Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 38.488906] ================================================================== [ 38.499120] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.507103] Free of addr ffff000805826101 by task kunit_try_catch/285 [ 38.513527] [ 38.515013] CPU: 2 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.515077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.515092] Hardware name: WinLink E850-96 board (DT) [ 38.515113] Call trace: [ 38.515130] show_stack+0x20/0x38 (C) [ 38.515166] dump_stack_lvl+0x8c/0xd0 [ 38.515207] print_report+0x118/0x608 [ 38.515243] kasan_report_invalid_free+0xc0/0xe8 [ 38.515277] check_slab_allocation+0xfc/0x108 [ 38.515311] __kasan_mempool_poison_object+0x78/0x150 [ 38.515349] mempool_free+0x28c/0x328 [ 38.515383] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.515419] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.515452] kunit_try_run_case+0x170/0x3f0 [ 38.515487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.515529] kthread+0x328/0x630 [ 38.515559] ret_from_fork+0x10/0x20 [ 38.515594] [ 38.594429] Allocated by task 285: [ 38.597816] kasan_save_stack+0x3c/0x68 [ 38.601632] kasan_save_track+0x20/0x40 [ 38.605452] kasan_save_alloc_info+0x40/0x58 [ 38.609705] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.615000] remove_element+0x130/0x1f8 [ 38.618820] mempool_alloc_preallocated+0x58/0xc0 [ 38.623507] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 38.629062] mempool_kmalloc_invalid_free+0xc0/0x118 [ 38.634013] kunit_try_run_case+0x170/0x3f0 [ 38.638177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.643645] kthread+0x328/0x630 [ 38.646857] ret_from_fork+0x10/0x20 [ 38.650416] [ 38.651894] The buggy address belongs to the object at ffff000805826100 [ 38.651894] which belongs to the cache kmalloc-128 of size 128 [ 38.664395] The buggy address is located 1 bytes inside of [ 38.664395] 128-byte region [ffff000805826100, ffff000805826180) [ 38.675937] [ 38.677415] The buggy address belongs to the physical page: [ 38.682972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885826 [ 38.690957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.698593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.705538] page_type: f5(slab) [ 38.708673] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.716394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.724121] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 38.731932] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.739745] head: 0bfffe0000000001 fffffdffe0160981 00000000ffffffff 00000000ffffffff [ 38.747557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.755363] page dumped because: kasan: bad access detected [ 38.760919] [ 38.762394] Memory state around the buggy address: [ 38.767175] ffff000805826000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.774376] ffff000805826080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.781584] >ffff000805826100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.788782] ^ [ 38.791998] ffff000805826180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.799202] ffff000805826200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.806404] ================================================================== [ 38.815651] ================================================================== [ 38.825593] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.833575] Free of addr ffff000806014001 by task kunit_try_catch/287 [ 38.839997] [ 38.841483] CPU: 4 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 38.841539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.841557] Hardware name: WinLink E850-96 board (DT) [ 38.841577] Call trace: [ 38.841590] show_stack+0x20/0x38 (C) [ 38.841628] dump_stack_lvl+0x8c/0xd0 [ 38.841664] print_report+0x118/0x608 [ 38.841701] kasan_report_invalid_free+0xc0/0xe8 [ 38.841736] __kasan_mempool_poison_object+0xfc/0x150 [ 38.841774] mempool_free+0x28c/0x328 [ 38.841807] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 38.841843] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 38.841878] kunit_try_run_case+0x170/0x3f0 [ 38.841917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.841956] kthread+0x328/0x630 [ 38.841985] ret_from_fork+0x10/0x20 [ 38.842021] [ 38.917083] The buggy address belongs to the physical page: [ 38.922639] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886014 [ 38.930622] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.938264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.945205] page_type: f8(unknown) [ 38.948600] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.956321] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.964047] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.971858] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 38.979672] head: 0bfffe0000000002 fffffdffe0180501 00000000ffffffff 00000000ffffffff [ 38.987484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.995290] page dumped because: kasan: bad access detected [ 39.000846] [ 39.002321] Memory state around the buggy address: [ 39.007102] ffff000806013f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.014303] ffff000806013f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.021511] >ffff000806014000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.028709] ^ [ 39.031924] ffff000806014080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.039129] ffff000806014100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.046330] ==================================================================
