Date
July 8, 2025, 7:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.457514] ================================================================== [ 21.457599] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.457834] Free of addr fff00000c5713a01 by task kunit_try_catch/241 [ 21.458063] [ 21.458110] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.458351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.458408] Hardware name: linux,dummy-virt (DT) [ 21.458521] Call trace: [ 21.458550] show_stack+0x20/0x38 (C) [ 21.458621] dump_stack_lvl+0x8c/0xd0 [ 21.458688] print_report+0x118/0x608 [ 21.458746] kasan_report_invalid_free+0xc0/0xe8 [ 21.459141] check_slab_allocation+0xfc/0x108 [ 21.459215] __kasan_mempool_poison_object+0x78/0x150 [ 21.459269] mempool_free+0x28c/0x328 [ 21.459762] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.459896] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.459971] kunit_try_run_case+0x170/0x3f0 [ 21.460023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.460075] kthread+0x328/0x630 [ 21.460467] ret_from_fork+0x10/0x20 [ 21.460598] [ 21.460637] Allocated by task 241: [ 21.460665] kasan_save_stack+0x3c/0x68 [ 21.460720] kasan_save_track+0x20/0x40 [ 21.460772] kasan_save_alloc_info+0x40/0x58 [ 21.460813] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.460855] remove_element+0x130/0x1f8 [ 21.460894] mempool_alloc_preallocated+0x58/0xc0 [ 21.460936] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 21.460992] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.461034] kunit_try_run_case+0x170/0x3f0 [ 21.461084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.461125] kthread+0x328/0x630 [ 21.461178] ret_from_fork+0x10/0x20 [ 21.461242] [ 21.461261] The buggy address belongs to the object at fff00000c5713a00 [ 21.461261] which belongs to the cache kmalloc-128 of size 128 [ 21.461414] The buggy address is located 1 bytes inside of [ 21.461414] 128-byte region [fff00000c5713a00, fff00000c5713a80) [ 21.461918] [ 21.462001] The buggy address belongs to the physical page: [ 21.462082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105713 [ 21.462256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.462394] page_type: f5(slab) [ 21.462436] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.462508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.463323] page dumped because: kasan: bad access detected [ 21.463816] [ 21.463890] Memory state around the buggy address: [ 21.463991] fff00000c5713900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.464135] fff00000c5713980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.464202] >fff00000c5713a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.464396] ^ [ 21.464439] fff00000c5713a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.464662] fff00000c5713b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.464851] ================================================================== [ 21.480865] ================================================================== [ 21.480928] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.480983] Free of addr fff00000c78dc001 by task kunit_try_catch/243 [ 21.481320] [ 21.481366] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.481571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.481608] Hardware name: linux,dummy-virt (DT) [ 21.481765] Call trace: [ 21.481992] show_stack+0x20/0x38 (C) [ 21.482089] dump_stack_lvl+0x8c/0xd0 [ 21.482448] print_report+0x118/0x608 [ 21.482516] kasan_report_invalid_free+0xc0/0xe8 [ 21.482567] __kasan_mempool_poison_object+0xfc/0x150 [ 21.482763] mempool_free+0x28c/0x328 [ 21.482943] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 21.483004] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 21.483232] kunit_try_run_case+0x170/0x3f0 [ 21.483304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.483357] kthread+0x328/0x630 [ 21.483541] ret_from_fork+0x10/0x20 [ 21.483995] [ 21.484037] The buggy address belongs to the physical page: [ 21.484081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078dc [ 21.484564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.484693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.484824] page_type: f8(unknown) [ 21.485191] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.485277] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.485426] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.485514] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.485879] head: 0bfffe0000000002 ffffc1ffc31e3701 00000000ffffffff 00000000ffffffff [ 21.486058] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.486103] page dumped because: kasan: bad access detected [ 21.486314] [ 21.486436] Memory state around the buggy address: [ 21.486728] fff00000c78dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.486783] fff00000c78dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.487229] >fff00000c78dc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.487323] ^ [ 21.487353] fff00000c78dc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.487417] fff00000c78dc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.487820] ==================================================================
[ 14.744324] ================================================================== [ 14.744975] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.745715] Free of addr ffff888103a50001 by task kunit_try_catch/260 [ 14.746086] [ 14.746229] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.746279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.746291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.746314] Call Trace: [ 14.746328] <TASK> [ 14.746347] dump_stack_lvl+0x73/0xb0 [ 14.746378] print_report+0xd1/0x650 [ 14.746401] ? __virt_addr_valid+0x1db/0x2d0 [ 14.746426] ? kasan_addr_to_slab+0x11/0xa0 [ 14.746526] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.746557] kasan_report_invalid_free+0x10a/0x130 [ 14.746581] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.746622] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.746646] __kasan_mempool_poison_object+0x102/0x1d0 [ 14.746670] mempool_free+0x2ec/0x380 [ 14.746698] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.746723] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.746746] ? update_load_avg+0x1be/0x21b0 [ 14.746774] ? finish_task_switch.isra.0+0x153/0x700 [ 14.746799] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 14.746823] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 14.746849] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.746872] ? __pfx_mempool_kfree+0x10/0x10 [ 