Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.955874] ==================================================================
[   31.955971] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   31.956049] Read of size 1 at addr fff00000c5c24a00 by task kunit_try_catch/248
[   31.956102] 
[   31.956142] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.956236] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.956268] Hardware name: linux,dummy-virt (DT)
[   31.956301] Call trace:
[   31.956327]  show_stack+0x20/0x38 (C)
[   31.956379]  dump_stack_lvl+0x8c/0xd0
[   31.956430]  print_report+0x118/0x5e8
[   31.956474]  kasan_report+0xdc/0x128
[   31.956516]  __kasan_check_byte+0x54/0x70
[   31.956573]  kmem_cache_destroy+0x34/0x218
[   31.956622]  kmem_cache_double_destroy+0x174/0x300
[   31.956672]  kunit_try_run_case+0x170/0x3f0
[   31.956721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.956773]  kthread+0x328/0x630
[   31.956815]  ret_from_fork+0x10/0x20
[   31.956865] 
[   31.956884] Allocated by task 248:
[   31.956929]  kasan_save_stack+0x3c/0x68
[   31.956971]  kasan_save_track+0x20/0x40
[   31.957007]  kasan_save_alloc_info+0x40/0x58
[   31.957044]  __kasan_slab_alloc+0xa8/0xb0
[   31.957078]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.957122]  __kmem_cache_create_args+0x178/0x280
[   31.957162]  kmem_cache_double_destroy+0xc0/0x300
[   31.957201]  kunit_try_run_case+0x170/0x3f0
[   31.957240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.957283]  kthread+0x328/0x630
[   31.957315]  ret_from_fork+0x10/0x20
[   31.957351] 
[   31.957369] Freed by task 248:
[   31.957394]  kasan_save_stack+0x3c/0x68
[   31.957429]  kasan_save_track+0x20/0x40
[   31.957463]  kasan_save_free_info+0x4c/0x78
[   31.957501]  __kasan_slab_free+0x6c/0x98
[   31.957537]  kmem_cache_free+0x260/0x468
[   31.957574]  slab_kmem_cache_release+0x38/0x50
[   31.957615]  kmem_cache_release+0x1c/0x30
[   31.957652]  kobject_put+0x17c/0x420
[   31.957690]  sysfs_slab_release+0x1c/0x30
[   31.957725]  kmem_cache_destroy+0x118/0x218
[   31.957764]  kmem_cache_double_destroy+0x128/0x300
[   31.957804]  kunit_try_run_case+0x170/0x3f0
[   31.957841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.957882]  kthread+0x328/0x630
[   31.957929]  ret_from_fork+0x10/0x20
[   31.957964] 
[   31.957983] The buggy address belongs to the object at fff00000c5c24a00
[   31.957983]  which belongs to the cache kmem_cache of size 208
[   31.958042] The buggy address is located 0 bytes inside of
[   31.958042]  freed 208-byte region [fff00000c5c24a00, fff00000c5c24ad0)
[   31.958103] 
[   31.958124] The buggy address belongs to the physical page:
[   31.958164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c24
[   31.958221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.958274] page_type: f5(slab)
[   31.958314] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   31.958376] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   31.958417] page dumped because: kasan: bad access detected
[   31.958449] 
[   31.958467] Memory state around the buggy address:
[   31.958500]  fff00000c5c24900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.958543]  fff00000c5c24980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.958587] >fff00000c5c24a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.958624]                    ^
[   31.958654]  fff00000c5c24a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   31.958696]  fff00000c5c24b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.958736] ==================================================================

[   26.074602] ==================================================================
[   26.075163] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   26.075558] Read of size 1 at addr ffff888101dc6500 by task kunit_try_catch/264
[   26.076632] 
[   26.076873] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   26.076948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.077138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.077176] Call Trace:
[   26.077191]  <TASK>
[   26.077234]  dump_stack_lvl+0x73/0xb0
[   26.077280]  print_report+0xd1/0x640
[   26.077305]  ? __virt_addr_valid+0x1db/0x2d0
[   26.077460]  ? kmem_cache_double_destroy+0x1bf/0x380
