Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   34.762685] ==================================================================
[   34.762871] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   34.763007] Read of size 1 at addr ffff000800dba140 by task kunit_try_catch/262
[   34.766568] 
[   34.768054] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   34.768116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.768133] Hardware name: WinLink E850-96 board (DT)
[   34.768153] Call trace:
[   34.768167]  show_stack+0x20/0x38 (C)
[   34.768204]  dump_stack_lvl+0x8c/0xd0
[   34.768240]  print_report+0x118/0x608
[   34.768276]  kasan_report+0xdc/0x128
[   34.768311]  __kasan_check_byte+0x54/0x70
[   34.768344]  kmem_cache_destroy+0x34/0x218
[   34.768377]  kmem_cache_double_destroy+0x174/0x300
[   34.768412]  kunit_try_run_case+0x170/0x3f0
[   34.768451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.768488]  kthread+0x328/0x630
[   34.768521]  ret_from_fork+0x10/0x20
[   34.768559] 
[   34.834794] Allocated by task 262:
[   34.838183]  kasan_save_stack+0x3c/0x68
[   34.841999]  kasan_save_track+0x20/0x40
[   34.845818]  kasan_save_alloc_info+0x40/0x58
[   34.850072]  __kasan_slab_alloc+0xa8/0xb0
[   34.854065]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.858666]  __kmem_cache_create_args+0x178/0x280
[   34.863352]  kmem_cache_double_destroy+0xc0/0x300
[   34.868040]  kunit_try_run_case+0x170/0x3f0
[   34.872208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.877675]  kthread+0x328/0x630
[   34.880887]  ret_from_fork+0x10/0x20
[   34.884446] 
[   34.885923] Freed by task 262:
[   34.888963]  kasan_save_stack+0x3c/0x68
[   34.892779]  kasan_save_track+0x20/0x40
[   34.896599]  kasan_save_free_info+0x4c/0x78
[   34.900765]  __kasan_slab_free+0x6c/0x98
[   34.904671]  kmem_cache_free+0x260/0x468
[   34.908577]  slab_kmem_cache_release+0x38/0x50
[   34.913006]  kmem_cache_release+0x1c/0x30
[   34.916998]  kobject_put+0x17c/0x420
[   34.920558]  sysfs_slab_release+0x1c/0x30
[   34.924549]  kmem_cache_destroy+0x118/0x218
[   34.928716]  kmem_cache_double_destroy+0x128/0x300
[   34.933490]  kunit_try_run_case+0x170/0x3f0
[   34.937657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.943127]  kthread+0x328/0x630
[   34.946339]  ret_from_fork+0x10/0x20
[   34.949896] 
[   34.951374] The buggy address belongs to the object at ffff000800dba140
[   34.951374]  which belongs to the cache kmem_cache of size 208
[   34.963787] The buggy address is located 0 bytes inside of
[   34.963787]  freed 208-byte region [ffff000800dba140, ffff000800dba210)
[   34.975851] 
[   34.977331] The buggy address belongs to the physical page:
[   34.982887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dba
[   34.990870] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.998510] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.005453] page_type: f5(slab)
[   35.008591] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.016309] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.024037] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.031847] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.039660] head: 0bfffe0000000001 fffffdffe0036e81 00000000ffffffff 00000000ffffffff
[   35.047472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.055277] page dumped because: kasan: bad access detected
[   35.060832] 
[   35.062308] Memory state around the buggy address:
[   35.067088]  ffff000800dba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.074291]  ffff000800dba080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   35.081496] >ffff000800dba100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.088696]                                            ^
[   35.093995]  ffff000800dba180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.101201]  ffff000800dba200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.108404] ==================================================================

[   27.705377] ==================================================================
[   27.706104] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   27.706860] Read of size 1 at addr fff00000c569fb40 by task kunit_try_catch/215
