Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.666609] ================================================================== [ 18.666680] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.667221] Read of size 1 at addr fff00000c656a600 by task kunit_try_catch/227 [ 18.667440] [ 18.667527] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.667666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.667693] Hardware name: linux,dummy-virt (DT) [ 18.667839] Call trace: [ 18.668131] show_stack+0x20/0x38 (C) [ 18.668326] dump_stack_lvl+0x8c/0xd0 [ 18.668516] print_report+0x118/0x5d0 [ 18.668884] kasan_report+0xdc/0x128 [ 18.668971] __asan_report_load1_noabort+0x20/0x30 [ 18.669157] mempool_uaf_helper+0x314/0x340 [ 18.669349] mempool_kmalloc_uaf+0xc4/0x120 [ 18.669399] kunit_try_run_case+0x170/0x3f0 [ 18.669482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.669537] kthread+0x328/0x630 [ 18.669580] ret_from_fork+0x10/0x20 [ 18.669860] [ 18.670244] Allocated by task 227: [ 18.670307] kasan_save_stack+0x3c/0x68 [ 18.670355] kasan_save_track+0x20/0x40 [ 18.670412] kasan_save_alloc_info+0x40/0x58 [ 18.670453] __kasan_mempool_unpoison_object+0x11c/0x180 [ 18.670505] remove_element+0x130/0x1f8 [ 18.670554] mempool_alloc_preallocated+0x58/0xc0 [ 18.670603] mempool_uaf_helper+0xa4/0x340 [ 18.670654] mempool_kmalloc_uaf+0xc4/0x120 [ 18.670708] kunit_try_run_case+0x170/0x3f0 [ 18.670745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.670788] kthread+0x328/0x630 [ 18.670821] ret_from_fork+0x10/0x20 [ 18.670857] [ 18.670899] Freed by task 227: [ 18.670934] kasan_save_stack+0x3c/0x68 [ 18.670970] kasan_save_track+0x20/0x40 [ 18.671014] kasan_save_free_info+0x4c/0x78 [ 18.671076] __kasan_mempool_poison_object+0xc0/0x150 [ 18.671126] mempool_free+0x28c/0x328 [ 18.671159] mempool_uaf_helper+0x104/0x340 [ 18.671197] mempool_kmalloc_uaf+0xc4/0x120 [ 18.671237] kunit_try_run_case+0x170/0x3f0 [ 18.671289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.671342] kthread+0x328/0x630 [ 18.671373] ret_from_fork+0x10/0x20 [ 18.671420] [ 18.671439] The buggy address belongs to the object at fff00000c656a600 [ 18.671439] which belongs to the cache kmalloc-128 of size 128 [ 18.671507] The buggy address is located 0 bytes inside of [ 18.671507] freed 128-byte region [fff00000c656a600, fff00000c656a680) [ 18.671566] [ 18.671597] The buggy address belongs to the physical page: [ 18.671628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656a [ 18.671691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.671750] page_type: f5(slab) [ 18.672140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.672297] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.672906] page dumped because: kasan: bad access detected [ 18.672975] [ 18.673030] Memory state around the buggy address: [ 18.673129] fff00000c656a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.673288] fff00000c656a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.673435] >fff00000c656a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.673600] ^ [ 18.673940] fff00000c656a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.673996] fff00000c656a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.674117] ================================================================== [ 18.700524] ================================================================== [ 18.700886] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.700962] Read of size 1 at addr fff00000c78e2240 by task kunit_try_catch/231 [ 18.701052] [ 18.701092] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.701428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.701473] Hardware name: linux,dummy-virt (DT) [ 18.701527] Call trace: [ 18.701553] show_stack+0x20/0x38 (C) [ 18.701775] dump_stack_lvl+0x8c/0xd0 [ 18.702180] print_report+0x118/0x5d0 [ 18.702250] kasan_report+0xdc/0x128 [ 18.702588] __asan_report_load1_noabort+0x20/0x30 [ 18.702710] mempool_uaf_helper+0x314/0x340 [ 18.702841] mempool_slab_uaf+0xc0/0x118 [ 