Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.625118] ==================================================================
[   17.625252] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   17.625416] Read of size 1 at addr fff00000c77fa240 by task kunit_try_catch/234
[   17.625477] 
[   17.625552] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.625645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.625672] Hardware name: linux,dummy-virt (DT)
[   17.625709] Call trace:
[   17.625732]  show_stack+0x20/0x38 (C)
[   17.625791]  dump_stack_lvl+0x8c/0xd0
[   17.625841]  print_report+0x118/0x608
[   17.625884]  kasan_report+0xdc/0x128
[   17.625931]  __asan_report_load1_noabort+0x20/0x30
[   17.625998]  mempool_uaf_helper+0x314/0x340
[   17.626059]  mempool_slab_uaf+0xc0/0x118
[   17.626106]  kunit_try_run_case+0x170/0x3f0
[   17.626154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.626206]  kthread+0x328/0x630
[   17.626251]  ret_from_fork+0x10/0x20
[   17.626300] 
[   17.626317] Allocated by task 234:
[   17.626347]  kasan_save_stack+0x3c/0x68
[   17.626386]  kasan_save_track+0x20/0x40
[   17.626430]  kasan_save_alloc_info+0x40/0x58
[   17.626466]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.626507]  remove_element+0x16c/0x1f8
[   17.626546]  mempool_alloc_preallocated+0x58/0xc0
[   17.626587]  mempool_uaf_helper+0xa4/0x340
[   17.626624]  mempool_slab_uaf+0xc0/0x118
[   17.626658]  kunit_try_run_case+0x170/0x3f0
[   17.626700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.626747]  kthread+0x328/0x630
[   17.626782]  ret_from_fork+0x10/0x20
[   17.626815] 
[   17.626834] Freed by task 234:
[   17.626858]  kasan_save_stack+0x3c/0x68
[   17.626892]  kasan_save_track+0x20/0x40
[   17.626927]  kasan_save_free_info+0x4c/0x78
[   17.626980]  __kasan_mempool_poison_object+0xc0/0x150
[   17.627019]  mempool_free+0x28c/0x328
[   17.627056]  mempool_uaf_helper+0x104/0x340
[   17.627094]  mempool_slab_uaf+0xc0/0x118
[   17.627128]  kunit_try_run_case+0x170/0x3f0
[   17.627165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.627212]  kthread+0x328/0x630
[   17.627245]  ret_from_fork+0x10/0x20
[   17.627279] 
[   17.627299] The buggy address belongs to the object at fff00000c77fa240
[   17.627299]  which belongs to the cache test_cache of size 123
[   17.627355] The buggy address is located 0 bytes inside of
[   17.627355]  freed 123-byte region [fff00000c77fa240, fff00000c77fa2bb)
[   17.627416] 
[   17.627436] The buggy address belongs to the physical page:
[   17.627465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   17.627518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.627565] page_type: f5(slab)
[   17.627606] raw: 0bfffe0000000000 fff00000c5d10b40 dead000000000122 0000000000000000
[   17.627653] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.627692] page dumped because: kasan: bad access detected
[   17.627722] 
[   17.627739] Memory state around the buggy address:
[   17.627771]  fff00000c77fa100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.627813]  fff00000c77fa180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.627855] >fff00000c77fa200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   17.627891]                                            ^
[   17.627924]  fff00000c77fa280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.627972]  fff00000c77fa300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.628021] ==================================================================
[   17.539965] ==================================================================
[   17.540047] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   17.540115] Read of size 1 at addr fff00000c638ed00 by task kunit_try_catch/230
[   17.540183] 
[   17.540224] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.540553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.540581] Hardware name: linux,dummy-virt (DT)
[   17.540732] Call trace:
[   17.540872]  show_stack+0x20/0x38 (C)
[   17.540960]  dump_stack_lvl+0x8c/0xd0
[   17.542218]  print_report+0x118/0x608
[   17.542265]  kasan_report+0xdc/0x128
[   17.542325]  __asan_report_load1_noabort+0x20/0x30
[   17.542380]  mempool_uaf_helper+0x314/0x340
