Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.155089] ================================================================== [ 19.155166] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.155232] Free of addr fff00000c78e9801 by task kunit_try_catch/241 [ 19.155286] [ 19.155394] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.155511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.155558] Hardware name: linux,dummy-virt (DT) [ 19.155591] Call trace: [ 19.155615] show_stack+0x20/0x38 (C) [ 19.155686] dump_stack_lvl+0x8c/0xd0 [ 19.155736] print_report+0x118/0x5d0 [ 19.155786] kasan_report_invalid_free+0xc0/0xe8 [ 19.156042] check_slab_allocation+0xfc/0x108 [ 19.156155] __kasan_mempool_poison_object+0x78/0x150 [ 19.156360] mempool_free+0x28c/0x328 [ 19.156447] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.156586] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.156721] kunit_try_run_case+0x170/0x3f0 [ 19.156792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.157120] kthread+0x328/0x630 [ 19.157178] ret_from_fork+0x10/0x20 [ 19.157499] [ 19.157642] Allocated by task 241: [ 19.157773] kasan_save_stack+0x3c/0x68 [ 19.157823] kasan_save_track+0x20/0x40 [ 19.157871] kasan_save_alloc_info+0x40/0x58 [ 19.157913] __kasan_mempool_unpoison_object+0x11c/0x180 [ 19.157965] remove_element+0x130/0x1f8 [ 19.158002] mempool_alloc_preallocated+0x58/0xc0 [ 19.158039] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 19.158081] mempool_kmalloc_invalid_free+0xc0/0x118 [ 19.158121] kunit_try_run_case+0x170/0x3f0 [ 19.158159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.158211] kthread+0x328/0x630 [ 19.158264] ret_from_fork+0x10/0x20 [ 19.158306] [ 19.158351] The buggy address belongs to the object at fff00000c78e9800 [ 19.158351] which belongs to the cache kmalloc-128 of size 128 [ 19.158416] The buggy address is located 1 bytes inside of [ 19.158416] 128-byte region [fff00000c78e9800, fff00000c78e9880) [ 19.158487] [ 19.158508] The buggy address belongs to the physical page: [ 19.158541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9 [ 19.158614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.158669] page_type: f5(slab) [ 19.158723] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.158797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.158855] page dumped because: kasan: bad access detected [ 19.158889] [ 19.158907] Memory state around the buggy address: [ 19.158939] fff00000c78e9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.158984] fff00000c78e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.159028] >fff00000c78e9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.159067] ^ [ 19.159095] fff00000c78e9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.159464] fff00000c78e9900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.159649] ================================================================== [ 19.170319] ================================================================== [ 19.170422] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.170496] Free of addr fff00000c7a04001 by task kunit_try_catch/243 [ 19.170551] [ 19.170593] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.170676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.170704] Hardware name: linux,dummy-virt (DT) [ 19.170737] Call trace: [ 19.170760] show_stack+0x20/0x38 (C) [ 19.170811] dump_stack_lvl+0x8c/0xd0 [ 19.170876] print_report+0x118/0x5d0 [ 19.170924] kasan_report_invalid_free+0xc0/0xe8 [ 19.170974] __kasan_mempool_poison_object+0xfc/0x150 [ 19.171199] mempool_free+0x28c/0x328 [ 19.171262] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 19.171358] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 19.171410] kunit_try_run_case+0x170/0x3f0 [ 19.171585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.171733] kthread+0x328/0x630 [ 19.171888] ret_from_fork+0x10/0x20 [ 19.172020] [ 19.172051] The buggy address belongs to the physical page: [ 19.172088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a04 [ 19.172145] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.172193] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.172319] page_type: f8(unknown) [ 19.172365] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.172416] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.172741] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.172952] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.173070] head: 0bfffe0000000002 ffffc1ffc31e8101 00000000ffffffff 00000000ffffffff [ 19.173208] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.173250] page dumped because: kasan: bad access detected [ 19.173482] [ 19.173685] Memory state around the buggy address: [ 19.173723] fff00000c7a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.174030] fff00000c7a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.174120] >fff00000c7a04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.174235] ^ [ 19.174296] fff00000c7a04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.174589] fff00000c7a04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.174665] ==================================================================
