Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 40.455571] ================================================================== [ 40.462660] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 40.469339] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306 [ 40.476630] [ 40.478116] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 40.478167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.478186] Hardware name: WinLink E850-96 board (DT) [ 40.478207] Call trace: [ 40.478223] show_stack+0x20/0x38 (C) [ 40.478256] dump_stack_lvl+0x8c/0xd0 [ 40.478294] print_report+0x118/0x608 [ 40.478331] kasan_report+0xdc/0x128 [ 40.478364] __asan_report_load1_noabort+0x20/0x30 [ 40.478403] kasan_strings+0x95c/0xb00 [ 40.478432] kunit_try_run_case+0x170/0x3f0 [ 40.478468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.478509] kthread+0x328/0x630 [ 40.478540] ret_from_fork+0x10/0x20 [ 40.478576] [ 40.540520] Allocated by task 306: [ 40.543907] kasan_save_stack+0x3c/0x68 [ 40.547723] kasan_save_track+0x20/0x40 [ 40.551543] kasan_save_alloc_info+0x40/0x58 [ 40.555796] __kasan_kmalloc+0xd4/0xd8 [ 40.559529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.564042] kasan_strings+0xc8/0xb00 [ 40.567688] kunit_try_run_case+0x170/0x3f0 [ 40.571855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.577325] kthread+0x328/0x630 [ 40.580535] ret_from_fork+0x10/0x20 [ 40.584094] [ 40.585570] Freed by task 306: [ 40.588608] kasan_save_stack+0x3c/0x68 [ 40.592428] kasan_save_track+0x20/0x40 [ 40.596247] kasan_save_free_info+0x4c/0x78 [ 40.600414] __kasan_slab_free+0x6c/0x98 [ 40.604320] kfree+0x214/0x3c8 [ 40.607358] kasan_strings+0x24c/0xb00 [ 40.611091] kunit_try_run_case+0x170/0x3f0 [ 40.615257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.620726] kthread+0x328/0x630 [ 40.623937] ret_from_fork+0x10/0x20 [ 40.627497] [ 40.628972] The buggy address belongs to the object at ffff00080499db00 [ 40.628972] which belongs to the cache kmalloc-32 of size 32 [ 40.641300] The buggy address is located 16 bytes inside of [ 40.641300] freed 32-byte region [ffff00080499db00, ffff00080499db20) [ 40.653364] [ 40.654842] The buggy address belongs to the physical page: [ 40.660397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d [ 40.668382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.674893] page_type: f5(slab) [ 40.678029] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 40.685749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 40.693467] page dumped because: kasan: bad access detected [ 40.699023] [ 40.700499] Memory state around the buggy address: [ 40.705278] ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.712482] ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.719686] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.726887] ^ [ 40.730624] ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 40.737828] ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 40.745031] ==================================================================
[ 28.975113] ================================================================== [ 28.975260] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 28.975399] Read of size 1 at addr fff00000c6437e10 by task kunit_try_catch/259 [ 28.975834] [ 28.975975] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.976184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.976256] Hardware name: linux,dummy-virt (DT) [ 28.976345] Call trace: [ 28.976432] show_stack+0x20/0x38 (C) [ 28.976704] dump_stack_lvl+0x8c/0xd0 [ 28.976857] print_report+0x118/0x608 [ 28.977070] kasan_report+0xdc/0x128 [ 28.977205] __asan_report_load1_noabort+0x20/0x30 [ 28.977400] kasan_strings+0x95c/0xb00 [ 28.977529] kunit_try_run_case+0x170/0x3f0 [ 28.977720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.977899] kthread+0x328/0x630 [ 28.978061] ret_from_fork+0x10/0x20 [ 28.978505] [ 28.978661] Allocated by task 259: [ 28.978747] kasan_save_stack+0x3c/0x68 [ 28.978960] kasan_save_track+0x20/0x40 [ 28.979258] kasan_save_alloc_info+0x40/0x58 [ 28.979779] __kasan_kmalloc+0xd4/0xd8 [ 28.980343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.980488] kasan_strings+0xc8/0xb00 [ 28.980599] kunit_try_run_case+0x170/0x3f0 [ 28.981596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.981762] kthread+0x328/0x630 [ 28.981865] ret_from_fork+0x10/0x20 [ 28.981981] [ 28.982037] Freed by task 259: [ 28.982113] kasan_save_stack+0x3c/0x68 [ 28.983181] kasan_save_track+0x20/0x40 [ 28.983346] kasan_save_free_info+0x4c/0x78 [ 28.984072] __kasan_slab_free+0x6c/0x98 [ 28.984202] kfree+0x214/0x3c8 [ 28.984299] kasan_strings+0x24c/0xb00 [ 28.984383] kunit_try_run_case+0x170/0x3f0 [ 28.984489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.985093] kthread+0x328/0x630 [ 28.985214] ret_from_fork+0x10/0x20 [ 28.985310] [ 28.986100] The buggy address belongs to the object at fff00000c6437e00 [ 28.986100] which belongs to the cache kmalloc-32 of size 32 [ 28.986999] The buggy address is located 16 bytes inside of [ 28.986999] freed 32-byte region [fff00000c6437e00, fff00000c6437e20) [ 28.987336] [ 28.987417] The buggy address belongs to the physical page: [ 28.987504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106437 [ 28.987772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.987915] page_type: f5(slab) [ 28.988164] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.988358] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 28.988660] page dumped because: kasan: bad access detected [ 28.988766] [ 28.988821] Memory state around the buggy address: [ 28.988973] fff00000c6437d00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 28.989274] fff00000c6437d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 28.989391] >fff00000c6437e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.989518] ^ [ 28.989695] fff00000c6437e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.989815] fff00000c6437f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.989952] ==================================================================
[ 29.072562] ================================================================== [ 29.072681] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 29.072803] Read of size 1 at addr fff00000c7761a90 by task kunit_try_catch/259 [ 29.072958] [ 29.073072] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.073311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.073387] Hardware name: linux,dummy-virt (DT) [ 29.073483] Call trace: [ 29.073549] show_stack+0x20/0x38 (C) [ 29.073678] dump_stack_lvl+0x8c/0xd0 [ 29.073802] print_report+0x118/0x608 [ 29.075563] kasan_report+0xdc/0x128 [ 29.076149] __asan_report_load1_noabort+0x20/0x30 [ 29.076294] kasan_strings+0x95c/0xb00 [ 29.076408] kunit_try_run_case+0x170/0x3f0 [ 29.076534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.076673] kthread+0x328/0x630 [ 29.076790] ret_from_fork+0x10/0x20 [ 29.076933] [ 29.076982] Allocated by task 259: [ 29.077069] kasan_save_stack+0x3c/0x68 [ 29.077174] kasan_save_track+0x20/0x40 [ 29.077268] kasan_save_alloc_info+0x40/0x58 [ 29.077367] __kasan_kmalloc+0xd4/0xd8 [ 29.077466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.077568] kasan_strings+0xc8/0xb00 [ 29.077660] kunit_try_run_case+0x170/0x3f0 [ 29.077752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.080240] kthread+0x328/0x630 [ 29.080343] ret_from_fork+0x10/0x20 [ 29.080444] [ 29.080500] Freed by task 259: [ 29.080570] kasan_save_stack+0x3c/0x68 [ 29.080672] kasan_save_track+0x20/0x40 [ 29.080773] kasan_save_free_info+0x4c/0x78 [ 29.081937] __kasan_slab_free+0x6c/0x98 [ 29.082073] kfree+0x214/0x3c8 [ 29.082179] kasan_strings+0x24c/0xb00 [ 29.082277] kunit_try_run_case+0x170/0x3f0 [ 29.082377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.082485] kthread+0x328/0x630 [ 29.082580] ret_from_fork+0x10/0x20 [ 29.082672] [ 29.082726] The buggy address belongs to the object at fff00000c7761a80 [ 29.082726] which belongs to the cache kmalloc-32 of size 32 [ 29.082881] The buggy address is located 16 bytes inside of [ 29.082881] freed 32-byte region [fff00000c7761a80, fff00000c7761aa0) [ 29.083035] [ 29.083089] The buggy address belongs to the physical page: [ 29.083165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107761 [ 29.083295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.083418] page_type: f5(slab) [ 29.083515] raw: 0bfffe0000000000 fff00000c0001780 dead000000000100 dead000000000122 [ 29.083644] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.083744] page dumped because: kasan: bad access detected [ 29.083833] [ 29.087037] Memory state around the buggy address: [ 29.087437] fff00000c7761980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.087920] fff00000c7761a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.088530] >fff00000c7761a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.088651] ^ [ 29.088732] fff00000c7761b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.088858] fff00000c7761b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.088959] ==================================================================
[ 22.158986] ================================================================== [ 22.160142] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80 [ 22.160813] Read of size 1 at addr ffff8881039d7c90 by task kunit_try_catch/277 [ 22.161244] [ 22.161464] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.161601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.161655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.161715] Call Trace: [ 22.161752] <TASK> [ 22.161795] dump_stack_lvl+0x73/0xb0 [ 22.161882] print_report+0xd1/0x650 [ 22.161958] ? __virt_addr_valid+0x1db/0x2d0 [ 22.162029] ? kasan_strings+0xcbc/0xe80 [ 22.162093] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.162161] ? kasan_strings+0xcbc/0xe80 [ 22.162228] kasan_report+0x141/0x180 [ 22.162292] ? kasan_strings+0xcbc/0xe80 [ 22.162356] __asan_report_load1_noabort+0x18/0x20 [ 22.162420] kasan_strings+0xcbc/0xe80 [ 22.162478] ? __pfx_kasan_strings+0x10/0x10 [ 22.162991] ? __schedule+0x207f/0x2b60 [ 22.163428] ? schedule+0x7c/0x2e0 [ 22.163526] ? trace_hardirqs_on+0x37/0xe0 [ 22.163652] ? __schedule+0x207f/0x2b60 [ 22.163728] ? __pfx_read_tsc+0x10/0x10 [ 22.163799] ? ktime_get_ts64+0x86/0x230 [ 22.163877] kunit_try_run_case+0x1a5/0x480 [ 22.163960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.164036] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.164110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.164186] ? __kthread_parkme+0x82/0x180 [ 22.164299] ? preempt_count_sub+0x50/0x80 [ 22.164372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.164440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.164517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.164586] kthread+0x337/0x6f0 [ 22.164635] ? trace_preempt_on+0x20/0xc0 [ 22.164692] ? __pfx_kthread+0x10/0x10 [ 22.164742] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.164794] ? calculate_sigpending+0x7b/0xa0 [ 22.164848] ? __pfx_kthread+0x10/0x10 [ 22.164900] ret_from_fork+0x116/0x1d0 [ 22.164944] ? __pfx_kthread+0x10/0x10 [ 22.164993] ret_from_fork_asm+0x1a/0x30 [ 22.165062] </TASK> [ 22.165090] [ 22.189451] Allocated by task 277: [ 22.189885] kasan_save_stack+0x45/0x70 [ 22.190456] kasan_save_track+0x18/0x40 [ 22.190907] kasan_save_alloc_info+0x3b/0x50 [ 22.191430] __kasan_kmalloc+0xb7/0xc0 [ 22.191861] __kmalloc_cache_noprof+0x189/0x420 [ 22.192427] kasan_strings+0xc0/0xe80 [ 22.192853] kunit_try_run_case+0x1a5/0x480 [ 22.193378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.194006] kthread+0x337/0x6f0 [ 22.194433] ret_from_fork+0x116/0x1d0 [ 22.194870] ret_from_fork_asm+0x1a/0x30 [ 22.195427] [ 22.195672] Freed by task 277: [ 22.195950] kasan_save_stack+0x45/0x70 [ 22.196380] kasan_save_track+0x18/0x40 [ 22.196867] kasan_save_free_info+0x3f/0x60 [ 22.197206] __kasan_slab_free+0x56/0x70 [ 22.197663] kfree+0x222/0x3f0 [ 22.198122] kasan_strings+0x2aa/0xe80 [ 22.198679] kunit_try_run_case+0x1a5/0x480 [ 22.199189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.199756] kthread+0x337/0x6f0 [ 22.200188] ret_from_fork+0x116/0x1d0 [ 22.200738] ret_from_fork_asm+0x1a/0x30 [ 22.201165] [ 22.201443] The buggy address belongs to the object at ffff8881039d7c80 [ 22.201443] which belongs to the cache kmalloc-32 of size 32 [ 22.202311] The buggy address is located 16 bytes inside of [ 22.202311] freed 32-byte region [ffff8881039d7c80, ffff8881039d7ca0) [ 22.203203] [ 22.203541] The