Date
July 8, 2025, 7:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.523160] ================================================================== [ 19.523366] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 19.523431] Read of size 1 at addr fff00000c5708400 by task kunit_try_catch/196 [ 19.523509] [ 19.523547] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.523744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.523934] Hardware name: linux,dummy-virt (DT) [ 19.523968] Call trace: [ 19.523989] show_stack+0x20/0x38 (C) [ 19.524400] dump_stack_lvl+0x8c/0xd0 [ 19.524582] print_report+0x118/0x608 [ 19.524698] kasan_report+0xdc/0x128 [ 19.524908] __asan_report_load1_noabort+0x20/0x30 [ 19.524962] ksize_uaf+0x598/0x5f8 [ 19.525496] kunit_try_run_case+0x170/0x3f0 [ 19.525613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525764] kthread+0x328/0x630 [ 19.525809] ret_from_fork+0x10/0x20 [ 19.525902] [ 19.526185] Allocated by task 196: [ 19.526278] kasan_save_stack+0x3c/0x68 [ 19.526350] kasan_save_track+0x20/0x40 [ 19.526486] kasan_save_alloc_info+0x40/0x58 [ 19.526597] __kasan_kmalloc+0xd4/0xd8 [ 19.526811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.527026] ksize_uaf+0xb8/0x5f8 [ 19.527093] kunit_try_run_case+0x170/0x3f0 [ 19.527256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.527360] kthread+0x328/0x630 [ 19.527476] ret_from_fork+0x10/0x20 [ 19.527563] [ 19.527778] Freed by task 196: [ 19.527812] kasan_save_stack+0x3c/0x68 [ 19.527853] kasan_save_track+0x20/0x40 [ 19.527896] kasan_save_free_info+0x4c/0x78 [ 19.528128] __kasan_slab_free+0x6c/0x98 [ 19.528246] kfree+0x214/0x3c8 [ 19.528304] ksize_uaf+0x11c/0x5f8 [ 19.528425] kunit_try_run_case+0x170/0x3f0 [ 19.528528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.528687] kthread+0x328/0x630 [ 19.528816] ret_from_fork+0x10/0x20 [ 19.528855] [ 19.529040] The buggy address belongs to the object at fff00000c5708400 [ 19.529040] which belongs to the cache kmalloc-128 of size 128 [ 19.529232] The buggy address is located 0 bytes inside of [ 19.529232] freed 128-byte region [fff00000c5708400, fff00000c5708480) [ 19.529409] [ 19.529479] The buggy address belongs to the physical page: [ 19.530307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708 [ 19.530387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.530471] page_type: f5(slab) [ 19.530592] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.531167] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.531238] page dumped because: kasan: bad access detected [ 19.531303] [ 19.531431] Memory state around the buggy address: [ 19.531555] fff00000c5708300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.531630] fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.531765] >fff00000c5708400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.531805] ^ [ 19.531833] fff00000c5708480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.531876] fff00000c5708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.531913] ================================================================== [ 19.516245] ================================================================== [ 19.516438] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 19.516492] Read of size 1 at addr fff00000c5708400 by task kunit_try_catch/196 [ 19.516599] [ 19.516636] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.516798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.516827] Hardware name: linux,dummy-virt (DT) [ 19.516858] Call trace: [ 19.516879] show_stack+0x20/0x38 (C) [ 19.517238] dump_stack_lvl+0x8c/0xd0 [ 19.517326] print_report+0x118/0x608 [ 19.517437] kasan_report+0xdc/0x128 [ 19.517552] __kasan_check_byte+0x54/0x70 [ 19.517616] ksize+0x30/0x88 [ 19.517758] ksize_uaf+0x168/0x5f8 [ 19.517811] kunit_try_run_case+0x170/0x3f0 [ 19.517859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.518307] kthread+0x328/0x630 [ 19.518449] ret_from_fork+0x10/0x20 [ 19.518597] [ 19.518635] Allocated by task 196: [ 19.518702] kasan_save_stack+0x3c/0x68 [ 19.518822] kasan_save_track+0x20/0x40 [ 19.518863] kasan_save_alloc_info+0x40/0x58 [ 19.519093] __kasan_kmalloc+0xd4/0xd8 [ 19.519145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.519350] ksize_uaf+0xb8/0x5f8 [ 19.519398] kunit_try_run_case+0x170/0x3f0 [ 