Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   94.196236] ==================================================================
[   94.197713] BUG: KASAN: double-free in kmem_cache_double_free+0xe8/0x240
[   94.199070] Free of addr ffff0000c6102000 by task kunit_try_catch/195
[   94.200457] 
[   94.201050] CPU: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   94.202348] Hardware name: linux,dummy-virt (DT)
[   94.203281] Call trace:
[   94.203642]  dump_backtrace+0x9c/0x128
[   94.204843]  show_stack+0x20/0x38
[   94.205536]  dump_stack_lvl+0x60/0xb0
[   94.206397]  print_report+0xf8/0x5e8
[   94.207275]  kasan_report_invalid_free+0xc0/0xe8
[   94.208299]  __kasan_slab_free+0x134/0x170
[   94.209311]  kmem_cache_free+0x18c/0x3f8
[   94.210229]  kmem_cache_double_free+0xe8/0x240
[   94.211186]  kunit_try_run_case+0x114/0x298
[   94.212325]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.213470]  kthread+0x18c/0x1a8
[   94.214226]  ret_from_fork+0x10/0x20
[   94.215213] 
[   94.215640] Allocated by task 195:
[   94.216270]  kasan_save_stack+0x3c/0x68
[   94.217164]  kasan_set_track+0x2c/0x40
[   94.218016]  kasan_save_alloc_info+0x24/0x38
[   94.218927]  __kasan_slab_alloc+0xa8/0xb0
[   94.219839]  kmem_cache_alloc+0x138/0x330
[   94.220888]  kmem_cache_double_free+0xb8/0x240
[   94.221852]  kunit_try_run_case+0x114/0x298
[   94.222805]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.224130]  kthread+0x18c/0x1a8
[   94.224943]  ret_from_fork+0x10/0x20
[   94.225831] 
[   94.226295] Freed by task 195:
[   94.227294]  kasan_save_stack+0x3c/0x68
[   94.228275]  kasan_set_track+0x2c/0x40
[   94.229146]  kasan_save_free_info+0x38/0x60
[   94.230022]  __kasan_slab_free+0x100/0x170
[   94.230914]  kmem_cache_free+0x18c/0x3f8
[   94.231461]  kmem_cache_double_free+0xd4/0x240
[   94.232688]  kunit_try_run_case+0x114/0x298
[   94.233607]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.234672]  kthread+0x18c/0x1a8
[   94.235607]  ret_from_fork+0x10/0x20
[   94.236502] 
[   94.236984] The buggy address belongs to the object at ffff0000c6102000
[   94.236984]  which belongs to the cache test_cache of size 200
[   94.238478] The buggy address is located 0 bytes inside of
[   94.238478]  200-byte region [ffff0000c6102000, ffff0000c61020c8)
[   94.240180] 
[   94.240572] The buggy address belongs to the physical page:
[   94.241273] page:0000000082e9616c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106102
[   94.243018] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.244286] page_type: 0xffffffff()
[   94.245138] raw: 0bfffc0000000800 ffff0000c5437c80 dead000000000122 0000000000000000
[   94.246354] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   94.247518] page dumped because: kasan: bad access detected
[   94.248324] 
[   94.248806] Memory state around the buggy address:
[   94.249738]  ffff0000c6101f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.251149]  ffff0000c6101f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.252298] >ffff0000c6102000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   94.253440]                    ^
[   94.254141]  ffff0000c6102080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   94.255057]  ffff0000c6102100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.255551] ==================================================================


[   35.270064] ==================================================================
[   35.271924] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x250
[   35.272371] Free of addr ffff88810286f000 by task kunit_try_catch/210
[   35.273133] 
[   35.273351] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.274220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.275222] Call Trace:
[   35.275624]  <TASK>
[   35.275957]  dump_stack_lvl+0x4e/0x90
[   35.276511]  print_report+0xd2/0x650
