Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.345616] ==================================================================
[   18.345714] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   18.345807] Read of size 1 at addr fff00000c5a8f500 by task kunit_try_catch/224
[   18.345861] 
[   18.345906] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   18.346016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.346084] Hardware name: linux,dummy-virt (DT)
[   18.346121] Call trace:
[   18.346173]  show_stack+0x20/0x38 (C)
[   18.346236]  dump_stack_lvl+0x8c/0xd0
[   18.346287]  print_report+0x118/0x608
[   18.346337]  kasan_report+0xdc/0x128
[   18.346384]  __kasan_check_byte+0x54/0x70
[   18.346432]  kmem_cache_destroy+0x34/0x218
[   18.346480]  kmem_cache_double_destroy+0x174/0x300
[   18.346530]  kunit_try_run_case+0x170/0x3f0
[   18.346582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.346633]  kthread+0x328/0x630
[   18.346679]  ret_from_fork+0x10/0x20
[   18.346729] 
[   18.346747] Allocated by task 224:
[   18.346780]  kasan_save_stack+0x3c/0x68
[   18.346822]  kasan_save_track+0x20/0x40
[   18.346862]  kasan_save_alloc_info+0x40/0x58
[   18.346901]  __kasan_slab_alloc+0xa8/0xb0
[   18.346950]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.346994]  __kmem_cache_create_args+0x178/0x280
[   18.347033]  kmem_cache_double_destroy+0xc0/0x300
[   18.347073]  kunit_try_run_case+0x170/0x3f0
[   18.347112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.347155]  kthread+0x328/0x630
[   18.347189]  ret_from_fork+0x10/0x20
[   18.347225] 
[   18.347243] Freed by task 224:
[   18.347271]  kasan_save_stack+0x3c/0x68
[   18.347308]  kasan_save_track+0x20/0x40
[   18.347346]  kasan_save_free_info+0x4c/0x78
[   18.347382]  __kasan_slab_free+0x6c/0x98
[   18.347420]  kmem_cache_free+0x260/0x468
[   18.347457]  slab_kmem_cache_release+0x38/0x50
[   18.347497]  kmem_cache_release+0x1c/0x30
[   18.347534]  kobject_put+0x17c/0x420
[   18.347570]  sysfs_slab_release+0x1c/0x30
[   18.347607]  kmem_cache_destroy+0x118/0x218
[   18.347647]  kmem_cache_double_destroy+0x128/0x300
[   18.347686]  kunit_try_run_case+0x170/0x3f0
[   18.347723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.347769]  kthread+0x328/0x630
[   18.347801]  ret_from_fork+0x10/0x20
[   18.347839] 
[   18.347858] The buggy address belongs to the object at fff00000c5a8f500
[   18.347858]  which belongs to the cache kmem_cache of size 208
[   18.347918] The buggy address is located 0 bytes inside of
[   18.347918]  freed 208-byte region [fff00000c5a8f500, fff00000c5a8f5d0)
[   18.347990] 
[   18.348014] The buggy address belongs to the physical page:
[   18.348049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8f
[   18.348107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.348163] page_type: f5(slab)
[   18.348208] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   18.348260] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   18.348303] page dumped because: kasan: bad access detected
[   18.348337] 
[   18.348355] Memory state around the buggy address:
[   18.348390]  fff00000c5a8f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.348434]  fff00000c5a8f480: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.348478] >fff00000c5a8f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.348518]                    ^
[   18.348545]  fff00000c5a8f580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   18.348589]  fff00000c5a8f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.348627] ==================================================================

[   19.331784] ==================================================================
[   19.332521] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   19.333209] Read of size 1 at addr ffff8881017f13c0 by task kunit_try_catch/242
[   19.333752] 
[   19.333995] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   19.334156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.334190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.334247] Call Trace:
[   19.334283]  <TASK>
[   19.334331]  dump_stack_lvl+0x73/0xb0
[   19.334452]  print_report+0xd1/0x650
[   19.334558]  ? __virt_addr_valid+0x1db/0x2d0
