Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 15.867356] ================================================================== [ 15.867421] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 15.867476] Read of size 1 at addr fff00000c592cf00 by task kunit_try_catch/197 [ 15.867527] [ 15.867560] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.867645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.867670] Hardware name: linux,dummy-virt (DT) [ 15.867699] Call trace: [ 15.867722] show_stack+0x20/0x38 (C) [ 15.867769] dump_stack_lvl+0x8c/0xd0 [ 15.868413] print_report+0x118/0x5d0 [ 15.868953] kasan_report+0xdc/0x128 [ 15.869355] __kasan_check_byte+0x54/0x70 [ 15.869407] ksize+0x30/0x88 [ 15.869451] ksize_uaf+0x168/0x5f8 [ 15.869502] kunit_try_run_case+0x170/0x3f0 [ 15.869931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.869993] kthread+0x328/0x630 [ 15.870038] ret_from_fork+0x10/0x20 [ 15.870216] [ 15.870240] Allocated by task 197: [ 15.870285] kasan_save_stack+0x3c/0x68 [ 15.870456] kasan_save_track+0x20/0x40 [ 15.870533] kasan_save_alloc_info+0x40/0x58 [ 15.870972] __kasan_kmalloc+0xd4/0xd8 [ 15.871155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.871419] ksize_uaf+0xb8/0x5f8 [ 15.871463] kunit_try_run_case+0x170/0x3f0 [ 15.871738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.872224] kthread+0x328/0x630 [ 15.872266] ret_from_fork+0x10/0x20 [ 15.872301] [ 15.872586] Freed by task 197: [ 15.872737] kasan_save_stack+0x3c/0x68 [ 15.872978] kasan_save_track+0x20/0x40 [ 15.873075] kasan_save_free_info+0x4c/0x78 [ 15.873116] __kasan_slab_free+0x6c/0x98 [ 15.873153] kfree+0x214/0x3c8 [ 15.873251] ksize_uaf+0x11c/0x5f8 [ 15.873288] kunit_try_run_case+0x170/0x3f0 [ 15.873379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.873548] kthread+0x328/0x630 [ 15.873595] ret_from_fork+0x10/0x20 [ 15.873739] [ 15.873878] The buggy address belongs to the object at fff00000c592cf00 [ 15.873878] which belongs to the cache kmalloc-128 of size 128 [ 15.874251] The buggy address is located 0 bytes inside of [ 15.874251] freed 128-byte region [fff00000c592cf00, fff00000c592cf80) [ 15.874544] [ 15.874566] The buggy address belongs to the physical page: [ 15.874599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.874995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.875061] page_type: f5(slab) [ 15.875101] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.875188] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.875488] page dumped because: kasan: bad access detected [ 15.875540] [ 15.875557] Memory state around the buggy address: [ 15.875852] fff00000c592ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.876212] fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.876398] >fff00000c592cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.876693] ^ [ 15.876776] fff00000c592cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.876821] fff00000c592d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.877311] ================================================================== [ 15.878316] ================================================================== [ 15.878372] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 15.878421] Read of size 1 at addr fff00000c592cf00 by task kunit_try_catch/197 [ 15.878471] [ 15.878900] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.879010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.879720] Hardware name: linux,dummy-virt (DT) [ 15.879969] Call trace: [ 15.880005] show_stack+0x20/0x38 (C) [ 15.880108] dump_stack_lvl+0x8c/0xd0 [ 15.880318] print_report+0x118/0x5d0 [ 15.880382] kasan_report+0xdc/0x128 [ 15.880628] __asan_report_load1_noabort+0x20/0x30 [ 15.880741] ksize_uaf+0x598/0x5f8 [ 15.880785] kunit_try_run_case+0x170/0x3f0 [ 15.880831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.880883] kthread+0x328/0x630 [ 15.880926] ret_from_fork+0x10/0x20 [ 15.881350] [ 15.881464] Allocated by task 197: [ 15.881691] kasan_save_stack+0x3c/0x68 [ 15.881737] kasan_save_track+0x20/0x40 [ 15.881776] kasan_save_alloc_info+0x40/0x58 [ 15.881815] __kasan_kmalloc+0xd4/0xd8 [ 15.881851] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.881890] ksize_uaf+0xb8/0x5f8 [ 15.882447] kunit_try_run_case+0x170/0x3f0 [ 15.882907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.882963] kthread+0x328/0x630 [ 15.882997] ret_from_fork+0x10/0x20 [ 15.883032] [ 15.883051] Freed by task 197: [ 15.883078] kasan_save_stack+0x3c/0x68 [ 15.883115] kasan_save_track+0x20/0x40 [ 15.883926] kasan_save_free_info+0x4c/0x78 [ 15.884201] __kasan_slab_free+0x6c/0x98 [ 15.884269] kfree+0x214/0x3c8 [ 15.884315] ksize_uaf+0x11c/0x5f8 [ 15.884348] kunit_try_run_case+0x170/0x3f0 [ 15.884544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.884594] kthread+0x328/0x630 [ 15.884685] ret_from_fork+0x10/0x20 [ 15.884743] [ 15.885096] The buggy address belongs to the object at fff00000c592cf00 [ 15.885096] which belongs to the cache kmalloc-128 of size 128 [ 15.885349] The buggy address is located 0 bytes inside of [ 15.885349] freed 128-byte region [fff00000c592cf00, fff00000c592cf80) [ 15.885415] [ 15.885435] The buggy address belongs to the physical page: [ 15.885589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.885670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.886132] page_type: f5(slab) [ 15.886173] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.886355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.886763] page dumped because: kasan: bad access detected [ 15.886801] [ 15.887016] Memory state around the buggy address: [ 15.887129] fff00000c592ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.887380] fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.887431] >fff00000c592cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.887886] ^ [ 15.888012] fff00000c592cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.888057] fff00000c592d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.888096] ================================================================== [ 15.890099] ================================================================== [ 15.890419] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 15.890613] Read of size 1 at addr fff00000c592cf78 by task kunit_try_catch/197 [ 15.890781] [ 15.890969] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 15.891054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.891081] Hardware name: linux,dummy-virt (DT) [ 15.891576] Call trace: [ 15.891630] show_stack+0x20/0x38 (C) [ 15.891913] dump_stack_lvl+0x8c/0xd0 [ 15.892058] print_report+0x118/0x5d0 [ 15.892105] kasan_report+0xdc/0x128 [ 15.892149] __asan_report_load1_noabort+0x20/0x30 [ 15.892244] ksize_uaf+0x544/0x5f8 [ 15.892288] kunit_try_run_case+0x170/0x3f0 [ 15.892346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.892640] kthread+0x328/0x630 [ 15.892933] ret_from_fork+0x10/0x20 [ 15.893337] [ 15.893372] Allocated by task 197: [ 15.893405] kasan_save_stack+0x3c/0x68 [ 15.893498] kasan_save_track+0x20/0x40 [ 15.893539] kasan_save_alloc_info+0x40/0x58 [ 15.893713] __kasan_kmalloc+0xd4/0xd8 [ 15.893764] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.894109] ksize_uaf+0xb8/0x5f8 [ 15.894145] kunit_try_run_case+0x170/0x3f0 [ 15.894633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.894688] kthread+0x328/0x630 [ 15.894724] ret_from_fork+0x10/0x20 [ 15.894762] [ 15.894781] Freed by task 197: [ 15.894807] kasan_save_stack+0x3c/0x68 [ 15.894848] kasan_save_track+0x20/0x40 [ 15.895400] kasan_save_free_info+0x4c/0x78 [ 15.895783] __kasan_slab_free+0x6c/0x98 [ 15.895846] kfree+0x214/0x3c8 [ 15.895880] ksize_uaf+0x11c/0x5f8 [ 15.895913] kunit_try_run_case+0x170/0x3f0 [ 15.895949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.896348] kthread+0x328/0x630 [ 15.896400] ret_from_fork+0x10/0x20 [ 15.896483] [ 15.896791] The buggy address belongs to the object at fff00000c592cf00 [ 15.896791] which belongs to the cache kmalloc-128 of size 128 [ 15.897000] The buggy address is located 120 bytes inside of [ 15.897000] freed 128-byte region [fff00000c592cf00, fff00000c592cf80) [ 15.897127] [ 15.897342] The buggy address belongs to the physical page: [ 15.897373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10592c [ 15.897584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.897639] page_type: f5(slab) [ 15.898213] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 15.898515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.898561] page dumped because: kasan: bad access detected [ 15.898593] [ 15.898612] Memory state around the buggy address: [ 15.898644] fff00000c592ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.898689] fff00000c592ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.899112] >fff00000c592cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.899154] ^ [ 15.899337] fff00000c592cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.899398] fff00000c592d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.899439] ==================================================================
