Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.017872] ================================================================== [ 31.017963] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.018026] Read of size 1 at addr fff00000c91f0200 by task kunit_try_catch/229 [ 31.018087] [ 31.018126] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 31.018223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.018252] Hardware name: linux,dummy-virt (DT) [ 31.018282] Call trace: [ 31.018306] show_stack+0x20/0x38 (C) [ 31.018361] dump_stack_lvl+0x8c/0xd0 [ 31.018409] print_report+0x118/0x608 [ 31.018457] kasan_report+0xdc/0x128 [ 31.018505] __kasan_check_byte+0x54/0x70 [ 31.018554] ksize+0x30/0x88 [ 31.018609] ksize_uaf+0x168/0x5f8 [ 31.018652] kunit_try_run_case+0x170/0x3f0 [ 31.018701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.018754] kthread+0x328/0x630 [ 31.018797] ret_from_fork+0x10/0x20 [ 31.018844] [ 31.018863] Allocated by task 229: [ 31.018898] kasan_save_stack+0x3c/0x68 [ 31.019535] kasan_save_track+0x20/0x40 [ 31.019604] kasan_save_alloc_info+0x40/0x58 [ 31.020001] __kasan_kmalloc+0xd4/0xd8 [ 31.020114] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.020561] ksize_uaf+0xb8/0x5f8 [ 31.020624] kunit_try_run_case+0x170/0x3f0 [ 31.020702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.020765] kthread+0x328/0x630 [ 31.020822] ret_from_fork+0x10/0x20 [ 31.020974] [ 31.021312] Freed by task 229: [ 31.021398] kasan_save_stack+0x3c/0x68 [ 31.021497] kasan_save_track+0x20/0x40 [ 31.022069] kasan_save_free_info+0x4c/0x78 [ 31.022286] __kasan_slab_free+0x6c/0x98 [ 31.022345] kfree+0x214/0x3c8 [ 31.022460] ksize_uaf+0x11c/0x5f8 [ 31.022529] kunit_try_run_case+0x170/0x3f0 [ 31.022639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.022781] kthread+0x328/0x630 [ 31.022844] ret_from_fork+0x10/0x20 [ 31.022963] [ 31.023014] The buggy address belongs to the object at fff00000c91f0200 [ 31.023014] which belongs to the cache kmalloc-128 of size 128 [ 31.023100] The buggy address is located 0 bytes inside of [ 31.023100] freed 128-byte region [fff00000c91f0200, fff00000c91f0280) [ 31.023237] [ 31.023294] The buggy address belongs to the physical page: [ 31.023438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0 [ 31.023692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.023794] page_type: f5(slab) [ 31.023881] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.023947] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.024138] page dumped because: kasan: bad access detected [ 31.024319] [ 31.024359] Memory state around the buggy address: [ 31.024407] fff00000c91f0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.024512] fff00000c91f0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.024576] >fff00000c91f0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.024828] ^ [ 31.025051] fff00000c91f0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.025135] fff00000c91f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.025288] ================================================================== [ 31.036323] ================================================================== [ 31.036651] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 31.036784] Read of size 1 at addr fff00000c91f0278 by task kunit_try_catch/229 [ 31.036841] [ 31.036999] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 31.037164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.037229] Hardware name: linux,dummy-virt (DT) [ 31.037361] Call trace: [ 31.037429] show_stack+0x20/0x38 (C) [ 31.037484] dump_stack_lvl+0x8c/0xd0 [ 31.037678] print_report+0x118/0x608 [ 31.037732] kasan_report+0xdc/0x128 [ 31.037779] __asan_report_load1_noabort+0x20/0x30 [ 31.037958] ksize_uaf+0x544/0x5f8 [ 31.038037] kunit_try_run_case+0x170/0x3f0 [ 31.038094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.038215] kthread+0x328/0x630 [ 31.038261] ret_from_fork+0x10/0x20 [ 31.038446] [ 31.038469] Allocated by task 229: [ 31.038497] kasan_save_stack+0x3c/0x68 [ 31.038543] kasan_save_track+0x20/0x40 [ 31.038582] kasan_save_alloc_info+0x40/0x58 [ 31.038620] __kasan_kmalloc+0xd4/0xd8 [ 31.038983] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.039132] ksize_uaf+0xb8/0x5f8 [ 31.039200] kunit_try_run_case+0x170/0x3f0 [ 31.039241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.039408] kthread+0x328/0x630 [ 31.039450] ret_from_fork+0x10/0x20 [ 31.039487] [ 31.039507] Freed by task 229: [ 31.039537] kasan_save_stack+0x3c/0x68 [ 31.039907] kasan_save_track+0x20/0x40 [ 31.040058] kasan_save_free_info+0x4c/0x78 [ 31.040229] __kasan_slab_free+0x6c/0x98 [ 31.040306] kfree+0x214/0x3c8 [ 31.040365] ksize_uaf+0x11c/0x5f8 [ 31.040555] kunit_try_run_case+0x170/0x3f0 [ 31.040669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.040833] kthread+0x328/0x630 [ 31.040873] ret_from_fork+0x10/0x20 [ 31.040911] [ 31.040941] The buggy address belongs to the object at fff00000c91f0200 [ 31.040941] which belongs to the cache kmalloc-128 of size 128 [ 31.041001] The buggy address is located 120 bytes inside of [ 31.041001] freed 128-byte region [fff00000c91f0200, fff00000c91f0280) [ 31.041067] [ 31.041087] The buggy address belongs to the physical page: [ 31.041355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0 [ 31.041531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.041619] page_type: f5(slab) [ 