[BUG report] Oops: general protection fault, probably for non-canonical address, RIP: 0010:lockdep_unregister_key+0x92/0x240

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

When I tested linux v6.10-rc0 (HEAD is [0]), I hit a kernel crash several
times [1][2] by running fstests on xfs. Besides that, I also found there
was a KASAN warning [3][4] before this kernel crash happened each time.
So the thing is the [3]/[4] happens at first, then fstests keep running,
then kernel crash [1]/[2] after a while.

The KASAN warning call trace shows "xfs". So I report this bug to xfs list
at first, please feel free to send to other list if it's not related with
xfs.

Thanks,
Zorro

[0]
commit 56fb6f92854f29dcb6c3dc3ba92eeda1b615e88c
Author: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Date:   Fri May 24 17:28:02 2024 -0700

    Merge tag 'drm-next-2024-05-25' of https://gitlab.freedesktop.org/drm/kernel


[1]
[ 1536.887265] run fstests generic/058 at 2024-05-25 04:00:09 
[ 1538.419955] XFS (pmem0): EXPERIMENTAL online scrub feature in use. Use at your own risk! 
[ 1538.717051] XFS (pmem0): Unmounting Filesystem dd16c11a-078c-4740-ad8c-c87d48258622 
[ 1538.897398] XFS (pmem0): Mounting V5 Filesystem dd16c11a-078c-4740-ad8c-c87d48258622 
[ 1538.912263] XFS (pmem0): Ending clean mount 
[ 1538.951253] XFS (pmem0): Unmounting Filesystem dd16c11a-078c-4740-ad8c-c87d48258622 
[ 1539.129894] XFS (pmem0): Mounting V5 Filesystem dd16c11a-078c-4740-ad8c-c87d48258622 
[ 1539.146138] XFS (pmem0): Ending clean mount 
[ 1539.886454] XFS (pmem1): Mounting V5 Filesystem 85dac31d-0118-479a-bc73-632eef90644a 
[ 1539.899395] XFS (pmem1): Ending clean mount 
[ 1539.912986] XFS (pmem1): Unmounting Filesystem 85dac31d-0118-479a-bc73-632eef90644a 
[ 1539.922472] Oops: general protection fault, probably for non-canonical address 0xe0a6bc240000ad1e: 0000 [#1] PREEMPT SMP KASAN NOPTI 
[ 1539.934378] KASAN: maybe wild-memory-access in range [0x05360120000568f0-0x05360120000568f7] 
[ 1539.942811] CPU: 18 PID: 3 Comm: pool_workqueue_ Kdump: loaded Tainted: G    B              6.9.0+ #1 
[ 1539.952023] Hardware name: Dell Inc. PowerEdge R750/0PJ80M, BIOS 1.5.4 12/17/2021 
[ 1539.959502] RIP: 0010:lockdep_unregister_key+0x92/0x240 
[ 1539.964737] Code: 00 0f 85 88 01 00 00 48 8b 1c dd a0 25 7d b3 49 bc 00 00 00 00 00 fc ff df 48 85 db 75 23 e9 11 01 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 4d 01 00 00 48 8b 1b 48 85 db 0f 84 f3 00 00 
[ 1539.972794] XFS (pmem0): EXPERIMENTAL online scrub feature in use. Use at your own risk! 
