Date
July 24, 2025, 4:41 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.697603] ================================================================== [ 34.697681] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.697770] Free of addr fff00000c9bc8001 by task kunit_try_catch/274 [ 34.697814] [ 34.697958] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.698140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.698175] Hardware name: linux,dummy-virt (DT) [ 34.698226] Call trace: [ 34.698271] show_stack+0x20/0x38 (C) [ 34.698354] dump_stack_lvl+0x8c/0xd0 [ 34.698421] print_report+0x118/0x5e8 [ 34.698467] kasan_report_invalid_free+0xc0/0xe8 [ 34.698531] __kasan_mempool_poison_object+0xfc/0x150 [ 34.698786] mempool_free+0x3f4/0x5f0 [ 34.698902] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.698959] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 34.699080] kunit_try_run_case+0x170/0x3f0 [ 34.699128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.699195] kthread+0x328/0x630 [ 34.699238] ret_from_fork+0x10/0x20 [ 34.699287] [ 34.699309] The buggy address belongs to the physical page: [ 34.699390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc8 [ 34.699448] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.699612] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.699715] page_type: f8(unknown) [ 34.699854] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.699981] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.700082] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.700215] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.700294] head: 0bfffe0000000002 ffffc1ffc326f201 00000000ffffffff 00000000ffffffff [ 34.700343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.700664] page dumped because: kasan: bad access detected [ 34.700801] [ 34.700905] Memory state around the buggy address: [ 34.700984] fff00000c9bc7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.701057] fff00000c9bc7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.701204] >fff00000c9bc8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701291] ^ [ 34.701356] fff00000c9bc8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701445] fff00000c9bc8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.701534] ================================================================== [ 34.684942] ================================================================== [ 34.685028] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.685115] Free of addr fff00000c4564f01 by task kunit_try_catch/272 [ 34.685167] [ 34.685208] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 34.685298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.685327] Hardware name: linux,dummy-virt (DT) [ 34.685366] Call trace: [ 34.685391] show_stack+0x20/0x38 (C) [ 34.685454] dump_stack_lvl+0x8c/0xd0 [ 34.685503] print_report+0x118/0x5e8 [ 34.685547] kasan_report_invalid_free+0xc0/0xe8 [ 34.685604] check_slab_allocation+0xfc/0x108 [ 34.685654] __kasan_mempool_poison_object+0x78/0x150 [ 34.685701] mempool_free+0x3f4/0x5f0 [ 34.686593] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.686679] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.686989] kunit_try_run_case+0x170/0x3f0 [ 34.687063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.687118] kthread+0x328/0x630 [ 34.687160] ret_from_fork+0x10/0x20 [ 34.687211] [ 34.687230] Allocated by task 272: [ 34.687258] kasan_save_stack+0x3c/0x68 [ 34.687298] kasan_save_track+0x20/0x40 [ 34.687334] kasan_save_alloc_info+0x40/0x58 [ 34.687371] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.687412] remove_element+0x130/0x1f8 [ 34.687449] mempool_alloc_preallocated+0x58/0xc0 [ 34.687489] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 34.687533] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.687576] kunit_try_run_case+0x170/0x3f0 [ 34.687614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.687656] kthread+0x328/0x630 [ 34.687688] ret_from_fork+0x10/0x20 [ 34.687723] [ 34.687744] The buggy address belongs to the object at fff00000c4564f00 [ 34.687744] which belongs to the cache kmalloc-128 of size 128 [ 34.687823] The buggy address is located 1 bytes inside of [ 34.687823] 128-byte region [fff00000c4564f00, fff00000c4564f80) [ 34.687883] [ 34.687905] The buggy address belongs to the physical page: [ 34.687946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104564 [ 34.688001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.688054] page_type: f5(slab) [ 34.688095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 34.688511] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 34.688617] page dumped because: kasan: bad access detected [ 34.688677] [ 34.688699] Memory state around the buggy address: [ 34.688733] fff00000c4564e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.688793] fff00000c4564e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.688838] >fff00000c4564f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.688875] ^ [ 34.688905] fff00000c4564f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.689344] fff00000c4565000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.689499] ==================================================================
[ 28.624110] ================================================================== [ 28.624502] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.624779] Free of addr ffff888105635001 by task kunit_try_catch/289 [ 28.625117] [ 28.625403] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 28.625460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.625475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.625498] Call Trace: [ 28.625510] <TASK> [ 28.625529] dump_stack_lvl+0x73/0xb0 [ 28.625558] print_report+0xd1/0x640 [ 28.625594] ? __virt_addr_valid+0x1db/0x2d0 [ 28.625622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.625648] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.625674] kasan_report_invalid_free+0x10a/0x130 [ 28.625699] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.625726] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.625752] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.625776] check_slab_allocation+0x11f/0x130 [ 28.625798] __kasan_mempool_poison_object+0x91/0x1d0 [ 28.625821] mempool_free+0x490/0x640 [ 28.625848] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.625872] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 28.625898] ? ret_from_fork+0x116/0x1d0 [ 28.625972] ? kthread+0x337/0x6f0 [ 28.626005] ? ret_from_fork_asm+0x1a/0x30 [ 28.626053] ? mempool_alloc_preallocated+0x5b/0x90 [ 28.626080] mempool_kmalloc_invalid_free+0xed/0x140 [ 28.626106] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 