Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.279060] ================================================================== [ 17.279147] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 17.279240] Read of size 1 at addr fff00000c3ea1a00 by task kunit_try_catch/216 [ 17.279292] [ 17.279336] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.279425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.279453] Hardware name: linux,dummy-virt (DT) [ 17.279486] Call trace: [ 17.279512] show_stack+0x20/0x38 (C) [ 17.279563] dump_stack_lvl+0x8c/0xd0 [ 17.279615] print_report+0x118/0x5d0 [ 17.279663] kasan_report+0xdc/0x128 [ 17.279709] __kasan_check_byte+0x54/0x70 [ 17.279756] kmem_cache_destroy+0x34/0x218 [ 17.279805] kmem_cache_double_destroy+0x174/0x300 [ 17.279853] kunit_try_run_case+0x170/0x3f0 [ 17.279904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.279957] kthread+0x328/0x630 [ 17.280000] ret_from_fork+0x10/0x20 [ 17.280049] [ 17.280067] Allocated by task 216: [ 17.280099] kasan_save_stack+0x3c/0x68 [ 17.280142] kasan_save_track+0x20/0x40 [ 17.280185] kasan_save_alloc_info+0x40/0x58 [ 17.280236] __kasan_slab_alloc+0xa8/0xb0 [ 17.280275] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.280317] __kmem_cache_create_args+0x178/0x280 [ 17.280358] kmem_cache_double_destroy+0xc0/0x300 [ 17.280399] kunit_try_run_case+0x170/0x3f0 [ 17.280438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.280483] kthread+0x328/0x630 [ 17.280515] ret_from_fork+0x10/0x20 [ 17.280552] [ 17.280570] Freed by task 216: [ 17.280597] kasan_save_stack+0x3c/0x68 [ 17.280634] kasan_save_track+0x20/0x40 [ 17.280673] kasan_save_free_info+0x4c/0x78 [ 17.280712] __kasan_slab_free+0x6c/0x98 [ 17.280748] kmem_cache_free+0x260/0x468 [ 17.280785] slab_kmem_cache_release+0x38/0x50 [ 17.280823] kmem_cache_release+0x1c/0x30 [ 17.280858] kobject_put+0x17c/0x420 [ 17.280895] sysfs_slab_release+0x1c/0x30 [ 17.280933] kmem_cache_destroy+0x118/0x218 [ 17.280971] kmem_cache_double_destroy+0x128/0x300 [ 17.281009] kunit_try_run_case+0x170/0x3f0 [ 17.281048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.281090] kthread+0x328/0x630 [ 17.281123] ret_from_fork+0x10/0x20 [ 17.281157] [ 17.281178] The buggy address belongs to the object at fff00000c3ea1a00 [ 17.281178] which belongs to the cache kmem_cache of size 208 [ 17.281246] The buggy address is located 0 bytes inside of [ 17.281246] freed 208-byte region [fff00000c3ea1a00, fff00000c3ea1ad0) [ 17.281308] [ 17.281330] The buggy address belongs to the physical page: [ 17.281364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ea1 [ 17.281420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.281474] page_type: f5(slab) [ 17.281517] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 17.281567] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 17.281610] page dumped because: kasan: bad access detected [ 17.281641] [ 17.281661] Memory state around the buggy address: [ 17.281693] fff00000c3ea1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.281737] fff00000c3ea1980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.281780] >fff00000c3ea1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.281819] ^ [ 17.281847] fff00000c3ea1a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 17.281889] fff00000c3ea1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.281929] ==================================================================
[ 18.009718] ================================================================== [ 18.010076] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 18.010200] Read of size 1 at addr fff00000c472ac80 by task kunit_try_catch/216 [ 18.010257] [ 18.010297] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.010384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.010412] Hardware name: linux,dummy-virt (DT) [ 18.010482] Call trace: [ 18.010507] show_stack+0x20/0x38 (C) [ 18.010559] dump_stack_lvl+0x8c/0xd0 [ 18.010610] print_report+0x118/0x5d0 [ 18.010677] kasan_report+0xdc/0x128 [ 18.010721] __kasan_check_byte+0x54/0x70 [ 18.010767] kmem_cache_destroy+0x34/0x218 [ 18.010814] kmem_cache_double_destroy+0x174/0x300 [ 18.010870] kunit_try_run_case+0x170/0x3f0 [ 18.010920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.010980] kthread+0x328/0x630 [ 18.011033] ret_from_fork+0x10/0x20 [ 18.011081] [ 18.011099] Allocated by task 216: [ 18.011128] kasan_save_stack+0x3c/0x68 [ 18.011167] kasan_save_track+0x20/0x40 [ 18.011217] kasan_save_alloc_info+0x40/0x58 [ 18.011256] __kasan_slab_alloc+0xa8/0xb0 [ 18.011295] kmem_cache_alloc_noprof+0x10c/0x398 [ 18.011349] __kmem_cache_create_args+0x178/0x280 [ 18.012147] kmem_cache_double_destroy+0xc0/0x300 [ 18.012252] kunit_try_run_case+0x170/0x3f0 [ 18.012300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.012522] kthread+0x328/0x630 [ 18.012755] ret_from_fork+0x10/0x20 [ 18.012809] [ 18.012930] Freed by task 216: [ 18.012992] kasan_save_stack+0x3c/0x68 [ 18.013088] kasan_save_track+0x20/0x40 [ 18.013227] kasan_save_free_info+0x4c/0x78 [ 18.013280] __kasan_slab_free+0x6c/0x98 [ 18.013318] kmem_cache_free+0x260/0x468 [ 18.013589] slab_kmem_cache_release+0x38/0x50 [ 18.013672] kmem_cache_release+0x1c/0x30 [ 18.013749] kobject_put+0x17c/0x420 [ 18.014041] sysfs_slab_release+0x1c/0x30 [ 18.014244] kmem_cache_destroy+0x118/0x218 [ 18.014401] kmem_cache_double_destroy+0x128/0x300 [ 18.014609] kunit_try_run_case+0x170/0x3f0 [ 18.014671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.014727] kthread+0x328/0x630 [ 18.014788] ret_from_fork+0x10/0x20 [ 18.014906] [ 18.014928] The buggy address belongs to the object at fff00000c472ac80 [ 18.014928] which belongs to the cache kmem_cache of size 208 [ 18.015193] The buggy address is located 0 bytes inside of [ 18.015193] freed 208-byte region [fff00000c472ac80, fff00000c472ad50) [ 18.015561] [ 18.015609] The buggy address belongs to the physical page: [ 18.015764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10472a [ 18.015894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.016107] page_type: f5(slab) [ 18.016158] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 18.016311] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 18.016444] page dumped because: kasan: bad access detected [ 18.016587] [ 18.016641] Memory state around the buggy address: [ 18.016730] fff00000c472ab80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.016939] fff00000c472ac00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.016990] >fff00000c472ac80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.017151] ^ [ 18.017241] fff00000c472ad00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 18.017396] fff00000c472ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.017494] ==================================================================
[ 13.517681] ================================================================== [ 13.518182] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 13.519085] Read of size 1 at addr ffff888101a223c0 by task kunit_try_catch/232 [ 13.519586] [ 13.519695] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.519858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.519871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.519896] Call Trace: [ 13.519910] <TASK> [ 13.519929] dump_stack_lvl+0x73/0xb0 [ 13.519964] print_report+0xd1/0x610 [ 13.519989] ? __virt_addr_valid+0x1db/0x2d0 [ 13.520015] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.520040] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.520064] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.520090] kasan_report+0x141/0x180 [ 13.520112] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.520141] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.520166] __kasan_check_byte+0x3d/0x50 [ 13.520188] kmem_cache_destroy+0x25/0x1d0 [ 13.520212] kmem_cache_double_destroy+0x1bf/0x380 [ 13.520237] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 13.520263] ? finish_task_switch.isra.0+0x153/0x700 [ 13.520296] ? __switch_to+0x47/0xf50 [ 13.520325] ? __pfx_read_tsc+0x10/0x10 [ 13.520346] ? ktime_get_ts64+0x86/0x230 [ 13.520371] kunit_try_run_case+0x1a5/0x480 [ 