Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.476198] ================================================================== [ 31.477328] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 31.478137] Read of size 1 at addr fff00000c66bc228 by task kunit_try_catch/173 [ 31.478969] [ 31.479376] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.480427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.481857] Hardware name: linux,dummy-virt (DT) [ 31.482661] Call trace: [ 31.483409] show_stack+0x20/0x38 (C) [ 31.484059] dump_stack_lvl+0x8c/0xd0 [ 31.484676] print_report+0x118/0x5e0 [ 31.485267] kasan_report+0xc8/0x118 [ 31.485794] __asan_report_load1_noabort+0x20/0x30 [ 31.487060] kmalloc_uaf+0x300/0x338 [ 31.487624] kunit_try_run_case+0x14c/0x3d0 [ 31.488337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.489165] kthread+0x24c/0x2d0 [ 31.489755] ret_from_fork+0x10/0x20 [ 31.490352] [ 31.490742] Allocated by task 173: [ 31.491555] kasan_save_stack+0x3c/0x68 [ 31.492172] kasan_save_track+0x20/0x40 [ 31.493011] kasan_save_alloc_info+0x40/0x58 [ 31.493624] __kasan_kmalloc+0xd4/0xd8 [ 31.494945] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.495705] kmalloc_uaf+0xb8/0x338 [ 31.496320] kunit_try_run_case+0x14c/0x3d0 [ 31.496898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.497235] kthread+0x24c/0x2d0 [ 31.497474] ret_from_fork+0x10/0x20 [ 31.497972] [ 31.498322] Freed by task 173: [ 31.498870] kasan_save_stack+0x3c/0x68 [ 31.499393] kasan_save_track+0x20/0x40 [ 31.500294] kasan_save_free_info+0x4c/0x78 [ 31.500886] __kasan_slab_free+0x6c/0x98 [ 31.501493] kfree+0x114/0x3c8 [ 31.501952] kmalloc_uaf+0x11c/0x338 [ 31.503368] kunit_try_run_case+0x14c/0x3d0 [ 31.503946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.504731] kthread+0x24c/0x2d0 [ 31.505348] ret_from_fork+0x10/0x20 [ 31.506003] [ 31.506833] The buggy address belongs to the object at fff00000c66bc220 [ 31.506833] which belongs to the cache kmalloc-16 of size 16 [ 31.508200] The buggy address is located 8 bytes inside of [ 31.508200] freed 16-byte region [fff00000c66bc220, fff00000c66bc230) [ 31.509438] [ 31.509832] The buggy address belongs to the physical page: [ 31.510642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066bc [ 31.511679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.513279] page_type: f5(slab) [ 31.513855] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.515207] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.516050] page dumped because: kasan: bad access detected [ 31.516727] [ 31.517091] Memory state around the buggy address: [ 31.517644] fff00000c66bc100: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 31.518634] fff00000c66bc180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.520435] >fff00000c66bc200: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.521192] ^ [ 31.521817] fff00000c66bc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.522934] fff00000c66bc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.523740] ================================================================== [ 31.593940] ================================================================== [ 31.595016] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 31.595863] Read of size 1 at addr fff00000c6729d28 by task kunit_try_catch/177 [ 31.596849] [ 31.597767] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.599503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.600024] Hardware name: linux,dummy-virt (DT) [ 31.600734] Call trace: [ 31.601135] show_stack+0x20/0x38 (C) [ 31.601793] dump_stack_lvl+0x8c/0xd0 [ 31.602783] print_report+0x118/0x5e0 [ 31.603436] kasan_report+0xc8/0x118 [ 31.604087] __asan_report_load1_noabort+0x20/0x30 [ 31.604934] kmalloc_uaf2+0x3f4/0x468 [ 31.605476] kunit_try_run_case+0x14c/0x3d0 [ 31.606100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.607350] kthread+0x24c/0x2d0 [ 31.607961] ret_from_fork+0x10/0x20 [ 31.608577] [ 31.608949] Allocated by task 177: [ 31.609561] kasan_save_stack+0x3c/0x68 [ 31.610150] kasan_save_track+0x20/0x40 [ 31.611211] kasan_save_alloc_info+0x40/0x58 [ 31.611890] __kasan_kmalloc+0xd4/0xd8 [ 31.612526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.613182] kmalloc_uaf2+0xc4/0x468 [ 31.613831] kunit_try_run_case+0x14c/0x3d0 [ 31.614531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.615308] kthread+0x24c/0x2d0 [ 31.615797] ret_from_fork+0x10/0x20 [ 31.616354] [ 31.616753] Freed by task 177: [ 31.617557] kasan_save_stack+0x3c/0x68 [ 31.618329] kasan_save_track+0x20/0x40 [ 31.619231] kasan_save_free_info+0x4c/0x78 [ 31.620125] __kasan_slab_free+0x6c/0x98 [ 31.620947] kfree+0x114/0x3c8 [ 31.621393] kmalloc_uaf2+0x134/0x468 [ 31.622015] kunit_try_run_case+0x14c/0x3d0 [ 31.623198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.624029] kthread+0x24c/0x2d0 [ 31.624692] ret_from_fork+0x10/0x20 [ 31.625188] [ 31.625495] The buggy address belongs to the object at fff00000c6729d00 [ 31.625495] which belongs to the cache kmalloc-64 of size 64 [ 31.627080] The buggy address is located 40 bytes inside of [ 31.627080] freed 64-byte region [fff00000c6729d00, fff00000c6729d40) [ 31.629299] [ 31.629701] The buggy address belongs to the physical page: [ 31.630465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106729 [ 31.631582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.632638] page_type: f5(slab) [ 31.633044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.633999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.635306] page dumped because: kasan: bad access detected [ 31.635976] [ 31.636306] Memory state around the buggy address: [ 31.636845] fff00000c6729c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.637679] fff00000c6729c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.638695] >fff00000c6729d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.639786] ^ [ 31.640419] fff00000c6729d80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.641143] fff00000c6729e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.642022] ================================================================== [ 31.049941] ================================================================== [ 31.051037] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.051872] Read of size 16 at addr fff00000c5b51880 by task kunit_try_catch/157 [ 31.052713] [ 31.053101] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.054210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.055175] Hardware name: linux,dummy-virt (DT) [ 31.055789] Call trace: [ 31.056241] show_stack+0x20/0x38 (C) [ 31.056878] dump_stack_lvl+0x8c/0xd0 [ 31.057376] print_report+0x118/0x5e0 [ 31.058015] kasan_report+0xc8/0x118 [ 31.058645] __asan_report_load16_noabort+0x20/0x30 [ 31.059338] kmalloc_uaf_16+0x3bc/0x438 [ 31.060151] kunit_try_run_case+0x14c/0x3d0 [ 31.060878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.061693] kthread+0x24c/0x2d0 [ 31.062765] ret_from_fork+0x10/0x20 [ 31.063360] [ 31.063736] Allocated by task 157: [ 31.064240] kasan_save_stack+0x3c/0x68 [ 31.064789] kasan_save_track+0x20/0x40 [ 31.065330] kasan_save_alloc_info+0x40/0x58 [ 31.065894] __kasan_kmalloc+0xd4/0xd8 [ 31.066416] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.067420] kmalloc_uaf_16+0x140/0x438 [ 31.068159] kunit_try_run_case+0x14c/0x3d0 [ 31.068879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.069626] kthread+0x24c/0x2d0 [ 31.070207] ret_from_fork+0x10/0x20 [ 31.071135] [ 31.071425] Freed by task 157: [ 31.071951] kasan_save_stack+0x3c/0x68 [ 31.072649] kasan_save_track+0x20/0x40 [ 31.073907] kasan_save_free_info+0x4c/0x78 [ 31.074390] __kasan_slab_free+0x6c/0x98 [ 31.075089] kfree+0x114/0x3c8 [ 31.075727] kmalloc_uaf_16+0x190/0x438 [ 31.076342] kunit_try_run_case+0x14c/0x3d0 [ 31.076983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.077812] kthread+0x24c/0x2d0 [ 31.078366] ret_from_fork+0x10/0x20 [ 31.078979] [ 31.079348] The buggy address belongs to the object at fff00000c5b51880 [ 31.079348] which belongs to the cache kmalloc-16 of size 16 [ 31.081126] The buggy address is located 0 bytes inside of [ 31.081126] freed 16-byte region [fff00000c5b51880, fff00000c5b51890) [ 31.082666] [ 31.083175] The buggy address belongs to the physical page: [ 31.084010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 31.085073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.086150] page_type: f5(slab) [ 31.086622] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.087740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.088769] page dumped because: kasan: bad access detected [ 31.089396] [ 31.089744] Memory state around the buggy address: [ 31.090414] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.091495] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 31.092499] >fff00000c5b51880: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.093490] ^ [ 31.094235] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.095299] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.096326] ==================================================================
[ 23.565415] ================================================================== [ 23.566637] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0 [ 23.567559] Read of size 16 at addr ffff888101fff6e0 by task kunit_try_catch/176 [ 23.568451] [ 23.568889] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 23.570879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.571487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.572212] Call Trace: [ 23.572974] <TASK> [ 23.573504] dump_stack_lvl+0x73/0xb0 [ 23.574335] print_report+0xd1/0x640 [ 23.574868] ? __virt_addr_valid+0x1db/0x2d0 [ 23.576017] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.576609] kasan_report+0x102/0x140 [ 23.577415] ? kmalloc_uaf_16+0x47d/0x4c0 [ 23.577708] ? kmalloc_uaf_16+0x47d/0x4c0 [ 23.578738] __asan_report_load16_noabort+0x18/0x20 [ 23.579646] kmalloc_uaf_16+0x47d/0x4c0 [ 23.579983] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 23.581083] ? __schedule+0xc70/0x27e0 [ 23.582020] ? __pfx_read_tsc+0x10/0x10 [ 23.582751] ? ktime_get_ts64+0x86/0x230 [ 23.583759] kunit_try_run_case+0x1b3/0x490 [ 23.585119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.585840] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.586114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.586349] ? __kthread_parkme+0x82/0x160 [ 23.586689] ? preempt_count_sub+0x50/0x80 [ 23.587171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.587470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.587850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.588798] kthread+0x257/0x310 [ 23.589901] ? __pfx_kthread+0x10/0x10 [ 23.590499] ret_from_fork+0x41/0x80 [ 23.591211] ? __pfx_kthread+0x10/0x10 [ 23.591603] ret_from_fork_asm+0x1a/0x30 [ 23.592171] </TASK> [ 23.592628] [ 23.593188] Allocated by task 176: [ 23.593895] kasan_save_stack+0x3d/0x60 [ 23.594373] kasan_save_track+0x18/0x40 [ 23.595758] kasan_save_alloc_info+0x3b/0x50 [ 23.596799] __kasan_kmalloc+0xb7/0xc0 [ 23.597132] __kmalloc_cache_noprof+0x184/0x410 [ 23.598086] kmalloc_uaf_16+0x15c/0x4c0 [ 23.598657] kunit_try_run_case+0x1b3/0x490 [ 23.599362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.600141] kthread+0x257/0x310 [ 23.600796] ret_from_fork+0x41/0x80 [ 23.601258] ret_from_fork_asm+0x1a/0x30 [ 23.601795] [ 23.602140] Freed by task 176: [ 23.602736] kasan_save_stack+0x3d/0x60 [ 23.603189] kasan_save_track+0x18/0x40 [ 23.603951] kasan_save_free_info+0x3f/0x60 [ 23.604259] __kasan_slab_free+0x56/0x70 [ 23.604724] kfree+0x123/0x3f0 [ 23.605364] kmalloc_uaf_16+0x1d7/0x4c0 [ 23.605986] kunit_try_run_case+0x1b3/0x490 [ 23.606610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.607592] kthread+0x257/0x310 [ 23.608138] ret_from_fork+0x41/0x80 [ 23.609113] ret_from_fork_asm+0x1a/0x30 [ 23.609472] [ 23.609639] The buggy address belongs to the object at ffff888101fff6e0 [ 23.609639] which belongs to the cache kmalloc-16 of size 16 [ 23.611079] The buggy address is located 0 bytes inside of [ 23.611079] freed 16-byte region [ffff888101fff6e0, ffff888101fff6f0) [ 23.612265] [ 23.612693] The buggy address belongs to the physical page: [ 23.613407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fff [ 23.614457] flags: 0x200000000000000(node=0|zone=2) [ 23.614984] page_type: f5(slab) [ 23.615549] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.616830] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.618558] page dumped because: kasan: bad access detected [ 23.619343] [ 23.619542] Memory state around the buggy