Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 48.595577] ================================================================== [ 48.605627] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 48.611962] Read of size 1 at addr ffff00080244dc00 by task kunit_try_catch/277 [ 48.619250] [ 48.620736] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.620790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.620806] Hardware name: WinLink E850-96 board (DT) [ 48.620826] Call trace: [ 48.620842] show_stack+0x20/0x38 (C) [ 48.620875] dump_stack_lvl+0x8c/0xd0 [ 48.620911] print_report+0x118/0x5d0 [ 48.620941] kasan_report+0xdc/0x128 [ 48.620967] __kasan_check_byte+0x54/0x70 [ 48.620995] ksize+0x30/0x88 [ 48.621030] ksize_uaf+0x168/0x5f8 [ 48.621058] kunit_try_run_case+0x170/0x3f0 [ 48.621087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.621122] kthread+0x328/0x630 [ 48.621151] ret_from_fork+0x10/0x20 [ 48.621182] [ 48.686091] Allocated by task 277: [ 48.689478] kasan_save_stack+0x3c/0x68 [ 48.693294] kasan_save_track+0x20/0x40 [ 48.697113] kasan_save_alloc_info+0x40/0x58 [ 48.701367] __kasan_kmalloc+0xd4/0xd8 [ 48.705099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.709613] ksize_uaf+0xb8/0x5f8 [ 48.712912] kunit_try_run_case+0x170/0x3f0 [ 48.717078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.722548] kthread+0x328/0x630 [ 48.725759] ret_from_fork+0x10/0x20 [ 48.729318] [ 48.730793] Freed by task 277: [ 48.733833] kasan_save_stack+0x3c/0x68 [ 48.737651] kasan_save_track+0x20/0x40 [ 48.741470] kasan_save_free_info+0x4c/0x78 [ 48.745637] __kasan_slab_free+0x6c/0x98 [ 48.749543] kfree+0x214/0x3c8 [ 48.752581] ksize_uaf+0x11c/0x5f8 [ 48.755967] kunit_try_run_case+0x170/0x3f0 [ 48.760133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.765602] kthread+0x328/0x630 [ 48.768814] ret_from_fork+0x10/0x20 [ 48.772373] [ 48.773850] The buggy address belongs to the object at ffff00080244dc00 [ 48.773850] which belongs to the cache kmalloc-128 of size 128 [ 48.786348] The buggy address is located 0 bytes inside of [ 48.786348] freed 128-byte region [ffff00080244dc00, ffff00080244dc80) [ 48.798414] [ 48.799894] The buggy address belongs to the physical page: [ 48.805449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 48.813433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.821073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.828016] page_type: f5(slab) [ 48.831153] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.838872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.846599] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.854410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.862222] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 48.870034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.877842] page dumped because: kasan: bad access detected [ 48.883395] [ 48.884871] Memory state around the buggy address: [ 48.889654] ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.896855] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.904058] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.911259] ^ [ 48.914475] ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.921679] ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.928882] ================================================================== [ 49.271892] ================================================================== [ 49.278880] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 49.285215] Read of size 1 at addr ffff00080244dc78 by task kunit_try_catch/277 [ 49.292504] [ 49.293989] CPU: 6 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 49.294042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.294057] Hardware name: WinLink E850-96 board (DT) [ 49.294081] Call trace: [ 49.294095] show_stack+0x20/0x38 (C) [ 49.294128] dump_stack_lvl+0x8c/0xd0 [ 49.294165] print_report+0x118/0x5d0 [ 49.294193] kasan_report+0xdc/0x128 [ 49.294220] __asan_report_load1_noabort+0x20/0x30 [ 49.294254] ksize_uaf+0x544/0x5f8 [ 49.294283] kunit_try_run_case+0x170/0x3f0 [ 49.294316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.294351] kthread+0x328/0x630 [ 49.294378] ret_from_fork+0x10/0x20 [ 49.294410] [ 49.357261] Allocated by task 277: [ 49.360648] kasan_save_stack+0x3c/0x68 [ 49.364464] kasan_save_track+0x20/0x40 [ 49.368284] kasan_save_alloc_info+0x40/0x58 [ 49.372537] __kasan_kmalloc+0xd4/0xd8 [ 49.376269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.380784] ksize_uaf+0xb8/0x5f8 [ 49.384082] kunit_try_run_case+0x170/0x3f0 [ 49.388249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.393718] kthread+0x328/0x630 [ 49.396930] ret_from_fork+0x10/0x20 [ 49.400488] [ 49.401964] Freed by task 277: [ 49.405002] kasan_save_stack+0x3c/0x68 [ 49.408822] kasan_save_track+0x20/0x40 [ 49.412641] kasan_save_free_info+0x4c/0x78 [ 49.416808] __kasan_slab_free+0x6c/0x98 [ 49.420714] kfree+0x214/0x3c8 [ 49.423752] ksize_uaf+0x11c/0x5f8 [ 49.427137] kunit_try_run_case+0x170/0x3f0 [ 49.431304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.436772] kthread+0x328/0x630 [ 49.439984] ret_from_fork+0x10/0x20 [ 49.443543] [ 49.445019] The buggy address belongs to the object at ffff00080244dc00 [ 49.445019] which belongs to the cache kmalloc-128 of size 128 [ 49.457520] The buggy address is located 120 bytes inside of [ 49.457520] freed 128-byte region [ffff00080244dc00, ffff00080244dc80) [ 49.469758] [ 49.471236] The buggy address belongs to the physical page: [ 49.476795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 49.484778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.492416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.499359] page_type: f5(slab) [ 49.502494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.510215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.517942] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.525753] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.533566] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 49.541378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.549184] page dumped because: kasan: bad access detected [ 49.554739] [ 49.556215] Memory state around the buggy address: [ 49.560994] ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.568198] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.575404] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.582604] ^ [ 49.589725] ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.596930] ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.604131] ================================================================== [ 48.936266] ================================================================== [ 48.943294] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 48.949629] Read of size 1 at addr ffff00080244dc00 by task kunit_try_catch/277 [ 48.956918] [ 48.958403] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.958456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.958473] Hardware name: WinLink E850-96 board (DT) [ 48.958493] Call trace: [ 48.958507] show_stack+0x20/0x38 (C) [ 48.958538] dump_stack_lvl+0x8c/0xd0 [ 48.958572] print_report+0x118/0x5d0 [ 48.958599] kasan_report+0xdc/0x128 [ 48.958626] __asan_report_load1_noabort+0x20/0x30 [ 48.958657] ksize_uaf+0x598/0x5f8 [ 48.958687] kunit_try_run_case+0x170/0x3f0 [ 48.958717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.958753] kthread+0x328/0x630 [ 48.958779] ret_from_fork+0x10/0x20 [ 48.958807] [ 49.021674] Allocated by task 277: [ 49.025061] kasan_save_stack+0x3c/0x68 [ 49.028879] kasan_save_track+0x20/0x40 [ 49.032698] kasan_save_alloc_info+0x40/0x58 [ 49.036952] __kasan_kmalloc+0xd4/0xd8 [ 49.040684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.045199] ksize_uaf+0xb8/0x5f8 [ 49.048497] kunit_try_run_case+0x170/0x3f0 [ 49.052663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.058134] kthread+0x328/0x630 [ 49.061344] ret_from_fork+0x10/0x20 [ 49.064903] [ 49.066379] Freed by task 277: [ 49.069417] kasan_save_stack+0x3c/0x68 [ 49.073236] kasan_save_track+0x20/0x40 [ 49.077055] kasan_save_free_info+0x4c/0x78 [ 49.081222] __kasan_slab_free+0x6c/0x98 [ 49.085128] kfree+0x214/0x3c8 [ 49.088167] ksize_uaf+0x11c/0x5f8 [ 49.091552] kunit_try_run_case+0x170/0x3f0 [ 49.095718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.101187] kthread+0x328/0x630 [ 49.104399] ret_from_fork+0x10/0x20 [ 49.107958] [ 49.109433] The buggy address belongs to the object at ffff00080244dc00 [ 49.109433] which belongs to the cache kmalloc-128 of size 128 [ 49.121934] The buggy address is located 0 bytes inside of [ 49.121934] freed 128-byte region [ffff00080244dc00, ffff00080244dc80) [ 49.133999] [ 49.135477] The buggy address belongs to the physical page: [ 49.141035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 49.149018] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.156658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.163600] page_type: f5(slab) [ 49.166735] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.174457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.182183] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.189994] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.197808] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 49.205620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.213425] page dumped because: kasan: bad access detected [ 49.218981] [ 49.220456] Memory state around the buggy address: [ 49.225237] ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.232439] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.239643] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.246845] ^ [ 49.250060] ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.257265] ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.264468] ==================================================================
[ 30.882819] ================================================================== [ 30.882870] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.882919] Read of size 1 at addr fff00000c64f4d78 by task kunit_try_catch/228 [ 30.883417] [ 30.883479] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.883832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.883860] Hardware name: linux,dummy-virt (DT) [ 30.883890] Call trace: [ 30.884317] show_stack+0x20/0x38 (C) [ 30.884526] dump_stack_lvl+0x8c/0xd0 [ 30.884611] print_report+0x118/0x5d0 [ 30.884996] kasan_report+0xdc/0x128 [ 30.885047] __asan_report_load1_noabort+0x20/0x30 [ 30.885458] ksize_uaf+0x544/0x5f8 [ 30.885605] kunit_try_run_case+0x170/0x3f0 [ 30.885800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.885922] kthread+0x328/0x630 [ 30.885967] ret_from_fork+0x10/0x20 [ 30.886014] [ 30.886034] Allocated by task 228: [ 30.886563] kasan_save_stack+0x3c/0x68 [ 30.886669] kasan_save_track+0x20/0x40 [ 30.886710] kasan_save_alloc_info+0x40/0x58 [ 30.886754] __kasan_kmalloc+0xd4/0xd8 [ 30.886998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.887322] ksize_uaf+0xb8/0x5f8 [ 30.887544] kunit_try_run_case+0x170/0x3f0 [ 30.887604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.887689] kthread+0x328/0x630 [ 30.888047] ret_from_fork+0x10/0x20 [ 30.888218] [ 30.888243] Freed by task 228: [ 30.888270] kasan_save_stack+0x3c/0x68 [ 30.888311] kasan_save_track+0x20/0x40 [ 30.888788] kasan_save_free_info+0x4c/0x78 [ 30.888952] __kasan_slab_free+0x6c/0x98 [ 30.889275] kfree+0x214/0x3c8 [ 30.889317] ksize_uaf+0x11c/0x5f8 [ 30.889353] kunit_try_run_case+0x170/0x3f0 [ 30.889390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.889433] kthread+0x328/0x630 [ 30.889475] ret_from_fork+0x10/0x20 [ 30.889513] [ 30.889535] The buggy address belongs to the object at fff00000c64f4d00 [ 30.889535] which belongs to the cache kmalloc-128 of size 128 [ 30.889593] The buggy address is located 120 bytes inside of [ 30.889593] freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80) [ 30.890124] [ 30.890149] The buggy address belongs to the physical page: [ 30.890421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.890496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.891061] page_type: f5(slab) [ 30.891103] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.891156] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.891197] page dumped because: kasan: bad access detected [ 30.891659] [ 30.891685] Memory state around the buggy address: [ 30.891929] fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.892131] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892299] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.892339] ^ [ 30.892380] fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892422] fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892473] ================================================================== [ 30.869388] ================================================================== [ 30.870007] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.870071] Read of size 1 at addr fff00000c64f4d00 by task kunit_try_catch/228 [ 30.870488] [ 30.870526] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.870875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.870919] Hardware name: linux,dummy-virt (DT) [ 30.871131] Call trace: [ 30.871353] show_stack+0x20/0x38 (C) [ 30.871632] dump_stack_lvl+0x8c/0xd0 [ 30.871827] print_report+0x118/0x5d0 [ 30.871909] kasan_report+0xdc/0x128 [ 30.872041] __asan_report_load1_noabort+0x20/0x30 [ 30.872281] ksize_uaf+0x598/0x5f8 [ 30.872511] kunit_try_run_case+0x170/0x3f0 [ 30.872567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.872942] kthread+0x328/0x630 [ 30.872988] ret_from_fork+0x10/0x20 [ 30.873044] [ 30.873251] Allocated by task 228: [ 30.873367] kasan_save_stack+0x3c/0x68 [ 30.873566] kasan_save_track+0x20/0x40 [ 30.873606] kasan_save_alloc_info+0x40/0x58 [ 30.873653] __kasan_kmalloc+0xd4/0xd8 [ 30.873693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.873734] ksize_uaf+0xb8/0x5f8 [ 30.874410] kunit_try_run_case+0x170/0x3f0 [ 30.874531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.874576] kthread+0x328/0x630 [ 30.874873] ret_from_fork+0x10/0x20 [ 30.875551] [ 30.875591] Freed by task 228: [ 30.875760] kasan_save_stack+0x3c/0x68 [ 30.875806] kasan_save_track+0x20/0x40 [ 30.876026] kasan_save_free_info+0x4c/0x78 [ 30.876081] __kasan_slab_free+0x6c/0x98 [ 30.876665] kfree+0x214/0x3c8 [ 30.876771] ksize_uaf+0x11c/0x5f8 [ 30.877201] kunit_try_run_case+0x170/0x3f0 [ 30.877241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.877288] kthread+0x328/0x630 [ 30.877321] ret_from_fork+0x10/0x20 [ 30.877359] [ 30.877381] The buggy address belongs to the object at fff00000c64f4d00 [ 30.877381] which belongs to the cache kmalloc-128 of size 128 [ 30.878183] The buggy address is located 0 bytes inside of [ 30.878183] freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80) [ 30.878543] [ 30.878593] The buggy address belongs to the physical page: [ 30.878849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.878903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.879112] page_type: f5(slab) [ 30.879411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.879736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.879778] page dumped because: kasan: bad access detected [ 30.879810] [ 30.879828] Memory state around the buggy address: [ 30.880123] fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.880341] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880418] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.880465] ^ [ 30.880494] fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880536] fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880574] ================================================================== [ 30.855683] ================================================================== [ 30.855786] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.855858] Read of size 1 at addr fff00000c64f4d00 by task kunit_try_catch/228 [ 30.855910] [ 30.855950] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.856038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.856471] Hardware name: linux,dummy-virt (DT) [ 30.856562] Call trace: [ 30.856773] show_stack+0x20/0x38 (C) [ 30.857391] dump_stack_lvl+0x8c/0xd0 [ 30.857533] print_report+0x118/0x5d0 [ 30.857580] kasan_report+0xdc/0x128 [ 30.857809] __kasan_check_byte+0x54/0x70 [ 30.858105] ksize+0x30/0x88 [ 30.858190] ksize_uaf+0x168/0x5f8 [ 30.858237] kunit_try_run_case+0x170/0x3f0 [ 30.858283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.859136] kthread+0x328/0x630 [ 30.859253] ret_from_fork+0x10/0x20 [ 30.859742] [ 30.859913] Allocated by task 228: [ 30.859947] kasan_save_stack+0x3c/0x68 [ 30.860026] kasan_save_track+0x20/0x40 [ 30.860067] kasan_save_alloc_info+0x40/0x58 [ 30.860483] __kasan_kmalloc+0xd4/0xd8 [ 30.860685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.861097] ksize_uaf+0xb8/0x5f8 [ 30.861220] kunit_try_run_case+0x170/0x3f0 [ 30.861261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.861696] kthread+0x328/0x630 [ 30.861734] ret_from_fork+0x10/0x20 [ 30.861801] [ 30.861825] Freed by task 228: [ 30.862078] kasan_save_stack+0x3c/0x68 [ 30.862174] kasan_save_track+0x20/0x40 [ 30.862223] kasan_save_free_info+0x4c/0x78 [ 30.862307] __kasan_slab_free+0x6c/0x98 [ 30.862348] kfree+0x214/0x3c8 [ 30.862383] ksize_uaf+0x11c/0x5f8 [ 30.862764] kunit_try_run_case+0x170/0x3f0 [ 30.862992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.863086] kthread+0x328/0x630 [ 30.863365] ret_from_fork+0x10/0x20 [ 30.863555] [ 30.863744] The buggy address belongs to the object at fff00000c64f4d00 [ 30.863744] which belongs to the cache kmalloc-128 of size 128 [ 30.863858] The buggy address is located 0 bytes inside of [ 30.863858] freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80) [ 30.863919] [ 30.864469] The buggy address belongs to the