[   35.277007]  ? __virt_addr_valid+0x156/0x1e0
[   35.277714]  ? kasan_complete_mode_report_info+0x64/0x200
[   35.278219]  ? kmem_cache_double_free+0xeb/0x250
[   35.278757]  kasan_report_invalid_free+0xfd/0x120
[   35.279310]  ? kmem_cache_double_free+0xeb/0x250
[   35.279923]  ? kmem_cache_double_free+0xeb/0x250
[   35.280179]  ____kasan_slab_free+0x19c/0x1d0
[   35.280566]  ? kmem_cache_double_free+0xeb/0x250
[   35.281160]  __kasan_slab_free+0x16/0x20
[   35.281942]  kmem_cache_free+0x1a7/0x4b0
[   35.282483]  kmem_cache_double_free+0xeb/0x250
[   35.283006]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   35.283652]  ? __schedule+0x715/0x11a0
[   35.283978]  ? ktime_get_ts64+0x118/0x140
[   35.284226]  kunit_try_run_case+0x120/0x290
[   35.284700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.285233]  ? __kasan_check_write+0x18/0x20
[   35.286057]  ? trace_preempt_on+0x20/0xa0
[   35.286609]  ? __kthread_parkme+0x4f/0xd0
[   35.287108]  ? preempt_count_sub+0x50/0x80
[   35.287652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.288193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.288643]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.288950]  kthread+0x19e/0x1e0
[   35.289167]  ? __pfx_kthread+0x10/0x10
[   35.289779]  ret_from_fork+0x41/0x70
[   35.290263]  ? __pfx_kthread+0x10/0x10
[   35.290824]  ret_from_fork_asm+0x1b/0x30
[   35.291320]  </TASK>
[   35.291674] 
[   35.291920] Allocated by task 210:
[   35.292293]  kasan_save_stack+0x44/0x70
[   35.292828]  kasan_set_track+0x29/0x40
[   35.293274]  kasan_save_alloc_info+0x22/0x30
[   35.294167]  __kasan_slab_alloc+0x91/0xa0
[   35.294811]  kmem_cache_alloc+0x186/0x3b0
[   35.295292]  kmem_cache_double_free+0xba/0x250
[   35.295735]  kunit_try_run_case+0x120/0x290
[   35.295993]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.296264]  kthread+0x19e/0x1e0
[   35.296695]  ret_from_fork+0x41/0x70
[   35.297124]  ret_from_fork_asm+0x1b/0x30
[   35.297928] 
[   35.298136] Freed by task 210:
[   35.298551]  kasan_save_stack+0x44/0x70
[   35.299074]  kasan_set_track+0x29/0x40
[   35.299590]  kasan_save_free_info+0x2f/0x50
[   35.300164]  ____kasan_slab_free+0x172/0x1d0
[   35.300548]  __kasan_slab_free+0x16/0x20
[   35.301042]  kmem_cache_free+0x1a7/0x4b0
[   35.301274]  kmem_cache_double_free+0xd1/0x250
[   35.302207]  kunit_try_run_case+0x120/0x290
[   35.302820]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.303288]  kthread+0x19e/0x1e0
[   35.303745]  ret_from_fork+0x41/0x70
[   35.304194]  ret_from_fork_asm+0x1b/0x30
[   35.304551] 
[   35.304662] The buggy address belongs to the object at ffff88810286f000
[   35.304662]  which belongs to the cache test_cache of size 200
[   35.306276] The buggy address is located 0 bytes inside of
[   35.306276]  200-byte region [ffff88810286f000, ffff88810286f0c8)
[   35.307255] 
[   35.307381] The buggy address belongs to the physical page:
[   35.308071] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10286f
[   35.309111] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.309876] page_type: 0xffffffff()
[   35.310091] raw: 0200000000000800 ffff8881017ab500 dead000000000122 0000000000000000
[   35.310610] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   35.311501] page dumped because: kasan: bad access detected
[   35.312103] 
[   35.312297] Memory state around the buggy address:
[   35.312940]  ffff88810286ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.314070]  ffff88810286ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.314879] >ffff88810286f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.315198]                    ^
[   35.315384]  ffff88810286f080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   35.316240]  ffff88810286f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.317055] ==================================================================