Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 34.435252] ================================================================== [ 34.437119] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.444233] Read of size 1 at addr ffff0008018e7300 by task kunit_try_catch/276 [ 34.451524] [ 34.453011] CPU: 2 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 34.453070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.453090] Hardware name: WinLink E850-96 board (DT) [ 34.453114] Call trace: [ 34.453126] show_stack+0x20/0x38 (C) [ 34.453159] dump_stack_lvl+0x8c/0xd0 [ 34.453195] print_report+0x118/0x608 [ 34.453225] kasan_report+0xdc/0x128 [ 34.453255] __asan_report_load1_noabort+0x20/0x30 [ 34.453291] mempool_uaf_helper+0x314/0x340 [ 34.453326] mempool_kmalloc_uaf+0xc4/0x120 [ 34.453359] kunit_try_run_case+0x170/0x3f0 [ 34.453394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.453430] kthread+0x328/0x630 [ 34.453465] ret_from_fork+0x10/0x20 [ 34.453500] [ 34.520015] Allocated by task 276: [ 34.523402] kasan_save_stack+0x3c/0x68 [ 34.527217] kasan_save_track+0x20/0x40 [ 34.531037] kasan_save_alloc_info+0x40/0x58 [ 34.535290] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.540585] remove_element+0x130/0x1f8 [ 34.544405] mempool_alloc_preallocated+0x58/0xc0 [ 34.549092] mempool_uaf_helper+0xa4/0x340 [ 34.553172] mempool_kmalloc_uaf+0xc4/0x120 [ 34.557338] kunit_try_run_case+0x170/0x3f0 [ 34.561505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.566974] kthread+0x328/0x630 [ 34.570186] ret_from_fork+0x10/0x20 [ 34.573744] [ 34.575221] Freed by task 276: [ 34.578260] kasan_save_stack+0x3c/0x68 [ 34.582078] kasan_save_track+0x20/0x40 [ 34.585897] kasan_save_free_info+0x4c/0x78 [ 34.590064] __kasan_mempool_poison_object+0xc0/0x150 [ 34.595098] mempool_free+0x28c/0x328 [ 34.598744] mempool_uaf_helper+0x104/0x340 [ 34.602910] mempool_kmalloc_uaf+0xc4/0x120 [ 34.607077] kunit_try_run_case+0x170/0x3f0 [ 34.611245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.616713] kthread+0x328/0x630 [ 34.619924] ret_from_fork+0x10/0x20 [ 34.623483] [ 34.624960] The buggy address belongs to the object at ffff0008018e7300 [ 34.624960] which belongs to the cache kmalloc-128 of size 128 [ 34.637463] The buggy address is located 0 bytes inside of [ 34.637463] freed 128-byte region [ffff0008018e7300, ffff0008018e7380) [ 34.649524] [ 34.651003] The buggy address belongs to the physical page: [ 34.656562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6 [ 34.664544] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.672184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.679126] page_type: f5(slab) [ 34.682264] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 34.689982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.697709] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 34.705520] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.713333] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff [ 34.721145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.728950] page dumped because: kasan: bad access detected [ 34.734505] [ 34.735981] Memory state around the buggy address: [ 34.740765] ffff0008018e7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.747964] ffff0008018e7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.755170] >ffff0008018e7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.762370] ^ [ 34.765586] ffff0008018e7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.772792] ffff0008018e7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.779993] ================================================================== [ 35.020117] ================================================================== [ 35.029561] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.036675] Read of size 1 at addr ffff0008067bf240 