Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 19.109624] ================================================================== [ 19.109735] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.110104] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/234 [ 19.110321] [ 19.110401] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.110775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.111077] Hardware name: linux,dummy-virt (DT) [ 19.111316] Call trace: [ 19.111375] show_stack+0x20/0x38 (C) [ 19.111489] dump_stack_lvl+0x8c/0xd0 [ 19.111581] print_report+0x118/0x608 [ 19.111763] kasan_report+0xdc/0x128 [ 19.111869] __asan_report_load1_noabort+0x20/0x30 [ 19.112045] mempool_uaf_helper+0x314/0x340 [ 19.112344] mempool_page_alloc_uaf+0xc0/0x118 [ 19.112561] kunit_try_run_case+0x170/0x3f0 [ 19.112658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.113097] kthread+0x328/0x630 [ 19.113172] ret_from_fork+0x10/0x20 [ 19.113649] [ 19.113678] The buggy address belongs to the physical page: [ 19.113746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 19.114224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.114374] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.114504] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.114547] page dumped because: kasan: bad access detected [ 19.114579] [ 19.114788] Memory state around the buggy address: [ 19.115127] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115225] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115308] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115440] ^ [ 19.115535] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115601] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.115839] ================================================================== [ 19.050033] ================================================================== [ 19.050229] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 19.050421] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/230 [ 19.050549] [ 19.050595] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.051145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.051299] Hardware name: linux,dummy-virt (DT) [ 19.051347] Call trace: [ 19.051373] show_stack+0x20/0x38 (C) [ 19.051642] dump_stack_lvl+0x8c/0xd0 [ 19.051821] print_report+0x118/0x608 [ 19.051965] kasan_report+0xdc/0x128 [ 19.052087] __asan_report_load1_noabort+0x20/0x30 [ 19.052165] mempool_uaf_helper+0x314/0x340 [ 19.052271] mempool_kmalloc_large_uaf+0xc4/0x120 [ 19.052324] kunit_try_run_case+0x170/0x3f0 [ 19.052384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.052438] kthread+0x328/0x630 [ 19.052487] ret_from_fork+0x10/0x20 [ 19.052537] [ 19.052568] The buggy address belongs to the physical page: [ 19.052612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 19.052686] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.052735] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.052792] page_type: f8(unknown) [ 19.052841] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.052896] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.052946] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.053016] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 19.053070] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff [ 19.053122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.053163] page dumped because: kasan: bad access detected [ 19.053195] [ 19.053213] Memory state around the buggy address: [ 19.053258] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053302] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053346] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053389] ^ [ 19.053437] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053488] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.053537] ==================================================================
[ 18.749308] ================================================================== [ 18.749404] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.749469] Read of size 1 at addr fff00000c783c000 by task kunit_try_catch/234 [ 18.749518] [ 18.749555] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.749648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.749675] Hardware name: linux,dummy-virt (DT) [ 18.749709] Call trace: [ 18.749737] show_stack+0x20/0x38 (C) [ 18.749787] dump_stack_lvl+0x8c/0xd0 [ 18.749832] print_report+0x118/0x608 [ 18.749878] kasan_report+0xdc/0x128 [ 18.750398] __asan_report_load1_noabort+0x20/0x30 [ 18.750851] mempool_uaf_helper+0x314/0x340 [ 18.750956] mempool_page_alloc_uaf+0xc0/0x118 [ 18.751028] kunit_try_run_case+0x170/0x3f0 [ 