Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 27.051706] ================================================================== [ 27.061901] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 27.068406] Read of size 1 at addr ffff000804354aa8 by task kunit_try_catch/233 [ 27.075694] [ 27.077182] CPU: 3 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 27.077237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.077253] Hardware name: WinLink E850-96 board (DT) [ 27.077275] Call trace: [ 27.077289] show_stack+0x20/0x38 (C) [ 27.077326] dump_stack_lvl+0x8c/0xd0 [ 27.077366] print_report+0x118/0x608 [ 27.077398] kasan_report+0xdc/0x128 [ 27.077429] __asan_report_load1_noabort+0x20/0x30 [ 27.077465] kmalloc_uaf+0x300/0x338 [ 27.077498] kunit_try_run_case+0x170/0x3f0 [ 27.077534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.077573] kthread+0x328/0x630 [ 27.077607] ret_from_fork+0x10/0x20 [ 27.077643] [ 27.139411] Allocated by task 233: [ 27.142796] kasan_save_stack+0x3c/0x68 [ 27.146613] kasan_save_track+0x20/0x40 [ 27.150433] kasan_save_alloc_info+0x40/0x58 [ 27.154686] __kasan_kmalloc+0xd4/0xd8 [ 27.158418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.162932] kmalloc_uaf+0xb8/0x338 [ 27.166404] kunit_try_run_case+0x170/0x3f0 [ 27.170571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.176040] kthread+0x328/0x630 [ 27.179252] ret_from_fork+0x10/0x20 [ 27.182810] [ 27.184288] Freed by task 233: [ 27.187326] kasan_save_stack+0x3c/0x68 [ 27.191144] kasan_save_track+0x20/0x40 [ 27.194963] kasan_save_free_info+0x4c/0x78 [ 27.199130] __kasan_slab_free+0x6c/0x98 [ 27.203036] kfree+0x214/0x3c8 [ 27.206074] kmalloc_uaf+0x11c/0x338 [ 27.209633] kunit_try_run_case+0x170/0x3f0 [ 27.213799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.219270] kthread+0x328/0x630 [ 27.222480] ret_from_fork+0x10/0x20 [ 27.226039] [ 27.227517] The buggy address belongs to the object at ffff000804354aa0 [ 27.227517] which belongs to the cache kmalloc-16 of size 16 [ 27.239845] The buggy address is located 8 bytes inside of [ 27.239845] freed 16-byte region [ffff000804354aa0, ffff000804354ab0) [ 27.251820] [ 27.253299] The buggy address belongs to the physical page: [ 27.258857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884354 [ 27.266839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.273349] page_type: f5(slab) [ 27.276487] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 27.284205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.291926] page dumped because: kasan: bad access detected [ 27.297479] [ 27.298954] Memory state around the buggy address: [ 27.303736] ffff000804354980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.310939] ffff000804354a00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.318145] >ffff000804354a80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 27.325343] ^ [ 27.329861] ffff000804354b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.337066] ffff000804354b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.344268] ==================================================================
[ 15.660765] ================================================================== [ 15.660826] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 15.661063] Read of size 1 at addr fff00000c6271308 by task kunit_try_catch/189 [ 15.661215] [ 15.661259] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.661347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.661373] Hardware name: linux,dummy-virt (DT) [ 15.661403] Call trace: [ 15.661426] show_stack+0x20/0x38 (C) [ 15.661506] dump_stack_lvl+0x8c/0xd0 [ 15.661555] print_report+0x118/0x608 [ 15.661599] kasan_report+0xdc/0x128 [ 15.661653] __asan_report_load1_noabort+0x20/0x30 [ 15.661702] kmalloc_uaf+0x300/0x338 [ 15.661758] kunit_try_run_case+0x170/0x3f0 [ 15.661804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.661856] kthread+0x328/0x630 [ 15.661900] ret_from_fork+0x10/0x20 [ 15.661950] [ 15.661984] Allocated by task 189: [ 15.662012] kasan_save_stack+0x3c/0x68 [ 15.662051] kasan_save_track+0x20/0x40 [ 15.662086] kasan_save_alloc_info+0x40/0x58 [ 15.662125] __kasan_kmalloc+0xd4/0xd8 [ 15.662158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.662193] kmalloc_uaf+0xb8/0x338 [ 15.662229] kunit_try_run_case+0x170/0x3f0 [ 15.662268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.662310] kthread+0x328/0x630 [ 15.662343] ret_from_fork+0x10/0x20 [ 15.662378] [ 15.662398] Freed by task 189: [ 15.662432] kasan_save_stack+0x3c/0x68 [ 15.662468] kasan_save_track+0x20/0x40 [ 15.662501] kasan_save_free_info+0x4c/0x78 [ 15.662539] __kasan_slab_free+0x6c/0x98 [ 15.662582] kfree+0x214/0x3c8 [ 15.662614] kmalloc_uaf+0x11c/0x338 [ 15.662932] kunit_try_run_case+0x170/0x3f0 [ 15.662977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.663021] kthread+0x328/0x630 [ 15.663087] ret_from_fork+0x10/0x20 [ 15.663124] [ 15.663171] The buggy address belongs to the object at fff00000c6271300 [ 15.663171] which belongs to the cache kmalloc-16 of size 16 [ 15.663231] The buggy address is located 8 bytes inside of [ 15.663231] freed 16-byte region [fff00000c6271300, fff00000c6271310) [ 15.663430] [ 15.663479] The buggy address belongs to the physical page: [ 15.663722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106271 [ 15.663805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.663912] page_type: f5(slab) [ 15.664062] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.664155] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.664195] page dumped because: kasan: bad access detected [ 15.664232] [ 15.664494] Memory state around the buggy address: [ 15.664618] fff00000c6271200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 15.664701] fff00000c6271280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.664806] >fff00000c6271300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.664892] ^ [ 15.664939] fff00000c6271380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.665179] fff00000c6271400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.665312] ==================================================================
[ 14.564951] ================================================================== [ 14.566127] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 14.566578] Read of size 1 at addr ffff8881024d25c8 by task kunit_try_catch/205 [ 14.566909] [ 14.567061] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 14.567158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.567387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.567508] Call Trace: [ 14.567544] <TASK> [ 14.567584] dump_stack_lvl+0x73/0xb0 [ 14.567654] print_report+0xd1/0x650 [ 14.567706] ? __virt_addr_valid+0x1db/0x2d0 [ 14.567758] ? kmalloc_uaf+0x320/0x380 [ 14.567802] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.567847] ? kmalloc_uaf+0x320/0x380 [ 14.567892] kasan_report+0x141/0x180 [ 14.567941] ? kmalloc_uaf+0x320/0x380 [ 14.567996] __asan_report_load1_noabort+0x18/0x20 [ 14.568043] kmalloc_uaf+0x320/0x380 [ 14.568114] ? __pfx_kmalloc_uaf+0x10/0x10 [ 14.568143] ? __schedule+0x10cc/0x2b60 [ 14.568171] ? __pfx_read_tsc+0x10/0x10 [ 14.568195] ? ktime_get_ts64+0x86/0x230 [ 14.568332] kunit_try_run_case+0x1a5/0x480 [ 14.568386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.568411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.568440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.568466] ? __kthread_parkme+0x82/0x180 [ 14.568492] ? preempt_count_sub+0x50/0x80 [ 14.568521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.568546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.568572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.568599] kthread+0x337/0x6f0 [ 14.568618] ? trace_preempt_on+0x20/0xc0 [ 14.568645] ? __pfx_kthread+0x10/0x10 [ 14.568665] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.568689] ? calculate_sigpending+0x7b/0xa0 [ 14.568714] ? __pfx_kthread+0x10/0x10 [ 14.568734] ret_from_fork+0x41/0x80 [ 14.568756] ? __pfx_kthread+0x10/0x10 [ 14.568776] ret_from_fork_asm+0x1a/0x30 [ 14.568811] </TASK> [ 14.568823] [ 14.580758] Allocated by task 205: [ 14.580982] kasan_save_stack+0x45/0x70 [ 14.581244] kasan_save_track+0x18/0x40 [ 14.581450] kasan_save_alloc_info+0x3b/0x50 [ 14.582230] __kasan_kmalloc+0xb7/0xc0 [ 14.582713] __kmalloc_cache_noprof+0x189/0x420 [ 14.583397] kmalloc_uaf+0xaa/0x380 [ 14.583730] kunit_try_run_case+0x1a5/0x480 [ 14.584185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.584772] kthread+0x337/0x6f0 [ 14.585432] ret_from_fork+0x41/0x80 [ 14.585802] ret_from_fork_asm+0x1a/0x30 [ 14.586333] [ 14.586465] Freed by task 205: [ 14.586744] kasan_save_stack+0x45/0x70 [ 14.586996] kasan_save_track+0x18/0x40 [ 14.587226] kasan_save_free_info+0x3f/0x60 [ 14.587479] __kasan_slab_free+0x56/0x70 [ 14.587795] kfree+0x222/0x3f0 [ 14.588028] kmalloc_uaf+0x12c/0x380 [ 14.588242] kunit_try_run_case+0x1a5/0x480 [ 14.588664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.589110] kthread+0x337/0x6f0 [ 14.589520] ret_from_fork+0x41/0x80 [ 14.589725] ret_from_fork_asm+0x1a/0x30 [ 14.589924] [ 14.590128] The buggy address belongs to the object at ffff8881024d25c0 [ 14.590128] which belongs to the cache kmalloc-16 of size 16 [ 14.591456] The buggy address is located 8 bytes inside of [ 14.591456] freed 16-byte region [ffff8881024d25c0, ffff8881024d25d0) [ 14.592618] [ 14.592864] The buggy address belongs to the physical page: [ 14.593576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 14.593949] flags: 0x200000000000000(node=0|zone=2) [ 14.594642] page_type: f5(slab) [ 14.594998] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.595561] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.596418] page dumped because: kasan: bad access detected [ 14.596615] [ 14.596756] Memory state around the buggy address: [ 14.597522] ffff8881024d2480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.598187] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.598700] >ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fc fc fc fc [ 14.599330] ^ [ 14.599714] ffff8881024d2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600027] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600787] ==================================================================