Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.667934] ================================================================== [ 16.667999] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 16.668065] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/154 [ 16.668114] [ 16.668154] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.668236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.668263] Hardware name: linux,dummy-virt (DT) [ 16.668294] Call trace: [ 16.668317] show_stack+0x20/0x38 (C) [ 16.668570] dump_stack_lvl+0x8c/0xd0 [ 16.668658] print_report+0x118/0x5d0 [ 16.668720] kasan_report+0xdc/0x128 [ 16.668816] __asan_report_load1_noabort+0x20/0x30 [ 16.668929] page_alloc_uaf+0x328/0x350 [ 16.668974] kunit_try_run_case+0x170/0x3f0 [ 16.669271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.669390] kthread+0x328/0x630 [ 16.669472] ret_from_fork+0x10/0x20 [ 16.669620] [ 16.669662] The buggy address belongs to the physical page: [ 16.669693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 16.669748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.669799] page_type: f0(buddy) [ 16.670014] raw: 0bfffe0000000000 fff00000ff616240 fff00000ff616240 0000000000000000 [ 16.670106] raw: 0000000000000000 0000000000000008 00000000f0000000 0000000000000000 [ 16.670204] page dumped because: kasan: bad access detected [ 16.670317] [ 16.670355] Memory state around the buggy address: [ 16.670389] fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.670432] fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.670472] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.670508] ^ [ 16.670705] fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.670788] fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.670859] ==================================================================
[ 16.425514] ================================================================== [ 16.425581] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 16.426460] Read of size 1 at addr fff00000c79c0000 by task kunit_try_catch/154 [ 16.426528] [ 16.426571] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.427200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.427736] Hardware name: linux,dummy-virt (DT) [ 16.427797] Call trace: [ 16.427824] show_stack+0x20/0x38 (C) [ 16.427882] dump_stack_lvl+0x8c/0xd0 [ 16.427931] print_report+0x118/0x5d0 [ 16.427978] kasan_report+0xdc/0x128 [ 16.428023] __asan_report_load1_noabort+0x20/0x30 [ 16.428074] page_alloc_uaf+0x328/0x350 [ 16.428662] kunit_try_run_case+0x170/0x3f0 [ 16.428734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.428788] kthread+0x328/0x630 [ 16.428878] ret_from_fork+0x10/0x20 [ 16.428930] [ 16.428951] The buggy address belongs to the physical page: [ 16.429045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079c0 [ 16.429173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.429848] page_type: f0(buddy) [ 16.429910] raw: 0bfffe0000000000 fff00000ff616170 fff00000ff616170 0000000000000000 [ 16.430259] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 16.430567] page dumped because: kasan: bad access detected [ 16.430612] [ 16.430630] Memory state around the buggy address: [ 16.430675] fff00000c79bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.430718] fff00000c79bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.431365] >fff00000c79c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.431671] ^ [ 16.431758] fff00000c79c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.432097] fff00000c79c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.432410] ==================================================================
[ 16.424552] ================================================================== [ 16.424613] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 16.425095] Read of size 1 at addr fff00000c7740000 by task kunit_try_catch/154 [ 16.425191] [ 16.425400] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.425583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.425757] Hardware name: linux,dummy-virt (DT) [ 16.425837] Call trace: [ 16.425862] show_stack+0x20/0x38 (C) [ 16.425932] dump_stack_lvl+0x8c/0xd0 [ 16.426076] print_report+0x118/0x5d0 [ 16.426154] kasan_report+0xdc/0x128 [ 16.426374] __asan_report_load1_noabort+0x20/0x30 [ 16.426466] page_alloc_uaf+0x328/0x350 [ 16.426614] kunit_try_run_case+0x170/0x3f0 [ 16.426695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.426866] kthread+0x328/0x630 [ 16.426945] ret_from_fork+0x10/0x20 [ 16.427072] [ 16.427174] The buggy address belongs to the physical page: [ 16.427415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107740 [ 16.427815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.427905] page_type: f0(buddy) [ 16.428061] raw: 