Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 42.903806] ================================================================== [ 42.915450] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 42.921895] Read of size 1 at addr ffff00009462ca00 by task kunit_try_catch/282 [ 42.929299] [ 42.930826] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 42.930856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.930864] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.930877] Call trace: [ 42.930884] show_stack+0x20/0x38 (C) [ 42.930902] dump_stack_lvl+0x8c/0xd0 [ 42.930920] print_report+0x118/0x608 [ 42.930939] kasan_report+0xdc/0x128 [ 42.930957] __kasan_check_byte+0x54/0x70 [ 42.930975] ksize+0x30/0x88 [ 42.930992] ksize_uaf+0x168/0x5f8 [ 42.931009] kunit_try_run_case+0x170/0x3f0 [ 42.931026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.931046] kthread+0x328/0x630 [ 42.931060] ret_from_fork+0x10/0x20 [ 42.931077] [ 42.998083] Allocated by task 282: [ 43.001535] kasan_save_stack+0x3c/0x68 [ 43.005439] kasan_save_track+0x20/0x40 [ 43.009342] kasan_save_alloc_info+0x40/0x58 [ 43.013677] __kasan_kmalloc+0xd4/0xd8 [ 43.017490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.022088] ksize_uaf+0xb8/0x5f8 [ 43.025459] kunit_try_run_case+0x170/0x3f0 [ 43.029703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.035264] kthread+0x328/0x630 [ 43.038546] ret_from_fork+0x10/0x20 [ 43.042185] [ 43.043713] Freed by task 282: [ 43.046821] kasan_save_stack+0x3c/0x68 [ 43.050724] kasan_save_track+0x20/0x40 [ 43.054627] kasan_save_free_info+0x4c/0x78 [ 43.058873] __kasan_slab_free+0x6c/0x98 [ 43.062861] kfree+0x214/0x3c8 [ 43.065967] ksize_uaf+0x11c/0x5f8 [ 43.069422] kunit_try_run_case+0x170/0x3f0 [ 43.073671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.079232] kthread+0x328/0x630 [ 43.082513] ret_from_fork+0x10/0x20 [ 43.086144] [ 43.087672] The buggy address belongs to the object at ffff00009462ca00 [ 43.087672] which belongs to the cache kmalloc-128 of size 128 [ 43.100322] The buggy address is located 0 bytes inside of [ 43.100322] freed 128-byte region [ffff00009462ca00, ffff00009462ca80) [ 43.112540] [ 43.114063] The buggy address belongs to the physical page: [ 43.119702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11462c [ 43.127808] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.135554] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.142604] page_type: f5(slab) [ 43.145799] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.153638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.161476] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.169397] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.177322] head: 0bfffe0000000001 fffffdffc2518b01 00000000ffffffff 00000000ffffffff [ 43.185244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.193162] page dumped because: kasan: bad access detected [ 43.198804] [ 43.200332] Memory state around the buggy address: [ 43.205194] ffff00009462c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.212507] ffff00009462c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.219818] >ffff00009462ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.227124] ^ [ 43.230401] ffff00009462ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.237714] ffff00009462cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.245026] ================================================================== [ 43.252643] ================================================================== [ 43.259963] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 43.266403] Read of size 1 at addr ffff00009462ca00 by task kunit_try_catch/282 [ 43.273802] [ 43.275339] CPU: 6 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 43.275370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.275378] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.275389] Call trace: [ 43.275395] show_stack+0x20/0x38 (C) [ 43.275413] dump_stack_lvl+0x8c/0xd0 [ 43.275431] print_report+0x118/0x608 [ 43.275449] kasan_report+0xdc/0x128 [ 43.275466] __asan_report_load1_noabort+0x20/0x30 [ 43.275482] ksize_uaf+0x598/0x5f8 [ 43.275497] kunit_try_run_case+0x170/0x3f0 [ 43.275515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.275536] kthread+0x328/0x630 [ 43.275548] ret_from_fork+0x10/0x20 [ 43.275564] [ 43.340411] Allocated by task 282: [ 43.343866] kasan_save_stack+0x3c/0x68 [ 43.347762] kasan_save_track+0x20/0x40 [ 43.351656] kasan_save_alloc_info+0x40/0x58 [ 43.355993] __kasan_kmalloc+0xd4/0xd8 [ 43.359810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.364408] ksize_uaf+0xb8/0x5f8 [ 43.367779] kunit_try_run_case+0x170/0x3f0 [ 43.372030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.377595] kthread+0x328/0x630 [ 43.380877] ret_from_fork+0x10/0x20 [ 43.384508] [ 43.386032] Freed by task 282: [ 43.389137] kasan_save_stack+0x3c/0x68 [ 43.393031] kasan_save_track+0x20/0x40 [ 43.396936] kasan_save_free_info+0x4c/0x78 [ 43.401182] __kasan_slab_free+0x6c/0x98 [ 43.405174] kfree+0x214/0x3c8 [ 43.408285] ksize_uaf+0x11c/0x5f8 [ 43.411741] kunit_try_run_case+0x170/0x3f0 [ 43.415992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.421557] kthread+0x328/0x630 [ 43.424840] ret_from_fork+0x10/0x20 [ 43.428471] [ 43.429993] The buggy address belongs to the object at ffff00009462ca00 [ 43.429993] which belongs to the cache kmalloc-128 of size 128 [ 43.442651] The buggy address is located 0 bytes inside of [ 43.442651] freed 128-byte region [ffff00009462ca00, ffff00009462ca80) [ 43.454863] [ 43.456394] The buggy address belongs to the physical page: [ 43.462040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11462c [ 43.470142] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.477894] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.484944] page_type: f5(slab) [ 43.488140] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.495983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.503825] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.511752] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.519680] head: 0bfffe0000000001 fffffdffc2518b01 00000000ffffffff 00000000ffffffff [ 43.527605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.535528] page dumped because: kasan: bad access detected [ 43.541171] [ 43.542692] Memory state around the buggy address: [ 43.547549] ffff00009462c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.554858] ffff00009462c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.562165] >ffff00009462ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.569471] ^ [ 43.572751] ffff00009462ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.580056] ffff00009462cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.587361] ================================================================== [ 43.594721] ================================================================== [ 43.602033] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 43.608478] Read of size 1 at addr ffff00009462ca78 by task kunit_try_catch/282 [ 43.615875] [ 43.617401] CPU: 6 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 43.617429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.617436] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.617445] Call trace: [ 43.617451] show_stack+0x20/0x38 (C) [ 43.617469] dump_stack_lvl+0x8c/0xd0 [ 43.617486] print_report+0x118/0x608 [ 43.617504] kasan_report+0xdc/0x128 [ 43.617523] __asan_report_load1_noabort+0x20/0x30 [ 43.617540] ksize_uaf+0x544/0x5f8 [ 43.617555] kunit_try_run_case+0x170/0x3f0 [ 43.617571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.617590] kthread+0x328/0x630 [ 43.617603] ret_from_fork+0x10/0x20 [ 43.617620] [ 43.682465] Allocated by task 282: [ 43.685919] kasan_save_stack+0x3c/0x68 [ 43.689825] kasan_save_track+0x20/0x40 [ 43.693719] kasan_save_alloc_info+0x40/0x58 [ 43.698053] __kasan_kmalloc+0xd4/0xd8 [ 