Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   37.415422] ==================================================================
[   37.416392] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.423075] Read of size 1 at addr ffff000803330000 by task kunit_try_catch/282
[   37.430364] 
[   37.431852] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.431911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.431927] Hardware name: WinLink E850-96 board (DT)
[   37.431948] Call trace:
[   37.431961]  show_stack+0x20/0x38 (C)
[   37.432001]  dump_stack_lvl+0x8c/0xd0
[   37.432040]  print_report+0x118/0x608
[   37.432074]  kasan_report+0xdc/0x128
[   37.432105]  __asan_report_load1_noabort+0x20/0x30
[   37.432146]  mempool_uaf_helper+0x314/0x340
[   37.432181]  mempool_page_alloc_uaf+0xc0/0x118
[   37.432214]  kunit_try_run_case+0x170/0x3f0
[   37.432253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.432295]  kthread+0x328/0x630
[   37.432330]  ret_from_fork+0x10/0x20
[   37.432367] 
[   37.499115] The buggy address belongs to the physical page:
[   37.504673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   37.512658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.519178] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.526897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.534616] page dumped because: kasan: bad access detected
[   37.540173] 
[   37.541648] Memory state around the buggy address:
[   37.546428]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.553630]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.560836] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.568036]                    ^
[   37.571251]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.578456]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.585658] ==================================================================
[   36.853326] ==================================================================
[   36.862407] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   36.869091] Read of size 1 at addr ffff000803330000 by task kunit_try_catch/278
[   36.876379] 
[   36.877866] CPU: 7 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.877924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.877940] Hardware name: WinLink E850-96 board (DT)
[   36.877964] Call trace:
[   36.877978]  show_stack+0x20/0x38 (C)
[   36.878012]  dump_stack_lvl+0x8c/0xd0
[   36.878053]  print_report+0x118/0x608
[   36.878085]  kasan_report+0xdc/0x128
[   36.878114]  __asan_report_load1_noabort+0x20/0x30
[   36.878151]  mempool_uaf_helper+0x314/0x340
[   36.878184]  mempool_kmalloc_large_uaf+0xc4/0x120
[   36.878224]  kunit_try_run_case+0x170/0x3f0
[   36.878262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.878301]  kthread+0x328/0x630
[   36.878337]  ret_from_fork+0x10/0x20
[   36.878374] 
[   36.945393] The buggy address belongs to the physical page:
[   36.950949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   36.958934] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.966573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.973515] page_type: f8(unknown)
[   36.976914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.984630] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.992357] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.000169] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.007982] head: 0bfffe0000000002 fffffdffe00ccc01 00000000ffffffff 00000000ffffffff
[   37.015794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.023599] page dumped because: kasan: bad access detected
[   37.029156] 
[   37.030630] Memory state around the buggy address:
[   37.035411]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.042614]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.049819] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.057019]                    ^
[   37.060235]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.067439]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.074641] ==================================================================

[   20.017196] ==================================================================
[   20.017263] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.017322] Read of size 1 at addr fff00000c7a88000 by task kunit_try_catch/231
[   20.017372] 
[   20.017407] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.018032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.018078] Hardware name: linux,dummy-virt (DT)
[   20.018161] Call trace:
[   20.018188]  show_stack+0x20/0x38 (C)
[   20.018599]  dump_stack_lvl+0x8c/0xd0
[   20.018792]  print_report+0x118/0x608
[   20.018920]  kasan_report+0xdc/0x128
[   20.019187]  __asan_report_load1_noabort+0x20/0x30
[   20.019293]  mempool_uaf_helper+0x314/0x340
[   20.019549]  mempool_kmalloc_large_uaf+0xc4/0x120
[   20.019641]  kunit_try_run_case+0x170/0x3f0
[   20.019745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.019798]  kthread+0x328/0x630
[   20.019843]  ret_from_fork+0x10/0x20
[   20.020139] 
[   20.020167] The buggy address belongs to the physical page:
[   20.020246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a88
[   20.020307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.020354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.020410] page_type: f8(unknown)
[   20.020451] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.020504] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.020556] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.020607] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.020659] head: 0bfffe0000000002 ffffc1ffc31ea201 00000000ffffffff 00000000ffffffff
[   20.020710] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.020752] page dumped because: kasan: bad access detected
[   20.020784] 
[   20.020802] Memory state around the buggy address:
[   20.020834]  fff00000c7a87f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.020890]  fff00000c7a87f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.021107] >fff00000c7a88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.021148]                    ^
[   20.021241]  fff00000c7a88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.021286]  fff00000c7a88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.021652] ==================================================================
[   20.102701] ==================================================================
[   20.102772] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.102838] Read of size 1 at addr fff00000c795c000 by task kunit_try_catch/235
[   20.102910] 
[   20.102946] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.103035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.103064] Hardware name: linux,dummy-virt (DT)
[   20.103099] Call trace:
[   20.103121]  show_stack+0x20/0x38 (C)
[   20.103176]  dump_stack_lvl+0x8c/0xd0
[   20.103227]  print_report+0x118/0x608
[   20.103273]  kasan_report+0xdc/0x128
[   20.103317]  __asan_report_load1_noabort+0x20/0x30
[   20.103367]  mempool_uaf_helper+0x314/0x340
[   20.103416]  mempool_page_alloc_uaf+0xc0/0x118
[   20.103462]  kunit_try_run_case+0x170/0x3f0
[   20.103513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.103567]  kthread+0x328/0x630
[   20.103614]  ret_from_fork+0x10/0x20
[   20.103664] 
[   20.103684] The buggy address belongs to the physical page:
[   20.103718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.103772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.103840] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.103938] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.103999] page dumped because: kasan: bad access detected
[   20.104033] 
[   20.104051] Memory state around the buggy address:
[   20.104090]  fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104135]  fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104181] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104222]                    ^
[   20.104251]  fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104295]  fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104336] ==================================================================

[   12.551230] ==================================================================
[   12.551696] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   12.552062] Read of size 1 at addr ffff888103a04000 by task kunit_try_catch/252
[   12.552558] 
[   12.552782] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.552837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.552992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.553019] Call Trace:
[   12.553031]  <TASK>
[   12.553050]  dump_stack_lvl+0x73/0xb0
[   12.553082]  print_report+0xd1/0x650
[   12.553105]  ? __virt_addr_valid+0x1db/0x2d0
[   12.553127]  ? mempool_uaf_helper+0x392/0x400
[   12.553150]  ? kasan_addr_to_slab+0x11/0xa0
[   12.553170]  ? mempool_uaf_helper+0x392/0x400
[   12.553193]  kasan_report+0x141/0x180
[   12.553226]  ? mempool_uaf_helper+0x392/0x400
[   12.553253]  __asan_report_load1_noabort+0x18/0x20
[   12.553286]  mempool_uaf_helper+0x392/0x400
[   12.553308]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.553331]  ? dequeue_entities+0x852/0x1740
[   12.553356]  ? finish_task_switch.isra.0+0x153/0x700
[   12.553384]  mempool_page_alloc_uaf+0xed/0x140
[   12.553404]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   12.553423]  ? dequeue_task_fair+0x166/0x4e0
[   12.553445]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   12.553468]  ? __pfx_mempool_free_pages+0x10/0x10
[   12.553499]  ? __pfx_read_tsc+0x10/0x10
[   12.553520]  ? ktime_get_ts64+0x86/0x230
[   12.553546]  kunit_try_run_case+0x1a5/0x480
[   12.553582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.553604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.553629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.553651]  ? __kthread_parkme+0x82/0x180
[   12.553674]  ? preempt_count_sub+0x50/0x80
[   12.553699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.553723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.553834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.553860]  kthread+0x337/0x6f0