[   27.707298] 
[   27.707399] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.707641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.707715] Hardware name: linux,dummy-virt (DT)
[   27.707806] Call trace:
[   27.707867]  show_stack+0x20/0x38 (C)
[   27.708232]  dump_stack_lvl+0x8c/0xd0
[   27.708538]  print_report+0x118/0x608
[   27.708786]  kasan_report+0xdc/0x128
[   27.708917]  __kasan_check_byte+0x54/0x70
[   27.709062]  kmem_cache_destroy+0x34/0x218
[   27.709185]  kmem_cache_double_destroy+0x174/0x300
[   27.709304]  kunit_try_run_case+0x170/0x3f0
[   27.709464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.709669]  kthread+0x328/0x630
[   27.709878]  ret_from_fork+0x10/0x20
[   27.710177] 
[   27.710225] Allocated by task 215:
[   27.710309]  kasan_save_stack+0x3c/0x68
[   27.710549]  kasan_save_track+0x20/0x40
[   27.710652]  kasan_save_alloc_info+0x40/0x58
[   27.710828]  __kasan_slab_alloc+0xa8/0xb0
[   27.710993]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.711153]  __kmem_cache_create_args+0x178/0x280
[   27.711285]  kmem_cache_double_destroy+0xc0/0x300
[   27.711410]  kunit_try_run_case+0x170/0x3f0
[   27.712321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.712445]  kthread+0x328/0x630
[   27.712553]  ret_from_fork+0x10/0x20
[   27.712724] 
[   27.713007] Freed by task 215:
[   27.713120]  kasan_save_stack+0x3c/0x68
[   27.713242]  kasan_save_track+0x20/0x40
[   27.713502]  kasan_save_free_info+0x4c/0x78
[   27.713622]  __kasan_slab_free+0x6c/0x98
[   27.713788]  kmem_cache_free+0x260/0x468
[   27.713891]  slab_kmem_cache_release+0x38/0x50
[   27.714008]  kmem_cache_release+0x1c/0x30
[   27.714114]  kobject_put+0x17c/0x420
[   27.714205]  sysfs_slab_release+0x1c/0x30
[   27.714311]  kmem_cache_destroy+0x118/0x218
[   27.714409]  kmem_cache_double_destroy+0x128/0x300
[   27.714522]  kunit_try_run_case+0x170/0x3f0
[   27.714656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.714769]  kthread+0x328/0x630
[   27.714854]  ret_from_fork+0x10/0x20
[   27.714989] 
[   27.715045] The buggy address belongs to the object at fff00000c569fb40
[   27.715045]  which belongs to the cache kmem_cache of size 208
[   27.715185] The buggy address is located 0 bytes inside of
[   27.715185]  freed 208-byte region [fff00000c569fb40, fff00000c569fc10)
[   27.716141] 
[   27.716202] The buggy address belongs to the physical page:
[   27.716573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10569f
[   27.716790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.717181] page_type: f5(slab)
[   27.717498] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   27.717861] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   27.717990] page dumped because: kasan: bad access detected
[   27.718071] 
[   27.718120] Memory state around the buggy address:
[   27.718205]  fff00000c569fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.718768]  fff00000c569fa80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   27.719061] >fff00000c569fb00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   27.719165]                                            ^
[   27.719696]  fff00000c569fb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.720227]  fff00000c569fc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.720437] ==================================================================

[   27.748316] ==================================================================
[   27.748493] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   27.748721] Read of size 1 at addr fff00000c770b140 by task kunit_try_catch/215
[   27.748966] 
[   27.749127] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.749412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.749519] Hardware name: linux,dummy-virt (DT)
[   27.749623] Call trace:
[   27.749689]  show_stack+0x20/0x38 (C)
[   27.749942]  dump_stack_lvl+0x8c/0xd0
[   27.750118]  print_report+0x118/0x608
[   27.750247]  kasan_report+0xdc/0x128
[   27.750454]  __kasan_check_byte+0x54/0x70
[   27.750648]  kmem_cache_destroy+0x34/0x218
[   27.750773]  kmem_cache_double_destroy+0x174/0x300
[   27.750917]  kunit_try_run_case+0x170/0x3f0
