Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 104.951794] ================================================================== [ 104.953285] BUG: KASAN: invalid-free in kfree+0x144/0x150 [ 104.954090] Free of addr ffff0000c683c001 by task kunit_try_catch/209 [ 104.954833] [ 104.955162] CPU: 1 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 104.956001] Hardware name: linux,dummy-virt (DT) [ 104.956345] Call trace: [ 104.956830] dump_backtrace+0xe0/0x134 [ 104.957490] show_stack+0x20/0x2c [ 104.958061] dump_stack_lvl+0x88/0xb4 [ 104.958697] print_report+0x158/0x44c [ 104.959384] kasan_report_invalid_free+0xa8/0x13c [ 104.960109] __kasan_kfree_large+0x54/0xa0 [ 104.960799] free_large_kmalloc+0x64/0xcc [ 104.961517] kfree+0x144/0x150 [ 104.962061] kmalloc_pagealloc_invalid_free+0xa8/0x1c0 [ 104.962852] kunit_try_run_case+0x8c/0x124 [ 104.963448] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.964001] kthread+0x15c/0x170 [ 104.964369] ret_from_fork+0x10/0x20 [ 104.965078] [ 104.965414] The buggy address belongs to the physical page: [ 104.966193] page:00000000e328b301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10683c [ 104.967477] head:00000000e328b301 order:2 compound_mapcount:0 compound_pincount:0 [ 104.968413] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 104.969489] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 104.970377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 104.970998] page dumped because: kasan: bad access detected [ 104.971682] [ 104.971989] Memory state around the buggy address: [ 104.972697] ffff0000c683bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.973721] ffff0000c683bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 104.974693] >ffff0000c683c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 104.975620] ^ [ 104.976129] ffff0000c683c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 104.977076] ffff0000c683c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 104.977897] ==================================================================
[ 74.743076] ================================================================== [ 74.744449] BUG: KASAN: invalid-free in kfree+0x70/0x74 [ 74.745446] Free of addr ffff0000c5a24001 by task kunit_try_catch/125 [ 74.745948] [ 74.746184] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.746952] Hardware name: linux,dummy-virt (DT) [ 74.747347] Call trace: [ 74.747642] dump_backtrace+0xf8/0x118 [ 74.748165] show_stack+0x18/0x24 [ 74.748611] __dump_stack+0x28/0x38 [ 74.749097] dump_stack_lvl+0x54/0x6c [ 74.749514] print_address_description+0x7c/0x1ec [ 74.750044] print_report+0x50/0x68 [ 74.750474] kasan_report_invalid_free+0x9c/0xe8 [ 74.751017] __kasan_kfree_large+0x68/0x78 [ 74.751486] free_large_kmalloc+0x60/0xe8 [ 74.751947] kfree+0x70/0x74 [ 74.752342] kmalloc_pagealloc_invalid_free+0x80/0x120 [ 74.752881] kunit_try_run_case+0x80/0x184 [ 74.753338] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.753920] kthread+0x16c/0x21c [ 74.754367] ret_from_fork+0x10/0x20 [ 74.754780] [ 74.755009] The buggy address belongs to the physical page: [ 74.755448] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 74.756226] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 74.756862] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.757561] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.758249] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.758875] page dumped because: kasan: bad access detected [ 74.759360] [ 74.759584] Memory state around the buggy address: [ 74.759996] ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.760648] ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.761272] >ffff0000c5a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.761872] ^ [ 74.762208] ffff0000c5a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.762850] ffff0000c5a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.763449] ==================================================================
[ 73.735527] ================================================================== [ 73.737412] BUG: KASAN: invalid-free in kfree+0x70/0x74 [ 73.738250] Free of addr ffff0000c58c8001 by task kunit_try_catch/125 [ 73.739118] [ 73.739443] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.740832] Hardware name: linux,dummy-virt (DT) [ 73.741475] Call trace: [ 73.741881] dump_backtrace+0xf4/0x114 [ 73.742550] show_stack+0x18/0x24 [ 73.743170] __dump_stack+0x28/0x38 [ 73.743956] dump_stack_lvl+0x50/0x68 [ 73.744653] print_address_description+0x7c/0x1ec [ 73.745475] print_report+0x50/0x68 [ 73.746100] kasan_report_invalid_free+0x9c/0xe4 [ 73.746572] __kasan_kfree_large+0x68/0x78 [ 73.747105] free_large_kmalloc+0x60/0xe4 [ 73.747588] kfree+0x70/0x74 [ 73.747993] kmalloc_pagealloc_invalid_free+0x80/0x120 [ 73.748538] kunit_try_run_case+0x80/0x184 [ 73.749104] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.749701] kthread+0x16c/0x21c [ 73.750161] ret_from_fork+0x10/0x20 [ 73.750574] [ 73.750790] The buggy address belongs to the physical page: [ 73.751245] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 73.752122] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 73.752760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 73.753448] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 73.754579] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 73.755185] page dumped because: kasan: bad access detected [ 73.755633] [ 73.756107] Memory state around the buggy address: [ 73.756545] ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.757192] ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.757834] >ffff0000c58c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.758422] ^ [ 73.758795] ffff0000c58c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.759441] ffff0000c58c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.760563] ==================================================================