[   17.542435]  mempool_kmalloc_uaf+0xc4/0x120
[   17.542482]  kunit_try_run_case+0x170/0x3f0
[   17.542531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.542584]  kthread+0x328/0x630
[   17.542627]  ret_from_fork+0x10/0x20
[   17.542709] 
[   17.542729] Allocated by task 230:
[   17.542770]  kasan_save_stack+0x3c/0x68
[   17.542810]  kasan_save_track+0x20/0x40
[   17.542846]  kasan_save_alloc_info+0x40/0x58
[   17.542908]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.543073]  remove_element+0x130/0x1f8
[   17.543160]  mempool_alloc_preallocated+0x58/0xc0
[   17.543201]  mempool_uaf_helper+0xa4/0x340
[   17.543248]  mempool_kmalloc_uaf+0xc4/0x120
[   17.543288]  kunit_try_run_case+0x170/0x3f0
[   17.543327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.543376]  kthread+0x328/0x630
[   17.543411]  ret_from_fork+0x10/0x20
[   17.543446] 
[   17.543469] Freed by task 230:
[   17.543747]  kasan_save_stack+0x3c/0x68
[   17.543826]  kasan_save_track+0x20/0x40
[   17.544074]  kasan_save_free_info+0x4c/0x78
[   17.544120]  __kasan_mempool_poison_object+0xc0/0x150
[   17.544280]  mempool_free+0x28c/0x328
[   17.544335]  mempool_uaf_helper+0x104/0x340
[   17.544661]  mempool_kmalloc_uaf+0xc4/0x120
[   17.544760]  kunit_try_run_case+0x170/0x3f0
[   17.544877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.544934]  kthread+0x328/0x630
[   17.545029]  ret_from_fork+0x10/0x20
[   17.545065] 
[   17.545084] The buggy address belongs to the object at fff00000c638ed00
[   17.545084]  which belongs to the cache kmalloc-128 of size 128
[   17.545440] The buggy address is located 0 bytes inside of
[   17.545440]  freed 128-byte region [fff00000c638ed00, fff00000c638ed80)
[   17.545682] 
[   17.545707] The buggy address belongs to the physical page:
[   17.545738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.545866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.545920] page_type: f5(slab)
[   17.545979] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.546028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.546087] page dumped because: kasan: bad access detected
[   17.546117] 
[   17.546137] Memory state around the buggy address:
[   17.546446]  fff00000c638ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.546506]  fff00000c638ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.546745] >fff00000c638ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.546788]                    ^
[   17.547682]  fff00000c638ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.547930]  fff00000c638ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.548000] ==================================================================

[   12.672581] ==================================================================
[   12.672993] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.673249] Read of size 1 at addr ffff888102dc0d00 by task kunit_try_catch/246
[   12.673487] 
[   12.673584] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.673781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.673797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.673823] Call Trace:
[   12.673836]  <TASK>
[   12.674087]  dump_stack_lvl+0x73/0xb0
[   12.674124]  print_report+0xd1/0x650
[   12.674161]  ? __virt_addr_valid+0x1db/0x2d0
[   12.674185]  ? mempool_uaf_helper+0x392/0x400
[   12.674207]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.674240]  ? mempool_uaf_helper+0x392/0x400
[   12.674263]  kasan_report+0x141/0x180
[   12.674287]  ? mempool_uaf_helper+0x392/0x400
[   12.674314]  __asan_report_load1_noabort+0x18/0x20
[   12.674336]  mempool_uaf_helper+0x392/0x400
[   12.674360]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.674383]  ? dequeue_entities+0x852/0x1740
[   12.674409]  ? finish_task_switch.isra.0+0x153/0x700
[   12.674437]  mempool_kmalloc_uaf+0xef/0x140
[   12.674460]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   12.674483]  ? dequeue_task_fair+0x166/0x4e0
[   12.674506]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.674528]  ? __pfx_mempool_kfree+0x10/0x10
[   12.674550]  ? __pfx_read_tsc+0x10/0x10
[   12.674570]  ? ktime_get_ts64+0x86/0x230
[   12.674598]  kunit_try_run_case+0x1a5/0x480
