Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.778230] ==================================================================
[   16.778390] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   16.778558] Read of size 1 at addr fff00000c59ab980 by task kunit_try_catch/192
[   16.778612] 
[   16.778667] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.778761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.779133] Hardware name: linux,dummy-virt (DT)
[   16.779314] Call trace:
[   16.779451]  show_stack+0x20/0x38 (C)
[   16.779597]  dump_stack_lvl+0x8c/0xd0
[   16.779990]  print_report+0x118/0x5d0
[   16.780192]  kasan_report+0xdc/0x128
[   16.780299]  __kasan_check_byte+0x54/0x70
[   16.780549]  kfree_sensitive+0x30/0xb0
[   16.780769]  kmalloc_double_kzfree+0x168/0x308
[   16.781094]  kunit_try_run_case+0x170/0x3f0
[   16.781283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.781408]  kthread+0x328/0x630
[   16.781960]  ret_from_fork+0x10/0x20
[   16.782063] 
[   16.782230] Allocated by task 192:
[   16.782409]  kasan_save_stack+0x3c/0x68
[   16.782457]  kasan_save_track+0x20/0x40
[   16.782737]  kasan_save_alloc_info+0x40/0x58
[   16.782894]  __kasan_kmalloc+0xd4/0xd8
[   16.782996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.783181]  kmalloc_double_kzfree+0xb8/0x308
[   16.783290]  kunit_try_run_case+0x170/0x3f0
[   16.783385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.783483]  kthread+0x328/0x630
[   16.783520]  ret_from_fork+0x10/0x20
[   16.784480] 
[   16.784544] Freed by task 192:
[   16.784614]  kasan_save_stack+0x3c/0x68
[   16.784696]  kasan_save_track+0x20/0x40
[   16.784775]  kasan_save_free_info+0x4c/0x78
[   16.785069]  __kasan_slab_free+0x6c/0x98
[   16.785567]  kfree+0x214/0x3c8
[   16.785785]  kfree_sensitive+0x80/0xb0
[   16.785988]  kmalloc_double_kzfree+0x11c/0x308
[   16.786064]  kunit_try_run_case+0x170/0x3f0
[   16.786105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.786149]  kthread+0x328/0x630
[   16.786185]  ret_from_fork+0x10/0x20
[   16.786221] 
[   16.786394] The buggy address belongs to the object at fff00000c59ab980
[   16.786394]  which belongs to the cache kmalloc-16 of size 16
[   16.786570] The buggy address is located 0 bytes inside of
[   16.786570]  freed 16-byte region [fff00000c59ab980, fff00000c59ab990)
[   16.786963] 
[   16.787064] The buggy address belongs to the physical page:
[   16.787212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   16.787339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.787538] page_type: f5(slab)
[   16.787660] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.787793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.787838] page dumped because: kasan: bad access detected
[   16.788196] 
[   16.788295] Memory state around the buggy address:
[   16.788343]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.788789]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.788865] >fff00000c59ab980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.788981]                    ^
[   16.789067]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.789113]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.789282] ==================================================================

[   16.752131] ==================================================================
[   16.752250] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   16.752355] Read of size 1 at addr fff00000c1375ba0 by task kunit_try_catch/192
[   16.752450] 
[   16.752485] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.752602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.752660] Hardware name: linux,dummy-virt (DT)
[   16.752695] Call trace:
[   16.752719]  show_stack+0x20/0x38 (C)
[   16.752787]  dump_stack_lvl+0x8c/0xd0
[   16.753009]  print_report+0x118/0x5d0
[   16.753079]  kasan_report+0xdc/0x128
[   16.753238]  __kasan_check_byte+0x54/0x70
[   16.753470]  kfree_sensitive+0x30/0xb0
[   16.753685]  kmalloc_double_kzfree+0x168/0x308
[   16.753884]  kunit_try_run_case+0x170/0x3f0
[   16.753970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.754076]  kthread+0x328/0x630
[   16.754171]  ret_from_fork+0x10/0x20
[   16.754220] 
[   16.754252] Allocated by task 192:
[   16.754564]  kasan_save_stack+0x3c/0x68
[   16.754707]  kasan_save_track+0x20/0x40
[   16.754831]  kasan_save_alloc_info+0x40/0x58
[   16.754978]  __kasan_kmalloc+0xd4/0xd8
[   16.755075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.755126]  kmalloc_double_kzfree+0xb8/0x308
[   16.755210]  kunit_try_run_case+0x170/0x3f0
[   16.755299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.755454]  kthread+0x328/0x630
[   16.755565]  ret_from_fork+0x10/0x20
[   16.755603] 
[   16.755657] Freed by task 192:
[   16.755865]  kasan_save_stack+0x3c/0x68
[   16.756117]  kasan_save_track+0x20/0x40
[   16.756224]  kasan_save_free_info+0x4c/0x78
[   16.756385]  __kasan_slab_free+0x6c/0x98
[   16.756496]  kfree+0x214/0x3c8
[   16.756602]  kfree_sensitive+0x80/0xb0
[   16.756710]  kmalloc_double_kzfree+0x11c/0x308
[   16.756858]  kunit_try_run_case+0x170/0x3f0
[   16.756920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.756987]  kthread+0x328/0x630
[   16.757019]  ret_from_fork+0x10/0x20
[   16.757057] 