19.519436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.519619] kthread+0x328/0x630 [ 19.519688] ret_from_fork+0x10/0x20 [ 19.519837] [ 19.519857] Freed by task 196: [ 19.519884] kasan_save_stack+0x3c/0x68 [ 19.519945] kasan_save_track+0x20/0x40 [ 19.519983] kasan_save_free_info+0x4c/0x78 [ 19.520023] __kasan_slab_free+0x6c/0x98 [ 19.520060] kfree+0x214/0x3c8 [ 19.520093] ksize_uaf+0x11c/0x5f8 [ 19.520130] kunit_try_run_case+0x170/0x3f0 [ 19.520169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520214] kthread+0x328/0x630 [ 19.520782] ret_from_fork+0x10/0x20 [ 19.520845] [ 19.520868] The buggy address belongs to the object at fff00000c5708400 [ 19.520868] which belongs to the cache kmalloc-128 of size 128 [ 19.520928] The buggy address is located 0 bytes inside of [ 19.520928] freed 128-byte region [fff00000c5708400, fff00000c5708480) [ 19.520988] [ 19.521007] The buggy address belongs to the physical page: [ 19.521044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708 [ 19.521106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.521152] page_type: f5(slab) [ 19.521208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.521266] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.521305] page dumped because: kasan: bad access detected [ 19.521336] [ 19.521353] Memory state around the buggy address: [ 19.521384] fff00000c5708300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.521439] fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.521482] >fff00000c5708400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.521521] ^ [ 19.521554] fff00000c5708480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.521606] fff00000c5708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.521643] ================================================================== [ 19.535220] ================================================================== [ 19.535340] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 19.535783] Read of size 1 at addr fff00000c5708478 by task kunit_try_catch/196 [ 19.535988] [ 19.536034] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.536358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.536454] Hardware name: linux,dummy-virt (DT) [ 19.536523] Call trace: [ 19.536638] show_stack+0x20/0x38 (C) [ 19.536730] dump_stack_lvl+0x8c/0xd0 [ 19.536782] print_report+0x118/0x608 [ 19.537128] kasan_report+0xdc/0x128 [ 19.537271] __asan_report_load1_noabort+0x20/0x30 [ 19.537704] ksize_uaf+0x544/0x5f8 [ 19.537882] kunit_try_run_case+0x170/0x3f0 [ 19.538228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.538353] kthread+0x328/0x630 [ 19.538465] ret_from_fork+0x10/0x20 [ 19.538564] [ 19.538637] Allocated by task 196: [ 19.538730] kasan_save_stack+0x3c/0x68 [ 19.539069] kasan_save_track+0x20/0x40 [ 19.539205] kasan_save_alloc_info+0x40/0x58 [ 19.539282] __kasan_kmalloc+0xd4/0xd8 [ 19.539638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.539821] ksize_uaf+0xb8/0x5f8 [ 19.539906] kunit_try_run_case+0x170/0x3f0 [ 19.539958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.540004] kthread+0x328/0x630 [ 19.540037] ret_from_fork+0x10/0x20 [ 19.540073] [ 19.540227] Freed by task 196: [ 19.540370] kasan_save_stack+0x3c/0x68 [ 19.540498] kasan_save_track+0x20/0x40 [ 19.540736] kasan_save_free_info+0x4c/0x78 [ 19.540879] __kasan_slab_free+0x6c/0x98 [ 19.541207] kfree+0x214/0x3c8 [ 19.541328] ksize_uaf+0x11c/0x5f8 [ 19.541364] kunit_try_run_case+0x170/0x3f0 [ 19.541771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541879] kthread+0x328/0x630 [ 19.541915] ret_from_fork+0x10/0x20 [ 19.541953] [ 19.542392] The buggy address belongs to the object at fff00000c5708400 [ 19.542392] which belongs to the cache kmalloc-128 of size 128 [ 19.542853] The buggy address is located 120 bytes inside of [ 19.542853] freed 128-byte region [fff00000c5708400, fff00000c5708480) [ 19.542965] [ 19.542993] The buggy address belongs to the physical page: [ 19.543089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105708 [ 19.543145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.543625] page_type: f5(slab) [ 19.543742] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.543795] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.544089] page dumped because: kasan: bad access detected [ 19.544200] [ 19.544298] Memory state around the buggy address: [ 19.544394] fff00000c5708300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.544459] fff00000c5708380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544813] >fff00000c5708400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.544962] ^ [ 19.545029] fff00000c5708480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545105] fff00000c5708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.545573] ==================================================================
