Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  106.969271] ==================================================================
[  106.970062] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xd4/0x1d0
[  106.970674] Read of size 1 at addr ffff0000c6446780 by task kunit_try_catch/245
[  106.971180] 
[  106.971378] CPU: 1 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  106.972024] Hardware name: linux,dummy-virt (DT)
[  106.972440] Call trace:
[  106.972859]  dump_backtrace+0xe0/0x134
[  106.973376]  show_stack+0x20/0x2c
[  106.974585]  dump_stack_lvl+0x88/0xb4
[  106.975363]  print_report+0x158/0x44c
[  106.976176]  kasan_report+0xc8/0x180
[  106.976914]  __kasan_check_byte+0x54/0x70
[  106.977323]  kmem_cache_destroy+0x100/0x1a4
[  106.978008]  kmem_cache_double_destroy+0xd4/0x1d0
[  106.978758]  kunit_try_run_case+0x8c/0x124
[  106.979416]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.980231]  kthread+0x15c/0x170
[  106.980911]  ret_from_fork+0x10/0x20
[  106.981554] 
[  106.981879] Allocated by task 245:
[  106.982391]  kasan_save_stack+0x3c/0x70
[  106.982859]  kasan_set_track+0x2c/0x40
[  106.983235]  kasan_save_alloc_info+0x24/0x34
[  106.983649]  __kasan_slab_alloc+0xa8/0xac
[  106.984293]  kmem_cache_alloc+0x194/0x3b0
[  106.985035]  kmem_cache_create_usercopy+0x14c/0x280
[  106.985815]  kmem_cache_create+0x24/0x30
[  106.986443]  kmem_cache_double_destroy+0xa4/0x1d0
[  106.987236]  kunit_try_run_case+0x8c/0x124
[  106.987897]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.988805]  kthread+0x15c/0x170
[  106.989391]  ret_from_fork+0x10/0x20
[  106.989991] 
[  106.990285] Freed by task 245:
[  106.990760]  kasan_save_stack+0x3c/0x70
[  106.991381]  kasan_set_track+0x2c/0x40
[  106.991983]  kasan_save_free_info+0x38/0x5c
[  106.992731]  __kasan_slab_free+0x100/0x170
[  106.993313]  slab_free_freelist_hook+0xd8/0x1c0
[  106.993729]  kmem_cache_free+0x194/0x42c
[  106.994198]  slab_kmem_cache_release+0x38/0x50
[  106.994722]  kmem_cache_release+0x1c/0x2c
[  106.995103]  kobject_put+0x104/0x2c0
[  106.995453]  sysfs_slab_release+0x30/0x40
[  106.995840]  kmem_cache_destroy+0xd8/0x1a4
[  106.996227]  kmem_cache_double_destroy+0xc4/0x1d0
[  106.997224]  kunit_try_run_case+0x8c/0x124
[  106.997958]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.998738]  kthread+0x15c/0x170
[  106.999291]  ret_from_fork+0x10/0x20
[  106.999866] 
[  107.000141] The buggy address belongs to the object at ffff0000c6446780
[  107.000141]  which belongs to the cache kmem_cache of size 216
[  107.001725] The buggy address is located 0 bytes inside of
[  107.001725]  216-byte region [ffff0000c6446780, ffff0000c6446858)
[  107.003196] 
[  107.003474] The buggy address belongs to the physical page:
[  107.004154] page:0000000031a37b1f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106446
[  107.005389] head:0000000031a37b1f order:1 compound_mapcount:0 compound_pincount:0
[  107.006419] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  107.007394] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[  107.008353] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[  107.009380] page dumped because: kasan: bad access detected
[  107.010176] 
[  107.010459] Memory state around the buggy address:
[  107.010943]  ffff0000c6446680: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  107.011444]  ffff0000c6446700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.011970] >ffff0000c6446780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.012638]                    ^
[  107.013298]  ffff0000c6446800: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[  107.013973]  ffff0000c6446880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.014612] ==================================================================

