Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  104.951794] ==================================================================
[  104.953285] BUG: KASAN: invalid-free in kfree+0x144/0x150
[  104.954090] Free of addr ffff0000c683c001 by task kunit_try_catch/209
[  104.954833] 
[  104.955162] CPU: 1 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  104.956001] Hardware name: linux,dummy-virt (DT)
[  104.956345] Call trace:
[  104.956830]  dump_backtrace+0xe0/0x134
[  104.957490]  show_stack+0x20/0x2c
[  104.958061]  dump_stack_lvl+0x88/0xb4
[  104.958697]  print_report+0x158/0x44c
[  104.959384]  kasan_report_invalid_free+0xa8/0x13c
[  104.960109]  __kasan_kfree_large+0x54/0xa0
[  104.960799]  free_large_kmalloc+0x64/0xcc
[  104.961517]  kfree+0x144/0x150
[  104.962061]  kmalloc_pagealloc_invalid_free+0xa8/0x1c0
[  104.962852]  kunit_try_run_case+0x8c/0x124
[  104.963448]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  104.964001]  kthread+0x15c/0x170
[  104.964369]  ret_from_fork+0x10/0x20
[  104.965078] 
[  104.965414] The buggy address belongs to the physical page:
[  104.966193] page:00000000e328b301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10683c
[  104.967477] head:00000000e328b301 order:2 compound_mapcount:0 compound_pincount:0
[  104.968413] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  104.969489] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  104.970377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  104.970998] page dumped because: kasan: bad access detected
[  104.971682] 
[  104.971989] Memory state around the buggy address:
[  104.972697]  ffff0000c683bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.973721]  ffff0000c683bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.974693] >ffff0000c683c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.975620]                    ^
[  104.976129]  ffff0000c683c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.977076]  ffff0000c683c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  104.977897] ==================================================================

[   74.743076] ==================================================================
[   74.744449] BUG: KASAN: invalid-free in kfree+0x70/0x74
[   74.745446] Free of addr ffff0000c5a24001 by task kunit_try_catch/125
[   74.745948] 
[   74.746184] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.746952] Hardware name: linux,dummy-virt (DT)
[   74.747347] Call trace:
[   74.747642]  dump_backtrace+0xf8/0x118
[   74.748165]  show_stack+0x18/0x24
[   74.748611]  __dump_stack+0x28/0x38
[   74.749097]  dump_stack_lvl+0x54/0x6c
[   74.749514]  print_address_description+0x7c/0x1ec
[   74.750044]  print_report+0x50/0x68
[   74.750474]  kasan_report_invalid_free+0x9c/0xe8
[   74.751017]  __kasan_kfree_large+0x68/0x78
[   74.751486]  free_large_kmalloc+0x60/0xe8
[   74.751947]  kfree+0x70/0x74
[   74.752342]  kmalloc_pagealloc_invalid_free+0x80/0x120
[   74.752881]  kunit_try_run_case+0x80/0x184
[   74.753338]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.753920]  kthread+0x16c/0x21c
[   74.754367]  ret_from_fork+0x10/0x20
[   74.754780] 
[   74.755009] The buggy address belongs to the physical page:
[   74.755448] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   74.756226] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   74.756862] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.757561] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.758249] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.758875] page dumped because: kasan: bad access detected
[   74.759360] 
[   74.759584] Memory state around the buggy address:
[   74.759996]  ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.760648]  ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761272] >ffff0000c5a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.761872]                    ^
[   74.762208]  ffff0000c5a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.762850]  ffff0000c5a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.763449] ==================================================================

[   73.735527] ==================================================================
[   73.737412] BUG: KASAN: invalid-free in kfree+0x70/0x74
[   73.738250] Free of addr ffff0000c58c8001 by task kunit_try_catch/125
[   73.739118] 
[   73.739443] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.740832] Hardware name: linux,dummy-virt (DT)
[   73.741475] Call trace:
[   73.741881]  dump_backtrace+0xf4/0x114
[   73.742550]  show_stack+0x18/0x24
[   73.743170]  __dump_stack+0x28/0x38
[   73.743956]  dump_stack_lvl+0x50/0x68
[   73.744653]  print_address_description+0x7c/0x1ec
[   73.745475]  print_report+0x50/0x68
[   73.746100]  kasan_report_invalid_free+0x9c/0xe4
[   73.746572]  __kasan_kfree_large+0x68/0x78
[   73.747105]  free_large_kmalloc+0x60/0xe4
[   73.747588]  kfree+0x70/0x74
[   73.747993]  kmalloc_pagealloc_invalid_free+0x80/0x120
[   73.748538]  kunit_try_run_case+0x80/0x184
[   73.749104]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.749701]  kthread+0x16c/0x21c
[   73.750161]  ret_from_fork+0x10/0x20
[   73.750574] 
[   73.750790] The buggy address belongs to the physical page:
[   73.751245] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   73.752122] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   73.752760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   73.753448] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   73.754579] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   73.755185] page dumped because: kasan: bad access detected
[   73.755633] 
[   73.756107] Memory state around the buggy address:
[   73.756545]  ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.757192]  ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.757834] >ffff0000c58c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.758422]                    ^
[   73.758795]  ffff0000c58c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.759441]  ffff0000c58c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.760563] ==================================================================