[   12.674624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.674647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.674672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.674697]  ? __kthread_parkme+0x82/0x180
[   12.674720]  ? preempt_count_sub+0x50/0x80
[   12.674744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.674768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.674791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.674815]  kthread+0x337/0x6f0
[   12.674832]  ? trace_preempt_on+0x20/0xc0
[   12.674855]  ? __pfx_kthread+0x10/0x10
[   12.674874]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.674896]  ? calculate_sigpending+0x7b/0xa0
[   12.674919]  ? __pfx_kthread+0x10/0x10
[   12.674937]  ret_from_fork+0x41/0x80
[   12.674958]  ? __pfx_kthread+0x10/0x10
[   12.674976]  ret_from_fork_asm+0x1a/0x30
[   12.675007]  </TASK>
[   12.675019] 
[   12.687167] Allocated by task 246:
[   12.687503]  kasan_save_stack+0x45/0x70
[   12.687928]  kasan_save_track+0x18/0x40
[   12.688087]  kasan_save_alloc_info+0x3b/0x50
[   12.688252]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.688643]  remove_element+0x11e/0x190
[   12.689158]  mempool_alloc_preallocated+0x4d/0x90
[   12.689397]  mempool_uaf_helper+0x96/0x400
[   12.689746]  mempool_kmalloc_uaf+0xef/0x140
[   12.689896]  kunit_try_run_case+0x1a5/0x480
[   12.690106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.690582]  kthread+0x337/0x6f0
[   12.690755]  ret_from_fork+0x41/0x80
[   12.691073]  ret_from_fork_asm+0x1a/0x30
[   12.691254] 
[   12.691459] Freed by task 246:
[   12.691587]  kasan_save_stack+0x45/0x70
[   12.691868]  kasan_save_track+0x18/0x40
[   12.692000]  kasan_save_free_info+0x3f/0x60
[   12.692205]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.692461]  mempool_free+0x2ec/0x380
[   12.692635]  mempool_uaf_helper+0x11a/0x400
[   12.693030]  mempool_kmalloc_uaf+0xef/0x140
[   12.693204]  kunit_try_run_case+0x1a5/0x480
[   12.693442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.693618]  kthread+0x337/0x6f0
[   12.693732]  ret_from_fork+0x41/0x80
[   12.693984]  ret_from_fork_asm+0x1a/0x30
[   12.694210] 
[   12.694309] The buggy address belongs to the object at ffff888102dc0d00
[   12.694309]  which belongs to the cache kmalloc-128 of size 128
[   12.695103] The buggy address is located 0 bytes inside of
[   12.695103]  freed 128-byte region [ffff888102dc0d00, ffff888102dc0d80)
[   12.696187] 
[   12.696309] The buggy address belongs to the physical page:
[   12.696594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dc0
[   12.697045] flags: 0x200000000000000(node=0|zone=2)
[   12.697370] page_type: f5(slab)
[   12.697867] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.698402] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.698701] page dumped because: kasan: bad access detected
[   12.699145] 
[   12.699264] Memory state around the buggy address:
[   12.699664]  ffff888102dc0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.700124]  ffff888102dc0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.700457] >ffff888102dc0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.701086]                    ^
[   12.701451]  ffff888102dc0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.701935]  ffff888102dc0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.702190] ==================================================================
[   12.740183] ==================================================================
[   12.741387] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.741819] Read of size 1 at addr ffff8881039f2240 by task kunit_try_catch/250
[   12.742610] 
[   12.742981] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   12.743095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.743110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.743135] Call Trace:
[   12.743149]  <TASK>
[   12.743169]  dump_stack_lvl+0x73/0xb0
[   12.743202]  print_report+0xd1/0x650
[   12.743227]  ? __virt_addr_valid+0x1db/0x2d0
[   12.743263]  ? mempool_uaf_helper+0x392/0x400
[   12.743288]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.743311]  ? mempool_uaf_helper+0x392/0x400
