Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.701188] ==================================================================
[   16.701292] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   16.701356] Free of addr fff00000c6530001 by task kunit_try_catch/151
[   16.701409] 
[   16.701441] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.701733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.701798] Hardware name: linux,dummy-virt (DT)
[   16.701828] Call trace:
[   16.701850]  show_stack+0x20/0x38 (C)
[   16.701899]  dump_stack_lvl+0x8c/0xd0
[   16.701945]  print_report+0x118/0x608
[   16.702034]  kasan_report_invalid_free+0xc0/0xe8
[   16.702089]  __kasan_kfree_large+0x5c/0xa8
[   16.702135]  free_large_kmalloc+0x64/0x190
[   16.702178]  kfree+0x270/0x3c8
[   16.702492]  kmalloc_large_invalid_free+0x108/0x270
[   16.702558]  kunit_try_run_case+0x170/0x3f0
[   16.702679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.702795]  kthread+0x328/0x630
[   16.702883]  ret_from_fork+0x10/0x20
[   16.703028] 
[   16.703106] The buggy address belongs to the physical page:
[   16.703200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   16.703310] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.703374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.703424] page_type: f8(unknown)
[   16.703482] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.703530] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.703576] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.703633] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.703680] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff
[   16.703733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.703771] page dumped because: kasan: bad access detected
[   16.703801] 
[   16.703818] Memory state around the buggy address:
[   16.703991]  fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.704057]  fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.704156] >fff00000c6530000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704261]                    ^
[   16.704298]  fff00000c6530080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704355]  fff00000c6530100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704500] ==================================================================

[   16.644293] ==================================================================
[   16.644381] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   16.644443] Free of addr fff00000c770c001 by task kunit_try_catch/151
[   16.644487] 
[   16.644529] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.644855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.645269] Hardware name: linux,dummy-virt (DT)
[   16.645315] Call trace:
[   16.645452]  show_stack+0x20/0x38 (C)
[   16.645507]  dump_stack_lvl+0x8c/0xd0
[   16.645552]  print_report+0x118/0x608
[   16.645596]  kasan_report_invalid_free+0xc0/0xe8
[   16.645853]  __kasan_kfree_large+0x5c/0xa8
[   16.646098]  free_large_kmalloc+0x64/0x190
[   16.646255]  kfree+0x270/0x3c8
[   16.646297]  kmalloc_large_invalid_free+0x108/0x270
[   16.646343]  kunit_try_run_case+0x170/0x3f0
[   16.646390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.646449]  kthread+0x328/0x630
[   16.646489]  ret_from_fork+0x10/0x20
[   16.646534] 
[   16.646554] The buggy address belongs to the physical page:
[   16.646714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c
[   16.646809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.646856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.646907] page_type: f8(unknown)
[   16.646957] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.647004] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.647051] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.647097] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.647145] head: 0bfffe0000000002 ffffc1ffc31dc301 00000000ffffffff 00000000ffffffff
[   16.647245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.647289] page dumped because: kasan: bad access detected
[   16.647357] 
[   16.647376] Memory state around the buggy address:
[   16.647407]  fff00000c770bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.647510]  fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.647784] >fff00000c770c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.647836]                    ^
[   16.647870]  fff00000c770c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.648006]  fff00000c770c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.648107] ==================================================================

[   12.750050] ==================================================================
[   12.750602] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   12.751089] Free of addr ffff88810263c001 by task kunit_try_catch/168
[   12.751723] 
[   12.751910] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.751988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.752010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.752044] Call Trace:
[   12.752063]  <TASK>
[   12.752080]  dump_stack_lvl+0x73/0xb0
[   12.752409]  print_report+0xd1/0x650
[   12.752442]  ? __virt_addr_valid+0x1db/0x2d0
[   12.752465]  ? kasan_addr_to_slab+0x11/0xa0
[   12.752483]  ? kfree+0x274/0x3f0
[   12.752504]  kasan_report_invalid_free+0x10a/0x130
[   12.752526]  ? kfree+0x274/0x3f0
[   12.752547]  ? kfree+0x274/0x3f0
[   12.752566]  __kasan_kfree_large+0x86/0xd0
[   12.752585]  free_large_kmalloc+0x4b/0x110
[   12.752606]  kfree+0x274/0x3f0
[   12.752647]  kmalloc_large_invalid_free+0x120/0x2b0
[   12.752669]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   12.752691]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   12.752715]  kunit_try_run_case+0x1a5/0x480
[   12.752737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.752757]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.752779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.752799]  ? __kthread_parkme+0x82/0x180
[   12.752817]  ? preempt_count_sub+0x50/0x80
[   12.752839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.752860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.752880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.752900]  kthread+0x337/0x6f0
[   12.752917]  ? trace_preempt_on+0x20/0xc0
[   12.752938]  ? __pfx_kthread+0x10/0x10
[   12.752957]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.752975]  ? calculate_sigpending+0x7b/0xa0
[   12.752996]  ? __pfx_kthread+0x10/0x10
[   12.753015]  ret_from_fork+0x116/0x1d0
[   12.753032]  ? __pfx_kthread+0x10/0x10
[   12.753050]  ret_from_fork_asm+0x1a/0x30
[   12.753077]  </TASK>
[   12.753089] 
[   12.763048] The buggy address belongs to the physical page:
[   12.763530] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10263c
[   12.764029] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.764544] flags: 0x200000000000040(head|node=0|zone=2)
[   12.764809] page_type: f8(unknown)
[   12.765092] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.765452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.765853] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.766338] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.766584] head: 0200000000000002 ffffea0004098f01 00000000ffffffff 00000000ffffffff
[   12.767016] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.767574] page dumped because: kasan: bad access detected
[   12.767918] 
[   12.768002] Memory state around the buggy address:
[   12.768373]  ffff88810263bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.768698]  ffff88810263bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.769050] >ffff88810263c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.769486]                    ^
[   12.770260]  ffff88810263c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.770573]  ffff88810263c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.770950] ==================================================================

[   13.008275] ==================================================================
[   13.009698] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   13.010445] Free of addr ffff888102424001 by task kunit_try_catch/167
[   13.011338] 
[   13.011446] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.011492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.011505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.011526] Call Trace:
[   13.011539]  <TASK>
[   13.011554]  dump_stack_lvl+0x73/0xb0
[   13.011584]  print_report+0xd1/0x650
[   13.011606]  ? __virt_addr_valid+0x1db/0x2d0
[   13.011628]  ? kasan_addr_to_slab+0x11/0xa0
[   13.011648]  ? kfree+0x274/0x3f0
[   13.011670]  kasan_report_invalid_free+0x10a/0x130
[   13.011694]  ? kfree+0x274/0x3f0
[   13.011717]  ? kfree+0x274/0x3f0
[   13.011737]  __kasan_kfree_large+0x86/0xd0
[   13.011758]  free_large_kmalloc+0x4b/0x110
[   13.011781]  kfree+0x274/0x3f0
[   13.011806]  kmalloc_large_invalid_free+0x120/0x2b0
[   13.011828]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   13.011851]  ? __schedule+0x10cc/0x2b60
[   13.011872]  ? __pfx_read_tsc+0x10/0x10
[   13.011892]  ? ktime_get_ts64+0x86/0x230
[   13.011916]  kunit_try_run_case+0x1a5/0x480
[   13.011940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.011962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.011984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.012007]  ? __kthread_parkme+0x82/0x180
[   13.012026]  ? preempt_count_sub+0x50/0x80
[   13.012069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.012093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.012115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.012137]  kthread+0x337/0x6f0
[   13.012156]  ? trace_preempt_on+0x20/0xc0
[   13.012179]  ? __pfx_kthread+0x10/0x10
[   13.012200]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.012220]  ? calculate_sigpending+0x7b/0xa0
