Date
June 18, 2025, 6:43 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.400177] ================================================================== [ 21.400310] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 21.400425] Read of size 1 at addr fff00000c6423c00 by task kunit_try_catch/206 [ 21.400562] [ 21.400652] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.400875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.400953] Hardware name: linux,dummy-virt (DT) [ 21.401043] Call trace: [ 21.401098] show_stack+0x20/0x38 (C) [ 21.401218] dump_stack_lvl+0x8c/0xd0 [ 21.401335] print_report+0x118/0x608 [ 21.401456] kasan_report+0xdc/0x128 [ 21.401576] __asan_report_load1_noabort+0x20/0x30 [ 21.401704] ksize_uaf+0x598/0x5f8 [ 21.401811] kunit_try_run_case+0x170/0x3f0 [ 21.401934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.403206] kthread+0x328/0x630 [ 21.403348] ret_from_fork+0x10/0x20 [ 21.403450] [ 21.403485] Allocated by task 206: [ 21.403535] kasan_save_stack+0x3c/0x68 [ 21.403604] kasan_save_track+0x20/0x40 [ 21.403677] kasan_save_alloc_info+0x40/0x58 [ 21.404267] __kasan_kmalloc+0xd4/0xd8 [ 21.404491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.404920] ksize_uaf+0xb8/0x5f8 [ 21.405089] kunit_try_run_case+0x170/0x3f0 [ 21.405362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.405541] kthread+0x328/0x630 [ 21.405624] ret_from_fork+0x10/0x20 [ 21.405875] [ 21.405940] Freed by task 206: [ 21.406164] kasan_save_stack+0x3c/0x68 [ 21.406254] kasan_save_track+0x20/0x40 [ 21.406351] kasan_save_free_info+0x4c/0x78 [ 21.407312] __kasan_slab_free+0x6c/0x98 [ 21.407407] kfree+0x214/0x3c8 [ 21.407871] ksize_uaf+0x11c/0x5f8 [ 21.408014] kunit_try_run_case+0x170/0x3f0 [ 21.408154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.408560] kthread+0x328/0x630 [ 21.408682] ret_from_fork+0x10/0x20 [ 21.408809] [ 21.408966] The buggy address belongs to the object at fff00000c6423c00 [ 21.408966] which belongs to the cache kmalloc-128 of size 128 [ 21.409442] The buggy address is located 0 bytes inside of [ 21.409442] freed 128-byte region [fff00000c6423c00, fff00000c6423c80) [ 21.409721] [ 21.409963] The buggy address belongs to the physical page: [ 21.410164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.410454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.410682] page_type: f5(slab) [ 21.410771] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.411202] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.411312] page dumped because: kasan: bad access detected [ 21.411386] [ 21.411440] Memory state around the buggy address: [ 21.411546] fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.411674] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.411766] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.411881] ^ [ 21.411968] fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.412115] fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.412238] ================================================================== [ 21.413491] ================================================================== [ 21.413648] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 21.413756] Read of size 1 at addr fff00000c6423c78 by task kunit_try_catch/206 [ 21.413868] [ 21.413943] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.414161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.414231] Hardware name: linux,dummy-virt (DT) [ 21.414303] Call trace: [ 21.414352] show_stack+0x20/0x38 (C) [ 21.414457] dump_stack_lvl+0x8c/0xd0 [ 21.414564] print_report+0x118/0x608 [ 21.414672] kasan_report+0xdc/0x128 [ 21.414770] __asan_report_load1_noabort+0x20/0x30 [ 21.414887] ksize_uaf+0x544/0x5f8 [ 21.414986] kunit_try_run_case+0x170/0x3f0 [ 21.415104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.415222] kthread+0x328/0x630 [ 21.415318] ret_from_fork+0x10/0x20 [ 21.415427] [ 21.415472] Allocated by task 206: [ 21.415536] kasan_save_stack+0x3c/0x68 [ 21.415624] kasan_save_track+0x20/0x40 [ 21.415739] kasan_save_alloc_info+0x40/0x58 [ 21.415825] __kasan_kmalloc+0xd4/0xd8 [ 21.415934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.416055] ksize_uaf+0xb8/0x5f8 [ 21.416151] kunit_try_run_case+0x170/0x3f0 [ 21.416245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.416332] kthread+0x328/0x630 [ 21.416404] ret_from_fork+0x10/0x20 [ 21.416497] [ 21.416564] Freed by task 206: [ 21.416634] kasan_save_stack+0x3c/0x68 [ 21.416738] kasan_save_track+0x20/0x40 [ 21.416849] kasan_save_free_info+0x4c/0x78 [ 21.417111] __kasan_slab_free+0x6c/0x98 [ 21.417234] kfree+0x214/0x3c8 [ 21.417302] ksize_uaf+0x11c/0x5f8 [ 21.417361] kunit_try_run_case+0x170/0x3f0 [ 21.417457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.417542] kthread+0x328/0x630 [ 21.417636] ret_from_fork+0x10/0x20 [ 21.417709] [ 21.417765] The buggy address belongs to the object at fff00000c6423c00 [ 21.417765] which belongs to the cache kmalloc-128 of size 128 [ 21.417908] The buggy address is located 120 bytes inside of [ 21.417908] freed 128-byte region [fff00000c6423c00, fff00000c6423c80) [ 21.418092] [ 21.418135] The buggy address belongs to the physical page: [ 21.418217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.418340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.418448] page_type: f5(slab) [ 21.418550] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.418641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.418723] page dumped because: kasan: bad access detected [ 21.418798] [ 21.418839] Memory state around the buggy address: [ 21.418900] fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.419010] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.419109] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.419227] ^ [ 21.419358] fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.419487] fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.419611] ================================================================== [ 21.387913] ================================================================== [ 21.388079] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 21.388208] Read of size 1 at addr fff00000c6423c00 by task kunit_try_catch/206 [ 21.388321] [ 21.388404] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.388627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.388703] Hardware name: linux,dummy-virt (DT) [ 21.388782] Call trace: [ 21.388834] show_stack+0x20/0x38 (C) [ 21.388948] dump_stack_lvl+0x8c/0xd0 [ 21.390851] print_report+0x118/0x608 [ 21.391151] kasan_report+0xdc/0x128 [ 21.391496] __kasan_check_byte+0x54/0x70 [ 21.391617] ksize+0x30/0x88 [ 21.391716] ksize_uaf+0x168/0x5f8 [ 21.391811] kunit_try_run_case+0x170/0x3f0 [ 21.391925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.392055] kthread+0x328/0x630 [ 21.392157] ret_from_fork+0x10/0x20 [ 21.392265] [ 21.392311] Allocated by task 206: [ 21.392373] kasan_save_stack+0x3c/0x68 [ 21.392468] kasan_save_track+0x20/0x40 [ 21.392561] kasan_save_alloc_info+0x40/0x58 [ 21.392666] __kasan_kmalloc+0xd4/0xd8 [ 21.392781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.392886] ksize_uaf+0xb8/0x5f8 [ 21.392994] kunit_try_run_case+0x170/0x3f0 [ 21.393090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.393181] kthread+0x328/0x630 [ 21.394082] ret_from_fork+0x10/0x20 [ 21.394203] [ 21.394283] Freed by task 206: [ 21.394392] kasan_save_stack+0x3c/0x68 [ 21.394480] kasan_save_track+0x20/0x40 [ 21.394559] kasan_save_free_info+0x4c/0x78 [ 21.394671] __kasan_slab_free+0x6c/0x98 [ 21.394760] kfree+0x214/0x3c8 [ 21.394843] ksize_uaf+0x11c/0x5f8 [ 21.394909] kunit_try_run_case+0x170/0x3f0 [ 21.394982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.395078] kthread+0x328/0x630 [ 21.395152] ret_from_fork+0x10/0x20 [ 21.395230] [ 21.395272] The buggy address belongs to the object at fff00000c6423c00 [ 21.395272] which belongs to the cache kmalloc-128 of size 128 [ 21.395788] The buggy address is located 0 bytes inside of [ 21.395788] freed 128-byte region [fff00000c6423c00, fff00000c6423c80) [ 21.396282] [ 21.396393] The buggy address belongs to the physical page: [ 21.396484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.396642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.396782] page_type: f5(slab) [ 21.396870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.397244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.397389] page dumped because: kasan: bad access detected [ 21.397517] [ 21.397556] Memory state around the buggy address: [ 21.397645] fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.397920] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398016] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.398188] ^ [ 21.398286] fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398380] fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398468] ==================================================================
