Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.137127] ================================================================== [ 17.137241] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 17.137360] Read of size 1 at addr fff00000c5acc108 by task kunit_try_catch/184 [ 17.137409] [ 17.137449] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.137544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.137570] Hardware name: linux,dummy-virt (DT) [ 17.137603] Call trace: [ 17.137626] show_stack+0x20/0x38 (C) [ 17.137677] dump_stack_lvl+0x8c/0xd0 [ 17.138034] print_report+0x118/0x5d0 [ 17.138144] kasan_report+0xdc/0x128 [ 17.138272] __asan_report_load1_noabort+0x20/0x30 [ 17.138326] kmalloc_uaf+0x300/0x338 [ 17.138534] kunit_try_run_case+0x170/0x3f0 [ 17.138642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.138753] kthread+0x328/0x630 [ 17.138806] ret_from_fork+0x10/0x20 [ 17.138862] [ 17.138882] Allocated by task 184: [ 17.138955] kasan_save_stack+0x3c/0x68 [ 17.139001] kasan_save_track+0x20/0x40 [ 17.139058] kasan_save_alloc_info+0x40/0x58 [ 17.139190] __kasan_kmalloc+0xd4/0xd8 [ 17.139258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.139328] kmalloc_uaf+0xb8/0x338 [ 17.139468] kunit_try_run_case+0x170/0x3f0 [ 17.139506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.139744] kthread+0x328/0x630 [ 17.139934] ret_from_fork+0x10/0x20 [ 17.140148] [ 17.140322] Freed by task 184: [ 17.140419] kasan_save_stack+0x3c/0x68 [ 17.140563] kasan_save_track+0x20/0x40 [ 17.140717] kasan_save_free_info+0x4c/0x78 [ 17.140779] __kasan_slab_free+0x6c/0x98 [ 17.140837] kfree+0x214/0x3c8 [ 17.141043] kmalloc_uaf+0x11c/0x338 [ 17.141278] kunit_try_run_case+0x170/0x3f0 [ 17.141441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.141617] kthread+0x328/0x630 [ 17.141688] ret_from_fork+0x10/0x20 [ 17.141734] [ 17.141761] The buggy address belongs to the object at fff00000c5acc100 [ 17.141761] which belongs to the cache kmalloc-16 of size 16 [ 17.142111] The buggy address is located 8 bytes inside of [ 17.142111] freed 16-byte region [fff00000c5acc100, fff00000c5acc110) [ 17.142214] [ 17.142513] The buggy address belongs to the physical page: [ 17.142604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105acc [ 17.142715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.142825] page_type: f5(slab) [ 17.142981] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.143075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.143227] page dumped because: kasan: bad access detected [ 17.143272] [ 17.143291] Memory state around the buggy address: [ 17.143332] fff00000c5acc000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 17.143552] fff00000c5acc080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.143901] >fff00000c5acc100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144061] ^ [ 17.144131] fff00000c5acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144250] fff00000c5acc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.144443] ==================================================================
[ 16.764167] ================================================================== [ 16.764232] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.764295] Read of size 1 at addr fff00000c5a02c28 by task kunit_try_catch/184 [ 16.764358] [ 16.764393] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.764476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.765205] Hardware name: linux,dummy-virt (DT) [ 16.765243] Call trace: [ 16.765270] show_stack+0x20/0x38 (C) [ 16.765345] dump_stack_lvl+0x8c/0xd0 [ 16.765422] print_report+0x118/0x5d0 [ 16.765612] kasan_report+0xdc/0x128 [ 16.765901] __asan_report_load1_noabort+0x20/0x30 [ 16.766072] kmalloc_uaf+0x300/0x338 [ 16.766201] kunit_try_run_case+0x170/0x3f0 [ 16.766445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.766635] kthread+0x328/0x630 [ 16.766744] ret_from_fork+0x10/0x20 [ 16.767077] [ 16.767129] Allocated by task 184: [ 16.767209] kasan_save_stack+0x3c/0x68 [ 16.767378] kasan_save_track+0x20/0x40 [ 16.767519] kasan_save_alloc_info+0x40/0x58 [ 16.767601] __kasan_kmalloc+0xd4/0xd8 [ 16.767810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.767970] kmalloc_uaf+0xb8/0x338 [ 16.768034] kunit_try_run_case+0x170/0x3f0 [ 