Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.812090] ================================================================== [ 29.812143] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.812426] Read of size 1 at addr fff00000c9b1e478 by task kunit_try_catch/227 [ 29.812600] [ 29.812715] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.812835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.812864] Hardware name: linux,dummy-virt (DT) [ 29.812893] Call trace: [ 29.812930] show_stack+0x20/0x38 (C) [ 29.813176] dump_stack_lvl+0x8c/0xd0 [ 29.813338] print_report+0x118/0x5d0 [ 29.813491] kasan_report+0xdc/0x128 [ 29.813603] __asan_report_load1_noabort+0x20/0x30 [ 29.813689] ksize_uaf+0x544/0x5f8 [ 29.813837] kunit_try_run_case+0x170/0x3f0 [ 29.813888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.814119] kthread+0x328/0x630 [ 29.814169] ret_from_fork+0x10/0x20 [ 29.814241] [ 29.814297] Allocated by task 227: [ 29.814327] kasan_save_stack+0x3c/0x68 [ 29.814373] kasan_save_track+0x20/0x40 [ 29.814409] kasan_save_alloc_info+0x40/0x58 [ 29.814462] __kasan_kmalloc+0xd4/0xd8 [ 29.814505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.814547] ksize_uaf+0xb8/0x5f8 [ 29.814598] kunit_try_run_case+0x170/0x3f0 [ 29.814635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.814685] kthread+0x328/0x630 [ 29.814718] ret_from_fork+0x10/0x20 [ 29.814754] [ 29.814779] Freed by task 227: [ 29.814806] kasan_save_stack+0x3c/0x68 [ 29.814841] kasan_save_track+0x20/0x40 [ 29.814874] kasan_save_free_info+0x4c/0x78 [ 29.814922] __kasan_slab_free+0x6c/0x98 [ 29.814958] kfree+0x214/0x3c8 [ 29.815001] ksize_uaf+0x11c/0x5f8 [ 29.815037] kunit_try_run_case+0x170/0x3f0 [ 29.815087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.815138] kthread+0x328/0x630 [ 29.815181] ret_from_fork+0x10/0x20 [ 29.815216] [ 29.815235] The buggy address belongs to the object at fff00000c9b1e400 [ 29.815235] which belongs to the cache kmalloc-128 of size 128 [ 29.815301] The buggy address is located 120 bytes inside of [ 29.815301] freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480) [ 29.815365] [ 29.815394] The buggy address belongs to the physical page: [ 29.815423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.815474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.815529] page_type: f5(slab) [ 29.815575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.815626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.815675] page dumped because: kasan: bad access detected [ 29.815713] [ 29.815731] Memory state around the buggy address: [ 29.815772] fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.815830] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.815871] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.815908] ^ [ 29.815954] fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.815996] fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.816034] ================================================================== [ 29.795545] ================================================================== [ 29.795791] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.796142] Read of size 1 at addr fff00000c9b1e400 by task kunit_try_catch/227 [ 29.796284] [ 29.796317] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.796456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.796512] Hardware name: linux,dummy-virt (DT) [ 29.796550] Call trace: [ 29.796574] show_stack+0x20/0x38 (C) [ 29.796633] dump_stack_lvl+0x8c/0xd0 [ 29.796683] print_report+0x118/0x5d0 [ 29.796967] kasan_report+0xdc/0x128 [ 29.797332] __kasan_check_byte+0x54/0x70 [ 29.797521] ksize+0x30/0x88 [ 29.797576] ksize_uaf+0x168/0x5f8 [ 29.797631] kunit_try_run_case+0x170/0x3f0 [ 29.797680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.797801] kthread+0x328/0x630 [ 29.797864] ret_from_fork+0x10/0x20 [ 29.797917] [ 29.797944] Allocated by task 227: [ 29.797974] kasan_save_stack+0x3c/0x68 [ 29.798014] kasan_save_track+0x20/0x40 [ 29.798081] kasan_save_alloc_info+0x40/0x58 [ 29.798131] __kasan_kmalloc+0xd4/0xd8 [ 29.798164] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.798205] ksize_uaf+0xb8/0x5f8 [ 29.798242] kunit_try_run_case+0x170/0x3f0 [ 29.798279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.798331] kthread+0x328/0x630 [ 