Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.286368] ================================================================== [ 18.286427] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.286473] Read of size 1 at addr fff00000c3ec0778 by task kunit_try_catch/196 [ 18.286556] [ 18.286759] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.286867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.286955] Hardware name: linux,dummy-virt (DT) [ 18.286993] Call trace: [ 18.287063] show_stack+0x20/0x38 (C) [ 18.287270] dump_stack_lvl+0x8c/0xd0 [ 18.287458] print_report+0x118/0x608 [ 18.287519] kasan_report+0xdc/0x128 [ 18.287565] __asan_report_load1_noabort+0x20/0x30 [ 18.287624] ksize_uaf+0x544/0x5f8 [ 18.287669] kunit_try_run_case+0x170/0x3f0 [ 18.287714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.287766] kthread+0x328/0x630 [ 18.288069] ret_from_fork+0x10/0x20 [ 18.288283] [ 18.288398] Allocated by task 196: [ 18.288495] kasan_save_stack+0x3c/0x68 [ 18.288629] kasan_save_track+0x20/0x40 [ 18.288667] kasan_save_alloc_info+0x40/0x58 [ 18.288707] __kasan_kmalloc+0xd4/0xd8 [ 18.288750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.289130] ksize_uaf+0xb8/0x5f8 [ 18.289330] kunit_try_run_case+0x170/0x3f0 [ 18.289377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.289644] kthread+0x328/0x630 [ 18.289747] ret_from_fork+0x10/0x20 [ 18.289882] [ 18.290105] Freed by task 196: [ 18.290279] kasan_save_stack+0x3c/0x68 [ 18.290400] kasan_save_track+0x20/0x40 [ 18.290717] kasan_save_free_info+0x4c/0x78 [ 18.290846] __kasan_slab_free+0x6c/0x98 [ 18.290924] kfree+0x214/0x3c8 [ 18.291102] ksize_uaf+0x11c/0x5f8 [ 18.291334] kunit_try_run_case+0x170/0x3f0 [ 18.291457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.291505] kthread+0x328/0x630 [ 18.291857] ret_from_fork+0x10/0x20 [ 18.291928] [ 18.291991] The buggy address belongs to the object at fff00000c3ec0700 [ 18.291991] which belongs to the cache kmalloc-128 of size 128 [ 18.292053] The buggy address is located 120 bytes inside of [ 18.292053] freed 128-byte region [fff00000c3ec0700, fff00000c3ec0780) [ 18.292125] [ 18.292162] The buggy address belongs to the physical page: [ 18.292461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 18.292572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.292668] page_type: f5(slab) [ 18.292707] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.292901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.293094] page dumped because: kasan: bad access detected [ 18.293205] [ 18.293298] Memory state around the buggy address: [ 18.293660] fff00000c3ec0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.293742] fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.293799] >fff00000c3ec0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.293947] ^ [ 18.294021] fff00000c3ec0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.294228] fff00000c3ec0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.294384] ================================================================== [ 18.267887] ================================================================== [ 18.268288] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.268636] Read of size 1 at addr fff00000c3ec0700 by task kunit_try_catch/196 [ 18.268738] [ 18.268847] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.269058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.269289] Hardware name: linux,dummy-virt (DT) [ 18.269430] Call trace: [ 18.269536] show_stack+0x20/0x38 (C) [ 18.269889] dump_stack_lvl+0x8c/0xd0 [ 18.270141] print_report+0x118/0x608 [ 18.270264] kasan_report+0xdc/0x128 [ 18.270426] __kasan_check_byte+0x54/0x70 [ 18.270517] ksize+0x30/0x88 [ 18.270873] ksize_uaf+0x168/0x5f8 [ 18.270938] kunit_try_run_case+0x170/0x3f0 [ 18.271026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.271252] kthread+0x328/0x630 [ 18.271417] ret_from_fork+0x10/0x20 [ 18.271611] [ 18.271773] Allocated by task 196: [ 18.271902] kasan_save_stack+0x3c/0x68 [ 18.271952] kasan_save_track+0x20/0x40 [ 18.272333] kasan_save_alloc_info+0x40/0x58 [ 18.272527] __kasan_kmalloc+0xd4/0xd8 [ 18.272691] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.272799] ksize_uaf+0xb8/0x5f8 [ 18.272928] kunit_try_run_case+0x170/0x3f0 [ 18.273016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.273389] kthread+0x328/0x630 [ 18.273454] ret_from_fork+0x10/0x20 [ 18.273600] [ 18.273680] Freed by task 196: [ 18.273844] kasan_save_stack+0x3c/0x68 [ 18.273920] kasan_save_track+0x20/0x40 [ 18.274048] kasan_save_free_info+0x4c/0x78 [ 18.274090] __kasan_slab_free+0x6c/0x98 [ 18.274183] kfree+0x214/0x3c8 [ 18.274612] ksize_uaf+0x11c/0x5f8 [ 18.274744] kunit_try_run_case+0x170/0x3f0 [ 18.274912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.275163] kthread+0x328/0x630 [ 18.275368] ret_from_fork+0x10/0x20 [ 18.275495] [ 18.275627] The buggy address belongs to the object at fff00000c3ec0700 [ 18.275627] which belongs to the cache kmalloc-128 of size 128 [ 18.275784] The buggy address is located 0 bytes inside of [ 18.275784] freed 128-byte region [fff00000c3ec0700, fff00000c3ec0780) [ 18.275879] [ 18.275915] The buggy address belongs to the physical page: [ 18.276107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 18.276175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.276229] page_type: f5(slab) [ 18.276501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.276599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.276661] page dumped because: kasan: bad access detected [ 18.276786] [ 18.276917] Memory state around the buggy address: [ 18.277034] fff00000c3ec0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.277078] fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277120] >fff00000c3ec0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.277169] ^ [ 18.277198] fff00000c3ec0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277256] fff00000c3ec0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.277293] ================================================================== [ 18.279177] ================================================================== [ 18.279230] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.279349] Read of size 1 at addr fff00000c3ec0700 by task kunit_try_catch/196 [ 18.279403] [ 18.279459] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 18.279826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.279887] Hardware name: linux,dummy-virt (DT) [ 18.279985] Call trace: [ 18.280276] show_stack+0x20/0x38 (C) [ 18.280414] dump_stack_lvl+0x8c/0xd0 [ 18.280461] print_report+0x118/0x608 [ 18.280692] kasan_report+0xdc/0x128 [ 18.280855] __asan_report_load1_noabort+0x20/0x30 [ 18.280990] ksize_uaf+0x598/0x5f8 [ 18.281037] kunit_try_run_case+0x170/0x3f0 [ 18.281113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.281186] kthread+0x328/0x630 [ 18.281233] ret_from_fork+0x10/0x20 [ 18.281286] [ 18.281305] Allocated by task 196: [ 18.281332] kasan_save_stack+0x3c/0x68 [ 18.281382] kasan_save_track+0x20/0x40 [ 18.281430] kasan_save_alloc_info+0x40/0x58 [ 18.281478] __kasan_kmalloc+0xd4/0xd8 [ 18.281526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.281582] ksize_uaf+0xb8/0x5f8 [ 18.281615] kunit_try_run_case+0x170/0x3f0 [ 18.281661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.281709] kthread+0x328/0x630 [ 18.281757] ret_from_fork+0x10/0x20 [ 18.281793] [ 18.281813] Freed by task 196: [ 18.281854] kasan_save_stack+0x3c/0x68 [ 18.281891] kasan_save_track+0x20/0x40 [ 18.281928] kasan_save_free_info+0x4c/0x78 [ 18.281965] __kasan_slab_free+0x6c/0x98 [ 18.282002] kfree+0x214/0x3c8 [ 18.282035] ksize_uaf+0x11c/0x5f8 [ 18.282068] kunit_try_run_case+0x170/0x3f0 [ 18.282114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.282165] kthread+0x328/0x630 [ 18.282447] ret_from_fork+0x10/0x20 [ 18.282720] [ 18.282771] The buggy address belongs to the object at fff00000c3ec0700 [ 18.282771] which belongs to the cache kmalloc-128 of size 128 [ 18.282850] The buggy address is located 0 bytes inside of [ 18.282850] freed 128-byte region [fff00000c3ec0700, fff00000c3ec0780) [ 18.283041] [ 18.283088] The buggy address belongs to the physical page: [ 18.283119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec0 [ 18.283512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.283618] page_type: f5(slab) [ 18.283807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.283891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.284028] page dumped because: kasan: bad access detected [ 18.284091] [ 18.284111] Memory state around the buggy address: [ 18.284143] fff00000c3ec0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.284203] fff00000c3ec0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.284568] >fff00000c3ec0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.284632] ^ [ 18.284675] fff00000c3ec0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.284737] fff00000c3ec0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.284908] ==================================================================
