RBP: 00007ff151010d69 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff1511b5fa0 R15: 00007ffec6478c18 ================================================================== BUG: KASAN: slab-use-after-free in vidtv_psi_eit_event_destroy+0xe9/0x100 drivers/media/test-drivers/vidtv/vidtv_psi.c:2043 Read of size 8 at addr ffff888035b30a94 by task syz.0.12/5995 CPU: 1 UID: 0 PID: 5995 Comm: syz.0.12 Not tainted 6.16.0-syzkaller-00857-gced1b9e0392d #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xcd/0x630 mm/kasan/report.c:482 kasan_report+0xe0/0x110 mm/kasan/report.c:595 vidtv_psi_eit_event_destroy+0xe9/0x100 drivers/media/test-drivers/vidtv/vidtv_psi.c:2043 vidtv_channel_si_init+0x15cd/0x1a50 drivers/media/test-drivers/vidtv/vidtv_channel.c:491 vidtv_mux_init+0x526/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:519 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline] vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering+0x3a8/0x660 drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_filter_start+0x785/0xe10 drivers/media/dvb-core/dmxdev.c:757 dvb_demux_do_ioctl+0xa63/0x12f0 drivers/media/dvb-core/dmxdev.c:1050 dvb_usercopy+0x164/0x340 drivers/media/dvb-core/dvbdev.c:999 dvb_demux_ioctl+0x29/0x40 drivers/media/dvb-core/dmxdev.c:1186 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:598 [inline] __se_sys_ioctl fs/ioctl.c:584 [inline] __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff150f8e9a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff151dc6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff1511b5fa0 RCX: 00007ff150f8e9a9 RDX: 0010000000000402 RSI: 0000000000006f29 RDI: 0000000000000003 RBP: 00007ff151010d69 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff1511b5fa0 R15: 00007ffec6478c18 Allocated by task 5995: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] vidtv_psi_eit_event_init+0xe0/0x3f0 drivers/media/test-drivers/vidtv/vidtv_psi.c:1985 vidtv_channel_eit_event_cat_into_new drivers/media/test-drivers/vidtv/vidtv_channel.c:182 [inline] vidtv_channel_si_init+0x897/0x1a50 drivers/media/test-drivers/vidtv/vidtv_channel.c:439 vidtv_mux_init+0x526/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:519 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline] vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering+0x3a8/0x660 drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_filter_start+0x785/0xe10 drivers/media/dvb-core/dmxdev.c:757 dvb_demux_do_ioctl+0xa63/0x12f0 drivers/media/dvb-core/dmxdev.c:1050 dvb_usercopy+0x164/0x340 drivers/media/dvb-core/dvbdev.c:999 dvb_demux_ioctl+0x29/0x40 drivers/media/dvb-core/dmxdev.c:1186 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:598 [inline] __se_sys_ioctl fs/ioctl.c:584 [inline] __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 5995: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kfree+0x2b4/0x4d0 mm/slub.c:4842 vidtv_psi_eit_event_destroy drivers/media/test-drivers/vidtv/vidtv_psi.c:2045 [inline] vidtv_psi_eit_table_destroy+0x133/0x180 drivers/media/test-drivers/vidtv/vidtv_psi.c:2051 vidtv_channel_si_init+0x163d/0x1a50 drivers/media/test-drivers/vidtv/vidtv_channel.c:485 vidtv_mux_init+0x526/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:519 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline] vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239 dmx_section_feed_start_filtering+0x3a8/0x660 drivers/media/dvb-core/dvb_demux.c:973 dvb_dmxdev_filter_start+0x785/0xe10 drivers/media/dvb-core/dmxdev.c:757 dvb_demux_do_ioctl+0xa63/0x12f0 drivers/media/dvb-core/dmxdev.c:1050 dvb_usercopy+0x164/0x340 