Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.632205] ================================================================== [ 21.632820] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 [ 21.633264] Read of size 1 at addr fff00000c5d36e00 by task kunit_try_catch/214 [ 21.633639] [ 21.633843] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.633955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.633990] Hardware name: linux,dummy-virt (DT) [ 21.634030] Call trace: [ 21.634058] dump_backtrace+0x9c/0x128 [ 21.634116] show_stack+0x20/0x38 [ 21.634158] dump_stack_lvl+0x8c/0xd0 [ 21.634207] print_report+0x118/0x5f0 [ 21.634269] kasan_report+0xdc/0x128 [ 21.634316] __asan_report_load1_noabort+0x20/0x30 [ 21.634366] mempool_uaf_helper+0x320/0x348 [ 21.634412] mempool_kmalloc_uaf+0xc4/0x120 [ 21.634460] kunit_try_run_case+0x170/0x3f0 [ 21.634506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.634556] kthread+0x24c/0x2d0 [ 21.634599] ret_from_fork+0x10/0x20 [ 21.634645] [ 21.638012] Allocated by task 214: [ 21.638273] kasan_save_stack+0x3c/0x68 [ 21.638647] kasan_save_track+0x20/0x40 [ 21.638928] kasan_save_alloc_info+0x40/0x58 [ 21.639490] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.639796] remove_element+0x130/0x1f8 [ 21.640383] mempool_alloc_preallocated+0x58/0xc0 [ 21.640645] mempool_uaf_helper+0xa4/0x348 [ 21.640864] mempool_kmalloc_uaf+0xc4/0x120 [ 21.641039] kunit_try_run_case+0x170/0x3f0 [ 21.641424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.641752] kthread+0x24c/0x2d0 [ 21.641989] ret_from_fork+0x10/0x20 [ 21.642147] [ 21.642353] Freed by task 214: [ 21.642612] kasan_save_stack+0x3c/0x68 [ 21.642914] kasan_save_track+0x20/0x40 [ 21.643082] kasan_save_free_info+0x4c/0x78 [ 21.643587] __kasan_mempool_poison_object+0xc0/0x150 [ 21.644012] mempool_free+0x28c/0x328 [ 21.644296] mempool_uaf_helper+0x108/0x348 [ 21.644610] mempool_kmalloc_uaf+0xc4/0x120 [ 21.644825] kunit_try_run_case+0x170/0x3f0 [ 21.644998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.645264] kthread+0x24c/0x2d0 [ 21.645586] ret_from_fork+0x10/0x20 [ 21.645909] [ 21.646086] The buggy address belongs to the object at fff00000c5d36e00 [ 21.646086] which belongs to the cache kmalloc-128 of size 128 [ 21.646625] The buggy address is located 0 bytes inside of [ 21.646625] freed 128-byte region [fff00000c5d36e00, fff00000c5d36e80) [ 21.647559] [ 21.647754] The buggy address belongs to the physical page: [ 21.647959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d36 [ 21.648627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.649013] page_type: f5(slab) [ 21.649362] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.649695] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.650215] page dumped because: kasan: bad access detected [ 21.650499] [ 21.650697] Memory state around the buggy address: [ 21.650954] fff00000c5d36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.651376] fff00000c5d36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.652052] >fff00000c5d36e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.652559] ^ [ 21.652816] fff00000c5d36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.653141] fff00000c5d36f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.653391] ================================================================== [ 21.683917] ================================================================== [ 21.684610] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 [ 21.685080] Read of size 1 at addr fff00000c6d00240 by task kunit_try_catch/218 [ 21.685608] [ 21.685740] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.685847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.685881] Hardware name: linux,dummy-virt (DT) [ 21.685920] Call trace: [ 21.685946] dump_backtrace+0x9c/0x128 [ 21.686001] show_stack+0x20/0x38 [ 21.686044] dump_stack_lvl+0x8c/0xd0 [ 