16.768163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.768244] kthread+0x328/0x630 [ 16.768600] ret_from_fork+0x10/0x20 [ 16.768672] [ 16.768742] Freed by task 184: [ 16.768792] kasan_save_stack+0x3c/0x68 [ 16.768832] kasan_save_track+0x20/0x40 [ 16.768870] kasan_save_free_info+0x4c/0x78 [ 16.769378] __kasan_slab_free+0x6c/0x98 [ 16.769513] kfree+0x214/0x3c8 [ 16.769549] kmalloc_uaf+0x11c/0x338 [ 16.769770] kunit_try_run_case+0x170/0x3f0 [ 16.769955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.770018] kthread+0x328/0x630 [ 16.770213] ret_from_fork+0x10/0x20 [ 16.770283] [ 16.770616] The buggy address belongs to the object at fff00000c5a02c20 [ 16.770616] which belongs to the cache kmalloc-16 of size 16 [ 16.771068] The buggy address is located 8 bytes inside of [ 16.771068] freed 16-byte region [fff00000c5a02c20, fff00000c5a02c30) [ 16.771211] [ 16.771282] The buggy address belongs to the physical page: [ 16.771540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.771618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.772038] page_type: f5(slab) [ 16.772100] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.772343] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.772404] page dumped because: kasan: bad access detected [ 16.772677] [ 16.772704] Memory state around the buggy address: [ 16.772763] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.772840] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.773190] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 16.773348] ^ [ 16.773388] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773473] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773646] ==================================================================
[ 16.786773] ================================================================== [ 16.786852] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.786950] Read of size 1 at addr fff00000c5755e88 by task kunit_try_catch/184 [ 16.787029] [ 16.787063] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.787145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.787171] Hardware name: linux,dummy-virt (DT) [ 16.787203] Call trace: [ 16.787225] show_stack+0x20/0x38 (C) [ 16.787313] dump_stack_lvl+0x8c/0xd0 [ 16.787364] print_report+0x118/0x5d0 [ 16.787411] kasan_report+0xdc/0x128 [ 16.787454] __asan_report_load1_noabort+0x20/0x30 [ 16.787639] kmalloc_uaf+0x300/0x338 [ 16.787796] kunit_try_run_case+0x170/0x3f0 [ 16.787991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.788067] kthread+0x328/0x630 [ 16.788129] ret_from_fork+0x10/0x20 [ 16.788466] [ 16.788525] Allocated by task 184: [ 16.788592] kasan_save_stack+0x3c/0x68 [ 16.788697] kasan_save_track+0x20/0x40 [ 16.788786] kasan_save_alloc_info+0x40/0x58 [ 16.788853] __kasan_kmalloc+0xd4/0xd8 [ 16.788888] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.789122] kmalloc_uaf+0xb8/0x338 [ 16.789165] kunit_try_run_case+0x170/0x3f0 [ 16.789331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.789424] kthread+0x328/0x630 [ 16.789555] ret_from_fork+0x10/0x20 [ 16.789614] [ 16.789637] Freed by task 184: [ 16.789972] kasan_save_stack+0x3c/0x68 [ 16.790086] kasan_save_track+0x20/0x40 [ 16.790135] kasan_save_free_info+0x4c/0x78 [ 16.790189] __kasan_slab_free+0x6c/0x98 [ 16.790227] kfree+0x214/0x3c8 [ 16.790260] kmalloc_uaf+0x11c/0x338 [ 16.790296] kunit_try_run_case+0x170/0x3f0 [ 16.790336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.790389] kthread+0x328/0x630 [ 16.790421] ret_from_fork+0x10/0x20 [ 16.790458] [ 16.790478] The buggy address belongs to the object at fff00000c5755e80 [ 16.790478] which belongs to the cache kmalloc-16 of size 16 [ 16.790538] The buggy address is located 8 bytes inside of [ 16.790538] freed 16-byte region [fff00000c5755e80, fff00000c5755e90) [ 16.790597] [ 16.790633] The buggy address belongs to the physical page: [ 16.790669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105755 [ 16.790742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.790789] page_type: f5(slab) [ 16.790828] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.790916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.791172] page dumped because: kasan: bad access detected [ 16.791232] [ 16.791250] Memory state around the buggy address: [ 16.791284] fff00000c5755d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 16.791534] fff00000c5755e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.791682] >fff00000c5755e80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.791846] ^ [ 16.791949] fff00000c5755f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.792067] fff00000c5755f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.792205] ==================================================================
