Date
June 20, 2025, 12:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.476269] ================================================================== [ 32.476876] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.477068] Read of size 1 at addr fff00000c44dfc00 by task kunit_try_catch/207 [ 32.477317] [ 32.477557] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.478422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.478557] Hardware name: linux,dummy-virt (DT) [ 32.478769] Call trace: [ 32.478859] show_stack+0x20/0x38 (C) [ 32.479002] dump_stack_lvl+0x8c/0xd0 [ 32.479580] print_report+0x118/0x608 [ 32.479732] kasan_report+0xdc/0x128 [ 32.480172] __asan_report_load1_noabort+0x20/0x30 [ 32.480506] ksize_uaf+0x598/0x5f8 [ 32.480638] kunit_try_run_case+0x170/0x3f0 [ 32.480739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.481359] kthread+0x328/0x630 [ 32.481525] ret_from_fork+0x10/0x20 [ 32.481940] [ 32.482047] Allocated by task 207: [ 32.482265] kasan_save_stack+0x3c/0x68 [ 32.482512] kasan_save_track+0x20/0x40 [ 32.482635] kasan_save_alloc_info+0x40/0x58 [ 32.482950] __kasan_kmalloc+0xd4/0xd8 [ 32.483357] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.483660] ksize_uaf+0xb8/0x5f8 [ 32.483789] kunit_try_run_case+0x170/0x3f0 [ 32.483894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.484370] kthread+0x328/0x630 [ 32.484570] ret_from_fork+0x10/0x20 [ 32.484816] [ 32.484975] Freed by task 207: [ 32.485122] kasan_save_stack+0x3c/0x68 [ 32.485286] kasan_save_track+0x20/0x40 [ 32.485395] kasan_save_free_info+0x4c/0x78 [ 32.485662] __kasan_slab_free+0x6c/0x98 [ 32.485907] kfree+0x214/0x3c8 [ 32.486171] ksize_uaf+0x11c/0x5f8 [ 32.486252] kunit_try_run_case+0x170/0x3f0 [ 32.486399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.486527] kthread+0x328/0x630 [ 32.486601] ret_from_fork+0x10/0x20 [ 32.486697] [ 32.486775] The buggy address belongs to the object at fff00000c44dfc00 [ 32.486775] which belongs to the cache kmalloc-128 of size 128 [ 32.486952] The buggy address is located 0 bytes inside of [ 32.486952] freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80) [ 32.487134] [ 32.487212] The buggy address belongs to the physical page: [ 32.487339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.487545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.487745] page_type: f5(slab) [ 32.487885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.488022] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.488175] page dumped because: kasan: bad access detected [ 32.488283] [ 32.488374] Memory state around the buggy address: [ 32.488441] fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.488550] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.488671] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.488828] ^ [ 32.488891] fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.488999] fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.489096] ================================================================== [ 32.459046] ================================================================== [ 32.459811] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 32.460193] Read of size 1 at addr fff00000c44dfc00 by task kunit_try_catch/207 [ 32.460417] [ 32.460617] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.461153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.461263] Hardware name: linux,dummy-virt (DT) [ 32.461387] Call trace: [ 32.461743] show_stack+0x20/0x38 (C) [ 32.462031] dump_stack_lvl+0x8c/0xd0 [ 32.462167] print_report+0x118/0x608 [ 32.462278] kasan_report+0xdc/0x128 [ 32.462392] __kasan_check_byte+0x54/0x70 [ 32.462508] ksize+0x30/0x88 [ 32.462622] ksize_uaf+0x168/0x5f8 [ 32.463231] kunit_try_run_case+0x170/0x3f0 [ 32.463519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.463877] kthread+0x328/0x630 [ 32.464063] ret_from_fork+0x10/0x20 [ 32.464216] [ 32.464346] Allocated by task 207: [ 32.464547] kasan_save_stack+0x3c/0x68 [ 32.464774] kasan_save_track+0x20/0x40 [ 32.464866] kasan_save_alloc_info+0x40/0x58 [ 32.464942] __kasan_kmalloc+0xd4/0xd8 [ 32.465005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.465084] ksize_uaf+0xb8/0x5f8 [ 32.465163] kunit_try_run_case+0x170/0x3f0 [ 32.465254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.465363] kthread+0x328/0x630 [ 32.466136] ret_from_fork+0x10/0x20 [ 32.466444] [ 32.466557] Freed by task 207: [ 32.466731] kasan_save_stack+0x3c/0x68 [ 32.466837] kasan_save_track+0x20/0x40 [ 32.466926] kasan_save_free_info+0x4c/0x78 [ 32.467033] __kasan_slab_free+0x6c/0x98 [ 32.467129] kfree+0x214/0x3c8 [ 32.467212] ksize_uaf+0x11c/0x5f8 [ 32.467294] kunit_try_run_case+0x170/0x3f0 [ 32.467395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.467523] kthread+0x328/0x630 [ 32.467617] ret_from_fork+0x10/0x20 [ 32.467715] [ 32.467764] The buggy address belongs to the object at fff00000c44dfc00 [ 32.467764] which belongs to the cache kmalloc-128 of size 128 [ 32.467923] The buggy address is located 0 bytes inside of [ 32.467923] freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80) [ 32.468088] [ 32.468152] The buggy address belongs to the physical page: [ 32.468836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.469240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.469388] page_type: f5(slab) [ 32.469490] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.469640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.469799] page dumped because: kasan: bad access detected [ 32.470012] [ 32.470102] Memory state around the buggy address: [ 32.470223] fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.470337] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470454] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.470555] ^ [ 32.470640] fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470757] fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470864] ================================================================== [ 32.490889] ================================================================== [ 32.491094] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.491267] Read of size 1 at addr fff00000c44dfc78 by task kunit_try_catch/207 [ 32.491452] [ 32.491580] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.491842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.491909] Hardware name: linux,dummy-virt (DT) [ 32.491991] Call trace: [ 32.492048] show_stack+0x20/0x38 (C) [ 32.492175] dump_stack_lvl+0x8c/0xd0 [ 32.492289] print_report+0x118/0x608 [ 32.492428] kasan_report+0xdc/0x128 [ 32.492534] __asan_report_load1_noabort+0x20/0x30 [ 32.492693] ksize_uaf+0x544/0x5f8 [ 32.492800] kunit_try_run_case+0x170/0x3f0 [ 32.492924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.493055] kthread+0x328/0x630 [ 32.493198] ret_from_fork+0x10/0x20 [ 32.493319] [ 32.493388] Allocated by task 207: [ 32.493535] kasan_save_stack+0x3c/0x68 [ 32.493729] kasan_save_track+0x20/0x40 [ 32.493847] kasan_save_alloc_info+0x40/0x58 [ 32.493958] __kasan_kmalloc+0xd4/0xd8 [ 32.494070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.494170] ksize_uaf+0xb8/0x5f8 [ 32.494240] kunit_try_run_case+0x170/0x3f0 [ 32.494325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.494417] kthread+0x328/0x630 [ 32.494492] ret_from_fork+0x10/0x20 [ 32.494560] [ 32.494595] Freed by task 207: [ 32.494672] kasan_save_stack+0x3c/0x68 [ 32.494813] kasan_save_track+0x20/0x40 [ 32.494924] kasan_save_free_info+0x4c/0x78 [ 32.495018] __kasan_slab_free+0x6c/0x98 [ 32.495104] kfree+0x214/0x3c8 [ 32.495200] ksize_uaf+0x11c/0x5f8 [ 32.495285] kunit_try_run_case+0x170/0x3f0 [ 32.495381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.495507] kthread+0x328/0x630 [ 32.495585] ret_from_fork+0x10/0x20 [ 32.495725] [ 32.495796] The buggy address belongs to the object at fff00000c44dfc00 [ 32.495796] which belongs to the cache kmalloc-128 of size 128 [ 32.496017] The buggy address is located 120 bytes inside of [ 32.496017] freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80) [ 32.496177] [ 32.496244] The buggy address belongs to the physical page: [ 32.496372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.496502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.496826] page_type: f5(slab) [ 32.496946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.497116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.497235] page dumped because: kasan: bad access detected [ 32.497316] [ 32.497363] Memory state around the buggy address: [ 32.497437] fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.497522] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.497647] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.497747] ^ [ 32.497895] fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.498004] fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.498099] ==================================================================
