Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.609078] ================================================================== [ 18.609782] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.609927] Read of size 1 at addr fff00000c7732778 by task kunit_try_catch/197 [ 18.610198] [ 18.610397] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.610675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.610726] Hardware name: linux,dummy-virt (DT) [ 18.610766] Call trace: [ 18.610792] show_stack+0x20/0x38 (C) [ 18.610866] dump_stack_lvl+0x8c/0xd0 [ 18.610981] print_report+0x118/0x608 [ 18.611036] kasan_report+0xdc/0x128 [ 18.611560] __asan_report_load1_noabort+0x20/0x30 [ 18.611651] ksize_uaf+0x544/0x5f8 [ 18.611703] kunit_try_run_case+0x170/0x3f0 [ 18.611896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.611971] kthread+0x328/0x630 [ 18.612023] ret_from_fork+0x10/0x20 [ 18.612200] [ 18.612253] Allocated by task 197: [ 18.612296] kasan_save_stack+0x3c/0x68 [ 18.612348] kasan_save_track+0x20/0x40 [ 18.612389] kasan_save_alloc_info+0x40/0x58 [ 18.612448] __kasan_kmalloc+0xd4/0xd8 [ 18.612487] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.612538] ksize_uaf+0xb8/0x5f8 [ 18.612584] kunit_try_run_case+0x170/0x3f0 [ 18.612625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.612685] kthread+0x328/0x630 [ 18.612734] ret_from_fork+0x10/0x20 [ 18.612781] [ 18.612802] Freed by task 197: [ 18.612833] kasan_save_stack+0x3c/0x68 [ 18.612875] kasan_save_track+0x20/0x40 [ 18.612914] kasan_save_free_info+0x4c/0x78 [ 18.612969] __kasan_slab_free+0x6c/0x98 [ 18.613018] kfree+0x214/0x3c8 [ 18.613065] ksize_uaf+0x11c/0x5f8 [ 18.613113] kunit_try_run_case+0x170/0x3f0 [ 18.613577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.613950] kthread+0x328/0x630 [ 18.614329] ret_from_fork+0x10/0x20 [ 18.614419] [ 18.614467] The buggy address belongs to the object at fff00000c7732700 [ 18.614467] which belongs to the cache kmalloc-128 of size 128 [ 18.614721] The buggy address is located 120 bytes inside of [ 18.614721] freed 128-byte region [fff00000c7732700, fff00000c7732780) [ 18.614957] [ 18.615441] The buggy address belongs to the physical page: [ 18.615547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 18.615734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.615836] page_type: f5(slab) [ 18.616157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.616384] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.616590] page dumped because: kasan: bad access detected [ 18.616686] [ 18.616806] Memory state around the buggy address: [ 18.616897] fff00000c7732600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.616980] fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.617312] >fff00000c7732700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.617558] ^ [ 18.617662] fff00000c7732780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.617832] fff00000c7732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.617929] ================================================================== [ 18.583234] ================================================================== [ 18.583333] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.583409] Read of size 1 at addr fff00000c7732700 by task kunit_try_catch/197 [ 18.583466] [ 18.583513] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.583609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.583639] Hardware name: linux,dummy-virt (DT) [ 18.583674] Call trace: [ 18.583700] show_stack+0x20/0x38 (C) [ 18.583756] dump_stack_lvl+0x8c/0xd0 [ 18.583807] print_report+0x118/0x608 [ 18.583855] kasan_report+0xdc/0x128 [ 18.583902] __kasan_check_byte+0x54/0x70 [ 18.583954] ksize+0x30/0x88 [ 18.584021] ksize_uaf+0x168/0x5f8 [ 18.584069] kunit_try_run_case+0x170/0x3f0 [ 18.584143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.584202] kthread+0x328/0x630 [ 18.584247] ret_from_fork+0x10/0x20 [ 18.584301] [ 18.584321] Allocated by task 197: [ 18.584350] kasan_save_stack+0x3c/0x68 [ 18.584396] kasan_save_track+0x20/0x40 [ 18.584436] kasan_save_alloc_info+0x40/0x58 [ 18.584491] __kasan_kmalloc+0xd4/0xd8 [ 18.584531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.584954] ksize_uaf+0xb8/0x5f8 [ 18.585004] kunit_try_run_case+0x170/0x3f0 [ 18.585124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.585187] kthread+0x328/0x630 [ 18.585223] ret_from_fork+0x10/0x20 [ 18.585262] [ 18.585285] Freed by task 197: [ 18.585323] kasan_save_stack+0x3c/0x68 [ 18.585376] kasan_save_track+0x20/0x40 [ 18.585417] kasan_save_free_info+0x4c/0x78 [ 18.585461] __kasan_slab_free+0x6c/0x98 [ 18.585500] kfree+0x214/0x3c8 [ 18.585535] ksize_uaf+0x11c/0x5f8 [ 18.585692] kunit_try_run_case+0x170/0x3f0 [ 18.585740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.585789] kthread+0x328/0x630 [ 18.585825] ret_from_fork+0x10/0x20 [ 18.585891] [ 18.585936] The buggy address belongs to the object at fff00000c7732700 [ 18.585936] which belongs to the cache kmalloc-128 of size 128 [ 18.586022] The buggy address is located 0 bytes inside of [ 18.586022] freed 128-byte region [fff00000c7732700, fff00000c7732780) [ 18.586160] [ 18.586267] The buggy address belongs to the physical page: [ 18.586452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 18.586567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.586666] page_type: f5(slab) [ 18.586756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.586814] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.586892] page dumped because: kasan: bad access detected [ 18.586956] [ 18.587149] Memory state around the buggy address: [ 18.587201] fff00000c7732600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.587248] fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.587607] >fff00000c7732700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.587659] ^ [ 18.587691] fff00000c7732780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.587740] fff00000c7732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.587785] ================================================================== [ 18.589906] ================================================================== [ 18.589986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.590052] Read of size 1 at addr fff00000c7732700 by task kunit_try_catch/197 [ 18.590108] [ 18.590170] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.590263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.590291] Hardware name: linux,dummy-virt (DT) [ 18.590329] Call trace: [ 18.590353] show_stack+0x20/0x38 (C) [ 18.590409] dump_stack_lvl+0x8c/0xd0 [ 18.590460] print_report+0x118/0x608 [ 18.590510] kasan_report+0xdc/0x128 [ 18.590557] __asan_report_load1_noabort+0x20/0x30 [ 18.590612] ksize_uaf+0x598/0x5f8 [ 18.590658] kunit_try_run_case+0x170/0x3f0 [ 18.590707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.590763] kthread+0x328/0x630 [ 18.590808] ret_from_fork+0x10/0x20 [ 18.590860] [ 18.590879] Allocated by task 197: [ 18.590912] kasan_save_stack+0x3c/0x68 [ 18.590957] kasan_save_track+0x20/0x40 [ 18.590997] kasan_save_alloc_info+0x40/0x58 [ 18.591040] __kasan_kmalloc+0xd4/0xd8 [ 18.591078] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.591788] ksize_uaf+0xb8/0x5f8 [ 18.591949] kunit_try_run_case+0x170/0x3f0 [ 18.591996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.592425] kthread+0x328/0x630 [ 18.592740] ret_from_fork+0x10/0x20 [ 18.593076] [ 18.593320] Freed by task 197: [ 18.593733] kasan_save_stack+0x3c/0x68 [ 18.593966] kasan_save_track+0x20/0x40 [ 18.594233] kasan_save_free_info+0x4c/0x78 [ 18.594398] __kasan_slab_free+0x6c/0x98 [ 18.595220] kfree+0x214/0x3c8 [ 18.595758] ksize_uaf+0x11c/0x5f8 [ 18.596016] kunit_try_run_case+0x170/0x3f0 [ 18.596123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.596257] kthread+0x328/0x630 [ 18.596744] ret_from_fork+0x10/0x20 [ 18.596849] [ 18.597172] The buggy address belongs to the object at fff00000c7732700 [ 18.597172] which belongs to the cache kmalloc-128 of size 128 [ 18.597267] The buggy address is located 0 bytes inside of [ 18.597267] freed 128-byte region [fff00000c7732700, fff00000c7732780) [ 18.597353] [ 18.597859] The buggy address belongs to the physical page: [ 18.598314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732 [ 18.598572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.598775] page_type: f5(slab) [ 18.598982] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.599061] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.599329] page dumped because: kasan: bad access detected [ 18.599436] [ 18.599558] Memory state around the buggy address: [ 18.599680] fff00000c7732600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.599735] fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.599785] >fff00000c7732700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.599838] ^ [ 18.600272] fff00000c7732780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.600538] fff00000c7732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.600775] ==================================================================