31.041721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.041788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.041872] page dumped because: kasan: bad access detected [ 31.042102] [ 31.042284] Memory state around the buggy address: [ 31.042364] fff00000c91f0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.042504] fff00000c91f0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.042575] >fff00000c91f0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.042706] ^ [ 31.042761] fff00000c91f0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.042829] fff00000c91f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.043008] ================================================================== [ 31.026770] ================================================================== [ 31.026831] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.026995] Read of size 1 at addr fff00000c91f0200 by task kunit_try_catch/229 [ 31.027121] [ 31.027168] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 31.027261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.027454] Hardware name: linux,dummy-virt (DT) [ 31.027488] Call trace: [ 31.027628] show_stack+0x20/0x38 (C) [ 31.027736] dump_stack_lvl+0x8c/0xd0 [ 31.027870] print_report+0x118/0x608 [ 31.027921] kasan_report+0xdc/0x128 [ 31.028268] __asan_report_load1_noabort+0x20/0x30 [ 31.028425] ksize_uaf+0x598/0x5f8 [ 31.028492] kunit_try_run_case+0x170/0x3f0 [ 31.028619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.028676] kthread+0x328/0x630 [ 31.028741] ret_from_fork+0x10/0x20 [ 31.029083] [ 31.029232] Allocated by task 229: [ 31.029286] kasan_save_stack+0x3c/0x68 [ 31.029621] kasan_save_track+0x20/0x40 [ 31.029755] kasan_save_alloc_info+0x40/0x58 [ 31.029830] __kasan_kmalloc+0xd4/0xd8 [ 31.029869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.030174] ksize_uaf+0xb8/0x5f8 [ 31.030236] kunit_try_run_case+0x170/0x3f0 [ 31.030360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.030437] kthread+0x328/0x630 [ 31.030550] ret_from_fork+0x10/0x20 [ 31.030598] [ 31.030620] Freed by task 229: [ 31.030667] kasan_save_stack+0x3c/0x68 [ 31.030954] kasan_save_track+0x20/0x40 [ 31.031365] kasan_save_free_info+0x4c/0x78 [ 31.031432] __kasan_slab_free+0x6c/0x98 [ 31.031533] kfree+0x214/0x3c8 [ 31.031598] ksize_uaf+0x11c/0x5f8 [ 31.031753] kunit_try_run_case+0x170/0x3f0 [ 31.031832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.032033] kthread+0x328/0x630 [ 31.032103] ret_from_fork+0x10/0x20 [ 31.032256] [ 31.032338] The buggy address belongs to the object at fff00000c91f0200 [ 31.032338] which belongs to the cache kmalloc-128 of size 128 [ 31.032449] The buggy address is located 0 bytes inside of [ 31.032449] freed 128-byte region [fff00000c91f0200, fff00000c91f0280) [ 31.032915] [ 31.032979] The buggy address belongs to the physical page: [ 31.033067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091f0 [ 31.033125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.033191] page_type: f5(slab) [ 31.033394] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.033568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.033665] page dumped because: kasan: bad access detected [ 31.033697] [ 31.033923] Memory state around the buggy address: [ 31.034033] fff00000c91f0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.034132] fff00000c91f0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.034183] >fff00000c91f0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.034426] ^ [ 31.034653] fff00000c91f0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.034732] fff00000c91f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.034843] ==================================================================
[ 32.760313] ================================================================== [ 32.760446] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.760515] Read of size 1 at addr fff00000c63fbd78 by task kunit_try_catch/227 [ 32.760584] [ 32.760679] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.760769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.760811] Hardware name: linux,dummy-virt (DT) [ 32.760845] Call trace: [ 32.760903] show_stack+0x20/0x38 (C) [ 32.760961] dump_stack_lvl+0x8c/0xd0 [ 32.761027] print_report+0x118/0x608 [ 32.761131] kasan_report+0xdc/0x128 [ 32.761191] __asan_report_load1_noabort+0x20/0x30 [ 32.761403] ksize_uaf+0x544/0x5f8 [ 32.761470] kunit_try_run_case+0x170/0x3f0 [ 32.761584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.761660] kthread+0x328/0x630 [ 32.761712] ret_from_fork+0x10/0x20 [ 32.761813] [ 32.761854] Allocated by task 227: [ 32.761901] kasan_save_stack+0x3c/0x68 [ 32.762002] kasan_save_track+0x20/0x40 [ 32.762063] kasan_save_alloc_info+0x40/0x58 [ 32.762111] __kasan_kmalloc+0xd4/0xd8 [ 32.762326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.762514] ksize_uaf+0xb8/0x5f8 [ 32.762558] kunit_try_run_case+0x170/0x3f0 [ 32.762606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.762660] kthread+0x328/0x630 [ 32.762747] ret_from_fork+0x10/0x20 [ 32.762805] [ 32.762845] Freed by task 227: [ 32.762883] kasan_save_stack+0x3c/0x68 [ 32.762930] kasan_save_track+0x20/0x40 [ 32.763018] kasan_save_free_info+0x4c/0x78 [ 32.763087] __kasan_slab_free+0x6c/0x98 [ 32.763133] kfree+0x214/0x3c8 [ 32.763178] ksize_uaf+0x11c/0x5f8 [ 32.763212] kunit_try_run_case+0x170/0x3f0 [ 32.763473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.763616] kthread+0x328/0x630 [ 32.763678] ret_from_fork+0x10/0x20 [ 32.763773] [ 32.763796] The buggy address belongs to the object at fff00000c63fbd00 [ 32.763796] which belongs to the cache kmalloc-128 of size 128 [ 32.763856] The buggy address is located 120 bytes inside of [ 32.763856] freed 128-byte region [fff00000c63fbd00, fff00000c63fbd80) [ 32.763920] [ 32.764117] The buggy address belongs to the physical page: [ 32.764224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 32.764308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.764440] page_type: f5(slab) [ 32.764505] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.764572] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.764671] page dumped because: kasan: bad access detected [ 32.764707] [ 32.764725] Memory state around the buggy address: [ 32.764766] fff00000c63fbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.764811] fff00000c63fbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.764853] >fff00000c63fbd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.764892] ^ [ 32.764950] fff00000c63fbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.764994] fff00000c63fbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.765033] ================================================================== [ 32.753373] ================================================================== [ 32.753537] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.753591] Read of size 1 at addr fff00000c63fbd00 by task kunit_try_catch/227 [ 32.753732] [ 32.753781] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.753910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.753960] Hardware name: linux,dummy-virt (DT) [ 32.753994] Call trace: [ 32.754035] show_stack+0x20/0x38 (C) [ 32.754139] dump_stack_lvl+0x8c/0xd0 [ 32.754203] print_report+0x118/0x608 [ 32.754251] kasan_report+0xdc/0x128 [ 32.754304] __asan_report_load1_noabort+0x20/0x30 [ 32.754353] ksize_uaf+0x598/0x5f8 [ 32.754397] kunit_try_run_case+0x170/0x3f0 [ 32.754611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.754792] kthread+0x328/0x630 [ 32.754870] ret_from_fork+0x10/0x20 [ 32.754922] [ 32.754941] Allocated by task 227: [ 32.754990] kasan_save_stack+0x3c/0x68 [ 32.755072] kasan_save_track+0x20/0x40 [ 32.755129] kasan_save_alloc_info+0x40/0x58 [ 32.755321] __kasan_kmalloc+0xd4/0xd8 [ 32.755482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.755556] ksize_uaf+0xb8/0x5f8 [ 32.755619] kunit_try_run_case+0x170/0x3f0 [ 32.755687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.755784] kthread+0x328/0x630 [ 32.755816] ret_from_fork+0x10/0x20 [ 32.755870] [ 32.755909] Freed by task 227: [ 32.756231] kasan_save_stack+0x3c/0x68 [ 32.756309] kasan_save_track+0x20/0x40 [ 32.756427] kasan_save_free_info+0x4c/0x78 [ 32.756496] __kasan_slab_free+0x6c/0x98 [ 32.756618] kfree+0x214/0x3c8 [ 32.756697] ksize_uaf+0x11c/0x5f8 [ 32.756765] kunit_try_run_case+0x170/0x3f0 [ 32.756892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.756968] kthread+0x328/0x630 [ 32.757002] ret_from_fork+0x10/0x20 [ 32.757256] [ 32.757303] The buggy address belongs to the object at fff00000c63fbd00 [ 32.757303] which belongs to the cache kmalloc-128 of size 128 [ 32.757476] The buggy address is located 0 bytes inside of [ 32.757476] freed 128-byte region [fff00000c63fbd00, fff00000c63fbd80) [ 32.757620] [ 32.757668] The buggy address belongs to the physical page: [ 32.757737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 32.757842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.757940] page_type: f5(slab) [ 32.758045] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.758100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.758176] page dumped because: kasan: bad access detected [ 32.758470] [ 32.758510] Memory state around the buggy address: [ 32.758629] fff00000c63fbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.758692] fff00000c63fbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.758755] >fff00000c63fbd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.758884] ^ [ 32.758933] fff00000c63fbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.758989] fff00000c63fbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.759142] ================================================================== [ 32.747404] ================================================================== [ 32.747774] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 32.747863] Read of size 1 at addr fff00000c63fbd00 by task kunit_try_catch/227 [ 32.747970] [ 32.748028] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.748150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.748186] Hardware name: linux,dummy-virt (DT) [ 32.748385] Call trace: [ 32.748538] show_stack+0x20/0x38 (C) [ 32.748593] dump_stack_lvl+0x8c/0xd0 [ 32.748643] print_report+0x118/0x608 [ 32.748692] kasan_report+0xdc/0x128 [ 32.748750] __kasan_check_byte+0x54/0x70 [ 32.748797] ksize+0x30/0x88 [ 32.748844] ksize_uaf+0x168/0x5f8 [ 32.748897] kunit_try_run_case+0x170/0x3f0 [ 32.748947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.749002] kthread+0x328/0x630 [ 32.749045] ret_from_fork+0x10/0x20 [ 32.749094] [ 32.749130] Allocated by task 227: [ 32.749170] kasan_save_stack+0x3c/0x68 [ 32.749213] kasan_save_track+0x20/0x40 [ 32.749260] kasan_save_alloc_info+0x40/0x58 [ 32.749298] __kasan_kmalloc+0xd4/0xd8 [ 