Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 76.640493] ================================================================== [ 76.641589] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8 [ 76.642267] Free of addr ffff0000c5a99001 by task kunit_try_catch/160 [ 76.642814] [ 76.643052] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.643744] Hardware name: linux,dummy-virt (DT) [ 76.644213] Call trace: [ 76.644495] dump_backtrace+0xf8/0x118 [ 76.645051] show_stack+0x18/0x24 [ 76.645479] __dump_stack+0x28/0x38 [ 76.645952] dump_stack_lvl+0x54/0x6c [ 76.646422] print_address_description+0x7c/0x1ec [ 76.647476] print_report+0x50/0x68 [ 76.647958] kasan_report_invalid_free+0x9c/0xe8 [ 76.648497] ____kasan_slab_free+0x108/0x140 [ 76.649270] __kasan_slab_free+0x18/0x28 [ 76.649767] kmem_cache_free+0xe0/0x358 [ 76.650204] kmem_cache_invalid_free+0xb0/0x1b8 [ 76.650699] kunit_try_run_case+0x80/0x184 [ 76.651177] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.651772] kthread+0x16c/0x21c [ 76.652196] ret_from_fork+0x10/0x20 [ 76.652605] [ 76.652813] Allocated by task 160: [ 76.653188] kasan_set_track+0x4c/0x80 [ 76.653684] kasan_save_alloc_info+0x28/0x34 [ 76.654154] __kasan_slab_alloc+0x58/0x70 [ 76.654628] slab_post_alloc_hook+0x70/0x2f4 [ 76.655600] kmem_cache_alloc+0x168/0x260 [ 76.656060] kmem_cache_invalid_free+0x90/0x1b8 [ 76.656558] kunit_try_run_case+0x80/0x184 [ 76.657286] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.657876] kthread+0x16c/0x21c [ 76.658281] ret_from_fork+0x10/0x20 [ 76.658736] [ 76.658935] The buggy address belongs to the object at ffff0000c5a99000 [ 76.658935] which belongs to the cache test_cache of size 200 [ 76.659902] The buggy address is located 1 bytes inside of [ 76.659902] 200-byte region [ffff0000c5a99000, ffff0000c5a990c8) [ 76.661339] [ 76.661565] The buggy address belongs to the physical page: [ 76.662035] page:000000003fed45ed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99 [ 76.662866] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.663557] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483c80 [ 76.664244] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 76.664943] page dumped because: kasan: bad access detected [ 76.665409] [ 76.665617] Memory state around the buggy address: [ 76.666394] ffff0000c5a98f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.667063] ffff0000c5a98f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.667707] >ffff0000c5a99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.668326] ^ [ 76.668692] ffff0000c5a99080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 76.669498] ffff0000c5a99100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.670450] ==================================================================
[ 75.743415] ================================================================== [ 75.745480] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8 [ 75.746468] Free of addr ffff0000c58a7001 by task kunit_try_catch/160 [ 75.747280] [ 75.747573] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.748777] Hardware name: linux,dummy-virt (DT) [ 75.749474] Call trace: [ 75.749894] dump_backtrace+0xf4/0x114 [ 75.750542] show_stack+0x18/0x24 [ 75.751143] __dump_stack+0x28/0x38 [ 75.751782] dump_stack_lvl+0x50/0x68 [ 75.752260] print_address_description+0x7c/0x1ec [ 75.752776] print_report+0x50/0x68 [ 75.753221] kasan_report_invalid_free+0x9c/0xe4 [ 75.753836] ____kasan_slab_free+0x108/0x140 [ 75.754409] __kasan_slab_free+0x18/0x28 [ 75.754900] kmem_cache_free+0xe0/0x34c [ 75.755360] kmem_cache_invalid_free+0xb0/0x1b8 [ 75.755863] kunit_try_run_case+0x80/0x184 [ 75.756324] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.756909] kthread+0x16c/0x21c [ 75.757366] ret_from_fork+0x10/0x20 [ 75.757815] [ 75.758013] Allocated by task 160: [ 75.758351] kasan_set_track+0x4c/0x80 [ 75.758811] kasan_save_alloc_info+0x28/0x34 [ 75.759263] __kasan_slab_alloc+0x58/0x70 [ 75.759815] slab_post_alloc_hook+0x70/0x2e8 [ 75.760326] kmem_cache_alloc+0x164/0x254 [ 75.760765] kmem_cache_invalid_free+0x90/0x1b8 [ 75.761258] kunit_try_run_case+0x80/0x184 [ 75.762341] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.762958] kthread+0x16c/0x21c [ 75.763375] ret_from_fork+0x10/0x20 [ 75.763827] [ 75.764027] The buggy address belongs to the object at ffff0000c58a7000 [ 75.764027] which belongs to the cache test_cache of size 200 [ 75.764974] The buggy address is located 1 bytes inside of [ 75.764974] 200-byte region [ffff0000c58a7000, ffff0000c58a70c8) [ 75.765916] [ 75.766123] The buggy address belongs to the physical page: [ 75.766590] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 75.767306] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.768595] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ec00 [ 75.769301] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 75.769951] page dumped because: kasan: bad access detected [ 75.770427] [ 75.770616] Memory state around the buggy address: [ 75.771105] ffff0000c58a6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.771727] ffff0000c58a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.772342] >ffff0000c58a7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.772963] ^ [ 75.773336] ffff0000c58a7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 75.774004] ffff0000c58a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.774570] ==================================================================
[ 74.334862] ================================================================== [ 74.335841] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x230 [ 74.336562] Free of addr ffff0000c58d3001 by task kunit_try_catch/160 [ 74.337101] [ 74.337333] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.338102] Hardware name: linux,dummy-virt (DT) [ 74.339057] Call trace: [ 74.339353] dump_backtrace.part.0+0xdc/0xf0 [ 74.339864] show_stack+0x18/0x30 [ 74.340286] dump_stack_lvl+0x64/0x80 [ 74.340713] print_report+0x158/0x438 [ 74.341214] kasan_report_invalid_free+0x9c/0xc0 [ 74.341687] __kasan_slab_free+0x140/0x150 [ 74.342144] kmem_cache_free+0x1b8/0x38c [ 74.342606] kmem_cache_invalid_free+0xd8/0x230 [ 74.343374] kunit_try_run_case+0x84/0x120 [ 74.343847] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.344407] kthread+0x180/0x190 [ 74.344877] ret_from_fork+0x10/0x20 [ 74.345305] [ 74.345514] Allocated by task 160: [ 74.345837] kasan_save_stack+0x3c/0x70 [ 74.346389] kasan_set_track+0x2c/0x40 [ 74.347177] kasan_save_alloc_info+0x24/0x34 [ 74.347669] __kasan_slab_alloc+0x8c/0x90 [ 74.348086] kmem_cache_alloc+0x170/0x2c4 [ 74.348556] kmem_cache_invalid_free+0xb4/0x230 [ 74.349050] kunit_try_run_case+0x84/0x120 [ 74.349511] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.350342] kthread+0x180/0x190 [ 74.350747] ret_from_fork+0x10/0x20 [ 74.351149] [ 74.351346] The buggy address belongs to the object at ffff0000c58d3000 [ 74.351346] which belongs to the cache test_cache of size 200 [ 74.352257] The buggy address is located 1 bytes inside of [ 74.352257] 200-byte region [ffff0000c58d3000, ffff0000c58d30c8) [ 74.353253] [ 74.353488] The buggy address belongs to the physical page: [ 74.354515] page:0000000038ae0fdf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3 [ 74.355253] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.355936] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398900 [ 74.356597] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 74.357203] page dumped because: kasan: bad access detected [ 74.357659] [ 74.357856] Memory state around the buggy address: [ 74.358574] ffff0000c58d2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.359173] ffff0000c58d2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.359795] >ffff0000c58d3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.360425] ^ [ 74.360755] ffff0000c58d3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 74.361357] ffff0000c58d3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.361952] ==================================================================
[ 65.800406] ================================================================== [ 65.801237] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xf0/0x250 [ 65.801863] Free of addr ffff0000c59ba001 by task kunit_try_catch/158 [ 65.802532] [ 65.802843] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 65.803537] Hardware name: linux,dummy-virt (DT) [ 65.803905] Call trace: [ 65.804213] dump_backtrace+0x110/0x120 [ 65.804697] show_stack+0x18/0x28 [ 65.805080] dump_stack_lvl+0x68/0x84 [ 65.805678] print_report+0x158/0x484 [ 65.806098] kasan_report_invalid_free+0x84/0xa0 [ 65.806565] __kasan_slab_free+0x144/0x158 [ 65.806988] kmem_cache_free+0x1b0/0x3a0 [ 65.807447] kmem_cache_invalid_free+0xf0/0x250 [ 65.807888] kunit_try_run_case+0x7c/0x120 [ 65.808347] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.808847] kthread+0x1a4/0x1b8 [ 65.809216] ret_from_fork+0x10/0x20 [ 65.809615] [ 65.809807] Allocated by task 158: [ 65.810105] kasan_save_stack+0x2c/0x58 [ 65.810530] kasan_set_track+0x2c/0x40 [ 65.810924] kasan_save_alloc_info+0x24/0x38 [ 65.811491] __kasan_slab_alloc+0x74/0x90 [ 65.811886] slab_post_alloc_hook+0x6c/0x260 [ 