Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.693889] ================================================================== [ 16.694213] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 16.694288] Read of size 1 at addr fff00000c6530000 by task kunit_try_catch/149 [ 16.694355] [ 16.694403] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.694541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.694567] Hardware name: linux,dummy-virt (DT) [ 16.694596] Call trace: [ 16.694627] show_stack+0x20/0x38 (C) [ 16.694724] dump_stack_lvl+0x8c/0xd0 [ 16.695029] print_report+0x118/0x608 [ 16.695147] kasan_report+0xdc/0x128 [ 16.695284] __asan_report_load1_noabort+0x20/0x30 [ 16.695375] kmalloc_large_uaf+0x2cc/0x2f8 [ 16.695460] kunit_try_run_case+0x170/0x3f0 [ 16.695547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.695671] kthread+0x328/0x630 [ 16.695749] ret_from_fork+0x10/0x20 [ 16.695817] [ 16.695836] The buggy address belongs to the physical page: [ 16.695891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 16.695943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.696012] raw: 0bfffe0000000000 fff00000da456c40 fff00000da456c40 0000000000000000 [ 16.696060] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.696098] page dumped because: kasan: bad access detected [ 16.696127] [ 16.696329] Memory state around the buggy address: [ 16.696421] fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696516] fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.696599] >fff00000c6530000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.696673] ^ [ 16.696758] fff00000c6530080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.696814] fff00000c6530100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.696871] ==================================================================
[ 16.631570] ================================================================== [ 16.631632] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 16.631953] Read of size 1 at addr fff00000c7708000 by task kunit_try_catch/149 [ 16.632271] [ 16.632304] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.632382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.632844] Hardware name: linux,dummy-virt (DT) [ 16.632977] Call trace: [ 16.633000] show_stack+0x20/0x38 (C) [ 16.633056] dump_stack_lvl+0x8c/0xd0 [ 16.633352] print_report+0x118/0x608 [ 16.633481] kasan_report+0xdc/0x128 [ 16.633531] __asan_report_load1_noabort+0x20/0x30 [ 16.633618] kmalloc_large_uaf+0x2cc/0x2f8 [ 16.633661] kunit_try_run_case+0x170/0x3f0 [ 16.634024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.634084] kthread+0x328/0x630 [ 16.634124] ret_from_fork+0x10/0x20 [ 16.634170] [ 16.634191] The buggy address belongs to the physical page: [ 16.634372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107708 [ 16.634464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.634569] raw: 0bfffe0000000000 ffffc1ffc31dc308 fff00000da478c40 0000000000000000 [ 16.634617] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.634655] page dumped because: kasan: bad access detected [ 16.634693] [ 16.634712] Memory state around the buggy address: [ 16.634743] fff00000c7707f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.635091] fff00000c7707f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.635135] >fff00000c7708000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.635171] ^ [ 16.635374] fff00000c7708080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.635454] fff00000c7708100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.635578] ==================================================================
[ 12.725201] ================================================================== [ 12.725699] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 12.726529] Read of size 1 at addr ffff88810263c000 by task kunit_try_catch/166 [ 12.726944] [ 12.727023] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.727068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.727079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.727099] Call Trace: [ 12.727114] <TASK> [ 12.727137] dump_stack_lvl+0x73/0xb0 [ 12.727171] print_report+0xd1/0x650 [ 12.727192] ? __virt_addr_valid+0x1db/0x2d0 [ 12.727212] ? kmalloc_large_uaf+0x2f1/0x340 [ 12.727230] ? kasan_addr_to_slab+0x11/0xa0 [ 12.727248] ? kmalloc_large_uaf+0x2f1/0x340 [ 12.727266] kasan_report+0x141/0x180 [ 12.727286] ? kmalloc_large_uaf+0x2f1/0x340 [ 12.727309] __asan_report_load1_noabort+0x18/0x20 [ 12.727331] kmalloc_large_uaf+0x2f1/0x340 [ 12.727349] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 12.727368] ? __schedule+0x10cc/0x2b60 [ 12.727388] ? __pfx_read_tsc+0x10/0x10 [ 12.727408] ? ktime_get_ts64+0x86/0x230 [ 12.727431] kunit_try_run_case+0x1a5/0x480 [ 12.727452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.727472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.727493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.727513] ? __kthread_parkme+0x82/0x180 [ 12.727531] ? preempt_count_sub+0x50/0x80 [ 12.727552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.727573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.727593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.727613] kthread+0x337/0x6f0 [ 12.727659] ? trace_preempt_on+0x20/0xc0 [ 12.727695] ? __pfx_kthread+0x10/0x10 [ 12.727725] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.727756] ? calculate_sigpending+0x7b/0xa0 [ 12.727797] ? __pfx_kthread+0x10/0x10 [ 12.727835] ret_from_fork+0x116/0x1d0 [ 12.727869] ? __pfx_kthread+0x10/0x10 [ 12.727903] ret_from_fork_asm+0x1a/0x30 [ 12.727932] </TASK> [ 12.727944] [ 12.739069] The buggy address belongs to the physical page: [ 12.739606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10263c [ 12.739990] flags: 0x200000000000000(node=0|zone=2) [ 12.740408] raw: 0200000000000000 ffff88815b039f80 ffff88815b039f80 0000000000000000 [ 12.740711] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 12.741132] page dumped because: kasan: bad access detected [ 12.741557] [ 12.741852] Memory state around the buggy address: [ 12.742158] ffff88810263bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.742719] ffff88810263bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.743126] >ffff88810263c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.743720] ^ [ 12.743986] ffff88810263c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.744407] ffff88810263c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 12.744829] ==================================================================
