Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 47.348264] ================================================================== [ 47.358054] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 47.364387] Read of size 1 at addr ffff0008074f9100 by task kunit_try_catch/280 [ 47.371678] [ 47.373164] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 47.373218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.373235] Hardware name: WinLink E850-96 board (DT) [ 47.373256] Call trace: [ 47.373269] show_stack+0x20/0x38 (C) [ 47.373304] dump_stack_lvl+0x8c/0xd0 [ 47.373340] print_report+0x118/0x5d0 [ 47.373367] kasan_report+0xdc/0x128 [ 47.373392] __kasan_check_byte+0x54/0x70 [ 47.373420] ksize+0x30/0x88 [ 47.373452] ksize_uaf+0x168/0x5f8 [ 47.373481] kunit_try_run_case+0x170/0x3f0 [ 47.373518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.373551] kthread+0x328/0x630 [ 47.373582] ret_from_fork+0x10/0x20 [ 47.373614] [ 47.438518] Allocated by task 280: [ 47.441907] kasan_save_stack+0x3c/0x68 [ 47.445722] kasan_save_track+0x20/0x40 [ 47.449542] kasan_save_alloc_info+0x40/0x58 [ 47.453795] __kasan_kmalloc+0xd4/0xd8 [ 47.457528] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.462041] ksize_uaf+0xb8/0x5f8 [ 47.465340] kunit_try_run_case+0x170/0x3f0 [ 47.469506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.474977] kthread+0x328/0x630 [ 47.478187] ret_from_fork+0x10/0x20 [ 47.481746] [ 47.483221] Freed by task 280: [ 47.486260] kasan_save_stack+0x3c/0x68 [ 47.490079] kasan_save_track+0x20/0x40 [ 47.493900] kasan_save_free_info+0x4c/0x78 [ 47.498065] __kasan_slab_free+0x6c/0x98 [ 47.501972] kfree+0x214/0x3c8 [ 47.505010] ksize_uaf+0x11c/0x5f8 [ 47.508395] kunit_try_run_case+0x170/0x3f0 [ 47.512562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.518030] kthread+0x328/0x630 [ 47.521242] ret_from_fork+0x10/0x20 [ 47.524801] [ 47.526278] The buggy address belongs to the object at ffff0008074f9100 [ 47.526278] which belongs to the cache kmalloc-128 of size 128 [ 47.538780] The buggy address is located 0 bytes inside of [ 47.538780] freed 128-byte region [ffff0008074f9100, ffff0008074f9180) [ 47.550842] [ 47.552320] The buggy address belongs to the physical page: [ 47.557878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 47.565861] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.573500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.580444] page_type: f5(slab) [ 47.583581] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.591300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.599026] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.606838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.614651] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 47.622463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.630269] page dumped because: kasan: bad access detected [ 47.635824] [ 47.637301] Memory state around the buggy address: [ 47.642080] ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.649282] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.656488] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.663687] ^ [ 47.666903] ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.674109] ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.681312] ================================================================== [ 48.024250] ================================================================== [ 48.031313] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 48.037641] Read of size 1 at addr ffff0008074f9178 by task kunit_try_catch/280 [ 48.044932] [ 48.046417] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 48.046470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.046486] Hardware name: WinLink E850-96 board (DT) [ 48.046506] Call trace: [ 48.046520] show_stack+0x20/0x38 (C) [ 48.046555] dump_stack_lvl+0x8c/0xd0 [ 48.046588] print_report+0x118/0x5d0 [ 48.046616] kasan_report+0xdc/0x128 [ 48.046642] __asan_report_load1_noabort+0x20/0x30 [ 48.046674] ksize_uaf+0x544/0x5f8 [ 48.046708] kunit_try_run_case+0x170/0x3f0 [ 48.046743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.046776] kthread+0x328/0x630 [ 48.046805] ret_from_fork+0x10/0x20 [ 48.046839] [ 48.109688] Allocated by task 280: [ 48.113075] kasan_save_stack+0x3c/0x68 [ 48.116893] kasan_save_track+0x20/0x40 [ 48.120712] kasan_save_alloc_info+0x40/0x58 [ 48.124966] __kasan_kmalloc+0xd4/0xd8 [ 