Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.829569] ==================================================================
[   18.829725] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.829788] Free of addr fff00000c79b8001 by task kunit_try_catch/243
[   18.829975] 
[   18.830042] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.832289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.832342] Hardware name: linux,dummy-virt (DT)
[   18.832377] Call trace:
[   18.832400]  show_stack+0x20/0x38 (C)
[   18.832459]  dump_stack_lvl+0x8c/0xd0
[   18.832510]  print_report+0x118/0x5d0
[   18.832559]  kasan_report_invalid_free+0xc0/0xe8
[   18.832608]  __kasan_mempool_poison_object+0xfc/0x150
[   18.832659]  mempool_free+0x28c/0x328
[   18.832703]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.832754]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.832805]  kunit_try_run_case+0x170/0x3f0
[   18.832855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.832922]  kthread+0x328/0x630
[   18.832965]  ret_from_fork+0x10/0x20
[   18.833012] 
[   18.833033] The buggy address belongs to the physical page:
[   18.833067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   18.833122] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.833170] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.833224] page_type: f8(unknown)
[   18.833264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.833312] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.833361] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.833429] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.833489] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   18.833536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.833578] page dumped because: kasan: bad access detected
[   18.833607] 
[   18.833626] Memory state around the buggy address:
[   18.833658]  fff00000c79b7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.833720]  fff00000c79b7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.833771] >fff00000c79b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.833820]                    ^
[   18.833858]  fff00000c79b8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.833910]  fff00000c79b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.833949] ==================================================================
[   18.814732] ==================================================================
[   18.814881] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.814946] Free of addr fff00000c656ae01 by task kunit_try_catch/241
[   18.815289] 
[   18.815389] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.815477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.815505] Hardware name: linux,dummy-virt (DT)
[   18.815674] Call trace:
[   18.815708]  show_stack+0x20/0x38 (C)
[   18.815764]  dump_stack_lvl+0x8c/0xd0
[   18.815979]  print_report+0x118/0x5d0
[   18.816033]  kasan_report_invalid_free+0xc0/0xe8
[   18.816202]  check_slab_allocation+0xfc/0x108
[   18.816293]  __kasan_mempool_poison_object+0x78/0x150
[   18.816586]  mempool_free+0x28c/0x328
[   18.816639]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.816952]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.817228]  kunit_try_run_case+0x170/0x3f0
[   18.817359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.817423]  kthread+0x328/0x630
[   18.817517]  ret_from_fork+0x10/0x20
[   18.817573] 
[   18.817591] Allocated by task 241:
[   18.817621]  kasan_save_stack+0x3c/0x68
[   18.817663]  kasan_save_track+0x20/0x40
[   18.817706]  kasan_save_alloc_info+0x40/0x58
[   18.817746]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.817788]  remove_element+0x130/0x1f8
[   18.817831]  mempool_alloc_preallocated+0x58/0xc0
[   18.817890]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.817933]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.817972]  kunit_try_run_case+0x170/0x3f0
[   18.818009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.818051]  kthread+0x328/0x630
[   18.818082]  ret_from_fork+0x10/0x20
[   18.818127] 
[   18.818146] The buggy address belongs to the object at fff00000c656ae00
[   18.818146]  which belongs to the cache kmalloc-128 of size 128
[   18.818220] The buggy address is located 1 bytes inside of
[   18.818220]  128-byte region [fff00000c656ae00, fff00000c656ae80)
[   18.818278] 
[   18.818303] The buggy address belongs to the physical page:
[   18.818352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656a
[   18.818406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.818473] page_type: f5(slab)
[   18.818511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.818561] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.818600] page dumped because: kasan: bad access detected
[   18.818632] 
[   18.818652] Memory state around the buggy address:
[   18.818681]  fff00000c656ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.818734]  fff00000c656ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818785] >fff00000c656ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.818823]                    ^
[   18.819138]  fff00000c656ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.819413]  fff00000c656af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.819494] ==================================================================

[   14.084880] ==================================================================
[   14.085441] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.085795] Free of addr ffff888103abc001 by task kunit_try_catch/260
[   14.086173] 
[   14.086305] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.086366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.086382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.086406] Call Trace:
[   14.086430]  <TASK>
[   14.086448]  dump_stack_lvl+0x73/0xb0
[   14.086480]  print_report+0xd1/0x610
[   14.086503]  ? __virt_addr_valid+0x1db/0x2d0
[   14.086536]  ? kasan_addr_to_slab+0x11/0xa0
[   14.086555]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.086582]  kasan_report_invalid_free+0x10a/0x130
[   14.086629]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.086657]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.086682]  __kasan_mempool_poison_object+0x102/0x1d0
[   14.086707]  mempool_free+0x2ec/0x380
[   14.086743]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.086770]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.086803]  ? finish_task_switch.isra.0+0x153/0x700
[   14.086850]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   14.086877]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.086920]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.086944]  ? __pfx_mempool_kfree+0x10/0x10
[   14.086971]  ? __pfx_read_tsc+0x10/0x10
[   14.086991]  ? ktime_get_ts64+0x86/0x230
[   14.087016]  kunit_try_run_case+0x1a5/0x480