[   13.012243]  ? __pfx_kthread+0x10/0x10
[   13.012265]  ret_from_fork+0x116/0x1d0
[   13.012283]  ? __pfx_kthread+0x10/0x10
[   13.012304]  ret_from_fork_asm+0x1a/0x30
[   13.012335]  </TASK>
[   13.012347] 
[   13.029116] The buggy address belongs to the physical page:
[   13.029329] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102424
[   13.029607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.029899] flags: 0x200000000000040(head|node=0|zone=2)
[   13.030676] page_type: f8(unknown)
[   13.031086] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.031968] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.032799] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.033628] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.034454] head: 0200000000000002 ffffea0004090901 00000000ffffffff 00000000ffffffff
[   13.035331] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.035834] page dumped because: kasan: bad access detected
[   13.036466] 
[   13.036747] Memory state around the buggy address:
[   13.037189]  ffff888102423f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.037874]  ffff888102423f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.038582] >ffff888102424000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.039383]                    ^
[   13.039826]  ffff888102424080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.040598]  ffff888102424100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.041408] ==================================================================

[   17.007653] ==================================================================
[   17.018650] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   17.024058] Free of addr ffff888106e9c001 by task kunit_try_catch/191
[   17.030498] 
[   17.031999] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.032007] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   17.032010] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.032013] Call Trace:
[   17.032015]  <TASK>
[   17.032017]  dump_stack_lvl+0x73/0xb0
[   17.032022]  print_report+0xd1/0x650
[   17.032026]  ? __virt_addr_valid+0x1db/0x2d0
[   17.032030]  ? kasan_addr_to_slab+0x11/0xa0
[   17.032033]  ? kfree+0x274/0x3f0
[   17.032037]  kasan_report_invalid_free+0x10a/0x130
[   17.032042]  ? kfree+0x274/0x3f0
[   17.032046]  ? kfree+0x274/0x3f0
[   17.032050]  __kasan_kfree_large+0x86/0xd0
[   17.032054]  free_large_kmalloc+0x4b/0x110
[   17.032058]  kfree+0x274/0x3f0
[   17.032063]  kmalloc_large_invalid_free+0x120/0x2b0
[   17.032067]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   17.032071]  ? __schedule+0x10cc/0x2b60
[   17.032075]  ? ktime_get_ts64+0x83/0x230
[   17.032079]  kunit_try_run_case+0x1a2/0x480
[   17.032084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.032088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.032092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.032096]  ? __kthread_parkme+0x82/0x180
[   17.032100]  ? preempt_count_sub+0x50/0x80
[   17.032104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.032108]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.032112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.032116]  kthread+0x334/0x6f0
[   17.032120]  ? trace_preempt_on+0x20/0xc0
[   17.032124]  ? __pfx_kthread+0x10/0x10
[   17.032127]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.032131]  ? calculate_sigpending+0x7b/0xa0
[   17.032136]  ? __pfx_kthread+0x10/0x10
[   17.032139]  ret_from_fork+0x113/0x1d0
[   17.032143]  ? __pfx_kthread+0x10/0x10
[   17.032146]  ret_from_fork_asm+0x1a/0x30
[   17.032152]  </TASK>
[   17.032154] 
[   17.201983] The buggy address belongs to the physical page:
[   17.207556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e9c
[   17.215557] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.223216] flags: 0x200000000000040(head|node=0|zone=2)
[   17.228530] page_type: f8(unknown)
[   17.231936] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.239676] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.247424] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.255257] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.263084] head: 0200000000000002 ffffea00041ba701 00000000ffffffff 00000000ffffffff
[   17.270909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.278734] page dumped because: kasan: bad access detected
[   17.284309] 
[   17.285809] Memory state around the buggy address:
[   17.290602]  ffff888106e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.297828]  ffff888106e9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.305047] >ffff888106e9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.312267]                    ^
[   17.315499]  ffff888106e9c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.322718]  ffff888106e9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.329938] ==================================================================