Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 66.002136] ================================================================== [ 66.014221] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 66.022308] Free of addr ccc10001 by task kunit_try_catch/299 [ 66.028076] [ 66.029602] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.029632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.029632] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.029632] Call trace: [ 66.029663] unwind_backtrace from show_stack+0x18/0x1c [ 66.029663] show_stack from dump_stack_lvl+0x70/0x90 [ 66.029693] dump_stack_lvl from print_report+0x158/0x528 [ 66.029724] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 66.029754] kasan_report_invalid_free from __kasan_mempool_poison_object+0xd0/0x128 [ 66.029785] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 66.029785] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 66.029815] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_large_invalid_free+0xb8/0x104 [ 66.029846] mempool_kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 66.029876] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.029907] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.029937] kthread from ret_from_fork+0x14/0x20 [ 66.029968] Exception stack(0xf2653fb0 to 0xf2653ff8) [ 66.029968] 3fa0: 00000000 00000000 00000000 00000000 [ 66.029998] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.029998] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.030029] [ 66.162567] The buggy address belongs to the physical page: [ 66.168182] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc10 [ 66.175476] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.183166] flags: 0x40(head|zone=0) [ 66.186767] page_type: f8(unknown) [ 66.190216] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 66.198364] raw: 00000000 [ 66.200988] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 66.209228] head: 00000000 00000002 eebca241 ffffffff 00000000 ffffffff 00000000 ffffffff [ 66.217468] head: 00000000 00000004 [ 66.220977] page dumped because: kasan: bad access detected [ 66.226593] [ 66.228088] Memory state around the buggy address: [ 66.232910] ccc0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.239501] ccc0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.246063] >ccc10000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.252624] ^ [ 66.255187] ccc10080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.261749] ccc10100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.268341] ================================================================== [ 65.681884] ================================================================== [ 65.694152] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.702209] Free of addr cc22df01 by task kunit_try_catch/297 [ 65.708007] [ 65.709503] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 65.709533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.709533] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.709564] Call trace: [ 65.709564] unwind_backtrace from show_stack+0x18/0x1c [ 65.709594] show_stack from dump_stack_lvl+0x70/0x90 [ 65.709625] dump_stack_lvl from print_report+0x158/0x528 [ 65.709625] print_report from kasan_report_invalid_free+0xc0/0xf4 [ 65.709655] kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8 [ 65.709686] check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128 [ 65.709716] __kasan_mempool_poison_object from mempool_free+0x360/0x440 [ 65.709747] mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8 [ 65.709777] mempool_kmalloc_invalid_free_helper from mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.709777] mempool_kmalloc_invalid_free from kunit_try_run_case+0x22c/0x5a8 [ 65.709808] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.709838] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.709869] kthread from ret_from_fork+0x14/0x20 [ 65.709899] Exception stack(0xf2643fb0 to 0xf2643ff8) [ 65.709899] 3fa0: 00000000 00000000 00000000 00000000 [ 65.709930] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.709930] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.709960] [ 65.848114] Allocated by task 297: [ 65.851531] kasan_save_track+0x30/0x5c [ 65.855407] remove_element+0x180/0x264 [ 65.859283] mempool_alloc_preallocated+0x60/0x9c [ 65.864013] mempool_kmalloc_invalid_free_helper+0x90/0x2f8 [ 65.869628] mempool_kmalloc_invalid_free+0xb8/0x104 [ 65.874633] kunit_try_run_case+0x22c/0x5a8 [ 65.878845] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.884399] kthread+0x464/0x810 [ 65.887634] ret_from_fork+0x14/0x20 [ 65.891265] [ 65.892761] The buggy address belongs to the object at cc22df00 [ 65.892761] which belongs to the cache kmalloc-128 of size 128 [ 65.904663] The buggy address is located 1 bytes inside of [ 65.904663] 128-byte region [cc22df00, cc22df80) [ 65.914886] [ 65.916412] The buggy address belongs to the physical page: [ 65.921997] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c22d [ 65.929290] flags: 0x0(zone=0) [ 65.932373] page_type: f5(slab) [ 65.935546] raw: 00000000 c7001400 00000122 00000000 00000000 00100010 f5000000 00000000 [ 65.943664] raw: 00000000 [ 65.946319] page dumped because: kasan: bad access detected [ 65.951934] [ 65.953430] Memory state around the buggy address: [ 65.958251] cc22de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.964813] cc22de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.971405] >cc22df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.977966] ^ [ 65.980529] cc22df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.987091] cc22e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.993682] ==================================================================
[ 39.345978] ================================================================== [ 39.358176] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.366183] Free of addr ffff888107f05a01 by task kunit_try_catch/284 [ 39.372622] [ 39.374122] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 39.374130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.374132] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.374136] Call Trace: [ 39.374137] <TASK> [ 39.374139] dump_stack_lvl+0x73/0xb0 [ 39.374143] print_report+0xd1/0x650 [ 39.374147] ? __virt_addr_valid+0x1db/0x2d0 [ 39.374151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 39.374155] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374160] kasan_report_invalid_free+0x10a/0x130 [ 39.374165] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374171] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374175] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374180] check_slab_allocation+0x11f/0x130 [ 39.374184] __kasan_mempool_poison_object+0x91/0x1d0 [ 39.374189] mempool_free+0x2ec/0x380 [ 