Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.214390] ==================================================================
[   17.214501] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   17.214820] Free of addr fff00000c5acc120 by task kunit_try_catch/192
[   17.214937] 
[   17.214984] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.215069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.215098] Hardware name: linux,dummy-virt (DT)
[   17.215129] Call trace:
[   17.215153]  show_stack+0x20/0x38 (C)
[   17.215231]  dump_stack_lvl+0x8c/0xd0
[   17.215287]  print_report+0x118/0x5d0
[   17.215567]  kasan_report_invalid_free+0xc0/0xe8
[   17.215646]  check_slab_allocation+0xd4/0x108
[   17.215994]  __kasan_slab_pre_free+0x2c/0x48
[   17.216183]  kfree+0xe8/0x3c8
[   17.216303]  kfree_sensitive+0x3c/0xb0
[   17.216518]  kmalloc_double_kzfree+0x168/0x308
[   17.217016]  kunit_try_run_case+0x170/0x3f0
[   17.217108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.217233]  kthread+0x328/0x630
[   17.217411]  ret_from_fork+0x10/0x20
[   17.217522] 
[   17.218056] Allocated by task 192:
[   17.218151]  kasan_save_stack+0x3c/0x68
[   17.218334]  kasan_save_track+0x20/0x40
[   17.218375]  kasan_save_alloc_info+0x40/0x58
[   17.218818]  __kasan_kmalloc+0xd4/0xd8
[   17.219059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.219582]  kmalloc_double_kzfree+0xb8/0x308
[   17.219715]  kunit_try_run_case+0x170/0x3f0
[   17.219898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.219944]  kthread+0x328/0x630
[   17.219979]  ret_from_fork+0x10/0x20
[   17.220208] 
[   17.220493] Freed by task 192:
[   17.220606]  kasan_save_stack+0x3c/0x68
[   17.220735]  kasan_save_track+0x20/0x40
[   17.221392]  kasan_save_free_info+0x4c/0x78
[   17.221460]  __kasan_slab_free+0x6c/0x98
[   17.221577]  kfree+0x214/0x3c8
[   17.221766]  kfree_sensitive+0x80/0xb0
[   17.221906]  kmalloc_double_kzfree+0x11c/0x308
[   17.222030]  kunit_try_run_case+0x170/0x3f0
[   17.222343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.222570]  kthread+0x328/0x630
[   17.222646]  ret_from_fork+0x10/0x20
[   17.222838] 
[   17.222958] The buggy address belongs to the object at fff00000c5acc120
[   17.222958]  which belongs to the cache kmalloc-16 of size 16
[   17.223102] The buggy address is located 0 bytes inside of
[   17.223102]  16-byte region [fff00000c5acc120, fff00000c5acc130)
[   17.223213] 
[   17.223258] The buggy address belongs to the physical page:
[   17.223291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105acc
[   17.223796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.224153] page_type: f5(slab)
[   17.224373] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.224471] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.224633] page dumped because: kasan: bad access detected
[   17.224667] 
[   17.224725] Memory state around the buggy address:
[   17.224768]  fff00000c5acc000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   17.224811]  fff00000c5acc080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.225114] >fff00000c5acc100: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   17.225168]                                ^
[   17.225250]  fff00000c5acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.225331]  fff00000c5acc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.225382] ==================================================================

[   16.832307] ==================================================================
[   16.832691] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   16.832775] Free of addr fff00000c5a02c40 by task kunit_try_catch/192
[   16.832828] 
[   16.833008] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.833217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.833542] Hardware name: linux,dummy-virt (DT)
[   16.833580] Call trace:
[   16.833603]  show_stack+0x20/0x38 (C)
[   16.833732]  dump_stack_lvl+0x8c/0xd0
[   16.833832]  print_report+0x118/0x5d0