[ 26.182362] ================================================================== [ 26.183860] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 26.184363] Read of size 1 at addr ffff88810232a300 by task kunit_try_catch/225 [ 26.184914] [ 26.185116] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.185253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.185281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.185328] Call Trace: [ 26.185371] <TASK> [ 26.185413] dump_stack_lvl+0x73/0xb0 [ 26.185493] print_report+0xd1/0x650 [ 26.185541] ? __virt_addr_valid+0x1db/0x2d0 [ 26.185761] ? ksize_uaf+0x5fe/0x6c0 [ 26.185804] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.185850] ? ksize_uaf+0x5fe/0x6c0 [ 26.185890] kasan_report+0x141/0x180 [ 26.185938] ? ksize_uaf+0x5fe/0x6c0 [ 26.185994] __asan_report_load1_noabort+0x18/0x20 [ 26.186053] ksize_uaf+0x5fe/0x6c0 [ 26.186091] ? __pfx_ksize_uaf+0x10/0x10 [ 26.186116] ? __schedule+0x207f/0x2b60 [ 26.186155] ? __pfx_read_tsc+0x10/0x10 [ 26.186192] ? ktime_get_ts64+0x86/0x230 [ 26.186222] kunit_try_run_case+0x1a5/0x480 [ 26.186251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.186275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.186300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.186324] ? __kthread_parkme+0x82/0x180 [ 26.186348] ? preempt_count_sub+0x50/0x80 [ 26.186373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.186398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.186424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.186467] kthread+0x337/0x6f0 [ 26.186492] ? trace_preempt_on+0x20/0xc0 [ 26.186517] ? __pfx_kthread+0x10/0x10 [ 26.186540] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.186602] ? calculate_sigpending+0x7b/0xa0 [ 26.186653] ? __pfx_kthread+0x10/0x10 [ 26.186691] ret_from_fork+0x116/0x1d0 [ 26.186714] ? __pfx_kthread+0x10/0x10 [ 26.186737] ret_from_fork_asm+0x1a/0x30 [ 26.186770] </TASK> [ 26.186785] [ 26.200712] Allocated by task 225: [ 26.200991] kasan_save_stack+0x45/0x70 [ 26.202256] kasan_save_track+0x18/0x40 [ 26.202500] kasan_save_alloc_info+0x3b/0x50 [ 26.202755] __kasan_kmalloc+0xb7/0xc0 [ 26.202931] __kmalloc_cache_noprof+0x189/0x420 [ 26.203349] ksize_uaf+0xaa/0x6c0 [ 26.203638] kunit_try_run_case+0x1a5/0x480 [ 26.203875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.204163] kthread+0x337/0x6f0 [ 26.204434] ret_from_fork+0x116/0x1d0 [ 26.205682] ret_from_fork_asm+0x1a/0x30 [ 26.205977] [ 26.206080] Freed by task 225: [ 26.206299] kasan_save_stack+0x45/0x70 [ 26.206841] kasan_save_track+0x18/0x40 [ 26.207123] kasan_save_free_info+0x3f/0x60 [ 26.207427] __kasan_slab_free+0x56/0x70 [ 26.208025] kfree+0x222/0x3f0 [ 26.208799] ksize_uaf+0x12c/0x6c0 [ 26.209305] kunit_try_run_case+0x1a5/0x480 [ 26.209524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.209962] kthread+0x337/0x6f0 [ 26.210259] ret_from_fork+0x116/0x1d0 [ 26.210665] ret_from_fork_asm+0x1a/0x30 [ 26.211213] [ 26.211671] The buggy address belongs to the object at ffff88810232a300 [ 26.211671] which belongs to the cache kmalloc-128 of size 128 [ 26.212573] The buggy address is located 0 bytes inside of [ 26.212573] freed 128-byte region [ffff88810232a300, ffff88810232a380) [ 26.213202] [ 26.213387] The buggy address belongs to the physical page: [ 26.213799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a [ 26.214177] flags: 0x200000000000000(node=0|zone=2) [ 26.214490] page_type: f5(slab) [ 26.214779] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.215067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.215719] page dumped because: kasan: bad access detected [ 26.215941] [ 26.216069] Memory state around the buggy address: [ 26.216476] ffff88810232a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.217059] ffff88810232a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.217479] >ffff88810232a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.218512] ^ [ 