Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.476908] ================================================================== [ 17.477248] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.477322] Read of size 1 at addr fff00000c6fb0a78 by task kunit_try_catch/198 [ 17.477474] [ 17.477534] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 17.477687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.477728] Hardware name: linux,dummy-virt (DT) [ 17.477763] Call trace: [ 17.477946] show_stack+0x20/0x38 (C) [ 17.478120] dump_stack_lvl+0x8c/0xd0 [ 17.478184] print_report+0x118/0x5d0 [ 17.478238] kasan_report+0xdc/0x128 [ 17.478290] __asan_report_load1_noabort+0x20/0x30 [ 17.478341] ksize_uaf+0x544/0x5f8 [ 17.478387] kunit_try_run_case+0x170/0x3f0 [ 17.478434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.478483] kthread+0x328/0x630 [ 17.478623] ret_from_fork+0x10/0x20 [ 17.478679] [ 17.478698] Allocated by task 198: [ 17.479773] kasan_save_stack+0x3c/0x68 [ 17.479845] kasan_save_track+0x20/0x40 [ 17.479937] kasan_save_alloc_info+0x40/0x58 [ 17.480049] __kasan_kmalloc+0xd4/0xd8 [ 17.480147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.480322] ksize_uaf+0xb8/0x5f8 [ 17.480487] kunit_try_run_case+0x170/0x3f0 [ 17.480876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.481268] kthread+0x328/0x630 [ 17.481372] ret_from_fork+0x10/0x20 [ 17.481504] [ 17.481695] Freed by task 198: [ 17.481813] kasan_save_stack+0x3c/0x68 [ 17.481932] kasan_save_track+0x20/0x40 [ 17.482085] kasan_save_free_info+0x4c/0x78 [ 17.482183] __kasan_slab_free+0x6c/0x98 [ 17.482274] kfree+0x214/0x3c8 [ 17.482363] ksize_uaf+0x11c/0x5f8 [ 17.482475] kunit_try_run_case+0x170/0x3f0 [ 17.482562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.482881] kthread+0x328/0x630 [ 17.483050] ret_from_fork+0x10/0x20 [ 17.483129] [ 17.483169] The buggy address belongs to the object at fff00000c6fb0a00 [ 17.483169] which belongs to the cache kmalloc-128 of size 128 [ 17.483376] The buggy address is located 120 bytes inside of [ 17.483376] freed 128-byte region [fff00000c6fb0a00, fff00000c6fb0a80) [ 17.483638] [ 17.483672] The buggy address belongs to the physical page: [ 17.483740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 17.483805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.483856] page_type: f5(slab) [ 17.483919] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.483970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.484011] page dumped because: kasan: bad access detected [ 17.484044] [ 17.484071] Memory state around the buggy address: [ 17.484100] fff00000c6fb0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.484152] fff00000c6fb0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.484204] >fff00000c6fb0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.484241] ^ [ 17.484301] fff00000c6fb0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.484343] fff00000c6fb0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.484381] ================================================================== [ 17.466517] ================================================================== [ 17.466843] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.467008] Read of size 1 at addr fff00000c6fb0a00 by task kunit_try_catch/198 [ 17.467162] [ 17.467201] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 17.467390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.467457] Hardware name: linux,dummy-virt (DT) [ 17.467514] Call trace: [ 17.467542] show_stack+0x20/0x38 (C) [ 17.467591] dump_stack_lvl+0x8c/0xd0 [ 17.468025] print_report+0x118/0x5d0 [ 17.468184] kasan_report+0xdc/0x128 [ 17.468273] __asan_report_load1_noabort+0x20/0x30 [ 17.468429] ksize_uaf+0x598/0x5f8 [ 17.468519] kunit_try_run_case+0x170/0x3f0 [ 17.468911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.469088] kthread+0x328/0x630 [ 17.469174] ret_from_fork+0x10/0x20 [ 17.469337] [ 17.469401] Allocated by task 198: [ 17.469484] kasan_save_stack+0x3c/0x68 [ 17.469547] kasan_save_track+0x20/0x40 [ 17.469582] kasan_save_alloc_info+0x40/0x58 [ 17.469803] __kasan_kmalloc+0xd4/0xd8 [ 17.470131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.470217] ksize_uaf+0xb8/0x5f8 [ 17.470370] kunit_try_run_case+0x170/0x3f0 [ 17.470452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.470783] kthread+0x328/0x630 [ 17.471002] ret_from_fork+0x10/0x20 [ 17.471091] [ 17.471140] Freed by task 198: [ 17.471256] kasan_save_stack+0x3c/0x68 [ 17.471326] kasan_save_track+0x20/0x40 [ 17.471544] kasan_save_free_info+0x4c/0x78 [ 17.471665] __kasan_slab_free+0x6c/0x98 [ 17.471951] kfree+0x214/0x3c8 [ 17.472263] ksize_uaf+0x11c/0x5f8 [ 17.472324] kunit_try_run_case+0x170/0x3f0 [ 17.472697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.472784] kthread+0x328/0x630 [ 17.472904] ret_from_fork+0x10/0x20 [ 17.472981] [ 17.473119] The buggy address belongs to the object at fff00000c6fb0a00 [ 17.473119] which belongs to the cache kmalloc-128 of size 128 [ 17.473207] The buggy address is located 0 bytes inside of [ 17.473207] freed 128-byte region [fff00000c6fb0a00, fff00000c6fb0a80) [ 17.473426] [ 17.473490] The buggy address belongs to the physical page: [ 17.473690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 17.473771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.473903] page_type: f5(slab) [ 17.473972] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.474085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.474129] page dumped because: kasan: bad access detected [ 17.474561] [ 17.474627] Memory state around the buggy address: [ 17.474753] fff00000c6fb0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.474846] fff00000c6fb0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.474967] >fff00000c6fb0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.475015] ^ [ 17.475042] fff00000c6fb0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.475344] fff00000c6fb0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.475526] ================================================================== [ 17.455288] ================================================================== [ 17.455495] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.455586] Read of size 1 at addr fff00000c6fb0a00 by task kunit_try_catch/198 [ 17.455916] [ 17.455984] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 17.456412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.456452] Hardware name: linux,dummy-virt (DT) [ 17.456510] Call trace: [ 17.456580] show_stack+0x20/0x38 (C) [ 17.456792] dump_stack_lvl+0x8c/0xd0 [ 17.457186] print_report+0x118/0x5d0 [ 17.457360] kasan_report+0xdc/0x128 [ 17.457415] __kasan_check_byte+0x54/0x70 [ 17.457676] ksize+0x30/0x88 [ 17.457906] ksize_uaf+0x168/0x5f8 [ 17.458005] kunit_try_run_case+0x170/0x3f0 [ 17.458404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.458550] kthread+0x328/0x630 [ 17.458639] ret_from_fork+0x10/0x20 [ 17.458965] [ 17.459041] Allocated by task 198: [ 17.459139] kasan_save_stack+0x3c/0x68 [ 17.459240] kasan_save_track+0x20/0x40 [ 17.459308] kasan_save_alloc_info+0x40/0x58 [ 17.459490] __kasan_kmalloc+0xd4/0xd8 [ 17.459646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.459857] ksize_uaf+0xb8/0x5f8 [ 17.459914] kunit_try_run_case+0x170/0x3f0 [ 17.460121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.460343] kthread+0x328/0x630 [ 17.460458] ret_from_fork+0x10/0x20 [ 17.460535] [ 17.460583] Freed by task 198: [ 17.460611] kasan_save_stack+0x3c/0x68 [ 17.460691] kasan_save_track+0x20/0x40 [ 17.460729] kasan_save_free_info+0x4c/0x78 [ 17.460766] __kasan_slab_free+0x6c/0x98 [ 17.460813] kfree+0x214/0x3c8 [ 17.460843] ksize_uaf+0x11c/0x5f8 [ 17.460888] kunit_try_run_case+0x170/0x3f0 [ 17.460926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.460968] kthread+0x328/0x630 [ 17.461003] ret_from_fork+0x10/0x20 [ 17.461052] [ 17.461072] The buggy address belongs to the object at fff00000c6fb0a00 [ 17.461072] which belongs to the cache kmalloc-128 of size 128 [ 17.461132] The buggy address is located 0 bytes inside of [ 17.461132] freed 128-byte region [fff00000c6fb0a00, fff00000c6fb0a80) [ 17.461193] [ 17.461220] The buggy address belongs to the physical page: [ 17.461250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106fb0 [ 17.461330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.461385] page_type: f5(slab) [ 17.461438] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.461497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.461548] page dumped because: kasan: bad access detected [ 17.461590] [ 17.461609] Memory state around the buggy address: [ 17.461642] fff00000c6fb0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.461696] fff00000c6fb0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.461746] >fff00000c6fb0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.461787] ^ [ 17.461814] fff00000c6fb0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.461863] fff00000c6fb0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.461901] ==================================================================
