Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.825987] ==================================================================
[   18.826146] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   18.826640] Read of size 1 at addr fff00000c79c3ad0 by task kunit_try_catch/259
[   18.827039] 
[   18.827112] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.827278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.827308] Hardware name: linux,dummy-virt (DT)
[   18.827341] Call trace:
[   18.827367]  show_stack+0x20/0x38 (C)
[   18.827467]  dump_stack_lvl+0x8c/0xd0
[   18.827517]  print_report+0x118/0x5d0
[   18.827679]  kasan_report+0xdc/0x128
[   18.827737]  __asan_report_load1_noabort+0x20/0x30
[   18.828015]  kasan_strings+0x95c/0xb00
[   18.828230]  kunit_try_run_case+0x170/0x3f0
[   18.828288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.828363]  kthread+0x328/0x630
[   18.828551]  ret_from_fork+0x10/0x20
[   18.828646] 
[   18.828764] Allocated by task 259:
[   18.828820]  kasan_save_stack+0x3c/0x68
[   18.828917]  kasan_save_track+0x20/0x40
[   18.828959]  kasan_save_alloc_info+0x40/0x58
[   18.829005]  __kasan_kmalloc+0xd4/0xd8
[   18.829044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.829108]  kasan_strings+0xc8/0xb00
[   18.829310]  kunit_try_run_case+0x170/0x3f0
[   18.829356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.829401]  kthread+0x328/0x630
[   18.829457]  ret_from_fork+0x10/0x20
[   18.829638] 
[   18.829694] Freed by task 259:
[   18.829723]  kasan_save_stack+0x3c/0x68
[   18.829766]  kasan_save_track+0x20/0x40
[   18.829846]  kasan_save_free_info+0x4c/0x78
[   18.829889]  __kasan_slab_free+0x6c/0x98
[   18.829939]  kfree+0x214/0x3c8
[   18.829975]  kasan_strings+0x24c/0xb00
[   18.830013]  kunit_try_run_case+0x170/0x3f0
[   18.830054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.830100]  kthread+0x328/0x630
[   18.830134]  ret_from_fork+0x10/0x20
[   18.830749] 
[   18.830816] The buggy address belongs to the object at fff00000c79c3ac0
[   18.830816]  which belongs to the cache kmalloc-32 of size 32
[   18.830878] The buggy address is located 16 bytes inside of
[   18.830878]  freed 32-byte region [fff00000c79c3ac0, fff00000c79c3ae0)
[   18.830974] 
[   18.830998] The buggy address belongs to the physical page:
[   18.831030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079c3
[   18.831084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.831332] page_type: f5(slab)
[   18.831400] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.831626] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.831716] page dumped because: kasan: bad access detected
[   18.831797] 
[   18.831851] Memory state around the buggy address:
[   18.831886]  fff00000c79c3980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.831944]  fff00000c79c3a00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.831989] >fff00000c79c3a80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   18.832030]                                                  ^
[   18.832071]  fff00000c79c3b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.832126]  fff00000c79c3b80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   18.832168] ==================================================================

[   19.067289] ==================================================================
[   19.067547] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   19.067642] Read of size 1 at addr fff00000c5b41290 by task kunit_try_catch/259
[   19.067696] 
[   19.068228] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.068994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.069119] Hardware name: linux,dummy-virt (DT)
[   19.069164] Call trace:
[   19.069191]  show_stack+0x20/0x38 (C)
[   19.069246]  dump_stack_lvl+0x8c/0xd0
[   19.069773]  print_report+0x118/0x5d0
[   19.069845]  kasan_report+0xdc/0x128
[   19.070060]  __asan_report_load1_noabort+0x20/0x30
[   19.070227]  kasan_strings+0x95c/0xb00
[   19.070416]  kunit_try_run_case+0x170/0x3f0
[   19.070747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.070808]  kthread+0x328/0x630
[   19.070852]  ret_from_fork+0x10/0x20
[   19.071103] 
[   19.071417] Allocated by task 259:
[   19.071585]  kasan_save_stack+0x3c/0x68
[   19.071651]  kasan_save_track+0x20/0x40
[   19.071953]  kasan_save_alloc_info+0x40/0x58
[   19.072002]  __kasan_kmalloc+0xd4/0xd8
[   19.072454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.072711]  kasan_strings+0xc8/0xb00
[   19.072762]  kunit_try_run_case+0x170/0x3f0
[   19.072804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.073140]  kthread+0x328/0x630
[   19.073177]  ret_from_fork+0x10/0x20
[   19.073215] 
[   19.073238] Freed by task 259:
[   19.073604]  kasan_save_stack+0x3c/0x68
[   19.073668]  kasan_save_track+0x20/0x40
[   19.073708]  kasan_save_free_info+0x4c/0x78
[   19.073752]  __kasan_slab_free+0x6c/0x98
[   19.074093]  kfree+0x214/0x3c8
[   19.074141]  kasan_strings+0x24c/0xb00
[   19.074179]  kunit_try_run_case+0x170/0x3f0
[   19.074738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.074797]  kthread+0x328/0x630
[   19.074833]  ret_from_fork+0x10/0x20
[   19.074871] 
