Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 26.716993] ================================================================== [ 26.726179] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.732953] Read of size 16 at addr ffff000800c2f060 by task kunit_try_catch/215 [ 26.740326] [ 26.741813] CPU: 5 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.741873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.741891] Hardware name: WinLink E850-96 board (DT) [ 26.741911] Call trace: [ 26.741925] show_stack+0x20/0x38 (C) [ 26.741959] dump_stack_lvl+0x8c/0xd0 [ 26.741996] print_report+0x118/0x608 [ 26.742031] kasan_report+0xdc/0x128 [ 26.742064] __asan_report_load16_noabort+0x20/0x30 [ 26.742104] kmalloc_uaf_16+0x3bc/0x438 [ 26.742134] kunit_try_run_case+0x170/0x3f0 [ 26.742169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.742206] kthread+0x328/0x630 [ 26.742236] ret_from_fork+0x10/0x20 [ 26.742270] [ 26.804389] Allocated by task 215: [ 26.807776] kasan_save_stack+0x3c/0x68 [ 26.811595] kasan_save_track+0x20/0x40 [ 26.815411] kasan_save_alloc_info+0x40/0x58 [ 26.819665] __kasan_kmalloc+0xd4/0xd8 [ 26.823397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.827911] kmalloc_uaf_16+0x140/0x438 [ 26.831731] kunit_try_run_case+0x170/0x3f0 [ 26.835897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.841366] kthread+0x328/0x630 [ 26.844578] ret_from_fork+0x10/0x20 [ 26.848137] [ 26.849614] Freed by task 215: [ 26.852652] kasan_save_stack+0x3c/0x68 [ 26.856470] kasan_save_track+0x20/0x40 [ 26.860289] kasan_save_free_info+0x4c/0x78 [ 26.864456] __kasan_slab_free+0x6c/0x98 [ 26.868362] kfree+0x214/0x3c8 [ 26.871400] kmalloc_uaf_16+0x190/0x438 [ 26.875220] kunit_try_run_case+0x170/0x3f0 [ 26.879386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.884855] kthread+0x328/0x630 [ 26.888067] ret_from_fork+0x10/0x20 [ 26.891626] [ 26.893103] The buggy address belongs to the object at ffff000800c2f060 [ 26.893103] which belongs to the cache kmalloc-16 of size 16 [ 26.905429] The buggy address is located 0 bytes inside of [ 26.905429] freed 16-byte region [ffff000800c2f060, ffff000800c2f070) [ 26.917406] [ 26.918886] The buggy address belongs to the physical page: [ 26.924441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f [ 26.932426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.938935] page_type: f5(slab) [ 26.942071] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.949792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.957512] page dumped because: kasan: bad access detected [ 26.963065] [ 26.964541] Memory state around the buggy address: [ 26.969322] ffff000800c2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.976524] ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.983729] >ffff000800c2f000: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 26.990930] ^ [ 26.997270] ffff000800c2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.004475] ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.011679] ==================================================================
[ 25.250024] ================================================================== [ 25.250175] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 25.250310] Read of size 16 at addr fff00000c62bd2e0 by task kunit_try_catch/168 [ 25.250429] [ 25.250511] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.250702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.250814] Hardware name: linux,dummy-virt (DT) [ 25.250911] Call trace: [ 25.250989] show_stack+0x20/0x38 (C) [ 25.251191] dump_stack_lvl+0x8c/0xd0 [ 25.252971] print_report+0x118/0x608 [ 25.253120] kasan_report+0xdc/0x128 [ 25.253325] __asan_report_load16_noabort+0x20/0x30 [ 25.253478] kmalloc_uaf_16+0x3bc/0x438 [ 25.253600] kunit_try_run_case+0x170/0x3f0 [ 25.253741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.254098] kthread+0x328/0x630 [ 25.254243] ret_from_fork+0x10/0x20 [ 25.254369] [ 25.254413] Allocated by task 168: [ 25.254541] kasan_save_stack+0x3c/0x68 [ 25.254747] kasan_save_track+0x20/0x40 [ 25.254875] kasan_save_alloc_info+0x40/0x58 [ 