Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.650182] ================================================================== [ 16.650276] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.650344] Free of addr fff00000c65b0001 by task kunit_try_catch/150 [ 16.650389] [ 16.650426] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.650628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.650665] Hardware name: linux,dummy-virt (DT) [ 16.650713] Call trace: [ 16.650737] show_stack+0x20/0x38 (C) [ 16.650813] dump_stack_lvl+0x8c/0xd0 [ 16.650906] print_report+0x118/0x5d0 [ 16.650997] kasan_report_invalid_free+0xc0/0xe8 [ 16.651053] __kasan_kfree_large+0x5c/0xa8 [ 16.651100] free_large_kmalloc+0x64/0x190 [ 16.651167] kfree+0x270/0x3c8 [ 16.651437] kmalloc_large_invalid_free+0x108/0x270 [ 16.651548] kunit_try_run_case+0x170/0x3f0 [ 16.651697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.651795] kthread+0x328/0x630 [ 16.651976] ret_from_fork+0x10/0x20 [ 16.652107] [ 16.652222] The buggy address belongs to the physical page: [ 16.652289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 16.652347] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.652391] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.652464] page_type: f8(unknown) [ 16.652506] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.652589] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.652637] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.652684] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.652731] head: 0bfffe0000000002 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff [ 16.652778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.652983] page dumped because: kasan: bad access detected [ 16.653041] [ 16.653150] Memory state around the buggy address: [ 16.653228] fff00000c65aff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653313] fff00000c65aff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.653422] >fff00000c65b0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.653471] ^ [ 16.653601] fff00000c65b0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.653709] fff00000c65b0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.653839] ==================================================================
[ 16.356711] ================================================================== [ 16.357394] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.357741] Free of addr fff00000c669c001 by task kunit_try_catch/150 [ 16.357816] [ 16.358359] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.359123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.359204] Hardware name: linux,dummy-virt (DT) [ 16.359591] Call trace: [ 16.359995] show_stack+0x20/0x38 (C) [ 16.360302] dump_stack_lvl+0x8c/0xd0 [ 16.360580] print_report+0x118/0x5d0 [ 16.360639] kasan_report_invalid_free+0xc0/0xe8 [ 16.360689] __kasan_kfree_large+0x5c/0xa8 [ 16.360736] free_large_kmalloc+0x64/0x190 [ 16.361804] kfree+0x270/0x3c8 [ 16.361861] kmalloc_large_invalid_free+0x108/0x270 [ 16.362461] kunit_try_run_case+0x170/0x3f0 [ 16.362773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.362838] kthread+0x328/0x630 [ 16.363367] ret_from_fork+0x10/0x20 [ 16.364074] [ 16.364191] The buggy address belongs to the physical page: [ 16.364508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c [ 16.364865] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.365297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.365933] page_type: f8(unknown) [ 16.366145] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.367034] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.367335] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.367387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.367443] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff [ 16.367490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.368677] page dumped because: kasan: bad access detected [ 16.368727] [ 16.369073] Memory state around the buggy address: [ 16.369312] fff00000c669bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.369764] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.370359] >fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.370742] ^ [ 16.370783] fff00000c669c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.370961] fff00000c669c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.371223] ==================================================================
[ 16.394515] ================================================================== [ 16.394893] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 16.395252] Free of addr fff00000c76d8001 by task kunit_try_catch/150 [ 16.395307] [ 16.395357] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.395439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.395752] Hardware name: linux,dummy-virt (DT) [ 16.395821] Call trace: [ 16.395890] show_stack+0x20/0x38 (C) [ 16.396050] dump_stack_lvl+0x8c/0xd0 [ 16.396177] print_report+0x118/0x5d0 [ 16.396290] kasan_report_invalid_free+0xc0/0xe8 [ 16.396609] __kasan_kfree_large+0x5c/0xa8 [ 16.396729] free_large_kmalloc+0x64/0x190 [ 16.397025] kfree+0x270/0x3c8 [ 16.397122] kmalloc_large_invalid_free+0x108/0x270 [ 16.397553] kunit_try_run_case+0x170/0x3f0 [ 16.397638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.397817] kthread+0x328/0x630 [ 16.397893] ret_from_fork+0x10/0x20 [ 16.398107] [ 16.398158] The buggy address belongs to the physical page: [ 16.398192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d8 [ 