Date
June 20, 2025, 12:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.256340] ================================================================== [ 33.256659] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 33.256915] Free of addr fff00000c59f8001 by task kunit_try_catch/222 [ 33.257115] [ 33.257447] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 33.257811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.257949] Hardware name: linux,dummy-virt (DT) [ 33.258069] Call trace: [ 33.258254] show_stack+0x20/0x38 (C) [ 33.258877] dump_stack_lvl+0x8c/0xd0 [ 33.259355] print_report+0x118/0x608 [ 33.259618] kasan_report_invalid_free+0xc0/0xe8 [ 33.259897] check_slab_allocation+0xfc/0x108 [ 33.260047] __kasan_slab_pre_free+0x2c/0x48 [ 33.260168] kmem_cache_free+0xf0/0x468 [ 33.260671] kmem_cache_invalid_free+0x184/0x3c8 [ 33.260943] kunit_try_run_case+0x170/0x3f0 [ 33.261201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.261548] kthread+0x328/0x630 [ 33.261667] ret_from_fork+0x10/0x20 [ 33.261859] [ 33.262023] Allocated by task 222: [ 33.262123] kasan_save_stack+0x3c/0x68 [ 33.262365] kasan_save_track+0x20/0x40 [ 33.262638] kasan_save_alloc_info+0x40/0x58 [ 33.263005] __kasan_slab_alloc+0xa8/0xb0 [ 33.263178] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.263508] kmem_cache_invalid_free+0x12c/0x3c8 [ 33.263831] kunit_try_run_case+0x170/0x3f0 [ 33.264034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.264299] kthread+0x328/0x630 [ 33.264450] ret_from_fork+0x10/0x20 [ 33.264542] [ 33.264593] The buggy address belongs to the object at fff00000c59f8000 [ 33.264593] which belongs to the cache test_cache of size 200 [ 33.264775] The buggy address is located 1 bytes inside of [ 33.264775] 200-byte region [fff00000c59f8000, fff00000c59f80c8) [ 33.264935] [ 33.264989] The buggy address belongs to the physical page: [ 33.265167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f8 [ 33.265546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.265779] page_type: f5(slab) [ 33.265949] raw: 0bfffe0000000000 fff00000c59f3140 dead000000000122 0000000000000000 [ 33.266241] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.266640] page dumped because: kasan: bad access detected [ 33.266852] [ 33.266951] Memory state around the buggy address: [ 33.267180] fff00000c59f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.267453] fff00000c59f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.267571] >fff00000c59f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.267701] ^ [ 33.267780] fff00000c59f8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.267897] fff00000c59f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.268571] ==================================================================
[ 26.453848] ================================================================== [ 26.454424] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 26.454750] Free of addr ffff888102ab3001 by task kunit_try_catch/240 [ 26.455067] [ 26.455279] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.455412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.455482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.455529] Call Trace: [ 26.455569] <TASK> [ 26.455605] dump_stack_lvl+0x73/0xb0 [ 26.455663] print_report+0xd1/0x650 [ 26.455705] ? __virt_addr_valid+0x1db/0x2d0 [ 26.455749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.455801] ? kmem_cache_invalid_free+0x1d8/0x460 [ 26.455853] kasan_report_invalid_free+0x10a/0x130 [ 26.455906] ? kmem_cache_invalid_free+0x1d8/0x460 [ 26.455961] ? kmem_cache_invalid_free+0x1d8/0x460 [ 26.456012] check_slab_allocation+0x11f/0x130 [ 26.456060] __kasan_slab_pre_free+0x28/0x40 [ 26.456106] kmem_cache_free+0xed/0x420 [ 26.456148] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 26.456191] ? kmem_cache_invalid_free+0x1d8/0x460 [ 26.456235] kmem_cache_invalid_free+0x1d8/0x460 [ 26.456274] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 26.456313] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 26.456368] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 26.456419] kunit_try_run_case+0x1a5/0x480 [ 26.456479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.456523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.456567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.456606] ? __kthread_parkme+0x82/0x180 [ 26.456643] ? preempt_count_sub+0x50/0x80 [ 26.456682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.456736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.456800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.456850] kthread+0x337/0x6f0 [ 26.456894] ? trace_preempt_on+0x20/0xc0 [ 26.456945] ? __pfx_kthread+0x10/0x10 [ 26.456974] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.456997] ? calculate_sigpending+0x7b/0xa0 [ 26.457023] ? __pfx_kthread+0x10/0x10 [ 26.457045] ret_from_fork+0x116/0x1d0 [ 26.457066] ? __pfx_kthread+0x10/0x10 [ 26.457088] ret_from_fork_asm+0x1a/0x30 [ 26.457121] </TASK> [ 26.457135] [ 26.468363] Allocated by task 240: [ 26.468741] kasan_save_stack+0x45/0x70 [ 26.468970] kasan_save_track+0x18/0x40 [ 26.469362] kasan_save_alloc_info+0x3b/0x50 [ 26.469568] __kasan_slab_alloc+0x91/0xa0 [ 26.469802] kmem_cache_alloc_noprof+0x123/0x3f0 [ 26.470211] kmem_cache_invalid_free+0x157/0x460 [ 26.470563] kunit_try_run_case+0x1a5/0x480 [ 26.470751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.470957] kthread+0x337/0x6f0 [ 26.471113] ret_from_fork+0x116/0x1d0 [ 26.471277] ret_from_fork_asm+0x1a/0x30 [ 26.471466] [ 26.471636] The buggy address belongs to the object at ffff888102ab3000 [ 26.471636] which belongs to the cache test_cache of size 200 [ 26.473078] The buggy address is located 1 bytes inside of [ 26.473078] 200-byte region [ffff888102ab3000, ffff888102ab30c8) [ 26.473954] [ 26.474141] The buggy address belongs to the physical page: [ 26.476116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ab3 [ 26.476418] flags: 0x200000000000000(node=0|zone=2) [ 26.476837] page_type: f5(slab) [ 26.477112] raw: 0200000000000000 ffff888101a68500 dead000000000122 0000000000000000 [ 26.477627] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.478031] page dumped because: kasan: bad access detected [ 26.478785] [ 26.478967] Memory state around the buggy address: [ 26.479380] ffff888102ab2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.480016] ffff888102ab2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.480654] >ffff888102ab3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.480906] ^ [ 26.481154] ffff888102ab3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 26.481898] ffff888102ab3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.482593] ==================================================================