25.255040] __kasan_kmalloc+0xd4/0xd8 [ 25.255149] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.255269] kmalloc_uaf_16+0x140/0x438 [ 25.255405] kunit_try_run_case+0x170/0x3f0 [ 25.255544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.255669] kthread+0x328/0x630 [ 25.255769] ret_from_fork+0x10/0x20 [ 25.255957] [ 25.256033] Freed by task 168: [ 25.256102] kasan_save_stack+0x3c/0x68 [ 25.256205] kasan_save_track+0x20/0x40 [ 25.256489] kasan_save_free_info+0x4c/0x78 [ 25.256639] __kasan_slab_free+0x6c/0x98 [ 25.256738] kfree+0x214/0x3c8 [ 25.256845] kmalloc_uaf_16+0x190/0x438 [ 25.256962] kunit_try_run_case+0x170/0x3f0 [ 25.257060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.257188] kthread+0x328/0x630 [ 25.257365] ret_from_fork+0x10/0x20 [ 25.257555] [ 25.257606] The buggy address belongs to the object at fff00000c62bd2e0 [ 25.257606] which belongs to the cache kmalloc-16 of size 16 [ 25.257842] The buggy address is located 0 bytes inside of [ 25.257842] freed 16-byte region [fff00000c62bd2e0, fff00000c62bd2f0) [ 25.258100] [ 25.258155] The buggy address belongs to the physical page: [ 25.258238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062bd [ 25.258387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.258634] page_type: f5(slab) [ 25.258745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.259061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.259285] page dumped because: kasan: bad access detected [ 25.259483] [ 25.259528] Memory state around the buggy address: [ 25.259686] fff00000c62bd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.259836] fff00000c62bd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.260090] >fff00000c62bd280: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 25.260186] ^ [ 25.260284] fff00000c62bd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.260391] fff00000c62bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.260484] ==================================================================
[ 25.457243] ================================================================== [ 25.457362] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 25.457483] Read of size 16 at addr fff00000c56fe3c0 by task kunit_try_catch/168 [ 25.457666] [ 25.457710] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.457946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.458325] Hardware name: linux,dummy-virt (DT) [ 25.458740] Call trace: [ 25.458808] show_stack+0x20/0x38 (C) [ 25.458970] dump_stack_lvl+0x8c/0xd0 [ 25.459091] print_report+0x118/0x608 [ 25.459210] kasan_report+0xdc/0x128 [ 25.459330] __asan_report_load16_noabort+0x20/0x30 [ 25.459700] kmalloc_uaf_16+0x3bc/0x438 [ 25.460994] kunit_try_run_case+0x170/0x3f0 [ 25.461170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.461306] kthread+0x328/0x630 [ 25.462629] ret_from_fork+0x10/0x20 [ 25.463747] [ 25.463811] Allocated by task 168: [ 25.464482] kasan_save_stack+0x3c/0x68 [ 25.464649] kasan_save_track+0x20/0x40 [ 25.465191] kasan_save_alloc_info+0x40/0x58 [ 25.465303] __kasan_kmalloc+0xd4/0xd8 [ 25.465709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.465824] kmalloc_uaf_16+0x140/0x438 [ 25.465975] kunit_try_run_case+0x170/0x3f0 [ 25.466104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.466405] kthread+0x328/0x630 [ 25.466640] ret_from_fork+0x10/0x20 [ 25.466814] [ 25.467382] Freed by task 168: [ 25.467463] kasan_save_stack+0x3c/0x68 [ 25.467913] kasan_save_track+0x20/0x40 [ 25.468335] kasan_save_free_info+0x4c/0x78 [ 25.468476] __kasan_slab_free+0x6c/0x98 [ 25.468577] kfree+0x214/0x3c8 [ 25.468683] kmalloc_uaf_16+0x190/0x438 [ 25.468791] kunit_try_run_case+0x170/0x3f0 [ 25.469472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.469729] kthread+0x328/0x630 [ 25.469881] ret_from_fork+0x10/0x20 [ 25.469990] [ 25.470038] The buggy address belongs to the object at fff00000c56fe3c0 [ 25.470038] which belongs to the cache kmalloc-16 of size 16 [ 25.470178] The buggy address is located 0 bytes inside of [ 25.470178] freed 16-byte region [fff00000c56fe3c0, fff00000c56fe3d0) [ 25.470932] [ 25.470997] The buggy address