Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.380960] ================================================================== [ 30.382464] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.383336] Read of size 1 at addr fff00000c6530000 by task kunit_try_catch/143 [ 30.384254] [ 30.384704] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.386246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.387021] Hardware name: linux,dummy-virt (DT) [ 30.387594] Call trace: [ 30.387988] show_stack+0x20/0x38 (C) [ 30.388513] dump_stack_lvl+0x8c/0xd0 [ 30.389080] print_report+0x118/0x5e0 [ 30.390144] kasan_report+0xc8/0x118 [ 30.390747] __asan_report_load1_noabort+0x20/0x30 [ 30.391692] page_alloc_uaf+0x328/0x350 [ 30.392326] kunit_try_run_case+0x14c/0x3d0 [ 30.393216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.394122] kthread+0x24c/0x2d0 [ 30.394861] ret_from_fork+0x10/0x20 [ 30.395501] [ 30.396115] The buggy address belongs to the physical page: [ 30.396884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 30.397697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.398228] page_type: f0(buddy) [ 30.398829] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 30.399658] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 30.400562] page dumped because: kasan: bad access detected [ 30.401273] [ 30.401666] Memory state around the buggy address: [ 30.402307] fff00000c652ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.403269] fff00000c652ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.404103] >fff00000c6530000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.404823] ^ [ 30.405393] fff00000c6530080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.406191] fff00000c6530100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.407045] ==================================================================
[ 30.329117] ================================================================== [ 30.330594] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.331348] Read of size 1 at addr fff00000c6560000 by task kunit_try_catch/143 [ 30.332896] [ 30.333230] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.335178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.335883] Hardware name: linux,dummy-virt (DT) [ 30.336593] Call trace: [ 30.337068] show_stack+0x20/0x38 (C) [ 30.337731] dump_stack_lvl+0x8c/0xd0 [ 30.338356] print_report+0x118/0x5e0 [ 30.339118] kasan_report+0xc8/0x118 [ 30.339843] __asan_report_load1_noabort+0x20/0x30 [ 30.340514] page_alloc_uaf+0x328/0x350 [ 30.341317] kunit_try_run_case+0x14c/0x3d0 [ 30.342085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.343251] kthread+0x24c/0x2d0 [ 30.343932] ret_from_fork+0x10/0x20 [ 30.344562] [ 30.345053] The buggy address belongs to the physical page: [ 30.345952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 30.346986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.347793] page_type: f0(buddy) [ 30.348444] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000 [ 30.349479] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 30.350589] page dumped because: kasan: bad access detected [ 30.351100] [ 30.351336] Memory state around the buggy address: [ 30.352185] fff00000c655ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.353200] fff00000c655ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.354196] >fff00000c6560000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.355184] ^ [ 30.355817] fff00000c6560080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.356606] fff00000c6560100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.357371] ==================================================================
[ 24.352638] ================================================================== [ 24.354106] BUG: KASAN: use-after-free in page_alloc_uaf+0x358/0x3d0 [ 24.354749] Read of size 1 at addr ffff888102bf0000 by task kunit_try_catch/161 [ 24.355959] [ 24.356647] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.357476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.357974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.358921] Call Trace: [ 24.359922] <TASK> [ 24.360297] dump_stack_lvl+0x73/0xb0 [ 24.360776] print_report+0xd1/0x640 [ 24.361209] ? __virt_addr_valid+0x1db/0x2d0 [ 24.361890] ? kasan_addr_to_slab+0x11/0xa0 [ 24.362479] kasan_report+0x102/0x140 [ 24.362797] ? page_alloc_uaf+0x358/0x3d0 [ 24.363327] ? page_alloc_uaf+0x358/0x3d0 [ 24.364006] __asan_report_load1_noabort+0x18/0x20 [ 24.364575] page_alloc_uaf+0x358/0x3d0 [ 