[   16.834004]  kasan_report_invalid_free+0xc0/0xe8
[   16.834111]  check_slab_allocation+0xd4/0x108
[   16.834281]  __kasan_slab_pre_free+0x2c/0x48
[   16.834346]  kfree+0xe8/0x3c8
[   16.834693]  kfree_sensitive+0x3c/0xb0
[   16.834946]  kmalloc_double_kzfree+0x168/0x308
[   16.835097]  kunit_try_run_case+0x170/0x3f0
[   16.835181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.835301]  kthread+0x328/0x630
[   16.835391]  ret_from_fork+0x10/0x20
[   16.835630] 
[   16.835719] Allocated by task 192:
[   16.835751]  kasan_save_stack+0x3c/0x68
[   16.835824]  kasan_save_track+0x20/0x40
[   16.835864]  kasan_save_alloc_info+0x40/0x58
[   16.835905]  __kasan_kmalloc+0xd4/0xd8
[   16.835941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.835982]  kmalloc_double_kzfree+0xb8/0x308
[   16.836084]  kunit_try_run_case+0x170/0x3f0
[   16.836125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.836185]  kthread+0x328/0x630
[   16.836229]  ret_from_fork+0x10/0x20
[   16.836265] 
[   16.836284] Freed by task 192:
[   16.836309]  kasan_save_stack+0x3c/0x68
[   16.836703]  kasan_save_track+0x20/0x40
[   16.836768]  kasan_save_free_info+0x4c/0x78
[   16.837145]  __kasan_slab_free+0x6c/0x98
[   16.837254]  kfree+0x214/0x3c8
[   16.837397]  kfree_sensitive+0x80/0xb0
[   16.837503]  kmalloc_double_kzfree+0x11c/0x308
[   16.837664]  kunit_try_run_case+0x170/0x3f0
[   16.837765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.837993]  kthread+0x328/0x630
[   16.838062]  ret_from_fork+0x10/0x20
[   16.838248] 
[   16.838307] The buggy address belongs to the object at fff00000c5a02c40
[   16.838307]  which belongs to the cache kmalloc-16 of size 16
[   16.838499] The buggy address is located 0 bytes inside of
[   16.838499]  16-byte region [fff00000c5a02c40, fff00000c5a02c50)
[   16.838652] 
[   16.838736] The buggy address belongs to the physical page:
[   16.838806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.839143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.839370] page_type: f5(slab)
[   16.839534] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.839640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.839786] page dumped because: kasan: bad access detected
[   16.839826] 
[   16.839844] Memory state around the buggy address:
[   16.840140]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.840329]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.840384] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   16.840514]                                            ^
[   16.840648]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.840736]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.840853] ==================================================================

[   16.832940] ==================================================================
[   16.833021] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   16.833072] Free of addr fff00000c5755ea0 by task kunit_try_catch/192
[   16.833114] 
[   16.833350] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.833448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.833476] Hardware name: linux,dummy-virt (DT)
[   16.833523] Call trace:
[   16.833581]  show_stack+0x20/0x38 (C)
[   16.833647]  dump_stack_lvl+0x8c/0xd0
[   16.833741]  print_report+0x118/0x5d0
[   16.833816]  kasan_report_invalid_free+0xc0/0xe8
[   16.833870]  check_slab_allocation+0xd4/0x108
[   16.833920]  __kasan_slab_pre_free+0x2c/0x48
[   16.834189]  kfree+0xe8/0x3c8
[   16.834279]  kfree_sensitive+0x3c/0xb0
[   16.834353]  kmalloc_double_kzfree+0x168/0x308
[   16.834408]  kunit_try_run_case+0x170/0x3f0
[   16.834492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.834575]  kthread+0x328/0x630
[   16.834618]  ret_from_fork+0x10/0x20
[   16.834709] 
[   16.834766] Allocated by task 192:
[   16.834795]  kasan_save_stack+0x3c/0x68
[   16.834851]  kasan_save_track+0x20/0x40
[   16.834889]  kasan_save_alloc_info+0x40/0x58
[   16.834929]  __kasan_kmalloc+0xd4/0xd8
