Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.342554] ==================================================================
[   18.342669] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   18.342750] Read of size 1 at addr fff00000c19fbdc0 by task kunit_try_catch/215
[   18.342801] 
[   18.342859] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.342944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.342972] Hardware name: linux,dummy-virt (DT)
[   18.343005] Call trace:
[   18.343029]  show_stack+0x20/0x38 (C)
[   18.343081]  dump_stack_lvl+0x8c/0xd0
[   18.343131]  print_report+0x118/0x5d0
[   18.343179]  kasan_report+0xdc/0x128
[   18.343223]  __kasan_check_byte+0x54/0x70
[   18.343270]  kmem_cache_destroy+0x34/0x218
[   18.343362]  kmem_cache_double_destroy+0x174/0x300
[   18.343409]  kunit_try_run_case+0x170/0x3f0
[   18.343458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.343510]  kthread+0x328/0x630
[   18.343552]  ret_from_fork+0x10/0x20
[   18.343601] 
[   18.343621] Allocated by task 215:
[   18.343650]  kasan_save_stack+0x3c/0x68
[   18.343692]  kasan_save_track+0x20/0x40
[   18.343731]  kasan_save_alloc_info+0x40/0x58
[   18.343771]  __kasan_slab_alloc+0xa8/0xb0
[   18.343809]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.343860]  __kmem_cache_create_args+0x178/0x280
[   18.343901]  kmem_cache_double_destroy+0xc0/0x300
[   18.343940]  kunit_try_run_case+0x170/0x3f0
[   18.343978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.344021]  kthread+0x328/0x630
[   18.344052]  ret_from_fork+0x10/0x20
[   18.344089] 
[   18.344108] Freed by task 215:
[   18.344135]  kasan_save_stack+0x3c/0x68
[   18.344172]  kasan_save_track+0x20/0x40
[   18.344209]  kasan_save_free_info+0x4c/0x78
[   18.344249]  __kasan_slab_free+0x6c/0x98
[   18.344287]  kmem_cache_free+0x260/0x468
[   18.344324]  slab_kmem_cache_release+0x38/0x50
[   18.344363]  kmem_cache_release+0x1c/0x30
[   18.344399]  kobject_put+0x17c/0x420
[   18.344436]  sysfs_slab_release+0x1c/0x30
[   18.344474]  kmem_cache_destroy+0x118/0x218
[   18.344512]  kmem_cache_double_destroy+0x128/0x300
[   18.344551]  kunit_try_run_case+0x170/0x3f0
[   18.344588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.344631]  kthread+0x328/0x630
[   18.344663]  ret_from_fork+0x10/0x20
[   18.344699] 
[   18.344718] The buggy address belongs to the object at fff00000c19fbdc0
[   18.344718]  which belongs to the cache kmem_cache of size 208
[   18.344775] The buggy address is located 0 bytes inside of
[   18.344775]  freed 208-byte region [fff00000c19fbdc0, fff00000c19fbe90)
[   18.344834] 
[   18.344864] The buggy address belongs to the physical page:
[   18.344899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019fb
[   18.344954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.345005] page_type: f5(slab)
[   18.345046] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   18.345095] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   18.345136] page dumped because: kasan: bad access detected
[   18.345168] 
[   18.345186] Memory state around the buggy address:
[   18.345219]  fff00000c19fbc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.345261]  fff00000c19fbd00: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   18.345303] >fff00000c19fbd80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.345340]                                            ^
[   18.345374]  fff00000c19fbe00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.345415]  fff00000c19fbe80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.345454] ==================================================================

[   17.995434] ==================================================================
[   17.995516] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   17.995588] Read of size 1 at addr fff00000c598d640 by task kunit_try_catch/215
[   17.995640] 
[   17.995683] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.995769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995797] Hardware name: linux,dummy-virt (DT)
[   17.995830] Call trace:
[   17.995854]  show_stack+0x20/0x38 (C)
[   17.995910]  dump_stack_lvl+0x8c/0xd0
[   17.995962]  print_report+0x118/0x5d0
[   17.996009]  kasan_report+0xdc/0x128
[   17.996053]  __kasan_check_byte+0x54/0x70
