Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 59.175659] ================================================================== [ 59.182922] BUG: KASAN: slab-use-after-free in ksize_uaf+0x68c/0x740 [ 59.189331] Read of size 1 at addr cc228f78 by task kunit_try_catch/252 [ 59.195983] [ 59.197509] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 59.197540] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.197540] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.197540] Call trace: [ 59.197570] unwind_backtrace from show_stack+0x18/0x1c [ 59.197601] show_stack from dump_stack_lvl+0x70/0x90 [ 59.197601] dump_stack_lvl from print_report+0x158/0x528 [ 59.197631] print_report from kasan_report+0xdc/0x118 [ 59.197662] kasan_report from ksize_uaf+0x68c/0x740 [ 59.197692] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 59.197692] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.197723] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 59.197753] kthread from ret_from_fork+0x14/0x20 [ 59.197784] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 59.197784] bfa0: 00000000 00000000 00000000 00000000 [ 59.197814] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.197814] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.197845] [ 59.301300] Allocated by task 252: [ 59.304748] kasan_save_track+0x30/0x5c [ 59.308593] __kasan_kmalloc+0x8c/0x94 [ 59.312377] ksize_uaf+0xd0/0x740 [ 59.315734] kunit_try_run_case+0x22c/0x5a8 [ 59.319946] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.325469] kthread+0x464/0x810 [ 59.328735] ret_from_fork+0x14/0x20 [ 59.332336] [ 59.333831] Freed by task 252: [ 59.336914] kasan_save_track+0x30/0x5c [ 59.340789] kasan_save_free_info+0x3c/0x48 [ 59.345001] __kasan_slab_free+0x40/0x50 [ 59.348937] kfree+0xe8/0x384 [ 59.351959] ksize_uaf+0x174/0x740 [ 59.355377] kunit_try_run_case+0x22c/0x5a8 [ 59.359588] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.365112] kthread+0x464/0x810 [ 59.368377] ret_from_fork+0x14/0x20 [ 59.371978] [ 59.373474] The buggy address belongs to the object at cc228f00 [ 59.373474] which belongs to the cache kmalloc-128 of size 128 [ 59.385375] The buggy address is located 120 bytes inside of [ 59.385375] freed 128-byte region [cc228f00, cc228f80) [ 59.396331] [ 59.397827] The buggy address belongs to the physical page: [ 59.403442] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 59.410705] flags: 0x0(zone=0) [ 59.413787] page_type: f5(slab) [ 59.416961] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 59.425079] raw: 00000000 [ 59.427734] page dumped because: kasan: bad access detected [ 59.433349] [ 59.434844] Memory state around the buggy address: [ 59.439666] cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.446228] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.452819] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.459381] ^ [ 59.465850] cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.472442] cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.479003] ================================================================== [ 58.547912] ================================================================== [ 58.559448] BUG: KASAN: slab-use-after-free in ksize_uaf+0x1f0/0x740 [ 58.565856] Read of size 1 at addr cc228f00 by task kunit_try_catch/252 [ 58.572509] [ 58.574035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.574066] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.574066] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.574066] Call trace: [ 58.574066] unwind_backtrace from show_stack+0x18/0x1c [ 58.574096] show_stack from dump_stack_lvl+0x70/0x90 [ 58.574127] dump_stack_lvl from print_report+0x158/0x528 [ 58.574157] print_report from kasan_report+0xdc/0x118 [ 58.574188] kasan_report from __kasan_check_byte+0x34/0x3c [ 58.574188] __kasan_check_byte from ksize+0x20/0x3c [ 58.574218] ksize from ksize_uaf+0x1f0/0x740 [ 58.574249] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.574249] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.574279] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.574310] kthread from ret_from_fork+0x14/0x20 [ 58.574340] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 58.574340] bfa0: 00000000 00000000 00000000 00000000 [ 