Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 55.995299] ================================================================== [ 56.018987] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 56.024885] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343 [ 56.032176] [ 56.033664] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 56.033725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.033744] Hardware name: WinLink E850-96 board (DT) [ 56.033766] Call trace: [ 56.033783] show_stack+0x20/0x38 (C) [ 56.033823] dump_stack_lvl+0x8c/0xd0 [ 56.033854] print_report+0x118/0x5d0 [ 56.033886] kasan_report+0xdc/0x128 [ 56.033913] __asan_report_load1_noabort+0x20/0x30 [ 56.033951] strcmp+0xc0/0xc8 [ 56.033984] kasan_strings+0x340/0xb00 [ 56.034019] kunit_try_run_case+0x170/0x3f0 [ 56.034058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.034093] kthread+0x328/0x630 [ 56.034124] ret_from_fork+0x10/0x20 [ 56.034162] [ 56.100232] Allocated by task 343: [ 56.103620] kasan_save_stack+0x3c/0x68 [ 56.107435] kasan_save_track+0x20/0x40 [ 56.111255] kasan_save_alloc_info+0x40/0x58 [ 56.115508] __kasan_kmalloc+0xd4/0xd8 [ 56.119241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.123754] kasan_strings+0xc8/0xb00 [ 56.127402] kunit_try_run_case+0x170/0x3f0 [ 56.131567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.137036] kthread+0x328/0x630 [ 56.140247] ret_from_fork+0x10/0x20 [ 56.143806] [ 56.145283] Freed by task 343: [ 56.148323] kasan_save_stack+0x3c/0x68 [ 56.152139] kasan_save_track+0x20/0x40 [ 56.155959] kasan_save_free_info+0x4c/0x78 [ 56.160126] __kasan_slab_free+0x6c/0x98 [ 56.164033] kfree+0x214/0x3c8 [ 56.167070] kasan_strings+0x24c/0xb00 [ 56.170803] kunit_try_run_case+0x170/0x3f0 [ 56.174969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.180438] kthread+0x328/0x630 [ 56.183650] ret_from_fork+0x10/0x20 [ 56.187208] [ 56.188686] The buggy address belongs to the object at ffff000808564880 [ 56.188686] which belongs to the cache kmalloc-32 of size 32 [ 56.201012] The buggy address is located 16 bytes inside of [ 56.201012] freed 32-byte region [ffff000808564880, ffff0008085648a0) [ 56.213076] [ 56.214556] The buggy address belongs to the physical page: [ 56.220112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564 [ 56.228097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.234606] page_type: f5(slab) [ 56.237742] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 56.245461] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 56.253181] page dumped because: kasan: bad access detected [ 56.258735] [ 56.260212] Memory state around the buggy address: [ 56.264993] ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.272194] ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.279399] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.286599] ^ [ 56.290335] ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 56.297540] ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.304742] ==================================================================
[ 31.974645] ================================================================== [ 31.974706] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 31.975008] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290 [ 31.975549] [ 31.975773] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.975872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.975996] Hardware name: linux,dummy-virt (DT) [ 31.976060] Call trace: [ 31.976124] show_stack+0x20/0x38 (C) [ 31.976278] dump_stack_lvl+0x8c/0xd0 [ 31.976331] print_report+0x118/0x5d0 [ 31.976691] kasan_report+0xdc/0x128 [ 31.976771] __asan_report_load1_noabort+0x20/0x30 [ 31.976885] strcmp+0xc0/0xc8 [ 31.976997] kasan_strings+0x340/0xb00 [ 31.977190] kunit_try_run_case+0x170/0x3f0 [ 31.977252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.977304] kthread+0x328/0x630 [ 31.977347] ret_from_fork+0x10/0x20 [ 31.977398] [ 31.977457] Allocated by task 290: [ 31.977513] kasan_save_stack+0x3c/0x68 [ 31.977567] kasan_save_track+0x20/0x40 [ 31.977614] kasan_save_alloc_info+0x40/0x58 [ 31.977656] __kasan_kmalloc+0xd4/0xd8 [ 31.977697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.977740] kasan_strings+0xc8/0xb00 [ 31.977778] kunit_try_run_case+0x170/0x3f0 [ 31.977818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.977865] kthread+0x328/0x630 [ 31.977899] ret_from_fork+0x10/0x20 [ 31.977936] [ 31.977967] Freed by task 290: [ 31.977995] kasan_save_stack+0x3c/0x68 [ 31.978044] kasan_save_track+0x20/0x40 [ 31.978099] kasan_save_free_info+0x4c/0x78 [ 31.978148] __kasan_slab_free+0x6c/0x98 [ 31.978190] kfree+0x214/0x3c8 [ 31.978228] kasan_strings+0x24c/0xb00 [ 31.978265] kunit_try_run_case+0x170/0x3f0 [ 31.978316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.978364] kthread+0x328/0x630 [ 31.978400] ret_from_fork+0x10/0x20 [ 31.978438] [ 31.978470] The buggy address belongs to the object at fff00000c65343c0 [ 31.978470] which belongs to the cache kmalloc-32 of size 32 [ 31.978536] The buggy address is located 16 bytes inside of [ 31.978536] freed 32-byte region [fff00000c65343c0, fff00000c65343e0) [ 31.978605] [ 31.978635] The buggy address belongs to the physical page: [ 31.978675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 31.978758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.978832] page_type: f5(slab) [ 31.978878] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.978930] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.978981] page dumped because: kasan: bad access detected [ 31.979025] [ 31.979737] Memory state around the buggy address: [ 31.979829] fff00000c6534280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.979888] fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.979998] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.980040] ^ [ 31.980094] fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.980467] fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.980685] ==================================================================
[ 26.271380] ================================================================== [ 26.273322] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0 [ 26.274275] Read of size 1 at addr ffff888103eba090 by task kunit_try_catch/308 [ 26.274641] [ 26.274898] CPU: 0 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.274987] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.275006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.275037] Call Trace: [ 26.275053] <TASK> [ 26.275073] dump_stack_lvl+0x73/0xb0 [ 26.275110] print_report+0xd1/0x610 [ 26.275135] ? __virt_addr_valid+0x1db/0x2d0 [ 26.275160] ? strcmp+0xb0/0xc0 [ 26.275178] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.275203] ? strcmp+0xb0/0xc0 [ 26.275222] kasan_report+0x141/0x180 [ 26.275242] ? strcmp+0xb0/0xc0 [ 26.275264] __asan_report_load1_noabort+0x18/0x20 [ 26.275287] strcmp+0xb0/0xc0 [ 26.275306] kasan_strings+0x431/0xe80 [ 26.275325] ? trace_hardirqs_on+0x37/0xe0 [ 26.275348] ? __pfx_kasan_strings+0x10/0x10 [ 26.275367] ? finish_task_switch.isra.0+0x153/0x700 [ 26.275389] ? __switch_to+0x47/0xf80 [ 26.275414] ? __schedule+0x10cc/0x2b60 [ 26.275437] ? __pfx_read_tsc+0x10/0x10 [ 26.275458] ? ktime_get_ts64+0x86/0x230 [ 26.275482] kunit_try_run_case+0x1a5/0x480 [ 26.275506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.275526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.275548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.275572] ? __kthread_parkme+0x82/0x180 [ 26.275593] ? preempt_count_sub+0x50/0x80 [ 26.275616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.275638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.275672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.275696] kthread+0x337/0x6f0 [ 26.275716] ? trace_preempt_on+0x20/0xc0 [ 26.275743] ? __pfx_kthread+0x10/0x10 [ 26.275764] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.275785] ? calculate_sigpending+0x7b/0xa0 [ 26.275809] ? __pfx_kthread+0x10/0x10 [ 26.275830] ret_from_fork+0x116/0x1d0 [ 26.275848] ? __pfx_kthread+0x10/0x10 [ 26.275869] ret_from_fork_asm+0x1a/0x30 [ 26.275899] </TASK> [ 26.275911] [ 26.290621] Allocated by task 308: [ 26.290956] kasan_save_stack+0x45/0x70 [ 26.291172] kasan_save_track+0x18/0x40 [ 26.291348] kasan_save_alloc_info+0x3b/0x50 [ 26.291547] __kasan_kmalloc+0xb7/0xc0 [ 26.292355] __kmalloc_cache_noprof+0x189/0x420 [ 26.292618] kasan_strings+0xc0/0xe80 [ 26.292812] kunit_try_run_case+0x1a5/0x480 [ 26.293221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.293475] kthread+0x337/0x6f0 [ 26.293644] ret_from_fork+0x116/0x1d0 [ 26.294263] ret_from_fork_asm+0x1a/0x30 [ 26.294449] [ 26.294539] Freed by task 308: [ 26.295248] kasan_save_stack+0x45/0x70 [ 26.295564] kasan_save_track+0x18/0x40 [ 26.295715] kasan_save_free_info+0x3f/0x60 [ 26.296122] __kasan_slab_free+0x56/0x70 [ 26.296304] kfree+0x222/0x3f0 [ 26.296629] kasan_strings+0x2aa/0xe80 [ 26.296845] kunit_try_run_case+0x1a5/0x480 [ 26.297258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.297605] kthread+0x337/0x6f0 [ 26.297761] ret_from_fork+0x116/0x1d0 [ 26.298167] ret_from_fork_asm+0x1a/0x30 [ 26.298523] [ 26.298621] The buggy address belongs to the object at ffff888103eba080 [ 26.298621] which belongs to the cache kmalloc-32 of size 32 [ 26.299457] The buggy address is located 16 bytes inside of [ 26.299457] freed 32-byte region [ffff888103eba080, ffff888103eba0a0) [ 26.300133] [ 26.300229] The buggy address belongs to the physical page: [ 26.300440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eba [ 26.300831] flags: 0x200000000000000(node=0|zone=2) [ 26.301702] page_type: f5(slab) [ 26.301927] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 26.302405] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 26.302741] page dumped because: kasan: bad access detected [ 26.303392] [ 26.303482] Memory state around the buggy address: [ 26.303820] ffff888103eb9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.304131] ffff888103eba000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 26.304473] >ffff888103eba080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 26.305286] ^ [ 26.305452] ffff888103eba100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 26.305948] ffff888103eba180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 26.306413] ==================================================================