Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.318961] ================================================================== [ 19.319612] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 19.320298] Read of size 1 at addr fff00000c65b6100 by task kunit_try_catch/186 [ 19.321027] [ 19.321387] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 19.321645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.321719] Hardware name: linux,dummy-virt (DT) [ 19.321800] Call trace: [ 19.321856] show_stack+0x20/0x38 (C) [ 19.322020] dump_stack_lvl+0x8c/0xd0 [ 19.322924] print_report+0x118/0x608 [ 19.323002] kasan_report+0xdc/0x128 [ 19.323052] __kasan_check_byte+0x54/0x70 [ 19.323101] ksize+0x30/0x88 [ 19.323176] ksize_uaf+0x168/0x600 [ 19.323237] kunit_try_run_case+0x170/0x3f0 [ 19.323293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.323351] kthread+0x318/0x620 [ 19.323401] ret_from_fork+0x10/0x20 [ 19.323457] [ 19.329404] Allocated by task 186: [ 19.329709] kasan_save_stack+0x3c/0x68 [ 19.330423] kasan_save_track+0x20/0x40 [ 19.330744] kasan_save_alloc_info+0x40/0x58 [ 19.331031] __kasan_kmalloc+0xd4/0xd8 [ 19.331318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.332939] ksize_uaf+0xb8/0x600 [ 19.333372] kunit_try_run_case+0x170/0x3f0 [ 19.333742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.334905] kthread+0x318/0x620 [ 19.335251] ret_from_fork+0x10/0x20 [ 19.335445] [ 19.335550] Freed by task 186: [ 19.335681] kasan_save_stack+0x3c/0x68 [ 19.335847] kasan_save_track+0x20/0x40 [ 19.336002] kasan_save_free_info+0x4c/0x78 [ 19.336188] __kasan_slab_free+0x6c/0x98 [ 19.336539] kfree+0x214/0x3c8 [ 19.336927] ksize_uaf+0x11c/0x600 [ 19.337440] kunit_try_run_case+0x170/0x3f0 [ 19.337852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.338510] kthread+0x318/0x620 [ 19.339186] ret_from_fork+0x10/0x20 [ 19.339661] [ 19.339895] The buggy address belongs to the object at fff00000c65b6100 [ 19.339895] which belongs to the cache kmalloc-128 of size 128 [ 19.340869] The buggy address is located 0 bytes inside of [ 19.340869] freed 128-byte region [fff00000c65b6100, fff00000c65b6180) [ 19.342837] [ 19.343060] The buggy address belongs to the physical page: [ 19.343939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6 [ 19.344641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.345227] page_type: f5(slab) [ 19.345594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.346353] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.347070] page dumped because: kasan: bad access detected [ 19.347842] [ 19.348005] Memory state around the buggy address: [ 19.348278] fff00000c65b6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.348628] fff00000c65b6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.348966] >fff00000c65b6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.349940] ^ [ 19.350755] fff00000c65b6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.351400] fff00000c65b6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.351905] ================================================================== [ 19.353900] ================================================================== [ 19.354556] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 19.354966] Read of size 1 at addr fff00000c65b6100 by task kunit_try_catch/186 [ 19.355442] [ 19.356452] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 19.356686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.356724] Hardware name: linux,dummy-virt (DT) [ 19.356764] Call trace: [ 19.356794] show_stack+0x20/0x38 (C) [ 19.356864] dump_stack_lvl+0x8c/0xd0 [ 19.356922] print_report+0x118/0x608 [ 19.356978] kasan_report+0xdc/0x128 [ 19.357030] __asan_report_load1_noabort+0x20/0x30 [ 19.357085] ksize_uaf+0x59c/0x600 [ 19.357132] kunit_try_run_case+0x170/0x3f0 [ 19.357215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.357274] kthread+0x318/0x620 [ 19.357324] ret_from_fork+0x10/0x20 [ 19.357380] [ 19.362889] Allocated by task 186: [ 19.363622] kasan_save_stack+0x3c/0x68 [ 19.364095] kasan_save_track+0x20/0x40 [ 19.364468] kasan_save_alloc_info+0x40/0x58 [ 19.364853] __kasan_kmalloc+0xd4/0xd8 [ 19.365660] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.366081] ksize_uaf+0xb8/0x600 [ 19.366710] kunit_try_run_case+0x170/0x3f0 [ 19.367330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.368023] kthread+0x318/0x620 [ 19.368440] ret_from_fork+0x10/0x20 [ 19.368969] [ 19.369227] Freed by task 186: [ 19.369535] kasan_save_stack+0x3c/0x68 [ 19.369885] kasan_save_track+0x20/0x40 [ 19.370650] kasan_save_free_info+0x4c/0x78 [ 19.370980] __kasan_slab_free+0x6c/0x98 [ 19.371364] kfree+0x214/0x3c8 [ 19.371810] ksize_uaf+0x11c/0x600 [ 19.372323] kunit_try_run_case+0x170/0x3f0 [ 19.372845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.373660] kthread+0x318/0x620 [ 19.374590] ret_from_fork+0x10/0x20 [ 19.374924] [ 19.375181] The buggy address belongs to the object at fff00000c65b6100 [ 19.375181] which belongs to the cache kmalloc-128 of size 128 [ 19.376187] The buggy address is located 0 bytes inside of [ 19.376187] freed 128-byte region [fff00000c65b6100, fff00000c65b6180) [ 19.377107] [ 19.377360] The buggy address belongs to the physical page: [ 19.377814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6 [ 19.379227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.379871] page_type: f5(slab) [ 19.380284] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.380984] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.381618] page dumped because: kasan: bad access detected [ 19.382106] [ 19.382391] Memory state around the buggy address: [ 19.382805] fff00000c65b6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.383716] fff00000c65b6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.384328] >fff00000c65b6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.384932] ^ [ 19.385332] fff00000c65b6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.386015] fff00000c65b6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.386673] ================================================================== [ 19.388558] ================================================================== [ 19.389556] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 19.389978] Read of size 1 at addr fff00000c65b6178 by task kunit_try_catch/186 [ 19.391388] [ 19.391714] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 19.391892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.391954] Hardware name: linux,dummy-virt (DT) [ 19.392014] Call trace: [ 19.392061] show_stack+0x20/0x38 (C) [ 19.392172] dump_stack_lvl+0x8c/0xd0 [ 19.392476] print_report+0x118/0x608 [ 19.392541] kasan_report+0xdc/0x128 [ 19.392591] __asan_report_load1_noabort+0x20/0x30 [ 19.392643] ksize_uaf+0x548/0x600 [ 19.392688] kunit_try_run_case+0x170/0x3f0 [ 19.392740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.392794] kthread+0x318/0x620 [ 19.392840] ret_from_fork+0x10/0x20 [ 19.392892] [ 19.397908] Allocated by task 186: [ 19.399270] kasan_save_stack+0x3c/0x68 [ 19.399929] kasan_save_track+0x20/0x40 [ 19.400334] kasan_save_alloc_info+0x40/0x58 [ 19.400854] __kasan_kmalloc+0xd4/0xd8 [ 19.401328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.401731] ksize_uaf+0xb8/0x600 [ 19.402059] kunit_try_run_case+0x170/0x3f0 [ 19.402924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.403589] kthread+0x318/0x620 [ 19.403912] ret_from_fork+0x10/0x20 [ 19.404215] [ 19.404426] Freed by task 186: [ 19.404739] kasan_save_stack+0x3c/0x68 [ 19.405065] kasan_save_track+0x20/0x40 [ 19.405933] kasan_save_free_info+0x4c/0x78 [ 19.406610] __kasan_slab_free+0x6c/0x98 [ 19.407350] kfree+0x214/0x3c8 [ 19.407729] ksize_uaf+0x11c/0x600 [ 19.407978] kunit_try_run_case+0x170/0x3f0 [ 19.408427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.408842] kthread+0x318/0x620 [ 19.409121] ret_from_fork+0x10/0x20 [ 19.409998] [ 19.410709] The buggy address belongs to the object at fff00000c65b6100 [ 19.410709] which belongs to the cache kmalloc-128 of size 128 [ 19.411464] The buggy address is located 120 bytes inside of [ 19.411464] freed 128-byte region [fff00000c65b6100, fff00000c65b6180) [ 19.412169] [ 19.412366] The buggy address belongs to the physical page: [ 19.412757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b6 [ 19.413337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.413944] page_type: f5(slab) [ 19.414955] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.415526] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.416516] page dumped because: kasan: bad access detected [ 19.417026] [ 19.417364] Memory state around the buggy address: [ 19.417836] fff00000c65b6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.418944] fff00000c65b6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.419595] >fff00000c65b6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.420170] ^ [ 19.420756] fff00000c65b6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.421363] fff00000c65b6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.421978] ==================================================================