by task kunit_try_catch/280 [ 35.043965] [ 35.045451] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 35.045507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.045523] Hardware name: WinLink E850-96 board (DT) [ 35.045546] Call trace: [ 35.045558] show_stack+0x20/0x38 (C) [ 35.045594] dump_stack_lvl+0x8c/0xd0 [ 35.045633] print_report+0x118/0x608 [ 35.045666] kasan_report+0xdc/0x128 [ 35.045697] __asan_report_load1_noabort+0x20/0x30 [ 35.045734] mempool_uaf_helper+0x314/0x340 [ 35.045767] mempool_slab_uaf+0xc0/0x118 [ 35.045794] kunit_try_run_case+0x170/0x3f0 [ 35.045832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.045869] kthread+0x328/0x630 [ 35.045906] ret_from_fork+0x10/0x20 [ 35.045942] [ 35.112192] Allocated by task 280: [ 35.115581] kasan_save_stack+0x3c/0x68 [ 35.119396] kasan_save_track+0x20/0x40 [ 35.123215] kasan_save_alloc_info+0x40/0x58 [ 35.127469] __kasan_mempool_unpoison_object+0xbc/0x180 [ 35.132677] remove_element+0x16c/0x1f8 [ 35.136496] mempool_alloc_preallocated+0x58/0xc0 [ 35.141185] mempool_uaf_helper+0xa4/0x340 [ 35.145264] mempool_slab_uaf+0xc0/0x118 [ 35.149170] kunit_try_run_case+0x170/0x3f0 [ 35.153337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.158805] kthread+0x328/0x630 [ 35.162017] ret_from_fork+0x10/0x20 [ 35.165576] [ 35.167053] Freed by task 280: [ 35.170091] kasan_save_stack+0x3c/0x68 [ 35.173909] kasan_save_track+0x20/0x40 [ 35.177729] kasan_save_free_info+0x4c/0x78 [ 35.181895] __kasan_mempool_poison_object+0xc0/0x150 [ 35.186930] mempool_free+0x28c/0x328 [ 35.190575] mempool_uaf_helper+0x104/0x340 [ 35.194742] mempool_slab_uaf+0xc0/0x118 [ 35.198648] kunit_try_run_case+0x170/0x3f0 [ 35.202815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.208283] kthread+0x328/0x630 [ 35.211495] ret_from_fork+0x10/0x20 [ 35.215054] [ 35.216532] The buggy address belongs to the object at ffff0008067bf240 [ 35.216532] which belongs to the cache test_cache of size 123 [ 35.228947] The buggy address is located 0 bytes inside of [ 35.228947] freed 123-byte region [ffff0008067bf240, ffff0008067bf2bb) [ 35.241009] [ 35.242488] The buggy address belongs to the physical page: [ 35.248045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867bf [ 35.256029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.262537] page_type: f5(slab) [ 35.265676] raw: 0bfffe0000000000 ffff000806738000 dead000000000122 0000000000000000 [ 35.273394] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 35.281113] page dumped because: kasan: bad access detected [ 35.286668] [ 35.288143] Memory state around the buggy address: [ 35.292927] ffff0008067bf100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.300128] ffff0008067bf180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.307335] >ffff0008067bf200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.314532] ^ [ 35.319831] ffff0008067bf280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.327036] ffff0008067bf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.334238] ==================================================================
[ 17.622062] ================================================================== [ 17.622418] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.622491] Read of size 1 at addr fff00000c7936240 by task kunit_try_catch/236 [ 17.622562] [ 17.622597] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.622687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.622714] Hardware name: linux,dummy-virt (DT) [ 17.622972] Call trace: [ 17.623146] show_stack+0x20/0x38 (C) [ 17.623205] dump_stack_lvl+0x8c/0xd0 [ 17.623522] print_report+0x118/0x608 [ 17.623608] kasan_report+0xdc/0x128 [ 17.623725] __asan_report_load1_noabort+0x20/0x30 [ 17.623797] mempool_uaf_helper+0x314/0x340 [ 17.623884] mempool_slab_uaf+0xc0/0x118 [ 