[   16.835074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.835244]  kmalloc_double_kzfree+0xb8/0x308
[   16.835317]  kunit_try_run_case+0x170/0x3f0
[   16.835464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.835518]  kthread+0x328/0x630
[   16.835551]  ret_from_fork+0x10/0x20
[   16.835604] 
[   16.835623] Freed by task 192:
[   16.835649]  kasan_save_stack+0x3c/0x68
[   16.835687]  kasan_save_track+0x20/0x40
[   16.835768]  kasan_save_free_info+0x4c/0x78
[   16.835890]  __kasan_slab_free+0x6c/0x98
[   16.835973]  kfree+0x214/0x3c8
[   16.836034]  kfree_sensitive+0x80/0xb0
[   16.836200]  kmalloc_double_kzfree+0x11c/0x308
[   16.836299]  kunit_try_run_case+0x170/0x3f0
[   16.836357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.836624]  kthread+0x328/0x630
[   16.836699]  ret_from_fork+0x10/0x20
[   16.836774] 
[   16.836795] The buggy address belongs to the object at fff00000c5755ea0
[   16.836795]  which belongs to the cache kmalloc-16 of size 16
[   16.836854] The buggy address is located 0 bytes inside of
[   16.836854]  16-byte region [fff00000c5755ea0, fff00000c5755eb0)
[   16.836933] 
[   16.837043] The buggy address belongs to the physical page:
[   16.837106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105755
[   16.837245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.837383] page_type: f5(slab)
[   16.837476] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.837552] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.837943] page dumped because: kasan: bad access detected
[   16.838017] 
[   16.838109] Memory state around the buggy address:
[   16.838186]  fff00000c5755d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   16.838229]  fff00000c5755e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.838564] >fff00000c5755e80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   16.838696]                                ^
[   16.838806]  fff00000c5755f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.838936]  fff00000c5755f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.838974] ==================================================================

[   12.617214] ==================================================================
[   12.617983] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   12.618317] Free of addr ffff888102837200 by task kunit_try_catch/209
[   12.618518] 
[   12.618695] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.618739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.618749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.618775] Call Trace:
[   12.618787]  <TASK>
[   12.618802]  dump_stack_lvl+0x73/0xb0
[   12.618831]  print_report+0xd1/0x610
[   12.618863]  ? __virt_addr_valid+0x1db/0x2d0
[   12.618887]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.618927]  ? kfree_sensitive+0x2e/0x90
[   12.618948]  kasan_report_invalid_free+0x10a/0x130
[   12.618973]  ? kfree_sensitive+0x2e/0x90
[   12.619004]  ? kfree_sensitive+0x2e/0x90
[   12.619023]  check_slab_allocation+0x101/0x130
[   12.619045]  __kasan_slab_pre_free+0x28/0x40
[   12.619065]  kfree+0xf0/0x3f0
[   12.619086]  ? add_taint+0x2e/0xa0
[   12.619104]  ? kfree_sensitive+0x2e/0x90
[   12.619126]  kfree_sensitive+0x2e/0x90
[   12.619145]  kmalloc_double_kzfree+0x19c/0x350
[   12.619179]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   12.619202]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.619228]  ? trace_hardirqs_on+0x37/0xe0
[   12.619261]  ? __pfx_read_tsc+0x10/0x10
[   12.619282]  ? ktime_get_ts64+0x86/0x230
[   12.619306]  kunit_try_run_case+0x1a5/0x480
[   12.619330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.619354]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.619379]  ? __kthread_parkme+0x82/0x180
[   12.619400]  ? preempt_count_sub+0x50/0x80
[   12.619424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.619447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.619471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.619494]  kthread+0x337/0x6f0
[   12.619522]  ? trace_preempt_on+0x20/0xc0
