Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.999981] ================================================================== [ 34.001034] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.001819] Free of addr fff00000c65e0001 by task kunit_try_catch/232 [ 34.002774] [ 34.003242] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.004587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.005216] Hardware name: linux,dummy-virt (DT) [ 34.006004] Call trace: [ 34.006477] show_stack+0x20/0x38 (C) [ 34.007064] dump_stack_lvl+0x8c/0xd0 [ 34.007747] print_report+0x118/0x5e0 [ 34.008515] kasan_report_invalid_free+0xb0/0xd8 [ 34.009734] __kasan_mempool_poison_object+0xfc/0x150 [ 34.010474] mempool_free+0x28c/0x328 [ 34.011196] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.011987] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 34.013004] kunit_try_run_case+0x14c/0x3d0 [ 34.013581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.014255] kthread+0x24c/0x2d0 [ 34.014743] ret_from_fork+0x10/0x20 [ 34.015835] [ 34.016702] The buggy address belongs to the physical page: [ 34.017525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0 [ 34.018637] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.019710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.021088] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.022007] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.022807] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.024022] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.025335] head: 0bfffe0000000002 ffffc1ffc3197801 ffffffffffffffff 0000000000000000 [ 34.026462] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.027487] page dumped because: kasan: bad access detected [ 34.028321] [ 34.028552] Memory state around the buggy address: [ 34.029702] fff00000c65dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030804] fff00000c65dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.031744] >fff00000c65e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.032921] ^ [ 34.033652] fff00000c65e0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.034727] fff00000c65e0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.035695] ================================================================== [ 33.942484] ================================================================== [ 33.943661] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.944583] Free of addr fff00000c6087a01 by task kunit_try_catch/230 [ 33.945637] [ 33.946297] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.947406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.948062] Hardware name: linux,dummy-virt (DT) [ 33.949042] Call trace: [ 33.949497] show_stack+0x20/0x38 (C) [ 33.950048] dump_stack_lvl+0x8c/0xd0 [ 33.950718] print_report+0x118/0x5e0 [ 33.951273] kasan_report_invalid_free+0xb0/0xd8 [ 33.952033] check_slab_allocation+0xfc/0x108 [ 33.952926] __kasan_mempool_poison_object+0x78/0x150 [ 33.953625] mempool_free+0x28c/0x328 [ 33.954254] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.955061] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.955744] kunit_try_run_case+0x14c/0x3d0 [ 33.956583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.957556] kthread+0x24c/0x2d0 [ 33.958121] ret_from_fork+0x10/0x20 [ 33.958685] [ 33.959067] Allocated by task 230: [ 33.959596] kasan_save_stack+0x3c/0x68 [ 33.960182] kasan_save_track+0x20/0x40 [ 33.960962] kasan_save_alloc_info+0x40/0x58 [ 33.961566] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.962194] remove_element+0x130/0x1f8 [ 33.962685] mempool_alloc_preallocated+0x58/0xc0 [ 33.963189] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 33.964879] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.965505] kunit_try_run_case+0x14c/0x3d0 [ 33.966156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.966839] kthread+0x24c/0x2d0 [ 33.967977] ret_from_fork+0x10/0x20 [ 33.968938] [ 33.969265] The buggy address belongs to the object at fff00000c6087a00 [ 33.969265] which belongs to the cache kmalloc-128 of size 128 [ 33.970358] The buggy address is located 1 bytes inside of [ 33.970358] 128-byte region [fff00000c6087a00, fff00000c6087a80) [ 33.971503] [ 33.971936] The buggy address belongs to the physical page: [ 33.972998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106087 [ 33.974007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.974751] page_type: f5(slab) [ 33.975406] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.976370] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.977467] page dumped because: kasan: bad access detected [ 33.978110] [ 33.978525] Memory state around the buggy address: [ 33.979171] fff00000c6087900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.979997] fff00000c6087980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.980946] >fff00000c6087a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.982187] ^ [ 33.982731] fff00000c6087a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.983553] fff00000c6087b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.984621] ==================================================================