43.701859] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.706457] ksize_uaf+0xb8/0x5f8 [ 43.709827] kunit_try_run_case+0x170/0x3f0 [ 43.714076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.719640] kthread+0x328/0x630 [ 43.722924] ret_from_fork+0x10/0x20 [ 43.726556] [ 43.728085] Freed by task 282: [ 43.731191] kasan_save_stack+0x3c/0x68 [ 43.735086] kasan_save_track+0x20/0x40 [ 43.738979] kasan_save_free_info+0x4c/0x78 [ 43.743224] __kasan_slab_free+0x6c/0x98 [ 43.747206] kfree+0x214/0x3c8 [ 43.750315] ksize_uaf+0x11c/0x5f8 [ 43.753773] kunit_try_run_case+0x170/0x3f0 [ 43.758023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.763585] kthread+0x328/0x630 [ 43.766870] ret_from_fork+0x10/0x20 [ 43.770500] [ 43.772029] The buggy address belongs to the object at ffff00009462ca00 [ 43.772029] which belongs to the cache kmalloc-128 of size 128 [ 43.784685] The buggy address is located 120 bytes inside of [ 43.784685] freed 128-byte region [ffff00009462ca00, ffff00009462ca80) [ 43.797071] [ 43.798594] The buggy address belongs to the physical page: [ 43.804235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11462c [ 43.812336] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.820089] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.827139] page_type: f5(slab) [ 43.830335] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.838179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.846020] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.853947] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.861875] head: 0bfffe0000000001 fffffdffc2518b01 00000000ffffffff 00000000ffffffff [ 43.869800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.877723] page dumped because: kasan: bad access detected [ 43.883365] [ 43.884886] Memory state around the buggy address: [ 43.889738] ffff00009462c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.897052] ffff00009462c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.904357] >ffff00009462ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.911663] ^ [ 43.918884] ffff00009462ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.926190] ffff00009462cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.933495] ==================================================================
[ 27.107209] ================================================================== [ 27.107319] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 27.107388] Read of size 1 at addr fff00000c643fa00 by task kunit_try_catch/208 [ 27.107437] [ 27.107467] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.107553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.108297] Hardware name: linux,dummy-virt (DT) [ 27.108350] Call trace: [ 27.108372] show_stack+0x20/0x38 (C) [ 27.108424] dump_stack_lvl+0x8c/0xd0 [ 27.108472] print_report+0x118/0x608 [ 27.108845] kasan_report+0xdc/0x128 [ 27.108899] __asan_report_load1_noabort+0x20/0x30 [ 27.108956] ksize_uaf+0x598/0x5f8 [ 27.109339] kunit_try_run_case+0x170/0x3f0 [ 27.109396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.109739] kthread+0x328/0x630 [ 27.109944] ret_from_fork+0x10/0x20 [ 27.110335] [ 27.110365] Allocated by task 208: [ 27.110397] kasan_save_stack+0x3c/0x68 [ 27.110668] kasan_save_track+0x20/0x40 [ 27.110732] kasan_save_alloc_info+0x40/0x58 [ 27.110768] __kasan_kmalloc+0xd4/0xd8 [ 27.110804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.111380] ksize_uaf+0xb8/0x5f8 [ 27.111434] kunit_try_run_case+0x170/0x3f0 [ 27.111472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.111718] kthread+0x328/0x630 [ 27.111948] ret_from_fork+0x10/0x20 [ 27.111997] [ 27.112016] Freed by task 208: [ 27.112052] kasan_save_stack+0x3c/0x68 [ 27.112189] kasan_save_track+0x20/0x40 [ 27.112461] kasan_save_free_info+0x4c/0x78 [ 27.112555] __kasan_slab_free+0x6c/0x98 [ 27.112592] kfree+0x214/0x3c8 [ 27.112624] ksize_uaf+0x11c/0x5f8 [ 27.112659] kunit_try_run_case+0x170/0x3f0 [ 