Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 104.987162] ================================================================== [ 104.988666] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x210 [ 104.989227] Read of size 1 at addr ffff0000c6860000 by task kunit_try_catch/211 [ 104.990077] [ 104.990299] CPU: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 104.991078] Hardware name: linux,dummy-virt (DT) [ 104.991525] Call trace: [ 104.991873] dump_backtrace+0xe0/0x134 [ 104.992365] show_stack+0x20/0x2c [ 104.992834] dump_stack_lvl+0x88/0xb4 [ 104.993395] print_report+0x158/0x44c [ 104.993923] kasan_report+0xc8/0x180 [ 104.994392] __asan_load1+0x68/0x74 [ 104.994768] pagealloc_uaf+0xd4/0x210 [ 104.995267] kunit_try_run_case+0x8c/0x124 [ 104.995735] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 104.996291] kthread+0x15c/0x170 [ 104.996797] ret_from_fork+0x10/0x20 [ 104.997347] [ 104.997563] The buggy address belongs to the physical page: [ 104.998072] page:0000000051b64075 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x106860 [ 104.998905] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 104.999582] raw: 0bfffc0000000000 ffff0000ff5faa08 ffff0000ff5faa08 0000000000000000 [ 105.000225] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000 [ 105.001051] page dumped because: kasan: bad access detected [ 105.001547] [ 105.001782] Memory state around the buggy address: [ 105.002233] ffff0000c685ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 105.002869] ffff0000c685ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 105.003494] >ffff0000c6860000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 105.004105] ^ [ 105.004448] ffff0000c6860080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 105.005088] ffff0000c6860100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 105.005680] ==================================================================
[ 74.771656] ================================================================== [ 74.772849] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134 [ 74.773613] Read of size 1 at addr ffff0000c5a80000 by task kunit_try_catch/127 [ 74.774359] [ 74.774638] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.775365] Hardware name: linux,dummy-virt (DT) [ 74.775830] Call trace: [ 74.776124] dump_backtrace+0xf8/0x118 [ 74.776694] show_stack+0x18/0x24 [ 74.777261] __dump_stack+0x28/0x38 [ 74.777733] dump_stack_lvl+0x54/0x6c [ 74.778229] print_address_description+0x7c/0x1ec [ 74.778835] print_report+0x50/0x68 [ 74.779344] kasan_report+0xac/0x100 [ 74.779872] __asan_load1+0x6c/0x70 [ 74.780393] pagealloc_uaf+0x90/0x134 [ 74.780964] kunit_try_run_case+0x80/0x184 [ 74.781438] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.782044] kthread+0x16c/0x21c [ 74.782545] ret_from_fork+0x10/0x20 [ 74.783014] [ 74.783256] The buggy address belongs to the physical page: [ 74.783796] page:000000003f79304c refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 74.784670] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.785552] raw: 0bfffc0000000000 ffff0000ff7f4ad8 ffff0000ff7f4ad8 0000000000000000 [ 74.786332] raw: 0000000000000000 0000000000000007 00000000ffffff7f 0000000000000000 [ 74.786947] page dumped because: kasan: bad access detected [ 74.787382] [ 74.787574] Memory state around the buggy address: [ 74.787998] ffff0000c5a7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.788700] ffff0000c5a7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.789479] >ffff0000c5a80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.790133] ^ [ 74.790552] ffff0000c5a80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.791220] ffff0000c5a80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.791861] ==================================================================
[ 73.770390] ================================================================== [ 73.771629] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134 [ 73.773529] Read of size 1 at addr ffff0000c5a20000 by task kunit_try_catch/127 [ 73.774954] [ 73.775471] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.776891] Hardware name: linux,dummy-virt (DT) [ 73.777253] Call trace: [ 73.777493] dump_backtrace+0xf4/0x114 [ 73.778422] show_stack+0x18/0x24 [ 73.779255] __dump_stack+0x28/0x38 [ 73.780317] dump_stack_lvl+0x50/0x68 [ 73.781056] print_address_description+0x7c/0x1ec [ 73.782038] print_report+0x50/0x68 [ 73.782878] kasan_report+0xac/0xfc [ 73.783717] __asan_load1+0x6c/0x70 [ 73.784584] pagealloc_uaf+0x90/0x134 [ 73.785433] kunit_try_run_case+0x80/0x184 [ 73.786348] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.787384] kthread+0x16c/0x21c [ 73.788254] ret_from_fork+0x10/0x20 [ 73.788937] [ 73.789132] The buggy address belongs to the physical page: [ 73.789515] page:00000000ef861166 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a20 [ 73.791106] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 73.792559] raw: 0bfffc0000000000 ffff0000ff7f4a08 ffff0000ff7f4a08 0000000000000000 [ 73.793706] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000 [ 73.794921] page dumped because: kasan: bad access detected [ 73.795885] [ 73.796445] Memory state around the buggy address: [ 73.797163] ffff0000c5a1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.797671] ffff0000c5a1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.798952] >ffff0000c5a20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.800231] ^ [ 73.800974] ffff0000c5a20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.802164] ffff0000c5a20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.803006] ==================================================================