drivers/media/dvb-core/dvbdev.c:999 dvb_demux_ioctl+0x29/0x40 drivers/media/dvb-core/dmxdev.c:1186 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:598 [inline] __se_sys_ioctl fs/ioctl.c:584 [inline] __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f The buggy address belongs to the object at ffff888035b30a80 which belongs to the cache kmalloc-32 of size 32 The buggy address is located 20 bytes inside of freed 32-byte region [ffff888035b30a80, ffff888035b30aa0) The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x35b30 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f5(slab) raw: 00fff00000000000 ffff88801b841780 ffffea0000ca29c0 0000000000000004 raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52800(GFP_NOWAIT|__GFP_NORETRY|__GFP_COMP), pid 5715, tgid 5715 (sed), ts 83459584972, free_ts 67576788156 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1c0/0x230 mm/page_alloc.c:1704 prep_new_page mm/page_alloc.c:1712 [inline] get_page_from_freelist+0x1321/0x3890 mm/page_alloc.c:3669 __alloc_frozen_pages_noprof+0x261/0x23f0 mm/page_alloc.c:4959 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2419 alloc_slab_page mm/slub.c:2451 [inline] allocate_slab mm/slub.c:2619 [inline] new_slab+0x23b/0x330 mm/slub.c:2673 ___slab_alloc+0xd9c/0x1940 mm/slub.c:3859 __slab_alloc.constprop.0+0x56/0xb0 mm/slub.c:3949 __slab_alloc_node mm/slub.c:4024 [inline] slab_alloc_node mm/slub.c:4185 [inline] __kmalloc_cache_noprof+0xfb/0x3e0 mm/slub.c:4354 kmalloc_noprof include/linux/slab.h:905 [inline] slab_free_hook mm/slub.c:2333 [inline] slab_free mm/slub.c:4643 [inline] kmem_cache_free+0x142/0x4d0 mm/slub.c:4745 vms_complete_munmap_vmas+0x573/0x970 mm/vma.c:1288 do_vmi_align_munmap+0x43b/0x7d0 mm/vma.c:1531 do_vmi_munmap+0x204/0x3e0 mm/vma.c:1579 __vm_munmap+0x19a/0x390 mm/vma.c:3108 elf_map fs/binfmt_elf.c:382 [inline] elf_load+0x349/0x780 fs/binfmt_elf.c:407 load_elf_binary+0x1409/0x4fb0 fs/binfmt_elf.c:1173 search_binary_handler fs/exec.c:1670 [inline] exec_binprm fs/exec.c:1702 [inline] bprm_execve fs/exec.c:1754 [inline] bprm_execve+0x8c3/0x1650 fs/exec.c:1730 page last free pid 5513 tgid 5513 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1248 [inline] __free_frozen_pages+0x7fe/0x1180 mm/page_alloc.c:2706 discard_slab mm/slub.c:2717 [inline] __put_partials+0x16d/0x1c0 mm/slub.c:3186 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4d/0x120 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4148 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_node_noprof+0x1d5/0x3b0 mm/slub.c:4249 __alloc_skb+0x2b2/0x380 net/core/skbuff.c:660 alloc_skb include/linux/skbuff.h:1336 [inline] alloc_skb_with_frags+0xe0/0x860 net/core/skbuff.c:6665 sock_alloc_send_pskb+0x7fb/0x990 net/core/sock.c:2999 unix_dgram_sendmsg+0x3e9/0x17d0 net/unix/af_unix.c:2102 unix_seqpacket_sendmsg+0x12a/0x1c0 net/unix/af_unix.c:2497 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg net/socket.c:727 [inline] sock_write_iter+0x4fc/0x5b0 net/socket.c:1177 do_iter_readv_writev+0x654/0x950 fs/read_write.c:827 vfs_writev+0x35f/0xde0 fs/read_write.c:1057 do_writev+0x28c/0x340 fs/read_write.c:1103 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94 Memory state around the buggy address: ffff888035b30980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc ffff888035b30a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc >ffff888035b30a80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc ^ ffff888035b30b00: 00 00 00 fc fc fc fc fc 00 00 00 05 fc fc fc fc ffff888035b30b80: 00 00 05 fc fc fc fc fc 00 00 00 fc fc fc fc fc ==================================================================