Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.009937] ================================================================== [ 18.010032] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.010085] Free of addr fff00000c58c3601 by task kunit_try_catch/242 [ 18.010133] [ 18.010179] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.010280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.010306] Hardware name: linux,dummy-virt (DT) [ 18.010355] Call trace: [ 18.010429] show_stack+0x20/0x38 (C) [ 18.010536] dump_stack_lvl+0x8c/0xd0 [ 18.010583] print_report+0x118/0x5d0 [ 18.010648] kasan_report_invalid_free+0xc0/0xe8 [ 18.010714] check_slab_allocation+0xfc/0x108 [ 18.010797] __kasan_mempool_poison_object+0x78/0x150 [ 18.010849] mempool_free+0x28c/0x328 [ 18.010891] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.011156] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.011270] kunit_try_run_case+0x170/0x3f0 [ 18.011323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.011377] kthread+0x328/0x630 [ 18.011418] ret_from_fork+0x10/0x20 [ 18.011483] [ 18.011511] Allocated by task 242: [ 18.011557] kasan_save_stack+0x3c/0x68 [ 18.011614] kasan_save_track+0x20/0x40 [ 18.011671] kasan_save_alloc_info+0x40/0x58 [ 18.011727] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.011809] remove_element+0x130/0x1f8 [ 18.011846] mempool_alloc_preallocated+0x58/0xc0 [ 18.011903] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.011946] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.011986] kunit_try_run_case+0x170/0x3f0 [ 18.012022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.012261] kthread+0x328/0x630 [ 18.012314] ret_from_fork+0x10/0x20 [ 18.012363] [ 18.012382] The buggy address belongs to the object at fff00000c58c3600 [ 18.012382] which belongs to the cache kmalloc-128 of size 128 [ 18.012443] The buggy address is located 1 bytes inside of [ 18.012443] 128-byte region [fff00000c58c3600, fff00000c58c3680) [ 18.012503] [ 18.012523] The buggy address belongs to the physical page: [ 18.012745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 18.012808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.012856] page_type: f5(slab) [ 18.012896] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.012948] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.012989] page dumped because: kasan: bad access detected [ 18.013021] [ 18.013037] Memory state around the buggy address: [ 18.013068] fff00000c58c3500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.013113] fff00000c58c3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.013157] >fff00000c58c3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.013210] ^ [ 18.013236] fff00000c58c3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.013278] fff00000c58c3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.013318] ================================================================== [ 18.018718] ================================================================== [ 18.018802] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.018852] Free of addr fff00000c79a0001 by task kunit_try_catch/244 [ 18.018894] [ 18.018923] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.019213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.019353] Hardware name: linux,dummy-virt (DT) [ 18.019388] Call trace: [ 18.019447] show_stack+0x20/0x38 (C) [ 18.019635] dump_stack_lvl+0x8c/0xd0 [ 18.019751] print_report+0x118/0x5d0 [ 18.019855] kasan_report_invalid_free+0xc0/0xe8 [ 18.019975] __kasan_mempool_poison_object+0xfc/0x150 [ 18.020029] mempool_free+0x28c/0x328 [ 18.020073] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.020125] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.020214] kunit_try_run_case+0x170/0x3f0 [ 18.020323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.020487] kthread+0x328/0x630 [ 18.020567] ret_from_fork+0x10/0x20 [ 18.020752] [ 18.020782] The buggy address belongs to the physical page: [ 18.020812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a0 [ 18.020867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.020917] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.020968] page_type: f8(unknown) [ 18.021344] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.021464] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.021646] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.021796] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.021881] head: 0bfffe0000000002 ffffc1ffc31e6801 00000000ffffffff 00000000ffffffff [ 18.022043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.022151] page dumped because: kasan: bad access detected [ 18.022216] [ 18.022236] Memory state around the buggy address: [ 18.022280] fff00000c799ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.022333] fff00000c799ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.022386] >fff00000c79a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.022425] ^ [ 18.022451] fff00000c79a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.022504] fff00000c79a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.022543] ==================================================================
