Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 17.129489] ================================================================== [ 17.129666] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.129726] Read of size 1 at addr fff00000c77d7078 by task kunit_try_catch/197 [ 17.129777] [ 17.129811] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.130495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.130536] Hardware name: linux,dummy-virt (DT) [ 17.130567] Call trace: [ 17.130591] show_stack+0x20/0x38 (C) [ 17.130730] dump_stack_lvl+0x8c/0xd0 [ 17.130802] print_report+0x118/0x608 [ 17.130965] kasan_report+0xdc/0x128 [ 17.131018] __asan_report_load1_noabort+0x20/0x30 [ 17.131517] ksize_uaf+0x544/0x5f8 [ 17.131687] kunit_try_run_case+0x170/0x3f0 [ 17.131735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.132676] kthread+0x328/0x630 [ 17.132904] ret_from_fork+0x10/0x20 [ 17.133245] [ 17.133678] Allocated by task 197: [ 17.133767] kasan_save_stack+0x3c/0x68 [ 17.133812] kasan_save_track+0x20/0x40 [ 17.133850] kasan_save_alloc_info+0x40/0x58 [ 17.133891] __kasan_kmalloc+0xd4/0xd8 [ 17.133929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.133968] ksize_uaf+0xb8/0x5f8 [ 17.134964] kunit_try_run_case+0x170/0x3f0 [ 17.135408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.135458] kthread+0x328/0x630 [ 17.135490] ret_from_fork+0x10/0x20 [ 17.136013] [ 17.136094] Freed by task 197: [ 17.136184] kasan_save_stack+0x3c/0x68 [ 17.136283] kasan_save_track+0x20/0x40 [ 17.136483] kasan_save_free_info+0x4c/0x78 [ 17.136809] __kasan_slab_free+0x6c/0x98 [ 17.136851] kfree+0x214/0x3c8 [ 17.137659] ksize_uaf+0x11c/0x5f8 [ 17.138498] kunit_try_run_case+0x170/0x3f0 [ 17.138778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.138888] kthread+0x328/0x630 [ 17.138921] ret_from_fork+0x10/0x20 [ 17.139090] [ 17.139201] The buggy address belongs to the object at fff00000c77d7000 [ 17.139201] which belongs to the cache kmalloc-128 of size 128 [ 17.139346] The buggy address is located 120 bytes inside of [ 17.139346] freed 128-byte region [fff00000c77d7000, fff00000c77d7080) [ 17.140217] [ 17.140610] The buggy address belongs to the physical page: [ 17.140950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7 [ 17.141457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.141984] page_type: f5(slab) [ 17.142344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.142400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.142441] page dumped because: kasan: bad access detected [ 17.143002] [ 17.143043] Memory state around the buggy address: [ 17.143235] fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.143632] fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.143756] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.143913] ^ [ 17.144108] fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144237] fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144530] ================================================================== [ 17.108772] ================================================================== [ 17.108836] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.108887] Read of size 1 at addr fff00000c77d7000 by task kunit_try_catch/197 [ 17.108935] [ 17.108969] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.109066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.109093] Hardware name: linux,dummy-virt (DT) [ 17.109121] Call trace: [ 17.109144] show_stack+0x20/0x38 (C) [ 17.109191] dump_stack_lvl+0x8c/0xd0 [ 17.109424] print_report+0x118/0x608 [ 17.109486] kasan_report+0xdc/0x128 [ 17.109546] __kasan_check_byte+0x54/0x70 [ 17.110085] ksize+0x30/0x88 [ 17.110353] ksize_uaf+0x168/0x5f8 [ 17.110581] kunit_try_run_case+0x170/0x3f0 [ 17.110804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.111335] kthread+0x328/0x630 [ 17.111486] ret_from_fork+0x10/0x20 [ 17.112015] [ 17.112039] Allocated by task 197: [ 17.112070] kasan_save_stack+0x3c/0x68 [ 17.112282] kasan_save_track+0x20/0x40 [ 17.112585] kasan_save_alloc_info+0x40/0x58 [ 17.112645] __kasan_kmalloc+0xd4/0xd8 [ 17.112684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.112723] ksize_uaf+0xb8/0x5f8 [ 17.113195] kunit_try_run_case+0x170/0x3f0 [ 17.113244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.113303] kthread+0x328/0x630 [ 17.113500] ret_from_fork+0x10/0x20 [ 17.113734] [ 17.113754] Freed by task 197: [ 17.114079] kasan_save_stack+0x3c/0x68 [ 17.114260] kasan_save_track+0x20/0x40 [ 17.114522] kasan_save_free_info+0x4c/0x78 [ 17.114568] __kasan_slab_free+0x6c/0x98 [ 17.114935] kfree+0x214/0x3c8 [ 17.115063] ksize_uaf+0x11c/0x5f8 [ 17.115496] kunit_try_run_case+0x170/0x3f0 [ 17.115539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.115809] kthread+0x328/0x630 [ 17.115998] ret_from_fork+0x10/0x20 [ 17.116091] [ 17.116220] The buggy address belongs to the object at fff00000c77d7000 [ 17.116220] which belongs to the cache kmalloc-128 of size 128 [ 17.116551] The buggy address is located 0 bytes inside of [ 17.116551] freed 128-byte region [fff00000c77d7000, fff00000c77d7080) [ 17.116854] [ 17.116995] The buggy address belongs to the physical page: [ 17.117051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7 [ 17.117119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.117299] page_type: f5(slab) [ 17.117389] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.117578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.117684] page dumped because: kasan: bad access detected [ 17.117740] [ 17.117799] Memory state around the buggy address: [ 17.117912] fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.118089] fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.118145] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.118199] ^ [ 17.118539] fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.118603] fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.118698] ================================================================== [ 17.119767] ================================================================== [ 17.119822] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.119869] Read of size 1 at addr fff00000c77d7000 by task kunit_try_catch/197 [ 17.120255] [ 17.120351] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.120502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.120559] Hardware name: linux,dummy-virt (DT) [ 17.120598] Call trace: [ 17.120690] show_stack+0x20/0x38 (C) [ 17.120760] dump_stack_lvl+0x8c/0xd0 [ 17.120880] print_report+0x118/0x608 [ 17.120953] kasan_report+0xdc/0x128 [ 17.121016] __asan_report_load1_noabort+0x20/0x30 [ 17.121288] ksize_uaf+0x598/0x5f8 [ 17.121356] kunit_try_run_case+0x170/0x3f0 [ 17.121403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.121453] kthread+0x328/0x630 [ 17.121493] ret_from_fork+0x10/0x20 [ 17.121539] [ 17.121558] Allocated by task 197: [ 17.121586] kasan_save_stack+0x3c/0x68 [ 17.121638] kasan_save_track+0x20/0x40 [ 17.121676] kasan_save_alloc_info+0x40/0x58 [ 17.121715] __kasan_kmalloc+0xd4/0xd8 [ 17.121755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.121834] ksize_uaf+0xb8/0x5f8 [ 17.121872] kunit_try_run_case+0x170/0x3f0 [ 17.122060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.122122] kthread+0x328/0x630 [ 17.122517] ret_from_fork+0x10/0x20 [ 17.122570] [ 17.122862] Freed by task 197: [ 17.122894] kasan_save_stack+0x3c/0x68 [ 17.123193] kasan_save_track+0x20/0x40 [ 17.123281] kasan_save_free_info+0x4c/0x78 [ 17.123337] __kasan_slab_free+0x6c/0x98 [ 17.123374] kfree+0x214/0x3c8 [ 17.123630] ksize_uaf+0x11c/0x5f8 [ 17.123671] kunit_try_run_case+0x170/0x3f0 [ 17.123938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.123993] kthread+0x328/0x630 [ 17.124026] ret_from_fork+0x10/0x20 [ 17.124062] [ 17.124081] The buggy address belongs to the object at fff00000c77d7000 [ 17.124081] which belongs to the cache kmalloc-128 of size 128 [ 17.124141] The buggy address is located 0 bytes inside of [ 17.124141] freed 128-byte region [fff00000c77d7000, fff00000c77d7080) [ 17.124200] [ 17.125036] The buggy address belongs to the physical page: [ 17.125074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7 [ 17.125140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.125194] page_type: f5(slab) [ 17.125231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.125719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.126027] page dumped because: kasan: bad access detected [ 17.126143] [ 17.126162] Memory state around the buggy address: [ 17.126273] fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.126683] fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.126926] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.127337] ^ [ 17.127378] fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.127423] fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.127466] ==================================================================
[ 17.112079] ================================================================== [ 17.112399] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.112785] Read of size 1 at addr fff00000c63cdf78 by task kunit_try_catch/197 [ 17.112852] [ 17.112885] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.112997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.113024] Hardware name: linux,dummy-virt (DT) [ 17.113061] Call trace: [ 17.113090] show_stack+0x20/0x38 (C) [ 17.113144] dump_stack_lvl+0x8c/0xd0 [ 17.113193] print_report+0x118/0x608 [ 17.113252] kasan_report+0xdc/0x128 [ 17.113300] __asan_report_load1_noabort+0x20/0x30 [ 17.113349] ksize_uaf+0x544/0x5f8 [ 17.113392] kunit_try_run_case+0x170/0x3f0 [ 17.113438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.113489] kthread+0x328/0x630 [ 17.113527] ret_from_fork+0x10/0x20 [ 17.113581] [ 17.113609] Allocated by task 197: [ 17.113636] kasan_save_stack+0x3c/0x68 [ 17.113677] kasan_save_track+0x20/0x40 [ 17.113713] kasan_save_alloc_info+0x40/0x58 [ 17.113754] __kasan_kmalloc+0xd4/0xd8 [ 17.113790] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.113828] ksize_uaf+0xb8/0x5f8 [ 17.113862] kunit_try_run_case+0x170/0x3f0 [ 17.113899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.114348] kthread+0x328/0x630 [ 17.114604] ret_from_fork+0x10/0x20 [ 17.114842] [ 17.115010] Freed by task 197: [ 17.115417] kasan_save_stack+0x3c/0x68 [ 17.115487] kasan_save_track+0x20/0x40 [ 17.115634] kasan_save_free_info+0x4c/0x78 [ 17.115839] __kasan_slab_free+0x6c/0x98 [ 17.115892] kfree+0x214/0x3c8 [ 17.115939] ksize_uaf+0x11c/0x5f8 [ 17.116276] kunit_try_run_case+0x170/0x3f0 [ 17.116382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.116480] kthread+0x328/0x630 [ 17.116817] ret_from_fork+0x10/0x20 [ 17.117095] [ 17.117136] The buggy address belongs to the object at fff00000c63cdf00 [ 17.117136] which belongs to the cache kmalloc-128 of size 128 [ 17.117613] The buggy address is located 120 bytes inside of [ 17.117613] freed 128-byte region [fff00000c63cdf00, fff00000c63cdf80) [ 17.117693] [ 17.117713] The buggy address belongs to the physical page: [ 17.117760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 17.118072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.118235] page_type: f5(slab) [ 17.118276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.118337] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.118656] page dumped because: kasan: bad access detected [ 17.118706] [ 17.118784] Memory state around the buggy address: [ 17.119166] fff00000c63cde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.119281] fff00000c63cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.119381] >fff00000c63cdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.119509] ^ [ 17.119554] fff00000c63cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.119615] fff00000c63ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.119969] ================================================================== [ 17.092199] ================================================================== [ 17.092408] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.092473] Read of size 1 at addr fff00000c63cdf00 by task kunit_try_catch/197 [ 17.092527] [ 17.092715] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.093191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.093244] Hardware name: linux,dummy-virt (DT) [ 17.093345] Call trace: [ 17.093493] show_stack+0x20/0x38 (C) [ 17.093577] dump_stack_lvl+0x8c/0xd0 [ 17.093957] print_report+0x118/0x608 [ 17.094048] kasan_report+0xdc/0x128 [ 17.094216] __kasan_check_byte+0x54/0x70 [ 17.094344] ksize+0x30/0x88 [ 17.094499] ksize_uaf+0x168/0x5f8 [ 17.094603] kunit_try_run_case+0x170/0x3f0 [ 17.094751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.094804] kthread+0x328/0x630 [ 17.094860] ret_from_fork+0x10/0x20 [ 17.095218] [ 17.095258] Allocated by task 197: [ 17.095355] kasan_save_stack+0x3c/0x68 [ 17.095477] kasan_save_track+0x20/0x40 [ 17.095659] kasan_save_alloc_info+0x40/0x58 [ 17.095766] __kasan_kmalloc+0xd4/0xd8 [ 17.095973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.096011] ksize_uaf+0xb8/0x5f8 [ 17.096433] kunit_try_run_case+0x170/0x3f0 [ 17.096517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.096623] kthread+0x328/0x630 [ 17.096806] ret_from_fork+0x10/0x20 [ 17.097307] [ 17.097408] Freed by task 197: [ 17.097595] kasan_save_stack+0x3c/0x68 [ 17.097746] kasan_save_track+0x20/0x40 [ 17.097893] kasan_save_free_info+0x4c/0x78 [ 17.098134] __kasan_slab_free+0x6c/0x98 [ 17.098310] kfree+0x214/0x3c8 [ 17.098384] ksize_uaf+0x11c/0x5f8 [ 17.098560] kunit_try_run_case+0x170/0x3f0 [ 17.098712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.098768] kthread+0x328/0x630 [ 17.098803] ret_from_fork+0x10/0x20 [ 17.098849] [ 17.098878] The buggy address belongs to the object at fff00000c63cdf00 [ 17.098878] which belongs to the cache