26.218952] ffff88810232a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.219480] ffff88810232a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.220104] ================================================================== [ 26.145215] ================================================================== [ 26.146239] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 26.146968] Read of size 1 at addr ffff88810232a300 by task kunit_try_catch/225 [ 26.147353] [ 26.147971] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.148119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.148149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.148195] Call Trace: [ 26.148221] <TASK> [ 26.148257] dump_stack_lvl+0x73/0xb0 [ 26.148332] print_report+0xd1/0x650 [ 26.148374] ? __virt_addr_valid+0x1db/0x2d0 [ 26.148431] ? ksize_uaf+0x19d/0x6c0 [ 26.148497] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.148552] ? ksize_uaf+0x19d/0x6c0 [ 26.148590] kasan_report+0x141/0x180 [ 26.148630] ? ksize_uaf+0x19d/0x6c0 [ 26.148676] ? ksize_uaf+0x19d/0x6c0 [ 26.148718] __kasan_check_byte+0x3d/0x50 [ 26.148773] ksize+0x20/0x60 [ 26.148816] ksize_uaf+0x19d/0x6c0 [ 26.149000] ? __pfx_ksize_uaf+0x10/0x10 [ 26.149054] ? __schedule+0x207f/0x2b60 [ 26.149119] ? __pfx_read_tsc+0x10/0x10 [ 26.149170] ? ktime_get_ts64+0x86/0x230 [ 26.149219] kunit_try_run_case+0x1a5/0x480 [ 26.149267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.149304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.149329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.149354] ? __kthread_parkme+0x82/0x180 [ 26.149378] ? preempt_count_sub+0x50/0x80 [ 26.149404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.149429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.149479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.149506] kthread+0x337/0x6f0 [ 26.149528] ? trace_preempt_on+0x20/0xc0 [ 26.149564] ? __pfx_kthread+0x10/0x10 [ 26.149599] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.149632] ? calculate_sigpending+0x7b/0xa0 [ 26.149672] ? __pfx_kthread+0x10/0x10 [ 26.149704] ret_from_fork+0x116/0x1d0 [ 26.149725] ? __pfx_kthread+0x10/0x10 [ 26.149747] ret_from_fork_asm+0x1a/0x30 [ 26.149782] </TASK> [ 26.149796] [ 26.162979] Allocated by task 225: [ 26.163965] kasan_save_stack+0x45/0x70 [ 26.164355] kasan_save_track+0x18/0x40 [ 26.164547] kasan_save_alloc_info+0x3b/0x50 [ 26.165101] __kasan_kmalloc+0xb7/0xc0 [ 26.165278] __kmalloc_cache_noprof+0x189/0x420 [ 26.165436] ksize_uaf+0xaa/0x6c0 [ 26.165569] kunit_try_run_case+0x1a5/0x480 [ 26.165706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.165930] kthread+0x337/0x6f0 [ 26.166389] ret_from_fork+0x116/0x1d0 [ 26.167333] ret_from_fork_asm+0x1a/0x30 [ 26.167685] [ 26.167833] Freed by task 225: [ 26.167973] kasan_save_stack+0x45/0x70 [ 26.168314] kasan_save_track+0x18/0x40 [ 26.168613] kasan_save_free_info+0x3f/0x60 [ 26.168887] __kasan_slab_free+0x56/0x70 [ 26.169132] kfree+0x222/0x3f0 [ 26.169346] ksize_uaf+0x12c/0x6c0 [ 26.169843] kunit_try_run_case+0x1a5/0x480 [ 26.170296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.170916] kthread+0x337/0x6f0 [ 26.171316] ret_from_fork+0x116/0x1d0 [ 26.172149] ret_from_fork_asm+0x1a/0x30 [ 26.172370] [ 26.172567] The buggy address belongs to the object at ffff88810232a300 [ 26.172567] which belongs to the cache kmalloc-128 of size 128 [ 26.173586] The buggy address is located 0 bytes inside of [ 26.173586] freed 128-byte region [ffff88810232a300, ffff88810232a380) [ 26.174212] [ 26.174392] The buggy address belongs to the physical page: [ 26.174863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a [ 26.175678] flags: 0x200000000000000(node=0|zone=2) [ 26.176032] page_type: f5(slab) [ 26.176213] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.176477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.177039] page dumped because: kasan: bad access detected [ 26.177722] [ 26.178215] Memory state around the buggy address: [ 26.178620] ffff88810232a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.178890] ffff88810232a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.179233] >ffff88810232a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.179951] ^ [ 