[ 1539.983482] RSP: 0018:ffa000000013fe00 EFLAGS: 00010007 
[ 1539.983486] RAX: 00a6c0240000ad1e RBX: 05360120000568f6 RCX: ffffffffacff4872 
[ 1539.983489] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ff1100061df2aa08 
[ 1539.983491] RBP: ff110006b903a148 R08: 0000000000000001 R09: fff3fc0000027fb6 
[ 1540.018201] R10: 0000000000000003 R11: ffa000000013ff50 R12: dffffc0000000000 
[ 1540.025334] R13: 0000000000000246 R14: ff11001189954008 R15: ff110006b903a001 
[ 1540.032467] FS:  0000000000000000(0000) GS:ff11000cecc00000(0000) knlGS:0000000000000000 
[ 1540.040555] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 
[ 1540.046300] CR2: 00007fb8375fda40 CR3: 000000091506e006 CR4: 0000000000771ef0 
[ 1540.053433] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 
[ 1540.060564] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 
[ 1540.067698] PKRU: 55555554 
[ 1540.070410] Call Trace: 
[ 1540.072864]  <TASK> 
[ 1540.074971]  ? die_addr+0x3d/0xa0 
[ 1540.078297]  ? exc_general_protection+0x150/0x230 
[ 1540.083008]  ? asm_exc_general_protection+0x22/0x30 
[ 1540.087895]  ? lockdep_unregister_key+0x1f2/0x240 
[ 1540.092609]  ? lockdep_unregister_key+0x92/0x240 
[ 1540.097235]  pwq_release_workfn+0x464/0x930 
[ 1540.101420]  ? trace_irq_enable.constprop.0+0x151/0x1c0 
[ 1540.106648]  kthread_worker_fn+0x2bb/0x990 
[ 1540.110757]  ? __pfx_pwq_release_workfn+0x10/0x10 
[ 1540.115471]  ? __pfx_kthread_worker_fn+0x10/0x10 
[ 1540.120092]  kthread+0x2f3/0x3e0 
[ 1540.123330]  ? _raw_spin_unlock_irq+0x24/0x50 
[ 1540.127698]  ? __pfx_kthread+0x10/0x10 
[ 1540.131450]  ret_from_fork+0x2d/0x70 
[ 1540.135030]  ? __pfx_kthread+0x10/0x10 
[ 1540.138783]  ret_from_fork_asm+0x1a/0x30 
[ 1540.142715]  </TASK> 
[ 1540.144911] Modules linked in: loop rfkill intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common i10nm_edac nfit x86_pkg_temp_thermal intel_powerclamp mlx5_ib coretemp dax_hmem cxl_acpi mgag200 ib_uverbs kvm_intel cxl_core i2c_algo_bit iTCO_wdt acpi_power_meter mei_me ipmi_ssif iTCO_vendor_support drm_shmem_helper dell_smbios sunrpc dcdbas kvm rapl intel_cstate intel_uncore dax_pmem nd_pmem ib_core dell_wmi_descriptor einj wmi_bmof pcspkr isst_if_mbox_pci drm_kms_helper intel_th_gth isst_if_mmio i2c_i801 mei ipmi_si intel_th_pci isst_if_common acpi_ipmi i2c_smbus intel_th intel_pch_thermal intel_vsec ipmi_devintf ipmi_msghandler drm fuse xfs libcrc32c sd_mod t10_pi sg mlx5_core crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci mlxfw tls ghash_clmulni_intel libata tg3 psample megaraid_sas dimlib pci_hyperv_intf wmi dm_mirror dm_region_hash dm_log dm_mod 
[ 1540.223677] ---[ end trace 0000000000000000 ]--- 
[ 1540.419540] RIP: 0010:lockdep_unregister_key+0x92/0x240 
[ 1540.424804] Code: 00 0f 85 88 01 00 00 48 8b 1c dd a0 25 7d b3 49 bc 00 00 00 00 00 fc ff df 48 85 db 75 23 e9 11 01 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 4d 01 00 00 48 8b 1b 48 85 db 0f 84 f3 00 00 
[ 1540.443555] RSP: 0018:ffa000000013fe00 EFLAGS: 00010007 
[ 1540.448781] RAX: 00a6c0240000ad1e RBX: 05360120000568f6 RCX: ffffffffacff4872 
[ 1540.455916] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ff1100061df2aa08 
[ 1540.463048] RBP: ff110006b903a148 R08: 0000000000000001 R09: fff3fc0000027fb6 
[ 1540.470180] R10: 0000000000000003 R11: ffa000000013ff50 R12: dffffc0000000000 
[ 1540.477314] R13: 0000000000000246 R14: ff11001189954008 R15: ff110006b903a001 