[ 13.430713] ================================================================== [ 13.432070] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 13.432827] Read of size 1 at addr ffff888102602b00 by task kunit_try_catch/213 [ 13.433676] [ 13.433894] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.433940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.433951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.433972] Call Trace: [ 13.433984] <TASK> [ 13.434000] dump_stack_lvl+0x73/0xb0 [ 13.434028] print_report+0xd1/0x650 [ 13.434060] ? __virt_addr_valid+0x1db/0x2d0 [ 13.434082] ? ksize_uaf+0x19d/0x6c0 [ 13.434101] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.434126] ? ksize_uaf+0x19d/0x6c0 [ 13.434146] kasan_report+0x141/0x180 [ 13.434167] ? ksize_uaf+0x19d/0x6c0 [ 13.434189] ? ksize_uaf+0x19d/0x6c0 [ 13.434209] __kasan_check_byte+0x3d/0x50 [ 13.434230] ksize+0x20/0x60 [ 13.434250] ksize_uaf+0x19d/0x6c0 [ 13.434269] ? __pfx_ksize_uaf+0x10/0x10 [ 13.434289] ? __schedule+0x10cc/0x2b60 [ 13.434310] ? __pfx_read_tsc+0x10/0x10 [ 13.434330] ? ktime_get_ts64+0x86/0x230 [ 13.434353] kunit_try_run_case+0x1a5/0x480 [ 13.434376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.434397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.434418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.434440] ? __kthread_parkme+0x82/0x180 [ 13.434459] ? preempt_count_sub+0x50/0x80 [ 13.434482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.434575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.434615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.434637] kthread+0x337/0x6f0 [ 13.434655] ? trace_preempt_on+0x20/0xc0 [ 13.434677] ? __pfx_kthread+0x10/0x10 [ 13.434696] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.434716] ? calculate_sigpending+0x7b/0xa0 [ 13.434740] ? __pfx_kthread+0x10/0x10 [ 13.434762] ret_from_fork+0x116/0x1d0 [ 13.434779] ? __pfx_kthread+0x10/0x10 [ 13.434799] ret_from_fork_asm+0x1a/0x30 [ 13.434829] </TASK> [ 13.434841] [ 13.448639] Allocated by task 213: [ 13.448977] kasan_save_stack+0x45/0x70 [ 13.449479] kasan_save_track+0x18/0x40 [ 13.449894] kasan_save_alloc_info+0x3b/0x50 [ 13.450422] __kasan_kmalloc+0xb7/0xc0 [ 13.450664] __kmalloc_cache_noprof+0x189/0x420 [ 13.450825] ksize_uaf+0xaa/0x6c0 [ 13.450948] kunit_try_run_case+0x1a5/0x480 [ 13.451167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.451690] kthread+0x337/0x6f0 [ 13.452062] ret_from_fork+0x116/0x1d0 [ 13.452661] ret_from_fork_asm+0x1a/0x30 [ 13.453128] [ 13.453291] Freed by task 213: [ 13.453637] kasan_save_stack+0x45/0x70 [ 13.453998] kasan_save_track+0x18/0x40 [ 13.454488] kasan_save_free_info+0x3f/0x60 [ 13.454743] __kasan_slab_free+0x56/0x70 [ 13.454882] kfree+0x222/0x3f0 [ 13.455001] ksize_uaf+0x12c/0x6c0 [ 13.455272] kunit_try_run_case+0x1a5/0x480 [ 13.455831] kthread+0x337/0x6f0 [ 13.455967] ret_from_fork+0x116/0x1d0 [ 13.456109] ret_from_fork_asm+0x1a/0x30 [ 13.456541] [ 13.456669] The buggy address belongs to the object at ffff888102602b00 [ 13.456669] which belongs to the cache kmalloc-128 of size 128 [ 13.457185] The buggy address is located 0 bytes inside of [ 13.457185] freed 128-byte region [ffff888102602b00, ffff888102602b80) [ 13.457749] [ 13.457881] The buggy address belongs to the physical page: [ 13.458101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 13.458678] flags: 0x200000000000000(node=0|zone=2) [ 13.458853] page_type: f5(slab) [ 13.459110] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.459470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.459795] page dumped because: kasan: bad access detected [ 13.459979] [ 13.460059] Memory state around the buggy address: [ 13.460487] ffff888102602a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.460821] ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.461182] >ffff888102602b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.461590] ^ [ 13.461725] ffff888102602b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.462006] ffff888102602c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.462411] ================================================================== [ 13.484792] ================================================================== [ 13.485247] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 13.485576] Read of size 1 at addr ffff888102602b78 by task kunit_try_catch/213 [ 13.485873] [ 13.485983] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.486032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.486121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.486143] Call Trace: [ 13.486158] <TASK> [ 13.486173] dump_stack_lvl+0x73/0xb0 [ 13.486209] print_report+0xd1/0x650 [ 13.486230] ? __virt_addr_valid+0x1db/0x2d0 [ 13.486251] ? ksize_uaf+0x5e4/0x6c0 [ 13.486271] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.486307] ? ksize_uaf+0x5e4/0x6c0 [ 13.486327] kasan_report+0x141/0x180 [ 13.486347] ? ksize_uaf+0x5e4/0x6c0 [ 13.486381] __asan_report_load1_noabort+0x18/0x20 [ 13.486405] ksize_uaf+0x5e4/0x6c0 [ 13.486424] ? __pfx_ksize_uaf+0x10/0x10 [ 13.486456] ? __schedule+0x10cc/0x2b60 [ 13.486479] ? __pfx_read_tsc+0x10/0x10 [ 13.486499] ? ktime_get_ts64+0x86/0x230 [ 13.486522] kunit_try_run_case+0x1a5/0x480 [ 13.486559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.486581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.486623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.486645] ? __kthread_parkme+0x82/0x180 [ 13.486664] ? preempt_count_sub+0x50/0x80 [ 13.486687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.486709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.486731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.486753] kthread+0x337/0x6f0 [ 13.486771] ? trace_preempt_on+0x20/0xc0 [ 13.486793] ? __pfx_kthread+0x10/0x10 [ 13.486812] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.486832] ? calculate_sigpending+0x7b/0xa0 [ 13.486854] ? __pfx_kthread+0x10/0x10 [ 13.486875] ret_from_fork+0x116/0x1d0 [ 13.486892] ? __pfx_kthread+0x10/0x10 [ 13.486911] ret_from_fork_asm+0x1a/0x30 [ 13.486941] </TASK> [ 13.486951] [ 13.494673] Allocated by task 213: [ 13.494859] kasan_save_stack+0x45/0x70 [ 13.495145] kasan_save_track+0x18/0x40 [ 13.495364] kasan_save_alloc_info+0x3b/0x50 [ 13.495580] __kasan_kmalloc+0xb7/0xc0 [ 13.495766] __kmalloc_cache_noprof+0x189/0x420 [ 13.495946] ksize_uaf+0xaa/0x6c0 [ 13.496360] kunit_try_run_case+0x1a5/0x480 [ 13.496593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.496862] kthread+0x337/0x6f0 [ 13.497068] ret_from_fork+0x116/0x1d0 [ 13.497326] ret_from_fork_asm+0x1a/0x30 [ 13.497534] [ 13.497637] Freed by task 213: [ 13.497796] kasan_save_stack+0x45/0x70 [ 13.497985] kasan_save_track+0x18/0x40 [ 13.498252] kasan_save_free_info+0x3f/0x60 [ 13.498465] __kasan_slab_free+0x56/0x70 [ 13.498615] kfree+0x222/0x3f0 [ 13.498732] ksize_uaf+0x12c/0x6c0 [ 13.498856] kunit_try_run_case+0x1a5/0x480 [ 13.499071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.499320] kthread+0x337/0x6f0 [ 13.499489] ret_from_fork+0x116/0x1d0 [ 13.499674] ret_from_fork_asm+0x1a/0x30 [ 13.499868] [ 13.499944] The buggy address belongs to the object at ffff888102602b00 [ 13.499944] which belongs to the cache kmalloc-128 of size 128 [ 13.500656] The buggy address is located 120 bytes inside of [ 13.500656] freed 128-byte region [ffff888102602b00, ffff888102602b80) [ 13.501266] [ 13.501381] The buggy address belongs to the physical page: [ 13.501643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 13.501954] flags: 0x200000000000000(node=0|zone=2) [ 13.502193] page_type: f5(slab) [ 13.502322] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.502711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.503165] page dumped because: kasan: bad access detected [ 13.503433] [ 13.503543] Memory state around the buggy address: [ 13.503801] ffff888102602a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.504293] ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.504680] >ffff888102602b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.505003] ^ [ 