Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 34.871989] ================================================================== [ 34.872176] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.872310] Read of size 1 at addr ffff000801e2c140 by task kunit_try_catch/259 [ 34.875874] [ 34.877361] CPU: 5 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 34.877419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.877436] Hardware name: WinLink E850-96 board (DT) [ 34.877458] Call trace: [ 34.877477] show_stack+0x20/0x38 (C) [ 34.877515] dump_stack_lvl+0x8c/0xd0 [ 34.877552] print_report+0x118/0x608 [ 34.877587] kasan_report+0xdc/0x128 [ 34.877620] __kasan_check_byte+0x54/0x70 [ 34.877653] kmem_cache_destroy+0x34/0x218 [ 34.877689] kmem_cache_double_destroy+0x174/0x300 [ 34.877722] kunit_try_run_case+0x170/0x3f0 [ 34.877756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.877796] kthread+0x328/0x630 [ 34.877826] ret_from_fork+0x10/0x20 [ 34.877862] [ 34.944970] Allocated by task 259: [ 34.948358] kasan_save_stack+0x3c/0x68 [ 34.952175] kasan_save_track+0x20/0x40 [ 34.955996] kasan_save_alloc_info+0x40/0x58 [ 34.960248] __kasan_slab_alloc+0xa8/0xb0 [ 34.964241] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 34.968841] __kmem_cache_create_args+0x178/0x280 [ 34.973528] kmem_cache_double_destroy+0xc0/0x300 [ 34.978216] kunit_try_run_case+0x170/0x3f0 [ 34.982383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.987851] kthread+0x328/0x630 [ 34.991064] ret_from_fork+0x10/0x20 [ 34.994622] [ 34.996099] Freed by task 259: [ 34.999137] kasan_save_stack+0x3c/0x68 [ 35.002955] kasan_save_track+0x20/0x40 [ 35.006775] kasan_save_free_info+0x4c/0x78 [ 35.010941] __kasan_slab_free+0x6c/0x98 [ 35.014847] kmem_cache_free+0x260/0x470 [ 35.018754] slab_kmem_cache_release+0x38/0x50 [ 35.023181] kmem_cache_release+0x1c/0x30 [ 35.027174] kobject_put+0x17c/0x430 [ 35.030734] sysfs_slab_release+0x1c/0x30 [ 35.034726] kmem_cache_destroy+0x118/0x218 [ 35.038892] kmem_cache_double_destroy+0x128/0x300 [ 35.043666] kunit_try_run_case+0x170/0x3f0 [ 35.047833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.053302] kthread+0x328/0x630 [ 35.056513] ret_from_fork+0x10/0x20 [ 35.060072] [ 35.061550] The buggy address belongs to the object at ffff000801e2c140 [ 35.061550] which belongs to the cache kmem_cache of size 208 [ 35.073963] The buggy address is located 0 bytes inside of [ 35.073963] freed 208-byte region [ffff000801e2c140, ffff000801e2c210) [ 35.086027] [ 35.087505] The buggy address belongs to the physical page: [ 35.093063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e2c [ 35.101047] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.108686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.115629] page_type: f5(slab) [ 35.118766] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.126484] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.134212] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 35.142022] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.149835] head: 0bfffe0000000001 fffffdffe0078b01 00000000ffffffff 00000000ffffffff [ 35.157647] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.165453] page dumped because: kasan: bad access detected [ 35.171010] [ 35.172483] Memory state around the buggy address: [ 35.177265] ffff000801e2c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.184467] ffff000801e2c080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 35.191673] >ffff000801e2c100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.198872] ^ [ 35.204171] ffff000801e2c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.211377] ffff000801e2c200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.218577] ==================================================================
