Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.879455] ================================================================== [ 16.879616] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 16.879679] Read of size 1 at addr fff00000c6691a00 by task kunit_try_catch/196 [ 16.879730] [ 16.879989] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.880306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.880591] Hardware name: linux,dummy-virt (DT) [ 16.880688] Call trace: [ 16.880788] show_stack+0x20/0x38 (C) [ 16.880891] dump_stack_lvl+0x8c/0xd0 [ 16.881074] print_report+0x118/0x5d0 [ 16.881154] kasan_report+0xdc/0x128 [ 16.881344] __asan_report_load1_noabort+0x20/0x30 [ 16.881404] ksize_uaf+0x598/0x5f8 [ 16.881463] kunit_try_run_case+0x170/0x3f0 [ 16.881511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.881562] kthread+0x328/0x630 [ 16.881605] ret_from_fork+0x10/0x20 [ 16.881651] [ 16.881669] Allocated by task 196: [ 16.881697] kasan_save_stack+0x3c/0x68 [ 16.881737] kasan_save_track+0x20/0x40 [ 16.881774] kasan_save_alloc_info+0x40/0x58 [ 16.881824] __kasan_kmalloc+0xd4/0xd8 [ 16.881881] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.881921] ksize_uaf+0xb8/0x5f8 [ 16.881961] kunit_try_run_case+0x170/0x3f0 [ 16.881999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.882041] kthread+0x328/0x630 [ 16.882073] ret_from_fork+0x10/0x20 [ 16.882107] [ 16.882125] Freed by task 196: [ 16.882159] kasan_save_stack+0x3c/0x68 [ 16.882195] kasan_save_track+0x20/0x40 [ 16.882233] kasan_save_free_info+0x4c/0x78 [ 16.882286] __kasan_slab_free+0x6c/0x98 [ 16.882324] kfree+0x214/0x3c8 [ 16.882356] ksize_uaf+0x11c/0x5f8 [ 16.882389] kunit_try_run_case+0x170/0x3f0 [ 16.882427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.882470] kthread+0x328/0x630 [ 16.882511] ret_from_fork+0x10/0x20 [ 16.882556] [ 16.882576] The buggy address belongs to the object at fff00000c6691a00 [ 16.882576] which belongs to the cache kmalloc-128 of size 128 [ 16.882644] The buggy address is located 0 bytes inside of [ 16.882644] freed 128-byte region [fff00000c6691a00, fff00000c6691a80) [ 16.882705] [ 16.882735] The buggy address belongs to the physical page: [ 16.882767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691 [ 16.882834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.883150] page_type: f5(slab) [ 16.883225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.884068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.884163] page dumped because: kasan: bad access detected [ 16.884242] [ 16.884298] Memory state around the buggy address: [ 16.884449] fff00000c6691900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.884763] fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.885202] >fff00000c6691a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.885900] ^ [ 16.886273] fff00000c6691a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.886653] fff00000c6691b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.886769] ================================================================== [ 16.865295] ================================================================== [ 16.865366] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 16.865426] Read of size 1 at addr fff00000c6691a00 by task kunit_try_catch/196 [ 16.865938] [ 16.866013] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.866424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.866451] Hardware name: linux,dummy-virt (DT) [ 16.866601] Call trace: [ 16.866638] show_stack+0x20/0x38 (C) [ 16.866691] dump_stack_lvl+0x8c/0xd0 [ 16.866841] print_report+0x118/0x5d0 [ 16.866925] kasan_report+0xdc/0x128 [ 16.867296] __kasan_check_byte+0x54/0x70 [ 16.867363] ksize+0x30/0x88 [ 16.867408] ksize_uaf+0x168/0x5f8 [ 16.867560] kunit_try_run_case+0x170/0x3f0 [ 16.867622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.867768] kthread+0x328/0x630 [ 16.867856] ret_from_fork+0x10/0x20 [ 16.867961] [ 16.867980] Allocated by task 196: [ 16.868469] kasan_save_stack+0x3c/0x68 [ 16.868582] kasan_save_track+0x20/0x40 [ 16.868735] kasan_save_alloc_info+0x40/0x58 [ 16.868930] __kasan_kmalloc+0xd4/0xd8 [ 16.869000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.869059] ksize_uaf+0xb8/0x5f8 [ 16.869365] kunit_try_run_case+0x170/0x3f0 [ 16.870111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.870191] kthread+0x328/0x630 [ 16.870257] ret_from_fork+0x10/0x20 [ 16.870331] [ 16.870392] Freed by task 196: [ 16.870938] kasan_save_stack+0x3c/0x68 [ 16.871245] kasan_save_track+0x20/0x40 [ 16.871725] kasan_save_free_info+0x4c/0x78 [ 16.871846] __kasan_slab_free+0x6c/0x98 [ 16.872140] kfree+0x214/0x3c8 [ 16.872290] ksize_uaf+0x11c/0x5f8 [ 16.872420] kunit_try_run_case+0x170/0x3f0 [ 16.872615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.872873] kthread+0x328/0x630 [ 16.872990] ret_from_fork+0x10/0x20 [ 16.873153] [ 16.873287] The buggy address belongs to the object at fff00000c6691a00 [ 16.873287] which belongs to the cache kmalloc-128 of size 128 [ 16.873532] The buggy address is located 0 bytes inside of [ 16.873532] freed 128-byte region [fff00000c6691a00, fff00000c6691a80) [ 16.873648] [ 16.873671] The buggy address belongs to the physical page: [ 16.874066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691 [ 16.874261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.874544] page_type: f5(slab) [ 16.874726] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.874847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.874931] page dumped because: kasan: bad access detected [ 16.875233] [ 16.875268] Memory state around the buggy address: [ 16.875307] fff00000c6691900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.875681] fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.875799] >fff00000c6691a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.875853] ^ [ 16.875900] fff00000c6691a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.876251] fff00000c6691b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.876350] ================================================================== [ 16.889191] ================================================================== [ 16.889249] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 16.889473] Read of size 1 at addr fff00000c6691a78 by task kunit_try_catch/196 [ 16.889676] [ 16.889719] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.889911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.890105] Hardware name: linux,dummy-virt (DT) [ 16.890310] Call trace: [ 16.890350] show_stack+0x20/0x38 (C) [ 16.890452] dump_stack_lvl+0x8c/0xd0 [ 16.890503] print_report+0x118/0x5d0 [ 16.890549] kasan_report+0xdc/0x128 [ 16.890592] __asan_report_load1_noabort+0x20/0x30 [ 16.890693] ksize_uaf+0x544/0x5f8 [ 16.890736] kunit_try_run_case+0x170/0x3f0 [ 16.890798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.891182] kthread+0x328/0x630 [ 16.891276] ret_from_fork+0x10/0x20 [ 16.891532] [ 16.891599] Allocated by task 196: [ 16.891648] kasan_save_stack+0x3c/0x68 [ 16.891702] kasan_save_track+0x20/0x40 [ 16.891739] kasan_save_alloc_info+0x40/0x58 [ 16.892348] __kasan_kmalloc+0xd4/0xd8 [ 16.892451] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.892551] ksize_uaf+0xb8/0x5f8 [ 16.892621] kunit_try_run_case+0x170/0x3f0 [ 16.892747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.892813] kthread+0x328/0x630 [ 16.892951] ret_from_fork+0x10/0x20 [ 16.893199] [ 16.893363] Freed by task 196: [ 16.893528] kasan_save_stack+0x3c/0x68 [ 16.893634] kasan_save_track+0x20/0x40 [ 16.893807] kasan_save_free_info+0x4c/0x78 [ 16.893896] __kasan_slab_free+0x6c/0x98 [ 16.894061] kfree+0x214/0x3c8 [ 16.894300] ksize_uaf+0x11c/0x5f8 [ 16.894433] kunit_try_run_case+0x170/0x3f0 [ 16.895141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.897668] kthread+0x328/0x630 [ 16.897720] ret_from_fork+0x10/0x20 [ 16.897759] [ 16.897781] The buggy address belongs to the object at fff00000c6691a00 [ 16.897781] which belongs to the cache kmalloc-128 of size 128 [ 16.897841] The buggy address is located 120 bytes inside of [ 16.897841] freed 128-byte region [fff00000c6691a00, fff00000c6691a80) [ 16.897919] [ 16.897943] The buggy address belongs to the physical page: [ 16.897975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106691 [ 16.898032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.898083] page_type: f5(slab) [ 16.898123] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 16.898172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.898212] page dumped because: kasan: bad access detected [ 16.898243] [ 16.898263] Memory state around the buggy address: [ 16.898295] fff00000c6691900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.898338] fff00000c6691980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.898381] >fff00000c6691a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.898416] ^ [ 16.898456] fff00000c6691a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.898497] fff00000c6691b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.898535] ==================================================================