[ 28.192382] ================================================================== [ 28.192535] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.193825] Free of addr fff00000c56e8a01 by task kunit_try_catch/242 [ 28.194087] [ 28.194211] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.195401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.195479] Hardware name: linux,dummy-virt (DT) [ 28.195554] Call trace: [ 28.196700] show_stack+0x20/0x38 (C) [ 28.197175] dump_stack_lvl+0x8c/0xd0 [ 28.197658] print_report+0x118/0x608 [ 28.198369] kasan_report_invalid_free+0xc0/0xe8 [ 28.198767] check_slab_allocation+0xfc/0x108 [ 28.199218] __kasan_mempool_poison_object+0x78/0x150 [ 28.199362] mempool_free+0x28c/0x328 [ 28.199477] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.199921] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.200217] kunit_try_run_case+0x170/0x3f0 [ 28.200453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.200949] kthread+0x328/0x630 [ 28.201064] ret_from_fork+0x10/0x20 [ 28.201196] [ 28.201252] Allocated by task 242: [ 28.201330] kasan_save_stack+0x3c/0x68 [ 28.201898] kasan_save_track+0x20/0x40 [ 28.202418] kasan_save_alloc_info+0x40/0x58 [ 28.202827] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.203333] remove_element+0x130/0x1f8 [ 28.203967] mempool_alloc_preallocated+0x58/0xc0 [ 28.204323] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.204431] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.204533] kunit_try_run_case+0x170/0x3f0 [ 28.205216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.205770] kthread+0x328/0x630 [ 28.205942] ret_from_fork+0x10/0x20 [ 28.206042] [ 28.206103] The buggy address belongs to the object at fff00000c56e8a00 [ 28.206103] which belongs to the cache kmalloc-128 of size 128 [ 28.206429] The buggy address is located 1 bytes inside of [ 28.206429] 128-byte region [fff00000c56e8a00, fff00000c56e8a80) [ 28.206573] [ 28.206664] The buggy address belongs to the physical page: [ 28.206909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 28.207181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.207457] page_type: f5(slab) [ 28.207558] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.207698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.207810] page dumped because: kasan: bad access detected [ 28.207968] [ 28.208025] Memory state around the buggy address: [ 28.208164] fff00000c56e8900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.208310] fff00000c56e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.208427] >fff00000c56e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.208529] ^ [ 28.208606] fff00000c56e8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.208763] fff00000c56e8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.208869] ================================================================== [ 28.232214] ================================================================== [ 28.232363] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.232512] Free of addr fff00000c78d8001 by task kunit_try_catch/244 [ 28.232621] [ 28.232841] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.233083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.233159] Hardware name: linux,dummy-virt (DT) [ 28.233900] Call trace: [ 28.234005] show_stack+0x20/0x38 (C) [ 28.234142] dump_stack_lvl+0x8c/0xd0 [ 28.234409] print_report+0x118/0x608 [ 28.234701] kasan_report_invalid_free+0xc0/0xe8 [ 28.235019] __kasan_mempool_poison_object+0xfc/0x150 [ 28.235157] mempool_free+0x28c/0x328 [ 28.235270] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.235446] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 28.235761] kunit_try_run_case+0x170/0x3f0 [ 28.236127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.236295] kthread+0x328/0x630 [ 28.236467] ret_from_fork+0x10/0x20 [ 28.236755] [ 28.236815] The buggy address belongs to the physical page: [ 28.236936] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8 [ 28.237158] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.237297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.237534] page_type: f8(unknown) [ 28.237655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.237887] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.238088] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.238328] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 28.238453] head: 0bfffe0000000002 ffffc1ffc31e3601 00000000ffffffff 00000000ffffffff [ 28.238736] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.238851] page dumped because: kasan: bad access detected [ 28.238977] [ 28.239071] Memory state around the buggy address: [ 28.239186] fff00000c78d7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.239344] fff00000c78d7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.239459] >fff00000c78d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.239553] ^ [ 28.239663] fff00000c78d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.239904] fff00000c78d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.240047] ==================================================================
[ 20.907018] ================================================================== [ 20.907740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.909728] Free of addr ffff888102b56701 by task kunit_try_catch/258 [ 20.910344] [ 20.910868] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.911285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.911327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.911363] Call Trace: [ 20.911381] <TASK> [ 20.911404] dump_stack_lvl+0x73/0xb0 [ 20.911446] print_report+0xd1/0x650 [ 20.911480] ? __virt_addr_valid+0x1db/0x2d0 [ 20.911515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.911549] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.911588] kasan_report_invalid_free+0x10a/0x130 [ 20.911624] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.911664] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.911729] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.911767] check_slab_allocation+0x11f/0x130 [ 20.911800] __kasan_mempool_poison_object+0x91/0x1d0 [ 20.911836] mempool_free+0x2ec/0x380 [ 20.911870] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.911908] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 20.911966] ? __kasan_check_write+0x18/0x20 [ 20.912006] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.912040] ? finish_task_switch.isra.0+0x153/0x700 [ 20.912079] mempool_kmalloc_invalid_free+0xed/0x140 [ 20.912115] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 