Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.951137] ================================================================== [ 16.951242] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 16.951563] Read of size 16 at addr fff00000c5acc0e0 by task kunit_try_catch/168 [ 16.951859] [ 16.952075] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.952349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.952542] Hardware name: linux,dummy-virt (DT) [ 16.952679] Call trace: [ 16.952779] show_stack+0x20/0x38 (C) [ 16.952860] dump_stack_lvl+0x8c/0xd0 [ 16.952962] print_report+0x118/0x5d0 [ 16.953157] kasan_report+0xdc/0x128 [ 16.953255] __asan_report_load16_noabort+0x20/0x30 [ 16.953325] kmalloc_uaf_16+0x3bc/0x438 [ 16.953710] kunit_try_run_case+0x170/0x3f0 [ 16.953890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.953970] kthread+0x328/0x630 [ 16.954016] ret_from_fork+0x10/0x20 [ 16.954067] [ 16.954086] Allocated by task 168: [ 16.954121] kasan_save_stack+0x3c/0x68 [ 16.954192] kasan_save_track+0x20/0x40 [ 16.954246] kasan_save_alloc_info+0x40/0x58 [ 16.954286] __kasan_kmalloc+0xd4/0xd8 [ 16.954331] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.954369] kmalloc_uaf_16+0x140/0x438 [ 16.954413] kunit_try_run_case+0x170/0x3f0 [ 16.954450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.954504] kthread+0x328/0x630 [ 16.954534] ret_from_fork+0x10/0x20 [ 16.954568] [ 16.954586] Freed by task 168: [ 16.954623] kasan_save_stack+0x3c/0x68 [ 16.954659] kasan_save_track+0x20/0x40 [ 16.954703] kasan_save_free_info+0x4c/0x78 [ 16.954741] __kasan_slab_free+0x6c/0x98 [ 16.954776] kfree+0x214/0x3c8 [ 16.954817] kmalloc_uaf_16+0x190/0x438 [ 16.954877] kunit_try_run_case+0x170/0x3f0 [ 16.954920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.954993] kthread+0x328/0x630 [ 16.955033] ret_from_fork+0x10/0x20 [ 16.955068] [ 16.955096] The buggy address belongs to the object at fff00000c5acc0e0 [ 16.955096] which belongs to the cache kmalloc-16 of size 16 [ 16.955161] The buggy address is located 0 bytes inside of [ 16.955161] freed 16-byte region [fff00000c5acc0e0, fff00000c5acc0f0) [ 16.955229] [ 16.955251] The buggy address belongs to the physical page: [ 16.955283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105acc [ 16.955616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.956046] page_type: f5(slab) [ 16.956272] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.956332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.956373] page dumped because: kasan: bad access detected [ 16.956405] [ 16.956423] Memory state around the buggy address: [ 16.956457] fff00000c5acbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.956719] fff00000c5acc000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 16.957060] >fff00000c5acc080: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 16.957128] ^ [ 16.957248] fff00000c5acc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.957374] fff00000c5acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.957432] ==================================================================
[ 16.622263] ================================================================== [ 16.622337] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 16.622389] Read of size 16 at addr fff00000c5a02c00 by task kunit_try_catch/168 [ 16.622646] [ 16.622733] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.622866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.622921] Hardware name: linux,dummy-virt (DT) [ 16.622959] Call trace: [ 16.622983] show_stack+0x20/0x38 (C) [ 16.623335] dump_stack_lvl+0x8c/0xd0 [ 16.623391] print_report+0x118/0x5d0 [ 16.623502] kasan_report+0xdc/0x128 [ 16.623596] __asan_report_load16_noabort+0x20/0x30 [ 16.623650] kmalloc_uaf_16+0x3bc/0x438 [ 16.623695] kunit_try_run_case+0x170/0x3f0 [ 16.623741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.623837] kthread+0x328/0x630 [ 16.623877] ret_from_fork+0x10/0x20 [ 16.624178] [ 16.624213] Allocated by task 168: [ 16.624252] kasan_save_stack+0x3c/0x68 [ 16.624296] kasan_save_track+0x20/0x40 [ 16.624354] kasan_save_alloc_info+0x40/0x58 [ 16.624403] __kasan_kmalloc+0xd4/0xd8 [ 16.624439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.624555] kmalloc_uaf_16+0x140/0x438 [ 16.624663] kunit_try_run_case+0x170/0x3f0 [ 16.624804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.625110] kthread+0x328/0x630 [ 16.625222] ret_from_fork+0x10/0x20 [ 16.625393] [ 16.625594] Freed by task 168: [ 16.625684] kasan_save_stack+0x3c/0x68 [ 16.625799] kasan_save_track+0x20/0x40 [ 16.625881] kasan_save_free_info+0x4c/0x78 [ 16.626058] __kasan_slab_free+0x6c/0x98 [ 16.626140] kfree+0x214/0x3c8 [ 16.626295] kmalloc_uaf_16+0x190/0x438 [ 16.626342] kunit_try_run_case+0x170/0x3f0 [ 16.626543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.626720] kthread+0x328/0x630 [ 16.626776] ret_from_fork+0x10/0x20 [ 16.626840] [ 16.626979] The buggy address belongs to the object at fff00000c5a02c00 [ 16.626979] which belongs to the cache kmalloc-16 of size 16 [ 16.627158] The buggy address is located 0 bytes inside of [ 16.627158] freed 16-byte region [fff00000c5a02c00, fff00000c5a02c10) [ 16.627277] [ 16.627333] The buggy address belongs to the physical page: [ 16.627654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 16.627743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.627894] page_type: f5(slab) [ 16.627964] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.628077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.628182] page dumped because: kasan: bad access detected [ 16.628268] [ 16.628626] Memory state around the buggy address: [ 16.628701] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.628850] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 16.628939] >fff00000c5a02c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.629067] ^ [ 16.629115] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.629261] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.629449] ==================================================================
[ 16.633303] ================================================================== [ 16.633379] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 16.633566] Read of size 16 at addr fff00000c5755e60 by task kunit_try_catch/168 [ 16.633735] [ 16.633782] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.634113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.634223] Hardware name: linux,dummy-virt (DT) [ 16.634261] Call trace: [ 16.634471] show_stack+0x20/0x38 (C) [ 16.634654] dump_stack_lvl+0x8c/0xd0 [ 16.634726] print_report+0x118/0x5d0 [ 16.634773] kasan_report+0xdc/0x128 [ 16.634819] __asan_report_load16_noabort+0x20/0x30 [ 16.635673] kmalloc_uaf_16+0x3bc/0x438 [ 16.635958] kunit_try_run_case+0x170/0x3f0 [ 16.636281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.636707] kthread+0x328/0x630 [ 16.636846] ret_from_fork+0x10/0x20 [ 16.636896] [ 16.636915] Allocated by task 168: [ 16.637246] kasan_save_stack+0x3c/0x68 [ 16.637419] kasan_save_track+0x20/0x40 [ 16.637705] kasan_save_alloc_info+0x40/0x58 [ 16.637859] __kasan_kmalloc+0xd4/0xd8 [ 16.638239] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.638459] kmalloc_uaf_16+0x140/0x438 [ 16.638500] kunit_try_run_case+0x170/0x3f0 [ 16.638538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.638579] kthread+0x328/0x630 [ 16.638610] ret_from_fork+0x10/0x20 [ 16.638667] [ 16.638695] Freed by task 168: [ 16.638733] kasan_save_stack+0x3c/0x68 [ 16.638772] kasan_save_track+0x20/0x40 [ 16.638816] kasan_save_free_info+0x4c/0x78 [ 16.639081] __kasan_slab_free+0x6c/0x98 [ 16.639160] kfree+0x214/0x3c8 [ 16.639203] kmalloc_uaf_16+0x190/0x438 [ 16.639237] kunit_try_run_case+0x170/0x3f0 [ 16.639605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.639889] kthread+0x328/0x630 [ 16.639951] ret_from_fork+0x10/0x20 [ 16.640056] [ 16.640156] The buggy address belongs to the object at fff00000c5755e60 [ 16.640156] which belongs to the cache kmalloc-16 of size 16 [ 16.640575] The buggy address is located 0 bytes inside of [ 16.640575] freed 16-byte region [fff00000c5755e60, fff00000c5755e70) [ 16.640781] [ 16.640871] The buggy address belongs to the physical page: [ 16.641055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105755 [ 16.641194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.641493] page_type: f5(slab) [ 16.641841] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.642017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.642059] page dumped because: kasan: bad access detected [ 16.642331] [ 16.642469] Memory state around the buggy address: [ 16.643032] fff00000c5755d00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.643185] fff00000c5755d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 16.643309] >fff00000c5755e00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 16.643409] ^ [ 16.643486] fff00000c5755e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.643529] fff00000c5755f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.643578] ==================================================================