27.112696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.112740] kthread+0x328/0x630 [ 27.112773] ret_from_fork+0x10/0x20 [ 27.112810] [ 27.112829] The buggy address belongs to the object at fff00000c643fa00 [ 27.112829] which belongs to the cache kmalloc-128 of size 128 [ 27.113912] The buggy address is located 0 bytes inside of [ 27.113912] freed 128-byte region [fff00000c643fa00, fff00000c643fa80) [ 27.114325] [ 27.114557] The buggy address belongs to the physical page: [ 27.114769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.114822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.114872] page_type: f5(slab) [ 27.115481] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.115537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.115577] page dumped because: kasan: bad access detected [ 27.115608] [ 27.115842] Memory state around the buggy address: [ 27.116272] fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.116441] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.116490] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.116857] ^ [ 27.116893] fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.117234] fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.117276] ================================================================== [ 27.097452] ================================================================== [ 27.097511] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 27.097562] Read of size 1 at addr fff00000c643fa00 by task kunit_try_catch/208 [ 27.097610] [ 27.097640] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.097726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.097753] Hardware name: linux,dummy-virt (DT) [ 27.097783] Call trace: [ 27.097805] show_stack+0x20/0x38 (C) [ 27.097854] dump_stack_lvl+0x8c/0xd0 [ 27.097903] print_report+0x118/0x608 [ 27.097951] kasan_report+0xdc/0x128 [ 27.097997] __kasan_check_byte+0x54/0x70 [ 27.098043] ksize+0x30/0x88 [ 27.098670] ksize_uaf+0x168/0x5f8 [ 27.098719] kunit_try_run_case+0x170/0x3f0 [ 27.099328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.099410] kthread+0x328/0x630 [ 27.099457] ret_from_fork+0x10/0x20 [ 27.099506] [ 27.099524] Allocated by task 208: [ 27.099552] kasan_save_stack+0x3c/0x68 [ 27.099594] kasan_save_track+0x20/0x40 [ 27.099632] kasan_save_alloc_info+0x40/0x58 [ 27.099669] __kasan_kmalloc+0xd4/0xd8 [ 27.099706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.099747] ksize_uaf+0xb8/0x5f8 [ 27.099791] kunit_try_run_case+0x170/0x3f0 [ 27.099829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.099872] kthread+0x328/0x630 [ 27.099905] ret_from_fork+0x10/0x20 [ 27.099941] [ 27.099960] Freed by task 208: [ 27.099984] kasan_save_stack+0x3c/0x68 [ 27.100020] kasan_save_track+0x20/0x40 [ 27.100065] kasan_save_free_info+0x4c/0x78 [ 27.100101] __kasan_slab_free+0x6c/0x98 [ 27.101143] kfree+0x214/0x3c8 [ 27.101198] ksize_uaf+0x11c/0x5f8 [ 27.101287] kunit_try_run_case+0x170/0x3f0 [ 27.101324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.101368] kthread+0x328/0x630 [ 27.101517] ret_from_fork+0x10/0x20 [ 27.101827] [ 27.101908] The buggy address belongs to the object at fff00000c643fa00 [ 27.101908] which belongs to the cache kmalloc-128 of size 128 [ 27.102276] The buggy address is located 0 bytes inside of [ 27.102276] freed 128-byte region [fff00000c643fa00, fff00000c643fa80) [ 27.102727] [ 27.102994] The buggy address belongs to the physical page: [ 27.103128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.103519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.103579] page_type: f5(slab) [ 27.103624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.103674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.104049] page dumped because: kasan: bad access detected [ 27.104098] [ 27.104118] Memory state around the buggy address: [ 27.104149] fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.104658] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.104710] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.104958] ^ [ 27.104990] fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105032] fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105095] ================================================================== [ 27.118633] ================================================================== [ 27.118683] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 27.118734] Read of size 1 at addr fff00000c643fa78 by task kunit_try_catch/208 [ 27.118784] [ 27.118813] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.118900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.118927] Hardware name: linux,dummy-virt (DT) [ 27.120230] Call trace: [ 27.120271] show_stack+0x20/0x38 (C) [ 27.120391] dump_stack_lvl+0x8c/0xd0 [ 27.120441] print_report+0x118/0x608 [ 27.120488] kasan_report+0xdc/0x128 [ 27.120533] __asan_report_load1_noabort+0x20/0x30 [ 27.120676] ksize_uaf+0x544/0x5f8 [ 27.120949] kunit_try_run_case+0x170/0x3f0 [ 27.121386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.121512] kthread+0x328/0x630 [ 27.121763] ret_from_fork+0x10/0x20 [ 27.122125] [ 27.122176] Allocated by task 208: [ 27.122239] kasan_save_stack+0x3c/0x68 [ 27.122284] kasan_save_track+0x20/0x40 [ 27.122321] kasan_save_alloc_info+0x40/0x58 [ 27.122358] __kasan_kmalloc+0xd4/0xd8 [ 27.122394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.123317] ksize_uaf+0xb8/0x5f8 [ 27.123747] kunit_try_run_case+0x170/0x3f0 [ 27.123859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.123905] kthread+0x328/0x630 [ 27.123937] ret_from_fork+0x10/0x20 [ 27.124115] [ 27.124483] Freed by task 208: [ 27.124728] kasan_save_stack+0x3c/0x68 [ 27.124778] kasan_save_track+0x20/0x40 [ 27.124816] kasan_save_free_info+0x4c/0x78 [ 27.124853] __kasan_slab_free+0x6c/0x98 [ 27.125690] kfree+0x214/0x3c8 [ 27.125736] ksize_uaf+0x11c/0x5f8 [ 27.125773] kunit_try_run_case+0x170/0x3f0 [ 27.125809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.126358] kthread+0x328/0x630 [ 27.126689] ret_from_fork+0x10/0x20 [ 27.126991] [ 27.127114] The buggy address belongs to the object at fff00000c643fa00 [ 27.127114] which belongs to the cache kmalloc-128 of size 128 [ 27.127416] The buggy address is located 120 bytes inside of [ 27.127416] freed 128-byte region [fff00000c643fa00, fff00000c643fa80) [ 27.127522] [ 27.127801] The buggy address belongs to the physical page: [ 27.127870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.127946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.128268] page_type: f5(slab) [ 27.128521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.128702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.128749] page dumped because: kasan: bad access detected [ 27.128782] [ 27.128799] Memory state around the buggy address: [ 27.129118] fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.129337] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.129654] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.129736] ^ [ 27.130097] fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.130181] fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.130220] ==================================================================
[ 22.624510] ================================================================== [ 22.624925] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 22.625345] Read of size 1 at addr ffff888102d56700 by task kunit_try_catch/225 [ 22.625634] [ 22.625746] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.625794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.625805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.625827] Call Trace: [ 22.625841] <TASK> [ 22.625861] dump_stack_lvl+0x73/0xb0 [ 22.625888] print_report+0xd1/0x650 [ 22.625911] ? __virt_addr_valid+0x1db/0x2d0 [ 22.625935] ? ksize_uaf+0x5fe/0x6c0 [ 22.625955] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.625982] ? ksize_uaf+0x5fe/0x6c0 [ 22.626002] kasan_report+0x141/0x180 [ 22.626023] ? ksize_uaf+0x5fe/0x6c0 [ 22.626046] __asan_report_load1_noabort+0x18/0x20 [ 22.626069] ksize_uaf+0x5fe/0x6c0 [ 22.626089] ? __pfx_ksize_uaf+0x10/0x10 [ 22.626109] ? __schedule+0x10cc/0x2b60 [ 22.626133] ? __pfx_read_tsc+0x10/0x10 [ 22.626155] ? ktime_get_ts64+0x86/0x230 [ 22.626179] kunit_try_run_case+0x1a5/0x480 [ 22.626205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.626252] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.626275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.626300] ? __kthread_parkme+0x82/0x180 [ 22.626320] ? preempt_count_sub+0x50/0x80 [ 22.626345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.626371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.626395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.626418] kthread+0x337/0x6f0 [ 22.626437] ? trace_preempt_on+0x20/0xc0 [ 22.626460] ? __pfx_kthread+0x10/0x10 [ 22.626480] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.626503] ? calculate_sigpending+0x7b/0xa0 [ 22.626526] ? __pfx_kthread+0x10/0x10 [ 22.626547] ret_from_fork+0x116/0x1d0 [ 22.626565] ? __pfx_kthread+0x10/0x10 [ 22.626585] ret_from_fork_asm+0x1a/0x30 [ 22.626615] </TASK> [ 22.626626] [ 22.633268] Allocated by task 225: [ 22.633453] kasan_save_stack+0x45/0x70 [ 22.633620] kasan_save_track+0x18/0x40 [ 22.633840] kasan_save_alloc_info+0x3b/0x50 [ 22.634016] __kasan_kmalloc+0xb7/0xc0 [ 22.634186] __kmalloc_cache_noprof+0x189/0x420 [ 22.634380] ksize_uaf+0xaa/0x6c0 [ 22.634530] kunit_try_run_case+0x1a5/0x480 [ 22.634670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.634837] kthread+0x337/0x6f0 [ 22.634964] ret_from_fork+0x116/0x1d0 [ 22.635284] ret_from_fork_asm+0x1a/0x30 [ 22.635477] [ 22.635569] Freed by task 225: [ 22.635720] kasan_save_stack+0x45/0x70 [ 22.635983] kasan_save_track+0x18/0x40 [ 22.636528] kasan_save_free_info+0x3f/0x60 [ 22.636751] __kasan_slab_free+0x56/0x70 [ 22.636987] kfree+0x222/0x3f0 [ 22.637143] ksize_uaf+0x12c/0x6c0 [ 22.637305] kunit_try_run_case+0x1a5/0x480 [ 22.637446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.637613] kthread+0x337/0x6f0 [ 22.637725] ret_from_fork+0x116/0x1d0 [ 22.637849] ret_from_fork_asm+0x1a/0x30 [ 22.638025] [ 22.638115] The buggy address belongs to the object at ffff888102d56700 [ 22.638115] which belongs to the cache kmalloc-128 of size 128 [ 22.638862] The buggy address is located 0 bytes inside of [ 22.638862] freed 128-byte region [ffff888102d56700, ffff888102d56780) [ 22.639438] [ 22.639516] The buggy address belongs to the physical page: [ 22.639685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d56 [ 22.639920] flags: 0x200000000000000(node=0|zone=2) [ 22.640142] page_type: f5(slab) [ 22.640421] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.640764] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.641092] page dumped because: kasan: bad access detected [ 22.641396] [ 22.641473] Memory state around the buggy address: [ 22.641711] ffff888102d56600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.642028] ffff888102d56680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.642371] >ffff888102d56700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.642683] ^ [ 22.642828] ffff888102d56780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.643041] ffff888102d56800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.643291] ================================================================== [ 22.591692] ================================================================== [ 22.592829] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 22.593344] Read of size 1 at addr ffff888102d56700 by task kunit_try_catch/225 [ 22.594046] [ 22.594179] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.594243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.594256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.594279] Call Trace: [ 22.594294] <TASK> [ 22.594315] dump_stack_lvl+0x73/0xb0 [ 22.594374] print_report+0xd1/0x650 [ 22.594398] ? __virt_addr_valid+0x1db/0x2d0 [ 22.594435] ? ksize_uaf+0x19d/0x6c0 [ 22.594464] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.594521] ? ksize_uaf+0x19d/0x6c0 [ 22.594542] kasan_report+0x141/0x180 [ 22.594563] ? ksize_uaf+0x19d/0x6c0 [ 22.594585] ? ksize_uaf+0x19d/0x6c0 [ 22.594604] __kasan_check_byte+0x3d/0x50 [ 22.594626] ksize+0x20/0x60 [ 22.594650] ksize_uaf+0x19d/0x6c0 [ 22.594669] ? __pfx_ksize_uaf+0x10/0x10 [ 22.594690] ? __schedule+0x10cc/0x2b60 [ 22.594714] ? __pfx_read_tsc+0x10/0x10 [ 22.594736] ? ktime_get_ts64+0x86/0x230 [ 22.594760] kunit_try_run_case+0x1a5/0x480 [ 22.594791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.594813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.594837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.594861] ? __kthread_parkme+0x82/0x180 [ 22.594881] ? preempt_count_sub+0x50/0x80 [ 22.594903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.594926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.594949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.594972] kthread+0x337/0x6f0 [ 22.594992] ? trace_preempt_on+0x20/0xc0 [ 22.595014] ? __pfx_kthread+0x10/0x10 [ 22.595045] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.595067] ? calculate_sigpending+0x7b/0xa0 [ 22.595090] ? __pfx_kthread+0x10/0x10 [ 22.595111] ret_from_fork+0x116/0x1d0 [ 22.595129] ? __pfx_kthread+0x10/0x10 [ 22.595149] ret_from_fork_asm+0x1a/0x30 [ 22.595180] </TASK> [ 22.595192] [ 22.607995] Allocated by task 225: [ 22.608354] kasan_save_stack+0x45/0x70 [ 22.608746] kasan_save_track+0x18/0x40 [ 22.609184] kasan_save_alloc_info+0x3b/0x50 [ 22.609585] __kasan_kmalloc+0xb7/0xc0 [ 22.609939] __kmalloc_cache_noprof+0x189/0x420 [ 22.610258] ksize_uaf+0xaa/0x6c0 [ 22.610582] kunit_try_run_case+0x1a5/0x480 [ 22.610937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.611122] kthread+0x337/0x6f0 [ 22.611245] ret_from_fork+0x116/0x1d0 [ 22.611369] ret_from_fork_asm+0x1a/0x30 [ 22.611498] [ 22.611561] Freed by task 225: [ 22.611664] kasan_save_stack+0x45/0x70 [ 22.611788] kasan_save_track+0x18/0x40 [ 22.611912] kasan_save_free_info+0x3f/0x60 [ 22.612046] __kasan_slab_free+0x56/0x70 [ 22.612172] kfree+0x222/0x3f0 [ 22.612424] ksize_uaf+0x12c/0x6c0 [ 22.613279] kunit_try_run_case+0x1a5/0x480 [ 22.613722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.614290] kthread+0x337/0x6f0 [ 22.614606] ret_from_fork+0x116/0x1d0 [ 22.615040] ret_from_fork_asm+0x1a/0x30 [ 22.615420] [ 22.615584] The buggy address belongs to the object at ffff888102d56700 [ 22.615584] which belongs to the cache kmalloc-128 of size 128 [ 22.616713] The buggy address is located 0 bytes inside of [ 22.616713] freed 128-byte region [ffff888102d56700, ffff888102d56780) [ 22.618109] [ 22.618293] The buggy address belongs to the physical page: [ 22.618760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d56 [ 22.619438] flags: 0x200000000000000(node=0|zone=2) [ 22.619605] page_type: f5(slab) [ 22.619723] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.620409] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.621165] page dumped because: kasan: bad access detected [ 22.621745] [ 22.622117] Memory state around the buggy address: [ 22.622310] ffff888102d56600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.622522] ffff888102d56680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.622730] >ffff888102d56700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.623009] ^ [ 22.623242] ffff888102d56780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.623491] ffff888102d56800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.623788] ================================================================== [ 22.644027] ================================================================== [ 22.644661] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 22.645147] Read of size 1 at addr ffff888102d56778 by task kunit_try_catch/225 [ 22.645436] [ 