Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.492928] ================================================================== [ 18.492986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 18.493036] Read of size 1 at addr fff00000c65b1600 by task kunit_try_catch/196 [ 18.493110] [ 18.493140] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.493252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.493305] Hardware name: linux,dummy-virt (DT) [ 18.493334] Call trace: [ 18.493357] show_stack+0x20/0x38 (C) [ 18.493418] dump_stack_lvl+0x8c/0xd0 [ 18.493477] print_report+0x118/0x608 [ 18.493539] kasan_report+0xdc/0x128 [ 18.493594] __asan_report_load1_noabort+0x20/0x30 [ 18.493704] ksize_uaf+0x598/0x5f8 [ 18.493748] kunit_try_run_case+0x170/0x3f0 [ 18.493814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.493890] kthread+0x328/0x630 [ 18.493957] ret_from_fork+0x10/0x20 [ 18.494012] [ 18.494079] Allocated by task 196: [ 18.494147] kasan_save_stack+0x3c/0x68 [ 18.494189] kasan_save_track+0x20/0x40 [ 18.494227] kasan_save_alloc_info+0x40/0x58 [ 18.494263] __kasan_kmalloc+0xd4/0xd8 [ 18.494298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.494369] ksize_uaf+0xb8/0x5f8 [ 18.494404] kunit_try_run_case+0x170/0x3f0 [ 18.494461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.494505] kthread+0x328/0x630 [ 18.494571] ret_from_fork+0x10/0x20 [ 18.494607] [ 18.494626] Freed by task 196: [ 18.494652] kasan_save_stack+0x3c/0x68 [ 18.494689] kasan_save_track+0x20/0x40 [ 18.494726] kasan_save_free_info+0x4c/0x78 [ 18.494770] __kasan_slab_free+0x6c/0x98 [ 18.494827] kfree+0x214/0x3c8 [ 18.494865] ksize_uaf+0x11c/0x5f8 [ 18.494900] kunit_try_run_case+0x170/0x3f0 [ 18.494955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.495006] kthread+0x328/0x630 [ 18.495065] ret_from_fork+0x10/0x20 [ 18.495133] [ 18.495158] The buggy address belongs to the object at fff00000c65b1600 [ 18.495158] which belongs to the cache kmalloc-128 of size 128 [ 18.495227] The buggy address is located 0 bytes inside of [ 18.495227] freed 128-byte region [fff00000c65b1600, fff00000c65b1680) [ 18.495289] [ 18.495308] The buggy address belongs to the physical page: [ 18.495369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.495476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.495539] page_type: f5(slab) [ 18.495846] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.495938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.496042] page dumped because: kasan: bad access detected [ 18.496074] [ 18.496092] Memory state around the buggy address: [ 18.496187] fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.496342] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496383] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.496420] ^ [ 18.496457] fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496540] fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.496654] ================================================================== [ 18.497102] ================================================================== [ 18.497189] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 18.497236] Read of size 1 at addr fff00000c65b1678 by task kunit_try_catch/196 [ 18.497406] [ 18.497448] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.497545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.497590] Hardware name: linux,dummy-virt (DT) [ 18.497637] Call trace: [ 18.497666] show_stack+0x20/0x38 (C) [ 18.497747] dump_stack_lvl+0x8c/0xd0 [ 18.497823] print_report+0x118/0x608 [ 18.497869] kasan_report+0xdc/0x128 [ 18.497932] __asan_report_load1_noabort+0x20/0x30 [ 18.497994] ksize_uaf+0x544/0x5f8 [ 18.498037] kunit_try_run_case+0x170/0x3f0 [ 18.498084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.498136] kthread+0x328/0x630 [ 18.498181] ret_from_fork+0x10/0x20 [ 18.498229] [ 18.498247] Allocated by task 196: [ 18.498275] kasan_save_stack+0x3c/0x68 [ 18.498313] kasan_save_track+0x20/0x40 [ 18.498375] kasan_save_alloc_info+0x40/0x58 [ 18.498413] __kasan_kmalloc+0xd4/0xd8 [ 18.498469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.498508] ksize_uaf+0xb8/0x5f8 [ 18.498552] kunit_try_run_case+0x170/0x3f0 [ 18.498589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.498631] kthread+0x328/0x630 [ 18.498664] ret_from_fork+0x10/0x20 [ 18.498699] [ 18.498717] Freed by task 196: [ 18.498752] kasan_save_stack+0x3c/0x68 [ 18.498790] kasan_save_track+0x20/0x40 [ 18.498827] kasan_save_free_info+0x4c/0x78 [ 18.498864] __kasan_slab_free+0x6c/0x98 [ 18.498901] kfree+0x214/0x3c8 [ 18.498933] ksize_uaf+0x11c/0x5f8 [ 18.498967] kunit_try_run_case+0x170/0x3f0 [ 18.499005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.499048] kthread+0x328/0x630 [ 18.499078] ret_from_fork+0x10/0x20 [ 18.499113] [ 18.499132] The buggy address belongs to the object at fff00000c65b1600 [ 18.499132] which belongs to the cache kmalloc-128 of size 128 [ 18.499190] The buggy address is located 120 bytes inside of [ 18.499190] freed 128-byte region [fff00000c65b1600, fff00000c65b1680) [ 18.499262] [ 18.499288] The buggy address belongs to the physical page: [ 18.499326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.499435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.499484] page_type: f5(slab) [ 18.499522] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.499783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.499825] page dumped because: kasan: bad access detected [ 18.499854] [ 18.499872] Memory state around the buggy address: [ 18.499920] fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.499962] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500003] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.500058] ^ [ 18.500099] fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500140] fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.500178] ================================================================== [ 18.485014] ================================================================== [ 18.485106] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 18.485158] Read of size 1 at addr fff00000c65b1600 by task kunit_try_catch/196 [ 18.485235] [ 18.485267] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.485446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.485487] Hardware name: linux,dummy-virt (DT) [ 18.485583] Call trace: [ 18.485624] show_stack+0x20/0x38 (C) [ 18.485729] dump_stack_lvl+0x8c/0xd0 [ 18.485815] print_report+0x118/0x608 [ 18.485861] kasan_report+0xdc/0x128 [ 18.485905] __kasan_check_byte+0x54/0x70 [ 18.485951] ksize+0x30/0x88 [ 18.485994] ksize_uaf+0x168/0x5f8 [ 18.486051] kunit_try_run_case+0x170/0x3f0 [ 18.486117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.486170] kthread+0x328/0x630 [ 18.486212] ret_from_fork+0x10/0x20 [ 18.486349] [ 18.486376] Allocated by task 196: [ 18.486403] kasan_save_stack+0x3c/0x68 [ 18.486462] kasan_save_track+0x20/0x40 [ 18.486498] kasan_save_alloc_info+0x40/0x58 [ 18.486551] __kasan_kmalloc+0xd4/0xd8 [ 18.486655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.486712] ksize_uaf+0xb8/0x5f8 [ 18.486747] kunit_try_run_case+0x170/0x3f0 [ 18.486785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.486828] kthread+0x328/0x630 [ 18.486893] ret_from_fork+0x10/0x20 [ 18.486929] [ 18.486947] Freed by task 196: [ 18.486988] kasan_save_stack+0x3c/0x68 [ 18.487026] kasan_save_track+0x20/0x40 [ 18.487062] kasan_save_free_info+0x4c/0x78 [ 18.487204] __kasan_slab_free+0x6c/0x98 [ 18.487259] kfree+0x214/0x3c8 [ 18.487387] ksize_uaf+0x11c/0x5f8 [ 18.487451] kunit_try_run_case+0x170/0x3f0 [ 18.487587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.487678] kthread+0x328/0x630 [ 18.487822] ret_from_fork+0x10/0x20 [ 18.487890] [ 18.487912] The buggy address belongs to the object at fff00000c65b1600 [ 18.487912] which belongs to the cache kmalloc-128 of size 128 [ 18.487970] The buggy address is located 0 bytes inside of [ 18.487970] freed 128-byte region [fff00000c65b1600, fff00000c65b1680) [ 18.488049] [ 18.488071] The buggy address belongs to the physical page: [ 18.488102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.488156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.488390] page_type: f5(slab) [ 18.488503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.488582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.488709] page dumped because: kasan: bad access detected [ 18.488829] [ 18.488933] Memory state around the buggy address: [ 18.489072] fff00000c65b1500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.489134] fff00000c65b1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489288] >fff00000c65b1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.489541] ^ [ 18.489634] fff00000c65b1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489789] fff00000c65b1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.489891] ==================================================================