[ 1540.484445] FS:  0000000000000000(0000) GS:ff11000cecc00000(0000) knlGS:0000000000000000 
[ 1540.492531] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 
[ 1540.498277] CR2: 00007fb8375fda40 CR3: 000000091506e006 CR4: 0000000000771ef0 
[ 1540.505411] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 
[ 1540.512542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 
[ 1540.519674] PKRU: 55555554 
[ 1540.522389] note: pool_workqueue_[3] exited with irqs disabled 
[ 1540.528552] XFS (pmem0): Unmounting Filesystem dd16c11a-078c-4740-ad8c-c87d48258622

[2]
[ 8142.904861] run fstests generic/653 at 2024-05-25 05:49:51 
[ 8144.543052] XFS (pmem1): Mounting V5 Filesystem 25321d99-fb0c-43da-9e96-340d13797ffd 
[ 8144.559228] XFS (pmem1): Ending clean mount 
[ 8144.594106] XFS (pmem1): Unmounting Filesystem 25321d99-fb0c-43da-9e96-340d13797ffd 
[ 8144.724615] XFS (pmem0): Unmounting Filesystem d31f1d21-8356-4bfc-8208-34f838e50811 
[ 8144.792613] Oops: general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] PREEMPT SMP KASAN NOPTI 
[ 8144.804525] KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f] 
[ 8144.812100] CPU: 35 PID: 3 Comm: pool_workqueue_ Kdump: loaded Tainted: G    B              6.9.0+ #1 
[ 8144.821320] Hardware name: Dell Inc. PowerEdge R750/0PJ80M, BIOS 1.5.4 12/17/2021 
[ 8144.828798] RIP: 0010:lockdep_unregister_key+0x92/0x240 
[ 8144.834033] Code: 00 0f 85 88 01 00 00 48 8b 1c dd a0 25 dd 8f 49 bc 00 00 00 00 00 fc ff df 48 85 db 75 23 e9 11 01 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 4d 01 00 00 48 8b 1b 48 85 db 0f 84 f3 00 00 
[ 8144.852780] RSP: 0018:ffa000000013fe00 EFLAGS: 00010006 
[ 8144.858015] RAX: 000000000000000f RBX: 000000000000007b RCX: ffffffff895f4872 
[ 8144.865148] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ff1100062ad8ea08 
[ 8144.872281] RBP: ff11000779a2b948 R08: 0000000000000001 R09: fff3fc0000027fb6 
[ 8144.879412] R10: 0000000000000003 R11: ffa000000013ff50 R12: dffffc0000000000 
[ 8144.886545] R13: 0000000000000246 R14: ff11000672ba8808 R15: ff11000779a2b801 
[ 8144.893678] FS:  0000000000000000(0000) GS:ff11002035400000(0000) knlGS:0000000000000000 
[ 8144.901765] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 
[ 8144.907509] CR2: 0000560a902eddd8 CR3: 00000015afc6e001 CR4: 0000000000771ef0 
[ 8144.914642] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 
[ 8144.921775] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 
[ 8144.928908] PKRU: 55555554 
[ 8144.931620] Call Trace: 
[ 8144.934074]  <TASK> 
[ 8144.936180]  ? die_addr+0x3d/0xa0 
[ 8144.939500]  ? exc_general_protection+0x150/0x230 
[ 8144.944208]  ? asm_exc_general_protection+0x22/0x30 
[ 8144.949095]  ? lockdep_unregister_key+0x1f2/0x240 
[ 8144.953801]  ? lockdep_unregister_key+0x92/0x240 
[ 8144.958420]  pwq_release_workfn+0x464/0x930 
[ 8144.962612]  ? trace_irq_enable.constprop.0+0x151/0x1c0 
[ 8144.967840]  kthread_worker_fn+0x2bb/0x990 
[ 8144.971949]  ? __pfx_pwq_release_workfn+0x10/0x10 
[ 8144.976655]  ? __pfx_kthread_worker_fn+0x10/0x10 
[ 8144.981273]  kthread+0x2f3/0x3e0 
[ 8144.984506]  ? _raw_spin_unlock_irq+0x24/0x50 
[ 8144.988873]  ? __pfx_kthread+0x10/0x10 
[ 8144.992626]  ret_from_fork+0x2d/0x70 
[ 8144.996207]  ? __pfx_kthread+0x10/0x10 
[ 8144.999959]  ret_from_fork_asm+0x1a/0x30 
[ 8145.003888]  </TASK> 
