Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
juno-r2
qemu-arm64
qemu-x86_64

[   32.634748] ==================================================================
[   32.645872] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   32.651355] Free of addr ffff0000966fc001 by task kunit_try_catch/236
[   32.657879] 
[   32.659412] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   32.659440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.659448] Hardware name: Thundercomm Dragonboard 845c (DT)
[   32.659457] Call trace:
[   32.659463]  show_stack+0x20/0x38 (C)
[   32.659482]  dump_stack_lvl+0x8c/0xd0
[   32.659501]  print_report+0x118/0x608
[   32.659519]  kasan_report_invalid_free+0xc0/0xe8
[   32.659541]  __kasan_kfree_large+0x5c/0xa8
[   32.659559]  free_large_kmalloc+0x68/0x150
[   32.659577]  kfree+0x270/0x3c8
[   32.659593]  kmalloc_large_invalid_free+0x108/0x270
[   32.659611]  kunit_try_run_case+0x170/0x3f0
[   32.659630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.659651]  kthread+0x328/0x630
[   32.659665]  ret_from_fork+0x10/0x20
[   32.659684] 
[   32.733667] The buggy address belongs to the physical page:
[   32.739310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1166fc
[   32.747414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.755170] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.762227] page_type: f8(unknown)
[   32.765698] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.773544] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.781391] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.789324] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.797256] head: 0bfffe0000000002 fffffdffc259bf01 00000000ffffffff 00000000ffffffff
[   32.805187] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.813114] page dumped because: kasan: bad access detected
[   32.818757] 
[   32.820286] Memory state around the buggy address:
[   32.825142]  ffff0000966fbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.832456]  ffff0000966fbf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.839770] >ffff0000966fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.847082]                    ^
[   32.850364]  ffff0000966fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.857678]  ffff0000966fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.864990] ==================================================================

[ 1523.212283] ==================================================================
[ 1523.212310] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[ 1523.212343] Free of addr ffff0008261f4001 by task kunit_try_catch/221
[ 1523.212370] 
[ 1523.212384] CPU: 4 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.212443] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.212460] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.212481] Call trace:
[ 1523.212492]  show_stack+0x20/0x38 (C)
[ 1523.212528]  dump_stack_lvl+0x8c/0xd0
[ 1523.212565]  print_report+0x118/0x608
[ 1523.212604]  kasan_report_invalid_free+0xc0/0xe8
[ 1523.212646]  __kasan_kfree_large+0x5c/0xa8
[ 1523.212686]  free_large_kmalloc+0x68/0x150
[ 1523.212722]  kfree+0x270/0x3c8
[ 1523.212754]  kmalloc_large_invalid_free+0x108/0x270
[ 1523.212792]  kunit_try_run_case+0x170/0x3f0
[ 1523.212830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.213123] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[ 1523.217944] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[ 1523.217980] Write of size 1 at addr ffff000800d20eeb by task kunit_try_catch/227
[ 1523.218013] 
[ 1523.218027] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1523.218085] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1523.218103] Hardware name: ARM Juno development board (r2) (DT)
[ 1523.218124] Call trace:
[ 1523.218135]  show_stack+0x20/0x38 (C)
[ 1523.218170]  dump_stack_lvl+0x8c/0xd0
[ 1523.218208]  print_report+0x118/0x608
[ 1523.218247]  kasan_report+0xdc/0x128
[ 1523.218285]  __asan_report_store1_noabort+0x20/0x30
[ 1523.218321]  krealloc_more_oob_helper+0x60c/0x678
[ 1523.218361]  krealloc_more_oob+0x20/0x38
[ 1523.218397]  kunit_try_run_case+0x170/0x3f0
[ 1523.218435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.218479]  kthread+0x328/0x630
[ 1523.218509]  ret_from_fork+0x10/0x20
[ 1523.218545] 
[ 1523.218554] Allocated by task 227:
[ 1523.218571]  kasan_save_stack+0x3c/0x68
[ 1523.218603]  kasan_save_track+0x20/0x40
[ 1523.218635]  kasan_save_alloc_info+0x40/0x58
[ 1523.218662]  __kasan_krealloc+0x118/0x178
[ 1523.218694]  krealloc_noprof+0x128/0x360
[ 1523.218726]  krealloc_more_oob_helper+0x168/0x678
[ 1523.218758]  krealloc_more_oob+0x20/0x38
[ 1523.218788]  kunit_try_run_case+0x170/0x3f0
[ 1523.218819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1523.218856]  kthread+0x328/0x630
[ 1523.218879]  ret_from_fork+0x10/0x20
[ 1523.218908] 
[ 1523.218917] The buggy address belongs to the object at ffff000800d20e00
[ 1523.218917]  which belongs to the cache kmalloc-256 of size 256
[ 1523.218954] The buggy address is located 0 bytes to the right of
[ 1523.218954]  allocated 235-byte region [ffff000800d20e00, ffff000800d20eeb)
[ 1523.218997] 
[ 1523.219007] The buggy address belongs to the physical page:
[ 1523.219025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20
[ 1523.219058] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1523.219088] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[ 1523.219121] page_type: f5(slab)
[ 1523.219147] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.219181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.219217] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[ 1523.219251] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1523.219286] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff
[ 1523.219320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[ 1523.219346] page dumped because: kasan: bad access detected
[ 1523.219364] 
[ 1523.219373] Memory state around the buggy address:
[ 1523.219392]  ffff000800d20d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.219421]  ffff000800d20e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1523.219450] >ffff000800d20e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[ 1523.219473]                                                           ^
[ 1523.219498]  ffff000800d20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.219526]  ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1523.219550] ==================================================================

