Date
July 4, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.729604] ================================================================== [ 29.729693] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.729849] Read of size 1 at addr fff00000c9b7a000 by task kunit_try_catch/229 [ 29.729965] [ 29.729997] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 29.730206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.730237] Hardware name: linux,dummy-virt (DT) [ 29.730267] Call trace: [ 29.730291] show_stack+0x20/0x38 (C) [ 29.730391] dump_stack_lvl+0x8c/0xd0 [ 29.730507] print_report+0x118/0x608 [ 29.730653] kasan_report+0xdc/0x128 [ 29.730723] __kasan_check_byte+0x54/0x70 [ 29.730805] ksize+0x30/0x88 [ 29.730920] ksize_uaf+0x168/0x5f8 [ 29.731068] kunit_try_run_case+0x170/0x3f0 [ 29.731189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.731283] kthread+0x328/0x630 [ 29.731491] ret_from_fork+0x10/0x20 [ 29.731689] [ 29.731747] Allocated by task 229: [ 29.731893] kasan_save_stack+0x3c/0x68 [ 29.732069] kasan_save_track+0x20/0x40 [ 29.732147] kasan_save_alloc_info+0x40/0x58 [ 29.732210] __kasan_kmalloc+0xd4/0xd8 [ 29.732258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.732301] ksize_uaf+0xb8/0x5f8 [ 29.732335] kunit_try_run_case+0x170/0x3f0 [ 29.732375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.732628] kthread+0x328/0x630 [ 29.732737] ret_from_fork+0x10/0x20 [ 29.732809] [ 29.732884] Freed by task 229: [ 29.732977] kasan_save_stack+0x3c/0x68 [ 29.733064] kasan_save_track+0x20/0x40 [ 29.733212] kasan_save_free_info+0x4c/0x78 [ 29.733319] __kasan_slab_free+0x6c/0x98 [ 29.733560] kfree+0x214/0x3c8 [ 29.733680] ksize_uaf+0x11c/0x5f8 [ 29.733953] kunit_try_run_case+0x170/0x3f0 [ 29.734097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.734196] kthread+0x328/0x630 [ 29.734312] ret_from_fork+0x10/0x20 [ 29.734433] [ 29.734479] The buggy address belongs to the object at fff00000c9b7a000 [ 29.734479] which belongs to the cache kmalloc-128 of size 128 [ 29.734540] The buggy address is located 0 bytes inside of [ 29.734540] freed 128-byte region [fff00000c9b7a000, fff00000c9b7a080) [ 29.734602] [ 29.734840] The buggy address belongs to the physical page: [ 29.734956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b7a [ 29.735052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.735102] page_type: f5(slab) [ 29.735141] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.735192] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.735366] page dumped because: kasan: bad access detected [ 29.735426] [ 29.735504] Memory state around the buggy address: [ 29.735640] fff00000c9b79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.735745] fff00000c9b79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.735984] >fff00000c9b7a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.736044] ^ [ 29.736074] fff00000c9b7a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736308] fff00000c9b7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736461] ================================================================== [ 29.749197] ================================================================== [ 29.749251] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.749302] Read of size 1 at addr fff00000c9b7a078 by task kunit_try_catch/229 [ 29.749362] [ 29.749392] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 29.749488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.749515] Hardware name: linux,dummy-virt (DT) [ 29.749546] Call trace: [ 29.749569] show_stack+0x20/0x38 (C) [ 29.749616] dump_stack_lvl+0x8c/0xd0 [ 29.749663] print_report+0x118/0x608 [ 29.749951] kasan_report+0xdc/0x128 [ 29.750197] __asan_report_load1_noabort+0x20/0x30 [ 29.750258] ksize_uaf+0x544/0x5f8 [ 29.750842] kunit_try_run_case+0x170/0x3f0 [ 29.751048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.751183] kthread+0x328/0x630 [ 29.751273] ret_from_fork+0x10/0x20 [ 29.751723] [ 29.751771] Allocated by task 229: [ 29.751837] kasan_save_stack+0x3c/0x68 [ 29.751951] kasan_save_track+0x20/0x40 [ 29.752057] kasan_save_alloc_info+0x40/0x58 [ 29.752203] __kasan_kmalloc+0xd4/0xd8 [ 29.752294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.752352] ksize_uaf+0xb8/0x5f8 [ 29.752705] kunit_try_run_case+0x170/0x3f0 [ 29.752778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.752948] kthread+0x328/0x630 [ 29.753055] ret_from_fork+0x10/0x20 [ 29.753223] [ 29.753275] Freed by task 229: [ 29.753305] kasan_save_stack+0x3c/0x68 [ 29.753748] kasan_save_track+0x20/0x40 [ 29.753828] kasan_save_free_info+0x4c/0x78 [ 29.754455] __kasan_slab_free+0x6c/0x98 [ 29.754586] kfree+0x214/0x3c8 [ 29.754650] ksize_uaf+0x11c/0x5f8 [ 29.754728] kunit_try_run_case+0x170/0x3f0 [ 29.754802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.754974] kthread+0x328/0x630 [ 29.755248] ret_from_fork+0x10/0x20 [ 29.755527] [ 29.755568] The buggy address belongs to the object at fff00000c9b7a000 [ 29.755568] which belongs to the cache kmalloc-128 of size 128 [ 29.755880] The buggy address is located 120 bytes inside of [ 29.755880] freed 128-byte region [fff00000c9b7a000, fff00000c9b7a080) [ 29.756081] [ 29.756160] The buggy address belongs to the physical page: [ 29.756393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b7a [ 29.756451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.756648] page_type: f5(slab) [ 29.757129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.757222] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.757359] page dumped because: kasan: bad access detected [ 29.757504] [ 29.757623] Memory state around the buggy address: [ 29.757923] fff00000c9b79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.758051] fff00000c9b79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.758418] >fff00000c9b7a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.758521] ^ [ 29.758567] fff00000c9b7a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.758645] fff00000c9b7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.758733] ================================================================== [ 29.737841] ================================================================== [ 29.737895] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.737960] Read of size 1 at addr fff00000c9b7a000 by task kunit_try_catch/229 [ 29.738205] [ 29.738560] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT [ 29.738698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.738755] Hardware name: linux,dummy-virt (DT) [ 29.738942] Call trace: [ 29.739092] show_stack+0x20/0x38 (C) [ 29.739208] dump_stack_lvl+0x8c/0xd0 [ 29.739552] print_report+0x118/0x608 [ 29.739637] kasan_report+0xdc/0x128 [ 29.739720] __asan_report_load1_noabort+0x20/0x30 [ 29.739785] ksize_uaf+0x598/0x5f8 [ 29.740071] kunit_try_run_case+0x170/0x3f0 [ 29.740199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.740410] kthread+0x328/0x630 [ 29.740497] ret_from_fork+0x10/0x20 [ 29.740729] [ 29.740796] Allocated by task 229: [ 29.740828] kasan_save_stack+0x3c/0x68 [ 29.741166] kasan_save_track+0x20/0x40 [ 29.741250] kasan_save_alloc_info+0x40/0x58 [ 29.741358] __kasan_kmalloc+0xd4/0xd8 [ 29.741468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.741568] ksize_uaf+0xb8/0x5f8 [ 29.742151] kunit_try_run_case+0x170/0x3f0 [ 29.742229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.742422] kthread+0x328/0x630 [ 29.742581] ret_from_fork+0x10/0x20 [ 29.742701] [ 29.742782] Freed by task 229: [ 29.742978] kasan_save_stack+0x3c/0x68 [ 29.743212] kasan_save_track+0x20/0x40 [ 29.743318] kasan_save_free_info+0x4c/0x78 [ 29.743461] __kasan_slab_free+0x6c/0x98 [ 29.743596] kfree+0x214/0x3c8 [ 29.743674] ksize_uaf+0x11c/0x5f8 [ 29.743767] kunit_try_run_case+0x170/0x3f0 [ 29.743953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.744031] kthread+0x328/0x630 [ 29.744065] ret_from_fork+0x10/0x20 [ 29.744240] [ 29.744418] The buggy address belongs to the object at fff00000c9b7a000 [ 29.744418] which belongs to the cache kmalloc-128 of size 128 [ 29.744598] The buggy address is located 0 bytes inside of [ 29.744598] freed 128-byte region [fff00000c9b7a000, fff00000c9b7a080) [ 29.744781] [ 29.744883] The buggy address belongs to the physical page: [ 29.745044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b7a [ 29.745143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.745376] page_type: f5(slab) [ 29.745446] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.745627] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.745757] page dumped because: kasan: bad access detected [ 29.745940] [ 29.746089] Memory state around the buggy address: [ 29.746123] fff00000c9b79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.746166] fff00000c9b79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.746521] >fff00000c9b7a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.746585] ^ [ 29.746625] fff00000c9b7a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746723] fff00000c9b7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746765] ==================================================================