[   27.751047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.751178]  kthread+0x328/0x630
[   27.751299]  ret_from_fork+0x10/0x20
[   27.751579] 
[   27.751656] Allocated by task 215:
[   27.751755]  kasan_save_stack+0x3c/0x68
[   27.751908]  kasan_save_track+0x20/0x40
[   27.752200]  kasan_save_alloc_info+0x40/0x58
[   27.752359]  __kasan_slab_alloc+0xa8/0xb0
[   27.752467]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.752697]  __kmem_cache_create_args+0x178/0x280
[   27.752882]  kmem_cache_double_destroy+0xc0/0x300
[   27.752995]  kunit_try_run_case+0x170/0x3f0
[   27.753175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.753292]  kthread+0x328/0x630
[   27.753389]  ret_from_fork+0x10/0x20
[   27.753521] 
[   27.753578] Freed by task 215:
[   27.753778]  kasan_save_stack+0x3c/0x68
[   27.753902]  kasan_save_track+0x20/0x40
[   27.754021]  kasan_save_free_info+0x4c/0x78
[   27.754147]  __kasan_slab_free+0x6c/0x98
[   27.754300]  kmem_cache_free+0x260/0x468
[   27.754397]  slab_kmem_cache_release+0x38/0x50
[   27.754519]  kmem_cache_release+0x1c/0x30
[   27.754710]  kobject_put+0x17c/0x420
[   27.754815]  sysfs_slab_release+0x1c/0x30
[   27.754931]  kmem_cache_destroy+0x118/0x218
[   27.755034]  kmem_cache_double_destroy+0x128/0x300
[   27.755152]  kunit_try_run_case+0x170/0x3f0
[   27.755380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.755812]  kthread+0x328/0x630
[   27.755932]  ret_from_fork+0x10/0x20
[   27.756078] 
[   27.756135] The buggy address belongs to the object at fff00000c770b140
[   27.756135]  which belongs to the cache kmem_cache of size 208
[   27.756283] The buggy address is located 0 bytes inside of
[   27.756283]  freed 208-byte region [fff00000c770b140, fff00000c770b210)
[   27.756668] 
[   27.756737] The buggy address belongs to the physical page:
[   27.757044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770b
[   27.757195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.757338] page_type: f5(slab)
[   27.757675] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   27.757819] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   27.758098] page dumped because: kasan: bad access detected
[   27.758181] 
[   27.758238] Memory state around the buggy address:
[   27.758419]  fff00000c770b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.758568]  fff00000c770b080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   27.758819] >fff00000c770b100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   27.758991]                                            ^
[   27.759084]  fff00000c770b180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.759194]  fff00000c770b200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.759354] ==================================================================

[   20.457924] ==================================================================
[   20.459159] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   20.460995] Read of size 1 at addr ffff888101678780 by task kunit_try_catch/233
[   20.462325] 
[   20.462581] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.462718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.462754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.462817] Call Trace:
[   20.462952]  <TASK>
[   20.463087]  dump_stack_lvl+0x73/0xb0
[   20.463336]  print_report+0xd1/0x650
[   20.463388]  ? __virt_addr_valid+0x1db/0x2d0
[   20.463428]  ? kmem_cache_double_destroy+0x1bf/0x380
[   20.463466]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.463521]  ? kmem_cache_double_destroy+0x1bf/0x380
[   20.463645]  kasan_report+0x141/0x180
[   20.463716]  ? kmem_cache_double_destroy+0x1bf/0x380
[   20.463760]  ? kmem_cache_double_destroy+0x1bf/0x380
[   20.463798]  __kasan_check_byte+0x3d/0x50
[   20.463830]  kmem_cache_destroy+0x25/0x1d0
[   20.463865]  kmem_cache_double_destroy+0x1bf/0x380
[   20.463902]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   20.463939]  ? finish_task_switch.isra.0+0x153/0x700
[   20.463971]  ? __switch_to+0x47/0xf50
[   20.464012]  ? __pfx_read_tsc+0x10/0x10
[   20.464042]  ? ktime_get_ts64+0x86/0x230
[   20.464076]  kunit_try_run_case+0x1a5/0x480