[ 8145.006078] Modules linked in: overlay dm_log_writes ext4 mbcache jbd2 loop rfkill intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common i10nm_edac nfit x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm mlx5_ib dax_hmem mgag200 cxl_acpi ib_uverbs cxl_core i2c_algo_bit rapl iTCO_wdt mei_me iTCO_vendor_support drm_shmem_helper dell_smbios ipmi_ssif acpi_power_meter intel_cstate sunrpc dcdbas ib_core intel_uncore dax_pmem drm_kms_helper nd_pmem dell_wmi_descriptor wmi_bmof einj intel_th_gth pcspkr ipmi_si isst_if_mbox_pci mei i2c_i801 acpi_ipmi isst_if_mmio intel_th_pci isst_if_common i2c_smbus intel_pch_thermal ipmi_devintf intel_vsec intel_th ipmi_msghandler drm fuse xfs libcrc32c sd_mod t10_pi sg mlx5_core mlxfw tls ahci libahci crct10dif_pclmul crc32_pclmul crc32c_intel psample ghash_clmulni_intel dimlib libata megaraid_sas tg3 pci_hyperv_intf wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_debug] 
[ 8145.090735] ---[ end trace 0000000000000000 ]--- 
[ 8145.307827] RIP: 0010:lockdep_unregister_key+0x92/0x240 
[ 8145.313062] Code: 00 0f 85 88 01 00 00 48 8b 1c dd a0 25 dd 8f 49 bc 00 00 00 00 00 fc ff df 48 85 db 75 23 e9 11 01 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 4d 01 00 00 48 8b 1b 48 85 db 0f 84 f3 00 00 
[ 8145.331809] RSP: 0018:ffa000000013fe00 EFLAGS: 00010006 
[ 8145.337043] RAX: 000000000000000f RBX: 000000000000007b RCX: ffffffff895f4872 
[ 8145.344175] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ff1100062ad8ea08 
[ 8145.351307] RBP: ff11000779a2b948 R08: 0000000000000001 R09: fff3fc0000027fb6 
[ 8145.358440] R10: 0000000000000003 R11: ffa000000013ff50 R12: dffffc0000000000 
[ 8145.365573] R13: 0000000000000246 R14: ff11000672ba8808 R15: ff11000779a2b801 
[ 8145.372705] FS:  0000000000000000(0000) GS:ff11002035400000(0000) knlGS:0000000000000000 
[ 8145.380793] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 
[ 8145.386537] CR2: 0000560a902eddd8 CR3: 00000015afc6e001 CR4: 0000000000771ef0 
[ 8145.393670] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 
[ 8145.400805] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 
[ 8145.407937] PKRU: 55555554 
[ 8145.410649] note: pool_workqueue_[3] exited with irqs disabled 
[-- MARK -- Sat May 25 09:50:00 2024]

[3]
[  347.732117] XFS (pmem0): Mounting V5 Filesystem dd16c11a-078c-4740-ad8c-c87d48258622 
[  347.748296] XFS (pmem0): Ending clean mount 
[  347.775892] XFS (pmem1): Mounting V5 Filesystem bcf841af-51bd-4837-b846-06928f4ebcbf 
[  347.786106] ================================================================== 
[  347.793325] BUG: KASAN: slab-use-after-free in lockdep_register_key+0x1c1/0x200 
[  347.800641] Read of size 8 at addr ff1100061df2aa08 by task mount/46820 
[  347.807251]  
[  347.808754] CPU: 37 PID: 46820 Comm: mount Kdump: loaded Not tainted 6.9.0+ #1 
[  347.815978] Hardware name: Dell Inc. PowerEdge R750/0PJ80M, BIOS 1.5.4 12/17/2021 
[  347.823460] Call Trace: 
[  347.825913]  <TASK> 
[  347.828019]  dump_stack_lvl+0x7e/0xc0 
[  347.831694]  print_address_description.constprop.0+0x2c/0x3d0 
[  347.837449]  ? lockdep_register_key+0x1c1/0x200 
[  347.841981]  print_report+0xb4/0x270 
[  347.845559]  ? lockdep_register_key+0x1c1/0x200 
[  347.850093]  ? kasan_addr_to_slab+0x9/0xa0 
[  347.854191]  kasan_report+0x89/0xc0 
[  347.857685]  ? lockdep_register_key+0x1c1/0x200 
[  347.862220]  lockdep_register_key+0x1c1/0x200 
[  347.866586]  alloc_workqueue+0x455/0xed0 
