Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   49.944094] ==================================================================
[   49.955260] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   49.962062] Read of size 1 at addr ffff000095740000 by task kunit_try_catch/342
[   49.969469] 
[   49.971002] CPU: 6 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   49.971036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.971045] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.971059] Call trace:
[   49.971066]  show_stack+0x20/0x38 (C)
[   49.971087]  dump_stack_lvl+0x8c/0xd0
[   49.971110]  print_report+0x118/0x608
[   49.971130]  kasan_report+0xdc/0x128
[   49.971148]  __asan_report_load1_noabort+0x20/0x30
[   49.971165]  mempool_uaf_helper+0x314/0x340
[   49.971182]  mempool_page_alloc_uaf+0xc0/0x118
[   49.971200]  kunit_try_run_case+0x170/0x3f0
[   49.971220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.971240]  kthread+0x328/0x630
[   49.971255]  ret_from_fork+0x10/0x20
[   49.971273] 
[   50.041449] The buggy address belongs to the physical page:
[   50.047102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115740
[   50.055211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.061837] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.069675] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.077509] page dumped because: kasan: bad access detected
[   50.083150] 
[   50.084681] Memory state around the buggy address:
[   50.089546]  ffff00009573ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.096860]  ffff00009573ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.104172] >ffff000095740000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.111483]                    ^
[   50.114769]  ffff000095740080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.122081]  ffff000095740100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.129395] ==================================================================
[   49.353461] ==================================================================
[   49.364866] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   49.371664] Read of size 1 at addr ffff000095590000 by task kunit_try_catch/338
[   49.379066] 
[   49.380605] CPU: 4 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   49.380639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.380648] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.380663] Call trace:
[   49.380671]  show_stack+0x20/0x38 (C)
[   49.380692]  dump_stack_lvl+0x8c/0xd0
[   49.380715]  print_report+0x118/0x608
[   49.380737]  kasan_report+0xdc/0x128
[   49.380755]  __asan_report_load1_noabort+0x20/0x30
[   49.380773]  mempool_uaf_helper+0x314/0x340
[   49.380789]  mempool_kmalloc_large_uaf+0xc4/0x120
[   49.380808]  kunit_try_run_case+0x170/0x3f0
[   49.380827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.380849]  kthread+0x328/0x630
[   49.380867]  ret_from_fork+0x10/0x20
[   49.380888] 
[   49.451333] The buggy address belongs to the physical page:
[   49.456979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115590
[   49.465084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.472839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.479891] page_type: f8(unknown)
[   49.483353] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.491197] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.499040] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.506967] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.514895] head: 0bfffe0000000002 fffffdffc2556401 00000000ffffffff 00000000ffffffff
[   49.522821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   49.530744] page dumped because: kasan: bad access detected
[   49.536384] 
[   49.537909] Memory state around the buggy address:
[   49.542763]  ffff00009558ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.550080]  ffff00009558ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.557398] >ffff000095590000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.564712]                    ^
[   49.567992]  ffff000095590080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.575310]  ffff000095590100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.582617] ==================================================================

[   33.119314] ==================================================================
[   33.119431] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.119877] Read of size 1 at addr fff00000c9c78000 by task kunit_try_catch/265
[   33.119932] 
[   33.119974] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.120145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.120209] Hardware name: linux,dummy-virt (DT)
[   33.120572] Call trace:
[   33.120799]  show_stack+0x20/0x38 (C)
[   33.120893]  dump_stack_lvl+0x8c/0xd0
[   33.120955]  print_report+0x118/0x608
[   33.121166]  kasan_report+0xdc/0x128
[   33.121220]  __asan_report_load1_noabort+0x20/0x30
[   33.121270]  mempool_uaf_helper+0x314/0x340
[   33.121318]  mempool_page_alloc_uaf+0xc0/0x118
[   33.121367]  kunit_try_run_case+0x170/0x3f0
[   33.121421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.121972]  kthread+0x328/0x630