[ 12.486465] ================================================================== [ 12.488158] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 12.489267] Read of size 1 at addr ffff8881028371e8 by task kunit_try_catch/201 [ 12.490196] [ 12.490307] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.490357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.490368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.490391] Call Trace: [ 12.490404] <TASK> [ 12.490424] dump_stack_lvl+0x73/0xb0 [ 12.490459] print_report+0xd1/0x610 [ 12.490481] ? __virt_addr_valid+0x1db/0x2d0 [ 12.490506] ? kmalloc_uaf+0x320/0x380 [ 12.491134] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.491164] ? kmalloc_uaf+0x320/0x380 [ 12.491186] kasan_report+0x141/0x180 [ 12.491208] ? kmalloc_uaf+0x320/0x380 [ 12.491233] __asan_report_load1_noabort+0x18/0x20 [ 12.491258] kmalloc_uaf+0x320/0x380 [ 12.491277] ? __pfx_kmalloc_uaf+0x10/0x10 [ 12.491297] ? __schedule+0x10cc/0x2b60 [ 12.491321] ? __pfx_read_tsc+0x10/0x10 [ 12.491342] ? ktime_get_ts64+0x86/0x230 [ 12.491369] kunit_try_run_case+0x1a5/0x480 [ 12.491394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.491415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.491440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.491463] ? __kthread_parkme+0x82/0x180 [ 12.491483] ? preempt_count_sub+0x50/0x80 [ 12.491508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.491543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.491566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.491589] kthread+0x337/0x6f0 [ 12.491608] ? trace_preempt_on+0x20/0xc0 [ 12.491632] ? __pfx_kthread+0x10/0x10 [ 12.491651] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.491672] ? calculate_sigpending+0x7b/0xa0 [ 12.491696] ? __pfx_kthread+0x10/0x10 [ 12.491717] ret_from_fork+0x116/0x1d0 [ 12.491735] ? __pfx_kthread+0x10/0x10 [ 12.491754] ret_from_fork_asm+0x1a/0x30 [ 12.491787] </TASK> [ 12.491798] [ 12.503445] Allocated by task 201: [ 12.503832] kasan_save_stack+0x45/0x70 [ 12.504187] kasan_save_track+0x18/0x40 [ 12.504362] kasan_save_alloc_info+0x3b/0x50 [ 12.504702] __kasan_kmalloc+0xb7/0xc0 [ 12.504930] __kmalloc_cache_noprof+0x189/0x420 [ 12.505390] kmalloc_uaf+0xaa/0x380 [ 12.505530] kunit_try_run_case+0x1a5/0x480 [ 12.505968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.506239] kthread+0x337/0x6f0 [ 12.506532] ret_from_fork+0x116/0x1d0 [ 12.506814] ret_from_fork_asm+0x1a/0x30 [ 12.507263] [ 12.507522] Freed by task 201: [ 12.507936] kasan_save_stack+0x45/0x70 [ 12.508180] kasan_save_track+0x18/0x40 [ 12.508321] kasan_save_free_info+0x3f/0x60 [ 12.508471] __kasan_slab_free+0x56/0x70 [ 12.508929] kfree+0x222/0x3f0 [ 12.509280] kmalloc_uaf+0x12c/0x380 [ 12.509665] kunit_try_run_case+0x1a5/0x480 [ 12.510162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.510709] kthread+0x337/0x6f0 [ 12.511132] ret_from_fork+0x116/0x1d0 [ 12.511537] ret_from_fork_asm+0x1a/0x30 [ 12.511744] [ 12.511832] The buggy address belongs to the object at ffff8881028371e0 [ 12.511832] which belongs to the cache kmalloc-16 of size 16 [ 12.512212] The buggy address is located 8 bytes inside of [ 12.512212] freed 16-byte region [ffff8881028371e0, ffff8881028371f0) [ 12.512558] [ 12.512631] The buggy address belongs to the physical page: [ 12.512806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 12.513487] flags: 0x200000000000000(node=0|zone=2) [ 12.514017] page_type: f5(slab) [ 12.514358] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.515120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.515862] page dumped because: kasan: bad access detected [ 12.516522] [ 12.516678] Memory state around the buggy address: [ 12.517222] ffff888102837080: 00 04 fc fc 00 04 fc fc 00 05 fc fc 00 05 fc fc [ 12.517977] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 12.518706] >ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.519436] ^ [ 12.520114] ffff888102837200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.520792] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.521455] ==================================================================
