Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.566699] ==================================================================
[   16.566760] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   16.566833] Read of size 16 at addr fff00000c59ab940 by task kunit_try_catch/168
[   16.566918] 
[   16.567074] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.567285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.567412] Hardware name: linux,dummy-virt (DT)
[   16.567572] Call trace:
[   16.567651]  show_stack+0x20/0x38 (C)
[   16.567757]  dump_stack_lvl+0x8c/0xd0
[   16.568176]  print_report+0x118/0x5d0
[   16.568435]  kasan_report+0xdc/0x128
[   16.568493]  __asan_report_load16_noabort+0x20/0x30
[   16.568545]  kmalloc_uaf_16+0x3bc/0x438
[   16.569081]  kunit_try_run_case+0x170/0x3f0
[   16.569221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.569275]  kthread+0x328/0x630
[   16.569318]  ret_from_fork+0x10/0x20
[   16.569464] 
[   16.569483] Allocated by task 168:
[   16.569512]  kasan_save_stack+0x3c/0x68
[   16.569552]  kasan_save_track+0x20/0x40
[   16.569589]  kasan_save_alloc_info+0x40/0x58
[   16.569628]  __kasan_kmalloc+0xd4/0xd8
[   16.569664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.569712]  kmalloc_uaf_16+0x140/0x438
[   16.569748]  kunit_try_run_case+0x170/0x3f0
[   16.569911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.570127]  kthread+0x328/0x630
[   16.570164]  ret_from_fork+0x10/0x20
[   16.570291] 
[   16.570312] Freed by task 168:
[   16.570386]  kasan_save_stack+0x3c/0x68
[   16.570592]  kasan_save_track+0x20/0x40
[   16.570634]  kasan_save_free_info+0x4c/0x78
[   16.570706]  __kasan_slab_free+0x6c/0x98
[   16.570743]  kfree+0x214/0x3c8
[   16.570777]  kmalloc_uaf_16+0x190/0x438
[   16.570832]  kunit_try_run_case+0x170/0x3f0
[   16.571025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.571213]  kthread+0x328/0x630
[   16.571246]  ret_from_fork+0x10/0x20
[   16.571281] 
[   16.571300] The buggy address belongs to the object at fff00000c59ab940
[   16.571300]  which belongs to the cache kmalloc-16 of size 16
[   16.571356] The buggy address is located 0 bytes inside of
[   16.571356]  freed 16-byte region [fff00000c59ab940, fff00000c59ab950)
[   16.571415] 
[   16.571442] The buggy address belongs to the physical page:
[   16.571529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   16.571643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.571691] page_type: f5(slab)
[   16.571730] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.571823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.571927] page dumped because: kasan: bad access detected
[   16.571997] 
[   16.572014] Memory state around the buggy address:
[   16.572070]  fff00000c59ab800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.572118]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   16.572159] >fff00000c59ab900: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   16.572197]                                            ^
[   16.572291]  fff00000c59ab980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572333]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.572370] ==================================================================

[   16.547055] ==================================================================
[   16.547670] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   16.547744] Read of size 16 at addr fff00000c1375b60 by task kunit_try_catch/168
[   16.547796] 
[   16.547924] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.548034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.548494] Hardware name: linux,dummy-virt (DT)
[   16.548653] Call trace:
[   16.548735]  show_stack+0x20/0x38 (C)
[   16.548831]  dump_stack_lvl+0x8c/0xd0
[   16.549051]  print_report+0x118/0x5d0
[   16.549303]  kasan_report+0xdc/0x128
[   16.549364]  __asan_report_load16_noabort+0x20/0x30
[   16.549416]  kmalloc_uaf_16+0x3bc/0x438
[   16.549601]  kunit_try_run_case+0x170/0x3f0
[   16.549900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.550007]  kthread+0x328/0x630
[   16.550265]  ret_from_fork+0x10/0x20
[   16.550795] 
[   16.550896] Allocated by task 168:
[   16.550951]  kasan_save_stack+0x3c/0x68
[   16.551003]  kasan_save_track+0x20/0x40
[   16.551061]  kasan_save_alloc_info+0x40/0x58
[   16.551102]  __kasan_kmalloc+0xd4/0xd8
[   16.551139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.551186]  kmalloc_uaf_16+0x140/0x438
[   16.551230]  kunit_try_run_case+0x170/0x3f0
[   16.551269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551313]  kthread+0x328/0x630
[   16.551346]  ret_from_fork+0x10/0x20
[   16.551382] 
[   16.551400] Freed by task 168:
[   16.551426]  kasan_save_stack+0x3c/0x68
[   16.551464]  kasan_save_track+0x20/0x40
[   16.551500]  kasan_save_free_info+0x4c/0x78
[   16.551548]  __kasan_slab_free+0x6c/0x98
[   16.551584]  kfree+0x214/0x3c8
[   16.551628]  kmalloc_uaf_16+0x190/0x438
[   16.551663]  kunit_try_run_case+0x170/0x3f0
[   16.551700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551752]  kthread+0x328/0x630
[   16.551784]  ret_from_fork+0x10/0x20
[   16.551839] 
