Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 22.822242] ================================================================== [ 22.822724] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 22.822985] Free of addr fff00000c76c8001 by task kunit_try_catch/152 [ 22.823101] [ 22.823186] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.823373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.823434] Hardware name: linux,dummy-virt (DT) [ 22.823502] Call trace: [ 22.823565] show_stack+0x20/0x38 (C) [ 22.823692] dump_stack_lvl+0x8c/0xd0 [ 22.824416] print_report+0x118/0x608 [ 22.824820] kasan_report_invalid_free+0xc0/0xe8 [ 22.825259] __kasan_kfree_large+0x5c/0xa8 [ 22.825412] free_large_kmalloc+0x64/0x190 [ 22.825588] kfree+0x270/0x3c8 [ 22.825713] kmalloc_large_invalid_free+0x108/0x270 [ 22.825834] kunit_try_run_case+0x170/0x3f0 [ 22.825976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826170] kthread+0x328/0x630 [ 22.826317] ret_from_fork+0x10/0x20 [ 22.826638] [ 22.826739] The buggy address belongs to the physical page: [ 22.826956] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c8 [ 22.827105] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.827270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.827607] page_type: f8(unknown) [ 22.827729] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.827857] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.828004] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.828134] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.828264] head: 0bfffe0000000002 ffffc1ffc31db201 00000000ffffffff 00000000ffffffff [ 22.828495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.828608] page dumped because: kasan: bad access detected [ 22.828684] [ 22.828729] Memory state around the buggy address: [ 22.828803] fff00000c76c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.828959] fff00000c76c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.829124] >fff00000c76c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.829297] ^ [ 22.829374] fff00000c76c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.829481] fff00000c76c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.829757] ==================================================================
[ 11.110598] ================================================================== [ 11.111381] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 11.111719] Free of addr ffff888102c58001 by task kunit_try_catch/170 [ 11.112004] [ 11.112114] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 11.112154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.112165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.112184] Call Trace: [ 11.112195] <TASK> [ 11.112210] dump_stack_lvl+0x73/0xb0 [ 11.112245] print_report+0xd1/0x650 [ 11.112267] ? __virt_addr_valid+0x1db/0x2d0 [ 11.112288] ? kasan_addr_to_slab+0x11/0xa0 [ 11.112319] ? kfree+0x274/0x3f0 [ 11.112348] kasan_report_invalid_free+0x10a/0x130 [ 11.112372] ? kfree+0x274/0x3f0 [ 11.112392] ? kfree+0x274/0x3f0 [ 11.112409] __kasan_kfree_large+0x86/0xd0 [ 11.112430] free_large_kmalloc+0x4b/0x110 [ 11.112454] kfree+0x274/0x3f0 [ 11.112485] kmalloc_large_invalid_free+0x120/0x2b0 [ 11.112508] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 11.112530] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.112681] ? trace_hardirqs_on+0x37/0xe0 [ 11.112710] ? __pfx_read_tsc+0x10/0x10 [ 11.112729] ? ktime_get_ts64+0x86/0x230 [ 11.112766] kunit_try_run_case+0x1a5/0x480 [ 11.112789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.112812] ? queued_spin_lock_slowpath+0x116/0xb40 [ 11.112836] ? __kthread_parkme+0x82/0x180 [ 11.112856] ? preempt_count_sub+0x50/0x80 [ 11.112880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.112902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.112924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.112945] kthread+0x337/0x6f0 [ 11.112965] ? trace_preempt_on+0x20/0xc0 [ 11.112987] ? __pfx_kthread+0x10/0x10 [ 11.113008] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.113029] ? calculate_sigpending+0x7b/0xa0 [ 11.113049] ? __pfx_kthread+0x10/0x10 [ 11.113071] ret_from_fork+0x41/0x80 [ 11.113091] ? __pfx_kthread+0x10/0x10 [ 11.113112] ret_from_fork_asm+0x1a/0x30 [ 11.113230] </TASK> [ 11.113242] [ 11.121141] The buggy address belongs to the physical page: [ 11.121333] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c58 [ 11.122168] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.122669] flags: 0x200000000000040(head|node=0|zone=2) [ 11.122889] page_type: f8(unknown) [ 11.123077] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.123474] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.123831] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.124101] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.124549] head: 0200000000000002 ffffea00040b1601 00000000ffffffff 00000000ffffffff [ 11.124877] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.125103] page dumped because: kasan: bad access detected [ 11.125610] [ 11.125879] Memory state around the buggy address: [ 11.126094] ffff888102c57f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.126387] ffff888102c57f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.126949] >ffff888102c58000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.127276] ^ [ 11.127403] ffff888102c58080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.127895] ffff888102c58100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.128144] ==================================================================
[ 20.899675] ================================================================== [ 20.900726] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 20.901256] Free of addr ffff00000def4001 by task kunit_try_catch/204 [ 20.901853] [ 20.902018] CPU: 2 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.902068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.902083] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.902100] Call trace: [ 20.902111] show_stack+0x20/0x38 (C) [ 20.902145] dump_stack_lvl+0x8c/0xd0 [ 20.902176] print_report+0x118/0x608 [ 20.902207] kasan_report_invalid_free+0xc0/0xe8 [ 20.902238] __kasan_kfree_large+0x5c/0xa8 [ 20.902268] free_large_kmalloc+0x64/0x190 [ 20.902303] kfree+0x270/0x3c8 [ 20.902334] kmalloc_large_invalid_free+0x108/0x270 [ 20.902371] kunit_try_run_case+0x170/0x3f0 [ 20.902406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902445] kthread+0x328/0x630 [ 20.902480] ret_from_fork+0x10/0x20 [ 20.902513] [ 20.908824] The buggy address belongs to the physical page: [ 20.909340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4 [ 20.910064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.910769] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.911420] page_type: f8(unknown) [ 20.911756] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.912470] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.913184] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.913908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.914631] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff [ 20.915353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.916067] page dumped because: kasan: bad access detected [ 20.916581] [ 20.916734] Memory state around the buggy address: [ 20.917183] ffff00000def3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.917848] ffff00000def3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.918513] >ffff00000def4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.919173] ^ [ 20.919484] ffff00000def4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.920148] ffff00000def4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.920809] ==================================================================