Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   94.296132] ==================================================================
[   94.297824] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xdc/0x230
[   94.299002] Free of addr ffff0000c60ca001 by task kunit_try_catch/197
[   94.300285] 
[   94.300762] CPU: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   94.301822] Hardware name: linux,dummy-virt (DT)
[   94.302609] Call trace:
[   94.303304]  dump_backtrace+0x9c/0x128
[   94.304028]  show_stack+0x20/0x38
[   94.305687]  dump_stack_lvl+0x60/0xb0
[   94.306491]  print_report+0xf8/0x5e8
[   94.307234]  kasan_report_invalid_free+0xc0/0xe8
[   94.308158]  __kasan_slab_free+0x164/0x170
[   94.308999]  kmem_cache_free+0x18c/0x3f8
[   94.309791]  kmem_cache_invalid_free+0xdc/0x230
[   94.310633]  kunit_try_run_case+0x114/0x298
[   94.311475]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.312592]  kthread+0x18c/0x1a8
[   94.313357]  ret_from_fork+0x10/0x20
[   94.314168] 
[   94.314600] Allocated by task 197:
[   94.315213]  kasan_save_stack+0x3c/0x68
[   94.316116]  kasan_set_track+0x2c/0x40
[   94.316943]  kasan_save_alloc_info+0x24/0x38
[   94.317733]  __kasan_slab_alloc+0xa8/0xb0
[   94.318546]  kmem_cache_alloc+0x138/0x330
[   94.319327]  kmem_cache_invalid_free+0xb8/0x230
[   94.320232]  kunit_try_run_case+0x114/0x298
[   94.321123]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.322076]  kthread+0x18c/0x1a8
[   94.322726]  ret_from_fork+0x10/0x20
[   94.323464] 
[   94.323865] The buggy address belongs to the object at ffff0000c60ca000
[   94.323865]  which belongs to the cache test_cache of size 200
[   94.325515] The buggy address is located 1 bytes inside of
[   94.325515]  200-byte region [ffff0000c60ca000, ffff0000c60ca0c8)
[   94.327057] 
[   94.327435] The buggy address belongs to the physical page:
[   94.328321] page:000000007cb0971c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ca
[   94.329636] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.330684] page_type: 0xffffffff()
[   94.331477] raw: 0bfffc0000000800 ffff0000c5437dc0 dead000000000122 0000000000000000
[   94.332628] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   94.333646] page dumped because: kasan: bad access detected
[   94.334456] 
[   94.334735] Memory state around the buggy address:
[   94.335556]  ffff0000c60c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.336564]  ffff0000c60c9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.337827] >ffff0000c60ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   94.338760]                    ^
[   94.339332]  ffff0000c60ca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   94.340522]  ffff0000c60ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.341531] ==================================================================


[   35.330982] ==================================================================
[   35.332258] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x260
[   35.332659] Free of addr ffff888102871001 by task kunit_try_catch/212
[   35.333326] 
[   35.333532] CPU: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.334525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.335316] Call Trace:
[   35.335543]  <TASK>
[   35.335820]  dump_stack_lvl+0x4e/0x90
[   35.336328]  print_report+0xd2/0x650
[   35.336774]  ? __virt_addr_valid+0x156/0x1e0
[   35.337188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.337575]  ? kmem_cache_invalid_free+0xe4/0x260
[   35.338013]  kasan_report_invalid_free+0xfd/0x120
[   35.338612]  ? kmem_cache_invalid_free+0xe4/0x260
[   35.339366]  ? kmem_cache_invalid_free+0xe4/0x260
[   35.339968]  ____kasan_slab_free+0x1c0/0x1d0
[   35.340324]  ? kmem_cache_invalid_free+0xe4/0x260
[   35.340571]  __kasan_slab_free+0x16/0x20
[   35.340881]  kmem_cache_free+0x1a7/0x4b0
[   35.341351]  kmem_cache_invalid_free+0xe4/0x260
[   35.341897]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   35.342531]  ? __schedule+0x715/0x11a0
[   35.343066]  ? ktime_get_ts64+0x118/0x140
[   35.343675]  kunit_try_run_case+0x120/0x290
[   35.344247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.344842]  ? __kasan_check_write+0x18/0x20
[   35.345130]  ? trace_preempt_on+0x20/0xa0
[   35.345348]  ? __kthread_parkme+0x4f/0xd0
[   35.345564]  ? preempt_count_sub+0x50/0x80
[   35.345905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.346440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.347202]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.347968]  kthread+0x19e/0x1e0
[   35.348410]  ? __pfx_kthread+0x10/0x10
[   35.348890]  ret_from_fork+0x41/0x70
[   35.349358]  ? __pfx_kthread+0x10/0x10
[   35.349817]  ret_from_fork_asm+0x1b/0x30
[   35.350300]  </TASK>
[   35.350570] 
[   35.350785] Allocated by task 212:
[   35.351177]  kasan_save_stack+0x44/0x70
[   35.351641]  kasan_set_track+0x29/0x40
[   35.351852]  kasan_save_alloc_info+0x22/0x30
[   35.352121]  __kasan_slab_alloc+0x91/0xa0
[   35.352393]  kmem_cache_alloc+0x186/0x3b0
[   35.352876]  kmem_cache_invalid_free+0xbd/0x260
[   35.353399]  kunit_try_run_case+0x120/0x290
[   35.353627]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.354197]  kthread+0x19e/0x1e0
[   35.354610]  ret_from_fork+0x41/0x70
[   35.355041]  ret_from_fork_asm+0x1b/0x30
[   35.355535] 
[   35.355733] The buggy address belongs to the object at ffff888102871000
[   35.355733]  which belongs to the cache test_cache of size 200
[   35.357270] The buggy address is located 1 bytes inside of
[   35.357270]  200-byte region [ffff888102871000, ffff8881028710c8)
[   35.357766] 
[   35.357965] The buggy address belongs to the physical page:
[   35.358520] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102871
[   35.359501] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.360204] page_type: 0xffffffff()
[   35.360597] raw: 0200000000000800 ffff8881017ab640 dead000000000122 0000000000000000
[   35.361454] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   35.362208] page dumped because: kasan: bad access detected
[   35.362451] 
[   35.362549] Memory state around the buggy address:
[   35.362812]  ffff888102870f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.363562]  ffff888102870f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.364299] >ffff888102871000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.365271]                    ^
[   35.365654]  ffff888102871080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   35.366668]  ffff888102871100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.367400] ==================================================================