[ 25.419485] ================================================================== [ 25.419981] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 25.420542] Read of size 1 at addr ffff888103d62f00 by task kunit_try_catch/245 [ 25.420832] [ 25.420942] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 25.421013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.421026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.421051] Call Trace: [ 25.421065] <TASK> [ 25.421086] dump_stack_lvl+0x73/0xb0 [ 25.421118] print_report+0xd1/0x650 [ 25.421142] ? __virt_addr_valid+0x1db/0x2d0 [ 25.421188] ? ksize_uaf+0x19d/0x6c0 [ 25.421210] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.421237] ? ksize_uaf+0x19d/0x6c0 [ 25.421259] kasan_report+0x141/0x180 [ 25.421282] ? ksize_uaf+0x19d/0x6c0 [ 25.421306] ? ksize_uaf+0x19d/0x6c0 [ 25.421328] __kasan_check_byte+0x3d/0x50 [ 25.421351] ksize+0x20/0x60 [ 25.421376] ksize_uaf+0x19d/0x6c0 [ 25.421413] ? __pfx_ksize_uaf+0x10/0x10 [ 25.421436] ? __schedule+0x10cc/0x2b60 [ 25.421462] ? __pfx_read_tsc+0x10/0x10 [ 25.421486] ? ktime_get_ts64+0x86/0x230 [ 25.421512] kunit_try_run_case+0x1a5/0x480 [ 25.421541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.421565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.421591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.421616] ? __kthread_parkme+0x82/0x180 [ 25.421638] ? preempt_count_sub+0x50/0x80 [ 25.421663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.421689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.421715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.421740] kthread+0x337/0x6f0 [ 25.421761] ? trace_preempt_on+0x20/0xc0 [ 25.421788] ? __pfx_kthread+0x10/0x10 [ 25.421810] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.421834] ? calculate_sigpending+0x7b/0xa0 [ 25.421860] ? __pfx_kthread+0x10/0x10 [ 25.421900] ret_from_fork+0x116/0x1d0 [ 25.421920] ? __pfx_kthread+0x10/0x10 [ 25.421942] ret_from_fork_asm+0x1a/0x30 [ 25.421976] </TASK> [ 25.421990] [ 25.435051] Allocated by task 245: [ 25.435591] kasan_save_stack+0x45/0x70 [ 25.435771] kasan_save_track+0x18/0x40 [ 25.435938] kasan_save_alloc_info+0x3b/0x50 [ 25.436386] __kasan_kmalloc+0xb7/0xc0 [ 25.436872] __kmalloc_cache_noprof+0x189/0x420 [ 25.437367] ksize_uaf+0xaa/0x6c0 [ 25.437790] kunit_try_run_case+0x1a5/0x480 [ 25.438317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.438805] kthread+0x337/0x6f0 [ 25.438954] ret_from_fork+0x116/0x1d0 [ 25.439096] ret_from_fork_asm+0x1a/0x30 [ 25.439265] [ 25.439711] Freed by task 245: [ 25.440028] kasan_save_stack+0x45/0x70 [ 25.440514] kasan_save_track+0x18/0x40 [ 25.441064] kasan_save_free_info+0x3f/0x60 [ 25.441964] __kasan_slab_free+0x56/0x70 [ 25.442410] kfree+0x222/0x3f0 [ 25.442781] ksize_uaf+0x12c/0x6c0 [ 25.442939] kunit_try_run_case+0x1a5/0x480 [ 25.443368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.443952] kthread+0x337/0x6f0 [ 25.444264] ret_from_fork+0x116/0x1d0 [ 25.444589] ret_from_fork_asm+0x1a/0x30 [ 25.444735] [ 25.444807] The buggy address belongs to the object at ffff888103d62f00 [ 25.444807] which belongs to the cache kmalloc-128 of size 128 [ 25.445865] The buggy address is located 0 bytes inside of [ 25.445865] freed 128-byte region [ffff888103d62f00, ffff888103d62f80) [ 25.447608] [ 25.447793] The buggy address belongs to the physical page: [ 25.448130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d62 [ 25.448402] flags: 0x200000000000000(node=0|zone=2) [ 25.448906] page_type: f5(slab) [ 25.449282] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.449983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.450900] page dumped because: kasan: bad access detected [ 25.451605] [ 25.451682] Memory state around the buggy address: [ 25.451845] ffff888103d62e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.452798] ffff888103d62e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.453607] >ffff888103d62f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.454318] ^ [ 25.454648] ffff888103d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.454905] ffff888103d63000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.455646] ================================================================== [ 25.456918] ================================================================== [ 25.457584] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 25.457822] Read of size 1 at addr ffff888103d62f00 by task kunit_try_catch/245 [ 25.458495] [ 25.458687] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 25.458740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.458752] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.458776] Call Trace: [ 25.458793] <TASK> [ 25.458813] dump_stack_lvl+0x73/0xb0 [ 25.458844] print_report+0xd1/0x650 [ 25.458867] ? __virt_addr_valid+0x1db/0x2d0 [ 25.458893] ? ksize_uaf+0x5fe/0x6c0 [ 25.458917] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.458944] ? ksize_uaf+0x5fe/0x6c0 [ 25.459216] kasan_report+0x141/0x180 [ 25.459250] ? ksize_uaf+0x5fe/0x6c0 [ 25.459278] __asan_report_load1_noabort+0x18/0x20 [ 25.459304] ksize_uaf+0x5fe/0x6c0 [ 25.459327] ? __pfx_ksize_uaf+0x10/0x10 [ 25.459349] ? __schedule+0x10cc/0x2b60 [ 25.459376] ? __pfx_read_tsc+0x10/0x10 [ 25.459414] ? ktime_get_ts64+0x86/0x230 [ 25.459440] kunit_try_run_case+0x1a5/0x480 [ 25.459467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.459492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.459517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.459543] ? __kthread_parkme+0x82/0x180 [ 25.459565] ? preempt_count_sub+0x50/0x80 [ 25.459590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.459616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.459642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.459667] kthread+0x337/0x6f0 [ 25.459688] ? trace_preempt_on+0x20/0xc0 [ 25.459713] ? __pfx_kthread+0x10/0x10 [ 25.459735] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.459758] ? calculate_sigpending+0x7b/0xa0 [ 25.459784] ? __pfx_kthread+0x10/0x10 [ 25.459807] ret_from_fork+0x116/0x1d0 [ 25.459826] ? __pfx_kthread+0x10/0x10 [ 25.459848] ret_from_fork_asm+0x1a/0x30 [ 25.459881] </TASK> [ 25.459894] [ 25.472022] Allocated by task 245: [ 25.472470] kasan_save_stack+0x45/0x70 [ 25.472691] kasan_save_track+0x18/0x40 [ 25.472877] kasan_save_alloc_info+0x3b/0x50 [ 25.473074] __kasan_kmalloc+0xb7/0xc0 [ 25.473267] __kmalloc_cache_noprof+0x189/0x420 [ 25.473495] ksize_uaf+0xaa/0x6c0 [ 25.473660] kunit_try_run_case+0x1a5/0x480 [ 25.473863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.474102] kthread+0x337/0x6f0 [ 25.474268] ret_from_fork+0x116/0x1d0 [ 25.474555] ret_from_fork_asm+0x1a/0x30 [ 25.474708] [ 25.474777] Freed by task 245: [ 25.474888] kasan_save_stack+0x45/0x70 [ 25.475053] kasan_save_track+0x18/0x40 [ 25.475244] kasan_save_free_info+0x3f/0x60 [ 25.475616] __kasan_slab_free+0x56/0x70 [ 25.476306] kfree+0x222/0x3f0 [ 25.476458] ksize_uaf+0x12c/0x6c0 [ 25.477064] kunit_try_run_case+0x1a5/0x480 [ 25.477496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.477779] kthread+0x337/0x6f0 [ 25.478028] ret_from_fork+0x116/0x1d0 [ 25.478192] ret_from_fork_asm+0x1a/0x30 [ 25.478739] [ 25.478851] The buggy address belongs to the object at ffff888103d62f00 [ 25.478851] which belongs to the cache kmalloc-128 of size 128 [ 25.479697] The buggy address is located 0 bytes inside of [ 25.479697] freed 128-byte region [ffff888103d62f00, ffff888103d62f80) [ 25.480305] [ 25.480637] The buggy address belongs to the physical page: [ 25.480871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d62 [ 25.481182] flags: 0x200000000000000(node=0|zone=2) [ 25.481468] page_type: f5(slab) [ 25.481629] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.482470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.482783] page dumped because: kasan: bad access detected [ 25.483274] [ 25.483366] Memory state around the buggy address: [ 25.483800] ffff888103d62e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.484372] ffff888103d62e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.484785] >ffff888103d62f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.485529] ^ [ 