Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   29.457814] ==================================================================
[   29.466472] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.473591] Write of size 33 at addr ffff000804b57380 by task kunit_try_catch/231
[   29.481051] 
[   29.482539] CPU: 6 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   29.482595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.482614] Hardware name: WinLink E850-96 board (DT)
[   29.482634] Call trace:
[   29.482647]  show_stack+0x20/0x38 (C)
[   29.482687]  dump_stack_lvl+0x8c/0xd0
[   29.482719]  print_report+0x118/0x608
[   29.482752]  kasan_report+0xdc/0x128
[   29.482782]  kasan_check_range+0x100/0x1a8
[   29.482814]  __asan_memset+0x34/0x78
[   29.482849]  kmalloc_uaf_memset+0x170/0x310
[   29.482877]  kunit_try_run_case+0x170/0x3f0
[   29.482910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.482949]  kthread+0x328/0x630
[   29.482982]  ret_from_fork+0x10/0x20
[   29.483014] 
[   29.549454] Allocated by task 231:
[   29.552842]  kasan_save_stack+0x3c/0x68
[   29.556657]  kasan_save_track+0x20/0x40
[   29.560477]  kasan_save_alloc_info+0x40/0x58
[   29.564730]  __kasan_kmalloc+0xd4/0xd8
[   29.568463]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.572976]  kmalloc_uaf_memset+0xb8/0x310
[   29.577057]  kunit_try_run_case+0x170/0x3f0
[   29.581223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.586692]  kthread+0x328/0x630
[   29.589903]  ret_from_fork+0x10/0x20
[   29.593462] 
[   29.594939] Freed by task 231:
[   29.597979]  kasan_save_stack+0x3c/0x68
[   29.601796]  kasan_save_track+0x20/0x40
[   29.605615]  kasan_save_free_info+0x4c/0x78
[   29.609781]  __kasan_slab_free+0x6c/0x98
[   29.613688]  kfree+0x214/0x3c8
[   29.616726]  kmalloc_uaf_memset+0x11c/0x310
[   29.620892]  kunit_try_run_case+0x170/0x3f0
[   29.625059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.630529]  kthread+0x328/0x630
[   29.633740]  ret_from_fork+0x10/0x20
[   29.637299] 
[   29.638776] The buggy address belongs to the object at ffff000804b57380
[   29.638776]  which belongs to the cache kmalloc-64 of size 64
[   29.651104] The buggy address is located 0 bytes inside of
[   29.651104]  freed 64-byte region [ffff000804b57380, ffff000804b573c0)
[   29.663079] 
[   29.664559] The buggy address belongs to the physical page:
[   29.670114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b57
[   29.678100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.684609] page_type: f5(slab)
[   29.687746] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.695464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.703183] page dumped because: kasan: bad access detected
[   29.708738] 
[   29.710214] Memory state around the buggy address:
[   29.714997]  ffff000804b57280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.722199]  ffff000804b57300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.729403] >ffff000804b57380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.736602]                    ^
[   29.739819]  ffff000804b57400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.747023]  ffff000804b57480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.754225] ==================================================================