[   33.122285]  ret_from_fork+0x10/0x20
[   33.122439] 
[   33.122493] The buggy address belongs to the physical page:
[   33.122569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c78
[   33.122668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.122741] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.122794] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.122853] page dumped because: kasan: bad access detected
[   33.122995] 
[   33.123075] Memory state around the buggy address:
[   33.123223]  fff00000c9c77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.123360]  fff00000c9c77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.123453] >fff00000c9c78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.123512]                    ^
[   33.123622]  fff00000c9c78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.123677]  fff00000c9c78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.123717] ==================================================================
[   33.066033] ==================================================================
[   33.066508] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.066927] Read of size 1 at addr fff00000c9c78000 by task kunit_try_catch/261
[   33.066996] 
[   33.067036] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.067361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.067389] Hardware name: linux,dummy-virt (DT)
[   33.067425] Call trace:
[   33.067447]  show_stack+0x20/0x38 (C)
[   33.067499]  dump_stack_lvl+0x8c/0xd0
[   33.067550]  print_report+0x118/0x608
[   33.067599]  kasan_report+0xdc/0x128
[   33.067645]  __asan_report_load1_noabort+0x20/0x30
[   33.067695]  mempool_uaf_helper+0x314/0x340
[   33.068574]  mempool_kmalloc_large_uaf+0xc4/0x120
[   33.068744]  kunit_try_run_case+0x170/0x3f0
[   33.068797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.069010]  kthread+0x328/0x630
[   33.069372]  ret_from_fork+0x10/0x20
[   33.069422] 
[   33.069789] The buggy address belongs to the physical page:
[   33.069825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c78
[   33.070135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.070356] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.070846] page_type: f8(unknown)
[   33.070898] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.070949] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.071525] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.071748] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.072228] head: 0bfffe0000000002 ffffc1ffc3271e01 00000000ffffffff 00000000ffffffff
[   33.072552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.072600] page dumped because: kasan: bad access detected
[   33.072863] 
[   33.072886] Memory state around the buggy address:
[   33.072936]  fff00000c9c77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.073125]  fff00000c9c77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.073171] >fff00000c9c78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.073557]                    ^
[   33.073787]  fff00000c9c78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.074063]  fff00000c9c78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.074363] ==================================================================

[   24.705697] ==================================================================
[   24.706892] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   24.707732] Read of size 1 at addr ffff88810607c000 by task kunit_try_catch/278
[   24.708574] 
[   24.708806] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.708871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.708893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.708917] Call Trace:
[   24.708931]  <TASK>
[   24.708949]  dump_stack_lvl+0x73/0xb0
[   24.708993]  print_report+0xd1/0x650
[   24.709016]  ? __virt_addr_valid+0x1db/0x2d0
[   24.709041]  ? mempool_uaf_helper+0x392/0x400
[   24.709062]  ? kasan_addr_to_slab+0x11/0xa0
[   24.709086]  ? mempool_uaf_helper+0x392/0x400
[   24.709109]  kasan_report+0x141/0x180
[   24.709131]  ? mempool_uaf_helper+0x392/0x400
[   24.709157]  __asan_report_load1_noabort+0x18/0x20
[   24.709181]  mempool_uaf_helper+0x392/0x400
[   24.709243]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   24.709267]  ? __call_rcu_common.constprop.0+0x455/0x9e0
[   24.709293]  ? __pfx_task_dead_fair+0x10/0x10
[   24.709323]  mempool_kmalloc_large_uaf+0xef/0x140
[   24.709346]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   24.709372]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.709395]  ? __pfx_mempool_kfree+0x10/0x10
[   24.709420]  ? __pfx_read_tsc+0x10/0x10
[   24.709443]  ? ktime_get_ts64+0x86/0x230
[   24.709478]  kunit_try_run_case+0x1a5/0x480
[   24.709504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.709527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.709550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.709576]  ? __kthread_parkme+0x82/0x180
[   24.709597]  ? preempt_count_sub+0x50/0x80
[   24.709620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.709645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.709669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.709693]  kthread+0x337/0x6f0
