Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.974713] ================================================================== [ 30.974783] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.974832] Free of addr fff00000c919c7c0 by task kunit_try_catch/225 [ 30.974875] [ 30.974903] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 30.975004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.975032] Hardware name: linux,dummy-virt (DT) [ 30.975400] Call trace: [ 30.975493] show_stack+0x20/0x38 (C) [ 30.975696] dump_stack_lvl+0x8c/0xd0 [ 30.975757] print_report+0x118/0x608 [ 30.976037] kasan_report_invalid_free+0xc0/0xe8 [ 30.976136] check_slab_allocation+0xd4/0x108 [ 30.976267] __kasan_slab_pre_free+0x2c/0x48 [ 30.976369] kfree+0xe8/0x3c8 [ 30.976427] kfree_sensitive+0x3c/0xb0 [ 30.976606] kmalloc_double_kzfree+0x168/0x308 [ 30.976693] kunit_try_run_case+0x170/0x3f0 [ 30.976759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.976992] kthread+0x328/0x630 [ 30.977127] ret_from_fork+0x10/0x20 [ 30.977359] [ 30.977448] Allocated by task 225: [ 30.977498] kasan_save_stack+0x3c/0x68 [ 30.977576] kasan_save_track+0x20/0x40 [ 30.977695] kasan_save_alloc_info+0x40/0x58 [ 30.977762] __kasan_kmalloc+0xd4/0xd8 [ 30.977836] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.978278] kmalloc_double_kzfree+0xb8/0x308 [ 30.978359] kunit_try_run_case+0x170/0x3f0 [ 30.978442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.978622] kthread+0x328/0x630 [ 30.978679] ret_from_fork+0x10/0x20 [ 30.978743] [ 30.979135] Freed by task 225: [ 30.979188] kasan_save_stack+0x3c/0x68 [ 30.979235] kasan_save_track+0x20/0x40 [ 30.979680] kasan_save_free_info+0x4c/0x78 [ 30.979748] __kasan_slab_free+0x6c/0x98 [ 30.979831] kfree+0x214/0x3c8 [ 30.979889] kfree_sensitive+0x80/0xb0 [ 30.980043] kmalloc_double_kzfree+0x11c/0x308 [ 30.980111] kunit_try_run_case+0x170/0x3f0 [ 30.980318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.980537] kthread+0x328/0x630 [ 30.980608] ret_from_fork+0x10/0x20 [ 30.980734] [ 30.980823] The buggy address belongs to the object at fff00000c919c7c0 [ 30.980823] which belongs to the cache kmalloc-16 of size 16 [ 30.980910] The buggy address is located 0 bytes inside of [ 30.980910] 16-byte region [fff00000c919c7c0, fff00000c919c7d0) [ 30.981436] [ 30.981484] The buggy address belongs to the physical page: [ 30.981549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c919c6c0 pfn:0x10919c [ 30.981782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.981987] page_type: f5(slab) [ 30.982089] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.982166] raw: fff00000c919c6c0 000000008080007f 00000000f5000000 0000000000000000 [ 30.982271] page dumped because: kasan: bad access detected [ 30.982341] [ 30.982382] Memory state around the buggy address: [ 30.982656] fff00000c919c680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 30.982712] fff00000c919c700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.983079] >fff00000c919c780: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.983219] ^ [ 30.983279] fff00000c919c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983344] fff00000c919c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983444] ==================================================================
