Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 47.159218] ================================================================== [ 47.173041] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 47.180414] Read of size 1 at addr ffff0008030dafc0 by task kunit_try_catch/276 [ 47.187705] [ 47.189191] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 47.189252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.189268] Hardware name: WinLink E850-96 board (DT) [ 47.189291] Call trace: [ 47.189306] show_stack+0x20/0x38 (C) [ 47.189344] dump_stack_lvl+0x8c/0xd0 [ 47.189377] print_report+0x118/0x5d0 [ 47.189406] kasan_report+0xdc/0x128 [ 47.189431] __kasan_check_byte+0x54/0x70 [ 47.189468] kfree_sensitive+0x30/0xb0 [ 47.189507] kmalloc_double_kzfree+0x168/0x308 [ 47.189542] kunit_try_run_case+0x170/0x3f0 [ 47.189582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.189614] kthread+0x328/0x630 [ 47.189644] ret_from_fork+0x10/0x20 [ 47.189679] [ 47.256456] Allocated by task 276: [ 47.259844] kasan_save_stack+0x3c/0x68 [ 47.263659] kasan_save_track+0x20/0x40 [ 47.267480] kasan_save_alloc_info+0x40/0x58 [ 47.271732] __kasan_kmalloc+0xd4/0xd8 [ 47.275465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.279978] kmalloc_double_kzfree+0xb8/0x308 [ 47.284319] kunit_try_run_case+0x170/0x3f0 [ 47.288485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.293954] kthread+0x328/0x630 [ 47.297166] ret_from_fork+0x10/0x20 [ 47.300725] [ 47.302202] Freed by task 276: [ 47.305240] kasan_save_stack+0x3c/0x68 [ 47.309058] kasan_save_track+0x20/0x40 [ 47.312877] kasan_save_free_info+0x4c/0x78 [ 47.317044] __kasan_slab_free+0x6c/0x98 [ 47.320951] kfree+0x214/0x3c8 [ 47.323988] kfree_sensitive+0x80/0xb0 [ 47.327721] kmalloc_double_kzfree+0x11c/0x308 [ 47.332148] kunit_try_run_case+0x170/0x3f0 [ 47.336314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.341783] kthread+0x328/0x630 [ 47.344995] ret_from_fork+0x10/0x20 [ 47.348554] [ 47.350032] The buggy address belongs to the object at ffff0008030dafc0 [ 47.350032] which belongs to the cache kmalloc-16 of size 16 [ 47.362359] The buggy address is located 0 bytes inside of [ 47.362359] freed 16-byte region [ffff0008030dafc0, ffff0008030dafd0) [ 47.374335] [ 47.375814] The buggy address belongs to the physical page: [ 47.381370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830da [ 47.389354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.395865] page_type: f5(slab) [ 47.398999] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 47.406719] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.414438] page dumped because: kasan: bad access detected [ 47.419994] [ 47.421469] Memory state around the buggy address: [ 47.426248] ffff0008030dae80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.433452] ffff0008030daf00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.440658] >ffff0008030daf80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 47.447858] ^ [ 47.453158] ffff0008030db000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.460362] ffff0008030db080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 47.467565] ==================================================================
[ 30.683787] ================================================================== [ 30.683851] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.683921] Read of size 1 at addr fff00000c918c680 by task kunit_try_catch/223 [ 30.683971] [ 30.684010] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.684098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.684124] Hardware name: linux,dummy-virt (DT) [ 30.684157] Call trace: [ 30.684204] show_stack+0x20/0x38 (C) [ 30.684258] dump_stack_lvl+0x8c/0xd0 [ 30.684305] print_report+0x118/0x5d0 [ 30.684804] kasan_report+0xdc/0x128 [ 30.684847] __kasan_check_byte+0x54/0x70 [ 30.684896] kfree_sensitive+0x30/0xb0 [ 30.685004] kmalloc_double_kzfree+0x168/0x308 [ 30.685070] kunit_try_run_case+0x170/0x3f0 [ 30.685138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.685190] kthread+0x328/0x630 [ 30.685236] ret_from_fork+0x10/0x20 [ 30.685284] [ 30.685302] Allocated by task 223: [ 30.685340] kasan_save_stack+0x3c/0x68 [ 30.685382] kasan_save_track+0x20/0x40 [ 30.685451] kasan_save_alloc_info+0x40/0x58 [ 30.685491] __kasan_kmalloc+0xd4/0xd8 [ 30.685529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.685571] kmalloc_double_kzfree+0xb8/0x308 [ 30.685611] kunit_try_run_case+0x170/0x3f0 [ 30.685650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.685690] kthread+0x328/0x630 [ 30.685724] ret_from_fork+0x10/0x20 [ 30.685760] [ 30.685779] Freed by task 223: [ 30.685804] kasan_save_stack+0x3c/0x68 [ 30.685843] kasan_save_track+0x20/0x40 [ 30.685880] kasan_save_free_info+0x4c/0x78 [ 30.685916] __kasan_slab_free+0x6c/0x98 [ 30.685955] kfree+0x214/0x3c8 [ 30.685990] kfree_sensitive+0x80/0xb0 [ 30.686028] kmalloc_double_kzfree+0x11c/0x308 [ 30.686068] kunit_try_run_case+0x170/0x3f0 [ 30.686107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.686148] kthread+0x328/0x630 [ 30.686204] ret_from_fork+0x10/0x20 [ 30.686272] [ 30.686383] The buggy address belongs to the object at fff00000c918c680 [ 30.686383] which belongs to the cache kmalloc-16 of size 16 [ 30.686469] The buggy address is located 0 bytes inside of [ 30.686469] freed 