Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.840353] ================================================================== [ 18.840890] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 18.841095] Read of size 1 at addr fff00000c79c3ad0 by task kunit_try_catch/259 [ 18.841295] [ 18.841424] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.841737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.841776] Hardware name: linux,dummy-virt (DT) [ 18.841865] Call trace: [ 18.841892] show_stack+0x20/0x38 (C) [ 18.841957] dump_stack_lvl+0x8c/0xd0 [ 18.842034] print_report+0x118/0x5d0 [ 18.842083] kasan_report+0xdc/0x128 [ 18.842156] __asan_report_load1_noabort+0x20/0x30 [ 18.842210] strnlen+0x80/0x88 [ 18.842494] kasan_strings+0x478/0xb00 [ 18.842942] kunit_try_run_case+0x170/0x3f0 [ 18.843215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.843271] kthread+0x328/0x630 [ 18.843316] ret_from_fork+0x10/0x20 [ 18.843545] [ 18.843692] Allocated by task 259: [ 18.843758] kasan_save_stack+0x3c/0x68 [ 18.843832] kasan_save_track+0x20/0x40 [ 18.843874] kasan_save_alloc_info+0x40/0x58 [ 18.843927] __kasan_kmalloc+0xd4/0xd8 [ 18.844006] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.844125] kasan_strings+0xc8/0xb00 [ 18.844703] kunit_try_run_case+0x170/0x3f0 [ 18.844828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.845020] kthread+0x328/0x630 [ 18.845215] ret_from_fork+0x10/0x20 [ 18.845261] [ 18.845389] Freed by task 259: [ 18.845519] kasan_save_stack+0x3c/0x68 [ 18.846124] kasan_save_track+0x20/0x40 [ 18.846177] kasan_save_free_info+0x4c/0x78 [ 18.846220] __kasan_slab_free+0x6c/0x98 [ 18.846264] kfree+0x214/0x3c8 [ 18.846301] kasan_strings+0x24c/0xb00 [ 18.846340] kunit_try_run_case+0x170/0x3f0 [ 18.846413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.846542] kthread+0x328/0x630 [ 18.846578] ret_from_fork+0x10/0x20 [ 18.846616] [ 18.846654] The buggy address belongs to the object at fff00000c79c3ac0 [ 18.846654] which belongs to the cache kmalloc-32 of size 32 [ 18.846770] The buggy address is located 16 bytes inside of [ 18.846770] freed 32-byte region [fff00000c79c3ac0, fff00000c79c3ae0) [ 18.846836] [ 18.846922] The buggy address belongs to the physical page: [ 18.847099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079c3 [ 18.847208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.847755] page_type: f5(slab) [ 18.847811] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.847866] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.847919] page dumped because: kasan: bad access detected [ 18.848006] [ 18.848093] Memory state around the buggy address: [ 18.848133] fff00000c79c3980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.848317] fff00000c79c3a00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 18.848364] >fff00000c79c3a80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 18.848406] ^ [ 18.848506] fff00000c79c3b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.848659] fff00000c79c3b80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 18.848732] ==================================================================
[ 19.095768] ================================================================== [ 19.096170] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 19.096434] Read of size 1 at addr fff00000c5b41290 by task kunit_try_catch/259 [ 19.096488] [ 19.096525] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.096611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.097130] Hardware name: linux,dummy-virt (DT) [ 19.097207] Call trace: [ 19.097388] show_stack+0x20/0x38 (C) [ 19.097693] dump_stack_lvl+0x8c/0xd0 [ 19.097758] print_report+0x118/0x5d0 [ 19.098027] kasan_report+0xdc/0x128 [ 19.098211] __asan_report_load1_noabort+0x20/0x30 [ 19.098737] strnlen+0x80/0x88 [ 19.098787] kasan_strings+0x478/0xb00 [ 19.098834] kunit_try_run_case+0x170/0x3f0 [ 19.099462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.099538] kthread+0x328/0x630 [ 19.099950] ret_from_fork+0x10/0x20 [ 19.100142] [ 19.100467] Allocated by task 259: [ 19.100638] kasan_save_stack+0x3c/0x68 [ 19.100700] kasan_save_track+0x20/0x40 [ 19.100767] kasan_save_alloc_info+0x40/0x58 [ 19.100810] __kasan_kmalloc+0xd4/0xd8 [ 19.100851] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.100893] kasan_strings+0xc8/0xb00 [ 19.101301] kunit_try_run_case+0x170/0x3f0 [ 19.101384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.101432] kthread+0x328/0x630 [ 19.101751] ret_from_fork+0x10/0x20 [ 19.101823] [ 19.101978] Freed by task 259: [ 19.102170] kasan_save_stack+0x3c/0x68 [ 19.102320] kasan_save_track+0x20/0x40 [ 19.102365] kasan_save_free_info+0x4c/0x78 [ 19.102486] __kasan_slab_free+0x6c/0x98 [ 19.102554] kfree+0x214/0x3c8 [ 19.102590] kasan_strings+0x24c/0xb00 [ 19.102859] kunit_try_run_case+0x170/0x3f0 [ 19.103032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.103389] kthread+0x328/0x630 [ 19.103502] ret_from_fork+0x10/0x20 [ 19.103815] [ 