Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 64.584930] ================================================================== [ 64.595977] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 64.602752] Read of size 1 at addr ccc0c000 by task kunit_try_catch/289 [ 64.609405] [ 64.610900] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 64.610931] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.610961] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.610961] Call trace: [ 64.610961] unwind_backtrace from show_stack+0x18/0x1c [ 64.610992] show_stack from dump_stack_lvl+0x70/0x90 [ 64.611022] dump_stack_lvl from print_report+0x158/0x528 [ 64.611053] print_report from kasan_report+0xdc/0x118 [ 64.611083] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 64.611083] mempool_uaf_helper from mempool_page_alloc_uaf+0xb8/0x104 [ 64.611114] mempool_page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 64.611145] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.611175] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.611206] kthread from ret_from_fork+0x14/0x20 [ 64.611236] Exception stack(0xf2603fb0 to 0xf2603ff8) [ 64.611236] 3fa0: 00000000 00000000 00000000 00000000 [ 64.611267] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.611267] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.611297] [ 64.723236] The buggy address belongs to the physical page: [ 64.728851] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 64.736114] flags: 0x0(zone=0) [ 64.739227] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 64.747375] raw: 00000000 [ 64.749999] page dumped because: kasan: bad access detected [ 64.755615] [ 64.757110] Memory state around the buggy address: [ 64.761932] ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.768524] ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.775085] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.781646] ^ [ 64.784210] ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.790771] ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.797332] ================================================================== [ 63.982269] ================================================================== [ 63.993560] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8 [ 64.000305] Read of size 1 at addr ccc0c000 by task kunit_try_catch/285 [ 64.006958] [ 64.008483] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 64.008514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 64.008514] Hardware name: Generic DRA74X (Flattened Device Tree) [ 64.008514] Call trace: [ 64.008544] unwind_backtrace from show_stack+0x18/0x1c [ 64.008575] show_stack from dump_stack_lvl+0x70/0x90 [ 64.008575] dump_stack_lvl from print_report+0x158/0x528 [ 64.008605] print_report from kasan_report+0xdc/0x118 [ 64.008636] kasan_report from mempool_uaf_helper+0x388/0x3b8 [ 64.008666] mempool_uaf_helper from mempool_kmalloc_large_uaf+0xbc/0x108 [ 64.008697] mempool_kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8 [ 64.008697] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 64.008728] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 64.008758] kthread from ret_from_fork+0x14/0x20 [ 64.008789] Exception stack(0xf25e3fb0 to 0xf25e3ff8) [ 64.008789] 3fa0: 00000000 00000000 00000000 00000000 [ 64.008819] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 64.008819] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 64.008850] [ 64.121307] The buggy address belongs to the physical page: [ 64.126922] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8cc0c [ 64.134185] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.141906] flags: 0x40(head|zone=0) [ 64.145507] page_type: f8(unknown) [ 64.148956] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 64.157073] raw: 00000000 [ 64.159729] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001 [ 64.167968] head: 00000000 00000002 eebca1b1 ffffffff 00000000 ffffffff 00000000 ffffffff [ 64.176208] head: 00000000 00000004 [ 64.179718] page dumped because: kasan: bad access detected [ 64.185302] [ 64.186828] Memory state around the buggy address: [ 64.191650] ccc0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.198211] ccc0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.204772] >ccc0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.211364] ^ [ 64.213897] ccc0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.220489] ccc0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.227050] ==================================================================
[ 37.877096] ================================================================== [ 37.888082] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.894790] Read of size 1 at addr ffff888105238000 by task kunit_try_catch/276 [ 37.902103] [ 37.903604] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 37.903613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.903615] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.903619] Call Trace: [ 37.903620] <TASK> [ 37.903622] dump_stack_lvl+0x73/0xb0 [ 37.903627] print_report+0xd1/0x650 [ 37.903631] ? __virt_addr_valid+0x1db/0x2d0 [ 37.903635] ? mempool_uaf_helper+0x392/0x400 [ 37.903639] ? kasan_addr_to_slab+0x11/0xa0 [ 37.903643] ? mempool_uaf_helper+0x392/0x400 [ 37.903648] kasan_report+0x141/0x180 [ 37.903652] ? mempool_uaf_helper+0x392/0x400 [ 37.903657] __asan_report_load1_noabort+0x18/0x20 [ 37.903661] mempool_uaf_helper+0x392/0x400 [ 37.903685] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.903690] ? dequeue_entities+0xa24/0x1790 [ 37.903695] ? finish_task_switch.isra.0+0x153/0x700 [ 37.903700] mempool_page_alloc_uaf+0xed/0x140 [ 37.903704] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 37.903708] ? dequeue_task_fair+0x166/0x4e0 [ 37.903724] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 37.903728] ? __pfx_mempool_free_pages+0x10/0x10 [ 37.903745] ? ktime_get_ts64+0x83/0x230 [ 37.903750] kunit_try_run_case+0x1a2/0x480 [ 37.903754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.903759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.903763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.903768] ? __kthread_parkme+0x82/0x180 [ 37.903772] ? preempt_count_sub+0x50/0x80 [ 37.903776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.903781] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.903785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.903789] kthread+0x334/0x6f0 [ 37.903793] ? trace_preempt_on+0x20/0xc0 [ 37.903797] ? __pfx_kthread+0x10/0x10 [ 37.903801] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.903806] ? calculate_sigpending+0x7b/0xa0 [ 37.903810] ? __pfx_kthread+0x10/0x10 [ 37.903814] ret_from_fork+0x3e/0x80 [ 37.903818] ? __pfx_kthread+0x10/0x10 [ 37.903822] ret_from_fork_asm+0x1a/0x30 [ 37.903828] </TASK> [ 37.903830] [ 38.094618] The buggy address belongs to the physical page: [ 38.100189] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238 [ 38.108197] flags: 0x200000000000000(node=0|zone=2) [ 38.113077] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.120825] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.128572] page dumped because: kasan: bad access detected [ 38.134142] [ 38.135643] Memory state around the buggy address: [ 38.140435] ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.147653] ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.154908] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.162127] ^ [ 38.165360] ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.172580] ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.179807] ================================================================== [ 37.069712] ================================================================== [ 37.080950] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.087687] Read of size 1 at addr ffff888106b0c000 by task kunit_try_catch/272 [ 37.095050] [ 37.096551] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 37.096560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.096562] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.096566] Call Trace: [ 37.096567] <TASK> [ 37.096569] dump_stack_lvl+0x73/0xb0 [ 37.096574] print_report+0xd1/0x650 [ 37.096578] ? __virt_addr_valid+0x1db/0x2d0 [ 37.096582] ? mempool_uaf_helper+0x392/0x400 [ 37.096586] ? kasan_addr_to_slab+0x11/0xa0 [ 37.096590] ? mempool_uaf_helper+0x392/0x400 [ 37.096595] kasan_report+0x141/0x180 [ 37.096599] ? mempool_uaf_helper+0x392/0x400 [ 37.096604] __asan_report_load1_noabort+0x18/0x20 [ 37.096608] mempool_uaf_helper+0x392/0x400 [ 37.096612] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.096617] ? dequeue_entities+0xa24/0x1790 [ 37.096621] ? finish_task_switch.isra.0+0x153/0x700 [ 37.096626] mempool_kmalloc_large_uaf+0xef/0x140 [ 37.096631] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 37.096635] ? dequeue_task_fair+0x166/0x4e0 [ 37.096640] ? __pfx_mempool_kmalloc+0x10/0x10 [ 37.096643] ? __pfx_mempool_kfree+0x10/0x10 [ 37.096647] ? ktime_get_ts64+0x83/0x230 [ 37.096652] kunit_try_run_case+0x1a2/0x480 [ 37.096656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.096660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.096685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.096690] ? __kthread_parkme+0x82/0x180 [ 37.096695] ? preempt_count_sub+0x50/0x80 [ 37.096699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.096704] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.096724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.096728] kthread+0x334/0x6f0 [ 37.096745] ? trace_preempt_on+0x20/0xc0 [ 37.096749] ? __pfx_kthread+0x10/0x10 [ 37.096753] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.096757] ? calculate_sigpending+0x7b/0xa0 [ 37.096761] ? __pfx_kthread+0x10/0x10 [ 37.096766] ret_from_fork+0x3e/0x80 [ 37.096770] ? __pfx_kthread+0x10/0x10 [ 37.096774] ret_from_fork_asm+0x1a/0x30 [ 37.096780] </TASK> [ 37.096782] [ 37.287224] The buggy address belongs to the physical page: [ 37.292796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b0c [ 37.300806] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.308464] flags: 0x200000000000040(head|node=0|zone=2) [ 37.313776] page_type: f8(unknown) [ 37.317184] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.324925] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.332690] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.340575] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.348410] head: 0200000000000002 ffffea00041ac301 00000000ffffffff 00000000ffffffff [ 37.356242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.364066] page dumped because: kasan: bad access detected [ 37.369641] [ 37.371138] Memory state around the buggy address: [ 37.375934] ffff888106b0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.383161] ffff888106b0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.390379] >ffff888106b0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.397596] ^ [ 37.400830] ffff888106b0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.408049] ffff888106b0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.415268] ==================================================================