21.686094] print_report+0x118/0x5f0 [ 21.686137] kasan_report+0xdc/0x128 [ 21.686177] __asan_report_load1_noabort+0x20/0x30 [ 21.686225] mempool_uaf_helper+0x320/0x348 [ 21.686288] mempool_slab_uaf+0xc0/0x118 [ 21.686333] kunit_try_run_case+0x170/0x3f0 [ 21.686381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.686433] kthread+0x24c/0x2d0 [ 21.686477] ret_from_fork+0x10/0x20 [ 21.686525] [ 21.690959] Allocated by task 218: [ 21.693149] kasan_save_stack+0x3c/0x68 [ 21.693987] kasan_save_track+0x20/0x40 [ 21.694694] kasan_save_alloc_info+0x40/0x58 [ 21.695647] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.695885] remove_element+0x16c/0x1f8 [ 21.696069] mempool_alloc_preallocated+0x58/0xc0 [ 21.696311] mempool_uaf_helper+0xa4/0x348 [ 21.696493] mempool_slab_uaf+0xc0/0x118 [ 21.696667] kunit_try_run_case+0x170/0x3f0 [ 21.696846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.697053] kthread+0x24c/0x2d0 [ 21.697208] ret_from_fork+0x10/0x20 [ 21.698323] [ 21.698503] Freed by task 218: [ 21.698790] kasan_save_stack+0x3c/0x68 [ 21.699284] kasan_save_track+0x20/0x40 [ 21.699535] kasan_save_free_info+0x4c/0x78 [ 21.700288] __kasan_mempool_poison_object+0xc0/0x150 [ 21.700584] mempool_free+0x28c/0x328 [ 21.700962] mempool_uaf_helper+0x108/0x348 [ 21.701226] mempool_slab_uaf+0xc0/0x118 [ 21.701549] kunit_try_run_case+0x170/0x3f0 [ 21.701760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.702097] kthread+0x24c/0x2d0 [ 21.702440] ret_from_fork+0x10/0x20 [ 21.702719] [ 21.702874] The buggy address belongs to the object at fff00000c6d00240 [ 21.702874] which belongs to the cache test_cache of size 123 [ 21.704016] The buggy address is located 0 bytes inside of [ 21.704016] freed 123-byte region [fff00000c6d00240, fff00000c6d002bb) [ 21.704865] [ 21.705083] The buggy address belongs to the physical page: [ 21.705362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d00 [ 21.705921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.706363] page_type: f5(slab) [ 21.706669] raw: 0bfffe0000000000 fff00000c6cca000 dead000000000122 0000000000000000 [ 21.707386] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 21.707879] page dumped because: kasan: bad access detected [ 21.708226] [ 21.708423] Memory state around the buggy address: [ 21.708683] fff00000c6d00100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.709154] fff00000c6d00180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.709894] >fff00000c6d00200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 21.710326] ^ [ 21.710614] fff00000c6d00280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.711005] fff00000c6d00300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.711615] ==================================================================
[ 13.633048] ================================================================== [ 13.633568] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400 [ 13.634236] Read of size 1 at addr ffff88810262b700 by task kunit_try_catch/232 [ 13.634584] [ 13.634802] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.634936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.634976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.635017] Call Trace: [ 13.635067] <TASK> [ 13.635102] dump_stack_lvl+0x73/0xb0 [ 13.635212] print_report+0xd1/0x640 [ 13.635261] ? __virt_addr_valid+0x1db/0x2d0 [ 13.635310] ? mempool_uaf_helper+0x394/0x400 [ 13.635346] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.635386] ? mempool_uaf_helper+0x394/0x400 [ 13.635416] kasan_report+0x140/0x180 [ 13.635440] ? mempool_uaf_helper+0x394/0x400 [ 13.635462] __asan_report_load1_noabort+0x18/0x20 [ 13.635482] mempool_uaf_helper+0x394/0x400 [ 13.635500] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 13.635522] ? finish_task_switch.isra.0+0x153/0x700 [ 13.635552] mempool_kmalloc_uaf+0xf0/0x140 [ 13.635581] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 