Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.618486] ================================================================== [ 18.618562] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.618895] Read of size 1 at addr fff00000c640c000 by task kunit_try_catch/233 [ 18.618961] [ 18.619176] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.619482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.619562] Hardware name: linux,dummy-virt (DT) [ 18.619603] Call trace: [ 18.619645] show_stack+0x20/0x38 (C) [ 18.619824] dump_stack_lvl+0x8c/0xd0 [ 18.619879] print_report+0x118/0x608 [ 18.619934] kasan_report+0xdc/0x128 [ 18.619982] __asan_report_load1_noabort+0x20/0x30 [ 18.620032] mempool_uaf_helper+0x314/0x340 [ 18.620655] mempool_page_alloc_uaf+0xc0/0x118 [ 18.620843] kunit_try_run_case+0x170/0x3f0 [ 18.621001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.621218] kthread+0x328/0x630 [ 18.621357] ret_from_fork+0x10/0x20 [ 18.621540] [ 18.621566] The buggy address belongs to the physical page: [ 18.621728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10640c [ 18.621794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.622346] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.622515] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.622592] page dumped because: kasan: bad access detected [ 18.622800] [ 18.623284] Memory state around the buggy address: [ 18.623405] fff00000c640bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.623458] fff00000c640bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.623510] >fff00000c640c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.623548] ^ [ 18.623586] fff00000c640c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.623627] fff00000c640c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.624058] ================================================================== [ 18.559049] ================================================================== [ 18.559465] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.559556] Read of size 1 at addr fff00000c6404000 by task kunit_try_catch/229 [ 18.559617] [ 18.559655] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.560200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.560246] Hardware name: linux,dummy-virt (DT) [ 18.560377] Call trace: [ 18.560455] show_stack+0x20/0x38 (C) [ 18.560566] dump_stack_lvl+0x8c/0xd0 [ 18.560703] print_report+0x118/0x608 [ 18.560754] kasan_report+0xdc/0x128 [ 18.561046] __asan_report_load1_noabort+0x20/0x30 [ 18.561270] mempool_uaf_helper+0x314/0x340 [ 18.561678] mempool_kmalloc_large_uaf+0xc4/0x120 [ 18.561839] kunit_try_run_case+0x170/0x3f0 [ 18.562222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.562377] kthread+0x328/0x630 [ 18.562630] ret_from_fork+0x10/0x20 [ 18.562830] [ 18.562942] The buggy address belongs to the physical page: [ 18.563279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106404 [ 18.563466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.563549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.563729] page_type: f8(unknown) [ 18.563818] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.563872] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.564248] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.564396] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.564474] head: 0bfffe0000000002 ffffc1ffc3190101 00000000ffffffff 00000000ffffffff [ 18.564849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.564917] page dumped because: kasan: bad access detected [ 18.565031] [ 18.565093] Memory state around the buggy address: [ 18.565140] fff00000c6403f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.565216] fff00000c6403f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.565547] >fff00000c6404000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.565659] ^ [ 18.565695] fff00000c6404080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.565755] fff00000c6404100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.565981] ==================================================================
[ 14.082498] ================================================================== [ 14.082983] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 14.083525] Read of size 1 at addr ffff888102a44000 by task kunit_try_catch/246 [ 14.083853] [ 14.083969] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.084011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.084023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.084181] Call Trace: [ 14.084193] <TASK> [ 14.084207] dump_stack_lvl+0x73/0xb0 [ 14.084249] print_report+0xd1/0x650 [ 14.084271] ? __virt_addr_valid+0x1db/0x2d0 [ 14.084293] ? mempool_uaf_helper+0x392/0x400 [ 14.084319] ? kasan_addr_to_slab+0x11/0xa0 [ 14.084340] ? mempool_uaf_helper+0x392/0x400 [ 14.084362] kasan_report+0x141/0x180 [ 14.084383] ? mempool_uaf_helper+0x392/0x400 [ 14.084410] __asan_report_load1_noabort+0x18/0x20 [ 14.084435] mempool_uaf_helper+0x392/0x400 [ 14.084458] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.084482] ? __kasan_check_write+0x18/0x20 [ 14.084668] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.084696] ? finish_task_switch.isra.0+0x153/0x700 [ 14.084731] mempool_kmalloc_large_uaf+0xef/0x140 [ 14.084756] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 14.084784] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.084808] ? __pfx_mempool_kfree+0x10/0x10 [ 