buggy address belongs to the physical page: [ 22.204121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d7 [ 22.204896] flags: 0x200000000000000(node=0|zone=2) [ 22.205529] page_type: f5(slab) [ 22.205845] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 22.206393] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.207158] page dumped because: kasan: bad access detected [ 22.207748] [ 22.208015] Memory state around the buggy address: [ 22.208469] ffff8881039d7b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.209153] ffff8881039d7c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.209789] >ffff8881039d7c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.210308] ^ [ 22.210835] ffff8881039d7d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.211452] ffff8881039d7d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.212118] ==================================================================
[ 20.939417] ================================================================== [ 20.940049] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80 [ 20.940643] Read of size 1 at addr ffff8881038ef290 by task kunit_try_catch/277 [ 20.941398] [ 20.941819] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.941957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.941996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.942055] Call Trace: [ 20.942100] <TASK> [ 20.942143] dump_stack_lvl+0x73/0xb0 [ 20.942233] print_report+0xd1/0x650 [ 20.942318] ? __virt_addr_valid+0x1db/0x2d0 [ 20.942414] ? kasan_strings+0xcbc/0xe80 [ 20.942515] ? kasan_complete_mode_report_info+0x64/0x200 [ 20.942593] ? kasan_strings+0xcbc/0xe80 [ 20.942662] kasan_report+0x141/0x180 [ 20.942736] ? kasan_strings+0xcbc/0xe80 [ 20.942816] __asan_report_load1_noabort+0x18/0x20 [ 20.942916] kasan_strings+0xcbc/0xe80 [ 20.943076] ? trace_hardirqs_on+0x37/0xe0 [ 20.943194] ? __pfx_kasan_strings+0x10/0x10 [ 20.943295] ? finish_task_switch.isra.0+0x153/0x700 [ 20.943415] ? __switch_to+0x47/0xf50 [ 20.943501] ? __schedule+0x10cc/0x2b60 [ 20.943810] ? __pfx_read_tsc+0x10/0x10 [ 20.943847] ? ktime_get_ts64+0x86/0x230 [ 20.943909] kunit_try_run_case+0x1a5/0x480 [ 20.943952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.943990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.944025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.944058] ? __kthread_parkme+0x82/0x180 [ 20.944087] ? preempt_count_sub+0x50/0x80 [ 20.944147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.944187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.944223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.944261] kthread+0x337/0x6f0 [ 20.944289] ? trace_preempt_on+0x20/0xc0 [ 20.944320] ? __pfx_kthread+0x10/0x10 [ 20.944349] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.944379] ? calculate_sigpending+0x7b/0xa0 [ 20.944413] ? __pfx_kthread+0x10/0x10 [ 20.944443] ret_from_fork+0x116/0x1d0 [ 20.944467] ? __pfx_kthread+0x10/0x10 [ 20.944495] ret_from_fork_asm+0x1a/0x30 [ 20.944610] </TASK> [ 20.944644] [ 20.967078] Allocated by task 277: [ 20.967930] kasan_save_stack+0x45/0x70 [ 20.968359] kasan_save_track+0x18/0x40 [ 20.969067] kasan_save_alloc_info+0x3b/0x50 [ 20.969494] __kasan_kmalloc+0xb7/0xc0 [ 20.970436] __kmalloc_cache_noprof+0x189/0x420 [ 20.971438] kasan_strings+0xc0/0xe80 [ 20.972020] kunit_try_run_case+0x1a5/0x480 [ 20.972898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.973979] kthread+0x337/0x6f0 [ 20.974353] ret_from_fork+0x116/0x1d0 [ 20.975015] ret_from_fork_asm+0x1a/0x30 [ 20.975948] [ 20.976122] Freed by task 277: [ 20.976395] kasan_save_stack+0x45/0x70 [ 20.976721] kasan_save_track+0x18/0x40 [ 20.977052] kasan_save_free_info+0x3f/0x60 [ 20.978284] __kasan_slab_free+0x56/0x70 [ 20.979056] kfree+0x222/0x3f0 [ 20.979903] kasan_strings+0x2aa/0xe80 [ 20.980712] kunit_try_run_case+0x1a5/0x480 [ 20.981101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.982055] kthread+0x337/0x6f0 [ 20.982456] ret_from_fork+0x116/0x1d0 [ 20.982988] ret_from_fork_asm+0x1a/0x30 [ 20.983344] [ 20.983576] The buggy address belongs to the object at ffff8881038ef280 [ 20.983576] which belongs to the cache kmalloc-32 of