Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.023431] ==================================================================
[   19.024045] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.024353] Free of addr fff00000c79a0001 by task kunit_try_catch/243
[   19.024430] 
[   19.024496] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.024665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.024694] Hardware name: linux,dummy-virt (DT)
[   19.024726] Call trace:
[   19.025276]  show_stack+0x20/0x38 (C)
[   19.025566]  dump_stack_lvl+0x8c/0xd0
[   19.025624]  print_report+0x118/0x608
[   19.026229]  kasan_report_invalid_free+0xc0/0xe8
[   19.026648]  __kasan_mempool_poison_object+0xfc/0x150
[   19.027109]  mempool_free+0x28c/0x328
[   19.027167]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.027220]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   19.027272]  kunit_try_run_case+0x170/0x3f0
[   19.028055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.028128]  kthread+0x328/0x630
[   19.028450]  ret_from_fork+0x10/0x20
[   19.028581] 
[   19.028603] The buggy address belongs to the physical page:
[   19.028841] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a0
[   19.028902] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.028949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.029218] page_type: f8(unknown)
[   19.029259] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.029514] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.029736] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.029807] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.029860] head: 0bfffe0000000002 ffffc1ffc31e6801 00000000ffffffff 00000000ffffffff
[   19.029908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.030434] page dumped because: kasan: bad access detected
[   19.030536] 
[   19.030638] Memory state around the buggy address:
[   19.030885]  fff00000c799ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.031045]  fff00000c799ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.031514] >fff00000c79a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.031596]                    ^
[   19.031628]  fff00000c79a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.032021]  fff00000c79a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.032071] ==================================================================
[   18.988630] ==================================================================
[   18.989201] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.989970] Free of addr fff00000c7834001 by task kunit_try_catch/241
[   18.990180] 
[   18.990478] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.991444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.991503] Hardware name: linux,dummy-virt (DT)
[   18.991846] Call trace:
[   18.992052]  show_stack+0x20/0x38 (C)
[   18.992112]  dump_stack_lvl+0x8c/0xd0
[   18.992161]  print_report+0x118/0x608
[   18.992206]  kasan_report_invalid_free+0xc0/0xe8
[   18.992255]  check_slab_allocation+0xfc/0x108
[   18.992369]  __kasan_mempool_poison_object+0x78/0x150
[   18.992557]  mempool_free+0x28c/0x328
[   18.992611]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.992680]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.993390]  kunit_try_run_case+0x170/0x3f0
[   18.993459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.993875]  kthread+0x328/0x630
[   18.993967]  ret_from_fork+0x10/0x20
[   18.994334] 
[   18.994366] Allocated by task 241:
[   18.994577]  kasan_save_stack+0x3c/0x68
[   18.994680]  kasan_save_track+0x20/0x40
[   18.994787]  kasan_save_alloc_info+0x40/0x58
[   18.994828]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.994870]  remove_element+0x130/0x1f8
[   18.994904]  mempool_alloc_preallocated+0x58/0xc0
[   18.995546]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.995752]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.996385]  kunit_try_run_case+0x170/0x3f0
[   18.996518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.996629]  kthread+0x328/0x630
[   18.996661]  ret_from_fork+0x10/0x20
[   18.996697] 
[   18.996718] The buggy address belongs to the object at fff00000c7834000
[   18.996718]  which belongs to the cache kmalloc-128 of size 128
[   18.997194] The buggy address is located 1 bytes inside of
[   18.997194]  128-byte region [fff00000c7834000, fff00000c7834080)
[   18.997374] 
[   18.997498] The buggy address belongs to the physical page:
[   18.997717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   18.998070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.998134] page_type: f5(slab)
[   18.998563] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.998800] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.998846] page dumped because: kasan: bad access detected
[   18.998877] 
[   18.998896] Memory state around the buggy address:
[   18.999426]  fff00000c7833f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.999668]  fff00000c7833f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.999970] >fff00000c7834000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.000135]                    ^
[   19.000167]  fff00000c7834080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.000211]  fff00000c7834100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.000249] ==================================================================

[   13.165093] ==================================================================
[   13.166050] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.166565] Free of addr ffff888102a18001 by task kunit_try_catch/261
[   13.166847] 
[   13.166977] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.167022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.167034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.167056] Call Trace:
[   13.167069]  <TASK>
[   13.167084]  dump_stack_lvl+0x73/0xb0
[   13.167127]  print_report+0xd1/0x650
[   13.167151]  ? __virt_addr_valid+0x1db/0x2d0
[   13.167176]  ? kasan_addr_to_slab+0x11/0xa0
[   13.167197]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.167227]  kasan_report_invalid_free+0x10a/0x130
[   13.167251]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.167290]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.167315]  __kasan_mempool_poison_object+0x102/0x1d0
[   13.167340]  mempool_free+0x2ec/0x380
[   13.167375]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.167400]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   13.167423]  ? update_load_avg+0x1be/0x21b0
[   13.167452]  ? finish_task_switch.isra.0+0x153/0x700
[   13.167476]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   13.167529]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   13.167557]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.167579]  ? __pfx_mempool_kfree+0x10/0x10
[   13.167604]  ? __pfx_read_tsc+0x10/0x10