39.374193] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.374198] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 39.374203] ? dequeue_entities+0xa24/0x1790 [ 39.374207] ? finish_task_switch.isra.0+0x153/0x700 [ 39.374212] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.374217] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 39.374222] ? dequeue_task_fair+0x166/0x4e0 [ 39.374226] ? __pfx_mempool_kmalloc+0x10/0x10 [ 39.374229] ? __pfx_mempool_kfree+0x10/0x10 [ 39.374233] ? ktime_get_ts64+0x83/0x230 [ 39.374238] kunit_try_run_case+0x1a2/0x480 [ 39.374242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.374246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.374251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.374255] ? __kthread_parkme+0x82/0x180 [ 39.374259] ? preempt_count_sub+0x50/0x80 [ 39.374264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.374268] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.374272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.374276] kthread+0x334/0x6f0 [ 39.374280] ? trace_preempt_on+0x20/0xc0 [ 39.374284] ? __pfx_kthread+0x10/0x10 [ 39.374289] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.374293] ? calculate_sigpending+0x7b/0xa0 [ 39.374296] ? __pfx_kthread+0x10/0x10 [ 39.374301] ret_from_fork+0x3e/0x80 [ 39.374305] ? __pfx_kthread+0x10/0x10 [ 39.374309] ret_from_fork_asm+0x1a/0x30 [ 39.374315] </TASK> [ 39.374316] [ 39.589139] Allocated by task 284: [ 39.592546] kasan_save_stack+0x45/0x70 [ 39.596384] kasan_save_track+0x18/0x40 [ 39.600224] kasan_save_alloc_info+0x3b/0x50 [ 39.604498] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 39.609818] remove_element+0x11e/0x190 [ 39.613656] mempool_alloc_preallocated+0x4d/0x90 [ 39.618388] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 39.623962] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.628937] kunit_try_run_case+0x1a2/0x480 [ 39.633130] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.638528] kthread+0x334/0x6f0 [ 39.641760] ret_from_fork+0x3e/0x80 [ 39.645339] ret_from_fork_asm+0x1a/0x30 [ 39.649265] [ 39.650765] The buggy address belongs to the object at ffff888107f05a00 [ 39.650765] which belongs to the cache kmalloc-128 of size 128 [ 39.663272] The buggy address is located 1 bytes inside of [ 39.663272] 128-byte region [ffff888107f05a00, ffff888107f05a80) [ 39.674833] [ 39.676330] The buggy address belongs to the physical page: [ 39.681904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05 [ 39.689903] flags: 0x200000000000000(node=0|zone=2) [ 39.694781] page_type: f5(slab) [ 39.697928] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 39.705691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.713457] page dumped because: kasan: bad access detected [ 39.719032] [ 39.720531] Memory state around the buggy address: [ 39.725322] ffff888107f05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.732542] ffff888107f05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.739760] >ffff888107f05a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.746978] ^ [ 39.750212] ffff888107f05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.757430] ffff888107f05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.764651] ================================================================== [ 39.772216] ================================================================== [ 39.784226] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.792234] Free of addr ffff888105238001 by task kunit_try_catch/286 [ 39.798687] [ 39.800207] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 39.800215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.800217] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.800220] Call Trace: [ 39.800222] <TASK> [ 39.800224] dump_stack_lvl+0x73/0xb0 [ 39.800227] print_report+0xd1/0x650 [ 39.800231] ? __virt_addr_valid+0x1db/0x2d0 [ 39.800235] ? kasan_addr_to_slab+0x11/0xa0 [ 39.800239] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800244] kasan_report_invalid_free+0x10a/0x130 [ 39.800249] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800254] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800259] __kasan_mempool_poison_object+0x102/0x1d0 [ 39.800264] mempool_free+0x2ec/0x380 [ 39.800268] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.800273] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 39.800278] ? dequeue_entities+0xa24/0x1790 [ 39.800282] ? finish_task_switch.isra.0+0x153/0x700 [ 39.800287] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 39.800292] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 39.800297] ? dequeue_task_fair+0x166/0x4e0 [ 39.800301] ? __pfx_mempool_kmalloc+0x10/0x10 [ 39.800304] ? __pfx_mempool_kfree+0x10/0x10 [ 39.800308] ? ktime_get_ts64+0x83/0x230 [ 39.800313] kunit_try_run_case+0x1a2/0x480 [ 39.800318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.800322] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.800326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.800331] ? __kthread_parkme+0x82/0x180 [ 39.800335] ? preempt_count_sub+0x50/0x80 [ 39.800339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.800344] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.800348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.800352] kthread+0x334/0x6f0 [ 39.800356] ? trace_preempt_on+0x20/0xc0 [ 39.800360] ? __pfx_kthread+0x10/0x10 [ 39.800364] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.800368] ? calculate_sigpending+0x7b/0xa0 [ 39.800372] ? __pfx_kthread+0x10/0x10 [ 39.800376] ret_from_fork+0x3e/0x80 [ 39.800380] ? __pfx_kthread+0x10/0x10 [ 39.800385] ret_from_fork_asm+0x1a/0x30 [ 39.800390] </TASK> [ 39.800392] [ 40.004885] The buggy address belongs to the physical page: [ 40.010460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238 [ 40.018467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.026119] flags: 0x200000000000040(head|node=0|zone=2) [ 40.031433] page_type: f8(unknown) [ 40.034837] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.042579] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.050325] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.058151] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.065978] head: 0200000000000002 ffffea0004148e01 00000000ffffffff 00000000ffffffff [ 40.073810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.081635] page dumped because: kasan: bad access detected [ 40.087207] [ 40.088707] Memory state around the buggy address: [ 40.093499] ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.100720] ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.107965] >ffff888105238000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.115192] ^ [ 40.118423] ffff888105238080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.125644] ffff888105238100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.132887] ==================================================================