[ 27.114254] ================================================================== [ 27.114548] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 27.115021] Read of size 1 at addr fff00000c5bfedc0 by task kunit_try_catch/216 [ 27.115161] [ 27.115783] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 27.116132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.116208] Hardware name: linux,dummy-virt (DT) [ 27.116303] Call trace: [ 27.116366] show_stack+0x20/0x38 (C) [ 27.116492] dump_stack_lvl+0x8c/0xd0 [ 27.117406] print_report+0x118/0x608 [ 27.117565] kasan_report+0xdc/0x128 [ 27.118161] __kasan_check_byte+0x54/0x70 [ 27.118960] kmem_cache_destroy+0x34/0x218 [ 27.119100] kmem_cache_double_destroy+0x174/0x300 [ 27.119238] kunit_try_run_case+0x170/0x3f0 [ 27.119764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.120003] kthread+0x328/0x630 [ 27.120184] ret_from_fork+0x10/0x20 [ 27.120308] [ 27.120359] Allocated by task 216: [ 27.120433] kasan_save_stack+0x3c/0x68 [ 27.120757] kasan_save_track+0x20/0x40 [ 27.120864] kasan_save_alloc_info+0x40/0x58 [ 27.120955] __kasan_slab_alloc+0xa8/0xb0 [ 27.121052] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 27.121156] __kmem_cache_create_args+0x178/0x280 [ 27.121266] kmem_cache_double_destroy+0xc0/0x300 [ 27.121366] kunit_try_run_case+0x170/0x3f0 [ 27.121481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.121589] kthread+0x328/0x630 [ 27.121676] ret_from_fork+0x10/0x20 [ 27.122507] [ 27.122660] Freed by task 216: [ 27.122754] kasan_save_stack+0x3c/0x68 [ 27.122810] kasan_save_track+0x20/0x40 [ 27.122948] kasan_save_free_info+0x4c/0x78 [ 27.123051] __kasan_slab_free+0x6c/0x98 [ 27.123162] kmem_cache_free+0x260/0x470 [ 27.123270] slab_kmem_cache_release+0x38/0x50 [ 27.123578] kmem_cache_release+0x1c/0x30 [ 27.123702] kobject_put+0x17c/0x430 [ 27.123970] sysfs_slab_release+0x1c/0x30 [ 27.124168] kmem_cache_destroy+0x118/0x218 [ 27.124283] kmem_cache_double_destroy+0x128/0x300 [ 27.126721] kunit_try_run_case+0x170/0x3f0 [ 27.126841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.126967] kthread+0x328/0x630 [ 27.127071] ret_from_fork+0x10/0x20 [ 27.127256] [ 27.127310] The buggy address belongs to the object at fff00000c5bfedc0 [ 27.127310] which belongs to the cache kmem_cache of size 208 [ 27.127720] The buggy address is located 0 bytes inside of [ 27.127720] freed 208-byte region [fff00000c5bfedc0, fff00000c5bfee90) [ 27.128991] [ 27.129048] The buggy address belongs to the physical page: [ 27.129622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bfe [ 27.129823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.130468] page_type: f5(slab) [ 27.130605] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 27.130846] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 27.131404] page dumped because: kasan: bad access detected [ 27.131500] [ 27.131615] Memory state around the buggy address: [ 27.131827] fff00000c5bfec80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.132004] fff00000c5bfed00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 27.132113] >fff00000c5bfed80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 27.132217] ^ [ 27.132348] fff00000c5bfee00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.132556] fff00000c5bfee80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.132829] ==================================================================