19.103863] The buggy address belongs to the object at fff00000c5b41280 [ 19.103863] which belongs to the cache kmalloc-32 of size 32 [ 19.104112] The buggy address is located 16 bytes inside of [ 19.104112] freed 32-byte region [fff00000c5b41280, fff00000c5b412a0) [ 19.104581] [ 19.104711] The buggy address belongs to the physical page: [ 19.104746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b41 [ 19.104804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.105287] page_type: f5(slab) [ 19.105349] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.105413] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.105476] page dumped because: kasan: bad access detected [ 19.105695] [ 19.105717] Memory state around the buggy address: [ 19.105755] fff00000c5b41180: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.106221] fff00000c5b41200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.106608] >fff00000c5b41280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.106877] ^ [ 19.107204] fff00000c5b41300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.107469] fff00000c5b41380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.107660] ==================================================================
[ 14.698232] ================================================================== [ 14.698560] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 14.699139] Read of size 1 at addr ffff8881039514d0 by task kunit_try_catch/277 [ 14.699760] [ 14.699878] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.699924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.699936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.699958] Call Trace: [ 14.699973] <TASK> [ 14.699989] dump_stack_lvl+0x73/0xb0 [ 14.700019] print_report+0xd1/0x610 [ 14.700043] ? __virt_addr_valid+0x1db/0x2d0 [ 14.700067] ? strnlen+0x73/0x80 [ 14.700086] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.700109] ? strnlen+0x73/0x80 [ 14.700127] kasan_report+0x141/0x180 [ 14.700149] ? strnlen+0x73/0x80 [ 14.700174] __asan_report_load1_noabort+0x18/0x20 [ 14.700198] strnlen+0x73/0x80 [ 14.700218] kasan_strings+0x615/0xe80 [ 14.700239] ? trace_hardirqs_on+0x37/0xe0 [ 14.700263] ? __pfx_kasan_strings+0x10/0x10 [ 14.700284] ? finish_task_switch.isra.0+0x153/0x700 [ 14.700306] ? __switch_to+0x47/0xf50 [ 14.700332] ? __schedule+0x10c6/0x2b60 [ 14.700354] ? __pfx_read_tsc+0x10/0x10 [ 14.700375] ? ktime_get_ts64+0x86/0x230 [ 14.700414] kunit_try_run_case+0x1a5/0x480 [ 14.700440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.700462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.700485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.700510] ? __kthread_parkme+0x82/0x180 [ 14.700531] ? preempt_count_sub+0x50/0x80 [ 14.700555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.700580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.700614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.700638] kthread+0x337/0x6f0 [ 14.700659] ? trace_preempt_on+0x20/0xc0 [ 14.700689] ? __pfx_kthread+0x10/0x10 [ 14.700710] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.700732] ? calculate_sigpending+0x7b/0xa0 [ 14.700757] ? __pfx_kthread+0x10/0x10 [ 14.700779] ret_from_fork+0x116/0x1d0 [ 14.700798] ? __pfx_kthread+0x10/0x10 [ 14.700819] ret_from_fork_asm+0x1a/0x30 [ 14.700852] </TASK> [ 14.700863] [ 14.708270] Allocated by task 277: [ 14.708455] kasan_save_stack+0x45/0x70 [ 14.708720] kasan_save_track+0x18/0x40 [ 14.708928] kasan_save_alloc_info+0x3b/0x50 [ 14.709147] __kasan_kmalloc+0xb7/0xc0 [ 14.709320] __kmalloc_cache_noprof+0x189/0x420 [ 14.709549] kasan_strings+0xc0/0xe80 [ 14.709781] kunit_try_run_case+0x1a5/0x480 [ 14.709983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.710199] kthread+0x337/0x6f0 [ 14.710371] ret_from_fork+0x116/0x1d0 [ 14.710550] ret_from_fork_asm+0x1a/0x30 [ 14.710749] [ 14.710846] Freed by task 277: [ 14.710996] kasan_save_stack+0x45/0x70 [ 14.711142] kasan_save_track+0x18/0x40 [ 14.711333] kasan_save_free_info+0x3f/0x60 [ 14.711499] __kasan_slab_free+0x56/0x70 [ 14.711755] kfree+0x222/0x3f0 [ 14.711925] kasan_strings+0x2aa/0xe80 [ 14.712078] kunit_try_run_case+0x1a5/0x480 [ 14.712284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.712494] kthread+0x337/0x6f0 [ 14.712686] ret_from_fork+0x116/0x1d0 [ 14.712876] ret_from_fork_asm+0x1a/0x30 [ 14.713069] [ 14.713159] The buggy address belongs to the object at ffff8881039514c0 [ 14.713159] which belongs to the cache kmalloc-32 of size 32 [ 14.713588] The buggy address is located 16 bytes inside of [ 14.713588] freed 32-byte region [ffff8881039514c0, ffff8881039514e0) [ 14.714084] [ 14.714167] The buggy address belongs to the physical page: [ 14.714404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103951 [ 14.714689] flags: 0x200000000000000(node=0|zone=2) [ 14.714936] page_type: f5(slab) [ 14.715139] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.715434] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.715782] page dumped because: kasan: bad access detected [ 14.716007] [ 14.716084] Memory state around the buggy address: [ 14.716299] ffff888103951380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.716603] ffff888103951400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.716891] >ffff888103951480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.717161] ^ [ 14.717383] ffff888103951500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.717730] ffff888103951580: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.717951] ==================================================================
