Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.332997] ================================================================== [ 16.334637] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.334998] Free of addr fff00000c65a0001 by task kunit_try_catch/150 [ 16.335361] [ 16.335690] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.335781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.336321] Hardware name: linux,dummy-virt (DT) [ 16.336363] Call trace: [ 16.336773] show_stack+0x20/0x38 (C) [ 16.337019] dump_stack_lvl+0x8c/0xd0 [ 16.337117] print_report+0x118/0x5d0 [ 16.337164] kasan_report_invalid_free+0xc0/0xe8 [ 16.337220] __kasan_kfree_large+0x5c/0xa8 [ 16.337351] free_large_kmalloc+0x64/0x190 [ 16.337396] kfree+0x270/0x3c8 [ 16.337438] kmalloc_large_invalid_free+0x108/0x270 [ 16.337485] kunit_try_run_case+0x170/0x3f0 [ 16.337532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.337583] kthread+0x328/0x630 [ 16.337625] ret_from_fork+0x10/0x20 [ 16.338494] [ 16.338526] The buggy address belongs to the physical page: [ 16.338571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0 [ 16.338856] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.338977] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.339117] page_type: f8(unknown) [ 16.339342] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.339778] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.340089] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.340369] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.340498] head: 0bfffe0000000002 ffffc1ffc3196801 00000000ffffffff 00000000ffffffff [ 16.340713] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.340798] page dumped because: kasan: bad access detected [ 16.341068] [ 16.341094] Memory state around the buggy address: [ 16.341225] fff00000c659ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341356] fff00000c659ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341633] >fff00000c65a0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.341812] ^ [ 16.342136] fff00000c65a0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.342367] fff00000c65a0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.342419] ==================================================================
[ 16.390269] ================================================================== [ 16.390372] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.390455] Free of addr fff00000c5fd8001 by task kunit_try_catch/150 [ 16.390536] [ 16.390582] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 16.390676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.390702] Hardware name: linux,dummy-virt (DT) [ 16.390732] Call trace: [ 16.390755] show_stack+0x20/0x38 (C) [ 16.390803] dump_stack_lvl+0x8c/0xd0 [ 16.390850] print_report+0x118/0x5d0 [ 16.391166] kasan_report_invalid_free+0xc0/0xe8 [ 16.391284] __kasan_kfree_large+0x5c/0xa8 [ 16.391393] free_large_kmalloc+0x64/0x190 [ 16.391487] kfree+0x270/0x3c8 [ 16.391540] kmalloc_large_invalid_free+0x108/0x270 [ 16.391721] kunit_try_run_case+0x170/0x3f0 [ 16.391871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.392035] kthread+0x328/0x630 [ 16.392179] ret_from_fork+0x10/0x20 [ 16.392256] [ 16.392277] The buggy address belongs to the physical page: [ 16.392315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fd8 [ 16.392368] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.392418] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.392468] page_type: f8(unknown) [ 16.392522] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.392580] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.392941] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.393167] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.393260] head: 0bfffe0000000002 ffffc1ffc317f601 00000000ffffffff 00000000ffffffff [ 16.393342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.393468] page dumped because: kasan: bad access detected [ 16.393556] [ 16.393607] Memory state around the buggy address: [ 16.393898] fff00000c5fd7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393940] fff00000c5fd7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.393982] >fff00000c5fd8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.394019] ^ [ 16.394046] fff00000c5fd8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.394087] fff00000c5fd8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.394135] ==================================================================
[ 12.218914] ================================================================== [ 12.219752] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 12.220122] Free of addr ffff8881038cc001 by task kunit_try_catch/168 [ 12.220376] [ 12.220504] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.220547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.220558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.220578] Call Trace: [ 12.220590] <TASK> [ 12.220605] dump_stack_lvl+0x73/0xb0 [ 12.220634] print_report+0xd1/0x610 [ 12.220657] ? __virt_addr_valid+0x1db/0x2d0 [ 12.220684] ? kasan_addr_to_slab+0x11/0xa0 [ 12.220705] ? kfree+0x274/0x3f0 [ 12.220726] kasan_report_invalid_free+0x10a/0x130 [ 12.220750] ? kfree+0x274/0x3f0 [ 12.220773] ? kfree+0x274/0x3f0 [ 12.220793] __kasan_kfree_large+0x86/0xd0 [ 12.220814] free_large_kmalloc+0x4b/0x110 [ 12.220837] kfree+0x274/0x3f0 [ 12.220862] kmalloc_large_invalid_free+0x120/0x2b0 [ 12.220884] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 12.220907] ? __schedule+0x10c6/0x2b60 [ 12.220929] ? __pfx_read_tsc+0x10/0x10 [ 12.220949] ? ktime_get_ts64+0x86/0x230 [ 12.220973] kunit_try_run_case+0x1a5/0x480 [ 12.220996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.221018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.221054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.221076] ? __kthread_parkme+0x82/0x180 [ 12.221096] ? preempt_count_sub+0x50/0x80 [ 12.221119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.221143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.221165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.221188] kthread+0x337/0x6f0 [ 12.221206] ? trace_preempt_on+0x20/0xc0 [ 12.221229] ? __pfx_kthread+0x10/0x10 [ 12.221249] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.221270] ? calculate_sigpending+0x7b/0xa0 [ 12.221292] ? __pfx_kthread+0x10/0x10 [ 12.221313] ret_from_fork+0x116/0x1d0 [ 12.221331] ? __pfx_kthread+0x10/0x10 [ 12.221351] ret_from_fork_asm+0x1a/0x30 [ 12.221382] </TASK> [ 12.221392] [ 12.228859] The buggy address belongs to the physical page: [ 12.229219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038cc [ 12.229550] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.229895] flags: 0x200000000000040(head|node=0|zone=2) [ 12.230190] page_type: f8(unknown) [ 12.230382] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.230790] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.231046] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.231433] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.231791] head: 0200000000000002 ffffea00040e3301 00000000ffffffff 00000000ffffffff [ 12.232262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.232616] page dumped because: kasan: bad access detected [ 12.232829] [ 12.232901] Memory state around the buggy address: [ 12.233196] ffff8881038cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.233538] ffff8881038cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.233882] >ffff8881038cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.234216] ^ [ 12.234338] ffff8881038cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.234570] ffff8881038cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.234809] ==================================================================
[ 12.321100] ================================================================== [ 12.321606] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 12.321926] Free of addr ffff8881038a4001 by task kunit_try_catch/167 [ 12.322304] [ 12.322412] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 12.322460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.322472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.322495] Call Trace: [ 12.322508] <TASK> [ 12.322526] dump_stack_lvl+0x73/0xb0 [ 12.322558] print_report+0xd1/0x610 [ 12.322580] ? __virt_addr_valid+0x1db/0x2d0 [ 12.322605] ? kasan_addr_to_slab+0x11/0xa0 [ 12.322624] ? kfree+0x274/0x3f0 [ 12.322648] kasan_report_invalid_free+0x10a/0x130 [ 12.322671] ? kfree+0x274/0x3f0 [ 12.322693] ? kfree+0x274/0x3f0 [ 12.322713] __kasan_kfree_large+0x86/0xd0 [ 12.322733] free_large_kmalloc+0x4b/0x110 [ 12.322755] kfree+0x274/0x3f0 [ 12.322779] kmalloc_large_invalid_free+0x120/0x2b0 [ 12.322801] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 12.322825] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 12.322851] kunit_try_run_case+0x1a5/0x480 [ 12.322877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.322898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.322923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.322945] ? __kthread_parkme+0x82/0x180 [ 12.322966] ? preempt_count_sub+0x50/0x80 [ 12.322991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.323014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.323048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.323070] kthread+0x337/0x6f0 [ 12.323089] ? trace_preempt_on+0x20/0xc0 [ 12.323112] ? __pfx_kthread+0x10/0x10 [ 12.323132] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.323165] ? calculate_sigpending+0x7b/0xa0 [ 12.323189] ? __pfx_kthread+0x10/0x10 [ 12.323209] ret_from_fork+0x116/0x1d0 [ 12.323229] ? __pfx_kthread+0x10/0x10 [ 12.323248] ret_from_fork_asm+0x1a/0x30 [ 12.323279] </TASK> [ 12.323289] [ 12.330765] The buggy address belongs to the physical page: [ 12.331031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038a4 [ 12.331318] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.331551] flags: 0x200000000000040(head|node=0|zone=2) [ 12.331735] page_type: f8(unknown) [ 12.331929] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.332178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.332569] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 12.333038] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 12.334263] head: 0200000000000002 ffffea00040e2901 00000000ffffffff 00000000ffffffff [ 12.334645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 12.336074] page dumped because: kasan: bad access detected [ 12.336277] [ 12.336378] Memory state around the buggy address: [ 12.336950] ffff8881038a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.337639] ffff8881038a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.338422] >ffff8881038a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.338647] ^ [ 12.338770] ffff8881038a4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.339503] ffff8881038a4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.339747] ==================================================================