Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.154123] ================================================================== [ 24.155481] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.156991] Read of size 16 at addr fff00000c63611c0 by task kunit_try_catch/156 [ 24.157781] [ 24.158111] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.159693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.160198] Hardware name: linux,dummy-virt (DT) [ 24.160896] Call trace: [ 24.161253] show_stack+0x20/0x38 (C) [ 24.162321] dump_stack_lvl+0x8c/0xd0 [ 24.163257] print_report+0x118/0x5e0 [ 24.163924] kasan_report+0xc8/0x118 [ 24.164590] __asan_report_load16_noabort+0x20/0x30 [ 24.165217] kmalloc_uaf_16+0x3bc/0x438 [ 24.165752] kunit_try_run_case+0x14c/0x3d0 [ 24.166380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.167021] kthread+0x24c/0x2d0 [ 24.167781] ret_from_fork+0x10/0x20 [ 24.168300] [ 24.168681] Allocated by task 156: [ 24.169139] kasan_save_stack+0x3c/0x68 [ 24.169772] kasan_save_track+0x20/0x40 [ 24.170298] kasan_save_alloc_info+0x40/0x58 [ 24.170927] __kasan_kmalloc+0xd4/0xd8 [ 24.171442] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.171936] kmalloc_uaf_16+0x140/0x438 [ 24.172895] kunit_try_run_case+0x14c/0x3d0 [ 24.173467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.174078] kthread+0x24c/0x2d0 [ 24.174499] ret_from_fork+0x10/0x20 [ 24.175013] [ 24.175284] Freed by task 156: [ 24.176239] kasan_save_stack+0x3c/0x68 [ 24.176882] kasan_save_track+0x20/0x40 [ 24.177511] kasan_save_free_info+0x4c/0x78 [ 24.178170] __kasan_slab_free+0x6c/0x98 [ 24.179097] kfree+0x114/0x3c8 [ 24.179579] kmalloc_uaf_16+0x190/0x438 [ 24.180164] kunit_try_run_case+0x14c/0x3d0 [ 24.180851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181610] kthread+0x24c/0x2d0 [ 24.182148] ret_from_fork+0x10/0x20 [ 24.182378] [ 24.182515] The buggy address belongs to the object at fff00000c63611c0 [ 24.182515] which belongs to the cache kmalloc-16 of size 16 [ 24.183890] The buggy address is located 0 bytes inside of [ 24.183890] freed 16-byte region [fff00000c63611c0, fff00000c63611d0) [ 24.185319] [ 24.185686] The buggy address belongs to the physical page: [ 24.186326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.187516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.188263] page_type: f5(slab) [ 24.188804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.189630] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.190449] page dumped because: kasan: bad access detected [ 24.191288] [ 24.191595] Memory state around the buggy address: [ 24.192285] fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.193175] fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.193928] >fff00000c6361180: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 24.194748] ^ [ 24.195674] fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.196499] fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.197292] ================================================================== [ 24.678121] ================================================================== [ 24.679154] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 24.679944] Read of size 1 at addr fff00000c125aea8 by task kunit_try_catch/176 [ 24.680794] [ 24.681234] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.682508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.683072] Hardware name: linux,dummy-virt (DT) [ 24.683762] Call trace: [ 24.684201] show_stack+0x20/0x38 (C) [ 24.684868] dump_stack_lvl+0x8c/0xd0 [ 24.685468] print_report+0x118/0x5e0 [ 24.686073] kasan_report+0xc8/0x118 [ 24.686628] __asan_report_load1_noabort+0x20/0x30 [ 24.687325] kmalloc_uaf2+0x3f4/0x468 [ 24.687906] kunit_try_run_case+0x14c/0x3d0 [ 24.688535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.689269] kthread+0x24c/0x2d0 [ 24.689835] ret_from_fork+0x10/0x20 [ 24.690402] [ 24.690776] Allocated by task 176: [ 24.691296] kasan_save_stack+0x3c/0x68 [ 24.691962] kasan_save_track+0x20/0x40 [ 24.692577] kasan_save_alloc_info+0x40/0x58 [ 24.693228] __kasan_kmalloc+0xd4/0xd8 [ 24.693869] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.694560] kmalloc_uaf2+0xc4/0x468 [ 