[ 18.821432] ================================================================== [ 18.821578] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.821642] Free of addr fff00000c7a74001 by task kunit_try_catch/243 [ 18.821836] [ 18.821875] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.821957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.821984] Hardware name: linux,dummy-virt (DT) [ 18.822042] Call trace: [ 18.822175] show_stack+0x20/0x38 (C) [ 18.822301] dump_stack_lvl+0x8c/0xd0 [ 18.822443] print_report+0x118/0x5d0 [ 18.822491] kasan_report_invalid_free+0xc0/0xe8 [ 18.822541] __kasan_mempool_poison_object+0xfc/0x150 [ 18.822594] mempool_free+0x28c/0x328 [ 18.822842] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.822898] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.822950] kunit_try_run_case+0x170/0x3f0 [ 18.822997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.823060] kthread+0x328/0x630 [ 18.823183] ret_from_fork+0x10/0x20 [ 18.823232] [ 18.823252] The buggy address belongs to the physical page: [ 18.823286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74 [ 18.823350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.823594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.823712] page_type: f8(unknown) [ 18.823858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.824024] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.824098] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.824159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.824483] head: 0bfffe0000000002 ffffc1ffc31e9d01 00000000ffffffff 00000000ffffffff [ 18.824573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.824672] page dumped because: kasan: bad access detected [ 18.824704] [ 18.824753] Memory state around the buggy address: [ 18.824931] fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.824975] fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.825161] >fff00000c7a74000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.825200] ^ [ 18.825228] fff00000c7a74080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.826654] fff00000c7a74100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.826816] ================================================================== [ 18.809210] ================================================================== [ 18.809290] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.809495] Free of addr fff00000c7a4e901 by task kunit_try_catch/241 [ 18.809538] [ 18.809577] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.809687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.809714] Hardware name: linux,dummy-virt (DT) [ 18.809746] Call trace: [ 18.809770] show_stack+0x20/0x38 (C) [ 18.809822] dump_stack_lvl+0x8c/0xd0 [ 18.809891] print_report+0x118/0x5d0 [ 18.809967] kasan_report_invalid_free+0xc0/0xe8 [ 18.810128] check_slab_allocation+0xfc/0x108 [ 18.810189] __kasan_mempool_poison_object+0x78/0x150 [ 18.810240] mempool_free+0x28c/0x328 [ 18.810287] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.810348] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.810398] kunit_try_run_case+0x170/0x3f0 [ 18.810447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.810500] kthread+0x328/0x630 [ 18.810545] ret_from_fork+0x10/0x20 [ 18.810595] [ 18.810613] Allocated by task 241: [ 18.810643] kasan_save_stack+0x3c/0x68 [ 18.810695] kasan_save_track+0x20/0x40 [ 18.810734] kasan_save_alloc_info+0x40/0x58 [ 18.810772] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.810836] remove_element+0x130/0x1f8 [ 18.810884] mempool_alloc_preallocated+0x58/0xc0 [ 18.810923] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.810966] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.811008] kunit_try_run_case+0x170/0x3f0 [ 18.811044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.811115] kthread+0x328/0x630 [ 18.811148] ret_from_fork+0x10/0x20 [ 18.811184] [ 18.811203] The buggy address belongs to the object at fff00000c7a4e900 [ 18.811203] which belongs to the cache kmalloc-128 of size 128 [ 18.811262] The buggy address is located 1 bytes inside of [ 18.811262] 128-byte region [fff00000c7a4e900, fff00000c7a4e980) [ 18.811331] [ 18.811353] The buggy address belongs to the physical page: [ 18.811383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e [ 18.811437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.811487] page_type: f5(slab) [ 18.811529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.811579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.811619] page dumped because: kasan: bad access detected [ 18.811662] [ 18.811681] Memory state around the buggy address: [ 18.811714] fff00000c7a4e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.811776] fff00000c7a4e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.811819] >fff00000c7a4e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.811858] ^ [ 18.811884] fff00000c7a4e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.811953] fff00000c7a4ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.812026] ==================================================================
