Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   51.999288] ==================================================================
[   52.023450] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   52.029451] Read of size 1 at addr ffff000096c34790 by task kunit_try_catch/345
[   52.036857] 
[   52.038388] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   52.038422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.038431] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.038445] Call trace:
[   52.038453]  show_stack+0x20/0x38 (C)
[   52.038474]  dump_stack_lvl+0x8c/0xd0
[   52.038494]  print_report+0x118/0x608
[   52.038513]  kasan_report+0xdc/0x128
[   52.038532]  __asan_report_load1_noabort+0x20/0x30
[   52.038548]  strcmp+0xc0/0xc8
[   52.038562]  kasan_strings+0x340/0xb00
[   52.038578]  kunit_try_run_case+0x170/0x3f0
[   52.038599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.038621]  kthread+0x328/0x630
[   52.038636]  ret_from_fork+0x10/0x20
[   52.038653] 
[   52.106878] Allocated by task 345:
[   52.110332]  kasan_save_stack+0x3c/0x68
[   52.114238]  kasan_save_track+0x20/0x40
[   52.118140]  kasan_save_alloc_info+0x40/0x58
[   52.122474]  __kasan_kmalloc+0xd4/0xd8
[   52.126291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.130889]  kasan_strings+0xc8/0xb00
[   52.134616]  kunit_try_run_case+0x170/0x3f0
[   52.138864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.144433]  kthread+0x328/0x630
[   52.147714]  ret_from_fork+0x10/0x20
[   52.151347] 
[   52.152877] Freed by task 345:
[   52.155983]  kasan_save_stack+0x3c/0x68
[   52.159886]  kasan_save_track+0x20/0x40
[   52.163790]  kasan_save_free_info+0x4c/0x78
[   52.168036]  __kasan_slab_free+0x6c/0x98
[   52.172026]  kfree+0x214/0x3c8
[   52.175139]  kasan_strings+0x24c/0xb00
[   52.178951]  kunit_try_run_case+0x170/0x3f0
[   52.183200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.188760]  kthread+0x328/0x630
[   52.192042]  ret_from_fork+0x10/0x20
[   52.195673] 
[   52.197196] The buggy address belongs to the object at ffff000096c34780
[   52.197196]  which belongs to the cache kmalloc-32 of size 32
[   52.209672] The buggy address is located 16 bytes inside of
[   52.209672]  freed 32-byte region [ffff000096c34780, ffff000096c347a0)
[   52.221891] 
[   52.223422] The buggy address belongs to the physical page:
[   52.229061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116c34
[   52.237163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.243774] page_type: f5(slab)
[   52.246976] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   52.254816] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   52.262649] page dumped because: kasan: bad access detected
[   52.268298] 
[   52.269820] Memory state around the buggy address:
[   52.274672]  ffff000096c34680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.281987]  ffff000096c34700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.289300] >ffff000096c34780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.296612]                          ^
[   52.300424]  ffff000096c34800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   52.307738]  ffff000096c34880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.315044] ==================================================================

[   29.079585] ==================================================================
[   29.079648] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   29.079986] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.080110] 
[   29.080231] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.080347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.080452] Hardware name: linux,dummy-virt (DT)
[   29.080539] Call trace:
[   29.080614]  show_stack+0x20/0x38 (C)
[   29.080735]  dump_stack_lvl+0x8c/0xd0
[   29.080829]  print_report+0x118/0x608
[   29.080879]  kasan_report+0xdc/0x128
[   29.080927]  __asan_report_load1_noabort+0x20/0x30
[   29.080976]  strcmp+0xc0/0xc8
[   29.081431]  kasan_strings+0x340/0xb00
[   29.081573]  kunit_try_run_case+0x170/0x3f0
[   29.081681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.081843]  kthread+0x328/0x630
[   29.081986]  ret_from_fork+0x10/0x20
[   29.082191] 
[   29.082242] Allocated by task 271:
[   29.082273]  kasan_save_stack+0x3c/0x68
[   29.082347]  kasan_save_track+0x20/0x40
[   29.082784]  kasan_save_alloc_info+0x40/0x58
[   29.082910]  __kasan_kmalloc+0xd4/0xd8
[   29.083017]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.083166]  kasan_strings+0xc8/0xb00
[   29.083253]  kunit_try_run_case+0x170/0x3f0
[   29.083348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.083451]  kthread+0x328/0x630
[   29.083486]  ret_from_fork+0x10/0x20
[   29.083551] 
[   29.083738] Freed by task 271:
[   29.083903]  kasan_save_stack+0x3c/0x68
[   29.084158]  kasan_save_track+0x20/0x40
[   29.084244]  kasan_save_free_info+0x4c/0x78
[   29.084306]  __kasan_slab_free+0x6c/0x98
[   29.084375]  kfree+0x214/0x3c8
[   29.084439]  kasan_strings+0x24c/0xb00
[   29.084481]  kunit_try_run_case+0x170/0x3f0
[   29.084523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.084748]  kthread+0x328/0x630
[   29.084875]  ret_from_fork+0x10/0x20
[   29.084998] 
[   29.085151] The buggy address belongs to the object at fff00000c5770780
[   29.085151]  which belongs to the cache kmalloc-32 of size 32
[   29.085284] The buggy address is located 16 bytes inside of
[   29.085284]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.085423] 
