Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.914721] ==================================================================
[   18.915029] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   18.915119] Read of size 1 at addr fff00000c5ae3c90 by task kunit_try_catch/260
[   18.915173] 
[   18.915316] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.915689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.915782] Hardware name: linux,dummy-virt (DT)
[   18.915840] Call trace:
[   18.915865]  show_stack+0x20/0x38 (C)
[   18.915918]  dump_stack_lvl+0x8c/0xd0
[   18.916175]  print_report+0x118/0x5d0
[   18.916249]  kasan_report+0xdc/0x128
[   18.916298]  __asan_report_load1_noabort+0x20/0x30
[   18.916405]  strlen+0xa8/0xb0
[   18.916537]  kasan_strings+0x418/0xb00
[   18.916627]  kunit_try_run_case+0x170/0x3f0
[   18.917087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.917223]  kthread+0x328/0x630
[   18.917308]  ret_from_fork+0x10/0x20
[   18.917760] 
[   18.917827] Allocated by task 260:
[   18.917865]  kasan_save_stack+0x3c/0x68
[   18.917952]  kasan_save_track+0x20/0x40
[   18.918008]  kasan_save_alloc_info+0x40/0x58
[   18.918051]  __kasan_kmalloc+0xd4/0xd8
[   18.918386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.918513]  kasan_strings+0xc8/0xb00
[   18.918551]  kunit_try_run_case+0x170/0x3f0
[   18.918597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.918819]  kthread+0x328/0x630
[   18.918862]  ret_from_fork+0x10/0x20
[   18.918903] 
[   18.920117] Freed by task 260:
[   18.920157]  kasan_save_stack+0x3c/0x68
[   18.920221]  kasan_save_track+0x20/0x40
[   18.920260]  kasan_save_free_info+0x4c/0x78
[   18.920302]  __kasan_slab_free+0x6c/0x98
[   18.920689]  kfree+0x214/0x3c8
[   18.920732]  kasan_strings+0x24c/0xb00
[   18.920975]  kunit_try_run_case+0x170/0x3f0
[   18.921402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.921463]  kthread+0x328/0x630
[   18.921511]  ret_from_fork+0x10/0x20
[   18.921550] 
[   18.921571] The buggy address belongs to the object at fff00000c5ae3c80
[   18.921571]  which belongs to the cache kmalloc-32 of size 32
[   18.921635] The buggy address is located 16 bytes inside of
[   18.921635]  freed 32-byte region [fff00000c5ae3c80, fff00000c5ae3ca0)
[   18.921699] 
[   18.921729] The buggy address belongs to the physical page:
[   18.921763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae3
[   18.922202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.922318] page_type: f5(slab)
[   18.922360] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.922488] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.922813] page dumped because: kasan: bad access detected
[   18.924049] 
[   18.924125] Memory state around the buggy address:
[   18.924275]  fff00000c5ae3b80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.924361]  fff00000c5ae3c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.924410] >fff00000c5ae3c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.924452]                          ^
[   18.924484]  fff00000c5ae3d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.924530]  fff00000c5ae3d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.924571] ==================================================================

[   14.599630] ==================================================================
[   14.599933] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   14.600345] Read of size 1 at addr ffff888103445d50 by task kunit_try_catch/277
[   14.600893] 
[   14.601008] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.601051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.601063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.601084] Call Trace:
[   14.601098]  <TASK>
[   14.601112]  dump_stack_lvl+0x73/0xb0
[   14.601141]  print_report+0xd1/0x610
[   14.601164]  ? __virt_addr_valid+0x1db/0x2d0
[   14.601188]  ? strlen+0x8f/0xb0
[   14.601205]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.601229]  ? strlen+0x8f/0xb0
[   14.601247]  kasan_report+0x141/0x180
[   14.601270]  ? strlen+0x8f/0xb0
[   14.601292]  __asan_report_load1_noabort+0x18/0x20