24.695113] kunit_try_run_case+0x14c/0x3d0 [ 24.695756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.696450] kthread+0x24c/0x2d0 [ 24.697015] ret_from_fork+0x10/0x20 [ 24.697576] [ 24.697893] Freed by task 176: [ 24.698406] kasan_save_stack+0x3c/0x68 [ 24.699036] kasan_save_track+0x20/0x40 [ 24.699574] kasan_save_free_info+0x4c/0x78 [ 24.700232] __kasan_slab_free+0x6c/0x98 [ 24.700856] kfree+0x114/0x3c8 [ 24.701348] kmalloc_uaf2+0x134/0x468 [ 24.701946] kunit_try_run_case+0x14c/0x3d0 [ 24.702585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703277] kthread+0x24c/0x2d0 [ 24.703817] ret_from_fork+0x10/0x20 [ 24.704404] [ 24.704824] The buggy address belongs to the object at fff00000c125ae80 [ 24.704824] which belongs to the cache kmalloc-64 of size 64 [ 24.706104] The buggy address is located 40 bytes inside of [ 24.706104] freed 64-byte region [fff00000c125ae80, fff00000c125aec0) [ 24.707402] [ 24.707774] The buggy address belongs to the physical page: [ 24.708420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a [ 24.709345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.710159] page_type: f5(slab) [ 24.710689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.711621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.712456] page dumped because: kasan: bad access detected [ 24.713149] [ 24.713473] Memory state around the buggy address: [ 24.714179] fff00000c125ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.715042] fff00000c125ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.715886] >fff00000c125ae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.716681] ^ [ 24.717327] fff00000c125af00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 24.718185] fff00000c125af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.718990] ================================================================== [ 24.550411] ================================================================== [ 24.554020] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 24.556388] Read of size 1 at addr fff00000c63611e8 by task kunit_try_catch/172 [ 24.559018] [ 24.559609] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.561976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.563221] Hardware name: linux,dummy-virt (DT) [ 24.564912] Call trace: [ 24.566019] show_stack+0x20/0x38 (C) [ 24.566654] dump_stack_lvl+0x8c/0xd0 [ 24.569204] print_report+0x118/0x5e0 [ 24.570373] kasan_report+0xc8/0x118 [ 24.570799] __asan_report_load1_noabort+0x20/0x30 [ 24.571270] kmalloc_uaf+0x300/0x338 [ 24.571655] kunit_try_run_case+0x14c/0x3d0 [ 24.573632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.575551] kthread+0x24c/0x2d0 [ 24.576969] ret_from_fork+0x10/0x20 [ 24.579079] [ 24.579547] Allocated by task 172: [ 24.580884] kasan_save_stack+0x3c/0x68 [ 24.582322] kasan_save_track+0x20/0x40 [ 24.583626] kasan_save_alloc_info+0x40/0x58 [ 24.584223] __kasan_kmalloc+0xd4/0xd8 [ 24.584819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.585484] kmalloc_uaf+0xb8/0x338 [ 24.586058] kunit_try_run_case+0x14c/0x3d0 [ 24.586529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.588581] kthread+0x24c/0x2d0 [ 24.589080] ret_from_fork+0x10/0x20 [ 24.589754] [ 24.590118] Freed by task 172: [ 24.590665] kasan_save_stack+0x3c/0x68 [ 24.591364] kasan_save_track+0x20/0x40 [ 24.592011] kasan_save_free_info+0x4c/0x78 [ 24.592983] __kasan_slab_free+0x6c/0x98 [ 24.593643] kfree+0x114/0x3c8 [ 24.594211] kmalloc_uaf+0x11c/0x338 [ 24.595081] kunit_try_run_case+0x14c/0x3d0 [ 24.595829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.596554] kthread+0x24c/0x2d0 [ 24.597079] ret_from_fork+0x10/0x20 [ 24.597692] [ 24.598085] The buggy address belongs to the object at fff00000c63611e0 [ 24.598085] which belongs to the cache kmalloc-16 of size 16 [ 24.600102] The buggy address is located 8 bytes inside of [ 24.600102] freed 16-byte region [fff00000c63611e0, fff00000c63611f0) [ 24.600960] [ 24.601201] The buggy address belongs to the physical page: [ 24.601650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.602377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.603088] page_type: f5(slab) [ 24.603965] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.604874] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.605909] page dumped because: kasan: bad access detected [ 24.606590] [ 24.608288] Memory state around the buggy address: [ 24.609047] fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.610251] fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.611234] >fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.611794] ^ [ 24.612311] fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.612954] fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.613664] ==================================================================