18.702903] kunit_try_run_case+0x170/0x3f0 [ 18.703174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.703263] kthread+0x328/0x630 [ 18.703307] ret_from_fork+0x10/0x20 [ 18.703356] [ 18.703423] Allocated by task 231: [ 18.703455] kasan_save_stack+0x3c/0x68 [ 18.703496] kasan_save_track+0x20/0x40 [ 18.703534] kasan_save_alloc_info+0x40/0x58 [ 18.703574] __kasan_mempool_unpoison_object+0xbc/0x180 [ 18.703617] remove_element+0x16c/0x1f8 [ 18.703654] mempool_alloc_preallocated+0x58/0xc0 [ 18.703693] mempool_uaf_helper+0xa4/0x340 [ 18.703729] mempool_slab_uaf+0xc0/0x118 [ 18.704261] kunit_try_run_case+0x170/0x3f0 [ 18.704302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.704345] kthread+0x328/0x630 [ 18.704385] ret_from_fork+0x10/0x20 [ 18.704421] [ 18.704675] Freed by task 231: [ 18.704745] kasan_save_stack+0x3c/0x68 [ 18.704935] kasan_save_track+0x20/0x40 [ 18.705210] kasan_save_free_info+0x4c/0x78 [ 18.705320] __kasan_mempool_poison_object+0xc0/0x150 [ 18.705383] mempool_free+0x28c/0x328 [ 18.705528] mempool_uaf_helper+0x104/0x340 [ 18.705614] mempool_slab_uaf+0xc0/0x118 [ 18.706135] kunit_try_run_case+0x170/0x3f0 [ 18.706205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.706528] kthread+0x328/0x630 [ 18.706592] ret_from_fork+0x10/0x20 [ 18.706696] [ 18.706787] The buggy address belongs to the object at fff00000c78e2240 [ 18.706787] which belongs to the cache test_cache of size 123 [ 18.706946] The buggy address is located 0 bytes inside of [ 18.706946] freed 123-byte region [fff00000c78e2240, fff00000c78e22bb) [ 18.707618] [ 18.707815] The buggy address belongs to the physical page: [ 18.707879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e2 [ 18.708080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.708139] page_type: f5(slab) [ 18.708180] raw: 0bfffe0000000000 fff00000c5875780 dead000000000122 0000000000000000 [ 18.708239] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 18.708280] page dumped because: kasan: bad access detected [ 18.708312] [ 18.708332] Memory state around the buggy address: [ 18.708365] fff00000c78e2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.708407] fff00000c78e2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.708449] >fff00000c78e2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 18.708486] ^ [ 18.708521] fff00000c78e2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.708560] fff00000c78e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.708597] ==================================================================
[ 13.892657] ================================================================== [ 13.893823] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 13.894148] Read of size 1 at addr ffff888102f56240 by task kunit_try_catch/248 [ 13.894375] [ 13.894472] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.894520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.894532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.894555] Call Trace: [ 13.894600] <TASK> [ 13.894619] dump_stack_lvl+0x73/0xb0 [ 13.894652] print_report+0xd1/0x610 [ 13.894675] ? __virt_addr_valid+0x1db/0x2d0 [ 13.894701] ? mempool_uaf_helper+0x392/0x400 [ 13.894723] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.894746] ? mempool_uaf_helper+0x392/0x400 [ 13.894768] kasan_report+0x141/0x180 [ 13.894809] ? mempool_uaf_helper+0x392/0x400 [ 13.894837] __asan_report_load1_noabort+0x18/0x20 [ 13.894862] mempool_uaf_helper+0x392/0x400 [ 13.894884] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 13.894910] ? __pfx_sched_clock_cpu+0x10/0x10 [ 13.894933] ? finish_task_switch.isra.0+0x153/0x700 [ 13.894961] mempool_slab_uaf+0xea/0x140 [ 13.894984] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 13.895010] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.895035] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.895070] ? __pfx_read_tsc+0x10/0x10 [ 13.895092] ? ktime_get_ts64+0x86/0x230 [ 13.895118] kunit_try_run_case+0x1a5/0x480 [ 