[ 15.218315] ================================================================== [ 15.219010] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 15.219597] Read of size 1 at addr ffff8881033dc200 by task kunit_try_catch/213 [ 15.219932] [ 15.220228] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.220334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.220362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.220408] Call Trace: [ 15.220445] <TASK> [ 15.220505] dump_stack_lvl+0x73/0xb0 [ 15.220592] print_report+0xd1/0x650 [ 15.220641] ? __virt_addr_valid+0x1db/0x2d0 [ 15.220693] ? ksize_uaf+0x5fe/0x6c0 [ 15.220749] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.220816] ? ksize_uaf+0x5fe/0x6c0 [ 15.220863] kasan_report+0x141/0x180 [ 15.220914] ? ksize_uaf+0x5fe/0x6c0 [ 15.220978] __asan_report_load1_noabort+0x18/0x20 [ 15.221041] ksize_uaf+0x5fe/0x6c0 [ 15.221092] ? __pfx_ksize_uaf+0x10/0x10 [ 15.221132] ? __schedule+0x10cc/0x2b60 [ 15.221175] ? __pfx_read_tsc+0x10/0x10 [ 15.221255] ? ktime_get_ts64+0x86/0x230 [ 15.221309] kunit_try_run_case+0x1a5/0x480 [ 15.221360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.221403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.221451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.221520] ? __kthread_parkme+0x82/0x180 [ 15.221581] ? preempt_count_sub+0x50/0x80 [ 15.221638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.221687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.221742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.221779] kthread+0x337/0x6f0 [ 15.221802] ? trace_preempt_on+0x20/0xc0 [ 15.221828] ? __pfx_kthread+0x10/0x10 [ 15.221851] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.221875] ? calculate_sigpending+0x7b/0xa0 [ 15.221903] ? __pfx_kthread+0x10/0x10 [ 15.221927] ret_from_fork+0x116/0x1d0 [ 15.221947] ? __pfx_kthread+0x10/0x10 [ 15.221969] ret_from_fork_asm+0x1a/0x30 [ 15.222003] </TASK> [ 15.222017] [ 15.232708] Allocated by task 213: [ 15.233049] kasan_save_stack+0x45/0x70 [ 15.233397] kasan_save_track+0x18/0x40 [ 15.233597] kasan_save_alloc_info+0x3b/0x50 [ 15.233978] __kasan_kmalloc+0xb7/0xc0 [ 15.234285] __kmalloc_cache_noprof+0x189/0x420 [ 15.234531] ksize_uaf+0xaa/0x6c0 [ 15.234805] kunit_try_run_case+0x1a5/0x480 [ 15.235056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.235520] kthread+0x337/0x6f0 [ 15.235722] ret_from_fork+0x116/0x1d0 [ 15.235915] ret_from_fork_asm+0x1a/0x30 [ 15.236213] [ 15.236417] Freed by task 213: [ 15.236693] kasan_save_stack+0x45/0x70 [ 15.236951] kasan_save_track+0x18/0x40 [ 15.237233] kasan_save_free_info+0x3f/0x60 [ 15.237626] __kasan_slab_free+0x56/0x70 [ 15.237841] kfree+0x222/0x3f0 [ 15.238085] ksize_uaf+0x12c/0x6c0 [ 15.238448] kunit_try_run_case+0x1a5/0x480 [ 15.238755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.239030] kthread+0x337/0x6f0 [ 15.239204] ret_from_fork+0x116/0x1d0 [ 15.239406] ret_from_fork_asm+0x1a/0x30 [ 15.239771] [ 15.239940] The buggy address belongs to the object at ffff8881033dc200 [ 15.239940] which belongs to the cache kmalloc-128 of size 128 [ 15.241087] The buggy address is located 0 bytes inside of [ 15.241087] freed 128-byte region [ffff8881033dc200, ffff8881033dc280) [ 15.241701] [ 15.241877] The buggy address belongs to the physical page: [ 15.242202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.242603] flags: 0x200000000000000(node=0|zone=2) [ 15.242841] page_type: f5(slab) [ 15.243032] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.243578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.244098] page dumped because: kasan: bad access detected [ 15.244433] [ 15.244580] Memory state around the buggy address: [ 15.244788] ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.245061] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.245577] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.246074] ^ [ 15.246423] ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246781] ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.247154] ================================================================== [ 15.248769] ================================================================== [ 15.249182] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 15.251163] Read of size 1 at addr ffff8881033dc278 by task kunit_try_catch/213 [ 15.251622] [ 15.251855] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.251958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.251986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.252028] Call Trace: [ 15.252069] <TASK> [ 15.252110] dump_stack_lvl+0x73/0xb0 [ 15.252192] print_report+0xd1/0x650 [ 15.252245] ? __virt_addr_valid+0x1db/0x2d0 [ 15.252313] ? ksize_uaf+0x5e4/0x6c0 [ 15.252357] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.252404] ? ksize_uaf+0x5e4/0x6c0 [ 15.252444] kasan_report+0x141/0x180 [ 15.252505] ? ksize_uaf+0x5e4/0x6c0 [ 15.252558] __asan_report_load1_noabort+0x18/0x20 [ 15.252601] ksize_uaf+0x5e4/0x6c0 [ 15.252641] ? __pfx_ksize_uaf+0x10/0x10 [ 15.252684] ? __schedule+0x10cc/0x2b60 [ 15.252735] ? __pfx_read_tsc+0x10/0x10 [ 15.252780] ? ktime_get_ts64+0x86/0x230 [ 15.252830] kunit_try_run_case+0x1a5/0x480 [ 15.252879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.252922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.252971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.253017] ? __kthread_parkme+0x82/0x180 [ 15.253058] ? preempt_count_sub+0x50/0x80 [ 15.253111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.253150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.253194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.253276] kthread+0x337/0x6f0 [ 15.253311] ? trace_preempt_on+0x20/0xc0 [ 15.253351] ? __pfx_kthread+0x10/0x10 [ 15.253392] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.253437] ? calculate_sigpending+0x7b/0xa0 [ 15.253495] ? __pfx_kthread+0x10/0x10 [ 15.253533] ret_from_fork+0x116/0x1d0 [ 15.253570] ? __pfx_kthread+0x10/0x10 [ 15.253612] ret_from_fork_asm+0x1a/0x30 [ 15.253678] </TASK> [ 15.253701] [ 15.266605] Allocated by task 213: [ 15.266852] kasan_save_stack+0x45/0x70 [ 15.267125] kasan_save_track+0x18/0x40 [ 15.267959] kasan_save_alloc_info+0x3b/0x50 [ 15.268282] __kasan_kmalloc+0xb7/0xc0 [ 15.268886] __kmalloc_cache_noprof+0x189/0x420 [ 15.269150] ksize_uaf+0xaa/0x6c0 [ 15.269328] kunit_try_run_case+0x1a5/0x480 [ 15.269995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.270240] kthread+0x337/0x6f0 [ 15.270518] ret_from_fork+0x116/0x1d0 [ 15.270711] ret_from_fork_asm+0x1a/0x30 [ 15.271765] [ 15.271926] Freed by task 213: [ 15.272196] kasan_save_stack+0x45/0x70 [ 15.272382] kasan_save_track+0x18/0x40 [ 15.272990] kasan_save_free_info+0x3f/0x60 [ 15.273175] __kasan_slab_free+0x56/0x70 [ 15.273344] kfree+0x222/0x3f0 [ 15.273703] ksize_uaf+0x12c/0x6c0 [ 15.274017] kunit_try_run_case+0x1a5/0x480 [ 15.274282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.274927] kthread+0x337/0x6f0 [ 15.275183] ret_from_fork+0x116/0x1d0 [ 15.277079] ret_from_fork_asm+0x1a/0x30 [ 15.277289] [ 15.277397] The buggy address belongs to the object at ffff8881033dc200 [ 15.277397] which belongs to the cache kmalloc-128 of size 128 [ 15.278970] The buggy address is located 120 bytes inside of [ 15.278970] freed 128-byte region [ffff8881033dc200, ffff8881033dc280) [ 15.279790] [ 15.279921] The buggy address belongs to the physical page: [ 15.280129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.280405] flags: 0x200000000000000(node=0|zone=2) [ 15.280608] page_type: f5(slab) [ 15.280776] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.282620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.283121] page dumped because: kasan: bad access detected [ 15.284155] [ 15.284329] Memory state around the buggy address: [ 15.284614] ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.284878] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.285169] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.285525] ^ [ 15.286693] ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.287157] ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288002] ================================================================== [ 15.183372] ================================================================== [ 15.184673] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 15.185361] Read of size 1 at addr ffff8881033dc200 by task kunit_try_catch/213 [ 15.185653] [ 15.185815] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 15.185920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.185944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.185970] Call Trace: [ 15.185986] <TASK> [ 15.186010] dump_stack_lvl+0x73/0xb0 [ 15.186049] print_report+0xd1/0x650 [ 15.186081] ? __virt_addr_valid+0x1db/0x2d0 [ 15.186122] ? ksize_uaf+0x19d/0x6c0 [ 15.186146] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.186170] ? ksize_uaf+0x19d/0x6c0 [ 15.186196] kasan_report+0x141/0x180 [ 15.186282] ? ksize_uaf+0x19d/0x6c0 [ 15.186325] ? ksize_uaf+0x19d/0x6c0 [ 15.186385] __kasan_check_byte+0x3d/0x50 [ 15.186449] ksize+0x20/0x60 [ 15.186518] ksize_uaf+0x19d/0x6c0 [ 15.186584] ? __pfx_ksize_uaf+0x10/0x10 [ 15.186655] ? __schedule+0x10cc/0x2b60 [ 15.186728] ? __pfx_read_tsc+0x10/0x10 [ 15.186796] ? ktime_get_ts64+0x86/0x230 [ 15.186866] kunit_try_run_case+0x1a5/0x480 [ 15.186897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.186919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.186947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.186974] ? __kthread_parkme+0x82/0x180 [ 15.186998] ? preempt_count_sub+0x50/0x80 [ 15.187024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.187074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.187101] kthread+0x337/0x6f0 [ 15.187122] ? trace_preempt_on+0x20/0xc0 [ 15.187149] ? __pfx_kthread+0x10/0x10 [ 15.187172] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.187200] ? calculate_sigpending+0x7b/0xa0 [ 15.187264] ? __pfx_kthread+0x10/0x10 [ 15.187288] ret_from_fork+0x116/0x1d0 [ 15.187310] ? __pfx_kthread+0x10/0x10 [ 15.187333] ret_from_fork_asm+0x1a/0x30 [ 15.187380] </TASK> [ 15.187393] [ 15.199404] Allocated by task 213: [ 15.199773] kasan_save_stack+0x45/0x70 [ 15.200177] kasan_save_track+0x18/0x40 [ 15.200660] kasan_save_alloc_info+0x3b/0x50 [ 15.201126] __kasan_kmalloc+0xb7/0xc0 [ 15.201577] __kmalloc_cache_noprof+0x189/0x420 [ 15.201920] ksize_uaf+0xaa/0x6c0 [ 15.202282] kunit_try_run_case+0x1a5/0x480 [ 15.202655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.202976] kthread+0x337/0x6f0 [ 15.203308] ret_from_fork+0x116/0x1d0 [ 15.203693] ret_from_fork_asm+0x1a/0x30 [ 15.204045] [ 15.204286] Freed by task 213: [ 15.204489] kasan_save_stack+0x45/0x70 [ 15.204867] kasan_save_track+0x18/0x40 [ 15.205184] kasan_save_free_info+0x3f/0x60 [ 15.205592] __kasan_slab_free+0x56/0x70 [ 15.205848] kfree+0x222/0x3f0 [ 15.206151] ksize_uaf+0x12c/0x6c0 [ 15.206428] kunit_try_run_case+0x1a5/0x480 [ 15.206682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.207133] kthread+0x337/0x6f0 [ 15.207434] ret_from_fork+0x116/0x1d0 [ 15.207763] ret_from_fork_asm+0x1a/0x30 [ 15.208120] [ 15.208301] The buggy address belongs to the object at ffff8881033dc200 [ 15.208301] which belongs to the cache kmalloc-128 of size 128 [ 15.208937] The buggy address is located 0 bytes inside of [ 15.208937] freed 128-byte region [ffff8881033dc200, ffff8881033dc280) [ 15.209865] [ 15.210057] The buggy address belongs to the physical page: [ 15.210504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033dc [ 15.211056] flags: 0x200000000000000(node=0|zone=2) [ 15.211410] page_type: f5(slab) [ 15.211610] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.212087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.212725] page dumped because: kasan: bad access detected [ 15.212963] [ 15.213177] Memory state around the buggy address: [ 15.213598] ffff8881033dc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.214092] ffff8881033dc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214614] >ffff8881033dc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.215059] ^ [ 15.215292] ffff8881033dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.215882] ffff8881033dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.216285] ==================================================================