[ 33.970863] ================================================================== [ 33.972154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.973014] Free of addr fff00000c659b401 by task kunit_try_catch/230 [ 33.973640] [ 33.974035] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.975822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.976277] Hardware name: linux,dummy-virt (DT) [ 33.977245] Call trace: [ 33.977969] show_stack+0x20/0x38 (C) [ 33.978882] dump_stack_lvl+0x8c/0xd0 [ 33.979489] print_report+0x118/0x5e0 [ 33.980011] kasan_report_invalid_free+0xb0/0xd8 [ 33.980755] check_slab_allocation+0xfc/0x108 [ 33.981410] __kasan_mempool_poison_object+0x78/0x150 [ 33.982437] mempool_free+0x28c/0x328 [ 33.982987] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.983669] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.984430] kunit_try_run_case+0x14c/0x3d0 [ 33.985075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.986130] kthread+0x24c/0x2d0 [ 33.986692] ret_from_fork+0x10/0x20 [ 33.987331] [ 33.987718] Allocated by task 230: [ 33.988186] kasan_save_stack+0x3c/0x68 [ 33.988854] kasan_save_track+0x20/0x40 [ 33.989405] kasan_save_alloc_info+0x40/0x58 [ 33.990352] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.991153] remove_element+0x130/0x1f8 [ 33.992566] mempool_alloc_preallocated+0x58/0xc0 [ 33.993292] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 33.994009] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.994695] kunit_try_run_case+0x14c/0x3d0 [ 33.995249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.996028] kthread+0x24c/0x2d0 [ 33.996481] ret_from_fork+0x10/0x20 [ 33.997116] [ 33.997478] The buggy address belongs to the object at fff00000c659b400 [ 33.997478] which belongs to the cache kmalloc-128 of size 128 [ 33.998713] The buggy address is located 1 bytes inside of [ 33.998713] 128-byte region [fff00000c659b400, fff00000c659b480) [ 34.000014] [ 34.000394] The buggy address belongs to the physical page: [ 34.001127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659b [ 34.002038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.002765] page_type: f5(slab) [ 34.003323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.004225] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 34.005037] page dumped because: kasan: bad access detected [ 34.005783] [ 34.006150] Memory state around the buggy address: [ 34.006849] fff00000c659b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.007660] fff00000c659b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.008622] >fff00000c659b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.009505] ^ [ 34.010000] fff00000c659b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.010902] fff00000c659b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.011721] ================================================================== [ 34.025011] ================================================================== [ 34.026102] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.027292] Free of addr fff00000c663c001 by task kunit_try_catch/232 [ 34.028129] [ 34.028497] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.031014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.033462] Hardware name: linux,dummy-virt (DT) [ 34.034073] Call trace: [ 34.034454] show_stack+0x20/0x38 (C) [ 34.034979] dump_stack_lvl+0x8c/0xd0 [ 34.035473] print_report+0x118/0x5e0 [ 34.036671] kasan_report_invalid_free+0xb0/0xd8 [ 34.037394] __kasan_mempool_poison_object+0xfc/0x150 [ 34.038583] mempool_free+0x28c/0x328 [ 34.039108] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.039939] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 34.040706] kunit_try_run_case+0x14c/0x3d0 [ 34.041327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.042929] kthread+0x24c/0x2d0 [ 34.043402] ret_from_fork+0x10/0x20 [ 34.044047] [ 34.044436] The buggy address belongs to the physical page: [ 34.045138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c [ 34.046461] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.047347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.048221] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.049066] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.050793] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.051687] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.052577] head: 0bfffe0000000002 ffffc1ffc3198f01 ffffffffffffffff 0000000000000000 [ 34.053435] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.054742] page dumped because: kasan: bad access detected [ 34.055315] [ 34.055702] Memory state around the buggy address: [ 34.056377] fff00000c663bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.057310] fff00000c663bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.059057] >fff00000c663c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.059816] ^ [ 34.060368] fff00000c663c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.061183] fff00000c663c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.062491] ==================================================================