size 32 [ 20.984526] The buggy address is located 16 bytes inside of [ 20.984526] freed 32-byte region [ffff8881038ef280, ffff8881038ef2a0) [ 20.985512] [ 20.985792] The buggy address belongs to the physical page: [ 20.986209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ef [ 20.987028] flags: 0x200000000000000(node=0|zone=2) [ 20.987499] page_type: f5(slab) [ 20.987902] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 20.988524] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.989199] page dumped because: kasan: bad access detected [ 20.989691] [ 20.989947] Memory state around the buggy address: [ 20.990407] ffff8881038ef180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.990941] ffff8881038ef200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.991682] >ffff8881038ef280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.992276] ^ [ 20.992811] ffff8881038ef300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.993710] ffff8881038ef380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.994719] ==================================================================
[ 22.583888] ================================================================== [ 22.584564] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 22.585188] Read of size 1 at addr ffff00000f4bf450 by task kunit_try_catch/312 [ 22.585854] [ 22.586008] CPU: 4 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.586046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.586056] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.586068] Call trace: [ 22.586077] show_stack+0x20/0x38 (C) [ 22.586102] dump_stack_lvl+0x8c/0xd0 [ 22.586126] print_report+0x118/0x608 [ 22.586149] kasan_report+0xdc/0x128 [ 22.586171] __asan_report_load1_noabort+0x20/0x30 [ 22.586197] kasan_strings+0x95c/0xb00 [ 22.586215] kunit_try_run_case+0x170/0x3f0 [ 22.586239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.586264] kthread+0x328/0x630 [ 22.586281] ret_from_fork+0x10/0x20 [ 22.586303] [ 22.591799] Allocated by task 312: [ 22.592115] kasan_save_stack+0x3c/0x68 [ 22.592481] kasan_save_track+0x20/0x40 [ 22.592842] kasan_save_alloc_info+0x40/0x58 [ 22.593245] __kasan_kmalloc+0xd4/0xd8 [ 22.593600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.594023] kasan_strings+0xc8/0xb00 [ 22.594368] kunit_try_run_case+0x170/0x3f0 [ 22.594759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.595267] kthread+0x328/0x630 [ 22.595571] ret_from_fork+0x10/0x20 [ 22.595910] [ 22.596056] Freed by task 312: [ 22.596342] kasan_save_stack+0x3c/0x68 [ 22.596705] kasan_save_track+0x20/0x40 [ 22.597066] kasan_save_free_info+0x4c/0x78 [ 22.597461] __kasan_slab_free+0x6c/0x98 [ 22.597831] kfree+0x214/0x3c8 [ 22.598121] kasan_strings+0x24c/0xb00 [ 22.598472] kunit_try_run_case+0x170/0x3f0 [ 22.598864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.599371] kthread+0x328/0x630 [ 22.599675] ret_from_fork+0x10/0x20 [ 22.600014] [ 22.600160] The buggy address belongs to the object at ffff00000f4bf440 [ 22.600160] which belongs to the cache kmalloc-32 of size 32 [ 22.601262] The buggy address is located 16 bytes inside of [ 22.601262] freed 32-byte region [ffff00000f4bf440, ffff00000f4bf460) [ 22.602343] [ 22.602490] The buggy address belongs to the physical page: [ 22.602995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf4bf [ 22.603707] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.604304] page_type: f5(slab) [ 22.604605] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 22.605307] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 22.606003] page dumped because: kasan: bad access detected [ 22.606508] [ 22.606654] Memory state around the buggy address: [ 22.607091] ffff00000f4bf300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.607745] ffff00000f4bf380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.608397] >ffff00000f4bf400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.609047] ^ [ 22.609577] ffff00000f4bf480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.610229] ffff00000f4bf500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.610879] ==================================================================