[   20.464118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.464152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.464190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.464250]  ? __kthread_parkme+0x82/0x180
[   20.464298]  ? preempt_count_sub+0x50/0x80
[   20.464333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.464371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.464405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.464439]  kthread+0x337/0x6f0
[   20.464470]  ? trace_preempt_on+0x20/0xc0
[   20.464528]  ? __pfx_kthread+0x10/0x10
[   20.464599]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.464672]  ? calculate_sigpending+0x7b/0xa0
[   20.464716]  ? __pfx_kthread+0x10/0x10
[   20.464746]  ret_from_fork+0x116/0x1d0
[   20.464774]  ? __pfx_kthread+0x10/0x10
[   20.464805]  ret_from_fork_asm+0x1a/0x30
[   20.464849]  </TASK>
[   20.464865] 
[   20.487685] Allocated by task 233:
[   20.488145]  kasan_save_stack+0x45/0x70
[   20.489466]  kasan_save_track+0x18/0x40
[   20.490057]  kasan_save_alloc_info+0x3b/0x50
[   20.490724]  __kasan_slab_alloc+0x91/0xa0
[   20.491119]  kmem_cache_alloc_noprof+0x123/0x3f0
[   20.491835]  __kmem_cache_create_args+0x169/0x240
[   20.492334]  kmem_cache_double_destroy+0xd5/0x380
[   20.493535]  kunit_try_run_case+0x1a5/0x480
[   20.494195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.494928]  kthread+0x337/0x6f0
[   20.495367]  ret_from_fork+0x116/0x1d0
[   20.495756]  ret_from_fork_asm+0x1a/0x30
[   20.496143] 
[   20.496385] Freed by task 233:
[   20.497495]  kasan_save_stack+0x45/0x70
[   20.498129]  kasan_save_track+0x18/0x40
[   20.498738]  kasan_save_free_info+0x3f/0x60
[   20.499120]  __kasan_slab_free+0x56/0x70
[   20.499779]  kmem_cache_free+0x249/0x420
[   20.500212]  slab_kmem_cache_release+0x2e/0x40
[   20.501320]  kmem_cache_release+0x16/0x20
[   20.501647]  kobject_put+0x181/0x450
[   20.502128]  sysfs_slab_release+0x16/0x20
[   20.502876]  kmem_cache_destroy+0xf0/0x1d0
[   20.503338]  kmem_cache_double_destroy+0x14e/0x380
[   20.503953]  kunit_try_run_case+0x1a5/0x480
[   20.504343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.505597]  kthread+0x337/0x6f0
[   20.506010]  ret_from_fork+0x116/0x1d0
[   20.506410]  ret_from_fork_asm+0x1a/0x30
[   20.507021] 
[   20.507272] The buggy address belongs to the object at ffff888101678780
[   20.507272]  which belongs to the cache kmem_cache of size 208
[   20.508379] The buggy address is located 0 bytes inside of
[   20.508379]  freed 208-byte region [ffff888101678780, ffff888101678850)
[   20.510079] 
[   20.510391] The buggy address belongs to the physical page:
[   20.511070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101678
[   20.511920] flags: 0x200000000000000(node=0|zone=2)
[   20.512377] page_type: f5(slab)
[   20.513415] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   20.514037] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   20.514976] page dumped because: kasan: bad access detected
[   20.515531] 
[   20.515871] Memory state around the buggy address:
[   20.516278]  ffff888101678680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.517640]  ffff888101678700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.518233] >ffff888101678780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.518842]                    ^
[   20.519158]  ffff888101678800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   20.520144]  ffff888101678880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.521310] ==================================================================

[   19.332802] ==================================================================
[   19.333745] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   19.334537] Read of size 1 at addr ffff888101affb40 by task kunit_try_catch/233
[   19.335065] 
[   19.335427] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.335587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.335632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.335723] Call Trace:
[   19.335767]  <TASK>
[   19.335814]  dump_stack_lvl+0x73/0xb0
[   19.335918]  print_report+0xd1/0x650
[   19.335996]  ? __virt_addr_valid+0x1db/0x2d0
