Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   25.233205] ==================================================================
[   25.233395] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   25.233587] Free of addr fff00000c76c5e01 by task kunit_try_catch/245
[   25.233673] 
[   25.233726] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.233868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.233919] Hardware name: linux,dummy-virt (DT)
[   25.233983] Call trace:
[   25.234013]  show_stack+0x20/0x38 (C)
[   25.234109]  dump_stack_lvl+0x8c/0xd0
[   25.234215]  print_report+0x118/0x608
[   25.234343]  kasan_report_invalid_free+0xc0/0xe8
[   25.234430]  check_slab_allocation+0xfc/0x108
[   25.234536]  __kasan_mempool_poison_object+0x78/0x150
[   25.234643]  mempool_free+0x28c/0x328
[   25.234751]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   25.234864]  mempool_kmalloc_invalid_free+0xc0/0x118
[   25.234929]  kunit_try_run_case+0x170/0x3f0
[   25.235039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.235099]  kthread+0x328/0x630
[   25.235154]  ret_from_fork+0x10/0x20
[   25.235209] 
[   25.235230] Allocated by task 245:
[   25.235264]  kasan_save_stack+0x3c/0x68
[   25.235317]  kasan_save_track+0x20/0x40
[   25.235362]  kasan_save_alloc_info+0x40/0x58
[   25.235422]  __kasan_mempool_unpoison_object+0x11c/0x180
[   25.235476]  remove_element+0x130/0x1f8
[   25.235519]  mempool_alloc_preallocated+0x58/0xc0
[   25.235635]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   25.235832]  mempool_kmalloc_invalid_free+0xc0/0x118
[   25.235902]  kunit_try_run_case+0x170/0x3f0
[   25.235949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.236002]  kthread+0x328/0x630
[   25.236042]  ret_from_fork+0x10/0x20
[   25.236084] 
[   25.236108] The buggy address belongs to the object at fff00000c76c5e00
[   25.236108]  which belongs to the cache kmalloc-128 of size 128
[   25.236178] The buggy address is located 1 bytes inside of
[   25.236178]  128-byte region [fff00000c76c5e00, fff00000c76c5e80)
[   25.236278] 
[   25.236305] The buggy address belongs to the physical page:
[   25.236358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c5
[   25.236435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.236499] page_type: f5(slab)
[   25.236584] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.236779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.236853] page dumped because: kasan: bad access detected
[   25.236891] 
[   25.236913] Memory state around the buggy address:
[   25.236958]  fff00000c76c5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.237008]  fff00000c76c5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237087] >fff00000c76c5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.237181]                    ^
[   25.237220]  fff00000c76c5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237501]  fff00000c76c5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.237554] ==================================================================
[   25.252390] ==================================================================
[   25.252517] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   25.252626] Free of addr fff00000c7850001 by task kunit_try_catch/247
[   25.252679] 
[   25.252738] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.252845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.252878] Hardware name: linux,dummy-virt (DT)
[   25.252917] Call trace:
[   25.252952]  show_stack+0x20/0x38 (C)
[   25.253022]  dump_stack_lvl+0x8c/0xd0
[   25.253081]  print_report+0x118/0x608
[   25.253135]  kasan_report_invalid_free+0xc0/0xe8
[   25.253195]  __kasan_mempool_poison_object+0xfc/0x150
[   25.253256]  mempool_free+0x28c/0x328
[   25.253314]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   25.253378]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   25.253983]  kunit_try_run_case+0x170/0x3f0
[   25.254074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.254159]  kthread+0x328/0x630
[   25.254217]  ret_from_fork+0x10/0x20
[   25.254373] 
[   25.254430] The buggy address belongs to the physical page:
[   25.254475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   25.254912] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.254998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.255085] page_type: f8(unknown)
[   25.255364] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.255569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.255726] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.255995] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.256065] head: 0bfffe0000000002 ffffc1ffc31e1401 00000000ffffffff 00000000ffffffff
[   25.256234] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.256340] page dumped because: kasan: bad access detected
[   25.256436] 
[   25.256516] Memory state around the buggy address:
[   25.256566]  fff00000c784ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.256620]  fff00000c784ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.256671] >fff00000c7850000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.256716]                    ^
[   25.256757]  fff00000c7850080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.256806]  fff00000c7850100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.256852] ==================================================================

[   15.668478] ==================================================================
[   15.668931] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.669113] Free of addr ffff8881033b1a01 by task kunit_try_catch/261
[   15.669831] 
[   15.670092] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.670152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.670166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.670190] Call Trace:
[   15.670207]  <TASK>
[   15.670229]  dump_stack_lvl+0x73/0xb0
[   15.670265]  print_report+0xd1/0x650
[   15.670291]  ? __virt_addr_valid+0x1db/0x2d0
[   15.670316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.670339]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.670364]  kasan_report_invalid_free+0x10a/0x130
[   15.670389]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.670415]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.670439]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.670463]  check_slab_allocation+0x11f/0x130
[   15.670485]  __kasan_mempool_poison_object+0x91/0x1d0
[   15.670508]  mempool_free+0x2ec/0x380
[   15.670533]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.670576]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.670604]  ? update_load_avg+0x1be/0x21b0
[   15.670627]  ? dequeue_entities+0x27e/0x1740
[   15.670650]  ? finish_task_switch.isra.0+0x153/0x700
[   15.670677]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.670701]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   15.670725]  ? dequeue_task_fair+0x166/0x4e0