[   29.085502] The buggy address belongs to the physical page:
[   29.085570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.085631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.085689] page_type: f5(slab)
[   29.085750] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.085802] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.085842] page dumped because: kasan: bad access detected
[   29.085875] 
[   29.085903] Memory state around the buggy address:
[   29.085937]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.085982]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.086038] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.086089]                          ^
[   29.086121]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.086180]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.086230] ==================================================================

[   24.042875] ==================================================================
[   24.044008] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   24.044371] Read of size 1 at addr ffff888102d5c7d0 by task kunit_try_catch/288
[   24.044671] 
[   24.044790] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.044843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.044855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.044880] Call Trace:
[   24.044895]  <TASK>
[   24.044914]  dump_stack_lvl+0x73/0xb0
[   24.044943]  print_report+0xd1/0x650
[   24.044966]  ? __virt_addr_valid+0x1db/0x2d0
[   24.044990]  ? strcmp+0xb0/0xc0
[   24.045008]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.045035]  ? strcmp+0xb0/0xc0
[   24.045053]  kasan_report+0x141/0x180
[   24.045075]  ? strcmp+0xb0/0xc0
[   24.045098]  __asan_report_load1_noabort+0x18/0x20
[   24.045121]  strcmp+0xb0/0xc0
[   24.045141]  kasan_strings+0x431/0xe80
[   24.045162]  ? trace_hardirqs_on+0x37/0xe0
[   24.045186]  ? __pfx_kasan_strings+0x10/0x10
[   24.045205]  ? finish_task_switch.isra.0+0x153/0x700
[   24.045237]  ? __switch_to+0x47/0xf50
[   24.045263]  ? __schedule+0x10cc/0x2b60
[   24.045287]  ? __pfx_read_tsc+0x10/0x10
[   24.045309]  ? ktime_get_ts64+0x86/0x230
[   24.045333]  kunit_try_run_case+0x1a5/0x480
[   24.045358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.045380]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.045405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.045429]  ? __kthread_parkme+0x82/0x180
[   24.045449]  ? preempt_count_sub+0x50/0x80
[   24.045471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.045494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.045517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.045541]  kthread+0x337/0x6f0
[   24.045560]  ? trace_preempt_on+0x20/0xc0
[   24.045582]  ? __pfx_kthread+0x10/0x10
[   24.045602]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.045625]  ? calculate_sigpending+0x7b/0xa0
[   24.045648]  ? __pfx_kthread+0x10/0x10
[   24.045669]  ret_from_fork+0x116/0x1d0
[   24.045688]  ? __pfx_kthread+0x10/0x10
[   24.045708]  ret_from_fork_asm+0x1a/0x30
[   24.045739]  </TASK>
[   24.045751] 
[   24.055927] Allocated by task 288:
[   24.056113]  kasan_save_stack+0x45/0x70
[   24.056342]  kasan_save_track+0x18/0x40
[   24.056518]  kasan_save_alloc_info+0x3b/0x50
[   24.056706]  __kasan_kmalloc+0xb7/0xc0
[   24.056888]  __kmalloc_cache_noprof+0x189/0x420
[   24.057582]  kasan_strings+0xc0/0xe80
[   24.057753]  kunit_try_run_case+0x1a5/0x480
[   24.058004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.058432]  kthread+0x337/0x6f0
[   24.058600]  ret_from_fork+0x116/0x1d0
[   24.058778]  ret_from_fork_asm+0x1a/0x30
[   24.059000] 
[   24.059075] Freed by task 288:
[   24.059338]  kasan_save_stack+0x45/0x70
[   24.059510]  kasan_save_track+0x18/0x40
[   24.059675]  kasan_save_free_info+0x3f/0x60
[   24.059933]  __kasan_slab_free+0x56/0x70
[   24.060165]  kfree+0x222/0x3f0
[   24.060297]  kasan_strings+0x2aa/0xe80
[   24.061209]  kunit_try_run_case+0x1a5/0x480
[   24.061396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.061655]  kthread+0x337/0x6f0
[   24.061807]  ret_from_fork+0x116/0x1d0
[   24.062057]  ret_from_fork_asm+0x1a/0x30
[   24.062193] 
[   24.062298] The buggy address belongs to the object at ffff888102d5c7c0
[   24.062298]  which belongs to the cache kmalloc-32 of size 32
[   24.062898] The buggy address is located 16 bytes inside of
[   24.062898]  freed 32-byte region [ffff888102d5c7c0, ffff888102d5c7e0)
[   24.063571] 
[   24.064052] The buggy address belongs to the physical page:
[   24.064414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5c
[   24.064935] flags: 0x200000000000000(node=0|zone=2)
[   24.065267] page_type: f5(slab)
[   24.065576] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   24.065893] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.066304] page dumped because: kasan: bad access detected
[   24.066555] 
[   24.066632] Memory state around the buggy address:
[   24.066852]  ffff888102d5c680: fa fb fb fb fc fc fc fc 00 00 00 04 fc fc fc fc
[   24.067168]  ffff888102d5c700: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   24.067434] >ffff888102d5c780: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.067707]                                                  ^
[   24.067980]  ffff888102d5c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.068395]  ffff888102d5c880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.068716] ==================================================================