Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.192818] ================================================================== [ 17.192926] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 17.193002] Read of size 1 at addr fff00000c7042000 by task kunit_try_catch/214 [ 17.193055] [ 17.193099] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.193184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.193230] Hardware name: linux,dummy-virt (DT) [ 17.193263] Call trace: [ 17.193286] show_stack+0x20/0x38 (C) [ 17.193341] dump_stack_lvl+0x8c/0xd0 [ 17.193391] print_report+0x118/0x5d0 [ 17.193438] kasan_report+0xdc/0x128 [ 17.193482] __asan_report_load1_noabort+0x20/0x30 [ 17.193534] kmem_cache_rcu_uaf+0x388/0x468 [ 17.193579] kunit_try_run_case+0x170/0x3f0 [ 17.193630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.193682] kthread+0x328/0x630 [ 17.193725] ret_from_fork+0x10/0x20 [ 17.193774] [ 17.193793] Allocated by task 214: [ 17.193824] kasan_save_stack+0x3c/0x68 [ 17.193867] kasan_save_track+0x20/0x40 [ 17.193903] kasan_save_alloc_info+0x40/0x58 [ 17.193944] __kasan_slab_alloc+0xa8/0xb0 [ 17.193982] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.194023] kmem_cache_rcu_uaf+0x12c/0x468 [ 17.194060] kunit_try_run_case+0x170/0x3f0 [ 17.194097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.194142] kthread+0x328/0x630 [ 17.194173] ret_from_fork+0x10/0x20 [ 17.194221] [ 17.194239] Freed by task 0: [ 17.194264] kasan_save_stack+0x3c/0x68 [ 17.194302] kasan_save_track+0x20/0x40 [ 17.194337] kasan_save_free_info+0x4c/0x78 [ 17.194376] __kasan_slab_free+0x6c/0x98 [ 17.194413] slab_free_after_rcu_debug+0xd4/0x2f8 [ 17.194452] rcu_core+0x9f4/0x1e20 [ 17.194490] rcu_core_si+0x18/0x30 [ 17.194522] handle_softirqs+0x374/0xb28 [ 17.194559] __do_softirq+0x1c/0x28 [ 17.194593] [ 17.194612] Last potentially related work creation: [ 17.194639] kasan_save_stack+0x3c/0x68 [ 17.194676] kasan_record_aux_stack+0xb4/0xc8 [ 17.194718] kmem_cache_free+0x120/0x468 [ 17.194754] kmem_cache_rcu_uaf+0x16c/0x468 [ 17.194792] kunit_try_run_case+0x170/0x3f0 [ 17.194831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.194874] kthread+0x328/0x630 [ 17.194907] ret_from_fork+0x10/0x20 [ 17.194943] [ 17.194961] The buggy address belongs to the object at fff00000c7042000 [ 17.194961] which belongs to the cache test_cache of size 200 [ 17.195022] The buggy address is located 0 bytes inside of [ 17.195022] freed 200-byte region [fff00000c7042000, fff00000c70420c8) [ 17.195088] [ 17.195110] The buggy address belongs to the physical page: [ 17.195144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107042 [ 17.195212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.195266] page_type: f5(slab) [ 17.195308] raw: 0bfffe0000000000 fff00000c708c3c0 dead000000000122 0000000000000000 [ 17.195361] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.195402] page dumped because: kasan: bad access detected [ 17.195433] [ 17.195451] Memory state around the buggy address: [ 17.195484] fff00000c7041f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.195528] fff00000c7041f80: 00 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.195572] >fff00000c7042000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.195611] ^ [ 17.195637] fff00000c7042080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 17.195680] fff00000c7042100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.195720] ==================================================================
[ 17.906624] ================================================================== [ 17.906722] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 17.908493] Read of size 1 at addr fff00000c5ad4000 by task kunit_try_catch/214 [ 17.908805] [ 17.909793] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.910485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.910518] Hardware name: linux,dummy-virt (DT) [ 17.910555] Call trace: [ 17.911046] show_stack+0x20/0x38 (C) [ 17.911593] dump_stack_lvl+0x8c/0xd0 [ 17.912046] print_report+0x118/0x5d0 [ 17.912581] kasan_report+0xdc/0x128 [ 17.913207] __asan_report_load1_noabort+0x20/0x30 [ 17.913276] kmem_cache_rcu_uaf+0x388/0x468 [ 