[ 18.709462] ================================================================== [ 18.709803] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.709872] Free of addr fff00000c7804001 by task kunit_try_catch/243 [ 18.709948] [ 18.709983] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.710063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.710090] Hardware name: linux,dummy-virt (DT) [ 18.710123] Call trace: [ 18.710169] show_stack+0x20/0x38 (C) [ 18.710256] dump_stack_lvl+0x8c/0xd0 [ 18.710312] print_report+0x118/0x5d0 [ 18.710371] kasan_report_invalid_free+0xc0/0xe8 [ 18.710447] __kasan_mempool_poison_object+0xfc/0x150 [ 18.710527] mempool_free+0x28c/0x328 [ 18.710587] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.710641] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 18.710693] kunit_try_run_case+0x170/0x3f0 [ 18.710885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.711226] kthread+0x328/0x630 [ 18.711340] ret_from_fork+0x10/0x20 [ 18.711503] [ 18.711572] The buggy address belongs to the physical page: [ 18.711662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804 [ 18.711756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.711811] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.711863] page_type: f8(unknown) [ 18.711914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.711963] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.712013] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.712063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.712483] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff [ 18.712659] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.712793] page dumped because: kasan: bad access detected [ 18.712825] [ 18.712843] Memory state around the buggy address: [ 18.712912] fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.712954] fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.712997] >fff00000c7804000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.713226] ^ [ 18.713332] fff00000c7804080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.713494] fff00000c7804100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.713590] ================================================================== [ 18.697692] ================================================================== [ 18.697807] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.697881] Free of addr fff00000c7716701 by task kunit_try_catch/241 [ 18.697939] [ 18.698005] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.698086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.698114] Hardware name: linux,dummy-virt (DT) [ 18.698144] Call trace: [ 18.698167] show_stack+0x20/0x38 (C) [ 18.698225] dump_stack_lvl+0x8c/0xd0 [ 18.698272] print_report+0x118/0x5d0 [ 18.698319] kasan_report_invalid_free+0xc0/0xe8 [ 18.698370] check_slab_allocation+0xfc/0x108 [ 18.698417] __kasan_mempool_poison_object+0x78/0x150 [ 18.698469] mempool_free+0x28c/0x328 [ 18.698522] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 18.698583] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.698633] kunit_try_run_case+0x170/0x3f0 [ 18.698681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.698947] kthread+0x328/0x630 [ 18.699007] ret_from_fork+0x10/0x20 [ 18.699222] [ 18.699249] Allocated by task 241: [ 18.699281] kasan_save_stack+0x3c/0x68 [ 18.699373] kasan_save_track+0x20/0x40 [ 18.699413] kasan_save_alloc_info+0x40/0x58 [ 18.699452] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.699495] remove_element+0x130/0x1f8 [ 18.699532] mempool_alloc_preallocated+0x58/0xc0 [ 18.699689] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 18.699801] mempool_kmalloc_invalid_free+0xc0/0x118 [ 18.699865] kunit_try_run_case+0x170/0x3f0 [ 18.699947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.700025] kthread+0x328/0x630 [ 18.700099] ret_from_fork+0x10/0x20 [ 18.700135] [ 18.700157] The buggy address belongs to the object at fff00000c7716700 [ 18.700157] which belongs to the cache kmalloc-128 of size 128 [ 18.700240] The buggy address is located 1 bytes inside of [ 18.700240] 128-byte region [fff00000c7716700, fff00000c7716780) [ 18.700299] [ 18.700450] The buggy address belongs to the physical page: [ 18.700531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107716 [ 18.700638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.700773] page_type: f5(slab) [ 18.700887] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.700938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.700999] page dumped because: kasan: bad access detected [ 18.701292] [ 18.701375] Memory state around the buggy address: [ 18.701467] fff00000c7716600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.701552] fff00000c7716680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.701605] >fff00000c7716700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.701644] ^ [ 18.701945] fff00000c7716780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.702071] fff00000c7716800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.702178] ==================================================================