[ 13.083478] ================================================================== [ 13.084300] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 13.085100] Read of size 1 at addr ffff888102afc578 by task kunit_try_catch/213 [ 13.085662] [ 13.085792] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.085836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.085848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.085867] Call Trace: [ 13.085878] <TASK> [ 13.085893] dump_stack_lvl+0x73/0xb0 [ 13.085925] print_report+0xd1/0x610 [ 13.085947] ? __virt_addr_valid+0x1db/0x2d0 [ 13.085969] ? ksize_uaf+0x5e4/0x6c0 [ 13.085990] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.086014] ? ksize_uaf+0x5e4/0x6c0 [ 13.086035] kasan_report+0x141/0x180 [ 13.086056] ? ksize_uaf+0x5e4/0x6c0 [ 13.086081] __asan_report_load1_noabort+0x18/0x20 [ 13.086107] ksize_uaf+0x5e4/0x6c0 [ 13.086128] ? __pfx_ksize_uaf+0x10/0x10 [ 13.086150] ? __schedule+0x10cc/0x2b60 [ 13.086172] ? __pfx_read_tsc+0x10/0x10 [ 13.086192] ? ktime_get_ts64+0x86/0x230 [ 13.086217] kunit_try_run_case+0x1a5/0x480 [ 13.086241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.086263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.086288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.086313] ? __kthread_parkme+0x82/0x180 [ 13.086596] ? preempt_count_sub+0x50/0x80 [ 13.086625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.086651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.086677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.086702] kthread+0x337/0x6f0 [ 13.086721] ? trace_preempt_on+0x20/0xc0 [ 13.086744] ? __pfx_kthread+0x10/0x10 [ 13.086780] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.086801] ? calculate_sigpending+0x7b/0xa0 [ 13.086825] ? __pfx_kthread+0x10/0x10 [ 13.086846] ret_from_fork+0x116/0x1d0 [ 13.086864] ? __pfx_kthread+0x10/0x10 [ 13.086884] ret_from_fork_asm+0x1a/0x30 [ 13.086914] </TASK> [ 13.086924] [ 13.097335] Allocated by task 213: [ 13.097933] kasan_save_stack+0x45/0x70 [ 13.098140] kasan_save_track+0x18/0x40 [ 13.098529] kasan_save_alloc_info+0x3b/0x50 [ 13.098750] __kasan_kmalloc+0xb7/0xc0 [ 13.098926] __kmalloc_cache_noprof+0x189/0x420 [ 13.099285] ksize_uaf+0xaa/0x6c0 [ 13.099773] kunit_try_run_case+0x1a5/0x480 [ 13.100135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.100595] kthread+0x337/0x6f0 [ 13.100886] ret_from_fork+0x116/0x1d0 [ 13.101165] ret_from_fork_asm+0x1a/0x30 [ 13.101540] [ 13.101706] Freed by task 213: [ 13.102054] kasan_save_stack+0x45/0x70 [ 13.102248] kasan_save_track+0x18/0x40 [ 13.102592] kasan_save_free_info+0x3f/0x60 [ 13.102803] __kasan_slab_free+0x56/0x70 [ 13.102993] kfree+0x222/0x3f0 [ 13.103147] ksize_uaf+0x12c/0x6c0 [ 13.103310] kunit_try_run_case+0x1a5/0x480 [ 13.103982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.104234] kthread+0x337/0x6f0 [ 13.104562] ret_from_fork+0x116/0x1d0 [ 13.104781] ret_from_fork_asm+0x1a/0x30 [ 13.105121] [ 13.105224] The buggy address belongs to the object at ffff888102afc500 [ 13.105224] which belongs to the cache kmalloc-128 of size 128 [ 13.106104] The buggy address is located 120 bytes inside of [ 13.106104] freed 128-byte region [ffff888102afc500, ffff888102afc580) [ 13.106824] [ 13.106928] The buggy address belongs to the physical page: [ 13.107170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.107950] flags: 0x200000000000000(node=0|zone=2) [ 13.108181] page_type: f5(slab) [ 13.108529] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.108914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.109332] page dumped because: kasan: bad access detected [ 13.109669] [ 13.109745] Memory state around the buggy address: [ 13.109987] ffff888102afc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.110284] ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.110920] >ffff888102afc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.111289] ^ [ 13.111959] ffff888102afc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.112226] ffff888102afc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.112859] ================================================================== [ 13.052970] ================================================================== [ 13.053305] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 13.053985] Read of size 1 at addr ffff888102afc500 by task kunit_try_catch/213 [ 13.054386] [ 13.054536] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.054578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.054590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.054610] Call Trace: [ 13.054621] <TASK> [ 13.054634] dump_stack_lvl+0x73/0xb0 [ 13.054664] print_report+0xd1/0x610 [ 13.054696] ? __virt_addr_valid+0x1db/0x2d0 [ 13.054721] ? ksize_uaf+0x5fe/0x6c0 [ 13.054741] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.054778] ? ksize_uaf+0x5fe/0x6c0 [ 13.054799] kasan_report+0x141/0x180 [ 13.054821] ? ksize_uaf+0x5fe/0x6c0 [ 13.054846] __asan_report_load1_noabort+0x18/0x20 [ 13.054872] ksize_uaf+0x5fe/0x6c0 [ 13.054893] ? __pfx_ksize_uaf+0x10/0x10 [ 13.054915] ? __schedule+0x10cc/0x2b60 [ 13.054936] ? __pfx_read_tsc+0x10/0x10 [ 13.054957] ? ktime_get_ts64+0x86/0x230 [ 13.054982] kunit_try_run_case+0x1a5/0x480 [ 13.055006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.055030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.055053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.055077] ? __kthread_parkme+0x82/0x180 [ 13.055098] ? preempt_count_sub+0x50/0x80 [ 13.055121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.055146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.055170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.055195] kthread+0x337/0x6f0 [ 13.055214] ? trace_preempt_on+0x20/0xc0 [ 13.055237] ? __pfx_kthread+0x10/0x10 [ 13.055257] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.055279] ? calculate_sigpending+0x7b/0xa0 [ 13.055327] ? __pfx_kthread+0x10/0x10 [ 13.055622] ret_from_fork+0x116/0x1d0 [ 13.055657] ? __pfx_kthread+0x10/0x10 [ 13.055678] ret_from_fork_asm+0x1a/0x30 [ 13.055708] </TASK> [ 13.055719] [ 13.065822] Allocated by task 213: [ 13.065970] kasan_save_stack+0x45/0x70 [ 13.066177] kasan_save_track+0x18/0x40 [ 13.066367] kasan_save_alloc_info+0x3b/0x50 [ 13.066637] __kasan_kmalloc+0xb7/0xc0 [ 13.066933] __kmalloc_cache_noprof+0x189/0x420 [ 13.067119] ksize_uaf+0xaa/0x6c0 [ 13.067243] kunit_try_run_case+0x1a5/0x480 [ 13.067391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.067638] kthread+0x337/0x6f0 [ 13.067896] ret_from_fork+0x116/0x1d0 [ 13.068393] ret_from_fork_asm+0x1a/0x30 [ 13.068579] [ 13.068676] Freed by task 213: [ 13.068821] kasan_save_stack+0x45/0x70 [ 13.068962] kasan_save_track+0x18/0x40 [ 13.069125] kasan_save_free_info+0x3f/0x60 [ 13.069331] __kasan_slab_free+0x56/0x70 [ 13.069740] kfree+0x222/0x3f0 [ 13.069924] ksize_uaf+0x12c/0x6c0 [ 13.070093] kunit_try_run_case+0x1a5/0x480 [ 13.070282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.070655] kthread+0x337/0x6f0 [ 13.070831] ret_from_fork+0x116/0x1d0 [ 13.070992] ret_from_fork_asm+0x1a/0x30 [ 13.071167] [ 13.071263] The buggy address belongs to the object at ffff888102afc500 [ 13.071263] which belongs to the cache kmalloc-128 of size 128 [ 13.071859] The buggy address is located 0 bytes inside of [ 13.071859] freed 128-byte region [ffff888102afc500, ffff888102afc580) [ 13.072286] [ 13.072389] The buggy address belongs to the physical page: [ 13.072651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.074642] flags: 0x200000000000000(node=0|zone=2) [ 13.074834] page_type: f5(slab) [ 13.074958] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.075192] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.075426] page dumped because: kasan: bad access detected [ 13.075599] [ 13.075671] Memory state around the buggy address: [ 13.077509] ffff888102afc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.078675] ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.079941] >ffff888102afc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.081075] ^ [ 13.081232] ffff888102afc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.082235] ffff888102afc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.082528] ================================================================== [ 