Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 37.631733] ================================================================== [ 37.631965] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.632305] Free of addr fff00000c780c001 by task kunit_try_catch/245 [ 37.632743] [ 37.633166] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.634248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.634717] Hardware name: linux,dummy-virt (DT) [ 37.634835] Call trace: [ 37.634905] show_stack+0x20/0x38 (C) [ 37.635095] dump_stack_lvl+0x8c/0xd0 [ 37.635243] print_report+0x118/0x5f0 [ 37.635387] kasan_report_invalid_free+0xb0/0xd8 [ 37.637718] __kasan_mempool_poison_object+0xfc/0x150 [ 37.638300] mempool_free+0x28c/0x328 [ 37.639028] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.640661] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 37.641067] kunit_try_run_case+0x14c/0x3d0 [ 37.641657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.642266] kthread+0x318/0x618 [ 37.643324] ret_from_fork+0x10/0x20 [ 37.643914] [ 37.643983] The buggy address belongs to the physical page: [ 37.644104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780c [ 37.644290] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.646180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.646739] page_type: f8(unknown) [ 37.647993] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.648382] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.649075] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.649259] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.649427] head: 0bfffe0000000002 ffffc1ffc31e0301 00000000ffffffff 00000000ffffffff [ 37.649593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.649714] page dumped because: kasan: bad access detected [ 37.651113] [ 37.651660] Memory state around the buggy address: [ 37.652114] fff00000c780bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653210] fff00000c780bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653691] >fff00000c780c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.654072] ^ [ 37.654759] fff00000c780c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.655120] fff00000c780c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.655237] ================================================================== [ 37.593705] ================================================================== [ 37.593919] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.594161] Free of addr fff00000c5da6c01 by task kunit_try_catch/243 [ 37.594311] [ 37.594439] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.594733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.594830] Hardware name: linux,dummy-virt (DT) [ 37.595159] Call trace: [ 37.595246] show_stack+0x20/0x38 (C) [ 37.595404] dump_stack_lvl+0x8c/0xd0 [ 37.595651] print_report+0x118/0x5f0 [ 37.595973] kasan_report_invalid_free+0xb0/0xd8 [ 37.596503] check_slab_allocation+0xfc/0x108 [ 37.596802] __kasan_mempool_poison_object+0x78/0x150 [ 37.596966] mempool_free+0x28c/0x328 [ 37.597128] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.597306] mempool_kmalloc_invalid_free+0xb8/0x110 [ 37.597479] kunit_try_run_case+0x14c/0x3d0 [ 37.598349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.598674] kthread+0x318/0x618 [ 37.599336] ret_from_fork+0x10/0x20 [ 37.599816] [ 37.599883] Allocated by task 243: [ 37.600227] kasan_save_stack+0x3c/0x68 [ 37.600649] kasan_save_track+0x20/0x40 [ 37.601045] kasan_save_alloc_info+0x40/0x58 [ 37.601643] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.601793] remove_element+0x130/0x1f8 [ 37.601952] mempool_alloc_preallocated+0x58/0xc0 [ 37.602376] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 37.602809] mempool_kmalloc_invalid_free+0xb8/0x110 [ 37.603297] kunit_try_run_case+0x14c/0x3d0 [ 37.603439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.603907] kthread+0x318/0x618 [ 37.604324] ret_from_fork+0x10/0x20 [ 37.604853] [ 37.604928] The buggy address belongs to the object at fff00000c5da6c00 [ 37.604928] which belongs to the cache kmalloc-128 of size 128 [ 37.605423] The buggy address is located 1 bytes inside of [ 37.605423] 128-byte region [fff00000c5da6c00, fff00000c5da6c80) [ 37.606178] [ 37.606650] The buggy address belongs to the physical page: [ 37.606762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.608127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.608300] page_type: f5(slab) [ 37.608689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.608917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.609079] page dumped because: kasan: bad access detected [ 37.609184] [ 37.609236] Memory state around the buggy address: [ 37.609329] fff00000c5da6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.609467] fff00000c5da6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610387] >fff00000c5da6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.610492] ^ [ 37.610544] fff00000c5da6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610654] fff00000c5da6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.610832] ==================================================================
[ 24.533420] ================================================================== [ 24.535582] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.536278] Free of addr ffff888103920001 by task kunit_try_catch/264 [ 24.537597] [ 24.537838] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.537962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.537984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.538015] Call Trace: [ 24.538034] <TASK> [ 24.538056] dump_stack_lvl+0x73/0xb0 [ 24.538146] print_report+0xd1/0x660 [ 24.538185] ? __virt_addr_valid+0x1db/0x2d0 [ 24.538252] ? kasan_addr_to_slab+0x11/0xa0 [ 24.538285] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.538323] kasan_report_invalid_free+0xce/0x100 [ 24.538360] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.538402] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.538438] __kasan_mempool_poison_object+0x102/0x1d0 [ 24.538473] mempool_free+0x2ec/0x380 [ 24.538508] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.538546] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 24.538591] ? finish_task_switch.isra.0+0x153/0x730 [ 24.538629] mempool_kmalloc_large_invalid_free+0xb0/0x100 [ 24.538665] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 24.538700] ? __switch_to+0x5d9/0xf70 [ 24.538813] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.538871] ? __pfx_mempool_kfree+0x10/0x10 [ 24.538932] ? __pfx_read_tsc+0x10/0x10 [ 24.538989] ? ktime_get_ts64+0x86/0x240 [ 24.539055] kunit_try_run_case+0x1b2/0x490 [ 24.539146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.539245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.539314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.539379] ? __kthread_parkme+0x82/0x160 [ 24.539440] ? preempt_count_sub+0x50/0x80 [ 24.539497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.539535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.539571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.539634] kthread+0x323/0x710 [ 24.539666] ? trace_preempt_on+0x20/0xc0 [ 24.539778] ? __pfx_kthread+0x10/0x10 [ 24.539861] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.539895] ? calculate_sigpending+0x7b/0xa0 [ 24.539941] ? __pfx_kthread+0x10/0x10 [ 24.539973] ret_from_fork+0x41/0x80 [ 24.540007] ? __pfx_kthread+0x10/0x10 [ 24.540038] ret_from_fork_asm+0x1a/0x30 [ 24.540087] </TASK> [ 24.540103] [ 24.562671] The buggy address belongs to the physical page: [ 24.563684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920 [ 24.564802] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.565849] flags: 0x200000000000040(head|node=0|zone=2) [ 24.566364] page_type: f8(unknown) [ 24.566890] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.567976] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.568815] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 24.569318] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 24.570585] head: 0200000000000002 ffffea00040e4801 00000000ffffffff 00000000ffffffff [ 24.571737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 24.573208] page dumped because: kasan: bad access detected [ 24.573620] [ 24.574041] Memory state around the buggy address: [ 24.574521] ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.575697] ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.576525] >ffff888103920000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.577430] ^ [ 24.577884] ffff888103920080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.578335] ffff888103920100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.579481] ================================================================== [ 24.470288] ================================================================== [ 24.471680] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.472560] Free of addr ffff888103210e01 by task kunit_try_catch/262 [ 24.473182] [ 24.473788] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.474472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.474502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.474537] Call Trace: [ 24.474556] <TASK> [ 24.474577] dump_stack_lvl+0x73/0xb0 [ 24.474624] print_report+0xd1/0x660 [ 24.474659] ? __virt_addr_valid+0x1db/0x2d0 [ 24.474835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.474888] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.474927] kasan_report_invalid_free+0xce/0x100 [ 24.474965] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.475007] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.475043] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.475078] check_slab_allocation+0x11f/0x130 [ 24.475131] __kasan_mempool_poison_object+0x91/0x1d0 [ 24.475171] mempool_free+0x2ec/0x380 [ 24.475207] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 24.475245] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 24.475291] ? finish_task_switch.isra.0+0x153/0x730 [ 24.475328] mempool_kmalloc_invalid_free+0xb0/0x100 [ 24.475363] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 24.475396] ? __switch_to+0x5d9/0xf70 [ 24.475433] ? __pfx_mempool_kmalloc+0x10/0x10 [ 24.475461] ? __pfx_mempool_kfree+0x10/0x10 [ 24.475494] ? __pfx_read_tsc+0x10/0x10 [ 24.475523] ? ktime_get_ts64+0x86/0x240 [ 24.475558] kunit_try_run_case+0x1b2/0x490 [ 24.475602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.475650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.475741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.475808] ? __kthread_parkme+0x82/0x160 [ 24.475873] ? preempt_count_sub+0x50/0x80 [ 24.475912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.475959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.475994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.476028] kthread+0x323/0x710 [ 24.476058] ? trace_preempt_on+0x20/0xc0 [ 24.476092] ? __pfx_kthread+0x10/0x10 [ 24.476144] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.476174] ? calculate_sigpending+0x7b/0xa0 [ 24.476206] ? __pfx_kthread+0x10/0x10 [ 24.476238] ret_from_fork+0x41/0x80 [ 24.476269] ? __pfx_kthread+0x10/0x10 [ 24.476301] ret_from_fork_asm+0x1a/0x30 [ 24.476347] </TASK> [ 24.476364] [ 24.502408] Allocated by task 262: [ 24.503909] kasan_save_stack+0x3d/0x60 [ 24.504271] kasan_save_track+0x18/0x40 [ 24.504630] kasan_save_alloc_info+0x3b/0x50 [ 24.505594] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 24.506083] remove_element+0x11e/0x190 [ 24.506951] mempool_alloc_preallocated+0x4d/0x90 [ 24.507294] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 24.508797] mempool_kmalloc_invalid_free+0xb0/0x100 [ 24.509332] kunit_try_run_case+0x1b2/0x490 [ 24.509789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.510613] kthread+0x323/0x710 [ 24.511343] ret_from_fork+0x41/0x80 [ 24.511734] ret_from_fork_asm+0x1a/0x30 [ 24.512142] [ 24.513453] The buggy address belongs to the object at ffff888103210e00 [ 24.513453] which belongs to the cache kmalloc-128 of size 128 [ 24.515076] The buggy address is located 1 bytes inside of [ 24.515076] 128-byte region [ffff888103210e00, ffff888103210e80) [ 24.516069] [ 24.516445] The buggy address belongs to the physical page: [ 24.517035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103210 [ 24.517490] flags: 0x200000000000000(node=0|zone=2) [ 24.518488] page_type: f5(slab) [ 24.519032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.519531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.520430] page dumped because: kasan: bad access detected [ 24.520875] [ 24.521101] Memory state around the buggy address: [ 24.521823] ffff888103210d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.522306] ffff888103210d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.523158] >ffff888103210e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.523960] ^ [ 24.524521] ffff888103210e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.525436] ffff888103210f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.526387] ==================================================================