58.574371] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.574371] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.574401] [ 58.687835] Allocated by task 252: [ 58.691253] kasan_save_track+0x30/0x5c [ 58.695129] __kasan_kmalloc+0x8c/0x94 [ 58.698913] ksize_uaf+0xd0/0x740 [ 58.702270] kunit_try_run_case+0x22c/0x5a8 [ 58.706481] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.712005] kthread+0x464/0x810 [ 58.715270] ret_from_fork+0x14/0x20 [ 58.718872] [ 58.720367] Freed by task 252: [ 58.723449] kasan_save_track+0x30/0x5c [ 58.727294] kasan_save_free_info+0x3c/0x48 [ 58.731536] __kasan_slab_free+0x40/0x50 [ 58.735473] kfree+0xe8/0x384 [ 58.738464] ksize_uaf+0x174/0x740 [ 58.741912] kunit_try_run_case+0x22c/0x5a8 [ 58.746124] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.751647] kthread+0x464/0x810 [ 58.754913] ret_from_fork+0x14/0x20 [ 58.758514] [ 58.760009] The buggy address belongs to the object at cc228f00 [ 58.760009] which belongs to the cache kmalloc-128 of size 128 [ 58.771911] The buggy address is located 0 bytes inside of [ 58.771911] freed 128-byte region [cc228f00, cc228f80) [ 58.782684] [ 58.784179] The buggy address belongs to the physical page: [ 58.789794] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 58.797058] flags: 0x0(zone=0) [ 58.800140] page_type: f5(slab) [ 58.803314] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 58.811462] raw: 00000000 [ 58.814086] page dumped because: kasan: bad access detected [ 58.819702] [ 58.821197] Memory state around the buggy address: [ 58.826019] cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.832611] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.839172] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.845733] ^ [ 58.848297] cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.854858] cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.861450] ================================================================== [ 58.869079] ================================================================== [ 58.876373] BUG: KASAN: slab-use-after-free in ksize_uaf+0x6c8/0x740 [ 58.882751] Read of size 1 at addr cc228f00 by task kunit_try_catch/252 [ 58.889434] [ 58.890930] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 58.890960] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 58.890960] Hardware name: Generic DRA74X (Flattened Device Tree) [ 58.890991] Call trace: [ 58.890991] unwind_backtrace from show_stack+0x18/0x1c [ 58.891021] show_stack from dump_stack_lvl+0x70/0x90 [ 58.891021] dump_stack_lvl from print_report+0x158/0x528 [ 58.891052] print_report from kasan_report+0xdc/0x118 [ 58.891082] kasan_report from ksize_uaf+0x6c8/0x740 [ 58.891113] ksize_uaf from kunit_try_run_case+0x22c/0x5a8 [ 58.891113] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 58.891143] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 58.891174] kthread from ret_from_fork+0x14/0x20 [ 58.891204] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 58.891204] bfa0: 00000000 00000000 00000000 00000000 [ 58.891235] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 58.891235] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 58.891265] [ 58.994720] Allocated by task 252: [ 58.998168] kasan_save_track+0x30/0x5c [ 59.002014] __kasan_kmalloc+0x8c/0x94 [ 59.005828] ksize_uaf+0xd0/0x740 [ 59.009155] kunit_try_run_case+0x22c/0x5a8 [ 59.013366] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.018890] kthread+0x464/0x810 [ 59.022155] ret_from_fork+0x14/0x20 [ 59.025756] [ 59.027252] Freed by task 252: [ 59.030334] kasan_save_track+0x30/0x5c [ 59.034210] kasan_save_free_info+0x3c/0x48 [ 59.038421] __kasan_slab_free+0x40/0x50 [ 59.042358] kfree+0xe8/0x384 [ 59.045379] ksize_uaf+0x174/0x740 [ 59.048797] kunit_try_run_case+0x22c/0x5a8 [ 59.053009] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.058532] kthread+0x464/0x810 [ 59.061798] ret_from_fork+0x14/0x20 [ 59.065399] [ 59.066894] The buggy address belongs to the object at cc228f00 [ 59.066894] which belongs to the cache kmalloc-128 of size 128 [ 59.078796] The buggy address is located 0 bytes inside of [ 59.078796] freed 128-byte region [cc228f00, cc228f80) [ 59.089569] [ 59.091064] The buggy address belongs to the physical page: [ 59.096679] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c228 [ 59.103973] flags: 0x0(zone=0) [ 