17.913325] kunit_try_run_case+0x170/0x3f0 [ 17.913376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.913430] kthread+0x328/0x630 [ 17.913474] ret_from_fork+0x10/0x20 [ 17.913526] [ 17.913545] Allocated by task 214: [ 17.913574] kasan_save_stack+0x3c/0x68 [ 17.913617] kasan_save_track+0x20/0x40 [ 17.913655] kasan_save_alloc_info+0x40/0x58 [ 17.913695] __kasan_slab_alloc+0xa8/0xb0 [ 17.913733] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.913774] kmem_cache_rcu_uaf+0x12c/0x468 [ 17.913812] kunit_try_run_case+0x170/0x3f0 [ 17.913851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.913942] kthread+0x328/0x630 [ 17.913975] ret_from_fork+0x10/0x20 [ 17.914016] [ 17.914035] Freed by task 0: [ 17.914086] kasan_save_stack+0x3c/0x68 [ 17.914124] kasan_save_track+0x20/0x40 [ 17.914161] kasan_save_free_info+0x4c/0x78 [ 17.914220] __kasan_slab_free+0x6c/0x98 [ 17.914256] slab_free_after_rcu_debug+0xd4/0x2f8 [ 17.914297] rcu_core+0x9f4/0x1e20 [ 17.914333] rcu_core_si+0x18/0x30 [ 17.914369] handle_softirqs+0x374/0xb28 [ 17.914413] __do_softirq+0x1c/0x28 [ 17.914448] [ 17.914468] Last potentially related work creation: [ 17.914503] kasan_save_stack+0x3c/0x68 [ 17.914557] kasan_record_aux_stack+0xb4/0xc8 [ 17.914606] kmem_cache_free+0x120/0x468 [ 17.914653] kmem_cache_rcu_uaf+0x16c/0x468 [ 17.914691] kunit_try_run_case+0x170/0x3f0 [ 17.914736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.914780] kthread+0x328/0x630 [ 17.914811] ret_from_fork+0x10/0x20 [ 17.914868] [ 17.914886] The buggy address belongs to the object at fff00000c5ad4000 [ 17.914886] which belongs to the cache test_cache of size 200 [ 17.914948] The buggy address is located 0 bytes inside of [ 17.914948] freed 200-byte region [fff00000c5ad4000, fff00000c5ad40c8) [ 17.915011] [ 17.915034] The buggy address belongs to the physical page: [ 17.915083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ad4 [ 17.915157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.915229] page_type: f5(slab) [ 17.915274] raw: 0bfffe0000000000 fff00000c472ab40 dead000000000122 0000000000000000 [ 17.915325] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.915381] page dumped because: kasan: bad access detected [ 17.915422] [ 17.915444] Memory state around the buggy address: [ 17.915487] fff00000c5ad3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.915547] fff00000c5ad3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.915600] >fff00000c5ad4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.915652] ^ [ 17.915700] fff00000c5ad4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 17.915754] fff00000c5ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.915817] ==================================================================
[ 13.454853] ================================================================== [ 13.455330] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.456538] Read of size 1 at addr ffff8881026cc000 by task kunit_try_catch/230 [ 13.457428] [ 13.457795] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.457847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.457859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.458112] Call Trace: [ 13.458126] <TASK> [ 13.458145] dump_stack_lvl+0x73/0xb0 [ 13.458183] print_report+0xd1/0x610 [ 13.458207] ? __virt_addr_valid+0x1db/0x2d0 [ 13.458233] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.458256] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.458281] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.458305] kasan_report+0x141/0x180 [ 13.458327] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.458356] __asan_report_load1_noabort+0x18/0x20 [ 13.458382] kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.458407] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [ 13.458430] ? finish_task_switch.isra.0+0x153/0x700 [ 13.458469] ? __switch_to+0x47/0xf50 [ 13.458499] ? __pfx_read_tsc+0x10/0x10 [ 13.458521] ? ktime_get_ts64+0x86/0x230 [ 13.458547] kunit_try_run_case+0x1a5/0x480 [ 13.458574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.458686] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.458715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.458739] ? __kthread_parkme+0x82/0x180 [ 13.458761] ? preempt_count_sub+0x50/0x80 [ 13.458784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.458810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.458849] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.458876] kthread+0x337/0x6f0 [ 13.458895] ? trace_preempt_on+0x20/0xc0 [ 13.458921] ? __pfx_kthread+0x10/0x10 [ 13.458942] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.458964] ? calculate_sigpending+0x7b/0xa0 [ 13.458990] ? __pfx_kthread+0x10/0x10 [ 13.459011] ret_from_fork+0x116/0x1d0 [ 13.459031] ? __pfx_kthread+0x10/0x10 [ 13.459052] ret_from_fork_asm+0x1a/0x30 [ 13.459084] </TASK> [ 13.459095] [ 13.472301] Allocated by task 230: [ 13.472806] kasan_save_stack+0x45/0x70 [ 13.473196] kasan_save_track+0x18/0x40 [ 13.473679] kasan_save_alloc_info+0x3b/0x50 [ 13.474199] __kasan_slab_alloc+0x91/0xa0 [ 13.474665] kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.475103] kmem_cache_rcu_uaf+0x155/0x510 [ 13.475502] kunit_try_run_case+0x1a5/0x480 [ 13.475837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.476020] kthread+0x337/0x6f0 [ 13.476142] ret_from_fork+0x116/0x1d0 [ 13.476273] ret_from_fork_asm+0x1a/0x30 [ 13.476420] [ 13.476595] Freed by task 0: [ 13.476823] kasan_save_stack+0x45/0x70 [ 13.477032] kasan_save_track+0x18/0x40 [ 13.477245] kasan_save_free_info+0x3f/0x60 [ 13.477631] __kasan_slab_free+0x56/0x70 [ 13.477770] slab_free_after_rcu_debug+0xe4/0x310 [ 13.477927] rcu_core+0x66f/0x1c40 [ 13.478053] rcu_core_si+0x12/0x20 [ 13.478176] handle_softirqs+0x209/0x730 [ 13.478314] __irq_exit_rcu+0xc9/0x110 [ 13.478474] irq_exit_rcu+0x12/0x20 [ 13.478818] sysvec_apic_timer_interrupt+0x81/0x90 [ 13.479354] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 13.479905] [ 13.480066] Last potentially related work creation: [ 13.480548] kasan_save_stack+0x45/0x70 [ 13.481015] kasan_record_aux_stack+0xb2/0xc0 [ 13.481435] kmem_cache_free+0x131/0x420 [ 13.481964] kmem_cache_rcu_uaf+0x194/0x510 [ 13.482389] kunit_try_run_case+0x1a5/0x480 [ 13.482874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.483189] kthread+0x337/0x6f0 [ 13.483311] ret_from_fork+0x116/0x1d0 [ 13.483473] ret_from_fork_asm+0x1a/0x30 [ 13.483842] [ 13.484081] The buggy address belongs to the object at ffff8881026cc000 [ 13.484081] which belongs to the cache test_cache of size 200 [ 13.485213] The buggy address is located 0 bytes inside of [ 13.485213] freed 200-byte region [ffff8881026cc000, ffff8881026cc0c8) [ 13.486170] [ 13.486367] The buggy address belongs to the physical page: [ 13.486781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cc [ 13.487225] flags: 0x200000000000000(node=0|zone=2) [ 13.487394] page_type: f5(slab) [ 13.487557] raw: 0200000000000000 ffff8881009fca00 dead000000000122 0000000000000000 [ 13.488132] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 13.488370] page dumped because: kasan: bad access detected [ 13.488671] [ 13.488943] Memory state around the buggy address: [ 13.489395] ffff8881026cbf00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 13.490077] ffff8881026cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.490927] >ffff8881026cc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.491658] ^ [ 13.491784] ffff8881026cc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 13.492001] ffff8881026cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.492213] ==================================================================
[ 13.660821] ================================================================== [ 13.662129] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.662510] Read of size 1 at addr ffff8881025a9000 by task kunit_try_catch/231 [ 13.662985] [ 13.663107] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.663157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.663170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.663193] Call Trace: [ 13.663207] <TASK> [ 13.663226] dump_stack_lvl+0x73/0xb0 [ 13.663261] print_report+0xd1/0x610 [ 13.663284] ? __virt_addr_valid+0x1db/0x2d0 [ 13.663527] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.663555] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.663594] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.663620] kasan_report+0x141/0x180 [ 13.663655] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.663698] __asan_report_load1_noabort+0x18/0x20 [ 13.663725] kmem_cache_rcu_uaf+0x3e3/0x510 [ 13.663750] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [ 13.663774] ? finish_task_switch.isra.0+0x153/0x700 [ 13.663800] ? __switch_to+0x47/0xf50 [ 13.663830] ? __pfx_read_tsc+0x10/0x10 [ 13.663853] ? ktime_get_ts64+0x86/0x230 [ 13.663880] kunit_try_run_case+0x1a5/0x480 [ 13.663906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.663931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.663958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.663983] ? __kthread_parkme+0x82/0x180 [ 13.664005] ? preempt_count_sub+0x50/0x80 [ 13.664029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.664064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.664089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.664116] kthread+0x337/0x6f0 [ 13.664136] ? trace_preempt_on+0x20/0xc0 [ 13.664161] ? __pfx_kthread+0x10/0x10 [ 13.664182] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.664205] ? calculate_sigpending+0x7b/0xa0 [ 13.664231] ? __pfx_kthread+0x10/0x10 [ 13.664252] ret_from_fork+0x116/0x1d0 [ 13.664272] ? __pfx_kthread+0x10/0x10 [ 13.664294] ret_from_fork_asm+0x1a/0x30 [ 13.664326] </TASK> [ 13.664337] [ 13.675253] Allocated by task 231: [ 13.675558] kasan_save_stack+0x45/0x70 [ 13.676142] kasan_save_track+0x18/0x40 [ 13.676333] kasan_save_alloc_info+0x3b/0x50 [ 13.676541] __kasan_slab_alloc+0x91/0xa0 [ 13.676859] kmem_cache_alloc_noprof+0x123/0x3f0 [ 13.677086] kmem_cache_rcu_uaf+0x155/0x510 [ 13.677358] kunit_try_run_case+0x1a5/0x480 [ 13.677928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.678140] kthread+0x337/0x6f0 [ 13.678524] ret_from_fork+0x116/0x1d0 [ 13.678952] ret_from_fork_asm+0x1a/0x30 [ 13.679334] [ 13.679444] Freed by task 0: [ 13.679836] kasan_save_stack+0x45/0x70 [ 13.679999] kasan_save_track+0x18/0x40 [ 13.680239] kasan_save_free_info+0x3f/0x60 [ 13.681007] __kasan_slab_free+0x56/0x70 [ 13.681217] slab_free_after_rcu_debug+0xe4/0x310 [ 13.681459] rcu_core+0x66f/0x1c40 [ 13.681629] rcu_core_si+0x12/0x20 [ 13.682384] handle_softirqs+0x209/0x730 [ 13.682558] __irq_exit_rcu+0xc9/0x110 [ 13.683273] irq_exit_rcu+0x12/0x20 [ 13.683443] sysvec_apic_timer_interrupt+0x81/0x90 [ 13.683931] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 13.684226] [ 13.684345] Last potentially related work creation: [ 13.684895] kasan_save_stack+0x45/0x70 [ 13.685232] kasan_record_aux_stack+0xb2/0xc0 [ 13.685425] kmem_cache_free+0x131/0x420 [ 13.685639] kmem_cache_rcu_uaf+0x194/0x510 [ 13.686226] kunit_try_run_case+0x1a5/0x480 [ 13.686414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.686687] kthread+0x337/0x6f0 [ 13.687206] ret_from_fork+0x116/0x1d0 [ 13.687386] ret_from_fork_asm+0x1a/0x30 [ 13.687871] [ 13.688081] The buggy address belongs to the object at ffff8881025a9000 [ 13.688081] which belongs to the cache test_cache of size 200 [ 13.688687] The buggy address is located 0 bytes inside of [ 13.688687] freed 200-byte region [ffff8881025a9000, ffff8881025a90c8) [ 13.689653] [ 13.689757] The buggy address belongs to the physical page: [ 13.690451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a9 [ 13.691045] flags: 0x200000000000000(node=0|zone=2) [ 13.691474] page_type: f5(slab) [ 13.691737] raw: 0200000000000000 ffff8881016c1280 dead000000000122 0000000000000000 [ 13.692287] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 13.692852] page dumped because: kasan: bad access detected [ 13.693255] [ 13.693335] Memory state around the buggy address: [ 13.693583] ffff8881025a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.694284] ffff8881025a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.694599] >ffff8881025a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.695198] ^ [ 13.695495] ffff8881025a9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 13.695940] ffff8881025a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.696500] ==================================================================