20.912154] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.912235] ? __pfx_mempool_kfree+0x10/0x10 [ 20.912304] ? __pfx_read_tsc+0x10/0x10 [ 20.912339] ? ktime_get_ts64+0x86/0x230 [ 20.912374] kunit_try_run_case+0x1a5/0x480 [ 20.912409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.912437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.912475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.912511] ? __kthread_parkme+0x82/0x180 [ 20.912541] ? preempt_count_sub+0x50/0x80 [ 20.912573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.912601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.912637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.912680] kthread+0x337/0x6f0 [ 20.912731] ? trace_preempt_on+0x20/0xc0 [ 20.912767] ? __pfx_kthread+0x10/0x10 [ 20.912797] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.912829] ? calculate_sigpending+0x7b/0xa0 [ 20.912864] ? __pfx_kthread+0x10/0x10 [ 20.912894] ret_from_fork+0x116/0x1d0 [ 20.912920] ? __pfx_kthread+0x10/0x10 [ 20.912969] ret_from_fork_asm+0x1a/0x30 [ 20.913019] </TASK> [ 20.913035] [ 20.940637] Allocated by task 258: [ 20.941280] kasan_save_stack+0x45/0x70 [ 20.941649] kasan_save_track+0x18/0x40 [ 20.942629] kasan_save_alloc_info+0x3b/0x50 [ 20.943169] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 20.943836] remove_element+0x11e/0x190 [ 20.944441] mempool_alloc_preallocated+0x4d/0x90 [ 20.945541] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 20.946214] mempool_kmalloc_invalid_free+0xed/0x140 [ 20.947093] kunit_try_run_case+0x1a5/0x480 [ 20.947518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.948311] kthread+0x337/0x6f0 [ 20.948641] ret_from_fork+0x116/0x1d0 [ 20.949669] ret_from_fork_asm+0x1a/0x30 [ 20.950356] [ 20.950600] The buggy address belongs to the object at ffff888102b56700 [ 20.950600] which belongs to the cache kmalloc-128 of size 128 [ 20.952020] The buggy address is located 1 bytes inside of [ 20.952020] 128-byte region [ffff888102b56700, ffff888102b56780) [ 20.953719] [ 20.954300] The buggy address belongs to the physical page: [ 20.954729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56 [ 20.955998] flags: 0x200000000000000(node=0|zone=2) [ 20.956413] page_type: f5(slab) [ 20.956790] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.957775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.958521] page dumped because: kasan: bad access detected [ 20.959536] [ 20.959715] Memory state around the buggy address: [ 20.960759] ffff888102b56600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.961408] ffff888102b56680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.962025] >ffff888102b56700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.963020] ^ [ 20.963885] ffff888102b56780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.964411] ffff888102b56800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.965406] ================================================================== [ 20.971892] ================================================================== [ 20.972517] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.973572] Free of addr ffff888103c28001 by task kunit_try_catch/260 [ 20.974734] [ 20.975125] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 20.975238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.975277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.975340] Call Trace: [ 20.975381] <TASK> [ 20.975418] dump_stack_lvl+0x73/0xb0 [ 20.975474] print_report+0xd1/0x650 [ 20.975539] ? __virt_addr_valid+0x1db/0x2d0 [ 20.975579] ? kasan_addr_to_slab+0x11/0xa0 [ 20.975609] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.975648] kasan_report_invalid_free+0x10a/0x130 [ 20.975684] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.975755] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.975796] __kasan_mempool_poison_object+0x102/0x1d0 [ 20.975833] mempool_free+0x2ec/0x380 [ 20.975866] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 20.975904] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 20.975945] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.976041] ? finish_task_switch.isra.0+0x153/0x700 [ 20.976127] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 20.976212] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 20.976282] ? __pfx_mempool_kmalloc+0x10/0x10 [ 20.976312] ? __pfx_mempool_kfree+0x10/0x10 [ 20.976341] ? __pfx_read_tsc+0x10/0x10 [ 20.976374] ? ktime_get_ts64+0x86/0x230 [ 20.976406] kunit_try_run_case+0x1a5/0x480 [ 20.976436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.976464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.976500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.976536] ? __kthread_parkme+0x82/0x180 [ 20.976565] ? preempt_count_sub+0x50/0x80 [ 20.976595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.976625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.976659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.976725] kthread+0x337/0x6f0 [ 20.976758] ? trace_preempt_on+0x20/0xc0 [ 20.976790] ? __pfx_kthread+0x10/0x10 [ 20.976820] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.976853] ? calculate_sigpending+0x7b/0xa0 [ 20.976887] ? __pfx_kthread+0x10/0x10 [ 20.976919] ret_from_fork+0x116/0x1d0 [ 20.976944] ? __pfx_kthread+0x10/0x10 [ 20.976998] ret_from_fork_asm+0x1a/0x30 [ 20.977041] </TASK> [ 20.977058] [ 20.995831] The buggy address belongs to the physical page: [ 20.996355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c28 [ 20.997074] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.997813] flags: 0x200000000000040(head|node=0|zone=2) [ 20.998379] page_type: f8(unknown) [ 20.998837] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.999570] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.000296] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.000861] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.001745] head: 0200000000000002 ffffea00040f0a01 00000000ffffffff 00000000ffffffff [ 21.002528] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.003252] page dumped because: kasan: bad access detected [ 21.003691] [ 21.003927] Memory state around the buggy address: [ 21.004404] ffff888103c27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.005141] ffff888103c27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.005827] >ffff888103c28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.006465] ^ [ 21.006869] ffff888103c28080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.007507] ffff888103c28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.008089] ==================================================================
