Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.752323] ==================================================================
[   16.752396] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   16.752779] Read of size 1 at addr fff00000c78098a8 by task kunit_try_catch/188
[   16.752886] 
[   16.752940] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.753312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.753408] Hardware name: linux,dummy-virt (DT)
[   16.753486] Call trace:
[   16.753510]  show_stack+0x20/0x38 (C)
[   16.753573]  dump_stack_lvl+0x8c/0xd0
[   16.753620]  print_report+0x118/0x5d0
[   16.753921]  kasan_report+0xdc/0x128
[   16.754175]  __asan_report_load1_noabort+0x20/0x30
[   16.754258]  kmalloc_uaf2+0x3f4/0x468
[   16.754305]  kunit_try_run_case+0x170/0x3f0
[   16.754352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.754634]  kthread+0x328/0x630
[   16.754847]  ret_from_fork+0x10/0x20
[   16.755270] 
[   16.755378] Allocated by task 188:
[   16.755413]  kasan_save_stack+0x3c/0x68
[   16.755670]  kasan_save_track+0x20/0x40
[   16.756153]  kasan_save_alloc_info+0x40/0x58
[   16.756217]  __kasan_kmalloc+0xd4/0xd8
[   16.756256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.756615]  kmalloc_uaf2+0xc4/0x468
[   16.756748]  kunit_try_run_case+0x170/0x3f0
[   16.757111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.757306]  kthread+0x328/0x630
[   16.757342]  ret_from_fork+0x10/0x20
[   16.757507] 
[   16.757707] Freed by task 188:
[   16.757758]  kasan_save_stack+0x3c/0x68
[   16.757995]  kasan_save_track+0x20/0x40
[   16.758241]  kasan_save_free_info+0x4c/0x78
[   16.758335]  __kasan_slab_free+0x6c/0x98
[   16.758388]  kfree+0x214/0x3c8
[   16.758438]  kmalloc_uaf2+0x134/0x468
[   16.758474]  kunit_try_run_case+0x170/0x3f0
[   16.758520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.758564]  kthread+0x328/0x630
[   16.758597]  ret_from_fork+0x10/0x20
[   16.758641] 
[   16.758694] The buggy address belongs to the object at fff00000c7809880
[   16.758694]  which belongs to the cache kmalloc-64 of size 64
[   16.758758] The buggy address is located 40 bytes inside of
[   16.758758]  freed 64-byte region [fff00000c7809880, fff00000c78098c0)
[   16.758821] 
[   16.758854] The buggy address belongs to the physical page:
[   16.758887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107809
[   16.758954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.759006] page_type: f5(slab)
[   16.759055] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.759107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.759167] page dumped because: kasan: bad access detected
[   16.759199] 
[   16.759222] Memory state around the buggy address:
[   16.759269]  fff00000c7809780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.759337]  fff00000c7809800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.759403] >fff00000c7809880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.759444]                                   ^
[   16.759475]  fff00000c7809900: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   16.759543]  fff00000c7809980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759593] ==================================================================

[   16.730652] ==================================================================
[   16.730716] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   16.731190] Read of size 1 at addr fff00000c6a205a8 by task kunit_try_catch/188
[   16.731589] 
[   16.731950] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.732189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.732223] Hardware name: linux,dummy-virt (DT)
[   16.732398] Call trace:
[   16.732436]  show_stack+0x20/0x38 (C)
[   16.732490]  dump_stack_lvl+0x8c/0xd0
[   16.732540]  print_report+0x118/0x5d0
[   16.732585]  kasan_report+0xdc/0x128
[   16.732645]  __asan_report_load1_noabort+0x20/0x30
[   16.732706]  kmalloc_uaf2+0x3f4/0x468
[   16.732756]  kunit_try_run_case+0x170/0x3f0
[   16.732809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.732870]  kthread+0x328/0x630
[   16.732918]  ret_from_fork+0x10/0x20
[   16.733392] 
[   16.734197] Allocated by task 188:
[   16.735113]  kasan_save_stack+0x3c/0x68
[   16.735229]  kasan_save_track+0x20/0x40
[   16.735327]  kasan_save_alloc_info+0x40/0x58
[   16.735807]  __kasan_kmalloc+0xd4/0xd8
[   16.736014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.736184]  kmalloc_uaf2+0xc4/0x468
[   16.736593]  kunit_try_run_case+0x170/0x3f0
[   16.736694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.737110]  kthread+0x328/0x630
[   16.737329]  ret_from_fork+0x10/0x20
[   16.737404] 
[   16.737563] Freed by task 188:
[   16.737865]  kasan_save_stack+0x3c/0x68
[   16.738072]  kasan_save_track+0x20/0x40
[   16.738240]  kasan_save_free_info+0x4c/0x78
[   16.738344]  __kasan_slab_free+0x6c/0x98
[   16.738390]  kfree+0x214/0x3c8
[   16.738425]  kmalloc_uaf2+0x134/0x468
[   16.738461]  kunit_try_run_case+0x170/0x3f0
[   16.738501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.738745]  kthread+0x328/0x630
[   16.738898]  ret_from_fork+0x10/0x20
[   16.739073] 