16-byte region [fff00000c918c680, fff00000c918c690) [ 30.686602] [ 30.686662] The buggy address belongs to the physical page: [ 30.686723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.686855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.686922] page_type: f5(slab) [ 30.686994] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.687130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.687207] page dumped because: kasan: bad access detected [ 30.687276] [ 30.687314] Memory state around the buggy address: [ 30.687358] fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.687668] fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.687787] >fff00000c918c680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.687874] ^ [ 30.687910] fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.687996] fff00000c918c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.688086] ==================================================================
[ 24.114060] ================================================================== [ 24.115392] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350 [ 24.115770] Read of size 1 at addr ffff888104c83b60 by task kunit_try_catch/242 [ 24.116037] [ 24.116160] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 24.116220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.116233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.116256] Call Trace: [ 24.116270] <TASK> [ 24.116289] dump_stack_lvl+0x73/0xb0 [ 24.116330] print_report+0xd1/0x610 [ 24.116354] ? __virt_addr_valid+0x1db/0x2d0 [ 24.116380] ? kmalloc_double_kzfree+0x19c/0x350 [ 24.116402] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.116428] ? kmalloc_double_kzfree+0x19c/0x350 [ 24.116450] kasan_report+0x141/0x180 [ 24.116471] ? kmalloc_double_kzfree+0x19c/0x350 [ 24.116495] ? kmalloc_double_kzfree+0x19c/0x350 [ 24.116517] __kasan_check_byte+0x3d/0x50 [ 24.116538] kfree_sensitive+0x22/0x90 [ 24.116564] kmalloc_double_kzfree+0x19c/0x350 [ 24.116586] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 24.116609] ? __schedule+0x10cc/0x2b60 [ 24.116633] ? __pfx_read_tsc+0x10/0x10 [ 24.116655] ? ktime_get_ts64+0x86/0x230 [ 24.116681] kunit_try_run_case+0x1a5/0x480 [ 24.116705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.116726] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.116880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.116904] ? __kthread_parkme+0x82/0x180 [ 24.116926] ? preempt_count_sub+0x50/0x80 [ 24.116950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.116973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.116998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.117022] kthread+0x337/0x6f0 [ 24.117042] ? trace_preempt_on+0x20/0xc0 [ 24.117066] ? __pfx_kthread+0x10/0x10 [ 24.117086] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.117107] ? calculate_sigpending+0x7b/0xa0 [ 24.117132] ? __pfx_kthread+0x10/0x10 [ 24.117153] ret_from_fork+0x116/0x1d0 [ 24.117172] ? __pfx_kthread+0x10/0x10 [ 24.117193] ret_from_fork_asm+0x1a/0x30 [ 24.117224] </TASK> [ 24.117235] [ 24.124696] Allocated by task 242: [ 24.124909] kasan_save_stack+0x45/0x70 [ 24.125055] kasan_save_track+0x18/0x40 [ 24.125243] kasan_save_alloc_info+0x3b/0x50 [ 24.125646] __kasan_kmalloc+0xb7/0xc0 [ 24.125850] __kmalloc_cache_noprof+0x189/0x420 [ 24.126065] kmalloc_double_kzfree+0xa9/0x350 [ 24.126368] kunit_try_run_case+0x1a5/0x480 [ 24.126599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.126869] kthread+0x337/0x6f0 [ 24.126986] ret_from_fork+0x116/0x1d0 [ 24.127146] ret_from_fork_asm+0x1a/0x30 [ 24.127427] [ 24.127519] Freed by task 242: [ 24.127669] kasan_save_stack+0x45/0x70 [ 24.127857] kasan_save_track+0x18/0x40 [ 24.128028] kasan_save_free_info+0x3f/0x60 [ 24.128210] __kasan_slab_free+0x56/0x70 [ 24.128429] kfree+0x222/0x3f0 [ 24.128614] kfree_sensitive+0x67/0x90 [ 24.128819] kmalloc_double_kzfree+0x12b/0x350 [ 24.129003] kunit_try_run_case+0x1a5/0x480 [ 24.129187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.129408] kthread+0x337/0x6f0 [ 24.129578] ret_from_fork+0x116/0x1d0 [ 24.129773] ret_from_fork_asm+0x1a/0x30 [ 24.129944] [ 24.130023] The buggy address belongs to the object at ffff888104c83b60 [ 24.130023] which belongs to the cache kmalloc-16 of size 16 [ 24.130462] The buggy address is located 0 bytes inside of [ 24.130462] freed 16-byte region [ffff888104c83b60, ffff888104c83b70) [ 24.131173] [ 24.131349] The buggy address belongs to the physical page: [ 24.131571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 24.131906] flags: 0x200000000000000(node=0|zone=2) [ 24.132124] page_type: f5(slab) [ 24.132330] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.132641] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.132956] page dumped because: kasan: bad access detected [ 24.133162] [ 24.133227] Memory state around the buggy address: [ 24.133542] ffff888104c83a00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 24.133827] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.134117] >ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.134607] ^ [ 24.134821] ffff888104c83b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.135055] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.135471] ==================================================================