[ 24.519526] ================================================================== [ 24.520716] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380 [ 24.521566] Read of size 1 at addr ffff888101b7dca8 by task kunit_try_catch/191 [ 24.522103] [ 24.522437] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.523485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.523903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.524741] Call Trace: [ 24.525400] <TASK> [ 24.525709] dump_stack_lvl+0x73/0xb0 [ 24.526454] print_report+0xd1/0x640 [ 24.526860] ? __virt_addr_valid+0x1db/0x2d0 [ 24.527558] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.528381] kasan_report+0x102/0x140 [ 24.528923] ? kmalloc_uaf+0x322/0x380 [ 24.529313] ? kmalloc_uaf+0x322/0x380 [ 24.530120] __asan_report_load1_noabort+0x18/0x20 [ 24.530819] kmalloc_uaf+0x322/0x380 [ 24.531354] ? __pfx_kmalloc_uaf+0x10/0x10 [ 24.531927] ? __schedule+0xc70/0x27e0 [ 24.532669] ? __pfx_read_tsc+0x10/0x10 [ 24.533128] ? ktime_get_ts64+0x86/0x230 [ 24.533945] kunit_try_run_case+0x1b3/0x490 [ 24.534553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.535310] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.535854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.536543] ? __kthread_parkme+0x82/0x160 [ 24.536972] ? preempt_count_sub+0x50/0x80 [ 24.537659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.538402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.539045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.539860] kthread+0x257/0x310 [ 24.540502] ? __pfx_kthread+0x10/0x10 [ 24.541028] ret_from_fork+0x41/0x80 [ 24.541634] ? __pfx_kthread+0x10/0x10 [ 24.542042] ret_from_fork_asm+0x1a/0x30 [ 24.542678] </TASK> [ 24.542990] [ 24.543386] Allocated by task 191: [ 24.543852] kasan_save_stack+0x3d/0x60 [ 24.544338] kasan_save_track+0x18/0x40 [ 24.544967] kasan_save_alloc_info+0x3b/0x50 [ 24.545659] __kasan_kmalloc+0xb7/0xc0 [ 24.546094] __kmalloc_cache_noprof+0x184/0x410 [ 24.547108] kmalloc_uaf+0xab/0x380 [ 24.547586] kunit_try_run_case+0x1b3/0x490 [ 24.548544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.549506] kthread+0x257/0x310 [ 24.550023] ret_from_fork+0x41/0x80 [ 24.551058] ret_from_fork_asm+0x1a/0x30 [ 24.551971] [ 24.552810] Freed by task 191: [ 24.553815] kasan_save_stack+0x3d/0x60 [ 24.554234] kasan_save_track+0x18/0x40 [ 24.554995] kasan_save_free_info+0x3f/0x60 [ 24.555775] __kasan_slab_free+0x56/0x70 [ 24.556628] kfree+0x123/0x3f0 [ 24.557375] kmalloc_uaf+0x12d/0x380 [ 24.557895] kunit_try_run_case+0x1b3/0x490 [ 24.559046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.559750] kthread+0x257/0x310 [ 24.560140] ret_from_fork+0x41/0x80 [ 24.560569] ret_from_fork_asm+0x1a/0x30 [ 24.561786] [ 24.561977] The buggy address belongs to the object at ffff888101b7dca0 [ 24.561977] which belongs to the cache kmalloc-16 of size 16 [ 24.563478] The buggy address is located 8 bytes inside of [ 24.563478] freed 16-byte region [ffff888101b7dca0, ffff888101b7dcb0) [ 24.564681] [ 24.565490] The buggy address belongs to the physical page: [ 24.566112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b7d [ 24.567435] flags: 0x200000000000000(node=0|zone=2) [ 24.567903] page_type: f5(slab) [ 24.568696] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.569730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.570749] page dumped because: kasan: bad access detected [ 24.571610] [ 24.571803] Memory state around the buggy address: [ 