Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   33.667853] ==================================================================
[   33.668032] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.668161] Free of addr ffff000802d0a000 by task kunit_try_catch/258
[   33.669560] 
[   33.671048] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   33.671102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.671119] Hardware name: WinLink E850-96 board (DT)
[   33.671143] Call trace:
[   33.671159]  show_stack+0x20/0x38 (C)
[   33.671194]  dump_stack_lvl+0x8c/0xd0
[   33.671232]  print_report+0x118/0x608
[   33.671266]  kasan_report_invalid_free+0xc0/0xe8
[   33.671299]  check_slab_allocation+0xd4/0x108
[   33.671332]  __kasan_slab_pre_free+0x2c/0x48
[   33.671363]  kmem_cache_free+0xf0/0x468
[   33.671396]  kmem_cache_double_free+0x190/0x3c8
[   33.671431]  kunit_try_run_case+0x170/0x3f0
[   33.671468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.671509]  kthread+0x328/0x630
[   33.671545]  ret_from_fork+0x10/0x20
[   33.671583] 
[   33.742911] Allocated by task 258:
[   33.746299]  kasan_save_stack+0x3c/0x68
[   33.750114]  kasan_save_track+0x20/0x40
[   33.753934]  kasan_save_alloc_info+0x40/0x58
[   33.758187]  __kasan_slab_alloc+0xa8/0xb0
[   33.762180]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.766781]  kmem_cache_double_free+0x12c/0x3c8
[   33.771295]  kunit_try_run_case+0x170/0x3f0
[   33.775461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.780929]  kthread+0x328/0x630
[   33.784142]  ret_from_fork+0x10/0x20
[   33.787700] 
[   33.789178] Freed by task 258:
[   33.792215]  kasan_save_stack+0x3c/0x68
[   33.796034]  kasan_save_track+0x20/0x40
[   33.799853]  kasan_save_free_info+0x4c/0x78
[   33.804020]  __kasan_slab_free+0x6c/0x98
[   33.807926]  kmem_cache_free+0x260/0x468
[   33.811832]  kmem_cache_double_free+0x140/0x3c8
[   33.816346]  kunit_try_run_case+0x170/0x3f0
[   33.820513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.825982]  kthread+0x328/0x630
[   33.829193]  ret_from_fork+0x10/0x20
[   33.832752] 
[   33.834229] The buggy address belongs to the object at ffff000802d0a000
[   33.834229]  which belongs to the cache test_cache of size 200
[   33.846644] The buggy address is located 0 bytes inside of
[   33.846644]  200-byte region [ffff000802d0a000, ffff000802d0a0c8)
[   33.858186] 
[   33.859665] The buggy address belongs to the physical page:
[   33.865222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d0a
[   33.873206] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.880846] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.887789] page_type: f5(slab)
[   33.890927] raw: 0bfffe0000000040 ffff00080177b900 dead000000000122 0000000000000000
[   33.898644] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.906370] head: 0bfffe0000000040 ffff00080177b900 dead000000000122 0000000000000000
[   33.914181] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.921995] head: 0bfffe0000000001 fffffdffe00b4281 00000000ffffffff 00000000ffffffff
[   33.929806] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.937612] page dumped because: kasan: bad access detected
[   33.943168] 
[   33.944643] Memory state around the buggy address:
[   33.949423]  ffff000802d09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956626]  ffff000802d09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.963832] >ffff000802d0a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.971031]                    ^
[   33.974247]  ffff000802d0a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.981452]  ffff000802d0a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.988654] ==================================================================

[   18.736641] ==================================================================
[   18.736713] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.736789] Free of addr fff00000c7a34000 by task kunit_try_catch/211
[   18.736834] 
