Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 34.737221] ================================================================== [ 34.746745] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.753425] Read of size 1 at addr ffff000803244000 by task kunit_try_catch/276 [ 34.760716] [ 34.762203] CPU: 6 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 34.762252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.762269] Hardware name: WinLink E850-96 board (DT) [ 34.762291] Call trace: [ 34.762306] show_stack+0x20/0x38 (C) [ 34.762340] dump_stack_lvl+0x8c/0xd0 [ 34.762375] print_report+0x118/0x608 [ 34.762404] kasan_report+0xdc/0x128 [ 34.762432] __asan_report_load1_noabort+0x20/0x30 [ 34.762466] mempool_uaf_helper+0x314/0x340 [ 34.762500] mempool_kmalloc_large_uaf+0xc4/0x120 [ 34.762537] kunit_try_run_case+0x170/0x3f0 [ 34.762574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.762613] kthread+0x328/0x630 [ 34.762647] ret_from_fork+0x10/0x20 [ 34.762682] [ 34.829730] The buggy address belongs to the physical page: [ 34.835286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883244 [ 34.843271] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.850910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.857850] page_type: f8(unknown) [ 34.861248] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.868968] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.876694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.884505] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 34.892318] head: 0bfffe0000000002 fffffdffe00c9101 00000000ffffffff 00000000ffffffff [ 34.900130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.907936] page dumped because: kasan: bad access detected [ 34.913492] [ 34.914967] Memory state around the buggy address: [ 34.919748] ffff000803243f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.926950] ffff000803243f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.934156] >ffff000803244000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.941356] ^ [ 34.944571] ffff000803244080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.951775] ffff000803244100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.958979] ================================================================== [ 35.297251] ================================================================== [ 35.300729] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.307412] Read of size 1 at addr ffff000803270000 by task kunit_try_catch/280 [ 35.314702] [ 35.316188] CPU: 7 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 35.316243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.316256] Hardware name: WinLink E850-96 board (DT) [ 35.316277] Call trace: [ 35.316293] show_stack+0x20/0x38 (C) [ 35.316331] dump_stack_lvl+0x8c/0xd0 [ 35.316362] print_report+0x118/0x608 [ 35.316394] kasan_report+0xdc/0x128 [ 35.316426] __asan_report_load1_noabort+0x20/0x30 [ 35.316460] mempool_uaf_helper+0x314/0x340 [ 35.316491] mempool_page_alloc_uaf+0xc0/0x118 [ 35.316523] kunit_try_run_case+0x170/0x3f0 [ 35.316560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.316599] kthread+0x328/0x630 [ 35.316634] ret_from_fork+0x10/0x20 [ 35.316670] [ 35.383455] The buggy address belongs to the physical page: [ 35.389011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883270 [ 35.396995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.403518] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.411234] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.418954] page dumped because: kasan: bad access detected [ 35.424508] [ 35.425984] Memory state around the buggy address: [ 35.430766] ffff00080326ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.437967] ffff00080326ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.445171] >ffff000803270000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.452373] ^ [ 35.455588] ffff000803270080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.462793] ffff000803270100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.469996] ==================================================================
[ 20.532863] ================================================================== [ 20.532927] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.533028] Read of size 1 at addr fff00000c65c0000 by task kunit_try_catch/236 [ 20.533085] [ 20.533124] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.533214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.533272] Hardware name: linux,dummy-virt (DT) [ 20.533305] Call trace: [ 20.533329] show_stack+0x20/0x38 (C) [ 20.533397] dump_stack_lvl+0x8c/0xd0 [ 20.533447] print_report+0x118/0x608 [ 20.533494] kasan_report+0xdc/0x128 [ 20.533547] __asan_report_load1_noabort+0x20/0x30 [ 20.533599] mempool_uaf_helper+0x314/0x340 [ 20.533702] mempool_page_alloc_uaf+0xc0/0x118 [ 20.533827] kunit_try_run_case+0x170/0x3f0 [ 