[   76.684091] ==================================================================
[   76.685048] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144
[   76.685797] Read of size 1 at addr ffff0000c546a180 by task kunit_try_catch/161
[   76.686448] 
[   76.686692] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.687432] Hardware name: linux,dummy-virt (DT)
[   76.687846] Call trace:
[   76.688103]  dump_backtrace+0xf8/0x118
[   76.688806]  show_stack+0x18/0x24
[   76.689261]  __dump_stack+0x28/0x38
[   76.689672]  dump_stack_lvl+0x54/0x6c
[   76.690123]  print_address_description+0x7c/0x1ec
[   76.690660]  print_report+0x50/0x68
[   76.691695]  kasan_report+0xac/0x100
[   76.692163]  __kasan_check_byte+0x3c/0x54
[   76.692664]  kmem_cache_destroy+0x3c/0x14c
[   76.693144]  kmem_cache_double_destroy+0xa4/0x144
[   76.693679]  kunit_try_run_case+0x80/0x184
[   76.694146]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.694710]  kthread+0x16c/0x21c
[   76.695169]  ret_from_fork+0x10/0x20
[   76.695588] 
[   76.695794] Allocated by task 161:
[   76.696176]  kasan_set_track+0x4c/0x80
[   76.697296]  kasan_save_alloc_info+0x28/0x34
[   76.697772]  __kasan_slab_alloc+0x58/0x70
[   76.698242]  slab_post_alloc_hook+0x70/0x2f4
[   76.698716]  kmem_cache_alloc+0x168/0x260
[   76.699201]  kmem_cache_create_usercopy+0x108/0x29c
[   76.699732]  kmem_cache_create+0x1c/0x28
[   76.700178]  kmem_cache_double_destroy+0x48/0x144
[   76.700691]  kunit_try_run_case+0x80/0x184
[   76.701158]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.701715]  kthread+0x16c/0x21c
[   76.702161]  ret_from_fork+0x10/0x20
[   76.702552] 
[   76.702770] Freed by task 161:
[   76.703112]  kasan_set_track+0x4c/0x80
[   76.703588]  kasan_save_free_info+0x3c/0x60
[   76.704054]  ____kasan_slab_free+0xe8/0x140
[   76.704547]  __kasan_slab_free+0x18/0x28
[   76.705623]  kmem_cache_free+0xe0/0x358
[   76.706117]  slab_kmem_cache_release+0x30/0x40
[   76.706616]  kmem_cache_release+0x14/0x20
[   76.707130]  kobject_put+0xd8/0x140
[   76.707573]  sysfs_slab_release+0x28/0x34
[   76.708088]  kmem_cache_destroy+0x148/0x14c
[   76.708550]  kmem_cache_double_destroy+0x90/0x144
[   76.709064]  kunit_try_run_case+0x80/0x184
[   76.709559]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.710152]  kthread+0x16c/0x21c
[   76.710593]  ret_from_fork+0x10/0x20
[   76.711084] 
[   76.711291] The buggy address belongs to the object at ffff0000c546a180
[   76.711291]  which belongs to the cache kmem_cache of size 216
[   76.712220] The buggy address is located 0 bytes inside of
[   76.712220]  216-byte region [ffff0000c546a180, ffff0000c546a258)
[   76.713902] 
[   76.714126] The buggy address belongs to the physical page:
[   76.714593] page:000000005b065639 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10546a
[   76.715397] head:000000005b065639 order:1 compound_mapcount:0 compound_pincount:0
[   76.716117] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   76.716859] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   76.717542] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   76.718151] page dumped because: kasan: bad access detected
[   76.718642] 
[   76.718846] Memory state around the buggy address:
[   76.719324]  ffff0000c546a080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   76.719987]  ffff0000c546a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.720629] >ffff0000c546a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.721743]                    ^
[   76.722099]  ffff0000c546a200: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   76.722743]  ffff0000c546a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.723371] ==================================================================

[   75.792417] ==================================================================
