Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   30.068236] ==================================================================
[   30.081567] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.088942] Read of size 1 at addr ffff000801dde600 by task kunit_try_catch/237
[   30.096232] 
[   30.097721] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   30.097780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.097799] Hardware name: WinLink E850-96 board (DT)
[   30.097821] Call trace:
[   30.097835]  show_stack+0x20/0x38 (C)
[   30.097871]  dump_stack_lvl+0x8c/0xd0
[   30.097903]  print_report+0x118/0x608
[   30.097937]  kasan_report+0xdc/0x128
[   30.097969]  __kasan_check_byte+0x54/0x70
[   30.098003]  kfree_sensitive+0x30/0xb0
[   30.098035]  kmalloc_double_kzfree+0x168/0x308
[   30.098064]  kunit_try_run_case+0x170/0x3f0
[   30.098098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098135]  kthread+0x328/0x630
[   30.098173]  ret_from_fork+0x10/0x20
[   30.098207] 
[   30.164981] Allocated by task 237:
[   30.168370]  kasan_save_stack+0x3c/0x68
[   30.172186]  kasan_save_track+0x20/0x40
[   30.176005]  kasan_save_alloc_info+0x40/0x58
[   30.180259]  __kasan_kmalloc+0xd4/0xd8
[   30.183991]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.188505]  kmalloc_double_kzfree+0xb8/0x308
[   30.192846]  kunit_try_run_case+0x170/0x3f0
[   30.197012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.202481]  kthread+0x328/0x630
[   30.205692]  ret_from_fork+0x10/0x20
[   30.209251] 
[   30.210728] Freed by task 237:
[   30.213767]  kasan_save_stack+0x3c/0x68
[   30.217585]  kasan_save_track+0x20/0x40
[   30.221404]  kasan_save_free_info+0x4c/0x78
[   30.225571]  __kasan_slab_free+0x6c/0x98
[   30.229478]  kfree+0x214/0x3c8
[   30.232515]  kfree_sensitive+0x80/0xb0
[   30.236248]  kmalloc_double_kzfree+0x11c/0x308
[   30.240675]  kunit_try_run_case+0x170/0x3f0
[   30.244842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.250310]  kthread+0x328/0x630
[   30.253522]  ret_from_fork+0x10/0x20
[   30.257082] 
[   30.258558] The buggy address belongs to the object at ffff000801dde600
[   30.258558]  which belongs to the cache kmalloc-16 of size 16
[   30.270886] The buggy address is located 0 bytes inside of
[   30.270886]  freed 16-byte region [ffff000801dde600, ffff000801dde610)
[   30.282861] 
[   30.284341] The buggy address belongs to the physical page:
[   30.289897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dde
[   30.297883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.304391] page_type: f5(slab)
[   30.307527] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.315246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.322965] page dumped because: kasan: bad access detected
[   30.328520] 
[   30.329996] Memory state around the buggy address:
[   30.334779]  ffff000801dde500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.341979]  ffff000801dde580: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   30.349185] >ffff000801dde600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.356386]                    ^
[   30.359600]  ffff000801dde680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.366805]  ffff000801dde700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.374007] ==================================================================