[   18.736885] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.737022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.737088] Hardware name: linux,dummy-virt (DT)
[   18.737165] Call trace:
[   18.737215]  show_stack+0x20/0x38 (C)
[   18.737267]  dump_stack_lvl+0x8c/0xd0
[   18.737353]  print_report+0x118/0x608
[   18.737399]  kasan_report_invalid_free+0xc0/0xe8
[   18.737520]  check_slab_allocation+0xd4/0x108
[   18.737623]  __kasan_slab_pre_free+0x2c/0x48
[   18.737783]  kmem_cache_free+0xf0/0x468
[   18.737903]  kmem_cache_double_free+0x190/0x3c8
[   18.737996]  kunit_try_run_case+0x170/0x3f0
[   18.738077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.738257]  kthread+0x328/0x630
[   18.738468]  ret_from_fork+0x10/0x20
[   18.738533] 
[   18.738551] Allocated by task 211:
[   18.738582]  kasan_save_stack+0x3c/0x68
[   18.738707]  kasan_save_track+0x20/0x40
[   18.738867]  kasan_save_alloc_info+0x40/0x58
[   18.738999]  __kasan_slab_alloc+0xa8/0xb0
[   18.739075]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.739121]  kmem_cache_double_free+0x12c/0x3c8
[   18.739167]  kunit_try_run_case+0x170/0x3f0
[   18.739251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.739316]  kthread+0x328/0x630
[   18.739358]  ret_from_fork+0x10/0x20
[   18.739402] 
[   18.739428] Freed by task 211:
[   18.739455]  kasan_save_stack+0x3c/0x68
[   18.739490]  kasan_save_track+0x20/0x40
[   18.739525]  kasan_save_free_info+0x4c/0x78
[   18.739567]  __kasan_slab_free+0x6c/0x98
[   18.739603]  kmem_cache_free+0x260/0x468
[   18.739639]  kmem_cache_double_free+0x140/0x3c8
[   18.739679]  kunit_try_run_case+0x170/0x3f0
[   18.739723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.739768]  kthread+0x328/0x630
[   18.739802]  ret_from_fork+0x10/0x20
[   18.739836] 
[   18.739865] The buggy address belongs to the object at fff00000c7a34000
[   18.739865]  which belongs to the cache test_cache of size 200
[   18.739929] The buggy address is located 0 bytes inside of
[   18.739929]  200-byte region [fff00000c7a34000, fff00000c7a340c8)
[   18.740012] 
[   18.740037] The buggy address belongs to the physical page:
[   18.740070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a34
[   18.740128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.740470] page_type: f5(slab)
[   18.740619] raw: 0bfffe0000000000 fff00000c59d6500 dead000000000122 0000000000000000
[   18.740729] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.740773] page dumped because: kasan: bad access detected
[   18.740825] 
[   18.740844] Memory state around the buggy address:
[   18.740890]  fff00000c7a33f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.740965]  fff00000c7a33f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.741183] >fff00000c7a34000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.741247]                    ^
[   18.741324]  fff00000c7a34080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.741479]  fff00000c7a34100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.741556] ==================================================================

[   11.625313] ==================================================================
[   11.626445] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   11.627077] Free of addr ffff888102a01000 by task kunit_try_catch/228
[   11.627789] 
[   11.628046] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   11.628099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.628111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.628133] Call Trace:
[   11.628147]  <TASK>
[   11.628168]  dump_stack_lvl+0x73/0xb0
[   11.628199]  print_report+0xd1/0x650
[   11.628223]  ? __virt_addr_valid+0x1db/0x2d0
[   11.628253]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.628275]  ? kmem_cache_double_free+0x1e5/0x480
[   11.628296]  kasan_report_invalid_free+0x10a/0x130
[   11.628320]  ? kmem_cache_double_free+0x1e5/0x480
[   11.628342]  ? kmem_cache_double_free+0x1e5/0x480
