Date
July 9, 2025, 1:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.560360] ================================================================== [ 29.560414] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.560569] Read of size 1 at addr fff00000c5998278 by task kunit_try_catch/228 [ 29.560624] [ 29.560655] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.560741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.560936] Hardware name: linux,dummy-virt (DT) [ 29.561225] Call trace: [ 29.561301] show_stack+0x20/0x38 (C) [ 29.561361] dump_stack_lvl+0x8c/0xd0 [ 29.561542] print_report+0x118/0x5d0 [ 29.561680] kasan_report+0xdc/0x128 [ 29.561740] __asan_report_load1_noabort+0x20/0x30 [ 29.562135] ksize_uaf+0x544/0x5f8 [ 29.562206] kunit_try_run_case+0x170/0x3f0 [ 29.562259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.562311] kthread+0x328/0x630 [ 29.562355] ret_from_fork+0x10/0x20 [ 29.562401] [ 29.562709] Allocated by task 228: [ 29.562833] kasan_save_stack+0x3c/0x68 [ 29.562947] kasan_save_track+0x20/0x40 [ 29.563079] kasan_save_alloc_info+0x40/0x58 [ 29.563121] __kasan_kmalloc+0xd4/0xd8 [ 29.563403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.563466] ksize_uaf+0xb8/0x5f8 [ 29.563578] kunit_try_run_case+0x170/0x3f0 [ 29.563654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.563830] kthread+0x328/0x630 [ 29.563901] ret_from_fork+0x10/0x20 [ 29.564117] [ 29.564142] Freed by task 228: [ 29.564175] kasan_save_stack+0x3c/0x68 [ 29.564382] kasan_save_track+0x20/0x40 [ 29.564545] kasan_save_free_info+0x4c/0x78 [ 29.564664] __kasan_slab_free+0x6c/0x98 [ 29.564842] kfree+0x214/0x3c8 [ 29.564939] ksize_uaf+0x11c/0x5f8 [ 29.565245] kunit_try_run_case+0x170/0x3f0 [ 29.565466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.565690] kthread+0x328/0x630 [ 29.565765] ret_from_fork+0x10/0x20 [ 29.565871] [ 29.565901] The buggy address belongs to the object at fff00000c5998200 [ 29.565901] which belongs to the cache kmalloc-128 of size 128 [ 29.566105] The buggy address is located 120 bytes inside of [ 29.566105] freed 128-byte region [fff00000c5998200, fff00000c5998280) [ 29.566174] [ 29.566305] The buggy address belongs to the physical page: [ 29.566429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 29.566513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.566571] page_type: f5(slab) [ 29.566611] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.566663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.566712] page dumped because: kasan: bad access detected [ 29.566744] [ 29.566774] Memory state around the buggy address: [ 29.566824] fff00000c5998100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.566886] fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.566930] >fff00000c5998200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.566968] ^ [ 29.567009] fff00000c5998280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.567091] fff00000c5998300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.567166] ================================================================== [ 29.541256] ================================================================== [ 29.541319] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.541372] Read of size 1 at addr fff00000c5998200 by task kunit_try_catch/228 [ 29.541861] [ 29.541924] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.542027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.542066] Hardware name: linux,dummy-virt (DT) [ 29.542097] Call trace: [ 29.542120] show_stack+0x20/0x38 (C) [ 29.542183] dump_stack_lvl+0x8c/0xd0 [ 29.542233] print_report+0x118/0x5d0 [ 29.542277] kasan_report+0xdc/0x128 [ 29.542320] __kasan_check_byte+0x54/0x70 [ 29.542375] ksize+0x30/0x88 [ 29.542419] ksize_uaf+0x168/0x5f8 [ 29.542473] kunit_try_run_case+0x170/0x3f0 [ 29.542523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.542578] kthread+0x328/0x630 [ 29.542621] ret_from_fork+0x10/0x20 [ 29.542677] [ 29.542696] Allocated by task 228: [ 29.542725] kasan_save_stack+0x3c/0x68 [ 29.542765] kasan_save_track+0x20/0x40 [ 29.542804] kasan_save_alloc_info+0x40/0x58 [ 29.542842] __kasan_kmalloc+0xd4/0xd8 [ 29.542880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.542920] ksize_uaf+0xb8/0x5f8 [ 29.542954] kunit_try_run_case+0x170/0x3f0 [ 29.543002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.543820] kthread+0x328/0x630 [ 29.544036] ret_from_fork+0x10/0x20 [ 29.544189] [ 29.544212] Freed by task 228: [ 29.544242] kasan_save_stack+0x3c/0x68 [ 29.544282] kasan_save_track+0x20/0x40 [ 29.544320] kasan_save_free_info+0x4c/0x78 [ 29.544358] __kasan_slab_free+0x6c/0x98 [ 29.544739] kfree+0x214/0x3c8 [ 29.544817] ksize_uaf+0x11c/0x5f8 [ 29.545181] kunit_try_run_case+0x170/0x3f0 [ 29.545307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.545382] kthread+0x328/0x630 [ 29.545605] ret_from_fork+0x10/0x20 [ 29.545892] [ 29.545951] The buggy address belongs to the object at fff00000c5998200 [ 29.545951] which belongs to the cache kmalloc-128 of size 128 [ 29.546081] The buggy address is located 0 bytes inside of [ 29.546081] freed 128-byte region [fff00000c5998200, fff00000c5998280) [ 29.546169] [ 29.546387] The buggy address belongs to the physical page: [ 29.546510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 29.546668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.547309] page_type: f5(slab) [ 29.547419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.547656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.547731] page dumped because: kasan: bad access detected [ 29.547905] [ 29.547985] Memory state around the buggy address: [ 29.548148] fff00000c5998100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.548234] fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.548700] >fff00000c5998200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.548791] ^ [ 29.548823] fff00000c5998280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.549105] fff00000c5998300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.549271] ================================================================== [ 29.551174] ================================================================== [ 29.551236] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.551427] Read of size 1 at addr fff00000c5998200 by task kunit_try_catch/228 [ 29.551490] [ 29.551523] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 29.552004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.552067] Hardware name: linux,dummy-virt (DT) [ 29.552159] Call trace: [ 29.552229] show_stack+0x20/0x38 (C) [ 29.552434] dump_stack_lvl+0x8c/0xd0 [ 29.552547] print_report+0x118/0x5d0 [ 29.552601] kasan_report+0xdc/0x128 [ 29.552770] __asan_report_load1_noabort+0x20/0x30 [ 29.552830] ksize_uaf+0x598/0x5f8 [ 29.552876] kunit_try_run_case+0x170/0x3f0 [ 29.552926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.553237] kthread+0x328/0x630 [ 29.553322] ret_from_fork+0x10/0x20 [ 29.553501] [ 29.553581] Allocated by task 228: [ 29.553683] kasan_save_stack+0x3c/0x68 [ 29.553740] kasan_save_track+0x20/0x40 [ 29.553847] kasan_save_alloc_info+0x40/0x58 [ 29.553886] __kasan_kmalloc+0xd4/0xd8 [ 29.554277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.554457] ksize_uaf+0xb8/0x5f8 [ 29.554542] kunit_try_run_case+0x170/0x3f0 [ 29.554665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.554724] kthread+0x328/0x630 [ 29.554964] ret_from_fork+0x10/0x20 [ 29.555155] [ 29.555209] Freed by task 228: [ 29.555379] kasan_save_stack+0x3c/0x68 [ 29.555779] kasan_save_track+0x20/0x40 [ 29.555854] kasan_save_free_info+0x4c/0x78 [ 29.556025] __kasan_slab_free+0x6c/0x98 [ 29.556259] kfree+0x214/0x3c8 [ 29.556299] ksize_uaf+0x11c/0x5f8 [ 29.556457] kunit_try_run_case+0x170/0x3f0 [ 29.556564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.556734] kthread+0x328/0x630 [ 29.556821] ret_from_fork+0x10/0x20 [ 29.556985] [ 29.557129] The buggy address belongs to the object at fff00000c5998200 [ 29.557129] which belongs to the cache kmalloc-128 of size 128 [ 29.557211] The buggy address is located 0 bytes inside of [ 29.557211] freed 128-byte region [fff00000c5998200, fff00000c5998280) [ 29.557273] [ 29.557294] The buggy address belongs to the physical page: [ 29.557543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 29.557757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.557910] page_type: f5(slab) [ 29.558093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.558181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.558443] page dumped because: kasan: bad access detected [ 29.558592] [ 29.558636] Memory state around the buggy address: [ 29.558712] fff00000c5998100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.558760] fff00000c5998180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.558803] >fff00000c5998200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.558850] ^ [ 29.558879] fff00000c5998280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.558938] fff00000c5998300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.558985] ==================================================================