[ 11.641538] ================================================================== [ 11.641844] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 11.642274] Read of size 1 at addr ffff888102c54b00 by task kunit_try_catch/222 [ 11.642816] [ 11.643169] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 11.643231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.643243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.643264] Call Trace: [ 11.643276] <TASK> [ 11.643290] dump_stack_lvl+0x73/0xb0 [ 11.643320] print_report+0xd1/0x650 [ 11.643340] ? __virt_addr_valid+0x1db/0x2d0 [ 11.643363] ? ksize_uaf+0x5fe/0x6c0 [ 11.643381] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.643405] ? ksize_uaf+0x5fe/0x6c0 [ 11.643424] kasan_report+0x141/0x180 [ 11.643444] ? ksize_uaf+0x5fe/0x6c0 [ 11.643467] __asan_report_load1_noabort+0x18/0x20 [ 11.643490] ksize_uaf+0x5fe/0x6c0 [ 11.643508] ? __pfx_ksize_uaf+0x10/0x10 [ 11.643528] ? __schedule+0x10cc/0x2b60 [ 11.643549] ? __pfx_read_tsc+0x10/0x10 [ 11.643570] ? ktime_get_ts64+0x86/0x230 [ 11.643594] kunit_try_run_case+0x1a5/0x480 [ 11.643617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.643637] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.643659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.643680] ? __kthread_parkme+0x82/0x180 [ 11.643699] ? preempt_count_sub+0x50/0x80 [ 11.643721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.643743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.643764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.643785] kthread+0x337/0x6f0 [ 11.643803] ? trace_preempt_on+0x20/0xc0 [ 11.643826] ? __pfx_kthread+0x10/0x10 [ 11.643845] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.643864] ? calculate_sigpending+0x7b/0xa0 [ 11.643887] ? __pfx_kthread+0x10/0x10 [ 11.643907] ret_from_fork+0x116/0x1d0 [ 11.643924] ? __pfx_kthread+0x10/0x10 [ 11.643943] ret_from_fork_asm+0x1a/0x30 [ 11.643972] </TASK> [ 11.643981] [ 11.653337] Allocated by task 222: [ 11.653974] kasan_save_stack+0x45/0x70 [ 11.654172] kasan_save_track+0x18/0x40 [ 11.654315] kasan_save_alloc_info+0x3b/0x50 [ 11.654534] __kasan_kmalloc+0xb7/0xc0 [ 11.654879] __kmalloc_cache_noprof+0x189/0x420 [ 11.655390] ksize_uaf+0xaa/0x6c0 [ 11.655900] kunit_try_run_case+0x1a5/0x480 [ 11.656319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.656855] kthread+0x337/0x6f0 [ 11.656976] ret_from_fork+0x116/0x1d0 [ 11.657100] ret_from_fork_asm+0x1a/0x30 [ 11.657344] [ 11.657840] Freed by task 222: [ 11.658134] kasan_save_stack+0x45/0x70 [ 11.658647] kasan_save_track+0x18/0x40 [ 11.659076] kasan_save_free_info+0x3f/0x60 [ 11.659888] __kasan_slab_free+0x56/0x70 [ 11.660308] kfree+0x222/0x3f0 [ 11.660424] ksize_uaf+0x12c/0x6c0 [ 11.660854] kunit_try_run_case+0x1a5/0x480 [ 11.661355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.661880] kthread+0x337/0x6f0 [ 11.662119] ret_from_fork+0x116/0x1d0 [ 11.662458] ret_from_fork_asm+0x1a/0x30 [ 11.662802] [ 11.662943] The buggy address belongs to the object at ffff888102c54b00 [ 11.662943] which belongs to the cache kmalloc-128 of size 128 [ 11.663986] The buggy address is located 0 bytes inside of [ 11.663986] freed 128-byte region [ffff888102c54b00, ffff888102c54b80) [ 11.664936] [ 11.665007] The buggy address belongs to the physical page: [ 11.665166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54 [ 11.665401] flags: 0x200000000000000(node=0|zone=2) [ 11.665576] page_type: f5(slab) [ 11.665738] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.665993] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.666304] page dumped because: kasan: bad access detected [ 11.666474] [ 11.666591] Memory state around the buggy address: [ 11.666788] ffff888102c54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.667002] ffff888102c54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.667665] >ffff888102c54b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.668104] ^ [ 