[ 11.605515] ================================================================== [ 11.606245] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 11.606533] Read of size 1 at addr ffff8881028ba200 by task kunit_try_catch/216 [ 11.606830] [ 11.606922] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 11.606967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.606978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.606999] Call Trace: [ 11.607011] <TASK> [ 11.607027] dump_stack_lvl+0x73/0xb0 [ 11.607055] print_report+0xd1/0x610 [ 11.607076] ? __virt_addr_valid+0x1db/0x2d0 [ 11.607099] ? ksize_uaf+0x5fe/0x6c0 [ 11.607119] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.607140] ? ksize_uaf+0x5fe/0x6c0 [ 11.607161] kasan_report+0x141/0x180 [ 11.607183] ? ksize_uaf+0x5fe/0x6c0 [ 11.607208] __asan_report_load1_noabort+0x18/0x20 [ 11.607239] ksize_uaf+0x5fe/0x6c0 [ 11.607259] ? __pfx_ksize_uaf+0x10/0x10 [ 11.607280] ? __schedule+0x10c6/0x2b60 [ 11.607304] ? __pfx_read_tsc+0x10/0x10 [ 11.607324] ? ktime_get_ts64+0x86/0x230 [ 11.607350] kunit_try_run_case+0x1a5/0x480 [ 11.607381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.607399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.607420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.607444] ? __kthread_parkme+0x82/0x180 [ 11.607465] ? preempt_count_sub+0x50/0x80 [ 11.607491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.607510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.607532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.607554] kthread+0x337/0x6f0 [ 11.607571] ? trace_preempt_on+0x20/0xc0 [ 11.607594] ? __pfx_kthread+0x10/0x10 [ 11.607611] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.607632] ? calculate_sigpending+0x7b/0xa0 [ 11.607654] ? __pfx_kthread+0x10/0x10 [ 11.607672] ret_from_fork+0x41/0x80 [ 11.607691] ? __pfx_kthread+0x10/0x10 [ 11.607708] ret_from_fork_asm+0x1a/0x30 [ 11.607738] </TASK> [ 11.607748] [ 11.614979] Allocated by task 216: [ 11.615113] kasan_save_stack+0x45/0x70 [ 11.615308] kasan_save_track+0x18/0x40 [ 11.615666] kasan_save_alloc_info+0x3b/0x50 [ 11.615873] __kasan_kmalloc+0xb7/0xc0 [ 11.616061] __kmalloc_cache_noprof+0x189/0x420 [ 11.616253] ksize_uaf+0xaa/0x6c0 [ 11.616436] kunit_try_run_case+0x1a5/0x480 [ 11.616610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.616836] kthread+0x337/0x6f0 [ 11.616990] ret_from_fork+0x41/0x80 [ 11.617169] ret_from_fork_asm+0x1a/0x30 [ 11.617341] [ 11.617433] Freed by task 216: [ 11.617614] kasan_save_stack+0x45/0x70 [ 11.617748] kasan_save_track+0x18/0x40 [ 11.617882] kasan_save_free_info+0x3f/0x60 [ 11.618021] __kasan_slab_free+0x56/0x70 [ 11.618155] kfree+0x222/0x3f0 [ 11.618321] ksize_uaf+0x12c/0x6c0 [ 11.618491] kunit_try_run_case+0x1a5/0x480 [ 11.618690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.619122] kthread+0x337/0x6f0 [ 11.619252] ret_from_fork+0x41/0x80 [ 11.619380] ret_from_fork_asm+0x1a/0x30 [ 11.619516] [ 11.619585] The buggy address belongs to the object at ffff8881028ba200 [ 11.619585] which belongs to the cache kmalloc-128 of size 128 [ 11.620107] The buggy address is located 0 bytes inside of [ 11.620107] freed 128-byte region [ffff8881028ba200, ffff8881028ba280) [ 11.620967] [ 11.621063] The buggy address belongs to the physical page: [ 11.621276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba [ 11.621624] flags: 0x200000000000000(node=0|zone=2) [ 11.621858] page_type: f5(slab) [ 11.622020] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.622329] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.622696] page dumped because: kasan: bad access detected [ 11.622919] [ 11.623011] Memory state around the buggy address: [ 11.623206] ffff8881028ba100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.623559] ffff8881028ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.623829] >ffff8881028ba200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.624105] ^ [ 11.624270] ffff8881028ba280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.624561] ffff8881028ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.624838] ================================================================== [ 11.572734] ================================================================== [ 11.573860] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 11.574082] Read of size 1 at addr ffff8881028ba200 by task kunit_try_catch/216 [ 11.575025] [ 11.575279] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 11.575329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.575463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.575488] Call Trace: [ 11.575501] <TASK> [ 11.575518] dump_stack_lvl+0x73/0xb0 [ 11.575558] print_report+0xd1/0x610 [ 11.575581] ? __virt_addr_valid+0x1db/0x2d0 [ 11.575607] ? ksize_uaf+0x19d/0x6c0 [ 11.575627] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.575649] ? ksize_uaf+0x19d/0x6c0 [ 11.575669] kasan_report+0x141/0x180 [ 11.575691] ? ksize_uaf+0x19d/0x6c0 [ 11.575715] ? ksize_uaf+0x19d/0x6c0 [ 11.575735] __kasan_check_byte+0x3d/0x50 [ 11.575756] ksize+0x20/0x60 [ 11.575779] ksize_uaf+0x19d/0x6c0 [ 11.575799] ? __pfx_ksize_uaf+0x10/0x10 [ 11.575820] ? __schedule+0x10c6/0x2b60 [ 11.575843] ? __pfx_read_tsc+0x10/0x10 [ 11.575862] ? ktime_get_ts64+0x86/0x230 [ 11.575886] kunit_try_run_case+0x1a5/0x480 [ 11.575906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.575924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.575944] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.575967] ? __kthread_parkme+0x82/0x180 [ 11.575988] ? preempt_count_sub+0x50/0x80 [ 11.576011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.576031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.576053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.576075] kthread+0x337/0x6f0 [ 11.576091] ? trace_preempt_on+0x20/0xc0 [ 11.576113] ? __pfx_kthread+0x10/0x10 [ 11.576130] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.576151] ? calculate_sigpending+0x7b/0xa0 [ 11.576172] ? __pfx_kthread+0x10/0x10 [ 11.576190] ret_from_fork+0x41/0x80 [ 11.576209] ? __pfx_kthread+0x10/0x10 [ 11.576275] ret_from_fork_asm+0x1a/0x30 [ 11.576318] </TASK> [ 11.576329] [ 11.589106] Allocated by task 216: [ 11.589340] kasan_save_stack+0x45/0x70 [ 11.589723] kasan_save_track+0x18/0x40 [ 11.590099] kasan_save_alloc_info+0x3b/0x50 [ 11.590520] __kasan_kmalloc+0xb7/0xc0 [ 11.590872] __kmalloc_cache_noprof+0x189/0x420 [ 11.591189] ksize_uaf+0xaa/0x6c0 [ 11.591504] kunit_try_run_case+0x1a5/0x480 [ 11.591771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.592168] kthread+0x337/0x6f0 [ 11.592295] ret_from_fork+0x41/0x80 [ 11.592499] ret_from_fork_asm+0x1a/0x30 [ 11.592885] [ 11.593059] Freed by task 216: [ 11.593369] kasan_save_stack+0x45/0x70 [ 11.593754] kasan_save_track+0x18/0x40 [ 11.594122] kasan_save_free_info+0x3f/0x60 [ 11.594535] __kasan_slab_free+0x56/0x70 [ 11.594899] kfree+0x222/0x3f0 [ 11.595087] ksize_uaf+0x12c/0x6c0 [ 11.595433] kunit_try_run_case+0x1a5/0x480 [ 11.595794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.596151] kthread+0x337/0x6f0 [ 11.596463] ret_from_fork+0x41/0x80 [ 11.596594] ret_from_fork_asm+0x1a/0x30 [ 11.596730] [ 11.596799] The buggy address belongs to the object at ffff8881028ba200 [ 11.596799] which belongs to the cache kmalloc-128 of size 128 [ 11.597163] The buggy address is located 0 bytes inside of [ 11.597163] freed 128-byte region [ffff8881028ba200, ffff8881028ba280) [ 11.598202] [ 11.598399] The buggy address belongs to the physical page: [ 11.598914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba [ 11.599652] flags: 0x200000000000000(node=0|zone=2) [ 11.600090] page_type: f5(slab) [ 11.600310] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.601074] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.601564] page dumped because: kasan: bad access detected [ 11.602057] [ 11.602130] Memory state around the buggy address: [ 11.602596] ffff8881028ba100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.602813] ffff8881028ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.603028] >ffff8881028ba200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.603249] ^ [ 