13.505409] ffff888102602b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.505760] ffff888102602c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.506134] ================================================================== [ 13.463298] ================================================================== [ 13.463584] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 13.463923] Read of size 1 at addr ffff888102602b00 by task kunit_try_catch/213 [ 13.464529] [ 13.464650] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.464695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.464707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.464735] Call Trace: [ 13.464748] <TASK> [ 13.464764] dump_stack_lvl+0x73/0xb0 [ 13.464794] print_report+0xd1/0x650 [ 13.464815] ? __virt_addr_valid+0x1db/0x2d0 [ 13.464838] ? ksize_uaf+0x5fe/0x6c0 [ 13.464859] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.464884] ? ksize_uaf+0x5fe/0x6c0 [ 13.464903] kasan_report+0x141/0x180 [ 13.464924] ? ksize_uaf+0x5fe/0x6c0 [ 13.464950] __asan_report_load1_noabort+0x18/0x20 [ 13.464974] ksize_uaf+0x5fe/0x6c0 [ 13.464993] ? __pfx_ksize_uaf+0x10/0x10 [ 13.465013] ? __schedule+0x10cc/0x2b60 [ 13.465035] ? __pfx_read_tsc+0x10/0x10 [ 13.465065] ? ktime_get_ts64+0x86/0x230 [ 13.465090] kunit_try_run_case+0x1a5/0x480 [ 13.465113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.465134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.465156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.465178] ? __kthread_parkme+0x82/0x180 [ 13.465198] ? preempt_count_sub+0x50/0x80 [ 13.465222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.465244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.465266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.465288] kthread+0x337/0x6f0 [ 13.465306] ? trace_preempt_on+0x20/0xc0 [ 13.465328] ? __pfx_kthread+0x10/0x10 [ 13.465348] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.465368] ? calculate_sigpending+0x7b/0xa0 [ 13.465392] ? __pfx_kthread+0x10/0x10 [ 13.465413] ret_from_fork+0x116/0x1d0 [ 13.465430] ? __pfx_kthread+0x10/0x10 [ 13.465449] ret_from_fork_asm+0x1a/0x30 [ 13.465480] </TASK> [ 13.465491] [ 13.473185] Allocated by task 213: [ 13.473372] kasan_save_stack+0x45/0x70 [ 13.473538] kasan_save_track+0x18/0x40 [ 13.473736] kasan_save_alloc_info+0x3b/0x50 [ 13.473973] __kasan_kmalloc+0xb7/0xc0 [ 13.474245] __kmalloc_cache_noprof+0x189/0x420 [ 13.474454] ksize_uaf+0xaa/0x6c0 [ 13.474657] kunit_try_run_case+0x1a5/0x480 [ 13.474879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.475221] kthread+0x337/0x6f0 [ 13.475365] ret_from_fork+0x116/0x1d0 [ 13.475570] ret_from_fork_asm+0x1a/0x30 [ 13.475752] [ 13.475856] Freed by task 213: [ 13.476013] kasan_save_stack+0x45/0x70 [ 13.476228] kasan_save_track+0x18/0x40 [ 13.476367] kasan_save_free_info+0x3f/0x60 [ 13.476514] __kasan_slab_free+0x56/0x70 [ 13.476665] kfree+0x222/0x3f0 [ 13.476828] ksize_uaf+0x12c/0x6c0 [ 13.477273] kunit_try_run_case+0x1a5/0x480 [ 13.477510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.477781] kthread+0x337/0x6f0 [ 13.477963] ret_from_fork+0x116/0x1d0 [ 13.478240] ret_from_fork_asm+0x1a/0x30 [ 13.478401] [ 13.478476] The buggy address belongs to the object at ffff888102602b00 [ 13.478476] which belongs to the cache kmalloc-128 of size 128 [ 13.479005] The buggy address is located 0 bytes inside of [ 13.479005] freed 128-byte region [ffff888102602b00, ffff888102602b80) [ 13.479572] [ 13.479649] The buggy address belongs to the physical page: [ 13.479873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102602 [ 13.480452] flags: 0x200000000000000(node=0|zone=2) [ 13.480740] page_type: f5(slab) [ 13.480912] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.481322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 13.481661] page dumped because: kasan: bad access detected [ 13.481835] [ 13.481932] Memory state around the buggy address: [ 13.482247] ffff888102602a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.482562] ffff888102602a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.482875] >ffff888102602b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.483274] ^ [ 13.483435] ffff888102602b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.483783] ffff888102602c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.484258] ==================================================================