[ 12.797873] ================================================================== [ 12.798160] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 12.798612] Read of size 1 at addr ffff8881026a6c00 by task kunit_try_catch/213 [ 12.798999] [ 12.799114] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.799156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.799167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.799187] Call Trace: [ 12.799199] <TASK> [ 12.799215] dump_stack_lvl+0x73/0xb0 [ 12.799243] print_report+0xd1/0x610 [ 12.799264] ? __virt_addr_valid+0x1db/0x2d0 [ 12.799298] ? ksize_uaf+0x5fe/0x6c0 [ 12.799318] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.799340] ? ksize_uaf+0x5fe/0x6c0 [ 12.799360] kasan_report+0x141/0x180 [ 12.799392] ? ksize_uaf+0x5fe/0x6c0 [ 12.799417] __asan_report_load1_noabort+0x18/0x20 [ 12.799441] ksize_uaf+0x5fe/0x6c0 [ 12.799460] ? __pfx_ksize_uaf+0x10/0x10 [ 12.799481] ? __schedule+0x10cc/0x2b60 [ 12.799513] ? __pfx_read_tsc+0x10/0x10 [ 12.799533] ? ktime_get_ts64+0x86/0x230 [ 12.799557] kunit_try_run_case+0x1a5/0x480 [ 12.799590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.799613] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.799636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.799659] ? __kthread_parkme+0x82/0x180 [ 12.799678] ? preempt_count_sub+0x50/0x80 [ 12.799702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.799725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.799748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.799780] kthread+0x337/0x6f0 [ 12.799798] ? trace_preempt_on+0x20/0xc0 [ 12.799859] ? __pfx_kthread+0x10/0x10 [ 12.799879] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.799899] ? calculate_sigpending+0x7b/0xa0 [ 12.799923] ? __pfx_kthread+0x10/0x10 [ 12.799943] ret_from_fork+0x116/0x1d0 [ 12.799961] ? __pfx_kthread+0x10/0x10 [ 12.799981] ret_from_fork_asm+0x1a/0x30 [ 12.800012] </TASK> [ 12.800021] [ 12.807623] Allocated by task 213: [ 12.807757] kasan_save_stack+0x45/0x70 [ 12.808067] kasan_save_track+0x18/0x40 [ 12.808287] kasan_save_alloc_info+0x3b/0x50 [ 12.808522] __kasan_kmalloc+0xb7/0xc0 [ 12.808884] __kmalloc_cache_noprof+0x189/0x420 [ 12.809088] ksize_uaf+0xaa/0x6c0 [ 12.809212] kunit_try_run_case+0x1a5/0x480 [ 12.809396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.809715] kthread+0x337/0x6f0 [ 12.809934] ret_from_fork+0x116/0x1d0 [ 12.810365] ret_from_fork_asm+0x1a/0x30 [ 12.810609] [ 12.810697] Freed by task 213: [ 12.810920] kasan_save_stack+0x45/0x70 [ 12.811122] kasan_save_track+0x18/0x40 [ 12.811308] kasan_save_free_info+0x3f/0x60 [ 12.811528] __kasan_slab_free+0x56/0x70 [ 12.811754] kfree+0x222/0x3f0 [ 12.812036] ksize_uaf+0x12c/0x6c0 [ 12.812176] kunit_try_run_case+0x1a5/0x480 [ 12.812324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.812499] kthread+0x337/0x6f0 [ 12.812655] ret_from_fork+0x116/0x1d0 [ 12.812864] ret_from_fork_asm+0x1a/0x30 [ 12.813077] [ 12.813171] The buggy address belongs to the object at ffff8881026a6c00 [ 12.813171] which belongs to the cache kmalloc-128 of size 128 [ 12.813788] The buggy address is located 0 bytes inside of [ 12.813788] freed 128-byte region [ffff8881026a6c00, ffff8881026a6c80) [ 12.814143] [ 12.814294] The buggy address belongs to the physical page: [ 12.814584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a6 [ 12.815086] flags: 0x200000000000000(node=0|zone=2) [ 12.815396] page_type: f5(slab) [ 12.815518] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.815824] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.816386] page dumped because: kasan: bad access detected [ 12.816717] [ 12.816860] Memory state around the buggy address: [ 12.817100] ffff8881026a6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.817384] ffff8881026a6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.817629] >ffff8881026a6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.818036] ^ [ 12.818223] ffff8881026a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.818510] ffff8881026a6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.818988] ================================================================== [ 12.769491] ================================================================== [ 12.770010] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 12.770367] Read of size 1 at addr ffff8881026a6c00 by task kunit_try_catch/213 [ 12.771268] [ 12.771375] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.771422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.771433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.771456] Call Trace: [ 12.771468] <TASK> [ 12.771487] dump_stack_lvl+0x73/0xb0 [ 12.771520] print_report+0xd1/0x610 [ 12.771542] ? __virt_addr_valid+0x1db/0x2d0 [ 12.771566] ? ksize_uaf+0x19d/0x6c0 [ 12.771585] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.771732] ? ksize_uaf+0x19d/0x6c0 [ 12.771766] kasan_report+0x141/0x180 [ 12.771788] ? ksize_uaf+0x19d/0x6c0 [ 12.771845] ? ksize_uaf+0x19d/0x6c0 [ 12.771868] __kasan_check_byte+0x3d/0x50 [ 12.771889] ksize+0x20/0x60 [ 12.771910] ksize_uaf+0x19d/0x6c0 [ 12.771930] ? __pfx_ksize_uaf+0x10/0x10 [ 12.771951] ? __schedule+0x10cc/0x2b60 [ 12.771974] ? __pfx_read_tsc+0x10/0x10 [ 12.771995] ? ktime_get_ts64+0x86/0x230 [ 12.772020] kunit_try_run_case+0x1a5/0x480 [ 12.772046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.772078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.772102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.772125] ? __kthread_parkme+0x82/0x180 [ 12.772146] ? preempt_count_sub+0x50/0x80 [ 12.772171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.772194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.772217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.772240] kthread+0x337/0x6f0 [ 12.772258] ? trace_preempt_on+0x20/0xc0 [ 12.772281] ? __pfx_kthread+0x10/0x10 [ 12.772301] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.772321] ? calculate_sigpending+0x7b/0xa0 [ 12.772346] ? __pfx_kthread+0x10/0x10 [ 12.772366] ret_from_fork+0x116/0x1d0 [ 12.772384] ? __pfx_kthread+0x10/0x10 [ 12.772404] ret_from_fork_asm+0x1a/0x30 [ 12.772437] </TASK> [ 12.772447] [ 12.785250] Allocated by task 213: [ 12.785388] kasan_save_stack+0x45/0x70 [ 12.785536] kasan_save_track+0x18/0x40 [ 12.785705] kasan_save_alloc_info+0x3b/0x50 [ 12.785854] __kasan_kmalloc+0xb7/0xc0 [ 12.786156] __kmalloc_cache_noprof+0x189/0x420 [ 12.786397] ksize_uaf+0xaa/0x6c0 [ 12.786575] kunit_try_run_case+0x1a5/0x480 [ 12.786744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.786971] kthread+0x337/0x6f0 [ 12.787242] ret_from_fork+0x116/0x1d0 [ 12.787383] ret_from_fork_asm+0x1a/0x30 [ 12.787563] [ 12.787761] Freed by task 213: [ 12.788132] kasan_save_stack+0x45/0x70 [ 12.788379] kasan_save_track+0x18/0x40 [ 12.788560] kasan_save_free_info+0x3f/0x60 [ 12.788717] __kasan_slab_free+0x56/0x70 [ 12.789014] kfree+0x222/0x3f0 [ 12.789310] ksize_uaf+0x12c/0x6c0 [ 12.789639] kunit_try_run_case+0x1a5/0x480 [ 12.789936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.790232] kthread+0x337/0x6f0 [ 12.790374] ret_from_fork+0x116/0x1d0 [ 12.790562] ret_from_fork_asm+0x1a/0x30 [ 12.790920] [ 12.791089] The buggy address belongs to the object at ffff8881026a6c00 [ 12.791089] which belongs to the cache kmalloc-128 of size 128 [ 12.791629] The buggy address is located 0 bytes inside of [ 12.791629] freed 128-byte region [ffff8881026a6c00, ffff8881026a6c80) [ 12.792147] [ 12.792248] The buggy address belongs to the physical page: [ 12.792585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a6 [ 12.793045] flags: 0x200000000000000(node=0|zone=2) [ 12.793304] page_type: f5(slab) [ 12.793444] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.793892] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.794262] page dumped because: kasan: bad access detected [ 12.794947] [ 12.795070] Memory state around the buggy address: [ 12.795278] ffff8881026a6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.795617] ffff8881026a6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.796037] >ffff8881026a6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.796387] ^ [ 