Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   76.640493] ==================================================================
[   76.641589] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8
[   76.642267] Free of addr ffff0000c5a99001 by task kunit_try_catch/160
[   76.642814] 
[   76.643052] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.643744] Hardware name: linux,dummy-virt (DT)
[   76.644213] Call trace:
[   76.644495]  dump_backtrace+0xf8/0x118
[   76.645051]  show_stack+0x18/0x24
[   76.645479]  __dump_stack+0x28/0x38
[   76.645952]  dump_stack_lvl+0x54/0x6c
[   76.646422]  print_address_description+0x7c/0x1ec
[   76.647476]  print_report+0x50/0x68
[   76.647958]  kasan_report_invalid_free+0x9c/0xe8
[   76.648497]  ____kasan_slab_free+0x108/0x140
[   76.649270]  __kasan_slab_free+0x18/0x28
[   76.649767]  kmem_cache_free+0xe0/0x358
[   76.650204]  kmem_cache_invalid_free+0xb0/0x1b8
[   76.650699]  kunit_try_run_case+0x80/0x184
[   76.651177]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.651772]  kthread+0x16c/0x21c
[   76.652196]  ret_from_fork+0x10/0x20
[   76.652605] 
[   76.652813] Allocated by task 160:
[   76.653188]  kasan_set_track+0x4c/0x80
[   76.653684]  kasan_save_alloc_info+0x28/0x34
[   76.654154]  __kasan_slab_alloc+0x58/0x70
[   76.654628]  slab_post_alloc_hook+0x70/0x2f4
[   76.655600]  kmem_cache_alloc+0x168/0x260
[   76.656060]  kmem_cache_invalid_free+0x90/0x1b8
[   76.656558]  kunit_try_run_case+0x80/0x184
[   76.657286]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.657876]  kthread+0x16c/0x21c
[   76.658281]  ret_from_fork+0x10/0x20
[   76.658736] 
[   76.658935] The buggy address belongs to the object at ffff0000c5a99000
[   76.658935]  which belongs to the cache test_cache of size 200
[   76.659902] The buggy address is located 1 bytes inside of
[   76.659902]  200-byte region [ffff0000c5a99000, ffff0000c5a990c8)
[   76.661339] 
[   76.661565] The buggy address belongs to the physical page:
[   76.662035] page:000000003fed45ed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99
[   76.662866] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.663557] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483c80
[   76.664244] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   76.664943] page dumped because: kasan: bad access detected
[   76.665409] 
[   76.665617] Memory state around the buggy address:
[   76.666394]  ffff0000c5a98f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.667063]  ffff0000c5a98f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.667707] >ffff0000c5a99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.668326]                    ^
[   76.668692]  ffff0000c5a99080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   76.669498]  ffff0000c5a99100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.670450] ==================================================================

[   75.743415] ==================================================================
[   75.745480] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8
[   75.746468] Free of addr ffff0000c58a7001 by task kunit_try_catch/160
[   75.747280] 
[   75.747573] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.748777] Hardware name: linux,dummy-virt (DT)
[   75.749474] Call trace:
[   75.749894]  dump_backtrace+0xf4/0x114
[   75.750542]  show_stack+0x18/0x24
[   75.751143]  __dump_stack+0x28/0x38
[   75.751782]  dump_stack_lvl+0x50/0x68
[   75.752260]  print_address_description+0x7c/0x1ec
[   75.752776]  print_report+0x50/0x68
[   75.753221]  kasan_report_invalid_free+0x9c/0xe4
[   75.753836]  ____kasan_slab_free+0x108/0x140
[   75.754409]  __kasan_slab_free+0x18/0x28
[   75.754900]  kmem_cache_free+0xe0/0x34c
[   75.755360]  kmem_cache_invalid_free+0xb0/0x1b8
[   75.755863]  kunit_try_run_case+0x80/0x184
[   75.756324]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.756909]  kthread+0x16c/0x21c
[   75.757366]  ret_from_fork+0x10/0x20
[   75.757815] 
[   75.758013] Allocated by task 160:
[   75.758351]  kasan_set_track+0x4c/0x80
[   75.758811]  kasan_save_alloc_info+0x28/0x34
[   75.759263]  __kasan_slab_alloc+0x58/0x70
[   75.759815]  slab_post_alloc_hook+0x70/0x2e8
[   75.760326]  kmem_cache_alloc+0x164/0x254
[   75.760765]  kmem_cache_invalid_free+0x90/0x1b8
[   75.761258]  kunit_try_run_case+0x80/0x184
[   75.762341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.762958]  kthread+0x16c/0x21c
[   75.763375]  ret_from_fork+0x10/0x20
[   75.763827] 
[   75.764027] The buggy address belongs to the object at ffff0000c58a7000
[   75.764027]  which belongs to the cache test_cache of size 200
[   75.764974] The buggy address is located 1 bytes inside of
[   75.764974]  200-byte region [ffff0000c58a7000, ffff0000c58a70c8)
[   75.765916] 
[   75.766123] The buggy address belongs to the physical page:
[   75.766590] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   75.767306] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.768595] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ec00
[   75.769301] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   75.769951] page dumped because: kasan: bad access detected
[   75.770427] 
[   75.770616] Memory state around the buggy address:
[   75.771105]  ffff0000c58a6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.771727]  ffff0000c58a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.772342] >ffff0000c58a7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.772963]                    ^
[   75.773336]  ffff0000c58a7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   75.774004]  ffff0000c58a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.774570] ==================================================================

[   74.334862] ==================================================================
[   74.335841] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x230
[   74.336562] Free of addr ffff0000c58d3001 by task kunit_try_catch/160
[   74.337101] 
[   74.337333] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.338102] Hardware name: linux,dummy-virt (DT)
[   74.339057] Call trace:
[   74.339353]  dump_backtrace.part.0+0xdc/0xf0
[   74.339864]  show_stack+0x18/0x30
[   74.340286]  dump_stack_lvl+0x64/0x80
[   74.340713]  print_report+0x158/0x438
[   74.341214]  kasan_report_invalid_free+0x9c/0xc0
[   74.341687]  __kasan_slab_free+0x140/0x150
[   74.342144]  kmem_cache_free+0x1b8/0x38c
[   74.342606]  kmem_cache_invalid_free+0xd8/0x230
[   74.343374]  kunit_try_run_case+0x84/0x120
[   74.343847]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.344407]  kthread+0x180/0x190
[   74.344877]  ret_from_fork+0x10/0x20
[   74.345305] 
[   74.345514] Allocated by task 160:
[   74.345837]  kasan_save_stack+0x3c/0x70
[   74.346389]  kasan_set_track+0x2c/0x40
[   74.347177]  kasan_save_alloc_info+0x24/0x34
[   74.347669]  __kasan_slab_alloc+0x8c/0x90
[   74.348086]  kmem_cache_alloc+0x170/0x2c4
[   74.348556]  kmem_cache_invalid_free+0xb4/0x230
[   74.349050]  kunit_try_run_case+0x84/0x120
[   74.349511]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.350342]  kthread+0x180/0x190
[   74.350747]  ret_from_fork+0x10/0x20
[   74.351149] 
[   74.351346] The buggy address belongs to the object at ffff0000c58d3000
[   74.351346]  which belongs to the cache test_cache of size 200
[   74.352257] The buggy address is located 1 bytes inside of
[   74.352257]  200-byte region [ffff0000c58d3000, ffff0000c58d30c8)
[   74.353253] 
[   74.353488] The buggy address belongs to the physical page:
[   74.354515] page:0000000038ae0fdf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   74.355253] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.355936] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398900
[   74.356597] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   74.357203] page dumped because: kasan: bad access detected
[   74.357659] 
[   74.357856] Memory state around the buggy address:
[   74.358574]  ffff0000c58d2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.359173]  ffff0000c58d2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.359795] >ffff0000c58d3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.360425]                    ^
[   74.360755]  ffff0000c58d3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   74.361357]  ffff0000c58d3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.361952] ==================================================================

[   65.800406] ==================================================================
[   65.801237] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xf0/0x250
[   65.801863] Free of addr ffff0000c59ba001 by task kunit_try_catch/158
[   65.802532] 
[   65.802843] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.803537] Hardware name: linux,dummy-virt (DT)
[   65.803905] Call trace:
[   65.804213]  dump_backtrace+0x110/0x120
[   65.804697]  show_stack+0x18/0x28
[   65.805080]  dump_stack_lvl+0x68/0x84
[   65.805678]  print_report+0x158/0x484
[   65.806098]  kasan_report_invalid_free+0x84/0xa0
[   65.806565]  __kasan_slab_free+0x144/0x158
[   65.806988]  kmem_cache_free+0x1b0/0x3a0
[   65.807447]  kmem_cache_invalid_free+0xf0/0x250
[   65.807888]  kunit_try_run_case+0x7c/0x120
[   65.808347]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.808847]  kthread+0x1a4/0x1b8
[   65.809216]  ret_from_fork+0x10/0x20
[   65.809615] 
[   65.809807] Allocated by task 158:
[   65.810105]  kasan_save_stack+0x2c/0x58
[   65.810530]  kasan_set_track+0x2c/0x40
[   65.810924]  kasan_save_alloc_info+0x24/0x38
[   65.811491]  __kasan_slab_alloc+0x74/0x90
[   65.811886]  slab_post_alloc_hook+0x6c/0x260
[   65.812352]  kmem_cache_alloc+0x164/0x270
