Date
July 24, 2025, 4:41 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.793125] ================================================================== [ 32.793184] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.793238] Read of size 1 at addr fff00000c9a8b600 by task kunit_try_catch/227 [ 32.793680] [ 32.793726] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.793831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.793860] Hardware name: linux,dummy-virt (DT) [ 32.794242] Call trace: [ 32.794292] show_stack+0x20/0x38 (C) [ 32.794391] dump_stack_lvl+0x8c/0xd0 [ 32.794439] print_report+0x118/0x5e8 [ 32.794494] kasan_report+0xdc/0x128 [ 32.794537] __asan_report_load1_noabort+0x20/0x30 [ 32.794586] ksize_uaf+0x598/0x5f8 [ 32.794629] kunit_try_run_case+0x170/0x3f0 [ 32.794683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.794737] kthread+0x328/0x630 [ 32.794788] ret_from_fork+0x10/0x20 [ 32.794836] [ 32.794855] Allocated by task 227: [ 32.794892] kasan_save_stack+0x3c/0x68 [ 32.794931] kasan_save_track+0x20/0x40 [ 32.795392] kasan_save_alloc_info+0x40/0x58 [ 32.795567] __kasan_kmalloc+0xd4/0xd8 [ 32.795638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.795819] ksize_uaf+0xb8/0x5f8 [ 32.795898] kunit_try_run_case+0x170/0x3f0 [ 32.796054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.796129] kthread+0x328/0x630 [ 32.796349] ret_from_fork+0x10/0x20 [ 32.796972] [ 32.797271] Freed by task 227: [ 32.797350] kasan_save_stack+0x3c/0x68 [ 32.797421] kasan_save_track+0x20/0x40 [ 32.797488] kasan_save_free_info+0x4c/0x78 [ 32.797849] __kasan_slab_free+0x6c/0x98 [ 32.798314] kfree+0x214/0x3c8 [ 32.798398] ksize_uaf+0x11c/0x5f8 [ 32.798666] kunit_try_run_case+0x170/0x3f0 [ 32.798730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.799138] kthread+0x328/0x630 [ 32.799191] ret_from_fork+0x10/0x20 [ 32.799229] [ 32.799250] The buggy address belongs to the object at fff00000c9a8b600 [ 32.799250] which belongs to the cache kmalloc-128 of size 128 [ 32.799860] The buggy address is located 0 bytes inside of [ 32.799860] freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680) [ 32.799998] [ 32.800093] The buggy address belongs to the physical page: [ 32.800179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.800305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.800382] page_type: f5(slab) [ 32.800473] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.800563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.800865] page dumped because: kasan: bad access detected [ 32.801050] [ 32.801123] Memory state around the buggy address: [ 32.801535] fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.801694] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.801829] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.801871] ^ [ 32.801919] fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802135] fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.802181] ================================================================== [ 32.805233] ================================================================== [ 32.805638] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.805765] Read of size 1 at addr fff00000c9a8b678 by task kunit_try_catch/227 [ 32.805839] [ 32.805896] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.805993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.806021] Hardware name: linux,dummy-virt (DT) [ 32.806340] Call trace: [ 32.806384] show_stack+0x20/0x38 (C) [ 32.806435] dump_stack_lvl+0x8c/0xd0 [ 32.806482] print_report+0x118/0x5e8 [ 32.806776] kasan_report+0xdc/0x128 [ 32.807143] __asan_report_load1_noabort+0x20/0x30 [ 32.807275] ksize_uaf+0x544/0x5f8 [ 32.807380] kunit_try_run_case+0x170/0x3f0 [ 32.808040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.808142] kthread+0x328/0x630 [ 32.808283] ret_from_fork+0x10/0x20 [ 32.808400] [ 32.808458] Allocated by task 227: [ 32.808488] kasan_save_stack+0x3c/0x68 [ 32.808566] kasan_save_track+0x20/0x40 [ 32.808894] kasan_save_alloc_info+0x40/0x58 [ 32.809039] __kasan_kmalloc+0xd4/0xd8 [ 32.809128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.809279] ksize_uaf+0xb8/0x5f8 [ 32.809377] kunit_try_run_case+0x170/0x3f0 [ 32.809635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.809793] kthread+0x328/0x630 [ 32.810053] ret_from_fork+0x10/0x20 [ 32.810154] [ 32.810209] Freed by task 227: [ 32.810294] kasan_save_stack+0x3c/0x68 [ 32.810344] kasan_save_track+0x20/0x40 [ 32.810418] kasan_save_free_info+0x4c/0x78 [ 32.810457] __kasan_slab_free+0x6c/0x98 [ 32.810869] kfree+0x214/0x3c8 [ 32.810992] ksize_uaf+0x11c/0x5f8 [ 32.811126] kunit_try_run_case+0x170/0x3f0 [ 32.811261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.811360] kthread+0x328/0x630 [ 32.811602] ret_from_fork+0x10/0x20 [ 32.811795] [ 32.811882] The buggy address belongs to the object at fff00000c9a8b600 [ 32.811882] which belongs to the cache kmalloc-128 of size 128 [ 32.811957] The buggy address is located 120 bytes inside of [ 32.811957] freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680) [ 32.812190] [ 32.812786] The buggy address belongs to the physical page: [ 32.812830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.812887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.812935] page_type: f5(slab) [ 32.812973] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.813026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.813067] page dumped because: kasan: bad access detected [ 32.813099] [ 32.813118] Memory state around the buggy address: [ 32.813150] fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.813196] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.813237] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.813275] ^ [ 32.813316] fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.813357] fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.813396] ================================================================== [ 32.781213] ================================================================== [ 32.781338] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 32.781446] Read of size 1 at addr fff00000c9a8b600 by task kunit_try_catch/227 [ 32.781767] [ 32.781814] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 32.781912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.781940] Hardware name: linux,dummy-virt (DT) [ 32.782096] Call trace: [ 32.782136] show_stack+0x20/0x38 (C) [ 32.782190] dump_stack_lvl+0x8c/0xd0 [ 32.782235] print_report+0x118/0x5e8 [ 32.782413] kasan_report+0xdc/0x128 [ 32.782759] __kasan_check_byte+0x54/0x70 [ 32.782831] ksize+0x30/0x88 [ 32.782875] ksize_uaf+0x168/0x5f8 [ 32.783228] kunit_try_run_case+0x170/0x3f0 [ 32.783317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.783450] kthread+0x328/0x630 [ 32.783546] ret_from_fork+0x10/0x20 [ 32.783663] [ 32.783714] Allocated by task 227: [ 32.783815] kasan_save_stack+0x3c/0x68 [ 32.783856] kasan_save_track+0x20/0x40 [ 32.783919] kasan_save_alloc_info+0x40/0x58 [ 32.783963] __kasan_kmalloc+0xd4/0xd8 [ 32.784386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.784528] ksize_uaf+0xb8/0x5f8 [ 32.784645] kunit_try_run_case+0x170/0x3f0 [ 32.784803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.784901] kthread+0x328/0x630 [ 32.784951] ret_from_fork+0x10/0x20 [ 32.784989] [ 32.785264] Freed by task 227: [ 32.785420] kasan_save_stack+0x3c/0x68 [ 32.785561] kasan_save_track+0x20/0x40 [ 32.785626] kasan_save_free_info+0x4c/0x78 [ 32.785781] __kasan_slab_free+0x6c/0x98 [ 32.785881] kfree+0x214/0x3c8 [ 32.786155] ksize_uaf+0x11c/0x5f8 [ 32.786328] kunit_try_run_case+0x170/0x3f0 [ 32.786390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.786565] kthread+0x328/0x630 [ 32.786642] ret_from_fork+0x10/0x20 [ 32.786793] [ 32.786873] The buggy address belongs to the object at fff00000c9a8b600 [ 32.786873] which belongs to the cache kmalloc-128 of size 128 [ 32.787084] The buggy address is located 0 bytes inside of [ 32.787084] freed 128-byte region [fff00000c9a8b600, fff00000c9a8b680) [ 32.787155] [ 32.787178] The buggy address belongs to the physical page: [ 32.787459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8b [ 32.787531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.787659] page_type: f5(slab) [ 32.787725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.787849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.787938] page dumped because: kasan: bad access detected [ 32.788061] [ 32.788094] Memory state around the buggy address: [ 32.788154] fff00000c9a8b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.788370] fff00000c9a8b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788621] >fff00000c9a8b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.788720] ^ [ 32.788820] fff00000c9a8b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788908] fff00000c9a8b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.788989] ==================================================================