[   26.077488]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.077514]  ? kmem_cache_double_destroy+0x1bf/0x380
[   26.077538]  kasan_report+0x141/0x180
[   26.077561]  ? kmem_cache_double_destroy+0x1bf/0x380
[   26.077588]  ? kmem_cache_double_destroy+0x1bf/0x380
[   26.077612]  __kasan_check_byte+0x3d/0x50
[   26.077634]  kmem_cache_destroy+0x25/0x1d0
[   26.077663]  kmem_cache_double_destroy+0x1bf/0x380
[   26.077687]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   26.077710]  ? finish_task_switch.isra.0+0x153/0x700
[   26.077734]  ? __switch_to+0x47/0xf80
[   26.077763]  ? __pfx_read_tsc+0x10/0x10
[   26.077786]  ? ktime_get_ts64+0x86/0x230
[   26.077812]  kunit_try_run_case+0x1a5/0x480
[   26.077839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.077860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.077888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.077914]  ? __kthread_parkme+0x82/0x180
[   26.077934]  ? preempt_count_sub+0x50/0x80
[   26.077965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.077988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.078013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.078038]  kthread+0x337/0x6f0
[   26.078058]  ? trace_preempt_on+0x20/0xc0
[   26.078083]  ? __pfx_kthread+0x10/0x10
[   26.078104]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.078127]  ? calculate_sigpending+0x7b/0xa0
[   26.078163]  ? __pfx_kthread+0x10/0x10
[   26.078185]  ret_from_fork+0x116/0x1d0
[   26.078205]  ? __pfx_kthread+0x10/0x10
[   26.078225]  ret_from_fork_asm+0x1a/0x30
[   26.078257]  </TASK>
[   26.078269] 
[   26.094045] Allocated by task 264:
[   26.094411]  kasan_save_stack+0x45/0x70
[   26.094900]  kasan_save_track+0x18/0x40
[   26.095324]  kasan_save_alloc_info+0x3b/0x50
[   26.095718]  __kasan_slab_alloc+0x91/0xa0
[   26.095863]  kmem_cache_alloc_noprof+0x123/0x3f0
[   26.096345]  __kmem_cache_create_args+0x169/0x240
[   26.096890]  kmem_cache_double_destroy+0xd5/0x380
[   26.097116]  kunit_try_run_case+0x1a5/0x480
[   26.097271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.097437]  kthread+0x337/0x6f0
[   26.097548]  ret_from_fork+0x116/0x1d0
[   26.097673]  ret_from_fork_asm+0x1a/0x30
[   26.098186] 
[   26.098340] Freed by task 264:
[   26.098802]  kasan_save_stack+0x45/0x70
[   26.099254]  kasan_save_track+0x18/0x40
[   26.099754]  kasan_save_free_info+0x3f/0x60
[   26.100218]  __kasan_slab_free+0x56/0x70
[   26.100703]  kmem_cache_free+0x249/0x420
[   26.101127]  slab_kmem_cache_release+0x2e/0x40
[   26.101663]  kmem_cache_release+0x16/0x20
[   26.102123]  kobject_put+0x181/0x450
[   26.102395]  sysfs_slab_release+0x16/0x20
[   26.102815]  kmem_cache_destroy+0xf0/0x1d0
[   26.103204]  kmem_cache_double_destroy+0x14e/0x380
[   26.103388]  kunit_try_run_case+0x1a5/0x480
[   26.103527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.103746]  kthread+0x337/0x6f0
[   26.104183]  ret_from_fork+0x116/0x1d0
[   26.104660]  ret_from_fork_asm+0x1a/0x30
[   26.105082] 
[   26.105291] The buggy address belongs to the object at ffff888101dc6500
[   26.105291]  which belongs to the cache kmem_cache of size 208
[   26.106613] The buggy address is located 0 bytes inside of
[   26.106613]  freed 208-byte region [ffff888101dc6500, ffff888101dc65d0)
[   26.106983] 
[   26.107254] The buggy address belongs to the physical page:
[   26.107818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dc6
[   26.108812] flags: 0x200000000000000(node=0|zone=2)
[   26.109419] page_type: f5(slab)
[   26.109554] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   26.109773] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   26.110107] page dumped because: kasan: bad access detected
[   26.110808] 
[   26.111042] Memory state around the buggy address:
[   26.111553]  ffff888101dc6400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.112326]  ffff888101dc6480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.113086] >ffff888101dc6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.113593]                    ^
[   26.113716]  ffff888101dc6580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   26.113923]  ffff888101dc6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.114761] ==================================================================