[ 32.717533] ================================================================== [ 32.717606] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 32.717654] Free of addr fff00000c57889c0 by task kunit_try_catch/223 [ 32.717698] [ 32.717726] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.717814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.717840] Hardware name: linux,dummy-virt (DT) [ 32.717871] Call trace: [ 32.717893] show_stack+0x20/0x38 (C) [ 32.717942] dump_stack_lvl+0x8c/0xd0 [ 32.717988] print_report+0x118/0x608 [ 32.718036] kasan_report_invalid_free+0xc0/0xe8 [ 32.718088] check_slab_allocation+0xd4/0x108 [ 32.718137] __kasan_slab_pre_free+0x2c/0x48 [ 32.718204] kfree+0xe8/0x3c8 [ 32.718289] kfree_sensitive+0x3c/0xb0 [ 32.718338] kmalloc_double_kzfree+0x168/0x308 [ 32.718387] kunit_try_run_case+0x170/0x3f0 [ 32.718436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.718489] kthread+0x328/0x630 [ 32.718532] ret_from_fork+0x10/0x20 [ 32.718584] [ 32.718632] Allocated by task 223: [ 32.718671] kasan_save_stack+0x3c/0x68 [ 32.718714] kasan_save_track+0x20/0x40 [ 32.718752] kasan_save_alloc_info+0x40/0x58 [ 32.718789] __kasan_kmalloc+0xd4/0xd8 [ 32.718835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.718883] kmalloc_double_kzfree+0xb8/0x308 [ 32.718923] kunit_try_run_case+0x170/0x3f0 [ 32.718961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.719005] kthread+0x328/0x630 [ 32.719038] ret_from_fork+0x10/0x20 [ 32.719212] [ 32.719234] Freed by task 223: [ 32.719262] kasan_save_stack+0x3c/0x68 [ 32.719324] kasan_save_track+0x20/0x40 [ 32.719371] kasan_save_free_info+0x4c/0x78 [ 32.719417] __kasan_slab_free+0x6c/0x98 [ 32.719478] kfree+0x214/0x3c8 [ 32.719544] kfree_sensitive+0x80/0xb0 [ 32.719614] kmalloc_double_kzfree+0x11c/0x308 [ 32.719695] kunit_try_run_case+0x170/0x3f0 [ 32.719776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.719876] kthread+0x328/0x630 [ 32.719944] ret_from_fork+0x10/0x20 [ 32.720058] [ 32.720121] The buggy address belongs to the object at fff00000c57889c0 [ 32.720121] which belongs to the cache kmalloc-16 of size 16 [ 32.720299] The buggy address is located 0 bytes inside of [ 32.720299] 16-byte region [fff00000c57889c0, fff00000c57889d0) [ 32.720363] [ 32.720397] The buggy address belongs to the physical page: [ 32.720430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105788 [ 32.720481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.720674] page_type: f5(slab) [ 32.720746] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.720867] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.720947] page dumped because: kasan: bad access detected [ 32.721021] [ 32.721070] Memory state around the buggy address: [ 32.721181] fff00000c5788880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.721254] fff00000c5788900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.721367] >fff00000c5788980: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 32.721425] ^ [ 32.721504] fff00000c5788a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.721596] fff00000c5788a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.721672] ==================================================================
[ 23.409733] ================================================================== [ 23.410087] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 [ 23.410382] Free of addr ffff88810586d4a0 by task kunit_try_catch/240 [ 23.411120] [ 23.411256] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.411303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.411325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.411375] Call Trace: [ 23.411392] <TASK> [ 23.411407] dump_stack_lvl+0x73/0xb0 [ 23.411448] print_report+0xd1/0x650 [ 23.411469] ? __virt_addr_valid+0x1db/0x2d0 [ 23.411492] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.411517] ? kfree_sensitive+0x2e/0x90 [ 23.411567] kasan_report_invalid_free+0x10a/0x130 [ 23.411592] ? kfree_sensitive+0x2e/0x90 [ 23.411616] ? kfree_sensitive+0x2e/0x90 [ 23.411649] check_slab_allocation+0x101/0x130 [ 23.411749] __kasan_slab_pre_free+0x28/0x40 [ 23.411787] kfree+0xf0/0x3f0 [ 23.411808] ? kfree_sensitive+0x2e/0x90 [ 23.411915] kfree_sensitive+0x2e/0x90 [ 23.411940] kmalloc_double_kzfree+0x19c/0x350 [ 23.411962] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 