Date
Nov. 27, 2024, 3:37 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 48.668959] ================================================================== [ 48.670242] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 48.671150] Read of size 1 at addr fff00000c61b5500 by task kunit_try_catch/185 [ 48.671894] [ 48.672233] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.673905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.674760] Hardware name: linux,dummy-virt (DT) [ 48.675268] Call trace: [ 48.675742] show_stack+0x20/0x38 (C) [ 48.676387] dump_stack_lvl+0x8c/0xd0 [ 48.676972] print_report+0x118/0x5e0 [ 48.678056] kasan_report+0xc8/0x118 [ 48.678720] __asan_report_load1_noabort+0x20/0x30 [ 48.679441] ksize_uaf+0x59c/0x600 [ 48.680071] kunit_try_run_case+0x14c/0x3d0 [ 48.680675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.681769] kthread+0x24c/0x2d0 [ 48.682236] ret_from_fork+0x10/0x20 [ 48.683175] [ 48.683669] Allocated by task 185: [ 48.684370] kasan_save_stack+0x3c/0x68 [ 48.685072] kasan_save_track+0x20/0x40 [ 48.685848] kasan_save_alloc_info+0x40/0x58 [ 48.686449] __kasan_kmalloc+0xd4/0xd8 [ 48.687014] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.687738] ksize_uaf+0xb8/0x600 [ 48.688347] kunit_try_run_case+0x14c/0x3d0 [ 48.689031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.690425] kthread+0x24c/0x2d0 [ 48.690984] ret_from_fork+0x10/0x20 [ 48.691599] [ 48.691887] Freed by task 185: [ 48.692493] kasan_save_stack+0x3c/0x68 [ 48.692950] kasan_save_track+0x20/0x40 [ 48.693882] kasan_save_free_info+0x4c/0x78 [ 48.694428] __kasan_slab_free+0x6c/0x98 [ 48.695072] kfree+0x114/0x3c8 [ 48.695603] ksize_uaf+0x11c/0x600 [ 48.696148] kunit_try_run_case+0x14c/0x3d0 [ 48.696792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.697964] kthread+0x24c/0x2d0 [ 48.698499] ret_from_fork+0x10/0x20 [ 48.699436] [ 48.699722] The buggy address belongs to the object at fff00000c61b5500 [ 48.699722] which belongs to the cache kmalloc-128 of size 128 [ 48.701053] The buggy address is located 0 bytes inside of [ 48.701053] freed 128-byte region [fff00000c61b5500, fff00000c61b5580) [ 48.702987] [ 48.703255] The buggy address belongs to the physical page: [ 48.704068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5 [ 48.704976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.705984] page_type: f5(slab) [ 48.706517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.707804] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.709049] page dumped because: kasan: bad access detected [ 48.710068] [ 48.710616] Memory state around the buggy address: [ 48.711230] fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.712085] fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.712953] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.714034] ^ [ 48.714492] fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.715994] fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.716782] ================================================================== [ 48.718553] ================================================================== [ 48.719276] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 48.720759] Read of size 1 at addr fff00000c61b5578 by task kunit_try_catch/185 [ 48.722051] [ 48.722533] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.724410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.724912] Hardware name: linux,dummy-virt (DT) [ 48.725988] Call trace: [ 48.726605] show_stack+0x20/0x38 (C) [ 48.727334] dump_stack_lvl+0x8c/0xd0 [ 48.728094] print_report+0x118/0x5e0 [ 48.728755] kasan_report+0xc8/0x118 [ 48.729409] __asan_report_load1_noabort+0x20/0x30 [ 48.730250] ksize_uaf+0x548/0x600 [ 48.731466] kunit_try_run_case+0x14c/0x3d0 [ 48.732081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.732785] kthread+0x24c/0x2d0 [ 48.733880] ret_from_fork+0x10/0x20 [ 48.734766] [ 48.735118] Allocated by task 185: [ 48.735591] kasan_save_stack+0x3c/0x68 [ 48.736108] kasan_save_track+0x20/0x40 [ 48.736661] kasan_save_alloc_info+0x40/0x58 [ 48.737679] __kasan_kmalloc+0xd4/0xd8 [ 48.738191] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.738863] ksize_uaf+0xb8/0x600 [ 48.739844] kunit_try_run_case+0x14c/0x3d0 [ 48.740470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.741179] kthread+0x24c/0x2d0 [ 48.741696] ret_from_fork+0x10/0x20 [ 48.742276] [ 48.742919] Freed by task 185: [ 48.743274] kasan_save_stack+0x3c/0x68 [ 48.743820] kasan_save_track+0x20/0x40 [ 48.744462] kasan_save_free_info+0x4c/0x78 [ 48.745499] __kasan_slab_free+0x6c/0x98 [ 48.745949] kfree+0x114/0x3c8 [ 48.746932] ksize_uaf+0x11c/0x600 [ 48.747509] kunit_try_run_case+0x14c/0x3d0 [ 48.748090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.748823] kthread+0x24c/0x2d0 [ 48.749930] ret_from_fork+0x10/0x20 [ 48.750466] [ 48.750823] The buggy address belongs to the object at fff00000c61b5500 [ 48.750823] which belongs to the cache kmalloc-128 of size 128 [ 48.752277] The buggy address is located 120 bytes inside of [ 48.752277] freed 128-byte region [fff00000c61b5500, fff00000c61b5580) [ 48.753343] [ 48.753629] The buggy address belongs to the physical page: [ 48.754288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5 [ 48.755233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.756760] page_type: f5(slab) [ 48.757471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.758474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.759371] page dumped because: kasan: bad access detected [ 48.760202] [ 48.760735] Memory state around the buggy address: [ 48.761669] fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.762771] fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.763643] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.764587] ^ [ 48.765415] fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.766674] fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.767454] ================================================================== [ 48.617768] ================================================================== [ 48.619140] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 48.619850] Read of size 1 at addr fff00000c61b5500 by task kunit_try_catch/185 [ 48.620930] [ 48.622044] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.622979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.623587] Hardware name: linux,dummy-virt (DT) [ 48.624131] Call trace: [ 48.624699] show_stack+0x20/0x38 (C) [ 48.625677] dump_stack_lvl+0x8c/0xd0 [ 48.626843] print_report+0x118/0x5e0 [ 48.627465] kasan_report+0xc8/0x118 [ 48.628386] __kasan_check_byte+0x54/0x70 [ 48.628919] ksize+0x30/0x88 [ 48.629701] ksize_uaf+0x168/0x600 [ 48.630372] kunit_try_run_case+0x14c/0x3d0 [ 48.631046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.631684] kthread+0x24c/0x2d0 [ 48.632339] ret_from_fork+0x10/0x20 [ 48.632972] [ 48.633734] Allocated by task 185: [ 48.634489] kasan_save_stack+0x3c/0x68 [ 48.635208] kasan_save_track+0x20/0x40 [ 48.635781] kasan_save_alloc_info+0x40/0x58 [ 48.636389] __kasan_kmalloc+0xd4/0xd8 [ 48.637030] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.638137] ksize_uaf+0xb8/0x600 [ 48.638813] kunit_try_run_case+0x14c/0x3d0 [ 48.639379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.640165] kthread+0x24c/0x2d0 [ 48.640680] ret_from_fork+0x10/0x20 [ 48.641511] [ 48.641900] Freed by task 185: [ 48.642414] kasan_save_stack+0x3c/0x68 [ 48.642993] kasan_save_track+0x20/0x40 [ 48.643509] kasan_save_free_info+0x4c/0x78 [ 48.644189] __kasan_slab_free+0x6c/0x98 [ 48.644846] kfree+0x114/0x3c8 [ 48.645383] ksize_uaf+0x11c/0x600 [ 48.645981] kunit_try_run_case+0x14c/0x3d0 [ 48.646604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.647502] kthread+0x24c/0x2d0 [ 48.648064] ret_from_fork+0x10/0x20 [ 48.648733] [ 48.649249] The buggy address belongs to the object at fff00000c61b5500 [ 48.649249] which belongs to the cache kmalloc-128 of size 128 [ 48.650986] The buggy address is located 0 bytes inside of [ 48.650986] freed 128-byte region [fff00000c61b5500, fff00000c61b5580) [ 48.652243] [ 48.652570] The buggy address belongs to the physical page: [ 48.653587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5 [ 48.654550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.655334] page_type: f5(slab) [ 48.655886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.656715] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.658419] page dumped because: kasan: bad access detected [ 48.659517] [ 48.659833] Memory state around the buggy address: [ 48.660366] fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.661888] fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.662941] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.663811] ^ [ 48.664456] fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.666149] fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.667590] ==================================================================
