Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 177.687862] ================================================================== [ 177.690442] BUG: KASAN: use-after-free in pagealloc_uaf+0xd4/0x1e8 [ 177.693110] Read of size 1 at addr ffff0000c6040000 by task kunit_try_catch/130 [ 177.694395] [ 177.695732] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 177.697837] Hardware name: linux,dummy-virt (DT) [ 177.699281] Call trace: [ 177.699880] dump_backtrace+0x9c/0x128 [ 177.701067] show_stack+0x20/0x38 [ 177.702261] dump_stack_lvl+0x60/0xb0 [ 177.703512] print_report+0xf8/0x5d8 [ 177.704764] kasan_report+0xc8/0x118 [ 177.706122] __asan_load1+0x60/0x70 [ 177.707088] pagealloc_uaf+0xd4/0x1e8 [ 177.708587] kunit_try_run_case+0xf8/0x260 [ 177.710240] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 177.711800] kthread+0x18c/0x1a8 [ 177.713039] ret_from_fork+0x10/0x20 [ 177.714421] [ 177.714889] The buggy address belongs to the physical page: [ 177.715522] page:00000000ba732e46 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106040 [ 177.718478] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 177.720467] page_type: 0xffffff7f(buddy) [ 177.721988] raw: 0bfffc0000000000 ffff0000ff5fca30 ffff0000ff5fca30 0000000000000000 [ 177.723978] raw: 0000000000000000 0000000000000006 00000000ffffff7f 0000000000000000 [ 177.725939] page dumped because: kasan: bad access detected [ 177.727462] [ 177.728107] Memory state around the buggy address: [ 177.729504] ffff0000c603ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 177.731546] ffff0000c603ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 177.733753] >ffff0000c6040000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 177.735465] ^ [ 177.736566] ffff0000c6040080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 177.738397] ffff0000c6040100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 177.739931] ==================================================================