Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   76.595241] ==================================================================
[   76.596073] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8
[   76.597109] Free of addr ffff0000c5a8d000 by task kunit_try_catch/159
[   76.597669] 
[   76.597900] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.598658] Hardware name: linux,dummy-virt (DT)
[   76.599070] Call trace:
[   76.599341]  dump_backtrace+0xf8/0x118
[   76.599851]  show_stack+0x18/0x24
[   76.600289]  __dump_stack+0x28/0x38
[   76.600940]  dump_stack_lvl+0x54/0x6c
[   76.601379]  print_address_description+0x7c/0x1ec
[   76.601924]  print_report+0x50/0x68
[   76.602370]  kasan_report_invalid_free+0x9c/0xe8
[   76.602918]  ____kasan_slab_free+0x108/0x140
[   76.603413]  __kasan_slab_free+0x18/0x28
[   76.603889]  kmem_cache_free+0xe0/0x358
[   76.604335]  kmem_cache_double_free+0xbc/0x1b8
[   76.605069]  kunit_try_run_case+0x80/0x184
[   76.605545]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.606123]  kthread+0x16c/0x21c
[   76.606535]  ret_from_fork+0x10/0x20
[   76.607008] 
[   76.607196] Allocated by task 159:
[   76.607578]  kasan_set_track+0x4c/0x80
[   76.608089]  kasan_save_alloc_info+0x28/0x34
[   76.608558]  __kasan_slab_alloc+0x58/0x70
[   76.609027]  slab_post_alloc_hook+0x70/0x2f4
[   76.609501]  kmem_cache_alloc+0x168/0x260
[   76.609965]  kmem_cache_double_free+0x90/0x1b8
[   76.610469]  kunit_try_run_case+0x80/0x184
[   76.611098]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.611676]  kthread+0x16c/0x21c
[   76.612090]  ret_from_fork+0x10/0x20
[   76.612528] 
[   76.612712] Freed by task 159:
[   76.613532]  kasan_set_track+0x4c/0x80
[   76.614028]  kasan_save_free_info+0x3c/0x60
[   76.614518]  ____kasan_slab_free+0xe8/0x140
[   76.615017]  __kasan_slab_free+0x18/0x28
[   76.615490]  kmem_cache_free+0xe0/0x358
[   76.615951]  kmem_cache_double_free+0xa4/0x1b8
[   76.616455]  kunit_try_run_case+0x80/0x184
[   76.617078]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.617635]  kthread+0x16c/0x21c
[   76.618046]  ret_from_fork+0x10/0x20
[   76.618489] 
[   76.618684] The buggy address belongs to the object at ffff0000c5a8d000
[   76.618684]  which belongs to the cache test_cache of size 200
[   76.619632] The buggy address is located 0 bytes inside of
[   76.619632]  200-byte region [ffff0000c5a8d000, ffff0000c5a8d0c8)
[   76.620544] 
[   76.620942] The buggy address belongs to the physical page:
[   76.621426] page:00000000691911c3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8d
[   76.622193] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.622887] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483b00
[   76.623546] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   76.624177] page dumped because: kasan: bad access detected
[   76.624823] 
[   76.625049] Memory state around the buggy address:
[   76.625491]  ffff0000c5a8cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.626139]  ffff0000c5a8cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.626768] >ffff0000c5a8d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.627387]                    ^
[   76.627752]  ffff0000c5a8d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   76.628384]  ffff0000c5a8d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.629258] ==================================================================

[   75.684303] ==================================================================
[   75.685401] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8
[   75.686442] Free of addr ffff0000c58a5000 by task kunit_try_catch/159
[   75.687272] 
[   75.687486] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.688665] Hardware name: linux,dummy-virt (DT)
[   75.689317] Call trace:
[   75.689726]  dump_backtrace+0xf4/0x114
[   75.690415]  show_stack+0x18/0x24
[   75.691039]  __dump_stack+0x28/0x38
[   75.691641]  dump_stack_lvl+0x50/0x68
[   75.692376]  print_address_description+0x7c/0x1ec
[   75.693178]  print_report+0x50/0x68
[   75.693824]  kasan_report_invalid_free+0x9c/0xe4
[   75.694464]  ____kasan_slab_free+0x108/0x140
[   75.694932]  __kasan_slab_free+0x18/0x28
[   75.695374]  kmem_cache_free+0xe0/0x34c
[   75.696108]  kmem_cache_double_free+0xbc/0x1b8