17.623937] kunit_try_run_case+0x170/0x3f0 [ 17.624281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.624403] kthread+0x328/0x630 [ 17.624584] ret_from_fork+0x10/0x20 [ 17.624775] [ 17.624858] Allocated by task 236: [ 17.625161] kasan_save_stack+0x3c/0x68 [ 17.625246] kasan_save_track+0x20/0x40 [ 17.625356] kasan_save_alloc_info+0x40/0x58 [ 17.625474] __kasan_mempool_unpoison_object+0xbc/0x180 [ 17.625672] remove_element+0x16c/0x1f8 [ 17.625724] mempool_alloc_preallocated+0x58/0xc0 [ 17.626008] mempool_uaf_helper+0xa4/0x340 [ 17.626089] mempool_slab_uaf+0xc0/0x118 [ 17.626417] kunit_try_run_case+0x170/0x3f0 [ 17.626491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.626680] kthread+0x328/0x630 [ 17.626749] ret_from_fork+0x10/0x20 [ 17.626787] [ 17.627104] Freed by task 236: [ 17.627172] kasan_save_stack+0x3c/0x68 [ 17.627233] kasan_save_track+0x20/0x40 [ 17.627427] kasan_save_free_info+0x4c/0x78 [ 17.627569] __kasan_mempool_poison_object+0xc0/0x150 [ 17.627705] mempool_free+0x28c/0x328 [ 17.628174] mempool_uaf_helper+0x104/0x340 [ 17.628282] mempool_slab_uaf+0xc0/0x118 [ 17.628449] kunit_try_run_case+0x170/0x3f0 [ 17.628584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.628676] kthread+0x328/0x630 [ 17.628720] ret_from_fork+0x10/0x20 [ 17.629030] [ 17.629142] The buggy address belongs to the object at fff00000c7936240 [ 17.629142] which belongs to the cache test_cache of size 123 [ 17.629284] The buggy address is located 0 bytes inside of [ 17.629284] freed 123-byte region [fff00000c7936240, fff00000c79362bb) [ 17.629511] [ 17.629704] The buggy address belongs to the physical page: [ 17.629762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107936 [ 17.629914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.630367] page_type: f5(slab) [ 17.631720] raw: 0bfffe0000000000 fff00000c3eadc80 dead000000000122 0000000000000000 [ 17.631778] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 17.631818] page dumped because: kasan: bad access detected [ 17.631857] [ 17.631875] Memory state around the buggy address: [ 17.631907] fff00000c7936100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.631952] fff00000c7936180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.631994] >fff00000c7936200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 17.632034] ^ [ 17.632069] fff00000c7936280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.632110] fff00000c7936300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.632148] ================================================================== [ 17.591710] ================================================================== [ 17.591787] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 17.591850] Read of size 1 at addr fff00000c6eca800 by task kunit_try_catch/232 [ 17.591902] [ 17.591939] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.592664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.592695] Hardware name: linux,dummy-virt (DT) [ 17.592729] Call trace: [ 17.592754] show_stack+0x20/0x38 (C) [ 17.592807] dump_stack_lvl+0x8c/0xd0 [ 17.592857] print_report+0x118/0x608 [ 17.592900] kasan_report+0xdc/0x128 [ 17.592943] __asan_report_load1_noabort+0x20/0x30 [ 17.592993] mempool_uaf_helper+0x314/0x340 [ 17.593041] mempool_kmalloc_uaf+0xc4/0x120 [ 17.593089] kunit_try_run_case+0x170/0x3f0 [ 17.593138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.593190] kthread+0x328/0x630 [ 17.593236] ret_from_fork+0x10/0x20 [ 17.593283] [ 17.593301] Allocated by task 232: [ 17.593330] kasan_save_stack+0x3c/0x68 [ 17.593370] kasan_save_track+0x20/0x40 [ 17.593406] kasan_save_alloc_info+0x40/0x58 [ 17.593445] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.593487] remove_element+0x130/0x1f8 [ 17.593528] mempool_alloc_preallocated+0x58/0xc0 [ 17.593568] mempool_uaf_helper+0xa4/0x340 [ 