Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.611387] ==================================================================
[   30.611614] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.611840] Free of addr fff00000c99d0001 by task kunit_try_catch/183
[   30.612096] 
[   30.612144] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.612298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.612371] Hardware name: linux,dummy-virt (DT)
[   30.612466] Call trace:
[   30.612516]  show_stack+0x20/0x38 (C)
[   30.612579]  dump_stack_lvl+0x8c/0xd0
[   30.612840]  print_report+0x118/0x608
[   30.613242]  kasan_report_invalid_free+0xc0/0xe8
[   30.613436]  __kasan_kfree_large+0x5c/0xa8
[   30.613532]  free_large_kmalloc+0x68/0x150
[   30.613839]  kfree+0x270/0x3c8
[   30.614149]  kmalloc_large_invalid_free+0x108/0x270
[   30.614308]  kunit_try_run_case+0x170/0x3f0
[   30.614634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.614764]  kthread+0x328/0x630
[   30.614843]  ret_from_fork+0x10/0x20
[   30.615110] 
[   30.615185] The buggy address belongs to the physical page:
[   30.615331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d0
[   30.615392] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.615595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.615812] page_type: f8(unknown)
[   30.615870] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.616048] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.616110] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.616373] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.616493] head: 0bfffe0000000002 ffffc1ffc3267401 00000000ffffffff 00000000ffffffff
[   30.616571] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.616789] page dumped because: kasan: bad access detected
[   30.616960] 
[   30.617032] Memory state around the buggy address:
[   30.617091]  fff00000c99cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.617206]  fff00000c99cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.617275] >fff00000c99d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.617380]                    ^
[   30.617411]  fff00000c99d0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.617486]  fff00000c99d0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.617858] ==================================================================

[   32.424052] ==================================================================
[   32.424135] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   32.424411] Free of addr fff00000c99ec001 by task kunit_try_catch/181
[   32.424701] 
[   32.424969] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.425057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.425083] Hardware name: linux,dummy-virt (DT)
[   32.425114] Call trace:
[   32.425136]  show_stack+0x20/0x38 (C)
[   32.425205]  dump_stack_lvl+0x8c/0xd0
[   32.425428]  print_report+0x118/0x608
[   32.425508]  kasan_report_invalid_free+0xc0/0xe8
[   32.425712]  __kasan_kfree_large+0x5c/0xa8
[   32.425915]  free_large_kmalloc+0x68/0x150
[   32.426065]  kfree+0x270/0x3c8
[   32.426146]  kmalloc_large_invalid_free+0x108/0x270
[   32.426203]  kunit_try_run_case+0x170/0x3f0
[   32.426251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.426303]  kthread+0x328/0x630
[   32.426346]  ret_from_fork+0x10/0x20
[   32.426566] 
[   32.426591] The buggy address belongs to the physical page:
[   32.426621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ec
[   32.426673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.426718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.426768] page_type: f8(unknown)
[   32.426807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.426917] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.427074] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.427229] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.427277] head: 0bfffe0000000002 ffffc1ffc3267b01 00000000ffffffff 00000000ffffffff
[   32.427324] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.427364] page dumped because: kasan: bad access detected
[   32.427394] 
[   32.427411] Memory state around the buggy address:
[   32.427442]  fff00000c99ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.427857]  fff00000c99ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.427902] >fff00000c99ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.427939]                    ^
[   32.428152]  fff00000c99ec080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.428332]  fff00000c99ec100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.428460] ==================================================================