11.603380] ffff8881028ba280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.603792] ffff8881028ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.604509] ================================================================== [ 11.625848] ================================================================== [ 11.626428] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 11.627044] Read of size 1 at addr ffff8881028ba278 by task kunit_try_catch/216 [ 11.627316] [ 11.627463] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 11.627504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.627515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.627534] Call Trace: [ 11.627550] <TASK> [ 11.627565] dump_stack_lvl+0x73/0xb0 [ 11.627590] print_report+0xd1/0x610 [ 11.627611] ? __virt_addr_valid+0x1db/0x2d0 [ 11.627631] ? ksize_uaf+0x5e4/0x6c0 [ 11.627651] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.627672] ? ksize_uaf+0x5e4/0x6c0 [ 11.627693] kasan_report+0x141/0x180 [ 11.627714] ? ksize_uaf+0x5e4/0x6c0 [ 11.627739] __asan_report_load1_noabort+0x18/0x20 [ 11.627759] ksize_uaf+0x5e4/0x6c0 [ 11.627779] ? __pfx_ksize_uaf+0x10/0x10 [ 11.627801] ? __schedule+0x10c6/0x2b60 [ 11.627824] ? __pfx_read_tsc+0x10/0x10 [ 11.627843] ? ktime_get_ts64+0x86/0x230 [ 11.627867] kunit_try_run_case+0x1a5/0x480 [ 11.627887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.627905] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.627924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.627947] ? __kthread_parkme+0x82/0x180 [ 11.627968] ? preempt_count_sub+0x50/0x80 [ 11.627992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.628011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.628033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.628055] kthread+0x337/0x6f0 [ 11.628071] ? trace_preempt_on+0x20/0xc0 [ 11.628094] ? __pfx_kthread+0x10/0x10 [ 11.628111] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.628132] ? calculate_sigpending+0x7b/0xa0 [ 11.628153] ? __pfx_kthread+0x10/0x10 [ 11.628170] ret_from_fork+0x41/0x80 [ 11.628191] ? __pfx_kthread+0x10/0x10 [ 11.628208] ret_from_fork_asm+0x1a/0x30 [ 11.628248] </TASK> [ 11.628257] [ 11.635016] Allocated by task 216: [ 11.635147] kasan_save_stack+0x45/0x70 [ 11.635299] kasan_save_track+0x18/0x40 [ 11.636288] kasan_save_alloc_info+0x3b/0x50 [ 11.636818] __kasan_kmalloc+0xb7/0xc0 [ 11.637022] __kmalloc_cache_noprof+0x189/0x420 [ 11.637251] ksize_uaf+0xaa/0x6c0 [ 11.637449] kunit_try_run_case+0x1a5/0x480 [ 11.637618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.637844] kthread+0x337/0x6f0 [ 11.638002] ret_from_fork+0x41/0x80 [ 11.638175] ret_from_fork_asm+0x1a/0x30 [ 11.639215] [ 11.639307] Freed by task 216: [ 11.639879] kasan_save_stack+0x45/0x70 [ 11.640509] kasan_save_track+0x18/0x40 [ 11.640948] kasan_save_free_info+0x3f/0x60 [ 11.641312] __kasan_slab_free+0x56/0x70 [ 11.641898] kfree+0x222/0x3f0 [ 11.642308] ksize_uaf+0x12c/0x6c0 [ 11.642643] kunit_try_run_case+0x1a5/0x480 [ 11.642801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.642968] kthread+0x337/0x6f0 [ 11.643082] ret_from_fork+0x41/0x80 [ 11.643205] ret_from_fork_asm+0x1a/0x30 [ 11.643983] [ 11.644297] The buggy address belongs to the object at ffff8881028ba200 [ 11.644297] which belongs to the cache kmalloc-128 of size 128 [ 11.645752] The buggy address is located 120 bytes inside of [ 11.645752] freed 128-byte region [ffff8881028ba200, ffff8881028ba280) [ 11.646998] [ 11.647078] The buggy address belongs to the physical page: [ 11.647534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028ba [ 11.648503] flags: 0x200000000000000(node=0|zone=2) [ 11.649094] page_type: f5(slab) [ 11.649275] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.649715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.649935] page dumped because: kasan: bad access detected [ 11.650099] [ 11.650165] Memory state around the buggy address: [ 11.650326] ffff8881028ba100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.651005] ffff8881028ba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.651647] >ffff8881028ba200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.652255] ^ [ 11.652866] ffff8881028ba280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.653506] ffff8881028ba300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.654019] ==================================================================