32.749336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.749375] ksize_uaf+0xb8/0x5f8 [ 32.749412] kunit_try_run_case+0x170/0x3f0 [ 32.749460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.749511] kthread+0x328/0x630 [ 32.749551] ret_from_fork+0x10/0x20 [ 32.749589] [ 32.749626] Freed by task 227: [ 32.749669] kasan_save_stack+0x3c/0x68 [ 32.749708] kasan_save_track+0x20/0x40 [ 32.749747] kasan_save_free_info+0x4c/0x78 [ 32.749793] __kasan_slab_free+0x6c/0x98 [ 32.749832] kfree+0x214/0x3c8 [ 32.749867] ksize_uaf+0x11c/0x5f8 [ 32.749908] kunit_try_run_case+0x170/0x3f0 [ 32.749949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.750003] kthread+0x328/0x630 [ 32.750036] ret_from_fork+0x10/0x20 [ 32.750072] [ 32.750091] The buggy address belongs to the object at fff00000c63fbd00 [ 32.750091] which belongs to the cache kmalloc-128 of size 128 [ 32.750272] The buggy address is located 0 bytes inside of [ 32.750272] freed 128-byte region [fff00000c63fbd00, fff00000c63fbd80) [ 32.750349] [ 32.750370] The buggy address belongs to the physical page: [ 32.750402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063fb [ 32.750657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.750923] page_type: f5(slab) [ 32.751003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.751230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.751484] page dumped because: kasan: bad access detected [ 32.751551] [ 32.751655] Memory state around the buggy address: [ 32.751713] fff00000c63fbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.751784] fff00000c63fbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.751889] >fff00000c63fbd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.751929] ^ [ 32.751959] fff00000c63fbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.752127] fff00000c63fbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.752314] ==================================================================
[ 23.535291] ================================================================== [ 23.535624] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 23.535831] Read of size 1 at addr ffff888104950600 by task kunit_try_catch/244 [ 23.536191] [ 23.536324] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.536372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.536384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.536405] Call Trace: [ 23.536418] <TASK> [ 23.536435] dump_stack_lvl+0x73/0xb0 [ 23.536463] print_report+0xd1/0x650 [ 23.536485] ? __virt_addr_valid+0x1db/0x2d0 [ 23.536520] ? ksize_uaf+0x5fe/0x6c0 [ 23.536549] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.536575] ? ksize_uaf+0x5fe/0x6c0 [ 23.536595] kasan_report+0x141/0x180 [ 23.536628] ? ksize_uaf+0x5fe/0x6c0 [ 23.536653] __asan_report_load1_noabort+0x18/0x20 [ 23.536676] ksize_uaf+0x5fe/0x6c0 [ 23.536696] ? __pfx_ksize_uaf+0x10/0x10 [ 23.536725] ? __schedule+0x10cc/0x2b60 [ 23.536746] ? __pfx_read_tsc+0x10/0x10 [ 23.536767] ? ktime_get_ts64+0x86/0x230 [ 23.536884] kunit_try_run_case+0x1a5/0x480 [ 23.536918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.536941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.536974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.536996] ? __kthread_parkme+0x82/0x180 [ 23.537017] ? preempt_count_sub+0x50/0x80 [ 23.537050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.537075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.537098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.537133] kthread+0x337/0x6f0 [ 23.537153] ? trace_preempt_on+0x20/0xc0 [ 23.537176] ? __pfx_kthread+0x10/0x10 [ 23.537196] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.537220] ? calculate_sigpending+0x7b/0xa0 [ 23.537243] ? __pfx_kthread+0x10/0x10 [ 23.537264] ret_from_fork+0x116/0x1d0 [ 23.537283] ? __pfx_kthread+0x10/0x10 [ 23.537304] ret_from_fork_asm+0x1a/0x30 [ 23.537344] </TASK> [ 23.537355] [ 23.544815] Allocated by task 244: [ 23.545037] kasan_save_stack+0x45/0x70 [ 23.545273] kasan_save_track+0x18/0x40 [ 23.545521] kasan_save_alloc_info+0x3b/0x50 [ 23.545841] __kasan_kmalloc+0xb7/0xc0 [ 23.546039] __kmalloc_cache_noprof+0x189/0x420 [ 23.546230] ksize_uaf+0xaa/0x6c0 [ 23.546417] kunit_try_run_case+0x1a5/0x480 [ 23.546885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.547139] kthread+0x337/0x6f0 [ 23.547291] ret_from_fork+0x116/0x1d0 [ 23.547511] ret_from_fork_asm+0x1a/0x30 [ 23.547772] [ 23.547876] Freed by task 244: [ 23.548030] kasan_save_stack+0x45/0x70 [ 23.548213] kasan_save_track+0x18/0x40 [ 23.548391] kasan_save_free_info+0x3f/0x60 [ 23.548634] __kasan_slab_free+0x56/0x70 [ 23.548919] kfree+0x222/0x3f0 [ 23.549097] ksize_uaf+0x12c/0x6c0 [ 23.549272] kunit_try_run_case+0x1a5/0x480 [ 23.549424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.549593] kthread+0x337/0x6f0 [ 23.549708] ret_from_fork+0x116/0x1d0 [ 23.549846] ret_from_fork_asm+0x1a/0x30 [ 23.550117] [ 23.550213] The buggy address belongs to the object at ffff888104950600 [ 23.550213] which belongs to the cache kmalloc-128 of size 128 [ 23.551046] The buggy address is located 0 bytes inside of [ 23.551046] freed 128-byte region [ffff888104950600, ffff888104950680) [ 23.551619] [ 23.551763] The buggy address belongs to the physical page: [ 23.552018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950 [ 23.552256] flags: 0x200000000000000(node=0|zone=2) [ 23.552425] page_type: f5(slab) [ 