[ 12.251724] ================================================================== [ 12.254175] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 12.255543] Read of size 1 at addr ffff888101cb3ce8 by task kunit_try_catch/202 [ 12.256134] [ 12.256306] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.256354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.256365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.256386] Call Trace: [ 12.256399] <TASK> [ 12.256416] dump_stack_lvl+0x73/0xb0 [ 12.256464] print_report+0xd1/0x610 [ 12.256489] ? __virt_addr_valid+0x1db/0x2d0 [ 12.256514] ? kmalloc_uaf+0x320/0x380 [ 12.256537] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.256563] ? kmalloc_uaf+0x320/0x380 [ 12.256584] kasan_report+0x141/0x180 [ 12.256609] ? kmalloc_uaf+0x320/0x380 [ 12.256639] __asan_report_load1_noabort+0x18/0x20 [ 12.256666] kmalloc_uaf+0x320/0x380 [ 12.256687] ? __pfx_kmalloc_uaf+0x10/0x10 [ 12.256713] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 12.256743] ? trace_hardirqs_on+0x37/0xe0 [ 12.256774] ? __pfx_read_tsc+0x10/0x10 [ 12.256796] ? ktime_get_ts64+0x86/0x230 [ 12.256821] kunit_try_run_case+0x1a5/0x480 [ 12.256848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.256873] ? queued_spin_lock_slowpath+0x116/0xb40 [ 12.256906] ? __kthread_parkme+0x82/0x180 [ 12.256930] ? preempt_count_sub+0x50/0x80 [ 12.256957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.256982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.257014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.257042] kthread+0x337/0x6f0 [ 12.257063] ? trace_preempt_on+0x20/0xc0 [ 12.257087] ? __pfx_kthread+0x10/0x10 [ 12.257111] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.257141] ? calculate_sigpending+0x7b/0xa0 [ 12.257172] ? __pfx_kthread+0x10/0x10 [ 12.257195] ret_from_fork+0x116/0x1d0 [ 12.257218] ? __pfx_kthread+0x10/0x10 [ 12.257239] ret_from_fork_asm+0x1a/0x30 [ 12.257276] </TASK> [ 12.257287] [ 12.270455] Allocated by task 202: [ 12.270593] kasan_save_stack+0x45/0x70 [ 12.270741] kasan_save_track+0x18/0x40 [ 12.270876] kasan_save_alloc_info+0x3b/0x50 [ 12.271056] __kasan_kmalloc+0xb7/0xc0 [ 12.271239] __kmalloc_cache_noprof+0x189/0x420 [ 12.272212] kmalloc_uaf+0xaa/0x380 [ 12.272400] kunit_try_run_case+0x1a5/0x480 [ 12.272619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.272913] kthread+0x337/0x6f0 [ 12.273078] ret_from_fork+0x116/0x1d0 [ 12.273217] ret_from_fork_asm+0x1a/0x30 [ 12.273361] [ 12.273468] Freed by task 202: [ 12.274554] kasan_save_stack+0x45/0x70 [ 12.274766] kasan_save_track+0x18/0x40 [ 12.274951] kasan_save_free_info+0x3f/0x60 [ 12.275135] __kasan_slab_free+0x56/0x70 [ 12.275333] kfree+0x222/0x3f0 [ 12.275526] kmalloc_uaf+0x12c/0x380 [ 12.276569] kunit_try_run_case+0x1a5/0x480 [ 12.276952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.277168] kthread+0x337/0x6f0 [ 12.277330] ret_from_fork+0x116/0x1d0 [ 12.277523] ret_from_fork_asm+0x1a/0x30 [ 12.278707] [ 12.278782] The buggy address belongs to the object at ffff888101cb3ce0 [ 12.278782] which belongs to the cache kmalloc-16 of size 16 [ 12.279223] The buggy address is located 8 bytes inside of [ 12.279223] freed 16-byte region [ffff888101cb3ce0, ffff888101cb3cf0) [ 12.279753] [ 12.279835] The buggy address belongs to the physical page: [ 12.280020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cb3 [ 12.280374] flags: 0x200000000000000(node=0|zone=2) [ 12.280592] page_type: f5(slab) [ 12.281541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.281898] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.282179] page dumped because: kasan: bad access detected [ 12.282417] [ 12.282522] Memory state around the buggy address: [ 12.282714] ffff888101cb3b80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 12.282996] ffff888101cb3c00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 12.283287] >ffff888101cb3c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.284722] ^ [ 12.284946] ffff888101cb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.285271] ffff888101cb3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.285520] ==================================================================