[ 19.712374] ================================================================== [ 19.713099] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 19.714360] Read of size 1 at addr ffff8881022d33c0 by task kunit_try_catch/232 [ 19.714941] [ 19.715415] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 19.715699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.715736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.715801] Call Trace: [ 19.715842] <TASK> [ 19.715979] dump_stack_lvl+0x73/0xb0 [ 19.716088] print_report+0xd1/0x650 [ 19.716184] ? __virt_addr_valid+0x1db/0x2d0 [ 19.716270] ? kmem_cache_double_destroy+0x1bf/0x380 [ 19.716344] ? kasan_complete_mode_report_info+0x64/0x200 [ 19.716440] ? kmem_cache_double_destroy+0x1bf/0x380 [ 19.716517] kasan_report+0x141/0x180 [ 19.716594] ? kmem_cache_double_destroy+0x1bf/0x380 [ 19.716676] ? kmem_cache_double_destroy+0x1bf/0x380 [ 19.716772] __kasan_check_byte+0x3d/0x50 [ 19.716837] kmem_cache_destroy+0x25/0x1d0 [ 19.716877] kmem_cache_double_destroy+0x1bf/0x380 [ 19.716908] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 19.716937] ? finish_task_switch.isra.0+0x153/0x700 [ 19.716970] ? __switch_to+0x47/0xf50 [ 19.717043] ? __pfx_read_tsc+0x10/0x10 [ 19.717079] ? ktime_get_ts64+0x86/0x230 [ 19.717114] kunit_try_run_case+0x1a5/0x480 [ 19.717149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.717234] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.717319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.717359] ? __kthread_parkme+0x82/0x180 [ 19.717390] ? preempt_count_sub+0x50/0x80 [ 19.717422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.717452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.717488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.717525] kthread+0x337/0x6f0 [ 19.717552] ? trace_preempt_on+0x20/0xc0 [ 19.717586] ? __pfx_kthread+0x10/0x10 [ 19.717614] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.717648] ? calculate_sigpending+0x7b/0xa0 [ 19.717683] ? __pfx_kthread+0x10/0x10 [ 19.717733] ret_from_fork+0x116/0x1d0 [ 19.717768] ? __pfx_kthread+0x10/0x10 [ 19.717799] ret_from_fork_asm+0x1a/0x30 [ 19.717842] </TASK> [ 19.717856] [ 19.737015] Allocated by task 232: [ 19.737417] kasan_save_stack+0x45/0x70 [ 19.737856] kasan_save_track+0x18/0x40 [ 19.738290] kasan_save_alloc_info+0x3b/0x50 [ 19.738762] __kasan_slab_alloc+0x91/0xa0 [ 19.739169] kmem_cache_alloc_noprof+0x123/0x3f0 [ 19.739631] __kmem_cache_create_args+0x169/0x240 [ 19.740331] kmem_cache_double_destroy+0xd5/0x380 [ 19.740787] kunit_try_run_case+0x1a5/0x480 [ 19.741191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.741751] kthread+0x337/0x6f0 [ 19.742116] ret_from_fork+0x116/0x1d0 [ 19.742873] ret_from_fork_asm+0x1a/0x30 [ 19.743223] [ 19.743637] Freed by task 232: [ 19.744287] kasan_save_stack+0x45/0x70 [ 19.744642] kasan_save_track+0x18/0x40 [ 19.744961] kasan_save_free_info+0x3f/0x60 [ 19.745313] __kasan_slab_free+0x56/0x70 [ 19.745929] kmem_cache_free+0x249/0x420 [ 19.746609] slab_kmem_cache_release+0x2e/0x40 [ 19.747497] kmem_cache_release+0x16/0x20 [ 19.748012] kobject_put+0x181/0x450 [ 19.748627] sysfs_slab_release+0x16/0x20 [ 19.749007] kmem_cache_destroy+0xf0/0x1d0 [ 19.749339] kmem_cache_double_destroy+0x14e/0x380 [ 19.749897] kunit_try_run_case+0x1a5/0x480 [ 19.750446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.751177] kthread+0x337/0x6f0 [ 19.751549] ret_from_fork+0x116/0x1d0 [ 19.752042] ret_from_fork_asm+0x1a/0x30 [ 19.752367] [ 19.752587] The buggy address belongs to the object at ffff8881022d33c0 [ 19.752587] which belongs to the cache kmem_cache of size 208 [ 19.754090] The buggy address is located 0 bytes inside of [ 19.754090] freed 208-byte region [ffff8881022d33c0, ffff8881022d3490) [ 19.755153] [ 19.755462] The buggy address belongs to the physical page: [ 19.756027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022d3 [ 19.756747] flags: 0x200000000000000(node=0|zone=2) [ 19.757170] page_type: f5(slab) [ 19.757538] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000 [ 19.759123] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.760704] page dumped because: kasan: bad access detected [ 19.761199] [ 19.761431] Memory state around the buggy address: [ 19.761885] ffff8881022d3280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.762397] ffff8881022d3300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.763029] >ffff8881022d3380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.763652] ^ [ 19.764515] ffff8881022d3400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.765175] ffff8881022d3480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.765890] ==================================================================
