Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.917997] ==================================================================
[   30.918069] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.918346] Read of size 1 at addr fff00000c919c7a8 by task kunit_try_catch/217
[   30.918426] 
[   30.918552] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.918664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.918701] Hardware name: linux,dummy-virt (DT)
[   30.918790] Call trace:
[   30.918817]  show_stack+0x20/0x38 (C)
[   30.918869]  dump_stack_lvl+0x8c/0xd0
[   30.919086]  print_report+0x118/0x608
[   30.919152]  kasan_report+0xdc/0x128
[   30.919301]  __asan_report_load1_noabort+0x20/0x30
[   30.919415]  kmalloc_uaf+0x300/0x338
[   30.919483]  kunit_try_run_case+0x170/0x3f0
[   30.919552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.919696]  kthread+0x328/0x630
[   30.919769]  ret_from_fork+0x10/0x20
[   30.919973] 
[   30.920042] Allocated by task 217:
[   30.920193]  kasan_save_stack+0x3c/0x68
[   30.920422]  kasan_save_track+0x20/0x40
[   30.920592]  kasan_save_alloc_info+0x40/0x58
[   30.920709]  __kasan_kmalloc+0xd4/0xd8
[   30.920804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.920874]  kmalloc_uaf+0xb8/0x338
[   30.920948]  kunit_try_run_case+0x170/0x3f0
[   30.921149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.921334]  kthread+0x328/0x630
[   30.921453]  ret_from_fork+0x10/0x20
[   30.921543] 
[   30.921594] Freed by task 217:
[   30.921709]  kasan_save_stack+0x3c/0x68
[   30.921791]  kasan_save_track+0x20/0x40
[   30.921871]  kasan_save_free_info+0x4c/0x78
[   30.921992]  __kasan_slab_free+0x6c/0x98
[   30.922040]  kfree+0x214/0x3c8
[   30.922098]  kmalloc_uaf+0x11c/0x338
[   30.922434]  kunit_try_run_case+0x170/0x3f0
[   30.922513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.922625]  kthread+0x328/0x630
[   30.922728]  ret_from_fork+0x10/0x20
[   30.922796] 
[   30.922908] The buggy address belongs to the object at fff00000c919c7a0
[   30.922908]  which belongs to the cache kmalloc-16 of size 16
[   30.923006] The buggy address is located 8 bytes inside of
[   30.923006]  freed 16-byte region [fff00000c919c7a0, fff00000c919c7b0)
[   30.923312] 
[   30.923517] The buggy address belongs to the physical page:
[   30.923596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c919c6c0 pfn:0x10919c
[   30.923682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.923844] page_type: f5(slab)
[   30.923923] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.924145] raw: fff00000c919c6c0 000000008080007f 00000000f5000000 0000000000000000
[   30.924186] page dumped because: kasan: bad access detected
[   30.924393] 
[   30.924444] Memory state around the buggy address:
[   30.924505]  fff00000c919c680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   30.924590]  fff00000c919c700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.924753] >fff00000c919c780: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.924958]                                   ^
[   30.925040]  fff00000c919c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.925111]  fff00000c919c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.925238] ==================================================================

[   32.669449] ==================================================================
[   32.669516] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   32.669568] Read of size 1 at addr fff00000c57889a8 by task kunit_try_catch/215
[   32.669617] 
[   32.669646] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.669761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.669790] Hardware name: linux,dummy-virt (DT)
[   32.669822] Call trace:
[   32.669845]  show_stack+0x20/0x38 (C)
[   32.669893]  dump_stack_lvl+0x8c/0xd0
[   32.669941]  print_report+0x118/0x608
[   32.669989]  kasan_report+0xdc/0x128
[   32.670036]  __asan_report_load1_noabort+0x20/0x30
[   32.670085]  kmalloc_uaf+0x300/0x338
[   32.670134]  kunit_try_run_case+0x170/0x3f0
[   32.670197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.670251]  kthread+0x328/0x630
[   32.670524]  ret_from_fork+0x10/0x20
[   32.670742] 
[   32.670787] Allocated by task 215:
[   32.670817]  kasan_save_stack+0x3c/0x68
[   32.670875]  kasan_save_track+0x20/0x40
[   32.670915]  kasan_save_alloc_info+0x40/0x58
[   32.670962]  __kasan_kmalloc+0xd4/0xd8
[   32.671010]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.671073]  kmalloc_uaf+0xb8/0x338
[   32.671300]  kunit_try_run_case+0x170/0x3f0
[   32.671344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.671389]  kthread+0x328/0x630
[   32.671461]  ret_from_fork+0x10/0x20
[   32.671524] 
[   32.671574] Freed by task 215:
[   32.671654]  kasan_save_stack+0x3c/0x68
[   32.671712]  kasan_save_track+0x20/0x40
[   32.671780]  kasan_save_free_info+0x4c/0x78
[   32.671874]  __kasan_slab_free+0x6c/0x98
[   32.671941]  kfree+0x214/0x3c8
[   32.671986]  kmalloc_uaf+0x11c/0x338
[   32.672021]  kunit_try_run_case+0x170/0x3f0
[   32.672060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.672104]  kthread+0x328/0x630
