Date
May 12, 2025, 11:48 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.088829] ================================================================== [ 17.088959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.089071] Read of size 1 at addr fff00000c78d9400 by task kunit_try_catch/196 [ 17.089176] [ 17.089240] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.089432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.089490] Hardware name: linux,dummy-virt (DT) [ 17.089556] Call trace: [ 17.089604] show_stack+0x20/0x38 (C) [ 17.089710] dump_stack_lvl+0x8c/0xd0 [ 17.089814] print_report+0x118/0x608 [ 17.089954] kasan_report+0xdc/0x128 [ 17.090054] __kasan_check_byte+0x54/0x70 [ 17.090191] ksize+0x30/0x88 [ 17.090276] ksize_uaf+0x168/0x5f8 [ 17.090362] kunit_try_run_case+0x170/0x3f0 [ 17.090468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.090603] kthread+0x328/0x630 [ 17.090729] ret_from_fork+0x10/0x20 [ 17.090863] [ 17.090912] Allocated by task 196: [ 17.090986] kasan_save_stack+0x3c/0x68 [ 17.091107] kasan_save_track+0x20/0x40 [ 17.091208] kasan_save_alloc_info+0x40/0x58 [ 17.091313] __kasan_kmalloc+0xd4/0xd8 [ 17.091409] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.091509] ksize_uaf+0xb8/0x5f8 [ 17.091601] kunit_try_run_case+0x170/0x3f0 [ 17.091699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.091816] kthread+0x328/0x630 [ 17.092078] ret_from_fork+0x10/0x20 [ 17.092165] [ 17.092206] Freed by task 196: [ 17.092264] kasan_save_stack+0x3c/0x68 [ 17.092331] kasan_save_track+0x20/0x40 [ 17.092425] kasan_save_free_info+0x4c/0x78 [ 17.092552] __kasan_slab_free+0x6c/0x98 [ 17.092646] kfree+0x214/0x3c8 [ 17.092781] ksize_uaf+0x11c/0x5f8 [ 17.092860] kunit_try_run_case+0x170/0x3f0 [ 17.092951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.093052] kthread+0x328/0x630 [ 17.093128] ret_from_fork+0x10/0x20 [ 17.093259] [ 17.093314] The buggy address belongs to the object at fff00000c78d9400 [ 17.093314] which belongs to the cache kmalloc-128 of size 128 [ 17.093844] The buggy address is located 0 bytes inside of [ 17.093844] freed 128-byte region [fff00000c78d9400, fff00000c78d9480) [ 17.094051] [ 17.094147] The buggy address belongs to the physical page: [ 17.094287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.094799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.095298] page_type: f5(slab) [ 17.095513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.095623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.095713] page dumped because: kasan: bad access detected [ 17.096153] [ 17.096214] Memory state around the buggy address: [ 17.096370] fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.096671] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.096938] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.097035] ^ [ 17.097104] fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.097282] fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.097372] ================================================================== [ 17.099062] ================================================================== [ 17.099170] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.099270] Read of size 1 at addr fff00000c78d9400 by task kunit_try_catch/196 [ 17.100140] [ 17.100299] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.100892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.100960] Hardware name: linux,dummy-virt (DT) [ 17.101034] Call trace: [ 17.101089] show_stack+0x20/0x38 (C) [ 17.101300] dump_stack_lvl+0x8c/0xd0 [ 17.101405] print_report+0x118/0x608 [ 17.101944] kasan_report+0xdc/0x128 [ 17.102183] __asan_report_load1_noabort+0x20/0x30 [ 17.102389] ksize_uaf+0x598/0x5f8 [ 17.102679] kunit_try_run_case+0x170/0x3f0 [ 17.103011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.103145] kthread+0x328/0x630 [ 17.103551] ret_from_fork+0x10/0x20 [ 17.103660] [ 17.103701] Allocated by task 196: [ 17.103756] kasan_save_stack+0x3c/0x68 [ 17.104816] kasan_save_track+0x20/0x40 [ 17.104931] kasan_save_alloc_info+0x40/0x58 [ 17.105223] __kasan_kmalloc+0xd4/0xd8 [ 17.105460] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.105755] ksize_uaf+0xb8/0x5f8 [ 17.105827] kunit_try_run_case+0x170/0x3f0 [ 17.106280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.106738] kthread+0x328/0x630 [ 