Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   52.626420] ==================================================================
[   52.633736] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   52.639740] Read of size 1 at addr ffff000096c34790 by task kunit_try_catch/345
[   52.647148] 
[   52.648681] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   52.648710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.648719] Hardware name: Thundercomm Dragonboard 845c (DT)
[   52.648730] Call trace:
[   52.648735]  show_stack+0x20/0x38 (C)
[   52.648753]  dump_stack_lvl+0x8c/0xd0
[   52.648772]  print_report+0x118/0x608
[   52.648790]  kasan_report+0xdc/0x128
[   52.648808]  __asan_report_load1_noabort+0x20/0x30
[   52.648825]  strlen+0xa8/0xb0
[   52.648839]  kasan_strings+0x418/0xb00
[   52.648854]  kunit_try_run_case+0x170/0x3f0
[   52.648873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.648893]  kthread+0x328/0x630
[   52.648907]  ret_from_fork+0x10/0x20
[   52.648923] 
[   52.717157] Allocated by task 345:
[   52.720609]  kasan_save_stack+0x3c/0x68
[   52.724514]  kasan_save_track+0x20/0x40
[   52.728417]  kasan_save_alloc_info+0x40/0x58
[   52.732751]  __kasan_kmalloc+0xd4/0xd8
[   52.736567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.741164]  kasan_strings+0xc8/0xb00
[   52.744891]  kunit_try_run_case+0x170/0x3f0
[   52.749140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.754704]  kthread+0x328/0x630
[   52.757985]  ret_from_fork+0x10/0x20
[   52.761625] 
[   52.763147] Freed by task 345:
[   52.766250]  kasan_save_stack+0x3c/0x68
[   52.770154]  kasan_save_track+0x20/0x40
[   52.774056]  kasan_save_free_info+0x4c/0x78
[   52.778302]  __kasan_slab_free+0x6c/0x98
[   52.782294]  kfree+0x214/0x3c8
[   52.785402]  kasan_strings+0x24c/0xb00
[   52.789215]  kunit_try_run_case+0x170/0x3f0
[   52.793464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.799028]  kthread+0x328/0x630
[   52.802309]  ret_from_fork+0x10/0x20
[   52.805939] 
[   52.807469] The buggy address belongs to the object at ffff000096c34780
[   52.807469]  which belongs to the cache kmalloc-32 of size 32
[   52.819942] The buggy address is located 16 bytes inside of
[   52.819942]  freed 32-byte region [ffff000096c34780, ffff000096c347a0)
[   52.832162] 
[   52.833685] The buggy address belongs to the physical page:
[   52.839325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116c34
[   52.847420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.854034] page_type: f5(slab)
[   52.857230] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000
[   52.865070] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   52.872905] page dumped because: kasan: bad access detected
[   52.878547] 
[   52.880074] Memory state around the buggy address:
[   52.884926]  ffff000096c34680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.892241]  ffff000096c34700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.899556] >ffff000096c34780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.906861]                          ^
[   52.910670]  ffff000096c34800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   52.917984]  ffff000096c34880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   52.925293] ==================================================================

[   29.096831] ==================================================================
[   29.097162] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   29.097303] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271
[   29.097399] 
[   29.097506] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.097628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.097675] Hardware name: linux,dummy-virt (DT)
[   29.097710] Call trace:
[   29.097732]  show_stack+0x20/0x38 (C)
[   29.097946]  dump_stack_lvl+0x8c/0xd0
[   29.098043]  print_report+0x118/0x608
[   29.098200]  kasan_report+0xdc/0x128
[   29.098267]  __asan_report_load1_noabort+0x20/0x30
[   29.098321]  strlen+0xa8/0xb0
[   29.098363]  kasan_strings+0x418/0xb00
[   29.098411]  kunit_try_run_case+0x170/0x3f0
[   29.098642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.098846]  kthread+0x328/0x630
[   29.098906]  ret_from_fork+0x10/0x20
[   29.098959] 
[   29.099018] Allocated by task 271:
[   29.099052]  kasan_save_stack+0x3c/0x68
[   29.099127]  kasan_save_track+0x20/0x40
[   29.099168]  kasan_save_alloc_info+0x40/0x58
[   29.099206]  __kasan_kmalloc+0xd4/0xd8
[   29.099254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.099296]  kasan_strings+0xc8/0xb00
[   29.099333]  kunit_try_run_case+0x170/0x3f0
[   29.099382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.099428]  kthread+0x328/0x630
[   29.099462]  ret_from_fork+0x10/0x20
[   29.099500] 
[   29.099528] Freed by task 271:
[   29.099557]  kasan_save_stack+0x3c/0x68
[   29.099598]  kasan_save_track+0x20/0x40
[   29.099635]  kasan_save_free_info+0x4c/0x78
[   29.099672]  __kasan_slab_free+0x6c/0x98
[   29.099722]  kfree+0x214/0x3c8
[   29.099756]  kasan_strings+0x24c/0xb00
[   29.099823]  kunit_try_run_case+0x170/0x3f0
[   29.099867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.100163]  kthread+0x328/0x630
[   29.100443]  ret_from_fork+0x10/0x20
[   29.100620] 
[   29.100678] The buggy address belongs to the object at fff00000c5770780
[   29.100678]  which belongs to the cache kmalloc-32 of size 32
[   29.100894] The buggy address is located 16 bytes inside of
[   29.100894]  freed 32-byte region [fff00000c5770780, fff00000c57707a0)
[   29.101115] 