[   12.619610]  ? __pfx_kthread+0x10/0x10
[   12.619631]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.619652]  ? calculate_sigpending+0x7b/0xa0
[   12.619677]  ? __pfx_kthread+0x10/0x10
[   12.619698]  ret_from_fork+0x116/0x1d0
[   12.619716]  ? __pfx_kthread+0x10/0x10
[   12.619736]  ret_from_fork_asm+0x1a/0x30
[   12.619768]  </TASK>
[   12.619779] 
[   12.628797] Allocated by task 209:
[   12.629154]  kasan_save_stack+0x45/0x70
[   12.629398]  kasan_save_track+0x18/0x40
[   12.629691]  kasan_save_alloc_info+0x3b/0x50
[   12.629899]  __kasan_kmalloc+0xb7/0xc0
[   12.630153]  __kmalloc_cache_noprof+0x189/0x420
[   12.630313]  kmalloc_double_kzfree+0xa9/0x350
[   12.630465]  kunit_try_run_case+0x1a5/0x480
[   12.630611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.630870]  kthread+0x337/0x6f0
[   12.631078]  ret_from_fork+0x116/0x1d0
[   12.631301]  ret_from_fork_asm+0x1a/0x30
[   12.631625] 
[   12.631727] Freed by task 209:
[   12.631886]  kasan_save_stack+0x45/0x70
[   12.632087]  kasan_save_track+0x18/0x40
[   12.632272]  kasan_save_free_info+0x3f/0x60
[   12.632484]  __kasan_slab_free+0x56/0x70
[   12.632884]  kfree+0x222/0x3f0
[   12.633021]  kfree_sensitive+0x67/0x90
[   12.633416]  kmalloc_double_kzfree+0x12b/0x350
[   12.633753]  kunit_try_run_case+0x1a5/0x480
[   12.633927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.634105]  kthread+0x337/0x6f0
[   12.634229]  ret_from_fork+0x116/0x1d0
[   12.634361]  ret_from_fork_asm+0x1a/0x30
[   12.634501] 
[   12.634573] The buggy address belongs to the object at ffff888102837200
[   12.634573]  which belongs to the cache kmalloc-16 of size 16
[   12.635091] The buggy address is located 0 bytes inside of
[   12.635091]  16-byte region [ffff888102837200, ffff888102837210)
[   12.635589] 
[   12.635687] The buggy address belongs to the physical page:
[   12.635887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   12.636231] flags: 0x200000000000000(node=0|zone=2)
[   12.636398] page_type: f5(slab)
[   12.636790] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.637286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.637796] page dumped because: kasan: bad access detected
[   12.638148] 
[   12.638220] Memory state around the buggy address:
[   12.638379]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   12.638967]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.639291] >ffff888102837200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.639704]                    ^
[   12.639876]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.640209]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.640455] ==================================================================

[   12.391157] ==================================================================
[   12.391586] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   12.391877] Free of addr ffff8881016842e0 by task kunit_try_catch/210
[   12.392162] 
[   12.392258] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.392300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.392310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.392330] Call Trace:
[   12.392346]  <TASK>
[   12.392361]  dump_stack_lvl+0x73/0xb0
[   12.392388]  print_report+0xd1/0x610
[   12.392599]  ? __virt_addr_valid+0x1db/0x2d0
[   12.392642]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.392665]  ? kfree_sensitive+0x2e/0x90
[   12.392686]  kasan_report_invalid_free+0x10a/0x130
[   12.392962]  ? kfree_sensitive+0x2e/0x90
[   12.392989]  ? kfree_sensitive+0x2e/0x90
[   12.393009]  check_slab_allocation+0x101/0x130
[   12.393031]  __kasan_slab_pre_free+0x28/0x40
[   12.393051]  kfree+0xf0/0x3f0
[   12.393073]  ? kfree_sensitive+0x2e/0x90
[   12.393095]  kfree_sensitive+0x2e/0x90
[   12.393114]  kmalloc_double_kzfree+0x19c/0x350
[   12.393145]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   12.393168]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.393193]  ? trace_hardirqs_on+0x37/0xe0
[   12.393216]  ? __pfx_read_tsc+0x10/0x10
