Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   34.095877] ==================================================================
[   34.100244] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   34.107184] Free of addr ffff000801e2e001 by task kunit_try_catch/255
[   34.113605] 
[   34.115093] CPU: 5 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   34.115152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.115170] Hardware name: WinLink E850-96 board (DT)
[   34.115192] Call trace:
[   34.115208]  show_stack+0x20/0x38 (C)
[   34.115247]  dump_stack_lvl+0x8c/0xd0
[   34.115287]  print_report+0x118/0x608
[   34.115322]  kasan_report_invalid_free+0xc0/0xe8
[   34.115358]  check_slab_allocation+0xfc/0x108
[   34.115394]  __kasan_slab_pre_free+0x2c/0x48
[   34.115425]  kmem_cache_free+0xf0/0x470
[   34.115460]  kmem_cache_invalid_free+0x184/0x3c8
[   34.115493]  kunit_try_run_case+0x170/0x3f0
[   34.115528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.115568]  kthread+0x328/0x630
[   34.115600]  ret_from_fork+0x10/0x20
[   34.115638] 
[   34.187910] Allocated by task 255:
[   34.191298]  kasan_save_stack+0x3c/0x68
[   34.195115]  kasan_save_track+0x20/0x40
[   34.198934]  kasan_save_alloc_info+0x40/0x58
[   34.203187]  __kasan_slab_alloc+0xa8/0xb0
[   34.207180]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   34.211781]  kmem_cache_invalid_free+0x12c/0x3c8
[   34.216382]  kunit_try_run_case+0x170/0x3f0
[   34.220548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.226018]  kthread+0x328/0x630
[   34.229229]  ret_from_fork+0x10/0x20
[   34.232788] 
[   34.234265] The buggy address belongs to the object at ffff000801e2e000
[   34.234265]  which belongs to the cache test_cache of size 200
[   34.246678] The buggy address is located 1 bytes inside of
[   34.246678]  200-byte region [ffff000801e2e000, ffff000801e2e0c8)
[   34.258221] 
[   34.259700] The buggy address belongs to the physical page:
[   34.265257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2e
[   34.273242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.280880] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.287823] page_type: f5(slab)
[   34.290961] raw: 0bfffe0000000040 ffff000801e2c000 dead000000000122 0000000000000000
[   34.298679] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.306407] head: 0bfffe0000000040 ffff000801e2c000 dead000000000122 0000000000000000
[   34.314217] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.322030] head: 0bfffe0000000001 fffffdffe0078b81 00000000ffffffff 00000000ffffffff
[   34.329841] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.337647] page dumped because: kasan: bad access detected
[   34.343204] 
[   34.344678] Memory state around the buggy address:
[   34.349460]  ffff000801e2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.356661]  ffff000801e2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.363868] >ffff000801e2e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.371067]                    ^
[   34.374282]  ffff000801e2e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.381487]  ffff000801e2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.388689] ==================================================================

[   26.103392] ==================================================================
[   26.103664] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   26.103946] Free of addr fff00000c77f8001 by task kunit_try_catch/212
[   26.104100] 
[   26.104381] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   26.104593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.104660] Hardware name: linux,dummy-virt (DT)
[   26.104756] Call trace:
[   26.104814]  show_stack+0x20/0x38 (C)
[   26.105319]  dump_stack_lvl+0x8c/0xd0
[   26.105475]  print_report+0x118/0x608
[   26.105611]  kasan_report_invalid_free+0xc0/0xe8
[   26.105766]  check_slab_allocation+0xfc/0x108
[   26.105899]  __kasan_slab_pre_free+0x2c/0x48
[   26.106123]  kmem_cache_free+0xf0/0x470
[   26.106386]  kmem_cache_invalid_free+0x184/0x3c8
[   26.106697]  kunit_try_run_case+0x170/0x3f0
[   26.106972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.107189]  kthread+0x328/0x630
[   26.107523]  ret_from_fork+0x10/0x20
[   26.107785] 
[   26.107841] Allocated by task 212:
[   26.108011]  kasan_save_stack+0x3c/0x68
[   26.108118]  kasan_save_track+0x20/0x40
[   26.108211]  kasan_save_alloc_info+0x40/0x58
[   26.108313]  __kasan_slab_alloc+0xa8/0xb0