[   16.739143] The buggy address belongs to the object at fff00000c6a20580
[   16.739143]  which belongs to the cache kmalloc-64 of size 64
[   16.739478] The buggy address is located 40 bytes inside of
[   16.739478]  freed 64-byte region [fff00000c6a20580, fff00000c6a205c0)
[   16.739812] 
[   16.739903] The buggy address belongs to the physical page:
[   16.739974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a20
[   16.740081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.740299] page_type: f5(slab)
[   16.740383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.740833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.740895] page dumped because: kasan: bad access detected
[   16.741002] 
[   16.741072] Memory state around the buggy address:
[   16.741118]  fff00000c6a20480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.741367]  fff00000c6a20500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.741537] >fff00000c6a20580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.741580]                                   ^
[   16.741697]  fff00000c6a20600: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   16.741744]  fff00000c6a20680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.741792] ==================================================================

[   12.952036] ==================================================================
[   12.952945] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   12.954113] Read of size 1 at addr ffff888103144fa8 by task kunit_try_catch/206
[   12.954906] 
[   12.955022] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.955074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.955087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.955111] Call Trace:
[   12.955124]  <TASK>
[   12.955143]  dump_stack_lvl+0x73/0xb0
[   12.955177]  print_report+0xd1/0x610
[   12.955199]  ? __virt_addr_valid+0x1db/0x2d0
[   12.955224]  ? kmalloc_uaf2+0x4a8/0x520
[   12.955244]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.955265]  ? kmalloc_uaf2+0x4a8/0x520
[   12.955286]  kasan_report+0x141/0x180
[   12.955308]  ? kmalloc_uaf2+0x4a8/0x520
[   12.955333]  __asan_report_load1_noabort+0x18/0x20
[   12.955357]  kmalloc_uaf2+0x4a8/0x520
[   12.955376]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   12.955405]  ? finish_task_switch.isra.0+0x153/0x700
[   12.955428]  ? __switch_to+0x47/0xf50
[   12.955456]  ? __schedule+0x10c6/0x2b60
[   12.955478]  ? __pfx_read_tsc+0x10/0x10
[   12.955499]  ? ktime_get_ts64+0x86/0x230
[   12.955526]  kunit_try_run_case+0x1a5/0x480
[   12.955552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.955575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.955598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.955621]  ? __kthread_parkme+0x82/0x180
[   12.955641]  ? preempt_count_sub+0x50/0x80
[   12.955665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.955688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.955711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.955734]  kthread+0x337/0x6f0
[   12.955753]  ? trace_preempt_on+0x20/0xc0
[   12.955778]  ? __pfx_kthread+0x10/0x10
[   12.956136]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.956165]  ? calculate_sigpending+0x7b/0xa0
[   12.956192]  ? __pfx_kthread+0x10/0x10
[   12.956214]  ret_from_fork+0x116/0x1d0
[   12.956233]  ? __pfx_kthread+0x10/0x10
[   12.956254]  ret_from_fork_asm+0x1a/0x30
[   12.956287]  </TASK>
[   12.956300] 
[   12.969032] Allocated by task 206:
[   12.969175]  kasan_save_stack+0x45/0x70
[   12.969325]  kasan_save_track+0x18/0x40
[   12.969497]  kasan_save_alloc_info+0x3b/0x50
[   12.969677]  __kasan_kmalloc+0xb7/0xc0
[   12.969813]  __kmalloc_cache_noprof+0x189/0x420
[   12.969974]  kmalloc_uaf2+0xc6/0x520
[   12.970104]  kunit_try_run_case+0x1a5/0x480
[   12.970321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.970823]  kthread+0x337/0x6f0
[   12.971249]  ret_from_fork+0x116/0x1d0
[   12.971413]  ret_from_fork_asm+0x1a/0x30
[   12.972287] 
[   12.972369] Freed by task 206:
[   12.973018]  kasan_save_stack+0x45/0x70
[   12.973260]  kasan_save_track+0x18/0x40
[   12.973638]  kasan_save_free_info+0x3f/0x60
[   12.973834]  __kasan_slab_free+0x56/0x70
[   12.974216]  kfree+0x222/0x3f0
[   12.974414]  kmalloc_uaf2+0x14c/0x520
[   12.974817]  kunit_try_run_case+0x1a5/0x480
[   12.975136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.975383]  kthread+0x337/0x6f0
[   12.975731]  ret_from_fork+0x116/0x1d0
[   12.975931]  ret_from_fork_asm+0x1a/0x30
[   12.976228] 
[   12.976337] The buggy address belongs to the object at ffff888103144f80
[   12.976337]  which belongs to the cache kmalloc-64 of size 64
[   12.977027] The buggy address is located 40 bytes inside of
[   12.977027]  freed 64-byte region [ffff888103144f80, ffff888103144fc0)
[   12.977738] 
[   12.977997] The buggy address belongs to the physical page:
[   12.978229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103144
[   12.978721] flags: 0x200000000000000(node=0|zone=2)
[   12.979020] page_type: f5(slab)
[   12.979220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.979755] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   12.980222] page dumped because: kasan: bad access detected