17.106821] ret_from_fork+0x10/0x20 [ 17.106997] [ 17.107083] Freed by task 196: [ 17.107143] kasan_save_stack+0x3c/0x68 [ 17.107227] kasan_save_track+0x20/0x40 [ 17.107304] kasan_save_free_info+0x4c/0x78 [ 17.107381] __kasan_slab_free+0x6c/0x98 [ 17.107471] kfree+0x214/0x3c8 [ 17.107539] ksize_uaf+0x11c/0x5f8 [ 17.107607] kunit_try_run_case+0x170/0x3f0 [ 17.107683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.107774] kthread+0x328/0x630 [ 17.107846] ret_from_fork+0x10/0x20 [ 17.107931] [ 17.107976] The buggy address belongs to the object at fff00000c78d9400 [ 17.107976] which belongs to the cache kmalloc-128 of size 128 [ 17.108102] The buggy address is located 0 bytes inside of [ 17.108102] freed 128-byte region [fff00000c78d9400, fff00000c78d9480) [ 17.108251] [ 17.108308] The buggy address belongs to the physical page: [ 17.108376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.108491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.108592] page_type: f5(slab) [ 17.108674] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.108784] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.108873] page dumped because: kasan: bad access detected [ 17.108944] [ 17.108996] Memory state around the buggy address: [ 17.109562] fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.109687] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.109845] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.109960] ^ [ 17.110020] fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.110111] fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.111011] ================================================================== [ 17.112379] ================================================================== [ 17.112488] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.112585] Read of size 1 at addr fff00000c78d9478 by task kunit_try_catch/196 [ 17.112689] [ 17.112750] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 17.113213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.113866] Hardware name: linux,dummy-virt (DT) [ 17.114078] Call trace: [ 17.114149] show_stack+0x20/0x38 (C) [ 17.114662] dump_stack_lvl+0x8c/0xd0 [ 17.114903] print_report+0x118/0x608 [ 17.115059] kasan_report+0xdc/0x128 [ 17.115175] __asan_report_load1_noabort+0x20/0x30 [ 17.115451] ksize_uaf+0x544/0x5f8 [ 17.115547] kunit_try_run_case+0x170/0x3f0 [ 17.115644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.115754] kthread+0x328/0x630 [ 17.116777] ret_from_fork+0x10/0x20 [ 17.117661] [ 17.117822] Allocated by task 196: [ 17.118046] kasan_save_stack+0x3c/0x68 [ 17.118260] kasan_save_track+0x20/0x40 [ 17.118381] kasan_save_alloc_info+0x40/0x58 [ 17.118801] __kasan_kmalloc+0xd4/0xd8 [ 17.119103] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.119377] ksize_uaf+0xb8/0x5f8 [ 17.119479] kunit_try_run_case+0x170/0x3f0 [ 17.119639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.119797] kthread+0x328/0x630 [ 17.120002] ret_from_fork+0x10/0x20 [ 17.120238] [ 17.120298] Freed by task 196: [ 17.120365] kasan_save_stack+0x3c/0x68 [ 17.120452] kasan_save_track+0x20/0x40 [ 17.120529] kasan_save_free_info+0x4c/0x78 [ 17.120603] __kasan_slab_free+0x6c/0x98 [ 17.120894] kfree+0x214/0x3c8 [ 17.121008] ksize_uaf+0x11c/0x5f8 [ 17.121464] kunit_try_run_case+0x170/0x3f0 [ 17.121553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.121645] kthread+0x328/0x630 [ 17.121719] ret_from_fork+0x10/0x20 [ 17.121790] [ 17.121830] The buggy address belongs to the object at fff00000c78d9400 [ 17.121830] which belongs to the cache kmalloc-128 of size 128 [ 17.122856] The buggy address is located 120 bytes inside of [ 17.122856] freed 128-byte region [fff00000c78d9400, fff00000c78d9480) [ 17.123154] [ 17.123718] The buggy address belongs to the physical page: [ 17.123897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d9 [ 17.124127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.124305] page_type: f5(slab) [ 17.124388] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.124498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.124929] page dumped because: kasan: bad access detected [ 17.125267] [ 17.125325] Memory state around the buggy address: [ 17.125400] fff00000c78d9300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.125697] fff00000c78d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.125842] >fff00000c78d9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.125991] ^ [ 17.126242] fff00000c78d9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.126341] fff00000c78d9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.126423] ==================================================================