[   16.757077] The buggy address belongs to the object at fff00000c1375ba0
[   16.757077]  which belongs to the cache kmalloc-16 of size 16
[   16.757137] The buggy address is located 0 bytes inside of
[   16.757137]  freed 16-byte region [fff00000c1375ba0, fff00000c1375bb0)
[   16.757198] 
[   16.757218] The buggy address belongs to the physical page:
[   16.757250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   16.757388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.757477] page_type: f5(slab)
[   16.757565] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.757724] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.757969] page dumped because: kasan: bad access detected
[   16.758043] 
[   16.758085] Memory state around the buggy address:
[   16.758217]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.758313]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.758356] >fff00000c1375b80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   16.758615]                                ^
[   16.758790]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.758904]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759006] ==================================================================

[   12.988921] ==================================================================
[   12.989807] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350
[   12.990169] Read of size 1 at addr ffff8881017e0440 by task kunit_try_catch/210
[   12.990777] 
[   12.990887] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.990934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.990946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.990968] Call Trace:
[   12.990981]  <TASK>
[   12.990998]  dump_stack_lvl+0x73/0xb0
[   12.991039]  print_report+0xd1/0x610
[   12.991060]  ? __virt_addr_valid+0x1db/0x2d0
[   12.991082]  ? kmalloc_double_kzfree+0x19c/0x350
[   12.991104]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.991125]  ? kmalloc_double_kzfree+0x19c/0x350
[   12.991148]  kasan_report+0x141/0x180
[   12.991170]  ? kmalloc_double_kzfree+0x19c/0x350
[   12.991196]  ? kmalloc_double_kzfree+0x19c/0x350
[   12.991219]  __kasan_check_byte+0x3d/0x50
[   12.991240]  kfree_sensitive+0x22/0x90
[   12.991262]  kmalloc_double_kzfree+0x19c/0x350
[   12.991284]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   12.991307]  ? __schedule+0x10c6/0x2b60
[   12.991330]  ? __pfx_read_tsc+0x10/0x10
[   12.991351]  ? ktime_get_ts64+0x86/0x230
[   12.991378]  kunit_try_run_case+0x1a5/0x480
[   12.991411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.991433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.991457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.991479]  ? __kthread_parkme+0x82/0x180
[   12.991499]  ? preempt_count_sub+0x50/0x80
[   12.991523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.991547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.991569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.991592]  kthread+0x337/0x6f0
[   12.991611]  ? trace_preempt_on+0x20/0xc0
[   12.991634]  ? __pfx_kthread+0x10/0x10
[   12.991654]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.991675]  ? calculate_sigpending+0x7b/0xa0
[   12.991698]  ? __pfx_kthread+0x10/0x10
[   12.991721]  ret_from_fork+0x116/0x1d0
[   12.991739]  ? __pfx_kthread+0x10/0x10
[   12.991759]  ret_from_fork_asm+0x1a/0x30
[   12.991791]  </TASK>
[   12.991801] 
[   13.000660] Allocated by task 210:
[   13.000870]  kasan_save_stack+0x45/0x70
[   13.001235]  kasan_save_track+0x18/0x40
[   13.001425]  kasan_save_alloc_info+0x3b/0x50
[   13.001577]  __kasan_kmalloc+0xb7/0xc0
[   13.001833]  __kmalloc_cache_noprof+0x189/0x420
[   13.002173]  kmalloc_double_kzfree+0xa9/0x350
[   13.002428]  kunit_try_run_case+0x1a5/0x480
[   13.002725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.002999]  kthread+0x337/0x6f0
[   13.003275]  ret_from_fork+0x116/0x1d0
[   13.003424]  ret_from_fork_asm+0x1a/0x30
[   13.003646] 
[   13.003746] Freed by task 210:
[   13.003904]  kasan_save_stack+0x45/0x70
[   13.004255]  kasan_save_track+0x18/0x40
[   13.004413]  kasan_save_free_info+0x3f/0x60
[   13.004616]  __kasan_slab_free+0x56/0x70
[   13.004891]  kfree+0x222/0x3f0
[   13.005161]  kfree_sensitive+0x67/0x90
[   13.005408]  kmalloc_double_kzfree+0x12b/0x350
[   13.005613]  kunit_try_run_case+0x1a5/0x480
[   13.005793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.006213]  kthread+0x337/0x6f0
[   13.006433]  ret_from_fork+0x116/0x1d0
[   13.006609]  ret_from_fork_asm+0x1a/0x30
[   13.006807] 
[   13.006905] The buggy address belongs to the object at ffff8881017e0440
[   13.006905]  which belongs to the cache kmalloc-16 of size 16
[   13.007425] The buggy address is located 0 bytes inside of
[   13.007425]  freed 16-byte region [ffff8881017e0440, ffff8881017e0450)
[   13.007906] 
[   13.008005] The buggy address belongs to the physical page:
[   13.008216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017e0
[   13.008739] flags: 0x200000000000000(node=0|zone=2)
[   13.008935] page_type: f5(slab)
[   13.009118] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.009355] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.009765] page dumped because: kasan: bad access detected
[   13.010126] 