kmalloc-128 of size 128 [ 17.098947] The buggy address is located 0 bytes inside of [ 17.098947] freed 128-byte region [fff00000c63cdf00, fff00000c63cdf80) [ 17.099007] [ 17.099035] The buggy address belongs to the physical page: [ 17.099081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 17.099135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.099180] page_type: f5(slab) [ 17.099235] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.099285] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.099336] page dumped because: kasan: bad access detected [ 17.099368] [ 17.099393] Memory state around the buggy address: [ 17.099424] fff00000c63cde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.099475] fff00000c63cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.099527] >fff00000c63cdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.099572] ^ [ 17.099608] fff00000c63cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.099673] fff00000c63ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.099712] ================================================================== [ 17.101008] ================================================================== [ 17.101073] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.101233] Read of size 1 at addr fff00000c63cdf00 by task kunit_try_catch/197 [ 17.101348] [ 17.101682] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.101781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.101806] Hardware name: linux,dummy-virt (DT) [ 17.101835] Call trace: [ 17.102041] show_stack+0x20/0x38 (C) [ 17.102224] dump_stack_lvl+0x8c/0xd0 [ 17.102272] print_report+0x118/0x608 [ 17.102333] kasan_report+0xdc/0x128 [ 17.102377] __asan_report_load1_noabort+0x20/0x30 [ 17.102840] ksize_uaf+0x598/0x5f8 [ 17.102954] kunit_try_run_case+0x170/0x3f0 [ 17.103120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.103240] kthread+0x328/0x630 [ 17.103593] ret_from_fork+0x10/0x20 [ 17.103846] [ 17.104030] Allocated by task 197: [ 17.104218] kasan_save_stack+0x3c/0x68 [ 17.104266] kasan_save_track+0x20/0x40 [ 17.104724] kasan_save_alloc_info+0x40/0x58 [ 17.104823] __kasan_kmalloc+0xd4/0xd8 [ 17.105013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.105106] ksize_uaf+0xb8/0x5f8 [ 17.105571] kunit_try_run_case+0x170/0x3f0 [ 17.105710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.105962] kthread+0x328/0x630 [ 17.106069] ret_from_fork+0x10/0x20 [ 17.106220] [ 17.106240] Freed by task 197: [ 17.106280] kasan_save_stack+0x3c/0x68 [ 17.106344] kasan_save_track+0x20/0x40 [ 17.106673] kasan_save_free_info+0x4c/0x78 [ 17.106746] __kasan_slab_free+0x6c/0x98 [ 17.107017] kfree+0x214/0x3c8 [ 17.107379] ksize_uaf+0x11c/0x5f8 [ 17.107648] kunit_try_run_case+0x170/0x3f0 [ 17.107756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.107897] kthread+0x328/0x630 [ 17.108059] ret_from_fork+0x10/0x20 [ 17.108169] [ 17.108447] The buggy address belongs to the object at fff00000c63cdf00 [ 17.108447] which belongs to the cache kmalloc-128 of size 128 [ 17.108629] The buggy address is located 0 bytes inside of [ 17.108629] freed 128-byte region [fff00000c63cdf00, fff00000c63cdf80) [ 17.108967] [ 17.109012] The buggy address belongs to the physical page: [ 17.109147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd [ 17.109300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.109485] page_type: f5(slab) [ 17.109535] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.109692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.109810] page dumped because: kasan: bad access detected [ 17.109868] [ 17.110200] Memory state around the buggy address: [ 17.110287] fff00000c63cde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.110395] fff00000c63cde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.110466] >fff00000c63cdf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.110508] ^ [ 17.110546] fff00000c63cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.110828] fff00000c63ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.111038] ==================================================================
[ 13.944934] ================================================================== [ 13.945730] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 13.946267] Read of size 1 at addr ffff88810254d678 by task kunit_try_catch/214 [ 13.947189] [ 13.947374] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.947672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.947707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.947741] Call Trace: [ 13.947767] <TASK> [ 13.947795] dump_stack_lvl+0x73/0xb0 [ 13.947851] print_report+0xd1/0x650 [ 13.947893] ? __virt_addr_valid+0x1db/0x2d0 [ 13.947934] ? ksize_uaf+0x5e4/0x6c0 [ 13.947971] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.948014] ? ksize_uaf+0x5e4/0x6c0 [ 13.948044] kasan_report+0x141/0x180 [ 13.948080] ? ksize_uaf+0x5e4/0x6c0 [ 13.948174] __asan_report_load1_noabort+0x18/0x20 [ 13.948215] ksize_uaf+0x5e4/0x6c0 [ 13.948251] ? __pfx_ksize_uaf+0x10/0x10 [ 13.948290] ? __schedule+0x10cc/0x2b60 [ 13.948325] ? __pfx_read_tsc+0x10/0x10 [ 13.948351] ? ktime_get_ts64+0x86/0x230 [ 13.948375] kunit_try_run_case+0x1a5/0x480 [ 13.948396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.948415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.948435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.948454] ? __kthread_parkme+0x82/0x180 [ 13.948472] ? preempt_count_sub+0x50/0x80 [ 13.948492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.948553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.948593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.948639] kthread+0x337/0x6f0 [ 13.948664] ? trace_preempt_on+0x20/0xc0 [ 13.948686] ? __pfx_kthread+0x10/0x10 [ 13.948704] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.948722] ? calculate_sigpending+0x7b/0xa0 [ 13.948743] ? __pfx_kthread+0x10/0x10 [ 13.948762] ret_from_fork+0x116/0x1d0 [ 13.948778] ? __pfx_kthread+0x10/0x10 [ 13.948795] ret_from_fork_asm+0x1a/0x30 [ 13.948823] </TASK> [ 13.948834] [ 13.960401] Allocated by task 214: [ 13.960755] kasan_save_stack+0x45/0x70 [ 13.961033] kasan_save_track+0x18/0x40 [ 13.961275] kasan_save_alloc_info+0x3b/0x50 [ 13.961782] __kasan_kmalloc+0xb7/0xc0 [ 13.962149] __kmalloc_cache_noprof+0x189/0x420 [ 13.962472] ksize_uaf+0xaa/0x6c0 [ 13.963235] kunit_try_run_case+0x1a5/0x480 [ 13.963775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.964009] kthread+0x337/0x6f0 [ 13.964224] ret_from_fork+0x116/0x1d0 [ 13.964654] ret_from_fork_asm+0x1a/0x30 [ 13.964999] [ 13.965188] Freed by task 214: [ 13.965432] kasan_save_stack+0x45/0x70 [ 13.965900] kasan_save_track+0x18/0x40 [ 13.966233] kasan_save_free_info+0x3f/0x60 [ 13.966397] __kasan_slab_free+0x56/0x70 [ 13.967081] kfree+0x222/0x3f0 [ 13.967281] ksize_uaf+0x12c/0x6c0 [ 13.967529] kunit_try_run_case+0x1a5/0x480 [ 