[   17.996099]  kmem_cache_destroy+0x34/0x218
[   17.996147]  kmem_cache_double_destroy+0x174/0x300
[   17.996202]  kunit_try_run_case+0x170/0x3f0
[   17.996252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996304]  kthread+0x328/0x630
[   17.996360]  ret_from_fork+0x10/0x20
[   17.996408] 
[   17.996426] Allocated by task 215:
[   17.996457]  kasan_save_stack+0x3c/0x68
[   17.996526]  kasan_save_track+0x20/0x40
[   17.996565]  kasan_save_alloc_info+0x40/0x58
[   17.996604]  __kasan_slab_alloc+0xa8/0xb0
[   17.996643]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.996683]  __kmem_cache_create_args+0x178/0x280
[   17.996723]  kmem_cache_double_destroy+0xc0/0x300
[   17.996761]  kunit_try_run_case+0x170/0x3f0
[   17.996799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996840]  kthread+0x328/0x630
[   17.996873]  ret_from_fork+0x10/0x20
[   17.996908] 
[   17.996927] Freed by task 215:
[   17.996954]  kasan_save_stack+0x3c/0x68
[   17.996990]  kasan_save_track+0x20/0x40
[   17.997027]  kasan_save_free_info+0x4c/0x78
[   17.997065]  __kasan_slab_free+0x6c/0x98
[   17.997103]  kmem_cache_free+0x260/0x468
[   17.997138]  slab_kmem_cache_release+0x38/0x50
[   17.997178]  kmem_cache_release+0x1c/0x30
[   17.997215]  kobject_put+0x17c/0x420
[   17.997249]  sysfs_slab_release+0x1c/0x30
[   17.997287]  kmem_cache_destroy+0x118/0x218
[   17.997333]  kmem_cache_double_destroy+0x128/0x300
[   17.997373]  kunit_try_run_case+0x170/0x3f0
[   17.997409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.997452]  kthread+0x328/0x630
[   17.997485]  ret_from_fork+0x10/0x20
[   17.997520] 
[   17.997539] The buggy address belongs to the object at fff00000c598d640
[   17.997539]  which belongs to the cache kmem_cache of size 208
[   17.997595] The buggy address is located 0 bytes inside of
[   17.997595]  freed 208-byte region [fff00000c598d640, fff00000c598d710)
[   17.997654] 
[   17.997677] The buggy address belongs to the physical page:
[   17.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598d
[   17.997763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.997815] page_type: f5(slab)
[   17.997857] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   17.997909] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   17.997950] page dumped because: kasan: bad access detected
[   17.997983] 
[   17.998000] Memory state around the buggy address:
[   17.998035]  fff00000c598d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.998078]  fff00000c598d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   17.998121] >fff00000c598d600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   17.998159]                                            ^
[   17.998193]  fff00000c598d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.998236]  fff00000c598d700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.998275] ==================================================================

[   17.965555] ==================================================================
[   17.965632] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   17.965709] Read of size 1 at addr fff00000c56bda00 by task kunit_try_catch/215
[   17.966064] 
[   17.966939] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.967057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.967138] Hardware name: linux,dummy-virt (DT)
[   17.967379] Call trace:
[   17.967488]  show_stack+0x20/0x38 (C)
[   17.967590]  dump_stack_lvl+0x8c/0xd0
[   17.967673]  print_report+0x118/0x5d0
[   17.967730]  kasan_report+0xdc/0x128
[   17.967776]  __kasan_check_byte+0x54/0x70
[   17.967848]  kmem_cache_destroy+0x34/0x218
[   17.967897]  kmem_cache_double_destroy+0x174/0x300
[   17.968144]  kunit_try_run_case+0x170/0x3f0
[   17.968678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.968861]  kthread+0x328/0x630
[   17.968912]  ret_from_fork+0x10/0x20
[   17.969384] 
[   17.969411] Allocated by task 215:
[   17.969627]  kasan_save_stack+0x3c/0x68
[   17.969723]  kasan_save_track+0x20/0x40
[   17.969882]  kasan_save_alloc_info+0x40/0x58
[   17.970000]  __kasan_slab_alloc+0xa8/0xb0
[   17.970068]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.970111]  __kmem_cache_create_args+0x178/0x280
[   17.970314]  kmem_cache_double_destroy+0xc0/0x300
