Hay
Date
July 9, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.702060] ==================================================================
[   18.702368] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.702560] Free of addr fff00000c640c001 by task kunit_try_catch/243
[   18.702683] 
[   18.702985] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.703172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.703249] Hardware name: linux,dummy-virt (DT)
[   18.703283] Call trace:
[   18.703309]  show_stack+0x20/0x38 (C)
[   18.703625]  dump_stack_lvl+0x8c/0xd0
[   18.703816]  print_report+0x118/0x608
[   18.703985]  kasan_report_invalid_free+0xc0/0xe8
[   18.704218]  __kasan_mempool_poison_object+0xfc/0x150
[   18.704396]  mempool_free+0x28c/0x328
[   18.704597]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.705024]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.705254]  kunit_try_run_case+0x170/0x3f0
[   18.705364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.705855]  kthread+0x328/0x630
[   18.706052]  ret_from_fork+0x10/0x20
[   18.706538] 
[   18.706592] The buggy address belongs to the physical page:
[   18.707001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640c
[   18.707197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.707360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.707449] page_type: f8(unknown)
[   18.707509] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.707989] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.708312] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.708391] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.708522] head: 0bfffe0000000002 ffffc1ffc3190301 00000000ffffffff 00000000ffffffff
[   18.708601] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.708803] page dumped because: kasan: bad access detected
[   18.708842] 
[   18.708963] Memory state around the buggy address:
[   18.709470]  fff00000c640bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.709538]  fff00000c640bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.709779] >fff00000c640c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.709979]                    ^
[   18.710162]  fff00000c640c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.710311]  fff00000c640c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.710494] ==================================================================
[   18.682730] ==================================================================
[   18.682790] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.682844] Free of addr fff00000c76afa01 by task kunit_try_catch/241
[   18.683083] 
[   18.683140] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.683228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.683255] Hardware name: linux,dummy-virt (DT)
[   18.683286] Call trace:
[   18.683310]  show_stack+0x20/0x38 (C)
[   18.683361]  dump_stack_lvl+0x8c/0xd0
[   18.683412]  print_report+0x118/0x608
[   18.683458]  kasan_report_invalid_free+0xc0/0xe8
[   18.683509]  check_slab_allocation+0xfc/0x108
[   18.683556]  __kasan_mempool_poison_object+0x78/0x150
[   18.683610]  mempool_free+0x28c/0x328
[   18.683658]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.684272]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.684657]  kunit_try_run_case+0x170/0x3f0
[   18.684882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.685215]  kthread+0x328/0x630
[   18.685425]  ret_from_fork+0x10/0x20
[   18.685483] 
[   18.685545] Allocated by task 241:
[   18.685759]  kasan_save_stack+0x3c/0x68
[   18.685952]  kasan_save_track+0x20/0x40
[   18.686062]  kasan_save_alloc_info+0x40/0x58
[   18.686254]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.686361]  remove_element+0x130/0x1f8
[   18.686630]  mempool_alloc_preallocated+0x58/0xc0
[   18.686828]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.687005]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.687319]  kunit_try_run_case+0x170/0x3f0
[   18.687483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.687537]  kthread+0x328/0x630
[   18.687771]  ret_from_fork+0x10/0x20
[   18.687908] 
[   18.688008] The buggy address belongs to the object at fff00000c76afa00
[   18.688008]  which belongs to the cache kmalloc-128 of size 128
[   18.688074] The buggy address is located 1 bytes inside of
[   18.688074]  128-byte region [fff00000c76afa00, fff00000c76afa80)
[   18.688145] 
[   18.688166] The buggy address belongs to the physical page:
[   18.688198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076af
[   18.688485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.688659] page_type: f5(slab)
[   18.688759] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.689150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.689282] page dumped because: kasan: bad access detected
[   18.689416] 
[   18.689437] Memory state around the buggy address:
[   18.689502]  fff00000c76af900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.689906]  fff00000c76af980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.690093] >fff00000c76afa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.690528]                    ^
[   18.690626]  fff00000c76afa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.690682]  fff00000c76afb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.691024] ==================================================================

[   14.268749] ==================================================================
[   14.269508] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.269783] Free of addr ffff88810291dd01 by task kunit_try_catch/258
[   14.269985] 
[   14.270076] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.270120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.270131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.270152] Call Trace:
[   14.270164]  <TASK>
[   14.270179]  dump_stack_lvl+0x73/0xb0
[   14.270206]  print_report+0xd1/0x650
[   14.270227]  ? __virt_addr_valid+0x1db/0x2d0
[   14.270250]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.270272]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.270298]  kasan_report_invalid_free+0x10a/0x130
[   14.270322]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.270348]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.270372]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.270395]  check_slab_allocation+0x11f/0x130
[   14.270416]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.270440]  mempool_free+0x2ec/0x380
[   14.270465]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.270489]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.270516]  ? __kasan_check_write+0x18/0x20
[   14.270534]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.270554]  ? finish_task_switch.isra.0+0x153/0x700
