Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 75.367597] ================================================================== [ 75.368147] BUG: KASAN: double-free in kfree+0x58/0x80 [ 75.368844] Free of addr ffff0000c5938e00 by task kunit_try_catch/167 [ 75.369327] [ 75.369589] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.370378] Hardware name: linux,dummy-virt (DT) [ 75.370793] Call trace: [ 75.371061] dump_backtrace.part.0+0xdc/0xf0 [ 75.371591] show_stack+0x18/0x30 [ 75.372017] dump_stack_lvl+0x64/0x80 [ 75.372510] print_report+0x158/0x438 [ 75.372916] kasan_report_invalid_free+0x9c/0xc0 [ 75.373384] __kasan_slab_free+0x118/0x150 [ 75.374457] __kmem_cache_free+0x130/0x2a4 [ 75.375070] kfree+0x58/0x80 [ 75.375786] kfree_sensitive+0x24/0x5c [ 75.376213] kmalloc_double_kzfree+0xc4/0x1d0 [ 75.376720] kunit_try_run_case+0x84/0x120 [ 75.377178] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.377749] kthread+0x180/0x190 [ 75.378135] ret_from_fork+0x10/0x20 [ 75.378568] [ 75.378748] Allocated by task 167: [ 75.379114] kasan_save_stack+0x3c/0x70 [ 75.379513] kasan_set_track+0x2c/0x40 [ 75.379944] kasan_save_alloc_info+0x24/0x34 [ 75.380432] __kasan_kmalloc+0xb8/0xc0 [ 75.380833] kmalloc_trace+0x58/0x6c [ 75.381254] kmalloc_double_kzfree+0x94/0x1d0 [ 75.381725] kunit_try_run_case+0x84/0x120 [ 75.382937] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.383515] kthread+0x180/0x190 [ 75.383876] ret_from_fork+0x10/0x20 [ 75.384307] [ 75.384495] Freed by task 167: [ 75.384830] kasan_save_stack+0x3c/0x70 [ 75.385211] kasan_set_track+0x2c/0x40 [ 75.385660] kasan_save_free_info+0x38/0x5c [ 75.386087] __kasan_slab_free+0xe4/0x150 [ 75.386532] __kmem_cache_free+0x130/0x2a4 [ 75.387017] kfree+0x58/0x80 [ 75.387374] kfree_sensitive+0x4c/0x5c [ 75.387828] kmalloc_double_kzfree+0xb4/0x1d0 [ 75.388283] kunit_try_run_case+0x84/0x120 [ 75.388756] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.389290] kthread+0x180/0x190 [ 75.389679] ret_from_fork+0x10/0x20 [ 75.390086] [ 75.390274] The buggy address belongs to the object at ffff0000c5938e00 [ 75.390274] which belongs to the cache kmalloc-128 of size 128 [ 75.391207] The buggy address is located 0 bytes inside of [ 75.391207] 128-byte region [ffff0000c5938e00, ffff0000c5938e80) [ 75.392083] [ 75.392282] The buggy address belongs to the physical page: [ 75.393457] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 75.394065] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.394624] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.395636] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.396255] page dumped because: kasan: bad access detected [ 75.396810] [ 75.397123] Memory state around the buggy address: [ 75.397643] ffff0000c5938d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.398951] ffff0000c5938d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.399629] >ffff0000c5938e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.400277] ^ [ 75.400702] ffff0000c5938e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.401383] ffff0000c5938f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.402019] ==================================================================
[ 66.684955] ================================================================== [ 66.685693] BUG: KASAN: double-free in kfree+0x5c/0x70 [ 66.686184] Free of addr ffff0000c5a10200 by task kunit_try_catch/165 [ 66.686685] [ 66.686878] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.688184] Hardware name: linux,dummy-virt (DT) [ 66.688600] Call trace: [ 66.688849] dump_backtrace+0x110/0x120 [ 66.689314] show_stack+0x18/0x28 [ 66.689970] dump_stack_lvl+0x68/0x84 [ 66.690383] print_report+0x158/0x484 [ 66.690767] kasan_report_invalid_free+0x84/0xa0 [ 66.691211] __kasan_slab_free+0x11c/0x158 [ 66.691623] __kmem_cache_free+0x138/0x2b0 [ 66.692036] kfree+0x5c/0x70 [ 66.692390] kfree_sensitive+0x24/0x60 [ 66.692799] kmalloc_double_kzfree+0xdc/0x1d8 [ 66.693217] kunit_try_run_case+0x7c/0x120 [ 66.694194] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.694717] kthread+0x1a4/0x1b8 [ 66.695070] ret_from_fork+0x10/0x20 [ 66.695461] [ 66.695636] Allocated by task 165: [ 66.695942] kasan_save_stack+0x2c/0x58 [ 66.696367] kasan_set_track+0x2c/0x40 [ 66.696736] kasan_save_alloc_info+0x24/0x38 [ 66.697166] __kasan_kmalloc+0xa0/0xb8 [ 66.697582] kmalloc_trace+0x50/0x68 [ 66.698199] kmalloc_double_kzfree+0xa8/0x1d8 [ 66.698660] kunit_try_run_case+0x7c/0x120 [ 66.699089] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.699596] kthread+0x1a4/0x1b8 [ 66.699944] ret_from_fork+0x10/0x20 [ 66.700312] [ 66.700506] Freed by task 165: [ 66.700783] kasan_save_stack+0x2c/0x58 [ 66.701153] kasan_set_track+0x2c/0x40 [ 66.701591] kasan_save_free_info+0x38/0x60 [ 66.702495] __kasan_slab_free+0xe8/0x158 [ 66.702875] __kmem_cache_free+0x138/0x2b0 [ 66.703291] kfree+0x5c/0x70 [ 66.703612] kfree_sensitive+0x4c/0x60 [ 66.704017] kmalloc_double_kzfree+0xc8/0x1d8 [ 66.704464] kunit_try_run_case+0x7c/0x120 [ 