Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.661856] ================================================================== [ 17.661922] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.661976] Read of size 1 at addr fff00000c7800800 by task kunit_try_catch/196 [ 17.666273] [ 17.667011] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.667574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.667727] Hardware name: linux,dummy-virt (DT) [ 17.668184] Call trace: [ 17.668274] show_stack+0x20/0x38 (C) [ 17.668507] dump_stack_lvl+0x8c/0xd0 [ 17.668601] print_report+0x118/0x608 [ 17.668674] kasan_report+0xdc/0x128 [ 17.668732] __kasan_check_byte+0x54/0x70 [ 17.668777] ksize+0x30/0x88 [ 17.668821] ksize_uaf+0x168/0x5f8 [ 17.668862] kunit_try_run_case+0x170/0x3f0 [ 17.668911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.668964] kthread+0x328/0x630 [ 17.670609] ret_from_fork+0x10/0x20 [ 17.671481] [ 17.671505] Allocated by task 196: [ 17.671538] kasan_save_stack+0x3c/0x68 [ 17.671585] kasan_save_track+0x20/0x40 [ 17.671630] kasan_save_alloc_info+0x40/0x58 [ 17.671672] __kasan_kmalloc+0xd4/0xd8 [ 17.672371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.672859] ksize_uaf+0xb8/0x5f8 [ 17.673132] kunit_try_run_case+0x170/0x3f0 [ 17.673601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.673787] kthread+0x328/0x630 [ 17.673823] ret_from_fork+0x10/0x20 [ 17.674801] [ 17.674894] Freed by task 196: [ 17.675336] kasan_save_stack+0x3c/0x68 [ 17.675820] kasan_save_track+0x20/0x40 [ 17.675914] kasan_save_free_info+0x4c/0x78 [ 17.676273] __kasan_slab_free+0x6c/0x98 [ 17.676409] kfree+0x214/0x3c8 [ 17.676774] ksize_uaf+0x11c/0x5f8 [ 17.677195] kunit_try_run_case+0x170/0x3f0 [ 17.677656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.678112] kthread+0x328/0x630 [ 17.678555] ret_from_fork+0x10/0x20 [ 17.678794] [ 17.678882] The buggy address belongs to the object at fff00000c7800800 [ 17.678882] which belongs to the cache kmalloc-128 of size 128 [ 17.678957] The buggy address is located 0 bytes inside of [ 17.678957] freed 128-byte region [fff00000c7800800, fff00000c7800880) [ 17.680069] [ 17.680295] The buggy address belongs to the physical page: [ 17.680513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 17.680817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.680872] page_type: f5(slab) [ 17.680913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.681811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.682226] page dumped because: kasan: bad access detected [ 17.682272] [ 17.682852] Memory state around the buggy address: [ 17.683218] fff00000c7800700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.683405] fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.683465] >fff00000c7800800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.683506] ^ [ 17.684221] fff00000c7800880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684695] fff00000c7800900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684749] ================================================================== [ 17.689078] ================================================================== [ 17.689132] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.690191] Read of size 1 at addr fff00000c7800800 by task kunit_try_catch/196 [ 17.690344] [ 17.690381] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.691533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.691631] Hardware name: linux,dummy-virt (DT) [ 17.691803] Call trace: [ 17.691833] show_stack+0x20/0x38 (C) [ 17.692506] dump_stack_lvl+0x8c/0xd0 [ 17.692984] print_report+0x118/0x608 [ 17.693171] kasan_report+0xdc/0x128 [ 17.693330] __asan_report_load1_noabort+0x20/0x30 [ 17.693458] ksize_uaf+0x598/0x5f8 [ 17.694126] kunit_try_run_case+0x170/0x3f0 [ 17.694436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.695100] kthread+0x328/0x630 [ 17.695245] ret_from_fork+0x10/0x20 [ 17.695471] [ 17.696049] Allocated by task 196: [ 17.696236] kasan_save_stack+0x3c/0x68 [ 17.696489] kasan_save_track+0x20/0x40 [ 17.696531] kasan_save_alloc_info+0x40/0x58 [ 17.696572] __kasan_kmalloc+0xd4/0xd8 [ 17.696608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.696647] ksize_uaf+0xb8/0x5f8 [ 17.696681] kunit_try_run_case+0x170/0x3f0 [ 17.696719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.696764] kthread+0x328/0x630 [ 17.696798] ret_from_fork+0x10/0x20 [ 17.696833] [ 17.696852] Freed by task 196: [ 17.696879] kasan_save_stack+0x3c/0x68 [ 17.696915] kasan_save_track+0x20/0x40 [ 17.698662] kasan_save_free_info+0x4c/0x78 [ 17.698775] __kasan_slab_free+0x6c/0x98 [ 17.699277] kfree+0x214/0x3c8 [ 17.699631] ksize_uaf+0x11c/0x5f8 [ 17.699666] kunit_try_run_case+0x170/0x3f0 [ 17.699708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.700342] kthread+0x328/0x630 [ 17.701390] ret_from_fork+0x10/0x20 [ 17.701569] [ 17.701590] The buggy address belongs to the object at fff00000c7800800 [ 17.701590] which belongs to the cache kmalloc-128 of size 128 [ 17.702004] The buggy address is located 0 bytes inside of [ 17.702004] freed 128-byte region [fff00000c7800800, fff00000c7800880) [ 17.702591] [ 17.702770] The buggy address belongs to the physical page: [ 17.703416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 17.704187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.704316] page_type: f5(slab) [ 17.704756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.705244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.705298] page dumped because: kasan: bad access detected [ 17.705755] [ 17.705778] Memory state around the buggy address: [ 17.706815] fff00000c7800700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.706934] fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.707779] >fff00000c7800800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.708430] ^ [ 17.708583] fff00000c7800880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.709069] fff00000c7800900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.709394] ================================================================== [ 17.717345] ================================================================== [ 17.717484] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.717542] Read of size 1 at addr fff00000c7800878 by task kunit_try_catch/196 [ 17.717593] [ 17.717630] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.717712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.717739] Hardware name: linux,dummy-virt (DT) [ 17.717770] Call trace: [ 17.719015] show_stack+0x20/0x38 (C) [ 17.719158] dump_stack_lvl+0x8c/0xd0 [ 17.719209] print_report+0x118/0x608 [ 17.719256] kasan_report+0xdc/0x128 [ 17.719300] __asan_report_load1_noabort+0x20/0x30 [ 17.719352] ksize_uaf+0x544/0x5f8 [ 17.719395] kunit_try_run_case+0x170/0x3f0 [ 17.719455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.719510] kthread+0x328/0x630 [ 17.719551] ret_from_fork+0x10/0x20 [ 17.719601] [ 17.719619] Allocated by task 196: [ 17.719648] kasan_save_stack+0x3c/0x68 [ 17.719688] kasan_save_track+0x20/0x40 [ 17.719727] kasan_save_alloc_info+0x40/0x58 [ 17.722280] __kasan_kmalloc+0xd4/0xd8 [ 17.723341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.723419] ksize_uaf+0xb8/0x5f8 [ 17.723919] kunit_try_run_case+0x170/0x3f0 [ 17.724307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.724441] kthread+0x328/0x630 [ 17.724491] ret_from_fork+0x10/0x20 [ 17.724529] [ 17.725205] Freed by task 196: [ 17.725638] kasan_save_stack+0x3c/0x68 [ 17.725782] kasan_save_track+0x20/0x40 [ 17.726129] kasan_save_free_info+0x4c/0x78 [ 17.726300] __kasan_slab_free+0x6c/0x98 [ 17.727107] kfree+0x214/0x3c8 [ 17.727206] ksize_uaf+0x11c/0x5f8 [ 17.727242] kunit_try_run_case+0x170/0x3f0 [ 17.727907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.728586] kthread+0x328/0x630 [ 17.728641] ret_from_fork+0x10/0x20 [ 17.729043] [ 17.729280] The buggy address belongs to the object at fff00000c7800800 [ 17.729280] which belongs to the cache kmalloc-128 of size 128 [ 17.729897] The buggy address is located 120 bytes inside of [ 17.729897] freed 128-byte region [fff00000c7800800, fff00000c7800880) [ 17.730177] [ 17.730504] The buggy address belongs to the physical page: [ 17.730625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 17.731276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.731660] page_type: f5(slab) [ 17.731979] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.732038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.732083] page dumped because: kasan: bad access detected [ 17.732629] [ 17.732654] Memory state around the buggy address: [ 17.732691] fff00000c7800700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.732738] fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.733196] >fff00000c7800800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.733467] ^ [ 17.734289] fff00000c7800880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.734714] fff00000c7800900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.735145] ==================================================================