physical page: [ 30.864689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.864837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.865084] page_type: f5(slab) [ 30.865133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.865587] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.865647] page dumped because: kasan: bad access detected [ 30.866213] [ 30.866236] Memory state around the buggy address: [ 30.866271] fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.866399] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866725] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.866970] ^ [ 30.867130] fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.867568] fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.867627] ==================================================================
[ 24.539128] ================================================================== [ 24.539686] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 24.540026] Read of size 1 at addr ffff8881041b9a00 by task kunit_try_catch/244 [ 24.540336] [ 24.540425] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 24.540474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.540488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.540509] Call Trace: [ 24.540535] <TASK> [ 24.540551] dump_stack_lvl+0x73/0xb0 [ 24.540629] print_report+0xd1/0x610 [ 24.540661] ? __virt_addr_valid+0x1db/0x2d0 [ 24.540688] ? ksize_uaf+0x5fe/0x6c0 [ 24.540713] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.540744] ? ksize_uaf+0x5fe/0x6c0 [ 24.540770] kasan_report+0x141/0x180 [ 24.540797] ? ksize_uaf+0x5fe/0x6c0 [ 24.540829] __asan_report_load1_noabort+0x18/0x20 [ 24.540858] ksize_uaf+0x5fe/0x6c0 [ 24.540883] ? __pfx_ksize_uaf+0x10/0x10 [ 24.540910] ? __schedule+0x10cc/0x2b60 [ 24.540936] ? __pfx_read_tsc+0x10/0x10 [ 24.540962] ? ktime_get_ts64+0x86/0x230 [ 24.541009] kunit_try_run_case+0x1a5/0x480 [ 24.541037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.541063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.541090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.541117] ? __kthread_parkme+0x82/0x180 [ 24.541142] ? preempt_count_sub+0x50/0x80 [ 24.541172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.541201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.541232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.541263] kthread+0x337/0x6f0 [ 24.541287] ? trace_preempt_on+0x20/0xc0 [ 24.541315] ? __pfx_kthread+0x10/0x10 [ 24.541340] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.541369] ? calculate_sigpending+0x7b/0xa0 [ 24.541398] ? __pfx_kthread+0x10/0x10 [ 24.541425] ret_from_fork+0x116/0x1d0 [ 24.541448] ? __pfx_kthread+0x10/0x10 [ 24.541475] ret_from_fork_asm+0x1a/0x30 [ 24.541516] </TASK> [ 24.541539] [ 24.551694] Allocated by task 244: [ 24.551825] kasan_save_stack+0x45/0x70 [ 24.552030] kasan_save_track+0x18/0x40 [ 24.552220] kasan_save_alloc_info+0x3b/0x50 [ 24.552411] __kasan_kmalloc+0xb7/0xc0 [ 24.552592] __kmalloc_cache_noprof+0x189/0x420 [ 24.552946] ksize_uaf+0xaa/0x6c0 [ 24.553075] kunit_try_run_case+0x1a5/0x480 [ 24.553223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.553481] kthread+0x337/0x6f0 [ 24.553665] ret_from_fork+0x116/0x1d0 [ 24.553852] ret_from_fork_asm+0x1a/0x30 [ 24.553992] [ 24.554061] Freed by task 244: [ 24.554284] kasan_save_stack+0x45/0x70 [ 24.554568] kasan_save_track+0x18/0x40 [ 24.554825] kasan_save_free_info+0x3f/0x60 [ 24.555015] __kasan_slab_free+0x56/0x70 [ 24.555200] kfree+0x222/0x3f0 [ 24.555368] ksize_uaf+0x12c/0x6c0 [ 24.555534] kunit_try_run_case+0x1a5/0x480 [ 24.555835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.556051] kthread+0x337/0x6f0 [ 24.556214] ret_from_fork+0x116/0x1d0 [ 24.556394] ret_from_fork_asm+0x1a/0x30 [ 24.556611] [ 24.556685] The buggy address belongs to the object at ffff8881041b9a00 [ 24.556685] which belongs to the cache kmalloc-128 of size 128 [ 24.557171] The buggy address is located 0 bytes inside of [ 24.557171] freed 128-byte region [ffff8881041b9a00, ffff8881041b9a80) [ 24.557807] [ 24.557911] The buggy address belongs to the physical page: [ 24.558131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9 [ 24.558442] flags: 0x200000000000000(node=0|zone=2) [ 24.558698] page_type: f5(slab) [ 24.558858] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.559247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.559471] page dumped because: kasan: bad access detected [ 24.559881] [ 