[ 25.872511] ================================================================== [ 25.873510] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0 [ 25.874482] Read of size 1 at addr ffff888102a4af00 by task kunit_try_catch/204 [ 25.875111] [ 25.875286] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 25.876479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.876803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.877829] Call Trace: [ 25.878361] <TASK> [ 25.878661] dump_stack_lvl+0x73/0xb0 [ 25.879307] print_report+0xd1/0x640 [ 25.879676] ? __virt_addr_valid+0x1db/0x2d0 [ 25.880443] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.881226] kasan_report+0x102/0x140 [ 25.881647] ? ksize_uaf+0x19e/0x6c0 [ 25.882317] ? ksize_uaf+0x19e/0x6c0 [ 25.882863] ? ksize_uaf+0x19e/0x6c0 [ 25.883474] __kasan_check_byte+0x3d/0x50 [ 25.884139] ksize+0x20/0x60 [ 25.884519] ksize_uaf+0x19e/0x6c0 [ 25.885072] ? __pfx_ksize_uaf+0x10/0x10 [ 25.885611] ? __schedule+0xc3e/0x2790 [ 25.886191] ? __pfx_read_tsc+0x10/0x10 [ 25.886600] ? ktime_get_ts64+0x84/0x230 [ 25.887293] kunit_try_run_case+0x1b3/0x490 [ 25.887756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.888560] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.889296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.889881] ? __kthread_parkme+0x82/0x160 [ 25.890363] ? preempt_count_sub+0x50/0x80 [ 25.890777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.891166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.891686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.892354] kthread+0x257/0x310 [ 25.892751] ? __pfx_kthread+0x10/0x10 [ 25.893456] ret_from_fork+0x41/0x80 [ 25.893808] ? __pfx_kthread+0x10/0x10 [ 25.894487] ret_from_fork_asm+0x1a/0x30 [ 25.894832] </TASK> [ 25.895336] [ 25.895625] Allocated by task 204: [ 25.896281] kasan_save_stack+0x3d/0x60 [ 25.896568] kasan_save_track+0x18/0x40 [ 25.897249] kasan_save_alloc_info+0x3b/0x50 [ 25.897748] __kasan_kmalloc+0xb7/0xc0 [ 25.898304] __kmalloc_cache_noprof+0x184/0x410 [ 25.898769] ksize_uaf+0xab/0x6c0 [ 25.899340] kunit_try_run_case+0x1b3/0x490 [ 25.899756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.900616] kthread+0x257/0x310 [ 25.900860] ret_from_fork+0x41/0x80 [ 25.901765] ret_from_fork_asm+0x1a/0x30 [ 25.902376] [ 25.902524] Freed by task 204: [ 25.903154] kasan_save_stack+0x3d/0x60 [ 25.903537] kasan_save_track+0x18/0x40 [ 25.903878] kasan_save_free_info+0x3f/0x60 [ 25.904545] __kasan_slab_free+0x56/0x70 [ 25.905134] kfree+0x123/0x3f0 [ 25.905513] ksize_uaf+0x12d/0x6c0 [ 25.906088] kunit_try_run_case+0x1b3/0x490 [ 25.906527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.907338] kthread+0x257/0x310 [ 25.907655] ret_from_fork+0x41/0x80 [ 25.908347] ret_from_fork_asm+0x1a/0x30 [ 25.908662] [ 25.909138] The buggy address belongs to the object at ffff888102a4af00 [ 25.909138] which belongs to the cache kmalloc-128 of size 128 [ 25.910463] The buggy address is located 0 bytes inside of [ 25.910463] freed 128-byte region [ffff888102a4af00, ffff888102a4af80) [ 25.911636] [ 25.912132] The buggy address belongs to the physical page: [ 25.912643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4a [ 25.913586] flags: 0x200000000000000(node=0|zone=2) [ 25.914235] page_type: f5(slab) [ 25.914503] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.915406] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.916107] page dumped because: kasan: bad access detected [ 25.916915] [ 25.917157] Memory state around the buggy address: [ 