[ 11.936775] ================================================================== [ 11.937378] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 11.937874] Read of size 1 at addr ffff88810312f300 by task kunit_try_catch/213 [ 11.938286] [ 11.938644] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.938690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.938702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.938720] Call Trace: [ 11.938835] <TASK> [ 11.938851] dump_stack_lvl+0x73/0xb0 [ 11.938881] print_report+0xd1/0x650 [ 11.938902] ? __virt_addr_valid+0x1db/0x2d0 [ 11.938924] ? ksize_uaf+0x5fe/0x6c0 [ 11.938943] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.938964] ? ksize_uaf+0x5fe/0x6c0 [ 11.938991] kasan_report+0x141/0x180 [ 11.939012] ? ksize_uaf+0x5fe/0x6c0 [ 11.939048] __asan_report_load1_noabort+0x18/0x20 [ 11.939072] ksize_uaf+0x5fe/0x6c0 [ 11.939092] ? __pfx_ksize_uaf+0x10/0x10 [ 11.939112] ? __schedule+0x10cc/0x2b60 [ 11.939132] ? __pfx_read_tsc+0x10/0x10 [ 11.939153] ? ktime_get_ts64+0x86/0x230 [ 11.939175] kunit_try_run_case+0x1a5/0x480 [ 11.939198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.939218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.939239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.939260] ? __kthread_parkme+0x82/0x180 [ 11.939279] ? preempt_count_sub+0x50/0x80 [ 11.939301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.939323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.939344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.939365] kthread+0x337/0x6f0 [ 11.939383] ? trace_preempt_on+0x20/0xc0 [ 11.939404] ? __pfx_kthread+0x10/0x10 [ 11.939423] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.939443] ? calculate_sigpending+0x7b/0xa0 [ 11.939465] ? __pfx_kthread+0x10/0x10 [ 11.939485] ret_from_fork+0x116/0x1d0 [ 11.939501] ? __pfx_kthread+0x10/0x10 [ 11.939520] ret_from_fork_asm+0x1a/0x30 [ 11.939549] </TASK> [ 11.939559] [ 11.951540] Allocated by task 213: [ 11.951712] kasan_save_stack+0x45/0x70 [ 11.951936] kasan_save_track+0x18/0x40 [ 11.952363] kasan_save_alloc_info+0x3b/0x50 [ 11.952838] __kasan_kmalloc+0xb7/0xc0 [ 11.953104] __kmalloc_cache_noprof+0x189/0x420 [ 11.953358] ksize_uaf+0xaa/0x6c0 [ 11.953718] kunit_try_run_case+0x1a5/0x480 [ 11.954022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.954481] kthread+0x337/0x6f0 [ 11.954762] ret_from_fork+0x116/0x1d0 [ 11.955219] ret_from_fork_asm+0x1a/0x30 [ 11.955422] [ 11.955499] Freed by task 213: [ 11.955680] kasan_save_stack+0x45/0x70 [ 11.955943] kasan_save_track+0x18/0x40 [ 11.956157] kasan_save_free_info+0x3f/0x60 [ 11.956800] __kasan_slab_free+0x56/0x70 [ 11.957189] kfree+0x222/0x3f0 [ 11.957323] ksize_uaf+0x12c/0x6c0 [ 11.957643] kunit_try_run_case+0x1a5/0x480 [ 11.957875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.958315] kthread+0x337/0x6f0 [ 11.958475] ret_from_fork+0x116/0x1d0 [ 11.958677] ret_from_fork_asm+0x1a/0x30 [ 11.959158] [ 11.959285] The buggy address belongs to the object at ffff88810312f300 [ 11.959285] which belongs to the cache kmalloc-128 of size 128 [ 11.959945] The buggy address is located 0 bytes inside of [ 11.959945] freed 128-byte region [ffff88810312f300, ffff88810312f380) [ 11.960799] [ 11.961101] The buggy address belongs to the physical page: [ 11.961556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f [ 11.961890] flags: 0x200000000000000(node=0|zone=2) [ 11.962331] page_type: f5(slab) [ 11.962482] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.962827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.963431] page dumped because: kasan: bad access detected [ 11.964263] [ 11.964368] Memory state around the buggy address: [ 11.964855] ffff88810312f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.965313] ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.966223] >ffff88810312f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.966839] ^ [ 11.966963] ffff88810312f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.967237] ffff88810312f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.967471] ================================================================== [ 11.910991] ================================================================== [ 11.912160] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 11.912443] Read of size 1 at addr ffff88810312f300 by task kunit_try_catch/213 [ 11.912723] [ 11.912830] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.912872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.912883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.912903] Call Trace: [ 11.912914] <TASK> [ 11.912929] dump_stack_lvl+0x73/0xb0 [ 11.912954] print_report+0xd1/0x650 [ 11.912976] ? __virt_addr_valid+0x1db/0x2d0 [ 11.912996] ? ksize_uaf+0x19d/0x6c0 [ 11.913015] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.913050] ? ksize_uaf+0x19d/0x6c0 [ 11.913069] kasan_report+0x141/0x180 [ 11.913090] ? ksize_uaf+0x19d/0x6c0 [ 11.913113] ? ksize_uaf+0x19d/0x6c0 [ 11.913132] __kasan_check_byte+0x3d/0x50 [ 11.913153] ksize+0x20/0x60 [ 11.913173] ksize_uaf+0x19d/0x6c0 [ 11.913193] ? __pfx_ksize_uaf+0x10/0x10 [ 11.913213] ? __schedule+0x10cc/0x2b60 [ 11.913234] ? __pfx_read_tsc+0x10/0x10 [ 11.913253] ? ktime_get_ts64+0x86/0x230 [ 11.913275] kunit_try_run_case+0x1a5/0x480 [ 11.913299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.913320] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.913342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.913364] ? __kthread_parkme+0x82/0x180 [ 11.913383] ? preempt_count_sub+0x50/0x80 [ 11.913406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.913428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.913450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.913471] kthread+0x337/0x6f0 [ 11.913489] ? trace_preempt_on+0x20/0xc0 [ 11.913511] ? __pfx_kthread+0x10/0x10 [ 11.913530] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.913550] ? calculate_sigpending+0x7b/0xa0 [ 11.913572] ? __pfx_kthread+0x10/0x10 [ 11.913592] ret_from_fork+0x116/0x1d0 [ 11.913609] ? __pfx_kthread+0x10/0x10 [ 11.913628] ret_from_fork_asm+0x1a/0x30 [ 11.913657] </TASK> [ 11.913668] [ 11.922033] Allocated by task 213: [ 11.922342] kasan_save_stack+0x45/0x70 [ 11.922582] kasan_save_track+0x18/0x40 [ 11.922799] kasan_save_alloc_info+0x3b/0x50 [ 11.923124] __kasan_kmalloc+0xb7/0xc0 [ 11.923397] __kmalloc_cache_noprof+0x189/0x420 [ 11.923658] ksize_uaf+0xaa/0x6c0 [ 11.923843] kunit_try_run_case+0x1a5/0x480 [ 11.924075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.924465] kthread+0x337/0x6f0 [ 11.924688] ret_from_fork+0x116/0x1d0 [ 11.924866] ret_from_fork_asm+0x1a/0x30 [ 11.925187] [ 11.925283] Freed by task 213: [ 11.925427] kasan_save_stack+0x45/0x70 [ 11.925614] kasan_save_track+0x18/0x40 [ 11.925747] kasan_save_free_info+0x3f/0x60 [ 11.925891] __kasan_slab_free+0x56/0x70 [ 11.926257] kfree+0x222/0x3f0 [ 11.926429] ksize_uaf+0x12c/0x6c0 [ 11.926608] kunit_try_run_case+0x1a5/0x480 [ 11.926815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.927161] kthread+0x337/0x6f0 [ 11.927286] ret_from_fork+0x116/0x1d0 [ 11.927417] ret_from_fork_asm+0x1a/0x30 [ 11.927571] [ 11.927701] The buggy address belongs to the object at ffff88810312f300 [ 11.927701] which belongs to the cache kmalloc-128 of size 128 [ 11.928473] The buggy address is located 0 bytes inside of [ 11.928473] freed 128-byte region [ffff88810312f300, ffff88810312f380) [ 11.929187] [ 11.929321] The buggy address belongs to the physical page: [ 11.929568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f [ 11.929893] flags: 0x200000000000000(node=0|zone=2) [ 11.930136] page_type: f5(slab) [ 11.930325] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.930763] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.931363] page dumped because: kasan: bad access detected [ 11.931648] [ 11.931727] Memory state around the buggy address: [ 11.931981] ffff88810312f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.932361] ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.932728] >ffff88810312f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.933216] ^ [ 