Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.540124] ================================================================== [ 20.540753] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.541221] Read of size 1 at addr fff00000c6604000 by task kunit_try_catch/223 [ 20.541705] [ 20.541834] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.541961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.541997] Hardware name: linux,dummy-virt (DT) [ 20.542051] Call trace: [ 20.542083] show_stack+0x20/0x38 (C) [ 20.542150] dump_stack_lvl+0x8c/0xd0 [ 20.542276] print_report+0x118/0x608 [ 20.542337] kasan_report+0xdc/0x128 [ 20.542393] __asan_report_load1_noabort+0x20/0x30 [ 20.542449] mempool_uaf_helper+0x314/0x340 [ 20.542505] mempool_page_alloc_uaf+0xc0/0x118 [ 20.542561] kunit_try_run_case+0x170/0x3f0 [ 20.542621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.542674] kthread+0x318/0x620 [ 20.542723] ret_from_fork+0x10/0x20 [ 20.542775] [ 20.546711] The buggy address belongs to the physical page: [ 20.547053] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106604 [ 20.547498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.547887] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.548337] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.548778] page dumped because: kasan: bad access detected [ 20.549093] [ 20.549255] Memory state around the buggy address: [ 20.549454] fff00000c6603f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.549701] fff00000c6603f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.550365] >fff00000c6604000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.551458] ^ [ 20.551717] fff00000c6604080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.552133] fff00000c6604100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.552513] ================================================================== [ 20.478385] ================================================================== [ 20.478979] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.479448] Read of size 1 at addr fff00000c6698000 by task kunit_try_catch/219 [ 20.479653] [ 20.479761] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.479850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.479880] Hardware name: linux,dummy-virt (DT) [ 20.479916] Call trace: [ 20.479941] show_stack+0x20/0x38 (C) [ 20.479992] dump_stack_lvl+0x8c/0xd0 [ 20.480043] print_report+0x118/0x608 [ 20.480089] kasan_report+0xdc/0x128 [ 20.480135] __asan_report_load1_noabort+0x20/0x30 [ 20.480211] mempool_uaf_helper+0x314/0x340 [ 20.480258] mempool_kmalloc_large_uaf+0xc4/0x120 [ 20.480307] kunit_try_run_case+0x170/0x3f0 [ 20.480355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.480409] kthread+0x318/0x620 [ 20.480454] ret_from_fork+0x10/0x20 [ 20.480506] [ 20.484378] The buggy address belongs to the physical page: [ 20.484626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106698 [ 20.484930] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.486987] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.487473] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.487819] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.488321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.488796] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.489272] head: 0bfffe0000000002 ffffc1ffc319a601 ffffffffffffffff 0000000000000000 [ 20.489794] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.490323] page dumped because: kasan: bad access detected [ 20.490544] [ 20.490671] Memory state around the buggy address: [ 20.490854] fff00000c6697f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.491193] fff00000c6697f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.491516] >fff00000c6698000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.491816] ^ [ 20.491999] fff00000c6698080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.492779] fff00000c6698100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.493551] ==================================================================
[ 14.283880] ================================================================== [ 14.284764] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400 [ 14.286318] Read of size 1 at addr ffff888102898000 by task kunit_try_catch/241 [ 14.286836] [ 14.287241] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.287288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.287301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.287439] Call Trace: [ 14.287455] <TASK> [ 14.287472] dump_stack_lvl+0x73/0xb0 [ 14.287501] print_report+0xd1/0x650 [ 14.287521] ? __virt_addr_valid+0x1db/0x2d0 [ 14.287610] ? mempool_uaf_helper+0x394/0x400 [ 14.287637] ? kasan_addr_to_slab+0x11/0xa0 [ 14.287657] ? mempool_uaf_helper+0x394/0x400 [ 14.287691] kasan_report+0x140/0x180 [ 14.287711] ? mempool_uaf_helper+0x394/0x400 [ 14.287737] __asan_report_load1_noabort+0x18/0x20 [ 14.287760] mempool_uaf_helper+0x394/0x400 [ 14.287781] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.287806] ? finish_task_switch.isra.0+0x153/0x700 [ 14.287833] mempool_page_alloc_uaf+0xee/0x140 [ 14.287855] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 14.287881] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 14.287902] ? __pfx_mempool_free_pages+0x10/0x10 [ 14.287924] ? __pfx_read_tsc+0x10/0x10 [ 14.287946] ? ktime_get_ts64+0x86/0x230 [ 14.287971] kunit_try_run_case+0x1a6/0x480 [ 14.287993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.288023] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.288047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.288070] ? __kthread_parkme+0x82/0x160 [ 14.288092] ? preempt_count_sub+0x50/0x80 [ 14.288115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.288137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.288162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.288187] kthread+0x324/0x6e0 [ 14.288208] ? trace_preempt_on+0x20/0xc0 [ 14.288231] ? __pfx_kthread+0x10/0x10 [ 14.288253] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.288275] ? calculate_sigpending+0x7b/0xa0 [ 14.288297] ? __pfx_kthread+0x10/0x10 [ 14.288319] ret_from_fork+0x41/0x80 [ 14.288338] ? __pfx_kthread+0x10/0x10 [ 14.288359] ret_from_fork_asm+0x1a/0x30 [ 14.288389] </TASK> [ 14.288401] [ 14.303352] The buggy address belongs to the physical page: [ 14.303828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102898 [ 14.304244] flags: 0x200000000000000(node=0|zone=2) [ 14.304782] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 14.305479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.306105] page dumped because: kasan: bad access detected [ 14.306699] [ 14.306858] Memory state around the buggy address: [ 14.307365] ffff888102897f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.307835] ffff888102897f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.308067] >ffff888102898000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.308275] ^ [ 14.308391] ffff888102898080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.308713] ffff888102898100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.309392] ================================================================== [ 14.221706] ================================================================== [ 14.222197] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400 [ 14.222423] Read of size 1 at addr ffff888102898000 by task kunit_try_catch/237 [ 14.222926] [ 14.223141] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.223185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.223197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.223218] Call Trace: [ 14.223230] <TASK> [ 14.223247] dump_stack_lvl+0x73/0xb0 [ 14.223274] print_report+0xd1/0x650 [ 14.223295] ? __virt_addr_valid+0x1db/0x2d0 [ 14.223317] ? mempool_uaf_helper+0x394/0x400 [ 14.223338] ? kasan_addr_to_slab+0x11/0xa0 [ 14.223359] ? mempool_uaf_helper+0x394/0x400 [ 14.223382] kasan_report+0x140/0x180 [ 14.223403] ? mempool_uaf_helper+0x394/0x400 [ 14.223429] __asan_report_load1_noabort+0x18/0x20 [ 14.223452] mempool_uaf_helper+0x394/0x400 [ 14.223473] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 14.223498] ? finish_task_switch.isra.0+0x153/0x700 [ 14.223526] mempool_kmalloc_large_uaf+0xf0/0x140 [ 14.223556] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 14.223580] ? __pfx_mempool_kmalloc+0x10/0x10 [ 14.223600] ? __pfx_mempool_kfree+0x10/0x10 [ 14.223622] ? __pfx_read_tsc+0x10/0x10 [ 14.223643] ? ktime_get_ts64+0x86/0x230 [ 14.223668] kunit_try_run_case+0x1a6/0x480 [ 14.223691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.223711] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.223736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.223759] ? __kthread_parkme+0x82/0x160 [ 14.223781] ? preempt_count_sub+0x50/0x80 [ 14.223805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.223827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.223853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.223879] kthread+0x324/0x6e0 [ 14.223899] ? trace_preempt_on+0x20/0xc0 [ 14.223923] ? __pfx_kthread+0x10/0x10 [ 14.223944] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.223966] ? calculate_sigpending+0x7b/0xa0 [ 14.223987] ? __pfx_kthread+0x10/0x10 [ 14.224009] ret_from_fork+0x41/0x80 [ 14.224037] ? __pfx_kthread+0x10/0x10 [ 14.224058] ret_from_fork_asm+0x1a/0x30 [ 14.224089] </TASK> [ 14.224099] [ 14.236594] The buggy address belongs to the physical page: [ 14.237153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102898 [ 14.237906] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.238153] flags: 0x200000000000040(head|node=0|zone=2) [ 14.238342] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.238618] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.239294] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 14.240067] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.240809] head: 0200000000000002 ffffea00040a2601 ffffffffffffffff 0000000000000000 [ 14.241478] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 14.242253] page dumped because: kasan: bad access detected [ 14.242824] [ 14.242904] Memory state around the buggy address: [ 14.243073] ffff888102897f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.243288] ffff888102897f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.243506] >ffff888102898000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.243749] ^ [ 14.243929] ffff888102898080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.244244] ffff888102898100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.244478] ==================================================================