Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 36.777551] ================================================================== [ 36.779026] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 36.780153] Free of addr fff00000c6b94001 by task kunit_try_catch/232 [ 36.781487] [ 36.782010] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.782844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.783428] Hardware name: linux,dummy-virt (DT) [ 36.783935] Call trace: [ 36.784249] show_stack+0x20/0x38 (C) [ 36.786428] dump_stack_lvl+0x8c/0xd0 [ 36.787278] print_report+0x118/0x5e0 [ 36.787949] kasan_report_invalid_free+0xb0/0xd8 [ 36.788291] __kasan_mempool_poison_object+0xfc/0x150 [ 36.789116] mempool_free+0x28c/0x328 [ 36.789595] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 36.790153] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 36.791351] kunit_try_run_case+0x14c/0x3d0 [ 36.792462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.793608] kthread+0x24c/0x2d0 [ 36.794100] ret_from_fork+0x10/0x20 [ 36.794834] [ 36.795105] The buggy address belongs to the physical page: [ 36.796258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b94 [ 36.798459] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.799907] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.801588] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.803070] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.803840] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.806061] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.808051] head: 0bfffe0000000002 ffffc1ffc31ae501 ffffffffffffffff 0000000000000000 [ 36.809340] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.810348] page dumped because: kasan: bad access detected [ 36.811717] [ 36.812059] Memory state around the buggy address: [ 36.812375] fff00000c6b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.814343] fff00000c6b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.816138] >fff00000c6b94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.817564] ^ [ 36.818669] fff00000c6b94080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.819799] fff00000c6b94100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.821511] ================================================================== [ 36.717060] ================================================================== [ 36.718683] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 36.719627] Free of addr fff00000c6122101 by task kunit_try_catch/230 [ 36.720660] [ 36.721659] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 36.723003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.723644] Hardware name: linux,dummy-virt (DT) [ 36.724353] Call trace: [ 36.724907] show_stack+0x20/0x38 (C) [ 36.725575] dump_stack_lvl+0x8c/0xd0 [ 36.726604] print_report+0x118/0x5e0 [ 36.727258] kasan_report_invalid_free+0xb0/0xd8 [ 36.728009] check_slab_allocation+0xfc/0x108 [ 36.728565] __kasan_mempool_poison_object+0x78/0x150 [ 36.729585] mempool_free+0x28c/0x328 [ 36.730222] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 36.731048] mempool_kmalloc_invalid_free+0xb8/0x110 [ 36.731811] kunit_try_run_case+0x14c/0x3d0 [ 36.732510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.733273] kthread+0x24c/0x2d0 [ 36.734253] ret_from_fork+0x10/0x20 [ 36.734875] [ 36.735177] Allocated by task 230: [ 36.735622] kasan_save_stack+0x3c/0x68 [ 36.736365] kasan_save_track+0x20/0x40 [ 36.737000] kasan_save_alloc_info+0x40/0x58 [ 36.737712] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.738560] remove_element+0x130/0x1f8 [ 36.739120] mempool_alloc_preallocated+0x58/0xc0 [ 36.739799] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 36.740666] mempool_kmalloc_invalid_free+0xb8/0x110 [ 36.741633] kunit_try_run_case+0x14c/0x3d0 [ 36.742297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.743173] kthread+0x24c/0x2d0 [ 36.743741] ret_from_fork+0x10/0x20 [ 36.744196] [ 36.744653] The buggy address belongs to the object at fff00000c6122100 [ 36.744653] which belongs to the cache kmalloc-128 of size 128 [ 36.746242] The buggy address is located 1 bytes inside of [ 36.746242] 128-byte region [fff00000c6122100, fff00000c6122180) [ 36.748962] [ 36.749838] The buggy address belongs to the physical page: [ 36.750333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106122 [ 36.751560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.752746] page_type: f5(slab) [ 36.753496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.754561] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.755705] page dumped because: kasan: bad access detected [ 36.756407] [ 36.756893] Memory state around the buggy address: [ 36.758031] fff00000c6122000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.759372] fff00000c6122080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.760165] >fff00000c6122100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.762481] ^ [ 36.762944] fff00000c6122180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.763862] fff00000c6122200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.765240] ==================================================================
[ 27.694244] ================================================================== [ 27.695172] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.696107] Free of addr ffff888102a1b001 by task kunit_try_catch/249 [ 27.696600] [ 27.696780] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.697615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.698061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.698669] Call Trace: [ 27.699212] <TASK> [ 27.699466] dump_stack_lvl+0x73/0xb0 [ 27.699957] print_report+0xd1/0x640 [ 27.700447] ? __virt_addr_valid+0x1db/0x2d0 [ 27.700814] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.701398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.701735] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.702118] kasan_report_invalid_free+0xc0/0xf0 [ 27.702677] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.703336] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.703955] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.704610] check_slab_allocation+0x11f/0x130 [ 27.705055] __kasan_mempool_poison_object+0x91/0x1d0 [ 27.705435] mempool_free+0x2ec/0x380 [ 27.705933] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.706554] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 