Date
July 22, 2025, 5:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.604242] ================================================================== [ 30.604804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.604887] Read of size 1 at addr fff00000c9a95078 by task kunit_try_catch/227 [ 30.605070] [ 30.605123] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.605571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.605661] Hardware name: linux,dummy-virt (DT) [ 30.605846] Call trace: [ 30.605928] show_stack+0x20/0x38 (C) [ 30.606221] dump_stack_lvl+0x8c/0xd0 [ 30.606522] print_report+0x118/0x5e8 [ 30.606696] kasan_report+0xdc/0x128 [ 30.606862] __asan_report_load1_noabort+0x20/0x30 [ 30.606952] ksize_uaf+0x544/0x5f8 [ 30.607041] kunit_try_run_case+0x170/0x3f0 [ 30.607471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.607704] kthread+0x328/0x630 [ 30.607801] ret_from_fork+0x10/0x20 [ 30.608096] [ 30.608201] Allocated by task 227: [ 30.608444] kasan_save_stack+0x3c/0x68 [ 30.608550] kasan_save_track+0x20/0x40 [ 30.608693] kasan_save_alloc_info+0x40/0x58 [ 30.608781] __kasan_kmalloc+0xd4/0xd8 [ 30.608892] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.608936] ksize_uaf+0xb8/0x5f8 [ 30.608970] kunit_try_run_case+0x170/0x3f0 [ 30.609007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.609230] kthread+0x328/0x630 [ 30.610147] ret_from_fork+0x10/0x20 [ 30.610217] [ 30.610260] Freed by task 227: [ 30.610357] kasan_save_stack+0x3c/0x68 [ 30.610421] kasan_save_track+0x20/0x40 [ 30.610459] kasan_save_free_info+0x4c/0x78 [ 30.610523] __kasan_slab_free+0x6c/0x98 [ 30.610609] kfree+0x214/0x3c8 [ 30.610674] ksize_uaf+0x11c/0x5f8 [ 30.610840] kunit_try_run_case+0x170/0x3f0 [ 30.611166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.611254] kthread+0x328/0x630 [ 30.611473] ret_from_fork+0x10/0x20 [ 30.611944] [ 30.612001] The buggy address belongs to the object at fff00000c9a95000 [ 30.612001] which belongs to the cache kmalloc-128 of size 128 [ 30.612158] The buggy address is located 120 bytes inside of [ 30.612158] freed 128-byte region [fff00000c9a95000, fff00000c9a95080) [ 30.612229] [ 30.612249] The buggy address belongs to the physical page: [ 30.612284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 30.612340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.612411] page_type: f5(slab) [ 30.612448] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.612511] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.612553] page dumped because: kasan: bad access detected [ 30.612584] [ 30.612618] Memory state around the buggy address: [ 30.612659] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.612712] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.612755] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.612793] ^ [ 30.612848] fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.613157] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.613504] ================================================================== [ 30.593974] ================================================================== [ 30.594044] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.594290] Read of size 1 at addr fff00000c9a95000 by task kunit_try_catch/227 [ 30.594355] [ 30.594957] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.595069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.595116] Hardware name: linux,dummy-virt (DT) [ 30.595163] Call trace: [ 30.595188] show_stack+0x20/0x38 (C) [ 30.595255] dump_stack_lvl+0x8c/0xd0 [ 30.595703] print_report+0x118/0x5e8 [ 30.595770] kasan_report+0xdc/0x128 [ 30.595962] __asan_report_load1_noabort+0x20/0x30 [ 30.596054] ksize_uaf+0x598/0x5f8 [ 30.596145] kunit_try_run_case+0x170/0x3f0 [ 30.596234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.596317] kthread+0x328/0x630 [ 30.596528] ret_from_fork+0x10/0x20 [ 30.596748] [ 30.596846] Allocated by task 227: [ 30.596987] kasan_save_stack+0x3c/0x68 [ 30.597082] kasan_save_track+0x20/0x40 [ 30.597198] kasan_save_alloc_info+0x40/0x58 [ 30.597286] __kasan_kmalloc+0xd4/0xd8 [ 30.597559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.597844] ksize_uaf+0xb8/0x5f8 [ 30.598008] kunit_try_run_case+0x170/0x3f0 [ 30.598089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.598226] kthread+0x328/0x630 [ 