Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.290411] ================================================================== [ 32.290500] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.290578] Read of size 1 at addr fff00000c113a780 by task kunit_try_catch/248 [ 32.290630] [ 32.290675] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.290768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.290797] Hardware name: linux,dummy-virt (DT) [ 32.290831] Call trace: [ 32.290857] show_stack+0x20/0x38 (C) [ 32.290912] dump_stack_lvl+0x8c/0xd0 [ 32.290979] print_report+0x118/0x608 [ 32.291030] kasan_report+0xdc/0x128 [ 32.291075] __kasan_check_byte+0x54/0x70 [ 32.291124] kmem_cache_destroy+0x34/0x218 [ 32.291173] kmem_cache_double_destroy+0x174/0x300 [ 32.291223] kunit_try_run_case+0x170/0x3f0 [ 32.291274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.291328] kthread+0x328/0x630 [ 32.291374] ret_from_fork+0x10/0x20 [ 32.291423] [ 32.291442] Allocated by task 248: [ 32.291476] kasan_save_stack+0x3c/0x68 [ 32.291519] kasan_save_track+0x20/0x40 [ 32.291560] kasan_save_alloc_info+0x40/0x58 [ 32.291607] __kasan_slab_alloc+0xa8/0xb0 [ 32.291645] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.291689] __kmem_cache_create_args+0x178/0x280 [ 32.291728] kmem_cache_double_destroy+0xc0/0x300 [ 32.291769] kunit_try_run_case+0x170/0x3f0 [ 32.291809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.291853] kthread+0x328/0x630 [ 32.291887] ret_from_fork+0x10/0x20 [ 32.291923] [ 32.291956] Freed by task 248: [ 32.291984] kasan_save_stack+0x3c/0x68 [ 32.292021] kasan_save_track+0x20/0x40 [ 32.292060] kasan_save_free_info+0x4c/0x78 [ 32.292096] __kasan_slab_free+0x6c/0x98 [ 32.292135] kmem_cache_free+0x260/0x468 [ 32.292173] slab_kmem_cache_release+0x38/0x50 [ 32.292214] kmem_cache_release+0x1c/0x30 [ 32.292251] kobject_put+0x17c/0x420 [ 32.292290] sysfs_slab_release+0x1c/0x30 [ 32.292328] kmem_cache_destroy+0x118/0x218 [ 32.292366] kmem_cache_double_destroy+0x128/0x300 [ 32.292407] kunit_try_run_case+0x170/0x3f0 [ 32.292448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.292494] kthread+0x328/0x630 [ 32.292528] ret_from_fork+0x10/0x20 [ 32.292565] [ 32.292585] The buggy address belongs to the object at fff00000c113a780 [ 32.292585] which belongs to the cache kmem_cache of size 208 [ 32.292644] The buggy address is located 0 bytes inside of [ 32.292644] freed 208-byte region [fff00000c113a780, fff00000c113a850) [ 32.292705] [ 32.292730] The buggy address belongs to the physical page: [ 32.292765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10113a [ 32.292825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.292880] page_type: f5(slab) [ 32.292923] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 32.292984] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.293027] page dumped because: kasan: bad access detected [ 32.293061] [ 32.293079] Memory state around the buggy address: [ 32.293114] fff00000c113a680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.293158] fff00000c113a700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293204] >fff00000c113a780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.293243] ^ [ 32.293271] fff00000c113a800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.293312] fff00000c113a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293352] ==================================================================
[ 34.133854] ================================================================== [ 34.133932] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.134012] Read of size 1 at addr fff00000c5c333c0 by task kunit_try_catch/246 [ 34.134065] [ 34.134107] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 34.137223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.137255] Hardware name: linux,dummy-virt (DT) [ 34.137295] Call trace: [ 34.137320] show_stack+0x20/0x38 (C) [ 34.137378] dump_stack_lvl+0x8c/0xd0 [ 34.137433] print_report+0x118/0x608 [ 34.137485] kasan_report+0xdc/0x128 [ 34.137532] __kasan_check_byte+0x54/0x70 [ 