27.707207] ? irqentry_exit+0x2a/0x60 [ 27.707689] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.708051] mempool_kmalloc_invalid_free+0xb1/0x100 [ 27.708503] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 27.709052] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.709569] ? __pfx_mempool_kfree+0x10/0x10 [ 27.710060] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 27.710721] kunit_try_run_case+0x1b3/0x490 [ 27.711232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.711693] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.712193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.712556] ? __kthread_parkme+0x82/0x160 [ 27.713019] ? preempt_count_sub+0x50/0x80 [ 27.713549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.714064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.714621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.714987] kthread+0x257/0x310 [ 27.715241] ? __pfx_kthread+0x10/0x10 [ 27.715537] ret_from_fork+0x41/0x80 [ 27.715962] ? __pfx_kthread+0x10/0x10 [ 27.716430] ret_from_fork_asm+0x1a/0x30 [ 27.716896] </TASK> [ 27.717215] [ 27.717475] Allocated by task 249: [ 27.717791] kasan_save_stack+0x3d/0x60 [ 27.718284] kasan_save_track+0x18/0x40 [ 27.718709] kasan_save_alloc_info+0x3b/0x50 [ 27.719029] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.719601] remove_element+0x11e/0x190 [ 27.720045] mempool_alloc_preallocated+0x4d/0x90 [ 27.720520] mempool_kmalloc_invalid_free_helper+0x84/0x2e0 [ 27.720880] mempool_kmalloc_invalid_free+0xb1/0x100 [ 27.721188] kunit_try_run_case+0x1b3/0x490 [ 27.721692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.722279] kthread+0x257/0x310 [ 27.722689] ret_from_fork+0x41/0x80 [ 27.723116] ret_from_fork_asm+0x1a/0x30 [ 27.723591] [ 27.723870] The buggy address belongs to the object at ffff888102a1b000 [ 27.723870] which belongs to the cache kmalloc-128 of size 128 [ 27.726278] The buggy address is located 1 bytes inside of [ 27.726278] 128-byte region [ffff888102a1b000, ffff888102a1b080) [ 27.727245] [ 27.727915] The buggy address belongs to the physical page: [ 27.728371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1b [ 27.729280] flags: 0x200000000000000(node=0|zone=2) [ 27.729589] page_type: f5(slab) [ 27.729847] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.730463] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.731237] page dumped because: kasan: bad access detected [ 27.731786] [ 27.732024] Memory state around the buggy address: [ 27.732596] ffff888102a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.733138] ffff888102a1af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.733839] >ffff888102a1b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.734461] ^ [ 27.734958] ffff888102a1b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.735649] ffff888102a1b100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.736335] ================================================================== [ 27.744321] ================================================================== [ 27.745848] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.746783] Free of addr ffff888102d24001 by task kunit_try_catch/251 [ 27.747490] [ 27.748369] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 27.749136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.749538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.750588] Call Trace: [ 27.750935] <TASK> [ 27.751160] dump_stack_lvl+0x73/0xb0 [ 27.751789] print_report+0xd1/0x640 [ 27.752225] ? __virt_addr_valid+0x1db/0x2d0 [ 27.752720] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.753799] ? kasan_addr_to_slab+0x11/0xa0 [ 27.754544] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.755365] kasan_report_invalid_free+0xc0/0xf0 [ 27.755725] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.756713] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.757753] __kasan_mempool_poison_object+0x102/0x1d0 [ 27.758423] mempool_free+0x2ec/0x380 [ 27.759252] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.759784] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 27.760751] ? finish_task_switch.isra.0+0x153/0x700 [ 27.761544] mempool_kmalloc_large_invalid_free+0xb1/0x100 [ 27.762588] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 27.763039] ? __switch_to+0x5d9/0xf60 [ 27.763564] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.764413] ? __pfx_mempool_kfree+0x10/0x10 [ 27.764783] ? __pfx_read_tsc+0x10/0x10 [ 27.765589] ? ktime_get_ts64+0x84/0x230 [ 27.766039] kunit_try_run_case+0x1b3/0x490 [ 27.766411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.767576] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.768019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.768560] ? __kthread_parkme+0x82/0x160 [ 27.769407] ? preempt_count_sub+0x50/0x80 [ 27.770310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.771576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.772042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.773161] kthread+0x257/0x310 [ 27.773474] ? __pfx_kthread+0x10/0x10 [ 27.773711] ret_from_fork+0x41/0x80 [ 27.774403] ? __pfx_kthread+0x10/0x10 [ 27.774812] ret_from_fork_asm+0x1a/0x30 [ 27.775201] </TASK> [ 27.775454] [ 27.775655] The buggy address belongs to the physical page: [ 27.777193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d24 [ 27.777948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.779099] flags: 0x200000000000040(head|node=0|zone=2) [ 27.779530] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.780915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.781650] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.782616] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.783044] head: 0200000000000002 ffffea00040b4901 ffffffffffffffff 0000000000000000 [ 27.783910] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.785509] page dumped because: kasan: bad access detected [ 27.786011] [ 27.786556] Memory state around the buggy address: [ 27.787200] ffff888102d23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.787638] ffff888102d23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.788646] >ffff888102d24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.789304] ^ [ 27.790165] ffff888102d24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.790580] ffff888102d24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.791261] ==================================================================