Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 94.296132] ================================================================== [ 94.297824] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xdc/0x230 [ 94.299002] Free of addr ffff0000c60ca001 by task kunit_try_catch/197 [ 94.300285] [ 94.300762] CPU: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 94.301822] Hardware name: linux,dummy-virt (DT) [ 94.302609] Call trace: [ 94.303304] dump_backtrace+0x9c/0x128 [ 94.304028] show_stack+0x20/0x38 [ 94.305687] dump_stack_lvl+0x60/0xb0 [ 94.306491] print_report+0xf8/0x5e8 [ 94.307234] kasan_report_invalid_free+0xc0/0xe8 [ 94.308158] __kasan_slab_free+0x164/0x170 [ 94.308999] kmem_cache_free+0x18c/0x3f8 [ 94.309791] kmem_cache_invalid_free+0xdc/0x230 [ 94.310633] kunit_try_run_case+0x114/0x298 [ 94.311475] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 94.312592] kthread+0x18c/0x1a8 [ 94.313357] ret_from_fork+0x10/0x20 [ 94.314168] [ 94.314600] Allocated by task 197: [ 94.315213] kasan_save_stack+0x3c/0x68 [ 94.316116] kasan_set_track+0x2c/0x40 [ 94.316943] kasan_save_alloc_info+0x24/0x38 [ 94.317733] __kasan_slab_alloc+0xa8/0xb0 [ 94.318546] kmem_cache_alloc+0x138/0x330 [ 94.319327] kmem_cache_invalid_free+0xb8/0x230 [ 94.320232] kunit_try_run_case+0x114/0x298 [ 94.321123] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 94.322076] kthread+0x18c/0x1a8 [ 94.322726] ret_from_fork+0x10/0x20 [ 94.323464] [ 94.323865] The buggy address belongs to the object at ffff0000c60ca000 [ 94.323865] which belongs to the cache test_cache of size 200 [ 94.325515] The buggy address is located 1 bytes inside of [ 94.325515] 200-byte region [ffff0000c60ca000, ffff0000c60ca0c8) [ 94.327057] [ 94.327435] The buggy address belongs to the physical page: [ 94.328321] page:000000007cb0971c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ca [ 94.329636] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 94.330684] page_type: 0xffffffff() [ 94.331477] raw: 0bfffc0000000800 ffff0000c5437dc0 dead000000000122 0000000000000000 [ 94.332628] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 94.333646] page dumped because: kasan: bad access detected [ 94.334456] [ 94.334735] Memory state around the buggy address: [ 94.335556] ffff0000c60c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.336564] ffff0000c60c9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.337827] >ffff0000c60ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 94.338760] ^ [ 94.339332] ffff0000c60ca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 94.340522] ffff0000c60ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.341531] ==================================================================
[ 35.330982] ================================================================== [ 35.332258] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x260 [ 35.332659] Free of addr ffff888102871001 by task kunit_try_catch/212 [ 35.333326] [ 35.333532] CPU: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.334525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.335316] Call Trace: [ 35.335543] <TASK> [ 35.335820] dump_stack_lvl+0x4e/0x90 [ 35.336328] print_report+0xd2/0x650 [ 35.336774] ? __virt_addr_valid+0x156/0x1e0 [ 35.337188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.337575] ? kmem_cache_invalid_free+0xe4/0x260 [ 35.338013] kasan_report_invalid_free+0xfd/0x120 [ 35.338612] ? kmem_cache_invalid_free+0xe4/0x260 [ 35.339366] ? kmem_cache_invalid_free+0xe4/0x260 [ 35.339968] ____kasan_slab_free+0x1c0/0x1d0 [ 35.340324] ? kmem_cache_invalid_free+0xe4/0x260 [ 35.340571] __kasan_slab_free+0x16/0x20 [ 35.340881] kmem_cache_free+0x1a7/0x4b0 [ 35.341351] kmem_cache_invalid_free+0xe4/0x260 [ 35.341897] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 35.342531] ? __schedule+0x715/0x11a0 [ 35.343066] ? ktime_get_ts64+0x118/0x140 [ 35.343675] kunit_try_run_case+0x120/0x290 [ 35.344247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.344842] ? __kasan_check_write+0x18/0x20 [ 35.345130] ? trace_preempt_on+0x20/0xa0 [ 35.345348] ? __kthread_parkme+0x4f/0xd0 [ 35.345564] ? preempt_count_sub+0x50/0x80 [ 35.345905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.346440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.347202] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.347968] kthread+0x19e/0x1e0 [ 35.348410] ? __pfx_kthread+0x10/0x10 [ 35.348890] ret_from_fork+0x41/0x70 [ 35.349358] ? __pfx_kthread+0x10/0x10 [ 35.349817] ret_from_fork_asm+0x1b/0x30 [ 35.350300] </TASK> [ 35.350570] [ 35.350785] Allocated by task 212: [ 35.351177] kasan_save_stack+0x44/0x70 [ 35.351641] kasan_set_track+0x29/0x40 [ 35.351852] kasan_save_alloc_info+0x22/0x30 [ 35.352121] __kasan_slab_alloc+0x91/0xa0 [ 35.352393] kmem_cache_alloc+0x186/0x3b0 [ 35.352876] kmem_cache_invalid_free+0xbd/0x260 [ 35.353399] kunit_try_run_case+0x120/0x290 [ 35.353627] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.354197] kthread+0x19e/0x1e0 [ 35.354610] ret_from_fork+0x41/0x70 [ 35.355041] ret_from_fork_asm+0x1b/0x30 [ 35.355535] [ 35.355733] The buggy address belongs to the object at ffff888102871000 [ 35.355733] which belongs to the cache test_cache of size 200 [ 35.357270] The buggy address is located 1 bytes inside of [ 35.357270] 200-byte region [ffff888102871000, ffff8881028710c8) [ 35.357766] [ 35.357965] The buggy address belongs to the physical page: [ 35.358520] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102871 [ 35.359501] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.360204] page_type: 0xffffffff() [ 35.360597] raw: 0200000000000800 ffff8881017ab640 dead000000000122 0000000000000000 [ 35.361454] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 35.362208] page dumped because: kasan: bad access detected [ 35.362451] [ 35.362549] Memory state around the buggy address: [ 35.362812] ffff888102870f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.363562] ffff888102870f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.364299] >ffff888102871000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.365271] ^ [ 35.365654] ffff888102871080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 35.366668] ffff888102871100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.367400] ==================================================================