30.598302] ret_from_fork+0x10/0x20 [ 30.598375] [ 30.598506] Freed by task 227: [ 30.598537] kasan_save_stack+0x3c/0x68 [ 30.598619] kasan_save_track+0x20/0x40 [ 30.599022] kasan_save_free_info+0x4c/0x78 [ 30.599083] __kasan_slab_free+0x6c/0x98 [ 30.599227] kfree+0x214/0x3c8 [ 30.599285] ksize_uaf+0x11c/0x5f8 [ 30.599366] kunit_try_run_case+0x170/0x3f0 [ 30.599508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.599552] kthread+0x328/0x630 [ 30.599753] ret_from_fork+0x10/0x20 [ 30.599893] [ 30.600146] The buggy address belongs to the object at fff00000c9a95000 [ 30.600146] which belongs to the cache kmalloc-128 of size 128 [ 30.600233] The buggy address is located 0 bytes inside of [ 30.600233] freed 128-byte region [fff00000c9a95000, fff00000c9a95080) [ 30.600414] [ 30.600485] The buggy address belongs to the physical page: [ 30.600520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 30.600774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.600864] page_type: f5(slab) [ 30.600960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.601347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.601586] page dumped because: kasan: bad access detected [ 30.601628] [ 30.601671] Memory state around the buggy address: [ 30.601955] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.602113] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.602225] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.602265] ^ [ 30.602501] fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.602893] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.603010] ================================================================== [ 30.587185] ================================================================== [ 30.587251] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.587515] Read of size 1 at addr fff00000c9a95000 by task kunit_try_catch/227 [ 30.587652] [ 30.587703] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 30.588110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.588161] Hardware name: linux,dummy-virt (DT) [ 30.588195] Call trace: [ 30.588420] show_stack+0x20/0x38 (C) [ 30.588694] dump_stack_lvl+0x8c/0xd0 [ 30.588764] print_report+0x118/0x5e8 [ 30.588809] kasan_report+0xdc/0x128 [ 30.589104] __kasan_check_byte+0x54/0x70 [ 30.589199] ksize+0x30/0x88 [ 30.589452] ksize_uaf+0x168/0x5f8 [ 30.589629] kunit_try_run_case+0x170/0x3f0 [ 30.589873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.589968] kthread+0x328/0x630 [ 30.590241] ret_from_fork+0x10/0x20 [ 30.590506] [ 30.590561] Allocated by task 227: [ 30.590696] kasan_save_stack+0x3c/0x68 [ 30.590761] kasan_save_track+0x20/0x40 [ 30.590796] kasan_save_alloc_info+0x40/0x58 [ 30.590846] __kasan_kmalloc+0xd4/0xd8 [ 30.590890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.590939] ksize_uaf+0xb8/0x5f8 [ 30.590984] kunit_try_run_case+0x170/0x3f0 [ 30.591022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.591064] kthread+0x328/0x630 [ 30.591097] ret_from_fork+0x10/0x20 [ 30.591142] [ 30.591162] Freed by task 227: [ 30.591196] kasan_save_stack+0x3c/0x68 [ 30.591233] kasan_save_track+0x20/0x40 [ 30.591277] kasan_save_free_info+0x4c/0x78 [ 30.591315] __kasan_slab_free+0x6c/0x98 [ 30.591361] kfree+0x214/0x3c8 [ 30.591405] ksize_uaf+0x11c/0x5f8 [ 30.591450] kunit_try_run_case+0x170/0x3f0 [ 30.591487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.591529] kthread+0x328/0x630 [ 30.591563] ret_from_fork+0x10/0x20 [ 30.591598] [ 30.591627] The buggy address belongs to the object at fff00000c9a95000 [ 30.591627] which belongs to the cache kmalloc-128 of size 128 [ 30.591696] The buggy address is located 0 bytes inside of [ 30.591696] freed 128-byte region [fff00000c9a95000, fff00000c9a95080) [ 30.591757] [ 30.591791] The buggy address belongs to the physical page: [ 30.591844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a95 [ 30.591899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.591958] page_type: f5(slab) [ 30.592013] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.592071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.592120] page dumped because: kasan: bad access detected [ 30.592151] [ 30.592177] Memory state around the buggy address: [ 30.592224] fff00000c9a94f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592273] fff00000c9a94f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592322] >fff00000c9a95000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.592360] ^ [ 30.592394] fff00000c9a95080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592436] fff00000c9a95100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592474] ==================================================================