[   24.709713]  ? trace_preempt_on+0x20/0xc0
[   24.709736]  ? __pfx_kthread+0x10/0x10
[   24.709757]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.709783]  ? calculate_sigpending+0x7b/0xa0
[   24.709807]  ? __pfx_kthread+0x10/0x10
[   24.709829]  ret_from_fork+0x116/0x1d0
[   24.709853]  ? __pfx_kthread+0x10/0x10
[   24.709873]  ret_from_fork_asm+0x1a/0x30
[   24.709905]  </TASK>
[   24.709916] 
[   24.721167] The buggy address belongs to the physical page:
[   24.721941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10607c
[   24.722516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.722851] flags: 0x200000000000040(head|node=0|zone=2)
[   24.723171] page_type: f8(unknown)
[   24.723401] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.723909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.724408] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.724828] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.725272] head: 0200000000000002 ffffea0004181f01 00000000ffffffff 00000000ffffffff
[   24.725742] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.726183] page dumped because: kasan: bad access detected
[   24.726683] 
[   24.726778] Memory state around the buggy address:
[   24.726986]  ffff88810607bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.727679]  ffff88810607bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.727941] >ffff88810607c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.728590]                    ^
[   24.728758]  ffff88810607c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.729201]  ffff88810607c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.729610] ==================================================================
[   24.768672] ==================================================================
[   24.770154] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   24.771494] Read of size 1 at addr ffff88810607c000 by task kunit_try_catch/282
[   24.772281] 
[   24.772381] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.772434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.772448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.772482] Call Trace:
[   24.772495]  <TASK>
[   24.772512]  dump_stack_lvl+0x73/0xb0
[   24.772542]  print_report+0xd1/0x650
[   24.772564]  ? __virt_addr_valid+0x1db/0x2d0
[   24.772588]  ? mempool_uaf_helper+0x392/0x400
[   24.772610]  ? kasan_addr_to_slab+0x11/0xa0
[   24.772634]  ? mempool_uaf_helper+0x392/0x400
[   24.772656]  kasan_report+0x141/0x180
[   24.772678]  ? mempool_uaf_helper+0x392/0x400
[   24.772704]  __asan_report_load1_noabort+0x18/0x20
[   24.772728]  mempool_uaf_helper+0x392/0x400
[   24.772750]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   24.772773]  ? __kasan_check_write+0x18/0x20
[   24.772796]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.772818]  ? finish_task_switch.isra.0+0x153/0x700
[   24.772844]  mempool_page_alloc_uaf+0xed/0x140
[   24.772868]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   24.772893]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   24.772916]  ? __pfx_mempool_free_pages+0x10/0x10
[   24.772942]  ? __pfx_read_tsc+0x10/0x10
[   24.772963]  ? ktime_get_ts64+0x86/0x230
[   24.772987]  kunit_try_run_case+0x1a5/0x480
[   24.773012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.773036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.773056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.773082]  ? __kthread_parkme+0x82/0x180
[   24.773103]  ? preempt_count_sub+0x50/0x80
[   24.773125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.773193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.773219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.773244]  kthread+0x337/0x6f0
[   24.773264]  ? trace_preempt_on+0x20/0xc0
[   24.773286]  ? __pfx_kthread+0x10/0x10
[   24.773307]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.773331]  ? calculate_sigpending+0x7b/0xa0
[   24.773354]  ? __pfx_kthread+0x10/0x10
[   24.773376]  ret_from_fork+0x116/0x1d0
[   24.773394]  ? __pfx_kthread+0x10/0x10
[   24.773415]  ret_from_fork_asm+0x1a/0x30
[   24.773445]  </TASK>
[   24.773469] 
[   24.784003] The buggy address belongs to the physical page:
[   24.784513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10607c
[   24.784853] flags: 0x200000000000000(node=0|zone=2)
[   24.785073] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   24.785803] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.786404] page dumped because: kasan: bad access detected
[   24.786772] 
[   24.786999] Memory state around the buggy address:
[   24.787407]  ffff88810607bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.788005]  ffff88810607bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.788549] >ffff88810607c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.789056]                    ^
[   24.789249]  ffff88810607c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.789545]  ffff88810607c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.789862] ==================================================================