[ 12.988275] ================================================================== [ 12.989133] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 12.990391] Read of size 1 at addr ffff888102424000 by task kunit_try_catch/165 [ 12.991571] [ 12.991943] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.991993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.992006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.992027] Call Trace: [ 12.992039] <TASK> [ 12.992069] dump_stack_lvl+0x73/0xb0 [ 12.992102] print_report+0xd1/0x650 [ 12.992124] ? __virt_addr_valid+0x1db/0x2d0 [ 12.992147] ? kmalloc_large_uaf+0x2f1/0x340 [ 12.992167] ? kasan_addr_to_slab+0x11/0xa0 [ 12.992187] ? kmalloc_large_uaf+0x2f1/0x340 [ 12.992207] kasan_report+0x141/0x180 [ 12.992229] ? kmalloc_large_uaf+0x2f1/0x340 [ 12.992255] __asan_report_load1_noabort+0x18/0x20 [ 12.992278] kmalloc_large_uaf+0x2f1/0x340 [ 12.992298] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 12.992320] ? __schedule+0x10cc/0x2b60 [ 12.992342] ? __pfx_read_tsc+0x10/0x10 [ 12.992362] ? ktime_get_ts64+0x86/0x230 [ 12.992387] kunit_try_run_case+0x1a5/0x480 [ 12.992411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.992432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.992455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.992477] ? __kthread_parkme+0x82/0x180 [ 12.992496] ? preempt_count_sub+0x50/0x80 [ 12.992520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.992542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.992564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.992586] kthread+0x337/0x6f0 [ 12.992605] ? trace_preempt_on+0x20/0xc0 [ 12.992628] ? __pfx_kthread+0x10/0x10 [ 12.992648] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.992668] ? calculate_sigpending+0x7b/0xa0 [ 12.992691] ? __pfx_kthread+0x10/0x10 [ 12.992712] ret_from_fork+0x116/0x1d0 [ 12.992730] ? __pfx_kthread+0x10/0x10 [ 12.992750] ret_from_fork_asm+0x1a/0x30 [ 12.992781] </TASK> [ 12.992793] [ 13.000311] The buggy address belongs to the physical page: [ 13.000596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102424 [ 13.001035] flags: 0x200000000000000(node=0|zone=2) [ 13.001231] raw: 0200000000000000 ffff88815b039f80 ffff88815b039f80 0000000000000000 [ 13.001462] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 13.001856] page dumped because: kasan: bad access detected [ 13.002175] [ 13.002277] Memory state around the buggy address: [ 13.002514] ffff888102423f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.002975] ffff888102423f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.003323] >ffff888102424000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.003663] ^ [ 13.003936] ffff888102424080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.004280] ffff888102424100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 13.004586] ==================================================================
[ 16.723970] ================================================================== [ 16.735467] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 16.742080] Read of size 1 at addr ffff888106e9c000 by task kunit_try_catch/189 [ 16.749418] [ 16.750912] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.750921] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 16.750924] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.750927] Call Trace: [ 16.750929] <TASK> [ 16.750930] dump_stack_lvl+0x73/0xb0 [ 16.750935] print_report+0xd1/0x650 [ 16.750939] ? __virt_addr_valid+0x1db/0x2d0 [ 16.750943] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.750947] ? kasan_addr_to_slab+0x11/0xa0 [ 16.750950] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.750954] kasan_report+0x141/0x180 [ 16.750958] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.750963] __asan_report_load1_noabort+0x18/0x20 [ 16.750967] kmalloc_large_uaf+0x2f1/0x340 [ 16.750971] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 16.750975] ? __schedule+0x10cc/0x2b60 [ 16.750979] ? ktime_get_ts64+0x83/0x230 [ 16.750983] kunit_try_run_case+0x1a2/0x480 [ 16.750987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.750991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.750996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.751000] ? __kthread_parkme+0x82/0x180 [ 16.751003] ? preempt_count_sub+0x50/0x80 [ 16.751007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.751011] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.751016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.751020] kthread+0x334/0x6f0 [ 16.751023] ? trace_preempt_on+0x20/0xc0 [ 16.751027] ? __pfx_kthread+0x10/0x10 [ 16.751031] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.751034] ? calculate_sigpending+0x7b/0xa0 [ 16.751039] ? __pfx_kthread+0x10/0x10 [ 16.751043] ret_from_fork+0x113/0x1d0 [ 16.751046] ? __pfx_kthread+0x10/0x10 [ 16.751049] ret_from_fork_asm+0x1a/0x30 [ 16.751055] </TASK> [ 16.751057] [ 16.914773] The buggy address belongs to the physical page: [ 16.920374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e9c [ 16.928423] flags: 0x200000000000000(node=0|zone=2) [ 16.933310] raw: 0200000000000000 ffffea00041ba908 ffff88841f6b9f80 0000000000000000 [ 16.941051] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.948795] page dumped because: kasan: bad access detected [ 16.954414] [ 16.955911] Memory state around the buggy address: [ 16.960704] ffff888106e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.967924] ffff888106e9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.975142] >ffff888106e9c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.982362] ^ [ 16.985614] ffff888106e9c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.992841] ffff888106e9c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.000059] ==================================================================