Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   38.943837] ==================================================================
[   38.958235] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   38.964566] Read of size 1 at addr ffff0008084e0000 by task kunit_try_catch/238
[   38.971857] 
[   38.973346] CPU: 5 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   38.973406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.973421] Hardware name: WinLink E850-96 board (DT)
[   38.973442] Call trace:
[   38.973455]  show_stack+0x20/0x38 (C)
[   38.973492]  dump_stack_lvl+0x8c/0xd0
[   38.973525]  print_report+0x118/0x5d0
[   38.973553]  kasan_report+0xdc/0x128
[   38.973580]  __asan_report_load1_noabort+0x20/0x30
[   38.973613]  page_alloc_uaf+0x328/0x350
[   38.973646]  kunit_try_run_case+0x170/0x3f0
[   38.973684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.973718]  kthread+0x328/0x630
[   38.973748]  ret_from_fork+0x10/0x20
[   38.973782] 
[   39.037049] The buggy address belongs to the physical page:
[   39.042606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884e0
[   39.050592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.057100] page_type: f0(buddy)
[   39.060322] raw: 0bfffe0000000000 ffff00087f61bd08 ffff00087f61bd08 0000000000000000
[   39.068042] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   39.075762] page dumped because: kasan: bad access detected
[   39.081317] 
[   39.082792] Memory state around the buggy address:
[   39.087572]  ffff0008084dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.094775]  ffff0008084dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.101982] >ffff0008084e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.109181]                    ^
[   39.112396]  ffff0008084e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.119601]  ffff0008084e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.126805] ==================================================================

[   30.157464] ==================================================================
[   30.157590] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.157661] Read of size 1 at addr fff00000c9aa0000 by task kunit_try_catch/185
[   30.157720] 
[   30.157760] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.158061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.158175] Hardware name: linux,dummy-virt (DT)
[   30.158286] Call trace:
[   30.158435]  show_stack+0x20/0x38 (C)
[   30.158594]  dump_stack_lvl+0x8c/0xd0
[   30.158673]  print_report+0x118/0x5d0
[   30.158782]  kasan_report+0xdc/0x128
[   30.158881]  __asan_report_load1_noabort+0x20/0x30
[   30.159154]  page_alloc_uaf+0x328/0x350
[   30.159282]  kunit_try_run_case+0x170/0x3f0
[   30.159386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.159525]  kthread+0x328/0x630
[   30.159621]  ret_from_fork+0x10/0x20
[   30.159982] 
[   30.160030] The buggy address belongs to the physical page:
[   30.160168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa0
[   30.160282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.160351] page_type: f0(buddy)
[   30.160546] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000
[   30.160636] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   30.160749] page dumped because: kasan: bad access detected
[   30.160809] 
[   30.160928] Memory state around the buggy address:
[   30.160966]  fff00000c9a9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161041]  fff00000c9a9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161280] >fff00000c9aa0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161458]                    ^
[   30.161515]  fff00000c9aa0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161592]  fff00000c9aa0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.161670] ==================================================================

[   23.315432] ==================================================================
[   23.316055] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   23.316335] Read of size 1 at addr ffff888102bd0000 by task kunit_try_catch/204
[   23.316933] 
[   23.317052] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.317118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.317130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.317152] Call Trace:
[   23.317166]  <TASK>
[   23.317185]  dump_stack_lvl+0x73/0xb0
[   23.317226]  print_report+0xd1/0x610
[   23.317248]  ? __virt_addr_valid+0x1db/0x2d0
[   23.317273]  ? page_alloc_uaf+0x356/0x3d0
[   23.317305]  ? kasan_addr_to_slab+0x11/0xa0
[   23.317325]  ? page_alloc_uaf+0x356/0x3d0
[   23.317346]  kasan_report+0x141/0x180
[   23.317368]  ? page_alloc_uaf+0x356/0x3d0
[   23.317394]  __asan_report_load1_noabort+0x18/0x20
[   23.317417]  page_alloc_uaf+0x356/0x3d0
[   23.317492]  ? __pfx_page_alloc_uaf+0x10/0x10
[   23.317520]  ? __schedule+0x10cc/0x2b60
[   23.317543]  ? __pfx_read_tsc+0x10/0x10
[   23.317590]  ? ktime_get_ts64+0x86/0x230
[   23.317616]  kunit_try_run_case+0x1a5/0x480
[   23.317647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.317668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.317691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.317715]  ? __kthread_parkme+0x82/0x180
[   23.317746]  ? preempt_count_sub+0x50/0x80
[   23.317770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.317792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.317816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.317841]  kthread+0x337/0x6f0
[   23.317861]  ? trace_preempt_on+0x20/0xc0
[   23.317884]  ? __pfx_kthread+0x10/0x10
[   23.317904]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.317925]  ? calculate_sigpending+0x7b/0xa0
[   23.317950]  ? __pfx_kthread+0x10/0x10
[   23.317971]  ret_from_fork+0x116/0x1d0
[   23.317990]  ? __pfx_kthread+0x10/0x10
[   23.318011]  ret_from_fork_asm+0x1a/0x30
[   23.318042]  </TASK>
[   23.318054] 
[   23.326697] The buggy address belongs to the physical page:
[   23.326969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd0
[   23.328953] flags: 0x200000000000000(node=0|zone=2)
[   23.329320] page_type: f0(buddy)
[   23.329444] raw: 0200000000000000 ffff88817fffc460 ffff88817fffc460 0000000000000000
[   23.329667] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   23.330031] page dumped because: kasan: bad access detected
[   23.330230] 
[   23.330356] Memory state around the buggy address:
[   23.330627]  ffff888102bcff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.330978]  ffff888102bcff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.331288] >ffff888102bd0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.331493]                    ^
[   23.332450]  ffff888102bd0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.332670]  ffff888102bd0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.333001] ==================================================================