[   26.602576] ==================================================================
[   26.602779] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   26.602930] Free of addr fff00000c6498001 by task kunit_try_catch/162
[   26.603038] 
[   26.603179] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.603289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.603320] Hardware name: linux,dummy-virt (DT)
[   26.603355] Call trace:
[   26.603375]  show_stack+0x20/0x38 (C)
[   26.603424]  dump_stack_lvl+0x8c/0xd0
[   26.603471]  print_report+0x118/0x608
[   26.603519]  kasan_report_invalid_free+0xc0/0xe8
[   26.603568]  __kasan_kfree_large+0x5c/0xa8
[   26.603614]  free_large_kmalloc+0x68/0x150
[   26.603670]  kfree+0x270/0x3c8
[   26.603842]  kmalloc_large_invalid_free+0x108/0x270
[   26.603912]  kunit_try_run_case+0x170/0x3f0
[   26.603958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.604075]  kthread+0x328/0x630
[   26.604138]  ret_from_fork+0x10/0x20
[   26.604235] 
[   26.604319] The buggy address belongs to the physical page:
[   26.604372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498
[   26.604423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.604468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.604518] page_type: f8(unknown)
[   26.604554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.604602] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.604649] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.604695] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.604741] head: 0bfffe0000000002 ffffc1ffc3192601 00000000ffffffff 00000000ffffffff
[   26.604808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.604846] page dumped because: kasan: bad access detected
[   26.604875] 
[   26.604892] Memory state around the buggy address:
[   26.604935]  fff00000c6497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.605044]  fff00000c6497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.605138] >fff00000c6498000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.605173]                    ^
[   26.605300]  fff00000c6498080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.605347]  fff00000c6498100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.605564] ==================================================================

[   21.724507] ==================================================================
[   21.725556] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   21.725980] Free of addr ffff888102bb8001 by task kunit_try_catch/179
[   21.726342] 
[   21.726451] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   21.726516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.726529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.726564] Call Trace:
[   21.726580]  <TASK>
[   21.726601]  dump_stack_lvl+0x73/0xb0
[   21.726633]  print_report+0xd1/0x650
[   21.726656]  ? __virt_addr_valid+0x1db/0x2d0
[   21.726692]  ? kasan_addr_to_slab+0x11/0xa0
[   21.726711]  ? kfree+0x274/0x3f0
[   21.726733]  kasan_report_invalid_free+0x10a/0x130
[   21.726768]  ? kfree+0x274/0x3f0
[   21.726851]  ? kfree+0x274/0x3f0
[   21.726876]  __kasan_kfree_large+0x86/0xd0
[   21.726897]  free_large_kmalloc+0x52/0x110
[   21.726931]  kfree+0x274/0x3f0
[   21.726955]  kmalloc_large_invalid_free+0x120/0x2b0
[   21.726977]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   21.727010]  ? __schedule+0x10cc/0x2b60
[   21.727054]  ? __pfx_read_tsc+0x10/0x10
[   21.727077]  ? ktime_get_ts64+0x86/0x230
[   21.727101]  kunit_try_run_case+0x1a5/0x480
[   21.727127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.727149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.727173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.727204]  ? __kthread_parkme+0x82/0x180
[   21.727242]  ? preempt_count_sub+0x50/0x80
[   21.727265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.727288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.727311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.727333]  kthread+0x337/0x6f0
[   21.727352]  ? trace_preempt_on+0x20/0xc0
[   21.727375]  ? __pfx_kthread+0x10/0x10
[   21.727395]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.727417]  ? calculate_sigpending+0x7b/0xa0
[   21.727440]  ? __pfx_kthread+0x10/0x10
[   21.727461]  ret_from_fork+0x116/0x1d0
[   21.727479]  ? __pfx_kthread+0x10/0x10
[   21.727498]  ret_from_fork_asm+0x1a/0x30
[   21.727530]  </TASK>
[   21.727543] 
[   21.738188] The buggy address belongs to the physical page:
[   21.738450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bb8
[   21.738785] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.739103] flags: 0x200000000000040(head|node=0|zone=2)
[   21.739335] page_type: f8(unknown)
[   21.739489] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.739761] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.740463] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.740721] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.741018] head: 0200000000000002 ffffea00040aee01 00000000ffffffff 00000000ffffffff
[   21.741519] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.741972] page dumped because: kasan: bad access detected
[   21.742218] 
[   21.742296] Memory state around the buggy address:
[   21.742450]  ffff888102bb7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.742770]  ffff888102bb7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.743090] >ffff888102bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.743356]                    ^
[   21.743611]  ffff888102bb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.743849]  ffff888102bb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.744318] ==================================================================