[ 14.142007] ================================================================== [ 14.142405] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 14.142719] Read of size 1 at addr ffff8881021dbc00 by task kunit_try_catch/214 [ 14.142994] [ 14.143107] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.143156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.143171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.143195] Call Trace: [ 14.143214] <TASK> [ 14.143233] dump_stack_lvl+0x73/0xb0 [ 14.143266] print_report+0xd1/0x650 [ 14.143291] ? __virt_addr_valid+0x1db/0x2d0 [ 14.143316] ? ksize_uaf+0x5fe/0x6c0 [ 14.143339] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.143364] ? ksize_uaf+0x5fe/0x6c0 [ 14.143387] kasan_report+0x141/0x180 [ 14.143412] ? ksize_uaf+0x5fe/0x6c0 [ 14.143440] __asan_report_load1_noabort+0x18/0x20 [ 14.143467] ksize_uaf+0x5fe/0x6c0 [ 14.143490] ? __pfx_ksize_uaf+0x10/0x10 [ 14.143514] ? __schedule+0x10cc/0x2b60 [ 14.143540] ? __pfx_read_tsc+0x10/0x10 [ 14.143564] ? ktime_get_ts64+0x86/0x230 [ 14.143591] kunit_try_run_case+0x1a5/0x480 [ 14.143617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.143642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.143668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.143694] ? __kthread_parkme+0x82/0x180 [ 14.143717] ? preempt_count_sub+0x50/0x80 [ 14.143743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.143769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.144012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.144046] kthread+0x337/0x6f0 [ 14.144069] ? trace_preempt_on+0x20/0xc0 [ 14.144108] ? __pfx_kthread+0x10/0x10 [ 14.144131] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.144204] ? calculate_sigpending+0x7b/0xa0 [ 14.144231] ? __pfx_kthread+0x10/0x10 [ 14.144255] ret_from_fork+0x116/0x1d0 [ 14.144278] ? __pfx_kthread+0x10/0x10 [ 14.144301] ret_from_fork_asm+0x1a/0x30 [ 14.144335] </TASK> [ 14.144349] [ 14.152781] Allocated by task 214: [ 14.153021] kasan_save_stack+0x45/0x70 [ 14.153437] kasan_save_track+0x18/0x40 [ 14.153678] kasan_save_alloc_info+0x3b/0x50 [ 14.153905] __kasan_kmalloc+0xb7/0xc0 [ 14.154205] __kmalloc_cache_noprof+0x189/0x420 [ 14.154427] ksize_uaf+0xaa/0x6c0 [ 14.154612] kunit_try_run_case+0x1a5/0x480 [ 14.154845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.155088] kthread+0x337/0x6f0 [ 14.155343] ret_from_fork+0x116/0x1d0 [ 14.155611] ret_from_fork_asm+0x1a/0x30 [ 14.155840] [ 14.155953] Freed by task 214: [ 14.156106] kasan_save_stack+0x45/0x70 [ 14.156301] kasan_save_track+0x18/0x40 [ 14.156579] kasan_save_free_info+0x3f/0x60 [ 14.156876] __kasan_slab_free+0x56/0x70 [ 14.157039] kfree+0x222/0x3f0 [ 14.157408] ksize_uaf+0x12c/0x6c0 [ 14.157637] kunit_try_run_case+0x1a5/0x480 [ 14.157898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.158222] kthread+0x337/0x6f0 [ 14.158427] ret_from_fork+0x116/0x1d0 [ 14.158579] ret_from_fork_asm+0x1a/0x30 [ 14.158738] [ 14.158832] The buggy address belongs to the object at ffff8881021dbc00 [ 14.158832] which belongs to the cache kmalloc-128 of size 128 [ 14.159233] The buggy address is located 0 bytes inside of [ 14.159233] freed 128-byte region [ffff8881021dbc00, ffff8881021dbc80) [ 14.159830] [ 14.159942] The buggy address belongs to the physical page: [ 14.160230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db [ 14.160532] flags: 0x200000000000000(node=0|zone=2) [ 14.160719] page_type: f5(slab) [ 14.160869] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.161131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.161391] page dumped because: kasan: bad access detected [ 14.162047] [ 14.162173] Memory state around the buggy address: [ 14.162440] ffff8881021dbb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.163084] ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.163732] >ffff8881021dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.164123] ^ [ 14.164303] ffff8881021dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.164664] ffff8881021dbd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.164997] ================================================================== [ 14.115534] ================================================================== [ 14.116895] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 14.117832] Read of size 1 at addr ffff8881021dbc00 by task kunit_try_catch/214 [ 14.118384] [ 14.118643] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.118709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.118725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.118749] Call Trace: [ 14.118764] <TASK> [ 14.118785] dump_stack_lvl+0x73/0xb0 [ 14.118835] print_report+0xd1/0x650 [ 14.118861] ? __virt_addr_valid+0x1db/0x2d0 [ 14.118887] ? ksize_uaf+0x19d/0x6c0 [ 14.118910] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.118935] ? ksize_uaf+0x19d/0x6c0 [ 14.118958] kasan_report+0x141/0x180 [ 14.118982] ? ksize_uaf+0x19d/0x6c0 [ 14.119009] ? ksize_uaf+0x19d/0x6c0 [ 14.119031] __kasan_check_byte+0x3d/0x50 [ 14.119055] ksize+0x20/0x60 [ 14.119079] ksize_uaf+0x19d/0x6c0 [ 14.119102] ? __pfx_ksize_uaf+0x10/0x10 [ 14.119126] ? __schedule+0x10cc/0x2b60 [ 14.119151] ? __pfx_read_tsc+0x10/0x10 [ 14.119175] ? ktime_get_ts64+0x86/0x230 [ 14.119203] kunit_try_run_case+0x1a5/0x480 [ 14.119230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.119313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.119344] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.119370] ? __kthread_parkme+0x82/0x180 [ 14.119395] ? preempt_count_sub+0x50/0x80 [ 14.119422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.119448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.119473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.119499] kthread+0x337/0x6f0 [ 14.119520] ? trace_preempt_on+0x20/0xc0 [ 14.119546] ? __pfx_kthread+0x10/0x10 [ 14.119569] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.119593] ? calculate_sigpending+0x7b/0xa0 [ 14.119619] ? __pfx_kthread+0x10/0x10 [ 14.119643] ret_from_fork+0x116/0x1d0 [ 14.119665] ? __pfx_kthread+0x10/0x10 [ 14.119688] ret_from_fork_asm+0x1a/0x30 [ 14.119722] </TASK> [ 14.119736] [ 14.128684] Allocated by task 214: [ 14.128858] kasan_save_stack+0x45/0x70 [ 14.129056] kasan_save_track+0x18/0x40 [ 14.129672] kasan_save_alloc_info+0x3b/0x50 [ 14.129956] __kasan_kmalloc+0xb7/0xc0 [ 14.130179] __kmalloc_cache_noprof+0x189/0x420 [ 14.130391] ksize_uaf+0xaa/0x6c0 [ 14.130591] kunit_try_run_case+0x1a5/0x480 [ 14.130880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.131092] kthread+0x337/0x6f0 [ 14.131268] ret_from_fork+0x116/0x1d0 [ 14.131480] ret_from_fork_asm+0x1a/0x30 [ 14.131747] [ 14.131937] Freed by task 214: [ 14.132071] kasan_save_stack+0x45/0x70 [ 14.132295] kasan_save_track+0x18/0x40 [ 14.132466] kasan_save_free_info+0x3f/0x60 [ 14.132635] __kasan_slab_free+0x56/0x70 [ 14.132807] kfree+0x222/0x3f0 [ 14.132943] ksize_uaf+0x12c/0x6c0 [ 14.133142] kunit_try_run_case+0x1a5/0x480 [ 14.133626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.133951] kthread+0x337/0x6f0 [ 14.134227] ret_from_fork+0x116/0x1d0 [ 14.134399] ret_from_fork_asm+0x1a/0x30 [ 14.134627] [ 14.134730] The buggy address belongs to the object at ffff8881021dbc00 [ 14.134730] which belongs to the cache kmalloc-128 of size 128 [ 14.135405] The buggy address is located 0 bytes inside of [ 14.135405] freed 128-byte region [ffff8881021dbc00, ffff8881021dbc80) [ 14.135929] [ 14.136046] The buggy address belongs to the physical page: [ 14.136449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db [ 14.136860] flags: 0x200000000000000(node=0|zone=2) [ 14.137308] page_type: f5(slab) [ 14.137486] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.137752] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.138070] page dumped because: kasan: bad access detected [ 14.138489] [ 14.138607] Memory state around the buggy address: [ 14.138884] ffff8881021dbb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.139253] ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.139645] >ffff8881021dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.139986] ^ [ 