24.365535] ? __pfx_page_alloc_uaf+0x10/0x10 [ 24.366059] ? __schedule+0xc3e/0x2790 [ 24.366499] ? __pfx_read_tsc+0x10/0x10 [ 24.366995] ? ktime_get_ts64+0x84/0x230 [ 24.367942] kunit_try_run_case+0x1b3/0x490 [ 24.368265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.368568] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.369171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.369904] ? __kthread_parkme+0x82/0x160 [ 24.370466] ? preempt_count_sub+0x50/0x80 [ 24.370972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.372027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.372676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.373501] kthread+0x257/0x310 [ 24.373818] ? __pfx_kthread+0x10/0x10 [ 24.374262] ret_from_fork+0x41/0x80 [ 24.374923] ? __pfx_kthread+0x10/0x10 [ 24.375306] ret_from_fork_asm+0x1a/0x30 [ 24.375618] </TASK> [ 24.375825] [ 24.376182] The buggy address belongs to the physical page: [ 24.376725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bf0 [ 24.378417] flags: 0x200000000000000(node=0|zone=2) [ 24.378946] page_type: f0(buddy) [ 24.379284] raw: 0200000000000000 ffff88817fffb4a0 ffff88817fffb4a0 0000000000000000 [ 24.379669] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 24.380188] page dumped because: kasan: bad access detected [ 24.380534] [ 24.380874] Memory state around the buggy address: [ 24.381336] ffff888102beff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.381742] ffff888102beff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.382376] >ffff888102bf0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.383034] ^ [ 24.383506] ffff888102bf0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.384047] ffff888102bf0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 24.384551] ==================================================================
[ 19.549600] ================================================================== [ 19.550944] BUG: KASAN: use-after-free in page_alloc_uaf+0x358/0x3d0 [ 19.551956] Read of size 1 at addr ffff888102b00000 by task kunit_try_catch/161 [ 19.552658] [ 19.553336] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 19.554003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.554654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.555663] Call Trace: [ 19.556138] <TASK> [ 19.556672] dump_stack_lvl+0x73/0xb0 [ 19.557035] print_report+0xd1/0x640 [ 19.557460] ? __virt_addr_valid+0x1db/0x2d0 [ 19.557935] ? kasan_addr_to_slab+0x11/0xa0 [ 19.558377] kasan_report+0x102/0x140 [ 19.559821] ? page_alloc_uaf+0x358/0x3d0 [ 19.560437] ? page_alloc_uaf+0x358/0x3d0 [ 19.561102] __asan_report_load1_noabort+0x18/0x20 [ 19.561476] page_alloc_uaf+0x358/0x3d0 [ 19.562164] ? __pfx_page_alloc_uaf+0x10/0x10 [ 19.562524] ? __schedule+0xc3e/0x2790 [ 19.563354] ? __pfx_read_tsc+0x10/0x10 [ 19.563793] ? ktime_get_ts64+0x84/0x230 [ 19.564102] kunit_try_run_case+0x1b3/0x490 [ 19.564582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.565036] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.565478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.566401] ? __kthread_parkme+0x82/0x160 [ 19.566920] ? preempt_count_sub+0x50/0x80 [ 19.567804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.568327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.569101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.569500] kthread+0x257/0x310 [ 19.569964] ? __pfx_kthread+0x10/0x10 [ 19.570372] ret_from_fork+0x41/0x80 [ 19.570671] ? __pfx_kthread+0x10/0x10 [ 19.571091] ret_from_fork_asm+0x1a/0x30 [ 19.572037] </TASK> [ 19.572510] [ 19.573172] The buggy address belongs to the physical page: [ 19.574097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b00 [ 19.574755] flags: 0x200000000000000(node=0|zone=2) [ 19.575206] page_type: f0(buddy) [ 19.576148] raw: 0200000000000000 ffff88817fffd5c0 ffff88817fffd5c0 0000000000000000 [ 19.576792] raw: 0000000000000000 0000000000000008 00000000f0000000 0000000000000000 [ 19.577453] page dumped because: kasan: bad access detected [ 19.578118] [ 19.578356] Memory state around the buggy address: [ 19.578852] ffff888102afff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.579858] ffff888102afff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.580320] >ffff888102b00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.580983] ^ [ 19.581320] ffff888102b00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.582134] ffff888102b00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.582801] ==================================================================