22.645522] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 22.645569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.645581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.645603] Call Trace: [ 22.645622] <TASK> [ 22.645640] dump_stack_lvl+0x73/0xb0 [ 22.645667] print_report+0xd1/0x650 [ 22.645689] ? __virt_addr_valid+0x1db/0x2d0 [ 22.645712] ? ksize_uaf+0x5e4/0x6c0 [ 22.645731] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.645756] ? ksize_uaf+0x5e4/0x6c0 [ 22.645776] kasan_report+0x141/0x180 [ 22.645797] ? ksize_uaf+0x5e4/0x6c0 [ 22.645821] __asan_report_load1_noabort+0x18/0x20 [ 22.645843] ksize_uaf+0x5e4/0x6c0 [ 22.645862] ? __pfx_ksize_uaf+0x10/0x10 [ 22.645882] ? __schedule+0x10cc/0x2b60 [ 22.645907] ? __pfx_read_tsc+0x10/0x10 [ 22.645928] ? ktime_get_ts64+0x86/0x230 [ 22.645951] kunit_try_run_case+0x1a5/0x480 [ 22.645975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.645997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.646020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.646044] ? __kthread_parkme+0x82/0x180 [ 22.646064] ? preempt_count_sub+0x50/0x80 [ 22.646086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.646109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.646131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.646154] kthread+0x337/0x6f0 [ 22.646172] ? trace_preempt_on+0x20/0xc0 [ 22.646195] ? __pfx_kthread+0x10/0x10 [ 22.646214] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.646293] ? calculate_sigpending+0x7b/0xa0 [ 22.646317] ? __pfx_kthread+0x10/0x10 [ 22.646338] ret_from_fork+0x116/0x1d0 [ 22.646356] ? __pfx_kthread+0x10/0x10 [ 22.646375] ret_from_fork_asm+0x1a/0x30 [ 22.646405] </TASK> [ 22.646416] [ 22.653438] Allocated by task 225: [ 22.653628] kasan_save_stack+0x45/0x70 [ 22.653820] kasan_save_track+0x18/0x40 [ 22.654003] kasan_save_alloc_info+0x3b/0x50 [ 22.654209] __kasan_kmalloc+0xb7/0xc0 [ 22.654403] __kmalloc_cache_noprof+0x189/0x420 [ 22.654614] ksize_uaf+0xaa/0x6c0 [ 22.654743] kunit_try_run_case+0x1a5/0x480 [ 22.654885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.655157] kthread+0x337/0x6f0 [ 22.655333] ret_from_fork+0x116/0x1d0 [ 22.655516] ret_from_fork_asm+0x1a/0x30 [ 22.655709] [ 22.655798] Freed by task 225: [ 22.655952] kasan_save_stack+0x45/0x70 [ 22.656265] kasan_save_track+0x18/0x40 [ 22.656408] kasan_save_free_info+0x3f/0x60 [ 22.656547] __kasan_slab_free+0x56/0x70 [ 22.656689] kfree+0x222/0x3f0 [ 22.656843] ksize_uaf+0x12c/0x6c0 [ 22.657010] kunit_try_run_case+0x1a5/0x480 [ 22.657240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.657472] kthread+0x337/0x6f0 [ 22.657588] ret_from_fork+0x116/0x1d0 [ 22.657769] ret_from_fork_asm+0x1a/0x30 [ 22.657956] [ 22.658029] The buggy address belongs to the object at ffff888102d56700 [ 22.658029] which belongs to the cache kmalloc-128 of size 128 [ 22.658490] The buggy address is located 120 bytes inside of [ 22.658490] freed 128-byte region [ffff888102d56700, ffff888102d56780) [ 22.658972] [ 22.659100] The buggy address belongs to the physical page: [ 22.659438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d56 [ 22.659731] flags: 0x200000000000000(node=0|zone=2) [ 22.660002] page_type: f5(slab) [ 22.660146] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.660477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.660846] page dumped because: kasan: bad access detected [ 22.661035] [ 22.661123] Memory state around the buggy address: [ 22.661355] ffff888102d56600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.661565] ffff888102d56680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.661775] >ffff888102d56700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.661980] ^ [ 22.662183] ffff888102d56780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.662624] ffff888102d56800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.663359] ==================================================================