0bfffe0000000000 fff00000ff616170 fff00000ff616170 0000000000000000 [ 16.428193] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 16.428305] page dumped because: kasan: bad access detected [ 16.428370] [ 16.428388] Memory state around the buggy address: [ 16.428596] fff00000c773ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.428855] fff00000c773ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.428924] >fff00000c7740000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.429049] ^ [ 16.429127] fff00000c7740080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.429339] fff00000c7740100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.429389] ==================================================================
[ 11.554501] ================================================================== [ 11.555371] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 11.555904] Read of size 1 at addr ffff888103a40000 by task kunit_try_catch/172 [ 11.556405] [ 11.556762] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.556826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.556837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.556858] Call Trace: [ 11.556876] <TASK> [ 11.556890] dump_stack_lvl+0x73/0xb0 [ 11.556919] print_report+0xd1/0x610 [ 11.556940] ? __virt_addr_valid+0x1db/0x2d0 [ 11.556962] ? page_alloc_uaf+0x356/0x3d0 [ 11.556983] ? kasan_addr_to_slab+0x11/0xa0 [ 11.557004] ? page_alloc_uaf+0x356/0x3d0 [ 11.557025] kasan_report+0x141/0x180 [ 11.557046] ? page_alloc_uaf+0x356/0x3d0 [ 11.557073] __asan_report_load1_noabort+0x18/0x20 [ 11.557097] page_alloc_uaf+0x356/0x3d0 [ 11.557118] ? __pfx_page_alloc_uaf+0x10/0x10 [ 11.557144] ? __schedule+0x10cc/0x2b60 [ 11.557166] ? __pfx_read_tsc+0x10/0x10 [ 11.557185] ? ktime_get_ts64+0x86/0x230 [ 11.557209] kunit_try_run_case+0x1a5/0x480 [ 11.557234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.557256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.557278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.557302] ? __kthread_parkme+0x82/0x180 [ 11.557322] ? preempt_count_sub+0x50/0x80 [ 11.557345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.557368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.557391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.557415] kthread+0x337/0x6f0 [ 11.557433] ? trace_preempt_on+0x20/0xc0 [ 11.557465] ? __pfx_kthread+0x10/0x10 [ 11.557559] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.557582] ? calculate_sigpending+0x7b/0xa0 [ 11.557605] ? __pfx_kthread+0x10/0x10 [ 11.557626] ret_from_fork+0x116/0x1d0 [ 11.557644] ? __pfx_kthread+0x10/0x10 [ 11.557663] ret_from_fork_asm+0x1a/0x30 [ 11.557695] </TASK> [ 11.557704] [ 11.572911] The buggy address belongs to the physical page: [ 11.573114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a40 [ 11.573368] flags: 0x200000000000000(node=0|zone=2) [ 11.574212] page_type: f0(buddy) [ 11.574833] raw: 0200000000000000 ffff88817fffc4f0 ffff88817fffc4f0 0000000000000000 [ 11.575611] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 11.576639] page dumped because: kasan: bad access detected [ 11.577178] [ 11.577496] Memory state around the buggy address: [ 11.578171] ffff888103a3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.578842] ffff888103a3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.579269] >ffff888103a40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.580162] ^ [ 11.580700] ffff888103a40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.581760] ffff888103a40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.582101] ==================================================================
[ 11.682692] ================================================================== [ 11.683446] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 11.683722] Read of size 1 at addr ffff888103990000 by task kunit_try_catch/171 [ 11.684031] [ 11.684151] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.684200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.684211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.684233] Call Trace: [ 11.684249] <TASK> [ 11.684268] dump_stack_lvl+0x73/0xb0 [ 11.684299] print_report+0xd1/0x610 [ 11.684322] ? __virt_addr_valid+0x1db/0x2d0 [ 11.684361] ? page_alloc_uaf+0x356/0x3d0 [ 11.684382] ? kasan_addr_to_slab+0x11/0xa0 [ 11.684404] ? page_alloc_uaf+0x356/0x3d0 [ 11.684426] kasan_report+0x141/0x180 [ 11.684448] ? page_alloc_uaf+0x356/0x3d0 [ 11.684474] __asan_report_load1_noabort+0x18/0x20 [ 11.684499] page_alloc_uaf+0x356/0x3d0 [ 11.684520] ? __pfx_page_alloc_uaf+0x10/0x10 [ 11.684542] ? __schedule+0x10cc/0x2b60 [ 11.684565] ? __pfx_read_tsc+0x10/0x10 [ 11.684586] ? ktime_get_ts64+0x86/0x230 [ 11.684675] kunit_try_run_case+0x1a5/0x480 [ 