[   26.108581]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   26.108747]  kmem_cache_invalid_free+0x12c/0x3c8
[   26.108982]  kunit_try_run_case+0x170/0x3f0
[   26.109084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.109260]  kthread+0x328/0x630
[   26.109353]  ret_from_fork+0x10/0x20
[   26.109626] 
[   26.109732] The buggy address belongs to the object at fff00000c77f8000
[   26.109732]  which belongs to the cache test_cache of size 200
[   26.109874] The buggy address is located 1 bytes inside of
[   26.109874]  200-byte region [fff00000c77f8000, fff00000c77f80c8)
[   26.110063] 
[   26.110126] The buggy address belongs to the physical page:
[   26.110211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077f8
[   26.110347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.110697] page_type: f5(slab)
[   26.110805] raw: 0bfffe0000000000 fff00000c5bfeb40 dead000000000122 0000000000000000
[   26.110935] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.111078] page dumped because: kasan: bad access detected
[   26.111164] 
[   26.111210] Memory state around the buggy address:
[   26.111298]  fff00000c77f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111449]  fff00000c77f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111561] >fff00000c77f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.111646]                    ^
[   26.111739]  fff00000c77f8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   26.111930]  fff00000c77f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.112118] ==================================================================

[   19.518090] ==================================================================
[   19.518931] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   19.519941] Free of addr ffff8881022d9001 by task kunit_try_catch/228
[   19.520671] 
[   19.520968] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   19.521115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.521152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.521333] Call Trace:
[   19.521377]  <TASK>
[   19.521426]  dump_stack_lvl+0x73/0xb0
[   19.521513]  print_report+0xd1/0x650
[   19.521592]  ? __virt_addr_valid+0x1db/0x2d0
[   19.521673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.521749]  ? kmem_cache_invalid_free+0x1d8/0x460
[   19.521824]  kasan_report_invalid_free+0x10a/0x130
[   19.521911]  ? kmem_cache_invalid_free+0x1d8/0x460
[   19.522001]  ? kmem_cache_invalid_free+0x1d8/0x460
[   19.522075]  check_slab_allocation+0x11f/0x130
[   19.522135]  __kasan_slab_pre_free+0x28/0x40
[   19.522324]  kmem_cache_free+0xed/0x420
[   19.522389]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   19.522448]  ? kmem_cache_invalid_free+0x1d8/0x460
[   19.522522]  kmem_cache_invalid_free+0x1d8/0x460
[   19.522596]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   19.522668]  ? finish_task_switch.isra.0+0x153/0x700
[   19.522744]  ? __switch_to+0x47/0xf50
[   19.522831]  ? __pfx_read_tsc+0x10/0x10
[   19.522900]  ? ktime_get_ts64+0x86/0x230
[   19.523024]  kunit_try_run_case+0x1a5/0x480
[   19.523106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.523171]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.523252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.523334]  ? __kthread_parkme+0x82/0x180
[   19.523394]  ? preempt_count_sub+0x50/0x80
[   19.523427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.523457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.523493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.523527]  kthread+0x337/0x6f0
[   19.523553]  ? trace_preempt_on+0x20/0xc0
[   19.523587]  ? __pfx_kthread+0x10/0x10
[   19.523615]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.523647]  ? calculate_sigpending+0x7b/0xa0
[   19.523680]  ? __pfx_kthread+0x10/0x10
[   19.523718]  ret_from_fork+0x116/0x1d0
[   19.523779]  ? __pfx_kthread+0x10/0x10
[   19.523810]  ret_from_fork_asm+0x1a/0x30
[   19.523854]  </TASK>
[   19.523869] 
[   19.548245] Allocated by task 228:
[   19.549101]  kasan_save_stack+0x45/0x70
[   19.549953]  kasan_save_track+0x18/0x40
[   19.550533]  kasan_save_alloc_info+0x3b/0x50
[   19.551326]  __kasan_slab_alloc+0x91/0xa0
[   19.551692]  kmem_cache_alloc_noprof+0x123/0x3f0
[   19.552183]  kmem_cache_invalid_free+0x157/0x460
[   19.552561]  kunit_try_run_case+0x1a5/0x480
[   19.553434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.553799]  kthread+0x337/0x6f0