[ 61.545806] ================================================================== [ 61.557067] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1e8/0x398 [ 61.564880] Read of size 1 at addr cc85a400 by task kunit_try_catch/267 [ 61.571563] [ 61.573059] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 61.573120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 61.573120] Hardware name: Generic DRA74X (Flattened Device Tree) [ 61.573150] Call trace: [ 61.573150] unwind_backtrace from show_stack+0x18/0x1c [ 61.573211] show_stack from dump_stack_lvl+0x70/0x90 [ 61.573242] dump_stack_lvl from print_report+0x158/0x528 [ 61.573272] print_report from kasan_report+0xdc/0x118 [ 61.573303] kasan_report from __kasan_check_byte+0x34/0x3c [ 61.573333] __kasan_check_byte from kmem_cache_destroy+0x24/0x1ec [ 61.573394] kmem_cache_destroy from kmem_cache_double_destroy+0x1e8/0x398 [ 61.573425] kmem_cache_double_destroy from kunit_try_run_case+0x22c/0x5a8 [ 61.573455] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.573516] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 61.573547] kthread from ret_from_fork+0x14/0x20 [ 61.573577] Exception stack(0xf23b3fb0 to 0xf23b3ff8) [ 61.573608] 3fa0: 00000000 00000000 00000000 00000000 [ 61.573638] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 61.573638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 61.573669] [ 61.693176] Allocated by task 267: [ 61.696624] kasan_save_track+0x30/0x5c [ 61.700469] __kasan_slab_alloc+0x60/0x68 [ 61.704528] kmem_cache_alloc_noprof+0x17c/0x36c [ 61.709167] __kmem_cache_create_args+0x1c0/0x2c0 [ 61.713928] kmem_cache_double_destroy+0xc0/0x398 [ 61.718658] kunit_try_run_case+0x22c/0x5a8 [ 61.722869] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.728393] kthread+0x464/0x810 [ 61.731658] ret_from_fork+0x14/0x20 [ 61.735260] [ 61.736755] Freed by task 267: [ 61.739837] kasan_save_track+0x30/0x5c [ 61.743713] kasan_save_free_info+0x3c/0x48 [ 61.747924] __kasan_slab_free+0x40/0x50 [ 61.751892] kmem_cache_free+0x100/0x470 [ 61.755828] kobject_put+0x21c/0x678 [ 61.759460] kmem_cache_double_destroy+0x168/0x398 [ 61.764282] kunit_try_run_case+0x22c/0x5a8 [ 61.768493] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 61.774017] kthread+0x464/0x810 [ 61.777282] ret_from_fork+0x14/0x20 [ 61.780883] [ 61.782379] The buggy address belongs to the object at cc85a400 [ 61.782379] which belongs to the cache kmem_cache of size 132 [ 61.794189] The buggy address is located 0 bytes inside of [ 61.794189] freed 132-byte region [cc85a400, cc85a484) [ 61.804962] [ 61.806457] The buggy address belongs to the physical page: [ 61.812072] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85a [ 61.819366] flags: 0x0(zone=0) [ 61.822448] page_type: f5(slab) [ 61.825592] raw: 00000000 c7001000 00000122 00000000 00000000 80100010 f5000000 00000000 [ 61.833740] raw: 00000000 [ 61.836395] page dumped because: kasan: bad access detected [ 61.841979] [ 61.843505] Memory state around the buggy address: [ 61.848327] cc85a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.854888] cc85a380: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.861450] >cc85a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.868041] ^ [ 61.870574] cc85a480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.877166] cc85a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.883728] ==================================================================