48.128698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.133212] ksize_uaf+0xb8/0x5f8 [ 48.136512] kunit_try_run_case+0x170/0x3f0 [ 48.140677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.146146] kthread+0x328/0x630 [ 48.149357] ret_from_fork+0x10/0x20 [ 48.152916] [ 48.154392] Freed by task 280: [ 48.157431] kasan_save_stack+0x3c/0x68 [ 48.161250] kasan_save_track+0x20/0x40 [ 48.165069] kasan_save_free_info+0x4c/0x78 [ 48.169236] __kasan_slab_free+0x6c/0x98 [ 48.173142] kfree+0x214/0x3c8 [ 48.176180] ksize_uaf+0x11c/0x5f8 [ 48.179566] kunit_try_run_case+0x170/0x3f0 [ 48.183732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.189201] kthread+0x328/0x630 [ 48.192412] ret_from_fork+0x10/0x20 [ 48.195972] [ 48.197447] The buggy address belongs to the object at ffff0008074f9100 [ 48.197447] which belongs to the cache kmalloc-128 of size 128 [ 48.209950] The buggy address is located 120 bytes inside of [ 48.209950] freed 128-byte region [ffff0008074f9100, ffff0008074f9180) [ 48.222186] [ 48.223664] The buggy address belongs to the physical page: [ 48.229222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 48.237204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.244844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.251786] page_type: f5(slab) [ 48.254924] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.262643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.270370] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.278181] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.285994] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 48.293807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.301613] page dumped because: kasan: bad access detected [ 48.307168] [ 48.308643] Memory state around the buggy address: [ 48.313423] ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.320626] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.327833] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.335032] ^ [ 48.342153] ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.349359] ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.356559] ================================================================== [ 47.688890] ================================================================== [ 47.695725] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 47.702055] Read of size 1 at addr ffff0008074f9100 by task kunit_try_catch/280 [ 47.709347] [ 47.710833] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 47.710886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.710904] Hardware name: WinLink E850-96 board (DT) [ 47.710923] Call trace: [ 47.710938] show_stack+0x20/0x38 (C) [ 47.710973] dump_stack_lvl+0x8c/0xd0 [ 47.711007] print_report+0x118/0x5d0 [ 47.711035] kasan_report+0xdc/0x128 [ 47.711063] __asan_report_load1_noabort+0x20/0x30 [ 47.711096] ksize_uaf+0x598/0x5f8 [ 47.711125] kunit_try_run_case+0x170/0x3f0 [ 47.711159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.711192] kthread+0x328/0x630 [ 47.711222] ret_from_fork+0x10/0x20 [ 47.711257] [ 47.774102] Allocated by task 280: [ 47.777490] kasan_save_stack+0x3c/0x68 [ 47.781307] kasan_save_track+0x20/0x40 [ 47.785127] kasan_save_alloc_info+0x40/0x58 [ 47.789380] __kasan_kmalloc+0xd4/0xd8 [ 47.793113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.797626] ksize_uaf+0xb8/0x5f8 [ 47.800925] kunit_try_run_case+0x170/0x3f0 [ 47.805092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.810562] kthread+0x328/0x630 [ 47.813772] ret_from_fork+0x10/0x20 [ 47.817331] [ 47.818807] Freed by task 280: [ 47.821845] kasan_save_stack+0x3c/0x68 [ 47.825665] kasan_save_track+0x20/0x40 [ 47.829484] kasan_save_free_info+0x4c/0x78 [ 47.833649] __kasan_slab_free+0x6c/0x98 [ 47.837557] kfree+0x214/0x3c8 [ 47.840595] ksize_uaf+0x11c/0x5f8 [ 47.843980] kunit_try_run_case+0x170/0x3f0 [ 47.848147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.853615] kthread+0x328/0x630 [ 47.856829] ret_from_fork+0x10/0x20 [ 47.860386] [ 47.861863] The buggy address belongs to the object at ffff0008074f9100 [ 47.861863] which belongs to the cache kmalloc-128 of size 128 [ 47.874366] The buggy address is located 0 bytes inside of [ 47.874366] freed 128-byte region [ffff0008074f9100, ffff0008074f9180) [ 47.886427] [ 47.887906] The buggy address belongs to the physical page: [ 47.893463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 47.901445] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.909085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.916028] page_type: f5(slab) [ 47.919166] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.926885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.934611] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.942423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.950236] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 47.958048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.965853] page dumped because: kasan: bad access detected [ 47.971409] [ 47.972884] Memory state around the buggy address: [ 47.977664] ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.984867] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.992073] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.999273] ^ [ 48.002488] ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.009694] ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.016894] ==================================================================
[ 29.864269] ================================================================== [ 29.864325] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.864420] Read of size 1 at addr fff00000c636af78 by task kunit_try_catch/227 [ 29.864473] [ 29.864506] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.864590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.864617] Hardware name: linux,dummy-virt (DT) [ 29.864648] Call trace: [ 29.864669] show_stack+0x20/0x38 (C) [ 29.864971] dump_stack_lvl+0x8c/0xd0 [ 29.865076] print_report+0x118/0x5d0 [ 29.865621] kasan_report+0xdc/0x128 [ 29.865746] __asan_report_load1_noabort+0x20/0x30 [ 29.865847] ksize_uaf+0x544/0x5f8 [ 29.865890] kunit_try_run_case+0x170/0x3f0 [ 29.865938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.866204] kthread+0x328/0x630 [ 29.866396] ret_from_fork+0x10/0x20 [ 29.866463] [ 29.866483] Allocated by task 227: [ 29.866592] kasan_save_stack+0x3c/0x68 [ 29.866654] kasan_save_track+0x20/0x40 [ 29.867068] kasan_save_alloc_info+0x40/0x58 [ 29.867236] __kasan_kmalloc+0xd4/0xd8 [ 29.867277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.867320] ksize_uaf+0xb8/0x5f8 [ 29.867394] kunit_try_run_case+0x170/0x3f0 [ 29.867451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.867557] kthread+0x328/0x630 [ 29.867590] ret_from_fork+0x10/0x20 [ 29.867627] [ 29.867646] Freed by task 227: [ 29.867674] kasan_save_stack+0x3c/0x68 [ 29.867713] kasan_save_track+0x20/0x40 [ 29.867887] kasan_save_free_info+0x4c/0x78 [ 29.867937] __kasan_slab_free+0x6c/0x98 [ 29.867979] kfree+0x214/0x3c8 [ 29.868013] ksize_uaf+0x11c/0x5f8 [ 29.868059] kunit_try_run_case+0x170/0x3f0 [ 29.868098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.868140] kthread+0x328/0x630 [ 29.868179] ret_from_fork+0x10/0x20 [ 29.868680] [ 29.868704] The buggy address belongs to the object at fff00000c636af00 [ 29.868704] which belongs to the cache kmalloc-128 of size 128 [ 29.868834] The buggy address is located 120 bytes inside of [ 29.868834] freed 128-byte region [fff00000c636af00, fff00000c636af80) [ 29.869111] [ 29.869198] The buggy address belongs to the physical page: [ 29.869236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.869380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.869466] page_type: f5(slab) [ 29.869546] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.869650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.869744] page dumped because: kasan: bad access detected [ 29.869862] [ 29.869927] Memory state around the buggy address: [ 29.869968] fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.870069] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.870111] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.870148] ^ [ 29.870349] fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.870549] fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.870652] ================================================================== [ 29.847653] ================================================================== [ 29.847730] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.848058] Read of size 1 at addr fff00000c636af00 by task kunit_try_catch/227 [ 29.848126] [ 29.848749] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.848849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.848948] Hardware name: linux,dummy-virt (DT) [ 29.848985] Call trace: [ 29.849254] show_stack+0x20/0x38 (C) [ 29.849460] dump_stack_lvl+0x8c/0xd0 [ 