Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.932870] ================================================================== [ 17.932934] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.933011] Read of size 1 at addr fff00000c7998000 by task kunit_try_catch/230 [ 17.933063] [ 17.933093] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.933173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.933214] Hardware name: linux,dummy-virt (DT) [ 17.933478] Call trace: [ 17.933526] show_stack+0x20/0x38 (C) [ 17.933581] dump_stack_lvl+0x8c/0xd0 [ 17.933657] print_report+0x118/0x5d0 [ 17.933704] kasan_report+0xdc/0x128 [ 17.933776] __asan_report_load1_noabort+0x20/0x30 [ 17.933953] mempool_uaf_helper+0x314/0x340 [ 17.934125] mempool_kmalloc_large_uaf+0xc4/0x120 [ 17.934187] kunit_try_run_case+0x170/0x3f0 [ 17.934288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.934341] kthread+0x328/0x630 [ 17.934410] ret_from_fork+0x10/0x20 [ 17.934475] [ 17.934512] The buggy address belongs to the physical page: [ 17.934546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107998 [ 17.934600] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.934756] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.934810] page_type: f8(unknown) [ 17.934952] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.935027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.935080] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.935176] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.935255] head: 0bfffe0000000002 ffffc1ffc31e6601 00000000ffffffff 00000000ffffffff [ 17.935307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.935348] page dumped because: kasan: bad access detected [ 17.935611] [ 17.935639] Memory state around the buggy address: [ 17.935675] fff00000c7997f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.935786] fff00000c7997f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.935830] >fff00000c7998000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.935907] ^ [ 17.935962] fff00000c7998080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.936006] fff00000c7998100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.936057] ================================================================== [ 17.965262] ================================================================== [ 17.965344] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.965419] Read of size 1 at addr fff00000c799c000 by task kunit_try_catch/234 [ 17.965471] [ 17.965526] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.965611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.965793] Hardware name: linux,dummy-virt (DT) [ 17.965939] Call trace: [ 17.966010] show_stack+0x20/0x38 (C) [ 17.966215] dump_stack_lvl+0x8c/0xd0 [ 17.966479] print_report+0x118/0x5d0 [ 17.966670] kasan_report+0xdc/0x128 [ 17.966843] __asan_report_load1_noabort+0x20/0x30 [ 17.966961] mempool_uaf_helper+0x314/0x340 [ 17.967044] mempool_page_alloc_uaf+0xc0/0x118 [ 17.967092] kunit_try_run_case+0x170/0x3f0 [ 17.967393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.967547] kthread+0x328/0x630 [ 17.967634] ret_from_fork+0x10/0x20 [ 17.967789] [ 17.967839] The buggy address belongs to the physical page: [ 17.967914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799c [ 17.968054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.968282] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 17.968389] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.968431] page dumped because: kasan: bad access detected [ 17.968463] [ 17.968502] Memory state around the buggy address: [ 17.968534] fff00000c799bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.968578] fff00000c799bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.968622] >fff00000c799c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.968662] ^ [ 17.968915] fff00000c799c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.969061] fff00000c799c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.969232] ==================================================================
[ 18.660469] ================================================================== [ 18.660526] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.660573] Read of size 1 at addr fff00000c78e8000 by task kunit_try_catch/230 [ 18.660622] [ 18.660654] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.660735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.660762] Hardware name: linux,dummy-virt (DT) [ 18.660794] Call trace: [ 18.660816] show_stack+0x20/0x38 (C) [ 18.660862] dump_stack_lvl+0x8c/0xd0 [ 18.660908] print_report+0x118/0x5d0 [ 18.660953] kasan_report+0xdc/0x128 [ 18.660998] __asan_report_load1_noabort+0x20/0x30 [ 18.661048] mempool_uaf_helper+0x314/0x340 [ 18.661093] mempool_kmalloc_large_uaf+0xc4/0x120 [ 18.661141] kunit_try_run_case+0x170/0x3f0 [ 18.661201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.661253] kthread+0x328/0x630 [ 18.661294] ret_from_fork+0x10/0x20 [ 18.661340] [ 18.661361] The buggy address belongs to the physical page: [ 18.661394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e8 [ 18.661464] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.661512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.661564] page_type: f8(unknown) [ 