[ 12.276387] ================================================================== [ 12.277137] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 12.277444] Read of size 16 at addr ffff8881028371c0 by task kunit_try_catch/185 [ 12.277846] [ 12.277980] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.278036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.278047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.278069] Call Trace: [ 12.278081] <TASK> [ 12.278098] dump_stack_lvl+0x73/0xb0 [ 12.278130] print_report+0xd1/0x610 [ 12.278151] ? __virt_addr_valid+0x1db/0x2d0 [ 12.278174] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.278193] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.278216] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.278237] kasan_report+0x141/0x180 [ 12.278258] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.278283] __asan_report_load16_noabort+0x18/0x20 [ 12.278308] kmalloc_uaf_16+0x47b/0x4c0 [ 12.278328] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 12.278351] ? __schedule+0x10cc/0x2b60 [ 12.278373] ? __pfx_read_tsc+0x10/0x10 [ 12.278393] ? ktime_get_ts64+0x86/0x230 [ 12.278417] kunit_try_run_case+0x1a5/0x480 [ 12.278442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.278464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.278488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.278512] ? __kthread_parkme+0x82/0x180 [ 12.278532] ? preempt_count_sub+0x50/0x80 [ 12.278556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.278580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.278603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.278626] kthread+0x337/0x6f0 [ 12.278645] ? trace_preempt_on+0x20/0xc0 [ 12.278669] ? __pfx_kthread+0x10/0x10 [ 12.278700] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.278721] ? calculate_sigpending+0x7b/0xa0 [ 12.278744] ? __pfx_kthread+0x10/0x10 [ 12.278770] ret_from_fork+0x116/0x1d0 [ 12.278787] ? __pfx_kthread+0x10/0x10 [ 12.278807] ret_from_fork_asm+0x1a/0x30 [ 12.278839] </TASK> [ 12.278849] [ 12.285937] Allocated by task 185: [ 12.286073] kasan_save_stack+0x45/0x70 [ 12.286283] kasan_save_track+0x18/0x40 [ 12.286490] kasan_save_alloc_info+0x3b/0x50 [ 12.286749] __kasan_kmalloc+0xb7/0xc0 [ 12.286951] __kmalloc_cache_noprof+0x189/0x420 [ 12.287232] kmalloc_uaf_16+0x15b/0x4c0 [ 12.287445] kunit_try_run_case+0x1a5/0x480 [ 12.287803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.288118] kthread+0x337/0x6f0 [ 12.288267] ret_from_fork+0x116/0x1d0 [ 12.288434] ret_from_fork_asm+0x1a/0x30 [ 12.288746] [ 12.288852] Freed by task 185: [ 12.289003] kasan_save_stack+0x45/0x70 [ 12.289192] kasan_save_track+0x18/0x40 [ 12.289329] kasan_save_free_info+0x3f/0x60 [ 12.289512] __kasan_slab_free+0x56/0x70 [ 12.289772] kfree+0x222/0x3f0 [ 12.289951] kmalloc_uaf_16+0x1d6/0x4c0 [ 12.290154] kunit_try_run_case+0x1a5/0x480 [ 12.290350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.290615] kthread+0x337/0x6f0 [ 12.290743] ret_from_fork+0x116/0x1d0 [ 12.290913] ret_from_fork_asm+0x1a/0x30 [ 12.291104] [ 12.291175] The buggy address belongs to the object at ffff8881028371c0 [ 12.291175] which belongs to the cache kmalloc-16 of size 16 [ 12.291780] The buggy address is located 0 bytes inside of [ 12.291780] freed 16-byte region [ffff8881028371c0, ffff8881028371d0) [ 12.292145] [ 12.292218] The buggy address belongs to the physical page: [ 12.292397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 12.292642] flags: 0x200000000000000(node=0|zone=2) [ 12.292815] page_type: f5(slab) [ 12.292994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.293418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.294081] page dumped because: kasan: bad access detected [ 12.294335] [ 12.294425] Memory state around the buggy address: [ 12.294653] ffff888102837080: 00 04 fc fc 00 04 fc fc 00 05 fc fc 00 05 fc fc [ 12.294983] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 12.295207] >ffff888102837180: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 12.295420] ^ [ 12.295587] ffff888102837200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.295864] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.296348] ==================================================================
