Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.410691] ==================================================================
[   31.411162] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.411955] Free of addr fff00000c406c000 by task kunit_try_catch/242
[   31.412102] 
[   31.412148] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   31.412681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.412715] Hardware name: linux,dummy-virt (DT)
[   31.412751] Call trace:
[   31.413035]  show_stack+0x20/0x38 (C)
[   31.413119]  dump_stack_lvl+0x8c/0xd0
[   31.413295]  print_report+0x118/0x608
[   31.413672]  kasan_report_invalid_free+0xc0/0xe8
[   31.414146]  check_slab_allocation+0xd4/0x108
[   31.414215]  __kasan_slab_pre_free+0x2c/0x48
[   31.414267]  kmem_cache_free+0xf0/0x468
[   31.414318]  kmem_cache_double_free+0x190/0x3c8
[   31.414369]  kunit_try_run_case+0x170/0x3f0
[   31.414422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.414475]  kthread+0x328/0x630
[   31.414521]  ret_from_fork+0x10/0x20
[   31.415204] 
[   31.415230] Allocated by task 242:
[   31.415531]  kasan_save_stack+0x3c/0x68
[   31.415864]  kasan_save_track+0x20/0x40
[   31.415907]  kasan_save_alloc_info+0x40/0x58
[   31.415953]  __kasan_slab_alloc+0xa8/0xb0
[   31.416648]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.416896]  kmem_cache_double_free+0x12c/0x3c8
[   31.416950]  kunit_try_run_case+0x170/0x3f0
[   31.417291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.417377]  kthread+0x328/0x630
[   31.417412]  ret_from_fork+0x10/0x20
[   31.417761] 
[   31.418119] Freed by task 242:
[   31.418325]  kasan_save_stack+0x3c/0x68
[   31.418403]  kasan_save_track+0x20/0x40
[   31.418440]  kasan_save_free_info+0x4c/0x78
[   31.418480]  __kasan_slab_free+0x6c/0x98
[   31.418517]  kmem_cache_free+0x260/0x468
[   31.418553]  kmem_cache_double_free+0x140/0x3c8
[   31.418696]  kunit_try_run_case+0x170/0x3f0
[   31.418875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.419179]  kthread+0x328/0x630
[   31.419219]  ret_from_fork+0x10/0x20
[   31.419257] 
[   31.419277] The buggy address belongs to the object at fff00000c406c000
[   31.419277]  which belongs to the cache test_cache of size 200
[   31.419835] The buggy address is located 0 bytes inside of
[   31.419835]  200-byte region [fff00000c406c000, fff00000c406c0c8)
[   31.419978] 
[   31.420158] The buggy address belongs to the physical page:
[   31.420221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406c
[   31.420285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.420634] page_type: f5(slab)
[   31.420699] raw: 0bfffe0000000000 fff00000c3fa2500 dead000000000122 0000000000000000
[   31.420974] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.421066] page dumped because: kasan: bad access detected
[   31.421099] 
[   31.421118] Memory state around the buggy address:
[   31.421235]  fff00000c406bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.421291]  fff00000c406bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.421688] >fff00000c406c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.422070]                    ^
[   31.422220]  fff00000c406c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.422267]  fff00000c406c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.422652] ==================================================================

[   33.260832] ==================================================================
[   33.260900] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.260974] Free of addr fff00000c9a1c000 by task kunit_try_catch/240
[   33.261019] 
[   33.261061] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.261153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.261194] Hardware name: linux,dummy-virt (DT)
[   33.261230] Call trace:
[   33.261255]  show_stack+0x20/0x38 (C)
[   33.261311]  dump_stack_lvl+0x8c/0xd0
[   33.261363]  print_report+0x118/0x608
[   33.261412]  kasan_report_invalid_free+0xc0/0xe8
[   33.261463]  check_slab_allocation+0xd4/0x108
[   33.261520]  __kasan_slab_pre_free+0x2c/0x48
