Date
July 16, 2025, 12:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.827164] ================================================================== [ 30.827222] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.827274] Read of size 1 at addr fff00000c6361f00 by task kunit_try_catch/227 [ 30.827325] [ 30.827364] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.827464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.827493] Hardware name: linux,dummy-virt (DT) [ 30.827910] Call trace: [ 30.828251] show_stack+0x20/0x38 (C) [ 30.828308] dump_stack_lvl+0x8c/0xd0 [ 30.828376] print_report+0x118/0x5d0 [ 30.828579] kasan_report+0xdc/0x128 [ 30.828686] __kasan_check_byte+0x54/0x70 [ 30.828791] ksize+0x30/0x88 [ 30.828875] ksize_uaf+0x168/0x5f8 [ 30.829098] kunit_try_run_case+0x170/0x3f0 [ 30.829236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.829360] kthread+0x328/0x630 [ 30.829500] ret_from_fork+0x10/0x20 [ 30.829696] [ 30.829787] Allocated by task 227: [ 30.829911] kasan_save_stack+0x3c/0x68 [ 30.830000] kasan_save_track+0x20/0x40 [ 30.830146] kasan_save_alloc_info+0x40/0x58 [ 30.830212] __kasan_kmalloc+0xd4/0xd8 [ 30.830360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.830607] ksize_uaf+0xb8/0x5f8 [ 30.830687] kunit_try_run_case+0x170/0x3f0 [ 30.830823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.830901] kthread+0x328/0x630 [ 30.830933] ret_from_fork+0x10/0x20 [ 30.831119] [ 30.831204] Freed by task 227: [ 30.831466] kasan_save_stack+0x3c/0x68 [ 30.831523] kasan_save_track+0x20/0x40 [ 30.831721] kasan_save_free_info+0x4c/0x78 [ 30.831925] __kasan_slab_free+0x6c/0x98 [ 30.832063] kfree+0x214/0x3c8 [ 30.832252] ksize_uaf+0x11c/0x5f8 [ 30.832387] kunit_try_run_case+0x170/0x3f0 [ 30.832548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.832689] kthread+0x328/0x630 [ 30.832786] ret_from_fork+0x10/0x20 [ 30.832888] [ 30.832940] The buggy address belongs to the object at fff00000c6361f00 [ 30.832940] which belongs to the cache kmalloc-128 of size 128 [ 30.833050] The buggy address is located 0 bytes inside of [ 30.833050] freed 128-byte region [fff00000c6361f00, fff00000c6361f80) [ 30.833501] [ 30.833588] The buggy address belongs to the physical page: [ 30.833629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.833876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.833985] page_type: f5(slab) [ 30.834043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.834169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.834417] page dumped because: kasan: bad access detected [ 30.834622] [ 30.834835] Memory state around the buggy address: [ 30.834942] fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.835035] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.835269] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.835409] ^ [ 30.835540] fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.835621] fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.835806] ================================================================== [ 30.836982] ================================================================== [ 30.837034] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.837083] Read of size 1 at addr fff00000c6361f00 by task kunit_try_catch/227 [ 30.837334] [ 30.837448] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.837718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.837883] Hardware name: linux,dummy-virt (DT) [ 30.837949] Call trace: [ 30.838016] show_stack+0x20/0x38 (C) [ 30.838068] dump_stack_lvl+0x8c/0xd0 [ 30.838143] print_report+0x118/0x5d0 [ 30.838193] kasan_report+0xdc/0x128 [ 30.838237] __asan_report_load1_noabort+0x20/0x30 [ 30.838568] ksize_uaf+0x598/0x5f8 [ 30.838677] kunit_try_run_case+0x170/0x3f0 [ 30.838732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.838815] kthread+0x328/0x630 [ 30.838861] ret_from_fork+0x10/0x20 [ 30.838945] [ 30.839124] Allocated by task 227: [ 30.839220] kasan_save_stack+0x3c/0x68 [ 30.839384] kasan_save_track+0x20/0x40 [ 30.839426] kasan_save_alloc_info+0x40/0x58 [ 30.839698] __kasan_kmalloc+0xd4/0xd8 [ 30.839813] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.839904] ksize_uaf+0xb8/0x5f8 [ 30.840027] kunit_try_run_case+0x170/0x3f0 [ 30.840085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.840131] kthread+0x328/0x630 [ 30.840184] ret_from_fork+0x10/0x20 [ 30.840222] [ 30.840383] Freed by task 227: [ 30.840530] kasan_save_stack+0x3c/0x68 [ 30.840679] kasan_save_track+0x20/0x40 [ 30.840793] kasan_save_free_info+0x4c/0x78 [ 30.840863] __kasan_slab_free+0x6c/0x98 [ 30.840901] kfree+0x214/0x3c8 [ 30.840936] ksize_uaf+0x11c/0x5f8 [ 30.840984] kunit_try_run_case+0x170/0x3f0 [ 30.841032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.841077] kthread+0x328/0x630 [ 30.841110] ret_from_fork+0x10/0x20 [ 30.841147] [ 30.841166] The buggy address belongs to the object at fff00000c6361f00 [ 30.841166] which belongs to the cache kmalloc-128 of size 128 [ 30.841250] The buggy address is located 0 bytes inside of [ 30.841250] freed 128-byte region [fff00000c6361f00, fff00000c6361f80) [ 30.841325] [ 30.841356] The buggy address belongs to the physical page: [ 30.841388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.841448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.841497] page_type: f5(slab) [ 30.841554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.841615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.841662] page dumped because: kasan: bad access detected [ 30.841694] [ 30.841711] Memory state around the buggy address: [ 30.841755] fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.841818] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.841872] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.841919] ^ [ 30.841953] fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.842012] fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.842051] ================================================================== [ 30.842923] ================================================================== [ 30.842984] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.843041] Read of size 1 at addr fff00000c6361f78 by task kunit_try_catch/227 [ 30.843215] [ 30.843336] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 30.843467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.843525] Hardware name: linux,dummy-virt (DT) [ 30.843719] Call trace: [ 30.843767] show_stack+0x20/0x38 (C) [ 30.843920] dump_stack_lvl+0x8c/0xd0 [ 30.844097] print_report+0x118/0x5d0 [ 30.844215] kasan_report+0xdc/0x128 [ 30.844345] __asan_report_load1_noabort+0x20/0x30 [ 30.844455] ksize_uaf+0x544/0x5f8 [ 30.844536] kunit_try_run_case+0x170/0x3f0 [ 30.844714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.844897] kthread+0x328/0x630 [ 30.844959] ret_from_fork+0x10/0x20 [ 30.845185] [ 30.845272] Allocated by task 227: [ 30.845438] kasan_save_stack+0x3c/0x68 [ 30.845530] kasan_save_track+0x20/0x40 [ 30.845603] kasan_save_alloc_info+0x40/0x58 [ 30.845741] __kasan_kmalloc+0xd4/0xd8 [ 30.845787] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.845961] ksize_uaf+0xb8/0x5f8 [ 30.846111] kunit_try_run_case+0x170/0x3f0 [ 30.846244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.846324] kthread+0x328/0x630 [ 30.846490] ret_from_fork+0x10/0x20 [ 30.846660] [ 30.846739] Freed by task 227: [ 30.846976] kasan_save_stack+0x3c/0x68 [ 30.847060] kasan_save_track+0x20/0x40 [ 30.847217] kasan_save_free_info+0x4c/0x78 [ 30.847372] __kasan_slab_free+0x6c/0x98 [ 30.847462] kfree+0x214/0x3c8 [ 30.847619] ksize_uaf+0x11c/0x5f8 [ 30.847720] kunit_try_run_case+0x170/0x3f0 [ 30.847862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.847909] kthread+0x328/0x630 [ 30.848134] ret_from_fork+0x10/0x20 [ 30.848307] [ 30.848340] The buggy address belongs to the object at fff00000c6361f00 [ 30.848340] which belongs to the cache kmalloc-128 of size 128 [ 30.848501] The buggy address is located 120 bytes inside of [ 30.848501] freed 128-byte region [fff00000c6361f00, fff00000c6361f80) [ 30.848726] [ 30.848859] The buggy address belongs to the physical page: [ 30.848950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 30.849015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.849188] page_type: f5(slab) [ 30.849262] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.849373] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.849440] page dumped because: kasan: bad access detected [ 30.849609] [ 30.849834] Memory state around the buggy address: [ 30.849922] fff00000c6361e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.850102] fff00000c6361e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.850185] >fff00000c6361f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.850297] ^ [ 30.850400] fff00000c6361f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.850502] fff00000c6362000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.850553] ==================================================================