25.917923] ffff888102a4ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.919414] ffff888102a4ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.920283] >ffff888102a4af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.920784] ^ [ 25.921514] ffff888102a4af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.922524] ffff888102a4b000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.923475] ================================================================== [ 25.926653] ================================================================== [ 25.927354] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0 [ 25.927913] Read of size 1 at addr ffff888102a4af00 by task kunit_try_catch/204 [ 25.928750] [ 25.929283] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 25.930093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.930867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.932019] Call Trace: [ 25.932598] <TASK> [ 25.932723] dump_stack_lvl+0x73/0xb0 [ 25.932907] print_report+0xd1/0x640 [ 25.933203] ? __virt_addr_valid+0x1db/0x2d0 [ 25.933564] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.934548] kasan_report+0x102/0x140 [ 25.934962] ? ksize_uaf+0x600/0x6c0 [ 25.935836] ? ksize_uaf+0x600/0x6c0 [ 25.936756] __asan_report_load1_noabort+0x18/0x20 [ 25.937319] ksize_uaf+0x600/0x6c0 [ 25.937792] ? __pfx_ksize_uaf+0x10/0x10 [ 25.938511] ? __schedule+0xc3e/0x2790 [ 25.938922] ? __pfx_read_tsc+0x10/0x10 [ 25.939348] ? ktime_get_ts64+0x84/0x230 [ 25.939748] kunit_try_run_case+0x1b3/0x490 [ 25.940281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.940614] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.941335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.941818] ? __kthread_parkme+0x82/0x160 [ 25.942507] ? preempt_count_sub+0x50/0x80 [ 25.943070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.943612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.944210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.944941] kthread+0x257/0x310 [ 25.945427] ? __pfx_kthread+0x10/0x10 [ 25.945870] ret_from_fork+0x41/0x80 [ 25.946437] ? __pfx_kthread+0x10/0x10 [ 25.946965] ret_from_fork_asm+0x1a/0x30 [ 25.947644] </TASK> [ 25.947959] [ 25.948352] Allocated by task 204: [ 25.948948] kasan_save_stack+0x3d/0x60 [ 25.949416] kasan_save_track+0x18/0x40 [ 25.949860] kasan_save_alloc_info+0x3b/0x50 [ 25.950712] __kasan_kmalloc+0xb7/0xc0 [ 25.951453] __kmalloc_cache_noprof+0x184/0x410 [ 25.951931] ksize_uaf+0xab/0x6c0 [ 25.952980] kunit_try_run_case+0x1b3/0x490 [ 25.953667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.954294] kthread+0x257/0x310 [ 25.955292] ret_from_fork+0x41/0x80 [ 25.955651] ret_from_fork_asm+0x1a/0x30 [ 25.956065] [ 25.956703] Freed by task 204: [ 25.957107] kasan_save_stack+0x3d/0x60 [ 25.957407] kasan_save_track+0x18/0x40 [ 25.957862] kasan_save_free_info+0x3f/0x60 [ 25.958975] __kasan_slab_free+0x56/0x70 [ 25.959416] kfree+0x123/0x3f0 [ 25.959742] ksize_uaf+0x12d/0x6c0 [ 25.960416] kunit_try_run_case+0x1b3/0x490 [ 25.960980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.961673] kthread+0x257/0x310 [ 25.962087] ret_from_fork+0x41/0x80 [ 25.962821] ret_from_fork_asm+0x1a/0x30 [ 25.963430] [ 25.963627] The buggy address belongs to the object at ffff888102a4af00 [ 25.963627] which belongs to the cache kmalloc-128 of size 128 [ 25.965177] The buggy address is located 0 bytes inside of [ 25.965177] freed 128-byte region [ffff888102a4af00, ffff888102a4af80) [ 25.966275] [ 25.966447] The buggy address belongs to the physical page: [ 25.966958] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4a [ 25.968025] flags: 0x200000000000000(node=0|zone=2) [ 25.968409] page_type: f5(slab) [ 25.969019] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.969741] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 25.970589] page dumped because: kasan: bad access detected [ 25.971299] [ 25.971624] Memory state around the buggy address: [ 25.972301] ffff888102a4ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.972881] ffff888102a4ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.973702] >ffff888102a4af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.974501] ^ [ 