[   75.696856]  kunit_try_run_case+0x80/0x184
[   75.697548]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.698388]  kthread+0x16c/0x21c
[   75.698998]  ret_from_fork+0x10/0x20
[   75.699612] 
[   75.699945] Allocated by task 159:
[   75.700477]  kasan_set_track+0x4c/0x80
[   75.701138]  kasan_save_alloc_info+0x28/0x34
[   75.701824]  __kasan_slab_alloc+0x58/0x70
[   75.702507]  slab_post_alloc_hook+0x70/0x2e8
[   75.703192]  kmem_cache_alloc+0x164/0x254
[   75.703932]  kmem_cache_double_free+0x90/0x1b8
[   75.704694]  kunit_try_run_case+0x80/0x184
[   75.705452]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.706288]  kthread+0x16c/0x21c
[   75.706892]  ret_from_fork+0x10/0x20
[   75.707496] 
[   75.707825] Freed by task 159:
[   75.708365]  kasan_set_track+0x4c/0x80
[   75.709563]  kasan_save_free_info+0x3c/0x60
[   75.710073]  ____kasan_slab_free+0xe8/0x140
[   75.710530]  __kasan_slab_free+0x18/0x28
[   75.711349]  kmem_cache_free+0xe0/0x34c
[   75.712444]  kmem_cache_double_free+0xa4/0x1b8
[   75.713673]  kunit_try_run_case+0x80/0x184
[   75.714163]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.714665]  kthread+0x16c/0x21c
[   75.715120]  ret_from_fork+0x10/0x20
[   75.715536] 
[   75.716862] The buggy address belongs to the object at ffff0000c58a5000
[   75.716862]  which belongs to the cache test_cache of size 200
[   75.717709] The buggy address is located 0 bytes inside of
[   75.717709]  200-byte region [ffff0000c58a5000, ffff0000c58a50c8)
[   75.719110] 
[   75.719317] The buggy address belongs to the physical page:
[   75.719708] page:000000004e985ca6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a5
[   75.720985] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.721952] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ea80
[   75.722940] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   75.723915] page dumped because: kasan: bad access detected
[   75.725073] 
[   75.725269] Memory state around the buggy address:
[   75.725640]  ffff0000c58a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.726152]  ffff0000c58a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.726650] >ffff0000c58a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.727514]                    ^
[   75.728235]  ffff0000c58a5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   75.729184]  ffff0000c58a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.730063] ==================================================================

[   74.285056] ==================================================================
[   74.286023] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x244
[   74.286745] Free of addr ffff0000c5900000 by task kunit_try_catch/159
[   74.287254] 
[   74.287520] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.288254] Hardware name: linux,dummy-virt (DT)
[   74.288690] Call trace:
[   74.288964]  dump_backtrace.part.0+0xdc/0xf0
[   74.289435]  show_stack+0x18/0x30
[   74.291028]  dump_stack_lvl+0x64/0x80
[   74.292347]  print_report+0x158/0x438
[   74.292924]  kasan_report_invalid_free+0x9c/0xc0
[   74.294102]  __kasan_slab_free+0x118/0x150
[   74.294517]  kmem_cache_free+0x1b8/0x38c
[   74.295004]  kmem_cache_double_free+0xe4/0x244
[   74.295474]  kunit_try_run_case+0x84/0x120
[   74.295877]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.296335]  kthread+0x180/0x190
[   74.296948]  ret_from_fork+0x10/0x20
[   74.297742] 
[   74.297958] Allocated by task 159:
[   74.298528]  kasan_save_stack+0x3c/0x70
[   74.298900]  kasan_set_track+0x2c/0x40
[   74.299467]  kasan_save_alloc_info+0x24/0x34
[   74.299915]  __kasan_slab_alloc+0x8c/0x90
[   74.300273]  kmem_cache_alloc+0x170/0x2c4
[   74.300693]  kmem_cache_double_free+0xb4/0x244
[   74.301344]  kunit_try_run_case+0x84/0x120
[   74.302127]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.303466]  kthread+0x180/0x190
[   74.303957]  ret_from_fork+0x10/0x20
[   74.304463] 
[   74.304675] Freed by task 159:
[   74.305116]  kasan_save_stack+0x3c/0x70
[   74.305657]  kasan_set_track+0x2c/0x40
[   74.306116]  kasan_save_free_info+0x38/0x5c
[   74.306801]  __kasan_slab_free+0xe4/0x150
[   74.307334]  kmem_cache_free+0x1b8/0x38c
[   74.307919]  kmem_cache_double_free+0xd0/0x244
[   74.308514]  kunit_try_run_case+0x84/0x120