[ 17.273666] ================================================================== [ 17.274718] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 17.275631] Read of size 1 at addr ffff888102b42900 by task kunit_try_catch/213 [ 17.276429] [ 17.276540] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 17.276600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.276612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.276638] Call Trace: [ 17.276668] <TASK> [ 17.276703] dump_stack_lvl+0x73/0xb0 [ 17.276765] print_report+0xd1/0x650 [ 17.276810] ? __virt_addr_valid+0x1db/0x2d0 [ 17.276853] ? ksize_uaf+0x5fe/0x6c0 [ 17.276888] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.276923] ? ksize_uaf+0x5fe/0x6c0 [ 17.276961] kasan_report+0x141/0x180 [ 17.277002] ? ksize_uaf+0x5fe/0x6c0 [ 17.277055] __asan_report_load1_noabort+0x18/0x20 [ 17.277092] ksize_uaf+0x5fe/0x6c0 [ 17.277132] ? __pfx_ksize_uaf+0x10/0x10 [ 17.277176] ? __schedule+0x10cc/0x2b60 [ 17.277215] ? __pfx_read_tsc+0x10/0x10 [ 17.277295] ? ktime_get_ts64+0x86/0x230 [ 17.277358] kunit_try_run_case+0x1a5/0x480 [ 17.277411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.277473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.277511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.277547] ? __kthread_parkme+0x82/0x180 [ 17.277581] ? preempt_count_sub+0x50/0x80 [ 17.277620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.277657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.277695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.277731] kthread+0x337/0x6f0 [ 17.277763] ? trace_preempt_on+0x20/0xc0 [ 17.277802] ? __pfx_kthread+0x10/0x10 [ 17.277836] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.277869] ? calculate_sigpending+0x7b/0xa0 [ 17.277913] ? __pfx_kthread+0x10/0x10 [ 17.277936] ret_from_fork+0x116/0x1d0 [ 17.277956] ? __pfx_kthread+0x10/0x10 [ 17.277977] ret_from_fork_asm+0x1a/0x30 [ 17.278009] </TASK> [ 17.278023] [ 17.292234] Allocated by task 213: [ 17.292743] kasan_save_stack+0x45/0x70 [ 17.293307] kasan_save_track+0x18/0x40 [ 17.293887] kasan_save_alloc_info+0x3b/0x50 [ 17.294087] __kasan_kmalloc+0xb7/0xc0 [ 17.294347] __kmalloc_cache_noprof+0x189/0x420 [ 17.294732] ksize_uaf+0xaa/0x6c0 [ 17.295193] kunit_try_run_case+0x1a5/0x480 [ 17.295545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.296175] kthread+0x337/0x6f0 [ 17.296457] ret_from_fork+0x116/0x1d0 [ 17.296631] ret_from_fork_asm+0x1a/0x30 [ 17.297021] [ 17.297588] Freed by task 213: [ 17.297901] kasan_save_stack+0x45/0x70 [ 17.298387] kasan_save_track+0x18/0x40 [ 17.298774] kasan_save_free_info+0x3f/0x60 [ 17.299018] __kasan_slab_free+0x56/0x70 [ 17.299642] kfree+0x222/0x3f0 [ 17.299962] ksize_uaf+0x12c/0x6c0 [ 17.300414] kunit_try_run_case+0x1a5/0x480 [ 17.300847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.301728] kthread+0x337/0x6f0 [ 17.302218] ret_from_fork+0x116/0x1d0 [ 17.302521] ret_from_fork_asm+0x1a/0x30 [ 17.302893] [ 17.303087] The buggy address belongs to the object at ffff888102b42900 [ 17.303087] which belongs to the cache kmalloc-128 of size 128 [ 17.304070] The buggy address is located 0 bytes inside of [ 17.304070] freed 128-byte region [ffff888102b42900, ffff888102b42980) [ 17.304983] [ 17.305800] The buggy address belongs to the physical page: [ 17.306234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b42 [ 17.306969] flags: 0x200000000000000(node=0|zone=2) [ 17.307555] page_type: f5(slab) [ 17.307830] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.308552] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.309001] page dumped because: kasan: bad access detected [ 17.309995] [ 17.310158] Memory state around the buggy address: [ 17.310638] ffff888102b42800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.311478] ffff888102b42880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.312057] >ffff888102b42900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.312510] ^ [ 