[   13.167625]  ? ktime_get_ts64+0x86/0x230
[   13.167650]  kunit_try_run_case+0x1a5/0x480
[   13.167674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.167696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.167719]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.167742]  ? __kthread_parkme+0x82/0x180
[   13.167764]  ? preempt_count_sub+0x50/0x80
[   13.167786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.167808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.167831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.167853]  kthread+0x337/0x6f0
[   13.167871]  ? trace_preempt_on+0x20/0xc0
[   13.167896]  ? __pfx_kthread+0x10/0x10
[   13.167915]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.167936]  ? calculate_sigpending+0x7b/0xa0
[   13.167961]  ? __pfx_kthread+0x10/0x10
[   13.167981]  ret_from_fork+0x116/0x1d0
[   13.167999]  ? __pfx_kthread+0x10/0x10
[   13.168019]  ret_from_fork_asm+0x1a/0x30
[   13.168050]  </TASK>
[   13.168061] 
[   13.178290] The buggy address belongs to the physical page:
[   13.178596] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a18
[   13.178946] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.179396] flags: 0x200000000000040(head|node=0|zone=2)
[   13.179605] page_type: f8(unknown)
[   13.179737] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.180076] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.180425] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.181068] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.181535] head: 0200000000000002 ffffea00040a8601 00000000ffffffff 00000000ffffffff
[   13.181914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.182438] page dumped because: kasan: bad access detected
[   13.182710] 
[   13.182812] Memory state around the buggy address:
[   13.183024]  ffff888102a17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.183412]  ffff888102a17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.183755] >ffff888102a18000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.184085]                    ^
[   13.184457]  ffff888102a18080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.184803]  ffff888102a18100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.185116] ==================================================================
[   13.137181] ==================================================================
[   13.137868] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.138150] Free of addr ffff8881029dba01 by task kunit_try_catch/259
[   13.138360] 
[   13.138451] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.138496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.138508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.138529] Call Trace:
[   13.138542]  <TASK>
[   13.138559]  dump_stack_lvl+0x73/0xb0
[   13.138586]  print_report+0xd1/0x650
[   13.138609]  ? __virt_addr_valid+0x1db/0x2d0
[   13.138633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.138655]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.138680]  kasan_report_invalid_free+0x10a/0x130
[   13.138704]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.138732]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.138756]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.138780]  check_slab_allocation+0x11f/0x130
[   13.138801]  __kasan_mempool_poison_object+0x91/0x1d0
[   13.138825]  mempool_free+0x2ec/0x380
[   13.138847]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   13.138871]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   13.138898]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.138918]  ? finish_task_switch.isra.0+0x153/0x700
[   13.138943]  mempool_kmalloc_invalid_free+0xed/0x140
[   13.138966]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   13.138992]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.139013]  ? __pfx_mempool_kfree+0x10/0x10
[   13.139037]  ? __pfx_read_tsc+0x10/0x10
[   13.139057]  ? ktime_get_ts64+0x86/0x230
[   13.139080]  kunit_try_run_case+0x1a5/0x480
[   13.139764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.139799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.139830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.139853]  ? __kthread_parkme+0x82/0x180
[   13.139874]  ? preempt_count_sub+0x50/0x80
[   13.139895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.139918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.139940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.139962]  kthread+0x337/0x6f0
[   13.139981]  ? trace_preempt_on+0x20/0xc0
[   13.140004]  ? __pfx_kthread+0x10/0x10
[   13.140024]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.140044]  ? calculate_sigpending+0x7b/0xa0
[   13.140067]  ? __pfx_kthread+0x10/0x10
[   13.140088]  ret_from_fork+0x116/0x1d0
[   13.140115]  ? __pfx_kthread+0x10/0x10
[   13.140134]  ret_from_fork_asm+0x1a/0x30
[   13.140216]  </TASK>
[   13.140229] 
[   13.152638] Allocated by task 259:
[   13.152787]  kasan_save_stack+0x45/0x70
[   13.152939]  kasan_save_track+0x18/0x40
[   13.153255]  kasan_save_alloc_info+0x3b/0x50
[   13.153681]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.153935]  remove_element+0x11e/0x190
[   13.154108]  mempool_alloc_preallocated+0x4d/0x90
[   13.154418]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   13.154606]  mempool_kmalloc_invalid_free+0xed/0x140
[   13.154862]  kunit_try_run_case+0x1a5/0x480
[   13.155068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.155331]  kthread+0x337/0x6f0
[   13.155557]  ret_from_fork+0x116/0x1d0
[   13.155701]  ret_from_fork_asm+0x1a/0x30
[   13.155845] 
[   13.155932] The buggy address belongs to the object at ffff8881029dba00
[   13.155932]  which belongs to the cache kmalloc-128 of size 128
[   13.156794] The buggy address is located 1 bytes inside of
[   13.156794]  128-byte region [ffff8881029dba00, ffff8881029dba80)
[   13.157371] 
[   13.157485] The buggy address belongs to the physical page:
[   13.157688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   13.158070] flags: 0x200000000000000(node=0|zone=2)
[   13.158413] page_type: f5(slab)
[   13.158649] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.159116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.159527] page dumped because: kasan: bad access detected
[   13.159794] 
[   13.159886] Memory state around the buggy address:
[   13.160110]  ffff8881029db900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.160504]  ffff8881029db980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.160725] >ffff8881029dba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.160958]                    ^
[   13.161187]  ffff8881029dba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.161679]  ffff8881029dbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.161908] ==================================================================