[ 72.388821] ================================================================== [ 72.390690] BUG: KASAN: use-after-free in pagealloc_uaf+0xcc/0x200 [ 72.391692] Read of size 1 at addr ffff0000c5a50000 by task kunit_try_catch/127 [ 72.392645] [ 72.392965] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.394041] Hardware name: linux,dummy-virt (DT) [ 72.394552] Call trace: [ 72.394774] dump_backtrace.part.0+0xdc/0xf0 [ 72.395193] show_stack+0x18/0x30 [ 72.395683] dump_stack_lvl+0x64/0x80 [ 72.396182] print_report+0x158/0x438 [ 72.396660] kasan_report+0xb4/0xf4 [ 72.397107] __asan_load1+0x68/0x74 [ 72.397549] pagealloc_uaf+0xcc/0x200 [ 72.398031] kunit_try_run_case+0x84/0x120 [ 72.399049] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.399646] kthread+0x180/0x190 [ 72.400084] ret_from_fork+0x10/0x20 [ 72.400562] [ 72.400793] The buggy address belongs to the physical page: [ 72.401259] page:000000004d85e480 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a50 [ 72.402225] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 72.403030] raw: 0bfffc0000000000 ffff0000ff7f59a0 ffff0000ff7f59a0 0000000000000000 [ 72.403590] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 72.404043] page dumped because: kasan: bad access detected [ 72.404389] [ 72.404564] Memory state around the buggy address: [ 72.404918] ffff0000c5a4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.405621] ffff0000c5a4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.406783] >ffff0000c5a50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.407416] ^ [ 72.407706] ffff0000c5a50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.408161] ffff0000c5a50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.408722] ==================================================================
[ 64.088287] ================================================================== [ 64.090000] BUG: KASAN: use-after-free in pagealloc_uaf+0xe8/0x208 [ 64.090917] Read of size 1 at addr ffff0000c59b0000 by task kunit_try_catch/125 [ 64.091715] [ 64.091892] CPU: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.092665] Hardware name: linux,dummy-virt (DT) [ 64.093248] Call trace: [ 64.093672] dump_backtrace+0x110/0x120 [ 64.094387] show_stack+0x18/0x28 [ 64.094922] dump_stack_lvl+0x68/0x84 [ 64.095503] print_report+0x158/0x484 [ 64.096040] kasan_report+0x98/0xe0 [ 64.096564] __asan_load1+0x68/0x78 [ 64.097089] pagealloc_uaf+0xe8/0x208 [ 64.097745] kunit_try_run_case+0x7c/0x120 [ 64.098398] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.099116] kthread+0x1a4/0x1b8 [ 64.099429] ret_from_fork+0x10/0x20 [ 64.099742] [ 64.099902] The buggy address belongs to the physical page: [ 64.100244] page:0000000052409ff8 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1059b0 [ 64.100781] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 64.101260] raw: 0bfffc0000000000 ffff0000ff7f59a0 ffff0000ff7f59a0 0000000000000000 [ 64.102249] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 64.103292] page dumped because: kasan: bad access detected [ 64.103945] [ 64.104214] Memory state around the buggy address: [ 64.104825] ffff0000c59aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.105744] ffff0000c59aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.106680] >ffff0000c59b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.107544] ^ [ 64.107999] ffff0000c59b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.108840] ffff0000c59b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.109763] ==================================================================
[ 30.401686] ================================================================== [ 30.402533] BUG: KASAN: use-after-free in pagealloc_uaf+0xe7/0x1e0 [ 30.402962] Read of size 1 at addr ffff888103730000 by task kunit_try_catch/231 [ 30.403333] [ 30.403438] CPU: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 30.404192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.404601] Call Trace: [ 30.404729] <TASK> [ 30.404850] dump_stack_lvl+0x49/0x62 [ 30.405053] print_report+0x189/0x492 [ 30.405260] ? kasan_addr_to_slab+0xd/0xb0 [ 30.405458] ? pagealloc_uaf+0xe7/0x1e0 [ 30.405640] kasan_report+0x10c/0x190 [ 30.405824] ? pagealloc_uaf+0xe7/0x1e0 [ 30.406012] __asan_load1+0x62/0x70 [ 30.406183] pagealloc_uaf+0xe7/0x1e0 [ 30.407556] ? krealloc_more_oob+0x20/0x20 [ 30.408460] ? __kunit_add_resource+0xd1/0x100 [ 30.409017] ? kasan_test_init+0x13e/0x1b0 [ 30.410552] kunit_try_run_case+0x8f/0xd0 [ 30.411609] ? kunit_catch_run_case+0x80/0x80 [ 30.412566] ? kunit_try_catch_throw+0x40/0x40 [ 30.412797] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 30.413044] kthread+0x17b/0x1b0 [ 30.413318] ? kthread_complete_and_exit+0x30/0x30 [ 30.413922] ret_from_fork+0x22/0x30 [ 30.414199] </TASK> [ 30.414718] [ 30.414844] The buggy address belongs to the physical page: [ 30.415143] page:(____ptrval____) refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x103730 [ 30.415589] flags: 0x200000000000000(node=0|zone=2) [ 30.415942] raw: 0200000000000000 ffff88817fffab60 ffff88817fffab60 0000000000000000 [ 30.416401] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 30.416749] page dumped because: kasan: bad access detected [ 30.416989] [ 30.417100] Memory state around the buggy address: [ 30.417440] ffff88810372ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.417768] ffff88810372ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.418058] >ffff888103730000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.418493] ^ [ 30.418679] ffff888103730080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.419000] ffff888103730100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.419649] ==================================================================