[ 27.333420] ================================================================== [ 27.333970] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 27.334198] Read of size 1 at addr ffff888104c4a900 by task kunit_try_catch/244 [ 27.334416] [ 27.334507] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 27.334560] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.334583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.334604] Call Trace: [ 27.334617] <TASK> [ 27.334637] dump_stack_lvl+0x73/0xb0 [ 27.334666] print_report+0xd1/0x640 [ 27.334688] ? __virt_addr_valid+0x1db/0x2d0 [ 27.334713] ? ksize_uaf+0x19d/0x6c0 [ 27.334732] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.334757] ? ksize_uaf+0x19d/0x6c0 [ 27.334776] kasan_report+0x141/0x180 [ 27.334797] ? ksize_uaf+0x19d/0x6c0 [ 27.334820] ? ksize_uaf+0x19d/0x6c0 [ 27.334840] __kasan_check_byte+0x3d/0x50 [ 27.334860] ksize+0x20/0x60 [ 27.334880] ksize_uaf+0x19d/0x6c0 [ 27.334900] ? __pfx_ksize_uaf+0x10/0x10 [ 27.334920] ? __schedule+0x10da/0x2b60 [ 27.334945] ? __pfx_read_tsc+0x10/0x10 [ 27.334966] ? ktime_get_ts64+0x86/0x230 [ 27.334991] kunit_try_run_case+0x1a5/0x480 [ 27.335016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.335060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.335084] ? __kthread_parkme+0x82/0x180 [ 27.335105] ? preempt_count_sub+0x50/0x80 [ 27.335128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.335173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.335195] kthread+0x337/0x6f0 [ 27.335213] ? trace_preempt_on+0x20/0xc0 [ 27.335237] ? __pfx_kthread+0x10/0x10 [ 27.335263] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.335285] ? calculate_sigpending+0x7b/0xa0 [ 27.335309] ? __pfx_kthread+0x10/0x10 [ 27.335329] ret_from_fork+0x116/0x1d0 [ 27.335347] ? __pfx_kthread+0x10/0x10 [ 27.335366] ret_from_fork_asm+0x1a/0x30 [ 27.335398] </TASK> [ 27.335408] [ 27.349539] Allocated by task 244: [ 27.349700] kasan_save_stack+0x45/0x70 [ 27.350381] kasan_save_track+0x18/0x40 [ 27.350874] kasan_save_alloc_info+0x3b/0x50 [ 27.351347] __kasan_kmalloc+0xb7/0xc0 [ 27.351722] __kmalloc_cache_noprof+0x189/0x420 [ 27.352214] ksize_uaf+0xaa/0x6c0 [ 27.352418] kunit_try_run_case+0x1a5/0x480 [ 27.352559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.352741] kthread+0x337/0x6f0 [ 27.353228] ret_from_fork+0x116/0x1d0 [ 27.353566] ret_from_fork_asm+0x1a/0x30 [ 27.354018] [ 27.354175] Freed by task 244: [ 27.354441] kasan_save_stack+0x45/0x70 [ 27.354803] kasan_save_track+0x18/0x40 [ 27.355233] kasan_save_free_info+0x3f/0x60 [ 27.355645] __kasan_slab_free+0x56/0x70 [ 27.355848] kfree+0x222/0x3f0 [ 27.356119] ksize_uaf+0x12c/0x6c0 [ 27.356442] kunit_try_run_case+0x1a5/0x480 [ 27.356860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.357173] kthread+0x337/0x6f0 [ 27.357292] ret_from_fork+0x116/0x1d0 [ 27.357418] ret_from_fork_asm+0x1a/0x30 [ 27.357551] [ 27.357633] The buggy address belongs to the object at ffff888104c4a900 [ 27.357633] which belongs to the cache kmalloc-128 of size 128 [ 27.358180] The buggy address is located 0 bytes inside of [ 27.358180] freed 128-byte region [ffff888104c4a900, ffff888104c4a980) [ 27.358620] [ 27.358690] The buggy address belongs to the physical page: [ 27.358943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c4a [ 27.359287] flags: 0x200000000000000(node=0|zone=2) [ 27.359448] page_type: f5(slab) [ 27.359704] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.360095] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.360398] page dumped because: kasan: bad access detected [ 27.360638] [ 27.360724] Memory state around the buggy address: [ 27.361085] ffff888104c4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.361372] ffff888104c4a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.361597] >ffff888104c4a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.361972] ^ [ 27.362811] ffff888104c4a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.363376] ffff888104c4aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.363606] ================================================================== [ 27.390139] ================================================================== [ 27.390464] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 27.390787] Read of size 1 at addr ffff888104c4a978 by task kunit_try_catch/244 [ 27.391741] [ 27.392078] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 27.392138] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.392152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.392270] Call Trace: [ 27.392287] <TASK> [ 27.392306] dump_stack_lvl+0x73/0xb0 [ 27.392339] print_report+0xd1/0x640 [ 27.392365] ? __virt_addr_valid+0x1db/0x2d0 [ 27.392392] ? ksize_uaf+0x5e4/0x6c0 [ 27.392413] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.392439] ? ksize_uaf+0x5e4/0x6c0 [ 27.392460] kasan_report+0x141/0x180 [ 27.392483] ? ksize_uaf+0x5e4/0x6c0 [ 27.392509] __asan_report_load1_noabort+0x18/0x20 [ 27.392533] ksize_uaf+0x5e4/0x6c0 [ 27.392554] ? __pfx_ksize_uaf+0x10/0x10 [ 27.392584] ? __schedule+0x10da/0x2b60 [ 27.392609] ? __pfx_read_tsc+0x10/0x10 [ 27.392631] ? ktime_get_ts64+0x86/0x230 [ 27.392655] kunit_try_run_case+0x1a5/0x480 [ 27.392680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.392701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.392725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.392750] ? __kthread_parkme+0x82/0x180 [ 27.392770] ? preempt_count_sub+0x50/0x80 [ 27.392804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.392828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.392850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.392873] kthread+0x337/0x6f0 [ 27.392893] ? trace_preempt_on+0x20/0xc0 [ 27.392961] ? __pfx_kthread+0x10/0x10 [ 27.392985] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.393008] ? calculate_sigpending+0x7b/0xa0 [ 27.393032] ? __pfx_kthread+0x10/0x10 [ 27.393053] ret_from_fork+0x116/0x1d0 [ 27.393072] ? __pfx_kthread+0x10/0x10 [ 27.393092] ret_from_fork_asm+0x1a/0x30 [ 27.393123] </TASK> [ 27.393133] [ 27.401685] Allocated by task 244: [ 27.402118] kasan_save_stack+0x45/0x70 [ 27.402331] kasan_save_track+0x18/0x40 [ 27.402480] kasan_save_alloc_info+0x3b/0x50 [ 27.402684] __kasan_kmalloc+0xb7/0xc0 [ 27.402855] __kmalloc_cache_noprof+0x189/0x420 [ 27.403120] ksize_uaf+0xaa/0x6c0 [ 27.403237] kunit_try_run_case+0x1a5/0x480 [ 27.403383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.403546] kthread+0x337/0x6f0 [ 27.403719] ret_from_fork+0x116/0x1d0 [ 27.403898] ret_from_fork_asm+0x1a/0x30 [ 27.404184] [ 27.404326] Freed by task 244: [ 27.404498] kasan_save_stack+0x45/0x70 [ 27.404710] kasan_save_track+0x18/0x40 [ 27.404837] kasan_save_free_info+0x3f/0x60 [ 27.404971] __kasan_slab_free+0x56/0x70 [ 27.405099] kfree+0x222/0x3f0 [ 27.405211] ksize_uaf+0x12c/0x6c0 [ 27.405466] kunit_try_run_case+0x1a5/0x480 [ 27.405841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.406213] kthread+0x337/0x6f0 [ 27.406380] ret_from_fork+0x116/0x1d0 [ 27.406542] ret_from_fork_asm+0x1a/0x30 [ 27.406726] [ 27.406792] The buggy address belongs to the object at ffff888104c4a900 [ 27.406792] which belongs to the cache kmalloc-128 of size 128 [ 27.407541] The buggy address is located 120 bytes inside of [ 27.407541] freed 128-byte region [ffff888104c4a900, ffff888104c4a980) [ 27.408140] [ 27.408239] The buggy address belongs to the physical page: [ 27.408485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c4a [ 27.408990] flags: 0x200000000000000(node=0|zone=2) [ 27.409199] page_type: f5(slab) [ 27.409556] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.409939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.410367] page dumped because: kasan: bad access detected [ 27.410626] [ 27.410715] Memory state around the buggy address: [ 27.411015] ffff888104c4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.411291] ffff888104c4a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.411564] >ffff888104c4a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.411772] ^ [ 