address: [ 23.620281] ffff888101fff580: fa fb fc fc 00 02 fc fc 00 02 fc fc 00 00 fc fc [ 23.621243] ffff888101fff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.622064] >ffff888101fff680: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc [ 23.622755] ^ [ 23.623442] ffff888101fff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624455] ffff888101fff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.625373] ================================================================== [ 24.219009] ================================================================== [ 24.219858] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4aa/0x520 [ 24.220593] Read of size 1 at addr ffff888102470ca8 by task kunit_try_catch/196 [ 24.221284] [ 24.221664] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 24.222845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.223344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.224179] Call Trace: [ 24.224410] <TASK> [ 24.224966] dump_stack_lvl+0x73/0xb0 [ 24.225627] print_report+0xd1/0x640 [ 24.226095] ? __virt_addr_valid+0x1db/0x2d0 [ 24.226720] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.227225] kasan_report+0x102/0x140 [ 24.227833] ? kmalloc_uaf2+0x4aa/0x520 [ 24.228321] ? kmalloc_uaf2+0x4aa/0x520 [ 24.228733] __asan_report_load1_noabort+0x18/0x20 [ 24.229100] kmalloc_uaf2+0x4aa/0x520 [ 24.229679] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 24.230535] ? finish_task_switch.isra.0+0x153/0x700 [ 24.231129] ? __switch_to+0x5d9/0xf60 [ 24.231606] ? __schedule+0xc70/0x27e0 [ 24.231953] ? __pfx_read_tsc+0x10/0x10 [ 24.232725] ? ktime_get_ts64+0x86/0x230 [ 24.233381] kunit_try_run_case+0x1b3/0x490 [ 24.233887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.234416] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.234756] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.235115] ? __kthread_parkme+0x82/0x160 [ 24.235625] ? preempt_count_sub+0x50/0x80 [ 24.236430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.237025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.237805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.238410] kthread+0x257/0x310 [ 24.238779] ? __pfx_kthread+0x10/0x10 [ 24.239271] ret_from_fork+0x41/0x80 [ 24.239945] ? __pfx_kthread+0x10/0x10 [ 24.240437] ret_from_fork_asm+0x1a/0x30 [ 24.240760] </TASK> [ 24.241074] [ 24.241466] Allocated by task 196: [ 24.242023] kasan_save_stack+0x3d/0x60 [ 24.242619] kasan_save_track+0x18/0x40 [ 24.243051] kasan_save_alloc_info+0x3b/0x50 [ 24.243673] __kasan_kmalloc+0xb7/0xc0 [ 24.244115] __kmalloc_cache_noprof+0x184/0x410 [ 24.244427] kmalloc_uaf2+0xc7/0x520 [ 24.244690] kunit_try_run_case+0x1b3/0x490 [ 24.245321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.246043] kthread+0x257/0x310 [ 24.246628] ret_from_fork+0x41/0x80 [ 24.247140] ret_from_fork_asm+0x1a/0x30 [ 24.247607] [ 24.247888] Freed by task 196: [ 24.248314] kasan_save_stack+0x3d/0x60 [ 24.248656] kasan_save_track+0x18/0x40 [ 24.248973] kasan_save_free_info+0x3f/0x60 [ 24.249271] __kasan_slab_free+0x56/0x70 [ 24.249556] kfree+0x123/0x3f0 [ 24.250003] kmalloc_uaf2+0x14d/0x520 [ 24.250622] kunit_try_run_case+0x1b3/0x490 [ 24.251190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.252100] kthread+0x257/0x310 [ 24.252514] ret_from_fork+0x41/0x80 [ 24.252786] ret_from_fork_asm+0x1a/0x30 [ 24.253236] [ 24.253485] The buggy address belongs to the object at ffff888102470c80 [ 24.253485] which belongs to the cache kmalloc-64 of size 64 [ 24.255262] The buggy address is located 40 bytes inside of [ 24.255262] freed 64-byte region [ffff888102470c80, ffff888102470cc0) [ 24.256692] [ 24.256879] The buggy address belongs to the physical page: [ 24.257516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102470 [ 24.258885] flags: 0x200000000000000(node=0|zone=2) [ 24.259263] page_type: f5(slab) [ 24.259528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.260475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.261834] page dumped because: kasan: bad access detected [ 24.262524] [ 24.262797] Memory state around the buggy address: [ 