24.560036] Memory state around the buggy address: [ 24.560263] ffff8881041b9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.560557] ffff8881041b9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.560905] >ffff8881041b9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.561185] ^ [ 24.561318] ffff8881041b9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.561566] ffff8881041b9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.561892] ================================================================== [ 24.562647] ================================================================== [ 24.563024] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 24.563290] Read of size 1 at addr ffff8881041b9a78 by task kunit_try_catch/244 [ 24.563580] [ 24.563705] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 24.563755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.563768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.563790] Call Trace: [ 24.563804] <TASK> [ 24.563820] dump_stack_lvl+0x73/0xb0 [ 24.563854] print_report+0xd1/0x610 [ 24.563881] ? __virt_addr_valid+0x1db/0x2d0 [ 24.563909] ? ksize_uaf+0x5e4/0x6c0 [ 24.563934] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.563965] ? ksize_uaf+0x5e4/0x6c0 [ 24.563990] kasan_report+0x141/0x180 [ 24.564017] ? ksize_uaf+0x5e4/0x6c0 [ 24.564049] __asan_report_load1_noabort+0x18/0x20 [ 24.564078] ksize_uaf+0x5e4/0x6c0 [ 24.564103] ? __pfx_ksize_uaf+0x10/0x10 [ 24.564129] ? __schedule+0x10cc/0x2b60 [ 24.564155] ? __pfx_read_tsc+0x10/0x10 [ 24.564180] ? ktime_get_ts64+0x86/0x230 [ 24.564210] kunit_try_run_case+0x1a5/0x480 [ 24.564238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.564264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.564291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.564318] ? __kthread_parkme+0x82/0x180 [ 24.564342] ? preempt_count_sub+0x50/0x80 [ 24.564372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.564399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.564430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.564460] kthread+0x337/0x6f0 [ 24.564484] ? trace_preempt_on+0x20/0xc0 [ 24.564512] ? __pfx_kthread+0x10/0x10 [ 24.564549] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.564579] ? calculate_sigpending+0x7b/0xa0 [ 24.564607] ? __pfx_kthread+0x10/0x10 [ 24.564634] ret_from_fork+0x116/0x1d0 [ 24.564657] ? __pfx_kthread+0x10/0x10 [ 24.564683] ret_from_fork_asm+0x1a/0x30 [ 24.564786] </TASK> [ 24.564800] [ 24.571838] Allocated by task 244: [ 24.571976] kasan_save_stack+0x45/0x70 [ 24.572280] kasan_save_track+0x18/0x40 [ 24.572485] kasan_save_alloc_info+0x3b/0x50 [ 24.572799] __kasan_kmalloc+0xb7/0xc0 [ 24.573035] __kmalloc_cache_noprof+0x189/0x420 [ 24.573389] ksize_uaf+0xaa/0x6c0 [ 24.573589] kunit_try_run_case+0x1a5/0x480 [ 24.573793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.574305] kthread+0x337/0x6f0 [ 24.574517] ret_from_fork+0x116/0x1d0 [ 24.574787] ret_from_fork_asm+0x1a/0x30 [ 24.574930] [ 24.574997] Freed by task 244: [ 24.575104] kasan_save_stack+0x45/0x70 [ 24.575248] kasan_save_track+0x18/0x40 [ 24.575440] kasan_save_free_info+0x3f/0x60 [ 24.575703] __kasan_slab_free+0x56/0x70 [ 24.575901] kfree+0x222/0x3f0 [ 24.576066] ksize_uaf+0x12c/0x6c0 [ 24.576244] kunit_try_run_case+0x1a5/0x480 [ 24.576452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.576812] kthread+0x337/0x6f0 [ 24.577030] ret_from_fork+0x116/0x1d0 [ 24.577223] ret_from_fork_asm+0x1a/0x30 [ 24.577434] [ 24.577501] The buggy address belongs to the object at ffff8881041b9a00 [ 24.577501] which belongs to the cache kmalloc-128 of size 128 [ 24.577864] The buggy address is located 120 bytes inside of [ 24.577864] freed 128-byte region [ffff8881041b9a00, ffff8881041b9a80) [ 24.578286] [ 24.578377] The buggy address belongs to the physical page: [ 24.578663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9 [ 24.579317] flags: 0x200000000000000(node=0|zone=2) [ 24.579808] page_type: f5(slab) [ 24.580084] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.580427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.580657] page dumped because: kasan: bad access detected [ 24.580820] [ 24.580886] Memory state around the buggy address: [ 24.581187] ffff8881041b9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.581913] ffff8881041b9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.582280] >ffff8881041b9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.582646] ^ [ 24.583113] ffff8881041b9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.583411] ffff8881041b9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.583909] ================================================================== [ 24.509892] ================================================================== [ 24.510309] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 24.510745] Read of size 1 at addr ffff8881041b9a00 by task kunit_try_catch/244 [ 24.511109] [ 24.511195] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 24.511249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.511264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.511286] Call Trace: [ 24.511300] <TASK> [ 24.511316] dump_stack_lvl+0x73/0xb0 [ 24.511351] print_report+0xd1/0x610 [ 24.511381] ? __virt_addr_valid+0x1db/0x2d0 [ 24.511411] ? ksize_uaf+0x19d/0x6c0 [ 24.511436] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.511467] ? ksize_uaf+0x19d/0x6c0 [ 24.511493] kasan_report+0x141/0x180 [ 24.511535] ? ksize_uaf+0x19d/0x6c0 [ 24.511565] ? ksize_uaf+0x19d/0x6c0 [ 24.511591] __kasan_check_byte+0x3d/0x50 [ 24.511619] ksize+0x20/0x60 [ 24.511710] ksize_uaf+0x19d/0x6c0 [ 24.511736] ? __pfx_ksize_uaf+0x10/0x10 [ 24.511763] ? __schedule+0x10cc/0x2b60 [ 24.511790] ? __pfx_read_tsc+0x10/0x10 [ 24.511817] ? ktime_get_ts64+0x86/0x230 [ 24.511848] kunit_try_run_case+0x1a5/0x480 [ 24.511877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.511904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.511930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.511958] ? __kthread_parkme+0x82/0x180 [ 24.511983] ? preempt_count_sub+0x50/0x80 [ 24.512013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.512041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.512071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.512102] kthread+0x337/0x6f0 [ 24.512127] ? trace_preempt_on+0x20/0xc0 [ 24.512155] ? __pfx_kthread+0x10/0x10 [ 24.512181] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.512210] ? calculate_sigpending+0x7b/0xa0 [ 24.512238] ? __pfx_kthread+0x10/0x10 [ 24.512265] ret_from_fork+0x116/0x1d0 [ 24.512289] ? __pfx_kthread+0x10/0x10 [ 24.512315] ret_from_fork_asm+0x1a/0x30 [ 24.512354] </TASK> [ 24.512367] [ 24.521246] Allocated by task 244: [ 24.521377] kasan_save_stack+0x45/0x70 [ 24.522006] kasan_save_track+0x18/0x40 [ 24.522571] kasan_save_alloc_info+0x3b/0x50 [ 24.523235] __kasan_kmalloc+0xb7/0xc0 [ 24.523846] __kmalloc_cache_noprof+0x189/0x420 [ 24.524494] ksize_uaf+0xaa/0x6c0 [ 24.525047] kunit_try_run_case+0x1a5/0x480 [ 24.525632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.525972] kthread+0x337/0x6f0 [ 24.526309] ret_from_fork+0x116/0x1d0 [ 24.526471] ret_from_fork_asm+0x1a/0x30 [ 24.526910] [ 24.527008] Freed by task 244: [ 24.527121] kasan_save_stack+0x45/0x70 [ 24.527319] kasan_save_track+0x18/0x40 [ 24.527838] kasan_save_free_info+0x3f/0x60 [ 24.528033] __kasan_slab_free+0x56/0x70 [ 24.528305] kfree+0x222/0x3f0 [ 24.528470] ksize_uaf+0x12c/0x6c0 [ 24.528880] kunit_try_run_case+0x1a5/0x480 [ 24.529093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.529482] kthread+0x337/0x6f0 [ 24.529773] ret_from_fork+0x116/0x1d0 [ 24.530225] ret_from_fork_asm+0x1a/0x30 [ 24.530494] [ 24.530623] The buggy address belongs to the object at ffff8881041b9a00 [ 24.530623] which belongs to the cache kmalloc-128 of size 128 [ 24.531133] The buggy address is located 0 bytes inside of [ 24.531133] freed 128-byte region [ffff8881041b9a00, ffff8881041b9a80) [ 24.532022] [ 24.532129] The buggy address belongs to the physical page: [ 24.532468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b9 [ 24.533081] flags: 0x200000000000000(node=0|zone=2) [ 24.533423] page_type: f5(slab) [ 24.533572] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 24.534079] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.534404] page dumped because: kasan: bad access detected [ 24.534821] [ 24.534903] Memory state around the buggy address: [ 24.535098] ffff8881041b9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.535400] ffff8881041b9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.535724] >ffff8881041b9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.536124] ^ [ 24.536311] ffff8881041b9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.536574] ffff8881041b9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.536915] ==================================================================