Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   54.499193] ==================================================================
[   54.499379] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   54.499503] Read of size 1 at addr ffff00080506c000 by task kunit_try_catch/314
[   54.501862] 
[   54.503351] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   54.503414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.503431] Hardware name: WinLink E850-96 board (DT)
[   54.503455] Call trace:
[   54.503468]  show_stack+0x20/0x38 (C)
[   54.503505]  dump_stack_lvl+0x8c/0xd0
[   54.503541]  print_report+0x118/0x5d0
[   54.503570]  kasan_report+0xdc/0x128
[   54.503598]  __asan_report_load1_noabort+0x20/0x30
[   54.503635]  mempool_uaf_helper+0x314/0x340
[   54.503667]  mempool_page_alloc_uaf+0xc0/0x118
[   54.503705]  kunit_try_run_case+0x170/0x3f0
[   54.503734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.503768]  kthread+0x328/0x630
[   54.503796]  ret_from_fork+0x10/0x20
[   54.503830] 
[   54.571831] The buggy address belongs to the physical page:
[   54.577386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88506c
[   54.585371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.591891] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.599611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.607331] page dumped because: kasan: bad access detected
[   54.612885] 
[   54.614360] Memory state around the buggy address:
[   54.619144]  ffff00080506bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.626343]  ffff00080506bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.633548] >ffff00080506c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.640749]                    ^
[   54.643964]  ffff00080506c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.651169]  ffff00080506c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.658372] ==================================================================
[   53.918341] ==================================================================
[   53.927805] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   53.934488] Read of size 1 at addr ffff000803ec8000 by task kunit_try_catch/310
[   53.941778] 
[   53.943263] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   53.943321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.943337] Hardware name: WinLink E850-96 board (DT)
[   53.943361] Call trace:
[   53.943374]  show_stack+0x20/0x38 (C)
[   53.943409]  dump_stack_lvl+0x8c/0xd0
[   53.943445]  print_report+0x118/0x5d0
[   53.943471]  kasan_report+0xdc/0x128
[   53.943497]  __asan_report_load1_noabort+0x20/0x30
[   53.943531]  mempool_uaf_helper+0x314/0x340
[   53.943565]  mempool_kmalloc_large_uaf+0xc4/0x120
[   53.943602]  kunit_try_run_case+0x170/0x3f0
[   53.943634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.943667]  kthread+0x328/0x630
[   53.943694]  ret_from_fork+0x10/0x20
[   53.943729] 
[   54.012003] The buggy address belongs to the physical page:
[   54.017560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883ec8
[   54.025544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.033183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.040126] page_type: f8(unknown)
[   54.043522] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.051243] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.058970] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.066780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.074593] head: 0bfffe0000000002 fffffdffe00fb201 00000000ffffffff 00000000ffffffff
[   54.082405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   54.090213] page dumped because: kasan: bad access detected
[   54.095766] 
[   54.097241] Memory state around the buggy address:
[   54.102025]  ffff000803ec7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.109224]  ffff000803ec7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.116429] >ffff000803ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.123630]                    ^
[   54.126846]  ffff000803ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.134050]  ffff000803ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.141253] ==================================================================

[   32.649604] ==================================================================
[   32.649665] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.649725] Read of size 1 at addr fff00000c6398000 by task kunit_try_catch/261
[   32.649774] 
[   32.649811] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.649898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.649925] Hardware name: linux,dummy-virt (DT)
[   32.649958] Call trace:
[   32.649983]  show_stack+0x20/0x38 (C)
[   32.650041]  dump_stack_lvl+0x8c/0xd0
[   32.650283]  print_report+0x118/0x5d0
[   32.650413]  kasan_report+0xdc/0x128
[   32.650465]  __asan_report_load1_noabort+0x20/0x30
[   32.650514]  mempool_uaf_helper+0x314/0x340
[   32.650560]  mempool_kmalloc_large_uaf+0xc4/0x120
[   32.650608]  kunit_try_run_case+0x170/0x3f0
[   32.650787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.651113]  kthread+0x328/0x630
[   32.651215]  ret_from_fork+0x10/0x20
[   32.651569] 