[   17.970415]  kunit_try_run_case+0x170/0x3f0
[   17.970589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.970707]  kthread+0x328/0x630
[   17.970775]  ret_from_fork+0x10/0x20
[   17.970995] 
[   17.971097] Freed by task 215:
[   17.971208]  kasan_save_stack+0x3c/0x68
[   17.971254]  kasan_save_track+0x20/0x40
[   17.971299]  kasan_save_free_info+0x4c/0x78
[   17.971502]  __kasan_slab_free+0x6c/0x98
[   17.971596]  kmem_cache_free+0x260/0x468
[   17.971661]  slab_kmem_cache_release+0x38/0x50
[   17.971941]  kmem_cache_release+0x1c/0x30
[   17.971992]  kobject_put+0x17c/0x420
[   17.972214]  sysfs_slab_release+0x1c/0x30
[   17.972366]  kmem_cache_destroy+0x118/0x218
[   17.972548]  kmem_cache_double_destroy+0x128/0x300
[   17.972741]  kunit_try_run_case+0x170/0x3f0
[   17.972962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.973042]  kthread+0x328/0x630
[   17.973083]  ret_from_fork+0x10/0x20
[   17.973120] 
[   17.973180] The buggy address belongs to the object at fff00000c56bda00
[   17.973180]  which belongs to the cache kmem_cache of size 208
[   17.973264] The buggy address is located 0 bytes inside of
[   17.973264]  freed 208-byte region [fff00000c56bda00, fff00000c56bdad0)
[   17.973329] 
[   17.973352] The buggy address belongs to the physical page:
[   17.973386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056bd
[   17.973451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.973504] page_type: f5(slab)
[   17.973547] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   17.973608] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   17.973650] page dumped because: kasan: bad access detected
[   17.973683] 
[   17.973702] Memory state around the buggy address:
[   17.973749]  fff00000c56bd900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.973802]  fff00000c56bd980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.973854] >fff00000c56bda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.973902]                    ^
[   17.973930]  fff00000c56bda80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   17.973980]  fff00000c56bdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.974024] ==================================================================

[   13.074215] ==================================================================
[   13.074868] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   13.075356] Read of size 1 at addr ffff888100fb8a00 by task kunit_try_catch/232
[   13.075698] 
[   13.076505] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.076612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.076629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.076668] Call Trace:
[   13.076682]  <TASK>
[   13.076702]  dump_stack_lvl+0x73/0xb0
[   13.076740]  print_report+0xd1/0x610
[   13.076766]  ? __virt_addr_valid+0x1db/0x2d0
[   13.076795]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.076826]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.076855]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.076886]  kasan_report+0x141/0x180
[   13.076923]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.076957]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.077008]  __kasan_check_byte+0x3d/0x50
[   13.077034]  kmem_cache_destroy+0x25/0x1d0
[   13.077062]  kmem_cache_double_destroy+0x1bf/0x380
[   13.077093]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   13.077123]  ? finish_task_switch.isra.0+0x153/0x700
[   13.077152]  ? __switch_to+0x47/0xf50
[   13.077186]  ? __pfx_read_tsc+0x10/0x10
[   13.077210]  ? ktime_get_ts64+0x86/0x230
[   13.077239]  kunit_try_run_case+0x1a5/0x480
[   13.077270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.077298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.077329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.077358]  ? __kthread_parkme+0x82/0x180
[   13.077383]  ? preempt_count_sub+0x50/0x80
[   13.077409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.077438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.077468]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.077500]  kthread+0x337/0x6f0
[   13.077539]  ? trace_preempt_on+0x20/0xc0
[   13.077568]  ? __pfx_kthread+0x10/0x10
[   13.077592]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.077617]  ? calculate_sigpending+0x7b/0xa0