[ 11.957628] ================================================================== [ 11.958406] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 11.958839] Read of size 1 at addr ffff888102ef5a00 by task kunit_try_catch/213 [ 11.959175] [ 11.959272] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.959319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.959331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.959352] Call Trace: [ 11.959364] <TASK> [ 11.959394] dump_stack_lvl+0x73/0xb0 [ 11.959425] print_report+0xd1/0x650 [ 11.959448] ? __virt_addr_valid+0x1db/0x2d0 [ 11.959472] ? ksize_uaf+0x19d/0x6c0 [ 11.959491] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.959511] ? ksize_uaf+0x19d/0x6c0 [ 11.959531] kasan_report+0x141/0x180 [ 11.959551] ? ksize_uaf+0x19d/0x6c0 [ 11.959694] ? ksize_uaf+0x19d/0x6c0 [ 11.959717] __kasan_check_byte+0x3d/0x50 [ 11.959738] ksize+0x20/0x60 [ 11.959759] ksize_uaf+0x19d/0x6c0 [ 11.959779] ? __pfx_ksize_uaf+0x10/0x10 [ 11.959799] ? __schedule+0x10cc/0x2b60 [ 11.959821] ? __pfx_read_tsc+0x10/0x10 [ 11.959842] ? ktime_get_ts64+0x86/0x230 [ 11.959866] kunit_try_run_case+0x1a5/0x480 [ 11.959892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.959912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.960010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.960033] ? __kthread_parkme+0x82/0x180 [ 11.960054] ? preempt_count_sub+0x50/0x80 [ 11.960079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.960102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.960125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.960146] kthread+0x337/0x6f0 [ 11.960164] ? trace_preempt_on+0x20/0xc0 [ 11.960187] ? __pfx_kthread+0x10/0x10 [ 11.960206] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.960225] ? calculate_sigpending+0x7b/0xa0 [ 11.960249] ? __pfx_kthread+0x10/0x10 [ 11.960270] ret_from_fork+0x116/0x1d0 [ 11.960289] ? __pfx_kthread+0x10/0x10 [ 11.960308] ret_from_fork_asm+0x1a/0x30 [ 11.960338] </TASK> [ 11.960350] [ 11.971055] Allocated by task 213: [ 11.971367] kasan_save_stack+0x45/0x70 [ 11.971688] kasan_save_track+0x18/0x40 [ 11.971914] kasan_save_alloc_info+0x3b/0x50 [ 11.972364] __kasan_kmalloc+0xb7/0xc0 [ 11.972550] __kmalloc_cache_noprof+0x189/0x420 [ 11.972763] ksize_uaf+0xaa/0x6c0 [ 11.972924] kunit_try_run_case+0x1a5/0x480 [ 11.973117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.973354] kthread+0x337/0x6f0 [ 11.973521] ret_from_fork+0x116/0x1d0 [ 11.974176] ret_from_fork_asm+0x1a/0x30 [ 11.974360] [ 11.974560] Freed by task 213: [ 11.974859] kasan_save_stack+0x45/0x70 [ 11.975184] kasan_save_track+0x18/0x40 [ 11.975583] kasan_save_free_info+0x3f/0x60 [ 11.975891] __kasan_slab_free+0x56/0x70 [ 11.976278] kfree+0x222/0x3f0 [ 11.976551] ksize_uaf+0x12c/0x6c0 [ 11.976850] kunit_try_run_case+0x1a5/0x480 [ 11.977126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.977466] kthread+0x337/0x6f0 [ 11.977683] ret_from_fork+0x116/0x1d0 [ 11.977852] ret_from_fork_asm+0x1a/0x30 [ 11.978294] [ 11.978410] The buggy address belongs to the object at ffff888102ef5a00 [ 11.978410] which belongs to the cache kmalloc-128 of size 128 [ 11.979330] The buggy address is located 0 bytes inside of [ 11.979330] freed 128-byte region [ffff888102ef5a00, ffff888102ef5a80) [ 11.980160] [ 11.980270] The buggy address belongs to the physical page: [ 11.980804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 11.981284] flags: 0x200000000000000(node=0|zone=2) [ 11.981538] page_type: f5(slab) [ 11.981734] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.982397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.982798] page dumped because: kasan: bad access detected [ 11.983277] [ 11.983394] Memory state around the buggy address: [ 11.983859] ffff888102ef5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.984310] ffff888102ef5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.984807] >ffff888102ef5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.985801] ^ [ 11.985970] ffff888102ef5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.986547] ffff888102ef5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.987325] ================================================================== [ 11.988506] ================================================================== [ 11.989529] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 11.990210] Read of size 1 at addr ffff888102ef5a00 by task kunit_try_catch/213 [ 11.990749] [ 11.990869] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.990916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.990928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.990947] Call Trace: [ 11.991204] <TASK> [ 11.991229] dump_stack_lvl+0x73/0xb0 [ 11.991263] print_report+0xd1/0x650 [ 11.991286] ? __virt_addr_valid+0x1db/0x2d0 [ 11.991310] ? ksize_uaf+0x5fe/0x6c0 [ 11.991329] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.991350] ? ksize_uaf+0x5fe/0x6c0 [ 11.991369] kasan_report+0x141/0x180 [ 11.991406] ? ksize_uaf+0x5fe/0x6c0 [ 11.991430] __asan_report_load1_noabort+0x18/0x20 [ 11.991453] ksize_uaf+0x5fe/0x6c0 [ 11.991472] ? __pfx_ksize_uaf+0x10/0x10 [ 11.991492] ? __schedule+0x10cc/0x2b60 [ 11.991513] ? __pfx_read_tsc+0x10/0x10 [ 11.991533] ? ktime_get_ts64+0x86/0x230 [ 11.991556] kunit_try_run_case+0x1a5/0x480 [ 11.991580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.991602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.991627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.991648] ? __kthread_parkme+0x82/0x180 [ 11.991669] ? preempt_count_sub+0x50/0x80 [ 11.991691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.991713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.991734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.991755] kthread+0x337/0x6f0 [ 11.991774] ? trace_preempt_on+0x20/0xc0 [ 11.991796] ? __pfx_kthread+0x10/0x10 [ 11.991816] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.991836] ? calculate_sigpending+0x7b/0xa0 [ 11.991858] ? __pfx_kthread+0x10/0x10 [ 11.991877] ret_from_fork+0x116/0x1d0 [ 11.991895] ? __pfx_kthread+0x10/0x10 [ 11.991914] ret_from_fork_asm+0x1a/0x30 [ 11.991943] </TASK> [ 11.991954] [ 12.004313] Allocated by task 213: [ 12.004520] kasan_save_stack+0x45/0x70 [ 12.004928] kasan_save_track+0x18/0x40 [ 12.005363] kasan_save_alloc_info+0x3b/0x50 [ 12.005922] __kasan_kmalloc+0xb7/0xc0 [ 12.006065] __kmalloc_cache_noprof+0x189/0x420 [ 12.006220] ksize_uaf+0xaa/0x6c0 [ 12.006342] kunit_try_run_case+0x1a5/0x480 [ 12.006798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.007343] kthread+0x337/0x6f0 [ 12.007656] ret_from_fork+0x116/0x1d0 [ 12.008043] ret_from_fork_asm+0x1a/0x30 [ 12.008559] [ 12.008731] Freed by task 213: [ 12.009240] kasan_save_stack+0x45/0x70 [ 12.009636] kasan_save_track+0x18/0x40 [ 12.010022] kasan_save_free_info+0x3f/0x60 [ 12.010291] __kasan_slab_free+0x56/0x70 [ 12.010441] kfree+0x222/0x3f0 [ 12.010560] ksize_uaf+0x12c/0x6c0 [ 12.010684] kunit_try_run_case+0x1a5/0x480 [ 12.010827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.010999] kthread+0x337/0x6f0 [ 12.011116] ret_from_fork+0x116/0x1d0 [ 12.011245] ret_from_fork_asm+0x1a/0x30 [ 12.011390] [ 12.011476] The buggy address belongs to the object at ffff888102ef5a00 [ 12.011476] which belongs to the cache kmalloc-128 of size 128 [ 12.012119] The buggy address is located 0 bytes inside of [ 12.012119] freed 128-byte region [ffff888102ef5a00, ffff888102ef5a80) [ 12.012736] [ 12.012814] The buggy address belongs to the physical page: [ 12.012986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 12.013344] flags: 0x200000000000000(node=0|zone=2) [ 12.013866] page_type: f5(slab) [ 12.014042] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.014467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.014773] page dumped because: kasan: bad access detected [ 12.015084] [ 12.015190] Memory state around the buggy address: [ 12.015399] ffff888102ef5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.015712] ffff888102ef5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.016076] >ffff888102ef5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.016288] ^ [ 