belongs to the physical page: [ 25.471425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056fe [ 25.471616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.471905] page_type: f5(slab) [ 25.472036] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.472178] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.472954] page dumped because: kasan: bad access detected [ 25.473163] [ 25.473212] Memory state around the buggy address: [ 25.473648] fff00000c56fe280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.473915] fff00000c56fe300: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 25.474137] >fff00000c56fe380: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 25.474430] ^ [ 25.474744] fff00000c56fe400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.474870] fff00000c56fe480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.476408] ==================================================================
[ 18.811446] ================================================================== [ 18.812175] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 18.812978] Read of size 16 at addr ffff888101a90ba0 by task kunit_try_catch/186 [ 18.813610] [ 18.813859] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.813990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.814028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.814136] Call Trace: [ 18.814181] <TASK> [ 18.814229] dump_stack_lvl+0x73/0xb0 [ 18.814319] print_report+0xd1/0x650 [ 18.814392] ? __virt_addr_valid+0x1db/0x2d0 [ 18.814465] ? kmalloc_uaf_16+0x47b/0x4c0 [ 18.814553] ? kasan_complete_mode_report_info+0x64/0x200 [ 18.814624] ? kmalloc_uaf_16+0x47b/0x4c0 [ 18.814691] kasan_report+0x141/0x180 [ 18.814762] ? kmalloc_uaf_16+0x47b/0x4c0 [ 18.814839] __asan_report_load16_noabort+0x18/0x20 [ 18.814918] kmalloc_uaf_16+0x47b/0x4c0 [ 18.815036] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 18.815138] ? __schedule+0x10cc/0x2b60 [ 18.815239] ? __pfx_read_tsc+0x10/0x10 [ 18.815314] ? ktime_get_ts64+0x86/0x230 [ 18.815393] kunit_try_run_case+0x1a5/0x480 [ 18.815479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.815573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.815616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.815652] ? __kthread_parkme+0x82/0x180 [ 18.815684] ? preempt_count_sub+0x50/0x80 [ 18.815716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.815754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.815788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.815822] kthread+0x337/0x6f0 [ 18.815852] ? __pfx_kthread+0x10/0x10 [ 18.815880] ? __pfx_kthread+0x10/0x10 [ 18.815909] ? recalc_sigpending+0x168/0x1f0 [ 18.815944] ? __pfx_kthread+0x10/0x10 [ 18.815974] ret_from_fork+0x116/0x1d0 [ 18.816000] ? __pfx_kthread+0x10/0x10 [ 18.816027] ret_from_fork_asm+0x1a/0x30 [ 18.816069] </TASK> [ 18.816084] [ 18.831616] Allocated by task 186: [ 18.832078] kasan_save_stack+0x45/0x70 [ 18.832676] kasan_save_track+0x18/0x40 [ 18.833098] kasan_save_alloc_info+0x3b/0x50 [ 18.833693] __kasan_kmalloc+0xb7/0xc0 [ 18.834072] __kmalloc_cache_noprof+0x189/0x420 [ 18.834637] kmalloc_uaf_16+0x15b/0x4c0 [ 18.834959] kunit_try_run_case+0x1a5/0x480 [ 18.835416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.835982] kthread+0x337/0x6f0 [ 18.836460] ret_from_fork+0x116/0x1d0 [ 18.836890] ret_from_fork_asm+0x1a/0x30 [ 18.837426] [ 18.837738] Freed by task 186: [ 18.838066] kasan_save_stack+0x45/0x70 [ 18.838449] kasan_save_track+0x18/0x40 [ 18.838908] kasan_save_free_info+0x3f/0x60 [ 18.839454] __kasan_slab_free+0x56/0x70 [ 18.839914] kfree+0x222/0x3f0 [ 18.840339] kmalloc_uaf_16+0x1d6/0x4c0 [ 18.840763] kunit_try_run_case+0x1a5/0x480 [ 18.841104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.841601] kthread+0x337/0x6f0 [ 18.842023] ret_from_fork+0x116/0x1d0 [ 18.842540] ret_from_fork_asm+0x1a/0x30 [ 18.843035] [ 18.843331] The buggy address belongs to the object at ffff888101a90ba0 [ 18.843331] which belongs to the cache kmalloc-16 of size 16 [ 18.844472] The buggy address is located 0 bytes inside of [ 18.844472] freed 16-byte region [ffff888101a90ba0, ffff888101a90bb0) [ 18.845516] [ 18.845782] The buggy address belongs to the physical page: [ 18.846388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a90 [ 18.847105] flags: 0x200000000000000(node=0|zone=2) [ 18.847644] page_type: f5(slab) [ 18.848034] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 18.848727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.849486] page dumped because: kasan: bad access detected [ 18.850053] [ 18.850297] Memory state around the buggy address: [ 18.850661] ffff888101a90a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.851140] ffff888101a90b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.851895] >ffff888101a90b80: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 18.852616] ^ [ 18.853073] ffff888101a90c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.853753] ffff888101a90c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.854429] ==================================================================
[ 17.863163] ================================================================== [ 17.864255] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 17.864782] Read of size 16 at addr ffff888101e49e80 by task kunit_try_catch/186 [ 17.865831] [ 17.866055] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.866122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.866157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.866189] Call Trace: [ 17.866205] <TASK> [ 17.866222] dump_stack_lvl+0x73/0xb0 [ 17.866274] print_report+0xd1/0x650 [ 17.866307] ? __virt_addr_valid+0x1db/0x2d0 [ 17.866339] ? kmalloc_uaf_16+0x47b/0x4c0 [ 17.866367] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.866398] ? kmalloc_uaf_16+0x47b/0x4c0 [ 17.866426] kasan_report+0x141/0x180 [ 17.866456] ? kmalloc_uaf_16+0x47b/0x4c0 [ 17.866490] __asan_report_load16_noabort+0x18/0x20 [ 17.866931] kmalloc_uaf_16+0x47b/0x4c0 [ 17.867015] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 17.867120] ? __schedule+0x10cc/0x2b60 [ 17.867272] ? __pfx_read_tsc+0x10/0x10 [ 17.867346] ? ktime_get_ts64+0x86/0x230 [ 17.867424] kunit_try_run_case+0x1a5/0x480 [ 17.867519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.867626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.867710] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.867793] ? __kthread_parkme+0x82/0x180 [ 17.867859] ? preempt_count_sub+0x50/0x80 [ 17.867925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.867965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.868000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.868034] kthread+0x337/0x6f0 [ 17.868061] ? trace_preempt_on+0x20/0xc0 [ 17.868092] ? __pfx_kthread+0x10/0x10 [ 17.868159] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.868192] ? calculate_sigpending+0x7b/0xa0 [ 17.868227] ? __pfx_kthread+0x10/0x10 [ 17.868257] ret_from_fork+0x116/0x1d0 [ 17.868281] ? __pfx_kthread+0x10/0x10 [ 17.868309] ret_from_fork_asm+0x1a/0x30 [ 17.868350] </TASK> [ 17.868364] [ 17.889256] Allocated by task 186: [ 17.890830] kasan_save_stack+0x45/0x70 [ 17.891401] kasan_save_track+0x18/0x40 [ 17.893327] kasan_save_alloc_info+0x3b/0x50 [ 17.893983] __kasan_kmalloc+0xb7/0xc0 [ 17.895471] __kmalloc_cache_noprof+0x189/0x420 [ 17.896640] kmalloc_uaf_16+0x15b/0x4c0 [ 17.896950] kunit_try_run_case+0x1a5/0x480 [ 17.897262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.897572] kthread+0x337/0x6f0 [ 17.897811] ret_from_fork+0x116/0x1d0 [ 17.899489] ret_from_fork_asm+0x1a/0x30 [ 17.899953] [ 17.900194] Freed by task 186: [ 17.900520] kasan_save_stack+0x45/0x70 [ 17.901108] kasan_save_track+0x18/0x40 [ 17.901911] kasan_save_free_info+0x3f/0x60 [ 17.902678] __kasan_slab_free+0x56/0x70 [ 17.903230] kfree+0x222/0x3f0 [ 17.903837] kmalloc_uaf_16+0x1d6/0x4c0 [ 17.904947] kunit_try_run_case+0x1a5/0x480 [ 17.905857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.906914] kthread+0x337/0x6f0 [ 17.907463] ret_from_fork+0x116/0x1d0 [ 17.908351] ret_from_fork_asm+0x1a/0x30 [ 17.908913] [ 17.909084] The buggy address belongs to the object at ffff888101e49e80 [ 17.909084] which belongs to the