[  347.870520]  ? __pfx___lock_release+0x10/0x10 
[  347.874880]  ? wq_adjust_max_active+0x318/0x3e0 
[  347.879414]  ? __pfx_alloc_workqueue+0x10/0x10 
[  347.883858]  ? rcu_is_watching+0x11/0xb0 
[  347.887785]  ? trace_kmalloc+0x30/0xd0 
[  347.891546]  ? kmalloc_trace_noprof+0x1a9/0x360 
[  347.896080]  xlog_cil_init+0xc5/0x5a0 [xfs] 
[  347.900656]  xlog_alloc_log+0xfd8/0x1330 [xfs] 
[  347.905424]  xfs_log_mount+0xbb/0x490 [xfs] 
[  347.909921]  xfs_mountfs+0xe33/0x1ba0 [xfs] 
[  347.914430]  ? __pfx_xfs_mountfs+0x10/0x10 [xfs] 
[  347.919365]  ? init_timer_key+0x145/0x300 
[  347.923379]  ? rcu_is_watching+0x11/0xb0 
[  347.927307]  xfs_fs_fill_super+0xdff/0x17e0 [xfs] 
[  347.932332]  get_tree_bdev+0x304/0x560 
[  347.936093]  ? __pfx_xfs_fs_fill_super+0x10/0x10 [xfs] 
[  347.941552]  ? __pfx_get_tree_bdev+0x10/0x10 
[  347.945826]  ? security_sb_eat_lsm_opts+0x44/0x80 
[  347.950543]  vfs_get_tree+0x87/0x350 
[  347.954128]  do_new_mount+0x2a0/0x5f0 
[  347.957804]  ? __pfx_do_new_mount+0x10/0x10 
[  347.961997]  ? security_capable+0x53/0xa0 
[  347.966010]  path_mount+0x2d5/0x1520 
[  347.969592]  ? __pfx_path_mount+0x10/0x10 
[  347.973604]  __x64_sys_mount+0x1fe/0x270 
[  347.977528]  ? __pfx___x64_sys_mount+0x10/0x10 
[  347.981977]  do_syscall_64+0x8c/0x180 
[  347.985648]  ? do_faccessat+0x21e/0x850 
[  347.989495]  ? ktime_get_coarse_real_ts64+0x130/0x170 
[  347.994551]  ? rcu_is_watching+0x11/0xb0 
[  347.998476]  ? lockdep_hardirqs_on_prepare+0x179/0x400 
[  348.003615]  ? do_syscall_64+0x98/0x180 
[  348.007453]  ? lockdep_hardirqs_on+0x78/0x100 
[  348.011812]  ? do_syscall_64+0x98/0x180 
[  348.015652]  ? from_kgid_munged+0x84/0x110 
[  348.019752]  ? rcu_is_watching+0x11/0xb0 
[  348.023679]  ? lockdep_hardirqs_on_prepare+0x179/0x400 
[  348.028816]  ? do_syscall_64+0x98/0x180 
[  348.032656]  ? lockdep_hardirqs_on+0x78/0x100 
[  348.037015]  ? do_syscall_64+0x98/0x180 
[  348.040856]  ? lockdep_hardirqs_on+0x78/0x100 
[  348.045216]  ? from_kuid_munged+0x82/0x100 
[  348.049314]  ? rcu_is_watching+0x11/0xb0 
[  348.053240]  ? lockdep_hardirqs_on_prepare+0x179/0x400 
[  348.058380]  ? do_syscall_64+0x98/0x180 
[  348.062217]  ? lockdep_hardirqs_on+0x78/0x100 
[  348.066579]  ? do_syscall_64+0x98/0x180 
[  348.070419]  ? do_user_addr_fault+0x4a2/0xb60 
[  348.074786]  ? rcu_is_watching+0x11/0xb0 
[  348.078711]  ? clear_bhb_loop+0x45/0xa0 
[  348.082550]  ? clear_bhb_loop+0x45/0xa0 
[  348.086392]  entry_SYSCALL_64_after_hwframe+0x76/0x7e 
[  348.091444] RIP: 0033:0x7fd0f570f03e 
[  348.095022] Code: 48 8b 0d e5 ad 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b2 ad 0e 00 f7 d8 64 89 01 48 
[  348.113768] RSP: 002b:00007ffd7abe69d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 
[  348.121335] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd0f570f03e 
[  348.128468] RDX: 000055a647556630 RSI: 000055a6475566b0 RDI: 000055a647556690 
[  348.135598] RBP: 000055a647556400 R08: 000055a647556650 R09: 00007ffd7abe5700 
[  348.142731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 
[  348.149865] R13: 000055a647556630 R14: 000055a647556690 R15: 000055a647556400 
[  348.157001]  </TASK> 
[  348.159192]  
[  348.160690] Allocated by task 46035: 
[  348.164270]  kasan_save_stack+0x20/0x40 
[  348.168108]  kasan_save_track+0x10/0x30 
[  348.171947]  __kasan_slab_alloc+0x55/0x70 