[   19.336073]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.336151]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.336227]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.336308]  kasan_report+0x141/0x180
[   19.336379]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.336458]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.336501]  __kasan_check_byte+0x3d/0x50
[   19.336535]  kmem_cache_destroy+0x25/0x1d0
[   19.336568]  kmem_cache_double_destroy+0x1bf/0x380
[   19.336605]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   19.336641]  ? finish_task_switch.isra.0+0x153/0x700
[   19.336673]  ? __switch_to+0x47/0xf50
[   19.336713]  ? __pfx_read_tsc+0x10/0x10
[   19.336743]  ? ktime_get_ts64+0x86/0x230
[   19.336776]  kunit_try_run_case+0x1a5/0x480
[   19.336813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.336847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.336906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.336946]  ? __kthread_parkme+0x82/0x180
[   19.336976]  ? preempt_count_sub+0x50/0x80
[   19.337007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.337042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.337076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.337141]  kthread+0x337/0x6f0
[   19.337179]  ? trace_preempt_on+0x20/0xc0
[   19.337213]  ? __pfx_kthread+0x10/0x10
[   19.337243]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.337274]  ? calculate_sigpending+0x7b/0xa0
[   19.337309]  ? __pfx_kthread+0x10/0x10
[   19.337338]  ret_from_fork+0x116/0x1d0
[   19.337365]  ? __pfx_kthread+0x10/0x10
[   19.337393]  ret_from_fork_asm+0x1a/0x30
[   19.337435]  </TASK>
[   19.337450] 
[   19.354484] Allocated by task 233:
[   19.354862]  kasan_save_stack+0x45/0x70
[   19.355480]  kasan_save_track+0x18/0x40
[   19.355944]  kasan_save_alloc_info+0x3b/0x50
[   19.356497]  __kasan_slab_alloc+0x91/0xa0
[   19.356947]  kmem_cache_alloc_noprof+0x123/0x3f0
[   19.357415]  __kmem_cache_create_args+0x169/0x240
[   19.357827]  kmem_cache_double_destroy+0xd5/0x380
[   19.358442]  kunit_try_run_case+0x1a5/0x480
[   19.359276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.360256]  kthread+0x337/0x6f0
[   19.360547]  ret_from_fork+0x116/0x1d0
[   19.360852]  ret_from_fork_asm+0x1a/0x30
[   19.361217] 
[   19.361474] Freed by task 233:
[   19.361850]  kasan_save_stack+0x45/0x70
[   19.362300]  kasan_save_track+0x18/0x40
[   19.362726]  kasan_save_free_info+0x3f/0x60
[   19.363123]  __kasan_slab_free+0x56/0x70
[   19.363540]  kmem_cache_free+0x249/0x420
[   19.363872]  slab_kmem_cache_release+0x2e/0x40
[   19.364411]  kmem_cache_release+0x16/0x20
[   19.364915]  kobject_put+0x181/0x450
[   19.365299]  sysfs_slab_release+0x16/0x20
[   19.365818]  kmem_cache_destroy+0xf0/0x1d0
[   19.366373]  kmem_cache_double_destroy+0x14e/0x380
[   19.366846]  kunit_try_run_case+0x1a5/0x480
[   19.367972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.368386]  kthread+0x337/0x6f0
[   19.368675]  ret_from_fork+0x116/0x1d0
[   19.369085]  ret_from_fork_asm+0x1a/0x30
[   19.369940] 
[   19.370169] The buggy address belongs to the object at ffff888101affb40
[   19.370169]  which belongs to the cache kmem_cache of size 208
[   19.371186] The buggy address is located 0 bytes inside of
[   19.371186]  freed 208-byte region [ffff888101affb40, ffff888101affc10)
[   19.372222] 
[   19.372431] The buggy address belongs to the physical page:
[   19.372926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aff
[   19.373572] flags: 0x200000000000000(node=0|zone=2)
[   19.374046] page_type: f5(slab)
[   19.374484] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   19.375158] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.375802] page dumped because: kasan: bad access detected
[   19.376270] 
[   19.376500] Memory state around the buggy address:
[   19.376961]  ffff888101affa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.377571]  ffff888101affa80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.378075] >ffff888101affb00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.378725]                                            ^