11.668359] ffff888102c54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.668617] ffff888102c54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.668927] ================================================================== [ 11.616725] ================================================================== [ 11.617098] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 11.617666] Read of size 1 at addr ffff888102c54b00 by task kunit_try_catch/222 [ 11.618757] [ 11.618852] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 11.618902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.618913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.618934] Call Trace: [ 11.618945] <TASK> [ 11.618961] dump_stack_lvl+0x73/0xb0 [ 11.618989] print_report+0xd1/0x650 [ 11.619010] ? __virt_addr_valid+0x1db/0x2d0 [ 11.619030] ? ksize_uaf+0x19d/0x6c0 [ 11.619049] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.619073] ? ksize_uaf+0x19d/0x6c0 [ 11.619092] kasan_report+0x141/0x180 [ 11.619112] ? ksize_uaf+0x19d/0x6c0 [ 11.619134] ? ksize_uaf+0x19d/0x6c0 [ 11.619152] __kasan_check_byte+0x3d/0x50 [ 11.619172] ksize+0x20/0x60 [ 11.619190] ksize_uaf+0x19d/0x6c0 [ 11.619221] ? __pfx_ksize_uaf+0x10/0x10 [ 11.619242] ? __schedule+0x10cc/0x2b60 [ 11.619262] ? __pfx_read_tsc+0x10/0x10 [ 11.619418] ? ktime_get_ts64+0x86/0x230 [ 11.619447] kunit_try_run_case+0x1a5/0x480 [ 11.619471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.619492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.619513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.619534] ? __kthread_parkme+0x82/0x180 [ 11.619553] ? preempt_count_sub+0x50/0x80 [ 11.619576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.619598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.619620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.619641] kthread+0x337/0x6f0 [ 11.619659] ? trace_preempt_on+0x20/0xc0 [ 11.619681] ? __pfx_kthread+0x10/0x10 [ 11.619700] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.619719] ? calculate_sigpending+0x7b/0xa0 [ 11.619742] ? __pfx_kthread+0x10/0x10 [ 11.619761] ret_from_fork+0x116/0x1d0 [ 11.619779] ? __pfx_kthread+0x10/0x10 [ 11.619798] ret_from_fork_asm+0x1a/0x30 [ 11.619826] </TASK> [ 11.619837] [ 11.627500] Allocated by task 222: [ 11.627765] kasan_save_stack+0x45/0x70 [ 11.627966] kasan_save_track+0x18/0x40 [ 11.628133] kasan_save_alloc_info+0x3b/0x50 [ 11.628384] __kasan_kmalloc+0xb7/0xc0 [ 11.628531] __kmalloc_cache_noprof+0x189/0x420 [ 11.628810] ksize_uaf+0xaa/0x6c0 [ 11.628940] kunit_try_run_case+0x1a5/0x480 [ 11.629078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.629254] kthread+0x337/0x6f0 [ 11.629366] ret_from_fork+0x116/0x1d0 [ 11.629536] ret_from_fork_asm+0x1a/0x30 [ 11.629723] [ 11.629813] Freed by task 222: [ 11.630000] kasan_save_stack+0x45/0x70 [ 11.630185] kasan_save_track+0x18/0x40 [ 11.630447] kasan_save_free_info+0x3f/0x60 [ 11.630595] __kasan_slab_free+0x56/0x70 [ 11.630722] kfree+0x222/0x3f0 [ 11.630830] ksize_uaf+0x12c/0x6c0 [ 11.631176] kunit_try_run_case+0x1a5/0x480 [ 11.631386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.631625] kthread+0x337/0x6f0 [ 11.631756] ret_from_fork+0x116/0x1d0 [ 11.632123] ret_from_fork_asm+0x1a/0x30 [ 11.632397] [ 11.632623] The buggy address belongs to the object at ffff888102c54b00 [ 11.632623] which belongs to the cache kmalloc-128 of size 128 [ 11.633072] The buggy address is located 0 bytes inside of [ 11.633072] freed 128-byte region [ffff888102c54b00, ffff888102c54b80) [ 11.633911] [ 11.634016] The buggy address belongs to the physical page: [ 11.634557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54 [ 11.634915] flags: 0x200000000000000(node=0|zone=2) [ 11.635085] page_type: f5(slab) [ 11.635230] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.635974] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.636802] page dumped because: kasan: bad access detected [ 11.637233] [ 11.637320] Memory state around the buggy address: [ 11.637876] ffff888102c54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.638378] ffff888102c54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.639160] >ffff888102c54b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.639875] ^ [ 