[  348.175959]  kmem_cache_alloc_noprof+0x131/0x330 
[  348.180581]  getname_flags.part.0+0x4f/0x450 
[  348.184853]  do_sys_openat2+0xdb/0x160 
[  348.188606]  __x64_sys_openat+0x11f/0x1e0 
[  348.192618]  do_syscall_64+0x8c/0x180 
[  348.196283]  entry_SYSCALL_64_after_hwframe+0x76/0x7e 
[  348.201338]  
[  348.202836] Freed by task 46035: 
[  348.206070]  kasan_save_stack+0x20/0x40 
[  348.209909]  kasan_save_track+0x10/0x30 
[  348.213746]  kasan_save_free_info+0x37/0x60 
[  348.217932]  __kasan_slab_free+0x109/0x190 
[  348.222032]  kmem_cache_free+0x1a6/0x4c0 
[  348.225959]  do_sys_openat2+0x10a/0x160 
[  348.229798]  __x64_sys_openat+0x11f/0x1e0 
[  348.233809]  do_syscall_64+0x8c/0x180 
[  348.237477]  entry_SYSCALL_64_after_hwframe+0x76/0x7e 
[  348.242530]  
[  348.244029] The buggy address belongs to the object at ff1100061df2a200 
[  348.244029]  which belongs to the cache names_cache of size 4096 
[  348.256622] The buggy address is located 2056 bytes inside of 
[  348.256622]  freed 4096-byte region [ff1100061df2a200, ff1100061df2b200) 
[  348.269041]  
[  348.270542] The buggy address belongs to the physical page: 
[  348.276114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61df28 
[  348.284114] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 
[  348.291764] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) 
[  348.298726] page_type: 0xffffefff(slab) 
[  348.302567] raw: 0017ffffc0000040 ff11000600047ac0 dead000000000100 dead000000000122 
[  348.310305] raw: 0000000000000000 0000000000070007 00000001ffffefff 0000000000000000 
[  348.318043] head: 0017ffffc0000040 ff11000600047ac0 dead000000000100 dead000000000122 
[  348.325869] head: 0000000000000000 0000000000070007 00000001ffffefff 0000000000000000 
[  348.333694] head: 0017ffffc0000003 ffd400001877ca01 ffffffffffffffff 0000000000000000 
[  348.341522] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 
[  348.349347] page dumped because: kasan: bad access detected 
[  348.354918]  
[  348.356420] Memory state around the buggy address: 
[  348.361212]  ff1100061df2a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[  348.368433]  ff1100061df2a980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[  348.375650] >ff1100061df2aa00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[  348.382868]                       ^ 
[  348.386363]  ff1100061df2aa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[  348.393582]  ff1100061df2ab00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[  348.400799] ================================================================== 
[  348.408022] Disabling lock debugging due to kernel taint 
[  348.416787] XFS (pmem1): Ending clean mount

[4]
[   50.746014] ================================================================== 
[   50.753237] BUG: KASAN: slab-use-after-free in lockdep_register_key+0x1c1/0x200 
[   50.760551] Read of size 8 at addr ff1100062ad8ea08 by task modprobe/1286 
[   50.767338]  
[   50.768836] CPU: 66 PID: 1286 Comm: modprobe Not tainted 6.9.0+ #1 
[   50.775014] Hardware name: Dell Inc. PowerEdge R750/0PJ80M, BIOS 1.5.4 12/17/2021 
[   50.782494] Call Trace: 
[   50.784946]  <TASK> 
[   50.787054]  dump_stack_lvl+0x7e/0xc0 
[   50.790728]  print_address_description.constprop.0+0x2c/0x3d0 
[   50.796484]  ? lockdep_register_key+0x1c1/0x200 
[   50.801015]  print_report+0xb4/0x270 
[   50.804595]  ? lockdep_register_key+0x1c1/0x200 