[ 23.796248] ================================================================== [ 23.796803] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 23.797496] Read of size 1 at addr ffff888104a24a00 by task kunit_try_catch/245 [ 23.798140] [ 23.798288] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 23.798663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.798680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.798701] Call Trace: [ 23.798715] <TASK> [ 23.798732] dump_stack_lvl+0x73/0xb0 [ 23.798764] print_report+0xd1/0x610 [ 23.798785] ? __virt_addr_valid+0x1db/0x2d0 [ 23.798808] ? ksize_uaf+0x5fe/0x6c0 [ 23.798828] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.798860] ? ksize_uaf+0x5fe/0x6c0 [ 23.798901] kasan_report+0x141/0x180 [ 23.798922] ? ksize_uaf+0x5fe/0x6c0 [ 23.798947] __asan_report_load1_noabort+0x18/0x20 [ 23.798970] ksize_uaf+0x5fe/0x6c0 [ 23.798990] ? __pfx_ksize_uaf+0x10/0x10 [ 23.799011] ? __schedule+0x10c6/0x2b60 [ 23.799034] ? __pfx_read_tsc+0x10/0x10 [ 23.799055] ? ktime_get_ts64+0x86/0x230 [ 23.799080] kunit_try_run_case+0x1a5/0x480 [ 23.799104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.799125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.799147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.799169] ? __kthread_parkme+0x82/0x180 [ 23.799188] ? preempt_count_sub+0x50/0x80 [ 23.799211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.799233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.799259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.799295] kthread+0x337/0x6f0 [ 23.799315] ? trace_preempt_on+0x20/0xc0 [ 23.799337] ? __pfx_kthread+0x10/0x10 [ 23.799357] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.799377] ? calculate_sigpending+0x7b/0xa0 [ 23.799400] ? __pfx_kthread+0x10/0x10 [ 23.799421] ret_from_fork+0x116/0x1d0 [ 23.799439] ? __pfx_kthread+0x10/0x10 [ 23.799458] ret_from_fork_asm+0x1a/0x30 [ 23.799488] </TASK> [ 23.799499] [ 23.810437] Allocated by task 245: [ 23.810789] kasan_save_stack+0x45/0x70 [ 23.810970] kasan_save_track+0x18/0x40 [ 23.811372] kasan_save_alloc_info+0x3b/0x50 [ 23.811654] __kasan_kmalloc+0xb7/0xc0 [ 23.812040] __kmalloc_cache_noprof+0x189/0x420 [ 23.812262] ksize_uaf+0xaa/0x6c0 [ 23.812404] kunit_try_run_case+0x1a5/0x480 [ 23.812868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.813160] kthread+0x337/0x6f0 [ 23.813437] ret_from_fork+0x116/0x1d0 [ 23.813652] ret_from_fork_asm+0x1a/0x30 [ 23.814035] [ 23.814112] Freed by task 245: [ 23.814528] kasan_save_stack+0x45/0x70 [ 23.814781] kasan_save_track+0x18/0x40 [ 23.815134] kasan_save_free_info+0x3f/0x60 [ 23.815359] __kasan_slab_free+0x56/0x70 [ 23.815767] kfree+0x222/0x3f0 [ 23.815952] ksize_uaf+0x12c/0x6c0 [ 23.816479] kunit_try_run_case+0x1a5/0x480 [ 23.816645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.817204] kthread+0x337/0x6f0 [ 23.817381] ret_from_fork+0x116/0x1d0 [ 23.817603] ret_from_fork_asm+0x1a/0x30 [ 23.817797] [ 23.818066] The buggy address belongs to the object at ffff888104a24a00 [ 23.818066] which belongs to the cache kmalloc-128 of size 128 [ 23.818748] The buggy address is located 0 bytes inside of [ 23.818748] freed 128-byte region [ffff888104a24a00, ffff888104a24a80) [ 23.819563] [ 23.819832] The buggy address belongs to the physical page: [ 23.820429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24 [ 23.820871] flags: 0x200000000000000(node=0|zone=2) [ 23.821308] page_type: f5(slab) [ 23.821501] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.821997] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.822462] page dumped because: kasan: bad access detected [ 23.822839] [ 23.822924] Memory state around the buggy address: [ 23.823437] ffff888104a24900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.823853] ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824175] >ffff888104a24a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.824505] ^ [ 