11.684701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.684723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.684747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.684770] ? __kthread_parkme+0x82/0x180 [ 11.684791] ? preempt_count_sub+0x50/0x80 [ 11.684815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.684838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.684869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.684893] kthread+0x337/0x6f0 [ 11.684911] ? trace_preempt_on+0x20/0xc0 [ 11.684934] ? __pfx_kthread+0x10/0x10 [ 11.684954] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.684975] ? calculate_sigpending+0x7b/0xa0 [ 11.684999] ? __pfx_kthread+0x10/0x10 [ 11.685078] ret_from_fork+0x116/0x1d0 [ 11.685097] ? __pfx_kthread+0x10/0x10 [ 11.685116] ret_from_fork_asm+0x1a/0x30 [ 11.685149] </TASK> [ 11.685159] [ 11.692437] The buggy address belongs to the physical page: [ 11.692687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103990 [ 11.692945] flags: 0x200000000000000(node=0|zone=2) [ 11.693149] page_type: f0(buddy) [ 11.693539] raw: 0200000000000000 ffff88817fffb460 ffff88817fffb460 0000000000000000 [ 11.693918] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 11.694422] page dumped because: kasan: bad access detected [ 11.694674] [ 11.694772] Memory state around the buggy address: [ 11.694996] ffff88810398ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.695292] ffff88810398ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.695604] >ffff888103990000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.695882] ^ [ 11.696029] ffff888103990080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.696352] ffff888103990100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.696682] ==================================================================
[ 11.770288] ================================================================== [ 11.771020] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 11.771347] Read of size 1 at addr ffff888103a80000 by task kunit_try_catch/171 [ 11.771922] [ 11.772030] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.772078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.772089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.772111] Call Trace: [ 11.772122] <TASK> [ 11.772138] dump_stack_lvl+0x73/0xb0 [ 11.772168] print_report+0xd1/0x610 [ 11.772191] ? __virt_addr_valid+0x1db/0x2d0 [ 11.772215] ? page_alloc_uaf+0x356/0x3d0 [ 11.772237] ? kasan_addr_to_slab+0x11/0xa0 [ 11.772257] ? page_alloc_uaf+0x356/0x3d0 [ 11.772279] kasan_report+0x141/0x180 [ 11.772300] ? page_alloc_uaf+0x356/0x3d0 [ 11.772327] __asan_report_load1_noabort+0x18/0x20 [ 11.772352] page_alloc_uaf+0x356/0x3d0 [ 11.772373] ? __pfx_page_alloc_uaf+0x10/0x10 [ 11.772394] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 11.772419] ? trace_hardirqs_on+0x37/0xe0 [ 11.772442] ? __pfx_read_tsc+0x10/0x10 [ 11.772462] ? ktime_get_ts64+0x86/0x230 [ 11.772486] kunit_try_run_case+0x1a5/0x480 [ 11.772511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.772590] ? queued_spin_lock_slowpath+0x116/0xb40 [ 11.772616] ? __kthread_parkme+0x82/0x180 [ 11.772636] ? preempt_count_sub+0x50/0x80 [ 11.772661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.772684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.772708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.772731] kthread+0x337/0x6f0 [ 11.772749] ? trace_preempt_on+0x20/0xc0 [ 11.772771] ? __pfx_kthread+0x10/0x10 [ 11.772790] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.772811] ? calculate_sigpending+0x7b/0xa0 [ 11.772835] ? __pfx_kthread+0x10/0x10 [ 11.772855] ret_from_fork+0x116/0x1d0 [ 11.772874] ? __pfx_kthread+0x10/0x10 [ 11.772906] ret_from_fork_asm+0x1a/0x30 [ 11.772939] </TASK> [ 11.772950] [ 11.780449] The buggy address belongs to the physical page: [ 11.780952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a80 [ 11.781328] flags: 0x200000000000000(node=0|zone=2) [ 11.781652] page_type: f0(buddy) [ 11.781827] raw: 0200000000000000 ffff88817fffc538 ffff88817fffc538 0000000000000000 [ 11.782148] raw: 0000000000000000 0000000000000007 00000000f0000000 0000000000000000 [ 11.782374] page dumped because: kasan: bad access detected [ 11.782717] [ 11.782822] Memory state around the buggy address: [ 11.783173] ffff888103a7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.783420] ffff888103a7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.783663] >ffff888103a80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.784104] ^ [ 11.784266] ffff888103a80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.784818] ffff888103a80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 11.785169] ==================================================================