[ 18.778410] ================================================================== [ 18.778497] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.778548] Free of addr fff00000c78ec001 by task kunit_try_catch/244 [ 18.778812] [ 18.778846] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.778927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.778955] Hardware name: linux,dummy-virt (DT) [ 18.778987] Call trace: [ 18.779009] show_stack+0x20/0x38 (C) [ 18.779292] dump_stack_lvl+0x8c/0xd0 [ 18.779358] print_report+0x118/0x5d0 [ 18.779760] kasan_report_invalid_free+0xc0/0xe8 [ 18.779812] __kasan_mempool_poison_object+0xfc/0x150 [ 18.779879] mempool_free+0x28c/0x328 [ 18.779924] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.780128] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.780285] kunit_try_run_case+0x170/0x3f0 [ 18.780332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.780386] kthread+0x328/0x630 [ 18.780431] ret_from_fork+0x10/0x20 [ 18.780490] [ 18.780510] The buggy address belongs to the physical page: [ 18.780543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ec [ 18.780878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.780929] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.780983] page_type: f8(unknown) [ 18.781154] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.781501] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.781576] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.781760] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.781920] head: 0bfffe0000000002 ffffc1ffc31e3b01 00000000ffffffff 00000000ffffffff [ 18.782043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.782086] page dumped because: kasan: bad access detected [ 18.782119] [ 18.782138] Memory state around the buggy address: [ 18.782169] fff00000c78ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.782471] fff00000c78ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.782580] >fff00000c78ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.782619] ^ [ 18.782677] fff00000c78ec080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.782721] fff00000c78ec100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.782806] ================================================================== [ 18.764619] ================================================================== [ 18.764681] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.764994] Free of addr fff00000c5ae0601 by task kunit_try_catch/242 [ 18.765212] [ 18.765250] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.765333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.765360] Hardware name: linux,dummy-virt (DT) [ 18.765390] Call trace: [ 18.765412] show_stack+0x20/0x38 (C) [ 18.765462] dump_stack_lvl+0x8c/0xd0 [ 18.765509] print_report+0x118/0x5d0 [ 18.765555] kasan_report_invalid_free+0xc0/0xe8 [ 18.765605] check_slab_allocation+0xfc/0x108 [ 18.765652] __kasan_mempool_poison_object+0x78/0x150 [ 18.765716] mempool_free+0x28c/0x328 [ 18.765761] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.766070] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.766142] kunit_try_run_case+0x170/0x3f0 [ 18.766201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.766461] kthread+0x328/0x630 [ 18.766585] ret_from_fork+0x10/0x20 [ 18.766635] [ 18.766652] Allocated by task 242: [ 18.766811] kasan_save_stack+0x3c/0x68 [ 18.766947] kasan_save_track+0x20/0x40 [ 18.766992] kasan_save_alloc_info+0x40/0x58 [ 18.767065] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.767142] remove_element+0x130/0x1f8 [ 18.767177] mempool_alloc_preallocated+0x58/0xc0 [ 18.767496] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.767643] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.767752] kunit_try_run_case+0x170/0x3f0 [ 18.767848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.767968] kthread+0x328/0x630 [ 18.767999] ret_from_fork+0x10/0x20 [ 18.768036] [ 18.768055] The buggy address belongs to the object at fff00000c5ae0600 [ 18.768055] which belongs to the cache kmalloc-128 of size 128 [ 18.768116] The buggy address is located 1 bytes inside of [ 18.768116] 128-byte region [fff00000c5ae0600, fff00000c5ae0680) [ 18.768190] [ 18.768234] The buggy address belongs to the physical page: [ 18.768266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 18.768362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.768723] page_type: f5(slab) [ 18.769039] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.769127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.769191] page dumped because: kasan: bad access detected [ 18.769224] [ 18.769280] Memory state around the buggy address: [ 18.769413] fff00000c5ae0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.769486] fff00000c5ae0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.769565] >fff00000c5ae0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.769643] ^ [ 18.769683] fff00000c5ae0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.769762] fff00000c5ae0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.769871] ==================================================================