34.137579] kmem_cache_destroy+0x34/0x218 [ 34.137629] kmem_cache_double_destroy+0x174/0x300 [ 34.137677] kunit_try_run_case+0x170/0x3f0 [ 34.137730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.137783] kthread+0x328/0x630 [ 34.137827] ret_from_fork+0x10/0x20 [ 34.137875] [ 34.137896] Allocated by task 246: [ 34.137926] kasan_save_stack+0x3c/0x68 [ 34.137971] kasan_save_track+0x20/0x40 [ 34.138008] kasan_save_alloc_info+0x40/0x58 [ 34.138046] __kasan_slab_alloc+0xa8/0xb0 [ 34.138086] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.138128] __kmem_cache_create_args+0x178/0x280 [ 34.138178] kmem_cache_double_destroy+0xc0/0x300 [ 34.138248] kunit_try_run_case+0x170/0x3f0 [ 34.138298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.138353] kthread+0x328/0x630 [ 34.138400] ret_from_fork+0x10/0x20 [ 34.138445] [ 34.138464] Freed by task 246: [ 34.138493] kasan_save_stack+0x3c/0x68 [ 34.138532] kasan_save_track+0x20/0x40 [ 34.138574] kasan_save_free_info+0x4c/0x78 [ 34.138612] __kasan_slab_free+0x6c/0x98 [ 34.138649] kmem_cache_free+0x260/0x468 [ 34.138709] slab_kmem_cache_release+0x38/0x50 [ 34.138747] kmem_cache_release+0x1c/0x30 [ 34.138785] kobject_put+0x17c/0x420 [ 34.138831] sysfs_slab_release+0x1c/0x30 [ 34.138877] kmem_cache_destroy+0x118/0x218 [ 34.138914] kmem_cache_double_destroy+0x128/0x300 [ 34.138953] kunit_try_run_case+0x170/0x3f0 [ 34.139002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.139056] kthread+0x328/0x630 [ 34.139089] ret_from_fork+0x10/0x20 [ 34.139126] [ 34.139148] The buggy address belongs to the object at fff00000c5c333c0 [ 34.139148] which belongs to the cache kmem_cache of size 208 [ 34.139217] The buggy address is located 0 bytes inside of [ 34.139217] freed 208-byte region [fff00000c5c333c0, fff00000c5c33490) [ 34.139293] [ 34.139317] The buggy address belongs to the physical page: [ 34.139360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c33 [ 34.139440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.139523] page_type: f5(slab) [ 34.139568] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 34.139620] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 34.139670] page dumped because: kasan: bad access detected [ 34.139705] [ 34.139745] Memory state around the buggy address: [ 34.139796] fff00000c5c33280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.139840] fff00000c5c33300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 34.139894] >fff00000c5c33380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.139947] ^ [ 34.139991] fff00000c5c33400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.140040] fff00000c5c33480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.140079] ==================================================================
[ 24.163349] ================================================================== [ 24.163780] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 24.165106] Read of size 1 at addr ffff88810190e640 by task kunit_try_catch/264 [ 24.166028] [ 24.166585] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 24.166662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.166677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.166703] Call Trace: [ 24.166720] <TASK> [ 24.166745] dump_stack_lvl+0x73/0xb0 [ 24.166785] print_report+0xd1/0x650 [ 24.166810] ? __virt_addr_valid+0x1db/0x2d0 [ 24.166837] ? kmem_cache_double_destroy+0x1bf/0x380 [ 24.166861] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.166889] ? kmem_cache_double_destroy+0x1bf/0x380 [ 24.166913] kasan_report+0x141/0x180 [ 24.167095] ? kmem_cache_double_destroy+0x1bf/0x380 [ 24.167128] ? kmem_cache_double_destroy+0x1bf/0x380 [ 24.167155] __kasan_check_byte+0x3d/0x50 [ 24.167177] kmem_cache_destroy+0x25/0x1d0 [ 24.167246] kmem_cache_double_destroy+0x1bf/0x380 [ 24.167269] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 24.167294] ? finish_task_switch.isra.0+0x153/0x700 [ 24.167318] ? __switch_to+0x47/0xf50 [ 24.167347] ? __pfx_read_tsc+0x10/0x10 [ 24.167369] ? ktime_get_ts64+0x86/0x230 [ 24.167396] kunit_try_run_case+0x1a5/0x480 [ 