Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   54.565178] ==================================================================
[   54.565370] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   54.571283] Read of size 1 at addr ffff000806dcc000 by task kunit_try_catch/317
[   54.578573] 
[   54.580061] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   54.580117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.580135] Hardware name: WinLink E850-96 board (DT)
[   54.580158] Call trace:
[   54.580173]  show_stack+0x20/0x38 (C)
[   54.580211]  dump_stack_lvl+0x8c/0xd0
[   54.580245]  print_report+0x118/0x5d0
[   54.580276]  kasan_report+0xdc/0x128
[   54.580304]  __asan_report_load1_noabort+0x20/0x30
[   54.580337]  mempool_uaf_helper+0x314/0x340
[   54.580372]  mempool_page_alloc_uaf+0xc0/0x118
[   54.580408]  kunit_try_run_case+0x170/0x3f0
[   54.580449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.580482]  kthread+0x328/0x630
[   54.580512]  ret_from_fork+0x10/0x20
[   54.580546] 
[   54.648541] The buggy address belongs to the physical page:
[   54.654096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dcc
[   54.662084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.668605] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.676321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.684041] page dumped because: kasan: bad access detected
[   54.689595] 
[   54.691071] Memory state around the buggy address:
[   54.695851]  ffff000806dcbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.703054]  ffff000806dcbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.710260] >ffff000806dcc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.717459]                    ^
[   54.720675]  ffff000806dcc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.727880]  ffff000806dcc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.735084] ==================================================================
[   53.998812] ==================================================================
[   54.008188] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   54.014870] Read of size 1 at addr ffff000805b50000 by task kunit_try_catch/313
[   54.022158] 
[   54.023645] CPU: 3 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   54.023704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.023721] Hardware name: WinLink E850-96 board (DT)
[   54.023743] Call trace:
[   54.023759]  show_stack+0x20/0x38 (C)
[   54.023797]  dump_stack_lvl+0x8c/0xd0
[   54.023830]  print_report+0x118/0x5d0
[   54.023861]  kasan_report+0xdc/0x128
[   54.023888]  __asan_report_load1_noabort+0x20/0x30
[   54.023923]  mempool_uaf_helper+0x314/0x340
[   54.023954]  mempool_kmalloc_large_uaf+0xc4/0x120
[   54.023986]  kunit_try_run_case+0x170/0x3f0
[   54.024028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.024060]  kthread+0x328/0x630
[   54.024091]  ret_from_fork+0x10/0x20
[   54.024129] 
[   54.092387] The buggy address belongs to the physical page:
[   54.097942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50
[   54.105926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.113566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.120508] page_type: f8(unknown)
[   54.123906] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.131625] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.139351] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.147162] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.154975] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff
[   54.162787] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   54.170593] page dumped because: kasan: bad access detected
[   54.176148] 
[   54.177624] Memory state around the buggy address:
[   54.182407]  ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.189607]  ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.196815] >ffff000805b50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.204012]                    ^
[   54.207228]  ffff000805b50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.214433]  ffff000805b50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.221634] ==================================================================

[   32.441177] ==================================================================
[   32.441243] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.441314] Read of size 1 at addr fff00000c9b64000 by task kunit_try_catch/260
[   32.441381] 
[   32.441416] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.441768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.441803] Hardware name: linux,dummy-virt (DT)
[   32.441836] Call trace:
[   32.441861]  show_stack+0x20/0x38 (C)
[   32.441964]  dump_stack_lvl+0x8c/0xd0
[   32.442128]  print_report+0x118/0x5d0
[   32.442216]  kasan_report+0xdc/0x128
[   32.442289]  __asan_report_load1_noabort+0x20/0x30
[   32.442387]  mempool_uaf_helper+0x314/0x340
[   32.442469]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.442576]  kunit_try_run_case+0x170/0x3f0
[   32.442627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.442812]  kthread+0x328/0x630