[   13.077645]  ? __pfx_kthread+0x10/0x10
[   13.077669]  ret_from_fork+0x116/0x1d0
[   13.077691]  ? __pfx_kthread+0x10/0x10
[   13.077714]  ret_from_fork_asm+0x1a/0x30
[   13.077751]  </TASK>
[   13.077762] 
[   13.090231] Allocated by task 232:
[   13.090423]  kasan_save_stack+0x45/0x70
[   13.090630]  kasan_save_track+0x18/0x40
[   13.090823]  kasan_save_alloc_info+0x3b/0x50
[   13.091588]  __kasan_slab_alloc+0x91/0xa0
[   13.091827]  kmem_cache_alloc_noprof+0x123/0x3f0
[   13.092321]  __kmem_cache_create_args+0x169/0x240
[   13.092760]  kmem_cache_double_destroy+0xd5/0x380
[   13.093198]  kunit_try_run_case+0x1a5/0x480
[   13.093593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.094040]  kthread+0x337/0x6f0
[   13.094211]  ret_from_fork+0x116/0x1d0
[   13.094361]  ret_from_fork_asm+0x1a/0x30
[   13.094801] 
[   13.094878] Freed by task 232:
[   13.095298]  kasan_save_stack+0x45/0x70
[   13.095481]  kasan_save_track+0x18/0x40
[   13.095945]  kasan_save_free_info+0x3f/0x60
[   13.096280]  __kasan_slab_free+0x56/0x70
[   13.096634]  kmem_cache_free+0x249/0x420
[   13.096814]  slab_kmem_cache_release+0x2e/0x40
[   13.097298]  kmem_cache_release+0x16/0x20
[   13.097651]  kobject_put+0x181/0x450
[   13.097847]  sysfs_slab_release+0x16/0x20
[   13.098187]  kmem_cache_destroy+0xf0/0x1d0
[   13.098387]  kmem_cache_double_destroy+0x14e/0x380
[   13.098929]  kunit_try_run_case+0x1a5/0x480
[   13.099355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.099718]  kthread+0x337/0x6f0
[   13.100138]  ret_from_fork+0x116/0x1d0
[   13.100469]  ret_from_fork_asm+0x1a/0x30
[   13.100801] 
[   13.100917] The buggy address belongs to the object at ffff888100fb8a00
[   13.100917]  which belongs to the cache kmem_cache of size 208
[   13.101551] The buggy address is located 0 bytes inside of
[   13.101551]  freed 208-byte region [ffff888100fb8a00, ffff888100fb8ad0)
[   13.102027] 
[   13.102129] The buggy address belongs to the physical page:
[   13.102376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fb8
[   13.102690] flags: 0x200000000000000(node=0|zone=2)
[   13.103448] page_type: f5(slab)
[   13.103815] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   13.104316] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   13.104905] page dumped because: kasan: bad access detected
[   13.105312] 
[   13.105416] Memory state around the buggy address:
[   13.105907]  ffff888100fb8900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.106400]  ffff888100fb8980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.106991] >ffff888100fb8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.107426]                    ^
[   13.107745]  ffff888100fb8a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   13.108258]  ffff888100fb8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.108738] ==================================================================

[   12.896187] ==================================================================
[   12.897654] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   12.898693] Read of size 1 at addr ffff888101c3b3c0 by task kunit_try_catch/233
[   12.899293] 
[   12.899395] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.899465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.899476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.899531] Call Trace:
[   12.899545]  <TASK>
[   12.899563]  dump_stack_lvl+0x73/0xb0
[   12.899598]  print_report+0xd1/0x610
[   12.899778]  ? __virt_addr_valid+0x1db/0x2d0
[   12.899803]  ? kmem_cache_double_destroy+0x1bf/0x380
[   12.899916]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.899941]  ? kmem_cache_double_destroy+0x1bf/0x380
[   12.899967]  kasan_report+0x141/0x180
[   12.899989]  ? kmem_cache_double_destroy+0x1bf/0x380
[   12.900018]  ? kmem_cache_double_destroy+0x1bf/0x380
[   12.900043]  __kasan_check_byte+0x3d/0x50
[   12.900064]  kmem_cache_destroy+0x25/0x1d0
[   12.900089]  kmem_cache_double_destroy+0x1bf/0x380
[   12.900114]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   12.900138]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.900169]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   12.900199]  kunit_try_run_case+0x1a5/0x480