[ 24.588792] ================================================================== [ 24.589259] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 24.589538] Read of size 1 at addr ffff88810456ae00 by task kunit_try_catch/246 [ 24.589941] [ 24.590025] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 24.590072] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.590085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.590104] Call Trace: [ 24.590120] <TASK> [ 24.590136] dump_stack_lvl+0x73/0xb0 [ 24.590164] print_report+0xd1/0x610 [ 24.590367] ? __virt_addr_valid+0x1db/0x2d0 [ 24.590397] ? ksize_uaf+0x5fe/0x6c0 [ 24.590418] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.590471] ? ksize_uaf+0x5fe/0x6c0 [ 24.590493] kasan_report+0x141/0x180 [ 24.590515] ? ksize_uaf+0x5fe/0x6c0 [ 24.590552] __asan_report_load1_noabort+0x18/0x20 [ 24.590575] ksize_uaf+0x5fe/0x6c0 [ 24.590595] ? __pfx_ksize_uaf+0x10/0x10 [ 24.590616] ? __schedule+0x10cc/0x2b60 [ 24.590639] ? __pfx_read_tsc+0x10/0x10 [ 24.590659] ? ktime_get_ts64+0x86/0x230 [ 24.590683] kunit_try_run_case+0x1a5/0x480 [ 24.590716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.590736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.590759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.590803] ? __kthread_parkme+0x82/0x180 [ 24.590823] ? preempt_count_sub+0x50/0x80 [ 24.590846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.590866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.590962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.590987] kthread+0x337/0x6f0 [ 24.591006] ? trace_preempt_on+0x20/0xc0 [ 24.591028] ? __pfx_kthread+0x10/0x10 [ 24.591049] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.591071] ? calculate_sigpending+0x7b/0xa0 [ 24.591094] ? __pfx_kthread+0x10/0x10 [ 24.591115] ret_from_fork+0x116/0x1d0 [ 24.591133] ? __pfx_kthread+0x10/0x10 [ 24.591153] ret_from_fork_asm+0x1a/0x30 [ 24.591183] </TASK> [ 24.591194] [ 24.598448] Allocated by task 246: [ 24.598590] kasan_save_stack+0x45/0x70 [ 24.598817] kasan_save_track+0x18/0x40 [ 24.599011] kasan_save_alloc_info+0x3b/0x50 [ 24.599184] __kasan_kmalloc+0xb7/0xc0 [ 24.599447] __kmalloc_cache_noprof+0x189/0x420 [ 24.599655] ksize_uaf+0xaa/0x6c0 [ 24.599934] kunit_try_run_case+0x1a5/0x480 [ 24.600094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.600345] kthread+0x337/0x6f0 [ 24.600504] ret_from_fork+0x116/0x1d0 [ 24.600630] ret_from_fork_asm+0x1a/0x30 [ 24.600798] [ 24.600865] Freed by task 246: [ 24.601074] kasan_save_stack+0x45/0x70 [ 24.601265] kasan_save_track+0x18/0x40 [ 24.601448] kasan_save_free_info+0x3f/0x60 [ 24.601668] __kasan_slab_free+0x56/0x70 [ 24.602077] kfree+0x222/0x3f0 [ 24.602273] ksize_uaf+0x12c/0x6c0 [ 24.602458] kunit_try_run_case+0x1a5/0x480 [ 24.602595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.602834] kthread+0x337/0x6f0 [ 24.603037] ret_from_fork+0x116/0x1d0 [ 24.603221] ret_from_fork_asm+0x1a/0x30 [ 24.603385] [ 24.603450] The buggy address belongs to the object at ffff88810456ae00 [ 24.603450] which belongs to the cache kmalloc-128 of size 128 [ 24.603819] The buggy address is located 0 bytes inside of [ 24.603819] freed 128-byte region [ffff88810456ae00, ffff88810456ae80) [ 24.604336] [ 24.604426] The buggy address belongs to the physical page: [ 24.604679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10456a [ 24.605220] flags: 0x200000000000000(node=0|zone=2) [ 24.605385] page_type: f5(slab) [ 24.605566] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.606141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.606417] page dumped because: kasan: bad access detected [ 24.606672] [ 24.606752] Memory state around the buggy address: [ 24.607056] ffff88810456ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.607313] ffff88810456ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.607519] >ffff88810456ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.607734] ^ [ 24.608009] ffff88810456ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.608350] ffff88810456af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.608668] ================================================================== [ 24.609261] ================================================================== [ 24.609620] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 24.609860] Read of size 1 at addr ffff88810456ae78 by task kunit_try_catch/246 [ 24.610439] [ 24.610569] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 24.610617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.610630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.610650] Call Trace: [ 24.610666] <TASK> [ 24.610682] dump_stack_lvl+0x73/0xb0 [ 24.610724] print_report+0xd1/0x610 [ 24.610745] ? __virt_addr_valid+0x1db/0x2d0 [ 24.610788] ? ksize_uaf+0x5e4/0x6c0 [ 24.610808] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.610833] ? ksize_uaf+0x5e4/0x6c0 [ 24.610853] kasan_report+0x141/0x180 [ 24.610874] ? ksize_uaf+0x5e4/0x6c0 [ 24.610899] __asan_report_load1_noabort+0x18/0x20 [ 24.610922] ksize_uaf+0x5e4/0x6c0 [ 24.610941] ? __pfx_ksize_uaf+0x10/0x10 [ 24.610962] ? __schedule+0x10cc/0x2b60 [ 24.611053] ? __pfx_read_tsc+0x10/0x10 [ 24.611076] ? ktime_get_ts64+0x86/0x230 [ 24.611101] kunit_try_run_case+0x1a5/0x480 [ 24.611123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.611143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.611166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.611189] ? __kthread_parkme+0x82/0x180 [ 24.611209] ? preempt_count_sub+0x50/0x80 [ 24.611232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.611253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.611294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.611319] kthread+0x337/0x6f0 [ 24.611338] ? trace_preempt_on+0x20/0xc0 [ 24.611360] ? __pfx_kthread+0x10/0x10 [ 24.611380] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.611401] ? calculate_sigpending+0x7b/0xa0 [ 24.611424] ? __pfx_kthread+0x10/0x10 [ 24.611447] ret_from_fork+0x116/0x1d0 [ 24.611465] ? __pfx_kthread+0x10/0x10 [ 24.611485] ret_from_fork_asm+0x1a/0x30 [ 24.611516] </TASK> [ 24.611526] [ 24.618736] Allocated by task 246: [ 24.618863] kasan_save_stack+0x45/0x70 [ 24.619157] kasan_save_track+0x18/0x40 [ 24.619354] kasan_save_alloc_info+0x3b/0x50 [ 24.619580] __kasan_kmalloc+0xb7/0xc0 [ 24.619778] __kmalloc_cache_noprof+0x189/0x420 [ 24.620099] ksize_uaf+0xaa/0x6c0 [ 24.620281] kunit_try_run_case+0x1a5/0x480 [ 24.620470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.620641] kthread+0x337/0x6f0 [ 24.620784] ret_from_fork+0x116/0x1d0 [ 24.621050] ret_from_fork_asm+0x1a/0x30 [ 24.621269] [ 24.621360] Freed by task 246: [ 24.621509] kasan_save_stack+0x45/0x70 [ 24.621686] kasan_save_track+0x18/0x40 [ 24.622093] kasan_save_free_info+0x3f/0x60 [ 24.622247] __kasan_slab_free+0x56/0x70 [ 24.622376] kfree+0x222/0x3f0 [ 24.622564] ksize_uaf+0x12c/0x6c0 [ 24.622761] kunit_try_run_case+0x1a5/0x480 [ 24.622964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.623233] kthread+0x337/0x6f0 [ 24.623428] ret_from_fork+0x116/0x1d0 [ 24.623566] ret_from_fork_asm+0x1a/0x30 [ 24.623792] [ 24.623945] The buggy address belongs to the object at ffff88810456ae00 [ 24.623945] which belongs to the cache kmalloc-128 of size 128 [ 24.624468] The buggy address is located 120 bytes inside of [ 24.624468] freed 128-byte region [ffff88810456ae00, ffff88810456ae80) [ 24.624982] [ 24.625093] The buggy address belongs to the physical page: [ 24.625336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10456a [ 24.625670] flags: 0x200000000000000(node=0|zone=2) [ 24.626029] page_type: f5(slab) [ 24.626237] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.626568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.626968] page dumped because: kasan: bad access detected [ 24.627219] [ 24.627298] Memory state around the buggy address: [ 24.627513] ffff88810456ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.627844] ffff88810456ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.628209] >ffff88810456ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.628500] ^ [ 24.628740] ffff88810456ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.629159] ffff88810456af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.629450] ================================================================== [ 