[   19.554653]  ret_from_fork+0x116/0x1d0
[   19.555081]  ret_from_fork_asm+0x1a/0x30
[   19.555851] 
[   19.556105] The buggy address belongs to the object at ffff8881022d9000
[   19.556105]  which belongs to the cache test_cache of size 200
[   19.557298] The buggy address is located 1 bytes inside of
[   19.557298]  200-byte region [ffff8881022d9000, ffff8881022d90c8)
[   19.558780] 
[   19.559048] The buggy address belongs to the physical page:
[   19.560016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022d9
[   19.560798] flags: 0x200000000000000(node=0|zone=2)
[   19.561239] page_type: f5(slab)
[   19.561604] raw: 0200000000000000 ffff8881022d3280 dead000000000122 0000000000000000
[   19.562810] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.563758] page dumped because: kasan: bad access detected
[   19.564522] 
[   19.565101] Memory state around the buggy address:
[   19.565832]  ffff8881022d8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566639]  ffff8881022d8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.567495] >ffff8881022d9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.568598]                    ^
[   19.569004]  ffff8881022d9080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.569786]  ffff8881022d9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.570543] ==================================================================

[   60.631805] ==================================================================
[   60.643371] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x200/0x4c0
[   60.650421] Free of addr cc85e001 by task kunit_try_catch/263
[   60.656188] 
[   60.657714] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   60.657745] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.657745] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.657745] Call trace: 
[   60.657775]  unwind_backtrace from show_stack+0x18/0x1c
[   60.657806]  show_stack from dump_stack_lvl+0x70/0x90
[   60.657806]  dump_stack_lvl from print_report+0x158/0x528
[   60.657836]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   60.657867]  kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8
[   60.657897]  check_slab_allocation from kmem_cache_free+0x1c0/0x470
[   60.657928]  kmem_cache_free from kmem_cache_invalid_free+0x200/0x4c0
[   60.657928]  kmem_cache_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   60.657958]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.657989]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.658020]  kthread from ret_from_fork+0x14/0x20
[   60.658050] Exception stack(0xf2393fb0 to 0xf2393ff8)
[   60.658050] 3fa0:                                     00000000 00000000 00000000 00000000
[   60.658081] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.658081] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.658111] 
[   60.779479] Allocated by task 263:
[   60.782928]  kasan_save_track+0x30/0x5c
[   60.786804]  __kasan_slab_alloc+0x60/0x68
[   60.790832]  kmem_cache_alloc_noprof+0x17c/0x36c
[   60.795471]  kmem_cache_invalid_free+0x16c/0x4c0
[   60.800140]  kunit_try_run_case+0x22c/0x5a8
[   60.804351]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.809875]  kthread+0x464/0x810
[   60.813140]  ret_from_fork+0x14/0x20
[   60.816741] 
[   60.818237] The buggy address belongs to the object at cc85e000
[   60.818237]  which belongs to the cache test_cache of size 200
[   60.830078] The buggy address is located 1 bytes inside of
[   60.830078]  200-byte region [cc85e000, cc85e0c8)
[   60.840301] 
[   60.841796] The buggy address belongs to the physical page:
[   60.847412] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85e
[   60.854705] flags: 0x0(zone=0)
[   60.857757] page_type: f5(slab)
[   60.860931] raw: 00000000 cc85a200 00000122 00000000 00000000 800f000f f5000000 00000000
[   60.869079] raw: 00000000
[   60.871734] page dumped because: kasan: bad access detected
[   60.877319] 
[   60.878845] Memory state around the buggy address:
[   60.883666]  cc85df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.890228]  cc85df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.896789] >cc85e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.903381]            ^
[   60.905914]  cc85e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   60.912506]  cc85e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.919067] ==================================================================