24.572554] ffff888101b7db80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.573654] ffff888101b7dc00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.574558] >ffff888101b7dc80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 24.575652] ^ [ 24.576042] ffff888101b7dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.576957] ffff888101b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.578016] ================================================================== [ 24.039072] ================================================================== [ 24.040464] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0 [ 24.041989] Read of size 16 at addr ffff888101b7dc80 by task kunit_try_catch/175 [ 24.043023] [ 24.043265] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.044374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.044725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.046419] Call Trace: [ 24.046708] <TASK> [ 24.047824] dump_stack_lvl+0x73/0xb0 [ 24.049146] print_report+0xd1/0x640 [ 24.049719] ? __virt_addr_valid+0x1db/0x2d0 [ 24.050967] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.051376] kasan_report+0x102/0x140 [ 24.052040] ? kmalloc_uaf_16+0x47d/0x4c0 [ 24.052637] ? kmalloc_uaf_16+0x47d/0x4c0 [ 24.053489] __asan_report_load16_noabort+0x18/0x20 [ 24.054584] kmalloc_uaf_16+0x47d/0x4c0 [ 24.055035] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 24.056139] ? __schedule+0xc70/0x27e0 [ 24.056792] ? __pfx_read_tsc+0x10/0x10 [ 24.057640] ? ktime_get_ts64+0x86/0x230 [ 24.058805] kunit_try_run_case+0x1b3/0x490 [ 24.059194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.059780] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.060275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.060732] ? __kthread_parkme+0x82/0x160 [ 24.062120] ? preempt_count_sub+0x50/0x80 [ 24.063485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.063870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.065339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.066406] kthread+0x257/0x310 [ 24.066777] ? __pfx_kthread+0x10/0x10 [ 24.067745] ret_from_fork+0x41/0x80 [ 24.068745] ? __pfx_kthread+0x10/0x10 [ 24.069007] ret_from_fork_asm+0x1a/0x30 [ 24.069563] </TASK> [ 24.069865] [ 24.070040] Allocated by task 175: [ 24.071994] kasan_save_stack+0x3d/0x60 [ 24.072574] kasan_save_track+0x18/0x40 [ 24.072926] kasan_save_alloc_info+0x3b/0x50 [ 24.073233] __kasan_kmalloc+0xb7/0xc0 [ 24.074003] __kmalloc_cache_noprof+0x184/0x410 [ 24.075004] kmalloc_uaf_16+0x15c/0x4c0 [ 24.075266] kunit_try_run_case+0x1b3/0x490 [ 24.076533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.077002] kthread+0x257/0x310 [ 24.077460] ret_from_fork+0x41/0x80 [ 24.077878] ret_from_fork_asm+0x1a/0x30 [ 24.078527] [ 24.078729] Freed by task 175: [ 24.078993] kasan_save_stack+0x3d/0x60 [ 24.080194] kasan_save_track+0x18/0x40 [ 24.080604] kasan_save_free_info+0x3f/0x60 [ 24.081160] __kasan_slab_free+0x56/0x70 [ 24.081647] kfree+0x123/0x3f0 [ 24.082055] kmalloc_uaf_16+0x1d7/0x4c0 [ 24.082658] kunit_try_run_case+0x1b3/0x490 [ 24.083023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.083394] kthread+0x257/0x310 [ 24.084613] ret_from_fork+0x41/0x80 [ 24.085048] ret_from_fork_asm+0x1a/0x30 [ 24.085358] [ 24.085777] The buggy address belongs to the object at ffff888101b7dc80 [ 24.085777] which belongs to the cache kmalloc-16 of size 16 [ 24.087670] The buggy address is located 0 bytes inside of [ 24.087670] freed 16-byte region [ffff888101b7dc80, ffff888101b7dc90) [ 24.088886] [ 24.089154] The buggy address belongs to the physical page: [ 24.090024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b7d [ 24.090574] flags: 0x200000000000000(node=0|zone=2) [ 24.091875] page_type: f5(slab) [ 24.092577] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.093152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.093890] page dumped because: kasan: bad access detected [ 24.094236] [ 24.094612] Memory state around the buggy address: [ 24.095143] ffff888101b7db80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.096158] ffff888101b7dc00: 00 05 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 24.096847] >ffff888101b7dc80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.098317] ^ [ 