Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   22.822242] ==================================================================
[   22.822724] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   22.822985] Free of addr fff00000c76c8001 by task kunit_try_catch/152
[   22.823101] 
[   22.823186] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.823373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.823434] Hardware name: linux,dummy-virt (DT)
[   22.823502] Call trace:
[   22.823565]  show_stack+0x20/0x38 (C)
[   22.823692]  dump_stack_lvl+0x8c/0xd0
[   22.824416]  print_report+0x118/0x608
[   22.824820]  kasan_report_invalid_free+0xc0/0xe8
[   22.825259]  __kasan_kfree_large+0x5c/0xa8
[   22.825412]  free_large_kmalloc+0x64/0x190
[   22.825588]  kfree+0x270/0x3c8
[   22.825713]  kmalloc_large_invalid_free+0x108/0x270
[   22.825834]  kunit_try_run_case+0x170/0x3f0
[   22.825976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826170]  kthread+0x328/0x630
[   22.826317]  ret_from_fork+0x10/0x20
[   22.826638] 
[   22.826739] The buggy address belongs to the physical page:
[   22.826956] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c8
[   22.827105] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.827270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.827607] page_type: f8(unknown)
[   22.827729] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.827857] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.828004] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.828134] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.828264] head: 0bfffe0000000002 ffffc1ffc31db201 00000000ffffffff 00000000ffffffff
[   22.828495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.828608] page dumped because: kasan: bad access detected
[   22.828684] 
[   22.828729] Memory state around the buggy address:
[   22.828803]  fff00000c76c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.828959]  fff00000c76c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.829124] >fff00000c76c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.829297]                    ^
[   22.829374]  fff00000c76c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.829481]  fff00000c76c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.829757] ==================================================================

[   11.110598] ==================================================================
[   11.111381] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   11.111719] Free of addr ffff888102c58001 by task kunit_try_catch/170
[   11.112004] 
[   11.112114] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   11.112154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.112165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.112184] Call Trace:
[   11.112195]  <TASK>
[   11.112210]  dump_stack_lvl+0x73/0xb0
[   11.112245]  print_report+0xd1/0x650
[   11.112267]  ? __virt_addr_valid+0x1db/0x2d0
[   11.112288]  ? kasan_addr_to_slab+0x11/0xa0
[   11.112319]  ? kfree+0x274/0x3f0
[   11.112348]  kasan_report_invalid_free+0x10a/0x130
[   11.112372]  ? kfree+0x274/0x3f0
[   11.112392]  ? kfree+0x274/0x3f0
[   11.112409]  __kasan_kfree_large+0x86/0xd0
[   11.112430]  free_large_kmalloc+0x4b/0x110
[   11.112454]  kfree+0x274/0x3f0
[   11.112485]  kmalloc_large_invalid_free+0x120/0x2b0
[   11.112508]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   11.112530]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.112681]  ? trace_hardirqs_on+0x37/0xe0
[   11.112710]  ? __pfx_read_tsc+0x10/0x10
[   11.112729]  ? ktime_get_ts64+0x86/0x230
[   11.112766]  kunit_try_run_case+0x1a5/0x480
[   11.112789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.112812]  ? queued_spin_lock_slowpath+0x116/0xb40
[   11.112836]  ? __kthread_parkme+0x82/0x180
[   11.112856]  ? preempt_count_sub+0x50/0x80
[   11.112880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.112902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.112924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.112945]  kthread+0x337/0x6f0
[   11.112965]  ? trace_preempt_on+0x20/0xc0
[   11.112987]  ? __pfx_kthread+0x10/0x10
[   11.113008]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.113029]  ? calculate_sigpending+0x7b/0xa0
[   11.113049]  ? __pfx_kthread+0x10/0x10
[   11.113071]  ret_from_fork+0x41/0x80
[   11.113091]  ? __pfx_kthread+0x10/0x10
[   11.113112]  ret_from_fork_asm+0x1a/0x30
[   11.113230]  </TASK>
[   11.113242] 
[   11.121141] The buggy address belongs to the physical page:
[   11.121333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58
[   11.122168] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.122669] flags: 0x200000000000040(head|node=0|zone=2)
[   11.122889] page_type: f8(unknown)
[   11.123077] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.123474] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.123831] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.124101] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.124549] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff
[   11.124877] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.125103] page dumped because: kasan: bad access detected
[   11.125610] 
[   11.125879] Memory state around the buggy address:
[   11.126094]  ffff888102c57f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.126387]  ffff888102c57f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.126949] >ffff888102c58000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.127276]                    ^
[   11.127403]  ffff888102c58080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.127895]  ffff888102c58100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.128144] ==================================================================

[   20.899675] ==================================================================
[   20.900726] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   20.901256] Free of addr ffff00000def4001 by task kunit_try_catch/204
[   20.901853] 
[   20.902018] CPU: 2 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.902068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.902083] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.902100] Call trace:
[   20.902111]  show_stack+0x20/0x38 (C)
[   20.902145]  dump_stack_lvl+0x8c/0xd0
[   20.902176]  print_report+0x118/0x608
[   20.902207]  kasan_report_invalid_free+0xc0/0xe8
[   20.902238]  __kasan_kfree_large+0x5c/0xa8
[   20.902268]  free_large_kmalloc+0x64/0x190
[   20.902303]  kfree+0x270/0x3c8
[   20.902334]  kmalloc_large_invalid_free+0x108/0x270
[   20.902371]  kunit_try_run_case+0x170/0x3f0
[   20.902406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902445]  kthread+0x328/0x630
[   20.902480]  ret_from_fork+0x10/0x20
[   20.902513] 
[   20.908824] The buggy address belongs to the physical page:
[   20.909340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   20.910064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.910769] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.911420] page_type: f8(unknown)
[   20.911756] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.912470] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.913184] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.913908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.914631] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   20.915353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.916067] page dumped because: kasan: bad access detected
[   20.916581] 
[   20.916734] Memory state around the buggy address:
[   20.917183]  ffff00000def3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.917848]  ffff00000def3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918513] >ffff00000def4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.919173]                    ^
[   20.919484]  ffff00000def4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.920148]  ffff00000def4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.920809] ==================================================================