29.849522] print_report+0x118/0x5d0 [ 29.849566] kasan_report+0xdc/0x128 [ 29.849624] __kasan_check_byte+0x54/0x70 [ 29.849670] ksize+0x30/0x88 [ 29.850134] ksize_uaf+0x168/0x5f8 [ 29.850298] kunit_try_run_case+0x170/0x3f0 [ 29.850348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.850399] kthread+0x328/0x630 [ 29.850443] ret_from_fork+0x10/0x20 [ 29.850502] [ 29.850521] Allocated by task 227: [ 29.850552] kasan_save_stack+0x3c/0x68 [ 29.850836] kasan_save_track+0x20/0x40 [ 29.851307] kasan_save_alloc_info+0x40/0x58 [ 29.851483] __kasan_kmalloc+0xd4/0xd8 [ 29.851524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.851605] ksize_uaf+0xb8/0x5f8 [ 29.851774] kunit_try_run_case+0x170/0x3f0 [ 29.851866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.851982] kthread+0x328/0x630 [ 29.852018] ret_from_fork+0x10/0x20 [ 29.852065] [ 29.852084] Freed by task 227: [ 29.852112] kasan_save_stack+0x3c/0x68 [ 29.852150] kasan_save_track+0x20/0x40 [ 29.852383] kasan_save_free_info+0x4c/0x78 [ 29.852423] __kasan_slab_free+0x6c/0x98 [ 29.852722] kfree+0x214/0x3c8 [ 29.852807] ksize_uaf+0x11c/0x5f8 [ 29.852871] kunit_try_run_case+0x170/0x3f0 [ 29.852913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.852996] kthread+0x328/0x630 [ 29.853035] ret_from_fork+0x10/0x20 [ 29.853194] [ 29.853217] The buggy address belongs to the object at fff00000c636af00 [ 29.853217] which belongs to the cache kmalloc-128 of size 128 [ 29.853300] The buggy address is located 0 bytes inside of [ 29.853300] freed 128-byte region [fff00000c636af00, fff00000c636af80) [ 29.853694] [ 29.853723] The buggy address belongs to the physical page: [ 29.853813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.853944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.854079] page_type: f5(slab) [ 29.854125] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.854215] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.854256] page dumped because: kasan: bad access detected [ 29.854287] [ 29.854307] Memory state around the buggy address: [ 29.854499] fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.854690] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.854735] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.854930] ^ [ 29.855079] fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.855179] fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.855218] ================================================================== [ 29.856553] ================================================================== [ 29.856612] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.856668] Read of size 1 at addr fff00000c636af00 by task kunit_try_catch/227 [ 29.856822] [ 29.856859] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.856951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.857090] Hardware name: linux,dummy-virt (DT) [ 29.857190] Call trace: [ 29.857212] show_stack+0x20/0x38 (C) [ 29.857438] dump_stack_lvl+0x8c/0xd0 [ 29.857485] print_report+0x118/0x5d0 [ 29.857529] kasan_report+0xdc/0x128 [ 29.857577] __asan_report_load1_noabort+0x20/0x30 [ 29.857801] ksize_uaf+0x598/0x5f8 [ 29.857851] kunit_try_run_case+0x170/0x3f0 [ 29.857988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.858036] kthread+0x328/0x630 [ 29.858087] ret_from_fork+0x10/0x20 [ 29.858135] [ 29.858152] Allocated by task 227: [ 29.858222] kasan_save_stack+0x3c/0x68 [ 29.858265] kasan_save_track+0x20/0x40 [ 29.858462] kasan_save_alloc_info+0x40/0x58 [ 29.858780] __kasan_kmalloc+0xd4/0xd8 [ 29.858961] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.859200] ksize_uaf+0xb8/0x5f8 [ 29.859323] kunit_try_run_case+0x170/0x3f0 [ 29.859417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.859459] kthread+0x328/0x630 [ 29.859493] ret_from_fork+0x10/0x20 [ 29.859530] [ 29.859551] Freed by task 227: [ 29.859578] kasan_save_stack+0x3c/0x68 [ 29.859688] kasan_save_track+0x20/0x40 [ 29.859736] kasan_save_free_info+0x4c/0x78 [ 29.859813] __kasan_slab_free+0x6c/0x98 [ 29.859850] kfree+0x214/0x3c8 [ 29.859885] ksize_uaf+0x11c/0x5f8 [ 29.860336] kunit_try_run_case+0x170/0x3f0 [ 29.860379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.860422] kthread+0x328/0x630 [ 29.860457] ret_from_fork+0x10/0x20 [ 29.860494] [ 29.860516] The buggy address belongs to the object at fff00000c636af00 [ 29.860516] which belongs to the cache kmalloc-128 of size 128 [ 29.860602] The buggy address is located 0 bytes inside of [ 29.860602] freed 