[   14.087042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.087073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.087098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.087122]  ? __kthread_parkme+0x82/0x180
[   14.087144]  ? preempt_count_sub+0x50/0x80
[   14.087166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.087190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.087214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.087238]  kthread+0x337/0x6f0
[   14.087257]  ? trace_preempt_on+0x20/0xc0
[   14.087281]  ? __pfx_kthread+0x10/0x10
[   14.087301]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.087322]  ? calculate_sigpending+0x7b/0xa0
[   14.087346]  ? __pfx_kthread+0x10/0x10
[   14.087369]  ret_from_fork+0x116/0x1d0
[   14.087387]  ? __pfx_kthread+0x10/0x10
[   14.087407]  ret_from_fork_asm+0x1a/0x30
[   14.087440]  </TASK>
[   14.087452] 
[   14.096771] The buggy address belongs to the physical page:
[   14.097277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103abc
[   14.097720] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.098135] flags: 0x200000000000040(head|node=0|zone=2)
[   14.098425] page_type: f8(unknown)
[   14.098598] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.099027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.099367] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.099699] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.100126] head: 0200000000000002 ffffea00040eaf01 00000000ffffffff 00000000ffffffff
[   14.100464] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.100875] page dumped because: kasan: bad access detected
[   14.101249] 
[   14.101327] Memory state around the buggy address:
[   14.101541]  ffff888103abbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.101856]  ffff888103abbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.102190] >ffff888103abc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.102427]                    ^
[   14.102594]  ffff888103abc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.103103]  ffff888103abc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.103424] ==================================================================
[   14.051487] ==================================================================
[   14.051913] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.052453] Free of addr ffff888102f42c01 by task kunit_try_catch/258
[   14.052875] 
[   14.053306] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.053356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.053369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.053391] Call Trace:
[   14.053402]  <TASK>
[   14.053419]  dump_stack_lvl+0x73/0xb0
[   14.053453]  print_report+0xd1/0x610
[   14.053475]  ? __virt_addr_valid+0x1db/0x2d0
[   14.053501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.053523]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.053550]  kasan_report_invalid_free+0x10a/0x130
[   14.053575]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.053720]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.053746]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.053770]  check_slab_allocation+0x11f/0x130
[   14.053792]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.053817]  mempool_free+0x2ec/0x380
[   14.053892]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.053920]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.053947]  ? __kasan_check_write+0x18/0x20
[   14.053966]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.053989]  ? finish_task_switch.isra.0+0x153/0x700
[   14.054016]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.054040]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   14.054131]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.054153]  ? __pfx_mempool_kfree+0x10/0x10
[   14.054177]  ? __pfx_read_tsc+0x10/0x10
[   14.054199]  ? ktime_get_ts64+0x86/0x230
[   14.054228]  kunit_try_run_case+0x1a5/0x480
[   14.054254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.054276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.054301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.054324]  ? __kthread_parkme+0x82/0x180
[   14.054346]  ? preempt_count_sub+0x50/0x80
[   14.054368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.054392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.054416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.054439]  kthread+0x337/0x6f0
[   14.054457]  ? trace_preempt_on+0x20/0xc0
[   14.054481]  ? __pfx_kthread+0x10/0x10
[   14.054501]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.054522]  ? calculate_sigpending+0x7b/0xa0
[   14.054547]  ? __pfx_kthread+0x10/0x10
[   14.054568]  ret_from_fork+0x116/0x1d0
[   14.054587]  ? __pfx_kthread+0x10/0x10
[   14.054607]  ret_from_fork_asm+0x1a/0x30
[   14.054640]  </TASK>
[   14.054650] 
[   14.070618] Allocated by task 258:
[   14.070813]  kasan_save_stack+0x45/0x70
[   14.070983]  kasan_save_track+0x18/0x40
[   14.071273]  kasan_save_alloc_info+0x3b/0x50
[   14.071488]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.071835]  remove_element+0x11e/0x190
[   14.072077]  mempool_alloc_preallocated+0x4d/0x90
[   14.072430]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   14.072686]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.072937]  kunit_try_run_case+0x1a5/0x480
[   14.073204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.073491]  kthread+0x337/0x6f0
[   14.073725]  ret_from_fork+0x116/0x1d0
[   14.073989]  ret_from_fork_asm+0x1a/0x30
[   14.074168] 
[   14.074248] The buggy address belongs to the object at ffff888102f42c00
[   14.074248]  which belongs to the cache kmalloc-128 of size 128
[   14.074850] The buggy address is located 1 bytes inside of
[   14.074850]  128-byte region [ffff888102f42c00, ffff888102f42c80)
[   14.075373] 
[   14.075448] The buggy address belongs to the physical page:
[   14.075690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f42
[   14.076132] flags: 0x200000000000000(node=0|zone=2)
[   14.076301] page_type: f5(slab)
[   14.077010] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.077558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.078011] page dumped because: kasan: bad access detected
[   14.078271] 
[   14.078384] Memory state around the buggy address:
[   14.078564]  ffff888102f42b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.078983]  ffff888102f42b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.079299] >ffff888102f42c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.079624]                    ^
[   14.079781]  ffff888102f42c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.080309]  ffff888102f42d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.080626] ==================================================================