[ 13.924785] ================================================================== [ 13.925414] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.925873] Free of addr ffff888102988f01 by task kunit_try_catch/258 [ 13.926174] [ 13.926304] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.926351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.926363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.926396] Call Trace: [ 13.926407] <TASK> [ 13.926423] dump_stack_lvl+0x73/0xb0 [ 13.926453] print_report+0xd1/0x610 [ 13.926488] ? __virt_addr_valid+0x1db/0x2d0 [ 13.926513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.926536] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.926563] kasan_report_invalid_free+0x10a/0x130 [ 13.926629] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.926659] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.926713] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.926740] check_slab_allocation+0x11f/0x130 [ 13.926778] __kasan_mempool_poison_object+0x91/0x1d0 [ 13.926804] mempool_free+0x2ec/0x380 [ 13.926831] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.926858] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 13.926885] ? kasan_save_track+0x18/0x40 [ 13.926915] ? kasan_save_alloc_info+0x3b/0x50 [ 13.926938] ? kasan_save_stack+0x45/0x70 [ 13.926972] mempool_kmalloc_invalid_free+0xed/0x140 [ 13.927008] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 13.927046] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.927069] ? __pfx_mempool_kfree+0x10/0x10 [ 13.927095] ? __pfx_read_tsc+0x10/0x10 [ 13.927116] ? ktime_get_ts64+0x86/0x230 [ 13.927142] kunit_try_run_case+0x1a5/0x480 [ 13.927168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.927191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.927217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.927241] ? __kthread_parkme+0x82/0x180 [ 13.927262] ? preempt_count_sub+0x50/0x80 [ 13.927286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.927311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.927334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.927359] kthread+0x337/0x6f0 [ 13.927378] ? trace_preempt_on+0x20/0xc0 [ 13.927402] ? __pfx_kthread+0x10/0x10 [ 13.927423] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.927444] ? calculate_sigpending+0x7b/0xa0 [ 13.927469] ? __pfx_kthread+0x10/0x10 [ 13.927490] ret_from_fork+0x116/0x1d0 [ 13.927508] ? __pfx_kthread+0x10/0x10 [ 13.927560] ret_from_fork_asm+0x1a/0x30 [ 13.927598] </TASK> [ 13.927609] [ 13.938218] Allocated by task 258: [ 13.938473] kasan_save_stack+0x45/0x70 [ 13.938839] kasan_save_track+0x18/0x40 [ 13.939007] kasan_save_alloc_info+0x3b/0x50 [ 13.939258] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.939491] remove_element+0x11e/0x190 [ 13.939793] mempool_alloc_preallocated+0x4d/0x90 [ 13.940089] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 13.940278] mempool_kmalloc_invalid_free+0xed/0x140 [ 13.940581] kunit_try_run_case+0x1a5/0x480 [ 13.940797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.941062] kthread+0x337/0x6f0 [ 13.941218] ret_from_fork+0x116/0x1d0 [ 13.941429] ret_from_fork_asm+0x1a/0x30 [ 13.941786] [ 13.941902] The buggy address belongs to the object at ffff888102988f00 [ 13.941902] which belongs to the cache kmalloc-128 of size 128 [ 13.942511] The buggy address is located 1 bytes inside of [ 13.942511] 128-byte region [ffff888102988f00, ffff888102988f80) [ 13.943092] [ 13.943183] The buggy address belongs to the physical page: [ 13.943444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988 [ 13.943925] flags: 0x200000000000000(node=0|zone=2) [ 13.944194] page_type: f5(slab) [ 13.944315] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.944545] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 13.944774] page dumped because: kasan: bad access detected [ 13.945132] [ 13.945291] Memory state around the buggy address: [ 13.945518] ffff888102988e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.945880] ffff888102988e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.946354] >ffff888102988f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.946963] ^ [ 13.947108] ffff888102988f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.947420] ffff888102989000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.947636] ================================================================== [ 