Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   52.322427] ==================================================================
[   52.329745] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   52.336540] Read of size 1 at addr ffff000096c34790 by task kunit_try_catch/345
[   52.343944] 
[   52.345470] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   52.345500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.345507] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.345518] Call trace:
[   52.345525]  show_stack+0x20/0x38 (C)
[   52.345543]  dump_stack_lvl+0x8c/0xd0
[   52.345560]  print_report+0x118/0x608
[   52.345578]  kasan_report+0xdc/0x128
[   52.345597]  __asan_report_load1_noabort+0x20/0x30
[   52.345613]  kasan_strings+0x95c/0xb00
[   52.345629]  kunit_try_run_case+0x170/0x3f0
[   52.345645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.345667]  kthread+0x328/0x630
[   52.345680]  ret_from_fork+0x10/0x20
[   52.345696] 
[   52.410920] Allocated by task 345:
[   52.414372]  kasan_save_stack+0x3c/0x68
[   52.418277]  kasan_save_track+0x20/0x40
[   52.422179]  kasan_save_alloc_info+0x40/0x58
[   52.426513]  __kasan_kmalloc+0xd4/0xd8
[   52.430328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.434924]  kasan_strings+0xc8/0xb00
[   52.438651]  kunit_try_run_case+0x170/0x3f0
[   52.442898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.448458]  kthread+0x328/0x630
[   52.451740]  ret_from_fork+0x10/0x20
[   52.455372] 
[   52.456903] Freed by task 345:
[   52.460007]  kasan_save_stack+0x3c/0x68
[   52.463909]  kasan_save_track+0x20/0x40
[   52.467812]  kasan_save_free_info+0x4c/0x78
[   52.472058]  __kasan_slab_free+0x6c/0x98
[   52.476047]  kfree+0x214/0x3c8
[   52.479159]  kasan_strings+0x24c/0xb00
[   52.482972]  kunit_try_run_case+0x170/0x3f0
[   52.487221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.492781]  kthread+0x328/0x630
[   52.496062]  ret_from_fork+0x10/0x20
[   52.499702] 
[   52.501225] The buggy address belongs to the object at ffff000096c34780
[   52.501225]  which belongs to the cache kmalloc-32 of size 32
[   52.513702] The buggy address is located 16 bytes inside of
[   52.513702]  freed 32-byte region [ffff000096c34780, ffff000096c347a0)
[   52.525921] 
[   52.527451] The buggy address belongs to the physical page:
[   52.533091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116c34
[   52.541188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.547798] page_type: f5(slab)
[   52.550998] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   52.558836] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   52.566671] page dumped because: kasan: bad access detected
[   52.572317] 
[   52.573839] Memory state around the buggy address:
[   52.578690]  ffff000096c34680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.586003]  ffff000096c34700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.593318] >ffff000096c34780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.600629]                          ^
[   52.604438]  ffff000096c34800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   52.611752]  ffff000096c34880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.619058] ==================================================================

[   29.089264] ==================================================================
[   29.089317] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   29.089553] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.089623] 
[   29.089703] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.089794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.089822] Hardware name: linux,dummy-virt (DT)
[   29.089967] Call trace:
[   29.090147]  show_stack+0x20/0x38 (C)
[   29.090240]  dump_stack_lvl+0x8c/0xd0
[   29.090292]  print_report+0x118/0x608
[   29.090365]  kasan_report+0xdc/0x128
[   29.090439]  __asan_report_load1_noabort+0x20/0x30
[   29.090514]  kasan_strings+0x95c/0xb00
[   29.090561]  kunit_try_run_case+0x170/0x3f0
[   29.090846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.090953]  kthread+0x328/0x630
[   29.091026]  ret_from_fork+0x10/0x20
[   29.091089] 
[   29.091376] Allocated by task 271:
[   29.091461]  kasan_save_stack+0x3c/0x68
[   29.091526]  kasan_save_track+0x20/0x40
[   29.091593]  kasan_save_alloc_info+0x40/0x58
[   29.091653]  __kasan_kmalloc+0xd4/0xd8
[   29.091693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.091734]  kasan_strings+0xc8/0xb00
[   29.091770]  kunit_try_run_case+0x170/0x3f0
[   29.091840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.091890]  kthread+0x328/0x630
[   29.092080]  ret_from_fork+0x10/0x20
[   29.092229] 
[   29.092306] Freed by task 271:
[   29.092337]  kasan_save_stack+0x3c/0x68
[   29.092377]  kasan_save_track+0x20/0x40
[   29.092417]  kasan_save_free_info+0x4c/0x78
[   29.092755]  __kasan_slab_free+0x6c/0x98
[   29.092870]  kfree+0x214/0x3c8
[   29.092983]  kasan_strings+0x24c/0xb00
[   29.093080]  kunit_try_run_case+0x170/0x3f0
[   29.093121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.093446]  kthread+0x328/0x630
[   29.093534]  ret_from_fork+0x10/0x20
[   29.093648] 
[   29.093727] The buggy address belongs to the object at fff00000c5770780
[   29.093727]  which belongs to the cache kmalloc-32 of size 32
[   29.093837] The buggy address is located 16 bytes inside of
[   29.093837]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.093942] 