[ 25.623602] ================================================================== [ 25.623951] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 25.624349] Read of size 1 at addr ffff8881058a9678 by task kunit_try_catch/244 [ 25.624820] [ 25.624952] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 25.624998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.625011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.625032] Call Trace: [ 25.625046] <TASK> [ 25.625059] dump_stack_lvl+0x73/0xb0 [ 25.625088] print_report+0xd1/0x640 [ 25.625111] ? __virt_addr_valid+0x1db/0x2d0 [ 25.625135] ? ksize_uaf+0x5e4/0x6c0 [ 25.625156] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.625182] ? ksize_uaf+0x5e4/0x6c0 [ 25.625204] kasan_report+0x141/0x180 [ 25.625227] ? ksize_uaf+0x5e4/0x6c0 [ 25.625252] __asan_report_load1_noabort+0x18/0x20 [ 25.625277] ksize_uaf+0x5e4/0x6c0 [ 25.625298] ? __pfx_ksize_uaf+0x10/0x10 [ 25.625321] ? __schedule+0x10da/0x2b60 [ 25.625347] ? __pfx_read_tsc+0x10/0x10 [ 25.625369] ? ktime_get_ts64+0x86/0x230 [ 25.625393] kunit_try_run_case+0x1a5/0x480 [ 25.625418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.625441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.625466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.625492] ? __kthread_parkme+0x82/0x180 [ 25.625512] ? preempt_count_sub+0x50/0x80 [ 25.625535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.625560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.625584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.625726] kthread+0x337/0x6f0 [ 25.625756] ? trace_preempt_on+0x20/0xc0 [ 25.625807] ? __pfx_kthread+0x10/0x10 [ 25.625865] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.625891] ? calculate_sigpending+0x7b/0xa0 [ 25.625914] ? __pfx_kthread+0x10/0x10 [ 25.625960] ret_from_fork+0x116/0x1d0 [ 25.626004] ? __pfx_kthread+0x10/0x10 [ 25.626049] ret_from_fork_asm+0x1a/0x30 [ 25.626080] </TASK> [ 25.626091] [ 25.634049] Allocated by task 244: [ 25.634277] kasan_save_stack+0x45/0x70 [ 25.634484] kasan_save_track+0x18/0x40 [ 25.634799] kasan_save_alloc_info+0x3b/0x50 [ 25.635306] __kasan_kmalloc+0xb7/0xc0 [ 25.635742] __kmalloc_cache_noprof+0x189/0x420 [ 25.636053] ksize_uaf+0xaa/0x6c0 [ 25.636275] kunit_try_run_case+0x1a5/0x480 [ 25.636498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.636737] kthread+0x337/0x6f0 [ 25.636894] ret_from_fork+0x116/0x1d0 [ 25.637030] ret_from_fork_asm+0x1a/0x30 [ 25.637168] [ 25.637235] Freed by task 244: [ 25.637345] kasan_save_stack+0x45/0x70 [ 25.637804] kasan_save_track+0x18/0x40 [ 25.638024] kasan_save_free_info+0x3f/0x60 [ 25.638307] __kasan_slab_free+0x56/0x70 [ 25.638591] kfree+0x222/0x3f0 [ 25.638764] ksize_uaf+0x12c/0x6c0 [ 25.638985] kunit_try_run_case+0x1a5/0x480 [ 25.639235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.639637] kthread+0x337/0x6f0 [ 25.639856] ret_from_fork+0x116/0x1d0 [ 25.640081] ret_from_fork_asm+0x1a/0x30 [ 25.640293] [ 25.640363] The buggy address belongs to the object at ffff8881058a9600 [ 25.640363] which belongs to the cache kmalloc-128 of size 128 [ 25.641176] The buggy address is located 120 bytes inside of [ 25.641176] freed 128-byte region [ffff8881058a9600, ffff8881058a9680) [ 25.641774] [ 25.641943] The buggy address belongs to the physical page: [ 25.642226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 25.642721] flags: 0x200000000000000(node=0|zone=2) [ 25.642978] page_type: f5(slab) [ 25.643147] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.643599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.644051] page dumped because: kasan: bad access detected [ 25.644335] [ 25.644426] Memory state around the buggy address: [ 25.644749] ffff8881058a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.645065] ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.645528] >ffff8881058a9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.645961] ^ [ 25.646272] ffff8881058a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.646590] ffff8881058a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.647046] ================================================================== [ 25.576364] ================================================================== [ 25.576906] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 25.577404] Read of size 1 at addr ffff8881058a9600 by task kunit_try_catch/244 [ 25.578008] [ 25.578115] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 25.578164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.578220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.578242] Call Trace: [ 25.578256] <TASK> [ 25.578271] dump_stack_lvl+0x73/0xb0 [ 25.578303] print_report+0xd1/0x640 [ 25.578327] ? __virt_addr_valid+0x1db/0x2d0 [ 25.578351] ? ksize_uaf+0x19d/0x6c0 [ 25.578372] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.578398] ? ksize_uaf+0x19d/0x6c0 [ 25.578420] kasan_report+0x141/0x180 [ 25.578442] ? ksize_uaf+0x19d/0x6c0 [ 25.578466] ? ksize_uaf+0x19d/0x6c0 [ 25.578487] __kasan_check_byte+0x3d/0x50 [ 25.578509] ksize+0x20/0x60 [ 25.578590] ksize_uaf+0x19d/0x6c0 [ 25.578612] ? __pfx_ksize_uaf+0x10/0x10 [ 25.578634] ? __schedule+0x10da/0x2b60 [ 25.578661] ? __pfx_read_tsc+0x10/0x10 [ 25.578683] ? ktime_get_ts64+0x86/0x230 [ 25.578707] kunit_try_run_case+0x1a5/0x480 [ 25.578732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.578755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.578780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.578807] ? __kthread_parkme+0x82/0x180 [ 25.578827] ? preempt_count_sub+0x50/0x80 [ 25.578862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.578886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.578911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.578935] kthread+0x337/0x6f0 [ 25.578955] ? trace_preempt_on+0x20/0xc0 [ 25.578978] ? __pfx_kthread+0x10/0x10 [ 25.578998] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.579022] ? calculate_sigpending+0x7b/0xa0 [ 25.579046] ? __pfx_kthread+0x10/0x10 [ 25.579068] ret_from_fork+0x116/0x1d0 [ 25.579088] ? __pfx_kthread+0x10/0x10 [ 25.579109] ret_from_fork_asm+0x1a/0x30 [ 25.579140] </TASK> [ 25.579150] [ 25.587401] Allocated by task 244: [ 25.587586] kasan_save_stack+0x45/0x70 [ 25.587760] kasan_save_track+0x18/0x40 [ 25.587914] kasan_save_alloc_info+0x3b/0x50 [ 25.588125] __kasan_kmalloc+0xb7/0xc0 [ 25.588526] __kmalloc_cache_noprof+0x189/0x420 [ 25.588745] ksize_uaf+0xaa/0x6c0 [ 25.589239] kunit_try_run_case+0x1a5/0x480 [ 25.589475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.589814] kthread+0x337/0x6f0 [ 25.590038] ret_from_fork+0x116/0x1d0 [ 25.590232] ret_from_fork_asm+0x1a/0x30 [ 25.590451] [ 25.590522] Freed by task 244: [ 25.590846] kasan_save_stack+0x45/0x70 [ 25.591041] kasan_save_track+0x18/0x40 [ 25.591223] kasan_save_free_info+0x3f/0x60 [ 25.591410] __kasan_slab_free+0x56/0x70 [ 25.591636] kfree+0x222/0x3f0 [ 25.591853] ksize_uaf+0x12c/0x6c0 [ 25.592051] kunit_try_run_case+0x1a5/0x480 [ 25.592276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.592706] kthread+0x337/0x6f0 [ 25.592862] ret_from_fork+0x116/0x1d0 [ 25.593056] ret_from_fork_asm+0x1a/0x30 [ 25.593384] [ 25.593599] The buggy address belongs to the object at ffff8881058a9600 [ 25.593599] which belongs to the cache kmalloc-128 of size 128 [ 25.594094] The buggy address is located 0 bytes inside of [ 25.594094] freed 128-byte region [ffff8881058a9600, ffff8881058a9680) [ 25.594638] [ 25.594759] The buggy address belongs to the physical page: [ 25.595126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 25.595540] flags: 0x200000000000000(node=0|zone=2) [ 25.595845] page_type: f5(slab) [ 25.596011] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.596263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.596492] page dumped because: kasan: bad access detected [ 25.596662] [ 25.596750] Memory state around the buggy address: [ 25.596985] ffff8881058a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.597884] ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.598219] >ffff8881058a9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.598452] ^ [ 