Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   32.277307] ==================================================================
[   32.284400] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.290731] Read of size 1 at addr ffff000801f1c478 by task kunit_try_catch/241
[   32.298022] 
[   32.299506] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   32.299560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.299575] Hardware name: WinLink E850-96 board (DT)
[   32.299593] Call trace:
[   32.299606]  show_stack+0x20/0x38 (C)
[   32.299639]  dump_stack_lvl+0x8c/0xd0
[   32.299670]  print_report+0x118/0x608
[   32.299703]  kasan_report+0xdc/0x128
[   32.299731]  __asan_report_load1_noabort+0x20/0x30
[   32.299764]  ksize_uaf+0x544/0x5f8
[   32.299791]  kunit_try_run_case+0x170/0x3f0
[   32.299820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.299857]  kthread+0x328/0x630
[   32.299888]  ret_from_fork+0x10/0x20
[   32.299919] 
[   32.362778] Allocated by task 241:
[   32.366167]  kasan_save_stack+0x3c/0x68
[   32.369983]  kasan_save_track+0x20/0x40
[   32.373803]  kasan_save_alloc_info+0x40/0x58
[   32.378056]  __kasan_kmalloc+0xd4/0xd8
[   32.381788]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.386302]  ksize_uaf+0xb8/0x5f8
[   32.389601]  kunit_try_run_case+0x170/0x3f0
[   32.393767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.399237]  kthread+0x328/0x630
[   32.402449]  ret_from_fork+0x10/0x20
[   32.406007] 
[   32.407482] Freed by task 241:
[   32.410521]  kasan_save_stack+0x3c/0x68
[   32.414340]  kasan_save_track+0x20/0x40
[   32.418159]  kasan_save_free_info+0x4c/0x78
[   32.422326]  __kasan_slab_free+0x6c/0x98
[   32.426232]  kfree+0x214/0x3c8
[   32.429270]  ksize_uaf+0x11c/0x5f8
[   32.432656]  kunit_try_run_case+0x170/0x3f0
[   32.436822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.442291]  kthread+0x328/0x630
[   32.445503]  ret_from_fork+0x10/0x20
[   32.449062] 
[   32.450537] The buggy address belongs to the object at ffff000801f1c400
[   32.450537]  which belongs to the cache kmalloc-128 of size 128
[   32.463039] The buggy address is located 120 bytes inside of
[   32.463039]  freed 128-byte region [ffff000801f1c400, ffff000801f1c480)
[   32.475277] 
[   32.476754] The buggy address belongs to the physical page:
[   32.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   32.490296] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.497934] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.504878] page_type: f5(slab)
[   32.508011] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.515734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.523460] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.531272] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.539085] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   32.546897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.554704] page dumped because: kasan: bad access detected
[   32.560258] 
[   32.561733] Memory state around the buggy address:
[   32.566512]  ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.573716]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580921] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.588122]                                                                 ^
[   32.595244]  ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.602449]  ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.609650] ==================================================================
[   31.941783] ==================================================================
[   31.948815] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.955146] Read of size 1 at addr ffff000801f1c400 by task kunit_try_catch/241
[   31.962437] 
[   31.963922] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   31.963975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.963989] Hardware name: WinLink E850-96 board (DT)
[   31.964012] Call trace:
[   31.964027]  show_stack+0x20/0x38 (C)
[   31.964061]  dump_stack_lvl+0x8c/0xd0
[   31.964091]  print_report+0x118/0x608
[   31.964122]  kasan_report+0xdc/0x128
[   31.964151]  __asan_report_load1_noabort+0x20/0x30
[   31.964185]  ksize_uaf+0x598/0x5f8
[   31.964212]  kunit_try_run_case+0x170/0x3f0
[   31.964244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.964278]  kthread+0x328/0x630
[   31.964311]  ret_from_fork+0x10/0x20
[   31.964346] 
[   32.027193] Allocated by task 241:
[   32.030581]  kasan_save_stack+0x3c/0x68
[   32.034398]  kasan_save_track+0x20/0x40
[   32.038217]  kasan_save_alloc_info+0x40/0x58
[   32.042471]  __kasan_kmalloc+0xd4/0xd8
[   32.046203]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.050717]  ksize_uaf+0xb8/0x5f8
[   32.054016]  kunit_try_run_case+0x170/0x3f0
[   32.058182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.063651]  kthread+0x328/0x630
[   32.066862]  ret_from_fork+0x10/0x20
[   32.070422] 
[   32.071897] Freed by task 241:
[   32.074935]  kasan_save_stack+0x3c/0x68
[   32.078755]  kasan_save_track+0x20/0x40
[   32.082574]  kasan_save_free_info+0x4c/0x78
[   32.086741]  __kasan_slab_free+0x6c/0x98
[   32.090647]  kfree+0x214/0x3c8
[   32.093685]  ksize_uaf+0x11c/0x5f8
