Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  104.923313] ==================================================================
[  104.924175] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xb0/0x1d0
[  104.925380] Read of size 1 at addr ffff0000c683c000 by task kunit_try_catch/208
[  104.926364] 
[  104.926661] CPU: 1 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  104.927707] Hardware name: linux,dummy-virt (DT)
[  104.928348] Call trace:
[  104.928864]  dump_backtrace+0xe0/0x134
[  104.929539]  show_stack+0x20/0x2c
[  104.930124]  dump_stack_lvl+0x88/0xb4
[  104.930777]  print_report+0x158/0x44c
[  104.931404]  kasan_report+0xc8/0x180
[  104.932002]  __asan_load1+0x68/0x74
[  104.932674]  kmalloc_pagealloc_uaf+0xb0/0x1d0
[  104.933441]  kunit_try_run_case+0x8c/0x124
[  104.933919]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  104.934408]  kthread+0x15c/0x170
[  104.934783]  ret_from_fork+0x10/0x20
[  104.935393] 
[  104.935697] The buggy address belongs to the physical page:
[  104.936482] page:00000000e328b301 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10683c
[  104.937702] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  104.938609] raw: 0bfffc0000000000 fffffc00031a1008 ffff0000da7b76b8 0000000000000000
[  104.939568] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[  104.940527] page dumped because: kasan: bad access detected
[  104.941284] 
[  104.941574] Memory state around the buggy address:
[  104.942235]  ffff0000c683bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.943133]  ffff0000c683bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  104.944028] >ffff0000c683c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  104.944944]                    ^
[  104.945427]  ffff0000c683c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  104.946198]  ffff0000c683c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[  104.947049] ==================================================================

[   74.718669] ==================================================================
[   74.719590] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c
[   74.720338] Read of size 1 at addr ffff0000c5a24000 by task kunit_try_catch/124
[   74.720894] 
[   74.721135] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.721904] Hardware name: linux,dummy-virt (DT)
[   74.722329] Call trace:
[   74.722604]  dump_backtrace+0xf8/0x118
[   74.723147]  show_stack+0x18/0x24
[   74.723699]  __dump_stack+0x28/0x38
[   74.724143]  dump_stack_lvl+0x54/0x6c
[   74.724622]  print_address_description+0x7c/0x1ec
[   74.725210]  print_report+0x50/0x68
[   74.725697]  kasan_report+0xac/0x100
[   74.726178]  __asan_load1+0x6c/0x70
[   74.726618]  kmalloc_pagealloc_uaf+0x88/0x12c
[   74.727096]  kunit_try_run_case+0x80/0x184
[   74.727588]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.728162]  kthread+0x16c/0x21c
[   74.728606]  ret_from_fork+0x10/0x20
[   74.729074] 
[   74.729301] The buggy address belongs to the physical page:
[   74.729781] page:0000000021e95fe4 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   74.730570] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.731219] raw: 0bfffc0000000000 ffff0000daf62fb8 ffff0000daf62fb8 0000000000000000
[   74.731910] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   74.732493] page dumped because: kasan: bad access detected
[   74.732994] 
[   74.733260] Memory state around the buggy address:
[   74.733697]  ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.734302]  ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.734990] >ffff0000c5a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.735841]                    ^
[   74.736330]  ffff0000c5a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.737325]  ffff0000c5a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.738307] ==================================================================

[   73.702692] ==================================================================
[   73.703603] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c
[   73.705547] Read of size 1 at addr ffff0000c58c8000 by task kunit_try_catch/124
[   73.707400] 
[   73.708179] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.709421] Hardware name: linux,dummy-virt (DT)
[   73.710162] Call trace:
[   73.710940]  dump_backtrace+0xf4/0x114
[   73.711952]  show_stack+0x18/0x24
[   73.712644]  __dump_stack+0x28/0x38
[   73.713499]  dump_stack_lvl+0x50/0x68
[   73.714311]  print_address_description+0x7c/0x1ec
[   73.715174]  print_report+0x50/0x68
[   73.716039]  kasan_report+0xac/0xfc
[   73.716847]  __asan_load1+0x6c/0x70
[   73.717277]  kmalloc_pagealloc_uaf+0x88/0x12c
[   73.717703]  kunit_try_run_case+0x80/0x184
[   73.718503]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.719294]  kthread+0x16c/0x21c
[   73.720021]  ret_from_fork+0x10/0x20
[   73.720569] 
[   73.720774] The buggy address belongs to the physical page:
[   73.721419] page:000000000dfb6053 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   73.722124] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   73.722677] raw: 0bfffc0000000000 ffff0000daf64fb8 ffff0000daf64fb8 0000000000000000
[   73.723696] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   73.724728] page dumped because: kasan: bad access detected
[   73.725461] 
[   73.725768] Memory state around the buggy address:
[   73.726413]  ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.727320]  ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.728351] >ffff0000c58c8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.729171]                    ^
[   73.729575]  ffff0000c58c8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.730072]  ffff0000c58c8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.730525] ==================================================================