[   19.074894] The buggy address belongs to the object at fff00000c5b41280
[   19.074894]  which belongs to the cache kmalloc-32 of size 32
[   19.075360] The buggy address is located 16 bytes inside of
[   19.075360]  freed 32-byte region [fff00000c5b41280, fff00000c5b412a0)
[   19.075591] 
[   19.075629] The buggy address belongs to the physical page:
[   19.076104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b41
[   19.076186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.076301] page_type: f5(slab)
[   19.076478] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.076534] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.077035] page dumped because: kasan: bad access detected
[   19.077087] 
[   19.077108] Memory state around the buggy address:
[   19.077147]  fff00000c5b41180: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.077663]  fff00000c5b41200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.078015] >fff00000c5b41280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.078130]                          ^
[   19.078474]  fff00000c5b41300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.078627]  fff00000c5b41380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.078671] ==================================================================

[   14.650788] ==================================================================
[   14.651844] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   14.652091] Read of size 1 at addr ffff8881039514d0 by task kunit_try_catch/277
[   14.652452] 
[   14.652645] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.652697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.652722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.652742] Call Trace:
[   14.652759]  <TASK>
[   14.652775]  dump_stack_lvl+0x73/0xb0
[   14.652805]  print_report+0xd1/0x610
[   14.652828]  ? __virt_addr_valid+0x1db/0x2d0
[   14.652852]  ? kasan_strings+0xcbc/0xe80
[   14.652873]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.652896]  ? kasan_strings+0xcbc/0xe80
[   14.652918]  kasan_report+0x141/0x180
[   14.652941]  ? kasan_strings+0xcbc/0xe80
[   14.652968]  __asan_report_load1_noabort+0x18/0x20
[   14.653003]  kasan_strings+0xcbc/0xe80
[   14.653023]  ? trace_hardirqs_on+0x37/0xe0
[   14.653048]  ? __pfx_kasan_strings+0x10/0x10
[   14.653080]  ? finish_task_switch.isra.0+0x153/0x700
[   14.653103]  ? __switch_to+0x47/0xf50
[   14.653129]  ? __schedule+0x10c6/0x2b60
[   14.653152]  ? __pfx_read_tsc+0x10/0x10
[   14.653173]  ? ktime_get_ts64+0x86/0x230
[   14.653198]  kunit_try_run_case+0x1a5/0x480
[   14.653223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.653246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.653270]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.653294]  ? __kthread_parkme+0x82/0x180
[   14.653317]  ? preempt_count_sub+0x50/0x80
[   14.653342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.653366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.653390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.653424]  kthread+0x337/0x6f0
[   14.653445]  ? trace_preempt_on+0x20/0xc0
[   14.653468]  ? __pfx_kthread+0x10/0x10
[   14.653490]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.653512]  ? calculate_sigpending+0x7b/0xa0
[   14.653538]  ? __pfx_kthread+0x10/0x10
[   14.653560]  ret_from_fork+0x116/0x1d0
[   14.653579]  ? __pfx_kthread+0x10/0x10
[   14.653600]  ret_from_fork_asm+0x1a/0x30
[   14.653633]  </TASK>
[   14.653644] 
[   14.661589] Allocated by task 277:
[   14.661747]  kasan_save_stack+0x45/0x70
[   14.661962]  kasan_save_track+0x18/0x40
[   14.662159]  kasan_save_alloc_info+0x3b/0x50
[   14.662411]  __kasan_kmalloc+0xb7/0xc0
[   14.662618]  __kmalloc_cache_noprof+0x189/0x420
[   14.662822]  kasan_strings+0xc0/0xe80
[   14.662993]  kunit_try_run_case+0x1a5/0x480
[   14.663171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.663417]  kthread+0x337/0x6f0
[   14.663543]  ret_from_fork+0x116/0x1d0
[   14.663875]  ret_from_fork_asm+0x1a/0x30
[   14.665307] 
[   14.665404] Freed by task 277:
[   14.665524]  kasan_save_stack+0x45/0x70
[   14.665898]  kasan_save_track+0x18/0x40
[   14.666288]  kasan_save_free_info+0x3f/0x60
[   14.666713]  __kasan_slab_free+0x56/0x70
[   14.667017]  kfree+0x222/0x3f0
[   14.667138]  kasan_strings+0x2aa/0xe80
[   14.667271]  kunit_try_run_case+0x1a5/0x480
[   14.667424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.667657]  kthread+0x337/0x6f0
[   14.668015]  ret_from_fork+0x116/0x1d0
[   14.668371]  ret_from_fork_asm+0x1a/0x30
[   14.668782] 
[   14.668943] The buggy address belongs to the object at ffff8881039514c0
[   14.668943]  which belongs to the cache kmalloc-32 of size 32
[   14.670024] The buggy address is located 16 bytes inside of
[   14.670024]  freed 32-byte region [ffff8881039514c0, ffff8881039514e0)
[   14.670844] 
[   14.670922] The buggy address belongs to the physical page:
[   14.671094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103951
[   14.671334] flags: 0x200000000000000(node=0|zone=2)
[   14.671799] page_type: f5(slab)
[   14.672106] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.672803] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.673451] page dumped because: kasan: bad access detected