28.626131] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.626153] ? __pfx_mempool_kfree+0x10/0x10 [ 28.626177] ? __pfx_read_tsc+0x10/0x10 [ 28.626200] ? ktime_get_ts64+0x86/0x230 [ 28.626226] kunit_try_run_case+0x1a5/0x480 [ 28.626252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.626274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.626300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.626324] ? __kthread_parkme+0x82/0x180 [ 28.626343] ? preempt_count_sub+0x50/0x80 [ 28.626366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.626390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.626413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.626436] kthread+0x337/0x6f0 [ 28.626455] ? trace_preempt_on+0x20/0xc0 [ 28.626478] ? __pfx_kthread+0x10/0x10 [ 28.626497] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.626521] ? calculate_sigpending+0x7b/0xa0 [ 28.626544] ? __pfx_kthread+0x10/0x10 [ 28.626565] ret_from_fork+0x116/0x1d0 [ 28.626592] ? __pfx_kthread+0x10/0x10 [ 28.626613] ret_from_fork_asm+0x1a/0x30 [ 28.626642] </TASK> [ 28.626654] [ 28.639420] Allocated by task 289: [ 28.639601] kasan_save_stack+0x45/0x70 [ 28.639748] kasan_save_track+0x18/0x40 [ 28.639881] kasan_save_alloc_info+0x3b/0x50 [ 28.640027] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 28.640209] remove_element+0x11e/0x190 [ 28.640488] mempool_alloc_preallocated+0x4d/0x90 [ 28.640793] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 28.641053] mempool_kmalloc_invalid_free+0xed/0x140 [ 28.641503] kunit_try_run_case+0x1a5/0x480 [ 28.641896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.642564] kthread+0x337/0x6f0 [ 28.643079] ret_from_fork+0x116/0x1d0 [ 28.643267] ret_from_fork_asm+0x1a/0x30 [ 28.643445] [ 28.643532] The buggy address belongs to the object at ffff888105635000 [ 28.643532] which belongs to the cache kmalloc-128 of size 128 [ 28.644778] The buggy address is located 1 bytes inside of [ 28.644778] 128-byte region [ffff888105635000, ffff888105635080) [ 28.645762] [ 28.645924] The buggy address belongs to the physical page: [ 28.646404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105635 [ 28.646758] flags: 0x200000000000000(node=0|zone=2) [ 28.647361] page_type: f5(slab) [ 28.647692] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.648771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.649228] page dumped because: kasan: bad access detected [ 28.649465] [ 28.649551] Memory state around the buggy address: [ 28.649721] ffff888105634f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.650052] ffff888105634f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.650587] >ffff888105635000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.650869] ^ [ 28.651500] ffff888105635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.651985] ffff888105635100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.652285] ================================================================== [ 28.655468] ================================================================== [ 28.655940] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.656624] Free of addr ffff888104980001 by task kunit_try_catch/291 [ 28.657294] [ 28.657535] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 28.657616] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.657630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.657653] Call Trace: [ 28.657665] <TASK> [ 28.657684] dump_stack_lvl+0x73/0xb0 [ 28.657744] print_report+0xd1/0x640 [ 28.657769] ? __virt_addr_valid+0x1db/0x2d0 [ 28.657806] ? kasan_addr_to_slab+0x11/0xa0 [ 28.657827] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.657852] kasan_report_invalid_free+0x10a/0x130 [ 28.657876] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.657905] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.657928] __kasan_mempool_poison_object+0x102/0x1d0 [ 28.657952] mempool_free+0x490/0x640 [ 28.657980] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 28.658004] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 28.658030] ? dequeue_entities+0x23f/0x1630 [ 28.658054] ? __kasan_check_write+0x18/0x20 [ 28.658077] ? __pfx_sched_clock_cpu+0x10/0x10 [ 28.658097] ? finish_task_switch.isra.0+0x153/0x700 [ 28.658122] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 28.658146] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 28.658173] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.658195] ? __pfx_mempool_kfree+0x10/0x10 [ 28.658218] ? __pfx_read_tsc+0x10/0x10 [ 28.658240] ? ktime_get_ts64+0x86/0x230 [ 28.658264] kunit_try_run_case+0x1a5/0x480 [ 28.658290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.658313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.658339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.658363] ? __kthread_parkme+0x82/0x180 [ 28.658383] ? preempt_count_sub+0x50/0x80 [ 28.658404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.658429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.658453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.658475] kthread+0x337/0x6f0 [ 28.658495] ? trace_preempt_on+0x20/0xc0 [ 28.658519] ? __pfx_kthread+0x10/0x10 [ 28.658539] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.658562] ? calculate_sigpending+0x7b/0xa0 [ 28.658598] ? __pfx_kthread+0x10/0x10 [ 28.658620] ret_from_fork+0x116/0x1d0 [ 28.658640] ? __pfx_kthread+0x10/0x10 [ 28.658661] ret_from_fork_asm+0x1a/0x30 [ 28.658694] </TASK> [ 28.658706] [ 28.672749] The buggy address belongs to the physical page: [ 28.673437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104980 [ 28.673735] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.674478] flags: 0x200000000000040(head|node=0|zone=2) [ 28.674993] page_type: f8(unknown) [ 28.675407] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.676007] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.676237] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.676464] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.676719] head: 0200000000000002 ffffea0004126001 00000000ffffffff 00000000ffffffff [ 28.677026] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.677391] page dumped because: kasan: bad access detected [ 28.677651] [ 28.677740] Memory state around the buggy address: [ 28.677986] ffff88810497ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.678265] ffff88810497ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.678514] >ffff888104980000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.678827] ^ [ 28.679031] ffff888104980080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.679285] ffff888104980100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.679553] ==================================================================