[   19.334640]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.335155]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.335228]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.335307]  kasan_report+0x141/0x180
[   19.335378]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.335459]  ? kmem_cache_double_destroy+0x1bf/0x380
[   19.335535]  __kasan_check_byte+0x3d/0x50
[   19.335619]  kmem_cache_destroy+0x25/0x1d0
[   19.335693]  kmem_cache_double_destroy+0x1bf/0x380
[   19.335768]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   19.335858]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.335935]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   19.335981]  kunit_try_run_case+0x1a5/0x480
[   19.336019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.336052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.336083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.336123]  ? __kthread_parkme+0x82/0x180
[   19.336154]  ? preempt_count_sub+0x50/0x80
[   19.336189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.336232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.336310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.336368]  kthread+0x337/0x6f0
[   19.336398]  ? trace_preempt_on+0x20/0xc0
[   19.336435]  ? __pfx_kthread+0x10/0x10
[   19.336464]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.336497]  ? calculate_sigpending+0x7b/0xa0
[   19.336532]  ? __pfx_kthread+0x10/0x10
[   19.336561]  ret_from_fork+0x116/0x1d0
[   19.336588]  ? __pfx_kthread+0x10/0x10
[   19.336618]  ret_from_fork_asm+0x1a/0x30
[   19.336661]  </TASK>
[   19.336676] 
[   19.354611] Allocated by task 242:
[   19.355140]  kasan_save_stack+0x45/0x70
[   19.355550]  kasan_save_track+0x18/0x40
[   19.357617]  kasan_save_alloc_info+0x3b/0x50
[   19.358937]  __kasan_slab_alloc+0x91/0xa0
[   19.359574]  kmem_cache_alloc_noprof+0x123/0x3f0
[   19.361144]  __kmem_cache_create_args+0x169/0x240
[   19.362258]  kmem_cache_double_destroy+0xd5/0x380
[   19.363496]  kunit_try_run_case+0x1a5/0x480
[   19.364536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.365028]  kthread+0x337/0x6f0
[   19.365359]  ret_from_fork+0x116/0x1d0
[   19.365660]  ret_from_fork_asm+0x1a/0x30
[   19.365922] 
[   19.366079] Freed by task 242:
[   19.366309]  kasan_save_stack+0x45/0x70
[   19.366555]  kasan_save_track+0x18/0x40
[   19.366774]  kasan_save_free_info+0x3f/0x60
[   19.369577]  __kasan_slab_free+0x56/0x70
[   19.370017]  kmem_cache_free+0x249/0x420
[   19.370866]  slab_kmem_cache_release+0x2e/0x40
[   19.371378]  kmem_cache_release+0x16/0x20
[   19.371780]  kobject_put+0x181/0x450
[   19.372449]  sysfs_slab_release+0x16/0x20
[   19.372970]  kmem_cache_destroy+0xf0/0x1d0
[   19.373523]  kmem_cache_double_destroy+0x14e/0x380
[   19.374101]  kunit_try_run_case+0x1a5/0x480
[   19.374883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.375401]  kthread+0x337/0x6f0
[   19.375965]  ret_from_fork+0x116/0x1d0
[   19.376468]  ret_from_fork_asm+0x1a/0x30
[   19.377011] 
[   19.377424] The buggy address belongs to the object at ffff8881017f13c0
[   19.377424]  which belongs to the cache kmem_cache of size 208
[   19.378823] The buggy address is located 0 bytes inside of
[   19.378823]  freed 208-byte region [ffff8881017f13c0, ffff8881017f1490)
[   19.380049] 
[   19.380409] The buggy address belongs to the physical page:
[   19.380947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017f1
[   19.381611] flags: 0x200000000000000(node=0|zone=2)
[   19.382631] page_type: f5(slab)
[   19.382928] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   19.383787] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.384551] page dumped because: kasan: bad access detected
[   19.385007] 
[   19.385421] Memory state around the buggy address:
[   19.385967]  ffff8881017f1280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.386849]  ffff8881017f1300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.387665] >ffff8881017f1380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.388414]                                            ^
[   19.388933]  ffff8881017f1400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.389642]  ffff8881017f1480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390555] ==================================================================