65.812352] kmem_cache_alloc+0x164/0x270 [ 65.812762] kmem_cache_invalid_free+0xc8/0x250 [ 65.813255] kunit_try_run_case+0x7c/0x120 [ 65.813840] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.814384] kthread+0x1a4/0x1b8 [ 65.814764] ret_from_fork+0x10/0x20 [ 65.815144] [ 65.815352] The buggy address belongs to the object at ffff0000c59ba000 [ 65.815352] which belongs to the cache test_cache of size 200 [ 65.816203] The buggy address is located 1 bytes inside of [ 65.816203] 200-byte region [ffff0000c59ba000, ffff0000c59ba0c8) [ 65.817010] [ 65.817194] The buggy address belongs to the physical page: [ 65.817637] page:00000000e33fe385 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ba [ 65.818505] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 65.819139] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c15cf980 [ 65.819744] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 65.820306] page dumped because: kasan: bad access detected [ 65.820697] [ 65.820876] Memory state around the buggy address: [ 65.821215] ffff0000c59b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.821894] ffff0000c59b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.823063] >ffff0000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.823608] ^ [ 65.823908] ffff0000c59ba080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 65.824465] ffff0000c59ba100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.825011] ==================================================================
[ 31.953737] ================================================================== [ 31.954336] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe0/0x1f0 [ 31.954757] Free of addr ffff8881034a3001 by task kunit_try_catch/264 [ 31.955047] [ 31.955184] CPU: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.955573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.956328] Call Trace: [ 31.956478] <TASK> [ 31.956659] dump_stack_lvl+0x49/0x62 [ 31.956945] print_report+0x189/0x492 [ 31.957220] ? kasan_complete_mode_report_info+0x3c/0x200 [ 31.957739] ? kmem_cache_invalid_free+0xe0/0x1f0 [ 31.958275] kasan_report_invalid_free+0xd8/0x150 [ 31.958579] ? kmem_cache_invalid_free+0xe0/0x1f0 [ 31.959005] ? kmem_cache_invalid_free+0xe0/0x1f0 [ 31.959437] ____kasan_slab_free+0x1c3/0x1d0 [ 31.959797] ? kmem_cache_invalid_free+0xe0/0x1f0 [ 31.960088] __kasan_slab_free+0x12/0x20 [ 31.960521] kmem_cache_free+0x19c/0x4a0 [ 31.960878] kmem_cache_invalid_free+0xe0/0x1f0 [ 31.961295] ? kmem_cache_double_destroy+0x1b0/0x1b0 [ 31.961682] ? __kunit_add_resource+0xd1/0x100 [ 31.961974] kunit_try_run_case+0x8f/0xd0 [ 31.962422] ? kunit_catch_run_case+0x80/0x80 [ 31.962794] ? kunit_try_catch_throw+0x40/0x40 [ 31.963158] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.963618] kthread+0x17b/0x1b0 [ 31.964025] ? kthread_complete_and_exit+0x30/0x30 [ 31.964291] ret_from_fork+0x22/0x30 [ 31.964722] </TASK> [ 31.964984] [ 31.965158] Allocated by task 264: [ 31.965513] kasan_save_stack+0x41/0x70 [ 31.967250] kasan_set_track+0x25/0x40 [ 31.967649] kasan_save_alloc_info+0x1e/0x30 [ 31.967857] __kasan_slab_alloc+0x90/0xa0 [ 31.968041] kmem_cache_alloc+0x150/0x370 [ 31.968246] kmem_cache_invalid_free+0xb9/0x1f0 [ 31.968438] kunit_try_run_case+0x8f/0xd0 [ 31.968617] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.968841] kthread+0x17b/0x1b0 [ 31.969001] ret_from_fork+0x22/0x30 [ 31.970203] [ 31.970761] The buggy address belongs to the object at ffff8881034a3000 [ 31.970761] which belongs to the cache test_cache of size 200 [ 31.972532] The buggy address is located 1 bytes inside of [ 31.972532] 200-byte region [ffff8881034a3000, ffff8881034a30c8) [ 31.974532] [ 31.974659] The buggy address belongs to the physical page: [ 31.975032] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1034a3 [ 31.975676] flags: 0x200000000000200(slab|node=0|zone=2) [ 31.976335] raw: 0200000000000200 0000000000000000 dead000000000122 ffff88810316c780 [ 31.976705] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 31.977234] page dumped because: kasan: bad access detected [ 31.977754] [ 31.977979] Memory state around the buggy address: [ 31.978375] ffff8881034a2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.978820] ffff8881034a2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.979282] >ffff8881034a3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.979725] ^ [ 31.979942] ffff8881034a3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.980371] ffff8881034a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.980739] ==================================================================