[ 65.686401] ================================================================== [ 65.698486] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.706573] Free of addr cc8fc001 by task kunit_try_catch/295 [ 65.712341] [ 65.713867] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.713867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.713897] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.713897] Call trace: [ 65.713897] unwind_backtrace from show_stack+0x18/0x1c [ 65.713928] show_stack from dump_stack_lvl+0x70/0x90 [ 65.713958] dump_stack_lvl from print_report+0x158/0x528 [ 65.713989] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.714019] kasan_report_invalid_free from __kasan_mempool_poison_object+0xd0/0x128 [ 65.714050] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.714050] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.714080] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_large_invalid_free+0xb8/0x104 [ 65.714111] mempool_kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 65.714141] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.714172] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.714202] kthread from ret_from_fork+0x14/0x20 [ 65.714233] Exception stack(0xf2453fb0 to 0xf2453ff8) [ 65.714233] 3fa0: 00000000 00000000 00000000 00000000 [ 65.714263] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.714263] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.714294] [ 65.847717] The buggy address belongs to the physical page: [ 65.853332] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc [ 65.860595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.868316] flags: 0x40(head|zone=0) [ 65.871917] page_type: f8(unknown) [ 65.875335] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.883483] raw: 00000000 [ 65.886138] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 65.894378] head: 00000000 00000002 eebc3371 ffffffff 00000000 ffffffff 00000000 ffffffff [ 65.902587] head: 00000000 00000004 [ 65.906097] page dumped because: kasan: bad access detected [ 65.911712] [ 65.913238] Memory state around the buggy address: [ 65.918060] cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.924621] cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.931182] >cc8fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.937774] ^ [ 65.940307] cc8fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.946899] cc8fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.953460] ================================================================== [ 65.365447] ================================================================== [ 65.377716] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.385772] Free of addr cc893b01 by task kunit_try_catch/293 [ 65.391571] [ 65.393066] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.393096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.393096] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.393127] Call trace: [ 65.393127] unwind_backtrace from show_stack+0x18/0x1c [ 65.393157] show_stack from dump_stack_lvl+0x70/0x90 [ 65.393188] dump_stack_lvl from print_report+0x158/0x528 [ 65.393188] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.393218] kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8 [ 65.393249] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 65.393280] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.393280] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.393310] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.393341] mempool_kmalloc_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 65.393371] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.393402] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.393432] kthread from ret_from_fork+0x14/0x20 [ 65.393463] Exception stack(0xf2423fb0 to 0xf2423ff8) [ 65.393463] 3fa0: 00000000 00000000 00000000 00000000 [ 65.393493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.393493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.393493] [ 65.532531] Allocated by task 293: [ 65.535949] kasan_save_track+0x30/0x5c [ 65.539825] remove_element+0x180/0x264 [ 65.543701] mempool_alloc_preallocated+0x60/0x9c [ 65.548431] mempool_kmalloc_invalid_free_helper+0x90/0x2f8 [ 65.554046] mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.559051] kunit_try_run_case+0x22c/0x5a8 [ 65.563293] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.568817] kthread+0x464/0x810 [ 65.572082] ret_from_fork+0x14/0x20 [ 65.575683] [ 65.577178] The buggy address belongs to the object at cc893b00 [ 65.577178] which belongs to the cache kmalloc-128 of size 128 [ 65.589080] The buggy address is located 1 bytes inside of [ 65.589080] 128-byte region [cc893b00, cc893b80) [ 65.599334] [ 65.600830] The buggy address belongs to the physical page: [ 65.606445] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c893 [ 65.613708] flags: 0x0(zone=0) [ 65.616790] page_type: f5(slab) [ 65.619964] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 65.628082] raw: 00000000 [ 65.630737] page dumped because: kasan: bad access detected [ 65.636352] [ 65.637847] Memory state around the buggy address: [ 65.642669] cc893a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.649230] cc893a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.655822] >cc893b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.662384] ^ [ 65.664947] cc893b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.671508] cc893c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.678070] ==================================================================