24.167424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.167449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.167472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.167494] ? __kthread_parkme+0x82/0x180 [ 24.167514] ? preempt_count_sub+0x50/0x80 [ 24.167537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.167562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.167585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.167610] kthread+0x337/0x6f0 [ 24.167629] ? trace_preempt_on+0x20/0xc0 [ 24.167654] ? __pfx_kthread+0x10/0x10 [ 24.167674] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.167699] ? calculate_sigpending+0x7b/0xa0 [ 24.167724] ? __pfx_kthread+0x10/0x10 [ 24.167746] ret_from_fork+0x116/0x1d0 [ 24.167765] ? __pfx_kthread+0x10/0x10 [ 24.167785] ret_from_fork_asm+0x1a/0x30 [ 24.167816] </TASK> [ 24.167831] [ 24.180761] Allocated by task 264: [ 24.181037] kasan_save_stack+0x45/0x70 [ 24.181580] kasan_save_track+0x18/0x40 [ 24.181958] kasan_save_alloc_info+0x3b/0x50 [ 24.182474] __kasan_slab_alloc+0x91/0xa0 [ 24.182767] kmem_cache_alloc_noprof+0x123/0x3f0 [ 24.182921] __kmem_cache_create_args+0x169/0x240 [ 24.183664] kmem_cache_double_destroy+0xd5/0x380 [ 24.184169] kunit_try_run_case+0x1a5/0x480 [ 24.184538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.184806] kthread+0x337/0x6f0 [ 24.185417] ret_from_fork+0x116/0x1d0 [ 24.185906] ret_from_fork_asm+0x1a/0x30 [ 24.186438] [ 24.186515] Freed by task 264: [ 24.186621] kasan_save_stack+0x45/0x70 [ 24.186748] kasan_save_track+0x18/0x40 [ 24.186871] kasan_save_free_info+0x3f/0x60 [ 24.187624] __kasan_slab_free+0x56/0x70 [ 24.188031] kmem_cache_free+0x249/0x420 [ 24.188672] slab_kmem_cache_release+0x2e/0x40 [ 24.189126] kmem_cache_release+0x16/0x20 [ 24.189624] kobject_put+0x181/0x450 [ 24.190137] sysfs_slab_release+0x16/0x20 [ 24.190333] kmem_cache_destroy+0xf0/0x1d0 [ 24.190771] kmem_cache_double_destroy+0x14e/0x380 [ 24.190939] kunit_try_run_case+0x1a5/0x480 [ 24.191471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.191897] kthread+0x337/0x6f0 [ 24.192022] ret_from_fork+0x116/0x1d0 [ 24.192157] ret_from_fork_asm+0x1a/0x30 [ 24.192742] [ 24.192905] The buggy address belongs to the object at ffff88810190e640 [ 24.192905] which belongs to the cache kmem_cache of size 208 [ 24.194125] The buggy address is located 0 bytes inside of [ 24.194125] freed 208-byte region [ffff88810190e640, ffff88810190e710) [ 24.195055] [ 24.195232] The buggy address belongs to the physical page: [ 24.195736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10190e [ 24.195996] flags: 0x200000000000000(node=0|zone=2) [ 24.196450] page_type: f5(slab) [ 24.196986] raw: 0200000000000000 ffff888100041000 dead000000000100 dead000000000122 [ 24.197961] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 24.198252] page dumped because: kasan: bad access detected [ 24.198732] [ 24.198882] Memory state around the buggy address: [ 24.199333] ffff88810190e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.199540] ffff88810190e580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 24.199739] >ffff88810190e600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 24.199950] ^ [ 24.200606] ffff88810190e680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.201360] ffff88810190e700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.201969] ==================================================================
[ 23.904902] ================================================================== [ 23.905304] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 23.906265] Read of size 1 at addr ffff888101e2dc80 by task kunit_try_catch/263 [ 23.907173] [ 23.907449] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.907519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.907533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.907558] Call Trace: [ 23.907573] <TASK> [ 23.907594] dump_stack_lvl+0x73/0xb0 [ 23.907632] print_report+0xd1/0x650 [ 23.907657] ? __virt_addr_valid+0x1db/0x2d0 [ 23.907684] ? kmem_cache_double_destroy+0x1bf/0x380 [ 