[   15.670746]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.670765]  ? __pfx_mempool_kfree+0x10/0x10
[   15.670786]  ? __pfx_read_tsc+0x10/0x10
[   15.670808]  ? ktime_get_ts64+0x86/0x230
[   15.670836]  kunit_try_run_case+0x1a5/0x480
[   15.670863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.670885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.670911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.670934]  ? __kthread_parkme+0x82/0x180
[   15.670957]  ? preempt_count_sub+0x50/0x80
[   15.670982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.671008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.671030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.671053]  kthread+0x337/0x6f0
[   15.671070]  ? trace_preempt_on+0x20/0xc0
[   15.671095]  ? __pfx_kthread+0x10/0x10
[   15.671113]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.671147]  ? calculate_sigpending+0x7b/0xa0
[   15.671174]  ? __pfx_kthread+0x10/0x10
[   15.671194]  ret_from_fork+0x41/0x80
[   15.671218]  ? __pfx_kthread+0x10/0x10
[   15.671238]  ret_from_fork_asm+0x1a/0x30
[   15.671272]  </TASK>
[   15.671287] 
[   15.681678] Allocated by task 261:
[   15.682306]  kasan_save_stack+0x45/0x70
[   15.682475]  kasan_save_track+0x18/0x40
[   15.682813]  kasan_save_alloc_info+0x3b/0x50
[   15.682995]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   15.683197]  remove_element+0x11e/0x190
[   15.683337]  mempool_alloc_preallocated+0x4d/0x90
[   15.683475]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   15.684139]  mempool_kmalloc_invalid_free+0xed/0x140
[   15.684826]  kunit_try_run_case+0x1a5/0x480
[   15.685002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.685372]  kthread+0x337/0x6f0
[   15.685518]  ret_from_fork+0x41/0x80
[   15.685633]  ret_from_fork_asm+0x1a/0x30
[   15.685870] 
[   15.686011] The buggy address belongs to the object at ffff8881033b1a00
[   15.686011]  which belongs to the cache kmalloc-128 of size 128
[   15.686372] The buggy address is located 1 bytes inside of
[   15.686372]  128-byte region [ffff8881033b1a00, ffff8881033b1a80)
[   15.687449] 
[   15.687798] The buggy address belongs to the physical page:
[   15.688063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b1
[   15.688312] flags: 0x200000000000000(node=0|zone=2)
[   15.688605] page_type: f5(slab)
[   15.689067] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.689335] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.689737] page dumped because: kasan: bad access detected
[   15.689901] 
[   15.690153] Memory state around the buggy address:
[   15.690418]  ffff8881033b1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.690650]  ffff8881033b1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.690891] >ffff8881033b1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.691433]                    ^
[   15.691754]  ffff8881033b1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.692082]  ffff8881033b1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.692459] ==================================================================
[   15.698104] ==================================================================
[   15.698613] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.698904] Free of addr ffff8881029d8001 by task kunit_try_catch/263
[   15.699333] 
[   15.699479] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.699536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.699550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.699584] Call Trace:
[   15.699601]  <TASK>
[   15.699623]  dump_stack_lvl+0x73/0xb0
[   15.699654]  print_report+0xd1/0x650
[   15.699678]  ? __virt_addr_valid+0x1db/0x2d0
[   15.699701]  ? kasan_addr_to_slab+0x11/0xa0
[   15.699721]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.699746]  kasan_report_invalid_free+0x10a/0x130
[   15.699770]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.700226]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.700256]  __kasan_mempool_poison_object+0x102/0x1d0
[   15.700283]  mempool_free+0x2ec/0x380
[   15.700310]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   15.700335]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   15.700360]  ? update_load_avg+0x1be/0x21b0
[   15.700380]  ? dequeue_entities+0x27e/0x1740
[   15.700403]  ? finish_task_switch.isra.0+0x153/0x700
[   15.700432]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   15.700457]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   15.700480]  ? dequeue_task_fair+0x166/0x4e0
[   15.700503]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.700522]  ? __pfx_mempool_kfree+0x10/0x10
[   15.700543]  ? __pfx_read_tsc+0x10/0x10
[   15.700583]  ? ktime_get_ts64+0x86/0x230
[   15.700610]  kunit_try_run_case+0x1a5/0x480
[   15.700635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.700658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.700682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.700757]  ? __kthread_parkme+0x82/0x180
[   15.700781]  ? preempt_count_sub+0x50/0x80
[   15.700805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.700828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.700851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.700874]  kthread+0x337/0x6f0
[   15.700892]  ? trace_preempt_on+0x20/0xc0
[   15.700917]  ? __pfx_kthread+0x10/0x10
[   15.700935]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.700955]  ? calculate_sigpending+0x7b/0xa0
[   15.700978]  ? __pfx_kthread+0x10/0x10
[   15.700995]  ret_from_fork+0x41/0x80
[   15.701015]  ? __pfx_kthread+0x10/0x10
[   15.701032]  ret_from_fork_asm+0x1a/0x30
[   15.701061]  </TASK>
[   15.701074] 
[   15.711181] The buggy address belongs to the physical page:
[   15.711355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029d8
[   15.711798] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.712023] flags: 0x200000000000040(head|node=0|zone=2)
[   15.712434] page_type: f8(unknown)
[   15.712554] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.712917] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.713277] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.713424] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.714047] head: 0200000000000002 ffffea00040a7601 00000000ffffffff 00000000ffffffff
[   15.714807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.715012] page dumped because: kasan: bad access detected
[   15.715177] 
[   15.715252] Memory state around the buggy address:
[   15.715381]  ffff8881029d7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.715589]  ffff8881029d7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.715726] >ffff8881029d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.715851]                    ^
[   15.716347]  ffff8881029d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.717442]  ffff8881029d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.717939] ==================================================================