Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.536702] ==================================================================
[   31.536764] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.536893] Free of addr fff00000c9ad4001 by task kunit_try_catch/275
[   31.536972] 
[   31.537015] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.537119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.537167] Hardware name: linux,dummy-virt (DT)
[   31.537204] Call trace:
[   31.537236]  show_stack+0x20/0x38 (C)
[   31.537286]  dump_stack_lvl+0x8c/0xd0
[   31.537335]  print_report+0x118/0x5d0
[   31.537388]  kasan_report_invalid_free+0xc0/0xe8
[   31.537625]  __kasan_mempool_poison_object+0xfc/0x150
[   31.537686]  mempool_free+0x28c/0x328
[   31.537786]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.537871]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   31.537925]  kunit_try_run_case+0x170/0x3f0
[   31.537976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.538096]  kthread+0x328/0x630
[   31.538141]  ret_from_fork+0x10/0x20
[   31.538453] 
[   31.538510] The buggy address belongs to the physical page:
[   31.538545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad4
[   31.538654] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.538704] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.538756] page_type: f8(unknown)
[   31.538807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.538860] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.538910] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.538959] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.539008] head: 0bfffe0000000002 ffffc1ffc326b501 00000000ffffffff 00000000ffffffff
[   31.539344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.539394] page dumped because: kasan: bad access detected
[   31.539483] 
[   31.539577] Memory state around the buggy address:
[   31.539640]  fff00000c9ad3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.539712]  fff00000c9ad3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.539806] >fff00000c9ad4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.539885]                    ^
[   31.539913]  fff00000c9ad4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.539986]  fff00000c9ad4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.540106] ==================================================================
[   31.523041] ==================================================================
[   31.524977] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.525083] Free of addr fff00000c7d40e01 by task kunit_try_catch/273
[   31.525136] 
[   31.525167] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   31.525397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.525439] Hardware name: linux,dummy-virt (DT)
[   31.525470] Call trace:
[   31.525494]  show_stack+0x20/0x38 (C)
[   31.526066]  dump_stack_lvl+0x8c/0xd0
[   31.526122]  print_report+0x118/0x5d0
[   31.526166]  kasan_report_invalid_free+0xc0/0xe8
[   31.526214]  check_slab_allocation+0xfc/0x108
[   31.526263]  __kasan_mempool_poison_object+0x78/0x150
[   31.526317]  mempool_free+0x28c/0x328
[   31.526363]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   31.526417]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.526467]  kunit_try_run_case+0x170/0x3f0
[   31.526517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.526571]  kthread+0x328/0x630
[   31.526612]  ret_from_fork+0x10/0x20
[   31.526661] 
[   31.526679] Allocated by task 273:
[   31.526708]  kasan_save_stack+0x3c/0x68
[   31.526750]  kasan_save_track+0x20/0x40
[   31.526787]  kasan_save_alloc_info+0x40/0x58
[   31.526826]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.526868]  remove_element+0x130/0x1f8
[   31.526903]  mempool_alloc_preallocated+0x58/0xc0
[   31.526942]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   31.526985]  mempool_kmalloc_invalid_free+0xc0/0x118
[   31.527027]  kunit_try_run_case+0x170/0x3f0
[   31.527077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.527163]  kthread+0x328/0x630
[   31.527279]  ret_from_fork+0x10/0x20
[   31.527314] 
[   31.527334] The buggy address belongs to the object at fff00000c7d40e00
[   31.527334]  which belongs to the cache kmalloc-128 of size 128
[   31.527631] The buggy address is located 1 bytes inside of
[   31.527631]  128-byte region [fff00000c7d40e00, fff00000c7d40e80)
[   31.527694] 
[   31.527715] The buggy address belongs to the physical page:
[   31.527758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107d40
[   31.527812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.527872] page_type: f5(slab)
[   31.528162] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.528245] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.528287] page dumped because: kasan: bad access detected
[   31.528560] 
[   31.528578] Memory state around the buggy address:
[   31.528608]  fff00000c7d40d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.528651]  fff00000c7d40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.528754] >fff00000c7d40e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.528851]                    ^
[   31.528888]  fff00000c7d40e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.529010]  fff00000c7d40f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.529061] ==================================================================

[   25.840441] ==================================================================
[   25.841171] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.841527] Free of addr ffff8881058d8301 by task kunit_try_catch/291
[   25.842159] 
[   25.842274] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.842501] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.842521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.842545] Call Trace:
[   25.842560]  <TASK>
[   25.842579]  dump_stack_lvl+0x73/0xb0
[   25.842612]  print_report+0xd1/0x610
[   25.842635]  ? __virt_addr_valid+0x1db/0x2d0
[   25.842662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.842688]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.842727]  kasan_report_invalid_free+0x10a/0x130
[   25.842752]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.842789]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.842814]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.842838]  check_slab_allocation+0x11f/0x130
[   25.842859]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.842883]  mempool_free+0x2ec/0x380
[   25.842908]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.842933]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.842962]  ? finish_task_switch.isra.0+0x153/0x700
[   25.842989]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.843012]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   25.843041]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.843065]  ? __pfx_mempool_kfree+0x10/0x10
