Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-armv7 | |
qemu-x86_64 |
[ 146.890436] ================================================================== [ 146.891404] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x23c [ 146.891865] Free of addr c8fb8000 by task kunit_try_catch/189 [ 146.892266] [ 146.892541] CPU: 1 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 146.893503] Hardware name: Generic DT based system [ 146.894073] unwind_backtrace from show_stack+0x18/0x1c [ 146.894871] show_stack from dump_stack_lvl+0x58/0x70 [ 146.895506] dump_stack_lvl from print_report+0x164/0x51c [ 146.896230] print_report from kasan_report_invalid_free+0xb4/0xe8 [ 146.897120] kasan_report_invalid_free from __kasan_slab_free+0xfc/0x124 [ 146.897910] __kasan_slab_free from kmem_cache_free+0x170/0x41c [ 146.898880] kmem_cache_free from kmem_cache_double_free+0xe4/0x23c [ 146.899833] kmem_cache_double_free from kunit_try_run_case+0x11c/0x2e4 [ 146.900703] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.901659] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 146.902518] kthread from ret_from_fork+0x14/0x30 [ 146.903103] Exception stack(0xfa0b3fb0 to 0xfa0b3ff8) [ 146.903724] 3fa0: 00000000 00000000 00000000 00000000 [ 146.904645] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 146.905496] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 146.906245] [ 146.906500] Allocated by task 189: [ 146.906875] kasan_set_track+0x3c/0x5c [ 146.907697] __kasan_slab_alloc+0x60/0x68 [ 146.908280] kmem_cache_alloc+0x1dc/0x574 [ 146.908800] kmem_cache_double_free+0xb0/0x23c [ 146.909906] kunit_try_run_case+0x11c/0x2e4 [ 146.910579] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.911529] kthread+0x184/0x1a8 [ 146.911969] ret_from_fork+0x14/0x30 [ 146.912409] [ 146.912664] Freed by task 189: [ 146.913195] kasan_set_track+0x3c/0x5c [ 146.913715] kasan_save_free_info+0x30/0x3c [ 146.914193] __kasan_slab_free+0xdc/0x124 [ 146.914949] kmem_cache_free+0x170/0x41c [ 146.915449] kmem_cache_double_free+0xcc/0x23c [ 146.916362] kunit_try_run_case+0x11c/0x2e4 [ 146.916988] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.917720] kthread+0x184/0x1a8 [ 146.918139] ret_from_fork+0x14/0x30 [ 146.918775] [ 146.919141] The buggy address belongs to the object at c8fb8000 [ 146.919141] which belongs to the cache test_cache of size 200 [ 146.920355] The buggy address is located 0 bytes inside of [ 146.920355] 200-byte region [c8fb8000, c8fb80c8) [ 146.921417] [ 146.921726] The buggy address belongs to the physical page: [ 146.922341] page:658a11fa refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fb8 [ 146.923354] flags: 0x800(slab|zone=0) [ 146.923855] page_type: 0xffffffff() [ 146.924465] raw: 00000800 c8919700 00000122 00000000 00000000 800f000f ffffffff 00000001 [ 146.925373] raw: 00000000 [ 146.926087] page dumped because: kasan: bad access detected [ 146.926949] [ 146.927164] Memory state around the buggy address: [ 146.927569] c8fb7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.928112] c8fb7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.928640] >c8fb8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 146.929546] ^ [ 146.929847] c8fb8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 146.930712] c8fb8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.931743] ==================================================================