[   12.393235]  ? ktime_get_ts64+0x86/0x230
[   12.393259]  kunit_try_run_case+0x1a5/0x480
[   12.393282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.393306]  ? queued_spin_lock_slowpath+0x116/0xb40
[   12.393330]  ? __kthread_parkme+0x82/0x180
[   12.393349]  ? preempt_count_sub+0x50/0x80
[   12.393373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.393396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.393476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.393500]  kthread+0x337/0x6f0
[   12.393519]  ? trace_preempt_on+0x20/0xc0
[   12.393540]  ? __pfx_kthread+0x10/0x10
[   12.393559]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.393581]  ? calculate_sigpending+0x7b/0xa0
[   12.393604]  ? __pfx_kthread+0x10/0x10
[   12.393625]  ret_from_fork+0x116/0x1d0
[   12.393643]  ? __pfx_kthread+0x10/0x10
[   12.393662]  ret_from_fork_asm+0x1a/0x30
[   12.393695]  </TASK>
[   12.393705] 
[   12.407424] Allocated by task 210:
[   12.407661]  kasan_save_stack+0x45/0x70
[   12.408109]  kasan_save_track+0x18/0x40
[   12.408423]  kasan_save_alloc_info+0x3b/0x50
[   12.408601]  __kasan_kmalloc+0xb7/0xc0
[   12.409095]  __kmalloc_cache_noprof+0x189/0x420
[   12.409534]  kmalloc_double_kzfree+0xa9/0x350
[   12.409694]  kunit_try_run_case+0x1a5/0x480
[   12.409846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.410028]  kthread+0x337/0x6f0
[   12.410148]  ret_from_fork+0x116/0x1d0
[   12.410279]  ret_from_fork_asm+0x1a/0x30
[   12.410493] 
[   12.410736] Freed by task 210:
[   12.411064]  kasan_save_stack+0x45/0x70
[   12.411402]  kasan_save_track+0x18/0x40
[   12.411996]  kasan_save_free_info+0x3f/0x60
[   12.412390]  __kasan_slab_free+0x56/0x70
[   12.412917]  kfree+0x222/0x3f0
[   12.413224]  kfree_sensitive+0x67/0x90
[   12.413716]  kmalloc_double_kzfree+0x12b/0x350
[   12.414138]  kunit_try_run_case+0x1a5/0x480
[   12.414617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.415103]  kthread+0x337/0x6f0
[   12.415416]  ret_from_fork+0x116/0x1d0
[   12.415919]  ret_from_fork_asm+0x1a/0x30
[   12.416276] 
[   12.416350] The buggy address belongs to the object at ffff8881016842e0
[   12.416350]  which belongs to the cache kmalloc-16 of size 16
[   12.417656] The buggy address is located 0 bytes inside of
[   12.417656]  16-byte region [ffff8881016842e0, ffff8881016842f0)
[   12.418116] 
[   12.418190] The buggy address belongs to the physical page:
[   12.418358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   12.419139] flags: 0x200000000000000(node=0|zone=2)
[   12.419677] page_type: f5(slab)
[   12.420073] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.420834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.421761] page dumped because: kasan: bad access detected
[   12.421986] 
[   12.422057] Memory state around the buggy address:
[   12.422216]  ffff888101684180: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   12.422537]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   12.423216] >ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.423939]                                                        ^
[   12.424560]  ffff888101684300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.425209]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.425969] ==================================================================

[   12.556459] ==================================================================
[   12.556837] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   12.557384] Free of addr ffff888101be2ea0 by task kunit_try_catch/209
[   12.558334] 
[   12.558706] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.558891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.558903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.558925] Call Trace:
[   12.558943]  <TASK>
[   12.558962]  dump_stack_lvl+0x73/0xb0
[   12.559028]  print_report+0xd1/0x610
[   12.559053]  ? __virt_addr_valid+0x1db/0x2d0
[   12.559078]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.559100]  ? kfree_sensitive+0x2e/0x90