[   12.900225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.900246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.900273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.900300]  ? __kthread_parkme+0x82/0x180
[   12.900321]  ? preempt_count_sub+0x50/0x80
[   12.900347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.900370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.900394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.900451]  kthread+0x337/0x6f0
[   12.900470]  ? trace_preempt_on+0x20/0xc0
[   12.900494]  ? __pfx_kthread+0x10/0x10
[   12.900515]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.900537]  ? calculate_sigpending+0x7b/0xa0
[   12.900561]  ? __pfx_kthread+0x10/0x10
[   12.900584]  ret_from_fork+0x116/0x1d0
[   12.900604]  ? __pfx_kthread+0x10/0x10
[   12.900624]  ret_from_fork_asm+0x1a/0x30
[   12.900657]  </TASK>
[   12.900668] 
[   12.915113] Allocated by task 233:
[   12.915626]  kasan_save_stack+0x45/0x70
[   12.916054]  kasan_save_track+0x18/0x40
[   12.916476]  kasan_save_alloc_info+0x3b/0x50
[   12.916986]  __kasan_slab_alloc+0x91/0xa0
[   12.917354]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.917898]  __kmem_cache_create_args+0x169/0x240
[   12.918361]  kmem_cache_double_destroy+0xd5/0x380
[   12.918889]  kunit_try_run_case+0x1a5/0x480
[   12.919489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.919855]  kthread+0x337/0x6f0
[   12.919978]  ret_from_fork+0x116/0x1d0
[   12.920109]  ret_from_fork_asm+0x1a/0x30
[   12.920245] 
[   12.920314] Freed by task 233:
[   12.920508]  kasan_save_stack+0x45/0x70
[   12.920929]  kasan_save_track+0x18/0x40
[   12.921269]  kasan_save_free_info+0x3f/0x60
[   12.921837]  __kasan_slab_free+0x56/0x70
[   12.922312]  kmem_cache_free+0x249/0x420
[   12.922749]  slab_kmem_cache_release+0x2e/0x40
[   12.923423]  kmem_cache_release+0x16/0x20
[   12.923981]  kobject_put+0x181/0x450
[   12.924260]  sysfs_slab_release+0x16/0x20
[   12.924653]  kmem_cache_destroy+0xf0/0x1d0
[   12.924802]  kmem_cache_double_destroy+0x14e/0x380
[   12.924963]  kunit_try_run_case+0x1a5/0x480
[   12.925109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.925293]  kthread+0x337/0x6f0
[   12.925470]  ret_from_fork+0x116/0x1d0
[   12.925663]  ret_from_fork_asm+0x1a/0x30
[   12.925821] 
[   12.925896] The buggy address belongs to the object at ffff888101c3b3c0
[   12.925896]  which belongs to the cache kmem_cache of size 208
[   12.926515] The buggy address is located 0 bytes inside of
[   12.926515]  freed 208-byte region [ffff888101c3b3c0, ffff888101c3b490)
[   12.927571] 
[   12.927926] The buggy address belongs to the physical page:
[   12.928184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c3b
[   12.929095] flags: 0x200000000000000(node=0|zone=2)
[   12.929590] page_type: f5(slab)
[   12.929763] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   12.930081] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   12.930391] page dumped because: kasan: bad access detected
[   12.931106] 
[   12.931446] Memory state around the buggy address:
[   12.931781]  ffff888101c3b280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.932071]  ffff888101c3b300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   12.932365] >ffff888101c3b380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   12.933043]                                            ^
[   12.933591]  ffff888101c3b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.933885]  ffff888101c3b480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.934173] ==================================================================

[   13.099180] ==================================================================
[   13.099671] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   13.100039] Read of size 1 at addr ffff888100fa1dc0 by task kunit_try_catch/232
[   13.100876] 
[   13.101141] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.101197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.101209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.101233] Call Trace:
[   13.101246]  <TASK>
[   13.101332]  dump_stack_lvl+0x73/0xb0
[   13.101369]  print_report+0xd1/0x610
[   13.101395]  ? __virt_addr_valid+0x1db/0x2d0
[   13.101421]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.101446]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.101469]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.101494]  kasan_report+0x141/0x180