128-byte region [fff00000c636af00, fff00000c636af80) [ 29.860904] [ 29.860952] The buggy address belongs to the physical page: [ 29.860993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.861067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.861117] page_type: f5(slab) [ 29.861554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.861655] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.861695] page dumped because: kasan: bad access detected [ 29.861725] [ 29.861745] Memory state around the buggy address: [ 29.861788] fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.861830] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.862023] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.862461] ^ [ 29.862541] fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.862607] fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.862645] ==================================================================
[ 24.811431] ================================================================== [ 24.811684] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 24.812042] Read of size 1 at addr ffff888105919378 by task kunit_try_catch/245 [ 24.812738] [ 24.812922] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.812988] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.813002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.813024] Call Trace: [ 24.813043] <TASK> [ 24.813062] dump_stack_lvl+0x73/0xb0 [ 24.813095] print_report+0xd1/0x610 [ 24.813273] ? __virt_addr_valid+0x1db/0x2d0 [ 24.813298] ? ksize_uaf+0x5e4/0x6c0 [ 24.813317] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.813342] ? ksize_uaf+0x5e4/0x6c0 [ 24.813362] kasan_report+0x141/0x180 [ 24.813382] ? ksize_uaf+0x5e4/0x6c0 [ 24.813406] __asan_report_load1_noabort+0x18/0x20 [ 24.813429] ksize_uaf+0x5e4/0x6c0 [ 24.813448] ? __pfx_ksize_uaf+0x10/0x10 [ 24.813470] ? __pfx_ksize_uaf+0x10/0x10 [ 24.813495] kunit_try_run_case+0x1a5/0x480 [ 24.813517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.813537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.813561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.813583] ? __kthread_parkme+0x82/0x180 [ 24.813605] ? preempt_count_sub+0x50/0x80 [ 24.813628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.813649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.813687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.813711] kthread+0x337/0x6f0 [ 24.813731] ? trace_preempt_on+0x20/0xc0 [ 24.813762] ? __pfx_kthread+0x10/0x10 [ 24.813782] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.813803] ? calculate_sigpending+0x7b/0xa0 [ 24.813827] ? __pfx_kthread+0x10/0x10 [ 24.813847] ret_from_fork+0x116/0x1d0 [ 24.813867] ? __pfx_kthread+0x10/0x10 [ 24.813887] ret_from_fork_asm+0x1a/0x30 [ 24.813917] </TASK> [ 24.813928] [ 24.822480] Allocated by task 245: [ 24.822648] kasan_save_stack+0x45/0x70 [ 24.822900] kasan_save_track+0x18/0x40 [ 24.823385] kasan_save_alloc_info+0x3b/0x50 [ 24.823559] __kasan_kmalloc+0xb7/0xc0 [ 24.823864] __kmalloc_cache_noprof+0x189/0x420 [ 24.824218] ksize_uaf+0xaa/0x6c0 [ 24.824453] kunit_try_run_case+0x1a5/0x480 [ 24.824600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.824864] kthread+0x337/0x6f0 [ 24.825098] ret_from_fork+0x116/0x1d0 [ 24.825360] ret_from_fork_asm+0x1a/0x30 [ 24.825593] [ 24.825960] Freed by task 245: [ 24.826116] kasan_save_stack+0x45/0x70 [ 24.826276] kasan_save_track+0x18/0x40 [ 24.826483] kasan_save_free_info+0x3f/0x60 [ 24.826677] __kasan_slab_free+0x56/0x70 [ 24.827198] kfree+0x222/0x3f0 [ 24.827404] ksize_uaf+0x12c/0x6c0 [ 24.827674] kunit_try_run_case+0x1a5/0x480 [ 24.827910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.828277] kthread+0x337/0x6f0 [ 24.828567] ret_from_fork+0x116/0x1d0 [ 24.828732] ret_from_fork_asm+0x1a/0x30 [ 24.829005] [ 24.829089] The buggy address belongs to the object at ffff888105919300 [ 24.829089] which belongs to the cache kmalloc-128 of size 128 [ 24.829627] The buggy address is located 120 bytes inside of [ 24.829627] freed 128-byte region [ffff888105919300, ffff888105919380) [ 24.830340] [ 24.830436] The buggy address belongs to the physical page: [ 24.830668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 24.831057] flags: 0x200000000000000(node=0|zone=2) [ 24.831423] page_type: f5(slab) [ 24.831597] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.831942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.832514] page