23.907710] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.907735] ? kmem_cache_double_destroy+0x1bf/0x380 [ 23.907760] kasan_report+0x141/0x180 [ 23.907783] ? kmem_cache_double_destroy+0x1bf/0x380 [ 23.907810] ? kmem_cache_double_destroy+0x1bf/0x380 [ 23.907835] __kasan_check_byte+0x3d/0x50 [ 23.907857] kmem_cache_destroy+0x25/0x1d0 [ 23.907885] kmem_cache_double_destroy+0x1bf/0x380 [ 23.907910] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 23.907933] ? finish_task_switch.isra.0+0x153/0x700 [ 23.907997] ? __switch_to+0x47/0xf50 [ 23.908028] ? __pfx_read_tsc+0x10/0x10 [ 23.908063] ? ktime_get_ts64+0x86/0x230 [ 23.908090] kunit_try_run_case+0x1a5/0x480 [ 23.908119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.908143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.908165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.908188] ? __kthread_parkme+0x82/0x180 [ 23.908208] ? preempt_count_sub+0x50/0x80 [ 23.908231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.908256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.908280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.908314] kthread+0x337/0x6f0 [ 23.908334] ? trace_preempt_on+0x20/0xc0 [ 23.908359] ? __pfx_kthread+0x10/0x10 [ 23.908380] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.908406] ? calculate_sigpending+0x7b/0xa0 [ 23.908430] ? __pfx_kthread+0x10/0x10 [ 23.908452] ret_from_fork+0x116/0x1d0 [ 23.908472] ? __pfx_kthread+0x10/0x10 [ 23.908500] ret_from_fork_asm+0x1a/0x30 [ 23.908532] </TASK> [ 23.908546] [ 23.918228] Allocated by task 263: [ 23.918454] kasan_save_stack+0x45/0x70 [ 23.918728] kasan_save_track+0x18/0x40 [ 23.918888] kasan_save_alloc_info+0x3b/0x50 [ 23.919072] __kasan_slab_alloc+0x91/0xa0 [ 23.919207] kmem_cache_alloc_noprof+0x123/0x3f0 [ 23.919441] __kmem_cache_create_args+0x169/0x240 [ 23.919975] kmem_cache_double_destroy+0xd5/0x380 [ 23.920208] kunit_try_run_case+0x1a5/0x480 [ 23.920369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.920752] kthread+0x337/0x6f0 [ 23.920930] ret_from_fork+0x116/0x1d0 [ 23.921121] ret_from_fork_asm+0x1a/0x30 [ 23.921329] [ 23.921412] Freed by task 263: [ 23.921581] kasan_save_stack+0x45/0x70 [ 23.921808] kasan_save_track+0x18/0x40 [ 23.922064] kasan_save_free_info+0x3f/0x60 [ 23.922230] __kasan_slab_free+0x56/0x70 [ 23.922371] kmem_cache_free+0x249/0x420 [ 23.922508] slab_kmem_cache_release+0x2e/0x40 [ 23.922666] kmem_cache_release+0x16/0x20 [ 23.922860] kobject_put+0x181/0x450 [ 23.923191] sysfs_slab_release+0x16/0x20 [ 23.923407] kmem_cache_destroy+0xf0/0x1d0 [ 23.923660] kmem_cache_double_destroy+0x14e/0x380 [ 23.923901] kunit_try_run_case+0x1a5/0x480 [ 23.924049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.924365] kthread+0x337/0x6f0 [ 23.924556] ret_from_fork+0x116/0x1d0 [ 23.924734] ret_from_fork_asm+0x1a/0x30 [ 23.924921] [ 23.924991] The buggy address belongs to the object at ffff888101e2dc80 [ 23.924991] which belongs to the cache kmem_cache of size 208 [ 23.925433] The buggy address is located 0 bytes inside of [ 23.925433] freed 208-byte region [ffff888101e2dc80, ffff888101e2dd50) [ 23.925783] [ 23.926020] The buggy address belongs to the physical page: [ 23.926288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2d [ 23.927117] flags: 0x200000000000000(node=0|zone=2) [ 23.927359] page_type: f5(slab) [ 23.927480] raw: 0200000000000000 ffff888100041000 dead000000000100 dead000000000122 [ 23.928297] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 23.928726] page dumped because: kasan: bad access detected [ 23.928976] [ 23.929068] Memory state around the buggy address: [ 23.929281] ffff888101e2db80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.929772] ffff888101e2dc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.930046] >ffff888101e2dc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.930344] ^ [ 23.930454] ffff888101e2dd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 23.930820] ffff888101e2dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.931243] ==================================================================