Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-arm64

[  181.911862] ==================================================================
[  181.914047] BUG: KASAN: double-free in kmem_cache_double_free+0xe8/0x240
[  181.916268] Free of addr ffff0000c605d000 by task kunit_try_catch/194
[  181.917765] 
[  181.918398] CPU: 1 PID: 194 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  181.920273] Hardware name: linux,dummy-virt (DT)
[  181.921742] Call trace:
[  181.922281]  dump_backtrace+0x9c/0x128
[  181.923356]  show_stack+0x20/0x38
[  181.925390]  dump_stack_lvl+0x60/0xb0
[  181.926596]  print_report+0xf8/0x5d8
[  181.927766]  kasan_report_invalid_free+0xb0/0xd8
[  181.929142]  __kasan_slab_free+0x134/0x170
[  181.931316]  kmem_cache_free+0x18c/0x3f8
[  181.932280]  kmem_cache_double_free+0xe8/0x240
[  181.933594]  kunit_try_run_case+0xf8/0x260
[  181.934816]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  181.936273]  kthread+0x18c/0x1a8
[  181.937384]  ret_from_fork+0x10/0x20
[  181.938411] 
[  181.939070] Allocated by task 194:
[  181.940088]  kasan_save_stack+0x3c/0x68
[  181.941345]  kasan_set_track+0x2c/0x40
[  181.942535]  kasan_save_alloc_info+0x24/0x38
[  181.943893]  __kasan_slab_alloc+0xa8/0xb0
[  181.945148]  kmem_cache_alloc+0x134/0x330
[  181.946537]  kmem_cache_double_free+0xb8/0x240
[  181.948027]  kunit_try_run_case+0xf8/0x260
[  181.949389]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  181.950888]  kthread+0x18c/0x1a8
[  181.951859]  ret_from_fork+0x10/0x20
[  181.953272] 
[  181.953762] Freed by task 194:
[  181.954384]  kasan_save_stack+0x3c/0x68
[  181.956024]  kasan_set_track+0x2c/0x40
[  181.957332]  kasan_save_free_info+0x38/0x60
[  181.958691]  __kasan_slab_free+0x100/0x170
[  181.959917]  kmem_cache_free+0x18c/0x3f8
[  181.961298]  kmem_cache_double_free+0xd4/0x240
[  181.962755]  kunit_try_run_case+0xf8/0x260
[  181.964267]  kunit_generic_run_threadfn_adapter+0x38/0x60
[  181.965560]  kthread+0x18c/0x1a8
[  181.966566]  ret_from_fork+0x10/0x20
[  181.967658] 
[  181.968174] The buggy address belongs to the object at ffff0000c605d000
[  181.968174]  which belongs to the cache test_cache of size 200
[  181.970512] The buggy address is located 0 bytes inside of
[  181.970512]  200-byte region [ffff0000c605d000, ffff0000c605d0c8)
[  181.973435] 
[  181.974097] The buggy address belongs to the physical page:
[  181.975656] page:00000000f1f286b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605d
[  181.977948] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[  181.979193] page_type: 0xffffffff()
[  181.980394] raw: 0bfffc0000000800 ffff0000c0f9e780 dead000000000122 0000000000000000
[  181.982434] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[  181.983993] page dumped because: kasan: bad access detected
[  181.985566] 
[  181.986144] Memory state around the buggy address:
[  181.987909]  ffff0000c605cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  181.989365]  ffff0000c605cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  181.991120] >ffff0000c605d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  181.992725]                    ^
[  181.995085]  ffff0000c605d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[  181.996740]  ffff0000c605d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  181.998314] ==================================================================