Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 21.390510] ================================================================== [ 21.400478] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 21.407074] Read of size 1 at addr ffff00080337c000 by task kunit_try_catch/195 [ 21.414364] [ 21.415852] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.415907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.415928] Hardware name: WinLink E850-96 board (DT) [ 21.415947] Call trace: [ 21.415962] show_stack+0x20/0x38 (C) [ 21.415998] dump_stack_lvl+0x8c/0xd0 [ 21.416035] print_report+0x118/0x608 [ 21.416074] kasan_report+0xdc/0x128 [ 21.416108] __asan_report_load1_noabort+0x20/0x30 [ 21.416146] kmalloc_large_uaf+0x2cc/0x2f8 [ 21.416179] kunit_try_run_case+0x170/0x3f0 [ 21.416216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.416255] kthread+0x328/0x630 [ 21.416286] ret_from_fork+0x10/0x20 [ 21.416321] [ 21.478601] The buggy address belongs to the physical page: [ 21.484158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88337c [ 21.492142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.498666] raw: 0bfffe0000000000 fffffdffe00ce008 ffff00085b006f40 0000000000000000 [ 21.506383] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.514105] page dumped because: kasan: bad access detected [ 21.519658] [ 21.521133] Memory state around the buggy address: [ 21.525914] ffff00080337bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.533118] ffff00080337bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540321] >ffff00080337c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.547522] ^ [ 21.550738] ffff00080337c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.557942] ffff00080337c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.565145] ==================================================================
[ 24.782157] ================================================================== [ 24.782314] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 24.782428] Read of size 1 at addr fff00000c64b8000 by task kunit_try_catch/148 [ 24.782553] [ 24.782748] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.782967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.783041] Hardware name: linux,dummy-virt (DT) [ 24.783335] Call trace: [ 24.783632] show_stack+0x20/0x38 (C) [ 24.784011] dump_stack_lvl+0x8c/0xd0 [ 24.784146] print_report+0x118/0x608 [ 24.784915] kasan_report+0xdc/0x128 [ 24.785153] __asan_report_load1_noabort+0x20/0x30 [ 24.785666] kmalloc_large_uaf+0x2cc/0x2f8 [ 24.786197] kunit_try_run_case+0x170/0x3f0 [ 24.786323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.786451] kthread+0x328/0x630 [ 24.786565] ret_from_fork+0x10/0x20 [ 24.786691] [ 24.787284] The buggy address belongs to the physical page: [ 24.787526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8 [ 24.787983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.788911] raw: 0bfffe0000000000 ffffc1ffc3192f08 fff00000da44ac40 0000000000000000 [ 24.789734] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 24.789834] page dumped because: kasan: bad access detected [ 24.789910] [ 24.790354] Memory state around the buggy address: [ 24.790611] fff00000c64b7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.791182] fff00000c64b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.791387] >fff00000c64b8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.791482] ^ [ 24.792066] fff00000c64b8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.792309] fff00000c64b8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.792796] ==================================================================
[ 24.952819] ================================================================== [ 24.952977] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 24.953150] Read of size 1 at addr fff00000c64fc000 by task kunit_try_catch/148 [ 24.953358] [ 24.953515] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 24.953753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.953924] Hardware name: linux,dummy-virt (DT) [ 24.954051] Call trace: [ 24.954114] show_stack+0x20/0x38 (C) [ 24.954287] dump_stack_lvl+0x8c/0xd0 [ 24.954416] print_report+0x118/0x608 [ 24.954536] kasan_report+0xdc/0x128 [ 24.954696] __asan_report_load1_noabort+0x20/0x30 [ 24.954864] kmalloc_large_uaf+0x2cc/0x2f8 [ 24.954988] kunit_try_run_case+0x170/0x3f0 [ 24.955112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.955343] kthread+0x328/0x630 [ 24.955534] ret_from_fork+0x10/0x20 [ 24.955736] [ 24.955864] The buggy address belongs to the physical page: [ 24.955941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fc [ 24.956093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.956314] raw: 0bfffe0000000000 ffffc1ffc3194008 fff00000da44bc40 0000000000000000 [ 24.956576] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 24.956674] page dumped because: kasan: bad access detected [ 24.956806] [ 24.956952] Memory state around the buggy address: [ 24.957154] fff00000c64fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.957399] fff00000c64fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.957572] >fff00000c64fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.957672] ^ [ 24.957794] fff00000c64fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.957919] fff00000c64fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.958048] ==================================================================
[ 17.674049] ================================================================== [ 17.674871] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 17.675881] Read of size 1 at addr ffff888102618000 by task kunit_try_catch/166 [ 17.677652] [ 17.678299] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.678437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.678476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.678560] Call Trace: [ 17.678678] <TASK> [ 17.678854] dump_stack_lvl+0x73/0xb0 [ 17.678961] print_report+0xd1/0x650 [ 17.679023] ? __virt_addr_valid+0x1db/0x2d0 [ 17.679084] ? kmalloc_large_uaf+0x2f1/0x340 [ 17.679140] ? kasan_addr_to_slab+0x11/0xa0 [ 17.679191] ? kmalloc_large_uaf+0x2f1/0x340 [ 17.679251] kasan_report+0x141/0x180 [ 17.679308] ? kmalloc_large_uaf+0x2f1/0x340 [ 17.679370] __asan_report_load1_noabort+0x18/0x20 [ 17.679431] kmalloc_large_uaf+0x2f1/0x340 [ 17.679487] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 17.679574] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 17.679674] kunit_try_run_case+0x1a5/0x480 [ 