66.704881] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.705383] kthread+0x1a4/0x1b8 [ 66.705712] ret_from_fork+0x10/0x20 [ 66.706116] [ 66.706321] The buggy address belongs to the object at ffff0000c5a10200 [ 66.706321] which belongs to the cache kmalloc-128 of size 128 [ 66.707182] The buggy address is located 0 bytes inside of [ 66.707182] 128-byte region [ffff0000c5a10200, ffff0000c5a10280) [ 66.708257] [ 66.708434] The buggy address belongs to the physical page: [ 66.708829] page:000000003e6c9983 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a10 [ 66.710019] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.710645] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.711257] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.711825] page dumped because: kasan: bad access detected [ 66.712266] [ 66.712458] Memory state around the buggy address: [ 66.712862] ffff0000c5a10100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.713450] ffff0000c5a10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.714264] >ffff0000c5a10200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.714796] ^ [ 66.715103] ffff0000c5a10280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.715670] ffff0000c5a10300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.716196] ==================================================================
[ 32.653731] ================================================================== [ 32.654055] BUG: KASAN: double-free in kfree+0x78/0x120 [ 32.654407] Free of addr ffff888101a015c0 by task kunit_try_catch/271 [ 32.654830] [ 32.654957] CPU: 1 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.655598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.656072] Call Trace: [ 32.656251] <TASK> [ 32.656384] dump_stack_lvl+0x49/0x62 [ 32.656884] print_report+0x189/0x492 [ 32.657158] ? kasan_complete_mode_report_info+0x7c/0x200 [ 32.657547] ? kfree+0x78/0x120 [ 32.657769] kasan_report_invalid_free+0xd8/0x150 [ 32.658085] ? kfree+0x78/0x120 [ 32.658311] ? kfree+0x78/0x120 [ 32.658687] ____kasan_slab_free+0x19f/0x1d0 [ 32.659061] ? kfree_sensitive+0x1f/0x50 [ 32.659326] __kasan_slab_free+0x12/0x20 [ 32.659662] __kmem_cache_free+0x188/0x2f0 [ 32.660004] kfree+0x78/0x120 [ 32.660283] kfree_sensitive+0x1f/0x50 [ 32.660523] kmalloc_double_kzfree+0xc8/0x1b0 [ 32.660940] ? kasan_global_oob_right+0x160/0x160 [ 32.661190] ? __kunit_add_resource+0xd1/0x100 [ 32.661437] ? kasan_test_init+0x13e/0x1b0 [ 32.661686] kunit_try_run_case+0x8f/0xd0 [ 32.661913] ? kunit_catch_run_case+0x80/0x80 [ 32.662176] ? kunit_try_catch_throw+0x40/0x40 [ 32.662666] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.662995] kthread+0x17b/0x1b0 [ 32.663179] ? kthread_complete_and_exit+0x30/0x30 [ 32.663423] ret_from_fork+0x22/0x30 [ 32.663749] </TASK> [ 32.664119] [ 32.664227] Allocated by task 271: [ 32.664428] kasan_save_stack+0x41/0x70 [ 32.664736] kasan_set_track+0x25/0x40 [ 32.664955] kasan_save_alloc_info+0x1e/0x30 [ 32.665203] __kasan_kmalloc+0xb6/0xc0 [ 32.665414] kmalloc_trace+0x48/0xb0 [ 32.665624] kmalloc_double_kzfree+0x99/0x1b0 [ 32.665872] kunit_try_run_case+0x8f/0xd0 [ 32.666098] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.666412] kthread+0x17b/0x1b0 [ 32.666571] ret_from_fork+0x22/0x30 [ 32.666790] [ 32.666901] Freed by task 271: [ 32.667083] kasan_save_stack+0x41/0x70 [ 32.667310] kasan_set_track+0x25/0x40 [ 32.667554] kasan_save_free_info+0x2e/0x50 [ 32.667791] ____kasan_slab_free+0x175/0x1d0 [ 32.668020] __kasan_slab_free+0x12/0x20 [ 32.668564] __kmem_cache_free+0x188/0x2f0 [ 32.668804] kfree+0x78/0x120 [ 32.668991] kfree_sensitive+0x3e/0x50 [ 32.669235] kmalloc_double_kzfree+0xb1/0x1b0 [ 32.669580] kunit_try_run_case+0x8f/0xd0 [ 32.669806] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.670083] kthread+0x17b/0x1b0 [ 32.670341] ret_from_fork+0x22/0x30 [ 32.670521] [ 32.670612] The buggy address belongs to the object at ffff888101a015c0 [ 32.670612] which belongs to the cache kmalloc-16 of size 16 [ 32.671375] The buggy address is located 0 bytes inside of [ 32.671375] 16-byte region [ffff888101a015c0, ffff888101a015d0) [ 32.671866] [ 32.671984] The buggy address belongs to the physical page: [ 32.672306] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a01 [ 32.672904] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.673236] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.673774] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.674108] page dumped because: kasan: bad access detected [ 32.674483] [ 32.674581] Memory state around the buggy address: [ 32.674840] ffff888101a01480: 00 06 fc fc 00 06 fc fc 00 06 fc fc 00 02 fc fc [ 32.675183] ffff888101a01500: 00 03 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 32.675652] >ffff888101a01580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 32.675969] ^ [ 32.676222] ffff888101a01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676509] ffff888101a01680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676864] ==================================================================