[ 13.161301] ================================================================== [ 13.162128] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0 [ 13.162649] Read of size 1 at addr ffff888101bd1c00 by task kunit_try_catch/204 [ 13.163316] [ 13.163424] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 13.163592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.163606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.163625] Call Trace: [ 13.163637] <TASK> [ 13.163653] dump_stack_lvl+0x73/0xb0 [ 13.163681] print_report+0xd1/0x650 [ 13.163702] ? __virt_addr_valid+0x1db/0x2d0 [ 13.163724] ? ksize_uaf+0x19e/0x6c0 [ 13.163755] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.163779] ? ksize_uaf+0x19e/0x6c0 [ 13.163798] kasan_report+0x140/0x180 [ 13.163879] ? ksize_uaf+0x19e/0x6c0 [ 13.163906] ? ksize_uaf+0x19e/0x6c0 [ 13.163927] __kasan_check_byte+0x3d/0x50 [ 13.163948] ksize+0x20/0x60 [ 13.163968] ksize_uaf+0x19e/0x6c0 [ 13.163987] ? __pfx_ksize_uaf+0x10/0x10 [ 13.164008] ? __schedule+0xce8/0x2840 [ 13.164043] ? __pfx_read_tsc+0x10/0x10 [ 13.164063] ? ktime_get_ts64+0x86/0x230 [ 13.164098] kunit_try_run_case+0x1a6/0x480 [ 13.164121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.164142] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.164175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.164198] ? __kthread_parkme+0x82/0x160 [ 13.164219] ? preempt_count_sub+0x50/0x80 [ 13.164243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.164274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.164299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.164324] kthread+0x324/0x6e0 [ 13.164355] ? trace_preempt_on+0x20/0xc0 [ 13.164377] ? __pfx_kthread+0x10/0x10 [ 13.164399] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.164420] ? calculate_sigpending+0x7b/0xa0 [ 13.164441] ? __pfx_kthread+0x10/0x10 [ 13.164463] ret_from_fork+0x41/0x80 [ 13.164481] ? __pfx_kthread+0x10/0x10 [ 13.164502] ret_from_fork_asm+0x1a/0x30 [ 13.164532] </TASK> [ 13.164543] [ 13.172255] Allocated by task 204: [ 13.172398] kasan_save_stack+0x45/0x70 [ 13.172621] kasan_save_track+0x18/0x40 [ 13.172812] kasan_save_alloc_info+0x3b/0x50 [ 13.173026] __kasan_kmalloc+0xb7/0xc0 [ 13.173209] __kmalloc_cache_noprof+0x18a/0x420 [ 13.173399] ksize_uaf+0xab/0x6c0 [ 13.173520] kunit_try_run_case+0x1a6/0x480 [ 13.174124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.174445] kthread+0x324/0x6e0 [ 13.174701] ret_from_fork+0x41/0x80 [ 13.174835] ret_from_fork_asm+0x1a/0x30 [ 13.174969] [ 13.175078] Freed by task 204: [ 13.175229] kasan_save_stack+0x45/0x70 [ 13.175417] kasan_save_track+0x18/0x40 [ 13.175595] kasan_save_free_info+0x3f/0x60 [ 13.175749] __kasan_slab_free+0x56/0x70 [ 13.175880] kfree+0x224/0x3f0 [ 13.176052] ksize_uaf+0x12d/0x6c0 [ 13.176228] kunit_try_run_case+0x1a6/0x480 [ 13.176538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.176877] kthread+0x324/0x6e0 [ 13.177069] ret_from_fork+0x41/0x80 [ 13.177194] ret_from_fork_asm+0x1a/0x30 [ 13.177374] [ 13.177469] The buggy address belongs to the object at ffff888101bd1c00 [ 13.177469] which belongs to the cache kmalloc-128 of size 128 [ 13.178253] The buggy address is located 0 bytes inside of [ 13.178253] freed 128-byte region [ffff888101bd1c00, ffff888101bd1c80) [ 13.178950] [ 13.179079] The buggy address belongs to the physical page: [ 13.179292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 13.179632] flags: 0x200000000000000(node=0|zone=2) [ 13.179884] page_type: f5(slab) [ 13.180004] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.180271] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.180607] page dumped because: kasan: bad access detected [ 13.180848] [ 13.181066] Memory state around the buggy address: [ 13.181298] ffff888101bd1b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.181780] ffff888101bd1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.182127] >ffff888101bd1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.182387] ^ [ 13.182512] ffff888101bd1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.182870] ffff888101bd1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.183277] ================================================================== [ 13.183998] ================================================================== [ 13.184346] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0 [ 13.184672] Read of size 1 at addr ffff888101bd1c00 by task kunit_try_catch/204 [ 13.185031] [ 13.185153] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 13.185190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.185212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.185232] Call Trace: [ 13.185243] <TASK> [ 13.185256] dump_stack_lvl+0x73/0xb0 [ 13.185279] print_report+0xd1/0x650 [ 13.185299] ? __virt_addr_valid+0x1db/0x2d0 [ 13.185321] ? ksize_uaf+0x600/0x6c0 [ 13.185340] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.185364] ? ksize_uaf+0x600/0x6c0 [ 13.185384] kasan_report+0x140/0x180 [ 13.185405] ? ksize_uaf+0x600/0x6c0 [ 13.185429] __asan_report_load1_noabort+0x18/0x20 [ 13.185451] ksize_uaf+0x600/0x6c0 [ 13.185480] ? __pfx_ksize_uaf+0x10/0x10 [ 13.185501] ? __schedule+0xce8/0x2840 [ 13.185522] ? __pfx_read_tsc+0x10/0x10 [ 13.185554] ? ktime_get_ts64+0x86/0x230 [ 13.185578] kunit_try_run_case+0x1a6/0x480 [ 13.185601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.185621] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.185644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.185666] ? __kthread_parkme+0x82/0x160 [ 13.185688] ? preempt_count_sub+0x50/0x80 [ 13.185711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.185738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.185763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.185788] kthread+0x324/0x6e0 [ 13.185974] ? trace_preempt_on+0x20/0xc0 [ 13.185999] ? __pfx_kthread+0x10/0x10 [ 13.186040] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.186064] ? calculate_sigpending+0x7b/0xa0 [ 13.186085] ? __pfx_kthread+0x10/0x10 [ 13.186108] ret_from_fork+0x41/0x80 [ 13.186126] ? __pfx_kthread+0x10/0x10 [ 13.186147] ret_from_fork_asm+0x1a/0x30 [ 13.186177] </TASK> [ 13.186187] [ 13.193555] Allocated by task 204: [ 13.193853] kasan_save_stack+0x45/0x70 [ 13.194147] kasan_save_track+0x18/0x40 [ 13.194351] kasan_save_alloc_info+0x3b/0x50 [ 13.194567] __kasan_kmalloc+0xb7/0xc0 [ 13.194875] __kmalloc_cache_noprof+0x18a/0x420 [ 13.195123] ksize_uaf+0xab/0x6c0 [ 13.195292] kunit_try_run_case+0x1a6/0x480 [ 13.195467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.195838] kthread+0x324/0x6e0 [ 13.196049] ret_from_fork+0x41/0x80 [ 13.196219] ret_from_fork_asm+0x1a/0x30 [ 13.196406] [ 13.196508] Freed by task 204: [ 13.196731] kasan_save_stack+0x45/0x70 [ 13.196946] kasan_save_track+0x18/0x40 [ 13.197139] kasan_save_free_info+0x3f/0x60 [ 13.197325] __kasan_slab_free+0x56/0x70 [ 13.197495] kfree+0x224/0x3f0 [ 13.198062] ksize_uaf+0x12d/0x6c0 [ 13.198211] kunit_try_run_case+0x1a6/0x480 [ 13.198359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.198538] kthread+0x324/0x6e0 [ 13.198661] ret_from_fork+0x41/0x80 [ 13.198798] ret_from_fork_asm+0x1a/0x30 [ 13.199041] [ 13.199136] The buggy address belongs to the object at ffff888101bd1c00 [ 13.199136] which belongs to the cache kmalloc-128 of size 128 [ 13.199855] The buggy address is located 0 bytes inside of [ 13.199855] freed 128-byte region [ffff888101bd1c00, ffff888101bd1c80) [ 13.200394] [ 13.200491] The buggy address belongs to the physical page: [ 13.200794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 13.201132] flags: 0x200000000000000(node=0|zone=2) [ 13.201408] page_type: f5(slab) [ 13.201814] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.202214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.202523] page dumped because: kasan: bad access detected [ 13.202923] [ 13.203006] Memory state around the buggy address: [ 13.203165] ffff888101bd1b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.203370] ffff888101bd1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.203705] >ffff888101bd1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.204133] ^ [ 