Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.242570] ==================================================================
[   20.242634] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.242695] Read of size 1 at addr fff00000c7908000 by task kunit_try_catch/233
[   20.242744] 
[   20.242779] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.243636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.243863] Hardware name: linux,dummy-virt (DT)
[   20.243947] Call trace:
[   20.243972]  show_stack+0x20/0x38 (C)
[   20.244029]  dump_stack_lvl+0x8c/0xd0
[   20.244240]  print_report+0x118/0x608
[   20.244475]  kasan_report+0xdc/0x128
[   20.244553]  __asan_report_load1_noabort+0x20/0x30
[   20.244731]  mempool_uaf_helper+0x314/0x340
[   20.245056]  mempool_page_alloc_uaf+0xc0/0x118
[   20.245194]  kunit_try_run_case+0x170/0x3f0
[   20.245281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.245374]  kthread+0x328/0x630
[   20.245513]  ret_from_fork+0x10/0x20
[   20.245574] 
[   20.245656] The buggy address belongs to the physical page:
[   20.245689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107908
[   20.245788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.245852] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.245903] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.245945] page dumped because: kasan: bad access detected
[   20.245975] 
[   20.245994] Memory state around the buggy address:
[   20.246067]  fff00000c7907f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.246577]  fff00000c7907f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.246981] >fff00000c7908000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.247087]                    ^
[   20.247170]  fff00000c7908080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.247227]  fff00000c7908100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.247265] ==================================================================
[   20.186912] ==================================================================
[   20.187083] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.187442] Read of size 1 at addr fff00000c7904000 by task kunit_try_catch/229
[   20.187699] 
[   20.187735] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.188051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.188093] Hardware name: linux,dummy-virt (DT)
[   20.188231] Call trace:
[   20.188254]  show_stack+0x20/0x38 (C)
[   20.188305]  dump_stack_lvl+0x8c/0xd0
[   20.188351]  print_report+0x118/0x608
[   20.188470]  kasan_report+0xdc/0x128
[   20.188700]  __asan_report_load1_noabort+0x20/0x30
[   20.188801]  mempool_uaf_helper+0x314/0x340
[   20.188908]  mempool_kmalloc_large_uaf+0xc4/0x120
[   20.188987]  kunit_try_run_case+0x170/0x3f0
[   20.189038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.189090]  kthread+0x328/0x630
[   20.189131]  ret_from_fork+0x10/0x20
[   20.189199] 
[   20.189251] The buggy address belongs to the physical page:
[   20.189284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   20.189642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.190005] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.190079] page_type: f8(unknown)
[   20.190119] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.190180] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.190227] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.190284] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.190331] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   20.190546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.190897] page dumped because: kasan: bad access detected
[   20.190930] 
[   20.191048] Memory state around the buggy address:
[   20.191087]  fff00000c7903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.191131]  fff00000c7903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.191229] >fff00000c7904000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.191500]                    ^
[   20.191591]  fff00000c7904080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.191658]  fff00000c7904100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.191703] ==================================================================

[   15.357677] ==================================================================
[   15.358288] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   15.358727] Read of size 1 at addr ffff888103aa8000 by task kunit_try_catch/251
[   15.359078] 
[   15.359212] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.359267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.359284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.359311] Call Trace:
[   15.359328]  <TASK>
[   15.359352]  dump_stack_lvl+0x73/0xb0
[   15.359442]  print_report+0xd1/0x650
[   15.359472]  ? __virt_addr_valid+0x1db/0x2d0
[   15.359499]  ? mempool_uaf_helper+0x392/0x400
[   15.359525]  ? kasan_addr_to_slab+0x11/0xa0
[   15.359548]  ? mempool_uaf_helper+0x392/0x400
[   15.359573]  kasan_report+0x141/0x180
[   15.359599]  ? mempool_uaf_helper+0x392/0x400
[   15.359629]  __asan_report_load1_noabort+0x18/0x20
[   15.359656]  mempool_uaf_helper+0x392/0x400
[   15.359681]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.359709]  ? __kasan_check_write+0x18/0x20
[   15.359730]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.359755]  ? irqentry_exit+0x2a/0x60
[   15.359781]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.359825]  mempool_page_alloc_uaf+0xed/0x140
[   15.359850]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   15.359878]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   15.359902]  ? __pfx_mempool_free_pages+0x10/0x10
