Date
Nov. 27, 2024, 3:37 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 50.518412] ================================================================== [ 50.519648] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.520503] Free of addr fff00000c615aa01 by task kunit_try_catch/230 [ 50.521206] [ 50.521967] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.523171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.523682] Hardware name: linux,dummy-virt (DT) [ 50.524369] Call trace: [ 50.524905] show_stack+0x20/0x38 (C) [ 50.525560] dump_stack_lvl+0x8c/0xd0 [ 50.526477] print_report+0x118/0x5e0 [ 50.527253] kasan_report_invalid_free+0xb0/0xd8 [ 50.527958] check_slab_allocation+0xfc/0x108 [ 50.528654] __kasan_mempool_poison_object+0x78/0x150 [ 50.530176] mempool_free+0x28c/0x328 [ 50.530782] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.531514] mempool_kmalloc_invalid_free+0xb8/0x110 [ 50.532199] kunit_try_run_case+0x14c/0x3d0 [ 50.532813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.533718] kthread+0x24c/0x2d0 [ 50.534262] ret_from_fork+0x10/0x20 [ 50.534888] [ 50.535249] Allocated by task 230: [ 50.536707] kasan_save_stack+0x3c/0x68 [ 50.537122] kasan_save_track+0x20/0x40 [ 50.537807] kasan_save_alloc_info+0x40/0x58 [ 50.539071] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.539931] remove_element+0x130/0x1f8 [ 50.540663] mempool_alloc_preallocated+0x58/0xc0 [ 50.541697] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 50.542321] mempool_kmalloc_invalid_free+0xb8/0x110 [ 50.542912] kunit_try_run_case+0x14c/0x3d0 [ 50.543659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.544379] kthread+0x24c/0x2d0 [ 50.545026] ret_from_fork+0x10/0x20 [ 50.545932] [ 50.546477] The buggy address belongs to the object at fff00000c615aa00 [ 50.546477] which belongs to the cache kmalloc-128 of size 128 [ 50.548412] The buggy address is located 1 bytes inside of [ 50.548412] 128-byte region [fff00000c615aa00, fff00000c615aa80) [ 50.550394] [ 50.550652] The buggy address belongs to the physical page: [ 50.551663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615a [ 50.552586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.553609] page_type: f5(slab) [ 50.554158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 50.554957] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 50.556364] page dumped because: kasan: bad access detected [ 50.556913] [ 50.557239] Memory state around the buggy address: [ 50.558162] fff00000c615a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.558876] fff00000c615a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.559698] >fff00000c615aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.560436] ^ [ 50.560992] fff00000c615aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.561934] fff00000c615ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.562916] ================================================================== [ 50.573913] ================================================================== [ 50.575104] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.576073] Free of addr fff00000c66e4001 by task kunit_try_catch/232 [ 50.576681] [ 50.577376] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.578715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.579418] Hardware name: linux,dummy-virt (DT) [ 50.580275] Call trace: [ 50.580694] show_stack+0x20/0x38 (C) [ 50.581585] dump_stack_lvl+0x8c/0xd0 [ 50.582566] print_report+0x118/0x5e0 [ 50.583434] kasan_report_invalid_free+0xb0/0xd8 [ 50.584211] __kasan_mempool_poison_object+0xfc/0x150 [ 50.585491] mempool_free+0x28c/0x328 [ 50.586254] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.587186] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 50.587920] kunit_try_run_case+0x14c/0x3d0 [ 50.588583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.589202] kthread+0x24c/0x2d0 [ 50.590024] ret_from_fork+0x10/0x20 [ 50.590518] [ 50.591454] The buggy address belongs to the physical page: [ 50.592192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 50.593166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.594066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.594922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.596087] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.596968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.597983] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.598600] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 [ 50.599039] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 50.599652] page dumped because: kasan: bad access detected [ 50.600255] [ 50.600572] Memory state around the buggy address: [ 50.601426] fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.602992] fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.603930] >fff00000c66e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.604944] ^ [ 50.605335] fff00000c66e4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.606710] fff00000c66e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.607528] ==================================================================
[ 27.875603] ================================================================== [ 27.876586] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.878184] Free of addr ffff888102a55101 by task kunit_try_catch/249 [ 27.878872] [ 27.879512] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 27.880772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.881536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.883371] Call Trace: [ 27.883665] <TASK> [ 27.884731] dump_stack_lvl+0x73/0xb0 [ 27.885287] print_report+0xd1/0x640 [ 27.885876] ? __virt_addr_valid+0x1db/0x2d0 [ 27.886691] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.887531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.888396] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.889217] kasan_report_invalid_free+0xc0/0xf0 [ 27.890244] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.890793] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.891790] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.892735] check_slab_allocation+0x11f/0x130 [ 27.893493] __kasan_mempool_poison_object+0x91/0x1d0 [ 27.894205] mempool_free+0x2ec/0x380 [ 27.894585] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.895664] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 27.896364] ? finish_task_switch.isra.0+0x153/0x700 [ 27.897127] mempool_kmalloc_invalid_free+0xb1/0x100 [ 27.897809] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 27.898755] ? __switch_to+0x5d9/0xf60 [ 27.899494] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.900192] ? __pfx_mempool_kfree+0x10/0x10 [ 27.900485] ? __pfx_read_tsc+0x10/0x10 [ 27.901304] ? ktime_get_ts64+0x84/0x230 [ 27.901943] kunit_try_run_case+0x1b3/0x490 [ 27.903196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.904091] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.904667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.905525] ? __kthread_parkme+0x82/0x160 [ 27.906591] ? preempt_count_sub+0x50/0x80 [ 27.907322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.907826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.908496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.909199] kthread+0x257/0x310 [ 27.909652] ? __pfx_kthread+0x10/0x10 [ 27.910563] ret_from_fork+0x41/0x80 [ 27.910975] ? __pfx_kthread+0x10/0x10 [ 27.911628] ret_from_fork_asm+0x1a/0x30 [ 27.912100] </TASK> [ 27.912539] [ 27.912858] Allocated by task 249: [ 27.913308] kasan_save_stack+0x3d/0x60 [ 27.913910] kasan_save_track+0x18/0x40 [ 27.914496] kasan_save_alloc_info+0x3b/0x50 [ 27.914909] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 27.915926] remove_element+0x11e/0x190 [ 27.916559] mempool_alloc_preallocated+0x4d/0x90 [ 27.916921] mempool_kmalloc_invalid_free_helper+0x84/0x2e0 [ 27.917791] mempool_kmalloc_invalid_free+0xb1/0x100 [ 27.918191] kunit_try_run_case+0x1b3/0x490 [ 27.918908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.919715] kthread+0x257/0x310 [ 27.920229] ret_from_fork+0x41/0x80 [ 27.920669] ret_from_fork_asm+0x1a/0x30 [ 27.921331] [ 27.921631] The buggy address belongs to the object at ffff888102a55100 [ 27.921631] which belongs to the cache kmalloc-128 of size 128 [ 27.922722] The buggy address is located 1 bytes inside of [ 27.922722] 128-byte region [ffff888102a55100, ffff888102a55180) [ 27.923946] [ 27.924404] The buggy address belongs to the physical page: [ 27.925305] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a55 [ 27.925897] flags: 0x200000000000000(node=0|zone=2) [ 27.926752] page_type: f5(slab) [ 27.927036] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.927774] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.928644] page dumped because: kasan: bad access detected [ 27.929023] [ 27.929321] Memory state around the buggy address: [ 27.930478] ffff888102a55000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.930964] ffff888102a55080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.931685] >ffff888102a55100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.932678] ^ [ 27.933228] ffff888102a55180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.934468] ffff888102a55200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.935219] ================================================================== [ 27.941175] ================================================================== [ 27.942559] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.943450] Free of addr ffff888102ce0001 by task kunit_try_catch/251 [ 27.944105] [ 27.945195] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 27.946717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.947199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.948253] Call Trace: [ 27.948558] <TASK> [ 27.948820] dump_stack_lvl+0x73/0xb0 [ 27.950268] print_report+0xd1/0x640 [ 27.950649] ? __virt_addr_valid+0x1db/0x2d0 [ 27.951536] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.952090] ? kasan_addr_to_slab+0x11/0xa0 [ 27.952607] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.953567] kasan_report_invalid_free+0xc0/0xf0 [ 27.954417] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.955319] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.955918] __kasan_mempool_poison_object+0x102/0x1d0 [ 27.957092] mempool_free+0x2ec/0x380 [ 27.958328] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 27.958832] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 27.959564] ? finish_task_switch.isra.0+0x153/0x700 [ 27.960571] mempool_kmalloc_large_invalid_free+0xb1/0x100 [ 27.961170] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 27.961755] ? __switch_to+0x5d9/0xf60 [ 27.962788] ? __pfx_mempool_kmalloc+0x10/0x10 [ 27.963291] ? __pfx_mempool_kfree+0x10/0x10 [ 27.963927] ? __pfx_read_tsc+0x10/0x10 [ 27.964847] ? ktime_get_ts64+0x84/0x230 [ 27.965581] kunit_try_run_case+0x1b3/0x490 [ 27.966677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.967198] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.967674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.968429] ? __kthread_parkme+0x82/0x160 [ 27.969291] ? preempt_count_sub+0x50/0x80 [ 27.969916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.971073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.971666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.972415] kthread+0x257/0x310 [ 27.972755] ? __pfx_kthread+0x10/0x10 [ 27.973480] ret_from_fork+0x41/0x80 [ 27.973866] ? __pfx_kthread+0x10/0x10 [ 27.974737] ret_from_fork_asm+0x1a/0x30 [ 27.975354] </TASK> [ 27.975713] [ 27.975872] The buggy address belongs to the physical page: [ 27.976603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ce0 [ 27.977631] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 27.978323] flags: 0x200000000000040(head|node=0|zone=2) [ 27.979468] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.979773] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.980796] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 27.982585] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.983859] head: 0200000000000002 ffffea00040b3801 ffffffffffffffff 0000000000000000 [ 27.985432] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 27.985732] page dumped because: kasan: bad access detected [ 27.985947] [ 27.986263] Memory state around the buggy address: [ 27.986567] ffff888102cdff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.986841] ffff888102cdff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.988110] >ffff888102ce0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.989415] ^ [ 27.989761] ffff888102ce0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.991220] ffff888102ce0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.991852] ==================================================================