[   32.651592] The buggy address belongs to the physical page:
[   32.651626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398
[   32.651792] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.651848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.651903] page_type: f8(unknown)
[   32.651944] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.652135] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.652185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.652412] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.652473] head: 0bfffe0000000002 ffffc1ffc318e601 00000000ffffffff 00000000ffffffff
[   32.652550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.652605] page dumped because: kasan: bad access detected
[   32.652726] 
[   32.652745] Memory state around the buggy address:
[   32.652777]  fff00000c6397f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.652819]  fff00000c6397f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.652902] >fff00000c6398000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.653452]                    ^
[   32.653582]  fff00000c6398080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.653761]  fff00000c6398100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.653803] ==================================================================
[   32.713571] ==================================================================
[   32.713664] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.714338] Read of size 1 at addr fff00000c9b28000 by task kunit_try_catch/265
[   32.714431] 
[   32.714539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.714845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.714876] Hardware name: linux,dummy-virt (DT)
[   32.714910] Call trace:
[   32.714937]  show_stack+0x20/0x38 (C)
[   32.715091]  dump_stack_lvl+0x8c/0xd0
[   32.715157]  print_report+0x118/0x5d0
[   32.715202]  kasan_report+0xdc/0x128
[   32.715255]  __asan_report_load1_noabort+0x20/0x30
[   32.715466]  mempool_uaf_helper+0x314/0x340
[   32.715532]  mempool_page_alloc_uaf+0xc0/0x118
[   32.715602]  kunit_try_run_case+0x170/0x3f0
[   32.715653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.715846]  kthread+0x328/0x630
[   32.715902]  ret_from_fork+0x10/0x20
[   32.715950] 
[   32.715972] The buggy address belongs to the physical page:
[   32.716248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b28
[   32.716353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.716495] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.716625] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.716710] page dumped because: kasan: bad access detected
[   32.716853] 
[   32.716871] Memory state around the buggy address:
[   32.716964]  fff00000c9b27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717044]  fff00000c9b27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717134] >fff00000c9b28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717185]                    ^
[   32.717249]  fff00000c9b28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717407]  fff00000c9b28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.717477] ==================================================================

[   25.592211] ==================================================================
[   25.592637] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   25.592939] Read of size 1 at addr ffff888106128000 by task kunit_try_catch/277
[   25.593225] 
[   25.593335] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.593387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.593400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.593423] Call Trace:
[   25.593436]  <TASK>
[   25.593455]  dump_stack_lvl+0x73/0xb0
[   25.593487]  print_report+0xd1/0x610
[   25.593510]  ? __virt_addr_valid+0x1db/0x2d0
[   25.593549]  ? mempool_uaf_helper+0x392/0x400
[   25.593571]  ? kasan_addr_to_slab+0x11/0xa0
[   25.593592]  ? mempool_uaf_helper+0x392/0x400
[   25.593614]  kasan_report+0x141/0x180
[   25.593636]  ? mempool_uaf_helper+0x392/0x400
[   25.593664]  __asan_report_load1_noabort+0x18/0x20
[   25.593688]  mempool_uaf_helper+0x392/0x400
[   25.593711]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.593734]  ? dequeue_entities+0x23f/0x1630
[   25.593760]  ? __kasan_check_write+0x18/0x20
[   25.593784]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.593807]  ? finish_task_switch.isra.0+0x153/0x700
[   25.593834]  mempool_kmalloc_large_uaf+0xef/0x140
[   25.593858]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   25.593884]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.593908]  ? __pfx_mempool_kfree+0x10/0x10
[   25.593933]  ? __pfx_read_tsc+0x10/0x10
[   25.593956]  ? ktime_get_ts64+0x86/0x230
[   25.593983]  kunit_try_run_case+0x1a5/0x480
[   25.594009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.594049]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.594071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.594094]  ? __kthread_parkme+0x82/0x180
[   25.594116]  ? preempt_count_sub+0x50/0x80
[   25.594140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.594164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.594190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.594217]  kthread+0x337/0x6f0