26.180289] ffff88810232a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.180914] ffff88810232a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.181311] ================================================================== [ 26.222865] ================================================================== [ 26.223437] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 26.223831] Read of size 1 at addr ffff88810232a378 by task kunit_try_catch/225 [ 26.224653] [ 26.224886] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 26.224984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.225008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.225053] Call Trace: [ 26.225081] <TASK> [ 26.225118] dump_stack_lvl+0x73/0xb0 [ 26.225182] print_report+0xd1/0x650 [ 26.225221] ? __virt_addr_valid+0x1db/0x2d0 [ 26.225270] ? ksize_uaf+0x5e4/0x6c0 [ 26.225309] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.225354] ? ksize_uaf+0x5e4/0x6c0 [ 26.225393] kasan_report+0x141/0x180 [ 26.225438] ? ksize_uaf+0x5e4/0x6c0 [ 26.225666] __asan_report_load1_noabort+0x18/0x20 [ 26.225710] ksize_uaf+0x5e4/0x6c0 [ 26.225734] ? __pfx_ksize_uaf+0x10/0x10 [ 26.225757] ? __schedule+0x207f/0x2b60 [ 26.225783] ? __pfx_read_tsc+0x10/0x10 [ 26.225806] ? ktime_get_ts64+0x86/0x230 [ 26.225835] kunit_try_run_case+0x1a5/0x480 [ 26.225862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.225886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.225910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.225934] ? __kthread_parkme+0x82/0x180 [ 26.225957] ? preempt_count_sub+0x50/0x80 [ 26.225982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.226008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.226050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.226078] kthread+0x337/0x6f0 [ 26.226099] ? trace_preempt_on+0x20/0xc0 [ 26.226124] ? __pfx_kthread+0x10/0x10 [ 26.226167] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.226202] ? calculate_sigpending+0x7b/0xa0 [ 26.226228] ? __pfx_kthread+0x10/0x10 [ 26.226251] ret_from_fork+0x116/0x1d0 [ 26.226271] ? __pfx_kthread+0x10/0x10 [ 26.226293] ret_from_fork_asm+0x1a/0x30 [ 26.226325] </TASK> [ 26.226339] [ 26.237527] Allocated by task 225: [ 26.237954] kasan_save_stack+0x45/0x70 [ 26.238290] kasan_save_track+0x18/0x40 [ 26.238525] kasan_save_alloc_info+0x3b/0x50 [ 26.238778] __kasan_kmalloc+0xb7/0xc0 [ 26.239007] __kmalloc_cache_noprof+0x189/0x420 [ 26.240096] ksize_uaf+0xaa/0x6c0 [ 26.241010] kunit_try_run_case+0x1a5/0x480 [ 26.241274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.241502] kthread+0x337/0x6f0 [ 26.241658] ret_from_fork+0x116/0x1d0 [ 26.241890] ret_from_fork_asm+0x1a/0x30 [ 26.242126] [ 26.242297] Freed by task 225: [ 26.242562] kasan_save_stack+0x45/0x70 [ 26.243020] kasan_save_track+0x18/0x40 [ 26.243969] kasan_save_free_info+0x3f/0x60 [ 26.244353] __kasan_slab_free+0x56/0x70 [ 26.244548] kfree+0x222/0x3f0 [ 26.244799] ksize_uaf+0x12c/0x6c0 [ 26.245096] kunit_try_run_case+0x1a5/0x480 [ 26.245298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.245697] kthread+0x337/0x6f0 [ 26.245927] ret_from_fork+0x116/0x1d0 [ 26.246335] ret_from_fork_asm+0x1a/0x30 [ 26.246574] [ 26.246680] The buggy address belongs to the object at ffff88810232a300 [ 26.246680] which belongs to the cache kmalloc-128 of size 128 [ 26.247364] The buggy address is located 120 bytes inside of [ 26.247364] freed 128-byte region [ffff88810232a300, ffff88810232a380) [ 26.248552] [ 26.249187] The buggy address belongs to the physical page: [ 26.249667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10232a [ 26.250306] flags: 0x200000000000000(node=0|zone=2) [ 26.250896] page_type: f5(slab) [ 26.251367] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.252137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.252766] page dumped because: kasan: bad access detected [ 26.253363] [ 26.253599] Memory state around the buggy address: [ 26.254616] ffff88810232a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.254926] ffff88810232a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.255157] >ffff88810232a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.256037] ^ [ 26.256535] ffff88810232a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257474] ffff88810232a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257916] ==================================================================