17.312728] ffff888102b42980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.313875] ffff888102b42a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.314156] ================================================================== [ 17.315089] ================================================================== [ 17.316417] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 17.316902] Read of size 1 at addr ffff888102b42978 by task kunit_try_catch/213 [ 17.317475] [ 17.317910] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 17.318291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.318312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.318340] Call Trace: [ 17.318389] <TASK> [ 17.318441] dump_stack_lvl+0x73/0xb0 [ 17.318515] print_report+0xd1/0x650 [ 17.318562] ? __virt_addr_valid+0x1db/0x2d0 [ 17.318612] ? ksize_uaf+0x5e4/0x6c0 [ 17.318699] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.318737] ? ksize_uaf+0x5e4/0x6c0 [ 17.318778] kasan_report+0x141/0x180 [ 17.318810] ? ksize_uaf+0x5e4/0x6c0 [ 17.318838] __asan_report_load1_noabort+0x18/0x20 [ 17.318860] ksize_uaf+0x5e4/0x6c0 [ 17.318882] ? __pfx_ksize_uaf+0x10/0x10 [ 17.318905] ? __schedule+0x10cc/0x2b60 [ 17.318928] ? __pfx_read_tsc+0x10/0x10 [ 17.318950] ? ktime_get_ts64+0x86/0x230 [ 17.318977] kunit_try_run_case+0x1a5/0x480 [ 17.319021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.319090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.319133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.319184] ? __kthread_parkme+0x82/0x180 [ 17.319213] ? preempt_count_sub+0x50/0x80 [ 17.319238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.319283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.319311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.319336] kthread+0x337/0x6f0 [ 17.319357] ? trace_preempt_on+0x20/0xc0 [ 17.319382] ? __pfx_kthread+0x10/0x10 [ 17.319404] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.319425] ? calculate_sigpending+0x7b/0xa0 [ 17.319451] ? __pfx_kthread+0x10/0x10 [ 17.319474] ret_from_fork+0x116/0x1d0 [ 17.319493] ? __pfx_kthread+0x10/0x10 [ 17.319514] ret_from_fork_asm+0x1a/0x30 [ 17.319546] </TASK> [ 17.319560] [ 17.332087] Allocated by task 213: [ 17.332609] kasan_save_stack+0x45/0x70 [ 17.333193] kasan_save_track+0x18/0x40 [ 17.333840] kasan_save_alloc_info+0x3b/0x50 [ 17.334046] __kasan_kmalloc+0xb7/0xc0 [ 17.334253] __kmalloc_cache_noprof+0x189/0x420 [ 17.334727] ksize_uaf+0xaa/0x6c0 [ 17.335508] kunit_try_run_case+0x1a5/0x480 [ 17.335809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.336074] kthread+0x337/0x6f0 [ 17.336413] ret_from_fork+0x116/0x1d0 [ 17.336730] ret_from_fork_asm+0x1a/0x30 [ 17.337052] [ 17.337204] Freed by task 213: [ 17.337982] kasan_save_stack+0x45/0x70 [ 17.338451] kasan_save_track+0x18/0x40 [ 17.338768] kasan_save_free_info+0x3f/0x60 [ 17.339211] __kasan_slab_free+0x56/0x70 [ 17.339519] kfree+0x222/0x3f0 [ 17.339791] ksize_uaf+0x12c/0x6c0 [ 17.340216] kunit_try_run_case+0x1a5/0x480 [ 17.340577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.340983] kthread+0x337/0x6f0 [ 17.341601] ret_from_fork+0x116/0x1d0 [ 17.341851] ret_from_fork_asm+0x1a/0x30 [ 17.342092] [ 17.342480] The buggy address belongs to the object at ffff888102b42900 [ 17.342480] which belongs to the cache kmalloc-128 of size 128 [ 17.343505] The buggy address is located 120 bytes inside of [ 17.343505] freed 128-byte region [ffff888102b42900, ffff888102b42980) [ 17.344434] [ 17.344630] The buggy address belongs to the physical page: [ 17.344925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b42 [ 17.345524] flags: 0x200000000000000(node=0|zone=2) [ 17.346481] page_type: f5(slab) [ 17.346692] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.347165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.347871] page dumped because: kasan: bad access detected [ 17.348449] [ 17.348690] Memory state around the buggy address: [ 17.348999] ffff888102b42800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.349982] ffff888102b42880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.350700] >ffff888102b42900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.351188] ^ [ 17.351644] ffff888102b42980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.352300] ffff888102b42a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.352753] ================================================================== [ 