[   13.010227] Memory state around the buggy address:
[   13.010518]  ffff8881017e0300: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.010793]  ffff8881017e0380: 00 04 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.011149] >ffff8881017e0400: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   13.011528]                                            ^
[   13.011851]  ffff8881017e0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.012559]  ffff8881017e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.013105] ==================================================================

[   13.136519] ==================================================================
[   13.137054] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350
[   13.137324] Read of size 1 at addr ffff8881023973c0 by task kunit_try_catch/209
[   13.137551] 
[   13.137645] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.137693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.137704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.137726] Call Trace:
[   13.137739]  <TASK>
[   13.137756]  dump_stack_lvl+0x73/0xb0
[   13.137785]  print_report+0xd1/0x610
[   13.137808]  ? __virt_addr_valid+0x1db/0x2d0
[   13.137831]  ? kmalloc_double_kzfree+0x19c/0x350
[   13.137853]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.137873]  ? kmalloc_double_kzfree+0x19c/0x350
[   13.137896]  kasan_report+0x141/0x180
[   13.137916]  ? kmalloc_double_kzfree+0x19c/0x350
[   13.137941]  ? kmalloc_double_kzfree+0x19c/0x350
[   13.137963]  __kasan_check_byte+0x3d/0x50
[   13.137983]  kfree_sensitive+0x22/0x90
[   13.138005]  kmalloc_double_kzfree+0x19c/0x350
[   13.138026]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   13.138050]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   13.138075]  ? __pfx_read_tsc+0x10/0x10
[   13.138095]  ? ktime_get_ts64+0x86/0x230
[   13.138119]  kunit_try_run_case+0x1a5/0x480
[   13.138143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.138207]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.138229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.138252]  ? __kthread_parkme+0x82/0x180
[   13.138272]  ? preempt_count_sub+0x50/0x80
[   13.138315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.138339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.138382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.138451]  kthread+0x337/0x6f0
[   13.138471]  ? trace_preempt_on+0x20/0xc0
[   13.138506]  ? __pfx_kthread+0x10/0x10
[   13.138526]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.138547]  ? calculate_sigpending+0x7b/0xa0
[   13.138570]  ? __pfx_kthread+0x10/0x10
[   13.138591]  ret_from_fork+0x116/0x1d0
[   13.138608]  ? __pfx_kthread+0x10/0x10
[   13.138628]  ret_from_fork_asm+0x1a/0x30
[   13.138657]  </TASK>
[   13.138668] 
[   13.151792] Allocated by task 209:
[   13.152296]  kasan_save_stack+0x45/0x70
[   13.152696]  kasan_save_track+0x18/0x40
[   13.153002]  kasan_save_alloc_info+0x3b/0x50
[   13.153479]  __kasan_kmalloc+0xb7/0xc0
[   13.153621]  __kmalloc_cache_noprof+0x189/0x420
[   13.153783]  kmalloc_double_kzfree+0xa9/0x350
[   13.154029]  kunit_try_run_case+0x1a5/0x480
[   13.154420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.154925]  kthread+0x337/0x6f0
[   13.155280]  ret_from_fork+0x116/0x1d0
[   13.155691]  ret_from_fork_asm+0x1a/0x30
[   13.156128] 
[   13.156356] Freed by task 209:
[   13.156474]  kasan_save_stack+0x45/0x70
[   13.156613]  kasan_save_track+0x18/0x40
[   13.156749]  kasan_save_free_info+0x3f/0x60
[   13.157015]  __kasan_slab_free+0x56/0x70
[   13.157377]  kfree+0x222/0x3f0
[   13.157697]  kfree_sensitive+0x67/0x90
[   13.158202]  kmalloc_double_kzfree+0x12b/0x350
[   13.158682]  kunit_try_run_case+0x1a5/0x480
[   13.159131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.159733]  kthread+0x337/0x6f0
[   13.160135]  ret_from_fork+0x116/0x1d0
[   13.160330]  ret_from_fork_asm+0x1a/0x30
[   13.160693] 
[   13.160831] The buggy address belongs to the object at ffff8881023973c0
[   13.160831]  which belongs to the cache kmalloc-16 of size 16
[   13.161491] The buggy address is located 0 bytes inside of
[   13.161491]  freed 16-byte region [ffff8881023973c0, ffff8881023973d0)
[   13.161842] 
[   13.162051] The buggy address belongs to the physical page:
[   13.162588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102397
[   13.163458] flags: 0x200000000000000(node=0|zone=2)
[   13.163942] page_type: f5(slab)
[   13.164262] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.165038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.165369] page dumped because: kasan: bad access detected
[   13.165856] 
[   13.166078] Memory state around the buggy address:
[   13.166448]  ffff888102397280: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   13.166671]  ffff888102397300: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   13.166937] >ffff888102397380: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   13.167659]                                            ^
[   13.168247]  ffff888102397400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.168918]  ffff888102397480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.169413] ==================================================================