13.895145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.895166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.895192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.895215] ? __kthread_parkme+0x82/0x180 [ 13.895237] ? preempt_count_sub+0x50/0x80 [ 13.895260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.895283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.895307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.895331] kthread+0x337/0x6f0 [ 13.895349] ? trace_preempt_on+0x20/0xc0 [ 13.895373] ? __pfx_kthread+0x10/0x10 [ 13.895393] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.895414] ? calculate_sigpending+0x7b/0xa0 [ 13.895439] ? __pfx_kthread+0x10/0x10 [ 13.895459] ret_from_fork+0x116/0x1d0 [ 13.895479] ? __pfx_kthread+0x10/0x10 [ 13.895498] ret_from_fork_asm+0x1a/0x30 [ 13.895532] </TASK> [ 13.895542] [ 13.909210] Allocated by task 248: [ 13.909344] kasan_save_stack+0x45/0x70 [ 13.909500] kasan_save_track+0x18/0x40 [ 13.909751] kasan_save_alloc_info+0x3b/0x50 [ 13.910241] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.910753] remove_element+0x11e/0x190 [ 13.911200] mempool_alloc_preallocated+0x4d/0x90 [ 13.911651] mempool_uaf_helper+0x96/0x400 [ 13.912085] mempool_slab_uaf+0xea/0x140 [ 13.912252] kunit_try_run_case+0x1a5/0x480 [ 13.912401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.912579] kthread+0x337/0x6f0 [ 13.912961] ret_from_fork+0x116/0x1d0 [ 13.913314] ret_from_fork_asm+0x1a/0x30 [ 13.913737] [ 13.913964] Freed by task 248: [ 13.914277] kasan_save_stack+0x45/0x70 [ 13.914636] kasan_save_track+0x18/0x40 [ 13.914824] kasan_save_free_info+0x3f/0x60 [ 13.914974] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.915156] mempool_free+0x2ec/0x380 [ 13.915291] mempool_uaf_helper+0x11a/0x400 [ 13.915461] mempool_slab_uaf+0xea/0x140 [ 13.915672] kunit_try_run_case+0x1a5/0x480 [ 13.916167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.916381] kthread+0x337/0x6f0 [ 13.916557] ret_from_fork+0x116/0x1d0 [ 13.916792] ret_from_fork_asm+0x1a/0x30 [ 13.917024] [ 13.917136] The buggy address belongs to the object at ffff888102f56240 [ 13.917136] which belongs to the cache test_cache of size 123 [ 13.917677] The buggy address is located 0 bytes inside of [ 13.917677] freed 123-byte region [ffff888102f56240, ffff888102f562bb) [ 13.918069] [ 13.918186] The buggy address belongs to the physical page: [ 13.918445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f56 [ 13.919011] flags: 0x200000000000000(node=0|zone=2) [ 13.919276] page_type: f5(slab) [ 13.919404] raw: 0200000000000000 ffff888101a30a00 dead000000000122 0000000000000000 [ 13.919922] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 13.920229] page dumped because: kasan: bad access detected [ 13.920431] [ 13.920524] Memory state around the buggy address: [ 13.920753] ffff888102f56100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.921101] ffff888102f56180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.921434] >ffff888102f56200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 13.921714] ^ [ 13.921884] ffff888102f56280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.922382] ffff888102f56300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.922632] ================================================================== [ 13.807104] ================================================================== [ 13.808864] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 13.809922] Read of size 1 at addr ffff8881026a6f00 by task kunit_try_catch/244 [ 13.810205] [ 13.810312] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.810362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.810374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.810399] Call Trace: [ 13.810415] <TASK> [ 13.810437] dump_stack_lvl+0x73/0xb0 [ 13.810473] print_report+0xd1/0x610 [ 13.810498] ? __virt_addr_valid+0x1db/0x2d0 [ 13.810523] ? mempool_uaf_helper+0x392/0x400 [ 13.810544] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.810567] ? mempool_uaf_helper+0x392/0x400 [ 13.810600] kasan_report+0x141/0x180 [ 13.810621] ? mempool_uaf_helper+0x392/0x400 [ 13.810649] __asan_report_load1_noabort+0x18/0x20 [ 13.810673] mempool_uaf_helper+0x392/0x400 [ 13.810695] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 13.810718] ? kasan_save_track+0x18/0x40 [ 13.810737] ? kasan_save_alloc_info+0x3b/0x50 [ 13.810759] ? kasan_save_stack+0x45/0x70 [ 13.810783] mempool_kmalloc_uaf+0xef/0x140 [ 13.810805] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 13.810830] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.810855] ? __pfx_mempool_kfree+0x10/0x10 [ 13.810879] ? __pfx_read_tsc+0x10/0x10 [ 13.810901] ? ktime_get_ts64+0x86/0x230 [ 13.810926] kunit_try_run_case+0x1a5/0x480 [ 13.810952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.810974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.811000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.811023] ? __kthread_parkme+0x82/0x180 [ 13.811044] ? preempt_count_sub+0x50/0x80 [ 13.811300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.811327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.811351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.811374] kthread+0x337/0x6f0 [ 13.811394] ? trace_preempt_on+0x20/0xc0 [ 13.811704] ? __pfx_kthread+0x10/0x10 [ 13.811730] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.811769] ? calculate_sigpending+0x7b/0xa0 [ 13.811795] ? __pfx_kthread+0x10/0x10 [ 13.811818] ret_from_fork+0x116/0x1d0 [ 13.811839] ? __pfx_kthread+0x10/0x10 [ 13.811859] ret_from_fork_asm+0x1a/0x30 [ 13.811892] </TASK> [ 13.811903] [ 13.834234] Allocated by task 244: [ 13.834928] kasan_save_stack+0x45/0x70 [ 13.835479] kasan_save_track+0x18/0x40 [ 13.835997] kasan_save_alloc_info+0x3b/0x50 [ 13.836584] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.836993] remove_element+0x11e/0x190 [ 13.837526] mempool_alloc_preallocated+0x4d/0x90 [ 13.838149] mempool_uaf_helper+0x96/0x400 [ 13.838557] mempool_kmalloc_uaf+0xef/0x140 [ 13.839189] kunit_try_run_case+0x1a5/0x480 [ 13.839376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.839557] kthread+0x337/0x6f0 [ 13.840314] ret_from_fork+0x116/0x1d0 [ 13.840936] ret_from_fork_asm+0x1a/0x30 [ 13.841525] [ 13.841897] Freed by task 244: [ 13.842264] kasan_save_stack+0x45/0x70 [ 13.842445] kasan_save_track+0x18/0x40 [ 13.842584] kasan_save_free_info+0x3f/0x60 [ 13.842732] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.843196] mempool_free+0x2ec/0x380 [ 13.843627] mempool_uaf_helper+0x11a/0x400 [ 13.844015] mempool_kmalloc_uaf+0xef/0x140 [ 13.844438] kunit_try_run_case+0x1a5/0x480 [ 13.844894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.845431] kthread+0x337/0x6f0 [ 13.845565] ret_from_fork+0x116/0x1d0 [ 13.845709] ret_from_fork_asm+0x1a/0x30 [ 13.846153] [ 13.846318] The buggy address belongs to the object at ffff8881026a6f00 [ 13.846318] which belongs to the cache kmalloc-128 of size 128 [ 13.847280] The buggy address is located 0 bytes inside of [ 13.847280] freed 128-byte region [ffff8881026a6f00, ffff8881026a6f80) [ 13.848256] [ 13.848342] The buggy address belongs to the physical page: [ 13.848564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026a6 [ 13.849350] flags: 0x200000000000000(node=0|zone=2) [ 13.849907] page_type: f5(slab) [ 13.850242] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.850862] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 13.851575] page dumped because: kasan: bad access detected [ 13.852138] [ 13.852286] Memory state around the buggy address: [ 13.852577] ffff8881026a6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.852851] ffff8881026a6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.853445] >ffff8881026a6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.853890] ^ [ 13.854263] ffff8881026a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.854728] ffff8881026a7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.854946] ==================================================================