17.234383] ================================================================== [ 17.235286] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 17.235676] Read of size 1 at addr ffff888102b42900 by task kunit_try_catch/213 [ 17.236839] [ 17.237029] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 17.237130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.237183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.237221] Call Trace: [ 17.237247] <TASK> [ 17.237293] dump_stack_lvl+0x73/0xb0 [ 17.237355] print_report+0xd1/0x650 [ 17.237394] ? __virt_addr_valid+0x1db/0x2d0 [ 17.237441] ? ksize_uaf+0x19d/0x6c0 [ 17.237481] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.237527] ? ksize_uaf+0x19d/0x6c0 [ 17.237572] kasan_report+0x141/0x180 [ 17.237619] ? ksize_uaf+0x19d/0x6c0 [ 17.237666] ? ksize_uaf+0x19d/0x6c0 [ 17.237746] __kasan_check_byte+0x3d/0x50 [ 17.237797] ksize+0x20/0x60 [ 17.237840] ksize_uaf+0x19d/0x6c0 [ 17.237866] ? __pfx_ksize_uaf+0x10/0x10 [ 17.237890] ? __schedule+0x10cc/0x2b60 [ 17.237913] ? __pfx_read_tsc+0x10/0x10 [ 17.237937] ? ktime_get_ts64+0x86/0x230 [ 17.237963] kunit_try_run_case+0x1a5/0x480 [ 17.237991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.238015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.238059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.238202] ? __kthread_parkme+0x82/0x180 [ 17.238227] ? preempt_count_sub+0x50/0x80 [ 17.238254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.238302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.238327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.238351] kthread+0x337/0x6f0 [ 17.238372] ? trace_preempt_on+0x20/0xc0 [ 17.238398] ? __pfx_kthread+0x10/0x10 [ 17.238418] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.238439] ? calculate_sigpending+0x7b/0xa0 [ 17.238465] ? __pfx_kthread+0x10/0x10 [ 17.238486] ret_from_fork+0x116/0x1d0 [ 17.238505] ? __pfx_kthread+0x10/0x10 [ 17.238526] ret_from_fork_asm+0x1a/0x30 [ 17.238557] </TASK> [ 17.238571] [ 17.251790] Allocated by task 213: [ 17.252333] kasan_save_stack+0x45/0x70 [ 17.252639] kasan_save_track+0x18/0x40 [ 17.252992] kasan_save_alloc_info+0x3b/0x50 [ 17.253210] __kasan_kmalloc+0xb7/0xc0 [ 17.253411] __kmalloc_cache_noprof+0x189/0x420 [ 17.253802] ksize_uaf+0xaa/0x6c0 [ 17.254103] kunit_try_run_case+0x1a5/0x480 [ 17.254837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.255529] kthread+0x337/0x6f0 [ 17.255950] ret_from_fork+0x116/0x1d0 [ 17.256594] ret_from_fork_asm+0x1a/0x30 [ 17.256905] [ 17.257241] Freed by task 213: [ 17.257567] kasan_save_stack+0x45/0x70 [ 17.257846] kasan_save_track+0x18/0x40 [ 17.258181] kasan_save_free_info+0x3f/0x60 [ 17.258600] __kasan_slab_free+0x56/0x70 [ 17.258980] kfree+0x222/0x3f0 [ 17.259526] ksize_uaf+0x12c/0x6c0 [ 17.259775] kunit_try_run_case+0x1a5/0x480 [ 17.260537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.260735] kthread+0x337/0x6f0 [ 17.261010] ret_from_fork+0x116/0x1d0 [ 17.261519] ret_from_fork_asm+0x1a/0x30 [ 17.261904] [ 17.262097] The buggy address belongs to the object at ffff888102b42900 [ 17.262097] which belongs to the cache kmalloc-128 of size 128 [ 17.262917] The buggy address is located 0 bytes inside of [ 17.262917] freed 128-byte region [ffff888102b42900, ffff888102b42980) [ 17.263946] [ 17.264603] The buggy address belongs to the physical page: [ 17.265271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b42 [ 17.265773] flags: 0x200000000000000(node=0|zone=2) [ 17.266423] page_type: f5(slab) [ 17.266733] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.267476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.267952] page dumped because: kasan: bad access detected [ 17.268617] [ 17.268810] Memory state around the buggy address: [ 17.269191] ffff888102b42800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.269765] ffff888102b42880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.270346] >ffff888102b42900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.270749] ^ [ 17.271180] ffff888102b42980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.271725] ffff888102b42a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.272168] ==================================================================