[   14.673964] 
[   14.674130] Memory state around the buggy address:
[   14.674563]  ffff888103951380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.675104]  ffff888103951400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.675320] >ffff888103951480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.675543]                                                  ^
[   14.676050]  ffff888103951500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.676691]  ffff888103951580: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.677279] ==================================================================

[   14.748663] ==================================================================
[   14.748932] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   14.749257] Read of size 1 at addr ffff8881027c0890 by task kunit_try_catch/277
[   14.749637] 
[   14.749761] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.749805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.749817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.749841] Call Trace:
[   14.749855]  <TASK>
[   14.749987]  dump_stack_lvl+0x73/0xb0
[   14.750021]  print_report+0xd1/0x610
[   14.750044]  ? __virt_addr_valid+0x1db/0x2d0
[   14.750066]  ? kasan_strings+0xcbc/0xe80
[   14.750086]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.750107]  ? kasan_strings+0xcbc/0xe80
[   14.750128]  kasan_report+0x141/0x180
[   14.750163]  ? kasan_strings+0xcbc/0xe80
[   14.750191]  __asan_report_load1_noabort+0x18/0x20
[   14.750214]  kasan_strings+0xcbc/0xe80
[   14.750234]  ? trace_hardirqs_on+0x37/0xe0
[   14.750257]  ? __pfx_kasan_strings+0x10/0x10
[   14.750278]  ? finish_task_switch.isra.0+0x153/0x700
[   14.750300]  ? __switch_to+0x47/0xf50
[   14.750326]  ? __schedule+0x10c6/0x2b60
[   14.750348]  ? __pfx_read_tsc+0x10/0x10
[   14.750368]  ? ktime_get_ts64+0x86/0x230
[   14.750392]  kunit_try_run_case+0x1a5/0x480
[   14.750417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.750439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.750462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.750485]  ? __kthread_parkme+0x82/0x180
[   14.750505]  ? preempt_count_sub+0x50/0x80
[   14.750527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.750551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.750574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.750597]  kthread+0x337/0x6f0
[   14.750616]  ? trace_preempt_on+0x20/0xc0
[   14.750637]  ? __pfx_kthread+0x10/0x10
[   14.750657]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.750678]  ? calculate_sigpending+0x7b/0xa0
[   14.750711]  ? __pfx_kthread+0x10/0x10
[   14.750732]  ret_from_fork+0x116/0x1d0
[   14.750750]  ? __pfx_kthread+0x10/0x10
[   14.750769]  ret_from_fork_asm+0x1a/0x30
[   14.750799]  </TASK>
[   14.750809] 
[   14.759290] Allocated by task 277:
[   14.759465]  kasan_save_stack+0x45/0x70
[   14.759647]  kasan_save_track+0x18/0x40
[   14.759784]  kasan_save_alloc_info+0x3b/0x50
[   14.759935]  __kasan_kmalloc+0xb7/0xc0
[   14.760068]  __kmalloc_cache_noprof+0x189/0x420
[   14.760344]  kasan_strings+0xc0/0xe80
[   14.760581]  kunit_try_run_case+0x1a5/0x480
[   14.760792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.761265]  kthread+0x337/0x6f0
[   14.761563]  ret_from_fork+0x116/0x1d0
[   14.761720]  ret_from_fork_asm+0x1a/0x30
[   14.761889] 
[   14.761984] Freed by task 277:
[   14.762141]  kasan_save_stack+0x45/0x70
[   14.762501]  kasan_save_track+0x18/0x40
[   14.762675]  kasan_save_free_info+0x3f/0x60
[   14.762959]  __kasan_slab_free+0x56/0x70
[   14.763135]  kfree+0x222/0x3f0
[   14.763325]  kasan_strings+0x2aa/0xe80
[   14.763464]  kunit_try_run_case+0x1a5/0x480
[   14.763677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.763908]  kthread+0x337/0x6f0
[   14.764134]  ret_from_fork+0x116/0x1d0
[   14.764284]  ret_from_fork_asm+0x1a/0x30
[   14.764496] 
[   14.764593] The buggy address belongs to the object at ffff8881027c0880
[   14.764593]  which belongs to the cache kmalloc-32 of size 32
[   14.765188] The buggy address is located 16 bytes inside of
[   14.765188]  freed 32-byte region [ffff8881027c0880, ffff8881027c08a0)
[   14.765657] 
[   14.765757] The buggy address belongs to the physical page:
[   14.766114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c0
[   14.766546] flags: 0x200000000000000(node=0|zone=2)
[   14.766765] page_type: f5(slab)
[   14.767029] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.767285] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.767518] page dumped because: kasan: bad access detected
[   14.767696] 
[   14.767767] Memory state around the buggy address:
[   14.767927]  ffff8881027c0780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.768259]  ffff8881027c0800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.768847] >ffff8881027c0880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.769472]                          ^
[   14.769606]  ffff8881027c0900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.769824]  ffff8881027c0980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.770038] ==================================================================