Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   21.438786] ==================================================================
[   21.448619] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   21.455212] Read of size 1 at addr ffff000803150000 by task kunit_try_catch/197
[   21.462505] 
[   21.463991] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.464046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.464062] Hardware name: WinLink E850-96 board (DT)
[   21.464083] Call trace:
[   21.464097]  show_stack+0x20/0x38 (C)
[   21.464135]  dump_stack_lvl+0x8c/0xd0
[   21.464173]  print_report+0x118/0x608
[   21.464204]  kasan_report+0xdc/0x128
[   21.464232]  __asan_report_load1_noabort+0x20/0x30
[   21.464270]  kmalloc_large_uaf+0x2cc/0x2f8
[   21.464302]  kunit_try_run_case+0x170/0x3f0
[   21.464339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.464376]  kthread+0x328/0x630
[   21.464411]  ret_from_fork+0x10/0x20
[   21.464445] 
[   21.526741] The buggy address belongs to the physical page:
[   21.532299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150
[   21.540282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.546806] raw: 0bfffe0000000000 fffffdffe00c5508 ffff00085af4d0c0 0000000000000000
[   21.554522] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.562241] page dumped because: kasan: bad access detected
[   21.567797] 
[   21.569274] Memory state around the buggy address:
[   21.574055]  ffff00080314ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.581255]  ffff00080314ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.588461] >ffff000803150000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.595661]                    ^
[   21.598877]  ffff000803150080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.606081]  ffff000803150100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.613282] ==================================================================

[   17.699518] ==================================================================
[   17.699647] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   17.699724] Read of size 1 at addr fff00000c790c000 by task kunit_try_catch/150
[   17.699848] 
[   17.700000] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.700210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.700243] Hardware name: linux,dummy-virt (DT)
[   17.700275] Call trace:
[   17.700297]  show_stack+0x20/0x38 (C)
[   17.700499]  dump_stack_lvl+0x8c/0xd0
[   17.700633]  print_report+0x118/0x608
[   17.700680]  kasan_report+0xdc/0x128
[   17.700940]  __asan_report_load1_noabort+0x20/0x30
[   17.701097]  kmalloc_large_uaf+0x2cc/0x2f8
[   17.701198]  kunit_try_run_case+0x170/0x3f0
[   17.701297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.701460]  kthread+0x328/0x630
[   17.701568]  ret_from_fork+0x10/0x20
[   17.701669] 
[   17.701784] The buggy address belongs to the physical page:
[   17.701872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790c
[   17.702001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.702401] raw: 0bfffe0000000000 ffffc1ffc31e4408 fff00000da47ee00 0000000000000000
[   17.702586] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   17.702655] page dumped because: kasan: bad access detected
[   17.702687] 
[   17.703040] Memory state around the buggy address:
[   17.703317]  fff00000c790bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.703405]  fff00000c790bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.703769] >fff00000c790c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.703969]                    ^
[   17.704163]  fff00000c790c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.704275]  fff00000c790c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.704318] ==================================================================

[   10.412172] ==================================================================
[   10.412643] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   10.413245] Read of size 1 at addr ffff888102890000 by task kunit_try_catch/167
[   10.413833] 
[   10.414020] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.414072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.414084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.414107] Call Trace:
[   10.414119]  <TASK>
[   10.414139]  dump_stack_lvl+0x73/0xb0
[   10.414168]  print_report+0xd1/0x650
[   10.414193]  ? __virt_addr_valid+0x1db/0x2d0
[   10.414216]  ? kmalloc_large_uaf+0x2f1/0x340
[   10.414237]  ? kasan_addr_to_slab+0x11/0xa0
[   10.414257]  ? kmalloc_large_uaf+0x2f1/0x340
[   10.414278]  kasan_report+0x141/0x180
[   10.414300]  ? kmalloc_large_uaf+0x2f1/0x340
[   10.414326]  __asan_report_load1_noabort+0x18/0x20
[   10.414346]  kmalloc_large_uaf+0x2f1/0x340
[   10.414367]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   10.414388]  ? __schedule+0x10cc/0x2b60
[   10.414411]  ? __pfx_read_tsc+0x10/0x10
[   10.414431]  ? ktime_get_ts64+0x86/0x230
[   10.414456]  kunit_try_run_case+0x1a5/0x480
[   10.414483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.414504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.414528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.414550]  ? __kthread_parkme+0x82/0x180
[   10.414572]  ? preempt_count_sub+0x50/0x80
[   10.414596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.414619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.414641]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.414664]  kthread+0x337/0x6f0
[   10.414680]  ? trace_preempt_on+0x20/0xc0
[   10.414703]  ? __pfx_kthread+0x10/0x10
[   10.414721]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.414741]  ? calculate_sigpending+0x7b/0xa0
[   10.414762]  ? __pfx_kthread+0x10/0x10
[   10.414780]  ret_from_fork+0x41/0x80
[   10.414799]  ? __pfx_kthread+0x10/0x10
[   10.414817]  ret_from_fork_asm+0x1a/0x30
[   10.414847]  </TASK>
[   10.414858] 
[   10.425297] The buggy address belongs to the physical page:
[   10.426058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102890
[   10.426400] flags: 0x200000000000000(node=0|zone=2)
[   10.426880] raw: 0200000000000000 ffffea00040a2508 ffff88815b139a80 0000000000000000
[   10.427382] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   10.428133] page dumped because: kasan: bad access detected
[   10.428492] 
[   10.428703] Memory state around the buggy address:
[   10.428889]  ffff88810288ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.429215]  ffff88810288ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.429519] >ffff888102890000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.430179]                    ^
[   10.430323]  ffff888102890080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.430957]  ffff888102890100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.431394] ==================================================================