[   29.101183] The buggy address belongs to the physical page:
[   29.101287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770
[   29.101412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.101562] page_type: f5(slab)
[   29.101646] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.101749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.101848] page dumped because: kasan: bad access detected
[   29.101975] 
[   29.102093] Memory state around the buggy address:
[   29.102344]  fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.102501]  fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   29.102597] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.102712]                          ^
[   29.102899]  fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.102986]  fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.103026] ==================================================================

[   24.097202] ==================================================================
[   24.097613] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   24.097921] Read of size 1 at addr ffff888102d5c7d0 by task kunit_try_catch/288
[   24.098285] 
[   24.098375] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.098424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.098435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.098457] Call Trace:
[   24.098470]  <TASK>
[   24.098487]  dump_stack_lvl+0x73/0xb0
[   24.098524]  print_report+0xd1/0x650
[   24.098573]  ? __virt_addr_valid+0x1db/0x2d0
[   24.098598]  ? strlen+0x8f/0xb0
[   24.098618]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.098643]  ? strlen+0x8f/0xb0
[   24.098663]  kasan_report+0x141/0x180
[   24.098684]  ? strlen+0x8f/0xb0
[   24.098707]  __asan_report_load1_noabort+0x18/0x20
[   24.098732]  strlen+0x8f/0xb0
[   24.098752]  kasan_strings+0x57b/0xe80
[   24.098772]  ? trace_hardirqs_on+0x37/0xe0
[   24.098795]  ? __pfx_kasan_strings+0x10/0x10
[   24.098851]  ? finish_task_switch.isra.0+0x153/0x700
[   24.098874]  ? __switch_to+0x47/0xf50
[   24.098899]  ? __schedule+0x10cc/0x2b60
[   24.098924]  ? __pfx_read_tsc+0x10/0x10
[   24.098997]  ? ktime_get_ts64+0x86/0x230
[   24.099021]  kunit_try_run_case+0x1a5/0x480
[   24.099054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.099076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.099100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.099125]  ? __kthread_parkme+0x82/0x180
[   24.099146]  ? preempt_count_sub+0x50/0x80
[   24.099168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.099191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.099214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.099249]  kthread+0x337/0x6f0
[   24.099267]  ? trace_preempt_on+0x20/0xc0
[   24.099289]  ? __pfx_kthread+0x10/0x10
[   24.099332]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.099355]  ? calculate_sigpending+0x7b/0xa0
[   24.099378]  ? __pfx_kthread+0x10/0x10
[   24.099399]  ret_from_fork+0x116/0x1d0
[   24.099418]  ? __pfx_kthread+0x10/0x10
[   24.099438]  ret_from_fork_asm+0x1a/0x30
[   24.099468]  </TASK>
[   24.099497] 
[   24.108109] Allocated by task 288:
[   24.108351]  kasan_save_stack+0x45/0x70
[   24.108546]  kasan_save_track+0x18/0x40
[   24.108684]  kasan_save_alloc_info+0x3b/0x50
[   24.108976]  __kasan_kmalloc+0xb7/0xc0
[   24.109269]  __kmalloc_cache_noprof+0x189/0x420
[   24.109507]  kasan_strings+0xc0/0xe80
[   24.109697]  kunit_try_run_case+0x1a5/0x480
[   24.109839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.110008]  kthread+0x337/0x6f0
[   24.110122]  ret_from_fork+0x116/0x1d0
[   24.110317]  ret_from_fork_asm+0x1a/0x30
[   24.110508] 
[   24.110680] Freed by task 288:
[   24.110902]  kasan_save_stack+0x45/0x70
[   24.111124]  kasan_save_track+0x18/0x40
[   24.111262]  kasan_save_free_info+0x3f/0x60
[   24.111402]  __kasan_slab_free+0x56/0x70
[   24.111532]  kfree+0x222/0x3f0
[   24.111687]  kasan_strings+0x2aa/0xe80
[   24.111866]  kunit_try_run_case+0x1a5/0x480
[   24.112123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.112379]  kthread+0x337/0x6f0
[   24.112541]  ret_from_fork+0x116/0x1d0
[   24.112722]  ret_from_fork_asm+0x1a/0x30
[   24.112912] 
[   24.112995] The buggy address belongs to the object at ffff888102d5c7c0
[   24.112995]  which belongs to the cache kmalloc-32 of size 32
[   24.113665] The buggy address is located 16 bytes inside of
[   24.113665]  freed 32-byte region [ffff888102d5c7c0, ffff888102d5c7e0)
[   24.114468] 
[   24.114566] The buggy address belongs to the physical page:
[   24.114737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5c
[   24.114975] flags: 0x200000000000000(node=0|zone=2)
[   24.115141] page_type: f5(slab)
[   24.115268] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   24.116094] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.117009] page dumped because: kasan: bad access detected
[   24.117281] 
[   24.117374] Memory state around the buggy address:
[   24.118248]  ffff888102d5c680: fa fb fb fb fc fc fc fc 00 00 00 04 fc fc fc fc
[   24.118545]  ffff888102d5c700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.118832] >ffff888102d5c780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.119427]                                                  ^
[   24.120171]  ffff888102d5c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.120999]  ffff888102d5c880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.121316] ==================================================================