[   75.793732] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144
[   75.794496] Read of size 1 at addr ffff0000c159ed80 by task kunit_try_catch/161
[   75.795134] 
[   75.795379] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.797193] Hardware name: linux,dummy-virt (DT)
[   75.797570] Call trace:
[   75.797824]  dump_backtrace+0xf4/0x114
[   75.798602]  show_stack+0x18/0x24
[   75.799037]  __dump_stack+0x28/0x38
[   75.799430]  dump_stack_lvl+0x50/0x68
[   75.800230]  print_address_description+0x7c/0x1ec
[   75.801191]  print_report+0x50/0x68
[   75.802015]  kasan_report+0xac/0xfc
[   75.802798]  __kasan_check_byte+0x3c/0x54
[   75.803609]  kmem_cache_destroy+0x3c/0x14c
[   75.804469]  kmem_cache_double_destroy+0xa4/0x144
[   75.805180]  kunit_try_run_case+0x80/0x184
[   75.805617]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.806325]  kthread+0x16c/0x21c
[   75.806825]  ret_from_fork+0x10/0x20
[   75.807303] 
[   75.807566] Allocated by task 161:
[   75.807997]  kasan_set_track+0x4c/0x80
[   75.808544]  kasan_save_alloc_info+0x28/0x34
[   75.809049]  __kasan_slab_alloc+0x58/0x70
[   75.809554]  slab_post_alloc_hook+0x70/0x2e8
[   75.810032]  kmem_cache_alloc+0x164/0x254
[   75.810549]  kmem_cache_create_usercopy+0x108/0x2a0
[   75.811065]  kmem_cache_create+0x1c/0x28
[   75.811495]  kmem_cache_double_destroy+0x48/0x144
[   75.812071]  kunit_try_run_case+0x80/0x184
[   75.812639]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.813313]  kthread+0x16c/0x21c
[   75.813748]  ret_from_fork+0x10/0x20
[   75.814166] 
[   75.814404] Freed by task 161:
[   75.814758]  kasan_set_track+0x4c/0x80
[   75.815261]  kasan_save_free_info+0x3c/0x60
[   75.815759]  ____kasan_slab_free+0xe8/0x140
[   75.816418]  __kasan_slab_free+0x18/0x28
[   75.816926]  kmem_cache_free+0xe0/0x34c
[   75.817406]  slab_kmem_cache_release+0x30/0x40
[   75.817888]  kmem_cache_release+0x14/0x20
[   75.818379]  kobject_put+0xd8/0x13c
[   75.818788]  sysfs_slab_release+0x28/0x34
[   75.819232]  kmem_cache_destroy+0x148/0x14c
[   75.819883]  kmem_cache_double_destroy+0x90/0x144
[   75.820389]  kunit_try_run_case+0x80/0x184
[   75.820873]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.821437]  kthread+0x16c/0x21c
[   75.821884]  ret_from_fork+0x10/0x20
[   75.822308] 
[   75.822511] The buggy address belongs to the object at ffff0000c159ed80
[   75.822511]  which belongs to the cache kmem_cache of size 216
[   75.823460] The buggy address is located 0 bytes inside of
[   75.823460]  216-byte region [ffff0000c159ed80, ffff0000c159ee58)
[   75.824508] 
[   75.824761] The buggy address belongs to the physical page:
[   75.825260] page:00000000acb072d7 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10159e
[   75.826064] head:00000000acb072d7 order:1 compound_mapcount:0 compound_pincount:0
[   75.826707] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.827486] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   75.828372] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   75.829028] page dumped because: kasan: bad access detected
[   75.829519] 
[   75.829711] Memory state around the buggy address:
[   75.830168]  ffff0000c159ec80: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   75.830812]  ffff0000c159ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.831432] >ffff0000c159ed80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.832513]                    ^
[   75.832914]  ffff0000c159ee00: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   75.833556]  ffff0000c159ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.834167] ==================================================================

[   74.375684] ==================================================================