[ 14.394635] ================================================================== [ 14.395105] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.395613] Free of addr ffff888103a24001 by task kunit_try_catch/261 [ 14.396095] [ 14.396193] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.396240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.396252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.396275] Call Trace: [ 14.396290] <TASK> [ 14.396306] dump_stack_lvl+0x73/0xb0 [ 14.396371] print_report+0xd1/0x610 [ 14.396396] ? __virt_addr_valid+0x1db/0x2d0 [ 14.396422] ? kasan_addr_to_slab+0x11/0xa0 [ 14.396443] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.396483] kasan_report_invalid_free+0x10a/0x130 [ 14.396521] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.396551] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.396593] __kasan_mempool_poison_object+0x102/0x1d0 [ 14.396620] mempool_free+0x2ec/0x380 [ 14.396648] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.396676] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.396704] ? update_curr+0x5c1/0x810 [ 14.396734] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 14.396761] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 14.396788] ? schedule+0x7c/0x2e0 [ 14.396811] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.396835] ? __pfx_mempool_kfree+0x10/0x10 [ 14.396861] ? __pfx_read_tsc+0x10/0x10 [ 14.396882] ? ktime_get_ts64+0x86/0x230 [ 14.396908] kunit_try_run_case+0x1a5/0x480 [ 14.396935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.396959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.396985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.397010] ? __kthread_parkme+0x82/0x180 [ 14.397032] ? preempt_count_sub+0x50/0x80 [ 14.397057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.397082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.397109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.397135] kthread+0x337/0x6f0 [ 14.397154] ? trace_preempt_on+0x20/0xc0 [ 14.397178] ? __pfx_kthread+0x10/0x10 [ 14.397199] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.397221] ? calculate_sigpending+0x7b/0xa0 [ 14.397247] ? __pfx_kthread+0x10/0x10 [ 14.397269] ret_from_fork+0x116/0x1d0 [ 14.397288] ? __pfx_kthread+0x10/0x10 [ 14.397309] ret_from_fork_asm+0x1a/0x30 [ 14.397342] </TASK> [ 14.397353] [ 14.407023] The buggy address belongs to the physical page: [ 14.407323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a24 [ 14.407815] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.408069] flags: 0x200000000000040(head|node=0|zone=2) [ 14.408327] page_type: f8(unknown) [ 14.408635] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.408887] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.409185] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.409597] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.409908] head: 0200000000000002 ffffea00040e8901 00000000ffffffff 00000000ffffffff [ 14.410138] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.410620] page dumped because: kasan: bad access detected [ 14.410888] [ 14.410983] Memory state around the buggy address: [ 14.411492] ffff888103a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.411877] ffff888103a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.412150] >ffff888103a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.412545] ^ [ 14.412792] ffff888103a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.413122] ffff888103a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.413417] ================================================================== [ 14.370712] ================================================================== [ 14.371344] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.371791] Free of addr ffff888103434701 by task kunit_try_catch/259 [ 14.372150] [ 14.372263] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.372313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.372324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.372346] Call Trace: [ 14.372359] <TASK> [ 14.372376] dump_stack_lvl+0x73/0xb0 [ 14.372408] print_report+0xd1/0x610 [ 14.372594] ? __virt_addr_valid+0x1db/0x2d0 [ 14.372620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.372644] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.372672] kasan_report_invalid_free+0x10a/0x130 [ 14.372697] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.372742] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.372770] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.372796] check_slab_allocation+0x11f/0x130 [ 14.372820] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.372846] mempool_free+0x2ec/0x380 [ 14.372874] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.372922] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.372951] ? kasan_save_track+0x18/0x40 [ 14.372971] ? kasan_save_alloc_info+0x3b/0x50 [ 14.372995] ? kasan_save_stack+0x45/0x70 [ 14.373020] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.373045] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 14.373074] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.373097] ? __pfx_mempool_kfree+0x10/0x10 [ 14.373123] ? __pfx_read_tsc+0x10/0x10 [ 14.373146] ? ktime_get_ts64+0x86/0x230 [ 14.373171] kunit_try_run_case+0x1a5/0x480 [ 14.373197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.373221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.373246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.373271] ? __kthread_parkme+0x82/0x180 [ 14.373293] ? preempt_count_sub+0x50/0x80 [ 14.373317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.373342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.373367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.373393] kthread+0x337/0x6f0 [ 14.373423] ? trace_preempt_on+0x20/0xc0 [ 14.373457] ? __pfx_kthread+0x10/0x10 [ 14.373479] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.373501] ? calculate_sigpending+0x7b/0xa0 [ 14.373527] ? __pfx_kthread+0x10/0x10 [ 14.373549] ret_from_fork+0x116/0x1d0 [ 14.373569] ? __pfx_kthread+0x10/0x10 [ 14.373590] ret_from_fork_asm+0x1a/0x30 [ 14.373622] </TASK> [ 14.373632] [ 14.382328] Allocated by task 259: [ 14.382555] kasan_save_stack+0x45/0x70 [ 14.382750] kasan_save_track+0x18/0x40 [ 14.382918] kasan_save_alloc_info+0x3b/0x50 [ 14.383109] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.383339] remove_element+0x11e/0x190 [ 14.383562] mempool_alloc_preallocated+0x4d/0x90 [ 14.383773] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 14.384032] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.384241] kunit_try_run_case+0x1a5/0x480 [ 14.384388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.384567] kthread+0x337/0x6f0 [ 14.384684] ret_from_fork+0x116/0x1d0 [ 14.384813] ret_from_fork_asm+0x1a/0x30 [ 14.385164] [ 14.385263] The buggy address belongs to the object at ffff888103434700 [ 14.385263] which belongs to the cache kmalloc-128 of size 128 [ 14.385792] The buggy address is located 1 bytes inside of [ 14.385792] 128-byte region [ffff888103434700, ffff888103434780) [ 14.386170] [ 14.386240] The buggy address belongs to the physical page: [ 14.386408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 14.386774] flags: 0x200000000000000(node=0|zone=2) [ 14.387046] page_type: f5(slab) [ 14.387221] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.387614] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.387953] page dumped because: kasan: bad access detected [ 14.388180] [ 14.388248] Memory state around the buggy address: [ 14.388406] ffff888103434600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.388830] ffff888103434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.389134] >ffff888103434700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.389358] ^ [ 14.389478] ffff888103434780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.389685] ffff888103434800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.389999] ==================================================================
[ 14.577524] ================================================================== [ 14.578337] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.578791] Free of addr ffff888102b2ee01 by task kunit_try_catch/259 [ 14.579043] [ 14.579429] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.579476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.579488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.579510] Call Trace: [ 14.579521] <TASK> [ 14.579547] dump_stack_lvl+0x73/0xb0 [ 14.579579] print_report+0xd1/0x610 [ 14.579614] ? __virt_addr_valid+0x1db/0x2d0 [ 14.579692] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.579730] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.579760] kasan_report_invalid_free+0x10a/0x130 [ 14.579786] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.579828] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.579864] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.579891] check_slab_allocation+0x11f/0x130 [ 14.579924] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.579951] mempool_free+0x2ec/0x380 [ 14.579979] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.580007] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.580035] ? update_load_avg+0x1be/0x21b0 [ 14.580072] ? finish_task_switch.isra.0+0x153/0x700 [ 14.580100] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.580137] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 14.580165] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.580189] ? __pfx_mempool_kfree+0x10/0x10 [ 14.580215] ? __pfx_read_tsc+0x10/0x10 [ 14.580238] ? ktime_get_ts64+0x86/0x230 [ 14.580263] kunit_try_run_case+0x1a5/0x480 [ 14.580289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.580313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.580338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.580363] ? __kthread_parkme+0x82/0x180 [ 14.580384] ? preempt_count_sub+0x50/0x80 [ 14.580408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.580433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.580459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.580486] kthread+0x337/0x6f0 [ 14.580504] ? trace_preempt_on+0x20/0xc0 [ 14.580530] ? __pfx_kthread+0x10/0x10 [ 14.580551] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.580573] ? calculate_sigpending+0x7b/0xa0 [ 14.580600] ? __pfx_kthread+0x10/0x10 [ 14.580622] ret_from_fork+0x116/0x1d0 [ 14.580687] ? __pfx_kthread+0x10/0x10 [ 14.580711] ret_from_fork_asm+0x1a/0x30 [ 14.580744] </TASK> [ 14.580754] [ 14.596809] Allocated by task 259: [ 14.597244] kasan_save_stack+0x45/0x70 [ 14.597640] kasan_save_track+0x18/0x40 [ 14.598234] kasan_save_alloc_info+0x3b/0x50 [ 