[   13.101516]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.101544]  ? kmem_cache_double_destroy+0x1bf/0x380
[   13.101569]  __kasan_check_byte+0x3d/0x50
[   13.101590]  kmem_cache_destroy+0x25/0x1d0
[   13.101614]  kmem_cache_double_destroy+0x1bf/0x380
[   13.101639]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   13.101665]  ? __kasan_check_write+0x18/0x20
[   13.101684]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.101709]  ? irqentry_exit+0x2a/0x60
[   13.101733]  ? trace_hardirqs_on+0x37/0xe0
[   13.101757]  ? __pfx_read_tsc+0x10/0x10
[   13.101778]  ? ktime_get_ts64+0x86/0x230
[   13.101804]  kunit_try_run_case+0x1a5/0x480
[   13.101830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.101854]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.101877]  ? __kthread_parkme+0x82/0x180
[   13.101899]  ? preempt_count_sub+0x50/0x80
[   13.101924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.101947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.101971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.101995]  kthread+0x337/0x6f0
[   13.102133]  ? trace_preempt_on+0x20/0xc0
[   13.102158]  ? __pfx_kthread+0x10/0x10
[   13.102178]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.102200]  ? calculate_sigpending+0x7b/0xa0
[   13.102226]  ? __pfx_kthread+0x10/0x10
[   13.102247]  ret_from_fork+0x116/0x1d0
[   13.102266]  ? __pfx_kthread+0x10/0x10
[   13.102286]  ret_from_fork_asm+0x1a/0x30
[   13.102317]  </TASK>
[   13.102329] 
[   13.114850] Allocated by task 232:
[   13.115259]  kasan_save_stack+0x45/0x70
[   13.115464]  kasan_save_track+0x18/0x40
[   13.115639]  kasan_save_alloc_info+0x3b/0x50
[   13.115836]  __kasan_slab_alloc+0x91/0xa0
[   13.116030]  kmem_cache_alloc_noprof+0x123/0x3f0
[   13.116734]  __kmem_cache_create_args+0x169/0x240
[   13.116940]  kmem_cache_double_destroy+0xd5/0x380
[   13.117432]  kunit_try_run_case+0x1a5/0x480
[   13.117669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.118150]  kthread+0x337/0x6f0
[   13.118404]  ret_from_fork+0x116/0x1d0
[   13.118550]  ret_from_fork_asm+0x1a/0x30
[   13.118749] 
[   13.118842] Freed by task 232:
[   13.118999]  kasan_save_stack+0x45/0x70
[   13.119551]  kasan_save_track+0x18/0x40
[   13.119724]  kasan_save_free_info+0x3f/0x60
[   13.120121]  __kasan_slab_free+0x56/0x70
[   13.120327]  kmem_cache_free+0x249/0x420
[   13.120639]  slab_kmem_cache_release+0x2e/0x40
[   13.120824]  kmem_cache_release+0x16/0x20
[   13.121153]  kobject_put+0x181/0x450
[   13.121331]  sysfs_slab_release+0x16/0x20
[   13.121947]  kmem_cache_destroy+0xf0/0x1d0
[   13.122122]  kmem_cache_double_destroy+0x14e/0x380
[   13.122690]  kunit_try_run_case+0x1a5/0x480
[   13.122886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.123340]  kthread+0x337/0x6f0
[   13.123515]  ret_from_fork+0x116/0x1d0
[   13.123838]  ret_from_fork_asm+0x1a/0x30
[   13.123987] 
[   13.124247] The buggy address belongs to the object at ffff888100fa1dc0
[   13.124247]  which belongs to the cache kmem_cache of size 208
[   13.124903] The buggy address is located 0 bytes inside of
[   13.124903]  freed 208-byte region [ffff888100fa1dc0, ffff888100fa1e90)
[   13.125720] 
[   13.125814] The buggy address belongs to the physical page:
[   13.126066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa1
[   13.126557] flags: 0x200000000000000(node=0|zone=2)
[   13.126799] page_type: f5(slab)
[   13.126936] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   13.127368] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   13.128318] page dumped because: kasan: bad access detected
[   13.128517] 
[   13.128590] Memory state around the buggy address:
[   13.128749]  ffff888100fa1c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.128974]  ffff888100fa1d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   13.129905] >ffff888100fa1d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   13.130286]                                            ^
[   13.130735]  ffff888100fa1e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.131227]  ffff888100fa1e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.131806] ==================================================================