016]                    ^
[   14.138355]  ffff888103953a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.139290]  ffff888103953b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.139973] ==================================================================