[ 72.356152] ================================================================== [ 72.356952] BUG: KASAN: invalid-free in kfree+0x74/0x80 [ 72.357443] Free of addr ffff0000c5a04001 by task kunit_try_catch/125 [ 72.358499] [ 72.358865] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.360061] Hardware name: linux,dummy-virt (DT) [ 72.360726] Call trace: [ 72.361108] dump_backtrace.part.0+0xdc/0xf0 [ 72.361820] show_stack+0x18/0x30 [ 72.362458] dump_stack_lvl+0x64/0x80 [ 72.363031] print_report+0x158/0x438 [ 72.363621] kasan_report_invalid_free+0x9c/0xc0 [ 72.364267] __kasan_kfree_large+0x54/0xa0 [ 72.364871] free_large_kmalloc+0x5c/0xf0 [ 72.365464] kfree+0x74/0x80 [ 72.365824] kmalloc_pagealloc_invalid_free+0xa0/0x1b0 [ 72.366642] kunit_try_run_case+0x84/0x120 [ 72.367317] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.368159] kthread+0x180/0x190 [ 72.368674] ret_from_fork+0x10/0x20 [ 72.369220] [ 72.369475] The buggy address belongs to the physical page: [ 72.369848] page:00000000275a55ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04 [ 72.370419] head:00000000275a55ef order:2 compound_mapcount:0 compound_pincount:0 [ 72.370876] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.371432] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.372558] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.373600] page dumped because: kasan: bad access detected [ 72.374429] [ 72.374715] Memory state around the buggy address: [ 72.375425] ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.376418] ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.377323] >ffff0000c5a04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.378249] ^ [ 72.378817] ffff0000c5a04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.379840] ffff0000c5a04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.380720] ==================================================================
[ 64.057338] ================================================================== [ 64.058924] BUG: KASAN: invalid-free in kfree+0x6c/0x70 [ 64.059659] Free of addr ffff0000c5994001 by task kunit_try_catch/123 [ 64.060418] [ 64.060682] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.061711] Hardware name: linux,dummy-virt (DT) [ 64.062306] Call trace: [ 64.062646] dump_backtrace+0x110/0x120 [ 64.063224] show_stack+0x18/0x28 [ 64.063750] dump_stack_lvl+0x68/0x84 [ 64.064307] print_report+0x158/0x484 [ 64.064825] kasan_report_invalid_free+0x84/0xa0 [ 64.065502] __kasan_kfree_large+0x54/0xa0 [ 64.066057] free_large_kmalloc+0x58/0xe8 [ 64.066625] kfree+0x6c/0x70 [ 64.067067] kmalloc_pagealloc_invalid_free+0xc0/0x1c0 [ 64.067766] kunit_try_run_case+0x7c/0x120 [ 64.068351] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.069068] kthread+0x1a4/0x1b8 [ 64.069642] ret_from_fork+0x10/0x20 [ 64.070205] [ 64.070489] The buggy address belongs to the physical page: [ 64.071021] page:00000000b32ac4a2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105994 [ 64.071544] head:00000000b32ac4a2 order:2 compound_mapcount:0 compound_pincount:0 [ 64.071961] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 64.072704] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 64.073674] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 64.074754] page dumped because: kasan: bad access detected [ 64.075414] [ 64.075678] Memory state around the buggy address: [ 64.076285] ffff0000c5993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.077125] ffff0000c5993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.078043] >ffff0000c5994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.078952] ^ [ 64.079478] ffff0000c5994080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.080343] ffff0000c5994100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.081169] ==================================================================
[ 30.382055] ================================================================== [ 30.383276] BUG: KASAN: invalid-free in kfree+0xfa/0x120 [ 30.383563] Free of addr ffff8881036bc001 by task kunit_try_catch/229 [ 30.383865] [ 30.383989] CPU: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.384416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.384801] Call Trace: [ 30.384967] <TASK> [ 30.385100] dump_stack_lvl+0x49/0x62 [ 30.385361] print_report+0x189/0x492 [ 30.385587] ? kasan_addr_to_slab+0xd/0xb0 [ 30.385807] ? kfree+0xfa/0x120 [ 30.386009] kasan_report_invalid_free+0xd8/0x150 [ 30.386295] ? kfree+0xfa/0x120 [ 30.386508] ? kfree+0xfa/0x120 [ 30.386661] __kasan_kfree_large+0x82/0xd0 [ 30.386913] free_large_kmalloc+0x45/0xb0 [ 30.387171] kfree+0xfa/0x120 [ 30.387330] kmalloc_pagealloc_invalid_free+0xa7/0x1b0 [ 30.387610] ? kmalloc_large_oob_right+0x1e0/0x1e0 [ 30.387848] ? __kunit_add_resource+0xd1/0x100 [ 30.388090] ? kasan_test_init+0x13e/0x1b0 [ 30.388394] kunit_try_run_case+0x8f/0xd0 [ 30.388631] ? kunit_catch_run_case+0x80/0x80 [ 30.388826] ? kunit_try_catch_throw+0x40/0x40 [ 30.389088] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.389465] kthread+0x17b/0x1b0 [ 30.389804] ? kthread_complete_and_exit+0x30/0x30 [ 30.390049] ret_from_fork+0x22/0x30 [ 30.390279] </TASK> [ 30.390421] [ 30.390509] The buggy address belongs to the physical page: [ 30.390808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036bc [ 30.391224] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0 [ 30.391894] flags: 0x200000000010000(head|node=0|zone=2) [ 30.392219] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000 [ 30.392927] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.393307] page dumped because: kasan: bad access detected [ 30.393702] [ 30.393896] Memory state around the buggy address: [ 30.394115] ffff8881036bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.394679] ffff8881036bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.395099] >ffff8881036bc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.395457] ^ [ 30.395640] ffff8881036bc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.395956] ffff8881036bc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.396302] ==================================================================