dumped because: kasan: bad access detected [ 24.832789] [ 24.832860] Memory state around the buggy address: [ 24.833217] ffff888105919200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.833498] ffff888105919280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.833971] >ffff888105919300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.834377] ^ [ 24.834789] ffff888105919380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.835248] ffff888105919400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.835602] ================================================================== [ 24.755394] ================================================================== [ 24.755846] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 24.756357] Read of size 1 at addr ffff888105919300 by task kunit_try_catch/245 [ 24.756727] [ 24.756834] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.756888] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.756902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.756926] Call Trace: [ 24.756939] <TASK> [ 24.756959] dump_stack_lvl+0x73/0xb0 [ 24.756993] print_report+0xd1/0x610 [ 24.757016] ? __virt_addr_valid+0x1db/0x2d0 [ 24.757041] ? ksize_uaf+0x19d/0x6c0 [ 24.757060] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.757085] ? ksize_uaf+0x19d/0x6c0 [ 24.757105] kasan_report+0x141/0x180 [ 24.757126] ? ksize_uaf+0x19d/0x6c0 [ 24.757160] ? ksize_uaf+0x19d/0x6c0 [ 24.757180] __kasan_check_byte+0x3d/0x50 [ 24.757201] ksize+0x20/0x60 [ 24.757221] ksize_uaf+0x19d/0x6c0 [ 24.757241] ? __pfx_ksize_uaf+0x10/0x10 [ 24.757263] ? __pfx_ksize_uaf+0x10/0x10 [ 24.757287] kunit_try_run_case+0x1a5/0x480 [ 24.757310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.757331] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.757355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.757378] ? __kthread_parkme+0x82/0x180 [ 24.757399] ? preempt_count_sub+0x50/0x80 [ 24.757423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.757443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.757468] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.757492] kthread+0x337/0x6f0 [ 24.757511] ? trace_preempt_on+0x20/0xc0 [ 24.757535] ? __pfx_kthread+0x10/0x10 [ 24.757555] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.757576] ? calculate_sigpending+0x7b/0xa0 [ 24.757600] ? __pfx_kthread+0x10/0x10 [ 24.757621] ret_from_fork+0x116/0x1d0 [ 24.757641] ? __pfx_kthread+0x10/0x10 [ 24.757672] ret_from_fork_asm+0x1a/0x30 [ 24.757703] </TASK> [ 24.757714] [ 24.766980] Allocated by task 245: [ 24.767132] kasan_save_stack+0x45/0x70 [ 24.767290] kasan_save_track+0x18/0x40 [ 24.767418] kasan_save_alloc_info+0x3b/0x50 [ 24.767559] __kasan_kmalloc+0xb7/0xc0 [ 24.769368] __kmalloc_cache_noprof+0x189/0x420 [ 24.770710] ksize_uaf+0xaa/0x6c0 [ 24.771256] kunit_try_run_case+0x1a5/0x480 [ 24.772154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.773199] kthread+0x337/0x6f0 [ 24.774697] ret_from_fork+0x116/0x1d0 [ 24.774954] ret_from_fork_asm+0x1a/0x30 [ 24.775131] [ 24.775233] Freed by task 245: [ 24.775379] kasan_save_stack+0x45/0x70 [ 24.775552] kasan_save_track+0x18/0x40 [ 24.775725] kasan_save_free_info+0x3f/0x60 [ 24.775923] __kasan_slab_free+0x56/0x70 [ 24.776170] kfree+0x222/0x3f0 [ 24.776287] ksize_uaf+0x12c/0x6c0 [ 24.776451] kunit_try_run_case+0x1a5/0x480 [ 24.776646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.776889] kthread+0x337/0x6f0 [ 24.777081] ret_from_fork+0x116/0x1d0 [ 24.777518] ret_from_fork_asm+0x1a/0x30 [ 24.777748] [ 24.778060] The buggy address belongs to the object at ffff888105919300 [ 24.778060] which belongs to the cache kmalloc-128 of size 128 [ 24.778541] The buggy address is located 0 bytes inside of [ 24.778541] freed 128-byte region [ffff888105919300, ffff888105919380) [ 24.779613] [ 24.779895] The buggy address belongs to the physical page: [ 24.780186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 24.780615] flags: 0x200000000000000(node=0|zone=2) [ 24.781283] page_type: f5(slab) [ 24.781423] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.781759] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.782163] page dumped because: kasan: bad access detected [ 24.782391] [ 24.782458] Memory state around the buggy address: [ 24.782648] ffff888105919200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.783341] ffff888105919280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.783581] >ffff888105919300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.784187] ^ [ 24.784506] ffff888105919380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.784957] ffff888105919400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.785713] ================================================================== [ 24.786618] ================================================================== [ 24.787129] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 24.787419] Read of size 1 at addr ffff888105919300 by task kunit_try_catch/245 [ 24.787720] [ 24.788086] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.788143] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.788262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.788287] Call Trace: [ 24.788307] <TASK> [ 24.788327] dump_stack_lvl+0x73/0xb0 [ 24.788359] print_report+0xd1/0x610 [ 24.788381] ? __virt_addr_valid+0x1db/0x2d0 [ 24.788404] ? ksize_uaf+0x5fe/0x6c0 [ 24.788423] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.788448] ? ksize_uaf+0x5fe/0x6c0 [ 24.788560] kasan_report+0x141/0x180 [ 24.788585] ? ksize_uaf+0x5fe/0x6c0 [ 24.788608] __asan_report_load1_noabort+0x18/0x20 [ 24.788631] ksize_uaf+0x5fe/0x6c0 [ 24.788652] ? __pfx_ksize_uaf+0x10/0x10 [ 24.788685] ? __pfx_ksize_uaf+0x10/0x10 [ 24.788709] kunit_try_run_case+0x1a5/0x480 [ 24.788731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.788766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.788790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.788812] ? __kthread_parkme+0x82/0x180 [ 24.788833] ? preempt_count_sub+0x50/0x80 [ 24.788855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.788876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.788900] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.788924] kthread+0x337/0x6f0 [ 24.788955] ? trace_preempt_on+0x20/0xc0 [ 24.788978] ? __pfx_kthread+0x10/0x10 [ 24.788998] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.789019] ? calculate_sigpending+0x7b/0xa0 [ 24.789042] ? __pfx_kthread+0x10/0x10 [ 24.789063] ret_from_fork+0x116/0x1d0 [ 24.789082] ? __pfx_kthread+0x10/0x10 [ 24.789101] ret_from_fork_asm+0x1a/0x30 [ 24.789132] </TASK> [ 24.789143] [ 24.797691] Allocated by task 245: [ 24.797863] kasan_save_stack+0x45/0x70 [ 24.798237] kasan_save_track+0x18/0x40 [ 24.798497] kasan_save_alloc_info+0x3b/0x50 [ 24.798717] __kasan_kmalloc+0xb7/0xc0 [ 24.798925] __kmalloc_cache_noprof+0x189/0x420 [ 24.799133] ksize_uaf+0xaa/0x6c0 [ 24.799627] kunit_try_run_case+0x1a5/0x480 [ 24.799847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.800260] kthread+0x337/0x6f0 [ 24.800423] ret_from_fork+0x116/0x1d0 [ 24.800566] ret_from_fork_asm+0x1a/0x30 [ 24.800796] [ 24.801052] Freed by task 245: [ 24.801347] kasan_save_stack+0x45/0x70 [ 24.801510] kasan_save_track+0x18/0x40 [ 24.801771] kasan_save_free_info+0x3f/0x60 [ 24.802094] __kasan_slab_free+0x56/0x70 [ 24.802394] kfree+0x222/0x3f0 [ 24.802544] ksize_uaf+0x12c/0x6c0 [ 24.802723] kunit_try_run_case+0x1a5/0x480 [ 24.803124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.803522] kthread+0x337/0x6f0 [ 24.803677] ret_from_fork+0x116/0x1d0 [ 24.803860] ret_from_fork_asm+0x1a/0x30 [ 24.804096] [ 24.804191] The buggy address belongs to the object at ffff888105919300 [ 24.804191] which belongs to the cache kmalloc-128 of size 128 [ 24.804985] The buggy address is located 0 bytes inside of [ 24.804985] freed 128-byte region [ffff888105919300, ffff888105919380) [ 24.805600] [ 24.805771] The buggy address belongs to the physical page: [ 24.806179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 24.806624] flags: 0x200000000000000(node=0|zone=2) [ 24.806869] page_type: f5(slab) [ 24.807200] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.807492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.807810] page dumped because: kasan: bad access detected [ 24.808176] [ 24.808247] Memory state around the buggy address: [ 24.808467] ffff888105919200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.808771] ffff888105919280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.809349] >ffff888105919300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.809848] ^ [ 24.810000] ffff888105919380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.810468] ffff888105919400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.810829] ==================================================================