Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.370146] ==================================================================
[   31.370338] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   31.370492] Read of size 1 at addr fff00000c767c000 by task kunit_try_catch/159
[   31.370705] 
[   31.370946] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   31.371587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.371708] Hardware name: linux,dummy-virt (DT)
[   31.371799] Call trace:
[   31.371895]  show_stack+0x20/0x38 (C)
[   31.372125]  dump_stack_lvl+0x8c/0xd0
[   31.372412]  print_report+0x118/0x608
[   31.372599]  kasan_report+0xdc/0x128
[   31.372696]  __asan_report_load1_noabort+0x20/0x30
[   31.373050]  kmalloc_large_uaf+0x2cc/0x2f8
[   31.373198]  kunit_try_run_case+0x170/0x3f0
[   31.373333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.373635]  kthread+0x328/0x630
[   31.373759]  ret_from_fork+0x10/0x20
[   31.373967] 
[   31.374057] The buggy address belongs to the physical page:
[   31.374220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767c
[   31.374681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.374947] raw: 0bfffe0000000000 ffffc1ffc3181c08 fff00000da498c80 0000000000000000
[   31.375231] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   31.375358] page dumped because: kasan: bad access detected
[   31.375873] 
[   31.375934] Memory state around the buggy address:
[   31.376027]  fff00000c767bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.376140]  fff00000c767bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.376684] >fff00000c767c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.376873]                    ^
[   31.377080]  fff00000c767c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.377225]  fff00000c767c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.377303] ==================================================================

[   24.870215] ==================================================================
[   24.870946] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   24.871429] Read of size 1 at addr ffff8881038e0000 by task kunit_try_catch/177
[   24.871830] 
[   24.872232] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   24.872354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.872379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.872425] Call Trace:
[   24.872467]  <TASK>
[   24.872501]  dump_stack_lvl+0x73/0xb0
[   24.872564]  print_report+0xd1/0x650
[   24.872607]  ? __virt_addr_valid+0x1db/0x2d0
[   24.872652]  ? kmalloc_large_uaf+0x2f1/0x340
[   24.872697]  ? kasan_addr_to_slab+0x11/0xa0
[   24.872738]  ? kmalloc_large_uaf+0x2f1/0x340
[   24.872782]  kasan_report+0x141/0x180
[   24.872830]  ? kmalloc_large_uaf+0x2f1/0x340
[   24.872886]  __asan_report_load1_noabort+0x18/0x20
[   24.872938]  kmalloc_large_uaf+0x2f1/0x340
[   24.872983]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   24.873157]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   24.873205]  kunit_try_run_case+0x1a5/0x480
[   24.873265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.873324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.873372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.873414]  ? __kthread_parkme+0x82/0x180
[   24.873469]  ? preempt_count_sub+0x50/0x80
[   24.873529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.873575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.873625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.873676]  kthread+0x337/0x6f0
[   24.873719]  ? trace_preempt_on+0x20/0xc0
[   24.873757]  ? __pfx_kthread+0x10/0x10
[   24.873779]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.873802]  ? calculate_sigpending+0x7b/0xa0
[   24.873827]  ? __pfx_kthread+0x10/0x10
[   24.873850]  ret_from_fork+0x116/0x1d0
[   24.873872]  ? __pfx_kthread+0x10/0x10
[   24.873894]  ret_from_fork_asm+0x1a/0x30
[   24.873927]  </TASK>
[   24.873940] 
[   24.884246] The buggy address belongs to the physical page:
[   24.884939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e0
[   24.885852] flags: 0x200000000000000(node=0|zone=2)
[   24.886315] raw: 0200000000000000 ffffea00040e3908 ffff88815b139fc0 0000000000000000
[   24.886657] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   24.886934] page dumped because: kasan: bad access detected
[   24.887422] 
[   24.887744] Memory state around the buggy address:
[   24.888179]  ffff8881038dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.888888]  ffff8881038dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.889470] >ffff8881038e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.890276]                    ^
[   24.890750]  ffff8881038e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.891244]  ffff8881038e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.891514] ==================================================================