Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.660585] ================================================================== [ 20.661223] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.661778] Free of addr fff00000c66e8001 by task kunit_try_catch/233 [ 20.662088] [ 20.662910] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.663038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.663072] Hardware name: linux,dummy-virt (DT) [ 20.663110] Call trace: [ 20.663137] show_stack+0x20/0x38 (C) [ 20.663228] dump_stack_lvl+0x8c/0xd0 [ 20.663284] print_report+0x118/0x608 [ 20.663341] kasan_report_invalid_free+0xc0/0xe8 [ 20.663396] __kasan_mempool_poison_object+0xfc/0x150 [ 20.663453] mempool_free+0x28c/0x328 [ 20.663509] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.663566] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.663623] kunit_try_run_case+0x170/0x3f0 [ 20.663678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.663736] kthread+0x318/0x620 [ 20.663787] ret_from_fork+0x10/0x20 [ 20.663844] [ 20.668750] The buggy address belongs to the physical page: [ 20.669183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8 [ 20.669674] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.670091] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.671004] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.671410] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.671844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.672235] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.672616] head: 0bfffe0000000002 ffffc1ffc319ba01 ffffffffffffffff 0000000000000000 [ 20.673006] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.673801] page dumped because: kasan: bad access detected [ 20.674461] [ 20.674645] Memory state around the buggy address: [ 20.674861] fff00000c66e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.675349] fff00000c66e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.675765] >fff00000c66e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.676187] ^ [ 20.676384] fff00000c66e8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.676753] fff00000c66e8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.677065] ================================================================== [ 20.631689] ================================================================== [ 20.632287] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.632902] Free of addr fff00000c3f2db01 by task kunit_try_catch/231 [ 20.633397] [ 20.633617] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.633742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.633777] Hardware name: linux,dummy-virt (DT) [ 20.633817] Call trace: [ 20.633845] show_stack+0x20/0x38 (C) [ 20.633904] dump_stack_lvl+0x8c/0xd0 [ 20.633961] print_report+0x118/0x608 [ 20.634009] kasan_report_invalid_free+0xc0/0xe8 [ 20.634534] check_slab_allocation+0xfc/0x108 [ 20.634604] __kasan_mempool_poison_object+0x78/0x150 [ 20.634661] mempool_free+0x28c/0x328 [ 20.634718] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.634777] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.634832] kunit_try_run_case+0x170/0x3f0 [ 20.634883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.634940] kthread+0x318/0x620 [ 20.634991] ret_from_fork+0x10/0x20 [ 20.635046] [ 20.639362] Allocated by task 231: [ 20.639621] kasan_save_stack+0x3c/0x68 [ 20.639838] kasan_save_track+0x20/0x40 [ 20.640217] kasan_save_alloc_info+0x40/0x58 [ 20.640626] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.641004] remove_element+0x130/0x1f8 [ 20.641361] mempool_alloc_preallocated+0x58/0xc0 [ 20.641666] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 20.642035] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.642536] kunit_try_run_case+0x170/0x3f0 [ 20.642796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.643139] kthread+0x318/0x620 [ 20.643389] ret_from_fork+0x10/0x20 [ 20.643623] [ 20.643814] The buggy address belongs to the object at fff00000c3f2db00 [ 20.643814] which belongs to the cache kmalloc-128 of size 128 [ 20.644378] The buggy address is located 1 bytes inside of [ 20.644378] 128-byte region [fff00000c3f2db00, fff00000c3f2db80) [ 20.644970] [ 20.645190] The buggy address belongs to the physical page: [ 20.645462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f2d [ 20.645903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.646474] page_type: f5(slab) [ 20.647098] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.647621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.647991] page dumped because: kasan: bad access detected [ 20.648364] [ 20.648471] Memory state around the buggy address: [ 20.648811] fff00000c3f2da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.649212] fff00000c3f2da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.649722] >fff00000c3f2db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.650095] ^ [ 20.650561] fff00000c3f2db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.650851] fff00000c3f2dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.651183] ==================================================================
[ 14.423729] ================================================================== [ 14.424351] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.424752] Free of addr ffff888102cdc001 by task kunit_try_catch/251 [ 14.425144] [ 14.425290] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.425332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.425343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.425365] Call Trace: [ 14.425377] <TASK> [ 14.425393] dump_stack_lvl+0x73/0xb0 [ 14.425423] print_report+0xd1/0x650 [ 14.425447] ? __virt_addr_valid+0x1db/0x2d0 [ 14.425473] ? kasan_addr_to_slab+0x11/0xa0 [ 14.425495] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.425523] kasan_report_invalid_free+0xfc/0x120 [ 14.425549] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.425580] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.425606] __kasan_mempool_poison_object+0x102/0x1d0 [ 14.425632] mempool_free+0x2ec/0x380 [ 14.425659] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.425687] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.425718] ? finish_task_switch.isra.0+0x153/0x700 [ 14.425755] mempool_kmalloc_large_invalid_free+0xee/0x140 [ 14.425781] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 14.425809] ? __kasan_check_write+0x18/0x20 [ 14.425836] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.425858] ? __pfx_mempool_kfree+0x10/0x10 [ 14.425882] ? __pfx_read_tsc+0x10/0x10 [ 14.425906] ? ktime_get_ts64+0x86/0x230 [ 14.425931] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.425962] kunit_try_run_case+0x1a6/0x480 [ 14.425987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.426026] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.426073] ? __kthread_parkme+0x82/0x160 [ 14.426101] ? preempt_count_sub+0x50/0x80 [ 14.426129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.426157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.426187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.426216] kthread+0x324/0x6e0 [ 14.426240] ? trace_preempt_on+0x20/0xc0 [ 14.426268] ? __pfx_kthread+0x10/0x10 [ 14.426294] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.426320] ? calculate_sigpending+0x7b/0xa0 [ 14.426345] ? __pfx_kthread+0x10/0x10 [ 14.426371] ret_from_fork+0x41/0x80 [ 14.426393] ? __pfx_kthread+0x10/0x10 [ 14.426419] ret_from_fork_asm+0x1a/0x30 [ 14.426454] </TASK> [ 14.426465] [ 14.435361] The buggy address belongs to the physical page: [ 14.435569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cdc [ 14.435891] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.436126] flags: 0x200000000000040(head|node=0|zone=2) [ 14.437317] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.437643] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.437883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.439012] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.440423] head: 0200000000000002 ffffea00040b3701 ffffffffffffffff 0000000000000000 [ 14.440659] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 14.442991] page dumped because: kasan: bad access detected [ 14.443457] [ 14.443537] Memory state around the buggy address: [ 14.443700] ffff888102cdbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.444102] ffff888102cdbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.444322] >ffff888102cdc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.444533] ^ [ 14.444848] ffff888102cdc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.445471] ffff888102cdc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.446310] ================================================================== [ 14.395920] ================================================================== [ 14.396430] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.396762] Free of addr ffff888101bd1f01 by task kunit_try_catch/249 [ 14.397131] [ 14.397246] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.397287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.397298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.397318] Call Trace: [ 14.397330] <TASK> [ 14.397345] dump_stack_lvl+0x73/0xb0 [ 14.397370] print_report+0xd1/0x650 [ 14.397393] ? __virt_addr_valid+0x1db/0x2d0 [ 14.397415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.397440] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.397465] kasan_report_invalid_free+0xfc/0x120 [ 14.397487] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.397514] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.397537] ? mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.397560] check_slab_allocation+0x11f/0x130 [ 14.397580] __kasan_mempool_poison_object+0x91/0x1d0 [ 14.397603] mempool_free+0x2ec/0x380 [ 14.397625] mempool_kmalloc_invalid_free_helper+0x133/0x2e0 [ 14.397650] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 14.397678] ? finish_task_switch.isra.0+0x153/0x700 [ 14.397703] mempool_kmalloc_invalid_free+0xee/0x140 [ 14.397727] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 14.397761] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.397779] ? __pfx_mempool_kfree+0x10/0x10 [ 14.397800] ? __pfx_read_tsc+0x10/0x10 [ 14.397822] ? ktime_get_ts64+0x86/0x230 [ 14.397846] kunit_try_run_case+0x1a6/0x480 [ 14.397869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.397892] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.397915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.397939] ? __kthread_parkme+0x82/0x160 [ 14.397960] ? preempt_count_sub+0x50/0x80 [ 14.397983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.398041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.398067] kthread+0x324/0x6e0 [ 14.398087] ? trace_preempt_on+0x20/0xc0 [ 14.398110] ? __pfx_kthread+0x10/0x10 [ 14.398132] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.398154] ? calculate_sigpending+0x7b/0xa0 [ 14.398175] ? __pfx_kthread+0x10/0x10 [ 14.398197] ret_from_fork+0x41/0x80 [ 14.398216] ? __pfx_kthread+0x10/0x10 [ 14.398237] ret_from_fork_asm+0x1a/0x30 [ 14.398268] </TASK> [ 14.398277] [ 14.407356] Allocated by task 249: [ 14.407630] kasan_save_stack+0x45/0x70 [ 14.408134] kasan_save_track+0x18/0x40 [ 14.408285] kasan_save_alloc_info+0x3b/0x50 [ 14.408438] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 14.408722] remove_element+0x11e/0x190 [ 14.409196] mempool_alloc_preallocated+0x4d/0x90 [ 14.409421] mempool_kmalloc_invalid_free_helper+0x84/0x2e0 [ 14.409816] mempool_kmalloc_invalid_free+0xee/0x140 [ 14.410126] kunit_try_run_case+0x1a6/0x480 [ 14.410348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.410604] kthread+0x324/0x6e0 [ 14.410900] ret_from_fork+0x41/0x80 [ 14.411137] ret_from_fork_asm+0x1a/0x30 [ 14.411343] [ 14.411416] The buggy address belongs to the object at ffff888101bd1f00 [ 14.411416] which belongs to the cache kmalloc-128 of size 128 [ 14.411816] The buggy address is located 1 bytes inside of [ 14.411816] 128-byte region [ffff888101bd1f00, ffff888101bd1f80) [ 14.412596] [ 14.412939] The buggy address belongs to the physical page: [ 14.413281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 14.413547] flags: 0x200000000000000(node=0|zone=2) [ 14.413805] page_type: f5(slab) [ 14.414094] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.414501] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 14.414878] page dumped because: kasan: bad access detected [ 14.415304] [ 14.415376] Memory state around the buggy address: [ 14.415562] ffff888101bd1e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.415881] ffff888101bd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.416190] >ffff888101bd1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.416478] ^ [ 14.416836] ffff888101bd1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.417176] ffff888101bd2000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.417398] ==================================================================