14.084833] ? __pfx_read_tsc+0x10/0x10 [ 14.084854] ? ktime_get_ts64+0x86/0x230 [ 14.084878] kunit_try_run_case+0x1a5/0x480 [ 14.084901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.084924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.084948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.084972] ? __kthread_parkme+0x82/0x180 [ 14.084992] ? preempt_count_sub+0x50/0x80 [ 14.085016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.085208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.085238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.085263] kthread+0x337/0x6f0 [ 14.085283] ? trace_preempt_on+0x20/0xc0 [ 14.085306] ? __pfx_kthread+0x10/0x10 [ 14.085327] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.085349] ? calculate_sigpending+0x7b/0xa0 [ 14.085372] ? __pfx_kthread+0x10/0x10 [ 14.085394] ret_from_fork+0x116/0x1d0 [ 14.085413] ? __pfx_kthread+0x10/0x10 [ 14.085433] ret_from_fork_asm+0x1a/0x30 [ 14.085465] </TASK> [ 14.085475] [ 14.098015] The buggy address belongs to the physical page: [ 14.098590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a44 [ 14.099154] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.099492] flags: 0x200000000000040(head|node=0|zone=2) [ 14.099745] page_type: f8(unknown) [ 14.099914] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.100540] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.101012] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.101489] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.101914] head: 0200000000000002 ffffea00040a9101 00000000ffffffff 00000000ffffffff [ 14.102387] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.102838] page dumped because: kasan: bad access detected [ 14.103053] [ 14.103363] Memory state around the buggy address: [ 14.103562] ffff888102a43f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.104002] ffff888102a43f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.104504] >ffff888102a44000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.104779] ^ [ 14.104943] ffff888102a44080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.105677] ffff888102a44100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.105972] ================================================================== [ 14.156850] ================================================================== [ 14.158281] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 14.158943] Read of size 1 at addr ffff888103990000 by task kunit_try_catch/250 [ 14.159579] [ 14.159684] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.159858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.159875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.159932] Call Trace: [ 14.159945] <TASK> [ 14.159964] dump_stack_lvl+0x73/0xb0 [ 14.160153] print_report+0xd1/0x650 [ 14.160177] ? __virt_addr_valid+0x1db/0x2d0 [ 14.160202] ? mempool_uaf_helper+0x392/0x400 [ 14.160224] ? kasan_addr_to_slab+0x11/0xa0 [ 14.160247] ? mempool_uaf_helper+0x392/0x400 [ 14.160270] kasan_report+0x141/0x180 [ 14.160292] ? mempool_uaf_helper+0x392/0x400 [ 14.160326] __asan_report_load1_noabort+0x18/0x20 [ 14.160351] mempool_uaf_helper+0x392/0x400 [ 14.160373] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.160398] ? __kasan_check_write+0x18/0x20 [ 14.160417] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.160441] ? finish_task_switch.isra.0+0x153/0x700 [ 14.160468] mempool_page_alloc_uaf+0xed/0x140 [ 14.160491] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 14.160518] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.160544] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.160571] ? __pfx_read_tsc+0x10/0x10 [ 14.160593] ? ktime_get_ts64+0x86/0x230 [ 14.160618] kunit_try_run_case+0x1a5/0x480 [ 14.160645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.160668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.160692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.160728] ? __kthread_parkme+0x82/0x180 [ 14.160750] ? preempt_count_sub+0x50/0x80 [ 14.160772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.160797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.160821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.160846] kthread+0x337/0x6f0 [ 14.160865] ? trace_preempt_on+0x20/0xc0 [ 14.160890] ? __pfx_kthread+0x10/0x10 [ 14.160910] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.160931] ? calculate_sigpending+0x7b/0xa0 [ 14.160956] ? __pfx_kthread+0x10/0x10 [ 14.160977] ret_from_fork+0x116/0x1d0 [ 14.160995] ? __pfx_kthread+0x10/0x10 [ 14.161016] ret_from_fork_asm+0x1a/0x30 [ 14.161059] </TASK> [ 14.161085] [ 14.173861] The buggy address belongs to the physical page: [ 14.174411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990 [ 14.174922] flags: 0x200000000000000(node=0|zone=2) [ 14.175382] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.175756] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.176395] page dumped because: kasan: bad access detected [ 14.176617] [ 14.176964] Memory state around the buggy address: [ 14.177447] ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.177920] ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.178455] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.178966] ^ [ 14.179265] ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.179583] ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.179907] ==================================================================