[   32.672138]  ret_from_fork+0x10/0x20
[   32.672185] 
[   32.672474] The buggy address belongs to the object at fff00000c57889a0
[   32.672474]  which belongs to the cache kmalloc-16 of size 16
[   32.672571] The buggy address is located 8 bytes inside of
[   32.672571]  freed 16-byte region [fff00000c57889a0, fff00000c57889b0)
[   32.672849] 
[   32.672917] The buggy address belongs to the physical page:
[   32.672970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105788
[   32.673037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.673122] page_type: f5(slab)
[   32.673180] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122
[   32.673250] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.673329] page dumped because: kasan: bad access detected
[   32.673397] 
[   32.673477] Memory state around the buggy address:
[   32.673544]  fff00000c5788880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.673613]  fff00000c5788900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.673694] >fff00000c5788980: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   32.673750]                                   ^
[   32.673805]  fff00000c5788a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.673878]  fff00000c5788a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.673946] ==================================================================

[   23.287529] ==================================================================
[   23.288282] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380
[   23.288920] Read of size 1 at addr ffff8881048b63a8 by task kunit_try_catch/232
[   23.289618] 
[   23.289876] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.289926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.289939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.289959] Call Trace:
[   23.289972]  <TASK>
[   23.289987]  dump_stack_lvl+0x73/0xb0
[   23.290014]  print_report+0xd1/0x650
[   23.290036]  ? __virt_addr_valid+0x1db/0x2d0
[   23.290073]  ? kmalloc_uaf+0x320/0x380
[   23.290092]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.290117]  ? kmalloc_uaf+0x320/0x380
[   23.290136]  kasan_report+0x141/0x180
[   23.290157]  ? kmalloc_uaf+0x320/0x380
[   23.290180]  __asan_report_load1_noabort+0x18/0x20
[   23.290203]  kmalloc_uaf+0x320/0x380
[   23.290223]  ? __pfx_kmalloc_uaf+0x10/0x10
[   23.290242]  ? __schedule+0x10cc/0x2b60
[   23.290262]  ? __pfx_read_tsc+0x10/0x10
[   23.290283]  ? ktime_get_ts64+0x86/0x230
[   23.290316]  kunit_try_run_case+0x1a5/0x480
[   23.290341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.290364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.290384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.290405]  ? __kthread_parkme+0x82/0x180
[   23.290424]  ? preempt_count_sub+0x50/0x80
[   23.290449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.290472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.290501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.290525]  kthread+0x337/0x6f0
[   23.290544]  ? trace_preempt_on+0x20/0xc0
[   23.290566]  ? __pfx_kthread+0x10/0x10
[   23.290586]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.290609]  ? calculate_sigpending+0x7b/0xa0
[   23.290631]  ? __pfx_kthread+0x10/0x10
[   23.290652]  ret_from_fork+0x116/0x1d0
[   23.290670]  ? __pfx_kthread+0x10/0x10
[   23.290690]  ret_from_fork_asm+0x1a/0x30
[   23.290719]  </TASK>
[   23.290730] 
[   23.302448] Allocated by task 232:
[   23.302585]  kasan_save_stack+0x45/0x70
[   23.302719]  kasan_save_track+0x18/0x40
[   23.302846]  kasan_save_alloc_info+0x3b/0x50
[   23.302986]  __kasan_kmalloc+0xb7/0xc0
[   23.303109]  __kmalloc_cache_noprof+0x189/0x420
[   23.303257]  kmalloc_uaf+0xaa/0x380
[   23.303386]  kunit_try_run_case+0x1a5/0x480
[   23.303528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.303697]  kthread+0x337/0x6f0
[   23.303809]  ret_from_fork+0x116/0x1d0
[   23.303933]  ret_from_fork_asm+0x1a/0x30
[   23.304063] 
[   23.304126] Freed by task 232:
[   23.304228]  kasan_save_stack+0x45/0x70
[   23.304479]  kasan_save_track+0x18/0x40
[   23.304803]  kasan_save_free_info+0x3f/0x60
[   23.305281]  __kasan_slab_free+0x56/0x70
[   23.305721]  kfree+0x222/0x3f0
[   23.306092]  kmalloc_uaf+0x12c/0x380
[   23.306408]  kunit_try_run_case+0x1a5/0x480
[   23.306763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.307365]  kthread+0x337/0x6f0
[   23.307780]  ret_from_fork+0x116/0x1d0
[   23.308179]  ret_from_fork_asm+0x1a/0x30
[   23.308659] 
[   23.308851] The buggy address belongs to the object at ffff8881048b63a0
[   23.308851]  which belongs to the cache kmalloc-16 of size 16
[   23.310240] The buggy address is located 8 bytes inside of
[   23.310240]  freed 16-byte region [ffff8881048b63a0, ffff8881048b63b0)
[   23.311450] 
[   23.311639] The buggy address belongs to the physical page:
[   23.312257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048b6
[   23.313067] flags: 0x200000000000000(node=0|zone=2)
[   23.313599] page_type: f5(slab)