[   74.376904] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xcc/0x1d0
[   74.378988] Read of size 1 at addr ffff0000c15bb500 by task kunit_try_catch/161
[   74.380211] 
[   74.380797] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.381903] Hardware name: linux,dummy-virt (DT)
[   74.382732] Call trace:
[   74.382976]  dump_backtrace.part.0+0xdc/0xf0
[   74.383425]  show_stack+0x18/0x30
[   74.383799]  dump_stack_lvl+0x64/0x80
[   74.384152]  print_report+0x158/0x438
[   74.385101]  kasan_report+0xb4/0xf4
[   74.385792]  __kasan_check_byte+0x54/0x70
[   74.386633]  kmem_cache_destroy+0xf0/0x194
[   74.387508]  kmem_cache_double_destroy+0xcc/0x1d0
[   74.388477]  kunit_try_run_case+0x84/0x120
[   74.389348]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.390390]  kthread+0x180/0x190
[   74.391143]  ret_from_fork+0x10/0x20
[   74.391902] 
[   74.392341] Allocated by task 161:
[   74.393011]  kasan_save_stack+0x3c/0x70
[   74.393830]  kasan_set_track+0x2c/0x40
[   74.394634]  kasan_save_alloc_info+0x24/0x34
[   74.395502]  __kasan_slab_alloc+0x8c/0x90
[   74.396360]  kmem_cache_alloc+0x170/0x2c4
[   74.397243]  kmem_cache_create_usercopy+0x144/0x26c
[   74.398218]  kmem_cache_create+0x1c/0x30
[   74.399071]  kmem_cache_double_destroy+0x9c/0x1d0
[   74.400017]  kunit_try_run_case+0x84/0x120
[   74.400841]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.401791]  kthread+0x180/0x190
[   74.402421]  ret_from_fork+0x10/0x20
[   74.402772] 
[   74.402942] Freed by task 161:
[   74.403190]  kasan_save_stack+0x3c/0x70
[   74.404097]  kasan_set_track+0x2c/0x40
[   74.404827]  kasan_save_free_info+0x38/0x5c
[   74.405735]  __kasan_slab_free+0xe4/0x150
[   74.406595]  kmem_cache_free+0x1b8/0x38c
[   74.407463]  slab_kmem_cache_release+0x30/0x40
[   74.408352]  kmem_cache_release+0x14/0x20
[   74.409198]  kobject_put+0xe0/0x170
[   74.409850]  sysfs_slab_release+0x28/0x34
[   74.410631]  kmem_cache_destroy+0xc8/0x194
[   74.411369]  kmem_cache_double_destroy+0xbc/0x1d0
[   74.412371]  kunit_try_run_case+0x84/0x120
[   74.413089]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.413802]  kthread+0x180/0x190
[   74.414135]  ret_from_fork+0x10/0x20
[   74.414871] 
[   74.415347] The buggy address belongs to the object at ffff0000c15bb500
[   74.415347]  which belongs to the cache kmem_cache of size 216
[   74.417180] The buggy address is located 0 bytes inside of
[   74.417180]  216-byte region [ffff0000c15bb500, ffff0000c15bb5d8)
[   74.418826] 
[   74.419290] The buggy address belongs to the physical page:
[   74.420140] page:000000002d0224d4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015ba
[   74.421229] head:000000002d0224d4 order:1 compound_mapcount:0 compound_pincount:0
[   74.421714] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.422275] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   74.423317] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   74.424218] page dumped because: kasan: bad access detected
[   74.424791] 
[   74.425206] Memory state around the buggy address:
[   74.425875]  ffff0000c15bb400: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   74.426632]  ffff0000c15bb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.427220] >ffff0000c15bb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.427885]                    ^
[   74.428359]  ffff0000c15bb580: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   74.429037]  ffff0000c15bb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.429488] ==================================================================

[   65.839426] ==================================================================
[   65.840149] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xe0/0x1c8
[   65.841293] Read of size 1 at addr ffff0000c59c6480 by task kunit_try_catch/159
