Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64

[   19.744994] ==================================================================
[   19.745127] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   19.745233] Free of addr fff00000c4561b20 by task kunit_try_catch/193
[   19.745322] 
[   19.745391] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.745572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.745631] Hardware name: linux,dummy-virt (DT)
[   19.745706] Call trace:
[   19.745772]  show_stack+0x20/0x38 (C)
[   19.745942]  dump_stack_lvl+0x8c/0xd0
[   19.746041]  print_report+0x118/0x608
[   19.746174]  kasan_report_invalid_free+0xc0/0xe8
[   19.746328]  check_slab_allocation+0xd4/0x108
[   19.746479]  __kasan_slab_pre_free+0x2c/0x48
[   19.746641]  kfree+0xe8/0x3c8
[   19.746787]  kfree_sensitive+0x3c/0xb0
[   19.747167]  kmalloc_double_kzfree+0x168/0x308
[   19.747460]  kunit_try_run_case+0x170/0x3f0
[   19.747694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.747815]  kthread+0x328/0x630
[   19.747927]  ret_from_fork+0x10/0x20
[   19.748076] 
[   19.748183] Allocated by task 193:
[   19.748294]  kasan_save_stack+0x3c/0x68
[   19.748568]  kasan_save_track+0x20/0x40
[   19.748673]  kasan_save_alloc_info+0x40/0x58
[   19.748764]  __kasan_kmalloc+0xd4/0xd8
[   19.748968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.749165]  kmalloc_double_kzfree+0xb8/0x308
[   19.749256]  kunit_try_run_case+0x170/0x3f0
[   19.749456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.749579]  kthread+0x328/0x630
[   19.749654]  ret_from_fork+0x10/0x20
[   19.749735] 
[   19.749782] Freed by task 193:
[   19.749856]  kasan_save_stack+0x3c/0x68
[   19.750097]  kasan_save_track+0x20/0x40
[   19.750386]  kasan_save_free_info+0x4c/0x78
[   19.750559]  __kasan_slab_free+0x6c/0x98
[   19.750673]  kfree+0x214/0x3c8
[   19.750749]  kfree_sensitive+0x80/0xb0
[   19.750842]  kmalloc_double_kzfree+0x11c/0x308
[   19.750973]  kunit_try_run_case+0x170/0x3f0
[   19.751184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.751442]  kthread+0x328/0x630
[   19.751551]  ret_from_fork+0x10/0x20
[   19.751798] 
[   19.752006] The buggy address belongs to the object at fff00000c4561b20
[   19.752006]  which belongs to the cache kmalloc-16 of size 16
[   19.752245] The buggy address is located 0 bytes inside of
[   19.752245]  16-byte region [fff00000c4561b20, fff00000c4561b30)
[   19.752393] 
[   19.752439] The buggy address belongs to the physical page:
[   19.752630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104561
[   19.753073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.753249] page_type: f5(slab)
[   19.753385] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.753559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.753693] page dumped because: kasan: bad access detected
[   19.753778] 
[   19.753832] Memory state around the buggy address:
[   19.753916]  fff00000c4561a00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   19.754059]  fff00000c4561a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.754173] >fff00000c4561b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   19.754250]                                ^
[   19.754336]  fff00000c4561b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.754423]  fff00000c4561c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.754508] ==================================================================