23.552572] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.552935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.553303] page dumped because: kasan: bad access detected [ 23.553697] [ 23.553894] Memory state around the buggy address: [ 23.554059] ffff888104950500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.554285] ffff888104950580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.554892] >ffff888104950600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.555221] ^ [ 23.555391] ffff888104950680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.555708] ffff888104950700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.555916] ================================================================== [ 23.506471] ================================================================== [ 23.507072] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 23.507281] Read of size 1 at addr ffff888104950600 by task kunit_try_catch/244 [ 23.507515] [ 23.507594] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.507640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.507652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.507672] Call Trace: [ 23.507683] <TASK> [ 23.507698] dump_stack_lvl+0x73/0xb0 [ 23.507725] print_report+0xd1/0x650 [ 23.507746] ? __virt_addr_valid+0x1db/0x2d0 [ 23.507768] ? ksize_uaf+0x19d/0x6c0 [ 23.507787] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.507812] ? ksize_uaf+0x19d/0x6c0 [ 23.507833] kasan_report+0x141/0x180 [ 23.507853] ? ksize_uaf+0x19d/0x6c0 [ 23.507876] ? ksize_uaf+0x19d/0x6c0 [ 23.507895] __kasan_check_byte+0x3d/0x50 [ 23.507916] ksize+0x20/0x60 [ 23.507939] ksize_uaf+0x19d/0x6c0 [ 23.507959] ? __pfx_ksize_uaf+0x10/0x10 [ 23.507979] ? __schedule+0x10cc/0x2b60 [ 23.508000] ? __pfx_read_tsc+0x10/0x10 [ 23.508020] ? ktime_get_ts64+0x86/0x230 [ 23.508044] kunit_try_run_case+0x1a5/0x480 [ 23.508068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.508091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.508111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.508132] ? __kthread_parkme+0x82/0x180 [ 23.508152] ? preempt_count_sub+0x50/0x80 [ 23.508175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.508198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.508221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.508245] kthread+0x337/0x6f0 [ 23.508264] ? trace_preempt_on+0x20/0xc0 [ 23.508286] ? __pfx_kthread+0x10/0x10 [ 23.508325] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.508348] ? calculate_sigpending+0x7b/0xa0 [ 23.508371] ? __pfx_kthread+0x10/0x10 [ 23.508391] ret_from_fork+0x116/0x1d0 [ 23.508410] ? __pfx_kthread+0x10/0x10 [ 23.508429] ret_from_fork_asm+0x1a/0x30 [ 23.508459] </TASK> [ 23.508470] [ 23.522996] Allocated by task 244: [ 23.523253] kasan_save_stack+0x45/0x70 [ 23.523662] kasan_save_track+0x18/0x40 [ 23.523857] kasan_save_alloc_info+0x3b/0x50 [ 23.524050] __kasan_kmalloc+0xb7/0xc0 [ 23.524232] __kmalloc_cache_noprof+0x189/0x420 [ 23.524459] ksize_uaf+0xaa/0x6c0 [ 23.524650] kunit_try_run_case+0x1a5/0x480 [ 23.524907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.525098] kthread+0x337/0x6f0 [ 23.525289] ret_from_fork+0x116/0x1d0 [ 23.525454] ret_from_fork_asm+0x1a/0x30 [ 23.525587] [ 23.525653] Freed by task 244: [ 23.525770] kasan_save_stack+0x45/0x70 [ 23.526049] kasan_save_track+0x18/0x40 [ 23.526240] kasan_save_free_info+0x3f/0x60 [ 23.526454] __kasan_slab_free+0x56/0x70 [ 23.526930] kfree+0x222/0x3f0 [ 23.527098] ksize_uaf+0x12c/0x6c0 [ 23.527264] kunit_try_run_case+0x1a5/0x480 [ 23.527488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.527792] kthread+0x337/0x6f0 [ 23.527929] ret_from_fork+0x116/0x1d0 [ 23.528105] ret_from_fork_asm+0x1a/0x30 [ 23.528247] [ 23.528322] The buggy address belongs to the object at ffff888104950600 [ 23.528322] which belongs to the cache kmalloc-128 of size 128 [ 23.528751] The buggy address is located 0 bytes inside of [ 23.528751] freed 128-byte region [ffff888104950600, ffff888104950680) [ 23.529328] [ 23.529399] The buggy address belongs to the physical page: [ 23.529719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950 [ 23.530163] flags: 0x200000000000000(node=0|zone=2) [ 23.530505] page_type: f5(slab) [ 23.530683] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.531242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.531601] page dumped because: kasan: bad access detected [ 23.531887] [ 23.531957] Memory state around the buggy address: [ 23.532116] ffff888104950500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.532442] ffff888104950580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.532731] >ffff888104950600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.533035] ^ [ 23.533207] ffff888104950680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.533584] ffff888104950700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.533992] ================================================================== [ 23.556542] ================================================================== [ 23.557142] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 23.557403] Read of size 1 at addr ffff888104950678 by task kunit_try_catch/244 [ 23.557743] [ 23.557935] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.557996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.558011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.558032] Call Trace: [ 23.558051] <TASK> [ 23.558067] dump_stack_lvl+0x73/0xb0 [ 23.558105] print_report+0xd1/0x650 [ 23.558127] ? __virt_addr_valid+0x1db/0x2d0 [ 23.558150] ? ksize_uaf+0x5e4/0x6c0 [ 23.558180] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.558205] ? ksize_uaf+0x5e4/0x6c0 [ 23.558226] kasan_report+0x141/0x180 [ 23.558247] ? ksize_uaf+0x5e4/0x6c0 [ 23.558278] __asan_report_load1_noabort+0x18/0x20 [ 23.558301] ksize_uaf+0x5e4/0x6c0 [ 23.558337] ? __pfx_ksize_uaf+0x10/0x10 [ 23.558358] ? __schedule+0x10cc/0x2b60 [ 23.558379] ? __pfx_read_tsc+0x10/0x10 [ 23.558399] ? ktime_get_ts64+0x86/0x230 [ 23.558424] kunit_try_run_case+0x1a5/0x480 [ 23.558458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.558481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.558502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.558543] ? __kthread_parkme+0x82/0x180 [ 23.558563] ? preempt_count_sub+0x50/0x80 [ 23.558586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.558610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.558643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.558667] kthread+0x337/0x6f0 [ 23.558687] ? trace_preempt_on+0x20/0xc0 [ 23.558730] ? __pfx_kthread+0x10/0x10 [ 23.558750] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.558773] ? calculate_sigpending+0x7b/0xa0 [ 23.558797] ? __pfx_kthread+0x10/0x10 [ 23.558818] ret_from_fork+0x116/0x1d0 [ 23.558837] ? __pfx_kthread+0x10/0x10 [ 23.558857] ret_from_fork_asm+0x1a/0x30 [ 23.558888] </TASK> [ 23.558899] [ 23.566180] Allocated by task 244: [ 23.566369] kasan_save_stack+0x45/0x70 [ 23.566813] kasan_save_track+0x18/0x40 [ 23.567123] kasan_save_alloc_info+0x3b/0x50 [ 23.567357] __kasan_kmalloc+0xb7/0xc0 [ 23.567621] __kmalloc_cache_noprof+0x189/0x420 [ 23.567857] ksize_uaf+0xaa/0x6c0 [ 23.568029] kunit_try_run_case+0x1a5/0x480 [ 23.568241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.568510] kthread+0x337/0x6f0 [ 23.568657] ret_from_fork+0x116/0x1d0 [ 23.568885] ret_from_fork_asm+0x1a/0x30 [ 23.569078] [ 23.569164] Freed by task 244: [ 23.569319] kasan_save_stack+0x45/0x70 [ 23.569529] kasan_save_track+0x18/0x40 [ 23.569788] kasan_save_free_info+0x3f/0x60 [ 23.569995] __kasan_slab_free+0x56/0x70 [ 23.570186] kfree+0x222/0x3f0 [ 23.570354] ksize_uaf+0x12c/0x6c0 [ 23.570508] kunit_try_run_case+0x1a5/0x480 [ 23.570647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.570814] kthread+0x337/0x6f0 [ 23.570927] ret_from_fork+0x116/0x1d0 [ 23.571051] ret_from_fork_asm+0x1a/0x30 [ 23.571183] [ 23.571301] The buggy address belongs to the object at ffff888104950600 [ 23.571301] which belongs to the cache kmalloc-128 of size 128 [ 23.572269] The buggy address is located 120 bytes inside of [ 23.572269] freed 128-byte region [ffff888104950600, ffff888104950680) [ 23.573147] [ 23.573218] The buggy address belongs to the physical page: [ 23.573441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950 [ 23.573931] flags: 0x200000000000000(node=0|zone=2) [ 23.574189] page_type: f5(slab) [ 23.574319] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.574543] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.574761] page dumped because: kasan: bad access detected [ 23.575125] [ 23.575300] Memory state around the buggy address: [ 23.575740] ffff888104950500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.576245] ffff888104950580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.576560] >ffff888104950600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.576871] ^ [ 23.577162] ffff888104950680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.577379] ffff888104950700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.577584] ==================================================================
[ 23.795105] ================================================================== [ 23.796701] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 23.797633] Read of size 1 at addr ffff8881049c5d00 by task kunit_try_catch/245 [ 23.797987] [ 23.798138] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.798198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.798211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.798235] Call Trace: [ 23.798251] <TASK> [ 23.798288] dump_stack_lvl+0x73/0xb0 [ 23.798323] print_report+0xd1/0x650 [ 23.798361] ? __virt_addr_valid+0x1db/0x2d0 [ 23.798387] ? ksize_uaf+0x19d/0x6c0 [ 23.798407] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.798531] ? ksize_uaf+0x19d/0x6c0 [ 23.798553] kasan_report+0x141/0x180 [ 23.798575] ? ksize_uaf+0x19d/0x6c0 [ 23.798597] ? ksize_uaf+0x19d/0x6c0 [ 23.798618] __kasan_check_byte+0x3d/0x50 [ 23.798640] ksize+0x20/0x60 [ 23.798667] ksize_uaf+0x19d/0x6c0 [ 23.798687] ? __pfx_ksize_uaf+0x10/0x10 [ 23.798708] ? __schedule+0x10cc/0x2b60 [ 23.798731] ? __pfx_read_tsc+0x10/0x10 [ 23.798754] ? ktime_get_ts64+0x86/0x230 [ 23.798781] kunit_try_run_case+0x1a5/0x480 [ 23.798808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.798832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.798854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.798876] ? __kthread_parkme+0x82/0x180 [ 23.798898] ? preempt_count_sub+0x50/0x80 [ 23.798927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.798952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.798976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.799000] kthread+0x337/0x6f0 [ 23.799020] ? trace_preempt_on+0x20/0xc0 [ 23.799044] ? __pfx_kthread+0x10/0x10 [ 