[ 12.428407] ================================================================== [ 12.428889] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 12.430513] Read of size 1 at addr ffff888102712168 by task kunit_try_catch/201 [ 12.431714] [ 12.432146] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.432353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.432370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.432407] Call Trace: [ 12.432476] <TASK> [ 12.432498] dump_stack_lvl+0x73/0xb0 [ 12.432540] print_report+0xd1/0x610 [ 12.432565] ? __virt_addr_valid+0x1db/0x2d0 [ 12.432591] ? kmalloc_uaf+0x320/0x380 [ 12.432610] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.432632] ? kmalloc_uaf+0x320/0x380 [ 12.432652] kasan_report+0x141/0x180 [ 12.432674] ? kmalloc_uaf+0x320/0x380 [ 12.432697] __asan_report_load1_noabort+0x18/0x20 [ 12.432721] kmalloc_uaf+0x320/0x380 [ 12.432741] ? __pfx_kmalloc_uaf+0x10/0x10 [ 12.432761] ? __schedule+0x10cc/0x2b60 [ 12.432783] ? __pfx_read_tsc+0x10/0x10 [ 12.432805] ? ktime_get_ts64+0x86/0x230 [ 12.432830] kunit_try_run_case+0x1a5/0x480 [ 12.432864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.432886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.432910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.432933] ? __kthread_parkme+0x82/0x180 [ 12.432954] ? preempt_count_sub+0x50/0x80 [ 12.432978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.433035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.433059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.433083] kthread+0x337/0x6f0 [ 12.433102] ? trace_preempt_on+0x20/0xc0 [ 12.433126] ? __pfx_kthread+0x10/0x10 [ 12.433146] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.433167] ? calculate_sigpending+0x7b/0xa0 [ 12.433191] ? __pfx_kthread+0x10/0x10 [ 12.433212] ret_from_fork+0x116/0x1d0 [ 12.433231] ? __pfx_kthread+0x10/0x10 [ 12.433250] ret_from_fork_asm+0x1a/0x30 [ 12.433282] </TASK> [ 12.433293] [ 12.446856] Allocated by task 201: [ 12.447179] kasan_save_stack+0x45/0x70 [ 12.447583] kasan_save_track+0x18/0x40 [ 12.447718] kasan_save_alloc_info+0x3b/0x50 [ 12.447864] __kasan_kmalloc+0xb7/0xc0 [ 12.447992] __kmalloc_cache_noprof+0x189/0x420 [ 12.448501] kmalloc_uaf+0xaa/0x380 [ 12.448870] kunit_try_run_case+0x1a5/0x480 [ 12.449359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.450028] kthread+0x337/0x6f0 [ 12.450404] ret_from_fork+0x116/0x1d0 [ 12.450869] ret_from_fork_asm+0x1a/0x30 [ 12.451167] [ 12.451389] Freed by task 201: [ 12.451743] kasan_save_stack+0x45/0x70 [ 12.452178] kasan_save_track+0x18/0x40 [ 12.452729] kasan_save_free_info+0x3f/0x60 [ 12.453155] __kasan_slab_free+0x56/0x70 [ 12.453486] kfree+0x222/0x3f0 [ 12.453606] kmalloc_uaf+0x12c/0x380 [ 12.453733] kunit_try_run_case+0x1a5/0x480 [ 12.453880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.454183] kthread+0x337/0x6f0 [ 12.454499] ret_from_fork+0x116/0x1d0 [ 12.454834] ret_from_fork_asm+0x1a/0x30 [ 12.455275] [ 12.455518] The buggy address belongs to the object at ffff888102712160 [ 12.455518] which belongs to the cache kmalloc-16 of size 16 [ 12.456680] The buggy address is located 8 bytes inside of [ 12.456680] freed 16-byte region [ffff888102712160, ffff888102712170) [ 12.457902] [ 12.457990] The buggy address belongs to the physical page: [ 12.458396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 12.459147] flags: 0x200000000000000(node=0|zone=2) [ 12.459430] page_type: f5(slab) [ 12.459561] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.459794] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.460075] page dumped because: kasan: bad access detected [ 12.460577] [ 12.460763] Memory state around the buggy address: [ 12.461284] ffff888102712000: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 12.462040] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 12.463062] >ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.464053] ^ [ 12.464672] ffff888102712180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.464905] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.465600] ==================================================================