59.107025] page_type: f5(slab) [ 59.110198] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000 [ 59.118347] raw: 00000000 [ 59.121002] page dumped because: kasan: bad access detected [ 59.126586] [ 59.128112] Memory state around the buggy address: [ 59.132934] cc228e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.139495] cc228e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.146057] >cc228f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.152648] ^ [ 59.155181] cc228f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.161773] cc229000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.168334] ==================================================================
[ 30.271466] ================================================================== [ 30.282984] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 30.289343] Read of size 1 at addr ffff88810633a600 by task kunit_try_catch/239 [ 30.296651] [ 30.298151] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 30.298159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.298162] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.298165] Call Trace: [ 30.298167] <TASK> [ 30.298169] dump_stack_lvl+0x73/0xb0 [ 30.298172] print_report+0xd1/0x650 [ 30.298177] ? __virt_addr_valid+0x1db/0x2d0 [ 30.298180] ? ksize_uaf+0x19d/0x6c0 [ 30.298184] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.298189] ? ksize_uaf+0x19d/0x6c0 [ 30.298193] kasan_report+0x141/0x180 [ 30.298197] ? ksize_uaf+0x19d/0x6c0 [ 30.298201] ? ksize_uaf+0x19d/0x6c0 [ 30.298205] __kasan_check_byte+0x3d/0x50 [ 30.298210] ksize+0x20/0x60 [ 30.298213] ksize_uaf+0x19d/0x6c0 [ 30.298217] ? __pfx_ksize_uaf+0x10/0x10 [ 30.298221] ? __schedule+0x10cc/0x2b30 [ 30.298226] ? ktime_get_ts64+0x83/0x230 [ 30.298230] kunit_try_run_case+0x1a2/0x480 [ 30.298235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.298239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.298244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.298248] ? __kthread_parkme+0x82/0x180 [ 30.298252] ? preempt_count_sub+0x50/0x80 [ 30.298257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.298261] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.298265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.298269] kthread+0x334/0x6f0 [ 30.298273] ? trace_preempt_on+0x20/0xc0 [ 30.298277] ? __pfx_kthread+0x10/0x10 [ 30.298282] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.298286] ? calculate_sigpending+0x7b/0xa0 [ 30.298290] ? __pfx_kthread+0x10/0x10 [ 30.298294] ret_from_fork+0x3e/0x80 [ 30.298298] ? __pfx_kthread+0x10/0x10 [ 30.298302] ret_from_fork_asm+0x1a/0x30 [ 30.298308] </TASK> [ 30.298309] [ 30.463303] Allocated by task 239: [ 30.466755] kasan_save_stack+0x45/0x70 [ 30.470599] kasan_save_track+0x18/0x40 [ 30.474438] kasan_save_alloc_info+0x3b/0x50 [ 30.478723] __kasan_kmalloc+0xb7/0xc0 [ 30.482505] __kmalloc_cache_noprof+0x189/0x420 [ 30.487040] ksize_uaf+0xaa/0x6c0 [ 30.490358] kunit_try_run_case+0x1a2/0x480 [ 30.494545] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.499943] kthread+0x334/0x6f0 [ 30.503174] ret_from_fork+0x3e/0x80 [ 30.506764] ret_from_fork_asm+0x1a/0x30 [ 30.510703] [ 30.512249] Freed by task 239: [ 30.515310] kasan_save_stack+0x45/0x70 [ 30.519147] kasan_save_track+0x18/0x40 [ 30.522987] kasan_save_free_info+0x3f/0x60 [ 30.527171] __kasan_slab_free+0x56/0x70 [ 30.531099] kfree+0x222/0x3f0 [ 30.534158] ksize_uaf+0x12c/0x6c0 [ 30.537562] kunit_try_run_case+0x1a2/0x480 [ 30.541757] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.547157] kthread+0x334/0x6f0 [ 30.550389] ret_from_fork+0x3e/0x80 [ 30.553969] ret_from_fork_asm+0x1a/0x30 [ 30.557894] [ 30.559394] The buggy address belongs to the object at ffff88810633a600 [ 30.559394] which belongs to the cache kmalloc-128 of size 128 [ 30.571908] The buggy address is located 0 bytes inside of [ 30.571908] freed 128-byte region [ffff88810633a600, ffff88810633a680) [ 30.583989] [ 30.585486] The buggy address belongs to the physical page: [ 30.591060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 30.599058] flags: 0x200000000000000(node=0|zone=2) [ 30.603939] page_type: f5(slab) [ 30.607084] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.614825] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.622571] page dumped