[ 14.793417] ================================================================== [ 14.793763] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 14.794074] Read of size 1 at addr ffff8881027c0890 by task kunit_try_catch/277 [ 14.794399] [ 14.794514] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.794558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.794571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.794593] Call Trace: [ 14.794610] <TASK> [ 14.794627] dump_stack_lvl+0x73/0xb0 [ 14.794653] print_report+0xd1/0x610 [ 14.794675] ? __virt_addr_valid+0x1db/0x2d0 [ 14.794697] ? strnlen+0x73/0x80 [ 14.794714] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.794737] ? strnlen+0x73/0x80 [ 14.794754] kasan_report+0x141/0x180 [ 14.794776] ? strnlen+0x73/0x80 [ 14.794797] __asan_report_load1_noabort+0x18/0x20 [ 14.794821] strnlen+0x73/0x80 [ 14.794840] kasan_strings+0x615/0xe80 [ 14.795003] ? trace_hardirqs_on+0x37/0xe0 [ 14.795028] ? __pfx_kasan_strings+0x10/0x10 [ 14.795048] ? finish_task_switch.isra.0+0x153/0x700 [ 14.795069] ? __switch_to+0x47/0xf50 [ 14.795096] ? __schedule+0x10c6/0x2b60 [ 14.795118] ? __pfx_read_tsc+0x10/0x10 [ 14.795141] ? ktime_get_ts64+0x86/0x230 [ 14.795179] kunit_try_run_case+0x1a5/0x480 [ 14.795203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.795225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.795249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.795272] ? __kthread_parkme+0x82/0x180 [ 14.795291] ? preempt_count_sub+0x50/0x80 [ 14.795314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.795337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.795360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.795384] kthread+0x337/0x6f0 [ 14.795403] ? trace_preempt_on+0x20/0xc0 [ 14.795424] ? __pfx_kthread+0x10/0x10 [ 14.795445] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.795465] ? calculate_sigpending+0x7b/0xa0 [ 14.795489] ? __pfx_kthread+0x10/0x10 [ 14.795511] ret_from_fork+0x116/0x1d0 [ 14.795529] ? __pfx_kthread+0x10/0x10 [ 14.795550] ret_from_fork_asm+0x1a/0x30 [ 14.795579] </TASK> [ 14.795590] [ 14.804553] Allocated by task 277: [ 14.804697] kasan_save_stack+0x45/0x70 [ 14.804898] kasan_save_track+0x18/0x40 [ 14.805102] kasan_save_alloc_info+0x3b/0x50 [ 14.805352] __kasan_kmalloc+0xb7/0xc0 [ 14.805547] __kmalloc_cache_noprof+0x189/0x420 [ 14.805772] kasan_strings+0xc0/0xe80 [ 14.806037] kunit_try_run_case+0x1a5/0x480 [ 14.806230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.806575] kthread+0x337/0x6f0 [ 14.806735] ret_from_fork+0x116/0x1d0 [ 14.807161] ret_from_fork_asm+0x1a/0x30 [ 14.807319] [ 14.807393] Freed by task 277: [ 14.807508] kasan_save_stack+0x45/0x70 [ 14.807647] kasan_save_track+0x18/0x40 [ 14.807785] kasan_save_free_info+0x3f/0x60 [ 14.807936] __kasan_slab_free+0x56/0x70 [ 14.808081] kfree+0x222/0x3f0 [ 14.808251] kasan_strings+0x2aa/0xe80 [ 14.808450] kunit_try_run_case+0x1a5/0x480 [ 14.808664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.808915] kthread+0x337/0x6f0 [ 14.809340] ret_from_fork+0x116/0x1d0 [ 14.809548] ret_from_fork_asm+0x1a/0x30 [ 14.809744] [ 14.809840] The buggy address belongs to the object at ffff8881027c0880 [ 14.809840] which belongs to the cache kmalloc-32 of size 32 [ 14.810626] The buggy address is located 16 bytes inside of [ 14.810626] freed 32-byte region [ffff8881027c0880, ffff8881027c08a0) [ 14.811415] [ 14.811522] The buggy address belongs to the physical page: [ 14.811759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027c0 [ 14.812199] flags: 0x200000000000000(node=0|zone=2) [ 14.812429] page_type: f5(slab) [ 14.812556] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.812791] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.813280] page dumped because: kasan: bad access detected [ 14.813692] [ 14.813796] Memory state around the buggy address: [ 14.814167] ffff8881027c0780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.814484] ffff8881027c0800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.814741] >ffff8881027c0880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.815423] ^ [ 14.815617] ffff8881027c0900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.815980] ffff8881027c0980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.816311] ==================================================================