13.967851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.968131] kthread+0x337/0x6f0 [ 13.968283] ret_from_fork+0x116/0x1d0 [ 13.968443] ret_from_fork_asm+0x1a/0x30 [ 13.968738] [ 13.968898] The buggy address belongs to the object at ffff88810254d600 [ 13.968898] which belongs to the cache kmalloc-128 of size 128 [ 13.969370] The buggy address is located 120 bytes inside of [ 13.969370] freed 128-byte region [ffff88810254d600, ffff88810254d680) [ 13.970215] [ 13.970391] The buggy address belongs to the physical page: [ 13.971192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 13.971760] flags: 0x200000000000000(node=0|zone=2) [ 13.972038] page_type: f5(slab) [ 13.972314] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.972899] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.973346] page dumped because: kasan: bad access detected [ 13.973843] [ 13.973999] Memory state around the buggy address: [ 13.974235] ffff88810254d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.975073] ffff88810254d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.975643] >ffff88810254d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.976096] ^ [ 13.976412] ffff88810254d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.976986] ffff88810254d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.977403] ================================================================== [ 13.912468] ================================================================== [ 13.913026] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 13.913464] Read of size 1 at addr ffff88810254d600 by task kunit_try_catch/214 [ 13.913763] [ 13.913955] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.914037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.914058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.914093] Call Trace: [ 13.914117] <TASK> [ 13.914145] dump_stack_lvl+0x73/0xb0 [ 13.914197] print_report+0xd1/0x650 [ 13.914232] ? __virt_addr_valid+0x1db/0x2d0 [ 13.914270] ? ksize_uaf+0x5fe/0x6c0 [ 13.914302] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.914343] ? ksize_uaf+0x5fe/0x6c0 [ 13.914377] kasan_report+0x141/0x180 [ 13.914410] ? ksize_uaf+0x5fe/0x6c0 [ 13.914452] __asan_report_load1_noabort+0x18/0x20 [ 13.914492] ksize_uaf+0x5fe/0x6c0 [ 13.914526] ? __pfx_ksize_uaf+0x10/0x10 [ 13.914547] ? __schedule+0x10cc/0x2b60 [ 13.914578] ? __pfx_read_tsc+0x10/0x10 [ 13.914608] ? ktime_get_ts64+0x86/0x230 [ 13.915093] kunit_try_run_case+0x1a5/0x480 [ 13.915141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.915162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.915183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.915203] ? __kthread_parkme+0x82/0x180 [ 13.915220] ? preempt_count_sub+0x50/0x80 [ 13.915241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.915260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.915280] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.915299] kthread+0x337/0x6f0 [ 13.915316] ? trace_preempt_on+0x20/0xc0 [ 13.915336] ? __pfx_kthread+0x10/0x10 [ 13.915354] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.915371] ? calculate_sigpending+0x7b/0xa0 [ 13.915391] ? __pfx_kthread+0x10/0x10 [ 13.915410] ret_from_fork+0x116/0x1d0 [ 13.915426] ? __pfx_kthread+0x10/0x10 [ 13.915443] ret_from_fork_asm+0x1a/0x30 [ 13.915470] </TASK> [ 13.915482] [ 13.927256] Allocated by task 214: [ 13.927425] kasan_save_stack+0x45/0x70 [ 13.927652] kasan_save_track+0x18/0x40 [ 13.927938] kasan_save_alloc_info+0x3b/0x50 [ 13.928240] __kasan_kmalloc+0xb7/0xc0 [ 13.928507] __kmalloc_cache_noprof+0x189/0x420 [ 13.928855] ksize_uaf+0xaa/0x6c0 [ 13.929110] kunit_try_run_case+0x1a5/0x480 [ 13.929410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.930417] kthread+0x337/0x6f0 [ 13.930855] ret_from_fork+0x116/0x1d0 [ 13.931077] ret_from_fork_asm+0x1a/0x30 [ 13.931283] [ 13.931446] Freed by task 214: [ 13.931872] kasan_save_stack+0x45/0x70 [ 13.932228] kasan_save_track+0x18/0x40 [ 13.932703] kasan_save_free_info+0x3f/0x60 [ 13.933005] __kasan_slab_free+0x56/0x70 [ 13.933253] kfree+0x222/0x3f0 [ 13.933448] ksize_uaf+0x12c/0x6c0 [ 13.934200] kunit_try_run_case+0x1a5/0x480 [ 13.934650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.935082] kthread+0x337/0x6f0 [ 13.935388] ret_from_fork+0x116/0x1d0 [ 13.935795] ret_from_fork_asm+0x1a/0x30 [ 13.936135] [ 13.936317] The buggy address belongs to the object at ffff88810254d600 [ 13.936317] which belongs to the cache kmalloc-128 of size 128 [ 13.937078] The buggy address is located 0 bytes inside of [ 13.937078] freed 128-byte region [ffff88810254d600, ffff88810254d680) [ 13.937541] [ 13.937656] The buggy address belongs to the physical page: [ 13.937879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 13.939188] flags: 0x200000000000000(node=0|zone=2) [ 13.939382] page_type: f5(slab) [ 13.939894] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.940128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.940752] page dumped because: kasan: bad access detected [ 13.940990] [ 13.941095] Memory state around the buggy address: [ 13.941398] ffff88810254d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.941677] ffff88810254d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.942148] >ffff88810254d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.942434] ^ [ 13.942758] ffff88810254d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.943061] ffff88810254d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.943899] ================================================================== [ 13.878014] ================================================================== [ 13.878853] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 13.879189] Read of size 1 at addr ffff88810254d600 by task kunit_try_catch/214 [ 13.879665] [ 13.879859] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.879941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.879960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.879996] Call Trace: [ 13.880020] <TASK> [ 13.880045] dump_stack_lvl+0x73/0xb0 [ 13.880100] print_report+0xd1/0x650 [ 13.880136] ? __virt_addr_valid+0x1db/0x2d0 [ 13.880176] ? ksize_uaf+0x19d/0x6c0 [ 13.880210] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.880253] ? ksize_uaf+0x19d/0x6c0 [ 13.880290] kasan_report+0x141/0x180 [ 13.880325] ? ksize_uaf+0x19d/0x6c0 [ 13.880383] ? ksize_uaf+0x19d/0x6c0 [ 13.880420] __kasan_check_byte+0x3d/0x50 [ 13.880456] ksize+0x20/0x60 [ 13.880492] ksize_uaf+0x19d/0x6c0 [ 13.880525] ? __pfx_ksize_uaf+0x10/0x10 [ 13.880560] ? __schedule+0x10cc/0x2b60 [ 13.880601] ? __pfx_read_tsc+0x10/0x10 [ 13.880652] ? ktime_get_ts64+0x86/0x230 [ 13.880699] kunit_try_run_case+0x1a5/0x480 [ 13.880743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.880781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.880822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.880861] ? __kthread_parkme+0x82/0x180 [ 13.880896] ? preempt_count_sub+0x50/0x80 [ 13.880937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.880977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.881017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.881056] kthread+0x337/0x6f0 [ 13.881083] ? trace_preempt_on+0x20/0xc0 [ 13.881116] ? __pfx_kthread+0x10/0x10 [ 13.881143] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.881170] ? calculate_sigpending+0x7b/0xa0 [ 13.881204] ? __pfx_kthread+0x10/0x10 [ 13.881231] ret_from_fork+0x116/0x1d0 [ 13.881256] ? __pfx_kthread+0x10/0x10 [ 13.881286] ret_from_fork_asm+0x1a/0x30 [ 13.881342] </TASK> [ 13.881362] [ 13.893432] Allocated by task 214: [ 13.893666] kasan_save_stack+0x45/0x70 [ 13.893993] kasan_save_track+0x18/0x40 [ 13.894301] kasan_save_alloc_info+0x3b/0x50 [ 13.894601] __kasan_kmalloc+0xb7/0xc0 [ 13.895208] __kmalloc_cache_noprof+0x189/0x420 [ 13.895710] ksize_uaf+0xaa/0x6c0 [ 13.895912] kunit_try_run_case+0x1a5/0x480 [ 13.896243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.896878] kthread+0x337/0x6f0 [ 13.897201] ret_from_fork+0x116/0x1d0 [ 13.897640] ret_from_fork_asm+0x1a/0x30 [ 13.897882] [ 13.898059] Freed by task 214: [ 13.898334] kasan_save_stack+0x45/0x70 [ 13.899200] kasan_save_track+0x18/0x40 [ 13.899365] kasan_save_free_info+0x3f/0x60 [ 13.899803] __kasan_slab_free+0x56/0x70 [ 13.900084] kfree+0x222/0x3f0 [ 13.900373] ksize_uaf+0x12c/0x6c0 [ 13.900859] kunit_try_run_case+0x1a5/0x480 [ 13.901156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.901717] kthread+0x337/0x6f0 [ 13.901979] ret_from_fork+0x116/0x1d0 [ 13.902303] ret_from_fork_asm+0x1a/0x30 [ 13.902461] [ 13.903031] The buggy address belongs to the object at ffff88810254d600 [ 13.903031] which belongs to the cache kmalloc-128 of size 128 [ 13.903830] The buggy address is located 0 bytes inside of [ 13.903830] freed 128-byte region [ffff88810254d600, ffff88810254d680) [ 13.904451] [ 13.904881] The buggy address belongs to the physical page: [ 13.905277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 13.905815] flags: 0x200000000000000(node=0|zone=2) [ 13.906043] page_type: f5(slab) [ 13.906359] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.906772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.907475] page dumped because: kasan: bad access detected [ 13.907951] [ 13.908064] Memory state around the buggy address: [ 13.908342] ffff88810254d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.909008] ffff88810254d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.909435] >ffff88810254d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.909895] ^ [ 13.910218] ffff88810254d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.910472] ffff88810254d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.911338] ==================================================================
[ 14.066631] ================================================================== [ 14.067251] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 14.067565] Read of size 1 at addr ffff888102c3fe00 by task kunit_try_catch/213 [ 14.068181] [ 14.068418] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.068463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.068475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.068495] Call Trace: [ 14.068509] <TASK> [ 14.068526] dump_stack_lvl+0x73/0xb0 [ 14.068559] print_report+0xd1/0x650 [ 14.068582] ? __virt_addr_valid+0x1db/0x2d0 [ 14.068606] ? ksize_uaf+0x5fe/0x6c0 [ 14.068628] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.068655] ? ksize_uaf+0x5fe/0x6c0 [ 14.068677] kasan_report+0x141/0x180 [ 14.068710] ? ksize_uaf+0x5fe/0x6c0 [ 14.068738] __asan_report_load1_noabort+0x18/0x20 [ 14.068763] ksize_uaf+0x5fe/0x6c0 [ 14.068784] ? __pfx_ksize_uaf+0x10/0x10 [ 14.068806] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.068831] ? trace_hardirqs_on+0x37/0xe0 [ 14.068856] ? __pfx_read_tsc+0x10/0x10 [ 14.068879] ? ktime_get_ts64+0x86/0x230 [ 14.068905] kunit_try_run_case+0x1a5/0x480 [ 14.068930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.068956] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.068980] ? __kthread_parkme+0x82/0x180 [ 14.069001] ? preempt_count_sub+0x50/0x80 [ 14.069026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.069062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.069085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.069109] kthread+0x337/0x6f0 [ 14.069131] ? trace_preempt_on+0x20/0xc0 [ 14.069154] ? __pfx_kthread+0x10/0x10 [ 14.069176] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.069198] ? calculate_sigpending+0x7b/0xa0 [ 14.069222] ? __pfx_kthread+0x10/0x10 [ 14.069245] ret_from_fork+0x116/0x1d0 [ 14.069264] ? __pfx_kthread+0x10/0x10 [ 14.069286] ret_from_fork_asm+0x1a/0x30 [ 14.069318] </TASK> [ 14.069349] [ 14.080068] Allocated by task 213: [ 14.080388] kasan_save_stack+0x45/0x70 [ 14.080594] kasan_save_track+0x18/0x40 [ 14.080898] kasan_save_alloc_info+0x3b/0x50 [ 14.081123] __kasan_kmalloc+0xb7/0xc0 [ 14.081302] __kmalloc_cache_noprof+0x189/0x420 [ 14.081512] ksize_uaf+0xaa/0x6c0 [ 14.081682] kunit_try_run_case+0x1a5/0x480 [ 14.082485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.083018] kthread+0x337/0x6f0 [ 14.083417] ret_from_fork+0x116/0x1d0 [ 14.083732] ret_from_fork_asm+0x1a/0x30 [ 14.083957] [ 14.084066] Freed by task 213: [ 14.084221] kasan_save_stack+0x45/0x70 [ 14.084410] kasan_save_track+0x18/0x40 [ 14.084591] kasan_save_free_info+0x3f/0x60 [ 14.085189] __kasan_slab_free+0x56/0x70 [ 14.085638] kfree+0x222/0x3f0 [ 14.085932] ksize_uaf+0x12c/0x6c0 [ 14.086239] kunit_try_run_case+0x1a5/0x480 [ 14.086624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.087302] kthread+0x337/0x6f0 [ 14.087553] ret_from_fork+0x116/0x1d0 [ 14.088097] ret_from_fork_asm+0x1a/0x30 [ 14.088305] [ 14.088405] The buggy address belongs to the object at ffff888102c3fe00 [ 14.088405] which belongs to the cache kmalloc-128 of size 128 [ 14.089476] The buggy address is located 0 bytes inside of [ 14.089476] freed 128-byte region [ffff888102c3fe00, ffff888102c3fe80) [ 14.090622] [ 14.090952] The buggy address belongs to the physical page: [ 14.091220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f [ 14.091569] flags: 0x200000000000000(node=0|zone=2) [ 14.092203] page_type: f5(slab) [ 14.092466] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.093255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.093577] page dumped because: kasan: bad access detected [ 14.094199] [ 14.094471] Memory state around the buggy address: [ 14.095035] ffff888102c3fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.095331] ffff888102c3fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.095638] >ffff888102c3fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.095944] ^ [ 14.096234] ffff888102c3fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.096607] ffff888102c3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.097139] ================================================================== [ 