cache kmalloc-16 of size 16 [ 17.910914] The buggy address is located 0 bytes inside of [ 17.910914] freed 16-byte region [ffff888101e49e80, ffff888101e49e90) [ 17.912793] [ 17.913053] The buggy address belongs to the physical page: [ 17.913957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 17.915175] flags: 0x200000000000000(node=0|zone=2) [ 17.915939] page_type: f5(slab) [ 17.916253] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.917524] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.918220] page dumped because: kasan: bad access detected [ 17.919059] [ 17.919251] Memory state around the buggy address: [ 17.920342] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 17.920948] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 17.921632] >ffff888101e49e80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.922937] ^ [ 17.923556] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.924183] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.924797] ==================================================================
[ 20.471508] ================================================================== [ 20.472573] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 20.473253] Read of size 16 at addr ffff00000101a200 by task kunit_try_catch/221 [ 20.473967] [ 20.474148] CPU: 2 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.474227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.474249] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.474276] Call trace: [ 20.474294] show_stack+0x20/0x38 (C) [ 20.474347] dump_stack_lvl+0x8c/0xd0 [ 20.474403] print_report+0x118/0x608 [ 20.474458] kasan_report+0xdc/0x128 [ 20.474509] __asan_report_load16_noabort+0x20/0x30 [ 20.474572] kmalloc_uaf_16+0x3bc/0x438 [ 20.474619] kunit_try_run_case+0x170/0x3f0 [ 20.474674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474736] kthread+0x328/0x630 [ 20.474778] ret_from_fork+0x10/0x20 [ 20.474829] [ 20.480489] Allocated by task 221: [ 20.480835] kasan_save_stack+0x3c/0x68 [ 20.481244] kasan_save_track+0x20/0x40 [ 20.481648] kasan_save_alloc_info+0x40/0x58 [ 20.482094] __kasan_kmalloc+0xd4/0xd8 [ 20.482489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.482955] kmalloc_uaf_16+0x140/0x438 [ 20.483352] kunit_try_run_case+0x170/0x3f0 [ 20.483786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.484342] kthread+0x328/0x630 [ 20.484684] ret_from_fork+0x10/0x20 [ 20.485061] [ 20.485229] Freed by task 221: [ 20.485541] kasan_save_stack+0x3c/0x68 [ 20.485945] kasan_save_track+0x20/0x40 [ 20.486346] kasan_save_free_info+0x4c/0x78 [ 20.486785] __kasan_slab_free+0x6c/0x98 [ 20.487196] kfree+0x214/0x3c8 [ 20.487524] kmalloc_uaf_16+0x190/0x438 [ 20.487922] kunit_try_run_case+0x170/0x3f0 [ 20.488355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488911] kthread+0x328/0x630 [ 20.489251] ret_from_fork+0x10/0x20 [ 20.489627] [ 20.489795] The buggy address belongs to the object at ffff00000101a200 [ 20.489795] which belongs to the cache kmalloc-16 of size 16 [ 20.490942] The buggy address is located 0 bytes inside of [ 20.490942] freed 16-byte region [ffff00000101a200, ffff00000101a210) [ 20.492063] [ 20.492232] The buggy address belongs to the physical page: [ 20.492766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a [ 20.493520] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.494159] page_type: f5(slab) [ 20.494496] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 20.495241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.495972] page dumped because: kasan: bad access detected [ 20.496506] [ 20.496673] Memory state around the buggy address: [ 20.497141] ffff00000101a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.497833] ffff00000101a180: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 20.498524] >ffff00000101a200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.499208] ^ [ 20.499539] ffff00000101a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.500230] ffff00000101a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.500915] ==================================================================