13.032211] ================================================================== [ 13.032842] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 13.033116] Read of size 1 at addr ffff888102afc500 by task kunit_try_catch/213 [ 13.033411] [ 13.033553] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.033599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.033610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.033631] Call Trace: [ 13.033642] <TASK> [ 13.033658] dump_stack_lvl+0x73/0xb0 [ 13.033687] print_report+0xd1/0x610 [ 13.033709] ? __virt_addr_valid+0x1db/0x2d0 [ 13.033733] ? ksize_uaf+0x19d/0x6c0 [ 13.033764] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.033788] ? ksize_uaf+0x19d/0x6c0 [ 13.033809] kasan_report+0x141/0x180 [ 13.033833] ? ksize_uaf+0x19d/0x6c0 [ 13.033860] ? ksize_uaf+0x19d/0x6c0 [ 13.033882] __kasan_check_byte+0x3d/0x50 [ 13.033905] ksize+0x20/0x60 [ 13.033926] ksize_uaf+0x19d/0x6c0 [ 13.033946] ? __pfx_ksize_uaf+0x10/0x10 [ 13.033968] ? __schedule+0x10cc/0x2b60 [ 13.033990] ? __pfx_read_tsc+0x10/0x10 [ 13.034011] ? ktime_get_ts64+0x86/0x230 [ 13.034037] kunit_try_run_case+0x1a5/0x480 [ 13.034062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.034085] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.034110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.034134] ? __kthread_parkme+0x82/0x180 [ 13.034155] ? preempt_count_sub+0x50/0x80 [ 13.034179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.034204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.034230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.034255] kthread+0x337/0x6f0 [ 13.034274] ? trace_preempt_on+0x20/0xc0 [ 13.034297] ? __pfx_kthread+0x10/0x10 [ 13.034318] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.034340] ? calculate_sigpending+0x7b/0xa0 [ 13.034365] ? __pfx_kthread+0x10/0x10 [ 13.034391] ret_from_fork+0x116/0x1d0 [ 13.034422] ? __pfx_kthread+0x10/0x10 [ 13.034453] ret_from_fork_asm+0x1a/0x30 [ 13.034493] </TASK> [ 13.034503] [ 13.041814] Allocated by task 213: [ 13.042129] kasan_save_stack+0x45/0x70 [ 13.042341] kasan_save_track+0x18/0x40 [ 13.042565] kasan_save_alloc_info+0x3b/0x50 [ 13.042712] __kasan_kmalloc+0xb7/0xc0 [ 13.042856] __kmalloc_cache_noprof+0x189/0x420 [ 13.043138] ksize_uaf+0xaa/0x6c0 [ 13.043313] kunit_try_run_case+0x1a5/0x480 [ 13.043654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.043921] kthread+0x337/0x6f0 [ 13.044068] ret_from_fork+0x116/0x1d0 [ 13.044227] ret_from_fork_asm+0x1a/0x30 [ 13.044547] [ 13.044648] Freed by task 213: [ 13.044816] kasan_save_stack+0x45/0x70 [ 13.044987] kasan_save_track+0x18/0x40 [ 13.045169] kasan_save_free_info+0x3f/0x60 [ 13.045438] __kasan_slab_free+0x56/0x70 [ 13.045640] kfree+0x222/0x3f0 [ 13.045801] ksize_uaf+0x12c/0x6c0 [ 13.045932] kunit_try_run_case+0x1a5/0x480 [ 13.046079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.046253] kthread+0x337/0x6f0 [ 13.046372] ret_from_fork+0x116/0x1d0 [ 13.046510] ret_from_fork_asm+0x1a/0x30 [ 13.046713] [ 13.046821] The buggy address belongs to the object at ffff888102afc500 [ 13.046821] which belongs to the cache kmalloc-128 of size 128 [ 13.047596] The buggy address is located 0 bytes inside of [ 13.047596] freed 128-byte region [ffff888102afc500, ffff888102afc580) [ 13.048152] [ 13.048253] The buggy address belongs to the physical page: [ 13.048567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102afc [ 13.048880] flags: 0x200000000000000(node=0|zone=2) [ 13.049047] page_type: f5(slab) [ 13.049175] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.049453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.049792] page dumped because: kasan: bad access detected [ 13.049977] [ 13.050046] Memory state around the buggy address: [ 13.050247] ffff888102afc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.050781] ffff888102afc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.051108] >ffff888102afc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.051438] ^ [ 13.051551] ffff888102afc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.051770] ffff888102afc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.052219] ==================================================================