20.533997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.534087] kthread+0x328/0x630 [ 20.534196] ret_from_fork+0x10/0x20 [ 20.534246] [ 20.534269] The buggy address belongs to the physical page: [ 20.534574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 20.534631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.534696] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.534789] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.534880] page dumped because: kasan: bad access detected [ 20.534945] [ 20.534964] Memory state around the buggy address: [ 20.535019] fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.535103] fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.535241] >fff00000c65c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.535358] ^ [ 20.535422] fff00000c65c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.535478] fff00000c65c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.535829] ================================================================== [ 20.497502] ================================================================== [ 20.497585] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.497648] Read of size 1 at addr fff00000c65c0000 by task kunit_try_catch/232 [ 20.497697] [ 20.497730] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.497866] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.497964] Hardware name: linux,dummy-virt (DT) [ 20.497998] Call trace: [ 20.498070] show_stack+0x20/0x38 (C) [ 20.498217] dump_stack_lvl+0x8c/0xd0 [ 20.498395] print_report+0x118/0x608 [ 20.498495] kasan_report+0xdc/0x128 [ 20.498641] __asan_report_load1_noabort+0x20/0x30 [ 20.498754] mempool_uaf_helper+0x314/0x340 [ 20.498807] mempool_kmalloc_large_uaf+0xc4/0x120 [ 20.499006] kunit_try_run_case+0x170/0x3f0 [ 20.499065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.499123] kthread+0x328/0x630 [ 20.499255] ret_from_fork+0x10/0x20 [ 20.499425] [ 20.499505] The buggy address belongs to the physical page: [ 20.499625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 20.499711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.499839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.499957] page_type: f8(unknown) [ 20.500103] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.500221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.500306] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.500386] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.500496] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 20.500690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.500731] page dumped because: kasan: bad access detected [ 20.500778] [ 20.500893] Memory state around the buggy address: [ 20.500984] fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.501065] fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.501196] >fff00000c65c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.501302] ^ [ 20.501390] fff00000c65c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.501469] fff00000c65c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.501569] ==================================================================
[ 18.401137] ================================================================== [ 18.401988] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 18.402554] Read of size 1 at addr ffff888102a98000 by task kunit_try_catch/250 [ 18.403521] [ 18.403713] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.403825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.403852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.403896] Call Trace: [ 18.403924] <TASK> [ 18.403964] dump_stack_lvl+0x73/0xb0 [ 18.404036] print_report+0xd1/0x650 [ 18.404082] ? __virt_addr_valid+0x1db/0x2d0 [ 18.404129] ? mempool_uaf_helper+0x392/0x400 [ 18.404167] ? kasan_addr_to_slab+0x11/0xa0 [ 18.404207] ? mempool_uaf_helper+0x392/0x400 [ 18.404254] kasan_report+0x141/0x180 [ 18.404343] ? mempool_uaf_helper+0x392/0x400 [ 18.404470] __asan_report_load1_noabort+0x18/0x20 [ 18.404533] mempool_uaf_helper+0x392/0x400 [ 18.404588] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 18.404641] ? dequeue_entities+0x852/0x1740 [ 18.405045] ? finish_task_switch.isra.0+0x153/0x700 [ 18.405147] mempool_kmalloc_large_uaf+0xef/0x140 [ 18.405198] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 18.405241] ? dequeue_task_fair+0x166/0x4e0 [ 18.405311] ? __pfx_mempool_kmalloc+0x10/0x10 [ 18.405357] ? __pfx_mempool_kfree+0x10/0x10 [ 18.405398] ? __pfx_read_tsc+0x10/0x10 [ 18.405424] ? ktime_get_ts64+0x86/0x230 [ 18.405457] kunit_try_run_case+0x1a5/0x480 [ 18.405488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.405513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.405542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.405569] ? __kthread_parkme+0x82/0x180 [ 18.405596] ? preempt_count_sub+0x50/0x80 [ 18.405624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.405652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.405678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.405704] kthread+0x337/0x6f0 [ 18.405724] ? trace_preempt_on+0x20/0xc0 [ 18.405776] ? __pfx_kthread+0x10/0x10 [ 18.405800] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.405825] ? calculate_sigpending+0x7b/0xa0 [ 18.405852] ? __pfx_kthread+0x10/0x10 [ 18.405873] ret_from_fork+0x41/0x80 [ 18.405900] ? __pfx_kthread+0x10/0x10 [ 18.405921] ret_from_fork_asm+0x1a/0x30 [ 18.405959] </TASK> [ 18.405974] [ 18.421666] The buggy address belongs to the physical page: [ 18.422134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a98 [ 18.422961] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.423640] flags: 0x200000000000040(head|node=0|zone=2) [ 18.423987] page_type: f8(unknown) [ 18.424346] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.425510] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.425979] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.426803] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 18.427330] head: 0200000000000002 ffffea00040aa601 00000000ffffffff 00000000ffffffff [ 18.427775] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 18.428475] page dumped because: kasan: bad access detected [ 18.428807] [ 18.428996] Memory state around the buggy address: [ 18.429426] ffff888102a97f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.430192] ffff888102a97f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.430510] >ffff888102a98000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.431125] ^ [ 18.431340] ffff888102a98080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.432724] ffff888102a98100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.433003] ================================================================== [ 18.505715] ================================================================== [ 18.506500] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 18.507381] Read of size 1 at addr ffff888103a18000 by task kunit_try_catch/254 [ 18.508663] [ 18.509055] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 18.509345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.509371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.509401] Call Trace: [ 18.509423] <TASK> [ 18.509451] dump_stack_lvl+0x73/0xb0 [ 18.509505] print_report+0xd1/0x650 [ 18.509533] ? __virt_addr_valid+0x1db/0x2d0 [ 18.509560] ? mempool_uaf_helper+0x392/0x400 [ 18.509585] ? kasan_addr_to_slab+0x11/0xa0 [ 18.509608] ? mempool_uaf_helper+0x392/0x400 [ 18.509632] kasan_report+0x141/0x180 [ 18.509657] ? mempool_uaf_helper+0x392/0x400 [ 18.509687] __asan_report_load1_noabort+0x18/0x20 [ 18.509711] mempool_uaf_helper+0x392/0x400 [ 18.509736] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 18.509799] ? finish_task_switch.isra.0+0x153/0x700 [ 18.509860] mempool_page_alloc_uaf+0xed/0x140 [ 18.509909] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 18.509957] ? dequeue_task_fair+0x156/0x4e0 [ 18.510012] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 18.510065] ? __pfx_mempool_free_pages+0x10/0x10 [ 18.510114] ? __pfx_read_tsc+0x10/0x10 [ 18.510157] ? ktime_get_ts64+0x86/0x230 [ 18.510221] kunit_try_run_case+0x1a5/0x480 [ 18.510269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.510309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.510350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.510376] ? __kthread_parkme+0x82/0x180 [ 18.510401] ? preempt_count_sub+0x50/0x80 [ 18.510428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.510454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.510479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.510503] kthread+0x337/0x6f0 [ 18.510522] ? trace_preempt_on+0x20/0xc0 [ 18.510548] ? __pfx_kthread+0x10/0x10 [ 18.510569] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.510591] ? calculate_sigpending+0x7b/0xa0 [ 18.510619] ? __pfx_kthread+0x10/0x10 [ 18.510639] ret_from_fork+0x41/0x80 [ 18.510662] ? __pfx_kthread+0x10/0x10 [ 18.510682] ret_from_fork_asm+0x1a/0x30 [ 18.510718] </TASK> [ 18.510732] [ 18.525316] The buggy address belongs to the physical page: [ 18.526140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18 [ 18.527611] flags: 0x200000000000000(node=0|zone=2) [ 18.527962] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.528664] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.529332] page dumped because: kasan: bad access detected [ 18.529711] [ 18.529853] Memory state around the buggy address: [ 18.530879] ffff888103a17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.531229] ffff888103a17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.531723] >ffff888103a18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.532140] ^ [ 18.532451] ffff888103a18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.532848] ffff888103a18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.533618] ==================================================================