[   33.261567]  kmem_cache_free+0xf0/0x468
[   33.261617]  kmem_cache_double_free+0x190/0x3c8
[   33.261665]  kunit_try_run_case+0x170/0x3f0
[   33.261718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.261772]  kthread+0x328/0x630
[   33.261816]  ret_from_fork+0x10/0x20
[   33.261866] 
[   33.261884] Allocated by task 240:
[   33.261913]  kasan_save_stack+0x3c/0x68
[   33.261955]  kasan_save_track+0x20/0x40
[   33.261992]  kasan_save_alloc_info+0x40/0x58
[   33.262053]  __kasan_slab_alloc+0xa8/0xb0
[   33.262236]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.262301]  kmem_cache_double_free+0x12c/0x3c8
[   33.262403]  kunit_try_run_case+0x170/0x3f0
[   33.262451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.262639]  kthread+0x328/0x630
[   33.262693]  ret_from_fork+0x10/0x20
[   33.262812] 
[   33.262831] Freed by task 240:
[   33.262857]  kasan_save_stack+0x3c/0x68
[   33.262896]  kasan_save_track+0x20/0x40
[   33.262934]  kasan_save_free_info+0x4c/0x78
[   33.262975]  __kasan_slab_free+0x6c/0x98
[   33.263153]  kmem_cache_free+0x260/0x468
[   33.263202]  kmem_cache_double_free+0x140/0x3c8
[   33.263240]  kunit_try_run_case+0x170/0x3f0
[   33.263278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.263322]  kthread+0x328/0x630
[   33.263353]  ret_from_fork+0x10/0x20
[   33.263390] 
[   33.263409] The buggy address belongs to the object at fff00000c9a1c000
[   33.263409]  which belongs to the cache test_cache of size 200
[   33.263493] The buggy address is located 0 bytes inside of
[   33.263493]  200-byte region [fff00000c9a1c000, fff00000c9a1c0c8)
[   33.263557] 
[   33.263579] The buggy address belongs to the physical page:
[   33.263613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a1c
[   33.263671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.263726] page_type: f5(slab)
[   33.263770] raw: 0bfffe0000000000 fff00000c5711b40 dead000000000122 0000000000000000
[   33.263832] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.263964] page dumped because: kasan: bad access detected
[   33.264026] 
[   33.264050] Memory state around the buggy address:
[   33.264140]  fff00000c9a1bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.264195]  fff00000c9a1bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.264239] >fff00000c9a1c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.264278]                    ^
[   33.264332]  fff00000c9a1c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.264374]  fff00000c9a1c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.264414] ==================================================================

[   23.998011] ==================================================================
[   23.998495] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   23.998991] Free of addr ffff888105a14000 by task kunit_try_catch/258
[   23.999368] 
[   23.999513] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.999582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.999595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.999619] Call Trace:
[   23.999634]  <TASK>
[   23.999656]  dump_stack_lvl+0x73/0xb0
[   23.999690]  print_report+0xd1/0x650
[   23.999714]  ? __virt_addr_valid+0x1db/0x2d0
[   23.999741]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.999766]  ? kmem_cache_double_free+0x1e5/0x480
[   23.999791]  kasan_report_invalid_free+0x10a/0x130
[   23.999814]  ? kmem_cache_double_free+0x1e5/0x480
[   23.999839]  ? kmem_cache_double_free+0x1e5/0x480
[   24.000017]  check_slab_allocation+0x101/0x130
[   24.000056]  __kasan_slab_pre_free+0x28/0x40
[   24.000086]  kmem_cache_free+0xed/0x420
[   24.000112]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   24.000136]  ? kmem_cache_double_free+0x1e5/0x480
[   24.000162]  kmem_cache_double_free+0x1e5/0x480
[   24.000310]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   24.000341]  ? finish_task_switch.isra.0+0x153/0x700
[   24.000365]  ? __switch_to+0x47/0xf50
[   24.000504]  ? __pfx_read_tsc+0x10/0x10
[   24.000528]  ? ktime_get_ts64+0x86/0x230