[   74.309046]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.309619]  kthread+0x180/0x190
[   74.310052]  ret_from_fork+0x10/0x20
[   74.310599] 
[   74.310836] The buggy address belongs to the object at ffff0000c5900000
[   74.310836]  which belongs to the cache test_cache of size 200
[   74.311825] The buggy address is located 0 bytes inside of
[   74.311825]  200-byte region [ffff0000c5900000, ffff0000c59000c8)
[   74.312768] 
[   74.312989] The buggy address belongs to the physical page:
[   74.313519] page:00000000d0a07206 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105900
[   74.314431] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.315152] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398780
[   74.315841] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   74.316508] page dumped because: kasan: bad access detected
[   74.317022] 
[   74.317232] Memory state around the buggy address:
[   74.317700]  ffff0000c58fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.318333]  ffff0000c58fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.319091] >ffff0000c5900000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.319714]                    ^
[   74.320040]  ffff0000c5900080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   74.320670]  ffff0000c5900100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.321258] ==================================================================

[   65.750373] ==================================================================
[   65.751118] BUG: KASAN: double-free in kmem_cache_double_free+0xf8/0x260
[   65.752352] Free of addr ffff0000c59b8000 by task kunit_try_catch/157
[   65.753281] 
[   65.753652] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.754920] Hardware name: linux,dummy-virt (DT)
[   65.755555] Call trace:
[   65.755979]  dump_backtrace+0x110/0x120
[   65.756556]  show_stack+0x18/0x28
[   65.756892]  dump_stack_lvl+0x68/0x84
[   65.757251]  print_report+0x158/0x484
[   65.757953]  kasan_report_invalid_free+0x84/0xa0
[   65.758710]  __kasan_slab_free+0x11c/0x158
[   65.759313]  kmem_cache_free+0x1b0/0x3a0
[   65.759919]  kmem_cache_double_free+0xf8/0x260
[   65.760564]  kunit_try_run_case+0x7c/0x120
[   65.761182]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.762025]  kthread+0x1a4/0x1b8
[   65.762528]  ret_from_fork+0x10/0x20
[   65.763070] 
[   65.763344] Allocated by task 157:
[   65.763809]  kasan_save_stack+0x2c/0x58
[   65.764375]  kasan_set_track+0x2c/0x40
[   65.764921]  kasan_save_alloc_info+0x24/0x38
[   65.765545]  __kasan_slab_alloc+0x74/0x90
[   65.766187]  slab_post_alloc_hook+0x6c/0x260
[   65.766575]  kmem_cache_alloc+0x164/0x270
[   65.766931]  kmem_cache_double_free+0xc4/0x260
[   65.767314]  kunit_try_run_case+0x7c/0x120
[   65.767665]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.768084]  kthread+0x1a4/0x1b8
[   65.768579]  ret_from_fork+0x10/0x20
[   65.769116] 
[   65.769400] Freed by task 157:
[   65.769849]  kasan_save_stack+0x2c/0x58
[   65.770441]  kasan_set_track+0x2c/0x40
[   65.771020]  kasan_save_free_info+0x38/0x60
[   65.771638]  __kasan_slab_free+0xe8/0x158
[   65.772199]  kmem_cache_free+0x1b0/0x3a0
[   65.772807]  kmem_cache_double_free+0xe0/0x260
[   65.773483]  kunit_try_run_case+0x7c/0x120
[   65.774126]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.774877]  kthread+0x1a4/0x1b8
[   65.775381]  ret_from_fork+0x10/0x20
[   65.775913] 
[   65.776178] The buggy address belongs to the object at ffff0000c59b8000
[   65.776178]  which belongs to the cache test_cache of size 200
[   65.777610] The buggy address is located 0 bytes inside of
[   65.777610]  200-byte region [ffff0000c59b8000, ffff0000c59b80c8)
[   65.779089] 
[   65.779368] The buggy address belongs to the physical page:
[   65.780032] page:000000001a4f1f6d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   65.781084] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.781972] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c15cf800
[   65.782923] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   65.783828] page dumped because: kasan: bad access detected
[   65.784515] 
[   65.784787] Memory state around the buggy address:
[   65.785430]  ffff0000c59b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.786406]  ffff0000c59b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.787273] >ffff0000c59b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.788096]                    ^
[   65.788559]  ffff0000c59b8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   65.789012]  ffff0000c59b8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.789531] ==================================================================

[   31.923531] ==================================================================
[   31.924263] BUG: KASAN: double-free in kmem_cache_double_free+0xe7/0x1e0
[   31.924637] Free of addr ffff8881034a1000 by task kunit_try_catch/263
[   31.924919] 
[   31.925029] CPU: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.925852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.926322] Call Trace:
[   31.926653]  <TASK>
[   31.926899]  dump_stack_lvl+0x49/0x62
[   31.927268]  print_report+0x189/0x492
[   31.927509]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.927970]  ? kmem_cache_double_free+0xe7/0x1e0
[   31.928402]  kasan_report_invalid_free+0xd8/0x150
[   31.928683]  ? kmem_cache_double_free+0xe7/0x1e0
[   31.928960]  ? kmem_cache_double_free+0xe7/0x1e0
[   31.929227]  ____kasan_slab_free+0x19f/0x1d0
[   31.929517]  ? kmem_cache_double_free+0xe7/0x1e0
[   31.929792]  __kasan_slab_free+0x12/0x20
[   31.930015]  kmem_cache_free+0x19c/0x4a0
[   31.930317]  kmem_cache_double_free+0xe7/0x1e0
[   31.930594]  ? kmem_cache_invalid_free+0x1f0/0x1f0
[   31.930891]  ? __kunit_add_resource+0xd1/0x100
[   31.931201]  kunit_try_run_case+0x8f/0xd0
[   31.931506]  ? kunit_catch_run_case+0x80/0x80
[   31.931735]  ? kunit_try_catch_throw+0x40/0x40
[   31.932015]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.932323]  kthread+0x17b/0x1b0
[   31.932570]  ? kthread_complete_and_exit+0x30/0x30
[   31.932839]  ret_from_fork+0x22/0x30
[   31.933096]  </TASK>
[   31.933261] 
[   31.933354] Allocated by task 263:
[   31.933553]  kasan_save_stack+0x41/0x70
[   31.933803]  kasan_set_track+0x25/0x40
[   31.934048]  kasan_save_alloc_info+0x1e/0x30
[   31.934321]  __kasan_slab_alloc+0x90/0xa0
[   31.934607]  kmem_cache_alloc+0x150/0x370
[   31.934845]  kmem_cache_double_free+0xb6/0x1e0
[   31.935117]  kunit_try_run_case+0x8f/0xd0
[   31.935415]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.935705]  kthread+0x17b/0x1b0
[   31.935936]  ret_from_fork+0x22/0x30
[   31.936150] 
[   31.936272] Freed by task 263:
[   31.936416]  kasan_save_stack+0x41/0x70
[   31.936666]  kasan_set_track+0x25/0x40
[   31.936895]  kasan_save_free_info+0x2e/0x50
[   31.937132]  ____kasan_slab_free+0x175/0x1d0
[   31.937426]  __kasan_slab_free+0x12/0x20
[   31.937698]  kmem_cache_free+0x19c/0x4a0
[   31.937964]  kmem_cache_double_free+0xcd/0x1e0
[   31.938237]  kunit_try_run_case+0x8f/0xd0
[   31.938539]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.938835]  kthread+0x17b/0x1b0
[   31.939044]  ret_from_fork+0x22/0x30
[   31.939237] 
[   31.939346] The buggy address belongs to the object at ffff8881034a1000
[   31.939346]  which belongs to the cache test_cache of size 200
[   31.939844] The buggy address is located 0 bytes inside of
[   31.939844]  200-byte region [ffff8881034a1000, ffff8881034a10c8)
[   31.940442] 
[   31.940612] The buggy address belongs to the physical page:
[   31.940897] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1034a1
[   31.941295] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.941624] raw: 0200000000000200 0000000000000000 dead000000000122 ffff88810316c640
[   31.942000] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   31.942439] page dumped because: kasan: bad access detected
[   31.942736] 
[   31.942818] Memory state around the buggy address:
[   31.943074]  ffff8881034a0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.943687]  ffff8881034a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.944055] >ffff8881034a1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.944372]                    ^
[   31.944566]  ffff8881034a1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.944874]  ffff8881034a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.945221] ==================================================================