13.635612] ? __pfx_mempool_kmalloc+0x10/0x10 [ 13.635631] ? __pfx_mempool_kfree+0x10/0x10 [ 13.635651] ? __pfx_read_tsc+0x10/0x10 [ 13.635691] ? ktime_get_ts64+0x84/0x230 [ 13.635718] kunit_try_run_case+0x1a6/0x480 [ 13.635741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.635759] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.635780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.635803] ? __kthread_parkme+0x82/0x160 [ 13.635822] ? preempt_count_sub+0x50/0x80 [ 13.635842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.635860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.635883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.635906] kthread+0x257/0x310 [ 13.635923] ? __pfx_kthread+0x10/0x10 [ 13.635941] ret_from_fork+0x41/0x80 [ 13.635959] ? __pfx_kthread+0x10/0x10 [ 13.635976] ret_from_fork_asm+0x1a/0x30 [ 13.636005] </TASK> [ 13.636017] [ 13.645307] Allocated by task 232: [ 13.645609] kasan_save_stack+0x45/0x70 [ 13.645847] kasan_save_track+0x18/0x40 [ 13.646188] kasan_save_alloc_info+0x3b/0x50 [ 13.646374] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 13.646629] remove_element+0x11e/0x190 [ 13.646964] mempool_alloc_preallocated+0x4d/0x90 [ 13.647342] mempool_uaf_helper+0x97/0x400 [ 13.647570] mempool_kmalloc_uaf+0xf0/0x140 [ 13.647897] kunit_try_run_case+0x1a6/0x480 [ 13.648240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.648465] kthread+0x257/0x310 [ 13.648748] ret_from_fork+0x41/0x80 [ 13.648942] ret_from_fork_asm+0x1a/0x30 [ 13.649193] [ 13.649363] Freed by task 232: [ 13.649610] kasan_save_stack+0x45/0x70 [ 13.649902] kasan_save_track+0x18/0x40 [ 13.650115] kasan_save_free_info+0x3f/0x60 [ 13.650376] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.650780] mempool_free+0x2ec/0x380 [ 13.651111] mempool_uaf_helper+0x11b/0x400 [ 13.651416] mempool_kmalloc_uaf+0xf0/0x140 [ 13.651589] kunit_try_run_case+0x1a6/0x480 [ 13.651771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.652153] kthread+0x257/0x310 [ 13.652449] ret_from_fork+0x41/0x80 [ 13.652731] ret_from_fork_asm+0x1a/0x30 [ 13.653044] [ 13.653211] The buggy address belongs to the object at ffff88810262b700 [ 13.653211] which belongs to the cache kmalloc-128 of size 128 [ 13.653786] The buggy address is located 0 bytes inside of [ 13.653786] freed 128-byte region [ffff88810262b700, ffff88810262b780) [ 13.654254] [ 13.654409] The buggy address belongs to the physical page: [ 13.654808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262b [ 13.655375] flags: 0x200000000000000(node=0|zone=2) [ 13.655756] page_type: f5(slab) [ 13.655933] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 13.656386] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 13.656806] page dumped because: kasan: bad access detected [ 13.657192] [ 13.657358] Memory state around the buggy address: [ 13.657562] ffff88810262b600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.658526] ffff88810262b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.658797] >ffff88810262b700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.659233] ^ [ 13.659504] ffff88810262b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.659967] ffff88810262b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.660401] ================================================================== [ 13.699318] ================================================================== [ 13.699842] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400 [ 13.700514] Read of size 1 at addr ffff888102631240 by task kunit_try_catch/236 [ 13.700839] [ 13.700963] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 13.701015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.701027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.701049] Call Trace: [ 13.701068] <TASK> [ 13.701392] dump_stack_lvl+0x73/0xb0 [ 13.701480] print_report+0xd1/0x640 [ 