25.974906] ffff888102a4af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.975908] ffff888102a4b000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.976682] ================================================================== [ 25.979399] ================================================================== [ 25.980411] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0 [ 25.981003] Read of size 1 at addr ffff888102a4af78 by task kunit_try_catch/204 [ 25.981632] [ 25.982149] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 25.982958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.983616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.984554] Call Trace: [ 25.984876] <TASK> [ 25.985290] dump_stack_lvl+0x73/0xb0 [ 25.985781] print_report+0xd1/0x640 [ 25.986399] ? __virt_addr_valid+0x1db/0x2d0 [ 25.987209] ? kasan_complete_mode_report_info+0x64/0x200 [ 25.987707] kasan_report+0x102/0x140 [ 25.988433] ? ksize_uaf+0x5e6/0x6c0 [ 25.988731] ? ksize_uaf+0x5e6/0x6c0 [ 25.989307] __asan_report_load1_noabort+0x18/0x20 [ 25.989684] ksize_uaf+0x5e6/0x6c0 [ 25.990301] ? __pfx_ksize_uaf+0x10/0x10 [ 25.990685] ? __schedule+0xc3e/0x2790 [ 25.991404] ? __pfx_read_tsc+0x10/0x10 [ 25.992082] ? ktime_get_ts64+0x84/0x230 [ 25.992868] kunit_try_run_case+0x1b3/0x490 [ 25.993320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.994029] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.994566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.994917] ? __kthread_parkme+0x82/0x160 [ 25.995573] ? preempt_count_sub+0x50/0x80 [ 25.996046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.996649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.997299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.997933] kthread+0x257/0x310 [ 25.998429] ? __pfx_kthread+0x10/0x10 [ 25.998816] ret_from_fork+0x41/0x80 [ 25.999308] ? __pfx_kthread+0x10/0x10 [ 25.999716] ret_from_fork_asm+0x1a/0x30 [ 26.000123] </TASK> [ 26.000444] [ 26.000693] Allocated by task 204: [ 26.001200] kasan_save_stack+0x3d/0x60 [ 26.001562] kasan_save_track+0x18/0x40 [ 26.001951] kasan_save_alloc_info+0x3b/0x50 [ 26.002271] __kasan_kmalloc+0xb7/0xc0 [ 26.002642] __kmalloc_cache_noprof+0x184/0x410 [ 26.003251] ksize_uaf+0xab/0x6c0 [ 26.003835] kunit_try_run_case+0x1b3/0x490 [ 26.004354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.004793] kthread+0x257/0x310 [ 26.005062] ret_from_fork+0x41/0x80 [ 26.005401] ret_from_fork_asm+0x1a/0x30 [ 26.005923] [ 26.006352] Freed by task 204: [ 26.006770] kasan_save_stack+0x3d/0x60 [ 26.007521] kasan_save_track+0x18/0x40 [ 26.007799] kasan_save_free_info+0x3f/0x60 [ 26.008465] __kasan_slab_free+0x56/0x70 [ 26.008961] kfree+0x123/0x3f0 [ 26.009331] ksize_uaf+0x12d/0x6c0 [ 26.009899] kunit_try_run_case+0x1b3/0x490 [ 26.010229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.010647] kthread+0x257/0x310 [ 26.012113] ret_from_fork+0x41/0x80 [ 26.013078] ret_from_fork_asm+0x1a/0x30 [ 26.014105] [ 26.014410] The buggy address belongs to the object at ffff888102a4af00 [ 26.014410] which belongs to the cache kmalloc-128 of size 128 [ 26.015797] The buggy address is located 120 bytes inside of [ 26.015797] freed 128-byte region [ffff888102a4af00, ffff888102a4af80) [ 26.017876] [ 26.018110] The buggy address belongs to the physical page: [ 26.018430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4a [ 26.018743] flags: 0x200000000000000(node=0|zone=2) [ 26.018945] page_type: f5(slab) [ 26.019191] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.020419] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 26.021257] page dumped because: kasan: bad access detected [ 26.021704] [ 26.022058] Memory state around the buggy address: [ 26.022822] ffff888102a4ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.023578] ffff888102a4ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.024163] >ffff888102a4af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.024695] ^ [ 26.025301] ffff888102a4af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.026166] ffff888102a4b000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 26.027126] ==================================================================