[   50.809126]  ? kasan_addr_to_slab+0x9/0xa0 
[   50.813226]  kasan_report+0x89/0xc0 
[   50.816720]  ? lockdep_register_key+0x1c1/0x200 
[   50.821254]  lockdep_register_key+0x1c1/0x200 
[   50.825615]  alloc_workqueue+0x455/0xed0 
[   50.829546]  ? do_init_module+0x4b/0x740 
[   50.833472]  ? init_module_from_file+0xd2/0x130 
[   50.838004]  ? idempotent_init_module+0x33a/0x610 
[   50.842712]  ? __pfx_alloc_workqueue+0x10/0x10 
[   50.847159]  ? find_held_lock+0x33/0x120 
[   50.851085]  ? local_clock_noinstr+0x9/0xc0 
[   50.855279]  ? __lock_release+0x486/0x960 
[   50.859293]  ? __pfx_dm_mirror_init+0x10/0x10 [dm_mirror] 
[   50.864698]  dm_mirror_init+0x19/0xff0 [dm_mirror] 
[   50.869492]  do_one_initcall+0x101/0x5b0 
[   50.873428]  ? __pfx_do_one_initcall+0x10/0x10 
[   50.877873]  ? rcu_is_watching+0x11/0xb0 
[   50.881800]  ? trace_kmalloc+0x30/0xd0 
[   50.885561]  ? kmalloc_trace_noprof+0x1a9/0x360 
[   50.890091]  ? trace_module_load+0x14f/0x1c0 
[   50.894366]  ? kasan_unpoison+0x23/0x50 
[   50.898206]  do_init_module+0x233/0x740 
[   50.902047]  init_module_from_file+0xd2/0x130 
[   50.906412]  ? __pfx_init_module_from_file+0x10/0x10 
[   50.911382]  ? idempotent_init_module+0x322/0x610 
[   50.916094]  ? do_raw_spin_unlock+0x55/0x1f0 
[   50.920367]  idempotent_init_module+0x33a/0x610 
[   50.924898]  ? __pfx_idempotent_init_module+0x10/0x10 
[   50.929953]  ? do_syscall_64+0x98/0x180 
[   50.933800]  ? security_capable+0x53/0xa0 
[   50.937821]  __x64_sys_finit_module+0xba/0x130 
[   50.942268]  do_syscall_64+0x8c/0x180 
[   50.945936]  ? vfs_read+0x399/0xc20 
[   50.949434]  ? vfs_read+0x399/0xc20 
[   50.952929]  ? __pfx___x64_sys_openat+0x10/0x10 
[   50.957468]  ? __pfx_vfs_read+0x10/0x10 
[   50.961308]  ? do_syscall_64+0x98/0x180 
[   50.965148]  ? lockdep_hardirqs_on+0x78/0x100 
[   50.969510]  ? __fget_light+0x53/0x1e0 
[   50.973266]  ? lockdep_hardirqs_on_prepare+0x179/0x400 
[   50.978407]  ? ksys_read+0xf1/0x1d0 
[   50.981900]  ? rcu_is_watching+0x11/0xb0 
[   50.985827]  ? lockdep_hardirqs_on_prepare+0x179/0x400 
[   50.990964]  ? do_syscall_64+0x98/0x180 
[   50.994803]  ? lockdep_hardirqs_on+0x78/0x100 
[   50.999163]  ? do_syscall_64+0x98/0x180 
[   51.003002]  ? lockdep_hardirqs_on+0x78/0x100 
[   51.007362]  ? do_syscall_64+0x98/0x180 
[   51.011201]  ? do_syscall_64+0x98/0x180 
[   51.015041]  ? lockdep_hardirqs_on+0x78/0x100 
[   51.019402]  ? do_syscall_64+0x98/0x180 
[   51.023240]  ? do_syscall_64+0x98/0x180 
[   51.027080]  ? clear_bhb_loop+0x45/0xa0 
[   51.030919]  ? clear_bhb_loop+0x45/0xa0 
[   51.034759]  entry_SYSCALL_64_after_hwframe+0x76/0x7e 
[   51.039811] RIP: 0033:0x7fe63f21613d 
[   51.043391] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 2c 0f 00 f7 d8 64 89 01 48 
[   51.062137] RSP: 002b:00007fffee7816f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 
[   51.069702] RAX: ffffffffffffffda RBX: 000055b226781aa0 RCX: 00007fe63f21613d 
[   51.076836] RDX: 0000000000000000 RSI: 000055b2198d5962 RDI: 0000000000000005 
[   51.083968] RBP: 0000000000040000 R08: 0000000000000000 R09: 000055b226782140 
[   51.091101] R10: 0000000000000005 R11: 0000000000000246 R12: 000055b2198d5962 
[   51.098233] R13: 000055b226781b70 R14: 000055b226781aa0 R15: 000055b226782300 
[   51.105371]  </TASK> 
[   51.107560]  
[   51.109058] Allocated by task 1: 
[   51.112291]  kasan_save_stack+0x20/0x40 