[   72.333163] ==================================================================
[   72.334193] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xa8/0x1d0
[   72.335243] Read of size 1 at addr ffff0000c5a04000 by task kunit_try_catch/124
[   72.335836] 
[   72.336080] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.336865] Hardware name: linux,dummy-virt (DT)
[   72.337294] Call trace:
[   72.337592]  dump_backtrace.part.0+0xdc/0xf0
[   72.338118]  show_stack+0x18/0x30
[   72.338810]  dump_stack_lvl+0x64/0x80
[   72.339216]  print_report+0x158/0x438
[   72.339653]  kasan_report+0xb4/0xf4
[   72.340028]  __asan_load1+0x68/0x74
[   72.340446]  kmalloc_pagealloc_uaf+0xa8/0x1d0
[   72.340934]  kunit_try_run_case+0x84/0x120
[   72.341435]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.342270]  kthread+0x180/0x190
[   72.342702]  ret_from_fork+0x10/0x20
[   72.343101] 
[   72.343310] The buggy address belongs to the physical page:
[   72.343846] page:00000000275a55ef refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04
[   72.344594] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   72.345213] raw: 0bfffc0000000000 fffffc0003168208 ffff0000dac48ff8 0000000000000000
[   72.346059] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   72.346682] page dumped because: kasan: bad access detected
[   72.347097] 
[   72.347269] Memory state around the buggy address:
[   72.347726]  ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.348296]  ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.349105] >ffff0000c5a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.349720]                    ^
[   72.350280]  ffff0000c5a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.350900]  ffff0000c5a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.351484] ==================================================================

[   64.032305] ==================================================================
[   64.033004] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xc8/0x1d0
[   64.033932] Read of size 1 at addr ffff0000c5994000 by task kunit_try_catch/122
[   64.034677] 
[   64.034929] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.036009] Hardware name: linux,dummy-virt (DT)
[   64.036620] Call trace:
[   64.037003]  dump_backtrace+0x110/0x120
[   64.037599]  show_stack+0x18/0x28
[   64.038196]  dump_stack_lvl+0x68/0x84
[   64.038803]  print_report+0x158/0x484
[   64.039370]  kasan_report+0x98/0xe0
[   64.039827]  __asan_load1+0x68/0x78
[   64.040134]  kmalloc_pagealloc_uaf+0xc8/0x1d0
[   64.040515]  kunit_try_run_case+0x7c/0x120
[   64.040872]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.041414]  kthread+0x1a4/0x1b8
[   64.042012]  ret_from_fork+0x10/0x20
[   64.042585] 
[   64.042862] The buggy address belongs to the physical page:
[   64.043571] page:00000000b32ac4a2 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105994
[   64.044632] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   64.045573] raw: 0bfffc0000000000 fffffc0003166608 ffff0000dac50ff8 0000000000000000
[   64.046503] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   64.047369] page dumped because: kasan: bad access detected
[   64.048008] 
[   64.048259] Memory state around the buggy address:
[   64.048832]  ffff0000c5993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.049731]  ffff0000c5993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.050670] >ffff0000c5994000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.051592]                    ^
[   64.052043]  ffff0000c5994080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.052858]  ffff0000c5994100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.053759] ==================================================================

[   30.361472] ==================================================================
[   30.362191] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xad/0x1a0
[   30.363506] Read of size 1 at addr ffff8881036bc000 by task kunit_try_catch/228
[   30.364386] 
[   30.364555] CPU: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.364870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.365204] Call Trace:
[   30.365334]  <TASK>
[   30.365447]  dump_stack_lvl+0x49/0x62
[   30.365640]  print_report+0x189/0x492
[   30.365819]  ? kasan_addr_to_slab+0xd/0xb0
[   30.366006]  ? kmalloc_pagealloc_uaf+0xad/0x1a0
[   30.366828]  kasan_report+0x10c/0x190
[   30.367143]  ? kmalloc_pagealloc_uaf+0xad/0x1a0
[   30.367685]  __asan_load1+0x62/0x70
[   30.367964]  kmalloc_pagealloc_uaf+0xad/0x1a0
[   30.368387]  ? kmalloc_pagealloc_invalid_free+0x1b0/0x1b0
[   30.368862]  ? __kunit_add_resource+0xd1/0x100
[   30.369273]  ? kasan_test_init+0x13e/0x1b0
[   30.369723]  kunit_try_run_case+0x8f/0xd0
[   30.370025]  ? kunit_catch_run_case+0x80/0x80
[   30.370481]  ? kunit_try_catch_throw+0x40/0x40
[   30.370750]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.371036]  kthread+0x17b/0x1b0
[   30.371209]  ? kthread_complete_and_exit+0x30/0x30
[   30.371476]  ret_from_fork+0x22/0x30
[   30.371718]  </TASK>
[   30.371866] 
[   30.371966] The buggy address belongs to the physical page:
[   30.372298] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036bc
[   30.372692] flags: 0x200000000000000(node=0|zone=2)
[   30.373018] raw: 0200000000000000 ffffea00040db008 ffff88815b43b2b8 0000000000000000
[   30.373539] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.373918] page dumped because: kasan: bad access detected
[   30.374738] 
[   30.374985] Memory state around the buggy address:
[   30.375566]  ffff8881036bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.375932]  ffff8881036bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.376387] >ffff8881036bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.376822]                    ^
[   30.377404]  ffff8881036bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.378384]  ffff8881036bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.378986] ==================================================================