[   65.812762]  kmem_cache_invalid_free+0xc8/0x250
[   65.813255]  kunit_try_run_case+0x7c/0x120
[   65.813840]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.814384]  kthread+0x1a4/0x1b8
[   65.814764]  ret_from_fork+0x10/0x20
[   65.815144] 
[   65.815352] The buggy address belongs to the object at ffff0000c59ba000
[   65.815352]  which belongs to the cache test_cache of size 200
[   65.816203] The buggy address is located 1 bytes inside of
[   65.816203]  200-byte region [ffff0000c59ba000, ffff0000c59ba0c8)
[   65.817010] 
[   65.817194] The buggy address belongs to the physical page:
[   65.817637] page:00000000e33fe385 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ba
[   65.818505] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.819139] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c15cf980
[   65.819744] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   65.820306] page dumped because: kasan: bad access detected
[   65.820697] 
[   65.820876] Memory state around the buggy address:
[   65.821215]  ffff0000c59b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.821894]  ffff0000c59b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.823063] >ffff0000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.823608]                    ^
[   65.823908]  ffff0000c59ba080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   65.824465]  ffff0000c59ba100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.825011] ==================================================================

[   31.953737] ==================================================================
[   31.954336] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe0/0x1f0
[   31.954757] Free of addr ffff8881034a3001 by task kunit_try_catch/264
[   31.955047] 
[   31.955184] CPU: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.955573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.956328] Call Trace:
[   31.956478]  <TASK>
[   31.956659]  dump_stack_lvl+0x49/0x62
[   31.956945]  print_report+0x189/0x492
[   31.957220]  ? kasan_complete_mode_report_info+0x3c/0x200
[   31.957739]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   31.958275]  kasan_report_invalid_free+0xd8/0x150
[   31.958579]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   31.959005]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   31.959437]  ____kasan_slab_free+0x1c3/0x1d0
[   31.959797]  ? kmem_cache_invalid_free+0xe0/0x1f0
[   31.960088]  __kasan_slab_free+0x12/0x20
[   31.960521]  kmem_cache_free+0x19c/0x4a0
[   31.960878]  kmem_cache_invalid_free+0xe0/0x1f0
[   31.961295]  ? kmem_cache_double_destroy+0x1b0/0x1b0
[   31.961682]  ? __kunit_add_resource+0xd1/0x100
[   31.961974]  kunit_try_run_case+0x8f/0xd0
[   31.962422]  ? kunit_catch_run_case+0x80/0x80
[   31.962794]  ? kunit_try_catch_throw+0x40/0x40
[   31.963158]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.963618]  kthread+0x17b/0x1b0
[   31.964025]  ? kthread_complete_and_exit+0x30/0x30
[   31.964291]  ret_from_fork+0x22/0x30
[   31.964722]  </TASK>
[   31.964984] 
[   31.965158] Allocated by task 264:
[   31.965513]  kasan_save_stack+0x41/0x70
[   31.967250]  kasan_set_track+0x25/0x40
[   31.967649]  kasan_save_alloc_info+0x1e/0x30
[   31.967857]  __kasan_slab_alloc+0x90/0xa0
[   31.968041]  kmem_cache_alloc+0x150/0x370
[   31.968246]  kmem_cache_invalid_free+0xb9/0x1f0
[   31.968438]  kunit_try_run_case+0x8f/0xd0
[   31.968617]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.968841]  kthread+0x17b/0x1b0
[   31.969001]  ret_from_fork+0x22/0x30
[   31.970203] 
[   31.970761] The buggy address belongs to the object at ffff8881034a3000
[   31.970761]  which belongs to the cache test_cache of size 200
[   31.972532] The buggy address is located 1 bytes inside of
[   31.972532]  200-byte region [ffff8881034a3000, ffff8881034a30c8)
[   31.974532] 
[   31.974659] The buggy address belongs to the physical page:
[   31.975032] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1034a3
[   31.975676] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.976335] raw: 0200000000000200 0000000000000000 dead000000000122 ffff88810316c780
[   31.976705] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   31.977234] page dumped because: kasan: bad access detected
[   31.977754] 
[   31.977979] Memory state around the buggy address:
[   31.978375]  ffff8881034a2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.978820]  ffff8881034a2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.979282] >ffff8881034a3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.979725]                    ^
[   31.979942]  ffff8881034a3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.980371]  ffff8881034a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.980739] ==================================================================