18.751505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.751662] kthread+0x328/0x630 [ 18.751835] ret_from_fork+0x10/0x20 [ 18.752006] [ 18.752029] The buggy address belongs to the physical page: [ 18.752118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10783c [ 18.752354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.752843] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.752982] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.753096] page dumped because: kasan: bad access detected [ 18.753130] [ 18.753149] Memory state around the buggy address: [ 18.753379] fff00000c783bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.753573] fff00000c783bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.753701] >fff00000c783c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.753842] ^ [ 18.753946] fff00000c783c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.754167] fff00000c783c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.754411] ================================================================== [ 18.675805] ================================================================== [ 18.676236] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.676334] Read of size 1 at addr fff00000c783c000 by task kunit_try_catch/230 [ 18.676551] [ 18.676857] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.677117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.677162] Hardware name: linux,dummy-virt (DT) [ 18.677241] Call trace: [ 18.677368] show_stack+0x20/0x38 (C) [ 18.677449] dump_stack_lvl+0x8c/0xd0 [ 18.677496] print_report+0x118/0x608 [ 18.677541] kasan_report+0xdc/0x128 [ 18.677946] __asan_report_load1_noabort+0x20/0x30 [ 18.678360] mempool_uaf_helper+0x314/0x340 [ 18.678416] mempool_kmalloc_large_uaf+0xc4/0x120 [ 18.678572] kunit_try_run_case+0x170/0x3f0 [ 18.678630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.678752] kthread+0x328/0x630 [ 18.679058] ret_from_fork+0x10/0x20 [ 18.679223] [ 18.679290] The buggy address belongs to the physical page: [ 18.679517] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10783c [ 18.679819] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.680100] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.680228] page_type: f8(unknown) [ 18.680735] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.681199] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.681290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.681337] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.681387] head: 0bfffe0000000002 ffffc1ffc31e0f01 00000000ffffffff 00000000ffffffff [ 18.681675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.682095] page dumped because: kasan: bad access detected [ 18.682128] [ 18.682148] Memory state around the buggy address: [ 18.682347] fff00000c783bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.682581] fff00000c783bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.682655] >fff00000c783c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.682694] ^ [ 18.682721] fff00000c783c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.682764] fff00000c783c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.682802] ==================================================================
[ 15.130094] ================================================================== [ 15.130526] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.131136] Read of size 1 at addr ffff888102b48000 by task kunit_try_catch/251 [ 15.131871] [ 15.132362] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.132502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.132765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.132797] Call Trace: [ 15.132812] <TASK> [ 15.132832] dump_stack_lvl+0x73/0xb0 [ 15.132869] print_report+0xd1/0x650 [ 15.132891] ? __virt_addr_valid+0x1db/0x2d0 [ 15.132912] ? mempool_uaf_helper+0x392/0x400 [ 15.132931] ? kasan_addr_to_slab+0x11/0xa0 [ 15.132950] ? mempool_uaf_helper+0x392/0x400 [ 15.132969] kasan_report+0x141/0x180 [ 15.132989] ? mempool_uaf_helper+0x392/0x400 [ 15.133013] __asan_report_load1_noabort+0x18/0x20 [ 15.133034] mempool_uaf_helper+0x392/0x400 [ 15.133055] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.133076] ? __kasan_check_write+0x18/0x20 [ 15.133094] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.133135] ? finish_task_switch.isra.0+0x153/0x700 [ 15.133160] mempool_page_alloc_uaf+0xed/0x140 [ 15.133181] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 15.133204] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 15.133226] ? __pfx_mempool_free_pages+0x10/0x10 [ 15.133247] ? __pfx_read_tsc+0x10/0x10 [ 15.133265] ? ktime_get_ts64+0x86/0x230 [ 15.133288] kunit_try_run_case+0x1a5/0x480 [ 15.133310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.133329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.133351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.133371] ? __kthread_parkme+0x82/0x180 [ 15.133389] ? preempt_count_sub+0x50/0x80 [ 15.133410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.133430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.133450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.133471] kthread+0x337/0x6f0 [ 15.133487] ? trace_preempt_on+0x20/0xc0 [ 15.133535] ? __pfx_kthread+0x10/0x10 [ 15.133575] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.133608] ? calculate_sigpending+0x7b/0xa0 [ 15.133653] ? __pfx_kthread+0x10/0x10 [ 15.133674] ret_from_fork+0x116/0x1d0 [ 15.133692] ? __pfx_kthread+0x10/0x10 [ 15.133711] ret_from_fork_asm+0x1a/0x30 [ 15.133738] </TASK> [ 15.133751] [ 15.146832] The buggy address belongs to the physical page: [ 15.147037] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 15.147256] flags: 0x200000000000000(node=0|zone=2) [ 15.147449] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 15.148902] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.149956] page dumped because: kasan: bad access detected [ 15.150598] [ 15.151014] Memory state around the buggy address: [ 15.151796] ffff888102b47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.152732] ffff888102b47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.153511] >ffff888102b48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.154837] ^ [ 15.155387] ffff888102b48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.156189] ffff888102b48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.157347] ================================================================== [ 15.054203] ================================================================== [ 15.054660] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.055185] Read of size 1 at addr ffff888102b48000 by task kunit_try_catch/247 [ 15.055415] [ 15.055543] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.055636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.055656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.055689] Call Trace: [ 15.055708] <TASK> [ 15.055731] dump_stack_lvl+0x73/0xb0 [ 15.055773] print_report+0xd1/0x650 [ 15.055801] ? __virt_addr_valid+0x1db/0x2d0 [ 15.055829] ? mempool_uaf_helper+0x392/0x400 [ 15.055855] ? kasan_addr_to_slab+0x11/0xa0 [ 15.055879] ? mempool_uaf_helper+0x392/0x400 [ 15.055904] kasan_report+0x141/0x180 [ 15.055930] ? mempool_uaf_helper+0x392/0x400 [ 15.055957] __asan_report_load1_noabort+0x18/0x20 [ 15.055978] mempool_uaf_helper+0x392/0x400 [ 15.055997] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.056020] ? finish_task_switch.isra.0+0x153/0x700 [ 15.056044] mempool_kmalloc_large_uaf+0xef/0x140 [ 15.056065] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 15.056089] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.056136] ? __pfx_mempool_kfree+0x10/0x10 [ 15.056185] ? __pfx_read_tsc+0x10/0x10 [ 15.056222] ? ktime_get_ts64+0x86/0x230 [ 15.056266] kunit_try_run_case+0x1a5/0x480 [ 15.056305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.056336] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.056375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.056412] ? __kthread_parkme+0x82/0x180 [ 15.056449] ? preempt_count_sub+0x50/0x80 [ 15.056491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.056544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.056585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.056641] kthread+0x337/0x6f0 [ 15.056680] ? trace_preempt_on+0x20/0xc0 [ 15.056718] ? __pfx_kthread+0x10/0x10 [ 15.056747] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.056780] ? calculate_sigpending+0x7b/0xa0 [ 15.056820] ? __pfx_kthread+0x10/0x10 [ 15.056856] ret_from_fork+0x116/0x1d0 [ 15.056894] ? __pfx_kthread+0x10/0x10 [ 15.056934] ret_from_fork_asm+0x1a/0x30 [ 15.056997] </TASK> [ 15.057021] [ 15.069211] The buggy address belongs to the physical page: [ 15.069462] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b48 [ 15.069757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.070724] flags: 0x200000000000040(head|node=0|zone=2) [ 15.071154] page_type: f8(unknown) [ 15.071426] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.071924] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.072463] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.073061] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.073356] head: 0200000000000002 ffffea00040ad201 00000000ffffffff 00000000ffffffff [ 15.073991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.074843] page dumped because: kasan: bad access detected [ 15.075264] [ 15.075382] Memory state around the buggy address: [ 15.075870] ffff888102b47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.076340] ffff888102b47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.076894] >ffff888102b48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.077270] ^ [ 15.077442] ffff888102b48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.078055] ffff888102b48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.078413] ==================================================================