12.016456] ffff888102ef5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.016786] ffff888102ef5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.017057] ================================================================== [ 12.017897] ================================================================== [ 12.018344] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 12.018780] Read of size 1 at addr ffff888102ef5a78 by task kunit_try_catch/213 [ 12.019189] [ 12.019306] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 12.019352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.019363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.019406] Call Trace: [ 12.019426] <TASK> [ 12.019445] dump_stack_lvl+0x73/0xb0 [ 12.019488] print_report+0xd1/0x650 [ 12.019512] ? __virt_addr_valid+0x1db/0x2d0 [ 12.019534] ? ksize_uaf+0x5e4/0x6c0 [ 12.019554] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.019587] ? ksize_uaf+0x5e4/0x6c0 [ 12.019606] kasan_report+0x141/0x180 [ 12.019627] ? ksize_uaf+0x5e4/0x6c0 [ 12.019652] __asan_report_load1_noabort+0x18/0x20 [ 12.019675] ksize_uaf+0x5e4/0x6c0 [ 12.019705] ? __pfx_ksize_uaf+0x10/0x10 [ 12.019725] ? __schedule+0x10cc/0x2b60 [ 12.019746] ? __pfx_read_tsc+0x10/0x10 [ 12.019777] ? ktime_get_ts64+0x86/0x230 [ 12.019800] kunit_try_run_case+0x1a5/0x480 [ 12.019824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.019845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.019867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.019888] ? __kthread_parkme+0x82/0x180 [ 12.019908] ? preempt_count_sub+0x50/0x80 [ 12.019941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.019963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.019984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.020054] kthread+0x337/0x6f0 [ 12.020087] ? trace_preempt_on+0x20/0xc0 [ 12.020111] ? __pfx_kthread+0x10/0x10 [ 12.020132] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.020152] ? calculate_sigpending+0x7b/0xa0 [ 12.020174] ? __pfx_kthread+0x10/0x10 [ 12.020194] ret_from_fork+0x116/0x1d0 [ 12.020212] ? __pfx_kthread+0x10/0x10 [ 12.020231] ret_from_fork_asm+0x1a/0x30 [ 12.020270] </TASK> [ 12.020281] [ 12.029005] Allocated by task 213: [ 12.029195] kasan_save_stack+0x45/0x70 [ 12.029354] kasan_save_track+0x18/0x40 [ 12.029559] kasan_save_alloc_info+0x3b/0x50 [ 12.029799] __kasan_kmalloc+0xb7/0xc0 [ 12.030268] __kmalloc_cache_noprof+0x189/0x420 [ 12.030518] ksize_uaf+0xaa/0x6c0 [ 12.030686] kunit_try_run_case+0x1a5/0x480 [ 12.030878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.031237] kthread+0x337/0x6f0 [ 12.031393] ret_from_fork+0x116/0x1d0 [ 12.031525] ret_from_fork_asm+0x1a/0x30 [ 12.031662] [ 12.031732] Freed by task 213: [ 12.032105] kasan_save_stack+0x45/0x70 [ 12.032301] kasan_save_track+0x18/0x40 [ 12.032504] kasan_save_free_info+0x3f/0x60 [ 12.032712] __kasan_slab_free+0x56/0x70 [ 12.032939] kfree+0x222/0x3f0 [ 12.033070] ksize_uaf+0x12c/0x6c0 [ 12.033303] kunit_try_run_case+0x1a5/0x480 [ 12.033500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.033760] kthread+0x337/0x6f0 [ 12.033879] ret_from_fork+0x116/0x1d0 [ 12.034009] ret_from_fork_asm+0x1a/0x30 [ 12.034202] [ 12.034310] The buggy address belongs to the object at ffff888102ef5a00 [ 12.034310] which belongs to the cache kmalloc-128 of size 128 [ 12.034996] The buggy address is located 120 bytes inside of [ 12.034996] freed 128-byte region [ffff888102ef5a00, ffff888102ef5a80) [ 12.035341] [ 12.035690] The buggy address belongs to the physical page: [ 12.035978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef5 [ 12.036466] flags: 0x200000000000000(node=0|zone=2) [ 12.036800] page_type: f5(slab) [ 12.037157] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.037416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.037642] page dumped because: kasan: bad access detected [ 12.038035] [ 12.038152] Memory state around the buggy address: [ 12.038408] ffff888102ef5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.038911] ffff888102ef5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.039321] >ffff888102ef5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.039583] ^ [ 12.040177] ffff888102ef5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.040527] ffff888102ef5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.040797] ==================================================================