13.951385] ================================================================== [ 13.952046] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.952409] Free of addr ffff8881039fc001 by task kunit_try_catch/260 [ 13.952703] [ 13.952819] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.952865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.952937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.952973] Call Trace: [ 13.952985] <TASK> [ 13.953001] dump_stack_lvl+0x73/0xb0 [ 13.953031] print_report+0xd1/0x610 [ 13.953054] ? __virt_addr_valid+0x1db/0x2d0 [ 13.953078] ? kasan_addr_to_slab+0x11/0xa0 [ 13.953108] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.953136] kasan_report_invalid_free+0x10a/0x130 [ 13.953161] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.953200] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.953226] __kasan_mempool_poison_object+0x102/0x1d0 [ 13.953251] mempool_free+0x2ec/0x380 [ 13.953278] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.953313] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 13.953344] ? finish_task_switch.isra.0+0x153/0x700 [ 13.953373] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 13.953409] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 13.953438] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.953461] ? __pfx_mempool_kfree+0x10/0x10 [ 13.953486] ? __pfx_read_tsc+0x10/0x10 [ 13.953507] ? ktime_get_ts64+0x86/0x230 [ 13.953568] kunit_try_run_case+0x1a5/0x480 [ 13.953596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.953643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.953667] ? __kthread_parkme+0x82/0x180 [ 13.953699] ? preempt_count_sub+0x50/0x80 [ 13.953723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.953782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.953807] kthread+0x337/0x6f0 [ 13.953826] ? trace_preempt_on+0x20/0xc0 [ 13.953850] ? __pfx_kthread+0x10/0x10 [ 13.953871] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.953901] ? calculate_sigpending+0x7b/0xa0 [ 13.953926] ? __pfx_kthread+0x10/0x10 [ 13.953947] ret_from_fork+0x116/0x1d0 [ 13.953966] ? __pfx_kthread+0x10/0x10 [ 13.953987] ret_from_fork_asm+0x1a/0x30 [ 13.954019] </TASK> [ 13.954029] [ 13.963340] The buggy address belongs to the physical page: [ 13.963638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039fc [ 13.964184] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.964528] flags: 0x200000000000040(head|node=0|zone=2) [ 13.964807] page_type: f8(unknown) [ 13.964982] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.965218] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.965450] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.966031] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.966772] head: 0200000000000002 ffffea00040e7f01 00000000ffffffff 00000000ffffffff [ 13.967157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.967392] page dumped because: kasan: bad access detected [ 13.967684] [ 13.967779] Memory state around the buggy address: [ 13.968207] ffff8881039fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.968636] ffff8881039fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.968949] >ffff8881039fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.969374] ^ [ 13.969598] ffff8881039fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.969916] ffff8881039fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.970290] ==================================================================
[ 13.819286] ================================================================== [ 13.820131] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.820498] Free of addr ffff888102bf8001 by task kunit_try_catch/261 [ 13.820739] [ 13.820844] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.820891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.820903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.820924] Call Trace: [ 13.820937] <TASK> [ 13.820955] dump_stack_lvl+0x73/0xb0 [ 13.820983] print_report+0xd1/0x610 [ 13.821005] ? __virt_addr_valid+0x1db/0x2d0 [ 13.821029] ? kasan_addr_to_slab+0x11/0xa0 [ 13.821050] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.821077] kasan_report_invalid_free+0x10a/0x130 [ 13.821102] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.821136] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.821160] __kasan_mempool_poison_object+0x102/0x1d0 [ 13.821185] mempool_free+0x2ec/0x380 [ 13.821213] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.821238] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 13.821266] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.821287] ? finish_task_switch.isra.0+0x153/0x700 [ 13.821314] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 13.821339] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 13.821367] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.821389] ? __pfx_mempool_kfree+0x10/0x10 [ 