[   16.551871] The buggy address belongs to the object at fff00000c1375b60
[   16.551871]  which belongs to the cache kmalloc-16 of size 16
[   16.551937] The buggy address is located 0 bytes inside of
[   16.551937]  freed 16-byte region [fff00000c1375b60, fff00000c1375b70)
[   16.551997] 
[   16.552036] The buggy address belongs to the physical page:
[   16.552068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   16.552130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.552179] page_type: f5(slab)
[   16.552219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.552278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.552317] page dumped because: kasan: bad access detected
[   16.552356] 
[   16.552373] Memory state around the buggy address:
[   16.552413]  fff00000c1375a00: 00 07 fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.552456]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.552499] >fff00000c1375b00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   16.552536]                                                        ^
[   16.552573]  fff00000c1375b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.552615]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.553118] ==================================================================

[   12.682842] ==================================================================
[   12.683427] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   12.683718] Read of size 16 at addr ffff8881017e0420 by task kunit_try_catch/186
[   12.684161] 
[   12.684271] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.684316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.684328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.684349] Call Trace:
[   12.684363]  <TASK>
[   12.684379]  dump_stack_lvl+0x73/0xb0
[   12.684422]  print_report+0xd1/0x610
[   12.684446]  ? __virt_addr_valid+0x1db/0x2d0
[   12.684468]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.684489]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.684511]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.684531]  kasan_report+0x141/0x180
[   12.684553]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.684578]  __asan_report_load16_noabort+0x18/0x20
[   12.684603]  kmalloc_uaf_16+0x47b/0x4c0
[   12.684624]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   12.684647]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   12.684678]  ? __pfx_read_tsc+0x10/0x10
[   12.684698]  ? ktime_get_ts64+0x86/0x230
[   12.684724]  kunit_try_run_case+0x1a5/0x480
[   12.684748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.684769]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   12.684791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.684814]  ? __kthread_parkme+0x82/0x180
[   12.684834]  ? preempt_count_sub+0x50/0x80
[   12.684858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.684881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.684904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.684927]  kthread+0x337/0x6f0
[   12.684946]  ? trace_preempt_on+0x20/0xc0
[   12.684969]  ? __pfx_kthread+0x10/0x10
[   12.685001]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.685022]  ? calculate_sigpending+0x7b/0xa0
[   12.685061]  ? __pfx_kthread+0x10/0x10
[   12.685082]  ret_from_fork+0x116/0x1d0
[   12.685100]  ? __pfx_kthread+0x10/0x10
[   12.685120]  ret_from_fork_asm+0x1a/0x30
[   12.685152]  </TASK>
[   12.685162] 
[   12.692565] Allocated by task 186:
[   12.692736]  kasan_save_stack+0x45/0x70
[   12.692925]  kasan_save_track+0x18/0x40
[   12.693259]  kasan_save_alloc_info+0x3b/0x50
[   12.693498]  __kasan_kmalloc+0xb7/0xc0
[   12.693634]  __kmalloc_cache_noprof+0x189/0x420
[   12.693870]  kmalloc_uaf_16+0x15b/0x4c0
[   12.694129]  kunit_try_run_case+0x1a5/0x480
[   12.694337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.694583]  kthread+0x337/0x6f0
[   12.694739]  ret_from_fork+0x116/0x1d0
[   12.694906]  ret_from_fork_asm+0x1a/0x30
[   12.695174] 
[   12.695251] Freed by task 186:
[   12.695364]  kasan_save_stack+0x45/0x70
[   12.695577]  kasan_save_track+0x18/0x40
[   12.695795]  kasan_save_free_info+0x3f/0x60
[   12.695988]  __kasan_slab_free+0x56/0x70
[   12.696209]  kfree+0x222/0x3f0
[   12.696374]  kmalloc_uaf_16+0x1d6/0x4c0
[   12.696571]  kunit_try_run_case+0x1a5/0x480
[   12.696759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.697001]  kthread+0x337/0x6f0
[   12.697217]  ret_from_fork+0x116/0x1d0
[   12.697389]  ret_from_fork_asm+0x1a/0x30
[   12.697585] 
[   12.697673] The buggy address belongs to the object at ffff8881017e0420
[   12.697673]  which belongs to the cache kmalloc-16 of size 16
[   12.698195] The buggy address is located 0 bytes inside of
[   12.698195]  freed 16-byte region [ffff8881017e0420, ffff8881017e0430)
[   12.698853] 
[   12.698939] The buggy address belongs to the physical page:
[   12.699249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017e0
[   12.699645] flags: 0x200000000000000(node=0|zone=2)
[   12.699815] page_type: f5(slab)
[   12.699938] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.700172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.700411] page dumped because: kasan: bad access detected