[   72.356152] ==================================================================
[   72.356952] BUG: KASAN: invalid-free in kfree+0x74/0x80
[   72.357443] Free of addr ffff0000c5a04001 by task kunit_try_catch/125
[   72.358499] 
[   72.358865] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.360061] Hardware name: linux,dummy-virt (DT)
[   72.360726] Call trace:
[   72.361108]  dump_backtrace.part.0+0xdc/0xf0
[   72.361820]  show_stack+0x18/0x30
[   72.362458]  dump_stack_lvl+0x64/0x80
[   72.363031]  print_report+0x158/0x438
[   72.363621]  kasan_report_invalid_free+0x9c/0xc0
[   72.364267]  __kasan_kfree_large+0x54/0xa0
[   72.364871]  free_large_kmalloc+0x5c/0xf0
[   72.365464]  kfree+0x74/0x80
[   72.365824]  kmalloc_pagealloc_invalid_free+0xa0/0x1b0
[   72.366642]  kunit_try_run_case+0x84/0x120
[   72.367317]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.368159]  kthread+0x180/0x190
[   72.368674]  ret_from_fork+0x10/0x20
[   72.369220] 
[   72.369475] The buggy address belongs to the physical page:
[   72.369848] page:00000000275a55ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04
[   72.370419] head:00000000275a55ef order:2 compound_mapcount:0 compound_pincount:0
[   72.370876] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.371432] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.372558] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.373600] page dumped because: kasan: bad access detected
[   72.374429] 
[   72.374715] Memory state around the buggy address:
[   72.375425]  ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.376418]  ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.377323] >ffff0000c5a04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.378249]                    ^
[   72.378817]  ffff0000c5a04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.379840]  ffff0000c5a04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.380720] ==================================================================

[   64.057338] ==================================================================
[   64.058924] BUG: KASAN: invalid-free in kfree+0x6c/0x70
[   64.059659] Free of addr ffff0000c5994001 by task kunit_try_catch/123
[   64.060418] 
[   64.060682] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.061711] Hardware name: linux,dummy-virt (DT)
[   64.062306] Call trace:
[   64.062646]  dump_backtrace+0x110/0x120
[   64.063224]  show_stack+0x18/0x28
[   64.063750]  dump_stack_lvl+0x68/0x84
[   64.064307]  print_report+0x158/0x484
[   64.064825]  kasan_report_invalid_free+0x84/0xa0
[   64.065502]  __kasan_kfree_large+0x54/0xa0
[   64.066057]  free_large_kmalloc+0x58/0xe8
[   64.066625]  kfree+0x6c/0x70
[   64.067067]  kmalloc_pagealloc_invalid_free+0xc0/0x1c0
[   64.067766]  kunit_try_run_case+0x7c/0x120
[   64.068351]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.069068]  kthread+0x1a4/0x1b8
[   64.069642]  ret_from_fork+0x10/0x20
[   64.070205] 
[   64.070489] The buggy address belongs to the physical page:
[   64.071021] page:00000000b32ac4a2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105994
[   64.071544] head:00000000b32ac4a2 order:2 compound_mapcount:0 compound_pincount:0
[   64.071961] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.072704] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.073674] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.074754] page dumped because: kasan: bad access detected
[   64.075414] 
[   64.075678] Memory state around the buggy address:
[   64.076285]  ffff0000c5993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.077125]  ffff0000c5993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.078043] >ffff0000c5994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.078952]                    ^
[   64.079478]  ffff0000c5994080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.080343]  ffff0000c5994100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.081169] ==================================================================

[   30.382055] ==================================================================
[   30.383276] BUG: KASAN: invalid-free in kfree+0xfa/0x120
[   30.383563] Free of addr ffff8881036bc001 by task kunit_try_catch/229
[   30.383865] 
[   30.383989] CPU: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.384416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.384801] Call Trace:
[   30.384967]  <TASK>
[   30.385100]  dump_stack_lvl+0x49/0x62
[   30.385361]  print_report+0x189/0x492
[   30.385587]  ? kasan_addr_to_slab+0xd/0xb0
[   30.385807]  ? kfree+0xfa/0x120
[   30.386009]  kasan_report_invalid_free+0xd8/0x150
[   30.386295]  ? kfree+0xfa/0x120
[   30.386508]  ? kfree+0xfa/0x120
[   30.386661]  __kasan_kfree_large+0x82/0xd0
[   30.386913]  free_large_kmalloc+0x45/0xb0
[   30.387171]  kfree+0xfa/0x120
[   30.387330]  kmalloc_pagealloc_invalid_free+0xa7/0x1b0
[   30.387610]  ? kmalloc_large_oob_right+0x1e0/0x1e0
[   30.387848]  ? __kunit_add_resource+0xd1/0x100
[   30.388090]  ? kasan_test_init+0x13e/0x1b0
[   30.388394]  kunit_try_run_case+0x8f/0xd0
[   30.388631]  ? kunit_catch_run_case+0x80/0x80
[   30.388826]  ? kunit_try_catch_throw+0x40/0x40
[   30.389088]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.389465]  kthread+0x17b/0x1b0
[   30.389804]  ? kthread_complete_and_exit+0x30/0x30
[   30.390049]  ret_from_fork+0x22/0x30
[   30.390279]  </TASK>
[   30.390421] 
[   30.390509] The buggy address belongs to the physical page:
[   30.390808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036bc
[   30.391224] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.391894] flags: 0x200000000010000(head|node=0|zone=2)
[   30.392219] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.392927] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.393307] page dumped because: kasan: bad access detected
[   30.393702] 
[   30.393896] Memory state around the buggy address:
[   30.394115]  ffff8881036bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.394679]  ffff8881036bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.395099] >ffff8881036bc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.395457]                    ^
[   30.395640]  ffff8881036bc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.395956]  ffff8881036bc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.396302] ==================================================================