12.796574] ffff8881026a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.796919] ffff8881026a6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.797246] ================================================================== [ 12.819454] ================================================================== [ 12.820110] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 12.820423] Read of size 1 at addr ffff8881026a6c78 by task kunit_try_catch/213 [ 12.820773] [ 12.820986] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.821041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.821070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.821091] Call Trace: [ 12.821109] <TASK> [ 12.821127] dump_stack_lvl+0x73/0xb0 [ 12.821155] print_report+0xd1/0x610 [ 12.821177] ? __virt_addr_valid+0x1db/0x2d0 [ 12.821199] ? ksize_uaf+0x5e4/0x6c0 [ 12.821228] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.821250] ? ksize_uaf+0x5e4/0x6c0 [ 12.821272] kasan_report+0x141/0x180 [ 12.821304] ? ksize_uaf+0x5e4/0x6c0 [ 12.821330] __asan_report_load1_noabort+0x18/0x20 [ 12.821353] ksize_uaf+0x5e4/0x6c0 [ 12.821373] ? __pfx_ksize_uaf+0x10/0x10 [ 12.821394] ? __schedule+0x10cc/0x2b60 [ 12.821426] ? __pfx_read_tsc+0x10/0x10 [ 12.821446] ? ktime_get_ts64+0x86/0x230 [ 12.821470] kunit_try_run_case+0x1a5/0x480 [ 12.821504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.821526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.821549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.821580] ? __kthread_parkme+0x82/0x180 [ 12.821610] ? preempt_count_sub+0x50/0x80 [ 12.821634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.821669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.821693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.821716] kthread+0x337/0x6f0 [ 12.821734] ? trace_preempt_on+0x20/0xc0 [ 12.821757] ? __pfx_kthread+0x10/0x10 [ 12.821785] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.821806] ? calculate_sigpending+0x7b/0xa0 [ 12.821830] ? __pfx_kthread+0x10/0x10 [ 12.821908] ret_from_fork+0x116/0x1d0 [ 12.821928] ? __pfx_kthread+0x10/0x10 [ 12.821947] ret_from_fork_asm+0x1a/0x30 [ 12.821980] </TASK> [ 12.821990] [ 12.829476] Allocated by task 213: [ 12.829759] kasan_save_stack+0x45/0x70 [ 12.830014] kasan_save_track+0x18/0x40 [ 12.830223] kasan_save_alloc_info+0x3b/0x50 [ 12.830440] __kasan_kmalloc+0xb7/0xc0 [ 12.830715] __kmalloc_cache_noprof+0x189/0x420 [ 12.831155] ksize_uaf+0xaa/0x6c0 [ 12.831292] kunit_try_run_case+0x1a5/0x480 [ 12.831441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.831754] kthread+0x337/0x6f0 [ 12.832065] ret_from_fork+0x116/0x1d0 [ 12.832514] ret_from_fork_asm+0x1a/0x30 [ 12.832934] [ 12.833011] Freed by task 213: [ 12.833135] kasan_save_stack+0x45/0x70 [ 12.833274] kasan_save_track+0x18/0x40 [ 12.833409] kasan_save_free_info+0x3f/0x60 [ 12.833555] __kasan_slab_free+0x56/0x70 [ 12.833699] kfree+0x222/0x3f0 [ 12.833861] ksize_uaf+0x12c/0x6c0 [ 12.834039] kunit_try_run_case+0x1a5/0x480 [ 12.834295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.834580] kthread+0x337/0x6f0 [ 12.834772] ret_from_fork+0x116/0x1d0 [ 12.835195] ret_from_fork_asm+0x1a/0x30 [ 12.835427] [ 12.835548] The buggy address belongs to the object at ffff8881026a6c00 [ 12.835548] which belongs to the cache kmalloc-128 of size 128 [ 12.836197] The buggy address is located 120 bytes inside of [ 12.836197] freed 128-byte region [ffff8881026a6c00, ffff8881026a6c80) [ 12.836555] [ 12.836628] The buggy address belongs to the physical page: [ 12.836902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a6 [ 12.837291] flags: 0x200000000000000(node=0|zone=2) [ 12.837784] page_type: f5(slab) [ 12.838267] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 12.838617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.839062] page dumped because: kasan: bad access detected [ 12.839292] [ 12.839479] Memory state around the buggy address: [ 12.839700] ffff8881026a6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.840089] ffff8881026a6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.840418] >ffff8881026a6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.840777] ^ [ 12.841202] ffff8881026a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.841513] ffff8881026a6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.842074] ==================================================================