[   11.628362]  check_slab_allocation+0x101/0x130
[   11.628383]  __kasan_slab_pre_free+0x28/0x40
[   11.628404]  kmem_cache_free+0xed/0x420
[   11.628425]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   11.628446]  ? kmem_cache_double_free+0x1e5/0x480
[   11.628469]  kmem_cache_double_free+0x1e5/0x480
[   11.628489]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   11.628508]  ? finish_task_switch.isra.0+0x153/0x700
[   11.628533]  ? __switch_to+0x5d9/0xf60
[   11.628554]  ? dequeue_task_fair+0x166/0x4e0
[   11.628581]  ? __pfx_read_tsc+0x10/0x10
[   11.628601]  ? ktime_get_ts64+0x86/0x230
[   11.628641]  kunit_try_run_case+0x1a5/0x480
[   11.628668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.628689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.628714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.628756]  ? __kthread_parkme+0x82/0x180
[   11.628779]  ? preempt_count_sub+0x50/0x80
[   11.628804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.628827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.628850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.628872]  kthread+0x337/0x6f0
[   11.628889]  ? trace_preempt_on+0x20/0xc0
[   11.628913]  ? __pfx_kthread+0x10/0x10
[   11.628942]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.628963]  ? calculate_sigpending+0x7b/0xa0
[   11.628985]  ? __pfx_kthread+0x10/0x10
[   11.629003]  ret_from_fork+0x41/0x80
[   11.629024]  ? __pfx_kthread+0x10/0x10
[   11.629041]  ret_from_fork_asm+0x1a/0x30
[   11.629073]  </TASK>
[   11.629085] 
[   11.643493] Allocated by task 228:
[   11.643715]  kasan_save_stack+0x45/0x70
[   11.644082]  kasan_save_track+0x18/0x40
[   11.644442]  kasan_save_alloc_info+0x3b/0x50
[   11.644869]  __kasan_slab_alloc+0x91/0xa0
[   11.645206]  kmem_cache_alloc_noprof+0x123/0x3f0
[   11.645372]  kmem_cache_double_free+0x14f/0x480
[   11.645522]  kunit_try_run_case+0x1a5/0x480
[   11.645932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.646399]  kthread+0x337/0x6f0
[   11.646723]  ret_from_fork+0x41/0x80
[   11.647109]  ret_from_fork_asm+0x1a/0x30
[   11.647475] 
[   11.647651] Freed by task 228:
[   11.647957]  kasan_save_stack+0x45/0x70
[   11.648100]  kasan_save_track+0x18/0x40
[   11.648233]  kasan_save_free_info+0x3f/0x60
[   11.648379]  __kasan_slab_free+0x56/0x70
[   11.648514]  kmem_cache_free+0x249/0x420
[   11.648666]  kmem_cache_double_free+0x16a/0x480
[   11.648828]  kunit_try_run_case+0x1a5/0x480
[   11.649249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.649792]  kthread+0x337/0x6f0
[   11.649955]  ret_from_fork+0x41/0x80
[   11.650085]  ret_from_fork_asm+0x1a/0x30
[   11.650221] 
[   11.650292] The buggy address belongs to the object at ffff888102a01000
[   11.650292]  which belongs to the cache test_cache of size 200
[   11.650695] The buggy address is located 0 bytes inside of
[   11.650695]  200-byte region [ffff888102a01000, ffff888102a010c8)
[   11.651127] 
[   11.651238] The buggy address belongs to the physical page:
[   11.651491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a01
[   11.651962] flags: 0x200000000000000(node=0|zone=2)
[   11.652163] page_type: f5(slab)
[   11.652299] raw: 0200000000000000 ffff888102109140 dead000000000122 0000000000000000
[   11.652685] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   11.653070] page dumped because: kasan: bad access detected
[   11.653286] 
[   11.653378] Memory state around the buggy address:
[   11.653599]  ffff888102a00f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.653927]  ffff888102a00f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.654224] >ffff888102a01000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.654500]                    ^
[   11.654689]  ffff888102a01080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   11.655037]  ffff888102a01100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.655301] ==================================================================