[ 12.026845] ================================================================== [ 12.027292] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 12.027640] Read of size 16 at addr ffff888101cb3cc0 by task kunit_try_catch/186 [ 12.027943] [ 12.028300] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.028346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.028357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.028377] Call Trace: [ 12.028387] <TASK> [ 12.028401] dump_stack_lvl+0x73/0xb0 [ 12.028430] print_report+0xd1/0x610 [ 12.028466] ? __virt_addr_valid+0x1db/0x2d0 [ 12.028511] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.028532] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.028563] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.028584] kasan_report+0x141/0x180 [ 12.028606] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.028632] __asan_report_load16_noabort+0x18/0x20 [ 12.028656] kmalloc_uaf_16+0x47b/0x4c0 [ 12.028677] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 12.028772] ? __schedule+0x207f/0x2b60 [ 12.028794] ? __pfx_read_tsc+0x10/0x10 [ 12.028815] ? ktime_get_ts64+0x86/0x230 [ 12.028839] kunit_try_run_case+0x1a5/0x480 [ 12.028862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.028884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.028907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.028930] ? __kthread_parkme+0x82/0x180 [ 12.028949] ? preempt_count_sub+0x50/0x80 [ 12.028993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.029016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.029040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.029063] kthread+0x337/0x6f0 [ 12.029081] ? trace_preempt_on+0x20/0xc0 [ 12.029104] ? __pfx_kthread+0x10/0x10 [ 12.029124] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.029150] ? calculate_sigpending+0x7b/0xa0 [ 12.029189] ? __pfx_kthread+0x10/0x10 [ 12.029211] ret_from_fork+0x116/0x1d0 [ 12.029229] ? __pfx_kthread+0x10/0x10 [ 12.029249] ret_from_fork_asm+0x1a/0x30 [ 12.029281] </TASK> [ 12.029292] [ 12.036952] Allocated by task 186: [ 12.037119] kasan_save_stack+0x45/0x70 [ 12.037324] kasan_save_track+0x18/0x40 [ 12.037596] kasan_save_alloc_info+0x3b/0x50 [ 12.037772] __kasan_kmalloc+0xb7/0xc0 [ 12.037900] __kmalloc_cache_noprof+0x189/0x420 [ 12.038053] kmalloc_uaf_16+0x15b/0x4c0 [ 12.038204] kunit_try_run_case+0x1a5/0x480 [ 12.038400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.038973] kthread+0x337/0x6f0 [ 12.039118] ret_from_fork+0x116/0x1d0 [ 12.039248] ret_from_fork_asm+0x1a/0x30 [ 12.039383] [ 12.039462] Freed by task 186: [ 12.039570] kasan_save_stack+0x45/0x70 [ 12.039907] kasan_save_track+0x18/0x40 [ 12.040106] kasan_save_free_info+0x3f/0x60 [ 12.040667] __kasan_slab_free+0x56/0x70 [ 12.040910] kfree+0x222/0x3f0 [ 12.041077] kmalloc_uaf_16+0x1d6/0x4c0 [ 12.041279] kunit_try_run_case+0x1a5/0x480 [ 12.041604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.041912] kthread+0x337/0x6f0 [ 12.042101] ret_from_fork+0x116/0x1d0 [ 12.042293] ret_from_fork_asm+0x1a/0x30 [ 12.042495] [ 12.042587] The buggy address belongs to the object at ffff888101cb3cc0 [ 12.042587] which belongs to the cache kmalloc-16 of size 16 [ 12.043314] The buggy address is located 0 bytes inside of [ 12.043314] freed 16-byte region [ffff888101cb3cc0, ffff888101cb3cd0) [ 12.043661] [ 12.043732] The buggy address belongs to the physical page: [ 12.043898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cb3 [ 12.044522] flags: 0x200000000000000(node=0|zone=2) [ 12.044766] page_type: f5(slab) [ 12.044952] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.045338] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.045680] page dumped because: kasan: bad access detected [ 12.045931] [ 12.046038] Memory state around the buggy address: [ 12.046454] ffff888101cb3b80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 12.047076] ffff888101cb3c00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 12.047637] >ffff888101cb3c80: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 12.047842] ^ [ 12.048076] ffff888101cb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.048430] ffff888101cb3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.048824] ==================================================================