14.746896] ? __pfx_read_tsc+0x10/0x10 [ 14.746917] ? ktime_get_ts64+0x86/0x230 [ 14.746942] kunit_try_run_case+0x1a5/0x480 [ 14.746967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.747014] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.747036] ? __kthread_parkme+0x82/0x180 [ 14.747110] ? preempt_count_sub+0x50/0x80 [ 14.747135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.747158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.747181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.747203] kthread+0x337/0x6f0 [ 14.747222] ? trace_preempt_on+0x20/0xc0 [ 14.747246] ? __pfx_kthread+0x10/0x10 [ 14.747266] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.747287] ? calculate_sigpending+0x7b/0xa0 [ 14.747311] ? __pfx_kthread+0x10/0x10 [ 14.747332] ret_from_fork+0x116/0x1d0 [ 14.747351] ? __pfx_kthread+0x10/0x10 [ 14.747371] ret_from_fork_asm+0x1a/0x30 [ 14.747402] </TASK> [ 14.747415] [ 14.763299] The buggy address belongs to the physical page: [ 14.763952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a50 [ 14.764945] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.765406] flags: 0x200000000000040(head|node=0|zone=2) [ 14.765814] page_type: f8(unknown) [ 14.766221] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.767008] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.767624] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.768027] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.768686] head: 0200000000000002 ffffea00040e9401 00000000ffffffff 00000000ffffffff [ 14.769569] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.770237] page dumped because: kasan: bad access detected [ 14.770618] [ 14.770692] Memory state around the buggy address: [ 14.770852] ffff888103a4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.771134] ffff888103a4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.771866] >ffff888103a50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.772744] ^ [ 14.773118] ffff888103a50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.773916] ffff888103a50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.774354] ================================================================== [ 14.705339] ================================================================== [ 14.705888] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.706651] Free of addr ffff888102602e01 by task kunit_try_catch/258 [ 14.706859] [ 14.706956] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.707002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.707014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.707036] Call Trace: [ 14.707086] <TASK> [ 14.707105] dump_stack_lvl+0x73/0xb0 [ 14.707133] print_report+0xd1/0x650 [ 14.707157] ? __virt_addr_valid+0x1db/0x2d0 [ 14.707181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.707206] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.707230] kasan_report_invalid_free+0x10a/0x130 [ 14.707254] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.707280] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.707303] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.707326] check_slab_allocation+0x11f/0x130 [ 14.707347] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.707370] mempool_free+0x2ec/0x380 [ 14.707398] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.707422] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.707447] ? __kasan_check_write+0x18/0x20 [ 14.707466] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.707487] ? finish_task_switch.isra.0+0x153/0x700 [ 14.707523] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.707547] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 14.707573] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.707594] ? __pfx_mempool_kfree+0x10/0x10 [ 14.707618] ? __pfx_read_tsc+0x10/0x10 [ 14.707639] ? ktime_get_ts64+0x86/0x230 [ 14.707663] kunit_try_run_case+0x1a5/0x480 [ 14.707688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.707710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.707732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.707755] ? __kthread_parkme+0x82/0x180 [ 14.707776] ? preempt_count_sub+0x50/0x80 [ 14.707798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.707821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.707844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.707865] kthread+0x337/0x6f0 [ 14.707884] ? trace_preempt_on+0x20/0xc0 [ 14.707907] ? __pfx_kthread+0x10/0x10 [ 14.707927] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.707947] ? calculate_sigpending+0x7b/0xa0 [ 14.707970] ? __pfx_kthread+0x10/0x10 [ 14.707991] ret_from_fork+0x116/0x1d0 [ 14.708009] ? __pfx_kthread+0x10/0x10 [ 14.708029] ret_from_fork_asm+0x1a/0x30 [ 14.708071] </TASK> [ 14.708084] [ 14.725738] Allocated by task 258: [ 14.726175] kasan_save_stack+0x45/0x70 [ 14.726667] kasan_save_track+0x18/0x40 [ 14.726808] kasan_save_alloc_info+0x3b/0x50 [ 14.726959] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.727146] remove_element+0x11e/0x190 [ 14.727298] mempool_alloc_preallocated+0x4d/0x90 [ 14.727459] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 14.727642] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.727806] kunit_try_run_case+0x1a5/0x480 [ 14.727954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.728137] kthread+0x337/0x6f0 [ 14.728260] ret_from_fork+0x116/0x1d0 [ 14.728392] ret_from_fork_asm+0x1a/0x30 [ 14.728534] [ 14.728605] The buggy address belongs to the object at ffff888102602e00 [ 14.728605] which belongs to the cache kmalloc-128 of size 128 [ 14.728967] The buggy address is located 1 bytes inside of [ 14.728967] 128-byte region [ffff888102602e00, ffff888102602e80) [ 14.729683] [ 14.729886] The buggy address belongs to the physical page: [ 14.730354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 14.731299] flags: 0x200000000000000(node=0|zone=2) [ 14.731998] page_type: f5(slab) [ 14.732406] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.733296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.734180] page dumped because: kasan: bad access detected [ 14.734879] [ 14.735057] Memory state around the buggy address: [ 14.735432] ffff888102602d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.736025] ffff888102602d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.736791] >ffff888102602e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.737012] ^ [ 14.737469] ffff888102602e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.738244] ffff888102602f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.738809] ==================================================================