17.593605] mempool_kmalloc_uaf+0xc4/0x120 [ 17.593654] kunit_try_run_case+0x170/0x3f0 [ 17.593691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.593735] kthread+0x328/0x630 [ 17.593771] ret_from_fork+0x10/0x20 [ 17.593807] [ 17.593825] Freed by task 232: [ 17.593850] kasan_save_stack+0x3c/0x68 [ 17.593885] kasan_save_track+0x20/0x40 [ 17.593919] kasan_save_free_info+0x4c/0x78 [ 17.593957] __kasan_mempool_poison_object+0xc0/0x150 [ 17.593999] mempool_free+0x28c/0x328 [ 17.594036] mempool_uaf_helper+0x104/0x340 [ 17.594075] mempool_kmalloc_uaf+0xc4/0x120 [ 17.594112] kunit_try_run_case+0x170/0x3f0 [ 17.594151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.594195] kthread+0x328/0x630 [ 17.594229] ret_from_fork+0x10/0x20 [ 17.594263] [ 17.594283] The buggy address belongs to the object at fff00000c6eca800 [ 17.594283] which belongs to the cache kmalloc-128 of size 128 [ 17.594339] The buggy address is located 0 bytes inside of [ 17.594339] freed 128-byte region [fff00000c6eca800, fff00000c6eca880) [ 17.594399] [ 17.594421] The buggy address belongs to the physical page: [ 17.594452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106eca [ 17.594506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.594554] page_type: f5(slab) [ 17.594592] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.594877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.594923] page dumped because: kasan: bad access detected [ 17.594955] [ 17.594973] Memory state around the buggy address: [ 17.595007] fff00000c6eca700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.595050] fff00000c6eca780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.595093] >fff00000c6eca800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.595131] ^ [ 17.595158] fff00000c6eca880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.595198] fff00000c6eca900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.595237] ==================================================================
[ 16.235575] ================================================================== [ 16.236104] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 16.237024] Read of size 1 at addr ffff888102613240 by task kunit_try_catch/252 [ 16.237356] [ 16.237730] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.237824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.237845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.237873] Call Trace: [ 16.237891] <TASK> [ 16.237921] dump_stack_lvl+0x73/0xb0 [ 16.237992] print_report+0xd1/0x650 [ 16.238047] ? __virt_addr_valid+0x1db/0x2d0 [ 16.238100] ? mempool_uaf_helper+0x392/0x400 [ 16.238150] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.238202] ? mempool_uaf_helper+0x392/0x400 [ 16.238249] kasan_report+0x141/0x180 [ 16.238295] ? mempool_uaf_helper+0x392/0x400 [ 16.238371] __asan_report_load1_noabort+0x18/0x20 [ 16.238421] mempool_uaf_helper+0x392/0x400 [ 16.238479] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 16.238539] ? finish_task_switch.isra.0+0x153/0x700 [ 16.238600] mempool_slab_uaf+0xea/0x140 [ 16.238635] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 16.238657] ? dequeue_task_fair+0x166/0x4e0 [ 16.238685] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 16.238713] ? __pfx_mempool_free_slab+0x10/0x10 [ 16.238740] ? __pfx_read_tsc+0x10/0x10 [ 16.238766] ? ktime_get_ts64+0x86/0x230 [ 16.238797] kunit_try_run_case+0x1a5/0x480 [ 16.238827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.238853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.238882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.238910] ? __kthread_parkme+0x82/0x180 [ 16.238939] ? preempt_count_sub+0x50/0x80 [ 16.238966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.238992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.239018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.239044] kthread+0x337/0x6f0 [ 16.239067] ? trace_preempt_on+0x20/0xc0 [ 16.239578] ? __pfx_kthread+0x10/0x10 [ 16.239648] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.239703] ? calculate_sigpending+0x7b/0xa0 [ 16.239760] ? __pfx_kthread+0x10/0x10 [ 16.239808] ret_from_fork+0x41/0x80 [ 16.239857] ? __pfx_kthread+0x10/0x10 [ 16.239999] ret_from_fork_asm+0x1a/0x30 [ 16.240049] </TASK> [ 16.240064] [ 16.257023] Allocated by task 252: [ 16.257980] kasan_save_stack+0x45/0x70 [ 16.258422] kasan_save_track+0x18/0x40 [ 16.258680] kasan_save_alloc_info+0x3b/0x50 [ 16.258955] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 16.259905] remove_element+0x11e/0x190 [ 16.260249] mempool_alloc_preallocated+0x4d/0x90 [ 16.260487] mempool_uaf_helper+0x96/0x400 [ 16.260814] mempool_slab_uaf+0xea/0x140 [ 16.261687] kunit_try_run_case+0x1a5/0x480 [ 16.261939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.262142] kthread+0x337/0x6f0 [ 16.262662] ret_from_fork+0x41/0x80 [ 16.262837] ret_from_fork_asm+0x1a/0x30 [ 16.263700] [ 16.263896] Freed by task 252: [ 16.264152] kasan_save_stack+0x45/0x70 [ 16.264366] kasan_save_track+0x18/0x40 [ 16.264691] kasan_save_free_info+0x3f/0x60 [ 16.265005] __kasan_mempool_poison_object+0x131/0x1d0 [ 16.265989] mempool_free+0x2ec/0x380 [ 16.266609] mempool_uaf_helper+0x11a/0x400 [ 16.266871] mempool_slab_uaf+0xea/0x140 [ 16.267041] kunit_try_run_case+0x1a5/0x480 [ 16.267639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.268011] kthread+0x337/0x6f0 [ 16.268397] ret_from_fork+0x41/0x80 [ 16.268568] ret_from_fork_asm+0x1a/0x30 [ 16.268727] [ 16.268825] The buggy address belongs to the object at ffff888102613240 [ 16.268825] which belongs to the cache test_cache of size 123 [ 16.269914] The buggy address is located 0 bytes inside of [ 16.269914] freed 123-byte region [ffff888102613240, ffff8881026132bb) [ 16.271410] [ 16.271535] The buggy address belongs to the physical page: [ 16.271737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102613 [ 16.272310] flags: 0x200000000000000(node=0|zone=2) [ 16.273111] page_type: f5(slab) [ 16.273462] raw: 0200000000000000 ffff888102610000 dead000000000122 0000000000000000 [ 16.273758] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 16.274308] page dumped because: kasan: bad access detected [ 16.274647] [ 16.274827] Memory state around the buggy address: [ 16.276003] ffff888102613100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.276453] ffff888102613180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.276818] >ffff888102613200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 16.277041] ^ [ 16.277535] ffff888102613280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.278205] ffff888102613300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.278903] ================================================================== [ 16.152887] ================================================================== [ 16.154283] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 16.154968] Read of size 1 at addr ffff888102b20100 by task kunit_try_catch/248 [ 16.155648] [ 16.156460] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.156578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.156605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.156647] Call Trace: [ 16.156672] <TASK> [ 16.156710] dump_stack_lvl+0x73/0xb0 [ 16.156772] print_report+0xd1/0x650 [ 16.156812] ? __virt_addr_valid+0x1db/0x2d0 [ 16.156852] ? mempool_uaf_helper+0x392/0x400 [ 16.156890] ? kasan_complete_mode_report_info+0x64/0x200 [ 16.156935] ? mempool_uaf_helper+0x392/0x400 [ 16.156979] kasan_report+0x141/0x180 [ 16.157232] ? mempool_uaf_helper+0x392/0x400 [ 16.157304] __asan_report_load1_noabort+0x18/0x20 [ 16.157361] mempool_uaf_helper+0x392/0x400 [ 