[   65.842184] 
[   65.842525] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.843553] Hardware name: linux,dummy-virt (DT)
[   65.844163] Call trace:
[   65.844556]  dump_backtrace+0x110/0x120
[   65.845044]  show_stack+0x18/0x28
[   65.845393]  dump_stack_lvl+0x68/0x84
[   65.845740]  print_report+0x158/0x484
[   65.846046]  kasan_report+0x98/0xe0
[   65.846575]  __kasan_check_byte+0x58/0x70
[   65.847168]  kmem_cache_destroy+0x34/0x178
[   65.847799]  kmem_cache_double_destroy+0xe0/0x1c8
[   65.848501]  kunit_try_run_case+0x7c/0x120
[   65.849127]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.849918]  kthread+0x1a4/0x1b8
[   65.850430]  ret_from_fork+0x10/0x20
[   65.850975] 
[   65.851219] Allocated by task 159:
[   65.851731]  kasan_save_stack+0x2c/0x58
[   65.852305]  kasan_set_track+0x2c/0x40
[   65.852838]  kasan_save_alloc_info+0x24/0x38
[   65.853462]  __kasan_slab_alloc+0x74/0x90
[   65.854032]  slab_post_alloc_hook+0x6c/0x260
[   65.854667]  kmem_cache_alloc+0x164/0x270
[   65.855279]  kmem_cache_create_usercopy+0x1ac/0x2c0
[   65.855945]  kmem_cache_create+0x1c/0x28
[   65.856524]  kmem_cache_double_destroy+0xac/0x1c8
[   65.857195]  kunit_try_run_case+0x7c/0x120
[   65.857814]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.858503]  kthread+0x1a4/0x1b8
[   65.858803]  ret_from_fork+0x10/0x20
[   65.859107] 
[   65.859303] Freed by task 159:
[   65.859753]  kasan_save_stack+0x2c/0x58
[   65.860323]  kasan_set_track+0x2c/0x40
[   65.860859]  kasan_save_free_info+0x38/0x60
[   65.861471]  __kasan_slab_free+0xe8/0x158
[   65.862033]  kmem_cache_free+0x1b0/0x3a0
[   65.862631]  slab_kmem_cache_release+0x30/0x40
[   65.863265]  kmem_cache_release+0x14/0x20
[   65.863870]  kobject_put+0xe0/0x188
[   65.864416]  sysfs_slab_release+0x28/0x38
[   65.864981]  kmem_cache_destroy+0xe0/0x178
[   65.865565]  kmem_cache_double_destroy+0xcc/0x1c8
[   65.866257]  kunit_try_run_case+0x7c/0x120
[   65.866699]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.867120]  kthread+0x1a4/0x1b8
[   65.867416]  ret_from_fork+0x10/0x20
[   65.867719] 
[   65.867880] The buggy address belongs to the object at ffff0000c59c6480
[   65.867880]  which belongs to the cache kmem_cache of size 216
[   65.868908] The buggy address is located 0 bytes inside of
[   65.868908]  216-byte region [ffff0000c59c6480, ffff0000c59c6558)
[   65.870193] 
[   65.870463] The buggy address belongs to the physical page:
[   65.871136] page:00000000e765158c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c6
[   65.872189] head:00000000e765158c order:1 compound_mapcount:0 compound_pincount:0
[   65.873044] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   65.873991] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   65.874897] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   65.875764] page dumped because: kasan: bad access detected
[   65.876433] 
[   65.876697] Memory state around the buggy address:
[   65.877311]  ffff0000c59c6380: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   65.878166]  ffff0000c59c6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.879007] >ffff0000c59c6480: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.879828]                    ^
[   65.880188]  ffff0000c59c6500: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   65.880636]  ffff0000c59c6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.881048] ==================================================================

[   31.990770] ==================================================================
[   31.991392] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xc2/0x1b0
[   31.992758] Read of size 1 at addr ffff888101a45500 by task kunit_try_catch/265
[   31.994082] 