14.140319] ffff8881021dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.140693] ffff8881021dbd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.140992] ================================================================== [ 14.165685] ================================================================== [ 14.166079] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 14.166631] Read of size 1 at addr ffff8881021dbc78 by task kunit_try_catch/214 [ 14.166941] [ 14.167045] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.167093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.167106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.167130] Call Trace: [ 14.167149] <TASK> [ 14.167167] dump_stack_lvl+0x73/0xb0 [ 14.167200] print_report+0xd1/0x650 [ 14.167225] ? __virt_addr_valid+0x1db/0x2d0 [ 14.167250] ? ksize_uaf+0x5e4/0x6c0 [ 14.167273] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.167297] ? ksize_uaf+0x5e4/0x6c0 [ 14.167321] kasan_report+0x141/0x180 [ 14.167346] ? ksize_uaf+0x5e4/0x6c0 [ 14.167374] __asan_report_load1_noabort+0x18/0x20 [ 14.167401] ksize_uaf+0x5e4/0x6c0 [ 14.167424] ? __pfx_ksize_uaf+0x10/0x10 [ 14.167448] ? __schedule+0x10cc/0x2b60 [ 14.167474] ? __pfx_read_tsc+0x10/0x10 [ 14.167498] ? ktime_get_ts64+0x86/0x230 [ 14.167525] kunit_try_run_case+0x1a5/0x480 [ 14.167552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.167577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.167603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.167629] ? __kthread_parkme+0x82/0x180 [ 14.167652] ? preempt_count_sub+0x50/0x80 [ 14.167679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.167706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.167731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.167842] kthread+0x337/0x6f0 [ 14.167870] ? trace_preempt_on+0x20/0xc0 [ 14.167897] ? __pfx_kthread+0x10/0x10 [ 14.167920] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.167944] ? calculate_sigpending+0x7b/0xa0 [ 14.167971] ? __pfx_kthread+0x10/0x10 [ 14.167995] ret_from_fork+0x116/0x1d0 [ 14.168016] ? __pfx_kthread+0x10/0x10 [ 14.168039] ret_from_fork_asm+0x1a/0x30 [ 14.168073] </TASK> [ 14.168087] [ 14.176312] Allocated by task 214: [ 14.176472] kasan_save_stack+0x45/0x70 [ 14.176665] kasan_save_track+0x18/0x40 [ 14.179251] kasan_save_alloc_info+0x3b/0x50 [ 14.179705] __kasan_kmalloc+0xb7/0xc0 [ 14.179894] __kmalloc_cache_noprof+0x189/0x420 [ 14.180455] ksize_uaf+0xaa/0x6c0 [ 14.180991] kunit_try_run_case+0x1a5/0x480 [ 14.181873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.182907] kthread+0x337/0x6f0 [ 14.183638] ret_from_fork+0x116/0x1d0 [ 14.184317] ret_from_fork_asm+0x1a/0x30 [ 14.184746] [ 14.185172] Freed by task 214: [ 14.185721] kasan_save_stack+0x45/0x70 [ 14.186642] kasan_save_track+0x18/0x40 [ 14.187028] kasan_save_free_info+0x3f/0x60 [ 14.187942] __kasan_slab_free+0x56/0x70 [ 14.188425] kfree+0x222/0x3f0 [ 14.188579] ksize_uaf+0x12c/0x6c0 [ 14.188726] kunit_try_run_case+0x1a5/0x480 [ 14.188917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.189607] kthread+0x337/0x6f0 [ 14.189983] ret_from_fork+0x116/0x1d0 [ 14.190492] ret_from_fork_asm+0x1a/0x30 [ 14.190813] [ 14.191013] The buggy address belongs to the object at ffff8881021dbc00 [ 14.191013] which belongs to the cache kmalloc-128 of size 128 [ 14.191680] The buggy address is located 120 bytes inside of [ 14.191680] freed 128-byte region [ffff8881021dbc00, ffff8881021dbc80) [ 14.192322] [ 14.192653] The buggy address belongs to the physical page: [ 14.193305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1021db [ 14.194159] flags: 0x200000000000000(node=0|zone=2) [ 14.194749] page_type: f5(slab) [ 14.195187] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.196006] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.196825] page dumped because: kasan: bad access detected [ 14.197032] [ 14.197322] Memory state around the buggy address: [ 14.197834] ffff8881021dbb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.198646] ffff8881021dbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.199393] >ffff8881021dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.199643] ^ [ 14.200325] ffff8881021dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.201111] ffff8881021dbd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.201899] ==================================================================