16.157405] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 16.157442] ? dequeue_entities+0x852/0x1740 [ 16.157489] ? finish_task_switch.isra.0+0x153/0x700 [ 16.157536] mempool_kmalloc_uaf+0xef/0x140 [ 16.157574] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 16.157610] ? dequeue_task_fair+0x166/0x4e0 [ 16.157649] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.157684] ? __pfx_mempool_kfree+0x10/0x10 [ 16.157707] ? __pfx_read_tsc+0x10/0x10 [ 16.157730] ? ktime_get_ts64+0x86/0x230 [ 16.157760] kunit_try_run_case+0x1a5/0x480 [ 16.157789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.157811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.157838] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.157862] ? __kthread_parkme+0x82/0x180 [ 16.157887] ? preempt_count_sub+0x50/0x80 [ 16.157912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.157937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.157961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.157985] kthread+0x337/0x6f0 [ 16.158003] ? trace_preempt_on+0x20/0xc0 [ 16.158029] ? __pfx_kthread+0x10/0x10 [ 16.158049] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.158078] ? calculate_sigpending+0x7b/0xa0 [ 16.158110] ? __pfx_kthread+0x10/0x10 [ 16.158130] ret_from_fork+0x41/0x80 [ 16.158152] ? __pfx_kthread+0x10/0x10 [ 16.158171] ret_from_fork_asm+0x1a/0x30 [ 16.158235] </TASK> [ 16.158258] [ 16.172974] Allocated by task 248: [ 16.173406] kasan_save_stack+0x45/0x70 [ 16.173830] kasan_save_track+0x18/0x40 [ 16.174224] kasan_save_alloc_info+0x3b/0x50 [ 16.174450] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.174973] remove_element+0x11e/0x190 [ 16.175587] mempool_alloc_preallocated+0x4d/0x90 [ 16.175943] mempool_uaf_helper+0x96/0x400 [ 16.176662] mempool_kmalloc_uaf+0xef/0x140 [ 16.177020] kunit_try_run_case+0x1a5/0x480 [ 16.177838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.178321] kthread+0x337/0x6f0 [ 16.178540] ret_from_fork+0x41/0x80 [ 16.178729] ret_from_fork_asm+0x1a/0x30 [ 16.178925] [ 16.179105] Freed by task 248: [ 16.179667] kasan_save_stack+0x45/0x70 [ 16.180035] kasan_save_track+0x18/0x40 [ 16.180957] kasan_save_free_info+0x3f/0x60 [ 16.181622] __kasan_mempool_poison_object+0x131/0x1d0 [ 16.182103] mempool_free+0x2ec/0x380 [ 16.182502] mempool_uaf_helper+0x11a/0x400 [ 16.182944] mempool_kmalloc_uaf+0xef/0x140 [ 16.183597] kunit_try_run_case+0x1a5/0x480 [ 16.183914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.184602] kthread+0x337/0x6f0 [ 16.184780] ret_from_fork+0x41/0x80 [ 16.185543] ret_from_fork_asm+0x1a/0x30 [ 16.185725] [ 16.185883] The buggy address belongs to the object at ffff888102b20100 [ 16.185883] which belongs to the cache kmalloc-128 of size 128 [ 16.186847] The buggy address is located 0 bytes inside of [ 16.186847] freed 128-byte region [ffff888102b20100, ffff888102b20180) [ 16.187750] [ 16.187948] The buggy address belongs to the physical page: [ 16.188734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b20 [ 16.189626] flags: 0x200000000000000(node=0|zone=2) [ 16.189960] page_type: f5(slab) [ 16.190428] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.190852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.191583] page dumped because: kasan: bad access detected [ 16.192011] [ 16.192136] Memory state around the buggy address: [ 16.192770] ffff888102b20000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.193113] ffff888102b20080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.194128] >ffff888102b20100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.194630] ^ [ 16.194933] ffff888102b20180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.195678] ffff888102b20200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.196033] ==================================================================