11.640034] ffff888102c54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.640551] ffff888102c54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.640898] ================================================================== [ 11.671238] ================================================================== [ 11.671601] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 11.672199] Read of size 1 at addr ffff888102c54b78 by task kunit_try_catch/222 [ 11.672451] [ 11.672824] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 11.672873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.672884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.672904] Call Trace: [ 11.672915] <TASK> [ 11.672930] dump_stack_lvl+0x73/0xb0 [ 11.672959] print_report+0xd1/0x650 [ 11.672978] ? __virt_addr_valid+0x1db/0x2d0 [ 11.672999] ? ksize_uaf+0x5e4/0x6c0 [ 11.673017] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.673042] ? ksize_uaf+0x5e4/0x6c0 [ 11.673062] kasan_report+0x141/0x180 [ 11.673082] ? ksize_uaf+0x5e4/0x6c0 [ 11.673105] __asan_report_load1_noabort+0x18/0x20 [ 11.673127] ksize_uaf+0x5e4/0x6c0 [ 11.673146] ? __pfx_ksize_uaf+0x10/0x10 [ 11.673165] ? __schedule+0x10cc/0x2b60 [ 11.673196] ? __pfx_read_tsc+0x10/0x10 [ 11.673233] ? ktime_get_ts64+0x86/0x230 [ 11.673257] kunit_try_run_case+0x1a5/0x480 [ 11.673279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.673299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.673321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.673342] ? __kthread_parkme+0x82/0x180 [ 11.673361] ? preempt_count_sub+0x50/0x80 [ 11.673385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.673407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.673427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.673449] kthread+0x337/0x6f0 [ 11.673467] ? trace_preempt_on+0x20/0xc0 [ 11.673488] ? __pfx_kthread+0x10/0x10 [ 11.673507] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.673526] ? calculate_sigpending+0x7b/0xa0 [ 11.673550] ? __pfx_kthread+0x10/0x10 [ 11.673570] ret_from_fork+0x116/0x1d0 [ 11.673587] ? __pfx_kthread+0x10/0x10 [ 11.673608] ret_from_fork_asm+0x1a/0x30 [ 11.673638] </TASK> [ 11.673648] [ 11.686174] Allocated by task 222: [ 11.686312] kasan_save_stack+0x45/0x70 [ 11.686563] kasan_save_track+0x18/0x40 [ 11.687366] kasan_save_alloc_info+0x3b/0x50 [ 11.687765] __kasan_kmalloc+0xb7/0xc0 [ 11.688098] __kmalloc_cache_noprof+0x189/0x420 [ 11.688544] ksize_uaf+0xaa/0x6c0 [ 11.688846] kunit_try_run_case+0x1a5/0x480 [ 11.689261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.689727] kthread+0x337/0x6f0 [ 11.690048] ret_from_fork+0x116/0x1d0 [ 11.690256] ret_from_fork_asm+0x1a/0x30 [ 11.690641] [ 11.690816] Freed by task 222: [ 11.691115] kasan_save_stack+0x45/0x70 [ 11.691398] kasan_save_track+0x18/0x40 [ 11.691574] kasan_save_free_info+0x3f/0x60 [ 11.691963] __kasan_slab_free+0x56/0x70 [ 11.692197] kfree+0x222/0x3f0 [ 11.692413] ksize_uaf+0x12c/0x6c0 [ 11.692733] kunit_try_run_case+0x1a5/0x480 [ 11.692873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.693037] kthread+0x337/0x6f0 [ 11.693148] ret_from_fork+0x116/0x1d0 [ 11.693300] ret_from_fork_asm+0x1a/0x30 [ 11.693429] [ 11.693538] The buggy address belongs to the object at ffff888102c54b00 [ 11.693538] which belongs to the cache kmalloc-128 of size 128 [ 11.694013] The buggy address is located 120 bytes inside of [ 11.694013] freed 128-byte region [ffff888102c54b00, ffff888102c54b80) [ 11.694491] [ 11.694557] The buggy address belongs to the physical page: [ 11.694859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c54 [ 11.695222] flags: 0x200000000000000(node=0|zone=2) [ 11.695411] page_type: f5(slab) [ 11.695542] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.695891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.696181] page dumped because: kasan: bad access detected [ 11.696354] [ 11.696440] Memory state around the buggy address: [ 11.696682] ffff888102c54a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.696995] ffff888102c54a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.697330] >ffff888102c54b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.697616] ^ [ 11.697921] ffff888102c54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.698223] ffff888102c54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.698604] ==================================================================