[   24.000639]  kunit_try_run_case+0x1a5/0x480
[   24.000668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.000691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.000714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.000735]  ? __kthread_parkme+0x82/0x180
[   24.000756]  ? preempt_count_sub+0x50/0x80
[   24.000779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.000803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.000827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.000850]  kthread+0x337/0x6f0
[   24.000870]  ? trace_preempt_on+0x20/0xc0
[   24.000894]  ? __pfx_kthread+0x10/0x10
[   24.000914]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.000957]  ? calculate_sigpending+0x7b/0xa0
[   24.000983]  ? __pfx_kthread+0x10/0x10
[   24.001004]  ret_from_fork+0x116/0x1d0
[   24.001024]  ? __pfx_kthread+0x10/0x10
[   24.001044]  ret_from_fork_asm+0x1a/0x30
[   24.001086]  </TASK>
[   24.001099] 
[   24.011160] Allocated by task 258:
[   24.011391]  kasan_save_stack+0x45/0x70
[   24.011633]  kasan_save_track+0x18/0x40
[   24.011910]  kasan_save_alloc_info+0x3b/0x50
[   24.012085]  __kasan_slab_alloc+0x91/0xa0
[   24.012356]  kmem_cache_alloc_noprof+0x123/0x3f0
[   24.012675]  kmem_cache_double_free+0x14f/0x480
[   24.012922]  kunit_try_run_case+0x1a5/0x480
[   24.013151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.013348]  kthread+0x337/0x6f0
[   24.013463]  ret_from_fork+0x116/0x1d0
[   24.013630]  ret_from_fork_asm+0x1a/0x30
[   24.013816] 
[   24.013909] Freed by task 258:
[   24.014057]  kasan_save_stack+0x45/0x70
[   24.014367]  kasan_save_track+0x18/0x40
[   24.014496]  kasan_save_free_info+0x3f/0x60
[   24.014649]  __kasan_slab_free+0x56/0x70
[   24.014837]  kmem_cache_free+0x249/0x420
[   24.015463]  kmem_cache_double_free+0x16a/0x480
[   24.015682]  kunit_try_run_case+0x1a5/0x480
[   24.015900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.016096]  kthread+0x337/0x6f0
[   24.016221]  ret_from_fork+0x116/0x1d0
[   24.016449]  ret_from_fork_asm+0x1a/0x30
[   24.016828] 
[   24.017152] The buggy address belongs to the object at ffff888105a14000
[   24.017152]  which belongs to the cache test_cache of size 200
[   24.018535] The buggy address is located 0 bytes inside of
[   24.018535]  200-byte region [ffff888105a14000, ffff888105a140c8)
[   24.019184] 
[   24.019355] The buggy address belongs to the physical page:
[   24.019589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14
[   24.019874] flags: 0x200000000000000(node=0|zone=2)
[   24.020118] page_type: f5(slab)
[   24.020367] raw: 0200000000000000 ffff888101095500 dead000000000122 0000000000000000
[   24.020647] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   24.020963] page dumped because: kasan: bad access detected
[   24.021162] 
[   24.021229] Memory state around the buggy address:
[   24.021465]  ffff888105a13f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.021733]  ffff888105a13f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.022180] >ffff888105a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.022639]                    ^
[   24.022814]  ffff888105a14080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   24.023119]  ffff888105a14100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.023410] ==================================================================

[   23.727212] ==================================================================
[   23.727687] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   23.728391] Free of addr ffff8881058a2000 by task kunit_try_catch/257
[   23.728884] 
[   23.729029] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.729362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.729376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.729398] Call Trace:
[   23.729412]  <TASK>
[   23.729433]  dump_stack_lvl+0x73/0xb0
[   23.729467]  print_report+0xd1/0x650
[   23.729499]  ? __virt_addr_valid+0x1db/0x2d0
[   23.729525]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.729550]  ? kmem_cache_double_free+0x1e5/0x480