13.821414] ? __pfx_read_tsc+0x10/0x10 [ 13.821768] ? ktime_get_ts64+0x86/0x230 [ 13.821810] kunit_try_run_case+0x1a5/0x480 [ 13.822069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.822101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.822129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.822152] ? __kthread_parkme+0x82/0x180 [ 13.822173] ? preempt_count_sub+0x50/0x80 [ 13.822196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.822220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.822244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.822268] kthread+0x337/0x6f0 [ 13.822287] ? trace_preempt_on+0x20/0xc0 [ 13.822311] ? __pfx_kthread+0x10/0x10 [ 13.822331] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.822352] ? calculate_sigpending+0x7b/0xa0 [ 13.822376] ? __pfx_kthread+0x10/0x10 [ 13.822397] ret_from_fork+0x116/0x1d0 [ 13.822416] ? __pfx_kthread+0x10/0x10 [ 13.822449] ret_from_fork_asm+0x1a/0x30 [ 13.822482] </TASK> [ 13.822492] [ 13.837254] The buggy address belongs to the physical page: [ 13.837842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf8 [ 13.838454] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 13.839067] flags: 0x200000000000040(head|node=0|zone=2) [ 13.839547] page_type: f8(unknown) [ 13.839971] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.840300] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.840999] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 13.841415] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 13.841988] head: 0200000000000002 ffffea00040afe01 00000000ffffffff 00000000ffffffff [ 13.842557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 13.842876] page dumped because: kasan: bad access detected [ 13.843109] [ 13.843196] Memory state around the buggy address: [ 13.843407] ffff888102bf7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.843637] ffff888102bf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.843968] >ffff888102bf8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.844360] ^ [ 13.844554] ffff888102bf8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.844782] ffff888102bf8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.845092] ================================================================== [ 13.784320] ================================================================== [ 13.784949] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.785229] Free of addr ffff8881026ef901 by task kunit_try_catch/259 [ 13.785450] [ 13.785542] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.785588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.785600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.785623] Call Trace: [ 13.785635] <TASK> [ 13.785653] dump_stack_lvl+0x73/0xb0 [ 13.785683] print_report+0xd1/0x610 [ 13.785706] ? __virt_addr_valid+0x1db/0x2d0 [ 13.785733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.785756] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.785785] kasan_report_invalid_free+0x10a/0x130 [ 13.785813] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.785841] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.785866] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.785891] check_slab_allocation+0x11f/0x130 [ 13.785912] __kasan_mempool_poison_object+0x91/0x1d0 [ 13.785937] mempool_free+0x2ec/0x380 [ 13.785964] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 13.785990] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 13.786021] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.786042] ? finish_task_switch.isra.0+0x153/0x700 [ 13.786069] mempool_kmalloc_invalid_free+0xed/0x140 [ 13.786093] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 13.786120] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.786141] ? __pfx_mempool_kfree+0x10/0x10 [ 13.786166] ? __pfx_read_tsc+0x10/0x10 [ 13.786187] ? ktime_get_ts64+0x86/0x230 [ 13.786211] kunit_try_run_case+0x1a5/0x480 [ 13.786236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.786258] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.786282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.786305] ? __kthread_parkme+0x82/0x180 [ 13.786326] ? preempt_count_sub+0x50/0x80 [ 13.786349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.786373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.786397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.786420] kthread+0x337/0x6f0 [ 13.786473] ? trace_preempt_on+0x20/0xc0 [ 13.786497] ? __pfx_kthread+0x10/0x10 [ 13.786533] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.786555] ? calculate_sigpending+0x7b/0xa0 [ 13.786579] ? __pfx_kthread+0x10/0x10 [ 13.786600] ret_from_fork+0x116/0x1d0 [ 13.786618] ? __pfx_kthread+0x10/0x10 [ 13.786638] ret_from_fork_asm+0x1a/0x30 [ 13.786671] </TASK> [ 13.786681] [ 13.800420] Allocated by task 259: [ 13.800735] kasan_save_stack+0x45/0x70 [ 13.801675] kasan_save_track+0x18/0x40 [ 13.802066] kasan_save_alloc_info+0x3b/0x50 [ 