[ 28.094146] ================================================================== [ 28.094634] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] Free of addr ffff888102949801 by task kunit_try_catch/250 [ 28.094634] [ 28.094634] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.094634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.094634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.094634] Call Trace: [ 28.094634] <TASK> [ 28.094634] dump_stack_lvl+0x73/0xb0 [ 28.094634] print_report+0xd1/0x640 [ 28.094634] ? __virt_addr_valid+0x1db/0x2d0 [ 28.094634] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.094634] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] kasan_report_invalid_free+0xc0/0xf0 [ 28.094634] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] check_slab_allocation+0x11f/0x130 [ 28.094634] __kasan_mempool_poison_object+0x91/0x1d0 [ 28.094634] mempool_free+0x2ec/0x380 [ 28.094634] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.094634] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 28.094634] ? read_hpet+0x1f0/0x230 [ 28.094634] ? ktime_get_ts64+0x84/0x230 [ 28.094634] ? trace_hardirqs_on+0x37/0xe0 [ 28.094634] mempool_kmalloc_invalid_free+0xb1/0x100 [ 28.094634] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 28.094634] ? __switch_to+0x5d9/0xf60 [ 28.094634] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.094634] ? __pfx_mempool_kfree+0x10/0x10 [ 28.094634] ? ktime_get_ts64+0x84/0x230 [ 28.094634] kunit_try_run_case+0x1b3/0x490 [ 28.094634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.094634] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.094634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.094634] ? __kthread_parkme+0x82/0x160 [ 28.094634] ? preempt_count_sub+0x50/0x80 [ 28.094634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.094634] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.094634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.094634] kthread+0x257/0x310 [ 28.094634] ? __pfx_kthread+0x10/0x10 [ 28.094634] ret_from_fork+0x41/0x80 [ 28.094634] ? __pfx_kthread+0x10/0x10 [ 28.094634] ret_from_fork_asm+0x1a/0x30 [ 28.094634] </TASK> [ 28.094634] [ 28.094634] Allocated by task 250: [ 28.094634] kasan_save_stack+0x3d/0x60 [ 28.094634] kasan_save_track+0x18/0x40 [ 28.094634] kasan_save_alloc_info+0x3b/0x50 [ 28.094634] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 28.094634] remove_element+0x11e/0x190 [ 28.094634] mempool_alloc_preallocated+0x4d/0x90 [ 28.094634] mempool_kmalloc_invalid_free_helper+0x84/0x2e0 [ 28.094634] mempool_kmalloc_invalid_free+0xb1/0x100 [ 28.094634] kunit_try_run_case+0x1b3/0x490 [ 28.094634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.094634] kthread+0x257/0x310 [ 28.094634] ret_from_fork+0x41/0x80 [ 28.094634] ret_from_fork_asm+0x1a/0x30 [ 28.094634] [ 28.094634] The buggy address belongs to the object at ffff888102949800 [ 28.094634] which belongs to the cache kmalloc-128 of size 128 [ 28.094634] The buggy address is located 1 bytes inside of [ 28.094634] 128-byte region [ffff888102949800, ffff888102949880) [ 28.094634] [ 28.094634] The buggy address belongs to the physical page: [ 28.094634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102949 [ 28.094634] flags: 0x200000000000000(node=0|zone=2) [ 28.094634] page_type: f5(slab) [ 28.094634] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 28.094634] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 28.094634] page dumped because: kasan: bad access detected [ 28.094634] [ 28.094634] Memory state around the buggy address: [ 28.094634] ffff888102949700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.094634] ffff888102949780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.094634] >ffff888102949800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.094634] ^ [ 28.094634] ffff888102949880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.094634] ffff888102949900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.094634] ================================================================== [ 28.161745] ================================================================== [ 28.162147] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.162147] Free of addr ffff888102b24001 by task kunit_try_catch/252 [ 28.162147] [ 28.162147] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.162147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.162147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.162147] Call Trace: [ 28.162147] <TASK> [ 28.162147] dump_stack_lvl+0x73/0xb0 [ 28.162147] print_report+0xd1/0x640 [ 28.162147] ? __virt_addr_valid+0x1db/0x2d0 [ 28.162147] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.162147] ? kasan_addr_to_slab+0x11/0xa0 [ 28.162147] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.162147] kasan_report_invalid_free+0xc0/0xf0 [ 28.162147] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.162147] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.162147] __kasan_mempool_poison_object+0x102/0x1d0 [ 28.162147] mempool_free+0x2ec/0x380 [ 