23.412144] ? __schedule+0x10cc/0x2b60 [ 23.412167] ? __pfx_read_tsc+0x10/0x10 [ 23.412188] ? ktime_get_ts64+0x86/0x230 [ 23.412212] kunit_try_run_case+0x1a5/0x480 [ 23.412236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.412259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.412469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.412509] ? __kthread_parkme+0x82/0x180 [ 23.412530] ? preempt_count_sub+0x50/0x80 [ 23.412563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.412588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.412611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.412635] kthread+0x337/0x6f0 [ 23.412654] ? trace_preempt_on+0x20/0xc0 [ 23.412723] ? __pfx_kthread+0x10/0x10 [ 23.412747] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.412770] ? calculate_sigpending+0x7b/0xa0 [ 23.412792] ? __pfx_kthread+0x10/0x10 [ 23.412813] ret_from_fork+0x116/0x1d0 [ 23.412832] ? __pfx_kthread+0x10/0x10 [ 23.412851] ret_from_fork_asm+0x1a/0x30 [ 23.412882] </TASK> [ 23.412893] [ 23.421689] Allocated by task 240: [ 23.421940] kasan_save_stack+0x45/0x70 [ 23.422169] kasan_save_track+0x18/0x40 [ 23.422389] kasan_save_alloc_info+0x3b/0x50 [ 23.422665] __kasan_kmalloc+0xb7/0xc0 [ 23.422975] __kmalloc_cache_noprof+0x189/0x420 [ 23.423198] kmalloc_double_kzfree+0xa9/0x350 [ 23.423396] kunit_try_run_case+0x1a5/0x480 [ 23.423670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.423871] kthread+0x337/0x6f0 [ 23.424106] ret_from_fork+0x116/0x1d0 [ 23.424324] ret_from_fork_asm+0x1a/0x30 [ 23.424517] [ 23.424615] Freed by task 240: [ 23.424915] kasan_save_stack+0x45/0x70 [ 23.425048] kasan_save_track+0x18/0x40 [ 23.425171] kasan_save_free_info+0x3f/0x60 [ 23.425318] __kasan_slab_free+0x56/0x70 [ 23.425444] kfree+0x222/0x3f0 [ 23.425913] kfree_sensitive+0x67/0x90 [ 23.426134] kmalloc_double_kzfree+0x12b/0x350 [ 23.426394] kunit_try_run_case+0x1a5/0x480 [ 23.426673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.426933] kthread+0x337/0x6f0 [ 23.427042] ret_from_fork+0x116/0x1d0 [ 23.427161] ret_from_fork_asm+0x1a/0x30 [ 23.427287] [ 23.427359] The buggy address belongs to the object at ffff88810586d4a0 [ 23.427359] which belongs to the cache kmalloc-16 of size 16 [ 23.427865] The buggy address is located 0 bytes inside of [ 23.427865] 16-byte region [ffff88810586d4a0, ffff88810586d4b0) [ 23.428666] [ 23.428843] The buggy address belongs to the physical page: [ 23.429179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 23.429632] flags: 0x200000000000000(node=0|zone=2) [ 23.429919] page_type: f5(slab) [ 23.430037] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.430252] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.430716] page dumped because: kasan: bad access detected [ 23.431058] [ 23.431190] Memory state around the buggy address: [ 23.431493] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.432013] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.432389] >ffff88810586d480: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 23.432821] ^ [ 23.432958] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.433213] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.433627] ==================================================================