29.798364] ret_from_fork+0x10/0x20 [ 29.798407] [ 29.798427] Freed by task 227: [ 29.798453] kasan_save_stack+0x3c/0x68 [ 29.798487] kasan_save_track+0x20/0x40 [ 29.798529] kasan_save_free_info+0x4c/0x78 [ 29.798575] __kasan_slab_free+0x6c/0x98 [ 29.798627] kfree+0x214/0x3c8 [ 29.798667] ksize_uaf+0x11c/0x5f8 [ 29.798704] kunit_try_run_case+0x170/0x3f0 [ 29.798750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.798798] kthread+0x328/0x630 [ 29.798831] ret_from_fork+0x10/0x20 [ 29.798868] [ 29.798895] The buggy address belongs to the object at fff00000c9b1e400 [ 29.798895] which belongs to the cache kmalloc-128 of size 128 [ 29.798953] The buggy address is located 0 bytes inside of [ 29.798953] freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480) [ 29.799024] [ 29.799044] The buggy address belongs to the physical page: [ 29.799433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.800008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.800124] page_type: f5(slab) [ 29.800200] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.800326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.800418] page dumped because: kasan: bad access detected [ 29.800529] [ 29.800572] Memory state around the buggy address: [ 29.800606] fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.801074] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801200] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.801305] ^ [ 29.801382] fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801492] fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801606] ================================================================== [ 29.803086] ================================================================== [ 29.803289] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.803362] Read of size 1 at addr fff00000c9b1e400 by task kunit_try_catch/227 [ 29.803413] [ 29.803499] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 29.803587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.803776] Hardware name: linux,dummy-virt (DT) [ 29.803819] Call trace: [ 29.803865] show_stack+0x20/0x38 (C) [ 29.803918] dump_stack_lvl+0x8c/0xd0 [ 29.804104] print_report+0x118/0x5d0 [ 29.804217] kasan_report+0xdc/0x128 [ 29.804311] __asan_report_load1_noabort+0x20/0x30 [ 29.804362] ksize_uaf+0x598/0x5f8 [ 29.804514] kunit_try_run_case+0x170/0x3f0 [ 29.804607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804661] kthread+0x328/0x630 [ 29.804721] ret_from_fork+0x10/0x20 [ 29.805123] [ 29.805165] Allocated by task 227: [ 29.805248] kasan_save_stack+0x3c/0x68 [ 29.805375] kasan_save_track+0x20/0x40 [ 29.805450] kasan_save_alloc_info+0x40/0x58 [ 29.805596] __kasan_kmalloc+0xd4/0xd8 [ 29.805687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.805730] ksize_uaf+0xb8/0x5f8 [ 29.806016] kunit_try_run_case+0x170/0x3f0 [ 29.806250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.806352] kthread+0x328/0x630 [ 29.806467] ret_from_fork+0x10/0x20 [ 29.806505] [ 29.806651] Freed by task 227: [ 29.806725] kasan_save_stack+0x3c/0x68 [ 29.807015] kasan_save_track+0x20/0x40 [ 29.807193] kasan_save_free_info+0x4c/0x78 [ 29.807273] __kasan_slab_free+0x6c/0x98 [ 29.807385] kfree+0x214/0x3c8 [ 29.807423] ksize_uaf+0x11c/0x5f8 [ 29.807578] kunit_try_run_case+0x170/0x3f0 [ 29.807860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.807945] kthread+0x328/0x630 [ 29.808112] ret_from_fork+0x10/0x20 [ 29.808198] [ 29.808272] The buggy address belongs to the object at fff00000c9b1e400 [ 29.808272] which belongs to the cache kmalloc-128 of size 128 [ 29.808623] The buggy address is located 0 bytes inside of [ 29.808623] freed 128-byte region [fff00000c9b1e400, fff00000c9b1e480) [ 29.808778] [ 29.808853] The buggy address belongs to the physical page: [ 29.808939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1e [ 29.809104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.809322] page_type: f5(slab) [ 29.809541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.809613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.809773] page dumped because: kasan: bad access detected [ 29.809841] [ 29.809988] Memory state around the buggy address: [ 29.810069] fff00000c9b1e300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.810198] fff00000c9b1e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810287] >fff00000c9b1e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.810347] ^ [ 29.810731] fff00000c9b1e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810790] fff00000c9b1e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810968] ==================================================================