14.598789] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.599200] remove_element+0x11e/0x190 [ 14.599347] mempool_alloc_preallocated+0x4d/0x90 [ 14.599505] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 14.599749] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.600226] kunit_try_run_case+0x1a5/0x480 [ 14.600683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.601225] kthread+0x337/0x6f0 [ 14.601535] ret_from_fork+0x116/0x1d0 [ 14.602103] ret_from_fork_asm+0x1a/0x30 [ 14.602498] [ 14.602683] The buggy address belongs to the object at ffff888102b2ee00 [ 14.602683] which belongs to the cache kmalloc-128 of size 128 [ 14.603782] The buggy address is located 1 bytes inside of [ 14.603782] 128-byte region [ffff888102b2ee00, ffff888102b2ee80) [ 14.604818] [ 14.604897] The buggy address belongs to the physical page: [ 14.605088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2e [ 14.605942] flags: 0x200000000000000(node=0|zone=2) [ 14.606471] page_type: f5(slab) [ 14.606843] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.607599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.608130] page dumped because: kasan: bad access detected [ 14.608633] [ 14.608883] Memory state around the buggy address: [ 14.609102] ffff888102b2ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.609527] ffff888102b2ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610174] >ffff888102b2ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.610485] ^ [ 14.610629] ffff888102b2ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.611006] ffff888102b2ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.611381] ================================================================== [ 14.615881] ================================================================== [ 14.616495] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.616835] Free of addr ffff888102cc0001 by task kunit_try_catch/261 [ 14.617353] [ 14.617455] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.617515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.617528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.617550] Call Trace: [ 14.617575] <TASK> [ 14.617593] dump_stack_lvl+0x73/0xb0 [ 14.617626] print_report+0xd1/0x610 [ 14.617707] ? __virt_addr_valid+0x1db/0x2d0 [ 14.617734] ? kasan_addr_to_slab+0x11/0xa0 [ 14.617782] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.617812] kasan_report_invalid_free+0x10a/0x130 [ 14.617838] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.617868] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.617897] __kasan_mempool_poison_object+0x102/0x1d0 [ 14.617933] mempool_free+0x2ec/0x380 [ 14.617963] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.618002] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.618031] ? update_curr+0x5c1/0x810 [ 14.618072] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 14.618099] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 14.618137] ? schedule+0x7c/0x2e0 [ 14.618161] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.618185] ? __pfx_mempool_kfree+0x10/0x10 [ 14.618212] ? __pfx_read_tsc+0x10/0x10 [ 14.618235] ? ktime_get_ts64+0x86/0x230 [ 14.618260] kunit_try_run_case+0x1a5/0x480 [ 14.618286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618310] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.618336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.618362] ? __kthread_parkme+0x82/0x180 [ 14.618385] ? preempt_count_sub+0x50/0x80 [ 14.618410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.618461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.618488] kthread+0x337/0x6f0 [ 14.618508] ? trace_preempt_on+0x20/0xc0 [ 14.618533] ? __pfx_kthread+0x10/0x10 [ 14.618555] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.618577] ? calculate_sigpending+0x7b/0xa0 [ 14.618604] ? __pfx_kthread+0x10/0x10 [ 14.618627] ret_from_fork+0x116/0x1d0 [ 14.618646] ? __pfx_kthread+0x10/0x10 [ 14.618713] ret_from_fork_asm+0x1a/0x30 [ 14.618746] </TASK> [ 14.618756] [ 14.628327] The buggy address belongs to the physical page: [ 14.628637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cc0 [ 14.629466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.630598] flags: 0x200000000000040(head|node=0|zone=2) [ 14.631303] page_type: f8(unknown) [ 14.631481] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.632094] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.632558] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.633093] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.633542] head: 0200000000000002 ffffea00040b3001 00000000ffffffff 00000000ffffffff [ 14.634068] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.634517] page dumped because: kasan: bad access detected [ 14.634958] [ 14.635078] Memory state around the buggy address: [ 14.635334] ffff888102cbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.635847] ffff888102cbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.636143] >ffff888102cc0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.636658] ^ [ 14.636907] ffff888102cc0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.637666] ffff888102cc0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.637915] ==================================================================