[ 15.145449] ================================================================== [ 15.146433] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.146686] Read of size 1 at addr ffff888102a0c000 by task kunit_try_catch/246 [ 15.148015] [ 15.148470] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.148565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.148581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.148604] Call Trace: [ 15.148619] <TASK> [ 15.148635] dump_stack_lvl+0x73/0xb0 [ 15.148665] print_report+0xd1/0x650 [ 15.148687] ? __virt_addr_valid+0x1db/0x2d0 [ 15.148743] ? mempool_uaf_helper+0x392/0x400 [ 15.148779] ? kasan_addr_to_slab+0x11/0xa0 [ 15.148799] ? mempool_uaf_helper+0x392/0x400 [ 15.148822] kasan_report+0x141/0x180 [ 15.148844] ? mempool_uaf_helper+0x392/0x400 [ 15.148871] __asan_report_load1_noabort+0x18/0x20 [ 15.148897] mempool_uaf_helper+0x392/0x400 [ 15.148920] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.148946] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.148969] ? finish_task_switch.isra.0+0x153/0x700 [ 15.148994] mempool_kmalloc_large_uaf+0xef/0x140 [ 15.149018] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 15.149045] ? __pfx_mempool_kmalloc+0x10/0x10 [ 15.149080] ? __pfx_mempool_kfree+0x10/0x10 [ 15.149105] ? __pfx_read_tsc+0x10/0x10 [ 15.149125] ? ktime_get_ts64+0x86/0x230 [ 15.149149] kunit_try_run_case+0x1a5/0x480 [ 15.149174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.149196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.149219] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.149242] ? __kthread_parkme+0x82/0x180 [ 15.149262] ? preempt_count_sub+0x50/0x80 [ 15.149285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.149308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.149330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.149353] kthread+0x337/0x6f0 [ 15.149373] ? trace_preempt_on+0x20/0xc0 [ 15.149397] ? __pfx_kthread+0x10/0x10 [ 15.149418] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.149438] ? calculate_sigpending+0x7b/0xa0 [ 15.149462] ? __pfx_kthread+0x10/0x10 [ 15.149484] ret_from_fork+0x116/0x1d0 [ 15.149502] ? __pfx_kthread+0x10/0x10 [ 15.149529] ret_from_fork_asm+0x1a/0x30 [ 15.149560] </TASK> [ 15.149572] [ 15.165739] The buggy address belongs to the physical page: [ 15.165950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0c [ 15.166599] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.167223] flags: 0x200000000000040(head|node=0|zone=2) [ 15.167722] page_type: f8(unknown) [ 15.167967] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.168405] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.168643] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 15.169457] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 15.170452] head: 0200000000000002 ffffea00040a8301 00000000ffffffff 00000000ffffffff [ 15.171446] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 15.171902] page dumped because: kasan: bad access detected [ 15.172099] [ 15.172179] Memory state around the buggy address: [ 15.172345] ffff888102a0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.172571] ffff888102a0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.172794] >ffff888102a0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.173012] ^ [ 15.173454] ffff888102a0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.174299] ffff888102a0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.175152] ================================================================== [ 15.213099] ================================================================== [ 15.213586] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 15.213903] Read of size 1 at addr ffff888103950000 by task kunit_try_catch/250 [ 15.214321] [ 15.214435] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.214482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.214496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.214518] Call