[ 26.173155] ================================================================== [ 26.173799] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 26.174120] Read of size 1 at addr ffff88810553d978 by task kunit_try_catch/245 [ 26.174442] [ 26.174544] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 26.174588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.174599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.174618] Call Trace: [ 26.174630] <TASK> [ 26.174644] dump_stack_lvl+0x73/0xb0 [ 26.174671] print_report+0xd1/0x610 [ 26.174692] ? __virt_addr_valid+0x1db/0x2d0 [ 26.174714] ? ksize_uaf+0x5e4/0x6c0 [ 26.174733] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.174758] ? ksize_uaf+0x5e4/0x6c0 [ 26.174779] kasan_report+0x141/0x180 [ 26.174799] ? ksize_uaf+0x5e4/0x6c0 [ 26.174824] __asan_report_load1_noabort+0x18/0x20 [ 26.174847] ksize_uaf+0x5e4/0x6c0 [ 26.174866] ? __pfx_ksize_uaf+0x10/0x10 [ 26.174886] ? __schedule+0x10c6/0x2b60 [ 26.174908] ? __pfx_read_tsc+0x10/0x10 [ 26.174928] ? ktime_get_ts64+0x86/0x230 [ 26.174951] kunit_try_run_case+0x1a5/0x480 [ 26.174973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.174994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.175015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.175037] ? __kthread_parkme+0x82/0x180 [ 26.175060] ? preempt_count_sub+0x50/0x80 [ 26.175092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.175115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.175136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.175158] kthread+0x337/0x6f0 [ 26.175176] ? trace_preempt_on+0x20/0xc0 [ 26.175198] ? __pfx_kthread+0x10/0x10 [ 26.175217] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.175238] ? calculate_sigpending+0x7b/0xa0 [ 26.175259] ? __pfx_kthread+0x10/0x10 [ 26.175291] ret_from_fork+0x116/0x1d0 [ 26.175309] ? __pfx_kthread+0x10/0x10 [ 26.175328] ret_from_fork_asm+0x1a/0x30 [ 26.175359] </TASK> [ 26.175369] [ 26.181772] Allocated by task 245: [ 26.181937] kasan_save_stack+0x45/0x70 [ 26.182110] kasan_save_track+0x18/0x40 [ 26.182289] kasan_save_alloc_info+0x3b/0x50 [ 26.182438] __kasan_kmalloc+0xb7/0xc0 [ 26.182622] __kmalloc_cache_noprof+0x189/0x420 [ 26.182803] ksize_uaf+0xaa/0x6c0 [ 26.182917] kunit_try_run_case+0x1a5/0x480 [ 26.183053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.183228] kthread+0x337/0x6f0 [ 26.183338] ret_from_fork+0x116/0x1d0 [ 26.183461] ret_from_fork_asm+0x1a/0x30 [ 26.183590] [ 26.183651] Freed by task 245: [ 26.183752] kasan_save_stack+0x45/0x70 [ 26.183923] kasan_save_track+0x18/0x40 [ 26.184176] kasan_save_free_info+0x3f/0x60 [ 26.184512] __kasan_slab_free+0x56/0x70 [ 26.184695] kfree+0x222/0x3f0 [ 26.184846] ksize_uaf+0x12c/0x6c0 [ 26.185009] kunit_try_run_case+0x1a5/0x480 [ 26.185210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.185504] kthread+0x337/0x6f0 [ 26.185615] ret_from_fork+0x116/0x1d0 [ 26.185738] ret_from_fork_asm+0x1a/0x30 [ 26.185867] [ 26.185933] The buggy address belongs to the object at ffff88810553d900 [ 26.185933] which belongs to the cache kmalloc-128 of size 128 [ 26.186290] The buggy address is located 120 bytes inside of [ 26.186290] freed 128-byte region [ffff88810553d900, ffff88810553d980) [ 26.187250] [ 26.187427] The buggy address belongs to the physical page: [ 26.187672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 26.188021] flags: 0x200000000000000(node=0|zone=2) [ 26.188257] page_type: f5(slab) [ 26.188422] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.188700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.188917] page dumped because: kasan: bad access detected [ 26.189177] [ 26.189262] Memory state around the buggy address: [ 26.189631] ffff88810553d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.189874] ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.190106] >ffff88810553d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.190598] ^ [ 