[   12.743334]  kasan_report+0x141/0x180
[   12.743357]  ? mempool_uaf_helper+0x392/0x400
[   12.743385]  __asan_report_load1_noabort+0x18/0x20
[   12.743407]  mempool_uaf_helper+0x392/0x400
[   12.743430]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.743457]  ? finish_task_switch.isra.0+0x153/0x700
[   12.743487]  mempool_slab_uaf+0xea/0x140
[   12.743507]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   12.743527]  ? dequeue_task_fair+0x166/0x4e0
[   12.743551]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.743574]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.743597]  ? __pfx_read_tsc+0x10/0x10
[   12.743619]  ? ktime_get_ts64+0x86/0x230
[   12.743645]  kunit_try_run_case+0x1a5/0x480
[   12.743672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.743695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.743721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.743746]  ? __kthread_parkme+0x82/0x180
[   12.743769]  ? preempt_count_sub+0x50/0x80
[   12.743794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.743819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.743843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.743866]  kthread+0x337/0x6f0
[   12.743883]  ? trace_preempt_on+0x20/0xc0
[   12.743908]  ? __pfx_kthread+0x10/0x10
[   12.743926]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.743949]  ? calculate_sigpending+0x7b/0xa0
[   12.743972]  ? __pfx_kthread+0x10/0x10
[   12.743990]  ret_from_fork+0x41/0x80
[   12.744010]  ? __pfx_kthread+0x10/0x10
[   12.744029]  ret_from_fork_asm+0x1a/0x30
[   12.744060]  </TASK>
[   12.744072] 
[   12.758497] Allocated by task 250:
[   12.758989]  kasan_save_stack+0x45/0x70
[   12.759456]  kasan_save_track+0x18/0x40
[   12.759825]  kasan_save_alloc_info+0x3b/0x50
[   12.760307]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.760639]  remove_element+0x11e/0x190
[   12.761053]  mempool_alloc_preallocated+0x4d/0x90
[   12.761685]  mempool_uaf_helper+0x96/0x400
[   12.762104]  mempool_slab_uaf+0xea/0x140
[   12.762597]  kunit_try_run_case+0x1a5/0x480
[   12.763053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.763449]  kthread+0x337/0x6f0
[   12.763839]  ret_from_fork+0x41/0x80
[   12.764223]  ret_from_fork_asm+0x1a/0x30
[   12.764757] 
[   12.765015] Freed by task 250:
[   12.765199]  kasan_save_stack+0x45/0x70
[   12.765492]  kasan_save_track+0x18/0x40
[   12.765755]  kasan_save_free_info+0x3f/0x60
[   12.765942]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.766167]  mempool_free+0x2ec/0x380
[   12.766700]  mempool_uaf_helper+0x11a/0x400
[   12.767107]  mempool_slab_uaf+0xea/0x140
[   12.767561]  kunit_try_run_case+0x1a5/0x480
[   12.767950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.768193]  kthread+0x337/0x6f0
[   12.768701]  ret_from_fork+0x41/0x80
[   12.768981]  ret_from_fork_asm+0x1a/0x30
[   12.769567] 
[   12.769671] The buggy address belongs to the object at ffff8881039f2240
[   12.769671]  which belongs to the cache test_cache of size 123
[   12.770142] The buggy address is located 0 bytes inside of
[   12.770142]  freed 123-byte region [ffff8881039f2240, ffff8881039f22bb)
[   12.771173] 
[   12.771434] The buggy address belongs to the physical page:
[   12.772261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f2
[   12.773123] flags: 0x200000000000000(node=0|zone=2)
[   12.773628] page_type: f5(slab)
[   12.773918] raw: 0200000000000000 ffff888101ac5640 dead000000000122 0000000000000000
[   12.774251] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.774993] page dumped because: kasan: bad access detected
[   12.775251] 
[   12.775619] Memory state around the buggy address:
[   12.775899]  ffff8881039f2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.776222]  ffff8881039f2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.776452] >ffff8881039f2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   12.777060]                                            ^
[   12.777708]  ffff8881039f2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.778185]  ffff8881039f2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.778769] ==================================================================