13.802554] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.803064] remove_element+0x11e/0x190 [ 13.803697] mempool_alloc_preallocated+0x4d/0x90 [ 13.804168] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 13.804789] mempool_kmalloc_invalid_free+0xed/0x140 [ 13.805259] kunit_try_run_case+0x1a5/0x480 [ 13.805731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.805917] kthread+0x337/0x6f0 [ 13.806038] ret_from_fork+0x116/0x1d0 [ 13.806172] ret_from_fork_asm+0x1a/0x30 [ 13.806314] [ 13.806387] The buggy address belongs to the object at ffff8881026ef900 [ 13.806387] which belongs to the cache kmalloc-128 of size 128 [ 13.807866] The buggy address is located 1 bytes inside of [ 13.807866] 128-byte region [ffff8881026ef900, ffff8881026ef980) [ 13.809039] [ 13.809248] The buggy address belongs to the physical page: [ 13.809868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ef [ 13.810386] flags: 0x200000000000000(node=0|zone=2) [ 13.810986] page_type: f5(slab) [ 13.811193] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.811900] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.812138] page dumped because: kasan: bad access detected [ 13.812311] [ 13.812379] Memory state around the buggy address: [ 13.812965] ffff8881026ef800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.813728] ffff8881026ef880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.814380] >ffff8881026ef900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.815118] ^ [ 13.815452] ffff8881026ef980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.815976] ffff8881026efa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.816190] ==================================================================
[ 14.032464] ================================================================== [ 14.033645] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.033932] Free of addr ffff8881029c5401 by task kunit_try_catch/258 [ 14.035255] [ 14.035802] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.035880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.035893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.035918] Call Trace: [ 14.035934] <TASK> [ 14.035957] dump_stack_lvl+0x73/0xb0 [ 14.036053] print_report+0xd1/0x610 [ 14.036083] ? __virt_addr_valid+0x1db/0x2d0 [ 14.036108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.036132] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.036159] kasan_report_invalid_free+0x10a/0x130 [ 14.036184] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.036254] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.036280] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.036304] check_slab_allocation+0x11f/0x130 [ 14.036326] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.036351] mempool_free+0x2ec/0x380 [ 14.036380] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.036426] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.036458] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.036480] ? finish_task_switch.isra.0+0x153/0x700 [ 14.036506] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.036530] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 14.036557] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.036579] ? __pfx_mempool_kfree+0x10/0x10 [ 14.036604] ? __pfx_read_tsc+0x10/0x10 [ 14.036625] ? ktime_get_ts64+0x86/0x230 [ 14.036649] kunit_try_run_case+0x1a5/0x480 [ 14.036674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.036696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.036721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.036745] ? __kthread_parkme+0x82/0x180 [ 14.036766] ? preempt_count_sub+0x50/0x80 [ 14.036789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.036812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.036836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.036866] kthread+0x337/0x6f0 [ 14.036885] ? trace_preempt_on+0x20/0xc0 [ 14.036907] ? __pfx_kthread+0x10/0x10 [ 14.036927] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.036949] ? calculate_sigpending+0x7b/0xa0 [ 14.036973] ? __pfx_kthread+0x10/0x10 [ 14.037019] ret_from_fork+0x116/0x1d0 [ 14.037039] ? __pfx_kthread+0x10/0x10 [ 14.037059] ret_from_fork_asm+0x1a/0x30 [ 14.037090] </TASK> [ 14.037100] [ 14.054385] Allocated by task 258: [ 14.054648] kasan_save_stack+0x45/0x70 [ 14.055366] kasan_save_track+0x18/0x40 [ 14.055638] kasan_save_alloc_info+0x3b/0x50 [ 14.055995] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.056489] remove_element+0x11e/0x190 [ 14.056641] mempool_alloc_preallocated+0x4d/0x90 [ 14.056800] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 14.056995] mempool_kmalloc_invalid_free+0xed/0x140 [ 14.057581] kunit_try_run_case+0x1a5/0x480 [ 14.058387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.058970] kthread+0x337/0x6f0 [ 14.059335] ret_from_fork+0x116/0x1d0 [ 14.059822] ret_from_fork_asm+0x1a/0x30 [ 14.060295] [ 14.060511] The buggy address belongs