24.567448] ================================================================== [ 24.567981] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 24.568393] Read of size 1 at addr ffff88810456ae00 by task kunit_try_catch/246 [ 24.568690] [ 24.568804] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 24.568857] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.568870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.568890] Call Trace: [ 24.569113] <TASK> [ 24.569137] dump_stack_lvl+0x73/0xb0 [ 24.569172] print_report+0xd1/0x610 [ 24.569194] ? __virt_addr_valid+0x1db/0x2d0 [ 24.569218] ? ksize_uaf+0x19d/0x6c0 [ 24.569237] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.569263] ? ksize_uaf+0x19d/0x6c0 [ 24.569282] kasan_report+0x141/0x180 [ 24.569303] ? ksize_uaf+0x19d/0x6c0 [ 24.569326] ? ksize_uaf+0x19d/0x6c0 [ 24.569346] __kasan_check_byte+0x3d/0x50 [ 24.569367] ksize+0x20/0x60 [ 24.569390] ksize_uaf+0x19d/0x6c0 [ 24.569410] ? __pfx_ksize_uaf+0x10/0x10 [ 24.569430] ? __schedule+0x10cc/0x2b60 [ 24.569453] ? __pfx_read_tsc+0x10/0x10 [ 24.569474] ? ktime_get_ts64+0x86/0x230 [ 24.569499] kunit_try_run_case+0x1a5/0x480 [ 24.569521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.569541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.569563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.569587] ? __kthread_parkme+0x82/0x180 [ 24.569607] ? preempt_count_sub+0x50/0x80 [ 24.569629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.569650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.569674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.569713] kthread+0x337/0x6f0 [ 24.569732] ? trace_preempt_on+0x20/0xc0 [ 24.569754] ? __pfx_kthread+0x10/0x10 [ 24.569775] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.569808] ? calculate_sigpending+0x7b/0xa0 [ 24.569832] ? __pfx_kthread+0x10/0x10 [ 24.569852] ret_from_fork+0x116/0x1d0 [ 24.569871] ? __pfx_kthread+0x10/0x10 [ 24.569960] ret_from_fork_asm+0x1a/0x30 [ 24.569992] </TASK> [ 24.570003] [ 24.577420] Allocated by task 246: [ 24.577583] kasan_save_stack+0x45/0x70 [ 24.577764] kasan_save_track+0x18/0x40 [ 24.578015] kasan_save_alloc_info+0x3b/0x50 [ 24.578193] __kasan_kmalloc+0xb7/0xc0 [ 24.578318] __kmalloc_cache_noprof+0x189/0x420 [ 24.578464] ksize_uaf+0xaa/0x6c0 [ 24.578625] kunit_try_run_case+0x1a5/0x480 [ 24.578831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.579255] kthread+0x337/0x6f0 [ 24.579400] ret_from_fork+0x116/0x1d0 [ 24.579528] ret_from_fork_asm+0x1a/0x30 [ 24.579659] [ 24.579736] Freed by task 246: [ 24.579852] kasan_save_stack+0x45/0x70 [ 24.580033] kasan_save_track+0x18/0x40 [ 24.580213] kasan_save_free_info+0x3f/0x60 [ 24.580409] __kasan_slab_free+0x56/0x70 [ 24.580595] kfree+0x222/0x3f0 [ 24.580791] ksize_uaf+0x12c/0x6c0 [ 24.580946] kunit_try_run_case+0x1a5/0x480 [ 24.581130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.581359] kthread+0x337/0x6f0 [ 24.581511] ret_from_fork+0x116/0x1d0 [ 24.581675] ret_from_fork_asm+0x1a/0x30 [ 24.581906] [ 24.581972] The buggy address belongs to the object at ffff88810456ae00 [ 24.581972] which belongs to the cache kmalloc-128 of size 128 [ 24.582321] The buggy address is located 0 bytes inside of [ 24.582321] freed 128-byte region [ffff88810456ae00, ffff88810456ae80) [ 24.583213] [ 24.583316] The buggy address belongs to the physical page: [ 24.583562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10456a [ 24.584039] flags: 0x200000000000000(node=0|zone=2) [ 24.584261] page_type: f5(slab) [ 24.584377] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.584668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.585108] page dumped because: kasan: bad access detected [ 24.585307] [ 24.585371] Memory state around the buggy address: [ 24.585518] ffff88810456ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.585828] ffff88810456ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.586316] >ffff88810456ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.586633] ^ [ 24.586830] ffff88810456ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.587216] ffff88810456af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.587442] ==================================================================