Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.372266] ================================================================== [ 17.372339] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.372407] Free of addr fff00000c787b001 by task kunit_try_catch/211 [ 17.372464] [ 17.372651] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 17.372913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.372943] Hardware name: linux,dummy-virt (DT) [ 17.372978] Call trace: [ 17.373002] show_stack+0x20/0x38 (C) [ 17.373053] dump_stack_lvl+0x8c/0xd0 [ 17.373191] print_report+0x118/0x5d0 [ 17.373251] kasan_report_invalid_free+0xc0/0xe8 [ 17.373302] check_slab_allocation+0xfc/0x108 [ 17.373377] __kasan_slab_pre_free+0x2c/0x48 [ 17.373426] kmem_cache_free+0xf0/0x468 [ 17.373473] kmem_cache_invalid_free+0x184/0x3c8 [ 17.373521] kunit_try_run_case+0x170/0x3f0 [ 17.373572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.373625] kthread+0x328/0x630 [ 17.373668] ret_from_fork+0x10/0x20 [ 17.373717] [ 17.373844] Allocated by task 211: [ 17.374080] kasan_save_stack+0x3c/0x68 [ 17.374226] kasan_save_track+0x20/0x40 [ 17.374478] kasan_save_alloc_info+0x40/0x58 [ 17.374657] __kasan_slab_alloc+0xa8/0xb0 [ 17.374764] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.375225] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.375314] kunit_try_run_case+0x170/0x3f0 [ 17.375382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.375514] kthread+0x328/0x630 [ 17.375616] ret_from_fork+0x10/0x20 [ 17.375652] [ 17.375812] The buggy address belongs to the object at fff00000c787b000 [ 17.375812] which belongs to the cache test_cache of size 200 [ 17.376196] The buggy address is located 1 bytes inside of [ 17.376196] 200-byte region [fff00000c787b000, fff00000c787b0c8) [ 17.376265] [ 17.376288] The buggy address belongs to the physical page: [ 17.376674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787b [ 17.376908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.376965] page_type: f5(slab) [ 17.377017] raw: 0bfffe0000000000 fff00000c5905c80 dead000000000122 0000000000000000 [ 17.377071] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.377173] page dumped because: kasan: bad access detected [ 17.377499] [ 17.377573] Memory state around the buggy address: [ 17.377611] fff00000c787af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.377693] fff00000c787af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.377738] >fff00000c787b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.377777] ^ [ 17.378291] fff00000c787b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.378344] fff00000c787b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.378406] ==================================================================
[ 17.281923] ================================================================== [ 17.281988] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.282422] Free of addr fff00000c666c001 by task kunit_try_catch/211 [ 17.282538] [ 17.282663] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 17.282794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.282858] Hardware name: linux,dummy-virt (DT) [ 17.282947] Call trace: [ 17.283005] show_stack+0x20/0x38 (C) [ 17.283103] dump_stack_lvl+0x8c/0xd0 [ 17.283213] print_report+0x118/0x5d0 [ 17.283262] kasan_report_invalid_free+0xc0/0xe8 [ 17.283359] check_slab_allocation+0xfc/0x108 [ 17.283661] __kasan_slab_pre_free+0x2c/0x48 [ 17.283755] kmem_cache_free+0xf0/0x468 [ 17.283817] kmem_cache_invalid_free+0x184/0x3c8 [ 17.283868] kunit_try_run_case+0x170/0x3f0 [ 17.283918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.283972] kthread+0x328/0x630 [ 17.284085] ret_from_fork+0x10/0x20 [ 17.284196] [ 17.284241] Allocated by task 211: [ 17.284520] kasan_save_stack+0x3c/0x68 [ 17.284890] kasan_save_track+0x20/0x40 [ 17.285380] kasan_save_alloc_info+0x40/0x58 [ 17.285593] __kasan_slab_alloc+0xa8/0xb0 [ 17.285675] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.285827] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.285900] kunit_try_run_case+0x170/0x3f0 [ 17.286071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.286177] kthread+0x328/0x630 [ 17.286320] ret_from_fork+0x10/0x20 [ 17.286585] [ 17.286661] The buggy address belongs to the object at fff00000c666c000 [ 17.286661] which belongs to the cache test_cache of size 200 [ 17.286799] The buggy address is located 1 bytes inside of [ 17.286799] 200-byte region [fff00000c666c000, fff00000c666c0c8) [ 17.286945] [ 17.287028] The buggy address belongs to the physical page: [ 