28.162147] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 28.162147] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 28.162147] ? read_hpet+0x1f0/0x230 [ 28.162147] ? ktime_get_ts64+0x84/0x230 [ 28.162147] ? trace_hardirqs_on+0x37/0xe0 [ 28.162147] mempool_kmalloc_large_invalid_free+0xb1/0x100 [ 28.162147] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 28.162147] ? __switch_to+0x5d9/0xf60 [ 28.162147] ? __pfx_mempool_kmalloc+0x10/0x10 [ 28.162147] ? __pfx_mempool_kfree+0x10/0x10 [ 28.162147] ? ktime_get_ts64+0x84/0x230 [ 28.162147] kunit_try_run_case+0x1b3/0x490 [ 28.162147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.162147] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.162147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.162147] ? __kthread_parkme+0x82/0x160 [ 28.162147] ? preempt_count_sub+0x50/0x80 [ 28.162147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.162147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.162147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.162147] kthread+0x257/0x310 [ 28.162147] ? __pfx_kthread+0x10/0x10 [ 28.162147] ret_from_fork+0x41/0x80 [ 28.162147] ? __pfx_kthread+0x10/0x10 [ 28.162147] ret_from_fork_asm+0x1a/0x30 [ 28.162147] </TASK> [ 28.162147] [ 28.162147] The buggy address belongs to the physical page: [ 28.162147] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b24 [ 28.162147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.162147] flags: 0x200000000000040(head|node=0|zone=2) [ 28.162147] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.162147] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.162147] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.162147] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.162147] head: 0200000000000002 ffffea00040ac901 ffffffffffffffff 0000000000000000 [ 28.162147] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 28.162147] page dumped because: kasan: bad access detected [ 28.162147] [ 28.162147] Memory state around the buggy address: [ 28.162147] ffff888102b23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.162147] ffff888102b23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.162147] >ffff888102b24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.162147] ^ [ 28.162147] ffff888102b24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.162147] ffff888102b24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.162147] ==================================================================
[ 23.090257] ================================================================== [ 23.091112] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.091822] Free of addr ffff888102ad8001 by task kunit_try_catch/250 [ 23.092467] [ 23.092991] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.093977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.094535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.094939] Call Trace: [ 23.095250] <TASK> [ 23.095526] dump_stack_lvl+0x73/0xb0 [ 23.096176] print_report+0xd1/0x640 [ 23.096641] ? __virt_addr_valid+0x1db/0x2d0 [ 23.097161] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.097757] ? kasan_addr_to_slab+0x11/0xa0 [ 23.098443] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.099139] kasan_report_invalid_free+0xc0/0xf0 [ 23.099565] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.100034] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.100519] __kasan_mempool_poison_object+0x102/0x1d0 [ 23.101055] mempool_free+0x2ec/0x380 [ 23.101549] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.101989] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 23.102709] ? finish_task_switch.isra.0+0x153/0x700 [ 23.103229] mempool_kmalloc_large_invalid_free+0xb1/0x100 [ 23.103706] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 23.104340] ? __switch_to+0x5d9/0xf60 [ 23.104808] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.105221] ? __pfx_mempool_kfree+0x10/0x10 [ 23.105550] ? __pfx_read_tsc+0x10/0x10 [ 23.106074] ? ktime_get_ts64+0x84/0x230 [ 23.106540] kunit_try_run_case+0x1b3/0x490 [ 23.107051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.107639] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.108072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.108676] ? __kthread_parkme+0x82/0x160 [ 23.109057] ? preempt_count_sub+0x50/0x80 [ 23.109365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.109929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.110559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.111122] kthread+0x257/0x310 [ 23.111636] ? __pfx_kthread+0x10/0x10 [ 23.112009] ret_from_fork+0x41/0x80 [ 23.112404] ? __pfx_kthread+0x10/0x10 [ 23.112925] ret_from_fork_asm+0x1a/0x30 [ 23.113323] </TASK> [ 23.113677] [ 23.113887] The buggy address belongs to the physical page: [ 23.114342] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ad8 [ 23.114943] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.115538] flags: 0x200000000000040(head|node=0|zone=2) [ 23.116172] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.116794] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.117381] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.118097] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.118756] head: 