24.263372] ffff888102470b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.263791] ffff888102470c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.264980] >ffff888102470c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.265562] ^ [ 24.266381] ffff888102470d00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 24.267501] ffff888102470d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.268747] ================================================================== [ 24.067069] ================================================================== [ 24.068999] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380 [ 24.070559] Read of size 1 at addr ffff888101b3ccc8 by task kunit_try_catch/192 [ 24.071474] [ 24.072247] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 24.073524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.073991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.074824] Call Trace: [ 24.075964] <TASK> [ 24.076204] dump_stack_lvl+0x73/0xb0 [ 24.077044] print_report+0xd1/0x640 [ 24.078297] ? __virt_addr_valid+0x1db/0x2d0 [ 24.079021] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.079535] kasan_report+0x102/0x140 [ 24.080398] ? kmalloc_uaf+0x322/0x380 [ 24.081470] ? kmalloc_uaf+0x322/0x380 [ 24.082386] __asan_report_load1_noabort+0x18/0x20 [ 24.082879] kmalloc_uaf+0x322/0x380 [ 24.083460] ? __pfx_kmalloc_uaf+0x10/0x10 [ 24.084209] ? __pfx_kmalloc_uaf+0x10/0x10 [ 24.084856] kunit_try_run_case+0x1b3/0x490 [ 24.085517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.086119] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.086542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.087861] ? __kthread_parkme+0x82/0x160 [ 24.088181] ? preempt_count_sub+0x50/0x80 [ 24.088818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.089583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.090471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.091893] kthread+0x257/0x310 [ 24.092398] ? __pfx_kthread+0x10/0x10 [ 24.093022] ret_from_fork+0x41/0x80 [ 24.093822] ? __pfx_kthread+0x10/0x10 [ 24.095152] ret_from_fork_asm+0x1a/0x30 [ 24.095631] </TASK> [ 24.095897] [ 24.096410] Allocated by task 192: [ 24.097676] kasan_save_stack+0x3d/0x60 [ 24.098026] kasan_save_track+0x18/0x40 [ 24.099052] kasan_save_alloc_info+0x3b/0x50 [ 24.100185] __kasan_kmalloc+0xb7/0xc0 [ 24.100443] __kmalloc_cache_noprof+0x184/0x410 [ 24.100833] kmalloc_uaf+0xab/0x380 [ 24.101585] kunit_try_run_case+0x1b3/0x490 [ 24.102396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.103854] kthread+0x257/0x310 [ 24.104842] ret_from_fork+0x41/0x80 [ 24.105243] ret_from_fork_asm+0x1a/0x30 [ 24.105891] [ 24.106576] Freed by task 192: [ 24.107019] kasan_save_stack+0x3d/0x60 [ 24.108648] kasan_save_track+0x18/0x40 [ 24.108866] kasan_save_free_info+0x3f/0x60 [ 24.109808] __kasan_slab_free+0x56/0x70 [ 24.110842] kfree+0x123/0x3f0 [ 24.111135] kmalloc_uaf+0x12d/0x380 [ 24.112143] kunit_try_run_case+0x1b3/0x490 [ 24.112815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.113895] kthread+0x257/0x310 [ 24.114199] ret_from_fork+0x41/0x80 [ 24.114654] ret_from_fork_asm+0x1a/0x30 [ 24.115120] [ 24.115308] The buggy address belongs to the object at ffff888101b3ccc0 [ 24.115308] which belongs to the cache kmalloc-16 of size 16 [ 24.117441] The buggy address is located 8 bytes inside of [ 24.117441] freed 16-byte region [ffff888101b3ccc0, ffff888101b3ccd0) [ 24.119253] [ 24.119478] The buggy address belongs to the physical page: [ 24.120339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 24.121573] flags: 0x200000000000000(node=0|zone=2) [ 24.122097] page_type: f5(slab) [ 24.124962] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.125446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.126724] page dumped because: kasan: bad access detected [ 24.127301] [ 24.128170] Memory state around the buggy address: [ 24.128458] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 24.130150] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 24.130799] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 24.132016] ^ [ 24.132526] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133292] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.134152] ==================================================================