[   12.700584] 
[   12.700654] Memory state around the buggy address:
[   12.700832]  ffff8881017e0300: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   12.701218]  ffff8881017e0380: 00 04 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   12.701566] >ffff8881017e0400: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   12.701896]                                ^
[   12.702391]  ffff8881017e0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.702933]  ffff8881017e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.703820] ==================================================================

[   12.803338] ==================================================================
[   12.803797] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   12.804244] Read of size 16 at addr ffff88810210ec40 by task kunit_try_catch/185
[   12.804547] 
[   12.804686] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.804733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.804745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.804767] Call Trace:
[   12.804779]  <TASK>
[   12.804797]  dump_stack_lvl+0x73/0xb0
[   12.804838]  print_report+0xd1/0x610
[   12.804860]  ? __virt_addr_valid+0x1db/0x2d0
[   12.804883]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.804914]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.804935]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.804955]  kasan_report+0x141/0x180
[   12.804977]  ? kmalloc_uaf_16+0x47b/0x4c0
[   12.805001]  __asan_report_load16_noabort+0x18/0x20
[   12.805024]  kmalloc_uaf_16+0x47b/0x4c0
[   12.805045]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   12.805066]  ? __schedule+0x10c6/0x2b60
[   12.805095]  ? __pfx_read_tsc+0x10/0x10
[   12.805116]  ? ktime_get_ts64+0x86/0x230
[   12.805140]  kunit_try_run_case+0x1a5/0x480
[   12.805182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.805204]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.805227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.805249]  ? __kthread_parkme+0x82/0x180
[   12.805270]  ? preempt_count_sub+0x50/0x80
[   12.805293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.805329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.805352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.805384]  kthread+0x337/0x6f0
[   12.805402]  ? trace_preempt_on+0x20/0xc0
[   12.805425]  ? __pfx_kthread+0x10/0x10
[   12.805456]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.805476]  ? calculate_sigpending+0x7b/0xa0
[   12.805500]  ? __pfx_kthread+0x10/0x10
[   12.805520]  ret_from_fork+0x116/0x1d0
[   12.805538]  ? __pfx_kthread+0x10/0x10
[   12.805566]  ret_from_fork_asm+0x1a/0x30
[   12.805596]  </TASK>
[   12.805606] 
[   12.812396] Allocated by task 185:
[   12.812575]  kasan_save_stack+0x45/0x70
[   12.812807]  kasan_save_track+0x18/0x40
[   12.813028]  kasan_save_alloc_info+0x3b/0x50
[   12.813273]  __kasan_kmalloc+0xb7/0xc0
[   12.813644]  __kmalloc_cache_noprof+0x189/0x420
[   12.813809]  kmalloc_uaf_16+0x15b/0x4c0
[   12.813946]  kunit_try_run_case+0x1a5/0x480
[   12.814169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.814538]  kthread+0x337/0x6f0
[   12.814708]  ret_from_fork+0x116/0x1d0
[   12.814862]  ret_from_fork_asm+0x1a/0x30
[   12.815003] 
[   12.815073] Freed by task 185:
[   12.815222]  kasan_save_stack+0x45/0x70
[   12.815533]  kasan_save_track+0x18/0x40
[   12.815726]  kasan_save_free_info+0x3f/0x60
[   12.815960]  __kasan_slab_free+0x56/0x70
[   12.816125]  kfree+0x222/0x3f0
[   12.816254]  kmalloc_uaf_16+0x1d6/0x4c0
[   12.816396]  kunit_try_run_case+0x1a5/0x480
[   12.816544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.816720]  kthread+0x337/0x6f0
[   12.816901]  ret_from_fork+0x116/0x1d0
[   12.817113]  ret_from_fork_asm+0x1a/0x30
[   12.817315] 
[   12.817411] The buggy address belongs to the object at ffff88810210ec40
[   12.817411]  which belongs to the cache kmalloc-16 of size 16
[   12.818050] The buggy address is located 0 bytes inside of
[   12.818050]  freed 16-byte region [ffff88810210ec40, ffff88810210ec50)
[   12.818406] 
[   12.818518] The buggy address belongs to the physical page:
[   12.818772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   12.819166] flags: 0x200000000000000(node=0|zone=2)
[   12.819593] page_type: f5(slab)
[   12.819772] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.820067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.820449] page dumped because: kasan: bad access detected
[   12.820717] 
[   12.820813] Memory state around the buggy address:
[   12.820988]  ffff88810210eb00: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   12.821217]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.821666] >ffff88810210ec00: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   12.821992]                                            ^
[   12.822233]  ffff88810210ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.822460]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.822997] ==================================================================