14.027888] ================================================================== [ 14.028411] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 14.028736] Read of size 1 at addr ffff888102c3fe00 by task kunit_try_catch/213 [ 14.029074] [ 14.029181] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.029225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.029237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.029258] Call Trace: [ 14.029272] <TASK> [ 14.029289] dump_stack_lvl+0x73/0xb0 [ 14.029319] print_report+0xd1/0x650 [ 14.029343] ? __virt_addr_valid+0x1db/0x2d0 [ 14.029367] ? ksize_uaf+0x19d/0x6c0 [ 14.029390] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.029418] ? ksize_uaf+0x19d/0x6c0 [ 14.029440] kasan_report+0x141/0x180 [ 14.029464] ? ksize_uaf+0x19d/0x6c0 [ 14.029490] ? ksize_uaf+0x19d/0x6c0 [ 14.029512] __kasan_check_byte+0x3d/0x50 [ 14.029541] ksize+0x20/0x60 [ 14.029563] ksize_uaf+0x19d/0x6c0 [ 14.029585] ? __pfx_ksize_uaf+0x10/0x10 [ 14.029607] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.029634] ? trace_hardirqs_on+0x37/0xe0 [ 14.029658] ? __pfx_read_tsc+0x10/0x10 [ 14.029681] ? ktime_get_ts64+0x86/0x230 [ 14.029707] kunit_try_run_case+0x1a5/0x480 [ 14.029877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.029905] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.029932] ? __kthread_parkme+0x82/0x180 [ 14.029955] ? preempt_count_sub+0x50/0x80 [ 14.030003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.030033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.030069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.030095] kthread+0x337/0x6f0 [ 14.030118] ? trace_preempt_on+0x20/0xc0 [ 14.030142] ? __pfx_kthread+0x10/0x10 [ 14.030166] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.030189] ? calculate_sigpending+0x7b/0xa0 [ 14.030215] ? __pfx_kthread+0x10/0x10 [ 14.030239] ret_from_fork+0x116/0x1d0 [ 14.030259] ? __pfx_kthread+0x10/0x10 [ 14.030288] ret_from_fork_asm+0x1a/0x30 [ 14.030322] </TASK> [ 14.030335] [ 14.042334] Allocated by task 213: [ 14.042486] kasan_save_stack+0x45/0x70 [ 14.042646] kasan_save_track+0x18/0x40 [ 14.043103] kasan_save_alloc_info+0x3b/0x50 [ 14.043356] __kasan_kmalloc+0xb7/0xc0 [ 14.043558] __kmalloc_cache_noprof+0x189/0x420 [ 14.044269] ksize_uaf+0xaa/0x6c0 [ 14.045076] kunit_try_run_case+0x1a5/0x480 [ 14.045578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.046157] kthread+0x337/0x6f0 [ 14.046859] ret_from_fork+0x116/0x1d0 [ 14.047501] ret_from_fork_asm+0x1a/0x30 [ 14.047672] [ 14.048131] Freed by task 213: [ 14.048686] kasan_save_stack+0x45/0x70 [ 14.049314] kasan_save_track+0x18/0x40 [ 14.049472] kasan_save_free_info+0x3f/0x60 [ 14.049637] __kasan_slab_free+0x56/0x70 [ 14.050329] kfree+0x222/0x3f0 [ 14.050800] ksize_uaf+0x12c/0x6c0 [ 14.051341] kunit_try_run_case+0x1a5/0x480 [ 14.052139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.052951] kthread+0x337/0x6f0 [ 14.053438] ret_from_fork+0x116/0x1d0 [ 14.053600] ret_from_fork_asm+0x1a/0x30 [ 14.054160] [ 14.054509] The buggy address belongs to the object at ffff888102c3fe00 [ 14.054509] which belongs to the cache kmalloc-128 of size 128 [ 14.056393] The buggy address is located 0 bytes inside of [ 14.056393] freed 128-byte region [ffff888102c3fe00, ffff888102c3fe80) [ 14.057800] [ 14.058176] The buggy address belongs to the physical page: [ 14.058858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f [ 14.059515] flags: 0x200000000000000(node=0|zone=2) [ 14.059695] page_type: f5(slab) [ 14.060364] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.061515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.062514] page dumped because: kasan: bad access detected [ 14.062914] [ 14.063140] Memory state around the buggy address: [ 14.063380] ffff888102c3fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.064044] ffff888102c3fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.064290] >ffff888102c3fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.064509] ^ [ 14.064629] ffff888102c3fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.064937] ffff888102c3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.065589] ================================================================== [ 14.097593] ================================================================== [ 14.098190] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 14.098481] Read of size 1 at addr ffff888102c3fe78 by task kunit_try_catch/213 [ 14.098785] [ 14.099036] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.099098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.099111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.099131] Call Trace: [ 14.099151] <TASK> [ 14.099170] dump_stack_lvl+0x73/0xb0 [ 14.099201] print_report+0xd1/0x650 [ 14.099226] ? __virt_addr_valid+0x1db/0x2d0 [ 14.099251] ? ksize_uaf+0x5e4/0x6c0 [ 14.099273] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.099301] ? ksize_uaf+0x5e4/0x6c0 [ 14.099325] kasan_report+0x141/0x180 [ 14.099350] ? ksize_uaf+0x5e4/0x6c0 [ 14.099378] __asan_report_load1_noabort+0x18/0x20 [ 14.099405] ksize_uaf+0x5e4/0x6c0 [ 14.099428] ? __pfx_ksize_uaf+0x10/0x10 [ 14.099452] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.099478] ? trace_hardirqs_on+0x37/0xe0 [ 14.099504] ? __pfx_read_tsc+0x10/0x10 [ 14.099527] ? ktime_get_ts64+0x86/0x230 [ 14.099553] kunit_try_run_case+0x1a5/0x480 [ 14.099579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.099605] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.099632] ? __kthread_parkme+0x82/0x180 [ 14.099654] ? preempt_count_sub+0x50/0x80 [ 14.099681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.099707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.099732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.099757] kthread+0x337/0x6f0 [ 14.099779] ? trace_preempt_on+0x20/0xc0 [ 14.099804] ? __pfx_kthread+0x10/0x10 [ 14.099827] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.099851] ? calculate_sigpending+0x7b/0xa0 [ 14.099877] ? __pfx_kthread+0x10/0x10 [ 14.099902] ret_from_fork+0x116/0x1d0 [ 14.099922] ? __pfx_kthread+0x10/0x10 [ 14.099945] ret_from_fork_asm+0x1a/0x30 [ 14.099979] </TASK> [ 14.099991] [ 14.109042] Allocated by task 213: [ 14.109228] kasan_save_stack+0x45/0x70 [ 14.109420] kasan_save_track+0x18/0x40 [ 14.109614] kasan_save_alloc_info+0x3b/0x50 [ 14.110213] __kasan_kmalloc+0xb7/0xc0 [ 14.110555] __kmalloc_cache_noprof+0x189/0x420 [ 14.110855] ksize_uaf+0xaa/0x6c0 [ 14.111009] kunit_try_run_case+0x1a5/0x480 [ 14.111361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.111615] kthread+0x337/0x6f0 [ 14.111978] ret_from_fork+0x116/0x1d0 [ 14.112267] ret_from_fork_asm+0x1a/0x30 [ 14.112431] [ 14.112535] Freed by task 213: [ 14.113082] kasan_save_stack+0x45/0x70 [ 14.113298] kasan_save_track+0x18/0x40 [ 14.113451] kasan_save_free_info+0x3f/0x60 [ 14.113609] __kasan_slab_free+0x56/0x70 [ 14.114037] kfree+0x222/0x3f0 [ 14.114475] ksize_uaf+0x12c/0x6c0 [ 14.115104] kunit_try_run_case+0x1a5/0x480 [ 14.115763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.116489] kthread+0x337/0x6f0 [ 14.117097] ret_from_fork+0x116/0x1d0 [ 14.117518] ret_from_fork_asm+0x1a/0x30 [ 14.117679] [ 14.118011] The buggy address belongs to the object at ffff888102c3fe00 [ 14.118011] which belongs to the cache kmalloc-128 of size 128 [ 14.119682] The buggy address is located 120 bytes inside of [ 14.119682] freed 128-byte region [ffff888102c3fe00, ffff888102c3fe80) [ 14.120084] [ 14.120532] The buggy address belongs to the physical page: [ 14.121426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c3f [ 14.121767] flags: 0x200000000000000(node=0|zone=2) [ 14.122008] page_type: f5(slab) [ 14.122201] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 14.122488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.122834] page dumped because: kasan: bad access detected [ 14.123499] [ 14.123601] Memory state around the buggy address: [ 14.124211] ffff888102c3fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.124651] ffff888102c3fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.125163] >ffff888102c3fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.125609] ^ [ 14.126120] ffff888102c3fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.126525] ffff888102c3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.127017] ==================================================================
[ 30.928057] ================================================================== [ 30.935313] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 30.941698] Read of size 1 at addr ffff888105bb0200 by task kunit_try_catch/237 [ 30.949005] [ 30.950508] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 30.950516] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 30.950518] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.950522] Call Trace: [ 30.950523] <TASK> [ 30.950525] dump_stack_lvl+0x73/0xb0 [ 30.950529] print_report+0xd1/0x650 [ 30.950533] ? __virt_addr_valid+0x1db/0x2d0 [ 30.950537] ? ksize_uaf+0x5fe/0x6c0 [ 30.950541] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.950546] ? ksize_uaf+0x5fe/0x6c0 [ 30.950550] kasan_report+0x141/0x180 [ 30.950554] ? ksize_uaf+0x5fe/0x6c0 [ 30.950558] __asan_report_load1_noabort+0x18/0x20 [ 30.950563] ksize_uaf+0x5fe/0x6c0 [ 30.950566] ? __pfx_ksize_uaf+0x10/0x10 [ 30.950570] ? __schedule+0x10cc/0x2b60 [ 30.950574] ? ktime_get_ts64+0x83/0x230 [ 30.950579] kunit_try_run_case+0x1a2/0x480 [ 30.950583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.950587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.950591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.950595] ? __kthread_parkme+0x82/0x180 [ 30.950599] ? preempt_count_sub+0x50/0x80 [ 30.950603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.950607] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.950611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.950615] kthread+0x334/0x6f0 [ 30.950619] ? trace_preempt_on+0x20/0xc0 [ 30.950623] ? __pfx_kthread+0x10/0x10 [ 30.950626] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.950630] ? calculate_sigpending+0x7b/0xa0 [ 30.950634] ? __pfx_kthread+0x10/0x10 [ 30.950638] ret_from_fork+0x113/0x1d0 [ 30.950641] ? __pfx_kthread+0x10/0x10 [ 30.950645] ret_from_fork_asm+0x1a/0x30 [ 30.950651] </TASK> [ 30.950652] [ 31.112032] Allocated by task 237: [ 31.115440] kasan_save_stack+0x45/0x70 [ 31.119278] kasan_save_track+0x18/0x40 [ 31.123119] kasan_save_alloc_info+0x3b/0x50 [ 31.127406] __kasan_kmalloc+0xb7/0xc0 [ 31.131160] __kmalloc_cache_noprof+0x189/0x420 [ 31.135693] ksize_uaf+0xaa/0x6c0 [ 31.139012] kunit_try_run_case+0x1a2/0x480 [ 31.143199] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.148599] kthread+0x334/0x6f0 [ 31.151830] ret_from_fork+0x113/0x1d0 [ 31.155584] ret_from_fork_asm+0x1a/0x30 [ 31.159510] [ 31.161008] Freed by task 237: [ 31.164067] kasan_save_stack+0x45/0x70 [ 31.167907] kasan_save_track+0x18/0x40 [ 31.171747] kasan_save_free_info+0x3f/0x60 [ 31.175942] __kasan_slab_free+0x56/0x70 [ 31.179867] kfree+0x222/0x3f0 [ 31.182928] ksize_uaf+0x12c/0x6c0 [ 31.186361] kunit_try_run_case+0x1a2/0x480 [ 31.190571] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.195969] kthread+0x334/0x6f0 [ 31.199203] ret_from_fork+0x113/0x1d0 [ 31.202956] ret_from_fork_asm+0x1a/0x30 [ 31.206881] [ 31.208379] The buggy address belongs to the object at ffff888105bb0200 [ 31.208379] which belongs to the cache kmalloc-128 of size 128 [ 31.220914] The buggy address is located 0 bytes inside of [ 31.220914] freed 128-byte region [ffff888105bb0200, ffff888105bb0280) [ 31.232994] [ 31.234494] The buggy address belongs to the physical page: [ 31.240065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 31.248065] flags: 0x200000000000000(node=0|zone=2) [ 31.252944] page_type: f5(slab) [ 31.256093] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.263838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.271578] page dumped because: kasan: bad access detected [ 31.277150] [ 31.278648] Memory state around the buggy address: [ 31.283444] ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.290670] ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.297891] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.305110] ^ [ 31.308364] ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315586] ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.322806] ================================================================== [ 30.516166] ================================================================== [ 30.527669] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 30.534031] Read of size 1 at addr ffff888105bb0200 by task kunit_try_catch/237 [ 30.541364] [ 30.542881] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 30.542890] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 30.542893] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.542897] Call Trace: [ 30.542898] <TASK> [ 30.542900] dump_stack_lvl+0x73/0xb0 [ 30.542905] print_report+0xd1/0x650 [ 30.542909] ? __virt_addr_valid+0x1db/0x2d0 [ 30.542913] ? ksize_uaf+0x19d/0x6c0 [ 30.542916] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.542922] ? ksize_uaf+0x19d/0x6c0 [ 30.542925] kasan_report+0x141/0x180 [ 30.542929] ? ksize_uaf+0x19d/0x6c0 [ 30.542934] ? ksize_uaf+0x19d/0x6c0 [ 30.542937] __kasan_check_byte+0x3d/0x50 [ 30.542941] ksize+0x20/0x60 [ 30.542944] ksize_uaf+0x19d/0x6c0 [ 30.542948] ? __pfx_ksize_uaf+0x10/0x10 [ 30.542952] ? __schedule+0x10cc/0x2b60 [ 30.542956] ? ktime_get_ts64+0x83/0x230 [ 30.542960] kunit_try_run_case+0x1a2/0x480 [ 30.542965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.542969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.542973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.542977] ? __kthread_parkme+0x82/0x180 [ 30.542981] ? preempt_count_sub+0x50/0x80 [ 30.542985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.542989] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.542993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.542997] kthread+0x334/0x6f0 [ 30.543001] ? trace_preempt_on+0x20/0xc0 [ 30.543005] ? __pfx_kthread+0x10/0x10 [ 30.543009] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.543012] ? calculate_sigpending+0x7b/0xa0 [ 30.543017] ? __pfx_kthread+0x10/0x10 [ 30.543021] ret_from_fork+0x113/0x1d0 [ 30.543024] ? __pfx_kthread+0x10/0x10 [ 30.543027] ret_from_fork_asm+0x1a/0x30 [ 30.543033] </TASK> [ 30.543035] [ 30.709997] Allocated by task 237: [ 30.713403] kasan_save_stack+0x45/0x70 [ 30.717243] kasan_save_track+0x18/0x40 [ 30.721081] kasan_save_alloc_info+0x3b/0x50 [ 30.725367] __kasan_kmalloc+0xb7/0xc0 [ 30.729140] __kmalloc_cache_noprof+0x189/0x420 [ 30.733674] ksize_uaf+0xaa/0x6c0 [ 30.736994] kunit_try_run_case+0x1a2/0x480 [ 30.741180] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.746580] kthread+0x334/0x6f0 [ 30.749811] ret_from_fork+0x113/0x1d0 [ 30.753565] ret_from_fork_asm+0x1a/0x30 [ 30.757499] [ 30.758997] Freed by task 237: [ 30.762058] kasan_save_stack+0x45/0x70 [ 30.765897] kasan_save_track+0x18/0x40 [ 30.769737] kasan_save_free_info+0x3f/0x60 [ 30.773922] __kasan_slab_free+0x56/0x70 [ 30.777850] kfree+0x222/0x3f0 [ 30.780918] ksize_uaf+0x12c/0x6c0 [ 30.784323] kunit_try_run_case+0x1a2/0x480 [ 30.788542] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.793943] kthread+0x334/0x6f0 [ 30.797176] ret_from_fork+0x113/0x1d0 [ 30.800927] ret_from_fork_asm+0x1a/0x30 [ 30.804853] [ 30.806363] The buggy address belongs to the object at ffff888105bb0200 [ 30.806363] which belongs to the cache kmalloc-128 of size 128 [ 30.818895] The buggy address is located 0 bytes inside of [ 30.818895] freed 128-byte region [ffff888105bb0200, ffff888105bb0280) [ 30.830975] [ 30.832475] The buggy address belongs to the physical page: [ 30.838046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 30.846045] flags: 0x200000000000000(node=0|zone=2) [ 30.850925] page_type: f5(slab) [ 30.854074] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.861819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.869560] page dumped because: kasan: bad access detected [ 30.875130] [ 30.876631] Memory state around the buggy address: [ 30.881425] ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.888653] ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.895870] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.903088] ^ [ 30.906322] ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.913567] ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.920788] ================================================================== [ 31.330048] ================================================================== [ 31.337279] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 31.343631] Read of size 1 at addr ffff888105bb0278 by task kunit_try_catch/237 [ 31.350937] [ 31.352437] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 31.352445] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 31.352448] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 31.352451] Call Trace: [ 31.352452] <TASK> [ 31.352454] dump_stack_lvl+0x73/0xb0 [ 31.352458] print_report+0xd1/0x650 [ 31.352462] ? __virt_addr_valid+0x1db/0x2d0 [ 31.352466] ? ksize_uaf+0x5e4/0x6c0 [ 31.352470] ? kasan_complete_mode_report_info+0x64/0x200 [ 31.352475] ? ksize_uaf+0x5e4/0x6c0 [ 31.352478] kasan_report+0x141/0x180 [ 31.352482] ? ksize_uaf+0x5e4/0x6c0 [ 31.352487] __asan_report_load1_noabort+0x18/0x20 [ 31.352492] ksize_uaf+0x5e4/0x6c0 [ 31.352495] ? __pfx_ksize_uaf+0x10/0x10 [ 31.352499] ? __schedule+0x10cc/0x2b60 [ 31.352503] ? ktime_get_ts64+0x83/0x230 [ 31.352507] kunit_try_run_case+0x1a2/0x480 [ 31.352512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.352516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.352520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.352524] ? __kthread_parkme+0x82/0x180 [ 31.352527] ? preempt_count_sub+0x50/0x80 [ 31.352531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.352536] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.352540] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.352544] kthread+0x334/0x6f0 [ 31.352547] ? trace_preempt_on+0x20/0xc0 [ 31.352551] ? __pfx_kthread+0x10/0x10 [ 31.352555] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.352559] ? calculate_sigpending+0x7b/0xa0 [ 31.352563] ? __pfx_kthread+0x10/0x10 [ 31.352567] ret_from_fork+0x113/0x1d0 [ 31.352570] ? __pfx_kthread+0x10/0x10 [ 31.352574] ret_from_fork_asm+0x1a/0x30 [ 31.352579] </TASK> [ 31.352581] [ 31.513906] Allocated by task 237: [ 31.517311] kasan_save_stack+0x45/0x70 [ 31.521150] kasan_save_track+0x18/0x40 [ 31.524988] kasan_save_alloc_info+0x3b/0x50 [ 31.529263] __kasan_kmalloc+0xb7/0xc0 [ 31.533016] __kmalloc_cache_noprof+0x189/0x420 [ 31.537555] ksize_uaf+0xaa/0x6c0 [ 31.540876] kunit_try_run_case+0x1a2/0x480 [ 31.545061] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.550460] kthread+0x334/0x6f0 [ 31.553692] ret_from_fork+0x113/0x1d0 [ 31.557445] ret_from_fork_asm+0x1a/0x30 [ 31.561372] [ 31.562897] Freed by task 237: [ 31.565956] kasan_save_stack+0x45/0x70 [ 31.569796] kasan_save_track+0x18/0x40 [ 31.573635] kasan_save_free_info+0x3f/0x60 [ 31.577821] __kasan_slab_free+0x56/0x70 [ 31.581747] kfree+0x222/0x3f0 [ 31.584808] ksize_uaf+0x12c/0x6c0 [ 31.588214] kunit_try_run_case+0x1a2/0x480 [ 31.592409] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.597817] kthread+0x334/0x6f0 [ 31.601047] ret_from_fork+0x113/0x1d0 [ 31.604802] ret_from_fork_asm+0x1a/0x30 [ 31.608726] [ 31.610226] The buggy address belongs to the object at ffff888105bb0200 [ 31.610226] which belongs to the cache kmalloc-128 of size 128 [ 31.622742] The buggy address is located 120 bytes inside of [ 31.622742] freed 128-byte region [ffff888105bb0200, ffff888105bb0280) [ 31.634995] [ 31.636494] The buggy address belongs to the physical page: [ 31.642066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 31.650065] flags: 0x200000000000000(node=0|zone=2) [ 31.654946] page_type: f5(slab) [ 31.658093] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.665833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.673580] page dumped because: kasan: bad access detected [ 31.679151] [ 31.680649] Memory state around the buggy address: [ 31.685445] ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.692671] ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.699890] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.707112] ^ [ 31.714243] ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.721461] ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.728680] ==================================================================