Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.867212] ==================================================================
[   15.867292] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   15.867591] Read of size 16 at addr fff00000c5809520 by task kunit_try_catch/169
[   15.867903] 
[   15.867939] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.868019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.868118] Hardware name: linux,dummy-virt (DT)
[   15.868189] Call trace:
[   15.868234]  show_stack+0x20/0x38 (C)
[   15.868629]  dump_stack_lvl+0x8c/0xd0
[   15.868753]  print_report+0x118/0x5d0
[   15.868902]  kasan_report+0xdc/0x128
[   15.868977]  __asan_report_load16_noabort+0x20/0x30
[   15.869116]  kmalloc_uaf_16+0x3bc/0x438
[   15.869220]  kunit_try_run_case+0x170/0x3f0
[   15.869293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.869653]  kthread+0x328/0x630
[   15.869744]  ret_from_fork+0x10/0x20
[   15.869807] 
[   15.869825] Allocated by task 169:
[   15.870096]  kasan_save_stack+0x3c/0x68
[   15.870168]  kasan_save_track+0x20/0x40
[   15.870244]  kasan_save_alloc_info+0x40/0x58
[   15.870410]  __kasan_kmalloc+0xd4/0xd8
[   15.870479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.870584]  kmalloc_uaf_16+0x140/0x438
[   15.870631]  kunit_try_run_case+0x170/0x3f0
[   15.870679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.870728]  kthread+0x328/0x630
[   15.870759]  ret_from_fork+0x10/0x20
[   15.870843] 
[   15.870862] Freed by task 169:
[   15.870888]  kasan_save_stack+0x3c/0x68
[   15.870935]  kasan_save_track+0x20/0x40
[   15.870971]  kasan_save_free_info+0x4c/0x78
[   15.871025]  __kasan_slab_free+0x6c/0x98
[   15.871061]  kfree+0x214/0x3c8
[   15.871093]  kmalloc_uaf_16+0x190/0x438
[   15.871136]  kunit_try_run_case+0x170/0x3f0
[   15.871172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.871238]  kthread+0x328/0x630
[   15.871269]  ret_from_fork+0x10/0x20
[   15.871304] 
[   15.871330] The buggy address belongs to the object at fff00000c5809520
[   15.871330]  which belongs to the cache kmalloc-16 of size 16
[   15.871395] The buggy address is located 0 bytes inside of
[   15.871395]  freed 16-byte region [fff00000c5809520, fff00000c5809530)
[   15.871465] 
[   15.871484] The buggy address belongs to the physical page:
[   15.871527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   15.871605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.871652] page_type: f5(slab)
[   15.871707] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.871758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.871797] page dumped because: kasan: bad access detected
[   15.871826] 
[   15.871859] Memory state around the buggy address:
[   15.871889]  fff00000c5809400: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.871930]  fff00000c5809480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.871988] >fff00000c5809500: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   15.872035]                                ^
[   15.872079]  fff00000c5809580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.872127]  fff00000c5809600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.872166] ==================================================================

[   16.673192] ==================================================================
[   16.673255] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   16.673349] Read of size 16 at addr fff00000c44aba80 by task kunit_try_catch/169
[   16.673401] 
[   16.673433] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.673625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.673720] Hardware name: linux,dummy-virt (DT)
[   16.673767] Call trace:
[   16.673789]  show_stack+0x20/0x38 (C)
[   16.673878]  dump_stack_lvl+0x8c/0xd0
[   16.673943]  print_report+0x118/0x5d0
[   16.674038]  kasan_report+0xdc/0x128
[   16.674091]  __asan_report_load16_noabort+0x20/0x30
[   16.674142]  kmalloc_uaf_16+0x3bc/0x438
[   16.674404]  kunit_try_run_case+0x170/0x3f0
[   16.674523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.674578]  kthread+0x328/0x630
[   16.674620]  ret_from_fork+0x10/0x20
[   16.674673] 
[   16.674691] Allocated by task 169:
[   16.674720]  kasan_save_stack+0x3c/0x68
[   16.674759]  kasan_save_track+0x20/0x40
[   16.674794]  kasan_save_alloc_info+0x40/0x58
[   16.674832]  __kasan_kmalloc+0xd4/0xd8
[   16.674881]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.674919]  kmalloc_uaf_16+0x140/0x438
[   16.674952]  kunit_try_run_case+0x170/0x3f0
[   16.674988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.675030]  kthread+0x328/0x630
[   16.675060]  ret_from_fork+0x10/0x20
[   16.675094] 
[   16.675110] Freed by task 169:
[   16.675135]  kasan_save_stack+0x3c/0x68
[   16.675368]  kasan_save_track+0x20/0x40
[   16.675616]  kasan_save_free_info+0x4c/0x78
[   16.675709]  __kasan_slab_free+0x6c/0x98
[   16.675749]  kfree+0x214/0x3c8
[   16.675782]  kmalloc_uaf_16+0x190/0x438
[   16.675836]  kunit_try_run_case+0x170/0x3f0
[   16.675873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.675951]  kthread+0x328/0x630
[   16.675984]  ret_from_fork+0x10/0x20