18.661603] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.662131] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.662243] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.662294] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.662344] head: 0bfffe0000000002 ffffc1ffc31e3a01 00000000ffffffff 00000000ffffffff [ 18.662394] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.662443] page dumped because: kasan: bad access detected [ 18.662593] [ 18.662613] Memory state around the buggy address: [ 18.662644] fff00000c78e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.662709] fff00000c78e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.662761] >fff00000c78e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.662850] ^ [ 18.662898] fff00000c78e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.663099] fff00000c78e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.663291] ================================================================== [ 18.705305] ================================================================== [ 18.705369] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 18.705430] Read of size 1 at addr fff00000c78e8000 by task kunit_try_catch/234 [ 18.705481] [ 18.705514] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.705610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.705735] Hardware name: linux,dummy-virt (DT) [ 18.705791] Call trace: [ 18.705833] show_stack+0x20/0x38 (C) [ 18.706084] dump_stack_lvl+0x8c/0xd0 [ 18.706139] print_report+0x118/0x5d0 [ 18.706203] kasan_report+0xdc/0x128 [ 18.706246] __asan_report_load1_noabort+0x20/0x30 [ 18.706875] mempool_uaf_helper+0x314/0x340 [ 18.706944] mempool_page_alloc_uaf+0xc0/0x118 [ 18.706993] kunit_try_run_case+0x170/0x3f0 [ 18.707307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.707702] kthread+0x328/0x630 [ 18.707883] ret_from_fork+0x10/0x20 [ 18.707937] [ 18.707959] The buggy address belongs to the physical page: [ 18.707990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e8 [ 18.708045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.708405] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.708464] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.708507] page dumped because: kasan: bad access detected [ 18.708540] [ 18.708588] Memory state around the buggy address: [ 18.708624] fff00000c78e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.708731] fff00000c78e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.708777] >fff00000c78e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.708817] ^ [ 18.708845] fff00000c78e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.708953] fff00000c78e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.709038] ==================================================================
[ 14.272956] ================================================================== [ 14.273415] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 14.273836] Read of size 1 at addr ffff888103a64000 by task kunit_try_catch/251 [ 14.274116] [ 14.274235] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.274281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.274295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.274317] Call Trace: [ 14.274331] <TASK> [ 14.274347] dump_stack_lvl+0x73/0xb0 [ 14.274380] print_report+0xd1/0x610 [ 14.274425] ? __virt_addr_valid+0x1db/0x2d0 [ 14.274463] ? mempool_uaf_helper+0x392/0x400 [ 14.274486] ? kasan_addr_to_slab+0x11/0xa0 [ 14.274508] ? mempool_uaf_helper+0x392/0x400 [ 14.274532] kasan_report+0x141/0x180 [ 14.274579] ? mempool_uaf_helper+0x392/0x400 [ 14.274607] __asan_report_load1_noabort+0x18/0x20 [ 14.274633] mempool_uaf_helper+0x392/0x400 [ 14.274656] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.274681] ? __kasan_check_write+0x18/0x20 [ 14.274702] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.274726] ? finish_task_switch.isra.0+0x153/0x700 [ 14.274755] mempool_page_alloc_uaf+0xed/0x140 [ 14.274779] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 14.274808] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.274834] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.274861] ? __pfx_read_tsc+0x10/0x10 [ 14.274883] ? ktime_get_ts64+0x86/0x230 [ 14.274908] kunit_try_run_case+0x1a5/0x480 [ 14.274935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.274958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.274984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.275008] ? __kthread_parkme+0x82/0x180 [ 14.275030] ? preempt_count_sub+0x50/0x80 [ 14.275054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.275078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.275103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.275129] kthread+0x337/0x6f0 [ 14.275148] ? trace_preempt_on+0x20/0xc0 [ 14.275173] ? __pfx_kthread+0x10/0x10 [ 14.275194] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.275215] ? calculate_sigpending+0x7b/0xa0 [ 14.275241] ? __pfx_kthread+0x10/0x10 [ 14.275262] ret_from_fork+0x116/0x1d0 [ 14.275282] ? __pfx_kthread+0x10/0x10 [ 14.275302] ret_from_fork_asm+0x1a/0x30 [ 14.275334] </TASK> [ 14.275344] [ 14.284306] The buggy address belongs to the physical page: [ 14.284528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a64 [ 14.284956] flags: 0x200000000000000(node=0|zone=2) [ 14.285206] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.285595] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.285869] page