Date
July 3, 2025, 6:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.051753] ================================================================== [ 17.051853] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 17.052141] Read of size 1 at addr fff00000c78c1400 by task kunit_try_catch/196 [ 17.052203] [ 17.052340] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.052430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.052461] Hardware name: linux,dummy-virt (DT) [ 17.052724] Call trace: [ 17.052911] show_stack+0x20/0x38 (C) [ 17.053105] dump_stack_lvl+0x8c/0xd0 [ 17.053404] print_report+0x118/0x608 [ 17.053577] kasan_report+0xdc/0x128 [ 17.053686] __kasan_check_byte+0x54/0x70 [ 17.054113] ksize+0x30/0x88 [ 17.054275] ksize_uaf+0x168/0x5f8 [ 17.054485] kunit_try_run_case+0x170/0x3f0 [ 17.054599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.054683] kthread+0x328/0x630 [ 17.055159] ret_from_fork+0x10/0x20 [ 17.055647] [ 17.055747] Allocated by task 196: [ 17.055814] kasan_save_stack+0x3c/0x68 [ 17.055979] kasan_save_track+0x20/0x40 [ 17.056130] kasan_save_alloc_info+0x40/0x58 [ 17.056309] __kasan_kmalloc+0xd4/0xd8 [ 17.056452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.056627] ksize_uaf+0xb8/0x5f8 [ 17.056811] kunit_try_run_case+0x170/0x3f0 [ 17.056996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.057061] kthread+0x328/0x630 [ 17.057462] ret_from_fork+0x10/0x20 [ 17.057563] [ 17.057629] Freed by task 196: [ 17.057659] kasan_save_stack+0x3c/0x68 [ 17.057699] kasan_save_track+0x20/0x40 [ 17.057765] kasan_save_free_info+0x4c/0x78 [ 17.057811] __kasan_slab_free+0x6c/0x98 [ 17.057870] kfree+0x214/0x3c8 [ 17.057920] ksize_uaf+0x11c/0x5f8 [ 17.057955] kunit_try_run_case+0x170/0x3f0 [ 17.058003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.058057] kthread+0x328/0x630 [ 17.058090] ret_from_fork+0x10/0x20 [ 17.058127] [ 17.058146] The buggy address belongs to the object at fff00000c78c1400 [ 17.058146] which belongs to the cache kmalloc-128 of size 128 [ 17.058217] The buggy address is located 0 bytes inside of [ 17.058217] freed 128-byte region [fff00000c78c1400, fff00000c78c1480) [ 17.058295] [ 17.058314] The buggy address belongs to the physical page: [ 17.058352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 17.058415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.058463] page_type: f5(slab) [ 17.058498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.058549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.058603] page dumped because: kasan: bad access detected [ 17.058642] [ 17.058659] Memory state around the buggy address: [ 17.058691] fff00000c78c1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.058732] fff00000c78c1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058773] >fff00000c78c1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.058821] ^ [ 17.058848] fff00000c78c1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058890] fff00000c78c1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058927] ================================================================== [ 17.072433] ================================================================== [ 17.072502] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 17.072779] Read of size 1 at addr fff00000c78c1478 by task kunit_try_catch/196 [ 17.072991] [ 17.073022] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.073487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.073713] Hardware name: linux,dummy-virt (DT) [ 17.073869] Call trace: [ 17.073900] show_stack+0x20/0x38 (C) [ 17.073998] dump_stack_lvl+0x8c/0xd0 [ 17.074060] print_report+0x118/0x608 [ 17.074107] kasan_report+0xdc/0x128 [ 17.074152] __asan_report_load1_noabort+0x20/0x30 [ 17.074203] ksize_uaf+0x544/0x5f8 [ 17.074272] kunit_try_run_case+0x170/0x3f0 [ 17.074319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.074374] kthread+0x328/0x630 [ 17.074423] ret_from_fork+0x10/0x20 [ 17.074477] [ 17.074496] Allocated by task 196: [ 17.074524] kasan_save_stack+0x3c/0x68 [ 17.074565] kasan_save_track+0x20/0x40 [ 17.074608] kasan_save_alloc_info+0x40/0x58 [ 17.074656] __kasan_kmalloc+0xd4/0xd8 [ 17.074693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.074729] ksize_uaf+0xb8/0x5f8 [ 17.074761] kunit_try_run_case+0x170/0x3f0 [ 17.074804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.074848] kthread+0x328/0x630 [ 17.074881] ret_from_fork+0x10/0x20 [ 17.074914] [ 17.074939] Freed by task 196: [ 17.074973] kasan_save_stack+0x3c/0x68 [ 17.075009] kasan_save_track+0x20/0x40 [ 17.075055] kasan_save_free_info+0x4c/0x78 [ 17.075094] __kasan_slab_free+0x6c/0x98 [ 17.075140] kfree+0x214/0x3c8 [ 17.075172] ksize_uaf+0x11c/0x5f8 [ 17.075204] kunit_try_run_case+0x170/0x3f0 [ 17.075256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.075310] kthread+0x328/0x630 [ 17.075343] ret_from_fork+0x10/0x20 [ 17.075379] [ 17.075400] The buggy address belongs to the object at fff00000c78c1400 [ 17.075400] which belongs to the cache kmalloc-128 of size 128 [ 17.075477] The buggy address is located 120 bytes inside of [ 17.075477] freed 128-byte region [fff00000c78c1400, fff00000c78c1480) [ 17.075549] [ 17.075584] The buggy address belongs to the physical page: [ 17.075613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 17.075670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.075727] page_type: f5(slab) [ 17.075777] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.075838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.075878] page dumped because: kasan: bad access detected [ 17.075918] [ 17.075936] Memory state around the buggy address: [ 17.075975] fff00000c78c1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.076639] fff00000c78c1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.076741] >fff00000c78c1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.076829] ^ [ 17.076913] fff00000c78c1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.077106] fff00000c78c1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.077315] ================================================================== [ 17.061989] ================================================================== [ 17.062063] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 17.062109] Read of size 1 at addr fff00000c78c1400 by task kunit_try_catch/196 [ 17.062250] [ 17.062336] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.062709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.062805] Hardware name: linux,dummy-virt (DT) [ 17.062858] Call trace: [ 17.062916] show_stack+0x20/0x38 (C) [ 17.062968] dump_stack_lvl+0x8c/0xd0 [ 17.063148] print_report+0x118/0x608 [ 17.063240] kasan_report+0xdc/0x128 [ 17.063303] __asan_report_load1_noabort+0x20/0x30 [ 17.063438] ksize_uaf+0x598/0x5f8 [ 17.063490] kunit_try_run_case+0x170/0x3f0 [ 17.063538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.063591] kthread+0x328/0x630 [ 17.063853] ret_from_fork+0x10/0x20 [ 17.063931] [ 17.064076] Allocated by task 196: [ 17.064113] kasan_save_stack+0x3c/0x68 [ 17.064156] kasan_save_track+0x20/0x40 [ 17.064192] kasan_save_alloc_info+0x40/0x58 [ 17.064370] __kasan_kmalloc+0xd4/0xd8 [ 17.064415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.064597] ksize_uaf+0xb8/0x5f8 [ 17.064646] kunit_try_run_case+0x170/0x3f0 [ 17.064702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.064746] kthread+0x328/0x630 [ 17.064778] ret_from_fork+0x10/0x20 [ 17.065082] [ 17.065187] Freed by task 196: [ 17.065268] kasan_save_stack+0x3c/0x68 [ 17.065512] kasan_save_track+0x20/0x40 [ 17.065684] kasan_save_free_info+0x4c/0x78 [ 17.066121] __kasan_slab_free+0x6c/0x98 [ 17.066293] kfree+0x214/0x3c8 [ 17.066727] ksize_uaf+0x11c/0x5f8 [ 17.066933] kunit_try_run_case+0x170/0x3f0 [ 17.067092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.067191] kthread+0x328/0x630 [ 17.067225] ret_from_fork+0x10/0x20 [ 17.067410] [ 17.067640] The buggy address belongs to the object at fff00000c78c1400 [ 17.067640] which belongs to the cache kmalloc-128 of size 128 [ 17.067827] The buggy address is located 0 bytes inside of [ 17.067827] freed 128-byte region [fff00000c78c1400, fff00000c78c1480) [ 17.068017] [ 17.068269] The buggy address belongs to the physical page: [ 17.068423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c1 [ 17.068612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.068816] page_type: f5(slab) [ 17.069146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.069524] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.069696] page dumped because: kasan: bad access detected [ 17.069833] [ 17.070009] Memory state around the buggy address: [ 17.070072] fff00000c78c1300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.070447] fff00000c78c1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.070585] >fff00000c78c1400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.070817] ^ [ 17.070864] fff00000c78c1480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.071037] fff00000c78c1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.071078] ==================================================================