[   19.379216]  ffff888101affb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.379795]  ffff888101affc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.380323] ==================================================================

[   21.458090] ==================================================================
[   21.459157] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   21.459891] Read of size 1 at addr ffff00000daa2140 by task kunit_try_catch/268
[   21.460568] 
[   21.460732] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.460782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.460796] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.460813] Call trace:
[   21.460824]  show_stack+0x20/0x38 (C)
[   21.460857]  dump_stack_lvl+0x8c/0xd0
[   21.460893]  print_report+0x118/0x608
[   21.460927]  kasan_report+0xdc/0x128
[   21.460958]  __kasan_check_byte+0x54/0x70
[   21.460990]  kmem_cache_destroy+0x34/0x218
[   21.461022]  kmem_cache_double_destroy+0x174/0x300
[   21.461054]  kunit_try_run_case+0x170/0x3f0
[   21.461088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.461126]  kthread+0x328/0x630
[   21.461152]  ret_from_fork+0x10/0x20
[   21.461184] 
[   21.467115] Allocated by task 268:
[   21.467440]  kasan_save_stack+0x3c/0x68
[   21.467817]  kasan_save_track+0x20/0x40
[   21.468193]  kasan_save_alloc_info+0x40/0x58
[   21.468611]  __kasan_slab_alloc+0xa8/0xb0
[   21.469002]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.469448]  __kmem_cache_create_args+0x178/0x280
[   21.469899]  kmem_cache_double_destroy+0xc0/0x300
[   21.470350]  kunit_try_run_case+0x170/0x3f0
[   21.470755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.471279]  kthread+0x328/0x630
[   21.471595]  ret_from_fork+0x10/0x20
[   21.471945] 
[   21.472098] Freed by task 268:
[   21.472392]  kasan_save_stack+0x3c/0x68
[   21.472768]  kasan_save_track+0x20/0x40
[   21.473143]  kasan_save_free_info+0x4c/0x78
[   21.473553]  __kasan_slab_free+0x6c/0x98
[   21.473936]  kmem_cache_free+0x260/0x468
[   21.474317]  slab_kmem_cache_release+0x38/0x50
[   21.474746]  kmem_cache_release+0x1c/0x30
[   21.475134]  kobject_put+0x17c/0x420
[   21.475485]  sysfs_slab_release+0x1c/0x30
[   21.475875]  kmem_cache_destroy+0x118/0x218
[   21.476280]  kmem_cache_double_destroy+0x128/0x300
[   21.476739]  kunit_try_run_case+0x170/0x3f0
[   21.477146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.477671]  kthread+0x328/0x630
[   21.477986]  ret_from_fork+0x10/0x20
[   21.478335] 
[   21.478488] The buggy address belongs to the object at ffff00000daa2140
[   21.478488]  which belongs to the cache kmem_cache of size 208
[   21.479613] The buggy address is located 0 bytes inside of
[   21.479613]  freed 208-byte region [ffff00000daa2140, ffff00000daa2210)
[   21.480709] 
[   21.480863] The buggy address belongs to the physical page:
[   21.481378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaa2
[   21.482101] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.482806] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.483457] page_type: f5(slab)
[   21.483770] raw: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000
[   21.484486] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   21.485201] head: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000
[   21.485924] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   21.486647] head: 03fffe0000000001 fffffdffc036a881 00000000ffffffff 00000000ffffffff
[   21.487370] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.488084] page dumped because: kasan: bad access detected
[   21.488598] 
[   21.488750] Memory state around the buggy address:
[   21.489199]  ffff00000daa2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.489865]  ffff00000daa2080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   21.490530] >ffff00000daa2100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   21.491191]                                            ^
[   21.491685]  ffff00000daa2180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.492351]  ffff00000daa2200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493013] ==================================================================