[   15.359925]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   15.359954]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   15.359983]  kunit_try_run_case+0x1a5/0x480
[   15.360011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.360036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.360063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.360088]  ? __kthread_parkme+0x82/0x180
[   15.360111]  ? preempt_count_sub+0x50/0x80
[   15.360138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.360164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.360189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.360215]  kthread+0x337/0x6f0
[   15.360237]  ? trace_preempt_on+0x20/0xc0
[   15.360264]  ? __pfx_kthread+0x10/0x10
[   15.360286]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.360358]  ? calculate_sigpending+0x7b/0xa0
[   15.360385]  ? __pfx_kthread+0x10/0x10
[   15.360409]  ret_from_fork+0x116/0x1d0
[   15.360432]  ? __pfx_kthread+0x10/0x10
[   15.360455]  ret_from_fork_asm+0x1a/0x30
[   15.360489]  </TASK>
[   15.360504] 
[   15.373992] The buggy address belongs to the physical page:
[   15.374566] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aa8
[   15.374960] flags: 0x200000000000000(node=0|zone=2)
[   15.375690] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   15.376027] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.377278] page dumped because: kasan: bad access detected
[   15.377568] 
[   15.377677] Memory state around the buggy address:
[   15.377938]  ffff888103aa7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.379043]  ffff888103aa7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.379347] >ffff888103aa8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.379812]                    ^
[   15.380070]  ffff888103aa8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.380836]  ffff888103aa8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.381736] ==================================================================
[   15.277854] ==================================================================
[   15.278767] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   15.279055] Read of size 1 at addr ffff888103aa8000 by task kunit_try_catch/247
[   15.279323] 
[   15.279435] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.279489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.279505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.279532] Call Trace:
[   15.279549]  <TASK>
[   15.279572]  dump_stack_lvl+0x73/0xb0
[   15.279608]  print_report+0xd1/0x650
[   15.279636]  ? __virt_addr_valid+0x1db/0x2d0
[   15.279664]  ? mempool_uaf_helper+0x392/0x400
[   15.279690]  ? kasan_addr_to_slab+0x11/0xa0
[   15.279714]  ? mempool_uaf_helper+0x392/0x400
[   15.279739]  kasan_report+0x141/0x180
[   15.279765]  ? mempool_uaf_helper+0x392/0x400
[   15.279810]  __asan_report_load1_noabort+0x18/0x20
[   15.279838]  mempool_uaf_helper+0x392/0x400
[   15.279864]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   15.279891]  ? __kasan_check_write+0x18/0x20
[   15.279914]  ? __pfx_sched_clock_cpu+0x10/0x10
[   15.279939]  ? finish_task_switch.isra.0+0x153/0x700
[   15.279969]  mempool_kmalloc_large_uaf+0xef/0x140
[   15.280067]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   15.280316]  ? __pfx_mempool_kmalloc+0x10/0x10
[   15.280350]  ? __pfx_mempool_kfree+0x10/0x10
[   15.280379]  ? __pfx_read_tsc+0x10/0x10
[   15.280758]  ? ktime_get_ts64+0x86/0x230
[   15.280833]  kunit_try_run_case+0x1a5/0x480
[   15.280877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.280905]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.280934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.281120]  ? __kthread_parkme+0x82/0x180
[   15.281168]  ? preempt_count_sub+0x50/0x80
[   15.281194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.281221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.281248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.281274]  kthread+0x337/0x6f0
[   15.281296]  ? trace_preempt_on+0x20/0xc0
[   15.281325]  ? __pfx_kthread+0x10/0x10
[   15.281352]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.281377]  ? calculate_sigpending+0x7b/0xa0
[   15.281405]  ? __pfx_kthread+0x10/0x10
[   15.281430]  ret_from_fork+0x116/0x1d0
[   15.281451]  ? __pfx_kthread+0x10/0x10
[   15.281475]  ret_from_fork_asm+0x1a/0x30
[   15.281511]  </TASK>
[   15.281526] 
[   15.297395] The buggy address belongs to the physical page:
[   15.298064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aa8
[   15.298778] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.299530] flags: 0x200000000000040(head|node=0|zone=2)
[   15.299938] page_type: f8(unknown)
[   15.300432] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.300852] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.301563] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   15.302308] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.302865] head: 0200000000000002 ffffea00040eaa01 00000000ffffffff 00000000ffffffff
[   15.303722] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.304386] page dumped because: kasan: bad access detected
[   15.304673] 
[   15.304778] Memory state around the buggy address:
[   15.304975]  ffff888103aa7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.305328]  ffff888103aa7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.305683] >ffff888103aa8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.306070]                    ^
[   15.306470]  ffff888103aa8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.306828]  ffff888103aa8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.307204] ==================================================================