25.598710] ffff8881058a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.599088] ffff8881058a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.599351] ================================================================== [ 25.600102] ================================================================== [ 25.600712] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 25.601080] Read of size 1 at addr ffff8881058a9600 by task kunit_try_catch/244 [ 25.601449] [ 25.601742] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 25.601792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.601804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.601825] Call Trace: [ 25.601863] <TASK> [ 25.601915] dump_stack_lvl+0x73/0xb0 [ 25.601950] print_report+0xd1/0x640 [ 25.601975] ? __virt_addr_valid+0x1db/0x2d0 [ 25.602001] ? ksize_uaf+0x5fe/0x6c0 [ 25.602023] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.602050] ? ksize_uaf+0x5fe/0x6c0 [ 25.602105] kasan_report+0x141/0x180 [ 25.602128] ? ksize_uaf+0x5fe/0x6c0 [ 25.602154] __asan_report_load1_noabort+0x18/0x20 [ 25.602179] ksize_uaf+0x5fe/0x6c0 [ 25.602202] ? __pfx_ksize_uaf+0x10/0x10 [ 25.602224] ? __schedule+0x10da/0x2b60 [ 25.602282] ? __pfx_read_tsc+0x10/0x10 [ 25.602305] ? ktime_get_ts64+0x86/0x230 [ 25.602331] kunit_try_run_case+0x1a5/0x480 [ 25.602358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.602411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.602437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.602519] ? __kthread_parkme+0x82/0x180 [ 25.602543] ? preempt_count_sub+0x50/0x80 [ 25.602604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.602628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.602653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.602677] kthread+0x337/0x6f0 [ 25.602697] ? trace_preempt_on+0x20/0xc0 [ 25.602722] ? __pfx_kthread+0x10/0x10 [ 25.602743] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.602767] ? calculate_sigpending+0x7b/0xa0 [ 25.602791] ? __pfx_kthread+0x10/0x10 [ 25.602813] ret_from_fork+0x116/0x1d0 [ 25.602845] ? __pfx_kthread+0x10/0x10 [ 25.602866] ret_from_fork_asm+0x1a/0x30 [ 25.602898] </TASK> [ 25.602909] [ 25.611041] Allocated by task 244: [ 25.611265] kasan_save_stack+0x45/0x70 [ 25.611485] kasan_save_track+0x18/0x40 [ 25.611795] kasan_save_alloc_info+0x3b/0x50 [ 25.612026] __kasan_kmalloc+0xb7/0xc0 [ 25.612213] __kmalloc_cache_noprof+0x189/0x420 [ 25.612454] ksize_uaf+0xaa/0x6c0 [ 25.612706] kunit_try_run_case+0x1a5/0x480 [ 25.612942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.613218] kthread+0x337/0x6f0 [ 25.613407] ret_from_fork+0x116/0x1d0 [ 25.613805] ret_from_fork_asm+0x1a/0x30 [ 25.614024] [ 25.614091] Freed by task 244: [ 25.614223] kasan_save_stack+0x45/0x70 [ 25.614419] kasan_save_track+0x18/0x40 [ 25.614773] kasan_save_free_info+0x3f/0x60 [ 25.615045] __kasan_slab_free+0x56/0x70 [ 25.615234] kfree+0x222/0x3f0 [ 25.615351] ksize_uaf+0x12c/0x6c0 [ 25.615474] kunit_try_run_case+0x1a5/0x480 [ 25.615668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.615931] kthread+0x337/0x6f0 [ 25.616102] ret_from_fork+0x116/0x1d0 [ 25.616295] ret_from_fork_asm+0x1a/0x30 [ 25.616488] [ 25.616578] The buggy address belongs to the object at ffff8881058a9600 [ 25.616578] which belongs to the cache kmalloc-128 of size 128 [ 25.617115] The buggy address is located 0 bytes inside of [ 25.617115] freed 128-byte region [ffff8881058a9600, ffff8881058a9680) [ 25.617962] [ 25.618041] The buggy address belongs to the physical page: [ 25.618386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a9 [ 25.619079] flags: 0x200000000000000(node=0|zone=2) [ 25.619593] page_type: f5(slab) [ 25.619791] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.620134] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.620593] page dumped because: kasan: bad access detected [ 25.620806] [ 25.620890] Memory state around the buggy address: [ 25.621109] ffff8881058a9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.621640] ffff8881058a9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.622056] >ffff8881058a9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.622444] ^ [ 25.622711] ffff8881058a9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.622967] ffff8881058a9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.623230] ==================================================================