[   12.980468] 
[   12.980568] Memory state around the buggy address:
[   12.980993]  ffff888103144e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.981468]  ffff888103144f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.982033] >ffff888103144f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.982617]                                   ^
[   12.982832]  ffff888103145000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.983433]  ffff888103145080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.983874] ==================================================================

[   13.098454] ==================================================================
[   13.099571] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   13.100170] Read of size 1 at addr ffff888102a52328 by task kunit_try_catch/205
[   13.100896] 
[   13.101207] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.101259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.101272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.101293] Call Trace:
[   13.101307]  <TASK>
[   13.101323]  dump_stack_lvl+0x73/0xb0
[   13.101357]  print_report+0xd1/0x610
[   13.101380]  ? __virt_addr_valid+0x1db/0x2d0
[   13.101403]  ? kmalloc_uaf2+0x4a8/0x520
[   13.101422]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.101443]  ? kmalloc_uaf2+0x4a8/0x520
[   13.101463]  kasan_report+0x141/0x180
[   13.101483]  ? kmalloc_uaf2+0x4a8/0x520
[   13.101507]  __asan_report_load1_noabort+0x18/0x20
[   13.101529]  kmalloc_uaf2+0x4a8/0x520
[   13.101549]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   13.101567]  ? finish_task_switch.isra.0+0x153/0x700
[   13.101589]  ? __switch_to+0x47/0xf50
[   13.101615]  ? __schedule+0x10c6/0x2b60
[   13.101637]  ? __pfx_read_tsc+0x10/0x10
[   13.101657]  ? ktime_get_ts64+0x86/0x230
[   13.101680]  kunit_try_run_case+0x1a5/0x480
[   13.101705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.101726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.101749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.101771]  ? __kthread_parkme+0x82/0x180
[   13.101791]  ? preempt_count_sub+0x50/0x80
[   13.101814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.101837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.101984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.102008]  kthread+0x337/0x6f0
[   13.102028]  ? trace_preempt_on+0x20/0xc0
[   13.102051]  ? __pfx_kthread+0x10/0x10
[   13.102071]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.102091]  ? calculate_sigpending+0x7b/0xa0
[   13.102166]  ? __pfx_kthread+0x10/0x10
[   13.102188]  ret_from_fork+0x116/0x1d0
[   13.102206]  ? __pfx_kthread+0x10/0x10
[   13.102225]  ret_from_fork_asm+0x1a/0x30
[   13.102257]  </TASK>
[   13.102268] 
[   13.112537] Allocated by task 205:
[   13.112806]  kasan_save_stack+0x45/0x70
[   13.113162]  kasan_save_track+0x18/0x40
[   13.113973]  kasan_save_alloc_info+0x3b/0x50
[   13.114334]  __kasan_kmalloc+0xb7/0xc0
[   13.114574]  __kmalloc_cache_noprof+0x189/0x420
[   13.114962]  kmalloc_uaf2+0xc6/0x520
[   13.115271]  kunit_try_run_case+0x1a5/0x480
[   13.115561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.115797]  kthread+0x337/0x6f0
[   13.116203]  ret_from_fork+0x116/0x1d0
[   13.116423]  ret_from_fork_asm+0x1a/0x30
[   13.116980] 
[   13.117157] Freed by task 205:
[   13.117317]  kasan_save_stack+0x45/0x70
[   13.117620]  kasan_save_track+0x18/0x40
[   13.117882]  kasan_save_free_info+0x3f/0x60
[   13.118133]  __kasan_slab_free+0x56/0x70
[   13.118420]  kfree+0x222/0x3f0
[   13.118590]  kmalloc_uaf2+0x14c/0x520
[   13.118737]  kunit_try_run_case+0x1a5/0x480
[   13.118940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.119205]  kthread+0x337/0x6f0
[   13.119495]  ret_from_fork+0x116/0x1d0
[   13.119638]  ret_from_fork_asm+0x1a/0x30
[   13.119818] 
[   13.120041] The buggy address belongs to the object at ffff888102a52300
[   13.120041]  which belongs to the cache kmalloc-64 of size 64
[   13.120832] The buggy address is located 40 bytes inside of
[   13.120832]  freed 64-byte region [ffff888102a52300, ffff888102a52340)
[   13.121797] 
[   13.122056] The buggy address belongs to the physical page:
[   13.122652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a52
[   13.123083] flags: 0x200000000000000(node=0|zone=2)
[   13.123551] page_type: f5(slab)
[   13.123692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.124328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.124899] page dumped because: kasan: bad access detected
[   13.125318] 
[   13.125444] Memory state around the buggy address:
[   13.125994]  ffff888102a52200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.126458]  ffff888102a52280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.126911] >ffff888102a52300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.127311]                                   ^
[   13.127484]  ffff888102a52380: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   13.127819]  ffff888102a52400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.128134] ==================================================================