Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 181.716233] ================================================================== [ 181.718005] BUG: KASAN: slab-use-after-free in ksize_uaf+0xe8/0x2f0 [ 181.719526] Read of size 1 at addr ffff0000c170c100 by task kunit_try_catch/192 [ 181.721995] [ 181.722383] CPU: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 181.724585] Hardware name: linux,dummy-virt (DT) [ 181.726493] Call trace: [ 181.727188] dump_backtrace+0x9c/0x128 [ 181.728318] show_stack+0x20/0x38 [ 181.730011] dump_stack_lvl+0x60/0xb0 [ 181.731097] print_report+0xf8/0x5d8 [ 181.732325] kasan_report+0xc8/0x118 [ 181.733776] __asan_load1+0x60/0x70 [ 181.735061] ksize_uaf+0xe8/0x2f0 [ 181.736141] kunit_try_run_case+0xf8/0x260 [ 181.737526] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.738818] kthread+0x18c/0x1a8 [ 181.740168] ret_from_fork+0x10/0x20 [ 181.741666] [ 181.742352] Allocated by task 192: [ 181.743181] kasan_save_stack+0x3c/0x68 [ 181.744363] kasan_set_track+0x2c/0x40 [ 181.745822] kasan_save_alloc_info+0x24/0x38 [ 181.747088] __kasan_kmalloc+0xd4/0xd8 [ 181.748257] kmalloc_trace+0x68/0x130 [ 181.749740] ksize_uaf+0x9c/0x2f0 [ 181.750862] kunit_try_run_case+0xf8/0x260 [ 181.752069] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.753656] kthread+0x18c/0x1a8 [ 181.754743] ret_from_fork+0x10/0x20 [ 181.755734] [ 181.756346] Freed by task 192: [ 181.757272] kasan_save_stack+0x3c/0x68 [ 181.758478] kasan_set_track+0x2c/0x40 [ 181.759641] kasan_save_free_info+0x38/0x60 [ 181.761106] __kasan_slab_free+0x100/0x170 [ 181.762613] __kmem_cache_free+0x170/0x2e0 [ 181.763877] kfree+0x74/0x138 [ 181.764863] ksize_uaf+0xb8/0x2f0 [ 181.765937] kunit_try_run_case+0xf8/0x260 [ 181.767134] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.768589] kthread+0x18c/0x1a8 [ 181.769802] ret_from_fork+0x10/0x20 [ 181.770800] [ 181.771269] The buggy address belongs to the object at ffff0000c170c100 [ 181.771269] which belongs to the cache kmalloc-128 of size 128 [ 181.774302] The buggy address is located 0 bytes inside of [ 181.774302] freed 128-byte region [ffff0000c170c100, ffff0000c170c180) [ 181.776611] [ 181.777366] The buggy address belongs to the physical page: [ 181.779523] page:00000000265a4d16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10170c [ 181.781949] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 181.783489] page_type: 0xffffffff() [ 181.784897] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 181.786767] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 181.788368] page dumped because: kasan: bad access detected [ 181.790089] [ 181.790903] Memory state around the buggy address: [ 181.792308] ffff0000c170c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 181.793986] ffff0000c170c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.795644] >ffff0000c170c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 181.797162] ^ [ 181.798414] ffff0000c170c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.799670] ffff0000c170c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.801510] ================================================================== [ 181.805619] ================================================================== [ 181.807192] BUG: KASAN: slab-use-after-free in ksize_uaf+0x10c/0x2f0 [ 181.808689] Read of size 1 at addr ffff0000c170c178 by task kunit_try_catch/192 [ 181.810464] [ 181.811075] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 181.812899] Hardware name: linux,dummy-virt (DT) [ 181.814056] Call trace: [ 181.814789] dump_backtrace+0x9c/0x128 [ 181.815902] show_stack+0x20/0x38 [ 181.816912] dump_stack_lvl+0x60/0xb0 [ 181.818457] print_report+0xf8/0x5d8 [ 181.820087] kasan_report+0xc8/0x118 [ 181.822207] __asan_load1+0x60/0x70 [ 181.823332] ksize_uaf+0x10c/0x2f0 [ 181.824425] kunit_try_run_case+0xf8/0x260 [ 181.825664] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.827206] kthread+0x18c/0x1a8 [ 181.828173] ret_from_fork+0x10/0x20 [ 181.829278] [ 181.829853] Allocated by task 192: [ 181.830786] kasan_save_stack+0x3c/0x68 [ 181.831956] kasan_set_track+0x2c/0x40 [ 181.833109] kasan_save_alloc_info+0x24/0x38 [ 181.834419] __kasan_kmalloc+0xd4/0xd8 [ 181.835595] kmalloc_trace+0x68/0x130 [ 181.836618] ksize_uaf+0x9c/0x2f0 [ 181.837637] kunit_try_run_case+0xf8/0x260 [ 181.838836] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.840295] kthread+0x18c/0x1a8 [ 181.841275] ret_from_fork+0x10/0x20 [ 181.842357] [ 181.842933] Freed by task 192: [ 181.843773] kasan_save_stack+0x3c/0x68 [ 181.844925] kasan_set_track+0x2c/0x40 [ 181.846084] kasan_save_free_info+0x38/0x60 [ 181.847345] __kasan_slab_free+0x100/0x170 [ 181.848559] __kmem_cache_free+0x170/0x2e0 [ 181.849782] kfree+0x74/0x138 [ 181.850688] ksize_uaf+0xb8/0x2f0 [ 181.851717] kunit_try_run_case+0xf8/0x260 [ 181.852909] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.854381] kthread+0x18c/0x1a8 [ 181.855368] ret_from_fork+0x10/0x20 [ 181.856448] [ 181.857032] The buggy address belongs to the object at ffff0000c170c100 [ 181.857032] which belongs to the cache kmalloc-128 of size 128 [ 181.859451] The buggy address is located 120 bytes inside of [ 181.859451] freed 128-byte region [ffff0000c170c100, ffff0000c170c180) [ 181.861912] [ 181.862523] The buggy address belongs to the physical page: [ 181.863896] page:00000000265a4d16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10170c [ 181.865863] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 181.867444] page_type: 0xffffffff() [ 181.868506] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 181.870228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 181.871847] page dumped because: kasan: bad access detected [ 181.873101] [ 181.873766] Memory state around the buggy address: [ 181.874922] ffff0000c170c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 181.876495] ffff0000c170c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.878122] >ffff0000c170c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 181.879660] ^ [ 181.881266] ffff0000c170c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.882863] ffff0000c170c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.884388] ================================================================== [ 181.620012] ================================================================== [ 181.622251] BUG: KASAN: slab-use-after-free in ksize_uaf+0xc8/0x2f0 [ 181.624688] Read of size 1 at addr ffff0000c170c100 by task kunit_try_catch/192 [ 181.627154] [ 181.627924] CPU: 1 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 181.630056] Hardware name: linux,dummy-virt (DT) [ 181.631114] Call trace: [ 181.631758] dump_backtrace+0x9c/0x128 [ 181.632867] show_stack+0x20/0x38 [ 181.634019] dump_stack_lvl+0x60/0xb0 [ 181.635363] print_report+0xf8/0x5d8 [ 181.636538] kasan_report+0xc8/0x118 [ 181.637955] __kasan_check_byte+0x54/0x70 [ 181.638997] ksize+0x30/0x88 [ 181.639963] ksize_uaf+0xc8/0x2f0 [ 181.640719] kunit_try_run_case+0xf8/0x260 [ 181.642290] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.643828] kthread+0x18c/0x1a8 [ 181.644812] ret_from_fork+0x10/0x20 [ 181.646019] [ 181.646542] Allocated by task 192: [ 181.647453] kasan_save_stack+0x3c/0x68 [ 181.649916] kasan_set_track+0x2c/0x40 [ 181.651066] kasan_save_alloc_info+0x24/0x38 [ 181.652292] __kasan_kmalloc+0xd4/0xd8 [ 181.653524] kmalloc_trace+0x68/0x130 [ 181.654696] ksize_uaf+0x9c/0x2f0 [ 181.656563] kunit_try_run_case+0xf8/0x260 [ 181.657838] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.659549] kthread+0x18c/0x1a8 [ 181.660541] ret_from_fork+0x10/0x20 [ 181.662709] [ 181.663211] Freed by task 192: [ 181.664203] kasan_save_stack+0x3c/0x68 [ 181.665883] kasan_set_track+0x2c/0x40 [ 181.667163] kasan_save_free_info+0x38/0x60 [ 181.668411] __kasan_slab_free+0x100/0x170 [ 181.669808] __kmem_cache_free+0x170/0x2e0 [ 181.671327] kfree+0x74/0x138 [ 181.672287] ksize_uaf+0xb8/0x2f0 [ 181.673846] kunit_try_run_case+0xf8/0x260 [ 181.675166] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 181.676658] kthread+0x18c/0x1a8 [ 181.677639] ret_from_fork+0x10/0x20 [ 181.679097] [ 181.679720] The buggy address belongs to the object at ffff0000c170c100 [ 181.679720] which belongs to the cache kmalloc-128 of size 128 [ 181.682412] The buggy address is located 0 bytes inside of [ 181.682412] freed 128-byte region [ffff0000c170c100, ffff0000c170c180) [ 181.686688] [ 181.687339] The buggy address belongs to the physical page: [ 181.688286] page:00000000265a4d16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10170c [ 181.690330] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 181.691915] page_type: 0xffffffff() [ 181.693108] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 181.695126] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 181.696874] page dumped because: kasan: bad access detected [ 181.698387] [ 181.698910] Memory state around the buggy address: [ 181.699933] ffff0000c170c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 181.701960] ffff0000c170c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.703775] >ffff0000c170c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 181.705515] ^ [ 181.707010] ffff0000c170c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.708560] ffff0000c170c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 181.710366] ==================================================================