[   32.442890]  ret_from_fork+0x10/0x20
[   32.442988] 
[   32.443069] The buggy address belongs to the physical page:
[   32.443139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b64
[   32.443238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.443353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.443419] page_type: f8(unknown)
[   32.443486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.443549] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.443743] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.443866] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.443937] head: 0bfffe0000000002 ffffc1ffc326d901 00000000ffffffff 00000000ffffffff
[   32.443986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.444026] page dumped because: kasan: bad access detected
[   32.444235] 
[   32.444329] Memory state around the buggy address:
[   32.444406]  fff00000c9b63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444536]  fff00000c9b63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444580] >fff00000c9b64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444652]                    ^
[   32.444800]  fff00000c9b64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.444961]  fff00000c9b64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.445074] ==================================================================
[   32.483685] ==================================================================
[   32.483769] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.483857] Read of size 1 at addr fff00000c9b68000 by task kunit_try_catch/264
[   32.484036] 
[   32.484132] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.484250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.484302] Hardware name: linux,dummy-virt (DT)
[   32.484428] Call trace:
[   32.484477]  show_stack+0x20/0x38 (C)
[   32.484552]  dump_stack_lvl+0x8c/0xd0
[   32.484634]  print_report+0x118/0x5d0
[   32.484680]  kasan_report+0xdc/0x128
[   32.484721]  __asan_report_load1_noabort+0x20/0x30
[   32.484769]  mempool_uaf_helper+0x314/0x340
[   32.484815]  mempool_page_alloc_uaf+0xc0/0x118
[   32.484911]  kunit_try_run_case+0x170/0x3f0
[   32.484979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.485030]  kthread+0x328/0x630
[   32.485073]  ret_from_fork+0x10/0x20
[   32.485285] 
[   32.485320] The buggy address belongs to the physical page:
[   32.485555] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68
[   32.485683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.485787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.485896] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.485984] page dumped because: kasan: bad access detected
[   32.486076] 
[   32.486140] Memory state around the buggy address:
[   32.486199]  fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486269]  fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486394] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486482]                    ^
[   32.486540]  fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486622]  fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.486672] ==================================================================

[   25.370368] ==================================================================
[   25.370969] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   25.371504] Read of size 1 at addr ffff888102ba8000 by task kunit_try_catch/279
[   25.372045] 
[   25.372165] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.372223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.372236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.372263] Call Trace:
[   25.372523]  <TASK>
[   25.372547]  dump_stack_lvl+0x73/0xb0
[   25.372586]  print_report+0xd1/0x610
[   25.372609]  ? __virt_addr_valid+0x1db/0x2d0
[   25.372635]  ? mempool_uaf_helper+0x392/0x400
[   25.372657]  ? kasan_addr_to_slab+0x11/0xa0
[   25.372678]  ? mempool_uaf_helper+0x392/0x400
[   25.372700]  kasan_report+0x141/0x180
[   25.372722]  ? mempool_uaf_helper+0x392/0x400
[   25.372763]  __asan_report_load1_noabort+0x18/0x20
[   25.372787]  mempool_uaf_helper+0x392/0x400
[   25.372810]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.372833]  ? __kasan_check_write+0x18/0x20
[   25.372858]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.372882]  ? finish_task_switch.isra.0+0x153/0x700
[   25.372910]  mempool_kmalloc_large_uaf+0xef/0x140
[   25.372934]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   25.372959]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.372983]  ? __pfx_mempool_kfree+0x10/0x10
[   25.373008]  ? __pfx_read_tsc+0x10/0x10
[   25.373031]  ? ktime_get_ts64+0x86/0x230
[   25.373057]  kunit_try_run_case+0x1a5/0x480
[   25.373083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.373103]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.373129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.373152]  ? __kthread_parkme+0x82/0x180
[   25.373174]  ? preempt_count_sub+0x50/0x80