[   14.601318]  strlen+0x8f/0xb0
[   14.601336]  kasan_strings+0x57b/0xe80
[   14.601356]  ? trace_hardirqs_on+0x37/0xe0
[   14.601381]  ? __pfx_kasan_strings+0x10/0x10
[   14.601402]  ? finish_task_switch.isra.0+0x153/0x700
[   14.601426]  ? __switch_to+0x47/0xf50
[   14.601464]  ? __schedule+0x10cc/0x2b60
[   14.601521]  ? __pfx_read_tsc+0x10/0x10
[   14.601557]  ? ktime_get_ts64+0x86/0x230
[   14.601582]  kunit_try_run_case+0x1a5/0x480
[   14.601621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601659]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.601685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.601710]  ? __kthread_parkme+0x82/0x180
[   14.601732]  ? preempt_count_sub+0x50/0x80
[   14.601756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.601809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.601851]  kthread+0x337/0x6f0
[   14.601871]  ? trace_preempt_on+0x20/0xc0
[   14.601908]  ? __pfx_kthread+0x10/0x10
[   14.601929]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.601953]  ? calculate_sigpending+0x7b/0xa0
[   14.601978]  ? __pfx_kthread+0x10/0x10
[   14.602000]  ret_from_fork+0x116/0x1d0
[   14.602020]  ? __pfx_kthread+0x10/0x10
[   14.602041]  ret_from_fork_asm+0x1a/0x30
[   14.602073]  </TASK>
[   14.602083] 
[   14.610973] Allocated by task 277:
[   14.611171]  kasan_save_stack+0x45/0x70
[   14.611407]  kasan_save_track+0x18/0x40
[   14.611717]  kasan_save_alloc_info+0x3b/0x50
[   14.611933]  __kasan_kmalloc+0xb7/0xc0
[   14.612126]  __kmalloc_cache_noprof+0x189/0x420
[   14.612349]  kasan_strings+0xc0/0xe80
[   14.612498]  kunit_try_run_case+0x1a5/0x480
[   14.612709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.613197]  kthread+0x337/0x6f0
[   14.613374]  ret_from_fork+0x116/0x1d0
[   14.613693]  ret_from_fork_asm+0x1a/0x30
[   14.613871] 
[   14.613988] Freed by task 277:
[   14.614126]  kasan_save_stack+0x45/0x70
[   14.614338]  kasan_save_track+0x18/0x40
[   14.614642]  kasan_save_free_info+0x3f/0x60
[   14.614873]  __kasan_slab_free+0x56/0x70
[   14.615053]  kfree+0x222/0x3f0
[   14.615207]  kasan_strings+0x2aa/0xe80
[   14.615381]  kunit_try_run_case+0x1a5/0x480
[   14.615706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.615928]  kthread+0x337/0x6f0
[   14.616122]  ret_from_fork+0x116/0x1d0
[   14.616294]  ret_from_fork_asm+0x1a/0x30
[   14.616496] 
[   14.616597] The buggy address belongs to the object at ffff888103445d40
[   14.616597]  which belongs to the cache kmalloc-32 of size 32
[   14.616977] The buggy address is located 16 bytes inside of
[   14.616977]  freed 32-byte region [ffff888103445d40, ffff888103445d60)
[   14.617419] 
[   14.617525] The buggy address belongs to the physical page:
[   14.617784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103445
[   14.618140] flags: 0x200000000000000(node=0|zone=2)
[   14.618357] page_type: f5(slab)
[   14.618905] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.619241] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.619502] page dumped because: kasan: bad access detected
[   14.619813] 
[   14.619886] Memory state around the buggy address:
[   14.620043]  ffff888103445c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.620372]  ffff888103445c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.620937] >ffff888103445d00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.621274]                                                  ^
[   14.621669]  ffff888103445d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.621990]  ffff888103445e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.622315] ==================================================================

[   14.827938] ==================================================================
[   14.828630] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   14.828974] Read of size 1 at addr ffff8881025b0450 by task kunit_try_catch/277
[   14.829427] 
[   14.829537] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.829582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.829596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.829616] Call Trace:
[   14.829632]  <TASK>
[   14.829649]  dump_stack_lvl+0x73/0xb0
[   14.829677]  print_report+0xd1/0x610
[   14.830068]  ? __virt_addr_valid+0x1db/0x2d0
[   14.830104]  ? strlen+0x8f/0xb0
[   14.830136]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.830161]  ? strlen+0x8f/0xb0
[   14.830179]  kasan_report+0x141/0x180
[   14.830202]  ? strlen+0x8f/0xb0
[   14.830224]  __asan_report_load1_noabort+0x18/0x20
[   14.830250]  strlen+0x8f/0xb0
[   14.830268]  kasan_strings+0x57b/0xe80
[   14.830288]  ? trace_hardirqs_on+0x37/0xe0
[   14.830313]  ? __pfx_kasan_strings+0x10/0x10
[   14.830333]  ? finish_task_switch.isra.0+0x153/0x700
[   14.830357]  ? __switch_to+0x47/0xf50
[   14.830382]  ? __schedule+0x10cc/0x2b60
[   14.830404]  ? __pfx_read_tsc+0x10/0x10
[   14.830426]  ? ktime_get_ts64+0x86/0x230
[   14.830451]  kunit_try_run_case+0x1a5/0x480
[   14.830475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.830500]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.830524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.830550]  ? __kthread_parkme+0x82/0x180
[   14.830570]  ? preempt_count_sub+0x50/0x80
[   14.830594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.830620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.830697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.830731]  kthread+0x337/0x6f0
[   14.830751]  ? trace_preempt_on+0x20/0xc0
[   14.830774]  ? __pfx_kthread+0x10/0x10
[   14.830795]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.830817]  ? calculate_sigpending+0x7b/0xa0
[   14.830842]  ? __pfx_kthread+0x10/0x10
[   14.830865]  ret_from_fork+0x116/0x1d0
[   14.830885]  ? __pfx_kthread+0x10/0x10
[   14.830905]  ret_from_fork_asm+0x1a/0x30
[   14.830937]  </TASK>
[   14.830946] 
[   14.841990] Allocated by task 277:
[   14.842455]  kasan_save_stack+0x45/0x70
[   14.842806]  kasan_save_track+0x18/0x40
[   14.842988]  kasan_save_alloc_info+0x3b/0x50
[   14.843409]  __kasan_kmalloc+0xb7/0xc0
[   14.843593]  __kmalloc_cache_noprof+0x189/0x420
[   14.844022]  kasan_strings+0xc0/0xe80
[   14.844197]  kunit_try_run_case+0x1a5/0x480
[   14.844474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844898]  kthread+0x337/0x6f0
[   14.845089]  ret_from_fork+0x116/0x1d0
[   14.845396]  ret_from_fork_asm+0x1a/0x30
[   14.845585] 
[   14.845670] Freed by task 277:
[   14.845974]  kasan_save_stack+0x45/0x70
[   14.846202]  kasan_save_track+0x18/0x40
[   14.846729]  kasan_save_free_info+0x3f/0x60
[   14.847010]  __kasan_slab_free+0x56/0x70
[   14.847238]  kfree+0x222/0x3f0
[   14.847393]  kasan_strings+0x2aa/0xe80
[   14.847570]  kunit_try_run_case+0x1a5/0x480
[   14.848039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848278]  kthread+0x337/0x6f0
[   14.848543]  ret_from_fork+0x116/0x1d0
[   14.849072]  ret_from_fork_asm+0x1a/0x30
[   14.849305] 
[   14.849385] The buggy address belongs to the object at ffff8881025b0440
[   14.849385]  which belongs to the cache kmalloc-32 of size 32
[   14.850288] The buggy address is located 16 bytes inside of
[   14.850288]  freed 32-byte region [ffff8881025b0440, ffff8881025b0460)
[   14.850942] 
[   14.851024] The buggy address belongs to the physical page:
[   14.851480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b0
[   14.851942] flags: 0x200000000000000(node=0|zone=2)
[   14.852346] page_type: f5(slab)
[   14.852525] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.852985] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.853495] page dumped because: kasan: bad access detected
[   14.854002] 
[   14.854099] Memory state around the buggy address:
[   14.854491]  ffff8881025b0300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.854974]  ffff8881025b0380: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.855425] >ffff8881025b0400: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.855918]                                                  ^
[   14.856176]  ffff8881025b0480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.856481]  ffff8881025b0500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.856779] ==================================================================