13.204319] ffff888101bd1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.204820] ffff888101bd1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.205139] ================================================================== [ 13.205512] ================================================================== [ 13.205843] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0 [ 13.206276] Read of size 1 at addr ffff888101bd1c78 by task kunit_try_catch/204 [ 13.206496] [ 13.206575] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 13.206613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.206624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.206643] Call Trace: [ 13.206658] <TASK> [ 13.206672] dump_stack_lvl+0x73/0xb0 [ 13.206865] print_report+0xd1/0x650 [ 13.206888] ? __virt_addr_valid+0x1db/0x2d0 [ 13.206909] ? ksize_uaf+0x5e6/0x6c0 [ 13.206928] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.206952] ? ksize_uaf+0x5e6/0x6c0 [ 13.206972] kasan_report+0x140/0x180 [ 13.206993] ? ksize_uaf+0x5e6/0x6c0 [ 13.207028] __asan_report_load1_noabort+0x18/0x20 [ 13.207051] ksize_uaf+0x5e6/0x6c0 [ 13.207070] ? __pfx_ksize_uaf+0x10/0x10 [ 13.207090] ? __schedule+0xce8/0x2840 [ 13.207112] ? __pfx_read_tsc+0x10/0x10 [ 13.207133] ? ktime_get_ts64+0x86/0x230 [ 13.207156] kunit_try_run_case+0x1a6/0x480 [ 13.207179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.207199] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.207222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.207244] ? __kthread_parkme+0x82/0x160 [ 13.207266] ? preempt_count_sub+0x50/0x80 [ 13.207289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.207311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.207336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.207371] kthread+0x324/0x6e0 [ 13.207391] ? trace_preempt_on+0x20/0xc0 [ 13.207414] ? __pfx_kthread+0x10/0x10 [ 13.207446] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.207467] ? calculate_sigpending+0x7b/0xa0 [ 13.207497] ? __pfx_kthread+0x10/0x10 [ 13.207520] ret_from_fork+0x41/0x80 [ 13.207538] ? __pfx_kthread+0x10/0x10 [ 13.207569] ret_from_fork_asm+0x1a/0x30 [ 13.207599] </TASK> [ 13.207609] [ 13.215160] Allocated by task 204: [ 13.215320] kasan_save_stack+0x45/0x70 [ 13.215463] kasan_save_track+0x18/0x40 [ 13.215597] kasan_save_alloc_info+0x3b/0x50 [ 13.215805] __kasan_kmalloc+0xb7/0xc0 [ 13.216000] __kmalloc_cache_noprof+0x18a/0x420 [ 13.216237] ksize_uaf+0xab/0x6c0 [ 13.216418] kunit_try_run_case+0x1a6/0x480 [ 13.216668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.216900] kthread+0x324/0x6e0 [ 13.217030] ret_from_fork+0x41/0x80 [ 13.217237] ret_from_fork_asm+0x1a/0x30 [ 13.217458] [ 13.217620] Freed by task 204: [ 13.217782] kasan_save_stack+0x45/0x70 [ 13.217929] kasan_save_track+0x18/0x40 [ 13.218095] kasan_save_free_info+0x3f/0x60 [ 13.218301] __kasan_slab_free+0x56/0x70 [ 13.218521] kfree+0x224/0x3f0 [ 13.218825] ksize_uaf+0x12d/0x6c0 [ 13.219085] kunit_try_run_case+0x1a6/0x480 [ 13.219261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.219523] kthread+0x324/0x6e0 [ 13.219778] ret_from_fork+0x41/0x80 [ 13.219999] ret_from_fork_asm+0x1a/0x30 [ 13.220219] [ 13.220289] The buggy address belongs to the object at ffff888101bd1c00 [ 13.220289] which belongs to the cache kmalloc-128 of size 128 [ 13.220636] The buggy address is located 120 bytes inside of [ 13.220636] freed 128-byte region [ffff888101bd1c00, ffff888101bd1c80) [ 13.221075] [ 13.221168] The buggy address belongs to the physical page: [ 13.221444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bd1 [ 13.221801] flags: 0x200000000000000(node=0|zone=2) [ 13.222042] page_type: f5(slab) [ 13.222353] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.222849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.223232] page dumped because: kasan: bad access detected [ 13.223407] [ 13.223502] Memory state around the buggy address: [ 13.223958] ffff888101bd1b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.224301] ffff888101bd1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.224596] >ffff888101bd1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.224953] ^ [ 13.225264] ffff888101bd1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.225562] ffff888101bd1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.226002] ==================================================================