13.520398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.520551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.520676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.520701] ? __kthread_parkme+0x82/0x180 [ 13.520725] ? preempt_count_sub+0x50/0x80 [ 13.520748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.520773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.520799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.520825] kthread+0x337/0x6f0 [ 13.520847] ? trace_preempt_on+0x20/0xc0 [ 13.520871] ? __pfx_kthread+0x10/0x10 [ 13.520892] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.520914] ? calculate_sigpending+0x7b/0xa0 [ 13.520940] ? __pfx_kthread+0x10/0x10 [ 13.520961] ret_from_fork+0x116/0x1d0 [ 13.520981] ? __pfx_kthread+0x10/0x10 [ 13.521002] ret_from_fork_asm+0x1a/0x30 [ 13.521035] </TASK> [ 13.521046] [ 13.537241] Allocated by task 232: [ 13.537380] kasan_save_stack+0x45/0x70 [ 13.538203] kasan_save_track+0x18/0x40 [ 13.538886] kasan_save_alloc_info+0x3b/0x50 [ 13.539399] __kasan_slab_alloc+0x91/0xa0 [ 13.540020] kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.540416] __kmem_cache_create_args+0x169/0x240 [ 13.541074] kmem_cache_double_destroy+0xd5/0x380 [ 13.541384] kunit_try_run_case+0x1a5/0x480 [ 13.541926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.542598] kthread+0x337/0x6f0 [ 13.542737] ret_from_fork+0x116/0x1d0 [ 13.542868] ret_from_fork_asm+0x1a/0x30 [ 13.543004] [ 13.543074] Freed by task 232: [ 13.543181] kasan_save_stack+0x45/0x70 [ 13.543314] kasan_save_track+0x18/0x40 [ 13.544086] kasan_save_free_info+0x3f/0x60 [ 13.544652] __kasan_slab_free+0x56/0x70 [ 13.545203] kmem_cache_free+0x249/0x420 [ 13.545792] slab_kmem_cache_release+0x2e/0x40 [ 13.546233] kmem_cache_release+0x16/0x20 [ 13.546704] kobject_put+0x181/0x450 [ 13.547071] sysfs_slab_release+0x16/0x20 [ 13.547486] kmem_cache_destroy+0xf0/0x1d0 [ 13.547839] kmem_cache_double_destroy+0x14e/0x380 [ 13.548143] kunit_try_run_case+0x1a5/0x480 [ 13.548291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.548619] kthread+0x337/0x6f0 [ 13.549225] ret_from_fork+0x116/0x1d0 [ 13.549834] ret_from_fork_asm+0x1a/0x30 [ 13.550220] [ 13.550381] The buggy address belongs to the object at ffff888101a223c0 [ 13.550381] which belongs to the cache kmem_cache of size 208 [ 13.550998] The buggy address is located 0 bytes inside of [ 13.550998] freed 208-byte region [ffff888101a223c0, ffff888101a22490) [ 13.551335] [ 13.551405] The buggy address belongs to the physical page: [ 13.551760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a22 [ 13.552082] flags: 0x200000000000000(node=0|zone=2) [ 13.552306] page_type: f5(slab) [ 13.552477] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000 [ 13.552891] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 13.553185] page dumped because: kasan: bad access detected [ 13.553350] [ 13.553417] Memory state around the buggy address: [ 13.553651] ffff888101a22280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.554110] ffff888101a22300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 13.554444] >ffff888101a22380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 13.554957] ^ [ 13.555306] ffff888101a22400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.555605] ffff888101a22480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.556015] ==================================================================
[ 13.727275] ================================================================== [ 13.727767] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 13.728311] Read of size 1 at addr ffff888101b19b40 by task kunit_try_catch/233 [ 13.728673] [ 13.728878] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.728985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.728999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.729033] Call Trace: [ 13.729047] <TASK> [ 13.729076] dump_stack_lvl+0x73/0xb0 [ 13.729111] print_report+0xd1/0x610 [ 13.729135] ? __virt_addr_valid+0x1db/0x2d0 [ 