16.398543] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.398762] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.398941] page_type: f8(unknown) [ 16.399001] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.399256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.399328] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.399544] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.399689] head: 0bfffe0000000002 ffffc1ffc31db601 00000000ffffffff 00000000ffffffff [ 16.399924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.400021] page dumped because: kasan: bad access detected [ 16.400159] [ 16.400178] Memory state around the buggy address: [ 16.400218] fff00000c76d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.400452] fff00000c76d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.400669] >fff00000c76d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.400721] ^ [ 16.401619] fff00000c76d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.401707] fff00000c76d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.401801] ==================================================================
[ 11.525982] ================================================================== [ 11.526415] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 11.526929] Free of addr ffff888102be4001 by task kunit_try_catch/168 [ 11.528015] [ 11.528272] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.528336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.528347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.528367] Call Trace: [ 11.528379] <TASK> [ 11.528393] dump_stack_lvl+0x73/0xb0 [ 11.528488] print_report+0xd1/0x610 [ 11.528524] ? __virt_addr_valid+0x1db/0x2d0 [ 11.528562] ? kasan_addr_to_slab+0x11/0xa0 [ 11.528584] ? kfree+0x274/0x3f0 [ 11.528606] kasan_report_invalid_free+0x10a/0x130 [ 11.528633] ? kfree+0x274/0x3f0 [ 11.528657] ? kfree+0x274/0x3f0 [ 11.528677] __kasan_kfree_large+0x86/0xd0 [ 11.528700] free_large_kmalloc+0x4b/0x110 [ 11.528725] kfree+0x274/0x3f0 [ 11.528751] kmalloc_large_invalid_free+0x120/0x2b0 [ 11.528775] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 11.528801] ? __schedule+0x10cc/0x2b60 [ 11.528824] ? __pfx_read_tsc+0x10/0x10 [ 11.528845] ? ktime_get_ts64+0x86/0x230 [ 11.528873] kunit_try_run_case+0x1a5/0x480 [ 11.528899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.528923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.528948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.528973] ? __kthread_parkme+0x82/0x180 [ 11.528994] ? preempt_count_sub+0x50/0x80 [ 11.529020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.529045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.529071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.529098] kthread+0x337/0x6f0 [ 11.529117] ? trace_preempt_on+0x20/0xc0 [ 11.529146] ? __pfx_kthread+0x10/0x10 [ 11.529168] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.529191] ? calculate_sigpending+0x7b/0xa0 [ 11.529216] ? __pfx_kthread+0x10/0x10 [ 11.529238] ret_from_fork+0x116/0x1d0 [ 11.529258] ? __pfx_kthread+0x10/0x10 [ 11.529279] ret_from_fork_asm+0x1a/0x30 [ 11.529312] </TASK> [ 11.529322] [ 11.539270] The buggy address belongs to the physical page: [ 11.539818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be4 [ 11.540315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.540836] flags: 0x200000000000040(head|node=0|zone=2) [ 11.541093] page_type: f8(unknown) [ 11.541287] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.542026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.542982] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.543837] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.544527] head: 0200000000000002 ffffea00040af901 00000000ffffffff 00000000ffffffff [ 11.545117] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.545971] page dumped because: kasan: bad access detected [ 11.546223] [ 11.546312] Memory state around the buggy address: [ 11.547045] ffff888102be3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.547403] ffff888102be3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.547652] >ffff888102be4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.547874] ^ [ 11.547995] ffff888102be4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.548215] ffff888102be4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.548467] ==================================================================
[ 11.657201] ================================================================== [ 11.657700] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 11.658378] Free of addr ffff888102850001 by task kunit_try_catch/167 [ 11.658627] [ 11.658723] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.658771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.658782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.658805] Call Trace: [ 11.658818] <TASK> [ 11.658836] dump_stack_lvl+0x73/0xb0 [ 11.658869] print_report+0xd1/0x610 [ 11.658892] ? __virt_addr_valid+0x1db/0x2d0 [ 11.658916] ? kasan_addr_to_slab+0x11/0xa0 [ 11.658937] ? kfree+0x274/0x3f0 [ 11.658958] kasan_report_invalid_free+0x10a/0x130 [ 11.658982] ? kfree+0x274/0x3f0 [ 11.659004] ? kfree+0x274/0x3f0 [ 11.659055] __kasan_kfree_large+0x86/0xd0 [ 11.659076] free_large_kmalloc+0x4b/0x110 [ 11.659099] kfree+0x274/0x3f0 [ 11.659123] kmalloc_large_invalid_free+0x120/0x2b0 [ 11.659146] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 11.659169] ? __schedule+0x10cc/0x2b60 [ 11.659191] ? __pfx_read_tsc+0x10/0x10 [ 