[ 11.946893] ================================================================== [ 11.947292] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 11.947623] Read of size 1 at addr ffff8881029db700 by task kunit_try_catch/214 [ 11.947868] [ 11.947982] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.948023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.948034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.948054] Call Trace: [ 11.948066] <TASK> [ 11.948082] dump_stack_lvl+0x73/0xb0 [ 11.948123] print_report+0xd1/0x650 [ 11.948145] ? __virt_addr_valid+0x1db/0x2d0 [ 11.948208] ? ksize_uaf+0x5fe/0x6c0 [ 11.948229] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.948250] ? ksize_uaf+0x5fe/0x6c0 [ 11.948270] kasan_report+0x141/0x180 [ 11.948291] ? ksize_uaf+0x5fe/0x6c0 [ 11.948316] __asan_report_load1_noabort+0x18/0x20 [ 11.948339] ksize_uaf+0x5fe/0x6c0 [ 11.948358] ? __pfx_ksize_uaf+0x10/0x10 [ 11.948378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.948404] ? __pfx_read_tsc+0x10/0x10 [ 11.948425] ? ktime_get_ts64+0x86/0x230 [ 11.948449] kunit_try_run_case+0x1a5/0x480 [ 11.948471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.948492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.948514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.948536] ? __kthread_parkme+0x82/0x180 [ 11.948556] ? preempt_count_sub+0x50/0x80 [ 11.948579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.948601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.948622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.948644] kthread+0x337/0x6f0 [ 11.948663] ? trace_preempt_on+0x20/0xc0 [ 11.948698] ? __pfx_kthread+0x10/0x10 [ 11.948718] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.948738] ? calculate_sigpending+0x7b/0xa0 [ 11.948761] ? __pfx_kthread+0x10/0x10 [ 11.948782] ret_from_fork+0x116/0x1d0 [ 11.948799] ? __pfx_kthread+0x10/0x10 [ 11.948819] ret_from_fork_asm+0x1a/0x30 [ 11.948849] </TASK> [ 11.948860] [ 11.956306] Allocated by task 214: [ 11.956497] kasan_save_stack+0x45/0x70 [ 11.956698] kasan_save_track+0x18/0x40 [ 11.956891] kasan_save_alloc_info+0x3b/0x50 [ 11.957068] __kasan_kmalloc+0xb7/0xc0 [ 11.957361] __kmalloc_cache_noprof+0x189/0x420 [ 11.957529] ksize_uaf+0xaa/0x6c0 [ 11.957655] kunit_try_run_case+0x1a5/0x480 [ 11.957803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.958000] kthread+0x337/0x6f0 [ 11.958174] ret_from_fork+0x116/0x1d0 [ 11.958509] ret_from_fork_asm+0x1a/0x30 [ 11.958712] [ 11.958811] Freed by task 214: [ 11.958965] kasan_save_stack+0x45/0x70 [ 11.959330] kasan_save_track+0x18/0x40 [ 11.959538] kasan_save_free_info+0x3f/0x60 [ 11.959744] __kasan_slab_free+0x56/0x70 [ 11.959903] kfree+0x222/0x3f0 [ 11.960059] ksize_uaf+0x12c/0x6c0 [ 11.960284] kunit_try_run_case+0x1a5/0x480 [ 11.960562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.960791] kthread+0x337/0x6f0 [ 11.960959] ret_from_fork+0x116/0x1d0 [ 11.961179] ret_from_fork_asm+0x1a/0x30 [ 11.961324] [ 11.961440] The buggy address belongs to the object at ffff8881029db700 [ 11.961440] which belongs to the cache kmalloc-128 of size 128 [ 11.961962] The buggy address is located 0 bytes inside of [ 11.961962] freed 128-byte region [ffff8881029db700, ffff8881029db780) [ 11.962534] [ 11.962621] The buggy address belongs to the physical page: [ 11.962822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 11.963252] flags: 0x200000000000000(node=0|zone=2) [ 11.963481] page_type: f5(slab) [ 11.963622] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.963957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.964438] page dumped because: kasan: bad access detected [ 11.964621] [ 11.964693] Memory state around the buggy address: [ 11.964850] ffff8881029db600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.965068] ffff8881029db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.965550] >ffff8881029db700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.966237] ^ [ 11.966403] ffff8881029db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.966703] ffff8881029db800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.966919] ================================================================== [ 11.926427] ================================================================== [ 11.926837] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 11.927059] Read of size 1 at addr ffff8881029db700 by task kunit_try_catch/214 [ 11.927354] [ 11.927457] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.927503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.927514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.927534] Call Trace: [ 11.927546] <TASK> [ 11.927562] dump_stack_lvl+0x73/0xb0 [ 11.927589] print_report+0xd1/0x650 [ 11.927612] ? __virt_addr_valid+0x1db/0x2d0 [ 11.927635] ? ksize_uaf+0x19d/0x6c0 [ 11.927654] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.927675] ? ksize_uaf+0x19d/0x6c0 [ 11.927695] kasan_report+0x141/0x180 [ 11.927716] ? ksize_uaf+0x19d/0x6c0 [ 11.927739] ? ksize_uaf+0x19d/0x6c0 [ 11.927759] __kasan_check_byte+0x3d/0x50 [ 11.927780] ksize+0x20/0x60 [ 11.927801] ksize_uaf+0x19d/0x6c0 [ 11.927821] ? __pfx_ksize_uaf+0x10/0x10 [ 11.927841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.927867] ? __pfx_read_tsc+0x10/0x10 [ 11.927888] ? ktime_get_ts64+0x86/0x230 [ 11.927913] kunit_try_run_case+0x1a5/0x480 [ 11.927936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.927957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.927981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.928003] ? __kthread_parkme+0x82/0x180 [ 11.928023] ? preempt_count_sub+0x50/0x80 [ 11.928045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.928067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.928090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.928124] kthread+0x337/0x6f0 [ 11.928143] ? trace_preempt_on+0x20/0xc0 [ 11.928167] ? __pfx_kthread+0x10/0x10 [ 11.928187] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.928207] ? calculate_sigpending+0x7b/0xa0 [ 11.928230] ? __pfx_kthread+0x10/0x10 [ 11.928250] ret_from_fork+0x116/0x1d0 [ 11.928277] ? __pfx_kthread+0x10/0x10 [ 11.928297] ret_from_fork_asm+0x1a/0x30 [ 11.928327] </TASK> [ 11.928340] [ 11.935688] Allocated by task 214: [ 11.935872] kasan_save_stack+0x45/0x70 [ 11.936051] kasan_save_track+0x18/0x40 [ 11.936362] kasan_save_alloc_info+0x3b/0x50 [ 11.936579] __kasan_kmalloc+0xb7/0xc0 [ 11.936717] __kmalloc_cache_noprof+0x189/0x420 [ 11.936908] ksize_uaf+0xaa/0x6c0 [ 11.937086] kunit_try_run_case+0x1a5/0x480 [ 11.937417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.937645] kthread+0x337/0x6f0 [ 11.937893] ret_from_fork+0x116/0x1d0 [ 11.938033] ret_from_fork_asm+0x1a/0x30 [ 11.938268] [ 11.938417] Freed by task 214: [ 11.938608] kasan_save_stack+0x45/0x70 [ 11.938796] kasan_save_track+0x18/0x40 [ 11.938935] kasan_save_free_info+0x3f/0x60 [ 11.939083] __kasan_slab_free+0x56/0x70 [ 11.939238] kfree+0x222/0x3f0 [ 11.939387] ksize_uaf+0x12c/0x6c0 [ 11.939562] kunit_try_run_case+0x1a5/0x480 [ 11.939776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.940027] kthread+0x337/0x6f0 [ 11.940205] ret_from_fork+0x116/0x1d0 [ 11.940389] ret_from_fork_asm+0x1a/0x30 [ 11.940774] [ 11.940881] The buggy address belongs to the object at ffff8881029db700 [ 11.940881] which belongs to the cache kmalloc-128 of size 128 [ 11.941505] The buggy address is located 0 bytes inside of [ 11.941505] freed 128-byte region [ffff8881029db700, ffff8881029db780) [ 11.941959] [ 11.942060] The buggy address belongs to the physical page: [ 11.942348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 11.942652] flags: 0x200000000000000(node=0|zone=2) [ 11.942819] page_type: f5(slab) [ 11.942943] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.943267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.943603] page dumped because: kasan: bad access detected [ 11.943834] [ 11.943905] Memory state around the buggy address: [ 11.944245] ffff8881029db600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.944534] ffff8881029db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.944755] >ffff8881029db700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.945046] ^ [ 