17.287162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10666c [ 17.287226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.287505] page_type: f5(slab) [ 17.287690] raw: 0bfffe0000000000 fff00000c6670000 dead000000000122 0000000000000000 [ 17.287781] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.287843] page dumped because: kasan: bad access detected [ 17.287876] [ 17.287896] Memory state around the buggy address: [ 17.287929] fff00000c666bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.287983] fff00000c666bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.288036] >fff00000c666c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.288083] ^ [ 17.288110] fff00000c666c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.288158] fff00000c666c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.288216] ==================================================================
[ 13.392751] ================================================================== [ 13.393241] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 13.394200] Free of addr ffff888103949001 by task kunit_try_catch/229 [ 13.394501] [ 13.394741] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 13.394790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.394803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.394824] Call Trace: [ 13.394838] <TASK> [ 13.394856] dump_stack_lvl+0x73/0xb0 [ 13.394888] print_report+0xd1/0x610 [ 13.394910] ? __virt_addr_valid+0x1db/0x2d0 [ 13.394934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.394956] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.394981] kasan_report_invalid_free+0x10a/0x130 [ 13.395005] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.395040] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.395064] check_slab_allocation+0x11f/0x130 [ 13.395085] __kasan_slab_pre_free+0x28/0x40 [ 13.395105] kmem_cache_free+0xed/0x420 [ 13.395124] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.395144] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.395172] kmem_cache_invalid_free+0x1d8/0x460 [ 13.395196] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 13.395219] ? finish_task_switch.isra.0+0x153/0x700 [ 13.395241] ? __switch_to+0x47/0xf50 [ 13.395270] ? __pfx_read_tsc+0x10/0x10 [ 13.395291] ? ktime_get_ts64+0x86/0x230 [ 13.395316] kunit_try_run_case+0x1a5/0x480 [ 13.395340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.395362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.395385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.395419] ? __kthread_parkme+0x82/0x180 [ 13.395439] ? preempt_count_sub+0x50/0x80 [ 13.395462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.395486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.395509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.395531] kthread+0x337/0x6f0 [ 13.395551] ? trace_preempt_on+0x20/0xc0 [ 13.395575] ? __pfx_kthread+0x10/0x10 [ 13.395596] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.395617] ? calculate_sigpending+0x7b/0xa0 [ 13.395641] ? __pfx_kthread+0x10/0x10 [ 13.395662] ret_from_fork+0x116/0x1d0 [ 13.395680] ? __pfx_kthread+0x10/0x10 [ 13.395701] ret_from_fork_asm+0x1a/0x30 [ 13.395733] </TASK> [ 13.395743] [ 13.409910] Allocated by task 229: [ 13.410357] kasan_save_stack+0x45/0x70 [ 13.410748] kasan_save_track+0x18/0x40 [ 13.410892] kasan_save_alloc_info+0x3b/0x50 [ 13.411205] __kasan_slab_alloc+0x91/0xa0 [ 13.411687] kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.412257] kmem_cache_invalid_free+0x157/0x460 [ 13.412714] kunit_try_run_case+0x1a5/0x480 [ 13.413101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.413544] kthread+0x337/0x6f0 [ 13.413906] ret_from_fork+0x116/0x1d0 [ 13.414286] ret_from_fork_asm+0x1a/0x30 [ 13.414449] [ 13.414525] The buggy address belongs to the object at ffff888103949000 [ 13.414525] which belongs to the cache test_cache of size 200 [ 13.414896] The buggy address is located 1 bytes inside of [ 13.414896] 200-byte region [ffff888103949000, ffff8881039490c8) [ 13.415235] [ 13.415310] The buggy address belongs to the physical page: [ 13.415752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103949 [ 13.416567] flags: 0x200000000000000(node=0|zone=2) [ 13.417139] page_type: f5(slab) [ 13.417496] raw: 0200000000000000 ffff888101a54c80 dead000000000122 0000000000000000 [ 13.418257] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 13.418969] page dumped because: kasan: bad access detected [ 13.419572] [ 13.419797] Memory state around the buggy address: [ 13.420332] ffff888103948f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 13.420924] ffff888103948f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.421529] >ffff888103949000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.421944] ^ [ 13.422287] ffff888103949080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 13.422967] ffff888103949100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.423298] ==================================================================