23.799073] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.799097] ? calculate_sigpending+0x7b/0xa0 [ 23.799122] ? __pfx_kthread+0x10/0x10 [ 23.799144] ret_from_fork+0x116/0x1d0 [ 23.799163] ? __pfx_kthread+0x10/0x10 [ 23.799472] ret_from_fork_asm+0x1a/0x30 [ 23.799515] </TASK> [ 23.799528] [ 23.812580] Allocated by task 245: [ 23.813012] kasan_save_stack+0x45/0x70 [ 23.813394] kasan_save_track+0x18/0x40 [ 23.813666] kasan_save_alloc_info+0x3b/0x50 [ 23.814271] __kasan_kmalloc+0xb7/0xc0 [ 23.814483] __kmalloc_cache_noprof+0x189/0x420 [ 23.814694] ksize_uaf+0xaa/0x6c0 [ 23.814857] kunit_try_run_case+0x1a5/0x480 [ 23.815790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.816309] kthread+0x337/0x6f0 [ 23.816847] ret_from_fork+0x116/0x1d0 [ 23.817965] ret_from_fork_asm+0x1a/0x30 [ 23.818135] [ 23.818204] Freed by task 245: [ 23.818329] kasan_save_stack+0x45/0x70 [ 23.818511] kasan_save_track+0x18/0x40 [ 23.818681] kasan_save_free_info+0x3f/0x60 [ 23.818868] __kasan_slab_free+0x56/0x70 [ 23.819025] kfree+0x222/0x3f0 [ 23.819180] ksize_uaf+0x12c/0x6c0 [ 23.819520] kunit_try_run_case+0x1a5/0x480 [ 23.819894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.820777] kthread+0x337/0x6f0 [ 23.821782] ret_from_fork+0x116/0x1d0 [ 23.822232] ret_from_fork_asm+0x1a/0x30 [ 23.822617] [ 23.822692] The buggy address belongs to the object at ffff8881049c5d00 [ 23.822692] which belongs to the cache kmalloc-128 of size 128 [ 23.823634] The buggy address is located 0 bytes inside of [ 23.823634] freed 128-byte region [ffff8881049c5d00, ffff8881049c5d80) [ 23.823989] [ 23.824098] The buggy address belongs to the physical page: [ 23.824299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5 [ 23.824606] flags: 0x200000000000000(node=0|zone=2) [ 23.824832] page_type: f5(slab) [ 23.824985] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.825232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.825578] page dumped because: kasan: bad access detected [ 23.825884] [ 23.825952] Memory state around the buggy address: [ 23.826115] ffff8881049c5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.826326] ffff8881049c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.826534] >ffff8881049c5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.827404] ^ [ 23.827545] ffff8881049c5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.827759] ffff8881049c5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.828055] ================================================================== [ 23.828678] ================================================================== [ 23.829020] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 23.829400] Read of size 1 at addr ffff8881049c5d00 by task kunit_try_catch/245 [ 23.829766] [ 23.829873] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.829925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.829952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.829974] Call Trace: [ 23.830033] <TASK> [ 23.830055] dump_stack_lvl+0x73/0xb0 [ 23.830098] print_report+0xd1/0x650 [ 23.830121] ? __virt_addr_valid+0x1db/0x2d0 [ 23.830145] ? ksize_uaf+0x5fe/0x6c0 [ 23.830165] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.830224] ? ksize_uaf+0x5fe/0x6c0 [ 23.830244] kasan_report+0x141/0x180 [ 23.830265] ? ksize_uaf+0x5fe/0x6c0 [ 23.830307] __asan_report_load1_noabort+0x18/0x20 [ 23.830331] ksize_uaf+0x5fe/0x6c0 [ 23.830351] ? __pfx_ksize_uaf+0x10/0x10 [ 23.830372] ? __schedule+0x10cc/0x2b60 [ 23.830394] ? __pfx_read_tsc+0x10/0x10 [ 23.830416] ? ktime_get_ts64+0x86/0x230 [ 23.830441] kunit_try_run_case+0x1a5/0x480 [ 23.830467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.830490] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.830512] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.830532] ? __kthread_parkme+0x82/0x180 [ 23.830552] ? preempt_count_sub+0x50/0x80 [ 23.830575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.830599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.830622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.830646] kthread+0x337/0x6f0 [ 23.830665] ? trace_preempt_on+0x20/0xc0 [ 23.830688] ? __pfx_kthread+0x10/0x10 [ 23.830709] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.830733] ? calculate_sigpending+0x7b/0xa0 [ 23.830756] ? __pfx_kthread+0x10/0x10 [ 23.830777] ret_from_fork+0x116/0x1d0 [ 23.830796] ? __pfx_kthread+0x10/0x10 [ 23.830816] ret_from_fork_asm+0x1a/0x30 [ 23.830846] </TASK> [ 23.830859] [ 23.837769] Allocated by task 245: [ 23.837907] kasan_save_stack+0x45/0x70 [ 23.838121] kasan_save_track+0x18/0x40 [ 23.838310] kasan_save_alloc_info+0x3b/0x50 [ 23.838513] __kasan_kmalloc+0xb7/0xc0 [ 23.838673] __kmalloc_cache_noprof+0x189/0x420 [ 23.838819] ksize_uaf+0xaa/0x6c0 [ 23.838930] kunit_try_run_case+0x1a5/0x480 [ 23.839074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.839236] kthread+0x337/0x6f0 [ 23.839345] ret_from_fork+0x116/0x1d0 [ 23.839467] ret_from_fork_asm+0x1a/0x30 [ 23.839594] [ 23.839656] Freed by task 245: [ 23.839756] kasan_save_stack+0x45/0x70 [ 23.839878] kasan_save_track+0x18/0x40 [ 23.840002] kasan_save_free_info+0x3f/0x60 [ 23.840144] __kasan_slab_free+0x56/0x70 [ 23.840272] kfree+0x222/0x3f0 [ 23.840379] ksize_uaf+0x12c/0x6c0 [ 23.840540] kunit_try_run_case+0x1a5/0x480 [ 23.840837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.841127] kthread+0x337/0x6f0 [ 23.841244] ret_from_fork+0x116/0x1d0 [ 23.841363] ret_from_fork_asm+0x1a/0x30 [ 23.841562] [ 23.841648] The buggy address belongs to the object at ffff8881049c5d00 [ 23.841648] which belongs to the cache kmalloc-128 of size 128 [ 23.842335] The buggy address is located 0 bytes inside of [ 23.842335] freed 128-byte region [ffff8881049c5d00, ffff8881049c5d80) [ 23.842664] [ 23.842729] The buggy address belongs to the physical page: [ 23.843168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5 [ 23.843507] flags: 0x200000000000000(node=0|zone=2) [ 23.843738] page_type: f5(slab) [ 23.843944] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.844522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.844994] page dumped because: kasan: bad access detected [ 23.845337] [ 23.845428] Memory state around the buggy address: [ 23.845759] ffff8881049c5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.846130] ffff8881049c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.846608] >ffff8881049c5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.846827] ^ [ 23.847055] ffff8881049c5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.847418] ffff8881049c5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.847705] ================================================================== [ 23.848430] ================================================================== [ 23.848819] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 23.849227] Read of size 1 at addr ffff8881049c5d78 by task kunit_try_catch/245 [ 23.849599] [ 23.849689] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.849740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.849754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.849777] Call Trace: [ 23.849793] <TASK> [ 23.849812] dump_stack_lvl+0x73/0xb0 [ 23.849849] print_report+0xd1/0x650 [ 23.849872] ? __virt_addr_valid+0x1db/0x2d0 [ 23.849896] ? ksize_uaf+0x5e4/0x6c0 [ 23.849916] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.849942] ? ksize_uaf+0x5e4/0x6c0 [ 23.849963] kasan_report+0x141/0x180 [ 23.849984] ? ksize_uaf+0x5e4/0x6c0 [ 23.850009] __asan_report_load1_noabort+0x18/0x20 [ 23.850042] ksize_uaf+0x5e4/0x6c0 [ 23.850073] ? __pfx_ksize_uaf+0x10/0x10 [ 23.850094] ? __schedule+0x10cc/0x2b60 [ 23.850154] ? __pfx_read_tsc+0x10/0x10 [ 23.850177] ? ktime_get_ts64+0x86/0x230 [ 23.850203] kunit_try_run_case+0x1a5/0x480 [ 23.850229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.850253] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.850274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.850307] ? __kthread_parkme+0x82/0x180 [ 23.850328] ? preempt_count_sub+0x50/0x80 [ 23.850353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.850378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.850431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.850456] kthread+0x337/0x6f0 [ 23.850475] ? trace_preempt_on+0x20/0xc0 [ 23.850499] ? __pfx_kthread+0x10/0x10 [ 23.850519] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.850543] ? calculate_sigpending+0x7b/0xa0 [ 23.850567] ? __pfx_kthread+0x10/0x10 [ 23.850589] ret_from_fork+0x116/0x1d0 [ 23.850607] ? __pfx_kthread+0x10/0x10 [ 23.850628] ret_from_fork_asm+0x1a/0x30 [ 23.850660] </TASK> [ 23.850672] [ 23.856391] Allocated by task 245: [ 23.856566] kasan_save_stack+0x45/0x70 [ 23.856760] kasan_save_track+0x18/0x40 [ 23.856938] kasan_save_alloc_info+0x3b/0x50 [ 23.857288] __kasan_kmalloc+0xb7/0xc0 [ 23.857497] __kmalloc_cache_noprof+0x189/0x420 [ 23.857899] ksize_uaf+0xaa/0x6c0 [ 23.858256] kunit_try_run_case+0x1a5/0x480 [ 23.858423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.858586] kthread+0x337/0x6f0 [ 23.858696] ret_from_fork+0x116/0x1d0 [ 23.858817] ret_from_fork_asm+0x1a/0x30 [ 23.858944] [ 23.859006] Freed by task 245: [ 23.859117] kasan_save_stack+0x45/0x70 [ 23.859240] kasan_save_track+0x18/0x40 [ 23.859362] kasan_save_free_info+0x3f/0x60 [ 23.859494] __kasan_slab_free+0x56/0x70 [ 23.859618] kfree+0x222/0x3f0 [ 23.859724] ksize_uaf+0x12c/0x6c0 [ 23.860168] kunit_try_run_case+0x1a5/0x480 [ 23.860373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.860594] kthread+0x337/0x6f0 [ 23.861414] ret_from_fork+0x116/0x1d0 [ 23.861701] ret_from_fork_asm+0x1a/0x30 [ 23.861903] [ 23.861983] The buggy address belongs to the object at ffff8881049c5d00 [ 23.861983] which belongs to the cache kmalloc-128 of size 128 [ 23.862740] The buggy address is located 120 bytes inside of [ 23.862740] freed 128-byte region [ffff8881049c5d00, ffff8881049c5d80) [ 23.865152] [ 23.865249] The buggy address belongs to the physical page: [ 23.865708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049c5 [ 23.865978] flags: 0x200000000000000(node=0|zone=2) [ 23.866152] page_type: f5(slab) [ 23.866274] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.866507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.866732] page dumped because: kasan: bad access detected [ 23.866899] [ 23.866963] Memory state around the buggy address: [ 23.868394] ffff8881049c5c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.868886] ffff8881049c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.869893] >ffff8881049c5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.870556] ^ [ 23.871223] ffff8881049c5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.871557] ffff8881049c5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.871847] ==================================================================