Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.224275] ==================================================================
[   19.224359] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.224441] Read of size 1 at addr fff00000c664e000 by task kunit_try_catch/217
[   19.224495] 
[   19.224539] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.224626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.224653] Hardware name: linux,dummy-virt (DT)
[   19.224690] Call trace:
[   19.224714]  show_stack+0x20/0x38 (C)
[   19.224765]  dump_stack_lvl+0x8c/0xd0
[   19.224819]  print_report+0x118/0x5d0
[   19.224863]  kasan_report+0xdc/0x128
[   19.224908]  __kasan_check_byte+0x54/0x70
[   19.224954]  kmem_cache_destroy+0x34/0x218
[   19.225001]  kmem_cache_double_destroy+0x174/0x300
[   19.225054]  kunit_try_run_case+0x170/0x3f0
[   19.225106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.225159]  kthread+0x328/0x630
[   19.225219]  ret_from_fork+0x10/0x20
[   19.225268] 
[   19.225286] Allocated by task 217:
[   19.225317]  kasan_save_stack+0x3c/0x68
[   19.225360]  kasan_save_track+0x20/0x40
[   19.225396]  kasan_save_alloc_info+0x40/0x58
[   19.225436]  __kasan_slab_alloc+0xa8/0xb0
[   19.225473]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.225512]  __kmem_cache_create_args+0x178/0x280
[   19.225551]  kmem_cache_double_destroy+0xc0/0x300
[   19.225594]  kunit_try_run_case+0x170/0x3f0
[   19.225634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.225678]  kthread+0x328/0x630
[   19.225714]  ret_from_fork+0x10/0x20
[   19.225748] 
[   19.225767] Freed by task 217:
[   19.225793]  kasan_save_stack+0x3c/0x68
[   19.225829]  kasan_save_track+0x20/0x40
[   19.225864]  kasan_save_free_info+0x4c/0x78
[   19.225903]  __kasan_slab_free+0x6c/0x98
[   19.225940]  kmem_cache_free+0x260/0x468
[   19.225974]  slab_kmem_cache_release+0x38/0x50
[   19.226014]  kmem_cache_release+0x1c/0x30
[   19.226054]  kobject_put+0x17c/0x420
[   19.226091]  sysfs_slab_release+0x1c/0x30
[   19.226129]  kmem_cache_destroy+0x118/0x218
[   19.226165]  kmem_cache_double_destroy+0x128/0x300
[   19.226221]  kunit_try_run_case+0x170/0x3f0
[   19.226260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226305]  kthread+0x328/0x630
[   19.226341]  ret_from_fork+0x10/0x20
[   19.226375] 
[   19.226396] The buggy address belongs to the object at fff00000c664e000
[   19.226396]  which belongs to the cache kmem_cache of size 208
[   19.226458] The buggy address is located 0 bytes inside of
[   19.226458]  freed 208-byte region [fff00000c664e000, fff00000c664e0d0)
[   19.226522] 
[   19.226545] The buggy address belongs to the physical page:
[   19.226580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664e
[   19.226636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.226691] page_type: f5(slab)
[   19.226732] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.226785] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.226828] page dumped because: kasan: bad access detected
[   19.226860] 
[   19.226878] Memory state around the buggy address:
[   19.226911]  fff00000c664df00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   19.226956]  fff00000c664df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.227000] >fff00000c664e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.227039]                    ^
[   19.227066]  fff00000c664e080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.227110]  fff00000c664e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.227151] ==================================================================

[   11.842434] ==================================================================
[   11.843120] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   11.843378] Read of size 1 at addr ffff8881011f73c0 by task kunit_try_catch/234
[   11.843598] 
[   11.843686] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   11.843732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.843744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.843765] Call Trace:
[   11.843777]  <TASK>
[   11.843794]  dump_stack_lvl+0x73/0xb0
[   11.843820]  print_report+0xd1/0x610
[   11.843843]  ? __virt_addr_valid+0x1db/0x2d0
[   11.843864]  ? kmem_cache_double_destroy+0x1bf/0x380
