Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   38.782600] ==================================================================
[   38.792597] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.800579] Free of addr ffff0008034a0001 by task kunit_try_catch/288
[   38.807002] 
[   38.808490] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.808551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.808569] Hardware name: WinLink E850-96 board (DT)
[   38.808591] Call trace:
[   38.808608]  show_stack+0x20/0x38 (C)
[   38.808645]  dump_stack_lvl+0x8c/0xd0
[   38.808678]  print_report+0x118/0x608
[   38.808711]  kasan_report_invalid_free+0xc0/0xe8
[   38.808748]  __kasan_mempool_poison_object+0xfc/0x150
[   38.808787]  mempool_free+0x28c/0x328
[   38.808824]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.808860]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   38.808894]  kunit_try_run_case+0x170/0x3f0
[   38.808927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.808965]  kthread+0x328/0x630
[   38.809001]  ret_from_fork+0x10/0x20
[   38.809035] 
[   38.884433] The buggy address belongs to the physical page:
[   38.889989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8834a0
[   38.897973] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.905612] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.912556] page_type: f8(unknown)
[   38.915954] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.923672] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.931398] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.939210] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.947023] head: 0bfffe0000000002 fffffdffe00d2801 00000000ffffffff 00000000ffffffff
[   38.954835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.962641] page dumped because: kasan: bad access detected
[   38.968196] 
[   38.969672] Memory state around the buggy address:
[   38.974455]  ffff00080349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.981654]  ffff00080349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.988860] >ffff0008034a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.996060]                    ^
[   38.999276]  ffff0008034a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.006481]  ffff0008034a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.013683] ==================================================================
[   38.455485] ==================================================================
[   38.465779] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.473759] Free of addr ffff000801f1cb01 by task kunit_try_catch/286
[   38.480184] 
[   38.481670] CPU: 7 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   38.481727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.481744] Hardware name: WinLink E850-96 board (DT)
[   38.481767] Call trace:
[   38.481780]  show_stack+0x20/0x38 (C)
[   38.481820]  dump_stack_lvl+0x8c/0xd0
[   38.481855]  print_report+0x118/0x608
[   38.481888]  kasan_report_invalid_free+0xc0/0xe8
[   38.481922]  check_slab_allocation+0xfc/0x108
[   38.481953]  __kasan_mempool_poison_object+0x78/0x150
[   38.481989]  mempool_free+0x28c/0x328
[   38.482027]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.482060]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.482089]  kunit_try_run_case+0x170/0x3f0
[   38.482123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.482157]  kthread+0x328/0x630
[   38.482191]  ret_from_fork+0x10/0x20
[   38.482226] 
[   38.561433] Allocated by task 286:
[   38.564821]  kasan_save_stack+0x3c/0x68
[   38.568636]  kasan_save_track+0x20/0x40
[   38.572455]  kasan_save_alloc_info+0x40/0x58
[   38.576709]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.582004]  remove_element+0x130/0x1f8
[   38.585824]  mempool_alloc_preallocated+0x58/0xc0
[   38.590511]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   38.596067]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.601014]  kunit_try_run_case+0x170/0x3f0
[   38.605181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.610649]  kthread+0x328/0x630
[   38.613861]  ret_from_fork+0x10/0x20
[   38.617420] 
[   38.618897] The buggy address belongs to the object at ffff000801f1cb00
[   38.618897]  which belongs to the cache kmalloc-128 of size 128
[   38.631398] The buggy address is located 1 bytes inside of
[   38.631398]  128-byte region [ffff000801f1cb00, ffff000801f1cb80)
[   38.642941] 
[   38.644420] The buggy address belongs to the physical page:
[   38.649976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   38.657959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.665600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.672543] page_type: f5(slab)
[   38.675679] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.683398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.691124] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.698936] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.706749] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   38.714561] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.722367] page dumped because: kasan: bad access detected
[   38.727922] 
[   38.729397] Memory state around the buggy address:
[   38.734179]  ffff000801f1ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.741381]  ffff000801f1ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.748587] >ffff000801f1cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.755786]                    ^
[   38.759002]  ffff000801f1cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.766208]  ffff000801f1cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.773409] ==================================================================