Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x86

[   19.361157] ==================================================================
[   19.370954] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   19.377550] Read of size 1 at addr ffff000805d54000 by task kunit_try_catch/197
[   19.384840] 
[   19.386325] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   19.386382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.386399] Hardware name: WinLink E850-96 board (DT)
[   19.386420] Call trace:
[   19.386433]  show_stack+0x20/0x38 (C)
[   19.386469]  dump_stack_lvl+0x8c/0xd0
[   19.386506]  print_report+0x118/0x608
[   19.386535]  kasan_report+0xdc/0x128
[   19.386569]  __asan_report_load1_noabort+0x20/0x30
[   19.386605]  kmalloc_large_uaf+0x2cc/0x2f8
[   19.386637]  kunit_try_run_case+0x170/0x3f0
[   19.386672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.386710]  kthread+0x328/0x630
[   19.386744]  ret_from_fork+0x10/0x20
[   19.386777] 
[   19.449076] The buggy address belongs to the physical page:
[   19.454632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   19.462616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.469140] raw: 0bfffe0000000000 fffffdffe0175608 ffff00085af6f0c0 0000000000000000
[   19.476860] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.484577] page dumped because: kasan: bad access detected
[   19.490131] 
[   19.491606] Memory state around the buggy address:
[   19.496389]  ffff000805d53f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.503589]  ffff000805d53f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510797] >ffff000805d54000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.517995]                    ^
[   19.521211]  ffff000805d54080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.528415]  ffff000805d54100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.535618] ==================================================================

[   15.350586] ==================================================================
[   15.350661] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   15.350712] Read of size 1 at addr fff00000c6560000 by task kunit_try_catch/153
[   15.350769] 
[   15.350801] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.350878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.350902] Hardware name: linux,dummy-virt (DT)
[   15.350931] Call trace:
[   15.350969]  show_stack+0x20/0x38 (C)
[   15.351016]  dump_stack_lvl+0x8c/0xd0
[   15.351061]  print_report+0x118/0x608
[   15.351137]  kasan_report+0xdc/0x128
[   15.351179]  __asan_report_load1_noabort+0x20/0x30
[   15.351225]  kmalloc_large_uaf+0x2cc/0x2f8
[   15.351269]  kunit_try_run_case+0x170/0x3f0
[   15.351315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.351365]  kthread+0x328/0x630
[   15.351778]  ret_from_fork+0x10/0x20
[   15.351845] 
[   15.351865] The buggy address belongs to the physical page:
[   15.352248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   15.352365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.352430] raw: 0bfffe0000000000 ffffc1ffc3195908 fff00000da47de00 0000000000000000
[   15.352478] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   15.352641] page dumped because: kasan: bad access detected
[   15.352671] 
[   15.352689] Memory state around the buggy address:
[   15.352742]  fff00000c655ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.352784]  fff00000c655ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.352824] >fff00000c6560000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.352913]                    ^
[   15.352941]  fff00000c6560080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.353116]  fff00000c6560100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.353183] ==================================================================