because: kasan: bad access detected [ 30.628142] [ 30.629642] Memory state around the buggy address: [ 30.634436] ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.641654] ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.648908] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.656125] ^ [ 30.659361] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666587] ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.673805] ================================================================== [ 31.080729] ================================================================== [ 31.087959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 31.094318] Read of size 1 at addr ffff88810633a678 by task kunit_try_catch/239 [ 31.101625] [ 31.103125] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 31.103133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.103135] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 31.103138] Call Trace: [ 31.103139] <TASK> [ 31.103141] dump_stack_lvl+0x73/0xb0 [ 31.103144] print_report+0xd1/0x650 [ 31.103149] ? __virt_addr_valid+0x1db/0x2d0 [ 31.103152] ? ksize_uaf+0x5e4/0x6c0 [ 31.103156] ? kasan_complete_mode_report_info+0x64/0x200 [ 31.103160] ? ksize_uaf+0x5e4/0x6c0 [ 31.103164] kasan_report+0x141/0x180 [ 31.103168] ? ksize_uaf+0x5e4/0x6c0 [ 31.103173] __asan_report_load1_noabort+0x18/0x20 [ 31.103176] ksize_uaf+0x5e4/0x6c0 [ 31.103180] ? __pfx_ksize_uaf+0x10/0x10 [ 31.103184] ? __schedule+0x10cc/0x2b30 [ 31.103189] ? ktime_get_ts64+0x83/0x230 [ 31.103193] kunit_try_run_case+0x1a2/0x480 [ 31.103197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.103201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.103206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.103210] ? __kthread_parkme+0x82/0x180 [ 31.103214] ? preempt_count_sub+0x50/0x80 [ 31.103219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.103223] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.103226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.103230] kthread+0x334/0x6f0 [ 31.103234] ? trace_preempt_on+0x20/0xc0 [ 31.103239] ? __pfx_kthread+0x10/0x10 [ 31.103243] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.103247] ? calculate_sigpending+0x7b/0xa0 [ 31.103250] ? __pfx_kthread+0x10/0x10 [ 31.103254] ret_from_fork+0x3e/0x80 [ 31.103258] ? __pfx_kthread+0x10/0x10 [ 31.103262] ret_from_fork_asm+0x1a/0x30 [ 31.103268] </TASK> [ 31.103269] [ 31.262617] Allocated by task 239: [ 31.266022] kasan_save_stack+0x45/0x70 [ 31.269862] kasan_save_track+0x18/0x40 [ 31.273704] kasan_save_alloc_info+0x3b/0x50 [ 31.278019] __kasan_kmalloc+0xb7/0xc0 [ 31.281771] __kmalloc_cache_noprof+0x189/0x420 [ 31.286302] ksize_uaf+0xaa/0x6c0 [ 31.289621] kunit_try_run_case+0x1a2/0x480 [ 31.293807] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.299208] kthread+0x334/0x6f0 [ 31.302438] ret_from_fork+0x3e/0x80 [ 31.306018] ret_from_fork_asm+0x1a/0x30 [ 31.309944] [ 31.311445] Freed by task 239: [ 31.314502] kasan_save_stack+0x45/0x70 [ 31.318343] kasan_save_track+0x18/0x40 [ 31.322182] kasan_save_free_info+0x3f/0x60 [ 31.326367] __kasan_slab_free+0x56/0x70 [ 31.330294] kfree+0x222/0x3f0 [ 31.333353] ksize_uaf+0x12c/0x6c0 [ 31.336766] kunit_try_run_case+0x1a2/0x480 [ 31.340953] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.346352] kthread+0x334/0x6f0 [ 31.349593] ret_from_fork+0x3e/0x80 [ 31.353172] ret_from_fork_asm+0x1a/0x30 [ 31.357098] [ 31.358597] The buggy address belongs to the object at ffff88810633a600 [ 31.358597] which belongs to the cache kmalloc-128 of size 128 [ 31.371112] The buggy address is located 120 bytes inside of [ 31.371112] freed 128-byte region [ffff88810633a600, ffff88810633a680) [ 31.383365] [ 31.384864] The buggy address belongs to the physical page: [ 31.390437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 31.398445] flags: 0x200000000000000(node=0|zone=2) [ 31.403322] page_type: f5(slab) [ 31.406471] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.414219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.421965] page dumped because: kasan: bad access detected [ 31.427536] [ 31.429037] Memory state around the buggy address: [ 31.433830] ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.441057] ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.448275] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.455494] ^ [ 31.462626] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.469845] ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.477065] ================================================================== [ 30.681051] ================================================================== [ 30.688280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 30.694639] Read of size 1 at addr ffff88810633a600 by task kunit_try_catch/239 [ 30.701946] [ 30.703445] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 30.703453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.703455] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.703458] Call Trace: [ 30.703460] <TASK> [ 30.703462] dump_stack_lvl+0x73/0xb0 [ 30.703465] print_report+0xd1/0x650 [ 30.703469] ? __virt_addr_valid+0x1db/0x2d0 [ 30.703473] ? ksize_uaf+0x5fe/0x6c0 [ 30.703477] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.703481] ? ksize_uaf+0x5fe/0x6c0 [ 30.703485] kasan_report+0x141/0x180 [ 30.703489] ? ksize_uaf+0x5fe/0x6c0 [ 30.703494] __asan_report_load1_noabort+0x18/0x20 [ 30.703497] ksize_uaf+0x5fe/0x6c0 [ 30.703501] ? __pfx_ksize_uaf+0x10/0x10 [ 30.703505] ? __schedule+0x10cc/0x2b30 [ 30.703510] ? ktime_get_ts64+0x83/0x230 [ 30.703514] kunit_try_run_case+0x1a2/0x480 [ 30.703519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.703523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.703527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.703532] ? __kthread_parkme+0x82/0x180 [ 30.703535] ? preempt_count_sub+0x50/0x80 [ 30.703540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.703544] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.703548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.703552] kthread+0x334/0x6f0 [ 30.703556] ? trace_preempt_on+0x20/0xc0 [ 30.703560] ? __pfx_kthread+0x10/0x10 [ 30.703564] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.703568] ? calculate_sigpending+0x7b/0xa0 [ 30.703572] ? __pfx_kthread+0x10/0x10 [ 30.703576] ret_from_fork+0x3e/0x80 [ 30.703580] ? __pfx_kthread+0x10/0x10 [ 30.703584] ret_from_fork_asm+0x1a/0x30 [ 30.703590] </TASK> [ 30.703591] [ 30.862913] Allocated by task 239: [ 30.866318] kasan_save_stack+0x45/0x70 [ 30.870158] kasan_save_track+0x18/0x40 [ 30.873996] kasan_save_alloc_info+0x3b/0x50 [ 30.878270] __kasan_kmalloc+0xb7/0xc0 [ 30.882022] __kmalloc_cache_noprof+0x189/0x420 [ 30.886555] ksize_uaf+0xaa/0x6c0 [ 30.889874] kunit_try_run_case+0x1a2/0x480 [ 30.894057] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.899458] kthread+0x334/0x6f0 [ 30.902702] ret_from_fork+0x3e/0x80 [ 30.906330] ret_from_fork_asm+0x1a/0x30 [ 30.910255] [ 30.911754] Freed by task 239: [ 30.914814] kasan_save_stack+0x45/0x70 [ 30.918653] kasan_save_track+0x18/0x40 [ 30.922517] kasan_save_free_info+0x3f/0x60 [ 30.926718] __kasan_slab_free+0x56/0x70 [ 30.930700] kfree+0x222/0x3f0 [ 30.933784] ksize_uaf+0x12c/0x6c0 [ 30.937192] kunit_try_run_case+0x1a2/0x480 [ 30.941386] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.946786] kthread+0x334/0x6f0 [ 30.950024] ret_from_fork+0x3e/0x80 [ 30.953603] ret_from_fork_asm+0x1a/0x30 [ 30.957532] [ 30.959030] The buggy address belongs to the object at ffff88810633a600 [ 30.959030] which belongs to the cache kmalloc-128 of size 128 [ 30.971543] The buggy address is located 0 bytes inside of [ 30.971543] freed 128-byte region [ffff88810633a600, ffff88810633a680) [ 30.983624] [ 30.985125] The buggy address belongs to the physical page: [ 30.990703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a [ 30.998752] flags: 0x200000000000000(node=0|zone=2) [ 31.003635] page_type: f5(slab) [ 31.006782] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.014529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.022268] page dumped because: kasan: bad access detected [ 31.027839] [ 31.029340] Memory state around the buggy address: [ 31.034134] ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.041361] ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.048587] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.055805] ^ [ 31.059039] ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.066259] ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.073487] ==================================================================