23.825081] ffff888104a24a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.825480] ffff888104a24b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.825888] ================================================================== [ 23.769871] ================================================================== [ 23.771439] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 23.772646] Read of size 1 at addr ffff888104a24a00 by task kunit_try_catch/245 [ 23.773788] [ 23.774188] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 23.774244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.774257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.774426] Call Trace: [ 23.774444] <TASK> [ 23.774463] dump_stack_lvl+0x73/0xb0 [ 23.774564] print_report+0xd1/0x610 [ 23.774588] ? __virt_addr_valid+0x1db/0x2d0 [ 23.774611] ? ksize_uaf+0x19d/0x6c0 [ 23.774630] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.774655] ? ksize_uaf+0x19d/0x6c0 [ 23.774675] kasan_report+0x141/0x180 [ 23.774696] ? ksize_uaf+0x19d/0x6c0 [ 23.774718] ? ksize_uaf+0x19d/0x6c0 [ 23.774738] __kasan_check_byte+0x3d/0x50 [ 23.774759] ksize+0x20/0x60 [ 23.774779] ksize_uaf+0x19d/0x6c0 [ 23.774798] ? __pfx_ksize_uaf+0x10/0x10 [ 23.774819] ? __schedule+0x10c6/0x2b60 [ 23.774842] ? __pfx_read_tsc+0x10/0x10 [ 23.774880] ? ktime_get_ts64+0x86/0x230 [ 23.774905] kunit_try_run_case+0x1a5/0x480 [ 23.774928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.774949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.774971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.774992] ? __kthread_parkme+0x82/0x180 [ 23.775012] ? preempt_count_sub+0x50/0x80 [ 23.775035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.775057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.775083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.775109] kthread+0x337/0x6f0 [ 23.775127] ? trace_preempt_on+0x20/0xc0 [ 23.775150] ? __pfx_kthread+0x10/0x10 [ 23.775170] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.775189] ? calculate_sigpending+0x7b/0xa0 [ 23.775212] ? __pfx_kthread+0x10/0x10 [ 23.775233] ret_from_fork+0x116/0x1d0 [ 23.775251] ? __pfx_kthread+0x10/0x10 [ 23.775271] ret_from_fork_asm+0x1a/0x30 [ 23.775310] </TASK> [ 23.775321] [ 23.783022] Allocated by task 245: [ 23.783205] kasan_save_stack+0x45/0x70 [ 23.783469] kasan_save_track+0x18/0x40 [ 23.783688] kasan_save_alloc_info+0x3b/0x50 [ 23.783996] __kasan_kmalloc+0xb7/0xc0 [ 23.784186] __kmalloc_cache_noprof+0x189/0x420 [ 23.784412] ksize_uaf+0xaa/0x6c0 [ 23.784643] kunit_try_run_case+0x1a5/0x480 [ 23.784801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.785198] kthread+0x337/0x6f0 [ 23.785389] ret_from_fork+0x116/0x1d0 [ 23.785613] ret_from_fork_asm+0x1a/0x30 [ 23.785749] [ 23.785841] Freed by task 245: [ 23.786146] kasan_save_stack+0x45/0x70 [ 23.786404] kasan_save_track+0x18/0x40 [ 23.786641] kasan_save_free_info+0x3f/0x60 [ 23.786956] __kasan_slab_free+0x56/0x70 [ 23.787127] kfree+0x222/0x3f0 [ 23.787317] ksize_uaf+0x12c/0x6c0 [ 23.787490] kunit_try_run_case+0x1a5/0x480 [ 23.787699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.787917] kthread+0x337/0x6f0 [ 23.788071] ret_from_fork+0x116/0x1d0 [ 23.788228] ret_from_fork_asm+0x1a/0x30 [ 23.788419] [ 23.788484] The buggy address belongs to the object at ffff888104a24a00 [ 23.788484] which belongs to the cache kmalloc-128 of size 128 [ 23.788971] The buggy address is located 0 bytes inside of [ 23.788971] freed 128-byte region [ffff888104a24a00, ffff888104a24a80) [ 23.789620] [ 23.789724] The buggy address belongs to the physical page: [ 23.790078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24 [ 23.790355] flags: 0x200000000000000(node=0|zone=2) [ 23.790616] page_type: f5(slab) [ 23.790818] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.791336] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.791685] page dumped because: kasan: bad access detected [ 23.791911] [ 23.791979] Memory state around the buggy address: [ 23.792130] ffff888104a24900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.792355] ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.792697] >ffff888104a24a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.793129] ^ [ 