[ 12.182819] ================================================================== [ 12.183740] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 12.184678] Read of size 16 at addr ffff888102712140 by task kunit_try_catch/185 [ 12.185210] [ 12.185339] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.185392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.185403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.185426] Call Trace: [ 12.185440] <TASK> [ 12.185459] dump_stack_lvl+0x73/0xb0 [ 12.185494] print_report+0xd1/0x610 [ 12.185518] ? __virt_addr_valid+0x1db/0x2d0 [ 12.185542] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.185562] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.185584] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.185604] kasan_report+0x141/0x180 [ 12.185625] ? kmalloc_uaf_16+0x47b/0x4c0 [ 12.185649] __asan_report_load16_noabort+0x18/0x20 [ 12.185674] kmalloc_uaf_16+0x47b/0x4c0 [ 12.185694] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 12.185715] ? __schedule+0x10cc/0x2b60 [ 12.185738] ? __pfx_read_tsc+0x10/0x10 [ 12.185759] ? ktime_get_ts64+0x86/0x230 [ 12.185786] kunit_try_run_case+0x1a5/0x480 [ 12.185813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.185835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.185860] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.185884] ? __kthread_parkme+0x82/0x180 [ 12.185909] ? preempt_count_sub+0x50/0x80 [ 12.185934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.185960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.185984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.186017] kthread+0x337/0x6f0 [ 12.186036] ? trace_preempt_on+0x20/0xc0 [ 12.186060] ? __pfx_kthread+0x10/0x10 [ 12.186079] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.186100] ? calculate_sigpending+0x7b/0xa0 [ 12.186125] ? __pfx_kthread+0x10/0x10 [ 12.186146] ret_from_fork+0x116/0x1d0 [ 12.186164] ? __pfx_kthread+0x10/0x10 [ 12.186184] ret_from_fork_asm+0x1a/0x30 [ 12.186215] </TASK> [ 12.186225] [ 12.195808] Allocated by task 185: [ 12.196170] kasan_save_stack+0x45/0x70 [ 12.196360] kasan_save_track+0x18/0x40 [ 12.196988] kasan_save_alloc_info+0x3b/0x50 [ 12.197288] __kasan_kmalloc+0xb7/0xc0 [ 12.197512] __kmalloc_cache_noprof+0x189/0x420 [ 12.197725] kmalloc_uaf_16+0x15b/0x4c0 [ 12.197905] kunit_try_run_case+0x1a5/0x480 [ 12.198386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.198769] kthread+0x337/0x6f0 [ 12.198936] ret_from_fork+0x116/0x1d0 [ 12.199587] ret_from_fork_asm+0x1a/0x30 [ 12.199838] [ 12.200358] Freed by task 185: [ 12.200675] kasan_save_stack+0x45/0x70 [ 12.200882] kasan_save_track+0x18/0x40 [ 12.201377] kasan_save_free_info+0x3f/0x60 [ 12.201859] __kasan_slab_free+0x56/0x70 [ 12.202131] kfree+0x222/0x3f0 [ 12.202289] kmalloc_uaf_16+0x1d6/0x4c0 [ 12.202504] kunit_try_run_case+0x1a5/0x480 [ 12.202695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.202919] kthread+0x337/0x6f0 [ 12.203454] ret_from_fork+0x116/0x1d0 [ 12.203855] ret_from_fork_asm+0x1a/0x30 [ 12.204119] [ 12.204214] The buggy address belongs to the object at ffff888102712140 [ 12.204214] which belongs to the cache kmalloc-16 of size 16 [ 12.205194] The buggy address is located 0 bytes inside of [ 12.205194] freed 16-byte region [ffff888102712140, ffff888102712150) [ 12.205833] [ 12.205929] The buggy address belongs to the physical page: [ 12.206507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 12.206849] flags: 0x200000000000000(node=0|zone=2) [ 12.207314] page_type: f5(slab) [ 12.207727] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.208290] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.208882] page dumped because: kasan: bad access detected [ 12.209443] [ 12.209538] Memory state around the buggy address: [ 12.209924] ffff888102712000: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 04 fc fc [ 12.210933] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 12.211508] >ffff888102712100: 00 04 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 12.211979] ^ [ 12.212481] ffff888102712180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.212782] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.213352] ==================================================================