0200000000000002 ffffea00040ab601 ffffffffffffffff 0000000000000000 [ 23.119379] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.120127] page dumped because: kasan: bad access detected [ 23.120432] [ 23.120647] Memory state around the buggy address: [ 23.121111] ffff888102ad7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.121831] ffff888102ad7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.122525] >ffff888102ad8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.123102] ^ [ 23.123342] ffff888102ad8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.123789] ffff888102ad8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.124325] ================================================================== [ 23.025707] ================================================================== [ 23.026910] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.027839] Free of addr ffff8881028c3b01 by task kunit_try_catch/248 [ 23.028443] [ 23.028655] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.030054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.030473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.032056] Call Trace: [ 23.032638] <TASK> [ 23.032818] dump_stack_lvl+0x73/0xb0 [ 23.034131] print_report+0xd1/0x640 [ 23.034512] ? __virt_addr_valid+0x1db/0x2d0 [ 23.034992] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.035453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.036071] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.037409] kasan_report_invalid_free+0xc0/0xf0 [ 23.037903] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.038638] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.039257] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.039826] check_slab_allocation+0x11f/0x130 [ 23.041302] __kasan_mempool_poison_object+0x91/0x1d0 [ 23.041730] mempool_free+0x2ec/0x380 [ 23.042076] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 23.042769] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 23.043461] ? irqentry_exit+0x2a/0x60 [ 23.044115] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.044478] ? trace_hardirqs_on+0x37/0xe0 [ 23.045041] mempool_kmalloc_invalid_free+0xb1/0x100 [ 23.045781] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 23.046505] ? __pfx_mempool_kmalloc+0x10/0x10 [ 23.047237] ? __pfx_mempool_kfree+0x10/0x10 [ 23.047466] ? ktime_get_ts64+0xf6/0x230 [ 23.047746] ? ktime_get_ts64+0x84/0x230 [ 23.048033] kunit_try_run_case+0x1b3/0x490 [ 23.048331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.048875] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.049539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.051117] ? __kthread_parkme+0x82/0x160 [ 23.051607] ? preempt_count_sub+0x50/0x80 [ 23.052242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.052907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.053570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.054198] kthread+0x257/0x310 [ 23.054468] ? __pfx_kthread+0x10/0x10 [ 23.054998] ret_from_fork+0x41/0x80 [ 23.055374] ? __pfx_kthread+0x10/0x10 [ 23.056418] ret_from_fork_asm+0x1a/0x30 [ 23.057174] </TASK> [ 23.057406] [ 23.057664] Allocated by task 248: [ 23.058075] kasan_save_stack+0x3d/0x60 [ 23.058721] kasan_save_track+0x18/0x40 [ 23.059185] kasan_save_alloc_info+0x3b/0x50 [ 23.060100] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 23.060891] remove_element+0x11e/0x190 [ 23.061390] mempool_alloc_preallocated+0x4d/0x90 [ 23.062067] mempool_kmalloc_invalid_free_helper+0x84/0x2e0 [ 23.062643] mempool_kmalloc_invalid_free+0xb1/0x100 [ 23.063129] kunit_try_run_case+0x1b3/0x490 [ 23.063653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.064074] kthread+0x257/0x310 [ 23.064480] ret_from_fork+0x41/0x80 [ 23.064918] ret_from_fork_asm+0x1a/0x30 [ 23.065287] [ 23.065473] The buggy address belongs to the object at ffff8881028c3b00 [ 23.065473] which belongs to the cache kmalloc-128 of size 128 [ 23.066840] The buggy address is located 1 bytes inside of [ 23.066840] 128-byte region [ffff8881028c3b00, ffff8881028c3b80) [ 23.068438] [ 23.068759] The buggy address belongs to the physical page: [ 23.069657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c3 [ 23.070649] flags: 0x200000000000000(node=0|zone=2) [ 23.071720] page_type: f5(slab) [ 23.072618] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.073976] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.075254] page dumped because: kasan: bad access detected [ 23.075826] [ 23.076775] Memory state around the buggy address: [ 23.077510] ffff8881028c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.078205] ffff8881028c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.078929] >ffff8881028c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.079458] ^ [ 23.080567] ffff8881028c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.081581] ffff8881028c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.082153] ==================================================================