13.729160] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.729186] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.729211] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.729238] kasan_report+0x141/0x180 [ 13.729260] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.729288] ? kmem_cache_double_destroy+0x1bf/0x380 [ 13.729315] __kasan_check_byte+0x3d/0x50 [ 13.729337] kmem_cache_destroy+0x25/0x1d0 [ 13.729379] kmem_cache_double_destroy+0x1bf/0x380 [ 13.729406] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 13.729431] ? finish_task_switch.isra.0+0x153/0x700 [ 13.729457] ? __switch_to+0x47/0xf50 [ 13.729522] ? __pfx_read_tsc+0x10/0x10 [ 13.729544] ? ktime_get_ts64+0x86/0x230 [ 13.729570] kunit_try_run_case+0x1a5/0x480 [ 13.729598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.729621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.729666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.729690] ? __kthread_parkme+0x82/0x180 [ 13.729713] ? preempt_count_sub+0x50/0x80 [ 13.729736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.729761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.729787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.729814] kthread+0x337/0x6f0 [ 13.729833] ? trace_preempt_on+0x20/0xc0 [ 13.729857] ? __pfx_kthread+0x10/0x10 [ 13.729878] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.729901] ? calculate_sigpending+0x7b/0xa0 [ 13.729927] ? __pfx_kthread+0x10/0x10 [ 13.729949] ret_from_fork+0x116/0x1d0 [ 13.729969] ? __pfx_kthread+0x10/0x10 [ 13.729989] ret_from_fork_asm+0x1a/0x30 [ 13.730021] </TASK> [ 13.730032] [ 13.740706] Allocated by task 233: [ 13.740846] kasan_save_stack+0x45/0x70 [ 13.741075] kasan_save_track+0x18/0x40 [ 13.741341] kasan_save_alloc_info+0x3b/0x50 [ 13.741785] __kasan_slab_alloc+0x91/0xa0 [ 13.742036] kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.742214] __kmem_cache_create_args+0x169/0x240 [ 13.742503] kmem_cache_double_destroy+0xd5/0x380 [ 13.742779] kunit_try_run_case+0x1a5/0x480 [ 13.743118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.743346] kthread+0x337/0x6f0 [ 13.743516] ret_from_fork+0x116/0x1d0 [ 13.743703] ret_from_fork_asm+0x1a/0x30 [ 13.743951] [ 13.744077] Freed by task 233: [ 13.744265] kasan_save_stack+0x45/0x70 [ 13.744499] kasan_save_track+0x18/0x40 [ 13.744636] kasan_save_free_info+0x3f/0x60 [ 13.744942] __kasan_slab_free+0x56/0x70 [ 13.745186] kmem_cache_free+0x249/0x420 [ 13.745406] slab_kmem_cache_release+0x2e/0x40 [ 13.745576] kmem_cache_release+0x16/0x20 [ 13.745814] kobject_put+0x181/0x450 [ 13.746088] sysfs_slab_release+0x16/0x20 [ 13.746295] kmem_cache_destroy+0xf0/0x1d0 [ 13.746438] kmem_cache_double_destroy+0x14e/0x380 [ 13.746818] kunit_try_run_case+0x1a5/0x480 [ 13.747073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.747345] kthread+0x337/0x6f0 [ 13.747467] ret_from_fork+0x116/0x1d0 [ 13.747614] ret_from_fork_asm+0x1a/0x30 [ 13.747933] [ 13.748118] The buggy address belongs to the object at ffff888101b19b40 [ 13.748118] which belongs to the cache kmem_cache of size 208 [ 13.748826] The buggy address is located 0 bytes inside of [ 13.748826] freed 208-byte region [ffff888101b19b40, ffff888101b19c10) [ 13.749558] [ 13.749813] The buggy address belongs to the physical page: [ 13.750082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b19 [ 13.750589] flags: 0x200000000000000(node=0|zone=2) [ 13.750925] page_type: f5(slab) [ 13.751154] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000 [ 13.751451] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 13.751905] page dumped because: kasan: bad access detected [ 13.752151] [ 13.752304] Memory state around the buggy address: [ 13.752507] ffff888101b19a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.752978] ffff888101b19a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 13.753857] >ffff888101b19b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 13.754235] ^ [ 13.754483] ffff888101b19b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.754873] ffff888101b19c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.755387] ==================================================================