[   16.676018] 
[   16.676127] The buggy address belongs to the object at fff00000c44aba80
[   16.676127]  which belongs to the cache kmalloc-16 of size 16
[   16.676228] The buggy address is located 0 bytes inside of
[   16.676228]  freed 16-byte region [fff00000c44aba80, fff00000c44aba90)
[   16.676354] 
[   16.676391] The buggy address belongs to the physical page:
[   16.676439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ab
[   16.676547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.676675] page_type: f5(slab)
[   16.676779] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.676848] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.676910] page dumped because: kasan: bad access detected
[   16.677231] 
[   16.677336] Memory state around the buggy address:
[   16.677417]  fff00000c44ab980: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   16.677460]  fff00000c44aba00: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   16.677710] >fff00000c44aba80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.677840]                    ^
[   16.677960]  fff00000c44abb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678077]  fff00000c44abb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678133] ==================================================================

[   12.602312] ==================================================================
[   12.602977] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   12.603217] Read of size 16 at addr ffff888102676200 by task kunit_try_catch/185
[   12.603466] 
[   12.603582] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.603625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.603636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.603658] Call Trace:
[   12.603672]  <TASK>
[   12.603686]  dump_stack_lvl+0x73/0xb0
[   12.603714]  print_report+0xd1/0x610
[   12.603737]  ? __virt_addr_valid+0x1db/0x2d0
[   12.603759]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.603779]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.603803]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.603825]  kasan_report+0x141/0x180
[   12.603847]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.603872]  __asan_report_load16_noabort+0x18/0x20
[   12.603898]  kmalloc_uaf_16+0x47b/0x4c0
[   12.603919]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   12.603941]  ? __schedule+0x10cc/0x2b60
[   12.603963]  ? __pfx_read_tsc+0x10/0x10
[   12.603984]  ? ktime_get_ts64+0x86/0x230
[   12.604007]  kunit_try_run_case+0x1a5/0x480
[   12.604032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604055]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.604079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.604102]  ? __kthread_parkme+0x82/0x180
[   12.604533]  ? preempt_count_sub+0x50/0x80
[   12.604565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.604593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.604619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.604645]  kthread+0x337/0x6f0
[   12.604665]  ? trace_preempt_on+0x20/0xc0
[   12.604690]  ? __pfx_kthread+0x10/0x10
[   12.604710]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.604732]  ? calculate_sigpending+0x7b/0xa0
[   12.604756]  ? __pfx_kthread+0x10/0x10
[   12.604777]  ret_from_fork+0x116/0x1d0
[   12.604796]  ? __pfx_kthread+0x10/0x10
[   12.604816]  ret_from_fork_asm+0x1a/0x30
[   12.604846]  </TASK>
[   12.604856] 
[   12.620005] Allocated by task 185:
[   12.620336]  kasan_save_stack+0x45/0x70
[   12.620748]  kasan_save_track+0x18/0x40
[   12.621417]  kasan_save_alloc_info+0x3b/0x50
[   12.622398]  __kasan_kmalloc+0xb7/0xc0
[   12.622716]  __kmalloc_cache_noprof+0x189/0x420
[   12.622883]  kmalloc_uaf_16+0x15b/0x4c0
[   12.623017]  kunit_try_run_case+0x1a5/0x480
[   12.623160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.623333]  kthread+0x337/0x6f0
[   12.623467]  ret_from_fork+0x116/0x1d0
[   12.624523]  ret_from_fork_asm+0x1a/0x30
[   12.624892] 
[   12.625174] Freed by task 185:
[   12.625798]  kasan_save_stack+0x45/0x70
[   12.627246]  kasan_save_track+0x18/0x40
[   12.627861]  kasan_save_free_info+0x3f/0x60
[   12.628378]  __kasan_slab_free+0x56/0x70
[   12.628966]  kfree+0x222/0x3f0
[   12.629424]  kmalloc_uaf_16+0x1d6/0x4c0
[   12.629961]  kunit_try_run_case+0x1a5/0x480
[   12.630118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.630291]  kthread+0x337/0x6f0
[   12.630420]  ret_from_fork+0x116/0x1d0
[   12.631122]  ret_from_fork_asm+0x1a/0x30
[   12.631709] 
[   12.631998] The buggy address belongs to the object at ffff888102676200
[   12.631998]  which belongs to the cache kmalloc-16 of size 16
[   12.633490] The buggy address is located 0 bytes inside of
[   12.633490]  freed 16-byte region [ffff888102676200, ffff888102676210)
[   12.634681] 
[   12.634762] The buggy address belongs to the physical page:
[   12.634935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   12.635172] flags: 0x200000000000000(node=0|zone=2)
[   12.635335] page_type: f5(slab)
[   12.635930] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.636940] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.637898] page dumped because: kasan: bad access detected