[   31.994348] CPU: 1 PID: 265 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.994741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.995049] Call Trace:
[   31.995185]  <TASK>
[   31.995334]  dump_stack_lvl+0x49/0x62
[   31.995582]  print_report+0x189/0x492
[   31.995789]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.996081]  ? kmem_cache_double_destroy+0xc2/0x1b0
[   31.996913]  kasan_report+0x10c/0x190
[   31.997237]  ? kmem_cache_double_destroy+0xc2/0x1b0
[   31.997578]  ? kmem_cache_double_destroy+0xc2/0x1b0
[   31.997882]  __kasan_check_byte+0x39/0x50
[   31.998206]  kmem_cache_destroy+0x21/0x170
[   31.998436]  kmem_cache_double_destroy+0xc2/0x1b0
[   31.998790]  ? kasan_memchr+0x1e0/0x1e0
[   31.999099]  ? __kunit_add_resource+0xd1/0x100
[   31.999342]  ? kasan_test_init+0x13e/0x1b0
[   31.999716]  kunit_try_run_case+0x8f/0xd0
[   32.000249]  ? kunit_catch_run_case+0x80/0x80
[   32.000624]  ? kunit_try_catch_throw+0x40/0x40
[   32.000981]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.001343]  kthread+0x17b/0x1b0
[   32.001774]  ? kthread_complete_and_exit+0x30/0x30
[   32.002108]  ret_from_fork+0x22/0x30
[   32.002458]  </TASK>
[   32.002595] 
[   32.002706] Allocated by task 265:
[   32.002899]  kasan_save_stack+0x41/0x70
[   32.003184]  kasan_set_track+0x25/0x40
[   32.003401]  kasan_save_alloc_info+0x1e/0x30
[   32.003681]  __kasan_slab_alloc+0x90/0xa0
[   32.004095]  kmem_cache_alloc+0x150/0x370
[   32.004405]  kmem_cache_create_usercopy+0x120/0x290
[   32.004609]  kmem_cache_create+0x16/0x20
[   32.004836]  kmem_cache_double_destroy+0x93/0x1b0
[   32.005284]  kunit_try_run_case+0x8f/0xd0
[   32.005673]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.006026]  kthread+0x17b/0x1b0
[   32.006299]  ret_from_fork+0x22/0x30
[   32.006908] 
[   32.007118] Freed by task 265:
[   32.007398]  kasan_save_stack+0x41/0x70
[   32.007834]  kasan_set_track+0x25/0x40
[   32.008019]  kasan_save_free_info+0x2e/0x50
[   32.008214]  ____kasan_slab_free+0x175/0x1d0
[   32.008671]  __kasan_slab_free+0x12/0x20
[   32.009142]  kmem_cache_free+0x19c/0x4a0
[   32.009734]  slab_kmem_cache_release+0x2a/0x40
[   32.010235]  kmem_cache_release+0x12/0x20
[   32.010934]  kobject_put+0xf2/0x250
[   32.011412]  sysfs_slab_release+0x20/0x30
[   32.011925]  kmem_cache_destroy+0xce/0x170
[   32.012326]  kmem_cache_double_destroy+0xab/0x1b0
[   32.012787]  kunit_try_run_case+0x8f/0xd0
[   32.012983]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.013232]  kthread+0x17b/0x1b0
[   32.013449]  ret_from_fork+0x22/0x30
[   32.013817] 
[   32.013939] The buggy address belongs to the object at ffff888101a45500
[   32.013939]  which belongs to the cache kmem_cache of size 216
[   32.015409] The buggy address is located 0 bytes inside of
[   32.015409]  216-byte region [ffff888101a45500, ffff888101a455d8)
[   32.016068] 
[   32.016188] The buggy address belongs to the physical page:
[   32.016628] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a45
[   32.017152] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.017719] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041000
[   32.018089] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000
[   32.018663] page dumped because: kasan: bad access detected
[   32.019030] 
[   32.019155] Memory state around the buggy address:
[   32.019583]  ffff888101a45400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.020251]  ffff888101a45480: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.020853] >ffff888101a45500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.021371]                    ^
[   32.021746]  ffff888101a45580: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   32.022210]  ffff888101a45600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.022764] ==================================================================