Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 29.457814] ================================================================== [ 29.466472] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.473591] Write of size 33 at addr ffff000804b57380 by task kunit_try_catch/231 [ 29.481051] [ 29.482539] CPU: 6 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 29.482595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.482614] Hardware name: WinLink E850-96 board (DT) [ 29.482634] Call trace: [ 29.482647] show_stack+0x20/0x38 (C) [ 29.482687] dump_stack_lvl+0x8c/0xd0 [ 29.482719] print_report+0x118/0x608 [ 29.482752] kasan_report+0xdc/0x128 [ 29.482782] kasan_check_range+0x100/0x1a8 [ 29.482814] __asan_memset+0x34/0x78 [ 29.482849] kmalloc_uaf_memset+0x170/0x310 [ 29.482877] kunit_try_run_case+0x170/0x3f0 [ 29.482910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.482949] kthread+0x328/0x630 [ 29.482982] ret_from_fork+0x10/0x20 [ 29.483014] [ 29.549454] Allocated by task 231: [ 29.552842] kasan_save_stack+0x3c/0x68 [ 29.556657] kasan_save_track+0x20/0x40 [ 29.560477] kasan_save_alloc_info+0x40/0x58 [ 29.564730] __kasan_kmalloc+0xd4/0xd8 [ 29.568463] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.572976] kmalloc_uaf_memset+0xb8/0x310 [ 29.577057] kunit_try_run_case+0x170/0x3f0 [ 29.581223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.586692] kthread+0x328/0x630 [ 29.589903] ret_from_fork+0x10/0x20 [ 29.593462] [ 29.594939] Freed by task 231: [ 29.597979] kasan_save_stack+0x3c/0x68 [ 29.601796] kasan_save_track+0x20/0x40 [ 29.605615] kasan_save_free_info+0x4c/0x78 [ 29.609781] __kasan_slab_free+0x6c/0x98 [ 29.613688] kfree+0x214/0x3c8 [ 29.616726] kmalloc_uaf_memset+0x11c/0x310 [ 29.620892] kunit_try_run_case+0x170/0x3f0 [ 29.625059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.630529] kthread+0x328/0x630 [ 29.633740] ret_from_fork+0x10/0x20 [ 29.637299] [ 29.638776] The buggy address belongs to the object at ffff000804b57380 [ 29.638776] which belongs to the cache kmalloc-64 of size 64 [ 29.651104] The buggy address is located 0 bytes inside of [ 29.651104] freed 64-byte region [ffff000804b57380, ffff000804b573c0) [ 29.663079] [ 29.664559] The buggy address belongs to the physical page: [ 29.670114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b57 [ 29.678100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.684609] page_type: f5(slab) [ 29.687746] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.695464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.703183] page dumped because: kasan: bad access detected [ 29.708738] [ 29.710214] Memory state around the buggy address: [ 29.714997] ffff000804b57280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.722199] ffff000804b57300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.729403] >ffff000804b57380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.736602] ^ [ 29.739819] ffff000804b57400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.747023] ffff000804b57480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.754225] ==================================================================