24.098621] ffff888101b7dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.100107] ffff888101b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.100485] ================================================================== [ 24.648825] ================================================================== [ 24.650485] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4aa/0x520 [ 24.651347] Read of size 1 at addr ffff888102402ca8 by task kunit_try_catch/195 [ 24.652549] [ 24.653352] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.654771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.655157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.656791] Call Trace: [ 24.657086] <TASK> [ 24.657502] dump_stack_lvl+0x73/0xb0 [ 24.657806] print_report+0xd1/0x640 [ 24.658373] ? __virt_addr_valid+0x1db/0x2d0 [ 24.659182] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.660750] kasan_report+0x102/0x140 [ 24.661375] ? kmalloc_uaf2+0x4aa/0x520 [ 24.661765] ? kmalloc_uaf2+0x4aa/0x520 [ 24.662471] __asan_report_load1_noabort+0x18/0x20 [ 24.663801] kmalloc_uaf2+0x4aa/0x520 [ 24.664946] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 24.665674] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 24.666622] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 24.667374] kunit_try_run_case+0x1b3/0x490 [ 24.667844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.669258] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.670184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.671133] ? __kthread_parkme+0x82/0x160 [ 24.671761] ? preempt_count_sub+0x50/0x80 [ 24.672762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.673455] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.674235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.675391] kthread+0x257/0x310 [ 24.675779] ? __pfx_kthread+0x10/0x10 [ 24.676892] ret_from_fork+0x41/0x80 [ 24.677249] ? __pfx_kthread+0x10/0x10 [ 24.678082] ret_from_fork_asm+0x1a/0x30 [ 24.679096] </TASK> [ 24.679448] [ 24.679701] Allocated by task 195: [ 24.680095] kasan_save_stack+0x3d/0x60 [ 24.680608] kasan_save_track+0x18/0x40 [ 24.681614] kasan_save_alloc_info+0x3b/0x50 [ 24.682620] __kasan_kmalloc+0xb7/0xc0 [ 24.683035] __kmalloc_cache_noprof+0x184/0x410 [ 24.684112] kmalloc_uaf2+0xc7/0x520 [ 24.684521] kunit_try_run_case+0x1b3/0x490 [ 24.685013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.686455] kthread+0x257/0x310 [ 24.686698] ret_from_fork+0x41/0x80 [ 24.687760] ret_from_fork_asm+0x1a/0x30 [ 24.688649] [ 24.688755] Freed by task 195: [ 24.689212] kasan_save_stack+0x3d/0x60 [ 24.690480] kasan_save_track+0x18/0x40 [ 24.690751] kasan_save_free_info+0x3f/0x60 [ 24.691574] __kasan_slab_free+0x56/0x70 [ 24.692745] kfree+0x123/0x3f0 [ 24.693092] kmalloc_uaf2+0x14d/0x520 [ 24.693535] kunit_try_run_case+0x1b3/0x490 [ 24.694859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.695332] kthread+0x257/0x310 [ 24.695699] ret_from_fork+0x41/0x80 [ 24.696627] ret_from_fork_asm+0x1a/0x30 [ 24.696993] [ 24.697235] The buggy address belongs to the object at ffff888102402c80 [ 24.697235] which belongs to the cache kmalloc-64 of size 64 [ 24.698933] The buggy address is located 40 bytes inside of [ 24.698933] freed 64-byte region [ffff888102402c80, ffff888102402cc0) [ 24.700465] [ 24.700735] The buggy address belongs to the physical page: [ 24.702119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102402 [ 24.703070] flags: 0x200000000000000(node=0|zone=2) [ 24.703568] page_type: f5(slab) [ 24.704403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.705055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.705742] page dumped because: kasan: bad access detected [ 24.706834] [ 24.707200] Memory state around the buggy address: [ 24.708086] ffff888102402b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.708716] ffff888102402c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.710048] >ffff888102402c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.710760] ^ [ 24.711491] ffff888102402d00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 24.712049] ffff888102402d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.712776] ==================================================================