Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 24.689640] ================================================================== [ 24.698738] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.705505] Read of size 16 at addr ffff000801716f40 by task kunit_try_catch/217 [ 24.712884] [ 24.714369] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 24.714424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.714440] Hardware name: WinLink E850-96 board (DT) [ 24.714462] Call trace: [ 24.714476] show_stack+0x20/0x38 (C) [ 24.714510] dump_stack_lvl+0x8c/0xd0 [ 24.714546] print_report+0x118/0x608 [ 24.714577] kasan_report+0xdc/0x128 [ 24.714606] __asan_report_load16_noabort+0x20/0x30 [ 24.714642] kmalloc_uaf_16+0x3bc/0x438 [ 24.714672] kunit_try_run_case+0x170/0x3f0 [ 24.714707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.714744] kthread+0x328/0x630 [ 24.714779] ret_from_fork+0x10/0x20 [ 24.714813] [ 24.776944] Allocated by task 217: [ 24.780333] kasan_save_stack+0x3c/0x68 [ 24.784148] kasan_save_track+0x20/0x40 [ 24.787968] kasan_save_alloc_info+0x40/0x58 [ 24.792221] __kasan_kmalloc+0xd4/0xd8 [ 24.795955] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.800468] kmalloc_uaf_16+0x140/0x438 [ 24.804287] kunit_try_run_case+0x170/0x3f0 [ 24.808454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.813923] kthread+0x328/0x630 [ 24.817135] ret_from_fork+0x10/0x20 [ 24.820693] [ 24.822170] Freed by task 217: [ 24.825208] kasan_save_stack+0x3c/0x68 [ 24.829026] kasan_save_track+0x20/0x40 [ 24.832846] kasan_save_free_info+0x4c/0x78 [ 24.837012] __kasan_slab_free+0x6c/0x98 [ 24.840918] kfree+0x214/0x3c8 [ 24.843957] kmalloc_uaf_16+0x190/0x438 [ 24.847778] kunit_try_run_case+0x170/0x3f0 [ 24.851942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.857411] kthread+0x328/0x630 [ 24.860623] ret_from_fork+0x10/0x20 [ 24.864182] [ 24.865660] The buggy address belongs to the object at ffff000801716f40 [ 24.865660] which belongs to the cache kmalloc-16 of size 16 [ 24.877988] The buggy address is located 0 bytes inside of [ 24.877988] freed 16-byte region [ffff000801716f40, ffff000801716f50) [ 24.889963] [ 24.891441] The buggy address belongs to the physical page: [ 24.896999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881716 [ 24.904983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.911492] page_type: f5(slab) [ 24.914630] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 24.922348] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.930068] page dumped because: kasan: bad access detected [ 24.935622] [ 24.937097] Memory state around the buggy address: [ 24.941881] ffff000801716e00: 00 02 fc fc 00 06 fc fc 00 06 fc fc 00 04 fc fc [ 24.949080] ffff000801716e80: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 24.956287] >ffff000801716f00: 00 04 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 24.963486] ^ [ 24.968785] ffff000801716f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.975991] ffff000801717000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.983192] ==================================================================
[ 15.563785] ================================================================== [ 15.563846] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 15.563901] Read of size 16 at addr fff00000c62712e0 by task kunit_try_catch/173 [ 15.564043] [ 15.564080] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.564159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.564185] Hardware name: linux,dummy-virt (DT) [ 15.564215] Call trace: [ 15.564236] show_stack+0x20/0x38 (C) [ 15.564285] dump_stack_lvl+0x8c/0xd0 [ 15.564373] print_report+0x118/0x608 [ 15.564425] kasan_report+0xdc/0x128 [ 15.564470] __asan_report_load16_noabort+0x20/0x30 [ 15.564524] kmalloc_uaf_16+0x3bc/0x438 [ 15.564593] kunit_try_run_case+0x170/0x3f0 [ 15.564667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.564722] kthread+0x328/0x630 [ 15.564769] ret_from_fork+0x10/0x20 [ 15.564816] [ 15.564834] Allocated by task 173: [ 15.564888] kasan_save_stack+0x3c/0x68 [ 15.564927] kasan_save_track+0x20/0x40 [ 15.564962] kasan_save_alloc_info+0x40/0x58 [ 15.564999] __kasan_kmalloc+0xd4/0xd8 [ 15.565032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.565069] kmalloc_uaf_16+0x140/0x438 [ 15.565106] kunit_try_run_case+0x170/0x3f0 [ 15.565143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.565186] kthread+0x328/0x630 [ 15.565650] ret_from_fork+0x10/0x20 [ 15.565694] [ 15.565714] Freed by task 173: [ 15.565740] kasan_save_stack+0x3c/0x68 [ 15.565777] kasan_save_track+0x20/0x40 [ 15.565812] kasan_save_free_info+0x4c/0x78 [ 15.566301] __kasan_slab_free+0x6c/0x98 [ 15.566381] kfree+0x214/0x3c8 [ 15.566551] kmalloc_uaf_16+0x190/0x438 [ 15.566746] kunit_try_run_case+0x170/0x3f0 [ 15.566862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.566987] kthread+0x328/0x630 [ 15.567121] ret_from_fork+0x10/0x20 [ 15.567270] [ 15.567309] The buggy address belongs to the object at fff00000c62712e0 [ 15.567309] which belongs to the cache kmalloc-16 of size 16 [ 15.567625] The buggy address is located 0 bytes inside of [ 15.567625] freed 16-byte region [fff00000c62712e0, fff00000c62712f0) [ 15.567763] [ 15.567791] The buggy address belongs to the physical page: [ 15.567886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106271 [ 15.567987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.568219] page_type: f5(slab) [ 15.568354] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 15.568430] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.568472] page dumped because: kasan: bad access detected [ 15.568502] [ 15.568520] Memory state around the buggy address: [ 15.568550] fff00000c6271180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.568591] fff00000c6271200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 15.568649] >fff00000c6271280: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 15.568686] ^ [ 15.569091] fff00000c6271300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569204] fff00000c6271380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.569240] ==================================================================
[ 14.258644] ================================================================== [ 14.259209] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 14.259910] Read of size 16 at addr ffff888102317920 by task kunit_try_catch/189 [ 14.261373] [ 14.261632] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 14.261734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.261762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.261806] Call Trace: [ 14.261858] <TASK> [ 14.261894] dump_stack_lvl+0x73/0xb0 [ 14.261959] print_report+0xd1/0x650 [ 14.262005] ? __virt_addr_valid+0x1db/0x2d0 [ 14.262053] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.262105] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.262130] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.262153] kasan_report+0x141/0x180 [ 14.262177] ? kmalloc_uaf_16+0x47b/0x4c0 [ 14.262209] __asan_report_load16_noabort+0x18/0x20 [ 14.262275] kmalloc_uaf_16+0x47b/0x4c0 [ 14.262314] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 14.262366] ? __schedule+0x10cc/0x2b60 [ 14.262394] ? __pfx_read_tsc+0x10/0x10 [ 14.262417] ? ktime_get_ts64+0x86/0x230 [ 14.262444] kunit_try_run_case+0x1a5/0x480 [ 14.262471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.262493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.262518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.262542] ? __kthread_parkme+0x82/0x180 [ 14.262565] ? preempt_count_sub+0x50/0x80 [ 14.262592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.262615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.262639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.262662] kthread+0x337/0x6f0 [ 14.262680] ? trace_preempt_on+0x20/0xc0 [ 14.262704] ? __pfx_kthread+0x10/0x10 [ 14.262724] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.262746] ? calculate_sigpending+0x7b/0xa0 [ 14.262769] ? __pfx_kthread+0x10/0x10 [ 14.262789] ret_from_fork+0x41/0x80 [ 14.262810] ? __pfx_kthread+0x10/0x10 [ 14.262829] ret_from_fork_asm+0x1a/0x30 [ 14.262861] </TASK> [ 14.262874] [ 14.275945] Allocated by task 189: [ 14.276649] kasan_save_stack+0x45/0x70 [ 14.277028] kasan_save_track+0x18/0x40 [ 14.277904] kasan_save_alloc_info+0x3b/0x50 [ 14.278424] __kasan_kmalloc+0xb7/0xc0 [ 14.278889] __kmalloc_cache_noprof+0x189/0x420 [ 14.279427] kmalloc_uaf_16+0x15b/0x4c0 [ 14.279738] kunit_try_run_case+0x1a5/0x480 [ 14.280614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.281064] kthread+0x337/0x6f0 [ 14.281643] ret_from_fork+0x41/0x80 [ 14.281886] ret_from_fork_asm+0x1a/0x30 [ 14.282073] [ 14.282259] Freed by task 189: [ 14.282852] kasan_save_stack+0x45/0x70 [ 14.283138] kasan_save_track+0x18/0x40 [ 14.283287] kasan_save_free_info+0x3f/0x60 [ 14.283448] __kasan_slab_free+0x56/0x70 [ 14.283771] kfree+0x222/0x3f0 [ 14.284058] kmalloc_uaf_16+0x1d6/0x4c0 [ 14.284888] kunit_try_run_case+0x1a5/0x480 [ 14.285420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.286039] kthread+0x337/0x6f0 [ 14.286582] ret_from_fork+0x41/0x80 [ 14.286794] ret_from_fork_asm+0x1a/0x30 [ 14.287019] [ 14.287139] The buggy address belongs to the object at ffff888102317920 [ 14.287139] which belongs to the cache kmalloc-16 of size 16 [ 14.287724] The buggy address is located 0 bytes inside of [ 14.287724] freed 16-byte region [ffff888102317920, ffff888102317930) [ 14.288274] [ 14.289601] The buggy address belongs to the physical page: [ 14.289857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102317 [ 14.290491] flags: 0x200000000000000(node=0|zone=2) [ 14.290754] page_type: f5(slab) [ 14.291076] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.291558] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.291985] page dumped because: kasan: bad access detected [ 14.292282] [ 14.293147] Memory state around the buggy address: [ 14.294016] ffff888102317800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.294794] ffff888102317880: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.295480] >ffff888102317900: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 14.295838] ^ [ 14.296071] ffff888102317980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.296525] ffff888102317a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.297011] ==================================================================