25.485670] ffff888103d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.486322] ffff888103d63000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.486754] ================================================================== [ 25.487481] ================================================================== [ 25.488175] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 25.488602] Read of size 1 at addr ffff888103d62f78 by task kunit_try_catch/245 [ 25.489057] [ 25.489183] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 25.489237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.489250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.489275] Call Trace: [ 25.489298] <TASK> [ 25.489319] dump_stack_lvl+0x73/0xb0 [ 25.489351] print_report+0xd1/0x650 [ 25.489375] ? __virt_addr_valid+0x1db/0x2d0 [ 25.489415] ? ksize_uaf+0x5e4/0x6c0 [ 25.489437] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.489464] ? ksize_uaf+0x5e4/0x6c0 [ 25.489730] kasan_report+0x141/0x180 [ 25.489759] ? ksize_uaf+0x5e4/0x6c0 [ 25.489787] __asan_report_load1_noabort+0x18/0x20 [ 25.489812] ksize_uaf+0x5e4/0x6c0 [ 25.489834] ? __pfx_ksize_uaf+0x10/0x10 [ 25.489859] ? __schedule+0x10cc/0x2b60 [ 25.489885] ? __pfx_read_tsc+0x10/0x10 [ 25.489908] ? ktime_get_ts64+0x86/0x230 [ 25.489935] kunit_try_run_case+0x1a5/0x480 [ 25.489962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.489987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.490012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.490038] ? __kthread_parkme+0x82/0x180 [ 25.490060] ? preempt_count_sub+0x50/0x80 [ 25.490085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.490111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.490137] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.490179] kthread+0x337/0x6f0 [ 25.490200] ? trace_preempt_on+0x20/0xc0 [ 25.490226] ? __pfx_kthread+0x10/0x10 [ 25.490248] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.490273] ? calculate_sigpending+0x7b/0xa0 [ 25.490299] ? __pfx_kthread+0x10/0x10 [ 25.490322] ret_from_fork+0x116/0x1d0 [ 25.490343] ? __pfx_kthread+0x10/0x10 [ 25.490365] ret_from_fork_asm+0x1a/0x30 [ 25.490411] </TASK> [ 25.490424] [ 25.501646] Allocated by task 245: [ 25.502019] kasan_save_stack+0x45/0x70 [ 25.502201] kasan_save_track+0x18/0x40 [ 25.502606] kasan_save_alloc_info+0x3b/0x50 [ 25.502812] __kasan_kmalloc+0xb7/0xc0 [ 25.503384] __kmalloc_cache_noprof+0x189/0x420 [ 25.503629] ksize_uaf+0xaa/0x6c0 [ 25.503775] kunit_try_run_case+0x1a5/0x480 [ 25.504387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.504682] kthread+0x337/0x6f0 [ 25.504847] ret_from_fork+0x116/0x1d0 [ 25.505185] ret_from_fork_asm+0x1a/0x30 [ 25.505563] [ 25.505668] Freed by task 245: [ 25.505824] kasan_save_stack+0x45/0x70 [ 25.506021] kasan_save_track+0x18/0x40 [ 25.506255] kasan_save_free_info+0x3f/0x60 [ 25.506456] __kasan_slab_free+0x56/0x70 [ 25.506624] kfree+0x222/0x3f0 [ 25.506796] ksize_uaf+0x12c/0x6c0 [ 25.507033] kunit_try_run_case+0x1a5/0x480 [ 25.507240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.507608] kthread+0x337/0x6f0 [ 25.507777] ret_from_fork+0x116/0x1d0 [ 25.507984] ret_from_fork_asm+0x1a/0x30 [ 25.508131] [ 25.508272] The buggy address belongs to the object at ffff888103d62f00 [ 25.508272] which belongs to the cache kmalloc-128 of size 128 [ 25.508756] The buggy address is located 120 bytes inside of [ 25.508756] freed 128-byte region [ffff888103d62f00, ffff888103d62f80) [ 25.509581] [ 25.509688] The buggy address belongs to the physical page: [ 25.509988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d62 [ 25.510253] flags: 0x200000000000000(node=0|zone=2) [ 25.510685] page_type: f5(slab) [ 25.510894] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.511371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.511668] page dumped because: kasan: bad access detected [ 25.511848] [ 25.511920] Memory state around the buggy address: [ 25.512157] ffff888103d62e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.512511] ffff888103d62e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.512984] >ffff888103d62f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.513344] ^ [ 25.513622] ffff888103d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.513882] ffff888103d63000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.514358] ==================================================================