11.659211] ? ktime_get_ts64+0x86/0x230 [ 11.659236] kunit_try_run_case+0x1a5/0x480 [ 11.659262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.659285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.659309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.659332] ? __kthread_parkme+0x82/0x180 [ 11.659353] ? preempt_count_sub+0x50/0x80 [ 11.659376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.659400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.659424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.659447] kthread+0x337/0x6f0 [ 11.659465] ? trace_preempt_on+0x20/0xc0 [ 11.659487] ? __pfx_kthread+0x10/0x10 [ 11.659507] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.659528] ? calculate_sigpending+0x7b/0xa0 [ 11.659551] ? __pfx_kthread+0x10/0x10 [ 11.659572] ret_from_fork+0x116/0x1d0 [ 11.659589] ? __pfx_kthread+0x10/0x10 [ 11.659609] ret_from_fork_asm+0x1a/0x30 [ 11.659639] </TASK> [ 11.659649] [ 11.666649] The buggy address belongs to the physical page: [ 11.666927] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850 [ 11.667260] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.667557] flags: 0x200000000000040(head|node=0|zone=2) [ 11.667776] page_type: f8(unknown) [ 11.667906] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.668452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.669608] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.669862] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.670965] head: 0200000000000002 ffffea00040a1401 00000000ffffffff 00000000ffffffff [ 11.671443] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.671715] page dumped because: kasan: bad access detected [ 11.671886] [ 11.672319] Memory state around the buggy address: [ 11.672858] ffff88810284ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.673481] ffff88810284ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.673982] >ffff888102850000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.674422] ^ [ 11.674586] ffff888102850080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.674871] ffff888102850100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.675575] ==================================================================
[ 11.735572] ================================================================== [ 11.736068] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 11.736372] Free of addr ffff8881039d8001 by task kunit_try_catch/167 [ 11.736820] [ 11.736935] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.736979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.736991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.737012] Call Trace: [ 11.737024] <TASK> [ 11.737041] dump_stack_lvl+0x73/0xb0 [ 11.737071] print_report+0xd1/0x610 [ 11.737094] ? __virt_addr_valid+0x1db/0x2d0 [ 11.737129] ? kasan_addr_to_slab+0x11/0xa0 [ 11.737149] ? kfree+0x274/0x3f0 [ 11.737170] kasan_report_invalid_free+0x10a/0x130 [ 11.737194] ? kfree+0x274/0x3f0 [ 11.737217] ? kfree+0x274/0x3f0 [ 11.737237] __kasan_kfree_large+0x86/0xd0 [ 11.737257] free_large_kmalloc+0x4b/0x110 [ 11.737280] kfree+0x274/0x3f0 [ 11.737305] kmalloc_large_invalid_free+0x120/0x2b0 [ 11.737328] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 11.737351] ? __schedule+0x10cc/0x2b60 [ 11.737373] ? __pfx_read_tsc+0x10/0x10 [ 11.737394] ? ktime_get_ts64+0x86/0x230 [ 11.737419] kunit_try_run_case+0x1a5/0x480 [ 11.737444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.737465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.737488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.737511] ? __kthread_parkme+0x82/0x180 [ 11.737532] ? preempt_count_sub+0x50/0x80 [ 11.737556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.737579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.737603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.737626] kthread+0x337/0x6f0 [ 11.737645] ? trace_preempt_on+0x20/0xc0 [ 11.737730] ? __pfx_kthread+0x10/0x10 [ 11.737752] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.737774] ? calculate_sigpending+0x7b/0xa0 [ 11.737798] ? __pfx_kthread+0x10/0x10 [ 11.737818] ret_from_fork+0x116/0x1d0 [ 11.737837] ? __pfx_kthread+0x10/0x10 [ 11.737856] ret_from_fork_asm+0x1a/0x30 [ 11.737889] </TASK> [ 11.737911] [ 11.750965] The buggy address belongs to the physical page: [ 11.751443] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d8 [ 11.752365] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.752824] flags: 0x200000000000040(head|node=0|zone=2) [ 11.753351] page_type: f8(unknown) [ 11.753564] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.754275] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.755030] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 11.755318] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 11.755721] head: 0200000000000002 ffffea00040e7601 00000000ffffffff 00000000ffffffff [ 11.756629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 11.757434] page dumped because: kasan: bad access detected [ 11.757994] [ 11.758154] Memory state around the buggy address: [ 11.758634] ffff8881039d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.758953] ffff8881039d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.759190] >ffff8881039d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.759403] ^ [ 11.759520] ffff8881039d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.759737] ffff8881039d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 11.760091] ==================================================================