[   23.729574]  kasan_report_invalid_free+0x10a/0x130
[   23.729596]  ? kmem_cache_double_free+0x1e5/0x480
[   23.729621]  ? kmem_cache_double_free+0x1e5/0x480
[   23.729644]  check_slab_allocation+0x101/0x130
[   23.729664]  __kasan_slab_pre_free+0x28/0x40
[   23.729697]  kmem_cache_free+0xed/0x420
[   23.729721]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   23.729751]  ? kmem_cache_double_free+0x1e5/0x480
[   23.729777]  kmem_cache_double_free+0x1e5/0x480
[   23.729800]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   23.729822]  ? finish_task_switch.isra.0+0x153/0x700
[   23.729844]  ? __switch_to+0x47/0xf50
[   23.729874]  ? __pfx_read_tsc+0x10/0x10
[   23.729896]  ? ktime_get_ts64+0x86/0x230
[   23.729922]  kunit_try_run_case+0x1a5/0x480
[   23.729949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.729971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.729993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.730014]  ? __kthread_parkme+0x82/0x180
[   23.730034]  ? preempt_count_sub+0x50/0x80
[   23.730056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.730079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.730102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.730125]  kthread+0x337/0x6f0
[   23.730144]  ? trace_preempt_on+0x20/0xc0
[   23.730168]  ? __pfx_kthread+0x10/0x10
[   23.730188]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.730211]  ? calculate_sigpending+0x7b/0xa0
[   23.730235]  ? __pfx_kthread+0x10/0x10
[   23.730256]  ret_from_fork+0x116/0x1d0
[   23.730274]  ? __pfx_kthread+0x10/0x10
[   23.730294]  ret_from_fork_asm+0x1a/0x30
[   23.730335]  </TASK>
[   23.730348] 
[   23.742633] Allocated by task 257:
[   23.743133]  kasan_save_stack+0x45/0x70
[   23.743383]  kasan_save_track+0x18/0x40
[   23.743811]  kasan_save_alloc_info+0x3b/0x50
[   23.744015]  __kasan_slab_alloc+0x91/0xa0
[   23.744196]  kmem_cache_alloc_noprof+0x123/0x3f0
[   23.744555]  kmem_cache_double_free+0x14f/0x480
[   23.745075]  kunit_try_run_case+0x1a5/0x480
[   23.745279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.745613]  kthread+0x337/0x6f0
[   23.745957]  ret_from_fork+0x116/0x1d0
[   23.746459]  ret_from_fork_asm+0x1a/0x30
[   23.746961] 
[   23.747049] Freed by task 257:
[   23.747395]  kasan_save_stack+0x45/0x70
[   23.747690]  kasan_save_track+0x18/0x40
[   23.747855]  kasan_save_free_info+0x3f/0x60
[   23.748063]  __kasan_slab_free+0x56/0x70
[   23.748242]  kmem_cache_free+0x249/0x420
[   23.748435]  kmem_cache_double_free+0x16a/0x480
[   23.749276]  kunit_try_run_case+0x1a5/0x480
[   23.749633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.750379]  kthread+0x337/0x6f0
[   23.750985]  ret_from_fork+0x116/0x1d0
[   23.751169]  ret_from_fork_asm+0x1a/0x30
[   23.751329] 
[   23.751643] The buggy address belongs to the object at ffff8881058a2000
[   23.751643]  which belongs to the cache test_cache of size 200
[   23.752492] The buggy address is located 0 bytes inside of
[   23.752492]  200-byte region [ffff8881058a2000, ffff8881058a20c8)
[   23.753343] 
[   23.753447] The buggy address belongs to the physical page:
[   23.753959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a2
[   23.754421] flags: 0x200000000000000(node=0|zone=2)
[   23.754986] page_type: f5(slab)
[   23.755284] raw: 0200000000000000 ffff8881012dcdc0 dead000000000122 0000000000000000
[   23.755877] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   23.756239] page dumped because: kasan: bad access detected
[   23.756628] 
[   23.756779] Memory state around the buggy address:
[   23.757165]  ffff8881058a1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.757565]  ffff8881058a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.758054] >ffff8881058a2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.758473]                    ^
[   23.758678]  ffff8881058a2080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   23.759319]  ffff8881058a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.759906] ==================================================================