[   32.097071]  kunit_try_run_case+0x170/0x3f0
[   32.101237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.106706]  kthread+0x328/0x630
[   32.109917]  ret_from_fork+0x10/0x20
[   32.113477] 
[   32.114954] The buggy address belongs to the object at ffff000801f1c400
[   32.114954]  which belongs to the cache kmalloc-128 of size 128
[   32.127455] The buggy address is located 0 bytes inside of
[   32.127455]  freed 128-byte region [ffff000801f1c400, ffff000801f1c480)
[   32.139517] 
[   32.140996] The buggy address belongs to the physical page:
[   32.146552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   32.154537] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.162175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.169118] page_type: f5(slab)
[   32.172254] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.179975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.187702] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.195513] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.203326] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   32.211138] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.218944] page dumped because: kasan: bad access detected
[   32.224499] 
[   32.225974] Memory state around the buggy address:
[   32.230753]  ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.237958]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.245162] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.252363]                    ^
[   32.255579]  ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.262784]  ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.269985] ==================================================================
[   31.601493] ==================================================================
[   31.611146] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.617479] Read of size 1 at addr ffff000801f1c400 by task kunit_try_catch/241
[   31.624770] 
[   31.626256] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   31.626316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.626334] Hardware name: WinLink E850-96 board (DT)
[   31.626355] Call trace:
[   31.626371]  show_stack+0x20/0x38 (C)
[   31.626409]  dump_stack_lvl+0x8c/0xd0
[   31.626442]  print_report+0x118/0x608
[   31.626475]  kasan_report+0xdc/0x128
[   31.626506]  __kasan_check_byte+0x54/0x70
[   31.626537]  ksize+0x30/0x88
[   31.626567]  ksize_uaf+0x168/0x5f8
[   31.626596]  kunit_try_run_case+0x170/0x3f0
[   31.626630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.626665]  kthread+0x328/0x630
[   31.626700]  ret_from_fork+0x10/0x20
[   31.626733] 
[   31.691611] Allocated by task 241:
[   31.694997]  kasan_save_stack+0x3c/0x68
[   31.698813]  kasan_save_track+0x20/0x40
[   31.702634]  kasan_save_alloc_info+0x40/0x58
[   31.706885]  __kasan_kmalloc+0xd4/0xd8
[   31.710618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.715132]  ksize_uaf+0xb8/0x5f8
[   31.718430]  kunit_try_run_case+0x170/0x3f0
[   31.722597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728067]  kthread+0x328/0x630
[   31.731277]  ret_from_fork+0x10/0x20
[   31.734836] 
[   31.736313] Freed by task 241:
[   31.739350]  kasan_save_stack+0x3c/0x68
[   31.743170]  kasan_save_track+0x20/0x40
[   31.746989]  kasan_save_free_info+0x4c/0x78
[   31.751156]  __kasan_slab_free+0x6c/0x98
[   31.755062]  kfree+0x214/0x3c8
[   31.758100]  ksize_uaf+0x11c/0x5f8
[   31.761485]  kunit_try_run_case+0x170/0x3f0
[   31.765652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.771120]  kthread+0x328/0x630
[   31.774332]  ret_from_fork+0x10/0x20
[   31.777891] 
[   31.779369] The buggy address belongs to the object at ffff000801f1c400
[   31.779369]  which belongs to the cache kmalloc-128 of size 128
[   31.791871] The buggy address is located 0 bytes inside of
[   31.791871]  freed 128-byte region [ffff000801f1c400, ffff000801f1c480)
[   31.803934] 
[   31.805412] The buggy address belongs to the physical page:
[   31.810967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881f1c
[   31.818952] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.826591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.833535] page_type: f5(slab)
[   31.836673] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.844390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.852116] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.859928] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.867741] head: 0bfffe0000000001 fffffdffe007c701 00000000ffffffff 00000000ffffffff
[   31.875553] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.883360] page dumped because: kasan: bad access detected
[   31.888914] 
[   31.890389] Memory state around the buggy address:
[   31.895174]  ffff000801f1c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.902373]  ffff000801f1c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.909579] >ffff000801f1c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.916778]                    ^
[   31.919993]  ffff000801f1c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.927198]  ffff000801f1c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.934401] ==================================================================