[   25.373198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.373220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.373246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.373307]  kthread+0x337/0x6f0
[   25.373331]  ? trace_preempt_on+0x20/0xc0
[   25.373356]  ? __pfx_kthread+0x10/0x10
[   25.373378]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.373400]  ? calculate_sigpending+0x7b/0xa0
[   25.373439]  ? __pfx_kthread+0x10/0x10
[   25.373462]  ret_from_fork+0x116/0x1d0
[   25.373483]  ? __pfx_kthread+0x10/0x10
[   25.373504]  ret_from_fork_asm+0x1a/0x30
[   25.373535]  </TASK>
[   25.373547] 
[   25.385716] The buggy address belongs to the physical page:
[   25.386200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba8
[   25.386873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.387296] flags: 0x200000000000040(head|node=0|zone=2)
[   25.387750] page_type: f8(unknown)
[   25.388020] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.388536] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.388937] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.389270] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.389866] head: 0200000000000002 ffffea00040aea01 00000000ffffffff 00000000ffffffff
[   25.390352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.390796] page dumped because: kasan: bad access detected
[   25.391029] 
[   25.391104] Memory state around the buggy address:
[   25.391572]  ffff888102ba7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.391982]  ffff888102ba7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.392478] >ffff888102ba8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.392771]                    ^
[   25.392928]  ffff888102ba8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.393218]  ffff888102ba8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.393833] ==================================================================
[   25.450758] ==================================================================
[   25.451182] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   25.451420] Read of size 1 at addr ffff888102ba8000 by task kunit_try_catch/283
[   25.451636] 
[   25.451727] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   25.451795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.451808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.451833] Call Trace:
[   25.451847]  <TASK>
[   25.451867]  dump_stack_lvl+0x73/0xb0
[   25.451899]  print_report+0xd1/0x610
[   25.451922]  ? __virt_addr_valid+0x1db/0x2d0
[   25.451947]  ? mempool_uaf_helper+0x392/0x400
[   25.451968]  ? kasan_addr_to_slab+0x11/0xa0
[   25.451988]  ? mempool_uaf_helper+0x392/0x400
[   25.452010]  kasan_report+0x141/0x180
[   25.452031]  ? mempool_uaf_helper+0x392/0x400
[   25.452057]  __asan_report_load1_noabort+0x18/0x20
[   25.452086]  mempool_uaf_helper+0x392/0x400
[   25.452110]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.452132]  ? __kasan_check_write+0x18/0x20
[   25.452156]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.452178]  ? finish_task_switch.isra.0+0x153/0x700
[   25.452204]  mempool_page_alloc_uaf+0xed/0x140
[   25.452227]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   25.452252]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.452276]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.452302]  ? __pfx_read_tsc+0x10/0x10
[   25.452329]  ? ktime_get_ts64+0x86/0x230
[   25.452355]  kunit_try_run_case+0x1a5/0x480
[   25.452378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.452398]  ? irqentry_exit+0x2a/0x60
[   25.452424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.452453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.452475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.452499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.452523]  kthread+0x337/0x6f0
[   25.452544]  ? trace_preempt_on+0x20/0xc0
[   25.452567]  ? __pfx_kthread+0x10/0x10
[   25.452589]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.452610]  ? calculate_sigpending+0x7b/0xa0
[   25.452635]  ? __pfx_kthread+0x10/0x10
[   25.452657]  ret_from_fork+0x116/0x1d0
[   25.452675]  ? __pfx_kthread+0x10/0x10
[   25.452696]  ret_from_fork_asm+0x1a/0x30
[   25.452727]  </TASK>
[   25.453116] 
[   25.473325] The buggy address belongs to the physical page:
[   25.473944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba8
[   25.474550] flags: 0x200000000000000(node=0|zone=2)
[   25.474799] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.475607] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.476338] page dumped because: kasan: bad access detected
[   25.476836] 
[   25.477026] Memory state around the buggy address:
[   25.477554]  ffff888102ba7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.477820]  ffff888102ba7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.478492] >ffff888102ba8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.479073]                    ^
[   25.479414]  ffff888102ba8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.480004]  ffff888102ba8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.480441] ==================================================================