[   22.648016] ==================================================================
[   22.648518] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   22.648823] Free of addr ffff8881060c4001 by task kunit_try_catch/198
[   22.649086] 
[   22.649195] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.649243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.649256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.649276] Call Trace:
[   22.649290]  <TASK>
[   22.649321]  dump_stack_lvl+0x73/0xb0
[   22.649352]  print_report+0xd1/0x650
[   22.649374]  ? __virt_addr_valid+0x1db/0x2d0
[   22.649400]  ? kasan_addr_to_slab+0x11/0xa0
[   22.649419]  ? kfree+0x274/0x3f0
[   22.649442]  kasan_report_invalid_free+0x10a/0x130
[   22.649465]  ? kfree+0x274/0x3f0
[   22.649488]  ? kfree+0x274/0x3f0
[   22.649508]  __kasan_kfree_large+0x86/0xd0
[   22.649529]  free_large_kmalloc+0x52/0x110
[   22.649552]  kfree+0x274/0x3f0
[   22.649577]  kmalloc_large_invalid_free+0x120/0x2b0
[   22.649599]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   22.649621]  ? __schedule+0x10cc/0x2b60
[   22.649653]  ? __pfx_read_tsc+0x10/0x10
[   22.649688]  ? ktime_get_ts64+0x86/0x230
[   22.649714]  kunit_try_run_case+0x1a5/0x480
[   22.649745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.649768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.649790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.649811]  ? __kthread_parkme+0x82/0x180
[   22.649831]  ? preempt_count_sub+0x50/0x80
[   22.649861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.649885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.649908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.649932]  kthread+0x337/0x6f0
[   22.649952]  ? trace_preempt_on+0x20/0xc0
[   22.649976]  ? __pfx_kthread+0x10/0x10
[   22.649996]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.650019]  ? calculate_sigpending+0x7b/0xa0
[   22.650043]  ? __pfx_kthread+0x10/0x10
[   22.650064]  ret_from_fork+0x116/0x1d0
[   22.650082]  ? __pfx_kthread+0x10/0x10
[   22.650102]  ret_from_fork_asm+0x1a/0x30
[   22.650134]  </TASK>
[   22.650145] 
[   22.659377] The buggy address belongs to the physical page:
[   22.659640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c4
[   22.660137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.660429] flags: 0x200000000000040(head|node=0|zone=2)
[   22.661085] page_type: f8(unknown)
[   22.661414] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.662158] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.662513] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.662899] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.663246] head: 0200000000000002 ffffea0004183101 00000000ffffffff 00000000ffffffff
[   22.663608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.664262] page dumped because: kasan: bad access detected
[   22.664536] 
[   22.664626] Memory state around the buggy address:
[   22.664939]  ffff8881060c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.665282]  ffff8881060c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.665605] >ffff8881060c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.665858]                    ^
[   22.666030]  ffff8881060c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.666354]  ffff8881060c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.666990] ==================================================================

[   22.856677] ==================================================================
[   22.857187] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   22.857487] Free of addr ffff8881060ac001 by task kunit_try_catch/199
[   22.857739] 
[   22.857857] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.857913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.857925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.858143] Call Trace:
[   22.858159]  <TASK>
[   22.858179]  dump_stack_lvl+0x73/0xb0
[   22.858504]  print_report+0xd1/0x650
[   22.858530]  ? __virt_addr_valid+0x1db/0x2d0
[   22.858556]  ? kasan_addr_to_slab+0x11/0xa0
[   22.858576]  ? kfree+0x274/0x3f0
[   22.858598]  kasan_report_invalid_free+0x10a/0x130
[   22.858622]  ? kfree+0x274/0x3f0
[   22.858645]  ? kfree+0x274/0x3f0
[   22.858665]  __kasan_kfree_large+0x86/0xd0
[   22.858687]  free_large_kmalloc+0x52/0x110
[   22.858710]  kfree+0x274/0x3f0
[   22.858734]  kmalloc_large_invalid_free+0x120/0x2b0
[   22.858756]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   22.858779]  ? __schedule+0x10cc/0x2b60
[   22.858800]  ? __pfx_read_tsc+0x10/0x10
[   22.858822]  ? ktime_get_ts64+0x86/0x230
[   22.858847]  kunit_try_run_case+0x1a5/0x480
[   22.858874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.858897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.858918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.858939]  ? __kthread_parkme+0x82/0x180
[   22.858960]  ? preempt_count_sub+0x50/0x80
[   22.858983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.859008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.859033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.859056]  kthread+0x337/0x6f0
[   22.859089]  ? trace_preempt_on+0x20/0xc0
[   22.859112]  ? __pfx_kthread+0x10/0x10
[   22.859133]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.859156]  ? calculate_sigpending+0x7b/0xa0
[   22.859231]  ? __pfx_kthread+0x10/0x10
[   22.859257]  ret_from_fork+0x116/0x1d0
[   22.859276]  ? __pfx_kthread+0x10/0x10
[   22.859297]  ret_from_fork_asm+0x1a/0x30
[   22.859328]  </TASK>
[   22.859341] 
[   22.867008] The buggy address belongs to the physical page:
[   22.867500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060ac
[   22.867860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.868370] flags: 0x200000000000040(head|node=0|zone=2)
[   22.868600] page_type: f8(unknown)
[   22.868756] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.869106] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.869594] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.869905] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.870151] head: 0200000000000002 ffffea0004182b01 00000000ffffffff 00000000ffffffff
[   22.870434] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.871098] page dumped because: kasan: bad access detected
[   22.871377] 
[   22.871446] Memory state around the buggy address:
[   22.871601]  ffff8881060abf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.871897]  ffff8881060abf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.872640] >ffff8881060ac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.872924]                    ^
[   22.873092]  ffff8881060ac080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.873538]  ffff8881060ac100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.873877] ==================================================================