[   25.843090]  ? __pfx_read_tsc+0x10/0x10
[   25.843113]  ? ktime_get_ts64+0x86/0x230
[   25.843138]  kunit_try_run_case+0x1a5/0x480
[   25.843162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.843183]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.843208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.843231]  ? __kthread_parkme+0x82/0x180
[   25.843253]  ? preempt_count_sub+0x50/0x80
[   25.843275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.843297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.843322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.843346]  kthread+0x337/0x6f0
[   25.843366]  ? trace_preempt_on+0x20/0xc0
[   25.843389]  ? __pfx_kthread+0x10/0x10
[   25.843409]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.843431]  ? calculate_sigpending+0x7b/0xa0
[   25.843455]  ? __pfx_kthread+0x10/0x10
[   25.843477]  ret_from_fork+0x116/0x1d0
[   25.843496]  ? __pfx_kthread+0x10/0x10
[   25.843516]  ret_from_fork_asm+0x1a/0x30
[   25.843547]  </TASK>
[   25.843559] 
[   25.855297] Allocated by task 291:
[   25.855661]  kasan_save_stack+0x45/0x70
[   25.855984]  kasan_save_track+0x18/0x40
[   25.856225]  kasan_save_alloc_info+0x3b/0x50
[   25.856639]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.857160]  remove_element+0x11e/0x190
[   25.857294]  mempool_alloc_preallocated+0x4d/0x90
[   25.857441]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   25.857607]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.857779]  kunit_try_run_case+0x1a5/0x480
[   25.858251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.858745]  kthread+0x337/0x6f0
[   25.859122]  ret_from_fork+0x116/0x1d0
[   25.859559]  ret_from_fork_asm+0x1a/0x30
[   25.860010] 
[   25.860203] The buggy address belongs to the object at ffff8881058d8300
[   25.860203]  which belongs to the cache kmalloc-128 of size 128
[   25.861310] The buggy address is located 1 bytes inside of
[   25.861310]  128-byte region [ffff8881058d8300, ffff8881058d8380)
[   25.861897] 
[   25.862085] The buggy address belongs to the physical page:
[   25.862593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d8
[   25.863302] flags: 0x200000000000000(node=0|zone=2)
[   25.863461] page_type: f5(slab)
[   25.863576] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.864002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.864826] page dumped because: kasan: bad access detected
[   25.865323] 
[   25.865496] Memory state around the buggy address:
[   25.865930]  ffff8881058d8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.866134]  ffff8881058d8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.866334] >ffff8881058d8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.866532]                    ^
[   25.866638]  ffff8881058d8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.866853]  ffff8881058d8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.867259] ==================================================================
[   25.870010] ==================================================================
[   25.870499] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.870786] Free of addr ffff888106234001 by task kunit_try_catch/293
[   25.871955] 
[   25.872084] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   25.872141] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.872156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.872179] Call Trace:
[   25.872193]  <TASK>
[   25.872212]  dump_stack_lvl+0x73/0xb0
[   25.872245]  print_report+0xd1/0x610
[   25.872268]  ? __virt_addr_valid+0x1db/0x2d0
[   25.872293]  ? kasan_addr_to_slab+0x11/0xa0
[   25.872313]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.872339]  kasan_report_invalid_free+0x10a/0x130
[   25.872363]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.872392]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.872416]  __kasan_mempool_poison_object+0x102/0x1d0
[   25.872440]  mempool_free+0x2ec/0x380
[   25.872465]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.872489]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.872517]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.872539]  ? finish_task_switch.isra.0+0x153/0x700
[   25.872565]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   25.872590]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   25.872618]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.872640]  ? __pfx_mempool_kfree+0x10/0x10
[   25.872663]  ? __pfx_read_tsc+0x10/0x10
[   25.872685]  ? ktime_get_ts64+0x86/0x230
[   25.872723]  kunit_try_run_case+0x1a5/0x480
[   25.872746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.872767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.872791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.872815]  ? __kthread_parkme+0x82/0x180
[   25.872835]  ? preempt_count_sub+0x50/0x80
[   25.872858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.872879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.872956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.872982]  kthread+0x337/0x6f0
[   25.873002]  ? trace_preempt_on+0x20/0xc0
[   25.873026]  ? __pfx_kthread+0x10/0x10
[   25.873046]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.873069]  ? calculate_sigpending+0x7b/0xa0
[   25.873093]  ? __pfx_kthread+0x10/0x10
[   25.873114]  ret_from_fork+0x116/0x1d0
[   25.873133]  ? __pfx_kthread+0x10/0x10
[   25.873153]  ret_from_fork_asm+0x1a/0x30
[   25.873184]  </TASK>
[   25.873196] 
[   25.881802] The buggy address belongs to the physical page:
[   25.881996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106234
[   25.882341] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.882583] flags: 0x200000000000040(head|node=0|zone=2)
[   25.882770] page_type: f8(unknown)
[   25.882893] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.883211] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.883537] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.884002] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.884326] head: 0200000000000002 ffffea0004188d01 00000000ffffffff 00000000ffffffff
[   25.884566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.885001] page dumped because: kasan: bad access detected
[   25.885259] 
[   25.885349] Memory state around the buggy address:
[   25.885563]  ffff888106233f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.885853]  ffff888106233f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.886196] >ffff888106234000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.886449]                    ^
[   25.886562]  ffff888106234080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.886852]  ffff888106234100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.887165] ==================================================================