26.190877] ffff88810553d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.191097] ffff88810553da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.191575] ================================================================== [ 26.128722] ================================================================== [ 26.129106] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 26.129459] Read of size 1 at addr ffff88810553d900 by task kunit_try_catch/245 [ 26.130055] [ 26.130233] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 26.130282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.130293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.130313] Call Trace: [ 26.130325] <TASK> [ 26.130340] dump_stack_lvl+0x73/0xb0 [ 26.130369] print_report+0xd1/0x610 [ 26.130390] ? __virt_addr_valid+0x1db/0x2d0 [ 26.130414] ? ksize_uaf+0x19d/0x6c0 [ 26.130433] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.130457] ? ksize_uaf+0x19d/0x6c0 [ 26.130477] kasan_report+0x141/0x180 [ 26.130498] ? ksize_uaf+0x19d/0x6c0 [ 26.130520] ? ksize_uaf+0x19d/0x6c0 [ 26.130797] __kasan_check_byte+0x3d/0x50 [ 26.130820] ksize+0x20/0x60 [ 26.130841] ksize_uaf+0x19d/0x6c0 [ 26.130860] ? __pfx_ksize_uaf+0x10/0x10 [ 26.130881] ? __schedule+0x10c6/0x2b60 [ 26.130903] ? __pfx_read_tsc+0x10/0x10 [ 26.130924] ? ktime_get_ts64+0x86/0x230 [ 26.130948] kunit_try_run_case+0x1a5/0x480 [ 26.130971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.130992] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.131013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.131035] ? __kthread_parkme+0x82/0x180 [ 26.131059] ? preempt_count_sub+0x50/0x80 [ 26.131094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.131116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.131138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.131160] kthread+0x337/0x6f0 [ 26.131178] ? trace_preempt_on+0x20/0xc0 [ 26.131200] ? __pfx_kthread+0x10/0x10 [ 26.131220] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.131240] ? calculate_sigpending+0x7b/0xa0 [ 26.131263] ? __pfx_kthread+0x10/0x10 [ 26.131292] ret_from_fork+0x116/0x1d0 [ 26.131310] ? __pfx_kthread+0x10/0x10 [ 26.131330] ret_from_fork_asm+0x1a/0x30 [ 26.131361] </TASK> [ 26.131371] [ 26.139585] Allocated by task 245: [ 26.139848] kasan_save_stack+0x45/0x70 [ 26.140110] kasan_save_track+0x18/0x40 [ 26.140275] kasan_save_alloc_info+0x3b/0x50 [ 26.140659] __kasan_kmalloc+0xb7/0xc0 [ 26.140832] __kmalloc_cache_noprof+0x189/0x420 [ 26.141145] ksize_uaf+0xaa/0x6c0 [ 26.141343] kunit_try_run_case+0x1a5/0x480 [ 26.141524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.141742] kthread+0x337/0x6f0 [ 26.141885] ret_from_fork+0x116/0x1d0 [ 26.142060] ret_from_fork_asm+0x1a/0x30 [ 26.142227] [ 26.142325] Freed by task 245: [ 26.142841] kasan_save_stack+0x45/0x70 [ 26.143000] kasan_save_track+0x18/0x40 [ 26.143201] kasan_save_free_info+0x3f/0x60 [ 26.143460] __kasan_slab_free+0x56/0x70 [ 26.143790] kfree+0x222/0x3f0 [ 26.143942] ksize_uaf+0x12c/0x6c0 [ 26.144219] kunit_try_run_case+0x1a5/0x480 [ 26.144442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.144798] kthread+0x337/0x6f0 [ 26.144957] ret_from_fork+0x116/0x1d0 [ 26.145255] ret_from_fork_asm+0x1a/0x30 [ 26.145429] [ 26.145589] The buggy address belongs to the object at ffff88810553d900 [ 26.145589] which belongs to the cache kmalloc-128 of size 128 [ 26.146048] The buggy address is located 0 bytes inside of [ 26.146048] freed 128-byte region [ffff88810553d900, ffff88810553d980) [ 26.146825] [ 26.146924] The buggy address belongs to the physical page: [ 26.147134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 26.147692] flags: 0x200000000000000(node=0|zone=2) [ 26.147900] page_type: f5(slab) [ 26.148193] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.148657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.148927] page dumped because: kasan: bad access detected [ 26.149287] [ 26.149412] Memory state around the buggy address: [ 26.149714] ffff88810553d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.150054] ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.150468] >ffff88810553d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.150747] ^ [ 