[   11.843896]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.843918]  ? kmem_cache_double_destroy+0x1bf/0x380
[   11.843950]  kasan_report+0x141/0x180
[   11.843972]  ? kmem_cache_double_destroy+0x1bf/0x380
[   11.843995]  ? kmem_cache_double_destroy+0x1bf/0x380
[   11.844015]  __kasan_check_byte+0x3d/0x50
[   11.844037]  kmem_cache_destroy+0x25/0x1d0
[   11.844060]  kmem_cache_double_destroy+0x1bf/0x380
[   11.844081]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   11.844100]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   11.844126]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   11.844151]  kunit_try_run_case+0x1a5/0x480
[   11.844171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.844188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.844213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.844236]  ? __kthread_parkme+0x82/0x180
[   11.844257]  ? preempt_count_sub+0x50/0x80
[   11.844319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.844340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.844363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.844385]  kthread+0x337/0x6f0
[   11.844401]  ? trace_preempt_on+0x20/0xc0
[   11.844425]  ? __pfx_kthread+0x10/0x10
[   11.844441]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.844463]  ? calculate_sigpending+0x7b/0xa0
[   11.844485]  ? __pfx_kthread+0x10/0x10
[   11.844502]  ret_from_fork+0x41/0x80
[   11.844523]  ? __pfx_kthread+0x10/0x10
[   11.844540]  ret_from_fork_asm+0x1a/0x30
[   11.844570]  </TASK>
[   11.844581] 
[   11.857398] Allocated by task 234:
[   11.857542]  kasan_save_stack+0x45/0x70
[   11.857781]  kasan_save_track+0x18/0x40
[   11.858348]  kasan_save_alloc_info+0x3b/0x50
[   11.858589]  __kasan_slab_alloc+0x91/0xa0
[   11.858742]  kmem_cache_alloc_noprof+0x123/0x3f0
[   11.859125]  __kmem_cache_create_args+0x169/0x240
[   11.859356]  kmem_cache_double_destroy+0xd5/0x380
[   11.859572]  kunit_try_run_case+0x1a5/0x480
[   11.859768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.860114]  kthread+0x337/0x6f0
[   11.860273]  ret_from_fork+0x41/0x80
[   11.860457]  ret_from_fork_asm+0x1a/0x30
[   11.860666] 
[   11.860759] Freed by task 234:
[   11.860931]  kasan_save_stack+0x45/0x70
[   11.861072]  kasan_save_track+0x18/0x40
[   11.861224]  kasan_save_free_info+0x3f/0x60
[   11.861422]  __kasan_slab_free+0x56/0x70
[   11.861607]  kmem_cache_free+0x249/0x420
[   11.861739]  slab_kmem_cache_release+0x2e/0x40
[   11.862210]  kmem_cache_release+0x16/0x20
[   11.862442]  kobject_put+0x181/0x450
[   11.862576]  sysfs_slab_release+0x16/0x20
[   11.862712]  kmem_cache_destroy+0xf0/0x1d0
[   11.862869]  kmem_cache_double_destroy+0x14e/0x380
[   11.863201]  kunit_try_run_case+0x1a5/0x480
[   11.863518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.863866]  kthread+0x337/0x6f0
[   11.863998]  ret_from_fork+0x41/0x80
[   11.864127]  ret_from_fork_asm+0x1a/0x30
[   11.864347] 
[   11.864442] The buggy address belongs to the object at ffff8881011f73c0
[   11.864442]  which belongs to the cache kmem_cache of size 208
[   11.865013] The buggy address is located 0 bytes inside of
[   11.865013]  freed 208-byte region [ffff8881011f73c0, ffff8881011f7490)
[   11.865626] 
[   11.865724] The buggy address belongs to the physical page:
[   11.865982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1011f7
[   11.866486] flags: 0x200000000000000(node=0|zone=2)
[   11.866714] page_type: f5(slab)
[   11.867077] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   11.867440] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   11.867826] page dumped because: kasan: bad access detected
[   11.868031] 
[   11.868124] Memory state around the buggy address:
[   11.868320]  ffff8881011f7280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.868570]  ffff8881011f7300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   11.869120] >ffff8881011f7380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   11.869510]                                            ^
[   11.869896]  ffff8881011f7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.870201]  ffff8881011f7480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.870507] ==================================================================