[   12.638524] 
[   12.638849] Memory state around the buggy address:
[   12.639368]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   12.640129]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   12.640602] >ffff888102676200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.640825]                    ^
[   12.640947]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.641165]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.641379] ==================================================================

[   12.897552] ==================================================================
[   12.898217] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   12.898567] Read of size 16 at addr ffff888102b01260 by task kunit_try_catch/186
[   12.898793] 
[   12.898961] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.899093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.899107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.899138] Call Trace:
[   12.899149]  <TASK>
[   12.899164]  dump_stack_lvl+0x73/0xb0
[   12.899194]  print_report+0xd1/0x610
[   12.899216]  ? __virt_addr_valid+0x1db/0x2d0
[   12.899240]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.899260]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.899283]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.899305]  kasan_report+0x141/0x180
[   12.899328]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.899355]  __asan_report_load16_noabort+0x18/0x20
[   12.899382]  kmalloc_uaf_16+0x47b/0x4c0
[   12.899403]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   12.899425]  ? __schedule+0x10cc/0x2b60
[   12.899448]  ? __pfx_read_tsc+0x10/0x10
[   12.899470]  ? ktime_get_ts64+0x86/0x230
[   12.899495]  kunit_try_run_case+0x1a5/0x480
[   12.899519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.899542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.899566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.899590]  ? __kthread_parkme+0x82/0x180
[   12.899611]  ? preempt_count_sub+0x50/0x80
[   12.899635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.899661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.899686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.899712]  kthread+0x337/0x6f0
[   12.899731]  ? trace_preempt_on+0x20/0xc0
[   12.899754]  ? __pfx_kthread+0x10/0x10
[   12.899775]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.899807]  ? calculate_sigpending+0x7b/0xa0
[   12.899831]  ? __pfx_kthread+0x10/0x10
[   12.899852]  ret_from_fork+0x116/0x1d0
[   12.899883]  ? __pfx_kthread+0x10/0x10
[   12.899904]  ret_from_fork_asm+0x1a/0x30
[   12.899935]  </TASK>
[   12.899944] 
[   12.907496] Allocated by task 186:
[   12.907676]  kasan_save_stack+0x45/0x70
[   12.908067]  kasan_save_track+0x18/0x40
[   12.908256]  kasan_save_alloc_info+0x3b/0x50
[   12.908472]  __kasan_kmalloc+0xb7/0xc0
[   12.908632]  __kmalloc_cache_noprof+0x189/0x420
[   12.908905]  kmalloc_uaf_16+0x15b/0x4c0
[   12.909099]  kunit_try_run_case+0x1a5/0x480
[   12.909332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.909542]  kthread+0x337/0x6f0
[   12.909804]  ret_from_fork+0x116/0x1d0
[   12.910011]  ret_from_fork_asm+0x1a/0x30
[   12.910241] 
[   12.910317] Freed by task 186:
[   12.910430]  kasan_save_stack+0x45/0x70
[   12.910566]  kasan_save_track+0x18/0x40
[   12.910752]  kasan_save_free_info+0x3f/0x60
[   12.910960]  __kasan_slab_free+0x56/0x70
[   12.911440]  kfree+0x222/0x3f0
[   12.911657]  kmalloc_uaf_16+0x1d6/0x4c0
[   12.911793]  kunit_try_run_case+0x1a5/0x480
[   12.911938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.912343]  kthread+0x337/0x6f0
[   12.912519]  ret_from_fork+0x116/0x1d0
[   12.912733]  ret_from_fork_asm+0x1a/0x30
[   12.912947] 
[   12.913115] The buggy address belongs to the object at ffff888102b01260
[   12.913115]  which belongs to the cache kmalloc-16 of size 16
[   12.913744] The buggy address is located 0 bytes inside of
[   12.913744]  freed 16-byte region [ffff888102b01260, ffff888102b01270)
[   12.914522] 
[   12.914600] The buggy address belongs to the physical page:
[   12.914837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b01
[   12.915194] flags: 0x200000000000000(node=0|zone=2)
[   12.915358] page_type: f5(slab)
[   12.915478] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.915937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.916356] page dumped because: kasan: bad access detected
[   12.916679] 
[   12.916805] Memory state around the buggy address:
[   12.917063]  ffff888102b01100: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   12.917401]  ffff888102b01180: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   12.917820] >ffff888102b01200: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   12.918041]                                                        ^
[   12.918519]  ffff888102b01280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.918863]  ffff888102b01300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.919182] ==================================================================