13.701523] ? __virt_addr_valid+0x1db/0x2d0 [ 13.701568] ? mempool_uaf_helper+0x394/0x400 [ 13.701604] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.701645] ? mempool_uaf_helper+0x394/0x400 [ 13.701697] kasan_report+0x140/0x180 [ 13.701739] ? mempool_uaf_helper+0x394/0x400 [ 13.701780] __asan_report_load1_noabort+0x18/0x20 [ 13.701819] mempool_uaf_helper+0x394/0x400 [ 13.701857] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 13.701922] ? finish_task_switch.isra.0+0x153/0x700 [ 13.701986] mempool_slab_uaf+0xeb/0x140 [ 13.702027] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 13.702067] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 13.702107] ? __pfx_mempool_free_slab+0x10/0x10 [ 13.702183] ? __pfx_read_tsc+0x10/0x10 [ 13.702227] ? ktime_get_ts64+0x84/0x230 [ 13.702279] kunit_try_run_case+0x1a6/0x480 [ 13.702307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702328] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 13.702350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.702375] ? __kthread_parkme+0x82/0x160 [ 13.702396] ? preempt_count_sub+0x50/0x80 [ 13.702418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.702462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.702487] kthread+0x257/0x310 [ 13.702505] ? __pfx_kthread+0x10/0x10 [ 13.702524] ret_from_fork+0x41/0x80 [ 13.702544] ? __pfx_kthread+0x10/0x10 [ 13.702562] ret_from_fork_asm+0x1a/0x30 [ 13.702593] </TASK> [ 13.702605] [ 13.712427] Allocated by task 236: [ 13.712785] kasan_save_stack+0x45/0x70 [ 13.713132] kasan_save_track+0x18/0x40 [ 13.713426] kasan_save_alloc_info+0x3b/0x50 [ 13.713605] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 13.713814] remove_element+0x11e/0x190 [ 13.713988] mempool_alloc_preallocated+0x4d/0x90 [ 13.714600] mempool_uaf_helper+0x97/0x400 [ 13.714981] mempool_slab_uaf+0xeb/0x140 [ 13.715367] kunit_try_run_case+0x1a6/0x480 [ 13.715699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.716195] kthread+0x257/0x310 [ 13.716472] ret_from_fork+0x41/0x80 [ 13.716711] ret_from_fork_asm+0x1a/0x30 [ 13.717107] [ 13.717270] Freed by task 236: [ 13.717569] kasan_save_stack+0x45/0x70 [ 13.717887] kasan_save_track+0x18/0x40 [ 13.718115] kasan_save_free_info+0x3f/0x60 [ 13.718300] __kasan_mempool_poison_object+0x131/0x1d0 [ 13.718820] mempool_free+0x2ec/0x380 [ 13.719165] mempool_uaf_helper+0x11b/0x400 [ 13.719536] mempool_slab_uaf+0xeb/0x140 [ 13.719848] kunit_try_run_case+0x1a6/0x480 [ 13.720237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.720669] kthread+0x257/0x310 [ 13.720828] ret_from_fork+0x41/0x80 [ 13.721182] ret_from_fork_asm+0x1a/0x30 [ 13.721510] [ 13.721674] The buggy address belongs to the object at ffff888102631240 [ 13.721674] which belongs to the cache test_cache of size 123 [ 13.722406] The buggy address is located 0 bytes inside of [ 13.722406] freed 123-byte region [ffff888102631240, ffff8881026312bb) [ 13.723278] [ 13.723444] The buggy address belongs to the physical page: [ 13.723688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102631 [ 13.724388] flags: 0x200000000000000(node=0|zone=2) [ 13.724616] page_type: f5(slab) [ 13.724848] raw: 0200000000000000 ffff888102621640 dead000000000122 0000000000000000 [ 13.725439] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 13.725872] page dumped because: kasan: bad access detected [ 13.726328] [ 13.726486] Memory state around the buggy address: [ 13.726841] ffff888102631100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.727388] ffff888102631180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.727876] >ffff888102631200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 13.728381] ^ [ 13.728635] ffff888102631280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.729184] ffff888102631300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.729597] ==================================================================