[   14.270580]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.270602]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   14.270628]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.270650]  ? __pfx_mempool_kfree+0x10/0x10
[   14.270673]  ? __pfx_read_tsc+0x10/0x10
[   14.270694]  ? ktime_get_ts64+0x86/0x230
[   14.271762]  kunit_try_run_case+0x1a5/0x480
[   14.271793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.271816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.271842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.271865]  ? __kthread_parkme+0x82/0x180
[   14.271887]  ? preempt_count_sub+0x50/0x80
[   14.271912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.271936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.271961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.271986]  kthread+0x337/0x6f0
[   14.272005]  ? trace_preempt_on+0x20/0xc0
[   14.272080]  ? __pfx_kthread+0x10/0x10
[   14.272104]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.272126]  ? calculate_sigpending+0x7b/0xa0
[   14.272151]  ? __pfx_kthread+0x10/0x10
[   14.272171]  ret_from_fork+0x116/0x1d0
[   14.272191]  ? __pfx_kthread+0x10/0x10
[   14.272211]  ret_from_fork_asm+0x1a/0x30
[   14.272243]  </TASK>
[   14.272253] 
[   14.285601] Allocated by task 258:
[   14.285795]  kasan_save_stack+0x45/0x70
[   14.285975]  kasan_save_track+0x18/0x40
[   14.286343]  kasan_save_alloc_info+0x3b/0x50
[   14.286507]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.286836]  remove_element+0x11e/0x190
[   14.287307]  mempool_alloc_preallocated+0x4d/0x90
[   14.287788]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   14.288098]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.288382]  kunit_try_run_case+0x1a5/0x480
[   14.288712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.289029]  kthread+0x337/0x6f0
[   14.289315]  ret_from_fork+0x116/0x1d0
[   14.289516]  ret_from_fork_asm+0x1a/0x30
[   14.289813] 
[   14.289914] The buggy address belongs to the object at ffff88810291dd00
[   14.289914]  which belongs to the cache kmalloc-128 of size 128
[   14.290558] The buggy address is located 1 bytes inside of
[   14.290558]  128-byte region [ffff88810291dd00, ffff88810291dd80)
[   14.291024] 
[   14.291453] The buggy address belongs to the physical page:
[   14.291698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291d
[   14.292092] flags: 0x200000000000000(node=0|zone=2)
[   14.292488] page_type: f5(slab)
[   14.292622] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.293061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.293417] page dumped because: kasan: bad access detected
[   14.293648] 
[   14.293749] Memory state around the buggy address:
[   14.293947]  ffff88810291dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.294659]  ffff88810291dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.295112] >ffff88810291dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.295491]                    ^
[   14.295653]  ffff88810291dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.296186]  ffff88810291de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.296584] ==================================================================
[   14.302934] ==================================================================
[   14.303725] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.304048] Free of addr ffff888103990001 by task kunit_try_catch/260
[   14.304322] 
[   14.304440] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.304486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.304498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.304520] Call Trace:
[   14.304532]  <TASK>
[   14.304547]  dump_stack_lvl+0x73/0xb0
[   14.304576]  print_report+0xd1/0x650
[   14.304598]  ? __virt_addr_valid+0x1db/0x2d0
[   14.304623]  ? kasan_addr_to_slab+0x11/0xa0
[   14.304644]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.304671]  kasan_report_invalid_free+0x10a/0x130
[   14.304696]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.304735]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.304761]  __kasan_mempool_poison_object+0x102/0x1d0
[   14.304788]  mempool_free+0x2ec/0x380
[   14.304815]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.304842]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.304872]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.304895]  ? finish_task_switch.isra.0+0x153/0x700
[   14.304922]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   14.304948]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.304977]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.305002]  ? __pfx_mempool_kfree+0x10/0x10
[   14.305029]  ? __pfx_read_tsc+0x10/0x10
[   14.305052]  ? ktime_get_ts64+0x86/0x230
[   14.305077]  kunit_try_run_case+0x1a5/0x480
[   14.305102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.305125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.305150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.305232]  ? __kthread_parkme+0x82/0x180
[   14.305257]  ? preempt_count_sub+0x50/0x80
[   14.305280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.305305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.305330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.305356]  kthread+0x337/0x6f0
[   14.305374]  ? trace_preempt_on+0x20/0xc0
[   14.305397]  ? __pfx_kthread+0x10/0x10
[   14.305417]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.305439]  ? calculate_sigpending+0x7b/0xa0
[   14.305463]  ? __pfx_kthread+0x10/0x10
[   14.305486]  ret_from_fork+0x116/0x1d0
[   14.305504]  ? __pfx_kthread+0x10/0x10
[   14.305525]  ret_from_fork_asm+0x1a/0x30
[   14.305556]  </TASK>
[   14.305566] 
[   14.314193] The buggy address belongs to the physical page:
[   14.314505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990
[   14.314932] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.315317] flags: 0x200000000000040(head|node=0|zone=2)
[   14.315539] page_type: f8(unknown)
[   14.315722] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.315970] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.316200] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.316497] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.317121] head: 0200000000000002 ffffea00040e6401 00000000ffffffff 00000000ffffffff
[   14.317426] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.317650] page dumped because: kasan: bad access detected
[   14.317926] 
[   14.318020] Memory state around the buggy address:
[   14.318294]  ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.318620]  ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.318955] >ffff888103990000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.319302]                    ^
[   14.319423]  ffff888103990080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.319748]  ffff888103990100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.320128] ==================================================================