[   25.594237]  ? trace_preempt_on+0x20/0xc0
[   25.594261]  ? __pfx_kthread+0x10/0x10
[   25.594282]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.594308]  ? calculate_sigpending+0x7b/0xa0
[   25.594333]  ? __pfx_kthread+0x10/0x10
[   25.594355]  ret_from_fork+0x116/0x1d0
[   25.594375]  ? __pfx_kthread+0x10/0x10
[   25.594395]  ret_from_fork_asm+0x1a/0x30
[   25.594428]  </TASK>
[   25.594440] 
[   25.604690] The buggy address belongs to the physical page:
[   25.605356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106128
[   25.606073] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.606936] flags: 0x200000000000040(head|node=0|zone=2)
[   25.607452] page_type: f8(unknown)
[   25.607809] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.608775] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.609452] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.610250] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.611056] head: 0200000000000002 ffffea0004184a01 00000000ffffffff 00000000ffffffff
[   25.611861] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.612500] page dumped because: kasan: bad access detected
[   25.613063] 
[   25.613239] Memory state around the buggy address:
[   25.613735]  ffff888106127f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.614048]  ffff888106127f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.614263] >ffff888106128000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.614476]                    ^
[   25.614662]  ffff888106128080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.614955]  ffff888106128100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.615237] ==================================================================
[   25.667825] ==================================================================
[   25.668286] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   25.668704] Read of size 1 at addr ffff888106228000 by task kunit_try_catch/281
[   25.669009] 
[   25.669128] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.669188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.669203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.669229] Call Trace:
[   25.669245]  <TASK>
[   25.669268]  dump_stack_lvl+0x73/0xb0
[   25.669307]  print_report+0xd1/0x610
[   25.669335]  ? __virt_addr_valid+0x1db/0x2d0
[   25.669367]  ? mempool_uaf_helper+0x392/0x400
[   25.669416]  ? kasan_addr_to_slab+0x11/0xa0
[   25.669443]  ? mempool_uaf_helper+0x392/0x400
[   25.669471]  kasan_report+0x141/0x180
[   25.669500]  ? mempool_uaf_helper+0x392/0x400
[   25.669562]  __asan_report_load1_noabort+0x18/0x20
[   25.669594]  mempool_uaf_helper+0x392/0x400
[   25.669624]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.669652]  ? dequeue_entities+0x23f/0x1630
[   25.669702]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.669743]  ? finish_task_switch.isra.0+0x153/0x700
[   25.669776]  mempool_page_alloc_uaf+0xed/0x140
[   25.669806]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   25.669838]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.669870]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.669902]  ? __pfx_read_tsc+0x10/0x10
[   25.669929]  ? ktime_get_ts64+0x86/0x230
[   25.669962]  kunit_try_run_case+0x1a5/0x480
[   25.669993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.670019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.670048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.670076]  ? __kthread_parkme+0x82/0x180
[   25.670103]  ? preempt_count_sub+0x50/0x80
[   25.670132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.670160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.670193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.670225]  kthread+0x337/0x6f0
[   25.670250]  ? trace_preempt_on+0x20/0xc0
[   25.670279]  ? __pfx_kthread+0x10/0x10
[   25.670304]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.670335]  ? calculate_sigpending+0x7b/0xa0
[   25.670364]  ? __pfx_kthread+0x10/0x10
[   25.670391]  ret_from_fork+0x116/0x1d0
[   25.670416]  ? __pfx_kthread+0x10/0x10
[   25.670441]  ret_from_fork_asm+0x1a/0x30
[   25.670751]  </TASK>
[   25.670764] 
[   25.681055] The buggy address belongs to the physical page:
[   25.681428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106228
[   25.682001] flags: 0x200000000000000(node=0|zone=2)
[   25.682235] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.682759] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.683262] page dumped because: kasan: bad access detected
[   25.683510] 
[   25.683605] Memory state around the buggy address:
[   25.683814]  ffff888106227f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.684096]  ffff888106227f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.684378] >ffff888106228000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.685077]                    ^
[   25.685378]  ffff888106228080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.685935]  ffff888106228100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.686167] ==================================================================