[   12.559121]  kasan_report_invalid_free+0x10a/0x130
[   12.559146]  ? kfree_sensitive+0x2e/0x90
[   12.559167]  ? kfree_sensitive+0x2e/0x90
[   12.559186]  check_slab_allocation+0x101/0x130
[   12.559208]  __kasan_slab_pre_free+0x28/0x40
[   12.559229]  kfree+0xf0/0x3f0
[   12.559251]  ? kfree_sensitive+0x2e/0x90
[   12.559273]  kfree_sensitive+0x2e/0x90
[   12.559293]  kmalloc_double_kzfree+0x19c/0x350
[   12.559317]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   12.559341]  ? __schedule+0x10cc/0x2b60
[   12.559364]  ? __pfx_read_tsc+0x10/0x10
[   12.559385]  ? ktime_get_ts64+0x86/0x230
[   12.559425]  kunit_try_run_case+0x1a5/0x480
[   12.559449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.559471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.559495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.559518]  ? __kthread_parkme+0x82/0x180
[   12.559539]  ? preempt_count_sub+0x50/0x80
[   12.559563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.559586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.559609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.559633]  kthread+0x337/0x6f0
[   12.559652]  ? trace_preempt_on+0x20/0xc0
[   12.559674]  ? __pfx_kthread+0x10/0x10
[   12.559694]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.559715]  ? calculate_sigpending+0x7b/0xa0
[   12.559739]  ? __pfx_kthread+0x10/0x10
[   12.559760]  ret_from_fork+0x116/0x1d0
[   12.559777]  ? __pfx_kthread+0x10/0x10
[   12.559797]  ret_from_fork_asm+0x1a/0x30
[   12.559829]  </TASK>
[   12.559839] 
[   12.570631] Allocated by task 209:
[   12.570836]  kasan_save_stack+0x45/0x70
[   12.571069]  kasan_save_track+0x18/0x40
[   12.571662]  kasan_save_alloc_info+0x3b/0x50
[   12.571836]  __kasan_kmalloc+0xb7/0xc0
[   12.571970]  __kmalloc_cache_noprof+0x189/0x420
[   12.572141]  kmalloc_double_kzfree+0xa9/0x350
[   12.572296]  kunit_try_run_case+0x1a5/0x480
[   12.572442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.572618]  kthread+0x337/0x6f0
[   12.572762]  ret_from_fork+0x116/0x1d0
[   12.574173]  ret_from_fork_asm+0x1a/0x30
[   12.574875] 
[   12.574991] Freed by task 209:
[   12.575172]  kasan_save_stack+0x45/0x70
[   12.575376]  kasan_save_track+0x18/0x40
[   12.576299]  kasan_save_free_info+0x3f/0x60
[   12.576527]  __kasan_slab_free+0x56/0x70
[   12.576679]  kfree+0x222/0x3f0
[   12.577020]  kfree_sensitive+0x67/0x90
[   12.577401]  kmalloc_double_kzfree+0x12b/0x350
[   12.577637]  kunit_try_run_case+0x1a5/0x480
[   12.577953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.578422]  kthread+0x337/0x6f0
[   12.578576]  ret_from_fork+0x116/0x1d0
[   12.578839]  ret_from_fork_asm+0x1a/0x30
[   12.579285] 
[   12.579386] The buggy address belongs to the object at ffff888101be2ea0
[   12.579386]  which belongs to the cache kmalloc-16 of size 16
[   12.579984] The buggy address is located 0 bytes inside of
[   12.579984]  16-byte region [ffff888101be2ea0, ffff888101be2eb0)
[   12.580878] 
[   12.581160] The buggy address belongs to the physical page:
[   12.581430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101be2
[   12.581765] flags: 0x200000000000000(node=0|zone=2)
[   12.581981] page_type: f5(slab)
[   12.582489] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.582835] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.583286] page dumped because: kasan: bad access detected
[   12.583766] 
[   12.583871] Memory state around the buggy address:
[   12.584477]  ffff888101be2d80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   12.584786]  ffff888101be2e00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   12.585188] >ffff888101be2e80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   12.585644]                                ^
[   12.585835]  ffff888101be2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.586442]  ffff888101be2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.586760] ==================================================================