[   13.489769] ==================================================================
[   13.490731] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   13.491079] Read of size 1 at addr ffff8881022a4000 by task kunit_try_catch/169
[   13.492431] 
[   13.492602] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   13.492698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.492721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.492760] Call Trace:
[   13.492785]  <TASK>
[   13.492819]  dump_stack_lvl+0x73/0xb0
[   13.492874]  print_report+0xd1/0x650
[   13.492914]  ? __virt_addr_valid+0x1db/0x2d0
[   13.492951]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.493329]  ? kasan_addr_to_slab+0x11/0xa0
[   13.493400]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.493440]  kasan_report+0x141/0x180
[   13.493478]  ? kmalloc_large_uaf+0x2f1/0x340
[   13.493508]  __asan_report_load1_noabort+0x18/0x20
[   13.493532]  kmalloc_large_uaf+0x2f1/0x340
[   13.493555]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   13.493580]  ? __schedule+0x10cc/0x2b60
[   13.493607]  ? __pfx_read_tsc+0x10/0x10
[   13.493629]  ? ktime_get_ts64+0x86/0x230
[   13.493658]  kunit_try_run_case+0x1a5/0x480
[   13.493686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.493710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.493737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.493763]  ? __kthread_parkme+0x82/0x180
[   13.493787]  ? preempt_count_sub+0x50/0x80
[   13.493815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.493841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.493866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.493892]  kthread+0x337/0x6f0
[   13.493910]  ? trace_preempt_on+0x20/0xc0
[   13.493937]  ? __pfx_kthread+0x10/0x10
[   13.493956]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.493980]  ? calculate_sigpending+0x7b/0xa0
[   13.494004]  ? __pfx_kthread+0x10/0x10
[   13.494024]  ret_from_fork+0x41/0x80
[   13.494046]  ? __pfx_kthread+0x10/0x10
[   13.494068]  ret_from_fork_asm+0x1a/0x30
[   13.494121]  </TASK>
[   13.494142] 
[   13.508792] The buggy address belongs to the physical page:
[   13.509037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a4
[   13.510278] flags: 0x200000000000000(node=0|zone=2)
[   13.510744] raw: 0200000000000000 ffffea000408aa08 ffff88815b039a80 0000000000000000
[   13.511553] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.511914] page dumped because: kasan: bad access detected
[   13.512305] 
[   13.512872] Memory state around the buggy address:
[   13.513094]  ffff8881022a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.514069]  ffff8881022a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.514823] >ffff8881022a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.515491]                    ^
[   13.516090]  ffff8881022a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.516551]  ffff8881022a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   13.516905] ==================================================================

[   20.961202] ==================================================================
[   20.972715] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   20.979328] Read of size 1 at addr ffff888102a30000 by task kunit_try_catch/191
[   20.986634] 
[   20.988136] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   20.988144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.988146] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.988149] Call Trace:
[   20.988150]  <TASK>
[   20.988152]  dump_stack_lvl+0x73/0xb0
[   20.988156]  print_report+0xd1/0x650
[   20.988160]  ? __virt_addr_valid+0x1db/0x2d0
[   20.988164]  ? kmalloc_large_uaf+0x2f1/0x340
[   20.988168]  ? kasan_addr_to_slab+0x11/0xa0
[   20.988172]  ? kmalloc_large_uaf+0x2f1/0x340
[   20.988176]  kasan_report+0x141/0x180
[   20.988180]  ? kmalloc_large_uaf+0x2f1/0x340
[   20.988185]  __asan_report_load1_noabort+0x18/0x20
[   20.988189]  kmalloc_large_uaf+0x2f1/0x340
[   20.988193]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   20.988197]  ? __schedule+0x10cc/0x2b60
[   20.988202]  ? ktime_get_ts64+0x83/0x230
[   20.988206]  kunit_try_run_case+0x1a2/0x480
[   20.988211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.988216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.988220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.988225]  ? __kthread_parkme+0x82/0x180
[   20.988229]  ? preempt_count_sub+0x50/0x80
[   20.988233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.988238]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.988242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.988247]  kthread+0x334/0x6f0
[   20.988249]  ? trace_preempt_on+0x20/0xc0
[   20.988254]  ? __pfx_kthread+0x10/0x10
[   20.988257]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.988261]  ? calculate_sigpending+0x7b/0xa0
[   20.988265]  ? __pfx_kthread+0x10/0x10
[   20.988268]  ret_from_fork+0x3e/0x80
[   20.988272]  ? __pfx_kthread+0x10/0x10
[   20.988275]  ret_from_fork_asm+0x1a/0x30
[   20.988281]  </TASK>
[   20.988282] 
[   21.149913] The buggy address belongs to the physical page:
[   21.155487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   21.163486] flags: 0x200000000000000(node=0|zone=2)
[   21.168367] raw: 0200000000000000 ffffea0004168608 ffff8882304b9a80 0000000000000000
[   21.176113] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.183853] page dumped because: kasan: bad access detected
[   21.189426] 
[   21.190924] Memory state around the buggy address:
[   21.195735]  ffff888102a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.202953]  ffff888102a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.210173] >ffff888102a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.217393]                    ^
[   21.220624]  ffff888102a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.227844]  ffff888102a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.235065] ==================================================================