Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   38.901456] ==================================================================
[   38.915907] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   38.922239] Read of size 1 at addr ffff000808600000 by task kunit_try_catch/238
[   38.929532] 
[   38.931016] CPU: 2 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   38.931069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.931085] Hardware name: WinLink E850-96 board (DT)
[   38.931106] Call trace:
[   38.931122]  show_stack+0x20/0x38 (C)
[   38.931156]  dump_stack_lvl+0x8c/0xd0
[   38.931191]  print_report+0x118/0x5d0
[   38.931221]  kasan_report+0xdc/0x128
[   38.931246]  __asan_report_load1_noabort+0x20/0x30
[   38.931278]  page_alloc_uaf+0x328/0x350
[   38.931311]  kunit_try_run_case+0x170/0x3f0
[   38.931352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.931384]  kthread+0x328/0x630
[   38.931416]  ret_from_fork+0x10/0x20
[   38.931448] 
[   38.994724] The buggy address belongs to the physical page:
[   39.000281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888600
[   39.008264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.014775] page_type: f0(buddy)
[   39.017997] raw: 0bfffe0000000000 ffff00087f61bea8 ffff00087f61bea8 0000000000000000
[   39.025716] raw: 0000000000000000 0000000000000009 00000000f0000000 0000000000000000
[   39.033437] page dumped because: kasan: bad access detected
[   39.038991] 
[   39.040466] Memory state around the buggy address:
[   39.045246]  ffff0008085fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.052449]  ffff0008085fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.059655] >ffff000808600000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.066855]                    ^
[   39.070070]  ffff000808600080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.077275]  ffff000808600100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.084478] ==================================================================

[   29.403312] ==================================================================
[   29.403440] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.403506] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/185
[   29.403888] 
[   29.404082] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.404384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.404872] Hardware name: linux,dummy-virt (DT)
[   29.405008] Call trace:
[   29.405032]  show_stack+0x20/0x38 (C)
[   29.405139]  dump_stack_lvl+0x8c/0xd0
[   29.405192]  print_report+0x118/0x5d0
[   29.405237]  kasan_report+0xdc/0x128
[   29.405279]  __asan_report_load1_noabort+0x20/0x30
[   29.405405]  page_alloc_uaf+0x328/0x350
[   29.405615]  kunit_try_run_case+0x170/0x3f0
[   29.405664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.405715]  kthread+0x328/0x630
[   29.405757]  ret_from_fork+0x10/0x20
[   29.405872] 
[   29.405978] The buggy address belongs to the physical page:
[   29.406077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40
[   29.406133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.406183] page_type: f0(buddy)
[   29.406249] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000
[   29.407097] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   29.407195] page dumped because: kasan: bad access detected
[   29.407243] 
[   29.407291] Memory state around the buggy address:
[   29.407878]  fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.407928]  fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.407970] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.408006]                    ^
[   29.408103]  fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.408254]  fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.408291] ==================================================================

[   23.796809] ==================================================================
[   23.797534] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   23.797798] Read of size 1 at addr ffff8881058c0000 by task kunit_try_catch/203
[   23.798278] 
[   23.798396] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.798450] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.798463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.798486] Call Trace:
[   23.798501]  <TASK>
[   23.798519]  dump_stack_lvl+0x73/0xb0
[   23.798551]  print_report+0xd1/0x610
[   23.798573]  ? __virt_addr_valid+0x1db/0x2d0
[   23.798596]  ? page_alloc_uaf+0x356/0x3d0
[   23.798616]  ? kasan_addr_to_slab+0x11/0xa0
[   23.798635]  ? page_alloc_uaf+0x356/0x3d0
[   23.798670]  kasan_report+0x141/0x180
[   23.798691]  ? page_alloc_uaf+0x356/0x3d0
[   23.798716]  __asan_report_load1_noabort+0x18/0x20
[   23.798739]  page_alloc_uaf+0x356/0x3d0
[   23.798759]  ? __pfx_page_alloc_uaf+0x10/0x10
[   23.798781]  ? __schedule+0x10cc/0x2b60
[   23.798804]  ? __pfx_read_tsc+0x10/0x10
[   23.798824]  ? ktime_get_ts64+0x86/0x230
[   23.798848]  kunit_try_run_case+0x1a5/0x480
[   23.798889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.798908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.798930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.799002]  ? __kthread_parkme+0x82/0x180
[   23.799023]  ? preempt_count_sub+0x50/0x80
[   23.799046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.799067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.799091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.799116]  kthread+0x337/0x6f0
[   23.799135]  ? trace_preempt_on+0x20/0xc0
[   23.799158]  ? __pfx_kthread+0x10/0x10
[   23.799178]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.799199]  ? calculate_sigpending+0x7b/0xa0
[   23.799222]  ? __pfx_kthread+0x10/0x10
[   23.799243]  ret_from_fork+0x116/0x1d0
[   23.799261]  ? __pfx_kthread+0x10/0x10
[   23.799281]  ret_from_fork_asm+0x1a/0x30
[   23.799311]  </TASK>
[   23.799322] 
[   23.809822] The buggy address belongs to the physical page:
[   23.810256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c0
[   23.810835] flags: 0x200000000000000(node=0|zone=2)
[   23.811193] page_type: f0(buddy)
[   23.811368] raw: 0200000000000000 ffff88817fffd4f0 ffff88817fffd4f0 0000000000000000
[   23.811672] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   23.811961] page dumped because: kasan: bad access detected
[   23.812312] 
[   23.812436] Memory state around the buggy address:
[   23.812932]  ffff8881058bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.813354]  ffff8881058bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.813639] >ffff8881058c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.814167]                    ^
[   23.814300]  ffff8881058c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.814779]  ffff8881058c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.815217] ==================================================================