27.411974] ffff888104c4a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.412173] ffff888104c4aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.412369] ================================================================== [ 27.364210] ================================================================== [ 27.364886] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 27.365739] Read of size 1 at addr ffff888104c4a900 by task kunit_try_catch/244 [ 27.366125] [ 27.366428] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 27.366481] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.366539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.366560] Call Trace: [ 27.366595] <TASK> [ 27.366614] dump_stack_lvl+0x73/0xb0 [ 27.366645] print_report+0xd1/0x640 [ 27.366668] ? __virt_addr_valid+0x1db/0x2d0 [ 27.366692] ? ksize_uaf+0x5fe/0x6c0 [ 27.366712] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.366737] ? ksize_uaf+0x5fe/0x6c0 [ 27.366782] kasan_report+0x141/0x180 [ 27.366815] ? ksize_uaf+0x5fe/0x6c0 [ 27.366839] __asan_report_load1_noabort+0x18/0x20 [ 27.366864] ksize_uaf+0x5fe/0x6c0 [ 27.366884] ? __pfx_ksize_uaf+0x10/0x10 [ 27.366920] ? __schedule+0x10da/0x2b60 [ 27.366945] ? __pfx_read_tsc+0x10/0x10 [ 27.366967] ? ktime_get_ts64+0x86/0x230 [ 27.366992] kunit_try_run_case+0x1a5/0x480 [ 27.367017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.367039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.367063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.367088] ? __kthread_parkme+0x82/0x180 [ 27.367108] ? preempt_count_sub+0x50/0x80 [ 27.367131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.367154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.367176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.367199] kthread+0x337/0x6f0 [ 27.367219] ? trace_preempt_on+0x20/0xc0 [ 27.367243] ? __pfx_kthread+0x10/0x10 [ 27.367268] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.367291] ? calculate_sigpending+0x7b/0xa0 [ 27.367314] ? __pfx_kthread+0x10/0x10 [ 27.367335] ret_from_fork+0x116/0x1d0 [ 27.367354] ? __pfx_kthread+0x10/0x10 [ 27.367373] ret_from_fork_asm+0x1a/0x30 [ 27.367405] </TASK> [ 27.367415] [ 27.375869] Allocated by task 244: [ 27.376097] kasan_save_stack+0x45/0x70 [ 27.376306] kasan_save_track+0x18/0x40 [ 27.376479] kasan_save_alloc_info+0x3b/0x50 [ 27.376629] __kasan_kmalloc+0xb7/0xc0 [ 27.377089] __kmalloc_cache_noprof+0x189/0x420 [ 27.377479] ksize_uaf+0xaa/0x6c0 [ 27.377660] kunit_try_run_case+0x1a5/0x480 [ 27.377963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.378182] kthread+0x337/0x6f0 [ 27.378348] ret_from_fork+0x116/0x1d0 [ 27.378690] ret_from_fork_asm+0x1a/0x30 [ 27.378986] [ 27.379081] Freed by task 244: [ 27.379243] kasan_save_stack+0x45/0x70 [ 27.379506] kasan_save_track+0x18/0x40 [ 27.379699] kasan_save_free_info+0x3f/0x60 [ 27.380013] __kasan_slab_free+0x56/0x70 [ 27.380333] kfree+0x222/0x3f0 [ 27.380546] ksize_uaf+0x12c/0x6c0 [ 27.380726] kunit_try_run_case+0x1a5/0x480 [ 27.381018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.381257] kthread+0x337/0x6f0 [ 27.381422] ret_from_fork+0x116/0x1d0 [ 27.381571] ret_from_fork_asm+0x1a/0x30 [ 27.382129] [ 27.382269] The buggy address belongs to the object at ffff888104c4a900 [ 27.382269] which belongs to the cache kmalloc-128 of size 128 [ 27.382833] The buggy address is located 0 bytes inside of [ 27.382833] freed 128-byte region [ffff888104c4a900, ffff888104c4a980) [ 27.383389] [ 27.383485] The buggy address belongs to the physical page: [ 27.383754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c4a [ 27.384206] flags: 0x200000000000000(node=0|zone=2) [ 27.384466] page_type: f5(slab) [ 27.384654] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.385111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.385444] page dumped because: kasan: bad access detected [ 27.385691] [ 27.385793] Memory state around the buggy address: [ 27.386061] ffff888104c4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.386382] ffff888104c4a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.386694] >ffff888104c4a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.387275] ^ [ 27.387621] ffff888104c4a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.388150] ffff888104c4aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.388358] ==================================================================