[ 49.873541] ================================================================== [ 49.874457] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x250 [ 49.875287] Free of addr ffff888102850000 by task kunit_try_catch/212 [ 49.877415] [ 49.877671] CPU: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 49.878582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 49.879331] Call Trace: [ 49.879755] <TASK> [ 49.880255] dump_stack_lvl+0x4e/0x90 [ 49.880890] print_report+0xd2/0x660 [ 49.881514] ? __virt_addr_valid+0x156/0x1e0 [ 49.882202] ? kmem_cache_double_free+0xeb/0x250 [ 49.882858] ? kasan_complete_mode_report_info+0x64/0x200 [ 49.883481] ? kmem_cache_double_free+0xeb/0x250 [ 49.884114] kasan_report_invalid_free+0xcf/0x100 [ 49.884724] ? kmem_cache_double_free+0xeb/0x250 [ 49.885442] ? kmem_cache_double_free+0xeb/0x250 [ 49.886197] ____kasan_slab_free+0x19c/0x1d0 [ 49.886878] ? kmem_cache_double_free+0xeb/0x250 [ 49.887460] __kasan_slab_free+0x16/0x20 [ 49.888156] kmem_cache_free+0x1a7/0x4b0 [ 49.888603] kmem_cache_double_free+0xeb/0x250 [ 49.889347] ? __pfx_kmem_cache_double_free+0x10/0x10 [ 49.890105] ? __pfx_kmem_cache_double_free+0x10/0x10 [ 49.890828] ? kunit_try_run_case+0x11b/0x290 [ 49.891473] kunit_try_run_case+0x126/0x290 [ 49.892095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.892727] ? __kasan_check_write+0x18/0x20 [ 49.893383] ? trace_preempt_on+0x20/0xa0 [ 49.894010] ? __kthread_parkme+0x4f/0xd0 [ 49.894558] ? preempt_count_sub+0x50/0x80 [ 49.895190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.895885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.896592] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.897268] kthread+0x19e/0x1e0 [ 49.897710] ? __pfx_kthread+0x10/0x10 [ 49.898425] ret_from_fork+0x41/0x70 [ 49.898992] ? __pfx_kthread+0x10/0x10 [ 49.899607] ret_from_fork_asm+0x1b/0x30 [ 49.900246] </TASK> [ 49.900617] [ 49.900968] Allocated by task 212: [ 49.901488] kasan_save_stack+0x3c/0x60 [ 49.902085] kasan_set_track+0x29/0x40 [ 49.902575] kasan_save_alloc_info+0x22/0x30 [ 49.903258] __kasan_slab_alloc+0x91/0xa0 [ 49.903824] kmem_cache_alloc+0x180/0x3b0 [ 49.904429] kmem_cache_double_free+0xba/0x250 [ 49.905017] kunit_try_run_case+0x126/0x290 [ 49.905638] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.906372] kthread+0x19e/0x1e0 [ 49.906916] ret_from_fork+0x41/0x70 [ 49.908066] ret_from_fork_asm+0x1b/0x30 [ 49.908546] [ 49.908880] Freed by task 212: [ 49.909376] kasan_save_stack+0x3c/0x60 [ 49.909897] kasan_set_track+0x29/0x40 [ 49.910424] kasan_save_free_info+0x2f/0x50 [ 49.911109] ____kasan_slab_free+0x172/0x1d0 [ 49.911769] __kasan_slab_free+0x16/0x20 [ 49.912348] kmem_cache_free+0x1a7/0x4b0 [ 49.912999] kmem_cache_double_free+0xd1/0x250 [ 49.913520] kunit_try_run_case+0x126/0x290 [ 49.914173] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.914889] kthread+0x19e/0x1e0 [ 49.915406] ret_from_fork+0x41/0x70 [ 49.916026] ret_from_fork_asm+0x1b/0x30 [ 49.916541] [ 49.916901] The buggy address belongs to the object at ffff888102850000 [ 49.916901] which belongs to the cache test_cache of size 200 [ 49.918050] The buggy address is located 0 bytes inside of [ 49.918050] 200-byte region [ffff888102850000, ffff8881028500c8) [ 49.919221] [ 49.919522] The buggy address belongs to the physical page: [ 49.920226] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102850 [ 49.921148] flags: 0x200000000000800(slab|node=0|zone=2) [ 49.921850] page_type: 0xffffffff() [ 49.922337] raw: 0200000000000800 ffff888101ce1b40 dead000000000122 0000000000000000 [ 49.923112] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 49.923995] page dumped because: kasan: bad access detected [ 49.924564] [ 49.924852] Memory state around the buggy address: [ 49.925459] ffff88810284ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.926220] ffff88810284ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.927023] >ffff888102850000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.927667] ^ [ 49.928240] ffff888102850080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 49.928984] ffff888102850100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.929771] ==================================================================