to the object at ffff8881029c5400 [ 14.060511] which belongs to the cache kmalloc-128 of size 128 [ 14.061122] The buggy address is located 1 bytes inside of [ 14.061122] 128-byte region [ffff8881029c5400, ffff8881029c5480) [ 14.062379] [ 14.062678] The buggy address belongs to the physical page: [ 14.063026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5 [ 14.063278] flags: 0x200000000000000(node=0|zone=2) [ 14.063923] page_type: f5(slab) [ 14.064342] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.065481] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.066196] page dumped because: kasan: bad access detected [ 14.066836] [ 14.066911] Memory state around the buggy address: [ 14.067239] ffff8881029c5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.067930] ffff8881029c5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.068683] >ffff8881029c5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.068917] ^ [ 14.069187] ffff8881029c5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.069922] ffff8881029c5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.070776] ================================================================== [ 14.075868] ================================================================== [ 14.076892] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.077560] Free of addr ffff8881039c4001 by task kunit_try_catch/260 [ 14.077802] [ 14.077995] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.078056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.078068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.078091] Call Trace: [ 14.078106] <TASK> [ 14.078127] dump_stack_lvl+0x73/0xb0 [ 14.078161] print_report+0xd1/0x610 [ 14.078231] ? __virt_addr_valid+0x1db/0x2d0 [ 14.078256] ? kasan_addr_to_slab+0x11/0xa0 [ 14.078320] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.078351] kasan_report_invalid_free+0x10a/0x130 [ 14.078375] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.078404] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.078430] __kasan_mempool_poison_object+0x102/0x1d0 [ 14.078455] mempool_free+0x2ec/0x380 [ 14.078482] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 14.078508] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.078533] ? update_load_avg+0x1be/0x21b0 [ 14.078556] ? update_load_avg+0x1be/0x21b0 [ 14.078577] ? update_curr+0x80/0x810 [ 14.078596] ? enqueue_entity+0x215/0x1080 [ 14.078620] ? finish_task_switch.isra.0+0x153/0x700 [ 14.078646] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 14.078671] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 14.078700] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.078722] ? __pfx_mempool_kfree+0x10/0x10 [ 14.078746] ? __pfx_read_tsc+0x10/0x10 [ 14.078768] ? ktime_get_ts64+0x86/0x230 [ 14.078791] kunit_try_run_case+0x1a5/0x480 [ 14.078817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.078839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.078864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.078888] ? __kthread_parkme+0x82/0x180 [ 14.078909] ? preempt_count_sub+0x50/0x80 [ 14.078932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.078955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.078979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.079003] kthread+0x337/0x6f0 [ 14.079379] ? trace_preempt_on+0x20/0xc0 [ 14.079406] ? __pfx_kthread+0x10/0x10 [ 14.079426] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.079450] ? calculate_sigpending+0x7b/0xa0 [ 14.079474] ? __pfx_kthread+0x10/0x10 [ 14.079495] ret_from_fork+0x116/0x1d0 [ 14.079514] ? __pfx_kthread+0x10/0x10 [ 14.079535] ret_from_fork_asm+0x1a/0x30 [ 14.079567] </TASK> [ 14.079579] [ 14.097534] The buggy address belongs to the physical page: [ 14.097954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c4 [ 14.098567] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.099356] flags: 0x200000000000040(head|node=0|zone=2) [ 14.099729] page_type: f8(unknown) [ 14.099861] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.100239] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.101127] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.102262] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.102936] head: 0200000000000002 ffffea00040e7101 00000000ffffffff 00000000ffffffff [ 14.103594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.104319] page dumped because: kasan: bad access detected [ 14.104716] [ 14.104791] Memory state around the buggy address: [ 14.104960] ffff8881039c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.105860] ffff8881039c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.106749] >ffff8881039c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.107699] ^ [ 14.107824] ffff8881039c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.108072] ffff8881039c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.108796] ==================================================================