Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   48.663543] ==================================================================
[   48.678680] BUG: KASAN: use-after-free in page_alloc_uaf+0x368/0x39c
[   48.685089] Read of size 1 at addr ccbb0000 by task kunit_try_catch/210
[   48.691741] 
[   48.693237] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   48.693267] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.693298] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.693298] Call trace: 
[   48.693298]  unwind_backtrace from show_stack+0x18/0x1c
[   48.693328]  show_stack from dump_stack_lvl+0x70/0x90
[   48.693359]  dump_stack_lvl from print_report+0x158/0x528
[   48.693389]  print_report from kasan_report+0xdc/0x118
[   48.693389]  kasan_report from page_alloc_uaf+0x368/0x39c
[   48.693420]  page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   48.693450]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.693481]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.693481]  kthread from ret_from_fork+0x14/0x20
[   48.693511] Exception stack(0xf23bbfb0 to 0xf23bbff8)
[   48.693542] bfa0:                                     00000000 00000000 00000000 00000000
[   48.693542] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.693572] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.693572] 
[   48.797912] The buggy address belongs to the physical page:
[   48.803527] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cbb0
[   48.810791] flags: 0x0(zone=0)
[   48.813873] page_type: f0(buddy)
[   48.817138] raw: 00000000 c69ddb10 c69ddb10 00000000 00000000 00000004 f0000000 00000000
[   48.825286] raw: 00000000
[   48.827911] page dumped because: kasan: bad access detected
[   48.833526] 
[   48.835021] Memory state around the buggy address:
[   48.839843]  ccbaff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.846435]  ccbaff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.852996] >ccbb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.859558]            ^
[   48.862121]  ccbb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.868682]  ccbb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.875244] ==================================================================

[   17.078843] ==================================================================
[   17.093916] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   17.100284] Read of size 1 at addr ffff888107fb0000 by task kunit_try_catch/197
[   17.107598] 
[   17.109099] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.109107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.109109] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.109113] Call Trace:
[   17.109114]  <TASK>
[   17.109116]  dump_stack_lvl+0x73/0xb0
[   17.109120]  print_report+0xd1/0x650
[   17.109125]  ? __virt_addr_valid+0x1db/0x2d0
[   17.109128]  ? page_alloc_uaf+0x356/0x3d0
[   17.109133]  ? kasan_addr_to_slab+0x11/0xa0
[   17.109136]  ? page_alloc_uaf+0x356/0x3d0
[   17.109141]  kasan_report+0x141/0x180
[   17.109145]  ? page_alloc_uaf+0x356/0x3d0
[   17.109150]  __asan_report_load1_noabort+0x18/0x20
[   17.109153]  page_alloc_uaf+0x356/0x3d0
[   17.109158]  ? __pfx_page_alloc_uaf+0x10/0x10
[   17.109162]  ? __schedule+0x10cc/0x2b30
[   17.109166]  ? ktime_get_ts64+0x83/0x230
[   17.109171]  kunit_try_run_case+0x1a2/0x480
[   17.109175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.109180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.109184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.109189]  ? __kthread_parkme+0x82/0x180
[   17.109193]  ? preempt_count_sub+0x50/0x80
[   17.109197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.109201]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.109205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.109209]  kthread+0x334/0x6f0
[   17.109213]  ? trace_preempt_on+0x20/0xc0
[   17.109218]  ? __pfx_kthread+0x10/0x10
[   17.109222]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.109226]  ? calculate_sigpending+0x7b/0xa0
[   17.109230]  ? __pfx_kthread+0x10/0x10
[   17.109234]  ret_from_fork+0x3e/0x80
[   17.109238]  ? __pfx_kthread+0x10/0x10
[   17.109242]  ret_from_fork_asm+0x1a/0x30
[   17.109248]  </TASK>
[   17.109249] 
[   17.269543] The buggy address belongs to the physical page:
[   17.275118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fb0
[   17.283125] flags: 0x200000000000000(node=0|zone=2)
[   17.288003] page_type: f0(buddy)
[   17.291237] raw: 0200000000000000 ffff88846fffd3e0 ffff88846fffd3e0 0000000000000000
[   17.298978] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.306732] page dumped because: kasan: bad access detected
[   17.312303] 
[   17.313804] Memory state around the buggy address:
[   17.318596]  ffff888107faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.325816]  ffff888107faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.333034] >ffff888107fb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.340252]                    ^
[   17.343486]  ffff888107fb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.350704]  ffff888107fb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.357940] ==================================================================