Trace: [ 15.214532] <TASK> [ 15.214548] dump_stack_lvl+0x73/0xb0 [ 15.214578] print_report+0xd1/0x650 [ 15.214601] ? __virt_addr_valid+0x1db/0x2d0 [ 15.214625] ? mempool_uaf_helper+0x392/0x400 [ 15.214648] ? kasan_addr_to_slab+0x11/0xa0 [ 15.214668] ? mempool_uaf_helper+0x392/0x400 [ 15.214691] kasan_report+0x141/0x180 [ 15.214713] ? mempool_uaf_helper+0x392/0x400 [ 15.214759] __asan_report_load1_noabort+0x18/0x20 [ 15.214785] mempool_uaf_helper+0x392/0x400 [ 15.214808] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 15.214840] mempool_page_alloc_uaf+0xed/0x140 [ 15.214864] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 15.214892] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 15.214917] ? __pfx_mempool_free_pages+0x10/0x10 [ 15.214944] ? __pfx_read_tsc+0x10/0x10 [ 15.214966] ? ktime_get_ts64+0x86/0x230 [ 15.214992] kunit_try_run_case+0x1a5/0x480 [ 15.215017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.215040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.215076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.215100] ? __kthread_parkme+0x82/0x180 [ 15.215122] ? preempt_count_sub+0x50/0x80 [ 15.215147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.215170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.215194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.215218] kthread+0x337/0x6f0 [ 15.215238] ? trace_preempt_on+0x20/0xc0 [ 15.215263] ? __pfx_kthread+0x10/0x10 [ 15.215284] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.215307] ? calculate_sigpending+0x7b/0xa0 [ 15.215333] ? __pfx_kthread+0x10/0x10 [ 15.215356] ret_from_fork+0x116/0x1d0 [ 15.215375] ? __pfx_kthread+0x10/0x10 [ 15.215395] ret_from_fork_asm+0x1a/0x30 [ 15.215429] </TASK> [ 15.215441] [ 15.224179] The buggy address belongs to the physical page: [ 15.224464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103950 [ 15.224887] flags: 0x200000000000000(node=0|zone=2) [ 15.225083] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 15.225386] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.225684] page dumped because: kasan: bad access detected [ 15.226037] [ 15.226170] Memory state around the buggy address: [ 15.226367] ffff88810394ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.226701] ffff88810394ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.227023] >ffff888103950000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.227343] ^ [ 15.227504] ffff888103950080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.227977] ffff888103950100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 15.228302] ==================================================================
[ 37.313510] ================================================================== [ 37.324749] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.331457] Read of size 1 at addr ffff8881081f8000 by task kunit_try_catch/270 [ 37.338773] [ 37.340271] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 37.340280] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 37.340283] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.340287] Call Trace: [ 37.340288] <TASK> [ 37.340290] dump_stack_lvl+0x73/0xb0 [ 37.340295] print_report+0xd1/0x650 [ 37.340299] ? __virt_addr_valid+0x1db/0x2d0 [ 37.340303] ? mempool_uaf_helper+0x392/0x400 [ 37.340307] ? kasan_addr_to_slab+0x11/0xa0 [ 37.340311] ? mempool_uaf_helper+0x392/0x400 [ 37.340315] kasan_report+0x141/0x180 [ 37.340319] ? mempool_uaf_helper+0x392/0x400 [ 37.340324] __asan_report_load1_noabort+0x18/0x20 [ 37.340329] mempool_uaf_helper+0x392/0x400 [ 37.340350] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.340355] ? __kasan_check_write+0x18/0x20 [ 37.340358] ? __pfx_sched_clock_cpu+0x10/0x10 [ 37.340362] ? finish_task_switch.isra.0+0x153/0x700 [ 37.340367] mempool_kmalloc_large_uaf+0xef/0x140 [ 37.340371] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 37.340389] ? __pfx_mempool_kmalloc+0x10/0x10 [ 37.340393] ? __pfx_mempool_kfree+0x10/0x10 [ 37.340398] ? ktime_get_ts64+0x83/0x230 [ 37.340402] kunit_try_run_case+0x1a2/0x480 [ 37.340407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.340411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.340415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.340420] ? __kthread_parkme+0x82/0x180 [ 37.340423] ? preempt_count_sub+0x50/0x80 [ 37.340427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.340432] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.340436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.340441] kthread+0x334/0x6f0 [ 37.340444] ? trace_preempt_on+0x20/0xc0 [ 37.340448] ? __pfx_kthread+0x10/0x10 [ 