[   51.116131]  kasan_save_track+0x10/0x30 
[   51.119969]  __kasan_kmalloc+0x7b/0x90 
[   51.123721]  pci_alloc_dev+0x44/0x270 
[   51.127388]  pci_scan_single_device+0x132/0x280 
[   51.131920]  p2sb_scan_and_cache_devfn+0x15/0x290 
[   51.136627]  p2sb_fs_init+0x10d/0x240 
[   51.140292]  do_one_initcall+0x101/0x5b0 
[   51.144219]  do_initcalls+0x138/0x1d0 
[   51.147884]  kernel_init_freeable+0x8bc/0xbe0 
[   51.152244]  kernel_init+0x1b/0x1f0 
[   51.155736]  ret_from_fork+0x2d/0x70 
[   51.159317]  ret_from_fork_asm+0x1a/0x30 
[   51.163243]  
[   51.164741] Freed by task 1: 
[   51.167629]  kasan_save_stack+0x20/0x40 
[   51.171466]  kasan_save_track+0x10/0x30 
[   51.175307]  kasan_save_free_info+0x37/0x60 
[   51.179491]  __kasan_slab_free+0x109/0x190 
[   51.183593]  kfree+0x126/0x3d0 
[   51.186650]  device_release+0x98/0x210 
[   51.190405]  kobject_cleanup+0x101/0x360 
[   51.194329]  p2sb_fs_init+0x10d/0x240 
[   51.197995]  do_one_initcall+0x101/0x5b0 
[   51.201923]  do_initcalls+0x138/0x1d0 
[   51.205587]  kernel_init_freeable+0x8bc/0xbe0 
[   51.209949]  kernel_init+0x1b/0x1f0 
[   51.213441]  ret_from_fork+0x2d/0x70 
[   51.217018]  ret_from_fork_asm+0x1a/0x30 
[   51.220944]  
[   51.222444] The buggy address belongs to the object at ff1100062ad8e000 
[   51.222444]  which belongs to the cache kmalloc-4k of size 4096 
[   51.234950] The buggy address is located 2568 bytes inside of 
[   51.234950]  freed 4096-byte region [ff1100062ad8e000, ff1100062ad8f000) 
[   51.247372]  
[   51.248868] The buggy address belongs to the physical page: 
[   51.254441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x62ad88 
[   51.262443] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 
[   51.270094] flags: 0x17ffffc0000040(head|node=0|zone=2|lastcpupid=0x1fffff) 
[   51.277054] page_type: 0xffffefff(slab) 
[   51.280896] raw: 0017ffffc0000040 ff1100060003d040 dead000000000122 0000000000000000 
[   51.288634] raw: 0000000000000000 0000000000040004 00000001ffffefff 0000000000000000 
[   51.296374] head: 0017ffffc0000040 ff1100060003d040 dead000000000122 0000000000000000 
[   51.304199] head: 0000000000000000 0000000000040004 00000001ffffefff 0000000000000000 
[   51.312026] head: 0017ffffc0000003 ffd4000018ab6201 ffffffffffffffff 0000000000000000 
[   51.319852] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 
[   51.327675] page dumped because: kasan: bad access detected 
[   51.333250]  
[   51.334749] Memory state around the buggy address: 
[   51.339543]  ff1100062ad8e900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[   51.346763]  ff1100062ad8e980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[   51.353981] >ff1100062ad8ea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[   51.361200]                       ^ 
[   51.364693]  ff1100062ad8ea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[   51.371913]  ff1100062ad8eb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 
[   51.379130] ================================================================== 
[   51.386351] Disabling lock debugging due to kernel taint 
[      
  OK     
] Finished         
dracut pre-udev hook   





[Index of Archives]     [XFS Filesystem Development (older mail)]     [Linux Filesystem Development]     [Linux Audio Users]     [Yosemite Trails]     [Linux Kernel]     [Linux RAID]     [Linux SCSI]


  Powered by Linux