[   29.094202] The buggy address belongs to the physical page:
[   29.094256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.094371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.094424] page_type: f5(slab)
[   29.094462] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.094514] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.094555] page dumped because: kasan: bad access detected
[   29.094589] 
[   29.095105] Memory state around the buggy address:
[   29.095169]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.095317]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.095428] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.095588]                          ^
[   29.095684]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.095754]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.095871] ==================================================================

[   24.070250] ==================================================================
[   24.070579] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   24.071281] Read of size 1 at addr ffff888102d5c7d0 by task kunit_try_catch/288
[   24.071658] 
[   24.072402] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.072460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.072474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.072497] Call Trace:
[   24.072512]  <TASK>
[   24.072532]  dump_stack_lvl+0x73/0xb0
[   24.072565]  print_report+0xd1/0x650
[   24.072589]  ? __virt_addr_valid+0x1db/0x2d0
[   24.072613]  ? kasan_strings+0xcbc/0xe80
[   24.072634]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.072660]  ? kasan_strings+0xcbc/0xe80
[   24.072680]  kasan_report+0x141/0x180
[   24.072701]  ? kasan_strings+0xcbc/0xe80
[   24.072726]  __asan_report_load1_noabort+0x18/0x20
[   24.072750]  kasan_strings+0xcbc/0xe80
[   24.072769]  ? trace_hardirqs_on+0x37/0xe0
[   24.072792]  ? __pfx_kasan_strings+0x10/0x10
[   24.072812]  ? finish_task_switch.isra.0+0x153/0x700
[   24.072834]  ? __switch_to+0x47/0xf50
[   24.072859]  ? __schedule+0x10cc/0x2b60
[   24.072884]  ? __pfx_read_tsc+0x10/0x10
[   24.072906]  ? ktime_get_ts64+0x86/0x230
[   24.072930]  kunit_try_run_case+0x1a5/0x480
[   24.072956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.072978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.073003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.073030]  ? __kthread_parkme+0x82/0x180
[   24.073051]  ? preempt_count_sub+0x50/0x80
[   24.073089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.073127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.073151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.073174]  kthread+0x337/0x6f0
[   24.073193]  ? trace_preempt_on+0x20/0xc0
[   24.073216]  ? __pfx_kthread+0x10/0x10
[   24.073245]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.073269]  ? calculate_sigpending+0x7b/0xa0
[   24.073293]  ? __pfx_kthread+0x10/0x10
[   24.073314]  ret_from_fork+0x116/0x1d0
[   24.073333]  ? __pfx_kthread+0x10/0x10
[   24.073353]  ret_from_fork_asm+0x1a/0x30
[   24.073384]  </TASK>
[   24.073396] 
[   24.084522] Allocated by task 288:
[   24.084889]  kasan_save_stack+0x45/0x70
[   24.085180]  kasan_save_track+0x18/0x40
[   24.085450]  kasan_save_alloc_info+0x3b/0x50
[   24.085614]  __kasan_kmalloc+0xb7/0xc0
[   24.086070]  __kmalloc_cache_noprof+0x189/0x420
[   24.086448]  kasan_strings+0xc0/0xe80
[   24.086623]  kunit_try_run_case+0x1a5/0x480
[   24.087073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.087338]  kthread+0x337/0x6f0
[   24.087505]  ret_from_fork+0x116/0x1d0
[   24.087649]  ret_from_fork_asm+0x1a/0x30
[   24.087858] 
[   24.087931] Freed by task 288:
[   24.088269]  kasan_save_stack+0x45/0x70
[   24.088420]  kasan_save_track+0x18/0x40
[   24.088549]  kasan_save_free_info+0x3f/0x60
[   24.088749]  __kasan_slab_free+0x56/0x70
[   24.089066]  kfree+0x222/0x3f0
[   24.089253]  kasan_strings+0x2aa/0xe80
[   24.089379]  kunit_try_run_case+0x1a5/0x480
[   24.089661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.089831]  kthread+0x337/0x6f0
[   24.090036]  ret_from_fork+0x116/0x1d0
[   24.090230]  ret_from_fork_asm+0x1a/0x30
[   24.090427] 
[   24.090517] The buggy address belongs to the object at ffff888102d5c7c0
[   24.090517]  which belongs to the cache kmalloc-32 of size 32
[   24.091014] The buggy address is located 16 bytes inside of
[   24.091014]  freed 32-byte region [ffff888102d5c7c0, ffff888102d5c7e0)
[   24.091708] 
[   24.091870] The buggy address belongs to the physical page:
[   24.092200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5c
[   24.092526] flags: 0x200000000000000(node=0|zone=2)
[   24.092742] page_type: f5(slab)
[   24.092996] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   24.093254] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.093476] page dumped because: kasan: bad access detected
[   24.093745] 
[   24.093833] Memory state around the buggy address:
[   24.094282]  ffff888102d5c680: fa fb fb fb fc fc fc fc 00 00 00 04 fc fc fc fc
[   24.094604]  ffff888102d5c700: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.094925] >ffff888102d5c780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.095350]                                                  ^
[   24.095535]  ffff888102d5c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.096088]  ffff888102d5c880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.096445] ==================================================================