11.945492] ffff8881029db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.945834] ffff8881029db800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.946216] ================================================================== [ 11.967347] ================================================================== [ 11.967917] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 11.968281] Read of size 1 at addr ffff8881029db778 by task kunit_try_catch/214 [ 11.968605] [ 11.968713] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.968751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.968762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.968781] Call Trace: [ 11.968796] <TASK> [ 11.968811] dump_stack_lvl+0x73/0xb0 [ 11.968836] print_report+0xd1/0x650 [ 11.968857] ? __virt_addr_valid+0x1db/0x2d0 [ 11.968878] ? ksize_uaf+0x5e4/0x6c0 [ 11.968897] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.968918] ? ksize_uaf+0x5e4/0x6c0 [ 11.968938] kasan_report+0x141/0x180 [ 11.968959] ? ksize_uaf+0x5e4/0x6c0 [ 11.968983] __asan_report_load1_noabort+0x18/0x20 [ 11.969006] ksize_uaf+0x5e4/0x6c0 [ 11.969026] ? __pfx_ksize_uaf+0x10/0x10 [ 11.969045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.969069] ? __pfx_read_tsc+0x10/0x10 [ 11.969089] ? ktime_get_ts64+0x86/0x230 [ 11.969123] kunit_try_run_case+0x1a5/0x480 [ 11.969145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.969165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.969188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.969209] ? __kthread_parkme+0x82/0x180 [ 11.969288] ? preempt_count_sub+0x50/0x80 [ 11.969312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.969347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.969369] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.969391] kthread+0x337/0x6f0 [ 11.969410] ? trace_preempt_on+0x20/0xc0 [ 11.969433] ? __pfx_kthread+0x10/0x10 [ 11.969453] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.969473] ? calculate_sigpending+0x7b/0xa0 [ 11.969495] ? __pfx_kthread+0x10/0x10 [ 11.969516] ret_from_fork+0x116/0x1d0 [ 11.969533] ? __pfx_kthread+0x10/0x10 [ 11.969553] ret_from_fork_asm+0x1a/0x30 [ 11.969583] </TASK> [ 11.969593] [ 11.977014] Allocated by task 214: [ 11.977243] kasan_save_stack+0x45/0x70 [ 11.977450] kasan_save_track+0x18/0x40 [ 11.977628] kasan_save_alloc_info+0x3b/0x50 [ 11.977839] __kasan_kmalloc+0xb7/0xc0 [ 11.978013] __kmalloc_cache_noprof+0x189/0x420 [ 11.978325] ksize_uaf+0xaa/0x6c0 [ 11.978467] kunit_try_run_case+0x1a5/0x480 [ 11.978673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.978888] kthread+0x337/0x6f0 [ 11.979046] ret_from_fork+0x116/0x1d0 [ 11.979293] ret_from_fork_asm+0x1a/0x30 [ 11.979527] [ 11.979613] Freed by task 214: [ 11.979768] kasan_save_stack+0x45/0x70 [ 11.979924] kasan_save_track+0x18/0x40 [ 11.980127] kasan_save_free_info+0x3f/0x60 [ 11.980323] __kasan_slab_free+0x56/0x70 [ 11.980490] kfree+0x222/0x3f0 [ 11.980608] ksize_uaf+0x12c/0x6c0 [ 11.980734] kunit_try_run_case+0x1a5/0x480 [ 11.980912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.981166] kthread+0x337/0x6f0 [ 11.981382] ret_from_fork+0x116/0x1d0 [ 11.981530] ret_from_fork_asm+0x1a/0x30 [ 11.981671] [ 11.981742] The buggy address belongs to the object at ffff8881029db700 [ 11.981742] which belongs to the cache kmalloc-128 of size 128 [ 11.982100] The buggy address is located 120 bytes inside of [ 11.982100] freed 128-byte region [ffff8881029db700, ffff8881029db780) [ 11.982554] [ 11.982648] The buggy address belongs to the physical page: [ 11.982897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db [ 11.983256] flags: 0x200000000000000(node=0|zone=2) [ 11.983492] page_type: f5(slab) [ 11.983909] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.984172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.984634] page dumped because: kasan: bad access detected [ 11.984891] [ 11.984986] Memory state around the buggy address: [ 11.985289] ffff8881029db600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.985605] ffff8881029db680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.985882] >ffff8881029db700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.986237] ^ [ 11.986524] ffff8881029db780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.986743] ffff8881029db800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.987041] ==================================================================