26.150888] ffff88810553d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.151192] ffff88810553da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.151656] ================================================================== [ 26.152606] ================================================================== [ 26.153194] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 26.153526] Read of size 1 at addr ffff88810553d900 by task kunit_try_catch/245 [ 26.153823] [ 26.153910] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 26.153960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.153971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.153990] Call Trace: [ 26.154003] <TASK> [ 26.154016] dump_stack_lvl+0x73/0xb0 [ 26.154043] print_report+0xd1/0x610 [ 26.154064] ? __virt_addr_valid+0x1db/0x2d0 [ 26.154096] ? ksize_uaf+0x5fe/0x6c0 [ 26.154115] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.154139] ? ksize_uaf+0x5fe/0x6c0 [ 26.154159] kasan_report+0x141/0x180 [ 26.154179] ? ksize_uaf+0x5fe/0x6c0 [ 26.154203] __asan_report_load1_noabort+0x18/0x20 [ 26.154226] ksize_uaf+0x5fe/0x6c0 [ 26.154245] ? __pfx_ksize_uaf+0x10/0x10 [ 26.154265] ? __schedule+0x10c6/0x2b60 [ 26.154576] ? __pfx_read_tsc+0x10/0x10 [ 26.154599] ? ktime_get_ts64+0x86/0x230 [ 26.154623] kunit_try_run_case+0x1a5/0x480 [ 26.154646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.154667] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.154689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.154711] ? __kthread_parkme+0x82/0x180 [ 26.154734] ? preempt_count_sub+0x50/0x80 [ 26.154756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.154778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.154800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.154822] kthread+0x337/0x6f0 [ 26.154840] ? trace_preempt_on+0x20/0xc0 [ 26.154862] ? __pfx_kthread+0x10/0x10 [ 26.154881] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.154902] ? calculate_sigpending+0x7b/0xa0 [ 26.154924] ? __pfx_kthread+0x10/0x10 [ 26.154944] ret_from_fork+0x116/0x1d0 [ 26.154962] ? __pfx_kthread+0x10/0x10 [ 26.154981] ret_from_fork_asm+0x1a/0x30 [ 26.155012] </TASK> [ 26.155022] [ 26.163287] Allocated by task 245: [ 26.163580] kasan_save_stack+0x45/0x70 [ 26.163732] kasan_save_track+0x18/0x40 [ 26.163907] kasan_save_alloc_info+0x3b/0x50 [ 26.164120] __kasan_kmalloc+0xb7/0xc0 [ 26.164250] __kmalloc_cache_noprof+0x189/0x420 [ 26.164455] ksize_uaf+0xaa/0x6c0 [ 26.164632] kunit_try_run_case+0x1a5/0x480 [ 26.164779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.165000] kthread+0x337/0x6f0 [ 26.165147] ret_from_fork+0x116/0x1d0 [ 26.165299] ret_from_fork_asm+0x1a/0x30 [ 26.165496] [ 26.165576] Freed by task 245: [ 26.165711] kasan_save_stack+0x45/0x70 [ 26.165870] kasan_save_track+0x18/0x40 [ 26.166052] kasan_save_free_info+0x3f/0x60 [ 26.166242] __kasan_slab_free+0x56/0x70 [ 26.166439] kfree+0x222/0x3f0 [ 26.166547] ksize_uaf+0x12c/0x6c0 [ 26.166661] kunit_try_run_case+0x1a5/0x480 [ 26.166843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.167189] kthread+0x337/0x6f0 [ 26.167377] ret_from_fork+0x116/0x1d0 [ 26.167527] ret_from_fork_asm+0x1a/0x30 [ 26.167704] [ 26.167765] The buggy address belongs to the object at ffff88810553d900 [ 26.167765] which belongs to the cache kmalloc-128 of size 128 [ 26.168226] The buggy address is located 0 bytes inside of [ 26.168226] freed 128-byte region [ffff88810553d900, ffff88810553d980) [ 26.168716] [ 26.168805] The buggy address belongs to the physical page: [ 26.169004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553d [ 26.169297] flags: 0x200000000000000(node=0|zone=2) [ 26.169530] page_type: f5(slab) [ 26.169658] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.169966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.170293] page dumped because: kasan: bad access detected [ 26.170469] [ 26.170529] Memory state around the buggy address: [ 26.170675] ffff88810553d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.170923] ffff88810553d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.171238] >ffff88810553d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.171664] ^ [ 26.171817] ffff88810553d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.172139] ffff88810553da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.172434] ==================================================================