23.793309] ffff888104a24a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.793659] ffff888104a24b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.794069] ================================================================== [ 23.827120] ================================================================== [ 23.827462] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 23.827887] Read of size 1 at addr ffff888104a24a78 by task kunit_try_catch/245 [ 23.828322] [ 23.828442] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 23.828930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.828953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.828975] Call Trace: [ 23.828991] <TASK> [ 23.829009] dump_stack_lvl+0x73/0xb0 [ 23.829044] print_report+0xd1/0x610 [ 23.829066] ? __virt_addr_valid+0x1db/0x2d0 [ 23.829091] ? ksize_uaf+0x5e4/0x6c0 [ 23.829111] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.829136] ? ksize_uaf+0x5e4/0x6c0 [ 23.829156] kasan_report+0x141/0x180 [ 23.829177] ? ksize_uaf+0x5e4/0x6c0 [ 23.829201] __asan_report_load1_noabort+0x18/0x20 [ 23.829224] ksize_uaf+0x5e4/0x6c0 [ 23.829244] ? __pfx_ksize_uaf+0x10/0x10 [ 23.829265] ? __schedule+0x10c6/0x2b60 [ 23.829305] ? __pfx_read_tsc+0x10/0x10 [ 23.829327] ? ktime_get_ts64+0x86/0x230 [ 23.829353] kunit_try_run_case+0x1a5/0x480 [ 23.829377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.829399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.829421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.829443] ? __kthread_parkme+0x82/0x180 [ 23.829463] ? preempt_count_sub+0x50/0x80 [ 23.829487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.829509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.829535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.829578] kthread+0x337/0x6f0 [ 23.829598] ? trace_preempt_on+0x20/0xc0 [ 23.829621] ? __pfx_kthread+0x10/0x10 [ 23.829641] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.829661] ? calculate_sigpending+0x7b/0xa0 [ 23.829685] ? __pfx_kthread+0x10/0x10 [ 23.829706] ret_from_fork+0x116/0x1d0 [ 23.829724] ? __pfx_kthread+0x10/0x10 [ 23.829744] ret_from_fork_asm+0x1a/0x30 [ 23.829775] </TASK> [ 23.829785] [ 23.837487] Allocated by task 245: [ 23.837780] kasan_save_stack+0x45/0x70 [ 23.838041] kasan_save_track+0x18/0x40 [ 23.838216] kasan_save_alloc_info+0x3b/0x50 [ 23.838450] __kasan_kmalloc+0xb7/0xc0 [ 23.838574] __kmalloc_cache_noprof+0x189/0x420 [ 23.838719] ksize_uaf+0xaa/0x6c0 [ 23.838834] kunit_try_run_case+0x1a5/0x480 [ 23.838968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.839353] kthread+0x337/0x6f0 [ 23.839598] ret_from_fork+0x116/0x1d0 [ 23.839818] ret_from_fork_asm+0x1a/0x30 [ 23.840049] [ 23.840159] Freed by task 245: [ 23.840326] kasan_save_stack+0x45/0x70 [ 23.840544] kasan_save_track+0x18/0x40 [ 23.840971] kasan_save_free_info+0x3f/0x60 [ 23.841305] __kasan_slab_free+0x56/0x70 [ 23.841498] kfree+0x222/0x3f0 [ 23.841798] ksize_uaf+0x12c/0x6c0 [ 23.842150] kunit_try_run_case+0x1a5/0x480 [ 23.842312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.842479] kthread+0x337/0x6f0 [ 23.842589] ret_from_fork+0x116/0x1d0 [ 23.842710] ret_from_fork_asm+0x1a/0x30 [ 23.842840] [ 23.842903] The buggy address belongs to the object at ffff888104a24a00 [ 23.842903] which belongs to the cache kmalloc-128 of size 128 [ 23.843478] The buggy address is located 120 bytes inside of [ 23.843478] freed 128-byte region [ffff888104a24a00, ffff888104a24a80) [ 23.844003] [ 23.844097] The buggy address belongs to the physical page: [ 23.844358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a24 [ 23.844633] flags: 0x200000000000000(node=0|zone=2) [ 23.844789] page_type: f5(slab) [ 23.845198] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.845599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.845892] page dumped because: kasan: bad access detected [ 23.846194] [ 23.846306] Memory state around the buggy address: [ 23.846541] ffff888104a24900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.846843] ffff888104a24980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.847217] >ffff888104a24a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.847464] ^ [ 23.847880] ffff888104a24a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.848300] ffff888104a24b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.848834] ==================================================================