[   12.553877]  ? trace_preempt_on+0x20/0xc0
[   12.553901]  ? __pfx_kthread+0x10/0x10
[   12.553929]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.553952]  ? calculate_sigpending+0x7b/0xa0
[   12.553974]  ? __pfx_kthread+0x10/0x10
[   12.553993]  ret_from_fork+0x41/0x80
[   12.554014]  ? __pfx_kthread+0x10/0x10
[   12.554032]  ret_from_fork_asm+0x1a/0x30
[   12.554063]  </TASK>
[   12.554075] 
[   12.563052] The buggy address belongs to the physical page:
[   12.563334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a04
[   12.563995] flags: 0x200000000000000(node=0|zone=2)
[   12.564476] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   12.565060] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   12.565490] page dumped because: kasan: bad access detected
[   12.565778] 
[   12.566021] Memory state around the buggy address:
[   12.566257]  ffff888103a03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.566591]  ffff888103a03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.566812] >ffff888103a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.567157]                    ^
[   12.567323]  ffff888103a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.567563]  ffff888103a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.568010] ==================================================================
[   12.490876] ==================================================================
[   12.491549] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   12.491894] Read of size 1 at addr ffff888102f7c000 by task kunit_try_catch/248
[   12.492236] 
[   12.492362] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.492414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.492426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.492449] Call Trace:
[   12.492462]  <TASK>
[   12.492537]  dump_stack_lvl+0x73/0xb0
[   12.492624]  print_report+0xd1/0x650
[   12.492649]  ? __virt_addr_valid+0x1db/0x2d0
[   12.492673]  ? mempool_uaf_helper+0x392/0x400
[   12.492696]  ? kasan_addr_to_slab+0x11/0xa0
[   12.492877]  ? mempool_uaf_helper+0x392/0x400
[   12.492909]  kasan_report+0x141/0x180
[   12.493235]  ? mempool_uaf_helper+0x392/0x400
[   12.493267]  __asan_report_load1_noabort+0x18/0x20
[   12.493288]  mempool_uaf_helper+0x392/0x400
[   12.493311]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.493333]  ? dequeue_entities+0x852/0x1740
[   12.493359]  ? finish_task_switch.isra.0+0x153/0x700
[   12.493387]  mempool_kmalloc_large_uaf+0xef/0x140
[   12.493411]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   12.493434]  ? dequeue_task_fair+0x166/0x4e0
[   12.493456]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.493478]  ? __pfx_mempool_kfree+0x10/0x10
[   12.493499]  ? __pfx_read_tsc+0x10/0x10
[   12.493520]  ? ktime_get_ts64+0x86/0x230
[   12.493546]  kunit_try_run_case+0x1a5/0x480
[   12.493612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.493635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.493674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.493698]  ? __kthread_parkme+0x82/0x180
[   12.493795]  ? preempt_count_sub+0x50/0x80
[   12.493826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.493851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.493876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.493899]  kthread+0x337/0x6f0
[   12.493928]  ? trace_preempt_on+0x20/0xc0
[   12.493953]  ? __pfx_kthread+0x10/0x10
[   12.493971]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.493992]  ? calculate_sigpending+0x7b/0xa0
[   12.494014]  ? __pfx_kthread+0x10/0x10
[   12.494032]  ret_from_fork+0x41/0x80
[   12.494054]  ? __pfx_kthread+0x10/0x10
[   12.494071]  ret_from_fork_asm+0x1a/0x30
[   12.494103]  </TASK>
[   12.494115] 
[   12.503778] The buggy address belongs to the physical page:
[   12.504208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f7c
[   12.504699] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.504989] flags: 0x200000000000040(head|node=0|zone=2)
[   12.505174] page_type: f8(unknown)
[   12.505611] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.506004] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.506655] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.507054] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.507352] head: 0200000000000002 ffffea00040bdf01 00000000ffffffff 00000000ffffffff
[   12.507808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.508238] page dumped because: kasan: bad access detected
[   12.508500] 
[   12.508630] Memory state around the buggy address:
[   12.509068]  ffff888102f7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.509402]  ffff888102f7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.509798] >ffff888102f7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.510072]                    ^
[   12.510311]  ffff888102f7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.510613]  ffff888102f7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   12.511081] ==================================================================