dumped because: kasan: bad access detected [ 14.286120] [ 14.286212] Memory state around the buggy address: [ 14.286432] ffff888103a63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.286735] ffff888103a63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.287022] >ffff888103a64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.287281] ^ [ 14.287682] ffff888103a64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.287987] ffff888103a64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.288231] ================================================================== [ 14.217334] ================================================================== [ 14.218259] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 14.218896] Read of size 1 at addr ffff888103a20000 by task kunit_try_catch/246 [ 14.219207] [ 14.219299] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.219347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.219360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.219382] Call Trace: [ 14.219394] <TASK> [ 14.219410] dump_stack_lvl+0x73/0xb0 [ 14.219441] print_report+0xd1/0x610 [ 14.219480] ? __virt_addr_valid+0x1db/0x2d0 [ 14.219504] ? mempool_uaf_helper+0x392/0x400 [ 14.219527] ? kasan_addr_to_slab+0x11/0xa0 [ 14.219548] ? mempool_uaf_helper+0x392/0x400 [ 14.219582] kasan_report+0x141/0x180 [ 14.219605] ? mempool_uaf_helper+0x392/0x400 [ 14.219633] __asan_report_load1_noabort+0x18/0x20 [ 14.219658] mempool_uaf_helper+0x392/0x400 [ 14.219683] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.219706] ? update_load_avg+0x1be/0x21b0 [ 14.219735] ? finish_task_switch.isra.0+0x153/0x700 [ 14.219761] mempool_kmalloc_large_uaf+0xef/0x140 [ 14.219786] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 14.219814] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.219840] ? __pfx_mempool_kfree+0x10/0x10 [ 14.219866] ? __pfx_read_tsc+0x10/0x10 [ 14.219888] ? ktime_get_ts64+0x86/0x230 [ 14.219913] kunit_try_run_case+0x1a5/0x480 [ 14.219939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.219962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.219989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.220014] ? __kthread_parkme+0x82/0x180 [ 14.220035] ? preempt_count_sub+0x50/0x80 [ 14.220059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.220084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.220109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.220135] kthread+0x337/0x6f0 [ 14.220155] ? trace_preempt_on+0x20/0xc0 [ 14.220180] ? __pfx_kthread+0x10/0x10 [ 14.220201] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.220224] ? calculate_sigpending+0x7b/0xa0 [ 14.220249] ? __pfx_kthread+0x10/0x10 [ 14.220271] ret_from_fork+0x116/0x1d0 [ 14.220296] ? __pfx_kthread+0x10/0x10 [ 14.220317] ret_from_fork_asm+0x1a/0x30 [ 14.220348] </TASK> [ 14.220361] [ 14.228619] The buggy address belongs to the physical page: [ 14.228823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a20 [ 14.229248] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.229801] flags: 0x200000000000040(head|node=0|zone=2) [ 14.230071] page_type: f8(unknown) [ 14.230211] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.230465] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.230807] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.231190] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.231556] head: 0200000000000002 ffffea00040e8801 00000000ffffffff 00000000ffffffff [ 14.231834] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.232109] page dumped because: kasan: bad access detected [ 14.232365] [ 14.232493] Memory state around the buggy address: [ 14.232727] ffff888103a1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.233000] ffff888103a1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.233214] >ffff888103a20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.233425] ^ [ 14.233600] ffff888103a20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.233909] ffff888103a20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.234620] ==================================================================
[ 14.426579] ================================================================== [ 14.427108] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 14.427393] Read of size 1 at addr ffff888103bc0000 by task kunit_try_catch/247 [ 14.427748] [ 14.428160] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.428211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.428224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.428245] Call Trace: [ 14.428258] <TASK> [ 14.428276] dump_stack_lvl+0x73/0xb0 [ 14.428309] print_report+0xd1/0x610 [ 14.428331] ? __virt_addr_valid+0x1db/0x2d0 [ 14.428357] ? mempool_uaf_helper+0x392/0x400 [ 14.428380] ? kasan_addr_to_slab+0x11/0xa0 [ 14.428401] ? mempool_uaf_helper+0x392/0x400 [ 14.428424] kasan_report+0x141/0x180 [ 14.428446] ? mempool_uaf_helper+0x392/0x400 [ 14.428473] __asan_report_load1_noabort+0x18/0x20 [ 14.428500] mempool_uaf_helper+0x392/0x400 [ 14.428523] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.428546] ? update_load_avg+0x1be/0x21b0 [ 14.428574] ? finish_task_switch.isra.0+0x153/0x700 [ 14.428601] mempool_kmalloc_large_uaf+0xef/0x140 [ 14.428626] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 14.428851] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.428881] ? __pfx_mempool_kfree+0x10/0x10 [ 14.428907] ? __pfx_read_tsc+0x10/0x10 [ 14.428930] ? ktime_get_ts64+0x86/0x230 [ 14.428955] kunit_try_run_case+0x1a5/0x480 [ 14.428982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.429031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429069] ? __kthread_parkme+0x82/0x180 [ 14.429091] ? preempt_count_sub+0x50/0x80 [ 14.429115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429203] kthread+0x337/0x6f0 [ 14.429222] ? trace_preempt_on+0x20/0xc0 [ 14.429247] ? __pfx_kthread+0x10/0x10 [ 14.429267] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429290] ? calculate_sigpending+0x7b/0xa0 [ 14.429315] ? __pfx_kthread+0x10/0x10 [ 14.429336] ret_from_fork+0x116/0x1d0 [ 14.429356] ? __pfx_kthread+0x10/0x10 [ 14.429376] ret_from_fork_asm+0x1a/0x30 [ 14.429408] </TASK> [ 14.429418] [ 14.437901] The buggy address belongs to the physical page: [ 14.438144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103bc0 [ 14.438458] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.438857] flags: 0x200000000000040(head|node=0|zone=2) [ 14.439076] page_type: f8(unknown) [ 14.439384] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.439853] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.440221] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.440529] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 14.440945] head: 0200000000000002 ffffea00040ef001 00000000ffffffff 00000000ffffffff [ 14.441229] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 14.441462] page dumped because: kasan: bad access detected [ 14.441756] [ 14.441851] Memory state around the buggy address: [ 14.442096] ffff888103bbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.442432] ffff888103bbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.442846] >ffff888103bc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.443097] ^ [ 14.443273] ffff888103bc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.443596] ffff888103bc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.444193] ================================================================== [ 14.480508] ================================================================== [ 14.481574] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 14.482153] Read of size 1 at addr ffff888102cc0000 by task kunit_try_catch/251 [ 14.482616] [ 14.482799] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.482848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.482862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.482884] Call Trace: [ 14.482897] <TASK> [ 14.482914] dump_stack_lvl+0x73/0xb0 [ 14.483218] print_report+0xd1/0x610 [ 14.483249] ? __virt_addr_valid+0x1db/0x2d0 [ 14.483274] ? mempool_uaf_helper+0x392/0x400 [ 14.483298] ? kasan_addr_to_slab+0x11/0xa0 [ 14.483320] ? mempool_uaf_helper+0x392/0x400 [ 14.483342] kasan_report+0x141/0x180 [ 14.483365] ? mempool_uaf_helper+0x392/0x400 [ 14.483393] __asan_report_load1_noabort+0x18/0x20 [ 14.483419] mempool_uaf_helper+0x392/0x400 [ 14.483443] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.483468] ? __kasan_check_write+0x18/0x20 [ 14.483489] ? __pfx_sched_clock_cpu+0x10/0x10 [ 14.483511] ? finish_task_switch.isra.0+0x153/0x700 [ 14.483538] mempool_page_alloc_uaf+0xed/0x140 [ 14.483563] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 14.483592] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.483621] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.483662] ? __pfx_read_tsc+0x10/0x10 [ 14.483684] ? ktime_get_ts64+0x86/0x230 [ 14.483709] kunit_try_run_case+0x1a5/0x480 [ 14.483735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.483759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.483785] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.483809] ? __kthread_parkme+0x82/0x180 [ 14.483832] ? preempt_count_sub+0x50/0x80 [ 14.483856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.483881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.483907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.483934] kthread+0x337/0x6f0 [ 14.483953] ? trace_preempt_on+0x20/0xc0 [ 14.483978] ? __pfx_kthread+0x10/0x10 [ 14.483999] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.484021] ? calculate_sigpending+0x7b/0xa0 [ 14.484046] ? __pfx_kthread+0x10/0x10 [ 14.484078] ret_from_fork+0x116/0x1d0 [ 14.484098] ? __pfx_kthread+0x10/0x10 [ 14.484119] ret_from_fork_asm+0x1a/0x30 [ 14.484151] </TASK> [ 14.484163] [ 14.496499] The buggy address belongs to the physical page: [ 14.496874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102cc0 [ 14.497260] flags: 0x200000000000000(node=0|zone=2) [ 14.497596] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.497932] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.498425] page dumped because: kasan: bad access detected [ 14.498729] [ 14.498900] Memory state around the buggy address: [ 14.499279] ffff888102cbff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.499506] ffff888102cbff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.499931] >ffff888102cc0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.500362] ^ [ 14.500530] ffff888102cc0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.500919] ffff888102cc0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.501331] ==================================================================