[ 13.492293] ================================================================== [ 13.493131] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 13.494440] Free of addr ffff8881027b6001 by task kunit_try_catch/228 [ 13.494875] [ 13.495124] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 13.495188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.495200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.495222] Call Trace: [ 13.495235] <TASK> [ 13.495253] dump_stack_lvl+0x73/0xb0 [ 13.495284] print_report+0xd1/0x610 [ 13.495306] ? __virt_addr_valid+0x1db/0x2d0 [ 13.495330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.495351] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.495375] kasan_report_invalid_free+0x10a/0x130 [ 13.495398] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.495423] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.495447] check_slab_allocation+0x11f/0x130 [ 13.495468] __kasan_slab_pre_free+0x28/0x40 [ 13.495488] kmem_cache_free+0xed/0x420 [ 13.495507] ? kasan_save_track+0x18/0x40 [ 13.495525] ? kasan_save_stack+0x45/0x70 [ 13.495543] ? kmem_cache_invalid_free+0x1d8/0x460 [ 13.495566] ? kmem_cache_invalid_free+0x157/0x460 [ 13.495590] kmem_cache_invalid_free+0x1d8/0x460 [ 13.495613] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 13.495636] ? finish_task_switch.isra.0+0x153/0x700 [ 13.495658] ? __switch_to+0x47/0xf50 [ 13.495686] ? __pfx_read_tsc+0x10/0x10 [ 13.495707] ? ktime_get_ts64+0x86/0x230 [ 13.495731] kunit_try_run_case+0x1a5/0x480 [ 13.495756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.495777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.495800] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.495822] ? __kthread_parkme+0x82/0x180 [ 13.495843] ? preempt_count_sub+0x50/0x80 [ 13.495865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.495918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.495941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.495964] kthread+0x337/0x6f0 [ 13.495984] ? trace_preempt_on+0x20/0xc0 [ 13.496007] ? __pfx_kthread+0x10/0x10 [ 13.496027] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.496047] ? calculate_sigpending+0x7b/0xa0 [ 13.496071] ? __pfx_kthread+0x10/0x10 [ 13.496091] ret_from_fork+0x116/0x1d0 [ 13.496109] ? __pfx_kthread+0x10/0x10 [ 13.496129] ret_from_fork_asm+0x1a/0x30 [ 13.496167] </TASK> [ 13.496177] [ 13.510566] Allocated by task 228: [ 13.510699] kasan_save_stack+0x45/0x70 [ 13.510846] kasan_save_track+0x18/0x40 [ 13.511262] kasan_save_alloc_info+0x3b/0x50 [ 13.511680] __kasan_slab_alloc+0x91/0xa0 [ 13.512126] kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.512622] kmem_cache_invalid_free+0x157/0x460 [ 13.513163] kunit_try_run_case+0x1a5/0x480 [ 13.513570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.514081] kthread+0x337/0x6f0 [ 13.514218] ret_from_fork+0x116/0x1d0 [ 13.514410] ret_from_fork_asm+0x1a/0x30 [ 13.514761] [ 13.514918] The buggy address belongs to the object at ffff8881027b6000 [ 13.514918] which belongs to the cache test_cache of size 200 [ 13.516109] The buggy address is located 1 bytes inside of [ 13.516109] 200-byte region [ffff8881027b6000, ffff8881027b60c8) [ 13.516560] [ 13.516638] The buggy address belongs to the physical page: [ 13.516816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6 [ 13.517540] flags: 0x200000000000000(node=0|zone=2) [ 13.518074] page_type: f5(slab) [ 13.518498] raw: 0200000000000000 ffff888101d4bdc0 dead000000000122 0000000000000000 [ 13.519204] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 13.520014] page dumped because: kasan: bad access detected [ 13.520415] [ 13.520493] Memory state around the buggy address: [ 13.520660] ffff8881027b5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.520971] ffff8881027b5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.521708] >ffff8881027b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.522444] ^ [ 13.522744] ffff8881027b6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 13.523495] ffff8881027b6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.524257] ==================================================================