37.340452] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.340456] ? calculate_sigpending+0x7b/0xa0 [ 37.340460] ? __pfx_kthread+0x10/0x10 [ 37.340464] ret_from_fork+0x113/0x1d0 [ 37.340467] ? __pfx_kthread+0x10/0x10 [ 37.340471] ret_from_fork_asm+0x1a/0x30 [ 37.340477] </TASK> [ 37.340479] [ 37.533130] The buggy address belongs to the physical page: [ 37.538703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081f8 [ 37.546711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.554371] flags: 0x200000000000040(head|node=0|zone=2) [ 37.559709] page_type: f8(unknown) [ 37.563118] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.570864] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.578605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.586438] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.594264] head: 0200000000000002 ffffea0004207e01 00000000ffffffff 00000000ffffffff [ 37.602089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.609916] page dumped because: kasan: bad access detected [ 37.615488] [ 37.616989] Memory state around the buggy address: [ 37.621781] ffff8881081f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.629001] ffff8881081f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.636228] >ffff8881081f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.643456] ^ [ 37.646690] ffff8881081f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653915] ffff8881081f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.661134] ================================================================== [ 38.125030] ================================================================== [ 38.136008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 38.142714] Read of size 1 at addr ffff888104eb8000 by task kunit_try_catch/274 [ 38.150028] [ 38.151531] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 38.151540] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 38.151543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 38.151546] Call Trace: [ 38.151548] <TASK> [ 38.151550] dump_stack_lvl+0x73/0xb0 [ 38.151555] print_report+0xd1/0x650 [ 38.151559] ? __virt_addr_valid+0x1db/0x2d0 [ 38.151563] ? mempool_uaf_helper+0x392/0x400 [ 38.151567] ? kasan_addr_to_slab+0x11/0xa0 [ 38.151571] ? mempool_uaf_helper+0x392/0x400 [ 38.151575] kasan_report+0x141/0x180 [ 38.151579] ? mempool_uaf_helper+0x392/0x400 [ 38.151584] __asan_report_load1_noabort+0x18/0x20 [ 38.151589] mempool_uaf_helper+0x392/0x400 [ 38.151593] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 38.151598] ? __pfx_sched_clock_cpu+0x10/0x10 [ 38.151602] ? finish_task_switch.isra.0+0x153/0x700 [ 38.151607] mempool_page_alloc_uaf+0xed/0x140 [ 38.151611] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 38.151617] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 38.151621] ? __pfx_mempool_free_pages+0x10/0x10 [ 38.151627] ? ktime_get_ts64+0x83/0x230 [ 38.151631] kunit_try_run_case+0x1a2/0x480 [ 38.151636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.151640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 38.151644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 38.151648] ? __kthread_parkme+0x82/0x180 [ 38.151652] ? preempt_count_sub+0x50/0x80 [ 38.151656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.151661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.151665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 38.151670] kthread+0x334/0x6f0 [ 38.151673] ? trace_preempt_on+0x20/0xc0 [ 38.151677] ? __pfx_kthread+0x10/0x10 [ 38.151681] ? _raw_spin_unlock_irq+0x47/0x80 [ 38.151685] ? calculate_sigpending+0x7b/0xa0 [ 38.151690] ? __pfx_kthread+0x10/0x10 [ 38.151694] ret_from_fork+0x113/0x1d0 [ 38.151697] ? __pfx_kthread+0x10/0x10 [ 38.151701] ret_from_fork_asm+0x1a/0x30 [ 38.151707] </TASK> [ 38.151708] [ 38.340277] The buggy address belongs to the physical page: [ 38.345849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8 [ 38.353852] flags: 0x200000000000000(node=0|zone=2) [ 38.358739] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.366487] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.374227] page dumped because: kasan: bad access detected [ 38.379798] [ 38.381296] Memory state around the buggy address: [ 38.386091] ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.393311] ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.400537] >ffff888104eb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.407757] ^ [ 38.410991] ffff888104eb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.418210] ffff888104eb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.425437] ==================================================================