11.933336] ffff88810312f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.933698] ffff88810312f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.934088] ================================================================== [ 11.968316] ================================================================== [ 11.969016] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 11.969677] Read of size 1 at addr ffff88810312f378 by task kunit_try_catch/213 [ 11.970258] [ 11.970352] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.970393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.970405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.970424] Call Trace: [ 11.970440] <TASK> [ 11.970456] dump_stack_lvl+0x73/0xb0 [ 11.970484] print_report+0xd1/0x650 [ 11.970505] ? __virt_addr_valid+0x1db/0x2d0 [ 11.970527] ? ksize_uaf+0x5e4/0x6c0 [ 11.970546] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.970568] ? ksize_uaf+0x5e4/0x6c0 [ 11.970588] kasan_report+0x141/0x180 [ 11.970608] ? ksize_uaf+0x5e4/0x6c0 [ 11.970632] __asan_report_load1_noabort+0x18/0x20 [ 11.970655] ksize_uaf+0x5e4/0x6c0 [ 11.970674] ? __pfx_ksize_uaf+0x10/0x10 [ 11.970694] ? __schedule+0x10cc/0x2b60 [ 11.970715] ? __pfx_read_tsc+0x10/0x10 [ 11.970734] ? ktime_get_ts64+0x86/0x230 [ 11.970757] kunit_try_run_case+0x1a5/0x480 [ 11.970779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.970799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.970820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.970841] ? __kthread_parkme+0x82/0x180 [ 11.970860] ? preempt_count_sub+0x50/0x80 [ 11.970882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.970903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.970924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.970946] kthread+0x337/0x6f0 [ 11.970963] ? trace_preempt_on+0x20/0xc0 [ 11.970984] ? __pfx_kthread+0x10/0x10 [ 11.971003] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.971034] ? calculate_sigpending+0x7b/0xa0 [ 11.971060] ? __pfx_kthread+0x10/0x10 [ 11.971082] ret_from_fork+0x116/0x1d0 [ 11.971098] ? __pfx_kthread+0x10/0x10 [ 11.971117] ret_from_fork_asm+0x1a/0x30 [ 11.971146] </TASK> [ 11.971157] [ 11.980792] Allocated by task 213: [ 11.980987] kasan_save_stack+0x45/0x70 [ 11.981272] kasan_save_track+0x18/0x40 [ 11.981458] kasan_save_alloc_info+0x3b/0x50 [ 11.981606] __kasan_kmalloc+0xb7/0xc0 [ 11.981793] __kmalloc_cache_noprof+0x189/0x420 [ 11.982096] ksize_uaf+0xaa/0x6c0 [ 11.982442] kunit_try_run_case+0x1a5/0x480 [ 11.982638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.982886] kthread+0x337/0x6f0 [ 11.983106] ret_from_fork+0x116/0x1d0 [ 11.983337] ret_from_fork_asm+0x1a/0x30 [ 11.983613] [ 11.983711] Freed by task 213: [ 11.983888] kasan_save_stack+0x45/0x70 [ 11.984153] kasan_save_track+0x18/0x40 [ 11.984304] kasan_save_free_info+0x3f/0x60 [ 11.984448] __kasan_slab_free+0x56/0x70 [ 11.984582] kfree+0x222/0x3f0 [ 11.984705] ksize_uaf+0x12c/0x6c0 [ 11.985020] kunit_try_run_case+0x1a5/0x480 [ 11.985243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.985528] kthread+0x337/0x6f0 [ 11.985647] ret_from_fork+0x116/0x1d0 [ 11.985876] ret_from_fork_asm+0x1a/0x30 [ 11.986240] [ 11.986338] The buggy address belongs to the object at ffff88810312f300 [ 11.986338] which belongs to the cache kmalloc-128 of size 128 [ 11.986852] The buggy address is located 120 bytes inside of [ 11.986852] freed 128-byte region [ffff88810312f300, ffff88810312f380) [ 11.987532] [ 11.987632] The buggy address belongs to the physical page: [ 11.987860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f [ 11.988459] flags: 0x200000000000000(node=0|zone=2) [ 11.988831] page_type: f5(slab) [ 11.988999] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.989353] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.989575] page dumped because: kasan: bad access detected [ 11.989851] [ 11.990050] Memory state around the buggy address: [ 11.990523] ffff88810312f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.990845] ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.991238] >ffff88810312f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.991517] ^ [ 11.991766] ffff88810312f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.992367] ffff88810312f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.992787] ==================================================================