[   23.313934] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.314696] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.315481] page dumped because: kasan: bad access detected
[   23.316089] 
[   23.316239] Memory state around the buggy address:
[   23.316741]  ffff8881048b6280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.317479]  ffff8881048b6300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.318105] >ffff8881048b6380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   23.318821]                                   ^
[   23.319347]  ffff8881048b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.320063]  ffff8881048b6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.320803] ==================================================================

[   23.581547] ==================================================================
[   23.582050] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380
[   23.582570] Read of size 1 at addr ffff8881049ad588 by task kunit_try_catch/233
[   23.583195] 
[   23.583363] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.583422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.583436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.583461] Call Trace:
[   23.583476]  <TASK>
[   23.583500]  dump_stack_lvl+0x73/0xb0
[   23.583535]  print_report+0xd1/0x650
[   23.583559]  ? __virt_addr_valid+0x1db/0x2d0
[   23.583585]  ? kmalloc_uaf+0x320/0x380
[   23.583605]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.583630]  ? kmalloc_uaf+0x320/0x380
[   23.583650]  kasan_report+0x141/0x180
[   23.583672]  ? kmalloc_uaf+0x320/0x380
[   23.583696]  __asan_report_load1_noabort+0x18/0x20
[   23.583721]  kmalloc_uaf+0x320/0x380
[   23.583741]  ? __pfx_kmalloc_uaf+0x10/0x10
[   23.583761]  ? __schedule+0x10cc/0x2b60
[   23.583784]  ? __pfx_read_tsc+0x10/0x10
[   23.583807]  ? ktime_get_ts64+0x86/0x230
[   23.583834]  kunit_try_run_case+0x1a5/0x480
[   23.583862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.583885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.583907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.583929]  ? __kthread_parkme+0x82/0x180
[   23.584296]  ? preempt_count_sub+0x50/0x80
[   23.584324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.584365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.584392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.584469]  kthread+0x337/0x6f0
[   23.584490]  ? trace_preempt_on+0x20/0xc0
[   23.584516]  ? __pfx_kthread+0x10/0x10
[   23.584548]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.584573]  ? calculate_sigpending+0x7b/0xa0
[   23.584598]  ? __pfx_kthread+0x10/0x10
[   23.584620]  ret_from_fork+0x116/0x1d0
[   23.584640]  ? __pfx_kthread+0x10/0x10
[   23.584661]  ret_from_fork_asm+0x1a/0x30
[   23.584695]  </TASK>
[   23.584709] 
[   23.592792] Allocated by task 233:
[   23.593006]  kasan_save_stack+0x45/0x70
[   23.593335]  kasan_save_track+0x18/0x40
[   23.593595]  kasan_save_alloc_info+0x3b/0x50
[   23.593815]  __kasan_kmalloc+0xb7/0xc0
[   23.594083]  __kmalloc_cache_noprof+0x189/0x420
[   23.594376]  kmalloc_uaf+0xaa/0x380
[   23.594703]  kunit_try_run_case+0x1a5/0x480
[   23.595909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.596485]  kthread+0x337/0x6f0
[   23.596704]  ret_from_fork+0x116/0x1d0
[   23.596872]  ret_from_fork_asm+0x1a/0x30
[   23.597311] 
[   23.597551] Freed by task 233:
[   23.597882]  kasan_save_stack+0x45/0x70
[   23.598092]  kasan_save_track+0x18/0x40
[   23.598528]  kasan_save_free_info+0x3f/0x60
[   23.598845]  __kasan_slab_free+0x56/0x70
[   23.599254]  kfree+0x222/0x3f0
[   23.599646]  kmalloc_uaf+0x12c/0x380
[   23.599973]  kunit_try_run_case+0x1a5/0x480
[   23.600596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.600848]  kthread+0x337/0x6f0
[   23.601337]  ret_from_fork+0x116/0x1d0
[   23.601573]  ret_from_fork_asm+0x1a/0x30
[   23.602025] 
[   23.602168] The buggy address belongs to the object at ffff8881049ad580
[   23.602168]  which belongs to the cache kmalloc-16 of size 16
[   23.603156] The buggy address is located 8 bytes inside of
[   23.603156]  freed 16-byte region [ffff8881049ad580, ffff8881049ad590)
[   23.604115] 
[   23.604329] The buggy address belongs to the physical page:
[   23.604715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad
[   23.605395] flags: 0x200000000000000(node=0|zone=2)
[   23.605844] page_type: f5(slab)
[   23.605978] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.606490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.607058] page dumped because: kasan: bad access detected
[   23.607403] 
[   23.607698] Memory state around the buggy address:
[   23.607890]  ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.608581]  ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.609051] >ffff8881049ad580: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.609372]                       ^
[   23.609739]  ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.610135]  ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.610614] ==================================================================