[ 28.522203] ================================================================== [ 28.533024] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 28.539820] Read of size 16 at addr ffff888104962a20 by task kunit_try_catch/211 [ 28.547218] [ 28.548721] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 28.548729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.548731] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.548735] Call Trace: [ 28.548736] <TASK> [ 28.548738] dump_stack_lvl+0x73/0xb0 [ 28.548742] print_report+0xd1/0x650 [ 28.548746] ? __virt_addr_valid+0x1db/0x2d0 [ 28.548750] ? kmalloc_uaf_16+0x47b/0x4c0 [ 28.548754] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.548758] ? kmalloc_uaf_16+0x47b/0x4c0 [ 28.548762] kasan_report+0x141/0x180 [ 28.548767] ? kmalloc_uaf_16+0x47b/0x4c0 [ 28.548772] __asan_report_load16_noabort+0x18/0x20 [ 28.548776] kmalloc_uaf_16+0x47b/0x4c0 [ 28.548780] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 28.548784] ? __schedule+0x10cc/0x2b60 [ 28.548789] ? ktime_get_ts64+0x83/0x230 [ 28.548793] kunit_try_run_case+0x1a2/0x480 [ 28.548798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.548802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.548807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.548812] ? __kthread_parkme+0x82/0x180 [ 28.548816] ? preempt_count_sub+0x50/0x80 [ 28.548820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.548825] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.548829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.548834] kthread+0x334/0x6f0 [ 28.548837] ? trace_preempt_on+0x20/0xc0 [ 28.548841] ? __pfx_kthread+0x10/0x10 [ 28.548844] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.548848] ? calculate_sigpending+0x7b/0xa0 [ 28.548852] ? __pfx_kthread+0x10/0x10 [ 28.548855] ret_from_fork+0x3e/0x80 [ 28.548859] ? __pfx_kthread+0x10/0x10 [ 28.548862] ret_from_fork_asm+0x1a/0x30 [ 28.548868] </TASK> [ 28.548869] [ 28.710482] Allocated by task 211: [ 28.713902] kasan_save_stack+0x45/0x70 [ 28.717753] kasan_save_track+0x18/0x40 [ 28.721591] kasan_save_alloc_info+0x3b/0x50 [ 28.725864] __kasan_kmalloc+0xb7/0xc0 [ 28.729616] __kmalloc_cache_noprof+0x189/0x420 [ 28.734151] kmalloc_uaf_16+0x15b/0x4c0 [ 28.737998] kunit_try_run_case+0x1a2/0x480 [ 28.742184] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.747583] kthread+0x334/0x6f0 [ 28.750816] ret_from_fork+0x3e/0x80 [ 28.754394] ret_from_fork_asm+0x1a/0x30 [ 28.758320] [ 28.759820] Freed by task 211: [ 28.762881] kasan_save_stack+0x45/0x70 [ 28.766747] kasan_save_track+0x18/0x40 [ 28.770585] kasan_save_free_info+0x3f/0x60 [ 28.774771] __kasan_slab_free+0x56/0x70 [ 28.778698] kfree+0x222/0x3f0 [ 28.781756] kmalloc_uaf_16+0x1d6/0x4c0 [ 28.785594] kunit_try_run_case+0x1a2/0x480 [ 28.789782] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.795182] kthread+0x334/0x6f0 [ 28.798412] ret_from_fork+0x3e/0x80 [ 28.801991] ret_from_fork_asm+0x1a/0x30 [ 28.805917] [ 28.807435] The buggy address belongs to the object at ffff888104962a20 [ 28.807435] which belongs to the cache kmalloc-16 of size 16 [ 28.819776] The buggy address is located 0 bytes inside of [ 28.819776] freed 16-byte region [ffff888104962a20, ffff888104962a30) [ 28.831771] [ 28.833270] The buggy address belongs to the physical page: [ 28.838845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962 [ 28.846850] flags: 0x200000000000000(node=0|zone=2) [ 28.851731] page_type: f5(slab) [ 28.854876] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 28.862641] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.870381] page dumped because: kasan: bad access detected [ 28.875953] [ 28.877452] Memory state around the buggy address: [ 28.882245] ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.889466] ffff888104962980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.896685] >ffff888104962a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 28.903918] ^ [ 28.908209] ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.915430] ffff888104962b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.922650] ==================================================================