[ 23.703616] ================================================================== [ 23.703920] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 [ 23.704414] Free of addr ffff8881049ad5a0 by task kunit_try_catch/241 [ 23.704618] [ 23.704714] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.704768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.704781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.704804] Call Trace: [ 23.704827] <TASK> [ 23.704849] dump_stack_lvl+0x73/0xb0 [ 23.704881] print_report+0xd1/0x650 [ 23.704905] ? __virt_addr_valid+0x1db/0x2d0 [ 23.704931] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.704957] ? kfree_sensitive+0x2e/0x90 [ 23.704983] kasan_report_invalid_free+0x10a/0x130 [ 23.705007] ? kfree_sensitive+0x2e/0x90 [ 23.705031] ? kfree_sensitive+0x2e/0x90 [ 23.705054] check_slab_allocation+0x101/0x130 [ 23.705101] __kasan_slab_pre_free+0x28/0x40 [ 23.705121] kfree+0xf0/0x3f0 [ 23.705144] ? kfree_sensitive+0x2e/0x90 [ 23.705169] kfree_sensitive+0x2e/0x90 [ 23.705192] kmalloc_double_kzfree+0x19c/0x350 [ 23.705214] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 23.705253] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.705277] ? trace_hardirqs_on+0x37/0xe0 [ 23.705300] ? __pfx_read_tsc+0x10/0x10 [ 23.705322] ? ktime_get_ts64+0x86/0x230 [ 23.705346] kunit_try_run_case+0x1a5/0x480 [ 23.705373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.705397] ? queued_spin_lock_slowpath+0x116/0xb40 [ 23.705419] ? __kthread_parkme+0x82/0x180 [ 23.705440] ? preempt_count_sub+0x50/0x80 [ 23.705464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.705488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.705512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.705536] kthread+0x337/0x6f0 [ 23.705555] ? trace_preempt_on+0x20/0xc0 [ 23.705576] ? __pfx_kthread+0x10/0x10 [ 23.705597] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.705620] ? calculate_sigpending+0x7b/0xa0 [ 23.705644] ? __pfx_kthread+0x10/0x10 [ 23.705665] ret_from_fork+0x116/0x1d0 [ 23.705684] ? __pfx_kthread+0x10/0x10 [ 23.705704] ret_from_fork_asm+0x1a/0x30 [ 23.705736] </TASK> [ 23.705748] [ 23.713771] Allocated by task 241: [ 23.714081] kasan_save_stack+0x45/0x70 [ 23.714426] kasan_save_track+0x18/0x40 [ 23.714617] kasan_save_alloc_info+0x3b/0x50 [ 23.714831] __kasan_kmalloc+0xb7/0xc0 [ 23.715134] __kmalloc_cache_noprof+0x189/0x420 [ 23.715496] kmalloc_double_kzfree+0xa9/0x350 [ 23.715716] kunit_try_run_case+0x1a5/0x480 [ 23.715920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.716131] kthread+0x337/0x6f0 [ 23.716250] ret_from_fork+0x116/0x1d0 [ 23.716468] ret_from_fork_asm+0x1a/0x30 [ 23.716674] [ 23.716762] Freed by task 241: [ 23.716909] kasan_save_stack+0x45/0x70 [ 23.717102] kasan_save_track+0x18/0x40 [ 23.717233] kasan_save_free_info+0x3f/0x60 [ 23.717372] __kasan_slab_free+0x56/0x70 [ 23.717510] kfree+0x222/0x3f0 [ 23.717899] kfree_sensitive+0x67/0x90 [ 23.718112] kmalloc_double_kzfree+0x12b/0x350 [ 23.718325] kunit_try_run_case+0x1a5/0x480 [ 23.718670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.718846] kthread+0x337/0x6f0 [ 23.719051] ret_from_fork+0x116/0x1d0 [ 23.719519] ret_from_fork_asm+0x1a/0x30 [ 23.719730] [ 23.719822] The buggy address belongs to the object at ffff8881049ad5a0 [ 23.719822] which belongs to the cache kmalloc-16 of size 16 [ 23.720467] The buggy address is located 0 bytes inside of [ 23.720467] 16-byte region [ffff8881049ad5a0, ffff8881049ad5b0) [ 23.720800] [ 23.720870] The buggy address belongs to the physical page: [ 23.721132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 23.721564] flags: 0x200000000000000(node=0|zone=2) [ 23.721807] page_type: f5(slab) [ 23.722022] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.722394] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.722619] page dumped because: kasan: bad access detected [ 23.722785] [ 23.722855] Memory state around the buggy address: [ 23.723171] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.723487] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.723783] >ffff8881049ad580: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 23.724437] ^ [ 23.724611] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.724821] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.725136] ==================================================================