17.679751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.679790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.679828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.679862] ? __kthread_parkme+0x82/0x180 [ 17.679891] ? preempt_count_sub+0x50/0x80 [ 17.679924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.679959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.679995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.680029] kthread+0x337/0x6f0 [ 17.680058] ? trace_preempt_on+0x20/0xc0 [ 17.680093] ? __pfx_kthread+0x10/0x10 [ 17.680122] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.680152] ? calculate_sigpending+0x7b/0xa0 [ 17.680187] ? __pfx_kthread+0x10/0x10 [ 17.680216] ret_from_fork+0x116/0x1d0 [ 17.680282] ? __pfx_kthread+0x10/0x10 [ 17.680316] ret_from_fork_asm+0x1a/0x30 [ 17.680362] </TASK> [ 17.680377] [ 17.701841] The buggy address belongs to the physical page: [ 17.702341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102618 [ 17.703562] flags: 0x200000000000000(node=0|zone=2) [ 17.704300] raw: 0200000000000000 ffffea0004098708 ffff88815b139f80 0000000000000000 [ 17.704943] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 17.706033] page dumped because: kasan: bad access detected [ 17.706467] [ 17.707188] Memory state around the buggy address: [ 17.707917] ffff888102617f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.708770] ffff888102617f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.709488] >ffff888102618000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.710872] ^ [ 17.711451] ffff888102618080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.712207] ffff888102618100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.712821] ==================================================================
[ 16.861077] ================================================================== [ 16.862102] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 16.862949] Read of size 1 at addr ffff888102324000 by task kunit_try_catch/166 [ 16.863700] [ 16.864510] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 16.864574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.864591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.864620] Call Trace: [ 16.864636] <TASK> [ 16.864654] dump_stack_lvl+0x73/0xb0 [ 16.864695] print_report+0xd1/0x650 [ 16.864726] ? __virt_addr_valid+0x1db/0x2d0 [ 16.864757] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.864785] ? kasan_addr_to_slab+0x11/0xa0 [ 16.864813] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.864842] kasan_report+0x141/0x180 [ 16.864872] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.864937] __asan_report_load1_noabort+0x18/0x20 [ 16.864974] kmalloc_large_uaf+0x2f1/0x340 [ 16.865003] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 16.865033] ? __schedule+0x10cc/0x2b60 [ 16.865064] ? __pfx_read_tsc+0x10/0x10 [ 16.865092] ? ktime_get_ts64+0x86/0x230 [ 16.865161] kunit_try_run_case+0x1a5/0x480 [ 16.865204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.865239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.865272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.865305] ? __kthread_parkme+0x82/0x180 [ 16.865333] ? preempt_count_sub+0x50/0x80 [ 16.865364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.865398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.865431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.865464] kthread+0x337/0x6f0 [ 16.865490] ? trace_preempt_on+0x20/0xc0 [ 16.865521] ? __pfx_kthread+0x10/0x10 [ 16.865550] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.865579] ? calculate_sigpending+0x7b/0xa0 [ 16.865612] ? __pfx_kthread+0x10/0x10 [ 16.865641] ret_from_fork+0x116/0x1d0 [ 16.865666] ? __pfx_kthread+0x10/0x10 [ 16.865693] ret_from_fork_asm+0x1a/0x30 [ 16.865733] </TASK> [ 16.865747] [ 16.880719] The buggy address belongs to the physical page: [ 16.881307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324 [ 16.882072] flags: 0x200000000000000(node=0|zone=2) [ 16.882724] raw: 0200000000000000 ffff88815b039f80 ffff88815b039f80 0000000000000000 [ 16.883486] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.884204] page dumped because: kasan: bad access detected [ 16.884637] [ 16.884930] Memory state around the buggy address: [ 16.885522] ffff888102323f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.886273] ffff888102323f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.886977] >ffff888102324000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.887647] ^ [ 16.887997] ffff888102324080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.888465] ffff888102324100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.889241] ==================================================================
[ 19.932596] ================================================================== [ 19.933705] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 19.934347] Read of size 1 at addr ffff00000daf8000 by task kunit_try_catch/201 [ 19.935032] [ 19.935202] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 19.935261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.935278] Hardware name: Radxa ROCK Pi 4B (DT) [ 19.935298] Call trace: [ 19.935312] show_stack+0x20/0x38 (C) [ 19.935352] dump_stack_lvl+0x8c/0xd0 [ 19.935394] print_report+0x118/0x608 [ 19.935435] kasan_report+0xdc/0x128 [ 19.935474] __asan_report_load1_noabort+0x20/0x30 [ 19.935519] kmalloc_large_uaf+0x2cc/0x2f8 [ 19.935554] kunit_try_run_case+0x170/0x3f0 [ 19.935596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.935641] kthread+0x328/0x630 [ 19.935674] ret_from_fork+0x10/0x20 [ 19.935712] [ 19.941322] The buggy address belongs to the physical page: [ 19.941847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdaf8 [ 19.942579] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 19.943213] raw: 03fffe0000000000 fffffdffc036bf08 ffff0000d16ec640 0000000000000000 [ 19.943938] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.944653] page dumped because: kasan: bad access detected [ 19.945173] [ 19.945331] Memory state around the buggy address: [ 19.945786] ffff00000daf7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.946460] ffff00000daf7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.947133] >ffff00000daf8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.947801] ^ [ 19.948118] ffff00000daf8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.948792] ffff00000daf8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.949461] ==================================================================